CVE | Package:Affectedness | Severity | CVSS v3.1 | References |
CVE-1999-0077 | kernel-source-rt:Not affected | moderate | () | CVE-1999-0077 SMASH Issue 6137 XF:tcp-seq-predict(139) bnc#954946 |
CVE-1999-0524 | kernel-source-rt:Not affected | low | () | CONFIRM:kb.juniper.net:CVE-2015-2808 CONFIRM:kc.mcafee.com:CVE-2014-8533 CVE-1999-0524 MISC:descriptions.securescout.com:CVE-1999-0524 MISC:kb.vmware.com:CVE-1999-0524 OSVDB:95 SMASH Issue 6581 XF:icmp-netmask(306) XF:icmp-timestamp(322) bnc#351997 |
CVE-2000-1254 | openssl:Not affected, openssl-1_1:Not affected | moderate | () | BID:90109 CONFIRM:git.openssl.org:CVE-2000-1254 CVE-2000-1254 D:CVE-2000-1254 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MLIST:[openssl-users] 20000529 64 bit problem in RSA_generate_key in 0.9.5a MLIST:[oss-security] 20160504 broken RSA keys OSS:2016/Q2/228 RH:CVE-2000-1254 SECTRACK:1035750 SMASH Issue 168616 UBUNTU:CVE-2000-1254 bnc#978847 rh#1333287 |
CVE-2001-0328 | kernel-source-rt:Unsupported | moderate | () | BID:2682 CERT:CA-2001-09 CVE-2001-0328 RH:CVE-2001-0328 SECTRACK:1033181 SECUNIA:8044 SGI:20030201-01-P SMASH Issue 9195 SREASON:57 bnc#954947 rh#963594 |
CVE-2002-0640 | openssh:Not affected | critical | 9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | BUGTRAQ:20020628 Sun statement on the OpenSSH Remote Challenge Vulnerability CVE-2002-0640 OSVDB:839 RH:CVE-2002-0640 RHSA-2002:127 RHSA-2002:131 SMASH Issue 11636 SMASH Issue 411622 SUSE:SuSE-SA:2002:024 bnc#1226641 bnc#1226642 rh#1616784 |
CVE-2002-20001 | openssl:Ignore, openssl-1_1:Ignore | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:cert-portal.siemens.com:CVE-2022-37896 CVE-2002-20001 MISC:dheatattack.com:CVE-2002-20001 MISC:github.com:CVE-2002-20001 MISC:support.f5.com:CVE-2002-20001 MISC:www.arubanetworks.com:CVE-2021-41003 MISC:www.openssl.org:CVE-2002-20001 MISC:www.reddit.com:CVE-2002-20001 MISC:www.researchgate.net:CVE-2002-20001 MISC:www.suse.com:CVE-2002-20001 SMASH Issue 314827 bnc#1192815 bnc#1192820 https://dheatattack.gitlab.io/ https://gitlab.com/dheatattack/dheater https://ieeexplore.ieee.org/document/10374117 |
CVE-2003-0028 | libtirpc:Not affected | important | () | BUGTRAQ:20030319 EEYE: XDR Integer Overflow BUGTRAQ:20030319 MITKRB5-SA-2003-003: faulty length checks in xdrmem_getbytes BUGTRAQ:20030319 RE: EEYE: XDR Integer Overflow BUGTRAQ:20030325 GLSA: glibc (200303-22) BUGTRAQ:20030331 GLSA: dietlibc (200303-29) BUGTRAQ:20030331 GLSA: krb5 & mit-krb5 (200303-28) BUGTRAQ:20030522 [slackware-security] glibc XDR overflow fix (SSA:2003-141-03) CERT-VN:VU#516825 CERT:CA-2003-10 CONFIRM:security.netapp.com:CVE-2003-0028 CVE-2003-0028 DEBIAN:DSA-266 DEBIAN:DSA-272 DEBIAN:DSA-282 EEYE:AD20030318 ENGARDE:ESA-20030321-010 MANDRAKE:MDKSA-2003:037 NETBSD:NetBSD-SA2003-008 OVAL:oval:org.mitre.oval:def:230 RH:CVE-2003-0028 RHSA-2003:051 RHSA-2003:052 RHSA-2003:089 RHSA-2003:090 RHSA-2003:091 RHSA-2003:168 RHSA-2003:212 RHSA-2013:0884 SMASH Issue 10487 SUSE:SuSE-SA:2003:027 TRUSTIX:2003-0014 VULNWATCH:20030319 EEYE: XDR Integer Overflow bnc#816627 rh#1616941 rh#948378 |
CVE-2005-1918 | tar:Not affected | moderate | () | CONFIRM:support.avaya.com:CVE-2005-1918 CVE-2005-1918 FEDORA:FLSA:183571-1 RH:CVE-2005-1918 RHSA-2006:0195 SECTRACK:1015655 SECUNIA:18988 SECUNIA:20397 SMASH Issue 18695 UBUNTU:CVE-2005-1918 bnc#145081 rh#140589 |
CVE-2005-4881 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2005-4881 CONFIRM:www.kernel.org:CVE-2005-4881 CONFIRM:www.kernel.org:CVE-2009-3228 CVE-2005-4881 L3:30773 MISC:git.kernel.org:MLIST:[oss-security] 20090917 Re: CVE request: kernel: tc: uninitialised kernel memory leak MISC:marc.info:MLIST:[oss-security] 20090917 Re: CVE request: kernel: tc: uninitialised kernel memory leak MLIST:[oss-security] 20090905 Re: CVE request: kernel: tc: uninitialised kernel memory leak MLIST:[oss-security] 20090906 Re: CVE request: kernel: tc: uninitialised kernel memory leak MLIST:[oss-security] 20090907 Re: CVE request: kernel: tc: uninitialised kernel memory leak MLIST:[oss-security] 20090916 Re: CVE request: kernel: tc: uninitialised kernel memory leak MLIST:[oss-security] 20090917 Re: CVE request: kernel: tc: uninitialised kernel memory leak RH:CVE-2005-4881 RHSA-2009:1522 RHSA-2009:1540 RHSA-2009:1548 SECUNIA:37084 SECUNIA:37909 SMASH Issue 27264 SUSE:SUSE-SA:2009:064 UBUNTU:CVE-2005-4881 bnc#536467 rh#520990 rh#521601 rh#528868 |
CVE-2005-4886 | kernel-source-rt:Unsupported | important | () | CONFIRM:git.kernel.org:CVE-2005-4886 CONFIRM:www.kernel.org:CVE-2005-4886 CVE-2005-4886 MLIST:[oss-security] 20100222 CVE-2005-4886 assigned to old remote oops RH:CVE-2005-4886 RHSA-2005:514 SMASH Issue 27283 UBUNTU:CVE-2005-4886 XF:kernel-selinuxparseskbipv6-dos(56614) rh#160117 |
CVE-2006-5051 | openssh:Not affected | important | 8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | APPLE:APPLE-SA-2007-03-13 BID:20241 CERT-VN:VU#851340 CERT:TA07-072A CONFIRM:docs.info.apple.com:CVE-2006-3081 CONFIRM:openssh.org:CVE-2006-5052 CONFIRM:sourceforge.net:CVE-2006-4924 CONFIRM:support.avaya.com:CVE-2006-4924 CONFIRM:www.arkoon.fr:CVE-2006-5051 CONFIRM:www.vmware.com:CVE-2006-2940 CVE-2006-5051 FREEBSD:FreeBSD-SA-06:22 FREEBSD:FreeBSD-SA-06:22.openssh GENTOO:GLSA-200611-06 MANDRIVA:MDKSA-2006:179 MLIST:[freebsd-security] 20061002 FreeBSD Security Advisory FreeBSD-SA-06:22.openssh MLIST:[openssh-unix-dev] 20060927 Announce: OpenSSH 4.4 released MLIST:[security-announce] 20070409 Globus Security Advisory 2007-02: GSI-OpenSSH vulnerability OPENBSD:[2.9] 015: SECURITY FIX: October 12, 2006 OPENPKG:OpenPKG-SA-2006.022 OSVDB:29264 RH:CVE-2006-5051 RHSA-2006:0697 RHSA-2006:0698 SECTRACK:1016940 SECUNIA:22158 SECUNIA:22173 SECUNIA:22183 SECUNIA:22196 SECUNIA:22208 SECUNIA:22236 SECUNIA:22245 SECUNIA:22270 SECUNIA:22352 SECUNIA:22362 SECUNIA:22487 SECUNIA:22495 SECUNIA:22823 SECUNIA:22926 SECUNIA:23680 SECUNIA:24479 SECUNIA:24799 SECUNIA:24805 SGI:20061001-01-P SLACKWARE:SSA:2006-272-02 SMASH Issue 35646 SUSE:SUSE-SA:2006:062 UBUNTU:CVE-2006-5051 UBUNTU:USN-355-1 VUPEN:ADV-2006-4018 VUPEN:ADV-2006-4329 VUPEN:ADV-2007-0930 VUPEN:ADV-2007-1332 XF:openssh-signal-handler-race-condition(29254) bdo#392428 bdo#498678 bnc#208662 bnc#426510 bnc#545317 http://www.debian.org/security/2006/dsa-1189 http://www.debian.org/security/2006/dsa-1212 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11387 rh#208347 |
CVE-2006-6304 | kernel-source-rt:Unsupported | important | () | BID:21591 CONFIRM:support.avaya.com:CVE-2009-4272 CONFIRM:www.kernel.org:CVE-2006-6304 CVE-2006-6304 L3:10960 RH:CVE-2006-6304 RHSA-2010:0046 SECUNIA:23349 SMASH Issue 36899 TRUSTIX:2006-0074 UBUNTU:CVE-2006-6304 VUPEN:ADV-2006-5002 bnc#289890 rh#537273 |
CVE-2007-1357 | kernel-source-rt:Unsupported | important | () | BID:23376 CONFIRM:issues.rpath.com:CVE-2007-1357 CONFIRM:www.kernel.org:CVE-2007-1357 CVE-2007-1357 L3:8676 SECUNIA:24793 SECUNIA:25226 SECUNIA:25392 SECUNIA:25961 SMASH Issue 24782 SUSE:SUSE-SA:2007:030 SUSE:SUSE-SA:2007:043 UBUNTU:CVE-2007-1357 UBUNTU:USN-464-1 VUPEN:ADV-2007-1340 bnc#251735 rh#235857 |
CVE-2007-3379 | kernel-source-rt:Unsupported | low | () | CVE-2007-3379 RH:CVE-2007-3379 RHBA-2007:0304 SMASH Issue 55942 UBUNTU:CVE-2007-3379 bnc#327047 rh#1618314 rh#178981 |
CVE-2007-3850 | kernel-source-rt:Unsupported | low | () | BID:26161 CONFIRM:git.kernel.org:CVE-2007-3850 CVE-2007-3850 OSVDB:45488 RH:CVE-2007-3850 RHSA-2007:0940 SMASH Issue 56403 UBUNTU:CVE-2007-3850 bnc#328904 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=721151d004dcf01a71b12bb6b893f9160284cf6e https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10793 rh#308811 |
CVE-2007-4559 | python3:Ignore | moderate | 5.4 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L) | CVE-2007-4559 L3:64282 L3:64763 L3:65722 MLIST:[python-dev] 20070824 tarfile and directory traversal vulnerability MLIST:[python-dev] 20070825 tarfile and directory traversal vulnerability RH:CVE-2007-4559 SECUNIA:26623 SMASH Issue 57438 UBUNTU:CVE-2007-4559 VUPEN:ADV-2007-3022 bnc#1203750 bnc#1205977 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CVBB7NU3YIRRDOKLYVN647WPRR3IAKR6/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FI55PGL47ES3OU2FQPGEHOI2EK3S2OBH/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KA4Z44ZAI4SY7THCFBUDNT5EEFO4XQ3A/ https://security.gentoo.org/glsa/202309-06 jsc#CAR-2054 rh#263261 rh#430635 |
CVE-2007-4567 | kernel-source-rt:Not affected | important | () | BID:26943 CONFIRM:bugzilla.kernel.org:CVE-2007-4567 CONFIRM:git.kernel.org:CVE-2007-4567 CVE-2007-4567 CVE-2008-0352 EXPLOIT-DB:4893 MILW0RM:4893 MISC:git.kernel.org:/ MISC:www.kernel.org:CVE-2008-0352 OVAL:oval:org.mitre.oval:def:11083 OVAL:oval:org.mitre.oval:def:7474 RH:CVE-2007-4567 RH:CVE-2008-0352 RHSA-2010:0019 RHSA-2010:0053 RHSA-2010:0079 RHSA-2010:0095 SECUNIA:25505 SECUNIA:28170 SECUNIA:28706 SECUNIA:38015 SMASH Issue 24300 SMASH Issue 57453 UBUNTU:CVE-2007-4567 UBUNTU:CVE-2008-0352 UBUNTU:USN-558-1 UBUNTU:USN-574-1 USN-558-1 XF:linux-kernel-ipv6-dos(39171) XF:linux-kernel-ipv6-jumbogram-dos(39643) bnc#307626 linux.git:commit:2570a4f5428bcdb1077622342181755741e7fa60 rh#548641 rh#555217 |
CVE-2007-4601 | tcpd:Unsupported | moderate | () | CVE-2007-4601 MISC:bugs.debian.org MISC:launchpad.net:CVE-2007-4601 OSVDB:40140 RH:CVE-2007-4601 SECUNIA:26567 SMASH Issue 57537 UBUNTU:CVE-2007-4601 UBUNTU:USN-507-1 XF:ubuntu-tcpwrapper-security-bypass(36364) bdo#405342 bnc#306250 rh#271941 |
CVE-2007-4998 | kernel-obs-build:Analysis, kernel-rt:Analysis, kernel-rt_debug:Analysis, kernel-source-rt:Analysis, kernel-syms-rt:Analysis | moderate | () | CONFIRM:issues.rpath.com:CVE-2007-4998 CVE-2007-4998 OSVDB:43228 RH:CVE-2007-4998 SMASH Issue 58315 UBUNTU:CVE-2007-4998 bnc#348106 rh#356471 |
CVE-2007-5087 | kernel-source-rt:Analysis | moderate | () | BID:25798 CONFIRM:lwn.net:CVE-2007-5087 CVE-2007-5087 MISC:git.kernel.org:CVE-2007-5087 OSVDB:39237 SMASH Issue 58469 bnc#329212 rh#310441 |
CVE-2007-5494 | kernel-source-rt:Unsupported | moderate | () | BID:26657 CVE-2007-5494 OSVDB:44153 RH:CVE-2007-5494 RHSA-2007:0993 RHSA-2007:1104 SECTRACK:1019017 SMASH Issue 59308 UBUNTU:CVE-2007-5494 XF:rhel-content-accelerator-dos(38823) bnc#342685 rh#315051 |
CVE-2007-5502 | openssl:Unsupported, openssl-1_1:Unsupported | moderate | () | BID:26652 CERT-VN:VU#150249 CONFIRM:www.openssl.org:CVE-2007-5502 CVE-2007-5502 RH:CVE-2007-5502 SECTRACK:1019029 SECUNIA:27859 SMASH Issue 59325 UBUNTU:CVE-2007-5502 VUPEN:ADV-2007-4044 XF:openssl-fips-prng-security-bypass(38796) bnc#342634 rh#390371 |
CVE-2007-5966 | kernel-source-rt:Not affected | important | () | BID:26880 BUGTRAQ:20071218 rPSA-2007-0269-1 kernel BUGTRAQ:20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components CONFIRM:issues.rpath.com:CVE-2007-5966 CONFIRM:kernel.org:CVE-2007-5966 CONFIRM:www.vmware.com:CVE-2009-1895 CVE-2007-5966 DSA-1436 MANDRIVA:MDVSA-2008:112 OVAL:oval:org.mitre.oval:def:10774 OVAL:oval:org.mitre.oval:def:8125 RH:CVE-2007-5966 RHSA-2008:0585 RHSA-2009:1193 RHSA-2010:0079 SECUNIA:28088 SECUNIA:28105 SECUNIA:28141 SECUNIA:28706 SECUNIA:28806 SECUNIA:31628 SECUNIA:36131 SECUNIA:37471 SMASH Issue 60550 SUSE:SUSE-SA:2008:006 UBUNTU:CVE-2007-5966 UBUNTU:USN-574-1 VUPEN:ADV-2007-4225 VUPEN:ADV-2009-3316 bnc#512584 rh#453135 |
CVE-2007-6416 | kernel-source-rt:Unsupported | moderate | () | BID:26954 CONFIRM:xenbits.xensource.com:CVE-2007-6416 CVE-2007-6416 OSVDB:41344 RH:CVE-2007-6416 RHSA-2008:0089 SECUNIA:28146 SMASH Issue 61454 UBUNTU:CVE-2007-6416 bnc#355642 rh#425381 |
CVE-2007-6694 | kernel-source-rt:Unsupported | important | () | BID:27555 CVE-2007-6694 MLIST:[linux-kernel] 20071122 [PATCH] PPC: CHRP - fix possible NULL pointer dereference RH:CVE-2007-6694 RHSA-2008:0055 RHSA-2008:0154 SECUNIA:28696 SMASH Issue 62031 UBUNTU:CVE-2007-6694 VUPEN:ADV-2008-0380 bnc#357902 rh#396751 |
CVE-2007-6761 | kernel-source-rt:Ignore | low | () | BID:98001 CONFIRM:git.kernel.org:CVE-2007-6761 CONFIRM:github.com:CVE-2007-6761 CONFIRM:www.linuxgrill.com:CVE-2007-6761 CVE-2007-6761 RH:CVE-2007-6761 SMASH Issue 184124 UBUNTU:CVE-2007-6761 bdo#827340 bnc#1035720 rh#1458182 |
CVE-2007-6762 | kernel-source-rt:Unsupported | critical | () | CVE-2007-6762 D:CVE-2007-6762 MISC:git.kernel.org:CVE-2007-6762 MISC:github.com:CVE-2007-6762 MISC:mirrors.edge.kernel.org:CVE-2007-6762 RH:CVE-2007-6762 SMASH Issue 238128 UBUNTU:CVE-2007-6762 bnc#1143172 rh#1735620 |
CVE-2008-0352 | kernel-source-rt:Not affected | important | () | BID:26943 CONFIRM:bugzilla.kernel.org:CVE-2007-4567 CONFIRM:git.kernel.org:CVE-2007-4567 CVE-2007-4567 CVE-2008-0352 EXPLOIT-DB:4893 MILW0RM:4893 MISC:git.kernel.org:/ MISC:www.kernel.org:CVE-2008-0352 OVAL:oval:org.mitre.oval:def:11083 OVAL:oval:org.mitre.oval:def:7474 RH:CVE-2007-4567 RH:CVE-2008-0352 RHSA-2010:0019 RHSA-2010:0053 RHSA-2010:0079 RHSA-2010:0095 SECUNIA:25505 SECUNIA:28170 SECUNIA:28706 SECUNIA:38015 SMASH Issue 24300 UBUNTU:CVE-2007-4567 UBUNTU:CVE-2008-0352 UBUNTU:USN-558-1 UBUNTU:USN-574-1 USN-558-1 XF:linux-kernel-ipv6-dos(39171) XF:linux-kernel-ipv6-jumbogram-dos(39643) bnc#307626 linux.git:commit:2570a4f5428bcdb1077622342181755741e7fa60 rh#548641 rh#555217 |
CVE-2008-1615 | kernel-source-rt:Unsupported | important | () | BID:29086 CVE-2008-1615 DSA-1588 FEDORA:FEDORA-2008-4043 L3:30849 RH:CVE-2008-1615 RHSA-2008:0237 RHSA-2008:0275 RHSA-2008:0585 SECTRACK:1020047 SECUNIA:30252 SECUNIA:30294 SECUNIA:30368 SECUNIA:30982 SECUNIA:31628 SMASH Issue 30142 SUSE:SUSE-SA:2008:035 SUSE:SUSE-SA:2008:038 UBUNTU:CVE-2008-1615 XF:linux-kernel-processtrace-dos(42278) bnc#388123 rh#431430 |
CVE-2008-1673 | kernel-source-rt:Unsupported | critical | () | BID:29589 BUGTRAQ:20080611 rPSA-2008-0189-1 kernel xen CONFIRM:git.kernel.org:CVE-2008-1673 CONFIRM:kernel.org:CVE-2008-1673 CONFIRM:wiki.rpath.com:CVE-2008-1673 CVE-2008-1673 FEDORA:FEDORA-2008-5308 L3:30851 MANDRIVA:MDVSA-2008:113 MANDRIVA:MDVSA-2008:174 RH:CVE-2008-1673 SECTRACK:1020210 SECUNIA:30000 SECUNIA:30580 SECUNIA:30644 SECUNIA:30658 SECUNIA:31836 SECUNIA:32370 SECUNIA:32759 SMASH Issue 30480 SUSE:SUSE-SA:2008:035 SUSE:SUSE-SA:2008:038 SUSE:SUSE-SA:2008:047 SUSE:SUSE-SA:2008:048 SUSE:SUSE-SA:2008:049 SUSE:SUSE-SA:2008:052 SUSE:SUSE-SR:2008:025 UBUNTU:CVE-2008-1673 UBUNTU:USN-625-1 VUPEN:ADV-2008-1770 XF:kernel-ber-decoder-bo(42921) XF:linux-kernel-ber-decoder-bo(42921) bnc#397347 bnc#415690 http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=33afb8403f361919aa5c8fe1d0a4f5ddbfbbea3c http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ddb2c43594f22843e9f3153da151deaba1a834c5 rh#443962 |
CVE-2008-1679 | python3:Not affected | moderate | () | APPLE:APPLE-SA-2007-12-17 APPLE:APPLE-SA-2009-02-12 BID:25696 BUGTRAQ:20080212 FLEA-2008-0002-1 python BUGTRAQ:20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates BUGTRAQ:20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components CERT:TA07-352A CONFIRM:bugs.gentoo.org:CVE-2007-4965 CONFIRM:bugs.python.org:CVE-2008-1679 CONFIRM:docs.info.apple.com:CVE-2007-5398 CONFIRM:issues.rpath.com:CVE-2007-4965 CONFIRM:issues.rpath.com:CVE-2008-1679 CONFIRM:support.apple.com:CVE-2006-3467 CONFIRM:support.avaya.com:CVE-2007-4965 CONFIRM:wiki.rpath.com:CVE-2007-4965 CONFIRM:wiki.rpath.com:CVE-2008-1721 CONFIRM:www.novell.com:CVE-2008-3144 CONFIRM:www.novell.com:CVE-2013-1087 CONFIRM:www.vmware.com:CVE-2009-1895 CVE-2007-4965 CVE-2008-1679 FEDORA:FEDORA-2007-2663 FULLDISC:20070916 python <= 2.5.1 standart librairy multiples int overflow, heap overflow in imageop module GENTOO:GLSA-200711-07 GENTOO:GLSA-200807-01 L3:30734 MANDRIVA:MDVSA-2008:012 MANDRIVA:MDVSA-2008:013 MANDRIVA:MDVSA-2008:163 MANDRIVA:MDVSA-2008:164 MISC:bugs.python.org:CVE-2008-1679 MLIST:[Security-announce] 20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates RH:CVE-2007-4965 RH:CVE-2008-1679 RHSA-2007:1076 RHSA-2008:0264 RHSA-2008:0525 RHSA-2008:0629 RHSA-2009:1176 RHSA-2009:1177 RHSA-2009:1178 SECUNIA:26837 SECUNIA:27460 SECUNIA:27562 SECUNIA:27872 SECUNIA:28480 SECUNIA:29955 SECUNIA:30872 SECUNIA:31358 SECUNIA:31365 SECUNIA:31518 SECUNIA:38675 SLACKWARE:SSA:2008-217-01 SMASH Issue 30540 SMASH Issue 58234 SUSE:SUSE-SR:2008:003 SUSE:SUSE-SR:2008:017 UBUNTU:CVE-2007-4965 UBUNTU:CVE-2008-1679 UBUNTU:USN-585-1 UBUNTU:USN-632-1 VUPEN:ADV-2007-3201 VUPEN:ADV-2007-4238 VUPEN:ADV-2008-0637 VUPEN:ADV-2009-3316 XF:python-imageop-bo(36653) XF:python-imageopc-bo(41958) bnc#325649 bnc#377090 bnc#444989 http://www.debian.org/security/2008/dsa-1551 http://www.debian.org/security/2008/dsa-1620 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10583 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10804 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7800 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8486 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8496 rh#295971 rh#441306 rh#469656 |
CVE-2008-2476 | kernel-source-rt:Unsupported | critical | () | BID:31529 CERT-VN:VU#472363 CONFIRM:support.apple.com:CVE-2008-3584 CONFIRM:www.kb.cert.org:CVE-2008-2476 CVE-2008-2476 FREEBSD:FreeBSD-SA-08:10 MISC:www.juniper.net:CVE-2008-2476 NETBSD:NetBSD-SA2008-013 OPENBSD:[4.2] 015: SECURITY FIX: October 2, 2008 OPENBSD:[4.3] 006: SECURITY FIX: October 2, 2008 RH:CVE-2008-2476 SECTRACK:1020968 SECTRACK:1021109 SECTRACK:1021132 SECUNIA:32112 SECUNIA:32116 SECUNIA:32117 SECUNIA:32133 SECUNIA:32406 SMASH Issue 57200 VUPEN:ADV-2008-2750 VUPEN:ADV-2008-2751 VUPEN:ADV-2008-2752 VUPEN:ADV-2009-0633 XF:multiple-vendors-ndp-dos(45601) bnc#412118 |
CVE-2008-2544 | kernel-source-rt:Not affected | moderate | () | CVE-2008-2544 RH:CVE-2008-2544 SMASH Issue 67385 UBUNTU:CVE-2008-2544 bnc#1189500 rh#213135 rh#449089 |
CVE-2008-3528 | kernel-source-rt:Not affected | moderate | () | BUGTRAQ:20081112 rPSA-2008-0316-1 kernel BUGTRAQ:20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components CONFIRM:wiki.rpath.com:CVE-2008-3831 CONFIRM:www.vmware.com:CVE-2009-1895 CVE-2008-3528 DSA-1681 MANDRIVA:MDVSA-2008:224 MLIST:[linux-kernel] 20080913 [PATCH 3/4] ext2: Avoid printk floods in the face of directory corruption MLIST:[linux-kernel] 20080913 [PATCH 4/4] ext3: Avoid printk floods in the face of directory corruption MLIST:[linux-kernel] 20080918 Re: [PATCH 4/4] ext3: Avoid printk floods in the face of directory corruption MLIST:[oss-security] 20080918 CVE-2008-3528 Linux kernel ext[234] directory corruption DoS RH:CVE-2008-3528 RHSA-2008:0972 RHSA-2009:0009 RHSA-2009:0326 SECUNIA:32509 SECUNIA:32709 SECUNIA:32998 SMASH Issue 59054 SUSE:SUSE-SA:2008:051 SUSE:SUSE-SA:2008:052 SUSE:SUSE-SA:2008:053 SUSE:SUSE-SA:2008:056 SUSE:SUSE-SA:2008:057 SUSE:SUSE-SR:2008:025 UBUNTU:CVE-2008-3528 UBUNTU:USN-662-1 VUPEN:ADV-2009-3316 XF:kernel-errorreporting-dos(45720) bnc#427244 http://www.debian.org/security/2008/dsa-1681 http://www.debian.org/security/2008/dsa-1687 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10852 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8642 linux.git:commit:9d9f177572d9e4eba0f2e18523b44f90dd51fe74 rh#459577 |
CVE-2008-3529 | libxml2:Analysis | critical | () | APPLE:APPLE-SA-2009-05-12 APPLE:APPLE-SA-2009-06-08-1 APPLE:APPLE-SA-2009-06-17-1 BID:31126 CERT:TA09-133A CONFIRM:sunsolve.sun.com:CVE-2008-4226 CONFIRM:sunsolve.sun.com:CVE-2009-2713 CONFIRM:support.apple.com:CVE-2006-2783 CONFIRM:support.apple.com:CVE-2008-2829 CONFIRM:support.apple.com:CVE-2008-3623 CONFIRM:support.apple.com:CVE-2009-0945 CONFIRM:support.avaya.com:CVE-2008-3529 CONFIRM:wiki.rpath.com:CVE-2008-3281 CONFIRM:xmlsoft.org:CVE-2017-16932 CVE-2008-3529 DSA-1654 EXPLOIT-DB:8798 GENTOO:GLSA-200812-06 MANDRIVA:MDVSA-2008:192 MILW0RM:8798 OVAL:oval:org.mitre.oval:def:11760 OVAL:oval:org.mitre.oval:def:6103 RH:CVE-2008-3529 RHSA-2008:0884 RHSA-2008:0886 SECTRACK:1020855 SECUNIA:31558 SECUNIA:31855 SECUNIA:31860 SECUNIA:31868 SECUNIA:31982 SECUNIA:32265 SECUNIA:32280 SECUNIA:32807 SECUNIA:32974 SECUNIA:33715 SECUNIA:33722 SECUNIA:35056 SECUNIA:35074 SECUNIA:35379 SECUNIA:36173 SECUNIA:36235 SMASH Issue 59058 SUNALERT:247346 SUNALERT:261688 SUNALERT:265329 SUSE:SUSE-SR:2008:018 UBUNTU:CVE-2008-3529 UBUNTU:USN-644-1 UBUNTU:USN-815-1 VUPEN:ADV-2008-2822 VUPEN:ADV-2009-1297 VUPEN:ADV-2009-1298 VUPEN:ADV-2009-1522 VUPEN:ADV-2009-1621 XF:libxml2-entitynames-bo(45085) bdo#498768 rh#461015 |
CVE-2008-3686 | kernel-source-rt:Analysis | moderate | () | CONFIRM:git.kernel.org:CVE-2008-3686 CVE-2008-3686 MLIST:[linux-kernel] 20080807 OOPS, ip -f inet6 route get fec0::1, linux-2.6.26, ip6_route_output, rt6_fill_node+0x175 MLIST:[linux-kernel] 20080808 Re: OOPS, ip -f inet6 route get fec0::1, linux-2.6.26, ip6_route_output, rt6_fill_node+0x175 RH:CVE-2008-3686 SECUNIA:31579 SMASH Issue 59350 UBUNTU:CVE-2008-3686 VUPEN:ADV-2008-2422 XF:linux-kernel-rt6fillnode-dos(44605) bnc#419117 |
CVE-2008-3915 | kernel-source-rt:Not affected | critical | () | BID:31133 CONFIRM:git.kernel.org:CVE-2008-3915 CVE-2008-3915 MLIST:[linux-kernel] 20080903 [patch 05/16] nfsd: fix buffer overrun decoding NFSv4 acl MLIST:[oss-security] 20080904 CVE request: kernel: nfsd: fix buffer overrun decoding NFSv4 acl MLIST:[oss-security] 20080904 Re: CVE request: kernel: nfsd: fix buffer overrun decoding NFSv4 acl RH:CVE-2008-3915 RHSA-2008:0857 SMASH Issue 59971 UBUNTU:CVE-2008-3915 XF:linux-kernel-nfsv4-bo(45055) bnc#423515 rh#461101 |
CVE-2008-4307 | kernel-source-rt:Not affected | low | () | BUGTRAQ:20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components CONFIRM:git.kernel.org:CVE-2008-4307 CONFIRM:www.kernel.org:CVE-2008-4307 CONFIRM:www.vmware.com:CVE-2009-1895 CVE-2008-4307 DSA-1787 DSA-1794 MLIST:[oss-security] 20090113 CVE-2008-4307 kernel: local denial of service in locks_remove_flock RH:CVE-2008-4307 RHSA-2009:0451 RHSA-2009:0459 RHSA-2009:0473 SMASH Issue 67590 UBUNTU:CVE-2008-4307 UBUNTU:USN-751-1 VUPEN:ADV-2009-3316 bnc#465672 http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.27.y.git%3Ba=commit%3Bh=c4d7c402b788b73dc24f1e54a57f89d3dc5eb7bc https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7728 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9233 rh#456282 |
CVE-2008-5029 | kernel-source-rt:Not affected | moderate | () | BID:32154 BID:33079 BUGTRAQ:20090101 Linux Kernel 2.6.18/2.6.24/2.6.20/2.6.22/2.6.21 denial of service exploit BUGTRAQ:20090103 Re: Linux Kernel 2.6.18/2.6.24/2.6.20/2.6.22/2.6.21 denial of service exploit BUGTRAQ:20090104 Re: Linux Kernel 2.6.18/2.6.24/2.6.20/2.6.22/2.6.21 denial of service exploit CONFIRM:kernel.org:CVE-2008-5029 CVE-2008-5029 MISC:darkircop.org:CVE-2008-5029 MLIST:[linux-netdev] 20081106 UNIX sockets kernel panic MLIST:[oss-security] 20081106 CVE request: kernel: Unix sockets kernel panic RH:CVE-2008-5029 RHSA-2009:0009 RHSA-2009:0014 RHSA-2009:0021 RHSA-2009:0053 RHSA-2009:0225 RHSA-2009:1550 SECTRACK:1021292 SECTRACK:1021511 SECUNIA:33623 SMASH Issue 68275 SREASON:4573 UBUNTU:CVE-2008-5029 XF:linux-kernel-scmdestroy-dos(46538) bnc#442364 bnc#449739 rh#470201 rh#473259 |
CVE-2008-5374 | bash:Unsupported | moderate | () | BID:32733 CVE-2008-5374 RH:CVE-2008-5374 RHSA-2011:0261 RHSA-2011:1073 SECUNIA:43365 SMASH Issue 68561 UBUNTU:CVE-2008-5374 VUPEN:ADV-2011-0414 bnc#735605 rh#475474 |
CVE-2008-5700 | kernel-source-rt:Not affected | low | () | CONFIRM:git.kernel.org:CVE-2008-5700 CONFIRM:www.kernel.org:CVE-2008-5700 CVE-2008-5700 MLIST:[oss-security] 20081209 CVE request: kernel: enforce a minimum SG_IO timeout RH:CVE-2008-5700 RHSA-2009:0053 RHSA-2009:0326 RHSA-2009:0331 SMASH Issue 68869 UBUNTU:CVE-2008-5700 XF:linux-kernel-libata-dos(47669) bnc#457896 rh#474495 |
CVE-2008-7256 | kernel-source-rt:Unsupported | moderate | () | CONFIRM:git.kernel.org:CVE-2008-7256 CONFIRM:www.kernel.org:CVE-2008-7256 CVE-2008-7256 MLIST:[oss-security] 20100527 Re: CVE request - kernel: nfsd: fix vm overcommit crash RH:CVE-2008-7256 RHSA-2010:0631 SMASH Issue 70402 UBUNTU:CVE-2008-7256 XF:kernel-shmem-dos(59224) rh#595970 |
CVE-2008-7316 | kernel-source-rt:Unsupported | low | () | CONFIRM:git.kernel.org:CVE-2008-7316 CONFIRM:github.com:CVE-2008-7316 CONFIRM:mirror.linux.org.au:CVE-2008-7316 CVE-2008-7316 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:MLIST:[oss-security] 20160124 Re: CVE Request: Linux: fuse: possible denial of service in fuse_fill_write_pages() MLIST:[oss-security] 20160124 Re: CVE Request: Linux: fuse: possible denial of service in fuse_fill_write_pages() OSS:2016/Q1/189 RH:CVE-2008-7316 SMASH Issue 161260 UBUNTU:CVE-2008-7316 bnc#963764 rh#1290642 rh#1302009 |
CVE-2009-0028 | kernel-source-rt:Unsupported | moderate | () | BID:33906 BUGTRAQ:20090516 rPSA-2009-0084-1 kernel BUGTRAQ:20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components CONFIRM:wiki.rpath.com:CVE-2009-1527 CVE-2009-0028 DSA-1787 DSA-1794 DSA-1800 L3:25666 L3:25684 MANDRIVA:MDVSA-2009:118 MISC:scary.beasts.org:CVE-2009-0028 MISC:scarybeastsecurity.blogspot.com:CVE-2009-0028 OSVDB:52204 RH:CVE-2009-0028 RHSA-2009:0326 RHSA-2009:0451 RHSA-2009:0459 SECUNIA:33758 SECUNIA:34033 SECUNIA:34680 SECUNIA:34917 SECUNIA:34962 SECUNIA:34981 SECUNIA:35011 SECUNIA:35120 SECUNIA:35121 SECUNIA:35390 SECUNIA:35394 SECUNIA:37471 SMASH Issue 27415 SUSE:SUSE-SA:2009:010 SUSE:SUSE-SA:2009:030 SUSE:SUSE-SA:2009:031 UBUNTU:CVE-2009-0028 UBUNTU:USN-751-1 bnc#465953 bnc#497597 rh#479932 |
CVE-2009-0029 | kernel-source-rt:Not affected | important | () | BID:33275 CVE-2009-0029 DSA-1749 DSA-1787 DSA-1794 FEDORA:FEDORA-2009-0816 MANDRIVA:MDVSA-2009:135 MLIST:[linux-kernel] 20090110 Re: [PATCH -v7][RFC]: mutex: implement adaptive spinning RH:CVE-2009-0029 SECUNIA:33477 SECUNIA:33674 SECUNIA:34394 SECUNIA:34981 SECUNIA:35011 SMASH Issue 27427 SUSE:SUSE-SA:2009:010 UBUNTU:CVE-2009-0029 bnc#466015 linux.git:commit:002c8976ee537724b20a5e179d9b349309438836 linux.git:commit:003d7ab479168132a2b2c6700fe682b08f08ab0c linux.git:commit:1134723e96f6e2abcf8bfd7a2d1c96fcc323ef35 linux.git:commit:17da2bd90abf428523de0fb98f7075e00e3ed42e linux.git:commit:1a94bc34768e463a93cb3751819709ab0ea80a01 linux.git:commit:1e7bfb2134dfec37ce04fb3a4ca89299e892d10c linux.git:commit:20f37034fb966a1c35894f9fe529fda0b6440101 linux.git:commit:257ac264d69017270fbc3cf5536953525db4076c linux.git:commit:26689452f5ca201add63b1b1ff0dbcf82d6885e7 linux.git:commit:2b66421995d2e93c9d1a0111acf2581f8529c6e5 linux.git:commit:2e4d0924eb0c403ce4014fa139d1d61bf2c44fee linux.git:commit:2ed7c03ec17779afb4fcfa3b8c61df61bd4879ba linux.git:commit:3480b25743cb7404928d57efeaa3d085708b04c2 linux.git:commit:362e9c07c7220c0a78c88826fc0d2bf7e4a4bb68 linux.git:commit:3a1c0fc5927f001d2c70998c08cad42ee5f64849 linux.git:commit:3cdad42884bbd95d5aa01297e8236ea1bad70053 linux.git:commit:3e0fa65f8ba4fd24b3dcfaf14d5b15eaab0fdc61 linux.git:commit:4c696ba7982501d43dea11dbbaabd2aa8a19cc42 linux.git:commit:58fd3aa288939d3097fa04505b25c2f5e6e144d1 linux.git:commit:5a8a82b1d306a325d899b67715618413657efda4 linux.git:commit:5add95d4f7cf08f6f62510f19576992912387501 linux.git:commit:64fd1de3d821659ac0a3004fd5ee1de59e64af30 linux.git:commit:6559eed8ca7db0531a207cd80be5e28cd6f213c5 linux.git:commit:66673f13c10a817e27d71434c1198a4d874e0cd3 linux.git:commit:6673e0c3fbeaed2cd08e2fd4a4aa97382d6fedb0 linux.git:commit:67605d6812691bbd2158d2f60259e0407611bc1b linux.git:commit:6a6160a7b5c27b3c38651baef92a14fa7072b3c1 linux.git:commit:7187adbf08336bd69da11d42d2542de7b1cc6957 linux.git:commit:754fe8d297bfae7b77f7ce866e2fb0c5fb186506 linux.git:commit:836f92adf121f806e9beb5b6b88bd5c9c4ea3f24 linux.git:commit:938bb9f5e840eddbf54e4f62f6c5ba9b3ae12c9d linux.git:commit:a26eab2400f0477bfac0255600552394855016f7 linux.git:commit:a5f8fa9e9ba5ef3305e147f41ad6e1e84ac1f0bd linux.git:commit:a6b42e83f249aad723589b2bdf6d1dfb2b0997c8 linux.git:commit:ae1251ab785f6da87219df8352ffdac68bba23e4 linux.git:commit:b290ebe2c46d01b742b948ce03f09e8a3efb9a92 linux.git:commit:bca268565fd18f0b36ab8fff6e1623d8dffae2b1 linux.git:commit:bdc480e3bef6eb0e7071770834cbdda7e30a5436 linux.git:commit:c4ea37c26a691ad0b7e86aa5884aab27830e95c9 linux.git:commit:c9da9f2129d6a421c32e334a83770a9e67f7feac linux.git:commit:ca013e945b1ba5828b151ee646946f1297b67a4c linux.git:commit:d4e82042c4cfa87a7d51710b71f568fe80132551 linux.git:commit:d5460c9974a321a194aded4a8c4daaac68ea8171 linux.git:commit:dbda6ac0897603f6c6dfadbbc37f9882177ec7ac linux.git:commit:dbf040d9d1cbf1ef6250bdb095c5c118950bcde8 linux.git:commit:e48fbb699f82ef1e80bd7126046394d2dc9ca7e6 linux.git:commit:e55380edf68796d75bf41391a781c68ee678587d linux.git:commit:e6d9668e119af44ae5bcd5f1197174531458afe3 linux.git:commit:ed6bb6194350dc6ae97a65dbf2d621a3dbe6bbe9 linux.git:commit:ee6a093222549ac0c72cfd296c69fa5e7d6daa34 linux.git:commit:f627a741d24f12955fa2d9f8831c3b12860635bd rh#479969 |
CVE-2009-0065 | kernel-source-rt:Not affected | critical | () | BID:33113 CONFIRM:git.kernel.org:CVE-2009-0065 CONFIRM:patchwork.ozlabs.org:CVE-2009-0065 CVE-2009-0065 HP:HPSBNS02449 L3:25685 MLIST:[oss-security] 20090105 CVE request: kernel: sctp: memory overflow when FWD-TSN chunk is received with bad stream ID RH:CVE-2009-0065 RHSA-2009:0053 RHSA-2009:0264 RHSA-2009:0331 RHSA-2009:1055 SECTRACK:1022698 SECUNIA:33854 SECUNIA:35174 SECUNIA:36191 SMASH Issue 27595 UBUNTU:CVE-2009-0065 VUPEN:ADV-2009-0029 VUPEN:ADV-2009-2193 bnc#463522 rh#478800 |
CVE-2009-0269 | kernel-source-rt:Not affected | moderate | () | BID:33412 BUGTRAQ:20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components CONFIRM:git.kernel.org:CVE-2009-0269 CONFIRM:www.kernel.org:CVE-2009-0269 CONFIRM:www.vmware.com:CVE-2009-1895 CVE-2009-0269 DSA-1749 DSA-1787 MANDRIVA:MDVSA-2009:118 MLIST:[ecryptfs-devel] 20081222 Re: [PATCH, v5] eCryptfs: check readlink result was not an error before using it RH:CVE-2009-0269 RHSA-2009:0326 RHSA-2009:0360 SECUNIA:33758 SECUNIA:34394 SECUNIA:34502 SECUNIA:34981 SECUNIA:35390 SECUNIA:35394 SECUNIA:37471 SMASH Issue 28428 SUSE:SUSE-SA:2009:010 SUSE:SUSE-SA:2009:030 SUSE:SUSE-SA:2009:031 UBUNTU:CVE-2009-0269 UBUNTU:USN-751-1 VUPEN:ADV-2009-3316 XF:linux-kernel-readlink-bo(48188) bnc#470942 http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.27.y.git%3Ba=commit%3Bh=a17d5232de7b53d34229de79ec22f4bb04adb7e4 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8169 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8944 rh#481604 |
CVE-2009-0322 | kernel-source-rt:Not affected | moderate | () | BID:33428 CONFIRM:git.kernel.org:CVE-2009-0322 CONFIRM:kernel.org:CVE-2009-0322 CVE-2009-0322 RH:CVE-2009-0322 RHSA-2009:0326 RHSA-2009:0331 RHSA-2009:0360 SECUNIA:33656 SMASH Issue 28632 UBUNTU:CVE-2009-0322 bnc#470943 rh#482866 |
CVE-2009-0342 | kernel-source-rt:Not affected | important | () | BID:33417 BID:33948 BID:33951 BUGTRAQ:20090123 Problems with syscall filtering technologies on Linux CONFIRM:git.kernel.org:CVE-2009-0834 CVE-2009-0342 CVE-2009-0834 CVE-2009-0835 L3:26832 L3:26833 MISC:scary.beasts.org:CVE-2009-0835 MISC:scarybeastsecurity.blogspot.com:CVE-2009-0343 MISC:scarybeastsecurity.blogspot.com:CVE-2009-0835 MISC:www.citi.umich.edu:CVE-2009-0343 MLIST:[linux-kernel] 20090227 Re: [PATCH 2/2] x86-64: seccomp: fix 32/64 syscall hole MLIST:[linux-kernel] 20090228 [PATCH 0/2] x86-64: 32/64 syscall arch holes MLIST:[linux-kernel] 20090228 [PATCH 1/2] x86-64: syscall-audit: fix 32/64 syscall hole MLIST:[linux-kernel] 20090228 [PATCH 2/2] x86-64: seccomp: fix 32/64 syscall hole MLIST:[oss-security] 20090302 CVE request: kernel: x86-64: seccomp: 32/64 syscall hole MLIST:[oss-security] 20090302 CVE request: kernel: x86-64: syscall-audit: 32/64 syscall hole RH:CVE-2009-0834 RH:CVE-2009-0835 RHSA-2009:0451 RHSA-2009:0459 RHSA-2009:0473 RHSA-2010:0079 SECTRACK:1022153 SECUNIA:34084 SECUNIA:35185 SMASH Issue 28688 SUSE:SUSE-SA:2009:028 UBUNTU:CVE-2009-0834 UBUNTU:CVE-2009-0835 XF:linux-kernel-auditsyscallentry-sec-bypass(49061) bnc#483819 bnc#483820 rh#487255 rh#487990 |
CVE-2009-0675 | kernel-source-rt:Unsupported | moderate | () | CONFIRM:git.kernel.org:CVE-2009-0675 CONFIRM:www.kernel.org:CVE-2009-0676 CVE-2009-0675 L3:25672 MANDRIVA:MDVSA-2009:071 MLIST:[netdev] 20090128 [PATCH] drivers/net/skfp: if !capable(CAP_NET_ADMIN): inverted logic MLIST:[oss-security] 20090220 CVE request: kernel: skfp_ioctl inverted logic flaw RH:CVE-2009-0675 RHSA-2009:0326 RHSA-2009:0360 SECUNIA:33938 SMASH Issue 30093 UBUNTU:CVE-2009-0675 bnc#478003 rh#486534 |
CVE-2009-0676 | kernel-source-rt:Not affected | low | () | BID:33846 CONFIRM:git.kernel.org:CVE-2009-0676 CONFIRM:patchwork.kernel.org:CVE-2009-0676 CVE-2009-0676 MLIST:[linux-kernel] 20090212 [PATCH] 4 bytes kernel memory disclosure in SO_BSDCOMPAT gsopt try #2 MLIST:[linux-kernel] 20090223 net: amend the fix for SO_BSDCOMPAT gsopt infoleak MLIST:[oss-security] 20090220 CVE request: kernel: memory disclosure in SO_BSDCOMPAT gsopt MLIST:[oss-security] 20090224 Re: CVE request: kernel: memory disclosure in SO_BSDCOMPAT gsopt MLIST:[oss-security] 20090302 Re: CVE request: kernel: memory disclosure in SO_BSDCOMPAT gsopt RH:CVE-2009-0676 RHSA-2009:0326 RHSA-2009:0360 RHSA-2009:0459 SECUNIA:34786 SMASH Issue 30098 SUSE:SUSE-SA:2009:021 UBUNTU:CVE-2009-0676 XF:kernel-sock-information-disclosure(48847) bnc#478002 linux.git:commit:50fee1dec5d71b8a14c1b82f2f42e16adc227f8b rh#486305 |
CVE-2009-0745 | kernel-source-rt:Not affected | moderate | () | CONFIRM:bugzilla.kernel.org:CVE-2009-0745 CONFIRM:git.kernel.org:CVE-2009-0745 CONFIRM:kernel.org:CVE-2009-0748 CVE-2009-0745 RH:CVE-2009-0745 RHSA-2009:1243 SECUNIA:36562 SMASH Issue 30440 UBUNTU:CVE-2009-0745 VUPEN:ADV-2009-0509 bnc#480860 rh#487929 |
CVE-2009-0746 | kernel-source-rt:Unsupported | moderate | () | CONFIRM:bugzilla.kernel.org:CVE-2009-0746 CONFIRM:git.kernel.org:CVE-2009-0746 CVE-2009-0746 OSVDB:52202 RH:CVE-2009-0746 RHSA-2009:1243 SMASH Issue 30446 UBUNTU:CVE-2009-0746 XF:linux-kernel-makeindexeddir-ext4-dos(48872) rh#487935 |
CVE-2009-0747 | kernel-source-rt:Unsupported | moderate | () | CONFIRM:bugzilla.kernel.org:CVE-2009-0747 CONFIRM:git.kernel.org:CVE-2009-0747 CVE-2009-0747 RH:CVE-2009-0747 RHSA-2009:1243 SMASH Issue 30450 UBUNTU:CVE-2009-0747 rh#487942 |
CVE-2009-0748 | kernel-source-rt:Unsupported | moderate | () | CONFIRM:bugzilla.kernel.org:CVE-2009-0748 CONFIRM:git.kernel.org:CVE-2009-0748 CVE-2009-0748 OSVDB:52203 RH:CVE-2009-0748 RHSA-2009:1243 SMASH Issue 30453 UBUNTU:CVE-2009-0748 rh#487945 |
CVE-2009-0778 | kernel-source-rt:Not affected | important | () | BID:34084 BUGTRAQ:20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components CONFIRM:git.kernel.org:CVE-2009-0778 CONFIRM:www.kernel.org:CVE-2010-3086 CONFIRM:www.vmware.com:CVE-2009-1895 CVE-2009-0778 MISC:git.kernel.org:/ MLIST:[oss-security] 20090311 CVE-2009-0778 kernel: rt_cache leak OVAL:oval:org.mitre.oval:def:10215 OVAL:oval:org.mitre.oval:def:7867 RH:CVE-2009-0778 RHSA-2009:0326 RHSA-2010:0079 SECTRACK:1021958 SECUNIA:33758 SECUNIA:37471 SMASH Issue 30599 UBUNTU:CVE-2009-0778 VUPEN:ADV-2009-3316 XF:linux-kernel-rtcache-dos(49199) bnc#482712 rh#485163 |
CVE-2009-0787 | kernel-source-rt:Not affected | moderate | () | BID:34216 BUGTRAQ:20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components CONFIRM:git.kernel.org:CVE-2009-0787 CONFIRM:www.kernel.org:CVE-2009-1072 CONFIRM:www.vmware.com:CVE-2009-1895 CVE-2009-0787 OSVDB:52860 RH:CVE-2009-0787 RHSA-2009:0473 SECTRACK:1022177 SECUNIA:34422 SECUNIA:35015 SMASH Issue 30644 UBUNTU:CVE-2009-0787 VUPEN:ADV-2009-0802 VUPEN:ADV-2009-3316 XF:linux-kernel-ecryptfs-information-disclosure(49355) bnc#487107 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=8faece5f906725c10e7a1f6caf84452abadbdc7b https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11068 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8319 linux.git:commit:8faece5f906725c10e7a1f6caf84452abadbdc7b rh#491254 |
CVE-2009-0834 | kernel-source-rt:Not affected | important | () | BID:33417 BID:33948 BID:33951 BUGTRAQ:20090123 Problems with syscall filtering technologies on Linux CONFIRM:git.kernel.org:CVE-2009-0834 CVE-2009-0342 CVE-2009-0834 CVE-2009-0835 L3:26832 L3:26833 MISC:scary.beasts.org:CVE-2009-0835 MISC:scarybeastsecurity.blogspot.com:CVE-2009-0343 MISC:scarybeastsecurity.blogspot.com:CVE-2009-0835 MISC:www.citi.umich.edu:CVE-2009-0343 MLIST:[linux-kernel] 20090227 Re: [PATCH 2/2] x86-64: seccomp: fix 32/64 syscall hole MLIST:[linux-kernel] 20090228 [PATCH 0/2] x86-64: 32/64 syscall arch holes MLIST:[linux-kernel] 20090228 [PATCH 1/2] x86-64: syscall-audit: fix 32/64 syscall hole MLIST:[linux-kernel] 20090228 [PATCH 2/2] x86-64: seccomp: fix 32/64 syscall hole MLIST:[oss-security] 20090302 CVE request: kernel: x86-64: seccomp: 32/64 syscall hole MLIST:[oss-security] 20090302 CVE request: kernel: x86-64: syscall-audit: 32/64 syscall hole RH:CVE-2009-0834 RH:CVE-2009-0835 RHSA-2009:0451 RHSA-2009:0459 RHSA-2009:0473 RHSA-2010:0079 SECTRACK:1022153 SECUNIA:34084 SECUNIA:35185 SMASH Issue 28688 SMASH Issue 30847 SUSE:SUSE-SA:2009:028 UBUNTU:CVE-2009-0834 UBUNTU:CVE-2009-0835 XF:linux-kernel-auditsyscallentry-sec-bypass(49061) bnc#483819 bnc#483820 rh#487255 rh#487990 |
CVE-2009-0835 | kernel-source-rt:Not affected | important | () | BID:33417 BID:33948 BID:33951 BUGTRAQ:20090123 Problems with syscall filtering technologies on Linux CONFIRM:git.kernel.org:CVE-2009-0834 CVE-2009-0342 CVE-2009-0834 CVE-2009-0835 L3:26832 L3:26833 MISC:scary.beasts.org:CVE-2009-0835 MISC:scarybeastsecurity.blogspot.com:CVE-2009-0343 MISC:scarybeastsecurity.blogspot.com:CVE-2009-0835 MISC:www.citi.umich.edu:CVE-2009-0343 MLIST:[linux-kernel] 20090227 Re: [PATCH 2/2] x86-64: seccomp: fix 32/64 syscall hole MLIST:[linux-kernel] 20090228 [PATCH 0/2] x86-64: 32/64 syscall arch holes MLIST:[linux-kernel] 20090228 [PATCH 1/2] x86-64: syscall-audit: fix 32/64 syscall hole MLIST:[linux-kernel] 20090228 [PATCH 2/2] x86-64: seccomp: fix 32/64 syscall hole MLIST:[oss-security] 20090302 CVE request: kernel: x86-64: seccomp: 32/64 syscall hole MLIST:[oss-security] 20090302 CVE request: kernel: x86-64: syscall-audit: 32/64 syscall hole RH:CVE-2009-0834 RH:CVE-2009-0835 RHSA-2009:0451 RHSA-2009:0459 RHSA-2009:0473 RHSA-2010:0079 SECTRACK:1022153 SECUNIA:34084 SECUNIA:35185 SMASH Issue 28688 SMASH Issue 30867 SUSE:SUSE-SA:2009:028 UBUNTU:CVE-2009-0834 UBUNTU:CVE-2009-0835 XF:linux-kernel-auditsyscallentry-sec-bypass(49061) bnc#483819 bnc#483820 rh#487255 rh#487990 |
CVE-2009-0859 | kernel-source-rt:Unsupported | moderate | () | BID:34020 CONFIRM:git.kernel.org:CVE-2009-0859 CONFIRM:patchwork.kernel.org:CVE-2009-0859 CVE-2009-0859 L3:25665 MLIST:[git-commits-head] 20090205 shm: fix shmctl(SHM_INFO) lockup with !CONFIG_SHMEM MLIST:[linux-kernel] 20080229 [BUG] soft lockup detected with ipcs MLIST:[linux-kernel] 20090127 [PATCH 1/2] fix shmctl(SHM_INFO) lockup with !CONFIG_SHMEM MLIST:[oss-security] 20090306 CVE request: kernel: shm: fix shmctl(SHM_INFO) lockup with !CONFIG_SHMEM RH:CVE-2009-0859 SMASH Issue 30994 UBUNTU:CVE-2009-0859 XF:linux-kernel-shmgetstat-dos(49229) bnc#482720 |
CVE-2009-0935 | kernel-source-rt:Not affected | moderate | () | BID:33624 CONFIRM:www.kernel.org:CVE-2009-0935 CVE-2009-0935 MISC:patchwork.kernel.org:MLIST:[oss-security] 20090306 CVE request: kernel: inotify local DoS MLIST:[linux-kernel] 20090131 [patch 03/43] inotify: clean up inotify_read and fix locking MLIST:[oss-security] 20090306 CVE request: kernel: inotify local DoS MLIST:[oss-security] 20090318 Re: CVE request: kernel: inotify local DoS MLIST:[oss-security] 20090319 Re: CVE request: kernel: inotify local DoS RH:CVE-2009-0935 SMASH Issue 31331 UBUNTU:CVE-2009-0935 XF:linux-kernel-inotify-read-dos(49331) bnc#482843 rh#488935 |
CVE-2009-1046 | kernel-source-rt:Unsupported | moderate | () | BID:33672 CONFIRM:www.kernel.org:CVE-2009-1046 CVE-2009-1046 L3:30864 MISC:git.kernel.org:MLIST:[oss-security] 20090212 http://www.securityfocus.com/bid/33672/info kernel issue MLIST:[linux-kernel] 20090130 [PATCH] Fix memory corruption in console selection MLIST:[linux-kernel] 20090202 Re: [PATCH] Fix memory corruption in console selection MLIST:[oss-security] 20090212 Re: http://www.securityfocus.com/bid/33672/info kernel MLIST:[oss-security] 20090212 Re: http://www.securityfocus.com/bid/33672/info kernel issue MLIST:[oss-security] 20090212 http://www.securityfocus.com/bid/33672/info kernel issue RH:CVE-2009-1046 RHSA-2009:0451 SMASH Issue 31758 UBUNTU:CVE-2009-1046 bnc#478699 rh#491787 |
CVE-2009-1072 | kernel-source-rt:Unsupported | moderate | () | BID:34205 BUGTRAQ:20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components CONFIRM:git.kernel.org:CVE-2009-1072 CONFIRM:www.kernel.org:CVE-2009-1072 CONFIRM:www.vmware.com:CVE-2009-1895 CVE-2009-1072 DSA-1800 L3:25667 MLIST:[linux-kernel] 20090311 VFS, NFS security bug? Should CAP_MKNOD and CAP_LINUX_IMMUTABLE be added to CAP_FS_MASK? MLIST:[oss-security] 20090323 CVE request: kernel: nfsd did not drop CAP_MKNOD for non-root OVAL:oval:org.mitre.oval:def:10314 OVAL:oval:org.mitre.oval:def:8382 RH:CVE-2009-1072 RHSA-2009:1081 RHSA-2009:1106 RHSA-2009:1132 SECUNIA:34422 SECUNIA:34432 SECUNIA:34786 SECUNIA:35121 SECUNIA:35185 SECUNIA:35343 SECUNIA:35390 SECUNIA:35394 SECUNIA:35656 SECUNIA:37471 SMASH Issue 31848 SUSE:SUSE-SA:2009:021 SUSE:SUSE-SA:2009:028 SUSE:SUSE-SA:2009:030 SUSE:SUSE-SA:2009:031 UBUNTU:CVE-2009-1072 UBUNTU:USN-793-1 VUPEN:ADV-2009-0802 VUPEN:ADV-2009-3316 XF:linux-kernel-capmknod-security-bypass(49356) bnc#487681 bnc#497551 rh#491572 |
CVE-2009-1192 | kernel-source-rt:Not affected | moderate | () | BID:34673 BUGTRAQ:20090516 rPSA-2009-0084-1 kernel BUGTRAQ:20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components CONFIRM:git.kernel.org:CVE-2009-1192 CONFIRM:wiki.rpath.com:CVE-2009-1527 CONFIRM:www.kernel.org:CVE-2009-1192 CONFIRM:www.vmware.com:CVE-2009-1895 CVE-2009-1192 DSA-1787 DSA-1794 L3:29691 MANDRIVA:MDVSA-2009:119 MANDRIVA:MDVSA-2009:135 MLIST:[oss-security] 20090422 CVE-2009-1192 kernel: agp: zero pages before sending to userspace RH:CVE-2009-1192 RHSA-2009:1081 RHSA-2009:1106 RHSA-2009:1132 SECUNIA:35387 SECUNIA:37351 SMASH Issue 32447 SUSE:SUSE-SA:2009:032 SUSE:SUSE-SA:2009:054 SUSE:SUSE-SA:2009:056 UBUNTU:CVE-2009-1192 UBUNTU:USN-793-1 VUPEN:ADV-2009-3316 bnc#497159 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=59de2bebabc5027f93df999d59cc65df591c3e6e http://www.debian.org/security/2009/dsa-1800 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10567 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8003 rh#497020 |
CVE-2009-1242 | kernel-source-rt:Not affected | moderate | () | BID:34331 BUGTRAQ:20090516 rPSA-2009-0084-1 kernel CONFIRM:git.kernel.org:CVE-2009-1242 CONFIRM:patchwork.kernel.org:CVE-2009-1242 CONFIRM:wiki.rpath.com:CVE-2009-1527 CONFIRM:www.kernel.org:CVE-2009-1242 CONFIRM:www.kernel.org:CVE-2009-1243 CVE-2009-1242 DSA-1787 DSA-1800 FEDORA:FEDORA-2009-5356 MISC:vigilance.fr:CVE-2009-1242 MISC:www.globalsecuritymag.com:CVE-2009-1242 MLIST:[oss-security] 20090401 CVE request: kernel: KVM: VMX: Dont allow uninhibited access to EFER on i386 RH:CVE-2009-1242 SECUNIA:34478 SECUNIA:34981 SECUNIA:35120 SECUNIA:35121 SECUNIA:35226 SECUNIA:35387 SECUNIA:35394 SECUNIA:35656 SMASH Issue 32664 SUSE:SUSE-SA:2009:031 SUSE:SUSE-SA:2009:032 UBUNTU:CVE-2009-1242 UBUNTU:USN-793-1 VUPEN:ADV-2009-0924 XF:linux-kernel-eferlme-dos(49594) bnc#492760 rh#502109 |
CVE-2009-1336 | kernel-source-rt:Not affected | moderate | () | BID:34390 CONFIRM:git.kernel.org:CVE-2009-1336 CVE-2009-1336 MLIST:[oss-security] 20090406 CVE request: kernel: NFS: Fix an Oops in encode_lookup() MLIST:[oss-security] 20090417 Re: CVE request: kernel: NFS: Fix an Oops in encode_lookup() RH:CVE-2009-1336 RHSA-2009:0473 RHSA-2009:1024 RHSA-2009:1077 SECTRACK:1022176 SECUNIA:35160 SECUNIA:35324 SMASH Issue 59462 UBUNTU:CVE-2009-1336 bnc#492766 rh#494074 |
CVE-2009-1337 | kernel-source-rt:Not affected | moderate | () | BID:34405 BUGTRAQ:20100625 VMSA-2010-0010 ESX 3.5 third party update for Service Console kernel CONFIRM:git.kernel.org:CVE-2009-1337 CONFIRM:patchwork.kernel.org:CVE-2009-1337 CONFIRM:www.kernel.org:CVE-2009-1337 CVE-2009-1337 L3:25669 MLIST:[linux-kernel] 20090225 Re: [PATCH 2/2] exit_notify: kill the wrong capable(CAP_KILL) check MLIST:[oss-security] 20090407 CVE request: kernel: exit_notify: kill the wrong capable(CAP_KILL) check MLIST:[oss-security] 20090417 Re: CVE request: kernel: exit_notify: kill the wrong capable(CAP_KILL) check RH:CVE-2009-1337 RHSA-2009:0451 RHSA-2009:0473 RHSA-2009:1024 RHSA-2009:1077 RHSA-2009:1550 SECTRACK:1022141 SMASH Issue 59473 SMASH Issue 83323 UBUNTU:CVE-2009-1337 bnc#492768 rh#493771 |
CVE-2009-1338 | kernel-source-rt:Unsupported | moderate | () | CONFIRM:git.kernel.org:CVE-2009-1338 CONFIRM:www.kernel.org:CVE-2009-1338 CVE-2009-1338 MLIST:[linux-kernel] 20080723 Re: [PATCH 1/2] signals: kill(-1) should only signal processes in the same namespace MLIST:[oss-security] 20090416 CVE request: kernel: 'kill sig -1' must only apply to caller's PID namespace MLIST:[oss-security] 20090417 Re: CVE request: kernel: 'kill sig -1' must only apply to caller's PID namespace MLIST:[oss-security] 20090421 Re: CVE request: kernel: 'kill sig -1' must only apply to caller's PID namespace RH:CVE-2009-1338 RHSA-2009:1081 SMASH Issue 59481 UBUNTU:CVE-2009-1338 XF:kernel-killsomethinginfo-security-bypass(50386) bnc#495430 rh#496031 |
CVE-2009-1385 | kernel-source-rt:Not affected | important | () | BID:35185 BUGTRAQ:20090724 rPSA-2009-0111-1 kernel BUGTRAQ:20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components BUGTRAQ:20100625 VMSA-2010-0010 ESX 3.5 third party update for Service Console kernel CONFIRM:git.kernel.org:CVE-2009-1385 CONFIRM:sourceforge.net:CVE-2009-1385 CONFIRM:wiki.rpath.com:CVE-2009-1895 CONFIRM:www.intel.com:CVE-2009-1385 CONFIRM:www.kernel.org:CVE-2009-1385 CONFIRM:www.vmware.com:CVE-2009-1895 CVE-2009-1385 DSA-1844 DSA-1865 FEDORA:FEDORA-2009-6768 FEDORA:FEDORA-2009-6846 FEDORA:FEDORA-2009-6883 MANDRIVA:MDVSA-2009:135 MANDRIVA:MDVSA-2009:148 MISC:git.kernel.org:/ MLIST:[oss-security] 20090603 CVE-2009-1385 kernel: e1000_clean_rx_irq() denial of service OSVDB:54892 OVAL:oval:org.mitre.oval:def:11598 OVAL:oval:org.mitre.oval:def:11681 OVAL:oval:org.mitre.oval:def:8340 RH:CVE-2009-1385 RHSA-2009:1132 RHSA-2009:1157 RHSA-2009:1193 RHSA-2009:1550 RHSA-2010:0019 RHSA-2010:0020 RHSA-2010:0041 RHSA-2010:0053 RHSA-2010:0079 RHSA-2010:0095 RHSA-2010:0111 RHSA-2010:0882 SECUNIA:35265 SECUNIA:35566 SECUNIA:35623 SECUNIA:35656 SECUNIA:35847 SECUNIA:36051 SECUNIA:36131 SECUNIA:36327 SECUNIA:37471 SMASH Issue 41551 SUSE:SUSE-SA:2009:038 UBUNTU:CVE-2009-1385 UBUNTU:USN-793-1 VUPEN:ADV-2009-3316 bnc#509822 bnc#567678 rh#502981 rh#552126 |
CVE-2009-1388 | kernel-source-rt:Unsupported | moderate | () | BID:35559 BUGTRAQ:20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components CONFIRM:bugzilla.redhat.com CONFIRM:www.vmware.com:CVE-2009-1895 CVE-2009-1388 MLIST:[oss-security] 20090702 CVE-2009-1388 kernel: do_coredump() vs ptrace_start() deadlock OSVDB:55679 RH:CVE-2009-1388 RHSA-2009:1193 RHSA-2013:1029 RHSA-2013:1411 RHSA-2013:1605 RHSA-2013:1784 RHSA-2013:1785 RHSA-2013:1786 RHSA-2014:0029 RHSA-2014:0245 RHSA-2014:0254 RHSA-2014:0400 RHSA-2014:0401 RHSA-2014:1290 RHSA-2014:1291 RHSA-2014:1904 RHSA-2014:1995 RHSA-2015:0034 SECUNIA:36131 SECUNIA:37471 SMASH Issue 59627 UBUNTU:CVE-2009-1388 VUPEN:ADV-2009-3316 bnc#518716 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8625 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8680 rh#1006505 rh#1007545 rh#108711 rh#504263 rh#958618 rh#978485 |
CVE-2009-1389 | kernel-source-rt:Not affected | important | () | BID:35281 BUGTRAQ:20090724 rPSA-2009-0111-1 kernel BUGTRAQ:20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components CONFIRM:git.kernel.org:CVE-2009-1389 CONFIRM:support.avaya.com:CVE-2009-1389 CONFIRM:support.citrix.com:CVE-2009-1389 CONFIRM:wiki.rpath.com:CVE-2009-1895 CONFIRM:www.vmware.com:CVE-2009-1895 CVE-2009-1389 DSA-1844 DSA-1865 FEDORA:FEDORA-2009-6768 FEDORA:FEDORA-2009-6846 FEDORA:FEDORA-2009-6883 MANDRIVA:MDVSA-2009:148 MLIST:[linux-kernel] 20090608 [Security, resend] Instant crash with rtl8169 and large packets MLIST:[linux-netdev] 20090214 r8169: instant crash if receiving packet larger than MTU MLIST:[oss-security] 20090610 CVE-2009-1389 kernel: r8169: fix crash when large packets are received RH:CVE-2009-1389 RHSA-2009:1157 RHSA-2009:1193 RHSA-2009:1211 RHSA-2009:1457 RHSA-2009:1469 RHSA-2010:0019 RHSA-2010:0020 RHSA-2010:0041 RHSA-2010:0053 RHSA-2010:0079 RHSA-2010:0095 RHSA-2010:0111 SECTRACK:1023507 SECUNIA:37298 SMASH Issue 41552 SUSE:SUSE-SA:2009:038 SUSE:SUSE-SA:2010:031 UBUNTU:CVE-2009-1389 UBUNTU:USN-807-1 VUPEN:ADV-2009-3316 VUPEN:ADV-2010-0219 VUPEN:ADV-2010-1857 XF:linux-kernel-rtl8169nic-dos(51051) bnc#567678 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=fdd7b4c3302c93f6833e338903ea77245eb510b4 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10415 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8108 rh#504726 rh#550907 |
CVE-2009-1439 | kernel-source-rt:Not affected | important | () | BID:34453 CONFIRM:git.kernel.org:CVE-2009-1439 CVE-2009-1439 FEDORA:FEDORA-2009-5383 L3:25671 MISC:blog.fefe.de:CVE-2009-1439 MISC:git.kernel.org:MLIST:[oss-security] 20090514 Update - Re: CVE request? buffer overflow in CIFS in 2.6.* MISC:xorl.wordpress.com:CVE-2009-1439 MLIST:[linux-cifs-client] 20090406 [PATCH] cifs: Fix insufficient memory allocation for nativeFileSystem field MLIST:[oss-security] 20090405 CVE request? buffer overflow in CIFS in 2.6.* MLIST:[oss-security] 20090407 Re: CVE request? buffer overflow in CIFS in 2.6.* RH:CVE-2009-1439 RHSA-2009:1081 RHSA-2009:1106 RHSA-2009:1211 SECUNIA:35217 SMASH Issue 38960 UBUNTU:CVE-2009-1439 bnc#498824 rh#494275 |
CVE-2009-1630 | kernel-source-rt:Unsupported | moderate | () | BID:34934 BUGTRAQ:20090724 rPSA-2009-0111-1 kernel BUGTRAQ:20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components CONFIRM:bugzilla.linux-nfs.org:CVE-2009-1630 CONFIRM:wiki.rpath.com:CVE-2009-1895 CONFIRM:www.vmware.com:CVE-2009-1895 CVE-2009-1630 DSA-1809 DSA-1844 DSA-1865 MANDRIVA:MDVSA-2009:135 MANDRIVA:MDVSA-2009:148 MLIST:[linux-nfs] 20090509 [NFS] [PATCH] nfs: Fix NFS v4 client handling of MAY_EXEC in nfs_permission. MLIST:[nfsv4] 20061116 Status of execute permissions in NFSv4 ACLs ? MLIST:[nfsv4] 20061117 [Patch] Re: Status of execute permissions in NFSv4 ACLs ? MLIST:[oss-security] 20090513 CVE request: kernel: problem with NFS v4 client handling of MAY_EXEC in nfs_permission OVAL:oval:org.mitre.oval:def:8543 OVAL:oval:org.mitre.oval:def:9990 RH:CVE-2009-1630 RHSA-2009:1106 RHSA-2009:1132 RHSA-2009:1157 SECUNIA:35106 SECUNIA:35298 SECUNIA:35394 SECUNIA:35656 SECUNIA:35847 SECUNIA:36051 SECUNIA:36327 SECUNIA:37471 SMASH Issue 60277 SUSE:SUSE-SA:2009:031 SUSE:SUSE-SA:2009:038 UBUNTU:CVE-2009-1630 UBUNTU:USN-793-1 VUPEN:ADV-2009-1331 VUPEN:ADV-2009-3316 bnc#1175689 rh#500297 |
CVE-2009-1633 | kernel-source-rt:Not affected | important | () | BID:34612 CONFIRM:git.kernel.org:CVE-2009-1633 CONFIRM:www.kernel.org:CVE-2009-1633 CVE-2009-1633 MISC:git.kernel.org:MLIST:[oss-security] 20090514 Update - Re: CVE request? buffer overflow in CIFS in 2.6.* MISC:git.kernel.org:MLIST:[oss-security] 20090515 Re: Re: Update - Re: CVE request? buffer overflow in CIFS in 2.6.* MLIST:[oss-security] 20090429 Re: CVE request? buffer overflow in CIFS in 2.6.* MLIST:[oss-security] 20090514 Re: Update - Re: CVE request? buffer overflow in CIFS in 2.6.* MLIST:[oss-security] 20090514 Update - Re: CVE request? buffer overflow in CIFS in 2.6.* MLIST:[oss-security] 20090515 Re: Re: Update - Re: CVE request? buffer overflow in CIFS in 2.6.* RH:CVE-2009-1633 RHSA-2009:1106 RHSA-2009:1157 RHSA-2009:1211 SMASH Issue 40786 UBUNTU:CVE-2009-1633 rh#496572 |
CVE-2009-1883 | kernel-source-rt:Not affected | moderate | () | CVE-2009-1883 DSA-1929 MLIST:[oss-security] 20090915 CVE-2009-1883 kernel: missing capability check in z90crypt MLIST:[oss-security] 20090915 Re: CVE-2009-1883 kernel: missing capability check in z90crypt RH:CVE-2009-1883 RHSA-2009:1438 SECUNIA:37105 SMASH Issue 60795 UBUNTU:CVE-2009-1883 UBUNTU:USN-852-1 bnc#539879 rh#505983 |
CVE-2009-1895 | kernel-source-rt:Not affected | important | () | BID:35647 BUGTRAQ:20090724 rPSA-2009-0111-1 kernel BUGTRAQ:20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components BUGTRAQ:20100625 VMSA-2010-0010 ESX 3.5 third party update for Service Console kernel CONFIRM:bugs.launchpad.net:CVE-2009-1895 CONFIRM:git.kernel.org:CVE-2009-1895 CONFIRM:patchwork.kernel.org:CVE-2009-1895 CONFIRM:wiki.rpath.com:CVE-2009-1895 CONFIRM:www.kernel.org:CVE-2009-1895 CONFIRM:www.vmware.com:CVE-2009-1895 CVE-2009-1895 DSA-1844 DSA-1845 FEDORA:FEDORA-2009-8144 FEDORA:FEDORA-2009-8264 MANDRIVA:MDVSA-2011:051 MISC:blog.cr0.org:CVE-2009-1895 OSVDB:55807 RH:CVE-2009-1895 RHSA-2009:1193 RHSA-2009:1438 RHSA-2009:1540 RHSA-2009:1550 RHSA-2010:0079 SECUNIA:35801 SECUNIA:36045 SECUNIA:36051 SECUNIA:36054 SECUNIA:36116 SECUNIA:36131 SECUNIA:36759 SMASH Issue 55773 UBUNTU:CVE-2009-1895 UBUNTU:USN-807-1 VUPEN:ADV-2009-1866 VUPEN:ADV-2009-3316 bnc#521427 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f9fabcb58a6d26d6efde842d1703ac7cfa9427b6 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11768 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7826 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9453 rh#511171 |
CVE-2009-1961 | kernel-source-rt:Not affected | moderate | () | BID:35143 CONFIRM:git.kernel.org:CVE-2009-1961 CVE-2009-1961 DSA-1844 MANDRIVA:MDVSA-2009:135 MANDRIVA:MDVSA-2009:148 MISC:git.kernel.org:MLIST:[oss-security] 20090530 Re: CVE request: kernel: splice local denial of service MLIST:[oss-security] 20090529 CVE request: kernel: splice local denial of service MLIST:[oss-security] 20090530 Re: CVE request: kernel: splice local denial of service MLIST:[oss-security] 20090602 Re: CVE request: kernel: splice local denial of service MLIST:[oss-security] 20090603 Re: CVE request: kernel: splice local denial of service RH:CVE-2009-1961 RHSA-2009:1157 SECTRACK:1022307 SECUNIA:35390 SECUNIA:35394 SECUNIA:35656 SECUNIA:35847 SECUNIA:36051 SMASH Issue 60936 SUSE:SUSE-SA:2009:030 SUSE:SUSE-SA:2009:031 SUSE:SUSE-SA:2009:038 UBUNTU:CVE-2009-1961 UBUNTU:USN-793-1 bnc#495065 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=7bfac9ecf0585962fe13584f5cf526d8c8e76f17 rh#503474 |
CVE-2009-2406 | kernel-source-rt:Not affected | moderate | () | BID:35851 BUGTRAQ:20090728 [RISE-2009002] Linux eCryptfs parse_tag_11_packet Literal Data Buffer Overflow Vulnerability BUGTRAQ:20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components CONFIRM:git.kernel.org:CVE-2009-2406 CONFIRM:www.kernel.org:CVE-2009-2406 CONFIRM:www.vmware.com:CVE-2009-1895 CVE-2009-2406 DSA-1844 DSA-1845 FEDORA:FEDORA-2009-8144 FEDORA:FEDORA-2009-8264 MANDRIVA:MDVSA-2011:029 MISC:git.kernel.org:/ MISC:risesecurity.org:CVE-2009-2406 OVAL:oval:org.mitre.oval:def:10072 OVAL:oval:org.mitre.oval:def:8246 RH:CVE-2009-2406 RHSA-2009:1193 SECTRACK:1022663 SECUNIA:35985 SECUNIA:36045 SECUNIA:36051 SECUNIA:36054 SECUNIA:36116 SECUNIA:36131 SECUNIA:37471 SMASH Issue 61656 SUSE:SUSE-SR:2009:015 UBUNTU:CVE-2009-2406 UBUNTU:USN-807-1 VUPEN:ADV-2009-2041 VUPEN:ADV-2009-3316 bnc#523719 rh#512861 rh#512885 |
CVE-2009-2407 | kernel-source-rt:Not affected | moderate | () | BID:35850 BUGTRAQ:20090728 [RISE-2009003] Linux eCryptfs parse_tag_3_packet Encrypted Key Buffer Overflow Vulnerability BUGTRAQ:20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components CONFIRM:git.kernel.org:CVE-2009-2407 CONFIRM:www.kernel.org:CVE-2009-2406 CONFIRM:www.vmware.com:CVE-2009-1895 CVE-2009-2407 DSA-1844 DSA-1845 FEDORA:FEDORA-2009-8144 FEDORA:FEDORA-2009-8264 MISC:git.kernel.org:/ MISC:risesecurity.org:CVE-2009-2407 OVAL:oval:org.mitre.oval:def:11255 OVAL:oval:org.mitre.oval:def:8057 RH:CVE-2009-2407 RHSA-2009:1193 SECUNIA:35985 SECUNIA:36045 SECUNIA:36051 SECUNIA:36054 SECUNIA:36116 SECUNIA:36131 SECUNIA:37471 SMASH Issue 61659 SUSE:SUSE-SR:2009:015 UBUNTU:CVE-2009-2407 UBUNTU:USN-807-1 VUPEN:ADV-2009-2041 VUPEN:ADV-2009-3316 bnc#523719 rh#512861 rh#512885 |
CVE-2009-2691 | kernel-source-rt:Not affected | moderate | () | BID:36019 CONFIRM:git.kernel.org:CVE-2009-2691 CVE-2009-2691 FEDORA:FEDORA-2009-9044 MLIST:[linux-kernel] 20090623 [PATCH 0/1] mm_for_maps: simplify, use ptrace_may_access() MLIST:[linux-kernel] 20090623 [PATCH 1/1] mm_for_maps: simplify, use ptrace_may_access() MLIST:[linux-kernel] 20090710 [PATCH 1/2] mm_for_maps: shift down_read(mmap_sem) to the caller MLIST:[linux-kernel] 20090710 [PATCH 2/2] mm_for_maps: take ->cred_guard_mutex to fix the race MLIST:[oss-security] 20090811 CVE-2009-2691 kernel: /proc/$pid/maps visible during initial setuid ELF loading RH:CVE-2009-2691 RHSA-2009:1540 SECUNIA:36265 SECUNIA:36501 SMASH Issue 62136 UBUNTU:CVE-2009-2691 VUPEN:ADV-2009-2246 XF:linux-kernel-mmformaps-info-disclosure(52401) bnc#529919 rh#516171 |
CVE-2009-2698 | kernel-source-rt:Not affected | important | () | BID:36108 BUGTRAQ:20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components BUGTRAQ:20100625 VMSA-2010-0010 ESX 3.5 third party update for Service Console kernel CONFIRM:git.kernel.org:CVE-2009-2698 CONFIRM:support.avaya.com:CVE-2009-1389 CONFIRM:www.kernel.org:CVE-2009-2698 CONFIRM:www.vmware.com:CVE-2009-1895 CVE-2009-2698 DSA-1872 MANDRIVA:MDVSA-2011:051 MLIST:[oss-security] 20090825 CVE-2009-2698 kernel: udp socket NULL ptr dereference OVAL:oval:org.mitre.oval:def:11514 OVAL:oval:org.mitre.oval:def:8557 OVAL:oval:org.mitre.oval:def:9142 RH:CVE-2009-2698 RHSA-2009:1222 RHSA-2009:1223 RHSA-2009:1233 RHSA-2009:1457 RHSA-2009:1469 SECTRACK:1022761 SECUNIA:23073 SECUNIA:36430 SECUNIA:36510 SECUNIA:37105 SECUNIA:37298 SECUNIA:37471 SMASH Issue 40473 SUSE:SUSE-SA:2009:046 UBUNTU:CVE-2009-2698 UBUNTU:USN-852-1 VUPEN:ADV-2009-3316 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1e0c14f49d6b393179f423abbac47f85618d3d46 rh#518034 |
CVE-2009-2767 | kernel-source-rt:Unsupported | important | () | CONFIRM:git.kernel.org:CVE-2009-2767 CVE-2009-2767 MLIST:[linux-kernel] 20090804 Re: [PATCH] posix-timers: fix oops in clock_nanosleep() with CLOCK_MONOTONIC_RAW MLIST:[oss-security] 20090806 CVE request: kernel: clock_nanosleep() with CLOCK_MONOTONIC_RAW NULL pointer dereference RH:CVE-2009-2767 SECUNIA:36200 SMASH Issue 62189 UBUNTU:CVE-2009-2767 VUPEN:ADV-2009-2197 XF:linux-kernel-clocknanosleep-priv-escalation(52317) bnc#529555 rh#515867 |
CVE-2009-2848 | kernel-source-rt:Not affected | moderate | () | CVE-2009-2848 DSA-1872 DSA-1928 L3:29692 MLIST:[linux-kernel] 20090801 [PATCH v2] execve: must clear current->clear_child_tid MLIST:[oss-security] 20090804 CVE request - kernel: execve: must clear current->clear_child_tid MLIST:[oss-security] 20090805 Re: CVE request - kernel: execve: must clear current->clear_child_tid RH:CVE-2009-2848 RHSA-2009:1239 RHSA-2009:1243 RHSA-2009:1438 RHSA-2009:1466 RHSA-2009:1550 SECUNIA:35983 SMASH Issue 62262 SMASH Issue 84071 UBUNTU:CVE-2009-2848 XF:kernel-execve-dos(52899) bnc#527865 rh#515423 |
CVE-2009-2903 | kernel-source-rt:Not affected | important | () | BID:36379 CONFIRM:git.kernel.org:CVE-2009-2903 CVE-2009-2903 DSA-1915 DSA-1928 MANDRIVA:MDVSA-2009:329 MISC:git.kernel.org:/ MLIST:[oss-security] 20090914 CVE-2009-2903 kernel: appletalk: denial of service when handling IP tunnelled over DDP datagrams MLIST:[oss-security] 20090914 Re: CVE-2009-2903 kernel: appletalk: denial of service when handling IP tunnelled over DDP datagrams MLIST:[oss-security] 20090917 Re: CVE-2009-2903 kernel: appletalk: denial of service when handling IP tunnelled over DDP datagrams RH:CVE-2009-2903 SECUNIA:36707 SECUNIA:37105 SECUNIA:37909 SMASH Issue 62330 SUSE:SUSE-SA:2009:061 SUSE:SUSE-SA:2009:064 SUSE:SUSE-SA:2010:012 SUSE:SUSE-SA:2010:013 UBUNTU:CVE-2009-2903 UBUNTU:USN-852-1 linux.git:commit:ffcfb8db540ff879c2a85bf7e404954281443414 rh#522331 |
CVE-2009-2908 | kernel-source-rt:Not affected | moderate | () | BID:36639 CONFIRM:git.kernel.org:CVE-2009-2908 CVE-2009-2908 DSA-1915 DSA-1928 FEDORA:FEDORA-2009-10525 MISC:bugs.launchpad.net:CVE-2009-2908 MISC:git.kernel.org:/ MLIST:[oss-security] 20091006 Kernel ecryptfs CVE id (CVE-2009-2908) MLIST:[security-announce] 20100303 VMSA-2010-0004 ESX Service Console and vMA third party updates OVAL:oval:org.mitre.oval:def:10216 OVAL:oval:org.mitre.oval:def:6992 RH:CVE-2009-2908 RHSA-2009:1548 SECUNIA:37075 SECUNIA:37105 SECUNIA:38794 SECUNIA:38834 SMASH Issue 62339 UBUNTU:CVE-2009-2908 UBUNTU:USN-852-1 VUPEN:ADV-2010-0528 XF:kernel-ecryptfs-dos(53693) bnc#545274 rh#527534 |
CVE-2009-2909 | kernel-source-rt:Unsupported | important | () | BID:36635 CONFIRM:git.kernel.org:CVE-2009-2909 CONFIRM:www.kernel.org:CVE-2009-3623 CVE-2009-2909 DSA-1915 DSA-1928 DSA-1929 FEDORA:FEDORA-2009-10525 MISC:git.kernel.org:/ MLIST:[linux-kernel] 20091002 [071/136] net ax25: Fix signed comparison in the sockopt handler MLIST:[oss-security] 20091007 More kernel CVE info (CVE-2009-2909) RH:CVE-2009-2909 SECUNIA:37075 SECUNIA:37351 SMASH Issue 62340 SUSE:SUSE-SA:2009:054 SUSE:SUSE-SA:2009:056 UBUNTU:CVE-2009-2909 UBUNTU:USN-864-1 rh#528887 |
CVE-2009-2910 | kernel-source-rt:Unsupported | low | () | BID:36576 CONFIRM:git.kernel.org:CVE-2009-2910 CONFIRM:support.avaya.com:CVE-2009-4272 CONFIRM:www.kernel.org:CVE-2009-3638 CVE-2009-2910 DSA-1915 DSA-1928 FEDORA:FEDORA-2009-10525 MLIST:[linux-kernel] 20091001 [tip:x86/urgent] x86: Don't leak 64-bit kernel register values to 32-bit processes MLIST:[oss-security] 20091001 CVE Request (kernel) MLIST:[oss-security] 20091001 Re: CVE Request (kernel) MLIST:[oss-security] 20091002 Re: CVE Request (kernel) MLIST:[oss-security] 20091009 Re: CVE Request (kernel) OVAL:oval:org.mitre.oval:def:10823 OVAL:oval:org.mitre.oval:def:7359 RH:CVE-2009-2910 RHSA-2009:1540 RHSA-2009:1671 RHSA-2010:0046 RHSA-2010:0095 SECUNIA:36927 SECUNIA:37075 SECUNIA:37351 SMASH Issue 62344 SUSE:SUSE-SA:2009:054 SUSE:SUSE-SA:2009:056 SUSE:SUSE-SA:2010:012 UBUNTU:CVE-2009-2910 UBUNTU:USN-864-1 bnc#1175785 http://git.kernel.org/?p=linux/kernel/git/x86/linux-2.6-tip.git%3Ba=commit%3Bh=24e35800cdc4350fc34e2bed37b608a9e13ab3b6 rh#526788 |
CVE-2009-3234 | kernel-source-rt:Analysis | moderate | () | BID:36423 CVE-2009-3234 MLIST:[linux-kernel] 20090916 [patch 15/45] perf_counter: Fix buffer overflow in perf_copy_attr() MLIST:[oss-security] 20090916 CVE request: kernel: perf_counter: Fix buffer overflow in perf_copy_attr() MLIST:[oss-security] 20090917 Re: CVE request: kernel: perf_counter: Fix buffer overflow in perf_copy_attr() RH:CVE-2009-3234 SMASH Issue 62795 UBUNTU:CVE-2009-3234 bnc#541652 |
CVE-2009-3286 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2009-3286 CVE-2009-3286 DSA-1915 DSA-1928 DSA-1929 MLIST:[oss-security] 20090921 CVE request: kernel: issue with O_EXCL creates on NFSv4 RH:CVE-2009-3286 RHSA-2009:1548 SMASH Issue 62879 UBUNTU:CVE-2009-3286 bnc#541648 rh#524520 |
CVE-2009-3288 | kernel-source-rt:Analysis | moderate | () | CVE-2009-3288 MLIST:[linux-kernel] 20090902 [BUG] 2.6.31-rc8 readcd Oops MLIST:[linux-kernel] 20090903 [PATCH] sg: fix oops in the error path in sg_build_indirect() MLIST:[oss-security] 20090904 CVE request: kernel: NULL pointer dereference in sg_build_indirect() RH:CVE-2009-3288 SMASH Issue 62883 UBUNTU:CVE-2009-3288 bnc#537139 |
CVE-2009-3547 | kernel-source-rt:Not affected | important | () | BID:36901 BUGTRAQ:20100625 VMSA-2010-0010 ESX 3.5 third party update for Service Console kernel CONFIRM:git.kernel.org:CVE-2009-3547 CONFIRM:www.kernel.org:CVE-2009-3547 CVE-2009-3547 DSA-1927 DSA-1928 DSA-1929 FEDORA:FEDORA-2009-11038 MANDRIVA:MDVSA-2009:329 MISC:git.kernel.org:/ MLIST:[linux-kernel] 20091014 fs/pipe.c null pointer dereference MLIST:[linux-kernel] 20091021 Re: [PATCH v4 1/1]: fs: pipe.c null pointer dereference + really sign off + unmangled diffs MLIST:[oss-security] 20091103 CVE-2009-3547 kernel: fs: pipe.c null pointer dereference MLIST:[security-announce] 20100303 VMSA-2010-0004 ESX Service Console and vMA third party updates OVAL:oval:org.mitre.oval:def:11513 OVAL:oval:org.mitre.oval:def:7608 OVAL:oval:org.mitre.oval:def:9327 RH:CVE-2009-3547 RHSA-2009:1540 RHSA-2009:1541 RHSA-2009:1548 RHSA-2009:1550 RHSA-2009:1587 RHSA-2009:1588 RHSA-2009:1672 SECUNIA:37351 SECUNIA:38017 SECUNIA:38794 SECUNIA:38834 SMASH Issue 40897 SUSE:SUSE-SA:2009:054 SUSE:SUSE-SA:2009:056 SUSE:SUSE-SA:2010:001 SUSE:SUSE-SA:2010:012 UBUNTU:CVE-2009-3547 UBUNTU:USN-864-1 VUPEN:ADV-2010-0528 rh#530490 |
CVE-2009-3556 | kernel-source-rt:Not affected | low | () | CONFIRM:support.avaya.com:CVE-2009-4272 CVE-2009-3556 MLIST:[oss-security] 20100120 CVE-2009-3556 kernel: qla2xxx NPIV vport management pseudofiles are world writable OVAL:oval:org.mitre.oval:def:6744 OVAL:oval:org.mitre.oval:def:9738 RH:CVE-2009-3556 RHSA-2010:0046 RHSA-2010:0095 SMASH Issue 63348 SUSE:SUSE-SA:2010:019 UBUNTU:CVE-2009-3556 XF:kernel-qla2xxx-security-bypass(55809) bnc#572193 rh#537177 |
CVE-2009-3559 | perl:Already fixed | important | () | APPLE:APPLE-SA-2010-03-29-1 APPLE:APPLE-SA-2016-03-21-1 APPLE:APPLE-SA-2016-03-21-2 APPLE:APPLE-SA-2016-03-21-3 APPLE:APPLE-SA-2016-03-21-5 APPLE:APPLE-SA-2016-05-16-4 APPLE:APPLE-SA-2016-07-18-1 APPLE:APPLE-SA-2016-07-18-2 APPLE:APPLE-SA-2016-07-18-3 APPLE:APPLE-SA-2016-07-18-4 APPLE:APPLE-SA-2016-07-18-6 APPLE:APPLE-SA-2016-09-20 BID:100503 BID:100514 BID:100861 BID:103144 BID:103415 BID:103782 BID:103796 BID:103846 BID:103848 BID:103954 BID:104222 BID:104764 BID:104765 BID:104768 BID:104773 BID:104774 BID:104775 BID:104780 BID:104782 BID:105117 BID:105118 BID:105126 BID:105587 BID:105590 BID:105591 BID:105597 BID:105601 BID:105602 BID:105608 BID:105615 BID:105617 BID:105619 BID:105622 BID:105624 BID:105635 BID:105637 BID:105647 BID:105656 BID:105658 BID:106619 BID:106622 BID:106625 BID:106626 BID:106627 BID:106628 BID:67121 BID:69257 BID:70142 BID:74073 BID:74075 BID:74078 BID:74081 BID:74085 BID:74095 BID:74112 BID:76157 BID:76187 BID:76282 BID:76289 BID:76291 BID:79091 BID:82307 BID:82990 BID:84220 BID:84223 BID:84271 BID:85572 BID:85576 BID:85801 BID:86957 BID:90876 BID:91067 BID:91068 BID:91081 BID:91566 BID:91787 BID:91869 BID:93132 BID:93287 BID:93604 BID:93685 BID:93687 BID:93697 BID:93711 BID:93718 BID:93728 BID:93744 BID:94371 BID:94377 BID:94925 BID:95019 BID:95131 BID:95429 BID:95849 BID:96389 BID:96392 BID:96409 BID:96410 BID:96434 BID:96435 BID:96436 BID:97102 BID:97725 BID:97742 BID:97763 BID:97765 BID:97776 BID:97791 BID:97812 BID:97818 BID:97831 BID:97848 BID:97849 BID:97851 BID:99046 BUGTRAQ:20140925 LSE Leading Security Experts GmbH - LSE-2014-06-10 - Perl CORE - Deep Recursion Stack Overflow BUGTRAQ:20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities CISCO:20160927 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: September 2016 CONFIRM:access.redhat.com:CVE-2014-0114 CONFIRM:access.redhat.com:CVE-2014-3577 CONFIRM:access.redhat.com:CVE-2015-0293 CONFIRM:access.redhat.com:CVE-2015-3456 CONFIRM:advisories.mageia.org:CVE-2014-0114 CONFIRM:advisories.mageia.org:CVE-2014-4330 CONFIRM:bto.bluecoat.com:CVE-2016-1950 CONFIRM:bto.bluecoat.com:CVE-2016-3191 CONFIRM:bto.bluecoat.com:CVE-2016-7052 CONFIRM:bugs.eclipse.org:CVE-2018-12539 CONFIRM:bugs.exim.org:CVE-2015-8381 CONFIRM:bugs.exim.org:CVE-2015-8382 CONFIRM:bugs.jython.org:CVE-2016-4000 CONFIRM:bugs.launchpad.net:CVE-2015-8866 CONFIRM:bugs.launchpad.net:CVE-2015-8867 CONFIRM:bugs.php.net:CVE-2015-8866 CONFIRM:bugs.php.net:CVE-2015-8867 CONFIRM:bugs.php.net:CVE-2015-8878 CONFIRM:bugs.php.net:CVE-2016-3141 CONFIRM:bugs.php.net:CVE-2016-4070 CONFIRM:bugzilla.mozilla.org:CVE-2016-1950 CONFIRM:bugzilla.mozilla.org:CVE-2016-1955 CONFIRM:bugzilla.mozilla.org:CVE-2016-1956 CONFIRM:bugzilla.mozilla.org:CVE-2016-1959 CONFIRM:bugzilla.mozilla.org:CVE-2016-1967 CONFIRM:bugzilla.mozilla.org:CVE-2016-1968 CONFIRM:bugzilla.mozilla.org:CVE-2016-1969 CONFIRM:bugzilla.mozilla.org:CVE-2016-1970 CONFIRM:bugzilla.mozilla.org:CVE-2016-1971 CONFIRM:bugzilla.mozilla.org:CVE-2016-1972 CONFIRM:bugzilla.mozilla.org:CVE-2016-1973 CONFIRM:bugzilla.mozilla.org:CVE-2016-1975 CONFIRM:bugzilla.mozilla.org:CVE-2016-1976 CONFIRM:bugzilla.redhat.com:CVE-2015-7559 CONFIRM:bugzilla.redhat.com:CVE-2016-9583 CONFIRM:cert-portal.siemens.com:/productcert/pdf/ssa-412672.pdf CONFIRM:codereview.chromium.org:CVE-2016-1675 CONFIRM:codereview.chromium.org:CVE-2016-1676 CONFIRM:codereview.chromium.org:CVE-2016-1677 CONFIRM:codereview.chromium.org:CVE-2016-1678 CONFIRM:codereview.chromium.org:CVE-2016-1679 CONFIRM:codereview.chromium.org:CVE-2016-1680 CONFIRM:codereview.chromium.org:CVE-2016-1681 CONFIRM:codereview.chromium.org:CVE-2016-1682 CONFIRM:codereview.chromium.org:CVE-2016-1685 CONFIRM:codereview.chromium.org:CVE-2016-1686 CONFIRM:codereview.chromium.org:CVE-2016-1687 CONFIRM:codereview.chromium.org:CVE-2016-1688 CONFIRM:codereview.chromium.org:CVE-2016-1689 CONFIRM:codereview.chromium.org:CVE-2016-1691 CONFIRM:codereview.chromium.org:CVE-2016-1692 CONFIRM:codereview.chromium.org:CVE-2016-1693 CONFIRM:codereview.chromium.org:CVE-2016-1694 CONFIRM:codereview.chromium.org:CVE-2016-1701 CONFIRM:commons.apache.org:CVE-2014-0114 CONFIRM:crbug.com:CVE-2016-1672 CONFIRM:crbug.com:CVE-2016-1673 CONFIRM:crbug.com:CVE-2016-1674 CONFIRM:crbug.com:CVE-2016-1675 CONFIRM:crbug.com:CVE-2016-1676 CONFIRM:crbug.com:CVE-2016-1677 CONFIRM:crbug.com:CVE-2016-1678 CONFIRM:crbug.com:CVE-2016-1679 CONFIRM:crbug.com:CVE-2016-1680 CONFIRM:crbug.com:CVE-2016-1681 CONFIRM:crbug.com:CVE-2016-1682 CONFIRM:crbug.com:CVE-2016-1683 CONFIRM:crbug.com:CVE-2016-1684 CONFIRM:crbug.com:CVE-2016-1685 CONFIRM:crbug.com:CVE-2016-1686 CONFIRM:crbug.com:CVE-2016-1687 CONFIRM:crbug.com:CVE-2016-1688 CONFIRM:crbug.com:CVE-2016-1689 CONFIRM:crbug.com:CVE-2016-1690 CONFIRM:crbug.com:CVE-2016-1691 CONFIRM:crbug.com:CVE-2016-1692 CONFIRM:crbug.com:CVE-2016-1693 CONFIRM:crbug.com:CVE-2016-1694 CONFIRM:crbug.com:CVE-2016-1695 CONFIRM:curl.haxx.se:CVE-2016-0755 CONFIRM:curl.haxx.se:CVE-2016-9586 CONFIRM:curl.haxx.se:CVE-2018-1000121 CONFIRM:developer.mozilla.org:CVE-2016-1950 CONFIRM:git.gnome.org:CVE-2016-1683 CONFIRM:git.gnome.org:CVE-2016-1684 CONFIRM:git.gnupg.org:CVE-2017-9526 CONFIRM:git.php.net:CVE-2015-8382 CONFIRM:git.php.net:CVE-2015-8866 CONFIRM:git.php.net:CVE-2015-8867 CONFIRM:git.php.net:CVE-2016-3141 CONFIRM:git.savannah.gnu.org:CVE-2014-9746 CONFIRM:git.savannah.gnu.org:CVE-2014-9747 CONFIRM:github.com:CVE-2013-7330 CONFIRM:github.com:CVE-2014-2058 CONFIRM:github.com:CVE-2014-2059 CONFIRM:github.com:CVE-2014-2061 CONFIRM:github.com:CVE-2014-2062 CONFIRM:github.com:CVE-2014-2063 CONFIRM:github.com:CVE-2014-2064 CONFIRM:github.com:CVE-2014-2065 CONFIRM:github.com:CVE-2014-2066 CONFIRM:github.com:CVE-2014-2067 CONFIRM:github.com:CVE-2014-2068 CONFIRM:github.com:CVE-2016-1182 CONFIRM:github.com:CVE-2016-4979 CONFIRM:github.com:CVE-2016-9389 CONFIRM:github.com:CVE-2016-9394 CONFIRM:github.com:CVE-2016-9583 CONFIRM:github.com:CVE-2016-9586 CONFIRM:github.com:CVE-2016-9840 CONFIRM:github.com:CVE-2016-9841 CONFIRM:github.com:CVE-2016-9842 CONFIRM:github.com:CVE-2016-9843 CONFIRM:github.com:CVE-2017-1000071 CONFIRM:github.com:CVE-2017-14735 CONFIRM:googlechromereleases.blogspot.com:CVE-2016-1695 CONFIRM:h20566.www2.hpe.com:CVE-2016-0763 CONFIRM:h20566.www2.hpe.com:CVE-2016-2014 CONFIRM:h20566.www2.hpe.com:CVE-2016-2183 CONFIRM:h20566.www2.hpe.com:CVE-2016-5388 CONFIRM:h20566.www2.hpe.com:CVE-2016-5773 CONFIRM:h20566.www2.hpe.com:CVE-2016-6306 CONFIRM:h20566.www2.hpe.com:CVE-2016-8518 CONFIRM:h20566.www2.hpe.com:CVE-2017-5787 CONFIRM:hg.mozilla.org:CVE-2016-1975 CONFIRM:hg.python.org:CVE-2016-4000 CONFIRM:httpd.apache.org:CVE-2016-4979 CONFIRM:issues.apache.org:CVE-2014-0114 CONFIRM:issues.apache.org:CVE-2015-1832 CONFIRM:issues.apache.org:CVE-2015-7559 CONFIRM:issues.apache.org:CVE-2016-1000031 CONFIRM:jenkins.io:CVE-2017-1000403 CONFIRM:kb.juniper.net:CVE-2015-3209 CONFIRM:kb.juniper.net:CVE-2016-7052 CONFIRM:kb.pulsesecure.net:CVE-2016-6306 CONFIRM:kc.mcafee.com:CVE-2016-6306 CONFIRM:mariadb.com:CVE-2015-2571 CONFIRM:metacpan.org:CVE-2014-4330 CONFIRM:nodejs.org:CVE-2016-7099 CONFIRM:nodesecurity.io:CVE-2013-7454 CONFIRM:nodesecurity.io:CVE-2014-9772 CONFIRM:nodesecurity.io:CVE-2015-8315 CONFIRM:nodesecurity.io:CVE-2015-8854 CONFIRM:nodesecurity.io:CVE-2015-8855 CONFIRM:nodesecurity.io:CVE-2015-8856 CONFIRM:nodesecurity.io:CVE-2015-8858 CONFIRM:nodesecurity.io:CVE-2015-8859 CONFIRM:nodesecurity.io:CVE-2015-8860 CONFIRM:nodesecurity.io:CVE-2015-8862 CONFIRM:nodesecurity.io:CVE-2016-4055 CONFIRM:php.net:CVE-2016-3142 CONFIRM:pivotal.io:CVE-2018-1258 CONFIRM:rwkbp.makekb.com:CVE-2015-8965 CONFIRM:security-tracker.debian.org:CVE-2016-1181 CONFIRM:security-tracker.debian.org:CVE-2016-1182 CONFIRM:security.netapp.com:CVE-2014-0114 CONFIRM:security.netapp.com:CVE-2015-2575 CONFIRM:security.netapp.com:CVE-2016-1000031 CONFIRM:security.netapp.com:CVE-2016-1182 CONFIRM:security.netapp.com:CVE-2016-4979 CONFIRM:security.netapp.com:CVE-2016-9843 CONFIRM:security.netapp.com:CVE-2017-10388 CONFIRM:security.netapp.com:CVE-2017-5645 CONFIRM:security.netapp.com:CVE-2018-1305 CONFIRM:security.netapp.com:CVE-2018-2973 CONFIRM:security.netapp.com:CVE-2019-2435 CONFIRM:support.apple.com:CVE-2009-0689 CONFIRM:support.apple.com:CVE-2016-1950 CONFIRM:support.apple.com:CVE-2016-4073 CONFIRM:support.apple.com:CVE-2016-4616 CONFIRM:support.apple.com:CVE-2016-4653 CONFIRM:support.apple.com:CVE-2016-7582 CONFIRM:support.apple.com:CVE-2017-13873 CONFIRM:support.apple.com:CVE-2017-13877 CONFIRM:support.apple.com:CVE-2017-6464 CONFIRM:support.f5.com:CVE-2015-8854 CONFIRM:support.f5.com:CVE-2016-2178 CONFIRM:support.hpe.com:CVE-2016-6306 CONFIRM:support.hpe.com:CVE-2016-7052 CONFIRM:support.hpe.com:CVE-2018-2940 CONFIRM:support.hpe.com:CVE-2018-2973 CONFIRM:svn.apache.org:CVE-2012-6153 CONFIRM:svn.apache.org:CVE-2015-1832 CONFIRM:vcs.pcre.org:CVE-2015-8382 CONFIRM:vcs.pcre.org:CVE-2015-8395 CONFIRM:www-01.ibm.com:CVE-2014-0114 CONFIRM:www-01.ibm.com:CVE-2014-3022 CONFIRM:www-01.ibm.com:CVE-2015-1832 CONFIRM:www-01.ibm.com:CVE-2016-3191 CONFIRM:www-01.ibm.com:CVE-2016-7052 CONFIRM:www.apache.org:CVE-2016-4979 CONFIRM:www.huawei.com:CVE-2016-6306 CONFIRM:www.ibm.com:CVE-2014-0963 CONFIRM:www.ibm.com:CVE-2018-1656 CONFIRM:www.lsexperts.de:CVE-2014-4330 CONFIRM:www.mozilla.org:CVE-2016-1950 CONFIRM:www.mozilla.org:CVE-2016-1955 CONFIRM:www.mozilla.org:CVE-2016-1956 CONFIRM:www.mozilla.org:CVE-2016-1959 CONFIRM:www.mozilla.org:CVE-2016-1967 CONFIRM:www.mozilla.org:CVE-2016-1968 CONFIRM:www.mozilla.org:CVE-2016-1969 CONFIRM:www.mozilla.org:CVE-2016-1973 CONFIRM:www.mozilla.org:CVE-2016-1976 CONFIRM:www.oracle.com:CVE-2014-0114 CONFIRM:www.oracle.com:CVE-2014-4271 CONFIRM:www.oracle.com:CVE-2014-6564 CONFIRM:www.oracle.com:CVE-2015-0437 CONFIRM:www.oracle.com:CVE-2015-2568 CONFIRM:www.oracle.com:CVE-2015-2579 CONFIRM:www.oracle.com:CVE-2015-4879 CONFIRM:www.oracle.com:CVE-2015-8391 CONFIRM:www.oracle.com:CVE-2016-0778 CONFIRM:www.oracle.com:CVE-2016-2802 CONFIRM:www.oracle.com:CVE-2016-4957 CONFIRM:www.oracle.com:CVE-2016-5240 CONFIRM:www.oracle.com:CVE-2016-5477 CONFIRM:www.oracle.com:CVE-2016-6302 CONFIRM:www.oracle.com:CVE-2016-6304 CONFIRM:www.oracle.com:CVE-2016-7039 CONFIRM:www.oracle.com:CVE-2016-7154 CONFIRM:www.oracle.com:CVE-2016-8296 CONFIRM:www.oracle.com:CVE-2017-10365 CONFIRM:www.oracle.com:CVE-2017-3456 CONFIRM:www.oracle.com:CVE-2017-3626 CONFIRM:www.oracle.com:CVE-2017-3636 CONFIRM:www.oracle.com:CVE-2017-5689 CONFIRM:www.oracle.com:CVE-2017-5709 CONFIRM:www.oracle.com:CVE-2017-5715 CONFIRM:www.oracle.com:CVE-2017-5753 CONFIRM:www.oracle.com:CVE-2017-6074 CONFIRM:www.oracle.com:CVE-2018-18223 CONFIRM:www.oracle.com:CVE-2018-2639 CONFIRM:www.oracle.com:CVE-2018-2819 CONFIRM:www.oracle.com:CVE-2018-3081 CONFIRM:www.oracle.com:CVE-2018-3125 CONFIRM:www.pcre.org:CVE-2015-2325 CONFIRM:www.php.net:CVE-2009-3558 CONFIRM:www.php.net:CVE-2016-9935 CONFIRM:www.php.net:CVE-2016-9936 CONFIRM:www.splunk.com:CVE-2016-6304 CONFIRM:www.tenable.com:CVE-2016-4055 CONFIRM:www.tenable.com:CVE-2016-7052 CONFIRM:www.tenable.com:CVE-2016-8625 CONFIRM:www.tenable.com:CVE-2016-9260 CONFIRM:www.tenable.com:CVE-2016-9261 CONFIRM:www.vmware.com:CVE-2014-0114 CONFIRM:www.vmware.com:CVE-2014-8371 CONFIRM:x-stream.github.io:CVE-2013-7285 CVE-2009-3559 CVE-2012-6153 CVE-2013-7285 CVE-2013-7451 CVE-2013-7452 CVE-2013-7453 CVE-2013-7454 CVE-2014-0114 CVE-2014-0245 CVE-2014-3540 CVE-2014-4172 CVE-2014-4330 CVE-2014-4651 CVE-2014-7192 CVE-2014-9745 CVE-2014-9746 CVE-2014-9747 CVE-2014-9772 CVE-2015-0405 CVE-2015-0423 CVE-2015-0433 CVE-2015-0438 CVE-2015-0439 CVE-2015-0441 CVE-2015-0498 CVE-2015-0499 CVE-2015-0500 CVE-2015-0501 CVE-2015-0503 CVE-2015-0505 CVE-2015-0506 CVE-2015-0507 CVE-2015-0508 CVE-2015-0511 CVE-2015-0852 CVE-2015-1832 CVE-2015-2325 CVE-2015-2326 CVE-2015-2566 CVE-2015-2567 CVE-2015-2568 CVE-2015-2571 CVE-2015-2573 CVE-2015-2575 CVE-2015-2576 CVE-2015-2613 CVE-2015-5125 CVE-2015-5127 CVE-2015-5128 CVE-2015-5129 CVE-2015-5130 CVE-2015-5131 CVE-2015-5132 CVE-2015-5134 CVE-2015-5328 CVE-2015-5539 CVE-2015-5540 CVE-2015-5541 CVE-2015-5544 CVE-2015-5545 CVE-2015-5551 CVE-2015-5552 CVE-2015-5553 CVE-2015-5554 CVE-2015-5555 CVE-2015-5556 CVE-2015-5557 CVE-2015-5558 CVE-2015-5559 CVE-2015-5560 CVE-2015-5561 CVE-2015-5564 CVE-2015-5565 CVE-2015-5566 CVE-2015-7559 CVE-2015-7940 CVE-2015-8315 CVE-2015-8381 CVE-2015-8382 CVE-2015-8383 CVE-2015-8384 CVE-2015-8385 CVE-2015-8386 CVE-2015-8387 CVE-2015-8388 CVE-2015-8389 CVE-2015-8390 CVE-2015-8391 CVE-2015-8392 CVE-2015-8393 CVE-2015-8394 CVE-2015-8395 CVE-2015-8854 CVE-2015-8855 CVE-2015-8856 CVE-2015-8857 CVE-2015-8858 CVE-2015-8859 CVE-2015-8860 CVE-2015-8861 CVE-2015-8862 CVE-2015-8878 CVE-2015-8965 CVE-2015-9251 CVE-2016-0635 CVE-2016-0755 CVE-2016-1000031 CVE-2016-1181 CVE-2016-1182 CVE-2016-1672 CVE-2016-1673 CVE-2016-1674 CVE-2016-1675 CVE-2016-1676 CVE-2016-1677 CVE-2016-1678 CVE-2016-1679 CVE-2016-1680 CVE-2016-1681 CVE-2016-1682 CVE-2016-1683 CVE-2016-1684 CVE-2016-1685 CVE-2016-1686 CVE-2016-1687 CVE-2016-1688 CVE-2016-1689 CVE-2016-1690 CVE-2016-1691 CVE-2016-1692 CVE-2016-1693 CVE-2016-1694 CVE-2016-1695 CVE-2016-1950 CVE-2016-1955 CVE-2016-1956 CVE-2016-1959 CVE-2016-1967 CVE-2016-1968 CVE-2016-1969 CVE-2016-1970 CVE-2016-1971 CVE-2016-1972 CVE-2016-1973 CVE-2016-1975 CVE-2016-1976 CVE-2016-2178 CVE-2016-2515 CVE-2016-2537 CVE-2016-3141 CVE-2016-3142 CVE-2016-4000 CVE-2016-4055 CVE-2016-4070 CVE-2016-4612 CVE-2016-4619 CVE-2016-4979 CVE-2016-5483 CVE-2016-5501 CVE-2016-5538 CVE-2016-5605 CVE-2016-5608 CVE-2016-5610 CVE-2016-5611 CVE-2016-5613 CVE-2016-5616 CVE-2016-5617 CVE-2016-5684 CVE-2016-6814 CVE-2016-9389 CVE-2016-9392 CVE-2016-9583 CVE-2016-9586 CVE-2016-9840 CVE-2016-9841 CVE-2016-9842 CVE-2017-0379 CVE-2017-13745 CVE-2017-14229 CVE-2017-14735 CVE-2017-15095 CVE-2017-16012 CVE-2017-3308 CVE-2017-3309 CVE-2017-3329 CVE-2017-3453 CVE-2017-3454 CVE-2017-3456 CVE-2017-3461 CVE-2017-3462 CVE-2017-3463 CVE-2017-3464 CVE-2017-3468 CVE-2017-3600 CVE-2017-9526 CVE-2018-1000121 CVE-2018-12539 CVE-2018-1258 CVE-2018-1517 CVE-2018-1656 CVE-2018-2767 CVE-2018-2797 CVE-2018-2815 CVE-2018-2825 CVE-2018-2826 CVE-2018-2909 CVE-2018-2938 CVE-2018-2940 CVE-2018-2941 CVE-2018-2952 CVE-2018-2964 CVE-2018-2972 CVE-2018-2973 CVE-2018-3005 CVE-2018-3055 CVE-2018-3085 CVE-2018-3086 CVE-2018-3087 CVE-2018-3088 CVE-2018-3089 CVE-2018-3090 CVE-2018-3091 CVE-2018-3127 CVE-2018-3134 CVE-2018-3136 CVE-2018-3139 CVE-2018-3149 CVE-2018-3150 CVE-2018-3169 CVE-2018-3180 CVE-2018-3183 CVE-2018-3209 CVE-2018-3211 CVE-2018-3214 CVE-2018-3287 CVE-2018-3288 CVE-2018-3289 CVE-2018-3290 CVE-2018-3291 CVE-2018-3292 CVE-2018-3293 CVE-2018-3294 CVE-2018-3295 CVE-2018-3296 CVE-2018-3297 CVE-2018-3298 CVE-2019-2422 CVE-2019-2426 CVE-2019-2449 CVE-2019-2455 CVE-2019-2481 CVE-2019-2482 CVE-2019-2503 CVE-2019-2507 CVE-2019-2510 CVE-2019-2513 CVE-2019-2528 CVE-2019-2529 CVE-2019-2530 CVE-2019-2531 CVE-2019-2532 CVE-2019-2533 CVE-2019-2534 CVE-2019-2535 CVE-2019-2536 CVE-2019-2537 CVE-2019-2539 CVE-2019-2540 CVE-2024-2466 D:CVE-2015-2301 D:CVE-2015-2571 D:CVE-2015-2573 D:CVE-2015-2575 D:CVE-2015-2576 D:CVE-2015-5557 D:CVE-2015-5558 D:CVE-2015-5559 D:CVE-2015-5560 D:CVE-2015-5561 D:CVE-2015-5562 D:CVE-2015-5563 D:CVE-2015-5564 D:CVE-2015-5565 D:CVE-2015-8386 D:CVE-2015-8387 D:CVE-2015-8388 D:CVE-2015-8389 D:CVE-2015-8390 D:CVE-2015-8391 D:CVE-2015-8392 D:CVE-2015-8393 D:CVE-2015-8394 D:CVE-2015-8395 D:CVE-2016-1674 D:CVE-2016-1682 D:CVE-2016-1694 D:CVE-2016-1695 D:CVE-2016-1950 D:CVE-2016-1970 D:CVE-2016-1973 D:CVE-2016-2178 D:CVE-2016-3141 D:CVE-2016-4055 D:CVE-2016-5608 D:CVE-2016-5610 D:CVE-2016-9586 D:CVE-2017-9526 D:CVE-2018-1517 D:CVE-2018-1656 D:CVE-2018-3297 D:CVE-2018-3298 D:CVE-2022-2590 DEBIAN:DSA-3959 DEBIAN:DSA-4136 DEBIAN:DSA-4268 DEBIAN:DSA-4281 DEBIAN:DSA-4341 DSA-2940 DSA-3229 DSA-3311 DSA-3370 DSA-3392 DSA-3417 DSA-3455 DSA-3510 DSA-3520 DSA-3590 DSA-3605 DSA-3621 DSA-3673 DSA-3688 DSA-3834 DSA-3880 DSA-3893 DSA-3944 DSA-4136 DSA-4281 DSA-5378 EXPLOIT-DB:37852 EXPLOIT-DB:37854 EXPLOIT-DB:37855 EXPLOIT-DB:37856 EXPLOIT-DB:37857 EXPLOIT-DB:37859 EXPLOIT-DB:37861 FEDORA:FEDORA-2014-11453 FEDORA:FEDORA-2014-9380 FEDORA:FEDORA-2015-16104 FEDORA:FEDORA-2015-16105 FEDORA:FEDORA-2015-16106 FEDORA:FEDORA-2015-7d95466eda FEDORA:FEDORA-2015-992342e82f FEDORA:FEDORA-2015-decbab7c9f FEDORA:FEDORA-2015-eb896290d3 FEDORA:FEDORA-2016-3fa315a5dd FEDORA:FEDORA-2016-55137a3adb FEDORA:FEDORA-2016-57bebab3b6 FEDORA:FEDORA-2016-5a141de5d9 FREEBSD:FreeBSD-SA-16:26 FULLDISC:20140925 LSE Leading Security Experts GmbH - LSE-2014-06-10 - Perl CORE - Deep Recursion Stack Overflow FULLDISC:20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities FULLDISC:20160706 CVE-2016-4979: HTTPD webserver - X509 Client certificate based authentication can be bypassed when HTTP/2 is used [vs] FULLDISC:20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities GENTOO:GLSA-201507-19 GENTOO:GLSA-201605-06 GENTOO:GLSA-201607-02 GENTOO:GLSA-201607-07 GENTOO:GLSA-201607-09 GENTOO:GLSA-201610-02 GENTOO:GLSA-201612-16 GENTOO:GLSA-201612-27 GENTOO:GLSA-201701-47 GENTOO:GLSA-201701-56 GENTOO:GLSA-201701-68 GENTOO:GLSA-201710-28 GLSA-201908-24 GLSA-202007-54 HP:HPSBGN03041 HP:HPSBMU03090 HP:HPSBST03160 IBM Security Bulletin 0713459 (Cognos Business Intelligence) IBM Security Bulletin 0713487 (Rational Collaborative Lifecycle Management) IBM Security Bulletin 0715641 (Cognos Business Intelligence) IBM Security Bulletin 0715721 (Agile Lifecycle Manager) IBM Security Bulletin 0716285 (Cognos TM1) IBM Security Bulletin 0716289 (Cognos Insight) IBM Security Bulletin 0717693 (Tivoli Monitoring V6) IBM Security Bulletin 0717727 (Tivoli Monitoring V6) IBM Security Bulletin 0717895 (Rational Business Developer) IBM Security Bulletin 0718381 (Platform Symphony) IBM Security Bulletin 0718421 (InfoSphere Guardium Data Redaction) IBM Security Bulletin 0718447 (Cognos Planning) IBM Security Bulletin 0718949 (Cloud Manager with Openstack) IBM Security Bulletin 0719163 (Rational Reporting for Development Intelligence) IBM Security Bulletin 0719165 (Rational Insight) IBM Security Bulletin 0720115 (Spectrum Conductor with Spark) IBM Security Bulletin 0728577 (Content Classification) IBM Security Bulletin 0729341 (ILOG CPLEX Optimization Studio) IBM Security Bulletin 0729343 (Decision Optimization Center) IBM Security Bulletin 0729607 (WebSphere Application Server) IBM Security Bulletin 0735319 (Tivoli System Automation Application Manager) IBM Security Bulletin 0735477 (Spectrum Conductor) IBM Security Bulletin 0737281 (Application Delivery Intelligence) IBM Security Bulletin 0738853 (Tivoli Monitoring V6) IBM Security Bulletin 0739057 (Sterling Connect:Direct for Microsoft Windows) IBM Security Bulletin 0739549 (Sterling Connect:Direct File Agent) IBM Security Bulletin 0739701 (Sterling Connect:Direct FTP+) IBM Security Bulletin 0739763 (Sterling Connect:Direct for UNIX) IBM Security Bulletin 0743351 (Workload Scheduler) IBM Security Bulletin 0792275 (Tivoli Netcool/Impact) IBM Security Bulletin 2015806 (Runtimes for Java Technology) IBM Security Bulletin 2016406 (Decision Optimization Center) IBM Security Bulletin 2016663 (Tivoli Netcool OMNIbus) IBM Security Bulletin 2016776 (Content Collector) IBM Security Bulletin 2016781 (Content Collector for SAP Applications) IBM Security Bulletin 2016827 (MessageSight) IBM Security Bulletin 2017431 (PureApplication System) IBM Security Bulletin 2017432 (PureApplication System) IBM Security Bulletin 2017449 (Web Experience Factory) IBM Security Bulletin 2017554 (Rational Software Architect) IBM Security Bulletin 715641 (Cognos Business Intelligence Server) IBM Security Bulletin 717121 (Cognos Controller) IBM Security Bulletin 717125 (MQ Appliance) IBM Security Bulletin 719933 (Tivoli Application Dependency Discovery Manager) IBM Security Bulletin 720173 (Transformation Extender) IBM Security Bulletin 725491 (DB2 for Linux, UNIX and Windows) IBM Security Bulletin 726009 (DataPower Gateways) IBM Security Bulletin 728399 (WebSphere Service Registry and Repository) IBM Security Bulletin 728567 (Algo Credit Manager) IBM Security Bulletin 728607 (PureApplication System) IBM Security Bulletin 729116 (Spectrum Protect Plus) IBM Security Bulletin 729699 (QRadar SIEM) IBM Security Bulletin 729745 (WebSphere Application Server Patterns) IBM Security Bulletin 730083 (Rational ClearCase) IBM Security Bulletin 730311 (Cognos Command Center) IBM Security Bulletin 730799 (Spectrum Control Standard Edition) IBM Security Bulletin 730909 (AIX family) IBM Security Bulletin 731323 (Financial Transaction Manager) IBM Security Bulletin 731325 (Financial Transaction Manager) IBM Security Bulletin 731329 (i) IBM Security Bulletin 731331 (Financial Transaction Manager) IBM Security Bulletin 731337 (Financial Transaction Manager) IBM Security Bulletin 731339 (Financial Transaction Manager) IBM Security Bulletin 731419 (Rational Software Architect Designer) IBM Security Bulletin 731507 (Rational Software Architect Design Manager) IBM Security Bulletin 731615 (Process Designer) IBM Security Bulletin 731641 (InfoSphere Guardium Data Redaction) IBM Security Bulletin 731875 (FileNet System Monitor) IBM Security Bulletin 732375 (Initiate Master Data Service) IBM Security Bulletin 732455 (Rational Performance Tester) IBM Security Bulletin 732457 (Rational Service Tester for SOA Quality) IBM Security Bulletin 732723 (Tivoli Application Dependency Discovery Manager) IBM Security Bulletin 732753 (Agile Lifecycle Manager) IBM Security Bulletin 732785 (Security Guardium) IBM Security Bulletin 732846 (Spectrum Symphony) IBM Security Bulletin 732850 (App Connect Enterprise) IBM Security Bulletin 732896 (Planning Analytics) IBM Security Bulletin 732932 (SPSS Statistics) IBM Security Bulletin 733068 (Liberty for Java for Bluemix) IBM Security Bulletin 733457 (Tivoli Netcool/OMNIbus) IBM Security Bulletin 733543 (Tivoli Netcool/Impact) IBM Security Bulletin 733845 (Integration Designer) IBM Security Bulletin 733857 (Rational DOORS Web Access) IBM Security Bulletin 733869 (DataPower Gateways) IBM Security Bulletin 733905 (Rational Application Developer for WebSphere Software) IBM Security Bulletin 734161 (WebSphere Application Server in Cloud) IBM Security Bulletin 734595 (Rational Build Forge) IBM Security Bulletin 735325 (Tivoli System Automation for Multiplatforms) IBM Security Bulletin 735421 (MessageSight) IBM Security Bulletin 735481 (Rational Directory Server) IBM Security Bulletin 735515 (Rational Host On-Demand) IBM Security Bulletin 735541 (Rational Method Composer) IBM Security Bulletin 735551 (Runtimes for Java Technology) IBM Security Bulletin 735807 (Tivoli Monitoring V6) IBM Security Bulletin 737495 (Cloud App Management) IBM Security Bulletin 737775 (Web Experience Factory) IBM Security Bulletin 737813 (Content Collector for SAP Applications) IBM Security Bulletin 738337 (Monitoring) IBM Security Bulletin 738347 (Rational Publishing Engine) IBM Security Bulletin 738633 (WebSphere Service Registry and Repository) IBM Security Bulletin 738729 (Installation Manager) IBM Security Bulletin 738743 (Rational Developer for i) IBM Security Bulletin 738905 (Cognos Insight) IBM Security Bulletin 738907 (Cognos TM1) IBM Security Bulletin 738985 (WebSphere MQ) IBM Security Bulletin 738997 (MQ) IBM Security Bulletin 739183 (http://www.ibm.com/support/docview.wss?uid=ibm10739183) IBM Security Bulletin 739227 (Cloud Orchestrator) IBM Security Bulletin 739231 (Algo Credit Manager) IBM Security Bulletin 739251 (Decision Optimization Center) IBM Security Bulletin 739261 (Monitoring) IBM Security Bulletin 739387 (Spectrum Protect for Virtual Environments) IBM Security Bulletin 739455 (Spectrum Protect Snapshot) IBM Security Bulletin 739941 (Content Collector) IBM Security Bulletin 739985 (WebSphere Application Server Patterns) IBM Security Bulletin 740269 (Notes) IBM Security Bulletin 740383 (Sterling Connect:Direct Browser User Interface) IBM Security Bulletin 740419 (Security Access Manager Appliance) IBM Security Bulletin 740447 (Operational Decision Manager) IBM Security Bulletin 740467 (Tivoli Storage Manager FastBack) IBM Security Bulletin 740673 (Control Center) IBM Security Bulletin 741745 (Tivoli Composite Application Manager (ITCAM) for Transactions) IBM Security Bulletin 742369 (Security SiteProtector System) IBM Security Bulletin 742729 (QRadar SIEM) IBM Security Bulletin 743071 (Rational Asset Analyzer) IBM Security Bulletin 743149 (Financial Transaction Manager) IBM Security Bulletin 743157 (Financial Transaction Manager) IBM Security Bulletin 743193 (Spectrum Protect) IBM Security Bulletin 743961 (Rational Publishing Engine) IBM Security Bulletin 744823 (Rational Collaborative Lifecycle Management) IBM Security Bulletin 787583 (API Connect) IBM Security Bulletin 787833 (AIX family) IBM Security Bulletin 788277 (WebSphere Cast Iron) IBM Security Bulletin 789805 (WebSphere MQ) IBM Security Bulletin 791171 (Rational DOORS Web Access) IBM Security Bulletin 791855 (WebSphere eXtreme Scale) IBM Security Bulletin 791861 (WebSphere DataPower XC10 Appliance) IBM Security Bulletin 792239 (Cloud Manager with Openstack) IBM Security Bulletin T1027807 (AIX family) JVN:JVN#03188560 JVN:JVN#65044642 JVNDB:JVNDB-2016-000096 JVNDB:JVNDB-2016-000097 L3:42159 L3:44989 L3:45334 L3:45906 L3:53225 MANDRIVA:MDVSA-2009:302 MANDRIVA:MDVSA-2014:095 MANDRIVA:MDVSA-2015:136 MANDRIVA:MDVSA-2015:227 MISC:access.redhat.com:CVE-2014-0245 MISC:access.redhat.com:MLIST:[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations MISC:blog.diniscruz.com:CVE-2013-7285 MISC:blogs.gentoo.org:CVE-2016-9399 MISC:bugs.exim.org:CVE-2015-2325 MISC:bugs.exim.org:CVE-2015-2326 MISC:bugs.launchpad.net:MLIST:[oss-security] 20150911 CVE Request: 2 FreeType issues MISC:bugs.php.net:CVE-2009-3559 MISC:bugzilla.redhat.com:CVE-2014-0245 MISC:bugzilla.redhat.com:CVE-2016-9586 MISC:curl.haxx.se MISC:curl.haxx.se:OSS:2018/Q1/235 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:developer.mozilla.org:CVE-2016-1979 MISC:eprint.iacr.org:CVE-2016-2178 MISC:eprint.iacr.org:CVE-2017-0379 MISC:exchange.xforce.ibmcloud.com:CVE-2014-4172 MISC:fortiguard.com:CVE-2015-2325 MISC:fortiguard.com:CVE-2015-2326 MISC:git.gnupg.org:CVE-2017-0379 MISC:git.openssl.org:MLIST:[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations MISC:github.com:CVE-2014-4172 MISC:github.com:CVE-2015-9251 MISC:github.com:CVE-2017-14229 MISC:github.com:MLIST:[oss-security] 20161205 Re: CVE Request: zlib security issues found during audit MISC:github.com:OSS:2018/Q1/235 MISC:github.com:OSS:2024/Q1/256 MISC:ics-cert.us-cert.gov:CVE-2015-9251 MISC:issues.apache.org:CVE-2014-4651 MISC:issues.jasig.org:CVE-2014-4172 MISC:lists.apache.org:CVE-2018-1305 MISC:lists.debian.org:CVE-2017-0379 MISC:lists.fedoraproject.org:CVE-2014-4172 MISC:mail-archives.apache.org:CVE-2016-6814 MISC:nodesecurity.io:CVE-2014-10064 MISC:nodesecurity.io:CVE-2015-8857 MISC:nodesecurity.io:MLIST:[oss-security] 20160420 various vulnerabilities in Node.js packages MISC:packetstormsecurity.com:CVE-2014-4330 MISC:packetstormsecurity.com:CVE-2016-0755 MISC:packetstormsecurity.com:CVE-2016-4979 MISC:savannah.nongnu.org:CVE-2014-9747 MISC:seclists.org:CVE-2014-4651 MISC:security-tracker.debian.org:CVE-2016-4000 MISC:security-tracker.debian.org:CVE-2017-0379 MISC:snyk.io:CVE-2015-9251 MISC:snyk.io:CVE-2016-4000 MISC:sw.aveva.com:CVE-2015-9251 MISC:web-in-security.blogspot.ca:CVE-2015-7940 MISC:web.archive.org:CVE-2013-7285 MISC:wiki.mozilla.org:CVE-2016-9843 MISC:www.arista.com:CVE-2016-6306 MISC:www.debian.org:CVE-2014-4172 MISC:www.mail-archive.com:CVE-2014-4172 MISC:www.openssl.org:CVE-2016-6302 MISC:www.oracle.com:CVE-2013-7285 MISC:www.oracle.com:CVE-2014-0107 MISC:www.oracle.com:CVE-2015-7501 MISC:www.oracle.com:CVE-2016-1000031 MISC:www.sourceclear.com:CVE-2015-8861 MISC:www.talosintelligence.com:CVE-2016-5684 MISC:www.tenable.com:CVE-2016-1000031 MISC:www.tenable.com:CVE-2016-6793 MLIST:[activemq-issues] 20190718 [jira] [Updated] (AMQ-7236) SEV-1 Security vulnerability in spring-expression-4.3.11.RELEASE.jar (spring framework) and xstream-1.4.10.jar MLIST:[activemq-issues] 20190826 [jira] [Created] (AMQ-7288) Security Vulnerabilities in ActiveMQ dependent libraries. MLIST:[announce] 20181105 [SECURITY] Immediately upgrade commons-fileupload to version 1.3.3 when running Struts 2.3.36 or prior MLIST:[apache-ignite-developers] 20180601 [CVE-2014-0114]: Apache Ignite is vulnerable to existing CVE-2014-0114 MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 MLIST:[debian-lts-announce] 20180306 [SECURITY] [DLA 1301-1] tomcat7 security update MLIST:[debian-lts-announce] 20180318 [SECURITY] [DLA 1309-1] curl security update MLIST:[debian-lts-announce] 20180627 [SECURITY] [DLA 1400-1] tomcat7 security update MLIST:[debian-lts-announce] 20180729 [SECURITY] [DLA 1450-1] tomcat8 security update MLIST:[debian-lts-announce] 20181105 [SECURITY] [DLA 1566-1] mysql-5.5 security update MLIST:[debian-lts-announce] 20181106 [SECURITY] [DLA 1568-1] curl security update MLIST:[debian-lts-announce] 20181122 [SECURITY] [DLA 1590-1] openjdk-7 security update MLIST:[debian-lts-announce] 20190201 [SECURITY] [DLA 1655-1] mariadb-10.0 security update MLIST:[debian-lts-announce] 20190324 [SECURITY] [DLA 1725-1] rsync security update MLIST:[debian-lts-announce] 20200129 [SECURITY] [DLA 2085-1] zlib security update MLIST:[flink-dev] 20190811 Apache flink 1.7.2 security issues MLIST:[flink-user] 20190811 Apache flink 1.7.2 security issues MLIST:[flink-user] 20190813 Apache flink 1.7.2 security issues MLIST:[flink-user] 20190813 Re: Apache flink 1.7.2 security issues MLIST:[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.... MLIST:[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.... MLIST:[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.... MLIST:[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.... MLIST:[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/ MLIST:[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/ MLIST:[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html secu... MLIST:[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html se... MLIST:[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/ MLIST:[httpd-cvs] 20210330 svn commit: r1073149 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/ MLIST:[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/ MLIST:[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.h... MLIST:[oss-security] 20091120 CVE request: php 5.3.1 update MLIST:[oss-security] 20091120 Re: CVE request: php 5.3.1 update MLIST:[oss-security] 20140109 Re: CVE request: remote code execution via deserialization in XStream MLIST:[oss-security] 20140220 Re: Possible CVE Requests: several issues fixed in Jenkins (Advisory 2014-02-14) MLIST:[oss-security] 20140616 CVE request for commons-beanutils: 'class' property is exposed, potentially leading to RCE MLIST:[oss-security] 20140707 Re: CVE request for commons-beanutils: 'class' property is exposed, potentially leading to RCE MLIST:[oss-security] 20140925 LSE Leading Security Experts GmbH - LSE-2014-06-10 - Perl CORE - Deep Recursion Stack Overflow MLIST:[oss-security] 20150804 Re: CVE Request: Information disclosure in pcre MLIST:[oss-security] 20150828 CVE-2015-0852 [FreeImage] Integer overflow in PluginPCX.cpp MLIST:[oss-security] 20150911 CVE Request: 2 FreeType issues MLIST:[oss-security] 20150925 Re: CVE Request: 2 FreeType issues MLIST:[oss-security] 20151022 CVE Request: invalid curve attack on bouncycastle MLIST:[oss-security] 20151022 Re: CVE Request: invalid curve attack on bouncycastle MLIST:[oss-security] 20151128 Re: Heap Overflow in PCRE MLIST:[oss-security] 20160420 various vulnerabilities in Node.js packages MLIST:[oss-security] 20160423 Re: CVE request: PHP issues fixed in 7.0.5, 5.6.20 and 5.5.34 releases MLIST:[oss-security] 20160608 CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations MLIST:[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations MLIST:[oss-security] 20160609 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations MLIST:[oss-security] 20160705 CVE-2016-4979: HTTPD webserver - X509 Client certificate based authentication can be bypassed when HTTP/2 is used [vs] MLIST:[oss-security] 20161117 Re: jasper: multiple assertion failures MLIST:[oss-security] 20161205 Re: CVE Request: zlib security issues found during audit MLIST:[perl.perl5.porters] 20140918 fix for CVE-2014-4330 present in blead MLIST:[php-announce] 20091119 5.3.1 Release announcement MLIST:[tomcat-dev] 20190319 svn commit: r1855831 [24/30] - in /tomcat/site/trunk: ./ docs/ xdocs/ MLIST:[tomcat-dev] 20190319 svn commit: r1855831 [25/30] - in /tomcat/site/trunk: ./ docs/ xdocs/ MLIST:[tomcat-dev] 20190325 svn commit: r1856174 [22/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/ MLIST:[tomcat-dev] 20190325 svn commit: r1856174 [23/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/ MLIST:[tomcat-dev] 20190325 svn commit: r1856174 [24/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/ MLIST:[tomcat-dev] 20190413 svn commit: r1857494 [16/20] - in /tomcat/site/trunk: ./ docs/ xdocs/ MLIST:[tomcat-dev] 20190413 svn commit: r1857494 [17/20] - in /tomcat/site/trunk: ./ docs/ xdocs/ MLIST:[tomcat-dev] 20190413 svn commit: r1857496 [3/4] - in /tomcat/site/trunk: ./ docs/ xdocs/ MLIST:[tomcat-dev] 20190415 svn commit: r1857582 [17/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/ MLIST:[tomcat-dev] 20190415 svn commit: r1857582 [18/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/ MLIST:[tomcat-dev] 20190415 svn commit: r1857582 [19/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/ MLIST:[xstream-user] 20130717 Re: Is it possible to unregister the DynamicProxyConverter using the SpringOXM wrapper MLIST:[xstream-user] 20130718 Re: Is it possible to unregister the DynamicProxyConverter using the SpringOXM wrapper OSS:2015/Q4/414 OSS:2015/Q4/419 OSS:2015/Q4/422 OSS:2016/Q1/258 OSS:2016/Q1/625 OSS:2016/Q2/122 OSS:2016/Q2/493 OSS:2016/Q4/602 OSS:2016/Q4/719 OSS:2017/Q2/418 OSS:2017/Q4/297 OSS:2017/Q4/298 OSS:2017/Q4/299 OSS:2017/Q4/300 OSS:2017/Q4/301 OSS:2017/Q4/59 OSS:2017/Q4/60 OSS:2018/Q1/174 OSS:2018/Q1/235 OSS:2018/Q2/21 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/11/10/2 OSS:2022/Q3/99 OSS:2022/Q4/132 OSS:2022/Q4/135 OSS:2024/03/27/4 OSS:2024/Q1/256 Oracle:CVE-2011-4461 Oracle:CVE-2013-1768 Oracle:CVE-2014-0114 Oracle:CVE-2014-3490 Oracle:CVE-2014-3577 Oracle:CVE-2015-0204 Oracle:CVE-2015-0235 Oracle:CVE-2015-0405 Oracle:CVE-2015-0423 Oracle:CVE-2015-0433 Oracle:CVE-2015-0438 Oracle:CVE-2015-0439 Oracle:CVE-2015-0441 Oracle:CVE-2015-0498 Oracle:CVE-2015-0499 Oracle:CVE-2015-0500 Oracle:CVE-2015-0501 Oracle:CVE-2015-0503 Oracle:CVE-2015-0505 Oracle:CVE-2015-0506 Oracle:CVE-2015-0507 Oracle:CVE-2015-0508 Oracle:CVE-2015-0511 Oracle:CVE-2015-1832 Oracle:CVE-2015-2566 Oracle:CVE-2015-2567 Oracle:CVE-2015-2568 Oracle:CVE-2015-2571 Oracle:CVE-2015-2573 Oracle:CVE-2015-2575 Oracle:CVE-2015-2576 Oracle:CVE-2015-5600 Oracle:CVE-2015-6937 Oracle:CVE-2015-7501 Oracle:CVE-2015-7940 Oracle:CVE-2015-8965 Oracle:CVE-2015-9251 Oracle:CVE-2016-0635 Oracle:CVE-2016-0714 Oracle:CVE-2016-0729 Oracle:CVE-2016-1000031 Oracle:CVE-2016-1181 Oracle:CVE-2016-1182 Oracle:CVE-2016-1950 Oracle:CVE-2016-2099 Oracle:CVE-2016-2107 Oracle:CVE-2016-2176 Oracle:CVE-2016-2179 Oracle:CVE-2016-2183 Oracle:CVE-2016-3092 Oracle:CVE-2016-3506 Oracle:CVE-2016-4000 Oracle:CVE-2016-4055 Oracle:CVE-2016-4979 Oracle:CVE-2016-5007 Oracle:CVE-2016-5019 Oracle:CVE-2016-5080 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 Oracle:CVE-2016-5501 Oracle:CVE-2016-5538 Oracle:CVE-2016-5605 Oracle:CVE-2016-5608 Oracle:CVE-2016-5610 Oracle:CVE-2016-5611 Oracle:CVE-2016-5613 Oracle:CVE-2016-5616 Oracle:CVE-2016-5617 Oracle:CVE-2016-5684 Oracle:CVE-2016-6304 Oracle:CVE-2016-6814 Oracle:CVE-2016-7103 Oracle:CVE-2016-7167 Oracle:CVE-2016-9583 Oracle:CVE-2016-9841 Oracle:CVE-2016-9843 Oracle:CVE-2016-9878 Oracle:CVE-2017-0379 Oracle:CVE-2017-10068 Oracle:CVE-2017-12617 Oracle:CVE-2017-13077 Oracle:CVE-2017-13745 Oracle:CVE-2017-14229 Oracle:CVE-2017-14735 Oracle:CVE-2017-15095 Oracle:CVE-2017-17562 Oracle:CVE-2017-3308 Oracle:CVE-2017-3309 Oracle:CVE-2017-3329 Oracle:CVE-2017-3453 Oracle:CVE-2017-3454 Oracle:CVE-2017-3456 Oracle:CVE-2017-3461 Oracle:CVE-2017-3462 Oracle:CVE-2017-3463 Oracle:CVE-2017-3464 Oracle:CVE-2017-3468 Oracle:CVE-2017-3600 Oracle:CVE-2017-3633 Oracle:CVE-2017-3732 Oracle:CVE-2017-3736 Oracle:CVE-2017-3737 Oracle:CVE-2017-5533 Oracle:CVE-2017-5645 Oracle:CVE-2017-5662 Oracle:CVE-2017-5664 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2017-6074 Oracle:CVE-2017-7525 Oracle:CVE-2017-7805 Oracle:CVE-2017-9798 Oracle:CVE-2018-0732 Oracle:CVE-2018-0734 Oracle:CVE-2018-0739 Oracle:CVE-2018-1000120 Oracle:CVE-2018-1000300 Oracle:CVE-2018-10933 Oracle:CVE-2018-11039 Oracle:CVE-2018-1171 Oracle:CVE-2018-11763 Oracle:CVE-2018-11776 Oracle:CVE-2018-11784 Oracle:CVE-2018-1258 Oracle:CVE-2018-1275 Oracle:CVE-2018-1305 Oracle:CVE-2018-13785 Oracle:CVE-2018-1656 Oracle:CVE-2018-2562 Oracle:CVE-2018-2563 Oracle:CVE-2018-2572 Oracle:CVE-2018-2587 Oracle:CVE-2018-2598 Oracle:CVE-2018-2612 Oracle:CVE-2018-2622 Oracle:CVE-2018-2628 Oracle:CVE-2018-2640 Oracle:CVE-2018-2665 Oracle:CVE-2018-2668 Oracle:CVE-2018-2676 Oracle:CVE-2018-2685 Oracle:CVE-2018-2686 Oracle:CVE-2018-2687 Oracle:CVE-2018-2688 Oracle:CVE-2018-2689 Oracle:CVE-2018-2690 Oracle:CVE-2018-2693 Oracle:CVE-2018-2694 Oracle:CVE-2018-2698 Oracle:CVE-2018-2718 Oracle:CVE-2018-2737 Oracle:CVE-2018-2738 Oracle:CVE-2018-2739 Oracle:CVE-2018-2742 Oracle:CVE-2018-2746 Oracle:CVE-2018-2747 Oracle:CVE-2018-2748 Oracle:CVE-2018-2749 Oracle:CVE-2018-2750 Oracle:CVE-2018-2752 Oracle:CVE-2018-2753 Oracle:CVE-2018-2754 Oracle:CVE-2018-2755 Oracle:CVE-2018-2756 Oracle:CVE-2018-2758 Oracle:CVE-2018-2759 Oracle:CVE-2018-2760 Oracle:CVE-2018-2761 Oracle:CVE-2018-2762 Oracle:CVE-2018-2763 Oracle:CVE-2018-2764 Oracle:CVE-2018-2765 Oracle:CVE-2018-2766 Oracle:CVE-2018-2767 Oracle:CVE-2018-2768 Oracle:CVE-2018-2769 Oracle:CVE-2018-2770 Oracle:CVE-2018-2771 Oracle:CVE-2018-2772 Oracle:CVE-2018-2773 Oracle:CVE-2018-2774 Oracle:CVE-2018-2775 Oracle:CVE-2018-2776 Oracle:CVE-2018-2777 Oracle:CVE-2018-2778 Oracle:CVE-2018-2779 Oracle:CVE-2018-2780 Oracle:CVE-2018-2781 Oracle:CVE-2018-2782 Oracle:CVE-2018-2783 Oracle:CVE-2018-2784 Oracle:CVE-2018-2785 Oracle:CVE-2018-2786 Oracle:CVE-2018-2787 Oracle:CVE-2018-2788 Oracle:CVE-2018-2789 Oracle:CVE-2018-2790 Oracle:CVE-2018-2791 Oracle:CVE-2018-2792 Oracle:CVE-2018-2793 Oracle:CVE-2018-2794 Oracle:CVE-2018-2795 Oracle:CVE-2018-2796 Oracle:CVE-2018-2797 Oracle:CVE-2018-2798 Oracle:CVE-2018-2799 Oracle:CVE-2018-2800 Oracle:CVE-2018-2801 Oracle:CVE-2018-2804 Oracle:CVE-2018-2805 Oracle:CVE-2018-2806 Oracle:CVE-2018-2807 Oracle:CVE-2018-2808 Oracle:CVE-2018-2809 Oracle:CVE-2018-2810 Oracle:CVE-2018-2811 Oracle:CVE-2018-2812 Oracle:CVE-2018-2813 Oracle:CVE-2018-2814 Oracle:CVE-2018-2815 Oracle:CVE-2018-2816 Oracle:CVE-2018-2817 Oracle:CVE-2018-2818 Oracle:CVE-2018-2819 Oracle:CVE-2018-2820 Oracle:CVE-2018-2821 Oracle:CVE-2018-2822 Oracle:CVE-2018-2823 Oracle:CVE-2018-2825 Oracle:CVE-2018-2826 Oracle:CVE-2018-2827 Oracle:CVE-2018-2828 Oracle:CVE-2018-2830 Oracle:CVE-2018-2831 Oracle:CVE-2018-2832 Oracle:CVE-2018-2834 Oracle:CVE-2018-2835 Oracle:CVE-2018-2836 Oracle:CVE-2018-2837 Oracle:CVE-2018-2838 Oracle:CVE-2018-2839 Oracle:CVE-2018-2840 Oracle:CVE-2018-2841 Oracle:CVE-2018-2842 Oracle:CVE-2018-2843 Oracle:CVE-2018-2844 Oracle:CVE-2018-2845 Oracle:CVE-2018-2846 Oracle:CVE-2018-2849 Oracle:CVE-2018-2850 Oracle:CVE-2018-2852 Oracle:CVE-2018-2854 Oracle:CVE-2018-2855 Oracle:CVE-2018-2856 Oracle:CVE-2018-2857 Oracle:CVE-2018-2858 Oracle:CVE-2018-2859 Oracle:CVE-2018-2860 Oracle:CVE-2018-2861 Oracle:CVE-2018-2862 Oracle:CVE-2018-2863 Oracle:CVE-2018-2864 Oracle:CVE-2018-2865 Oracle:CVE-2018-2866 Oracle:CVE-2018-2867 Oracle:CVE-2018-2868 Oracle:CVE-2018-2869 Oracle:CVE-2018-2870 Oracle:CVE-2018-2871 Oracle:CVE-2018-2872 Oracle:CVE-2018-2873 Oracle:CVE-2018-2874 Oracle:CVE-2018-2876 Oracle:CVE-2018-2877 Oracle:CVE-2018-2878 Oracle:CVE-2018-2879 Oracle:CVE-2018-2881 Oracle:CVE-2018-2882 Oracle:CVE-2018-2887 Oracle:CVE-2018-2888 Oracle:CVE-2018-2889 Oracle:CVE-2018-2891 Oracle:CVE-2018-2892 Oracle:CVE-2018-2893 Oracle:CVE-2018-2894 Oracle:CVE-2018-2895 Oracle:CVE-2018-2896 Oracle:CVE-2018-2897 Oracle:CVE-2018-2898 Oracle:CVE-2018-2899 Oracle:CVE-2018-2900 Oracle:CVE-2018-2901 Oracle:CVE-2018-2902 Oracle:CVE-2018-2903 Oracle:CVE-2018-2904 Oracle:CVE-2018-2905 Oracle:CVE-2018-2906 Oracle:CVE-2018-2907 Oracle:CVE-2018-2908 Oracle:CVE-2018-2909 Oracle:CVE-2018-2911 Oracle:CVE-2018-2912 Oracle:CVE-2018-2913 Oracle:CVE-2018-2914 Oracle:CVE-2018-2915 Oracle:CVE-2018-2916 Oracle:CVE-2018-2917 Oracle:CVE-2018-2918 Oracle:CVE-2018-2919 Oracle:CVE-2018-2920 Oracle:CVE-2018-2921 Oracle:CVE-2018-2922 Oracle:CVE-2018-2923 Oracle:CVE-2018-2924 Oracle:CVE-2018-2925 Oracle:CVE-2018-2926 Oracle:CVE-2018-2927 Oracle:CVE-2018-2928 Oracle:CVE-2018-2929 Oracle:CVE-2018-2930 Oracle:CVE-2018-2932 Oracle:CVE-2018-2933 Oracle:CVE-2018-2934 Oracle:CVE-2018-2935 Oracle:CVE-2018-2936 Oracle:CVE-2018-2937 Oracle:CVE-2018-2938 Oracle:CVE-2018-2939 Oracle:CVE-2018-2940 Oracle:CVE-2018-2941 Oracle:CVE-2018-2942 Oracle:CVE-2018-2943 Oracle:CVE-2018-2944 Oracle:CVE-2018-2945 Oracle:CVE-2018-2946 Oracle:CVE-2018-2947 Oracle:CVE-2018-2948 Oracle:CVE-2018-2949 Oracle:CVE-2018-2950 Oracle:CVE-2018-2951 Oracle:CVE-2018-2952 Oracle:CVE-2018-2953 Oracle:CVE-2018-2954 Oracle:CVE-2018-2955 Oracle:CVE-2018-2956 Oracle:CVE-2018-2957 Oracle:CVE-2018-2958 Oracle:CVE-2018-2959 Oracle:CVE-2018-2960 Oracle:CVE-2018-2961 Oracle:CVE-2018-2962 Oracle:CVE-2018-2963 Oracle:CVE-2018-2964 Oracle:CVE-2018-2965 Oracle:CVE-2018-2966 Oracle:CVE-2018-2967 Oracle:CVE-2018-2968 Oracle:CVE-2018-2969 Oracle:CVE-2018-2970 Oracle:CVE-2018-2971 Oracle:CVE-2018-2972 Oracle:CVE-2018-2973 Oracle:CVE-2018-2974 Oracle:CVE-2018-2975 Oracle:CVE-2018-2976 Oracle:CVE-2018-2977 Oracle:CVE-2018-2979 Oracle:CVE-2018-2980 Oracle:CVE-2018-2981 Oracle:CVE-2018-2982 Oracle:CVE-2018-2984 Oracle:CVE-2018-2985 Oracle:CVE-2018-2986 Oracle:CVE-2018-2987 Oracle:CVE-2018-2988 Oracle:CVE-2018-2989 Oracle:CVE-2018-2990 Oracle:CVE-2018-2991 Oracle:CVE-2018-2992 Oracle:CVE-2018-2993 Oracle:CVE-2018-2994 Oracle:CVE-2018-2995 Oracle:CVE-2018-2996 Oracle:CVE-2018-2997 Oracle:CVE-2018-2998 Oracle:CVE-2018-2999 Oracle:CVE-2018-3000 Oracle:CVE-2018-3001 Oracle:CVE-2018-3002 Oracle:CVE-2018-3003 Oracle:CVE-2018-3004 Oracle:CVE-2018-3005 Oracle:CVE-2018-3006 Oracle:CVE-2018-3007 Oracle:CVE-2018-3008 Oracle:CVE-2018-3009 Oracle:CVE-2018-3010 Oracle:CVE-2018-3011 Oracle:CVE-2018-3012 Oracle:CVE-2018-3013 Oracle:CVE-2018-3014 Oracle:CVE-2018-3015 Oracle:CVE-2018-3016 Oracle:CVE-2018-3017 Oracle:CVE-2018-3018 Oracle:CVE-2018-3019 Oracle:CVE-2018-3020 Oracle:CVE-2018-3021 Oracle:CVE-2018-3022 Oracle:CVE-2018-3023 Oracle:CVE-2018-3024 Oracle:CVE-2018-3025 Oracle:CVE-2018-3026 Oracle:CVE-2018-3027 Oracle:CVE-2018-3028 Oracle:CVE-2018-3029 Oracle:CVE-2018-3030 Oracle:CVE-2018-3031 Oracle:CVE-2018-3032 Oracle:CVE-2018-3033 Oracle:CVE-2018-3034 Oracle:CVE-2018-3035 Oracle:CVE-2018-3036 Oracle:CVE-2018-3037 Oracle:CVE-2018-3038 Oracle:CVE-2018-3039 Oracle:CVE-2018-3040 Oracle:CVE-2018-3041 Oracle:CVE-2018-3042 Oracle:CVE-2018-3043 Oracle:CVE-2018-3044 Oracle:CVE-2018-3045 Oracle:CVE-2018-3046 Oracle:CVE-2018-3047 Oracle:CVE-2018-3048 Oracle:CVE-2018-3049 Oracle:CVE-2018-3050 Oracle:CVE-2018-3051 Oracle:CVE-2018-3052 Oracle:CVE-2018-3053 Oracle:CVE-2018-3054 Oracle:CVE-2018-3055 Oracle:CVE-2018-3056 Oracle:CVE-2018-3057 Oracle:CVE-2018-3058 Oracle:CVE-2018-3059 Oracle:CVE-2018-3060 Oracle:CVE-2018-3061 Oracle:CVE-2018-3062 Oracle:CVE-2018-3063 Oracle:CVE-2018-3064 Oracle:CVE-2018-3065 Oracle:CVE-2018-3066 Oracle:CVE-2018-3067 Oracle:CVE-2018-3068 Oracle:CVE-2018-3069 Oracle:CVE-2018-3070 Oracle:CVE-2018-3071 Oracle:CVE-2018-3072 Oracle:CVE-2018-3073 Oracle:CVE-2018-3074 Oracle:CVE-2018-3075 Oracle:CVE-2018-3076 Oracle:CVE-2018-3077 Oracle:CVE-2018-3078 Oracle:CVE-2018-3079 Oracle:CVE-2018-3080 Oracle:CVE-2018-3081 Oracle:CVE-2018-3082 Oracle:CVE-2018-3084 Oracle:CVE-2018-3085 Oracle:CVE-2018-3086 Oracle:CVE-2018-3087 Oracle:CVE-2018-3088 Oracle:CVE-2018-3089 Oracle:CVE-2018-3090 Oracle:CVE-2018-3091 Oracle:CVE-2018-3092 Oracle:CVE-2018-3093 Oracle:CVE-2018-3094 Oracle:CVE-2018-3095 Oracle:CVE-2018-3096 Oracle:CVE-2018-3097 Oracle:CVE-2018-3098 Oracle:CVE-2018-3099 Oracle:CVE-2018-3100 Oracle:CVE-2018-3101 Oracle:CVE-2018-3102 Oracle:CVE-2018-3103 Oracle:CVE-2018-3104 Oracle:CVE-2018-3105 Oracle:CVE-2018-3108 Oracle:CVE-2018-3109 Oracle:CVE-2018-3115 Oracle:CVE-2018-3122 Oracle:CVE-2018-3125 Oracle:CVE-2018-3126 Oracle:CVE-2018-3127 Oracle:CVE-2018-3128 Oracle:CVE-2018-3129 Oracle:CVE-2018-3130 Oracle:CVE-2018-3131 Oracle:CVE-2018-3132 Oracle:CVE-2018-3133 Oracle:CVE-2018-3134 Oracle:CVE-2018-3135 Oracle:CVE-2018-3136 Oracle:CVE-2018-3137 Oracle:CVE-2018-3138 Oracle:CVE-2018-3139 Oracle:CVE-2018-3140 Oracle:CVE-2018-3141 Oracle:CVE-2018-3142 Oracle:CVE-2018-3143 Oracle:CVE-2018-3144 Oracle:CVE-2018-3145 Oracle:CVE-2018-3146 Oracle:CVE-2018-3147 Oracle:CVE-2018-3148 Oracle:CVE-2018-3149 Oracle:CVE-2018-3150 Oracle:CVE-2018-3151 Oracle:CVE-2018-3152 Oracle:CVE-2018-3153 Oracle:CVE-2018-3154 Oracle:CVE-2018-3155 Oracle:CVE-2018-3156 Oracle:CVE-2018-3157 Oracle:CVE-2018-3158 Oracle:CVE-2018-3159 Oracle:CVE-2018-3160 Oracle:CVE-2018-3161 Oracle:CVE-2018-3162 Oracle:CVE-2018-3163 Oracle:CVE-2018-3164 Oracle:CVE-2018-3165 Oracle:CVE-2018-3166 Oracle:CVE-2018-3167 Oracle:CVE-2018-3168 Oracle:CVE-2018-3169 Oracle:CVE-2018-3170 Oracle:CVE-2018-3171 Oracle:CVE-2018-3172 Oracle:CVE-2018-3173 Oracle:CVE-2018-3174 Oracle:CVE-2018-3175 Oracle:CVE-2018-3176 Oracle:CVE-2018-3177 Oracle:CVE-2018-3178 Oracle:CVE-2018-3179 Oracle:CVE-2018-3180 Oracle:CVE-2018-3181 Oracle:CVE-2018-3182 Oracle:CVE-2018-3183 Oracle:CVE-2018-3184 Oracle:CVE-2018-3185 Oracle:CVE-2018-3186 Oracle:CVE-2018-3187 Oracle:CVE-2018-3188 Oracle:CVE-2018-3189 Oracle:CVE-2018-3190 Oracle:CVE-2018-3191 Oracle:CVE-2018-3192 Oracle:CVE-2018-3193 Oracle:CVE-2018-3194 Oracle:CVE-2018-3195 Oracle:CVE-2018-3196 Oracle:CVE-2018-3197 Oracle:CVE-2018-3198 Oracle:CVE-2018-3200 Oracle:CVE-2018-3201 Oracle:CVE-2018-3202 Oracle:CVE-2018-3203 Oracle:CVE-2018-3204 Oracle:CVE-2018-3205 Oracle:CVE-2018-3206 Oracle:CVE-2018-3207 Oracle:CVE-2018-3208 Oracle:CVE-2018-3209 Oracle:CVE-2018-3210 Oracle:CVE-2018-3211 Oracle:CVE-2018-3212 Oracle:CVE-2018-3213 Oracle:CVE-2018-3214 Oracle:CVE-2018-3215 Oracle:CVE-2018-3217 Oracle:CVE-2018-3218 Oracle:CVE-2018-3219 Oracle:CVE-2018-3220 Oracle:CVE-2018-3221 Oracle:CVE-2018-3222 Oracle:CVE-2018-3223 Oracle:CVE-2018-3224 Oracle:CVE-2018-3225 Oracle:CVE-2018-3226 Oracle:CVE-2018-3227 Oracle:CVE-2018-3228 Oracle:CVE-2018-3229 Oracle:CVE-2018-3230 Oracle:CVE-2018-3231 Oracle:CVE-2018-3232 Oracle:CVE-2018-3233 Oracle:CVE-2018-3234 Oracle:CVE-2018-3235 Oracle:CVE-2018-3236 Oracle:CVE-2018-3237 Oracle:CVE-2018-3238 Oracle:CVE-2018-3239 Oracle:CVE-2018-3241 Oracle:CVE-2018-3242 Oracle:CVE-2018-3243 Oracle:CVE-2018-3244 Oracle:CVE-2018-3245 Oracle:CVE-2018-3246 Oracle:CVE-2018-3247 Oracle:CVE-2018-3248 Oracle:CVE-2018-3249 Oracle:CVE-2018-3250 Oracle:CVE-2018-3251 Oracle:CVE-2018-3252 Oracle:CVE-2018-3253 Oracle:CVE-2018-3254 Oracle:CVE-2018-3255 Oracle:CVE-2018-3256 Oracle:CVE-2018-3257 Oracle:CVE-2018-3258 Oracle:CVE-2018-3259 Oracle:CVE-2018-3261 Oracle:CVE-2018-3262 Oracle:CVE-2018-3263 Oracle:CVE-2018-3264 Oracle:CVE-2018-3265 Oracle:CVE-2018-3266 Oracle:CVE-2018-3267 Oracle:CVE-2018-3268 Oracle:CVE-2018-3269 Oracle:CVE-2018-3270 Oracle:CVE-2018-3271 Oracle:CVE-2018-3272 Oracle:CVE-2018-3273 Oracle:CVE-2018-3274 Oracle:CVE-2018-3275 Oracle:CVE-2018-3276 Oracle:CVE-2018-3277 Oracle:CVE-2018-3278 Oracle:CVE-2018-3279 Oracle:CVE-2018-3280 Oracle:CVE-2018-3281 Oracle:CVE-2018-3282 Oracle:CVE-2018-3283 Oracle:CVE-2018-3284 Oracle:CVE-2018-3285 Oracle:CVE-2018-3286 Oracle:CVE-2018-3287 Oracle:CVE-2018-3288 Oracle:CVE-2018-3289 Oracle:CVE-2018-3290 Oracle:CVE-2018-3291 Oracle:CVE-2018-3292 Oracle:CVE-2018-3293 Oracle:CVE-2018-3294 Oracle:CVE-2018-3295 Oracle:CVE-2018-3296 Oracle:CVE-2018-3297 Oracle:CVE-2018-3298 Oracle:CVE-2018-3299 Oracle:CVE-2018-3301 Oracle:CVE-2018-3302 Oracle:CVE-2018-3303 Oracle:CVE-2018-3304 Oracle:CVE-2018-3305 Oracle:CVE-2018-3309 Oracle:CVE-2018-3311 Oracle:CVE-2018-3639 Oracle:CVE-2018-7489 Oracle:CVE-2018-8013 Oracle:CVE-2018-8014 Oracle:CVE-2018-8037 Oracle:CVE-2019-10173 Oracle:CVE-2019-1543 Oracle:CVE-2019-2395 Oracle:CVE-2019-2396 Oracle:CVE-2019-2397 Oracle:CVE-2019-2398 Oracle:CVE-2019-2399 Oracle:CVE-2019-2400 Oracle:CVE-2019-2401 Oracle:CVE-2019-2402 Oracle:CVE-2019-2403 Oracle:CVE-2019-2404 Oracle:CVE-2019-2405 Oracle:CVE-2019-2406 Oracle:CVE-2019-2407 Oracle:CVE-2019-2408 Oracle:CVE-2019-2409 Oracle:CVE-2019-2410 Oracle:CVE-2019-2411 Oracle:CVE-2019-2412 Oracle:CVE-2019-2413 Oracle:CVE-2019-2414 Oracle:CVE-2019-2415 Oracle:CVE-2019-2416 Oracle:CVE-2019-2417 Oracle:CVE-2019-2418 Oracle:CVE-2019-2419 Oracle:CVE-2019-2420 Oracle:CVE-2019-2421 Oracle:CVE-2019-2422 Oracle:CVE-2019-2423 Oracle:CVE-2019-2425 Oracle:CVE-2019-2426 Oracle:CVE-2019-2427 Oracle:CVE-2019-2429 Oracle:CVE-2019-2430 Oracle:CVE-2019-2431 Oracle:CVE-2019-2432 Oracle:CVE-2019-2433 Oracle:CVE-2019-2434 Oracle:CVE-2019-2435 Oracle:CVE-2019-2436 Oracle:CVE-2019-2437 Oracle:CVE-2019-2438 Oracle:CVE-2019-2439 Oracle:CVE-2019-2440 Oracle:CVE-2019-2441 Oracle:CVE-2019-2442 Oracle:CVE-2019-2443 Oracle:CVE-2019-2444 Oracle:CVE-2019-2445 Oracle:CVE-2019-2446 Oracle:CVE-2019-2447 Oracle:CVE-2019-2448 Oracle:CVE-2019-2449 Oracle:CVE-2019-2450 Oracle:CVE-2019-2451 Oracle:CVE-2019-2452 Oracle:CVE-2019-2453 Oracle:CVE-2019-2455 Oracle:CVE-2019-2456 Oracle:CVE-2019-2457 Oracle:CVE-2019-2458 Oracle:CVE-2019-2459 Oracle:CVE-2019-2460 Oracle:CVE-2019-2461 Oracle:CVE-2019-2462 Oracle:CVE-2019-2463 Oracle:CVE-2019-2464 Oracle:CVE-2019-2465 Oracle:CVE-2019-2466 Oracle:CVE-2019-2467 Oracle:CVE-2019-2468 Oracle:CVE-2019-2469 Oracle:CVE-2019-2470 Oracle:CVE-2019-2471 Oracle:CVE-2019-2472 Oracle:CVE-2019-2473 Oracle:CVE-2019-2474 Oracle:CVE-2019-2475 Oracle:CVE-2019-2476 Oracle:CVE-2019-2477 Oracle:CVE-2019-2478 Oracle:CVE-2019-2479 Oracle:CVE-2019-2480 Oracle:CVE-2019-2481 Oracle:CVE-2019-2482 Oracle:CVE-2019-2485 Oracle:CVE-2019-2486 Oracle:CVE-2019-2487 Oracle:CVE-2019-2488 Oracle:CVE-2019-2489 Oracle:CVE-2019-2490 Oracle:CVE-2019-2491 Oracle:CVE-2019-2492 Oracle:CVE-2019-2493 Oracle:CVE-2019-2494 Oracle:CVE-2019-2495 Oracle:CVE-2019-2496 Oracle:CVE-2019-2497 Oracle:CVE-2019-2498 Oracle:CVE-2019-2499 Oracle:CVE-2019-2500 Oracle:CVE-2019-2501 Oracle:CVE-2019-2502 Oracle:CVE-2019-2503 Oracle:CVE-2019-2504 Oracle:CVE-2019-2505 Oracle:CVE-2019-2506 Oracle:CVE-2019-2507 Oracle:CVE-2019-2508 Oracle:CVE-2019-2509 Oracle:CVE-2019-2510 Oracle:CVE-2019-2511 Oracle:CVE-2019-2512 Oracle:CVE-2019-2513 Oracle:CVE-2019-2519 Oracle:CVE-2019-2520 Oracle:CVE-2019-2521 Oracle:CVE-2019-2522 Oracle:CVE-2019-2523 Oracle:CVE-2019-2524 Oracle:CVE-2019-2525 Oracle:CVE-2019-2526 Oracle:CVE-2019-2527 Oracle:CVE-2019-2528 Oracle:CVE-2019-2529 Oracle:CVE-2019-2530 Oracle:CVE-2019-2531 Oracle:CVE-2019-2532 Oracle:CVE-2019-2533 Oracle:CVE-2019-2534 Oracle:CVE-2019-2535 Oracle:CVE-2019-2536 Oracle:CVE-2019-2537 Oracle:CVE-2019-2538 Oracle:CVE-2019-2539 Oracle:CVE-2019-2540 Oracle:CVE-2019-2541 Oracle:CVE-2019-2543 Oracle:CVE-2019-2544 Oracle:CVE-2019-2545 Oracle:CVE-2019-2546 Oracle:CVE-2019-2547 Oracle:CVE-2019-2548 Oracle:CVE-2019-2549 Oracle:CVE-2019-2550 Oracle:CVE-2019-2552 Oracle:CVE-2019-2553 Oracle:CVE-2019-2554 Oracle:CVE-2019-2555 Oracle:CVE-2019-2556 Oracle:CVE-2019-2574 Oracle:CVE-2019-2656 Oracle:CVE-2019-2657 Oracle:CVE-2019-2678 Oracle:CVE-2019-2679 Oracle:CVE-2019-2680 Oracle:CVE-2019-2690 Oracle:CVE-2019-2696 Oracle:CVE-2019-2703 Oracle:CVE-2019-2721 Oracle:CVE-2019-2722 Oracle:CVE-2019-2723 Oracle:CVE-2019-2848 Oracle:CVE-2019-2850 Oracle:CVE-2019-2859 Oracle:CVE-2019-2863 Oracle:CVE-2019-2864 Oracle:CVE-2019-2865 Oracle:CVE-2019-2866 Oracle:CVE-2019-2867 Oracle:CVE-2019-2873 Oracle:CVE-2019-2874 Oracle:CVE-2019-2875 Oracle:CVE-2019-2876 Oracle:CVE-2019-2877 RH:CVE-2009-3559 RH:CVE-2012-6153 RH:CVE-2013-7285 RH:CVE-2014-3540 RH:CVE-2014-4330 RH:CVE-2014-4651 RH:CVE-2014-9746 RH:CVE-2014-9747 RH:CVE-2015-0405 RH:CVE-2015-0423 RH:CVE-2015-0433 RH:CVE-2015-0438 RH:CVE-2015-0439 RH:CVE-2015-0441 RH:CVE-2015-0498 RH:CVE-2015-0499 RH:CVE-2015-0500 RH:CVE-2015-0501 RH:CVE-2015-0503 RH:CVE-2015-0505 RH:CVE-2015-0506 RH:CVE-2015-0507 RH:CVE-2015-0508 RH:CVE-2015-0511 RH:CVE-2015-2325 RH:CVE-2015-2326 RH:CVE-2015-2566 RH:CVE-2015-2567 RH:CVE-2015-2568 RH:CVE-2015-2571 RH:CVE-2015-2573 RH:CVE-2015-2575 RH:CVE-2015-2576 RH:CVE-2015-5125 RH:CVE-2015-5127 RH:CVE-2015-5129 RH:CVE-2015-5130 RH:CVE-2015-5131 RH:CVE-2015-5132 RH:CVE-2015-5134 RH:CVE-2015-5539 RH:CVE-2015-5540 RH:CVE-2015-5541 RH:CVE-2015-5544 RH:CVE-2015-5545 RH:CVE-2015-5551 RH:CVE-2015-5552 RH:CVE-2015-5553 RH:CVE-2015-5554 RH:CVE-2015-5555 RH:CVE-2015-5556 RH:CVE-2015-5557 RH:CVE-2015-5558 RH:CVE-2015-5559 RH:CVE-2015-5560 RH:CVE-2015-5561 RH:CVE-2015-5564 RH:CVE-2015-5565 RH:CVE-2015-5566 RH:CVE-2015-7559 RH:CVE-2015-8315 RH:CVE-2015-8381 RH:CVE-2015-8382 RH:CVE-2015-8383 RH:CVE-2015-8384 RH:CVE-2015-8385 RH:CVE-2015-8386 RH:CVE-2015-8387 RH:CVE-2015-8388 RH:CVE-2015-8389 RH:CVE-2015-8390 RH:CVE-2015-8391 RH:CVE-2015-8392 RH:CVE-2015-8393 RH:CVE-2015-8394 RH:CVE-2015-8395 RH:CVE-2015-8855 RH:CVE-2015-8860 RH:CVE-2016-0755 RH:CVE-2016-1672 RH:CVE-2016-1673 RH:CVE-2016-1674 RH:CVE-2016-1675 RH:CVE-2016-1676 RH:CVE-2016-1677 RH:CVE-2016-1678 RH:CVE-2016-1679 RH:CVE-2016-1680 RH:CVE-2016-1681 RH:CVE-2016-1682 RH:CVE-2016-1683 RH:CVE-2016-1684 RH:CVE-2016-1685 RH:CVE-2016-1686 RH:CVE-2016-1687 RH:CVE-2016-1688 RH:CVE-2016-1689 RH:CVE-2016-1690 RH:CVE-2016-1691 RH:CVE-2016-1692 RH:CVE-2016-1693 RH:CVE-2016-1694 RH:CVE-2016-1695 RH:CVE-2016-1950 RH:CVE-2016-1955 RH:CVE-2016-1956 RH:CVE-2016-1959 RH:CVE-2016-1967 RH:CVE-2016-1968 RH:CVE-2016-1969 RH:CVE-2016-1970 RH:CVE-2016-1971 RH:CVE-2016-1972 RH:CVE-2016-1973 RH:CVE-2016-1975 RH:CVE-2016-1976 RH:CVE-2016-3141 RH:CVE-2016-4055 RH:CVE-2016-4070 RH:CVE-2016-4979 RH:CVE-2016-5483 RH:CVE-2016-5617 RH:CVE-2016-9586 RH:CVE-2016-9840 RH:CVE-2016-9841 RH:CVE-2016-9842 RH:CVE-2016-9843 RH:CVE-2017-3308 RH:CVE-2017-3309 RH:CVE-2017-3329 RH:CVE-2017-3453 RH:CVE-2017-3454 RH:CVE-2017-3456 RH:CVE-2017-3461 RH:CVE-2017-3462 RH:CVE-2017-3463 RH:CVE-2017-3464 RH:CVE-2017-3468 RH:CVE-2017-3600 RH:CVE-2017-9526 RH:CVE-2018-1000121 RH:CVE-2018-12539 RH:CVE-2018-1305 RH:CVE-2018-1517 RH:CVE-2018-1656 RH:CVE-2018-2767 RH:CVE-2018-2938 RH:CVE-2018-2940 RH:CVE-2018-2952 RH:CVE-2018-2973 RH:CVE-2019-2455 RH:CVE-2019-2481 RH:CVE-2019-2482 RH:CVE-2019-2503 RH:CVE-2019-2507 RH:CVE-2019-2510 RH:CVE-2019-2513 RH:CVE-2019-2528 RH:CVE-2019-2529 RH:CVE-2019-2530 RH:CVE-2019-2531 RH:CVE-2019-2532 RH:CVE-2019-2533 RH:CVE-2019-2534 RH:CVE-2019-2535 RH:CVE-2019-2536 RH:CVE-2019-2537 RH:CVE-2019-2539 RHBA-2015:1659 RHBA-2015:1762 RHBA-2015:1763 RHBA-2019:0327 RHSA-2014:0216 RHSA-2014:0294 RHSA-2014:0323 RHSA-2014:0371 RHSA-2014:0372 RHSA-2014:0374 RHSA-2014:0389 RHSA-2014:0452 RHSA-2014:0474 RHSA-2014:0497 RHSA-2014:0498 RHSA-2014:0500 RHSA-2014:0511 RHSA-2014:0702 RHSA-2014:1007 RHSA-2014:1059 RHSA-2014:1082 RHSA-2014:1098 RHSA-2014:1146 RHSA-2014:1162 RHSA-2014:1163 RHSA-2014:1166 RHSA-2014:1320 RHSA-2014:1321 RHSA-2014:1322 RHSA-2014:1323 RHSA-2014:1833 RHSA-2014:1834 RHSA-2014:1835 RHSA-2014:1836 RHSA-2014:1891 RHSA-2014:1892 RHSA-2014:1904 RHSA-2014:2019 RHSA-2014:2020 RHSA-2015:0125 RHSA-2015:0158 RHSA-2015:0234 RHSA-2015:0235 RHSA-2015:0675 RHSA-2015:0720 RHSA-2015:0765 RHSA-2015:0850 RHSA-2015:0851 RHSA-2015:1009 RHSA-2015:1176 RHSA-2015:1177 RHSA-2015:1603 RHSA-2015:1628 RHSA-2015:1629 RHSA-2015:1646 RHSA-2015:1647 RHSA-2015:1665 RHSA-2015:1888 RHSA-2016:0197 RHSA-2016:0370 RHSA-2016:0371 RHSA-2016:0373 RHSA-2016:0495 RHSA-2016:1025 RHSA-2016:1132 RHSA-2016:1190 RHSA-2016:1420 RHSA-2016:1773 RHSA-2016:1931 RHSA-2016:1940 RHSA-2016:2035 RHSA-2016:2036 RHSA-2016:2130 RHSA-2016:2131 RHSA-2016:2595 RHSA-2016:2749 RHSA-2016:2750 RHSA-2016:2927 RHSA-2016:2928 RHSA-2016:2957 RHSA-2017:0184 RHSA-2017:0193 RHSA-2017:0194 RHSA-2017:0272 RHSA-2017:0868 RHSA-2017:1208 RHSA-2017:1220 RHSA-2017:1221 RHSA-2017:1222 RHSA-2017:1658 RHSA-2017:1659 RHSA-2017:2192 RHSA-2017:2486 RHSA-2017:2596 RHSA-2017:2787 RHSA-2017:2886 RHSA-2017:2999 RHSA-2017:3046 RHSA-2017:3047 RHSA-2017:3189 RHSA-2017:3190 RHSA-2017:3453 RHSA-2018:0279 RHSA-2018:0342 RHSA-2018:0465 RHSA-2018:0466 RHSA-2018:0478 RHSA-2018:0479 RHSA-2018:0480 RHSA-2018:0481 RHSA-2018:0501 RHSA-2018:0574 RHSA-2018:0576 RHSA-2018:0577 RHSA-2018:1320 RHSA-2018:1447 RHSA-2018:1448 RHSA-2018:1449 RHSA-2018:1450 RHSA-2018:1451 RHSA-2018:2241 RHSA-2018:2242 RHSA-2018:2253 RHSA-2018:2254 RHSA-2018:2255 RHSA-2018:2256 RHSA-2018:2283 RHSA-2018:2286 RHSA-2018:2439 RHSA-2018:2568 RHSA-2018:2569 RHSA-2018:2575 RHSA-2018:2576 RHSA-2018:2669 RHSA-2018:2712 RHSA-2018:2713 RHSA-2018:2729 RHSA-2018:2927 RHSA-2018:2939 RHSA-2018:3007 RHSA-2018:3008 RHSA-2018:3157 RHSA-2018:3558 RHSA-2019:1258 RHSA-2019:1543 RHSA-2019:1822 RHSA-2019:1823 RHSA-2019:2205 RHSA-2019:2327 RHSA-2019:2413 RHSA-2019:2484 RHSA-2019:2511 RHSA-2019:2995 RHSA-2019:3708 RHSA-2019:3892 RHSA-2019:4352 RHSA-2020:0445 RHSA-2020:0544 RHSA-2020:0594 RHSA-2020:0727 RHSA-2020:0983 RHSA-2020:5663 SECTRACK ID: 1041302 SECTRACK:1032121 SECTRACK:1034077 SECTRACK:1034882 SECTRACK:1035215 SECTRACK:1035255 SECTRACK:1035981 SECTRACK:1036054 SECTRACK:1036056 SECTRACK:1036225 SECTRACK:1036377 SECTRACK:1036378 SECTRACK:1036393 SECTRACK:1036397 SECTRACK:1037036 SECTRACK:1037046 SECTRACK:1037053 SECTRACK:1037515 SECTRACK:1037640 SECTRACK:1038287 SECTRACK:1039427 SECTRACK:1039596 SECTRACK:1039600 SECTRACK:1040428 SECTRACK:1040529 SECTRACK:1041294 SECTRACK:1041296 SECTRACK:1041302 SECTRACK:1041765 SECTRACK:1041887 SECTRACK:1041888 SECTRACK:1041896 SECUNIA:57477 SECUNIA:58710 SECUNIA:58851 SECUNIA:58947 SECUNIA:59014 SECUNIA:59118 SECUNIA:59228 SECUNIA:59245 SECUNIA:59246 SECUNIA:59430 SECUNIA:59464 SECUNIA:59479 SECUNIA:59480 SECUNIA:59704 SECUNIA:59718 SECUNIA:60177 SECUNIA:60703 SECUNIA:61441 SECUNIA:61961 SLACKWARE:SSA:2016-039-01 SMASH Issue 106174 SMASH Issue 106399 SMASH Issue 115944 SMASH Issue 115951 SMASH Issue 116060 SMASH Issue 121091 SMASH Issue 122403 SMASH Issue 157079 SMASH Issue 157080 SMASH Issue 159370 SMASH Issue 159501 SMASH Issue 161165 SMASH Issue 161277 SMASH Issue 162768 SMASH Issue 162800 SMASH Issue 162870 SMASH Issue 163267 SMASH Issue 168106 SMASH Issue 168107 SMASH Issue 168108 SMASH Issue 168109 SMASH Issue 168110 SMASH Issue 168111 SMASH Issue 168112 SMASH Issue 168113 SMASH Issue 168114 SMASH Issue 168115 SMASH Issue 168116 SMASH Issue 168117 SMASH Issue 168118 SMASH Issue 168119 SMASH Issue 168120 SMASH Issue 169466 SMASH Issue 169472 SMASH Issue 169820 SMASH Issue 169849 SMASH Issue 170597 SMASH Issue 170598 SMASH Issue 173284 SMASH Issue 173285 SMASH Issue 173743 SMASH Issue 173744 SMASH Issue 173746 SMASH Issue 173747 SMASH Issue 173748 SMASH Issue 173749 SMASH Issue 173750 SMASH Issue 177157 SMASH Issue 177158 SMASH Issue 177160 SMASH Issue 177510 SMASH Issue 177997 SMASH Issue 183785 SMASH Issue 183803 SMASH Issue 183804 SMASH Issue 186176 SMASH Issue 186594 SMASH Issue 195320 SMASH Issue 200729 SMASH Issue 201476 SMASH Issue 201809 SMASH Issue 203304 SMASH Issue 205710 SMASH Issue 210804 SMASH Issue 210805 SMASH Issue 210807 SMASH Issue 210809 SMASH Issue 210923 SMASH Issue 210972 SMASH Issue 211000 SMASH Issue 211001 SMASH Issue 211002 SMASH Issue 211003 SMASH Issue 211004 SMASH Issue 211005 SMASH Issue 211006 SMASH Issue 211038 SMASH Issue 211039 SMASH Issue 211040 SMASH Issue 211041 SMASH Issue 211042 SMASH Issue 211051 SMASH Issue 212718 SMASH Issue 212765 SMASH Issue 212925 SMASH Issue 216708 SMASH Issue 216720 SMASH Issue 216727 SMASH Issue 216869 SMASH Issue 216870 SMASH Issue 216871 SMASH Issue 216872 SMASH Issue 216873 SMASH Issue 216874 SMASH Issue 216875 SMASH Issue 216876 SMASH Issue 216877 SMASH Issue 216878 SMASH Issue 216880 SMASH Issue 216904 SMASH Issue 222884 SMASH Issue 222951 SMASH Issue 63351 SMASH Issue 77111 SUSE:SUSE-SU-2015:0946 SUSE:SUSE-SU-2016:0727 SUSE:SUSE-SU-2016:0777 SUSE:SUSE-SU-2016:0820 SUSE:SUSE-SU-2016:0909 SUSE:SUSE-SU-2016:1277 SUSE:SUSE-SU-2016:2387 SUSE:SUSE-SU-2016:2394 SUSE:SUSE-SU-2016:2458 SUSE:SUSE-SU-2016:2468 SUSE:SUSE-SU-2016:2469 SUSE:SUSE-SU-2016:2470 SUSE:SUSE-SU-2017:2699 SUSE:SUSE-SU-2017:2700 SUSE:openSUSE-SU-2015:0858 SUSE:openSUSE-SU-2015:0967 SUSE:openSUSE-SU-2015:1911 SUSE:openSUSE-SU-2016:0360 SUSE:openSUSE-SU-2016:0373 SUSE:openSUSE-SU-2016:0376 SUSE:openSUSE-SU-2016:0731 SUSE:openSUSE-SU-2016:0733 SUSE:openSUSE-SU-2016:1274 SUSE:openSUSE-SU-2016:1373 SUSE:openSUSE-SU-2016:1430 SUSE:openSUSE-SU-2016:1433 SUSE:openSUSE-SU-2016:1496 SUSE:openSUSE-SU-2016:1557 SUSE:openSUSE-SU-2016:2391 SUSE:openSUSE-SU-2016:2407 SUSE:openSUSE-SU-2016:2496 SUSE:openSUSE-SU-2016:2537 SUSE:openSUSE-SU-2016:3202 SUSE:openSUSE-SU-2017:0077 SUSE:openSUSE-SU-2017:0080 SUSE:openSUSE-SU-2018:0458 SUSE:openSUSE-SU-2019:1814 UBUNTU:CVE-2009-3559 UBUNTU:CVE-2012-6153 UBUNTU:CVE-2013-7285 UBUNTU:CVE-2013-7451 UBUNTU:CVE-2013-7452 UBUNTU:CVE-2013-7453 UBUNTU:CVE-2013-7454 UBUNTU:CVE-2014-4330 UBUNTU:CVE-2014-9746 UBUNTU:CVE-2014-9747 UBUNTU:CVE-2014-9772 UBUNTU:CVE-2015-0405 UBUNTU:CVE-2015-0423 UBUNTU:CVE-2015-0433 UBUNTU:CVE-2015-0438 UBUNTU:CVE-2015-0439 UBUNTU:CVE-2015-0441 UBUNTU:CVE-2015-0498 UBUNTU:CVE-2015-0499 UBUNTU:CVE-2015-0500 UBUNTU:CVE-2015-0501 UBUNTU:CVE-2015-0503 UBUNTU:CVE-2015-0505 UBUNTU:CVE-2015-0506 UBUNTU:CVE-2015-0507 UBUNTU:CVE-2015-0508 UBUNTU:CVE-2015-0511 UBUNTU:CVE-2015-2325 UBUNTU:CVE-2015-2326 UBUNTU:CVE-2015-2566 UBUNTU:CVE-2015-2567 UBUNTU:CVE-2015-2568 UBUNTU:CVE-2015-2571 UBUNTU:CVE-2015-2573 UBUNTU:CVE-2015-2575 UBUNTU:CVE-2015-5125 UBUNTU:CVE-2015-5127 UBUNTU:CVE-2015-5128 UBUNTU:CVE-2015-5129 UBUNTU:CVE-2015-5130 UBUNTU:CVE-2015-5131 UBUNTU:CVE-2015-5132 UBUNTU:CVE-2015-5134 UBUNTU:CVE-2015-5539 UBUNTU:CVE-2015-5540 UBUNTU:CVE-2015-5541 UBUNTU:CVE-2015-5544 UBUNTU:CVE-2015-5545 UBUNTU:CVE-2015-5551 UBUNTU:CVE-2015-5552 UBUNTU:CVE-2015-5553 UBUNTU:CVE-2015-5554 UBUNTU:CVE-2015-5555 UBUNTU:CVE-2015-5556 UBUNTU:CVE-2015-5557 UBUNTU:CVE-2015-5558 UBUNTU:CVE-2015-5559 UBUNTU:CVE-2015-5560 UBUNTU:CVE-2015-5561 UBUNTU:CVE-2015-5564 UBUNTU:CVE-2015-5565 UBUNTU:CVE-2015-5566 UBUNTU:CVE-2015-7559 UBUNTU:CVE-2015-8381 UBUNTU:CVE-2015-8382 UBUNTU:CVE-2015-8383 UBUNTU:CVE-2015-8384 UBUNTU:CVE-2015-8385 UBUNTU:CVE-2015-8386 UBUNTU:CVE-2015-8387 UBUNTU:CVE-2015-8388 UBUNTU:CVE-2015-8389 UBUNTU:CVE-2015-8390 UBUNTU:CVE-2015-8391 UBUNTU:CVE-2015-8392 UBUNTU:CVE-2015-8393 UBUNTU:CVE-2015-8394 UBUNTU:CVE-2015-8395 UBUNTU:CVE-2015-8854 UBUNTU:CVE-2015-8855 UBUNTU:CVE-2015-8856 UBUNTU:CVE-2015-8857 UBUNTU:CVE-2015-8858 UBUNTU:CVE-2015-8859 UBUNTU:CVE-2015-8860 UBUNTU:CVE-2015-8861 UBUNTU:CVE-2015-8862 UBUNTU:CVE-2016-0755 UBUNTU:CVE-2016-1672 UBUNTU:CVE-2016-1673 UBUNTU:CVE-2016-1674 UBUNTU:CVE-2016-1675 UBUNTU:CVE-2016-1676 UBUNTU:CVE-2016-1677 UBUNTU:CVE-2016-1678 UBUNTU:CVE-2016-1679 UBUNTU:CVE-2016-1680 UBUNTU:CVE-2016-1681 UBUNTU:CVE-2016-1682 UBUNTU:CVE-2016-1683 UBUNTU:CVE-2016-1684 UBUNTU:CVE-2016-1685 UBUNTU:CVE-2016-1686 UBUNTU:CVE-2016-1687 UBUNTU:CVE-2016-1688 UBUNTU:CVE-2016-1689 UBUNTU:CVE-2016-1690 UBUNTU:CVE-2016-1691 UBUNTU:CVE-2016-1692 UBUNTU:CVE-2016-1693 UBUNTU:CVE-2016-1694 UBUNTU:CVE-2016-1695 UBUNTU:CVE-2016-1950 UBUNTU:CVE-2016-1955 UBUNTU:CVE-2016-1956 UBUNTU:CVE-2016-1959 UBUNTU:CVE-2016-1967 UBUNTU:CVE-2016-1968 UBUNTU:CVE-2016-1969 UBUNTU:CVE-2016-1970 UBUNTU:CVE-2016-1971 UBUNTU:CVE-2016-1972 UBUNTU:CVE-2016-1973 UBUNTU:CVE-2016-1975 UBUNTU:CVE-2016-1976 UBUNTU:CVE-2016-2178 UBUNTU:CVE-2016-3141 UBUNTU:CVE-2016-4055 UBUNTU:CVE-2016-4070 UBUNTU:CVE-2016-4619 UBUNTU:CVE-2016-4979 UBUNTU:CVE-2016-5483 UBUNTU:CVE-2016-5501 UBUNTU:CVE-2016-5538 UBUNTU:CVE-2016-5605 UBUNTU:CVE-2016-5608 UBUNTU:CVE-2016-5610 UBUNTU:CVE-2016-5611 UBUNTU:CVE-2016-5613 UBUNTU:CVE-2016-9586 UBUNTU:CVE-2016-9840 UBUNTU:CVE-2016-9841 UBUNTU:CVE-2016-9842 UBUNTU:CVE-2016-9843 UBUNTU:CVE-2017-3308 UBUNTU:CVE-2017-3309 UBUNTU:CVE-2017-3329 UBUNTU:CVE-2017-3453 UBUNTU:CVE-2017-3454 UBUNTU:CVE-2017-3456 UBUNTU:CVE-2017-3461 UBUNTU:CVE-2017-3462 UBUNTU:CVE-2017-3463 UBUNTU:CVE-2017-3464 UBUNTU:CVE-2017-3468 UBUNTU:CVE-2017-3600 UBUNTU:CVE-2017-9526 UBUNTU:CVE-2018-1000121 UBUNTU:CVE-2018-1258 UBUNTU:CVE-2018-1305 UBUNTU:CVE-2018-1517 UBUNTU:CVE-2018-1656 UBUNTU:CVE-2018-2767 UBUNTU:CVE-2018-2909 UBUNTU:CVE-2018-2938 UBUNTU:CVE-2018-2940 UBUNTU:CVE-2018-2952 UBUNTU:CVE-2018-2973 UBUNTU:CVE-2018-3005 UBUNTU:CVE-2018-3055 UBUNTU:CVE-2018-3085 UBUNTU:CVE-2018-3086 UBUNTU:CVE-2018-3087 UBUNTU:CVE-2018-3088 UBUNTU:CVE-2018-3089 UBUNTU:CVE-2018-3090 UBUNTU:CVE-2018-3091 UBUNTU:CVE-2018-3287 UBUNTU:CVE-2018-3288 UBUNTU:CVE-2018-3289 UBUNTU:CVE-2018-3290 UBUNTU:CVE-2018-3291 UBUNTU:CVE-2018-3292 UBUNTU:CVE-2018-3293 UBUNTU:CVE-2018-3294 UBUNTU:CVE-2018-3295 UBUNTU:CVE-2018-3296 UBUNTU:CVE-2018-3297 UBUNTU:CVE-2018-3298 UBUNTU:CVE-2019-2455 UBUNTU:CVE-2019-2481 UBUNTU:CVE-2019-2482 UBUNTU:CVE-2019-2503 UBUNTU:CVE-2019-2507 UBUNTU:CVE-2019-2510 UBUNTU:CVE-2019-2513 UBUNTU:CVE-2019-2528 UBUNTU:CVE-2019-2529 UBUNTU:CVE-2019-2530 UBUNTU:CVE-2019-2531 UBUNTU:CVE-2019-2532 UBUNTU:CVE-2019-2533 UBUNTU:CVE-2019-2534 UBUNTU:CVE-2019-2535 UBUNTU:CVE-2019-2536 UBUNTU:CVE-2019-2537 UBUNTU:CVE-2019-2539 UBUNTU:USN-2575-1 UBUNTU:USN-2769-1 UBUNTU:USN-2882-1 UBUNTU:USN-2916-1 UBUNTU:USN-2917-1 UBUNTU:USN-2917-2 UBUNTU:USN-2917-3 UBUNTU:USN-2924-1 UBUNTU:USN-2934-1 UBUNTU:USN-2952-1 UBUNTU:USN-2952-2 UBUNTU:USN-2992-1 UBUNTU:USN-3598-1 UBUNTU:USN-3598-2 UBUNTU:USN-3665-1 UBUNTU:USN-3693-1 UBUNTU:USN-3725-1 UBUNTU:USN-3725-2 UBUNTU:USN-3727-1 UBUNTU:USN-3734-1 UBUNTU:USN-3735-1 UBUNTU:USN-3747-1 USN-3087-1 USN-3087-2 USN-3867-1 USN-4246-1 USN-4292-1 XF:perl-cve20144330-dos(96216) ZDI-16-570 ZDI-18-1232ZDI-CAN-6635 ZDI-18-1233ZDI-CAN-6591 ZDI-18-1234ZDI-CAN-6592 ZDI-18-1292ZDI-CAN-7329 bdo#1033297 bdo#583651 bdo#759718 bdo#782645 bdo#797165 bdo#798619 bdo#798620 bdo#802671 bdo#802971 bdo#854713 bdo#860544 bdo#864859 bdo#867247 bdo#873383 bdo#885345 bdo#898444 bdo#898445 bdo#912848 bnc#1003579 bnc#1003580 bnc#1005621 bnc#1015332 bnc#1016653 bnc#1022633 bnc#1042326 bnc#1043777 bnc#1084524 bnc#1085215 bnc#1088681 bnc#1101644 bnc#1101645 bnc#1101656 bnc#1101667 bnc#1101675 bnc#1104668 bnc#1112097 bnc#1120866 bnc#1122198 bnc#557157 bnc#885963 bnc#896715 bnc#927623 bnc#941239 bnc#947966 bnc#957598 bnc#958373 bnc#962983 bnc#969821 bnc#969894 bnc#970257 bnc#970377 bnc#970378 bnc#970379 bnc#970380 bnc#970381 bnc#970431 bnc#970433 bnc#976547 bnc#977050 bnc#981886 bnc#983249 bnc#983519 bnc#987365 bnc#988162 http://www.debian.org/security/2016/dsa-3560 https://git.php.net/?p=php-src.git%3Ba=commit%3Bh=95433e8e339dbb6b5d5541473c1661db6ba2c451 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO2RMVVZVV6NFTU46B5RYRK7ZCXYARZS/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M6BJG6RGDH7ZWVVAUFBFI5L32RSMQN2S/ https://security.netapp.com/advisory/ntap-20230216-0002/ https://support.f5.com/csp/article/K05052081?utm_source=f5support&%3Butm_medium=RSS https://support.f5.com/csp/article/K46337613?utm_source=f5support&%3Butm_medium=RSS https://support.f5.com/csp/article/K46337613?utm_source=f5support&utm_medium=RSS linux.git:commit:5535be3099717646781ce1540cf725965d680e7b linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 openssl.git:commit:399944622df7bd81af62e67ea967c470534090e2 rh#1051277 rh#1091938 rh#1101303 rh#1104858 rh#1107544 rh#1112877 rh#1116665 rh#1129074 rh#1129916 rh#1131350 rh#1139700 rh#1167537 rh#1183461 rh#1187225 rh#1202366 rh#1202380 rh#1202384 rh#1202395 rh#1202418 rh#1203195 rh#1207198 rh#1207202 rh#1209496 rh#1209501 rh#1212753 rh#1212755 rh#1212757 rh#1212758 rh#1212759 rh#1212760 rh#1212763 rh#1212764 rh#1212765 rh#1212767 rh#1212768 rh#1212769 rh#1212770 rh#1212771 rh#1212772 rh#1212774 rh#1212776 rh#1212777 rh#1212779 rh#1212780 rh#1212781 rh#1212782 rh#1212783 rh#1237223 rh#1252697 rh#1252707 rh#1256449 rh#1262373 rh#1277888 rh#1287614 rh#1287623 rh#1287629 rh#1287636 rh#1287646 rh#1287654 rh#1287659 rh#1287666 rh#1287671 rh#1287690 rh#1287695 rh#1287702 rh#1287711 rh#1291742 rh#1293972 rh#1302263 rh#1304645 rh#1310509 rh#1311503 rh#1315312 rh#1315328 rh#1315570 rh#1315571 rh#1315575 rh#1315776 rh#1315777 rh#1315780 rh#1315782 rh#1317560 rh#1323114 rh#1323749 rh#1329533 rh#1329552 rh#1340005 rh#1340006 rh#1340007 rh#1340008 rh#1340009 rh#1340010 rh#1340011 rh#1340012 rh#1340013 rh#1340014 rh#1340015 rh#1340016 rh#1340017 rh#1340018 rh#1340019 rh#1340021 rh#1340022 rh#1340023 rh#1340024 rh#1340026 rh#1340027 rh#1340028 rh#1340029 rh#1340030 rh#1341821 rh#1343400 rh#1343538 rh#1343540 rh#1352476 rh#1369383 rh#1378936 rh#1384344 rh#1386562 rh#1386564 rh#1393454 rh#1396963 rh#1396971 rh#1397485 rh#1399546 rh#1402345 rh#1402346 rh#1402348 rh#1402351 rh#1405148 rh#1406712 rh#1414133 rh#1433010 rh#1443358 rh#1443359 rh#1443360 rh#1443365 rh#1443366 rh#1443369 rh#1443376 rh#1443377 rh#1443378 rh#1443379 rh#1443385 rh#1443387 rh#1459887 rh#1485274 rh#1501812 rh#1501813 rh#1501814 rh#1501815 rh#1501816 rh#1501817 rh#1501818 rh#1501819 rh#1501820 rh#1516791 rh#1519780 rh#1548282 rh#1552631 rh#1553413 rh#1564965 rh#1578582 rh#1591854 rh#1600925 rh#1602141 rh#1602145 rh#1602146 rh#1607582 rh#1608073 rh#1614973 rh#1618767 rh#1618869 rh#1618871 rh#1666742 rh#1666743 rh#1666744 rh#1666749 rh#1666750 rh#1666751 rh#1666752 rh#1666753 rh#1666755 rh#1666756 rh#1666757 rh#1666758 rh#1666759 rh#1666760 rh#1666761 rh#1666762 rh#1666763 rh#1666764 rh#1714979 rh#1716448 rh#1716453 rh#1716454 rh#1722971 rh#1731271 rh#2061700 rh#2116175 rh#2119127 rh#2161287 rh#2270497 rh#539529 rh#873317 xf#141681 xf#141953 xf#141971 xf#141981 xf#141982 xf#144882 xf#146672 xf#146803 xf#146804 xf#146815 xf#146827 xf#146834 xf#146835 xf#151452 xf#151455 xf#151465 xf#151466 xf#151486 xf#151497 xf#151500 xf#151525 xf#151527 xf#151530 xf#155741 xf#155744 xf#155766 xf#155850 |
CVE-2009-3620 | kernel-source-rt:Not affected | important | () | BID:36824 CONFIRM:git.kernel.org:CVE-2009-3620 CONFIRM:www.kernel.org:CVE-2009-3620 CVE-2009-3620 DSA-1927 DSA-1928 FEDORA:FEDORA-2009-11038 MANDRIVA:MDVSA-2010:088 MANDRIVA:MDVSA-2010:198 MISC:git.kernel.org:/ MISC:secunia.com:MLIST:[oss-security] 20091019 Re: CVE request: kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised MLIST:[linux-kernel] 20090921 [git pull] drm tree. MLIST:[oss-security] 20091019 CVE request: kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised MLIST:[oss-security] 20091019 Re: CVE request: kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised MLIST:[security-announce] 20100303 VMSA-2010-0004 ESX Service Console and vMA third party updates OVAL:oval:org.mitre.oval:def:6763 OVAL:oval:org.mitre.oval:def:9891 RH:CVE-2009-3620 RHSA-2009:1540 RHSA-2009:1670 RHSA-2009:1671 RHSA-2010:0882 SECUNIA:36707 SECUNIA:37909 SECUNIA:38794 SECUNIA:38834 SMASH Issue 63477 SUSE:SUSE-SA:2009:061 SUSE:SUSE-SA:2009:064 SUSE:SUSE-SA:2010:012 SUSE:SUSE-SA:2010:013 UBUNTU:CVE-2009-3620 UBUNTU:USN-864-1 VUPEN:ADV-2010-0528 rh#529597 |
CVE-2009-3621 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2009-3621 CONFIRM:patchwork.kernel.org:CVE-2009-3621 CVE-2009-3621 DSA-1927 DSA-1928 DSA-1929 FEDORA:FEDORA-2009-11038 MANDRIVA:MDVSA-2009:329 MLIST:[linux-kernel] 20091019 Re: [PATCH] AF_UNIX: Fix deadlock on connecting to shutdown socket MLIST:[oss-security] 20091019 CVE request: kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket MLIST:[oss-security] 20091019 Re: CVE request: kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket MLIST:[security-announce] 20100303 VMSA-2010-0004 ESX Service Console and vMA third party updates OVAL:oval:org.mitre.oval:def:6895 OVAL:oval:org.mitre.oval:def:9921 RH:CVE-2009-3621 RHSA-2009:1540 RHSA-2009:1670 RHSA-2009:1671 SECUNIA:37086 SECUNIA:37909 SECUNIA:38017 SECUNIA:38794 SECUNIA:38834 SMASH Issue 63479 SUSE:SUSE-SA:2009:061 SUSE:SUSE-SA:2009:064 SUSE:SUSE-SA:2010:001 SUSE:SUSE-SA:2010:012 SUSE:SUSE-SA:2010:013 UBUNTU:CVE-2009-3621 UBUNTU:USN-864-1 VUPEN:ADV-2010-0528 http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=77238f2b942b38ab4e7f3aced44084493e4a8675 rh#529626 |
CVE-2009-3624 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2009-3624 CONFIRM:www.kernel.org:CVE-2009-3624 CVE-2009-3624 MISC:twitter.com:CVE-2009-3624 MLIST:[oss-security] 20091022 CVE request: kernel: get_instantiation_keyring() should inc the keyring refcount in all cases MLIST:[oss-security] 20091022 Re: CVE request: kernel: get_instantiation_keyring() should inc the keyring refcount in all cases RH:CVE-2009-3624 SMASH Issue 63487 SUSE:SUSE-SA:2010:001 UBUNTU:CVE-2009-3624 UBUNTU:USN-864-1 bnc#549030 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=21279cfa107af07ef985539ac0de2152b9cba5f5 rh#530283 |
CVE-2009-3638 | kernel-source-rt:Not affected | important | () | BID:36803 CONFIRM:git.kernel.org:CVE-2009-3638 CONFIRM:www.kernel.org:CVE-2009-3638 CVE-2009-3638 DSA-1927 DSA-1962 FEDORA:FEDORA-2009-11038 MANDRIVA:MDVSA-2009:329 MISC:git.kernel.org:/ MLIST:[oss-security] 20091023 CVE request: kvm: integer overflow in kvm_dev_ioctl_get_supported_cpuid() MLIST:[oss-security] 20091023 Re: CVE request: kvm: integer overflow in kvm_dev_ioctl_get_supported_cpuid() RH:CVE-2009-3638 SMASH Issue 40852 UBUNTU:CVE-2009-3638 UBUNTU:USN-864-1 XF:linux-kernel-supportedcpuid-code-execution(53934) bdo#557739 bdo#562075 bdo#562076 bnc#550072 rh#530515 |
CVE-2009-3889 | kernel-source-rt:Not affected | moderate | () | BID:37019 CONFIRM:git.kernel.org:CVE-2009-3889 CONFIRM:support.avaya.com:CVE-2009-4272 CONFIRM:www.kernel.org:CVE-2010-0437 CVE-2009-3889 DSA-2005 MLIST:[oss-security] 20091113 CVE request: kernel: bad permissions on megaraid_sas sysfs files MLIST:[oss-security] 20091113 Re: CVE request: kernel: bad permissions on megaraid_sas sysfs files OSVDB:60202 RH:CVE-2009-3889 RHSA-2009:1635 RHSA-2010:0046 RHSA-2010:0076 RHSA-2010:0095 SMASH Issue 63885 SUSE:SUSE-SA:2009:061 SUSE:SUSE-SA:2009:064 SUSE:SUSE-SA:2010:013 UBUNTU:CVE-2009-3889 UBUNTU:USN-864-1 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=66dca9b8c50b5e59d3bea8b21cee5c6dae6c9c46 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11018 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7163 rh#526068 |
CVE-2009-3939 | kernel-source-rt:Not affected | important | () | BID:37019 CONFIRM:support.avaya.com:CVE-2009-4272 CVE-2009-3939 DSA-1996 L3:30871 MLIST:[oss-security] 20091113 CVE request: kernel: bad permissions on megaraid_sas sysfs files OSVDB:60201 RH:CVE-2009-3939 RHSA-2009:1635 RHSA-2010:0046 RHSA-2010:0076 RHSA-2010:0095 SECUNIA:37909 SECUNIA:38017 SECUNIA:38276 SECUNIA:38492 SECUNIA:38779 SMASH Issue 63924 SUSE:SUSE-SA:2009:061 SUSE:SUSE-SA:2009:064 SUSE:SUSE-SA:2010:001 SUSE:SUSE-SA:2010:005 SUSE:SUSE-SA:2010:010 SUSE:SUSE-SA:2010:012 SUSE:SUSE-SA:2010:014 UBUNTU:CVE-2009-3939 UBUNTU:USN-864-1 bnc#557180 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10310 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7540 rh#526068 |
CVE-2009-4020 | kernel-source-rt:Not affected | important | () | CONFIRM:support.avaya.com:CVE-2009-4272 CONFIRM:userweb.kernel.org:CVE-2009-4020 CVE-2009-4020 DSA-2003 DSA-2005 MLIST:[linux-mm-commits] 20091203 + hfs-fix-a-potential-buffer-overflow.patch added to -mm tree MLIST:[oss-security] 20091204 CVE-2009-4020 kernel: hfs buffer overflow OVAL:oval:org.mitre.oval:def:10091 OVAL:oval:org.mitre.oval:def:6750 RH:CVE-2009-4020 RHSA-2010:0046 RHSA-2010:0076 RHSA-2010:0095 RHSA-2012:1323 RHSA-2012:1347 SECUNIA:38276 SECUNIA:39742 SMASH Issue 47338 SUSE:SUSE-SA:2010:005 SUSE:SUSE-SA:2010:019 SUSE:SUSE-SA:2010:023 UBUNTU:CVE-2009-4020 bnc#564374 rh#540736 rh#819471 |
CVE-2009-4026 | kernel-source-rt:Not affected | important | () | BID:37170 CONFIRM:git.kernel.org:CVE-2009-4027 CONFIRM:www.kernel.org:CVE-2009-4027 CVE-2009-4026 MISC:git.kernel.org:/ MLIST:[oss-security] 20091201 CVE request: kernel: mac80211: fix two remote exploits RH:CVE-2009-4026 RHSA-2010:0178 RHSA-2010:0380 SECUNIA:38017 SMASH Issue 64038 SUSE:SUSE-SA:2010:001 UBUNTU:CVE-2009-4026 UBUNTU:USN-864-1 bnc#558267 rh#541149 |
CVE-2009-4027 | kernel-source-rt:Not affected | important | () | BID:37170 CONFIRM:www.kernel.org:CVE-2009-4027 CVE-2009-4027 DSA-1996 MISC:git.kernel.org:/ OVAL:oval:org.mitre.oval:def:11583 RH:CVE-2009-4027 RHSA-2010:0178 RHSA-2010:0380 SECUNIA:38017 SECUNIA:38492 SMASH Issue 41130 SUSE:SUSE-SA:2010:001 UBUNTU:CVE-2009-4027 UBUNTU:USN-864-1 bnc#558267 rh#541149 |
CVE-2009-4031 | kernel-source-rt:Not affected | important | () | BID:37130 CONFIRM:git.kernel.org:CVE-2009-4031 CONFIRM:www.kernel.org:CVE-2009-4031 CVE-2009-4031 DSA-1962 FEDORA:FEDORA-2009-13098 MISC:git.kernel.org:MLIST:[oss-security] 20091125 CVE request: kernel: KVM: x86 emulator: limit instructions to 15 bytes MLIST:[oss-security] 20091125 CVE request: kernel: KVM: x86 emulator: limit instructions to 15 bytes MLIST:[oss-security] 20091125 Re: CVE request: kernel: KVM: x86 emulator: limit instructions to 15 bytes RH:CVE-2009-4031 RHSA-2009:1659 RHSA-2009:1692 SMASH Issue 41763 SUSE:SUSE-SA:2010:018 UBUNTU:CVE-2009-4031 bdo#557739 bdo#562075 bdo#562076 bnc#558269 bnc#558662 http://git.kernel.org/?p=linux/kernel/git/avi/kvm.git%3Ba=commit%3Bh=e42d9b8141d1f54ff72ad3850bb110c95a5f3b88 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11089 rh#541160 |
CVE-2009-4067 | kernel-source-rt:Not affected | low | () | BID:48383 BID:48929 BID:49146 CONFIRM:ftp.osuosl.org:CVE-2011-3209 CONFIRM:ftp.osuosl.org:CVE-2011-4914 CONFIRM:ftp.osuosl.org:CVE-2012-4444 CONFIRM:git.kernel.org:CVE-2011-1160 CONFIRM:git.kernel.org:CVE-2011-1585 CONFIRM:git.kernel.org:CVE-2011-1833 CONFIRM:git.kernel.org:CVE-2011-2496 CONFIRM:git.kernel.org:CVE-2011-2695 CONFIRM:git.kernel.org:CVE-2011-2699 CONFIRM:git.kernel.org:CVE-2011-2723 CONFIRM:git.kernel.org:CVE-2011-3188 CONFIRM:git.kernel.org:CVE-2011-3191 CONFIRM:git.kernel.org:CVE-2011-3209 CONFIRM:github.com:CVE-2011-1160 CONFIRM:github.com:CVE-2011-1585 CONFIRM:github.com:CVE-2011-1833 CONFIRM:github.com:CVE-2011-2496 CONFIRM:github.com:CVE-2011-2699 CONFIRM:github.com:CVE-2011-3188 CONFIRM:github.com:CVE-2011-3191 CONFIRM:github.com:CVE-2011-3209 CONFIRM:support.f5.com:CVE-2011-3188 CONFIRM:www.kernel.org:CVE-2011-2695 CONFIRM:www.kernel.org:CVE-2011-2723 CONFIRM:www.kernel.org:CVE-2011-4594 CONFIRM:xenbits.xen.org:CVE-2011-3131 CVE-2009-4067 CVE-2011-1160 CVE-2011-1162 CVE-2011-1585 CVE-2011-1833 CVE-2011-2484 CVE-2011-2496 CVE-2011-2695 CVE-2011-2699 CVE-2011-2723 CVE-2011-2942 CVE-2011-3131 CVE-2011-3188 CVE-2011-3191 CVE-2011-3209 CVE-2011-3347 CVE-2023-2002 DSA-2240 DSA-2264 DSA-2303 DSA-2310 DSA-2443 HP:HPSBGN02970 MANDRIVA:MDVSA-2013:150 MISC:git.kernel.org:MLIST:[oss-security] 20110415 Re: CVE Request: cifs session reuse MISC:git.kernel.org:OSS:2023/04/16/3 MISC:labs.mwrinfosecurity.com:CVE-2009-4067 MISC:tpmdd.git.sourceforge.net:MLIST:[oss-security] 20110315 Re: CVE requests - kernel: tpm infoleaks MISC:www.redhat.com:MLIST:[oss-security] 20111024 kernel; CVE-2011-2942 and CVE-2011-3209 MLIST:[Xen-devel] 20110616 IOMMU faults MLIST:[Xen-devel] 20110812 Xen Advisory 5 (CVE-2011-3131) IOMMU fault livelock MLIST:[linux-ext4] 20110603 [PATCH 1/2] ext4: Fix max file size and logical block counting of extent format file MLIST:[linux-kernel] 20110616 [PATCH] taskstats: don't allow duplicate entries in listener mode MLIST:[oss-security] 20110315 Re: CVE requests - kernel: tpm infoleaks MLIST:[oss-security] 20110415 Re: CVE Request: cifs session reuse MLIST:[oss-security] 20110622 CVE request: kernel: taskstats local DoS MLIST:[oss-security] 20110622 Re: CVE request: kernel: taskstats local DoS MLIST:[oss-security] 20110627 Re: CVE request: kernel: mm: avoid wrapping vm_pgoff in mremap() and stack expansions MLIST:[oss-security] 20110715 CVE Request -- kernel: ext4: kernel panic when writing data to the last block of sparse file MLIST:[oss-security] 20110715 Re: CVE Request -- kernel: ext4: kernel panic when writing data to the last block of sparse file MLIST:[oss-security] 20110720 Re: CVE request: kernel: ipv6: make fragment identifications less predictable MLIST:[oss-security] 20110728 CVE request: kernel: gro: Only reset frag0 when skb can be pulled MLIST:[oss-security] 20110729 Re: CVE request: kernel: gro: Only reset frag0 when skb can be pulled MLIST:[oss-security] 20110823 Re: CVE request: kernel: change in how tcp seq numbers are generated MLIST:[oss-security] 20110824 Re: CVE request: kernel: cifs: singedness issue in CIFSFindNext() MLIST:[oss-security] 20111024 kernel; CVE-2011-2942 and CVE-2011-3209 OSS:2023/04/16/3 Oracle:CVE-2011-2699 RH:CVE-2009-4067 RH:CVE-2011-1160 RH:CVE-2011-1162 RH:CVE-2011-1585 RH:CVE-2011-1833 RH:CVE-2011-2484 RH:CVE-2011-2496 RH:CVE-2011-2695 RH:CVE-2011-2699 RH:CVE-2011-2723 RH:CVE-2011-2942 RH:CVE-2011-3131 RH:CVE-2011-3188 RH:CVE-2011-3191 RH:CVE-2011-3209 RH:CVE-2011-3347 RHSA-2011:1189 RHSA-2011:1241 RHSA-2011:1253 RHSA-2011:1321 RHSA-2011:1350 RHSA-2011:1386 RHSA-2011:1408 RHSA-2011:1418 RHSA-2011:1419 RHSA-2011:1465 RHSA-2011:1479 RHSA-2011:1530 RHSA-2012:0010 RHSA-2012:0116 RHSA-2012:0358 SECTRACK:1025876 SECTRACK:1027274 SECUNIA:45193 SECUNIA:45622 SMASH Issue 3151 SMASH Issue 44690 SMASH Issue 44698 SMASH Issue 45394 SMASH Issue 45473 SMASH Issue 45808 SMASH Issue 45983 SMASH Issue 46142 SMASH Issue 46145 SMASH Issue 46252 SMASH Issue 46253 SMASH Issue 46436 SMASH Issue 72317 SMASH Issue 72335 SMASH Issue 72529 SMASH Issue 72895 SUSE:SUSE-SU-2015:0812 UBUNTU:CVE-2009-4067 UBUNTU:CVE-2011-1160 UBUNTU:CVE-2011-1162 UBUNTU:CVE-2011-1585 UBUNTU:CVE-2011-1833 UBUNTU:CVE-2011-2484 UBUNTU:CVE-2011-2496 UBUNTU:CVE-2011-2695 UBUNTU:CVE-2011-2699 UBUNTU:CVE-2011-2723 UBUNTU:CVE-2011-2942 UBUNTU:CVE-2011-3131 UBUNTU:CVE-2011-3188 UBUNTU:CVE-2011-3191 UBUNTU:CVE-2011-3209 UBUNTU:CVE-2011-3347 XF:kernel-taskstats-dos(68150) bdo#618485 bdo#633738 bnc#680040 bnc#687812 bnc#701492 bnc#702285 bnc#703153 bnc#706374 bnc#706375 bnc#707288 bnc#709164 bnc#709771 bnc#711539 bnc#712051 bnc#714001 bnc#726064 bnc#732006 bnc#737874 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1309d7afbed112f0e8e90be9af975550caa0076b http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=17dd759c67f21e34f2156abcf415e1f60605a188 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4ff67b720c02c36e54d55b88c2931879b7db1cd2 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6e5714eaf77d79ae1c8b47e3e040ff5411b717ec http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=87c48fa3b4630905f98268dde838ee43626a060c http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9438fabb73eb48055b58b89fc51e0bc4db22fabd http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=982134ba62618c2d69fbbbd166d0a11ee3b7e3d8 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bc0b96b54a21246e377122d54569eef71cec535f http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f17722f917b2f21497deb6edc62fb1683daa08e6 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f8bd2258e2d520dff28c855658bd24bdafb5102d https://oss.oracle.com/git/?p=redpatch.git%3Ba=commit%3Bh=fadca7bdc43b02f518585d9547019966415cadfd https://support.f5.com/csp/article/K15301?utm_source=f5support&%3Butm_medium=RSS linux.git:commit:3321c07ae5068568cd61ac9f4ba749006a7185c9 rh#684671 rh#697394 rh#715436 rh#716538 rh#722393 rh#722557 rh#723429 rh#726552 rh#729465 rh#730341 rh#730917 rh#731172 rh#732629 rh#732658 rh#732869 rh#732878 rh#736425 rh#814278 |
CVE-2009-4131 | kernel-source-rt:Not affected | important | () | BID:37277 CONFIRM:git.kernel.org:CVE-2009-4131 CONFIRM:www.kernel.org:CVE-2009-4307 CVE-2009-4131 FEDORA:FEDORA-2009-13039 MANDRIVA:MDVSA-2009:329 MISC:git.kernel.org:/ MISC:www.theregister.co.uk:CVE-2009-4131 MLIST:[linux-kernel] 20091209 [GIT PULL] ext4 updates for v2.6.33 RH:CVE-2009-4131 SECUNIA:37658 SECUNIA:37686 SECUNIA:38017 SMASH Issue 64259 SUSE:SUSE-SA:2010:001 UBUNTU:CVE-2009-4131 UBUNTU:USN-869-1 VUPEN:ADV-2009-3468 bnc#561018 rh#544471 rh#547263 |
CVE-2009-4272 | kernel-source-rt:Unsupported | important | () | CONFIRM:git.kernel.org:CVE-2009-4272 CONFIRM:support.avaya.com:CVE-2009-4272 CONFIRM:www.kernel.org:CVE-2009-4272 CVE-2009-4272 MISC:git.kernel.org:/ MLIST:[oss-security] 20100120 CVE-2009-4272 kernel: emergency route cache flushing leads to node deadlock MLIST:[oss-security] 20100120 Re: CVE-2009-4272 kernel: emergency route cache flushing leads to node deadlock OVAL:oval:org.mitre.oval:def:11167 OVAL:oval:org.mitre.oval:def:7026 RH:CVE-2009-4272 RHSA-2010:0046 RHSA-2010:0095 SMASH Issue 64496 UBUNTU:CVE-2009-4272 XF:linux-kernel-routing-dos(55808) bnc#572190 rh#545411 |
CVE-2009-4306 | kernel-source-rt:Not affected | moderate | () | CVE-2009-4306 MISC:twitter.com:CVE-2009-4306 RH:CVE-2009-4306 SMASH Issue 64518 UBUNTU:CVE-2009-4306 bnc#564380 rh#547263 |
CVE-2009-4307 | kernel-source-rt:Not affected | important | () | CONFIRM:bugzilla.kernel.org:CVE-2009-4307 CONFIRM:git.kernel.org:CVE-2009-4307 CVE-2009-4307 DSA-2443 RH:CVE-2009-4307 RHSA-2010:0178 RHSA-2010:0380 RHSA-2012:1445 RHSA-2012:1580 SMASH Issue 64520 UBUNTU:CVE-2009-4307 bnc#564381 linux.git:commit:d50f2ab6f050311dbf7b8f5501b25f0bf64a439b rh#547251 rh#809687 |
CVE-2009-4308 | kernel-source-rt:Not affected | important | () | CONFIRM:git.kernel.org:CVE-2009-4308 CVE-2009-4308 RH:CVE-2009-4308 RHSA-2010:0147 SMASH Issue 64521 UBUNTU:CVE-2009-4308 bnc#564382 rh#547255 |
CVE-2009-4536 | kernel-source-rt:Not affected | important | () | BID:37519 CONFIRM:marc.info:CVE-2009-4536 CVE-2009-4536 DSA-2003 MISC:blog.c22.cc:CVE-2009-4537 MLIST:[oss-security] 20091228 CVE requests - kernel security regressions for CVE-2009-1385/and -1389 MLIST:[oss-security] 20091229 Re: CVE requests - kernel security regressions for CVE-2009-1385/and -1389 MLIST:[oss-security] 20091231 Re: CVE requests - kernel security regressions for CVE-2009-1385/and -1389 RH:CVE-2009-4536 RHSA-2010:0019 RHSA-2010:0020 RHSA-2010:0041 RHSA-2010:0053 RHSA-2010:0079 RHSA-2010:0095 RHSA-2010:0111 RHSA-2010:0882 SECTRACK:1023420 SECUNIA:38031 SECUNIA:38610 SMASH Issue 44865 UBUNTU:CVE-2009-4536 XF:kernel-e1000main-security-bypass(55648) bnc#583167 bnc#583434 rh#550907 rh#551214 rh#552126 |
CVE-2009-4537 | kernel-source-rt:Not affected | important | () | BID:37521 CONFIRM:marc.info:CVE-2009-4537 CVE-2009-4537 MISC:twitter.com:CVE-2009-4537 MLIST:[linux-netdev] 20091228 [PATCH RFC] r8169: straighten out overlength frame detection RH:CVE-2009-4537 RHSA-2010:0019 RHSA-2010:0020 RHSA-2010:0041 RHSA-2010:0053 RHSA-2010:0079 RHSA-2010:0095 RHSA-2010:0111 SECTRACK:1023419 SMASH Issue 42154 UBUNTU:CVE-2009-4537 XF:kernel-r8169-dos(55647) bdo#573071 linux.git:commit:6631424fd2efd75e7394b318ad2a8597327857a9 linux.git:commit:c0cd884af045338476b8e69a61fceb3f34ff22f1 rh#550907 |
CVE-2009-4538 | kernel-source-rt:Not affected | critical | () | BID:37523 CVE-2009-4538 RH:CVE-2009-4538 RHSA-2010:0019 RHSA-2010:0020 RHSA-2010:0041 RHSA-2010:0053 RHSA-2010:0079 RHSA-2010:0095 RHSA-2010:0111 SMASH Issue 46118 UBUNTU:CVE-2009-4538 XF:kernel-edriver-unspecified(55645) linux.git:commit:b94b50289622e816adc9f94111cfc2679c80177c rh#551214 |
CVE-2009-4880 | glibc:Analysis | moderate | () | BID:36443 CONFIRM:sources.redhat.com:CVE-2009-4881 CONFIRM:sourceware.org:CVE-2009-4880 CVE-2009-4880 RH:CVE-2009-4880 SMASH Issue 65506 SREASONRES:20090917 glibc x<=2.10.1 stdio/strfmon.c Multiple Vulnerabilities UBUNTU:CVE-2009-4880 XF:gnuclibrary-strfmon-overflow(59242) bdo#583908 rh#524671 rh#599070 |
CVE-2009-4881 | glibc:Analysis | moderate | () | CONFIRM:sourceware.org:CVE-2009-4881 CVE-2009-4881 RH:CVE-2009-4881 SMASH Issue 65508 UBUNTU:CVE-2009-4881 XF:gnuclibrary-vstrfmonl-overflow(59241) bdo#583908 rh#599095 |
CVE-2009-5079 | groff:Analysis | low | () | CVE-2009-5079 RH:CVE-2009-5079 SMASH Issue 65792 UBUNTU:CVE-2009-5079 bnc#703664 |
CVE-2009-5082 | groff:Analysis | low | () | CVE-2009-5082 RH:CVE-2009-5082 SMASH Issue 65796 UBUNTU:CVE-2009-5082 bnc#703667 |
CVE-2009-5155 | glibc:Not affected | low | 4 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | CONFIRM:security.netapp.com:CVE-2009-5155 CONFIRM:support.f5.com:CVE-2009-5155 CVE-2009-5155 L3:53935 L3:54120 MISC:debbugs.gnu.org:CVE-2009-5155 MISC:git.savannah.gnu.org:CVE-2009-5155 MISC:sourceware.org:CVE-2009-5155 MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 RH:CVE-2009-5155 SMASH Issue 225350 UBUNTU:CVE-2009-5155 bnc#1127223 rh#1683683 rh#1684057 |
CVE-2010-0003 | kernel-source-rt:Not affected | moderate | () | BID:37724 BUGTRAQ:20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX CONFIRM:git.kernel.org:CVE-2010-0003 CONFIRM:patchwork.kernel.org:CVE-2010-0003 CONFIRM:www.kernel.org:CVE-2010-0291 CONFIRM:www.vmware.com:CVE-2010-1087 CVE-2010-0003 DSA-1996 DSA-2005 FEDORA:FEDORA-2010-0919 MLIST:[oss-security] 20100112 CVE request - kernel: infoleak if print-fatal-signals=1 MLIST:[oss-security] 20100113 Re: CVE request - kernel: infoleak if print-fatal-signals=1 RH:CVE-2010-0003 RHSA-2010:0146 RHSA-2010:0147 RHSA-2010:0161 SECUNIA:38333 SECUNIA:38492 SECUNIA:38779 SECUNIA:39033 SECUNIA:43315 SMASH Issue 28177 SUSE:SUSE-SA:2010:010 SUSE:SUSE-SA:2010:012 SUSE:SUSE-SA:2010:014 UBUNTU:CVE-2010-0003 bnc#569902 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b45c6e76bc2c72f6426c14bed64fdcbc9bf37cb0 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10550 rh#554578 |
CVE-2010-0006 | kernel-source-rt:Not affected | important | () | BID:37810 CONFIRM:bugs.gentoo.org:CVE-2010-0006 CONFIRM:git.kernel.org:CVE-2010-0006 CONFIRM:security-tracker.debian.org:/tracker/CVE-2010-0006 CONFIRM:security-tracker.debian.org:CVE-2010-0006 CONFIRM:www.kernel.org:CVE-2010-0291 CVE-2010-0006 FEDORA:FEDORA-2010-0919 MISC:cert.fi:CVE-2010-0006 MISC:git.kernel.org:/ MLIST:[linux-netdev] 20100114 [PATCH]: ipv6: skb_dst() can be NULL in ipv6_hop_jumbo(). MLIST:[oss-security] 20100114 CVE-2010-0006 - kernel: ipv6: skb_dst() can be NULL in ipv6_hop_jumbo() OSVDB:61876 RH:CVE-2010-0006 SECUNIA:38168 SECUNIA:38333 SMASH Issue 28196 SUSE:SUSE-SA:2010:010 UBUNTU:CVE-2010-0006 bnc#570608 rh#555217 |
CVE-2010-0007 | kernel-source-rt:Not affected | moderate | () | BID:37762 BUGTRAQ:20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX CONFIRM:git.kernel.org:CVE-2010-0007 CONFIRM:www.kernel.org:CVE-2010-0007 CONFIRM:www.vmware.com:CVE-2010-1087 CVE-2010-0007 DSA-1996 DSA-2003 DSA-2005 FEDORA:FEDORA-2010-0919 MANDRIVA:MDVSA-2011:051 MLIST:[oss-security] 20100113 CVE Request: kernel ebtables perm check MLIST:[oss-security] 20100114 Re: CVE Request: kernel ebtables perm check RH:CVE-2010-0007 RHSA-2010:0146 RHSA-2010:0147 RHSA-2010:0161 SECUNIA:38133 SECUNIA:38296 SMASH Issue 28206 SUSE:SUSE-SA:2010:007 SUSE:SUSE-SA:2010:010 SUSE:SUSE-SA:2010:012 SUSE:SUSE-SA:2010:013 SUSE:SUSE-SA:2010:014 UBUNTU:CVE-2010-0007 VUPEN:ADV-2010-0109 XF:kernel-ebtables-security-bypass(55602) bnc#570602 bnc#570606 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=dce766af541f6605fa9889892c0280bab31c66ab https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9630 rh#555238 |
CVE-2010-0008 | kernel-source-rt:Not affected | important | () | BUGTRAQ:20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX CONFIRM:git.kernel.org:CVE-2010-0008 CONFIRM:www.kernel.org:CVE-2007-6716 CONFIRM:www.vmware.com:CVE-2010-1087 CVE-2010-0008 MISC:git.kernel.org:/ MLIST:[oss-security] 20100317 CVE-2010-0008 kernel: sctp remote denial of service OVAL:oval:org.mitre.oval:def:11160 RH:CVE-2010-0008 RHSA-2010:0146 RHSA-2010:0147 RHSA-2010:0148 RHSA-2010:0149 RHSA-2010:0172 RHSA-2010:0342 SECUNIA:39295 SECUNIA:43315 SMASH Issue 28216 UBUNTU:CVE-2010-0008 bnc#586195 rh#555658 |
CVE-2010-0307 | kernel-source-rt:Not affected | moderate | () | BID:38027 BUGTRAQ:20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX CONFIRM:git.kernel.org:CVE-2010-0307 CONFIRM:marc.info:CVE-2010-0307 CONFIRM:support.avaya.com:CVE-2010-1086 CONFIRM:www.kernel.org:CVE-2010-0410 CONFIRM:www.vmware.com:CVE-2010-1087 CVE-2010-0307 DSA-1996 FEDORA:FEDORA-2010-1787 MANDRIVA:MDVSA-2010:066 MISC:www.globalsecuritymag.com:CVE-2010-0307 MLIST:[linux-mm] 20100128 DoS on x86_64 MLIST:[oss-security] 20100201 CVE request - kernel: DoS on x86_64 MLIST:[oss-security] 20100201 Re: CVE request - kernel: DoS on x86_64 MLIST:[oss-security] 20100203 Re: CVE request - kernel: DoS on x86_64 MLIST:[oss-security] 20100204 Re: CVE request - kernel: DoS on x86_64 RH:CVE-2010-0307 RHSA-2010:0146 RHSA-2010:0398 RHSA-2010:0771 SECUNIA:38922 SECUNIA:39649 SMASH Issue 29541 SUSE:SUSE-SA:2010:014 UBUNTU:CVE-2010-0307 UBUNTU:USN-914-1 VUPEN:ADV-2010-0638 bnc#575644 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=221af7f87b97431e3ee21ce4b0e77d5411cf1549 http://www.globalsecuritymag.com/Vigil-nce-Linux-kernel-denial-of%2C20100202%2C15754.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10870 rh#560547 |
CVE-2010-0410 | kernel-source-rt:Not affected | moderate | () | BID:38058 BUGTRAQ:20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX CONFIRM:git.kernel.org:CVE-2010-0410 CONFIRM:support.avaya.com:CVE-2010-1086 CONFIRM:www.kernel.org:CVE-2010-0410 CONFIRM:www.vmware.com:CVE-2010-1087 CVE-2010-0410 DSA-1996 DSA-2003 DSA-2005 FEDORA:FEDORA-2010-1787 FEDORA:FEDORA-2010-1804 MANDRIVA:MDVSA-2010:088 MLIST:[oss-security] 20100203 CVE request: kernel OOM/crash in drivers/connector MLIST:[oss-security] 20100203 Re: CVE request: kernel OOM/crash in drivers/connector RH:CVE-2010-0410 RHSA-2010:0161 RHSA-2010:0398 SECUNIA:38557 SECUNIA:39742 SMASH Issue 29938 SUSE:SUSE-SA:2010:014 SUSE:SUSE-SA:2010:018 SUSE:SUSE-SA:2010:019 SUSE:SUSE-SA:2010:023 UBUNTU:CVE-2010-0410 UBUNTU:USN-914-1 VUPEN:ADV-2010-0638 bnc#576927 bnc#605463 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f98bfbd78c37c5946cc53089da32a5f741efdeb7 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10903 rh#561682 rh#566624 rh#569237 |
CVE-2010-0415 | kernel-source-rt:Not affected | moderate | () | BID:38144 BUGTRAQ:20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX CONFIRM:git.kernel.org:CVE-2010-0415 CONFIRM:www.kernel.org:CVE-2010-0623 CONFIRM:www.vmware.com:CVE-2010-1087 CVE-2010-0415 DSA-1996 DSA-2003 DSA-2005 FEDORA:FEDORA-2010-1787 FEDORA:FEDORA-2010-1804 MANDRIVA:MDVSA-2010:066 MANDRIVA:MDVSA-2010:198 MLIST:[oss-security] 20100207 CVE request: information leak / potential crash in sys_move_pages MLIST:[oss-security] 20100207 Re: CVE request: information leak / potential crash in sys_move_pages MLIST:[oss-security] 20100208 Re: CVE request: information leak / potential crash in sys_move_pages RH:CVE-2010-0415 RHSA-2010:0147 RHSA-2010:0161 SMASH Issue 29963 SUSE:SUSE-SA:2010:014 SUSE:SUSE-SA:2010:018 UBUNTU:CVE-2010-0415 UBUNTU:USN-914-1 VUPEN:ADV-2010-0638 bnc#577753 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6f5a55f1a6c5abee15a0e878e5c74d9f1569b8b0 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9399 rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#822754 |
CVE-2010-0622 | kernel-source-rt:Ignore | moderate | () | CONFIRM:git.kernel.org:CVE-2010-0622 CVE-2010-0622 DSA-2003 DSA-2012 MISC:git.kernel.org:MLIST:[oss-security] 20100211 Re: CVE request - kernel: futex: Handle user space corruption gracefully MLIST:[oss-security] 20100209 CVE request - kernel: futex: Handle user space corruption gracefully MLIST:[oss-security] 20100211 Re: CVE request - kernel: futex: Handle user space corruption gracefully RH:CVE-2010-0622 RHSA-2010:0161 RHSA-2010:0504 SECUNIA:38905 SMASH Issue 30747 UBUNTU:CVE-2010-0622 bdo#568561 bdo#570554 bnc#579439 rh#562582 rh#563091 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#822754 |
CVE-2010-0623 | kernel-source-rt:Not affected | moderate | () | CONFIRM:bugzilla.kernel.org:CVE-2010-0623 CONFIRM:git.kernel.org:CVE-2010-0623 CONFIRM:www.kernel.org:CVE-2010-0623 CVE-2010-0623 MANDRIVA:MDVSA-2010:088 MLIST:[oss-security] 20100211 Re: CVE request - kernel: futex: Handle user space corruption gracefully RH:CVE-2010-0623 SECUNIA:38922 SMASH Issue 30751 SUSE:SUSE-SA:2010:018 UBUNTU:CVE-2010-0623 UBUNTU:USN-914-1 VUPEN:ADV-2010-0638 rh#566023 |
CVE-2010-0727 | kernel-source-rt:Ignore | moderate | () | CONFIRM:www.kernel.org:CVE-2010-0727 CVE-2010-0727 DSA-2053 MANDRIVA:MDVSA-2010:066 MLIST:[linux-kernel] 20100311 [PATCH 3/3] GFS2: Skip check for mandatory locks when unlocking MLIST:[oss-security] 20100312 CVE-2010-0727 kernel: gfs/gfs2 locking code DoS flaw OVAL:oval:org.mitre.oval:def:11392 RH:CVE-2010-0727 RHSA-2010:0178 RHSA-2010:0291 RHSA-2010:0330 RHSA-2010:0331 RHSA-2010:0380 RHSA-2010:0521 SECTRACK:1023809 SECUNIA:39830 SMASH Issue 31169 UBUNTU:CVE-2010-0727 bdo#573071 bnc#589280 rh#562582 rh#570863 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#822754 |
CVE-2010-0730 | kernel-source-rt:Not affected | low | () | CVE-2010-0730 RH:CVE-2010-0730 RHSA-2010:0398 SMASH Issue 31181 UBUNTU:CVE-2010-0730 bnc#601231 rh#572971 |
CVE-2010-0741 | kernel-source-rt:Not affected | important | () | CONFIRM:bugs.edge.launchpad.net:CVE-2010-0741 CONFIRM:git.kernel.org:CVE-2010-0741 CONFIRM:patchwork.kernel.org:CVE-2010-0741 CVE-2010-0741 MISC:git.kernel.org:/ MLIST:[oss-security] 20100329 CVE-2010-0741 qemu: Improper handling of erroneous data provided by Linux virtio-net driver MLIST:[qemu-devel] 20091029 Re: qemu-kvm-0.11 regression, crashes on older guests with virtio network MLIST:[qemu-devel] 20091029 [PATCH] whitelist host virtio networking features [was Re: qemu-kvm-0.11 regression, crashes on older ...] OVAL:oval:org.mitre.oval:def:11143 RH:CVE-2010-0741 RHSA-2010:0271 RHSA-2010:0476 SECTRACK:1023798 SMASH Issue 31250 UBUNTU:CVE-2010-0741 VUPEN:ADV-2010-0760 bnc#596032 rh#577218 |
CVE-2010-1148 | kernel-source-rt:Not affected | moderate | () | BID:39186 CVE-2010-1148 MISC:xorl.wordpress.com:CVE-2010-1148 MLIST:[linux-cifs-client] 20100402 [patch] skip posix open if nameidata is null MLIST:[linux-cifs-client] 20100404 [patch] skip posix open if nameidata is null MLIST:[oss-security] 20100405 CVE request: kernel: cifs: cifs_create() NULL pointer dereference MLIST:[oss-security] 20100405 Re: CVE request: kernel: cifs: cifs_create() NULL pointer dereference RH:CVE-2010-1148 SECUNIA:39344 SMASH Issue 32847 UBUNTU:CVE-2010-1148 XF:linux-kernel-cifscreate-dos(57561) bnc#593940 rh#579445 |
CVE-2010-1162 | kernel-source-rt:Not affected | important | () | CONFIRM:git.kernel.org:CVE-2010-1162 CONFIRM:www.kernel.org:CVE-2010-1488 CVE-2010-1162 DSA-2053 MANDRIVA:MDVSA-2010:198 MLIST:[oss-security] 20100414 Couple of kernel issues MLIST:[oss-security] 20100414 Re: Couple of kernel issues MLIST:[oss-security] 20100415 CVE request: kernel: tty: release_one_tty() forgets to put pids MLIST:[oss-security] 20100415 Re: CVE request: kernel: tty: release_one_tty() forgets to put pids RH:CVE-2010-1162 RHSA-2010:0631 SMASH Issue 42683 SUSE:SUSE-SA:2010:031 UBUNTU:CVE-2010-1162 VUPEN:ADV-2010-1857 bdo#573071 bnc#596462 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6da8d866d0d39e9509ff826660f6a86a6757c966 rh#562582 rh#582068 rh#582076 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#822754 |
CVE-2010-1173 | kernel-source-rt:Not affected | important | () | BUGTRAQ:20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX CONFIRM:git.kernel.org:CVE-2010-1173 CONFIRM:kbase.redhat.com:CVE-2010-1173 CONFIRM:www.vmware.com:CVE-2010-1087 CVE-2010-1173 DSA-2053 MANDRIVA:MDVSA-2010:198 MISC:git.kernel.org:/ MLIST:[netdev] 20100428 Re: [PATCH]: sctp: Fix skb_over_panic resulting from multiple invalid parameter errors (CVE-2010-1173) (v4) MLIST:[oss-security] 20100429 CVE-2010-1173 kernel: skb_over_panic resulting from multiple invalid parameter errors MLIST:[oss-security] 20100429 Re: CVE-2010-1173 kernel: skb_over_panic resulting from multiple invalid parameter errors OVAL:oval:org.mitre.oval:def:11416 RH:CVE-2010-1173 RHSA-2010:0474 RHSA-2010:0504 RHSA-2010:0631 SECUNIA:39830 SECUNIA:40218 SECUNIA:43315 SMASH Issue 46119 UBUNTU:CVE-2010-1173 bdo#573071 bnc#600375 linux.git:commit:2e3219b5c8a2e44e0b83ae6e04f52f20a82ac0f2 linux.git:commit:5fa782c2f5ef6c2e4f04d3e228412c9b4a4c8809 linux.git:commit:7437e7d3672b6d23c08212c68752c9a9c25f8e9e rh#562582 rh#584645 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#822754 |
CVE-2010-1188 | kernel-source-rt:Not affected | important | () | BID:39016 CONFIRM:git.kernel.org:CVE-2010-1188 CVE-2010-1188 MLIST:[oss-security] 20100329 CVE request: kernel: ipv6: skb is unexpectedly freed (remote DoS) RH:CVE-2010-1188 RHSA-2010:0178 RHSA-2010:0380 RHSA-2010:0394 RHSA-2010:0424 RHSA-2010:0439 RHSA-2010:0882 SECTRACK:1023992 SECUNIA:39652 SMASH Issue 62338 UBUNTU:CVE-2010-1188 bnc#592571 rh#577711 |
CVE-2010-1436 | kernel-source-rt:Not affected | moderate | () | BUGTRAQ:20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX CONFIRM:www.vmware.com:CVE-2010-1087 CVE-2010-1436 MLIST:[oss-security] 20100427 CVE request - gfs2 kernel issue MLIST:[oss-security] 20100427 Re: CVE request - gfs2 kernel issue OVAL:oval:org.mitre.oval:def:10652 RH:CVE-2010-1436 RHSA-2010:0504 SECUNIA:43315 SMASH Issue 62776 UBUNTU:CVE-2010-1436 XF:kernel-gfs2quota-dos(58839) bnc#599957 rh#586006 |
CVE-2010-1437 | kernel-source-rt:Not affected | moderate | () | BID:39719 BUGTRAQ:20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX CONFIRM:patchwork.kernel.org:CVE-2010-1437 CONFIRM:www.vmware.com:CVE-2010-1087 CVE-2010-1437 DSA-2053 MLIST:[linux-kernel] 20100422 [PATCH 0/1][BUG][IMPORTANT] KEYRINGS: find_keyring_by_name() can gain the freed keyring MLIST:[linux-kernel] 20100430 [PATCH 2/7] KEYS: find_keyring_by_name() can gain access to a freed keyring MLIST:[linux-kernel] 20100503 Re: [PATCH 2/7] KEYS: find_keyring_by_name() can gain access to a freed keyring MLIST:[oss-security] 20100427 CVE request - kernel: find_keyring_by_name() can gain the freed keyring MLIST:[oss-security] 20100427 Re: CVE request - kernel: find_keyring_by_name() can gain the freed keyring OVAL:oval:org.mitre.oval:def:9715 RH:CVE-2010-1437 RHSA-2010:0474 RHSA-2010:0504 RHSA-2010:0631 SECUNIA:39830 SECUNIA:40218 SECUNIA:40645 SECUNIA:43315 SMASH Issue 42681 SUSE:SUSE-SA:2010:031 UBUNTU:CVE-2010-1437 VUPEN:ADV-2010-1857 XF:kernel-findkeyringbyname-dos(58254) bdo#573071 bnc#599955 rh#562582 rh#585094 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#822754 |
CVE-2010-1641 | kernel-source-rt:Not affected | moderate | () | BID:40356 BUGTRAQ:20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX CONFIRM:git.kernel.org:CVE-2010-1641 CONFIRM:www.kernel.org:CVE-2010-1641 CONFIRM:www.vmware.com:CVE-2010-1087 CVE-2010-1641 MLIST:[cluster-devel] 20100525 [PATCH 3/3] GFS2: Fix permissions checking for setflags ioctl() MLIST:[oss-security] 20100525 CVE request - kernel: GFS2: The setflags ioctl() doesn't check file ownership MLIST:[oss-security] 20100525 Re: CVE request - kernel: GFS2: The setflags ioctl() doesn't check file ownership MLIST:[oss-security] 20100526 Re: CVE request - kernel: GFS2: The setflags ioctl() doesn't check file ownership RH:CVE-2010-1641 RHSA-2010:0504 SMASH Issue 42679 SUSE:SUSE-SA:2010:031 SUSE:SUSE-SA:2010:033 UBUNTU:CVE-2010-1641 VUPEN:ADV-2010-1857 XF:kernel-gfs2-security-bypass(58926) bnc#608576 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7df0e0397b9a18358573274db9fdab991941062f https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9916 rh#595579 |
CVE-2010-1643 | kernel-source-rt:Not affected | moderate | () | BID:40377 CONFIRM:git.kernel.org:CVE-2010-1643 CONFIRM:www.kernel.org:CVE-2010-1643 CVE-2010-1643 MANDRIVA:MDVSA-2010:198 MISC:vigilance.fr:CVE-2010-1643 MLIST:[oss-security] 20100526 CVE request - kernel: nfsd: fix vm overcommit crash MLIST:[oss-security] 20100526 Re: CVE request - kernel: nfsd: fix vm overcommit crash RH:CVE-2010-1643 RHSA-2010:0631 SMASH Issue 42680 SUSE:SUSE-SA:2010:031 UBUNTU:CVE-2010-1643 VUPEN:ADV-2010-1857 XF:linux-kernel-knfsd-dos(58957) bnc#608933 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=731572d39fcd3498702eda4600db4c43d51e0b26 rh#595970 |
CVE-2010-2066 | kernel-source-rt:Not affected | moderate | () | BUGTRAQ:20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX CONFIRM:git.kernel.org:CVE-2010-2066 CONFIRM:www.kernel.org:CVE-2010-4805 CONFIRM:www.vmware.com:CVE-2010-1087 CVE-2010-2066 MLIST:[oss-security] 20100607 CVE request - kernel: ext4: Make sure the MOVE_EXT ioctl can't overwrite append-only files MLIST:[oss-security] 20100609 Re: CVE request - kernel: ext4: Make sure the MOVE_EXT ioctl can't overwrite append-only files RH:CVE-2010-2066 RHSA-2010:0610 SECUNIA:43315 SMASH Issue 63733 SUSE:SUSE-SA:2010:033 UBUNTU:CVE-2010-2066 UBUNTU:USN-1000-1 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1f5a81e41f8b1a782c68d3843e9ec1bfaadf7d72 rh#601006 |
CVE-2010-2226 | kernel-source-rt:Not affected | moderate | () | BID:40920 BUGTRAQ:20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX CONFIRM:git.kernel.org:CVE-2010-2226 CONFIRM:www.kernel.org:CVE-2010-4805 CONFIRM:www.vmware.com:CVE-2010-1087 CVE-2010-2226 DSA-2094 MANDRIVA:MDVSA-2010:198 MLIST:[oss-security] 20100617 CVE request - kernel: xfs swapext ioctl issue MLIST:[oss-security] 20100618 Re: CVE request - kernel: xfs swapext ioctl issue MLIST:[xfs] 20100616 Re: [Security] XFS swapext ioctl minor security issues RH:CVE-2010-2226 RHSA-2010:0610 SECUNIA:43315 SMASH Issue 44051 SUSE:SUSE-SA:2010:060 SUSE:SUSE-SA:2011:007 UBUNTU:CVE-2010-2226 UBUNTU:USN-1000-1 VUPEN:ADV-2011-0298 bdo#589179 bnc#615141 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1817176a86352f65210139d4c794ad2d19fc6b63 rh#605158 |
CVE-2010-2240 | kernel-source-rt:Not affected | important | () | BUGTRAQ:20110428 VMSA-2011-0007 VMware ESXi and ESX Denial of Service and third party updates for Likewise components and ESX Service Console CONFIRM:git.kernel.org:CVE-2010-2240 CONFIRM:www.kernel.org:CVE-2010-2240 CONFIRM:www.kernel.org:CVE-2010-2946 CONFIRM:www.vmware.com:CVE-2009-4536 CONFIRM:www.vmware.com:CVE-2011-1786 CVE-2010-2240 DSA-2094 MANDRIVA:MDVSA-2010:172 MANDRIVA:MDVSA-2010:198 MANDRIVA:MDVSA-2011:051 MISC:git.kernel.org MISC:git.kernel.org:/ MISC:www.invisiblethingslab.com:CVE-2010-2240 MLIST:[security-announce] 20110428 VMSA-2011-0007 VMware ESXi and ESX Denial of Service and third party updates for Likewise components and ESX Service Console OSS:2017/Q2/500 OVAL:oval:org.mitre.oval:def:13247 RH:CVE-2010-2240 RHSA-2010:0631 RHSA-2010:0660 RHSA-2010:0661 RHSA-2010:0670 RHSA-2010:0676 RHSA-2010:0677 RHSA-2010:0882 SECTRACK:1024344 SMASH Issue 42571 SMASH Issue 42927 UBUNTU:CVE-2010-2240 bdo#589179 bnc#615929 bnc#618152 rh#606611 |
CVE-2010-2248 | kernel-source-rt:Not affected | important | () | BID:42242 BUGTRAQ:20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX CONFIRM:git.kernel.org:CVE-2010-2248 CONFIRM:www.kernel.org:CVE-2010-2248 CONFIRM:www.vmware.com:CVE-2010-1087 CVE-2010-2248 DSA-2094 MANDRIVA:MDVSA-2010:198 MANDRIVA:MDVSA-2011:051 MISC:git.kernel.org:/ MLIST:[oss-security] 20100628 CVE request - kernel: cifs: Fix a kernel BUG with remote OS/2 server MLIST:[oss-security] 20100628 Re: CVE request - kernel: cifs: Fix a kernel BUG with remote OS/2 server RH:CVE-2010-2248 RHSA-2010:0606 RHSA-2010:0610 RHSA-2010:0631 SECTRACK:1024285 SECUNIA:43315 SMASH Issue 63979 SUSE:SUSE-SA:2010:060 UBUNTU:CVE-2010-2248 UBUNTU:USN-1000-1 bdo#589179 bnc#618156 rh#608583 |
CVE-2010-2492 | kernel-source-rt:Not affected | important | () | BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console CONFIRM:git.kernel.org:CVE-2010-2492 CONFIRM:support.avaya.com:CVE-2010-3015 CONFIRM:www.kernel.org:CVE-2010-4805 CONFIRM:www.vmware.com:CVE-2011-1659 CVE-2010-2492 DSA-2110 MANDRIVA:MDVSA-2010:172 MANDRIVA:MDVSA-2010:198 MISC:git.kernel.org:/ RH:CVE-2010-2492 RHSA-2010:0723 RHSA-2011:0007 SECUNIA:42890 SECUNIA:46397 SMASH Issue 64320 UBUNTU:CVE-2010-2492 bnc#619850 linux.git:commit:a6f80fb7b5986fda663d94079d3bba0937a6b6ff rh#611385 |
CVE-2010-2495 | kernel-source-rt:Not affected | critical | () | CONFIRM:git.kernel.org:CVE-2010-2495 CONFIRM:www.kernel.org:CVE-2010-4263 CVE-2010-2495 MISC:git.kernel.org:/ MLIST:[oss-security] 20100623 kernel: l2tp: Fix oops in pppol2tp_xmit MLIST:[oss-security] 20100704 Re: CVE Request: kernel: l2tp: Fix oops in pppol2tp_xmit MLIST:[oss-security] 20100704 Re: kernel: l2tp: Fix oops in pppol2tp_xmit MLIST:[oss-security] 20100706 Re: CVE Request: kernel: l2tp: Fix oops in pppol2tp_xmit RH:CVE-2010-2495 SMASH Issue 64328 SUSE:SUSE-SA:2010:033 UBUNTU:CVE-2010-2495 UBUNTU:USN-1000-1 bnc#616612 rh#562582 rh#607054 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#822754 |
CVE-2010-2521 | kernel-source-rt:Not affected | critical | () | BID:42249 BUGTRAQ:20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX CONFIRM:git.kernel.org:CVE-2010-2521 CONFIRM:www.kernel.org:CVE-2010-2521 CONFIRM:www.vmware.com:CVE-2010-1087 CVE-2010-2521 DSA-2094 MANDRIVA:MDVSA-2010:198 MANDRIVA:MDVSA-2011:051 MISC:git.kernel.org:/ MLIST:[oss-security] 20100707 CVE request - kernel: nfsd4: bug in read_buf MLIST:[oss-security] 20100708 Re: CVE request - kernel: nfsd4: bug in read_buf RH:CVE-2010-2521 RHSA-2010:0606 RHSA-2010:0610 RHSA-2010:0631 RHSA-2010:0893 RHSA-2010:0907 SECTRACK:1024286 SECUNIA:43315 SMASH Issue 64368 SUSE:SUSE-SA:2010:040 UBUNTU:CVE-2010-2521 UBUNTU:USN-1000-1 VUPEN:ADV-2010-3050 bdo#589179 bnc#620372 rh#612028 |
CVE-2010-2524 | kernel-source-rt:Not affected | important | () | BUGTRAQ:20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX CONFIRM:git.kernel.org:CVE-2010-2524 CONFIRM:www.kernel.org:CVE-2010-4805 CONFIRM:www.vmware.com:CVE-2010-1087 CVE-2010-2524 DSA-2264 MANDRIVA:MDVSA-2010:172 MLIST:[oss-security] 20100802 CVE-2010-2524 kernel: dns_resolver upcall security issue MLIST:[oss-security] 20100802 Re: CVE-2010-2524 kernel: dns_resolver upcall security issue MLIST:[oss-security] 20100803 Re: CVE-2010-2524 kernel: dns_resolver upcall security issue RH:CVE-2010-2524 RHSA-2010:0610 SECUNIA:43315 SMASH Issue 42984 SUSE:SUSE-SA:2010:040 UBUNTU:CVE-2010-2524 UBUNTU:USN-1000-1 bdo#618485 bnc#627386 bnc#627447 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4c0c03ca54f72fdd5912516ad0a23ec5cf01bda7 linux.git:commit:4c0c03ca54f72fdd5912516ad0a23ec5cf01bda7 rh#562582 rh#612166 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#822754 |
CVE-2010-2632 | glibc:Unsupported | moderate | () | CONFIRM:kb.juniper.net:CVE-2010-2632 CONFIRM:support.avaya.com:CVE-2010-2632 CVE-2010-2632 OSS:2017/Q2/111 RHSA-2011:0337 SECTRACK:1024975 SECUNIA:42984 SECUNIA:43433 SECUNIA:55212 SMASH Issue 64526 SREASONRES:20101007 Multiple Vendors libc/glob(3) resource exhaustion (+0day remote ftpd-anon) VUPEN:ADV-2011-0151 XF:solaris-ftp-dos(64798) bnc#644882 rh#681667 rh#681681 rh#681698 |
CVE-2010-2798 | kernel-source-rt:Not affected | important | () | BID:42124 BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console CONFIRM:git.kernel.org:CVE-2010-2798 CONFIRM:support.avaya.com:CVE-2010-3015 CONFIRM:www.kernel.org:CVE-2010-4805 CONFIRM:www.vmware.com:CVE-2011-1659 CVE-2010-2798 DSA-2094 MANDRIVA:MDVSA-2010:198 MISC:git.kernel.org:/ MLIST:[oss-security] 20100802 CVE request: kernel: gfs2: rename cases kernel panic MLIST:[oss-security] 20100802 Re: CVE request: kernel: gfs2: rename cases kernel panic RH:CVE-2010-2798 RHSA-2010:0660 RHSA-2010:0670 RHSA-2010:0723 SECTRACK:1024386 SECUNIA:46397 SMASH Issue 42983 SUSE:SUSE-SA:2010:040 SUSE:SUSE-SA:2010:054 UBUNTU:CVE-2010-2798 UBUNTU:USN-1000-1 bdo#589179 bnc#627386 rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#822754 |
CVE-2010-2803 | kernel-source-rt:Not affected | important | () | CONFIRM:git.kernel.org:CVE-2010-2803 CONFIRM:www.kernel.org:CVE-2010-2959 CVE-2010-2803 DSA-2094 MANDRIVA:MDVSA-2010:198 RH:CVE-2010-2803 RHSA-2010:0842 SECUNIA:41512 SMASH Issue 43356 SUSE:SUSE-SA:2010:040 SUSE:SUSE-SA:2010:041 SUSE:SUSE-SA:2010:054 SUSE:SUSE-SA:2011:007 UBUNTU:CVE-2010-2803 VUPEN:ADV-2010-2430 VUPEN:ADV-2011-0298 bdo#589179 bnc#628604 http://git.kernel.org/?p=linux/kernel/git/airlied/drm-2.6.git%3Ba=commit%3Bh=1b2f1489633888d4a06028315dc19d65768a1c05 http://git.kernel.org/?p=linux/kernel/git/airlied/drm-2.6.git%3Ba=commit%3Bh=b9f0aee83335db1f3915f4e42a5e21b351740afd http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b9f0aee83335db1f3915f4e42a5e21b351740afd linux.git:commit:b9f0aee83335db1f3915f4e42a5e21b351740afd rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#822754 |
CVE-2010-2942 | kernel-source-rt:Not affected | moderate | () | BID:42529 BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console CONFIRM:git.kernel.org:CVE-2010-2942 CONFIRM:patchwork.ozlabs.org:CVE-2010-2942 CONFIRM:support.avaya.com:CVE-2010-3015 CONFIRM:www.kernel.org:CVE-2010-2942 CONFIRM:www.vmware.com:CVE-2011-1659 CVE-2010-2942 MISC:git.kernel.org:/ MLIST:[oss-security] 20100818 CVE request - kernel: net sched memleak MLIST:[oss-security] 20100819 Re: CVE request - kernel: net sched memleak RH:CVE-2010-2942 RHSA-2010:0723 RHSA-2010:0771 RHSA-2010:0779 RHSA-2010:0839 RHSA-2011:0007 RHSA-2011:0330 SECUNIA:41512 SECUNIA:46397 SMASH Issue 43354 SUSE:SUSE-SA:2010:040 SUSE:SUSE-SA:2010:041 SUSE:SUSE-SA:2010:054 SUSE:SUSE-SA:2010:060 SUSE:SUSE-SA:2011:007 UBUNTU:CVE-2010-2942 UBUNTU:USN-1000-1 VUPEN:ADV-2010-2430 VUPEN:ADV-2011-0298 bnc#632309 rh#624903 rh#636386 |
CVE-2010-2943 | kernel-source-rt:Not affected | important | () | BID:42527 BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console CONFIRM:git.kernel.org:CVE-2010-2943 CONFIRM:support.avaya.com:CVE-2010-3015 CONFIRM:www.kernel.org:CVE-2010-4805 CONFIRM:www.vmware.com:CVE-2011-1659 CVE-2010-2943 MLIST:[linux-xfs] 20100620 [PATCH 0/4, V2] xfs: validate inode numbers in file handles correctly MLIST:[linux-xfs] 20100620 [PATCH 2/4] xfs: validate untrusted inode numbers during lookup MLIST:[linux-xfs] 20100620 [PATCH 3/4] xfs: rename XFS_IGET_BULKSTAT to XFS_IGET_UNTRUSTED MLIST:[linux-xfs] 20100620 [PATCH 4/4] xfs: remove block number from inode lookup code MLIST:[oss-security] 20100818 CVE request - kernel: xfs: stale data exposure MLIST:[oss-security] 20100819 Re: CVE request - kernel: xfs: stale data exposure MLIST:[xfs] 20100617 [PATCH] xfsqa: test open_by_handle() on unlinked and freed inode clusters V2 MLIST:[xfs] 20100618 Re: [PATCH] xfsqa: test open_by_handle() on unlinked and freed inode clusters V2 RH:CVE-2010-2943 RHSA-2010:0723 SECUNIA:42758 SECUNIA:43161 SECUNIA:46397 SMASH Issue 65092 UBUNTU:CVE-2010-2943 UBUNTU:USN-1041-1 UBUNTU:USN-1057-1 VUPEN:ADV-2011-0070 VUPEN:ADV-2011-0280 bnc#632317 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1920779e67cbf5ea8afef317777c5bf2b8096188 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7124fe0a5b619d65b739477b3b55a20bf805b06d http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7b6259e7a83647948fa33a736cc832310c8d85aa rh#562582 rh#620300 rh#621435 rh#624327 rh#624923 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#822754 |
CVE-2010-2954 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2010-2954 CONFIRM:www.kernel.org:CVE-2010-2954 CVE-2010-2954 DSA-2110 MISC:git.kernel.org:/ MISC:twitter.com:CVE-2010-2954 MLIST:[netdev] 20100830 [PATCH] irda: Correctly clean up self->ias_obj on irda_bind() failure. MLIST:[oss-security] 20100901 CVE-2010-2954 kernel: irda null ptr deref RH:CVE-2010-2954 SECUNIA:41234 SECUNIA:41512 SMASH Issue 43352 SUSE:SUSE-SA:2010:041 SUSE:SUSE-SA:2010:050 SUSE:SUSE-SA:2010:054 SUSE:SUSE-SA:2011:007 UBUNTU:CVE-2010-2954 UBUNTU:USN-1000-1 VUPEN:ADV-2010-2266 VUPEN:ADV-2010-2430 VUPEN:ADV-2011-0298 XF:kernel-irdabind-dos(61522) bnc#636112 rh#628770 |
CVE-2010-2959 | kernel-source-rt:Ignore | important | () | BID:42585 CONFIRM:git.kernel.org:CVE-2010-2959 CONFIRM:www.kernel.org:CVE-2010-2959 CVE-2010-2959 DSA-2094 FEDORA:FEDORA-2010-13903 MANDRIVA:MDVSA-2010:198 MISC:jon.oberheide.org:CVE-2010-2959 MLIST:[oss-security] 20100820 kernel: can: add limit for nframes and clean up signed/unsigned variables RH:CVE-2010-2959 SECUNIA:41512 SMASH Issue 44050 SUSE:SUSE-SA:2010:040 SUSE:SUSE-SA:2010:041 SUSE:SUSE-SA:2011:007 UBUNTU:CVE-2010-2959 VUPEN:ADV-2010-2430 VUPEN:ADV-2011-0298 bdo#589179 bnc#633581 rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#625699 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#822754 |
CVE-2010-2963 | kernel-source-rt:Ignore | important | () | BID:44242 CONFIRM:git.kernel.org:CVE-2010-2963 CONFIRM:www.kernel.org:CVE-2010-4655 CVE-2010-2963 DSA-2126 FEDORA:FEDORA-2010-18983 MANDRIVA:MDVSA-2010:257 MISC:www.outflux.net:CVE-2010-2963 RH:CVE-2010-2963 SECTRACK:1024710 SECUNIA:42745 SMASH Issue 43681 SUSE:SUSE-SA:2010:053 SUSE:SUSE-SA:2010:057 UBUNTU:CVE-2010-2963 UBUNTU:USN-1000-1 VUPEN:ADV-2010-3321 bnc#646045 linux.git:commit:afaef01c001537fa97a25092d7f54d764dc7d8c1 rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#642465 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#822754 |
CVE-2010-3015 | kernel-source-rt:Ignore | moderate | () | BID:42477 CONFIRM:git.kernel.org:CVE-2010-3015 CVE-2010-3015 MANDRIVA:MDVSA-2010:247 MLIST:[oss-security] 20100816 CVE request - kernel: integer overflow in ext4_ext_get_blocks() MLIST:[oss-security] 20100816 Re: CVE request - kernel: integer overflow in ext4_ext_get_blocks() MLIST:[oss-security] 20100817 Re: CVE request - kernel: integer overflow in ext4_ext_get_blocks() RH:CVE-2010-3015 RHSA-2010:0723 SMASH Issue 43355 UBUNTU:CVE-2010-3015 VUPEN:ADV-2010-3117 XF:kernel-stacksize-dos(61156) bdo#589179 bnc#631801 rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#822754 |
CVE-2010-3066 | kernel-source-rt:Not affected | moderate | () | BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console CONFIRM:git.kernel.org:CVE-2010-3066 CONFIRM:www.kernel.org:CVE-2007-6716 CONFIRM:www.vmware.com:CVE-2011-1659 CVE-2010-3066 RH:CVE-2010-3066 RHSA-2010:0839 SECTRACK:1024708 SMASH Issue 65317 UBUNTU:CVE-2010-3066 bnc#657944 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=87e2831c3fa39cbf6f7ab676bb5aef039b9659e2 rh#631716 |
CVE-2010-3067 | kernel-source-rt:Not affected | moderate | () | BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console CONFIRM:git.kernel.org:CVE-2010-3067 CONFIRM:www.kernel.org:CVE-2010-3067 CONFIRM:www.vmware.com:CVE-2011-1659 CVE-2010-3067 DSA-2126 MANDRIVA:MDVSA-2010:257 MANDRIVA:MDVSA-2011:029 MANDRIVA:MDVSA-2011:051 RH:CVE-2010-3067 RHSA-2010:0758 RHSA-2010:0779 RHSA-2010:0839 RHSA-2011:0007 SECUNIA:42778 SECUNIA:42801 SECUNIA:42890 SECUNIA:43291 SECUNIA:46397 SMASH Issue 43693 SUSE:SUSE-SA:2010:060 SUSE:SUSE-SA:2011:001 SUSE:SUSE-SA:2011:002 SUSE:SUSE-SA:2011:007 SUSE:SUSE-SA:2011:008 UBUNTU:CVE-2010-3067 UBUNTU:USN-1000-1 VUPEN:ADV-2011-0012 VUPEN:ADV-2011-0298 VUPEN:ADV-2011-0375 XF:kernel-doiosubmit-dos(61884) http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=75e1c70fc31490ef8a373ea2a4bea2524099b478 rh#629441 |
CVE-2010-3078 | kernel-source-rt:Not affected | moderate | () | BID:43022 BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console CONFIRM:git.kernel.org:CVE-2010-3078 CONFIRM:www.kernel.org:CVE-2010-3084 CONFIRM:www.vmware.com:CVE-2011-1659 CVE-2010-3078 DSA-2110 MISC:git.kernel.org:/ MLIST:[oss-security] 20100907 CVE request: kernel: xfs: XFS_IOC_FSGETXATTR ioctl memory leak MLIST:[oss-security] 20100907 Re: CVE request: kernel: xfs: XFS_IOC_FSGETXATTR ioctl memory leak MLIST:[xfs-masters] 20100906 [PATCH] xfs: prevent reading uninitialized stack memory RH:CVE-2010-3078 RHSA-2010:0839 RHSA-2011:0007 SECTRACK:1024418 SECUNIA:41284 SECUNIA:41512 SECUNIA:42890 SECUNIA:46397 SMASH Issue 43349 SUSE:SUSE-SA:2010:041 SUSE:SUSE-SA:2010:050 SUSE:SUSE-SA:2010:054 SUSE:SUSE-SA:2011:007 UBUNTU:CVE-2010-3078 UBUNTU:USN-1000-1 VUPEN:ADV-2010-2430 VUPEN:ADV-2011-0298 bnc#637436 rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#822754 |
CVE-2010-3079 | kernel-source-rt:Not affected | moderate | () | BID:43684 CONFIRM:git.kernel.org:CVE-2010-3079 CONFIRM:www.kernel.org:CVE-2010-3079 CVE-2010-3079 RH:CVE-2010-3079 RHSA-2010:0842 SECUNIA:42758 SMASH Issue 44049 SUSE:SUSE-SA:2010:050 SUSE:SUSE-SA:2011:007 UBUNTU:CVE-2010-3079 UBUNTU:USN-1041-1 VUPEN:ADV-2011-0070 VUPEN:ADV-2011-0298 bnc#637502 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9c55cb12c1c172e2d51e85fbb5a4796ca86b77e7 linux.git:commit:df09162550fbb53354f0c88e85b5d0e6129ee9cc rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#822754 |
CVE-2010-3080 | kernel-source-rt:Not affected | important | () | BID:43062 CONFIRM:git.kernel.org:CVE-2010-3080 CONFIRM:www.kernel.org:CVE-2010-3084 CVE-2010-3080 DSA-2110 MANDRIVA:MDVSA-2010:198 MISC:git.kernel.org:MLIST:[oss-security] 20100908 CVE-2010-3080 kernel: /dev/sequencer open failure is not handled correctly MLIST:[oss-security] 20100908 CVE-2010-3080 kernel: /dev/sequencer open failure is not handled correctly RH:CVE-2010-3080 RHSA-2011:0007 SECUNIA:42890 SMASH Issue 43348 SUSE:SUSE-SA:2010:050 SUSE:SUSE-SA:2010:054 SUSE:SUSE-SA:2011:007 UBUNTU:CVE-2010-3080 UBUNTU:USN-1000-1 VUPEN:ADV-2011-0298 bnc#638277 http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=c598337660c21c0afaa9df5a65bb4a7a0cf15be8 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=27f7ad53829f79e799a253285318bff79ece15bd linux.git:commit:27f7ad53829f79e799a253285318bff79ece15bd rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#822754 |
CVE-2010-3081 | kernel-source-rt:Not affected | important | () | BUGTRAQ:20101130 VMSA-2010-0017 VMware ESX third party update for Service Console kerne BUGTRAQ:20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX CONFIRM:access.redhat.com:CVE-2010-3081 CONFIRM:git.kernel.org:CVE-2010-3081 CONFIRM:www.kernel.org:CVE-2010-3301 CONFIRM:www.vmware.com:CVE-2010-1087 CONFIRM:www.vmware.com:CVE-2010-3081 CVE-2010-3081 DSA-2110 FULLDISC:20100916 Ac1db1tch3z vs x86_64 Linux Kernel FULLDISC:20100916 Workaround for Ac1db1tch3z exploit. L3:34428 MANDRIVA:MDVSA-2010:198 MANDRIVA:MDVSA-2010:214 MANDRIVA:MDVSA-2010:247 MISC:blog.ksplice.com:CVE-2010-3081 MISC:git.kernel.org:/ MISC:isc.sans.edu:CVE-2010-3081 MISC:sota.gen.nz:CVE-2010-3081 MLIST:[oss-security] 20100916 CVE-2010-3081 kernel: 64-bit Compatibility Mode Stack Pointer Underflow RH:CVE-2010-3081 RHSA-2010:0704 RHSA-2010:0705 RHSA-2010:0711 RHSA-2010:0718 RHSA-2010:0719 RHSA-2010:0758 RHSA-2010:0842 RHSA-2010:0882 SECUNIA:42384 SECUNIA:43315 SMASH Issue 43174 SUSE:SUSE-SA:2010:050 SUSE:SUSE-SA:2011:007 SUSE:SUSE-SR:2010:017 UBUNTU:CVE-2010-3081 VUPEN:ADV-2010-3083 VUPEN:ADV-2010-3117 VUPEN:ADV-2011-0298 bnc#639709 rh#634457 |
CVE-2010-3084 | kernel-source-rt:Not affected | important | () | BID:43098 CONFIRM:git.kernel.org:CVE-2010-3084 CONFIRM:www.kernel.org:CVE-2010-3084 CVE-2010-3084 MISC:git.kernel.org:/ MLIST:[netdev] 20100907 [PATCH net-2.6] niu: Fix kernel buffer overflow for ETHTOOL_GRXCLSRLALL MLIST:[oss-security] 20100909 CVE request: kernel: niu buffer overflow for ETHTOOL_GRXCLSRLALL MLIST:[oss-security] 20100910 Re: CVE request: kernel: niu buffer overflow for ETHTOOL_GRXCLSRLALL RH:CVE-2010-3084 RHSA-2010:0842 SMASH Issue 44047 SUSE:SUSE-SA:2011:007 UBUNTU:CVE-2010-3084 UBUNTU:USN-1000-1 VUPEN:ADV-2011-0298 bnc#638274 rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#632069 rh#638085 rh#640036 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#822754 |
CVE-2010-3086 | kernel-source-rt:Not affected | moderate | () | BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console CONFIRM:git.kernel.org:CVE-2010-3086 CONFIRM:kerneltrap.org:CVE-2010-3086 CONFIRM:www.kernel.org:CVE-2010-3086 CONFIRM:www.vmware.com:CVE-2011-1659 CVE-2010-3086 MLIST:[oss-security] 20101110 CVE-2010-3086 kernel panic via futex RH:CVE-2010-3086 RHSA-2010:0839 SECTRACK:1024709 SMASH Issue 65357 SUSE:SUSE-SA:2010:060 UBUNTU:CVE-2010-3086 bnc#652595 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9d55b9923a1b7ea8193b8875c57ec940dc2ff027 rh#429412 rh#633170 |
CVE-2010-3296 | kernel-source-rt:Not affected | low | () | BID:43221 BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console CONFIRM:git.kernel.org:CVE-2010-3296 CONFIRM:www.kernel.org:CVE-2010-3298 CONFIRM:www.vmware.com:CVE-2011-1659 CVE-2010-3296 DSA-2126 MLIST:[linux-kernel] 20100911 [PATCH] drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory MLIST:[oss-security] 20100914 CVE request: kernel: numerous infoleaks MLIST:[oss-security] 20100914 Re: CVE request: kernel: numerous infoleaks RH:CVE-2010-3296 RHSA-2010:0771 RHSA-2011:0007 RHSA-2011:0017 RHSA-2011:0421 SECUNIA:41440 SECUNIA:42758 SECUNIA:42884 SECUNIA:46397 SMASH Issue 43350 SUSE:SUSE-SA:2010:050 SUSE:SUSE-SA:2010:054 SUSE:SUSE-SA:2011:007 UBUNTU:CVE-2010-3296 UBUNTU:USN-1041-1 VUPEN:ADV-2011-0070 VUPEN:ADV-2011-0298 bnc#639481 http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=49c37c0334a9b85d30ab3d6b5d1acb05ef2ef6de rh#633140 rh#633145 rh#633149 rh#633158 |
CVE-2010-3297 | kernel-source-rt:Not affected | low | () | BID:43229 CONFIRM:git.kernel.org:CVE-2010-3297 CONFIRM:www.kernel.org:CVE-2010-3298 CVE-2010-3297 DSA-2126 MANDRIVA:MDVSA-2011:051 MLIST:[linux-kernel] 20100911 [PATCH] drivers/net/eql.c: prevent reading uninitialized stack memory MLIST:[oss-security] 20100914 CVE request: kernel: numerous infoleaks MLIST:[oss-security] 20100914 Re: CVE request: kernel: numerous infoleaks RH:CVE-2010-3297 RHSA-2010:0771 RHSA-2011:0007 RHSA-2011:0017 RHSA-2011:0421 SECUNIA:41440 SECUNIA:42758 SECUNIA:43161 SMASH Issue 43351 SUSE:SUSE-SA:2010:050 SUSE:SUSE-SA:2010:054 SUSE:SUSE-SA:2011:007 UBUNTU:CVE-2010-3297 UBUNTU:USN-1041-1 UBUNTU:USN-1057-1 VUPEN:ADV-2011-0070 VUPEN:ADV-2011-0280 VUPEN:ADV-2011-0298 bnc#639482 http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=44467187dc22fdd33a1a06ea0ba86ce20be3fe3c rh#633140 rh#633145 rh#633149 rh#633158 |
CVE-2010-3298 | kernel-source-rt:Not affected | low | () | BID:43226 CONFIRM:git.kernel.org:CVE-2010-3298 CONFIRM:www.kernel.org:CVE-2010-3298 CVE-2010-3298 MLIST:[linux-kernel] 20100911 [PATCH] drivers/net/usb/hso.c: prevent reading uninitialized memory MLIST:[oss-security] 20100914 CVE request: kernel: numerous infoleaks MLIST:[oss-security] 20100914 Re: CVE request: kernel: numerous infoleaks RH:CVE-2010-3298 RHSA-2010:0771 RHSA-2011:0007 RHSA-2011:0017 RHSA-2011:0421 SECUNIA:41440 SECUNIA:42758 SECUNIA:42890 SMASH Issue 44048 SUSE:SUSE-SA:2010:050 SUSE:SUSE-SA:2011:007 UBUNTU:CVE-2010-3298 UBUNTU:USN-1041-1 VUPEN:ADV-2011-0070 VUPEN:ADV-2011-0298 bnc#639483 http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=7011e660938fc44ed86319c18a5954e95a82ab3e rh#633140 rh#633145 rh#633149 rh#633158 |
CVE-2010-3432 | kernel-source-rt:Not affected | important | () | BID:43480 BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console CONFIRM:git.kernel.org:CVE-2010-3432 CONFIRM:www.kernel.org:CVE-2010-3432 CONFIRM:www.vmware.com:CVE-2011-1659 CVE-2010-3432 DSA-2126 MISC:git.kernel.org:/ MLIST:[netdev] 20100915 [PATCH] net: SCTP remote/local Denial of Service vulnerability description and fix MLIST:[oss-security] 20100924 CVE Request -- Linux/SCTP DoS in sctp_packet_config() MLIST:[oss-security] 20100925 Re: CVE Request -- Linux/SCTP DoS in sctp_packet_config() RH:CVE-2010-3432 RHSA-2010:0842 RHSA-2010:0936 RHSA-2010:0958 RHSA-2011:0004 SECUNIA:42400 SECUNIA:42778 SECUNIA:42789 SECUNIA:46397 SMASH Issue 44062 SUSE:SUSE-SA:2011:001 SUSE:SUSE-SA:2011:007 UBUNTU:CVE-2010-3432 UBUNTU:USN-1000-1 VUPEN:ADV-2010-3113 VUPEN:ADV-2011-0012 VUPEN:ADV-2011-0024 VUPEN:ADV-2011-0298 bnc#641983 rh#637675 |
CVE-2010-3437 | kernel-source-rt:Not affected | moderate | () | BID:43551 CONFIRM:git.kernel.org:CVE-2010-3437 CONFIRM:www.kernel.org:CVE-2010-3437 CVE-2010-3437 DSA-2126 EXPLOIT-DB:15150 MANDRIVA:MDVSA-2011:029 MANDRIVA:MDVSA-2011:051 MISC:jon.oberheide.org:CVE-2010-3437 MLIST:[oss-security] 20100928 CVE request - kernel: pktcdvd ioctl dev_minor missing range check MLIST:[oss-security] 20100928 Re: CVE request - kernel: pktcdvd ioctl dev_minor missing range check RH:CVE-2010-3437 RHSA-2010:0842 SECUNIA:42778 SECUNIA:42801 SECUNIA:42932 SMASH Issue 43687 SUSE:SUSE-SA:2010:060 SUSE:SUSE-SA:2011:001 SUSE:SUSE-SA:2011:002 SUSE:SUSE-SA:2011:004 SUSE:SUSE-SA:2011:007 UBUNTU:CVE-2010-3437 UBUNTU:USN-1000-1 VUPEN:ADV-2011-0012 VUPEN:ADV-2011-0124 VUPEN:ADV-2011-0298 bnc#642486 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=252a52aa4fa22a668f019e55b3aac3ff71ec1c29 rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#822754 |
CVE-2010-3442 | kernel-source-rt:Not affected | moderate | () | BID:43787 BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console CONFIRM:git.kernel.org:CVE-2010-3442 CONFIRM:www.kernel.org:CVE-2010-3442 CONFIRM:www.vmware.com:CVE-2011-1659 CVE-2010-3442 DSA-2126 FEDORA:FEDORA-2010-18983 MANDRIVA:MDVSA-2010:257 MISC:git.kernel.org:MLIST:[oss-security] 20100929 Re: CVE request - kernel: prevent heap corruption in snd_ctl_new() MLIST:[oss-security] 20100929 CVE request - kernel: prevent heap corruption in snd_ctl_new() MLIST:[oss-security] 20100929 Re: CVE request - kernel: prevent heap corruption in snd_ctl_new() RH:CVE-2010-3442 RHSA-2010:0842 RHSA-2010:0936 RHSA-2010:0958 RHSA-2011:0004 SMASH Issue 43694 SUSE:SUSE-SA:2010:060 SUSE:SUSE-SA:2011:001 SUSE:SUSE-SA:2011:002 SUSE:SUSE-SA:2011:007 SUSE:SUSE-SA:2011:008 UBUNTU:CVE-2010-3442 UBUNTU:USN-1000-1 VUPEN:ADV-2010-3113 VUPEN:ADV-2010-3321 VUPEN:ADV-2011-0012 VUPEN:ADV-2011-0024 VUPEN:ADV-2011-0298 VUPEN:ADV-2011-0375 bnc#642484 http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=5591bf07225523600450edd9e6ad258bb877b779 rh#638478 |
CVE-2010-3477 | kernel-source-rt:Unsupported | low | () | BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console CONFIRM:git.kernel.org:CVE-2010-3477 CONFIRM:www.kernel.org:CVE-2010-3084 CONFIRM:www.vmware.com:CVE-2011-1659 CVE-2010-3477 DSA-2126 RH:CVE-2010-3477 RHSA-2010:0779 RHSA-2010:0839 RHSA-2011:0007 RHSA-2011:0330 SECTRACK:1024603 SECUNIA:42890 SECUNIA:46397 SMASH Issue 65970 UBUNTU:CVE-2010-3477 UBUNTU:USN-1000-1 rh#636386 |
CVE-2010-3698 | kernel-source-rt:Not affected | moderate | () | BID:44500 CONFIRM:git.kernel.org:CVE-2010-3698 CONFIRM:www.kernel.org:CVE-2010-4655 CVE-2010-3698 FEDORA:FEDORA-2010-18983 MANDRIVA:MDVSA-2011:029 RH:CVE-2010-3698 RHSA-2010:0842 RHSA-2010:0898 SECUNIA:42745 SMASH Issue 66094 UBUNTU:CVE-2010-3698 VUPEN:ADV-2010-3123 VUPEN:ADV-2010-3321 bnc#1161450 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9581d442b9058d3699b4be568b6e5eae38a41493 linux.git:commit:9581d442b9058d3699b4be568b6e5eae38a41493 rh#639879 |
CVE-2010-3705 | kernel-source-rt:Not affected | important | () | CONFIRM:git.kernel.org:CVE-2010-3705 CONFIRM:www.kernel.org:CVE-2010-4655 CVE-2010-3705 DSA-2126 FEDORA:FEDORA-2010-18983 MANDRIVA:MDVSA-2011:029 MISC:git.kernel.org:/ MLIST:[linux-kernel] 20101001 [PATCH] Fix out-of-bounds reading in sctp_asoc_get_hmac() MLIST:[oss-security] 20101004 CVE request: kernel: SCTP memory corruption in HMAC handling MLIST:[oss-security] 20101004 Re: CVE request: kernel: SCTP memory corruption in HMAC handling RH:CVE-2010-3705 RHSA-2010:0842 RHSA-2010:0958 SECUNIA:42745 SMASH Issue 66097 UBUNTU:CVE-2010-3705 UBUNTU:USN-1000-1 VUPEN:ADV-2010-3321 bnc#643513 rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#822754 |
CVE-2010-3858 | kernel-source-rt:Not affected | moderate | () | BID:44301 BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console CONFIRM:git.kernel.org:CVE-2010-3858 CONFIRM:www.kernel.org:CVE-2010-4655 CONFIRM:www.vmware.com:CVE-2011-1659 CVE-2010-3858 DSA-2126 EXPLOIT-DB:15619 MANDRIVA:MDVSA-2010:257 MISC:grsecurity.net:CVE-2010-4243 MLIST:[oss-security] 20101021 CVE request: kernel: setup_arg_pages: diagnose excessive argument size MLIST:[oss-security] 20101022 Re: CVE request: kernel: setup_arg_pages: diagnose excessive argument size RH:CVE-2010-3858 RHSA-2010:0958 RHSA-2011:0004 RHSA-2011:0836 SECUNIA:42758 SECUNIA:42789 SECUNIA:46397 SMASH Issue 66187 UBUNTU:CVE-2010-3858 UBUNTU:USN-1041-1 VUPEN:ADV-2011-0024 VUPEN:ADV-2011-0070 bnc#648302 bnc#655220 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1b528181b2ffa14721fb28ad1bd539fe1732c583 rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#645222 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#822754 |
CVE-2010-3859 | kernel-source-rt:Unsupported | moderate | () | BID:44354 BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console CONFIRM:git.kernel.org:CVE-2010-4160 CONFIRM:www.kernel.org:CVE-2010-4347 CONFIRM:www.vmware.com:CVE-2011-1659 CVE-2010-3859 DSA-2126 MANDRIVA:MDVSA-2011:029 MLIST:[netdev] 20101021 TIPC security issues MLIST:[netdev] 20101027 Re: [PATCH 1/4] tipc: Fix bugs in tipc_msg_calc_data_size() MLIST:[netdev] 20101027 [PATCH 0/4] RFC: tipc int vs size_t fixes MLIST:[netdev] 20101027 [PATCH 1/4] tipc: Fix bugs in tipc_msg_calc_data_size() MLIST:[netdev] 20101027 [PATCH 2/4] tipc: Fix bugs in tipc_msg_build() MLIST:[netdev] 20101027 [PATCH 3/4] tipc: Update arguments to use size_t for iovec array sizes MLIST:[netdev] 20101027 [PATCH 4/4] tipc: Fix bugs in sending of large amounts of byte-stream data MLIST:[netdev] 20101028 Re: [PATCH 2/4] tipc: Fix bugs in tipc_msg_build() MLIST:[oss-security] 20101022 CVE request: kernel: heap overflow in TIPC MLIST:[oss-security] 20101022 Re: CVE request: kernel: heap overflow in TIPC RH:CVE-2010-3859 RHSA-2011:0004 RHSA-2011:0162 SECUNIA:42789 SECUNIA:42963 SECUNIA:46397 SMASH Issue 66188 UBUNTU:CVE-2010-3859 VUPEN:ADV-2011-0024 VUPEN:ADV-2011-0168 bnc#648624 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=253eacc070b114c2ec1f81b067d2fed7305467b0 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8acfe468b0384e834a303f08ebc4953d72fb690a rh#645867 |
CVE-2010-3861 | kernel-source-rt:Not affected | low | () | BID:44427 CONFIRM:git.kernel.org:CVE-2010-3861 CONFIRM:www.kernel.org:CVE-2010-4655 CVE-2010-3861 MLIST:[oss-security] 20101025 CVE request: kernel: heap contents leak from ETHTOOL_GRXCLSRLALL MLIST:[oss-security] 20101026 Re: CVE request: kernel: heap contents leak from ETHTOOL_GRXCLSRLALL RH:CVE-2010-3861 RHSA-2010:0958 RHSA-2011:0007 SECUNIA:42758 SECUNIA:42778 SECUNIA:42801 SECUNIA:42890 SECUNIA:42932 SMASH Issue 44060 SUSE:SUSE-SA:2011:001 SUSE:SUSE-SA:2011:002 SUSE:SUSE-SA:2011:004 SUSE:SUSE-SA:2011:007 UBUNTU:CVE-2010-3861 UBUNTU:USN-1041-1 VUPEN:ADV-2011-0012 VUPEN:ADV-2011-0070 VUPEN:ADV-2011-0124 VUPEN:ADV-2011-0298 bnc#649187 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ae6df5f96a51818d6376da5307d773baeece4014 rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#646725 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#822754 |
CVE-2010-3865 | kernel-source-rt:Not affected | important | () | BID:44549 BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console CONFIRM:www.vmware.com:CVE-2011-1659 CVE-2010-3865 MLIST:[netdev] 20101028 Re: [Security] TIPC security issues MLIST:[oss-security] 20101029 CVE request: kernel: iovec overflow in rds_rdma_pages() MLIST:[oss-security] 20101101 Re: CVE request: kernel: iovec overflow in rds_rdma_pages() RH:CVE-2010-3865 RHSA-2011:0004 RHSA-2011:0007 SECUNIA:42778 SECUNIA:42789 SECUNIA:42801 SECUNIA:42890 SECUNIA:46397 SMASH Issue 44063 SUSE:SUSE-SA:2010:057 SUSE:SUSE-SA:2011:001 SUSE:SUSE-SA:2011:002 SUSE:SUSE-SA:2011:007 UBUNTU:CVE-2010-3865 VUPEN:ADV-2011-0012 VUPEN:ADV-2011-0024 VUPEN:ADV-2011-0298 XF:kernel-rdsrdmapages-overflow(62881) bnc#650128 rh#647416 |
CVE-2010-3875 | kernel-source-rt:Not affected | important | () | BID:44630 CONFIRM:git.kernel.org:CVE-2010-3875 CONFIRM:www.kernel.org:CVE-2010-4248 CVE-2010-3875 DSA-2126 DSA-2240 DSA-2264 MANDRIVA:MDVSA-2011:029 MANDRIVA:MDVSA-2011:051 MLIST:[netdev] 20101031 [PATCH 1/3] net: ax25: fix information leak to userland MLIST:[oss-security] 20101102 CVE request: kernel stack infoleaks MLIST:[oss-security] 20101104 Re: CVE request: kernel stack infoleaks RH:CVE-2010-3875 SMASH Issue 46121 UBUNTU:CVE-2010-3875 bdo#618485 bnc#650897 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fe10ae53384e48c51996941b7720ee16995cbcb7 rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#649713 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#822754 |
CVE-2010-3876 | kernel-source-rt:Not affected | important | () | BID:44630 BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console CONFIRM:git.kernel.org:CVE-2010-3876 CONFIRM:www.kernel.org:CVE-2010-4248 CONFIRM:www.vmware.com:CVE-2011-1659 CVE-2010-3876 DSA-2126 MLIST:[netdev] 20101031 [PATCH 2/3] net: packet: fix information leak to userland MLIST:[oss-security] 20101102 CVE request: kernel stack infoleaks MLIST:[oss-security] 20101102 Re: CVE request: kernel stack infoleaks MLIST:[oss-security] 20101104 Re: CVE request: kernel stack infoleaks RH:CVE-2010-3876 RHSA-2010:0958 RHSA-2011:0004 RHSA-2011:0007 RHSA-2011:0162 SECUNIA:42789 SECUNIA:42890 SECUNIA:42963 SECUNIA:46397 SMASH Issue 46122 UBUNTU:CVE-2010-3876 VUPEN:ADV-2011-0024 VUPEN:ADV-2011-0168 bnc#650897 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=67286640f638f5ad41a946b9a3dc75327950248f rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#649715 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#822754 |
CVE-2010-3877 | kernel-source-rt:Not affected | important | () | BID:44630 BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console CONFIRM:git.kernel.org:CVE-2010-3877 CONFIRM:www.kernel.org:CVE-2010-4248 CONFIRM:www.vmware.com:CVE-2011-1659 CVE-2010-3877 DSA-2126 MANDRIVA:MDVSA-2011:029 MLIST:[netdev] 20101031 [PATCH 3/3] net: tipc: fix information leak to userland MLIST:[oss-security] 20101102 CVE request: kernel stack infoleaks MLIST:[oss-security] 20101104 Re: CVE request: kernel stack infoleaks RH:CVE-2010-3877 RHSA-2011:0017 SECUNIA:42884 SECUNIA:46397 SMASH Issue 46123 UBUNTU:CVE-2010-3877 XF:kernel-getname-info-disc(64578) bnc#650897 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=88f8a5e3e7defccd3925cabb1ee4d3994e5cdb52 rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#649717 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#822754 |
CVE-2010-3880 | kernel-source-rt:Not affected | moderate | () | BID:44665 BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console CONFIRM:git.kernel.org:CVE-2010-3880 CONFIRM:www.kernel.org:CVE-2010-4248 CONFIRM:www.vmware.com:CVE-2011-1659 CVE-2010-3880 DSA-2126 MLIST:[netdev] 20101103 [PATCH 2/2] inet_diag: Make sure we actually run the same bytecode we audited. MLIST:[oss-security] 20101104 CVE request: kernel: logic error in INET_DIAG bytecode auditing MLIST:[oss-security] 20101105 Re: CVE request: kernel: logic error in INET_DIAG bytecode auditing RH:CVE-2010-3880 RHSA-2010:0958 RHSA-2011:0004 RHSA-2011:0007 SECUNIA:42126 SECUNIA:42789 SECUNIA:42890 SECUNIA:46397 SMASH Issue 66197 UBUNTU:CVE-2010-3880 VUPEN:ADV-2011-0024 bnc#651599 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=22e76c849d505d87c5ecf3d3e6742a65f0ff4860 rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#822754 |
CVE-2010-3881 | kernel-source-rt:Not affected | low | () | BID:44666 CONFIRM:git.kernel.org:CVE-2010-3881 CONFIRM:www.kernel.org:CVE-2010-4347 CVE-2010-3881 MLIST:[kvm] 20101030 [patch v2] x86: kvm: x86: fix information leak to userland MLIST:[oss-security] 20101104 CVE request: kernel: kvm kernel stack leakage MLIST:[oss-security] 20101105 Re: CVE request: kernel: kvm kernel stack leakage RH:CVE-2010-3881 RHSA-2010:0998 RHSA-2011:0542 RHSA-2011:0883 SECTRACK:1024912 SECUNIA:42932 SMASH Issue 44061 SUSE:SUSE-SA:2011:004 SUSE:SUSE-SA:2011:007 UBUNTU:CVE-2010-3881 VUPEN:ADV-2010-3287 VUPEN:ADV-2011-0124 VUPEN:ADV-2011-0298 bnc#651596 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=97e69aa62f8b5d338d6cff49be09e37cc1262838 http://git.kernel.org/?p=virt/kvm/kvm.git%3Ba=commit%3Bh=831d9d02f9522e739825a51a11e3bc5aa531a905 rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#649920 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#822754 |
CVE-2010-3904 | kernel-source-rt:Not affected | important | () | BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console CERT-VN:VU#362983 CONFIRM:git.kernel.org:CVE-2010-3904 CONFIRM:www.kernel.org:CVE-2010-4655 CONFIRM:www.vmware.com:CVE-2011-1659 CVE-2010-3904 EXPLOIT-DB:44677 MISC:packetstormsecurity.com:CVE-2010-3904 MISC:www.vsecurity.com:CVE-2010-3904 RH:CVE-2010-3904 RHSA-2010:0792 RHSA-2010:0842 RHSA-2011:0542 SECTRACK:1024613 SECUNIA:46397 SMASH Issue 43385 SUSE:SUSE-SA:2010:053 SUSE:SUSE-SA:2010:057 SUSE:SUSE-SA:2011:007 UBUNTU:CVE-2010-3904 UBUNTU:USN-1000-1 VUPEN:ADV-2011-0298 rh#642896 rh#680345 |
CVE-2010-4072 | kernel-source-rt:Ignore | low | () | BID:45054 BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console CONFIRM:git.kernel.org:CVE-2010-4072 CONFIRM:www.kernel.org:CVE-2010-4075 CONFIRM:www.vmware.com:CVE-2011-1659 CVE-2010-4072 DSA-2126 MANDRIVA:MDVSA-2011:029 MANDRIVA:MDVSA-2011:051 MLIST:[linux-kernel] 20101006 [PATCH] ipc: initialize structure memory to zero for shmctl MLIST:[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures MLIST:[oss-security] 20101025 Re: CVE request: multiple kernel stack memory disclosures RH:CVE-2010-4072 RHSA-2010:0958 RHSA-2011:0007 RHSA-2011:0017 RHSA-2011:0162 SECUNIA:42758 SECUNIA:42778 SECUNIA:42884 SECUNIA:42890 SECUNIA:42932 SECUNIA:42963 SECUNIA:43161 SECUNIA:43291 SECUNIA:46397 SMASH Issue 43691 SUSE:SUSE-SA:2010:060 SUSE:SUSE-SA:2011:001 SUSE:SUSE-SA:2011:004 SUSE:SUSE-SA:2011:007 SUSE:SUSE-SA:2011:008 UBUNTU:CVE-2010-4072 UBUNTU:USN-1041-1 UBUNTU:USN-1057-1 VUPEN:ADV-2011-0012 VUPEN:ADV-2011-0070 VUPEN:ADV-2011-0124 VUPEN:ADV-2011-0168 VUPEN:ADV-2011-0280 VUPEN:ADV-2011-0298 VUPEN:ADV-2011-0375 bnc#642314 bnc#651216 rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#648656 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#822754 |
CVE-2010-4073 | kernel-source-rt:Ignore | low | () | BID:45073 BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console CONFIRM:git.kernel.org:CVE-2010-4073 CONFIRM:www.kernel.org:CVE-2010-4075 CONFIRM:www.vmware.com:CVE-2011-1659 CVE-2010-4073 DSA-2126 MANDRIVA:MDVSA-2011:029 MANDRIVA:MDVSA-2011:051 MLIST:[linux-kernel] 20101006 [PATCH v3] IPC: Initialize structure memory to zero for compat functions MLIST:[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures MLIST:[oss-security] 20101025 Re: CVE request: multiple kernel stack memory disclosures RH:CVE-2010-4073 RHSA-2010:0958 RHSA-2011:0007 RHSA-2011:0017 RHSA-2011:0162 SECUNIA:42778 SECUNIA:42884 SECUNIA:42890 SECUNIA:42932 SECUNIA:42963 SECUNIA:43291 SECUNIA:46397 SMASH Issue 43690 SREASON:8366 SUSE:SUSE-SA:2010:060 SUSE:SUSE-SA:2011:001 SUSE:SUSE-SA:2011:004 SUSE:SUSE-SA:2011:007 SUSE:SUSE-SA:2011:008 UBUNTU:CVE-2010-4073 VUPEN:ADV-2011-0012 VUPEN:ADV-2011-0124 VUPEN:ADV-2011-0168 VUPEN:ADV-2011-0298 VUPEN:ADV-2011-0375 bnc#642314 bnc#651216 rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#648658 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#822754 |
CVE-2010-4074 | kernel-source-rt:Ignore | moderate | () | BID:45074 CONFIRM:git.kernel.org:CVE-2010-4074 CONFIRM:www.kernel.org:CVE-2010-4082 CVE-2010-4074 DSA-2126 MISC:git.kernel.org:MLIST:[oss-security] 20100925 CVE request: multiple kernel stack memory disclosures MISC:userweb.kernel.org:MLIST:[oss-security] 20100925 CVE request: multiple kernel stack memory disclosures MLIST:[linux-kernel] 20100915 [PATCH] drivers/usb/serial/mos*: prevent reading uninitialized stack memory MLIST:[oss-security] 20100925 CVE request: multiple kernel stack memory disclosures MLIST:[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures MLIST:[oss-security] 20101025 Re: CVE request: multiple kernel stack memory disclosures RH:CVE-2010-4074 RHSA-2010:0958 RHSA-2011:0007 SECUNIA:42890 SMASH Issue 66348 UBUNTU:CVE-2010-4074 bnc#642309 rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#648659 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#822754 |
CVE-2010-4075 | kernel-source-rt:Ignore | moderate | () | BID:43806 BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console CONFIRM:www.kernel.org:CVE-2010-4075 CONFIRM:www.vmware.com:CVE-2011-1659 CVE-2010-4075 DSA-2264 MISC:git.kernel.org:CVE-2010-4077 MLIST:[linux-kernel] 20100915 [PATCH] drivers/serial/serial_core.c: prevent readinguninitialized stack memory MLIST:[oss-security] 20100925 CVE request: multiple kernel stack memory disclosures MLIST:[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures MLIST:[oss-security] 20101025 Re: CVE request: multiple kernel stack memory disclosures RH:CVE-2010-4075 RHSA-2010:0958 RHSA-2011:0007 RHSA-2011:0017 RHSA-2011:0162 SECUNIA:42884 SECUNIA:42890 SECUNIA:42963 SECUNIA:46397 SMASH Issue 46124 UBUNTU:CVE-2010-4075 VUPEN:ADV-2011-0168 bdo#618485 bnc#642309 rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#648660 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#822754 |
CVE-2010-4076 | kernel-source-rt:Ignore | moderate | () | CVE-2010-4076 MISC:git.kernel.org:CVE-2010-4077 MLIST:[linux-kernel] 20100915 [PATCH] drivers/char/amiserial.c: prevent reading uninitialized stack memory MLIST:[oss-security] 20100925 CVE request: multiple kernel stack memory disclosures MLIST:[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures MLIST:[oss-security] 20101025 Re: CVE request: multiple kernel stack memory disclosures RH:CVE-2010-4076 SMASH Issue 46125 UBUNTU:CVE-2010-4076 bnc#642309 rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#648661 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#822754 |
CVE-2010-4077 | kernel-source-rt:Ignore | moderate | () | BID:45059 CVE-2010-4077 MISC:git.kernel.org:CVE-2010-4077 MLIST:[linux-kernel] 20100915 [PATCH] drivers/char/nozomi.c: prevent reading uninitialized stackmemory MLIST:[oss-security] 20100925 CVE request: multiple kernel stack memory disclosures MLIST:[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures MLIST:[oss-security] 20101025 Re: CVE request: multiple kernel stack memory disclosures RH:CVE-2010-4077 RHSA-2010:0958 RHSA-2011:0007 SECUNIA:42890 SMASH Issue 46126 SREASON:8129 UBUNTU:CVE-2010-4077 bnc#642309 rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#648663 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#822754 |
CVE-2010-4078 | kernel-source-rt:Not affected | low | () | BID:43810 CONFIRM:git.kernel.org:CVE-2010-4078 CONFIRM:www.kernel.org:CVE-2010-4081 CVE-2010-4078 DSA-2126 MANDRIVA:MDVSA-2011:051 MLIST:[oss-security] 20100925 CVE request: multiple kernel stack memory disclosures MLIST:[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures MLIST:[oss-security] 20101025 Re: CVE request: multiple kernel stack memory disclosures RH:CVE-2010-4078 SECUNIA:42778 SECUNIA:42801 SMASH Issue 43688 SUSE:SUSE-SA:2010:060 SUSE:SUSE-SA:2011:001 SUSE:SUSE-SA:2011:002 SUSE:SUSE-SA:2011:007 UBUNTU:CVE-2010-4078 VUPEN:ADV-2011-0012 VUPEN:ADV-2011-0298 bnc#642311 rh#648665 |
CVE-2010-4080 | kernel-source-rt:Not affected | low | () | BID:45058 BID:45063 BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console CONFIRM:git.kernel.org:CVE-2010-4081 CONFIRM:www.kernel.org:CVE-2010-4081 CONFIRM:www.vmware.com:CVE-2011-1659 CVE-2010-4080 DSA-2126 MLIST:[linux-kernel] 20100925 [PATCH] sound/pci/rme9652: prevent reading uninitialized stack memory MLIST:[oss-security] 20100925 CVE request: multiple kernel stack memory disclosures MLIST:[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures MLIST:[oss-security] 20101025 Re: CVE request: multiple kernel stack memory disclosures RH:CVE-2010-4080 RHSA-2010:0958 RHSA-2011:0007 RHSA-2011:0017 RHSA-2011:0162 SECUNIA:42778 SECUNIA:42801 SECUNIA:42884 SECUNIA:42890 SECUNIA:42963 SECUNIA:46397 SMASH Issue 43695 SUSE:SUSE-SA:2010:060 SUSE:SUSE-SA:2011:001 SUSE:SUSE-SA:2011:002 SUSE:SUSE-SA:2011:007 UBUNTU:CVE-2010-4080 VUPEN:ADV-2011-0012 VUPEN:ADV-2011-0168 VUPEN:ADV-2011-0298 rh#648669 |
CVE-2010-4081 | kernel-source-rt:Not affected | low | () | BID:45063 BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console CONFIRM:git.kernel.org:CVE-2010-4081 CONFIRM:www.kernel.org:CVE-2010-4081 CONFIRM:www.vmware.com:CVE-2011-1659 CVE-2010-4081 DSA-2126 MLIST:[linux-kernel] 20100925 [PATCH] sound/pci/rme9652: prevent reading uninitialized stack memory MLIST:[oss-security] 20100925 CVE request: multiple kernel stack memory disclosures MLIST:[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures MLIST:[oss-security] 20101025 Re: CVE request: multiple kernel stack memory disclosures RH:CVE-2010-4081 RHSA-2011:0007 RHSA-2011:0017 SECUNIA:42778 SECUNIA:42801 SECUNIA:42884 SECUNIA:42890 SECUNIA:43291 SECUNIA:46397 SMASH Issue 43696 SUSE:SUSE-SA:2010:060 SUSE:SUSE-SA:2011:001 SUSE:SUSE-SA:2011:002 SUSE:SUSE-SA:2011:007 SUSE:SUSE-SA:2011:008 UBUNTU:CVE-2010-4081 VUPEN:ADV-2011-0012 VUPEN:ADV-2011-0298 VUPEN:ADV-2011-0375 rh#648670 |
CVE-2010-4083 | kernel-source-rt:Ignore | low | () | BID:43809 BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console CONFIRM:git.kernel.org:CVE-2010-4083 CONFIRM:www.kernel.org:CVE-2010-4655 CONFIRM:www.vmware.com:CVE-2011-1659 CVE-2010-4083 DSA-2126 MANDRIVA:MDVSA-2011:051 MLIST:[mm-commits] 20100923 + sys_semctl-fix-kernel-stack-leakage.patch added to -mm tree MLIST:[oss-security] 20100925 CVE request: multiple kernel stack memory disclosures MLIST:[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures MLIST:[oss-security] 20101025 Re: CVE request: multiple kernel stack memory disclosures RH:CVE-2010-4083 RHSA-2010:0958 RHSA-2011:0004 RHSA-2011:0007 RHSA-2011:0162 SECUNIA:42778 SECUNIA:42789 SECUNIA:42890 SECUNIA:42932 SECUNIA:42963 SECUNIA:43291 SECUNIA:46397 SMASH Issue 43692 SUSE:SUSE-SA:2010:060 SUSE:SUSE-SA:2011:001 SUSE:SUSE-SA:2011:004 SUSE:SUSE-SA:2011:007 SUSE:SUSE-SA:2011:008 UBUNTU:CVE-2010-4083 VUPEN:ADV-2011-0012 VUPEN:ADV-2011-0024 VUPEN:ADV-2011-0124 VUPEN:ADV-2011-0168 VUPEN:ADV-2011-0298 VUPEN:ADV-2011-0375 bnc#642314 bnc#651216 rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#648673 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#822754 |
CVE-2010-4158 | kernel-source-rt:Not affected | low | () | BID:44758 BUGTRAQ:20101109 Kernel 0-day BUGTRAQ:20101118 Re: Kernel 0-day BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console CONFIRM:git.kernel.org:CVE-2010-4158 CONFIRM:www.kernel.org:CVE-2010-4347 CONFIRM:www.vmware.com:CVE-2011-1659 CVE-2010-4158 DSA-2153 FEDORA:FEDORA-2010-18983 FULLDISC:20101109 Kernel 0-day MANDRIVA:MDVSA-2011:029 MLIST:[netdev] 20101109 [PATCH] Prevent reading uninitialized memory with socket filters RH:CVE-2010-4158 RHSA-2010:0958 RHSA-2011:0004 RHSA-2011:0007 RHSA-2011:0017 RHSA-2011:0162 SECUNIA:42745 SECUNIA:42778 SECUNIA:42801 SECUNIA:42884 SECUNIA:42890 SECUNIA:42932 SECUNIA:42963 SECUNIA:43291 SECUNIA:46397 SMASH Issue 43685 SUSE:SUSE-SA:2010:060 SUSE:SUSE-SA:2011:001 SUSE:SUSE-SA:2011:002 SUSE:SUSE-SA:2011:004 SUSE:SUSE-SA:2011:007 SUSE:SUSE-SA:2011:008 UBUNTU:CVE-2010-4158 VUPEN:ADV-2010-3321 VUPEN:ADV-2011-0012 VUPEN:ADV-2011-0124 VUPEN:ADV-2011-0168 VUPEN:ADV-2011-0298 VUPEN:ADV-2011-0375 bnc#652563 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=57fe93b374a6b8711995c2d466c502af9f3a08bb rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651698 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#822754 |
CVE-2010-4160 | kernel-source-rt:Not affected | moderate | () | BID:44762 CONFIRM:www.kernel.org:CVE-2010-4347 CVE-2010-4160 MISC:xorl.wordpress.com:CVE-2010-4160 MLIST:[netdev] 20101027 Re: [PATCH 1/4] tipc: Fix bugs in tipc_msg_calc_data_size() MLIST:[netdev] 20101031 [SECURITY] L2TP send buffer allocation size overflows MLIST:[oss-security] 20101110 CVE request: kernel: L2TP send buffer allocation size overflows MLIST:[oss-security] 20101110 Re: CVE request: kernel: L2TP send buffer allocation size overflows MLIST:[oss-security] 20101124 Re: CVE request: kernel: L2TP send buffer allocation size overflows RH:CVE-2010-4160 RHSA-2011:0007 RHSA-2011:0330 SMASH Issue 46127 SUSE:SUSE-SA:2011:002 SUSE:SUSE-SA:2011:004 SUSE:SUSE-SA:2011:005 SUSE:SUSE-SA:2011:008 UBUNTU:CVE-2010-4160 VUPEN:ADV-2011-0012 VUPEN:ADV-2011-0124 VUPEN:ADV-2011-0213 VUPEN:ADV-2011-0375 bnc#652939 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=253eacc070b114c2ec1f81b067d2fed7305467b0 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8acfe468b0384e834a303f08ebc4953d72fb690a rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#822754 |
CVE-2010-4162 | kernel-source-rt:Not affected | moderate | () | BID:44793 CONFIRM:git.kernel.org:CVE-2010-4162 CONFIRM:www.kernel.org:CVE-2010-4347 CVE-2010-4162 DSA-2153 FEDORA:FEDORA-2010-18983 MANDRIVA:MDVSA-2011:029 MISC:git.kernel.org:/ MLIST:[oss-security] 20101110 CVE request: kernel: Multiple DoS issues in block layer MLIST:[oss-security] 20101112 Re: CVE request: kernel: Multiple DoS issues in block layer RH:CVE-2010-4162 RHSA-2011:0007 RHSA-2011:0330 SECUNIA:42745 SECUNIA:42778 SECUNIA:42801 SECUNIA:42890 SECUNIA:42932 SMASH Issue 43686 SUSE:SUSE-SA:2010:060 SUSE:SUSE-SA:2011:001 SUSE:SUSE-SA:2011:002 SUSE:SUSE-SA:2011:004 SUSE:SUSE-SA:2011:007 UBUNTU:CVE-2010-4162 VUPEN:ADV-2010-3321 VUPEN:ADV-2011-0012 VUPEN:ADV-2011-0124 VUPEN:ADV-2011-0298 bnc#652945 rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#822754 |
CVE-2010-4163 | kernel-source-rt:Not affected | moderate | () | BID:44793 CONFIRM:git.kernel.org:CVE-2010-4163 CONFIRM:www.kernel.org:CVE-2010-4347 CVE-2010-4163 DSA-2153 MANDRIVA:MDVSA-2011:029 MLIST:[oss-security] 20101110 CVE request: kernel: Multiple DoS issues in block layer MLIST:[oss-security] 20101112 Re: CVE request: kernel: Multiple DoS issues in block layer MLIST:[oss-security] 20101129 Re: CVE request: kernel: Multiple DoS issues in block layer RH:CVE-2010-4163 RHSA-2011:0007 RHSA-2011:0330 SMASH Issue 44059 SUSE:SUSE-SA:2011:001 SUSE:SUSE-SA:2011:002 SUSE:SUSE-SA:2011:004 SUSE:SUSE-SA:2011:007 UBUNTU:CVE-2010-4163 VUPEN:ADV-2011-0012 VUPEN:ADV-2011-0124 VUPEN:ADV-2011-0298 bnc#652945 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9284bcf4e335e5f18a8bc7b26461c33ab60d0689 rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#822754 |
CVE-2010-4165 | kernel-source-rt:Not affected | moderate | () | BID:44830 CONFIRM:git.kernel.org:CVE-2010-4165 CONFIRM:www.kernel.org:CVE-2010-4248 CVE-2010-4165 MANDRIVA:MDVSA-2011:029 MANDRIVA:MDVSA-2011:051 MLIST:[netdev] 20101110 Re: possible kernel oops from user MSS MLIST:[netdev] 20101110 possible kernel oops from user MSS MLIST:[oss-security] 20101112 CVE request: kernel: possible kernel oops from user MSS MLIST:[oss-security] 20101112 Re: CVE request: kernel: possible kernel oops from user MSS OSVDB:69241 RH:CVE-2010-4165 RHSA-2011:0283 RHSA-2011:0330 SECUNIA:42778 SECUNIA:42801 SECUNIA:42932 SMASH Issue 44056 SREASON:8111 SREASON:8123 SUSE:SUSE-SA:2011:001 SUSE:SUSE-SA:2011:002 SUSE:SUSE-SA:2011:004 SUSE:SUSE-SA:2011:007 UBUNTU:CVE-2010-4165 VUPEN:ADV-2011-0012 VUPEN:ADV-2011-0124 VUPEN:ADV-2011-0298 bnc#653258 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7a1abd08d52fdeddb3e9a5a33f2f15cc6a5674d2 rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#822754 |
CVE-2010-4169 | kernel-source-rt:Not affected | moderate | () | BID:44861 CONFIRM:git.kernel.org:CVE-2010-4169 CONFIRM:www.kernel.org:CVE-2010-4248 CVE-2010-4169 FEDORA:FEDORA-2010-18983 MLIST:[oss-security] 20101115 CVE request: kernel: perf bug MLIST:[oss-security] 20101115 Re: CVE request: kernel: perf bug RH:CVE-2010-4169 RHSA-2010:0958 RHSA-2011:0283 SECUNIA:42745 SECUNIA:42778 SECUNIA:42932 SMASH Issue 44058 SUSE:SUSE-SA:2011:001 SUSE:SUSE-SA:2011:004 SUSE:SUSE-SA:2011:007 UBUNTU:CVE-2010-4169 VUPEN:ADV-2010-3321 VUPEN:ADV-2011-0012 VUPEN:ADV-2011-0124 VUPEN:ADV-2011-0298 XF:kernel-perfeventmmap-dos(63316) bnc#653930 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=63bfd7384b119409685a17d5c58f0b56e5dc03da rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651671 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#822754 |
CVE-2010-4238 | kernel-source-rt:Unsupported | moderate | () | BID:45795 BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console CONFIRM:www.vmware.com:CVE-2011-1659 CVE-2010-4238 MISC:bugs.centos.org:CVE-2010-4238 RH:CVE-2010-4238 RHSA-2011:0017 SMASH Issue 66455 UBUNTU:CVE-2010-4238 XF:xen-vdbcreate-dos(64698) bnc#667243 rh#655623 |
CVE-2010-4243 | kernel-source-rt:Not affected | moderate | () | BID:45004 BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console CONFIRM:git.kernel.org:CVE-2010-4243 CONFIRM:www.kernel.org:CVE-2011-1044 CONFIRM:www.vmware.com:CVE-2011-1659 CVE-2010-4243 DSA-2153 EXPLOIT-DB:15619 MISC:grsecurity.net:CVE-2010-4243 MLIST:[linux-kernel] 20100827 [PATCH] exec argument expansion can inappropriately trigger OOM-killer MLIST:[linux-kernel] 20100830 Re: [PATCH] exec argument expansion can inappropriately trigger OOM-killer MLIST:[linux-kernel] 20101130 [PATCH 1/2] exec: make argv/envp memory visible to oom-killer MLIST:[oss-security] 20101122 CVE request: kernel: mm: mem allocated invisible to oom_kill() when not attached to any threads MLIST:[oss-security] 20101122 Re: CVE request: kernel: mm: mem allocated invisible to oom_kill() when not attached to any threads RH:CVE-2010-4243 RHSA-2011:0017 RHSA-2011:0283 RHSA-2011:1253 SMASH Issue 66456 UBUNTU:CVE-2010-4243 XF:linux-kernel-execve-dos(64700) bnc#655220 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3c77f845722158206a7209c45ccddc264d19319c rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#822754 |
CVE-2010-4248 | kernel-source-rt:Not affected | moderate | () | BID:45028 BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console CONFIRM:git.kernel.org:CVE-2010-4248 CONFIRM:www.kernel.org:CVE-2010-4248 CONFIRM:www.vmware.com:CVE-2011-1659 CVE-2010-4248 DSA-2153 MANDRIVA:MDVSA-2011:029 MLIST:[oss-security] 20101123 CVE request: kernel: posix-cpu-timers: workaround to suppress the problems with mt exec MLIST:[oss-security] 20101124 Re: CVE request: kernel: posix-cpu-timers: workaround to suppress the problems with mt exec RH:CVE-2010-4248 RHSA-2011:0004 RHSA-2011:0007 RHSA-2011:0330 SECUNIA:42789 SECUNIA:42890 SECUNIA:46397 SMASH Issue 46129 UBUNTU:CVE-2010-4248 VUPEN:ADV-2011-0024 bnc#655468 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e0a70217107e6f9844628120412cb27bb4cea194 rh#656264 |
CVE-2010-4249 | kernel-source-rt:Not affected | moderate | () | BID:45037 BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console CONFIRM:git.kernel.org:CVE-2010-4249 CONFIRM:www.kernel.org:CVE-2010-4249 CONFIRM:www.vmware.com:CVE-2011-1659 CVE-2010-4249 DSA-2153 EXPLOIT-DB:15622 FEDORA:FEDORA-2010-18983 MLIST:[linux-kernel] 20101123 Unix socket local DOS (OOM) MLIST:[linux-kernel] 20101124 [PATCH net-next-2.6] scm: lower SCM_MAX_FD MLIST:[linux-kernel] 20101125 Simple kernel attack using socketpair. easy, 100% reproductiblle, works under guest. no way to protect :( MLIST:[netdev] 20101124 [PATCH] af_unix: limit unix_tot_inflight MLIST:[oss-security] 20101124 CVE request: kernel: unix socket local dos MLIST:[oss-security] 20101124 Re: CVE request: kernel: unix socket local dos RH:CVE-2010-4249 RHSA-2011:0007 RHSA-2011:0162 RHSA-2011:0303 RHSA-2011:0330 SECUNIA:42354 SECUNIA:42745 SECUNIA:42890 SECUNIA:42963 SECUNIA:46397 SMASH Issue 46543 UBUNTU:CVE-2010-4249 VUPEN:ADV-2010-3321 VUPEN:ADV-2011-0168 bnc#655696 http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=9915672d41273f5b77f1b3c29b391ffb7732b84b rh#656756 rh#814278 |
CVE-2010-4251 | kernel-source-rt:Not affected | important | () | BID:46637 BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console CONFIRM:git.kernel.org:CVE-2010-4251 CONFIRM:www.kernel.org:CVE-2010-4263 CONFIRM:www.vmware.com:CVE-2011-1659 CVE-2010-4251 MLIST:[netdev] 20100302 [PATCH 1/8] net: add limit for socket backlog RH:CVE-2010-4251 RHSA-2011:0303 RHSA-2011:0542 RHSA-2011:0883 SECUNIA:46397 SMASH Issue 44685 UBUNTU:CVE-2010-4251 bnc#655973 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8eae939f1400326b06d0c9afe53d2a484a326871 rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#657303 rh#822754 |
CVE-2010-4258 | kernel-source-rt:Not affected | important | () | CONFIRM:code.google.com:CVE-2010-4258 CONFIRM:git.kernel.org:CVE-2010-4258 CONFIRM:googlechromereleases.blogspot.com:CVE-2011-1042 CONFIRM:www.kernel.org:CVE-2010-4347 CVE-2010-4258 DSA-2153 FEDORA:FEDORA-2010-18983 FULLDISC:20101207 Linux kernel exploit MANDRIVA:MDVSA-2011:029 MISC:blog.nelhage.com:CVE-2010-4258 MLIST:[linux-kernel] 20101201 Re: [PATCH v2] do_exit(): Make sure we run with get_fs() == USER_DS. MLIST:[linux-kernel] 20101201 [PATCH v2] do_exit(): Make sure we run with get_fs() == USER_DS. MLIST:[oss-security] 20101202 CVE request: kernel: failure to revert address limit override in OOPS error path MLIST:[oss-security] 20101202 Re: CVE request: kernel: failure to revert address limit override in OOPS error path MLIST:[oss-security] 20101202 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses MLIST:[oss-security] 20101202 kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses MLIST:[oss-security] 20101208 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses MLIST:[oss-security] 20101209 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses RH:CVE-2010-4258 SMASH Issue 43869 SUSE:SUSE-SA:2011:001 SUSE:SUSE-SA:2011:002 SUSE:SUSE-SA:2011:004 SUSE:SUSE-SA:2011:005 SUSE:SUSE-SA:2011:007 SUSE:SUSE-SA:2011:008 UBUNTU:CVE-2010-4258 VUPEN:ADV-2010-3321 VUPEN:ADV-2011-0012 VUPEN:ADV-2011-0124 VUPEN:ADV-2011-0213 VUPEN:ADV-2011-0298 VUPEN:ADV-2011-0375 bnc#657350 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=33dd94ae1ccbfb7bf0fb6c692bc3d1c4269e6177 rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#659567 rh#822754 |
CVE-2010-4263 | kernel-source-rt:Not affected | important | () | BID:45208 BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console CONFIRM:bugzilla.kernel.org:CVE-2010-4263 CONFIRM:git.kernel.org:CVE-2010-4263 CONFIRM:www.kernel.org:CVE-2010-4263 CONFIRM:www.vmware.com:CVE-2011-1659 CVE-2010-4263 MLIST:[oss-security] 20101206 CVE request: kernel: igb panics when receiving tag vlan packet MLIST:[oss-security] 20101206 Re: CVE request: kernel: igb panics when receiving tag vlan packet RH:CVE-2010-4263 RHSA-2011:0007 RHSA-2011:0017 SECUNIA:42884 SECUNIA:42890 SECUNIA:46397 SMASH Issue 66468 UBUNTU:CVE-2010-4263 bnc#657716 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=31b24b955c3ebbb6f3008a6374e61cf7c05a193c rh#660188 |
CVE-2010-4343 | kernel-source-rt:Not affected | moderate | () | BID:45262 BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console CONFIRM:git.kernel.org:CVE-2010-4343 CONFIRM:www.kernel.org:CVE-2010-4805 CONFIRM:www.vmware.com:CVE-2011-1659 CVE-2010-4343 MLIST:[linux-scsi] 20100521 [PATCH 1/2] bfa: fix system crash when reading sysfs fc_host statistics MLIST:[oss-security] 20101208 CVE request: kernel: bfa driver sysfs crash MLIST:[oss-security] 20101209 Re: CVE request: kernel: bfa driver sysfs crash RH:CVE-2010-4343 RHSA-2011:0017 SMASH Issue 66523 UBUNTU:CVE-2010-4343 bnc#658178 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7873ca4e4401f0ecd8868bf1543113467e6bae61 rh#661182 |
CVE-2010-4346 | kernel-source-rt:Not affected | moderate | () | BID:45323 BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console CONFIRM:git.kernel.org:CVE-2010-4346 CONFIRM:www.kernel.org:CVE-2010-4346 CONFIRM:www.vmware.com:CVE-2011-1659 CVE-2010-4346 DSA-2153 MANDRIVA:MDVSA-2011:029 MLIST:[linux-kernel] 20101209 [PATCH] install_special_mapping skips security_file_mmap check. MLIST:[oss-security] 20101209 Re: [taviso@cmpxchg8b.com: [PATCH] install_special_mapping skips security_file_mmap check.] MLIST:[oss-security] 20101209 [taviso@cmpxchg8b.com: [PATCH] install_special_mapping skips security_file_mmap check.] MLIST:[oss-security] 20101210 Re: Subject: CVE request: kernel: install_special_mapping skips security_file_mmap check MLIST:[oss-security] 20101210 Subject: CVE request: kernel: install_special_mapping skips security_file_mmap check RH:CVE-2010-4346 RHSA-2011:0330 RHSA-2011:0421 RHSA-2011:0429 SECUNIA:42570 SECUNIA:46397 SMASH Issue 66524 UBUNTU:CVE-2010-4346 bnc#658720 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=462e635e5b73ba9a4c03913b77138cd57ce4b050 rh#662189 |
CVE-2010-4347 | kernel-source-rt:Not affected | important | () | BID:45408 CONFIRM:git.kernel.org:CVE-2010-4347 CONFIRM:www.kernel.org:CVE-2010-4347 CVE-2010-4347 EXPLOIT-DB:15774 MLIST:[oss-security] 20101215 CVE Request: local privilege escalation via /sys/kernel/debug/acpi/custom_method MLIST:[oss-security] 20101215 Re: CVE Request: local privilege escalation via /sys/kernel/debug/acpi/custom_method RH:CVE-2010-4347 RHSA-2011:0330 SMASH Issue 44055 SUSE:SUSE-SA:2011:001 SUSE:SUSE-SA:2011:007 UBUNTU:CVE-2010-4347 VUPEN:ADV-2011-0012 VUPEN:ADV-2011-0298 XF:kernel-debugfs-privilege-esc(64155) bnc#659076 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ed3aada1bf34c5a9e98af167f125f8a740fc726a rh#663542 |
CVE-2010-4478 | openssh:Unsupported | important | () | CONFIRM:www.openbsd.org:CVE-2010-4478 CVE-2010-4478 D:CVE-2010-4478 RH:CVE-2010-4478 SMASH Issue 66628 UBUNTU:CVE-2010-4478 bnc#660128 rh#659297 rh#660642 |
CVE-2010-4527 | kernel-source-rt:Not affected | moderate | () | BID:45629 CONFIRM:git.kernel.org:CVE-2010-4527 CONFIRM:www.kernel.org:CVE-2011-1044 CVE-2010-4527 DSA-2153 MISC:xorl.wordpress.com:CVE-2010-4527 MLIST:[oss-security] 20101230 CVE request: kernel: buffer overflow in OSS load_mixer_volumes MLIST:[oss-security] 20101231 Re: CVE request: kernel: buffer overflow in OSS load_mixer_volumes RH:CVE-2010-4527 RHSA-2011:0263 SECUNIA:42765 SECUNIA:43291 SMASH Issue 46132 SUSE:SUSE-SA:2011:008 UBUNTU:CVE-2010-4527 VUPEN:ADV-2011-0375 bnc#661945 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d81a12bc29ae4038770e05dce4ab7f26fd5880fb rh#667615 |
CVE-2010-4563 | kernel-source-rt:Unsupported | moderate | () | CVE-2010-4563 RH:CVE-2010-4563 SMASH Issue 66695 UBUNTU:CVE-2010-4563 bnc#745296 rh#788930 |
CVE-2010-4565 | kernel-source-rt:Not affected | low | () | BID:44661 CVE-2010-4565 DSA-2153 MANDRIVA:MDVSA-2011:029 MLIST:[netdev] 20101102 Re: [SECURITY] CAN info leak/minor heap overflow MLIST:[netdev] 20101102 [SECURITY] CAN info leak/minor heap overflow MLIST:[netdev] 20101109 Re: [PATCH] Fix CAN info leak/minor heap overflow MLIST:[netdev] 20101110 Re: [PATCH] Fix CAN info leak/minor heap overflow MLIST:[oss-security] 20101103 CVE request: kernel: CAN information leak MLIST:[oss-security] 20101104 Re: CVE request: kernel: CAN information leak MLIST:[oss-security] 20101220 CVE request: kernel: CAN information leak, 2nd attempt MLIST:[oss-security] 20101220 Re: CVE request: kernel: CAN information leak, 2nd attempt RH:CVE-2010-4565 RHSA-2011:0330 RHSA-2011:0498 SMASH Issue 66696 UBUNTU:CVE-2010-4565 bnc#1161355 linux.git:commit:9f260e0efa4766e56d0ac14f1aeea6ee5eb8fe83 rh#664544 |
CVE-2010-4649 | kernel-source-rt:Not affected | moderate | () | BID:46073 CONFIRM:git.kernel.org:CVE-2011-1044 CONFIRM:www.kernel.org:CVE-2011-1044 CVE-2010-4649 DSA-2153 RH:CVE-2010-4649 RHSA-2011:0330 RHSA-2011:0498 RHSA-2011:0927 SMASH Issue 66774 UBUNTU:CVE-2010-4649 bnc#662953 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7182afea8d1afd432a17c18162cc3fd441d0da93 rh#667916 |
CVE-2010-4655 | kernel-source-rt:Unsupported | moderate | () | BID:45972 BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console CONFIRM:git.kernel.org:CVE-2010-4655 CONFIRM:www.vmware.com:CVE-2011-1659 CVE-2010-4655 DSA-2264 MLIST:[linux-kernel] 20101007 [PATCH] net: clear heap allocations for privileged ethtool actions MLIST:[oss-security] 20110124 CVE request: linux kernel heap issues MLIST:[oss-security] 20110124 Re: CVE request: linux kernel heap issues MLIST:[oss-security] 20110125 Re: CVE request: linux kernel heap issues MLIST:[oss-security] 20110128 Re: CVE request: linux kernel heap issues RH:CVE-2010-4655 RHSA-2011:0263 RHSA-2011:0303 RHSA-2011:0330 RHSA-2011:0421 SMASH Issue 46134 UBUNTU:CVE-2010-4655 UBUNTU:USN-1146-1 bdo#618485 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b00916b189d13a615ff05c9242201135992fcda3 rh#672428 |
CVE-2010-4656 | kernel-source-rt:Unsupported | important | () | BID:46069 CONFIRM:git.kernel.org:CVE-2010-4656 CONFIRM:www.kernel.org:CVE-2011-1044 CVE-2010-4656 DSA-2153 MLIST:[oss-security] 20110124 CVE request: linux kernel heap issues MLIST:[oss-security] 20110124 Re: CVE request: linux kernel heap issues MLIST:[oss-security] 20110125 Re: CVE request: linux kernel heap issues RH:CVE-2010-4656 RHSA-2011:0330 RHSA-2011:0421 SMASH Issue 66778 UBUNTU:CVE-2010-4656 UBUNTU:USN-1146-1 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3ed780117dbe5acb64280d218f0347f238dafed0 rh#672420 |
CVE-2010-4668 | kernel-source-rt:Ignore | moderate | () | BID:45660 CONFIRM:git.kernel.org:CVE-2010-4668 CONFIRM:patchwork.kernel.org:CVE-2010-4668 CONFIRM:www.kernel.org:CVE-2010-4668 CVE-2010-4668 DSA-2153 MLIST:[linux-kernel] 20101129 Re: [PATCH] block: check for proper length of iov entries earlier in blk_rq_map_user_iov() MLIST:[linux-kernel] 20101129 [PATCH] block: check for proper length of iov entries earlier in blk_rq_map_user_iov() MLIST:[oss-security] 20101129 Re: CVE request: kernel: Multiple DoS issues in block layer MLIST:[oss-security] 20101130 Re: CVE request: kernel: Multiple DoS issues in block layer RH:CVE-2010-4668 RHSA-2011:0007 RHSA-2011:0330 SECUNIA:42890 SMASH Issue 46135 UBUNTU:CVE-2010-4668 XF:linux-blkrqmapuseriov-dos(64496) bnc#652945 bnc#662202 rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#822754 |
CVE-2010-4805 | kernel-source-rt:Not affected | important | () | BID:46637 CONFIRM:git.kernel.org:CVE-2010-4805 CONFIRM:www.kernel.org:CVE-2010-4805 CVE-2010-4805 MLIST:[netdev] 20100302 [PATCH 1/8] net: add limit for socket backlog RH:CVE-2010-4805 RHSA-2011:0303 RHSA-2011:0542 RHSA-2011:0883 SMASH Issue 66913 UBUNTU:CVE-2010-4805 bnc#698190 rh#657303 |
CVE-2010-5321 | kernel-source-rt:Not affected | moderate | () | CVE-2010-5321 MISC:bugzilla.kernel.org:CVE-2010-5321 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:linuxtv.org:CVE-2010-5329 MLIST:[oss-security] 20150208 Re: kernel: v4l: videobuf: hotfix a bug on multiple calls to mmap() - Linux kernel RH:CVE-2010-5321 SMASH Issue 113652 UBUNTU:CVE-2010-5321 bdo#827340 bnc#916831 rh#620629 |
CVE-2010-5328 | kernel-source-rt:Unsupported | low | () | BID:97103 CONFIRM:ftp.naist.jp:CVE-2010-5328 CONFIRM:git.kernel.org:CVE-2010-5328 CONFIRM:github.com:CVE-2010-5328 CVE-2010-5328 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:MLIST:[oss-security] 20170120 Re: CVE REQUEST: linux kernel: process with pgid zero able to crash MLIST:[oss-security] 20170120 Re: CVE REQUEST: linux kernel: process with pgid zero able to crash OSS:2017/Q1/160 RH:CVE-2010-5328 SMASH Issue 178952 SMASH Issue 178976 UBUNTU:CVE-2010-5328 bnc#1021109 rh#1358840 |
CVE-2010-5331 | kernel-source-rt:Not affected | critical | () | CONFIRM:support.f5.com:CVE-2010-5331 CVE-2010-5331 D:CVE-2010-5331 MISC:bugzilla.redhat.com:CVE-2010-5331 MISC:git.kernel.org:CVE-2010-5331 MISC:github.com:CVE-2010-5331 MISC:mirrors.edge.kernel.org:CVE-2010-5331 RH:CVE-2010-5331 SMASH Issue 238129 UBUNTU:CVE-2010-5331 bnc#1143173 https://support.f5.com/csp/article/K33183814?utm_source=f5support&%3Butm_medium=RSS rh#1743598 |
CVE-2010-5332 | kernel-source-rt:Not affected | critical | () | CONFIRM:support.f5.com:CVE-2010-5332 CVE-2010-5332 D:CVE-2010-5332 MISC:git.kernel.org:CVE-2010-5332 MISC:github.com:CVE-2010-5332 MISC:mirrors.edge.kernel.org:CVE-2010-5332 RH:CVE-2010-5332 SMASH Issue 238130 UBUNTU:CVE-2010-5332 bnc#1143170 rh#1743604 |
CVE-2011-0463 | kernel-source-rt:Not affected | moderate | () | CONFIRM:bugzilla.novell.com:CVE-2011-0463 CONFIRM:git.kernel.org:CVE-2011-0463 CONFIRM:www.kernel.org:CVE-2011-0463 CVE-2011-0463 L3:35112 MLIST:[ocfs2-devel] 20110217 [PATCH] Treat writes as new when holes span across page boundaries RH:CVE-2011-0463 SECUNIA:43966 SMASH Issue 33455 UBUNTU:CVE-2011-0463 UBUNTU:USN-1146-1 bnc#670595 bnc#673037 rh#1866254 |
CVE-2011-0521 | kernel-source-rt:Not affected | important | () | BID:45986 BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console CONFIRM:git.kernel.org:CVE-2011-0521 CONFIRM:www.kernel.org:CVE-2011-0521 CONFIRM:www.vmware.com:CVE-2011-1659 CVE-2011-0521 DSA-2153 MLIST:[oss-security] 20110125 Linux kernel av7110 negative array offset MLIST:[oss-security] 20110125 Re: Linux kernel av7110 negative array offset RH:CVE-2011-0521 RHSA-2011:0263 RHSA-2011:0330 RHSA-2011:0421 RHSA-2011:0429 SECTRACK:1025195 SECUNIA:43009 SECUNIA:46397 SMASH Issue 33511 UBUNTU:CVE-2011-0521 XF:kernel-av7110ca-privilege-escalation(64988) bnc#666836 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=cb26a24ee9706473f31d34cc259f4dcf45cd0644 rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#672398 rh#822754 |
CVE-2011-0710 | kernel-source-rt:Not affected | moderate | () | BID:46421 BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console CONFIRM:git.kernel.org:CVE-2011-0710 CONFIRM:www.kernel.org:CVE-2011-0710 CONFIRM:www.vmware.com:CVE-2011-1659 CVE-2011-0710 DSA-2264 MLIST:[oss-security] 20110216 CVE request - kernel: s390 task_show_regs infoleak MLIST:[oss-security] 20110216 Re: CVE request - kernel: s390 task_show_regs infoleak RH:CVE-2011-0710 RHSA-2011:0421 RHSA-2011:0429 SMASH Issue 33675 UBUNTU:CVE-2011-0710 XF:kernel-taskshowregs-info-disclosure(65464) bdo#618485 bnc#672492 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=261cd298a8c363d7985e3482946edb4bfedacf98 rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#677850 rh#822754 |
CVE-2011-0711 | kernel-source-rt:Not affected | moderate | () | BID:46417 CONFIRM:git.kernel.org:CVE-2011-0711 CONFIRM:patchwork.kernel.org:CVE-2011-0711 CONFIRM:www.kernel.org:CVE-2011-0711 CVE-2011-0711 DSA-2240 DSA-2264 MLIST:[oss-security] 20110216 CVE request - kernel: xfs infoleak MLIST:[oss-security] 20110216 Re: CVE request - kernel: xfs infoleak OSVDB:70950 RH:CVE-2011-0711 RHSA-2011:0498 RHSA-2011:0500 RHSA-2011:0927 SMASH Issue 33676 UBUNTU:CVE-2011-0711 bdo#618485 bnc#672505 bnc#672524 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3a3675b7f23f83ca8c67c9c2b6edf707fd28d1ba rh#677260 |
CVE-2011-0712 | kernel-source-rt:Not affected | important | () | BID:46419 CONFIRM:git.kernel.org:CVE-2011-0712 CONFIRM:www.kernel.org:CVE-2011-0712 CVE-2011-0712 DSA-2310 MISC:git.kernel.org:MLIST:[oss-security] 20110216 kernel: ALSA: caiaq - Fix possible string-buffer overflow MLIST:[oss-security] 20110216 Re: kernel: ALSA: caiaq - Fix possible string-buffer overflow MLIST:[oss-security] 20110216 kernel: ALSA: caiaq - Fix possible string-buffer overflow RH:CVE-2011-0712 RHSA-2011:0498 SMASH Issue 33677 UBUNTU:CVE-2011-0712 UBUNTU:USN-1146-1 XF:kernel-usbdevice-bo(65461) bdo#633738 bnc#672499 http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=eaae55dac6b64c0616046436b294e69fc5311581 rh#677881 |
CVE-2011-0726 | kernel-source-rt:Not affected | low | () | BID:47791 CONFIRM:downloads.avaya.com:CVE-2011-1763 CONFIRM:git.kernel.org:CVE-2011-0726 CONFIRM:www.kernel.org:CVE-2011-0726 CVE-2011-0726 DSA-2240 DSA-2264 MLIST:[linux-kernel] 20110311 [PATCH] proc: protect mm start_code/end_code in /proc/pid/stat MLIST:[mm-commits] 20110314 + proc-protect-mm-start_code-end_code-in-proc-pid-stat.patch added to -mm tree RH:CVE-2011-0726 RHSA-2011:0498 RHSA-2011:0500 RHSA-2011:0833 SMASH Issue 33691 UBUNTU:CVE-2011-0726 bdo#618485 bnc#701254 linux.git:commit:5883f57ca0008ffc93e09cbb9847a1928e50c6f3 rh#684569 |
CVE-2011-0999 | kernel-source-rt:Not affected | moderate | () | BID:46442 CONFIRM:git.kernel.org:CVE-2011-0999 CONFIRM:www.kernel.org:CVE-2011-1016 CVE-2011-0999 MLIST:[oss-security] 20110217 CVE request - kernel: thp: prevent hugepages during args/env copying into the user stack MLIST:[oss-security] 20110217 Re: CVE request - kernel: thp: prevent hugepages during args/env copying into the user stack RH:CVE-2011-0999 RHSA-2011:0542 RHSA-2011:0883 SMASH Issue 50086 UBUNTU:CVE-2011-0999 XF:kernel-hugepages-dos(65535) bnc#673261 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a7d6e4ecdb7648478ddec76d30d87d03d6e22b31 rh#678209 |
CVE-2011-1010 | kernel-source-rt:Not affected | moderate | () | BID:46492 BUGTRAQ:20110223 [PRE-SA-2011-01] Multiple Linux kernel vulnerabilities in partition handling code of LDM and MAC partition tables BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console CONFIRM:git.kernel.org:CVE-2011-1010 CONFIRM:www.kernel.org:CVE-2011-1010 CONFIRM:www.vmware.com:CVE-2011-1659 CVE-2011-1010 DSA-2264 L3:35499 MISC:www.pre-cert.de:CVE-2011-1017 MLIST:[oss-security] 20110222 CVE request: kernel: fs/partitions: validate map_count in mac partition tables MLIST:[oss-security] 20110222 Re: CVE request: kernel: fs/partitions: validate map_count in mac partition tables RH:CVE-2011-1010 RHSA-2011:0429 RHSA-2011:0500 RHSA-2011:0542 RHSA-2011:0883 SECTRACK:1025126 SMASH Issue 44686 SREASON:8115 UBUNTU:CVE-2011-1010 XF:kernel-map-dos(65643) bdo#618485 bnc#673929 bnc#690537 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fa7ea87a057958a8b7926c1a60a3ca6d696328ed rh#679282 |
CVE-2011-1016 | kernel-source-rt:Not affected | moderate | () | BID:46557 CONFIRM:git.kernel.org:CVE-2011-1016 CONFIRM:www.kernel.org:CVE-2011-1016 CVE-2011-1016 DSA-2240 MLIST:[oss-security] 20110224 CVE request: kernel: drm/radeon/kms: check AA resolve registers on r300 MLIST:[oss-security] 20110224 Re: CVE request: kernel: drm/radeon/kms: check AA resolve registers on r300 MLIST:[oss-security] 20110225 Re: CVE request: kernel: drm/radeon/kms: check AA resolve registers on r300 RH:CVE-2011-1016 RHSA-2011:0498 SMASH Issue 44688 UBUNTU:CVE-2011-1016 XF:kernel-atiradeon-sec-bypass(65691) bnc#674693 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fff1ce4dc6113b6fdc4e3a815ca5fd229408f8ef rh#680000 |
CVE-2011-1017 | kernel-source-rt:Not affected | important | () | BID:46512 BUGTRAQ:20110223 [PRE-SA-2011-01] Multiple Linux kernel vulnerabilities in partition handling code of LDM and MAC partition tables CVE-2011-1017 DSA-2264 MISC:www.pre-cert.de:CVE-2011-1017 MLIST:[oss-security] 20110223 CVE request: kernel: fs/partitions: Kernel heap overflow via corrupted LDM partition tables MLIST:[oss-security] 20110223 Re: CVE request: kernel: fs/partitions: Kernel heap overflow via corrupted LDM partition tables MLIST:[oss-security] 20110224 Re: CVE request: kernel: fs/partitions: Kernel heap overflow via corrupted LDM partition tables RH:CVE-2011-1017 SECTRACK:1025128 SECUNIA:43716 SECUNIA:43738 SMASH Issue 44689 SREASON:8115 UBUNTU:CVE-2011-1017 UBUNTU:USN-1146-1 bdo#618485 bnc#674648 bnc#698221 linux.git:commit:cae13fe4cc3f24820ffb990c09110626837e85d4 rh#1867455 |
CVE-2011-1020 | kernel-source-rt:Not affected | moderate | () | BID:46567 CVE-2011-1020 DSA-2303 DSA-2310 FULLDISC:20110122 Proc filesystem and SUID-Binaries MISC:www.halfdog.net:CVE-2011-1020 MLIST:[linux-kernel] 20110207 Re: [SECURITY] /proc/$pid/ leaks contents across setuid exec MLIST:[linux-kernel] 20110207 [SECURITY] /proc/$pid/ leaks contents across setuid exec MLIST:[linux-kernel] 20110208 Re: [SECURITY] /proc/$pid/ leaks contents across setuid exec MLIST:[linux-kernel] 20110209 Re: [SECURITY] /proc/$pid/ leaks contents across setuid exec MLIST:[oss-security] 20110224 CVE request: kernel: /proc/$pid/ leaks contents across setuid exec MLIST:[oss-security] 20110225 Re: CVE request: kernel: /proc/$pid/ leaks contents across setuid exec RH:CVE-2011-1020 RHSA-2011:1253 RHSA-2011:1530 RHSA-2012:0007 RHSA-2012:0116 SECUNIA:43496 SMASH Issue 45000 SREASON:8107 UBUNTU:CVE-2011-1020 XF:kernel-procpid-security-bypass(65693) bdo#633738 bnc#674982 rh#680358 |
CVE-2011-1023 | kernel-source-rt:Not affected | moderate | () | CONFIRM:ftp.osuosl.org:CVE-2011-1023 CONFIRM:git.kernel.org:CVE-2011-1023 CONFIRM:github.com:CVE-2011-1023 CVE-2011-1023 MLIST:[oss-security] 20110303 CVE-2011-1023 kernel: rds: prevent BUG_ON triggering on congestion map updates RH:CVE-2011-1023 RHSA-2011:0542 SMASH Issue 50095 UBUNTU:CVE-2011-1023 bnc#676707 bnc#703752 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6094628bfd94323fc1cea05ec2c6affd98c18f7f rh#680345 |
CVE-2011-1078 | kernel-source-rt:Not affected | low | () | CONFIRM:downloads.avaya.com:CVE-2011-1763 CONFIRM:ftp.osuosl.org:CVE-2011-4914 CONFIRM:git.kernel.org:CVE-2011-1078 CONFIRM:github.com:CVE-2011-1078 CVE-2011-1078 DSA-2240 DSA-2264 MLIST:[oss-security] 20110301 Re: CVE request: kernel: two bluetooth and one ebtables infoleaks/DoSes RH:CVE-2011-1078 RHSA-2011:0500 RHSA-2011:0833 RHSA-2012:1156 SMASH Issue 45001 UBUNTU:CVE-2011-1078 bdo#618485 bnc#676601 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c4c896e1471aec3b004a693c689f60be3b17ac86 rh#681259 |
CVE-2011-1080 | kernel-source-rt:Not affected | low | () | CONFIRM:downloads.avaya.com:CVE-2011-1763 CONFIRM:ftp.osuosl.org:CVE-2011-4914 CONFIRM:git.kernel.org:CVE-2011-1080 CONFIRM:github.com:CVE-2011-1080 CVE-2011-1080 DSA-2240 DSA-2264 MLIST:[oss-security] 20110301 Re: CVE request: kernel: two bluetooth and one ebtables infoleaks/DoSes RH:CVE-2011-1080 RHSA-2011:0498 RHSA-2011:0500 RHSA-2011:0833 SMASH Issue 45003 UBUNTU:CVE-2011-1080 bdo#618485 bnc#676602 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d846f71195d57b0bbb143382647c2c6638b04c5a rh#681262 |
CVE-2011-1082 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2011-1082 CONFIRM:www.kernel.org:CVE-2011-1163 CVE-2011-1082 MLIST:[linux-kernel] 20110205 [PATCH] epoll: Prevent deadlock through unsafe ->f_op->poll() calls. MLIST:[oss-security] 20110301 CVE request: kernel: Multiple DoS issues in epoll MLIST:[oss-security] 20110302 Re: CVE request: kernel: Multiple DoS issues in epoll RH:CVE-2011-1082 RHSA-2011:0500 RHSA-2011:0542 RHSA-2011:0883 SMASH Issue 50139 UBUNTU:CVE-2011-1082 bnc#676202 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=22bacca48a1755f79b7e0f192ddb9fbb7fc6e64e rh#681575 |
CVE-2011-1083 | kernel-source-rt:Not affected | moderate | () | CVE-2011-1083 MLIST:[linux-kernel] 20110225 [PATCH] optimize epoll loop detection MLIST:[linux-kernel] 20110226 Re: [PATCH] optimize epoll loop detection MLIST:[linux-kernel] 20110228 Re: [PATCH] optimize epoll loop detection MLIST:[oss-security] 20110301 CVE request: kernel: Multiple DoS issues in epoll MLIST:[oss-security] 20110302 Re: CVE request: kernel: Multiple DoS issues in epoll OSVDB:71265 RH:CVE-2011-1083 RHBA-2012:0496 RHSA-2012:0150 RHSA-2012:0862 RHSA-2012:1061 RHSA-2012:1129 RHSA-2012:1150 SECUNIA:43522 SECUNIA:48115 SECUNIA:48410 SECUNIA:48898 SECUNIA:48964 SMASH Issue 47232 SUSE:SUSE-SU-2012:0554 SUSE:SUSE-SU-2012:0616 UBUNTU:CVE-2011-1083 bnc#676204 rh#681578 rh#814278 rh#837502 |
CVE-2011-1090 | kernel-source-rt:Not affected | moderate | () | BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console CONFIRM:git.kernel.org:CVE-2011-1090 CONFIRM:www.kernel.org:CVE-2011-1163 CONFIRM:www.vmware.com:CVE-2011-1659 CVE-2011-1090 CVE-2023-2002 DSA-2240 DSA-2264 MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[oss-security] 20110307 CVE request - kernel: nfs4: Ensure that ACL pages sent over NFS were not allocated from the slab MLIST:[oss-security] 20110307 Re: CVE request - kernel: nfs4: Ensure that ACL pages sent over NFS were not allocated from the slab OSS:2023/04/16/3 RH:CVE-2011-1090 RHSA-2011:0429 RHSA-2011:0542 RHSA-2011:0883 RHSA-2011:1253 SECTRACK:1025336 SMASH Issue 46136 SUSE:SUSE-SU-2015:0812 UBUNTU:CVE-2011-1090 bdo#618485 bnc#677286 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e9e3d724e2145f5039b423c290ce2b2c3d8f94bc rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#682641 rh#822754 |
CVE-2011-1093 | kernel-source-rt:Not affected | important | () | BID:46793 CONFIRM:downloads.avaya.com:CVE-2011-1763 CONFIRM:git.kernel.org:CVE-2011-1093 CONFIRM:www.kernel.org:CVE-2011-1163 CVE-2011-1093 DSA-2264 MISC:git.kernel.org:/ MLIST:[oss-security] 20110308 CVE request: kernel: dccp: fix oops on Reset after close MLIST:[oss-security] 20110308 Re: CVE request: kernel: dccp: fix oops on Reset after close RH:CVE-2011-1093 RHSA-2011:0498 RHSA-2011:0500 RHSA-2011:0833 SMASH Issue 50142 UBUNTU:CVE-2011-1093 bdo#618485 bnc#677676 rh#682954 |
CVE-2011-1160 | kernel-source-rt:Not affected | low | () | CONFIRM:ftp.osuosl.org:CVE-2011-4914 CONFIRM:git.kernel.org:CVE-2011-1160 CONFIRM:github.com:CVE-2011-1160 CVE-2009-4067 CVE-2011-1160 CVE-2011-1162 DSA-2240 DSA-2264 MISC:labs.mwrinfosecurity.com:CVE-2009-4067 MISC:tpmdd.git.sourceforge.net:MLIST:[oss-security] 20110315 Re: CVE requests - kernel: tpm infoleaks MLIST:[oss-security] 20110315 Re: CVE requests - kernel: tpm infoleaks RH:CVE-2011-1160 RH:CVE-2011-1162 RHSA-2011:1253 RHSA-2011:1350 RHSA-2011:1386 RHSA-2011:1465 RHSA-2011:1479 RHSA-2012:0010 SMASH Issue 44690 UBUNTU:CVE-2011-1160 UBUNTU:CVE-2011-1162 bdo#618485 bnc#680040 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1309d7afbed112f0e8e90be9af975550caa0076b linux.git:commit:3321c07ae5068568cd61ac9f4ba749006a7185c9 rh#684671 rh#722393 rh#732629 |
CVE-2011-1162 | kernel-source-rt:Not affected | low | () | CONFIRM:ftp.osuosl.org:CVE-2011-4914 CONFIRM:git.kernel.org:CVE-2011-1160 CONFIRM:github.com:CVE-2011-1160 CVE-2009-4067 CVE-2011-1160 CVE-2011-1162 DSA-2240 DSA-2264 MISC:labs.mwrinfosecurity.com:CVE-2009-4067 MISC:tpmdd.git.sourceforge.net:MLIST:[oss-security] 20110315 Re: CVE requests - kernel: tpm infoleaks MLIST:[oss-security] 20110315 Re: CVE requests - kernel: tpm infoleaks RH:CVE-2011-1160 RH:CVE-2011-1162 RHSA-2011:1253 RHSA-2011:1350 RHSA-2011:1386 RHSA-2011:1465 RHSA-2011:1479 RHSA-2012:0010 SMASH Issue 231761 SMASH Issue 44690 UBUNTU:CVE-2011-1160 UBUNTU:CVE-2011-1162 bdo#618485 bnc#680040 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1309d7afbed112f0e8e90be9af975550caa0076b linux.git:commit:3321c07ae5068568cd61ac9f4ba749006a7185c9 rh#684671 rh#722393 rh#732629 |
CVE-2011-1163 | kernel-source-rt:Not affected | low | () | BID:46878 BUGTRAQ:20110317 [PRE-SA-2011-02] Information disclosure vulnerability in the OSF partition handling code of the Linux kernel CONFIRM:downloads.avaya.com:CVE-2011-1763 CONFIRM:git.kernel.org:CVE-2011-1163 CONFIRM:www.kernel.org:CVE-2011-1163 CVE-2011-1163 CVE-2023-2002 DSA-2240 DSA-2264 MISC:git.kernel.org:OSS:2023/04/16/3 MISC:www.pre-cert.de:CVE-2011-1163 MLIST:[mm-commits] 20110314 + fs-partitions-osfc-corrupted-osf-partition-table-can-cause-information-disclosure.patch added to -mm tree MLIST:[oss-security] 20110315 CVE Request: kernel: fs/partitions: Corrupted OSF partition table can cause information disclosure MLIST:[oss-security] 20110315 Re: CVE Request: kernel: fs/partitions: Corrupted OSF partition table can cause information disclosure OSS:2023/04/16/3 RH:CVE-2011-1163 RHSA-2011:0500 RHSA-2011:0542 RHSA-2011:0833 RHSA-2011:0883 SECTRACK:1025225 SMASH Issue 44691 SREASON:8189 SUSE:SUSE-SU-2015:0812 UBUNTU:CVE-2011-1163 bdo#618485 bnc#679812 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1eafbfeb7bdf59cfe173304c76188f3fd5f1fd05 rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#688021 rh#822754 |
CVE-2011-1169 | kernel-source-rt:Not affected | important | () | CONFIRM:git.kernel.org:CVE-2011-1169 CONFIRM:www.kernel.org:CVE-2011-1169 CVE-2011-1169 MLIST:[oss-security] 20110318 CVE request: kernel: AudioScience HPI driver MLIST:[oss-security] 20110318 Re: CVE request: kernel: AudioScience HPI driver RH:CVE-2011-1169 SMASH Issue 50189 UBUNTU:CVE-2011-1169 bnc#680816 http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=4a122c10fbfe9020df469f0f669da129c5757671 rh#688898 |
CVE-2011-1170 | kernel-source-rt:Not affected | low | () | CONFIRM:downloads.avaya.com:CVE-2011-1763 CONFIRM:git.kernel.org:CVE-2011-1170 CONFIRM:www.kernel.org:CVE-2011-2534 CVE-2011-1170 DSA-2240 DSA-2264 MISC:git.kernel.org:MLIST:[oss-security] 20110321 Re: CVE request: kernel: netfilter & econet infoleaks MLIST:[netfilter-devel] 20110310 [PATCH] ipv4: netfilter: arp_tables: fix infoleak to userspace MLIST:[oss-security] 20110318 CVE request: kernel: netfilter & econet infoleaks MLIST:[oss-security] 20110321 Re: CVE request: kernel: netfilter & econet infoleaks RH:CVE-2011-1170 RHSA-2011:0500 RHSA-2011:0542 RHSA-2011:0833 RHSA-2011:0883 SMASH Issue 45004 SREASON:8278 SREASON:8282 UBUNTU:CVE-2011-1170 bdo#618485 bnc#681180 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=42eab94fff18cb1091d3501cd284d6bd6cc9c143 rh#591815 rh#689321 rh#689327 rh#689337 rh#689345 |
CVE-2011-1171 | kernel-source-rt:Not affected | low | () | CONFIRM:downloads.avaya.com:CVE-2011-1763 CONFIRM:git.kernel.org:CVE-2011-1171 CONFIRM:www.kernel.org:CVE-2011-2534 CVE-2011-1171 DSA-2240 DSA-2264 MLIST:[linux-kernel] 20110310 [PATCH] ipv4: netfilter: ip_tables: fix infoleak to userspace MLIST:[oss-security] 20110318 CVE request: kernel: netfilter & econet infoleaks MLIST:[oss-security] 20110321 Re: CVE request: kernel: netfilter & econet infoleaks RH:CVE-2011-1171 RHSA-2011:0500 RHSA-2011:0542 RHSA-2011:0833 RHSA-2011:0883 SMASH Issue 45005 SREASON:8278 SREASON:8283 UBUNTU:CVE-2011-1171 bdo#618485 bnc#681181 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=78b79876761b86653df89c48a7010b5cbd41a84a rh#689327 |
CVE-2011-1172 | kernel-source-rt:Not affected | low | () | CONFIRM:downloads.avaya.com:CVE-2011-1763 CONFIRM:git.kernel.org:CVE-2011-1172 CONFIRM:www.kernel.org:CVE-2011-2534 CVE-2011-1172 DSA-2240 DSA-2264 MLIST:[linux-kernel] 20110310 [PATCH] ipv6: netfilter: ip6_tables: fix infoleak to userspace MLIST:[oss-security] 20110318 CVE request: kernel: netfilter & econet infoleaks MLIST:[oss-security] 20110321 Re: CVE request: kernel: netfilter & econet infoleaks RH:CVE-2011-1172 RHSA-2011:0500 RHSA-2011:0542 RHSA-2011:0833 RHSA-2011:0883 SMASH Issue 45006 SREASON:8278 UBUNTU:CVE-2011-1172 bdo#618485 bnc#681185 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6a8ab060779779de8aea92ce3337ca348f973f54 rh#689345 |
CVE-2011-1182 | kernel-source-rt:Not affected | moderate | () | CONFIRM:ftp.osuosl.org:CVE-2011-4914 CONFIRM:git.kernel.org:CVE-2011-1182 CONFIRM:github.com:CVE-2011-1182 CVE-2011-1182 DSA-2240 DSA-2264 MLIST:[oss-security] 20110323 Re: Linux kernel signal spoofing vulnerability (CVE request) RH:CVE-2011-1182 RHSA-2011:0883 RHSA-2011:0927 RHSA-2011:1189 SMASH Issue 44460 UBUNTU:CVE-2011-1182 bdo#618485 bnc#681826 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=da48524eb20662618854bb3df2db01fc65f3070c rh#690028 |
CVE-2011-1478 | kernel-source-rt:Not affected | moderate | () | BID:48907 BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console CONFIRM:git.kernel.org:CVE-2011-1478 CONFIRM:mirror.anl.gov:CVE-2011-1478 CONFIRM:www.vmware.com:CVE-2011-1659 CVE-2011-1478 CVE-2011-1576 DSA-2240 MLIST:[oss-security] 20110328 CVE-2011-1478 kernel: gro: reset dev and skb_iff on skb reuse RH:CVE-2011-1478 RH:CVE-2011-1576 RHSA-2011:0421 RHSA-2011:0429 RHSA-2011:0439 RHSA-2011:0927 RHSA-2011:1090 RHSA-2011:1106 RHSA-2011:1189 RHSA-2011:1253 SECTRACK:1025853 SECUNIA:46397 SMASH Issue 50545 SREASON:8480 UBUNTU:CVE-2011-1478 UBUNTU:CVE-2011-1576 bnc#682965 bnc#698450 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=66c46d741e2e60f0e8b625b80edb0ab820c46d7a http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6d152e23ad1a7a5b40fef1f42e017d66e6115159 rh#691270 rh#695173 |
CVE-2011-1479 | kernel-source-rt:Not affected | moderate | () | CONFIRM:ftp.osuosl.org:CVE-2011-4914 CONFIRM:git.kernel.org:CVE-2011-1479 CONFIRM:github.com:CVE-2011-1479 CVE-2011-1479 MLIST:[oss-security] 20110411 Re: CVE request: kernel: inotify memory leak RH:CVE-2011-1479 RHSA-2011:0330 RHSA-2011:0498 RHSA-2011:1253 SMASH Issue 50548 UBUNTU:CVE-2011-1479 bnc#655693 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d0de4dc584ec6aa3b26fffea320a8457827768fc rh#656830 rh#691793 |
CVE-2011-1493 | kernel-source-rt:Not affected | important | () | BID:71990 CONFIRM:ftp.osuosl.org:CVE-2011-4914 CONFIRM:git.kernel.org:CVE-2011-4913 CONFIRM:git.kernel.org:CVE-2014-3610 CONFIRM:git.kernel.org:CVE-2014-3611 CONFIRM:git.kernel.org:CVE-2014-3645 CONFIRM:git.kernel.org:CVE-2014-3646 CONFIRM:git.kernel.org:CVE-2014-3647 CONFIRM:git.kernel.org:CVE-2014-3673 CONFIRM:git.kernel.org:CVE-2014-3687 CONFIRM:git.kernel.org:CVE-2014-7822 CONFIRM:git.kernel.org:CVE-2014-7841 CONFIRM:git.kernel.org:CVE-2014-8160 CONFIRM:git.kernel.org:CVE-2014-9419 CONFIRM:git.kernel.org:CVE-2014-9529 CONFIRM:git.kernel.org:CVE-2014-9584 CONFIRM:git.kernel.org:CVE-2014-9585 CONFIRM:git.kernel.org:CVE-2015-1465 CONFIRM:git.kernel.org:CVE-2015-2041 CONFIRM:git.kernel.org:CVE-2015-2042 CONFIRM:git.kernel.org:CVE-2015-2830 CONFIRM:git.kernel.org:CVE-2015-3339 CONFIRM:git.kernel.org:CVE-2015-3636 CONFIRM:github.com:CVE-2011-4913 CVE-2011-1493 CVE-2014-9585 DSA-2240 DSA-2264 DSA-3170 FEDORA:FEDORA-2015-0937 MANDRIVA:MDVSA-2015:058 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:CVE-2014-9585 MISC:git.kernel.org:MLIST:[oss-security] 20150109 Re: PIE bypass using VDSO ASLR weakness - Linux kernel MISC:v0ids3curity.blogspot.in:CVE-2014-9585 MLIST:[oss-security] 20110405 Re: CVE request: kernel: multiple issues in ROSE MLIST:[oss-security] 20141209 PIE bypass using VDSO ASLR weakness MLIST:[oss-security] 20150109 Re: PIE bypass using VDSO ASLR weakness - Linux kernel RH:CVE-2011-1493 RH:CVE-2014-9585 RHSA-2015:1081 RHSA-2015:1778 RHSA-2015:1787 RHSA-2015:1788 SMASH Issue 44695 SUSE:SUSE-SU-2015:0178 SUSE:SUSE-SU-2015:0481 SUSE:SUSE-SU-2015:0652 SUSE:SUSE-SU-2015:0736 SUSE:SUSE-SU-2015:0812 SUSE:openSUSE-SU-2015:0566 SUSE:openSUSE-SU-2015:0714 UBUNTU:CVE-2011-1493 UBUNTU:CVE-2014-9585 UBUNTU:USN-2513-1 UBUNTU:USN-2514-1 UBUNTU:USN-2515-1 UBUNTU:USN-2516-1 UBUNTU:USN-2517-1 UBUNTU:USN-2518-1 bdo#618485 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=be20250c13f88375345ad99950190685eda51eb8 rh#1181054 rh#770777 |
CVE-2011-1494 | kernel-source-rt:Not affected | moderate | () | BID:47185 BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console CONFIRM:downloads.avaya.com:CVE-2011-1763 CONFIRM:patchwork.kernel.org:CVE-2011-1495 CONFIRM:www.vmware.com:CVE-2011-1659 CVE-2011-1494 CVE-2023-2002 DSA-2240 MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[linux-kernel] 20110405 [PATCH] drivers/scsi/mpt2sas: prevent heap overflows and unchecked reads MLIST:[oss-security] 20110405 CVE request: kernel: two issues in mpt2sas MLIST:[oss-security] 20110406 Re: CVE request: kernel: two issues in mpt2sas OSS:2023/04/16/3 RH:CVE-2011-1494 RHSA-2011:0542 RHSA-2011:0833 RHSA-2011:0883 RHSA-2011:1253 SECUNIA:46397 SMASH Issue 46137 SUSE:SUSE-SU-2015:0812 UBUNTU:CVE-2011-1494 bnc#685402 rh#694021 |
CVE-2011-1495 | kernel-source-rt:Not affected | important | () | BID:47185 BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console CONFIRM:downloads.avaya.com:CVE-2011-1763 CONFIRM:patchwork.kernel.org:CVE-2011-1495 CONFIRM:www.vmware.com:CVE-2011-1659 CVE-2011-1495 CVE-2023-2002 MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[linux-kernel] 20110405 [PATCH] drivers/scsi/mpt2sas: prevent heap overflows and unchecked reads MLIST:[oss-security] 20110405 CVE request: kernel: two issues in mpt2sas MLIST:[oss-security] 20110406 Re: CVE request: kernel: two issues in mpt2sas OSS:2023/04/16/3 RH:CVE-2011-1495 RHSA-2011:0542 RHSA-2011:0833 RHSA-2011:0883 RHSA-2011:1253 SECUNIA:46397 SMASH Issue 46138 SUSE:SUSE-SU-2015:0812 UBUNTU:CVE-2011-1495 bnc#685402 rh#694021 |
CVE-2011-1573 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2011-1573 CONFIRM:mirror.anl.gov:CVE-2011-1573 CVE-2011-1573 MLIST:[oss-security] 20110411 CVE request - kernel: sctp: fix to calc the INIT/INIT-ACK chunk length correctly to set MLIST:[oss-security] 20110411 Re: CVE request - kernel: sctp: fix to calc the INIT/INIT-ACK chunk length correctly to set RH:CVE-2011-1573 RHSA-2011:0498 RHSA-2011:0927 SMASH Issue 44696 UBUNTU:CVE-2011-1573 bnc#686813 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a8170c35e738d62e9919ce5b109cf4ed66e95bde rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#695383 rh#822754 |
CVE-2011-1576 | kernel-source-rt:Not affected | moderate | () | BID:48907 BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console CONFIRM:git.kernel.org:CVE-2011-1478 CONFIRM:mirror.anl.gov:CVE-2011-1478 CONFIRM:www.vmware.com:CVE-2011-1659 CVE-2011-1478 CVE-2011-1576 DSA-2240 MLIST:[oss-security] 20110328 CVE-2011-1478 kernel: gro: reset dev and skb_iff on skb reuse RH:CVE-2011-1478 RH:CVE-2011-1576 RHSA-2011:0421 RHSA-2011:0429 RHSA-2011:0439 RHSA-2011:0927 RHSA-2011:1090 RHSA-2011:1106 RHSA-2011:1189 RHSA-2011:1253 SECTRACK:1025853 SECUNIA:46397 SMASH Issue 231008 SMASH Issue 46254 SMASH Issue 50545 SREASON:8480 UBUNTU:CVE-2011-1478 UBUNTU:CVE-2011-1576 bnc#682965 bnc#698450 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=66c46d741e2e60f0e8b625b80edb0ab820c46d7a http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6d152e23ad1a7a5b40fef1f42e017d66e6115159 rh#691270 rh#695173 |
CVE-2011-1577 | kernel-source-rt:Not affected | moderate | () | BUGTRAQ:20110413 [PRE-SA-2011-03] Denial-of-service vulnerability in EFI partition handling code of the Linux kernel CVE-2011-1577 RH:CVE-2011-1577 RHSA-2011:0833 RHSA-2011:1253 RHSA-2011:1465 SMASH Issue 44697 UBUNTU:CVE-2011-1577 XF:kernel-guid-dos(66773) bdo#618485 bnc#687113 bnc#692784 rh#695976 |
CVE-2011-1585 | kernel-source-rt:Not affected | low | () | CONFIRM:ftp.osuosl.org:CVE-2012-4444 CONFIRM:git.kernel.org:CVE-2011-1585 CONFIRM:github.com:CVE-2011-1585 CVE-2009-4067 CVE-2011-1585 CVE-2023-2002 DSA-2240 MISC:git.kernel.org:MLIST:[oss-security] 20110415 Re: CVE Request: cifs session reuse MISC:git.kernel.org:OSS:2023/04/16/3 MISC:labs.mwrinfosecurity.com:CVE-2009-4067 MLIST:[oss-security] 20110415 Re: CVE Request: cifs session reuse OSS:2023/04/16/3 RH:CVE-2011-1585 RHSA-2011:1253 RHSA-2011:1386 SMASH Issue 44698 SUSE:SUSE-SU-2015:0812 UBUNTU:CVE-2011-1585 bnc#687812 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4ff67b720c02c36e54d55b88c2931879b7db1cd2 rh#697394 rh#722393 |
CVE-2011-1598 | kernel-source-rt:Not affected | moderate | () | BID:47503 BID:71883 BID:74450 CONFIRM:git.kernel.org:CVE-2011-1598 CONFIRM:git.kernel.org:CVE-2014-9584 CONFIRM:github.com:CVE-2014-9584 CONFIRM:www.kernel.org:CVE-2011-1748 CONFIRM:www.kernel.org:CVE-2014-9731 CONFIRM:www.kernel.org:CVE-2015-2830 CONFIRM:www.kernel.org:CVE-2015-8950 CONFIRM:www.oracle.com:CVE-2015-1351 CONFIRM:www.oracle.com:CVE-2016-2802 CVE-2011-1598 CVE-2014-9584 CVE-2015-3636 DSA-2240 DSA-2264 DSA-3128 FEDORA:FEDORA-2015-7784 MANDRIVA:MDVSA-2015:058 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:github.com:MLIST:[oss-security] 20150502 Re: CVE request for a fixed bug existed in all versions of linux kernel from KeenTeam MLIST:[netdev] 20110420 Add missing socket check in can/bcm release. MLIST:[oss-security] 20110420 CVE request: kernel: missing socket check in can/bcm release MLIST:[oss-security] 20110420 Re: CVE request: kernel: missing socket check in can/bcm release MLIST:[oss-security] 20110421 Re: CVE request: kernel: missing socket check in can/bcm release MLIST:[oss-security] 20110422 Re: CVE request: kernel: missing socket check in can/bcm release MLIST:[oss-security] 20110425 Re: CVE request: kernel: missing socket check in can/bcm release MLIST:[oss-security] 20150109 Re: CVE request Linux kernel: isofs: unchecked printing of ER records MLIST:[oss-security] 20150502 CVE request for a fixed bug existed in all versions of linux kernel from KeenTeam RH:CVE-2011-1598 RH:CVE-2014-9584 RH:CVE-2015-3636 RHSA-2011:0836 RHSA-2011:1253 RHSA-2015:0864 RHSA-2015:1137 RHSA-2015:1138 RHSA-2015:1139 RHSA-2015:1221 RHSA-2015:1534 RHSA-2015:1564 RHSA-2015:1565 RHSA-2015:1583 RHSA-2015:1643 SECTRACK:1033186 SMASH Issue 45008 SUSE:SUSE-SU-2015:0481 SUSE:SUSE-SU-2015:0529 SUSE:SUSE-SU-2015:0652 SUSE:SUSE-SU-2015:0736 SUSE:SUSE-SU-2015:0812 SUSE:openSUSE-SU-2015:0566 SUSE:openSUSE-SU-2015:0714 UBUNTU:CVE-2011-1598 UBUNTU:CVE-2014-9584 UBUNTU:CVE-2015-3636 UBUNTU:USN-2511-1 UBUNTU:USN-2512-1 UBUNTU:USN-2513-1 UBUNTU:USN-2514-1 UBUNTU:USN-2515-1 UBUNTU:USN-2516-1 UBUNTU:USN-2517-1 UBUNTU:USN-2518-1 UBUNTU:USN-2633-1 UBUNTU:USN-2634-1 bdo#618485 bnc#688685 bnc#689038 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4e2024624e678f0ebb916e6192bd23c1f9fdf696 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c6914a6f261aca0c9f715f883a353ae7ff51fe83 rh#1180119 rh#1218074 rh#698057 |
CVE-2011-1745 | kernel-source-rt:Not affected | moderate | () | BID:47534 CONFIRM:git.kernel.org:CVE-2011-2022 CONFIRM:www.kernel.org:CVE-2011-2022 CVE-2011-1745 DSA-2240 DSA-2264 MLIST:[linux-kernel] 20110414 [PATCH] char: agp: fix arbitrary kernel memory writes MLIST:[oss-security] 20110421 CVE request: kernel: buffer overflow and DoS issues in agp MLIST:[oss-security] 20110422 Re: CVE request: kernel: buffer overflow and DoS issues in agp RH:CVE-2011-1745 RHSA-2011:0927 RHSA-2011:1253 RHSA-2011:1350 SMASH Issue 45009 UBUNTU:CVE-2011-1745 bdo#618485 bnc#689797 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=194b3da873fd334ef183806db751473512af29ce rh#698996 rh#698998 |
CVE-2011-1747 | kernel-source-rt:Not affected | moderate | () | BID:47832 CONFIRM:www.kernel.org:CVE-2011-2022 CVE-2011-1747 MLIST:[linux-kernel] 20110414 [PATCH] char: agp: fix OOM and buffer overflow MLIST:[oss-security] 20110421 CVE request: kernel: buffer overflow and DoS issues in agp MLIST:[oss-security] 20110422 Re: CVE request: kernel: buffer overflow and DoS issues in agp RH:CVE-2011-1747 SECTRACK:1025441 SMASH Issue 50975 UBUNTU:CVE-2011-1747 bnc#689797 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b522f02184b413955f3bc952e3776ce41edc6355 rh#698996 rh#698998 rh#698999 |
CVE-2011-1748 | kernel-source-rt:Unsupported | moderate | () | BID:47835 CONFIRM:git.kernel.org:CVE-2011-1748 CONFIRM:www.kernel.org:CVE-2011-1748 CVE-2011-1748 DSA-2240 DSA-2264 MLIST:[netdev] 20110420 [PATCH v2] can: add missing socket check in can/raw release MLIST:[oss-security] 20110421 Re: CVE request: kernel: missing socket check in can/bcm release MLIST:[oss-security] 20110422 Re: CVE request: kernel: missing socket check in can/bcm release MLIST:[oss-security] 20110425 Re: CVE request: kernel: missing socket check in can/bcm release RH:CVE-2011-1748 RHSA-2011:0836 RHSA-2011:1253 SMASH Issue 45011 UBUNTU:CVE-2011-1748 bdo#618485 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=10022a6c66e199d8f61d9044543f38785713cbbd rh#698057 |
CVE-2011-1763 | kernel-source-rt:Unsupported | important | () | CVE-2011-1763 RH:CVE-2011-1763 RHSA-2011:0833 SMASH Issue 71672 UBUNTU:CVE-2011-1763 bnc#698254 rh#701240 |
CVE-2011-1767 | kernel-source-rt:Not affected | moderate | () | CONFIRM:ftp.osuosl.org:CVE-2013-2128 CONFIRM:git.kernel.org:CVE-2011-1767 CONFIRM:github.com:CVE-2011-1767 CVE-2011-1767 DSA-2240 DSA-2264 MISC:patchwork.ozlabs.org:MLIST:[oss-security] 20110505 Re: CVE requests - kernel network vulns MLIST:[oss-security] 20110505 Re: CVE requests - kernel network vulns RH:CVE-2011-1767 RHSA-2011:0928 RHSA-2011:1253 SMASH Issue 51016 UBUNTU:CVE-2011-1767 bdo#618485 bnc#692239 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c2892f02712e9516d72841d5c019ed6916329794 rh#702303 |
CVE-2011-1768 | kernel-source-rt:Unsupported | moderate | () | CONFIRM:ftp.osuosl.org:CVE-2013-2128 CONFIRM:git.kernel.org:CVE-2011-1768 CONFIRM:github.com:CVE-2011-1768 CVE-2011-1768 DSA-2264 MLIST:[oss-security] 20110505 Re: CVE requests - kernel network vulns RH:CVE-2011-1768 RHSA-2011:0928 RHSA-2011:1253 SMASH Issue 51020 UBUNTU:CVE-2011-1768 bdo#618485 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d5aa407f59f5b83d2c50ec88f5bf56d40f1f8978 rh#702303 |
CVE-2011-1771 | kernel-source-rt:Not affected | important | () | CONFIRM:git.kernel.org:CVE-2011-1771 CONFIRM:www.kernel.org:CVE-2011-2534 CVE-2011-1771 MLIST:[linux-cifs] 20110405 Re: Repeatable crash in 2.6.38 related to O_DIRECT MLIST:[linux-cifs] 20110405 Repeatable crash in 2.6.38 related to O_DIRECT MLIST:[oss-security] 20110509 CVE-2011-1771 kernel: cifs oops when creating file with O_DIRECT set RH:CVE-2011-1771 RHSA-2011:0836 SMASH Issue 51029 SREASON:8367 UBUNTU:CVE-2011-1771 bnc#692497 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7797069305d13252fd66cf722aa8f2cbeb3c95cd rh#703016 |
CVE-2011-1776 | kernel-source-rt:Not affected | moderate | () | BID:47796 CONFIRM:git.kernel.org:CVE-2011-1776 CONFIRM:www.kernel.org:CVE-2011-2534 CVE-2011-1776 DSA-2240 DSA-2264 MISC:www.pre-cert.de:CVE-2011-1776 MLIST:[oss-security] 20110510 Re: CVE request: kernel: validate size of EFI GUID partition entries RH:CVE-2011-1776 RHSA-2011:0927 RHSA-2011:1189 RHSA-2011:1253 SMASH Issue 45514 SREASON:8369 UBUNTU:CVE-2011-1776 bdo#618485 bnc#692784 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fa039d5f6b126fbd65eefa05db2f67e44df8f121 rh#703026 |
CVE-2011-1833 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2011-1833 CONFIRM:github.com:CVE-2011-1833 CONFIRM:www.kernel.org:CVE-2011-4594 CVE-2009-4067 CVE-2011-1833 DSA-2443 MISC:labs.mwrinfosecurity.com:CVE-2009-4067 RH:CVE-2011-1833 RHSA-2011:1241 RHSA-2011:1350 RHSA-2011:1386 SMASH Issue 45394 UBUNTU:CVE-2011-1833 bnc#709771 bnc#711539 rh#722393 rh#729465 rh#731172 |
CVE-2011-2189 | kernel-source-rt:Not affected | important | () | CONFIRM:bugs.debian.org CONFIRM:bugs.launchpad.net:CVE-2011-2189 CONFIRM:git.kernel.org:CVE-2011-2189 CONFIRM:ie.archive.ubuntu.com:CVE-2011-2189 CONFIRM:neil.brown.name:CVE-2011-2189 CONFIRM:patchwork.ozlabs.org:CVE-2011-2189 CVE-2011-2189 DSA-2305 MISC:bugs.launchpad.net:MLIST:[oss-security] 20110606 Re: CVE Request -- vsftpd -- Do not create network namespace per connection MLIST:[git-commits-head] 20091208 net: Automatically allocate per namespace data. MLIST:[oss-security] 20110606 Re: CVE Request -- vsftpd -- Do not create network namespace per connection RH:CVE-2011-2189 SMASH Issue 71907 UBUNTU:CVE-2011-2189 UBUNTU:USN-1288-1 bdo#622741 bdo#629373 bnc#698449 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2b035b39970740722598f7a9d548835f9bdd730f http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f875bae065334907796da12523f9df85c89f5712 http://neil.brown.name/git?p=linux-2.6%3Ba=patch%3Bh=2b035b39970740722598f7a9d548835f9bdd730f http://www.debian.org/security/2011/dsa-2305 rh#711134 rh#711245 |
CVE-2011-2213 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2011-2213 CONFIRM:patchwork.ozlabs.org:CVE-2011-2213 CONFIRM:www.kernel.org:CVE-2011-2213 CVE-2011-2213 DSA-2310 DSA-2389 HP:HPSBGN02970 MLIST:[netdev] 20110601 Re: inet_diag insufficient validation? MLIST:[netdev] 20110601 inet_diag insufficient validation? MLIST:[netdev] 20110603 Re: inet_diag insufficient validation? MLIST:[netdev] 20110617 [PATCH] inet_diag: fix inet_diag_bc_audit() MLIST:[oss-security] 20110620 CVE request: kernel: inet_diag: fix inet_diag_bc_audit() MLIST:[oss-security] 20110620 Re: CVE request: kernel: inet_diag: fix inet_diag_bc_audit() RH:CVE-2011-2213 RHSA-2011:0927 RHSA-2011:1189 RHSA-2011:1253 SMASH Issue 46141 UBUNTU:CVE-2011-2213 bdo#633738 bnc#700879 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=eeb1497277d6b1a0a34ed36b97e18f2bd7d6de0d rh#714536 |
CVE-2011-2482 | kernel-source-rt:Not affected | important | () | CONFIRM:ftp.osuosl.org:CVE-2011-2482 CONFIRM:git.kernel.org:CVE-2011-2482 CONFIRM:github.com:CVE-2011-2482 CVE-2011-2482 MISC:git.kernel.org:/ MLIST:[oss-security] 20130830 kernel: CVE-2011-2482/2519 RH:CVE-2011-2482 RHSA-2011:1212 RHSA-2011:1813 RHSA-2012:0007 SMASH Issue 72141 UBUNTU:CVE-2011-2482 bnc#735611 bnc#750395 rh#714867 rh#718882 rh#757143 |
CVE-2011-2484 | kernel-source-rt:Not affected | moderate | () | BID:48383 CVE-2009-4067 CVE-2011-2484 DSA-2303 DSA-2310 MISC:labs.mwrinfosecurity.com:CVE-2009-4067 MLIST:[linux-kernel] 20110616 [PATCH] taskstats: don't allow duplicate entries in listener mode MLIST:[oss-security] 20110622 CVE request: kernel: taskstats local DoS MLIST:[oss-security] 20110622 Re: CVE request: kernel: taskstats local DoS RH:CVE-2011-2484 RHSA-2011:1253 RHSA-2011:1350 RHSA-2011:1386 SMASH Issue 46142 UBUNTU:CVE-2011-2484 XF:kernel-taskstats-dos(68150) bdo#633738 bnc#701492 bnc#703153 rh#715436 rh#722393 |
CVE-2011-2491 | kernel-source-rt:Not affected | moderate | () | CONFIRM:ftp.osuosl.org:CVE-2012-3552 CONFIRM:git.kernel.org:CVE-2011-2491 CONFIRM:github.com:CVE-2011-2491 CVE-2011-2491 DSA-2303 DSA-2310 MLIST:[oss-security] 20110623 Re: CVE request: kernel: NLM: Don't hang forever on NLM unlock requests RH:CVE-2011-2491 RHSA-2011:1189 RHSA-2011:1212 RHSA-2011:1253 RHSA-2011:1813 SMASH Issue 46143 UBUNTU:CVE-2011-2491 bdo#633738 bnc#702013 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0b760113a3a155269a3fba93a409c640031dd68f rh#709393 |
CVE-2011-2492 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2011-2492 CONFIRM:www.kernel.org:CVE-2011-2492 CVE-2011-2492 DSA-2303 DSA-2310 HP:HPSBGN02970 MLIST:[linux-bluetooth] 20110508 Bluetooth: l2cap and rfcomm: fix 1 byte infoleak to userspace. MLIST:[oss-security] 20110624 CVE request: kernel: bluetooth: l2cap and rfcomm: fix 1 byte infoleak to userspace MLIST:[oss-security] 20110624 Re: CVE request: kernel: bluetooth: l2cap and rfcomm: fix 1 byte infoleak to userspace RH:CVE-2011-2492 RHSA-2011:0927 RHSA-2011:1189 RHSA-2011:1253 SECTRACK:1025778 SMASH Issue 46144 UBUNTU:CVE-2011-2492 bdo#633738 bnc#702014 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8d03e971cf403305217b8e62db3a2e5ad2d6263f rh#703019 |
CVE-2011-2494 | kernel-source-rt:Not affected | low | () | CONFIRM:git.kernel.org:CVE-2011-2494 CONFIRM:github.com:CVE-2011-2494 CONFIRM:www.kernel.org:CVE-2011-4594 CVE-2011-2494 MLIST:[oss-security] 20110627 Re: CVE request: kernel: taskstats/procfs io infoleak RH:CVE-2011-2494 RHSA-2011:1189 RHSA-2011:1212 RHSA-2011:1253 RHSA-2011:1465 RHSA-2011:1479 RHSA-2011:1813 RHSA-2012:0010 SMASH Issue 46967 SUSE:SUSE-SU-2012:0554 UBUNTU:CVE-2011-2494 bnc#703156 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1a51410abe7d0ee4b1d112780f46df87d3621043 rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#716825 rh#716842 rh#822754 |
CVE-2011-2495 | kernel-source-rt:Unsupported | low | () | CONFIRM:ftp.osuosl.org:CVE-2011-2495 CONFIRM:git.kernel.org:CVE-2011-2495 CONFIRM:github.com:CVE-2011-2495 CVE-2011-2495 DSA-2303 DSA-2310 MLIST:[oss-security] 20110627 Re: CVE request: kernel: taskstats/procfs io infoleak RH:CVE-2011-2495 RHSA-2011:1189 RHSA-2011:1212 RHSA-2011:1253 RHSA-2011:1465 RHSA-2011:1479 RHSA-2011:1813 RHSA-2012:0010 SMASH Issue 45314 UBUNTU:CVE-2011-2495 bdo#633738 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1d1221f375c94ef961ba8574ac4f85c8870ddd51 rh#716825 rh#716842 |
CVE-2011-2497 | kernel-source-rt:Not affected | important | () | BID:48472 CONFIRM:git.kernel.org:CVE-2011-2497 CONFIRM:www.kernel.org:CVE-2011-2497 CVE-2011-2497 DSA-2303 DSA-2310 MISC:git.kernel.org:/ MLIST:[linux-kernel] 20110624 [PATCH] Bluetooth: Prevent buffer overflow in l2cap config request MLIST:[oss-security] 20110624 CVE request: kernel: remote buffer overflow in bluetooth MLIST:[oss-security] 20110627 Re: CVE request: kernel: remote buffer overflow in bluetooth OSVDB:74679 RH:CVE-2011-2497 RHSA-2011:1189 RHSA-2011:1253 SMASH Issue 72147 SREASON:8359 UBUNTU:CVE-2011-2497 bdo#633738 bnc#702286 rh#716805 |
CVE-2011-2517 | kernel-source-rt:Not affected | important | () | CONFIRM:ftp.osuosl.org:CVE-2011-2518 CONFIRM:git.kernel.org:CVE-2011-2517 CONFIRM:github.com:CVE-2011-2517 CVE-2011-2517 DSA-2303 MLIST:[oss-security] 20110701 Re: CVE request: kernel: nl80211: missing check for valid SSID size in scan operations RH:CVE-2011-2517 RHSA-2011:1189 RHSA-2011:1212 RHSA-2011:1253 RHSA-2011:1813 SMASH Issue 72161 UBUNTU:CVE-2011-2517 bnc#703410 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=208c72f4fe44fe09577e7975ba0e7fa0278f3d03 rh#718152 rh#814278 |
CVE-2011-2519 | kernel-source-rt:Unsupported | moderate | () | CVE-2011-2519 D:CVE-2011-2519 MISC:xenbits.xen.org:CVE-2011-2519 MLIST:[oss-security] 20130830 kernel: CVE-2011-2482/2519 RH:CVE-2011-2519 RHSA-2011:1212 RHSA-2011:1813 SMASH Issue 72163 UBUNTU:CVE-2011-2519 bnc#735615 rh#714867 rh#718882 |
CVE-2011-2521 | kernel-source-rt:Unsupported | moderate | () | CONFIRM:ftp.osuosl.org:CVE-2011-4914 CONFIRM:git.kernel.org:CVE-2011-2521 CONFIRM:github.com:CVE-2011-2521 CVE-2011-2521 MLIST:[oss-security] 20110706 Re: CVE request: kernel: perf, x86: fix Intel fixed counters base initialization RH:CVE-2011-2521 RHSA-2011:1350 SMASH Issue 72165 UBUNTU:CVE-2011-2521 bnc#704050 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fc66c5210ec2539e800e87d7b3a985323c7be96e rh#719228 |
CVE-2011-2525 | kernel-source-rt:Not affected | important | () | CONFIRM:git.kernel.org:CVE-2011-2525 CONFIRM:mirror.anl.gov:CVE-2011-2525 CVE-2011-2525 DSA-2303 DSA-2310 MLIST:[netdev] 20100521 tc: RTM_GETQDISC causes kernel OOPS MLIST:[oss-security] 20110712 CVE-2011-2525 kernel: kernel: net_sched: fix qdisc_notify() RH:CVE-2011-2525 RHSA-2011:1065 RHSA-2011:1163 SMASH Issue 46542 UBUNTU:CVE-2011-2525 bdo#633738 bnc#735612 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=53b0f08042f04813cd1a7473dacd3edfacb28eb3 rh#720552 |
CVE-2011-2689 | kernel-source-rt:Not affected | moderate | () | BID:48677 CONFIRM:git.kernel.org:CVE-2011-2689 CONFIRM:www.kernel.org:CVE-2011-2689 CVE-2011-2689 HP:HPSBGN02970 MLIST:[oss-security] 20110713 CVE-2011-2689 kernel: gfs2: make sure fallocate bytes is a multiple of blksize RH:CVE-2011-2689 RHSA-2011:1065 RHSA-2011:1189 SECTRACK:1025776 SECUNIA:45193 SMASH Issue 72314 UBUNTU:CVE-2011-2689 XF:linux-kernel-gfs2-dos(68557) bnc#710672 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6905d9e4dda6112f007e9090bca80507da158e63 rh#720861 |
CVE-2011-2695 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2011-2695 CONFIRM:www.kernel.org:CVE-2011-2695 CVE-2009-4067 CVE-2011-2695 MISC:labs.mwrinfosecurity.com:CVE-2009-4067 MLIST:[linux-ext4] 20110603 [PATCH 1/2] ext4: Fix max file size and logical block counting of extent format file MLIST:[oss-security] 20110715 CVE Request -- kernel: ext4: kernel panic when writing data to the last block of sparse file MLIST:[oss-security] 20110715 Re: CVE Request -- kernel: ext4: kernel panic when writing data to the last block of sparse file RH:CVE-2011-2695 RHSA-2011:1189 RHSA-2011:1253 RHSA-2011:1386 SECUNIA:45193 SMASH Issue 72317 UBUNTU:CVE-2011-2695 bnc#706374 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f17722f917b2f21497deb6edc62fb1683daa08e6 rh#722393 rh#722557 |
CVE-2011-2699 | kernel-source-rt:Not affected | important | () | CONFIRM:git.kernel.org:CVE-2011-2699 CONFIRM:github.com:CVE-2011-2699 CONFIRM:www.kernel.org:CVE-2011-4594 CVE-2009-4067 CVE-2011-2699 MANDRIVA:MDVSA-2013:150 MISC:labs.mwrinfosecurity.com:CVE-2009-4067 MLIST:[oss-security] 20110720 Re: CVE request: kernel: ipv6: make fragment identifications less predictable Oracle:CVE-2011-2699 RH:CVE-2011-2699 RHSA-2011:1386 RHSA-2011:1465 RHSA-2012:0358 SECTRACK:1027274 SMASH Issue 46253 UBUNTU:CVE-2011-2699 bnc#707288 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=87c48fa3b4630905f98268dde838ee43626a060c rh#722393 rh#723429 |
CVE-2011-2707 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2011-2707 CONFIRM:github.com:CVE-2011-2707 CONFIRM:www.kernel.org:CVE-2011-4594 CVE-2011-2707 MLIST:[oss-security] 20110720 Re: CVE request: kernel: arbitrary kernel read in xtensa RH:CVE-2011-2707 SMASH Issue 72323 bnc#707337 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0d0138ebe24b94065580bd2601f8bb7eb6152f56 rh#1861851 |
CVE-2011-2898 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2011-2898 CONFIRM:github.com:CVE-2011-2898 CVE-2011-2898 DSA-2389 MISC:git.kernel.org:MLIST:[oss-security] 20110803 Re: CVE request: Linux kernel af_packet information leak MLIST:[oss-security] 20110803 Re: CVE request: Linux kernel af_packet information leak RH:CVE-2011-2898 RHSA-2011:1350 RHSA-2012:0010 SMASH Issue 72500 UBUNTU:CVE-2011-2898 bnc#710235 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=13fcb7bd322164c67926ffe272846d4860196dc6 rh#728023 |
CVE-2011-2905 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2011-2905 CONFIRM:github.com:CVE-2011-2905 CONFIRM:www.kernel.org:CVE-2011-4594 CVE-2011-2905 DSA-2303 MLIST:[oss-security] 20110809 Re: CVE request: perf: may parse user-controlled config file RH:CVE-2011-2905 RHSA-2011:1465 SMASH Issue 45789 UBUNTU:CVE-2011-2905 bdo#632923 bnc#711414 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=aba8d056078e47350d85b06a9cabd5afcc4b72ea rh#729808 |
CVE-2011-2918 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2011-2918 CONFIRM:git.kernel.org:CVE-2012-0810 CONFIRM:github.com:CVE-2011-2918 CONFIRM:www.kernel.org:CVE-2011-4594 CVE-2011-2918 CVE-2012-0810 DSA-2303 MLIST:[oss-security] 20110816 Re: CVE request -- kernel: perf: fix software event overflow RH:CVE-2011-2918 RHSA-2011:1350 RHSA-2012:0333 SMASH Issue 45517 UBUNTU:CVE-2011-2918 bnc#712366 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a8b0ca17b80e92faab46ee7179ba9e99ccb61233 rh#730706 rh#794557 |
CVE-2011-2942 | kernel-source-rt:Not affected | moderate | () | CVE-2009-4067 CVE-2011-2942 MISC:labs.mwrinfosecurity.com:CVE-2009-4067 MISC:www.redhat.com:MLIST:[oss-security] 20111024 kernel; CVE-2011-2942 and CVE-2011-3209 MLIST:[oss-security] 20111024 kernel; CVE-2011-2942 and CVE-2011-3209 RH:CVE-2011-2942 RHSA-2011:1386 RHSA-2011:1408 RHSA-2011:1418 RHSA-2011:1419 SMASH Issue 72529 UBUNTU:CVE-2011-2942 bnc#726064 rh#722393 rh#730917 rh#732878 |
CVE-2011-3188 | kernel-source-rt:Not affected | critical | () | CONFIRM:git.kernel.org:CVE-2011-3188 CONFIRM:github.com:CVE-2011-3188 CONFIRM:support.f5.com:CVE-2011-3188 CONFIRM:www.kernel.org:CVE-2011-4594 CVE-2009-4067 CVE-2011-3188 DSA-2303 DSA-2310 HP:HPSBGN02970 MISC:labs.mwrinfosecurity.com:CVE-2009-4067 MLIST:[oss-security] 20110823 Re: CVE request: kernel: change in how tcp seq numbers are generated RH:CVE-2011-3188 RHSA-2011:1386 RHSA-2011:1408 RHSA-2011:1419 RHSA-2011:1465 RHSA-2012:0010 SMASH Issue 46252 UBUNTU:CVE-2011-3188 bdo#633738 bnc#737874 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6e5714eaf77d79ae1c8b47e3e040ff5411b717ec http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bc0b96b54a21246e377122d54569eef71cec535f https://support.f5.com/csp/article/K15301?utm_source=f5support&%3Butm_medium=RSS rh#722393 rh#732658 |
CVE-2011-3359 | kernel-source-rt:Not affected | important | () | CONFIRM:ftp.osuosl.org:CVE-2011-4914 CONFIRM:git.kernel.org:CVE-2011-3359 CONFIRM:github.com:CVE-2011-3359 CVE-2011-3359 MISC:bugzilla.kernel.org:MLIST:[oss-security] 20110914 Re: CVE request -- kernel: b43: allocate receive buffers big enough for max frame len + offset MISC:github.com:MLIST:[oss-security] 20110914 Re: CVE request -- kernel: b43: allocate receive buffers big enough for max frame len + offset MLIST:[oss-security] 20110914 Re: CVE request -- kernel: b43: allocate receive buffers big enough for max frame len + offset RH:CVE-2011-3359 RHSA-2011:1465 RHSA-2012:0010 SMASH Issue 72906 UBUNTU:CVE-2011-3359 bnc#717749 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c85ce65ecac078ab1a1835c87c4a6319cf74660a rh#738202 rh#814278 |
CVE-2011-3363 | kernel-source-rt:Not affected | moderate | () | CONFIRM:ftp.osuosl.org:CVE-2011-4914 CONFIRM:git.kernel.org:CVE-2011-3363 CONFIRM:github.com:CVE-2011-3363 CVE-2011-3363 MISC:github.com:MLIST:[oss-security] 20110914 Re: CVE request -- kernel: cifs: always do is_path_accessible check in cifs_mount MLIST:[oss-security] 20110914 Re: CVE request -- kernel: cifs: always do is_path_accessible check in cifs_mount RH:CVE-2011-3363 RHSA-2011:1465 RHSA-2011:1479 RHSA-2012:0010 SMASH Issue 45984 UBUNTU:CVE-2011-3363 bnc#718028 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=70945643722ffeac779d2529a348f99567fa5c33 rh#682829 rh#738291 |
CVE-2011-3593 | kernel-source-rt:Not affected | moderate | () | CONFIRM:oss.oracle.com:CVE-2011-3593 CVE-2011-3593 MLIST:[oss-security] 20120305 CVE-2011-3593 kernel: vlan: fix panic when handling priority tagged frames RH:CVE-2011-3593 RHSA-2011:1465 SMASH Issue 73105 UBUNTU:CVE-2011-3593 bnc#735347 https://oss.oracle.com/git/?p=redpatch.git%3Ba=commit%3Bh=0e48f8daac293335e16e007663b9f4d248f89f0c https://oss.oracle.com/git/?p=redpatch.git%3Ba=commit%3Bh=fadca7bdc43b02f518585d9547019966415cadfd rh#1007690 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 |
CVE-2011-3597 | perl:Unsupported | important | () | BID:49911 CONFIRM:aix.software.ibm.com:CVE-2011-3597 CONFIRM:cpansearch.perl.org:CVE-2011-3597 CVE-2011-3597 MANDRIVA:MDVSA-2012:009 RH:CVE-2011-3597 RHSA-2011:1424 RHSA-2011:1797 SECUNIA:46279 SMASH Issue 73108 UBUNTU:CVE-2011-3597 bnc#721975 rh#743010 |
CVE-2011-3637 | kernel-source-rt:Unsupported | moderate | () | CONFIRM:ftp.osuosl.org:CVE-2011-4914 CONFIRM:git.kernel.org:CVE-2011-3637 CONFIRM:github.com:CVE-2011-3637 CVE-2011-3637 MISC:git.kernel.org:MLIST:[oss-security] 20120206 CVE-2011-3637 Linux kernel: proc: fix Oops on invalid /proc//maps access MLIST:[oss-security] 20120206 CVE-2011-3637 Linux kernel: proc: fix Oops on invalid /proc//maps access RH:CVE-2011-3637 RHSA-2012:0007 RHSA-2012:0010 SMASH Issue 73140 UBUNTU:CVE-2011-3637 bnc#740729 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=76597cd31470fa130784c78fadb4dab2e624a723 rh#747848 |
CVE-2011-4081 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2011-4081 CONFIRM:github.com:CVE-2011-4081 CONFIRM:www.kernel.org:CVE-2011-4594 CVE-2011-4081 MISC:bugs.gentoo.org:MLIST:[oss-security] 20111027 Re: CVE request: kernel: crypto: ghash: null pointer deref if no key is set MISC:git.kernel.org:/ MISC:secunia.com:MLIST:[oss-security] 20111027 Re: CVE request: kernel: crypto: ghash: null pointer deref if no key is set MLIST:[oss-security] 20111027 Re: CVE request: kernel: crypto: ghash: null pointer deref if no key is set RH:CVE-2011-4081 RHSA-2012:0010 RHSA-2012:0350 SMASH Issue 73559 UBUNTU:CVE-2011-4081 bnc#726788 rh#749475 |
CVE-2011-4086 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2011-4086 CONFIRM:github.com:CVE-2011-4086 CONFIRM:www.kernel.org:CVE-2012-1179 CVE-2011-4086 DSA-2469 RH:CVE-2011-4086 RHSA-2012:0107 RHSA-2012:0571 RHSA-2012:0670 SMASH Issue 47233 SUSE:SUSE-SU-2012:0554 SUSE:SUSE-SU-2012:0616 UBUNTU:CVE-2011-4086 bnc#745832 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=15291164b22a357cb211b618adfef4fa82fc0de3 rh#749143 rh#814278 |
CVE-2011-4089 | bzip2:Analysis | moderate | () | CVE-2011-4089 EXPLOIT-DB:18147 FULLDISC:20111025 Re: Symlink vulnerabilities MLIST:[oss-security] 20111028 Re: Request for CVE Identifier: bzexe insecure temporary file RH:CVE-2011-4089 SMASH Issue 73565 UBUNTU:CVE-2011-4089 UBUNTU:USN-1308-1 bdo#632862 bnc#739136 |
CVE-2011-4110 | kernel-source-rt:Not affected | moderate | () | BID:50755 CONFIRM:git.kernel.org:CVE-2012-0810 CVE-2011-4110 CVE-2012-0810 DSA-2389 HP:HPSBGN02970 MLIST:[linux-kernel] 20111115 [PATCH] KEYS: Fix a NULL pointer deref in the user-defined key type MLIST:[oss-security] 20111121 CVE-2011-4110 kernel: keys: NULL pointer deref in the user-defined key type MLIST:[oss-security] 20111121 Re: CVE-2011-4110 kernel: keys: NULL pointer deref in the user-defined key type MLIST:[oss-security] 20111122 Re: CVE-2011-4110 kernel: keys: NULL pointer deref in the user-defined key type RH:CVE-2011-4110 RHSA-2011:1479 RHSA-2011:1530 RHSA-2012:0010 RHSA-2012:0116 RHSA-2012:0333 SECUNIA:47754 SMASH Issue 73578 UBUNTU:CVE-2011-4110 UBUNTU:USN-1324-1 UBUNTU:USN-1328-1 UBUNTU:USN-1344-1 bnc#734056 rh#751297 rh#794557 rh#814278 |
CVE-2011-4112 | kernel-source-rt:Unsupported | moderate | () | CONFIRM:downloads.avaya.com:CVE-2011-4326 CONFIRM:git.kernel.org:CVE-2011-4112 CONFIRM:github.com:CVE-2011-4112 CONFIRM:www.kernel.org:CVE-2011-4594 CVE-2011-4112 MLIST:[oss-security] 20111121 CVE-2011-4112 kernel: null ptr deref at dev_queue_xmit+0x35/0x4d0 RH:CVE-2011-4112 SMASH Issue 73580 UBUNTU:CVE-2011-4112 bnc#731649 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=550fd08c2cebad61c548def135f67aba284c6162 rh#751006 |
CVE-2011-4131 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2011-4131 CONFIRM:git.kernel.org:CVE-2012-0810 CONFIRM:github.com:CVE-2011-4131 CONFIRM:www.kernel.org:CVE-2012-2100 CVE-2011-4131 CVE-2012-0810 FEDORA:FEDORA-2012-8359 MLIST:[oss-security] 20111111 Re: CVE Request -- kernel: nfs4_getfacl decoding kernel oops RH:CVE-2011-4131 RHSA-2012:0333 RHSA-2012:0862 RHSA-2012:1541 RHSA-2012:1580 RHSA-2013:0566 SECUNIA:48898 SMASH Issue 2062 SUSE:SUSE-SU-2012:0554 SUSE:openSUSE-SU-2013:0925 UBUNTU:CVE-2011-4131 bnc#653148 bnc#730117 bnc#762992 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bf118a342f10dafe44b14451a1392c3254629a1f rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#736425 rh#747106 rh#794557 rh#814278 rh#822754 rh#822869 rh#917012 rh#917013 rh#917017 |
CVE-2011-4132 | kernel-source-rt:Not affected | low | () | BID:50663 CONFIRM:git.kernel.org:CVE-2011-4132 CONFIRM:git.kernel.org:CVE-2012-0810 CVE-2011-4132 CVE-2012-0810 CVE-2023-2002 MISC:git.kernel.org:OSS:2023/04/16/3 MISC:xorl.wordpress.com:CVE-2011-4132 MLIST:[oss-security] 20111111 CVE Request -- kernel: jbd/jbd2: invalid value of first log block leads to oops MLIST:[oss-security] 20111113 Re: CVE Request -- kernel: jbd/jbd2: invalid value of first log block leads to oops OSS:2023/04/16/3 RH:CVE-2011-4132 RHSA-2012:0007 RHSA-2012:0010 RHSA-2012:0333 RHSA-2012:0350 SECTRACK:1026325 SMASH Issue 47905 SUSE:SUSE-SU-2012:0554 SUSE:SUSE-SU-2015:0812 UBUNTU:CVE-2011-4132 bnc#730118 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=8762202dd0d6e46854f786bdb6fb3780a1625efe rh#753341 rh#794557 rh#814278 |
CVE-2011-4324 | kernel-source-rt:Not affected | moderate | () | CONFIRM:ftp.osuosl.org:CVE-2011-4348 CONFIRM:git.kernel.org:CVE-2011-4324 CONFIRM:github.com:CVE-2011-4324 CVE-2011-4324 MLIST:[oss-security] 20120206 Re: CVE-2011-4324 kernel: nfsv4: mknod(2) DoS RH:CVE-2011-4324 RHSA-2012:0007 SMASH Issue 73775 UBUNTU:CVE-2011-4324 bnc#732613 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=dc0b027dfadfcb8a5504f7d8052754bf8d501ab9 rh#755440 |
CVE-2011-4326 | kernel-source-rt:Not affected | important | () | BID:50751 CONFIRM:downloads.avaya.com:CVE-2011-4326 CONFIRM:ftp.osuosl.org:CVE-2011-4914 CONFIRM:git.kernel.org:CVE-2011-4326 CONFIRM:github.com:CVE-2011-4326 CVE-2011-4326 MISC:git.kernel.org:/ MLIST:[oss-security] 20111121 Re: CVE Request -- kernel: wrong headroom check in udp6_ufo_fragment() RH:CVE-2011-4326 RHSA-2011:1465 RHSA-2012:0010 SMASH Issue 46256 UBUNTU:CVE-2011-4326 bnc#732021 rh#682066 rh#755584 |
CVE-2011-4327 | openssh:Unsupported | moderate | () | CONFIRM:www.openssh.com:CVE-2011-4327 CVE-2011-4327 RH:CVE-2011-4327 SMASH Issue 73777 UBUNTU:CVE-2011-4327 bnc#691400 rh#755640 |
CVE-2011-4348 | kernel-source-rt:Not affected | important | () | CONFIRM:ftp.osuosl.org:CVE-2011-4348 CONFIRM:git.kernel.org:CVE-2011-4348 CONFIRM:github.com:CVE-2011-4348 CVE-2011-4348 MISC:git.kernel.org:/ MLIST:[oss-security] 20120305 CVE-2011-4348 kernel: incomplete fix for CVE-2011-2482 RH:CVE-2011-4348 RHSA-2012:0007 SMASH Issue 73793 UBUNTU:CVE-2011-4348 bnc#750395 rh#757143 |
CVE-2011-4594 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2011-4594 CONFIRM:github.com:CVE-2011-4594 CONFIRM:www.kernel.org:CVE-2011-4594 CVE-2011-4594 MLIST:[oss-security] 20111208 Re: CVE Request -- kernel: send(m)msg: user pointer dereferences RH:CVE-2011-4594 RHSA-2012:0350 SMASH Issue 74030 UBUNTU:CVE-2011-4594 bnc#735810 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bc909d9ddbf7778371e36a651d6e4194b1cc7d4c rh#761646 |
CVE-2011-4604 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2011-4604 CONFIRM:github.com:CVE-2011-4604 CONFIRM:www.kernel.org:CVE-2013-1773 CVE-2011-4604 MISC:lists.open-mesh.org:MLIST:[oss-security] 20111211 Fwd: Re: cve request: bat_socket_read memory corruption MLIST:[b.a.t.m.a.n] 20111210 bat_socket_read missing checks MLIST:[oss-security] 20111211 Fwd: Re: cve request: bat_socket_read memory corruption RH:CVE-2011-4604 SMASH Issue 2063 SUSE:openSUSE-SU-2013:0925 UBUNTU:CVE-2011-4604 bnc#736149 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b5a1eeef04cc7859f34dec9b72ea1b28e4aba07c rh#767495 rh#814278 rh#917012 rh#917013 rh#917017 |
CVE-2011-4611 | kernel-source-rt:Not affected | moderate | () | CONFIRM:ftp.osuosl.org:CVE-2011-4914 CONFIRM:git.kernel.org:CVE-2011-4611 CONFIRM:github.com:CVE-2011-4611 CVE-2011-4611 DSA-2389 MLIST:[oss-security] 20111215 Re: CVE request - kernel: perf, powerpc: Handle events that raise an exception without overflowing RH:CVE-2011-4611 RHSA-2012:0350 SMASH Issue 74041 UBUNTU:CVE-2011-4611 bnc#744023 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0837e3242c73566fc1c0196b4ec61779c25ffc93 rh#740465 rh#767914 |
CVE-2011-4913 | kernel-source-rt:Unsupported | important | () | CONFIRM:ftp.osuosl.org:CVE-2011-4914 CONFIRM:github.com:CVE-2011-4913 CVE-2011-4913 MLIST:[oss-security] 20111227 Re: CVE request: kernel: multiple issues in ROSE RH:CVE-2011-4913 SMASH Issue 74329 SUSE:SUSE-SU-2015:0812 UBUNTU:CVE-2011-4913 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=be20250c13f88375345ad99950190685eda51eb8 rh#770777 |
CVE-2011-4914 | kernel-source-rt:Unsupported | moderate | () | CONFIRM:ftp.osuosl.org:CVE-2011-4914 CONFIRM:git.kernel.org:CVE-2011-4914 CONFIRM:github.com:CVE-2011-4914 CVE-2011-4914 DSA-2389 MLIST:[oss-security] 20111227 Re: CVE request: kernel: multiple issues in ROSE RH:CVE-2011-4914 SMASH Issue 74330 SUSE:SUSE-SU-2015:0812 UBUNTU:CVE-2011-4914 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e0bccd315db0c2f919e7fcf9cb60db21d9986f52 rh#770777 |
CVE-2011-5321 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2011-5321 CONFIRM:github.com:CVE-2011-5321 CONFIRM:www.kernel.org:CVE-2011-5321 CVE-2011-5321 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MLIST:[oss-security] 20150313 Re: CVE request: Linux kernel: tty: kobject reference leakage in tty_open RH:CVE-2011-5321 RHSA-2015:1221 SMASH Issue 114768 UBUNTU:CVE-2011-5321 bnc#922447 rh#1201887 |
CVE-2011-5325 | busybox:Released | moderate | () | BUGTRAQ:20190613 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series CVE-2011-5325 FULLDISC:20190612 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series FULLDISC:20200827 SEC Consult SA-20200827-0 :: Multiple Vulnerabilities in ZTE mobile Hotspot MS910S MISC:bugs.busybox.net:MLIST:[oss-security] 20151021 Re: CVE Request: BusyBox tar directory traversal MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.busybox.net:MLIST:[oss-security] 20151021 Re: CVE Request: BusyBox tar directory traversal MISC:packetstormsecurity.com:CVE-2010-0296 MLIST:[debian-lts-announce] 20180727 [SECURITY] [DLA 1445-1] busybox security update MLIST:[debian-lts-announce] 20210215 [SECURITY] [DLA 2559-1] busybox security update MLIST:[oss-security] 20151021 Re: CVE Request: BusyBox tar directory traversal OSS:2015/Q4/121 RH:CVE-2011-5325 SMASH Issue 158040 UBUNTU:CVE-2011-5325 USN-3935-1 bnc#951562 rh#1274215 |
CVE-2012-0028 | kernel-source-rt:Not affected | important | () | CONFIRM:ftp.osuosl.org:CVE-2012-0028 CONFIRM:git.kernel.org:CVE-2012-0028 CONFIRM:github.com:CVE-2012-0028 CVE-2012-0028 MLIST:[oss-security] 20120508 Re: CVE Request -- kernel: futex: clear robust_list on execve RH:CVE-2012-0028 RHSA-2012:0107 RHSA-2012:0358 SMASH Issue 50397 UBUNTU:CVE-2012-0028 bnc#739721 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8141c7f3e7aee618312fa1c15109e1219de784a7 rh#771764 |
CVE-2012-0056 | kernel-source-rt:Not affected | moderate | () | BID:51625 CERT-VN:VU#470151 CONFIRM:git.kernel.org:CVE-2012-0056 CONFIRM:www.kernel.org:CVE-2012-2100 CVE-2012-0056 MISC:blog.zx2c4.com:CVE-2012-0056 MISC:git.kernel.org:/ MLIST:[oss-security] 20120117 Re: CVE request: kernel: proc: clean up and fix /proc//mem handling MLIST:[oss-security] 20120118 CVE request: kernel: proc: clean up and fix /proc//mem handling MLIST:[oss-security] 20120119 Re: CVE request: kernel: proc: clean up and fix /proc//mem handling MLIST:[oss-security] 20120122 Re: CVE request: kernel: proc: clean up and fix /proc//mem handling RH:CVE-2012-0056 RHSA-2012:0052 RHSA-2012:0061 SECUNIA:47708 SMASH Issue 50436 UBUNTU:CVE-2012-0056 UBUNTU:USN-1336-1 bnc#742028 bnc#742279 bnc#743048 rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#782642 rh#822754 |
CVE-2012-0058 | kernel-source-rt:Not affected | moderate | () | CONFIRM:github.com:CVE-2012-0058 CONFIRM:www.kernel.org:CVE-2012-2100 CVE-2012-0058 HP:HPSBGN02970 MLIST:[oss-security] 20120117 Re: CVE request: kernel: Unused iocbs in a batch should not be accounted as active RH:CVE-2012-0058 SECTRACK:1027085 SMASH Issue 50442 UBUNTU:CVE-2012-0058 bnc#742030 rh#782696 |
CVE-2012-0207 | kernel-source-rt:Ignore | important | () | CONFIRM:bugs.debian.org CONFIRM:git.kernel.org:CVE-2012-0207 CONFIRM:git.kernel.org:CVE-2012-0810 CONFIRM:github.com:CVE-2012-0207 CONFIRM:www.kernel.org:CVE-2012-0207 CVE-2012-0207 CVE-2012-0810 MLIST:[oss-security] 20120110 CVE-2012-0207 kernel: igmp: Avoid zero delay when receiving odd mixture of IGMP queries RH:CVE-2012-0207 RHSA-2012:0107 RHSA-2012:0168 RHSA-2012:0333 RHSA-2012:0350 RHSA-2012:0422 SMASH Issue 50651 UBUNTU:CVE-2012-0207 bdo#654876 bnc#740448 rh#772867 rh#794557 rh#814278 |
CVE-2012-0810 | kernel-source-rt:Not affected | moderate | () | BID:50663 BID:50755 BID:51371 CONFIRM:bugs.debian.org CONFIRM:git.kernel.org:CVE-2011-2918 CONFIRM:git.kernel.org:CVE-2011-4127 CONFIRM:git.kernel.org:CVE-2011-4131 CONFIRM:git.kernel.org:CVE-2011-4132 CONFIRM:git.kernel.org:CVE-2012-0038 CONFIRM:git.kernel.org:CVE-2012-0044 CONFIRM:git.kernel.org:CVE-2012-0207 CONFIRM:git.kernel.org:CVE-2012-0810 CONFIRM:github.com:CVE-2011-2918 CONFIRM:github.com:CVE-2011-4097 CONFIRM:github.com:CVE-2011-4127 CONFIRM:github.com:CVE-2011-4131 CONFIRM:github.com:CVE-2012-0038 CONFIRM:github.com:CVE-2012-0044 CONFIRM:github.com:CVE-2012-0207 CONFIRM:www.kernel.org:CVE-2011-4594 CONFIRM:www.kernel.org:CVE-2012-0038 CONFIRM:www.kernel.org:CVE-2012-0044 CONFIRM:www.kernel.org:CVE-2012-0207 CONFIRM:www.kernel.org:CVE-2012-2100 CONFIRM:www.kernel.org:CVE-2014-2889 CVE-2011-2918 CVE-2011-4077 CVE-2011-4097 CVE-2011-4110 CVE-2011-4127 CVE-2011-4131 CVE-2011-4132 CVE-2012-0038 CVE-2012-0044 CVE-2012-0207 CVE-2012-0810 CVE-2023-2002 DSA-2303 DSA-2389 FEDORA:FEDORA-2012-8359 HP:HPSBGN02970 MISC:git.kernel.org:/ MISC:git.kernel.org:OSS:2023/04/16/3 MISC:xorl.wordpress.com:CVE-2011-4077 MISC:xorl.wordpress.com:CVE-2011-4132 MLIST:[linux-kernel] 20111115 [PATCH] KEYS: Fix a NULL pointer deref in the user-defined key type MLIST:[oss-security] 20110816 Re: CVE request -- kernel: perf: fix software event overflow MLIST:[oss-security] 20111026 CVE Request -- kernel: xfs: potential buffer overflow in xfs_readlink() MLIST:[oss-security] 20111026 Re: CVE Request -- kernel: xfs: potential buffer overflow in xfs_readlink() MLIST:[oss-security] 20111031 Re: CVE request: kernel: oom: fix integer overflow of points in oom_badness MLIST:[oss-security] 20111111 CVE Request -- kernel: jbd/jbd2: invalid value of first log block leads to oops MLIST:[oss-security] 20111111 Re: CVE Request -- kernel: nfs4_getfacl decoding kernel oops MLIST:[oss-security] 20111113 Re: CVE Request -- kernel: jbd/jbd2: invalid value of first log block leads to oops MLIST:[oss-security] 20111121 CVE-2011-4110 kernel: keys: NULL pointer deref in the user-defined key type MLIST:[oss-security] 20111121 Re: CVE-2011-4110 kernel: keys: NULL pointer deref in the user-defined key type MLIST:[oss-security] 20111122 Re: CVE-2011-4110 kernel: keys: NULL pointer deref in the user-defined key type MLIST:[oss-security] 20111222 CVE-2011-4127 kernel: possible privilege escalation via SG_IO ioctl MLIST:[oss-security] 20120110 CVE-2012-0207 kernel: igmp: Avoid zero delay when receiving odd mixture of IGMP queries MLIST:[oss-security] 20120110 Re: CVE request: kernel: xfs heap overflow MLIST:[oss-security] 20120111 Re: CVE request - kernel: drm: integer overflow in drm_mode_dirtyfb_ioctl() MLIST:[xfs] 20111018 [PATCH] Fix possible memory corruption in xfs_readlink OSS:2023/04/16/3 RH:CVE-2011-2918 RH:CVE-2011-4077 RH:CVE-2011-4097 RH:CVE-2011-4110 RH:CVE-2011-4127 RH:CVE-2011-4131 RH:CVE-2011-4132 RH:CVE-2012-0038 RH:CVE-2012-0044 RH:CVE-2012-0207 RH:CVE-2012-0810 RHSA-2011:1350 RHSA-2011:1479 RHSA-2011:1530 RHSA-2011:1849 RHSA-2011:1850 RHSA-2012:0007 RHSA-2012:0010 RHSA-2012:0107 RHSA-2012:0116 RHSA-2012:0168 RHSA-2012:0333 RHSA-2012:0350 RHSA-2012:0358 RHSA-2012:0422 RHSA-2012:0743 RHSA-2012:0862 RHSA-2012:1042 RHSA-2012:1541 RHSA-2012:1580 RHSA-2013:0566 SECTRACK:1026325 SECUNIA:47754 SECUNIA:48898 SMASH Issue 2062 SMASH Issue 2979 SMASH Issue 45517 SMASH Issue 47904 SMASH Issue 47905 SMASH Issue 47906 SMASH Issue 47907 SMASH Issue 50416 SMASH Issue 50651 SMASH Issue 73570 SMASH Issue 73578 SMASH Issue 73595 SUSE:SUSE-SU-2012:0554 SUSE:SUSE-SU-2015:0812 SUSE:openSUSE-SU-2013:0925 UBUNTU:CVE-2011-2918 UBUNTU:CVE-2011-4077 UBUNTU:CVE-2011-4097 UBUNTU:CVE-2011-4110 UBUNTU:CVE-2011-4127 UBUNTU:CVE-2011-4131 UBUNTU:CVE-2011-4132 UBUNTU:CVE-2012-0038 UBUNTU:CVE-2012-0044 UBUNTU:CVE-2012-0207 UBUNTU:CVE-2012-0810 UBUNTU:USN-1324-1 UBUNTU:USN-1328-1 UBUNTU:USN-1344-1 UBUNTU:USN-1555-1 UBUNTU:USN-1556-1 bdo#654876 bnc#653148 bnc#712366 bnc#726600 bnc#727493 bnc#730117 bnc#730118 bnc#734056 bnc#738400 bnc#740448 bnc#740703 bnc#740745 bnc#749118 bnc#762992 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=093019cf1b18dd31b2c3b77acce4e000e2cbc9ce http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a8b0ca17b80e92faab46ee7179ba9e99ccb61233 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bf118a342f10dafe44b14451a1392c3254629a1f http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=8762202dd0d6e46854f786bdb6fb3780a1625efe rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#730706 rh#736425 rh#747106 rh#749156 rh#750399 rh#751297 rh#752375 rh#753341 rh#772867 rh#772894 rh#773280 rh#794557 rh#814278 rh#822754 rh#822869 rh#917012 rh#917013 rh#917017 |
CVE-2012-0879 | kernel-source-rt:Not affected | moderate | () | CONFIRM:ftp.osuosl.org:CVE-2012-0879 CONFIRM:git.kernel.org:CVE-2012-0879 CONFIRM:github.com:CVE-2012-0879 CVE-2012-0879 DSA-2469 HP:HPSBGN02970 MLIST:[oss-security] 20120223 Re: CVE request -- kernel: block: CLONE_IO io_context refcounting issues RH:CVE-2012-0879 RHSA-2012:0481 RHSA-2012:0531 SECTRACK:1027086 SECUNIA:48545 SECUNIA:48842 SMASH Issue 47235 SUSE:SUSE-SU-2012:0616 UBUNTU:CVE-2012-0879 UBUNTU:USN-1408-1 UBUNTU:USN-1410-1 UBUNTU:USN-1411-1 bnc#748812 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=61cc74fbb87af6aa551a06a370590c9bc07e29d9 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b69f2292063d2caf37ca9aec7d63ded203701bf3 rh#796829 |
CVE-2012-0957 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2012-0957 CONFIRM:www.kernel.org:CVE-2012-4508 CVE-2012-0957 FEDORA:FEDORA-2012-17479 MLIST:[oss-security] 20121009 Linux kernel stack memory content leak via UNAME26 RH:CVE-2012-0957 RHSA-2012:1491 SECUNIA:51409 SMASH Issue 2067 UBUNTU:CVE-2012-0957 UBUNTU:USN-1644-1 UBUNTU:USN-1645-1 UBUNTU:USN-1646-1 UBUNTU:USN-1647-1 UBUNTU:USN-1648-1 UBUNTU:USN-1649-1 UBUNTU:USN-1652-1 bnc#783515 bnc#783606 linux.git:commit:2702b1526c7278c4d65d78de209a465d4de2885e rh#862877 |
CVE-2012-1088 | iproute2:Unsupported | low | () | CONFIRM:git.kernel.org:CVE-2012-1088 CVE-2012-1088 D:CVE-2012-1088 HP:HPSBGN02970 RH:CVE-2012-1088 SMASH Issue 74830 UBUNTU:CVE-2012-1088 bnc#749293 http://git.kernel.org/?p=linux/kernel/git/shemminger/iproute2.git%3Ba=commit%3Bh=20ed7b24df05eadf83168d1d0ce0052a31380928 http://git.kernel.org/?p=linux/kernel/git/shemminger/iproute2.git%3Ba=commit%3Bh=e557d1ac3a156ba7521ba44b0b412af4542f83f8 rh#797878 |
CVE-2012-1090 | kernel-source-rt:Not affected | moderate | () | CONFIRM:github.com:CVE-2012-1090 CONFIRM:www.kernel.org:CVE-2012-1146 CVE-2012-1090 DSA-2443 MLIST:[oss-security] 20120228 Re: CVE request -- kernel: cifs: dentry refcount leak when opening a FIFO on lookup leads to panic on unmount RH:CVE-2012-1090 RHSA-2012:0481 RHSA-2012:0531 SECUNIA:48842 SECUNIA:48964 SMASH Issue 47236 SUSE:SUSE-SU-2012:0554 SUSE:SUSE-SU-2012:0616 UBUNTU:CVE-2012-1090 bnc#749569 rh#798293 rh#814278 |
CVE-2012-1097 | kernel-source-rt:Ignore | important | () | CONFIRM:git.kernel.org:CVE-2012-1097 CONFIRM:github.com:CVE-2012-1097 CONFIRM:www.kernel.org:CVE-2012-1146 CVE-2012-1097 DSA-2443 MLIST:[oss-security] 20120305 CVE-2012-1097 kernel: regset: Prevent null pointer reference on readonly regsets RH:CVE-2012-1097 RHSA-2012:0481 RHSA-2012:0531 RHSA-2012:1042 SECUNIA:48842 SECUNIA:48898 SECUNIA:48964 SMASH Issue 47237 SUSE:SUSE-SU-2012:0554 SUSE:SUSE-SU-2012:0616 UBUNTU:CVE-2012-1097 bnc#750079 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c8e252586f8d5de906385d8cf6385fee289a825e rh#799209 rh#814278 |
CVE-2012-1583 | kernel-source-rt:Not affected | moderate | () | BID:53139 CONFIRM:ftp.osuosl.org:CVE-2012-1583 CONFIRM:git.kernel.org:CVE-2012-1583 CONFIRM:github.com:CVE-2012-1583 CVE-2012-1583 HP:HPSBMU02776 MISC:git.kernel.org:/ RH:CVE-2012-1583 RHSA-2012:0480 RHSA-2012:0488 RHSA-2012:0720 SECTRACK:1026930 SECUNIA:48881 SMASH Issue 51895 UBUNTU:CVE-2012-1583 bnc#757707 rh#752304 |
CVE-2012-2119 | kernel-source-rt:Not affected | moderate | () | CONFIRM:bugzilla.redhat.com:CVE-2012-2119 CONFIRM:git.kernel.org:CVE-2012-2119 CONFIRM:github.com:CVE-2012-2119 CONFIRM:oss.oracle.com:CVE-2012-2119 CONFIRM:oss.oracle.com:CVE-2012-2372 CONFIRM:www.kernel.org:CVE-2012-3511 CVE-2012-2119 MLIST:[linux-netdev] 20120416 [PATCH 3/6] macvtap: zerocopy: validate vector length before pinning user pages MLIST:[oss-security] 20120419 Re: CVE request -- kernel: macvtap: zerocopy: vector length is not validated before pinning user pages RH:CVE-2012-2119 RHSA-2012:0743 SMASH Issue 2090 SUSE:openSUSE-SU-2013:0925 UBUNTU:CVE-2012-2119 UBUNTU:USN-1529-1 bnc#758243 http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=814278 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b92946e2919134ebe2a4083e4302236295ea2a73 https://oss.oracle.com/git/?p=redpatch.git%3Ba=commit%3Bh=4aae94d1c7b32316911c86176c0ed4f8ed62da73 rh#736425 rh#814278 rh#917012 rh#917013 rh#917017 |
CVE-2012-2121 | kernel-source-rt:Not affected | moderate | () | CONFIRM:github.com:CVE-2012-2121 CONFIRM:www.kernel.org:CVE-2012-2121 CVE-2012-2121 DSA-2668 MISC:git.kernel.org:MLIST:[oss-security] 20120419 Re: CVE request -- kernel: kvm: device assignment page leak MLIST:[oss-security] 20120419 Re: CVE request -- kernel: kvm: device assignment page leak RH:CVE-2012-2121 RHSA-2012:0676 RHSA-2012:0743 SECTRACK:1027083 SECUNIA:50732 SMASH Issue 52343 UBUNTU:CVE-2012-2121 UBUNTU:USN-1577-1 UBUNTU:USN-2036-1 UBUNTU:USN-2037-1 bnc#758355 rh#814149 |
CVE-2012-2123 | kernel-source-rt:Not affected | important | () | BID:53166 CONFIRM:git.kernel.org:CVE-2012-2123 CONFIRM:github.com:CVE-2012-2123 CONFIRM:www.kernel.org:CVE-2012-2123 CVE-2012-2123 DSA-2469 MLIST:[oss-security] 20120419 Re: CVE request: kernel: fcaps: clear the same personality flags as suid when fcaps are used RH:CVE-2012-2123 RHSA-2012:0670 RHSA-2012:0743 SECTRACK:1027072 SMASH Issue 47908 UBUNTU:CVE-2012-2123 XF:linux-kernel-fcaps-sec-bypass(75043) bnc#758260 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d52fc5dde171f030170a6cb78034d166b13c9445 rh#736425 rh#806722 rh#814278 |
CVE-2012-2127 | kernel-source-rt:Not affected | important | () | BID:55774 CONFIRM:git.kernel.org:CVE-2012-2127 CONFIRM:github.com:CVE-2012-2127 CONFIRM:www.kernel.org:CVE-2012-2127 CONFIRM:www.kernel.org:CVE-2012-5517 CVE-2012-2127 MLIST:[oss-security] 20120420 Re: CVE request: pid namespace leak in kernel 3.0 and 3.1 MLIST:[oss-security] 20120422 Re: Re: CVE request: pid namespace leak in kernel 3.0 and 3.1 RH:CVE-2012-2127 SMASH Issue 52345 UBUNTU:CVE-2012-2127 UBUNTU:USN-1594-1 UBUNTU:USN-1607-1 bnc#757783 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=905ad269c55fc62bee3da29f7b1d1efeba8aa1e1 rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#736425 rh#814278 rh#815188 rh#822754 |
CVE-2012-2133 | kernel-source-rt:Not affected | moderate | () | BID:53233 CONFIRM:git.kernel.org:CVE-2012-2133 CONFIRM:github.com:CVE-2012-2133 CONFIRM:www.kernel.org:CVE-2012-2133 CVE-2012-2133 DSA-2469 MISC:git.kernel.org:/ MISC:git.kernel.org:MLIST:[oss-security] 20120424 Re: CVE Request: use after free bug in "quota" handling in hugetlb code MLIST:[oss-security] 20120424 Re: CVE Request: use after free bug in "quota" handling in hugetlb code RH:CVE-2012-2133 RHSA-2012:1426 RHSA-2012:1491 RHSA-2013:0741 SMASH Issue 47238 SUSE:SUSE-SU-2012:0616 UBUNTU:CVE-2012-2133 XF:linux-kernel-hugepages-dos(75168) bnc#758532 bnc#760855 rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#815065 rh#817430 rh#822754 |
CVE-2012-2136 | kernel-source-rt:Not affected | important | () | BID:53721 CONFIRM:git.kernel.org:CVE-2012-2136 CONFIRM:github.com:CVE-2012-2136 CONFIRM:www.kernel.org:CVE-2012-3511 CVE-2012-2136 MISC:git.kernel.org:/ RH:CVE-2012-2136 RHSA-2012:0690 RHSA-2012:0743 RHSA-2012:1087 SECUNIA:50807 SMASH Issue 52350 UBUNTU:CVE-2012-2136 UBUNTU:USN-1529-1 UBUNTU:USN-1535-1 bnc#765320 rh#736425 rh#814278 rh#816289 |
CVE-2012-2137 | kernel-source-rt:Not affected | moderate | () | BID:54063 CONFIRM:git.kernel.org:CVE-2012-2137 CONFIRM:www.kernel.org:CVE-2012-6638 CVE-2012-2137 HP:HPSBGN02970 MISC:ubuntu.5.n6.nabble.com:CVE-2012-2137 RH:CVE-2012-2137 RHSA-2012:0743 SECUNIA:50952 SECUNIA:50961 SMASH Issue 2091 SUSE:openSUSE-SU-2013:0925 UBUNTU:CVE-2012-2137 UBUNTU:USN-1529-1 UBUNTU:USN-1594-1 UBUNTU:USN-1606-1 UBUNTU:USN-1607-1 UBUNTU:USN-1609-1 bnc#767612 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=f2ebd422f71cda9c791f76f85d2ca102ae34a1ed rh#1007690 rh#742846 rh#814278 rh#816151 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 |
CVE-2012-2313 | kernel-source-rt:Not affected | moderate | () | BID:53965 CONFIRM:git.kernel.org:CVE-2012-2313 CONFIRM:github.com:CVE-2012-2313 CONFIRM:www.kernel.org:CVE-2012-2313 CVE-2012-2313 CVE-2023-2002 HP:HPSBGN02970 MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[oss-security] 20120504 Re: CVE Request: more tight ioctl permissions in dl2k driver OSS:2023/04/16/3 RH:CVE-2012-2313 RHSA-2012:1174 RHSA-2012:1282 RHSA-2012:1304 RHSA-2012:1481 RHSA-2012:1541 RHSA-2012:1589 SMASH Issue 52470 SUSE:SUSE-SU-2015:0812 UBUNTU:CVE-2012-2313 bnc#758813 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1bb57e940e1958e40d51f2078f50c3a96a9b2d75 rh#1007690 rh#1067558 rh#1094232 rh#736425 rh#814278 rh#818820 |
CVE-2012-2372 | kernel-source-rt:Not affected | moderate | () | BID:54062 CVE-2012-2372 HP:HPSBGN02970 RH:CVE-2012-2372 RHSA-2012:0743 RHSA-2012:1540 SMASH Issue 102971 SUSE:SUSE-SU-2012:1679 UBUNTU:CVE-2012-2372 UBUNTU:USN-1529-1 UBUNTU:USN-1555-1 UBUNTU:USN-1556-1 bnc#767610 https://oss.oracle.com/git/?p=redpatch.git%3Ba=commit%3Bh=c7b6a0a1d8d636852be130fa15fa8be10d4704e8 rh#1007690 rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 |
CVE-2012-2375 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2012-2375 CONFIRM:github.com:CVE-2012-2375 CONFIRM:www.kernel.org:CVE-2012-2745 CVE-2012-2375 HP:HPSBGN02970 MISC:git.kernel.org:/ MLIST:[oss-security] 20120518 Re: CVE Request -- kernel: incomplete fix for CVE-2011-4131 RH:CVE-2012-2375 RHSA-2012:1580 RHSA-2013:0566 RHSA-2013:1645 RHSA-2014:0284 SMASH Issue 52522 UBUNTU:CVE-2012-2375 bnc#851103 rh#1007690 rh#1031678 rh#742846 rh#822754 rh#822869 rh#916646 rh#917012 rh#917013 rh#917017 |
CVE-2012-2383 | kernel-source-rt:Not affected | moderate | () | BID:53971 CONFIRM:git.kernel.org:CVE-2012-2383 CONFIRM:github.com:CVE-2012-2383 CONFIRM:www.kernel.org:CVE-2012-2384 CVE-2012-2383 HP:HPSBGN02970 MISC:git.kernel.org:/ MLIST:[oss-security] 20120522 Re: CVE Request: some drm overflow checks RH:CVE-2012-2383 RHSA-2012:1156 SMASH Issue 47909 UBUNTU:CVE-2012-2383 bnc#763194 rh#824176 |
CVE-2012-2384 | kernel-source-rt:Not affected | moderate | () | BID:53971 CONFIRM:git.kernel.org:CVE-2012-2384 CONFIRM:github.com:CVE-2012-2384 CONFIRM:www.kernel.org:CVE-2012-2384 CVE-2012-2384 HP:HPSBGN02970 MISC:git.kernel.org:/ MLIST:[oss-security] 20120522 Re: CVE Request: some drm overflow checks RH:CVE-2012-2384 RHSA-2012:1304 SMASH Issue 47910 UBUNTU:CVE-2012-2384 bnc#763194 rh#824178 |
CVE-2012-2390 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2012-2390 CONFIRM:github.com:CVE-2012-2390 CONFIRM:www.kernel.org:CVE-2012-2390 CVE-2012-2390 MISC:git.kernel.org:/ MLIST:[oss-security] 20120523 Re: CVE Request -- kernel: huge pages: memory leak on mmap failure RH:CVE-2012-2390 RHSA-2012:1150 RHSA-2012:1304 SMASH Issue 47911 UBUNTU:CVE-2012-2390 UBUNTU:USN-1515-1 UBUNTU:USN-1535-1 bnc#764150 rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#822754 rh#824345 |
CVE-2012-2744 | kernel-source-rt:Not affected | important | () | BID:54367 CONFIRM:ftp.osuosl.org:CVE-2013-2128 CONFIRM:git.kernel.org:CVE-2012-2744 CONFIRM:github.com:CVE-2012-2744 CVE-2012-2744 MISC:git.kernel.org:/ RH:CVE-2012-2744 RHSA-2012:1064 RHSA-2012:1114 RHSA-2012:1129 RHSA-2012:1148 SECTRACK:1027235 SECUNIA:49928 SMASH Issue 48302 UBUNTU:CVE-2012-2744 bnc#770697 rh#833402 |
CVE-2012-2745 | kernel-source-rt:Not affected | moderate | () | BID:54365 CONFIRM:git.kernel.org:CVE-2012-2745 CONFIRM:github.com:CVE-2012-2745 CONFIRM:www.kernel.org:CVE-2012-2745 CVE-2012-2745 RH:CVE-2012-2745 RHSA-2012:1064 SECTRACK:1027236 SECUNIA:50633 SECUNIA:50853 SMASH Issue 48204 UBUNTU:CVE-2012-2745 UBUNTU:USN-1567-1 UBUNTU:USN-1597-1 UBUNTU:USN-1606-1 bnc#770695 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=79549c6dfda0603dba9a70a53467ce62d9335c33 rh#1007690 rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#742846 rh#822754 rh#833428 rh#916646 rh#917012 rh#917013 rh#917017 |
CVE-2012-3375 | kernel-source-rt:Not affected | moderate | () | CONFIRM:downloads.avaya.com:CVE-2012-3375 CONFIRM:git.kernel.org:CVE-2012-3375 CONFIRM:github.com:CVE-2012-3375 CONFIRM:www.kernel.org:CVE-2012-6638 CVE-2012-3375 MLIST:[oss-security] 20120704 Re: CVE Request -- kernel: epoll: can leak file descriptors when returning -ELOOP RH:CVE-2012-3375 RHSA-2012:1061 RHSA-2012:1150 SECTRACK:1027237 SECUNIA:51164 SMASH Issue 53213 UBUNTU:CVE-2012-3375 UBUNTU:USN-1529-1 bnc#769896 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=13d518074a952d33d47c428419693f63389547e9 rh#1007690 rh#742846 rh#814278 rh#822754 rh#837502 rh#916646 rh#917012 rh#917013 rh#917017 |
CVE-2012-3400 | kernel-source-rt:Ignore | important | () | CONFIRM:git.kernel.org:CVE-2012-3400 CONFIRM:github.com:CVE-2012-3400 CONFIRM:kb.juniper.net:CVE-2012-3400 CONFIRM:www.kernel.org:CVE-2012-3511 CVE-2012-3400 CVE-2023-2002 MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[oss-security] 20120709 Re: CVE Request: Stability fixes in UDF Logical Volume Descriptor handling OSS:2023/04/16/3 RH:CVE-2012-3400 RHSA-2012:1426 RHSA-2012:1491 RHSA-2013:0594 SECUNIA:50506 SMASH Issue 53236 SUSE:SUSE-SU-2015:0812 UBUNTU:CVE-2012-3400 UBUNTU:USN-1529-1 UBUNTU:USN-1555-1 UBUNTU:USN-1556-1 UBUNTU:USN-1557-1 bnc#769784 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1df2ae31c724e57be9d7ac00d78db8a5dabdd050 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=adee11b2085bee90bd8f4f52123ffb07882d6256 rh#814278 rh#843139 |
CVE-2012-3412 | kernel-source-rt:Ignore | important | () | CONFIRM:github.com:CVE-2012-3412 CONFIRM:www.kernel.org:CVE-2012-3520 CVE-2012-3412 MLIST:[oss-security] 20120803 Remote DoS in Linux sfc driver through TCP MSS option (CVE-2012-3412) RH:CVE-2012-3412 RHSA-2012:1323 RHSA-2012:1324 RHSA-2012:1347 RHSA-2012:1366 RHSA-2012:1375 RHSA-2012:1401 RHSA-2012:1430 SECUNIA:50633 SECUNIA:50732 SECUNIA:50811 SECUNIA:51193 SMASH Issue 48587 SMASH Issue 91283 SUSE:SUSE-SU-2012:1679 SUSE:openSUSE-SU-2012:1330 UBUNTU:CVE-2012-3412 UBUNTU:USN-1567-1 UBUNTU:USN-1568-1 UBUNTU:USN-1572-1 UBUNTU:USN-1575-1 UBUNTU:USN-1577-1 UBUNTU:USN-1578-1 UBUNTU:USN-1579-1 UBUNTU:USN-1580-1 bnc#774523 linux.git:commit:30b678d844af3305cda5953467005cebb5d7b687 linux.git:commit:7e6d06f0de3f74ca929441add094518ae332257c rh#1007690 rh#1667782 rh#1686136 rh#742846 rh#822754 rh#844714 rh#850449 rh#916646 rh#917012 rh#917013 rh#917017 |
CVE-2012-3430 | kernel-source-rt:Not affected | low | () | CONFIRM:git.kernel.org:CVE-2012-3430 CONFIRM:github.com:CVE-2012-3430 CONFIRM:www.kernel.org:CVE-2012-3430 CVE-2012-3430 MLIST:[oss-security] 20120726 Re: CVE Request -- kernel: recv{from,msg}() on an rds socket can leak kernel memory RH:CVE-2012-3430 RHSA-2012:1304 RHSA-2012:1323 RHSA-2012:1491 SMASH Issue 48434 SMASH Issue 48438 SUSE:SUSE-SU-2012:1679 UBUNTU:CVE-2012-3430 UBUNTU:USN-1567-1 UBUNTU:USN-1568-1 UBUNTU:USN-1572-1 UBUNTU:USN-1575-1 UBUNTU:USN-1577-1 UBUNTU:USN-1578-1 UBUNTU:USN-1579-1 UBUNTU:USN-1580-1 bnc#773383 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=06b6a1cf6e776426766298d055bb3991957d90a7 rh#1007690 rh#1667782 rh#1686136 rh#562582 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#742846 rh#820039 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 |
CVE-2012-3520 | kernel-source-rt:Not affected | low | () | BID:55152 CONFIRM:git.kernel.org:CVE-2012-3520 CONFIRM:www.kernel.org:CVE-2012-3520 CONFIRM:www.oracle.com:CVE-2015-1351 CVE-2012-3520 MISC:git.kernel.org:MLIST:[oss-security] 20120822 CVE-2012-3520 kernel: af_netlink: invalid handling of SCM_CREDENTIALS passing MLIST:[oss-security] 20120822 CVE-2012-3520 kernel: af_netlink: invalid handling of SCM_CREDENTIALS passing RH:CVE-2012-3520 RHSA-2012:1491 SECUNIA:50848 SMASH Issue 53316 SUSE:openSUSE-SU-2012:1330 SUSE:openSUSE-SU-2013:0261 UBUNTU:CVE-2012-3520 UBUNTU:USN-1599-1 UBUNTU:USN-1610-1 bnc#776925 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea linux.git:commit:8f8ba75ee2065738644382667f833a4eb6f6db1d linux.git:commit:e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea rh#850449 |
CVE-2012-3552 | kernel-source-rt:Not affected | important | () | CONFIRM:ftp.osuosl.org:CVE-2012-3552 CONFIRM:git.kernel.org:CVE-2012-3552 CONFIRM:github.com:CVE-2012-3552 CVE-2012-3552 DSA-2668 MISC:git.kernel.org:MLIST:[oss-security] 20120831 Re: CVE Request -- kernel: net: slab corruption due to improper synchronization around inet->opt MLIST:[oss-security] 20120831 Re: CVE Request -- kernel: net: slab corruption due to improper synchronization around inet->opt RH:CVE-2012-3552 RHSA-2012:1304 RHSA-2012:1540 RHSA-2013:1166 RHSA-2013:1173 RHSA-2013:1195 RHSA-2013:1450 SMASH Issue 53339 UBUNTU:CVE-2012-3552 bnc#778460 bnc#827565 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f6d8bd051c391c1c0458a30b2a7abcd939329259 rh#853465 rh#979936 |
CVE-2012-4398 | kernel-source-rt:Not affected | moderate | () | BID:55361 CONFIRM:www.kernel.org:CVE-2012-4398 CVE-2012-4398 CVE-2023-2002 MISC:bugs.launchpad.net:MLIST:[oss-security] 20120902 CVE Request -- kernel: request_module() OOM local DoS MISC:git.kernel.org:MLIST:[oss-security] 20141024 kvm issues MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[linux-kernel] 20120207 [PATCH 5/5] kmod: make __request_module() killable MLIST:[oss-security] 20120902 CVE Request -- kernel: request_module() OOM local DoS OSS:2023/04/16/3 RH:CVE-2012-4398 RHSA-2012:1282 RHSA-2013:0223 RHSA-2013:1348 RHSA-2015:2152 SECUNIA:55077 SMASH Issue 53878 UBUNTU:CVE-2012-4398 UBUNTU:CVE-2014-3646 UBUNTU:CVE-2014-3647 UBUNTU:CVE-2014-3673 UBUNTU:CVE-2014-7841 bnc#778463 bnc#779488 linux.git:commit:786235eeba0e1e85e5cbbb9f97d1087ad03dfa21 rh#1113899 rh#1163762 rh#853474 |
CVE-2012-4444 | kernel-source-rt:Not affected | moderate | () | CONFIRM:ftp.osuosl.org:CVE-2012-4444 CONFIRM:git.kernel.org:CVE-2012-4444 CONFIRM:github.com:CVE-2012-4444 CVE-2012-4444 MISC:git.kernel.org:MLIST:[oss-security] 20121109 Re: CVE request --- acceptation of overlapping ipv6 fragments MISC:media.blackhat.com:CVE-2012-4444 MLIST:[oss-security] 20121109 Re: CVE request --- acceptation of overlapping ipv6 fragments RH:CVE-2012-4444 RHSA-2012:1580 RHSA-2013:0168 SMASH Issue 49980 SUSE:SUSE-SU-2013:0856 UBUNTU:CVE-2012-4444 UBUNTU:USN-1660-1 UBUNTU:USN-1661-1 bnc#789831 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=70789d7052239992824628db8133de08dc78e593 rh#1007690 rh#742846 rh#822754 rh#874835 rh#916646 rh#917012 rh#917013 rh#917017 |
CVE-2012-4461 | kernel-source-rt:Not affected | low | () | BID:56414 CONFIRM:git.kernel.org:CVE-2012-4461 CONFIRM:www.kernel.org:CVE-2012-4461 CVE-2012-4461 DSA-2668 MISC:article.gmane.org:CVE-2012-4461 MLIST:[oss-security] 20121106 CVE-2012-4461 -- kernel: kvm: invalid opcode oops on SET_SREGS with OSXSAVE bit set RH:CVE-2012-4461 RHSA-2013:0223 RHSA-2013:0882 SECUNIA:51160 SMASH Issue 2158 SUSE:SUSE-SU-2012:1679 SUSE:openSUSE-SU-2013:0925 UBUNTU:CVE-2012-4461 bnc#787821 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux.git%3Ba=commit%3Bh=6d1068b3a98519247d8ba4ec85cd40ac136dbdf9 linux.git:commit:6d1068b3a98519247d8ba4ec85cd40ac136dbdf9 linux.git:commit:9924a1992a86ebdb7ca36ef790d2ba0da506296c rh#814278 rh#862900 rh#917012 rh#917013 rh#917017 |
CVE-2012-4508 | kernel-source-rt:Not affected | low | () | CONFIRM:git.kernel.org:CVE-2012-4508 CONFIRM:github.com:CVE-2012-4508 CONFIRM:www.kernel.org:CVE-2012-4508 CVE-2012-4508 DSA-2668 FEDORA:FEDORA-2012-17479 MISC:git.kernel.org:MLIST:[oss-security] 20121025 CVE-2012-4508 -- kernel: ext4: AIO vs fallocate stale data exposure MLIST:[oss-security] 20121025 CVE-2012-4508 -- kernel: ext4: AIO vs fallocate stale data exposure RH:CVE-2012-4508 RHSA-2012:1491 RHSA-2012:1540 RHSA-2013:0496 RHSA-2013:1519 RHSA-2013:1783 SMASH Issue 75662 SUSE:SUSE-SU-2012:1679 UBUNTU:CVE-2012-4508 UBUNTU:USN-1645-1 UBUNTU:USN-1899-1 UBUNTU:USN-1900-1 bnc#784192 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=dee1f973ca341c266229faa5a1a5bb268bed3531 linux.git:commit:e589db7a6a9c8f1557007f2cc765ee28ad7a1edd rh#850449 rh#869904 |
CVE-2012-4530 | kernel-source-rt:Not affected | low | () | CONFIRM:git.kernel.org:CVE-2012-4530 CONFIRM:github.com:CVE-2012-4530 CONFIRM:www.kernel.org:CVE-2013-4591 CVE-2012-4530 L3:42372 MLIST:[oss-security] 20121019 Re: CVE Request -- kernel stack disclosure in binfmt_script load_script() RH:CVE-2012-4530 RHSA-2013:0223 RHSA-2013:0566 SMASH Issue 49701 SUSE:SUSE-SU-2013:0674 UBUNTU:CVE-2012-4530 bnc#786013 bnc#915881 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b66c5984017533316fd1951770302649baf1aa33 rh#1007690 rh#742846 rh#822754 rh#868285 rh#916646 rh#917012 rh#917013 rh#917017 |
CVE-2012-4542 | kernel-source-rt:Not affected | moderate | () | CONFIRM:oss.oracle.com:CVE-2012-4542 CVE-2012-4542 MLIST:[linux-kernel] 20130124 [PATCH 00/13] Corrections and customization of the SG_IO command whitelist (CVE-2012-4542) MLIST:[linux-kernel] 20130124 [PATCH 04/13] sg_io: resolve conflicts between commands assigned to multiple classes (CVE-2012-4542) RH:CVE-2012-4542 RHSA-2013:0496 RHSA-2013:0579 RHSA-2013:0622 RHSA-2013:0882 RHSA-2013:0928 SMASH Issue 2164 UBUNTU:CVE-2012-4542 bnc#807154 https://oss.oracle.com/git/?p=redpatch.git%3Ba=commit%3Bh=76a274e17114abf1a77de6b651424648ce9e10c8 rh#875360 |
CVE-2012-4565 | kernel-source-rt:Not affected | moderate | () | BID:56346 CONFIRM:git.kernel.org:CVE-2012-4565 CONFIRM:github.com:CVE-2012-4565 CONFIRM:www.kernel.org:CVE-2012-4565 CVE-2012-4565 FEDORA:FEDORA-2012-17479 MLIST:[oss-security] 20121031 Re: CVE Request -- kernel: net: divide by zero in tcp algorithm illinois RH:CVE-2012-4565 RHSA-2012:1491 RHSA-2012:1580 SMASH Issue 2167 UBUNTU:CVE-2012-4565 UBUNTU:USN-1644-1 UBUNTU:USN-1645-1 UBUNTU:USN-1646-1 UBUNTU:USN-1647-1 UBUNTU:USN-1648-1 UBUNTU:USN-1649-1 UBUNTU:USN-1650-1 UBUNTU:USN-1651-1 UBUNTU:USN-1652-1 bnc#787576 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664 rh#1007690 rh#742846 rh#822754 rh#871848 rh#916646 rh#917012 rh#917013 rh#917017 |
CVE-2012-5195 | perl:Unsupported | important | () | BID:56287 CONFIRM:perl5.git.perl.org:CVE-2012-5195 CONFIRM:wiki.mageia.org:CVE-2012-5195 CVE-2012-5195 DSA-2586 MANDRIVA:MDVSA-2013:113 MLIST:[oss-security] 20121026 Medium severity flaw with Perl 5 MLIST:[oss-security] 20121027 Re: Medium severity flaw with Perl 5 RH:CVE-2012-5195 RHSA-2013:0685 SECUNIA:51457 SMASH Issue 76256 UBUNTU:CVE-2012-5195 UBUNTU:USN-1643-1 bdo#689314 bdo#693420 bdo#695223 bnc#794535 rh#862413 |
CVE-2012-6539 | kernel-source-rt:Not affected | low | () | CONFIRM:git.kernel.org:CVE-2012-6539 CONFIRM:github.com:CVE-2012-6539 CVE-2012-6539 DSA-2668 RH:CVE-2012-6539 SMASH Issue 77497 UBUNTU:CVE-2012-6539 bnc#809891 rh#1007690 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#922133 |
CVE-2012-6542 | kernel-source-rt:Not affected | low | () | CONFIRM:git.kernel.org:CVE-2012-6542 CONFIRM:github.com:CVE-2012-6542 CVE-2012-6542 DSA-2668 RH:CVE-2012-6542 RHSA-2013:0747 RHSA-2013:1645 SMASH Issue 77500 UBUNTU:CVE-2012-6542 bnc#809894 rh#1007690 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#922322 |
CVE-2012-6543 | kernel-source-rt:Unsupported | low | () | CONFIRM:git.kernel.org:CVE-2012-6543 CONFIRM:github.com:CVE-2012-6543 CVE-2012-6543 RH:CVE-2012-6543 SMASH Issue 77501 UBUNTU:CVE-2012-6543 bnc#809896 rh#922341 |
CVE-2012-6544 | kernel-source-rt:Not affected | low | () | CONFIRM:git.kernel.org:CVE-2012-6544 CONFIRM:github.com:CVE-2012-6544 CVE-2012-6544 DSA-2668 RH:CVE-2012-6544 RHSA-2013:1034 RHSA-2013:1173 RHSA-2013:1195 SMASH Issue 77502 UBUNTU:CVE-2012-6544 bnc#809898 rh#1007690 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#922414 |
CVE-2012-6545 | kernel-source-rt:Not affected | low | () | CONFIRM:git.kernel.org:CVE-2012-6545 CONFIRM:github.com:CVE-2012-6545 CVE-2012-6545 DSA-2668 RH:CVE-2012-6545 RHSA-2013:1034 RHSA-2013:1645 SMASH Issue 77503 UBUNTU:CVE-2012-6545 bnc#809899 rh#1007690 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#922404 |
CVE-2012-6546 | kernel-source-rt:Not affected | low | () | CONFIRM:git.kernel.org:CVE-2012-6546 CONFIRM:github.com:CVE-2012-6546 CVE-2012-6546 DSA-2668 RH:CVE-2012-6546 RHSA-2013:0744 RHSA-2013:0747 SMASH Issue 77504 UBUNTU:CVE-2012-6546 bnc#809900 rh#1007690 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#922383 |
CVE-2012-6547 | kernel-source-rt:Not affected | low | () | CONFIRM:git.kernel.org:CVE-2012-6547 CONFIRM:github.com:CVE-2012-6547 CVE-2012-6547 RH:CVE-2012-6547 RHSA-2013:0744 RHSA-2013:0747 SMASH Issue 77505 UBUNTU:CVE-2012-6547 bnc#809901 rh#1007690 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#922344 |
CVE-2012-6548 | kernel-source-rt:Not affected | low | () | CONFIRM:git.kernel.org:CVE-2012-6548 CONFIRM:github.com:CVE-2012-6548 CVE-2012-6548 DSA-2668 RH:CVE-2012-6548 RHSA-2013:1051 RHSA-2013:1080 SMASH Issue 77506 SUSE:openSUSE-SU-2013:1187 UBUNTU:CVE-2012-6548 bnc#809902 rh#1007690 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#922353 |
CVE-2012-6549 | kernel-source-rt:Not affected | low | () | CONFIRM:git.kernel.org:CVE-2012-6549 CONFIRM:github.com:CVE-2012-6549 CVE-2012-6549 DSA-2668 RH:CVE-2012-6549 SMASH Issue 77507 UBUNTU:CVE-2012-6549 bnc#809903 rh#1007690 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#922359 |
CVE-2012-6638 | kernel-source-rt:Unsupported | important | () | CONFIRM:git.kernel.org:CVE-2012-6638 CONFIRM:github.com:CVE-2012-6638 CONFIRM:www.kernel.org:CVE-2012-6638 CVE-2012-6638 D:CVE-2012-6638 RH:CVE-2012-6638 RHSA-2014:0433 RHSA-2014:0772 SMASH Issue 96328 UBUNTU:CVE-2012-6638 rh#1066055 rh#826702 |
CVE-2012-6647 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2012-6647 CONFIRM:github.com:CVE-2012-6647 CONFIRM:www.kernel.org:CVE-2012-6647 CVE-2012-6647 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MLIST:[oss-security] 20140514 Re: CVE request Linux kernel: forbid uaddr == uaddr2 in futex_wait_requeue_pi() to avoid null dereference RH:CVE-2012-6647 RHSA-2014:0981 SMASH Issue 98811 UBUNTU:CVE-2012-6647 bnc#878289 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6f7b0a2a5c0fb03be7c25bd1745baa50582348ef rh#1094232 rh#1097746 |
CVE-2012-6657 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2012-6657 CONFIRM:github.com:CVE-2012-6657 CONFIRM:www.kernel.org:CVE-2013-1826 CVE-2012-6657 CVE-2023-2002 HP:HPSBGN03282 HP:HPSBGN03285 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[oss-security] 20140915 Re: CVE request Linux kernel: net: guard tcp_set_keepalive against crash OSS:2023/04/16/3 RH:CVE-2012-6657 RHSA-2014:1997 SMASH Issue 106206 SUSE:SUSE-SU-2015:0652 SUSE:SUSE-SU-2015:0812 UBUNTU:CVE-2012-6657 bnc#896779 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3e10986d1d698140747fcfc2761ec9cb64c1d582 rh#1141742 rh#1163762 |
CVE-2012-6689 | kernel-source-rt:Unsupported | moderate | () | BID:72739 CONFIRM:git.kernel.org:CVE-2012-6689 CONFIRM:github.com:CVE-2012-6689 CONFIRM:www.kernel.org:CVE-2013-6282 CVE-2012-6689 MISC:git.kernel.org:MLIST:[oss-security] 20150222 Re: libmnl: incorrect validation of netlink message origin allows attackers to spoof netlink messages MLIST:[linux-kernel] 20120817 [PATCH 0/2] netlink patches MLIST:[linux-kernel] 20120817 [PATCH 2/2] [RFC] netlink: fix possible spoofing from non-root processes MLIST:[oss-security] 20150222 Re: libmnl: incorrect validation of netlink message origin allows attackers to spoof netlink messages RH:CVE-2012-6689 RHSA-2014:1392 SMASH Issue 114326 UBUNTU:CVE-2012-6689 bnc#920170 rh#848949 |
CVE-2012-6701 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2012-6701 CONFIRM:github.com:CVE-2012-6701 CONFIRM:www.kernel.org:CVE-2012-6701 CVE-2012-6701 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:MLIST:[oss-security] 20160302 Re: CVE Request: Linux: aio write triggers integer overflow in some network protocols MLIST:[oss-security] 20160302 Re: CVE Request: Linux: aio write triggers integer overflow in some network protocols OSS:2016/Q1/491 Oracle:CVE-2016-5244 RH:CVE-2012-6701 RHSA-2018:1854 SMASH Issue 162482 UBUNTU:CVE-2012-6701 bnc#969354 rh#1314288 rh#1324749 |
CVE-2012-6703 | kernel-source-rt:Not affected | low | () | BID:91502 CONFIRM:git.kernel.org:CVE-2012-6703 CONFIRM:github.com:CVE-2012-6703 CONFIRM:www.kernel.org:CVE-2012-6703 CVE-2012-6703 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MLIST:[oss-security] 20160628 Re: CVE Request: integer overflow in ALSA snd_compress_check_input OSS:2016/Q2/616 RH:CVE-2012-6703 SECTRACK:1036190 SMASH Issue 170551 UBUNTU:CVE-2012-6703 bnc#986941 rh#1351076 |
CVE-2012-6704 | kernel-source-rt:Not affected | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | BID:95135 CONFIRM:git.kernel.org:CVE-2012-6704 CONFIRM:github.com:CVE-2012-6704 CVE-2012-6704 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MLIST:[oss-security] 20161202 Re: CVE Request: Linux: signed overflows for SO_{SND|RCV}BUFFORCE OSS:2016/Q4/574 RH:CVE-2012-6704 RHSA-2017:0931 RHSA-2017:0932 RHSA-2017:0933 SMASH Issue 177085 UBUNTU:CVE-2012-6704 bnc#1013542 rh#1402013 rh#1402024 |
CVE-2012-6712 | kernel-source-rt:Unsupported | critical | () | CVE-2012-6712 D:CVE-2012-6712 MISC:git.kernel.org:CVE-2012-6712 MISC:github.com:CVE-2012-6712 MISC:mirrors.edge.kernel.org:CVE-2012-6712 RH:CVE-2012-6712 SMASH Issue 238132 UBUNTU:CVE-2012-6712 bnc#1143176 rh#1735642 |
CVE-2013-0211 | libarchive:Not affected | moderate | () | BID:58926 CONFIRM:github.com:CVE-2013-0211 CVE-2013-0211 FEDORA:FEDORA-2013-4522 FEDORA:FEDORA-2013-4537 FEDORA:FEDORA-2013-4576 FEDORA:FEDORA-2013-4592 FREEBSD:FreeBSD-SA-16:23 MANDRIVA:MDVSA-2013:147 RH:CVE-2013-0211 SECTRACK:1035995 SMASH Issue 90994 SUSE:openSUSE-SU-2015:0568 UBUNTU:CVE-2013-0211 UBUNTU:USN-2549-1 bnc#800024 rh#902998 |
CVE-2013-0216 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2013-0216 CONFIRM:git.kernel.org:CVE-2013-0217 CONFIRM:github.com:CVE-2013-0216 CONFIRM:github.com:CVE-2013-0217 CONFIRM:www.kernel.org:CVE-2013-0217 CVE-2013-0216 CVE-2013-0217 L3:42372 MANDRIVA:MDVSA-2013:176 MLIST:[oss-security] 20130205 Xen Security Advisory 39 (CVE-2013-0216,CVE-2013-0217) - Linux netback DoS via malicious guest ring. RH:CVE-2013-0216 RH:CVE-2013-0217 RHSA-2013:0747 SMASH Issue 2238 SUSE:SUSE-SU-2013:0674 SUSE:openSUSE-SU-2013:0395 SUSE:openSUSE-SU-2013:0925 UBUNTU:CVE-2013-0216 UBUNTU:CVE-2013-0217 bnc#800280 bnc#800801 bnc#915881 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=48856286b64e4b66ec62b94e504d0b29c1ade664 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7d5145d8eb2b9791533ffe4dc003b129b9696c48 linux.git:commit:0c35565b460ff99f973fb4a9ec63fbcb4176d2e6 rh#1007690 rh#1667782 rh#1686136 rh#742846 rh#814278 rh#822754 rh#910883 rh#916646 rh#917012 rh#917013 rh#917017 |
CVE-2013-0217 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2013-0216 CONFIRM:git.kernel.org:CVE-2013-0217 CONFIRM:github.com:CVE-2013-0216 CONFIRM:github.com:CVE-2013-0217 CONFIRM:www.kernel.org:CVE-2013-0217 CVE-2013-0216 CVE-2013-0217 L3:42372 MANDRIVA:MDVSA-2013:176 MLIST:[oss-security] 20130205 Xen Security Advisory 39 (CVE-2013-0216,CVE-2013-0217) - Linux netback DoS via malicious guest ring. RH:CVE-2013-0216 RH:CVE-2013-0217 RHSA-2013:0747 SMASH Issue 2238 SMASH Issue 54043 SUSE:SUSE-SU-2013:0674 SUSE:openSUSE-SU-2013:0395 SUSE:openSUSE-SU-2013:0925 UBUNTU:CVE-2013-0216 UBUNTU:CVE-2013-0217 bnc#800280 bnc#800801 bnc#915881 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=48856286b64e4b66ec62b94e504d0b29c1ade664 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7d5145d8eb2b9791533ffe4dc003b129b9696c48 linux.git:commit:0c35565b460ff99f973fb4a9ec63fbcb4176d2e6 rh#1007690 rh#1667782 rh#1686136 rh#742846 rh#814278 rh#822754 rh#910883 rh#916646 rh#917012 rh#917013 rh#917017 |
CVE-2013-0228 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2013-0228 CONFIRM:www.kernel.org:CVE-2013-0228 CVE-2013-0228 MANDRIVA:MDVSA-2013:176 MLIST:[oss-security] 20130213 Xen Security Advisory 42 (CVE-2013-0228) - Linux kernel hits general protection if %ds is corrupt for 32-bit PVOPS. RH:CVE-2013-0228 RHSA-2013:0630 SMASH Issue 54051 UBUNTU:CVE-2013-0228 UBUNTU:USN-1795-1 UBUNTU:USN-1796-1 UBUNTU:USN-1797-1 UBUNTU:USN-1805-1 UBUNTU:USN-1808-1 bnc#801179 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=13d2b4d11d69a92574a55bfd985cfb0ca77aebdc linux.git:commit:13d2b4d11d69a92574a55bfd985cfb0ca77aebdc linux.git:commit:f741656d646f7a5b56ba86765205b954237e7956 rh#906309 |
CVE-2013-0290 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2013-0290 CONFIRM:github.com:CVE-2013-0290 CONFIRM:www.kernel.org:CVE-2013-0290 CVE-2013-0290 MANDRIVA:MDVSA-2013:176 MISC:git.kernel.org:/ MLIST:[oss-security] 20130214 Re: CVE Request: kernel -- local DOS (endless loop with interrupts disabled) RH:CVE-2013-0290 RHSA-2013:0622 SMASH Issue 2240 SUSE:openSUSE-SU-2013:0951 SUSE:openSUSE-SU-2013:1042 UBUNTU:CVE-2013-0290 bnc#803931 rh#911473 |
CVE-2013-0309 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2013-0309 CONFIRM:github.com:CVE-2013-0309 CONFIRM:www.kernel.org:CVE-2013-0309 CVE-2013-0309 MISC:git.kernel.org:MLIST:[oss-security] 20130219 Re: CVE request -- Linux kernel: mm: thp: pmd_present and PROT_NONE local DoS MLIST:[oss-security] 20130219 Re: CVE request -- Linux kernel: mm: thp: pmd_present and PROT_NONE local DoS RH:CVE-2013-0309 RHSA-2013:0496 SMASH Issue 54085 UBUNTU:CVE-2013-0309 bnc#804652 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=027ef6c87853b0a9df53175063028edb4950d476 rh#912898 |
CVE-2013-0310 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2013-0310 CONFIRM:github.com:CVE-2013-0310 CONFIRM:www.kernel.org:CVE-2013-0310 CVE-2013-0310 MISC:git.kernel.org:/ MLIST:[oss-security] 20130219 Re: CVE request -- Linux kernel: net: CIPSO_V4_TAG_LOCAL tag NULL pointer dereference RH:CVE-2013-0310 RHSA-2013:0496 SMASH Issue 49503 UBUNTU:CVE-2013-0310 bnc#804653 rh#1007690 rh#1706097 rh#742846 rh#822754 rh#912900 rh#916646 rh#917012 rh#917013 rh#917017 |
CVE-2013-0340 | expat:Ignore | moderate | () | BID:58233 CONFIRM:support.apple.com:CVE-2013-0340 CONFIRM:support.apple.com:CVE-2021-22925 CONFIRM:support.apple.com:CVE-2021-30847 CONFIRM:support.apple.com:CVE-2021-30897 CVE-2013-0340 CVE-2013-0341 FULLDISC:20210921 APPLE-SA-2021-09-20-1 iOS 15 and iPadOS 15 FULLDISC:20210921 APPLE-SA-2021-09-20-2 watchOS 8 FULLDISC:20210921 APPLE-SA-2021-09-20-3 tvOS 15 FULLDISC:20210921 APPLE-SA-2021-09-20-6 Additional information for APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8 FULLDISC:20210921 APPLE-SA-2021-09-20-7 Additional information for APPLE-SA-2021-09-13-3 macOS Big Sur 11.6 FULLDISC:20210921 APPLE-SA-2021-09-20-8 Additional information for APPLE-SA-2021-09-13-4 Security Update 2021-005 Catalina FULLDISC:20211027 APPLE-SA-2021-10-26-10 Additional information for APPLE-SA-2021-09-20-2 watchOS 8 FULLDISC:20211027 APPLE-SA-2021-10-26-11 Additional information for APPLE-SA-2021-09-20-3 tvOS 15 FULLDISC:20211027 APPLE-SA-2021-10-26-9 Additional information for APPLE-SA-2021-09-20-1 iOS 15 and iPadOS 15 GENTOO:GLSA-201701-21 MISC:lists.apache.org:CVE-2021-40439 MLIST:[announce] 20211007 CVE-2021-40439: Apache OpenOffice: Billion Laughs MLIST:[openoffice-users] 20211007 CVE-2021-40439: Apache OpenOffice: Billion Laughs MLIST:[oss-security] 20130221 CVEs for libxml2 and expat internal and external XML entity expansion MLIST:[oss-security] 20130412 Re-evaluating expat/libxml2 CVE assignments OSS:2021/10/07/4 OSS:2021/Q4/15 OSVDB:90634 RH:CVE-2013-0340 RH:CVE-2013-0341 SECTRACK:1028213 SMASH Issue 91263 UBUNTU:CVE-2013-0340 UBUNTU:CVE-2013-0341 bnc#805236 https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d%40%3Cannounce.apache.org%3E rh#1000109 rh#1000110 |
CVE-2013-0341 | expat:Ignore | moderate | () | BID:58233 CONFIRM:support.apple.com:CVE-2013-0340 CONFIRM:support.apple.com:CVE-2021-22925 CONFIRM:support.apple.com:CVE-2021-30847 CONFIRM:support.apple.com:CVE-2021-30897 CVE-2013-0340 CVE-2013-0341 FULLDISC:20210921 APPLE-SA-2021-09-20-1 iOS 15 and iPadOS 15 FULLDISC:20210921 APPLE-SA-2021-09-20-2 watchOS 8 FULLDISC:20210921 APPLE-SA-2021-09-20-3 tvOS 15 FULLDISC:20210921 APPLE-SA-2021-09-20-6 Additional information for APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8 FULLDISC:20210921 APPLE-SA-2021-09-20-7 Additional information for APPLE-SA-2021-09-13-3 macOS Big Sur 11.6 FULLDISC:20210921 APPLE-SA-2021-09-20-8 Additional information for APPLE-SA-2021-09-13-4 Security Update 2021-005 Catalina FULLDISC:20211027 APPLE-SA-2021-10-26-10 Additional information for APPLE-SA-2021-09-20-2 watchOS 8 FULLDISC:20211027 APPLE-SA-2021-10-26-11 Additional information for APPLE-SA-2021-09-20-3 tvOS 15 FULLDISC:20211027 APPLE-SA-2021-10-26-9 Additional information for APPLE-SA-2021-09-20-1 iOS 15 and iPadOS 15 GENTOO:GLSA-201701-21 MISC:lists.apache.org:CVE-2021-40439 MLIST:[announce] 20211007 CVE-2021-40439: Apache OpenOffice: Billion Laughs MLIST:[openoffice-users] 20211007 CVE-2021-40439: Apache OpenOffice: Billion Laughs MLIST:[oss-security] 20130221 CVEs for libxml2 and expat internal and external XML entity expansion MLIST:[oss-security] 20130412 Re-evaluating expat/libxml2 CVE assignments OSS:2021/10/07/4 OSS:2021/Q4/15 OSVDB:90634 RH:CVE-2013-0340 RH:CVE-2013-0341 SECTRACK:1028213 SMASH Issue 91263 UBUNTU:CVE-2013-0340 UBUNTU:CVE-2013-0341 bnc#805236 https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d%40%3Cannounce.apache.org%3E rh#1000109 rh#1000110 |
CVE-2013-0343 | kernel-source-rt:Not affected | low | () | CVE-2013-0343 DSA-2906 MISC:git.kernel.org MLIST:[oss-security] 20121205 Re: Linux kernel handling of IPv6 temporary addresses MLIST:[oss-security] 20130116 Re: Linux kernel handling of IPv6 temporary addresses MLIST:[oss-security] 20130121 Re: Linux kernel handling of IPv6 temporary addresses MLIST:[oss-security] 20130222 Re: Linux kernel handling of IPv6 temporary addresses OSS:10930 RH:CVE-2013-0343 RHSA-2013:1449 RHSA-2013:1490 RHSA-2013:1645 SMASH Issue 54108 SUSE:openSUSE-SU-2014:0204 UBUNTU:CVE-2013-0343 UBUNTU:USN-1976-1 UBUNTU:USN-1977-1 UBUNTU:USN-2019-1 UBUNTU:USN-2020-1 UBUNTU:USN-2021-1 UBUNTU:USN-2022-1 UBUNTU:USN-2023-1 UBUNTU:USN-2024-1 UBUNTU:USN-2038-1 UBUNTU:USN-2039-1 UBUNTU:USN-2050-1 bnc#805226 linux.git:commit:4b08a8f1bd8cb4541c93ec170027b4d0782dab52 rh#1007690 rh#1007939 rh#742846 rh#822754 rh#914664 rh#916646 rh#917012 rh#917013 rh#917017 |
CVE-2013-0871 | kernel-source-rt:Not affected | important | () | CONFIRM:git.kernel.org:CVE-2013-0871 CONFIRM:github.com:CVE-2013-0871 CONFIRM:www.kernel.org:CVE-2013-0871 CVE-2013-0871 L3:42372 MLIST:[oss-security] 20130215 Linux kernel race condition with PTRACE_SETREGS (CVE-2013-0871) RH:CVE-2013-0871 RHSA-2013:0567 RHSA-2013:0621 RHSA-2013:0622 RHSA-2013:0661 RHSA-2013:0662 RHSA-2013:0695 RHSA-2013:0741 SMASH Issue 2252 SUSE:SUSE-SU-2013:0341 SUSE:SUSE-SU-2013:0674 SUSE:openSUSE-SU-2013:0925 UBUNTU:CVE-2013-0871 UBUNTU:USN-1736-1 UBUNTU:USN-1737-1 UBUNTU:USN-1738-1 UBUNTU:USN-1739-1 UBUNTU:USN-1740-1 UBUNTU:USN-1741-1 UBUNTU:USN-1742-1 UBUNTU:USN-1743-1 UBUNTU:USN-1744-1 UBUNTU:USN-1745-1 bnc#804154 bnc#804227 bnc#915881 http://www.debian.org/security/2013/dsa-2632 rh#1007690 rh#742846 rh#814278 rh#822754 rh#911937 rh#916646 rh#917012 rh#917013 rh#917017 |
CVE-2013-0914 | kernel-source-rt:Not affected | low | () | CONFIRM:git.kernel.org:CVE-2013-0914 CONFIRM:github.com:CVE-2013-0914 CVE-2013-0914 DSA-2668 MLIST:[oss-security] 20130311 CVE-2013-0914 Linux kernel sa_restorer information leak RH:CVE-2013-0914 RHSA-2013:0829 RHSA-2013:1034 RHSA-2013:1051 RHSA-2013:1080 SMASH Issue 54406 SUSE:openSUSE-SU-2013:1971 UBUNTU:CVE-2013-0914 bnc#808827 rh#1007690 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#920499 |
CVE-2013-1059 | kernel-source-rt:Ignore | important | () | CONFIRM:bugzilla.redhat.com CVE-2013-1059 DSA-2745 MISC:git.kernel.org:MLIST:[oss-security] 20130709 Linux kernel libceph NULL function pointer dereference (CVE-2013-1059) MISC:hkpco.kr:CVE-2013-1059 MLIST:[oss-security] 20130709 Linux kernel libceph NULL function pointer dereference (CVE-2013-1059) OSS:10569 RH:CVE-2013-1059 RHSA-2013:1029 RHSA-2013:1411 RHSA-2013:1605 RHSA-2013:1784 RHSA-2013:1785 RHSA-2013:1786 RHSA-2014:0029 RHSA-2014:0245 RHSA-2014:0254 RHSA-2014:0400 RHSA-2014:0401 RHSA-2014:1290 RHSA-2014:1291 RHSA-2014:1904 RHSA-2014:1995 RHSA-2015:0034 SMASH Issue 55328 SUSE:SUSE-SU-2013:1161 SUSE:SUSE-SU-2013:1473 SUSE:SUSE-SU-2013:1474 SUSE:openSUSE-SU-2013:1971 UBUNTU:CVE-2013-1059 UBUNTU:USN-1941-1 UBUNTU:USN-1942-1 bdo#701744 bnc#826350 bnc#882913 linux.git:commit:2cb33cac622afde897aa02d3dcd9fbba8bae839e rh#1006505 rh#1007545 rh#108711 rh#958618 rh#977356 rh#978485 |
CVE-2013-1772 | kernel-source-rt:Not affected | low | () | CONFIRM:github.com:CVE-2013-1772 CONFIRM:www.kernel.org:CVE-2013-1772 CVE-2013-1772 MISC:bugs.gentoo.org:MLIST:[oss-security] 20130226 Re: CVE request -- Linux kernel: call_console_drivers() Function Log Prefix Stripping buffer overflow MISC:secunia.com:MLIST:[oss-security] 20130226 Re: CVE request -- Linux kernel: call_console_drivers() Function Log Prefix Stripping buffer overflow MLIST:[oss-security] 20130226 Re: CVE request -- Linux kernel: call_console_drivers() Function Log Prefix Stripping buffer overflow RH:CVE-2013-1772 RHSA-2013:0566 SMASH Issue 54884 UBUNTU:CVE-2013-1772 bnc#806238 bnc#807441 rh#916075 rh#916646 rh#917012 rh#917013 rh#917017 |
CVE-2013-1773 | kernel-source-rt:Not affected | moderate | () | BID:58200 CONFIRM:git.kernel.org:CVE-2013-1773 CONFIRM:github.com:CVE-2013-1773 CONFIRM:www.kernel.org:CVE-2013-1773 CVE-2013-1773 DSA-2668 EXPLOIT-DB:23248 MISC:git.kernel.org:MLIST:[oss-security] 20130226 Re: CVE request - Linux kernel: VFAT slab-based buffer overflow MLIST:[oss-security] 20130226 Re: CVE request - Linux kernel: VFAT slab-based buffer overflow OSVDB:88310 RH:CVE-2013-1773 RHSA-2013:0566 RHSA-2013:0744 RHSA-2013:0928 RHSA-2013:1026 SMASH Issue 2277 UBUNTU:CVE-2013-1773 bnc#806977 bnc#807452 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0720a06a7518c9d0c0125bd5d1f3b6264c55c3dd rh#1007690 rh#742846 rh#822754 rh#916115 rh#916646 rh#917012 rh#917013 rh#917017 |
CVE-2013-1774 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2013-1774 CONFIRM:github.com:CVE-2013-1774 CONFIRM:www.kernel.org:CVE-2013-2058 CVE-2013-1774 DSA-2668 MISC:git.kernel.org:/ MISC:xorl.wordpress.com:CVE-2013-1774 MLIST:[oss-security] 20130227 Re: CVE request: Linux kernel: USB: io_ti: NULL pointer dereference RH:CVE-2013-1774 RHSA-2013:0744 RHSA-2013:0829 SMASH Issue 2278 SUSE:SUSE-SU-2013:1182 SUSE:SUSE-SU-2013:1474 SUSE:openSUSE-SU-2013:0847 SUSE:openSUSE-SU-2013:0925 UBUNTU:CVE-2013-1774 UBUNTU:USN-1805-1 UBUNTU:USN-1808-1 bnc#806976 bnc#807455 rh#1007690 rh#742846 rh#814278 rh#822754 rh#916191 rh#916646 rh#917012 rh#917013 rh#917017 |
CVE-2013-1798 | kernel-source-rt:Unsupported | moderate | () | CONFIRM:git.kernel.org:CVE-2013-1798 CVE-2013-1798 DSA-2668 MANDRIVA:MDVSA-2013:176 MISC:packetstormsecurity.com:CVE-2020-8428 MLIST:[oss-security] 20130320 linux kernel: kvm: CVE-2013-179[6..8] RH:CVE-2013-1798 RHSA-2013:0727 RHSA-2013:0744 RHSA-2013:0746 RHSA-2013:0928 RHSA-2013:1026 SMASH Issue 2281 SUSE:openSUSE-SU-2013:0847 SUSE:openSUSE-SU-2013:0925 SUSE:openSUSE-SU-2013:1187 UBUNTU:CVE-2013-1798 UBUNTU:USN-1809-1 UBUNTU:USN-1812-1 UBUNTU:USN-1813-1 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a2c118bfab8bc6b8bb213abfc35201e441693d55 linux.git:commit:2ae33b389601b86a3d0cfe2d09f5e3189d5322fd linux.git:commit:8c86405f606ca8508b8d9280680166ca26723695 linux.git:commit:a2c118bfab8bc6b8bb213abfc35201e441693d55 linux.git:commit:ea4a0ce11160200410abbabd44ec9e75e93a95be rh#917017 |
CVE-2013-1819 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2013-1819 CONFIRM:github.com:CVE-2013-1819 CONFIRM:www.kernel.org:CVE-2013-1819 CVE-2013-1819 MISC:git.kernel.org:/ MLIST:[oss-security] 20130305 Re: CVE request: Linux kernel: xfs: _xfs_buf_find NULL pointer dereference RH:CVE-2013-1819 RHSA-2013:0829 SMASH Issue 54906 SUSE:SUSE-SU-2013:1473 SUSE:SUSE-SU-2013:1474 SUSE:openSUSE-SU-2013:1971 UBUNTU:CVE-2013-1819 UBUNTU:USN-1968-1 UBUNTU:USN-1969-1 UBUNTU:USN-1970-1 UBUNTU:USN-1972-1 UBUNTU:USN-1973-1 UBUNTU:USN-1975-1 bnc#807471 rh#918009 |
CVE-2013-1826 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2013-1826 CONFIRM:github.com:CVE-2013-1826 CONFIRM:www.kernel.org:CVE-2013-1826 CVE-2013-1826 DSA-2668 MLIST:[oss-security] 20130307 Re: CVE Requests (maybe): Linux kernel: various info leaks, some NULL ptr derefs RH:CVE-2013-1826 RHSA-2013:0744 RHSA-2013:0747 SMASH Issue 54910 UBUNTU:CVE-2013-1826 UBUNTU:USN-1829-1 bnc#809889 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=864745d291b5ba80ea0bd0edcbe67273de368836 rh#1007690 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#919384 |
CVE-2013-1827 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2013-1827 CONFIRM:github.com:CVE-2013-1827 CONFIRM:www.kernel.org:CVE-2013-1827 CVE-2013-1827 MLIST:[oss-security] 20130307 Re: CVE Requests (maybe): Linux kernel: various info leaks, some NULL ptr derefs RH:CVE-2013-1827 RHSA-2013:0744 SMASH Issue 54911 UBUNTU:CVE-2013-1827 bnc#811354 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=276bdb82dedb290511467a5a4fdbe9f0b52dce6f rh#1007690 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#919164 |
CVE-2013-1858 | kernel-source-rt:Unsupported | important | () | CONFIRM:git.kernel.org:CVE-2013-1858 CONFIRM:github.com:CVE-2013-1858 CONFIRM:www.kernel.org:CVE-2013-1858 CVE-2013-1858 MISC:stealth.openwall.net:CVE-2013-1858 MLIST:[oss-security] 20130314 Re: CLONE_NEWUSER|CLONE_FS root exploit RH:CVE-2013-1858 SMASH Issue 54927 UBUNTU:CVE-2013-1858 bnc#809296 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e66eded8309ebf679d3d3c1f5820d1f2ca332c71 rh#921448 |
CVE-2013-1860 | kernel-source-rt:Not affected | moderate | () | BID:58510 CONFIRM:git.kernel.org:CVE-2013-1860 CONFIRM:github.com:CVE-2013-1860 CONFIRM:www.kernel.org:CVE-2013-2636 CVE-2013-1860 DSA-2668 MANDRIVA:MDVSA-2013:176 MLIST:[oss-security] 20130314 Re: CVE Request/Guidance: Linux kernel cdc-wdm buffer overflow triggered by device RH:CVE-2013-1860 RHSA-2013:0829 RHSA-2014:0328 RHSA-2014:0339 SMASH Issue 54929 UBUNTU:CVE-2013-1860 UBUNTU:USN-1809-1 UBUNTU:USN-1811-1 UBUNTU:USN-1812-1 UBUNTU:USN-1813-1 UBUNTU:USN-1814-1 UBUNTU:USN-1829-1 bnc#806431 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c0f5ecee4e741667b2493c742b60b6218d40b3aa rh#814278 rh#917012 rh#917013 rh#917017 rh#921970 |
CVE-2013-1873 | kernel-source-rt:Not affected | low | () | CONFIRM:git.kernel.org:CVE-2013-2634 CONFIRM:git.kernel.org:CVE-2013-2635 CONFIRM:git.kernel.org:CVE-2013-2636 CONFIRM:github.com:CVE-2013-2634 CONFIRM:github.com:CVE-2013-2635 CONFIRM:github.com:CVE-2013-2636 CVE-2013-1873 CVE-2013-2634 CVE-2013-2635 CVE-2013-2636 DSA-2668 MLIST:[oss-security] 20130320 Re: Linux kernel: net - three info leaks in rtnl RH:CVE-2013-1873 RH:CVE-2013-2634 RH:CVE-2013-2635 RH:CVE-2013-2636 RHSA-2013:0829 RHSA-2013:1051 RHSA-2013:1080 SMASH Issue 49815 SMASH Issue 54933 SMASH Issue 55091 SMASH Issue 55092 SMASH Issue 55093 UBUNTU:CVE-2013-1873 UBUNTU:CVE-2013-2634 UBUNTU:CVE-2013-2635 UBUNTU:CVE-2013-2636 bnc#810473 rh#1007690 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#923652 rh#924689 rh#924690 rh#924693 |
CVE-2013-1928 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2013-1928 CONFIRM:github.com:CVE-2013-1928 CONFIRM:www.kernel.org:CVE-2013-1928 CVE-2013-1928 DSA-2668 MLIST:[oss-security] 20130405 Re: CVE Request: kernel information leak in fs/compat_ioctl.c VIDEO_SET_SPU_PALETTE MLIST:[oss-security] 20130409 Re: CVE Request: kernel information leak in fs/compat_ioctl.c VIDEO_SET_SPU_PALETTE RH:CVE-2013-1928 RHSA-2013:1645 SMASH Issue 54946 SUSE:SUSE-SU-2013:0856 SUSE:openSUSE-SU-2013:0847 UBUNTU:CVE-2013-1928 UBUNTU:USN-1829-1 bnc#813735 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=12176503366885edd542389eed3aaf94be163fdb rh#1007690 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#949567 |
CVE-2013-1929 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2013-1929 CONFIRM:github.com:CVE-2013-1929 CONFIRM:www.kernel.org:CVE-2013-1958 CVE-2013-1929 DSA-2668 DSA-2669 FEDORA:FEDORA-2013-5368 MANDRIVA:MDVSA-2013:176 MISC:cansecwest.com:CVE-2013-1929 MISC:git.kernel.org:MLIST:[oss-security] 20130405 Re: CVE Request: tg3 VPD firmware -> driver injection MLIST:[oss-security] 20130405 Re: CVE Request: tg3 VPD firmware -> driver injection RH:CVE-2013-1929 RHSA-2013:0829 RHSA-2013:1034 RHSA-2013:1645 SMASH Issue 2293 SUSE:SUSE-SU-2013:1473 SUSE:SUSE-SU-2013:1474 SUSE:openSUSE-SU-2013:1971 UBUNTU:CVE-2013-1929 UBUNTU:USN-1834-1 UBUNTU:USN-1835-1 UBUNTU:USN-1836-1 UBUNTU:USN-1838-1 bnc#813733 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=715230a44310a8cf66fbfb5a46f9a62a9b2de424 rh#1007690 rh#1067558 rh#1094232 rh#949932 |
CVE-2013-1935 | kernel-source-rt:Unsupported | important | () | CONFIRM:ftp.osuosl.org:CVE-2013-2128 CONFIRM:git.kernel.org:CVE-2013-2017 CONFIRM:github.com:CVE-2013-2017 CONFIRM:support.f5.com:CVE-2013-2017 CVE-2013-1935 CVE-2013-2017 MISC:git.kernel.org:MLIST:[oss-security] 20130429 Re: CVE request -- Linux kernel: veth: double-free in case of congestion MLIST:[oss-security] 20130429 Re: CVE request -- Linux kernel: veth: double-free in case of congestion RH:CVE-2013-1935 RH:CVE-2013-2017 RHSA-2013:0907 RHSA-2013:0911 SMASH Issue 54959 UBUNTU:CVE-2013-1935 UBUNTU:CVE-2013-2017 bnc#817643 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6ec82562ffc6f297d0de36d65776cff8e5704867 rh#949981 rh#957705 |
CVE-2013-1943 | kernel-source-rt:Ignore | important | () | CONFIRM:git.kernel.org:CVE-2013-1943 CONFIRM:github.com:CVE-2013-1943 CONFIRM:web.archive.org:CVE-2013-1943 CVE-2013-1943 MISC:git.kernel.org:/ RH:CVE-2013-1943 RHSA-2013:0911 SMASH Issue 90441 UBUNTU:CVE-2013-1943 UBUNTU:USN-1939-1 rh#950490 |
CVE-2013-1950 | libtirpc:Analysis | moderate | () | CONFIRM:git.infradead.org:CVE-2013-1950 CVE-2013-1950 RH:CVE-2013-1950 RHSA-2013:0884 SMASH Issue 90354 UBUNTU:CVE-2013-1950 rh#948378 |
CVE-2013-1969 | libxml2:Unsupported | important | () | CONFIRM:bugzilla.gnome.org:CVE-2013-1969 CONFIRM:git.gnome.org:CVE-2013-1969 CVE-2013-1969 MISC:secunia.com:MLIST:[oss-security] 20130418 Re: CVE request : libxml2 Multiple Use-After-Free Vulnerabilities MLIST:[oss-security] 20130417 CVE request : libxml2 Multiple Use-After-Free Vulnerabilities MLIST:[oss-security] 20130418 Re: CVE request : libxml2 Multiple Use-After-Free Vulnerabilities RH:CVE-2013-1969 SECUNIA:53061 SMASH Issue 2298 SUSE:openSUSE-SU-2013:0729 SUSE:openSUSE-SU-2013:0945 UBUNTU:CVE-2013-1969 UBUNTU:USN-1817-1 bnc#815665 rh#953722 |
CVE-2013-1979 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2013-1979 CONFIRM:github.com:CVE-2013-1979 CONFIRM:www.kernel.org:CVE-2013-1979 CVE-2013-1979 DSA-2669 FEDORA:FEDORA-2013-6537 FEDORA:FEDORA-2013-6999 MANDRIVA:MDVSA-2013:176 MLIST:[oss-security] 20130428 Multiple Linux setuid output redirection vulnerabilities RH:CVE-2013-1979 RHSA-2013:0829 SMASH Issue 50013 SUSE:SUSE-SU-2013:1182 SUSE:SUSE-SU-2014:1316 SUSE:SUSE-SU-2014:1319 SUSE:openSUSE-SU-2013:1187 SUSE:openSUSE-SU-2013:1971 UBUNTU:CVE-2013-1979 bnc#816708 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=83f1b4ba917db5dc5a061a44b3403ddb6e783494 rh#1667782 rh#1686136 rh#955629 |
CVE-2013-2015 | kernel-source-rt:Not affected | low | () | CONFIRM:git.kernel.org:CVE-2013-2015 CONFIRM:github.com:CVE-2013-2015 CONFIRM:www.kernel.org:CVE-2013-2015 CVE-2013-2015 DSA-2668 DSA-2669 MLIST:[oss-security] 20130426 Re: CVE request: Linux kernel: ext4: hang during mount(8) RH:CVE-2013-2015 SMASH Issue 54958 SUSE:SUSE-SU-2016:2074 UBUNTU:CVE-2013-2015 bnc#817377 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0e9a9a1ad619e7e987815d20262d36a2f95717ca rh#1007690 rh#1067558 rh#1094232 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#957123 |
CVE-2013-2017 | kernel-source-rt:Unsupported | important | () | CONFIRM:ftp.osuosl.org:CVE-2013-2128 CONFIRM:git.kernel.org:CVE-2013-2017 CONFIRM:github.com:CVE-2013-2017 CONFIRM:support.f5.com:CVE-2013-2017 CVE-2013-1935 CVE-2013-2017 MISC:git.kernel.org:MLIST:[oss-security] 20130429 Re: CVE request -- Linux kernel: veth: double-free in case of congestion MLIST:[oss-security] 20130429 Re: CVE request -- Linux kernel: veth: double-free in case of congestion RH:CVE-2013-1935 RH:CVE-2013-2017 RHSA-2013:0907 RHSA-2013:0911 SMASH Issue 54959 UBUNTU:CVE-2013-1935 UBUNTU:CVE-2013-2017 bnc#817643 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6ec82562ffc6f297d0de36d65776cff8e5704867 rh#949981 rh#957705 |
CVE-2013-2058 | kernel-source-rt:Unsupported | moderate | () | CONFIRM:git.kernel.org:CVE-2013-2058 CONFIRM:github.com:CVE-2013-2058 CONFIRM:www.kernel.org:CVE-2013-2058 CVE-2013-2058 MLIST:[oss-security] 20130505 Re: CVE request: Linux kernel: chipidea: allow disabling streaming in host mode RH:CVE-2013-2058 RHSA-2013:1264 SMASH Issue 90955 UBUNTU:CVE-2013-2058 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=929473ea05db455ad88cdc081f2adc556b8dc48f rh#959210 |
CVE-2013-2094 | kernel-source-rt:Not affected | important | () | CONFIRM:git.kernel.org:CVE-2013-2094 CONFIRM:github.com:CVE-2013-2094 CONFIRM:www.kernel.org:CVE-2013-2596 CVE-2013-2094 DSA-2669 EXPLOIT-DB:33589 L3:39110 L3:39146 MANDRIVA:MDVSA-2013:176 MISC:git.kernel.org:/ MISC:news.ycombinator.com:CVE-2013-2094 MISC:packetstormsecurity.com:CVE-2013-2094 MISC:twitter.com:CVE-2013-2094 MISC:www.reddit.com:CVE-2013-2094 MLIST:[CentOS-announce] 20130515 CentOS-6 CVE-2013-2094 Kernel Issue MLIST:[CentOS-announce] 20130517 CESA-2013:0830 Important CentOS 6 kernel Update MLIST:[linux-kernel] 20130412 Re: sw_perf_event_destroy() oops while fuzzing MLIST:[linux-kernel] 20130412 sw_perf_event_destroy() oops while fuzzing MLIST:[linux-kernel] 20130413 Re: sw_perf_event_destroy() oops while fuzzing MLIST:[oss-security] 20130514 Re: CVE Request: linux kernel perf out-of-bounds access OSVDB:93361 RH:CVE-2013-2094 RHSA-2013:0829 RHSA-2013:0830 RHSA-2013:0832 RHSA-2013:0840 RHSA-2013:0841 SMASH Issue 2332 SUSE:SUSE-SU-2013:0819 SUSE:openSUSE-SU-2013:0847 SUSE:openSUSE-SU-2013:0925 SUSE:openSUSE-SU-2013:0951 SUSE:openSUSE-SU-2013:1042 UBUNTU:CVE-2013-2094 UBUNTU:USN-1825-1 UBUNTU:USN-1826-1 UBUNTU:USN-1827-1 UBUNTU:USN-1828-1 UBUNTU:USN-1836-1 UBUNTU:USN-1838-1 bnc#819789 bnc#820202 rh#814278 rh#917012 rh#917013 rh#917017 rh#962792 |
CVE-2013-2099 | python3:Unsupported | moderate | () | CONFIRM:bugs.python.org:CVE-2013-2099 CVE-2013-2098 CVE-2013-2099 MLIST:[oss-security] 20130515 Re: CVE Request (minor) -- Python 3.2: DoS when matching certificate with many '*' wildcard characters {was: CVE Request (minor) -- python-backports-ssl_match_hostn... RH:CVE-2013-2099 RHBA-2016:1500 RHSA-2014:1263 RHSA-2014:1690 RHSA-2015:0042 RHSA-2016:1166 SECUNIA:55107 SECUNIA:55116 SMASH Issue 90980 UBUNTU:CVE-2013-2098 UBUNTU:CVE-2013-2099 UBUNTU:USN-1983-1 UBUNTU:USN-1984-1 UBUNTU:USN-1985-1 bnc#886001 rh#963186 rh#963260 |
CVE-2013-2128 | kernel-source-rt:Not affected | moderate | () | CONFIRM:ftp.osuosl.org:CVE-2013-2128 CONFIRM:git.kernel.org:CVE-2013-2128 CONFIRM:github.com:CVE-2013-2128 CVE-2013-2128 MLIST:[oss-security] 20130529 Re: CVE request: Linux kernel: net: oops from tcp_collapse() when using splice(2) RH:CVE-2013-2128 RHSA-2013:1051 RHSA-2013:1080 SMASH Issue 54967 UBUNTU:CVE-2013-2128 bnc#822583 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=baff42ab1494528907bf4d5870359e31711746ae rh#968484 |
CVE-2013-2140 | kernel-source-rt:Unsupported | low | () | CONFIRM:git.kernel.org:CVE-2013-2140 CONFIRM:www.kernel.org:CVE-2013-2140 CVE-2013-2140 MLIST:[oss-security] 20130605 Re: xen/blkback: Check device permissions before allowing OP_DISCARD RH:CVE-2013-2140 SMASH Issue 91004 UBUNTU:CVE-2013-2140 UBUNTU:USN-1938-1 UBUNTU:USN-1943-1 UBUNTU:USN-1944-1 UBUNTU:USN-1945-1 UBUNTU:USN-1946-1 UBUNTU:USN-1947-1 UBUNTU:USN-2038-1 UBUNTU:USN-2039-1 bnc#844107 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=604c499cbbcc3d5fe5fb8d53306aa0fae1990109 linux.git:commit:604c499cbbcc3d5fe5fb8d53306aa0fae1990109 rh#971146 |
CVE-2013-2141 | kernel-source-rt:Not affected | low | () | CONFIRM:git.kernel.org:CVE-2013-2141 CONFIRM:github.com:CVE-2013-2141 CONFIRM:www.kernel.org:CVE-2013-2596 CVE-2013-2141 DSA-2766 MANDRIVA:MDVSA-2013:176 MISC:git.kernel.org:/ MLIST:[oss-security] 20130604 Re: CVE Request: kernel info leak in tkill/tgkill RH:CVE-2013-2141 RHSA-2013:1264 RHSA-2013:1292 RHSA-2013:1801 SECUNIA:55055 SMASH Issue 50017 SUSE:openSUSE-SU-2013:1971 UBUNTU:CVE-2013-2141 UBUNTU:USN-1899-1 UBUNTU:USN-1900-1 bnc#823267 linux.git:commit:c61f13eaa1ee17728c41370100d2d45c254ce76f rh#1007690 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#970873 |
CVE-2013-2146 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2013-2146 CONFIRM:github.com:CVE-2013-2146 CONFIRM:www.kernel.org:CVE-2013-2596 CVE-2013-2146 MANDRIVA:MDVSA-2013:176 MISC:git.kernel.org:MLIST:[oss-security] 20130605 Re: CVE Request: More perf security fixes MLIST:[oss-security] 20130605 Re: CVE Request: More perf security fixes RH:CVE-2013-2146 RHSA-2013:1173 RHSA-2013:1195 RHSA-2013:1264 SMASH Issue 54968 UBUNTU:CVE-2013-2146 bnc#825006 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f1923820c447e986a9da0fc6bf60c1dccdf0408e rh#1007690 rh#1007939 rh#916646 rh#971309 |
CVE-2013-2147 | kernel-source-rt:Already fixed | moderate | () | BID:63889 BID:64952 BID:64953 BID:64954 BID:65459 BID:65943 CONFIRM:git.kernel.org:CVE-2014-0101 CONFIRM:git.kernel.org:CVE-2014-1874 CONFIRM:github.com:CVE-2014-0101 CONFIRM:github.com:CVE-2014-1874 CONFIRM:linux.oracle.com:CVE-2014-1874 CONFIRM:linux.oracle.com:CVE-2014-3153 CONFIRM:support.f5.com:CVE-2014-0101 CONFIRM:www.kernel.org:CVE-2014-1874 CVE-2013-2147 CVE-2013-4299 CVE-2013-6382 CVE-2014-0101 CVE-2014-1444 CVE-2014-1445 CVE-2014-1446 CVE-2014-1874 CVE-2023-2002 DSA-2906 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:/ MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[linux-kernel] 20130603 [patch] cciss: info leak in cciss_ioctl32_passthru() MLIST:[linux-kernel] 20130603 [patch] cpqarray: info leak in ida_locked_ioctl() MLIST:[oss-security] 20130605 Re: CVE request: kernel: cpqarray/c: info leak in ida_locked_ioctl() MLIST:[oss-security] 20140115 Re: CVE request: assorted kernel infoleak security fixes MLIST:[oss-security] 20140206 Re: CVE Request: Linux kernel: SELinux local DoS MLIST:[oss-security] 20140304 CVE-2014-0101 -- Linux kernel: net: sctp: null pointer dereference when processing authenticated cookie_echo chunk MLIST:[xfs] 20131031 [patch] xfs: underflow bug in xfs_attrlist_by_handle() OSS:12052 OSS:2023/04/16/3 RH:CVE-2013-2147 RH:CVE-2013-4299 RH:CVE-2013-6382 RH:CVE-2014-0101 RH:CVE-2014-1444 RH:CVE-2014-1445 RH:CVE-2014-1446 RH:CVE-2014-1874 RHSA-2013:1166 RHSA-2013:1264 RHSA-2013:1436 RHSA-2013:1449 RHSA-2013:1450 RHSA-2013:1460 RHSA-2013:1490 RHSA-2013:1519 RHSA-2013:1520 RHSA-2013:1783 RHSA-2013:1860 RHSA-2014:0328 RHSA-2014:0419 RHSA-2014:0432 RHSA-2014:0439 RHSA-2014:0520 RHSA-2014:0771 SECUNIA:59216 SECUNIA:59262 SECUNIA:59309 SECUNIA:59406 SMASH Issue 54969 SUSE:SUSE-SU-2015:0812 UBUNTU:CVE-2013-2147 UBUNTU:CVE-2013-4299 UBUNTU:CVE-2013-6382 UBUNTU:CVE-2014-0101 UBUNTU:CVE-2014-1444 UBUNTU:CVE-2014-1445 UBUNTU:CVE-2014-1446 UBUNTU:CVE-2014-1874 UBUNTU:USN-1994-1 UBUNTU:USN-1996-1 UBUNTU:USN-1997-1 UBUNTU:USN-1999-1 UBUNTU:USN-2015-1 UBUNTU:USN-2016-1 UBUNTU:USN-2040-1 UBUNTU:USN-2041-1 UBUNTU:USN-2042-1 UBUNTU:USN-2043-1 UBUNTU:USN-2044-1 UBUNTU:USN-2045-1 UBUNTU:USN-2046-1 UBUNTU:USN-2066-1 UBUNTU:USN-2067-1 UBUNTU:USN-2109-1 UBUNTU:USN-2110-1 UBUNTU:USN-2128-1 UBUNTU:USN-2129-1 UBUNTU:USN-2133-1 UBUNTU:USN-2134-1 UBUNTU:USN-2135-1 UBUNTU:USN-2136-1 UBUNTU:USN-2137-1 UBUNTU:USN-2138-1 UBUNTU:USN-2139-1 UBUNTU:USN-2140-1 UBUNTU:USN-2141-1 UBUNTU:USN-2173-1 UBUNTU:USN-2174-1 XF:linux-kernel-cve20141444-info-disc(90443) XF:linux-kernel-cve20141445-info-disc(90444) XF:linux-kernel-cve20141446-info-disc(90445) bnc#823260 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2172fa709ab32ca60e86179dc67d0857be8e2c98 linux.git:commit:58f09e00ae095e46ef9edfcf3a5fd9ccdfad065e linux.git:commit:627aad1c01da6f881e7f98d71fd928ca0c316b1a linux.git:commit:e9c6a182649f4259db704ae15a91ac820e63b0ca rh#1004233 rh#1007690 rh#1033603 rh#1053610 rh#1053613 rh#1053620 rh#1062356 rh#1067558 rh#1070705 rh#1094232 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#971242 |
CVE-2013-2206 | kernel-source-rt:Not affected | important | () | CONFIRM:git.kernel.org:CVE-2013-2206 CONFIRM:github.com:CVE-2013-2206 CONFIRM:www.kernel.org:CVE-2013-2206 CVE-2013-2206 DSA-2766 MISC:git.kernel.org:/ MISC:git.kernel.org:MLIST:[oss-security] 20130620 Re: CVE Request -- Linux kernel: sctp: duplicate cookie handling NULL pointer dereference MLIST:[oss-security] 20130620 Re: CVE Request -- Linux kernel: sctp: duplicate cookie handling NULL pointer dereference RH:CVE-2013-2206 RHSA-2013:1166 RHSA-2013:1173 RHSA-2013:1195 SMASH Issue 55714 SUSE:SUSE-SU-2013:1744 SUSE:SUSE-SU-2013:1748 SUSE:SUSE-SU-2013:1749 SUSE:SUSE-SU-2013:1750 SUSE:openSUSE-SU-2013:1971 UBUNTU:CVE-2013-2206 UBUNTU:USN-1939-1 bnc#826102 rh#976562 |
CVE-2013-2224 | kernel-source-rt:Unsupported | moderate | () | CVE-2013-2224 MLIST:[oss-security] 20130630 Re: CVE request: Kernel 2.6.32+ IP_RETOPTS Buffer Poisoning DoS RH:CVE-2013-2224 RHSA-2013:1166 RHSA-2013:1173 RHSA-2013:1195 RHSA-2013:1450 SMASH Issue 55715 UBUNTU:CVE-2013-2224 bnc#827565 rh#853465 rh#979936 |
CVE-2013-2232 | kernel-source-rt:Not affected | important | () | CONFIRM:git.kernel.org:CVE-2013-2232 CONFIRM:github.com:CVE-2013-2232 CONFIRM:www.kernel.org:CVE-2013-5634 CONFIRM:www.kernel.org:CVE-2013-7026 CONFIRM:www.kernel.org:CVE-2014-1874 CONFIRM:www.kernel.org:CVE-2014-3122 CVE-2013-2232 DSA-2745 DSA-2766 MLIST:[oss-security] 20130702 Re: CVE Request: kernel: ipv6: using ipv4 vs ipv6 structure during routing lookup in sendmsg RH:CVE-2013-2232 RHSA-2013:1166 RHSA-2013:1173 RHSA-2013:1195 RHSA-2013:1264 SMASH Issue 55510 SMASH Issue 55716 SUSE:SUSE-SU-2013:1473 SUSE:SUSE-SU-2013:1474 SUSE:openSUSE-SU-2013:1971 UBUNTU:CVE-2013-2232 UBUNTU:USN-1912-1 UBUNTU:USN-1913-1 UBUNTU:USN-1938-1 UBUNTU:USN-1941-1 UBUNTU:USN-1942-1 UBUNTU:USN-1943-1 UBUNTU:USN-1944-1 UBUNTU:USN-1945-1 UBUNTU:USN-1946-1 UBUNTU:USN-1947-1 bdo#701744 bnc#827750 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a963a37d384d71ad43b3e9e79d68d42fbe0901f3 rh#1007690 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#981552 |
CVE-2013-2234 | kernel-source-rt:Not affected | low | () | CONFIRM:git.kernel.org:CVE-2013-2234 CONFIRM:github.com:CVE-2013-2234 CONFIRM:github.com:CVE-2014-0101 CONFIRM:github.com:CVE-2014-0131 CONFIRM:github.com:CVE-2014-1444 CONFIRM:github.com:CVE-2014-1445 CONFIRM:github.com:CVE-2014-1446 CONFIRM:github.com:CVE-2014-1874 CONFIRM:github.com:CVE-2014-3122 CONFIRM:github.com:CVE-2014-3145 CONFIRM:www.kernel.org:CVE-2013-5634 CVE-2013-2234 DSA-2745 DSA-2766 MISC:git.kernel.org:MLIST:[oss-security] 20130702 Re: CVE Request: information leak in AF_KEY notify messages MLIST:[oss-security] 20130702 Re: CVE Request: information leak in AF_KEY notify messages RH:CVE-2013-2234 RHSA-2013:1166 RHSA-2013:1264 RHSA-2013:1645 SMASH Issue 55717 SUSE:SUSE-SU-2013:1473 SUSE:SUSE-SU-2013:1474 SUSE:openSUSE-SU-2013:1971 UBUNTU:CVE-2013-2234 UBUNTU:USN-1912-1 UBUNTU:USN-1913-1 UBUNTU:USN-1938-1 UBUNTU:USN-1941-1 UBUNTU:USN-1942-1 UBUNTU:USN-1943-1 UBUNTU:USN-1944-1 UBUNTU:USN-1945-1 UBUNTU:USN-1946-1 UBUNTU:USN-1947-1 bdo#701744 bnc#827749 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a5cc68f3d63306d0d288f31edfc2ae6ef8ecd887 linux.git:commit:d049f74f2dbe71354d43d393ac3a188947811348 linux.git:commit:e9c6a182649f4259db704ae15a91ac820e63b0ca rh#1007690 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#980995 |
CVE-2013-2237 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2013-2237 CONFIRM:github.com:CVE-2013-2237 CONFIRM:www.kernel.org:CVE-2013-4592 CVE-2013-2237 DSA-2745 DSA-2766 MLIST:[oss-security] 20130703 Re: CVE Request: Earlier AF_KEY in key_notify_policy_flush RH:CVE-2013-2237 RHSA-2013:1166 RHSA-2013:1173 RHSA-2013:1195 RHSA-2013:1264 SMASH Issue 55718 SUSE:SUSE-SU-2013:1473 SUSE:SUSE-SU-2013:1474 SUSE:openSUSE-SU-2013:1971 UBUNTU:CVE-2013-2237 UBUNTU:USN-1912-1 UBUNTU:USN-1913-1 UBUNTU:USN-1970-1 UBUNTU:USN-1972-1 UBUNTU:USN-1973-1 UBUNTU:USN-1992-1 UBUNTU:USN-1993-1 UBUNTU:USN-1995-1 UBUNTU:USN-1998-1 bdo#701744 bnc#828119 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=85dfb745ee40232876663ae206cba35f24ab2a40 rh#1007690 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#981220 |
CVE-2013-2546 | kernel-source-rt:Unsupported | low | () | CONFIRM:git.kernel.org:CVE-2013-2548 CONFIRM:github.com:CVE-2013-2548 CVE-2013-2546 RH:CVE-2013-2546 RHSA-2013:0829 SMASH Issue 55073 UBUNTU:CVE-2013-2546 bnc#809906 rh#918512 |
CVE-2013-2548 | kernel-source-rt:Unsupported | low | () | CVE-2013-2548 RH:CVE-2013-2548 RHSA-2013:0829 SMASH Issue 231722 UBUNTU:CVE-2013-2548 rh#918512 |
CVE-2013-2634 | kernel-source-rt:Not affected | low | () | CONFIRM:git.kernel.org:CVE-2013-2634 CONFIRM:github.com:CVE-2013-2634 CVE-2013-1873 CVE-2013-2634 DSA-2668 MLIST:[oss-security] 20130320 Re: Linux kernel: net - three info leaks in rtnl RH:CVE-2013-1873 RH:CVE-2013-2634 RHSA-2013:0829 RHSA-2013:1051 RHSA-2013:1080 SMASH Issue 55091 UBUNTU:CVE-2013-2634 bnc#810473 rh#1007690 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#923652 rh#924689 |
CVE-2013-2635 | kernel-source-rt:Not affected | low | () | CONFIRM:git.kernel.org:CVE-2013-2635 CONFIRM:github.com:CVE-2013-2635 CVE-2013-1873 CVE-2013-2635 RH:CVE-2013-1873 RH:CVE-2013-2635 RHSA-2013:0829 RHSA-2013:1051 RHSA-2013:1080 SMASH Issue 55092 UBUNTU:CVE-2013-2635 bnc#810473 rh#1007690 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#923652 rh#924690 |
CVE-2013-2888 | kernel-source-rt:Not affected | moderate | () | BID:62042 BID:62044 BID:62049 BID:62050 CONFIRM:www.kernel.org:CVE-2013-2899 CONFIRM:www.kernel.org:CVE-2013-6367 CVE-2013-2888 CVE-2013-2889 CVE-2013-2890 CVE-2013-2891 CVE-2013-2892 CVE-2013-2893 CVE-2013-2894 CVE-2013-2895 CVE-2013-2896 CVE-2013-2897 CVE-2013-2898 CVE-2013-2899 CVE-2023-2002 DSA-2906 MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[linux-input] 20130828 [PATCH 01/14] HID: validate HID report id size MLIST:[linux-input] 20130828 [PATCH 03/14] HID: zeroplus: validate output report details MLIST:[linux-input] 20130828 [PATCH 04/14] HID: sony: validate HID output report details MLIST:[linux-input] 20130828 [PATCH 05/14] HID: steelseries: validate output report details MLIST:[linux-input] 20130828 [PATCH 06/14] HID: pantherlord: validate output report details MLIST:[linux-input] 20130828 [PATCH 07/14] HID: LG: validate HID output report details MLIST:[linux-input] 20130828 [PATCH 08/14] HID: lenovo-tpkbd: validate output report details MLIST:[linux-input] 20130828 [PATCH 09/14] HID: logitech-dj: validate output report details MLIST:[linux-input] 20130828 [PATCH 10/14] HID: ntrig: validate feature report details MLIST:[linux-input] 20130828 [PATCH 11/14] HID: multitouch: validate feature report details MLIST:[linux-input] 20130828 [PATCH 12/14] HID: sensor-hub: validate feature report details MLIST:[linux-input] 20130828 [PATCH 13/14] HID: picolcd_core: validate output report details MLIST:[oss-security] 20130828 Linux HID security flaws OSS:11016 OSS:2023/04/16/3 RH:CVE-2013-2888 RH:CVE-2013-2889 RH:CVE-2013-2890 RH:CVE-2013-2891 RH:CVE-2013-2892 RH:CVE-2013-2893 RH:CVE-2013-2894 RH:CVE-2013-2895 RH:CVE-2013-2896 RH:CVE-2013-2897 RH:CVE-2013-2898 RH:CVE-2013-2899 RHSA-2013:1490 RHSA-2013:1527 RHSA-2013:1645 RHSA-2014:0433 SMASH Issue 91755 SMASH Issue 91997 UBUNTU:CVE-2013-2888 UBUNTU:CVE-2013-2889 UBUNTU:CVE-2013-2890 UBUNTU:CVE-2013-2891 UBUNTU:CVE-2013-2892 UBUNTU:CVE-2013-2893 UBUNTU:CVE-2013-2894 UBUNTU:CVE-2013-2895 UBUNTU:CVE-2013-2896 UBUNTU:CVE-2013-2897 UBUNTU:CVE-2013-2898 UBUNTU:CVE-2013-2899 bnc#835839 linux.git:commit:0a9cd0a80ac559357c6a90d26c55270ed752aa26 linux.git:commit:0fb6bd06e06792469acc15bbe427361b56ada528 linux.git:commit:1e87a2456b0227ca4ab881e19a11bb99d164e792 linux.git:commit:22e04f6b4b04a8afe9af9239224591d06ba3b24d linux.git:commit:297502abb32e225fb23801fcdb0e4f6f8e17099a linux.git:commit:412f30105ec6735224535791eed5cdc02888ecb4 linux.git:commit:41df7f6d43723deb7364340b44bc5d94bf717456 linux.git:commit:43622021d2e2b82ea03d883926605bdd0525e1d1 linux.git:commit:47ab1a2de42031021965b81cbab4f3b4c5696d07 linux.git:commit:78214e81a1bf43740ce89bb5efda78eac2f8ef83 linux.git:commit:84fca9f38c5d646e95cdeef70e41cf15db549b95 linux.git:commit:875b4e3763dbc941f15143dd1a18d10bb0be303b linux.git:commit:8821f5dc187bdf16cfb32ef5aa8c3035273fa79a linux.git:commit:9446edb9a1740989cf6c20daf7510fb9a23be14a linux.git:commit:9e8910257397372633e74b333ef891f20c800ee4 linux.git:commit:cc6b54aa54bf40b762cab45a9fc8aa81653146eb rh#1000137 rh#1000360 rh#1000373 rh#1000414 rh#1000429 rh#1000451 rh#1000474 rh#1000494 rh#1000519 rh#1000536 rh#1007690 rh#1113899 rh#1163762 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#999890 rh#999960 |
CVE-2013-2889 | kernel-source-rt:Not affected | moderate | () | BID:62042 BID:62044 BID:62049 BID:62050 CONFIRM:www.kernel.org:CVE-2013-2899 CONFIRM:www.kernel.org:CVE-2013-6367 CVE-2013-2888 CVE-2013-2889 CVE-2013-2890 CVE-2013-2891 CVE-2013-2892 CVE-2013-2893 CVE-2013-2894 CVE-2013-2895 CVE-2013-2896 CVE-2013-2897 CVE-2013-2898 CVE-2013-2899 CVE-2023-2002 DSA-2906 MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[linux-input] 20130828 [PATCH 01/14] HID: validate HID report id size MLIST:[linux-input] 20130828 [PATCH 03/14] HID: zeroplus: validate output report details MLIST:[linux-input] 20130828 [PATCH 04/14] HID: sony: validate HID output report details MLIST:[linux-input] 20130828 [PATCH 05/14] HID: steelseries: validate output report details MLIST:[linux-input] 20130828 [PATCH 06/14] HID: pantherlord: validate output report details MLIST:[linux-input] 20130828 [PATCH 07/14] HID: LG: validate HID output report details MLIST:[linux-input] 20130828 [PATCH 08/14] HID: lenovo-tpkbd: validate output report details MLIST:[linux-input] 20130828 [PATCH 09/14] HID: logitech-dj: validate output report details MLIST:[linux-input] 20130828 [PATCH 10/14] HID: ntrig: validate feature report details MLIST:[linux-input] 20130828 [PATCH 11/14] HID: multitouch: validate feature report details MLIST:[linux-input] 20130828 [PATCH 12/14] HID: sensor-hub: validate feature report details MLIST:[linux-input] 20130828 [PATCH 13/14] HID: picolcd_core: validate output report details MLIST:[oss-security] 20130828 Linux HID security flaws OSS:11016 OSS:2023/04/16/3 RH:CVE-2013-2888 RH:CVE-2013-2889 RH:CVE-2013-2890 RH:CVE-2013-2891 RH:CVE-2013-2892 RH:CVE-2013-2893 RH:CVE-2013-2894 RH:CVE-2013-2895 RH:CVE-2013-2896 RH:CVE-2013-2897 RH:CVE-2013-2898 RH:CVE-2013-2899 RHSA-2013:1490 RHSA-2013:1527 RHSA-2013:1645 RHSA-2014:0433 SMASH Issue 91755 SMASH Issue 92002 UBUNTU:CVE-2013-2888 UBUNTU:CVE-2013-2889 UBUNTU:CVE-2013-2890 UBUNTU:CVE-2013-2891 UBUNTU:CVE-2013-2892 UBUNTU:CVE-2013-2893 UBUNTU:CVE-2013-2894 UBUNTU:CVE-2013-2895 UBUNTU:CVE-2013-2896 UBUNTU:CVE-2013-2897 UBUNTU:CVE-2013-2898 UBUNTU:CVE-2013-2899 bnc#835839 linux.git:commit:0a9cd0a80ac559357c6a90d26c55270ed752aa26 linux.git:commit:0fb6bd06e06792469acc15bbe427361b56ada528 linux.git:commit:1e87a2456b0227ca4ab881e19a11bb99d164e792 linux.git:commit:22e04f6b4b04a8afe9af9239224591d06ba3b24d linux.git:commit:297502abb32e225fb23801fcdb0e4f6f8e17099a linux.git:commit:412f30105ec6735224535791eed5cdc02888ecb4 linux.git:commit:41df7f6d43723deb7364340b44bc5d94bf717456 linux.git:commit:43622021d2e2b82ea03d883926605bdd0525e1d1 linux.git:commit:47ab1a2de42031021965b81cbab4f3b4c5696d07 linux.git:commit:78214e81a1bf43740ce89bb5efda78eac2f8ef83 linux.git:commit:84fca9f38c5d646e95cdeef70e41cf15db549b95 linux.git:commit:875b4e3763dbc941f15143dd1a18d10bb0be303b linux.git:commit:8821f5dc187bdf16cfb32ef5aa8c3035273fa79a linux.git:commit:9446edb9a1740989cf6c20daf7510fb9a23be14a linux.git:commit:9e8910257397372633e74b333ef891f20c800ee4 linux.git:commit:cc6b54aa54bf40b762cab45a9fc8aa81653146eb rh#1000137 rh#1000360 rh#1000373 rh#1000414 rh#1000429 rh#1000451 rh#1000474 rh#1000494 rh#1000519 rh#1000536 rh#1007690 rh#1113899 rh#1163762 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#999890 rh#999960 |
CVE-2013-2890 | kernel-source-rt:Not affected | moderate | () | BID:62042 BID:62044 BID:62049 BID:62050 CONFIRM:www.kernel.org:CVE-2013-2899 CONFIRM:www.kernel.org:CVE-2013-6367 CVE-2013-2888 CVE-2013-2889 CVE-2013-2890 CVE-2013-2891 CVE-2013-2892 CVE-2013-2893 CVE-2013-2894 CVE-2013-2895 CVE-2013-2896 CVE-2013-2897 CVE-2013-2898 CVE-2013-2899 CVE-2023-2002 DSA-2906 MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[linux-input] 20130828 [PATCH 01/14] HID: validate HID report id size MLIST:[linux-input] 20130828 [PATCH 03/14] HID: zeroplus: validate output report details MLIST:[linux-input] 20130828 [PATCH 04/14] HID: sony: validate HID output report details MLIST:[linux-input] 20130828 [PATCH 05/14] HID: steelseries: validate output report details MLIST:[linux-input] 20130828 [PATCH 06/14] HID: pantherlord: validate output report details MLIST:[linux-input] 20130828 [PATCH 07/14] HID: LG: validate HID output report details MLIST:[linux-input] 20130828 [PATCH 08/14] HID: lenovo-tpkbd: validate output report details MLIST:[linux-input] 20130828 [PATCH 09/14] HID: logitech-dj: validate output report details MLIST:[linux-input] 20130828 [PATCH 10/14] HID: ntrig: validate feature report details MLIST:[linux-input] 20130828 [PATCH 11/14] HID: multitouch: validate feature report details MLIST:[linux-input] 20130828 [PATCH 12/14] HID: sensor-hub: validate feature report details MLIST:[linux-input] 20130828 [PATCH 13/14] HID: picolcd_core: validate output report details MLIST:[oss-security] 20130828 Linux HID security flaws OSS:11016 OSS:2023/04/16/3 RH:CVE-2013-2888 RH:CVE-2013-2889 RH:CVE-2013-2890 RH:CVE-2013-2891 RH:CVE-2013-2892 RH:CVE-2013-2893 RH:CVE-2013-2894 RH:CVE-2013-2895 RH:CVE-2013-2896 RH:CVE-2013-2897 RH:CVE-2013-2898 RH:CVE-2013-2899 RHSA-2013:1490 RHSA-2013:1527 RHSA-2013:1645 RHSA-2014:0433 SMASH Issue 91755 SMASH Issue 91998 UBUNTU:CVE-2013-2888 UBUNTU:CVE-2013-2889 UBUNTU:CVE-2013-2890 UBUNTU:CVE-2013-2891 UBUNTU:CVE-2013-2892 UBUNTU:CVE-2013-2893 UBUNTU:CVE-2013-2894 UBUNTU:CVE-2013-2895 UBUNTU:CVE-2013-2896 UBUNTU:CVE-2013-2897 UBUNTU:CVE-2013-2898 UBUNTU:CVE-2013-2899 bnc#835839 linux.git:commit:0a9cd0a80ac559357c6a90d26c55270ed752aa26 linux.git:commit:0fb6bd06e06792469acc15bbe427361b56ada528 linux.git:commit:1e87a2456b0227ca4ab881e19a11bb99d164e792 linux.git:commit:22e04f6b4b04a8afe9af9239224591d06ba3b24d linux.git:commit:297502abb32e225fb23801fcdb0e4f6f8e17099a linux.git:commit:412f30105ec6735224535791eed5cdc02888ecb4 linux.git:commit:41df7f6d43723deb7364340b44bc5d94bf717456 linux.git:commit:43622021d2e2b82ea03d883926605bdd0525e1d1 linux.git:commit:47ab1a2de42031021965b81cbab4f3b4c5696d07 linux.git:commit:78214e81a1bf43740ce89bb5efda78eac2f8ef83 linux.git:commit:84fca9f38c5d646e95cdeef70e41cf15db549b95 linux.git:commit:875b4e3763dbc941f15143dd1a18d10bb0be303b linux.git:commit:8821f5dc187bdf16cfb32ef5aa8c3035273fa79a linux.git:commit:9446edb9a1740989cf6c20daf7510fb9a23be14a linux.git:commit:9e8910257397372633e74b333ef891f20c800ee4 linux.git:commit:cc6b54aa54bf40b762cab45a9fc8aa81653146eb rh#1000137 rh#1000360 rh#1000373 rh#1000414 rh#1000429 rh#1000451 rh#1000474 rh#1000494 rh#1000519 rh#1000536 rh#1007690 rh#1113899 rh#1163762 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#999890 rh#999960 |
CVE-2013-2891 | kernel-source-rt:Not affected | moderate | () | BID:62042 BID:62044 BID:62049 BID:62050 CONFIRM:www.kernel.org:CVE-2013-2899 CONFIRM:www.kernel.org:CVE-2013-6367 CVE-2013-2888 CVE-2013-2889 CVE-2013-2890 CVE-2013-2891 CVE-2013-2892 CVE-2013-2893 CVE-2013-2894 CVE-2013-2895 CVE-2013-2896 CVE-2013-2897 CVE-2013-2898 CVE-2013-2899 CVE-2023-2002 DSA-2906 MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[linux-input] 20130828 [PATCH 01/14] HID: validate HID report id size MLIST:[linux-input] 20130828 [PATCH 03/14] HID: zeroplus: validate output report details MLIST:[linux-input] 20130828 [PATCH 04/14] HID: sony: validate HID output report details MLIST:[linux-input] 20130828 [PATCH 05/14] HID: steelseries: validate output report details MLIST:[linux-input] 20130828 [PATCH 06/14] HID: pantherlord: validate output report details MLIST:[linux-input] 20130828 [PATCH 07/14] HID: LG: validate HID output report details MLIST:[linux-input] 20130828 [PATCH 08/14] HID: lenovo-tpkbd: validate output report details MLIST:[linux-input] 20130828 [PATCH 09/14] HID: logitech-dj: validate output report details MLIST:[linux-input] 20130828 [PATCH 10/14] HID: ntrig: validate feature report details MLIST:[linux-input] 20130828 [PATCH 11/14] HID: multitouch: validate feature report details MLIST:[linux-input] 20130828 [PATCH 12/14] HID: sensor-hub: validate feature report details MLIST:[linux-input] 20130828 [PATCH 13/14] HID: picolcd_core: validate output report details MLIST:[oss-security] 20130828 Linux HID security flaws OSS:11016 OSS:2023/04/16/3 RH:CVE-2013-2888 RH:CVE-2013-2889 RH:CVE-2013-2890 RH:CVE-2013-2891 RH:CVE-2013-2892 RH:CVE-2013-2893 RH:CVE-2013-2894 RH:CVE-2013-2895 RH:CVE-2013-2896 RH:CVE-2013-2897 RH:CVE-2013-2898 RH:CVE-2013-2899 RHSA-2013:1490 RHSA-2013:1527 RHSA-2013:1645 RHSA-2014:0433 SMASH Issue 91755 SMASH Issue 92003 UBUNTU:CVE-2013-2888 UBUNTU:CVE-2013-2889 UBUNTU:CVE-2013-2890 UBUNTU:CVE-2013-2891 UBUNTU:CVE-2013-2892 UBUNTU:CVE-2013-2893 UBUNTU:CVE-2013-2894 UBUNTU:CVE-2013-2895 UBUNTU:CVE-2013-2896 UBUNTU:CVE-2013-2897 UBUNTU:CVE-2013-2898 UBUNTU:CVE-2013-2899 bnc#835839 linux.git:commit:0a9cd0a80ac559357c6a90d26c55270ed752aa26 linux.git:commit:0fb6bd06e06792469acc15bbe427361b56ada528 linux.git:commit:1e87a2456b0227ca4ab881e19a11bb99d164e792 linux.git:commit:22e04f6b4b04a8afe9af9239224591d06ba3b24d linux.git:commit:297502abb32e225fb23801fcdb0e4f6f8e17099a linux.git:commit:412f30105ec6735224535791eed5cdc02888ecb4 linux.git:commit:41df7f6d43723deb7364340b44bc5d94bf717456 linux.git:commit:43622021d2e2b82ea03d883926605bdd0525e1d1 linux.git:commit:47ab1a2de42031021965b81cbab4f3b4c5696d07 linux.git:commit:78214e81a1bf43740ce89bb5efda78eac2f8ef83 linux.git:commit:84fca9f38c5d646e95cdeef70e41cf15db549b95 linux.git:commit:875b4e3763dbc941f15143dd1a18d10bb0be303b linux.git:commit:8821f5dc187bdf16cfb32ef5aa8c3035273fa79a linux.git:commit:9446edb9a1740989cf6c20daf7510fb9a23be14a linux.git:commit:9e8910257397372633e74b333ef891f20c800ee4 linux.git:commit:cc6b54aa54bf40b762cab45a9fc8aa81653146eb rh#1000137 rh#1000360 rh#1000373 rh#1000414 rh#1000429 rh#1000451 rh#1000474 rh#1000494 rh#1000519 rh#1000536 rh#1007690 rh#1113899 rh#1163762 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#999890 rh#999960 |
CVE-2013-2892 | kernel-source-rt:Not affected | moderate | () | BID:62042 BID:62044 BID:62049 BID:62050 CONFIRM:www.kernel.org:CVE-2013-2899 CONFIRM:www.kernel.org:CVE-2013-6367 CVE-2013-2888 CVE-2013-2889 CVE-2013-2890 CVE-2013-2891 CVE-2013-2892 CVE-2013-2893 CVE-2013-2894 CVE-2013-2895 CVE-2013-2896 CVE-2013-2897 CVE-2013-2898 CVE-2013-2899 CVE-2023-2002 DSA-2906 MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[linux-input] 20130828 [PATCH 01/14] HID: validate HID report id size MLIST:[linux-input] 20130828 [PATCH 03/14] HID: zeroplus: validate output report details MLIST:[linux-input] 20130828 [PATCH 04/14] HID: sony: validate HID output report details MLIST:[linux-input] 20130828 [PATCH 05/14] HID: steelseries: validate output report details MLIST:[linux-input] 20130828 [PATCH 06/14] HID: pantherlord: validate output report details MLIST:[linux-input] 20130828 [PATCH 07/14] HID: LG: validate HID output report details MLIST:[linux-input] 20130828 [PATCH 08/14] HID: lenovo-tpkbd: validate output report details MLIST:[linux-input] 20130828 [PATCH 09/14] HID: logitech-dj: validate output report details MLIST:[linux-input] 20130828 [PATCH 10/14] HID: ntrig: validate feature report details MLIST:[linux-input] 20130828 [PATCH 11/14] HID: multitouch: validate feature report details MLIST:[linux-input] 20130828 [PATCH 12/14] HID: sensor-hub: validate feature report details MLIST:[linux-input] 20130828 [PATCH 13/14] HID: picolcd_core: validate output report details MLIST:[oss-security] 20130828 Linux HID security flaws OSS:11016 OSS:2023/04/16/3 RH:CVE-2013-2888 RH:CVE-2013-2889 RH:CVE-2013-2890 RH:CVE-2013-2891 RH:CVE-2013-2892 RH:CVE-2013-2893 RH:CVE-2013-2894 RH:CVE-2013-2895 RH:CVE-2013-2896 RH:CVE-2013-2897 RH:CVE-2013-2898 RH:CVE-2013-2899 RHSA-2013:1490 RHSA-2013:1527 RHSA-2013:1645 RHSA-2014:0433 SMASH Issue 91755 SMASH Issue 92001 UBUNTU:CVE-2013-2888 UBUNTU:CVE-2013-2889 UBUNTU:CVE-2013-2890 UBUNTU:CVE-2013-2891 UBUNTU:CVE-2013-2892 UBUNTU:CVE-2013-2893 UBUNTU:CVE-2013-2894 UBUNTU:CVE-2013-2895 UBUNTU:CVE-2013-2896 UBUNTU:CVE-2013-2897 UBUNTU:CVE-2013-2898 UBUNTU:CVE-2013-2899 bnc#835839 linux.git:commit:0a9cd0a80ac559357c6a90d26c55270ed752aa26 linux.git:commit:0fb6bd06e06792469acc15bbe427361b56ada528 linux.git:commit:1e87a2456b0227ca4ab881e19a11bb99d164e792 linux.git:commit:22e04f6b4b04a8afe9af9239224591d06ba3b24d linux.git:commit:297502abb32e225fb23801fcdb0e4f6f8e17099a linux.git:commit:412f30105ec6735224535791eed5cdc02888ecb4 linux.git:commit:41df7f6d43723deb7364340b44bc5d94bf717456 linux.git:commit:43622021d2e2b82ea03d883926605bdd0525e1d1 linux.git:commit:47ab1a2de42031021965b81cbab4f3b4c5696d07 linux.git:commit:78214e81a1bf43740ce89bb5efda78eac2f8ef83 linux.git:commit:84fca9f38c5d646e95cdeef70e41cf15db549b95 linux.git:commit:875b4e3763dbc941f15143dd1a18d10bb0be303b linux.git:commit:8821f5dc187bdf16cfb32ef5aa8c3035273fa79a linux.git:commit:9446edb9a1740989cf6c20daf7510fb9a23be14a linux.git:commit:9e8910257397372633e74b333ef891f20c800ee4 linux.git:commit:cc6b54aa54bf40b762cab45a9fc8aa81653146eb rh#1000137 rh#1000360 rh#1000373 rh#1000414 rh#1000429 rh#1000451 rh#1000474 rh#1000494 rh#1000519 rh#1000536 rh#1007690 rh#1113899 rh#1163762 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#999890 rh#999960 |
CVE-2013-2893 | kernel-source-rt:Not affected | moderate | () | BID:62042 BID:62044 BID:62049 BID:62050 CONFIRM:www.kernel.org:CVE-2013-2899 CONFIRM:www.kernel.org:CVE-2013-6367 CVE-2013-2888 CVE-2013-2889 CVE-2013-2890 CVE-2013-2891 CVE-2013-2892 CVE-2013-2893 CVE-2013-2894 CVE-2013-2895 CVE-2013-2896 CVE-2013-2897 CVE-2013-2898 CVE-2013-2899 CVE-2023-2002 DSA-2906 MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[linux-input] 20130828 [PATCH 01/14] HID: validate HID report id size MLIST:[linux-input] 20130828 [PATCH 03/14] HID: zeroplus: validate output report details MLIST:[linux-input] 20130828 [PATCH 04/14] HID: sony: validate HID output report details MLIST:[linux-input] 20130828 [PATCH 05/14] HID: steelseries: validate output report details MLIST:[linux-input] 20130828 [PATCH 06/14] HID: pantherlord: validate output report details MLIST:[linux-input] 20130828 [PATCH 07/14] HID: LG: validate HID output report details MLIST:[linux-input] 20130828 [PATCH 08/14] HID: lenovo-tpkbd: validate output report details MLIST:[linux-input] 20130828 [PATCH 09/14] HID: logitech-dj: validate output report details MLIST:[linux-input] 20130828 [PATCH 10/14] HID: ntrig: validate feature report details MLIST:[linux-input] 20130828 [PATCH 11/14] HID: multitouch: validate feature report details MLIST:[linux-input] 20130828 [PATCH 12/14] HID: sensor-hub: validate feature report details MLIST:[linux-input] 20130828 [PATCH 13/14] HID: picolcd_core: validate output report details MLIST:[oss-security] 20130828 Linux HID security flaws OSS:11016 OSS:2023/04/16/3 RH:CVE-2013-2888 RH:CVE-2013-2889 RH:CVE-2013-2890 RH:CVE-2013-2891 RH:CVE-2013-2892 RH:CVE-2013-2893 RH:CVE-2013-2894 RH:CVE-2013-2895 RH:CVE-2013-2896 RH:CVE-2013-2897 RH:CVE-2013-2898 RH:CVE-2013-2899 RHSA-2013:1490 RHSA-2013:1527 RHSA-2013:1645 RHSA-2014:0433 SMASH Issue 91755 SMASH Issue 92004 UBUNTU:CVE-2013-2888 UBUNTU:CVE-2013-2889 UBUNTU:CVE-2013-2890 UBUNTU:CVE-2013-2891 UBUNTU:CVE-2013-2892 UBUNTU:CVE-2013-2893 UBUNTU:CVE-2013-2894 UBUNTU:CVE-2013-2895 UBUNTU:CVE-2013-2896 UBUNTU:CVE-2013-2897 UBUNTU:CVE-2013-2898 UBUNTU:CVE-2013-2899 bnc#835839 linux.git:commit:0a9cd0a80ac559357c6a90d26c55270ed752aa26 linux.git:commit:0fb6bd06e06792469acc15bbe427361b56ada528 linux.git:commit:1e87a2456b0227ca4ab881e19a11bb99d164e792 linux.git:commit:22e04f6b4b04a8afe9af9239224591d06ba3b24d linux.git:commit:297502abb32e225fb23801fcdb0e4f6f8e17099a linux.git:commit:412f30105ec6735224535791eed5cdc02888ecb4 linux.git:commit:41df7f6d43723deb7364340b44bc5d94bf717456 linux.git:commit:43622021d2e2b82ea03d883926605bdd0525e1d1 linux.git:commit:47ab1a2de42031021965b81cbab4f3b4c5696d07 linux.git:commit:78214e81a1bf43740ce89bb5efda78eac2f8ef83 linux.git:commit:84fca9f38c5d646e95cdeef70e41cf15db549b95 linux.git:commit:875b4e3763dbc941f15143dd1a18d10bb0be303b linux.git:commit:8821f5dc187bdf16cfb32ef5aa8c3035273fa79a linux.git:commit:9446edb9a1740989cf6c20daf7510fb9a23be14a linux.git:commit:9e8910257397372633e74b333ef891f20c800ee4 linux.git:commit:cc6b54aa54bf40b762cab45a9fc8aa81653146eb rh#1000137 rh#1000360 rh#1000373 rh#1000414 rh#1000429 rh#1000451 rh#1000474 rh#1000494 rh#1000519 rh#1000536 rh#1007690 rh#1113899 rh#1163762 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#999890 rh#999960 |
CVE-2013-2894 | kernel-source-rt:Not affected | moderate | () | BID:62042 BID:62044 BID:62049 BID:62050 CONFIRM:www.kernel.org:CVE-2013-2899 CONFIRM:www.kernel.org:CVE-2013-6367 CVE-2013-2888 CVE-2013-2889 CVE-2013-2890 CVE-2013-2891 CVE-2013-2892 CVE-2013-2893 CVE-2013-2894 CVE-2013-2895 CVE-2013-2896 CVE-2013-2897 CVE-2013-2898 CVE-2013-2899 CVE-2023-2002 DSA-2906 MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[linux-input] 20130828 [PATCH 01/14] HID: validate HID report id size MLIST:[linux-input] 20130828 [PATCH 03/14] HID: zeroplus: validate output report details MLIST:[linux-input] 20130828 [PATCH 04/14] HID: sony: validate HID output report details MLIST:[linux-input] 20130828 [PATCH 05/14] HID: steelseries: validate output report details MLIST:[linux-input] 20130828 [PATCH 06/14] HID: pantherlord: validate output report details MLIST:[linux-input] 20130828 [PATCH 07/14] HID: LG: validate HID output report details MLIST:[linux-input] 20130828 [PATCH 08/14] HID: lenovo-tpkbd: validate output report details MLIST:[linux-input] 20130828 [PATCH 09/14] HID: logitech-dj: validate output report details MLIST:[linux-input] 20130828 [PATCH 10/14] HID: ntrig: validate feature report details MLIST:[linux-input] 20130828 [PATCH 11/14] HID: multitouch: validate feature report details MLIST:[linux-input] 20130828 [PATCH 12/14] HID: sensor-hub: validate feature report details MLIST:[linux-input] 20130828 [PATCH 13/14] HID: picolcd_core: validate output report details MLIST:[oss-security] 20130828 Linux HID security flaws OSS:11016 OSS:2023/04/16/3 RH:CVE-2013-2888 RH:CVE-2013-2889 RH:CVE-2013-2890 RH:CVE-2013-2891 RH:CVE-2013-2892 RH:CVE-2013-2893 RH:CVE-2013-2894 RH:CVE-2013-2895 RH:CVE-2013-2896 RH:CVE-2013-2897 RH:CVE-2013-2898 RH:CVE-2013-2899 RHSA-2013:1490 RHSA-2013:1527 RHSA-2013:1645 RHSA-2014:0433 SMASH Issue 91755 SMASH Issue 91915 SMASH Issue 92000 UBUNTU:CVE-2013-2888 UBUNTU:CVE-2013-2889 UBUNTU:CVE-2013-2890 UBUNTU:CVE-2013-2891 UBUNTU:CVE-2013-2892 UBUNTU:CVE-2013-2893 UBUNTU:CVE-2013-2894 UBUNTU:CVE-2013-2895 UBUNTU:CVE-2013-2896 UBUNTU:CVE-2013-2897 UBUNTU:CVE-2013-2898 UBUNTU:CVE-2013-2899 UBUNTU:USN-2020-1 UBUNTU:USN-2023-1 bnc#835839 linux.git:commit:0a9cd0a80ac559357c6a90d26c55270ed752aa26 linux.git:commit:0fb6bd06e06792469acc15bbe427361b56ada528 linux.git:commit:1e87a2456b0227ca4ab881e19a11bb99d164e792 linux.git:commit:22e04f6b4b04a8afe9af9239224591d06ba3b24d linux.git:commit:297502abb32e225fb23801fcdb0e4f6f8e17099a linux.git:commit:412f30105ec6735224535791eed5cdc02888ecb4 linux.git:commit:41df7f6d43723deb7364340b44bc5d94bf717456 linux.git:commit:43622021d2e2b82ea03d883926605bdd0525e1d1 linux.git:commit:47ab1a2de42031021965b81cbab4f3b4c5696d07 linux.git:commit:78214e81a1bf43740ce89bb5efda78eac2f8ef83 linux.git:commit:84fca9f38c5d646e95cdeef70e41cf15db549b95 linux.git:commit:875b4e3763dbc941f15143dd1a18d10bb0be303b linux.git:commit:8821f5dc187bdf16cfb32ef5aa8c3035273fa79a linux.git:commit:9446edb9a1740989cf6c20daf7510fb9a23be14a linux.git:commit:9e8910257397372633e74b333ef891f20c800ee4 linux.git:commit:cc6b54aa54bf40b762cab45a9fc8aa81653146eb rh#1000137 rh#1000360 rh#1000373 rh#1000414 rh#1000429 rh#1000451 rh#1000474 rh#1000494 rh#1000519 rh#1000536 rh#1007690 rh#1113899 rh#1163762 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#999890 rh#999960 |
CVE-2013-2895 | kernel-source-rt:Not affected | moderate | () | BID:62042 BID:62044 BID:62049 BID:62050 CONFIRM:www.kernel.org:CVE-2013-2899 CONFIRM:www.kernel.org:CVE-2013-6367 CVE-2013-2888 CVE-2013-2889 CVE-2013-2890 CVE-2013-2891 CVE-2013-2892 CVE-2013-2893 CVE-2013-2894 CVE-2013-2895 CVE-2013-2896 CVE-2013-2897 CVE-2013-2898 CVE-2013-2899 CVE-2023-2002 DSA-2906 MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[linux-input] 20130828 [PATCH 01/14] HID: validate HID report id size MLIST:[linux-input] 20130828 [PATCH 03/14] HID: zeroplus: validate output report details MLIST:[linux-input] 20130828 [PATCH 04/14] HID: sony: validate HID output report details MLIST:[linux-input] 20130828 [PATCH 05/14] HID: steelseries: validate output report details MLIST:[linux-input] 20130828 [PATCH 06/14] HID: pantherlord: validate output report details MLIST:[linux-input] 20130828 [PATCH 07/14] HID: LG: validate HID output report details MLIST:[linux-input] 20130828 [PATCH 08/14] HID: lenovo-tpkbd: validate output report details MLIST:[linux-input] 20130828 [PATCH 09/14] HID: logitech-dj: validate output report details MLIST:[linux-input] 20130828 [PATCH 10/14] HID: ntrig: validate feature report details MLIST:[linux-input] 20130828 [PATCH 11/14] HID: multitouch: validate feature report details MLIST:[linux-input] 20130828 [PATCH 12/14] HID: sensor-hub: validate feature report details MLIST:[linux-input] 20130828 [PATCH 13/14] HID: picolcd_core: validate output report details MLIST:[oss-security] 20130828 Linux HID security flaws OSS:11016 OSS:2023/04/16/3 RH:CVE-2013-2888 RH:CVE-2013-2889 RH:CVE-2013-2890 RH:CVE-2013-2891 RH:CVE-2013-2892 RH:CVE-2013-2893 RH:CVE-2013-2894 RH:CVE-2013-2895 RH:CVE-2013-2896 RH:CVE-2013-2897 RH:CVE-2013-2898 RH:CVE-2013-2899 RHSA-2013:1490 RHSA-2013:1527 RHSA-2013:1645 RHSA-2014:0433 SMASH Issue 91755 SMASH Issue 91999 UBUNTU:CVE-2013-2888 UBUNTU:CVE-2013-2889 UBUNTU:CVE-2013-2890 UBUNTU:CVE-2013-2891 UBUNTU:CVE-2013-2892 UBUNTU:CVE-2013-2893 UBUNTU:CVE-2013-2894 UBUNTU:CVE-2013-2895 UBUNTU:CVE-2013-2896 UBUNTU:CVE-2013-2897 UBUNTU:CVE-2013-2898 UBUNTU:CVE-2013-2899 UBUNTU:USN-2019-1 UBUNTU:USN-2020-1 UBUNTU:USN-2021-1 UBUNTU:USN-2022-1 UBUNTU:USN-2023-1 UBUNTU:USN-2024-1 UBUNTU:USN-2038-1 UBUNTU:USN-2039-1 UBUNTU:USN-2050-1 bnc#835839 linux.git:commit:0a9cd0a80ac559357c6a90d26c55270ed752aa26 linux.git:commit:0fb6bd06e06792469acc15bbe427361b56ada528 linux.git:commit:1e87a2456b0227ca4ab881e19a11bb99d164e792 linux.git:commit:22e04f6b4b04a8afe9af9239224591d06ba3b24d linux.git:commit:297502abb32e225fb23801fcdb0e4f6f8e17099a linux.git:commit:412f30105ec6735224535791eed5cdc02888ecb4 linux.git:commit:41df7f6d43723deb7364340b44bc5d94bf717456 linux.git:commit:43622021d2e2b82ea03d883926605bdd0525e1d1 linux.git:commit:47ab1a2de42031021965b81cbab4f3b4c5696d07 linux.git:commit:78214e81a1bf43740ce89bb5efda78eac2f8ef83 linux.git:commit:84fca9f38c5d646e95cdeef70e41cf15db549b95 linux.git:commit:875b4e3763dbc941f15143dd1a18d10bb0be303b linux.git:commit:8821f5dc187bdf16cfb32ef5aa8c3035273fa79a linux.git:commit:9446edb9a1740989cf6c20daf7510fb9a23be14a linux.git:commit:9e8910257397372633e74b333ef891f20c800ee4 linux.git:commit:cc6b54aa54bf40b762cab45a9fc8aa81653146eb rh#1000137 rh#1000360 rh#1000373 rh#1000414 rh#1000429 rh#1000451 rh#1000474 rh#1000494 rh#1000519 rh#1000536 rh#1007690 rh#1113899 rh#1163762 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#999890 rh#999960 |
CVE-2013-2896 | kernel-source-rt:Not affected | moderate | () | BID:62042 BID:62044 BID:62049 BID:62050 CONFIRM:www.kernel.org:CVE-2013-2899 CONFIRM:www.kernel.org:CVE-2013-6367 CVE-2013-2888 CVE-2013-2889 CVE-2013-2890 CVE-2013-2891 CVE-2013-2892 CVE-2013-2893 CVE-2013-2894 CVE-2013-2895 CVE-2013-2896 CVE-2013-2897 CVE-2013-2898 CVE-2013-2899 CVE-2023-2002 DSA-2906 MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[linux-input] 20130828 [PATCH 01/14] HID: validate HID report id size MLIST:[linux-input] 20130828 [PATCH 03/14] HID: zeroplus: validate output report details MLIST:[linux-input] 20130828 [PATCH 04/14] HID: sony: validate HID output report details MLIST:[linux-input] 20130828 [PATCH 05/14] HID: steelseries: validate output report details MLIST:[linux-input] 20130828 [PATCH 06/14] HID: pantherlord: validate output report details MLIST:[linux-input] 20130828 [PATCH 07/14] HID: LG: validate HID output report details MLIST:[linux-input] 20130828 [PATCH 08/14] HID: lenovo-tpkbd: validate output report details MLIST:[linux-input] 20130828 [PATCH 09/14] HID: logitech-dj: validate output report details MLIST:[linux-input] 20130828 [PATCH 10/14] HID: ntrig: validate feature report details MLIST:[linux-input] 20130828 [PATCH 11/14] HID: multitouch: validate feature report details MLIST:[linux-input] 20130828 [PATCH 12/14] HID: sensor-hub: validate feature report details MLIST:[linux-input] 20130828 [PATCH 13/14] HID: picolcd_core: validate output report details MLIST:[oss-security] 20130828 Linux HID security flaws OSS:11016 OSS:2023/04/16/3 RH:CVE-2013-2888 RH:CVE-2013-2889 RH:CVE-2013-2890 RH:CVE-2013-2891 RH:CVE-2013-2892 RH:CVE-2013-2893 RH:CVE-2013-2894 RH:CVE-2013-2895 RH:CVE-2013-2896 RH:CVE-2013-2897 RH:CVE-2013-2898 RH:CVE-2013-2899 RHSA-2013:1490 RHSA-2013:1527 RHSA-2013:1645 RHSA-2014:0433 SMASH Issue 91755 UBUNTU:CVE-2013-2888 UBUNTU:CVE-2013-2889 UBUNTU:CVE-2013-2890 UBUNTU:CVE-2013-2891 UBUNTU:CVE-2013-2892 UBUNTU:CVE-2013-2893 UBUNTU:CVE-2013-2894 UBUNTU:CVE-2013-2895 UBUNTU:CVE-2013-2896 UBUNTU:CVE-2013-2897 UBUNTU:CVE-2013-2898 UBUNTU:CVE-2013-2899 bnc#835839 linux.git:commit:0a9cd0a80ac559357c6a90d26c55270ed752aa26 linux.git:commit:0fb6bd06e06792469acc15bbe427361b56ada528 linux.git:commit:1e87a2456b0227ca4ab881e19a11bb99d164e792 linux.git:commit:22e04f6b4b04a8afe9af9239224591d06ba3b24d linux.git:commit:297502abb32e225fb23801fcdb0e4f6f8e17099a linux.git:commit:412f30105ec6735224535791eed5cdc02888ecb4 linux.git:commit:41df7f6d43723deb7364340b44bc5d94bf717456 linux.git:commit:43622021d2e2b82ea03d883926605bdd0525e1d1 linux.git:commit:47ab1a2de42031021965b81cbab4f3b4c5696d07 linux.git:commit:78214e81a1bf43740ce89bb5efda78eac2f8ef83 linux.git:commit:84fca9f38c5d646e95cdeef70e41cf15db549b95 linux.git:commit:875b4e3763dbc941f15143dd1a18d10bb0be303b linux.git:commit:8821f5dc187bdf16cfb32ef5aa8c3035273fa79a linux.git:commit:9446edb9a1740989cf6c20daf7510fb9a23be14a linux.git:commit:9e8910257397372633e74b333ef891f20c800ee4 linux.git:commit:cc6b54aa54bf40b762cab45a9fc8aa81653146eb rh#1000137 rh#1000360 rh#1000373 rh#1000414 rh#1000429 rh#1000451 rh#1000474 rh#1000494 rh#1000519 rh#1000536 rh#1007690 rh#1113899 rh#1163762 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#999890 rh#999960 |
CVE-2013-2897 | kernel-source-rt:Not affected | moderate | () | BID:62042 BID:62044 BID:62049 BID:62050 CONFIRM:www.kernel.org:CVE-2013-2899 CONFIRM:www.kernel.org:CVE-2013-6367 CVE-2013-2888 CVE-2013-2889 CVE-2013-2890 CVE-2013-2891 CVE-2013-2892 CVE-2013-2893 CVE-2013-2894 CVE-2013-2895 CVE-2013-2896 CVE-2013-2897 CVE-2013-2898 CVE-2013-2899 CVE-2023-2002 DSA-2906 MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[linux-input] 20130828 [PATCH 01/14] HID: validate HID report id size MLIST:[linux-input] 20130828 [PATCH 03/14] HID: zeroplus: validate output report details MLIST:[linux-input] 20130828 [PATCH 04/14] HID: sony: validate HID output report details MLIST:[linux-input] 20130828 [PATCH 05/14] HID: steelseries: validate output report details MLIST:[linux-input] 20130828 [PATCH 06/14] HID: pantherlord: validate output report details MLIST:[linux-input] 20130828 [PATCH 07/14] HID: LG: validate HID output report details MLIST:[linux-input] 20130828 [PATCH 08/14] HID: lenovo-tpkbd: validate output report details MLIST:[linux-input] 20130828 [PATCH 09/14] HID: logitech-dj: validate output report details MLIST:[linux-input] 20130828 [PATCH 10/14] HID: ntrig: validate feature report details MLIST:[linux-input] 20130828 [PATCH 11/14] HID: multitouch: validate feature report details MLIST:[linux-input] 20130828 [PATCH 12/14] HID: sensor-hub: validate feature report details MLIST:[linux-input] 20130828 [PATCH 13/14] HID: picolcd_core: validate output report details MLIST:[oss-security] 20130828 Linux HID security flaws OSS:11016 OSS:2023/04/16/3 RH:CVE-2013-2888 RH:CVE-2013-2889 RH:CVE-2013-2890 RH:CVE-2013-2891 RH:CVE-2013-2892 RH:CVE-2013-2893 RH:CVE-2013-2894 RH:CVE-2013-2895 RH:CVE-2013-2896 RH:CVE-2013-2897 RH:CVE-2013-2898 RH:CVE-2013-2899 RHSA-2013:1490 RHSA-2013:1527 RHSA-2013:1645 RHSA-2014:0433 SMASH Issue 91755 UBUNTU:CVE-2013-2888 UBUNTU:CVE-2013-2889 UBUNTU:CVE-2013-2890 UBUNTU:CVE-2013-2891 UBUNTU:CVE-2013-2892 UBUNTU:CVE-2013-2893 UBUNTU:CVE-2013-2894 UBUNTU:CVE-2013-2895 UBUNTU:CVE-2013-2896 UBUNTU:CVE-2013-2897 UBUNTU:CVE-2013-2898 UBUNTU:CVE-2013-2899 bnc#835839 linux.git:commit:0a9cd0a80ac559357c6a90d26c55270ed752aa26 linux.git:commit:0fb6bd06e06792469acc15bbe427361b56ada528 linux.git:commit:1e87a2456b0227ca4ab881e19a11bb99d164e792 linux.git:commit:22e04f6b4b04a8afe9af9239224591d06ba3b24d linux.git:commit:297502abb32e225fb23801fcdb0e4f6f8e17099a linux.git:commit:412f30105ec6735224535791eed5cdc02888ecb4 linux.git:commit:41df7f6d43723deb7364340b44bc5d94bf717456 linux.git:commit:43622021d2e2b82ea03d883926605bdd0525e1d1 linux.git:commit:47ab1a2de42031021965b81cbab4f3b4c5696d07 linux.git:commit:78214e81a1bf43740ce89bb5efda78eac2f8ef83 linux.git:commit:84fca9f38c5d646e95cdeef70e41cf15db549b95 linux.git:commit:875b4e3763dbc941f15143dd1a18d10bb0be303b linux.git:commit:8821f5dc187bdf16cfb32ef5aa8c3035273fa79a linux.git:commit:9446edb9a1740989cf6c20daf7510fb9a23be14a linux.git:commit:9e8910257397372633e74b333ef891f20c800ee4 linux.git:commit:cc6b54aa54bf40b762cab45a9fc8aa81653146eb rh#1000137 rh#1000360 rh#1000373 rh#1000414 rh#1000429 rh#1000451 rh#1000474 rh#1000494 rh#1000519 rh#1000536 rh#1007690 rh#1113899 rh#1163762 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#999890 rh#999960 |
CVE-2013-2898 | kernel-source-rt:Not affected | moderate | () | BID:62042 BID:62044 BID:62049 BID:62050 CONFIRM:www.kernel.org:CVE-2013-2899 CONFIRM:www.kernel.org:CVE-2013-6367 CVE-2013-2888 CVE-2013-2889 CVE-2013-2890 CVE-2013-2891 CVE-2013-2892 CVE-2013-2893 CVE-2013-2894 CVE-2013-2895 CVE-2013-2896 CVE-2013-2897 CVE-2013-2898 CVE-2013-2899 CVE-2023-2002 DSA-2906 MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[linux-input] 20130828 [PATCH 01/14] HID: validate HID report id size MLIST:[linux-input] 20130828 [PATCH 03/14] HID: zeroplus: validate output report details MLIST:[linux-input] 20130828 [PATCH 04/14] HID: sony: validate HID output report details MLIST:[linux-input] 20130828 [PATCH 05/14] HID: steelseries: validate output report details MLIST:[linux-input] 20130828 [PATCH 06/14] HID: pantherlord: validate output report details MLIST:[linux-input] 20130828 [PATCH 07/14] HID: LG: validate HID output report details MLIST:[linux-input] 20130828 [PATCH 08/14] HID: lenovo-tpkbd: validate output report details MLIST:[linux-input] 20130828 [PATCH 09/14] HID: logitech-dj: validate output report details MLIST:[linux-input] 20130828 [PATCH 10/14] HID: ntrig: validate feature report details MLIST:[linux-input] 20130828 [PATCH 11/14] HID: multitouch: validate feature report details MLIST:[linux-input] 20130828 [PATCH 12/14] HID: sensor-hub: validate feature report details MLIST:[linux-input] 20130828 [PATCH 13/14] HID: picolcd_core: validate output report details MLIST:[oss-security] 20130828 Linux HID security flaws OSS:11016 OSS:2023/04/16/3 RH:CVE-2013-2888 RH:CVE-2013-2889 RH:CVE-2013-2890 RH:CVE-2013-2891 RH:CVE-2013-2892 RH:CVE-2013-2893 RH:CVE-2013-2894 RH:CVE-2013-2895 RH:CVE-2013-2896 RH:CVE-2013-2897 RH:CVE-2013-2898 RH:CVE-2013-2899 RHSA-2013:1490 RHSA-2013:1527 RHSA-2013:1645 RHSA-2014:0433 SMASH Issue 91755 UBUNTU:CVE-2013-2888 UBUNTU:CVE-2013-2889 UBUNTU:CVE-2013-2890 UBUNTU:CVE-2013-2891 UBUNTU:CVE-2013-2892 UBUNTU:CVE-2013-2893 UBUNTU:CVE-2013-2894 UBUNTU:CVE-2013-2895 UBUNTU:CVE-2013-2896 UBUNTU:CVE-2013-2897 UBUNTU:CVE-2013-2898 UBUNTU:CVE-2013-2899 bnc#835839 linux.git:commit:0a9cd0a80ac559357c6a90d26c55270ed752aa26 linux.git:commit:0fb6bd06e06792469acc15bbe427361b56ada528 linux.git:commit:1e87a2456b0227ca4ab881e19a11bb99d164e792 linux.git:commit:22e04f6b4b04a8afe9af9239224591d06ba3b24d linux.git:commit:297502abb32e225fb23801fcdb0e4f6f8e17099a linux.git:commit:412f30105ec6735224535791eed5cdc02888ecb4 linux.git:commit:41df7f6d43723deb7364340b44bc5d94bf717456 linux.git:commit:43622021d2e2b82ea03d883926605bdd0525e1d1 linux.git:commit:47ab1a2de42031021965b81cbab4f3b4c5696d07 linux.git:commit:78214e81a1bf43740ce89bb5efda78eac2f8ef83 linux.git:commit:84fca9f38c5d646e95cdeef70e41cf15db549b95 linux.git:commit:875b4e3763dbc941f15143dd1a18d10bb0be303b linux.git:commit:8821f5dc187bdf16cfb32ef5aa8c3035273fa79a linux.git:commit:9446edb9a1740989cf6c20daf7510fb9a23be14a linux.git:commit:9e8910257397372633e74b333ef891f20c800ee4 linux.git:commit:cc6b54aa54bf40b762cab45a9fc8aa81653146eb rh#1000137 rh#1000360 rh#1000373 rh#1000414 rh#1000429 rh#1000451 rh#1000474 rh#1000494 rh#1000519 rh#1000536 rh#1007690 rh#1113899 rh#1163762 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#999890 rh#999960 |
CVE-2013-2899 | kernel-source-rt:Not affected | moderate | () | BID:62042 BID:62044 BID:62049 BID:62050 CONFIRM:www.kernel.org:CVE-2013-2899 CONFIRM:www.kernel.org:CVE-2013-6367 CVE-2013-2888 CVE-2013-2889 CVE-2013-2890 CVE-2013-2891 CVE-2013-2892 CVE-2013-2893 CVE-2013-2894 CVE-2013-2895 CVE-2013-2896 CVE-2013-2897 CVE-2013-2898 CVE-2013-2899 CVE-2023-2002 DSA-2906 MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[linux-input] 20130828 [PATCH 01/14] HID: validate HID report id size MLIST:[linux-input] 20130828 [PATCH 03/14] HID: zeroplus: validate output report details MLIST:[linux-input] 20130828 [PATCH 04/14] HID: sony: validate HID output report details MLIST:[linux-input] 20130828 [PATCH 05/14] HID: steelseries: validate output report details MLIST:[linux-input] 20130828 [PATCH 06/14] HID: pantherlord: validate output report details MLIST:[linux-input] 20130828 [PATCH 07/14] HID: LG: validate HID output report details MLIST:[linux-input] 20130828 [PATCH 08/14] HID: lenovo-tpkbd: validate output report details MLIST:[linux-input] 20130828 [PATCH 09/14] HID: logitech-dj: validate output report details MLIST:[linux-input] 20130828 [PATCH 10/14] HID: ntrig: validate feature report details MLIST:[linux-input] 20130828 [PATCH 11/14] HID: multitouch: validate feature report details MLIST:[linux-input] 20130828 [PATCH 12/14] HID: sensor-hub: validate feature report details MLIST:[linux-input] 20130828 [PATCH 13/14] HID: picolcd_core: validate output report details MLIST:[oss-security] 20130828 Linux HID security flaws OSS:11016 OSS:2023/04/16/3 RH:CVE-2013-2888 RH:CVE-2013-2889 RH:CVE-2013-2890 RH:CVE-2013-2891 RH:CVE-2013-2892 RH:CVE-2013-2893 RH:CVE-2013-2894 RH:CVE-2013-2895 RH:CVE-2013-2896 RH:CVE-2013-2897 RH:CVE-2013-2898 RH:CVE-2013-2899 RHSA-2013:1490 RHSA-2013:1527 RHSA-2013:1645 RHSA-2014:0433 SMASH Issue 91755 UBUNTU:CVE-2013-2888 UBUNTU:CVE-2013-2889 UBUNTU:CVE-2013-2890 UBUNTU:CVE-2013-2891 UBUNTU:CVE-2013-2892 UBUNTU:CVE-2013-2893 UBUNTU:CVE-2013-2894 UBUNTU:CVE-2013-2895 UBUNTU:CVE-2013-2896 UBUNTU:CVE-2013-2897 UBUNTU:CVE-2013-2898 UBUNTU:CVE-2013-2899 bnc#835839 linux.git:commit:0a9cd0a80ac559357c6a90d26c55270ed752aa26 linux.git:commit:0fb6bd06e06792469acc15bbe427361b56ada528 linux.git:commit:1e87a2456b0227ca4ab881e19a11bb99d164e792 linux.git:commit:22e04f6b4b04a8afe9af9239224591d06ba3b24d linux.git:commit:297502abb32e225fb23801fcdb0e4f6f8e17099a linux.git:commit:412f30105ec6735224535791eed5cdc02888ecb4 linux.git:commit:41df7f6d43723deb7364340b44bc5d94bf717456 linux.git:commit:43622021d2e2b82ea03d883926605bdd0525e1d1 linux.git:commit:47ab1a2de42031021965b81cbab4f3b4c5696d07 linux.git:commit:78214e81a1bf43740ce89bb5efda78eac2f8ef83 linux.git:commit:84fca9f38c5d646e95cdeef70e41cf15db549b95 linux.git:commit:875b4e3763dbc941f15143dd1a18d10bb0be303b linux.git:commit:8821f5dc187bdf16cfb32ef5aa8c3035273fa79a linux.git:commit:9446edb9a1740989cf6c20daf7510fb9a23be14a linux.git:commit:9e8910257397372633e74b333ef891f20c800ee4 linux.git:commit:cc6b54aa54bf40b762cab45a9fc8aa81653146eb rh#1000137 rh#1000360 rh#1000373 rh#1000414 rh#1000429 rh#1000451 rh#1000474 rh#1000494 rh#1000519 rh#1000536 rh#1007690 rh#1113899 rh#1163762 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#999890 rh#999960 |
CVE-2013-3076 | kernel-source-rt:Not affected | moderate | () | CONFIRM:github.com:CVE-2013-3076 CVE-2013-3076 DSA-2669 MISC:git.kernel.org:MLIST:[oss-security] 20130414 Linux kernel: more net info leak fixes for v3.9 MLIST:[oss-security] 20130414 Linux kernel: more net info leak fixes for v3.9 RH:CVE-2013-3076 RHSA-2013:0829 SMASH Issue 49834 UBUNTU:CVE-2013-3076 UBUNTU:USN-1837-1 bnc#816668 rh#1007690 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#956162 |
CVE-2013-3222 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2013-3222 CONFIRM:github.com:CVE-2013-3222 CVE-2013-3222 DSA-2668 DSA-2669 MLIST:[linux-kernel] 20130414 Linux 3.9-rc7 RH:CVE-2013-3222 RHSA-2013:0829 RHSA-2013:1034 RHSA-2013:1051 RHSA-2013:1080 SMASH Issue 49818 UBUNTU:CVE-2013-3222 bnc#816668 rh#1007690 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#955216 |
CVE-2013-3223 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2013-3223 CONFIRM:github.com:CVE-2013-3223 CVE-2013-3223 DSA-2668 DSA-2669 RH:CVE-2013-3223 SMASH Issue 49819 UBUNTU:CVE-2013-3223 bnc#816668 rh#1007690 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#955662 |
CVE-2013-3224 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2013-3224 CONFIRM:github.com:CVE-2013-3224 CVE-2013-3224 DSA-2668 DSA-2669 RH:CVE-2013-3224 RHSA-2013:0829 RHSA-2013:1034 RHSA-2013:1051 RHSA-2013:1080 SMASH Issue 49820 UBUNTU:CVE-2013-3224 bnc#816668 rh#1007690 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#955599 |
CVE-2013-3226 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2013-3226 CONFIRM:github.com:CVE-2013-3226 CVE-2013-3226 RH:CVE-2013-3226 SMASH Issue 49822 UBUNTU:CVE-2013-3226 rh#956048 |
CVE-2013-3227 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2013-3227 CONFIRM:github.com:CVE-2013-3227 CVE-2013-3227 DSA-2669 RH:CVE-2013-3227 SMASH Issue 49823 UBUNTU:CVE-2013-3227 bnc#816668 rh#1007690 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#956061 |
CVE-2013-3228 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2013-3228 CONFIRM:github.com:CVE-2013-3228 CVE-2013-3228 DSA-2668 DSA-2669 RH:CVE-2013-3228 SMASH Issue 49824 UBUNTU:CVE-2013-3228 bnc#816668 rh#1007690 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#956069 |
CVE-2013-3229 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2013-3229 CONFIRM:github.com:CVE-2013-3229 CVE-2013-3229 DSA-2668 DSA-2669 RH:CVE-2013-3229 SMASH Issue 49825 UBUNTU:CVE-2013-3229 bnc#816668 rh#1007690 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#956079 |
CVE-2013-3230 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2013-3230 CONFIRM:github.com:CVE-2013-3230 CVE-2013-3230 RH:CVE-2013-3230 SMASH Issue 49826 UBUNTU:CVE-2013-3230 rh#956088 |
CVE-2013-3231 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2013-3231 CONFIRM:github.com:CVE-2013-3231 CVE-2013-3231 DSA-2668 DSA-2669 RH:CVE-2013-3231 RHSA-2013:0829 RHSA-2013:1034 RHSA-2013:1645 SMASH Issue 49827 UBUNTU:CVE-2013-3231 bnc#816668 rh#1007690 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#956094 |
CVE-2013-3232 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2013-3232 CONFIRM:github.com:CVE-2013-3232 CVE-2013-3232 RH:CVE-2013-3232 SMASH Issue 49828 UBUNTU:CVE-2013-3232 bnc#816668 rh#1007690 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#956110 |
CVE-2013-3233 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2013-3233 CONFIRM:github.com:CVE-2013-3233 CVE-2013-3233 RH:CVE-2013-3233 SMASH Issue 49829 UBUNTU:CVE-2013-3233 rh#956125 |
CVE-2013-3234 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2013-3234 CONFIRM:github.com:CVE-2013-3234 CVE-2013-3234 DSA-2668 DSA-2669 RH:CVE-2013-3234 SMASH Issue 49830 UBUNTU:CVE-2013-3234 bnc#816668 rh#1007690 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#956135 |
CVE-2013-3235 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2013-3235 CONFIRM:github.com:CVE-2013-3235 CVE-2013-3235 DSA-2668 DSA-2669 RH:CVE-2013-3235 RHSA-2013:1034 SMASH Issue 49831 UBUNTU:CVE-2013-3235 bnc#816668 rh#1007690 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#956145 |
CVE-2013-3301 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2013-3301 CONFIRM:github.com:CVE-2013-3301 CONFIRM:www.kernel.org:CVE-2013-3301 CVE-2013-3301 DSA-2669 MISC:git.kernel.org:/ MLIST:[oss-security] 20130415 CVE request - Linux kernel: tracing NULL pointer dereference RH:CVE-2013-3301 RHSA-2013:1051 RHSA-2013:1080 RHSA-2013:1264 SMASH Issue 2392 SUSE:SUSE-SU-2013:1473 SUSE:openSUSE-SU-2013:1971 UBUNTU:CVE-2013-3301 UBUNTU:USN-1834-1 UBUNTU:USN-1835-1 UBUNTU:USN-1836-1 UBUNTU:USN-1838-1 bnc#815256 rh#952197 |
CVE-2013-3302 | kernel-source-rt:Unsupported | moderate | () | BID:59064 CONFIRM:git.kernel.org:CVE-2013-3302 CONFIRM:github.com:CVE-2013-3302 CONFIRM:www.kernel.org:CVE-2013-4591 CVE-2013-3302 MLIST:[oss-security] 20130415 CVE request: Linux kernel: cifs: NULL pointer dereference RH:CVE-2013-3302 SMASH Issue 55220 UBUNTU:CVE-2013-3302 bnc#815266 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ea702b80e0bbb2448e201472127288beb82ca2fe rh#952260 |
CVE-2013-3713 | aaa_base:Analysis | moderate | () | CONFIRM:bugzilla.novell.com:CVE-2013-3713 CVE-2013-3713 D:CVE-2013-3713 SMASH Issue 92746 SUSE:openSUSE-SU-2013:1955 bnc#843230 |
CVE-2013-4162 | kernel-source-rt:Not affected | moderate | () | BID:61411 CONFIRM:git.kernel.org:CVE-2013-4162 CONFIRM:github.com:CVE-2013-4162 CVE-2013-4162 DSA-2745 DSA-2906 MLIST:[oss-security] 20130723 Re: CVE Request: Linux kernel: panic while pushing pending data out of an IPv6 socket with UDP_CORK enabled. OSS:10680 OSS:10681 RH:CVE-2013-4162 RHSA-2013:1264 RHSA-2013:1292 RHSA-2013:1436 RHSA-2013:1460 RHSA-2013:1520 SECUNIA:54148 SMASH Issue 90556 SUSE:SUSE-SU-2013:1473 SUSE:SUSE-SU-2013:1474 SUSE:openSUSE-SU-2013:1971 UBUNTU:CVE-2013-4162 UBUNTU:USN-1938-1 UBUNTU:USN-1939-1 UBUNTU:USN-1941-1 UBUNTU:USN-1942-1 UBUNTU:USN-1943-1 UBUNTU:USN-1944-1 UBUNTU:USN-1945-1 UBUNTU:USN-1946-1 UBUNTU:USN-1947-1 bdo#701744 bnc#831058 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8822b64a0fa64a5dd1dfcf837c5b0be83f8c05d1 rh#987627 rh#987633 |
CVE-2013-4163 | kernel-source-rt:Not affected | moderate | () | BID:61412 CONFIRM:git.kernel.org:CVE-2013-4163 CONFIRM:github.com:CVE-2013-4163 CVE-2013-4163 DSA-2745 MLIST:[oss-security] 20130723 Re: CVE request: Linux kernel: panic while appending data to a corked IPv6 socket in ip6_append_data_mtu OSS:10681 RH:CVE-2013-4163 RHSA-2013:1264 SMASH Issue 90553 SMASH Issue 90555 SUSE:SUSE-SU-2013:1473 SUSE:SUSE-SU-2013:1474 UBUNTU:CVE-2013-4163 UBUNTU:USN-1938-1 UBUNTU:USN-1941-1 UBUNTU:USN-1942-1 UBUNTU:USN-1943-1 UBUNTU:USN-1944-1 UBUNTU:USN-1945-1 UBUNTU:USN-1946-1 UBUNTU:USN-1947-1 bdo#701744 bnc#831055 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=75a493e60ac4bbe2e977e7129d6d8cbb0dd236be rh#987633 |
CVE-2013-4220 | kernel-source-rt:Unsupported | moderate | () | CONFIRM:git.kernel.org:CVE-2013-4220 CONFIRM:github.com:CVE-2013-4220 CONFIRM:www.kernel.org:CVE-2013-4220 CVE-2013-4220 MLIST:[oss-security] 20130808 Re: CVE Request: Linux kernel: arm64: unhandled el0 traps OSS:10824 RH:CVE-2013-4220 SMASH Issue 91530 UBUNTU:CVE-2013-4220 bnc#837109 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9955ac47f4ba1c95ecb6092aeaefb40a22e99268 rh#996380 |
CVE-2013-4254 | kernel-source-rt:Unsupported | moderate | () | CONFIRM:git.kernel.org:CVE-2013-4254 CONFIRM:github.com:CVE-2013-4254 CONFIRM:www.kernel.org:CVE-2013-4254 CVE-2013-4254 MISC:www.arm.linux.org.uk:MLIST:[oss-security] 20130816 Re: CVE Request: linux-kernel priviledge escalation on ARM/perf MLIST:[oss-security] 20130816 Re: CVE Request: linux-kernel priviledge escalation on ARM/perf OSS:10889 RH:CVE-2013-4254 SECUNIA:54494 SMASH Issue 91673 UBUNTU:CVE-2013-4254 UBUNTU:USN-1968-1 UBUNTU:USN-1969-1 UBUNTU:USN-1970-1 UBUNTU:USN-1971-1 UBUNTU:USN-1972-1 UBUNTU:USN-1973-1 UBUNTU:USN-1974-1 UBUNTU:USN-1975-1 bnc#837111 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c95eb3184ea1a3a2551df57190c81da695e2144b rh#1094232 rh#998878 |
CVE-2013-4270 | kernel-source-rt:Not affected | low | () | CONFIRM:git.kernel.org:CVE-2013-4270 CONFIRM:github.com:CVE-2013-4270 CONFIRM:www.kernel.org:CVE-2013-6431 CVE-2013-4270 RH:CVE-2013-4270 RHSA-2014:0100 SMASH Issue 91886 UBUNTU:CVE-2013-4270 UBUNTU:USN-2049-1 bnc#836949 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2433c8f094a008895e66f25bd1773cdb01c91d01 rh#1027752 |
CVE-2013-4299 | kernel-source-rt:Already fixed | moderate | () | BID:63889 BID:64952 BID:64953 BID:64954 BID:65459 BID:65943 CONFIRM:git.kernel.org:CVE-2014-0101 CONFIRM:git.kernel.org:CVE-2014-1874 CONFIRM:github.com:CVE-2014-0101 CONFIRM:github.com:CVE-2014-1874 CONFIRM:linux.oracle.com:CVE-2014-1874 CONFIRM:linux.oracle.com:CVE-2014-3153 CONFIRM:support.f5.com:CVE-2014-0101 CONFIRM:www.kernel.org:CVE-2014-1874 CVE-2013-2147 CVE-2013-4299 CVE-2013-6382 CVE-2014-0101 CVE-2014-1444 CVE-2014-1445 CVE-2014-1446 CVE-2014-1874 CVE-2023-2002 DSA-2906 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:/ MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[linux-kernel] 20130603 [patch] cciss: info leak in cciss_ioctl32_passthru() MLIST:[linux-kernel] 20130603 [patch] cpqarray: info leak in ida_locked_ioctl() MLIST:[oss-security] 20130605 Re: CVE request: kernel: cpqarray/c: info leak in ida_locked_ioctl() MLIST:[oss-security] 20140115 Re: CVE request: assorted kernel infoleak security fixes MLIST:[oss-security] 20140206 Re: CVE Request: Linux kernel: SELinux local DoS MLIST:[oss-security] 20140304 CVE-2014-0101 -- Linux kernel: net: sctp: null pointer dereference when processing authenticated cookie_echo chunk MLIST:[xfs] 20131031 [patch] xfs: underflow bug in xfs_attrlist_by_handle() OSS:12052 OSS:2023/04/16/3 RH:CVE-2013-2147 RH:CVE-2013-4299 RH:CVE-2013-6382 RH:CVE-2014-0101 RH:CVE-2014-1444 RH:CVE-2014-1445 RH:CVE-2014-1446 RH:CVE-2014-1874 RHSA-2013:1166 RHSA-2013:1264 RHSA-2013:1436 RHSA-2013:1449 RHSA-2013:1450 RHSA-2013:1460 RHSA-2013:1490 RHSA-2013:1519 RHSA-2013:1520 RHSA-2013:1783 RHSA-2013:1860 RHSA-2014:0328 RHSA-2014:0419 RHSA-2014:0432 RHSA-2014:0439 RHSA-2014:0520 RHSA-2014:0771 SECUNIA:59216 SECUNIA:59262 SECUNIA:59309 SECUNIA:59406 SMASH Issue 54969 SUSE:SUSE-SU-2015:0812 UBUNTU:CVE-2013-2147 UBUNTU:CVE-2013-4299 UBUNTU:CVE-2013-6382 UBUNTU:CVE-2014-0101 UBUNTU:CVE-2014-1444 UBUNTU:CVE-2014-1445 UBUNTU:CVE-2014-1446 UBUNTU:CVE-2014-1874 UBUNTU:USN-1994-1 UBUNTU:USN-1996-1 UBUNTU:USN-1997-1 UBUNTU:USN-1999-1 UBUNTU:USN-2015-1 UBUNTU:USN-2016-1 UBUNTU:USN-2040-1 UBUNTU:USN-2041-1 UBUNTU:USN-2042-1 UBUNTU:USN-2043-1 UBUNTU:USN-2044-1 UBUNTU:USN-2045-1 UBUNTU:USN-2046-1 UBUNTU:USN-2066-1 UBUNTU:USN-2067-1 UBUNTU:USN-2109-1 UBUNTU:USN-2110-1 UBUNTU:USN-2128-1 UBUNTU:USN-2129-1 UBUNTU:USN-2133-1 UBUNTU:USN-2134-1 UBUNTU:USN-2135-1 UBUNTU:USN-2136-1 UBUNTU:USN-2137-1 UBUNTU:USN-2138-1 UBUNTU:USN-2139-1 UBUNTU:USN-2140-1 UBUNTU:USN-2141-1 UBUNTU:USN-2173-1 UBUNTU:USN-2174-1 XF:linux-kernel-cve20141444-info-disc(90443) XF:linux-kernel-cve20141445-info-disc(90444) XF:linux-kernel-cve20141446-info-disc(90445) bnc#823260 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2172fa709ab32ca60e86179dc67d0857be8e2c98 linux.git:commit:58f09e00ae095e46ef9edfcf3a5fd9ccdfad065e linux.git:commit:627aad1c01da6f881e7f98d71fd928ca0c316b1a linux.git:commit:e9c6a182649f4259db704ae15a91ac820e63b0ca rh#1004233 rh#1007690 rh#1033603 rh#1053610 rh#1053613 rh#1053620 rh#1062356 rh#1067558 rh#1070705 rh#1094232 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#971242 |
CVE-2013-4300 | kernel-source-rt:Unsupported | important | () | CONFIRM:git.kernel.org:CVE-2013-4300 CONFIRM:github.com:CVE-2013-4300 CONFIRM:www.kernel.org:CVE-2013-4300 CVE-2013-4300 MISC:git.kernel.org:MLIST:[oss-security] 20130904 Re: CVE request: Kernel PID Spoofing Privilege Escalation Vulnerability MISC:secunia.com:MLIST:[oss-security] 20130904 Re: CVE request: Kernel PID Spoofing Privilege Escalation Vulnerability MLIST:[oss-security] 20130904 Re: CVE request: Kernel PID Spoofing Privilege Escalation Vulnerability OSS:11053 RH:CVE-2013-4300 SMASH Issue 92149 UBUNTU:CVE-2013-4300 UBUNTU:USN-1995-1 UBUNTU:USN-1998-1 bnc#838676 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d661684cf6820331feae71146c35da83d794467e rh#1004736 |
CVE-2013-4312 | kernel-source-rt:Released | moderate | () | BID:82986 BID:83870 CONFIRM:git.kernel.org:CVE-2013-4312 CONFIRM:git.kernel.org:CVE-2016-2847 CONFIRM:security-tracker.debian.org:CVE-2013-4312 CONFIRM:www.kernel.org:CVE-2016-2549 CONFIRM:www.oracle.com:CVE-2015-8391 CONFIRM:www.oracle.com:CVE-2016-5240 CONFIRM:www.oracle.com:CVE-2016-5386 CONFIRM:www.oracle.com:CVE-2016-6304 CVE-2013-4312 CVE-2016-2847 D:CVE-2016-2847 D:CVE-2022-2590 DSA-3448 DSA-3503 FEDORA:FEDORA-2016-2f25d12c51 FEDORA:FEDORA-2016-5d43766e33 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:MLIST:[oss-security] 20160301 CVE request -- linux kernel: pipe: limit the per-user amount of pages allocated in pipes MLIST:[oss-security] 20160301 CVE request -- linux kernel: pipe: limit the per-user amount of pages allocated in pipes OSS:2016/Q1/401 OSS:2016/Q1/467 OSS:2016/Q1/492 OSS:2016/Q1/493 OSS:2016/Q1/538 OSS:2016/Q1/733 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 OSS:2023/10/10/4 Oracle:CVE-2015-6937 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 RH:CVE-2013-4312 RH:CVE-2016-2847 RHSA-2016:0855 RHSA-2016:2574 RHSA-2016:2584 RHSA-2017:0217 SMASH Issue 162725 SMASH Issue 96145 SUSE:SUSE-SU-2016:1672 SUSE:SUSE-SU-2016:1690 SUSE:SUSE-SU-2016:1696 SUSE:SUSE-SU-2016:1707 SUSE:SUSE-SU-2016:1937 SUSE:SUSE-SU-2016:2074 SUSE:openSUSE-SU-2016:1382 UBUNTU:CVE-2013-4312 UBUNTU:CVE-2016-2847 UBUNTU:USN-2929-1 UBUNTU:USN-2929-2 UBUNTU:USN-2931-1 UBUNTU:USN-2932-1 UBUNTU:USN-2946-1 UBUNTU:USN-2946-2 UBUNTU:USN-2947-1 UBUNTU:USN-2947-2 UBUNTU:USN-2947-3 UBUNTU:USN-2948-1 UBUNTU:USN-2948-2 UBUNTU:USN-2949-1 UBUNTU:USN-2967-1 UBUNTU:USN-2967-2 bnc#839104 bnc#970948 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b linux.git:commit:712f4aad406bb1ed67f3f98d04c044191f0ff593 linux.git:commit:759c01142a5d0f364a462346168a56de28a80f52 rh#1297813 rh#1311517 rh#1313428 rh#1324749 rh#1384344 rh#2116175 |
CVE-2013-4327 | systemd:Unsupported | moderate | () | CVE-2013-4327 D:CVE-2013-4327 DSA-2777 MLIST:[oss-security] 20130918 Re: Fwd: [vs-plain] polkit races OSS:12427 RH:CVE-2013-4327 SMASH Issue 91883 UBUNTU:CVE-2013-4327 UBUNTU:USN-1961-1 bdo#725357 bnc#836932 bnc#864716 rh#1002375 rh#1006680 |
CVE-2013-4343 | kernel-source-rt:Unsupported | moderate | () | CVE-2013-4343 MLIST:[linux-kernel] 20130911 [PATCH net V2] tuntap: correctly handle error in tun_set_iff() MLIST:[netdev] 20130911 Use-after-free in TUNSETIFF MLIST:[oss-security] 20130912 Fwd: Use-after-free in TUNSETIFF OSS:11103 RH:CVE-2013-4343 RHSA-2013:1490 RHSA-2020:1016 RHSA-2020:1070 RHSA-2020:2522 RHSA-2020:2851 SMASH Issue 92307 SUSE:openSUSE-SU-2019:1479 SUSE:openSUSE-SU-2019:1570 SUSE:openSUSE-SU-2019:1579 UBUNTU:CVE-2013-4343 UBUNTU:USN-2020-1 UBUNTU:USN-2023-1 UBUNTU:USN-2049-1 bnc#839965 rh#1007733 rh#1716328 |
CVE-2013-4348 | kernel-source-rt:Unsupported | important | () | CONFIRM:git.kernel.org:CVE-2013-4348 CVE-2013-4348 RH:CVE-2013-4348 RHSA-2013:1490 SMASH Issue 93460 SUSE:openSUSE-SU-2014:0204 UBUNTU:CVE-2013-4348 UBUNTU:USN-2070-1 UBUNTU:USN-2075-1 bnc#848079 linux.git:commit:105bc1306e9b29c2aa2783b9524f7aec9b5a5b1f linux.git:commit:4a9f42c9dcbfb8da40bfeaa923b6a740a64a889b rh#1007939 rh#916646 |
CVE-2013-4350 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2013-4350 CONFIRM:github.com:CVE-2013-4350 CVE-2013-4350 MISC:bugzilla.kernel.org:MLIST:[oss-security] 20130913 Re: CVE request -- Linux kernel: net: sctp: ipv6 ipsec encryption bug in sctp_v6_xmit MISC:git.kernel.org:MLIST:[oss-security] 20130913 Re: CVE request -- Linux kernel: net: sctp: ipv6 ipsec encryption bug in sctp_v6_xmit MLIST:[oss-security] 20130913 Re: CVE request -- Linux kernel: net: sctp: ipv6 ipsec encryption bug in sctp_v6_xmit OSS:11109 RH:CVE-2013-4350 RHSA-2013:1490 SMASH Issue 92362 UBUNTU:CVE-2013-4350 UBUNTU:USN-2019-1 UBUNTU:USN-2021-1 UBUNTU:USN-2022-1 UBUNTU:USN-2024-1 UBUNTU:USN-2038-1 UBUNTU:USN-2039-1 UBUNTU:USN-2041-1 UBUNTU:USN-2045-1 UBUNTU:USN-2049-1 UBUNTU:USN-2050-1 bnc#840506 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=95ee62083cb6453e056562d91f597552021e6ae7 rh#1007872 |
CVE-2013-4387 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2013-4387 CONFIRM:github.com:CVE-2013-4387 CVE-2013-4387 MISC:git.kernel.org:/ MLIST:[oss-security] 20130928 Re: linux kernel memory corruption with ipv6 udp offloading RH:CVE-2013-4387 RHSA-2013:1490 RHSA-2013:1645 RHSA-2014:0284 SMASH Issue 92758 UBUNTU:CVE-2013-4387 UBUNTU:USN-2019-1 UBUNTU:USN-2021-1 UBUNTU:USN-2022-1 UBUNTU:USN-2024-1 UBUNTU:USN-2038-1 UBUNTU:USN-2039-1 UBUNTU:USN-2041-1 UBUNTU:USN-2045-1 UBUNTU:USN-2049-1 UBUNTU:USN-2050-1 bnc#843430 rh#1011927 |
CVE-2013-4391 | systemd:Unsupported | important | () | CONFIRM:bugs.debian.org CONFIRM:cgit.freedesktop.org:CVE-2013-4391 CVE-2013-4391 CVE-2013-4392 CVE-2013-4393 CVE-2013-4394 DSA-2777 GENTOO:GLSA-201612-34 MLIST:[oss-security] 20131001 Re: [CVE request] systemd OSS:2015/Q4/487 RH:CVE-2013-4391 RH:CVE-2013-4392 RH:CVE-2013-4394 SMASH Issue 92765 UBUNTU:CVE-2013-4391 UBUNTU:CVE-2013-4392 UBUNTU:CVE-2013-4393 UBUNTU:CVE-2013-4394 bdo#725357 bnc#843507 rh#859051 rh#859060 rh#859104 rh#862324 |
CVE-2013-4392 | systemd:Unsupported | important | () | CONFIRM:bugs.debian.org CONFIRM:cgit.freedesktop.org:CVE-2013-4391 CVE-2013-4391 CVE-2013-4392 CVE-2013-4393 CVE-2013-4394 DSA-2777 GENTOO:GLSA-201612-34 MLIST:[oss-security] 20131001 Re: [CVE request] systemd OSS:2015/Q4/487 RH:CVE-2013-4391 RH:CVE-2013-4392 RH:CVE-2013-4394 SMASH Issue 92765 UBUNTU:CVE-2013-4391 UBUNTU:CVE-2013-4392 UBUNTU:CVE-2013-4393 UBUNTU:CVE-2013-4394 bdo#725357 bnc#843507 rh#859051 rh#859060 rh#859104 rh#862324 |
CVE-2013-4393 | systemd:Unsupported | important | () | CONFIRM:bugs.debian.org CONFIRM:cgit.freedesktop.org:CVE-2013-4391 CVE-2013-4391 CVE-2013-4392 CVE-2013-4393 CVE-2013-4394 DSA-2777 GENTOO:GLSA-201612-34 MLIST:[oss-security] 20131001 Re: [CVE request] systemd OSS:2015/Q4/487 RH:CVE-2013-4391 RH:CVE-2013-4392 RH:CVE-2013-4394 SMASH Issue 92765 UBUNTU:CVE-2013-4391 UBUNTU:CVE-2013-4392 UBUNTU:CVE-2013-4393 UBUNTU:CVE-2013-4394 bdo#725357 bnc#843507 rh#859051 rh#859060 rh#859104 rh#862324 |
CVE-2013-4394 | systemd:Unsupported | important | () | CONFIRM:bugs.debian.org CONFIRM:cgit.freedesktop.org:CVE-2013-4391 CVE-2013-4391 CVE-2013-4392 CVE-2013-4393 CVE-2013-4394 DSA-2777 GENTOO:GLSA-201612-34 MLIST:[oss-security] 20131001 Re: [CVE request] systemd OSS:2015/Q4/487 RH:CVE-2013-4391 RH:CVE-2013-4392 RH:CVE-2013-4394 SMASH Issue 92765 UBUNTU:CVE-2013-4391 UBUNTU:CVE-2013-4392 UBUNTU:CVE-2013-4393 UBUNTU:CVE-2013-4394 bdo#725357 bnc#843507 rh#859051 rh#859060 rh#859104 rh#862324 |
CVE-2013-4466 | gnutls:Unsupported | moderate | () | CONFIRM:www.gnutls.org:CVE-2013-4466 CVE-2013-4466 MISC:gitorious.org:MLIST:[oss-security] 20131024 Re: CVE Request: gnutls/libdane buffer overflow MLIST:[gnutls-devel] 20131023 gnutls 3.1.15 MLIST:[gnutls-devel] 20131023 gnutls 3.2.5 MLIST:[oss-security] 20131024 Re: CVE Request: gnutls/libdane buffer overflow OSS:11372 RH:CVE-2013-4466 SMASH Issue 93390 UBUNTU:CVE-2013-4466 bnc#847484 rh#1022913 rh#1025637 |
CVE-2013-4483 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2013-4483 CONFIRM:github.com:CVE-2013-4483 CONFIRM:www.kernel.org:CVE-2013-5634 CVE-2013-4483 MISC:git.kernel.org:MLIST:[oss-security] 20131030 Re: CVE Request -- Linux kernel: ipc: ipc_rcu_putref refcount races MLIST:[oss-security] 20131030 Re: CVE Request -- Linux kernel: ipc: ipc_rcu_putref refcount races OSS:11393 RH:CVE-2013-4483 RHSA-2014:0285 RHSA-2014:0439 RHSA-2014:1392 RHSA-2015:0284 SMASH Issue 93496 SUSE:openSUSE-SU-2014:0247 UBUNTU:CVE-2013-4483 bnc#848321 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6062a8dc0517bce23e3c2f7d2fea5e22411269a3 rh#1007690 rh#1024854 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 |
CVE-2013-4487 | gnutls:Unsupported | moderate | () | CONFIRM:gitorious.org:CVE-2013-4487 CVE-2013-4487 MLIST:[oss-security] 20131031 Re: CVE Request: gnutls/libdane buffer overflow RH:CVE-2013-4487 SMASH Issue 93547 SUSE:openSUSE-SU-2013:1714 UBUNTU:CVE-2013-4487 bnc#848510 bnc#848621 rh#1025637 |
CVE-2013-4512 | kernel-source-rt:Unsupported | moderate | () | BID:63508 BID:63510 CONFIRM:git.kernel.org:CVE-2013-4512 CONFIRM:git.kernel.org:CVE-2013-4513 CONFIRM:github.com:CVE-2013-4512 CONFIRM:github.com:CVE-2013-4513 CONFIRM:www.kernel.org:CVE-2013-6763 CVE-2013-4512 CVE-2013-4513 DSA-2906 MLIST:[oss-security] 20131104 Re: some unstracked linux kernel security fixes RH:CVE-2013-4512 RH:CVE-2013-4513 SMASH Issue 93639 SUSE:openSUSE-SU-2014:0204 UBUNTU:CVE-2013-4512 UBUNTU:CVE-2013-4513 UBUNTU:USN-2068-1 UBUNTU:USN-2069-1 UBUNTU:USN-2070-1 UBUNTU:USN-2071-1 UBUNTU:USN-2072-1 UBUNTU:USN-2073-1 UBUNTU:USN-2074-1 UBUNTU:USN-2075-1 UBUNTU:USN-2076-1 bnc#849023 bnc#849027 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=201f99f170df14ba52ea4c52847779042b7a623b http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c2c65cd2e14ada6de44cb527e7f1990bede24e15 rh#1007939 rh#1033582 rh#916646 |
CVE-2013-4513 | kernel-source-rt:Unsupported | moderate | () | BID:63508 BID:63510 CONFIRM:git.kernel.org:CVE-2013-4512 CONFIRM:git.kernel.org:CVE-2013-4513 CONFIRM:github.com:CVE-2013-4512 CONFIRM:github.com:CVE-2013-4513 CONFIRM:www.kernel.org:CVE-2013-6763 CVE-2013-4512 CVE-2013-4513 DSA-2906 MLIST:[oss-security] 20131104 Re: some unstracked linux kernel security fixes RH:CVE-2013-4512 RH:CVE-2013-4513 SMASH Issue 93639 SUSE:openSUSE-SU-2014:0204 UBUNTU:CVE-2013-4512 UBUNTU:CVE-2013-4513 UBUNTU:USN-2068-1 UBUNTU:USN-2069-1 UBUNTU:USN-2070-1 UBUNTU:USN-2071-1 UBUNTU:USN-2072-1 UBUNTU:USN-2073-1 UBUNTU:USN-2074-1 UBUNTU:USN-2075-1 UBUNTU:USN-2076-1 bnc#849023 bnc#849027 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=201f99f170df14ba52ea4c52847779042b7a623b http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c2c65cd2e14ada6de44cb527e7f1990bede24e15 rh#1007939 rh#1033582 rh#916646 |
CVE-2013-4548 | openssh:Unsupported | important | () | CONFIRM:www.openssh.com:CVE-2013-4548 CVE-2013-4548 HP:SSRT101487 MLIST:[oss-security] 20131107 Re: CVE Request - OpenSSH OSS:11446 RH:CVE-2013-4548 SMASH Issue 93734 SUSE:openSUSE-SU-2013:1726 UBUNTU:CVE-2013-4548 UBUNTU:USN-2014-1 bnc#849536 rh#1028418 |
CVE-2013-4563 | kernel-source-rt:Unsupported | important | () | CONFIRM:git.kernel.org:CVE-2013-4563 CONFIRM:github.com:CVE-2013-4563 CVE-2013-4563 MISC:git.kernel.org:MLIST:[oss-security] 20131113 CVE-2013-4563 -- Linux kernel: net: large udp packet over IPv6 over UFO-enabled device with TBF qdisc panic MLIST:[oss-security] 20131113 CVE-2013-4563 -- Linux kernel: net: large udp packet over IPv6 over UFO-enabled device with TBF qdisc panic OSS:11474 RH:CVE-2013-4563 SMASH Issue 93857 SUSE:openSUSE-SU-2014:0205 UBUNTU:CVE-2013-4563 UBUNTU:USN-2113-1 UBUNTU:USN-2117-1 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0e033e04c2678dbbe74a46b23fffb7bb918c288e rh#1030015 |
CVE-2013-4579 | kernel-source-rt:Not affected | moderate | () | CVE-2013-4579 MISC:www.mathyvanhoef.com:CVE-2013-4579 MLIST:[ath9k-devel] 20131110 Security Bug: MAC address not properly configured MLIST:[oss-security] 20131114 Re: CVE request: ath9k_htc improperly updates MAC address RH:CVE-2013-4579 SMASH Issue 103043 UBUNTU:CVE-2013-4579 bnc#851426 linux.git:commit:657eb17d87852c42b55c4b06d5425baa08b2ddb3 linux.git:commit:6eb3c2822e2c5ef8f1a215c44ac451653aec0c09 rh#1007690 rh#1032753 rh#1067558 rh#1094232 rh#822754 |
CVE-2013-4587 | kernel-source-rt:Not affected | important | () | CONFIRM:git.kernel.org:CVE-2013-4587 CONFIRM:www.kernel.org:CVE-2013-6367 CVE-2013-4587 DSA-2906 MLIST:[oss-security] 20131212 Re: [vs-plain] kvm issues RH:CVE-2013-4587 SMASH Issue 94314 SUSE:openSUSE-SU-2014:0204 SUSE:openSUSE-SU-2014:0205 SUSE:openSUSE-SU-2014:0247 UBUNTU:CVE-2013-4587 UBUNTU:USN-2109-1 UBUNTU:USN-2110-1 UBUNTU:USN-2113-1 UBUNTU:USN-2117-1 UBUNTU:USN-2128-1 UBUNTU:USN-2129-1 UBUNTU:USN-2135-1 UBUNTU:USN-2136-1 UBUNTU:USN-2138-1 UBUNTU:USN-2139-1 UBUNTU:USN-2141-1 bnc#853050 bnc#882914 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=338c7dbadd2671189cec7faf64c84d01071b3f96 linux.git:commit:338c7dbadd2671189cec7faf64c84d01071b3f96 linux.git:commit:54fb723cc48db2fde964fb9bb0eaaccf2cf31a9f rh#1007690 rh#1007939 rh#1030986 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 |
CVE-2013-4738 | kernel-source-rt:Analysis | important | () | CVE-2013-4738 CVE-2013-4739 RH:CVE-2013-4738 RH:CVE-2013-4739 SMASH Issue 231569 SMASH Issue 95910 UBUNTU:CVE-2013-4738 bnc#861828 |
CVE-2013-4739 | kernel-source-rt:Analysis | important | () | CONFIRM:www.codeaurora.org:CVE-2013-4739 CVE-2013-4738 CVE-2013-4739 D:CVE-2013-4739 MLIST:[oss-security] 20131015 Report - Stack-based buffer overflow and memory disclosure in camera driver (CVE-2013-4748 CVE-2013-4739) RH:CVE-2013-4739 SMASH Issue 95910 SMASH Issue 95911 UBUNTU:CVE-2013-4738 UBUNTU:CVE-2013-4739 bnc#861828 |
CVE-2013-6368 | kernel-source-rt:Already fixed | moderate | () | BID:64291 CONFIRM:git.kernel.org:CVE-2013-6368 CVE-2013-6368 MLIST:[oss-security] 20131212 Re: [vs-plain] kvm issues RH:CVE-2013-6368 RHSA-2013:1801 RHSA-2014:0163 RHSA-2014:0284 SMASH Issue 94316 SUSE:openSUSE-SU-2014:0204 SUSE:openSUSE-SU-2014:0205 SUSE:openSUSE-SU-2014:0247 UBUNTU:CVE-2013-6368 UBUNTU:USN-2113-1 UBUNTU:USN-2117-1 UBUNTU:USN-2133-1 UBUNTU:USN-2134-1 UBUNTU:USN-2135-1 UBUNTU:USN-2136-1 UBUNTU:USN-2138-1 UBUNTU:USN-2139-1 UBUNTU:USN-2141-1 bnc#853052 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fda4e2e85589191b123d31cdc21fd33ee70f50fd linux.git:commit:54fb723cc48db2fde964fb9bb0eaaccf2cf31a9f linux.git:commit:fda4e2e85589191b123d31cdc21fd33ee70f50fd rh#1007690 rh#1007939 rh#1032210 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 |
CVE-2013-6376 | kernel-source-rt:Not affected | moderate | () | BID:64319 CONFIRM:git.kernel.org:CVE-2013-6376 CVE-2013-6376 D:CVE-2013-6376 MLIST:[oss-security] 20131212 Re: [vs-plain] kvm issues RH:CVE-2013-6376 SMASH Issue 94317 SUSE:openSUSE-SU-2014:0204 SUSE:openSUSE-SU-2014:0205 UBUNTU:CVE-2013-6376 UBUNTU:USN-2113-1 UBUNTU:USN-2117-1 UBUNTU:USN-2136-1 bnc#853053 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=17d68b763f09a9ce824ae23eb62c9efc57b69271 linux.git:commit:17d68b763f09a9ce824ae23eb62c9efc57b69271 linux.git:commit:45c3094a6424614e6fea135e4e1afd8e0a65f468 linux.git:commit:54fb723cc48db2fde964fb9bb0eaaccf2cf31a9f rh#1007690 rh#1007939 rh#1033106 rh#916646 |
CVE-2013-6379 | kernel-source-rt:Unsupported | moderate | () | CVE-2013-6379 SMASH Issue 94156 bnc#852556 rh#1033582 |
CVE-2013-6381 | kernel-source-rt:Not affected | moderate | () | BID:63890 CONFIRM:git.kernel.org:CVE-2013-6381 CONFIRM:github.com:CVE-2013-6381 CVE-2013-6381 D:CVE-2013-6381 DSA-2906 MISC:git.kernel.org:/ MLIST:[oss-security] 20131122 Linux kernel CVE fixes RH:CVE-2013-6381 RHSA-2014:0159 RHSA-2014:0284 RHSA-2014:0285 RHSA-2014:0476 SMASH Issue 94153 UBUNTU:CVE-2013-6381 bnc#852552 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6fb392b1a63ae36c31f62bc3fc8630b49d602b62 rh#1033600 |
CVE-2013-6382 | kernel-source-rt:Already fixed | moderate | () | BID:63889 BID:64952 BID:64953 BID:64954 BID:65459 BID:65943 CONFIRM:git.kernel.org:CVE-2014-0101 CONFIRM:git.kernel.org:CVE-2014-1874 CONFIRM:github.com:CVE-2014-0101 CONFIRM:github.com:CVE-2014-1874 CONFIRM:linux.oracle.com:CVE-2014-1874 CONFIRM:linux.oracle.com:CVE-2014-3153 CONFIRM:support.f5.com:CVE-2014-0101 CONFIRM:www.kernel.org:CVE-2014-1874 CVE-2013-2147 CVE-2013-4299 CVE-2013-6382 CVE-2014-0101 CVE-2014-1444 CVE-2014-1445 CVE-2014-1446 CVE-2014-1874 CVE-2023-2002 DSA-2906 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:/ MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[linux-kernel] 20130603 [patch] cciss: info leak in cciss_ioctl32_passthru() MLIST:[linux-kernel] 20130603 [patch] cpqarray: info leak in ida_locked_ioctl() MLIST:[oss-security] 20130605 Re: CVE request: kernel: cpqarray/c: info leak in ida_locked_ioctl() MLIST:[oss-security] 20140115 Re: CVE request: assorted kernel infoleak security fixes MLIST:[oss-security] 20140206 Re: CVE Request: Linux kernel: SELinux local DoS MLIST:[oss-security] 20140304 CVE-2014-0101 -- Linux kernel: net: sctp: null pointer dereference when processing authenticated cookie_echo chunk MLIST:[xfs] 20131031 [patch] xfs: underflow bug in xfs_attrlist_by_handle() OSS:12052 OSS:2023/04/16/3 RH:CVE-2013-2147 RH:CVE-2013-4299 RH:CVE-2013-6382 RH:CVE-2014-0101 RH:CVE-2014-1444 RH:CVE-2014-1445 RH:CVE-2014-1446 RH:CVE-2014-1874 RHSA-2013:1166 RHSA-2013:1264 RHSA-2013:1436 RHSA-2013:1449 RHSA-2013:1450 RHSA-2013:1460 RHSA-2013:1490 RHSA-2013:1519 RHSA-2013:1520 RHSA-2013:1783 RHSA-2013:1860 RHSA-2014:0328 RHSA-2014:0419 RHSA-2014:0432 RHSA-2014:0439 RHSA-2014:0520 RHSA-2014:0771 SECUNIA:59216 SECUNIA:59262 SECUNIA:59309 SECUNIA:59406 SMASH Issue 54969 SUSE:SUSE-SU-2015:0812 UBUNTU:CVE-2013-2147 UBUNTU:CVE-2013-4299 UBUNTU:CVE-2013-6382 UBUNTU:CVE-2014-0101 UBUNTU:CVE-2014-1444 UBUNTU:CVE-2014-1445 UBUNTU:CVE-2014-1446 UBUNTU:CVE-2014-1874 UBUNTU:USN-1994-1 UBUNTU:USN-1996-1 UBUNTU:USN-1997-1 UBUNTU:USN-1999-1 UBUNTU:USN-2015-1 UBUNTU:USN-2016-1 UBUNTU:USN-2040-1 UBUNTU:USN-2041-1 UBUNTU:USN-2042-1 UBUNTU:USN-2043-1 UBUNTU:USN-2044-1 UBUNTU:USN-2045-1 UBUNTU:USN-2046-1 UBUNTU:USN-2066-1 UBUNTU:USN-2067-1 UBUNTU:USN-2109-1 UBUNTU:USN-2110-1 UBUNTU:USN-2128-1 UBUNTU:USN-2129-1 UBUNTU:USN-2133-1 UBUNTU:USN-2134-1 UBUNTU:USN-2135-1 UBUNTU:USN-2136-1 UBUNTU:USN-2137-1 UBUNTU:USN-2138-1 UBUNTU:USN-2139-1 UBUNTU:USN-2140-1 UBUNTU:USN-2141-1 UBUNTU:USN-2173-1 UBUNTU:USN-2174-1 XF:linux-kernel-cve20141444-info-disc(90443) XF:linux-kernel-cve20141445-info-disc(90444) XF:linux-kernel-cve20141446-info-disc(90445) bnc#823260 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2172fa709ab32ca60e86179dc67d0857be8e2c98 linux.git:commit:58f09e00ae095e46ef9edfcf3a5fd9ccdfad065e linux.git:commit:627aad1c01da6f881e7f98d71fd928ca0c316b1a linux.git:commit:e9c6a182649f4259db704ae15a91ac820e63b0ca rh#1004233 rh#1007690 rh#1033603 rh#1053610 rh#1053613 rh#1053620 rh#1062356 rh#1067558 rh#1070705 rh#1094232 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#971242 |
CVE-2013-6422 | curl:Unsupported | low | () | CONFIRM:curl.haxx.se:CVE-2013-6422 CVE-2013-6422 DSA-2824 RH:CVE-2013-6422 SMASH Issue 94789 UBUNTU:CVE-2013-6422 UBUNTU:USN-2058-1 bnc#856069 rh#1037918 |
CVE-2013-6431 | kernel-source-rt:Unsupported | moderate | () | CONFIRM:git.kernel.org:CVE-2013-6431 CONFIRM:github.com:CVE-2013-6431 CONFIRM:www.kernel.org:CVE-2013-6431 CVE-2013-6431 MISC:git.kernel.org:/ MLIST:[oss-security] 20131206 Re: CVE request: Linux kernel: net: fib: fib6_add: potential NULL pointer dereference OSS:11624 RH:CVE-2013-6431 RHSA-2014:0100 SMASH Issue 94458 SUSE:openSUSE-SU-2014:0204 UBUNTU:CVE-2013-6431 bnc#854173 rh#1007939 rh#1039054 rh#916646 |
CVE-2013-6432 | kernel-source-rt:Unsupported | moderate | () | CONFIRM:git.kernel.org:CVE-2013-6432 CONFIRM:github.com:CVE-2013-6432 CONFIRM:www.kernel.org:CVE-2013-7348 CVE-2013-6432 MLIST:[oss-security] 20131206 Re: CVE request: Kernel: ping: NULL pointer dereference on write to msg_name OSS:11623 RH:CVE-2013-6432 SMASH Issue 94459 SUSE:openSUSE-SU-2014:0205 UBUNTU:CVE-2013-6432 UBUNTU:USN-2113-1 UBUNTU:USN-2117-1 bnc#854175 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=cf970c002d270c36202bd5b9c2804d3097a52da0 rh#1039046 |
CVE-2013-6449 | openssl:Unsupported, openssl-1_1:Unsupported | moderate | () | BID:64530 CONFIRM:git.openssl.org:CVE-2013-6449 CONFIRM:issues.apache.org:CVE-2013-6449 CONFIRM:rt.openssl.org:CVE-2013-6449 CONFIRM:rt.openssl.org:CVE-2015-0288 CONFIRM:rt.openssl.org:CVE-2015-0292 CVE-2013-6449 D:CVE-2013-6449 DSA-2833 FEDORA:FEDORA-2013-23768 FEDORA:FEDORA-2013-23788 FEDORA:FEDORA-2013-23794 GENTOO:GLSA-201412-39 RH:CVE-2013-6449 RHSA-2014:0015 RHSA-2014:0041 SECTRACK:1029548 SMASH Issue 94908 SUSE:openSUSE-SU-2014:0012 SUSE:openSUSE-SU-2014:0015 SUSE:openSUSE-SU-2014:0018 SUSE:openSUSE-SU-2014:0048 UBUNTU:CVE-2013-6449 bdo#732710 bdo#732754 bnc#856687 rh#1045363 |
CVE-2013-6450 | openssl:Unsupported, openssl-1_1:Unsupported | moderate | () | BID:64618 CONFIRM:git.openssl.org:CVE-2013-6450 CONFIRM:puppet.com:CVE-2013-6450 CONFIRM:security-tracker.debian.org:CVE-2013-6450 CVE-2013-6450 D:CVE-2013-6450 Oracle:CVE-2013-6450 RH:CVE-2013-6450 RHSA-2014:0015 SECTRACK:1029549 SECTRACK:1031594 SMASH Issue 95061 SUSE:openSUSE-SU-2014:0049 UBUNTU:CVE-2013-6450 bdo#732710 bdo#732754 bnc#857203 bnc#861384 openssl.git:commit:20b82b514d81a64f5b240788e5051167456af379 rh#1047840 |
CVE-2013-6999 | kernel-source-rt:Not affected | important | () | BID:64057 BID:65255 CONFIRM:git.kernel.org:CVE-2014-0038 CONFIRM:www.kernel.org:CVE-2014-0038 CVE-2013-6999 CVE-2014-0038 D:CVE-2014-0038 EXPLOIT-DB:31346 EXPLOIT-DB:31347 EXPLOIT-DB:40503 MANDRIVA:MDVSA-2014:038 MISC:code.google.com:CVE-2014-0038 MISC:git.kernel.org:MLIST:[oss-security] 20140131 Linux 3.4+: arbitrary write with CONFIG_X86_X32 (CVE-2014-0038) MISC:github.com:CVE-2013-2765 MISC:github.com:CVE-2014-0038 MISC:pastebin.com:CVE-2013-6999 MISC:pastebin.com:CVE-2014-0038 MLIST:[oss-security] 20140131 Linux 3.4+: arbitrary write with CONFIG_X86_X32 (CVE-2014-0038) OSS:11968 RH:CVE-2014-0038 SECUNIA:55633 SECUNIA:56669 SMASH Issue 95767 SUSE:openSUSE-SU-2014:0204 SUSE:openSUSE-SU-2014:0205 UBUNTU:CVE-2014-0038 UBUNTU:USN-2094-1 UBUNTU:USN-2095-1 UBUNTU:USN-2096-1 bnc#860993 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2def2ef2ae5f3990aabdbe8a755911902707d268 linux.git:commit:2def2ef2ae5f3990aabdbe8a755911902707d268 rh#1007939 rh#1060023 rh#916646 |
CVE-2013-7026 | kernel-source-rt:Unsupported | moderate | () | CONFIRM:git.kernel.org:CVE-2013-7026 CONFIRM:github.com:CVE-2013-7026 CVE-2013-7026 D:CVE-2013-7026 RH:CVE-2013-7026 SMASH Issue 94550 UBUNTU:CVE-2013-7026 UBUNTU:USN-2070-1 UBUNTU:USN-2075-1 bnc#854633 rh#1039951 |
CVE-2013-7041 | pam:Not affected | moderate | () | BID:64180 CVE-2013-7041 GENTOO:GLSA-201605-05 L3:66743 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MLIST:[oss-security] 20141209 CVE request: pam: password hashes aren't compared case-sensitively MLIST:[oss-security] 20141209 Re: CVE request: pam: password hashes aren't compared case-sensitively OSS:11640 RH:CVE-2013-7041 SMASH Issue 94516 UBUNTU:CVE-2013-7041 UBUNTU:USN-2935-1 UBUNTU:USN-2935-2 UBUNTU:USN-2935-3 bdo#731368 bnc#854480 rh#1038555 |
CVE-2013-7263 | kernel-source-rt:Not affected | important | () | BID:68214 BID:72061 CONFIRM:git.kernel.org:CVE-2013-7281 CONFIRM:git.kernel.org:CVE-2014-4608 CONFIRM:git.kernel.org:CVE-2014-8160 CONFIRM:github.com:CVE-2013-7281 CONFIRM:github.com:CVE-2014-4608 CONFIRM:github.com:CVE-2014-8160 CONFIRM:www.kernel.org:CVE-2014-9914 CVE-2013-7263 CVE-2014-4608 CVE-2014-8160 CVE-2023-2002 D:CVE-2013-7263 DSA-2906 DSA-3170 MANDRIVA:MDVSA-2015:057 MANDRIVA:MDVSA-2015:058 MISC:blog.securitymouse.com:CVE-2014-4611 MISC:git.kernel.org:OSS:2023/04/16/3 MISC:www.oberhumer.com:CVE-2014-4608 MISC:www.securitymouse.com:CVE-2014-4608 MLIST:[netfilter-devel] 20140925 [PATCH nf] netfilter: conntrack: disable generic protocol tracking MLIST:[oss-security] 20131128 Re: CVE Request: Linux kernel: net: uninitialised memory leakage MLIST:[oss-security] 20140107 oss-sec: CVE split and a missed file MLIST:[oss-security] 20140626 LMS-2014-06-16-2: Linux Kernel LZO MLIST:[oss-security] 20150114 CVE-2014-8160 Linux Kernel: SCTP firewalling fails until SCTP module is loaded OSS:2023/04/16/3 RH:CVE-2013-7263 RH:CVE-2014-4608 RH:CVE-2014-8160 RHSA-2014:0159 RHSA-2014:0285 RHSA-2014:0439 RHSA-2014:1392 RHSA-2015:0062 RHSA-2015:0284 RHSA-2015:0290 RHSA-2015:0674 SECUNIA:55882 SECUNIA:56036 SECUNIA:60011 SECUNIA:60174 SECUNIA:62633 SMASH Issue 95116 SUSE:SUSE-SU-2015:0481 SUSE:SUSE-SU-2015:0529 SUSE:SUSE-SU-2015:0652 SUSE:SUSE-SU-2015:0736 SUSE:openSUSE-SU-2015:0566 SUSE:openSUSE-SU-2015:0714 UBUNTU:CVE-2013-7263 UBUNTU:CVE-2014-4608 UBUNTU:CVE-2014-8160 UBUNTU:USN-2109-1 UBUNTU:USN-2110-1 UBUNTU:USN-2416-1 UBUNTU:USN-2417-1 UBUNTU:USN-2418-1 UBUNTU:USN-2419-1 UBUNTU:USN-2420-1 UBUNTU:USN-2421-1 UBUNTU:USN-2513-1 UBUNTU:USN-2514-1 UBUNTU:USN-2515-1 UBUNTU:USN-2516-1 UBUNTU:USN-2517-1 UBUNTU:USN-2518-1 bnc#857643 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=206a81c18401c0cde6e579164f752c4b147324ce http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=db29a9508a9246e77087c5531e45b2c88ec6988b rh#1007690 rh#1035875 rh#1067558 rh#1094232 rh#1113899 rh#1163762 rh#1182059 |
CVE-2013-7264 | kernel-source-rt:Not affected | moderate | () | CVE-2013-7264 D:CVE-2013-7264 DSA-2906 RH:CVE-2013-7264 RHSA-2014:0159 RHSA-2014:0285 RHSA-2014:0439 SMASH Issue 95117 UBUNTU:CVE-2013-7264 UBUNTU:USN-2109-1 UBUNTU:USN-2110-1 rh#1035875 |
CVE-2013-7265 | kernel-source-rt:Not affected | moderate | () | CVE-2013-7265 D:CVE-2013-7265 DSA-2906 RH:CVE-2013-7265 RHSA-2014:0159 RHSA-2014:0285 RHSA-2014:0439 SMASH Issue 95118 UBUNTU:CVE-2013-7265 UBUNTU:USN-2109-1 UBUNTU:USN-2110-1 rh#1035875 |
CVE-2013-7267 | kernel-source-rt:Not affected | moderate | () | CVE-2013-7267 D:CVE-2013-7267 RH:CVE-2013-7267 RHSA-2014:0328 SMASH Issue 95120 UBUNTU:CVE-2013-7267 UBUNTU:USN-2109-1 UBUNTU:USN-2110-1 UBUNTU:USN-2128-1 UBUNTU:USN-2129-1 rh#1039845 |
CVE-2013-7268 | kernel-source-rt:Not affected | moderate | () | CVE-2013-7268 D:CVE-2013-7268 RH:CVE-2013-7268 RHSA-2014:0328 SMASH Issue 95121 UBUNTU:CVE-2013-7268 UBUNTU:USN-2109-1 UBUNTU:USN-2110-1 UBUNTU:USN-2128-1 UBUNTU:USN-2129-1 rh#1039845 |
CVE-2013-7269 | kernel-source-rt:Not affected | moderate | () | BID:64742 CVE-2013-7269 D:CVE-2013-7269 RH:CVE-2013-7269 RHSA-2014:0328 SMASH Issue 95122 UBUNTU:CVE-2013-7269 UBUNTU:USN-2109-1 UBUNTU:USN-2110-1 UBUNTU:USN-2128-1 UBUNTU:USN-2129-1 XF:linux-kernel-cve20137269-info-disc(90130) rh#1039845 |
CVE-2013-7270 | kernel-source-rt:Not affected | moderate | () | BID:64744 CVE-2013-7270 D:CVE-2013-7270 RH:CVE-2013-7270 RHSA-2014:0328 SMASH Issue 95123 UBUNTU:CVE-2013-7270 UBUNTU:USN-2109-1 UBUNTU:USN-2110-1 UBUNTU:USN-2128-1 UBUNTU:USN-2129-1 XF:linux-kernel-cve20137270-info-disc(90131) rh#1039845 |
CVE-2013-7271 | kernel-source-rt:Not affected | moderate | () | BID:64746 CVE-2013-7271 D:CVE-2013-7271 RH:CVE-2013-7271 RHSA-2014:0328 SMASH Issue 95124 UBUNTU:CVE-2013-7271 UBUNTU:USN-2109-1 UBUNTU:USN-2110-1 UBUNTU:USN-2128-1 UBUNTU:USN-2129-1 XF:linux-kernel-cve20137271-info-disc(90132) rh#1039845 |
CVE-2013-7281 | kernel-source-rt:Unsupported | moderate | () | BID:64747 CVE-2013-7281 D:CVE-2013-7281 RH:CVE-2013-7281 RHSA-2014:0159 RHSA-2014:0285 RHSA-2014:0439 SECTRACK:1029566 SMASH Issue 95166 UBUNTU:CVE-2013-7281 UBUNTU:USN-2109-1 UBUNTU:USN-2110-1 XF:linux-kernel-cve20137281-info-disc(90222) rh#1035875 |
CVE-2013-7338 | python3:Unsupported | important | () | APPLE:APPLE-SA-2015-08-13-2 BID:65179 CONFIRM:bugs.python.org:CVE-2013-7338 CONFIRM:docs.python.org:CVE-2013-7338 CONFIRM:hg.python.org:CVE-2013-7338 CONFIRM:support.apple.com:CVE-2015-5784 CVE-2013-7338 GENTOO:GLSA-201503-10 MLIST:[oss-security] 20140318 CVE request for python/zipfile MLIST:[oss-security] 20140319 Re: CVE request for python/zipfile RH:CVE-2013-7338 SECTRACK:1029973 SMASH Issue 97153 SMASH Issue 98127 SUSE:openSUSE-SU-2014:0597 UBUNTU:CVE-2013-7338 bnc#869222 rh#1078014 |
CVE-2013-7339 | kernel-source-rt:Not affected | moderate | () | BID:66351 CONFIRM:git.kernel.org:CVE-2013-7339 CONFIRM:github.com:CVE-2013-7339 CONFIRM:www.kernel.org:CVE-2014-1690 CVE-2013-7339 DSA-2906 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MLIST:[oss-security] 20140320 CVE-2013-7339 Linux kernel - rds: prevent dereference of a NULL device RH:CVE-2013-7339 RHSA-2014:0439 RHSA-2014:0740 RHSA-2014:0981 RHSA-2014:1101 SECUNIA:59386 SMASH Issue 103058 SMASH Issue 97533 UBUNTU:CVE-2013-7339 bnc#869563 rh#1007690 rh#1067558 rh#1079214 rh#1094232 rh#822754 |
CVE-2013-7348 | kernel-source-rt:Unsupported | moderate | () | CONFIRM:git.kernel.org:CVE-2013-7348 CONFIRM:github.com:CVE-2013-7348 CVE-2013-7348 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:MLIST:[oss-security] 20140331 CVE-2013-7348 CVE-2014-2678 Linux kernel aio and rds issues MLIST:[oss-security] 20140331 CVE-2013-7348 CVE-2014-2678 Linux kernel aio and rds issues RH:CVE-2013-7348 SMASH Issue 97508 UBUNTU:CVE-2013-7348 bnc#871556 rh#1083270 |
CVE-2013-7421 | kernel-source-rt:Already fixed | moderate | () | BID:72320 BID:72322 BID:72324 CONFIRM:git.busybox.net:CVE-2014-9645 CONFIRM:git.kernel.org:CVE-2013-7421 CONFIRM:git.kernel.org:CVE-2014-9644 CONFIRM:github.com:CVE-2013-7421 CONFIRM:github.com:CVE-2014-9644 CONFIRM:github.com:CVE-2017-6429 CONFIRM:www.kernel.org:CVE-2015-1573 CONFIRM:www.oracle.com:CVE-2015-8472 CONFIRM:www.oracle.com:CVE-2016-2802 CVE-2013-7421 CVE-2014-9644 CVE-2014-9645 CVE-2023-2002 D:CVE-2013-7421 D:CVE-2014-9644 D:CVE-2014-9645 DSA-3170 GENTOO:GLSA-201503-13 MANDRIVA:MDVSA-2015:057 MANDRIVA:MDVSA-2015:058 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:OSS:2023/04/16/3 MISC:plus.google.com:CVE-2014-9645 MLIST:[linux-kernel] 20130304 Re: user ns: arbitrary module loading MLIST:[oss-security] 20150124 Re: CVE Request: Linux kernel crypto api unprivileged arbitrary module load OSS:2023/04/16/3 RH:CVE-2013-7421 RH:CVE-2014-9644 RH:CVE-2014-9645 RHSA-2015:2152 RHSA-2015:2411 RHSA-2016:0068 SMASH Issue 113136 SMASH Issue 113165 UBUNTU:CVE-2013-7421 UBUNTU:CVE-2014-9644 UBUNTU:CVE-2014-9645 UBUNTU:USN-2513-1 UBUNTU:USN-2514-1 UBUNTU:USN-2543-1 UBUNTU:USN-2544-1 UBUNTU:USN-2545-1 UBUNTU:USN-2546-1 bnc#914423 rh#1113899 rh#1163762 rh#1163792 rh#1185469 rh#1185707 rh#1190546 |
CVE-2013-7422 | perl:Not affected | important | () | APPLE:APPLE-SA-2015-08-13-2 BID:75704 CONFIRM:perl5.git.perl.org:CVE-2013-7422 CONFIRM:support.apple.com:CVE-2015-5784 CVE-2013-7422 GENTOO:GLSA-201507-11 RH:CVE-2013-7422 SMASH Issue 113238 UBUNTU:CVE-2013-7422 UBUNTU:USN-2916-1 bnc#915514 rh#1187149 rh#323571 |
CVE-2013-7445 | kernel-source-rt:Unsupported | moderate | () | CVE-2013-7445 MISC:bugzilla.kernel.org:CVE-2013-7445 RH:CVE-2013-7445 SMASH Issue 157835 UBUNTU:CVE-2013-7445 bnc#950755 bnc#950947 rh#1272995 |
CVE-2013-7446 | kernel-source-rt:Not affected | moderate | () | BID:77638 CONFIRM:git.kernel.org:CVE-2013-7446 CONFIRM:github.com:CVE-2013-7446 CONFIRM:groups.google.com:CVE-2013-7446 CONFIRM:www.kernel.org:CVE-2016-3841 CVE-2013-7446 D:CVE-2022-2590 DSA-3426 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:forums.grsecurity.net:CVE-2013-7446 MLIST:[linux-kernel] 20131014 Re: epoll oops. MLIST:[linux-kernel] 20140515 eventpoll __list_del_entry corruption (was: perf: use after free in perf_remove_from_context) MLIST:[linux-kernel] 20150913 List corruption on epoll_ctl(EPOLL_CTL_DEL) an AF_UNIX socket MLIST:[netdev] 20150304 [PATCH net] af_unix: don't poll dead peers MLIST:[oss-security] 20151118 Re: CVE request - Linux kernel - Unix sockets use after free - peer_wait_queue prematurely freed OSS:2015/Q4/321 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 OSS:2023/10/10/4 Oracle:CVE-2015-6937 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 RH:CVE-2013-7446 SECTRACK:1034557 SMASH Issue 158921 SMASH Issue 158970 SUSE:SUSE-SU-2016:0745 SUSE:SUSE-SU-2016:0746 SUSE:SUSE-SU-2016:0747 SUSE:SUSE-SU-2016:0749 SUSE:SUSE-SU-2016:0750 SUSE:SUSE-SU-2016:0751 SUSE:SUSE-SU-2016:0752 SUSE:SUSE-SU-2016:0753 SUSE:SUSE-SU-2016:0754 SUSE:SUSE-SU-2016:0755 SUSE:SUSE-SU-2016:0756 SUSE:SUSE-SU-2016:0757 SUSE:SUSE-SU-2016:0911 SUSE:SUSE-SU-2016:1102 SUSE:SUSE-SU-2016:1961 SUSE:SUSE-SU-2016:1994 SUSE:SUSE-SU-2016:1995 SUSE:SUSE-SU-2016:2000 SUSE:SUSE-SU-2016:2001 SUSE:SUSE-SU-2016:2002 SUSE:SUSE-SU-2016:2003 SUSE:SUSE-SU-2016:2005 SUSE:SUSE-SU-2016:2006 SUSE:SUSE-SU-2016:2007 SUSE:SUSE-SU-2016:2009 SUSE:SUSE-SU-2016:2010 SUSE:SUSE-SU-2016:2011 SUSE:SUSE-SU-2016:2014 SUSE:openSUSE-SU-2016:1641 UBUNTU:CVE-2013-7446 UBUNTU:USN-2886-1 UBUNTU:USN-2887-1 UBUNTU:USN-2887-2 UBUNTU:USN-2888-1 UBUNTU:USN-2889-1 UBUNTU:USN-2889-2 UBUNTU:USN-2890-1 UBUNTU:USN-2890-2 UBUNTU:USN-2890-3 bdo#813406 bnc#955654 bnc#955837 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b rh#1282688 rh#1324749 rh#1384344 rh#2116175 |
CVE-2014-0038 | kernel-source-rt:Not affected | important | () | BID:64057 BID:65255 CONFIRM:git.kernel.org:CVE-2014-0038 CONFIRM:www.kernel.org:CVE-2014-0038 CVE-2013-6999 CVE-2014-0038 D:CVE-2014-0038 EXPLOIT-DB:31346 EXPLOIT-DB:31347 EXPLOIT-DB:40503 MANDRIVA:MDVSA-2014:038 MISC:code.google.com:CVE-2014-0038 MISC:git.kernel.org:MLIST:[oss-security] 20140131 Linux 3.4+: arbitrary write with CONFIG_X86_X32 (CVE-2014-0038) MISC:github.com:CVE-2013-2765 MISC:github.com:CVE-2014-0038 MISC:pastebin.com:CVE-2013-6999 MISC:pastebin.com:CVE-2014-0038 MLIST:[oss-security] 20140131 Linux 3.4+: arbitrary write with CONFIG_X86_X32 (CVE-2014-0038) OSS:11968 RH:CVE-2014-0038 SECUNIA:55633 SECUNIA:56669 SMASH Issue 95767 SUSE:openSUSE-SU-2014:0204 SUSE:openSUSE-SU-2014:0205 UBUNTU:CVE-2014-0038 UBUNTU:USN-2094-1 UBUNTU:USN-2095-1 UBUNTU:USN-2096-1 bnc#860993 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2def2ef2ae5f3990aabdbe8a755911902707d268 linux.git:commit:2def2ef2ae5f3990aabdbe8a755911902707d268 rh#1007939 rh#1060023 rh#916646 |
CVE-2014-0069 | kernel-source-rt:Not affected | important | () | BID:65588 CONFIRM:git.kernel.org:CVE-2014-0069 CVE-2014-0069 D:CVE-2014-0069 MLIST:[linux-cifs] 20140214 [PATCH] cifs: ensure that uncached writes handle unmapped areas correctly MLIST:[oss-security] 20140217 CVE-2014-0069 -- kernel: cifs: incorrect handling of bogus user pointers during uncached writes OSS:12155 RH:CVE-2014-0069 RHSA-2014:0328 RHSA-2014:0439 SMASH Issue 96200 SUSE:SUSE-SU-2014:0459 UBUNTU:CVE-2014-0069 bnc#864025 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=5d81de8e8667da7135d3a32a964087c0faf5483f linux.git:commit:33807f4f0daec3b00565c2932d95f614f5833adf linux.git:commit:351a7934c0e788262f83380188f18e575f6bc63f linux.git:commit:5d81de8e8667da7135d3a32a964087c0faf5483f rh#1007690 rh#1064253 rh#1067558 rh#1094232 |
CVE-2014-0101 | kernel-source-rt:Already fixed | moderate | () | BID:63889 BID:64952 BID:64953 BID:64954 BID:65459 BID:65943 CONFIRM:git.kernel.org:CVE-2014-0101 CONFIRM:git.kernel.org:CVE-2014-1874 CONFIRM:github.com:CVE-2014-0101 CONFIRM:github.com:CVE-2014-1874 CONFIRM:linux.oracle.com:CVE-2014-1874 CONFIRM:linux.oracle.com:CVE-2014-3153 CONFIRM:support.f5.com:CVE-2014-0101 CONFIRM:www.kernel.org:CVE-2014-1874 CVE-2013-2147 CVE-2013-4299 CVE-2013-6382 CVE-2014-0101 CVE-2014-1444 CVE-2014-1445 CVE-2014-1446 CVE-2014-1874 CVE-2023-2002 DSA-2906 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:/ MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[linux-kernel] 20130603 [patch] cciss: info leak in cciss_ioctl32_passthru() MLIST:[linux-kernel] 20130603 [patch] cpqarray: info leak in ida_locked_ioctl() MLIST:[oss-security] 20130605 Re: CVE request: kernel: cpqarray/c: info leak in ida_locked_ioctl() MLIST:[oss-security] 20140115 Re: CVE request: assorted kernel infoleak security fixes MLIST:[oss-security] 20140206 Re: CVE Request: Linux kernel: SELinux local DoS MLIST:[oss-security] 20140304 CVE-2014-0101 -- Linux kernel: net: sctp: null pointer dereference when processing authenticated cookie_echo chunk MLIST:[xfs] 20131031 [patch] xfs: underflow bug in xfs_attrlist_by_handle() OSS:12052 OSS:2023/04/16/3 RH:CVE-2013-2147 RH:CVE-2013-4299 RH:CVE-2013-6382 RH:CVE-2014-0101 RH:CVE-2014-1444 RH:CVE-2014-1445 RH:CVE-2014-1446 RH:CVE-2014-1874 RHSA-2013:1166 RHSA-2013:1264 RHSA-2013:1436 RHSA-2013:1449 RHSA-2013:1450 RHSA-2013:1460 RHSA-2013:1490 RHSA-2013:1519 RHSA-2013:1520 RHSA-2013:1783 RHSA-2013:1860 RHSA-2014:0328 RHSA-2014:0419 RHSA-2014:0432 RHSA-2014:0439 RHSA-2014:0520 RHSA-2014:0771 SECUNIA:59216 SECUNIA:59262 SECUNIA:59309 SECUNIA:59406 SMASH Issue 54969 SUSE:SUSE-SU-2015:0812 UBUNTU:CVE-2013-2147 UBUNTU:CVE-2013-4299 UBUNTU:CVE-2013-6382 UBUNTU:CVE-2014-0101 UBUNTU:CVE-2014-1444 UBUNTU:CVE-2014-1445 UBUNTU:CVE-2014-1446 UBUNTU:CVE-2014-1874 UBUNTU:USN-1994-1 UBUNTU:USN-1996-1 UBUNTU:USN-1997-1 UBUNTU:USN-1999-1 UBUNTU:USN-2015-1 UBUNTU:USN-2016-1 UBUNTU:USN-2040-1 UBUNTU:USN-2041-1 UBUNTU:USN-2042-1 UBUNTU:USN-2043-1 UBUNTU:USN-2044-1 UBUNTU:USN-2045-1 UBUNTU:USN-2046-1 UBUNTU:USN-2066-1 UBUNTU:USN-2067-1 UBUNTU:USN-2109-1 UBUNTU:USN-2110-1 UBUNTU:USN-2128-1 UBUNTU:USN-2129-1 UBUNTU:USN-2133-1 UBUNTU:USN-2134-1 UBUNTU:USN-2135-1 UBUNTU:USN-2136-1 UBUNTU:USN-2137-1 UBUNTU:USN-2138-1 UBUNTU:USN-2139-1 UBUNTU:USN-2140-1 UBUNTU:USN-2141-1 UBUNTU:USN-2173-1 UBUNTU:USN-2174-1 XF:linux-kernel-cve20141444-info-disc(90443) XF:linux-kernel-cve20141445-info-disc(90444) XF:linux-kernel-cve20141446-info-disc(90445) bnc#823260 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2172fa709ab32ca60e86179dc67d0857be8e2c98 linux.git:commit:58f09e00ae095e46ef9edfcf3a5fd9ccdfad065e linux.git:commit:627aad1c01da6f881e7f98d71fd928ca0c316b1a linux.git:commit:e9c6a182649f4259db704ae15a91ac820e63b0ca rh#1004233 rh#1007690 rh#1033603 rh#1053610 rh#1053613 rh#1053620 rh#1062356 rh#1067558 rh#1070705 rh#1094232 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#971242 |
CVE-2014-0155 | kernel-source-rt:Not affected | moderate | 6.8 (CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H) | CONFIRM:git.kernel.org:CVE-2014-0155 CVE-2014-0155 MLIST:[oss-security] 20140407 CVE-2014-0155 -- kernel: kvm: BUG caused by invalid entry in guest ioapic redirection table RH:CVE-2014-0155 SMASH Issue 102981 SMASH Issue 240291 UBUNTU:CVE-2014-0155 bnc#872540 linux.git:commit:55101e2d6ce1c780f6ee8fee5f37306971aac6cd linux.git:commit:5678de3f15010b9022ee45673f33bcfc71d47b60 rh#1081589 rh#822754 |
CVE-2014-0172 | elfutils:Unsupported | moderate | () | BID:66714 CVE-2014-0172 GENTOO:GLSA-201612-32 MLIST:[elfutils-devel] 20140409 [PATCH] CVE-2014-0172 Check for overflow before calling malloc to uncompress data. MLIST:[oss-security] 20140409 Heap-based buffer overflow in libdw/elfutils (CVE-2014-0172) RH:CVE-2014-0172 RHEA-2015:0369 SMASH Issue 97712 UBUNTU:CVE-2014-0172 UBUNTU:USN-2188-1 bnc#872785 rh#1085663 |
CVE-2014-0181 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2014-0181 CONFIRM:www.kernel.org:CVE-2014-0181 CVE-2014-0181 CVE-2023-2002 D:CVE-2014-0181 L3:41357 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[netdev] 20140423 [PATCH 0/5]: Preventing abuse when passing file descriptors MLIST:[oss-security] 20140423 Re: CVE-2014-0181: Linux network reconfiguration due to incorrect netlink checks OSS:2014/Q2/162 OSS:2014/Q2/163 OSS:2014/Q2/168 OSS:2014/Q2/169 OSS:2014/Q2/170 OSS:2023/04/16/3 RH:CVE-2014-0181 RHSA-2014:0913 RHSA-2014:1023 RHSA-2014:1392 RHSA-2014:1959 SMASH Issue 98234 SUSE:SUSE-SU-2015:0481 SUSE:SUSE-SU-2015:0652 SUSE:SUSE-SU-2015:0736 SUSE:SUSE-SU-2015:0812 SUSE:openSUSE-SU-2015:0566 UBUNTU:CVE-2014-0181 bnc#875051 linux.git:commit:29e8f59cf1ff91f2854563faddc5f61098cf4958 linux.git:commit:2d7a85f4b06e9c27ff629f07a524c48074f07f81 rh#1094265 rh#1113899 rh#1163762 rh#1163792 |
CVE-2014-0196 | kernel-source-rt:Not affected | moderate | () | BID:74820 CONFIRM:bugzilla.novell.com:CVE-2014-0196 CONFIRM:git.kernel.org:CVE-2014-0196 CONFIRM:git.kernel.org:CVE-2015-4170 CONFIRM:github.com:CVE-2015-4170 CONFIRM:linux.oracle.com:CVE-2014-3153 CONFIRM:source.android.com:CVE-2016-3818 CONFIRM:support.f5.com:CVE-2014-0196 CONFIRM:www.kernel.org:CVE-2015-4170 CVE-2014-0196 CVE-2015-4170 D:CVE-2014-0196 DSA-2926 DSA-2928 EXPLOIT-DB:33516 L3:40865 MISC:pastebin.com:CVE-2014-0196 MLIST:[oss-security] 20140429 CVE-2014-0196: Linux kernel pty layer race condition memory corruption MLIST:[oss-security] 20150526 CVE request: vulnerability in the kernel tty subsystem. OSS:2015/Q2/613 OSVDB:106646 RH:CVE-2014-0196 RH:CVE-2015-4170 RHSA-2013:0744 RHSA-2014:0512 RHSA-2014:0520 RHSA-2014:0557 RHSA-2014:0678 RHSA-2015:2152 RHSA-2015:2411 RHSA-2016:1395 SECUNIA:59218 SECUNIA:59262 SECUNIA:59599 SMASH Issue 117299 SMASH Issue 98400 SUSE:SUSE-SU-2014:0667 SUSE:SUSE-SU-2014:0683 UBUNTU:CVE-2014-0196 UBUNTU:CVE-2015-4170 UBUNTU:USN-2196-1 UBUNTU:USN-2197-1 UBUNTU:USN-2198-1 UBUNTU:USN-2199-1 UBUNTU:USN-2200-1 UBUNTU:USN-2201-1 UBUNTU:USN-2202-1 UBUNTU:USN-2203-1 UBUNTU:USN-2204-1 bnc#875690 bnc#877345 bnc#878696 bnc#879878 bnc#933423 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4291086b1f081b869c6d79e5b7441633dc3ace00 http://www.debian.org/security/2014/dsa-2926 http://www.debian.org/security/2014/dsa-2928 linux.git:commit:4291086b1f081b869c6d79e5b7441633dc3ace00 rh#1007690 rh#1067558 rh#1094232 rh#1202855 rh#1218879 |
CVE-2014-0203 | kernel-source-rt:Not affected | moderate | () | BID:68125 CONFIRM:git.kernel.org:CVE-2014-0203 CONFIRM:github.com:CVE-2014-0203 CONFIRM:linux.oracle.com:CVE-2014-1874 CONFIRM:linux.oracle.com:CVE-2014-3153 CONFIRM:mirror.linux.org.au:CVE-2015-3214 CVE-2014-0203 D:CVE-2014-0203 RH:CVE-2014-0203 RHSA-2014:0771 SECUNIA:59262 SECUNIA:59309 SECUNIA:59406 SECUNIA:59560 SMASH Issue 99796 UBUNTU:CVE-2014-0203 bnc#883526 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=86acdca1b63e6890540fa19495cfc708beff3d8b rh#1094363 |
CVE-2014-0205 | kernel-source-rt:Unsupported | moderate | () | CONFIRM:git.kernel.org:CVE-2014-0205 CONFIRM:github.com:CVE-2014-0205 CONFIRM:mirror.linux.org.au:CVE-2014-0205 CVE-2014-0205 MISC:git.kernel.org:/ RH:CVE-2014-0205 RHSA-2014:1167 RHSA-2014:1365 RHSA-2014:1763 SMASH Issue 105973 UBUNTU:CVE-2014-0205 bnc#895955 rh#1094455 |
CVE-2014-0206 | kernel-source-rt:Unsupported | low | () | BID:68176 CONFIRM:git.kernel.org:CVE-2014-0206 CONFIRM:source.android.com:CVE-2017-6426 CONFIRM:www.kernel.org:CVE-2014-0206 CVE-2014-0206 CVE-2023-2002 MISC:git.kernel.org:OSS:2023/04/16/3 OSS:2014/Q2/638 OSS:2023/04/16/3 RH:CVE-2014-0206 RHSA-2014:0786 RHSA-2014:0913 SECTRACK:1030479 SECTRACK:1038201 SECUNIA:59278 SMASH Issue 100007 SMASH Issue 99998 UBUNTU:CVE-2014-0206 bnc#884324 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=edfbbf388f293d70bf4b7c0bc38774d05e6f711a linux.git:commit:10b5b5361a3c2a7fff9dbfa0f127adc2531e7732 linux.git:commit:edfbbf388f293d70bf4b7c0bc38774d05e6f711a linux.git:commit:f8567a3845ac05bb28f3c1b478ef752762bd39ef rh#1094602 rh#1113899 |
CVE-2014-0236 | file:Unsupported | important | () | CONFIRM:bugs.php.net:CVE-2014-0236 CONFIRM:git.php.net:CVE-2014-0236 CONFIRM:php.net:CVE-2017-16642 CVE-2014-0236 RH:CVE-2014-0236 SMASH Issue 102932 UBUNTU:CVE-2014-0236 bnc#885196 http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=f3f22ff5c697aef854ffc1918bce708b37481b0f rh#1098209 |
CVE-2014-0333 | libpng16:Unsupported | moderate | () | CERT-VN:VU#684412 CONFIRM:ftp.simplesystems.org:CVE-2014-0333 CONFIRM:sourceforge.net:CVE-2014-0333 CVE-2014-0333 RH:CVE-2014-0333 SMASH Issue 96678 SUSE:openSUSE-SU-2014:0358 UBUNTU:CVE-2014-0333 bnc#866298 rh#1070985 |
CVE-2014-1444 | kernel-source-rt:Already fixed | moderate | () | BID:63889 BID:64952 BID:64953 BID:64954 BID:65459 BID:65943 CONFIRM:git.kernel.org:CVE-2014-0101 CONFIRM:git.kernel.org:CVE-2014-1874 CONFIRM:github.com:CVE-2014-0101 CONFIRM:github.com:CVE-2014-1874 CONFIRM:linux.oracle.com:CVE-2014-1874 CONFIRM:linux.oracle.com:CVE-2014-3153 CONFIRM:support.f5.com:CVE-2014-0101 CONFIRM:www.kernel.org:CVE-2014-1874 CVE-2013-2147 CVE-2013-4299 CVE-2013-6382 CVE-2014-0101 CVE-2014-1444 CVE-2014-1445 CVE-2014-1446 CVE-2014-1874 CVE-2023-2002 DSA-2906 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:/ MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[linux-kernel] 20130603 [patch] cciss: info leak in cciss_ioctl32_passthru() MLIST:[linux-kernel] 20130603 [patch] cpqarray: info leak in ida_locked_ioctl() MLIST:[oss-security] 20130605 Re: CVE request: kernel: cpqarray/c: info leak in ida_locked_ioctl() MLIST:[oss-security] 20140115 Re: CVE request: assorted kernel infoleak security fixes MLIST:[oss-security] 20140206 Re: CVE Request: Linux kernel: SELinux local DoS MLIST:[oss-security] 20140304 CVE-2014-0101 -- Linux kernel: net: sctp: null pointer dereference when processing authenticated cookie_echo chunk MLIST:[xfs] 20131031 [patch] xfs: underflow bug in xfs_attrlist_by_handle() OSS:12052 OSS:2023/04/16/3 RH:CVE-2013-2147 RH:CVE-2013-4299 RH:CVE-2013-6382 RH:CVE-2014-0101 RH:CVE-2014-1444 RH:CVE-2014-1445 RH:CVE-2014-1446 RH:CVE-2014-1874 RHSA-2013:1166 RHSA-2013:1264 RHSA-2013:1436 RHSA-2013:1449 RHSA-2013:1450 RHSA-2013:1460 RHSA-2013:1490 RHSA-2013:1519 RHSA-2013:1520 RHSA-2013:1783 RHSA-2013:1860 RHSA-2014:0328 RHSA-2014:0419 RHSA-2014:0432 RHSA-2014:0439 RHSA-2014:0520 RHSA-2014:0771 SECUNIA:59216 SECUNIA:59262 SECUNIA:59309 SECUNIA:59406 SMASH Issue 54969 SUSE:SUSE-SU-2015:0812 UBUNTU:CVE-2013-2147 UBUNTU:CVE-2013-4299 UBUNTU:CVE-2013-6382 UBUNTU:CVE-2014-0101 UBUNTU:CVE-2014-1444 UBUNTU:CVE-2014-1445 UBUNTU:CVE-2014-1446 UBUNTU:CVE-2014-1874 UBUNTU:USN-1994-1 UBUNTU:USN-1996-1 UBUNTU:USN-1997-1 UBUNTU:USN-1999-1 UBUNTU:USN-2015-1 UBUNTU:USN-2016-1 UBUNTU:USN-2040-1 UBUNTU:USN-2041-1 UBUNTU:USN-2042-1 UBUNTU:USN-2043-1 UBUNTU:USN-2044-1 UBUNTU:USN-2045-1 UBUNTU:USN-2046-1 UBUNTU:USN-2066-1 UBUNTU:USN-2067-1 UBUNTU:USN-2109-1 UBUNTU:USN-2110-1 UBUNTU:USN-2128-1 UBUNTU:USN-2129-1 UBUNTU:USN-2133-1 UBUNTU:USN-2134-1 UBUNTU:USN-2135-1 UBUNTU:USN-2136-1 UBUNTU:USN-2137-1 UBUNTU:USN-2138-1 UBUNTU:USN-2139-1 UBUNTU:USN-2140-1 UBUNTU:USN-2141-1 UBUNTU:USN-2173-1 UBUNTU:USN-2174-1 XF:linux-kernel-cve20141444-info-disc(90443) XF:linux-kernel-cve20141445-info-disc(90444) XF:linux-kernel-cve20141446-info-disc(90445) bnc#823260 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2172fa709ab32ca60e86179dc67d0857be8e2c98 linux.git:commit:58f09e00ae095e46ef9edfcf3a5fd9ccdfad065e linux.git:commit:627aad1c01da6f881e7f98d71fd928ca0c316b1a linux.git:commit:e9c6a182649f4259db704ae15a91ac820e63b0ca rh#1004233 rh#1007690 rh#1033603 rh#1053610 rh#1053613 rh#1053620 rh#1062356 rh#1067558 rh#1070705 rh#1094232 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#971242 |
CVE-2014-1445 | kernel-source-rt:Already fixed | moderate | () | BID:63889 BID:64952 BID:64953 BID:64954 BID:65459 BID:65943 CONFIRM:git.kernel.org:CVE-2014-0101 CONFIRM:git.kernel.org:CVE-2014-1874 CONFIRM:github.com:CVE-2014-0101 CONFIRM:github.com:CVE-2014-1874 CONFIRM:linux.oracle.com:CVE-2014-1874 CONFIRM:linux.oracle.com:CVE-2014-3153 CONFIRM:support.f5.com:CVE-2014-0101 CONFIRM:www.kernel.org:CVE-2014-1874 CVE-2013-2147 CVE-2013-4299 CVE-2013-6382 CVE-2014-0101 CVE-2014-1444 CVE-2014-1445 CVE-2014-1446 CVE-2014-1874 CVE-2023-2002 DSA-2906 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:/ MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[linux-kernel] 20130603 [patch] cciss: info leak in cciss_ioctl32_passthru() MLIST:[linux-kernel] 20130603 [patch] cpqarray: info leak in ida_locked_ioctl() MLIST:[oss-security] 20130605 Re: CVE request: kernel: cpqarray/c: info leak in ida_locked_ioctl() MLIST:[oss-security] 20140115 Re: CVE request: assorted kernel infoleak security fixes MLIST:[oss-security] 20140206 Re: CVE Request: Linux kernel: SELinux local DoS MLIST:[oss-security] 20140304 CVE-2014-0101 -- Linux kernel: net: sctp: null pointer dereference when processing authenticated cookie_echo chunk MLIST:[xfs] 20131031 [patch] xfs: underflow bug in xfs_attrlist_by_handle() OSS:12052 OSS:2023/04/16/3 RH:CVE-2013-2147 RH:CVE-2013-4299 RH:CVE-2013-6382 RH:CVE-2014-0101 RH:CVE-2014-1444 RH:CVE-2014-1445 RH:CVE-2014-1446 RH:CVE-2014-1874 RHSA-2013:1166 RHSA-2013:1264 RHSA-2013:1436 RHSA-2013:1449 RHSA-2013:1450 RHSA-2013:1460 RHSA-2013:1490 RHSA-2013:1519 RHSA-2013:1520 RHSA-2013:1783 RHSA-2013:1860 RHSA-2014:0328 RHSA-2014:0419 RHSA-2014:0432 RHSA-2014:0439 RHSA-2014:0520 RHSA-2014:0771 SECUNIA:59216 SECUNIA:59262 SECUNIA:59309 SECUNIA:59406 SMASH Issue 54969 SUSE:SUSE-SU-2015:0812 UBUNTU:CVE-2013-2147 UBUNTU:CVE-2013-4299 UBUNTU:CVE-2013-6382 UBUNTU:CVE-2014-0101 UBUNTU:CVE-2014-1444 UBUNTU:CVE-2014-1445 UBUNTU:CVE-2014-1446 UBUNTU:CVE-2014-1874 UBUNTU:USN-1994-1 UBUNTU:USN-1996-1 UBUNTU:USN-1997-1 UBUNTU:USN-1999-1 UBUNTU:USN-2015-1 UBUNTU:USN-2016-1 UBUNTU:USN-2040-1 UBUNTU:USN-2041-1 UBUNTU:USN-2042-1 UBUNTU:USN-2043-1 UBUNTU:USN-2044-1 UBUNTU:USN-2045-1 UBUNTU:USN-2046-1 UBUNTU:USN-2066-1 UBUNTU:USN-2067-1 UBUNTU:USN-2109-1 UBUNTU:USN-2110-1 UBUNTU:USN-2128-1 UBUNTU:USN-2129-1 UBUNTU:USN-2133-1 UBUNTU:USN-2134-1 UBUNTU:USN-2135-1 UBUNTU:USN-2136-1 UBUNTU:USN-2137-1 UBUNTU:USN-2138-1 UBUNTU:USN-2139-1 UBUNTU:USN-2140-1 UBUNTU:USN-2141-1 UBUNTU:USN-2173-1 UBUNTU:USN-2174-1 XF:linux-kernel-cve20141444-info-disc(90443) XF:linux-kernel-cve20141445-info-disc(90444) XF:linux-kernel-cve20141446-info-disc(90445) bnc#823260 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2172fa709ab32ca60e86179dc67d0857be8e2c98 linux.git:commit:58f09e00ae095e46ef9edfcf3a5fd9ccdfad065e linux.git:commit:627aad1c01da6f881e7f98d71fd928ca0c316b1a linux.git:commit:e9c6a182649f4259db704ae15a91ac820e63b0ca rh#1004233 rh#1007690 rh#1033603 rh#1053610 rh#1053613 rh#1053620 rh#1062356 rh#1067558 rh#1070705 rh#1094232 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#971242 |
CVE-2014-1446 | kernel-source-rt:Already fixed | moderate | () | BID:63889 BID:64952 BID:64953 BID:64954 BID:65459 BID:65943 CONFIRM:git.kernel.org:CVE-2014-0101 CONFIRM:git.kernel.org:CVE-2014-1874 CONFIRM:github.com:CVE-2014-0101 CONFIRM:github.com:CVE-2014-1874 CONFIRM:linux.oracle.com:CVE-2014-1874 CONFIRM:linux.oracle.com:CVE-2014-3153 CONFIRM:support.f5.com:CVE-2014-0101 CONFIRM:www.kernel.org:CVE-2014-1874 CVE-2013-2147 CVE-2013-4299 CVE-2013-6382 CVE-2014-0101 CVE-2014-1444 CVE-2014-1445 CVE-2014-1446 CVE-2014-1874 CVE-2023-2002 DSA-2906 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:/ MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[linux-kernel] 20130603 [patch] cciss: info leak in cciss_ioctl32_passthru() MLIST:[linux-kernel] 20130603 [patch] cpqarray: info leak in ida_locked_ioctl() MLIST:[oss-security] 20130605 Re: CVE request: kernel: cpqarray/c: info leak in ida_locked_ioctl() MLIST:[oss-security] 20140115 Re: CVE request: assorted kernel infoleak security fixes MLIST:[oss-security] 20140206 Re: CVE Request: Linux kernel: SELinux local DoS MLIST:[oss-security] 20140304 CVE-2014-0101 -- Linux kernel: net: sctp: null pointer dereference when processing authenticated cookie_echo chunk MLIST:[xfs] 20131031 [patch] xfs: underflow bug in xfs_attrlist_by_handle() OSS:12052 OSS:2023/04/16/3 RH:CVE-2013-2147 RH:CVE-2013-4299 RH:CVE-2013-6382 RH:CVE-2014-0101 RH:CVE-2014-1444 RH:CVE-2014-1445 RH:CVE-2014-1446 RH:CVE-2014-1874 RHSA-2013:1166 RHSA-2013:1264 RHSA-2013:1436 RHSA-2013:1449 RHSA-2013:1450 RHSA-2013:1460 RHSA-2013:1490 RHSA-2013:1519 RHSA-2013:1520 RHSA-2013:1783 RHSA-2013:1860 RHSA-2014:0328 RHSA-2014:0419 RHSA-2014:0432 RHSA-2014:0439 RHSA-2014:0520 RHSA-2014:0771 SECUNIA:59216 SECUNIA:59262 SECUNIA:59309 SECUNIA:59406 SMASH Issue 54969 SUSE:SUSE-SU-2015:0812 UBUNTU:CVE-2013-2147 UBUNTU:CVE-2013-4299 UBUNTU:CVE-2013-6382 UBUNTU:CVE-2014-0101 UBUNTU:CVE-2014-1444 UBUNTU:CVE-2014-1445 UBUNTU:CVE-2014-1446 UBUNTU:CVE-2014-1874 UBUNTU:USN-1994-1 UBUNTU:USN-1996-1 UBUNTU:USN-1997-1 UBUNTU:USN-1999-1 UBUNTU:USN-2015-1 UBUNTU:USN-2016-1 UBUNTU:USN-2040-1 UBUNTU:USN-2041-1 UBUNTU:USN-2042-1 UBUNTU:USN-2043-1 UBUNTU:USN-2044-1 UBUNTU:USN-2045-1 UBUNTU:USN-2046-1 UBUNTU:USN-2066-1 UBUNTU:USN-2067-1 UBUNTU:USN-2109-1 UBUNTU:USN-2110-1 UBUNTU:USN-2128-1 UBUNTU:USN-2129-1 UBUNTU:USN-2133-1 UBUNTU:USN-2134-1 UBUNTU:USN-2135-1 UBUNTU:USN-2136-1 UBUNTU:USN-2137-1 UBUNTU:USN-2138-1 UBUNTU:USN-2139-1 UBUNTU:USN-2140-1 UBUNTU:USN-2141-1 UBUNTU:USN-2173-1 UBUNTU:USN-2174-1 XF:linux-kernel-cve20141444-info-disc(90443) XF:linux-kernel-cve20141445-info-disc(90444) XF:linux-kernel-cve20141446-info-disc(90445) bnc#823260 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2172fa709ab32ca60e86179dc67d0857be8e2c98 linux.git:commit:58f09e00ae095e46ef9edfcf3a5fd9ccdfad065e linux.git:commit:627aad1c01da6f881e7f98d71fd928ca0c316b1a linux.git:commit:e9c6a182649f4259db704ae15a91ac820e63b0ca rh#1004233 rh#1007690 rh#1033603 rh#1053610 rh#1053613 rh#1053620 rh#1062356 rh#1067558 rh#1070705 rh#1094232 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#971242 |
CVE-2014-1690 | kernel-source-rt:Unsupported | low | () | CONFIRM:git.kernel.org:CVE-2014-1690 CONFIRM:github.com:CVE-2014-1690 CONFIRM:www.kernel.org:CVE-2014-1690 CVE-2014-1690 D:CVE-2014-1690 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MLIST:[oss-security] 20140128 Re: CVE request Linux kernel: netfilter: nf_nat: leakage of uninitialized buffer in IRC NAT helper OSS:11935 RH:CVE-2014-1690 RHSA-2014:0439 SMASH Issue 95732 UBUNTU:CVE-2014-1690 UBUNTU:USN-2137-1 UBUNTU:USN-2140-1 UBUNTU:USN-2158-1 bnc#860835 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2690d97ade05c5325cbf7c72b94b90d265659886 rh#1058748 rh#1094232 |
CVE-2014-1692 | openssh:Unsupported | important | () | BID:65230 CONFIRM:www-01.ibm.com:CVE-2014-1692 CVE-2014-1692 D:CVE-2014-1692 HP:HPSBMU03409 HP:SSRT101487 MISC:www.openbsd.org:CVE-2014-1692 MLIST:[oss-security] 20140128 OpenSSH J-PAKE vulnerability (no cause for panic! remain calm!) MLIST:[oss-security] 20140129 Re: OpenSSH J-PAKE vulnerability (no cause for panic! remain calm!) OSS:2015/Q2/563 OSVDB:102611 RH:CVE-2014-1692 SECUNIA:60184 SMASH Issue 95805 UBUNTU:CVE-2014-1692 XF:openssh-cve20141692-code-exec(90819) bnc#861566 http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/Attic/schnorr.c.diff?r1=1.9%3Br2=1.10%3Bf=h rh#1059052 |
CVE-2014-1737 | kernel-source-rt:Not affected | important | () | BID:67300 BID:67302 CONFIRM:git.kernel.org:CVE-2014-1737 CONFIRM:git.kernel.org:CVE-2014-1738 CONFIRM:github.com:CVE-2014-1737 CONFIRM:github.com:CVE-2014-1738 CONFIRM:linux.oracle.com:CVE-2014-1874 CONFIRM:linux.oracle.com:CVE-2014-3153 CVE-2014-1737 CVE-2014-1738 D:CVE-2014-1738 DSA-2926 DSA-2928 L3:40865 MLIST:[oss-security] 20140509 Linux kernel floppy ioctl kernel code execution RH:CVE-2014-1737 RH:CVE-2014-1738 RHSA-2014:0557 RHSA-2014:0740 RHSA-2014:0771 RHSA-2014:0772 RHSA-2014:0786 RHSA-2014:0800 RHSA-2014:0801 RHSA-2014:0900 SECTRACK:1030474 SECUNIA:59262 SECUNIA:59309 SECUNIA:59406 SECUNIA:59599 SMASH Issue 98430 SUSE:SUSE-SU-2014:0667 SUSE:SUSE-SU-2014:0683 UBUNTU:CVE-2014-1737 UBUNTU:CVE-2014-1738 bnc#875798 bnc#877345 bnc#878696 http://www.debian.org/security/2014/dsa-2926 http://www.debian.org/security/2014/dsa-2928 rh#1007690 rh#1067558 rh#1094232 rh#1094299 |
CVE-2014-1738 | kernel-source-rt:Not affected | important | () | BID:67300 BID:67302 CONFIRM:git.kernel.org:CVE-2014-1737 CONFIRM:git.kernel.org:CVE-2014-1738 CONFIRM:github.com:CVE-2014-1737 CONFIRM:github.com:CVE-2014-1738 CONFIRM:linux.oracle.com:CVE-2014-1874 CONFIRM:linux.oracle.com:CVE-2014-3153 CVE-2014-1737 CVE-2014-1738 D:CVE-2014-1738 DSA-2926 DSA-2928 L3:40865 MLIST:[oss-security] 20140509 Linux kernel floppy ioctl kernel code execution RH:CVE-2014-1737 RH:CVE-2014-1738 RHSA-2014:0557 RHSA-2014:0740 RHSA-2014:0771 RHSA-2014:0772 RHSA-2014:0786 RHSA-2014:0800 RHSA-2014:0801 RHSA-2014:0900 SECTRACK:1030474 SECUNIA:59262 SECUNIA:59309 SECUNIA:59406 SECUNIA:59599 SMASH Issue 98430 SUSE:SUSE-SU-2014:0667 SUSE:SUSE-SU-2014:0683 UBUNTU:CVE-2014-1737 UBUNTU:CVE-2014-1738 bnc#875798 bnc#877345 bnc#878696 http://www.debian.org/security/2014/dsa-2926 http://www.debian.org/security/2014/dsa-2928 rh#1007690 rh#1067558 rh#1094232 rh#1094299 |
CVE-2014-1874 | kernel-source-rt:Already fixed | moderate | () | BID:63889 BID:64952 BID:64953 BID:64954 BID:65459 BID:65943 CONFIRM:git.kernel.org:CVE-2014-0101 CONFIRM:git.kernel.org:CVE-2014-1874 CONFIRM:github.com:CVE-2014-0101 CONFIRM:github.com:CVE-2014-1874 CONFIRM:linux.oracle.com:CVE-2014-1874 CONFIRM:linux.oracle.com:CVE-2014-3153 CONFIRM:support.f5.com:CVE-2014-0101 CONFIRM:www.kernel.org:CVE-2014-1874 CVE-2013-2147 CVE-2013-4299 CVE-2013-6382 CVE-2014-0101 CVE-2014-1444 CVE-2014-1445 CVE-2014-1446 CVE-2014-1874 CVE-2023-2002 DSA-2906 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:/ MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[linux-kernel] 20130603 [patch] cciss: info leak in cciss_ioctl32_passthru() MLIST:[linux-kernel] 20130603 [patch] cpqarray: info leak in ida_locked_ioctl() MLIST:[oss-security] 20130605 Re: CVE request: kernel: cpqarray/c: info leak in ida_locked_ioctl() MLIST:[oss-security] 20140115 Re: CVE request: assorted kernel infoleak security fixes MLIST:[oss-security] 20140206 Re: CVE Request: Linux kernel: SELinux local DoS MLIST:[oss-security] 20140304 CVE-2014-0101 -- Linux kernel: net: sctp: null pointer dereference when processing authenticated cookie_echo chunk MLIST:[xfs] 20131031 [patch] xfs: underflow bug in xfs_attrlist_by_handle() OSS:12052 OSS:2023/04/16/3 RH:CVE-2013-2147 RH:CVE-2013-4299 RH:CVE-2013-6382 RH:CVE-2014-0101 RH:CVE-2014-1444 RH:CVE-2014-1445 RH:CVE-2014-1446 RH:CVE-2014-1874 RHSA-2013:1166 RHSA-2013:1264 RHSA-2013:1436 RHSA-2013:1449 RHSA-2013:1450 RHSA-2013:1460 RHSA-2013:1490 RHSA-2013:1519 RHSA-2013:1520 RHSA-2013:1783 RHSA-2013:1860 RHSA-2014:0328 RHSA-2014:0419 RHSA-2014:0432 RHSA-2014:0439 RHSA-2014:0520 RHSA-2014:0771 SECUNIA:59216 SECUNIA:59262 SECUNIA:59309 SECUNIA:59406 SMASH Issue 54969 SUSE:SUSE-SU-2015:0812 UBUNTU:CVE-2013-2147 UBUNTU:CVE-2013-4299 UBUNTU:CVE-2013-6382 UBUNTU:CVE-2014-0101 UBUNTU:CVE-2014-1444 UBUNTU:CVE-2014-1445 UBUNTU:CVE-2014-1446 UBUNTU:CVE-2014-1874 UBUNTU:USN-1994-1 UBUNTU:USN-1996-1 UBUNTU:USN-1997-1 UBUNTU:USN-1999-1 UBUNTU:USN-2015-1 UBUNTU:USN-2016-1 UBUNTU:USN-2040-1 UBUNTU:USN-2041-1 UBUNTU:USN-2042-1 UBUNTU:USN-2043-1 UBUNTU:USN-2044-1 UBUNTU:USN-2045-1 UBUNTU:USN-2046-1 UBUNTU:USN-2066-1 UBUNTU:USN-2067-1 UBUNTU:USN-2109-1 UBUNTU:USN-2110-1 UBUNTU:USN-2128-1 UBUNTU:USN-2129-1 UBUNTU:USN-2133-1 UBUNTU:USN-2134-1 UBUNTU:USN-2135-1 UBUNTU:USN-2136-1 UBUNTU:USN-2137-1 UBUNTU:USN-2138-1 UBUNTU:USN-2139-1 UBUNTU:USN-2140-1 UBUNTU:USN-2141-1 UBUNTU:USN-2173-1 UBUNTU:USN-2174-1 XF:linux-kernel-cve20141444-info-disc(90443) XF:linux-kernel-cve20141445-info-disc(90444) XF:linux-kernel-cve20141446-info-disc(90445) bnc#823260 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2172fa709ab32ca60e86179dc67d0857be8e2c98 linux.git:commit:58f09e00ae095e46ef9edfcf3a5fd9ccdfad065e linux.git:commit:627aad1c01da6f881e7f98d71fd928ca0c316b1a linux.git:commit:e9c6a182649f4259db704ae15a91ac820e63b0ca rh#1004233 rh#1007690 rh#1033603 rh#1053610 rh#1053613 rh#1053620 rh#1062356 rh#1067558 rh#1070705 rh#1094232 rh#742846 rh#822754 rh#916646 rh#917012 rh#917013 rh#917017 rh#971242 |
CVE-2014-1959 | gnutls:Unsupported | moderate | () | BID:65559 CONFIRM:www.gitorious.org:CVE-2014-1959 CONFIRM:www.gnutls.org:CVE-2015-0282 CVE-2014-1959 D:CVE-2014-1959 DSA-2866 MISC:www.gitorious.org MLIST:[oss-security] 20140213 CVE Request - GnuTLS corrects flaw in certificate verification (3.1.x/3.2.x) MLIST:[oss-security] 20140213 Re: CVE Request - GnuTLS corrects flaw in certificate verification (3.1.x/3.2.x) OSS:12127 RH:CVE-2014-1959 RHSA-2014:0247 SMASH Issue 96187 UBUNTU:CVE-2014-1959 UBUNTU:USN-2121-1 bnc#863989 rh#1065092 rh#1069301 |
CVE-2014-2038 | kernel-source-rt:Unsupported | low | () | CONFIRM:git.kernel.org:CVE-2014-2038 CONFIRM:github.com:CVE-2014-2038 CONFIRM:www.kernel.org:CVE-2014-2038 CVE-2014-2038 D:CVE-2014-2038 MLIST:[oss-security] 20140221 Re: Re: CVE request: Linux kernel: nfs: information leakage OSS:12189 RH:CVE-2014-2038 RHSA-2014:0328 SMASH Issue 96467 UBUNTU:CVE-2014-2038 UBUNTU:USN-2137-1 UBUNTU:USN-2140-1 bnc#865075 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=263b4509ec4d47e0da3e753f85a39ea12d1eff24 rh#1066939 rh#1067341 rh#1094232 |
CVE-2014-2039 | kernel-source-rt:Not affected | moderate | () | BID:65700 CONFIRM:git.kernel.org:CVE-2014-2039 CONFIRM:github.com:CVE-2014-2039 CONFIRM:linux.oracle.com:CVE-2014-3153 CONFIRM:www.kernel.org:CVE-2014-8709 CVE-2014-2039 D:CVE-2014-2039 DSA-2906 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MLIST:[oss-security] 20140220 Re: CVE Request: Linux kernel: s390: crash due to linkage stack instruction RH:CVE-2014-2039 RHSA-2014:0771 SECUNIA:59262 SECUNIA:59309 SMASH Issue 96532 UBUNTU:CVE-2014-2039 bnc#862796 bnc#865307 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8d7f6690cedb83456edd41c9bd583783f0703bf0 rh#1007690 rh#1067558 rh#1094232 |
CVE-2014-2309 | kernel-source-rt:Not affected | important | () | BID:64111 BID:66095 BID:66779 BID:67162 BID:67309 BID:67321 BID:68214 CONFIRM:git.kernel.org:CVE-2013-2929 CONFIRM:git.kernel.org:CVE-2013-4299 CONFIRM:git.kernel.org:CVE-2014-0101 CONFIRM:git.kernel.org:CVE-2014-0131 CONFIRM:git.kernel.org:CVE-2014-0155 CONFIRM:git.kernel.org:CVE-2014-1444 CONFIRM:git.kernel.org:CVE-2014-1445 CONFIRM:git.kernel.org:CVE-2014-1446 CONFIRM:git.kernel.org:CVE-2014-1874 CONFIRM:git.kernel.org:CVE-2014-2309 CONFIRM:git.kernel.org:CVE-2014-2851 CONFIRM:git.kernel.org:CVE-2014-3122 CONFIRM:git.kernel.org:CVE-2014-3145 CONFIRM:git.kernel.org:CVE-2014-4608 CONFIRM:github.com:CVE-2014-0131 CONFIRM:github.com:CVE-2014-4608 CONFIRM:www.kernel.org:CVE-2014-9914 CVE-2014-0131 CVE-2014-2309 CVE-2014-2851 CVE-2014-3145 CVE-2014-4608 CVE-2023-2002 L3:41261 MISC:blog.securitymouse.com:CVE-2014-4611 MISC:git.kernel.org MISC:git.kernel.org:MLIST:[oss-security] 20140307 Re: CVE Request: Linux kernel: IPv6: crash due to router advertisement flooding MISC:git.kernel.org:MLIST:[oss-security] 20140407 CVE-2014-0155 -- kernel: kvm: BUG caused by invalid entry in guest ioapic redirection table MISC:git.kernel.org:MLIST:[oss-security] 20140509 Re: CVE request Linux kernel: filter: prevent nla extensions to peek beyond the end of the message MISC:git.kernel.org:OSS:2023/04/16/3 MISC:patchwork.ozlabs.org:MLIST:[oss-security] 20140307 Re: CVE Request: Linux kernel: IPv6: crash due to router advertisement flooding MISC:www.oberhumer.com:CVE-2014-4608 MISC:www.openwall.com:MLIST:[oss-security] 20140307 Re: CVE Request: Linux kernel: IPv6: crash due to router advertisement flooding MISC:www.securitymouse.com:CVE-2014-4608 MLIST:[linux-kernel] 20140411 net: ipv4: current group_info should be put after using. MLIST:[netdev] 20140310 [PATCH 0/5] skbuff: fix skb_segment with zero copy skbs MLIST:[netdev] 20140310 [PATCH 5/5] skbuff: skb_segment: orphan frags before copying MLIST:[oss-security] 20140307 Re: CVE Request: Linux kernel: IPv6: crash due to router advertisement flooding MLIST:[oss-security] 20140310 CVE-2014-0131 -- kernel: net: use-after-free during segmentation with zerocopy MLIST:[oss-security] 20140407 CVE-2014-0155 -- kernel: kvm: BUG caused by invalid entry in guest ioapic redirection table MLIST:[oss-security] 20140411 Re: CVE request -- Linux kernel: net: ping: refcount issue in ping_init_sock() function MLIST:[oss-security] 20140430 Re: CVE request Linux kernel: mm: try_to_unmap_cluster() should lock_page() before mlocking MLIST:[oss-security] 20140509 Re: CVE request Linux kernel: filter: prevent nla extensions to peek beyond the end of the message MLIST:[oss-security] 20140626 LMS-2014-06-16-2: Linux Kernel LZO OSS:12309 OSS:2023/04/16/3 RH:CVE-2014-0131 RH:CVE-2014-2309 RH:CVE-2014-2851 RH:CVE-2014-3122 RH:CVE-2014-4608 RHSA-2014:0100 RHSA-2014:0159 RHSA-2014:0285 RHSA-2014:0439 RHSA-2014:0557 RHSA-2014:0786 RHSA-2014:0981 RHSA-2014:1101 RHSA-2014:1392 RHSA-2015:0062 RHSA-2018:1252 SECTRACK:1029894 SECTRACK:1030769 SECUNIA:57250 SECUNIA:59311 SECUNIA:60011 SECUNIA:60174 SECUNIA:62633 SMASH Issue 103001 SMASH Issue 240292 SMASH Issue 55713 SUSE:SUSE-SU-2015:0481 SUSE:SUSE-SU-2015:0736 SUSE:openSUSE-SU-2015:0566 UBUNTU:CVE-2014-0131 UBUNTU:CVE-2014-2309 UBUNTU:CVE-2014-4608 UBUNTU:USN-2070-1 UBUNTU:USN-2075-1 UBUNTU:USN-2109-1 UBUNTU:USN-2110-1 UBUNTU:USN-2111-1 UBUNTU:USN-2112-1 UBUNTU:USN-2114-1 UBUNTU:USN-2115-1 UBUNTU:USN-2116-1 UBUNTU:USN-2128-1 UBUNTU:USN-2129-1 UBUNTU:USN-2251-1 UBUNTU:USN-2252-1 UBUNTU:USN-2262-1 UBUNTU:USN-2416-1 UBUNTU:USN-2417-1 UBUNTU:USN-2418-1 UBUNTU:USN-2419-1 UBUNTU:USN-2420-1 UBUNTU:USN-2421-1 bnc#867531 bnc#889071 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1fd819ecb90cc9b822cd84d3056ddba315d3340f http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=206a81c18401c0cde6e579164f752c4b147324ce rh#1070618 rh#1074471 rh#1074589 rh#1081589 rh#1086730 rh#1113899 rh#1163762 rh#822754 |
CVE-2014-2523 | kernel-source-rt:Already fixed | critical | () | BID:66279 CONFIRM:git.kernel.org:CVE-2014-2523 CONFIRM:github.com:CVE-2014-2523 CVE-2014-2523 DSA-2906 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:MLIST:[oss-security] 20140317 Re: CVE Request: netfilter: remote memory corruption in nf_conntrack_proto_dccp.c MISC:twitter.com:CVE-2014-2523 MLIST:[oss-security] 20140317 Re: CVE Request: netfilter: remote memory corruption in nf_conntrack_proto_dccp.c RH:CVE-2014-2523 RHSA-2014:0439 RHSA-2014:0475 RHSA-2014:0520 RHSA-2014:0593 RHSA-2014:0634 SECTRACK:1029945 SECUNIA:57446 SMASH Issue 97432 UBUNTU:CVE-2014-2523 UBUNTU:USN-2173-1 UBUNTU:USN-2174-1 XF:linux-kernel-cve20142523-code-exec(91910) bnc#868653 rh#1007690 rh#1067558 rh#1077343 rh#1094232 rh#822754 |
CVE-2014-2524 | bash:Unsupported, crash:Released | low | () | CONFIRM:advisories.mageia.org:CVE-2014-2524 CVE-2014-2524 D:CVE-2014-2524 FEDORA:FEDORA-2014-7523 MANDRIVA:MDVSA-2014:154 MANDRIVA:MDVSA-2015:132 MISC:gitlab.com MLIST:[Bug-readline] 20140331 Readline-6.3 Official Patch 3 MLIST:[oss-security] 20140314 Insecure usage of temporary files in GNU Readline MLIST:[oss-security] 20140317 Re: Insecure usage of temporary files in GNU Readline OSS:12364 RH:CVE-2014-2524 SMASH Issue 97089 SUSE:openSUSE-SU-2014:1226 UBUNTU:CVE-2014-2524 bnc#868822 rh#1077023 rh#1141597 rh#1146319 |
CVE-2014-2568 | kernel-source-rt:Unsupported | low | () | BID:66348 CVE-2014-2568 D:CVE-2014-2568 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MLIST:[linux-kernel] 20140320 [PATCH v3] core, nfqueue, openvswitch: Orphan frags in skb_zerocopy and handle errors MLIST:[oss-sec] 20140320 CVE request -- kernel: net: potential information leak when ubuf backed skbs are skb_zerocopy()ied MLIST:[oss-security] 20140320 Re: CVE request -- kernel: net: potential information leak when ubuf backed skbs are skb_zerocopy()ied OSS:2023/10/10/4 Oracle:CVE-2015-6937 RH:CVE-2014-2568 RHSA-2014:0786 SECUNIA:59599 SMASH Issue 97169 SMASH Issue 97349 SMASH Issue 97435 UBUNTU:CVE-2014-2568 UBUNTU:USN-2240-1 XF:linux-kernel-cve20142568-info-disclosure(91922) bnc#869564 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 rh#1079012 rh#2162080 rh#2162082 rh#2162084 rh#2162087 |
CVE-2014-2580 | kernel-source-rt:Unsupported | moderate | () | BID:66386 CONFIRM:xenbits.xen.org:CVE-2014-2580 CVE-2014-2580 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:lists.xen.org:MLIST:[oss-security] 20140324 Re: Xen Security Advisory 90 - Linux netback crash trying to disable due to malformed packet MLIST:[oss-security] 20140324 Re: Xen Security Advisory 90 - Linux netback crash trying to disable due to malformed packet MLIST:[oss-security] 20140324 Xen Security Advisory 90 - Linux netback crash trying to disable due to malformed packet OSS:12431 RH:CVE-2014-2580 SECTRACK:1029949 SMASH Issue 97282 SMASH Issue 98014 UBUNTU:CVE-2014-2580 bnc#869925 rh#1080084 |
CVE-2014-2672 | kernel-source-rt:Not affected | important | () | BID:66492 CONFIRM:bugzilla.kernel.org:CVE-2014-2706 CONFIRM:git.kernel.org:CVE-2014-2672 CONFIRM:github.com:CVE-2014-2672 CONFIRM:www.kernel.org:CVE-2014-2673 CONFIRM:www.kernel.org:CVE-2014-2706 CVE-2014-2672 D:CVE-2014-2672 MLIST:[oss-security] 20140330 Re: CVE request: Linux Kernel, two security issues RH:CVE-2014-2672 RHSA-2014:0557 RHSA-2014:0981 RHSA-2014:1023 RHSA-2014:1101 SECUNIA:57468 SMASH Issue 97504 UBUNTU:CVE-2014-2672 bnc#871148 rh#1083246 rh#1094232 |
CVE-2014-2673 | kernel-source-rt:Unsupported | moderate | () | BID:66477 CONFIRM:git.kernel.org:CVE-2014-2673 CONFIRM:github.com:CVE-2014-2673 CONFIRM:www.kernel.org:CVE-2014-2673 CONFIRM:www.kernel.org:CVE-2014-2706 CVE-2014-2673 D:CVE-2014-2673 MLIST:[oss-security] 20140330 Re: CVE request: Linux Kernel, two security issues RH:CVE-2014-2673 RHSA-2014:1023 SECUNIA:57436 SMASH Issue 97505 UBUNTU:CVE-2014-2673 XF:linux-kernel-cve20142673-dos(92113) bnc#871149 rh#1083213 |
CVE-2014-2678 | kernel-source-rt:Not affected | moderate | () | BID:66543 CONFIRM:linux.oracle.com:CVE-2014-4021 CVE-2014-2678 FEDORA:FEDORA-2014-4844 MLIST:[linux-kernel] 20140329 [PATCH v2] rds: prevent dereference of a NULL device in rds_iw_laddr_check MLIST:[oss-security] 20140331 CVE-2013-7348 CVE-2014-2678 Linux kernel aio and rds issues RH:CVE-2014-2678 RHSA-2014:0557 RHSA-2014:0926 RHSA-2014:0981 RHSA-2014:1101 SECUNIA:59386 SECUNIA:60130 SECUNIA:60471 SMASH Issue 103065 UBUNTU:CVE-2014-2678 bnc#871561 rh#1007690 rh#1067558 rh#1083274 rh#1094232 rh#822754 |
CVE-2014-2706 | kernel-source-rt:Not affected | important | () | BID:66591 CONFIRM:bugzilla.kernel.org:CVE-2014-2706 CONFIRM:git.kernel.org:CVE-2014-2706 CONFIRM:github.com:CVE-2014-2706 CONFIRM:linux.oracle.com:CVE-2014-3145 CONFIRM:source.android.com:CVE-2017-6426 CONFIRM:www.kernel.org:CVE-2014-2706 CVE-2014-2706 D:CVE-2014-2706 MLIST:[oss-security] 20140401 Re: CVE request: Linux Kernel, two security issues RH:CVE-2014-2706 RHSA-2014:0557 RHSA-2014:0981 RHSA-2014:1023 RHSA-2014:1101 SECTRACK:1038201 SECUNIA:60613 SMASH Issue 97565 SMASH Issue 97880 SUSE:SUSE-SU-2014:1316 SUSE:SUSE-SU-2014:1319 UBUNTU:CVE-2014-2706 bnc#871797 rh#1083512 |
CVE-2014-2739 | kernel-source-rt:Unsupported | moderate | () | BID:66716 CONFIRM:git.kernel.org:CVE-2014-2739 CONFIRM:github.com:CVE-2014-2739 CVE-2014-2739 D:CVE-2014-2739 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:MLIST:[oss-security] 20140410 Re: CVE request Linux kernel: IB/core: crash while resolving passive side RoCE L2 address in cma_req_handler MISC:patchwork.kernel.org:MLIST:[oss-security] 20140410 Re: CVE request Linux kernel: IB/core: crash while resolving passive side RoCE L2 address in cma_req_handler MLIST:[oss-security] 20140410 Re: CVE request Linux kernel: IB/core: crash while resolving passive side RoCE L2 address in cma_req_handler RH:CVE-2014-2739 SMASH Issue 97770 UBUNTU:CVE-2014-2739 bnc#873128 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b2853fd6c2d0f383dbdf7427e263eb576a633867 rh#1085415 |
CVE-2014-2855 | rsync:Unsupported | important | () | CONFIRM:advisories.mageia.org:CVE-2014-2855 CONFIRM:bugs.launchpad.net:CVE-2014-2855 CONFIRM:bugzilla.samba.org:CVE-2014-2855 CONFIRM:git.samba.org:CVE-2014-2855 CVE-2014-2855 FEDORA:FEDORA-2014-5315 MANDRIVA:MDVSA-2015:131 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.samba.org:MLIST:[oss-security] 20140414 CVE Request: rsync denial of service MLIST:[oss-security] 20140414 CVE Request: rsync denial of service MLIST:[oss-security] 20140415 Re: CVE Request: rsync denial of service RH:CVE-2014-2855 SECUNIA:57948 SMASH Issue 97899 SUSE:openSUSE-SU-2014:0595 UBUNTU:CVE-2014-2855 UBUNTU:USN-2171-1 bnc#873740 rh#1087841 |
CVE-2014-3122 | kernel-source-rt:Not affected | moderate | () | BID:67162 CONFIRM:git.kernel.org:CVE-2014-3122 CONFIRM:github.com:CVE-2014-3122 CONFIRM:www.kernel.org:CVE-2014-3122 CVE-2014-3122 DSA-2926 MLIST:[oss-security] 20140430 Re: CVE request Linux kernel: mm: try_to_unmap_cluster() should lock_page() before mlocking RH:CVE-2014-3122 RHSA-2014:0557 RHSA-2014:1392 SECUNIA:59386 SECUNIA:59599 SMASH Issue 103039 SMASH Issue 240295 UBUNTU:CVE-2014-3122 UBUNTU:USN-2240-1 bnc#876102 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=57e68e9cd65b4b8eb4045a1e0d0746458502554c http://www.debian.org/security/2014/dsa-2926 rh#1007690 rh#1067558 rh#1093076 rh#1094232 rh#822754 |
CVE-2014-3144 | kernel-source-rt:Not affected | moderate | () | BID:67309 BID:67321 CONFIRM:github.com:CVE-2014-3145 CONFIRM:linux.oracle.com:CVE-2014-3145 CONFIRM:source.android.com:CVE-2017-6426 CVE-2014-3144 CVE-2014-3145 L3:41071 MLIST:[oss-security] 20140509 Re: CVE request Linux kernel: filter: prevent nla extensions to peek beyond the end of the message RH:CVE-2014-3144 RH:CVE-2014-3145 RHSA-2014:0786 RHSA-2014:0913 RHSA-2014:0981 SECTRACK:1038201 SECUNIA:59311 SECUNIA:60613 SMASH Issue 103018 SMASH Issue 103078 SMASH Issue 240298 UBUNTU:CVE-2014-3144 UBUNTU:CVE-2014-3145 UBUNTU:USN-2251-1 UBUNTU:USN-2252-1 UBUNTU:USN-2259-1 UBUNTU:USN-2261-1 UBUNTU:USN-2262-1 UBUNTU:USN-2263-1 UBUNTU:USN-2264-1 bnc#877257 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=05ab8f2647e4221cbdb3856dd7d32bd5407316b3 http://www.debian.org/security/2014/dsa-2949 rh#1096775 rh#822754 |
CVE-2014-3145 | kernel-source-rt:Not affected | important | () | BID:64111 BID:66095 BID:66779 BID:67162 BID:67309 BID:67321 BID:68214 CONFIRM:git.kernel.org:CVE-2013-2929 CONFIRM:git.kernel.org:CVE-2013-4299 CONFIRM:git.kernel.org:CVE-2014-0101 CONFIRM:git.kernel.org:CVE-2014-0131 CONFIRM:git.kernel.org:CVE-2014-0155 CONFIRM:git.kernel.org:CVE-2014-1444 CONFIRM:git.kernel.org:CVE-2014-1445 CONFIRM:git.kernel.org:CVE-2014-1446 CONFIRM:git.kernel.org:CVE-2014-1874 CONFIRM:git.kernel.org:CVE-2014-2309 CONFIRM:git.kernel.org:CVE-2014-2851 CONFIRM:git.kernel.org:CVE-2014-3122 CONFIRM:git.kernel.org:CVE-2014-3145 CONFIRM:git.kernel.org:CVE-2014-4608 CONFIRM:github.com:CVE-2014-0131 CONFIRM:github.com:CVE-2014-3145 CONFIRM:github.com:CVE-2014-4608 CONFIRM:linux.oracle.com:CVE-2014-3145 CONFIRM:source.android.com:CVE-2017-6426 CONFIRM:www.kernel.org:CVE-2014-9914 CVE-2014-0131 CVE-2014-2309 CVE-2014-2851 CVE-2014-3144 CVE-2014-3145 CVE-2014-4608 L3:41071 L3:41261 MISC:blog.securitymouse.com:CVE-2014-4611 MISC:git.kernel.org:MLIST:[oss-security] 20140407 CVE-2014-0155 -- kernel: kvm: BUG caused by invalid entry in guest ioapic redirection table MISC:git.kernel.org:MLIST:[oss-security] 20140509 Re: CVE request Linux kernel: filter: prevent nla extensions to peek beyond the end of the message MISC:www.oberhumer.com:CVE-2014-4608 MISC:www.openwall.com:MLIST:[oss-security] 20140307 Re: CVE Request: Linux kernel: IPv6: crash due to router advertisement flooding MISC:www.securitymouse.com:CVE-2014-4608 MLIST:[linux-kernel] 20140411 net: ipv4: current group_info should be put after using. MLIST:[netdev] 20140310 [PATCH 0/5] skbuff: fix skb_segment with zero copy skbs MLIST:[netdev] 20140310 [PATCH 5/5] skbuff: skb_segment: orphan frags before copying MLIST:[oss-security] 20140307 Re: CVE Request: Linux kernel: IPv6: crash due to router advertisement flooding MLIST:[oss-security] 20140310 CVE-2014-0131 -- kernel: net: use-after-free during segmentation with zerocopy MLIST:[oss-security] 20140407 CVE-2014-0155 -- kernel: kvm: BUG caused by invalid entry in guest ioapic redirection table MLIST:[oss-security] 20140411 Re: CVE request -- Linux kernel: net: ping: refcount issue in ping_init_sock() function MLIST:[oss-security] 20140430 Re: CVE request Linux kernel: mm: try_to_unmap_cluster() should lock_page() before mlocking MLIST:[oss-security] 20140509 Re: CVE request Linux kernel: filter: prevent nla extensions to peek beyond the end of the message MLIST:[oss-security] 20140626 LMS-2014-06-16-2: Linux Kernel LZO RH:CVE-2014-0131 RH:CVE-2014-2309 RH:CVE-2014-2851 RH:CVE-2014-3122 RH:CVE-2014-3144 RH:CVE-2014-3145 RH:CVE-2014-4608 RHSA-2014:0100 RHSA-2014:0159 RHSA-2014:0285 RHSA-2014:0439 RHSA-2014:0557 RHSA-2014:0786 RHSA-2014:0913 RHSA-2014:0981 RHSA-2014:1101 RHSA-2014:1392 RHSA-2015:0062 RHSA-2018:1252 SECTRACK:1029894 SECTRACK:1030769 SECTRACK:1038201 SECUNIA:59311 SECUNIA:60011 SECUNIA:60174 SECUNIA:60613 SECUNIA:62633 SMASH Issue 103018 SMASH Issue 103080 SMASH Issue 240299 SMASH Issue 55713 SUSE:SUSE-SU-2015:0481 SUSE:SUSE-SU-2015:0736 SUSE:openSUSE-SU-2015:0566 UBUNTU:CVE-2014-0131 UBUNTU:CVE-2014-3144 UBUNTU:CVE-2014-3145 UBUNTU:CVE-2014-4608 UBUNTU:USN-2070-1 UBUNTU:USN-2075-1 UBUNTU:USN-2109-1 UBUNTU:USN-2110-1 UBUNTU:USN-2111-1 UBUNTU:USN-2112-1 UBUNTU:USN-2114-1 UBUNTU:USN-2115-1 UBUNTU:USN-2116-1 UBUNTU:USN-2128-1 UBUNTU:USN-2129-1 UBUNTU:USN-2251-1 UBUNTU:USN-2252-1 UBUNTU:USN-2259-1 UBUNTU:USN-2261-1 UBUNTU:USN-2262-1 UBUNTU:USN-2263-1 UBUNTU:USN-2264-1 UBUNTU:USN-2416-1 UBUNTU:USN-2417-1 UBUNTU:USN-2418-1 UBUNTU:USN-2419-1 UBUNTU:USN-2420-1 UBUNTU:USN-2421-1 bnc#877257 bnc#889071 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=05ab8f2647e4221cbdb3856dd7d32bd5407316b3 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1fd819ecb90cc9b822cd84d3056ddba315d3340f http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=206a81c18401c0cde6e579164f752c4b147324ce http://www.debian.org/security/2014/dsa-2949 rh#1074589 rh#1081589 rh#1086730 rh#1096775 rh#1113899 rh#822754 |
CVE-2014-3153 | kernel-source-rt:Not affected | important | () | BID:67906 CONFIRM:git.kernel.org:CVE-2014-3153 CONFIRM:linux.oracle.com:CVE-2014-3153 CVE-2014-3153 CVE-2023-2002 D:CVE-2014-3153 DSA-2949 EXPLOIT-DB:35370 L3:41048 L3:41049 MISC:elongl.github.io:MISC:www.openwall.com:CVE-2014-3153 MISC:git.kernel.org:OSS:2023/04/16/3 MISC:github.com:MISC:www.openwall.com:CVE-2014-3153 MISC:lists.debian.org:MLIST:[oss-security] 20140605 Linux kernel futex local privilege escalation (CVE-2014-3153) MISC:www.openwall.com:CVE-2014-3153 MLIST:[oss-security] 20140605 Linux kernel futex local privilege escalation (CVE-2014-3153) MLIST:[oss-security] 20140605 Re: Linux kernel futex local privilege escalation (CVE-2014-3153) MLIST:[oss-security] 20140606 Re: Linux kernel futex local privilege escalation (CVE-2014-3153) MLIST:[oss-security] 20210201 Re: Linux Kernel: local priv escalation via futexes OSS:2021/Q1/95 OSS:2023/04/16/3 RH:CVE-2014-3153 RHSA-2014:0771 RHSA-2014:0786 RHSA-2014:0800 RHSA-2014:0900 RHSA-2014:0913 SECTRACK:1030451 SECUNIA:58500 SECUNIA:58990 SECUNIA:59029 SECUNIA:59092 SECUNIA:59153 SECUNIA:59262 SECUNIA:59309 SECUNIA:59386 SECUNIA:59599 SMASH Issue 99230 SUSE:SUSE-SU-2014:0775 SUSE:SUSE-SU-2014:0796 SUSE:SUSE-SU-2014:0837 SUSE:SUSE-SU-2014:1316 SUSE:SUSE-SU-2014:1319 SUSE:openSUSE-SU-2014:0878 UBUNTU:CVE-2014-3153 UBUNTU:USN-2237-1 UBUNTU:USN-2240-1 bnc#880892 bnc#882228 http://www.debian.org/security/2014/dsa-2949 linux.git:commit:e9c243a5a6de0be8e584c604d353412584b592f8 rh#1094232 rh#1103626 rh#1113899 rh#1163762 |
CVE-2014-3181 | kernel-source-rt:Not affected | moderate | () | BID:69779 CONFIRM:git.kernel.org:CVE-2014-3181 CONFIRM:github.com:CVE-2014-3181 CVE-2014-3181 CVE-2023-2002 MISC:code.google.com:CVE-2014-3181 MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[oss-security] 20140911 Multiple Linux USB driver CVE assignment OSS:2023/04/16/3 RH:CVE-2014-3181 RHSA-2014:1318 RHSA-2014:1971 SMASH Issue 106132 SUSE:SUSE-SU-2015:0481 SUSE:openSUSE-SU-2015:0566 UBUNTU:CVE-2014-3181 UBUNTU:USN-2376-1 UBUNTU:USN-2377-1 UBUNTU:USN-2378-1 UBUNTU:USN-2379-1 bnc#896382 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c54def7bd64d7c0b6993336abcffb8444795bf38 rh#1113899 rh#1141173 rh#1163762 |
CVE-2014-3182 | kernel-source-rt:Unsupported | moderate | () | BID:69770 CONFIRM:git.kernel.org:CVE-2014-3182 CONFIRM:github.com:CVE-2014-3182 CONFIRM:www.kernel.org:CVE-2014-3185 CVE-2014-3182 CVE-2023-2002 MISC:code.google.com:CVE-2014-3182 MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[oss-security] 20140911 Multiple Linux USB driver CVE assignment OSS:2023/04/16/3 RH:CVE-2014-3182 RHSA-2014:1318 RHSA-2014:1971 SMASH Issue 106127 UBUNTU:CVE-2014-3182 bnc#896385 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ad3e14d7c5268c2e24477c6ef54bbdf88add5d36 rh#1113899 rh#1141210 |
CVE-2014-3183 | kernel-source-rt:Unsupported | moderate | () | CONFIRM:git.kernel.org:CVE-2014-3183 CONFIRM:github.com:CVE-2014-3183 CONFIRM:www.kernel.org:CVE-2014-3185 CVE-2014-3183 MISC:code.google.com:CVE-2014-3183 MLIST:[oss-security] 20140911 Multiple Linux USB driver CVE assignment RH:CVE-2014-3183 SMASH Issue 106128 UBUNTU:CVE-2014-3183 bnc#896387 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=51217e69697fba92a06e07e16f55c9a52d8e8945 rh#1141344 |
CVE-2014-3184 | kernel-source-rt:Not affected | moderate | () | BID:69768 CONFIRM:git.kernel.org:CVE-2014-3184 CONFIRM:github.com:CVE-2014-3184 CVE-2014-3184 CVE-2023-2002 MISC:code.google.com:CVE-2014-3184 MISC:git.kernel.org:OSS:2023/04/16/3 OSS:2023/04/16/3 RH:CVE-2014-3184 RHSA-2014:1318 RHSA-2014:1971 RHSA-2015:1272 SMASH Issue 106129 UBUNTU:CVE-2014-3184 UBUNTU:USN-2374-1 UBUNTU:USN-2375-1 bnc#896390 rh#1113899 rh#1141391 rh#1163762 |
CVE-2014-3465 | gnutls:Unsupported | moderate | () | CONFIRM:www.gitorious.org:CVE-2014-3465 CVE-2014-3465 D:CVE-2014-3465 MLIST:[gnutls-help] 20140131 gnutls 3.1.20 MLIST:[gnutls-help] 20140131 gnutls 3.2.10 RH:CVE-2014-3465 RHSA-2014:0684 SECUNIA:59086 SMASH Issue 99187 SUSE:openSUSE-SU-2014:0763 SUSE:openSUSE-SU-2014:0767 UBUNTU:CVE-2014-3465 bnc#880733 rh#1101734 |
CVE-2014-3534 | kernel-source-rt:Unsupported | important | () | BID:68940 CONFIRM:git.kernel.org:CVE-2014-3534 CONFIRM:www.kernel.org:CVE-2014-5045 CVE-2014-3534 D:CVE-2014-3534 DSA-2992 MISC:git.kernel.org:/ OSVDB:109546 RH:CVE-2014-3534 RHSA-2014:1023 SECTRACK:1030683 SECUNIA:59790 SECUNIA:60351 SMASH Issue 103207 UBUNTU:CVE-2014-3534 XF:linux-cve20143534-priv-esc(95069) bdo#728705 bnc#885460 linux.git:commit:dab6cf55f81a6e16b8147aed9a843e1691dcd318 rh#1114089 |
CVE-2014-3535 | kernel-source-rt:Unsupported | important | () | BID:69721 CONFIRM:git.kernel.org:CVE-2014-3535 CONFIRM:github.com:CVE-2014-3535 CONFIRM:mirror.linux.org.au:CVE-2014-3535 CVE-2014-3535 MISC:git.kernel.org:/ RH:CVE-2014-3535 RHSA-2014:1167 RHSA-2014:1168 SMASH Issue 105971 UBUNTU:CVE-2014-3535 bnc#896015 rh#1114540 |
CVE-2014-3601 | kernel-source-rt:Not affected | moderate | () | BID:69489 CONFIRM:git.kernel.org:CVE-2014-3601 CVE-2014-3601 CVE-2023-2002 D:CVE-2014-3601 MISC:git.kernel.org:OSS:2023/04/16/3 OSS:2023/04/16/3 RH:CVE-2014-3601 RHSA-2014:1392 RHSA-2015:0674 SECUNIA:60830 SMASH Issue 105212 SUSE:SUSE-SU-2015:0481 SUSE:SUSE-SU-2015:0736 SUSE:openSUSE-SU-2015:0566 UBUNTU:CVE-2014-3601 UBUNTU:USN-2356-1 UBUNTU:USN-2357-1 UBUNTU:USN-2358-1 UBUNTU:USN-2359-1 XF:linux-kernel-cve20143601-dos(95689) bnc#892782 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=350b8bdd689cd2ab2c67c8a86a0be86cfa0751a7 linux.git:commit:350b8bdd689cd2ab2c67c8a86a0be86cfa0751a7 linux.git:commit:3d32e4dbe71374a6780eaf51d719d76f9a9bf22f linux.git:commit:e9de42d8eeffdc23af0144cafa9e3deacc489fb9 rh#1113899 rh#1131951 rh#1156518 rh#1163762 |
CVE-2014-3610 | kernel-source-rt:Not affected | moderate | () | BID:70742 CONFIRM:git.kernel.org:CVE-2014-3610 CONFIRM:git.kernel.org:CVE-2014-3646 CVE-2014-3610 CVE-2014-3646 CVE-2023-2002 DSA-3060 MISC:git.kernel.org:/ MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[oss-security] 20141024 kvm issues OSS:2023/04/16/3 RH:CVE-2014-3610 RH:CVE-2014-3646 RHSA-2014:1724 RHSA-2014:1843 RHSA-2015:0126 RHSA-2015:0284 RHSA-2015:0869 SMASH Issue 155986 SMASH Issue 232569 SUSE:SUSE-SU-2015:0481 SUSE:openSUSE-SU-2015:0566 UBUNTU:CVE-2014-3610 UBUNTU:CVE-2014-3646 UBUNTU:USN-2394-1 UBUNTU:USN-2417-1 UBUNTU:USN-2418-1 UBUNTU:USN-2491-1 bdo#766195 bnc#899192 linux.git:commit:854e8bb1aa06c578c2c9145fa6bfe3680ef63b23 linux.git:commit:a642fc305053cc1c6e47e4f4df327895747ab485 rh#1113899 rh#1144825 rh#1144883 rh#1163762 rh#1183744 |
CVE-2014-3620 | curl:Unsupported | moderate | () | APPLE:APPLE-SA-2015-08-13-2 BID:69742 CONFIRM:curl.haxx.se:CVE-2014-3620 CONFIRM:kb.juniper.net:CVE-2015-3153 CONFIRM:support.apple.com:CVE-2015-5784 CVE-2014-3620 DSA-3022 MISC:curl.se:OSS:2022/05/11/2 MISC:curl.se:OSS:2022/Q2/93 MISC:github.com:OSS:2022/05/11/2 OSS:2022/05/11/2 RH:CVE-2014-3620 SMASH Issue 106018 SUSE:openSUSE-SU-2014:1139 UBUNTU:CVE-2014-3620 bnc#895991 rh#1138846 |
CVE-2014-3631 | kernel-source-rt:Not affected | important | () | BID:70095 BID:75142 CONFIRM:git.kernel.org:CVE-2014-3631 CONFIRM:git.kernel.org:CVE-2015-1805 CONFIRM:git.kernel.org:CVE-2015-2922 CONFIRM:git.kernel.org:CVE-2015-4167 CONFIRM:git.kernel.org:CVE-2015-4692 CONFIRM:www.kernel.org:CVE-2014-7145 CVE-2014-3631 CVE-2015-4692 EXPLOIT-DB:36268 FEDORA:FEDORA-2015-10677 FEDORA:FEDORA-2015-10678 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MLIST:[oss-security] 20150620 Re: CVE request -- Linux kernel - kvm: x86: NULL pointer dereference in kvm_apic_has_events function OSVDB:111298 RH:CVE-2014-3631 RH:CVE-2015-4692 RHSA-2014:1971 SECTRACK:1032798 SMASH Issue 106051 UBUNTU:CVE-2014-3631 UBUNTU:CVE-2015-4692 UBUNTU:USN-2378-1 UBUNTU:USN-2379-1 UBUNTU:USN-2682-1 UBUNTU:USN-2683-1 UBUNTU:USN-2684-1 bnc#896262 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=95389b08d93d5c06ec63ab49bd732b0069b7c35e linux.git:commit:95389b08d93d5c06ec63ab49bd732b0069b7c35e rh#1140325 rh#1230770 |
CVE-2014-3646 | kernel-source-rt:Not affected | moderate | () | BID:70742 CONFIRM:git.kernel.org:CVE-2014-3610 CONFIRM:git.kernel.org:CVE-2014-3646 CVE-2014-3610 CVE-2014-3646 CVE-2023-2002 DSA-3060 MISC:git.kernel.org:/ MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[oss-security] 20141024 kvm issues OSS:2023/04/16/3 RH:CVE-2014-3610 RH:CVE-2014-3646 RHSA-2014:1724 RHSA-2014:1843 RHSA-2015:0126 RHSA-2015:0284 RHSA-2015:0869 SMASH Issue 155986 SMASH Issue 232560 SUSE:SUSE-SU-2015:0481 SUSE:openSUSE-SU-2015:0566 UBUNTU:CVE-2014-3610 UBUNTU:CVE-2014-3646 UBUNTU:USN-2394-1 UBUNTU:USN-2417-1 UBUNTU:USN-2418-1 UBUNTU:USN-2491-1 bdo#766195 bnc#899192 linux.git:commit:854e8bb1aa06c578c2c9145fa6bfe3680ef63b23 linux.git:commit:a642fc305053cc1c6e47e4f4df327895747ab485 rh#1113899 rh#1144825 rh#1144883 rh#1163762 rh#1183744 |
CVE-2014-3673 | kernel-source-rt:Not affected | moderate | () | BID:70691 BID:70883 CONFIRM:git.kernel.org:CVE-2014-3673 CONFIRM:git.kernel.org:CVE-2014-3690 CONFIRM:github.com:CVE-2014-3673 CONFIRM:github.com:CVE-2014-3690 CONFIRM:linux.oracle.com:CVE-2014-3687 CONFIRM:www.kernel.org:CVE-2014-3690 CVE-2014-3673 CVE-2014-3690 CVE-2014-8160 CVE-2014-9584 CVE-2015-7303 CVE-2015-7838 CVE-2015-7839 CVE-2015-8028 CVE-2015-8029 CVE-2015-8030 CVE-2015-8220 CVE-2015-8561 CVE-2015-8572 CVE-2015-8580 CVE-2015-8843 CVE-2016-1715 CVE-2016-4065 CVE-2023-2002 D:CVE-2014-3690 DSA-3060 HP:HPSBGN03282 HP:HPSBGN03285 MANDRIVA:MDVSA-2015:058 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:/ MISC:git.kernel.org:MLIST:[oss-security] 20141021 CVE-2014-3690: KVM DoS triggerable by malicious host userspace MISC:git.kernel.org:MLIST:[oss-security] 20141126 Re: CVE Request: Linux kernel LDT handling bugs MISC:git.kernel.org:MLIST:[oss-security] 20141215 Linux kernel: multiple x86_64 vulnerabilities MISC:git.kernel.org:MLIST:[oss-security] 20150320 Re: CVE Request: Linux kernel execution in the early microcode loader. MISC:git.kernel.org:OSS:2023/04/16/3 MISC:www.zerodayinitiative.com MLIST:[oss-security] 20141021 CVE-2014-3690: KVM DoS triggerable by malicious host userspace MLIST:[oss-security] 20141029 Re: CVE-2014-3690: KVM DoS triggerable by malicious host userspace OSS:2014/Q4/416 OSS:2023/04/16/3 RH:CVE-2014-3673 RH:CVE-2014-3690 RHSA-2014:1971 RHSA-2014:1997 RHSA-2015:0043 RHSA-2015:0062 RHSA-2015:0115 RHSA-2015:0290 RHSA-2015:0782 RHSA-2015:0864 SECUNIA:60174 SECUNIA:62428 SMASH Issue 110104 SMASH Issue 110107 SMASH Issue 155985 SMASH Issue 232568 SUSE:SUSE-SU-2015:0178 SUSE:SUSE-SU-2015:0481 SUSE:SUSE-SU-2015:0529 SUSE:SUSE-SU-2015:0652 SUSE:SUSE-SU-2015:0736 SUSE:SUSE-SU-2015:0812 SUSE:openSUSE-SU-2015:0566 UBUNTU:CVE-2014-3185 UBUNTU:CVE-2014-3673 UBUNTU:CVE-2014-3690 UBUNTU:CVE-2014-7826 UBUNTU:CVE-2014-8133 UBUNTU:CVE-2014-9090 UBUNTU:CVE-2014-9322 UBUNTU:USN-2417-1 UBUNTU:USN-2418-1 UBUNTU:USN-2419-1 UBUNTU:USN-2420-1 UBUNTU:USN-2421-1 bdo#766195 bnc#902232 bnc#902346 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d974baa398f34393db76be45f7d4d04fbdbb4a0a rh#1113899 rh#1147850 rh#1153322 rh#1163762 rh#1163792 |
CVE-2014-3687 | kernel-source-rt:Not affected | important | () | BID:70766 CONFIRM:git.kernel.org:CVE-2014-3687 CONFIRM:github.com:CVE-2014-3687 CONFIRM:linux.oracle.com:CVE-2014-3687 CVE-2014-3687 CVE-2023-2002 DSA-3060 HP:HPSBGN03282 HP:HPSBGN03285 MISC:git.kernel.org:OSS:2023/04/16/3 OSS:2023/04/16/3 RH:CVE-2014-3687 RHSA-2014:1971 RHSA-2014:1997 RHSA-2015:0043 RHSA-2015:0062 RHSA-2015:0115 SECUNIA:62428 SMASH Issue 155999 SUSE:SUSE-SU-2015:0178 SUSE:SUSE-SU-2015:0481 SUSE:SUSE-SU-2015:0529 SUSE:SUSE-SU-2015:0652 SUSE:SUSE-SU-2015:0736 SUSE:SUSE-SU-2015:1489 SUSE:openSUSE-SU-2015:0566 UBUNTU:CVE-2014-3687 UBUNTU:USN-2417-1 UBUNTU:USN-2418-1 bdo#766195 bnc#902349 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b69040d8e39f20d5215a03502a8e8b4c6ab78395 rh#1113899 rh#1155731 rh#1163762 rh#1163792 rh#1183744 rh#1202855 rh#1205079 |
CVE-2014-3688 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2014-3688 CONFIRM:github.com:CVE-2014-3688 CONFIRM:www.kernel.org:CVE-2014-8884 CVE-2014-3688 CVE-2023-2002 DSA-3060 HP:HPSBGN03282 HP:HPSBGN03285 MISC:bugzilla.redhat.com:MLIST:[oss-security] 20141113 Linux kernel: SCTP issues MISC:git.kernel.org:MLIST:[oss-security] 20141113 Linux kernel: SCTP issues MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[oss-security] 20141113 Linux kernel: SCTP issues OSS:2023/04/16/3 RH:CVE-2014-3688 RHSA-2014:1971 RHSA-2014:1997 RHSA-2015:0043 RHSA-2015:0062 RHSA-2015:0115 SMASH Issue 110127 SUSE:SUSE-SU-2015:0481 SUSE:SUSE-SU-2015:0652 SUSE:SUSE-SU-2015:0736 SUSE:openSUSE-SU-2015:0566 UBUNTU:CVE-2014-3688 UBUNTU:USN-2417-1 UBUNTU:USN-2418-1 bdo#766195 bnc#902351 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=26b87c7881006311828bb0ab271a551a62dcceb4 rh#1113899 rh#1155745 rh#1163762 rh#1163792 |
CVE-2014-3690 | kernel-source-rt:Not affected | moderate | () | BID:70691 CONFIRM:git.kernel.org:CVE-2014-3690 CONFIRM:github.com:CVE-2014-3690 CONFIRM:www.kernel.org:CVE-2014-3690 CVE-2014-3673 CVE-2014-3690 CVE-2014-8160 CVE-2014-9584 CVE-2015-7303 CVE-2015-7838 CVE-2015-7839 CVE-2015-8028 CVE-2015-8029 CVE-2015-8030 CVE-2015-8220 CVE-2015-8561 CVE-2015-8572 CVE-2015-8580 CVE-2015-8843 CVE-2016-1715 CVE-2016-4065 CVE-2023-2002 D:CVE-2014-3690 DSA-3060 MANDRIVA:MDVSA-2015:058 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:MLIST:[oss-security] 20141021 CVE-2014-3690: KVM DoS triggerable by malicious host userspace MISC:git.kernel.org:MLIST:[oss-security] 20141126 Re: CVE Request: Linux kernel LDT handling bugs MISC:git.kernel.org:MLIST:[oss-security] 20141215 Linux kernel: multiple x86_64 vulnerabilities MISC:git.kernel.org:MLIST:[oss-security] 20150320 Re: CVE Request: Linux kernel execution in the early microcode loader. MISC:git.kernel.org:OSS:2023/04/16/3 MISC:www.zerodayinitiative.com MLIST:[oss-security] 20141021 CVE-2014-3690: KVM DoS triggerable by malicious host userspace MLIST:[oss-security] 20141029 Re: CVE-2014-3690: KVM DoS triggerable by malicious host userspace OSS:2014/Q4/416 OSS:2023/04/16/3 RH:CVE-2014-3690 RHSA-2015:0290 RHSA-2015:0782 RHSA-2015:0864 SECUNIA:60174 SMASH Issue 110104 SMASH Issue 110107 SUSE:SUSE-SU-2015:0178 SUSE:SUSE-SU-2015:0481 SUSE:SUSE-SU-2015:0736 SUSE:openSUSE-SU-2015:0566 UBUNTU:CVE-2014-3185 UBUNTU:CVE-2014-3690 UBUNTU:CVE-2014-7826 UBUNTU:CVE-2014-8133 UBUNTU:CVE-2014-9090 UBUNTU:CVE-2014-9322 UBUNTU:USN-2417-1 UBUNTU:USN-2418-1 UBUNTU:USN-2419-1 UBUNTU:USN-2420-1 UBUNTU:USN-2421-1 bdo#766195 bnc#902232 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d974baa398f34393db76be45f7d4d04fbdbb4a0a rh#1113899 rh#1153322 rh#1163762 rh#1163792 |
CVE-2014-3917 | kernel-source-rt:Already fixed | moderate | () | CVE-2014-3917 CVE-2023-2002 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[linux-kernel] 20140528 [PATCH 1/2] auditsc: audit_krule mask accesses need bounds checking MLIST:[oss-security] 20140529 Re: CVE request: Linux kernel DoS with syscall auditing OSS:2023/04/16/3 RH:CVE-2014-3917 RHSA-2014:0913 RHSA-2014:1143 RHSA-2014:1167 RHSA-2014:1281 SECUNIA:59777 SECUNIA:60011 SECUNIA:60564 SMASH Issue 103024 SMASH Issue 103081 SUSE:SUSE-SU-2015:0812 UBUNTU:CVE-2014-3917 UBUNTU:USN-2334-1 UBUNTU:USN-2335-1 bnc#880484 rh#1070618 rh#1102571 rh#822754 |
CVE-2014-4014 | kernel-source-rt:Unsupported | moderate | () | BID:67988 CONFIRM:git.kernel.org:CVE-2014-4014 CONFIRM:www.kernel.org:CVE-2014-4157 CVE-2014-4014 D:CVE-2014-4014 EXPLOIT-DB:33824 MLIST:[oss-security] 20140610 CVE-2014-4014: Linux kernel user namespace bug OSS:2014/Q2/511 RH:CVE-2014-4014 SECTRACK:1030394 SECUNIA:59220 SMASH Issue 99458 UBUNTU:CVE-2014-4014 bnc#882189 linux.git:commit:23adbe12ef7d3d4195e80800ab36b37bee28cd03 rh#1070618 rh#1107966 |
CVE-2014-4330 | perl:Already fixed | moderate | () | APPLE:APPLE-SA-2010-03-29-1 APPLE:APPLE-SA-2016-05-16-4 APPLE:APPLE-SA-2016-07-18-1 BID:100503 BID:100514 BID:100861 BID:105647 BID:105656 BID:105658 BID:67121 BID:70142 BID:79091 BID:85801 BID:91067 BID:91068 BID:91787 BID:91869 BID:93132 BID:93287 BID:93604 BID:94371 BID:94377 BID:94925 BID:95429 BUGTRAQ:20140925 LSE Leading Security Experts GmbH - LSE-2014-06-10 - Perl CORE - Deep Recursion Stack Overflow BUGTRAQ:20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities CONFIRM:access.redhat.com:CVE-2014-0114 CONFIRM:advisories.mageia.org:CVE-2014-0114 CONFIRM:advisories.mageia.org:CVE-2014-4330 CONFIRM:bugs.jython.org:CVE-2016-4000 CONFIRM:bugs.launchpad.net:CVE-2015-8866 CONFIRM:bugs.launchpad.net:CVE-2015-8867 CONFIRM:bugs.php.net:CVE-2015-8866 CONFIRM:bugs.php.net:CVE-2015-8867 CONFIRM:bugs.php.net:CVE-2015-8878 CONFIRM:bugs.php.net:CVE-2016-4070 CONFIRM:bugzilla.redhat.com:CVE-2015-7559 CONFIRM:commons.apache.org:CVE-2014-0114 CONFIRM:git.php.net:CVE-2015-8866 CONFIRM:git.php.net:CVE-2015-8867 CONFIRM:github.com:CVE-2016-1182 CONFIRM:github.com:CVE-2016-9389 CONFIRM:github.com:CVE-2016-9394 CONFIRM:github.com:CVE-2016-9583 CONFIRM:github.com:CVE-2017-1000071 CONFIRM:github.com:CVE-2017-14735 CONFIRM:h20566.www2.hpe.com:CVE-2016-0763 CONFIRM:h20566.www2.hpe.com:CVE-2016-5388 CONFIRM:h20566.www2.hpe.com:CVE-2016-5773 CONFIRM:h20566.www2.hpe.com:CVE-2017-5787 CONFIRM:hg.python.org:CVE-2016-4000 CONFIRM:issues.apache.org:CVE-2014-0114 CONFIRM:issues.apache.org:CVE-2015-1832 CONFIRM:issues.apache.org:CVE-2015-7559 CONFIRM:issues.apache.org:CVE-2016-1000031 CONFIRM:metacpan.org:CVE-2014-4330 CONFIRM:rwkbp.makekb.com:CVE-2015-8965 CONFIRM:security-tracker.debian.org:CVE-2016-1181 CONFIRM:security-tracker.debian.org:CVE-2016-1182 CONFIRM:security.netapp.com:CVE-2014-0114 CONFIRM:security.netapp.com:CVE-2016-1000031 CONFIRM:security.netapp.com:CVE-2016-1182 CONFIRM:security.netapp.com:CVE-2017-5645 CONFIRM:support.apple.com:CVE-2009-0689 CONFIRM:support.apple.com:CVE-2016-4073 CONFIRM:support.apple.com:CVE-2016-4653 CONFIRM:svn.apache.org:CVE-2015-1832 CONFIRM:www-01.ibm.com:CVE-2014-0114 CONFIRM:www-01.ibm.com:CVE-2014-3022 CONFIRM:www-01.ibm.com:CVE-2015-1832 CONFIRM:www.ibm.com:CVE-2014-0963 CONFIRM:www.lsexperts.de:CVE-2014-4330 CONFIRM:www.oracle.com:CVE-2014-0114 CONFIRM:www.oracle.com:CVE-2014-4271 CONFIRM:www.oracle.com:CVE-2014-6564 CONFIRM:www.oracle.com:CVE-2015-0437 CONFIRM:www.oracle.com:CVE-2016-5477 CONFIRM:www.oracle.com:CVE-2016-8296 CONFIRM:www.oracle.com:CVE-2017-3626 CONFIRM:www.oracle.com:CVE-2017-5689 CONFIRM:www.oracle.com:CVE-2017-5709 CONFIRM:www.oracle.com:CVE-2017-5715 CONFIRM:www.oracle.com:CVE-2017-5753 CONFIRM:www.oracle.com:CVE-2017-6074 CONFIRM:www.pcre.org:CVE-2015-2325 CONFIRM:www.php.net:CVE-2009-3558 CONFIRM:www.php.net:CVE-2016-9935 CONFIRM:www.php.net:CVE-2016-9936 CONFIRM:www.vmware.com:CVE-2014-0114 CONFIRM:www.vmware.com:CVE-2014-8371 CONFIRM:x-stream.github.io:CVE-2013-7285 CVE-2009-3559 CVE-2013-7285 CVE-2014-0114 CVE-2014-0245 CVE-2014-3540 CVE-2014-4172 CVE-2014-4330 CVE-2014-4651 CVE-2015-0852 CVE-2015-1832 CVE-2015-2325 CVE-2015-2326 CVE-2015-2613 CVE-2015-5328 CVE-2015-7559 CVE-2015-7940 CVE-2015-8878 CVE-2015-8965 CVE-2015-9251 CVE-2016-0635 CVE-2016-1000031 CVE-2016-1181 CVE-2016-1182 CVE-2016-4000 CVE-2016-4070 CVE-2016-4612 CVE-2016-4619 CVE-2016-5483 CVE-2016-5616 CVE-2016-5617 CVE-2016-5684 CVE-2016-6814 CVE-2016-9389 CVE-2016-9392 CVE-2016-9583 CVE-2017-0379 CVE-2017-13745 CVE-2017-14229 CVE-2017-14735 CVE-2017-15095 CVE-2017-16012 DEBIAN:DSA-3959 DSA-2940 DSA-3392 DSA-3417 DSA-3893 FEDORA:FEDORA-2014-11453 FEDORA:FEDORA-2014-9380 FEDORA:FEDORA-2015-16104 FEDORA:FEDORA-2015-16105 FEDORA:FEDORA-2015-16106 FEDORA:FEDORA-2015-7d95466eda FEDORA:FEDORA-2015-992342e82f FEDORA:FEDORA-2015-decbab7c9f FULLDISC:20140925 LSE Leading Security Experts GmbH - LSE-2014-06-10 - Perl CORE - Deep Recursion Stack Overflow FULLDISC:20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities GENTOO:GLSA-201607-09 GENTOO:GLSA-201701-68 GENTOO:GLSA-201710-28 HP:HPSBGN03041 HP:HPSBMU03090 HP:HPSBST03160 JVN:JVN#03188560 JVN:JVN#65044642 JVNDB:JVNDB-2016-000096 JVNDB:JVNDB-2016-000097 L3:42159 MANDRIVA:MDVSA-2009:302 MANDRIVA:MDVSA-2014:095 MANDRIVA:MDVSA-2015:136 MISC:access.redhat.com:CVE-2014-0245 MISC:blog.diniscruz.com:CVE-2013-7285 MISC:blogs.gentoo.org:CVE-2016-9399 MISC:bugs.exim.org:CVE-2015-2325 MISC:bugs.exim.org:CVE-2015-2326 MISC:bugs.php.net:CVE-2009-3559 MISC:bugzilla.redhat.com:CVE-2014-0245 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:eprint.iacr.org:CVE-2017-0379 MISC:exchange.xforce.ibmcloud.com:CVE-2014-4172 MISC:fortiguard.com:CVE-2015-2325 MISC:fortiguard.com:CVE-2015-2326 MISC:git.gnupg.org:CVE-2017-0379 MISC:github.com:CVE-2014-4172 MISC:github.com:CVE-2015-9251 MISC:github.com:CVE-2017-14229 MISC:ics-cert.us-cert.gov:CVE-2015-9251 MISC:issues.apache.org:CVE-2014-4651 MISC:issues.jasig.org:CVE-2014-4172 MISC:lists.debian.org:CVE-2017-0379 MISC:lists.fedoraproject.org:CVE-2014-4172 MISC:mail-archives.apache.org:CVE-2016-6814 MISC:packetstormsecurity.com:CVE-2014-4330 MISC:seclists.org:CVE-2014-4651 MISC:security-tracker.debian.org:CVE-2016-4000 MISC:security-tracker.debian.org:CVE-2017-0379 MISC:snyk.io:CVE-2015-9251 MISC:snyk.io:CVE-2016-4000 MISC:sw.aveva.com:CVE-2015-9251 MISC:web-in-security.blogspot.ca:CVE-2015-7940 MISC:web.archive.org:CVE-2013-7285 MISC:www.debian.org:CVE-2014-4172 MISC:www.mail-archive.com:CVE-2014-4172 MISC:www.oracle.com:CVE-2013-7285 MISC:www.talosintelligence.com:CVE-2016-5684 MISC:www.tenable.com:CVE-2016-1000031 MISC:www.tenable.com:CVE-2016-6793 MLIST:[activemq-issues] 20190718 [jira] [Updated] (AMQ-7236) SEV-1 Security vulnerability in spring-expression-4.3.11.RELEASE.jar (spring framework) and xstream-1.4.10.jar MLIST:[activemq-issues] 20190826 [jira] [Created] (AMQ-7288) Security Vulnerabilities in ActiveMQ dependent libraries. MLIST:[announce] 20181105 [SECURITY] Immediately upgrade commons-fileupload to version 1.3.3 when running Struts 2.3.36 or prior MLIST:[apache-ignite-developers] 20180601 [CVE-2014-0114]: Apache Ignite is vulnerable to existing CVE-2014-0114 MLIST:[oss-security] 20091120 CVE request: php 5.3.1 update MLIST:[oss-security] 20091120 Re: CVE request: php 5.3.1 update MLIST:[oss-security] 20140109 Re: CVE request: remote code execution via deserialization in XStream MLIST:[oss-security] 20140616 CVE request for commons-beanutils: 'class' property is exposed, potentially leading to RCE MLIST:[oss-security] 20140707 Re: CVE request for commons-beanutils: 'class' property is exposed, potentially leading to RCE MLIST:[oss-security] 20140925 LSE Leading Security Experts GmbH - LSE-2014-06-10 - Perl CORE - Deep Recursion Stack Overflow MLIST:[oss-security] 20150828 CVE-2015-0852 [FreeImage] Integer overflow in PluginPCX.cpp MLIST:[oss-security] 20151022 CVE Request: invalid curve attack on bouncycastle MLIST:[oss-security] 20151022 Re: CVE Request: invalid curve attack on bouncycastle MLIST:[oss-security] 20160423 Re: CVE request: PHP issues fixed in 7.0.5, 5.6.20 and 5.5.34 releases MLIST:[oss-security] 20161117 Re: jasper: multiple assertion failures MLIST:[perl.perl5.porters] 20140918 fix for CVE-2014-4330 present in blead MLIST:[php-announce] 20091119 5.3.1 Release announcement MLIST:[xstream-user] 20130717 Re: Is it possible to unregister the DynamicProxyConverter using the SpringOXM wrapper MLIST:[xstream-user] 20130718 Re: Is it possible to unregister the DynamicProxyConverter using the SpringOXM wrapper Oracle:CVE-2016-5616 Oracle:CVE-2016-5617 Oracle:CVE-2019-10173 RH:CVE-2014-4330 RHSA-2014:0216 RHSA-2014:0294 RHSA-2014:0323 RHSA-2014:0371 RHSA-2014:0372 RHSA-2014:0374 RHSA-2014:0389 RHSA-2014:0452 RHSA-2014:0474 RHSA-2014:0497 RHSA-2014:0498 RHSA-2014:0500 RHSA-2014:0511 RHSA-2014:1007 RHSA-2014:1059 RHSA-2015:1009 RHSA-2015:1176 RHSA-2015:1888 RHSA-2016:2035 RHSA-2016:2036 RHSA-2016:2130 RHSA-2016:2131 RHSA-2016:2595 RHSA-2016:2749 RHSA-2016:2750 RHSA-2016:2927 RHSA-2016:2928 RHSA-2017:0184 RHSA-2017:0272 RHSA-2017:0868 RHSA-2017:1208 RHSA-2017:2192 RHSA-2017:2486 RHSA-2017:2596 RHSA-2017:2787 RHSA-2017:2886 RHSA-2017:3189 RHSA-2017:3190 RHSA-2018:0279 RHSA-2018:0342 RHSA-2018:0480 RHSA-2018:0481 RHSA-2018:0501 RHSA-2018:0574 RHSA-2018:0576 RHSA-2018:0577 RHSA-2018:1447 RHSA-2018:1448 RHSA-2018:1449 RHSA-2018:1450 RHSA-2018:2669 RHSA-2018:2927 RHSA-2019:1822 RHSA-2019:1823 RHSA-2019:2995 RHSA-2019:3892 RHSA-2019:4352 RHSA-2020:0445 RHSA-2020:0727 RHSA-2020:0983 SECTRACK:1034077 SECTRACK:1036056 SECTRACK:1036377 SECTRACK:1036378 SECTRACK:1036393 SECTRACK:1036397 SECTRACK:1037036 SECTRACK:1037046 SECTRACK:1037053 SECTRACK:1037640 SECTRACK:1039600 SECTRACK:1041294 SECUNIA:57477 SECUNIA:58710 SECUNIA:58851 SECUNIA:58947 SECUNIA:59014 SECUNIA:59118 SECUNIA:59228 SECUNIA:59245 SECUNIA:59246 SECUNIA:59430 SECUNIA:59464 SECUNIA:59479 SECUNIA:59480 SECUNIA:59704 SECUNIA:59718 SECUNIA:60177 SECUNIA:60703 SECUNIA:61441 SECUNIA:61961 SMASH Issue 106174 SMASH Issue 106399 SUSE:SUSE-SU-2016:1277 SUSE:openSUSE-SU-2015:0858 SUSE:openSUSE-SU-2015:1911 SUSE:openSUSE-SU-2016:1274 SUSE:openSUSE-SU-2016:1373 UBUNTU:CVE-2014-4330 UBUNTU:CVE-2015-7559 UBUNTU:USN-2916-1 UBUNTU:USN-2952-1 UBUNTU:USN-2952-2 UBUNTU:USN-3693-1 UBUNTU:USN-3727-1 XF:perl-cve20144330-dos(96216) ZDI-16-570 bdo#759718 bdo#797165 bdo#864859 bdo#873383 bnc#1022633 bnc#896715 http://www.debian.org/security/2016/dsa-3560 https://git.php.net/?p=php-src.git%3Ba=commit%3Bh=95433e8e339dbb6b5d5541473c1661db6ba2c451 rh#1051277 rh#1091938 rh#1101303 rh#1112877 rh#1116665 rh#1131350 rh#1139700 rh#1207198 rh#1207202 rh#1293972 rh#1323114 rh#1343538 rh#1343540 rh#1378936 rh#1386562 rh#1386564 rh#1396963 rh#1396971 rh#1414133 rh#1433010 rh#1591854 rh#1714979 rh#1716448 rh#1716453 rh#1716454 rh#1722971 rh#539529 |
CVE-2014-4508 | kernel-source-rt:Not affected | important | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | BID:68126 CONFIRM:www.kernel.org:CVE-2014-4508 CVE-2014-4508 CVE-2023-2002 D:CVE-2014-4508 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[linux-kernel] 20140616 Re: 3.15: kernel BUG at kernel/auditsc.c:1525! MLIST:[oss-security] 20140619 CVE request: Another Linux syscall auditing bug MLIST:[oss-security] 20140620 Re: CVE request: Another Linux syscall auditing bug MLIST:[oss-security] 20201112 CVE-2014-4508 OSS:2020/Q4/121 OSS:2023/04/16/3 RH:CVE-2014-4508 RHSA-2021:0181 SECUNIA:58964 SECUNIA:60564 SMASH Issue 99968 SMASH Issue 99971 SUSE:SUSE-SU-2014:1316 SUSE:SUSE-SU-2014:1319 SUSE:openSUSE-SU-2015:0566 UBUNTU:CVE-2014-4508 UBUNTU:USN-2334-1 bnc#883724 linux.git:commit:554086d85e71f30abe46fc014fea31929a7c6a8a linux.git:commit:8142b215501f8b291a108a202b3a053a265b03dd linux.git:commit:d1fc98ba961db83293f804a1037e905c03b301cf linux.git:commit:fb21b84e7f809ef04b1e5aed5d463cf0d4866638 rh#1070618 rh#1111590 rh#1113899 rh#1163762 rh#822754 |
CVE-2014-4608 | kernel-source-rt:Not affected | moderate | () | BID:64111 BID:66095 BID:66779 BID:67162 BID:67309 BID:67321 BID:68214 BID:68862 BID:68881 BID:72061 CONFIRM:git.kernel.org:CVE-2013-2929 CONFIRM:git.kernel.org:CVE-2013-4299 CONFIRM:git.kernel.org:CVE-2013-7281 CONFIRM:git.kernel.org:CVE-2014-0101 CONFIRM:git.kernel.org:CVE-2014-0131 CONFIRM:git.kernel.org:CVE-2014-0155 CONFIRM:git.kernel.org:CVE-2014-1444 CONFIRM:git.kernel.org:CVE-2014-1445 CONFIRM:git.kernel.org:CVE-2014-1446 CONFIRM:git.kernel.org:CVE-2014-1874 CONFIRM:git.kernel.org:CVE-2014-2309 CONFIRM:git.kernel.org:CVE-2014-2851 CONFIRM:git.kernel.org:CVE-2014-3122 CONFIRM:git.kernel.org:CVE-2014-3145 CONFIRM:git.kernel.org:CVE-2014-4608 CONFIRM:git.kernel.org:CVE-2014-4943 CONFIRM:git.kernel.org:CVE-2014-5045 CONFIRM:git.kernel.org:CVE-2014-5077 CONFIRM:git.kernel.org:CVE-2014-8160 CONFIRM:github.com:CVE-2013-7281 CONFIRM:github.com:CVE-2014-0131 CONFIRM:github.com:CVE-2014-4608 CONFIRM:github.com:CVE-2014-4943 CONFIRM:github.com:CVE-2014-5045 CONFIRM:github.com:CVE-2014-5077 CONFIRM:github.com:CVE-2014-8160 CONFIRM:linux.oracle.com:CVE-2014-4943 CONFIRM:www.kernel.org:CVE-2014-5045 CONFIRM:www.kernel.org:CVE-2014-9914 CVE-2013-7263 CVE-2014-0131 CVE-2014-2309 CVE-2014-2851 CVE-2014-3145 CVE-2014-4608 CVE-2014-4943 CVE-2014-5045 CVE-2014-5077 CVE-2014-8160 CVE-2023-2002 D:CVE-2013-7263 D:CVE-2014-4608 D:CVE-2014-4943 D:CVE-2014-5045 D:CVE-2014-5077 DSA-2906 DSA-2992 DSA-3170 EXPLOIT-DB:36267 L3:41261 MANDRIVA:MDVSA-2015:057 MANDRIVA:MDVSA-2015:058 MISC:blog.securitymouse.com:CVE-2014-4611 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:/ MISC:git.kernel.org:MLIST:[oss-security] 20140407 CVE-2014-0155 -- kernel: kvm: BUG caused by invalid entry in guest ioapic redirection table MISC:git.kernel.org:MLIST:[oss-security] 20140509 Re: CVE request Linux kernel: filter: prevent nla extensions to peek beyond the end of the message MISC:git.kernel.org:OSS:2023/04/16/3 MISC:patchwork.ozlabs.org:MLIST:[oss-security] 20140725 Re: CVE request Linux Kernel: net: SCTP: NULL pointer dereference MISC:www.oberhumer.com:CVE-2014-4608 MISC:www.openwall.com:MLIST:[oss-security] 20140307 Re: CVE Request: Linux kernel: IPv6: crash due to router advertisement flooding MISC:www.securitymouse.com:CVE-2014-4608 MLIST:[linux-kernel] 20140411 net: ipv4: current group_info should be put after using. MLIST:[netdev] 20140310 [PATCH 0/5] skbuff: fix skb_segment with zero copy skbs MLIST:[netdev] 20140310 [PATCH 5/5] skbuff: skb_segment: orphan frags before copying MLIST:[netfilter-devel] 20140925 [PATCH nf] netfilter: conntrack: disable generic protocol tracking MLIST:[oss-security] 20131128 Re: CVE Request: Linux kernel: net: uninitialised memory leakage MLIST:[oss-security] 20140107 oss-sec: CVE split and a missed file MLIST:[oss-security] 20140307 Re: CVE Request: Linux kernel: IPv6: crash due to router advertisement flooding MLIST:[oss-security] 20140310 CVE-2014-0131 -- kernel: net: use-after-free during segmentation with zerocopy MLIST:[oss-security] 20140407 CVE-2014-0155 -- kernel: kvm: BUG caused by invalid entry in guest ioapic redirection table MLIST:[oss-security] 20140411 Re: CVE request -- Linux kernel: net: ping: refcount issue in ping_init_sock() function MLIST:[oss-security] 20140430 Re: CVE request Linux kernel: mm: try_to_unmap_cluster() should lock_page() before mlocking MLIST:[oss-security] 20140509 Re: CVE request Linux kernel: filter: prevent nla extensions to peek beyond the end of the message MLIST:[oss-security] 20140626 LMS-2014-06-16-2: Linux Kernel LZO MLIST:[oss-security] 20140716 CVE-2014-4943: Linux privilege escalation in ppp over l2tp sockets MLIST:[oss-security] 20140723 Re: CVE request: kernel: vfs: refcount issues during unmount on symlink MLIST:[oss-security] 20140725 Re: CVE request Linux Kernel: net: SCTP: NULL pointer dereference MLIST:[oss-security] 20150114 CVE-2014-8160 Linux Kernel: SCTP firewalling fails until SCTP module is loaded OSS:2023/04/16/3 OSVDB:109277 RH:CVE-2013-7263 RH:CVE-2014-0131 RH:CVE-2014-2309 RH:CVE-2014-2851 RH:CVE-2014-3122 RH:CVE-2014-4608 RH:CVE-2014-4943 RH:CVE-2014-5045 RH:CVE-2014-5077 RH:CVE-2014-8160 RHSA-2014:0100 RHSA-2014:0159 RHSA-2014:0285 RHSA-2014:0439 RHSA-2014:0557 RHSA-2014:0786 RHSA-2014:0923 RHSA-2014:0924 RHSA-2014:0925 RHSA-2014:0981 RHSA-2014:1025 RHSA-2014:1083 RHSA-2014:1101 RHSA-2014:1392 RHSA-2014:1668 RHSA-2014:1724 RHSA-2014:1763 RHSA-2014:1872 RHSA-2014:1971 RHSA-2015:0062 RHSA-2015:0284 RHSA-2015:0290 RHSA-2015:0674 RHSA-2018:1252 SECTRACK:1029894 SECTRACK:1030610 SECTRACK:1030681 SECTRACK:1030769 SECUNIA:55882 SECUNIA:56036 SECUNIA:59311 SECUNIA:59777 SECUNIA:59790 SECUNIA:60011 SECUNIA:60071 SECUNIA:60174 SECUNIA:60220 SECUNIA:60353 SECUNIA:60380 SECUNIA:60393 SECUNIA:60430 SECUNIA:60545 SECUNIA:60564 SECUNIA:60744 SECUNIA:62563 SECUNIA:62633 SMASH Issue 103602 SMASH Issue 104015 SMASH Issue 104049 SMASH Issue 104186 SMASH Issue 104187 SMASH Issue 55713 SMASH Issue 95116 SMASH Issue 99988 SUSE:SUSE-SU-2014:1316 SUSE:SUSE-SU-2014:1319 SUSE:SUSE-SU-2015:0481 SUSE:SUSE-SU-2015:0529 SUSE:SUSE-SU-2015:0652 SUSE:SUSE-SU-2015:0736 SUSE:openSUSE-SU-2015:0566 SUSE:openSUSE-SU-2015:0714 UBUNTU:CVE-2013-7263 UBUNTU:CVE-2014-0131 UBUNTU:CVE-2014-4608 UBUNTU:CVE-2014-4943 UBUNTU:CVE-2014-5045 UBUNTU:CVE-2014-5077 UBUNTU:CVE-2014-8160 UBUNTU:USN-2070-1 UBUNTU:USN-2075-1 UBUNTU:USN-2109-1 UBUNTU:USN-2110-1 UBUNTU:USN-2111-1 UBUNTU:USN-2112-1 UBUNTU:USN-2114-1 UBUNTU:USN-2115-1 UBUNTU:USN-2116-1 UBUNTU:USN-2128-1 UBUNTU:USN-2129-1 UBUNTU:USN-2251-1 UBUNTU:USN-2252-1 UBUNTU:USN-2262-1 UBUNTU:USN-2334-1 UBUNTU:USN-2335-1 UBUNTU:USN-2358-1 UBUNTU:USN-2359-1 UBUNTU:USN-2416-1 UBUNTU:USN-2417-1 UBUNTU:USN-2418-1 UBUNTU:USN-2419-1 UBUNTU:USN-2420-1 UBUNTU:USN-2421-1 UBUNTU:USN-2513-1 UBUNTU:USN-2514-1 UBUNTU:USN-2515-1 UBUNTU:USN-2516-1 UBUNTU:USN-2517-1 UBUNTU:USN-2518-1 XF:linux-kernel-cve20144943-priv-esc(94665) XF:linux-kernel-cve20145077-dos(95134) bdo#728705 bnc#857643 bnc#883948 bnc#887082 bnc#889060 bnc#889071 bnc#889173 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1fd819ecb90cc9b822cd84d3056ddba315d3340f http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=206a81c18401c0cde6e579164f752c4b147324ce http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3cf521f7dc87c031617fd47e4b7aa2593c2f3daf http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=db29a9508a9246e77087c5531e45b2c88ec6988b rh#1007690 rh#1035875 rh#1067558 rh#1074589 rh#1081589 rh#1086730 rh#1094232 rh#1113899 rh#1119458 rh#1122472 rh#1122982 rh#1163762 rh#1163792 rh#1182059 |
CVE-2014-4650 | python3:Not affected | moderate | 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) | APPLE:APPLE-SA-2015-08-13-2 BID:65379 BID:70089 CONFIRM:bugs.python.org:CVE-2013-1753 CONFIRM:bugs.python.org:CVE-2014-1912 CONFIRM:bugs.python.org:CVE-2014-7185 CONFIRM:hg.python.org:CVE-2014-1912 CONFIRM:support.apple.com:CVE-2015-5784 CONFIRM:www.oracle.com:CVE-2015-8472 CONFIRM:www.oracle.com:CVE-2016-2802 CONFIRM:www.oracle.com:CVE-2017-5689 CVE-2013-1752 CVE-2013-1753 CVE-2014-1912 CVE-2014-4650 CVE-2014-7185 D:CVE-2014-1912 DSA-2880 EXPLOIT-DB:31875 FEDORA:FEDORA-2014-11559 GENTOO:GLSA-201503-10 L3:40831 L3:41126 L3:42215 L3:42216 L3:42218 L3:42269 L3:44220 L3:45543 MISC:bugs.python.org MISC:bugs.python.org:MISC:openwall.com:CVE-2014-4650 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:openwall.com:CVE-2014-4650 MISC:pastebin.com:CVE-2014-1912 MISC:www.trustedsec.com:CVE-2014-1912 MLIST:[oss-security] 20140212 Re: CVE request? buffer overflow in socket.recvfrom_into MLIST:[oss-security] 20140923 CVE Request: Python 2.7 MLIST:[oss-security] 20140925 Re: CVE Request: Python 2.7 OSS:11745 OSS:12067 OSS:2014/Q3/727 Oracle:CVE-2014-1912 Oracle:CVE-2018-20852 Oracle:CVE-2019-15903 Oracle:CVE-2019-16056 Oracle:CVE-2019-9636 RH:CVE-2013-1752 RH:CVE-2013-1753 RH:CVE-2014-1912 RH:CVE-2014-4650 RH:CVE-2014-7185 RHSA-2015:1064 RHSA-2015:1330 RHSA-2015:2101 Red Hat SECTRACK:1029831 SMASH Issue 103325 SMASH Issue 108521 SMASH Issue 108663 SMASH Issue 280463 SMASH Issue 94981 SMASH Issue 94982 SMASH Issue 96171 SUSE:openSUSE-SU-2014:0518 SUSE:openSUSE-SU-2014:0597 SUSE:openSUSE-SU-2014:1292 UBUNTU:CVE-2013-1752 UBUNTU:CVE-2013-1753 UBUNTU:CVE-2014-1912 UBUNTU:CVE-2014-4650 UBUNTU:CVE-2014-7185 UBUNTU:USN-2125-1 XF:python-bufferobject-overflow(96193) bnc#1049392 bnc#856835 bnc#856836 bnc#863741 bnc#882915 bnc#885882 bnc#898572 bnc#912739 bnc#913479 bnc#955182 rh#1046170 rh#1046174 rh#1062370 rh#1113527 rh#1146026 rh#1752592 rh#750555 |
CVE-2014-4653 | kernel-source-rt:Ignore | moderate | () | BID:68164 CONFIRM:git.kernel.org:CVE-2014-4653 CONFIRM:github.com:CVE-2014-4653 CONFIRM:www.kernel.org:CVE-2014-9914 CVE-2014-4652 CVE-2014-4653 CVE-2014-4654 CVE-2014-4655 CVE-2014-4656 CVE-2023-2002 D:CVE-2014-4653 MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[oss-security] 20140626 Re: CVE Request: Linux kernel ALSA core control API vulnerabilities OSS:2023/04/16/3 RH:CVE-2014-4653 RHSA-2014:1083 RHSA-2014:1392 RHSA-2014:1724 RHSA-2014:1971 RHSA-2015:0087 RHSA-2015:1272 SECUNIA:59434 SECUNIA:59777 SECUNIA:60545 SECUNIA:60564 SMASH Issue 102901 SMASH Issue 103056 SUSE:SUSE-SU-2015:0812 UBUNTU:CVE-2014-4653 UBUNTU:USN-2334-1 UBUNTU:USN-2335-1 bnc#883795 rh#1070618 rh#1113406 rh#1113409 rh#1113445 rh#1113470 rh#822754 |
CVE-2014-4654 | kernel-source-rt:Ignore | moderate | () | BID:68162 CONFIRM:git.kernel.org:CVE-2014-4655 CONFIRM:github.com:CVE-2014-4655 CONFIRM:www.kernel.org:CVE-2014-9914 CVE-2014-4652 CVE-2014-4653 CVE-2014-4654 CVE-2014-4655 CVE-2014-4656 CVE-2023-2002 D:CVE-2014-4654 MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[oss-security] 20140626 Re: CVE Request: Linux kernel ALSA core control API vulnerabilities OSS:2023/04/16/3 RH:CVE-2014-4654 RHSA-2014:1083 RHSA-2014:1392 RHSA-2014:1724 RHSA-2014:1971 RHSA-2015:0087 RHSA-2015:1272 SECUNIA:59434 SECUNIA:59777 SECUNIA:60545 SECUNIA:60564 SMASH Issue 102900 SMASH Issue 103056 SUSE:SUSE-SU-2015:0812 UBUNTU:CVE-2014-4654 UBUNTU:USN-2334-1 UBUNTU:USN-2335-1 bnc#883795 rh#1070618 rh#1113406 rh#1113409 rh#1113445 rh#1113470 rh#822754 |
CVE-2014-4655 | kernel-source-rt:Ignore | moderate | () | BID:68162 CONFIRM:git.kernel.org:CVE-2014-4655 CONFIRM:github.com:CVE-2014-4655 CONFIRM:www.kernel.org:CVE-2014-9914 CVE-2014-4652 CVE-2014-4653 CVE-2014-4654 CVE-2014-4655 CVE-2014-4656 CVE-2023-2002 D:CVE-2014-4655 MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[oss-security] 20140626 Re: CVE Request: Linux kernel ALSA core control API vulnerabilities OSS:2023/04/16/3 RH:CVE-2014-4655 RHSA-2014:1083 RHSA-2014:1392 RHSA-2014:1724 RHSA-2014:1971 RHSA-2015:0087 RHSA-2015:1272 SECTRACK:1036763 SECUNIA:59434 SECUNIA:59777 SECUNIA:60545 SECUNIA:60564 SMASH Issue 102899 SMASH Issue 103056 SUSE:SUSE-SU-2015:0812 UBUNTU:CVE-2014-4655 UBUNTU:USN-2334-1 UBUNTU:USN-2335-1 bnc#883795 rh#1070618 rh#1113406 rh#1113409 rh#1113445 rh#1113470 rh#822754 |
CVE-2014-4715 | lz4:Not affected | moderate | () | CONFIRM:code.google.com:CVE-2014-4715 CONFIRM:fastcompression.blogspot.fr:CVE-2014-4715 CVE-2014-4715 D:CVE-2014-4715 MISC:blog.securitymouse.com:CVE-2014-4715 RH:CVE-2014-4715 SMASH Issue 103300 UBUNTU:CVE-2014-4715 rh#1115767 |
CVE-2014-4943 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2014-4943 CONFIRM:github.com:CVE-2014-4943 CONFIRM:linux.oracle.com:CVE-2014-4943 CVE-2014-4608 CVE-2014-4943 CVE-2023-2002 D:CVE-2014-4943 DSA-2992 EXPLOIT-DB:36267 MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[oss-security] 20140716 CVE-2014-4943: Linux privilege escalation in ppp over l2tp sockets OSS:2023/04/16/3 OSVDB:109277 RH:CVE-2014-4943 RHSA-2014:0923 RHSA-2014:0924 RHSA-2014:0925 RHSA-2014:1025 RHSA-2014:1392 RHSA-2015:0062 SECTRACK:1030610 SECUNIA:59790 SECUNIA:60011 SECUNIA:60071 SECUNIA:60220 SECUNIA:60380 SECUNIA:60393 SMASH Issue 103602 SMASH Issue 103728 SUSE:SUSE-SU-2014:1316 SUSE:SUSE-SU-2014:1319 SUSE:SUSE-SU-2015:0481 SUSE:openSUSE-SU-2015:0566 UBUNTU:CVE-2014-4943 XF:linux-kernel-cve20144943-priv-esc(94665) bdo#728705 bnc#887082 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3cf521f7dc87c031617fd47e4b7aa2593c2f3daf rh#1113899 rh#1119458 rh#1163762 |
CVE-2014-5077 | kernel-source-rt:Not affected | important | () | BID:68214 BID:68881 CONFIRM:git.kernel.org:CVE-2014-4608 CONFIRM:git.kernel.org:CVE-2014-5077 CONFIRM:github.com:CVE-2014-4608 CONFIRM:github.com:CVE-2014-5077 CONFIRM:www.kernel.org:CVE-2014-9914 CVE-2014-4608 CVE-2014-5077 CVE-2023-2002 D:CVE-2014-5077 MISC:blog.securitymouse.com:CVE-2014-4611 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:/ MISC:git.kernel.org:OSS:2023/04/16/3 MISC:patchwork.ozlabs.org:MLIST:[oss-security] 20140725 Re: CVE request Linux Kernel: net: SCTP: NULL pointer dereference MISC:www.oberhumer.com:CVE-2014-4608 MISC:www.securitymouse.com:CVE-2014-4608 MLIST:[oss-security] 20140626 LMS-2014-06-16-2: Linux Kernel LZO MLIST:[oss-security] 20140725 Re: CVE request Linux Kernel: net: SCTP: NULL pointer dereference OSS:2023/04/16/3 RH:CVE-2014-5077 RHSA-2014:1083 RHSA-2014:1392 RHSA-2014:1668 RHSA-2014:1724 RHSA-2014:1763 RHSA-2014:1872 RHSA-2015:0062 SECTRACK:1030681 SECUNIA:59777 SECUNIA:60011 SECUNIA:60174 SECUNIA:60430 SECUNIA:60545 SECUNIA:60564 SECUNIA:60744 SECUNIA:62563 SECUNIA:62633 SMASH Issue 104049 SMASH Issue 104187 SUSE:SUSE-SU-2014:1316 SUSE:SUSE-SU-2014:1319 SUSE:SUSE-SU-2015:0481 SUSE:SUSE-SU-2015:0736 SUSE:openSUSE-SU-2015:0566 UBUNTU:CVE-2014-5077 UBUNTU:USN-2334-1 UBUNTU:USN-2335-1 UBUNTU:USN-2358-1 UBUNTU:USN-2359-1 UBUNTU:USN-2416-1 UBUNTU:USN-2417-1 UBUNTU:USN-2418-1 UBUNTU:USN-2419-1 UBUNTU:USN-2420-1 UBUNTU:USN-2421-1 XF:linux-kernel-cve20145077-dos(95134) bnc#889173 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=206a81c18401c0cde6e579164f752c4b147324ce rh#1113899 rh#1122982 |
CVE-2014-5206 | kernel-source-rt:Unsupported | important | () | BID:69214 BID:69216 CONFIRM:git.kernel.org:CVE-2014-5206 CONFIRM:git.kernel.org:CVE-2014-5207 CONFIRM:github.com:CVE-2014-5206 CONFIRM:github.com:CVE-2014-5207 CVE-2014-5206 CVE-2014-5207 CVE-2023-2002 D:CVE-2014-5206 D:CVE-2014-5207 EXPLOIT-DB:34923 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:MLIST:[oss-security] 20140813 Re: CVE Request: ro bind mount bypass using user namespaces MISC:git.kernel.org:OSS:2023/04/16/3 MISC:packetstormsecurity.com:CVE-2014-5207 MLIST:[oss-security] 20140812 CVE Request: ro bind mount bypass using user namespaces MLIST:[oss-security] 20140813 Re: CVE Request: ro bind mount bypass using user namespaces OSS:2014/Q3/357 OSS:2023/04/16/3 OSVDB:110055 RH:CVE-2014-5206 RH:CVE-2014-5207 SMASH Issue 104985 UBUNTU:CVE-2014-5206 UBUNTU:CVE-2014-5207 UBUNTU:USN-2317-1 UBUNTU:USN-2318-1 XF:linux-kernel-cve20145207-sec-bypass(95266) bnc#891689 linux.git:commit:380cf5ba6b0a0b307f4afb62b186ca801defb203 rh#1113899 rh#1129662 |
CVE-2014-5207 | kernel-source-rt:Unsupported | important | () | BID:69214 BID:69216 CONFIRM:git.kernel.org:CVE-2014-5206 CONFIRM:git.kernel.org:CVE-2014-5207 CONFIRM:github.com:CVE-2014-5206 CONFIRM:github.com:CVE-2014-5207 CVE-2014-5206 CVE-2014-5207 CVE-2023-2002 D:CVE-2014-5206 D:CVE-2014-5207 EXPLOIT-DB:34923 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:MLIST:[oss-security] 20140813 Re: CVE Request: ro bind mount bypass using user namespaces MISC:git.kernel.org:OSS:2023/04/16/3 MISC:packetstormsecurity.com:CVE-2014-5207 MLIST:[oss-security] 20140812 CVE Request: ro bind mount bypass using user namespaces MLIST:[oss-security] 20140813 Re: CVE Request: ro bind mount bypass using user namespaces OSS:2014/Q3/357 OSS:2023/04/16/3 OSVDB:110055 RH:CVE-2014-5206 RH:CVE-2014-5207 SMASH Issue 104985 UBUNTU:CVE-2014-5206 UBUNTU:CVE-2014-5207 UBUNTU:USN-2317-1 UBUNTU:USN-2318-1 XF:linux-kernel-cve20145207-sec-bypass(95266) bnc#891689 linux.git:commit:380cf5ba6b0a0b307f4afb62b186ca801defb203 rh#1113899 rh#1129662 |
CVE-2014-5461 | lua53:Unsupported | moderate | () | BID:69342 CONFIRM:advisories.mageia.org:CVE-2014-5461 CONFIRM:www.lua.org:CVE-2014-5461 CVE-2014-5461 D:CVE-2014-5461 DSA-3015 DSA-3016 GENTOO:GLSA-201701-53 MANDRIVA:MDVSA-2015:144 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MLIST:[oss-security] 20140821 CVE request: possible overflow in vararg functions MLIST:[oss-security] 20140821 Re: CVE request: possible overflow in vararg functions MLIST:[oss-security] 20140827 Re: Lua CVE request [was Re: CVE request: possible overflow in vararg functions] RH:CVE-2014-5461 SECUNIA:59890 SECUNIA:60869 SECUNIA:61411 SMASH Issue 105370 SUSE:openSUSE-SU-2014:1145 UBUNTU:CVE-2014-5461 UBUNTU:USN-2338-1 bnc#893824 http://www.debian.org/security/2014/dsa-3015 http://www.debian.org/security/2014/dsa-3016 https://security.gentoo.org/glsa/202305-23 rh#1132304 |
CVE-2014-5471 | kernel-source-rt:Not affected | moderate | () | BID:69396 BID:69428 CONFIRM:git.kernel.org:CVE-2014-5472 CONFIRM:github.com:CVE-2014-5472 CVE-2014-5471 CVE-2014-5472 CVE-2023-2002 D:CVE-2014-5471 D:CVE-2014-5472 MISC:code.google.com:CVE-2014-5472 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[oss-security] 20140826 CVE Request: Linux Kernel unbound recursion in ISOFS MLIST:[oss-security] 20140827 Re: CVE Request: Linux Kernel unbound recursion in ISOFS OSS:2014/Q3/452 OSS:2023/04/16/3 RH:CVE-2014-5471 RH:CVE-2014-5472 RHSA-2014:1318 RHSA-2014:1997 RHSA-2015:0102 RHSA-2015:0695 RHSA-2015:0782 RHSA-2015:0803 SMASH Issue 105171 UBUNTU:CVE-2014-5471 UBUNTU:CVE-2014-5472 UBUNTU:USN-2354-1 UBUNTU:USN-2355-1 XF:linux-kernel-cve20145472-dos(95556) XF:linux-kernel-isofs-bo(95481) bnc#892490 rh#1113899 rh#1134099 rh#1163762 |
CVE-2014-5472 | kernel-source-rt:Not affected | moderate | () | BID:69396 BID:69428 CONFIRM:git.kernel.org:CVE-2014-5472 CONFIRM:github.com:CVE-2014-5472 CVE-2014-5471 CVE-2014-5472 CVE-2023-2002 D:CVE-2014-5471 D:CVE-2014-5472 MISC:code.google.com:CVE-2014-5472 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[oss-security] 20140826 CVE Request: Linux Kernel unbound recursion in ISOFS MLIST:[oss-security] 20140827 Re: CVE Request: Linux Kernel unbound recursion in ISOFS OSS:2014/Q3/452 OSS:2023/04/16/3 RH:CVE-2014-5471 RH:CVE-2014-5472 RHSA-2014:1318 RHSA-2014:1997 RHSA-2015:0102 RHSA-2015:0695 RHSA-2015:0782 RHSA-2015:0803 SMASH Issue 105171 UBUNTU:CVE-2014-5471 UBUNTU:CVE-2014-5472 UBUNTU:USN-2354-1 UBUNTU:USN-2355-1 XF:linux-kernel-cve20145472-dos(95556) XF:linux-kernel-isofs-bo(95481) bnc#892490 rh#1113899 rh#1134099 rh#1163762 |
CVE-2014-6410 | kernel-source-rt:Not affected | moderate | () | BID:69799 CONFIRM:git.kernel.org:CVE-2014-6410 CONFIRM:github.com:CVE-2014-6410 CVE-2014-6410 CVE-2023-2002 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:MLIST:[oss-security] 20140915 Re: CVE request for Linux kernel: udf: Avoid infinite loop when processing indirect ICBs MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[oss-security] 20140915 Re: CVE request for Linux kernel: udf: Avoid infinite loop when processing indirect ICBs OSS:2023/04/16/3 RH:CVE-2014-6410 RHSA-2014:1318 RHSA-2014:1971 RHSA-2014:1997 SMASH Issue 106168 UBUNTU:CVE-2014-6410 bnc#896689 rh#1113899 rh#1141809 |
CVE-2014-7145 | kernel-source-rt:Unsupported | important | () | BID:69867 CONFIRM:git.kernel.org:CVE-2014-7145 CONFIRM:github.com:CVE-2014-7145 CONFIRM:www.kernel.org:CVE-2014-7145 CVE-2014-7145 D:CVE-2014-7145 MLIST:[oss-security] 20140922 Re: CVE request: [CIFS] Possible null ptr deref in SMB2_tcon / Linux kernel RH:CVE-2014-7145 RHSA-2015:0102 SMASH Issue 108418 SMASH Issue 256286 UBUNTU:CVE-2014-7145 UBUNTU:USN-2394-1 bnc#897101 rh#1147522 |
CVE-2014-7283 | kernel-source-rt:Not affected | moderate | () | BID:70261 CONFIRM:git.kernel.org:CVE-2014-7283 CONFIRM:github.com:CVE-2014-7283 CONFIRM:www.kernel.org:CVE-2014-7283 CVE-2014-7283 MISC:git.kernel.org:MLIST:[oss-security] 20141002 xfs directory hash ordering bug MISC:oss.sgi.com:MLIST:[oss-security] 20141002 xfs directory hash ordering bug MLIST:[oss-security] 20141002 xfs directory hash ordering bug MLIST:[xfs] 20140327 xfs errors while unlinking filenames with hash collisions RH:CVE-2014-7283 RHSA-2014:1943 SMASH Issue 108844 UBUNTU:CVE-2014-7283 bnc#899480 rh#1148777 |
CVE-2014-7822 | kernel-source-rt:Not affected | moderate | () | BID:70854 BID:72347 BID:72357 CONFIRM:git.kernel.org:CVE-2014-8559 CONFIRM:github.com:CVE-2014-7822 CONFIRM:support.f5.com:CVE-2014-8559 CONFIRM:www.oracle.com CONFIRM:www.oracle.com:CVE-2015-8472 CVE-2014-7822 CVE-2014-8559 CVE-2015-1420 CVE-2023-2002 D:CVE-2015-1420 DSA-3170 EXPLOIT-DB:36743 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[linux-kernel] 20141025 fs: lockup on rename_mutex in fs/dcache.c:1035 MLIST:[linux-kernel] 20141026 Re: fs: lockup on rename_mutex in fs/dcache.c:1035 MLIST:[linux-kernel] 20150128 [PATCH v2] vfs: read file_handle only once in handle_to_path MLIST:[oss-security] 20141030 CVE-2014-8559 - Linux kernel fs/dcache.c incorrect use of rename_lock MLIST:[oss-security] 20150129 CVE-2015-1420 - Linux kernel fs/fhandle.c race condition OSS:2015/Q1/331 OSS:2023/04/16/3 OSS:2023/10/10/4 Oracle:CVE-2015-6937 RH:CVE-2014-7822 RH:CVE-2014-8559 RH:CVE-2015-1420 RHSA-2015:0102 RHSA-2015:0164 RHSA-2015:0674 RHSA-2015:0694 RHSA-2015:1976 RHSA-2015:1977 RHSA-2015:1978 SECTRACK:1034051 SECUNIA:62801 SMASH Issue 113306 SMASH Issue 155972 SUSE:SUSE-SU-2015:0178 SUSE:SUSE-SU-2015:0481 SUSE:SUSE-SU-2015:0529 SUSE:SUSE-SU-2015:0736 SUSE:SUSE-SU-2015:1488 SUSE:SUSE-SU-2015:1489 SUSE:openSUSE-SU-2015:0566 SUSE:openSUSE-SU-2015:0714 UBUNTU:CVE-2014-7822 UBUNTU:CVE-2014-8559 UBUNTU:CVE-2015-1420 UBUNTU:USN-2492-1 UBUNTU:USN-2493-1 UBUNTU:USN-2515-1 UBUNTU:USN-2516-1 UBUNTU:USN-2517-1 UBUNTU:USN-2518-1 UBUNTU:USN-2541-1 UBUNTU:USN-2542-1 UBUNTU:USN-2543-1 UBUNTU:USN-2544-1 UBUNTU:USN-2660-1 UBUNTU:USN-2661-1 UBUNTU:USN-2665-1 UBUNTU:USN-2667-1 bnc#915322 bnc#915517 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8d0207652cbe27d1f962050737848e5ad4671958 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 rh#1113899 rh#1159313 rh#1163762 rh#1163792 rh#1183744 rh#1187534 rh#1202855 rh#1243465 rh#2162080 rh#2162082 rh#2162084 rh#2162087 |
CVE-2014-7825 | kernel-source-rt:Ignore | important | () | BID:70972 CONFIRM:git.kernel.org:CVE-2014-7826 CONFIRM:github.com:CVE-2014-7826 CVE-2014-7825 D:CVE-2014-7825 MISC:git.kernel.org:MLIST:[oss-security] 20141106 Exploitable issues in Linux perf/ftrace subsystems MLIST:[oss-security] 20141106 Exploitable issues in Linux perf/ftrace subsystems RH:CVE-2014-7825 RHSA-2014:1943 RHSA-2015:0290 RHSA-2015:0864 SMASH Issue 110469 UBUNTU:CVE-2014-7825 XF:linux-kernel-cve20147825-dos(98557) bnc#904012 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=086ba77a6db00ed858ff07451bedee197df868c9 rh#1161565 |
CVE-2014-7841 | kernel-source-rt:Already fixed | moderate | () | BID:71081 CONFIRM:github.com:CVE-2014-7841 CONFIRM:linux.oracle.com:CVE-2014-7841 CONFIRM:support.f5.com:CVE-2014-7841 CONFIRM:www.kernel.org:CVE-2014-8884 CVE-2014-7841 CVE-2023-2002 DSA-3093 MISC:git.kernel.org:/ MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[oss-security] 20141113 CVE-2014-7841 Linux kernel: net: sctp: NULL pointer dereference in af->from_addr_param on malformed packet OSS:2023/04/16/3 RH:CVE-2014-7841 RHSA-2015:0087 RHSA-2015:0102 RHSA-2015:0284 RHSA-2015:0285 RHSA-2015:0695 SECUNIA:62305 SECUNIA:62597 SECUNIA:62735 SMASH Issue 155988 SMASH Issue 232562 SUSE:SUSE-SU-2015:0481 SUSE:SUSE-SU-2015:0529 SUSE:SUSE-SU-2015:0652 SUSE:openSUSE-SU-2015:0566 UBUNTU:CVE-2014-7841 bnc#905100 rh#1113899 rh#1163087 rh#1163762 rh#1163792 |
CVE-2014-7842 | kernel-source-rt:Not affected | moderate | () | BID:71078 CONFIRM:git.kernel.org:CVE-2014-7842 CONFIRM:github.com:CVE-2014-7842 CONFIRM:www.kernel.org:CVE-2014-7842 CONFIRM:www.oracle.com CONFIRM:www.oracle.com:CVE-2015-1351 CONFIRM:www.oracle.com:CVE-2015-8391 CVE-2014-7842 CVE-2023-2002 D:CVE-2014-7842 MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[oss-security] 20141113 CVE-2014-7842 Linux kernel: kvm: reporting emulation failures to userspace OSS:2014/Q4/605 OSS:2023/04/16/3 RH:CVE-2014-7842 RHSA-2015:2152 RHSA-2016:0855 SECUNIA:62326 SECUNIA:62336 SMASH Issue 110719 SUSE:SUSE-SU-2015:0481 SUSE:SUSE-SU-2015:0652 SUSE:SUSE-SU-2015:0736 SUSE:openSUSE-SU-2015:0566 UBUNTU:CVE-2014-7842 bnc#905312 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a2b9e6c1a35afcc0973acb72e591c714e78885ff rh#1113899 rh#1163762 rh#1163792 |
CVE-2014-7843 | kernel-source-rt:Ignore | moderate | () | BID:71082 CONFIRM:git.kernel.org:CVE-2014-7843 CONFIRM:github.com:CVE-2014-7843 CONFIRM:www.kernel.org:CVE-2014-8884 CVE-2014-7843 CVE-2016-0823 D:CVE-2014-7843 D:CVE-2022-2590 L3:45886 MLIST:[oss-security] 20141113 CVE-2014-7843 Linux kernel: aarch64: copying from /dev/zero causes local DoS OSS:2014/Q4/603 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 RH:CVE-2014-7843 SMASH Issue 110718 SMASH Issue 172067 UBUNTU:CVE-2014-7843 bnc#987709 bnc#994751 bnc#994752 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=97fc15436b36ee3956efad83e22a557991f7d19d linux.git:commit:5535be3099717646781ce1540cf725965d680e7b rh#1163744 rh#1384344 rh#2116175 |
CVE-2014-7923 | icu:Analysis | important | () | BID:72288 CONFIRM:advisories.mageia.org:CVE-2014-7940 CONFIRM:bugs.icu-project.org:CVE-2014-7923 CONFIRM:bugs.icu-project.org:CVE-2014-7926 CONFIRM:chromium.googlesource.com:CVE-2014-7926 CONFIRM:chromium.googlesource.com:CVE-2014-7937 CONFIRM:chromium.googlesource.com:CVE-2014-7940 CONFIRM:code.google.com:CVE-2014-7923 CONFIRM:code.google.com:CVE-2014-7924 CONFIRM:code.google.com:CVE-2014-7925 CONFIRM:code.google.com:CVE-2014-7926 CONFIRM:code.google.com:CVE-2014-7927 CONFIRM:code.google.com:CVE-2014-7928 CONFIRM:code.google.com:CVE-2014-7929 CONFIRM:code.google.com:CVE-2014-7930 CONFIRM:code.google.com:CVE-2014-7931 CONFIRM:code.google.com:CVE-2014-7932 CONFIRM:code.google.com:CVE-2014-7934 CONFIRM:code.google.com:CVE-2014-7935 CONFIRM:code.google.com:CVE-2014-7936 CONFIRM:code.google.com:CVE-2014-7937 CONFIRM:code.google.com:CVE-2014-7938 CONFIRM:code.google.com:CVE-2014-7939 CONFIRM:code.google.com:CVE-2014-7940 CONFIRM:code.google.com:CVE-2014-7941 CONFIRM:code.google.com:CVE-2014-7943 CONFIRM:code.google.com:CVE-2014-7944 CONFIRM:code.google.com:CVE-2014-7945 CONFIRM:code.google.com:CVE-2014-7946 CONFIRM:code.google.com:CVE-2014-7947 CONFIRM:code.google.com:CVE-2014-7948 CONFIRM:code.google.com:CVE-2015-1205 CONFIRM:code.google.com:CVE-2015-1231 CONFIRM:code.google.com:CVE-2015-1361 CONFIRM:codereview.chromium.org:CVE-2014-7924 CONFIRM:codereview.chromium.org:CVE-2014-7925 CONFIRM:codereview.chromium.org:CVE-2014-7926 CONFIRM:codereview.chromium.org:CVE-2014-7927 CONFIRM:codereview.chromium.org:CVE-2014-7928 CONFIRM:codereview.chromium.org:CVE-2014-7931 CONFIRM:codereview.chromium.org:CVE-2014-7935 CONFIRM:codereview.chromium.org:CVE-2014-7936 CONFIRM:codereview.chromium.org:CVE-2014-7941 CONFIRM:codereview.chromium.org:CVE-2014-7948 CONFIRM:git.videolan.org:CVE-2014-7937 CONFIRM:googlechromereleases.blogspot.com:CVE-2015-1361 CONFIRM:pdfium.googlesource.com:CVE-2014-7944 CONFIRM:pdfium.googlesource.com:CVE-2014-7945 CONFIRM:pdfium.googlesource.com:CVE-2014-7947 CONFIRM:src.chromium.org:CVE-2014-7925 CONFIRM:src.chromium.org:CVE-2014-7929 CONFIRM:src.chromium.org:CVE-2014-7930 CONFIRM:src.chromium.org:CVE-2014-7932 CONFIRM:src.chromium.org:CVE-2014-7934 CONFIRM:src.chromium.org:CVE-2014-7946 CONFIRM:www.oracle.com:CVE-2015-3814 CONFIRM:www.oracle.com:CVE-2015-4917 CVE-2014-7923 CVE-2014-7924 CVE-2014-7925 CVE-2014-7926 CVE-2014-7927 CVE-2014-7928 CVE-2014-7929 CVE-2014-7930 CVE-2014-7931 CVE-2014-7932 CVE-2014-7934 CVE-2014-7935 CVE-2014-7936 CVE-2014-7937 CVE-2014-7938 CVE-2014-7939 CVE-2014-7940 CVE-2014-7941 CVE-2014-7942 CVE-2014-7943 CVE-2014-7944 CVE-2014-7945 CVE-2014-7946 CVE-2014-7947 CVE-2014-7948 CVE-2015-1205 CVE-2015-1346 D:CVE-2015-1205 D:CVE-2015-1346 DSA-3187 GENTOO:GLSA-201502-13 GENTOO:GLSA-201503-06 OSS:2016/Q2/342 Oracle:CVE-2014-7940 RH:CVE-2014-7923 RH:CVE-2014-7924 RH:CVE-2014-7925 RH:CVE-2014-7926 RH:CVE-2014-7927 RH:CVE-2014-7928 RH:CVE-2014-7929 RH:CVE-2014-7930 RH:CVE-2014-7931 RH:CVE-2014-7932 RH:CVE-2014-7934 RH:CVE-2014-7935 RH:CVE-2014-7936 RH:CVE-2014-7937 RH:CVE-2014-7938 RH:CVE-2014-7939 RH:CVE-2014-7940 RH:CVE-2014-7941 RH:CVE-2014-7942 RH:CVE-2014-7943 RH:CVE-2014-7944 RH:CVE-2014-7945 RH:CVE-2014-7946 RH:CVE-2014-7947 RH:CVE-2014-7948 RH:CVE-2015-1205 RH:CVE-2015-1346 RHSA-2015:0093 SECTRACK:1031623 SECUNIA:62383 SECUNIA:62575 SECUNIA:62665 SMASH Issue 113097 SMASH Issue 113139 SUSE:openSUSE-SU-2015:0441 UBUNTU:CVE-2014-7923 UBUNTU:CVE-2014-7924 UBUNTU:CVE-2014-7925 UBUNTU:CVE-2014-7926 UBUNTU:CVE-2014-7927 UBUNTU:CVE-2014-7928 UBUNTU:CVE-2014-7929 UBUNTU:CVE-2014-7930 UBUNTU:CVE-2014-7931 UBUNTU:CVE-2014-7932 UBUNTU:CVE-2014-7934 UBUNTU:CVE-2014-7935 UBUNTU:CVE-2014-7936 UBUNTU:CVE-2014-7937 UBUNTU:CVE-2014-7938 UBUNTU:CVE-2014-7939 UBUNTU:CVE-2014-7940 UBUNTU:CVE-2014-7941 UBUNTU:CVE-2014-7942 UBUNTU:CVE-2014-7943 UBUNTU:CVE-2014-7944 UBUNTU:CVE-2014-7945 UBUNTU:CVE-2014-7946 UBUNTU:CVE-2014-7947 UBUNTU:CVE-2014-7948 UBUNTU:CVE-2015-1205 UBUNTU:CVE-2015-1346 UBUNTU:USN-2476-1 XF:google-v8-cve20151346-code-exec(100361) bdo#775884 bdo#776264 bdo#776265 bdo#776719 bnc#914468 rh#1185202 rh#1185203 rh#1185204 rh#1185205 rh#1185206 rh#1185208 rh#1185209 rh#1185210 rh#1185211 rh#1185212 rh#1185214 rh#1185215 rh#1185216 rh#1185217 rh#1185218 rh#1185219 rh#1185220 rh#1185221 rh#1185222 rh#1185223 rh#1185224 rh#1185225 rh#1185226 rh#1185229 rh#1185230 rh#1185282 rh#1185283 |
CVE-2014-7924 | icu:Analysis | important | () | BID:72288 CONFIRM:advisories.mageia.org:CVE-2014-7940 CONFIRM:bugs.icu-project.org:CVE-2014-7923 CONFIRM:bugs.icu-project.org:CVE-2014-7926 CONFIRM:chromium.googlesource.com:CVE-2014-7926 CONFIRM:chromium.googlesource.com:CVE-2014-7937 CONFIRM:chromium.googlesource.com:CVE-2014-7940 CONFIRM:code.google.com:CVE-2014-7923 CONFIRM:code.google.com:CVE-2014-7924 CONFIRM:code.google.com:CVE-2014-7925 CONFIRM:code.google.com:CVE-2014-7926 CONFIRM:code.google.com:CVE-2014-7927 CONFIRM:code.google.com:CVE-2014-7928 CONFIRM:code.google.com:CVE-2014-7929 CONFIRM:code.google.com:CVE-2014-7930 CONFIRM:code.google.com:CVE-2014-7931 CONFIRM:code.google.com:CVE-2014-7932 CONFIRM:code.google.com:CVE-2014-7934 CONFIRM:code.google.com:CVE-2014-7935 CONFIRM:code.google.com:CVE-2014-7936 CONFIRM:code.google.com:CVE-2014-7937 CONFIRM:code.google.com:CVE-2014-7938 CONFIRM:code.google.com:CVE-2014-7939 CONFIRM:code.google.com:CVE-2014-7940 CONFIRM:code.google.com:CVE-2014-7941 CONFIRM:code.google.com:CVE-2014-7943 CONFIRM:code.google.com:CVE-2014-7944 CONFIRM:code.google.com:CVE-2014-7945 CONFIRM:code.google.com:CVE-2014-7946 CONFIRM:code.google.com:CVE-2014-7947 CONFIRM:code.google.com:CVE-2014-7948 CONFIRM:code.google.com:CVE-2015-1205 CONFIRM:code.google.com:CVE-2015-1231 CONFIRM:code.google.com:CVE-2015-1361 CONFIRM:codereview.chromium.org:CVE-2014-7924 CONFIRM:codereview.chromium.org:CVE-2014-7925 CONFIRM:codereview.chromium.org:CVE-2014-7926 CONFIRM:codereview.chromium.org:CVE-2014-7927 CONFIRM:codereview.chromium.org:CVE-2014-7928 CONFIRM:codereview.chromium.org:CVE-2014-7931 CONFIRM:codereview.chromium.org:CVE-2014-7935 CONFIRM:codereview.chromium.org:CVE-2014-7936 CONFIRM:codereview.chromium.org:CVE-2014-7941 CONFIRM:codereview.chromium.org:CVE-2014-7948 CONFIRM:git.videolan.org:CVE-2014-7937 CONFIRM:googlechromereleases.blogspot.com:CVE-2015-1361 CONFIRM:pdfium.googlesource.com:CVE-2014-7944 CONFIRM:pdfium.googlesource.com:CVE-2014-7945 CONFIRM:pdfium.googlesource.com:CVE-2014-7947 CONFIRM:src.chromium.org:CVE-2014-7925 CONFIRM:src.chromium.org:CVE-2014-7929 CONFIRM:src.chromium.org:CVE-2014-7930 CONFIRM:src.chromium.org:CVE-2014-7932 CONFIRM:src.chromium.org:CVE-2014-7934 CONFIRM:src.chromium.org:CVE-2014-7946 CVE-2014-7923 CVE-2014-7924 CVE-2014-7925 CVE-2014-7926 CVE-2014-7927 CVE-2014-7928 CVE-2014-7929 CVE-2014-7930 CVE-2014-7931 CVE-2014-7932 CVE-2014-7934 CVE-2014-7935 CVE-2014-7936 CVE-2014-7937 CVE-2014-7938 CVE-2014-7939 CVE-2014-7940 CVE-2014-7941 CVE-2014-7942 CVE-2014-7943 CVE-2014-7944 CVE-2014-7945 CVE-2014-7946 CVE-2014-7947 CVE-2014-7948 CVE-2015-1205 CVE-2015-1346 D:CVE-2015-1205 D:CVE-2015-1346 DSA-3187 GENTOO:GLSA-201502-13 GENTOO:GLSA-201503-06 OSS:2016/Q2/342 Oracle:CVE-2014-7940 RH:CVE-2014-7923 RH:CVE-2014-7924 RH:CVE-2014-7925 RH:CVE-2014-7926 RH:CVE-2014-7927 RH:CVE-2014-7928 RH:CVE-2014-7929 RH:CVE-2014-7930 RH:CVE-2014-7931 RH:CVE-2014-7932 RH:CVE-2014-7934 RH:CVE-2014-7935 RH:CVE-2014-7936 RH:CVE-2014-7937 RH:CVE-2014-7938 RH:CVE-2014-7939 RH:CVE-2014-7940 RH:CVE-2014-7941 RH:CVE-2014-7942 RH:CVE-2014-7943 RH:CVE-2014-7944 RH:CVE-2014-7945 RH:CVE-2014-7946 RH:CVE-2014-7947 RH:CVE-2014-7948 RH:CVE-2015-1205 RH:CVE-2015-1346 RHSA-2015:0093 SECTRACK:1031623 SECUNIA:62383 SECUNIA:62575 SECUNIA:62665 SMASH Issue 113098 SMASH Issue 113139 SUSE:openSUSE-SU-2015:0441 UBUNTU:CVE-2014-7923 UBUNTU:CVE-2014-7924 UBUNTU:CVE-2014-7925 UBUNTU:CVE-2014-7926 UBUNTU:CVE-2014-7927 UBUNTU:CVE-2014-7928 UBUNTU:CVE-2014-7929 UBUNTU:CVE-2014-7930 UBUNTU:CVE-2014-7931 UBUNTU:CVE-2014-7932 UBUNTU:CVE-2014-7934 UBUNTU:CVE-2014-7935 UBUNTU:CVE-2014-7936 UBUNTU:CVE-2014-7937 UBUNTU:CVE-2014-7938 UBUNTU:CVE-2014-7939 UBUNTU:CVE-2014-7940 UBUNTU:CVE-2014-7941 UBUNTU:CVE-2014-7942 UBUNTU:CVE-2014-7943 UBUNTU:CVE-2014-7944 UBUNTU:CVE-2014-7945 UBUNTU:CVE-2014-7946 UBUNTU:CVE-2014-7947 UBUNTU:CVE-2014-7948 UBUNTU:CVE-2015-1205 UBUNTU:CVE-2015-1346 UBUNTU:USN-2476-1 XF:google-v8-cve20151346-code-exec(100361) bdo#775884 bdo#776264 bdo#776265 bdo#776719 bnc#914468 rh#1185202 rh#1185203 rh#1185204 rh#1185205 rh#1185206 rh#1185208 rh#1185209 rh#1185210 rh#1185211 rh#1185212 rh#1185214 rh#1185215 rh#1185216 rh#1185217 rh#1185218 rh#1185219 rh#1185220 rh#1185221 rh#1185222 rh#1185223 rh#1185224 rh#1185225 rh#1185226 rh#1185229 rh#1185230 rh#1185282 rh#1185283 |
CVE-2014-7925 | icu:Analysis | important | () | BID:72288 CONFIRM:advisories.mageia.org:CVE-2014-7940 CONFIRM:bugs.icu-project.org:CVE-2014-7923 CONFIRM:bugs.icu-project.org:CVE-2014-7926 CONFIRM:chromium.googlesource.com:CVE-2014-7926 CONFIRM:chromium.googlesource.com:CVE-2014-7937 CONFIRM:chromium.googlesource.com:CVE-2014-7940 CONFIRM:code.google.com:CVE-2014-7923 CONFIRM:code.google.com:CVE-2014-7924 CONFIRM:code.google.com:CVE-2014-7925 CONFIRM:code.google.com:CVE-2014-7926 CONFIRM:code.google.com:CVE-2014-7927 CONFIRM:code.google.com:CVE-2014-7928 CONFIRM:code.google.com:CVE-2014-7929 CONFIRM:code.google.com:CVE-2014-7930 CONFIRM:code.google.com:CVE-2014-7931 CONFIRM:code.google.com:CVE-2014-7932 CONFIRM:code.google.com:CVE-2014-7934 CONFIRM:code.google.com:CVE-2014-7935 CONFIRM:code.google.com:CVE-2014-7936 CONFIRM:code.google.com:CVE-2014-7937 CONFIRM:code.google.com:CVE-2014-7938 CONFIRM:code.google.com:CVE-2014-7939 CONFIRM:code.google.com:CVE-2014-7940 CONFIRM:code.google.com:CVE-2014-7941 CONFIRM:code.google.com:CVE-2014-7943 CONFIRM:code.google.com:CVE-2014-7944 CONFIRM:code.google.com:CVE-2014-7945 CONFIRM:code.google.com:CVE-2014-7946 CONFIRM:code.google.com:CVE-2014-7947 CONFIRM:code.google.com:CVE-2014-7948 CONFIRM:code.google.com:CVE-2015-1205 CONFIRM:code.google.com:CVE-2015-1231 CONFIRM:code.google.com:CVE-2015-1361 CONFIRM:codereview.chromium.org:CVE-2014-7924 CONFIRM:codereview.chromium.org:CVE-2014-7925 CONFIRM:codereview.chromium.org:CVE-2014-7926 CONFIRM:codereview.chromium.org:CVE-2014-7927 CONFIRM:codereview.chromium.org:CVE-2014-7928 CONFIRM:codereview.chromium.org:CVE-2014-7931 CONFIRM:codereview.chromium.org:CVE-2014-7935 CONFIRM:codereview.chromium.org:CVE-2014-7936 CONFIRM:codereview.chromium.org:CVE-2014-7941 CONFIRM:codereview.chromium.org:CVE-2014-7948 CONFIRM:git.videolan.org:CVE-2014-7937 CONFIRM:googlechromereleases.blogspot.com:CVE-2015-1361 CONFIRM:pdfium.googlesource.com:CVE-2014-7944 CONFIRM:pdfium.googlesource.com:CVE-2014-7945 CONFIRM:pdfium.googlesource.com:CVE-2014-7947 CONFIRM:src.chromium.org:CVE-2014-7925 CONFIRM:src.chromium.org:CVE-2014-7929 CONFIRM:src.chromium.org:CVE-2014-7930 CONFIRM:src.chromium.org:CVE-2014-7932 CONFIRM:src.chromium.org:CVE-2014-7934 CONFIRM:src.chromium.org:CVE-2014-7946 CVE-2014-7923 CVE-2014-7924 CVE-2014-7925 CVE-2014-7926 CVE-2014-7927 CVE-2014-7928 CVE-2014-7929 CVE-2014-7930 CVE-2014-7931 CVE-2014-7932 CVE-2014-7934 CVE-2014-7935 CVE-2014-7936 CVE-2014-7937 CVE-2014-7938 CVE-2014-7939 CVE-2014-7940 CVE-2014-7941 CVE-2014-7942 CVE-2014-7943 CVE-2014-7944 CVE-2014-7945 CVE-2014-7946 CVE-2014-7947 CVE-2014-7948 CVE-2015-1205 CVE-2015-1346 D:CVE-2015-1205 D:CVE-2015-1346 DSA-3187 GENTOO:GLSA-201502-13 GENTOO:GLSA-201503-06 OSS:2016/Q2/342 Oracle:CVE-2014-7940 RH:CVE-2014-7923 RH:CVE-2014-7924 RH:CVE-2014-7925 RH:CVE-2014-7926 RH:CVE-2014-7927 RH:CVE-2014-7928 RH:CVE-2014-7929 RH:CVE-2014-7930 RH:CVE-2014-7931 RH:CVE-2014-7932 RH:CVE-2014-7934 RH:CVE-2014-7935 RH:CVE-2014-7936 RH:CVE-2014-7937 RH:CVE-2014-7938 RH:CVE-2014-7939 RH:CVE-2014-7940 RH:CVE-2014-7941 RH:CVE-2014-7942 RH:CVE-2014-7943 RH:CVE-2014-7944 RH:CVE-2014-7945 RH:CVE-2014-7946 RH:CVE-2014-7947 RH:CVE-2014-7948 RH:CVE-2015-1205 RH:CVE-2015-1346 RHSA-2015:0093 SECTRACK:1031623 SECUNIA:62383 SECUNIA:62575 SECUNIA:62665 SMASH Issue 113099 SMASH Issue 113139 SUSE:openSUSE-SU-2015:0441 UBUNTU:CVE-2014-7923 UBUNTU:CVE-2014-7924 UBUNTU:CVE-2014-7925 UBUNTU:CVE-2014-7926 UBUNTU:CVE-2014-7927 UBUNTU:CVE-2014-7928 UBUNTU:CVE-2014-7929 UBUNTU:CVE-2014-7930 UBUNTU:CVE-2014-7931 UBUNTU:CVE-2014-7932 UBUNTU:CVE-2014-7934 UBUNTU:CVE-2014-7935 UBUNTU:CVE-2014-7936 UBUNTU:CVE-2014-7937 UBUNTU:CVE-2014-7938 UBUNTU:CVE-2014-7939 UBUNTU:CVE-2014-7940 UBUNTU:CVE-2014-7941 UBUNTU:CVE-2014-7942 UBUNTU:CVE-2014-7943 UBUNTU:CVE-2014-7944 UBUNTU:CVE-2014-7945 UBUNTU:CVE-2014-7946 UBUNTU:CVE-2014-7947 UBUNTU:CVE-2014-7948 UBUNTU:CVE-2015-1205 UBUNTU:CVE-2015-1346 UBUNTU:USN-2476-1 XF:google-v8-cve20151346-code-exec(100361) bdo#775884 bdo#776264 bdo#776265 bdo#776719 bnc#914468 rh#1185202 rh#1185203 rh#1185204 rh#1185205 rh#1185206 rh#1185208 rh#1185209 rh#1185210 rh#1185211 rh#1185212 rh#1185214 rh#1185215 rh#1185216 rh#1185217 rh#1185218 rh#1185219 rh#1185220 rh#1185221 rh#1185222 rh#1185223 rh#1185224 rh#1185225 rh#1185226 rh#1185229 rh#1185230 rh#1185282 rh#1185283 |
CVE-2014-7926 | icu:Analysis | important | () | BID:72288 CONFIRM:advisories.mageia.org:CVE-2014-7940 CONFIRM:bugs.icu-project.org:CVE-2014-7923 CONFIRM:bugs.icu-project.org:CVE-2014-7926 CONFIRM:chromium.googlesource.com:CVE-2014-7926 CONFIRM:chromium.googlesource.com:CVE-2014-7937 CONFIRM:chromium.googlesource.com:CVE-2014-7940 CONFIRM:code.google.com:CVE-2014-7923 CONFIRM:code.google.com:CVE-2014-7924 CONFIRM:code.google.com:CVE-2014-7925 CONFIRM:code.google.com:CVE-2014-7926 CONFIRM:code.google.com:CVE-2014-7927 CONFIRM:code.google.com:CVE-2014-7928 CONFIRM:code.google.com:CVE-2014-7929 CONFIRM:code.google.com:CVE-2014-7930 CONFIRM:code.google.com:CVE-2014-7931 CONFIRM:code.google.com:CVE-2014-7932 CONFIRM:code.google.com:CVE-2014-7934 CONFIRM:code.google.com:CVE-2014-7935 CONFIRM:code.google.com:CVE-2014-7936 CONFIRM:code.google.com:CVE-2014-7937 CONFIRM:code.google.com:CVE-2014-7938 CONFIRM:code.google.com:CVE-2014-7939 CONFIRM:code.google.com:CVE-2014-7940 CONFIRM:code.google.com:CVE-2014-7941 CONFIRM:code.google.com:CVE-2014-7943 CONFIRM:code.google.com:CVE-2014-7944 CONFIRM:code.google.com:CVE-2014-7945 CONFIRM:code.google.com:CVE-2014-7946 CONFIRM:code.google.com:CVE-2014-7947 CONFIRM:code.google.com:CVE-2014-7948 CONFIRM:code.google.com:CVE-2015-1205 CONFIRM:code.google.com:CVE-2015-1231 CONFIRM:code.google.com:CVE-2015-1361 CONFIRM:codereview.chromium.org:CVE-2014-7924 CONFIRM:codereview.chromium.org:CVE-2014-7925 CONFIRM:codereview.chromium.org:CVE-2014-7926 CONFIRM:codereview.chromium.org:CVE-2014-7927 CONFIRM:codereview.chromium.org:CVE-2014-7928 CONFIRM:codereview.chromium.org:CVE-2014-7931 CONFIRM:codereview.chromium.org:CVE-2014-7935 CONFIRM:codereview.chromium.org:CVE-2014-7936 CONFIRM:codereview.chromium.org:CVE-2014-7941 CONFIRM:codereview.chromium.org:CVE-2014-7948 CONFIRM:git.videolan.org:CVE-2014-7937 CONFIRM:googlechromereleases.blogspot.com:CVE-2015-1361 CONFIRM:pdfium.googlesource.com:CVE-2014-7944 CONFIRM:pdfium.googlesource.com:CVE-2014-7945 CONFIRM:pdfium.googlesource.com:CVE-2014-7947 CONFIRM:src.chromium.org:CVE-2014-7925 CONFIRM:src.chromium.org:CVE-2014-7929 CONFIRM:src.chromium.org:CVE-2014-7930 CONFIRM:src.chromium.org:CVE-2014-7932 CONFIRM:src.chromium.org:CVE-2014-7934 CONFIRM:src.chromium.org:CVE-2014-7946 CONFIRM:www.oracle.com:CVE-2015-3814 CONFIRM:www.oracle.com:CVE-2015-4917 CVE-2014-7923 CVE-2014-7924 CVE-2014-7925 CVE-2014-7926 CVE-2014-7927 CVE-2014-7928 CVE-2014-7929 CVE-2014-7930 CVE-2014-7931 CVE-2014-7932 CVE-2014-7934 CVE-2014-7935 CVE-2014-7936 CVE-2014-7937 CVE-2014-7938 CVE-2014-7939 CVE-2014-7940 CVE-2014-7941 CVE-2014-7942 CVE-2014-7943 CVE-2014-7944 CVE-2014-7945 CVE-2014-7946 CVE-2014-7947 CVE-2014-7948 CVE-2015-1205 CVE-2015-1346 D:CVE-2015-1205 D:CVE-2015-1346 DSA-3187 GENTOO:GLSA-201502-13 GENTOO:GLSA-201503-06 OSS:2016/Q2/342 Oracle:CVE-2014-7940 RH:CVE-2014-7923 RH:CVE-2014-7924 RH:CVE-2014-7925 RH:CVE-2014-7926 RH:CVE-2014-7927 RH:CVE-2014-7928 RH:CVE-2014-7929 RH:CVE-2014-7930 RH:CVE-2014-7931 RH:CVE-2014-7932 RH:CVE-2014-7934 RH:CVE-2014-7935 RH:CVE-2014-7936 RH:CVE-2014-7937 RH:CVE-2014-7938 RH:CVE-2014-7939 RH:CVE-2014-7940 RH:CVE-2014-7941 RH:CVE-2014-7942 RH:CVE-2014-7943 RH:CVE-2014-7944 RH:CVE-2014-7945 RH:CVE-2014-7946 RH:CVE-2014-7947 RH:CVE-2014-7948 RH:CVE-2015-1205 RH:CVE-2015-1346 RHSA-2015:0093 SECTRACK:1031623 SECUNIA:62383 SECUNIA:62575 SECUNIA:62665 SMASH Issue 113100 SMASH Issue 113139 SUSE:openSUSE-SU-2015:0441 UBUNTU:CVE-2014-7923 UBUNTU:CVE-2014-7924 UBUNTU:CVE-2014-7925 UBUNTU:CVE-2014-7926 UBUNTU:CVE-2014-7927 UBUNTU:CVE-2014-7928 UBUNTU:CVE-2014-7929 UBUNTU:CVE-2014-7930 UBUNTU:CVE-2014-7931 UBUNTU:CVE-2014-7932 UBUNTU:CVE-2014-7934 UBUNTU:CVE-2014-7935 UBUNTU:CVE-2014-7936 UBUNTU:CVE-2014-7937 UBUNTU:CVE-2014-7938 UBUNTU:CVE-2014-7939 UBUNTU:CVE-2014-7940 UBUNTU:CVE-2014-7941 UBUNTU:CVE-2014-7942 UBUNTU:CVE-2014-7943 UBUNTU:CVE-2014-7944 UBUNTU:CVE-2014-7945 UBUNTU:CVE-2014-7946 UBUNTU:CVE-2014-7947 UBUNTU:CVE-2014-7948 UBUNTU:CVE-2015-1205 UBUNTU:CVE-2015-1346 UBUNTU:USN-2476-1 XF:google-v8-cve20151346-code-exec(100361) bdo#775884 bdo#776264 bdo#776265 bdo#776719 bnc#914468 rh#1185202 rh#1185203 rh#1185204 rh#1185205 rh#1185206 rh#1185208 rh#1185209 rh#1185210 rh#1185211 rh#1185212 rh#1185214 rh#1185215 rh#1185216 rh#1185217 rh#1185218 rh#1185219 rh#1185220 rh#1185221 rh#1185222 rh#1185223 rh#1185224 rh#1185225 rh#1185226 rh#1185229 rh#1185230 rh#1185282 rh#1185283 |
CVE-2014-7927 | icu:Analysis | important | () | BID:72288 CONFIRM:advisories.mageia.org:CVE-2014-7940 CONFIRM:bugs.icu-project.org:CVE-2014-7923 CONFIRM:bugs.icu-project.org:CVE-2014-7926 CONFIRM:chromium.googlesource.com:CVE-2014-7926 CONFIRM:chromium.googlesource.com:CVE-2014-7937 CONFIRM:chromium.googlesource.com:CVE-2014-7940 CONFIRM:code.google.com:CVE-2014-7923 CONFIRM:code.google.com:CVE-2014-7924 CONFIRM:code.google.com:CVE-2014-7925 CONFIRM:code.google.com:CVE-2014-7926 CONFIRM:code.google.com:CVE-2014-7927 CONFIRM:code.google.com:CVE-2014-7928 CONFIRM:code.google.com:CVE-2014-7929 CONFIRM:code.google.com:CVE-2014-7930 CONFIRM:code.google.com:CVE-2014-7931 CONFIRM:code.google.com:CVE-2014-7932 CONFIRM:code.google.com:CVE-2014-7934 CONFIRM:code.google.com:CVE-2014-7935 CONFIRM:code.google.com:CVE-2014-7936 CONFIRM:code.google.com:CVE-2014-7937 CONFIRM:code.google.com:CVE-2014-7938 CONFIRM:code.google.com:CVE-2014-7939 CONFIRM:code.google.com:CVE-2014-7940 CONFIRM:code.google.com:CVE-2014-7941 CONFIRM:code.google.com:CVE-2014-7943 CONFIRM:code.google.com:CVE-2014-7944 CONFIRM:code.google.com:CVE-2014-7945 CONFIRM:code.google.com:CVE-2014-7946 CONFIRM:code.google.com:CVE-2014-7947 CONFIRM:code.google.com:CVE-2014-7948 CONFIRM:code.google.com:CVE-2015-1205 CONFIRM:code.google.com:CVE-2015-1231 CONFIRM:code.google.com:CVE-2015-1361 CONFIRM:codereview.chromium.org:CVE-2014-7924 CONFIRM:codereview.chromium.org:CVE-2014-7925 CONFIRM:codereview.chromium.org:CVE-2014-7926 CONFIRM:codereview.chromium.org:CVE-2014-7927 CONFIRM:codereview.chromium.org:CVE-2014-7928 CONFIRM:codereview.chromium.org:CVE-2014-7931 CONFIRM:codereview.chromium.org:CVE-2014-7935 CONFIRM:codereview.chromium.org:CVE-2014-7936 CONFIRM:codereview.chromium.org:CVE-2014-7941 CONFIRM:codereview.chromium.org:CVE-2014-7948 CONFIRM:git.videolan.org:CVE-2014-7937 CONFIRM:googlechromereleases.blogspot.com:CVE-2015-1361 CONFIRM:pdfium.googlesource.com:CVE-2014-7944 CONFIRM:pdfium.googlesource.com:CVE-2014-7945 CONFIRM:pdfium.googlesource.com:CVE-2014-7947 CONFIRM:src.chromium.org:CVE-2014-7925 CONFIRM:src.chromium.org:CVE-2014-7929 CONFIRM:src.chromium.org:CVE-2014-7930 CONFIRM:src.chromium.org:CVE-2014-7932 CONFIRM:src.chromium.org:CVE-2014-7934 CONFIRM:src.chromium.org:CVE-2014-7946 CVE-2014-7923 CVE-2014-7924 CVE-2014-7925 CVE-2014-7926 CVE-2014-7927 CVE-2014-7928 CVE-2014-7929 CVE-2014-7930 CVE-2014-7931 CVE-2014-7932 CVE-2014-7934 CVE-2014-7935 CVE-2014-7936 CVE-2014-7937 CVE-2014-7938 CVE-2014-7939 CVE-2014-7940 CVE-2014-7941 CVE-2014-7942 CVE-2014-7943 CVE-2014-7944 CVE-2014-7945 CVE-2014-7946 CVE-2014-7947 CVE-2014-7948 CVE-2015-1205 CVE-2015-1346 D:CVE-2015-1205 D:CVE-2015-1346 DSA-3187 GENTOO:GLSA-201502-13 GENTOO:GLSA-201503-06 OSS:2016/Q2/342 Oracle:CVE-2014-7940 RH:CVE-2014-7923 RH:CVE-2014-7924 RH:CVE-2014-7925 RH:CVE-2014-7926 RH:CVE-2014-7927 RH:CVE-2014-7928 RH:CVE-2014-7929 RH:CVE-2014-7930 RH:CVE-2014-7931 RH:CVE-2014-7932 RH:CVE-2014-7934 RH:CVE-2014-7935 RH:CVE-2014-7936 RH:CVE-2014-7937 RH:CVE-2014-7938 RH:CVE-2014-7939 RH:CVE-2014-7940 RH:CVE-2014-7941 RH:CVE-2014-7942 RH:CVE-2014-7943 RH:CVE-2014-7944 RH:CVE-2014-7945 RH:CVE-2014-7946 RH:CVE-2014-7947 RH:CVE-2014-7948 RH:CVE-2015-1205 RH:CVE-2015-1346 RHSA-2015:0093 SECTRACK:1031623 SECUNIA:62383 SECUNIA:62575 SECUNIA:62665 SMASH Issue 113101 SMASH Issue 113139 SUSE:openSUSE-SU-2015:0441 UBUNTU:CVE-2014-7923 UBUNTU:CVE-2014-7924 UBUNTU:CVE-2014-7925 UBUNTU:CVE-2014-7926 UBUNTU:CVE-2014-7927 UBUNTU:CVE-2014-7928 UBUNTU:CVE-2014-7929 UBUNTU:CVE-2014-7930 UBUNTU:CVE-2014-7931 UBUNTU:CVE-2014-7932 UBUNTU:CVE-2014-7934 UBUNTU:CVE-2014-7935 UBUNTU:CVE-2014-7936 UBUNTU:CVE-2014-7937 UBUNTU:CVE-2014-7938 UBUNTU:CVE-2014-7939 UBUNTU:CVE-2014-7940 UBUNTU:CVE-2014-7941 UBUNTU:CVE-2014-7942 UBUNTU:CVE-2014-7943 UBUNTU:CVE-2014-7944 UBUNTU:CVE-2014-7945 UBUNTU:CVE-2014-7946 UBUNTU:CVE-2014-7947 UBUNTU:CVE-2014-7948 UBUNTU:CVE-2015-1205 UBUNTU:CVE-2015-1346 UBUNTU:USN-2476-1 XF:google-v8-cve20151346-code-exec(100361) bdo#775884 bdo#776264 bdo#776265 bdo#776719 bnc#914468 rh#1185202 rh#1185203 rh#1185204 rh#1185205 rh#1185206 rh#1185208 rh#1185209 rh#1185210 rh#1185211 rh#1185212 rh#1185214 rh#1185215 rh#1185216 rh#1185217 rh#1185218 rh#1185219 rh#1185220 rh#1185221 rh#1185222 rh#1185223 rh#1185224 rh#1185225 rh#1185226 rh#1185229 rh#1185230 rh#1185282 rh#1185283 |
CVE-2014-7928 | icu:Analysis | important | () | BID:72288 CONFIRM:advisories.mageia.org:CVE-2014-7940 CONFIRM:bugs.icu-project.org:CVE-2014-7923 CONFIRM:bugs.icu-project.org:CVE-2014-7926 CONFIRM:chromium.googlesource.com:CVE-2014-7926 CONFIRM:chromium.googlesource.com:CVE-2014-7937 CONFIRM:chromium.googlesource.com:CVE-2014-7940 CONFIRM:code.google.com:CVE-2014-7923 CONFIRM:code.google.com:CVE-2014-7924 CONFIRM:code.google.com:CVE-2014-7925 CONFIRM:code.google.com:CVE-2014-7926 CONFIRM:code.google.com:CVE-2014-7927 CONFIRM:code.google.com:CVE-2014-7928 CONFIRM:code.google.com:CVE-2014-7929 CONFIRM:code.google.com:CVE-2014-7930 CONFIRM:code.google.com:CVE-2014-7931 CONFIRM:code.google.com:CVE-2014-7932 CONFIRM:code.google.com:CVE-2014-7934 CONFIRM:code.google.com:CVE-2014-7935 CONFIRM:code.google.com:CVE-2014-7936 CONFIRM:code.google.com:CVE-2014-7937 CONFIRM:code.google.com:CVE-2014-7938 CONFIRM:code.google.com:CVE-2014-7939 CONFIRM:code.google.com:CVE-2014-7940 CONFIRM:code.google.com:CVE-2014-7941 CONFIRM:code.google.com:CVE-2014-7943 CONFIRM:code.google.com:CVE-2014-7944 CONFIRM:code.google.com:CVE-2014-7945 CONFIRM:code.google.com:CVE-2014-7946 CONFIRM:code.google.com:CVE-2014-7947 CONFIRM:code.google.com:CVE-2014-7948 CONFIRM:code.google.com:CVE-2015-1205 CONFIRM:code.google.com:CVE-2015-1231 CONFIRM:code.google.com:CVE-2015-1361 CONFIRM:codereview.chromium.org:CVE-2014-7924 CONFIRM:codereview.chromium.org:CVE-2014-7925 CONFIRM:codereview.chromium.org:CVE-2014-7926 CONFIRM:codereview.chromium.org:CVE-2014-7927 CONFIRM:codereview.chromium.org:CVE-2014-7928 CONFIRM:codereview.chromium.org:CVE-2014-7931 CONFIRM:codereview.chromium.org:CVE-2014-7935 CONFIRM:codereview.chromium.org:CVE-2014-7936 CONFIRM:codereview.chromium.org:CVE-2014-7941 CONFIRM:codereview.chromium.org:CVE-2014-7948 CONFIRM:git.videolan.org:CVE-2014-7937 CONFIRM:googlechromereleases.blogspot.com:CVE-2015-1361 CONFIRM:pdfium.googlesource.com:CVE-2014-7944 CONFIRM:pdfium.googlesource.com:CVE-2014-7945 CONFIRM:pdfium.googlesource.com:CVE-2014-7947 CONFIRM:src.chromium.org:CVE-2014-7925 CONFIRM:src.chromium.org:CVE-2014-7929 CONFIRM:src.chromium.org:CVE-2014-7930 CONFIRM:src.chromium.org:CVE-2014-7932 CONFIRM:src.chromium.org:CVE-2014-7934 CONFIRM:src.chromium.org:CVE-2014-7946 CVE-2014-7923 CVE-2014-7924 CVE-2014-7925 CVE-2014-7926 CVE-2014-7927 CVE-2014-7928 CVE-2014-7929 CVE-2014-7930 CVE-2014-7931 CVE-2014-7932 CVE-2014-7934 CVE-2014-7935 CVE-2014-7936 CVE-2014-7937 CVE-2014-7938 CVE-2014-7939 CVE-2014-7940 CVE-2014-7941 CVE-2014-7942 CVE-2014-7943 CVE-2014-7944 CVE-2014-7945 CVE-2014-7946 CVE-2014-7947 CVE-2014-7948 CVE-2015-1205 CVE-2015-1346 D:CVE-2015-1205 D:CVE-2015-1346 DSA-3187 GENTOO:GLSA-201502-13 GENTOO:GLSA-201503-06 OSS:2016/Q2/342 Oracle:CVE-2014-7940 RH:CVE-2014-7923 RH:CVE-2014-7924 RH:CVE-2014-7925 RH:CVE-2014-7926 RH:CVE-2014-7927 RH:CVE-2014-7928 RH:CVE-2014-7929 RH:CVE-2014-7930 RH:CVE-2014-7931 RH:CVE-2014-7932 RH:CVE-2014-7934 RH:CVE-2014-7935 RH:CVE-2014-7936 RH:CVE-2014-7937 RH:CVE-2014-7938 RH:CVE-2014-7939 RH:CVE-2014-7940 RH:CVE-2014-7941 RH:CVE-2014-7942 RH:CVE-2014-7943 RH:CVE-2014-7944 RH:CVE-2014-7945 RH:CVE-2014-7946 RH:CVE-2014-7947 RH:CVE-2014-7948 RH:CVE-2015-1205 RH:CVE-2015-1346 RHSA-2015:0093 SECTRACK:1031623 SECUNIA:62383 SECUNIA:62575 SECUNIA:62665 SMASH Issue 113102 SMASH Issue 113139 SUSE:openSUSE-SU-2015:0441 UBUNTU:CVE-2014-7923 UBUNTU:CVE-2014-7924 UBUNTU:CVE-2014-7925 UBUNTU:CVE-2014-7926 UBUNTU:CVE-2014-7927 UBUNTU:CVE-2014-7928 UBUNTU:CVE-2014-7929 UBUNTU:CVE-2014-7930 UBUNTU:CVE-2014-7931 UBUNTU:CVE-2014-7932 UBUNTU:CVE-2014-7934 UBUNTU:CVE-2014-7935 UBUNTU:CVE-2014-7936 UBUNTU:CVE-2014-7937 UBUNTU:CVE-2014-7938 UBUNTU:CVE-2014-7939 UBUNTU:CVE-2014-7940 UBUNTU:CVE-2014-7941 UBUNTU:CVE-2014-7942 UBUNTU:CVE-2014-7943 UBUNTU:CVE-2014-7944 UBUNTU:CVE-2014-7945 UBUNTU:CVE-2014-7946 UBUNTU:CVE-2014-7947 UBUNTU:CVE-2014-7948 UBUNTU:CVE-2015-1205 UBUNTU:CVE-2015-1346 UBUNTU:USN-2476-1 XF:google-v8-cve20151346-code-exec(100361) bdo#775884 bdo#776264 bdo#776265 bdo#776719 bnc#914468 rh#1185202 rh#1185203 rh#1185204 rh#1185205 rh#1185206 rh#1185208 rh#1185209 rh#1185210 rh#1185211 rh#1185212 rh#1185214 rh#1185215 rh#1185216 rh#1185217 rh#1185218 rh#1185219 rh#1185220 rh#1185221 rh#1185222 rh#1185223 rh#1185224 rh#1185225 rh#1185226 rh#1185229 rh#1185230 rh#1185282 rh#1185283 |
CVE-2014-7929 | icu:Analysis | important | () | BID:72288 CONFIRM:advisories.mageia.org:CVE-2014-7940 CONFIRM:bugs.icu-project.org:CVE-2014-7923 CONFIRM:bugs.icu-project.org:CVE-2014-7926 CONFIRM:chromium.googlesource.com:CVE-2014-7926 CONFIRM:chromium.googlesource.com:CVE-2014-7937 CONFIRM:chromium.googlesource.com:CVE-2014-7940 CONFIRM:code.google.com:CVE-2014-7923 CONFIRM:code.google.com:CVE-2014-7924 CONFIRM:code.google.com:CVE-2014-7925 CONFIRM:code.google.com:CVE-2014-7926 CONFIRM:code.google.com:CVE-2014-7927 CONFIRM:code.google.com:CVE-2014-7928 CONFIRM:code.google.com:CVE-2014-7929 CONFIRM:code.google.com:CVE-2014-7930 CONFIRM:code.google.com:CVE-2014-7931 CONFIRM:code.google.com:CVE-2014-7932 CONFIRM:code.google.com:CVE-2014-7934 CONFIRM:code.google.com:CVE-2014-7935 CONFIRM:code.google.com:CVE-2014-7936 CONFIRM:code.google.com:CVE-2014-7937 CONFIRM:code.google.com:CVE-2014-7938 CONFIRM:code.google.com:CVE-2014-7939 CONFIRM:code.google.com:CVE-2014-7940 CONFIRM:code.google.com:CVE-2014-7941 CONFIRM:code.google.com:CVE-2014-7943 CONFIRM:code.google.com:CVE-2014-7944 CONFIRM:code.google.com:CVE-2014-7945 CONFIRM:code.google.com:CVE-2014-7946 CONFIRM:code.google.com:CVE-2014-7947 CONFIRM:code.google.com:CVE-2014-7948 CONFIRM:code.google.com:CVE-2015-1205 CONFIRM:code.google.com:CVE-2015-1231 CONFIRM:code.google.com:CVE-2015-1361 CONFIRM:codereview.chromium.org:CVE-2014-7924 CONFIRM:codereview.chromium.org:CVE-2014-7925 CONFIRM:codereview.chromium.org:CVE-2014-7926 CONFIRM:codereview.chromium.org:CVE-2014-7927 CONFIRM:codereview.chromium.org:CVE-2014-7928 CONFIRM:codereview.chromium.org:CVE-2014-7931 CONFIRM:codereview.chromium.org:CVE-2014-7935 CONFIRM:codereview.chromium.org:CVE-2014-7936 CONFIRM:codereview.chromium.org:CVE-2014-7941 CONFIRM:codereview.chromium.org:CVE-2014-7948 CONFIRM:git.videolan.org:CVE-2014-7937 CONFIRM:googlechromereleases.blogspot.com:CVE-2015-1361 CONFIRM:pdfium.googlesource.com:CVE-2014-7944 CONFIRM:pdfium.googlesource.com:CVE-2014-7945 CONFIRM:pdfium.googlesource.com:CVE-2014-7947 CONFIRM:src.chromium.org:CVE-2014-7925 CONFIRM:src.chromium.org:CVE-2014-7929 CONFIRM:src.chromium.org:CVE-2014-7930 CONFIRM:src.chromium.org:CVE-2014-7932 CONFIRM:src.chromium.org:CVE-2014-7934 CONFIRM:src.chromium.org:CVE-2014-7946 CVE-2014-7923 CVE-2014-7924 CVE-2014-7925 CVE-2014-7926 CVE-2014-7927 CVE-2014-7928 CVE-2014-7929 CVE-2014-7930 CVE-2014-7931 CVE-2014-7932 CVE-2014-7934 CVE-2014-7935 CVE-2014-7936 CVE-2014-7937 CVE-2014-7938 CVE-2014-7939 CVE-2014-7940 CVE-2014-7941 CVE-2014-7942 CVE-2014-7943 CVE-2014-7944 CVE-2014-7945 CVE-2014-7946 CVE-2014-7947 CVE-2014-7948 CVE-2015-1205 CVE-2015-1346 D:CVE-2015-1205 D:CVE-2015-1346 DSA-3187 GENTOO:GLSA-201502-13 GENTOO:GLSA-201503-06 OSS:2016/Q2/342 Oracle:CVE-2014-7940 RH:CVE-2014-7923 RH:CVE-2014-7924 RH:CVE-2014-7925 RH:CVE-2014-7926 RH:CVE-2014-7927 RH:CVE-2014-7928 RH:CVE-2014-7929 RH:CVE-2014-7930 RH:CVE-2014-7931 RH:CVE-2014-7932 RH:CVE-2014-7934 RH:CVE-2014-7935 RH:CVE-2014-7936 RH:CVE-2014-7937 RH:CVE-2014-7938 RH:CVE-2014-7939 RH:CVE-2014-7940 RH:CVE-2014-7941 RH:CVE-2014-7942 RH:CVE-2014-7943 RH:CVE-2014-7944 RH:CVE-2014-7945 RH:CVE-2014-7946 RH:CVE-2014-7947 RH:CVE-2014-7948 RH:CVE-2015-1205 RH:CVE-2015-1346 RHSA-2015:0093 SECTRACK:1031623 SECUNIA:62383 SECUNIA:62575 SECUNIA:62665 SMASH Issue 113103 SMASH Issue 113139 SUSE:openSUSE-SU-2015:0441 UBUNTU:CVE-2014-7923 UBUNTU:CVE-2014-7924 UBUNTU:CVE-2014-7925 UBUNTU:CVE-2014-7926 UBUNTU:CVE-2014-7927 UBUNTU:CVE-2014-7928 UBUNTU:CVE-2014-7929 UBUNTU:CVE-2014-7930 UBUNTU:CVE-2014-7931 UBUNTU:CVE-2014-7932 UBUNTU:CVE-2014-7934 UBUNTU:CVE-2014-7935 UBUNTU:CVE-2014-7936 UBUNTU:CVE-2014-7937 UBUNTU:CVE-2014-7938 UBUNTU:CVE-2014-7939 UBUNTU:CVE-2014-7940 UBUNTU:CVE-2014-7941 UBUNTU:CVE-2014-7942 UBUNTU:CVE-2014-7943 UBUNTU:CVE-2014-7944 UBUNTU:CVE-2014-7945 UBUNTU:CVE-2014-7946 UBUNTU:CVE-2014-7947 UBUNTU:CVE-2014-7948 UBUNTU:CVE-2015-1205 UBUNTU:CVE-2015-1346 UBUNTU:USN-2476-1 XF:google-v8-cve20151346-code-exec(100361) bdo#775884 bdo#776264 bdo#776265 bdo#776719 bnc#914468 rh#1185202 rh#1185203 rh#1185204 rh#1185205 rh#1185206 rh#1185208 rh#1185209 rh#1185210 rh#1185211 rh#1185212 rh#1185214 rh#1185215 rh#1185216 rh#1185217 rh#1185218 rh#1185219 rh#1185220 rh#1185221 rh#1185222 rh#1185223 rh#1185224 rh#1185225 rh#1185226 rh#1185229 rh#1185230 rh#1185282 rh#1185283 |
CVE-2014-7930 | icu:Analysis | important | () | BID:72288 CONFIRM:advisories.mageia.org:CVE-2014-7940 CONFIRM:bugs.icu-project.org:CVE-2014-7923 CONFIRM:bugs.icu-project.org:CVE-2014-7926 CONFIRM:chromium.googlesource.com:CVE-2014-7926 CONFIRM:chromium.googlesource.com:CVE-2014-7937 CONFIRM:chromium.googlesource.com:CVE-2014-7940 CONFIRM:code.google.com:CVE-2014-7923 CONFIRM:code.google.com:CVE-2014-7924 CONFIRM:code.google.com:CVE-2014-7925 CONFIRM:code.google.com:CVE-2014-7926 CONFIRM:code.google.com:CVE-2014-7927 CONFIRM:code.google.com:CVE-2014-7928 CONFIRM:code.google.com:CVE-2014-7929 CONFIRM:code.google.com:CVE-2014-7930 CONFIRM:code.google.com:CVE-2014-7931 CONFIRM:code.google.com:CVE-2014-7932 CONFIRM:code.google.com:CVE-2014-7934 CONFIRM:code.google.com:CVE-2014-7935 CONFIRM:code.google.com:CVE-2014-7936 CONFIRM:code.google.com:CVE-2014-7937 CONFIRM:code.google.com:CVE-2014-7938 CONFIRM:code.google.com:CVE-2014-7939 CONFIRM:code.google.com:CVE-2014-7940 CONFIRM:code.google.com:CVE-2014-7941 CONFIRM:code.google.com:CVE-2014-7943 CONFIRM:code.google.com:CVE-2014-7944 CONFIRM:code.google.com:CVE-2014-7945 CONFIRM:code.google.com:CVE-2014-7946 CONFIRM:code.google.com:CVE-2014-7947 CONFIRM:code.google.com:CVE-2014-7948 CONFIRM:code.google.com:CVE-2015-1205 CONFIRM:code.google.com:CVE-2015-1231 CONFIRM:code.google.com:CVE-2015-1361 CONFIRM:codereview.chromium.org:CVE-2014-7924 CONFIRM:codereview.chromium.org:CVE-2014-7925 CONFIRM:codereview.chromium.org:CVE-2014-7926 CONFIRM:codereview.chromium.org:CVE-2014-7927 CONFIRM:codereview.chromium.org:CVE-2014-7928 CONFIRM:codereview.chromium.org:CVE-2014-7931 CONFIRM:codereview.chromium.org:CVE-2014-7935 CONFIRM:codereview.chromium.org:CVE-2014-7936 CONFIRM:codereview.chromium.org:CVE-2014-7941 CONFIRM:codereview.chromium.org:CVE-2014-7948 CONFIRM:git.videolan.org:CVE-2014-7937 CONFIRM:googlechromereleases.blogspot.com:CVE-2015-1361 CONFIRM:pdfium.googlesource.com:CVE-2014-7944 CONFIRM:pdfium.googlesource.com:CVE-2014-7945 CONFIRM:pdfium.googlesource.com:CVE-2014-7947 CONFIRM:src.chromium.org:CVE-2014-7925 CONFIRM:src.chromium.org:CVE-2014-7929 CONFIRM:src.chromium.org:CVE-2014-7930 CONFIRM:src.chromium.org:CVE-2014-7932 CONFIRM:src.chromium.org:CVE-2014-7934 CONFIRM:src.chromium.org:CVE-2014-7946 CVE-2014-7923 CVE-2014-7924 CVE-2014-7925 CVE-2014-7926 CVE-2014-7927 CVE-2014-7928 CVE-2014-7929 CVE-2014-7930 CVE-2014-7931 CVE-2014-7932 CVE-2014-7934 CVE-2014-7935 CVE-2014-7936 CVE-2014-7937 CVE-2014-7938 CVE-2014-7939 CVE-2014-7940 CVE-2014-7941 CVE-2014-7942 CVE-2014-7943 CVE-2014-7944 CVE-2014-7945 CVE-2014-7946 CVE-2014-7947 CVE-2014-7948 CVE-2015-1205 CVE-2015-1346 D:CVE-2015-1205 D:CVE-2015-1346 DSA-3187 GENTOO:GLSA-201502-13 GENTOO:GLSA-201503-06 OSS:2016/Q2/342 Oracle:CVE-2014-7940 RH:CVE-2014-7923 RH:CVE-2014-7924 RH:CVE-2014-7925 RH:CVE-2014-7926 RH:CVE-2014-7927 RH:CVE-2014-7928 RH:CVE-2014-7929 RH:CVE-2014-7930 RH:CVE-2014-7931 RH:CVE-2014-7932 RH:CVE-2014-7934 RH:CVE-2014-7935 RH:CVE-2014-7936 RH:CVE-2014-7937 RH:CVE-2014-7938 RH:CVE-2014-7939 RH:CVE-2014-7940 RH:CVE-2014-7941 RH:CVE-2014-7942 RH:CVE-2014-7943 RH:CVE-2014-7944 RH:CVE-2014-7945 RH:CVE-2014-7946 RH:CVE-2014-7947 RH:CVE-2014-7948 RH:CVE-2015-1205 RH:CVE-2015-1346 RHSA-2015:0093 SECTRACK:1031623 SECUNIA:62383 SECUNIA:62575 SECUNIA:62665 SMASH Issue 113104 SMASH Issue 113139 SUSE:openSUSE-SU-2015:0441 UBUNTU:CVE-2014-7923 UBUNTU:CVE-2014-7924 UBUNTU:CVE-2014-7925 UBUNTU:CVE-2014-7926 UBUNTU:CVE-2014-7927 UBUNTU:CVE-2014-7928 UBUNTU:CVE-2014-7929 UBUNTU:CVE-2014-7930 UBUNTU:CVE-2014-7931 UBUNTU:CVE-2014-7932 UBUNTU:CVE-2014-7934 UBUNTU:CVE-2014-7935 UBUNTU:CVE-2014-7936 UBUNTU:CVE-2014-7937 UBUNTU:CVE-2014-7938 UBUNTU:CVE-2014-7939 UBUNTU:CVE-2014-7940 UBUNTU:CVE-2014-7941 UBUNTU:CVE-2014-7942 UBUNTU:CVE-2014-7943 UBUNTU:CVE-2014-7944 UBUNTU:CVE-2014-7945 UBUNTU:CVE-2014-7946 UBUNTU:CVE-2014-7947 UBUNTU:CVE-2014-7948 UBUNTU:CVE-2015-1205 UBUNTU:CVE-2015-1346 UBUNTU:USN-2476-1 XF:google-v8-cve20151346-code-exec(100361) bdo#775884 bdo#776264 bdo#776265 bdo#776719 bnc#914468 rh#1185202 rh#1185203 rh#1185204 rh#1185205 rh#1185206 rh#1185208 rh#1185209 rh#1185210 rh#1185211 rh#1185212 rh#1185214 rh#1185215 rh#1185216 rh#1185217 rh#1185218 rh#1185219 rh#1185220 rh#1185221 rh#1185222 rh#1185223 rh#1185224 rh#1185225 rh#1185226 rh#1185229 rh#1185230 rh#1185282 rh#1185283 |
CVE-2014-7931 | icu:Analysis | important | () | BID:72288 CONFIRM:advisories.mageia.org:CVE-2014-7940 CONFIRM:bugs.icu-project.org:CVE-2014-7923 CONFIRM:bugs.icu-project.org:CVE-2014-7926 CONFIRM:chromium.googlesource.com:CVE-2014-7926 CONFIRM:chromium.googlesource.com:CVE-2014-7937 CONFIRM:chromium.googlesource.com:CVE-2014-7940 CONFIRM:code.google.com:CVE-2014-7923 CONFIRM:code.google.com:CVE-2014-7924 CONFIRM:code.google.com:CVE-2014-7925 CONFIRM:code.google.com:CVE-2014-7926 CONFIRM:code.google.com:CVE-2014-7927 CONFIRM:code.google.com:CVE-2014-7928 CONFIRM:code.google.com:CVE-2014-7929 CONFIRM:code.google.com:CVE-2014-7930 CONFIRM:code.google.com:CVE-2014-7931 CONFIRM:code.google.com:CVE-2014-7932 CONFIRM:code.google.com:CVE-2014-7934 CONFIRM:code.google.com:CVE-2014-7935 CONFIRM:code.google.com:CVE-2014-7936 CONFIRM:code.google.com:CVE-2014-7937 CONFIRM:code.google.com:CVE-2014-7938 CONFIRM:code.google.com:CVE-2014-7939 CONFIRM:code.google.com:CVE-2014-7940 CONFIRM:code.google.com:CVE-2014-7941 CONFIRM:code.google.com:CVE-2014-7943 CONFIRM:code.google.com:CVE-2014-7944 CONFIRM:code.google.com:CVE-2014-7945 CONFIRM:code.google.com:CVE-2014-7946 CONFIRM:code.google.com:CVE-2014-7947 CONFIRM:code.google.com:CVE-2014-7948 CONFIRM:code.google.com:CVE-2015-1205 CONFIRM:code.google.com:CVE-2015-1231 CONFIRM:code.google.com:CVE-2015-1361 CONFIRM:codereview.chromium.org:CVE-2014-7924 CONFIRM:codereview.chromium.org:CVE-2014-7925 CONFIRM:codereview.chromium.org:CVE-2014-7926 CONFIRM:codereview.chromium.org:CVE-2014-7927 CONFIRM:codereview.chromium.org:CVE-2014-7928 CONFIRM:codereview.chromium.org:CVE-2014-7931 CONFIRM:codereview.chromium.org:CVE-2014-7935 CONFIRM:codereview.chromium.org:CVE-2014-7936 CONFIRM:codereview.chromium.org:CVE-2014-7941 CONFIRM:codereview.chromium.org:CVE-2014-7948 CONFIRM:git.videolan.org:CVE-2014-7937 CONFIRM:googlechromereleases.blogspot.com:CVE-2015-1361 CONFIRM:pdfium.googlesource.com:CVE-2014-7944 CONFIRM:pdfium.googlesource.com:CVE-2014-7945 CONFIRM:pdfium.googlesource.com:CVE-2014-7947 CONFIRM:src.chromium.org:CVE-2014-7925 CONFIRM:src.chromium.org:CVE-2014-7929 CONFIRM:src.chromium.org:CVE-2014-7930 CONFIRM:src.chromium.org:CVE-2014-7932 CONFIRM:src.chromium.org:CVE-2014-7934 CONFIRM:src.chromium.org:CVE-2014-7946 CVE-2014-7923 CVE-2014-7924 CVE-2014-7925 CVE-2014-7926 CVE-2014-7927 CVE-2014-7928 CVE-2014-7929 CVE-2014-7930 CVE-2014-7931 CVE-2014-7932 CVE-2014-7934 CVE-2014-7935 CVE-2014-7936 CVE-2014-7937 CVE-2014-7938 CVE-2014-7939 CVE-2014-7940 CVE-2014-7941 CVE-2014-7942 CVE-2014-7943 CVE-2014-7944 CVE-2014-7945 CVE-2014-7946 CVE-2014-7947 CVE-2014-7948 CVE-2015-1205 CVE-2015-1346 D:CVE-2015-1205 D:CVE-2015-1346 DSA-3187 GENTOO:GLSA-201502-13 GENTOO:GLSA-201503-06 OSS:2016/Q2/342 Oracle:CVE-2014-7940 RH:CVE-2014-7923 RH:CVE-2014-7924 RH:CVE-2014-7925 RH:CVE-2014-7926 RH:CVE-2014-7927 RH:CVE-2014-7928 RH:CVE-2014-7929 RH:CVE-2014-7930 RH:CVE-2014-7931 RH:CVE-2014-7932 RH:CVE-2014-7934 RH:CVE-2014-7935 RH:CVE-2014-7936 RH:CVE-2014-7937 RH:CVE-2014-7938 RH:CVE-2014-7939 RH:CVE-2014-7940 RH:CVE-2014-7941 RH:CVE-2014-7942 RH:CVE-2014-7943 RH:CVE-2014-7944 RH:CVE-2014-7945 RH:CVE-2014-7946 RH:CVE-2014-7947 RH:CVE-2014-7948 RH:CVE-2015-1205 RH:CVE-2015-1346 RHSA-2015:0093 SECTRACK:1031623 SECUNIA:62383 SECUNIA:62575 SECUNIA:62665 SMASH Issue 113105 SMASH Issue 113139 SUSE:openSUSE-SU-2015:0441 UBUNTU:CVE-2014-7923 UBUNTU:CVE-2014-7924 UBUNTU:CVE-2014-7925 UBUNTU:CVE-2014-7926 UBUNTU:CVE-2014-7927 UBUNTU:CVE-2014-7928 UBUNTU:CVE-2014-7929 UBUNTU:CVE-2014-7930 UBUNTU:CVE-2014-7931 UBUNTU:CVE-2014-7932 UBUNTU:CVE-2014-7934 UBUNTU:CVE-2014-7935 UBUNTU:CVE-2014-7936 UBUNTU:CVE-2014-7937 UBUNTU:CVE-2014-7938 UBUNTU:CVE-2014-7939 UBUNTU:CVE-2014-7940 UBUNTU:CVE-2014-7941 UBUNTU:CVE-2014-7942 UBUNTU:CVE-2014-7943 UBUNTU:CVE-2014-7944 UBUNTU:CVE-2014-7945 UBUNTU:CVE-2014-7946 UBUNTU:CVE-2014-7947 UBUNTU:CVE-2014-7948 UBUNTU:CVE-2015-1205 UBUNTU:CVE-2015-1346 UBUNTU:USN-2476-1 XF:google-v8-cve20151346-code-exec(100361) bdo#775884 bdo#776264 bdo#776265 bdo#776719 bnc#914468 rh#1185202 rh#1185203 rh#1185204 rh#1185205 rh#1185206 rh#1185208 rh#1185209 rh#1185210 rh#1185211 rh#1185212 rh#1185214 rh#1185215 rh#1185216 rh#1185217 rh#1185218 rh#1185219 rh#1185220 rh#1185221 rh#1185222 rh#1185223 rh#1185224 rh#1185225 rh#1185226 rh#1185229 rh#1185230 rh#1185282 rh#1185283 |
CVE-2014-7932 | icu:Analysis | important | () | BID:72288 CONFIRM:advisories.mageia.org:CVE-2014-7940 CONFIRM:bugs.icu-project.org:CVE-2014-7923 CONFIRM:bugs.icu-project.org:CVE-2014-7926 CONFIRM:chromium.googlesource.com:CVE-2014-7926 CONFIRM:chromium.googlesource.com:CVE-2014-7937 CONFIRM:chromium.googlesource.com:CVE-2014-7940 CONFIRM:code.google.com:CVE-2014-7923 CONFIRM:code.google.com:CVE-2014-7924 CONFIRM:code.google.com:CVE-2014-7925 CONFIRM:code.google.com:CVE-2014-7926 CONFIRM:code.google.com:CVE-2014-7927 CONFIRM:code.google.com:CVE-2014-7928 CONFIRM:code.google.com:CVE-2014-7929 CONFIRM:code.google.com:CVE-2014-7930 CONFIRM:code.google.com:CVE-2014-7931 CONFIRM:code.google.com:CVE-2014-7932 CONFIRM:code.google.com:CVE-2014-7934 CONFIRM:code.google.com:CVE-2014-7935 CONFIRM:code.google.com:CVE-2014-7936 CONFIRM:code.google.com:CVE-2014-7937 CONFIRM:code.google.com:CVE-2014-7938 CONFIRM:code.google.com:CVE-2014-7939 CONFIRM:code.google.com:CVE-2014-7940 CONFIRM:code.google.com:CVE-2014-7941 CONFIRM:code.google.com:CVE-2014-7943 CONFIRM:code.google.com:CVE-2014-7944 CONFIRM:code.google.com:CVE-2014-7945 CONFIRM:code.google.com:CVE-2014-7946 CONFIRM:code.google.com:CVE-2014-7947 CONFIRM:code.google.com:CVE-2014-7948 CONFIRM:code.google.com:CVE-2015-1205 CONFIRM:code.google.com:CVE-2015-1231 CONFIRM:code.google.com:CVE-2015-1361 CONFIRM:codereview.chromium.org:CVE-2014-7924 CONFIRM:codereview.chromium.org:CVE-2014-7925 CONFIRM:codereview.chromium.org:CVE-2014-7926 CONFIRM:codereview.chromium.org:CVE-2014-7927 CONFIRM:codereview.chromium.org:CVE-2014-7928 CONFIRM:codereview.chromium.org:CVE-2014-7931 CONFIRM:codereview.chromium.org:CVE-2014-7935 CONFIRM:codereview.chromium.org:CVE-2014-7936 CONFIRM:codereview.chromium.org:CVE-2014-7941 CONFIRM:codereview.chromium.org:CVE-2014-7948 CONFIRM:git.videolan.org:CVE-2014-7937 CONFIRM:googlechromereleases.blogspot.com:CVE-2015-1361 CONFIRM:pdfium.googlesource.com:CVE-2014-7944 CONFIRM:pdfium.googlesource.com:CVE-2014-7945 CONFIRM:pdfium.googlesource.com:CVE-2014-7947 CONFIRM:src.chromium.org:CVE-2014-7925 CONFIRM:src.chromium.org:CVE-2014-7929 CONFIRM:src.chromium.org:CVE-2014-7930 CONFIRM:src.chromium.org:CVE-2014-7932 CONFIRM:src.chromium.org:CVE-2014-7934 CONFIRM:src.chromium.org:CVE-2014-7946 CVE-2014-7923 CVE-2014-7924 CVE-2014-7925 CVE-2014-7926 CVE-2014-7927 CVE-2014-7928 CVE-2014-7929 CVE-2014-7930 CVE-2014-7931 CVE-2014-7932 CVE-2014-7934 CVE-2014-7935 CVE-2014-7936 CVE-2014-7937 CVE-2014-7938 CVE-2014-7939 CVE-2014-7940 CVE-2014-7941 CVE-2014-7942 CVE-2014-7943 CVE-2014-7944 CVE-2014-7945 CVE-2014-7946 CVE-2014-7947 CVE-2014-7948 CVE-2015-1205 CVE-2015-1346 D:CVE-2015-1205 D:CVE-2015-1346 DSA-3187 GENTOO:GLSA-201502-13 GENTOO:GLSA-201503-06 OSS:2016/Q2/342 Oracle:CVE-2014-7940 RH:CVE-2014-7923 RH:CVE-2014-7924 RH:CVE-2014-7925 RH:CVE-2014-7926 RH:CVE-2014-7927 RH:CVE-2014-7928 RH:CVE-2014-7929 RH:CVE-2014-7930 RH:CVE-2014-7931 RH:CVE-2014-7932 RH:CVE-2014-7934 RH:CVE-2014-7935 RH:CVE-2014-7936 RH:CVE-2014-7937 RH:CVE-2014-7938 RH:CVE-2014-7939 RH:CVE-2014-7940 RH:CVE-2014-7941 RH:CVE-2014-7942 RH:CVE-2014-7943 RH:CVE-2014-7944 RH:CVE-2014-7945 RH:CVE-2014-7946 RH:CVE-2014-7947 RH:CVE-2014-7948 RH:CVE-2015-1205 RH:CVE-2015-1346 RHSA-2015:0093 SECTRACK:1031623 SECUNIA:62383 SECUNIA:62575 SECUNIA:62665 SMASH Issue 113106 SMASH Issue 113139 SUSE:openSUSE-SU-2015:0441 UBUNTU:CVE-2014-7923 UBUNTU:CVE-2014-7924 UBUNTU:CVE-2014-7925 UBUNTU:CVE-2014-7926 UBUNTU:CVE-2014-7927 UBUNTU:CVE-2014-7928 UBUNTU:CVE-2014-7929 UBUNTU:CVE-2014-7930 UBUNTU:CVE-2014-7931 UBUNTU:CVE-2014-7932 UBUNTU:CVE-2014-7934 UBUNTU:CVE-2014-7935 UBUNTU:CVE-2014-7936 UBUNTU:CVE-2014-7937 UBUNTU:CVE-2014-7938 UBUNTU:CVE-2014-7939 UBUNTU:CVE-2014-7940 UBUNTU:CVE-2014-7941 UBUNTU:CVE-2014-7942 UBUNTU:CVE-2014-7943 UBUNTU:CVE-2014-7944 UBUNTU:CVE-2014-7945 UBUNTU:CVE-2014-7946 UBUNTU:CVE-2014-7947 UBUNTU:CVE-2014-7948 UBUNTU:CVE-2015-1205 UBUNTU:CVE-2015-1346 UBUNTU:USN-2476-1 XF:google-v8-cve20151346-code-exec(100361) bdo#775884 bdo#776264 bdo#776265 bdo#776719 bnc#914468 rh#1185202 rh#1185203 rh#1185204 rh#1185205 rh#1185206 rh#1185208 rh#1185209 rh#1185210 rh#1185211 rh#1185212 rh#1185214 rh#1185215 rh#1185216 rh#1185217 rh#1185218 rh#1185219 rh#1185220 rh#1185221 rh#1185222 rh#1185223 rh#1185224 rh#1185225 rh#1185226 rh#1185229 rh#1185230 rh#1185282 rh#1185283 |
CVE-2014-7934 | icu:Analysis | important | () | BID:72288 CONFIRM:advisories.mageia.org:CVE-2014-7940 CONFIRM:bugs.icu-project.org:CVE-2014-7923 CONFIRM:bugs.icu-project.org:CVE-2014-7926 CONFIRM:chromium.googlesource.com:CVE-2014-7926 CONFIRM:chromium.googlesource.com:CVE-2014-7937 CONFIRM:chromium.googlesource.com:CVE-2014-7940 CONFIRM:code.google.com:CVE-2014-7923 CONFIRM:code.google.com:CVE-2014-7924 CONFIRM:code.google.com:CVE-2014-7925 CONFIRM:code.google.com:CVE-2014-7926 CONFIRM:code.google.com:CVE-2014-7927 CONFIRM:code.google.com:CVE-2014-7928 CONFIRM:code.google.com:CVE-2014-7929 CONFIRM:code.google.com:CVE-2014-7930 CONFIRM:code.google.com:CVE-2014-7931 CONFIRM:code.google.com:CVE-2014-7932 CONFIRM:code.google.com:CVE-2014-7934 CONFIRM:code.google.com:CVE-2014-7935 CONFIRM:code.google.com:CVE-2014-7936 CONFIRM:code.google.com:CVE-2014-7937 CONFIRM:code.google.com:CVE-2014-7938 CONFIRM:code.google.com:CVE-2014-7939 CONFIRM:code.google.com:CVE-2014-7940 CONFIRM:code.google.com:CVE-2014-7941 CONFIRM:code.google.com:CVE-2014-7943 CONFIRM:code.google.com:CVE-2014-7944 CONFIRM:code.google.com:CVE-2014-7945 CONFIRM:code.google.com:CVE-2014-7946 CONFIRM:code.google.com:CVE-2014-7947 CONFIRM:code.google.com:CVE-2014-7948 CONFIRM:code.google.com:CVE-2015-1205 CONFIRM:code.google.com:CVE-2015-1231 CONFIRM:code.google.com:CVE-2015-1361 CONFIRM:codereview.chromium.org:CVE-2014-7924 CONFIRM:codereview.chromium.org:CVE-2014-7925 CONFIRM:codereview.chromium.org:CVE-2014-7926 CONFIRM:codereview.chromium.org:CVE-2014-7927 CONFIRM:codereview.chromium.org:CVE-2014-7928 CONFIRM:codereview.chromium.org:CVE-2014-7931 CONFIRM:codereview.chromium.org:CVE-2014-7935 CONFIRM:codereview.chromium.org:CVE-2014-7936 CONFIRM:codereview.chromium.org:CVE-2014-7941 CONFIRM:codereview.chromium.org:CVE-2014-7948 CONFIRM:git.videolan.org:CVE-2014-7937 CONFIRM:googlechromereleases.blogspot.com:CVE-2015-1361 CONFIRM:pdfium.googlesource.com:CVE-2014-7944 CONFIRM:pdfium.googlesource.com:CVE-2014-7945 CONFIRM:pdfium.googlesource.com:CVE-2014-7947 CONFIRM:src.chromium.org:CVE-2014-7925 CONFIRM:src.chromium.org:CVE-2014-7929 CONFIRM:src.chromium.org:CVE-2014-7930 CONFIRM:src.chromium.org:CVE-2014-7932 CONFIRM:src.chromium.org:CVE-2014-7934 CONFIRM:src.chromium.org:CVE-2014-7946 CVE-2014-7923 CVE-2014-7924 CVE-2014-7925 CVE-2014-7926 CVE-2014-7927 CVE-2014-7928 CVE-2014-7929 CVE-2014-7930 CVE-2014-7931 CVE-2014-7932 CVE-2014-7934 CVE-2014-7935 CVE-2014-7936 CVE-2014-7937 CVE-2014-7938 CVE-2014-7939 CVE-2014-7940 CVE-2014-7941 CVE-2014-7942 CVE-2014-7943 CVE-2014-7944 CVE-2014-7945 CVE-2014-7946 CVE-2014-7947 CVE-2014-7948 CVE-2015-1205 CVE-2015-1346 D:CVE-2015-1205 D:CVE-2015-1346 DSA-3187 GENTOO:GLSA-201502-13 GENTOO:GLSA-201503-06 OSS:2016/Q2/342 Oracle:CVE-2014-7940 RH:CVE-2014-7923 RH:CVE-2014-7924 RH:CVE-2014-7925 RH:CVE-2014-7926 RH:CVE-2014-7927 RH:CVE-2014-7928 RH:CVE-2014-7929 RH:CVE-2014-7930 RH:CVE-2014-7931 RH:CVE-2014-7932 RH:CVE-2014-7934 RH:CVE-2014-7935 RH:CVE-2014-7936 RH:CVE-2014-7937 RH:CVE-2014-7938 RH:CVE-2014-7939 RH:CVE-2014-7940 RH:CVE-2014-7941 RH:CVE-2014-7942 RH:CVE-2014-7943 RH:CVE-2014-7944 RH:CVE-2014-7945 RH:CVE-2014-7946 RH:CVE-2014-7947 RH:CVE-2014-7948 RH:CVE-2015-1205 RH:CVE-2015-1346 RHSA-2015:0093 SECTRACK:1031623 SECUNIA:62383 SECUNIA:62575 SECUNIA:62665 SMASH Issue 113108 SMASH Issue 113139 SUSE:openSUSE-SU-2015:0441 UBUNTU:CVE-2014-7923 UBUNTU:CVE-2014-7924 UBUNTU:CVE-2014-7925 UBUNTU:CVE-2014-7926 UBUNTU:CVE-2014-7927 UBUNTU:CVE-2014-7928 UBUNTU:CVE-2014-7929 UBUNTU:CVE-2014-7930 UBUNTU:CVE-2014-7931 UBUNTU:CVE-2014-7932 UBUNTU:CVE-2014-7934 UBUNTU:CVE-2014-7935 UBUNTU:CVE-2014-7936 UBUNTU:CVE-2014-7937 UBUNTU:CVE-2014-7938 UBUNTU:CVE-2014-7939 UBUNTU:CVE-2014-7940 UBUNTU:CVE-2014-7941 UBUNTU:CVE-2014-7942 UBUNTU:CVE-2014-7943 UBUNTU:CVE-2014-7944 UBUNTU:CVE-2014-7945 UBUNTU:CVE-2014-7946 UBUNTU:CVE-2014-7947 UBUNTU:CVE-2014-7948 UBUNTU:CVE-2015-1205 UBUNTU:CVE-2015-1346 UBUNTU:USN-2476-1 XF:google-v8-cve20151346-code-exec(100361) bdo#775884 bdo#776264 bdo#776265 bdo#776719 bnc#914468 rh#1185202 rh#1185203 rh#1185204 rh#1185205 rh#1185206 rh#1185208 rh#1185209 rh#1185210 rh#1185211 rh#1185212 rh#1185214 rh#1185215 rh#1185216 rh#1185217 rh#1185218 rh#1185219 rh#1185220 rh#1185221 rh#1185222 rh#1185223 rh#1185224 rh#1185225 rh#1185226 rh#1185229 rh#1185230 rh#1185282 rh#1185283 |
CVE-2014-7935 | icu:Analysis | important | () | BID:72288 CONFIRM:advisories.mageia.org:CVE-2014-7940 CONFIRM:bugs.icu-project.org:CVE-2014-7923 CONFIRM:bugs.icu-project.org:CVE-2014-7926 CONFIRM:chromium.googlesource.com:CVE-2014-7926 CONFIRM:chromium.googlesource.com:CVE-2014-7937 CONFIRM:chromium.googlesource.com:CVE-2014-7940 CONFIRM:code.google.com:CVE-2014-7923 CONFIRM:code.google.com:CVE-2014-7924 CONFIRM:code.google.com:CVE-2014-7925 CONFIRM:code.google.com:CVE-2014-7926 CONFIRM:code.google.com:CVE-2014-7927 CONFIRM:code.google.com:CVE-2014-7928 CONFIRM:code.google.com:CVE-2014-7929 CONFIRM:code.google.com:CVE-2014-7930 CONFIRM:code.google.com:CVE-2014-7931 CONFIRM:code.google.com:CVE-2014-7932 CONFIRM:code.google.com:CVE-2014-7934 CONFIRM:code.google.com:CVE-2014-7935 CONFIRM:code.google.com:CVE-2014-7936 CONFIRM:code.google.com:CVE-2014-7937 CONFIRM:code.google.com:CVE-2014-7938 CONFIRM:code.google.com:CVE-2014-7939 CONFIRM:code.google.com:CVE-2014-7940 CONFIRM:code.google.com:CVE-2014-7941 CONFIRM:code.google.com:CVE-2014-7943 CONFIRM:code.google.com:CVE-2014-7944 CONFIRM:code.google.com:CVE-2014-7945 CONFIRM:code.google.com:CVE-2014-7946 CONFIRM:code.google.com:CVE-2014-7947 CONFIRM:code.google.com:CVE-2014-7948 CONFIRM:code.google.com:CVE-2015-1205 CONFIRM:code.google.com:CVE-2015-1231 CONFIRM:code.google.com:CVE-2015-1361 CONFIRM:codereview.chromium.org:CVE-2014-7924 CONFIRM:codereview.chromium.org:CVE-2014-7925 CONFIRM:codereview.chromium.org:CVE-2014-7926 CONFIRM:codereview.chromium.org:CVE-2014-7927 CONFIRM:codereview.chromium.org:CVE-2014-7928 CONFIRM:codereview.chromium.org:CVE-2014-7931 CONFIRM:codereview.chromium.org:CVE-2014-7935 CONFIRM:codereview.chromium.org:CVE-2014-7936 CONFIRM:codereview.chromium.org:CVE-2014-7941 CONFIRM:codereview.chromium.org:CVE-2014-7948 CONFIRM:git.videolan.org:CVE-2014-7937 CONFIRM:googlechromereleases.blogspot.com:CVE-2015-1361 CONFIRM:pdfium.googlesource.com:CVE-2014-7944 CONFIRM:pdfium.googlesource.com:CVE-2014-7945 CONFIRM:pdfium.googlesource.com:CVE-2014-7947 CONFIRM:src.chromium.org:CVE-2014-7925 CONFIRM:src.chromium.org:CVE-2014-7929 CONFIRM:src.chromium.org:CVE-2014-7930 CONFIRM:src.chromium.org:CVE-2014-7932 CONFIRM:src.chromium.org:CVE-2014-7934 CONFIRM:src.chromium.org:CVE-2014-7946 CVE-2014-7923 CVE-2014-7924 CVE-2014-7925 CVE-2014-7926 CVE-2014-7927 CVE-2014-7928 CVE-2014-7929 CVE-2014-7930 CVE-2014-7931 CVE-2014-7932 CVE-2014-7934 CVE-2014-7935 CVE-2014-7936 CVE-2014-7937 CVE-2014-7938 CVE-2014-7939 CVE-2014-7940 CVE-2014-7941 CVE-2014-7942 CVE-2014-7943 CVE-2014-7944 CVE-2014-7945 CVE-2014-7946 CVE-2014-7947 CVE-2014-7948 CVE-2015-1205 CVE-2015-1346 D:CVE-2015-1205 D:CVE-2015-1346 DSA-3187 GENTOO:GLSA-201502-13 GENTOO:GLSA-201503-06 OSS:2016/Q2/342 Oracle:CVE-2014-7940 RH:CVE-2014-7923 RH:CVE-2014-7924 RH:CVE-2014-7925 RH:CVE-2014-7926 RH:CVE-2014-7927 RH:CVE-2014-7928 RH:CVE-2014-7929 RH:CVE-2014-7930 RH:CVE-2014-7931 RH:CVE-2014-7932 RH:CVE-2014-7934 RH:CVE-2014-7935 RH:CVE-2014-7936 RH:CVE-2014-7937 RH:CVE-2014-7938 RH:CVE-2014-7939 RH:CVE-2014-7940 RH:CVE-2014-7941 RH:CVE-2014-7942 RH:CVE-2014-7943 RH:CVE-2014-7944 RH:CVE-2014-7945 RH:CVE-2014-7946 RH:CVE-2014-7947 RH:CVE-2014-7948 RH:CVE-2015-1205 RH:CVE-2015-1346 RHSA-2015:0093 SECTRACK:1031623 SECUNIA:62383 SECUNIA:62575 SECUNIA:62665 SMASH Issue 113109 SMASH Issue 113139 SUSE:openSUSE-SU-2015:0441 UBUNTU:CVE-2014-7923 UBUNTU:CVE-2014-7924 UBUNTU:CVE-2014-7925 UBUNTU:CVE-2014-7926 UBUNTU:CVE-2014-7927 UBUNTU:CVE-2014-7928 UBUNTU:CVE-2014-7929 UBUNTU:CVE-2014-7930 UBUNTU:CVE-2014-7931 UBUNTU:CVE-2014-7932 UBUNTU:CVE-2014-7934 UBUNTU:CVE-2014-7935 UBUNTU:CVE-2014-7936 UBUNTU:CVE-2014-7937 UBUNTU:CVE-2014-7938 UBUNTU:CVE-2014-7939 UBUNTU:CVE-2014-7940 UBUNTU:CVE-2014-7941 UBUNTU:CVE-2014-7942 UBUNTU:CVE-2014-7943 UBUNTU:CVE-2014-7944 UBUNTU:CVE-2014-7945 UBUNTU:CVE-2014-7946 UBUNTU:CVE-2014-7947 UBUNTU:CVE-2014-7948 UBUNTU:CVE-2015-1205 UBUNTU:CVE-2015-1346 UBUNTU:USN-2476-1 XF:google-v8-cve20151346-code-exec(100361) bdo#775884 bdo#776264 bdo#776265 bdo#776719 bnc#914468 rh#1185202 rh#1185203 rh#1185204 rh#1185205 rh#1185206 rh#1185208 rh#1185209 rh#1185210 rh#1185211 rh#1185212 rh#1185214 rh#1185215 rh#1185216 rh#1185217 rh#1185218 rh#1185219 rh#1185220 rh#1185221 rh#1185222 rh#1185223 rh#1185224 rh#1185225 rh#1185226 rh#1185229 rh#1185230 rh#1185282 rh#1185283 |
CVE-2014-7936 | icu:Analysis | important | () | BID:72288 CONFIRM:advisories.mageia.org:CVE-2014-7940 CONFIRM:bugs.icu-project.org:CVE-2014-7923 CONFIRM:bugs.icu-project.org:CVE-2014-7926 CONFIRM:chromium.googlesource.com:CVE-2014-7926 CONFIRM:chromium.googlesource.com:CVE-2014-7937 CONFIRM:chromium.googlesource.com:CVE-2014-7940 CONFIRM:code.google.com:CVE-2014-7923 CONFIRM:code.google.com:CVE-2014-7924 CONFIRM:code.google.com:CVE-2014-7925 CONFIRM:code.google.com:CVE-2014-7926 CONFIRM:code.google.com:CVE-2014-7927 CONFIRM:code.google.com:CVE-2014-7928 CONFIRM:code.google.com:CVE-2014-7929 CONFIRM:code.google.com:CVE-2014-7930 CONFIRM:code.google.com:CVE-2014-7931 CONFIRM:code.google.com:CVE-2014-7932 CONFIRM:code.google.com:CVE-2014-7934 CONFIRM:code.google.com:CVE-2014-7935 CONFIRM:code.google.com:CVE-2014-7936 CONFIRM:code.google.com:CVE-2014-7937 CONFIRM:code.google.com:CVE-2014-7938 CONFIRM:code.google.com:CVE-2014-7939 CONFIRM:code.google.com:CVE-2014-7940 CONFIRM:code.google.com:CVE-2014-7941 CONFIRM:code.google.com:CVE-2014-7943 CONFIRM:code.google.com:CVE-2014-7944 CONFIRM:code.google.com:CVE-2014-7945 CONFIRM:code.google.com:CVE-2014-7946 CONFIRM:code.google.com:CVE-2014-7947 CONFIRM:code.google.com:CVE-2014-7948 CONFIRM:code.google.com:CVE-2015-1205 CONFIRM:code.google.com:CVE-2015-1231 CONFIRM:code.google.com:CVE-2015-1361 CONFIRM:codereview.chromium.org:CVE-2014-7924 CONFIRM:codereview.chromium.org:CVE-2014-7925 CONFIRM:codereview.chromium.org:CVE-2014-7926 CONFIRM:codereview.chromium.org:CVE-2014-7927 CONFIRM:codereview.chromium.org:CVE-2014-7928 CONFIRM:codereview.chromium.org:CVE-2014-7931 CONFIRM:codereview.chromium.org:CVE-2014-7935 CONFIRM:codereview.chromium.org:CVE-2014-7936 CONFIRM:codereview.chromium.org:CVE-2014-7941 CONFIRM:codereview.chromium.org:CVE-2014-7948 CONFIRM:git.videolan.org:CVE-2014-7937 CONFIRM:googlechromereleases.blogspot.com:CVE-2015-1361 CONFIRM:pdfium.googlesource.com:CVE-2014-7944 CONFIRM:pdfium.googlesource.com:CVE-2014-7945 CONFIRM:pdfium.googlesource.com:CVE-2014-7947 CONFIRM:src.chromium.org:CVE-2014-7925 CONFIRM:src.chromium.org:CVE-2014-7929 CONFIRM:src.chromium.org:CVE-2014-7930 CONFIRM:src.chromium.org:CVE-2014-7932 CONFIRM:src.chromium.org:CVE-2014-7934 CONFIRM:src.chromium.org:CVE-2014-7946 CVE-2014-7923 CVE-2014-7924 CVE-2014-7925 CVE-2014-7926 CVE-2014-7927 CVE-2014-7928 CVE-2014-7929 CVE-2014-7930 CVE-2014-7931 CVE-2014-7932 CVE-2014-7934 CVE-2014-7935 CVE-2014-7936 CVE-2014-7937 CVE-2014-7938 CVE-2014-7939 CVE-2014-7940 CVE-2014-7941 CVE-2014-7942 CVE-2014-7943 CVE-2014-7944 CVE-2014-7945 CVE-2014-7946 CVE-2014-7947 CVE-2014-7948 CVE-2015-1205 CVE-2015-1346 D:CVE-2015-1205 D:CVE-2015-1346 DSA-3187 GENTOO:GLSA-201502-13 GENTOO:GLSA-201503-06 OSS:2016/Q2/342 Oracle:CVE-2014-7940 RH:CVE-2014-7923 RH:CVE-2014-7924 RH:CVE-2014-7925 RH:CVE-2014-7926 RH:CVE-2014-7927 RH:CVE-2014-7928 RH:CVE-2014-7929 RH:CVE-2014-7930 RH:CVE-2014-7931 RH:CVE-2014-7932 RH:CVE-2014-7934 RH:CVE-2014-7935 RH:CVE-2014-7936 RH:CVE-2014-7937 RH:CVE-2014-7938 RH:CVE-2014-7939 RH:CVE-2014-7940 RH:CVE-2014-7941 RH:CVE-2014-7942 RH:CVE-2014-7943 RH:CVE-2014-7944 RH:CVE-2014-7945 RH:CVE-2014-7946 RH:CVE-2014-7947 RH:CVE-2014-7948 RH:CVE-2015-1205 RH:CVE-2015-1346 RHSA-2015:0093 SECTRACK:1031623 SECUNIA:62383 SECUNIA:62575 SECUNIA:62665 SMASH Issue 113110 SMASH Issue 113139 SUSE:openSUSE-SU-2015:0441 UBUNTU:CVE-2014-7923 UBUNTU:CVE-2014-7924 UBUNTU:CVE-2014-7925 UBUNTU:CVE-2014-7926 UBUNTU:CVE-2014-7927 UBUNTU:CVE-2014-7928 UBUNTU:CVE-2014-7929 UBUNTU:CVE-2014-7930 UBUNTU:CVE-2014-7931 UBUNTU:CVE-2014-7932 UBUNTU:CVE-2014-7934 UBUNTU:CVE-2014-7935 UBUNTU:CVE-2014-7936 UBUNTU:CVE-2014-7937 UBUNTU:CVE-2014-7938 UBUNTU:CVE-2014-7939 UBUNTU:CVE-2014-7940 UBUNTU:CVE-2014-7941 UBUNTU:CVE-2014-7942 UBUNTU:CVE-2014-7943 UBUNTU:CVE-2014-7944 UBUNTU:CVE-2014-7945 UBUNTU:CVE-2014-7946 UBUNTU:CVE-2014-7947 UBUNTU:CVE-2014-7948 UBUNTU:CVE-2015-1205 UBUNTU:CVE-2015-1346 UBUNTU:USN-2476-1 XF:google-v8-cve20151346-code-exec(100361) bdo#775884 bdo#776264 bdo#776265 bdo#776719 bnc#914468 rh#1185202 rh#1185203 rh#1185204 rh#1185205 rh#1185206 rh#1185208 rh#1185209 rh#1185210 rh#1185211 rh#1185212 rh#1185214 rh#1185215 rh#1185216 rh#1185217 rh#1185218 rh#1185219 rh#1185220 rh#1185221 rh#1185222 rh#1185223 rh#1185224 rh#1185225 rh#1185226 rh#1185229 rh#1185230 rh#1185282 rh#1185283 |
CVE-2014-7937 | icu:Analysis | important | () | BID:72288 CONFIRM:advisories.mageia.org:CVE-2014-7940 CONFIRM:bugs.icu-project.org:CVE-2014-7923 CONFIRM:bugs.icu-project.org:CVE-2014-7926 CONFIRM:chromium.googlesource.com:CVE-2014-7926 CONFIRM:chromium.googlesource.com:CVE-2014-7937 CONFIRM:chromium.googlesource.com:CVE-2014-7940 CONFIRM:code.google.com:CVE-2014-7923 CONFIRM:code.google.com:CVE-2014-7924 CONFIRM:code.google.com:CVE-2014-7925 CONFIRM:code.google.com:CVE-2014-7926 CONFIRM:code.google.com:CVE-2014-7927 CONFIRM:code.google.com:CVE-2014-7928 CONFIRM:code.google.com:CVE-2014-7929 CONFIRM:code.google.com:CVE-2014-7930 CONFIRM:code.google.com:CVE-2014-7931 CONFIRM:code.google.com:CVE-2014-7932 CONFIRM:code.google.com:CVE-2014-7934 CONFIRM:code.google.com:CVE-2014-7935 CONFIRM:code.google.com:CVE-2014-7936 CONFIRM:code.google.com:CVE-2014-7937 CONFIRM:code.google.com:CVE-2014-7938 CONFIRM:code.google.com:CVE-2014-7939 CONFIRM:code.google.com:CVE-2014-7940 CONFIRM:code.google.com:CVE-2014-7941 CONFIRM:code.google.com:CVE-2014-7943 CONFIRM:code.google.com:CVE-2014-7944 CONFIRM:code.google.com:CVE-2014-7945 CONFIRM:code.google.com:CVE-2014-7946 CONFIRM:code.google.com:CVE-2014-7947 CONFIRM:code.google.com:CVE-2014-7948 CONFIRM:code.google.com:CVE-2015-1205 CONFIRM:code.google.com:CVE-2015-1231 CONFIRM:code.google.com:CVE-2015-1361 CONFIRM:codereview.chromium.org:CVE-2014-7924 CONFIRM:codereview.chromium.org:CVE-2014-7925 CONFIRM:codereview.chromium.org:CVE-2014-7926 CONFIRM:codereview.chromium.org:CVE-2014-7927 CONFIRM:codereview.chromium.org:CVE-2014-7928 CONFIRM:codereview.chromium.org:CVE-2014-7931 CONFIRM:codereview.chromium.org:CVE-2014-7935 CONFIRM:codereview.chromium.org:CVE-2014-7936 CONFIRM:codereview.chromium.org:CVE-2014-7941 CONFIRM:codereview.chromium.org:CVE-2014-7948 CONFIRM:git.videolan.org:CVE-2014-7937 CONFIRM:googlechromereleases.blogspot.com:CVE-2015-1361 CONFIRM:pdfium.googlesource.com:CVE-2014-7944 CONFIRM:pdfium.googlesource.com:CVE-2014-7945 CONFIRM:pdfium.googlesource.com:CVE-2014-7947 CONFIRM:src.chromium.org:CVE-2014-7925 CONFIRM:src.chromium.org:CVE-2014-7929 CONFIRM:src.chromium.org:CVE-2014-7930 CONFIRM:src.chromium.org:CVE-2014-7932 CONFIRM:src.chromium.org:CVE-2014-7934 CONFIRM:src.chromium.org:CVE-2014-7946 CVE-2014-7923 CVE-2014-7924 CVE-2014-7925 CVE-2014-7926 CVE-2014-7927 CVE-2014-7928 CVE-2014-7929 CVE-2014-7930 CVE-2014-7931 CVE-2014-7932 CVE-2014-7934 CVE-2014-7935 CVE-2014-7936 CVE-2014-7937 CVE-2014-7938 CVE-2014-7939 CVE-2014-7940 CVE-2014-7941 CVE-2014-7942 CVE-2014-7943 CVE-2014-7944 CVE-2014-7945 CVE-2014-7946 CVE-2014-7947 CVE-2014-7948 CVE-2015-1205 CVE-2015-1346 D:CVE-2015-1205 D:CVE-2015-1346 DSA-3187 GENTOO:GLSA-201502-13 GENTOO:GLSA-201503-06 GENTOO:GLSA-201603-06 OSS:2016/Q2/342 Oracle:CVE-2014-7940 RH:CVE-2014-7923 RH:CVE-2014-7924 RH:CVE-2014-7925 RH:CVE-2014-7926 RH:CVE-2014-7927 RH:CVE-2014-7928 RH:CVE-2014-7929 RH:CVE-2014-7930 RH:CVE-2014-7931 RH:CVE-2014-7932 RH:CVE-2014-7934 RH:CVE-2014-7935 RH:CVE-2014-7936 RH:CVE-2014-7937 RH:CVE-2014-7938 RH:CVE-2014-7939 RH:CVE-2014-7940 RH:CVE-2014-7941 RH:CVE-2014-7942 RH:CVE-2014-7943 RH:CVE-2014-7944 RH:CVE-2014-7945 RH:CVE-2014-7946 RH:CVE-2014-7947 RH:CVE-2014-7948 RH:CVE-2015-1205 RH:CVE-2015-1346 RHSA-2015:0093 SECTRACK:1031623 SECUNIA:62383 SECUNIA:62575 SECUNIA:62665 SMASH Issue 113111 SMASH Issue 113139 SUSE:openSUSE-SU-2015:0441 UBUNTU:CVE-2014-7923 UBUNTU:CVE-2014-7924 UBUNTU:CVE-2014-7925 UBUNTU:CVE-2014-7926 UBUNTU:CVE-2014-7927 UBUNTU:CVE-2014-7928 UBUNTU:CVE-2014-7929 UBUNTU:CVE-2014-7930 UBUNTU:CVE-2014-7931 UBUNTU:CVE-2014-7932 UBUNTU:CVE-2014-7934 UBUNTU:CVE-2014-7935 UBUNTU:CVE-2014-7936 UBUNTU:CVE-2014-7937 UBUNTU:CVE-2014-7938 UBUNTU:CVE-2014-7939 UBUNTU:CVE-2014-7940 UBUNTU:CVE-2014-7941 UBUNTU:CVE-2014-7942 UBUNTU:CVE-2014-7943 UBUNTU:CVE-2014-7944 UBUNTU:CVE-2014-7945 UBUNTU:CVE-2014-7946 UBUNTU:CVE-2014-7947 UBUNTU:CVE-2014-7948 UBUNTU:CVE-2015-1205 UBUNTU:CVE-2015-1346 UBUNTU:USN-2476-1 XF:google-v8-cve20151346-code-exec(100361) bdo#775884 bdo#776264 bdo#776265 bdo#776719 bnc#914468 rh#1185202 rh#1185203 rh#1185204 rh#1185205 rh#1185206 rh#1185208 rh#1185209 rh#1185210 rh#1185211 rh#1185212 rh#1185214 rh#1185215 rh#1185216 rh#1185217 rh#1185218 rh#1185219 rh#1185220 rh#1185221 rh#1185222 rh#1185223 rh#1185224 rh#1185225 rh#1185226 rh#1185229 rh#1185230 rh#1185282 rh#1185283 |
CVE-2014-7938 | icu:Analysis | important | () | BID:72288 CONFIRM:advisories.mageia.org:CVE-2014-7940 CONFIRM:bugs.icu-project.org:CVE-2014-7923 CONFIRM:bugs.icu-project.org:CVE-2014-7926 CONFIRM:chromium.googlesource.com:CVE-2014-7926 CONFIRM:chromium.googlesource.com:CVE-2014-7937 CONFIRM:chromium.googlesource.com:CVE-2014-7940 CONFIRM:code.google.com:CVE-2014-7923 CONFIRM:code.google.com:CVE-2014-7924 CONFIRM:code.google.com:CVE-2014-7925 CONFIRM:code.google.com:CVE-2014-7926 CONFIRM:code.google.com:CVE-2014-7927 CONFIRM:code.google.com:CVE-2014-7928 CONFIRM:code.google.com:CVE-2014-7929 CONFIRM:code.google.com:CVE-2014-7930 CONFIRM:code.google.com:CVE-2014-7931 CONFIRM:code.google.com:CVE-2014-7932 CONFIRM:code.google.com:CVE-2014-7934 CONFIRM:code.google.com:CVE-2014-7935 CONFIRM:code.google.com:CVE-2014-7936 CONFIRM:code.google.com:CVE-2014-7937 CONFIRM:code.google.com:CVE-2014-7938 CONFIRM:code.google.com:CVE-2014-7939 CONFIRM:code.google.com:CVE-2014-7940 CONFIRM:code.google.com:CVE-2014-7941 CONFIRM:code.google.com:CVE-2014-7943 CONFIRM:code.google.com:CVE-2014-7944 CONFIRM:code.google.com:CVE-2014-7945 CONFIRM:code.google.com:CVE-2014-7946 CONFIRM:code.google.com:CVE-2014-7947 CONFIRM:code.google.com:CVE-2014-7948 CONFIRM:code.google.com:CVE-2015-1205 CONFIRM:code.google.com:CVE-2015-1231 CONFIRM:code.google.com:CVE-2015-1361 CONFIRM:codereview.chromium.org:CVE-2014-7924 CONFIRM:codereview.chromium.org:CVE-2014-7925 CONFIRM:codereview.chromium.org:CVE-2014-7926 CONFIRM:codereview.chromium.org:CVE-2014-7927 CONFIRM:codereview.chromium.org:CVE-2014-7928 CONFIRM:codereview.chromium.org:CVE-2014-7931 CONFIRM:codereview.chromium.org:CVE-2014-7935 CONFIRM:codereview.chromium.org:CVE-2014-7936 CONFIRM:codereview.chromium.org:CVE-2014-7941 CONFIRM:codereview.chromium.org:CVE-2014-7948 CONFIRM:git.videolan.org:CVE-2014-7937 CONFIRM:googlechromereleases.blogspot.com:CVE-2015-1361 CONFIRM:pdfium.googlesource.com:CVE-2014-7944 CONFIRM:pdfium.googlesource.com:CVE-2014-7945 CONFIRM:pdfium.googlesource.com:CVE-2014-7947 CONFIRM:src.chromium.org:CVE-2014-7925 CONFIRM:src.chromium.org:CVE-2014-7929 CONFIRM:src.chromium.org:CVE-2014-7930 CONFIRM:src.chromium.org:CVE-2014-7932 CONFIRM:src.chromium.org:CVE-2014-7934 CONFIRM:src.chromium.org:CVE-2014-7946 CVE-2014-7923 CVE-2014-7924 CVE-2014-7925 CVE-2014-7926 CVE-2014-7927 CVE-2014-7928 CVE-2014-7929 CVE-2014-7930 CVE-2014-7931 CVE-2014-7932 CVE-2014-7934 CVE-2014-7935 CVE-2014-7936 CVE-2014-7937 CVE-2014-7938 CVE-2014-7939 CVE-2014-7940 CVE-2014-7941 CVE-2014-7942 CVE-2014-7943 CVE-2014-7944 CVE-2014-7945 CVE-2014-7946 CVE-2014-7947 CVE-2014-7948 CVE-2015-1205 CVE-2015-1346 D:CVE-2015-1205 D:CVE-2015-1346 DSA-3187 GENTOO:GLSA-201502-13 GENTOO:GLSA-201503-06 OSS:2016/Q2/342 Oracle:CVE-2014-7940 RH:CVE-2014-7923 RH:CVE-2014-7924 RH:CVE-2014-7925 RH:CVE-2014-7926 RH:CVE-2014-7927 RH:CVE-2014-7928 RH:CVE-2014-7929 RH:CVE-2014-7930 RH:CVE-2014-7931 RH:CVE-2014-7932 RH:CVE-2014-7934 RH:CVE-2014-7935 RH:CVE-2014-7936 RH:CVE-2014-7937 RH:CVE-2014-7938 RH:CVE-2014-7939 RH:CVE-2014-7940 RH:CVE-2014-7941 RH:CVE-2014-7942 RH:CVE-2014-7943 RH:CVE-2014-7944 RH:CVE-2014-7945 RH:CVE-2014-7946 RH:CVE-2014-7947 RH:CVE-2014-7948 RH:CVE-2015-1205 RH:CVE-2015-1346 RHSA-2015:0093 SECTRACK:1031623 SECUNIA:62383 SECUNIA:62575 SECUNIA:62665 SMASH Issue 113112 SMASH Issue 113139 SUSE:openSUSE-SU-2015:0441 UBUNTU:CVE-2014-7923 UBUNTU:CVE-2014-7924 UBUNTU:CVE-2014-7925 UBUNTU:CVE-2014-7926 UBUNTU:CVE-2014-7927 UBUNTU:CVE-2014-7928 UBUNTU:CVE-2014-7929 UBUNTU:CVE-2014-7930 UBUNTU:CVE-2014-7931 UBUNTU:CVE-2014-7932 UBUNTU:CVE-2014-7934 UBUNTU:CVE-2014-7935 UBUNTU:CVE-2014-7936 UBUNTU:CVE-2014-7937 UBUNTU:CVE-2014-7938 UBUNTU:CVE-2014-7939 UBUNTU:CVE-2014-7940 UBUNTU:CVE-2014-7941 UBUNTU:CVE-2014-7942 UBUNTU:CVE-2014-7943 UBUNTU:CVE-2014-7944 UBUNTU:CVE-2014-7945 UBUNTU:CVE-2014-7946 UBUNTU:CVE-2014-7947 UBUNTU:CVE-2014-7948 UBUNTU:CVE-2015-1205 UBUNTU:CVE-2015-1346 UBUNTU:USN-2476-1 XF:google-v8-cve20151346-code-exec(100361) bdo#775884 bdo#776264 bdo#776265 bdo#776719 bnc#914468 rh#1185202 rh#1185203 rh#1185204 rh#1185205 rh#1185206 rh#1185208 rh#1185209 rh#1185210 rh#1185211 rh#1185212 rh#1185214 rh#1185215 rh#1185216 rh#1185217 rh#1185218 rh#1185219 rh#1185220 rh#1185221 rh#1185222 rh#1185223 rh#1185224 rh#1185225 rh#1185226 rh#1185229 rh#1185230 rh#1185282 rh#1185283 |
CVE-2014-7939 | icu:Analysis | important | () | BID:72288 CONFIRM:advisories.mageia.org:CVE-2014-7940 CONFIRM:bugs.icu-project.org:CVE-2014-7923 CONFIRM:bugs.icu-project.org:CVE-2014-7926 CONFIRM:chromium.googlesource.com:CVE-2014-7926 CONFIRM:chromium.googlesource.com:CVE-2014-7937 CONFIRM:chromium.googlesource.com:CVE-2014-7940 CONFIRM:code.google.com:CVE-2014-7923 CONFIRM:code.google.com:CVE-2014-7924 CONFIRM:code.google.com:CVE-2014-7925 CONFIRM:code.google.com:CVE-2014-7926 CONFIRM:code.google.com:CVE-2014-7927 CONFIRM:code.google.com:CVE-2014-7928 CONFIRM:code.google.com:CVE-2014-7929 CONFIRM:code.google.com:CVE-2014-7930 CONFIRM:code.google.com:CVE-2014-7931 CONFIRM:code.google.com:CVE-2014-7932 CONFIRM:code.google.com:CVE-2014-7934 CONFIRM:code.google.com:CVE-2014-7935 CONFIRM:code.google.com:CVE-2014-7936 CONFIRM:code.google.com:CVE-2014-7937 CONFIRM:code.google.com:CVE-2014-7938 CONFIRM:code.google.com:CVE-2014-7939 CONFIRM:code.google.com:CVE-2014-7940 CONFIRM:code.google.com:CVE-2014-7941 CONFIRM:code.google.com:CVE-2014-7943 CONFIRM:code.google.com:CVE-2014-7944 CONFIRM:code.google.com:CVE-2014-7945 CONFIRM:code.google.com:CVE-2014-7946 CONFIRM:code.google.com:CVE-2014-7947 CONFIRM:code.google.com:CVE-2014-7948 CONFIRM:code.google.com:CVE-2015-1205 CONFIRM:code.google.com:CVE-2015-1231 CONFIRM:code.google.com:CVE-2015-1361 CONFIRM:codereview.chromium.org:CVE-2014-7924 CONFIRM:codereview.chromium.org:CVE-2014-7925 CONFIRM:codereview.chromium.org:CVE-2014-7926 CONFIRM:codereview.chromium.org:CVE-2014-7927 CONFIRM:codereview.chromium.org:CVE-2014-7928 CONFIRM:codereview.chromium.org:CVE-2014-7931 CONFIRM:codereview.chromium.org:CVE-2014-7935 CONFIRM:codereview.chromium.org:CVE-2014-7936 CONFIRM:codereview.chromium.org:CVE-2014-7941 CONFIRM:codereview.chromium.org:CVE-2014-7948 CONFIRM:git.videolan.org:CVE-2014-7937 CONFIRM:googlechromereleases.blogspot.com:CVE-2015-1361 CONFIRM:pdfium.googlesource.com:CVE-2014-7944 CONFIRM:pdfium.googlesource.com:CVE-2014-7945 CONFIRM:pdfium.googlesource.com:CVE-2014-7947 CONFIRM:src.chromium.org:CVE-2014-7925 CONFIRM:src.chromium.org:CVE-2014-7929 CONFIRM:src.chromium.org:CVE-2014-7930 CONFIRM:src.chromium.org:CVE-2014-7932 CONFIRM:src.chromium.org:CVE-2014-7934 CONFIRM:src.chromium.org:CVE-2014-7946 CVE-2014-7923 CVE-2014-7924 CVE-2014-7925 CVE-2014-7926 CVE-2014-7927 CVE-2014-7928 CVE-2014-7929 CVE-2014-7930 CVE-2014-7931 CVE-2014-7932 CVE-2014-7934 CVE-2014-7935 CVE-2014-7936 CVE-2014-7937 CVE-2014-7938 CVE-2014-7939 CVE-2014-7940 CVE-2014-7941 CVE-2014-7942 CVE-2014-7943 CVE-2014-7944 CVE-2014-7945 CVE-2014-7946 CVE-2014-7947 CVE-2014-7948 CVE-2015-1205 CVE-2015-1346 D:CVE-2015-1205 D:CVE-2015-1346 DSA-3187 GENTOO:GLSA-201502-13 GENTOO:GLSA-201503-06 OSS:2016/Q2/342 Oracle:CVE-2014-7940 RH:CVE-2014-7923 RH:CVE-2014-7924 RH:CVE-2014-7925 RH:CVE-2014-7926 RH:CVE-2014-7927 RH:CVE-2014-7928 RH:CVE-2014-7929 RH:CVE-2014-7930 RH:CVE-2014-7931 RH:CVE-2014-7932 RH:CVE-2014-7934 RH:CVE-2014-7935 RH:CVE-2014-7936 RH:CVE-2014-7937 RH:CVE-2014-7938 RH:CVE-2014-7939 RH:CVE-2014-7940 RH:CVE-2014-7941 RH:CVE-2014-7942 RH:CVE-2014-7943 RH:CVE-2014-7944 RH:CVE-2014-7945 RH:CVE-2014-7946 RH:CVE-2014-7947 RH:CVE-2014-7948 RH:CVE-2015-1205 RH:CVE-2015-1346 RHSA-2015:0093 SECTRACK:1031623 SECUNIA:62383 SECUNIA:62575 SECUNIA:62665 SMASH Issue 113113 SMASH Issue 113139 SUSE:openSUSE-SU-2015:0441 UBUNTU:CVE-2014-7923 UBUNTU:CVE-2014-7924 UBUNTU:CVE-2014-7925 UBUNTU:CVE-2014-7926 UBUNTU:CVE-2014-7927 UBUNTU:CVE-2014-7928 UBUNTU:CVE-2014-7929 UBUNTU:CVE-2014-7930 UBUNTU:CVE-2014-7931 UBUNTU:CVE-2014-7932 UBUNTU:CVE-2014-7934 UBUNTU:CVE-2014-7935 UBUNTU:CVE-2014-7936 UBUNTU:CVE-2014-7937 UBUNTU:CVE-2014-7938 UBUNTU:CVE-2014-7939 UBUNTU:CVE-2014-7940 UBUNTU:CVE-2014-7941 UBUNTU:CVE-2014-7942 UBUNTU:CVE-2014-7943 UBUNTU:CVE-2014-7944 UBUNTU:CVE-2014-7945 UBUNTU:CVE-2014-7946 UBUNTU:CVE-2014-7947 UBUNTU:CVE-2014-7948 UBUNTU:CVE-2015-1205 UBUNTU:CVE-2015-1346 UBUNTU:USN-2476-1 XF:google-v8-cve20151346-code-exec(100361) bdo#775884 bdo#776264 bdo#776265 bdo#776719 bnc#914468 rh#1185202 rh#1185203 rh#1185204 rh#1185205 rh#1185206 rh#1185208 rh#1185209 rh#1185210 rh#1185211 rh#1185212 rh#1185214 rh#1185215 rh#1185216 rh#1185217 rh#1185218 rh#1185219 rh#1185220 rh#1185221 rh#1185222 rh#1185223 rh#1185224 rh#1185225 rh#1185226 rh#1185229 rh#1185230 rh#1185282 rh#1185283 |
CVE-2014-7940 | icu:Analysis | important | () | BID:72288 CONFIRM:advisories.mageia.org:CVE-2014-7940 CONFIRM:bugs.icu-project.org:CVE-2014-7923 CONFIRM:bugs.icu-project.org:CVE-2014-7926 CONFIRM:chromium.googlesource.com:CVE-2014-7926 CONFIRM:chromium.googlesource.com:CVE-2014-7937 CONFIRM:chromium.googlesource.com:CVE-2014-7940 CONFIRM:code.google.com:CVE-2014-7923 CONFIRM:code.google.com:CVE-2014-7924 CONFIRM:code.google.com:CVE-2014-7925 CONFIRM:code.google.com:CVE-2014-7926 CONFIRM:code.google.com:CVE-2014-7927 CONFIRM:code.google.com:CVE-2014-7928 CONFIRM:code.google.com:CVE-2014-7929 CONFIRM:code.google.com:CVE-2014-7930 CONFIRM:code.google.com:CVE-2014-7931 CONFIRM:code.google.com:CVE-2014-7932 CONFIRM:code.google.com:CVE-2014-7934 CONFIRM:code.google.com:CVE-2014-7935 CONFIRM:code.google.com:CVE-2014-7936 CONFIRM:code.google.com:CVE-2014-7937 CONFIRM:code.google.com:CVE-2014-7938 CONFIRM:code.google.com:CVE-2014-7939 CONFIRM:code.google.com:CVE-2014-7940 CONFIRM:code.google.com:CVE-2014-7941 CONFIRM:code.google.com:CVE-2014-7943 CONFIRM:code.google.com:CVE-2014-7944 CONFIRM:code.google.com:CVE-2014-7945 CONFIRM:code.google.com:CVE-2014-7946 CONFIRM:code.google.com:CVE-2014-7947 CONFIRM:code.google.com:CVE-2014-7948 CONFIRM:code.google.com:CVE-2015-1205 CONFIRM:code.google.com:CVE-2015-1231 CONFIRM:code.google.com:CVE-2015-1361 CONFIRM:codereview.chromium.org:CVE-2014-7924 CONFIRM:codereview.chromium.org:CVE-2014-7925 CONFIRM:codereview.chromium.org:CVE-2014-7926 CONFIRM:codereview.chromium.org:CVE-2014-7927 CONFIRM:codereview.chromium.org:CVE-2014-7928 CONFIRM:codereview.chromium.org:CVE-2014-7931 CONFIRM:codereview.chromium.org:CVE-2014-7935 CONFIRM:codereview.chromium.org:CVE-2014-7936 CONFIRM:codereview.chromium.org:CVE-2014-7941 CONFIRM:codereview.chromium.org:CVE-2014-7948 CONFIRM:git.videolan.org:CVE-2014-7937 CONFIRM:googlechromereleases.blogspot.com:CVE-2015-1361 CONFIRM:pdfium.googlesource.com:CVE-2014-7944 CONFIRM:pdfium.googlesource.com:CVE-2014-7945 CONFIRM:pdfium.googlesource.com:CVE-2014-7947 CONFIRM:src.chromium.org:CVE-2014-7925 CONFIRM:src.chromium.org:CVE-2014-7929 CONFIRM:src.chromium.org:CVE-2014-7930 CONFIRM:src.chromium.org:CVE-2014-7932 CONFIRM:src.chromium.org:CVE-2014-7934 CONFIRM:src.chromium.org:CVE-2014-7946 CONFIRM:www.oracle.com:CVE-2015-3814 CONFIRM:www.oracle.com:CVE-2015-4917 CVE-2014-7923 CVE-2014-7924 CVE-2014-7925 CVE-2014-7926 CVE-2014-7927 CVE-2014-7928 CVE-2014-7929 CVE-2014-7930 CVE-2014-7931 CVE-2014-7932 CVE-2014-7934 CVE-2014-7935 CVE-2014-7936 CVE-2014-7937 CVE-2014-7938 CVE-2014-7939 CVE-2014-7940 CVE-2014-7941 CVE-2014-7942 CVE-2014-7943 CVE-2014-7944 CVE-2014-7945 CVE-2014-7946 CVE-2014-7947 CVE-2014-7948 CVE-2015-1205 CVE-2015-1346 D:CVE-2015-1205 D:CVE-2015-1346 DSA-3187 GENTOO:GLSA-201502-13 GENTOO:GLSA-201503-06 OSS:2016/Q2/342 Oracle:CVE-2014-7940 RH:CVE-2014-7923 RH:CVE-2014-7924 RH:CVE-2014-7925 RH:CVE-2014-7926 RH:CVE-2014-7927 RH:CVE-2014-7928 RH:CVE-2014-7929 RH:CVE-2014-7930 RH:CVE-2014-7931 RH:CVE-2014-7932 RH:CVE-2014-7934 RH:CVE-2014-7935 RH:CVE-2014-7936 RH:CVE-2014-7937 RH:CVE-2014-7938 RH:CVE-2014-7939 RH:CVE-2014-7940 RH:CVE-2014-7941 RH:CVE-2014-7942 RH:CVE-2014-7943 RH:CVE-2014-7944 RH:CVE-2014-7945 RH:CVE-2014-7946 RH:CVE-2014-7947 RH:CVE-2014-7948 RH:CVE-2015-1205 RH:CVE-2015-1346 RHSA-2015:0093 SECTRACK:1031623 SECUNIA:62383 SECUNIA:62575 SECUNIA:62665 SMASH Issue 113114 SMASH Issue 113139 SUSE:openSUSE-SU-2015:0441 UBUNTU:CVE-2014-7923 UBUNTU:CVE-2014-7924 UBUNTU:CVE-2014-7925 UBUNTU:CVE-2014-7926 UBUNTU:CVE-2014-7927 UBUNTU:CVE-2014-7928 UBUNTU:CVE-2014-7929 UBUNTU:CVE-2014-7930 UBUNTU:CVE-2014-7931 UBUNTU:CVE-2014-7932 UBUNTU:CVE-2014-7934 UBUNTU:CVE-2014-7935 UBUNTU:CVE-2014-7936 UBUNTU:CVE-2014-7937 UBUNTU:CVE-2014-7938 UBUNTU:CVE-2014-7939 UBUNTU:CVE-2014-7940 UBUNTU:CVE-2014-7941 UBUNTU:CVE-2014-7942 UBUNTU:CVE-2014-7943 UBUNTU:CVE-2014-7944 UBUNTU:CVE-2014-7945 UBUNTU:CVE-2014-7946 UBUNTU:CVE-2014-7947 UBUNTU:CVE-2014-7948 UBUNTU:CVE-2015-1205 UBUNTU:CVE-2015-1346 UBUNTU:USN-2476-1 XF:google-v8-cve20151346-code-exec(100361) bdo#775884 bdo#776264 bdo#776265 bdo#776719 bnc#914468 rh#1185202 rh#1185203 rh#1185204 rh#1185205 rh#1185206 rh#1185208 rh#1185209 rh#1185210 rh#1185211 rh#1185212 rh#1185214 rh#1185215 rh#1185216 rh#1185217 rh#1185218 rh#1185219 rh#1185220 rh#1185221 rh#1185222 rh#1185223 rh#1185224 rh#1185225 rh#1185226 rh#1185229 rh#1185230 rh#1185282 rh#1185283 |
CVE-2014-7941 | icu:Analysis | important | () | BID:72288 CONFIRM:advisories.mageia.org:CVE-2014-7940 CONFIRM:bugs.icu-project.org:CVE-2014-7923 CONFIRM:bugs.icu-project.org:CVE-2014-7926 CONFIRM:chromium.googlesource.com:CVE-2014-7926 CONFIRM:chromium.googlesource.com:CVE-2014-7937 CONFIRM:chromium.googlesource.com:CVE-2014-7940 CONFIRM:code.google.com:CVE-2014-7923 CONFIRM:code.google.com:CVE-2014-7924 CONFIRM:code.google.com:CVE-2014-7925 CONFIRM:code.google.com:CVE-2014-7926 CONFIRM:code.google.com:CVE-2014-7927 CONFIRM:code.google.com:CVE-2014-7928 CONFIRM:code.google.com:CVE-2014-7929 CONFIRM:code.google.com:CVE-2014-7930 CONFIRM:code.google.com:CVE-2014-7931 CONFIRM:code.google.com:CVE-2014-7932 CONFIRM:code.google.com:CVE-2014-7934 CONFIRM:code.google.com:CVE-2014-7935 CONFIRM:code.google.com:CVE-2014-7936 CONFIRM:code.google.com:CVE-2014-7937 CONFIRM:code.google.com:CVE-2014-7938 CONFIRM:code.google.com:CVE-2014-7939 CONFIRM:code.google.com:CVE-2014-7940 CONFIRM:code.google.com:CVE-2014-7941 CONFIRM:code.google.com:CVE-2014-7943 CONFIRM:code.google.com:CVE-2014-7944 CONFIRM:code.google.com:CVE-2014-7945 CONFIRM:code.google.com:CVE-2014-7946 CONFIRM:code.google.com:CVE-2014-7947 CONFIRM:code.google.com:CVE-2014-7948 CONFIRM:code.google.com:CVE-2015-1205 CONFIRM:code.google.com:CVE-2015-1231 CONFIRM:code.google.com:CVE-2015-1361 CONFIRM:codereview.chromium.org:CVE-2014-7924 CONFIRM:codereview.chromium.org:CVE-2014-7925 CONFIRM:codereview.chromium.org:CVE-2014-7926 CONFIRM:codereview.chromium.org:CVE-2014-7927 CONFIRM:codereview.chromium.org:CVE-2014-7928 CONFIRM:codereview.chromium.org:CVE-2014-7931 CONFIRM:codereview.chromium.org:CVE-2014-7935 CONFIRM:codereview.chromium.org:CVE-2014-7936 CONFIRM:codereview.chromium.org:CVE-2014-7941 CONFIRM:codereview.chromium.org:CVE-2014-7948 CONFIRM:git.videolan.org:CVE-2014-7937 CONFIRM:googlechromereleases.blogspot.com:CVE-2015-1361 CONFIRM:pdfium.googlesource.com:CVE-2014-7944 CONFIRM:pdfium.googlesource.com:CVE-2014-7945 CONFIRM:pdfium.googlesource.com:CVE-2014-7947 CONFIRM:src.chromium.org:CVE-2014-7925 CONFIRM:src.chromium.org:CVE-2014-7929 CONFIRM:src.chromium.org:CVE-2014-7930 CONFIRM:src.chromium.org:CVE-2014-7932 CONFIRM:src.chromium.org:CVE-2014-7934 CONFIRM:src.chromium.org:CVE-2014-7946 CVE-2014-7923 CVE-2014-7924 CVE-2014-7925 CVE-2014-7926 CVE-2014-7927 CVE-2014-7928 CVE-2014-7929 CVE-2014-7930 CVE-2014-7931 CVE-2014-7932 CVE-2014-7934 CVE-2014-7935 CVE-2014-7936 CVE-2014-7937 CVE-2014-7938 CVE-2014-7939 CVE-2014-7940 CVE-2014-7941 CVE-2014-7942 CVE-2014-7943 CVE-2014-7944 CVE-2014-7945 CVE-2014-7946 CVE-2014-7947 CVE-2014-7948 CVE-2015-1205 CVE-2015-1346 D:CVE-2015-1205 D:CVE-2015-1346 DSA-3187 GENTOO:GLSA-201502-13 GENTOO:GLSA-201503-06 OSS:2016/Q2/342 Oracle:CVE-2014-7940 RH:CVE-2014-7923 RH:CVE-2014-7924 RH:CVE-2014-7925 RH:CVE-2014-7926 RH:CVE-2014-7927 RH:CVE-2014-7928 RH:CVE-2014-7929 RH:CVE-2014-7930 RH:CVE-2014-7931 RH:CVE-2014-7932 RH:CVE-2014-7934 RH:CVE-2014-7935 RH:CVE-2014-7936 RH:CVE-2014-7937 RH:CVE-2014-7938 RH:CVE-2014-7939 RH:CVE-2014-7940 RH:CVE-2014-7941 RH:CVE-2014-7942 RH:CVE-2014-7943 RH:CVE-2014-7944 RH:CVE-2014-7945 RH:CVE-2014-7946 RH:CVE-2014-7947 RH:CVE-2014-7948 RH:CVE-2015-1205 RH:CVE-2015-1346 RHSA-2015:0093 SECTRACK:1031623 SECUNIA:62383 SECUNIA:62575 SECUNIA:62665 SMASH Issue 113115 SMASH Issue 113139 SUSE:openSUSE-SU-2015:0441 UBUNTU:CVE-2014-7923 UBUNTU:CVE-2014-7924 UBUNTU:CVE-2014-7925 UBUNTU:CVE-2014-7926 UBUNTU:CVE-2014-7927 UBUNTU:CVE-2014-7928 UBUNTU:CVE-2014-7929 UBUNTU:CVE-2014-7930 UBUNTU:CVE-2014-7931 UBUNTU:CVE-2014-7932 UBUNTU:CVE-2014-7934 UBUNTU:CVE-2014-7935 UBUNTU:CVE-2014-7936 UBUNTU:CVE-2014-7937 UBUNTU:CVE-2014-7938 UBUNTU:CVE-2014-7939 UBUNTU:CVE-2014-7940 UBUNTU:CVE-2014-7941 UBUNTU:CVE-2014-7942 UBUNTU:CVE-2014-7943 UBUNTU:CVE-2014-7944 UBUNTU:CVE-2014-7945 UBUNTU:CVE-2014-7946 UBUNTU:CVE-2014-7947 UBUNTU:CVE-2014-7948 UBUNTU:CVE-2015-1205 UBUNTU:CVE-2015-1346 UBUNTU:USN-2476-1 XF:google-v8-cve20151346-code-exec(100361) bdo#775884 bdo#776264 bdo#776265 bdo#776719 bnc#914468 rh#1185202 rh#1185203 rh#1185204 rh#1185205 rh#1185206 rh#1185208 rh#1185209 rh#1185210 rh#1185211 rh#1185212 rh#1185214 rh#1185215 rh#1185216 rh#1185217 rh#1185218 rh#1185219 rh#1185220 rh#1185221 rh#1185222 rh#1185223 rh#1185224 rh#1185225 rh#1185226 rh#1185229 rh#1185230 rh#1185282 rh#1185283 |
CVE-2014-7942 | icu:Analysis | important | () | BID:72288 CONFIRM:advisories.mageia.org:CVE-2014-7940 CONFIRM:bugs.icu-project.org:CVE-2014-7923 CONFIRM:bugs.icu-project.org:CVE-2014-7926 CONFIRM:chromium.googlesource.com:CVE-2014-7926 CONFIRM:chromium.googlesource.com:CVE-2014-7937 CONFIRM:chromium.googlesource.com:CVE-2014-7940 CONFIRM:code.google.com:CVE-2014-7923 CONFIRM:code.google.com:CVE-2014-7924 CONFIRM:code.google.com:CVE-2014-7925 CONFIRM:code.google.com:CVE-2014-7926 CONFIRM:code.google.com:CVE-2014-7927 CONFIRM:code.google.com:CVE-2014-7928 CONFIRM:code.google.com:CVE-2014-7929 CONFIRM:code.google.com:CVE-2014-7930 CONFIRM:code.google.com:CVE-2014-7931 CONFIRM:code.google.com:CVE-2014-7932 CONFIRM:code.google.com:CVE-2014-7934 CONFIRM:code.google.com:CVE-2014-7935 CONFIRM:code.google.com:CVE-2014-7936 CONFIRM:code.google.com:CVE-2014-7937 CONFIRM:code.google.com:CVE-2014-7938 CONFIRM:code.google.com:CVE-2014-7939 CONFIRM:code.google.com:CVE-2014-7940 CONFIRM:code.google.com:CVE-2014-7941 CONFIRM:code.google.com:CVE-2014-7943 CONFIRM:code.google.com:CVE-2014-7944 CONFIRM:code.google.com:CVE-2014-7945 CONFIRM:code.google.com:CVE-2014-7946 CONFIRM:code.google.com:CVE-2014-7947 CONFIRM:code.google.com:CVE-2014-7948 CONFIRM:code.google.com:CVE-2015-1205 CONFIRM:code.google.com:CVE-2015-1231 CONFIRM:code.google.com:CVE-2015-1361 CONFIRM:codereview.chromium.org:CVE-2014-7924 CONFIRM:codereview.chromium.org:CVE-2014-7925 CONFIRM:codereview.chromium.org:CVE-2014-7926 CONFIRM:codereview.chromium.org:CVE-2014-7927 CONFIRM:codereview.chromium.org:CVE-2014-7928 CONFIRM:codereview.chromium.org:CVE-2014-7931 CONFIRM:codereview.chromium.org:CVE-2014-7935 CONFIRM:codereview.chromium.org:CVE-2014-7936 CONFIRM:codereview.chromium.org:CVE-2014-7941 CONFIRM:codereview.chromium.org:CVE-2014-7948 CONFIRM:git.videolan.org:CVE-2014-7937 CONFIRM:googlechromereleases.blogspot.com:CVE-2015-1361 CONFIRM:pdfium.googlesource.com:CVE-2014-7944 CONFIRM:pdfium.googlesource.com:CVE-2014-7945 CONFIRM:pdfium.googlesource.com:CVE-2014-7947 CONFIRM:src.chromium.org:CVE-2014-7925 CONFIRM:src.chromium.org:CVE-2014-7929 CONFIRM:src.chromium.org:CVE-2014-7930 CONFIRM:src.chromium.org:CVE-2014-7932 CONFIRM:src.chromium.org:CVE-2014-7934 CONFIRM:src.chromium.org:CVE-2014-7946 CVE-2014-7923 CVE-2014-7924 CVE-2014-7925 CVE-2014-7926 CVE-2014-7927 CVE-2014-7928 CVE-2014-7929 CVE-2014-7930 CVE-2014-7931 CVE-2014-7932 CVE-2014-7934 CVE-2014-7935 CVE-2014-7936 CVE-2014-7937 CVE-2014-7938 CVE-2014-7939 CVE-2014-7940 CVE-2014-7941 CVE-2014-7942 CVE-2014-7943 CVE-2014-7944 CVE-2014-7945 CVE-2014-7946 CVE-2014-7947 CVE-2014-7948 CVE-2015-1205 CVE-2015-1346 D:CVE-2015-1205 D:CVE-2015-1346 DSA-3187 GENTOO:GLSA-201502-13 GENTOO:GLSA-201503-06 OSS:2016/Q2/342 Oracle:CVE-2014-7940 RH:CVE-2014-7923 RH:CVE-2014-7924 RH:CVE-2014-7925 RH:CVE-2014-7926 RH:CVE-2014-7927 RH:CVE-2014-7928 RH:CVE-2014-7929 RH:CVE-2014-7930 RH:CVE-2014-7931 RH:CVE-2014-7932 RH:CVE-2014-7934 RH:CVE-2014-7935 RH:CVE-2014-7936 RH:CVE-2014-7937 RH:CVE-2014-7938 RH:CVE-2014-7939 RH:CVE-2014-7940 RH:CVE-2014-7941 RH:CVE-2014-7942 RH:CVE-2014-7943 RH:CVE-2014-7944 RH:CVE-2014-7945 RH:CVE-2014-7946 RH:CVE-2014-7947 RH:CVE-2014-7948 RH:CVE-2015-1205 RH:CVE-2015-1346 RHSA-2015:0093 SECTRACK:1031623 SECUNIA:62383 SECUNIA:62575 SECUNIA:62665 SMASH Issue 113116 SMASH Issue 113139 SUSE:openSUSE-SU-2015:0441 UBUNTU:CVE-2014-7923 UBUNTU:CVE-2014-7924 UBUNTU:CVE-2014-7925 UBUNTU:CVE-2014-7926 UBUNTU:CVE-2014-7927 UBUNTU:CVE-2014-7928 UBUNTU:CVE-2014-7929 UBUNTU:CVE-2014-7930 UBUNTU:CVE-2014-7931 UBUNTU:CVE-2014-7932 UBUNTU:CVE-2014-7934 UBUNTU:CVE-2014-7935 UBUNTU:CVE-2014-7936 UBUNTU:CVE-2014-7937 UBUNTU:CVE-2014-7938 UBUNTU:CVE-2014-7939 UBUNTU:CVE-2014-7940 UBUNTU:CVE-2014-7941 UBUNTU:CVE-2014-7942 UBUNTU:CVE-2014-7943 UBUNTU:CVE-2014-7944 UBUNTU:CVE-2014-7945 UBUNTU:CVE-2014-7946 UBUNTU:CVE-2014-7947 UBUNTU:CVE-2014-7948 UBUNTU:CVE-2015-1205 UBUNTU:CVE-2015-1346 UBUNTU:USN-2476-1 XF:google-v8-cve20151346-code-exec(100361) bdo#775884 bdo#776264 bdo#776265 bdo#776719 bnc#914468 rh#1185202 rh#1185203 rh#1185204 rh#1185205 rh#1185206 rh#1185208 rh#1185209 rh#1185210 rh#1185211 rh#1185212 rh#1185214 rh#1185215 rh#1185216 rh#1185217 rh#1185218 rh#1185219 rh#1185220 rh#1185221 rh#1185222 rh#1185223 rh#1185224 rh#1185225 rh#1185226 rh#1185229 rh#1185230 rh#1185282 rh#1185283 |
CVE-2014-7947 | icu:Analysis | important | () | BID:72288 CONFIRM:advisories.mageia.org:CVE-2014-7940 CONFIRM:bugs.icu-project.org:CVE-2014-7923 CONFIRM:bugs.icu-project.org:CVE-2014-7926 CONFIRM:chromium.googlesource.com:CVE-2014-7926 CONFIRM:chromium.googlesource.com:CVE-2014-7937 CONFIRM:chromium.googlesource.com:CVE-2014-7940 CONFIRM:code.google.com:CVE-2014-7923 CONFIRM:code.google.com:CVE-2014-7924 CONFIRM:code.google.com:CVE-2014-7925 CONFIRM:code.google.com:CVE-2014-7926 CONFIRM:code.google.com:CVE-2014-7927 CONFIRM:code.google.com:CVE-2014-7928 CONFIRM:code.google.com:CVE-2014-7929 CONFIRM:code.google.com:CVE-2014-7930 CONFIRM:code.google.com:CVE-2014-7931 CONFIRM:code.google.com:CVE-2014-7932 CONFIRM:code.google.com:CVE-2014-7934 CONFIRM:code.google.com:CVE-2014-7935 CONFIRM:code.google.com:CVE-2014-7936 CONFIRM:code.google.com:CVE-2014-7937 CONFIRM:code.google.com:CVE-2014-7938 CONFIRM:code.google.com:CVE-2014-7939 CONFIRM:code.google.com:CVE-2014-7940 CONFIRM:code.google.com:CVE-2014-7941 CONFIRM:code.google.com:CVE-2014-7943 CONFIRM:code.google.com:CVE-2014-7944 CONFIRM:code.google.com:CVE-2014-7945 CONFIRM:code.google.com:CVE-2014-7946 CONFIRM:code.google.com:CVE-2014-7947 CONFIRM:code.google.com:CVE-2014-7948 CONFIRM:code.google.com:CVE-2015-1205 CONFIRM:code.google.com:CVE-2015-1231 CONFIRM:code.google.com:CVE-2015-1361 CONFIRM:codereview.chromium.org:CVE-2014-7924 CONFIRM:codereview.chromium.org:CVE-2014-7925 CONFIRM:codereview.chromium.org:CVE-2014-7926 CONFIRM:codereview.chromium.org:CVE-2014-7927 CONFIRM:codereview.chromium.org:CVE-2014-7928 CONFIRM:codereview.chromium.org:CVE-2014-7931 CONFIRM:codereview.chromium.org:CVE-2014-7935 CONFIRM:codereview.chromium.org:CVE-2014-7936 CONFIRM:codereview.chromium.org:CVE-2014-7941 CONFIRM:codereview.chromium.org:CVE-2014-7948 CONFIRM:git.videolan.org:CVE-2014-7937 CONFIRM:googlechromereleases.blogspot.com:CVE-2015-1361 CONFIRM:pdfium.googlesource.com:CVE-2014-7944 CONFIRM:pdfium.googlesource.com:CVE-2014-7945 CONFIRM:pdfium.googlesource.com:CVE-2014-7947 CONFIRM:src.chromium.org:CVE-2014-7925 CONFIRM:src.chromium.org:CVE-2014-7929 CONFIRM:src.chromium.org:CVE-2014-7930 CONFIRM:src.chromium.org:CVE-2014-7932 CONFIRM:src.chromium.org:CVE-2014-7934 CONFIRM:src.chromium.org:CVE-2014-7946 CVE-2014-7923 CVE-2014-7924 CVE-2014-7925 CVE-2014-7926 CVE-2014-7927 CVE-2014-7928 CVE-2014-7929 CVE-2014-7930 CVE-2014-7931 CVE-2014-7932 CVE-2014-7934 CVE-2014-7935 CVE-2014-7936 CVE-2014-7937 CVE-2014-7938 CVE-2014-7939 CVE-2014-7940 CVE-2014-7941 CVE-2014-7942 CVE-2014-7943 CVE-2014-7944 CVE-2014-7945 CVE-2014-7946 CVE-2014-7947 CVE-2014-7948 CVE-2015-1205 CVE-2015-1346 D:CVE-2015-1205 D:CVE-2015-1346 DSA-3187 GENTOO:GLSA-201502-13 GENTOO:GLSA-201503-06 OSS:2016/Q2/342 Oracle:CVE-2014-7940 RH:CVE-2014-7923 RH:CVE-2014-7924 RH:CVE-2014-7925 RH:CVE-2014-7926 RH:CVE-2014-7927 RH:CVE-2014-7928 RH:CVE-2014-7929 RH:CVE-2014-7930 RH:CVE-2014-7931 RH:CVE-2014-7932 RH:CVE-2014-7934 RH:CVE-2014-7935 RH:CVE-2014-7936 RH:CVE-2014-7937 RH:CVE-2014-7938 RH:CVE-2014-7939 RH:CVE-2014-7940 RH:CVE-2014-7941 RH:CVE-2014-7942 RH:CVE-2014-7943 RH:CVE-2014-7944 RH:CVE-2014-7945 RH:CVE-2014-7946 RH:CVE-2014-7947 RH:CVE-2014-7948 RH:CVE-2015-1205 RH:CVE-2015-1346 RHSA-2015:0093 SECTRACK:1031623 SECUNIA:62383 SECUNIA:62575 SECUNIA:62665 SMASH Issue 113121 SMASH Issue 113139 SUSE:openSUSE-SU-2015:0441 UBUNTU:CVE-2014-7923 UBUNTU:CVE-2014-7924 UBUNTU:CVE-2014-7925 UBUNTU:CVE-2014-7926 UBUNTU:CVE-2014-7927 UBUNTU:CVE-2014-7928 UBUNTU:CVE-2014-7929 UBUNTU:CVE-2014-7930 UBUNTU:CVE-2014-7931 UBUNTU:CVE-2014-7932 UBUNTU:CVE-2014-7934 UBUNTU:CVE-2014-7935 UBUNTU:CVE-2014-7936 UBUNTU:CVE-2014-7937 UBUNTU:CVE-2014-7938 UBUNTU:CVE-2014-7939 UBUNTU:CVE-2014-7940 UBUNTU:CVE-2014-7941 UBUNTU:CVE-2014-7942 UBUNTU:CVE-2014-7943 UBUNTU:CVE-2014-7944 UBUNTU:CVE-2014-7945 UBUNTU:CVE-2014-7946 UBUNTU:CVE-2014-7947 UBUNTU:CVE-2014-7948 UBUNTU:CVE-2015-1205 UBUNTU:CVE-2015-1346 UBUNTU:USN-2476-1 XF:google-v8-cve20151346-code-exec(100361) bdo#775884 bdo#776264 bdo#776265 bdo#776719 bnc#914468 rh#1185202 rh#1185203 rh#1185204 rh#1185205 rh#1185206 rh#1185208 rh#1185209 rh#1185210 rh#1185211 rh#1185212 rh#1185214 rh#1185215 rh#1185216 rh#1185217 rh#1185218 rh#1185219 rh#1185220 rh#1185221 rh#1185222 rh#1185223 rh#1185224 rh#1185225 rh#1185226 rh#1185229 rh#1185230 rh#1185282 rh#1185283 |
CVE-2014-7975 | kernel-source-rt:Not affected | moderate | () | BID:70314 CONFIRM:git.kernel.org:CVE-2014-7975 CVE-2014-7975 CVE-2023-2002 D:CVE-2014-7975 MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[oss-security] 20141008 CVE-2014-7975: 0-day umount denial of service MLIST:[stable] 20141008 [PATCH] fs: Add a missing permission check to do_umount OSS:2014/Q4/229 OSS:2023/04/16/3 RH:CVE-2014-7975 RHSA-2017:1842 RHSA-2017:2077 SECTRACK:1031180 SECUNIA:60174 SECUNIA:61145 SECUNIA:62633 SECUNIA:62634 SMASH Issue 109031 SMASH Issue 109039 UBUNTU:CVE-2014-7975 UBUNTU:USN-2415-1 UBUNTU:USN-2416-1 UBUNTU:USN-2417-1 UBUNTU:USN-2418-1 UBUNTU:USN-2419-1 UBUNTU:USN-2420-1 UBUNTU:USN-2421-1 XF:linux-kernel-cve20147975-dos(96994) bnc#900392 linux.git:commit:0ef3a56b1c466629cd0bf482b09c7b0e5a085bb5 linux.git:commit:a1480dcc3c706e309a88884723446f2e84fedd5b rh#1113899 rh#1151108 |
CVE-2014-8134 | kernel-source-rt:Not affected | low | () | BID:71650 CONFIRM:bugs.launchpad.net:CVE-2014-8134 CONFIRM:bugzilla.novell.com:CVE-2014-8134 CONFIRM:support.f5.com:CVE-2014-8134 CONFIRM:www.oracle.com:CVE-2015-8391 CONFIRM:www.oracle.com:CVE-2016-5240 CVE-2014-8134 CVE-2023-2002 D:CVE-2014-8134 MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[kvm] 20141205 [PATCH] x86, kvm: Clear paravirt_enabled on KVM guests for espfix32's benefit OSS:2023/04/16/3 RH:CVE-2014-8134 RHSA-2016:0855 SECUNIA:62336 SMASH Issue 111365 SUSE:SUSE-SU-2015:0481 SUSE:SUSE-SU-2015:0736 SUSE:openSUSE-SU-2015:0566 SUSE:openSUSE-SU-2015:0714 UBUNTU:CVE-2014-8134 bnc#909078 https://support.f5.com/csp/article/K17120?utm_source=f5support&%3Butm_medium=RSS linux.git:commit:29fa6825463c97e5157284db80107d1bfac5d77b rh#1113899 rh#1163762 rh#1163792 rh#1172765 |
CVE-2014-8160 | kernel-source-rt:Not affected | important | () | BID:68214 BID:70691 BID:72061 CONFIRM:git.kernel.org:CVE-2013-7281 CONFIRM:git.kernel.org:CVE-2014-3690 CONFIRM:git.kernel.org:CVE-2014-4608 CONFIRM:git.kernel.org:CVE-2014-8160 CONFIRM:github.com:CVE-2013-7281 CONFIRM:github.com:CVE-2014-3690 CONFIRM:github.com:CVE-2014-4608 CONFIRM:github.com:CVE-2014-8160 CONFIRM:www.kernel.org:CVE-2014-3690 CONFIRM:www.kernel.org:CVE-2014-9914 CVE-2013-7263 CVE-2014-3673 CVE-2014-3690 CVE-2014-4608 CVE-2014-8160 CVE-2014-9584 CVE-2015-7303 CVE-2015-7838 CVE-2015-7839 CVE-2015-8028 CVE-2015-8029 CVE-2015-8030 CVE-2015-8220 CVE-2015-8561 CVE-2015-8572 CVE-2015-8580 CVE-2015-8843 CVE-2016-1715 CVE-2016-4065 CVE-2023-2002 D:CVE-2013-7263 D:CVE-2014-3690 DSA-2906 DSA-3060 DSA-3170 MANDRIVA:MDVSA-2015:057 MANDRIVA:MDVSA-2015:058 MISC:blog.securitymouse.com:CVE-2014-4611 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:MLIST:[oss-security] 20141021 CVE-2014-3690: KVM DoS triggerable by malicious host userspace MISC:git.kernel.org:MLIST:[oss-security] 20141126 Re: CVE Request: Linux kernel LDT handling bugs MISC:git.kernel.org:MLIST:[oss-security] 20141215 Linux kernel: multiple x86_64 vulnerabilities MISC:git.kernel.org:MLIST:[oss-security] 20150320 Re: CVE Request: Linux kernel execution in the early microcode loader. MISC:git.kernel.org:OSS:2023/04/16/3 MISC:www.oberhumer.com:CVE-2014-4608 MISC:www.securitymouse.com:CVE-2014-4608 MISC:www.zerodayinitiative.com MLIST:[netfilter-devel] 20140925 [PATCH nf] netfilter: conntrack: disable generic protocol tracking MLIST:[oss-security] 20131128 Re: CVE Request: Linux kernel: net: uninitialised memory leakage MLIST:[oss-security] 20140107 oss-sec: CVE split and a missed file MLIST:[oss-security] 20140626 LMS-2014-06-16-2: Linux Kernel LZO MLIST:[oss-security] 20141021 CVE-2014-3690: KVM DoS triggerable by malicious host userspace MLIST:[oss-security] 20141029 Re: CVE-2014-3690: KVM DoS triggerable by malicious host userspace MLIST:[oss-security] 20150114 CVE-2014-8160 Linux Kernel: SCTP firewalling fails until SCTP module is loaded OSS:2014/Q4/416 OSS:2023/04/16/3 RH:CVE-2013-7263 RH:CVE-2014-3690 RH:CVE-2014-4608 RH:CVE-2014-8160 RHSA-2014:0159 RHSA-2014:0285 RHSA-2014:0439 RHSA-2014:1392 RHSA-2015:0062 RHSA-2015:0284 RHSA-2015:0290 RHSA-2015:0674 RHSA-2015:0782 RHSA-2015:0864 SECUNIA:55882 SECUNIA:56036 SECUNIA:60011 SECUNIA:60174 SECUNIA:62633 SMASH Issue 110104 SMASH Issue 110107 SMASH Issue 95116 SUSE:SUSE-SU-2015:0178 SUSE:SUSE-SU-2015:0481 SUSE:SUSE-SU-2015:0529 SUSE:SUSE-SU-2015:0652 SUSE:SUSE-SU-2015:0736 SUSE:openSUSE-SU-2015:0566 SUSE:openSUSE-SU-2015:0714 UBUNTU:CVE-2013-7263 UBUNTU:CVE-2014-3185 UBUNTU:CVE-2014-3690 UBUNTU:CVE-2014-4608 UBUNTU:CVE-2014-7826 UBUNTU:CVE-2014-8133 UBUNTU:CVE-2014-8160 UBUNTU:CVE-2014-9090 UBUNTU:CVE-2014-9322 UBUNTU:USN-2109-1 UBUNTU:USN-2110-1 UBUNTU:USN-2416-1 UBUNTU:USN-2417-1 UBUNTU:USN-2418-1 UBUNTU:USN-2419-1 UBUNTU:USN-2420-1 UBUNTU:USN-2421-1 UBUNTU:USN-2513-1 UBUNTU:USN-2514-1 UBUNTU:USN-2515-1 UBUNTU:USN-2516-1 UBUNTU:USN-2517-1 UBUNTU:USN-2518-1 bdo#766195 bnc#857643 bnc#902232 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=206a81c18401c0cde6e579164f752c4b147324ce http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d974baa398f34393db76be45f7d4d04fbdbb4a0a http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=db29a9508a9246e77087c5531e45b2c88ec6988b rh#1007690 rh#1035875 rh#1067558 rh#1094232 rh#1113899 rh#1153322 rh#1163762 rh#1163792 rh#1182059 |
CVE-2014-8171 | kernel-source-rt:Unsupported | moderate | () | BID:74293 CVE-2014-8171 RH:CVE-2014-8171 RHSA-2015:0864 RHSA-2015:2152 RHSA-2015:2411 RHSA-2016:0068 SMASH Issue 116130 SMASH Issue 116205 UBUNTU:CVE-2014-8171 bnc#928128 rh#1198109 |
CVE-2014-8172 | kernel-source-rt:Unsupported | moderate | () | CONFIRM:git.kernel.org:CVE-2014-8172 CONFIRM:github.com:CVE-2014-8172 CVE-2014-8172 L3:42836 MISC:git.kernel.org:MLIST:[oss-security] 20150309 CVE-2014-8172 MLIST:[oss-security] 20150309 CVE-2014-8172 OSS:2015/Q1/778 RH:CVE-2014-8172 RHSA-2015:0290 RHSA-2015:0694 SMASH Issue 114412 UBUNTU:CVE-2014-8172 bnc#920632 bnc#926407 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=eee5cc2702929fd41cce28058dc6d6717f723f87 rh#1198503 |
CVE-2014-8173 | kernel-source-rt:Unsupported | important | () | CONFIRM:git.kernel.org:CVE-2014-8173 CONFIRM:github.com:CVE-2014-8173 CVE-2014-8173 D:CVE-2014-8173 MISC:git.kernel.org:/ RH:CVE-2014-8173 RHSA-2015:0290 RHSA-2015:0694 SMASH Issue 114410 SUSE:openSUSE-SU-2015:0714 UBUNTU:CVE-2014-8173 bnc#920583 rh#1198457 |
CVE-2014-8369 | kernel-source-rt:Not affected | important | () | BID:70747 BID:70749 CONFIRM:git.kernel.org:CVE-2014-8369 CVE-2014-8369 CVE-2023-2002 D:CVE-2014-8369 DSA-3093 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[linux-kernel] 20141024 [PATCH 13/14] kvm: fix excessive pages un-pinning in kvm_iommu_map error path. MLIST:[oss-security] 20141024 CVE-2014-8369 - Linux kernel iommu.c excessive unpinning OSS:2023/04/16/3 RH:CVE-2014-8369 RHSA-2015:0674 SECUNIA:62326 SECUNIA:62336 SMASH Issue 110150 SUSE:SUSE-SU-2015:0481 SUSE:SUSE-SU-2015:0736 SUSE:openSUSE-SU-2015:0566 UBUNTU:CVE-2014-8369 bnc#902675 linux.git:commit:3d32e4dbe71374a6780eaf51d719d76f9a9bf22f rh#1113899 rh#1156518 rh#1163762 rh#1163792 |
CVE-2014-8559 | kernel-source-rt:Not affected | moderate | () | BID:70854 BID:72347 BID:72357 CONFIRM:git.kernel.org:CVE-2014-8559 CONFIRM:github.com:CVE-2014-7822 CONFIRM:support.f5.com:CVE-2014-8559 CONFIRM:www.oracle.com CONFIRM:www.oracle.com:CVE-2015-8472 CVE-2014-7822 CVE-2014-8559 CVE-2015-1420 D:CVE-2015-1420 DSA-3170 EXPLOIT-DB:36743 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MLIST:[linux-kernel] 20141025 fs: lockup on rename_mutex in fs/dcache.c:1035 MLIST:[linux-kernel] 20141026 Re: fs: lockup on rename_mutex in fs/dcache.c:1035 MLIST:[linux-kernel] 20150128 [PATCH v2] vfs: read file_handle only once in handle_to_path MLIST:[oss-security] 20141030 CVE-2014-8559 - Linux kernel fs/dcache.c incorrect use of rename_lock MLIST:[oss-security] 20150129 CVE-2015-1420 - Linux kernel fs/fhandle.c race condition OSS:2015/Q1/331 OSS:2023/10/10/4 Oracle:CVE-2015-6937 RH:CVE-2014-7822 RH:CVE-2014-8559 RH:CVE-2015-1420 RHSA-2015:0102 RHSA-2015:0164 RHSA-2015:0674 RHSA-2015:0694 RHSA-2015:1976 RHSA-2015:1977 RHSA-2015:1978 SECTRACK:1034051 SECUNIA:62801 SMASH Issue 113306 SUSE:SUSE-SU-2015:0178 SUSE:SUSE-SU-2015:0481 SUSE:SUSE-SU-2015:0529 SUSE:SUSE-SU-2015:0736 SUSE:SUSE-SU-2015:1488 SUSE:SUSE-SU-2015:1489 SUSE:openSUSE-SU-2015:0566 SUSE:openSUSE-SU-2015:0714 UBUNTU:CVE-2014-7822 UBUNTU:CVE-2014-8559 UBUNTU:CVE-2015-1420 UBUNTU:USN-2492-1 UBUNTU:USN-2493-1 UBUNTU:USN-2515-1 UBUNTU:USN-2516-1 UBUNTU:USN-2517-1 UBUNTU:USN-2518-1 UBUNTU:USN-2541-1 UBUNTU:USN-2542-1 UBUNTU:USN-2543-1 UBUNTU:USN-2544-1 UBUNTU:USN-2660-1 UBUNTU:USN-2661-1 UBUNTU:USN-2665-1 UBUNTU:USN-2667-1 bnc#915517 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8d0207652cbe27d1f962050737848e5ad4671958 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 rh#1159313 rh#1163792 rh#1183744 rh#1187534 rh#1202855 rh#1243465 rh#2162080 rh#2162082 rh#2162084 rh#2162087 |
CVE-2014-8709 | kernel-source-rt:Not affected | important | () | BID:70965 CONFIRM:git.kernel.org:CVE-2014-8709 CONFIRM:github.com:CVE-2014-8709 CVE-2014-8709 CVE-2023-2002 D:CVE-2014-8709 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[oss-security] 20141109 Re: CVE Request: Linux kernel mac80211 plain text leak OSS:2023/04/16/3 RH:CVE-2014-8709 RHSA-2015:0290 RHSA-2015:1272 SMASH Issue 110597 UBUNTU:CVE-2014-8709 XF:linux-kernel-cve20148709-info-disclsoure(98922) bnc#904700 rh#1113899 rh#1163762 rh#1173580 |
CVE-2014-9419 | kernel-source-rt:Not affected | low | () | BID:74964 BID:75001 CONFIRM:git.kernel.org:CVE-2014-9420 CONFIRM:git.kernel.org:CVE-2014-9728 CONFIRM:git.kernel.org:CVE-2014-9729 CONFIRM:git.kernel.org:CVE-2014-9730 CONFIRM:git.kernel.org:CVE-2014-9731 CONFIRM:github.com:CVE-2014-9420 CONFIRM:github.com:CVE-2014-9728 CONFIRM:github.com:CVE-2014-9729 CONFIRM:github.com:CVE-2014-9730 CONFIRM:github.com:CVE-2014-9731 CONFIRM:source.android.com:CVE-2017-0404 CONFIRM:www.oracle.com:CVE-2015-1351 CVE-2014-9419 CVE-2014-9420 CVE-2014-9728 CVE-2014-9729 CVE-2014-9730 CVE-2014-9731 CVE-2023-2002 D:CVE-2014-9420 FEDORA:FEDORA-2015-0515 FEDORA:FEDORA-2015-0517 MANDRIVA:MDVSA-2015:058 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:/ MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[oss-security] 20141225 Re: CVE Request Linux kernel: fs: isofs: infinite loop in CE records MLIST:[oss-security] 20150602 CVE request Linux kernel: fs: udf heap overflow in __udf_adinicb_readpage MLIST:[oss-security] 20150603 CVE request Linux kernel: udf: information leakage when reading symlink OSS:2016/Q2/365 OSS:2023/04/16/3 OSS:2023/10/10/4 Oracle:CVE-2015-6937 RH:CVE-2014-9419 RH:CVE-2014-9420 RH:CVE-2014-9728 RH:CVE-2014-9729 RH:CVE-2014-9730 RH:CVE-2014-9731 RHSA-2015:1081 RHSA-2015:1137 RHSA-2015:1138 RHSA-2015:1139 RHSA-2015:2152 RHSA-2015:2411 SECUNIA:62801 SMASH Issue 111836 SMASH Issue 156023 SMASH Issue 240305 SUSE:SUSE-SU-2015:0178 SUSE:SUSE-SU-2015:0652 SUSE:SUSE-SU-2015:0736 SUSE:SUSE-SU-2015:0812 SUSE:SUSE-SU-2015:1324 SUSE:SUSE-SU-2015:1592 SUSE:SUSE-SU-2015:1611 SUSE:openSUSE-SU-2015:0714 SUSE:openSUSE-SU-2015:1382 UBUNTU:CVE-2014-9419 UBUNTU:CVE-2014-9420 UBUNTU:CVE-2014-9728 UBUNTU:CVE-2014-9729 UBUNTU:CVE-2014-9730 UBUNTU:CVE-2014-9731 UBUNTU:USN-2490-1 UBUNTU:USN-2491-1 UBUNTU:USN-2492-1 UBUNTU:USN-2493-1 UBUNTU:USN-2515-1 UBUNTU:USN-2516-1 UBUNTU:USN-2517-1 UBUNTU:USN-2518-1 bnc#911325 bnc#911326 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 rh#1113899 rh#1163762 rh#1163792 rh#1175235 rh#1177260 rh#1228220 rh#1228229 rh#2162080 rh#2162082 rh#2162084 rh#2162087 |
CVE-2014-9420 | kernel-source-rt:Not affected | low | () | BID:74964 BID:75001 CONFIRM:git.kernel.org:CVE-2014-9420 CONFIRM:git.kernel.org:CVE-2014-9728 CONFIRM:git.kernel.org:CVE-2014-9729 CONFIRM:git.kernel.org:CVE-2014-9730 CONFIRM:git.kernel.org:CVE-2014-9731 CONFIRM:github.com:CVE-2014-9420 CONFIRM:github.com:CVE-2014-9728 CONFIRM:github.com:CVE-2014-9729 CONFIRM:github.com:CVE-2014-9730 CONFIRM:github.com:CVE-2014-9731 CONFIRM:source.android.com:CVE-2017-0404 CONFIRM:www.oracle.com:CVE-2015-1351 CVE-2014-9419 CVE-2014-9420 CVE-2014-9728 CVE-2014-9729 CVE-2014-9730 CVE-2014-9731 CVE-2023-2002 D:CVE-2014-9420 FEDORA:FEDORA-2015-0515 FEDORA:FEDORA-2015-0517 MANDRIVA:MDVSA-2015:058 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:/ MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[oss-security] 20141225 Re: CVE Request Linux kernel: fs: isofs: infinite loop in CE records MLIST:[oss-security] 20150602 CVE request Linux kernel: fs: udf heap overflow in __udf_adinicb_readpage MLIST:[oss-security] 20150603 CVE request Linux kernel: udf: information leakage when reading symlink OSS:2016/Q2/365 OSS:2023/04/16/3 RH:CVE-2014-9420 RH:CVE-2014-9728 RH:CVE-2014-9729 RH:CVE-2014-9730 RH:CVE-2014-9731 RHSA-2015:1081 RHSA-2015:1137 RHSA-2015:1138 RHSA-2015:1139 SECUNIA:62801 SMASH Issue 111836 SUSE:SUSE-SU-2015:0178 SUSE:SUSE-SU-2015:0652 SUSE:SUSE-SU-2015:0736 SUSE:SUSE-SU-2015:0812 SUSE:SUSE-SU-2015:1324 SUSE:SUSE-SU-2015:1592 SUSE:SUSE-SU-2015:1611 SUSE:openSUSE-SU-2015:0714 SUSE:openSUSE-SU-2015:1382 UBUNTU:CVE-2014-9420 UBUNTU:CVE-2014-9728 UBUNTU:CVE-2014-9729 UBUNTU:CVE-2014-9730 UBUNTU:CVE-2014-9731 UBUNTU:USN-2490-1 UBUNTU:USN-2491-1 UBUNTU:USN-2492-1 UBUNTU:USN-2493-1 UBUNTU:USN-2515-1 UBUNTU:USN-2516-1 UBUNTU:USN-2517-1 UBUNTU:USN-2518-1 bnc#911325 rh#1113899 rh#1163762 rh#1163792 rh#1175235 rh#1228220 rh#1228229 |
CVE-2014-9428 | kernel-source-rt:Unsupported | important | () | CONFIRM:git.kernel.org:CVE-2014-9428 CONFIRM:github.com:CVE-2014-9428 CVE-2014-9428 FEDORA:FEDORA-2015-0515 FEDORA:FEDORA-2015-0517 MANDRIVA:MDVSA-2015:058 MISC:bugzilla.kernel.org:MLIST:[oss-security] 20141231 Re: CVE Request: Linux: Remote crash via batman-adv module - Linux kernel MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:MLIST:[oss-security] 20141231 Re: CVE Request: Linux: Remote crash via batman-adv module - Linux kernel MLIST:[b.a.t.m.a.n] 20141118 kernel BUG at net/core/skbuff.c:100 MLIST:[netdev] 20141220 Stable fixes for batman-adv MLIST:[oss-security] 20141231 Re: CVE Request: Linux: Remote crash via batman-adv module - Linux kernel RH:CVE-2014-9428 SMASH Issue 111976 UBUNTU:CVE-2014-9428 UBUNTU:USN-2515-1 UBUNTU:USN-2516-1 UBUNTU:USN-2517-1 UBUNTU:USN-2518-1 bdo#774155 bnc#912429 rh#1178826 |
CVE-2014-9584 | kernel-source-rt:Not affected | moderate | () | BID:47503 BID:70691 BID:71883 BID:74450 CONFIRM:git.kernel.org:CVE-2011-1598 CONFIRM:git.kernel.org:CVE-2014-3690 CONFIRM:git.kernel.org:CVE-2014-9584 CONFIRM:github.com:CVE-2014-3690 CONFIRM:github.com:CVE-2014-9584 CONFIRM:www.kernel.org:CVE-2011-1748 CONFIRM:www.kernel.org:CVE-2014-3690 CONFIRM:www.kernel.org:CVE-2014-9731 CONFIRM:www.kernel.org:CVE-2015-2830 CONFIRM:www.kernel.org:CVE-2015-8950 CONFIRM:www.oracle.com:CVE-2015-1351 CONFIRM:www.oracle.com:CVE-2016-2802 CVE-2011-1598 CVE-2014-3673 CVE-2014-3690 CVE-2014-8160 CVE-2014-9584 CVE-2015-3636 CVE-2015-7303 CVE-2015-7838 CVE-2015-7839 CVE-2015-8028 CVE-2015-8029 CVE-2015-8030 CVE-2015-8220 CVE-2015-8561 CVE-2015-8572 CVE-2015-8580 CVE-2015-8843 CVE-2016-1715 CVE-2016-4065 CVE-2023-2002 D:CVE-2014-3690 DSA-2240 DSA-2264 DSA-3060 DSA-3128 FEDORA:FEDORA-2015-7784 MANDRIVA:MDVSA-2015:058 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:MLIST:[oss-security] 20141021 CVE-2014-3690: KVM DoS triggerable by malicious host userspace MISC:git.kernel.org:MLIST:[oss-security] 20141126 Re: CVE Request: Linux kernel LDT handling bugs MISC:git.kernel.org:MLIST:[oss-security] 20141215 Linux kernel: multiple x86_64 vulnerabilities MISC:git.kernel.org:MLIST:[oss-security] 20150320 Re: CVE Request: Linux kernel execution in the early microcode loader. MISC:git.kernel.org:OSS:2023/04/16/3 MISC:github.com:MLIST:[oss-security] 20150502 Re: CVE request for a fixed bug existed in all versions of linux kernel from KeenTeam MISC:www.zerodayinitiative.com MLIST:[netdev] 20110420 Add missing socket check in can/bcm release. MLIST:[oss-security] 20110420 CVE request: kernel: missing socket check in can/bcm release MLIST:[oss-security] 20110420 Re: CVE request: kernel: missing socket check in can/bcm release MLIST:[oss-security] 20110421 Re: CVE request: kernel: missing socket check in can/bcm release MLIST:[oss-security] 20110422 Re: CVE request: kernel: missing socket check in can/bcm release MLIST:[oss-security] 20110425 Re: CVE request: kernel: missing socket check in can/bcm release MLIST:[oss-security] 20141021 CVE-2014-3690: KVM DoS triggerable by malicious host userspace MLIST:[oss-security] 20141029 Re: CVE-2014-3690: KVM DoS triggerable by malicious host userspace MLIST:[oss-security] 20150109 Re: CVE request Linux kernel: isofs: unchecked printing of ER records MLIST:[oss-security] 20150502 CVE request for a fixed bug existed in all versions of linux kernel from KeenTeam OSS:2014/Q4/416 OSS:2023/04/16/3 RH:CVE-2011-1598 RH:CVE-2014-3690 RH:CVE-2014-9584 RH:CVE-2015-3636 RHSA-2011:0836 RHSA-2011:1253 RHSA-2015:0290 RHSA-2015:0782 RHSA-2015:0864 RHSA-2015:1137 RHSA-2015:1138 RHSA-2015:1139 RHSA-2015:1221 RHSA-2015:1534 RHSA-2015:1564 RHSA-2015:1565 RHSA-2015:1583 RHSA-2015:1643 SECTRACK:1033186 SECUNIA:60174 SMASH Issue 110104 SMASH Issue 110107 SMASH Issue 45008 SUSE:SUSE-SU-2015:0178 SUSE:SUSE-SU-2015:0481 SUSE:SUSE-SU-2015:0529 SUSE:SUSE-SU-2015:0652 SUSE:SUSE-SU-2015:0736 SUSE:SUSE-SU-2015:0812 SUSE:openSUSE-SU-2015:0566 SUSE:openSUSE-SU-2015:0714 UBUNTU:CVE-2011-1598 UBUNTU:CVE-2014-3185 UBUNTU:CVE-2014-3690 UBUNTU:CVE-2014-7826 UBUNTU:CVE-2014-8133 UBUNTU:CVE-2014-9090 UBUNTU:CVE-2014-9322 UBUNTU:CVE-2014-9584 UBUNTU:CVE-2015-3636 UBUNTU:USN-2417-1 UBUNTU:USN-2418-1 UBUNTU:USN-2419-1 UBUNTU:USN-2420-1 UBUNTU:USN-2421-1 UBUNTU:USN-2511-1 UBUNTU:USN-2512-1 UBUNTU:USN-2513-1 UBUNTU:USN-2514-1 UBUNTU:USN-2515-1 UBUNTU:USN-2516-1 UBUNTU:USN-2517-1 UBUNTU:USN-2518-1 UBUNTU:USN-2633-1 UBUNTU:USN-2634-1 bdo#618485 bdo#766195 bnc#688685 bnc#689038 bnc#902232 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4e2024624e678f0ebb916e6192bd23c1f9fdf696 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c6914a6f261aca0c9f715f883a353ae7ff51fe83 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d974baa398f34393db76be45f7d4d04fbdbb4a0a rh#1113899 rh#1153322 rh#1163762 rh#1163792 rh#1180119 rh#1218074 rh#698057 |
CVE-2014-9585 | kernel-source-rt:Not affected | important | () | BID:71990 CONFIRM:ftp.osuosl.org:CVE-2011-4914 CONFIRM:git.kernel.org:CVE-2011-4913 CONFIRM:git.kernel.org:CVE-2014-3610 CONFIRM:git.kernel.org:CVE-2014-3611 CONFIRM:git.kernel.org:CVE-2014-3645 CONFIRM:git.kernel.org:CVE-2014-3646 CONFIRM:git.kernel.org:CVE-2014-3647 CONFIRM:git.kernel.org:CVE-2014-3673 CONFIRM:git.kernel.org:CVE-2014-3687 CONFIRM:git.kernel.org:CVE-2014-7822 CONFIRM:git.kernel.org:CVE-2014-7841 CONFIRM:git.kernel.org:CVE-2014-8160 CONFIRM:git.kernel.org:CVE-2014-9419 CONFIRM:git.kernel.org:CVE-2014-9529 CONFIRM:git.kernel.org:CVE-2014-9584 CONFIRM:git.kernel.org:CVE-2014-9585 CONFIRM:git.kernel.org:CVE-2015-1465 CONFIRM:git.kernel.org:CVE-2015-2041 CONFIRM:git.kernel.org:CVE-2015-2042 CONFIRM:git.kernel.org:CVE-2015-2830 CONFIRM:git.kernel.org:CVE-2015-3339 CONFIRM:git.kernel.org:CVE-2015-3636 CONFIRM:github.com:CVE-2011-4913 CVE-2011-1493 CVE-2014-9585 DSA-2240 DSA-2264 DSA-3170 FEDORA:FEDORA-2015-0937 MANDRIVA:MDVSA-2015:058 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:CVE-2014-9585 MISC:git.kernel.org:MLIST:[oss-security] 20150109 Re: PIE bypass using VDSO ASLR weakness - Linux kernel MISC:v0ids3curity.blogspot.in:CVE-2014-9585 MLIST:[oss-security] 20110405 Re: CVE request: kernel: multiple issues in ROSE MLIST:[oss-security] 20141209 PIE bypass using VDSO ASLR weakness MLIST:[oss-security] 20150109 Re: PIE bypass using VDSO ASLR weakness - Linux kernel RH:CVE-2011-1493 RH:CVE-2014-9585 RHSA-2015:1081 RHSA-2015:1778 RHSA-2015:1787 RHSA-2015:1788 SMASH Issue 44695 SUSE:SUSE-SU-2015:0178 SUSE:SUSE-SU-2015:0481 SUSE:SUSE-SU-2015:0652 SUSE:SUSE-SU-2015:0736 SUSE:SUSE-SU-2015:0812 SUSE:openSUSE-SU-2015:0566 SUSE:openSUSE-SU-2015:0714 UBUNTU:CVE-2011-1493 UBUNTU:CVE-2014-9585 UBUNTU:USN-2513-1 UBUNTU:USN-2514-1 UBUNTU:USN-2515-1 UBUNTU:USN-2516-1 UBUNTU:USN-2517-1 UBUNTU:USN-2518-1 bdo#618485 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=be20250c13f88375345ad99950190685eda51eb8 rh#1181054 rh#770777 |
CVE-2014-9644 | kernel-source-rt:Already fixed | moderate | () | BID:72320 BID:72322 BID:72324 CONFIRM:git.busybox.net:CVE-2014-9645 CONFIRM:git.kernel.org:CVE-2013-7421 CONFIRM:git.kernel.org:CVE-2014-9644 CONFIRM:github.com:CVE-2013-7421 CONFIRM:github.com:CVE-2014-9644 CONFIRM:github.com:CVE-2017-6429 CONFIRM:www.kernel.org:CVE-2015-1573 CONFIRM:www.oracle.com:CVE-2015-8472 CONFIRM:www.oracle.com:CVE-2016-2802 CVE-2013-7421 CVE-2014-9644 CVE-2014-9645 CVE-2023-2002 D:CVE-2013-7421 D:CVE-2014-9644 D:CVE-2014-9645 DSA-3170 GENTOO:GLSA-201503-13 MANDRIVA:MDVSA-2015:057 MANDRIVA:MDVSA-2015:058 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:OSS:2023/04/16/3 MISC:plus.google.com:CVE-2014-9645 MLIST:[linux-kernel] 20130304 Re: user ns: arbitrary module loading MLIST:[oss-security] 20150124 Re: CVE Request: Linux kernel crypto api unprivileged arbitrary module load OSS:2023/04/16/3 RH:CVE-2013-7421 RH:CVE-2014-9644 RH:CVE-2014-9645 RHSA-2015:2152 RHSA-2015:2411 RHSA-2016:0068 SMASH Issue 113136 SMASH Issue 113164 SMASH Issue 113165 UBUNTU:CVE-2013-7421 UBUNTU:CVE-2014-9644 UBUNTU:CVE-2014-9645 UBUNTU:USN-2513-1 UBUNTU:USN-2514-1 UBUNTU:USN-2543-1 UBUNTU:USN-2544-1 UBUNTU:USN-2545-1 UBUNTU:USN-2546-1 bnc#914423 rh#1113899 rh#1163762 rh#1163792 rh#1185469 rh#1185707 rh#1190546 |
CVE-2014-9645 | kernel-source-rt:Already fixed | moderate | () | BID:72320 BID:72322 BID:72324 CONFIRM:git.busybox.net:CVE-2014-9645 CONFIRM:git.kernel.org:CVE-2013-7421 CONFIRM:git.kernel.org:CVE-2014-9644 CONFIRM:github.com:CVE-2013-7421 CONFIRM:github.com:CVE-2014-9644 CONFIRM:github.com:CVE-2017-6429 CONFIRM:www.kernel.org:CVE-2015-1573 CONFIRM:www.oracle.com:CVE-2015-8472 CONFIRM:www.oracle.com:CVE-2016-2802 CVE-2013-7421 CVE-2014-9644 CVE-2014-9645 CVE-2023-2002 D:CVE-2013-7421 D:CVE-2014-9644 D:CVE-2014-9645 DSA-3170 GENTOO:GLSA-201503-13 MANDRIVA:MDVSA-2015:057 MANDRIVA:MDVSA-2015:058 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:OSS:2023/04/16/3 MISC:plus.google.com:CVE-2014-9645 MLIST:[linux-kernel] 20130304 Re: user ns: arbitrary module loading MLIST:[oss-security] 20150124 Re: CVE Request: Linux kernel crypto api unprivileged arbitrary module load OSS:2023/04/16/3 RH:CVE-2013-7421 RH:CVE-2014-9644 RH:CVE-2014-9645 RHSA-2015:2152 RHSA-2015:2411 RHSA-2016:0068 SMASH Issue 113136 SMASH Issue 113165 UBUNTU:CVE-2013-7421 UBUNTU:CVE-2014-9644 UBUNTU:CVE-2014-9645 UBUNTU:USN-2513-1 UBUNTU:USN-2514-1 UBUNTU:USN-2543-1 UBUNTU:USN-2544-1 UBUNTU:USN-2545-1 UBUNTU:USN-2546-1 bnc#914423 rh#1113899 rh#1163762 rh#1163792 rh#1185469 rh#1185707 rh#1190546 |
CVE-2014-9683 | kernel-source-rt:Ignore | low | () | BID:72643 CONFIRM:git.kernel.org:CVE-2014-9683 CONFIRM:github.com:CVE-2014-9683 CVE-2014-9683 DSA-3170 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MLIST:[oss-security] 20150217 Re: CVE request: Linux kernel ecryptfs 1-byte overwrite OSS:2023/10/10/4 Oracle:CVE-2015-6937 RH:CVE-2014-9683 RHSA-2015:1272 SECTRACK:1031860 SMASH Issue 113982 UBUNTU:CVE-2014-9683 UBUNTU:USN-2515-1 UBUNTU:USN-2516-1 UBUNTU:USN-2517-1 UBUNTU:USN-2518-1 UBUNTU:USN-2541-1 UBUNTU:USN-2542-1 bnc#918333 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 rh#1193830 rh#1202855 rh#2162080 rh#2162082 rh#2162084 rh#2162087 |
CVE-2014-9717 | kernel-source-rt:Not affected | low | () | BID:74226 CONFIRM:git.kernel.org:CVE-2014-9717 CONFIRM:github.com:CVE-2014-9717 CVE-2014-9717 MLIST:[containers] 20150402 [PATCH review 0/19] Locked mount and loopback mount fixes MLIST:[linux-kernel] 20141007 [PATCH] mnt: don't allow to detach the namespace root MLIST:[oss-security] 20150417 USERNS allows circumventing MNT_LOCKED Oracle:CVE-2016-5244 RH:CVE-2014-9717 SMASH Issue 116196 SUSE:SUSE-SU-2016:1696 UBUNTU:CVE-2014-9717 bnc#928547 rh#1226751 rh#1324749 |
CVE-2014-9728 | kernel-source-rt:Not affected | low | () | BID:74964 BID:75001 CONFIRM:git.kernel.org:CVE-2014-9420 CONFIRM:git.kernel.org:CVE-2014-9728 CONFIRM:git.kernel.org:CVE-2014-9729 CONFIRM:git.kernel.org:CVE-2014-9730 CONFIRM:git.kernel.org:CVE-2014-9731 CONFIRM:github.com:CVE-2014-9420 CONFIRM:github.com:CVE-2014-9728 CONFIRM:github.com:CVE-2014-9729 CONFIRM:github.com:CVE-2014-9730 CONFIRM:github.com:CVE-2014-9731 CONFIRM:source.android.com:CVE-2017-0404 CONFIRM:www.oracle.com:CVE-2015-1351 CVE-2014-9419 CVE-2014-9420 CVE-2014-9728 CVE-2014-9729 CVE-2014-9730 CVE-2014-9731 CVE-2023-2002 D:CVE-2014-9420 FEDORA:FEDORA-2015-0515 FEDORA:FEDORA-2015-0517 MANDRIVA:MDVSA-2015:058 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:/ MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[oss-security] 20141225 Re: CVE Request Linux kernel: fs: isofs: infinite loop in CE records MLIST:[oss-security] 20150602 CVE request Linux kernel: fs: udf heap overflow in __udf_adinicb_readpage MLIST:[oss-security] 20150603 CVE request Linux kernel: udf: information leakage when reading symlink OSS:2016/Q2/365 OSS:2023/04/16/3 RH:CVE-2014-9420 RH:CVE-2014-9728 RH:CVE-2014-9729 RH:CVE-2014-9730 RH:CVE-2014-9731 RHSA-2015:1081 RHSA-2015:1137 RHSA-2015:1138 RHSA-2015:1139 SECUNIA:62801 SMASH Issue 111836 SUSE:SUSE-SU-2015:0178 SUSE:SUSE-SU-2015:0652 SUSE:SUSE-SU-2015:0736 SUSE:SUSE-SU-2015:0812 SUSE:SUSE-SU-2015:1324 SUSE:SUSE-SU-2015:1592 SUSE:SUSE-SU-2015:1611 SUSE:openSUSE-SU-2015:0714 SUSE:openSUSE-SU-2015:1382 UBUNTU:CVE-2014-9420 UBUNTU:CVE-2014-9728 UBUNTU:CVE-2014-9729 UBUNTU:CVE-2014-9730 UBUNTU:CVE-2014-9731 UBUNTU:USN-2490-1 UBUNTU:USN-2491-1 UBUNTU:USN-2492-1 UBUNTU:USN-2493-1 UBUNTU:USN-2515-1 UBUNTU:USN-2516-1 UBUNTU:USN-2517-1 UBUNTU:USN-2518-1 bnc#911325 rh#1113899 rh#1163762 rh#1163792 rh#1175235 rh#1228220 rh#1228229 |
CVE-2014-9729 | kernel-source-rt:Not affected | low | () | BID:74964 BID:75001 CONFIRM:git.kernel.org:CVE-2014-9420 CONFIRM:git.kernel.org:CVE-2014-9728 CONFIRM:git.kernel.org:CVE-2014-9729 CONFIRM:git.kernel.org:CVE-2014-9730 CONFIRM:git.kernel.org:CVE-2014-9731 CONFIRM:github.com:CVE-2014-9420 CONFIRM:github.com:CVE-2014-9728 CONFIRM:github.com:CVE-2014-9729 CONFIRM:github.com:CVE-2014-9730 CONFIRM:github.com:CVE-2014-9731 CONFIRM:source.android.com:CVE-2017-0404 CONFIRM:www.oracle.com:CVE-2015-1351 CVE-2014-9419 CVE-2014-9420 CVE-2014-9728 CVE-2014-9729 CVE-2014-9730 CVE-2014-9731 CVE-2023-2002 D:CVE-2014-9420 FEDORA:FEDORA-2015-0515 FEDORA:FEDORA-2015-0517 MANDRIVA:MDVSA-2015:058 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:/ MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[oss-security] 20141225 Re: CVE Request Linux kernel: fs: isofs: infinite loop in CE records MLIST:[oss-security] 20150602 CVE request Linux kernel: fs: udf heap overflow in __udf_adinicb_readpage MLIST:[oss-security] 20150603 CVE request Linux kernel: udf: information leakage when reading symlink OSS:2016/Q2/365 OSS:2023/04/16/3 RH:CVE-2014-9420 RH:CVE-2014-9728 RH:CVE-2014-9729 RH:CVE-2014-9730 RH:CVE-2014-9731 RHSA-2015:1081 RHSA-2015:1137 RHSA-2015:1138 RHSA-2015:1139 SECUNIA:62801 SMASH Issue 111836 SUSE:SUSE-SU-2015:0178 SUSE:SUSE-SU-2015:0652 SUSE:SUSE-SU-2015:0736 SUSE:SUSE-SU-2015:0812 SUSE:SUSE-SU-2015:1324 SUSE:SUSE-SU-2015:1592 SUSE:SUSE-SU-2015:1611 SUSE:openSUSE-SU-2015:0714 SUSE:openSUSE-SU-2015:1382 UBUNTU:CVE-2014-9420 UBUNTU:CVE-2014-9728 UBUNTU:CVE-2014-9729 UBUNTU:CVE-2014-9730 UBUNTU:CVE-2014-9731 UBUNTU:USN-2490-1 UBUNTU:USN-2491-1 UBUNTU:USN-2492-1 UBUNTU:USN-2493-1 UBUNTU:USN-2515-1 UBUNTU:USN-2516-1 UBUNTU:USN-2517-1 UBUNTU:USN-2518-1 bnc#911325 rh#1113899 rh#1163762 rh#1163792 rh#1175235 rh#1228220 rh#1228229 |
CVE-2014-9730 | kernel-source-rt:Not affected | low | () | BID:74964 BID:75001 CONFIRM:git.kernel.org:CVE-2014-9420 CONFIRM:git.kernel.org:CVE-2014-9728 CONFIRM:git.kernel.org:CVE-2014-9729 CONFIRM:git.kernel.org:CVE-2014-9730 CONFIRM:git.kernel.org:CVE-2014-9731 CONFIRM:github.com:CVE-2014-9420 CONFIRM:github.com:CVE-2014-9728 CONFIRM:github.com:CVE-2014-9729 CONFIRM:github.com:CVE-2014-9730 CONFIRM:github.com:CVE-2014-9731 CONFIRM:source.android.com:CVE-2017-0404 CONFIRM:www.oracle.com:CVE-2015-1351 CVE-2014-9419 CVE-2014-9420 CVE-2014-9728 CVE-2014-9729 CVE-2014-9730 CVE-2014-9731 CVE-2023-2002 D:CVE-2014-9420 FEDORA:FEDORA-2015-0515 FEDORA:FEDORA-2015-0517 MANDRIVA:MDVSA-2015:058 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:/ MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[oss-security] 20141225 Re: CVE Request Linux kernel: fs: isofs: infinite loop in CE records MLIST:[oss-security] 20150602 CVE request Linux kernel: fs: udf heap overflow in __udf_adinicb_readpage MLIST:[oss-security] 20150603 CVE request Linux kernel: udf: information leakage when reading symlink OSS:2016/Q2/365 OSS:2023/04/16/3 RH:CVE-2014-9420 RH:CVE-2014-9728 RH:CVE-2014-9729 RH:CVE-2014-9730 RH:CVE-2014-9731 RHSA-2015:1081 RHSA-2015:1137 RHSA-2015:1138 RHSA-2015:1139 SECUNIA:62801 SMASH Issue 111836 SUSE:SUSE-SU-2015:0178 SUSE:SUSE-SU-2015:0652 SUSE:SUSE-SU-2015:0736 SUSE:SUSE-SU-2015:0812 SUSE:SUSE-SU-2015:1324 SUSE:SUSE-SU-2015:1592 SUSE:SUSE-SU-2015:1611 SUSE:openSUSE-SU-2015:0714 SUSE:openSUSE-SU-2015:1382 UBUNTU:CVE-2014-9420 UBUNTU:CVE-2014-9728 UBUNTU:CVE-2014-9729 UBUNTU:CVE-2014-9730 UBUNTU:CVE-2014-9731 UBUNTU:USN-2490-1 UBUNTU:USN-2491-1 UBUNTU:USN-2492-1 UBUNTU:USN-2493-1 UBUNTU:USN-2515-1 UBUNTU:USN-2516-1 UBUNTU:USN-2517-1 UBUNTU:USN-2518-1 bnc#911325 rh#1113899 rh#1163762 rh#1163792 rh#1175235 rh#1228220 rh#1228229 |
CVE-2014-9731 | kernel-source-rt:Not affected | low | () | BID:74964 BID:75001 CONFIRM:git.kernel.org:CVE-2014-9420 CONFIRM:git.kernel.org:CVE-2014-9728 CONFIRM:git.kernel.org:CVE-2014-9729 CONFIRM:git.kernel.org:CVE-2014-9730 CONFIRM:git.kernel.org:CVE-2014-9731 CONFIRM:github.com:CVE-2014-9420 CONFIRM:github.com:CVE-2014-9728 CONFIRM:github.com:CVE-2014-9729 CONFIRM:github.com:CVE-2014-9730 CONFIRM:github.com:CVE-2014-9731 CONFIRM:source.android.com:CVE-2017-0404 CONFIRM:www.oracle.com:CVE-2015-1351 CVE-2014-9419 CVE-2014-9420 CVE-2014-9728 CVE-2014-9729 CVE-2014-9730 CVE-2014-9731 CVE-2023-2002 D:CVE-2014-9420 FEDORA:FEDORA-2015-0515 FEDORA:FEDORA-2015-0517 MANDRIVA:MDVSA-2015:058 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:/ MISC:git.kernel.org:OSS:2023/04/16/3 MLIST:[oss-security] 20141225 Re: CVE Request Linux kernel: fs: isofs: infinite loop in CE records MLIST:[oss-security] 20150602 CVE request Linux kernel: fs: udf heap overflow in __udf_adinicb_readpage MLIST:[oss-security] 20150603 CVE request Linux kernel: udf: information leakage when reading symlink OSS:2016/Q2/365 OSS:2023/04/16/3 RH:CVE-2014-9420 RH:CVE-2014-9728 RH:CVE-2014-9729 RH:CVE-2014-9730 RH:CVE-2014-9731 RHSA-2015:1081 RHSA-2015:1137 RHSA-2015:1138 RHSA-2015:1139 SECUNIA:62801 SMASH Issue 111836 SUSE:SUSE-SU-2015:0178 SUSE:SUSE-SU-2015:0652 SUSE:SUSE-SU-2015:0736 SUSE:SUSE-SU-2015:0812 SUSE:SUSE-SU-2015:1324 SUSE:SUSE-SU-2015:1592 SUSE:SUSE-SU-2015:1611 SUSE:openSUSE-SU-2015:0714 SUSE:openSUSE-SU-2015:1382 UBUNTU:CVE-2014-9420 UBUNTU:CVE-2014-9728 UBUNTU:CVE-2014-9729 UBUNTU:CVE-2014-9730 UBUNTU:CVE-2014-9731 UBUNTU:USN-2490-1 UBUNTU:USN-2491-1 UBUNTU:USN-2492-1 UBUNTU:USN-2493-1 UBUNTU:USN-2515-1 UBUNTU:USN-2516-1 UBUNTU:USN-2517-1 UBUNTU:USN-2518-1 bnc#911325 rh#1113899 rh#1163762 rh#1163792 rh#1175235 rh#1228220 rh#1228229 |
CVE-2014-9748 | libuv:Analysis | moderate | () | CVE-2014-9748 MISC:github.com:CVE-2014-9748 MISC:groups.google.com:CVE-2014-9748 SMASH Issue 170512 UBUNTU:CVE-2014-9748 bnc#986635 |
CVE-2014-9903 | kernel-source-rt:Unsupported | low | () | BID:91511 CONFIRM:git.kernel.org:CVE-2014-9903 CONFIRM:github.com:CVE-2014-9903 CVE-2014-9903 RH:CVE-2014-9903 SMASH Issue 170531 UBUNTU:CVE-2014-9903 bnc#986794 rh#1350796 |
CVE-2014-9904 | kernel-source-rt:Not affected | moderate | () | BID:91510 CONFIRM:git.kernel.org:CVE-2014-9904 CONFIRM:github.com:CVE-2014-9904 CVE-2014-9904 D:CVE-2014-9904 DSA-3616 OSS:2016/Q2/615 Oracle:CVE-2016-5244 RH:CVE-2014-9904 SECTRACK:1036189 SMASH Issue 170532 SUSE:SUSE-SU-2016:1937 SUSE:SUSE-SU-2016:2105 SUSE:openSUSE-SU-2016:2184 UBUNTU:CVE-2014-9904 bdo#828914 bnc#986811 rh#1324749 rh#1350801 rh#1351076 |
CVE-2014-9922 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | BID:97354 CONFIRM:git.kernel.org:CVE-2014-9922 CONFIRM:github.com:CVE-2014-9922 CVE-2014-9922 Oracle:CVE-2017-6074 RH:CVE-2014-9922 SMASH Issue 182840 UBUNTU:CVE-2014-9922 bnc#1032340 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1435719 rh#1439087 rh#1462147 rh#1462158 |
CVE-2015-0239 | kernel-source-rt:Ignore | moderate | () | BID:72842 CONFIRM:git.kernel.org:CVE-2015-0239 CONFIRM:www.kernel.org:CVE-2015-1573 CONFIRM:www.oracle.com CONFIRM:www.oracle.com:CVE-2015-1351 CONFIRM:www.oracle.com:CVE-2015-8472 CONFIRM:www.oracle.com:CVE-2016-2802 CVE-2015-0239 CVE-2016-0823 D:CVE-2015-0239 D:CVE-2022-2590 DSA-3170 L3:45886 MANDRIVA:MDVSA-2015:058 MISC:git.kernel.org:/ MLIST:[bk-commits-head] 20150123 KVM: x86: SYSENTER emulation is broken MLIST:[oss-security] 20150127 KVM SYSENTER emulation vulnerability - CVE-2015-0239 OSS:2015/Q1/271 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 RH:CVE-2015-0239 RHSA-2015:1272 RHSA-2015:2152 SMASH Issue 113160 SMASH Issue 172055 UBUNTU:CVE-2015-0239 UBUNTU:USN-2513-1 UBUNTU:USN-2514-1 UBUNTU:USN-2515-1 UBUNTU:USN-2516-1 UBUNTU:USN-2517-1 UBUNTU:USN-2518-1 bnc#987709 bnc#994618 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b linux.git:commit:f3747379accba8e95d70cec0eae0582c8c182050 rh#1186448 rh#1384344 rh#2116175 |
CVE-2015-0267 | kexec-tools:Analysis | low | () | BID:74622 CVE-2015-0267 D:CVE-2015-0267 RH:CVE-2015-0267 RHSA-2015:0986 SMASH Issue 113948 UBUNTU:CVE-2015-0267 rh#1191575 |
CVE-2015-0274 | kernel-source-rt:Not affected | important | () | CONFIRM:git.kernel.org:CVE-2015-0274 CONFIRM:github.com:CVE-2015-0274 CVE-2015-0274 D:CVE-2015-0274 RH:CVE-2015-0274 RHSA-2015:0290 RHSA-2015:0694 SECTRACK:1031853 SMASH Issue 114278 UBUNTU:CVE-2015-0274 UBUNTU:USN-2543-1 UBUNTU:USN-2544-1 bnc#919655 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8275cdd0e7ac550dcce2b3ef6d2fb3b808c1ae59 rh#1195248 |
CVE-2015-0275 | kernel-source-rt:Not affected | moderate | () | BID:75139 CONFIRM:git.kernel.org:CVE-2015-0275 CONFIRM:github.com:CVE-2015-0275 CONFIRM:support.f5.com:CVE-2014-8559 CONFIRM:www.oracle.com:CVE-2015-8472 CVE-2015-0275 D:CVE-2015-0275 MLIST:[linux-ext4] 20150218 [PATCH] ext4: Allocate entire range in zero range MLIST:[oss-security] 20150223 CVE-2015-0275 -- Linux kernel: fs: ext4: fallocate zero range page size > block size BUG() RH:CVE-2015-0275 RHSA-2015:1778 RHSA-2015:1787 RHSA-2015:1788 SECTRACK:1034454 SMASH Issue 114156 UBUNTU:CVE-2015-0275 bnc#919032 rh#1193907 |
CVE-2015-1283 | expat:Not affected | moderate | () | CVE-2015-1283 SMASH Issue 385752 bnc#980391 rh#1245587 |
CVE-2015-1350 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | BID:76075 CVE-2015-1350 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MLIST:[linux-kernel] 20150117 [RFC PATCH RESEND] vfs: Move security_inode_killpriv() after permission checks MLIST:[oss-security] 20150124 Re: CVE Request: Linux kernel - Denial of service in notify_change for xattrs. Oracle:CVE-2016-5244 Oracle:CVE-2017-6074 RH:CVE-2015-1350 SMASH Issue 113173 UBUNTU:CVE-2015-1350 bdo#770492 bnc#914939 linux.git:commit:030b533c4fd4d2ec3402363323de4bb2983c9cee linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1185139 rh#1420236 rh#1435719 |
CVE-2015-1420 | kernel-source-rt:Not affected | moderate | () | BID:70854 BID:72347 BID:72357 CONFIRM:git.kernel.org:CVE-2014-8559 CONFIRM:github.com:CVE-2014-7822 CONFIRM:support.f5.com:CVE-2014-8559 CONFIRM:www.oracle.com CONFIRM:www.oracle.com:CVE-2015-8472 CVE-2014-7822 CVE-2014-8559 CVE-2015-1420 D:CVE-2015-1420 DSA-3170 EXPLOIT-DB:36743 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MLIST:[linux-kernel] 20141025 fs: lockup on rename_mutex in fs/dcache.c:1035 MLIST:[linux-kernel] 20141026 Re: fs: lockup on rename_mutex in fs/dcache.c:1035 MLIST:[linux-kernel] 20150128 [PATCH v2] vfs: read file_handle only once in handle_to_path MLIST:[oss-security] 20141030 CVE-2014-8559 - Linux kernel fs/dcache.c incorrect use of rename_lock MLIST:[oss-security] 20150129 CVE-2015-1420 - Linux kernel fs/fhandle.c race condition OSS:2015/Q1/331 OSS:2023/10/10/4 Oracle:CVE-2015-6937 RH:CVE-2014-7822 RH:CVE-2014-8559 RH:CVE-2015-1420 RHSA-2015:0102 RHSA-2015:0164 RHSA-2015:0674 RHSA-2015:0694 RHSA-2015:1976 RHSA-2015:1977 RHSA-2015:1978 SECTRACK:1034051 SECUNIA:62801 SMASH Issue 113306 SUSE:SUSE-SU-2015:0178 SUSE:SUSE-SU-2015:0481 SUSE:SUSE-SU-2015:0529 SUSE:SUSE-SU-2015:0736 SUSE:SUSE-SU-2015:1488 SUSE:SUSE-SU-2015:1489 SUSE:openSUSE-SU-2015:0566 SUSE:openSUSE-SU-2015:0714 UBUNTU:CVE-2014-7822 UBUNTU:CVE-2014-8559 UBUNTU:CVE-2015-1420 UBUNTU:USN-2492-1 UBUNTU:USN-2493-1 UBUNTU:USN-2515-1 UBUNTU:USN-2516-1 UBUNTU:USN-2517-1 UBUNTU:USN-2518-1 UBUNTU:USN-2541-1 UBUNTU:USN-2542-1 UBUNTU:USN-2543-1 UBUNTU:USN-2544-1 UBUNTU:USN-2660-1 UBUNTU:USN-2661-1 UBUNTU:USN-2665-1 UBUNTU:USN-2667-1 bnc#915517 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8d0207652cbe27d1f962050737848e5ad4671958 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 rh#1159313 rh#1163792 rh#1183744 rh#1187534 rh#1202855 rh#1243465 rh#2162080 rh#2162082 rh#2162084 rh#2162087 |
CVE-2015-1421 | kernel-source-rt:Already fixed | moderate | () | BID:72356 CONFIRM:git.kernel.org:CVE-2015-1421 CONFIRM:git.kernel.org:CVE-2015-2150 CONFIRM:github.com:CVE-2015-1421 CONFIRM:www.kernel.org:CVE-2015-1465 CVE-2015-1421 D:CVE-2015-1421 DSA-3170 L3:43128 L3:43134 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:MLIST:[oss-security] 20150129 Re: CVE request -- Linux kernel - net: sctp: slab corruption from use after free on INIT collisions MLIST:[oss-security] 20150129 Re: CVE request -- Linux kernel - net: sctp: slab corruption from use after free on INIT collisions OSS:2023/10/10/4 Oracle:CVE-2015-6937 RH:CVE-2015-1421 RHSA-2015:0726 RHSA-2015:0727 RHSA-2015:0751 RHSA-2015:0782 RHSA-2015:0864 RHSA-2015:1030 RHSA-2015:1082 SECTRACK:1032172 SMASH Issue 113337 SUSE:SUSE-SU-2015:0832 SUSE:SUSE-SU-2015:1478 UBUNTU:CVE-2015-1421 UBUNTU:USN-2541-1 UBUNTU:USN-2542-1 UBUNTU:USN-2545-1 UBUNTU:USN-2546-1 UBUNTU:USN-2562-1 UBUNTU:USN-2563-1 bnc#915577 bnc#922004 bnc#932477 bnc#939261 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 linux.git:commit:af6fc858a35b90e89ea7a7ee58e66628c55c776b rh#1196581 rh#1202855 rh#2162080 rh#2162082 rh#2162084 rh#2162087 |
CVE-2015-1465 | kernel-source-rt:Already fixed | important | () | BID:72435 CONFIRM:git.kernel.org:CVE-2015-1465 CONFIRM:github.com:CVE-2015-1465 CONFIRM:www.kernel.org:CVE-2015-1465 CVE-2015-1465 MLIST:[oss-security] 20150203 Re: CVE request -- Linux kernel - net: DoS due to routing packets to too many different dsts/too fast Oracle:CVE-2015-6937 RH:CVE-2015-1465 SECTRACK:1036763 SMASH Issue 156078 SMASH Issue 240308 SUSE:SUSE-SU-2015:1488 SUSE:SUSE-SU-2015:1489 SUSE:openSUSE-SU-2015:1382 UBUNTU:CVE-2015-1465 UBUNTU:USN-2545-1 UBUNTU:USN-2546-1 UBUNTU:USN-2562-1 UBUNTU:USN-2563-1 bnc#916225 rh#1163792 rh#1183744 rh#1202855 rh#1205079 rh#1243465 rh#2162082 rh#2162084 rh#2162087 |
CVE-2015-1593 | kernel-source-rt:Not affected | important | () | BID:72607 BID:74951 BID:74963 CONFIRM:git.kernel.org:CVE-2015-1593 CONFIRM:www.kernel.org:CVE-2015-4167 CVE-2015-1593 CVE-2015-1805 CVE-2015-4167 CVE-2023-2002 D:CVE-2015-1593 DSA-3170 L3:42485 L3:44416 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org MISC:git.kernel.org:OSS:2023/04/16/3 MISC:hmarco.org:CVE-2015-1593 MLIST:[linux-kernel] 20150107 Re: [PATH] Fix stack randomization on x86_64 bit MLIST:[oss-security] 20150213 Re: CVE-Request -- Linux ASLR integer overflow MLIST:[oss-security] 20150602 CVE request Linux kernel: fs: udf kernel oops MLIST:[oss-security] 20150606 CVE-2015-1805 Linux kernel: pipe: iovec overrun leading to memory corruption OSS:2015/Q2/652 OSS:2017/Q2/500 OSS:2023/04/16/3 RH:CVE-2015-1593 RH:CVE-2015-1805 RH:CVE-2015-4167 RHSA-2010:0631 RHSA-2010:0660 RHSA-2010:0661 RHSA-2010:0670 RHSA-2010:0676 RHSA-2010:0677 RHSA-2010:0882 RHSA-2015:1042 RHSA-2015:1081 RHSA-2015:1082 RHSA-2015:1120 RHSA-2015:1137 RHSA-2015:1138 RHSA-2015:1139 RHSA-2015:1190 RHSA-2015:1199 RHSA-2015:1211 RHSA-2015:1221 RHSA-2015:2152 RHSA-2016:0103 RHSA-2016:0494 RHSA-2016:0617 RHSA-2019:3517 SECTRACK:1032454 SECTRACK:1033187 SMASH Issue 113891 SUSE:SUSE-SU-2015:1490 UBUNTU:CVE-2015-1593 UBUNTU:CVE-2015-1805 UBUNTU:CVE-2015-4167 UBUNTU:USN-2560-1 UBUNTU:USN-2564-1 UBUNTU:USN-2565-1 UBUNTU:USN-2679-1 UBUNTU:USN-2680-1 UBUNTU:USN-2681-1 bnc#917839 bnc#918554 bnc#959156 linux.git:commit:4e7c22d447bb6d7e37bfe39ff658486ae78e8d77 rh#1113899 rh#1163762 rh#1163792 rh#1192519 rh#1202855 rh#1228204 rh#1303961 rh#606611 |
CVE-2015-1805 | kernel-source-rt:Not affected | important | () | BID:72607 BID:74951 BID:74963 CONFIRM:git.kernel.org:CVE-2015-1593 CONFIRM:www.kernel.org:CVE-2015-4167 CVE-2015-1593 CVE-2015-1805 CVE-2015-4167 CVE-2023-2002 D:CVE-2015-1593 DSA-3170 L3:42485 L3:44416 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org MISC:git.kernel.org:OSS:2023/04/16/3 MISC:hmarco.org:CVE-2015-1593 MLIST:[linux-kernel] 20150107 Re: [PATH] Fix stack randomization on x86_64 bit MLIST:[oss-security] 20150213 Re: CVE-Request -- Linux ASLR integer overflow MLIST:[oss-security] 20150602 CVE request Linux kernel: fs: udf kernel oops MLIST:[oss-security] 20150606 CVE-2015-1805 Linux kernel: pipe: iovec overrun leading to memory corruption OSS:2015/Q2/652 OSS:2017/Q2/500 OSS:2023/04/16/3 RH:CVE-2015-1593 RH:CVE-2015-1805 RH:CVE-2015-4167 RHSA-2010:0631 RHSA-2010:0660 RHSA-2010:0661 RHSA-2010:0670 RHSA-2010:0676 RHSA-2010:0677 RHSA-2010:0882 RHSA-2015:1042 RHSA-2015:1081 RHSA-2015:1082 RHSA-2015:1120 RHSA-2015:1137 RHSA-2015:1138 RHSA-2015:1139 RHSA-2015:1190 RHSA-2015:1199 RHSA-2015:1211 RHSA-2015:1221 RHSA-2015:2152 RHSA-2016:0103 RHSA-2016:0494 RHSA-2016:0617 RHSA-2019:3517 SECTRACK:1032454 SECTRACK:1033187 SMASH Issue 113891 SMASH Issue 155967 SUSE:SUSE-SU-2015:1490 UBUNTU:CVE-2015-1593 UBUNTU:CVE-2015-1805 UBUNTU:CVE-2015-4167 UBUNTU:USN-2560-1 UBUNTU:USN-2564-1 UBUNTU:USN-2565-1 UBUNTU:USN-2679-1 UBUNTU:USN-2680-1 UBUNTU:USN-2681-1 bnc#917839 bnc#918554 bnc#939270 bnc#959156 linux.git:commit:4e7c22d447bb6d7e37bfe39ff658486ae78e8d77 rh#1113899 rh#1163762 rh#1163792 rh#1183744 rh#1192519 rh#1202855 rh#1205079 rh#1228204 rh#1303961 rh#606611 |
CVE-2015-1821 | chrony:Not affected | moderate | () | BID:73955 BID:73956 CONFIRM:chrony.tuxfamily.org:CVE-2010-0294 CONFIRM:www.oracle.com CONFIRM:www.oracle.com:CVE-2015-8472 CVE-2015-1821 CVE-2015-1822 CVE-2015-1853 D:CVE-2015-1853 DSA-3222 GENTOO:GLSA-201507-01 MLIST:[chrony-announce] 20150407 chrony-1.31.1 released (security) RH:CVE-2015-1821 RH:CVE-2015-1822 RH:CVE-2015-1853 RHSA-2015:2241 SMASH Issue 115602 SMASH Issue 115604 UBUNTU:CVE-2015-1821 UBUNTU:CVE-2015-1822 UBUNTU:CVE-2015-1853 bdo#782160 bnc#926323 rh#1209572 rh#1209631 rh#1209632 |
CVE-2015-1822 | chrony:Not affected | moderate | () | BID:73955 BID:73956 CONFIRM:chrony.tuxfamily.org:CVE-2010-0294 CONFIRM:www.oracle.com CONFIRM:www.oracle.com:CVE-2015-8472 CVE-2015-1821 CVE-2015-1822 CVE-2015-1853 D:CVE-2015-1853 DSA-3222 GENTOO:GLSA-201507-01 MLIST:[chrony-announce] 20150407 chrony-1.31.1 released (security) RH:CVE-2015-1821 RH:CVE-2015-1822 RH:CVE-2015-1853 RHSA-2015:2241 SMASH Issue 115602 SMASH Issue 115603 UBUNTU:CVE-2015-1821 UBUNTU:CVE-2015-1822 UBUNTU:CVE-2015-1853 bdo#782160 bnc#926323 rh#1209572 rh#1209631 rh#1209632 |
CVE-2015-1853 | chrony:Not affected | moderate | () | BID:73955 BID:73956 CONFIRM:chrony.tuxfamily.org:CVE-2010-0294 CONFIRM:www.oracle.com CONFIRM:www.oracle.com:CVE-2015-8472 CVE-2015-1821 CVE-2015-1822 CVE-2015-1853 D:CVE-2015-1853 DSA-3222 GENTOO:GLSA-201507-01 MLIST:[chrony-announce] 20150407 chrony-1.31.1 released (security) RH:CVE-2015-1821 RH:CVE-2015-1822 RH:CVE-2015-1853 RHSA-2015:2241 SMASH Issue 115602 SMASH Issue 115603 SMASH Issue 115604 UBUNTU:CVE-2015-1821 UBUNTU:CVE-2015-1822 UBUNTU:CVE-2015-1853 bdo#782160 bnc#926323 rh#1209572 rh#1209631 rh#1209632 |
CVE-2015-20107 | python3:Released | important | 7.1 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L) | CONFIRM:python-security.readthedocs.io:CVE-2015-20107 CONFIRM:security.netapp.com:CVE-2015-20107 CVE-2015-20107 FEDORA:FEDORA-2022-0be85556b4 FEDORA:FEDORA-2022-1358cedf2d FEDORA:FEDORA-2022-17a1bb7e78 FEDORA:FEDORA-2022-20e87fb0d1 FEDORA:FEDORA-2022-2e1d1205cf FEDORA:FEDORA-2022-4a69d20cf4 FEDORA:FEDORA-2022-4b0dfda810 FEDORA:FEDORA-2022-4c788bdc40 FEDORA:FEDORA-2022-5ad25e3d3c FEDORA:FEDORA-2022-5ea8aa7518 FEDORA:FEDORA-2022-79843dfb3c FEDORA:FEDORA-2022-9cd41b6709 FEDORA:FEDORA-2022-9da5703d22 FEDORA:FEDORA-2022-9dd70781cb FEDORA:FEDORA-2022-a8e50dc83e FEDORA:FEDORA-2022-b499f2a9c6 FEDORA:FEDORA-2022-ce55d01569 FEDORA:FEDORA-2022-cece1d07d9 FEDORA:FEDORA-2022-d157a91e10 FEDORA:FEDORA-2022-d1682fef04 FEDORA:FEDORA-2022-dbe9a8f9ac FEDORA:FEDORA-2022-ec74ac4079 L3:63797 L3:64535 L3:65219 MISC:bugs.python.org:CVE-2015-20107 MISC:github.com:CVE-2015-20107 RHSA-2022:6457 RHSA-2022:6766 RHSA-2022:7581 RHSA-2022:7592 RHSA-2022:7593 RHSA-2022:8353 SMASH Issue 329033 bnc#1198511 https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html https://security.gentoo.org/glsa/202305-02 jsc#CAR-1683 rh#2075390 |
CVE-2015-20109 | glibc:Already fixed | moderate | () | CVE-2015-20109 D:CVE-2015-20109 SMASH Issue 370456 bnc#1212713 https://security.netapp.com/advisory/ntap-20230731-0009/ https://sourceware.org/bugzilla/show_bug.cgi?id=18036 rh#2217330 |
CVE-2015-2325 | perl:Already fixed | moderate | () | APPLE:APPLE-SA-2010-03-29-1 APPLE:APPLE-SA-2016-03-21-1 APPLE:APPLE-SA-2016-03-21-2 APPLE:APPLE-SA-2016-03-21-3 APPLE:APPLE-SA-2016-03-21-5 APPLE:APPLE-SA-2016-05-16-4 APPLE:APPLE-SA-2016-07-18-1 APPLE:APPLE-SA-2016-07-18-2 APPLE:APPLE-SA-2016-07-18-3 APPLE:APPLE-SA-2016-07-18-4 APPLE:APPLE-SA-2016-07-18-6 APPLE:APPLE-SA-2016-09-20 BID:100503 BID:100514 BID:100861 BID:103144 BID:103415 BID:103782 BID:103796 BID:103846 BID:103848 BID:103954 BID:104222 BID:104764 BID:104765 BID:104768 BID:104773 BID:104774 BID:104775 BID:104780 BID:104782 BID:105117 BID:105118 BID:105126 BID:105587 BID:105590 BID:105591 BID:105597 BID:105601 BID:105602 BID:105608 BID:105615 BID:105617 BID:105619 BID:105622 BID:105624 BID:105635 BID:105637 BID:105647 BID:105656 BID:105658 BID:106619 BID:106622 BID:106625 BID:106626 BID:106627 BID:106628 BID:67121 BID:69257 BID:70142 BID:71206 BID:74073 BID:74075 BID:74078 BID:74081 BID:74085 BID:74095 BID:74112 BID:74924 BID:76157 BID:76187 BID:76282 BID:76289 BID:76291 BID:79091 BID:82307 BID:82990 BID:84220 BID:84223 BID:84271 BID:85572 BID:85576 BID:85801 BID:86957 BID:90876 BID:91067 BID:91068 BID:91081 BID:91566 BID:91787 BID:91869 BID:92115 BID:92127 BID:93132 BID:93287 BID:93604 BID:93612 BID:93614 BID:93685 BID:93687 BID:93697 BID:93711 BID:93718 BID:93744 BID:94371 BID:94377 BID:94925 BID:95131 BID:95429 BID:95849 BID:96389 BID:96392 BID:96409 BID:96410 BID:96434 BID:96435 BID:96436 BID:97102 BID:97791 BID:97848 BID:99046 BUGTRAQ:20140925 LSE Leading Security Experts GmbH - LSE-2014-06-10 - Perl CORE - Deep Recursion Stack Overflow BUGTRAQ:20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities CISCO:20160927 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: September 2016 CONFIRM:access.redhat.com:CVE-2014-0114 CONFIRM:access.redhat.com:CVE-2014-3577 CONFIRM:access.redhat.com:CVE-2015-0293 CONFIRM:access.redhat.com:CVE-2015-3456 CONFIRM:advisories.mageia.org:CVE-2014-0114 CONFIRM:advisories.mageia.org:CVE-2014-4330 CONFIRM:advisories.mageia.org:CVE-2014-8964 CONFIRM:bto.bluecoat.com:CVE-2016-1950 CONFIRM:bto.bluecoat.com:CVE-2016-3191 CONFIRM:bto.bluecoat.com:CVE-2016-7052 CONFIRM:bugs.eclipse.org:CVE-2018-12539 CONFIRM:bugs.exim.org:CVE-2014-8964 CONFIRM:bugs.exim.org:CVE-2015-2328 CONFIRM:bugs.exim.org:CVE-2015-8381 CONFIRM:bugs.exim.org:CVE-2015-8382 CONFIRM:bugs.jython.org:CVE-2016-4000 CONFIRM:bugs.launchpad.net:CVE-2015-8866 CONFIRM:bugs.launchpad.net:CVE-2015-8867 CONFIRM:bugs.php.net:CVE-2015-8866 CONFIRM:bugs.php.net:CVE-2015-8867 CONFIRM:bugs.php.net:CVE-2015-8878 CONFIRM:bugs.php.net:CVE-2016-3141 CONFIRM:bugs.php.net:CVE-2016-4070 CONFIRM:bugs.php.net:CVE-2016-6294 CONFIRM:bugzilla.mozilla.org:CVE-2016-1950 CONFIRM:bugzilla.mozilla.org:CVE-2016-1955 CONFIRM:bugzilla.mozilla.org:CVE-2016-1956 CONFIRM:bugzilla.mozilla.org:CVE-2016-1959 CONFIRM:bugzilla.mozilla.org:CVE-2016-1967 CONFIRM:bugzilla.mozilla.org:CVE-2016-1968 CONFIRM:bugzilla.mozilla.org:CVE-2016-1969 CONFIRM:bugzilla.mozilla.org:CVE-2016-1970 CONFIRM:bugzilla.mozilla.org:CVE-2016-1971 CONFIRM:bugzilla.mozilla.org:CVE-2016-1972 CONFIRM:bugzilla.mozilla.org:CVE-2016-1973 CONFIRM:bugzilla.mozilla.org:CVE-2016-1975 CONFIRM:bugzilla.mozilla.org:CVE-2016-1976 CONFIRM:bugzilla.redhat.com:CVE-2015-7559 CONFIRM:bugzilla.redhat.com:CVE-2016-9583 CONFIRM:cert-portal.siemens.com:/productcert/pdf/ssa-412672.pdf CONFIRM:codereview.chromium.org:CVE-2016-1675 CONFIRM:codereview.chromium.org:CVE-2016-1676 CONFIRM:codereview.chromium.org:CVE-2016-1677 CONFIRM:codereview.chromium.org:CVE-2016-1678 CONFIRM:codereview.chromium.org:CVE-2016-1679 CONFIRM:codereview.chromium.org:CVE-2016-1680 CONFIRM:codereview.chromium.org:CVE-2016-1681 CONFIRM:codereview.chromium.org:CVE-2016-1682 CONFIRM:codereview.chromium.org:CVE-2016-1685 CONFIRM:codereview.chromium.org:CVE-2016-1686 CONFIRM:codereview.chromium.org:CVE-2016-1687 CONFIRM:codereview.chromium.org:CVE-2016-1688 CONFIRM:codereview.chromium.org:CVE-2016-1689 CONFIRM:codereview.chromium.org:CVE-2016-1691 CONFIRM:codereview.chromium.org:CVE-2016-1692 CONFIRM:codereview.chromium.org:CVE-2016-1693 CONFIRM:codereview.chromium.org:CVE-2016-1694 CONFIRM:codereview.chromium.org:CVE-2016-1701 CONFIRM:commons.apache.org:CVE-2014-0114 CONFIRM:crbug.com:CVE-2016-1672 CONFIRM:crbug.com:CVE-2016-1673 CONFIRM:crbug.com:CVE-2016-1674 CONFIRM:crbug.com:CVE-2016-1675 CONFIRM:crbug.com:CVE-2016-1676 CONFIRM:crbug.com:CVE-2016-1677 CONFIRM:crbug.com:CVE-2016-1678 CONFIRM:crbug.com:CVE-2016-1679 CONFIRM:crbug.com:CVE-2016-1680 CONFIRM:crbug.com:CVE-2016-1681 CONFIRM:crbug.com:CVE-2016-1682 CONFIRM:crbug.com:CVE-2016-1683 CONFIRM:crbug.com:CVE-2016-1684 CONFIRM:crbug.com:CVE-2016-1685 CONFIRM:crbug.com:CVE-2016-1686 CONFIRM:crbug.com:CVE-2016-1687 CONFIRM:crbug.com:CVE-2016-1688 CONFIRM:crbug.com:CVE-2016-1689 CONFIRM:crbug.com:CVE-2016-1690 CONFIRM:crbug.com:CVE-2016-1691 CONFIRM:crbug.com:CVE-2016-1692 CONFIRM:crbug.com:CVE-2016-1693 CONFIRM:crbug.com:CVE-2016-1694 CONFIRM:crbug.com:CVE-2016-1695 CONFIRM:curl.haxx.se:CVE-2016-0755 CONFIRM:curl.haxx.se:CVE-2018-1000121 CONFIRM:developer.mozilla.org:CVE-2016-1950 CONFIRM:git.gnome.org:CVE-2016-1683 CONFIRM:git.gnome.org:CVE-2016-1684 CONFIRM:git.gnupg.org:CVE-2017-9526 CONFIRM:git.php.net:CVE-2015-8382 CONFIRM:git.php.net:CVE-2015-8866 CONFIRM:git.php.net:CVE-2015-8867 CONFIRM:git.php.net:CVE-2016-3141 CONFIRM:git.php.net:CVE-2016-6294 CONFIRM:git.savannah.gnu.org:CVE-2014-9746 CONFIRM:git.savannah.gnu.org:CVE-2014-9747 CONFIRM:github.com:CVE-2013-7330 CONFIRM:github.com:CVE-2014-2058 CONFIRM:github.com:CVE-2014-2059 CONFIRM:github.com:CVE-2014-2061 CONFIRM:github.com:CVE-2014-2062 CONFIRM:github.com:CVE-2014-2063 CONFIRM:github.com:CVE-2014-2064 CONFIRM:github.com:CVE-2014-2065 CONFIRM:github.com:CVE-2014-2066 CONFIRM:github.com:CVE-2014-2067 CONFIRM:github.com:CVE-2014-2068 CONFIRM:github.com:CVE-2016-1182 CONFIRM:github.com:CVE-2016-4979 CONFIRM:github.com:CVE-2016-9389 CONFIRM:github.com:CVE-2016-9394 CONFIRM:github.com:CVE-2016-9583 CONFIRM:github.com:CVE-2016-9840 CONFIRM:github.com:CVE-2016-9841 CONFIRM:github.com:CVE-2016-9842 CONFIRM:github.com:CVE-2016-9843 CONFIRM:github.com:CVE-2017-1000071 CONFIRM:github.com:CVE-2017-14735 CONFIRM:googlechromereleases.blogspot.com:CVE-2016-1695 CONFIRM:h20566.www2.hpe.com:CVE-2016-0763 CONFIRM:h20566.www2.hpe.com:CVE-2016-2014 CONFIRM:h20566.www2.hpe.com:CVE-2016-2183 CONFIRM:h20566.www2.hpe.com:CVE-2016-5388 CONFIRM:h20566.www2.hpe.com:CVE-2016-5773 CONFIRM:h20566.www2.hpe.com:CVE-2016-6306 CONFIRM:h20566.www2.hpe.com:CVE-2016-8518 CONFIRM:h20566.www2.hpe.com:CVE-2017-5787 CONFIRM:hg.mozilla.org:CVE-2016-1975 CONFIRM:hg.python.org:CVE-2016-4000 CONFIRM:httpd.apache.org:CVE-2016-4979 CONFIRM:issues.apache.org:CVE-2014-0114 CONFIRM:issues.apache.org:CVE-2015-1832 CONFIRM:issues.apache.org:CVE-2015-7559 CONFIRM:issues.apache.org:CVE-2016-1000031 CONFIRM:jenkins.io:CVE-2017-1000403 CONFIRM:jira.mongodb.org:CVE-2015-2328 CONFIRM:kb.juniper.net:CVE-2015-3209 CONFIRM:kb.juniper.net:CVE-2016-7052 CONFIRM:kb.pulsesecure.net:CVE-2016-6306 CONFIRM:kc.mcafee.com:CVE-2016-6306 CONFIRM:mariadb.com:CVE-2015-2571 CONFIRM:metacpan.org:CVE-2014-4330 CONFIRM:nodejs.org:CVE-2016-7099 CONFIRM:nodesecurity.io:CVE-2013-7454 CONFIRM:nodesecurity.io:CVE-2014-9772 CONFIRM:nodesecurity.io:CVE-2015-8315 CONFIRM:nodesecurity.io:CVE-2015-8854 CONFIRM:nodesecurity.io:CVE-2015-8855 CONFIRM:nodesecurity.io:CVE-2015-8856 CONFIRM:nodesecurity.io:CVE-2015-8858 CONFIRM:nodesecurity.io:CVE-2015-8859 CONFIRM:nodesecurity.io:CVE-2015-8860 CONFIRM:nodesecurity.io:CVE-2015-8862 CONFIRM:nodesecurity.io:CVE-2016-4055 CONFIRM:php.net:CVE-2016-3142 CONFIRM:pivotal.io:CVE-2018-1258 CONFIRM:rwkbp.makekb.com:CVE-2015-8965 CONFIRM:security-tracker.debian.org:CVE-2016-1181 CONFIRM:security-tracker.debian.org:CVE-2016-1182 CONFIRM:security.netapp.com:CVE-2014-0114 CONFIRM:security.netapp.com:CVE-2015-2575 CONFIRM:security.netapp.com:CVE-2016-1000031 CONFIRM:security.netapp.com:CVE-2016-1182 CONFIRM:security.netapp.com:CVE-2016-9843 CONFIRM:security.netapp.com:CVE-2017-10388 CONFIRM:security.netapp.com:CVE-2017-5645 CONFIRM:security.netapp.com:CVE-2018-1305 CONFIRM:security.netapp.com:CVE-2018-2973 CONFIRM:security.netapp.com:CVE-2019-2435 CONFIRM:support.apple.com:CVE-2009-0689 CONFIRM:support.apple.com:CVE-2016-1950 CONFIRM:support.apple.com:CVE-2016-4073 CONFIRM:support.apple.com:CVE-2016-4616 CONFIRM:support.apple.com:CVE-2016-4653 CONFIRM:support.apple.com:CVE-2016-7582 CONFIRM:support.apple.com:CVE-2017-13873 CONFIRM:support.apple.com:CVE-2017-13877 CONFIRM:support.apple.com:CVE-2017-6464 CONFIRM:support.f5.com:CVE-2015-8854 CONFIRM:support.f5.com:CVE-2016-2178 CONFIRM:support.hpe.com:CVE-2016-6306 CONFIRM:support.hpe.com:CVE-2016-7052 CONFIRM:support.hpe.com:CVE-2018-2940 CONFIRM:support.hpe.com:CVE-2018-2973 CONFIRM:svn.apache.org:CVE-2012-6153 CONFIRM:svn.apache.org:CVE-2015-1832 CONFIRM:vcs.pcre.org:CVE-2015-8382 CONFIRM:vcs.pcre.org:CVE-2015-8395 CONFIRM:www-01.ibm.com:CVE-2014-0114 CONFIRM:www-01.ibm.com:CVE-2014-3022 CONFIRM:www-01.ibm.com:CVE-2015-1832 CONFIRM:www-01.ibm.com:CVE-2016-3191 CONFIRM:www-01.ibm.com:CVE-2016-7052 CONFIRM:www.exim.org:CVE-2014-8964 CONFIRM:www.huawei.com:CVE-2016-6306 CONFIRM:www.ibm.com:CVE-2014-0963 CONFIRM:www.ibm.com:CVE-2018-1656 CONFIRM:www.lsexperts.de:CVE-2014-4330 CONFIRM:www.mozilla.org:CVE-2016-1950 CONFIRM:www.mozilla.org:CVE-2016-1955 CONFIRM:www.mozilla.org:CVE-2016-1956 CONFIRM:www.mozilla.org:CVE-2016-1959 CONFIRM:www.mozilla.org:CVE-2016-1967 CONFIRM:www.mozilla.org:CVE-2016-1968 CONFIRM:www.mozilla.org:CVE-2016-1969 CONFIRM:www.mozilla.org:CVE-2016-1973 CONFIRM:www.mozilla.org:CVE-2016-1976 CONFIRM:www.oracle.com:CVE-2014-0114 CONFIRM:www.oracle.com:CVE-2014-4271 CONFIRM:www.oracle.com:CVE-2014-6564 CONFIRM:www.oracle.com:CVE-2015-0437 CONFIRM:www.oracle.com:CVE-2015-1351 CONFIRM:www.oracle.com:CVE-2015-2568 CONFIRM:www.oracle.com:CVE-2015-2579 CONFIRM:www.oracle.com:CVE-2015-4879 CONFIRM:www.oracle.com:CVE-2015-5722 CONFIRM:www.oracle.com:CVE-2015-8391 CONFIRM:www.oracle.com:CVE-2016-0778 CONFIRM:www.oracle.com:CVE-2016-2802 CONFIRM:www.oracle.com:CVE-2016-4957 CONFIRM:www.oracle.com:CVE-2016-5240 CONFIRM:www.oracle.com:CVE-2016-5477 CONFIRM:www.oracle.com:CVE-2016-6304 CONFIRM:www.oracle.com:CVE-2016-7039 CONFIRM:www.oracle.com:CVE-2016-7154 CONFIRM:www.oracle.com:CVE-2016-8296 CONFIRM:www.oracle.com:CVE-2017-10365 CONFIRM:www.oracle.com:CVE-2017-3626 CONFIRM:www.oracle.com:CVE-2017-3636 CONFIRM:www.oracle.com:CVE-2017-5689 CONFIRM:www.oracle.com:CVE-2017-5709 CONFIRM:www.oracle.com:CVE-2017-5715 CONFIRM:www.oracle.com:CVE-2017-5753 CONFIRM:www.oracle.com:CVE-2017-6074 CONFIRM:www.oracle.com:CVE-2018-18223 CONFIRM:www.oracle.com:CVE-2018-2639 CONFIRM:www.oracle.com:CVE-2018-2819 CONFIRM:www.oracle.com:CVE-2018-3081 CONFIRM:www.oracle.com:CVE-2018-3125 CONFIRM:www.pcre.org:CVE-2015-2325 CONFIRM:www.php.net:CVE-2009-3558 CONFIRM:www.php.net:CVE-2016-9935 CONFIRM:www.php.net:CVE-2016-9936 CONFIRM:www.splunk.com:CVE-2016-6304 CONFIRM:www.synology.com:CVE-2015-9104 CONFIRM:www.synology.com:CVE-2015-9105 CONFIRM:www.tenable.com:CVE-2016-4055 CONFIRM:www.tenable.com:CVE-2016-7052 CONFIRM:www.tenable.com:CVE-2016-8625 CONFIRM:www.tenable.com:CVE-2016-9260 CONFIRM:www.tenable.com:CVE-2016-9261 CONFIRM:www.vmware.com:CVE-2014-0114 CONFIRM:www.vmware.com:CVE-2014-8371 CONFIRM:x-stream.github.io:CVE-2013-7285 CVE-2009-3559 CVE-2012-6153 CVE-2013-7285 CVE-2013-7451 CVE-2013-7452 CVE-2013-7453 CVE-2013-7454 CVE-2014-0114 CVE-2014-0245 CVE-2014-3540 CVE-2014-4172 CVE-2014-4330 CVE-2014-4651 CVE-2014-7192 CVE-2014-8964 CVE-2014-9745 CVE-2014-9746 CVE-2014-9747 CVE-2014-9772 CVE-2015-0405 CVE-2015-0423 CVE-2015-0433 CVE-2015-0438 CVE-2015-0439 CVE-2015-0441 CVE-2015-0498 CVE-2015-0499 CVE-2015-0500 CVE-2015-0501 CVE-2015-0503 CVE-2015-0505 CVE-2015-0506 CVE-2015-0507 CVE-2015-0508 CVE-2015-0511 CVE-2015-0852 CVE-2015-1832 CVE-2015-2325 CVE-2015-2326 CVE-2015-2327 CVE-2015-2328 CVE-2015-2566 CVE-2015-2567 CVE-2015-2568 CVE-2015-2571 CVE-2015-2573 CVE-2015-2575 CVE-2015-2576 CVE-2015-2613 CVE-2015-5125 CVE-2015-5127 CVE-2015-5128 CVE-2015-5129 CVE-2015-5130 CVE-2015-5131 CVE-2015-5132 CVE-2015-5134 CVE-2015-5328 CVE-2015-5539 CVE-2015-5540 CVE-2015-5541 CVE-2015-5544 CVE-2015-5545 CVE-2015-5551 CVE-2015-5552 CVE-2015-5553 CVE-2015-5554 CVE-2015-5555 CVE-2015-5556 CVE-2015-5557 CVE-2015-5558 CVE-2015-5559 CVE-2015-5560 CVE-2015-5561 CVE-2015-5564 CVE-2015-5565 CVE-2015-5566 CVE-2015-7559 CVE-2015-7940 CVE-2015-8315 CVE-2015-8381 CVE-2015-8382 CVE-2015-8383 CVE-2015-8384 CVE-2015-8385 CVE-2015-8386 CVE-2015-8387 CVE-2015-8388 CVE-2015-8389 CVE-2015-8390 CVE-2015-8391 CVE-2015-8392 CVE-2015-8393 CVE-2015-8394 CVE-2015-8395 CVE-2015-8854 CVE-2015-8855 CVE-2015-8856 CVE-2015-8857 CVE-2015-8858 CVE-2015-8859 CVE-2015-8860 CVE-2015-8861 CVE-2015-8862 CVE-2015-8878 CVE-2015-8965 CVE-2015-9104 CVE-2015-9105 CVE-2015-9251 CVE-2016-0635 CVE-2016-0755 CVE-2016-1000031 CVE-2016-1181 CVE-2016-1182 CVE-2016-1672 CVE-2016-1673 CVE-2016-1674 CVE-2016-1675 CVE-2016-1676 CVE-2016-1677 CVE-2016-1678 CVE-2016-1679 CVE-2016-1680 CVE-2016-1681 CVE-2016-1682 CVE-2016-1683 CVE-2016-1684 CVE-2016-1685 CVE-2016-1686 CVE-2016-1687 CVE-2016-1688 CVE-2016-1689 CVE-2016-1690 CVE-2016-1691 CVE-2016-1692 CVE-2016-1693 CVE-2016-1694 CVE-2016-1695 CVE-2016-1950 CVE-2016-1955 CVE-2016-1956 CVE-2016-1959 CVE-2016-1967 CVE-2016-1968 CVE-2016-1969 CVE-2016-1970 CVE-2016-1971 CVE-2016-1972 CVE-2016-1973 CVE-2016-1975 CVE-2016-1976 CVE-2016-2178 CVE-2016-2515 CVE-2016-2537 CVE-2016-3141 CVE-2016-3142 CVE-2016-4000 CVE-2016-4055 CVE-2016-4070 CVE-2016-4612 CVE-2016-4619 CVE-2016-4979 CVE-2016-5483 CVE-2016-5501 CVE-2016-5538 CVE-2016-5605 CVE-2016-5608 CVE-2016-5610 CVE-2016-5611 CVE-2016-5616 CVE-2016-5617 CVE-2016-5684 CVE-2016-6293 CVE-2016-6294 CVE-2016-6814 CVE-2016-9389 CVE-2016-9392 CVE-2016-9583 CVE-2016-9840 CVE-2016-9841 CVE-2016-9842 CVE-2017-0379 CVE-2017-13745 CVE-2017-14229 CVE-2017-14735 CVE-2017-15095 CVE-2017-16012 CVE-2017-3454 CVE-2017-3468 CVE-2017-9526 CVE-2018-1000121 CVE-2018-12539 CVE-2018-1258 CVE-2018-1517 CVE-2018-1656 CVE-2018-2767 CVE-2018-2797 CVE-2018-2815 CVE-2018-2825 CVE-2018-2826 CVE-2018-2909 CVE-2018-2938 CVE-2018-2940 CVE-2018-2941 CVE-2018-2952 CVE-2018-2964 CVE-2018-2972 CVE-2018-2973 CVE-2018-3005 CVE-2018-3055 CVE-2018-3085 CVE-2018-3086 CVE-2018-3087 CVE-2018-3088 CVE-2018-3089 CVE-2018-3090 CVE-2018-3091 CVE-2018-3127 CVE-2018-3134 CVE-2018-3136 CVE-2018-3139 CVE-2018-3149 CVE-2018-3150 CVE-2018-3169 CVE-2018-3180 CVE-2018-3183 CVE-2018-3209 CVE-2018-3211 CVE-2018-3214 CVE-2018-3287 CVE-2018-3288 CVE-2018-3289 CVE-2018-3290 CVE-2018-3291 CVE-2018-3292 CVE-2018-3293 CVE-2018-3294 CVE-2018-3295 CVE-2018-3296 CVE-2018-3297 CVE-2018-3298 CVE-2019-2422 CVE-2019-2426 CVE-2019-2449 CVE-2019-2455 CVE-2019-2481 CVE-2019-2482 CVE-2019-2503 CVE-2019-2507 CVE-2019-2510 CVE-2019-2513 CVE-2019-2528 CVE-2019-2529 CVE-2019-2530 CVE-2019-2531 CVE-2019-2532 CVE-2019-2533 CVE-2019-2534 CVE-2019-2535 CVE-2019-2536 CVE-2019-2537 CVE-2019-2539 CVE-2019-2540 CVE-2024-2466 D:CVE-2015-2301 D:CVE-2015-2571 D:CVE-2015-2573 D:CVE-2015-2575 D:CVE-2015-2576 D:CVE-2015-5557 D:CVE-2015-5558 D:CVE-2015-5559 D:CVE-2015-5560 D:CVE-2015-5561 D:CVE-2015-5562 D:CVE-2015-5563 D:CVE-2015-5564 D:CVE-2015-5565 D:CVE-2015-8386 D:CVE-2015-8387 D:CVE-2015-8388 D:CVE-2015-8389 D:CVE-2015-8390 D:CVE-2015-8391 D:CVE-2015-8392 D:CVE-2015-8393 D:CVE-2015-8394 D:CVE-2015-8395 D:CVE-2015-9105 D:CVE-2016-1674 D:CVE-2016-1682 D:CVE-2016-1694 D:CVE-2016-1695 D:CVE-2016-1950 D:CVE-2016-1970 D:CVE-2016-1973 D:CVE-2016-2178 D:CVE-2016-3141 D:CVE-2016-3142 D:CVE-2016-4055 D:CVE-2016-5608 D:CVE-2016-5610 D:CVE-2016-6293 D:CVE-2016-6294 D:CVE-2017-9526 D:CVE-2018-1517 D:CVE-2018-1656 D:CVE-2018-3297 D:CVE-2018-3298 D:CVE-2022-2590 DEBIAN:DSA-3959 DEBIAN:DSA-4136 DEBIAN:DSA-4268 DEBIAN:DSA-4281 DEBIAN:DSA-4341 DSA-2940 DSA-3229 DSA-3311 DSA-3370 DSA-3392 DSA-3417 DSA-3455 DSA-3510 DSA-3520 DSA-3590 DSA-3605 DSA-3621 DSA-3631 DSA-3673 DSA-3688 DSA-3725 DSA-3880 DSA-3893 DSA-4136 DSA-4281 DSA-5378 EXPLOIT-DB:37852 EXPLOIT-DB:37854 EXPLOIT-DB:37855 EXPLOIT-DB:37856 EXPLOIT-DB:37857 EXPLOIT-DB:37859 EXPLOIT-DB:37861 FEDORA:FEDORA-2014-11453 FEDORA:FEDORA-2014-15573 FEDORA:FEDORA-2014-17624 FEDORA:FEDORA-2014-17626 FEDORA:FEDORA-2014-17642 FEDORA:FEDORA-2014-9380 FEDORA:FEDORA-2015-16104 FEDORA:FEDORA-2015-16105 FEDORA:FEDORA-2015-16106 FEDORA:FEDORA-2015-7d95466eda FEDORA:FEDORA-2015-992342e82f FEDORA:FEDORA-2015-decbab7c9f FEDORA:FEDORA-2015-eb896290d3 FEDORA:FEDORA-2016-3fa315a5dd FEDORA:FEDORA-2016-55137a3adb FEDORA:FEDORA-2016-57bebab3b6 FEDORA:FEDORA-2016-5a141de5d9 FREEBSD:FreeBSD-SA-16:26 FULLDISC:20140925 LSE Leading Security Experts GmbH - LSE-2014-06-10 - Perl CORE - Deep Recursion Stack Overflow FULLDISC:20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities FULLDISC:20160706 CVE-2016-4979: HTTPD webserver - X509 Client certificate based authentication can be bypassed when HTTP/2 is used [vs] FULLDISC:20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities GENTOO:GLSA-201507-19 GENTOO:GLSA-201605-06 GENTOO:GLSA-201607-02 GENTOO:GLSA-201607-07 GENTOO:GLSA-201607-09 GENTOO:GLSA-201610-02 GENTOO:GLSA-201612-16 GENTOO:GLSA-201612-27 GENTOO:GLSA-201701-56 GENTOO:GLSA-201701-68 GENTOO:GLSA-201710-28 GLSA-201908-24 GLSA-202007-54 HP:HPSBGN03041 HP:HPSBMU03090 HP:HPSBST03160 IBM Security Bulletin 0713459 (Cognos Business Intelligence) IBM Security Bulletin 0713487 (Rational Collaborative Lifecycle Management) IBM Security Bulletin 0715641 (Cognos Business Intelligence) IBM Security Bulletin 0715721 (Agile Lifecycle Manager) IBM Security Bulletin 0716285 (Cognos TM1) IBM Security Bulletin 0716289 (Cognos Insight) IBM Security Bulletin 0717693 (Tivoli Monitoring V6) IBM Security Bulletin 0717727 (Tivoli Monitoring V6) IBM Security Bulletin 0717895 (Rational Business Developer) IBM Security Bulletin 0718381 (Platform Symphony) IBM Security Bulletin 0718421 (InfoSphere Guardium Data Redaction) IBM Security Bulletin 0718447 (Cognos Planning) IBM Security Bulletin 0718949 (Cloud Manager with Openstack) IBM Security Bulletin 0719163 (Rational Reporting for Development Intelligence) IBM Security Bulletin 0719165 (Rational Insight) IBM Security Bulletin 0720115 (Spectrum Conductor with Spark) IBM Security Bulletin 0728577 (Content Classification) IBM Security Bulletin 0729341 (ILOG CPLEX Optimization Studio) IBM Security Bulletin 0729343 (Decision Optimization Center) IBM Security Bulletin 0729607 (WebSphere Application Server) IBM Security Bulletin 0735319 (Tivoli System Automation Application Manager) IBM Security Bulletin 0735477 (Spectrum Conductor) IBM Security Bulletin 0737281 (Application Delivery Intelligence) IBM Security Bulletin 0738853 (Tivoli Monitoring V6) IBM Security Bulletin 0739057 (Sterling Connect:Direct for Microsoft Windows) IBM Security Bulletin 0739549 (Sterling Connect:Direct File Agent) IBM Security Bulletin 0739701 (Sterling Connect:Direct FTP+) IBM Security Bulletin 0739763 (Sterling Connect:Direct for UNIX) IBM Security Bulletin 0743351 (Workload Scheduler) IBM Security Bulletin 0792275 (Tivoli Netcool/Impact) IBM Security Bulletin 2015806 (Runtimes for Java Technology) IBM Security Bulletin 2016406 (Decision Optimization Center) IBM Security Bulletin 2016663 (Tivoli Netcool OMNIbus) IBM Security Bulletin 2016776 (Content Collector) IBM Security Bulletin 2016781 (Content Collector for SAP Applications) IBM Security Bulletin 2016827 (MessageSight) IBM Security Bulletin 2017431 (PureApplication System) IBM Security Bulletin 2017432 (PureApplication System) IBM Security Bulletin 2017449 (Web Experience Factory) IBM Security Bulletin 2017554 (Rational Software Architect) IBM Security Bulletin 715641 (Cognos Business Intelligence Server) IBM Security Bulletin 717121 (Cognos Controller) IBM Security Bulletin 717125 (MQ Appliance) IBM Security Bulletin 719933 (Tivoli Application Dependency Discovery Manager) IBM Security Bulletin 720173 (Transformation Extender) IBM Security Bulletin 725491 (DB2 for Linux, UNIX and Windows) IBM Security Bulletin 726009 (DataPower Gateways) IBM Security Bulletin 728399 (WebSphere Service Registry and Repository) IBM Security Bulletin 728567 (Algo Credit Manager) IBM Security Bulletin 728607 (PureApplication System) IBM Security Bulletin 729116 (Spectrum Protect Plus) IBM Security Bulletin 729699 (QRadar SIEM) IBM Security Bulletin 729745 (WebSphere Application Server Patterns) IBM Security Bulletin 730083 (Rational ClearCase) IBM Security Bulletin 730311 (Cognos Command Center) IBM Security Bulletin 730799 (Spectrum Control Standard Edition) IBM Security Bulletin 730909 (AIX family) IBM Security Bulletin 731323 (Financial Transaction Manager) IBM Security Bulletin 731325 (Financial Transaction Manager) IBM Security Bulletin 731329 (i) IBM Security Bulletin 731331 (Financial Transaction Manager) IBM Security Bulletin 731337 (Financial Transaction Manager) IBM Security Bulletin 731339 (Financial Transaction Manager) IBM Security Bulletin 731419 (Rational Software Architect Designer) IBM Security Bulletin 731507 (Rational Software Architect Design Manager) IBM Security Bulletin 731615 (Process Designer) IBM Security Bulletin 731641 (InfoSphere Guardium Data Redaction) IBM Security Bulletin 731875 (FileNet System Monitor) IBM Security Bulletin 732375 (Initiate Master Data Service) IBM Security Bulletin 732455 (Rational Performance Tester) IBM Security Bulletin 732457 (Rational Service Tester for SOA Quality) IBM Security Bulletin 732723 (Tivoli Application Dependency Discovery Manager) IBM Security Bulletin 732753 (Agile Lifecycle Manager) IBM Security Bulletin 732785 (Security Guardium) IBM Security Bulletin 732846 (Spectrum Symphony) IBM Security Bulletin 732850 (App Connect Enterprise) IBM Security Bulletin 732896 (Planning Analytics) IBM Security Bulletin 732932 (SPSS Statistics) IBM Security Bulletin 733068 (Liberty for Java for Bluemix) IBM Security Bulletin 733457 (Tivoli Netcool/OMNIbus) IBM Security Bulletin 733543 (Tivoli Netcool/Impact) IBM Security Bulletin 733845 (Integration Designer) IBM Security Bulletin 733857 (Rational DOORS Web Access) IBM Security Bulletin 733869 (DataPower Gateways) IBM Security Bulletin 733905 (Rational Application Developer for WebSphere Software) IBM Security Bulletin 734161 (WebSphere Application Server in Cloud) IBM Security Bulletin 734595 (Rational Build Forge) IBM Security Bulletin 735325 (Tivoli System Automation for Multiplatforms) IBM Security Bulletin 735421 (MessageSight) IBM Security Bulletin 735481 (Rational Directory Server) IBM Security Bulletin 735515 (Rational Host On-Demand) IBM Security Bulletin 735541 (Rational Method Composer) IBM Security Bulletin 735551 (Runtimes for Java Technology) IBM Security Bulletin 735807 (Tivoli Monitoring V6) IBM Security Bulletin 737495 (Cloud App Management) IBM Security Bulletin 737775 (Web Experience Factory) IBM Security Bulletin 737813 (Content Collector for SAP Applications) IBM Security Bulletin 738337 (Monitoring) IBM Security Bulletin 738347 (Rational Publishing Engine) IBM Security Bulletin 738633 (WebSphere Service Registry and Repository) IBM Security Bulletin 738729 (Installation Manager) IBM Security Bulletin 738743 (Rational Developer for i) IBM Security Bulletin 738905 (Cognos Insight) IBM Security Bulletin 738907 (Cognos TM1) IBM Security Bulletin 738985 (WebSphere MQ) IBM Security Bulletin 738997 (MQ) IBM Security Bulletin 739183 (http://www.ibm.com/support/docview.wss?uid=ibm10739183) IBM Security Bulletin 739227 (Cloud Orchestrator) IBM Security Bulletin 739231 (Algo Credit Manager) IBM Security Bulletin 739251 (Decision Optimization Center) IBM Security Bulletin 739261 (Monitoring) IBM Security Bulletin 739387 (Spectrum Protect for Virtual Environments) IBM Security Bulletin 739455 (Spectrum Protect Snapshot) IBM Security Bulletin 739941 (Content Collector) IBM Security Bulletin 739985 (WebSphere Application Server Patterns) IBM Security Bulletin 740269 (Notes) IBM Security Bulletin 740383 (Sterling Connect:Direct Browser User Interface) IBM Security Bulletin 740419 (Security Access Manager Appliance) IBM Security Bulletin 740447 (Operational Decision Manager) IBM Security Bulletin 740467 (Tivoli Storage Manager FastBack) IBM Security Bulletin 740673 (Control Center) IBM Security Bulletin 741745 (Tivoli Composite Application Manager (ITCAM) for Transactions) IBM Security Bulletin 742369 (Security SiteProtector System) IBM Security Bulletin 742729 (QRadar SIEM) IBM Security Bulletin 743071 (Rational Asset Analyzer) IBM Security Bulletin 743149 (Financial Transaction Manager) IBM Security Bulletin 743157 (Financial Transaction Manager) IBM Security Bulletin 743193 (Spectrum Protect) IBM Security Bulletin 743961 (Rational Publishing Engine) IBM Security Bulletin 744823 (Rational Collaborative Lifecycle Management) IBM Security Bulletin 787583 (API Connect) IBM Security Bulletin 787833 (AIX family) IBM Security Bulletin 788277 (WebSphere Cast Iron) IBM Security Bulletin 789805 (WebSphere MQ) IBM Security Bulletin 791171 (Rational DOORS Web Access) IBM Security Bulletin 791855 (WebSphere eXtreme Scale) IBM Security Bulletin 791861 (WebSphere DataPower XC10 Appliance) IBM Security Bulletin 792239 (Cloud Manager with Openstack) IBM Security Bulletin T1027807 (AIX family) JVN:JVN#03188560 JVN:JVN#65044642 JVNDB:JVNDB-2016-000096 JVNDB:JVNDB-2016-000097 L3:42159 L3:44989 L3:45334 L3:45906 L3:47274 L3:53225 MANDRIVA:MDVSA-2009:302 MANDRIVA:MDVSA-2014:095 MANDRIVA:MDVSA-2015:002 MANDRIVA:MDVSA-2015:136 MANDRIVA:MDVSA-2015:137 MANDRIVA:MDVSA-2015:227 MISC:access.redhat.com:CVE-2014-0245 MISC:access.redhat.com:MLIST:[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations MISC:blog.diniscruz.com:CVE-2013-7285 MISC:blogs.gentoo.org:CVE-2016-9399 MISC:bugs.exim.org:CVE-2015-2325 MISC:bugs.exim.org:CVE-2015-2326 MISC:bugs.launchpad.net:MLIST:[oss-security] 20150911 CVE Request: 2 FreeType issues MISC:bugs.php.net:CVE-2009-3559 MISC:bugs.php.net:MISC:www.openwall.com MISC:bugzilla.redhat.com:CVE-2014-0245 MISC:curl.haxx.se MISC:curl.haxx.se:OSS:2018/Q1/235 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:developer.mozilla.org:CVE-2016-1979 MISC:eprint.iacr.org:CVE-2016-2178 MISC:eprint.iacr.org:CVE-2017-0379 MISC:exchange.xforce.ibmcloud.com:CVE-2014-4172 MISC:fortiguard.com:CVE-2015-2325 MISC:fortiguard.com:CVE-2015-2326 MISC:git.gnupg.org:CVE-2017-0379 MISC:git.openssl.org:MLIST:[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations MISC:github.com:CVE-2014-4172 MISC:github.com:CVE-2015-9251 MISC:github.com:CVE-2017-14229 MISC:github.com:MLIST:[oss-security] 20161205 Re: CVE Request: zlib security issues found during audit MISC:github.com:OSS:2018/Q1/235 MISC:github.com:OSS:2024/Q1/256 MISC:ics-cert.us-cert.gov:CVE-2015-9251 MISC:issues.apache.org:CVE-2014-4651 MISC:issues.jasig.org:CVE-2014-4172 MISC:lists.apache.org:CVE-2018-1305 MISC:lists.debian.org:CVE-2017-0379 MISC:lists.fedoraproject.org:CVE-2014-4172 MISC:mail-archives.apache.org:CVE-2016-6814 MISC:nodesecurity.io:CVE-2014-10064 MISC:nodesecurity.io:CVE-2015-8857 MISC:nodesecurity.io:MLIST:[oss-security] 20160420 various vulnerabilities in Node.js packages MISC:packetstormsecurity.com:CVE-2014-4330 MISC:packetstormsecurity.com:CVE-2016-0755 MISC:packetstormsecurity.com:CVE-2016-4979 MISC:savannah.nongnu.org:CVE-2014-9747 MISC:seclists.org:CVE-2014-4651 MISC:security-tracker.debian.org:CVE-2016-4000 MISC:security-tracker.debian.org:CVE-2017-0379 MISC:snyk.io:CVE-2015-9251 MISC:snyk.io:CVE-2016-4000 MISC:sw.aveva.com:CVE-2015-9251 MISC:web-in-security.blogspot.ca:CVE-2015-7940 MISC:web.archive.org:CVE-2013-7285 MISC:wiki.mozilla.org:CVE-2016-9843 MISC:www.arista.com:CVE-2016-6306 MISC:www.debian.org:CVE-2014-4172 MISC:www.fortiguard.com:CVE-2015-2327 MISC:www.fortiguard.com:CVE-2015-2328 MISC:www.fortiguard.com:CVE-2015-9104 MISC:www.fortiguard.com:CVE-2015-9105 MISC:www.mail-archive.com:CVE-2014-4172 MISC:www.openssl.org:CVE-2016-6302 MISC:www.oracle.com:CVE-2013-7285 MISC:www.oracle.com:CVE-2014-0107 MISC:www.oracle.com:CVE-2015-7501 MISC:www.oracle.com:CVE-2016-1000031 MISC:www.sourceclear.com:CVE-2015-8861 MISC:www.talosintelligence.com:CVE-2016-5684 MISC:www.tenable.com:CVE-2016-1000031 MISC:www.tenable.com:CVE-2016-6793 MLIST:[activemq-issues] 20190718 [jira] [Updated] (AMQ-7236) SEV-1 Security vulnerability in spring-expression-4.3.11.RELEASE.jar (spring framework) and xstream-1.4.10.jar MLIST:[activemq-issues] 20190826 [jira] [Created] (AMQ-7288) Security Vulnerabilities in ActiveMQ dependent libraries. MLIST:[announce] 20181105 [SECURITY] Immediately upgrade commons-fileupload to version 1.3.3 when running Struts 2.3.36 or prior MLIST:[apache-ignite-developers] 20180601 [CVE-2014-0114]: Apache Ignite is vulnerable to existing CVE-2014-0114 MLIST:[debian-lts-announce] 20180306 [SECURITY] [DLA 1301-1] tomcat7 security update MLIST:[debian-lts-announce] 20180318 [SECURITY] [DLA 1309-1] curl security update MLIST:[debian-lts-announce] 20180627 [SECURITY] [DLA 1400-1] tomcat7 security update MLIST:[debian-lts-announce] 20180729 [SECURITY] [DLA 1450-1] tomcat8 security update MLIST:[debian-lts-announce] 20181105 [SECURITY] [DLA 1566-1] mysql-5.5 security update MLIST:[debian-lts-announce] 20181122 [SECURITY] [DLA 1590-1] openjdk-7 security update MLIST:[debian-lts-announce] 20190201 [SECURITY] [DLA 1655-1] mariadb-10.0 security update MLIST:[debian-lts-announce] 20190324 [SECURITY] [DLA 1725-1] rsync security update MLIST:[debian-lts-announce] 20200129 [SECURITY] [DLA 2085-1] zlib security update MLIST:[flink-dev] 20190811 Apache flink 1.7.2 security issues MLIST:[flink-user] 20190811 Apache flink 1.7.2 security issues MLIST:[flink-user] 20190813 Apache flink 1.7.2 security issues MLIST:[flink-user] 20190813 Re: Apache flink 1.7.2 security issues MLIST:[oss-security] 20091120 CVE request: php 5.3.1 update MLIST:[oss-security] 20091120 Re: CVE request: php 5.3.1 update MLIST:[oss-security] 20140109 Re: CVE request: remote code execution via deserialization in XStream MLIST:[oss-security] 20140220 Re: Possible CVE Requests: several issues fixed in Jenkins (Advisory 2014-02-14) MLIST:[oss-security] 20140616 CVE request for commons-beanutils: 'class' property is exposed, potentially leading to RCE MLIST:[oss-security] 20140707 Re: CVE request for commons-beanutils: 'class' property is exposed, potentially leading to RCE MLIST:[oss-security] 20140925 LSE Leading Security Experts GmbH - LSE-2014-06-10 - Perl CORE - Deep Recursion Stack Overflow MLIST:[oss-security] 20141121 Re: CVE request: heap buffer overflow in PCRE MLIST:[oss-security] 20150804 Re: CVE Request: Information disclosure in pcre MLIST:[oss-security] 20150828 CVE-2015-0852 [FreeImage] Integer overflow in PluginPCX.cpp MLIST:[oss-security] 20150911 CVE Request: 2 FreeType issues MLIST:[oss-security] 20150925 Re: CVE Request: 2 FreeType issues MLIST:[oss-security] 20151022 CVE Request: invalid curve attack on bouncycastle MLIST:[oss-security] 20151022 Re: CVE Request: invalid curve attack on bouncycastle MLIST:[oss-security] 20151128 Re: Heap Overflow in PCRE MLIST:[oss-security] 20160420 various vulnerabilities in Node.js packages MLIST:[oss-security] 20160423 Re: CVE request: PHP issues fixed in 7.0.5, 5.6.20 and 5.5.34 releases MLIST:[oss-security] 20160608 CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations MLIST:[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations MLIST:[oss-security] 20160609 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations MLIST:[oss-security] 20160705 CVE-2016-4979: HTTPD webserver - X509 Client certificate based authentication can be bypassed when HTTP/2 is used [vs] MLIST:[oss-security] 20161117 Re: jasper: multiple assertion failures MLIST:[oss-security] 20161205 Re: CVE Request: zlib security issues found during audit MLIST:[perl.perl5.porters] 20140918 fix for CVE-2014-4330 present in blead MLIST:[php-announce] 20091119 5.3.1 Release announcement MLIST:[tomcat-dev] 20190319 svn commit: r1855831 [24/30] - in /tomcat/site/trunk: ./ docs/ xdocs/ MLIST:[tomcat-dev] 20190319 svn commit: r1855831 [25/30] - in /tomcat/site/trunk: ./ docs/ xdocs/ MLIST:[tomcat-dev] 20190325 svn commit: r1856174 [22/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/ MLIST:[tomcat-dev] 20190325 svn commit: r1856174 [23/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/ MLIST:[tomcat-dev] 20190325 svn commit: r1856174 [24/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/ MLIST:[tomcat-dev] 20190413 svn commit: r1857494 [16/20] - in /tomcat/site/trunk: ./ docs/ xdocs/ MLIST:[tomcat-dev] 20190413 svn commit: r1857494 [17/20] - in /tomcat/site/trunk: ./ docs/ xdocs/ MLIST:[tomcat-dev] 20190413 svn commit: r1857496 [3/4] - in /tomcat/site/trunk: ./ docs/ xdocs/ MLIST:[tomcat-dev] 20190415 svn commit: r1857582 [17/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/ MLIST:[tomcat-dev] 20190415 svn commit: r1857582 [18/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/ MLIST:[tomcat-dev] 20190415 svn commit: r1857582 [19/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/ MLIST:[xstream-user] 20130717 Re: Is it possible to unregister the DynamicProxyConverter using the SpringOXM wrapper MLIST:[xstream-user] 20130718 Re: Is it possible to unregister the DynamicProxyConverter using the SpringOXM wrapper OSS:2015/Q4/414 OSS:2015/Q4/419 OSS:2015/Q4/422 OSS:2016/Q1/258 OSS:2016/Q1/625 OSS:2016/Q1/626 OSS:2016/Q2/122 OSS:2016/Q2/493 OSS:2016/Q3/137 OSS:2016/Q4/602 OSS:2017/Q2/418 OSS:2017/Q4/297 OSS:2017/Q4/298 OSS:2017/Q4/299 OSS:2017/Q4/300 OSS:2017/Q4/301 OSS:2017/Q4/59 OSS:2017/Q4/60 OSS:2018/Q1/174 OSS:2018/Q1/235 OSS:2018/Q2/21 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/11/10/2 OSS:2022/Q3/99 OSS:2022/Q4/132 OSS:2022/Q4/135 OSS:2024/03/27/4 OSS:2024/Q1/256 Oracle:CVE-2011-4461 Oracle:CVE-2013-1768 Oracle:CVE-2014-0114 Oracle:CVE-2014-3490 Oracle:CVE-2014-3577 Oracle:CVE-2015-0204 Oracle:CVE-2015-0235 Oracle:CVE-2015-0405 Oracle:CVE-2015-0423 Oracle:CVE-2015-0433 Oracle:CVE-2015-0438 Oracle:CVE-2015-0439 Oracle:CVE-2015-0441 Oracle:CVE-2015-0498 Oracle:CVE-2015-0499 Oracle:CVE-2015-0500 Oracle:CVE-2015-0501 Oracle:CVE-2015-0503 Oracle:CVE-2015-0505 Oracle:CVE-2015-0506 Oracle:CVE-2015-0507 Oracle:CVE-2015-0508 Oracle:CVE-2015-0511 Oracle:CVE-2015-1832 Oracle:CVE-2015-2566 Oracle:CVE-2015-2567 Oracle:CVE-2015-2568 Oracle:CVE-2015-2571 Oracle:CVE-2015-2573 Oracle:CVE-2015-2575 Oracle:CVE-2015-2576 Oracle:CVE-2015-5600 Oracle:CVE-2015-6937 Oracle:CVE-2015-7501 Oracle:CVE-2015-7940 Oracle:CVE-2015-8965 Oracle:CVE-2015-9251 Oracle:CVE-2016-0635 Oracle:CVE-2016-0714 Oracle:CVE-2016-0729 Oracle:CVE-2016-1000031 Oracle:CVE-2016-1181 Oracle:CVE-2016-1182 Oracle:CVE-2016-1950 Oracle:CVE-2016-2099 Oracle:CVE-2016-2107 Oracle:CVE-2016-2176 Oracle:CVE-2016-2179 Oracle:CVE-2016-2183 Oracle:CVE-2016-3092 Oracle:CVE-2016-3506 Oracle:CVE-2016-4000 Oracle:CVE-2016-4055 Oracle:CVE-2016-4979 Oracle:CVE-2016-5007 Oracle:CVE-2016-5019 Oracle:CVE-2016-5080 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 Oracle:CVE-2016-5501 Oracle:CVE-2016-5538 Oracle:CVE-2016-5605 Oracle:CVE-2016-5608 Oracle:CVE-2016-5610 Oracle:CVE-2016-5611 Oracle:CVE-2016-5616 Oracle:CVE-2016-5617 Oracle:CVE-2016-5684 Oracle:CVE-2016-6304 Oracle:CVE-2016-6814 Oracle:CVE-2016-7103 Oracle:CVE-2016-7167 Oracle:CVE-2016-9583 Oracle:CVE-2016-9841 Oracle:CVE-2016-9843 Oracle:CVE-2016-9878 Oracle:CVE-2017-0379 Oracle:CVE-2017-10068 Oracle:CVE-2017-12617 Oracle:CVE-2017-13077 Oracle:CVE-2017-13745 Oracle:CVE-2017-14229 Oracle:CVE-2017-14735 Oracle:CVE-2017-15095 Oracle:CVE-2017-17562 Oracle:CVE-2017-3454 Oracle:CVE-2017-3468 Oracle:CVE-2017-3633 Oracle:CVE-2017-3732 Oracle:CVE-2017-3736 Oracle:CVE-2017-3737 Oracle:CVE-2017-5533 Oracle:CVE-2017-5645 Oracle:CVE-2017-5662 Oracle:CVE-2017-5664 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2017-6074 Oracle:CVE-2017-7525 Oracle:CVE-2017-7805 Oracle:CVE-2017-9798 Oracle:CVE-2018-0732 Oracle:CVE-2018-0734 Oracle:CVE-2018-0739 Oracle:CVE-2018-1000120 Oracle:CVE-2018-1000300 Oracle:CVE-2018-10933 Oracle:CVE-2018-11039 Oracle:CVE-2018-1171 Oracle:CVE-2018-11776 Oracle:CVE-2018-1258 Oracle:CVE-2018-1275 Oracle:CVE-2018-1305 Oracle:CVE-2018-13785 Oracle:CVE-2018-1656 Oracle:CVE-2018-2562 Oracle:CVE-2018-2563 Oracle:CVE-2018-2572 Oracle:CVE-2018-2587 Oracle:CVE-2018-2598 Oracle:CVE-2018-2612 Oracle:CVE-2018-2622 Oracle:CVE-2018-2628 Oracle:CVE-2018-2640 Oracle:CVE-2018-2665 Oracle:CVE-2018-2668 Oracle:CVE-2018-2676 Oracle:CVE-2018-2685 Oracle:CVE-2018-2686 Oracle:CVE-2018-2687 Oracle:CVE-2018-2688 Oracle:CVE-2018-2689 Oracle:CVE-2018-2690 Oracle:CVE-2018-2693 Oracle:CVE-2018-2694 Oracle:CVE-2018-2698 Oracle:CVE-2018-2718 Oracle:CVE-2018-2737 Oracle:CVE-2018-2738 Oracle:CVE-2018-2739 Oracle:CVE-2018-2742 Oracle:CVE-2018-2746 Oracle:CVE-2018-2747 Oracle:CVE-2018-2748 Oracle:CVE-2018-2749 Oracle:CVE-2018-2750 Oracle:CVE-2018-2752 Oracle:CVE-2018-2753 Oracle:CVE-2018-2754 Oracle:CVE-2018-2755 Oracle:CVE-2018-2756 Oracle:CVE-2018-2758 Oracle:CVE-2018-2759 Oracle:CVE-2018-2760 Oracle:CVE-2018-2761 Oracle:CVE-2018-2762 Oracle:CVE-2018-2763 Oracle:CVE-2018-2764 Oracle:CVE-2018-2765 Oracle:CVE-2018-2766 Oracle:CVE-2018-2767 Oracle:CVE-2018-2768 Oracle:CVE-2018-2769 Oracle:CVE-2018-2770 Oracle:CVE-2018-2771 Oracle:CVE-2018-2772 Oracle:CVE-2018-2773 Oracle:CVE-2018-2774 Oracle:CVE-2018-2775 Oracle:CVE-2018-2776 Oracle:CVE-2018-2777 Oracle:CVE-2018-2778 Oracle:CVE-2018-2779 Oracle:CVE-2018-2780 Oracle:CVE-2018-2781 Oracle:CVE-2018-2782 Oracle:CVE-2018-2783 Oracle:CVE-2018-2784 Oracle:CVE-2018-2785 Oracle:CVE-2018-2786 Oracle:CVE-2018-2787 Oracle:CVE-2018-2788 Oracle:CVE-2018-2789 Oracle:CVE-2018-2790 Oracle:CVE-2018-2791 Oracle:CVE-2018-2792 Oracle:CVE-2018-2793 Oracle:CVE-2018-2794 Oracle:CVE-2018-2795 Oracle:CVE-2018-2796 Oracle:CVE-2018-2797 Oracle:CVE-2018-2798 Oracle:CVE-2018-2799 Oracle:CVE-2018-2800 Oracle:CVE-2018-2801 Oracle:CVE-2018-2804 Oracle:CVE-2018-2805 Oracle:CVE-2018-2806 Oracle:CVE-2018-2807 Oracle:CVE-2018-2808 Oracle:CVE-2018-2809 Oracle:CVE-2018-2810 Oracle:CVE-2018-2811 Oracle:CVE-2018-2812 Oracle:CVE-2018-2813 Oracle:CVE-2018-2814 Oracle:CVE-2018-2815 Oracle:CVE-2018-2816 Oracle:CVE-2018-2817 Oracle:CVE-2018-2818 Oracle:CVE-2018-2819 Oracle:CVE-2018-2820 Oracle:CVE-2018-2821 Oracle:CVE-2018-2822 Oracle:CVE-2018-2823 Oracle:CVE-2018-2825 Oracle:CVE-2018-2826 Oracle:CVE-2018-2827 Oracle:CVE-2018-2828 Oracle:CVE-2018-2830 Oracle:CVE-2018-2831 Oracle:CVE-2018-2832 Oracle:CVE-2018-2834 Oracle:CVE-2018-2835 Oracle:CVE-2018-2836 Oracle:CVE-2018-2837 Oracle:CVE-2018-2838 Oracle:CVE-2018-2839 Oracle:CVE-2018-2840 Oracle:CVE-2018-2841 Oracle:CVE-2018-2842 Oracle:CVE-2018-2843 Oracle:CVE-2018-2844 Oracle:CVE-2018-2845 Oracle:CVE-2018-2846 Oracle:CVE-2018-2849 Oracle:CVE-2018-2850 Oracle:CVE-2018-2852 Oracle:CVE-2018-2854 Oracle:CVE-2018-2855 Oracle:CVE-2018-2856 Oracle:CVE-2018-2857 Oracle:CVE-2018-2858 Oracle:CVE-2018-2859 Oracle:CVE-2018-2860 Oracle:CVE-2018-2861 Oracle:CVE-2018-2862 Oracle:CVE-2018-2863 Oracle:CVE-2018-2864 Oracle:CVE-2018-2865 Oracle:CVE-2018-2866 Oracle:CVE-2018-2867 Oracle:CVE-2018-2868 Oracle:CVE-2018-2869 Oracle:CVE-2018-2870 Oracle:CVE-2018-2871 Oracle:CVE-2018-2872 Oracle:CVE-2018-2873 Oracle:CVE-2018-2874 Oracle:CVE-2018-2876 Oracle:CVE-2018-2877 Oracle:CVE-2018-2878 Oracle:CVE-2018-2879 Oracle:CVE-2018-2881 Oracle:CVE-2018-2882 Oracle:CVE-2018-2887 Oracle:CVE-2018-2888 Oracle:CVE-2018-2889 Oracle:CVE-2018-2891 Oracle:CVE-2018-2892 Oracle:CVE-2018-2893 Oracle:CVE-2018-2894 Oracle:CVE-2018-2895 Oracle:CVE-2018-2896 Oracle:CVE-2018-2897 Oracle:CVE-2018-2898 Oracle:CVE-2018-2899 Oracle:CVE-2018-2900 Oracle:CVE-2018-2901 Oracle:CVE-2018-2902 Oracle:CVE-2018-2903 Oracle:CVE-2018-2904 Oracle:CVE-2018-2905 Oracle:CVE-2018-2906 Oracle:CVE-2018-2907 Oracle:CVE-2018-2908 Oracle:CVE-2018-2909 Oracle:CVE-2018-2911 Oracle:CVE-2018-2912 Oracle:CVE-2018-2913 Oracle:CVE-2018-2914 Oracle:CVE-2018-2915 Oracle:CVE-2018-2916 Oracle:CVE-2018-2917 Oracle:CVE-2018-2918 Oracle:CVE-2018-2919 Oracle:CVE-2018-2920 Oracle:CVE-2018-2921 Oracle:CVE-2018-2922 Oracle:CVE-2018-2923 Oracle:CVE-2018-2924 Oracle:CVE-2018-2925 Oracle:CVE-2018-2926 Oracle:CVE-2018-2927 Oracle:CVE-2018-2928 Oracle:CVE-2018-2929 Oracle:CVE-2018-2930 Oracle:CVE-2018-2932 Oracle:CVE-2018-2933 Oracle:CVE-2018-2934 Oracle:CVE-2018-2935 Oracle:CVE-2018-2936 Oracle:CVE-2018-2937 Oracle:CVE-2018-2938 Oracle:CVE-2018-2939 Oracle:CVE-2018-2940 Oracle:CVE-2018-2941 Oracle:CVE-2018-2942 Oracle:CVE-2018-2943 Oracle:CVE-2018-2944 Oracle:CVE-2018-2945 Oracle:CVE-2018-2946 Oracle:CVE-2018-2947 Oracle:CVE-2018-2948 Oracle:CVE-2018-2949 Oracle:CVE-2018-2950 Oracle:CVE-2018-2951 Oracle:CVE-2018-2952 Oracle:CVE-2018-2953 Oracle:CVE-2018-2954 Oracle:CVE-2018-2955 Oracle:CVE-2018-2956 Oracle:CVE-2018-2957 Oracle:CVE-2018-2958 Oracle:CVE-2018-2959 Oracle:CVE-2018-2960 Oracle:CVE-2018-2961 Oracle:CVE-2018-2962 Oracle:CVE-2018-2963 Oracle:CVE-2018-2964 Oracle:CVE-2018-2965 Oracle:CVE-2018-2966 Oracle:CVE-2018-2967 Oracle:CVE-2018-2968 Oracle:CVE-2018-2969 Oracle:CVE-2018-2970 Oracle:CVE-2018-2971 Oracle:CVE-2018-2972 Oracle:CVE-2018-2973 Oracle:CVE-2018-2974 Oracle:CVE-2018-2975 Oracle:CVE-2018-2976 Oracle:CVE-2018-2977 Oracle:CVE-2018-2979 Oracle:CVE-2018-2980 Oracle:CVE-2018-2981 Oracle:CVE-2018-2982 Oracle:CVE-2018-2984 Oracle:CVE-2018-2985 Oracle:CVE-2018-2986 Oracle:CVE-2018-2987 Oracle:CVE-2018-2988 Oracle:CVE-2018-2989 Oracle:CVE-2018-2990 Oracle:CVE-2018-2991 Oracle:CVE-2018-2992 Oracle:CVE-2018-2993 Oracle:CVE-2018-2994 Oracle:CVE-2018-2995 Oracle:CVE-2018-2996 Oracle:CVE-2018-2997 Oracle:CVE-2018-2998 Oracle:CVE-2018-2999 Oracle:CVE-2018-3000 Oracle:CVE-2018-3001 Oracle:CVE-2018-3002 Oracle:CVE-2018-3003 Oracle:CVE-2018-3004 Oracle:CVE-2018-3005 Oracle:CVE-2018-3006 Oracle:CVE-2018-3007 Oracle:CVE-2018-3008 Oracle:CVE-2018-3009 Oracle:CVE-2018-3010 Oracle:CVE-2018-3011 Oracle:CVE-2018-3012 Oracle:CVE-2018-3013 Oracle:CVE-2018-3014 Oracle:CVE-2018-3015 Oracle:CVE-2018-3016 Oracle:CVE-2018-3017 Oracle:CVE-2018-3018 Oracle:CVE-2018-3019 Oracle:CVE-2018-3020 Oracle:CVE-2018-3021 Oracle:CVE-2018-3022 Oracle:CVE-2018-3023 Oracle:CVE-2018-3024 Oracle:CVE-2018-3025 Oracle:CVE-2018-3026 Oracle:CVE-2018-3027 Oracle:CVE-2018-3028 Oracle:CVE-2018-3029 Oracle:CVE-2018-3030 Oracle:CVE-2018-3031 Oracle:CVE-2018-3032 Oracle:CVE-2018-3033 Oracle:CVE-2018-3034 Oracle:CVE-2018-3035 Oracle:CVE-2018-3036 Oracle:CVE-2018-3037 Oracle:CVE-2018-3038 Oracle:CVE-2018-3039 Oracle:CVE-2018-3040 Oracle:CVE-2018-3041 Oracle:CVE-2018-3042 Oracle:CVE-2018-3043 Oracle:CVE-2018-3044 Oracle:CVE-2018-3045 Oracle:CVE-2018-3046 Oracle:CVE-2018-3047 Oracle:CVE-2018-3048 Oracle:CVE-2018-3049 Oracle:CVE-2018-3050 Oracle:CVE-2018-3051 Oracle:CVE-2018-3052 Oracle:CVE-2018-3053 Oracle:CVE-2018-3054 Oracle:CVE-2018-3055 Oracle:CVE-2018-3056 Oracle:CVE-2018-3057 Oracle:CVE-2018-3058 Oracle:CVE-2018-3059 Oracle:CVE-2018-3060 Oracle:CVE-2018-3061 Oracle:CVE-2018-3062 Oracle:CVE-2018-3063 Oracle:CVE-2018-3064 Oracle:CVE-2018-3065 Oracle:CVE-2018-3066 Oracle:CVE-2018-3067 Oracle:CVE-2018-3068 Oracle:CVE-2018-3069 Oracle:CVE-2018-3070 Oracle:CVE-2018-3071 Oracle:CVE-2018-3072 Oracle:CVE-2018-3073 Oracle:CVE-2018-3074 Oracle:CVE-2018-3075 Oracle:CVE-2018-3076 Oracle:CVE-2018-3077 Oracle:CVE-2018-3078 Oracle:CVE-2018-3079 Oracle:CVE-2018-3080 Oracle:CVE-2018-3081 Oracle:CVE-2018-3082 Oracle:CVE-2018-3084 Oracle:CVE-2018-3085 Oracle:CVE-2018-3086 Oracle:CVE-2018-3087 Oracle:CVE-2018-3088 Oracle:CVE-2018-3089 Oracle:CVE-2018-3090 Oracle:CVE-2018-3091 Oracle:CVE-2018-3092 Oracle:CVE-2018-3093 Oracle:CVE-2018-3094 Oracle:CVE-2018-3095 Oracle:CVE-2018-3096 Oracle:CVE-2018-3097 Oracle:CVE-2018-3098 Oracle:CVE-2018-3099 Oracle:CVE-2018-3100 Oracle:CVE-2018-3101 Oracle:CVE-2018-3102 Oracle:CVE-2018-3103 Oracle:CVE-2018-3104 Oracle:CVE-2018-3105 Oracle:CVE-2018-3108 Oracle:CVE-2018-3109 Oracle:CVE-2018-3115 Oracle:CVE-2018-3122 Oracle:CVE-2018-3125 Oracle:CVE-2018-3126 Oracle:CVE-2018-3127 Oracle:CVE-2018-3128 Oracle:CVE-2018-3129 Oracle:CVE-2018-3130 Oracle:CVE-2018-3131 Oracle:CVE-2018-3132 Oracle:CVE-2018-3133 Oracle:CVE-2018-3134 Oracle:CVE-2018-3135 Oracle:CVE-2018-3136 Oracle:CVE-2018-3137 Oracle:CVE-2018-3138 Oracle:CVE-2018-3139 Oracle:CVE-2018-3140 Oracle:CVE-2018-3141 Oracle:CVE-2018-3142 Oracle:CVE-2018-3143 Oracle:CVE-2018-3144 Oracle:CVE-2018-3145 Oracle:CVE-2018-3146 Oracle:CVE-2018-3147 Oracle:CVE-2018-3148 Oracle:CVE-2018-3149 Oracle:CVE-2018-3150 Oracle:CVE-2018-3151 Oracle:CVE-2018-3152 Oracle:CVE-2018-3153 Oracle:CVE-2018-3154 Oracle:CVE-2018-3155 Oracle:CVE-2018-3156 Oracle:CVE-2018-3157 Oracle:CVE-2018-3158 Oracle:CVE-2018-3159 Oracle:CVE-2018-3160 Oracle:CVE-2018-3161 Oracle:CVE-2018-3162 Oracle:CVE-2018-3163 Oracle:CVE-2018-3164 Oracle:CVE-2018-3165 Oracle:CVE-2018-3166 Oracle:CVE-2018-3167 Oracle:CVE-2018-3168 Oracle:CVE-2018-3169 Oracle:CVE-2018-3170 Oracle:CVE-2018-3171 Oracle:CVE-2018-3172 Oracle:CVE-2018-3173 Oracle:CVE-2018-3174 Oracle:CVE-2018-3175 Oracle:CVE-2018-3176 Oracle:CVE-2018-3177 Oracle:CVE-2018-3178 Oracle:CVE-2018-3179 Oracle:CVE-2018-3180 Oracle:CVE-2018-3181 Oracle:CVE-2018-3182 Oracle:CVE-2018-3183 Oracle:CVE-2018-3184 Oracle:CVE-2018-3185 Oracle:CVE-2018-3186 Oracle:CVE-2018-3187 Oracle:CVE-2018-3188 Oracle:CVE-2018-3189 Oracle:CVE-2018-3190 Oracle:CVE-2018-3191 Oracle:CVE-2018-3192 Oracle:CVE-2018-3193 Oracle:CVE-2018-3194 Oracle:CVE-2018-3195 Oracle:CVE-2018-3196 Oracle:CVE-2018-3197 Oracle:CVE-2018-3198 Oracle:CVE-2018-3200 Oracle:CVE-2018-3201 Oracle:CVE-2018-3202 Oracle:CVE-2018-3203 Oracle:CVE-2018-3204 Oracle:CVE-2018-3205 Oracle:CVE-2018-3206 Oracle:CVE-2018-3207 Oracle:CVE-2018-3208 Oracle:CVE-2018-3209 Oracle:CVE-2018-3210 Oracle:CVE-2018-3211 Oracle:CVE-2018-3212 Oracle:CVE-2018-3213 Oracle:CVE-2018-3214 Oracle:CVE-2018-3215 Oracle:CVE-2018-3217 Oracle:CVE-2018-3218 Oracle:CVE-2018-3219 Oracle:CVE-2018-3220 Oracle:CVE-2018-3221 Oracle:CVE-2018-3222 Oracle:CVE-2018-3223 Oracle:CVE-2018-3224 Oracle:CVE-2018-3225 Oracle:CVE-2018-3226 Oracle:CVE-2018-3227 Oracle:CVE-2018-3228 Oracle:CVE-2018-3229 Oracle:CVE-2018-3230 Oracle:CVE-2018-3231 Oracle:CVE-2018-3232 Oracle:CVE-2018-3233 Oracle:CVE-2018-3234 Oracle:CVE-2018-3235 Oracle:CVE-2018-3236 Oracle:CVE-2018-3237 Oracle:CVE-2018-3238 Oracle:CVE-2018-3239 Oracle:CVE-2018-3241 Oracle:CVE-2018-3242 Oracle:CVE-2018-3243 Oracle:CVE-2018-3244 Oracle:CVE-2018-3245 Oracle:CVE-2018-3246 Oracle:CVE-2018-3247 Oracle:CVE-2018-3248 Oracle:CVE-2018-3249 Oracle:CVE-2018-3250 Oracle:CVE-2018-3251 Oracle:CVE-2018-3252 Oracle:CVE-2018-3253 Oracle:CVE-2018-3254 Oracle:CVE-2018-3255 Oracle:CVE-2018-3256 Oracle:CVE-2018-3257 Oracle:CVE-2018-3258 Oracle:CVE-2018-3259 Oracle:CVE-2018-3261 Oracle:CVE-2018-3262 Oracle:CVE-2018-3263 Oracle:CVE-2018-3264 Oracle:CVE-2018-3265 Oracle:CVE-2018-3266 Oracle:CVE-2018-3267 Oracle:CVE-2018-3268 Oracle:CVE-2018-3269 Oracle:CVE-2018-3270 Oracle:CVE-2018-3271 Oracle:CVE-2018-3272 Oracle:CVE-2018-3273 Oracle:CVE-2018-3274 Oracle:CVE-2018-3275 Oracle:CVE-2018-3276 Oracle:CVE-2018-3277 Oracle:CVE-2018-3278 Oracle:CVE-2018-3279 Oracle:CVE-2018-3280 Oracle:CVE-2018-3281 Oracle:CVE-2018-3282 Oracle:CVE-2018-3283 Oracle:CVE-2018-3284 Oracle:CVE-2018-3285 Oracle:CVE-2018-3286 Oracle:CVE-2018-3287 Oracle:CVE-2018-3288 Oracle:CVE-2018-3289 Oracle:CVE-2018-3290 Oracle:CVE-2018-3291 Oracle:CVE-2018-3292 Oracle:CVE-2018-3293 Oracle:CVE-2018-3294 Oracle:CVE-2018-3295 Oracle:CVE-2018-3296 Oracle:CVE-2018-3297 Oracle:CVE-2018-3298 Oracle:CVE-2018-3299 Oracle:CVE-2018-3301 Oracle:CVE-2018-3302 Oracle:CVE-2018-3303 Oracle:CVE-2018-3304 Oracle:CVE-2018-3305 Oracle:CVE-2018-3309 Oracle:CVE-2018-3311 Oracle:CVE-2018-3639 Oracle:CVE-2018-7489 Oracle:CVE-2018-8013 Oracle:CVE-2018-8014 Oracle:CVE-2018-8037 Oracle:CVE-2019-10173 Oracle:CVE-2019-2395 Oracle:CVE-2019-2396 Oracle:CVE-2019-2397 Oracle:CVE-2019-2398 Oracle:CVE-2019-2399 Oracle:CVE-2019-2400 Oracle:CVE-2019-2401 Oracle:CVE-2019-2402 Oracle:CVE-2019-2403 Oracle:CVE-2019-2404 Oracle:CVE-2019-2405 Oracle:CVE-2019-2406 Oracle:CVE-2019-2407 Oracle:CVE-2019-2408 Oracle:CVE-2019-2409 Oracle:CVE-2019-2410 Oracle:CVE-2019-2411 Oracle:CVE-2019-2412 Oracle:CVE-2019-2413 Oracle:CVE-2019-2414 Oracle:CVE-2019-2415 Oracle:CVE-2019-2416 Oracle:CVE-2019-2417 Oracle:CVE-2019-2418 Oracle:CVE-2019-2419 Oracle:CVE-2019-2420 Oracle:CVE-2019-2421 Oracle:CVE-2019-2422 Oracle:CVE-2019-2423 Oracle:CVE-2019-2425 Oracle:CVE-2019-2426 Oracle:CVE-2019-2427 Oracle:CVE-2019-2429 Oracle:CVE-2019-2430 Oracle:CVE-2019-2431 Oracle:CVE-2019-2432 Oracle:CVE-2019-2433 Oracle:CVE-2019-2434 Oracle:CVE-2019-2435 Oracle:CVE-2019-2436 Oracle:CVE-2019-2437 Oracle:CVE-2019-2438 Oracle:CVE-2019-2439 Oracle:CVE-2019-2440 Oracle:CVE-2019-2441 Oracle:CVE-2019-2442 Oracle:CVE-2019-2443 Oracle:CVE-2019-2444 Oracle:CVE-2019-2445 Oracle:CVE-2019-2446 Oracle:CVE-2019-2447 Oracle:CVE-2019-2448 Oracle:CVE-2019-2449 Oracle:CVE-2019-2450 Oracle:CVE-2019-2451 Oracle:CVE-2019-2452 Oracle:CVE-2019-2453 Oracle:CVE-2019-2455 Oracle:CVE-2019-2456 Oracle:CVE-2019-2457 Oracle:CVE-2019-2458 Oracle:CVE-2019-2459 Oracle:CVE-2019-2460 Oracle:CVE-2019-2461 Oracle:CVE-2019-2462 Oracle:CVE-2019-2463 Oracle:CVE-2019-2464 Oracle:CVE-2019-2465 Oracle:CVE-2019-2466 Oracle:CVE-2019-2467 Oracle:CVE-2019-2468 Oracle:CVE-2019-2469 Oracle:CVE-2019-2470 Oracle:CVE-2019-2471 Oracle:CVE-2019-2472 Oracle:CVE-2019-2473 Oracle:CVE-2019-2474 Oracle:CVE-2019-2475 Oracle:CVE-2019-2476 Oracle:CVE-2019-2477 Oracle:CVE-2019-2478 Oracle:CVE-2019-2479 Oracle:CVE-2019-2480 Oracle:CVE-2019-2481 Oracle:CVE-2019-2482 Oracle:CVE-2019-2485 Oracle:CVE-2019-2486 Oracle:CVE-2019-2487 Oracle:CVE-2019-2488 Oracle:CVE-2019-2489 Oracle:CVE-2019-2490 Oracle:CVE-2019-2491 Oracle:CVE-2019-2492 Oracle:CVE-2019-2493 Oracle:CVE-2019-2494 Oracle:CVE-2019-2495 Oracle:CVE-2019-2496 Oracle:CVE-2019-2497 Oracle:CVE-2019-2498 Oracle:CVE-2019-2499 Oracle:CVE-2019-2500 Oracle:CVE-2019-2501 Oracle:CVE-2019-2502 Oracle:CVE-2019-2503 Oracle:CVE-2019-2504 Oracle:CVE-2019-2505 Oracle:CVE-2019-2506 Oracle:CVE-2019-2507 Oracle:CVE-2019-2508 Oracle:CVE-2019-2509 Oracle:CVE-2019-2510 Oracle:CVE-2019-2511 Oracle:CVE-2019-2512 Oracle:CVE-2019-2513 Oracle:CVE-2019-2519 Oracle:CVE-2019-2520 Oracle:CVE-2019-2521 Oracle:CVE-2019-2522 Oracle:CVE-2019-2523 Oracle:CVE-2019-2524 Oracle:CVE-2019-2525 Oracle:CVE-2019-2526 Oracle:CVE-2019-2527 Oracle:CVE-2019-2528 Oracle:CVE-2019-2529 Oracle:CVE-2019-2530 Oracle:CVE-2019-2531 Oracle:CVE-2019-2532 Oracle:CVE-2019-2533 Oracle:CVE-2019-2534 Oracle:CVE-2019-2535 Oracle:CVE-2019-2536 Oracle:CVE-2019-2537 Oracle:CVE-2019-2538 Oracle:CVE-2019-2539 Oracle:CVE-2019-2540 Oracle:CVE-2019-2541 Oracle:CVE-2019-2543 Oracle:CVE-2019-2544 Oracle:CVE-2019-2545 Oracle:CVE-2019-2546 Oracle:CVE-2019-2547 Oracle:CVE-2019-2548 Oracle:CVE-2019-2549 Oracle:CVE-2019-2550 Oracle:CVE-2019-2552 Oracle:CVE-2019-2553 Oracle:CVE-2019-2554 Oracle:CVE-2019-2555 Oracle:CVE-2019-2556 RH:CVE-2009-3559 RH:CVE-2012-6153 RH:CVE-2013-7285 RH:CVE-2014-3540 RH:CVE-2014-4330 RH:CVE-2014-4651 RH:CVE-2014-8964 RH:CVE-2014-9746 RH:CVE-2014-9747 RH:CVE-2015-0405 RH:CVE-2015-0423 RH:CVE-2015-0433 RH:CVE-2015-0438 RH:CVE-2015-0439 RH:CVE-2015-0441 RH:CVE-2015-0498 RH:CVE-2015-0499 RH:CVE-2015-0500 RH:CVE-2015-0501 RH:CVE-2015-0503 RH:CVE-2015-0505 RH:CVE-2015-0506 RH:CVE-2015-0507 RH:CVE-2015-0508 RH:CVE-2015-0511 RH:CVE-2015-2325 RH:CVE-2015-2326 RH:CVE-2015-2327 RH:CVE-2015-2328 RH:CVE-2015-2566 RH:CVE-2015-2567 RH:CVE-2015-2568 RH:CVE-2015-2571 RH:CVE-2015-2573 RH:CVE-2015-2575 RH:CVE-2015-2576 RH:CVE-2015-5125 RH:CVE-2015-5127 RH:CVE-2015-5129 RH:CVE-2015-5130 RH:CVE-2015-5131 RH:CVE-2015-5132 RH:CVE-2015-5134 RH:CVE-2015-5539 RH:CVE-2015-5540 RH:CVE-2015-5541 RH:CVE-2015-5544 RH:CVE-2015-5545 RH:CVE-2015-5551 RH:CVE-2015-5552 RH:CVE-2015-5553 RH:CVE-2015-5554 RH:CVE-2015-5555 RH:CVE-2015-5556 RH:CVE-2015-5557 RH:CVE-2015-5558 RH:CVE-2015-5559 RH:CVE-2015-5560 RH:CVE-2015-5561 RH:CVE-2015-5564 RH:CVE-2015-5565 RH:CVE-2015-5566 RH:CVE-2015-7559 RH:CVE-2015-8315 RH:CVE-2015-8381 RH:CVE-2015-8382 RH:CVE-2015-8383 RH:CVE-2015-8384 RH:CVE-2015-8385 RH:CVE-2015-8386 RH:CVE-2015-8387 RH:CVE-2015-8388 RH:CVE-2015-8389 RH:CVE-2015-8390 RH:CVE-2015-8391 RH:CVE-2015-8392 RH:CVE-2015-8393 RH:CVE-2015-8394 RH:CVE-2015-8395 RH:CVE-2015-8855 RH:CVE-2015-8860 RH:CVE-2016-0755 RH:CVE-2016-1672 RH:CVE-2016-1673 RH:CVE-2016-1674 RH:CVE-2016-1675 RH:CVE-2016-1676 RH:CVE-2016-1677 RH:CVE-2016-1678 RH:CVE-2016-1679 RH:CVE-2016-1680 RH:CVE-2016-1681 RH:CVE-2016-1682 RH:CVE-2016-1683 RH:CVE-2016-1684 RH:CVE-2016-1685 RH:CVE-2016-1686 RH:CVE-2016-1687 RH:CVE-2016-1688 RH:CVE-2016-1689 RH:CVE-2016-1690 RH:CVE-2016-1691 RH:CVE-2016-1692 RH:CVE-2016-1693 RH:CVE-2016-1694 RH:CVE-2016-1695 RH:CVE-2016-1950 RH:CVE-2016-1955 RH:CVE-2016-1956 RH:CVE-2016-1959 RH:CVE-2016-1967 RH:CVE-2016-1968 RH:CVE-2016-1969 RH:CVE-2016-1970 RH:CVE-2016-1971 RH:CVE-2016-1972 RH:CVE-2016-1973 RH:CVE-2016-1975 RH:CVE-2016-1976 RH:CVE-2016-3141 RH:CVE-2016-4055 RH:CVE-2016-4070 RH:CVE-2016-4979 RH:CVE-2016-5616 RH:CVE-2016-5617 RH:CVE-2016-6293 RH:CVE-2016-6294 RH:CVE-2016-9840 RH:CVE-2016-9841 RH:CVE-2016-9842 RH:CVE-2016-9843 RH:CVE-2017-16012 RH:CVE-2017-3454 RH:CVE-2017-3468 RH:CVE-2017-9526 RH:CVE-2018-1000121 RH:CVE-2018-12539 RH:CVE-2018-1305 RH:CVE-2018-1517 RH:CVE-2018-1656 RH:CVE-2018-2767 RH:CVE-2018-2938 RH:CVE-2018-2940 RH:CVE-2018-2952 RH:CVE-2018-2964 RH:CVE-2018-2973 RH:CVE-2019-2455 RH:CVE-2019-2481 RH:CVE-2019-2482 RH:CVE-2019-2503 RH:CVE-2019-2507 RH:CVE-2019-2510 RH:CVE-2019-2513 RH:CVE-2019-2528 RH:CVE-2019-2529 RH:CVE-2019-2530 RH:CVE-2019-2531 RH:CVE-2019-2532 RH:CVE-2019-2533 RH:CVE-2019-2534 RH:CVE-2019-2535 RH:CVE-2019-2536 RH:CVE-2019-2537 RH:CVE-2019-2539 RHBA-2015:1659 RHBA-2015:1762 RHBA-2015:1763 RHBA-2015:2142 RHBA-2019:0327 RHSA-2014:0216 RHSA-2014:0294 RHSA-2014:0323 RHSA-2014:0371 RHSA-2014:0372 RHSA-2014:0374 RHSA-2014:0389 RHSA-2014:0452 RHSA-2014:0474 RHSA-2014:0497 RHSA-2014:0498 RHSA-2014:0500 RHSA-2014:0511 RHSA-2014:0702 RHSA-2014:1007 RHSA-2014:1059 RHSA-2014:1082 RHSA-2014:1098 RHSA-2014:1146 RHSA-2014:1162 RHSA-2014:1163 RHSA-2014:1166 RHSA-2014:1320 RHSA-2014:1321 RHSA-2014:1322 RHSA-2014:1323 RHSA-2014:1833 RHSA-2014:1834 RHSA-2014:1835 RHSA-2014:1836 RHSA-2014:1891 RHSA-2014:1892 RHSA-2014:1904 RHSA-2014:2019 RHSA-2014:2020 RHSA-2015:0125 RHSA-2015:0158 RHSA-2015:0234 RHSA-2015:0235 RHSA-2015:0330 RHSA-2015:0675 RHSA-2015:0720 RHSA-2015:0765 RHSA-2015:0850 RHSA-2015:0851 RHSA-2015:1009 RHSA-2015:1176 RHSA-2015:1177 RHSA-2015:1603 RHSA-2015:1628 RHSA-2015:1629 RHSA-2015:1646 RHSA-2015:1647 RHSA-2015:1665 RHSA-2015:1888 RHSA-2016:0197 RHSA-2016:0370 RHSA-2016:0371 RHSA-2016:0373 RHSA-2016:0495 RHSA-2016:1025 RHSA-2016:1132 RHSA-2016:1190 RHSA-2016:1420 RHSA-2016:1773 RHSA-2016:1931 RHSA-2016:1940 RHSA-2016:2035 RHSA-2016:2036 RHSA-2016:2130 RHSA-2016:2131 RHSA-2016:2595 RHSA-2016:2749 RHSA-2016:2750 RHSA-2016:2927 RHSA-2016:2928 RHSA-2016:2957 RHSA-2017:0184 RHSA-2017:0193 RHSA-2017:0194 RHSA-2017:0272 RHSA-2017:0868 RHSA-2017:1208 RHSA-2017:1220 RHSA-2017:1221 RHSA-2017:1222 RHSA-2017:1658 RHSA-2017:1659 RHSA-2017:2192 RHSA-2017:2486 RHSA-2017:2596 RHSA-2017:2787 RHSA-2017:2886 RHSA-2017:2999 RHSA-2017:3046 RHSA-2017:3047 RHSA-2017:3189 RHSA-2017:3190 RHSA-2017:3453 RHSA-2018:0279 RHSA-2018:0342 RHSA-2018:0465 RHSA-2018:0466 RHSA-2018:0478 RHSA-2018:0479 RHSA-2018:0480 RHSA-2018:0481 RHSA-2018:0501 RHSA-2018:0574 RHSA-2018:0576 RHSA-2018:0577 RHSA-2018:1320 RHSA-2018:1447 RHSA-2018:1448 RHSA-2018:1449 RHSA-2018:1450 RHSA-2018:1451 RHSA-2018:2241 RHSA-2018:2242 RHSA-2018:2253 RHSA-2018:2254 RHSA-2018:2255 RHSA-2018:2256 RHSA-2018:2283 RHSA-2018:2286 RHSA-2018:2439 RHSA-2018:2568 RHSA-2018:2569 RHSA-2018:2575 RHSA-2018:2576 RHSA-2018:2669 RHSA-2018:2712 RHSA-2018:2713 RHSA-2018:2729 RHSA-2018:2927 RHSA-2018:2939 RHSA-2018:3007 RHSA-2018:3008 RHSA-2018:3157 RHSA-2018:3558 RHSA-2019:1258 RHSA-2019:1543 RHSA-2019:1822 RHSA-2019:1823 RHSA-2019:2205 RHSA-2019:2327 RHSA-2019:2413 RHSA-2019:2484 RHSA-2019:2511 RHSA-2019:2995 RHSA-2019:3708 RHSA-2019:3892 RHSA-2019:4352 RHSA-2020:0445 RHSA-2020:0544 RHSA-2020:0594 RHSA-2020:0727 RHSA-2020:0983 RHSA-2020:5663 SECTRACK ID: 1041302 SECTRACK:1032121 SECTRACK:1034077 SECTRACK:1034882 SECTRACK:1035215 SECTRACK:1035255 SECTRACK:1035981 SECTRACK:1036054 SECTRACK:1036056 SECTRACK:1036225 SECTRACK:1036377 SECTRACK:1036378 SECTRACK:1036393 SECTRACK:1036397 SECTRACK:1037036 SECTRACK:1037046 SECTRACK:1037053 SECTRACK:1037640 SECTRACK:1039427 SECTRACK:1039596 SECTRACK:1039600 SECTRACK:1040428 SECTRACK:1040529 SECTRACK:1041294 SECTRACK:1041296 SECTRACK:1041302 SECTRACK:1041765 SECTRACK:1041887 SECTRACK:1041888 SECTRACK:1041896 SECUNIA:57477 SECUNIA:58710 SECUNIA:58851 SECUNIA:58947 SECUNIA:59014 SECUNIA:59118 SECUNIA:59228 SECUNIA:59245 SECUNIA:59246 SECUNIA:59430 SECUNIA:59464 SECUNIA:59479 SECUNIA:59480 SECUNIA:59704 SECUNIA:59718 SECUNIA:60177 SECUNIA:60703 SECUNIA:61441 SECUNIA:61961 SLACKWARE:SSA:2016-039-01 SMASH Issue 106174 SMASH Issue 106399 SMASH Issue 110951 SMASH Issue 115321 SMASH Issue 115322 SMASH Issue 115944 SMASH Issue 115951 SMASH Issue 116060 SMASH Issue 121091 SMASH Issue 122403 SMASH Issue 157079 SMASH Issue 157080 SMASH Issue 159315 SMASH Issue 159316 SMASH Issue 159358 SMASH Issue 159359 SMASH Issue 159360 SMASH Issue 159361 SMASH Issue 159362 SMASH Issue 159363 SMASH Issue 159364 SMASH Issue 159365 SMASH Issue 159366 SMASH Issue 159367 SMASH Issue 159368 SMASH Issue 159369 SMASH Issue 159370 SMASH Issue 159501 SMASH Issue 161165 SMASH Issue 161277 SMASH Issue 162768 SMASH Issue 162800 SMASH Issue 162870 SMASH Issue 163266 SMASH Issue 163267 SMASH Issue 168106 SMASH Issue 168107 SMASH Issue 168108 SMASH Issue 168109 SMASH Issue 168110 SMASH Issue 168111 SMASH Issue 168112 SMASH Issue 168113 SMASH Issue 168114 SMASH Issue 168115 SMASH Issue 168116 SMASH Issue 168117 SMASH Issue 168118 SMASH Issue 168119 SMASH Issue 168120 SMASH Issue 169465 SMASH Issue 169466 SMASH Issue 169472 SMASH Issue 169820 SMASH Issue 169849 SMASH Issue 170598 SMASH Issue 173284 SMASH Issue 173285 SMASH Issue 173743 SMASH Issue 173744 SMASH Issue 173746 SMASH Issue 173747 SMASH Issue 173748 SMASH Issue 173749 SMASH Issue 177157 SMASH Issue 177158 SMASH Issue 177160 SMASH Issue 177997 SMASH Issue 180273 SMASH Issue 183803 SMASH Issue 183804 SMASH Issue 183903 SMASH Issue 186176 SMASH Issue 186594 SMASH Issue 195320 SMASH Issue 200729 SMASH Issue 201476 SMASH Issue 201809 SMASH Issue 203304 SMASH Issue 205710 SMASH Issue 210804 SMASH Issue 210805 SMASH Issue 210807 SMASH Issue 210809 SMASH Issue 210810 SMASH Issue 210923 SMASH Issue 210972 SMASH Issue 211000 SMASH Issue 211001 SMASH Issue 211002 SMASH Issue 211003 SMASH Issue 211004 SMASH Issue 211005 SMASH Issue 211006 SMASH Issue 211038 SMASH Issue 211039 SMASH Issue 211040 SMASH Issue 211041 SMASH Issue 211042 SMASH Issue 211051 SMASH Issue 212718 SMASH Issue 212765 SMASH Issue 212925 SMASH Issue 216708 SMASH Issue 216720 SMASH Issue 216727 SMASH Issue 216869 SMASH Issue 216870 SMASH Issue 216871 SMASH Issue 216872 SMASH Issue 216873 SMASH Issue 216874 SMASH Issue 216875 SMASH Issue 216876 SMASH Issue 216877 SMASH Issue 216878 SMASH Issue 216879 SMASH Issue 216880 SMASH Issue 222884 SMASH Issue 222951 SMASH Issue 77111 SUSE:SUSE-SU-2015:0946 SUSE:SUSE-SU-2016:0727 SUSE:SUSE-SU-2016:0777 SUSE:SUSE-SU-2016:0820 SUSE:SUSE-SU-2016:0909 SUSE:SUSE-SU-2016:1277 SUSE:SUSE-SU-2016:2387 SUSE:SUSE-SU-2016:2394 SUSE:SUSE-SU-2016:2458 SUSE:SUSE-SU-2016:2468 SUSE:SUSE-SU-2016:2469 SUSE:SUSE-SU-2016:2470 SUSE:SUSE-SU-2017:2699 SUSE:SUSE-SU-2017:2700 SUSE:openSUSE-SU-2015:0858 SUSE:openSUSE-SU-2015:0967 SUSE:openSUSE-SU-2015:1911 SUSE:openSUSE-SU-2016:0360 SUSE:openSUSE-SU-2016:0373 SUSE:openSUSE-SU-2016:0376 SUSE:openSUSE-SU-2016:0731 SUSE:openSUSE-SU-2016:0733 SUSE:openSUSE-SU-2016:1274 SUSE:openSUSE-SU-2016:1373 SUSE:openSUSE-SU-2016:1430 SUSE:openSUSE-SU-2016:1433 SUSE:openSUSE-SU-2016:1496 SUSE:openSUSE-SU-2016:1557 SUSE:openSUSE-SU-2016:2391 SUSE:openSUSE-SU-2016:2407 SUSE:openSUSE-SU-2016:2496 SUSE:openSUSE-SU-2016:2537 SUSE:openSUSE-SU-2016:3202 SUSE:openSUSE-SU-2017:0077 SUSE:openSUSE-SU-2017:0080 SUSE:openSUSE-SU-2018:0458 UBUNTU:CVE-2009-3559 UBUNTU:CVE-2012-6153 UBUNTU:CVE-2013-7285 UBUNTU:CVE-2013-7451 UBUNTU:CVE-2013-7452 UBUNTU:CVE-2013-7453 UBUNTU:CVE-2013-7454 UBUNTU:CVE-2014-4330 UBUNTU:CVE-2014-8964 UBUNTU:CVE-2014-9746 UBUNTU:CVE-2014-9747 UBUNTU:CVE-2014-9772 UBUNTU:CVE-2015-0405 UBUNTU:CVE-2015-0423 UBUNTU:CVE-2015-0433 UBUNTU:CVE-2015-0438 UBUNTU:CVE-2015-0439 UBUNTU:CVE-2015-0441 UBUNTU:CVE-2015-0498 UBUNTU:CVE-2015-0499 UBUNTU:CVE-2015-0500 UBUNTU:CVE-2015-0501 UBUNTU:CVE-2015-0503 UBUNTU:CVE-2015-0505 UBUNTU:CVE-2015-0506 UBUNTU:CVE-2015-0507 UBUNTU:CVE-2015-0508 UBUNTU:CVE-2015-0511 UBUNTU:CVE-2015-2325 UBUNTU:CVE-2015-2326 UBUNTU:CVE-2015-2327 UBUNTU:CVE-2015-2328 UBUNTU:CVE-2015-2566 UBUNTU:CVE-2015-2567 UBUNTU:CVE-2015-2568 UBUNTU:CVE-2015-2571 UBUNTU:CVE-2015-2573 UBUNTU:CVE-2015-2575 UBUNTU:CVE-2015-5125 UBUNTU:CVE-2015-5127 UBUNTU:CVE-2015-5128 UBUNTU:CVE-2015-5129 UBUNTU:CVE-2015-5130 UBUNTU:CVE-2015-5131 UBUNTU:CVE-2015-5132 UBUNTU:CVE-2015-5134 UBUNTU:CVE-2015-5539 UBUNTU:CVE-2015-5540 UBUNTU:CVE-2015-5541 UBUNTU:CVE-2015-5544 UBUNTU:CVE-2015-5545 UBUNTU:CVE-2015-5551 UBUNTU:CVE-2015-5552 UBUNTU:CVE-2015-5553 UBUNTU:CVE-2015-5554 UBUNTU:CVE-2015-5555 UBUNTU:CVE-2015-5556 UBUNTU:CVE-2015-5557 UBUNTU:CVE-2015-5558 UBUNTU:CVE-2015-5559 UBUNTU:CVE-2015-5560 UBUNTU:CVE-2015-5561 UBUNTU:CVE-2015-5564 UBUNTU:CVE-2015-5565 UBUNTU:CVE-2015-5566 UBUNTU:CVE-2015-7559 UBUNTU:CVE-2015-8381 UBUNTU:CVE-2015-8382 UBUNTU:CVE-2015-8383 UBUNTU:CVE-2015-8384 UBUNTU:CVE-2015-8385 UBUNTU:CVE-2015-8386 UBUNTU:CVE-2015-8387 UBUNTU:CVE-2015-8388 UBUNTU:CVE-2015-8389 UBUNTU:CVE-2015-8390 UBUNTU:CVE-2015-8391 UBUNTU:CVE-2015-8392 UBUNTU:CVE-2015-8393 UBUNTU:CVE-2015-8394 UBUNTU:CVE-2015-8395 UBUNTU:CVE-2015-8854 UBUNTU:CVE-2015-8855 UBUNTU:CVE-2015-8856 UBUNTU:CVE-2015-8857 UBUNTU:CVE-2015-8858 UBUNTU:CVE-2015-8859 UBUNTU:CVE-2015-8860 UBUNTU:CVE-2015-8861 UBUNTU:CVE-2015-8862 UBUNTU:CVE-2016-0755 UBUNTU:CVE-2016-1672 UBUNTU:CVE-2016-1673 UBUNTU:CVE-2016-1674 UBUNTU:CVE-2016-1675 UBUNTU:CVE-2016-1676 UBUNTU:CVE-2016-1677 UBUNTU:CVE-2016-1678 UBUNTU:CVE-2016-1679 UBUNTU:CVE-2016-1680 UBUNTU:CVE-2016-1681 UBUNTU:CVE-2016-1682 UBUNTU:CVE-2016-1683 UBUNTU:CVE-2016-1684 UBUNTU:CVE-2016-1685 UBUNTU:CVE-2016-1686 UBUNTU:CVE-2016-1687 UBUNTU:CVE-2016-1688 UBUNTU:CVE-2016-1689 UBUNTU:CVE-2016-1690 UBUNTU:CVE-2016-1691 UBUNTU:CVE-2016-1692 UBUNTU:CVE-2016-1693 UBUNTU:CVE-2016-1694 UBUNTU:CVE-2016-1695 UBUNTU:CVE-2016-1950 UBUNTU:CVE-2016-1955 UBUNTU:CVE-2016-1956 UBUNTU:CVE-2016-1959 UBUNTU:CVE-2016-1967 UBUNTU:CVE-2016-1968 UBUNTU:CVE-2016-1969 UBUNTU:CVE-2016-1970 UBUNTU:CVE-2016-1971 UBUNTU:CVE-2016-1972 UBUNTU:CVE-2016-1973 UBUNTU:CVE-2016-1975 UBUNTU:CVE-2016-1976 UBUNTU:CVE-2016-2178 UBUNTU:CVE-2016-3141 UBUNTU:CVE-2016-4055 UBUNTU:CVE-2016-4070 UBUNTU:CVE-2016-4612 UBUNTU:CVE-2016-4619 UBUNTU:CVE-2016-4979 UBUNTU:CVE-2016-5501 UBUNTU:CVE-2016-5538 UBUNTU:CVE-2016-5605 UBUNTU:CVE-2016-5608 UBUNTU:CVE-2016-5610 UBUNTU:CVE-2016-5611 UBUNTU:CVE-2016-6293 UBUNTU:CVE-2016-6294 UBUNTU:CVE-2016-9840 UBUNTU:CVE-2016-9841 UBUNTU:CVE-2016-9842 UBUNTU:CVE-2016-9843 UBUNTU:CVE-2017-3454 UBUNTU:CVE-2017-3468 UBUNTU:CVE-2017-9526 UBUNTU:CVE-2018-1000121 UBUNTU:CVE-2018-1258 UBUNTU:CVE-2018-1305 UBUNTU:CVE-2018-1517 UBUNTU:CVE-2018-1656 UBUNTU:CVE-2018-2767 UBUNTU:CVE-2018-2938 UBUNTU:CVE-2018-2940 UBUNTU:CVE-2018-2952 UBUNTU:CVE-2018-2964 UBUNTU:CVE-2018-2973 UBUNTU:CVE-2018-3005 UBUNTU:CVE-2018-3055 UBUNTU:CVE-2018-3085 UBUNTU:CVE-2018-3086 UBUNTU:CVE-2018-3087 UBUNTU:CVE-2018-3088 UBUNTU:CVE-2018-3089 UBUNTU:CVE-2018-3090 UBUNTU:CVE-2018-3091 UBUNTU:CVE-2018-3287 UBUNTU:CVE-2018-3288 UBUNTU:CVE-2018-3289 UBUNTU:CVE-2018-3290 UBUNTU:CVE-2018-3291 UBUNTU:CVE-2018-3292 UBUNTU:CVE-2018-3293 UBUNTU:CVE-2018-3294 UBUNTU:CVE-2018-3295 UBUNTU:CVE-2018-3296 UBUNTU:CVE-2018-3297 UBUNTU:CVE-2018-3298 UBUNTU:CVE-2019-2455 UBUNTU:CVE-2019-2481 UBUNTU:CVE-2019-2482 UBUNTU:CVE-2019-2503 UBUNTU:CVE-2019-2507 UBUNTU:CVE-2019-2510 UBUNTU:CVE-2019-2513 UBUNTU:CVE-2019-2528 UBUNTU:CVE-2019-2529 UBUNTU:CVE-2019-2530 UBUNTU:CVE-2019-2531 UBUNTU:CVE-2019-2532 UBUNTU:CVE-2019-2533 UBUNTU:CVE-2019-2534 UBUNTU:CVE-2019-2535 UBUNTU:CVE-2019-2536 UBUNTU:CVE-2019-2537 UBUNTU:CVE-2019-2539 UBUNTU:USN-2575-1 UBUNTU:USN-2769-1 UBUNTU:USN-2882-1 UBUNTU:USN-2916-1 UBUNTU:USN-2917-1 UBUNTU:USN-2917-2 UBUNTU:USN-2917-3 UBUNTU:USN-2924-1 UBUNTU:USN-2934-1 UBUNTU:USN-2952-1 UBUNTU:USN-2952-2 UBUNTU:USN-2992-1 UBUNTU:USN-3598-1 UBUNTU:USN-3598-2 UBUNTU:USN-3665-1 UBUNTU:USN-3693-1 UBUNTU:USN-3725-1 UBUNTU:USN-3725-2 UBUNTU:USN-3727-1 UBUNTU:USN-3734-1 UBUNTU:USN-3735-1 UBUNTU:USN-3747-1 USN-3087-1 USN-3087-2 USN-3867-1 USN-4246-1 USN-4292-1 XF:perl-cve20144330-dos(96216) ZDI-16-570 ZDI-18-1232ZDI-CAN-6635 ZDI-18-1233ZDI-CAN-6591 ZDI-18-1234ZDI-CAN-6592 ZDI-18-1292ZDI-CAN-7329 bdo#1033297 bdo#583651 bdo#759718 bdo#782645 bdo#797165 bdo#798619 bdo#798620 bdo#802671 bdo#802971 bdo#838694 bdo#864859 bdo#867247 bdo#873383 bdo#885345 bdo#898444 bdo#898445 bdo#912848 bnc#1003579 bnc#1003580 bnc#1005621 bnc#1016653 bnc#1021757 bnc#1022633 bnc#1042326 bnc#1043777 bnc#1084524 bnc#1085215 bnc#1088681 bnc#1101644 bnc#1101645 bnc#1101656 bnc#1101667 bnc#1101675 bnc#1104668 bnc#1120866 bnc#1122198 bnc#885963 bnc#896715 bnc#924960 bnc#924961 bnc#927623 bnc#941239 bnc#947966 bnc#957598 bnc#958373 bnc#962983 bnc#969821 bnc#969894 bnc#970257 bnc#970377 bnc#970378 bnc#970379 bnc#970380 bnc#970381 bnc#970431 bnc#970433 bnc#976547 bnc#977050 bnc#981886 bnc#983249 bnc#983519 bnc#988162 http://www.debian.org/security/2016/dsa-3560 https://git.php.net/?p=php-src.git%3Ba=commit%3Bh=95433e8e339dbb6b5d5541473c1661db6ba2c451 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO2RMVVZVV6NFTU46B5RYRK7ZCXYARZS/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M6BJG6RGDH7ZWVVAUFBFI5L32RSMQN2S/ https://security.netapp.com/advisory/ntap-20230216-0002/ https://support.f5.com/csp/article/K05052081?utm_source=f5support&%3Butm_medium=RSS https://support.f5.com/csp/article/K46337613?utm_source=f5support&%3Butm_medium=RSS https://support.f5.com/csp/article/K46337613?utm_source=f5support&utm_medium=RSS linux.git:commit:5535be3099717646781ce1540cf725965d680e7b linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 openssl.git:commit:399944622df7bd81af62e67ea967c470534090e2 rh#1051277 rh#1091938 rh#1101303 rh#1104858 rh#1107544 rh#1112877 rh#1116665 rh#1129074 rh#1129916 rh#1131350 rh#1139700 rh#1166147 rh#1167537 rh#1183461 rh#1187225 rh#1202366 rh#1202380 rh#1202384 rh#1202395 rh#1202418 rh#1203195 rh#1207198 rh#1207202 rh#1208428 rh#1209496 rh#1209501 rh#1212753 rh#1212755 rh#1212757 rh#1212758 rh#1212759 rh#1212760 rh#1212763 rh#1212764 rh#1212765 rh#1212767 rh#1212768 rh#1212769 rh#1212770 rh#1212771 rh#1212772 rh#1212774 rh#1212776 rh#1212777 rh#1212779 rh#1212780 rh#1212781 rh#1212782 rh#1212783 rh#1237223 rh#1252697 rh#1252707 rh#1256449 rh#1262373 rh#1277888 rh#1285399 rh#1285408 rh#1287614 rh#1287623 rh#1287629 rh#1287636 rh#1287646 rh#1287654 rh#1287659 rh#1287666 rh#1287671 rh#1287690 rh#1287695 rh#1287702 rh#1287711 rh#1291742 rh#1293972 rh#1302263 rh#1304645 rh#1310509 rh#1311503 rh#1315312 rh#1315328 rh#1315570 rh#1315571 rh#1315575 rh#1315776 rh#1315777 rh#1315780 rh#1315782 rh#1317560 rh#1323114 rh#1323749 rh#1329533 rh#1329552 rh#1340005 rh#1340006 rh#1340007 rh#1340008 rh#1340009 rh#1340010 rh#1340011 rh#1340012 rh#1340013 rh#1340014 rh#1340015 rh#1340016 rh#1340017 rh#1340018 rh#1340019 rh#1340021 rh#1340022 rh#1340023 rh#1340024 rh#1340026 rh#1340027 rh#1340028 rh#1340029 rh#1340030 rh#1341821 rh#1343400 rh#1343538 rh#1343540 rh#1352476 rh#1359811 rh#1360339 rh#1369383 rh#1378936 rh#1384344 rh#1386562 rh#1386564 rh#1393454 rh#1396963 rh#1396971 rh#1397485 rh#1399546 rh#1402345 rh#1402346 rh#1402348 rh#1402351 rh#1405148 rh#1414133 rh#1433010 rh#1443366 rh#1443385 rh#1459887 rh#1485274 rh#1501812 rh#1501813 rh#1501814 rh#1501815 rh#1501816 rh#1501817 rh#1501818 rh#1501819 rh#1501820 rh#1516791 rh#1519780 rh#1548282 rh#1552631 rh#1553413 rh#1564965 rh#1578582 rh#1591854 rh#1600925 rh#1602141 rh#1602142 rh#1602145 rh#1602146 rh#1607582 rh#1608073 rh#1614973 rh#1618767 rh#1618869 rh#1618871 rh#1666742 rh#1666743 rh#1666744 rh#1666749 rh#1666750 rh#1666751 rh#1666752 rh#1666753 rh#1666755 rh#1666756 rh#1666757 rh#1666758 rh#1666759 rh#1666760 rh#1666761 rh#1666762 rh#1666763 rh#1666764 rh#1714979 rh#1716448 rh#1716453 rh#1716454 rh#1722971 rh#1731271 rh#2061700 rh#2116175 rh#2119127 rh#2161287 rh#2270497 rh#539529 rh#873317 xf#141681 xf#141953 xf#141971 xf#141981 xf#141982 xf#144882 xf#146672 xf#146803 xf#146804 xf#146815 xf#146827 xf#146834 xf#146835 xf#151452 xf#151455 xf#151465 xf#151466 xf#151486 xf#151497 xf#151500 xf#151525 xf#151527 xf#151530 xf#155741 xf#155744 xf#155766 xf#155850 |
CVE-2015-2326 | perl:Already fixed | moderate | () | APPLE:APPLE-SA-2010-03-29-1 APPLE:APPLE-SA-2016-03-21-1 APPLE:APPLE-SA-2016-03-21-2 APPLE:APPLE-SA-2016-03-21-3 APPLE:APPLE-SA-2016-03-21-5 APPLE:APPLE-SA-2016-05-16-4 APPLE:APPLE-SA-2016-07-18-1 APPLE:APPLE-SA-2016-07-18-2 APPLE:APPLE-SA-2016-07-18-3 APPLE:APPLE-SA-2016-07-18-4 APPLE:APPLE-SA-2016-07-18-6 APPLE:APPLE-SA-2016-09-20 BID:100503 BID:100514 BID:100861 BID:103144 BID:103415 BID:103782 BID:103796 BID:103846 BID:103848 BID:103954 BID:104222 BID:104764 BID:104765 BID:104768 BID:104773 BID:104774 BID:104775 BID:104780 BID:104782 BID:105117 BID:105118 BID:105126 BID:105587 BID:105590 BID:105591 BID:105597 BID:105601 BID:105602 BID:105608 BID:105615 BID:105617 BID:105619 BID:105622 BID:105624 BID:105635 BID:105637 BID:105647 BID:105656 BID:105658 BID:106619 BID:106622 BID:106625 BID:106626 BID:106627 BID:106628 BID:67121 BID:69257 BID:70142 BID:71206 BID:74073 BID:74075 BID:74078 BID:74081 BID:74085 BID:74095 BID:74112 BID:74924 BID:76157 BID:76187 BID:76282 BID:76289 BID:76291 BID:79091 BID:82307 BID:82990 BID:84220 BID:84223 BID:84271 BID:85572 BID:85576 BID:85801 BID:86957 BID:90876 BID:91067 BID:91068 BID:91081 BID:91566 BID:91787 BID:91869 BID:92115 BID:92127 BID:92912 BID:93132 BID:93287 BID:93604 BID:93685 BID:93687 BID:93697 BID:93711 BID:93718 BID:93728 BID:93744 BID:94371 BID:94377 BID:94925 BID:95019 BID:95131 BID:95429 BID:95849 BID:96389 BID:96392 BID:96409 BID:96410 BID:96434 BID:96435 BID:96436 BID:97102 BID:97725 BID:97742 BID:97763 BID:97765 BID:97776 BID:97791 BID:97812 BID:97818 BID:97831 BID:97848 BID:97849 BID:97851 BID:99046 BUGTRAQ:20140925 LSE Leading Security Experts GmbH - LSE-2014-06-10 - Perl CORE - Deep Recursion Stack Overflow BUGTRAQ:20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities CISCO:20160927 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: September 2016 CONFIRM:access.redhat.com:CVE-2014-0114 CONFIRM:access.redhat.com:CVE-2014-3577 CONFIRM:access.redhat.com:CVE-2015-0293 CONFIRM:access.redhat.com:CVE-2015-3456 CONFIRM:advisories.mageia.org:CVE-2014-0114 CONFIRM:advisories.mageia.org:CVE-2014-4330 CONFIRM:advisories.mageia.org:CVE-2014-8964 CONFIRM:bto.bluecoat.com:CVE-2016-1950 CONFIRM:bto.bluecoat.com:CVE-2016-3191 CONFIRM:bto.bluecoat.com:CVE-2016-7052 CONFIRM:bugs.eclipse.org:CVE-2018-12539 CONFIRM:bugs.exim.org:CVE-2014-8964 CONFIRM:bugs.exim.org:CVE-2015-2328 CONFIRM:bugs.exim.org:CVE-2015-8381 CONFIRM:bugs.exim.org:CVE-2015-8382 CONFIRM:bugs.jython.org:CVE-2016-4000 CONFIRM:bugs.launchpad.net:CVE-2015-8866 CONFIRM:bugs.launchpad.net:CVE-2015-8867 CONFIRM:bugs.php.net:CVE-2015-8866 CONFIRM:bugs.php.net:CVE-2015-8867 CONFIRM:bugs.php.net:CVE-2015-8878 CONFIRM:bugs.php.net:CVE-2016-3141 CONFIRM:bugs.php.net:CVE-2016-4070 CONFIRM:bugs.php.net:CVE-2016-6294 CONFIRM:bugzilla.mozilla.org:CVE-2016-1950 CONFIRM:bugzilla.mozilla.org:CVE-2016-1955 CONFIRM:bugzilla.mozilla.org:CVE-2016-1956 CONFIRM:bugzilla.mozilla.org:CVE-2016-1959 CONFIRM:bugzilla.mozilla.org:CVE-2016-1967 CONFIRM:bugzilla.mozilla.org:CVE-2016-1968 CONFIRM:bugzilla.mozilla.org:CVE-2016-1969 CONFIRM:bugzilla.mozilla.org:CVE-2016-1970 CONFIRM:bugzilla.mozilla.org:CVE-2016-1971 CONFIRM:bugzilla.mozilla.org:CVE-2016-1972 CONFIRM:bugzilla.mozilla.org:CVE-2016-1973 CONFIRM:bugzilla.mozilla.org:CVE-2016-1975 CONFIRM:bugzilla.mozilla.org:CVE-2016-1976 CONFIRM:bugzilla.redhat.com:CVE-2015-7559 CONFIRM:bugzilla.redhat.com:CVE-2016-9583 CONFIRM:cert-portal.siemens.com:/productcert/pdf/ssa-412672.pdf CONFIRM:codereview.chromium.org:CVE-2016-1675 CONFIRM:codereview.chromium.org:CVE-2016-1676 CONFIRM:codereview.chromium.org:CVE-2016-1677 CONFIRM:codereview.chromium.org:CVE-2016-1678 CONFIRM:codereview.chromium.org:CVE-2016-1679 CONFIRM:codereview.chromium.org:CVE-2016-1680 CONFIRM:codereview.chromium.org:CVE-2016-1681 CONFIRM:codereview.chromium.org:CVE-2016-1682 CONFIRM:codereview.chromium.org:CVE-2016-1685 CONFIRM:codereview.chromium.org:CVE-2016-1686 CONFIRM:codereview.chromium.org:CVE-2016-1687 CONFIRM:codereview.chromium.org:CVE-2016-1688 CONFIRM:codereview.chromium.org:CVE-2016-1689 CONFIRM:codereview.chromium.org:CVE-2016-1691 CONFIRM:codereview.chromium.org:CVE-2016-1692 CONFIRM:codereview.chromium.org:CVE-2016-1693 CONFIRM:codereview.chromium.org:CVE-2016-1694 CONFIRM:codereview.chromium.org:CVE-2016-1701 CONFIRM:commons.apache.org:CVE-2014-0114 CONFIRM:crbug.com:CVE-2016-1672 CONFIRM:crbug.com:CVE-2016-1673 CONFIRM:crbug.com:CVE-2016-1674 CONFIRM:crbug.com:CVE-2016-1675 CONFIRM:crbug.com:CVE-2016-1676 CONFIRM:crbug.com:CVE-2016-1677 CONFIRM:crbug.com:CVE-2016-1678 CONFIRM:crbug.com:CVE-2016-1679 CONFIRM:crbug.com:CVE-2016-1680 CONFIRM:crbug.com:CVE-2016-1681 CONFIRM:crbug.com:CVE-2016-1682 CONFIRM:crbug.com:CVE-2016-1683 CONFIRM:crbug.com:CVE-2016-1684 CONFIRM:crbug.com:CVE-2016-1685 CONFIRM:crbug.com:CVE-2016-1686 CONFIRM:crbug.com:CVE-2016-1687 CONFIRM:crbug.com:CVE-2016-1688 CONFIRM:crbug.com:CVE-2016-1689 CONFIRM:crbug.com:CVE-2016-1690 CONFIRM:crbug.com:CVE-2016-1691 CONFIRM:crbug.com:CVE-2016-1692 CONFIRM:crbug.com:CVE-2016-1693 CONFIRM:crbug.com:CVE-2016-1694 CONFIRM:crbug.com:CVE-2016-1695 CONFIRM:curl.haxx.se:CVE-2016-0755 CONFIRM:curl.haxx.se:CVE-2016-9586 CONFIRM:curl.haxx.se:CVE-2018-1000121 CONFIRM:developer.mozilla.org:CVE-2016-1950 CONFIRM:git.gnome.org:CVE-2016-1683 CONFIRM:git.gnome.org:CVE-2016-1684 CONFIRM:git.gnupg.org:CVE-2017-9526 CONFIRM:git.php.net:CVE-2015-8382 CONFIRM:git.php.net:CVE-2015-8866 CONFIRM:git.php.net:CVE-2015-8867 CONFIRM:git.php.net:CVE-2016-3141 CONFIRM:git.php.net:CVE-2016-6294 CONFIRM:git.savannah.gnu.org:CVE-2014-9746 CONFIRM:git.savannah.gnu.org:CVE-2014-9747 CONFIRM:github.com:CVE-2013-7330 CONFIRM:github.com:CVE-2014-2058 CONFIRM:github.com:CVE-2014-2059 CONFIRM:github.com:CVE-2014-2061 CONFIRM:github.com:CVE-2014-2062 CONFIRM:github.com:CVE-2014-2063 CONFIRM:github.com:CVE-2014-2064 CONFIRM:github.com:CVE-2014-2065 CONFIRM:github.com:CVE-2014-2066 CONFIRM:github.com:CVE-2014-2067 CONFIRM:github.com:CVE-2014-2068 CONFIRM:github.com:CVE-2016-1182 CONFIRM:github.com:CVE-2016-4979 CONFIRM:github.com:CVE-2016-9389 CONFIRM:github.com:CVE-2016-9394 CONFIRM:github.com:CVE-2016-9583 CONFIRM:github.com:CVE-2016-9586 CONFIRM:github.com:CVE-2016-9840 CONFIRM:github.com:CVE-2016-9841 CONFIRM:github.com:CVE-2016-9842 CONFIRM:github.com:CVE-2016-9843 CONFIRM:github.com:CVE-2017-1000071 CONFIRM:github.com:CVE-2017-14735 CONFIRM:googlechromereleases.blogspot.com:CVE-2016-1695 CONFIRM:h20566.www2.hpe.com:CVE-2016-0763 CONFIRM:h20566.www2.hpe.com:CVE-2016-2014 CONFIRM:h20566.www2.hpe.com:CVE-2016-2183 CONFIRM:h20566.www2.hpe.com:CVE-2016-5388 CONFIRM:h20566.www2.hpe.com:CVE-2016-5773 CONFIRM:h20566.www2.hpe.com:CVE-2016-6306 CONFIRM:h20566.www2.hpe.com:CVE-2016-8518 CONFIRM:h20566.www2.hpe.com:CVE-2017-5787 CONFIRM:hg.mozilla.org:CVE-2016-1975 CONFIRM:hg.python.org:CVE-2016-4000 CONFIRM:httpd.apache.org:CVE-2016-4979 CONFIRM:issues.apache.org:CVE-2014-0114 CONFIRM:issues.apache.org:CVE-2015-1832 CONFIRM:issues.apache.org:CVE-2015-7559 CONFIRM:issues.apache.org:CVE-2016-1000031 CONFIRM:jenkins.io:CVE-2017-1000403 CONFIRM:jira.mariadb.org:CVE-2016-6662 CONFIRM:jira.mongodb.org:CVE-2015-2328 CONFIRM:kb.juniper.net:CVE-2015-3209 CONFIRM:kb.juniper.net:CVE-2016-7052 CONFIRM:kb.pulsesecure.net:CVE-2016-6306 CONFIRM:kc.mcafee.com:CVE-2016-6306 CONFIRM:mariadb.com:CVE-2015-2571 CONFIRM:mariadb.com:CVE-2016-6662 CONFIRM:metacpan.org:CVE-2014-4330 CONFIRM:nodejs.org:CVE-2016-7099 CONFIRM:nodesecurity.io:CVE-2013-7454 CONFIRM:nodesecurity.io:CVE-2014-9772 CONFIRM:nodesecurity.io:CVE-2015-8315 CONFIRM:nodesecurity.io:CVE-2015-8854 CONFIRM:nodesecurity.io:CVE-2015-8855 CONFIRM:nodesecurity.io:CVE-2015-8856 CONFIRM:nodesecurity.io:CVE-2015-8858 CONFIRM:nodesecurity.io:CVE-2015-8859 CONFIRM:nodesecurity.io:CVE-2015-8860 CONFIRM:nodesecurity.io:CVE-2015-8862 CONFIRM:nodesecurity.io:CVE-2016-4055 CONFIRM:php.net:CVE-2016-3142 CONFIRM:pivotal.io:CVE-2018-1258 CONFIRM:rwkbp.makekb.com:CVE-2015-8965 CONFIRM:security-tracker.debian.org:CVE-2016-1181 CONFIRM:security-tracker.debian.org:CVE-2016-1182 CONFIRM:security.netapp.com:CVE-2014-0114 CONFIRM:security.netapp.com:CVE-2015-2575 CONFIRM:security.netapp.com:CVE-2016-1000031 CONFIRM:security.netapp.com:CVE-2016-1182 CONFIRM:security.netapp.com:CVE-2016-4979 CONFIRM:security.netapp.com:CVE-2016-9843 CONFIRM:security.netapp.com:CVE-2017-10388 CONFIRM:security.netapp.com:CVE-2017-5645 CONFIRM:security.netapp.com:CVE-2018-1305 CONFIRM:security.netapp.com:CVE-2018-2973 CONFIRM:security.netapp.com:CVE-2019-2435 CONFIRM:support.apple.com:CVE-2009-0689 CONFIRM:support.apple.com:CVE-2016-1950 CONFIRM:support.apple.com:CVE-2016-4073 CONFIRM:support.apple.com:CVE-2016-4616 CONFIRM:support.apple.com:CVE-2016-4653 CONFIRM:support.apple.com:CVE-2016-7582 CONFIRM:support.apple.com:CVE-2017-13873 CONFIRM:support.apple.com:CVE-2017-13877 CONFIRM:support.apple.com:CVE-2017-6464 CONFIRM:support.f5.com:CVE-2015-8854 CONFIRM:support.f5.com:CVE-2016-2178 CONFIRM:support.hpe.com:CVE-2016-6306 CONFIRM:support.hpe.com:CVE-2016-7052 CONFIRM:support.hpe.com:CVE-2018-2940 CONFIRM:support.hpe.com:CVE-2018-2973 CONFIRM:svn.apache.org:CVE-2012-6153 CONFIRM:svn.apache.org:CVE-2015-1832 CONFIRM:vcs.pcre.org:CVE-2015-8382 CONFIRM:vcs.pcre.org:CVE-2015-8395 CONFIRM:www-01.ibm.com:CVE-2014-0114 CONFIRM:www-01.ibm.com:CVE-2014-3022 CONFIRM:www-01.ibm.com:CVE-2015-1832 CONFIRM:www-01.ibm.com:CVE-2016-3191 CONFIRM:www-01.ibm.com:CVE-2016-7052 CONFIRM:www.apache.org:CVE-2016-4979 CONFIRM:www.exim.org:CVE-2014-8964 CONFIRM:www.huawei.com:CVE-2016-6306 CONFIRM:www.ibm.com:CVE-2014-0963 CONFIRM:www.ibm.com:CVE-2018-1656 CONFIRM:www.lsexperts.de:CVE-2014-4330 CONFIRM:www.mozilla.org:CVE-2016-1950 CONFIRM:www.mozilla.org:CVE-2016-1955 CONFIRM:www.mozilla.org:CVE-2016-1956 CONFIRM:www.mozilla.org:CVE-2016-1959 CONFIRM:www.mozilla.org:CVE-2016-1967 CONFIRM:www.mozilla.org:CVE-2016-1968 CONFIRM:www.mozilla.org:CVE-2016-1969 CONFIRM:www.mozilla.org:CVE-2016-1973 CONFIRM:www.mozilla.org:CVE-2016-1976 CONFIRM:www.oracle.com:CVE-2014-0114 CONFIRM:www.oracle.com:CVE-2014-4271 CONFIRM:www.oracle.com:CVE-2014-6564 CONFIRM:www.oracle.com:CVE-2015-0437 CONFIRM:www.oracle.com:CVE-2015-1351 CONFIRM:www.oracle.com:CVE-2015-2568 CONFIRM:www.oracle.com:CVE-2015-2579 CONFIRM:www.oracle.com:CVE-2015-4879 CONFIRM:www.oracle.com:CVE-2015-5722 CONFIRM:www.oracle.com:CVE-2015-8391 CONFIRM:www.oracle.com:CVE-2016-0778 CONFIRM:www.oracle.com:CVE-2016-2802 CONFIRM:www.oracle.com:CVE-2016-4957 CONFIRM:www.oracle.com:CVE-2016-5240 CONFIRM:www.oracle.com:CVE-2016-5477 CONFIRM:www.oracle.com:CVE-2016-6302 CONFIRM:www.oracle.com:CVE-2016-6304 CONFIRM:www.oracle.com:CVE-2016-7039 CONFIRM:www.oracle.com:CVE-2016-7154 CONFIRM:www.oracle.com:CVE-2016-8296 CONFIRM:www.oracle.com:CVE-2017-10365 CONFIRM:www.oracle.com:CVE-2017-3456 CONFIRM:www.oracle.com:CVE-2017-3626 CONFIRM:www.oracle.com:CVE-2017-3636 CONFIRM:www.oracle.com:CVE-2017-5689 CONFIRM:www.oracle.com:CVE-2017-5709 CONFIRM:www.oracle.com:CVE-2017-5715 CONFIRM:www.oracle.com:CVE-2017-5753 CONFIRM:www.oracle.com:CVE-2017-6074 CONFIRM:www.oracle.com:CVE-2018-18223 CONFIRM:www.oracle.com:CVE-2018-2639 CONFIRM:www.oracle.com:CVE-2018-2819 CONFIRM:www.oracle.com:CVE-2018-3081 CONFIRM:www.oracle.com:CVE-2018-3125 CONFIRM:www.pcre.org:CVE-2015-2325 CONFIRM:www.percona.com:CVE-2016-6662 CONFIRM:www.php.net:CVE-2009-3558 CONFIRM:www.php.net:CVE-2016-9935 CONFIRM:www.php.net:CVE-2016-9936 CONFIRM:www.splunk.com:CVE-2016-6304 CONFIRM:www.synology.com:CVE-2015-9104 CONFIRM:www.synology.com:CVE-2015-9105 CONFIRM:www.tenable.com:CVE-2016-4055 CONFIRM:www.tenable.com:CVE-2016-7052 CONFIRM:www.tenable.com:CVE-2016-8625 CONFIRM:www.tenable.com:CVE-2016-9260 CONFIRM:www.tenable.com:CVE-2016-9261 CONFIRM:www.vmware.com:CVE-2014-0114 CONFIRM:www.vmware.com:CVE-2014-8371 CONFIRM:x-stream.github.io:CVE-2013-7285 CVE-2009-3559 CVE-2012-6153 CVE-2013-7285 CVE-2013-7451 CVE-2013-7452 CVE-2013-7453 CVE-2013-7454 CVE-2014-0114 CVE-2014-0245 CVE-2014-3540 CVE-2014-4172 CVE-2014-4330 CVE-2014-4651 CVE-2014-7192 CVE-2014-8964 CVE-2014-9745 CVE-2014-9746 CVE-2014-9747 CVE-2014-9772 CVE-2015-0405 CVE-2015-0423 CVE-2015-0433 CVE-2015-0438 CVE-2015-0439 CVE-2015-0441 CVE-2015-0498 CVE-2015-0499 CVE-2015-0500 CVE-2015-0501 CVE-2015-0503 CVE-2015-0505 CVE-2015-0506 CVE-2015-0507 CVE-2015-0508 CVE-2015-0511 CVE-2015-0852 CVE-2015-1832 CVE-2015-2325 CVE-2015-2326 CVE-2015-2327 CVE-2015-2328 CVE-2015-2566 CVE-2015-2567 CVE-2015-2568 CVE-2015-2571 CVE-2015-2573 CVE-2015-2575 CVE-2015-2576 CVE-2015-2613 CVE-2015-5125 CVE-2015-5127 CVE-2015-5128 CVE-2015-5129 CVE-2015-5130 CVE-2015-5131 CVE-2015-5132 CVE-2015-5134 CVE-2015-5328 CVE-2015-5539 CVE-2015-5540 CVE-2015-5541 CVE-2015-5544 CVE-2015-5545 CVE-2015-5551 CVE-2015-5552 CVE-2015-5553 CVE-2015-5554 CVE-2015-5555 CVE-2015-5556 CVE-2015-5557 CVE-2015-5558 CVE-2015-5559 CVE-2015-5560 CVE-2015-5561 CVE-2015-5564 CVE-2015-5565 CVE-2015-5566 CVE-2015-7559 CVE-2015-7940 CVE-2015-8315 CVE-2015-8381 CVE-2015-8382 CVE-2015-8383 CVE-2015-8384 CVE-2015-8385 CVE-2015-8386 CVE-2015-8387 CVE-2015-8388 CVE-2015-8389 CVE-2015-8390 CVE-2015-8391 CVE-2015-8392 CVE-2015-8393 CVE-2015-8394 CVE-2015-8395 CVE-2015-8854 CVE-2015-8855 CVE-2015-8856 CVE-2015-8857 CVE-2015-8858 CVE-2015-8859 CVE-2015-8860 CVE-2015-8861 CVE-2015-8862 CVE-2015-8878 CVE-2015-8965 CVE-2015-9104 CVE-2015-9105 CVE-2015-9251 CVE-2016-0635 CVE-2016-0755 CVE-2016-1000031 CVE-2016-1181 CVE-2016-1182 CVE-2016-1672 CVE-2016-1673 CVE-2016-1674 CVE-2016-1675 CVE-2016-1676 CVE-2016-1677 CVE-2016-1678 CVE-2016-1679 CVE-2016-1680 CVE-2016-1681 CVE-2016-1682 CVE-2016-1683 CVE-2016-1684 CVE-2016-1685 CVE-2016-1686 CVE-2016-1687 CVE-2016-1688 CVE-2016-1689 CVE-2016-1690 CVE-2016-1691 CVE-2016-1692 CVE-2016-1693 CVE-2016-1694 CVE-2016-1695 CVE-2016-1950 CVE-2016-1955 CVE-2016-1956 CVE-2016-1959 CVE-2016-1967 CVE-2016-1968 CVE-2016-1969 CVE-2016-1970 CVE-2016-1971 CVE-2016-1972 CVE-2016-1973 CVE-2016-1975 CVE-2016-1976 CVE-2016-2178 CVE-2016-2515 CVE-2016-2537 CVE-2016-3141 CVE-2016-3142 CVE-2016-4000 CVE-2016-4055 CVE-2016-4070 CVE-2016-4612 CVE-2016-4619 CVE-2016-4979 CVE-2016-5483 CVE-2016-5501 CVE-2016-5538 CVE-2016-5605 CVE-2016-5608 CVE-2016-5610 CVE-2016-5611 CVE-2016-5613 CVE-2016-5616 CVE-2016-5617 CVE-2016-5684 CVE-2016-6293 CVE-2016-6294 CVE-2016-6662 CVE-2016-6814 CVE-2016-9389 CVE-2016-9392 CVE-2016-9583 CVE-2016-9586 CVE-2016-9840 CVE-2016-9841 CVE-2016-9842 CVE-2017-0379 CVE-2017-13745 CVE-2017-14229 CVE-2017-14735 CVE-2017-15095 CVE-2017-16012 CVE-2017-3308 CVE-2017-3309 CVE-2017-3329 CVE-2017-3453 CVE-2017-3454 CVE-2017-3456 CVE-2017-3461 CVE-2017-3462 CVE-2017-3463 CVE-2017-3464 CVE-2017-3468 CVE-2017-3600 CVE-2017-9526 CVE-2018-1000121 CVE-2018-12539 CVE-2018-1258 CVE-2018-1517 CVE-2018-1656 CVE-2018-2767 CVE-2018-2797 CVE-2018-2815 CVE-2018-2825 CVE-2018-2826 CVE-2018-2909 CVE-2018-2938 CVE-2018-2940 CVE-2018-2941 CVE-2018-2952 CVE-2018-2964 CVE-2018-2972 CVE-2018-2973 CVE-2018-3005 CVE-2018-3055 CVE-2018-3085 CVE-2018-3086 CVE-2018-3087 CVE-2018-3088 CVE-2018-3089 CVE-2018-3090 CVE-2018-3091 CVE-2018-3127 CVE-2018-3134 CVE-2018-3136 CVE-2018-3139 CVE-2018-3149 CVE-2018-3150 CVE-2018-3169 CVE-2018-3180 CVE-2018-3183 CVE-2018-3209 CVE-2018-3211 CVE-2018-3214 CVE-2018-3287 CVE-2018-3288 CVE-2018-3289 CVE-2018-3290 CVE-2018-3291 CVE-2018-3292 CVE-2018-3293 CVE-2018-3294 CVE-2018-3295 CVE-2018-3296 CVE-2018-3297 CVE-2018-3298 CVE-2019-2422 CVE-2019-2426 CVE-2019-2449 CVE-2019-2455 CVE-2019-2481 CVE-2019-2482 CVE-2019-2503 CVE-2019-2507 CVE-2019-2510 CVE-2019-2513 CVE-2019-2528 CVE-2019-2529 CVE-2019-2530 CVE-2019-2531 CVE-2019-2532 CVE-2019-2533 CVE-2019-2534 CVE-2019-2535 CVE-2019-2536 CVE-2019-2537 CVE-2019-2539 CVE-2019-2540 CVE-2024-2466 D:CVE-2015-2301 D:CVE-2015-2571 D:CVE-2015-2573 D:CVE-2015-2575 D:CVE-2015-2576 D:CVE-2015-5557 D:CVE-2015-5558 D:CVE-2015-5559 D:CVE-2015-5560 D:CVE-2015-5561 D:CVE-2015-5562 D:CVE-2015-5563 D:CVE-2015-5564 D:CVE-2015-5565 D:CVE-2015-8386 D:CVE-2015-8387 D:CVE-2015-8388 D:CVE-2015-8389 D:CVE-2015-8390 D:CVE-2015-8391 D:CVE-2015-8392 D:CVE-2015-8393 D:CVE-2015-8394 D:CVE-2015-8395 D:CVE-2015-9105 D:CVE-2016-1674 D:CVE-2016-1682 D:CVE-2016-1694 D:CVE-2016-1695 D:CVE-2016-1950 D:CVE-2016-1970 D:CVE-2016-1973 D:CVE-2016-2178 D:CVE-2016-3141 D:CVE-2016-4055 D:CVE-2016-5608 D:CVE-2016-5610 D:CVE-2016-6293 D:CVE-2016-6294 D:CVE-2016-6662 D:CVE-2016-9586 D:CVE-2017-9526 D:CVE-2018-1517 D:CVE-2018-1656 D:CVE-2018-3297 D:CVE-2018-3298 D:CVE-2022-2590 DEBIAN:DSA-3959 DEBIAN:DSA-4136 DEBIAN:DSA-4268 DEBIAN:DSA-4281 DEBIAN:DSA-4341 DSA-2940 DSA-3229 DSA-3311 DSA-3370 DSA-3392 DSA-3417 DSA-3455 DSA-3510 DSA-3520 DSA-3590 DSA-3605 DSA-3621 DSA-3631 DSA-3666 DSA-3673 DSA-3688 DSA-3725 DSA-3834 DSA-3880 DSA-3893 DSA-3944 DSA-4136 DSA-4281 DSA-5378 EXPLOIT-DB:37852 EXPLOIT-DB:37854 EXPLOIT-DB:37855 EXPLOIT-DB:37856 EXPLOIT-DB:37857 EXPLOIT-DB:37859 EXPLOIT-DB:37861 EXPLOIT-DB:40360 FEDORA:FEDORA-2014-11453 FEDORA:FEDORA-2014-15573 FEDORA:FEDORA-2014-17624 FEDORA:FEDORA-2014-17626 FEDORA:FEDORA-2014-17642 FEDORA:FEDORA-2014-9380 FEDORA:FEDORA-2015-16104 FEDORA:FEDORA-2015-16105 FEDORA:FEDORA-2015-16106 FEDORA:FEDORA-2015-7d95466eda FEDORA:FEDORA-2015-992342e82f FEDORA:FEDORA-2015-decbab7c9f FEDORA:FEDORA-2015-eb896290d3 FEDORA:FEDORA-2016-3fa315a5dd FEDORA:FEDORA-2016-55137a3adb FEDORA:FEDORA-2016-57bebab3b6 FEDORA:FEDORA-2016-5a141de5d9 FREEBSD:FreeBSD-SA-16:26 FULLDISC:20140925 LSE Leading Security Experts GmbH - LSE-2014-06-10 - Perl CORE - Deep Recursion Stack Overflow FULLDISC:20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities FULLDISC:20160706 CVE-2016-4979: HTTPD webserver - X509 Client certificate based authentication can be bypassed when HTTP/2 is used [vs] FULLDISC:20160912 CVE-2016-6662 - MySQL Remote Root Code Execution / Privilege Escalation ( 0day ) FULLDISC:20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities GENTOO:GLSA-201507-19 GENTOO:GLSA-201605-06 GENTOO:GLSA-201607-02 GENTOO:GLSA-201607-07 GENTOO:GLSA-201607-09 GENTOO:GLSA-201610-02 GENTOO:GLSA-201612-16 GENTOO:GLSA-201612-27 GENTOO:GLSA-201701-01 GENTOO:GLSA-201701-47 GENTOO:GLSA-201701-56 GENTOO:GLSA-201701-68 GENTOO:GLSA-201710-28 GLSA-201908-24 GLSA-202007-54 HP:HPSBGN03041 HP:HPSBMU03090 HP:HPSBST03160 IBM Security Bulletin 0713459 (Cognos Business Intelligence) IBM Security Bulletin 0713487 (Rational Collaborative Lifecycle Management) IBM Security Bulletin 0715641 (Cognos Business Intelligence) IBM Security Bulletin 0715721 (Agile Lifecycle Manager) IBM Security Bulletin 0716285 (Cognos TM1) IBM Security Bulletin 0716289 (Cognos Insight) IBM Security Bulletin 0717693 (Tivoli Monitoring V6) IBM Security Bulletin 0717727 (Tivoli Monitoring V6) IBM Security Bulletin 0717895 (Rational Business Developer) IBM Security Bulletin 0718381 (Platform Symphony) IBM Security Bulletin 0718421 (InfoSphere Guardium Data Redaction) IBM Security Bulletin 0718447 (Cognos Planning) IBM Security Bulletin 0718949 (Cloud Manager with Openstack) IBM Security Bulletin 0719163 (Rational Reporting for Development Intelligence) IBM Security Bulletin 0719165 (Rational Insight) IBM Security Bulletin 0720115 (Spectrum Conductor with Spark) IBM Security Bulletin 0728577 (Content Classification) IBM Security Bulletin 0729341 (ILOG CPLEX Optimization Studio) IBM Security Bulletin 0729343 (Decision Optimization Center) IBM Security Bulletin 0729607 (WebSphere Application Server) IBM Security Bulletin 0735319 (Tivoli System Automation Application Manager) IBM Security Bulletin 0735477 (Spectrum Conductor) IBM Security Bulletin 0737281 (Application Delivery Intelligence) IBM Security Bulletin 0738853 (Tivoli Monitoring V6) IBM Security Bulletin 0739057 (Sterling Connect:Direct for Microsoft Windows) IBM Security Bulletin 0739549 (Sterling Connect:Direct File Agent) IBM Security Bulletin 0739701 (Sterling Connect:Direct FTP+) IBM Security Bulletin 0739763 (Sterling Connect:Direct for UNIX) IBM Security Bulletin 0743351 (Workload Scheduler) IBM Security Bulletin 0792275 (Tivoli Netcool/Impact) IBM Security Bulletin 2015806 (Runtimes for Java Technology) IBM Security Bulletin 2016406 (Decision Optimization Center) IBM Security Bulletin 2016663 (Tivoli Netcool OMNIbus) IBM Security Bulletin 2016776 (Content Collector) IBM Security Bulletin 2016781 (Content Collector for SAP Applications) IBM Security Bulletin 2016827 (MessageSight) IBM Security Bulletin 2017431 (PureApplication System) IBM Security Bulletin 2017432 (PureApplication System) IBM Security Bulletin 2017449 (Web Experience Factory) IBM Security Bulletin 2017554 (Rational Software Architect) IBM Security Bulletin 715641 (Cognos Business Intelligence Server) IBM Security Bulletin 717121 (Cognos Controller) IBM Security Bulletin 717125 (MQ Appliance) IBM Security Bulletin 719933 (Tivoli Application Dependency Discovery Manager) IBM Security Bulletin 720173 (Transformation Extender) IBM Security Bulletin 725491 (DB2 for Linux, UNIX and Windows) IBM Security Bulletin 726009 (DataPower Gateways) IBM Security Bulletin 728399 (WebSphere Service Registry and Repository) IBM Security Bulletin 728567 (Algo Credit Manager) IBM Security Bulletin 728607 (PureApplication System) IBM Security Bulletin 729116 (Spectrum Protect Plus) IBM Security Bulletin 729699 (QRadar SIEM) IBM Security Bulletin 729745 (WebSphere Application Server Patterns) IBM Security Bulletin 730083 (Rational ClearCase) IBM Security Bulletin 730311 (Cognos Command Center) IBM Security Bulletin 730799 (Spectrum Control Standard Edition) IBM Security Bulletin 730909 (AIX family) IBM Security Bulletin 731323 (Financial Transaction Manager) IBM Security Bulletin 731325 (Financial Transaction Manager) IBM Security Bulletin 731329 (i) IBM Security Bulletin 731331 (Financial Transaction Manager) IBM Security Bulletin 731337 (Financial Transaction Manager) IBM Security Bulletin 731339 (Financial Transaction Manager) IBM Security Bulletin 731419 (Rational Software Architect Designer) IBM Security Bulletin 731507 (Rational Software Architect Design Manager) IBM Security Bulletin 731615 (Process Designer) IBM Security Bulletin 731641 (InfoSphere Guardium Data Redaction) IBM Security Bulletin 731875 (FileNet System Monitor) IBM Security Bulletin 732375 (Initiate Master Data Service) IBM Security Bulletin 732455 (Rational Performance Tester) IBM Security Bulletin 732457 (Rational Service Tester for SOA Quality) IBM Security Bulletin 732723 (Tivoli Application Dependency Discovery Manager) IBM Security Bulletin 732753 (Agile Lifecycle Manager) IBM Security Bulletin 732785 (Security Guardium) IBM Security Bulletin 732846 (Spectrum Symphony) IBM Security Bulletin 732850 (App Connect Enterprise) IBM Security Bulletin 732896 (Planning Analytics) IBM Security Bulletin 732932 (SPSS Statistics) IBM Security Bulletin 733068 (Liberty for Java for Bluemix) IBM Security Bulletin 733457 (Tivoli Netcool/OMNIbus) IBM Security Bulletin 733543 (Tivoli Netcool/Impact) IBM Security Bulletin 733845 (Integration Designer) IBM Security Bulletin 733857 (Rational DOORS Web Access) IBM Security Bulletin 733869 (DataPower Gateways) IBM Security Bulletin 733905 (Rational Application Developer for WebSphere Software) IBM Security Bulletin 734161 (WebSphere Application Server in Cloud) IBM Security Bulletin 734595 (Rational Build Forge) IBM Security Bulletin 735325 (Tivoli System Automation for Multiplatforms) IBM Security Bulletin 735421 (MessageSight) IBM Security Bulletin 735481 (Rational Directory Server) IBM Security Bulletin 735515 (Rational Host On-Demand) IBM Security Bulletin 735541 (Rational Method Composer) IBM Security Bulletin 735551 (Runtimes for Java Technology) IBM Security Bulletin 735807 (Tivoli Monitoring V6) IBM Security Bulletin 737495 (Cloud App Management) IBM Security Bulletin 737775 (Web Experience Factory) IBM Security Bulletin 737813 (Content Collector for SAP Applications) IBM Security Bulletin 738337 (Monitoring) IBM Security Bulletin 738347 (Rational Publishing Engine) IBM Security Bulletin 738633 (WebSphere Service Registry and Repository) IBM Security Bulletin 738729 (Installation Manager) IBM Security Bulletin 738743 (Rational Developer for i) IBM Security Bulletin 738905 (Cognos Insight) IBM Security Bulletin 738907 (Cognos TM1) IBM Security Bulletin 738985 (WebSphere MQ) IBM Security Bulletin 738997 (MQ) IBM Security Bulletin 739183 (http://www.ibm.com/support/docview.wss?uid=ibm10739183) IBM Security Bulletin 739227 (Cloud Orchestrator) IBM Security Bulletin 739231 (Algo Credit Manager) IBM Security Bulletin 739251 (Decision Optimization Center) IBM Security Bulletin 739261 (Monitoring) IBM Security Bulletin 739387 (Spectrum Protect for Virtual Environments) IBM Security Bulletin 739455 (Spectrum Protect Snapshot) IBM Security Bulletin 739941 (Content Collector) IBM Security Bulletin 739985 (WebSphere Application Server Patterns) IBM Security Bulletin 740269 (Notes) IBM Security Bulletin 740383 (Sterling Connect:Direct Browser User Interface) IBM Security Bulletin 740419 (Security Access Manager Appliance) IBM Security Bulletin 740447 (Operational Decision Manager) IBM Security Bulletin 740467 (Tivoli Storage Manager FastBack) IBM Security Bulletin 740673 (Control Center) IBM Security Bulletin 741745 (Tivoli Composite Application Manager (ITCAM) for Transactions) IBM Security Bulletin 742369 (Security SiteProtector System) IBM Security Bulletin 742729 (QRadar SIEM) IBM Security Bulletin 743071 (Rational Asset Analyzer) IBM Security Bulletin 743149 (Financial Transaction Manager) IBM Security Bulletin 743157 (Financial Transaction Manager) IBM Security Bulletin 743193 (Spectrum Protect) IBM Security Bulletin 743961 (Rational Publishing Engine) IBM Security Bulletin 744823 (Rational Collaborative Lifecycle Management) IBM Security Bulletin 787583 (API Connect) IBM Security Bulletin 787833 (AIX family) IBM Security Bulletin 788277 (WebSphere Cast Iron) IBM Security Bulletin 789805 (WebSphere MQ) IBM Security Bulletin 791171 (Rational DOORS Web Access) IBM Security Bulletin 791855 (WebSphere eXtreme Scale) IBM Security Bulletin 791861 (WebSphere DataPower XC10 Appliance) IBM Security Bulletin 792239 (Cloud Manager with Openstack) IBM Security Bulletin T1027807 (AIX family) JVN:JVN#03188560 JVN:JVN#65044642 JVNDB:JVNDB-2016-000096 JVNDB:JVNDB-2016-000097 L3:42159 L3:44989 L3:45334 L3:45906 L3:47274 L3:53225 MANDRIVA:MDVSA-2009:302 MANDRIVA:MDVSA-2014:095 MANDRIVA:MDVSA-2015:002 MANDRIVA:MDVSA-2015:136 MANDRIVA:MDVSA-2015:137 MANDRIVA:MDVSA-2015:227 MISC:access.redhat.com:CVE-2014-0245 MISC:access.redhat.com:MLIST:[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations MISC:blog.diniscruz.com:CVE-2013-7285 MISC:blogs.gentoo.org:CVE-2016-9399 MISC:bugs.exim.org:CVE-2015-2325 MISC:bugs.exim.org:CVE-2015-2326 MISC:bugs.launchpad.net:MLIST:[oss-security] 20150911 CVE Request: 2 FreeType issues MISC:bugs.php.net:CVE-2009-3559 MISC:bugs.php.net:MISC:www.openwall.com MISC:bugzilla.redhat.com:CVE-2014-0245 MISC:bugzilla.redhat.com:CVE-2016-9586 MISC:curl.haxx.se MISC:curl.haxx.se:OSS:2018/Q1/235 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:developer.mozilla.org:CVE-2016-1979 MISC:eprint.iacr.org:CVE-2016-2178 MISC:eprint.iacr.org:CVE-2017-0379 MISC:exchange.xforce.ibmcloud.com:CVE-2014-4172 MISC:fortiguard.com:CVE-2015-2325 MISC:fortiguard.com:CVE-2015-2326 MISC:git.gnupg.org:CVE-2017-0379 MISC:git.openssl.org:MLIST:[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations MISC:github.com:CVE-2014-4172 MISC:github.com:CVE-2015-9251 MISC:github.com:CVE-2017-14229 MISC:github.com:MLIST:[oss-security] 20161205 Re: CVE Request: zlib security issues found during audit MISC:github.com:OSS:2018/Q1/235 MISC:github.com:OSS:2024/Q1/256 MISC:ics-cert.us-cert.gov:CVE-2015-9251 MISC:issues.apache.org:CVE-2014-4651 MISC:issues.jasig.org:CVE-2014-4172 MISC:legalhackers.com:CVE-2016-6662 MISC:lists.apache.org:CVE-2018-1305 MISC:lists.debian.org:CVE-2017-0379 MISC:lists.fedoraproject.org:CVE-2014-4172 MISC:mail-archives.apache.org:CVE-2016-6814 MISC:nodesecurity.io:CVE-2014-10064 MISC:nodesecurity.io:CVE-2015-8857 MISC:nodesecurity.io:MLIST:[oss-security] 20160420 various vulnerabilities in Node.js packages MISC:packetstormsecurity.com:CVE-2014-4330 MISC:packetstormsecurity.com:CVE-2016-0755 MISC:packetstormsecurity.com:CVE-2016-4979 MISC:savannah.nongnu.org:CVE-2014-9747 MISC:seclists.org:CVE-2014-4651 MISC:security-tracker.debian.org:CVE-2016-4000 MISC:security-tracker.debian.org:CVE-2017-0379 MISC:snyk.io:CVE-2015-9251 MISC:snyk.io:CVE-2016-4000 MISC:sw.aveva.com:CVE-2015-9251 MISC:web-in-security.blogspot.ca:CVE-2015-7940 MISC:web.archive.org:CVE-2013-7285 MISC:wiki.mozilla.org:CVE-2016-9843 MISC:www.arista.com:CVE-2016-6306 MISC:www.debian.org:CVE-2014-4172 MISC:www.fortiguard.com:CVE-2015-2327 MISC:www.fortiguard.com:CVE-2015-2328 MISC:www.fortiguard.com:CVE-2015-9104 MISC:www.fortiguard.com:CVE-2015-9105 MISC:www.mail-archive.com:CVE-2014-4172 MISC:www.openssl.org:CVE-2016-6302 MISC:www.oracle.com:CVE-2013-7285 MISC:www.oracle.com:CVE-2014-0107 MISC:www.oracle.com:CVE-2015-7501 MISC:www.oracle.com:CVE-2016-1000031 MISC:www.sourceclear.com:CVE-2015-8861 MISC:www.talosintelligence.com:CVE-2016-5684 MISC:www.tenable.com:CVE-2016-1000031 MISC:www.tenable.com:CVE-2016-6793 MLIST:[activemq-issues] 20190718 [jira] [Updated] (AMQ-7236) SEV-1 Security vulnerability in spring-expression-4.3.11.RELEASE.jar (spring framework) and xstream-1.4.10.jar MLIST:[activemq-issues] 20190826 [jira] [Created] (AMQ-7288) Security Vulnerabilities in ActiveMQ dependent libraries. MLIST:[announce] 20181105 [SECURITY] Immediately upgrade commons-fileupload to version 1.3.3 when running Struts 2.3.36 or prior MLIST:[apache-ignite-developers] 20180601 [CVE-2014-0114]: Apache Ignite is vulnerable to existing CVE-2014-0114 MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 MLIST:[debian-lts-announce] 20180306 [SECURITY] [DLA 1301-1] tomcat7 security update MLIST:[debian-lts-announce] 20180318 [SECURITY] [DLA 1309-1] curl security update MLIST:[debian-lts-announce] 20180627 [SECURITY] [DLA 1400-1] tomcat7 security update MLIST:[debian-lts-announce] 20180729 [SECURITY] [DLA 1450-1] tomcat8 security update MLIST:[debian-lts-announce] 20181105 [SECURITY] [DLA 1566-1] mysql-5.5 security update MLIST:[debian-lts-announce] 20181106 [SECURITY] [DLA 1568-1] curl security update MLIST:[debian-lts-announce] 20181122 [SECURITY] [DLA 1590-1] openjdk-7 security update MLIST:[debian-lts-announce] 20190201 [SECURITY] [DLA 1655-1] mariadb-10.0 security update MLIST:[debian-lts-announce] 20190324 [SECURITY] [DLA 1725-1] rsync security update MLIST:[debian-lts-announce] 20200129 [SECURITY] [DLA 2085-1] zlib security update MLIST:[flink-dev] 20190811 Apache flink 1.7.2 security issues MLIST:[flink-user] 20190811 Apache flink 1.7.2 security issues MLIST:[flink-user] 20190813 Apache flink 1.7.2 security issues MLIST:[flink-user] 20190813 Re: Apache flink 1.7.2 security issues MLIST:[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.... MLIST:[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.... MLIST:[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.... MLIST:[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.... MLIST:[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/ MLIST:[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/ MLIST:[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html secu... MLIST:[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html se... MLIST:[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/ MLIST:[httpd-cvs] 20210330 svn commit: r1073149 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/ MLIST:[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/ MLIST:[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.h... MLIST:[oss-security] 20091120 CVE request: php 5.3.1 update MLIST:[oss-security] 20091120 Re: CVE request: php 5.3.1 update MLIST:[oss-security] 20140109 Re: CVE request: remote code execution via deserialization in XStream MLIST:[oss-security] 20140220 Re: Possible CVE Requests: several issues fixed in Jenkins (Advisory 2014-02-14) MLIST:[oss-security] 20140616 CVE request for commons-beanutils: 'class' property is exposed, potentially leading to RCE MLIST:[oss-security] 20140707 Re: CVE request for commons-beanutils: 'class' property is exposed, potentially leading to RCE MLIST:[oss-security] 20140925 LSE Leading Security Experts GmbH - LSE-2014-06-10 - Perl CORE - Deep Recursion Stack Overflow MLIST:[oss-security] 20141121 Re: CVE request: heap buffer overflow in PCRE MLIST:[oss-security] 20150804 Re: CVE Request: Information disclosure in pcre MLIST:[oss-security] 20150828 CVE-2015-0852 [FreeImage] Integer overflow in PluginPCX.cpp MLIST:[oss-security] 20150911 CVE Request: 2 FreeType issues MLIST:[oss-security] 20150925 Re: CVE Request: 2 FreeType issues MLIST:[oss-security] 20151022 CVE Request: invalid curve attack on bouncycastle MLIST:[oss-security] 20151022 Re: CVE Request: invalid curve attack on bouncycastle MLIST:[oss-security] 20151128 Re: Heap Overflow in PCRE MLIST:[oss-security] 20160420 various vulnerabilities in Node.js packages MLIST:[oss-security] 20160423 Re: CVE request: PHP issues fixed in 7.0.5, 5.6.20 and 5.5.34 releases MLIST:[oss-security] 20160608 CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations MLIST:[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations MLIST:[oss-security] 20160609 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations MLIST:[oss-security] 20160705 CVE-2016-4979: HTTPD webserver - X509 Client certificate based authentication can be bypassed when HTTP/2 is used [vs] MLIST:[oss-security] 20160912 CVE-2016-6662 - MySQL Remote Root Code Execution / Privilege Escalation ( 0day ) MLIST:[oss-security] 20161117 Re: jasper: multiple assertion failures MLIST:[oss-security] 20161205 Re: CVE Request: zlib security issues found during audit MLIST:[perl.perl5.porters] 20140918 fix for CVE-2014-4330 present in blead MLIST:[php-announce] 20091119 5.3.1 Release announcement MLIST:[tomcat-dev] 20190319 svn commit: r1855831 [24/30] - in /tomcat/site/trunk: ./ docs/ xdocs/ MLIST:[tomcat-dev] 20190319 svn commit: r1855831 [25/30] - in /tomcat/site/trunk: ./ docs/ xdocs/ MLIST:[tomcat-dev] 20190325 svn commit: r1856174 [22/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/ MLIST:[tomcat-dev] 20190325 svn commit: r1856174 [23/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/ MLIST:[tomcat-dev] 20190325 svn commit: r1856174 [24/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/ MLIST:[tomcat-dev] 20190413 svn commit: r1857494 [16/20] - in /tomcat/site/trunk: ./ docs/ xdocs/ MLIST:[tomcat-dev] 20190413 svn commit: r1857494 [17/20] - in /tomcat/site/trunk: ./ docs/ xdocs/ MLIST:[tomcat-dev] 20190413 svn commit: r1857496 [3/4] - in /tomcat/site/trunk: ./ docs/ xdocs/ MLIST:[tomcat-dev] 20190415 svn commit: r1857582 [17/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/ MLIST:[tomcat-dev] 20190415 svn commit: r1857582 [18/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/ MLIST:[tomcat-dev] 20190415 svn commit: r1857582 [19/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/ MLIST:[xstream-user] 20130717 Re: Is it possible to unregister the DynamicProxyConverter using the SpringOXM wrapper MLIST:[xstream-user] 20130718 Re: Is it possible to unregister the DynamicProxyConverter using the SpringOXM wrapper OSS:2015/Q4/414 OSS:2015/Q4/419 OSS:2015/Q4/422 OSS:2016/Q1/258 OSS:2016/Q1/625 OSS:2016/Q2/122 OSS:2016/Q2/493 OSS:2016/Q3/137 OSS:2016/Q3/481 OSS:2016/Q3/602 OSS:2016/Q4/602 OSS:2016/Q4/719 OSS:2017/Q2/418 OSS:2017/Q4/297 OSS:2017/Q4/298 OSS:2017/Q4/299 OSS:2017/Q4/300 OSS:2017/Q4/301 OSS:2017/Q4/59 OSS:2017/Q4/60 OSS:2018/Q1/174 OSS:2018/Q1/235 OSS:2018/Q2/21 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/11/10/2 OSS:2022/Q3/99 OSS:2022/Q4/132 OSS:2022/Q4/135 OSS:2024/03/27/4 OSS:2024/Q1/256 Oracle:CVE-2011-4461 Oracle:CVE-2013-1768 Oracle:CVE-2014-0114 Oracle:CVE-2014-3490 Oracle:CVE-2014-3577 Oracle:CVE-2015-0204 Oracle:CVE-2015-0235 Oracle:CVE-2015-0405 Oracle:CVE-2015-0423 Oracle:CVE-2015-0433 Oracle:CVE-2015-0438 Oracle:CVE-2015-0439 Oracle:CVE-2015-0441 Oracle:CVE-2015-0498 Oracle:CVE-2015-0499 Oracle:CVE-2015-0500 Oracle:CVE-2015-0501 Oracle:CVE-2015-0503 Oracle:CVE-2015-0505 Oracle:CVE-2015-0506 Oracle:CVE-2015-0507 Oracle:CVE-2015-0508 Oracle:CVE-2015-0511 Oracle:CVE-2015-1832 Oracle:CVE-2015-2566 Oracle:CVE-2015-2567 Oracle:CVE-2015-2568 Oracle:CVE-2015-2571 Oracle:CVE-2015-2573 Oracle:CVE-2015-2575 Oracle:CVE-2015-2576 Oracle:CVE-2015-5600 Oracle:CVE-2015-6937 Oracle:CVE-2015-7501 Oracle:CVE-2015-7940 Oracle:CVE-2015-8965 Oracle:CVE-2015-9251 Oracle:CVE-2016-0635 Oracle:CVE-2016-0714 Oracle:CVE-2016-0729 Oracle:CVE-2016-1000031 Oracle:CVE-2016-1181 Oracle:CVE-2016-1182 Oracle:CVE-2016-1950 Oracle:CVE-2016-2099 Oracle:CVE-2016-2107 Oracle:CVE-2016-2176 Oracle:CVE-2016-2179 Oracle:CVE-2016-2183 Oracle:CVE-2016-3092 Oracle:CVE-2016-3506 Oracle:CVE-2016-4000 Oracle:CVE-2016-4055 Oracle:CVE-2016-4979 Oracle:CVE-2016-5007 Oracle:CVE-2016-5019 Oracle:CVE-2016-5080 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 Oracle:CVE-2016-5501 Oracle:CVE-2016-5538 Oracle:CVE-2016-5605 Oracle:CVE-2016-5608 Oracle:CVE-2016-5610 Oracle:CVE-2016-5611 Oracle:CVE-2016-5613 Oracle:CVE-2016-5616 Oracle:CVE-2016-5617 Oracle:CVE-2016-5684 Oracle:CVE-2016-6304 Oracle:CVE-2016-6662 Oracle:CVE-2016-6814 Oracle:CVE-2016-7103 Oracle:CVE-2016-7167 Oracle:CVE-2016-9583 Oracle:CVE-2016-9841 Oracle:CVE-2016-9843 Oracle:CVE-2016-9878 Oracle:CVE-2017-0379 Oracle:CVE-2017-10068 Oracle:CVE-2017-12617 Oracle:CVE-2017-13077 Oracle:CVE-2017-13745 Oracle:CVE-2017-14229 Oracle:CVE-2017-14735 Oracle:CVE-2017-15095 Oracle:CVE-2017-17562 Oracle:CVE-2017-3308 Oracle:CVE-2017-3309 Oracle:CVE-2017-3329 Oracle:CVE-2017-3453 Oracle:CVE-2017-3454 Oracle:CVE-2017-3456 Oracle:CVE-2017-3461 Oracle:CVE-2017-3462 Oracle:CVE-2017-3463 Oracle:CVE-2017-3464 Oracle:CVE-2017-3468 Oracle:CVE-2017-3600 Oracle:CVE-2017-3633 Oracle:CVE-2017-3732 Oracle:CVE-2017-3736 Oracle:CVE-2017-3737 Oracle:CVE-2017-5533 Oracle:CVE-2017-5645 Oracle:CVE-2017-5662 Oracle:CVE-2017-5664 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2017-6074 Oracle:CVE-2017-7525 Oracle:CVE-2017-7805 Oracle:CVE-2017-9798 Oracle:CVE-2018-0732 Oracle:CVE-2018-0734 Oracle:CVE-2018-0739 Oracle:CVE-2018-1000120 Oracle:CVE-2018-1000300 Oracle:CVE-2018-10933 Oracle:CVE-2018-11039 Oracle:CVE-2018-1171 Oracle:CVE-2018-11776 Oracle:CVE-2018-1258 Oracle:CVE-2018-1275 Oracle:CVE-2018-1305 Oracle:CVE-2018-13785 Oracle:CVE-2018-1656 Oracle:CVE-2018-2562 Oracle:CVE-2018-2563 Oracle:CVE-2018-2572 Oracle:CVE-2018-2587 Oracle:CVE-2018-2598 Oracle:CVE-2018-2612 Oracle:CVE-2018-2622 Oracle:CVE-2018-2628 Oracle:CVE-2018-2640 Oracle:CVE-2018-2665 Oracle:CVE-2018-2668 Oracle:CVE-2018-2676 Oracle:CVE-2018-2685 Oracle:CVE-2018-2686 Oracle:CVE-2018-2687 Oracle:CVE-2018-2688 Oracle:CVE-2018-2689 Oracle:CVE-2018-2690 Oracle:CVE-2018-2693 Oracle:CVE-2018-2694 Oracle:CVE-2018-2698 Oracle:CVE-2018-2718 Oracle:CVE-2018-2737 Oracle:CVE-2018-2738 Oracle:CVE-2018-2739 Oracle:CVE-2018-2742 Oracle:CVE-2018-2746 Oracle:CVE-2018-2747 Oracle:CVE-2018-2748 Oracle:CVE-2018-2749 Oracle:CVE-2018-2750 Oracle:CVE-2018-2752 Oracle:CVE-2018-2753 Oracle:CVE-2018-2754 Oracle:CVE-2018-2755 Oracle:CVE-2018-2756 Oracle:CVE-2018-2758 Oracle:CVE-2018-2759 Oracle:CVE-2018-2760 Oracle:CVE-2018-2761 Oracle:CVE-2018-2762 Oracle:CVE-2018-2763 Oracle:CVE-2018-2764 Oracle:CVE-2018-2765 Oracle:CVE-2018-2766 Oracle:CVE-2018-2767 Oracle:CVE-2018-2768 Oracle:CVE-2018-2769 Oracle:CVE-2018-2770 Oracle:CVE-2018-2771 Oracle:CVE-2018-2772 Oracle:CVE-2018-2773 Oracle:CVE-2018-2774 Oracle:CVE-2018-2775 Oracle:CVE-2018-2776 Oracle:CVE-2018-2777 Oracle:CVE-2018-2778 Oracle:CVE-2018-2779 Oracle:CVE-2018-2780 Oracle:CVE-2018-2781 Oracle:CVE-2018-2782 Oracle:CVE-2018-2783 Oracle:CVE-2018-2784 Oracle:CVE-2018-2785 Oracle:CVE-2018-2786 Oracle:CVE-2018-2787 Oracle:CVE-2018-2788 Oracle:CVE-2018-2789 Oracle:CVE-2018-2790 Oracle:CVE-2018-2791 Oracle:CVE-2018-2792 Oracle:CVE-2018-2793 Oracle:CVE-2018-2794 Oracle:CVE-2018-2795 Oracle:CVE-2018-2796 Oracle:CVE-2018-2797 Oracle:CVE-2018-2798 Oracle:CVE-2018-2799 Oracle:CVE-2018-2800 Oracle:CVE-2018-2801 Oracle:CVE-2018-2804 Oracle:CVE-2018-2805 Oracle:CVE-2018-2806 Oracle:CVE-2018-2807 Oracle:CVE-2018-2808 Oracle:CVE-2018-2809 Oracle:CVE-2018-2810 Oracle:CVE-2018-2811 Oracle:CVE-2018-2812 Oracle:CVE-2018-2813 Oracle:CVE-2018-2814 Oracle:CVE-2018-2815 Oracle:CVE-2018-2816 Oracle:CVE-2018-2817 Oracle:CVE-2018-2818 Oracle:CVE-2018-2819 Oracle:CVE-2018-2820 Oracle:CVE-2018-2821 Oracle:CVE-2018-2822 Oracle:CVE-2018-2823 Oracle:CVE-2018-2825 Oracle:CVE-2018-2826 Oracle:CVE-2018-2827 Oracle:CVE-2018-2828 Oracle:CVE-2018-2830 Oracle:CVE-2018-2831 Oracle:CVE-2018-2832 Oracle:CVE-2018-2834 Oracle:CVE-2018-2835 Oracle:CVE-2018-2836 Oracle:CVE-2018-2837 Oracle:CVE-2018-2838 Oracle:CVE-2018-2839 Oracle:CVE-2018-2840 Oracle:CVE-2018-2841 Oracle:CVE-2018-2842 Oracle:CVE-2018-2843 Oracle:CVE-2018-2844 Oracle:CVE-2018-2845 Oracle:CVE-2018-2846 Oracle:CVE-2018-2849 Oracle:CVE-2018-2850 Oracle:CVE-2018-2852 Oracle:CVE-2018-2854 Oracle:CVE-2018-2855 Oracle:CVE-2018-2856 Oracle:CVE-2018-2857 Oracle:CVE-2018-2858 Oracle:CVE-2018-2859 Oracle:CVE-2018-2860 Oracle:CVE-2018-2861 Oracle:CVE-2018-2862 Oracle:CVE-2018-2863 Oracle:CVE-2018-2864 Oracle:CVE-2018-2865 Oracle:CVE-2018-2866 Oracle:CVE-2018-2867 Oracle:CVE-2018-2868 Oracle:CVE-2018-2869 Oracle:CVE-2018-2870 Oracle:CVE-2018-2871 Oracle:CVE-2018-2872 Oracle:CVE-2018-2873 Oracle:CVE-2018-2874 Oracle:CVE-2018-2876 Oracle:CVE-2018-2877 Oracle:CVE-2018-2878 Oracle:CVE-2018-2879 Oracle:CVE-2018-2881 Oracle:CVE-2018-2882 Oracle:CVE-2018-2887 Oracle:CVE-2018-2888 Oracle:CVE-2018-2889 Oracle:CVE-2018-2891 Oracle:CVE-2018-2892 Oracle:CVE-2018-2893 Oracle:CVE-2018-2894 Oracle:CVE-2018-2895 Oracle:CVE-2018-2896 Oracle:CVE-2018-2897 Oracle:CVE-2018-2898 Oracle:CVE-2018-2899 Oracle:CVE-2018-2900 Oracle:CVE-2018-2901 Oracle:CVE-2018-2902 Oracle:CVE-2018-2903 Oracle:CVE-2018-2904 Oracle:CVE-2018-2905 Oracle:CVE-2018-2906 Oracle:CVE-2018-2907 Oracle:CVE-2018-2908 Oracle:CVE-2018-2909 Oracle:CVE-2018-2911 Oracle:CVE-2018-2912 Oracle:CVE-2018-2913 Oracle:CVE-2018-2914 Oracle:CVE-2018-2915 Oracle:CVE-2018-2916 Oracle:CVE-2018-2917 Oracle:CVE-2018-2918 Oracle:CVE-2018-2919 Oracle:CVE-2018-2920 Oracle:CVE-2018-2921 Oracle:CVE-2018-2922 Oracle:CVE-2018-2923 Oracle:CVE-2018-2924 Oracle:CVE-2018-2925 Oracle:CVE-2018-2926 Oracle:CVE-2018-2927 Oracle:CVE-2018-2928 Oracle:CVE-2018-2929 Oracle:CVE-2018-2930 Oracle:CVE-2018-2932 Oracle:CVE-2018-2933 Oracle:CVE-2018-2934 Oracle:CVE-2018-2935 Oracle:CVE-2018-2936 Oracle:CVE-2018-2937 Oracle:CVE-2018-2938 Oracle:CVE-2018-2939 Oracle:CVE-2018-2940 Oracle:CVE-2018-2941 Oracle:CVE-2018-2942 Oracle:CVE-2018-2943 Oracle:CVE-2018-2944 Oracle:CVE-2018-2945 Oracle:CVE-2018-2946 Oracle:CVE-2018-2947 Oracle:CVE-2018-2948 Oracle:CVE-2018-2949 Oracle:CVE-2018-2950 Oracle:CVE-2018-2951 Oracle:CVE-2018-2952 Oracle:CVE-2018-2953 Oracle:CVE-2018-2954 Oracle:CVE-2018-2955 Oracle:CVE-2018-2956 Oracle:CVE-2018-2957 Oracle:CVE-2018-2958 Oracle:CVE-2018-2959 Oracle:CVE-2018-2960 Oracle:CVE-2018-2961 Oracle:CVE-2018-2962 Oracle:CVE-2018-2963 Oracle:CVE-2018-2964 Oracle:CVE-2018-2965 Oracle:CVE-2018-2966 Oracle:CVE-2018-2967 Oracle:CVE-2018-2968 Oracle:CVE-2018-2969 Oracle:CVE-2018-2970 Oracle:CVE-2018-2971 Oracle:CVE-2018-2972 Oracle:CVE-2018-2973 Oracle:CVE-2018-2974 Oracle:CVE-2018-2975 Oracle:CVE-2018-2976 Oracle:CVE-2018-2977 Oracle:CVE-2018-2979 Oracle:CVE-2018-2980 Oracle:CVE-2018-2981 Oracle:CVE-2018-2982 Oracle:CVE-2018-2984 Oracle:CVE-2018-2985 Oracle:CVE-2018-2986 Oracle:CVE-2018-2987 Oracle:CVE-2018-2988 Oracle:CVE-2018-2989 Oracle:CVE-2018-2990 Oracle:CVE-2018-2991 Oracle:CVE-2018-2992 Oracle:CVE-2018-2993 Oracle:CVE-2018-2994 Oracle:CVE-2018-2995 Oracle:CVE-2018-2996 Oracle:CVE-2018-2997 Oracle:CVE-2018-2998 Oracle:CVE-2018-2999 Oracle:CVE-2018-3000 Oracle:CVE-2018-3001 Oracle:CVE-2018-3002 Oracle:CVE-2018-3003 Oracle:CVE-2018-3004 Oracle:CVE-2018-3005 Oracle:CVE-2018-3006 Oracle:CVE-2018-3007 Oracle:CVE-2018-3008 Oracle:CVE-2018-3009 Oracle:CVE-2018-3010 Oracle:CVE-2018-3011 Oracle:CVE-2018-3012 Oracle:CVE-2018-3013 Oracle:CVE-2018-3014 Oracle:CVE-2018-3015 Oracle:CVE-2018-3016 Oracle:CVE-2018-3017 Oracle:CVE-2018-3018 Oracle:CVE-2018-3019 Oracle:CVE-2018-3020 Oracle:CVE-2018-3021 Oracle:CVE-2018-3022 Oracle:CVE-2018-3023 Oracle:CVE-2018-3024 Oracle:CVE-2018-3025 Oracle:CVE-2018-3026 Oracle:CVE-2018-3027 Oracle:CVE-2018-3028 Oracle:CVE-2018-3029 Oracle:CVE-2018-3030 Oracle:CVE-2018-3031 Oracle:CVE-2018-3032 Oracle:CVE-2018-3033 Oracle:CVE-2018-3034 Oracle:CVE-2018-3035 Oracle:CVE-2018-3036 Oracle:CVE-2018-3037 Oracle:CVE-2018-3038 Oracle:CVE-2018-3039 Oracle:CVE-2018-3040 Oracle:CVE-2018-3041 Oracle:CVE-2018-3042 Oracle:CVE-2018-3043 Oracle:CVE-2018-3044 Oracle:CVE-2018-3045 Oracle:CVE-2018-3046 Oracle:CVE-2018-3047 Oracle:CVE-2018-3048 Oracle:CVE-2018-3049 Oracle:CVE-2018-3050 Oracle:CVE-2018-3051 Oracle:CVE-2018-3052 Oracle:CVE-2018-3053 Oracle:CVE-2018-3054 Oracle:CVE-2018-3055 Oracle:CVE-2018-3056 Oracle:CVE-2018-3057 Oracle:CVE-2018-3058 Oracle:CVE-2018-3059 Oracle:CVE-2018-3060 Oracle:CVE-2018-3061 Oracle:CVE-2018-3062 Oracle:CVE-2018-3063 Oracle:CVE-2018-3064 Oracle:CVE-2018-3065 Oracle:CVE-2018-3066 Oracle:CVE-2018-3067 Oracle:CVE-2018-3068 Oracle:CVE-2018-3069 Oracle:CVE-2018-3070 Oracle:CVE-2018-3071 Oracle:CVE-2018-3072 Oracle:CVE-2018-3073 Oracle:CVE-2018-3074 Oracle:CVE-2018-3075 Oracle:CVE-2018-3076 Oracle:CVE-2018-3077 Oracle:CVE-2018-3078 Oracle:CVE-2018-3079 Oracle:CVE-2018-3080 Oracle:CVE-2018-3081 Oracle:CVE-2018-3082 Oracle:CVE-2018-3084 Oracle:CVE-2018-3085 Oracle:CVE-2018-3086 Oracle:CVE-2018-3087 Oracle:CVE-2018-3088 Oracle:CVE-2018-3089 Oracle:CVE-2018-3090 Oracle:CVE-2018-3091 Oracle:CVE-2018-3092 Oracle:CVE-2018-3093 Oracle:CVE-2018-3094 Oracle:CVE-2018-3095 Oracle:CVE-2018-3096 Oracle:CVE-2018-3097 Oracle:CVE-2018-3098 Oracle:CVE-2018-3099 Oracle:CVE-2018-3100 Oracle:CVE-2018-3101 Oracle:CVE-2018-3102 Oracle:CVE-2018-3103 Oracle:CVE-2018-3104 Oracle:CVE-2018-3105 Oracle:CVE-2018-3108 Oracle:CVE-2018-3109 Oracle:CVE-2018-3115 Oracle:CVE-2018-3122 Oracle:CVE-2018-3125 Oracle:CVE-2018-3126 Oracle:CVE-2018-3127 Oracle:CVE-2018-3128 Oracle:CVE-2018-3129 Oracle:CVE-2018-3130 Oracle:CVE-2018-3131 Oracle:CVE-2018-3132 Oracle:CVE-2018-3133 Oracle:CVE-2018-3134 Oracle:CVE-2018-3135 Oracle:CVE-2018-3136 Oracle:CVE-2018-3137 Oracle:CVE-2018-3138 Oracle:CVE-2018-3139 Oracle:CVE-2018-3140 Oracle:CVE-2018-3141 Oracle:CVE-2018-3142 Oracle:CVE-2018-3143 Oracle:CVE-2018-3144 Oracle:CVE-2018-3145 Oracle:CVE-2018-3146 Oracle:CVE-2018-3147 Oracle:CVE-2018-3148 Oracle:CVE-2018-3149 Oracle:CVE-2018-3150 Oracle:CVE-2018-3151 Oracle:CVE-2018-3152 Oracle:CVE-2018-3153 Oracle:CVE-2018-3154 Oracle:CVE-2018-3155 Oracle:CVE-2018-3156 Oracle:CVE-2018-3157 Oracle:CVE-2018-3158 Oracle:CVE-2018-3159 Oracle:CVE-2018-3160 Oracle:CVE-2018-3161 Oracle:CVE-2018-3162 Oracle:CVE-2018-3163 Oracle:CVE-2018-3164 Oracle:CVE-2018-3165 Oracle:CVE-2018-3166 Oracle:CVE-2018-3167 Oracle:CVE-2018-3168 Oracle:CVE-2018-3169 Oracle:CVE-2018-3170 Oracle:CVE-2018-3171 Oracle:CVE-2018-3172 Oracle:CVE-2018-3173 Oracle:CVE-2018-3174 Oracle:CVE-2018-3175 Oracle:CVE-2018-3176 Oracle:CVE-2018-3177 Oracle:CVE-2018-3178 Oracle:CVE-2018-3179 Oracle:CVE-2018-3180 Oracle:CVE-2018-3181 Oracle:CVE-2018-3182 Oracle:CVE-2018-3183 Oracle:CVE-2018-3184 Oracle:CVE-2018-3185 Oracle:CVE-2018-3186 Oracle:CVE-2018-3187 Oracle:CVE-2018-3188 Oracle:CVE-2018-3189 Oracle:CVE-2018-3190 Oracle:CVE-2018-3191 Oracle:CVE-2018-3192 Oracle:CVE-2018-3193 Oracle:CVE-2018-3194 Oracle:CVE-2018-3195 Oracle:CVE-2018-3196 Oracle:CVE-2018-3197 Oracle:CVE-2018-3198 Oracle:CVE-2018-3200 Oracle:CVE-2018-3201 Oracle:CVE-2018-3202 Oracle:CVE-2018-3203 Oracle:CVE-2018-3204 Oracle:CVE-2018-3205 Oracle:CVE-2018-3206 Oracle:CVE-2018-3207 Oracle:CVE-2018-3208 Oracle:CVE-2018-3209 Oracle:CVE-2018-3210 Oracle:CVE-2018-3211 Oracle:CVE-2018-3212 Oracle:CVE-2018-3213 Oracle:CVE-2018-3214 Oracle:CVE-2018-3215 Oracle:CVE-2018-3217 Oracle:CVE-2018-3218 Oracle:CVE-2018-3219 Oracle:CVE-2018-3220 Oracle:CVE-2018-3221 Oracle:CVE-2018-3222 Oracle:CVE-2018-3223 Oracle:CVE-2018-3224 Oracle:CVE-2018-3225 Oracle:CVE-2018-3226 Oracle:CVE-2018-3227 Oracle:CVE-2018-3228 Oracle:CVE-2018-3229 Oracle:CVE-2018-3230 Oracle:CVE-2018-3231 Oracle:CVE-2018-3232 Oracle:CVE-2018-3233 Oracle:CVE-2018-3234 Oracle:CVE-2018-3235 Oracle:CVE-2018-3236 Oracle:CVE-2018-3237 Oracle:CVE-2018-3238 Oracle:CVE-2018-3239 Oracle:CVE-2018-3241 Oracle:CVE-2018-3242 Oracle:CVE-2018-3243 Oracle:CVE-2018-3244 Oracle:CVE-2018-3245 Oracle:CVE-2018-3246 Oracle:CVE-2018-3247 Oracle:CVE-2018-3248 Oracle:CVE-2018-3249 Oracle:CVE-2018-3250 Oracle:CVE-2018-3251 Oracle:CVE-2018-3252 Oracle:CVE-2018-3253 Oracle:CVE-2018-3254 Oracle:CVE-2018-3255 Oracle:CVE-2018-3256 Oracle:CVE-2018-3257 Oracle:CVE-2018-3258 Oracle:CVE-2018-3259 Oracle:CVE-2018-3261 Oracle:CVE-2018-3262 Oracle:CVE-2018-3263 Oracle:CVE-2018-3264 Oracle:CVE-2018-3265 Oracle:CVE-2018-3266 Oracle:CVE-2018-3267 Oracle:CVE-2018-3268 Oracle:CVE-2018-3269 Oracle:CVE-2018-3270 Oracle:CVE-2018-3271 Oracle:CVE-2018-3272 Oracle:CVE-2018-3273 Oracle:CVE-2018-3274 Oracle:CVE-2018-3275 Oracle:CVE-2018-3276 Oracle:CVE-2018-3277 Oracle:CVE-2018-3278 Oracle:CVE-2018-3279 Oracle:CVE-2018-3280 Oracle:CVE-2018-3281 Oracle:CVE-2018-3282 Oracle:CVE-2018-3283 Oracle:CVE-2018-3284 Oracle:CVE-2018-3285 Oracle:CVE-2018-3286 Oracle:CVE-2018-3287 Oracle:CVE-2018-3288 Oracle:CVE-2018-3289 Oracle:CVE-2018-3290 Oracle:CVE-2018-3291 Oracle:CVE-2018-3292 Oracle:CVE-2018-3293 Oracle:CVE-2018-3294 Oracle:CVE-2018-3295 Oracle:CVE-2018-3296 Oracle:CVE-2018-3297 Oracle:CVE-2018-3298 Oracle:CVE-2018-3299 Oracle:CVE-2018-3301 Oracle:CVE-2018-3302 Oracle:CVE-2018-3303 Oracle:CVE-2018-3304 Oracle:CVE-2018-3305 Oracle:CVE-2018-3309 Oracle:CVE-2018-3311 Oracle:CVE-2018-3639 Oracle:CVE-2018-7489 Oracle:CVE-2018-8013 Oracle:CVE-2018-8014 Oracle:CVE-2018-8037 Oracle:CVE-2019-10173 Oracle:CVE-2019-2395 Oracle:CVE-2019-2396 Oracle:CVE-2019-2397 Oracle:CVE-2019-2398 Oracle:CVE-2019-2399 Oracle:CVE-2019-2400 Oracle:CVE-2019-2401 Oracle:CVE-2019-2402 Oracle:CVE-2019-2403 Oracle:CVE-2019-2404 Oracle:CVE-2019-2405 Oracle:CVE-2019-2406 Oracle:CVE-2019-2407 Oracle:CVE-2019-2408 Oracle:CVE-2019-2409 Oracle:CVE-2019-2410 Oracle:CVE-2019-2411 Oracle:CVE-2019-2412 Oracle:CVE-2019-2413 Oracle:CVE-2019-2414 Oracle:CVE-2019-2415 Oracle:CVE-2019-2416 Oracle:CVE-2019-2417 Oracle:CVE-2019-2418 Oracle:CVE-2019-2419 Oracle:CVE-2019-2420 Oracle:CVE-2019-2421 Oracle:CVE-2019-2422 Oracle:CVE-2019-2423 Oracle:CVE-2019-2425 Oracle:CVE-2019-2426 Oracle:CVE-2019-2427 Oracle:CVE-2019-2429 Oracle:CVE-2019-2430 Oracle:CVE-2019-2431 Oracle:CVE-2019-2432 Oracle:CVE-2019-2433 Oracle:CVE-2019-2434 Oracle:CVE-2019-2435 Oracle:CVE-2019-2436 Oracle:CVE-2019-2437 Oracle:CVE-2019-2438 Oracle:CVE-2019-2439 Oracle:CVE-2019-2440 Oracle:CVE-2019-2441 Oracle:CVE-2019-2442 Oracle:CVE-2019-2443 Oracle:CVE-2019-2444 Oracle:CVE-2019-2445 Oracle:CVE-2019-2446 Oracle:CVE-2019-2447 Oracle:CVE-2019-2448 Oracle:CVE-2019-2449 Oracle:CVE-2019-2450 Oracle:CVE-2019-2451 Oracle:CVE-2019-2452 Oracle:CVE-2019-2453 Oracle:CVE-2019-2455 Oracle:CVE-2019-2456 Oracle:CVE-2019-2457 Oracle:CVE-2019-2458 Oracle:CVE-2019-2459 Oracle:CVE-2019-2460 Oracle:CVE-2019-2461 Oracle:CVE-2019-2462 Oracle:CVE-2019-2463 Oracle:CVE-2019-2464 Oracle:CVE-2019-2465 Oracle:CVE-2019-2466 Oracle:CVE-2019-2467 Oracle:CVE-2019-2468 Oracle:CVE-2019-2469 Oracle:CVE-2019-2470 Oracle:CVE-2019-2471 Oracle:CVE-2019-2472 Oracle:CVE-2019-2473 Oracle:CVE-2019-2474 Oracle:CVE-2019-2475 Oracle:CVE-2019-2476 Oracle:CVE-2019-2477 Oracle:CVE-2019-2478 Oracle:CVE-2019-2479 Oracle:CVE-2019-2480 Oracle:CVE-2019-2481 Oracle:CVE-2019-2482 Oracle:CVE-2019-2485 Oracle:CVE-2019-2486 Oracle:CVE-2019-2487 Oracle:CVE-2019-2488 Oracle:CVE-2019-2489 Oracle:CVE-2019-2490 Oracle:CVE-2019-2491 Oracle:CVE-2019-2492 Oracle:CVE-2019-2493 Oracle:CVE-2019-2494 Oracle:CVE-2019-2495 Oracle:CVE-2019-2496 Oracle:CVE-2019-2497 Oracle:CVE-2019-2498 Oracle:CVE-2019-2499 Oracle:CVE-2019-2500 Oracle:CVE-2019-2501 Oracle:CVE-2019-2502 Oracle:CVE-2019-2503 Oracle:CVE-2019-2504 Oracle:CVE-2019-2505 Oracle:CVE-2019-2506 Oracle:CVE-2019-2507 Oracle:CVE-2019-2508 Oracle:CVE-2019-2509 Oracle:CVE-2019-2510 Oracle:CVE-2019-2511 Oracle:CVE-2019-2512 Oracle:CVE-2019-2513 Oracle:CVE-2019-2519 Oracle:CVE-2019-2520 Oracle:CVE-2019-2521 Oracle:CVE-2019-2522 Oracle:CVE-2019-2523 Oracle:CVE-2019-2524 Oracle:CVE-2019-2525 Oracle:CVE-2019-2526 Oracle:CVE-2019-2527 Oracle:CVE-2019-2528 Oracle:CVE-2019-2529 Oracle:CVE-2019-2530 Oracle:CVE-2019-2531 Oracle:CVE-2019-2532 Oracle:CVE-2019-2533 Oracle:CVE-2019-2534 Oracle:CVE-2019-2535 Oracle:CVE-2019-2536 Oracle:CVE-2019-2537 Oracle:CVE-2019-2538 Oracle:CVE-2019-2539 Oracle:CVE-2019-2540 Oracle:CVE-2019-2541 Oracle:CVE-2019-2543 Oracle:CVE-2019-2544 Oracle:CVE-2019-2545 Oracle:CVE-2019-2546 Oracle:CVE-2019-2547 Oracle:CVE-2019-2548 Oracle:CVE-2019-2549 Oracle:CVE-2019-2550 Oracle:CVE-2019-2552 Oracle:CVE-2019-2553 Oracle:CVE-2019-2554 Oracle:CVE-2019-2555 Oracle:CVE-2019-2556 RH:CVE-2009-3559 RH:CVE-2012-6153 RH:CVE-2013-7285 RH:CVE-2014-3540 RH:CVE-2014-4330 RH:CVE-2014-4651 RH:CVE-2014-8964 RH:CVE-2014-9746 RH:CVE-2014-9747 RH:CVE-2015-0405 RH:CVE-2015-0423 RH:CVE-2015-0433 RH:CVE-2015-0438 RH:CVE-2015-0439 RH:CVE-2015-0441 RH:CVE-2015-0498 RH:CVE-2015-0499 RH:CVE-2015-0500 RH:CVE-2015-0501 RH:CVE-2015-0503 RH:CVE-2015-0505 RH:CVE-2015-0506 RH:CVE-2015-0507 RH:CVE-2015-0508 RH:CVE-2015-0511 RH:CVE-2015-2325 RH:CVE-2015-2326 RH:CVE-2015-2327 RH:CVE-2015-2328 RH:CVE-2015-2566 RH:CVE-2015-2567 RH:CVE-2015-2568 RH:CVE-2015-2571 RH:CVE-2015-2573 RH:CVE-2015-2575 RH:CVE-2015-2576 RH:CVE-2015-5125 RH:CVE-2015-5127 RH:CVE-2015-5129 RH:CVE-2015-5130 RH:CVE-2015-5131 RH:CVE-2015-5132 RH:CVE-2015-5134 RH:CVE-2015-5539 RH:CVE-2015-5540 RH:CVE-2015-5541 RH:CVE-2015-5544 RH:CVE-2015-5545 RH:CVE-2015-5551 RH:CVE-2015-5552 RH:CVE-2015-5553 RH:CVE-2015-5554 RH:CVE-2015-5555 RH:CVE-2015-5556 RH:CVE-2015-5557 RH:CVE-2015-5558 RH:CVE-2015-5559 RH:CVE-2015-5560 RH:CVE-2015-5561 RH:CVE-2015-5564 RH:CVE-2015-5565 RH:CVE-2015-5566 RH:CVE-2015-7559 RH:CVE-2015-8315 RH:CVE-2015-8381 RH:CVE-2015-8382 RH:CVE-2015-8383 RH:CVE-2015-8384 RH:CVE-2015-8385 RH:CVE-2015-8386 RH:CVE-2015-8387 RH:CVE-2015-8388 RH:CVE-2015-8389 RH:CVE-2015-8390 RH:CVE-2015-8391 RH:CVE-2015-8392 RH:CVE-2015-8393 RH:CVE-2015-8394 RH:CVE-2015-8395 RH:CVE-2015-8855 RH:CVE-2015-8860 RH:CVE-2016-0755 RH:CVE-2016-1672 RH:CVE-2016-1673 RH:CVE-2016-1674 RH:CVE-2016-1675 RH:CVE-2016-1676 RH:CVE-2016-1677 RH:CVE-2016-1678 RH:CVE-2016-1679 RH:CVE-2016-1680 RH:CVE-2016-1681 RH:CVE-2016-1682 RH:CVE-2016-1683 RH:CVE-2016-1684 RH:CVE-2016-1685 RH:CVE-2016-1686 RH:CVE-2016-1687 RH:CVE-2016-1688 RH:CVE-2016-1689 RH:CVE-2016-1690 RH:CVE-2016-1691 RH:CVE-2016-1692 RH:CVE-2016-1693 RH:CVE-2016-1694 RH:CVE-2016-1695 RH:CVE-2016-1950 RH:CVE-2016-1955 RH:CVE-2016-1956 RH:CVE-2016-1959 RH:CVE-2016-1967 RH:CVE-2016-1968 RH:CVE-2016-1969 RH:CVE-2016-1970 RH:CVE-2016-1971 RH:CVE-2016-1972 RH:CVE-2016-1973 RH:CVE-2016-1975 RH:CVE-2016-1976 RH:CVE-2016-3141 RH:CVE-2016-4055 RH:CVE-2016-4070 RH:CVE-2016-4979 RH:CVE-2016-5483 RH:CVE-2016-5617 RH:CVE-2016-6293 RH:CVE-2016-6294 RH:CVE-2016-6662 RH:CVE-2016-9586 RH:CVE-2016-9840 RH:CVE-2016-9841 RH:CVE-2016-9842 RH:CVE-2016-9843 RH:CVE-2017-3308 RH:CVE-2017-3309 RH:CVE-2017-3329 RH:CVE-2017-3453 RH:CVE-2017-3454 RH:CVE-2017-3456 RH:CVE-2017-3461 RH:CVE-2017-3462 RH:CVE-2017-3463 RH:CVE-2017-3464 RH:CVE-2017-3468 RH:CVE-2017-3600 RH:CVE-2017-9526 RH:CVE-2018-1000121 RH:CVE-2018-12539 RH:CVE-2018-1305 RH:CVE-2018-1517 RH:CVE-2018-1656 RH:CVE-2018-2767 RH:CVE-2018-2938 RH:CVE-2018-2940 RH:CVE-2018-2952 RH:CVE-2018-2973 RH:CVE-2019-2455 RH:CVE-2019-2481 RH:CVE-2019-2482 RH:CVE-2019-2503 RH:CVE-2019-2507 RH:CVE-2019-2510 RH:CVE-2019-2513 RH:CVE-2019-2528 RH:CVE-2019-2529 RH:CVE-2019-2530 RH:CVE-2019-2531 RH:CVE-2019-2532 RH:CVE-2019-2533 RH:CVE-2019-2534 RH:CVE-2019-2535 RH:CVE-2019-2536 RH:CVE-2019-2537 RH:CVE-2019-2539 RHBA-2015:1659 RHBA-2015:1762 RHBA-2015:1763 RHBA-2015:2142 RHBA-2019:0327 RHSA-2014:0216 RHSA-2014:0294 RHSA-2014:0323 RHSA-2014:0371 RHSA-2014:0372 RHSA-2014:0374 RHSA-2014:0389 RHSA-2014:0452 RHSA-2014:0474 RHSA-2014:0497 RHSA-2014:0498 RHSA-2014:0500 RHSA-2014:0511 RHSA-2014:0702 RHSA-2014:1007 RHSA-2014:1059 RHSA-2014:1082 RHSA-2014:1098 RHSA-2014:1146 RHSA-2014:1162 RHSA-2014:1163 RHSA-2014:1166 RHSA-2014:1320 RHSA-2014:1321 RHSA-2014:1322 RHSA-2014:1323 RHSA-2014:1833 RHSA-2014:1834 RHSA-2014:1835 RHSA-2014:1836 RHSA-2014:1891 RHSA-2014:1892 RHSA-2014:1904 RHSA-2014:2019 RHSA-2014:2020 RHSA-2015:0125 RHSA-2015:0158 RHSA-2015:0234 RHSA-2015:0235 RHSA-2015:0330 RHSA-2015:0675 RHSA-2015:0720 RHSA-2015:0765 RHSA-2015:0850 RHSA-2015:0851 RHSA-2015:1009 RHSA-2015:1176 RHSA-2015:1177 RHSA-2015:1603 RHSA-2015:1628 RHSA-2015:1629 RHSA-2015:1646 RHSA-2015:1647 RHSA-2015:1665 RHSA-2015:1888 RHSA-2016:0197 RHSA-2016:0370 RHSA-2016:0371 RHSA-2016:0373 RHSA-2016:0495 RHSA-2016:1025 RHSA-2016:1132 RHSA-2016:1190 RHSA-2016:1420 RHSA-2016:1773 RHSA-2016:1931 RHSA-2016:1940 RHSA-2016:2035 RHSA-2016:2036 RHSA-2016:2058 RHSA-2016:2059 RHSA-2016:2060 RHSA-2016:2061 RHSA-2016:2062 RHSA-2016:2077 RHSA-2016:2130 RHSA-2016:2131 RHSA-2016:2595 RHSA-2016:2749 RHSA-2016:2750 RHSA-2016:2927 RHSA-2016:2928 RHSA-2016:2957 RHSA-2017:0184 RHSA-2017:0193 RHSA-2017:0194 RHSA-2017:0272 RHSA-2017:0868 RHSA-2017:1208 RHSA-2017:1220 RHSA-2017:1221 RHSA-2017:1222 RHSA-2017:1658 RHSA-2017:1659 RHSA-2017:2192 RHSA-2017:2486 RHSA-2017:2596 RHSA-2017:2787 RHSA-2017:2886 RHSA-2017:2999 RHSA-2017:3046 RHSA-2017:3047 RHSA-2017:3189 RHSA-2017:3190 RHSA-2017:3453 RHSA-2018:0279 RHSA-2018:0342 RHSA-2018:0465 RHSA-2018:0466 RHSA-2018:0478 RHSA-2018:0479 RHSA-2018:0480 RHSA-2018:0481 RHSA-2018:0501 RHSA-2018:0574 RHSA-2018:0576 RHSA-2018:0577 RHSA-2018:1320 RHSA-2018:1447 RHSA-2018:1448 RHSA-2018:1449 RHSA-2018:1450 RHSA-2018:1451 RHSA-2018:2241 RHSA-2018:2242 RHSA-2018:2253 RHSA-2018:2254 RHSA-2018:2255 RHSA-2018:2256 RHSA-2018:2283 RHSA-2018:2286 RHSA-2018:2439 RHSA-2018:2568 RHSA-2018:2569 RHSA-2018:2575 RHSA-2018:2576 RHSA-2018:2669 RHSA-2018:2712 RHSA-2018:2713 RHSA-2018:2729 RHSA-2018:2927 RHSA-2018:2939 RHSA-2018:3007 RHSA-2018:3008 RHSA-2018:3157 RHSA-2018:3558 RHSA-2019:1258 RHSA-2019:1543 RHSA-2019:1822 RHSA-2019:1823 RHSA-2019:2205 RHSA-2019:2327 RHSA-2019:2413 RHSA-2019:2484 RHSA-2019:2511 RHSA-2019:2995 RHSA-2019:3708 RHSA-2019:3892 RHSA-2019:4352 RHSA-2020:0445 RHSA-2020:0544 RHSA-2020:0594 RHSA-2020:0727 RHSA-2020:0983 RHSA-2020:5663 SECTRACK ID: 1041302 SECTRACK:1032121 SECTRACK:1034077 SECTRACK:1034882 SECTRACK:1035215 SECTRACK:1035255 SECTRACK:1035981 SECTRACK:1036054 SECTRACK:1036056 SECTRACK:1036225 SECTRACK:1036377 SECTRACK:1036378 SECTRACK:1036393 SECTRACK:1036397 SECTRACK:1036769 SECTRACK:1037036 SECTRACK:1037046 SECTRACK:1037053 SECTRACK:1037515 SECTRACK:1037640 SECTRACK:1038287 SECTRACK:1039427 SECTRACK:1039596 SECTRACK:1039600 SECTRACK:1040428 SECTRACK:1040529 SECTRACK:1041294 SECTRACK:1041296 SECTRACK:1041302 SECTRACK:1041765 SECTRACK:1041887 SECTRACK:1041888 SECTRACK:1041896 SECUNIA:57477 SECUNIA:58710 SECUNIA:58851 SECUNIA:58947 SECUNIA:59014 SECUNIA:59118 SECUNIA:59228 SECUNIA:59245 SECUNIA:59246 SECUNIA:59430 SECUNIA:59464 SECUNIA:59479 SECUNIA:59480 SECUNIA:59704 SECUNIA:59718 SECUNIA:60177 SECUNIA:60703 SECUNIA:61441 SECUNIA:61961 SLACKWARE:SSA:2016-039-01 SMASH Issue 106174 SMASH Issue 106399 SMASH Issue 110951 SMASH Issue 115322 SMASH Issue 115944 SMASH Issue 115951 SMASH Issue 116060 SMASH Issue 121091 SMASH Issue 122403 SMASH Issue 157079 SMASH Issue 157080 SMASH Issue 159315 SMASH Issue 159316 SMASH Issue 159358 SMASH Issue 159359 SMASH Issue 159360 SMASH Issue 159361 SMASH Issue 159362 SMASH Issue 159363 SMASH Issue 159364 SMASH Issue 159365 SMASH Issue 159366 SMASH Issue 159367 SMASH Issue 159368 SMASH Issue 159369 SMASH Issue 159370 SMASH Issue 159501 SMASH Issue 161165 SMASH Issue 161277 SMASH Issue 162768 SMASH Issue 162800 SMASH Issue 162870 SMASH Issue 163267 SMASH Issue 168106 SMASH Issue 168107 SMASH Issue 168108 SMASH Issue 168109 SMASH Issue 168110 SMASH Issue 168111 SMASH Issue 168112 SMASH Issue 168113 SMASH Issue 168114 SMASH Issue 168115 SMASH Issue 168116 SMASH Issue 168117 SMASH Issue 168118 SMASH Issue 168119 SMASH Issue 168120 SMASH Issue 169465 SMASH Issue 169466 SMASH Issue 169472 SMASH Issue 169820 SMASH Issue 169849 SMASH Issue 170597 SMASH Issue 170598 SMASH Issue 172509 SMASH Issue 173284 SMASH Issue 173285 SMASH Issue 173743 SMASH Issue 173744 SMASH Issue 173746 SMASH Issue 173747 SMASH Issue 173748 SMASH Issue 173749 SMASH Issue 173750 SMASH Issue 177157 SMASH Issue 177158 SMASH Issue 177160 SMASH Issue 177510 SMASH Issue 177997 SMASH Issue 180273 SMASH Issue 183785 SMASH Issue 183803 SMASH Issue 183804 SMASH Issue 183903 SMASH Issue 186176 SMASH Issue 186594 SMASH Issue 195320 SMASH Issue 200729 SMASH Issue 201476 SMASH Issue 201809 SMASH Issue 203304 SMASH Issue 205710 SMASH Issue 210804 SMASH Issue 210805 SMASH Issue 210807 SMASH Issue 210809 SMASH Issue 210923 SMASH Issue 210972 SMASH Issue 211000 SMASH Issue 211001 SMASH Issue 211002 SMASH Issue 211003 SMASH Issue 211004 SMASH Issue 211005 SMASH Issue 211006 SMASH Issue 211038 SMASH Issue 211039 SMASH Issue 211040 SMASH Issue 211041 SMASH Issue 211042 SMASH Issue 211051 SMASH Issue 212718 SMASH Issue 212765 SMASH Issue 212925 SMASH Issue 216708 SMASH Issue 216720 SMASH Issue 216727 SMASH Issue 216869 SMASH Issue 216870 SMASH Issue 216871 SMASH Issue 216872 SMASH Issue 216873 SMASH Issue 216874 SMASH Issue 216875 SMASH Issue 216876 SMASH Issue 216877 SMASH Issue 216878 SMASH Issue 216879 SMASH Issue 216880 SMASH Issue 222884 SMASH Issue 222951 SMASH Issue 77111 SUSE:SUSE-SU-2015:0946 SUSE:SUSE-SU-2016:0727 SUSE:SUSE-SU-2016:0777 SUSE:SUSE-SU-2016:0820 SUSE:SUSE-SU-2016:0909 SUSE:SUSE-SU-2016:1277 SUSE:SUSE-SU-2016:2387 SUSE:SUSE-SU-2016:2394 SUSE:SUSE-SU-2016:2458 SUSE:SUSE-SU-2016:2468 SUSE:SUSE-SU-2016:2469 SUSE:SUSE-SU-2016:2470 SUSE:SUSE-SU-2017:2699 SUSE:SUSE-SU-2017:2700 SUSE:openSUSE-SU-2015:0858 SUSE:openSUSE-SU-2015:0967 SUSE:openSUSE-SU-2015:1911 SUSE:openSUSE-SU-2016:0360 SUSE:openSUSE-SU-2016:0373 SUSE:openSUSE-SU-2016:0376 SUSE:openSUSE-SU-2016:0731 SUSE:openSUSE-SU-2016:0733 SUSE:openSUSE-SU-2016:1274 SUSE:openSUSE-SU-2016:1373 SUSE:openSUSE-SU-2016:1430 SUSE:openSUSE-SU-2016:1433 SUSE:openSUSE-SU-2016:1496 SUSE:openSUSE-SU-2016:1557 SUSE:openSUSE-SU-2016:2391 SUSE:openSUSE-SU-2016:2407 SUSE:openSUSE-SU-2016:2496 SUSE:openSUSE-SU-2016:2537 SUSE:openSUSE-SU-2016:3202 SUSE:openSUSE-SU-2017:0077 SUSE:openSUSE-SU-2017:0080 SUSE:openSUSE-SU-2018:0458 UBUNTU:CVE-2009-3559 UBUNTU:CVE-2012-6153 UBUNTU:CVE-2013-7285 UBUNTU:CVE-2013-7451 UBUNTU:CVE-2013-7452 UBUNTU:CVE-2013-7453 UBUNTU:CVE-2013-7454 UBUNTU:CVE-2014-4330 UBUNTU:CVE-2014-8964 UBUNTU:CVE-2014-9746 UBUNTU:CVE-2014-9747 UBUNTU:CVE-2014-9772 UBUNTU:CVE-2015-0405 UBUNTU:CVE-2015-0423 UBUNTU:CVE-2015-0433 UBUNTU:CVE-2015-0438 UBUNTU:CVE-2015-0439 UBUNTU:CVE-2015-0441 UBUNTU:CVE-2015-0498 UBUNTU:CVE-2015-0499 UBUNTU:CVE-2015-0500 UBUNTU:CVE-2015-0501 UBUNTU:CVE-2015-0503 UBUNTU:CVE-2015-0505 UBUNTU:CVE-2015-0506 UBUNTU:CVE-2015-0507 UBUNTU:CVE-2015-0508 UBUNTU:CVE-2015-0511 UBUNTU:CVE-2015-2325 UBUNTU:CVE-2015-2326 UBUNTU:CVE-2015-2327 UBUNTU:CVE-2015-2328 UBUNTU:CVE-2015-2566 UBUNTU:CVE-2015-2567 UBUNTU:CVE-2015-2568 UBUNTU:CVE-2015-2571 UBUNTU:CVE-2015-2573 UBUNTU:CVE-2015-2575 UBUNTU:CVE-2015-5125 UBUNTU:CVE-2015-5127 UBUNTU:CVE-2015-5128 UBUNTU:CVE-2015-5129 UBUNTU:CVE-2015-5130 UBUNTU:CVE-2015-5131 UBUNTU:CVE-2015-5132 UBUNTU:CVE-2015-5134 UBUNTU:CVE-2015-5539 UBUNTU:CVE-2015-5540 UBUNTU:CVE-2015-5541 UBUNTU:CVE-2015-5544 UBUNTU:CVE-2015-5545 UBUNTU:CVE-2015-5551 UBUNTU:CVE-2015-5552 UBUNTU:CVE-2015-5553 UBUNTU:CVE-2015-5554 UBUNTU:CVE-2015-5555 UBUNTU:CVE-2015-5556 UBUNTU:CVE-2015-5557 UBUNTU:CVE-2015-5558 UBUNTU:CVE-2015-5559 UBUNTU:CVE-2015-5560 UBUNTU:CVE-2015-5561 UBUNTU:CVE-2015-5564 UBUNTU:CVE-2015-5565 UBUNTU:CVE-2015-5566 UBUNTU:CVE-2015-7559 UBUNTU:CVE-2015-8381 UBUNTU:CVE-2015-8382 UBUNTU:CVE-2015-8383 UBUNTU:CVE-2015-8384 UBUNTU:CVE-2015-8385 UBUNTU:CVE-2015-8386 UBUNTU:CVE-2015-8387 UBUNTU:CVE-2015-8388 UBUNTU:CVE-2015-8389 UBUNTU:CVE-2015-8390 UBUNTU:CVE-2015-8391 UBUNTU:CVE-2015-8392 UBUNTU:CVE-2015-8393 UBUNTU:CVE-2015-8394 UBUNTU:CVE-2015-8395 UBUNTU:CVE-2015-8854 UBUNTU:CVE-2015-8855 UBUNTU:CVE-2015-8856 UBUNTU:CVE-2015-8857 UBUNTU:CVE-2015-8858 UBUNTU:CVE-2015-8859 UBUNTU:CVE-2015-8860 UBUNTU:CVE-2015-8861 UBUNTU:CVE-2015-8862 UBUNTU:CVE-2016-0755 UBUNTU:CVE-2016-1672 UBUNTU:CVE-2016-1673 UBUNTU:CVE-2016-1674 UBUNTU:CVE-2016-1675 UBUNTU:CVE-2016-1676 UBUNTU:CVE-2016-1677 UBUNTU:CVE-2016-1678 UBUNTU:CVE-2016-1679 UBUNTU:CVE-2016-1680 UBUNTU:CVE-2016-1681 UBUNTU:CVE-2016-1682 UBUNTU:CVE-2016-1683 UBUNTU:CVE-2016-1684 UBUNTU:CVE-2016-1685 UBUNTU:CVE-2016-1686 UBUNTU:CVE-2016-1687 UBUNTU:CVE-2016-1688 UBUNTU:CVE-2016-1689 UBUNTU:CVE-2016-1690 UBUNTU:CVE-2016-1691 UBUNTU:CVE-2016-1692 UBUNTU:CVE-2016-1693 UBUNTU:CVE-2016-1694 UBUNTU:CVE-2016-1695 UBUNTU:CVE-2016-1950 UBUNTU:CVE-2016-1955 UBUNTU:CVE-2016-1956 UBUNTU:CVE-2016-1959 UBUNTU:CVE-2016-1967 UBUNTU:CVE-2016-1968 UBUNTU:CVE-2016-1969 UBUNTU:CVE-2016-1970 UBUNTU:CVE-2016-1971 UBUNTU:CVE-2016-1972 UBUNTU:CVE-2016-1973 UBUNTU:CVE-2016-1975 UBUNTU:CVE-2016-1976 UBUNTU:CVE-2016-2178 UBUNTU:CVE-2016-3141 UBUNTU:CVE-2016-4055 UBUNTU:CVE-2016-4070 UBUNTU:CVE-2016-4619 UBUNTU:CVE-2016-4979 UBUNTU:CVE-2016-5483 UBUNTU:CVE-2016-5501 UBUNTU:CVE-2016-5538 UBUNTU:CVE-2016-5605 UBUNTU:CVE-2016-5608 UBUNTU:CVE-2016-5610 UBUNTU:CVE-2016-5611 UBUNTU:CVE-2016-5613 UBUNTU:CVE-2016-6293 UBUNTU:CVE-2016-6294 UBUNTU:CVE-2016-6662 UBUNTU:CVE-2016-9586 UBUNTU:CVE-2016-9840 UBUNTU:CVE-2016-9841 UBUNTU:CVE-2016-9842 UBUNTU:CVE-2016-9843 UBUNTU:CVE-2017-3308 UBUNTU:CVE-2017-3309 UBUNTU:CVE-2017-3329 UBUNTU:CVE-2017-3453 UBUNTU:CVE-2017-3454 UBUNTU:CVE-2017-3456 UBUNTU:CVE-2017-3461 UBUNTU:CVE-2017-3462 UBUNTU:CVE-2017-3463 UBUNTU:CVE-2017-3464 UBUNTU:CVE-2017-3468 UBUNTU:CVE-2017-3600 UBUNTU:CVE-2017-9526 UBUNTU:CVE-2018-1000121 UBUNTU:CVE-2018-1258 UBUNTU:CVE-2018-1305 UBUNTU:CVE-2018-1517 UBUNTU:CVE-2018-1656 UBUNTU:CVE-2018-2767 UBUNTU:CVE-2018-2938 UBUNTU:CVE-2018-2940 UBUNTU:CVE-2018-2952 UBUNTU:CVE-2018-2973 UBUNTU:CVE-2018-3005 UBUNTU:CVE-2018-3055 UBUNTU:CVE-2018-3085 UBUNTU:CVE-2018-3086 UBUNTU:CVE-2018-3087 UBUNTU:CVE-2018-3088 UBUNTU:CVE-2018-3089 UBUNTU:CVE-2018-3090 UBUNTU:CVE-2018-3091 UBUNTU:CVE-2018-3287 UBUNTU:CVE-2018-3288 UBUNTU:CVE-2018-3289 UBUNTU:CVE-2018-3290 UBUNTU:CVE-2018-3291 UBUNTU:CVE-2018-3292 UBUNTU:CVE-2018-3293 UBUNTU:CVE-2018-3294 UBUNTU:CVE-2018-3295 UBUNTU:CVE-2018-3296 UBUNTU:CVE-2018-3297 UBUNTU:CVE-2018-3298 UBUNTU:CVE-2019-2455 UBUNTU:CVE-2019-2481 UBUNTU:CVE-2019-2482 UBUNTU:CVE-2019-2503 UBUNTU:CVE-2019-2507 UBUNTU:CVE-2019-2510 UBUNTU:CVE-2019-2513 UBUNTU:CVE-2019-2528 UBUNTU:CVE-2019-2529 UBUNTU:CVE-2019-2530 UBUNTU:CVE-2019-2531 UBUNTU:CVE-2019-2532 UBUNTU:CVE-2019-2533 UBUNTU:CVE-2019-2534 UBUNTU:CVE-2019-2535 UBUNTU:CVE-2019-2536 UBUNTU:CVE-2019-2537 UBUNTU:CVE-2019-2539 UBUNTU:USN-2575-1 UBUNTU:USN-2769-1 UBUNTU:USN-2882-1 UBUNTU:USN-2916-1 UBUNTU:USN-2917-1 UBUNTU:USN-2917-2 UBUNTU:USN-2917-3 UBUNTU:USN-2924-1 UBUNTU:USN-2934-1 UBUNTU:USN-2952-1 UBUNTU:USN-2952-2 UBUNTU:USN-2992-1 UBUNTU:USN-3598-1 UBUNTU:USN-3598-2 UBUNTU:USN-3665-1 UBUNTU:USN-3693-1 UBUNTU:USN-3725-1 UBUNTU:USN-3725-2 UBUNTU:USN-3727-1 UBUNTU:USN-3734-1 UBUNTU:USN-3735-1 UBUNTU:USN-3747-1 USN-3087-1 USN-3087-2 USN-3867-1 USN-4246-1 USN-4292-1 XF:perl-cve20144330-dos(96216) ZDI-16-570 ZDI-18-1232ZDI-CAN-6635 ZDI-18-1233ZDI-CAN-6591 ZDI-18-1234ZDI-CAN-6592 ZDI-18-1292ZDI-CAN-7329 bdo#1033297 bdo#583651 bdo#759718 bdo#782645 bdo#797165 bdo#798619 bdo#798620 bdo#802671 bdo#802971 bdo#838694 bdo#854713 bdo#860544 bdo#864859 bdo#867247 bdo#873383 bdo#885345 bdo#898444 bdo#898445 bdo#912848 bnc#1003579 bnc#1003580 bnc#1005621 bnc#1015332 bnc#1016653 bnc#1021757 bnc#1022633 bnc#1042326 bnc#1043777 bnc#1084524 bnc#1085215 bnc#1088681 bnc#1101644 bnc#1101645 bnc#1101656 bnc#1101667 bnc#1101675 bnc#1104668 bnc#1120866 bnc#1122198 bnc#885963 bnc#896715 bnc#924961 bnc#927623 bnc#941239 bnc#947966 bnc#957598 bnc#958373 bnc#962983 bnc#969821 bnc#969894 bnc#970257 bnc#970377 bnc#970378 bnc#970379 bnc#970380 bnc#970381 bnc#970431 bnc#970433 bnc#976547 bnc#977050 bnc#981886 bnc#983249 bnc#983519 bnc#987365 bnc#988162 bnc#998309 http://www.debian.org/security/2016/dsa-3560 https://git.php.net/?p=php-src.git%3Ba=commit%3Bh=95433e8e339dbb6b5d5541473c1661db6ba2c451 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO2RMVVZVV6NFTU46B5RYRK7ZCXYARZS/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M6BJG6RGDH7ZWVVAUFBFI5L32RSMQN2S/ https://security.netapp.com/advisory/ntap-20230216-0002/ https://support.f5.com/csp/article/K05052081?utm_source=f5support&%3Butm_medium=RSS https://support.f5.com/csp/article/K46337613?utm_source=f5support&%3Butm_medium=RSS https://support.f5.com/csp/article/K46337613?utm_source=f5support&utm_medium=RSS linux.git:commit:5535be3099717646781ce1540cf725965d680e7b linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 openssl.git:commit:399944622df7bd81af62e67ea967c470534090e2 rh#1051277 rh#1091938 rh#1101303 rh#1104858 rh#1107544 rh#1112877 rh#1116665 rh#1129074 rh#1129916 rh#1131350 rh#1139700 rh#1166147 rh#1167537 rh#1183461 rh#1187225 rh#1202366 rh#1202380 rh#1202384 rh#1202395 rh#1202418 rh#1203195 rh#1207198 rh#1207202 rh#1208428 rh#1209496 rh#1209501 rh#1212753 rh#1212755 rh#1212757 rh#1212758 rh#1212759 rh#1212760 rh#1212763 rh#1212764 rh#1212765 rh#1212767 rh#1212768 rh#1212769 rh#1212770 rh#1212771 rh#1212772 rh#1212774 rh#1212776 rh#1212777 rh#1212779 rh#1212780 rh#1212781 rh#1212782 rh#1212783 rh#1237223 rh#1252697 rh#1252707 rh#1256449 rh#1262373 rh#1277888 rh#1285399 rh#1285408 rh#1287614 rh#1287623 rh#1287629 rh#1287636 rh#1287646 rh#1287654 rh#1287659 rh#1287666 rh#1287671 rh#1287690 rh#1287695 rh#1287702 rh#1287711 rh#1291742 rh#1293972 rh#1302263 rh#1304645 rh#1310509 rh#1311503 rh#1315312 rh#1315328 rh#1315570 rh#1315571 rh#1315575 rh#1315776 rh#1315777 rh#1315780 rh#1315782 rh#1317560 rh#1323114 rh#1323749 rh#1329533 rh#1329552 rh#1340005 rh#1340006 rh#1340007 rh#1340008 rh#1340009 rh#1340010 rh#1340011 rh#1340012 rh#1340013 rh#1340014 rh#1340015 rh#1340016 rh#1340017 rh#1340018 rh#1340019 rh#1340021 rh#1340022 rh#1340023 rh#1340024 rh#1340026 rh#1340027 rh#1340028 rh#1340029 rh#1340030 rh#1341821 rh#1343400 rh#1343538 rh#1343540 rh#1352476 rh#1359811 rh#1360339 rh#1369383 rh#1375198 rh#1378936 rh#1384344 rh#1386562 rh#1386564 rh#1393454 rh#1396963 rh#1396971 rh#1397485 rh#1399546 rh#1402345 rh#1402346 rh#1402348 rh#1402351 rh#1405148 rh#1406712 rh#1414133 rh#1414429 rh#1433010 rh#1443358 rh#1443359 rh#1443360 rh#1443365 rh#1443366 rh#1443369 rh#1443376 rh#1443377 rh#1443378 rh#1443379 rh#1443385 rh#1443387 rh#1459887 rh#1485274 rh#1501812 rh#1501813 rh#1501814 rh#1501815 rh#1501816 rh#1501817 rh#1501818 rh#1501819 rh#1501820 rh#1516791 rh#1519780 rh#1548282 rh#1552631 rh#1553413 rh#1564965 rh#1578582 rh#1591854 rh#1600925 rh#1602141 rh#1602145 rh#1602146 rh#1607582 rh#1608073 rh#1614973 rh#1618767 rh#1618869 rh#1618871 rh#1666742 rh#1666743 rh#1666744 rh#1666749 rh#1666750 rh#1666751 rh#1666752 rh#1666753 rh#1666755 rh#1666756 rh#1666757 rh#1666758 rh#1666759 rh#1666760 rh#1666761 rh#1666762 rh#1666763 rh#1666764 rh#1714979 rh#1716448 rh#1716453 rh#1716454 rh#1722971 rh#1731271 rh#2061700 rh#2116175 rh#2119127 rh#2161287 rh#2270497 rh#539529 rh#873317 xf#141681 xf#141953 xf#141971 xf#141981 xf#141982 xf#144882 xf#146672 xf#146803 xf#146804 xf#146815 xf#146827 xf#146834 xf#146835 xf#151452 xf#151455 xf#151465 xf#151466 xf#151486 xf#151497 xf#151500 xf#151525 xf#151527 xf#151530 xf#155741 xf#155744 xf#155766 xf#155850 |
CVE-2015-2686 | kernel-source-rt:Unsupported | important | () | BID:73286 CONFIRM:git.kernel.org:CVE-2015-2686 CONFIRM:github.com:CVE-2015-2686 CVE-2015-2686 MISC:git.kernel.org:MLIST:[oss-security] 20150323 CVE Request: Linux kernel: sys_sendto/sys_recvfrom does not validate the user provided ubuf pointer MISC:grsecurity.net:CVE-2015-2686 MISC:twitter.com MLIST:[oss-security] 20150323 CVE Request: Linux kernel: sys_sendto/sys_recvfrom does not validate the user provided ubuf pointer RH:CVE-2015-2686 SMASH Issue 115013 UBUNTU:CVE-2015-2686 bnc#923924 rh#1205242 |
CVE-2015-2877 | kernel-source-rt:Unsupported | low | () | BID:76256 CERT-VN:VU#935424 CVE-2015-2877 MISC:www.antoniobarresi.com:CVE-2015-2877 MISC:www.kb.cert.org:CVE-2015-2877 MISC:www.usenix.org:CVE-2015-2877 RH:CVE-2015-2877 SMASH Issue 120842 UBUNTU:CVE-2015-2877 bnc#941252 rh#1252096 |
CVE-2015-3212 | kernel-source-rt:Already fixed | moderate | () | BID:74664 BID:75356 BID:75510 BID:76082 CONFIRM:git.kernel.org:CVE-2015-3212 CONFIRM:git.kernel.org:CVE-2015-4036 CONFIRM:git.kernel.org:CVE-2015-4700 CONFIRM:git.kernel.org:CVE-2015-5366 CONFIRM:github.com:CVE-2015-3212 CONFIRM:github.com:CVE-2015-4036 CONFIRM:github.com:CVE-2015-4700 CONFIRM:github.com:CVE-2015-5366 CONFIRM:kb.juniper.net:CVE-2015-5366 CONFIRM:support.f5.com:CVE-2014-8559 CONFIRM:www.kernel.org:CVE-2015-3212 CONFIRM:www.kernel.org:CVE-2015-5366 CONFIRM:www.oracle.com CONFIRM:www.oracle.com:CVE-2015-1351 CVE-2015-3212 CVE-2015-4036 CVE-2015-4700 CVE-2015-5364 CVE-2015-5366 DSA-3313 DSA-3329 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:MLIST:[oss-security] 20150622 Re: CVE request: Linux kernel - bpf jit optimization flaw can panic kenrel. MISC:twitter.com:CVE-2015-5364 MLIST:[oss-security] 20150513 CVE request for vhost/scsi possible memory corruption. MLIST:[oss-security] 20150622 Re: CVE request: Linux kernel - bpf jit optimization flaw can panic kenrel. MLIST:[oss-security] 20150630 CVE Request: UDP checksum DoS OSS:2015/Q2/785 OSS:2023/10/10/4 Oracle:CVE-2015-6937 RH:CVE-2015-3212 RH:CVE-2015-4036 RH:CVE-2015-4700 RH:CVE-2015-5364 RH:CVE-2015-5366 RHSA-2015:1623 RHSA-2015:1778 RHSA-2015:1787 RHSA-2015:1788 RHSA-2016:0045 RHSA-2016:1096 RHSA-2016:1100 RHSA-2016:1225 SECTRACK:1032794 SECTRACK:1033046 SECTRACK:1033169 SECTRACK:1033729 SMASH Issue 117926 SUSE:SUSE-SU-2015:1224 SUSE:SUSE-SU-2015:1324 SUSE:SUSE-SU-2015:1478 SUSE:SUSE-SU-2015:1487 SUSE:SUSE-SU-2015:1488 SUSE:SUSE-SU-2015:1489 SUSE:SUSE-SU-2015:1490 SUSE:SUSE-SU-2015:1491 SUSE:SUSE-SU-2015:1592 SUSE:SUSE-SU-2015:1611 SUSE:openSUSE-SU-2015:1382 UBUNTU:CVE-2015-3212 UBUNTU:CVE-2015-4036 UBUNTU:CVE-2015-4700 UBUNTU:CVE-2015-5364 UBUNTU:CVE-2015-5366 UBUNTU:USN-2633-1 UBUNTU:USN-2634-1 UBUNTU:USN-2680-1 UBUNTU:USN-2681-1 UBUNTU:USN-2682-1 UBUNTU:USN-2683-1 UBUNTU:USN-2684-1 UBUNTU:USN-2713-1 UBUNTU:USN-2714-1 UBUNTU:USN-2715-1 UBUNTU:USN-2716-1 UBUNTU:USN-2717-1 UBUNTU:USN-2718-1 UBUNTU:USN-2719-1 bnc#935705 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 rh#1183744 rh#1189864 rh#1202855 rh#1226442 rh#1233615 rh#1239029 rh#1243465 rh#2162080 rh#2162082 rh#2162084 rh#2162087 |
CVE-2015-3217 | pcre:Not affected | moderate | () | BID:75018 CONFIRM:bugs.exim.org:CVE-2015-2327 CONFIRM:bugs.exim.org:CVE-2015-2328 CONFIRM:bugs.exim.org:CVE-2015-3217 CONFIRM:bugs.exim.org:CVE-2015-8381 CONFIRM:vcs.pcre.org:CVE-2015-3217 CONFIRM:www-01.ibm.com:CVE-2016-3191 CVE-2015-3217 MISC:www.openwall.com MISC:www.openwall.com:MISC:www.openwall.com MLIST:[oss-security] 20150603 CVE-2015-3217: PCRE Library Call Stack Overflow Vulnerability in match() OSS:2015/Q2/618 OSS:2015/Q4/364 RH:CVE-2015-3217 RHSA-2016:1025 RHSA-2016:1132 RHSA-2016:2750 SMASH Issue 117309 UBUNTU:CVE-2015-3217 bnc#933878 rh#1228283 rh#1287629 rh#1311503 |
CVE-2015-3288 | kernel-source-rt:Not affected | moderate | () | BID:93591 CONFIRM:git.kernel.org:CVE-2015-3288 CONFIRM:github.com:CVE-2015-3288 CONFIRM:security-tracker.debian.org:CVE-2015-3288 CONFIRM:source.android.com:CVE-2017-0404 CONFIRM:www.kernel.org:CVE-2015-3288 CVE-2015-3288 D:CVE-2015-3288 Oracle:CVE-2016-5244 Oracle:CVE-2017-6074 RH:CVE-2015-3288 RHSA-2015:2152 SMASH Issue 168681 UBUNTU:CVE-2015-3288 bnc#979021 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1324749 rh#1333830 rh#1435719 rh#1439087 rh#1462147 rh#1462158 |
CVE-2015-3290 | kernel-source-rt:Not affected, ltp:Released | important | () | BID:76004 CONFIRM:git.kernel.org:CVE-2015-5157 CONFIRM:github.com:CVE-2015-5157 CONFIRM:www.kernel.org:CVE-2015-5697 CVE-2015-3290 DSA-3313 EXPLOIT-DB:37722 MISC:git.kernel.org:MLIST:[oss-security] 20150722 Linux x86_64 NMI security issues MLIST:[oss-security] 20150722 Linux x86_64 NMI security issues MLIST:[oss-security] 20150804 CVE-2015-3290: Linux privilege escalation due to nested NMIs interrupting espfix64 OSS:2015/Q3/291 OSS:2023/10/10/4 Oracle:CVE-2015-6937 RH:CVE-2015-3290 SMASH Issue 118600 SUSE:openSUSE-SU-2015:1382 UBUNTU:CVE-2015-3290 UBUNTU:USN-2687-1 UBUNTU:USN-2688-1 UBUNTU:USN-2689-1 UBUNTU:USN-2690-1 UBUNTU:USN-2691-1 bnc#937969 bnc#939269 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 rh#1243465 rh#1243489 rh#2162080 rh#2162082 rh#2162084 rh#2162087 |
CVE-2015-3291 | kernel-source-rt:Unsupported | low | 2.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N) | BID:76003 CONFIRM:git.kernel.org:CVE-2015-3291 CONFIRM:github.com:CVE-2015-3291 CVE-2015-3291 DSA-3313 MISC:bugzilla.redhat.com OSS:2015/Q3/168 OSS:2015/Q3/174 OSS:2023/10/10/4 Oracle:CVE-2015-6937 RH:CVE-2015-3291 RHSA-2013:0590 RHSA-2013:1752 RHSA-2013:1753 RHSA-2013:1779 RHSA-2014:0365 SMASH Issue 118601 UBUNTU:CVE-2015-3291 bnc#937970 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 rh#1016832 rh#1024552 rh#1034153 rh#1243465 rh#1243489 rh#426568 rh#804591 rh#807993 rh#837577 rh#909119 |
CVE-2015-3414 | sqlite3:Released | moderate | 4.4 (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H) | APPLE:APPLE-SA-2015-09-21-1 APPLE:APPLE-SA-2015-09-30-3 BID:74228 CONFIRM:support.apple.com:CVE-2015-5922 CONFIRM:support.apple.com:CVE-2015-7761 CONFIRM:www.oracle.com:CVE-2015-4879 CONFIRM:www.oracle.com:CVE-2018-3081 CONFIRM:www.sqlite.org:CVE-2015-3414 CVE-2015-3414 D:CVE-2015-3414 DSA-3252 FULLDISC:20150414 several issues in SQLite (+ catching up on several other bugs) GENTOO:GLSA-201507-05 MANDRIVA:MDVSA-2015:217 OSS:2015/Q2/819 RH:CVE-2015-3414 RHSA-2015:1635 SECTRACK:1033703 SMASH Issue 116275 UBUNTU:CVE-2015-3414 UBUNTU:USN-2698-1 bdo#783968 bnc#928700 rh#1212353 |
CVE-2015-3415 | sqlite3:Released | moderate | 6.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H) | APPLE:APPLE-SA-2015-09-21-1 APPLE:APPLE-SA-2015-09-30-3 BID:74228 CONFIRM:support.apple.com:CVE-2015-5922 CONFIRM:support.apple.com:CVE-2015-7761 CONFIRM:www.oracle.com:CVE-2015-4879 CONFIRM:www.oracle.com:CVE-2018-3081 CONFIRM:www.sqlite.org:CVE-2015-3415 CVE-2015-3415 D:CVE-2015-3415 DSA-3252 FULLDISC:20150414 several issues in SQLite (+ catching up on several other bugs) GENTOO:GLSA-201507-05 MANDRIVA:MDVSA-2015:217 RH:CVE-2015-3415 RHSA-2015:1635 SECTRACK:1033703 SMASH Issue 116276 UBUNTU:CVE-2015-3415 UBUNTU:USN-2698-1 bdo#783968 bnc#928701 rh#1212356 |
CVE-2015-3416 | sqlite3:Not affected | moderate | 6.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H) | APPLE:APPLE-SA-2015-09-21-1 APPLE:APPLE-SA-2015-09-30-3 BID:74228 CONFIRM:support.apple.com:CVE-2015-5922 CONFIRM:support.apple.com:CVE-2015-7761 CONFIRM:www.oracle.com:CVE-2015-4879 CONFIRM:www.oracle.com:CVE-2018-3081 CONFIRM:www.sqlite.org:CVE-2015-3416 CVE-2015-3416 D:CVE-2015-3416 DSA-3252 FULLDISC:20150414 several issues in SQLite (+ catching up on several other bugs) GENTOO:GLSA-201507-05 MANDRIVA:MDVSA-2015:217 OSS:2015/Q2/819 RH:CVE-2015-3416 RHSA-2015:1634 RHSA-2015:1635 SECTRACK:1033703 SMASH Issue 116277 UBUNTU:CVE-2015-3416 UBUNTU:USN-2698-1 bdo#783968 bnc#928702 rh#1212357 |
CVE-2015-3636 | kernel-source-rt:Not affected | moderate | () | BID:47503 BID:71883 BID:74450 CONFIRM:git.kernel.org:CVE-2011-1598 CONFIRM:git.kernel.org:CVE-2014-9584 CONFIRM:github.com:CVE-2014-9584 CONFIRM:www.kernel.org:CVE-2011-1748 CONFIRM:www.kernel.org:CVE-2014-9731 CONFIRM:www.kernel.org:CVE-2015-2830 CONFIRM:www.kernel.org:CVE-2015-8950 CONFIRM:www.oracle.com:CVE-2015-1351 CONFIRM:www.oracle.com:CVE-2016-2802 CVE-2011-1598 CVE-2014-9584 CVE-2015-3636 DSA-2240 DSA-2264 DSA-3128 FEDORA:FEDORA-2015-7784 MANDRIVA:MDVSA-2015:058 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:github.com:MLIST:[oss-security] 20150502 Re: CVE request for a fixed bug existed in all versions of linux kernel from KeenTeam MLIST:[netdev] 20110420 Add missing socket check in can/bcm release. MLIST:[oss-security] 20110420 CVE request: kernel: missing socket check in can/bcm release MLIST:[oss-security] 20110420 Re: CVE request: kernel: missing socket check in can/bcm release MLIST:[oss-security] 20110421 Re: CVE request: kernel: missing socket check in can/bcm release MLIST:[oss-security] 20110422 Re: CVE request: kernel: missing socket check in can/bcm release MLIST:[oss-security] 20110425 Re: CVE request: kernel: missing socket check in can/bcm release MLIST:[oss-security] 20150109 Re: CVE request Linux kernel: isofs: unchecked printing of ER records MLIST:[oss-security] 20150502 CVE request for a fixed bug existed in all versions of linux kernel from KeenTeam OSS:2023/10/10/4 Oracle:CVE-2015-6937 RH:CVE-2011-1598 RH:CVE-2014-9584 RH:CVE-2015-3636 RHSA-2011:0836 RHSA-2011:1253 RHSA-2015:0864 RHSA-2015:1137 RHSA-2015:1138 RHSA-2015:1139 RHSA-2015:1221 RHSA-2015:1534 RHSA-2015:1564 RHSA-2015:1565 RHSA-2015:1583 RHSA-2015:1643 SECTRACK:1033186 SMASH Issue 155981 SMASH Issue 45008 SUSE:SUSE-SU-2015:0481 SUSE:SUSE-SU-2015:0529 SUSE:SUSE-SU-2015:0652 SUSE:SUSE-SU-2015:0736 SUSE:SUSE-SU-2015:0812 SUSE:openSUSE-SU-2015:0566 SUSE:openSUSE-SU-2015:0714 UBUNTU:CVE-2011-1598 UBUNTU:CVE-2014-9584 UBUNTU:CVE-2015-3636 UBUNTU:USN-2511-1 UBUNTU:USN-2512-1 UBUNTU:USN-2513-1 UBUNTU:USN-2514-1 UBUNTU:USN-2515-1 UBUNTU:USN-2516-1 UBUNTU:USN-2517-1 UBUNTU:USN-2518-1 UBUNTU:USN-2633-1 UBUNTU:USN-2634-1 bdo#618485 bnc#688685 bnc#689038 bnc#929525 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4e2024624e678f0ebb916e6192bd23c1f9fdf696 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c6914a6f261aca0c9f715f883a353ae7ff51fe83 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 rh#1180119 rh#1183744 rh#1202855 rh#1218074 rh#2162080 rh#2162082 rh#2162084 rh#2162087 rh#698057 |
CVE-2015-4036 | kernel-source-rt:Already fixed | moderate | () | BID:74664 BID:75356 BID:75510 BID:76082 CONFIRM:git.kernel.org:CVE-2015-3212 CONFIRM:git.kernel.org:CVE-2015-4036 CONFIRM:git.kernel.org:CVE-2015-4700 CONFIRM:git.kernel.org:CVE-2015-5366 CONFIRM:github.com:CVE-2015-3212 CONFIRM:github.com:CVE-2015-4036 CONFIRM:github.com:CVE-2015-4700 CONFIRM:github.com:CVE-2015-5366 CONFIRM:kb.juniper.net:CVE-2015-5366 CONFIRM:support.f5.com:CVE-2014-8559 CONFIRM:www.kernel.org:CVE-2015-3212 CONFIRM:www.kernel.org:CVE-2015-5366 CONFIRM:www.oracle.com CONFIRM:www.oracle.com:CVE-2015-1351 CVE-2015-3212 CVE-2015-4036 CVE-2015-4700 CVE-2015-5364 CVE-2015-5366 DSA-3313 DSA-3329 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:MLIST:[oss-security] 20150622 Re: CVE request: Linux kernel - bpf jit optimization flaw can panic kenrel. MISC:twitter.com:CVE-2015-5364 MLIST:[oss-security] 20150513 CVE request for vhost/scsi possible memory corruption. MLIST:[oss-security] 20150622 Re: CVE request: Linux kernel - bpf jit optimization flaw can panic kenrel. MLIST:[oss-security] 20150630 CVE Request: UDP checksum DoS OSS:2015/Q2/785 OSS:2023/10/10/4 Oracle:CVE-2015-6937 RH:CVE-2015-3212 RH:CVE-2015-4036 RH:CVE-2015-4700 RH:CVE-2015-5364 RH:CVE-2015-5366 RHSA-2015:1623 RHSA-2015:1778 RHSA-2015:1787 RHSA-2015:1788 RHSA-2016:0045 RHSA-2016:1096 RHSA-2016:1100 RHSA-2016:1225 SECTRACK:1032794 SECTRACK:1033046 SECTRACK:1033169 SECTRACK:1033729 SMASH Issue 117926 SUSE:SUSE-SU-2015:1224 SUSE:SUSE-SU-2015:1324 SUSE:SUSE-SU-2015:1478 SUSE:SUSE-SU-2015:1487 SUSE:SUSE-SU-2015:1488 SUSE:SUSE-SU-2015:1489 SUSE:SUSE-SU-2015:1490 SUSE:SUSE-SU-2015:1491 SUSE:SUSE-SU-2015:1592 SUSE:SUSE-SU-2015:1611 SUSE:openSUSE-SU-2015:1382 UBUNTU:CVE-2015-3212 UBUNTU:CVE-2015-4036 UBUNTU:CVE-2015-4700 UBUNTU:CVE-2015-5364 UBUNTU:CVE-2015-5366 UBUNTU:USN-2633-1 UBUNTU:USN-2634-1 UBUNTU:USN-2680-1 UBUNTU:USN-2681-1 UBUNTU:USN-2682-1 UBUNTU:USN-2683-1 UBUNTU:USN-2684-1 UBUNTU:USN-2713-1 UBUNTU:USN-2714-1 UBUNTU:USN-2715-1 UBUNTU:USN-2716-1 UBUNTU:USN-2717-1 UBUNTU:USN-2718-1 UBUNTU:USN-2719-1 bnc#935705 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 rh#1183744 rh#1189864 rh#1202855 rh#1226442 rh#1233615 rh#1239029 rh#1243465 rh#2162080 rh#2162082 rh#2162084 rh#2162087 |
CVE-2015-4167 | kernel-source-rt:Not affected | important | () | BID:72607 BID:74951 BID:74963 CONFIRM:git.kernel.org:CVE-2015-1593 CONFIRM:www.kernel.org:CVE-2015-4167 CVE-2015-1593 CVE-2015-1805 CVE-2015-4167 CVE-2023-2002 D:CVE-2015-1593 DSA-3170 L3:42485 L3:44416 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org MISC:git.kernel.org:OSS:2023/04/16/3 MISC:hmarco.org:CVE-2015-1593 MLIST:[linux-kernel] 20150107 Re: [PATH] Fix stack randomization on x86_64 bit MLIST:[oss-security] 20150213 Re: CVE-Request -- Linux ASLR integer overflow MLIST:[oss-security] 20150602 CVE request Linux kernel: fs: udf kernel oops MLIST:[oss-security] 20150606 CVE-2015-1805 Linux kernel: pipe: iovec overrun leading to memory corruption OSS:2015/Q2/652 OSS:2017/Q2/500 OSS:2023/04/16/3 RH:CVE-2015-1593 RH:CVE-2015-1805 RH:CVE-2015-4167 RHSA-2010:0631 RHSA-2010:0660 RHSA-2010:0661 RHSA-2010:0670 RHSA-2010:0676 RHSA-2010:0677 RHSA-2010:0882 RHSA-2015:1042 RHSA-2015:1081 RHSA-2015:1082 RHSA-2015:1120 RHSA-2015:1137 RHSA-2015:1138 RHSA-2015:1139 RHSA-2015:1190 RHSA-2015:1199 RHSA-2015:1211 RHSA-2015:1221 RHSA-2015:2152 RHSA-2016:0103 RHSA-2016:0494 RHSA-2016:0617 RHSA-2019:3517 SECTRACK:1032454 SECTRACK:1033187 SMASH Issue 113891 SUSE:SUSE-SU-2015:1490 UBUNTU:CVE-2015-1593 UBUNTU:CVE-2015-1805 UBUNTU:CVE-2015-4167 UBUNTU:USN-2560-1 UBUNTU:USN-2564-1 UBUNTU:USN-2565-1 UBUNTU:USN-2679-1 UBUNTU:USN-2680-1 UBUNTU:USN-2681-1 bnc#917839 bnc#918554 bnc#959156 linux.git:commit:4e7c22d447bb6d7e37bfe39ff658486ae78e8d77 rh#1113899 rh#1163762 rh#1163792 rh#1192519 rh#1202855 rh#1228204 rh#1303961 rh#606611 |
CVE-2015-4176 | kernel-source-rt:Unsupported | low | () | CONFIRM:git.kernel.org:CVE-2015-4176 CONFIRM:github.com:CVE-2015-4176 CVE-2015-4176 MLIST:[oss-security] 20150604 Re: Re: CVE request Linux kernel: ns: user namespaces panic OSS:2015/Q2/640 RH:CVE-2015-4176 SMASH Issue 117334 UBUNTU:CVE-2015-4176 bnc#933971 rh#1249442 |
CVE-2015-4177 | kernel-source-rt:Unsupported | moderate | () | CONFIRM:git.kernel.org:CVE-2015-4177 CONFIRM:github.com:CVE-2015-4177 CONFIRM:www.kernel.org:CVE-2015-4178 CVE-2015-4177 MLIST:[oss-security] 20150529 CVE request Linux kernel: ns: user namespaces panic MLIST:[oss-security] 20150529 Re: CVE request Linux kernel: ns: user namespaces panic OSS:2015/Q2/640 RH:CVE-2015-4177 SMASH Issue 117333 UBUNTU:CVE-2015-4177 bnc#933970 rh#1248486 |
CVE-2015-4178 | kernel-source-rt:Unsupported | moderate | () | CONFIRM:git.kernel.org:CVE-2015-4178 CONFIRM:github.com:CVE-2015-4178 CVE-2015-4178 OSS:2015/Q2/640 RH:CVE-2015-4178 SMASH Issue 117335 UBUNTU:CVE-2015-4178 bnc#933969 rh#1249849 |
CVE-2015-4692 | kernel-source-rt:Not affected | important | () | BID:70095 BID:75142 CONFIRM:git.kernel.org:CVE-2014-3631 CONFIRM:git.kernel.org:CVE-2015-1805 CONFIRM:git.kernel.org:CVE-2015-2922 CONFIRM:git.kernel.org:CVE-2015-4167 CONFIRM:git.kernel.org:CVE-2015-4692 CONFIRM:www.kernel.org:CVE-2014-7145 CVE-2014-3631 CVE-2015-4692 EXPLOIT-DB:36268 FEDORA:FEDORA-2015-10677 FEDORA:FEDORA-2015-10678 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MLIST:[oss-security] 20150620 Re: CVE request -- Linux kernel - kvm: x86: NULL pointer dereference in kvm_apic_has_events function OSVDB:111298 RH:CVE-2014-3631 RH:CVE-2015-4692 RHSA-2014:1971 SECTRACK:1032798 SMASH Issue 106051 UBUNTU:CVE-2014-3631 UBUNTU:CVE-2015-4692 UBUNTU:USN-2378-1 UBUNTU:USN-2379-1 UBUNTU:USN-2682-1 UBUNTU:USN-2683-1 UBUNTU:USN-2684-1 bnc#896262 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=95389b08d93d5c06ec63ab49bd732b0069b7c35e linux.git:commit:95389b08d93d5c06ec63ab49bd732b0069b7c35e rh#1140325 rh#1230770 |
CVE-2015-4700 | kernel-source-rt:Already fixed | moderate | () | BID:74664 BID:75356 BID:75510 BID:76082 CONFIRM:git.kernel.org:CVE-2015-3212 CONFIRM:git.kernel.org:CVE-2015-4036 CONFIRM:git.kernel.org:CVE-2015-4700 CONFIRM:git.kernel.org:CVE-2015-5366 CONFIRM:github.com:CVE-2015-3212 CONFIRM:github.com:CVE-2015-4036 CONFIRM:github.com:CVE-2015-4700 CONFIRM:github.com:CVE-2015-5366 CONFIRM:kb.juniper.net:CVE-2015-5366 CONFIRM:support.f5.com:CVE-2014-8559 CONFIRM:www.kernel.org:CVE-2015-3212 CONFIRM:www.kernel.org:CVE-2015-5366 CONFIRM:www.oracle.com CONFIRM:www.oracle.com:CVE-2015-1351 CVE-2015-3212 CVE-2015-4036 CVE-2015-4700 CVE-2015-5364 CVE-2015-5366 DSA-3313 DSA-3329 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:MLIST:[oss-security] 20150622 Re: CVE request: Linux kernel - bpf jit optimization flaw can panic kenrel. MISC:twitter.com:CVE-2015-5364 MLIST:[oss-security] 20150513 CVE request for vhost/scsi possible memory corruption. MLIST:[oss-security] 20150622 Re: CVE request: Linux kernel - bpf jit optimization flaw can panic kenrel. MLIST:[oss-security] 20150630 CVE Request: UDP checksum DoS OSS:2015/Q2/785 OSS:2023/10/10/4 Oracle:CVE-2015-6937 RH:CVE-2015-3212 RH:CVE-2015-4036 RH:CVE-2015-4700 RH:CVE-2015-5364 RH:CVE-2015-5366 RHSA-2015:1623 RHSA-2015:1778 RHSA-2015:1787 RHSA-2015:1788 RHSA-2016:0045 RHSA-2016:1096 RHSA-2016:1100 RHSA-2016:1225 SECTRACK:1032794 SECTRACK:1033046 SECTRACK:1033169 SECTRACK:1033729 SMASH Issue 117926 SUSE:SUSE-SU-2015:1224 SUSE:SUSE-SU-2015:1324 SUSE:SUSE-SU-2015:1478 SUSE:SUSE-SU-2015:1487 SUSE:SUSE-SU-2015:1488 SUSE:SUSE-SU-2015:1489 SUSE:SUSE-SU-2015:1490 SUSE:SUSE-SU-2015:1491 SUSE:SUSE-SU-2015:1592 SUSE:SUSE-SU-2015:1611 SUSE:openSUSE-SU-2015:1382 UBUNTU:CVE-2015-3212 UBUNTU:CVE-2015-4036 UBUNTU:CVE-2015-4700 UBUNTU:CVE-2015-5364 UBUNTU:CVE-2015-5366 UBUNTU:USN-2633-1 UBUNTU:USN-2634-1 UBUNTU:USN-2680-1 UBUNTU:USN-2681-1 UBUNTU:USN-2682-1 UBUNTU:USN-2683-1 UBUNTU:USN-2684-1 UBUNTU:USN-2713-1 UBUNTU:USN-2714-1 UBUNTU:USN-2715-1 UBUNTU:USN-2716-1 UBUNTU:USN-2717-1 UBUNTU:USN-2718-1 UBUNTU:USN-2719-1 bnc#935705 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 rh#1183744 rh#1189864 rh#1202855 rh#1226442 rh#1233615 rh#1239029 rh#1243465 rh#2162080 rh#2162082 rh#2162084 rh#2162087 |
CVE-2015-5157 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | BID:76005 CONFIRM:git.kernel.org:CVE-2015-5157 CONFIRM:github.com:CVE-2015-5157 CONFIRM:www.kernel.org:CVE-2015-5697 CONFIRM:www.oracle.com:CVE-2015-1351 CONFIRM:www.oracle.com:CVE-2015-8391 CVE-2015-5157 DSA-3313 MLIST:[oss-security] 20150722 Linux x86_64 NMI security issues OSS:2023/10/10/4 Oracle:CVE-2015-6937 RH:CVE-2015-5157 RHSA-2016:0185 RHSA-2016:0212 RHSA-2016:0224 RHSA-2016:0715 SMASH Issue 119120 SUSE:SUSE-SU-2015:1727 SUSE:SUSE-SU-2015:2108 SUSE:SUSE-SU-2015:2339 SUSE:SUSE-SU-2015:2350 SUSE:SUSE-SU-2016:0354 UBUNTU:CVE-2015-5157 UBUNTU:USN-2687-1 UBUNTU:USN-2688-1 UBUNTU:USN-2689-1 UBUNTU:USN-2690-1 UBUNTU:USN-2691-1 bnc#938706 bnc#939207 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 linux.git:commit:37868fe113ff2ba814b3b4eb12df214df555f8dc rh#1243465 rh#1243852 rh#1259577 rh#2162080 rh#2162082 rh#2162084 rh#2162087 |
CVE-2015-5180 | glibc:Not affected | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | BID:99324 CONFIRM:sourceware.org:CVE-2015-5180 CVE-2015-5180 GENTOO:GLSA-201706-19 L3:66840 MISC:sourceware.org:/git/gitweb.cgi MISC:www.oracle.com:CVE-2019-0217 MLIST:[libc-alpha@sourceware.org] 20170205 The GNU C Library version 2.25 is now available Oracle:CVE-2015-5180 RH:CVE-2015-5180 RHSA-2018:0805 SMASH Issue 120979 UBUNTU:CVE-2015-5180 UBUNTU:USN-3239-1 UBUNTU:USN-3239-2 bnc#941234 rh#1249603 rh#1504804 |
CVE-2015-5283 | kernel-source-rt:Ignore | moderate | () | BID:77058 CONFIRM:git.kernel.org:CVE-2015-5283 CONFIRM:github.com:CVE-2015-5283 CONFIRM:patchwork.ozlabs.org:CVE-2015-5283 CONFIRM:security-tracker.debian.org:CVE-2015-5283 CONFIRM:www.kernel.org:CVE-2015-5283 CONFIRM:www.oracle.com CVE-2015-5283 D:CVE-2015-5283 DSA-3372 OSS:2023/10/10/4 Oracle:CVE-2015-6937 RH:CVE-2015-5283 RHSA-2015:2152 RHSA-2015:2411 SECTRACK:1033808 SMASH Issue 156885 SUSE:SUSE-SU-2015:1727 SUSE:SUSE-SU-2015:2194 UBUNTU:CVE-2015-5283 UBUNTU:USN-2823-1 UBUNTU:USN-2826-1 UBUNTU:USN-2829-1 UBUNTU:USN-2829-2 bnc#947155 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 rh#1243465 rh#1257528 rh#2162080 rh#2162082 rh#2162084 rh#2162087 |
CVE-2015-5307 | kernel-source-rt:Not affected | moderate | () | BID:77528 CONFIRM:git.kernel.org:CVE-2015-5307 CONFIRM:kb.juniper.net:CVE-2017-2334 CONFIRM:support.citrix.com:CVE-2015-8104 CONFIRM:www.oracle.com CONFIRM:www.oracle.com:CVE-2015-1351 CONFIRM:www.oracle.com:CVE-2015-7744 CONFIRM:www.oracle.com:CVE-2016-2105 CONFIRM:xenbits.xen.org:CVE-2015-8104 CVE-2015-5307 D:CVE-2015-5307 D:CVE-2022-2590 DSA-3396 DSA-3414 DSA-3454 FEDORA:FEDORA-2015-394835a3f6 FEDORA:FEDORA-2015-668d213dc3 FEDORA:FEDORA-2015-f150b2a8c8 MISC:bugzilla.redhat.com MLIST:[oss-security] 20151110 Re: CVE-2015-5307 kernel: kvm: guest to host DoS by triggering an infinite loop in microcode via #AC exception OSS:2015/Q4/245 OSS:2015/Q4/248 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 OSS:2023/10/10/4 Oracle:CVE-2015-5307 Oracle:CVE-2015-6937 Oracle:CVE-2016-5195 RH:CVE-2015-5307 RHSA-2013:0590 RHSA-2013:1752 RHSA-2013:1753 RHSA-2013:1779 RHSA-2014:0365 RHSA-2015:2552 RHSA-2015:2587 RHSA-2015:2636 RHSA-2015:2645 RHSA-2016:0004 RHSA-2016:0024 RHSA-2016:0046 SECTRACK:1034105 SMASH Issue 158544 SUSE:SUSE-SU-2015:2108 SUSE:SUSE-SU-2015:2194 SUSE:SUSE-SU-2015:2339 SUSE:SUSE-SU-2015:2350 SUSE:SUSE-SU-2016:0354 SUSE:SUSE-SU-2016:2074 SUSE:openSUSE-SU-2015:2232 SUSE:openSUSE-SU-2015:2250 UBUNTU:CVE-2015-5307 UBUNTU:USN-2800-1 UBUNTU:USN-2801-1 UBUNTU:USN-2802-1 UBUNTU:USN-2803-1 UBUNTU:USN-2804-1 UBUNTU:USN-2805-1 UBUNTU:USN-2806-1 UBUNTU:USN-2807-1 bnc#953527 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 linux.git:commit:54a20552e1eae07aa240fa370a0293e006b5faed linux.git:commit:5535be3099717646781ce1540cf725965d680e7b rh#1016832 rh#1024552 rh#1034153 rh#1243489 rh#1277172 rh#1384344 rh#2116175 rh#2162080 rh#2162082 rh#2162084 rh#2162087 rh#426568 rh#804591 rh#807993 rh#837577 rh#909119 |
CVE-2015-5364 | kernel-source-rt:Already fixed | moderate | () | BID:74664 BID:75356 BID:75510 BID:76082 CONFIRM:git.kernel.org:CVE-2015-3212 CONFIRM:git.kernel.org:CVE-2015-4036 CONFIRM:git.kernel.org:CVE-2015-4700 CONFIRM:git.kernel.org:CVE-2015-5366 CONFIRM:github.com:CVE-2015-3212 CONFIRM:github.com:CVE-2015-4036 CONFIRM:github.com:CVE-2015-4700 CONFIRM:github.com:CVE-2015-5366 CONFIRM:kb.juniper.net:CVE-2015-5366 CONFIRM:support.f5.com:CVE-2014-8559 CONFIRM:www.kernel.org:CVE-2015-3212 CONFIRM:www.kernel.org:CVE-2015-5366 CONFIRM:www.oracle.com CONFIRM:www.oracle.com:CVE-2015-1351 CVE-2015-3212 CVE-2015-4036 CVE-2015-4700 CVE-2015-5364 CVE-2015-5366 DSA-3313 DSA-3329 L3:43705 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:MLIST:[oss-security] 20150622 Re: CVE request: Linux kernel - bpf jit optimization flaw can panic kenrel. MISC:twitter.com:CVE-2015-5364 MLIST:[oss-security] 20150513 CVE request for vhost/scsi possible memory corruption. MLIST:[oss-security] 20150622 Re: CVE request: Linux kernel - bpf jit optimization flaw can panic kenrel. MLIST:[oss-security] 20150630 CVE Request: UDP checksum DoS OSS:2015/Q2/785 OSS:2023/10/10/4 Oracle:CVE-2015-6937 RH:CVE-2015-3212 RH:CVE-2015-4036 RH:CVE-2015-4700 RH:CVE-2015-5364 RH:CVE-2015-5366 RHSA-2015:1623 RHSA-2015:1778 RHSA-2015:1787 RHSA-2015:1788 RHSA-2016:0045 RHSA-2016:1096 RHSA-2016:1100 RHSA-2016:1225 SECTRACK:1032794 SECTRACK:1033046 SECTRACK:1033169 SECTRACK:1033729 SMASH Issue 117926 SMASH Issue 138139 SUSE:SUSE-SU-2015:1224 SUSE:SUSE-SU-2015:1324 SUSE:SUSE-SU-2015:1478 SUSE:SUSE-SU-2015:1487 SUSE:SUSE-SU-2015:1488 SUSE:SUSE-SU-2015:1489 SUSE:SUSE-SU-2015:1490 SUSE:SUSE-SU-2015:1491 SUSE:SUSE-SU-2015:1592 SUSE:SUSE-SU-2015:1611 SUSE:openSUSE-SU-2015:1382 UBUNTU:CVE-2015-3212 UBUNTU:CVE-2015-4036 UBUNTU:CVE-2015-4700 UBUNTU:CVE-2015-5364 UBUNTU:CVE-2015-5366 UBUNTU:USN-2633-1 UBUNTU:USN-2634-1 UBUNTU:USN-2680-1 UBUNTU:USN-2681-1 UBUNTU:USN-2682-1 UBUNTU:USN-2683-1 UBUNTU:USN-2684-1 UBUNTU:USN-2713-1 UBUNTU:USN-2714-1 UBUNTU:USN-2715-1 UBUNTU:USN-2716-1 UBUNTU:USN-2717-1 UBUNTU:USN-2718-1 UBUNTU:USN-2719-1 bnc#935705 bnc#942914 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 rh#1183744 rh#1189864 rh#1202855 rh#1226442 rh#1233615 rh#1239029 rh#1243465 rh#2162080 rh#2162082 rh#2162084 rh#2162087 |
CVE-2015-5366 | kernel-source-rt:Already fixed | moderate | () | BID:74664 BID:75356 BID:75510 BID:76082 CONFIRM:git.kernel.org:CVE-2015-3212 CONFIRM:git.kernel.org:CVE-2015-4036 CONFIRM:git.kernel.org:CVE-2015-4700 CONFIRM:git.kernel.org:CVE-2015-5366 CONFIRM:github.com:CVE-2015-3212 CONFIRM:github.com:CVE-2015-4036 CONFIRM:github.com:CVE-2015-4700 CONFIRM:github.com:CVE-2015-5366 CONFIRM:kb.juniper.net:CVE-2015-5366 CONFIRM:support.f5.com:CVE-2014-8559 CONFIRM:www.kernel.org:CVE-2015-3212 CONFIRM:www.kernel.org:CVE-2015-5366 CONFIRM:www.oracle.com CONFIRM:www.oracle.com:CVE-2015-1351 CVE-2015-3212 CVE-2015-4036 CVE-2015-4700 CVE-2015-5364 CVE-2015-5366 DSA-3313 DSA-3329 L3:43705 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:MLIST:[oss-security] 20150622 Re: CVE request: Linux kernel - bpf jit optimization flaw can panic kenrel. MISC:twitter.com:CVE-2015-5364 MLIST:[oss-security] 20150513 CVE request for vhost/scsi possible memory corruption. MLIST:[oss-security] 20150622 Re: CVE request: Linux kernel - bpf jit optimization flaw can panic kenrel. MLIST:[oss-security] 20150630 CVE Request: UDP checksum DoS OSS:2015/Q2/785 OSS:2023/10/10/4 Oracle:CVE-2015-6937 RH:CVE-2015-3212 RH:CVE-2015-4036 RH:CVE-2015-4700 RH:CVE-2015-5364 RH:CVE-2015-5366 RHSA-2015:1623 RHSA-2015:1778 RHSA-2015:1787 RHSA-2015:1788 RHSA-2016:0045 RHSA-2016:1096 RHSA-2016:1100 RHSA-2016:1225 SECTRACK:1032794 SECTRACK:1033046 SECTRACK:1033169 SECTRACK:1033729 SMASH Issue 117926 SMASH Issue 138139 SUSE:SUSE-SU-2015:1224 SUSE:SUSE-SU-2015:1324 SUSE:SUSE-SU-2015:1478 SUSE:SUSE-SU-2015:1487 SUSE:SUSE-SU-2015:1488 SUSE:SUSE-SU-2015:1489 SUSE:SUSE-SU-2015:1490 SUSE:SUSE-SU-2015:1491 SUSE:SUSE-SU-2015:1592 SUSE:SUSE-SU-2015:1611 SUSE:openSUSE-SU-2015:1382 UBUNTU:CVE-2015-3212 UBUNTU:CVE-2015-4036 UBUNTU:CVE-2015-4700 UBUNTU:CVE-2015-5364 UBUNTU:CVE-2015-5366 UBUNTU:USN-2633-1 UBUNTU:USN-2634-1 UBUNTU:USN-2680-1 UBUNTU:USN-2681-1 UBUNTU:USN-2682-1 UBUNTU:USN-2683-1 UBUNTU:USN-2684-1 UBUNTU:USN-2713-1 UBUNTU:USN-2714-1 UBUNTU:USN-2715-1 UBUNTU:USN-2716-1 UBUNTU:USN-2717-1 UBUNTU:USN-2718-1 UBUNTU:USN-2719-1 bnc#935705 bnc#942914 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 rh#1183744 rh#1189864 rh#1202855 rh#1226442 rh#1233615 rh#1239029 rh#1243465 rh#2162080 rh#2162082 rh#2162084 rh#2162087 |
CVE-2015-5697 | kernel-source-rt:Already fixed | low | 1.9 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N) | BID:76066 CONFIRM:git.kernel.org:CVE-2015-5697 CONFIRM:github.com:CVE-2015-5697 CVE-2015-5697 DSA-3329 FEDORA:FEDORA-2015-12908 FEDORA:FEDORA-2015-12917 FEDORA:FEDORA-2015-13391 FEDORA:FEDORA-2015-13396 MISC:git.kernel.org:MLIST:[oss-security] 20150728 CVE request: Linux kernel - information leak in md driver MLIST:[oss-security] 20150728 CVE request: Linux kernel - information leak in md driver OSS:2015/Q3/235 Oracle:CVE-2015-6937 RH:CVE-2015-5697 SECTRACK:1033211 SMASH Issue 119329 UBUNTU:CVE-2015-5697 UBUNTU:USN-2731-1 UBUNTU:USN-2732-1 UBUNTU:USN-2748-1 UBUNTU:USN-2749-1 UBUNTU:USN-2751-1 UBUNTU:USN-2752-1 bnc#939994 linux.git:commit:4e6b6ee253ce58aa156d7f1448d1038679b26783 rh#1202855 rh#1243852 rh#1249011 |
CVE-2015-6937 | kernel-source-rt:Not affected | moderate | () | BID:76767 CONFIRM:git.kernel.org:CVE-2015-6937 CONFIRM:github.com:CVE-2015-6937 CONFIRM:github.com:CVE-2016-9287 CVE-2015-6937 D:CVE-2015-6937 D:CVE-2022-2590 DSA-3364 FEDORA:FEDORA-2015-16417 FEDORA:FEDORA-2015-16440 FEDORA:FEDORA-2015-16441 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:MLIST:[oss-security] 20151027 Re: CVE-2015-6937 - Linux kernel - NULL pointer dereference in net/rds/connection.c MLIST:[oss-security] 20150914 CVE-2015-6937 - Linux kernel - NULL pointer dereference in net/rds/connection.c OSS:2015/Q3/545 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 Oracle:CVE-2015-6937 Oracle:CVE-2016-5195 RH:CVE-2015-6937 SECTRACK:1034453 SMASH Issue 156567 UBUNTU:CVE-2015-6937 bdo#796036 bnc#945825 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b linux.git:commit:8c7188b23474cca017b3ef354c4a58456f68303a rh#1263139 rh#1276437 rh#1384344 rh#2116175 rh#2162080 rh#2162082 rh#2162084 rh#2162087 |
CVE-2015-7510 | systemd:Unsupported | important | () | CONFIRM:github.com:CVE-2015-7510 CVE-2015-7510 RH:CVE-2015-7510 SMASH Issue 159055 UBUNTU:CVE-2015-7510 bnc#956712 rh#1284642 |
CVE-2015-7550 | kernel-source-rt:Already fixed | moderate | () | BID:79903 CONFIRM:git.kernel.org:CVE-2015-7550 CONFIRM:security-tracker.debian.org:CVE-2015-7550 CONFIRM:www.kernel.org:CVE-2015-8575 CVE-2015-7550 D:CVE-2022-2590 DSA-3434 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 OSS:2023/10/10/4 Oracle:CVE-2015-6937 Oracle:CVE-2016-5195 RH:CVE-2015-7550 SMASH Issue 159733 UBUNTU:CVE-2015-7550 UBUNTU:USN-2911-1 UBUNTU:USN-2911-2 bdo#808293 bdo#808602 bdo#808953 bdo#808973 bnc#958951 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b linux.git:commit:b4a1b4f5047e4f54e194681125c74c0aa64d637d rh#1291197 rh#1384344 rh#2116175 rh#2162080 rh#2162082 rh#2162084 rh#2162087 |
CVE-2015-7613 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | BID:76977 CONFIRM:git.kernel.org:CVE-2015-7613 CONFIRM:github.com:CVE-2015-7613 CONFIRM:kc.mcafee.com:CVE-2015-7613 CVE-2015-7613 DSA-3372 MISC:github.com:MLIST:[oss-security] 20151001 CVE Request: Unauthorized access to IPC objects with SysV shm MLIST:[oss-security] 20151001 CVE Request: Unauthorized access to IPC objects with SysV shm OSS:2015/Q4/7 Oracle:CVE-2015-6937 RH:CVE-2015-7613 RHSA-2015:2152 RHSA-2015:2411 RHSA-2015:2587 RHSA-2015:2636 SECTRACK:1034094 SMASH Issue 157258 UBUNTU:CVE-2015-7613 UBUNTU:USN-2761-1 UBUNTU:USN-2762-1 UBUNTU:USN-2763-1 UBUNTU:USN-2764-1 UBUNTU:USN-2765-1 bnc#948536 bnc#948701 rh#1243852 rh#1268270 |
CVE-2015-7799 | kernel-source-rt:Not affected | low | () | BID:77033 CVE-2015-7799 D:CVE-2022-2590 DSA-3426 MISC:code.google.com:CVE-2015-7799 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MLIST:[oss-security] 20151010 Re: CVE request - Android OS - Using the PPP character device driver caused the system to restart - Linux kernel OSS:2015/Q4/57 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 OSS:2023/10/10/4 Oracle:CVE-2015-6937 Oracle:CVE-2016-5195 RH:CVE-2015-7799 SECTRACK:1033809 SMASH Issue 157563 UBUNTU:CVE-2015-7799 UBUNTU:USN-2841-1 UBUNTU:USN-2841-2 UBUNTU:USN-2842-1 UBUNTU:USN-2842-2 UBUNTU:USN-2843-1 UBUNTU:USN-2843-2 UBUNTU:USN-2843-3 UBUNTU:USN-2844-1 bdo#813406 bnc#949936 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 linux.git:commit:4ab42d78e37a294ac7bc56901d563c642e03c4ae linux.git:commit:5535be3099717646781ce1540cf725965d680e7b rh#1243852 rh#1271134 rh#1384344 rh#2116175 rh#2162080 rh#2162082 rh#2162084 rh#2162087 |
CVE-2015-7833 | kernel-source-rt:Ignore | moderate | 4.6 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | BID:77030 BUGTRAQ:20151007 Re: Local RedHat Enterprise Linux DoS - RHEL 7.1 Kernel crashes on invalid USB device descriptors (usbvision driver) CVE-2015-7833 D:CVE-2015-7833 DSA-3396 DSA-3426 MISC:bugzilla.redhat.com MISC:www.os-s.net:CVE-2015-7833 OSS:2015/Q4/269 OSS:2023/10/10/4 Oracle:CVE-2015-6937 Oracle:CVE-2016-5244 RH:CVE-2015-7833 RHSA-2013:0590 RHSA-2013:1752 RHSA-2013:1753 RHSA-2013:1779 RHSA-2014:0365 SECTRACK:1034452 SMASH Issue 157908 SMASH Issue 157909 SUSE:SUSE-SU-2016:1985 UBUNTU:CVE-2015-7833 UBUNTU:USN-2929-1 UBUNTU:USN-2929-2 UBUNTU:USN-2932-1 UBUNTU:USN-2947-1 UBUNTU:USN-2947-2 UBUNTU:USN-2947-3 UBUNTU:USN-2967-1 UBUNTU:USN-2967-2 bdo#813406 bnc#950998 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 rh#1016832 rh#1024552 rh#1034153 rh#1243489 rh#1243852 rh#1270158 rh#1324749 rh#2162080 rh#2162082 rh#2162084 rh#2162087 rh#426568 rh#804591 rh#807993 rh#837577 rh#909119 |
CVE-2015-7872 | kernel-source-rt:Already fixed | moderate | () | BID:77544 CONFIRM:git.kernel.org:CVE-2015-7872 CONFIRM:github.com:CVE-2015-7872 CONFIRM:h20565.www2.hpe.com CONFIRM:h20566.www2.hpe.com:CVE-2015-7872 CONFIRM:source.android.com:CVE-2016-8411 CONFIRM:www.oracle.com CONFIRM:www.oracle.com:CVE-2015-1351 CVE-2015-7872 D:CVE-2015-7872 D:CVE-2022-2590 DSA-3396 HP:HPSBGN03565 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MLIST:[oss-security] 20151020 Re: CVE request: crash when attempt to garbage collect an uninstantiated keyring - Linux kernel OSS:2015/Q4/112 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 OSS:2023/10/10/4 Oracle:CVE-2015-6937 Oracle:CVE-2016-5195 RH:CVE-2015-7872 RHSA-2015:2636 RHSA-2016:0185 RHSA-2016:0212 RHSA-2016:0224 SECTRACK:1034472 SMASH Issue 157949 SUSE:SUSE-SU-2015:2108 SUSE:SUSE-SU-2015:2194 SUSE:SUSE-SU-2015:2292 SUSE:SUSE-SU-2015:2339 SUSE:SUSE-SU-2015:2350 SUSE:SUSE-SU-2016:0335 SUSE:SUSE-SU-2016:0337 SUSE:SUSE-SU-2016:0354 SUSE:SUSE-SU-2016:0380 SUSE:SUSE-SU-2016:0381 SUSE:SUSE-SU-2016:0383 SUSE:SUSE-SU-2016:0384 SUSE:SUSE-SU-2016:0386 SUSE:SUSE-SU-2016:0387 SUSE:SUSE-SU-2016:0434 SUSE:SUSE-SU-2016:2074 SUSE:openSUSE-SU-2016:1008 UBUNTU:CVE-2015-7872 UBUNTU:USN-2823-1 UBUNTU:USN-2824-1 UBUNTU:USN-2826-1 UBUNTU:USN-2829-1 UBUNTU:USN-2829-2 UBUNTU:USN-2840-1 UBUNTU:USN-2840-2 UBUNTU:USN-2843-1 UBUNTU:USN-2843-2 UBUNTU:USN-2843-3 bnc#951440 bnc#951542 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b rh#1243465 rh#1243852 rh#1272172 rh#1272371 rh#1384344 rh#2116175 rh#2162080 rh#2162082 rh#2162084 rh#2162087 |
CVE-2015-7990 | kernel-source-rt:Not affected | low | () | BID:77340 CONFIRM:git.kernel.org:CVE-2015-7990 CVE-2015-7990 D:CVE-2022-2590 DSA-3396 MLIST:[linux-kernel] 20151016 [PATCH] RDS: fix race condition when sending a message on unbound socket. MLIST:[oss-security] 20151027 Re: CVE-2015-6937 - Linux kernel - NULL pointer dereference in net/rds/connection.c OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 OSS:2023/10/10/4 Oracle:CVE-2015-6937 Oracle:CVE-2016-5195 RH:CVE-2015-7990 SMASH Issue 158320 UBUNTU:CVE-2015-7990 bnc#952384 bnc#953052 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b linux.git:commit:8c7188b23474cca017b3ef354c4a58456f68303a rh#1243852 rh#1276437 rh#1384344 rh#2116175 rh#2162080 rh#2162082 rh#2162084 rh#2162087 |
CVE-2015-8104 | kernel-source-rt:Not affected | moderate | () | BID:77524 BID:91787 CONFIRM:git.kernel.org:CVE-2015-8104 CONFIRM:kb.juniper.net:CVE-2017-2334 CONFIRM:support.citrix.com:CVE-2015-8104 CONFIRM:support.citrix.com:CVE-2015-8555 CONFIRM:www.oracle.com CONFIRM:www.oracle.com:CVE-2015-1351 CONFIRM:www.oracle.com:CVE-2015-7744 CONFIRM:www.oracle.com:CVE-2016-2105 CONFIRM:xenbits.xen.org:CVE-2015-8104 CVE-2015-8104 D:CVE-2015-8104 D:CVE-2022-2590 DSA-3414 DSA-3426 DSA-3454 FEDORA:FEDORA-2015-394835a3f6 FEDORA:FEDORA-2015-668d213dc3 FEDORA:FEDORA-2015-f150b2a8c8 MLIST:[oss-security] 20151110 CVE-2015-8104 kernel: kvm: guest to host DoS by triggering an infinite loop in microcode via #DB exception OSS:2015/Q4/245 OSS:2015/Q4/249 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 OSS:2023/10/10/4 Oracle:CVE-2015-6937 Oracle:CVE-2015-8104 Oracle:CVE-2016-5195 RH:CVE-2015-8104 RHSA-2015:2552 RHSA-2015:2636 RHSA-2015:2645 RHSA-2016:0004 RHSA-2016:0024 RHSA-2016:0046 RHSA-2016:0103 SECTRACK:1034105 SMASH Issue 158684 SUSE:SUSE-SU-2015:2108 SUSE:SUSE-SU-2015:2194 SUSE:SUSE-SU-2015:2339 SUSE:SUSE-SU-2015:2350 SUSE:SUSE-SU-2016:0354 SUSE:SUSE-SU-2016:2074 SUSE:openSUSE-SU-2015:2232 SUSE:openSUSE-SU-2015:2250 SUSE:openSUSE-SU-2016:1008 UBUNTU:CVE-2015-8104 UBUNTU:USN-2840-1 UBUNTU:USN-2841-1 UBUNTU:USN-2841-2 UBUNTU:USN-2842-1 UBUNTU:USN-2842-2 UBUNTU:USN-2843-1 UBUNTU:USN-2843-2 UBUNTU:USN-2844-1 bdo#813406 bnc#954404 http://www.debian.org/security/2015/dsa-3426 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b linux.git:commit:cbdb967af3d54993f5814f1cee0ed311a055377d rh#1278496 rh#1384344 rh#2116175 rh#2162080 rh#2162082 rh#2162084 rh#2162087 |
CVE-2015-8324 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2015-8324 CONFIRM:github.com:CVE-2015-8324 CONFIRM:mirror.linux.org.au:CVE-2015-8324 CONFIRM:www.oracle.com:CVE-2015-8391 CVE-2015-8324 MISC:bugs.openvz.org:MLIST:[oss-security] 20151123 CVE request -- linux kernel: Null pointer dereference when mounting ext4 filesystem MLIST:[oss-security] 20151123 CVE request -- linux kernel: Null pointer dereference when mounting ext4 filesystem RH:CVE-2015-8324 RHSA-2016:0855 SMASH Issue 159056 UBUNTU:CVE-2015-8324 bnc#956707 rh#1267261 |
CVE-2015-8539 | kernel-source-rt:Not affected | important | () | CONFIRM:git.kernel.org:CVE-2015-8539 CONFIRM:github.com:CVE-2015-8539 CVE-2015-8539 D:CVE-2022-2590 MISC:git.kernel.org:MLIST:[oss-security] 20151208 CVE request - Linux kernel - Fix handling of stored error in a negatively instantiated user key MLIST:[oss-security] 20151208 CVE request - Linux kernel - Fix handling of stored error in a negatively instantiated user key OSS:2015/Q4/465 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 OSS:2023/10/10/4 Oracle:CVE-2015-6937 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 RH:CVE-2015-8539 RHSA-2018:0151 RHSA-2018:0152 RHSA-2018:0181 SMASH Issue 159531 SUSE:SUSE-SU-2016:0335 SUSE:SUSE-SU-2016:0336 SUSE:SUSE-SU-2016:0337 SUSE:SUSE-SU-2016:0339 SUSE:SUSE-SU-2016:0380 SUSE:SUSE-SU-2016:0381 SUSE:SUSE-SU-2016:0383 SUSE:SUSE-SU-2016:0384 SUSE:SUSE-SU-2016:0386 SUSE:SUSE-SU-2016:0387 SUSE:SUSE-SU-2016:0434 SUSE:SUSE-SU-2016:0911 SUSE:SUSE-SU-2016:1102 SUSE:SUSE-SU-2016:1937 SUSE:SUSE-SU-2016:2074 UBUNTU:CVE-2015-8539 UBUNTU:USN-3798-1 UBUNTU:USN-3798-2 bnc#958463 bnc#958601 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b rh#1284450 rh#1324749 rh#1384344 rh#2116175 |
CVE-2015-8543 | kernel-source-rt:Not affected | moderate | () | BID:79698 CONFIRM:git.kernel.org:CVE-2015-8543 CONFIRM:www.oracle.com:CVE-2015-8391 CVE-2015-8543 D:CVE-2022-2590 DSA-3426 DSA-3434 MLIST:[oss-security] 20151209 Re: CVE request - Android kernel - IPv6 connect cause a denial of service OSS:2015/Q4/473 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 OSS:2023/10/10/4 Oracle:CVE-2015-6937 Oracle:CVE-2016-5195 RH:CVE-2015-8543 RHSA-2016:0855 RHSA-2016:2574 RHSA-2016:2584 SECTRACK:1034892 SMASH Issue 159693 SUSE:SUSE-SU-2016:0911 SUSE:SUSE-SU-2016:1102 SUSE:SUSE-SU-2016:2074 UBUNTU:CVE-2015-8543 UBUNTU:USN-2886-1 UBUNTU:USN-2888-1 UBUNTU:USN-2890-1 UBUNTU:USN-2890-2 UBUNTU:USN-2890-3 bdo#808293 bdo#808602 bdo#808953 bdo#808973 bdo#813406 bnc#958886 http://www.debian.org/security/2015/dsa-3426 http://www.debian.org/security/2016/dsa-3434 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b linux.git:commit:79462ad02e861803b3840cc782248c7359451cd9 rh#1290475 rh#1384344 rh#2116175 rh#2162080 rh#2162082 rh#2162084 rh#2162087 |
CVE-2015-8659 | nghttp2:Analysis | moderate | () | CONFIRM:nghttp2.org:CVE-2015-8659 CVE-2015-8659 D:CVE-2015-8659 FEDORA:FEDORA-2016-54f85ec6e8 FEDORA:FEDORA-2016-8e13ac5754 GENTOO:GLSA-201612-06 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MLIST:[oss-security] 20151223 Re: Use after free in nghttp2 MLIST:[oss-security] 20151223 Use after free in nghttp2 OSS:2015/Q4/576 SECTRACK:1035353 SMASH Issue 160069 UBUNTU:CVE-2015-8659 bnc#960576 rh#1295351 |
CVE-2015-8746 | kernel-source-rt:Ignore | moderate | () | CONFIRM:git.kernel.org:CVE-2015-8746 CONFIRM:github.com:CVE-2015-8746 CONFIRM:www.kernel.org:CVE-2015-8746 CVE-2015-8746 MISC:git.kernel.org:MLIST:[oss-security] 20160105 CVE request -- linux kernel: nfs: kernel panic occurs at nfs client when nfsv4.2 migration is executed MLIST:[oss-security] 20160105 CVE request -- linux kernel: nfs: kernel panic occurs at nfs client when nfsv4.2 migration is executed OSS:2016/Q1/27 OSS:2023/10/10/4 Oracle:CVE-2015-6937 RH:CVE-2015-8746 RHSA-2016:2574 RHSA-2016:2584 SECTRACK:1034594 SMASH Issue 160367 UBUNTU:CVE-2015-8746 bnc#960839 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 rh#1295802 rh#2162080 rh#2162082 rh#2162084 rh#2162087 |
CVE-2015-8785 | kernel-source-rt:Not affected | low | () | BID:81688 CONFIRM:git.kernel.org:CVE-2015-8785 CONFIRM:github.com:CVE-2015-8785 CONFIRM:www.oracle.com:CVE-2016-7039 CONFIRM:www.oracle.com:CVE-2016-7166 CVE-2015-8785 D:CVE-2015-8785 D:CVE-2022-2590 DSA-3503 MLIST:[oss-security] 20160124 CVE Request: Linux: fuse: possible denial of service in fuse_fill_write_pages() OSS:2016/Q1/189 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 OSS:2023/10/10/4 Oracle:CVE-2015-6937 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 RH:CVE-2015-8785 SMASH Issue 161259 SUSE:SUSE-SU-2016:0911 SUSE:SUSE-SU-2016:1102 SUSE:SUSE-SU-2016:1764 SUSE:SUSE-SU-2016:2074 SUSE:openSUSE-SU-2016:1008 UBUNTU:CVE-2015-8785 UBUNTU:USN-2886-1 bnc#963765 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b rh#1290642 rh#1324749 rh#1384344 rh#2116175 |
CVE-2015-8812 | kernel-source-rt:Already fixed | moderate | () | BID:83218 CONFIRM:git.kernel.org:CVE-2015-8812 CONFIRM:github.com:CVE-2015-8812 CVE-2015-8812 D:CVE-2022-2590 DSA-3503 MISC:git.kernel.org:MLIST:[oss-security] 20160211 Linux kernel: Flaw in CXGB3 driver. MLIST:[oss-security] 20160211 Linux kernel: Flaw in CXGB3 driver. OSS:2016/Q1/311 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 OSS:2023/10/10/4 Oracle:CVE-2015-6937 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 RH:CVE-2015-8812 RHSA-2016:2574 RHSA-2016:2584 SMASH Issue 161840 SUSE:SUSE-SU-2016:0911 SUSE:SUSE-SU-2016:1019 SUSE:SUSE-SU-2016:1031 SUSE:SUSE-SU-2016:1032 SUSE:SUSE-SU-2016:1033 SUSE:SUSE-SU-2016:1034 SUSE:SUSE-SU-2016:1035 SUSE:SUSE-SU-2016:1037 SUSE:SUSE-SU-2016:1038 SUSE:SUSE-SU-2016:1039 SUSE:SUSE-SU-2016:1040 SUSE:SUSE-SU-2016:1041 SUSE:SUSE-SU-2016:1045 SUSE:SUSE-SU-2016:1046 SUSE:SUSE-SU-2016:1102 SUSE:SUSE-SU-2016:1764 SUSE:SUSE-SU-2016:2074 SUSE:openSUSE-SU-2016:1008 UBUNTU:CVE-2015-8812 UBUNTU:USN-2946-1 UBUNTU:USN-2946-2 UBUNTU:USN-2947-1 UBUNTU:USN-2947-2 UBUNTU:USN-2947-3 UBUNTU:USN-2948-1 UBUNTU:USN-2948-2 UBUNTU:USN-2949-1 UBUNTU:USN-2967-1 UBUNTU:USN-2967-2 bnc#966437 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b rh#1303532 rh#1324749 rh#1384344 rh#2116175 |
CVE-2015-8816 | kernel-source-rt:Not affected | moderate | () | BID:83363 CONFIRM:git.kernel.org:CVE-2015-8816 CONFIRM:git.kernel.org:CVE-2016-8633 CONFIRM:github.com:CVE-2015-8816 CONFIRM:source.android.com:CVE-2016-3818 CONFIRM:www.kernel.org:CVE-2016-2070 CONFIRM:www.oracle.com:CVE-2016-5386 CONFIRM:www.oracle.com:CVE-2016-6304 CVE-2015-8816 D:CVE-2022-2590 DSA-3503 MISC:git.kernel.org:MLIST:[oss-security] 20160223 CVE Request: Linux kernel USB hub invalid memory access in hub_activate() MLIST:[oss-security] 20160223 CVE Request: Linux kernel USB hub invalid memory access in hub_activate() OSS:2016/Q1/413 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 OSS:2023/10/10/4 Oracle:CVE-2015-6937 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 RH:CVE-2015-8816 SMASH Issue 162166 SMASH Issue 168723 SUSE:SUSE-SU-2016:1019 SUSE:SUSE-SU-2016:1672 SUSE:SUSE-SU-2016:1690 SUSE:SUSE-SU-2016:1707 SUSE:SUSE-SU-2016:1764 SUSE:SUSE-SU-2016:1961 SUSE:SUSE-SU-2016:1994 SUSE:SUSE-SU-2016:1995 SUSE:SUSE-SU-2016:2001 SUSE:SUSE-SU-2016:2002 SUSE:SUSE-SU-2016:2005 SUSE:SUSE-SU-2016:2006 SUSE:SUSE-SU-2016:2007 SUSE:SUSE-SU-2016:2009 SUSE:SUSE-SU-2016:2010 SUSE:SUSE-SU-2016:2014 SUSE:SUSE-SU-2016:2074 UBUNTU:CVE-2015-8816 bnc#968010 bnc#979064 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b rh#1311589 rh#1324749 rh#1384344 rh#2116175 |
CVE-2015-8830 | kernel-source-rt:Not affected | important | () | CONFIRM:git.kernel.org:CVE-2015-8830 CONFIRM:github.com:CVE-2015-8830 CVE-2015-8830 DSA-3503 OSS:2016/Q1/491 Oracle:CVE-2016-5244 RH:CVE-2015-8830 RHSA-2018:1854 RHSA-2018:2948 RHSA-2018:3083 RHSA-2018:3096 SMASH Issue 162483 UBUNTU:CVE-2015-8830 bnc#969355 rh#1314275 rh#1324749 |
CVE-2015-8844 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2015-8844 CONFIRM:git.kernel.org:CVE-2015-8845 CONFIRM:github.com:CVE-2015-8844 CONFIRM:github.com:CVE-2015-8845 CONFIRM:www.kernel.org:CVE-2016-2549 CVE-2015-8844 CVE-2015-8845 MISC:git.kernel.org:MLIST:[oss-security] 20160413 CVE Request: Linux kernel: incorrect restoration of machine specific registers from signal handler. MLIST:[oss-security] 20160413 CVE Request: Linux kernel: incorrect restoration of machine specific registers from signal handler. OSS:2016/Q2/68 Oracle:CVE-2016-5244 RH:CVE-2015-8844 RH:CVE-2015-8845 RHSA-2016:2574 RHSA-2016:2584 SECTRACK:1035594 SMASH Issue 167801 SMASH Issue 167802 SMASH Issue 167831 UBUNTU:CVE-2015-8844 UBUNTU:CVE-2015-8845 bnc#975531 bnc#975533 rh#1324749 rh#1326540 |
CVE-2015-8845 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2015-8844 CONFIRM:git.kernel.org:CVE-2015-8845 CONFIRM:github.com:CVE-2015-8844 CONFIRM:github.com:CVE-2015-8845 CONFIRM:www.kernel.org:CVE-2016-2549 CVE-2015-8844 CVE-2015-8845 MISC:git.kernel.org:MLIST:[oss-security] 20160413 CVE Request: Linux kernel: incorrect restoration of machine specific registers from signal handler. MLIST:[oss-security] 20160413 CVE Request: Linux kernel: incorrect restoration of machine specific registers from signal handler. OSS:2016/Q2/68 Oracle:CVE-2016-5244 RH:CVE-2015-8844 RH:CVE-2015-8845 RHSA-2016:2574 RHSA-2016:2584 SECTRACK:1035594 SMASH Issue 167801 SMASH Issue 167831 UBUNTU:CVE-2015-8844 UBUNTU:CVE-2015-8845 bnc#975531 bnc#975533 rh#1324749 rh#1326540 |
CVE-2015-8863 | jq:Released | low | () | CONFIRM:github.com:CVE-2015-8863 CONFIRM:github.com:CVE-2016-10166 CVE-2015-8863 CVE-2016-4074 D:CVE-2015-8863 D:CVE-2016-4074 GENTOO:GLSA-201612-20 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:github.com:CVE-2016-4074 MLIST:[oss-security] 20160423 CVE Request: jq: heap buffer overflow in tokenadd() function MLIST:[oss-security] 20160423 Re: CVE Request: jq: heap buffer overflow in tokenadd() function MLIST:[oss-security] 20160424 CVE Request: jq: stack exhaustion using jv_dump_term() function MLIST:[oss-security] 20160424 Re: CVE Request: jq: stack exhaustion using jv_dump_term() function OSS:2016/Q2/135 OSS:2016/Q2/141 RH:CVE-2015-8863 RH:CVE-2016-4074 RHSA-2016:1098 RHSA-2016:1099 RHSA-2016:1106 SMASH Issue 168253 SUSE:openSUSE-SU-2016:1212 SUSE:openSUSE-SU-2016:1214 UBUNTU:CVE-2015-8863 UBUNTU:CVE-2016-4074 bdo#802231 bnc#1014176 bnc#976992 rh#1328747 rh#1329982 |
CVE-2015-8927 | libarchive:Not affected | moderate | () | BID:91329 CVE-2015-8927 D:CVE-2015-8927 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:github.com:CVE-2015-8927 OSS:2016/Q2/566 RH:CVE-2015-8927 SMASH Issue 170293 UBUNTU:CVE-2015-8927 bnc#985712 rh#1348426 |
CVE-2015-8962 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | BID:94187 CONFIRM:git.kernel.org:CVE-2015-8962 CONFIRM:github.com:CVE-2015-8962 CONFIRM:github.com:CVE-2016-10192 CONFIRM:source.android.com:CVE-2016-6828 CVE-2015-8962 Oracle:CVE-2016-5244 RH:CVE-2015-8962 SMASH Issue 176392 UBUNTU:CVE-2015-8962 bnc#1010501 rh#1400457 |
CVE-2015-8963 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | BID:94207 CONFIRM:git.kernel.org:CVE-2015-8963 CONFIRM:github.com:CVE-2015-8963 CONFIRM:source.android.com:CVE-2016-7917 CVE-2015-8963 D:CVE-2015-8963 RH:CVE-2015-8963 SMASH Issue 176393 UBUNTU:CVE-2015-8963 bnc#1010502 rh#1411245 |
CVE-2015-8967 | kernel-source-rt:Unsupported | critical | () | BID:94680 CONFIRM:git.kernel.org:CVE-2015-8967 CONFIRM:github.com:CVE-2015-8967 CONFIRM:source.android.com:CVE-2016-9120 CVE-2015-8967 RH:CVE-2015-8967 SMASH Issue 177318 UBUNTU:CVE-2015-8967 bnc#1014749 rh#1404284 |
CVE-2015-8970 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | BID:94217 CONFIRM:git.kernel.org:CVE-2015-8970 CONFIRM:github.com:CVE-2015-8970 CONFIRM:github.com:CVE-2017-6429 CONFIRM:groups.google.com:CVE-2015-8970 CONFIRM:www.kernel.org:CVE-2015-8970 CVE-2015-8970 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:MLIST:[oss-security] 20161104 Re: CVE request -- linux kernel: crypto: GPF in lrw_crypt caused by null-deref MISC:git.kernel.org:OSS:2020/Q1/69 MLIST:[oss-security] 20161104 Re: CVE request -- linux kernel: crypto: GPF in lrw_crypt caused by null-deref OSS:2016/Q4/330 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 Oracle:CVE-2017-6074 RH:CVE-2015-8970 RHSA-2017:1842 RHSA-2017:2077 RHSA-2017:2437 RHSA-2017:2444 SMASH Issue 174477 UBUNTU:CVE-2015-8970 bnc#1008374 bnc#1008850 bnc#1034670 bnc#1049603 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1386286 rh#1420236 rh#1435719 rh#1439087 rh#1462147 rh#1462158 rh#1481178 |
CVE-2015-8982 | glibc:Not affected | important | 7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | BID:72602 BID:72740 BID:72789 BID:76916 CONFIRM:sourceware.org:CVE-2015-8982 CONFIRM:sourceware.org:CVE-2015-8983 CONFIRM:sourceware.org:CVE-2015-8984 CVE-2015-8982 CVE-2015-8983 CVE-2015-8984 CVE-2015-8985 L3:64698 MLIST:[oss-security] 20150213 CVE Requests - glibc overflows (strxfrm) MLIST:[oss-security] 20150226 CVE request: glibc: potential application crash due to overread in fnmatch MLIST:[oss-security] 20170214 Re: Pending CVE requests for glibc OSS:2017/Q1/437 SMASH Issue 180532 SMASH Issue 317059 UBUNTU:CVE-2015-8982 UBUNTU:CVE-2015-8983 UBUNTU:CVE-2015-8984 UBUNTU:CVE-2015-8985 bdo#779392 bnc#1193616 rh#1192525 rh#1195762 rh#1197730 rh#1197798 |
CVE-2015-8983 | glibc:Not affected | moderate | 6.6 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H) | BID:72602 BID:72740 BID:72789 BID:76916 CONFIRM:sourceware.org:CVE-2015-8982 CONFIRM:sourceware.org:CVE-2015-8983 CONFIRM:sourceware.org:CVE-2015-8984 CVE-2015-8982 CVE-2015-8983 CVE-2015-8984 CVE-2015-8985 L3:64698 MLIST:[oss-security] 20150213 CVE Requests - glibc overflows (strxfrm) MLIST:[oss-security] 20150226 CVE request: glibc: potential application crash due to overread in fnmatch MLIST:[oss-security] 20170214 Re: Pending CVE requests for glibc OSS:2017/Q1/437 SMASH Issue 180532 SMASH Issue 317060 UBUNTU:CVE-2015-8982 UBUNTU:CVE-2015-8983 UBUNTU:CVE-2015-8984 UBUNTU:CVE-2015-8985 bdo#779392 bnc#1193615 rh#1192525 rh#1195762 rh#1197730 rh#1197798 |
CVE-2015-8985 | glibc:Released | moderate | 5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | BID:72602 BID:72740 BID:72789 BID:76916 CONFIRM:sourceware.org:CVE-2015-8982 CONFIRM:sourceware.org:CVE-2015-8983 CONFIRM:sourceware.org:CVE-2015-8984 CVE-2015-8982 CVE-2015-8983 CVE-2015-8984 CVE-2015-8985 D:CVE-2015-20109 MLIST:[oss-security] 20150213 CVE Requests - glibc overflows (strxfrm) MLIST:[oss-security] 20150226 CVE request: glibc: potential application crash due to overread in fnmatch MLIST:[oss-security] 20170214 Re: Pending CVE requests for glibc OSS:2017/Q1/437 SMASH Issue 180532 SMASH Issue 317058 UBUNTU:CVE-2015-8982 UBUNTU:CVE-2015-8983 UBUNTU:CVE-2015-8984 UBUNTU:CVE-2015-8985 bdo#779392 bnc#1193625 bnc#920338 jsc#CAR-1325 rh#1165192 rh#1192525 rh#1195762 rh#1197730 rh#1197798 rh#2217330 |
CVE-2015-9004 | kernel-source-rt:Ignore | moderate | () | BID:98166 CONFIRM:git.kernel.org:CVE-2015-9004 CONFIRM:github.com:CVE-2015-9004 CONFIRM:source.android.com:CVE-2017-0635 CVE-2015-9004 MISC:git.kernel.org:OSS:2020/Q1/69 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 RH:CVE-2015-9004 SMASH Issue 184698 UBUNTU:CVE-2015-9004 bnc#1037306 rh#1447676 rh#1462147 rh#1462158 rh#1481178 |
CVE-2015-9261 | busybox:Released | moderate | 5.5 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | BUGTRAQ:20190613 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series BUGTRAQ:20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X CVE-2015-9261 FULLDISC:20190612 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series FULLDISC:20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X FULLDISC:20200827 SEC Consult SA-20200827-0 :: Multiple Vulnerabilities in ZTE mobile Hotspot MS910S FULLDISC:20220617 SEC Consult SA-20220615-0 :: Hardcoded Backdoor User and Outdated Software Components in Nexans FTTO GigaSwitch series MISC:git.busybox.net:CVE-2015-9261 MISC:packetstormsecurity.com:CVE-2010-0296 MISC:packetstormsecurity.com:CVE-2015-9261 MISC:www.openwall.com:CVE-2015-9261 MLIST:[debian-lts-announce] 20180727 [SECURITY] [DLA 1445-1] busybox security update MLIST:[debian-lts-announce] 20210215 [SECURITY] [DLA 2559-1] busybox security update OSS:2018/Q3/64 RH:CVE-2015-9261 SMASH Issue 211758 UBUNTU:CVE-2015-9261 USN-3935-1 bdo#803097 bnc#1102912 rh#1276427 |
CVE-2015-9289 | kernel-source-rt:Not affected | critical | () | CVE-2015-9289 D:CVE-2015-9289 MISC:git.kernel.org:CVE-2015-9289 MISC:github.com:CVE-2015-9289 MISC:mirrors.edge.kernel.org:CVE-2015-9289 RH:CVE-2015-9289 RHSA-2020:1016 RHSA-2020:1070 SMASH Issue 238133 UBUNTU:CVE-2015-9289 bnc#1143179 rh#1731000 rh#1734243 rh#1734246 rh#1735655 |
CVE-2016-0758 | kernel-source-rt:Already fixed | important | () | BID:90626 CONFIRM:git.kernel.org:CVE-2016-0758 CONFIRM:source.android.com:CVE-2016-7117 CONFIRM:www.oracle.com:CVE-2015-8391 CVE-2016-0758 HP:HPSBHF3548 MLIST:[oss-security] 20160513 CVE-2016-0758 - Linux kernel - Flaw in ASN.1 DER decoder for x509 certificate DER files. OSS:2016/Q2/335 Oracle:CVE-2016-5244 RH:CVE-2016-0758 RHSA-2016:1033 RHSA-2016:1051 RHSA-2016:1055 SMASH Issue 169023 SUSE:SUSE-SU-2016:1672 SUSE:SUSE-SU-2016:1690 SUSE:SUSE-SU-2016:1937 SUSE:SUSE-SU-2016:1961 SUSE:SUSE-SU-2016:1985 SUSE:SUSE-SU-2016:1994 SUSE:SUSE-SU-2016:1995 SUSE:SUSE-SU-2016:2000 SUSE:SUSE-SU-2016:2001 SUSE:SUSE-SU-2016:2002 SUSE:SUSE-SU-2016:2003 SUSE:SUSE-SU-2016:2005 SUSE:SUSE-SU-2016:2006 SUSE:SUSE-SU-2016:2007 SUSE:SUSE-SU-2016:2009 SUSE:SUSE-SU-2016:2010 SUSE:SUSE-SU-2016:2011 SUSE:SUSE-SU-2016:2014 SUSE:SUSE-SU-2016:2105 SUSE:openSUSE-SU-2016:1641 SUSE:openSUSE-SU-2016:2184 UBUNTU:CVE-2016-0758 UBUNTU:USN-2979-4 bnc#979867 linux.git:commit:23c8a812dc3c621009e4f0e5342aa4e2ede1ceaa rh#1300257 rh#1324749 |
CVE-2016-0821 | kernel-source-rt:Not affected | low | () | BID:84260 CONFIRM:git.kernel.org:CVE-2016-0821 CONFIRM:github.com:CVE-2016-0821 CONFIRM:source.android.com:CVE-2016-1621 CVE-2016-0821 CVE-2016-0823 DSA-3607 L3:45886 MLIST:[oss-security] 20150502 Re: CVE request for a fixed bug existed in all versions of linux kernel from KeenTeam Oracle:CVE-2016-5244 RH:CVE-2016-0821 SMASH Issue 163215 SMASH Issue 172056 UBUNTU:CVE-2016-0821 UBUNTU:USN-2967-1 UBUNTU:USN-2967-2 UBUNTU:USN-2968-1 UBUNTU:USN-2968-2 UBUNTU:USN-2969-1 UBUNTU:USN-2970-1 UBUNTU:USN-2971-1 UBUNTU:USN-2971-2 UBUNTU:USN-2971-3 bnc#987709 bnc#994624 rh#1317571 |
CVE-2016-0823 | kernel-source-rt:Ignore | moderate | () | BID:61995 BID:71082 BID:72842 BID:84260 BID:84265 CONFIRM:git.kernel.org:CVE-2013-5634 CONFIRM:git.kernel.org:CVE-2014-2889 CONFIRM:git.kernel.org:CVE-2014-4157 CONFIRM:git.kernel.org:CVE-2014-7843 CONFIRM:git.kernel.org:CVE-2015-0239 CONFIRM:git.kernel.org:CVE-2016-0821 CONFIRM:git.kernel.org:CVE-2016-0823 CONFIRM:github.com:CVE-2013-5634 CONFIRM:github.com:CVE-2014-2889 CONFIRM:github.com:CVE-2014-4157 CONFIRM:github.com:CVE-2014-7843 CONFIRM:github.com:CVE-2016-0821 CONFIRM:github.com:CVE-2016-0823 CONFIRM:source.android.com:CVE-2016-1621 CONFIRM:www.codeaurora.org:CVE-2014-4322 CONFIRM:www.kernel.org:CVE-2013-5634 CONFIRM:www.kernel.org:CVE-2014-2889 CONFIRM:www.kernel.org:CVE-2014-8884 CONFIRM:www.kernel.org:CVE-2015-1573 CONFIRM:www.oracle.com CONFIRM:www.oracle.com:CVE-2015-1351 CONFIRM:www.oracle.com:CVE-2015-8472 CONFIRM:www.oracle.com:CVE-2016-2802 CVE-2013-5634 CVE-2014-2889 CVE-2014-4157 CVE-2014-4322 CVE-2014-7843 CVE-2015-0239 CVE-2016-0821 CVE-2016-0823 D:CVE-2014-2889 D:CVE-2014-4157 D:CVE-2014-7843 D:CVE-2015-0239 D:CVE-2022-2590 DSA-3170 DSA-3607 L3:45886 MANDRIVA:MDVSA-2015:058 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:/ MISC:git.kernel.org:MLIST:[oss-security] 20140418 Re: CVE request Linux kernel: arch: x86: net: bpf_jit: an off-by-one bug in x86_64 cond jump target MISC:googleprojectzero.blogspot.com:CVE-2016-0823 MLIST:[bk-commits-head] 20150123 KVM: x86: SYSENTER emulation is broken MLIST:[oss-security] 20130826 Re: CVE request: Linux Kernel: ARM: KVM: NULL pointer dereferences MLIST:[oss-security] 20140418 Re: CVE request Linux kernel: arch: x86: net: bpf_jit: an off-by-one bug in x86_64 cond jump target MLIST:[oss-security] 20141113 CVE-2014-7843 Linux kernel: aarch64: copying from /dev/zero causes local DoS MLIST:[oss-security] 20150127 KVM SYSENTER emulation vulnerability - CVE-2015-0239 MLIST:[oss-security] 20150502 Re: CVE request for a fixed bug existed in all versions of linux kernel from KeenTeam OSS:11000 OSS:2014/Q4/603 OSS:2015/Q1/271 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 RH:CVE-2013-5634 RH:CVE-2014-2889 RH:CVE-2014-4157 RH:CVE-2014-7843 RH:CVE-2015-0239 RH:CVE-2016-0821 RH:CVE-2016-0823 RHSA-2015:1272 RHSA-2015:2152 SMASH Issue 110718 SMASH Issue 111821 SMASH Issue 113160 SMASH Issue 163215 SMASH Issue 163217 SMASH Issue 172055 SMASH Issue 172056 SMASH Issue 172067 SMASH Issue 92645 SMASH Issue 98276 SMASH Issue 99946 UBUNTU:CVE-2013-5634 UBUNTU:CVE-2014-2889 UBUNTU:CVE-2014-4157 UBUNTU:CVE-2014-4322 UBUNTU:CVE-2014-7843 UBUNTU:CVE-2015-0239 UBUNTU:CVE-2016-0821 UBUNTU:CVE-2016-0823 UBUNTU:USN-2513-1 UBUNTU:USN-2514-1 UBUNTU:USN-2515-1 UBUNTU:USN-2516-1 UBUNTU:USN-2517-1 UBUNTU:USN-2518-1 UBUNTU:USN-2967-1 UBUNTU:USN-2967-2 UBUNTU:USN-2968-1 UBUNTU:USN-2968-2 UBUNTU:USN-2969-1 UBUNTU:USN-2970-1 UBUNTU:USN-2971-1 UBUNTU:USN-2971-2 UBUNTU:USN-2971-3 bdo#751417 bnc#987709 bnc#994618 bnc#994624 bnc#994751 bnc#994752 bnc#994755 bnc#994757 bnc#994758 bnc#994759 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=97fc15436b36ee3956efad83e22a557991f7d19d http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a03ffcf873fe0f2565386ca8ef832144c42e67fa http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e8180dcaa8470ceca21109f143876fdcd9fe050a linux.git:commit:5535be3099717646781ce1540cf725965d680e7b linux.git:commit:f3747379accba8e95d70cec0eae0582c8c182050 rh#1163744 rh#1186448 rh#1317571 rh#1317576 rh#1384344 rh#2116175 |
CVE-2016-10044 | kernel-source-rt:Not affected | low | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | BID:96122 CONFIRM:git.kernel.org:CVE-2016-10044 CONFIRM:github.com:CVE-2016-10044 CONFIRM:source.android.com:CVE-2016-10044 CONFIRM:www.kernel.org:CVE-2016-10044 CVE-2016-10044 Oracle:CVE-2017-6074 RH:CVE-2016-10044 SECTRACK:1037798 SMASH Issue 180010 UBUNTU:CVE-2016-10044 bnc#1023992 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1420236 rh#1435719 |
CVE-2016-10088 | kernel-source-rt:Already fixed | important | () | BID:94821 BID:95169 CONFIRM:git.kernel.org:CVE-2016-10088 CONFIRM:git.kernel.org:CVE-2016-9576 CONFIRM:github.com:CVE-2016-10088 CONFIRM:github.com:CVE-2016-10167 CONFIRM:github.com:CVE-2016-10190 CONFIRM:github.com:CVE-2016-9576 CONFIRM:www.kernel.org:CVE-2016-9793 CVE-2016-10088 CVE-2016-9576 D:CVE-2016-10088 D:CVE-2016-9576 L3:47394 MISC:anonscm.debian.org:MLIST:[oss-security] 20161230 Re: Linux Kernel use-after-free in SCSI generic device interface MLIST:[oss-security] 20161209 Linux Kernel use-after-free in SCSI generic device interface MLIST:[oss-security] 20161230 Re: Linux Kernel use-after-free in SCSI generic device interface OSS:2016/Q4/644 OSS:2016/Q4/779 OSS:2016/Q4/781 Oracle:CVE-2016-5244 RH:CVE-2016-10088 RH:CVE-2016-9576 RHSA-2017:0817 RHSA-2017:1842 RHSA-2017:2077 RHSA-2017:2669 SECTRACK:1037538 SMASH Issue 177214 SMASH Issue 178176 SUSE:SUSE-SU-2016:3146 SUSE:SUSE-SU-2016:3188 SUSE:SUSE-SU-2016:3203 SUSE:SUSE-SU-2016:3217 SUSE:SUSE-SU-2016:3248 SUSE:SUSE-SU-2016:3252 SUSE:openSUSE-SU-2016:3085 SUSE:openSUSE-SU-2016:3086 SUSE:openSUSE-SU-2016:3118 UBUNTU:CVE-2016-10088 UBUNTU:CVE-2016-9576 bnc#1013604 bnc#1014271 bnc#1017710 bnc#1019079 bnc#1024055 rh#1403145 rh#1412210 |
CVE-2016-10147 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | BID:95677 CONFIRM:git.kernel.org:CVE-2016-10147 CONFIRM:github.com:CVE-2016-10147 CONFIRM:www.kernel.org:CVE-2016-10147 CVE-2016-10147 MISC:git.kernel.org:MLIST:[oss-security] 20170117 CVE request -- linux kernel: crash by spawning mcrypt(alg) with incompatible algorithm MLIST:[linux-crypto] 20161202 Crash in crypto mcryptd MLIST:[oss-security] 20170117 CVE request -- linux kernel: crash by spawning mcrypt(alg) with incompatible algorithm OSS:2017/Q1/127 RH:CVE-2016-10147 RHSA-2017:1842 RHSA-2017:2077 SMASH Issue 178739 SMASH Issue 178815 UBUNTU:CVE-2016-10147 bnc#1020381 bnc#1020429 rh#1404200 |
CVE-2016-10150 | kernel-source-rt:Unsupported | moderate | () | BID:95672 CONFIRM:git.kernel.org:CVE-2016-10150 CONFIRM:github.com:CVE-2016-10150 CONFIRM:www.kernel.org:CVE-2016-10150 CVE-2016-10150 MLIST:[oss-security] 20170118 CVE request Kernel: kvm: use-after-free issue while creating devices OSS:2017/Q1/141 RH:CVE-2016-10150 SMASH Issue 178846 SMASH Issue 178917 UBUNTU:CVE-2016-10150 bnc#1020693 rh#1414506 |
CVE-2016-10200 | kernel-source-rt:Already fixed | low | () | BID:101783 CONFIRM:git.kernel.org:CVE-2016-10200 CONFIRM:github.com:CVE-2016-10200 CONFIRM:github.com:CVE-2017-5506 CONFIRM:source.android.com:CVE-2016-10200 CONFIRM:www.kernel.org:CVE-2016-9793 CVE-2016-10200 MISC:git.kernel.org:OSS:2020/Q1/69 OSS:2017/Q3/526 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 Oracle:CVE-2017-6074 RH:CVE-2016-10200 RHSA-2017:1842 RHSA-2017:2077 RHSA-2017:2437 RHSA-2017:2444 SECTRACK:1037965 SECTRACK:1037968 SMASH Issue 181313 UBUNTU:CVE-2016-10200 bnc#1028415 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1420236 rh#1430347 rh#1435719 rh#1439087 rh#1462147 rh#1462158 rh#1481178 |
CVE-2016-10208 | kernel-source-rt:Not affected | important | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | BID:94354 CONFIRM:git.kernel.org:CVE-2016-10208 CONFIRM:github.com:CVE-2016-10208 CONFIRM:github.com:CVE-2017-6059 CVE-2016-10208 FULLDISC:20161115 OS-S 2016-22 - Local DoS: Linux Kernel EXT4 Memory Corruption / SLAB-Out-of-Bounds Read MISC:bugzilla.redhat.com:MLIST:[oss-security] 20170204 Re: Local DoS: Linux Kernel EXT4 Memory Corruption / SLAB-Out-of-Bounds Read MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:MLIST:[oss-security] 20170204 Re: Local DoS: Linux Kernel EXT4 Memory Corruption / SLAB-Out-of-Bounds Read MLIST:[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update MLIST:[oss-security] 20170204 Re: Local DoS: Linux Kernel EXT4 Memory Corruption / SLAB-Out-of-Bounds Read OSS:2017/Q1/313 Oracle:CVE-2017-6074 RH:CVE-2016-10208 RHSA-2017:1297 RHSA-2017:1298 RHSA-2017:1308 SMASH Issue 179913 UBUNTU:CVE-2016-10208 bnc#1023377 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1395190 rh#1420236 rh#1435719 |
CVE-2016-10228 | glibc:Unsupported | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | BID:96525 CONFIRM:openwall.com:CVE-2016-10228 CONFIRM:sourceware.org:CVE-2016-10228 CVE-2016-10228 GLSA-202101-20 L3:61064 MISC:www.oracle.com:CVE-2022-21498 MLIST:[debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update MLIST:[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar OSS:2017/Q1/538 RH:CVE-2016-10228 RHSA-2021:1585 SMASH Issue 181063 UBUNTU:CVE-2016-10228 bnc#1027496 bnc#1187775 jsc#CAR-1305 rh#1428290 rh#1684374 |
CVE-2016-10229 | kernel-source-rt:Not affected | critical | () | BID:97397 CONFIRM:git.kernel.org:CVE-2016-10229 CONFIRM:github.com:CVE-2016-10229 CONFIRM:security.paloaltonetworks.com:CVE-2016-10229 CONFIRM:securityadvisories.paloaltonetworks.com:CVE-2016-10229 CONFIRM:source.android.com:CVE-2016-10229 CVE-2016-10229 MISC:git.kernel.org:OSS:2020/Q1/69 OSS:2017/Q2/256 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 RH:CVE-2016-10229 SECTRACK:1038201 SMASH Issue 182832 UBUNTU:CVE-2016-10229 bnc#1032268 rh#1439740 rh#1462147 rh#1462158 rh#1481178 |
CVE-2016-10739 | glibc:Not affected | moderate | 4.5 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L) | BID:106672 CVE-2016-10739 D:CVE-2016-10739 MISC:sourceware.org:CVE-2016-10739 RH:CVE-2016-10739 RHBA-2020:0547 RHSA-2019:2118 RHSA-2019:3513 RHSA-2020:4273 RHSA-2020:4285 SMASH Issue 223510 SUSE:openSUSE-SU-2019:1250 UBUNTU:CVE-2016-10739 bnc#1122729 rh#1347549 rh#1683683 rh#1684057 rh#1727276 |
CVE-2016-10741 | kernel-source-rt:Not affected | moderate | 6.1 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H) | CVE-2016-10741 RH:CVE-2016-10741 RHSA-2017:1842 RHSA-2017:2077 RHSA-2017:2669 SMASH Issue 224072 UBUNTU:CVE-2016-10741 bnc#1114920 bnc#1124010 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1609664 rh#1660375 rh#1660385 rh#1667782 rh#1671869 rh#1686136 rh#1701224 rh#1701842 |
CVE-2016-10905 | kernel-source-rt:Not affected | moderate | 5.3 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H) | BUGTRAQ:20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01) CVE-2016-10905 MISC:git.kernel.org:CVE-2016-10905 MISC:packetstormsecurity.com:CVE-2019-0136 MISC:packetstormsecurity.com:CVE-2019-15098 MLIST:[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update RH:CVE-2016-10905 SMASH Issue 240420 UBUNTU:CVE-2016-10905 USN-4145-1 bnc#1146312 https://support.f5.com/csp/article/K31332013 https://support.f5.com/csp/article/K31332013?utm_source=f5support&utm_medium=RSS rh#1757356 |
CVE-2016-10907 | kernel-source-rt:Unsupported | important | () | CVE-2016-10907 MISC:cdn.kernel.org:CVE-2016-10907 MISC:git.kernel.org:CVE-2016-10907 RH:CVE-2016-10907 SMASH Issue 240422 UBUNTU:CVE-2016-10907 bnc#1146302 rh#1757372 |
CVE-2016-1237 | kernel-source-rt:Not affected | low | () | BID:91456 CONFIRM:git.kernel.org:CVE-2016-1237 CONFIRM:github.com:CVE-2016-1237 CVE-2016-1237 D:CVE-2016-1237 D:CVE-2022-2590 DSA-3607 MLIST:[oss-security] 20160625 Linux CVE-2016-1237: nfsd: any user can set a file's ACL over NFS and grant access to it OSS:2016/Q2/602 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 Oracle:CVE-2016-5195 RH:CVE-2016-1237 SMASH Issue 170513 UBUNTU:CVE-2016-1237 UBUNTU:USN-3053-1 UBUNTU:USN-3070-1 UBUNTU:USN-3070-2 UBUNTU:USN-3070-3 UBUNTU:USN-3070-4 bnc#986570 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b rh#1350845 rh#1384344 rh#2116175 |
CVE-2016-1283 | pcre:Not affected | critical | () | BID:79825 CONFIRM:bto.bluecoat.com:CVE-2016-3191 CONFIRM:bugs.exim.org:CVE-2016-1283 CONFIRM:www.oracle.com:CVE-2016-4957 CONFIRM:www.tenable.com:CVE-2016-9261 CONFIRM:www.tenable.com:CVE-2017-3736 CVE-2016-1283 FEDORA:FEDORA-2016-65833b5dbc FEDORA:FEDORA-2016-f5af8e27ce GENTOO:GLSA-201607-02 OSS:2016/Q1/2 RH:CVE-2016-1283 RHSA-2016:1132 SECTRACK:1034555 SLACKWARE:SSA:2016-172-02 SMASH Issue 160250 SMASH Issue 176113 UBUNTU:CVE-2016-1283 bnc#960837 rh#1287629 rh#1295385 rh#1311503 |
CVE-2016-1583 | kernel-source-rt:Not affected | important | 8.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H) | BID:91157 CONFIRM:git.kernel.org:CVE-2016-1583 CONFIRM:github.com:CVE-2016-1583 CONFIRM:www.kernel.org:CVE-2016-1583 CVE-2016-1583 D:CVE-2016-1583 DSA-3607 EXPLOIT-DB:39992 MISC:bugs.chromium.org:CVE-2016-1583 MISC:git.kernel.org:MLIST:[oss-security] 20160622 Re: [vs-plain] Linux kernel stack overflow via ecryptfs and /proc/$pid/environ MISC:packetstormsecurity.com:CVE-2016-1583 MLIST:[oss-security] 20160610 [vs-plain] Linux kernel stack overflow via ecryptfs and /proc/$pid/environ MLIST:[oss-security] 20160622 Re: [vs-plain] Linux kernel stack overflow via ecryptfs and /proc/$pid/environ OSS:2016/Q2/522 Oracle:CVE-2016-5244 RH:CVE-2016-1583 RHSA-2016:2124 RHSA-2016:2766 RHSA-2017:2760 SECTRACK:1036763 SMASH Issue 169791 SMASH Issue 169792 SUSE:SUSE-SU-2016:1596 SUSE:SUSE-SU-2016:1672 SUSE:SUSE-SU-2016:1696 SUSE:SUSE-SU-2016:1937 SUSE:SUSE-SU-2016:1961 SUSE:SUSE-SU-2016:1985 SUSE:SUSE-SU-2016:1994 SUSE:SUSE-SU-2016:1995 SUSE:SUSE-SU-2016:2000 SUSE:SUSE-SU-2016:2002 SUSE:SUSE-SU-2016:2005 SUSE:SUSE-SU-2016:2006 SUSE:SUSE-SU-2016:2007 SUSE:SUSE-SU-2016:2009 SUSE:SUSE-SU-2016:2010 SUSE:SUSE-SU-2016:2014 SUSE:SUSE-SU-2016:2105 SUSE:openSUSE-SU-2016:1641 SUSE:openSUSE-SU-2016:2184 UBUNTU:CVE-2016-1583 UBUNTU:USN-2996-1 UBUNTU:USN-2997-1 UBUNTU:USN-2998-1 UBUNTU:USN-2999-1 UBUNTU:USN-3000-1 UBUNTU:USN-3001-1 UBUNTU:USN-3002-1 UBUNTU:USN-3003-1 UBUNTU:USN-3004-1 UBUNTU:USN-3005-1 UBUNTU:USN-3006-1 UBUNTU:USN-3007-1 UBUNTU:USN-3008-1 bnc#983143 bnc#983144 linux.git:commit:b987c759d21a1c7551357e3bc74e7f8026e696a2 linux.git:commit:f0fe970df3838c202ef6c07a4c2b36838ef0a88b rh#1324749 rh#1344721 |
CVE-2016-20012 | openssh:Ignore | low | 3.7 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N) | CONFIRM:security.netapp.com:CVE-2016-20012 CVE-2016-20012 D:CVE-2016-20012 MISC:github.com:CVE-2016-20012 MISC:rushter.com:CVE-2016-20012 MISC:utcc.utoronto.ca:CVE-2016-20012 MISC:www.openwall.com:CVE-2016-20012 MISC:www.openwall.com:OSS:2018/Q3/180 SMASH Issue 310247 bnc#1190600 jsc#CAR-1070 rh#2048523 |
CVE-2016-20013 | glibc:Won't fix | moderate | () | CVE-2016-20013 D:CVE-2016-20013 MISC:akkadia.org:CVE-2016-20013 MISC:pthree.org:CVE-2016-20013 MISC:twitter.com:CVE-2016-20013 SMASH Issue 324369 bnc#1196928 |
CVE-2016-2053 | kernel-source-rt:Ignore | moderate | () | CONFIRM:git.kernel.org:CVE-2016-2053 CONFIRM:github.com:CVE-2016-2053 CVE-2016-2053 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MLIST:[oss-security] 20160125 Re: Linux kernel : Denial of service with specially crafted key file. OSS:2016/Q1/197 Oracle:CVE-2016-5244 RH:CVE-2016-2053 RHSA-2016:2574 RHSA-2016:2584 SMASH Issue 161263 SMASH Issue 168761 UBUNTU:CVE-2016-2053 bnc#963762 bnc#979074 rh#1300237 rh#1324749 |
CVE-2016-2070 | kernel-source-rt:Unsupported | moderate | () | CONFIRM:git.kernel.org:CVE-2016-2070 CONFIRM:github.com:CVE-2016-2070 CONFIRM:www.kernel.org:CVE-2016-2070 CVE-2016-2070 MLIST:[oss-security] 20160125 Linux potential division by zero in TCP code OSS:2016/Q1/211 RH:CVE-2016-2070 SMASH Issue 161290 UBUNTU:CVE-2016-2070 bnc#963761 rh#1302219 |
CVE-2016-2143 | kernel-source-rt:Already fixed | important | () | CONFIRM:git.kernel.org:CVE-2016-2143 CONFIRM:security-tracker.debian.org:CVE-2016-2143 CONFIRM:www.oracle.com:CVE-2016-5386 CVE-2016-2143 D:CVE-2022-2590 DSA-3607 L3:46375 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 OSS:2023/10/10/4 Oracle:CVE-2015-6937 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 RH:CVE-2016-2143 RHSA-2016:1539 RHSA-2016:2766 SMASH Issue 163041 SUSE:SUSE-SU-2016:1019 SUSE:SUSE-SU-2016:1672 SUSE:SUSE-SU-2016:1690 SUSE:SUSE-SU-2016:1707 SUSE:SUSE-SU-2016:1764 SUSE:SUSE-SU-2016:2074 UBUNTU:CVE-2016-2143 bnc#970504 bnc#993872 linux.git:commit:2da33f9f96dabd62d6c7780cbce15818c2a6ce24 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 linux.git:commit:3446c13b268af86391d06611327006b059b8bab1 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b rh#1308908 rh#1324749 rh#1384344 rh#2116175 |
CVE-2016-2147 | busybox:Released | important | () | BUGTRAQ:20190613 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series BUGTRAQ:20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X CONFIRM:busybox.net:CVE-2016-2148 CONFIRM:git.busybox.net:CVE-2016-2147 CONFIRM:git.busybox.net:CVE-2016-2148 CVE-2016-2147 FULLDISC:20190612 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series FULLDISC:20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X FULLDISC:20200827 SEC Consult SA-20200827-0 :: Multiple Vulnerabilities in ZTE mobile Hotspot MS910S GENTOO:GLSA-201612-04 MISC:packetstormsecurity.com:CVE-2010-0296 MISC:packetstormsecurity.com:CVE-2015-9261 MLIST:[debian-lts-announce] 20180727 [SECURITY] [DLA 1445-1] busybox security update MLIST:[debian-lts-announce] 20210215 [SECURITY] [DLA 2559-1] busybox security update MLIST:[oss-security] 20160311 two udhcpc (busybox) issues OSS:2016/Q1/614 RH:CVE-2016-2147 SMASH Issue 163032 UBUNTU:CVE-2016-2147 USN-3935-1 bnc#970663 rh#1316554 |
CVE-2016-2148 | busybox:Released | moderate | () | BUGTRAQ:20190613 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series BUGTRAQ:20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X CONFIRM:busybox.net:CVE-2016-2148 CONFIRM:git.busybox.net:CVE-2016-2147 CONFIRM:git.busybox.net:CVE-2016-2148 CVE-2016-2148 FULLDISC:20190612 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series FULLDISC:20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X FULLDISC:20200827 SEC Consult SA-20200827-0 :: Multiple Vulnerabilities in ZTE mobile Hotspot MS910S GENTOO:GLSA-201612-04 MISC:packetstormsecurity.com:CVE-2010-0296 MISC:packetstormsecurity.com:CVE-2015-9261 MLIST:[debian-lts-announce] 20180727 [SECURITY] [DLA 1445-1] busybox security update MLIST:[debian-lts-announce] 20210215 [SECURITY] [DLA 2559-1] busybox security update MLIST:[oss-security] 20160311 two udhcpc (busybox) issues OSS:2016/Q1/614 RH:CVE-2016-2148 SMASH Issue 163033 UBUNTU:CVE-2016-2148 USN-3935-1 bnc#970662 rh#1316556 |
CVE-2016-2184 | kernel-source-rt:Already fixed | moderate | () | BID:84340 BUGTRAQ:20160310 oss-2016-16: Local RedHat Enterprise Linux DoS - RHEL 7.1 Kernel crashes on invalid USB device descriptors (snd-usb-audio driver) BUGTRAQ:20160310 oss-2016-17: Local RedHat Enterprise Linux DoS - RHEL 7.1 Kernel crashes (multiple free) on invalid USB device descriptors (snd-usb-audio driver) BUGTRAQ:20160314 Re: oss-2016-17: Local RedHat Enterprise Linux DoS - RHEL 7.1 Kernel crashes (multiple free) on invalid USB device descriptors (snd-usb-audio driver) CONFIRM:git.kernel.org:CVE-2016-2184 CONFIRM:github.com:CVE-2016-2184 CONFIRM:source.android.com:CVE-2016-6828 CONFIRM:www.kernel.org:CVE-2016-2184 CVE-2016-2184 D:CVE-2022-2590 DSA-3607 EXPLOIT-DB:39555 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 OSS:2023/10/10/4 Oracle:CVE-2015-6937 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 RH:CVE-2016-2184 SMASH Issue 163287 SUSE:SUSE-SU-2016:1019 SUSE:SUSE-SU-2016:1672 SUSE:SUSE-SU-2016:1690 SUSE:SUSE-SU-2016:1707 SUSE:SUSE-SU-2016:1764 SUSE:SUSE-SU-2016:2074 SUSE:openSUSE-SU-2016:1008 UBUNTU:CVE-2016-2184 UBUNTU:USN-2968-1 UBUNTU:USN-2968-2 UBUNTU:USN-2969-1 UBUNTU:USN-2970-1 UBUNTU:USN-2971-1 UBUNTU:USN-2971-2 UBUNTU:USN-2971-3 UBUNTU:USN-2996-1 UBUNTU:USN-2997-1 bnc#971125 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b rh#1317012 rh#1324749 rh#1384344 rh#2116175 |
CVE-2016-2187 | kernel-source-rt:Not affected | moderate | 4.6 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | BID:85425 CONFIRM:git.kernel.org:CVE-2016-2187 CONFIRM:github.com:CVE-2016-2187 CVE-2016-2187 D:CVE-2016-2187 DSA-3607 OSS:2016/Q3/323 Oracle:CVE-2016-5244 RH:CVE-2016-2187 SMASH Issue 163680 SUSE:SUSE-SU-2016:1672 SUSE:SUSE-SU-2016:1985 UBUNTU:CVE-2016-2187 UBUNTU:USN-2989-1 UBUNTU:USN-2996-1 UBUNTU:USN-2997-1 UBUNTU:USN-2998-1 UBUNTU:USN-3000-1 UBUNTU:USN-3001-1 UBUNTU:USN-3002-1 UBUNTU:USN-3003-1 UBUNTU:USN-3004-1 UBUNTU:USN-3005-1 UBUNTU:USN-3006-1 UBUNTU:USN-3007-1 bnc#971919 bnc#971944 rh#1317017 rh#1324749 |
CVE-2016-2188 | kernel-source-rt:Already fixed | moderate | () | BUGTRAQ:20160310 oss-2016-15: Local RedHat Enterprise Linux DoS - RHEL 7.1 Kernel crashes on invalid USB device descriptors (iowarrior driver) BUGTRAQ:20160315 Re: oss-2016-15: Local RedHat Enterprise Linux DoS - RHEL 7.1 Kernel crashes on invalid USB device descriptors (iowarrior driver) CONFIRM:git.kernel.org:CVE-2016-2188 CONFIRM:github.com:CVE-2016-2188 CONFIRM:www.kernel.org:CVE-2016-9685 CVE-2016-2188 D:CVE-2016-2188 D:CVE-2022-2590 EXPLOIT-DB:39556 OSS:2016/Q3/323 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 OSS:2023/10/10/4 Oracle:CVE-2015-6937 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 Oracle:CVE-2017-6074 RH:CVE-2016-2188 SMASH Issue 163290 SUSE:SUSE-SU-2016:1672 SUSE:SUSE-SU-2016:1690 SUSE:SUSE-SU-2016:1696 SUSE:SUSE-SU-2016:1707 SUSE:SUSE-SU-2016:1764 SUSE:SUSE-SU-2016:2074 SUSE:openSUSE-SU-2016:1382 UBUNTU:CVE-2016-2188 UBUNTU:USN-2968-1 UBUNTU:USN-2968-2 UBUNTU:USN-2969-1 UBUNTU:USN-2970-1 UBUNTU:USN-2971-1 UBUNTU:USN-2971-2 UBUNTU:USN-2971-3 UBUNTU:USN-2996-1 UBUNTU:USN-2997-1 bnc#970956 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 linux.git:commit:f5527fffff3f002b0a6b376163613b82f69de073 rh#1317018 rh#1324749 rh#1384344 rh#1435719 rh#1439087 rh#1462147 rh#1462158 rh#2116175 |
CVE-2016-2383 | kernel-source-rt:Unsupported | low | () | CONFIRM:git.kernel.org:CVE-2016-2383 CONFIRM:github.com:CVE-2016-2383 CVE-2016-2383 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MLIST:[oss-security] 20160214 CVE Request: Linux: Incorrect branch fixups for eBPF allow arbitrary read OSS:2016/Q1/333 OSS:2016/Q2/266 OSS:2023/10/10/4 RH:CVE-2016-2383 SMASH Issue 161884 SUSE:openSUSE-SU-2016:1008 UBUNTU:CVE-2016-2383 UBUNTU:USN-2947-1 UBUNTU:USN-2947-2 UBUNTU:USN-2947-3 bnc#966684 rh#1308452 |
CVE-2016-2384 | kernel-source-rt:Not affected | moderate | () | BID:83256 CONFIRM:git.kernel.org:CVE-2016-2384 CONFIRM:github.com:CVE-2016-2384 CVE-2016-2384 D:CVE-2016-2384 D:CVE-2022-2590 DSA-3503 MISC:github.com:CVE-2016-2384 MLIST:[oss-security] 20160214 CVE Request: Linux: ALSA: usb-audio: double-free triggered by invalid USB descriptor OSS:2016/Q1/334 OSS:2016/Q3/323 OSS:2016/Q3/325 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 OSS:2023/10/10/4 Oracle:CVE-2015-6937 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 RH:CVE-2016-2384 RHSA-2016:2574 RHSA-2016:2584 RHSA-2017:0817 SECTRACK:1035072 SMASH Issue 161883 SMASH Issue 162118 SUSE:SUSE-SU-2016:1019 SUSE:SUSE-SU-2016:1031 SUSE:SUSE-SU-2016:1032 SUSE:SUSE-SU-2016:1033 SUSE:SUSE-SU-2016:1034 SUSE:SUSE-SU-2016:1035 SUSE:SUSE-SU-2016:1037 SUSE:SUSE-SU-2016:1038 SUSE:SUSE-SU-2016:1039 SUSE:SUSE-SU-2016:1040 SUSE:SUSE-SU-2016:1041 SUSE:SUSE-SU-2016:1045 SUSE:SUSE-SU-2016:1046 UBUNTU:CVE-2016-2384 UBUNTU:USN-2928-1 UBUNTU:USN-2928-2 bnc#966693 bnc#967773 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b rh#1308444 rh#1324749 rh#1384344 rh#2116175 |
CVE-2016-2545 | kernel-source-rt:Already fixed | moderate | () | BID:83381 CONFIRM:git.kernel.org:CVE-2016-2543 CONFIRM:git.kernel.org:CVE-2016-2544 CONFIRM:git.kernel.org:CVE-2016-2545 CONFIRM:git.kernel.org:CVE-2016-2546 CONFIRM:git.kernel.org:CVE-2016-2548 CONFIRM:git.kernel.org:CVE-2016-2549 CONFIRM:github.com:CVE-2016-2545 CVE-2016-2545 D:CVE-2016-2545 D:CVE-2022-2590 DSA-3503 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 OSS:2016/Q1/410 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 OSS:2023/10/10/4 Oracle:CVE-2015-6937 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 RH:CVE-2016-2545 SECTRACK:1035296 SMASH Issue 162152 UBUNTU:CVE-2016-2545 bnc#967974 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b rh#1311560 rh#1324749 rh#1384344 rh#2116175 |
CVE-2016-2546 | kernel-source-rt:Already fixed | moderate | () | BID:83384 CONFIRM:git.kernel.org:CVE-2016-2543 CONFIRM:git.kernel.org:CVE-2016-2544 CONFIRM:git.kernel.org:CVE-2016-2545 CONFIRM:git.kernel.org:CVE-2016-2546 CONFIRM:git.kernel.org:CVE-2016-2548 CONFIRM:git.kernel.org:CVE-2016-2549 CONFIRM:github.com:CVE-2016-2546 CVE-2016-2546 D:CVE-2016-2546 D:CVE-2022-2590 DSA-3503 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 OSS:2016/Q1/410 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 OSS:2023/10/10/4 Oracle:CVE-2015-6937 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 RH:CVE-2016-2546 SECTRACK:1035301 SMASH Issue 162155 UBUNTU:CVE-2016-2546 bnc#967975 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b rh#1311564 rh#1324749 rh#1384344 rh#2116175 |
CVE-2016-2547 | kernel-source-rt:Already fixed | moderate | () | BID:83378 CONFIRM:git.kernel.org:CVE-2016-2543 CONFIRM:git.kernel.org:CVE-2016-2544 CONFIRM:git.kernel.org:CVE-2016-2545 CONFIRM:git.kernel.org:CVE-2016-2546 CONFIRM:git.kernel.org:CVE-2016-2548 CONFIRM:git.kernel.org:CVE-2016-2549 CONFIRM:github.com:CVE-2016-2548 CVE-2016-2547 D:CVE-2016-2547 D:CVE-2022-2590 DSA-3503 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 OSS:2016/Q1/410 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 OSS:2023/10/10/4 Oracle:CVE-2015-6937 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 RH:CVE-2016-2547 SECTRACK:1035298 SMASH Issue 162154 UBUNTU:CVE-2016-2547 bnc#968011 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b rh#1311566 rh#1324749 rh#1384344 rh#2116175 |
CVE-2016-2548 | kernel-source-rt:Already fixed | moderate | () | BID:83383 CONFIRM:git.kernel.org:CVE-2016-2543 CONFIRM:git.kernel.org:CVE-2016-2544 CONFIRM:git.kernel.org:CVE-2016-2545 CONFIRM:git.kernel.org:CVE-2016-2546 CONFIRM:git.kernel.org:CVE-2016-2548 CONFIRM:git.kernel.org:CVE-2016-2549 CVE-2016-2548 D:CVE-2016-2548 D:CVE-2022-2590 DSA-3503 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 OSS:2016/Q1/410 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 OSS:2023/10/10/4 Oracle:CVE-2015-6937 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 RH:CVE-2016-2548 SECTRACK:1035306 SMASH Issue 162158 UBUNTU:CVE-2016-2548 bnc#968012 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b rh#1311568 rh#1324749 rh#1384344 rh#2116175 |
CVE-2016-2549 | kernel-source-rt:Already fixed | moderate | () | BID:83382 CONFIRM:git.kernel.org:CVE-2016-2543 CONFIRM:git.kernel.org:CVE-2016-2544 CONFIRM:git.kernel.org:CVE-2016-2545 CONFIRM:git.kernel.org:CVE-2016-2546 CONFIRM:git.kernel.org:CVE-2016-2548 CONFIRM:git.kernel.org:CVE-2016-2549 CONFIRM:github.com:CVE-2016-2549 CVE-2016-2549 D:CVE-2016-2549 D:CVE-2022-2590 DSA-3503 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 OSS:2016/Q1/410 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 OSS:2023/10/10/4 Oracle:CVE-2015-6937 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 RH:CVE-2016-2549 SMASH Issue 162157 UBUNTU:CVE-2016-2549 bnc#968013 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b rh#1311570 rh#1324749 rh#1384344 rh#2116175 |
CVE-2016-2847 | kernel-source-rt:Released | moderate | () | BID:83870 CONFIRM:git.kernel.org:CVE-2016-2847 CONFIRM:www.oracle.com:CVE-2016-5386 CONFIRM:www.oracle.com:CVE-2016-6304 CVE-2013-4312 CVE-2016-2847 D:CVE-2016-2847 D:CVE-2022-2590 DSA-3503 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MLIST:[oss-security] 20160301 CVE request -- linux kernel: pipe: limit the per-user amount of pages allocated in pipes OSS:2016/Q1/538 OSS:2016/Q1/733 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 OSS:2023/10/10/4 Oracle:CVE-2015-6937 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 RH:CVE-2016-2847 RHSA-2016:2574 RHSA-2016:2584 RHSA-2017:0217 SMASH Issue 162725 SUSE:SUSE-SU-2016:1672 SUSE:SUSE-SU-2016:1690 SUSE:SUSE-SU-2016:1696 SUSE:SUSE-SU-2016:1707 SUSE:SUSE-SU-2016:1937 SUSE:SUSE-SU-2016:2074 SUSE:openSUSE-SU-2016:1382 UBUNTU:CVE-2016-2847 UBUNTU:USN-2946-1 UBUNTU:USN-2946-2 UBUNTU:USN-2947-1 UBUNTU:USN-2947-2 UBUNTU:USN-2947-3 UBUNTU:USN-2948-1 UBUNTU:USN-2948-2 UBUNTU:USN-2949-1 UBUNTU:USN-2967-1 UBUNTU:USN-2967-2 bnc#970948 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b linux.git:commit:759c01142a5d0f364a462346168a56de28a80f52 rh#1313428 rh#1324749 rh#1384344 rh#2116175 |
CVE-2016-2853 | kernel-obs-build:Analysis, kernel-rt:Analysis, kernel-rt_debug:Analysis, kernel-source-rt:Analysis, kernel-syms-rt:Analysis | important | () | BID:96839 CVE-2016-2853 D:CVE-2016-2853 MISC:bugs.launchpad.net:MLIST:[oss-security] 20160224 User Namespaces Overlayfs Xattr Setgid Privilege Escalation: Overlayfs MISC:www.halfdog.net:CVE-2016-2854 MLIST:[aufs] 20160219 aufs3 and aufs4 GIT release MLIST:[oss-security] 20160224 Aufs Union Filesystem Privilege Escalation In User Namespaces OSS:2016/Q1/542 OSS:2021/10/18/1 RH:CVE-2016-2853 SMASH Issue 162732 UBUNTU:CVE-2016-2853 bnc#982781 rh#1871722 |
CVE-2016-2854 | kernel-source-rt:Unsupported | important | () | BID:96838 CVE-2016-2854 D:CVE-2016-2854 MISC:www.halfdog.net:CVE-2016-2854 MLIST:[aufs] 20160219 aufs3 and aufs4 GIT release MLIST:[oss-security] 20160224 Aufs Union Filesystem Privilege Escalation In User Namespaces OSS:2016/Q1/542 RH:CVE-2016-2854 SMASH Issue 162731 UBUNTU:CVE-2016-2854 bnc#982780 rh#1871727 |
CVE-2016-3070 | kernel-source-rt:Not affected | low | () | BID:90518 CONFIRM:git.kernel.org:CVE-2016-3070 CONFIRM:github.com:CVE-2016-3070 CONFIRM:security-tracker.debian.org:CVE-2016-3070 CVE-2016-3070 DSA-3607 Oracle:CVE-2017-6074 RH:CVE-2016-3070 RHSA-2016:2574 RHSA-2016:2584 SMASH Issue 168780 UBUNTU:CVE-2016-3070 UBUNTU:USN-3034-1 UBUNTU:USN-3034-2 UBUNTU:USN-3035-1 UBUNTU:USN-3035-2 UBUNTU:USN-3035-3 UBUNTU:USN-3036-1 UBUNTU:USN-3037-1 bnc#979215 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1308846 rh#1420236 rh#1435719 |
CVE-2016-3134 | kernel-source-rt:Not affected | moderate | () | BID:84305 CONFIRM:git.kernel.org:CVE-2016-3134 CONFIRM:github.com:CVE-2016-3134 CONFIRM:www.oracle.com:CVE-2016-5386 CONFIRM:www.oracle.com:CVE-2016-6304 CVE-2016-3134 D:CVE-2016-3134 D:CVE-2022-2590 DSA-3607 MISC:bugs.chromium.org:MLIST:[oss-security] 20160624 Linux CVE-2016-4997 (local privilege escalation) and CVE-2016-4998 (out of bounds memory access) MISC:code.google.com:CVE-2016-3135 MISC:git.kernel.org:MLIST:[oss-security] 20160624 Linux CVE-2016-4997 (local privilege escalation) and CVE-2016-4998 (out of bounds memory access) OSS:2016/Q1/619 OSS:2016/Q2/599 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 OSS:2023/10/10/4 Oracle:CVE-2015-6937 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 RH:CVE-2016-3134 RHSA-2016:1847 RHSA-2016:1875 RHSA-2016:1883 SECTRACK:1036763 SMASH Issue 163274 SMASH Issue 163585 SUSE:SUSE-SU-2016:1672 SUSE:SUSE-SU-2016:1690 SUSE:SUSE-SU-2016:1696 SUSE:SUSE-SU-2016:1764 SUSE:SUSE-SU-2016:1961 SUSE:SUSE-SU-2016:1985 SUSE:SUSE-SU-2016:1994 SUSE:SUSE-SU-2016:1995 SUSE:SUSE-SU-2016:2000 SUSE:SUSE-SU-2016:2001 SUSE:SUSE-SU-2016:2002 SUSE:SUSE-SU-2016:2005 SUSE:SUSE-SU-2016:2006 SUSE:SUSE-SU-2016:2007 SUSE:SUSE-SU-2016:2009 SUSE:SUSE-SU-2016:2010 SUSE:SUSE-SU-2016:2014 SUSE:SUSE-SU-2016:2074 SUSE:openSUSE-SU-2016:1641 UBUNTU:CVE-2016-3134 UBUNTU:USN-2929-1 UBUNTU:USN-2929-2 UBUNTU:USN-2930-1 UBUNTU:USN-2930-2 UBUNTU:USN-2930-3 UBUNTU:USN-2931-1 UBUNTU:USN-2932-1 UBUNTU:USN-3049-1 UBUNTU:USN-3050-1 bnc#971126 bnc#971793 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b rh#1317383 rh#1324749 rh#1384344 rh#2116175 |
CVE-2016-3135 | kernel-source-rt:Unsupported | important | () | BID:84305 CONFIRM:git.kernel.org:CVE-2016-3135 CONFIRM:github.com:CVE-2016-3135 CVE-2016-3135 D:CVE-2016-3135 MISC:code.google.com:CVE-2016-3135 OSS:2016/Q1/619 RH:CVE-2016-3135 SMASH Issue 163273 UBUNTU:CVE-2016-3135 UBUNTU:USN-2930-1 UBUNTU:USN-2930-2 UBUNTU:USN-2930-3 UBUNTU:USN-3054-1 UBUNTU:USN-3055-1 UBUNTU:USN-3056-1 UBUNTU:USN-3057-1 bnc#970904 bnc#971794 rh#1317386 |
CVE-2016-3137 | kernel-source-rt:Already fixed | moderate | () | BID:84300 CONFIRM:git.kernel.org:CVE-2016-3137 CONFIRM:www.kernel.org:CVE-2016-9685 CVE-2016-3137 D:CVE-2016-3137 D:CVE-2022-2590 DSA-3607 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:seclists.org:MLIST:[oss-security] 20160314 Re: CVE request -- linux kernel: crash on invalid USB device descriptors (cypress_m8 driver) MLIST:[oss-security] 20160314 Re: CVE request -- linux kernel: crash on invalid USB device descriptors (cypress_m8 driver) OSS:2016/Q1/621 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 OSS:2023/10/10/4 Oracle:CVE-2015-6937 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 RH:CVE-2016-3137 SMASH Issue 163271 SUSE:SUSE-SU-2016:1672 SUSE:SUSE-SU-2016:1690 SUSE:SUSE-SU-2016:1696 SUSE:SUSE-SU-2016:1707 SUSE:SUSE-SU-2016:1764 SUSE:SUSE-SU-2016:2074 SUSE:openSUSE-SU-2016:1382 UBUNTU:CVE-2016-3137 UBUNTU:USN-2968-1 UBUNTU:USN-2968-2 UBUNTU:USN-2970-1 UBUNTU:USN-2971-1 UBUNTU:USN-2971-2 UBUNTU:USN-2971-3 UBUNTU:USN-2996-1 UBUNTU:USN-2997-1 UBUNTU:USN-3000-1 bnc#970970 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b linux.git:commit:c55aee1bf0e6b6feec8b2927b43f7a09a6d5f754 rh#1283368 rh#1316996 rh#1324749 rh#1384344 rh#2116175 |
CVE-2016-3138 | kernel-source-rt:Already fixed | moderate | () | CONFIRM:git.kernel.org:CVE-2016-3138 CONFIRM:git.kernel.org:CVE-2016-8650 CONFIRM:github.com:CVE-2016-3138 CONFIRM:www.kernel.org:CVE-2016-9685 CVE-2016-3138 D:CVE-2016-3138 D:CVE-2022-2590 DSA-3607 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:seclists.org:MLIST:[oss-security] 20160314 Re: CVE request -- linux kernel: crash on invalid USB device descriptors (cdc_acm driver) MLIST:[oss-security] 20160314 Re: CVE request -- linux kernel: crash on invalid USB device descriptors (cdc_acm driver) OSS:2016/Q1/622 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 OSS:2023/10/10/4 Oracle:CVE-2015-6937 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 RH:CVE-2016-3138 SMASH Issue 163270 SUSE:SUSE-SU-2016:1672 SUSE:SUSE-SU-2016:1690 SUSE:SUSE-SU-2016:1696 SUSE:SUSE-SU-2016:1707 SUSE:SUSE-SU-2016:1764 SUSE:SUSE-SU-2016:2074 SUSE:openSUSE-SU-2016:1382 UBUNTU:CVE-2016-3138 UBUNTU:USN-2968-1 UBUNTU:USN-2968-2 UBUNTU:USN-2969-1 UBUNTU:USN-2970-1 UBUNTU:USN-2971-1 UBUNTU:USN-2971-2 UBUNTU:USN-2971-3 UBUNTU:USN-2996-1 UBUNTU:USN-2997-1 bnc#970911 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b rh#1283366 rh#1316204 rh#1324749 rh#1384344 rh#2116175 |
CVE-2016-3139 | kernel-source-rt:Not affected | moderate | () | CONFIRM:security-tracker.debian.org:CVE-2016-3139 CVE-2016-3139 D:CVE-2016-3139 D:CVE-2022-2590 EXPLOIT-DB:39538 MISC:git.kernel.org:CVE-2016-3139 MISC:github.com:CVE-2016-3139 OSS:2016/Q1/623 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 OSS:2023/10/10/4 Oracle:CVE-2015-6937 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 RH:CVE-2016-3139 SMASH Issue 163269 SUSE:SUSE-SU-2016:1019 SUSE:SUSE-SU-2016:1672 SUSE:SUSE-SU-2016:1690 SUSE:SUSE-SU-2016:1707 SUSE:SUSE-SU-2016:1764 SUSE:SUSE-SU-2016:2074 UBUNTU:CVE-2016-3139 bnc#970909 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b rh#1283375 rh#1283377 rh#1316993 rh#1324749 rh#1384344 rh#2116175 |
CVE-2016-3191 | pcre:Not affected | low | 3.7 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) | BID:84810 CONFIRM:bugs.exim.org:CVE-2016-3191 CONFIRM:vcs.pcre.org:CVE-2016-3191 CVE-2016-3191 D:CVE-2016-3191 RH:CVE-2016-3191 RHSA-2016:1025 RHSA-2016:1132 SMASH Issue 163559 SMASH Issue 176112 UBUNTU:CVE-2016-3191 ZDI-16-477 bdo#815920 bdo#815921 bnc#971741 rh#1287629 rh#1311503 |
CVE-2016-3695 | kernel-source-rt:Released | low | 2.2 (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L) | BID:102327 CONFIRM:github.com:CVE-2016-3695 CVE-2016-3695 MISC:git.kernel.org:OSS:2020/Q1/69 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 Oracle:CVE-2017-6074 RH:CVE-2016-3695 SMASH Issue 179623 UBUNTU:CVE-2016-3695 bnc#1023051 jsc#CAR-1810 rh#1322755 rh#1435719 |
CVE-2016-3709 | libxml2:Released | moderate | 6.8 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N) | CVE-2016-3709 MISC:mail.gnome.org:CVE-2016-3709 RHSA-2022:7715 RHSA-2023:4767 SMASH Issue 338444 bnc#1201978 jsc#CAR-1938 rh#2112766 |
CVE-2016-3713 | kernel-source-rt:Already fixed | moderate | () | CONFIRM:git.kernel.org:CVE-2016-3713 CONFIRM:www.kernel.org:CVE-2016-9754 CVE-2016-3713 D:CVE-2016-3713 MLIST:[oss-security] 20160516 CVE-2016-3713 Linux kernel: kvm: OOB r/w access issue with MSR 0x2F8 OSS:2016/Q2/348 RH:CVE-2016-3713 SMASH Issue 169071 UBUNTU:CVE-2016-3713 bnc#979715 linux.git:commit:9842df62004f366b9fed2423e24df10542ee0dc5 rh#1332139 |
CVE-2016-3841 | kernel-source-rt:Not affected | moderate | () | BID:92227 CONFIRM:git.kernel.org:CVE-2016-3841 CONFIRM:github.com:CVE-2016-3841 CONFIRM:source.android.com:CVE-2016-3857 CONFIRM:www.kernel.org:CVE-2016-3841 CVE-2016-3841 D:CVE-2022-2590 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 RH:CVE-2016-3841 RHSA-2016:0855 RHSA-2016:2574 RHSA-2016:2584 RHSA-2016:2695 SMASH Issue 171689 UBUNTU:CVE-2016-3841 bnc#992566 bnc#992569 http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=45f6fad84cc305103b28d73482b344d7f5b76f39 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b rh#1364971 rh#1384344 rh#2116175 |
CVE-2016-3951 | kernel-source-rt:Not affected | moderate | () | BID:91028 CONFIRM:git.kernel.org:CVE-2016-3951 CONFIRM:github.com:CVE-2016-3951 CVE-2016-3951 D:CVE-2016-3951 DSA-3607 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:MLIST:[oss-security] 20160406 Fwd: CVE Request: Linux: usbnet: memory corruption triggered by invalid USB descriptor MLIST:[netdev] 20160304 Re: Possible double-free in the usbnet driver MLIST:[oss-security] 20160406 Fwd: CVE Request: Linux: usbnet: memory corruption triggered by invalid USB descriptor OSS:2016/Q2/19 Oracle:CVE-2016-5244 RH:CVE-2016-3951 SMASH Issue 166533 UBUNTU:CVE-2016-3951 bnc#974418 rh#1324749 rh#1324782 |
CVE-2016-4070 | perl:Already fixed | low | () | APPLE:APPLE-SA-2010-03-29-1 APPLE:APPLE-SA-2016-03-21-1 APPLE:APPLE-SA-2016-03-21-2 APPLE:APPLE-SA-2016-03-21-3 APPLE:APPLE-SA-2016-03-21-5 APPLE:APPLE-SA-2016-05-16-4 APPLE:APPLE-SA-2016-07-18-1 APPLE:APPLE-SA-2016-07-18-2 APPLE:APPLE-SA-2016-07-18-3 APPLE:APPLE-SA-2016-07-18-4 APPLE:APPLE-SA-2016-07-18-6 APPLE:APPLE-SA-2016-09-20 BID:100503 BID:100514 BID:100861 BID:103144 BID:103415 BID:103782 BID:103796 BID:103846 BID:103848 BID:103954 BID:104222 BID:104764 BID:104765 BID:104768 BID:104773 BID:104774 BID:104775 BID:104780 BID:104782 BID:105117 BID:105118 BID:105126 BID:105587 BID:105590 BID:105591 BID:105597 BID:105601 BID:105602 BID:105608 BID:105615 BID:105617 BID:105619 BID:105622 BID:105624 BID:105635 BID:105637 BID:105647 BID:105656 BID:105658 BID:106619 BID:106622 BID:106625 BID:106626 BID:106627 BID:106628 BID:67121 BID:69257 BID:70142 BID:74073 BID:74075 BID:74078 BID:74081 BID:74085 BID:74095 BID:74112 BID:76157 BID:76187 BID:76282 BID:76289 BID:76291 BID:79091 BID:82307 BID:82990 BID:84220 BID:84223 BID:84271 BID:85572 BID:85576 BID:85801 BID:86957 BID:90876 BID:91067 BID:91068 BID:91081 BID:91566 BID:91787 BID:91869 BID:92912 BID:93132 BID:93287 BID:93604 BID:93685 BID:93687 BID:93697 BID:93711 BID:93718 BID:93728 BID:93744 BID:94371 BID:94377 BID:94925 BID:95019 BID:95131 BID:95429 BID:95849 BID:96389 BID:96392 BID:96409 BID:96410 BID:96434 BID:96435 BID:96436 BID:97102 BID:97725 BID:97742 BID:97763 BID:97765 BID:97776 BID:97791 BID:97812 BID:97818 BID:97831 BID:97848 BID:97849 BID:97851 BID:99046 BUGTRAQ:20140925 LSE Leading Security Experts GmbH - LSE-2014-06-10 - Perl CORE - Deep Recursion Stack Overflow BUGTRAQ:20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities CISCO:20160927 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: September 2016 CONFIRM:access.redhat.com:CVE-2014-0114 CONFIRM:access.redhat.com:CVE-2014-3577 CONFIRM:access.redhat.com:CVE-2015-0293 CONFIRM:access.redhat.com:CVE-2015-3456 CONFIRM:advisories.mageia.org:CVE-2014-0114 CONFIRM:advisories.mageia.org:CVE-2014-4330 CONFIRM:bto.bluecoat.com:CVE-2016-1950 CONFIRM:bto.bluecoat.com:CVE-2016-3191 CONFIRM:bto.bluecoat.com:CVE-2016-7052 CONFIRM:bugs.eclipse.org:CVE-2018-12539 CONFIRM:bugs.exim.org:CVE-2015-8381 CONFIRM:bugs.exim.org:CVE-2015-8382 CONFIRM:bugs.jython.org:CVE-2016-4000 CONFIRM:bugs.launchpad.net:CVE-2015-8866 CONFIRM:bugs.launchpad.net:CVE-2015-8867 CONFIRM:bugs.php.net:CVE-2015-8866 CONFIRM:bugs.php.net:CVE-2015-8867 CONFIRM:bugs.php.net:CVE-2015-8878 CONFIRM:bugs.php.net:CVE-2016-3141 CONFIRM:bugs.php.net:CVE-2016-4070 CONFIRM:bugzilla.mozilla.org:CVE-2016-1950 CONFIRM:bugzilla.mozilla.org:CVE-2016-1955 CONFIRM:bugzilla.mozilla.org:CVE-2016-1956 CONFIRM:bugzilla.mozilla.org:CVE-2016-1959 CONFIRM:bugzilla.mozilla.org:CVE-2016-1967 CONFIRM:bugzilla.mozilla.org:CVE-2016-1968 CONFIRM:bugzilla.mozilla.org:CVE-2016-1969 CONFIRM:bugzilla.mozilla.org:CVE-2016-1970 CONFIRM:bugzilla.mozilla.org:CVE-2016-1971 CONFIRM:bugzilla.mozilla.org:CVE-2016-1972 CONFIRM:bugzilla.mozilla.org:CVE-2016-1973 CONFIRM:bugzilla.mozilla.org:CVE-2016-1975 CONFIRM:bugzilla.mozilla.org:CVE-2016-1976 CONFIRM:bugzilla.redhat.com:CVE-2015-7559 CONFIRM:bugzilla.redhat.com:CVE-2016-9583 CONFIRM:cert-portal.siemens.com:/productcert/pdf/ssa-412672.pdf CONFIRM:codereview.chromium.org:CVE-2016-1675 CONFIRM:codereview.chromium.org:CVE-2016-1676 CONFIRM:codereview.chromium.org:CVE-2016-1677 CONFIRM:codereview.chromium.org:CVE-2016-1678 CONFIRM:codereview.chromium.org:CVE-2016-1679 CONFIRM:codereview.chromium.org:CVE-2016-1680 CONFIRM:codereview.chromium.org:CVE-2016-1681 CONFIRM:codereview.chromium.org:CVE-2016-1682 CONFIRM:codereview.chromium.org:CVE-2016-1685 CONFIRM:codereview.chromium.org:CVE-2016-1686 CONFIRM:codereview.chromium.org:CVE-2016-1687 CONFIRM:codereview.chromium.org:CVE-2016-1688 CONFIRM:codereview.chromium.org:CVE-2016-1689 CONFIRM:codereview.chromium.org:CVE-2016-1691 CONFIRM:codereview.chromium.org:CVE-2016-1692 CONFIRM:codereview.chromium.org:CVE-2016-1693 CONFIRM:codereview.chromium.org:CVE-2016-1694 CONFIRM:codereview.chromium.org:CVE-2016-1701 CONFIRM:commons.apache.org:CVE-2014-0114 CONFIRM:crbug.com:CVE-2016-1672 CONFIRM:crbug.com:CVE-2016-1673 CONFIRM:crbug.com:CVE-2016-1674 CONFIRM:crbug.com:CVE-2016-1675 CONFIRM:crbug.com:CVE-2016-1676 CONFIRM:crbug.com:CVE-2016-1677 CONFIRM:crbug.com:CVE-2016-1678 CONFIRM:crbug.com:CVE-2016-1679 CONFIRM:crbug.com:CVE-2016-1680 CONFIRM:crbug.com:CVE-2016-1681 CONFIRM:crbug.com:CVE-2016-1682 CONFIRM:crbug.com:CVE-2016-1683 CONFIRM:crbug.com:CVE-2016-1684 CONFIRM:crbug.com:CVE-2016-1685 CONFIRM:crbug.com:CVE-2016-1686 CONFIRM:crbug.com:CVE-2016-1687 CONFIRM:crbug.com:CVE-2016-1688 CONFIRM:crbug.com:CVE-2016-1689 CONFIRM:crbug.com:CVE-2016-1690 CONFIRM:crbug.com:CVE-2016-1691 CONFIRM:crbug.com:CVE-2016-1692 CONFIRM:crbug.com:CVE-2016-1693 CONFIRM:crbug.com:CVE-2016-1694 CONFIRM:crbug.com:CVE-2016-1695 CONFIRM:curl.haxx.se:CVE-2016-0755 CONFIRM:curl.haxx.se:CVE-2016-9586 CONFIRM:curl.haxx.se:CVE-2018-1000121 CONFIRM:developer.mozilla.org:CVE-2016-1950 CONFIRM:git.gnome.org:CVE-2016-1683 CONFIRM:git.gnome.org:CVE-2016-1684 CONFIRM:git.gnupg.org:CVE-2017-9526 CONFIRM:git.php.net:CVE-2015-8382 CONFIRM:git.php.net:CVE-2015-8866 CONFIRM:git.php.net:CVE-2015-8867 CONFIRM:git.php.net:CVE-2016-3141 CONFIRM:git.savannah.gnu.org:CVE-2014-9746 CONFIRM:git.savannah.gnu.org:CVE-2014-9747 CONFIRM:github.com:CVE-2013-7330 CONFIRM:github.com:CVE-2014-2058 CONFIRM:github.com:CVE-2014-2059 CONFIRM:github.com:CVE-2014-2061 CONFIRM:github.com:CVE-2014-2062 CONFIRM:github.com:CVE-2014-2063 CONFIRM:github.com:CVE-2014-2064 CONFIRM:github.com:CVE-2014-2065 CONFIRM:github.com:CVE-2014-2066 CONFIRM:github.com:CVE-2014-2067 CONFIRM:github.com:CVE-2014-2068 CONFIRM:github.com:CVE-2016-1182 CONFIRM:github.com:CVE-2016-4979 CONFIRM:github.com:CVE-2016-9389 CONFIRM:github.com:CVE-2016-9394 CONFIRM:github.com:CVE-2016-9583 CONFIRM:github.com:CVE-2016-9586 CONFIRM:github.com:CVE-2016-9840 CONFIRM:github.com:CVE-2016-9841 CONFIRM:github.com:CVE-2016-9842 CONFIRM:github.com:CVE-2016-9843 CONFIRM:github.com:CVE-2017-1000071 CONFIRM:github.com:CVE-2017-14735 CONFIRM:googlechromereleases.blogspot.com:CVE-2016-1695 CONFIRM:h20566.www2.hpe.com:CVE-2016-0763 CONFIRM:h20566.www2.hpe.com:CVE-2016-2014 CONFIRM:h20566.www2.hpe.com:CVE-2016-2183 CONFIRM:h20566.www2.hpe.com:CVE-2016-5388 CONFIRM:h20566.www2.hpe.com:CVE-2016-5773 CONFIRM:h20566.www2.hpe.com:CVE-2016-6306 CONFIRM:h20566.www2.hpe.com:CVE-2016-8518 CONFIRM:h20566.www2.hpe.com:CVE-2017-5787 CONFIRM:hg.mozilla.org:CVE-2016-1975 CONFIRM:hg.python.org:CVE-2016-4000 CONFIRM:httpd.apache.org:CVE-2016-4979 CONFIRM:issues.apache.org:CVE-2014-0114 CONFIRM:issues.apache.org:CVE-2015-1832 CONFIRM:issues.apache.org:CVE-2015-7559 CONFIRM:issues.apache.org:CVE-2016-1000031 CONFIRM:jenkins.io:CVE-2017-1000403 CONFIRM:jira.mariadb.org:CVE-2016-6662 CONFIRM:kb.juniper.net:CVE-2015-3209 CONFIRM:kb.juniper.net:CVE-2016-7052 CONFIRM:kb.pulsesecure.net:CVE-2016-6306 CONFIRM:kc.mcafee.com:CVE-2016-6306 CONFIRM:mariadb.com:CVE-2015-2571 CONFIRM:mariadb.com:CVE-2016-6662 CONFIRM:metacpan.org:CVE-2014-4330 CONFIRM:nodejs.org:CVE-2016-7099 CONFIRM:nodesecurity.io:CVE-2013-7454 CONFIRM:nodesecurity.io:CVE-2014-9772 CONFIRM:nodesecurity.io:CVE-2015-8315 CONFIRM:nodesecurity.io:CVE-2015-8854 CONFIRM:nodesecurity.io:CVE-2015-8855 CONFIRM:nodesecurity.io:CVE-2015-8856 CONFIRM:nodesecurity.io:CVE-2015-8858 CONFIRM:nodesecurity.io:CVE-2015-8859 CONFIRM:nodesecurity.io:CVE-2015-8860 CONFIRM:nodesecurity.io:CVE-2015-8862 CONFIRM:nodesecurity.io:CVE-2016-4055 CONFIRM:php.net:CVE-2016-3142 CONFIRM:pivotal.io:CVE-2018-1258 CONFIRM:rwkbp.makekb.com:CVE-2015-8965 CONFIRM:security-tracker.debian.org:CVE-2016-1181 CONFIRM:security-tracker.debian.org:CVE-2016-1182 CONFIRM:security.netapp.com:CVE-2014-0114 CONFIRM:security.netapp.com:CVE-2015-2575 CONFIRM:security.netapp.com:CVE-2016-1000031 CONFIRM:security.netapp.com:CVE-2016-1182 CONFIRM:security.netapp.com:CVE-2016-4979 CONFIRM:security.netapp.com:CVE-2016-9843 CONFIRM:security.netapp.com:CVE-2017-10388 CONFIRM:security.netapp.com:CVE-2017-5645 CONFIRM:security.netapp.com:CVE-2018-1305 CONFIRM:security.netapp.com:CVE-2018-2973 CONFIRM:security.netapp.com:CVE-2019-2435 CONFIRM:support.apple.com:CVE-2009-0689 CONFIRM:support.apple.com:CVE-2016-1950 CONFIRM:support.apple.com:CVE-2016-4073 CONFIRM:support.apple.com:CVE-2016-4616 CONFIRM:support.apple.com:CVE-2016-4653 CONFIRM:support.apple.com:CVE-2016-7582 CONFIRM:support.apple.com:CVE-2017-13873 CONFIRM:support.apple.com:CVE-2017-13877 CONFIRM:support.apple.com:CVE-2017-6464 CONFIRM:support.f5.com:CVE-2015-8854 CONFIRM:support.f5.com:CVE-2016-2178 CONFIRM:support.hpe.com:CVE-2016-6306 CONFIRM:support.hpe.com:CVE-2016-7052 CONFIRM:support.hpe.com:CVE-2018-2940 CONFIRM:support.hpe.com:CVE-2018-2973 CONFIRM:svn.apache.org:CVE-2012-6153 CONFIRM:svn.apache.org:CVE-2015-1832 CONFIRM:vcs.pcre.org:CVE-2015-8382 CONFIRM:vcs.pcre.org:CVE-2015-8395 CONFIRM:www-01.ibm.com:CVE-2014-0114 CONFIRM:www-01.ibm.com:CVE-2014-3022 CONFIRM:www-01.ibm.com:CVE-2015-1832 CONFIRM:www-01.ibm.com:CVE-2016-3191 CONFIRM:www-01.ibm.com:CVE-2016-7052 CONFIRM:www.apache.org:CVE-2016-4979 CONFIRM:www.huawei.com:CVE-2016-6306 CONFIRM:www.ibm.com:CVE-2014-0963 CONFIRM:www.ibm.com:CVE-2018-1656 CONFIRM:www.lsexperts.de:CVE-2014-4330 CONFIRM:www.mozilla.org:CVE-2016-1950 CONFIRM:www.mozilla.org:CVE-2016-1955 CONFIRM:www.mozilla.org:CVE-2016-1956 CONFIRM:www.mozilla.org:CVE-2016-1959 CONFIRM:www.mozilla.org:CVE-2016-1967 CONFIRM:www.mozilla.org:CVE-2016-1968 CONFIRM:www.mozilla.org:CVE-2016-1969 CONFIRM:www.mozilla.org:CVE-2016-1973 CONFIRM:www.mozilla.org:CVE-2016-1976 CONFIRM:www.oracle.com:CVE-2014-0114 CONFIRM:www.oracle.com:CVE-2014-4271 CONFIRM:www.oracle.com:CVE-2014-6564 CONFIRM:www.oracle.com:CVE-2015-0437 CONFIRM:www.oracle.com:CVE-2015-2568 CONFIRM:www.oracle.com:CVE-2015-2579 CONFIRM:www.oracle.com:CVE-2015-4879 CONFIRM:www.oracle.com:CVE-2015-8391 CONFIRM:www.oracle.com:CVE-2016-0778 CONFIRM:www.oracle.com:CVE-2016-2802 CONFIRM:www.oracle.com:CVE-2016-4957 CONFIRM:www.oracle.com:CVE-2016-5240 CONFIRM:www.oracle.com:CVE-2016-5477 CONFIRM:www.oracle.com:CVE-2016-6302 CONFIRM:www.oracle.com:CVE-2016-6304 CONFIRM:www.oracle.com:CVE-2016-7039 CONFIRM:www.oracle.com:CVE-2016-7154 CONFIRM:www.oracle.com:CVE-2016-8296 CONFIRM:www.oracle.com:CVE-2017-10365 CONFIRM:www.oracle.com:CVE-2017-3456 CONFIRM:www.oracle.com:CVE-2017-3626 CONFIRM:www.oracle.com:CVE-2017-3636 CONFIRM:www.oracle.com:CVE-2017-5689 CONFIRM:www.oracle.com:CVE-2017-5709 CONFIRM:www.oracle.com:CVE-2017-5715 CONFIRM:www.oracle.com:CVE-2017-5753 CONFIRM:www.oracle.com:CVE-2017-6074 CONFIRM:www.oracle.com:CVE-2018-18223 CONFIRM:www.oracle.com:CVE-2018-2639 CONFIRM:www.oracle.com:CVE-2018-2819 CONFIRM:www.oracle.com:CVE-2018-3081 CONFIRM:www.oracle.com:CVE-2018-3125 CONFIRM:www.pcre.org:CVE-2015-2325 CONFIRM:www.percona.com:CVE-2016-6662 CONFIRM:www.php.net:CVE-2009-3558 CONFIRM:www.php.net:CVE-2016-9935 CONFIRM:www.php.net:CVE-2016-9936 CONFIRM:www.splunk.com:CVE-2016-6304 CONFIRM:www.tenable.com:CVE-2016-4055 CONFIRM:www.tenable.com:CVE-2016-7052 CONFIRM:www.tenable.com:CVE-2016-8625 CONFIRM:www.tenable.com:CVE-2016-9260 CONFIRM:www.tenable.com:CVE-2016-9261 CONFIRM:www.vmware.com:CVE-2014-0114 CONFIRM:www.vmware.com:CVE-2014-8371 CONFIRM:x-stream.github.io:CVE-2013-7285 CVE-2009-3559 CVE-2012-6153 CVE-2013-7285 CVE-2013-7451 CVE-2013-7452 CVE-2013-7453 CVE-2013-7454 CVE-2014-0114 CVE-2014-0245 CVE-2014-3540 CVE-2014-4172 CVE-2014-4330 CVE-2014-4651 CVE-2014-7192 CVE-2014-9745 CVE-2014-9746 CVE-2014-9747 CVE-2014-9772 CVE-2015-0405 CVE-2015-0423 CVE-2015-0433 CVE-2015-0438 CVE-2015-0439 CVE-2015-0441 CVE-2015-0498 CVE-2015-0499 CVE-2015-0500 CVE-2015-0501 CVE-2015-0503 CVE-2015-0505 CVE-2015-0506 CVE-2015-0507 CVE-2015-0508 CVE-2015-0511 CVE-2015-0852 CVE-2015-1832 CVE-2015-2325 CVE-2015-2326 CVE-2015-2566 CVE-2015-2567 CVE-2015-2568 CVE-2015-2571 CVE-2015-2573 CVE-2015-2575 CVE-2015-2576 CVE-2015-2613 CVE-2015-5125 CVE-2015-5127 CVE-2015-5128 CVE-2015-5129 CVE-2015-5130 CVE-2015-5131 CVE-2015-5132 CVE-2015-5134 CVE-2015-5328 CVE-2015-5539 CVE-2015-5540 CVE-2015-5541 CVE-2015-5544 CVE-2015-5545 CVE-2015-5551 CVE-2015-5552 CVE-2015-5553 CVE-2015-5554 CVE-2015-5555 CVE-2015-5556 CVE-2015-5557 CVE-2015-5558 CVE-2015-5559 CVE-2015-5560 CVE-2015-5561 CVE-2015-5564 CVE-2015-5565 CVE-2015-5566 CVE-2015-7559 CVE-2015-7940 CVE-2015-8315 CVE-2015-8381 CVE-2015-8382 CVE-2015-8383 CVE-2015-8384 CVE-2015-8385 CVE-2015-8386 CVE-2015-8387 CVE-2015-8388 CVE-2015-8389 CVE-2015-8390 CVE-2015-8391 CVE-2015-8392 CVE-2015-8393 CVE-2015-8394 CVE-2015-8395 CVE-2015-8854 CVE-2015-8855 CVE-2015-8856 CVE-2015-8857 CVE-2015-8858 CVE-2015-8859 CVE-2015-8860 CVE-2015-8861 CVE-2015-8862 CVE-2015-8878 CVE-2015-8965 CVE-2015-9251 CVE-2016-0635 CVE-2016-0755 CVE-2016-1000031 CVE-2016-1181 CVE-2016-1182 CVE-2016-1672 CVE-2016-1673 CVE-2016-1674 CVE-2016-1675 CVE-2016-1676 CVE-2016-1677 CVE-2016-1678 CVE-2016-1679 CVE-2016-1680 CVE-2016-1681 CVE-2016-1682 CVE-2016-1683 CVE-2016-1684 CVE-2016-1685 CVE-2016-1686 CVE-2016-1687 CVE-2016-1688 CVE-2016-1689 CVE-2016-1690 CVE-2016-1691 CVE-2016-1692 CVE-2016-1693 CVE-2016-1694 CVE-2016-1695 CVE-2016-1950 CVE-2016-1955 CVE-2016-1956 CVE-2016-1959 CVE-2016-1967 CVE-2016-1968 CVE-2016-1969 CVE-2016-1970 CVE-2016-1971 CVE-2016-1972 CVE-2016-1973 CVE-2016-1975 CVE-2016-1976 CVE-2016-2178 CVE-2016-2515 CVE-2016-2537 CVE-2016-3141 CVE-2016-3142 CVE-2016-4000 CVE-2016-4055 CVE-2016-4070 CVE-2016-4612 CVE-2016-4619 CVE-2016-4979 CVE-2016-5483 CVE-2016-5501 CVE-2016-5538 CVE-2016-5605 CVE-2016-5608 CVE-2016-5610 CVE-2016-5611 CVE-2016-5613 CVE-2016-5616 CVE-2016-5617 CVE-2016-5684 CVE-2016-6662 CVE-2016-6814 CVE-2016-9389 CVE-2016-9392 CVE-2016-9583 CVE-2016-9586 CVE-2016-9840 CVE-2016-9841 CVE-2016-9842 CVE-2017-0379 CVE-2017-13745 CVE-2017-14229 CVE-2017-14735 CVE-2017-15095 CVE-2017-16012 CVE-2017-3308 CVE-2017-3309 CVE-2017-3329 CVE-2017-3453 CVE-2017-3454 CVE-2017-3456 CVE-2017-3461 CVE-2017-3462 CVE-2017-3463 CVE-2017-3464 CVE-2017-3468 CVE-2017-3600 CVE-2017-9526 CVE-2018-1000121 CVE-2018-12539 CVE-2018-1258 CVE-2018-1517 CVE-2018-1656 CVE-2018-2767 CVE-2018-2797 CVE-2018-2815 CVE-2018-2825 CVE-2018-2826 CVE-2018-2909 CVE-2018-2938 CVE-2018-2940 CVE-2018-2941 CVE-2018-2952 CVE-2018-2964 CVE-2018-2972 CVE-2018-2973 CVE-2018-3005 CVE-2018-3055 CVE-2018-3085 CVE-2018-3086 CVE-2018-3087 CVE-2018-3088 CVE-2018-3089 CVE-2018-3090 CVE-2018-3091 CVE-2018-3127 CVE-2018-3134 CVE-2018-3136 CVE-2018-3139 CVE-2018-3149 CVE-2018-3150 CVE-2018-3169 CVE-2018-3180 CVE-2018-3183 CVE-2018-3209 CVE-2018-3211 CVE-2018-3214 CVE-2018-3287 CVE-2018-3288 CVE-2018-3289 CVE-2018-3290 CVE-2018-3291 CVE-2018-3292 CVE-2018-3293 CVE-2018-3294 CVE-2018-3295 CVE-2018-3296 CVE-2018-3297 CVE-2018-3298 CVE-2019-2422 CVE-2019-2426 CVE-2019-2449 CVE-2019-2455 CVE-2019-2481 CVE-2019-2482 CVE-2019-2503 CVE-2019-2507 CVE-2019-2510 CVE-2019-2513 CVE-2019-2528 CVE-2019-2529 CVE-2019-2530 CVE-2019-2531 CVE-2019-2532 CVE-2019-2533 CVE-2019-2534 CVE-2019-2535 CVE-2019-2536 CVE-2019-2537 CVE-2019-2539 CVE-2019-2540 CVE-2024-2466 D:CVE-2015-2301 D:CVE-2015-2571 D:CVE-2015-2573 D:CVE-2015-2575 D:CVE-2015-2576 D:CVE-2015-5557 D:CVE-2015-5558 D:CVE-2015-5559 D:CVE-2015-5560 D:CVE-2015-5561 D:CVE-2015-5562 D:CVE-2015-5563 D:CVE-2015-5564 D:CVE-2015-5565 D:CVE-2015-8386 D:CVE-2015-8387 D:CVE-2015-8388 D:CVE-2015-8389 D:CVE-2015-8390 D:CVE-2015-8391 D:CVE-2015-8392 D:CVE-2015-8393 D:CVE-2015-8394 D:CVE-2015-8395 D:CVE-2016-1674 D:CVE-2016-1682 D:CVE-2016-1694 D:CVE-2016-1695 D:CVE-2016-1950 D:CVE-2016-1970 D:CVE-2016-1973 D:CVE-2016-2178 D:CVE-2016-3141 D:CVE-2016-4055 D:CVE-2016-4070 D:CVE-2016-5608 D:CVE-2016-5610 D:CVE-2016-6662 D:CVE-2016-9586 D:CVE-2017-9526 D:CVE-2018-1517 D:CVE-2018-1656 D:CVE-2018-3297 D:CVE-2018-3298 D:CVE-2022-2590 DEBIAN:DSA-3959 DEBIAN:DSA-4136 DEBIAN:DSA-4268 DEBIAN:DSA-4281 DEBIAN:DSA-4341 DSA-2940 DSA-3229 DSA-3311 DSA-3370 DSA-3392 DSA-3417 DSA-3455 DSA-3510 DSA-3520 DSA-3560 DSA-3590 DSA-3605 DSA-3621 DSA-3666 DSA-3673 DSA-3688 DSA-3834 DSA-3880 DSA-3893 DSA-3944 DSA-4136 DSA-4281 DSA-5378 EXPLOIT-DB:37852 EXPLOIT-DB:37854 EXPLOIT-DB:37855 EXPLOIT-DB:37856 EXPLOIT-DB:37857 EXPLOIT-DB:37859 EXPLOIT-DB:37861 EXPLOIT-DB:40360 FEDORA:FEDORA-2014-11453 FEDORA:FEDORA-2014-9380 FEDORA:FEDORA-2015-16104 FEDORA:FEDORA-2015-16105 FEDORA:FEDORA-2015-16106 FEDORA:FEDORA-2015-7d95466eda FEDORA:FEDORA-2015-992342e82f FEDORA:FEDORA-2015-decbab7c9f FEDORA:FEDORA-2015-eb896290d3 FEDORA:FEDORA-2016-3fa315a5dd FEDORA:FEDORA-2016-55137a3adb FEDORA:FEDORA-2016-57bebab3b6 FEDORA:FEDORA-2016-5a141de5d9 FREEBSD:FreeBSD-SA-16:26 FULLDISC:20140925 LSE Leading Security Experts GmbH - LSE-2014-06-10 - Perl CORE - Deep Recursion Stack Overflow FULLDISC:20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities FULLDISC:20160706 CVE-2016-4979: HTTPD webserver - X509 Client certificate based authentication can be bypassed when HTTP/2 is used [vs] FULLDISC:20160912 CVE-2016-6662 - MySQL Remote Root Code Execution / Privilege Escalation ( 0day ) FULLDISC:20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities GENTOO:GLSA-201507-19 GENTOO:GLSA-201605-06 GENTOO:GLSA-201607-02 GENTOO:GLSA-201607-07 GENTOO:GLSA-201607-09 GENTOO:GLSA-201610-02 GENTOO:GLSA-201612-16 GENTOO:GLSA-201612-27 GENTOO:GLSA-201701-01 GENTOO:GLSA-201701-47 GENTOO:GLSA-201701-56 GENTOO:GLSA-201701-68 GENTOO:GLSA-201710-28 GLSA-201908-24 GLSA-202007-54 HP:HPSBGN03041 HP:HPSBMU03090 HP:HPSBST03160 IBM Security Bulletin 0713459 (Cognos Business Intelligence) IBM Security Bulletin 0713487 (Rational Collaborative Lifecycle Management) IBM Security Bulletin 0715641 (Cognos Business Intelligence) IBM Security Bulletin 0715721 (Agile Lifecycle Manager) IBM Security Bulletin 0716285 (Cognos TM1) IBM Security Bulletin 0716289 (Cognos Insight) IBM Security Bulletin 0717693 (Tivoli Monitoring V6) IBM Security Bulletin 0717727 (Tivoli Monitoring V6) IBM Security Bulletin 0717895 (Rational Business Developer) IBM Security Bulletin 0718381 (Platform Symphony) IBM Security Bulletin 0718421 (InfoSphere Guardium Data Redaction) IBM Security Bulletin 0718447 (Cognos Planning) IBM Security Bulletin 0718949 (Cloud Manager with Openstack) IBM Security Bulletin 0719163 (Rational Reporting for Development Intelligence) IBM Security Bulletin 0719165 (Rational Insight) IBM Security Bulletin 0720115 (Spectrum Conductor with Spark) IBM Security Bulletin 0728577 (Content Classification) IBM Security Bulletin 0729341 (ILOG CPLEX Optimization Studio) IBM Security Bulletin 0729343 (Decision Optimization Center) IBM Security Bulletin 0729607 (WebSphere Application Server) IBM Security Bulletin 0735319 (Tivoli System Automation Application Manager) IBM Security Bulletin 0735477 (Spectrum Conductor) IBM Security Bulletin 0737281 (Application Delivery Intelligence) IBM Security Bulletin 0738853 (Tivoli Monitoring V6) IBM Security Bulletin 0739057 (Sterling Connect:Direct for Microsoft Windows) IBM Security Bulletin 0739549 (Sterling Connect:Direct File Agent) IBM Security Bulletin 0739701 (Sterling Connect:Direct FTP+) IBM Security Bulletin 0739763 (Sterling Connect:Direct for UNIX) IBM Security Bulletin 0743351 (Workload Scheduler) IBM Security Bulletin 0792275 (Tivoli Netcool/Impact) IBM Security Bulletin 2015806 (Runtimes for Java Technology) IBM Security Bulletin 2016406 (Decision Optimization Center) IBM Security Bulletin 2016663 (Tivoli Netcool OMNIbus) IBM Security Bulletin 2016776 (Content Collector) IBM Security Bulletin 2016781 (Content Collector for SAP Applications) IBM Security Bulletin 2016827 (MessageSight) IBM Security Bulletin 2017431 (PureApplication System) IBM Security Bulletin 2017432 (PureApplication System) IBM Security Bulletin 2017449 (Web Experience Factory) IBM Security Bulletin 2017554 (Rational Software Architect) IBM Security Bulletin 715641 (Cognos Business Intelligence Server) IBM Security Bulletin 717121 (Cognos Controller) IBM Security Bulletin 717125 (MQ Appliance) IBM Security Bulletin 719933 (Tivoli Application Dependency Discovery Manager) IBM Security Bulletin 720173 (Transformation Extender) IBM Security Bulletin 725491 (DB2 for Linux, UNIX and Windows) IBM Security Bulletin 726009 (DataPower Gateways) IBM Security Bulletin 728399 (WebSphere Service Registry and Repository) IBM Security Bulletin 728567 (Algo Credit Manager) IBM Security Bulletin 728607 (PureApplication System) IBM Security Bulletin 729116 (Spectrum Protect Plus) IBM Security Bulletin 729699 (QRadar SIEM) IBM Security Bulletin 729745 (WebSphere Application Server Patterns) IBM Security Bulletin 730083 (Rational ClearCase) IBM Security Bulletin 730311 (Cognos Command Center) IBM Security Bulletin 730799 (Spectrum Control Standard Edition) IBM Security Bulletin 730909 (AIX family) IBM Security Bulletin 731323 (Financial Transaction Manager) IBM Security Bulletin 731325 (Financial Transaction Manager) IBM Security Bulletin 731329 (i) IBM Security Bulletin 731331 (Financial Transaction Manager) IBM Security Bulletin 731337 (Financial Transaction Manager) IBM Security Bulletin 731339 (Financial Transaction Manager) IBM Security Bulletin 731419 (Rational Software Architect Designer) IBM Security Bulletin 731507 (Rational Software Architect Design Manager) IBM Security Bulletin 731615 (Process Designer) IBM Security Bulletin 731641 (InfoSphere Guardium Data Redaction) IBM Security Bulletin 731875 (FileNet System Monitor) IBM Security Bulletin 732375 (Initiate Master Data Service) IBM Security Bulletin 732455 (Rational Performance Tester) IBM Security Bulletin 732457 (Rational Service Tester for SOA Quality) IBM Security Bulletin 732723 (Tivoli Application Dependency Discovery Manager) IBM Security Bulletin 732753 (Agile Lifecycle Manager) IBM Security Bulletin 732785 (Security Guardium) IBM Security Bulletin 732846 (Spectrum Symphony) IBM Security Bulletin 732850 (App Connect Enterprise) IBM Security Bulletin 732896 (Planning Analytics) IBM Security Bulletin 732932 (SPSS Statistics) IBM Security Bulletin 733068 (Liberty for Java for Bluemix) IBM Security Bulletin 733457 (Tivoli Netcool/OMNIbus) IBM Security Bulletin 733543 (Tivoli Netcool/Impact) IBM Security Bulletin 733845 (Integration Designer) IBM Security Bulletin 733857 (Rational DOORS Web Access) IBM Security Bulletin 733869 (DataPower Gateways) IBM Security Bulletin 733905 (Rational Application Developer for WebSphere Software) IBM Security Bulletin 734161 (WebSphere Application Server in Cloud) IBM Security Bulletin 734595 (Rational Build Forge) IBM Security Bulletin 735325 (Tivoli System Automation for Multiplatforms) IBM Security Bulletin 735421 (MessageSight) IBM Security Bulletin 735481 (Rational Directory Server) IBM Security Bulletin 735515 (Rational Host On-Demand) IBM Security Bulletin 735541 (Rational Method Composer) IBM Security Bulletin 735551 (Runtimes for Java Technology) IBM Security Bulletin 735807 (Tivoli Monitoring V6) IBM Security Bulletin 737495 (Cloud App Management) IBM Security Bulletin 737775 (Web Experience Factory) IBM Security Bulletin 737813 (Content Collector for SAP Applications) IBM Security Bulletin 738337 (Monitoring) IBM Security Bulletin 738347 (Rational Publishing Engine) IBM Security Bulletin 738633 (WebSphere Service Registry and Repository) IBM Security Bulletin 738729 (Installation Manager) IBM Security Bulletin 738743 (Rational Developer for i) IBM Security Bulletin 738905 (Cognos Insight) IBM Security Bulletin 738907 (Cognos TM1) IBM Security Bulletin 738985 (WebSphere MQ) IBM Security Bulletin 738997 (MQ) IBM Security Bulletin 739183 (http://www.ibm.com/support/docview.wss?uid=ibm10739183) IBM Security Bulletin 739227 (Cloud Orchestrator) IBM Security Bulletin 739231 (Algo Credit Manager) IBM Security Bulletin 739251 (Decision Optimization Center) IBM Security Bulletin 739261 (Monitoring) IBM Security Bulletin 739387 (Spectrum Protect for Virtual Environments) IBM Security Bulletin 739455 (Spectrum Protect Snapshot) IBM Security Bulletin 739941 (Content Collector) IBM Security Bulletin 739985 (WebSphere Application Server Patterns) IBM Security Bulletin 740269 (Notes) IBM Security Bulletin 740383 (Sterling Connect:Direct Browser User Interface) IBM Security Bulletin 740419 (Security Access Manager Appliance) IBM Security Bulletin 740447 (Operational Decision Manager) IBM Security Bulletin 740467 (Tivoli Storage Manager FastBack) IBM Security Bulletin 740673 (Control Center) IBM Security Bulletin 741745 (Tivoli Composite Application Manager (ITCAM) for Transactions) IBM Security Bulletin 742369 (Security SiteProtector System) IBM Security Bulletin 742729 (QRadar SIEM) IBM Security Bulletin 743071 (Rational Asset Analyzer) IBM Security Bulletin 743149 (Financial Transaction Manager) IBM Security Bulletin 743157 (Financial Transaction Manager) IBM Security Bulletin 743193 (Spectrum Protect) IBM Security Bulletin 743961 (Rational Publishing Engine) IBM Security Bulletin 744823 (Rational Collaborative Lifecycle Management) IBM Security Bulletin 787583 (API Connect) IBM Security Bulletin 787833 (AIX family) IBM Security Bulletin 788277 (WebSphere Cast Iron) IBM Security Bulletin 789805 (WebSphere MQ) IBM Security Bulletin 791171 (Rational DOORS Web Access) IBM Security Bulletin 791855 (WebSphere eXtreme Scale) IBM Security Bulletin 791861 (WebSphere DataPower XC10 Appliance) IBM Security Bulletin 792239 (Cloud Manager with Openstack) IBM Security Bulletin T1027807 (AIX family) JVN:JVN#03188560 JVN:JVN#65044642 JVNDB:JVNDB-2016-000096 JVNDB:JVNDB-2016-000097 L3:42159 L3:44989 L3:45334 L3:45906 L3:47274 L3:53225 MANDRIVA:MDVSA-2009:302 MANDRIVA:MDVSA-2014:095 MANDRIVA:MDVSA-2015:136 MANDRIVA:MDVSA-2015:227 MISC:access.redhat.com:CVE-2014-0245 MISC:access.redhat.com:MLIST:[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations MISC:blog.diniscruz.com:CVE-2013-7285 MISC:blogs.gentoo.org:CVE-2016-9399 MISC:bugs.exim.org:CVE-2015-2325 MISC:bugs.exim.org:CVE-2015-2326 MISC:bugs.launchpad.net:MLIST:[oss-security] 20150911 CVE Request: 2 FreeType issues MISC:bugs.php.net:CVE-2009-3559 MISC:bugzilla.redhat.com:CVE-2014-0245 MISC:bugzilla.redhat.com:CVE-2016-9586 MISC:curl.haxx.se MISC:curl.haxx.se:OSS:2018/Q1/235 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:developer.mozilla.org:CVE-2016-1979 MISC:eprint.iacr.org:CVE-2016-2178 MISC:eprint.iacr.org:CVE-2017-0379 MISC:exchange.xforce.ibmcloud.com:CVE-2014-4172 MISC:fortiguard.com:CVE-2015-2325 MISC:fortiguard.com:CVE-2015-2326 MISC:git.gnupg.org:CVE-2017-0379 MISC:git.openssl.org:MLIST:[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations MISC:github.com:CVE-2014-4172 MISC:github.com:CVE-2015-9251 MISC:github.com:CVE-2017-14229 MISC:github.com:MLIST:[oss-security] 20161205 Re: CVE Request: zlib security issues found during audit MISC:github.com:OSS:2018/Q1/235 MISC:github.com:OSS:2024/Q1/256 MISC:ics-cert.us-cert.gov:CVE-2015-9251 MISC:issues.apache.org:CVE-2014-4651 MISC:issues.jasig.org:CVE-2014-4172 MISC:legalhackers.com:CVE-2016-6662 MISC:lists.apache.org:CVE-2018-1305 MISC:lists.debian.org:CVE-2017-0379 MISC:lists.fedoraproject.org:CVE-2014-4172 MISC:mail-archives.apache.org:CVE-2016-6814 MISC:nodesecurity.io:CVE-2014-10064 MISC:nodesecurity.io:CVE-2015-8857 MISC:nodesecurity.io:MLIST:[oss-security] 20160420 various vulnerabilities in Node.js packages MISC:packetstormsecurity.com:CVE-2014-4330 MISC:packetstormsecurity.com:CVE-2016-0755 MISC:packetstormsecurity.com:CVE-2016-4979 MISC:savannah.nongnu.org:CVE-2014-9747 MISC:seclists.org:CVE-2014-4651 MISC:security-tracker.debian.org:CVE-2016-4000 MISC:security-tracker.debian.org:CVE-2017-0379 MISC:snyk.io:CVE-2015-9251 MISC:snyk.io:CVE-2016-4000 MISC:sw.aveva.com:CVE-2015-9251 MISC:web-in-security.blogspot.ca:CVE-2015-7940 MISC:web.archive.org:CVE-2013-7285 MISC:wiki.mozilla.org:CVE-2016-9843 MISC:www.arista.com:CVE-2016-6306 MISC:www.debian.org:CVE-2014-4172 MISC:www.mail-archive.com:CVE-2014-4172 MISC:www.openssl.org:CVE-2016-6302 MISC:www.oracle.com:CVE-2013-7285 MISC:www.oracle.com:CVE-2014-0107 MISC:www.oracle.com:CVE-2015-7501 MISC:www.oracle.com:CVE-2016-1000031 MISC:www.sourceclear.com:CVE-2015-8861 MISC:www.talosintelligence.com:CVE-2016-5684 MISC:www.tenable.com:CVE-2016-1000031 MISC:www.tenable.com:CVE-2016-6793 MLIST:[activemq-issues] 20190718 [jira] [Updated] (AMQ-7236) SEV-1 Security vulnerability in spring-expression-4.3.11.RELEASE.jar (spring framework) and xstream-1.4.10.jar MLIST:[activemq-issues] 20190826 [jira] [Created] (AMQ-7288) Security Vulnerabilities in ActiveMQ dependent libraries. MLIST:[announce] 20181105 [SECURITY] Immediately upgrade commons-fileupload to version 1.3.3 when running Struts 2.3.36 or prior MLIST:[apache-ignite-developers] 20180601 [CVE-2014-0114]: Apache Ignite is vulnerable to existing CVE-2014-0114 MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 MLIST:[debian-lts-announce] 20180306 [SECURITY] [DLA 1301-1] tomcat7 security update MLIST:[debian-lts-announce] 20180318 [SECURITY] [DLA 1309-1] curl security update MLIST:[debian-lts-announce] 20180627 [SECURITY] [DLA 1400-1] tomcat7 security update MLIST:[debian-lts-announce] 20180729 [SECURITY] [DLA 1450-1] tomcat8 security update MLIST:[debian-lts-announce] 20181105 [SECURITY] [DLA 1566-1] mysql-5.5 security update MLIST:[debian-lts-announce] 20181106 [SECURITY] [DLA 1568-1] curl security update MLIST:[debian-lts-announce] 20181122 [SECURITY] [DLA 1590-1] openjdk-7 security update MLIST:[debian-lts-announce] 20190201 [SECURITY] [DLA 1655-1] mariadb-10.0 security update MLIST:[debian-lts-announce] 20190324 [SECURITY] [DLA 1725-1] rsync security update MLIST:[debian-lts-announce] 20200129 [SECURITY] [DLA 2085-1] zlib security update MLIST:[flink-dev] 20190811 Apache flink 1.7.2 security issues MLIST:[flink-user] 20190811 Apache flink 1.7.2 security issues MLIST:[flink-user] 20190813 Apache flink 1.7.2 security issues MLIST:[flink-user] 20190813 Re: Apache flink 1.7.2 security issues MLIST:[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.... MLIST:[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.... MLIST:[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.... MLIST:[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.... MLIST:[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/ MLIST:[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/ MLIST:[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html secu... MLIST:[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html se... MLIST:[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/ MLIST:[httpd-cvs] 20210330 svn commit: r1073149 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/ MLIST:[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/ MLIST:[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.h... MLIST:[oss-security] 20091120 CVE request: php 5.3.1 update MLIST:[oss-security] 20091120 Re: CVE request: php 5.3.1 update MLIST:[oss-security] 20140109 Re: CVE request: remote code execution via deserialization in XStream MLIST:[oss-security] 20140220 Re: Possible CVE Requests: several issues fixed in Jenkins (Advisory 2014-02-14) MLIST:[oss-security] 20140616 CVE request for commons-beanutils: 'class' property is exposed, potentially leading to RCE MLIST:[oss-security] 20140707 Re: CVE request for commons-beanutils: 'class' property is exposed, potentially leading to RCE MLIST:[oss-security] 20140925 LSE Leading Security Experts GmbH - LSE-2014-06-10 - Perl CORE - Deep Recursion Stack Overflow MLIST:[oss-security] 20150804 Re: CVE Request: Information disclosure in pcre MLIST:[oss-security] 20150828 CVE-2015-0852 [FreeImage] Integer overflow in PluginPCX.cpp MLIST:[oss-security] 20150911 CVE Request: 2 FreeType issues MLIST:[oss-security] 20150925 Re: CVE Request: 2 FreeType issues MLIST:[oss-security] 20151022 CVE Request: invalid curve attack on bouncycastle MLIST:[oss-security] 20151022 Re: CVE Request: invalid curve attack on bouncycastle MLIST:[oss-security] 20151128 Re: Heap Overflow in PCRE MLIST:[oss-security] 20160420 various vulnerabilities in Node.js packages MLIST:[oss-security] 20160423 Re: CVE request: PHP issues fixed in 7.0.5, 5.6.20 and 5.5.34 releases MLIST:[oss-security] 20160608 CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations MLIST:[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations MLIST:[oss-security] 20160609 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations MLIST:[oss-security] 20160705 CVE-2016-4979: HTTPD webserver - X509 Client certificate based authentication can be bypassed when HTTP/2 is used [vs] MLIST:[oss-security] 20160912 CVE-2016-6662 - MySQL Remote Root Code Execution / Privilege Escalation ( 0day ) MLIST:[oss-security] 20161117 Re: jasper: multiple assertion failures MLIST:[oss-security] 20161205 Re: CVE Request: zlib security issues found during audit MLIST:[perl.perl5.porters] 20140918 fix for CVE-2014-4330 present in blead MLIST:[php-announce] 20091119 5.3.1 Release announcement MLIST:[tomcat-dev] 20190319 svn commit: r1855831 [24/30] - in /tomcat/site/trunk: ./ docs/ xdocs/ MLIST:[tomcat-dev] 20190319 svn commit: r1855831 [25/30] - in /tomcat/site/trunk: ./ docs/ xdocs/ MLIST:[tomcat-dev] 20190325 svn commit: r1856174 [22/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/ MLIST:[tomcat-dev] 20190325 svn commit: r1856174 [23/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/ MLIST:[tomcat-dev] 20190325 svn commit: r1856174 [24/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/ MLIST:[tomcat-dev] 20190413 svn commit: r1857494 [16/20] - in /tomcat/site/trunk: ./ docs/ xdocs/ MLIST:[tomcat-dev] 20190413 svn commit: r1857494 [17/20] - in /tomcat/site/trunk: ./ docs/ xdocs/ MLIST:[tomcat-dev] 20190413 svn commit: r1857496 [3/4] - in /tomcat/site/trunk: ./ docs/ xdocs/ MLIST:[tomcat-dev] 20190415 svn commit: r1857582 [17/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/ MLIST:[tomcat-dev] 20190415 svn commit: r1857582 [18/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/ MLIST:[tomcat-dev] 20190415 svn commit: r1857582 [19/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/ MLIST:[xstream-user] 20130717 Re: Is it possible to unregister the DynamicProxyConverter using the SpringOXM wrapper MLIST:[xstream-user] 20130718 Re: Is it possible to unregister the DynamicProxyConverter using the SpringOXM wrapper OSS:2015/Q4/414 OSS:2015/Q4/419 OSS:2015/Q4/422 OSS:2016/Q1/258 OSS:2016/Q1/625 OSS:2016/Q2/122 OSS:2016/Q2/138 OSS:2016/Q2/493 OSS:2016/Q3/481 OSS:2016/Q3/602 OSS:2016/Q4/602 OSS:2016/Q4/719 OSS:2017/Q2/418 OSS:2017/Q4/297 OSS:2017/Q4/298 OSS:2017/Q4/299 OSS:2017/Q4/300 OSS:2017/Q4/301 OSS:2017/Q4/59 OSS:2017/Q4/60 OSS:2018/Q1/174 OSS:2018/Q1/235 OSS:2018/Q2/21 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/11/10/2 OSS:2022/Q3/99 OSS:2022/Q4/132 OSS:2022/Q4/135 OSS:2024/03/27/4 OSS:2024/Q1/256 Oracle:CVE-2011-4461 Oracle:CVE-2013-1768 Oracle:CVE-2014-0114 Oracle:CVE-2014-3490 Oracle:CVE-2014-3577 Oracle:CVE-2015-0204 Oracle:CVE-2015-0235 Oracle:CVE-2015-0405 Oracle:CVE-2015-0423 Oracle:CVE-2015-0433 Oracle:CVE-2015-0438 Oracle:CVE-2015-0439 Oracle:CVE-2015-0441 Oracle:CVE-2015-0498 Oracle:CVE-2015-0499 Oracle:CVE-2015-0500 Oracle:CVE-2015-0501 Oracle:CVE-2015-0503 Oracle:CVE-2015-0505 Oracle:CVE-2015-0506 Oracle:CVE-2015-0507 Oracle:CVE-2015-0508 Oracle:CVE-2015-0511 Oracle:CVE-2015-1832 Oracle:CVE-2015-2566 Oracle:CVE-2015-2567 Oracle:CVE-2015-2568 Oracle:CVE-2015-2571 Oracle:CVE-2015-2573 Oracle:CVE-2015-2575 Oracle:CVE-2015-2576 Oracle:CVE-2015-5600 Oracle:CVE-2015-6937 Oracle:CVE-2015-7501 Oracle:CVE-2015-7940 Oracle:CVE-2015-8965 Oracle:CVE-2015-9251 Oracle:CVE-2016-0635 Oracle:CVE-2016-0714 Oracle:CVE-2016-0729 Oracle:CVE-2016-1000031 Oracle:CVE-2016-1181 Oracle:CVE-2016-1182 Oracle:CVE-2016-1950 Oracle:CVE-2016-2099 Oracle:CVE-2016-2107 Oracle:CVE-2016-2176 Oracle:CVE-2016-2179 Oracle:CVE-2016-2183 Oracle:CVE-2016-3092 Oracle:CVE-2016-3506 Oracle:CVE-2016-4000 Oracle:CVE-2016-4055 Oracle:CVE-2016-4979 Oracle:CVE-2016-5007 Oracle:CVE-2016-5019 Oracle:CVE-2016-5080 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 Oracle:CVE-2016-5501 Oracle:CVE-2016-5538 Oracle:CVE-2016-5605 Oracle:CVE-2016-5608 Oracle:CVE-2016-5610 Oracle:CVE-2016-5611 Oracle:CVE-2016-5613 Oracle:CVE-2016-5616 Oracle:CVE-2016-5617 Oracle:CVE-2016-5684 Oracle:CVE-2016-6304 Oracle:CVE-2016-6662 Oracle:CVE-2016-6814 Oracle:CVE-2016-7103 Oracle:CVE-2016-7167 Oracle:CVE-2016-9583 Oracle:CVE-2016-9841 Oracle:CVE-2016-9843 Oracle:CVE-2016-9878 Oracle:CVE-2017-0379 Oracle:CVE-2017-10068 Oracle:CVE-2017-12617 Oracle:CVE-2017-13077 Oracle:CVE-2017-13745 Oracle:CVE-2017-14229 Oracle:CVE-2017-14735 Oracle:CVE-2017-15095 Oracle:CVE-2017-17562 Oracle:CVE-2017-3308 Oracle:CVE-2017-3309 Oracle:CVE-2017-3329 Oracle:CVE-2017-3453 Oracle:CVE-2017-3454 Oracle:CVE-2017-3456 Oracle:CVE-2017-3461 Oracle:CVE-2017-3462 Oracle:CVE-2017-3463 Oracle:CVE-2017-3464 Oracle:CVE-2017-3468 Oracle:CVE-2017-3600 Oracle:CVE-2017-3633 Oracle:CVE-2017-3732 Oracle:CVE-2017-3736 Oracle:CVE-2017-3737 Oracle:CVE-2017-5533 Oracle:CVE-2017-5645 Oracle:CVE-2017-5662 Oracle:CVE-2017-5664 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2017-6074 Oracle:CVE-2017-7525 Oracle:CVE-2017-7805 Oracle:CVE-2017-9798 Oracle:CVE-2018-0732 Oracle:CVE-2018-0734 Oracle:CVE-2018-0739 Oracle:CVE-2018-1000120 Oracle:CVE-2018-1000300 Oracle:CVE-2018-10933 Oracle:CVE-2018-11039 Oracle:CVE-2018-1171 Oracle:CVE-2018-11763 Oracle:CVE-2018-11776 Oracle:CVE-2018-11784 Oracle:CVE-2018-1258 Oracle:CVE-2018-1275 Oracle:CVE-2018-1305 Oracle:CVE-2018-13785 Oracle:CVE-2018-1656 Oracle:CVE-2018-2562 Oracle:CVE-2018-2563 Oracle:CVE-2018-2572 Oracle:CVE-2018-2587 Oracle:CVE-2018-2598 Oracle:CVE-2018-2612 Oracle:CVE-2018-2622 Oracle:CVE-2018-2628 Oracle:CVE-2018-2640 Oracle:CVE-2018-2665 Oracle:CVE-2018-2668 Oracle:CVE-2018-2676 Oracle:CVE-2018-2685 Oracle:CVE-2018-2686 Oracle:CVE-2018-2687 Oracle:CVE-2018-2688 Oracle:CVE-2018-2689 Oracle:CVE-2018-2690 Oracle:CVE-2018-2693 Oracle:CVE-2018-2694 Oracle:CVE-2018-2698 Oracle:CVE-2018-2718 Oracle:CVE-2018-2737 Oracle:CVE-2018-2738 Oracle:CVE-2018-2739 Oracle:CVE-2018-2742 Oracle:CVE-2018-2746 Oracle:CVE-2018-2747 Oracle:CVE-2018-2748 Oracle:CVE-2018-2749 Oracle:CVE-2018-2750 Oracle:CVE-2018-2752 Oracle:CVE-2018-2753 Oracle:CVE-2018-2754 Oracle:CVE-2018-2755 Oracle:CVE-2018-2756 Oracle:CVE-2018-2758 Oracle:CVE-2018-2759 Oracle:CVE-2018-2760 Oracle:CVE-2018-2761 Oracle:CVE-2018-2762 Oracle:CVE-2018-2763 Oracle:CVE-2018-2764 Oracle:CVE-2018-2765 Oracle:CVE-2018-2766 Oracle:CVE-2018-2767 Oracle:CVE-2018-2768 Oracle:CVE-2018-2769 Oracle:CVE-2018-2770 Oracle:CVE-2018-2771 Oracle:CVE-2018-2772 Oracle:CVE-2018-2773 Oracle:CVE-2018-2774 Oracle:CVE-2018-2775 Oracle:CVE-2018-2776 Oracle:CVE-2018-2777 Oracle:CVE-2018-2778 Oracle:CVE-2018-2779 Oracle:CVE-2018-2780 Oracle:CVE-2018-2781 Oracle:CVE-2018-2782 Oracle:CVE-2018-2783 Oracle:CVE-2018-2784 Oracle:CVE-2018-2785 Oracle:CVE-2018-2786 Oracle:CVE-2018-2787 Oracle:CVE-2018-2788 Oracle:CVE-2018-2789 Oracle:CVE-2018-2790 Oracle:CVE-2018-2791 Oracle:CVE-2018-2792 Oracle:CVE-2018-2793 Oracle:CVE-2018-2794 Oracle:CVE-2018-2795 Oracle:CVE-2018-2796 Oracle:CVE-2018-2797 Oracle:CVE-2018-2798 Oracle:CVE-2018-2799 Oracle:CVE-2018-2800 Oracle:CVE-2018-2801 Oracle:CVE-2018-2804 Oracle:CVE-2018-2805 Oracle:CVE-2018-2806 Oracle:CVE-2018-2807 Oracle:CVE-2018-2808 Oracle:CVE-2018-2809 Oracle:CVE-2018-2810 Oracle:CVE-2018-2811 Oracle:CVE-2018-2812 Oracle:CVE-2018-2813 Oracle:CVE-2018-2814 Oracle:CVE-2018-2815 Oracle:CVE-2018-2816 Oracle:CVE-2018-2817 Oracle:CVE-2018-2818 Oracle:CVE-2018-2819 Oracle:CVE-2018-2820 Oracle:CVE-2018-2821 Oracle:CVE-2018-2822 Oracle:CVE-2018-2823 Oracle:CVE-2018-2825 Oracle:CVE-2018-2826 Oracle:CVE-2018-2827 Oracle:CVE-2018-2828 Oracle:CVE-2018-2830 Oracle:CVE-2018-2831 Oracle:CVE-2018-2832 Oracle:CVE-2018-2834 Oracle:CVE-2018-2835 Oracle:CVE-2018-2836 Oracle:CVE-2018-2837 Oracle:CVE-2018-2838 Oracle:CVE-2018-2839 Oracle:CVE-2018-2840 Oracle:CVE-2018-2841 Oracle:CVE-2018-2842 Oracle:CVE-2018-2843 Oracle:CVE-2018-2844 Oracle:CVE-2018-2845 Oracle:CVE-2018-2846 Oracle:CVE-2018-2849 Oracle:CVE-2018-2850 Oracle:CVE-2018-2852 Oracle:CVE-2018-2854 Oracle:CVE-2018-2855 Oracle:CVE-2018-2856 Oracle:CVE-2018-2857 Oracle:CVE-2018-2858 Oracle:CVE-2018-2859 Oracle:CVE-2018-2860 Oracle:CVE-2018-2861 Oracle:CVE-2018-2862 Oracle:CVE-2018-2863 Oracle:CVE-2018-2864 Oracle:CVE-2018-2865 Oracle:CVE-2018-2866 Oracle:CVE-2018-2867 Oracle:CVE-2018-2868 Oracle:CVE-2018-2869 Oracle:CVE-2018-2870 Oracle:CVE-2018-2871 Oracle:CVE-2018-2872 Oracle:CVE-2018-2873 Oracle:CVE-2018-2874 Oracle:CVE-2018-2876 Oracle:CVE-2018-2877 Oracle:CVE-2018-2878 Oracle:CVE-2018-2879 Oracle:CVE-2018-2881 Oracle:CVE-2018-2882 Oracle:CVE-2018-2887 Oracle:CVE-2018-2888 Oracle:CVE-2018-2889 Oracle:CVE-2018-2891 Oracle:CVE-2018-2892 Oracle:CVE-2018-2893 Oracle:CVE-2018-2894 Oracle:CVE-2018-2895 Oracle:CVE-2018-2896 Oracle:CVE-2018-2897 Oracle:CVE-2018-2898 Oracle:CVE-2018-2899 Oracle:CVE-2018-2900 Oracle:CVE-2018-2901 Oracle:CVE-2018-2902 Oracle:CVE-2018-2903 Oracle:CVE-2018-2904 Oracle:CVE-2018-2905 Oracle:CVE-2018-2906 Oracle:CVE-2018-2907 Oracle:CVE-2018-2908 Oracle:CVE-2018-2909 Oracle:CVE-2018-2911 Oracle:CVE-2018-2912 Oracle:CVE-2018-2913 Oracle:CVE-2018-2914 Oracle:CVE-2018-2915 Oracle:CVE-2018-2916 Oracle:CVE-2018-2917 Oracle:CVE-2018-2918 Oracle:CVE-2018-2919 Oracle:CVE-2018-2920 Oracle:CVE-2018-2921 Oracle:CVE-2018-2922 Oracle:CVE-2018-2923 Oracle:CVE-2018-2924 Oracle:CVE-2018-2925 Oracle:CVE-2018-2926 Oracle:CVE-2018-2927 Oracle:CVE-2018-2928 Oracle:CVE-2018-2929 Oracle:CVE-2018-2930 Oracle:CVE-2018-2932 Oracle:CVE-2018-2933 Oracle:CVE-2018-2934 Oracle:CVE-2018-2935 Oracle:CVE-2018-2936 Oracle:CVE-2018-2937 Oracle:CVE-2018-2938 Oracle:CVE-2018-2939 Oracle:CVE-2018-2940 Oracle:CVE-2018-2941 Oracle:CVE-2018-2942 Oracle:CVE-2018-2943 Oracle:CVE-2018-2944 Oracle:CVE-2018-2945 Oracle:CVE-2018-2946 Oracle:CVE-2018-2947 Oracle:CVE-2018-2948 Oracle:CVE-2018-2949 Oracle:CVE-2018-2950 Oracle:CVE-2018-2951 Oracle:CVE-2018-2952 Oracle:CVE-2018-2953 Oracle:CVE-2018-2954 Oracle:CVE-2018-2955 Oracle:CVE-2018-2956 Oracle:CVE-2018-2957 Oracle:CVE-2018-2958 Oracle:CVE-2018-2959 Oracle:CVE-2018-2960 Oracle:CVE-2018-2961 Oracle:CVE-2018-2962 Oracle:CVE-2018-2963 Oracle:CVE-2018-2964 Oracle:CVE-2018-2965 Oracle:CVE-2018-2966 Oracle:CVE-2018-2967 Oracle:CVE-2018-2968 Oracle:CVE-2018-2969 Oracle:CVE-2018-2970 Oracle:CVE-2018-2971 Oracle:CVE-2018-2972 Oracle:CVE-2018-2973 Oracle:CVE-2018-2974 Oracle:CVE-2018-2975 Oracle:CVE-2018-2976 Oracle:CVE-2018-2977 Oracle:CVE-2018-2979 Oracle:CVE-2018-2980 Oracle:CVE-2018-2981 Oracle:CVE-2018-2982 Oracle:CVE-2018-2984 Oracle:CVE-2018-2985 Oracle:CVE-2018-2986 Oracle:CVE-2018-2987 Oracle:CVE-2018-2988 Oracle:CVE-2018-2989 Oracle:CVE-2018-2990 Oracle:CVE-2018-2991 Oracle:CVE-2018-2992 Oracle:CVE-2018-2993 Oracle:CVE-2018-2994 Oracle:CVE-2018-2995 Oracle:CVE-2018-2996 Oracle:CVE-2018-2997 Oracle:CVE-2018-2998 Oracle:CVE-2018-2999 Oracle:CVE-2018-3000 Oracle:CVE-2018-3001 Oracle:CVE-2018-3002 Oracle:CVE-2018-3003 Oracle:CVE-2018-3004 Oracle:CVE-2018-3005 Oracle:CVE-2018-3006 Oracle:CVE-2018-3007 Oracle:CVE-2018-3008 Oracle:CVE-2018-3009 Oracle:CVE-2018-3010 Oracle:CVE-2018-3011 Oracle:CVE-2018-3012 Oracle:CVE-2018-3013 Oracle:CVE-2018-3014 Oracle:CVE-2018-3015 Oracle:CVE-2018-3016 Oracle:CVE-2018-3017 Oracle:CVE-2018-3018 Oracle:CVE-2018-3019 Oracle:CVE-2018-3020 Oracle:CVE-2018-3021 Oracle:CVE-2018-3022 Oracle:CVE-2018-3023 Oracle:CVE-2018-3024 Oracle:CVE-2018-3025 Oracle:CVE-2018-3026 Oracle:CVE-2018-3027 Oracle:CVE-2018-3028 Oracle:CVE-2018-3029 Oracle:CVE-2018-3030 Oracle:CVE-2018-3031 Oracle:CVE-2018-3032 Oracle:CVE-2018-3033 Oracle:CVE-2018-3034 Oracle:CVE-2018-3035 Oracle:CVE-2018-3036 Oracle:CVE-2018-3037 Oracle:CVE-2018-3038 Oracle:CVE-2018-3039 Oracle:CVE-2018-3040 Oracle:CVE-2018-3041 Oracle:CVE-2018-3042 Oracle:CVE-2018-3043 Oracle:CVE-2018-3044 Oracle:CVE-2018-3045 Oracle:CVE-2018-3046 Oracle:CVE-2018-3047 Oracle:CVE-2018-3048 Oracle:CVE-2018-3049 Oracle:CVE-2018-3050 Oracle:CVE-2018-3051 Oracle:CVE-2018-3052 Oracle:CVE-2018-3053 Oracle:CVE-2018-3054 Oracle:CVE-2018-3055 Oracle:CVE-2018-3056 Oracle:CVE-2018-3057 Oracle:CVE-2018-3058 Oracle:CVE-2018-3059 Oracle:CVE-2018-3060 Oracle:CVE-2018-3061 Oracle:CVE-2018-3062 Oracle:CVE-2018-3063 Oracle:CVE-2018-3064 Oracle:CVE-2018-3065 Oracle:CVE-2018-3066 Oracle:CVE-2018-3067 Oracle:CVE-2018-3068 Oracle:CVE-2018-3069 Oracle:CVE-2018-3070 Oracle:CVE-2018-3071 Oracle:CVE-2018-3072 Oracle:CVE-2018-3073 Oracle:CVE-2018-3074 Oracle:CVE-2018-3075 Oracle:CVE-2018-3076 Oracle:CVE-2018-3077 Oracle:CVE-2018-3078 Oracle:CVE-2018-3079 Oracle:CVE-2018-3080 Oracle:CVE-2018-3081 Oracle:CVE-2018-3082 Oracle:CVE-2018-3084 Oracle:CVE-2018-3085 Oracle:CVE-2018-3086 Oracle:CVE-2018-3087 Oracle:CVE-2018-3088 Oracle:CVE-2018-3089 Oracle:CVE-2018-3090 Oracle:CVE-2018-3091 Oracle:CVE-2018-3092 Oracle:CVE-2018-3093 Oracle:CVE-2018-3094 Oracle:CVE-2018-3095 Oracle:CVE-2018-3096 Oracle:CVE-2018-3097 Oracle:CVE-2018-3098 Oracle:CVE-2018-3099 Oracle:CVE-2018-3100 Oracle:CVE-2018-3101 Oracle:CVE-2018-3102 Oracle:CVE-2018-3103 Oracle:CVE-2018-3104 Oracle:CVE-2018-3105 Oracle:CVE-2018-3108 Oracle:CVE-2018-3109 Oracle:CVE-2018-3115 Oracle:CVE-2018-3122 Oracle:CVE-2018-3125 Oracle:CVE-2018-3126 Oracle:CVE-2018-3127 Oracle:CVE-2018-3128 Oracle:CVE-2018-3129 Oracle:CVE-2018-3130 Oracle:CVE-2018-3131 Oracle:CVE-2018-3132 Oracle:CVE-2018-3133 Oracle:CVE-2018-3134 Oracle:CVE-2018-3135 Oracle:CVE-2018-3136 Oracle:CVE-2018-3137 Oracle:CVE-2018-3138 Oracle:CVE-2018-3139 Oracle:CVE-2018-3140 Oracle:CVE-2018-3141 Oracle:CVE-2018-3142 Oracle:CVE-2018-3143 Oracle:CVE-2018-3144 Oracle:CVE-2018-3145 Oracle:CVE-2018-3146 Oracle:CVE-2018-3147 Oracle:CVE-2018-3148 Oracle:CVE-2018-3149 Oracle:CVE-2018-3150 Oracle:CVE-2018-3151 Oracle:CVE-2018-3152 Oracle:CVE-2018-3153 Oracle:CVE-2018-3154 Oracle:CVE-2018-3155 Oracle:CVE-2018-3156 Oracle:CVE-2018-3157 Oracle:CVE-2018-3158 Oracle:CVE-2018-3159 Oracle:CVE-2018-3160 Oracle:CVE-2018-3161 Oracle:CVE-2018-3162 Oracle:CVE-2018-3163 Oracle:CVE-2018-3164 Oracle:CVE-2018-3165 Oracle:CVE-2018-3166 Oracle:CVE-2018-3167 Oracle:CVE-2018-3168 Oracle:CVE-2018-3169 Oracle:CVE-2018-3170 Oracle:CVE-2018-3171 Oracle:CVE-2018-3172 Oracle:CVE-2018-3173 Oracle:CVE-2018-3174 Oracle:CVE-2018-3175 Oracle:CVE-2018-3176 Oracle:CVE-2018-3177 Oracle:CVE-2018-3178 Oracle:CVE-2018-3179 Oracle:CVE-2018-3180 Oracle:CVE-2018-3181 Oracle:CVE-2018-3182 Oracle:CVE-2018-3183 Oracle:CVE-2018-3184 Oracle:CVE-2018-3185 Oracle:CVE-2018-3186 Oracle:CVE-2018-3187 Oracle:CVE-2018-3188 Oracle:CVE-2018-3189 Oracle:CVE-2018-3190 Oracle:CVE-2018-3191 Oracle:CVE-2018-3192 Oracle:CVE-2018-3193 Oracle:CVE-2018-3194 Oracle:CVE-2018-3195 Oracle:CVE-2018-3196 Oracle:CVE-2018-3197 Oracle:CVE-2018-3198 Oracle:CVE-2018-3200 Oracle:CVE-2018-3201 Oracle:CVE-2018-3202 Oracle:CVE-2018-3203 Oracle:CVE-2018-3204 Oracle:CVE-2018-3205 Oracle:CVE-2018-3206 Oracle:CVE-2018-3207 Oracle:CVE-2018-3208 Oracle:CVE-2018-3209 Oracle:CVE-2018-3210 Oracle:CVE-2018-3211 Oracle:CVE-2018-3212 Oracle:CVE-2018-3213 Oracle:CVE-2018-3214 Oracle:CVE-2018-3215 Oracle:CVE-2018-3217 Oracle:CVE-2018-3218 Oracle:CVE-2018-3219 Oracle:CVE-2018-3220 Oracle:CVE-2018-3221 Oracle:CVE-2018-3222 Oracle:CVE-2018-3223 Oracle:CVE-2018-3224 Oracle:CVE-2018-3225 Oracle:CVE-2018-3226 Oracle:CVE-2018-3227 Oracle:CVE-2018-3228 Oracle:CVE-2018-3229 Oracle:CVE-2018-3230 Oracle:CVE-2018-3231 Oracle:CVE-2018-3232 Oracle:CVE-2018-3233 Oracle:CVE-2018-3234 Oracle:CVE-2018-3235 Oracle:CVE-2018-3236 Oracle:CVE-2018-3237 Oracle:CVE-2018-3238 Oracle:CVE-2018-3239 Oracle:CVE-2018-3241 Oracle:CVE-2018-3242 Oracle:CVE-2018-3243 Oracle:CVE-2018-3244 Oracle:CVE-2018-3245 Oracle:CVE-2018-3246 Oracle:CVE-2018-3247 Oracle:CVE-2018-3248 Oracle:CVE-2018-3249 Oracle:CVE-2018-3250 Oracle:CVE-2018-3251 Oracle:CVE-2018-3252 Oracle:CVE-2018-3253 Oracle:CVE-2018-3254 Oracle:CVE-2018-3255 Oracle:CVE-2018-3256 Oracle:CVE-2018-3257 Oracle:CVE-2018-3258 Oracle:CVE-2018-3259 Oracle:CVE-2018-3261 Oracle:CVE-2018-3262 Oracle:CVE-2018-3263 Oracle:CVE-2018-3264 Oracle:CVE-2018-3265 Oracle:CVE-2018-3266 Oracle:CVE-2018-3267 Oracle:CVE-2018-3268 Oracle:CVE-2018-3269 Oracle:CVE-2018-3270 Oracle:CVE-2018-3271 Oracle:CVE-2018-3272 Oracle:CVE-2018-3273 Oracle:CVE-2018-3274 Oracle:CVE-2018-3275 Oracle:CVE-2018-3276 Oracle:CVE-2018-3277 Oracle:CVE-2018-3278 Oracle:CVE-2018-3279 Oracle:CVE-2018-3280 Oracle:CVE-2018-3281 Oracle:CVE-2018-3282 Oracle:CVE-2018-3283 Oracle:CVE-2018-3284 Oracle:CVE-2018-3285 Oracle:CVE-2018-3286 Oracle:CVE-2018-3287 Oracle:CVE-2018-3288 Oracle:CVE-2018-3289 Oracle:CVE-2018-3290 Oracle:CVE-2018-3291 Oracle:CVE-2018-3292 Oracle:CVE-2018-3293 Oracle:CVE-2018-3294 Oracle:CVE-2018-3295 Oracle:CVE-2018-3296 Oracle:CVE-2018-3297 Oracle:CVE-2018-3298 Oracle:CVE-2018-3299 Oracle:CVE-2018-3301 Oracle:CVE-2018-3302 Oracle:CVE-2018-3303 Oracle:CVE-2018-3304 Oracle:CVE-2018-3305 Oracle:CVE-2018-3309 Oracle:CVE-2018-3311 Oracle:CVE-2018-3639 Oracle:CVE-2018-7489 Oracle:CVE-2018-8013 Oracle:CVE-2018-8014 Oracle:CVE-2018-8037 Oracle:CVE-2019-10173 Oracle:CVE-2019-1543 Oracle:CVE-2019-2395 Oracle:CVE-2019-2396 Oracle:CVE-2019-2397 Oracle:CVE-2019-2398 Oracle:CVE-2019-2399 Oracle:CVE-2019-2400 Oracle:CVE-2019-2401 Oracle:CVE-2019-2402 Oracle:CVE-2019-2403 Oracle:CVE-2019-2404 Oracle:CVE-2019-2405 Oracle:CVE-2019-2406 Oracle:CVE-2019-2407 Oracle:CVE-2019-2408 Oracle:CVE-2019-2409 Oracle:CVE-2019-2410 Oracle:CVE-2019-2411 Oracle:CVE-2019-2412 Oracle:CVE-2019-2413 Oracle:CVE-2019-2414 Oracle:CVE-2019-2415 Oracle:CVE-2019-2416 Oracle:CVE-2019-2417 Oracle:CVE-2019-2418 Oracle:CVE-2019-2419 Oracle:CVE-2019-2420 Oracle:CVE-2019-2421 Oracle:CVE-2019-2422 Oracle:CVE-2019-2423 Oracle:CVE-2019-2425 Oracle:CVE-2019-2426 Oracle:CVE-2019-2427 Oracle:CVE-2019-2429 Oracle:CVE-2019-2430 Oracle:CVE-2019-2431 Oracle:CVE-2019-2432 Oracle:CVE-2019-2433 Oracle:CVE-2019-2434 Oracle:CVE-2019-2435 Oracle:CVE-2019-2436 Oracle:CVE-2019-2437 Oracle:CVE-2019-2438 Oracle:CVE-2019-2439 Oracle:CVE-2019-2440 Oracle:CVE-2019-2441 Oracle:CVE-2019-2442 Oracle:CVE-2019-2443 Oracle:CVE-2019-2444 Oracle:CVE-2019-2445 Oracle:CVE-2019-2446 Oracle:CVE-2019-2447 Oracle:CVE-2019-2448 Oracle:CVE-2019-2449 Oracle:CVE-2019-2450 Oracle:CVE-2019-2451 Oracle:CVE-2019-2452 Oracle:CVE-2019-2453 Oracle:CVE-2019-2455 Oracle:CVE-2019-2456 Oracle:CVE-2019-2457 Oracle:CVE-2019-2458 Oracle:CVE-2019-2459 Oracle:CVE-2019-2460 Oracle:CVE-2019-2461 Oracle:CVE-2019-2462 Oracle:CVE-2019-2463 Oracle:CVE-2019-2464 Oracle:CVE-2019-2465 Oracle:CVE-2019-2466 Oracle:CVE-2019-2467 Oracle:CVE-2019-2468 Oracle:CVE-2019-2469 Oracle:CVE-2019-2470 Oracle:CVE-2019-2471 Oracle:CVE-2019-2472 Oracle:CVE-2019-2473 Oracle:CVE-2019-2474 Oracle:CVE-2019-2475 Oracle:CVE-2019-2476 Oracle:CVE-2019-2477 Oracle:CVE-2019-2478 Oracle:CVE-2019-2479 Oracle:CVE-2019-2480 Oracle:CVE-2019-2481 Oracle:CVE-2019-2482 Oracle:CVE-2019-2485 Oracle:CVE-2019-2486 Oracle:CVE-2019-2487 Oracle:CVE-2019-2488 Oracle:CVE-2019-2489 Oracle:CVE-2019-2490 Oracle:CVE-2019-2491 Oracle:CVE-2019-2492 Oracle:CVE-2019-2493 Oracle:CVE-2019-2494 Oracle:CVE-2019-2495 Oracle:CVE-2019-2496 Oracle:CVE-2019-2497 Oracle:CVE-2019-2498 Oracle:CVE-2019-2499 Oracle:CVE-2019-2500 Oracle:CVE-2019-2501 Oracle:CVE-2019-2502 Oracle:CVE-2019-2503 Oracle:CVE-2019-2504 Oracle:CVE-2019-2505 Oracle:CVE-2019-2506 Oracle:CVE-2019-2507 Oracle:CVE-2019-2508 Oracle:CVE-2019-2509 Oracle:CVE-2019-2510 Oracle:CVE-2019-2511 Oracle:CVE-2019-2512 Oracle:CVE-2019-2513 Oracle:CVE-2019-2519 Oracle:CVE-2019-2520 Oracle:CVE-2019-2521 Oracle:CVE-2019-2522 Oracle:CVE-2019-2523 Oracle:CVE-2019-2524 Oracle:CVE-2019-2525 Oracle:CVE-2019-2526 Oracle:CVE-2019-2527 Oracle:CVE-2019-2528 Oracle:CVE-2019-2529 Oracle:CVE-2019-2530 Oracle:CVE-2019-2531 Oracle:CVE-2019-2532 Oracle:CVE-2019-2533 Oracle:CVE-2019-2534 Oracle:CVE-2019-2535 Oracle:CVE-2019-2536 Oracle:CVE-2019-2537 Oracle:CVE-2019-2538 Oracle:CVE-2019-2539 Oracle:CVE-2019-2540 Oracle:CVE-2019-2541 Oracle:CVE-2019-2543 Oracle:CVE-2019-2544 Oracle:CVE-2019-2545 Oracle:CVE-2019-2546 Oracle:CVE-2019-2547 Oracle:CVE-2019-2548 Oracle:CVE-2019-2549 Oracle:CVE-2019-2550 Oracle:CVE-2019-2552 Oracle:CVE-2019-2553 Oracle:CVE-2019-2554 Oracle:CVE-2019-2555 Oracle:CVE-2019-2556 Oracle:CVE-2019-2574 Oracle:CVE-2019-2656 Oracle:CVE-2019-2657 Oracle:CVE-2019-2678 Oracle:CVE-2019-2679 Oracle:CVE-2019-2680 Oracle:CVE-2019-2690 Oracle:CVE-2019-2696 Oracle:CVE-2019-2703 Oracle:CVE-2019-2721 Oracle:CVE-2019-2722 Oracle:CVE-2019-2723 Oracle:CVE-2019-2848 Oracle:CVE-2019-2850 Oracle:CVE-2019-2859 Oracle:CVE-2019-2863 Oracle:CVE-2019-2864 Oracle:CVE-2019-2865 Oracle:CVE-2019-2866 Oracle:CVE-2019-2867 Oracle:CVE-2019-2873 Oracle:CVE-2019-2874 Oracle:CVE-2019-2875 Oracle:CVE-2019-2876 Oracle:CVE-2019-2877 RH:CVE-2009-3559 RH:CVE-2012-6153 RH:CVE-2013-7285 RH:CVE-2014-3540 RH:CVE-2014-4330 RH:CVE-2014-4651 RH:CVE-2014-9746 RH:CVE-2014-9747 RH:CVE-2015-0405 RH:CVE-2015-0423 RH:CVE-2015-0433 RH:CVE-2015-0438 RH:CVE-2015-0439 RH:CVE-2015-0441 RH:CVE-2015-0498 RH:CVE-2015-0499 RH:CVE-2015-0500 RH:CVE-2015-0501 RH:CVE-2015-0503 RH:CVE-2015-0505 RH:CVE-2015-0506 RH:CVE-2015-0507 RH:CVE-2015-0508 RH:CVE-2015-0511 RH:CVE-2015-2325 RH:CVE-2015-2326 RH:CVE-2015-2566 RH:CVE-2015-2567 RH:CVE-2015-2568 RH:CVE-2015-2571 RH:CVE-2015-2573 RH:CVE-2015-2575 RH:CVE-2015-2576 RH:CVE-2015-5125 RH:CVE-2015-5127 RH:CVE-2015-5129 RH:CVE-2015-5130 RH:CVE-2015-5131 RH:CVE-2015-5132 RH:CVE-2015-5134 RH:CVE-2015-5539 RH:CVE-2015-5540 RH:CVE-2015-5541 RH:CVE-2015-5544 RH:CVE-2015-5545 RH:CVE-2015-5551 RH:CVE-2015-5552 RH:CVE-2015-5553 RH:CVE-2015-5554 RH:CVE-2015-5555 RH:CVE-2015-5556 RH:CVE-2015-5557 RH:CVE-2015-5558 RH:CVE-2015-5559 RH:CVE-2015-5560 RH:CVE-2015-5561 RH:CVE-2015-5564 RH:CVE-2015-5565 RH:CVE-2015-5566 RH:CVE-2015-7559 RH:CVE-2015-8315 RH:CVE-2015-8381 RH:CVE-2015-8382 RH:CVE-2015-8383 RH:CVE-2015-8384 RH:CVE-2015-8385 RH:CVE-2015-8386 RH:CVE-2015-8387 RH:CVE-2015-8388 RH:CVE-2015-8389 RH:CVE-2015-8390 RH:CVE-2015-8391 RH:CVE-2015-8392 RH:CVE-2015-8393 RH:CVE-2015-8394 RH:CVE-2015-8395 RH:CVE-2015-8855 RH:CVE-2015-8860 RH:CVE-2016-0755 RH:CVE-2016-1672 RH:CVE-2016-1673 RH:CVE-2016-1674 RH:CVE-2016-1675 RH:CVE-2016-1676 RH:CVE-2016-1677 RH:CVE-2016-1678 RH:CVE-2016-1679 RH:CVE-2016-1680 RH:CVE-2016-1681 RH:CVE-2016-1682 RH:CVE-2016-1683 RH:CVE-2016-1684 RH:CVE-2016-1685 RH:CVE-2016-1686 RH:CVE-2016-1687 RH:CVE-2016-1688 RH:CVE-2016-1689 RH:CVE-2016-1690 RH:CVE-2016-1691 RH:CVE-2016-1692 RH:CVE-2016-1693 RH:CVE-2016-1694 RH:CVE-2016-1695 RH:CVE-2016-1950 RH:CVE-2016-1955 RH:CVE-2016-1956 RH:CVE-2016-1959 RH:CVE-2016-1967 RH:CVE-2016-1968 RH:CVE-2016-1969 RH:CVE-2016-1970 RH:CVE-2016-1971 RH:CVE-2016-1972 RH:CVE-2016-1973 RH:CVE-2016-1975 RH:CVE-2016-1976 RH:CVE-2016-3141 RH:CVE-2016-4055 RH:CVE-2016-4070 RH:CVE-2016-4979 RH:CVE-2016-5483 RH:CVE-2016-5617 RH:CVE-2016-6662 RH:CVE-2016-9586 RH:CVE-2016-9840 RH:CVE-2016-9841 RH:CVE-2016-9842 RH:CVE-2016-9843 RH:CVE-2017-3308 RH:CVE-2017-3309 RH:CVE-2017-3329 RH:CVE-2017-3453 RH:CVE-2017-3454 RH:CVE-2017-3456 RH:CVE-2017-3461 RH:CVE-2017-3462 RH:CVE-2017-3463 RH:CVE-2017-3464 RH:CVE-2017-3468 RH:CVE-2017-3600 RH:CVE-2017-9526 RH:CVE-2018-1000121 RH:CVE-2018-12539 RH:CVE-2018-1305 RH:CVE-2018-1517 RH:CVE-2018-1656 RH:CVE-2018-2767 RH:CVE-2018-2938 RH:CVE-2018-2940 RH:CVE-2018-2952 RH:CVE-2018-2973 RH:CVE-2019-2455 RH:CVE-2019-2481 RH:CVE-2019-2482 RH:CVE-2019-2503 RH:CVE-2019-2507 RH:CVE-2019-2510 RH:CVE-2019-2513 RH:CVE-2019-2528 RH:CVE-2019-2529 RH:CVE-2019-2530 RH:CVE-2019-2531 RH:CVE-2019-2532 RH:CVE-2019-2533 RH:CVE-2019-2534 RH:CVE-2019-2535 RH:CVE-2019-2536 RH:CVE-2019-2537 RH:CVE-2019-2539 RHBA-2015:1659 RHBA-2015:1762 RHBA-2015:1763 RHBA-2019:0327 RHSA-2014:0216 RHSA-2014:0294 RHSA-2014:0323 RHSA-2014:0371 RHSA-2014:0372 RHSA-2014:0374 RHSA-2014:0389 RHSA-2014:0452 RHSA-2014:0474 RHSA-2014:0497 RHSA-2014:0498 RHSA-2014:0500 RHSA-2014:0511 RHSA-2014:0702 RHSA-2014:1007 RHSA-2014:1059 RHSA-2014:1082 RHSA-2014:1098 RHSA-2014:1146 RHSA-2014:1162 RHSA-2014:1163 RHSA-2014:1166 RHSA-2014:1320 RHSA-2014:1321 RHSA-2014:1322 RHSA-2014:1323 RHSA-2014:1833 RHSA-2014:1834 RHSA-2014:1835 RHSA-2014:1836 RHSA-2014:1891 RHSA-2014:1892 RHSA-2014:1904 RHSA-2014:2019 RHSA-2014:2020 RHSA-2015:0125 RHSA-2015:0158 RHSA-2015:0234 RHSA-2015:0235 RHSA-2015:0675 RHSA-2015:0720 RHSA-2015:0765 RHSA-2015:0850 RHSA-2015:0851 RHSA-2015:1009 RHSA-2015:1176 RHSA-2015:1177 RHSA-2015:1603 RHSA-2015:1628 RHSA-2015:1629 RHSA-2015:1646 RHSA-2015:1647 RHSA-2015:1665 RHSA-2015:1888 RHSA-2016:0197 RHSA-2016:0370 RHSA-2016:0371 RHSA-2016:0373 RHSA-2016:0495 RHSA-2016:1025 RHSA-2016:1132 RHSA-2016:1190 RHSA-2016:1420 RHSA-2016:1773 RHSA-2016:1931 RHSA-2016:1940 RHSA-2016:2035 RHSA-2016:2036 RHSA-2016:2058 RHSA-2016:2059 RHSA-2016:2060 RHSA-2016:2061 RHSA-2016:2062 RHSA-2016:2077 RHSA-2016:2130 RHSA-2016:2131 RHSA-2016:2595 RHSA-2016:2749 RHSA-2016:2750 RHSA-2016:2927 RHSA-2016:2928 RHSA-2016:2957 RHSA-2017:0184 RHSA-2017:0193 RHSA-2017:0194 RHSA-2017:0272 RHSA-2017:0868 RHSA-2017:1208 RHSA-2017:1220 RHSA-2017:1221 RHSA-2017:1222 RHSA-2017:1658 RHSA-2017:1659 RHSA-2017:2192 RHSA-2017:2486 RHSA-2017:2596 RHSA-2017:2787 RHSA-2017:2886 RHSA-2017:2999 RHSA-2017:3046 RHSA-2017:3047 RHSA-2017:3189 RHSA-2017:3190 RHSA-2017:3453 RHSA-2018:0279 RHSA-2018:0342 RHSA-2018:0465 RHSA-2018:0466 RHSA-2018:0478 RHSA-2018:0479 RHSA-2018:0480 RHSA-2018:0481 RHSA-2018:0501 RHSA-2018:0574 RHSA-2018:0576 RHSA-2018:0577 RHSA-2018:1320 RHSA-2018:1447 RHSA-2018:1448 RHSA-2018:1449 RHSA-2018:1450 RHSA-2018:1451 RHSA-2018:2241 RHSA-2018:2242 RHSA-2018:2253 RHSA-2018:2254 RHSA-2018:2255 RHSA-2018:2256 RHSA-2018:2283 RHSA-2018:2286 RHSA-2018:2439 RHSA-2018:2568 RHSA-2018:2569 RHSA-2018:2575 RHSA-2018:2576 RHSA-2018:2669 RHSA-2018:2712 RHSA-2018:2713 RHSA-2018:2729 RHSA-2018:2927 RHSA-2018:2939 RHSA-2018:3007 RHSA-2018:3008 RHSA-2018:3157 RHSA-2018:3558 RHSA-2019:1258 RHSA-2019:1543 RHSA-2019:1822 RHSA-2019:1823 RHSA-2019:2205 RHSA-2019:2327 RHSA-2019:2413 RHSA-2019:2484 RHSA-2019:2511 RHSA-2019:2995 RHSA-2019:3708 RHSA-2019:3892 RHSA-2019:4352 RHSA-2020:0445 RHSA-2020:0544 RHSA-2020:0594 RHSA-2020:0727 RHSA-2020:0983 RHSA-2020:5663 SECTRACK ID: 1041302 SECTRACK:1032121 SECTRACK:1034077 SECTRACK:1034882 SECTRACK:1035215 SECTRACK:1035255 SECTRACK:1035981 SECTRACK:1036054 SECTRACK:1036056 SECTRACK:1036225 SECTRACK:1036377 SECTRACK:1036378 SECTRACK:1036393 SECTRACK:1036397 SECTRACK:1036769 SECTRACK:1037036 SECTRACK:1037046 SECTRACK:1037053 SECTRACK:1037515 SECTRACK:1037640 SECTRACK:1038287 SECTRACK:1039427 SECTRACK:1039596 SECTRACK:1039600 SECTRACK:1040428 SECTRACK:1040529 SECTRACK:1041294 SECTRACK:1041296 SECTRACK:1041302 SECTRACK:1041765 SECTRACK:1041887 SECTRACK:1041888 SECTRACK:1041896 SECUNIA:57477 SECUNIA:58710 SECUNIA:58851 SECUNIA:58947 SECUNIA:59014 SECUNIA:59118 SECUNIA:59228 SECUNIA:59245 SECUNIA:59246 SECUNIA:59430 SECUNIA:59464 SECUNIA:59479 SECUNIA:59480 SECUNIA:59704 SECUNIA:59718 SECUNIA:60177 SECUNIA:60703 SECUNIA:61441 SECUNIA:61961 SLACKWARE:SSA:2016-039-01 SMASH Issue 106174 SMASH Issue 106399 SMASH Issue 115944 SMASH Issue 115951 SMASH Issue 116060 SMASH Issue 121091 SMASH Issue 122403 SMASH Issue 157079 SMASH Issue 157080 SMASH Issue 159315 SMASH Issue 159316 SMASH Issue 159358 SMASH Issue 159359 SMASH Issue 159360 SMASH Issue 159361 SMASH Issue 159362 SMASH Issue 159363 SMASH Issue 159364 SMASH Issue 159365 SMASH Issue 159366 SMASH Issue 159367 SMASH Issue 159368 SMASH Issue 159369 SMASH Issue 159370 SMASH Issue 159501 SMASH Issue 161165 SMASH Issue 161277 SMASH Issue 162768 SMASH Issue 162800 SMASH Issue 162870 SMASH Issue 163267 SMASH Issue 168106 SMASH Issue 168107 SMASH Issue 168108 SMASH Issue 168109 SMASH Issue 168110 SMASH Issue 168111 SMASH Issue 168112 SMASH Issue 168113 SMASH Issue 168114 SMASH Issue 168115 SMASH Issue 168116 SMASH Issue 168117 SMASH Issue 168118 SMASH Issue 168119 SMASH Issue 168120 SMASH Issue 168267 SMASH Issue 169465 SMASH Issue 169466 SMASH Issue 169472 SMASH Issue 169820 SMASH Issue 169849 SMASH Issue 170597 SMASH Issue 170598 SMASH Issue 172509 SMASH Issue 173284 SMASH Issue 173285 SMASH Issue 173743 SMASH Issue 173744 SMASH Issue 173746 SMASH Issue 173747 SMASH Issue 173748 SMASH Issue 173749 SMASH Issue 173750 SMASH Issue 177157 SMASH Issue 177158 SMASH Issue 177160 SMASH Issue 177510 SMASH Issue 177997 SMASH Issue 180273 SMASH Issue 183785 SMASH Issue 183803 SMASH Issue 183804 SMASH Issue 186176 SMASH Issue 186594 SMASH Issue 195320 SMASH Issue 200729 SMASH Issue 2012 SMASH Issue 201476 SMASH Issue 201809 SMASH Issue 203304 SMASH Issue 205710 SMASH Issue 210804 SMASH Issue 210805 SMASH Issue 210807 SMASH Issue 210809 SMASH Issue 210923 SMASH Issue 210972 SMASH Issue 211000 SMASH Issue 211001 SMASH Issue 211002 SMASH Issue 211003 SMASH Issue 211004 SMASH Issue 211005 SMASH Issue 211006 SMASH Issue 211038 SMASH Issue 211039 SMASH Issue 211040 SMASH Issue 211041 SMASH Issue 211042 SMASH Issue 211051 SMASH Issue 212718 SMASH Issue 212765 SMASH Issue 212925 SMASH Issue 216708 SMASH Issue 216720 SMASH Issue 216727 SMASH Issue 216869 SMASH Issue 216870 SMASH Issue 216871 SMASH Issue 216872 SMASH Issue 216873 SMASH Issue 216874 SMASH Issue 216875 SMASH Issue 216876 SMASH Issue 216877 SMASH Issue 216878 SMASH Issue 216879 SMASH Issue 216880 SMASH Issue 216904 SMASH Issue 222884 SMASH Issue 222951 SMASH Issue 77111 SUSE:SUSE-SU-2015:0946 SUSE:SUSE-SU-2016:0727 SUSE:SUSE-SU-2016:0777 SUSE:SUSE-SU-2016:0820 SUSE:SUSE-SU-2016:0909 SUSE:SUSE-SU-2016:1277 SUSE:SUSE-SU-2016:2387 SUSE:SUSE-SU-2016:2394 SUSE:SUSE-SU-2016:2458 SUSE:SUSE-SU-2016:2468 SUSE:SUSE-SU-2016:2469 SUSE:SUSE-SU-2016:2470 SUSE:SUSE-SU-2017:2699 SUSE:SUSE-SU-2017:2700 SUSE:openSUSE-SU-2015:0858 SUSE:openSUSE-SU-2015:0967 SUSE:openSUSE-SU-2015:1911 SUSE:openSUSE-SU-2016:0360 SUSE:openSUSE-SU-2016:0373 SUSE:openSUSE-SU-2016:0376 SUSE:openSUSE-SU-2016:0731 SUSE:openSUSE-SU-2016:0733 SUSE:openSUSE-SU-2016:1274 SUSE:openSUSE-SU-2016:1373 SUSE:openSUSE-SU-2016:1430 SUSE:openSUSE-SU-2016:1433 SUSE:openSUSE-SU-2016:1496 SUSE:openSUSE-SU-2016:1557 SUSE:openSUSE-SU-2016:2391 SUSE:openSUSE-SU-2016:2407 SUSE:openSUSE-SU-2016:2496 SUSE:openSUSE-SU-2016:2537 SUSE:openSUSE-SU-2016:3202 SUSE:openSUSE-SU-2017:0077 SUSE:openSUSE-SU-2017:0080 SUSE:openSUSE-SU-2018:0458 SUSE:openSUSE-SU-2019:1814 UBUNTU:CVE-2009-3559 UBUNTU:CVE-2012-6153 UBUNTU:CVE-2013-7285 UBUNTU:CVE-2013-7451 UBUNTU:CVE-2013-7452 UBUNTU:CVE-2013-7453 UBUNTU:CVE-2013-7454 UBUNTU:CVE-2014-4330 UBUNTU:CVE-2014-9746 UBUNTU:CVE-2014-9747 UBUNTU:CVE-2014-9772 UBUNTU:CVE-2015-0405 UBUNTU:CVE-2015-0423 UBUNTU:CVE-2015-0433 UBUNTU:CVE-2015-0438 UBUNTU:CVE-2015-0439 UBUNTU:CVE-2015-0441 UBUNTU:CVE-2015-0498 UBUNTU:CVE-2015-0499 UBUNTU:CVE-2015-0500 UBUNTU:CVE-2015-0501 UBUNTU:CVE-2015-0503 UBUNTU:CVE-2015-0505 UBUNTU:CVE-2015-0506 UBUNTU:CVE-2015-0507 UBUNTU:CVE-2015-0508 UBUNTU:CVE-2015-0511 UBUNTU:CVE-2015-2325 UBUNTU:CVE-2015-2326 UBUNTU:CVE-2015-2566 UBUNTU:CVE-2015-2567 UBUNTU:CVE-2015-2568 UBUNTU:CVE-2015-2571 UBUNTU:CVE-2015-2573 UBUNTU:CVE-2015-2575 UBUNTU:CVE-2015-5125 UBUNTU:CVE-2015-5127 UBUNTU:CVE-2015-5128 UBUNTU:CVE-2015-5129 UBUNTU:CVE-2015-5130 UBUNTU:CVE-2015-5131 UBUNTU:CVE-2015-5132 UBUNTU:CVE-2015-5134 UBUNTU:CVE-2015-5539 UBUNTU:CVE-2015-5540 UBUNTU:CVE-2015-5541 UBUNTU:CVE-2015-5544 UBUNTU:CVE-2015-5545 UBUNTU:CVE-2015-5551 UBUNTU:CVE-2015-5552 UBUNTU:CVE-2015-5553 UBUNTU:CVE-2015-5554 UBUNTU:CVE-2015-5555 UBUNTU:CVE-2015-5556 UBUNTU:CVE-2015-5557 UBUNTU:CVE-2015-5558 UBUNTU:CVE-2015-5559 UBUNTU:CVE-2015-5560 UBUNTU:CVE-2015-5561 UBUNTU:CVE-2015-5564 UBUNTU:CVE-2015-5565 UBUNTU:CVE-2015-5566 UBUNTU:CVE-2015-7559 UBUNTU:CVE-2015-8381 UBUNTU:CVE-2015-8382 UBUNTU:CVE-2015-8383 UBUNTU:CVE-2015-8384 UBUNTU:CVE-2015-8385 UBUNTU:CVE-2015-8386 UBUNTU:CVE-2015-8387 UBUNTU:CVE-2015-8388 UBUNTU:CVE-2015-8389 UBUNTU:CVE-2015-8390 UBUNTU:CVE-2015-8391 UBUNTU:CVE-2015-8392 UBUNTU:CVE-2015-8393 UBUNTU:CVE-2015-8394 UBUNTU:CVE-2015-8395 UBUNTU:CVE-2015-8854 UBUNTU:CVE-2015-8855 UBUNTU:CVE-2015-8856 UBUNTU:CVE-2015-8857 UBUNTU:CVE-2015-8858 UBUNTU:CVE-2015-8859 UBUNTU:CVE-2015-8860 UBUNTU:CVE-2015-8861 UBUNTU:CVE-2015-8862 UBUNTU:CVE-2016-0755 UBUNTU:CVE-2016-1672 UBUNTU:CVE-2016-1673 UBUNTU:CVE-2016-1674 UBUNTU:CVE-2016-1675 UBUNTU:CVE-2016-1676 UBUNTU:CVE-2016-1677 UBUNTU:CVE-2016-1678 UBUNTU:CVE-2016-1679 UBUNTU:CVE-2016-1680 UBUNTU:CVE-2016-1681 UBUNTU:CVE-2016-1682 UBUNTU:CVE-2016-1683 UBUNTU:CVE-2016-1684 UBUNTU:CVE-2016-1685 UBUNTU:CVE-2016-1686 UBUNTU:CVE-2016-1687 UBUNTU:CVE-2016-1688 UBUNTU:CVE-2016-1689 UBUNTU:CVE-2016-1690 UBUNTU:CVE-2016-1691 UBUNTU:CVE-2016-1692 UBUNTU:CVE-2016-1693 UBUNTU:CVE-2016-1694 UBUNTU:CVE-2016-1695 UBUNTU:CVE-2016-1950 UBUNTU:CVE-2016-1955 UBUNTU:CVE-2016-1956 UBUNTU:CVE-2016-1959 UBUNTU:CVE-2016-1967 UBUNTU:CVE-2016-1968 UBUNTU:CVE-2016-1969 UBUNTU:CVE-2016-1970 UBUNTU:CVE-2016-1971 UBUNTU:CVE-2016-1972 UBUNTU:CVE-2016-1973 UBUNTU:CVE-2016-1975 UBUNTU:CVE-2016-1976 UBUNTU:CVE-2016-2178 UBUNTU:CVE-2016-3141 UBUNTU:CVE-2016-4055 UBUNTU:CVE-2016-4070 UBUNTU:CVE-2016-4619 UBUNTU:CVE-2016-4979 UBUNTU:CVE-2016-5483 UBUNTU:CVE-2016-5501 UBUNTU:CVE-2016-5538 UBUNTU:CVE-2016-5605 UBUNTU:CVE-2016-5608 UBUNTU:CVE-2016-5610 UBUNTU:CVE-2016-5611 UBUNTU:CVE-2016-5613 UBUNTU:CVE-2016-6662 UBUNTU:CVE-2016-9586 UBUNTU:CVE-2016-9840 UBUNTU:CVE-2016-9841 UBUNTU:CVE-2016-9842 UBUNTU:CVE-2016-9843 UBUNTU:CVE-2017-3308 UBUNTU:CVE-2017-3309 UBUNTU:CVE-2017-3329 UBUNTU:CVE-2017-3453 UBUNTU:CVE-2017-3454 UBUNTU:CVE-2017-3456 UBUNTU:CVE-2017-3461 UBUNTU:CVE-2017-3462 UBUNTU:CVE-2017-3463 UBUNTU:CVE-2017-3464 UBUNTU:CVE-2017-3468 UBUNTU:CVE-2017-3600 UBUNTU:CVE-2017-9526 UBUNTU:CVE-2018-1000121 UBUNTU:CVE-2018-1258 UBUNTU:CVE-2018-1305 UBUNTU:CVE-2018-1517 UBUNTU:CVE-2018-1656 UBUNTU:CVE-2018-2767 UBUNTU:CVE-2018-2909 UBUNTU:CVE-2018-2938 UBUNTU:CVE-2018-2940 UBUNTU:CVE-2018-2952 UBUNTU:CVE-2018-2973 UBUNTU:CVE-2018-3005 UBUNTU:CVE-2018-3055 UBUNTU:CVE-2018-3085 UBUNTU:CVE-2018-3086 UBUNTU:CVE-2018-3087 UBUNTU:CVE-2018-3088 UBUNTU:CVE-2018-3089 UBUNTU:CVE-2018-3090 UBUNTU:CVE-2018-3091 UBUNTU:CVE-2018-3287 UBUNTU:CVE-2018-3288 UBUNTU:CVE-2018-3289 UBUNTU:CVE-2018-3290 UBUNTU:CVE-2018-3291 UBUNTU:CVE-2018-3292 UBUNTU:CVE-2018-3293 UBUNTU:CVE-2018-3294 UBUNTU:CVE-2018-3295 UBUNTU:CVE-2018-3296 UBUNTU:CVE-2018-3297 UBUNTU:CVE-2018-3298 UBUNTU:CVE-2019-2455 UBUNTU:CVE-2019-2481 UBUNTU:CVE-2019-2482 UBUNTU:CVE-2019-2503 UBUNTU:CVE-2019-2507 UBUNTU:CVE-2019-2510 UBUNTU:CVE-2019-2513 UBUNTU:CVE-2019-2528 UBUNTU:CVE-2019-2529 UBUNTU:CVE-2019-2530 UBUNTU:CVE-2019-2531 UBUNTU:CVE-2019-2532 UBUNTU:CVE-2019-2533 UBUNTU:CVE-2019-2534 UBUNTU:CVE-2019-2535 UBUNTU:CVE-2019-2536 UBUNTU:CVE-2019-2537 UBUNTU:CVE-2019-2539 UBUNTU:USN-2575-1 UBUNTU:USN-2769-1 UBUNTU:USN-2882-1 UBUNTU:USN-2916-1 UBUNTU:USN-2917-1 UBUNTU:USN-2917-2 UBUNTU:USN-2917-3 UBUNTU:USN-2924-1 UBUNTU:USN-2934-1 UBUNTU:USN-2952-1 UBUNTU:USN-2952-2 UBUNTU:USN-2992-1 UBUNTU:USN-3598-1 UBUNTU:USN-3598-2 UBUNTU:USN-3665-1 UBUNTU:USN-3693-1 UBUNTU:USN-3725-1 UBUNTU:USN-3725-2 UBUNTU:USN-3727-1 UBUNTU:USN-3734-1 UBUNTU:USN-3735-1 UBUNTU:USN-3747-1 USN-3087-1 USN-3087-2 USN-3867-1 USN-4246-1 USN-4292-1 XF:perl-cve20144330-dos(96216) ZDI-16-570 ZDI-18-1232ZDI-CAN-6635 ZDI-18-1233ZDI-CAN-6591 ZDI-18-1234ZDI-CAN-6592 ZDI-18-1292ZDI-CAN-7329 bdo#1033297 bdo#583651 bdo#759718 bdo#782645 bdo#797165 bdo#798619 bdo#798620 bdo#802671 bdo#802971 bdo#854713 bdo#860544 bdo#864859 bdo#867247 bdo#873383 bdo#885345 bdo#898444 bdo#898445 bdo#912848 bnc#1003579 bnc#1003580 bnc#1005621 bnc#1015332 bnc#1016653 bnc#1021757 bnc#1022633 bnc#1042326 bnc#1043777 bnc#1084524 bnc#1085215 bnc#1088681 bnc#1101644 bnc#1101645 bnc#1101656 bnc#1101667 bnc#1101675 bnc#1104668 bnc#1112097 bnc#1120866 bnc#1122198 bnc#885963 bnc#896715 bnc#927623 bnc#941239 bnc#947966 bnc#957598 bnc#958373 bnc#962983 bnc#969821 bnc#969894 bnc#970257 bnc#970377 bnc#970378 bnc#970379 bnc#970380 bnc#970381 bnc#970431 bnc#970433 bnc#976547 bnc#976997 bnc#977050 bnc#981886 bnc#983249 bnc#983519 bnc#987365 bnc#988162 bnc#998309 http://www.debian.org/security/2016/dsa-3560 https://git.php.net/?p=php-src.git%3Ba=commit%3Bh=95433e8e339dbb6b5d5541473c1661db6ba2c451 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO2RMVVZVV6NFTU46B5RYRK7ZCXYARZS/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M6BJG6RGDH7ZWVVAUFBFI5L32RSMQN2S/ https://security.netapp.com/advisory/ntap-20230216-0002/ https://support.f5.com/csp/article/K05052081?utm_source=f5support&%3Butm_medium=RSS https://support.f5.com/csp/article/K46337613?utm_source=f5support&%3Butm_medium=RSS https://support.f5.com/csp/article/K46337613?utm_source=f5support&utm_medium=RSS linux.git:commit:5535be3099717646781ce1540cf725965d680e7b linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 openssl.git:commit:399944622df7bd81af62e67ea967c470534090e2 rh#1051277 rh#1091938 rh#1101303 rh#1104858 rh#1107544 rh#1112877 rh#1116665 rh#1129074 rh#1129916 rh#1131350 rh#1139700 rh#1167537 rh#1183461 rh#1187225 rh#1202366 rh#1202380 rh#1202384 rh#1202395 rh#1202418 rh#1203195 rh#1207198 rh#1207202 rh#1209496 rh#1209501 rh#1212753 rh#1212755 rh#1212757 rh#1212758 rh#1212759 rh#1212760 rh#1212763 rh#1212764 rh#1212765 rh#1212767 rh#1212768 rh#1212769 rh#1212770 rh#1212771 rh#1212772 rh#1212774 rh#1212776 rh#1212777 rh#1212779 rh#1212780 rh#1212781 rh#1212782 rh#1212783 rh#1237223 rh#1252697 rh#1252707 rh#1256449 rh#1262373 rh#1277888 rh#1287614 rh#1287623 rh#1287629 rh#1287636 rh#1287646 rh#1287654 rh#1287659 rh#1287666 rh#1287671 rh#1287690 rh#1287695 rh#1287702 rh#1287711 rh#1291742 rh#1293972 rh#1302263 rh#1304645 rh#1310509 rh#1311503 rh#1315312 rh#1315328 rh#1315570 rh#1315571 rh#1315575 rh#1315776 rh#1315777 rh#1315780 rh#1315782 rh#1317560 rh#1323114 rh#1323749 rh#1329533 rh#1329552 rh#1340005 rh#1340006 rh#1340007 rh#1340008 rh#1340009 rh#1340010 rh#1340011 rh#1340012 rh#1340013 rh#1340014 rh#1340015 rh#1340016 rh#1340017 rh#1340018 rh#1340019 rh#1340021 rh#1340022 rh#1340023 rh#1340024 rh#1340026 rh#1340027 rh#1340028 rh#1340029 rh#1340030 rh#1341821 rh#1343400 rh#1343538 rh#1343540 rh#1352476 rh#1369383 rh#1375198 rh#1378936 rh#1384344 rh#1386562 rh#1386564 rh#1393454 rh#1396963 rh#1396971 rh#1397485 rh#1399546 rh#1402345 rh#1402346 rh#1402348 rh#1402351 rh#1405148 rh#1406712 rh#1414133 rh#1414429 rh#1433010 rh#1443358 rh#1443359 rh#1443360 rh#1443365 rh#1443366 rh#1443369 rh#1443376 rh#1443377 rh#1443378 rh#1443379 rh#1443385 rh#1443387 rh#1459887 rh#1485274 rh#1501812 rh#1501813 rh#1501814 rh#1501815 rh#1501816 rh#1501817 rh#1501818 rh#1501819 rh#1501820 rh#1516791 rh#1519780 rh#1548282 rh#1552631 rh#1553413 rh#1564965 rh#1578582 rh#1591854 rh#1600925 rh#1602141 rh#1602145 rh#1602146 rh#1607582 rh#1608073 rh#1614973 rh#1618767 rh#1618869 rh#1618871 rh#1666742 rh#1666743 rh#1666744 rh#1666749 rh#1666750 rh#1666751 rh#1666752 rh#1666753 rh#1666755 rh#1666756 rh#1666757 rh#1666758 rh#1666759 rh#1666760 rh#1666761 rh#1666762 rh#1666763 rh#1666764 rh#1714979 rh#1716448 rh#1716453 rh#1716454 rh#1722971 rh#1731271 rh#2061700 rh#2116175 rh#2119127 rh#2161287 rh#2270497 rh#539529 rh#873317 xf#141681 xf#141953 xf#141971 xf#141981 xf#141982 xf#144882 xf#146672 xf#146803 xf#146804 xf#146815 xf#146827 xf#146834 xf#146835 xf#151452 xf#151455 xf#151465 xf#151466 xf#151486 xf#151497 xf#151500 xf#151525 xf#151527 xf#151530 xf#155741 xf#155744 xf#155766 xf#155850 |
CVE-2016-4074 | jq:Released | low | () | CONFIRM:github.com:CVE-2015-8863 CONFIRM:github.com:CVE-2016-10166 CVE-2015-8863 CVE-2016-4074 D:CVE-2015-8863 D:CVE-2016-4074 GENTOO:GLSA-201612-20 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:github.com:CVE-2016-4074 MLIST:[oss-security] 20160423 CVE Request: jq: heap buffer overflow in tokenadd() function MLIST:[oss-security] 20160423 Re: CVE Request: jq: heap buffer overflow in tokenadd() function MLIST:[oss-security] 20160424 CVE Request: jq: stack exhaustion using jv_dump_term() function MLIST:[oss-security] 20160424 Re: CVE Request: jq: stack exhaustion using jv_dump_term() function OSS:2016/Q2/135 OSS:2016/Q2/141 RH:CVE-2015-8863 RH:CVE-2016-4074 RHSA-2016:1098 RHSA-2016:1099 RHSA-2016:1106 SMASH Issue 168253 SMASH Issue 168268 SMASH Issue 177202 SUSE:openSUSE-SU-2016:1212 SUSE:openSUSE-SU-2016:1214 UBUNTU:CVE-2015-8863 UBUNTU:CVE-2016-4074 bdo#802231 bnc#1014176 bnc#976992 rh#1328747 rh#1329982 |
CVE-2016-4470 | kernel-source-rt:Already fixed | moderate | () | CONFIRM:git.kernel.org:CVE-2016-4470 CONFIRM:github.com:CVE-2016-4470 CONFIRM:www.oracle.com:CVE-2016-2105 CONFIRM:www.oracle.com:CVE-2016-5386 CONFIRM:www.oracle.com:CVE-2016-6304 CONFIRM:www.oracle.com:CVE-2016-7039 CONFIRM:www.oracle.com:CVE-2016-7154 CONFIRM:www.oracle.com:CVE-2016-7166 CVE-2016-4470 D:CVE-2016-4470 DSA-3607 MLIST:[oss-security] 20160615 CVE-2016-4470: Linux kernel Uninitialized variable in request_key handling user controlled kfree(). OSS:2016/Q2/553 Oracle:CVE-2016-5244 RH:CVE-2016-4470 RHSA-2016:1532 RHSA-2016:1539 RHSA-2016:1541 RHSA-2016:1657 RHSA-2016:2006 RHSA-2016:2074 RHSA-2016:2076 RHSA-2016:2128 RHSA-2016:2133 SECTRACK:1036763 SMASH Issue 170099 SMASH Issue 170104 SUSE:SUSE-SU-2016:1937 SUSE:SUSE-SU-2016:1961 SUSE:SUSE-SU-2016:1985 SUSE:SUSE-SU-2016:1994 SUSE:SUSE-SU-2016:1995 SUSE:SUSE-SU-2016:1998 SUSE:SUSE-SU-2016:1999 SUSE:SUSE-SU-2016:2000 SUSE:SUSE-SU-2016:2001 SUSE:SUSE-SU-2016:2002 SUSE:SUSE-SU-2016:2003 SUSE:SUSE-SU-2016:2005 SUSE:SUSE-SU-2016:2006 SUSE:SUSE-SU-2016:2007 SUSE:SUSE-SU-2016:2009 SUSE:SUSE-SU-2016:2010 SUSE:SUSE-SU-2016:2011 SUSE:SUSE-SU-2016:2014 SUSE:SUSE-SU-2016:2018 SUSE:SUSE-SU-2016:2105 SUSE:openSUSE-SU-2016:2184 UBUNTU:CVE-2016-4470 UBUNTU:USN-3049-1 UBUNTU:USN-3050-1 UBUNTU:USN-3051-1 UBUNTU:USN-3052-1 UBUNTU:USN-3053-1 UBUNTU:USN-3054-1 UBUNTU:USN-3055-1 UBUNTU:USN-3056-1 UBUNTU:USN-3057-1 bnc#984755 bnc#984764 rh#1324749 rh#1341716 |
CVE-2016-4482 | kernel-source-rt:Not affected | low | () | BID:90029 CONFIRM:git.kernel.org:CVE-2016-4482 CONFIRM:github.com:CVE-2016-4482 CVE-2016-4482 DSA-3607 FEDORA:FEDORA-2016-4ce97823af MLIST:[oss-security] 20160503 CVE Request: information leak in devio of Linux kernel OSS:2016/Q2/213 Oracle:CVE-2016-5244 RH:CVE-2016-4482 SMASH Issue 168587 SMASH Issue 168609 SUSE:SUSE-SU-2016:1672 SUSE:SUSE-SU-2016:1690 SUSE:SUSE-SU-2016:1696 SUSE:SUSE-SU-2016:1937 SUSE:SUSE-SU-2016:1985 SUSE:SUSE-SU-2016:2105 SUSE:openSUSE-SU-2016:1641 SUSE:openSUSE-SU-2016:2184 UBUNTU:CVE-2016-4482 UBUNTU:USN-3016-1 UBUNTU:USN-3016-2 UBUNTU:USN-3016-3 UBUNTU:USN-3016-4 UBUNTU:USN-3017-1 UBUNTU:USN-3017-2 UBUNTU:USN-3017-3 UBUNTU:USN-3018-1 UBUNTU:USN-3018-2 UBUNTU:USN-3019-1 UBUNTU:USN-3020-1 UBUNTU:USN-3021-1 UBUNTU:USN-3021-2 bnc#978401 bnc#978445 rh#1332931 |
CVE-2016-4485 | kernel-source-rt:Already fixed | moderate | 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) | BID:90015 CONFIRM:git.kernel.org:CVE-2016-4485 CONFIRM:github.com:CVE-2016-4485 CONFIRM:www.kernel.org:CVE-2016-6198 CVE-2016-4485 DSA-3607 MLIST:[oss-security] 20160503 CVE Request: kernel information leak vulnerability in llc module OSS:2016/Q2/236 Oracle:CVE-2016-5244 RH:CVE-2016-4485 SMASH Issue 168619 SUSE:SUSE-SU-2016:1672 SUSE:SUSE-SU-2016:1985 SUSE:openSUSE-SU-2016:1641 UBUNTU:CVE-2016-4485 UBUNTU:USN-2989-1 UBUNTU:USN-2996-1 UBUNTU:USN-2997-1 UBUNTU:USN-2998-1 UBUNTU:USN-3000-1 UBUNTU:USN-3001-1 UBUNTU:USN-3002-1 UBUNTU:USN-3003-1 UBUNTU:USN-3004-1 UBUNTU:USN-3005-1 UBUNTU:USN-3006-1 UBUNTU:USN-3007-1 bnc#978821 rh#1324749 rh#1333309 |
CVE-2016-4486 | kernel-source-rt:Already fixed | low | () | BID:90051 CONFIRM:git.kernel.org:CVE-2016-4486 CONFIRM:github.com:CVE-2016-4486 CONFIRM:www.kernel.org:CVE-2016-6198 CVE-2016-4486 D:CVE-2022-2590 DSA-3607 EXPLOIT-DB:46006 MLIST:[oss-security] 20160504 CVE Request: kernel information leak vulnerability in rtnetlink OSS:2016/Q2/237 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 OSS:2023/10/10/4 Oracle:CVE-2015-6937 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 RH:CVE-2016-4486 SMASH Issue 168618 SUSE:SUSE-SU-2016:1672 SUSE:SUSE-SU-2016:1690 SUSE:SUSE-SU-2016:1696 SUSE:SUSE-SU-2016:1937 SUSE:SUSE-SU-2016:1985 SUSE:SUSE-SU-2016:2074 SUSE:SUSE-SU-2016:2105 SUSE:openSUSE-SU-2016:1641 SUSE:openSUSE-SU-2016:2184 UBUNTU:CVE-2016-4486 UBUNTU:USN-2989-1 UBUNTU:USN-2996-1 UBUNTU:USN-2997-1 UBUNTU:USN-2998-1 UBUNTU:USN-3000-1 UBUNTU:USN-3001-1 UBUNTU:USN-3002-1 UBUNTU:USN-3003-1 UBUNTU:USN-3004-1 UBUNTU:USN-3005-1 UBUNTU:USN-3006-1 UBUNTU:USN-3007-1 bnc#978822 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b rh#1324749 rh#1333316 rh#1384344 rh#2116175 |
CVE-2016-4487 | gcc:Not affected | low | () | BID:90025 CONFIRM:gcc.gnu.org:CVE-2016-4488 CVE-2016-4487 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MLIST:[gcc-patches] 20160630 Fix fir PR71696 in Libiberty Demangler (6) OSS:2016/Q2/240 OSS:2016/Q2/630 RH:CVE-2016-4487 SMASH Issue 168626 UBUNTU:CVE-2016-4487 bnc#978813 rh#1333330 |
CVE-2016-4488 | gcc:Not affected | low | () | CVE-2016-4488 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MLIST:[gcc-patches] 20160630 Fix fir PR71696 in Libiberty Demangler (6) OSS:2016/Q2/240 OSS:2016/Q2/630 RH:CVE-2016-4488 SMASH Issue 168624 UBUNTU:CVE-2016-4488 bnc#978814 rh#1333332 |
CVE-2016-4489 | gcc:Not affected | low | () | BID:90017 CONFIRM:gcc.gnu.org:CVE-2016-4489 CVE-2016-4489 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MLIST:[gcc-patches] 20160630 Fix fir PR71696 in Libiberty Demangler (6) OSS:2016/Q2/240 OSS:2016/Q2/630 RH:CVE-2016-4489 SMASH Issue 168625 UBUNTU:CVE-2016-4489 bnc#978815 rh#1333336 |
CVE-2016-4490 | gcc:Not affected | low | () | BID:90019 CONFIRM:gcc.gnu.org:CVE-2016-4490 CVE-2016-4490 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MLIST:[gcc-patches] 20160630 Fix fir PR71696 in Libiberty Demangler (6) OSS:2016/Q2/240 OSS:2016/Q2/630 RH:CVE-2016-4490 SMASH Issue 168629 UBUNTU:CVE-2016-4490 bnc#978816 rh#1333366 |
CVE-2016-4558 | kernel-source-rt:Unsupported | moderate | () | CONFIRM:git.kernel.org:CVE-2016-4558 CONFIRM:github.com:CVE-2016-4558 CONFIRM:www.kernel.org:CVE-2016-6198 CVE-2016-4558 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MLIST:[oss-security] 20160506 CVE Requests: Linux: BPF flaws (one use-after-free / local root privilege escalation) OSS:2016/Q2/266 RH:CVE-2016-4558 SMASH Issue 168689 UBUNTU:CVE-2016-4558 UBUNTU:USN-3005-1 UBUNTU:USN-3006-1 UBUNTU:USN-3007-1 bnc#979019 rh#1334303 |
CVE-2016-4565 | kernel-source-rt:Not affected | moderate | () | BID:90301 CONFIRM:git.kernel.org:CVE-2016-4565 CONFIRM:github.com:CVE-2016-4565 CONFIRM:www.kernel.org:CVE-2016-7914 CONFIRM:www.oracle.com:CVE-2015-8391 CONFIRM:www.oracle.com:CVE-2016-2105 CONFIRM:www.oracle.com:CVE-2016-5386 CVE-2016-4565 DSA-3607 MLIST:[oss-security] 20160507 CVE Request: Linux: IB/security: Restrict use of the write() interface' OSS:2016/Q2/274 OSS:2016/Q2/353 Oracle:CVE-2016-5244 RH:CVE-2016-4565 RHSA-2016:1277 RHSA-2016:1301 RHSA-2016:1341 RHSA-2016:1406 RHSA-2016:1489 RHSA-2016:1581 RHSA-2016:1617 RHSA-2016:1640 RHSA-2016:1657 RHSA-2016:1814 SMASH Issue 168718 SUSE:SUSE-SU-2016:1672 SUSE:SUSE-SU-2016:1690 SUSE:SUSE-SU-2016:1937 SUSE:SUSE-SU-2016:1961 SUSE:SUSE-SU-2016:1985 SUSE:SUSE-SU-2016:1994 SUSE:SUSE-SU-2016:1995 SUSE:SUSE-SU-2016:2000 SUSE:SUSE-SU-2016:2001 SUSE:SUSE-SU-2016:2002 SUSE:SUSE-SU-2016:2003 SUSE:SUSE-SU-2016:2005 SUSE:SUSE-SU-2016:2006 SUSE:SUSE-SU-2016:2007 SUSE:SUSE-SU-2016:2009 SUSE:SUSE-SU-2016:2010 SUSE:SUSE-SU-2016:2011 SUSE:SUSE-SU-2016:2014 SUSE:SUSE-SU-2016:2105 SUSE:openSUSE-SU-2016:1641 SUSE:openSUSE-SU-2016:2184 UBUNTU:CVE-2016-4565 UBUNTU:USN-3001-1 UBUNTU:USN-3002-1 UBUNTU:USN-3003-1 UBUNTU:USN-3004-1 UBUNTU:USN-3005-1 UBUNTU:USN-3006-1 UBUNTU:USN-3007-1 UBUNTU:USN-3018-1 UBUNTU:USN-3018-2 UBUNTU:USN-3019-1 UBUNTU:USN-3021-1 UBUNTU:USN-3021-2 bnc#979548 rh#1310570 rh#1324749 rh#1334217 |
CVE-2016-4568 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2016-4568 CONFIRM:github.com:CVE-2016-4568 CONFIRM:www.kernel.org:CVE-2016-7914 CVE-2016-4568 MLIST:[oss-security] 20160507 CVE Request: Linux: [media] videobuf2-v4l2: Verify planes array in buffer dequeueing OSS:2016/Q2/273 RH:CVE-2016-4568 SMASH Issue 168719 UBUNTU:CVE-2016-4568 bnc#979022 rh#1334316 |
CVE-2016-4569 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) | BID:90347 CONFIRM:git.kernel.org:CVE-2016-4569 CONFIRM:github.com:CVE-2016-4569 CVE-2016-4569 DSA-3607 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MLIST:[oss-security] 20160509 Re: CVE Request: kernel information leak vulnerability in Linux sound module OSS:2016/Q2/296 OSS:2016/Q2/315 OSS:2016/Q2/316 Oracle:CVE-2016-5244 RH:CVE-2016-4569 RHSA-2016:2574 RHSA-2016:2584 SMASH Issue 168777 SUSE:SUSE-SU-2016:1672 SUSE:SUSE-SU-2016:1690 SUSE:SUSE-SU-2016:1696 SUSE:SUSE-SU-2016:1937 SUSE:SUSE-SU-2016:1985 SUSE:SUSE-SU-2016:2105 SUSE:openSUSE-SU-2016:1641 SUSE:openSUSE-SU-2016:2184 UBUNTU:CVE-2016-4569 UBUNTU:USN-3016-1 UBUNTU:USN-3016-2 UBUNTU:USN-3016-3 UBUNTU:USN-3016-4 UBUNTU:USN-3017-1 UBUNTU:USN-3017-2 UBUNTU:USN-3017-3 UBUNTU:USN-3018-1 UBUNTU:USN-3018-2 UBUNTU:USN-3019-1 UBUNTU:USN-3020-1 UBUNTU:USN-3021-1 UBUNTU:USN-3021-2 bnc#979213 rh#1334643 |
CVE-2016-4578 | kernel-source-rt:Already fixed | low | () | BID:90535 CONFIRM:git.kernel.org:CVE-2016-4578 CONFIRM:github.com:CVE-2016-4578 CVE-2016-4578 D:CVE-2016-4578 DSA-3607 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:MLIST:[oss-security] 20160511 Re: CVE Request: alsa: kernel information leak vulnerability in Linux sound/core/timer MLIST:[oss-security] 20160511 Re: CVE Request: alsa: kernel information leak vulnerability in Linux sound/core/timer OSS:2016/Q2/316 Oracle:CVE-2016-5244 RH:CVE-2016-4578 RHSA-2016:2574 RHSA-2016:2584 SMASH Issue 169005 UBUNTU:CVE-2016-4578 bnc#979879 rh#1335215 |
CVE-2016-4581 | kernel-source-rt:Unsupported | moderate | () | BID:90607 CONFIRM:git.kernel.org:CVE-2016-4581 CONFIRM:github.com:CVE-2016-4581 CONFIRM:www.kernel.org:CVE-2016-7916 CONFIRM:www.oracle.com:CVE-2016-5386 CONFIRM:www.oracle.com:CVE-2016-6304 CONFIRM:www.oracle.com:CVE-2016-7039 CONFIRM:www.oracle.com:CVE-2016-7166 CVE-2016-4581 D:CVE-2016-4581 DSA-3607 MISC:git.kernel.org:MLIST:[oss-security] 20160511 CVE request: Mishandling the first propagated copy being a slave MLIST:[oss-security] 20160511 CVE request: Mishandling the first propagated copy being a slave OSS:2016/Q2/318 Oracle:CVE-2016-5244 RH:CVE-2016-4581 RHSA-2016:2574 RHSA-2016:2584 SMASH Issue 169007 SUSE:openSUSE-SU-2016:1641 UBUNTU:CVE-2016-4581 UBUNTU:USN-2989-1 UBUNTU:USN-2998-1 UBUNTU:USN-3000-1 UBUNTU:USN-3001-1 UBUNTU:USN-3002-1 UBUNTU:USN-3003-1 UBUNTU:USN-3004-1 UBUNTU:USN-3005-1 UBUNTU:USN-3006-1 UBUNTU:USN-3007-1 bnc#979913 rh#1324749 rh#1333712 |
CVE-2016-4794 | kernel-source-rt:Not affected | moderate | () | BID:90625 CONFIRM:source.android.com:CVE-2016-8411 CVE-2016-4794 D:CVE-2016-4794 MLIST:[linux-kernel] 20160417 Re: bpf: use-after-free in array_map_alloc MLIST:[oss-security] 20160512 Linux Kernel bpf related UAF OSS:2016/Q2/336 RH:CVE-2016-4794 RHSA-2016:2574 RHSA-2016:2584 SMASH Issue 169080 SMASH Issue 169416 UBUNTU:CVE-2016-4794 UBUNTU:USN-3053-1 UBUNTU:USN-3054-1 UBUNTU:USN-3055-1 UBUNTU:USN-3056-1 UBUNTU:USN-3057-1 bnc#980265 bnc#981517 rh#1335889 |
CVE-2016-4913 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | BID:90730 CONFIRM:git.kernel.org:CVE-2016-4913 CONFIRM:git.kernel.org:CVE-2017-8062 CONFIRM:git.kernel.org:CVE-2017-8063 CONFIRM:github.com:CVE-2016-4913 CONFIRM:github.com:CVE-2017-8064 CONFIRM:github.com:CVE-2017-8065 CONFIRM:github.com:CVE-2017-8066 CONFIRM:www.kernel.org:CVE-2016-6198 CONFIRM:www.oracle.com:CVE-2016-5386 CONFIRM:www.oracle.com:CVE-2016-6304 CONFIRM:www.oracle.com:CVE-2016-7039 CONFIRM:www.oracle.com:CVE-2016-7166 CVE-2016-4913 D:CVE-2016-4913 DSA-3607 L3:45677 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MLIST:[oss-security] 20160518 CVE Request: Linux: information leak in Rock Ridge Extensions to iso9660 -- fs/isofs/rock.c MLIST:[oss-security] 20160518 Re: CVE Request: Linux: information leak in Rock Ridge Extensions to iso9660 -- fs/isofs/rock.c OSS:2016/Q2/365 Oracle:CVE-2016-5244 RH:CVE-2016-4913 RHSA-2018:2948 RHSA-2018:3083 RHSA-2018:3096 SMASH Issue 169190 SMASH Issue 169841 SUSE:SUSE-SU-2016:1672 SUSE:SUSE-SU-2016:1985 UBUNTU:CVE-2016-4913 UBUNTU:USN-3016-1 UBUNTU:USN-3016-2 UBUNTU:USN-3016-3 UBUNTU:USN-3016-4 UBUNTU:USN-3017-1 UBUNTU:USN-3017-2 UBUNTU:USN-3017-3 UBUNTU:USN-3018-1 UBUNTU:USN-3018-2 UBUNTU:USN-3019-1 UBUNTU:USN-3020-1 UBUNTU:USN-3021-1 UBUNTU:USN-3021-2 bnc#980725 bnc#983469 rh#1324749 rh#1337528 |
CVE-2016-4951 | kernel-source-rt:Unsupported | moderate | () | CONFIRM:git.kernel.org:CVE-2016-4951 CONFIRM:github.com:CVE-2016-4951 CONFIRM:www.oracle.com:CVE-2016-5386 CONFIRM:www.oracle.com:CVE-2016-6304 CONFIRM:www.oracle.com:CVE-2016-7039 CONFIRM:www.oracle.com:CVE-2016-7166 CVE-2016-4951 D:CVE-2016-4951 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MLIST:[netdev] 20160514 BUG: net/tipc: NULL-ptr dereference in tipc_nl_publ_dump MLIST:[oss-security] 20160521 Re: CVE request: -- Linux kernel: Null pointer dereference in tipc_nl_publ_dump OSS:2016/Q2/386 Oracle:CVE-2016-5244 RH:CVE-2016-4951 SMASH Issue 169318 SUSE:openSUSE-SU-2016:1641 UBUNTU:CVE-2016-4951 UBUNTU:USN-3016-1 UBUNTU:USN-3016-2 UBUNTU:USN-3016-3 UBUNTU:USN-3016-4 UBUNTU:USN-3017-1 UBUNTU:USN-3017-2 UBUNTU:USN-3017-3 UBUNTU:USN-3020-1 bnc#981058 rh#1324749 rh#1338625 |
CVE-2016-4997 | kernel-source-rt:Already fixed | important | () | BID:91451 CONFIRM:git.kernel.org:CVE-2016-4997 CONFIRM:github.com:CVE-2016-4997 CONFIRM:h20566.www2.hpe.com:CVE-2016-5195 CONFIRM:www.kernel.org:CVE-2016-9806 CONFIRM:www.oracle.com:CVE-2016-5386 CONFIRM:www.oracle.com:CVE-2016-6304 CONFIRM:www.oracle.com:CVE-2016-7039 CONFIRM:www.oracle.com:CVE-2016-7166 CVE-2016-4997 D:CVE-2016-4997 D:CVE-2022-2590 DSA-3607 EXPLOIT-DB:40435 EXPLOIT-DB:40489 MISC:bugs.chromium.org:MLIST:[oss-security] 20160624 Linux CVE-2016-4997 (local privilege escalation) and CVE-2016-4998 (out of bounds memory access) MISC:git.kernel.org:MLIST:[oss-security] 20160624 Linux CVE-2016-4997 (local privilege escalation) and CVE-2016-4998 (out of bounds memory access) MISC:github.com:CVE-2016-4997 MLIST:[oss-security] 20160624 Linux CVE-2016-4997 (local privilege escalation) and CVE-2016-4998 (out of bounds memory access) MLIST:[oss-security] 20160929 CVE request - Linux kernel through 4.6.2 allows escalade privileges via IP6T_SO_SET_REPLACE compat setsockopt call OSS:2016/Q2/599 OSS:2016/Q3/662 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 Oracle:CVE-2017-6074 RH:CVE-2016-4997 RHSA-2016:1847 RHSA-2016:1875 RHSA-2016:1883 SECTRACK:1036171 SMASH Issue 170491 SMASH Issue 170493 SUSE:SUSE-SU-2016:1709 SUSE:SUSE-SU-2016:1710 SUSE:SUSE-SU-2016:1937 SUSE:SUSE-SU-2016:1985 SUSE:SUSE-SU-2016:2018 SUSE:SUSE-SU-2016:2105 SUSE:SUSE-SU-2016:2174 SUSE:SUSE-SU-2016:2177 SUSE:SUSE-SU-2016:2178 SUSE:SUSE-SU-2016:2179 SUSE:SUSE-SU-2016:2180 SUSE:SUSE-SU-2016:2181 SUSE:openSUSE-SU-2016:2184 UBUNTU:CVE-2016-4997 UBUNTU:USN-3016-1 UBUNTU:USN-3016-2 UBUNTU:USN-3016-3 UBUNTU:USN-3016-4 UBUNTU:USN-3017-1 UBUNTU:USN-3017-2 UBUNTU:USN-3017-3 UBUNTU:USN-3018-1 UBUNTU:USN-3018-2 UBUNTU:USN-3019-1 UBUNTU:USN-3020-1 bnc#986362 bnc#986377 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1324749 rh#1349722 rh#1384344 rh#1435719 rh#1439087 rh#1462147 rh#1462158 rh#2116175 |
CVE-2016-5195 | kernel-source-rt:Already fixed | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | BID:93793 BUGTRAQ:20161020 [CVE-2016-5195] "Dirty COW" Linux privilege escalation vulnerability BUGTRAQ:20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege BUGTRAQ:20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege BUGTRAQ:20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege CERT-VN:VU#243144 CISCO:20161026 Vulnerability in Linux Kernel Affecting Cisco Products: October 2016 CISCO:20181107 Cisco TelePresence Video Communication Server Test Validation Script Issue CONFIRM:access.redhat.com:CVE-2016-5195 CONFIRM:bto.bluecoat.com:CVE-2016-9555 CONFIRM:fortiguard.com:CVE-2016-5195 CONFIRM:git.kernel.org:CVE-2016-5195 CONFIRM:github.com:CVE-2016-5195 CONFIRM:h20566.www2.hpe.com:CVE-2016-5195 CONFIRM:h20566.www2.hpe.com:CVE-2016-7457 CONFIRM:help.ecostruxureit.com:CVE-2017-5754 CONFIRM:kb.juniper.net:CVE-2016-5195 CONFIRM:kc.mcafee.com:CVE-2016-5195 CONFIRM:people.canonical.com:CVE-2016-5195 CONFIRM:security.netapp.com:CVE-2016-5195 CONFIRM:security.paloaltonetworks.com:CVE-2016-5195 CONFIRM:securityadvisories.paloaltonetworks.com:CVE-2016-5195 CONFIRM:source.android.com:CVE-2016-6828 CONFIRM:source.android.com:CVE-2016-8411 CONFIRM:www.huawei.com:CVE-2016-5195 CONFIRM:www.kernel.org:CVE-2016-5195 CONFIRM:www.oracle.com:CVE-2017-6074 CONFIRM:www.oracle.com:CVE-2018-3081 CVE-2016-5195 D:CVE-2022-2590 DSA-3696 EXPLOIT-DB:40611 EXPLOIT-DB:40616 EXPLOIT-DB:40839 EXPLOIT-DB:40847 FEDORA:FEDORA-2016-c3558808cd FEDORA:FEDORA-2016-c8a0c7eece FEDORA:FEDORA-2016-db4b75b352 L3:47235 MISC:access.redhat.com:MLIST:[oss-security] 20161021 CVE-2016-5195 "Dirty COW" Linux kernel privilege escalation vulnerability MISC:dirtycow.ninja:CVE-2016-5195 MISC:git.kernel.org:MLIST:[oss-security] 20161021 CVE-2016-5195 "Dirty COW" Linux kernel privilege escalation vulnerability MISC:github.com:CVE-2016-5195 MISC:github.com:MLIST:[oss-security] 20161027 CVE-2016-5195 test case MISC:lists.openwall.net:OSS:2022/08/08/2 MISC:packetstormsecurity.com:CVE-2016-5195 MISC:security-tracker.debian.org:MLIST:[oss-security] 20161021 CVE-2016-5195 "Dirty COW" Linux kernel privilege escalation vulnerability MISC:www.arista.com:CVE-2016-5195 MLIST:[oss-security] 20161021 CVE-2016-5195 "Dirty COW" Linux kernel privilege escalation vulnerability MLIST:[oss-security] 20161026 Re: CVE-2016-5195 "Dirty COW" Linux kernel privilege escalation vulnerability MLIST:[oss-security] 20161027 CVE-2016-5195 test case MLIST:[oss-security] 20161030 Re: CVE-2016-5195 test case MLIST:[oss-security] 20161103 Re: CVE-2016-5195 "Dirty COW" Linux kernel privilege escalation vulnerability OSS:2016/Q4/204 OSS:2016/Q4/263 OSS:2017/Q3/182 OSS:2022/03/07/1 OSS:2022/08/08/1 OSS:2022/08/08/2 OSS:2022/08/08/7 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q1/170 OSS:2022/Q3/99 OSS:2023/10/10/4 Oracle:CVE-2015-6937 Oracle:CVE-2016-5195 RH:CVE-2016-5195 RHSA-2016:2098 RHSA-2016:2105 RHSA-2016:2106 RHSA-2016:2107 RHSA-2016:2110 RHSA-2016:2118 RHSA-2016:2120 RHSA-2016:2124 RHSA-2016:2126 RHSA-2016:2127 RHSA-2016:2128 RHSA-2016:2132 RHSA-2016:2133 RHSA-2017:0372 RHSA-2018:0180 SECTRACK:1037078 SMASH Issue 173542 SMASH Issue 173543 SUSE:SUSE-SU-2016:2585 SUSE:SUSE-SU-2016:2592 SUSE:SUSE-SU-2016:2593 SUSE:SUSE-SU-2016:2596 SUSE:SUSE-SU-2016:2614 SUSE:SUSE-SU-2016:2629 SUSE:SUSE-SU-2016:2630 SUSE:SUSE-SU-2016:2631 SUSE:SUSE-SU-2016:2632 SUSE:SUSE-SU-2016:2633 SUSE:SUSE-SU-2016:2634 SUSE:SUSE-SU-2016:2635 SUSE:SUSE-SU-2016:2636 SUSE:SUSE-SU-2016:2637 SUSE:SUSE-SU-2016:2638 SUSE:SUSE-SU-2016:2655 SUSE:SUSE-SU-2016:2657 SUSE:SUSE-SU-2016:2658 SUSE:SUSE-SU-2016:2659 SUSE:SUSE-SU-2016:2673 SUSE:SUSE-SU-2016:3069 SUSE:SUSE-SU-2016:3304 SUSE:openSUSE-SU-2016:2583 SUSE:openSUSE-SU-2016:2584 SUSE:openSUSE-SU-2016:2625 SUSE:openSUSE-SU-2016:2649 SUSE:openSUSE-SU-2020:0554 UBUNTU:CVE-2016-5195 USN-3104-1 USN-3104-2 USN-3105-1 USN-3105-2 USN-3106-1 USN-3106-2 USN-3106-3 USN-3106-4 USN-3107-1 USN-3107-2 bdo#831014 bnc#1004418 bnc#1004419 bnc#1004436 bnc#1014395 bnc#1019873 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b rh#1384344 rh#1516514 rh#2116175 |
CVE-2016-5389 | kernel-source-rt:Not affected | moderate | 4.8 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L) | BID:91704 CONFIRM:bto.bluecoat.com:CVE-2016-5696 CONFIRM:git.kernel.org:CVE-2016-5696 CONFIRM:github.com:CVE-2016-5696 CONFIRM:kc.mcafee.com:CVE-2016-5696 CONFIRM:security.paloaltonetworks.com:CVE-2016-5696 CONFIRM:securityadvisories.paloaltonetworks.com:CVE-2016-5696 CONFIRM:source.android.com:CVE-2016-7117 CONFIRM:www.oracle.com:CVE-2016-7154 CONFIRM:www.oracle.com:CVE-2016-7166 CVE-2016-5389 CVE-2016-5696 D:CVE-2022-2590 DSA-3659 L3:46157 L3:46331 MISC:github.com:CVE-2016-5696 MISC:www.arista.com:CVE-2016-5696 MISC:www.prnewswire.com:CVE-2016-5696 MISC:www.usenix.org:CVE-2015-2877 MISC:www.usenix.org:CVE-2016-5696 MLIST:[oss-security] 20160712 Re: CVE-2016-5389: linux kernel - challange ack information leak. OSS:2016/Q3/44 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 RH:CVE-2016-5696 RHSA-2016:1631 RHSA-2016:1632 RHSA-2016:1633 RHSA-2016:1657 RHSA-2016:1664 RHSA-2016:1814 RHSA-2016:1815 RHSA-2016:1939 SECTRACK:1036625 SMASH Issue 170826 SMASH Issue 170974 UBUNTU:CVE-2016-5696 UBUNTU:USN-3070-1 UBUNTU:USN-3070-2 UBUNTU:USN-3070-3 UBUNTU:USN-3070-4 UBUNTU:USN-3071-1 UBUNTU:USN-3071-2 UBUNTU:USN-3072-1 UBUNTU:USN-3072-2 bnc#989152 bnc#994167 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b rh#1354708 rh#1384344 rh#2116175 |
CVE-2016-5412 | kernel-source-rt:Not affected | moderate | 5.4 (CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H) | CONFIRM:git.kernel.org:CVE-2016-5412 CONFIRM:github.com:CVE-2016-5412 CVE-2016-5412 D:CVE-2016-5412 MLIST:[oss-security] 20160728 CVE-2016-5412 Kernel: powerpc: kvm: Infinite loop via H_CEDE hypercall when running under hypervisor-mode OSS:2016/Q3/181 RH:CVE-2016-5412 RHSA-2016:2574 SMASH Issue 171418 UBUNTU:CVE-2016-5412 bnc#991065 linux.git:commit:601045bff74569374b3d5b34dbb9bad71adf3aa5 linux.git:commit:93d17397e4e2182fdaad503e2f9da46202c0f1c3 rh#1349916 |
CVE-2016-5417 | glibc:Not affected | important | () | BID:92257 CONFIRM:sourceware.org:CVE-2016-5417 CVE-2016-5417 MLIST:[libc-alpha] 20160804 The GNU C Library version 2.24 is now available MLIST:[oss-security] 20160802 glibc: Per-thread memory leak in __res_vinit with IPv6 nameservers (CVE-2016-5417) OSS:2016/Q3/225 RH:CVE-2016-5417 SMASH Issue 171553 UBUNTU:CVE-2016-5417 bnc#991670 https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=2212c1420c92a33b0e0bd9a34938c9814a56c0f7 rh#1362534 |
CVE-2016-5696 | kernel-source-rt:Not affected | moderate | 4.8 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L) | BID:91704 CONFIRM:bto.bluecoat.com:CVE-2016-5696 CONFIRM:git.kernel.org:CVE-2016-5696 CONFIRM:github.com:CVE-2016-5696 CONFIRM:kc.mcafee.com:CVE-2016-5696 CONFIRM:security.paloaltonetworks.com:CVE-2016-5696 CONFIRM:securityadvisories.paloaltonetworks.com:CVE-2016-5696 CONFIRM:source.android.com:CVE-2016-7117 CONFIRM:www.oracle.com:CVE-2016-7154 CONFIRM:www.oracle.com:CVE-2016-7166 CVE-2016-5389 CVE-2016-5696 D:CVE-2022-2590 DSA-3659 L3:46157 L3:46331 MISC:github.com:CVE-2016-5696 MISC:www.arista.com:CVE-2016-5696 MISC:www.prnewswire.com:CVE-2016-5696 MISC:www.usenix.org:CVE-2015-2877 MISC:www.usenix.org:CVE-2016-5696 MLIST:[oss-security] 20160712 Re: CVE-2016-5389: linux kernel - challange ack information leak. OSS:2016/Q3/44 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 RH:CVE-2016-5696 RHSA-2016:1631 RHSA-2016:1632 RHSA-2016:1633 RHSA-2016:1657 RHSA-2016:1664 RHSA-2016:1814 RHSA-2016:1815 RHSA-2016:1939 SECTRACK:1036625 SMASH Issue 170974 SMASH Issue 170986 UBUNTU:CVE-2016-5696 UBUNTU:USN-3070-1 UBUNTU:USN-3070-2 UBUNTU:USN-3070-3 UBUNTU:USN-3070-4 UBUNTU:USN-3071-1 UBUNTU:USN-3071-2 UBUNTU:USN-3072-1 UBUNTU:USN-3072-2 bnc#989152 bnc#994167 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b rh#1354708 rh#1384344 rh#2116175 |
CVE-2016-5728 | kernel-source-rt:Unsupported | low | () | BUGTRAQ:20160630 [CVE-2016-5728] Double-Fetch Vulnerability in Linux-4.5/drivers/misc/mic/host/mic_virtio.c CONFIRM:bugzilla.kernel.org:CVE-2016-5728 CONFIRM:git.kernel.org:CVE-2016-5728 CONFIRM:github.com:CVE-2016-5728 CVE-2016-5728 D:CVE-2016-5728 DSA-3616 RH:CVE-2016-5728 SMASH Issue 170536 UBUNTU:CVE-2016-5728 bdo#828914 bnc#986827 rh#1350811 |
CVE-2016-5828 | kernel-source-rt:Not affected | moderate | () | BID:91415 CVE-2016-5828 D:CVE-2016-5828 DSA-3616 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:patchwork.ozlabs.org:CVE-2016-5828 MLIST:[oss-security] 20160625 Re: CVE Request: Linux: powerpc/tm: Always reclaim in start_thread() for exec() class syscalls - Linux kernel OSS:2016/Q2/607 Oracle:CVE-2016-5244 RH:CVE-2016-5828 RHSA-2016:2574 SMASH Issue 170523 SUSE:SUSE-SU-2016:1937 SUSE:SUSE-SU-2016:2105 SUSE:openSUSE-SU-2016:2184 UBUNTU:CVE-2016-5828 UBUNTU:USN-3070-1 UBUNTU:USN-3070-2 UBUNTU:USN-3070-3 UBUNTU:USN-3070-4 UBUNTU:USN-3071-1 UBUNTU:USN-3071-2 bdo#828914 bnc#986569 linux.git:commit:8e96a87c5431c256feb65bcfc5aec92d9f7839b6 rh#1324749 rh#1349917 |
CVE-2016-5829 | kernel-source-rt:Ignore | moderate | () | BID:91450 CONFIRM:git.kernel.org:CVE-2016-5829 CONFIRM:github.com:CVE-2016-5829 CONFIRM:www.oracle.com:CVE-2016-6304 CVE-2016-5829 D:CVE-2016-5829 DSA-3616 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:MLIST:[oss-security] 20160626 Re: CVE Request: Linux kernel HID: hiddev buffer overflows MLIST:[oss-security] 20160626 Re: CVE Request: Linux kernel HID: hiddev buffer overflows OSS:2016/Q2/609 Oracle:CVE-2016-5244 RH:CVE-2016-5829 RHSA-2016:2006 RHSA-2016:2574 RHSA-2016:2584 SMASH Issue 170524 SUSE:SUSE-SU-2016:1937 SUSE:SUSE-SU-2016:1985 SUSE:SUSE-SU-2016:2018 SUSE:SUSE-SU-2016:2105 SUSE:SUSE-SU-2016:2174 SUSE:SUSE-SU-2016:2175 SUSE:SUSE-SU-2016:2177 SUSE:SUSE-SU-2016:2178 SUSE:SUSE-SU-2016:2179 SUSE:SUSE-SU-2016:2180 SUSE:SUSE-SU-2016:2181 SUSE:openSUSE-SU-2016:2184 UBUNTU:CVE-2016-5829 UBUNTU:USN-3070-1 UBUNTU:USN-3070-2 UBUNTU:USN-3070-3 UBUNTU:USN-3070-4 UBUNTU:USN-3071-1 UBUNTU:USN-3071-2 UBUNTU:USN-3072-1 UBUNTU:USN-3072-2 bdo#828914 bnc#986572 bnc#986573 rh#1324749 rh#1350509 |
CVE-2016-6130 | kernel-source-rt:Not affected | moderate | 2.2 (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N) | BID:91540 BUGTRAQ:20160630 [CVE-2016-6130] Double-Fetch Vulnerability in Linux-4.5/drivers/s390/char/sclp_ctl.c CONFIRM:bugzilla.kernel.org:CVE-2016-6130 CONFIRM:git.kernel.org:CVE-2016-6130 CONFIRM:github.com:CVE-2016-6130 CVE-2016-6130 D:CVE-2022-2590 DSA-3616 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 Oracle:CVE-2016-5195 RH:CVE-2016-6130 SMASH Issue 170611 UBUNTU:CVE-2016-6130 bdo#828914 bnc#987542 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b rh#1352558 rh#1384344 rh#2116175 |
CVE-2016-6136 | kernel-source-rt:Not affected | moderate | 5.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H) | BID:91558 BUGTRAQ:20160704 [CVE-2016-6136] Double-Fetch Vulnerability in Linux-4.6/kernel/auditsc.c CONFIRM:bugzilla.kernel.org:CVE-2016-6136 CONFIRM:git.kernel.org:CVE-2016-6136 CONFIRM:github.com:CVE-2016-6136 CVE-2016-6136 DSA-3659 RH:CVE-2016-6136 RHSA-2016:2574 RHSA-2016:2584 RHSA-2017:0307 SMASH Issue 170678 UBUNTU:CVE-2016-6136 bnc#988153 rh#1353533 |
CVE-2016-6156 | kernel-source-rt:Unsupported | low | () | BID:91553 BUGTRAQ:20160704 [CVE-2016-6156] Double-Fetch Vulnerability in Linux-4.6/drivers/platform/chrome/cros_ec_dev.c CONFIRM:git.kernel.org:CVE-2016-6156 CONFIRM:github.com:CVE-2016-6156 CVE-2016-6156 MISC:bugzilla.kernel.org:CVE-2016-6156 RH:CVE-2016-6156 SMASH Issue 170669 UBUNTU:CVE-2016-6156 bnc#988025 rh#1353490 |
CVE-2016-6162 | kernel-source-rt:Unsupported | moderate | () | CVE-2016-6162 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MLIST:[oss-security] 20160705 Re: BUG_ON crash in linux 4.7-rc6/master skbuff.c OSS:2016/Q3/15 RH:CVE-2016-6162 SMASH Issue 170649 UBUNTU:CVE-2016-6162 bnc#988013 linux.git:commit:a612769774a30e4fc143c4cb6395c12573415660 rh#1353538 |
CVE-2016-6197 | kernel-source-rt:Not affected | moderate | () | BID:91709 CONFIRM:git.kernel.org:CVE-2016-6197 CONFIRM:git.kernel.org:CVE-2016-6198 CONFIRM:github.com:CVE-2016-6197 CONFIRM:github.com:CVE-2016-6198 CONFIRM:www.kernel.org:CVE-2016-6198 CONFIRM:www.oracle.com:CVE-2016-7154 CONFIRM:www.oracle.com:CVE-2016-7166 CVE-2016-6197 CVE-2016-6198 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:MLIST:[oss-security] 20160711 Re: cvs request: local DoS using rename syscall on overlayfs on top of xfs to crash the kernel - Linux kernel MLIST:[oss-security] 20160711 Re: cvs request: local DoS using rename syscall on overlayfs on top of xfs to crash the kernel - Linux kernel OSS:2016/Q3/42 RH:CVE-2016-6197 RH:CVE-2016-6198 RHSA-2016:1847 RHSA-2016:1875 RHSA-2016:2574 RHSA-2016:2584 SECTRACK:1036273 SMASH Issue 170728 UBUNTU:CVE-2016-6197 UBUNTU:CVE-2016-6198 UBUNTU:USN-3070-1 UBUNTU:USN-3070-2 UBUNTU:USN-3070-3 UBUNTU:USN-3070-4 bnc#988708 rh#1355650 rh#1355654 |
CVE-2016-6198 | kernel-source-rt:Not affected | moderate | () | BID:91709 CONFIRM:git.kernel.org:CVE-2016-6197 CONFIRM:git.kernel.org:CVE-2016-6198 CONFIRM:github.com:CVE-2016-6197 CONFIRM:github.com:CVE-2016-6198 CONFIRM:www.kernel.org:CVE-2016-6198 CONFIRM:www.oracle.com:CVE-2016-7154 CONFIRM:www.oracle.com:CVE-2016-7166 CVE-2016-6197 CVE-2016-6198 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:MLIST:[oss-security] 20160711 Re: cvs request: local DoS using rename syscall on overlayfs on top of xfs to crash the kernel - Linux kernel MLIST:[oss-security] 20160711 Re: cvs request: local DoS using rename syscall on overlayfs on top of xfs to crash the kernel - Linux kernel OSS:2016/Q3/42 RH:CVE-2016-6197 RH:CVE-2016-6198 RHSA-2016:1847 RHSA-2016:1875 RHSA-2016:2574 RHSA-2016:2584 SECTRACK:1036273 SMASH Issue 170727 SMASH Issue 170728 UBUNTU:CVE-2016-6197 UBUNTU:CVE-2016-6198 UBUNTU:USN-3070-1 UBUNTU:USN-3070-2 UBUNTU:USN-3070-3 UBUNTU:USN-3070-4 bnc#988708 rh#1355650 rh#1355654 |
CVE-2016-6301 | busybox:Released | moderate | () | BID:92277 BUGTRAQ:20190613 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series BUGTRAQ:20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X CONFIRM:git.busybox.net:CVE-2016-6301 CVE-2016-6301 FULLDISC:20190612 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series FULLDISC:20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X FULLDISC:20200313 SEC Consult SA-20200312-0 :: Authenticated Command Injection in Phoenix Contact TC Router & TC Cloud Client FULLDISC:20200827 SEC Consult SA-20200827-0 :: Multiple Vulnerabilities in ZTE mobile Hotspot MS910S GENTOO:GLSA-201701-05 MISC:packetstormsecurity.com:CVE-2010-0296 MISC:packetstormsecurity.com:CVE-2015-9261 MLIST:[oss-security] 20160803 CVE-2016-6301: busybox: NTP server denial of service flaw OSS:2016/Q3/240 RH:CVE-2016-6301 SMASH Issue 171602 UBUNTU:CVE-2016-6301 bnc#991940 rh#1363710 |
CVE-2016-6327 | kernel-source-rt:Already fixed | moderate | () | BID:92549 CONFIRM:git.kernel.org:CVE-2016-6327 CONFIRM:github.com:CVE-2016-6327 CONFIRM:www.kernel.org:CVE-2016-9685 CVE-2016-6327 D:CVE-2016-6327 D:CVE-2022-2590 MISC:git.kernel.org:MLIST:[oss-security] 20160819 Re: CVE-2016-6327 | Linux kernel crash in infiniband subsystem. MLIST:[oss-security] 20160819 Re: CVE-2016-6327 | Linux kernel crash in infiniband subsystem. OSS:2016/Q3/334 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 Oracle:CVE-2016-5195 RH:CVE-2016-6327 RHSA-2016:2574 RHSA-2016:2584 SMASH Issue 172033 UBUNTU:CVE-2016-6327 bnc#994748 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b rh#1354525 rh#1384344 rh#2116175 |
CVE-2016-6480 | kernel-source-rt:Not affected | moderate | 5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | BID:92214 BUGTRAQ:20160801 [CVE-2016-6480] Double-Fetch Vulnerability in Linux-4.5/drivers/scsi/aacraid/commctrl.c CVE-2016-6480 D:CVE-2022-2590 DSA-3659 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 RH:CVE-2016-6480 RHSA-2016:2574 RHSA-2016:2584 RHSA-2017:0817 SMASH Issue 171543 SMASH Issue 171556 SUSE:SUSE-SU-2016:2230 UBUNTU:CVE-2016-6480 bnc#991608 bnc#991667 bnc#992568 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b linux.git:commit:fa00c437eef8dc2e7b25f8cd868cfa405fcc2bb3 rh#1362466 rh#1384344 rh#2116175 |
CVE-2016-6786 | kernel-source-rt:Not affected | moderate | () | BID:94679 BID:96264 CONFIRM:git.kernel.org:CVE-2016-6787 CONFIRM:git.kernel.org:CVE-2017-6001 CONFIRM:github.com:CVE-2016-6787 CONFIRM:github.com:CVE-2017-6001 CONFIRM:source.android.com:CVE-2016-9120 CONFIRM:source.android.com:CVE-2017-6001 CONFIRM:www.kernel.org:CVE-2017-6001 CVE-2016-6786 CVE-2016-6787 CVE-2017-6001 D:CVE-2016-6787 D:CVE-2017-6001 DSA-3791 MLIST:[oss-security] 20170216 Linux: CVE-2017-6001: Incomplete fix for CVE-2016-6786: perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race OSS:2017/Q1/446 RH:CVE-2016-6786 RH:CVE-2016-6787 RH:CVE-2017-6001 RHSA-2017:1842 RHSA-2017:2077 RHSA-2017:2669 RHSA-2018:1854 SMASH Issue 177440 SMASH Issue 177441 UBUNTU:CVE-2016-6786 UBUNTU:CVE-2016-6787 UBUNTU:CVE-2017-6001 bnc#1015160 rh#1403842 rh#1422825 |
CVE-2016-6787 | kernel-source-rt:Not affected | moderate | () | BID:94679 BID:96264 CONFIRM:git.kernel.org:CVE-2016-6787 CONFIRM:git.kernel.org:CVE-2017-6001 CONFIRM:github.com:CVE-2016-6787 CONFIRM:github.com:CVE-2017-6001 CONFIRM:source.android.com:CVE-2016-9120 CONFIRM:source.android.com:CVE-2017-6001 CONFIRM:www.kernel.org:CVE-2017-6001 CVE-2016-6786 CVE-2016-6787 CVE-2017-6001 D:CVE-2016-6787 D:CVE-2017-6001 DSA-3791 MLIST:[oss-security] 20170216 Linux: CVE-2017-6001: Incomplete fix for CVE-2016-6786: perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race OSS:2017/Q1/446 RH:CVE-2016-6786 RH:CVE-2016-6787 RH:CVE-2017-6001 RHSA-2017:1842 RHSA-2017:2077 RHSA-2017:2669 RHSA-2018:1854 SMASH Issue 177440 UBUNTU:CVE-2016-6786 UBUNTU:CVE-2016-6787 UBUNTU:CVE-2017-6001 bnc#1015160 rh#1403842 rh#1422825 |
CVE-2016-6828 | kernel-source-rt:Not affected | moderate | () | BID:92452 CONFIRM:git.kernel.org:CVE-2016-6828 CONFIRM:github.com:CVE-2016-6828 CONFIRM:source.android.com:CVE-2016-6828 CONFIRM:www.kernel.org:CVE-2016-9178 CVE-2016-6828 D:CVE-2016-6828 D:CVE-2022-2590 DSA-3659 MISC:marcograss.github.io:CVE-2016-6828 MLIST:[oss-security] 20160815 Linux tcp_xmit_retransmit_queue use after free on 4.8-rc1 / master OSS:2016/Q3/312 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 RH:CVE-2016-6828 RHSA-2017:0036 RHSA-2017:0086 RHSA-2017:0091 RHSA-2017:0113 SMASH Issue 171990 UBUNTU:CVE-2016-6828 bnc#994296 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b rh#1367091 rh#1384344 rh#2116175 |
CVE-2016-7039 | kernel-source-rt:Already fixed | important | () | BID:93476 BID:93562 CONFIRM:bto.bluecoat.com:CVE-2016-9555 CONFIRM:git.kernel.org:CVE-2016-8666 CONFIRM:github.com:CVE-2016-8666 CONFIRM:patchwork.ozlabs.org:CVE-2016-7039 CONFIRM:www.oracle.com:CVE-2016-6304 CONFIRM:www.oracle.com:CVE-2016-7039 CVE-2016-7039 CVE-2016-8666 D:CVE-2016-7039 D:CVE-2016-8666 D:CVE-2022-2590 MLIST:[oss-security] 20161010 CVE-2016-7039 Kernel: net: unbounded recursion in the vlan GRO processing MLIST:[oss-security] 20161013 CVE Request: another recursion in GRE OSS:2016/Q4/121 OSS:2016/Q4/125 OSS:2016/Q4/91 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 Oracle:CVE-2016-5195 RH:CVE-2016-7039 RH:CVE-2016-8666 RHSA-2016:2047 RHSA-2016:2107 RHSA-2016:2110 RHSA-2017:0004 RHSA-2017:0372 SMASH Issue 172974 SMASH Issue 172975 SMASH Issue 173374 UBUNTU:CVE-2016-7039 UBUNTU:CVE-2016-8666 bnc#1001486 bnc#1001487 bnc#1003964 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b linux.git:commit:fcd91dd449867c6bfe56a81cabba76b829fd05cd rh#1375944 rh#1384344 rh#1384991 rh#2116175 |
CVE-2016-7042 | kernel-source-rt:Already fixed | moderate | () | BID:93544 CVE-2016-7042 D:CVE-2016-7042 D:CVE-2022-2590 DSA-3696 MLIST:[oss-security] 20161013 kernel: Stack corruption while reading /proc/keys (CVE-2016-7042) OSS:2016/Q4/115 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 RH:CVE-2016-7042 RHSA-2017:0817 RHSA-2017:1842 RHSA-2017:2077 RHSA-2017:2669 SMASH Issue 173566 UBUNTU:CVE-2016-7042 bdo#831014 bnc#1004517 linux.git:commit:03dab869b7b239c4e013ec82aea22e181e441cfc linux.git:commit:43937003de5b677781b2fe4c871d628ab00cc341 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b rh#1373499 rh#1373966 rh#1384344 rh#2116175 |
CVE-2016-7118 | kernel-source-rt:Analysis | moderate | () | BID:92697 CVE-2016-7118 D:CVE-2016-7118 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MLIST:[oss-security] 20160831 CVE request: Kernel Oops when issuing fcntl on an AUFS directory MLIST:[oss-security] 20160831 Re: CVE request: Kernel Oops when issuing fcntl on an AUFS directory OSS:2016/Q3/397 SMASH Issue 172266 UBUNTU:CVE-2016-7118 bnc#996563 |
CVE-2016-7415 | icu:Not affected | moderate | () | BID:93022 CONFIRM:bugs.php.net:CVE-2016-7416 CVE-2016-7415 D:CVE-2016-7415 DSA-3725 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 OSS:2016/Q3/518 RH:CVE-2016-7415 SMASH Issue 172665 UBUNTU:CVE-2016-7415 bdo#838694 bnc#999822 rh#1377361 |
CVE-2016-7912 | kernel-source-rt:Unsupported | moderate | () | BID:94197 CONFIRM:git.kernel.org:CVE-2016-7912 CONFIRM:github.com:CVE-2016-7912 CONFIRM:source.android.com:CVE-2016-7917 CONFIRM:www.kernel.org:CVE-2016-7914 CVE-2016-7912 D:CVE-2016-7912 RH:CVE-2016-7912 SMASH Issue 176397 UBUNTU:CVE-2016-7912 bnc#1010480 bnc#1010481 rh#1403747 |
CVE-2016-7913 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) | BID:94201 CONFIRM:git.kernel.org:CVE-2016-7913 CONFIRM:github.com:CVE-2016-7913 CONFIRM:source.android.com:CVE-2016-7917 CVE-2016-7913 D:CVE-2016-7913 RH:CVE-2016-7913 RHSA-2018:0676 RHSA-2018:1062 RHSA-2019:1170 RHSA-2019:1190 SMASH Issue 176398 UBUNTU:CVE-2016-7913 UBUNTU:USN-3798-1 UBUNTU:USN-3798-2 bnc#1010478 rh#1402885 |
CVE-2016-7915 | kernel-source-rt:Already fixed | moderate | () | CONFIRM:git.kernel.org:CVE-2016-7915 CONFIRM:github.com:CVE-2016-7915 CVE-2016-7915 D:CVE-2016-7915 DSA-5378 MISC:git.kernel.org:OSS:2014/03/05/6 OSS:2014/03/05/6 OSS:2022/11/10/2 OSS:2022/12/27/3 OSS:2022/Q4/132 OSS:2022/Q4/135 OSS:2022/Q4/244 Oracle:CVE-2017-0861 Oracle:CVE-2017-5715 RH:CVE-2016-7915 RHSA-2016:2574 SMASH Issue 176400 UBUNTU:CVE-2016-7915 bdo#1033297 bnc#1010470 rh#1243852 rh#1404733 rh#1495089 rh#1498016 rh#1519780 rh#1539599 rh#2061700 rh#2119127 |
CVE-2016-8630 | kernel-source-rt:Not affected | moderate | 6.2 (CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H) | BID:94459 CONFIRM:git.kernel.org:CVE-2016-8630 CONFIRM:www.kernel.org:CVE-2016-9313 CVE-2016-8630 MLIST:[oss-security] 20161122 CVE-2016-8630 kernel: kvm: x86: NULL pointer dereference duringinstruction decode OSS:2016/Q4/489 RH:CVE-2016-8630 RHSA-2017:0386 RHSA-2017:0387 SMASH Issue 175219 UBUNTU:CVE-2016-8630 bnc#1009222 linux.git:commit:66cecb67894b35c6af17eb4e6b6aaec6c8957c2e linux.git:commit:d9092f52d7e61dd1557f2db2400ddb430e85937e rh#1393350 |
CVE-2016-8632 | kernel-source-rt:Not affected | moderate | () | BID:94211 CVE-2016-8632 MLIST:[netdev] 20161018 [PATCH net] tipc: Guard against tiny MTU in tipc_msg_build() MLIST:[oss-security] 20161108 CVE-2016-8632 -- Linux kernel: tipc_msg_build() doesn't validate MTU that can trigger heap overflow OSS:2016/Q4/359 OSS:2016/Q4/395 Oracle:CVE-2016-5244 RH:CVE-2016-8632 SMASH Issue 174934 SMASH Issue 177071 UBUNTU:CVE-2016-8632 bnc#1008831 bnc#1012852 https://www.mail-archive.com/netdev%40vger.kernel.org/msg133205.html linux.git:commit:3de81b758853f0b29c61e246679d20b513c4cfec rh#1390832 |
CVE-2016-8633 | kernel-source-rt:Not affected | moderate | 6.8 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | BID:94149 CONFIRM:git.kernel.org:CVE-2016-8633 CONFIRM:github.com:CVE-2016-8633 CONFIRM:www.kernel.org:CVE-2016-9313 CVE-2016-8633 MISC:eyalitkin.wordpress.com:CVE-2016-8633 MISC:eyalitkin.wordpress.com:MLIST:[oss-security] 20161106 Re: [engineering.redhat.com #426293] CVE Request - firewire driver RCE - linux 4.8 MLIST:[oss-security] 20161106 Re: [engineering.redhat.com #426293] CVE Request - firewire driver RCE - linux 4.8 Oracle:CVE-2016-5244 RH:CVE-2016-8633 RHSA-2018:0676 RHSA-2018:1062 RHSA-2019:1170 RHSA-2019:1190 SMASH Issue 174961 UBUNTU:CVE-2016-8633 bnc#1008833 rh#1391490 |
CVE-2016-8636 | kernel-source-rt:Ignore | important | () | BID:96189 CONFIRM:git.kernel.org:CVE-2016-8636 CONFIRM:github.com:CVE-2016-8636 CONFIRM:www.kernel.org:CVE-2016-8636 CVE-2016-8636 MISC:eyalitkin.wordpress.com:CVE-2016-8636 MLIST:[oss-security] 20170211 CVE publication request - CVE 2016-8636 RH:CVE-2016-8636 SMASH Issue 180351 UBUNTU:CVE-2016-8636 bnc#1024908 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1421981 rh#1575472 rh#1575866 rh#1667782 rh#1701224 rh#1701842 rh#1890354 |
CVE-2016-8645 | kernel-source-rt:Not affected | moderate | () | BID:94264 CONFIRM:git.kernel.org:CVE-2016-8645 CONFIRM:github.com:CVE-2016-8645 CONFIRM:www.kernel.org:CVE-2016-8645 CVE-2016-8645 D:CVE-2016-8645 MLIST:[oss-security] 20161111 CVE-2016-8645: linux kernel: net: a BUG() statement can be hit in net/ipv4/tcp_input.c MLIST:[oss-security] 20161130 Re: CVE-2016-8645: linux kernel: net: a BUG() statement can be hit in net/ipv4/tcp_input.c OSS:2016/Q4/397 RH:CVE-2016-8645 RHSA-2017:1842 RHSA-2017:2077 RHSA-2017:2669 SECTRACK:1037285 SMASH Issue 176287 SMASH Issue 177657 UBUNTU:CVE-2016-8645 bnc#1009969 rh#1393904 |
CVE-2016-8646 | kernel-source-rt:Not affected | moderate | () | BID:94309 CONFIRM:git.kernel.org:CVE-2016-8646 CONFIRM:github.com:CVE-2016-8646 CONFIRM:www.kernel.org:CVE-2016-8646 CVE-2016-8646 D:CVE-2016-8646 MISC:git.kernel.org:MLIST:[oss-security] 20161115 CVE-2016-8646: linux kernel - oops in shash_async_export() MLIST:[oss-security] 20161115 CVE-2016-8646: linux kernel - oops in shash_async_export() OSS:2016/Q4/429 Oracle:CVE-2016-5244 RH:CVE-2016-8646 RHSA-2017:1297 RHSA-2017:1298 RHSA-2017:1308 SMASH Issue 176331 UBUNTU:CVE-2016-8646 bnc#1010150 rh#1388821 |
CVE-2016-8650 | kernel-source-rt:Not affected | important | 8.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H) | BID:94532 CONFIRM:git.kernel.org:CVE-2016-8650 CVE-2016-8650 D:CVE-2016-8650 FULLDISC:20161115 OS-S 2016-21 - Local DoS: Linux Kernel Nullpointer Dereference via keyctl L3:46825 MISC:source.android.com:CVE-2017-0537 MLIST:[oss-security] 20161125 Linux kernel: CVE-2016-8650 : Local denial of service with in key subsystem OSS:2016/Q4/523 RH:CVE-2016-8650 RHSA-2017:0931 RHSA-2017:0932 RHSA-2017:0933 RHSA-2018:1854 SECTRACK:1037968 SMASH Issue 176713 UBUNTU:CVE-2016-8650 bnc#1011768 bnc#1011820 linux.git:commit:86b01b5419fd303a3699b2ce6f4b9bfbdaa4ed37 linux.git:commit:f5527fffff3f002b0a6b376163613b82f69de073 rh#1395187 |
CVE-2016-8655 | kernel-source-rt:Ignore | moderate | () | BID:94692 CONFIRM:git.kernel.org:CVE-2016-8655 CONFIRM:github.com:CVE-2016-8655 CVE-2016-8655 D:CVE-2016-8655 EXPLOIT-DB:40871 EXPLOIT-DB:44696 MISC:git.kernel.org:MLIST:[oss-security] 20161206 CVE-2016-8655 Linux af_packet.c race condition (local root) MISC:github.com:MLIST:[oss-security] 20161206 CVE-2016-8655 Linux af_packet.c race condition (local root) MISC:packetstormsecurity.com:CVE-2016-8655 MISC:packetstormsecurity.com:CVE-2017-6895 MISC:patchwork.ozlabs.org MISC:source.android.com:CVE-2017-0537 MLIST:[oss-security] 20161206 CVE-2016-8655 Linux af_packet.c race condition (local root) OSS:2016/Q4/607 OSS:2016/Q4/664 OSS:2017/Q3/182 OSS:2017/Q3/279 RH:CVE-2016-8655 RHSA-2017:0386 RHSA-2017:0387 RHSA-2017:0402 SECTRACK:1037403 SECTRACK:1037968 SMASH Issue 176931 SMASH Issue 177072 SUSE:SUSE-SU-2016:3096 SUSE:SUSE-SU-2016:3113 SUSE:SUSE-SU-2016:3116 SUSE:SUSE-SU-2016:3117 SUSE:SUSE-SU-2016:3169 SUSE:SUSE-SU-2016:3183 SUSE:SUSE-SU-2016:3197 SUSE:SUSE-SU-2016:3205 SUSE:SUSE-SU-2016:3206 SUSE:SUSE-SU-2016:3247 UBUNTU:CVE-2016-8655 UBUNTU:USN-3149-1 UBUNTU:USN-3149-2 UBUNTU:USN-3150-1 UBUNTU:USN-3150-2 UBUNTU:USN-3151-1 UBUNTU:USN-3151-2 UBUNTU:USN-3151-3 UBUNTU:USN-3151-4 UBUNTU:USN-3152-1 UBUNTU:USN-3152-2 bnc#1012754 bnc#1013822 rh#1400019 |
CVE-2016-8658 | kernel-source-rt:Already fixed | moderate | () | BID:93541 CONFIRM:git.kernel.org:CVE-2016-8658 CONFIRM:github.com:CVE-2016-8658 CVE-2016-8658 D:CVE-2016-8658 D:CVE-2022-2590 MISC:git.kernel.org:MLIST:[oss-security] 20161013 Re: CVE Request -- Broadcom Wifi Driver Brcmfmac brcmf_cfg80211_start_ap Buffer Overflow MISC:patchwork.kernel.org:MLIST:[oss-security] 20161013 Re: CVE Request -- Broadcom Wifi Driver Brcmfmac brcmf_cfg80211_start_ap Buffer Overflow MLIST:[oss-security] 20161013 Re: CVE Request -- Broadcom Wifi Driver Brcmfmac brcmf_cfg80211_start_ap Buffer Overflow OSS:2016/Q4/113 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 Oracle:CVE-2016-5195 RH:CVE-2016-8658 SMASH Issue 173544 UBUNTU:CVE-2016-8658 bnc#1004462 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b rh#1384344 rh#1384403 rh#2116175 |
CVE-2016-8666 | kernel-source-rt:Already fixed | important | () | BID:93476 BID:93562 CONFIRM:bto.bluecoat.com:CVE-2016-9555 CONFIRM:git.kernel.org:CVE-2016-8666 CONFIRM:github.com:CVE-2016-8666 CONFIRM:patchwork.ozlabs.org:CVE-2016-7039 CONFIRM:www.oracle.com:CVE-2016-6304 CONFIRM:www.oracle.com:CVE-2016-7039 CVE-2016-7039 CVE-2016-8666 D:CVE-2016-7039 D:CVE-2016-8666 D:CVE-2022-2590 MLIST:[oss-security] 20161010 CVE-2016-7039 Kernel: net: unbounded recursion in the vlan GRO processing MLIST:[oss-security] 20161013 CVE Request: another recursion in GRE OSS:2016/Q4/121 OSS:2016/Q4/125 OSS:2016/Q4/91 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 Oracle:CVE-2016-5195 RH:CVE-2016-7039 RH:CVE-2016-8666 RHSA-2016:2047 RHSA-2016:2107 RHSA-2016:2110 RHSA-2017:0004 RHSA-2017:0372 SMASH Issue 172974 SMASH Issue 173594 UBUNTU:CVE-2016-7039 UBUNTU:CVE-2016-8666 bnc#1001486 bnc#1003964 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b linux.git:commit:fcd91dd449867c6bfe56a81cabba76b829fd05cd rh#1375944 rh#1384344 rh#1384991 rh#2116175 |
CVE-2016-9191 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | BID:94129 CONFIRM:git.kernel.org:CVE-2016-9191 CONFIRM:support.hpe.com:CVE-2016-9191 CVE-2016-9191 D:CVE-2016-9191 DSA-3791 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MLIST:[oss-security] 20161105 Re: CVE request: linux kernel - local DoS with cgroup offline code OSS:2016/Q4/346 Oracle:CVE-2017-6074 RH:CVE-2016-9191 SMASH Issue 174733 UBUNTU:CVE-2016-9191 bnc#1008842 linux.git:commit:93362fa47fe98b62e4a34ab408c4a418432e7939 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1392439 rh#1420236 rh#1435719 rh#1462147 rh#1462158 |
CVE-2016-9555 | kernel-source-rt:Not affected | important | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | BID:94479 CONFIRM:bto.bluecoat.com:CVE-2016-9555 CONFIRM:git.kernel.org:CVE-2016-9555 CONFIRM:github.com:CVE-2016-9555 CONFIRM:groups.google.com:CVE-2016-9555 CONFIRM:www.kernel.org:CVE-2016-9555 CVE-2016-9555 D:CVE-2016-9555 MLIST:[oss-security] 20161122 CVE Request: Linux: net/sctp: slab-out-of-bounds in sctp_sf_ootb OSS:2016/Q4/509 Oracle:CVE-2016-5244 RH:CVE-2016-9555 RHSA-2017:0086 RHSA-2017:0091 RHSA-2017:0113 RHSA-2017:0307 SECTRACK:1037339 SMASH Issue 176677 SMASH Issue 176690 SMASH Issue 177073 SUSE:SUSE-SU-2016:3096 SUSE:SUSE-SU-2016:3113 SUSE:SUSE-SU-2016:3116 SUSE:SUSE-SU-2016:3117 SUSE:SUSE-SU-2016:3169 SUSE:SUSE-SU-2016:3183 SUSE:SUSE-SU-2016:3197 SUSE:SUSE-SU-2016:3205 SUSE:SUSE-SU-2016:3206 SUSE:SUSE-SU-2016:3247 UBUNTU:CVE-2016-9555 bnc#1011685 bnc#1012183 rh#1397930 |
CVE-2016-9576 | kernel-source-rt:Already fixed | important | () | BID:94821 BID:95169 CONFIRM:git.kernel.org:CVE-2016-10088 CONFIRM:git.kernel.org:CVE-2016-9576 CONFIRM:github.com:CVE-2016-10088 CONFIRM:github.com:CVE-2016-10167 CONFIRM:github.com:CVE-2016-10190 CONFIRM:github.com:CVE-2016-9576 CONFIRM:www.kernel.org:CVE-2016-9793 CVE-2016-10088 CVE-2016-9576 D:CVE-2016-10088 D:CVE-2016-9576 L3:47394 MISC:anonscm.debian.org:MLIST:[oss-security] 20161230 Re: Linux Kernel use-after-free in SCSI generic device interface MLIST:[oss-security] 20161209 Linux Kernel use-after-free in SCSI generic device interface MLIST:[oss-security] 20161230 Re: Linux Kernel use-after-free in SCSI generic device interface OSS:2016/Q4/644 OSS:2016/Q4/779 OSS:2016/Q4/781 Oracle:CVE-2016-5244 RH:CVE-2016-10088 RH:CVE-2016-9576 RHSA-2017:0817 RHSA-2017:1842 RHSA-2017:2077 RHSA-2017:2669 SECTRACK:1037538 SMASH Issue 177214 SMASH Issue 177216 SUSE:SUSE-SU-2016:3146 SUSE:SUSE-SU-2016:3188 SUSE:SUSE-SU-2016:3203 SUSE:SUSE-SU-2016:3217 SUSE:SUSE-SU-2016:3248 SUSE:SUSE-SU-2016:3252 SUSE:openSUSE-SU-2016:3085 SUSE:openSUSE-SU-2016:3086 SUSE:openSUSE-SU-2016:3118 UBUNTU:CVE-2016-10088 UBUNTU:CVE-2016-9576 bnc#1013604 bnc#1014271 bnc#1017710 bnc#1019079 bnc#1019668 bnc#1024055 rh#1403145 rh#1412210 |
CVE-2016-9588 | kernel-source-rt:Not affected | moderate | 3.5 (CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | BID:94933 CONFIRM:git.kernel.org:CVE-2016-9588 CONFIRM:github.com:CVE-2016-9588 CVE-2016-9588 D:CVE-2016-9588 DSA-3804 MLIST:[oss-security] 20161215 CVE-2016-9588 Kernel: kvm: nVMX: uncaught software exceptions in L1 guest lead to DoS OSS:2016/Q4/684 Oracle:CVE-2017-6074 RH:CVE-2016-9588 RHSA-2017:1842 RHSA-2017:2077 SMASH Issue 177683 UBUNTU:CVE-2016-9588 UBUNTU:USN-3822-1 UBUNTU:USN-3822-2 bnc#1015703 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1404924 rh#1420236 rh#1435719 |
CVE-2016-9594 | curl:Not affected | important | () | BID:95094 CONFIRM:curl.haxx.se:CVE-2016-9594 CONFIRM:www.tenable.com:CVE-2017-3732 CVE-2016-9594 GENTOO:GLSA-201701-47 MISC:bugzilla.redhat.com:CVE-2016-9594 MISC:curl.haxx.se MISC:github.com OSS:2016/Q4/743 RH:CVE-2016-9594 SECTRACK:1037528 SMASH Issue 178016 UBUNTU:CVE-2016-9594 bnc#1016738 bnc#1017161 rh#1408385 |
CVE-2016-9604 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N) | BID:102135 CONFIRM:bugzilla.novell.com:CVE-2016-9604 CONFIRM:bugzilla.redhat.com:CVE-2016-9604 CONFIRM:git.kernel.org:CVE-2016-9604 CVE-2016-9604 MISC:git.kernel.org:OSS:2020/Q1/69 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 Oracle:CVE-2017-6074 RH:CVE-2016-9604 RHSA-2017:1842 RHSA-2017:2077 RHSA-2017:2669 SMASH Issue 184071 UBUNTU:CVE-2016-9604 bnc#1035576 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 linux.git:commit:ee8f844e3c5a73b999edf733df1c529d6503ec2f linux.git:commit:f205b5dc1c9e62237ac6e21642724d8cbc85f7ee rh#1389433 rh#1420236 rh#1435719 rh#1439087 rh#1462147 rh#1462158 rh#1481178 |
CVE-2016-9754 | kernel-source-rt:Ignore | moderate | () | BID:95278 CONFIRM:git.kernel.org:CVE-2016-9754 CONFIRM:github.com:CVE-2016-9754 CONFIRM:source.android.com:CVE-2017-0404 CONFIRM:www.kernel.org:CVE-2016-9754 CVE-2016-9754 D:CVE-2016-9754 RH:CVE-2016-9754 SMASH Issue 178262 UBUNTU:CVE-2016-9754 bnc#1018342 bnc#1020787 rh#1410370 |
CVE-2016-9755 | kernel-source-rt:Unsupported | important | () | BID:94626 CONFIRM:git.kernel.org:CVE-2016-9755 CONFIRM:github.com:CVE-2016-9755 CONFIRM:groups.google.com:CVE-2016-9755 CVE-2016-9755 D:CVE-2016-9755 MLIST:[netdev] 20161130 [PATCH 10/11] netfilter: ipv6: nf_defrag: drop mangled skb on ream error MLIST:[oss-security] 20161201 CVE Request: Linux: net: out-of-bounds due do a signedness issue when defragging ipv6 OSS:2016/Q4/560 RH:CVE-2016-9755 SMASH Issue 177015 UBUNTU:CVE-2016-9755 bnc#1013060 rh#1400904 |
CVE-2016-9793 | kernel-source-rt:Ignore | moderate | () | BID:94655 CONFIRM:git.kernel.org:CVE-2016-9793 CONFIRM:github.com:CVE-2012-6704 CONFIRM:github.com:CVE-2016-9793 CONFIRM:www.kernel.org:CVE-2016-9793 CVE-2016-9793 D:CVE-2016-9793 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:github.com:CVE-2016-9793 MISC:source.android.com:CVE-2017-0537 MLIST:[oss-security] 20161202 Re: CVE Request: Linux: signed overflows for SO_{SND|RCV}BUFFORCE OSS:2016/Q4/574 Oracle:CVE-2016-5244 RH:CVE-2016-9793 RHSA-2017:0931 RHSA-2017:0932 RHSA-2017:0933 SECTRACK:1037968 SMASH Issue 177084 SMASH Issue 177658 UBUNTU:CVE-2016-9793 bnc#1013531 rh#1402013 rh#1402024 |
CVE-2016-9794 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | BID:94654 CONFIRM:git.kernel.org:CVE-2016-9794 CONFIRM:github.com:CVE-2016-9794 CONFIRM:patchwork.kernel.org:CVE-2016-9794 CONFIRM:source.android.com:CVE-2017-0635 CVE-2016-9794 D:CVE-2016-9794 MLIST:[oss-security] 20161203 CVE request: -- Linux kernel: ALSA: use-after-free in,kill_fasync OSS:2016/Q4/576 RH:CVE-2016-9794 RHSA-2016:2574 SMASH Issue 177086 SMASH Issue 177087 SUSE:SUSE-SU-2016:3146 SUSE:SUSE-SU-2016:3188 SUSE:SUSE-SU-2016:3203 SUSE:SUSE-SU-2016:3217 SUSE:SUSE-SU-2016:3248 SUSE:SUSE-SU-2016:3252 SUSE:openSUSE-SU-2016:3118 UBUNTU:CVE-2016-9794 bnc#1013533 bnc#1013543 rh#1401494 |
CVE-2016-9919 | kernel-source-rt:Ignore | moderate | () | BID:94824 CONFIRM:git.kernel.org:CVE-2016-9919 CONFIRM:github.com:CVE-2016-9919 CVE-2016-9919 D:CVE-2016-9919 MISC:bugzilla.kernel.org:MLIST:[oss-security] 20161208 CVE request: Linux panic on fragemented IPv6 traffic (icmp6_send) MISC:git.kernel.org:MLIST:[oss-security] 20161208 CVE request: Linux panic on fragemented IPv6 traffic (icmp6_send) MLIST:[oss-security] 20161208 CVE request: Linux panic on fragemented IPv6 traffic (icmp6_send) OSS:2016/Q4/641 RH:CVE-2016-9919 SMASH Issue 177310 SMASH Issue 177659 UBUNTU:CVE-2016-9919 bnc#1014701 bnc#1014743 rh#1403260 |
CVE-2017-1000251 | kernel-source-rt:Not affected | important | 8.8 (CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | BID:100809 CERT-VN:VU#240311 CONFIRM:access.redhat.com:CVE-2017-1000251 CONFIRM:nvidia.custhelp.com:CVE-2017-6273 CONFIRM:www.synology.com:CVE-2017-1000251 CVE-2017-1000251 DSA-3981 DSA-5378 EXPLOIT-DB:42762 MISC:git.kernel.org MISC:git.kernel.org:OSS:2020/Q1/69 MISC:github.com:CVE-2017-1000251 MISC:www.armis.com:CVE-2017-14315 OSS:2017/Q3/439 OSS:2017/Q3/558 OSS:2017/Q4/357 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-17558 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2017-5754 RH:CVE-2017-1000251 RHSA-2017:2679 RHSA-2017:2680 RHSA-2017:2681 RHSA-2017:2682 RHSA-2017:2683 RHSA-2017:2704 RHSA-2017:2705 RHSA-2017:2706 RHSA-2017:2707 RHSA-2017:2731 RHSA-2017:2732 SECTRACK:1039373 SMASH Issue 191511 UBUNTU:CVE-2017-1000251 bdo#1033297 bdo#866511 bdo#875881 bnc#1057389 bnc#1057950 rh#1462147 rh#1462158 rh#1481178 rh#1489716 rh#1519780 rh#2061700 rh#2119127 |
CVE-2017-1000252 | kernel-source-rt:Already fixed | moderate | 4.7 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | BID:101022 CONFIRM:git.kernel.org:CVE-2017-1000252 CONFIRM:github.com:CVE-2017-1000252 CONFIRM:marc.info CONFIRM:marc.info:CVE-2017-1000252 CONFIRM:www.openwall.com CVE-2017-1000252 D:CVE-2017-1000252 DSA-3981 MISC:git.kernel.org:OSS:2020/Q1/69 MISC:security-tracker.debian.org OSS:2017/Q3/465 OSS:2017/Q3/562 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 RH:CVE-2017-1000252 RHSA-2018:0676 RHSA-2018:1062 RHSA-2018:1130 SMASH Issue 191713 UBUNTU:CVE-2017-1000252 bdo#866511 bdo#875881 bnc#1058038 linux.git:commit:3a8b0677fc6180a467e26cc32ce6b0c09a32f9bb rh#1462147 rh#1462158 rh#1481178 rh#1490781 |
CVE-2017-1000365 | kernel-source-rt:Already fixed | low | 2.9 (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N) | BID:99156 CVE-2017-1000365 DSA-3927 DSA-3945 MISC:git.kernel.org MISC:git.kernel.org:OSS:2020/Q1/69 MISC:www.qualys.com:CVE-2017-1085 OSS:2017/Q2/500 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 Oracle:CVE-2017-6074 RH:CVE-2017-1000365 RHSA-2010:0631 RHSA-2010:0660 RHSA-2010:0661 RHSA-2010:0670 RHSA-2010:0676 RHSA-2010:0677 RHSA-2010:0882 RHSA-2020:1524 SMASH Issue 185357 UBUNTU:CVE-2017-1000365 bnc#1039354 linux.git:commit:98da7d08850fb8bdeb395d6368ed15753304aa0c linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1435719 rh#1439087 rh#1462147 rh#1462158 rh#1481178 rh#606611 |
CVE-2017-1000370 | kernel-source-rt:Not affected | low | 2.9 (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N) | BID:99131 BID:99149 CVE-2017-1000370 CVE-2017-1000371 DSA-3981 EXPLOIT-DB:42273 EXPLOIT-DB:42274 EXPLOIT-DB:42276 MISC:git.kernel.org MISC:git.kernel.org:OSS:2020/Q1/69 MISC:www.qualys.com:CVE-2017-1085 OSS:2017/Q2/500 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 Oracle:CVE-2017-6074 RH:CVE-2017-1000370 RH:CVE-2017-1000371 RHSA-2010:0631 RHSA-2010:0660 RHSA-2010:0661 RHSA-2010:0670 RHSA-2010:0676 RHSA-2010:0677 RHSA-2010:0882 RHSA-2020:1524 SMASH Issue 185356 UBUNTU:CVE-2017-1000370 UBUNTU:CVE-2017-1000371 bdo#866511 bdo#875881 bnc#1039349 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 linux.git:commit:eab09532d40090698b05a07c1c87f39fdbc5fab5 rh#1435719 rh#1462147 rh#1462153 rh#1462158 rh#1481178 rh#606611 |
CVE-2017-1000371 | kernel-source-rt:Not affected | low | 2.9 (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N) | BID:99131 BID:99149 CVE-2017-1000370 CVE-2017-1000371 DSA-3981 EXPLOIT-DB:42273 EXPLOIT-DB:42274 EXPLOIT-DB:42276 MISC:git.kernel.org MISC:git.kernel.org:OSS:2020/Q1/69 MISC:www.qualys.com:CVE-2017-1085 OSS:2017/Q2/500 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 Oracle:CVE-2017-6074 RH:CVE-2017-1000370 RH:CVE-2017-1000371 RHSA-2010:0631 RHSA-2010:0660 RHSA-2010:0661 RHSA-2010:0670 RHSA-2010:0676 RHSA-2010:0677 RHSA-2010:0882 RHSA-2020:1524 SMASH Issue 185356 UBUNTU:CVE-2017-1000370 UBUNTU:CVE-2017-1000371 bdo#866511 bdo#875881 bnc#1039349 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 linux.git:commit:eab09532d40090698b05a07c1c87f39fdbc5fab5 rh#1435719 rh#1462147 rh#1462153 rh#1462158 rh#1481178 rh#606611 |
CVE-2017-10661 | kernel-source-rt:Not affected | important | 7.4 (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | BID:100215 CONFIRM:bugzilla.redhat.com:CVE-2018-10880 CONFIRM:bugzilla.redhat.com:CVE-2018-10882 CONFIRM:git.kernel.org:CVE-2017-10661 CONFIRM:github.com:CVE-2017-10661 CONFIRM:source.android.com:CVE-2017-10663 CONFIRM:www.kernel.org:CVE-2017-10661 CVE-2017-10661 CVE-2018-10880 CVE-2018-10882 CVE-2018-13405 D:CVE-2017-10661 DSA-3981 EXPLOIT-DB:43345 MISC:git.kernel.org:OSS:2020/Q1/69 OSS:2017/Q3/526 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 Oracle:CVE-2017-6074 RH:CVE-2017-10661 RHSA-2018:2948 RHSA-2018:3083 RHSA-2018:3096 RHSA-2019:4057 RHSA-2019:4058 RHSA-2020:0036 SMASH Issue 190204 UBUNTU:CVE-2017-10661 bdo#866511 bdo#875881 bnc#1053152 bnc#1053153 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1435719 rh#1462147 rh#1462158 rh#1481136 rh#1481178 rh#1596812 rh#1596842 rh#1599161 rh#2027239 rh#2044863 |
CVE-2017-10662 | kernel-source-rt:Unsupported | important | () | BID:100215 CONFIRM:git.kernel.org:CVE-2017-10662 CONFIRM:github.com:CVE-2017-10662 CONFIRM:source.android.com:CVE-2017-10663 CONFIRM:www.kernel.org:CVE-2017-10662 CVE-2017-10662 D:CVE-2017-10662 RH:CVE-2017-10662 SMASH Issue 190207 UBUNTU:CVE-2017-10662 bnc#1053154 rh#1481146 |
CVE-2017-10663 | kernel-source-rt:Unsupported | important | () | BID:100215 CONFIRM:git.kernel.org:CVE-2017-10663 CONFIRM:github.com:CVE-2017-10663 CONFIRM:source.android.com:CVE-2017-10663 CONFIRM:www.kernel.org:CVE-2017-10663 CVE-2017-10663 D:CVE-2017-10663 RH:CVE-2017-10663 SMASH Issue 190208 UBUNTU:CVE-2017-10663 bnc#1053155 rh#1481149 |
CVE-2017-10810 | kernel-source-rt:Already fixed | moderate | 5.1 (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | BID:99433 CONFIRM:git.kernel.org:CVE-2017-10810 CONFIRM:github.com:CVE-2017-10810 CONFIRM:lkml.org:CVE-2017-10810 CVE-2017-10810 D:CVE-2017-10810 DSA-3927 OSS:2017/Q3/79 RH:CVE-2017-10810 SMASH Issue 187832 UBUNTU:CVE-2017-10810 bnc#1047277 rh#1462147 rh#1462158 rh#1468023 |
CVE-2017-11164 | pcre:Ignore | low | 3.3 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | BID:99575 CVE-2017-11164 MISC:bugs.launchpad.net:OSS:2023/04/12/1 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:openwall.com:CVE-2017-11164 MLIST:[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar OSS:2017/07/11/3 OSS:2017/Q3/111 OSS:2023/04/11/1 OSS:2023/04/12/1 OSS:2023/Q2/12 RH:CVE-2017-11164 SMASH Issue 188271 UBUNTU:CVE-2017-11164 bnc#1048266 jsc#CAR-1027 rh#1470107 |
CVE-2017-11176 | kernel-source-rt:Not affected | important | 7.3 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H) | BID:99919 CONFIRM:git.kernel.org:CVE-2017-11176 CONFIRM:github.com:CVE-2017-11176 CONFIRM:help.ecostruxureit.com:CVE-2017-5754 CVE-2017-11176 DSA-3927 DSA-3945 EXPLOIT-DB:45553 MISC:git.kernel.org:OSS:2020/Q1/69 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 Oracle:CVE-2017-6074 RH:CVE-2017-11176 RHSA-2017:2918 RHSA-2017:2930 RHSA-2017:2931 RHSA-2018:0169 RHSA-2018:3822 SMASH Issue 188369 UBUNTU:CVE-2017-11176 bnc#1048275 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1435719 rh#1439087 rh#1462147 rh#1462158 rh#1470659 rh#1481178 |
CVE-2017-11473 | kernel-source-rt:Not affected | moderate | 6.4 (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | BID:100010 CONFIRM:git.kernel.org:/pub/scm/linux/kernel/git/tip/tip.git/commit/ CONFIRM:git.kernel.org:CVE-2017-11473 CONFIRM:source.android.com:CVE-2017-15850 CVE-2017-11473 MISC:git.kernel.org:CVE-2017-11473 MISC:git.kernel.org:OSS:2020/Q1/69 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 Oracle:CVE-2017-6074 RH:CVE-2017-11473 RHSA-2018:0654 SMASH Issue 188809 UBUNTU:CVE-2017-11473 UBUNTU:USN-3754-1 bnc#1049603 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1435719 rh#1439087 rh#1462147 rh#1462158 rh#1473209 rh#1481178 |
CVE-2017-11600 | kernel-source-rt:Not affected | important | 7.3 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H) | BID:99928 CONFIRM:source.android.com:CVE-2017-6001 CVE-2017-11600 CVE-2017-9614 D:CVE-2017-9614 DSA-3981 DSA-5378 EXPLOIT-DB:42391 MISC:github.com:CVE-2017-9614 MISC:packetstormsecurity.com:CVE-2017-9614 MISC:seclists.org:CVE-2017-11600 MISC:seclists.org:CVE-2017-9614 OSS:2017/Q3/526 OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-17558 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2017-5754 Oracle:CVE-2018-3646 RH:CVE-2017-11600 RH:CVE-2017-9614 RHSA-2018:1965 RHSA-2018:2003 RHSA-2019:1170 RHSA-2019:1190 SMASH Issue 189055 SMASH Issue 207615 SUSE:SUSE-SU-2018:0011 UBUNTU:CVE-2017-11600 UBUNTU:CVE-2017-9614 bdo#1033297 bdo#866511 bdo#875881 bnc#1050231 bnc#1096564 linux.git:commit:7bab09631c2a303f87a7eb7e3d69e888673b9b7e rh#1474928 rh#1475742 rh#1519780 rh#2061700 rh#2119127 |
CVE-2017-12153 | kernel-source-rt:Already fixed | moderate | 4.4 (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | BID:100855 BID:101556 CONFIRM:bugzilla.novell.com:CVE-2017-12153 CONFIRM:bugzilla.redhat.com:CVE-2017-15087 CONFIRM:git.kernel.org:CVE-2017-12153 CONFIRM:marc.info CONFIRM:marc.info:CVE-2017-12153 CVE-2017-12153 CVE-2017-15087 DSA-3981 MISC:git.kernel.org:OSS:2020/Q1/69 OSS:2017/Q3/437 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 RH:CVE-2017-12153 RH:CVE-2017-15087 RHSA-2017:3110 SMASH Issue 191845 UBUNTU:CVE-2017-12153 UBUNTU:CVE-2017-15087 UBUNTU:USN-3583-1 UBUNTU:USN-3583-2 bdo#866511 bdo#875881 bnc#1058410 linux.git:commit:e785fa0a164aa11001cba931367c7f94ffaff888 rh#1462147 rh#1462158 rh#1481178 rh#1491046 rh#1505788 |
CVE-2017-12154 | kernel-source-rt:Already fixed | moderate | 5.6 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H) | BID:100856 CONFIRM:git.kernel.org:CVE-2017-12154 CONFIRM:www.spinics.net:CVE-2017-12154 CVE-2017-12154 D:CVE-2017-12154 DSA-3981 MISC:git.kernel.org:OSS:2020/Q1/69 MISC:security-tracker.debian.org OSS:2017/Q3/526 OSS:2017/Q3/528 OSS:2017/Q3/562 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 RH:CVE-2017-12154 RHSA-2018:0676 RHSA-2018:1062 RHSA-2019:1946 SMASH Issue 191960 UBUNTU:CVE-2017-12154 UBUNTU:USN-3698-1 UBUNTU:USN-3698-2 bdo#866511 bdo#875881 bnc#1058507 linux.git:commit:51aa68e7d57e3217192d88ce90fd5b8ef29ec94f rh#1462147 rh#1462158 rh#1481178 rh#1491224 |
CVE-2017-12168 | kernel-source-rt:Unsupported | moderate | 6.2 (CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H) | CONFIRM:git.kernel.org:CVE-2017-12168 CONFIRM:github.com:CVE-2017-12168 CONFIRM:www.kernel.org:CVE-2017-12168 CVE-2017-12168 RH:CVE-2017-12168 RHEA-2017:3163 SMASH Issue 192162 UBUNTU:CVE-2017-12168 bnc#1059448 rh#1492984 |
CVE-2017-12188 | kernel-source-rt:Not affected | important | 7.6 (CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H) | BID:101267 CONFIRM:patchwork.kernel.org:CVE-2017-12188 CVE-2017-12188 OSS:2017/Q4/77 OSS:2018/09/18/4 OSS:2018/09/25/4 RH:CVE-2017-12188 RHSA-2018:0395 RHSA-2018:0412 SMASH Issue 193097 SMASH Issue 193102 UBUNTU:CVE-2017-12188 bnc#1062604 linux.git:commit:829ee279aed43faa5cb1e4d65c0cad52f2426c53 linux.git:commit:fd19d3b45164466a4adce7cbff448ba9189e1427 rh#1500380 rh#1575866 rh#1890354 |
CVE-2017-12193 | kernel-source-rt:Not affected | moderate | 6.2 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | BID:101678 CONFIRM:git.kernel.org:CVE-2017-12193 CVE-2017-12193 DSA-5378 MISC:git.kernel.org:OSS:2017/Q4/181 MISC:www.kernel.org:CVE-2017-16939 OSS:2017/Q4/181 OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2017-5754 RH:CVE-2017-12193 RHSA-2018:0151 RHSA-2018:0152 RHSA-2018:0181 SMASH Issue 194390 UBUNTU:CVE-2017-12193 UBUNTU:USN-3698-1 UBUNTU:USN-3698-2 bdo#1033297 bnc#1066192 linux.git:commit:ea6789980fdaa610d7eb63602c746bf6ec70cd2b rh#1501215 rh#1519780 rh#2061700 rh#2119127 |
CVE-2017-13077 | kernel-source-rt:Released | important | 8.1 (CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) | BID:101274 CERT-VN:VU#228519 CISCO:20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II CONFIRM:access.redhat.com:CVE-2017-13088 CONFIRM:cert-portal.siemens.com:CVE-2017-13088 CONFIRM:cert.vde.com:CVE-2017-13080 CONFIRM:cert.vde.com:CVE-2017-13088 CONFIRM:portal.msrc.microsoft.com:CVE-2017-13080 CONFIRM:rockwellautomation.custhelp.com:CVE-2017-13082 CONFIRM:source.android.com:CVE-2017-5754 CONFIRM:source.android.com:CVE-2017-6264 CONFIRM:source.android.com:CVE-2017-6294 CONFIRM:support.apple.com:CVE-2017-13852 CONFIRM:support.apple.com:CVE-2017-13904 CONFIRM:support.apple.com:CVE-2017-3169 CONFIRM:support.hpe.com:CVE-2017-13081 CONFIRM:support.lenovo.com:CVE-2017-13088 CONFIRM:www.arubanetworks.com:CVE-2017-13088 CONFIRM:www.intel.com:CVE-2017-13080 CONFIRM:www.oracle.com:CVE-2017-5715 CONFIRM:www.oracle.com:CVE-2017-5753 CONFIRM:www.oracle.com:CVE-2017-6074 CVE-2017-13077 CVE-2017-13078 CVE-2017-13079 CVE-2017-13080 CVE-2017-13081 CVE-2017-13082 CVE-2017-13084 CVE-2017-13086 CVE-2017-13087 CVE-2017-13088 CVE-2024-2466 D:CVE-2022-2590 DSA-3999 DSA-5378 FREEBSD:FreeBSD-SA-17:07 GENTOO:GLSA-201711-03 MISC:github.com:CVE-2017-13082 MISC:github.com:OSS:2024/Q1/256 MISC:ics-cert.us-cert.gov:CVE-2017-13082 MISC:w1.fi MISC:w1.fi:CVE-2017-13088 MISC:www.krackattacks.com:CVE-2017-13088 MLIST:[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update MLIST:[debian-lts-announce] 20181113 [SECURITY] [DLA 1573-1] firmware-nonfree security update OSS:2017/Q4/83 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/11/10/2 OSS:2022/Q3/99 OSS:2022/Q4/132 OSS:2022/Q4/135 OSS:2024/03/27/4 OSS:2024/Q1/256 Oracle:CVE-2011-4461 Oracle:CVE-2013-1768 Oracle:CVE-2014-0114 Oracle:CVE-2014-3490 Oracle:CVE-2014-3577 Oracle:CVE-2015-0204 Oracle:CVE-2015-0235 Oracle:CVE-2015-5600 Oracle:CVE-2015-6937 Oracle:CVE-2015-7501 Oracle:CVE-2015-7940 Oracle:CVE-2015-9251 Oracle:CVE-2016-0635 Oracle:CVE-2016-0714 Oracle:CVE-2016-0729 Oracle:CVE-2016-1000031 Oracle:CVE-2016-1181 Oracle:CVE-2016-1182 Oracle:CVE-2016-2099 Oracle:CVE-2016-2107 Oracle:CVE-2016-2176 Oracle:CVE-2016-2179 Oracle:CVE-2016-2183 Oracle:CVE-2016-3092 Oracle:CVE-2016-3506 Oracle:CVE-2016-4000 Oracle:CVE-2016-4055 Oracle:CVE-2016-5007 Oracle:CVE-2016-5019 Oracle:CVE-2016-5080 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 Oracle:CVE-2016-6304 Oracle:CVE-2016-6814 Oracle:CVE-2016-7103 Oracle:CVE-2016-7167 Oracle:CVE-2016-9843 Oracle:CVE-2016-9878 Oracle:CVE-2017-0379 Oracle:CVE-2017-10068 Oracle:CVE-2017-12617 Oracle:CVE-2017-13077 Oracle:CVE-2017-13082 Oracle:CVE-2017-14735 Oracle:CVE-2017-15095 Oracle:CVE-2017-17562 Oracle:CVE-2017-3633 Oracle:CVE-2017-3736 Oracle:CVE-2017-3737 Oracle:CVE-2017-5533 Oracle:CVE-2017-5645 Oracle:CVE-2017-5662 Oracle:CVE-2017-5664 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2017-6074 Oracle:CVE-2017-7525 Oracle:CVE-2017-7805 Oracle:CVE-2017-9798 Oracle:CVE-2018-0732 Oracle:CVE-2018-0739 Oracle:CVE-2018-1000120 Oracle:CVE-2018-1000300 Oracle:CVE-2018-11039 Oracle:CVE-2018-1171 Oracle:CVE-2018-11776 Oracle:CVE-2018-1258 Oracle:CVE-2018-1275 Oracle:CVE-2018-1305 Oracle:CVE-2018-13785 Oracle:CVE-2018-1656 Oracle:CVE-2018-2563 Oracle:CVE-2018-2572 Oracle:CVE-2018-2587 Oracle:CVE-2018-2598 Oracle:CVE-2018-2628 Oracle:CVE-2018-2718 Oracle:CVE-2018-2737 Oracle:CVE-2018-2738 Oracle:CVE-2018-2739 Oracle:CVE-2018-2742 Oracle:CVE-2018-2746 Oracle:CVE-2018-2747 Oracle:CVE-2018-2748 Oracle:CVE-2018-2749 Oracle:CVE-2018-2750 Oracle:CVE-2018-2752 Oracle:CVE-2018-2753 Oracle:CVE-2018-2754 Oracle:CVE-2018-2755 Oracle:CVE-2018-2756 Oracle:CVE-2018-2758 Oracle:CVE-2018-2759 Oracle:CVE-2018-2760 Oracle:CVE-2018-2761 Oracle:CVE-2018-2762 Oracle:CVE-2018-2763 Oracle:CVE-2018-2764 Oracle:CVE-2018-2765 Oracle:CVE-2018-2766 Oracle:CVE-2018-2767 Oracle:CVE-2018-2768 Oracle:CVE-2018-2769 Oracle:CVE-2018-2770 Oracle:CVE-2018-2771 Oracle:CVE-2018-2772 Oracle:CVE-2018-2773 Oracle:CVE-2018-2774 Oracle:CVE-2018-2775 Oracle:CVE-2018-2776 Oracle:CVE-2018-2777 Oracle:CVE-2018-2778 Oracle:CVE-2018-2779 Oracle:CVE-2018-2780 Oracle:CVE-2018-2781 Oracle:CVE-2018-2782 Oracle:CVE-2018-2783 Oracle:CVE-2018-2784 Oracle:CVE-2018-2785 Oracle:CVE-2018-2786 Oracle:CVE-2018-2787 Oracle:CVE-2018-2788 Oracle:CVE-2018-2789 Oracle:CVE-2018-2790 Oracle:CVE-2018-2791 Oracle:CVE-2018-2792 Oracle:CVE-2018-2793 Oracle:CVE-2018-2794 Oracle:CVE-2018-2795 Oracle:CVE-2018-2796 Oracle:CVE-2018-2797 Oracle:CVE-2018-2798 Oracle:CVE-2018-2799 Oracle:CVE-2018-2800 Oracle:CVE-2018-2801 Oracle:CVE-2018-2804 Oracle:CVE-2018-2805 Oracle:CVE-2018-2806 Oracle:CVE-2018-2807 Oracle:CVE-2018-2808 Oracle:CVE-2018-2809 Oracle:CVE-2018-2810 Oracle:CVE-2018-2811 Oracle:CVE-2018-2812 Oracle:CVE-2018-2813 Oracle:CVE-2018-2814 Oracle:CVE-2018-2815 Oracle:CVE-2018-2816 Oracle:CVE-2018-2817 Oracle:CVE-2018-2818 Oracle:CVE-2018-2819 Oracle:CVE-2018-2820 Oracle:CVE-2018-2821 Oracle:CVE-2018-2822 Oracle:CVE-2018-2823 Oracle:CVE-2018-2825 Oracle:CVE-2018-2826 Oracle:CVE-2018-2827 Oracle:CVE-2018-2828 Oracle:CVE-2018-2830 Oracle:CVE-2018-2831 Oracle:CVE-2018-2832 Oracle:CVE-2018-2834 Oracle:CVE-2018-2835 Oracle:CVE-2018-2836 Oracle:CVE-2018-2837 Oracle:CVE-2018-2838 Oracle:CVE-2018-2839 Oracle:CVE-2018-2840 Oracle:CVE-2018-2841 Oracle:CVE-2018-2842 Oracle:CVE-2018-2843 Oracle:CVE-2018-2844 Oracle:CVE-2018-2845 Oracle:CVE-2018-2846 Oracle:CVE-2018-2849 Oracle:CVE-2018-2850 Oracle:CVE-2018-2852 Oracle:CVE-2018-2854 Oracle:CVE-2018-2855 Oracle:CVE-2018-2856 Oracle:CVE-2018-2857 Oracle:CVE-2018-2858 Oracle:CVE-2018-2859 Oracle:CVE-2018-2860 Oracle:CVE-2018-2861 Oracle:CVE-2018-2862 Oracle:CVE-2018-2863 Oracle:CVE-2018-2864 Oracle:CVE-2018-2865 Oracle:CVE-2018-2866 Oracle:CVE-2018-2867 Oracle:CVE-2018-2868 Oracle:CVE-2018-2869 Oracle:CVE-2018-2870 Oracle:CVE-2018-2871 Oracle:CVE-2018-2872 Oracle:CVE-2018-2873 Oracle:CVE-2018-2874 Oracle:CVE-2018-2876 Oracle:CVE-2018-2877 Oracle:CVE-2018-2878 Oracle:CVE-2018-2879 Oracle:CVE-2018-2881 Oracle:CVE-2018-2882 Oracle:CVE-2018-2887 Oracle:CVE-2018-2888 Oracle:CVE-2018-2889 Oracle:CVE-2018-2891 Oracle:CVE-2018-2892 Oracle:CVE-2018-2893 Oracle:CVE-2018-2894 Oracle:CVE-2018-2895 Oracle:CVE-2018-2896 Oracle:CVE-2018-2897 Oracle:CVE-2018-2898 Oracle:CVE-2018-2899 Oracle:CVE-2018-2900 Oracle:CVE-2018-2901 Oracle:CVE-2018-2902 Oracle:CVE-2018-2903 Oracle:CVE-2018-2904 Oracle:CVE-2018-2905 Oracle:CVE-2018-2906 Oracle:CVE-2018-2907 Oracle:CVE-2018-2908 Oracle:CVE-2018-2909 Oracle:CVE-2018-2911 Oracle:CVE-2018-2912 Oracle:CVE-2018-2913 Oracle:CVE-2018-2914 Oracle:CVE-2018-2915 Oracle:CVE-2018-2916 Oracle:CVE-2018-2917 Oracle:CVE-2018-2918 Oracle:CVE-2018-2919 Oracle:CVE-2018-2920 Oracle:CVE-2018-2921 Oracle:CVE-2018-2922 Oracle:CVE-2018-2923 Oracle:CVE-2018-2924 Oracle:CVE-2018-2925 Oracle:CVE-2018-2926 Oracle:CVE-2018-2927 Oracle:CVE-2018-2928 Oracle:CVE-2018-2929 Oracle:CVE-2018-2930 Oracle:CVE-2018-2932 Oracle:CVE-2018-2933 Oracle:CVE-2018-2934 Oracle:CVE-2018-2935 Oracle:CVE-2018-2936 Oracle:CVE-2018-2937 Oracle:CVE-2018-2938 Oracle:CVE-2018-2939 Oracle:CVE-2018-2940 Oracle:CVE-2018-2941 Oracle:CVE-2018-2942 Oracle:CVE-2018-2943 Oracle:CVE-2018-2944 Oracle:CVE-2018-2945 Oracle:CVE-2018-2946 Oracle:CVE-2018-2947 Oracle:CVE-2018-2948 Oracle:CVE-2018-2949 Oracle:CVE-2018-2950 Oracle:CVE-2018-2951 Oracle:CVE-2018-2952 Oracle:CVE-2018-2953 Oracle:CVE-2018-2954 Oracle:CVE-2018-2955 Oracle:CVE-2018-2956 Oracle:CVE-2018-2957 Oracle:CVE-2018-2958 Oracle:CVE-2018-2959 Oracle:CVE-2018-2960 Oracle:CVE-2018-2961 Oracle:CVE-2018-2962 Oracle:CVE-2018-2963 Oracle:CVE-2018-2964 Oracle:CVE-2018-2965 Oracle:CVE-2018-2966 Oracle:CVE-2018-2967 Oracle:CVE-2018-2968 Oracle:CVE-2018-2969 Oracle:CVE-2018-2970 Oracle:CVE-2018-2971 Oracle:CVE-2018-2972 Oracle:CVE-2018-2973 Oracle:CVE-2018-2974 Oracle:CVE-2018-2975 Oracle:CVE-2018-2976 Oracle:CVE-2018-2977 Oracle:CVE-2018-2979 Oracle:CVE-2018-2980 Oracle:CVE-2018-2981 Oracle:CVE-2018-2982 Oracle:CVE-2018-2984 Oracle:CVE-2018-2985 Oracle:CVE-2018-2986 Oracle:CVE-2018-2987 Oracle:CVE-2018-2988 Oracle:CVE-2018-2989 Oracle:CVE-2018-2990 Oracle:CVE-2018-2991 Oracle:CVE-2018-2992 Oracle:CVE-2018-2993 Oracle:CVE-2018-2994 Oracle:CVE-2018-2995 Oracle:CVE-2018-2996 Oracle:CVE-2018-2997 Oracle:CVE-2018-2998 Oracle:CVE-2018-2999 Oracle:CVE-2018-3000 Oracle:CVE-2018-3001 Oracle:CVE-2018-3002 Oracle:CVE-2018-3003 Oracle:CVE-2018-3004 Oracle:CVE-2018-3005 Oracle:CVE-2018-3006 Oracle:CVE-2018-3007 Oracle:CVE-2018-3008 Oracle:CVE-2018-3009 Oracle:CVE-2018-3010 Oracle:CVE-2018-3011 Oracle:CVE-2018-3012 Oracle:CVE-2018-3013 Oracle:CVE-2018-3014 Oracle:CVE-2018-3015 Oracle:CVE-2018-3016 Oracle:CVE-2018-3017 Oracle:CVE-2018-3018 Oracle:CVE-2018-3019 Oracle:CVE-2018-3020 Oracle:CVE-2018-3021 Oracle:CVE-2018-3022 Oracle:CVE-2018-3023 Oracle:CVE-2018-3024 Oracle:CVE-2018-3025 Oracle:CVE-2018-3026 Oracle:CVE-2018-3027 Oracle:CVE-2018-3028 Oracle:CVE-2018-3029 Oracle:CVE-2018-3030 Oracle:CVE-2018-3031 Oracle:CVE-2018-3032 Oracle:CVE-2018-3033 Oracle:CVE-2018-3034 Oracle:CVE-2018-3035 Oracle:CVE-2018-3036 Oracle:CVE-2018-3037 Oracle:CVE-2018-3038 Oracle:CVE-2018-3039 Oracle:CVE-2018-3040 Oracle:CVE-2018-3041 Oracle:CVE-2018-3042 Oracle:CVE-2018-3043 Oracle:CVE-2018-3044 Oracle:CVE-2018-3045 Oracle:CVE-2018-3046 Oracle:CVE-2018-3047 Oracle:CVE-2018-3048 Oracle:CVE-2018-3049 Oracle:CVE-2018-3050 Oracle:CVE-2018-3051 Oracle:CVE-2018-3052 Oracle:CVE-2018-3053 Oracle:CVE-2018-3054 Oracle:CVE-2018-3055 Oracle:CVE-2018-3056 Oracle:CVE-2018-3057 Oracle:CVE-2018-3058 Oracle:CVE-2018-3059 Oracle:CVE-2018-3060 Oracle:CVE-2018-3061 Oracle:CVE-2018-3062 Oracle:CVE-2018-3063 Oracle:CVE-2018-3064 Oracle:CVE-2018-3065 Oracle:CVE-2018-3066 Oracle:CVE-2018-3067 Oracle:CVE-2018-3068 Oracle:CVE-2018-3069 Oracle:CVE-2018-3070 Oracle:CVE-2018-3071 Oracle:CVE-2018-3072 Oracle:CVE-2018-3073 Oracle:CVE-2018-3074 Oracle:CVE-2018-3075 Oracle:CVE-2018-3076 Oracle:CVE-2018-3077 Oracle:CVE-2018-3078 Oracle:CVE-2018-3079 Oracle:CVE-2018-3080 Oracle:CVE-2018-3081 Oracle:CVE-2018-3082 Oracle:CVE-2018-3084 Oracle:CVE-2018-3085 Oracle:CVE-2018-3086 Oracle:CVE-2018-3087 Oracle:CVE-2018-3088 Oracle:CVE-2018-3089 Oracle:CVE-2018-3090 Oracle:CVE-2018-3091 Oracle:CVE-2018-3092 Oracle:CVE-2018-3093 Oracle:CVE-2018-3094 Oracle:CVE-2018-3095 Oracle:CVE-2018-3096 Oracle:CVE-2018-3097 Oracle:CVE-2018-3098 Oracle:CVE-2018-3099 Oracle:CVE-2018-3100 Oracle:CVE-2018-3101 Oracle:CVE-2018-3102 Oracle:CVE-2018-3103 Oracle:CVE-2018-3104 Oracle:CVE-2018-3105 Oracle:CVE-2018-3108 Oracle:CVE-2018-3109 Oracle:CVE-2018-3115 Oracle:CVE-2018-3122 Oracle:CVE-2018-3126 Oracle:CVE-2018-3127 Oracle:CVE-2018-3128 Oracle:CVE-2018-3129 Oracle:CVE-2018-3130 Oracle:CVE-2018-3131 Oracle:CVE-2018-3132 Oracle:CVE-2018-3133 Oracle:CVE-2018-3134 Oracle:CVE-2018-3135 Oracle:CVE-2018-3136 Oracle:CVE-2018-3137 Oracle:CVE-2018-3138 Oracle:CVE-2018-3139 Oracle:CVE-2018-3140 Oracle:CVE-2018-3141 Oracle:CVE-2018-3142 Oracle:CVE-2018-3143 Oracle:CVE-2018-3144 Oracle:CVE-2018-3145 Oracle:CVE-2018-3146 Oracle:CVE-2018-3147 Oracle:CVE-2018-3148 Oracle:CVE-2018-3149 Oracle:CVE-2018-3150 Oracle:CVE-2018-3151 Oracle:CVE-2018-3152 Oracle:CVE-2018-3153 Oracle:CVE-2018-3154 Oracle:CVE-2018-3155 Oracle:CVE-2018-3156 Oracle:CVE-2018-3157 Oracle:CVE-2018-3158 Oracle:CVE-2018-3159 Oracle:CVE-2018-3160 Oracle:CVE-2018-3161 Oracle:CVE-2018-3162 Oracle:CVE-2018-3163 Oracle:CVE-2018-3164 Oracle:CVE-2018-3165 Oracle:CVE-2018-3166 Oracle:CVE-2018-3167 Oracle:CVE-2018-3168 Oracle:CVE-2018-3169 Oracle:CVE-2018-3170 Oracle:CVE-2018-3171 Oracle:CVE-2018-3172 Oracle:CVE-2018-3173 Oracle:CVE-2018-3174 Oracle:CVE-2018-3175 Oracle:CVE-2018-3176 Oracle:CVE-2018-3177 Oracle:CVE-2018-3178 Oracle:CVE-2018-3179 Oracle:CVE-2018-3180 Oracle:CVE-2018-3181 Oracle:CVE-2018-3182 Oracle:CVE-2018-3183 Oracle:CVE-2018-3184 Oracle:CVE-2018-3185 Oracle:CVE-2018-3186 Oracle:CVE-2018-3187 Oracle:CVE-2018-3188 Oracle:CVE-2018-3189 Oracle:CVE-2018-3190 Oracle:CVE-2018-3191 Oracle:CVE-2018-3192 Oracle:CVE-2018-3193 Oracle:CVE-2018-3194 Oracle:CVE-2018-3195 Oracle:CVE-2018-3196 Oracle:CVE-2018-3197 Oracle:CVE-2018-3198 Oracle:CVE-2018-3200 Oracle:CVE-2018-3201 Oracle:CVE-2018-3202 Oracle:CVE-2018-3203 Oracle:CVE-2018-3204 Oracle:CVE-2018-3205 Oracle:CVE-2018-3206 Oracle:CVE-2018-3207 Oracle:CVE-2018-3208 Oracle:CVE-2018-3209 Oracle:CVE-2018-3210 Oracle:CVE-2018-3211 Oracle:CVE-2018-3212 Oracle:CVE-2018-3213 Oracle:CVE-2018-3214 Oracle:CVE-2018-3215 Oracle:CVE-2018-3217 Oracle:CVE-2018-3218 Oracle:CVE-2018-3219 Oracle:CVE-2018-3220 Oracle:CVE-2018-3221 Oracle:CVE-2018-3222 Oracle:CVE-2018-3223 Oracle:CVE-2018-3224 Oracle:CVE-2018-3225 Oracle:CVE-2018-3226 Oracle:CVE-2018-3227 Oracle:CVE-2018-3228 Oracle:CVE-2018-3229 Oracle:CVE-2018-3230 Oracle:CVE-2018-3231 Oracle:CVE-2018-3232 Oracle:CVE-2018-3233 Oracle:CVE-2018-3234 Oracle:CVE-2018-3235 Oracle:CVE-2018-3236 Oracle:CVE-2018-3237 Oracle:CVE-2018-3238 Oracle:CVE-2018-3239 Oracle:CVE-2018-3241 Oracle:CVE-2018-3242 Oracle:CVE-2018-3243 Oracle:CVE-2018-3244 Oracle:CVE-2018-3245 Oracle:CVE-2018-3246 Oracle:CVE-2018-3247 Oracle:CVE-2018-3248 Oracle:CVE-2018-3249 Oracle:CVE-2018-3250 Oracle:CVE-2018-3251 Oracle:CVE-2018-3252 Oracle:CVE-2018-3253 Oracle:CVE-2018-3254 Oracle:CVE-2018-3255 Oracle:CVE-2018-3256 Oracle:CVE-2018-3257 Oracle:CVE-2018-3258 Oracle:CVE-2018-3259 Oracle:CVE-2018-3261 Oracle:CVE-2018-3262 Oracle:CVE-2018-3263 Oracle:CVE-2018-3264 Oracle:CVE-2018-3265 Oracle:CVE-2018-3266 Oracle:CVE-2018-3267 Oracle:CVE-2018-3268 Oracle:CVE-2018-3269 Oracle:CVE-2018-3270 Oracle:CVE-2018-3271 Oracle:CVE-2018-3272 Oracle:CVE-2018-3273 Oracle:CVE-2018-3274 Oracle:CVE-2018-3275 Oracle:CVE-2018-3276 Oracle:CVE-2018-3277 Oracle:CVE-2018-3278 Oracle:CVE-2018-3279 Oracle:CVE-2018-3280 Oracle:CVE-2018-3281 Oracle:CVE-2018-3282 Oracle:CVE-2018-3283 Oracle:CVE-2018-3284 Oracle:CVE-2018-3285 Oracle:CVE-2018-3286 Oracle:CVE-2018-3287 Oracle:CVE-2018-3288 Oracle:CVE-2018-3289 Oracle:CVE-2018-3290 Oracle:CVE-2018-3291 Oracle:CVE-2018-3292 Oracle:CVE-2018-3293 Oracle:CVE-2018-3294 Oracle:CVE-2018-3295 Oracle:CVE-2018-3296 Oracle:CVE-2018-3297 Oracle:CVE-2018-3298 Oracle:CVE-2018-3299 Oracle:CVE-2018-3301 Oracle:CVE-2018-3302 Oracle:CVE-2018-7489 Oracle:CVE-2018-8013 Oracle:CVE-2018-8014 Oracle:CVE-2018-8037 RH:CVE-2017-13077 RH:CVE-2017-13078 RH:CVE-2017-13079 RH:CVE-2017-13080 RH:CVE-2017-13081 RH:CVE-2017-13082 RH:CVE-2017-13084 RH:CVE-2017-13086 RH:CVE-2017-13087 RH:CVE-2017-13088 RHSA-2017:2907 RHSA-2017:2911 SECTRACK:1039570 SECTRACK:1039571 SECTRACK:1039572 SECTRACK:1039573 SECTRACK:1039576 SECTRACK:1039577 SECTRACK:1039578 SECTRACK:1039581 SECTRACK:1039585 SECTRACK:1039703 SECTRACK:1041432 SMASH Issue 191142 SUSE:SUSE-SU-2017:2745 SUSE:SUSE-SU-2017:2752 SUSE:openSUSE-SU-2017:2755 UBUNTU:CVE-2017-13077 UBUNTU:CVE-2017-13078 UBUNTU:CVE-2017-13079 UBUNTU:CVE-2017-13080 UBUNTU:CVE-2017-13081 UBUNTU:CVE-2017-13082 UBUNTU:CVE-2017-13084 UBUNTU:CVE-2017-13086 UBUNTU:CVE-2017-13087 UBUNTU:CVE-2017-13088 UBUNTU:USN-3455-1 bdo#1033297 bnc#1056061 linux.git:commit:1b72bf5a0777d7cec6c2d857ac15599022b3c123 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 linux.git:commit:fdf7cb4185b60c68e1a75e61691c4afdc15dea0e rh#1167537 rh#1183461 rh#1202366 rh#1202380 rh#1202384 rh#1202395 rh#1202418 rh#1293972 rh#1369383 rh#1384344 rh#1393454 rh#1397485 rh#1399546 rh#1491692 rh#1491693 rh#1491694 rh#1491696 rh#1491697 rh#1491698 rh#1500301 rh#1500302 rh#1500303 rh#1500304 rh#1519780 rh#1553413 rh#1591854 rh#1607582 rh#1608073 rh#1731271 rh#2044599 rh#2044602 rh#2061700 rh#2116175 rh#2119127 rh#2161287 rh#2270497 |
CVE-2017-13078 | kernel-source-rt:Released | important | 8.1 (CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) | BID:101274 CERT-VN:VU#228519 CISCO:20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II CONFIRM:access.redhat.com:CVE-2017-13088 CONFIRM:cert-portal.siemens.com:CVE-2017-13088 CONFIRM:cert.vde.com:CVE-2017-13080 CONFIRM:cert.vde.com:CVE-2017-13088 CONFIRM:portal.msrc.microsoft.com:CVE-2017-13080 CONFIRM:rockwellautomation.custhelp.com:CVE-2017-13082 CONFIRM:source.android.com:CVE-2017-5754 CONFIRM:source.android.com:CVE-2017-6264 CONFIRM:source.android.com:CVE-2017-6294 CONFIRM:support.apple.com:CVE-2017-13852 CONFIRM:support.apple.com:CVE-2017-13904 CONFIRM:support.apple.com:CVE-2017-3169 CONFIRM:support.hpe.com:CVE-2017-13081 CONFIRM:support.lenovo.com:CVE-2017-13088 CONFIRM:www.arubanetworks.com:CVE-2017-13088 CONFIRM:www.intel.com:CVE-2017-13080 CONFIRM:www.oracle.com:CVE-2017-5715 CONFIRM:www.oracle.com:CVE-2017-5753 CONFIRM:www.oracle.com:CVE-2017-6074 CVE-2017-13077 CVE-2017-13078 CVE-2017-13079 CVE-2017-13080 CVE-2017-13081 CVE-2017-13082 CVE-2017-13084 CVE-2017-13086 CVE-2017-13087 CVE-2017-13088 CVE-2024-2466 D:CVE-2022-2590 DSA-3999 DSA-5378 FREEBSD:FreeBSD-SA-17:07 GENTOO:GLSA-201711-03 MISC:github.com:CVE-2017-13082 MISC:github.com:OSS:2024/Q1/256 MISC:ics-cert.us-cert.gov:CVE-2017-13082 MISC:w1.fi MISC:w1.fi:CVE-2017-13088 MISC:www.krackattacks.com:CVE-2017-13088 MLIST:[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update MLIST:[debian-lts-announce] 20181113 [SECURITY] [DLA 1573-1] firmware-nonfree security update OSS:2017/Q4/83 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/11/10/2 OSS:2022/Q3/99 OSS:2022/Q4/132 OSS:2022/Q4/135 OSS:2024/03/27/4 OSS:2024/Q1/256 Oracle:CVE-2011-4461 Oracle:CVE-2013-1768 Oracle:CVE-2014-0114 Oracle:CVE-2014-3490 Oracle:CVE-2014-3577 Oracle:CVE-2015-0204 Oracle:CVE-2015-0235 Oracle:CVE-2015-5600 Oracle:CVE-2015-6937 Oracle:CVE-2015-7501 Oracle:CVE-2015-7940 Oracle:CVE-2015-9251 Oracle:CVE-2016-0635 Oracle:CVE-2016-0714 Oracle:CVE-2016-0729 Oracle:CVE-2016-1000031 Oracle:CVE-2016-1181 Oracle:CVE-2016-1182 Oracle:CVE-2016-2099 Oracle:CVE-2016-2107 Oracle:CVE-2016-2176 Oracle:CVE-2016-2179 Oracle:CVE-2016-2183 Oracle:CVE-2016-3092 Oracle:CVE-2016-3506 Oracle:CVE-2016-4000 Oracle:CVE-2016-4055 Oracle:CVE-2016-5007 Oracle:CVE-2016-5019 Oracle:CVE-2016-5080 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 Oracle:CVE-2016-6304 Oracle:CVE-2016-6814 Oracle:CVE-2016-7103 Oracle:CVE-2016-7167 Oracle:CVE-2016-9843 Oracle:CVE-2016-9878 Oracle:CVE-2017-0379 Oracle:CVE-2017-10068 Oracle:CVE-2017-12617 Oracle:CVE-2017-13077 Oracle:CVE-2017-13082 Oracle:CVE-2017-14735 Oracle:CVE-2017-15095 Oracle:CVE-2017-17562 Oracle:CVE-2017-3633 Oracle:CVE-2017-3736 Oracle:CVE-2017-3737 Oracle:CVE-2017-5533 Oracle:CVE-2017-5645 Oracle:CVE-2017-5662 Oracle:CVE-2017-5664 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2017-6074 Oracle:CVE-2017-7525 Oracle:CVE-2017-7805 Oracle:CVE-2017-9798 Oracle:CVE-2018-0732 Oracle:CVE-2018-0739 Oracle:CVE-2018-1000120 Oracle:CVE-2018-1000300 Oracle:CVE-2018-11039 Oracle:CVE-2018-1171 Oracle:CVE-2018-11776 Oracle:CVE-2018-1258 Oracle:CVE-2018-1275 Oracle:CVE-2018-1305 Oracle:CVE-2018-13785 Oracle:CVE-2018-1656 Oracle:CVE-2018-2563 Oracle:CVE-2018-2572 Oracle:CVE-2018-2587 Oracle:CVE-2018-2598 Oracle:CVE-2018-2628 Oracle:CVE-2018-2718 Oracle:CVE-2018-2737 Oracle:CVE-2018-2738 Oracle:CVE-2018-2739 Oracle:CVE-2018-2742 Oracle:CVE-2018-2746 Oracle:CVE-2018-2747 Oracle:CVE-2018-2748 Oracle:CVE-2018-2749 Oracle:CVE-2018-2750 Oracle:CVE-2018-2752 Oracle:CVE-2018-2753 Oracle:CVE-2018-2754 Oracle:CVE-2018-2755 Oracle:CVE-2018-2756 Oracle:CVE-2018-2758 Oracle:CVE-2018-2759 Oracle:CVE-2018-2760 Oracle:CVE-2018-2761 Oracle:CVE-2018-2762 Oracle:CVE-2018-2763 Oracle:CVE-2018-2764 Oracle:CVE-2018-2765 Oracle:CVE-2018-2766 Oracle:CVE-2018-2767 Oracle:CVE-2018-2768 Oracle:CVE-2018-2769 Oracle:CVE-2018-2770 Oracle:CVE-2018-2771 Oracle:CVE-2018-2772 Oracle:CVE-2018-2773 Oracle:CVE-2018-2774 Oracle:CVE-2018-2775 Oracle:CVE-2018-2776 Oracle:CVE-2018-2777 Oracle:CVE-2018-2778 Oracle:CVE-2018-2779 Oracle:CVE-2018-2780 Oracle:CVE-2018-2781 Oracle:CVE-2018-2782 Oracle:CVE-2018-2783 Oracle:CVE-2018-2784 Oracle:CVE-2018-2785 Oracle:CVE-2018-2786 Oracle:CVE-2018-2787 Oracle:CVE-2018-2788 Oracle:CVE-2018-2789 Oracle:CVE-2018-2790 Oracle:CVE-2018-2791 Oracle:CVE-2018-2792 Oracle:CVE-2018-2793 Oracle:CVE-2018-2794 Oracle:CVE-2018-2795 Oracle:CVE-2018-2796 Oracle:CVE-2018-2797 Oracle:CVE-2018-2798 Oracle:CVE-2018-2799 Oracle:CVE-2018-2800 Oracle:CVE-2018-2801 Oracle:CVE-2018-2804 Oracle:CVE-2018-2805 Oracle:CVE-2018-2806 Oracle:CVE-2018-2807 Oracle:CVE-2018-2808 Oracle:CVE-2018-2809 Oracle:CVE-2018-2810 Oracle:CVE-2018-2811 Oracle:CVE-2018-2812 Oracle:CVE-2018-2813 Oracle:CVE-2018-2814 Oracle:CVE-2018-2815 Oracle:CVE-2018-2816 Oracle:CVE-2018-2817 Oracle:CVE-2018-2818 Oracle:CVE-2018-2819 Oracle:CVE-2018-2820 Oracle:CVE-2018-2821 Oracle:CVE-2018-2822 Oracle:CVE-2018-2823 Oracle:CVE-2018-2825 Oracle:CVE-2018-2826 Oracle:CVE-2018-2827 Oracle:CVE-2018-2828 Oracle:CVE-2018-2830 Oracle:CVE-2018-2831 Oracle:CVE-2018-2832 Oracle:CVE-2018-2834 Oracle:CVE-2018-2835 Oracle:CVE-2018-2836 Oracle:CVE-2018-2837 Oracle:CVE-2018-2838 Oracle:CVE-2018-2839 Oracle:CVE-2018-2840 Oracle:CVE-2018-2841 Oracle:CVE-2018-2842 Oracle:CVE-2018-2843 Oracle:CVE-2018-2844 Oracle:CVE-2018-2845 Oracle:CVE-2018-2846 Oracle:CVE-2018-2849 Oracle:CVE-2018-2850 Oracle:CVE-2018-2852 Oracle:CVE-2018-2854 Oracle:CVE-2018-2855 Oracle:CVE-2018-2856 Oracle:CVE-2018-2857 Oracle:CVE-2018-2858 Oracle:CVE-2018-2859 Oracle:CVE-2018-2860 Oracle:CVE-2018-2861 Oracle:CVE-2018-2862 Oracle:CVE-2018-2863 Oracle:CVE-2018-2864 Oracle:CVE-2018-2865 Oracle:CVE-2018-2866 Oracle:CVE-2018-2867 Oracle:CVE-2018-2868 Oracle:CVE-2018-2869 Oracle:CVE-2018-2870 Oracle:CVE-2018-2871 Oracle:CVE-2018-2872 Oracle:CVE-2018-2873 Oracle:CVE-2018-2874 Oracle:CVE-2018-2876 Oracle:CVE-2018-2877 Oracle:CVE-2018-2878 Oracle:CVE-2018-2879 Oracle:CVE-2018-2881 Oracle:CVE-2018-2882 Oracle:CVE-2018-2887 Oracle:CVE-2018-2888 Oracle:CVE-2018-2889 Oracle:CVE-2018-2891 Oracle:CVE-2018-2892 Oracle:CVE-2018-2893 Oracle:CVE-2018-2894 Oracle:CVE-2018-2895 Oracle:CVE-2018-2896 Oracle:CVE-2018-2897 Oracle:CVE-2018-2898 Oracle:CVE-2018-2899 Oracle:CVE-2018-2900 Oracle:CVE-2018-2901 Oracle:CVE-2018-2902 Oracle:CVE-2018-2903 Oracle:CVE-2018-2904 Oracle:CVE-2018-2905 Oracle:CVE-2018-2906 Oracle:CVE-2018-2907 Oracle:CVE-2018-2908 Oracle:CVE-2018-2909 Oracle:CVE-2018-2911 Oracle:CVE-2018-2912 Oracle:CVE-2018-2913 Oracle:CVE-2018-2914 Oracle:CVE-2018-2915 Oracle:CVE-2018-2916 Oracle:CVE-2018-2917 Oracle:CVE-2018-2918 Oracle:CVE-2018-2919 Oracle:CVE-2018-2920 Oracle:CVE-2018-2921 Oracle:CVE-2018-2922 Oracle:CVE-2018-2923 Oracle:CVE-2018-2924 Oracle:CVE-2018-2925 Oracle:CVE-2018-2926 Oracle:CVE-2018-2927 Oracle:CVE-2018-2928 Oracle:CVE-2018-2929 Oracle:CVE-2018-2930 Oracle:CVE-2018-2932 Oracle:CVE-2018-2933 Oracle:CVE-2018-2934 Oracle:CVE-2018-2935 Oracle:CVE-2018-2936 Oracle:CVE-2018-2937 Oracle:CVE-2018-2938 Oracle:CVE-2018-2939 Oracle:CVE-2018-2940 Oracle:CVE-2018-2941 Oracle:CVE-2018-2942 Oracle:CVE-2018-2943 Oracle:CVE-2018-2944 Oracle:CVE-2018-2945 Oracle:CVE-2018-2946 Oracle:CVE-2018-2947 Oracle:CVE-2018-2948 Oracle:CVE-2018-2949 Oracle:CVE-2018-2950 Oracle:CVE-2018-2951 Oracle:CVE-2018-2952 Oracle:CVE-2018-2953 Oracle:CVE-2018-2954 Oracle:CVE-2018-2955 Oracle:CVE-2018-2956 Oracle:CVE-2018-2957 Oracle:CVE-2018-2958 Oracle:CVE-2018-2959 Oracle:CVE-2018-2960 Oracle:CVE-2018-2961 Oracle:CVE-2018-2962 Oracle:CVE-2018-2963 Oracle:CVE-2018-2964 Oracle:CVE-2018-2965 Oracle:CVE-2018-2966 Oracle:CVE-2018-2967 Oracle:CVE-2018-2968 Oracle:CVE-2018-2969 Oracle:CVE-2018-2970 Oracle:CVE-2018-2971 Oracle:CVE-2018-2972 Oracle:CVE-2018-2973 Oracle:CVE-2018-2974 Oracle:CVE-2018-2975 Oracle:CVE-2018-2976 Oracle:CVE-2018-2977 Oracle:CVE-2018-2979 Oracle:CVE-2018-2980 Oracle:CVE-2018-2981 Oracle:CVE-2018-2982 Oracle:CVE-2018-2984 Oracle:CVE-2018-2985 Oracle:CVE-2018-2986 Oracle:CVE-2018-2987 Oracle:CVE-2018-2988 Oracle:CVE-2018-2989 Oracle:CVE-2018-2990 Oracle:CVE-2018-2991 Oracle:CVE-2018-2992 Oracle:CVE-2018-2993 Oracle:CVE-2018-2994 Oracle:CVE-2018-2995 Oracle:CVE-2018-2996 Oracle:CVE-2018-2997 Oracle:CVE-2018-2998 Oracle:CVE-2018-2999 Oracle:CVE-2018-3000 Oracle:CVE-2018-3001 Oracle:CVE-2018-3002 Oracle:CVE-2018-3003 Oracle:CVE-2018-3004 Oracle:CVE-2018-3005 Oracle:CVE-2018-3006 Oracle:CVE-2018-3007 Oracle:CVE-2018-3008 Oracle:CVE-2018-3009 Oracle:CVE-2018-3010 Oracle:CVE-2018-3011 Oracle:CVE-2018-3012 Oracle:CVE-2018-3013 Oracle:CVE-2018-3014 Oracle:CVE-2018-3015 Oracle:CVE-2018-3016 Oracle:CVE-2018-3017 Oracle:CVE-2018-3018 Oracle:CVE-2018-3019 Oracle:CVE-2018-3020 Oracle:CVE-2018-3021 Oracle:CVE-2018-3022 Oracle:CVE-2018-3023 Oracle:CVE-2018-3024 Oracle:CVE-2018-3025 Oracle:CVE-2018-3026 Oracle:CVE-2018-3027 Oracle:CVE-2018-3028 Oracle:CVE-2018-3029 Oracle:CVE-2018-3030 Oracle:CVE-2018-3031 Oracle:CVE-2018-3032 Oracle:CVE-2018-3033 Oracle:CVE-2018-3034 Oracle:CVE-2018-3035 Oracle:CVE-2018-3036 Oracle:CVE-2018-3037 Oracle:CVE-2018-3038 Oracle:CVE-2018-3039 Oracle:CVE-2018-3040 Oracle:CVE-2018-3041 Oracle:CVE-2018-3042 Oracle:CVE-2018-3043 Oracle:CVE-2018-3044 Oracle:CVE-2018-3045 Oracle:CVE-2018-3046 Oracle:CVE-2018-3047 Oracle:CVE-2018-3048 Oracle:CVE-2018-3049 Oracle:CVE-2018-3050 Oracle:CVE-2018-3051 Oracle:CVE-2018-3052 Oracle:CVE-2018-3053 Oracle:CVE-2018-3054 Oracle:CVE-2018-3055 Oracle:CVE-2018-3056 Oracle:CVE-2018-3057 Oracle:CVE-2018-3058 Oracle:CVE-2018-3059 Oracle:CVE-2018-3060 Oracle:CVE-2018-3061 Oracle:CVE-2018-3062 Oracle:CVE-2018-3063 Oracle:CVE-2018-3064 Oracle:CVE-2018-3065 Oracle:CVE-2018-3066 Oracle:CVE-2018-3067 Oracle:CVE-2018-3068 Oracle:CVE-2018-3069 Oracle:CVE-2018-3070 Oracle:CVE-2018-3071 Oracle:CVE-2018-3072 Oracle:CVE-2018-3073 Oracle:CVE-2018-3074 Oracle:CVE-2018-3075 Oracle:CVE-2018-3076 Oracle:CVE-2018-3077 Oracle:CVE-2018-3078 Oracle:CVE-2018-3079 Oracle:CVE-2018-3080 Oracle:CVE-2018-3081 Oracle:CVE-2018-3082 Oracle:CVE-2018-3084 Oracle:CVE-2018-3085 Oracle:CVE-2018-3086 Oracle:CVE-2018-3087 Oracle:CVE-2018-3088 Oracle:CVE-2018-3089 Oracle:CVE-2018-3090 Oracle:CVE-2018-3091 Oracle:CVE-2018-3092 Oracle:CVE-2018-3093 Oracle:CVE-2018-3094 Oracle:CVE-2018-3095 Oracle:CVE-2018-3096 Oracle:CVE-2018-3097 Oracle:CVE-2018-3098 Oracle:CVE-2018-3099 Oracle:CVE-2018-3100 Oracle:CVE-2018-3101 Oracle:CVE-2018-3102 Oracle:CVE-2018-3103 Oracle:CVE-2018-3104 Oracle:CVE-2018-3105 Oracle:CVE-2018-3108 Oracle:CVE-2018-3109 Oracle:CVE-2018-3115 Oracle:CVE-2018-3122 Oracle:CVE-2018-3126 Oracle:CVE-2018-3127 Oracle:CVE-2018-3128 Oracle:CVE-2018-3129 Oracle:CVE-2018-3130 Oracle:CVE-2018-3131 Oracle:CVE-2018-3132 Oracle:CVE-2018-3133 Oracle:CVE-2018-3134 Oracle:CVE-2018-3135 Oracle:CVE-2018-3136 Oracle:CVE-2018-3137 Oracle:CVE-2018-3138 Oracle:CVE-2018-3139 Oracle:CVE-2018-3140 Oracle:CVE-2018-3141 Oracle:CVE-2018-3142 Oracle:CVE-2018-3143 Oracle:CVE-2018-3144 Oracle:CVE-2018-3145 Oracle:CVE-2018-3146 Oracle:CVE-2018-3147 Oracle:CVE-2018-3148 Oracle:CVE-2018-3149 Oracle:CVE-2018-3150 Oracle:CVE-2018-3151 Oracle:CVE-2018-3152 Oracle:CVE-2018-3153 Oracle:CVE-2018-3154 Oracle:CVE-2018-3155 Oracle:CVE-2018-3156 Oracle:CVE-2018-3157 Oracle:CVE-2018-3158 Oracle:CVE-2018-3159 Oracle:CVE-2018-3160 Oracle:CVE-2018-3161 Oracle:CVE-2018-3162 Oracle:CVE-2018-3163 Oracle:CVE-2018-3164 Oracle:CVE-2018-3165 Oracle:CVE-2018-3166 Oracle:CVE-2018-3167 Oracle:CVE-2018-3168 Oracle:CVE-2018-3169 Oracle:CVE-2018-3170 Oracle:CVE-2018-3171 Oracle:CVE-2018-3172 Oracle:CVE-2018-3173 Oracle:CVE-2018-3174 Oracle:CVE-2018-3175 Oracle:CVE-2018-3176 Oracle:CVE-2018-3177 Oracle:CVE-2018-3178 Oracle:CVE-2018-3179 Oracle:CVE-2018-3180 Oracle:CVE-2018-3181 Oracle:CVE-2018-3182 Oracle:CVE-2018-3183 Oracle:CVE-2018-3184 Oracle:CVE-2018-3185 Oracle:CVE-2018-3186 Oracle:CVE-2018-3187 Oracle:CVE-2018-3188 Oracle:CVE-2018-3189 Oracle:CVE-2018-3190 Oracle:CVE-2018-3191 Oracle:CVE-2018-3192 Oracle:CVE-2018-3193 Oracle:CVE-2018-3194 Oracle:CVE-2018-3195 Oracle:CVE-2018-3196 Oracle:CVE-2018-3197 Oracle:CVE-2018-3198 Oracle:CVE-2018-3200 Oracle:CVE-2018-3201 Oracle:CVE-2018-3202 Oracle:CVE-2018-3203 Oracle:CVE-2018-3204 Oracle:CVE-2018-3205 Oracle:CVE-2018-3206 Oracle:CVE-2018-3207 Oracle:CVE-2018-3208 Oracle:CVE-2018-3209 Oracle:CVE-2018-3210 Oracle:CVE-2018-3211 Oracle:CVE-2018-3212 Oracle:CVE-2018-3213 Oracle:CVE-2018-3214 Oracle:CVE-2018-3215 Oracle:CVE-2018-3217 Oracle:CVE-2018-3218 Oracle:CVE-2018-3219 Oracle:CVE-2018-3220 Oracle:CVE-2018-3221 Oracle:CVE-2018-3222 Oracle:CVE-2018-3223 Oracle:CVE-2018-3224 Oracle:CVE-2018-3225 Oracle:CVE-2018-3226 Oracle:CVE-2018-3227 Oracle:CVE-2018-3228 Oracle:CVE-2018-3229 Oracle:CVE-2018-3230 Oracle:CVE-2018-3231 Oracle:CVE-2018-3232 Oracle:CVE-2018-3233 Oracle:CVE-2018-3234 Oracle:CVE-2018-3235 Oracle:CVE-2018-3236 Oracle:CVE-2018-3237 Oracle:CVE-2018-3238 Oracle:CVE-2018-3239 Oracle:CVE-2018-3241 Oracle:CVE-2018-3242 Oracle:CVE-2018-3243 Oracle:CVE-2018-3244 Oracle:CVE-2018-3245 Oracle:CVE-2018-3246 Oracle:CVE-2018-3247 Oracle:CVE-2018-3248 Oracle:CVE-2018-3249 Oracle:CVE-2018-3250 Oracle:CVE-2018-3251 Oracle:CVE-2018-3252 Oracle:CVE-2018-3253 Oracle:CVE-2018-3254 Oracle:CVE-2018-3255 Oracle:CVE-2018-3256 Oracle:CVE-2018-3257 Oracle:CVE-2018-3258 Oracle:CVE-2018-3259 Oracle:CVE-2018-3261 Oracle:CVE-2018-3262 Oracle:CVE-2018-3263 Oracle:CVE-2018-3264 Oracle:CVE-2018-3265 Oracle:CVE-2018-3266 Oracle:CVE-2018-3267 Oracle:CVE-2018-3268 Oracle:CVE-2018-3269 Oracle:CVE-2018-3270 Oracle:CVE-2018-3271 Oracle:CVE-2018-3272 Oracle:CVE-2018-3273 Oracle:CVE-2018-3274 Oracle:CVE-2018-3275 Oracle:CVE-2018-3276 Oracle:CVE-2018-3277 Oracle:CVE-2018-3278 Oracle:CVE-2018-3279 Oracle:CVE-2018-3280 Oracle:CVE-2018-3281 Oracle:CVE-2018-3282 Oracle:CVE-2018-3283 Oracle:CVE-2018-3284 Oracle:CVE-2018-3285 Oracle:CVE-2018-3286 Oracle:CVE-2018-3287 Oracle:CVE-2018-3288 Oracle:CVE-2018-3289 Oracle:CVE-2018-3290 Oracle:CVE-2018-3291 Oracle:CVE-2018-3292 Oracle:CVE-2018-3293 Oracle:CVE-2018-3294 Oracle:CVE-2018-3295 Oracle:CVE-2018-3296 Oracle:CVE-2018-3297 Oracle:CVE-2018-3298 Oracle:CVE-2018-3299 Oracle:CVE-2018-3301 Oracle:CVE-2018-3302 Oracle:CVE-2018-7489 Oracle:CVE-2018-8013 Oracle:CVE-2018-8014 Oracle:CVE-2018-8037 RH:CVE-2017-13077 RH:CVE-2017-13078 RH:CVE-2017-13079 RH:CVE-2017-13080 RH:CVE-2017-13081 RH:CVE-2017-13082 RH:CVE-2017-13084 RH:CVE-2017-13086 RH:CVE-2017-13087 RH:CVE-2017-13088 RHSA-2017:2907 RHSA-2017:2911 SECTRACK:1039570 SECTRACK:1039571 SECTRACK:1039572 SECTRACK:1039573 SECTRACK:1039576 SECTRACK:1039577 SECTRACK:1039578 SECTRACK:1039581 SECTRACK:1039585 SECTRACK:1039703 SECTRACK:1041432 SMASH Issue 191142 SUSE:SUSE-SU-2017:2745 SUSE:SUSE-SU-2017:2752 SUSE:openSUSE-SU-2017:2755 UBUNTU:CVE-2017-13077 UBUNTU:CVE-2017-13078 UBUNTU:CVE-2017-13079 UBUNTU:CVE-2017-13080 UBUNTU:CVE-2017-13081 UBUNTU:CVE-2017-13082 UBUNTU:CVE-2017-13084 UBUNTU:CVE-2017-13086 UBUNTU:CVE-2017-13087 UBUNTU:CVE-2017-13088 UBUNTU:USN-3455-1 bdo#1033297 bnc#1056061 linux.git:commit:1b72bf5a0777d7cec6c2d857ac15599022b3c123 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 linux.git:commit:fdf7cb4185b60c68e1a75e61691c4afdc15dea0e rh#1167537 rh#1183461 rh#1202366 rh#1202380 rh#1202384 rh#1202395 rh#1202418 rh#1293972 rh#1369383 rh#1384344 rh#1393454 rh#1397485 rh#1399546 rh#1491692 rh#1491693 rh#1491694 rh#1491696 rh#1491697 rh#1491698 rh#1500301 rh#1500302 rh#1500303 rh#1500304 rh#1519780 rh#1553413 rh#1591854 rh#1607582 rh#1608073 rh#1731271 rh#2044599 rh#2044602 rh#2061700 rh#2116175 rh#2119127 rh#2161287 rh#2270497 |
CVE-2017-13079 | kernel-source-rt:Released | important | 8.1 (CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) | BID:101274 CERT-VN:VU#228519 CISCO:20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II CONFIRM:access.redhat.com:CVE-2017-13088 CONFIRM:cert-portal.siemens.com:CVE-2017-13088 CONFIRM:cert.vde.com:CVE-2017-13080 CONFIRM:cert.vde.com:CVE-2017-13088 CONFIRM:portal.msrc.microsoft.com:CVE-2017-13080 CONFIRM:rockwellautomation.custhelp.com:CVE-2017-13082 CONFIRM:source.android.com:CVE-2017-5754 CONFIRM:source.android.com:CVE-2017-6264 CONFIRM:source.android.com:CVE-2017-6294 CONFIRM:support.apple.com:CVE-2017-13852 CONFIRM:support.apple.com:CVE-2017-13904 CONFIRM:support.apple.com:CVE-2017-3169 CONFIRM:support.hpe.com:CVE-2017-13081 CONFIRM:support.lenovo.com:CVE-2017-13088 CONFIRM:www.arubanetworks.com:CVE-2017-13088 CONFIRM:www.intel.com:CVE-2017-13080 CONFIRM:www.oracle.com:CVE-2017-5715 CONFIRM:www.oracle.com:CVE-2017-5753 CONFIRM:www.oracle.com:CVE-2017-6074 CVE-2017-13077 CVE-2017-13078 CVE-2017-13079 CVE-2017-13080 CVE-2017-13081 CVE-2017-13082 CVE-2017-13084 CVE-2017-13086 CVE-2017-13087 CVE-2017-13088 CVE-2024-2466 D:CVE-2022-2590 DSA-3999 DSA-5378 FREEBSD:FreeBSD-SA-17:07 GENTOO:GLSA-201711-03 MISC:github.com:CVE-2017-13082 MISC:github.com:OSS:2024/Q1/256 MISC:ics-cert.us-cert.gov:CVE-2017-13082 MISC:w1.fi MISC:w1.fi:CVE-2017-13088 MISC:www.krackattacks.com:CVE-2017-13088 MLIST:[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update MLIST:[debian-lts-announce] 20181113 [SECURITY] [DLA 1573-1] firmware-nonfree security update OSS:2017/Q4/83 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/11/10/2 OSS:2022/Q3/99 OSS:2022/Q4/132 OSS:2022/Q4/135 OSS:2024/03/27/4 OSS:2024/Q1/256 Oracle:CVE-2011-4461 Oracle:CVE-2013-1768 Oracle:CVE-2014-0114 Oracle:CVE-2014-3490 Oracle:CVE-2014-3577 Oracle:CVE-2015-0204 Oracle:CVE-2015-0235 Oracle:CVE-2015-5600 Oracle:CVE-2015-6937 Oracle:CVE-2015-7501 Oracle:CVE-2015-7940 Oracle:CVE-2015-9251 Oracle:CVE-2016-0635 Oracle:CVE-2016-0714 Oracle:CVE-2016-0729 Oracle:CVE-2016-1000031 Oracle:CVE-2016-1181 Oracle:CVE-2016-1182 Oracle:CVE-2016-2099 Oracle:CVE-2016-2107 Oracle:CVE-2016-2176 Oracle:CVE-2016-2179 Oracle:CVE-2016-2183 Oracle:CVE-2016-3092 Oracle:CVE-2016-3506 Oracle:CVE-2016-4000 Oracle:CVE-2016-4055 Oracle:CVE-2016-5007 Oracle:CVE-2016-5019 Oracle:CVE-2016-5080 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 Oracle:CVE-2016-6304 Oracle:CVE-2016-6814 Oracle:CVE-2016-7103 Oracle:CVE-2016-7167 Oracle:CVE-2016-9843 Oracle:CVE-2016-9878 Oracle:CVE-2017-0379 Oracle:CVE-2017-10068 Oracle:CVE-2017-12617 Oracle:CVE-2017-13077 Oracle:CVE-2017-13082 Oracle:CVE-2017-14735 Oracle:CVE-2017-15095 Oracle:CVE-2017-17562 Oracle:CVE-2017-3633 Oracle:CVE-2017-3736 Oracle:CVE-2017-3737 Oracle:CVE-2017-5533 Oracle:CVE-2017-5645 Oracle:CVE-2017-5662 Oracle:CVE-2017-5664 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2017-6074 Oracle:CVE-2017-7525 Oracle:CVE-2017-7805 Oracle:CVE-2017-9798 Oracle:CVE-2018-0732 Oracle:CVE-2018-0739 Oracle:CVE-2018-1000120 Oracle:CVE-2018-1000300 Oracle:CVE-2018-11039 Oracle:CVE-2018-1171 Oracle:CVE-2018-11776 Oracle:CVE-2018-1258 Oracle:CVE-2018-1275 Oracle:CVE-2018-1305 Oracle:CVE-2018-13785 Oracle:CVE-2018-1656 Oracle:CVE-2018-2563 Oracle:CVE-2018-2572 Oracle:CVE-2018-2587 Oracle:CVE-2018-2598 Oracle:CVE-2018-2628 Oracle:CVE-2018-2718 Oracle:CVE-2018-2737 Oracle:CVE-2018-2738 Oracle:CVE-2018-2739 Oracle:CVE-2018-2742 Oracle:CVE-2018-2746 Oracle:CVE-2018-2747 Oracle:CVE-2018-2748 Oracle:CVE-2018-2749 Oracle:CVE-2018-2750 Oracle:CVE-2018-2752 Oracle:CVE-2018-2753 Oracle:CVE-2018-2754 Oracle:CVE-2018-2755 Oracle:CVE-2018-2756 Oracle:CVE-2018-2758 Oracle:CVE-2018-2759 Oracle:CVE-2018-2760 Oracle:CVE-2018-2761 Oracle:CVE-2018-2762 Oracle:CVE-2018-2763 Oracle:CVE-2018-2764 Oracle:CVE-2018-2765 Oracle:CVE-2018-2766 Oracle:CVE-2018-2767 Oracle:CVE-2018-2768 Oracle:CVE-2018-2769 Oracle:CVE-2018-2770 Oracle:CVE-2018-2771 Oracle:CVE-2018-2772 Oracle:CVE-2018-2773 Oracle:CVE-2018-2774 Oracle:CVE-2018-2775 Oracle:CVE-2018-2776 Oracle:CVE-2018-2777 Oracle:CVE-2018-2778 Oracle:CVE-2018-2779 Oracle:CVE-2018-2780 Oracle:CVE-2018-2781 Oracle:CVE-2018-2782 Oracle:CVE-2018-2783 Oracle:CVE-2018-2784 Oracle:CVE-2018-2785 Oracle:CVE-2018-2786 Oracle:CVE-2018-2787 Oracle:CVE-2018-2788 Oracle:CVE-2018-2789 Oracle:CVE-2018-2790 Oracle:CVE-2018-2791 Oracle:CVE-2018-2792 Oracle:CVE-2018-2793 Oracle:CVE-2018-2794 Oracle:CVE-2018-2795 Oracle:CVE-2018-2796 Oracle:CVE-2018-2797 Oracle:CVE-2018-2798 Oracle:CVE-2018-2799 Oracle:CVE-2018-2800 Oracle:CVE-2018-2801 Oracle:CVE-2018-2804 Oracle:CVE-2018-2805 Oracle:CVE-2018-2806 Oracle:CVE-2018-2807 Oracle:CVE-2018-2808 Oracle:CVE-2018-2809 Oracle:CVE-2018-2810 Oracle:CVE-2018-2811 Oracle:CVE-2018-2812 Oracle:CVE-2018-2813 Oracle:CVE-2018-2814 Oracle:CVE-2018-2815 Oracle:CVE-2018-2816 Oracle:CVE-2018-2817 Oracle:CVE-2018-2818 Oracle:CVE-2018-2819 Oracle:CVE-2018-2820 Oracle:CVE-2018-2821 Oracle:CVE-2018-2822 Oracle:CVE-2018-2823 Oracle:CVE-2018-2825 Oracle:CVE-2018-2826 Oracle:CVE-2018-2827 Oracle:CVE-2018-2828 Oracle:CVE-2018-2830 Oracle:CVE-2018-2831 Oracle:CVE-2018-2832 Oracle:CVE-2018-2834 Oracle:CVE-2018-2835 Oracle:CVE-2018-2836 Oracle:CVE-2018-2837 Oracle:CVE-2018-2838 Oracle:CVE-2018-2839 Oracle:CVE-2018-2840 Oracle:CVE-2018-2841 Oracle:CVE-2018-2842 Oracle:CVE-2018-2843 Oracle:CVE-2018-2844 Oracle:CVE-2018-2845 Oracle:CVE-2018-2846 Oracle:CVE-2018-2849 Oracle:CVE-2018-2850 Oracle:CVE-2018-2852 Oracle:CVE-2018-2854 Oracle:CVE-2018-2855 Oracle:CVE-2018-2856 Oracle:CVE-2018-2857 Oracle:CVE-2018-2858 Oracle:CVE-2018-2859 Oracle:CVE-2018-2860 Oracle:CVE-2018-2861 Oracle:CVE-2018-2862 Oracle:CVE-2018-2863 Oracle:CVE-2018-2864 Oracle:CVE-2018-2865 Oracle:CVE-2018-2866 Oracle:CVE-2018-2867 Oracle:CVE-2018-2868 Oracle:CVE-2018-2869 Oracle:CVE-2018-2870 Oracle:CVE-2018-2871 Oracle:CVE-2018-2872 Oracle:CVE-2018-2873 Oracle:CVE-2018-2874 Oracle:CVE-2018-2876 Oracle:CVE-2018-2877 Oracle:CVE-2018-2878 Oracle:CVE-2018-2879 Oracle:CVE-2018-2881 Oracle:CVE-2018-2882 Oracle:CVE-2018-2887 Oracle:CVE-2018-2888 Oracle:CVE-2018-2889 Oracle:CVE-2018-2891 Oracle:CVE-2018-2892 Oracle:CVE-2018-2893 Oracle:CVE-2018-2894 Oracle:CVE-2018-2895 Oracle:CVE-2018-2896 Oracle:CVE-2018-2897 Oracle:CVE-2018-2898 Oracle:CVE-2018-2899 Oracle:CVE-2018-2900 Oracle:CVE-2018-2901 Oracle:CVE-2018-2902 Oracle:CVE-2018-2903 Oracle:CVE-2018-2904 Oracle:CVE-2018-2905 Oracle:CVE-2018-2906 Oracle:CVE-2018-2907 Oracle:CVE-2018-2908 Oracle:CVE-2018-2909 Oracle:CVE-2018-2911 Oracle:CVE-2018-2912 Oracle:CVE-2018-2913 Oracle:CVE-2018-2914 Oracle:CVE-2018-2915 Oracle:CVE-2018-2916 Oracle:CVE-2018-2917 Oracle:CVE-2018-2918 Oracle:CVE-2018-2919 Oracle:CVE-2018-2920 Oracle:CVE-2018-2921 Oracle:CVE-2018-2922 Oracle:CVE-2018-2923 Oracle:CVE-2018-2924 Oracle:CVE-2018-2925 Oracle:CVE-2018-2926 Oracle:CVE-2018-2927 Oracle:CVE-2018-2928 Oracle:CVE-2018-2929 Oracle:CVE-2018-2930 Oracle:CVE-2018-2932 Oracle:CVE-2018-2933 Oracle:CVE-2018-2934 Oracle:CVE-2018-2935 Oracle:CVE-2018-2936 Oracle:CVE-2018-2937 Oracle:CVE-2018-2938 Oracle:CVE-2018-2939 Oracle:CVE-2018-2940 Oracle:CVE-2018-2941 Oracle:CVE-2018-2942 Oracle:CVE-2018-2943 Oracle:CVE-2018-2944 Oracle:CVE-2018-2945 Oracle:CVE-2018-2946 Oracle:CVE-2018-2947 Oracle:CVE-2018-2948 Oracle:CVE-2018-2949 Oracle:CVE-2018-2950 Oracle:CVE-2018-2951 Oracle:CVE-2018-2952 Oracle:CVE-2018-2953 Oracle:CVE-2018-2954 Oracle:CVE-2018-2955 Oracle:CVE-2018-2956 Oracle:CVE-2018-2957 Oracle:CVE-2018-2958 Oracle:CVE-2018-2959 Oracle:CVE-2018-2960 Oracle:CVE-2018-2961 Oracle:CVE-2018-2962 Oracle:CVE-2018-2963 Oracle:CVE-2018-2964 Oracle:CVE-2018-2965 Oracle:CVE-2018-2966 Oracle:CVE-2018-2967 Oracle:CVE-2018-2968 Oracle:CVE-2018-2969 Oracle:CVE-2018-2970 Oracle:CVE-2018-2971 Oracle:CVE-2018-2972 Oracle:CVE-2018-2973 Oracle:CVE-2018-2974 Oracle:CVE-2018-2975 Oracle:CVE-2018-2976 Oracle:CVE-2018-2977 Oracle:CVE-2018-2979 Oracle:CVE-2018-2980 Oracle:CVE-2018-2981 Oracle:CVE-2018-2982 Oracle:CVE-2018-2984 Oracle:CVE-2018-2985 Oracle:CVE-2018-2986 Oracle:CVE-2018-2987 Oracle:CVE-2018-2988 Oracle:CVE-2018-2989 Oracle:CVE-2018-2990 Oracle:CVE-2018-2991 Oracle:CVE-2018-2992 Oracle:CVE-2018-2993 Oracle:CVE-2018-2994 Oracle:CVE-2018-2995 Oracle:CVE-2018-2996 Oracle:CVE-2018-2997 Oracle:CVE-2018-2998 Oracle:CVE-2018-2999 Oracle:CVE-2018-3000 Oracle:CVE-2018-3001 Oracle:CVE-2018-3002 Oracle:CVE-2018-3003 Oracle:CVE-2018-3004 Oracle:CVE-2018-3005 Oracle:CVE-2018-3006 Oracle:CVE-2018-3007 Oracle:CVE-2018-3008 Oracle:CVE-2018-3009 Oracle:CVE-2018-3010 Oracle:CVE-2018-3011 Oracle:CVE-2018-3012 Oracle:CVE-2018-3013 Oracle:CVE-2018-3014 Oracle:CVE-2018-3015 Oracle:CVE-2018-3016 Oracle:CVE-2018-3017 Oracle:CVE-2018-3018 Oracle:CVE-2018-3019 Oracle:CVE-2018-3020 Oracle:CVE-2018-3021 Oracle:CVE-2018-3022 Oracle:CVE-2018-3023 Oracle:CVE-2018-3024 Oracle:CVE-2018-3025 Oracle:CVE-2018-3026 Oracle:CVE-2018-3027 Oracle:CVE-2018-3028 Oracle:CVE-2018-3029 Oracle:CVE-2018-3030 Oracle:CVE-2018-3031 Oracle:CVE-2018-3032 Oracle:CVE-2018-3033 Oracle:CVE-2018-3034 Oracle:CVE-2018-3035 Oracle:CVE-2018-3036 Oracle:CVE-2018-3037 Oracle:CVE-2018-3038 Oracle:CVE-2018-3039 Oracle:CVE-2018-3040 Oracle:CVE-2018-3041 Oracle:CVE-2018-3042 Oracle:CVE-2018-3043 Oracle:CVE-2018-3044 Oracle:CVE-2018-3045 Oracle:CVE-2018-3046 Oracle:CVE-2018-3047 Oracle:CVE-2018-3048 Oracle:CVE-2018-3049 Oracle:CVE-2018-3050 Oracle:CVE-2018-3051 Oracle:CVE-2018-3052 Oracle:CVE-2018-3053 Oracle:CVE-2018-3054 Oracle:CVE-2018-3055 Oracle:CVE-2018-3056 Oracle:CVE-2018-3057 Oracle:CVE-2018-3058 Oracle:CVE-2018-3059 Oracle:CVE-2018-3060 Oracle:CVE-2018-3061 Oracle:CVE-2018-3062 Oracle:CVE-2018-3063 Oracle:CVE-2018-3064 Oracle:CVE-2018-3065 Oracle:CVE-2018-3066 Oracle:CVE-2018-3067 Oracle:CVE-2018-3068 Oracle:CVE-2018-3069 Oracle:CVE-2018-3070 Oracle:CVE-2018-3071 Oracle:CVE-2018-3072 Oracle:CVE-2018-3073 Oracle:CVE-2018-3074 Oracle:CVE-2018-3075 Oracle:CVE-2018-3076 Oracle:CVE-2018-3077 Oracle:CVE-2018-3078 Oracle:CVE-2018-3079 Oracle:CVE-2018-3080 Oracle:CVE-2018-3081 Oracle:CVE-2018-3082 Oracle:CVE-2018-3084 Oracle:CVE-2018-3085 Oracle:CVE-2018-3086 Oracle:CVE-2018-3087 Oracle:CVE-2018-3088 Oracle:CVE-2018-3089 Oracle:CVE-2018-3090 Oracle:CVE-2018-3091 Oracle:CVE-2018-3092 Oracle:CVE-2018-3093 Oracle:CVE-2018-3094 Oracle:CVE-2018-3095 Oracle:CVE-2018-3096 Oracle:CVE-2018-3097 Oracle:CVE-2018-3098 Oracle:CVE-2018-3099 Oracle:CVE-2018-3100 Oracle:CVE-2018-3101 Oracle:CVE-2018-3102 Oracle:CVE-2018-3103 Oracle:CVE-2018-3104 Oracle:CVE-2018-3105 Oracle:CVE-2018-3108 Oracle:CVE-2018-3109 Oracle:CVE-2018-3115 Oracle:CVE-2018-3122 Oracle:CVE-2018-3126 Oracle:CVE-2018-3127 Oracle:CVE-2018-3128 Oracle:CVE-2018-3129 Oracle:CVE-2018-3130 Oracle:CVE-2018-3131 Oracle:CVE-2018-3132 Oracle:CVE-2018-3133 Oracle:CVE-2018-3134 Oracle:CVE-2018-3135 Oracle:CVE-2018-3136 Oracle:CVE-2018-3137 Oracle:CVE-2018-3138 Oracle:CVE-2018-3139 Oracle:CVE-2018-3140 Oracle:CVE-2018-3141 Oracle:CVE-2018-3142 Oracle:CVE-2018-3143 Oracle:CVE-2018-3144 Oracle:CVE-2018-3145 Oracle:CVE-2018-3146 Oracle:CVE-2018-3147 Oracle:CVE-2018-3148 Oracle:CVE-2018-3149 Oracle:CVE-2018-3150 Oracle:CVE-2018-3151 Oracle:CVE-2018-3152 Oracle:CVE-2018-3153 Oracle:CVE-2018-3154 Oracle:CVE-2018-3155 Oracle:CVE-2018-3156 Oracle:CVE-2018-3157 Oracle:CVE-2018-3158 Oracle:CVE-2018-3159 Oracle:CVE-2018-3160 Oracle:CVE-2018-3161 Oracle:CVE-2018-3162 Oracle:CVE-2018-3163 Oracle:CVE-2018-3164 Oracle:CVE-2018-3165 Oracle:CVE-2018-3166 Oracle:CVE-2018-3167 Oracle:CVE-2018-3168 Oracle:CVE-2018-3169 Oracle:CVE-2018-3170 Oracle:CVE-2018-3171 Oracle:CVE-2018-3172 Oracle:CVE-2018-3173 Oracle:CVE-2018-3174 Oracle:CVE-2018-3175 Oracle:CVE-2018-3176 Oracle:CVE-2018-3177 Oracle:CVE-2018-3178 Oracle:CVE-2018-3179 Oracle:CVE-2018-3180 Oracle:CVE-2018-3181 Oracle:CVE-2018-3182 Oracle:CVE-2018-3183 Oracle:CVE-2018-3184 Oracle:CVE-2018-3185 Oracle:CVE-2018-3186 Oracle:CVE-2018-3187 Oracle:CVE-2018-3188 Oracle:CVE-2018-3189 Oracle:CVE-2018-3190 Oracle:CVE-2018-3191 Oracle:CVE-2018-3192 Oracle:CVE-2018-3193 Oracle:CVE-2018-3194 Oracle:CVE-2018-3195 Oracle:CVE-2018-3196 Oracle:CVE-2018-3197 Oracle:CVE-2018-3198 Oracle:CVE-2018-3200 Oracle:CVE-2018-3201 Oracle:CVE-2018-3202 Oracle:CVE-2018-3203 Oracle:CVE-2018-3204 Oracle:CVE-2018-3205 Oracle:CVE-2018-3206 Oracle:CVE-2018-3207 Oracle:CVE-2018-3208 Oracle:CVE-2018-3209 Oracle:CVE-2018-3210 Oracle:CVE-2018-3211 Oracle:CVE-2018-3212 Oracle:CVE-2018-3213 Oracle:CVE-2018-3214 Oracle:CVE-2018-3215 Oracle:CVE-2018-3217 Oracle:CVE-2018-3218 Oracle:CVE-2018-3219 Oracle:CVE-2018-3220 Oracle:CVE-2018-3221 Oracle:CVE-2018-3222 Oracle:CVE-2018-3223 Oracle:CVE-2018-3224 Oracle:CVE-2018-3225 Oracle:CVE-2018-3226 Oracle:CVE-2018-3227 Oracle:CVE-2018-3228 Oracle:CVE-2018-3229 Oracle:CVE-2018-3230 Oracle:CVE-2018-3231 Oracle:CVE-2018-3232 Oracle:CVE-2018-3233 Oracle:CVE-2018-3234 Oracle:CVE-2018-3235 Oracle:CVE-2018-3236 Oracle:CVE-2018-3237 Oracle:CVE-2018-3238 Oracle:CVE-2018-3239 Oracle:CVE-2018-3241 Oracle:CVE-2018-3242 Oracle:CVE-2018-3243 Oracle:CVE-2018-3244 Oracle:CVE-2018-3245 Oracle:CVE-2018-3246 Oracle:CVE-2018-3247 Oracle:CVE-2018-3248 Oracle:CVE-2018-3249 Oracle:CVE-2018-3250 Oracle:CVE-2018-3251 Oracle:CVE-2018-3252 Oracle:CVE-2018-3253 Oracle:CVE-2018-3254 Oracle:CVE-2018-3255 Oracle:CVE-2018-3256 Oracle:CVE-2018-3257 Oracle:CVE-2018-3258 Oracle:CVE-2018-3259 Oracle:CVE-2018-3261 Oracle:CVE-2018-3262 Oracle:CVE-2018-3263 Oracle:CVE-2018-3264 Oracle:CVE-2018-3265 Oracle:CVE-2018-3266 Oracle:CVE-2018-3267 Oracle:CVE-2018-3268 Oracle:CVE-2018-3269 Oracle:CVE-2018-3270 Oracle:CVE-2018-3271 Oracle:CVE-2018-3272 Oracle:CVE-2018-3273 Oracle:CVE-2018-3274 Oracle:CVE-2018-3275 Oracle:CVE-2018-3276 Oracle:CVE-2018-3277 Oracle:CVE-2018-3278 Oracle:CVE-2018-3279 Oracle:CVE-2018-3280 Oracle:CVE-2018-3281 Oracle:CVE-2018-3282 Oracle:CVE-2018-3283 Oracle:CVE-2018-3284 Oracle:CVE-2018-3285 Oracle:CVE-2018-3286 Oracle:CVE-2018-3287 Oracle:CVE-2018-3288 Oracle:CVE-2018-3289 Oracle:CVE-2018-3290 Oracle:CVE-2018-3291 Oracle:CVE-2018-3292 Oracle:CVE-2018-3293 Oracle:CVE-2018-3294 Oracle:CVE-2018-3295 Oracle:CVE-2018-3296 Oracle:CVE-2018-3297 Oracle:CVE-2018-3298 Oracle:CVE-2018-3299 Oracle:CVE-2018-3301 Oracle:CVE-2018-3302 Oracle:CVE-2018-7489 Oracle:CVE-2018-8013 Oracle:CVE-2018-8014 Oracle:CVE-2018-8037 RH:CVE-2017-13077 RH:CVE-2017-13078 RH:CVE-2017-13079 RH:CVE-2017-13080 RH:CVE-2017-13081 RH:CVE-2017-13082 RH:CVE-2017-13084 RH:CVE-2017-13086 RH:CVE-2017-13087 RH:CVE-2017-13088 RHSA-2017:2907 RHSA-2017:2911 SECTRACK:1039570 SECTRACK:1039571 SECTRACK:1039572 SECTRACK:1039573 SECTRACK:1039576 SECTRACK:1039577 SECTRACK:1039578 SECTRACK:1039581 SECTRACK:1039585 SECTRACK:1039703 SECTRACK:1041432 SMASH Issue 191142 SUSE:SUSE-SU-2017:2745 SUSE:SUSE-SU-2017:2752 SUSE:openSUSE-SU-2017:2755 UBUNTU:CVE-2017-13077 UBUNTU:CVE-2017-13078 UBUNTU:CVE-2017-13079 UBUNTU:CVE-2017-13080 UBUNTU:CVE-2017-13081 UBUNTU:CVE-2017-13082 UBUNTU:CVE-2017-13084 UBUNTU:CVE-2017-13086 UBUNTU:CVE-2017-13087 UBUNTU:CVE-2017-13088 UBUNTU:USN-3455-1 bdo#1033297 bnc#1056061 linux.git:commit:1b72bf5a0777d7cec6c2d857ac15599022b3c123 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 linux.git:commit:fdf7cb4185b60c68e1a75e61691c4afdc15dea0e rh#1167537 rh#1183461 rh#1202366 rh#1202380 rh#1202384 rh#1202395 rh#1202418 rh#1293972 rh#1369383 rh#1384344 rh#1393454 rh#1397485 rh#1399546 rh#1491692 rh#1491693 rh#1491694 rh#1491696 rh#1491697 rh#1491698 rh#1500301 rh#1500302 rh#1500303 rh#1500304 rh#1519780 rh#1553413 rh#1591854 rh#1607582 rh#1608073 rh#1731271 rh#2044599 rh#2044602 rh#2061700 rh#2116175 rh#2119127 rh#2161287 rh#2270497 |
CVE-2017-13080 | kernel-source-rt:Released | important | 8.1 (CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) | BID:101274 CERT-VN:VU#228519 CISCO:20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II CONFIRM:access.redhat.com:CVE-2017-13088 CONFIRM:cert-portal.siemens.com:CVE-2017-13088 CONFIRM:cert.vde.com:CVE-2017-13080 CONFIRM:cert.vde.com:CVE-2017-13088 CONFIRM:portal.msrc.microsoft.com:CVE-2017-13080 CONFIRM:rockwellautomation.custhelp.com:CVE-2017-13082 CONFIRM:source.android.com:CVE-2017-5754 CONFIRM:source.android.com:CVE-2017-6264 CONFIRM:source.android.com:CVE-2017-6294 CONFIRM:support.apple.com:CVE-2017-13852 CONFIRM:support.apple.com:CVE-2017-13904 CONFIRM:support.apple.com:CVE-2017-3169 CONFIRM:support.hpe.com:CVE-2017-13081 CONFIRM:support.lenovo.com:CVE-2017-13088 CONFIRM:www.arubanetworks.com:CVE-2017-13088 CONFIRM:www.intel.com:CVE-2017-13080 CONFIRM:www.oracle.com:CVE-2017-5715 CONFIRM:www.oracle.com:CVE-2017-5753 CONFIRM:www.oracle.com:CVE-2017-6074 CVE-2017-13077 CVE-2017-13078 CVE-2017-13079 CVE-2017-13080 CVE-2017-13081 CVE-2017-13082 CVE-2017-13084 CVE-2017-13086 CVE-2017-13087 CVE-2017-13088 CVE-2024-2466 D:CVE-2022-2590 DSA-3999 DSA-5378 FREEBSD:FreeBSD-SA-17:07 GENTOO:GLSA-201711-03 MISC:git.kernel.org:OSS:2020/Q1/69 MISC:github.com:CVE-2017-13082 MISC:github.com:OSS:2024/Q1/256 MISC:ics-cert.us-cert.gov:CVE-2017-13082 MISC:w1.fi MISC:w1.fi:CVE-2017-13088 MISC:www.krackattacks.com:CVE-2017-13088 MLIST:[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update MLIST:[debian-lts-announce] 20181113 [SECURITY] [DLA 1573-1] firmware-nonfree security update OSS:2017/Q4/83 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/11/10/2 OSS:2022/Q3/99 OSS:2022/Q4/132 OSS:2022/Q4/135 OSS:2024/03/27/4 OSS:2024/Q1/256 Oracle:CVE-2011-4461 Oracle:CVE-2013-1768 Oracle:CVE-2014-0114 Oracle:CVE-2014-3490 Oracle:CVE-2014-3577 Oracle:CVE-2015-0204 Oracle:CVE-2015-0235 Oracle:CVE-2015-5600 Oracle:CVE-2015-6937 Oracle:CVE-2015-7501 Oracle:CVE-2015-7940 Oracle:CVE-2015-9251 Oracle:CVE-2016-0635 Oracle:CVE-2016-0714 Oracle:CVE-2016-0729 Oracle:CVE-2016-1000031 Oracle:CVE-2016-1181 Oracle:CVE-2016-1182 Oracle:CVE-2016-2099 Oracle:CVE-2016-2107 Oracle:CVE-2016-2176 Oracle:CVE-2016-2179 Oracle:CVE-2016-2183 Oracle:CVE-2016-3092 Oracle:CVE-2016-3506 Oracle:CVE-2016-4000 Oracle:CVE-2016-4055 Oracle:CVE-2016-5007 Oracle:CVE-2016-5019 Oracle:CVE-2016-5080 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 Oracle:CVE-2016-6304 Oracle:CVE-2016-6814 Oracle:CVE-2016-7103 Oracle:CVE-2016-7167 Oracle:CVE-2016-9843 Oracle:CVE-2016-9878 Oracle:CVE-2017-0379 Oracle:CVE-2017-10068 Oracle:CVE-2017-12617 Oracle:CVE-2017-13077 Oracle:CVE-2017-13082 Oracle:CVE-2017-14735 Oracle:CVE-2017-15095 Oracle:CVE-2017-17558 Oracle:CVE-2017-17562 Oracle:CVE-2017-3633 Oracle:CVE-2017-3736 Oracle:CVE-2017-3737 Oracle:CVE-2017-5533 Oracle:CVE-2017-5645 Oracle:CVE-2017-5662 Oracle:CVE-2017-5664 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2017-5754 Oracle:CVE-2017-6074 Oracle:CVE-2017-7525 Oracle:CVE-2017-7805 Oracle:CVE-2017-9798 Oracle:CVE-2018-0732 Oracle:CVE-2018-0739 Oracle:CVE-2018-1000120 Oracle:CVE-2018-1000300 Oracle:CVE-2018-11039 Oracle:CVE-2018-1171 Oracle:CVE-2018-11776 Oracle:CVE-2018-1258 Oracle:CVE-2018-1275 Oracle:CVE-2018-1305 Oracle:CVE-2018-13785 Oracle:CVE-2018-1656 Oracle:CVE-2018-2563 Oracle:CVE-2018-2572 Oracle:CVE-2018-2587 Oracle:CVE-2018-2598 Oracle:CVE-2018-2628 Oracle:CVE-2018-2718 Oracle:CVE-2018-2737 Oracle:CVE-2018-2738 Oracle:CVE-2018-2739 Oracle:CVE-2018-2742 Oracle:CVE-2018-2746 Oracle:CVE-2018-2747 Oracle:CVE-2018-2748 Oracle:CVE-2018-2749 Oracle:CVE-2018-2750 Oracle:CVE-2018-2752 Oracle:CVE-2018-2753 Oracle:CVE-2018-2754 Oracle:CVE-2018-2755 Oracle:CVE-2018-2756 Oracle:CVE-2018-2758 Oracle:CVE-2018-2759 Oracle:CVE-2018-2760 Oracle:CVE-2018-2761 Oracle:CVE-2018-2762 Oracle:CVE-2018-2763 Oracle:CVE-2018-2764 Oracle:CVE-2018-2765 Oracle:CVE-2018-2766 Oracle:CVE-2018-2767 Oracle:CVE-2018-2768 Oracle:CVE-2018-2769 Oracle:CVE-2018-2770 Oracle:CVE-2018-2771 Oracle:CVE-2018-2772 Oracle:CVE-2018-2773 Oracle:CVE-2018-2774 Oracle:CVE-2018-2775 Oracle:CVE-2018-2776 Oracle:CVE-2018-2777 Oracle:CVE-2018-2778 Oracle:CVE-2018-2779 Oracle:CVE-2018-2780 Oracle:CVE-2018-2781 Oracle:CVE-2018-2782 Oracle:CVE-2018-2783 Oracle:CVE-2018-2784 Oracle:CVE-2018-2785 Oracle:CVE-2018-2786 Oracle:CVE-2018-2787 Oracle:CVE-2018-2788 Oracle:CVE-2018-2789 Oracle:CVE-2018-2790 Oracle:CVE-2018-2791 Oracle:CVE-2018-2792 Oracle:CVE-2018-2793 Oracle:CVE-2018-2794 Oracle:CVE-2018-2795 Oracle:CVE-2018-2796 Oracle:CVE-2018-2797 Oracle:CVE-2018-2798 Oracle:CVE-2018-2799 Oracle:CVE-2018-2800 Oracle:CVE-2018-2801 Oracle:CVE-2018-2804 Oracle:CVE-2018-2805 Oracle:CVE-2018-2806 Oracle:CVE-2018-2807 Oracle:CVE-2018-2808 Oracle:CVE-2018-2809 Oracle:CVE-2018-2810 Oracle:CVE-2018-2811 Oracle:CVE-2018-2812 Oracle:CVE-2018-2813 Oracle:CVE-2018-2814 Oracle:CVE-2018-2815 Oracle:CVE-2018-2816 Oracle:CVE-2018-2817 Oracle:CVE-2018-2818 Oracle:CVE-2018-2819 Oracle:CVE-2018-2820 Oracle:CVE-2018-2821 Oracle:CVE-2018-2822 Oracle:CVE-2018-2823 Oracle:CVE-2018-2825 Oracle:CVE-2018-2826 Oracle:CVE-2018-2827 Oracle:CVE-2018-2828 Oracle:CVE-2018-2830 Oracle:CVE-2018-2831 Oracle:CVE-2018-2832 Oracle:CVE-2018-2834 Oracle:CVE-2018-2835 Oracle:CVE-2018-2836 Oracle:CVE-2018-2837 Oracle:CVE-2018-2838 Oracle:CVE-2018-2839 Oracle:CVE-2018-2840 Oracle:CVE-2018-2841 Oracle:CVE-2018-2842 Oracle:CVE-2018-2843 Oracle:CVE-2018-2844 Oracle:CVE-2018-2845 Oracle:CVE-2018-2846 Oracle:CVE-2018-2849 Oracle:CVE-2018-2850 Oracle:CVE-2018-2852 Oracle:CVE-2018-2854 Oracle:CVE-2018-2855 Oracle:CVE-2018-2856 Oracle:CVE-2018-2857 Oracle:CVE-2018-2858 Oracle:CVE-2018-2859 Oracle:CVE-2018-2860 Oracle:CVE-2018-2861 Oracle:CVE-2018-2862 Oracle:CVE-2018-2863 Oracle:CVE-2018-2864 Oracle:CVE-2018-2865 Oracle:CVE-2018-2866 Oracle:CVE-2018-2867 Oracle:CVE-2018-2868 Oracle:CVE-2018-2869 Oracle:CVE-2018-2870 Oracle:CVE-2018-2871 Oracle:CVE-2018-2872 Oracle:CVE-2018-2873 Oracle:CVE-2018-2874 Oracle:CVE-2018-2876 Oracle:CVE-2018-2877 Oracle:CVE-2018-2878 Oracle:CVE-2018-2879 Oracle:CVE-2018-2881 Oracle:CVE-2018-2882 Oracle:CVE-2018-2887 Oracle:CVE-2018-2888 Oracle:CVE-2018-2889 Oracle:CVE-2018-2891 Oracle:CVE-2018-2892 Oracle:CVE-2018-2893 Oracle:CVE-2018-2894 Oracle:CVE-2018-2895 Oracle:CVE-2018-2896 Oracle:CVE-2018-2897 Oracle:CVE-2018-2898 Oracle:CVE-2018-2899 Oracle:CVE-2018-2900 Oracle:CVE-2018-2901 Oracle:CVE-2018-2902 Oracle:CVE-2018-2903 Oracle:CVE-2018-2904 Oracle:CVE-2018-2905 Oracle:CVE-2018-2906 Oracle:CVE-2018-2907 Oracle:CVE-2018-2908 Oracle:CVE-2018-2909 Oracle:CVE-2018-2911 Oracle:CVE-2018-2912 Oracle:CVE-2018-2913 Oracle:CVE-2018-2914 Oracle:CVE-2018-2915 Oracle:CVE-2018-2916 Oracle:CVE-2018-2917 Oracle:CVE-2018-2918 Oracle:CVE-2018-2919 Oracle:CVE-2018-2920 Oracle:CVE-2018-2921 Oracle:CVE-2018-2922 Oracle:CVE-2018-2923 Oracle:CVE-2018-2924 Oracle:CVE-2018-2925 Oracle:CVE-2018-2926 Oracle:CVE-2018-2927 Oracle:CVE-2018-2928 Oracle:CVE-2018-2929 Oracle:CVE-2018-2930 Oracle:CVE-2018-2932 Oracle:CVE-2018-2933 Oracle:CVE-2018-2934 Oracle:CVE-2018-2935 Oracle:CVE-2018-2936 Oracle:CVE-2018-2937 Oracle:CVE-2018-2938 Oracle:CVE-2018-2939 Oracle:CVE-2018-2940 Oracle:CVE-2018-2941 Oracle:CVE-2018-2942 Oracle:CVE-2018-2943 Oracle:CVE-2018-2944 Oracle:CVE-2018-2945 Oracle:CVE-2018-2946 Oracle:CVE-2018-2947 Oracle:CVE-2018-2948 Oracle:CVE-2018-2949 Oracle:CVE-2018-2950 Oracle:CVE-2018-2951 Oracle:CVE-2018-2952 Oracle:CVE-2018-2953 Oracle:CVE-2018-2954 Oracle:CVE-2018-2955 Oracle:CVE-2018-2956 Oracle:CVE-2018-2957 Oracle:CVE-2018-2958 Oracle:CVE-2018-2959 Oracle:CVE-2018-2960 Oracle:CVE-2018-2961 Oracle:CVE-2018-2962 Oracle:CVE-2018-2963 Oracle:CVE-2018-2964 Oracle:CVE-2018-2965 Oracle:CVE-2018-2966 Oracle:CVE-2018-2967 Oracle:CVE-2018-2968 Oracle:CVE-2018-2969 Oracle:CVE-2018-2970 Oracle:CVE-2018-2971 Oracle:CVE-2018-2972 Oracle:CVE-2018-2973 Oracle:CVE-2018-2974 Oracle:CVE-2018-2975 Oracle:CVE-2018-2976 Oracle:CVE-2018-2977 Oracle:CVE-2018-2979 Oracle:CVE-2018-2980 Oracle:CVE-2018-2981 Oracle:CVE-2018-2982 Oracle:CVE-2018-2984 Oracle:CVE-2018-2985 Oracle:CVE-2018-2986 Oracle:CVE-2018-2987 Oracle:CVE-2018-2988 Oracle:CVE-2018-2989 Oracle:CVE-2018-2990 Oracle:CVE-2018-2991 Oracle:CVE-2018-2992 Oracle:CVE-2018-2993 Oracle:CVE-2018-2994 Oracle:CVE-2018-2995 Oracle:CVE-2018-2996 Oracle:CVE-2018-2997 Oracle:CVE-2018-2998 Oracle:CVE-2018-2999 Oracle:CVE-2018-3000 Oracle:CVE-2018-3001 Oracle:CVE-2018-3002 Oracle:CVE-2018-3003 Oracle:CVE-2018-3004 Oracle:CVE-2018-3005 Oracle:CVE-2018-3006 Oracle:CVE-2018-3007 Oracle:CVE-2018-3008 Oracle:CVE-2018-3009 Oracle:CVE-2018-3010 Oracle:CVE-2018-3011 Oracle:CVE-2018-3012 Oracle:CVE-2018-3013 Oracle:CVE-2018-3014 Oracle:CVE-2018-3015 Oracle:CVE-2018-3016 Oracle:CVE-2018-3017 Oracle:CVE-2018-3018 Oracle:CVE-2018-3019 Oracle:CVE-2018-3020 Oracle:CVE-2018-3021 Oracle:CVE-2018-3022 Oracle:CVE-2018-3023 Oracle:CVE-2018-3024 Oracle:CVE-2018-3025 Oracle:CVE-2018-3026 Oracle:CVE-2018-3027 Oracle:CVE-2018-3028 Oracle:CVE-2018-3029 Oracle:CVE-2018-3030 Oracle:CVE-2018-3031 Oracle:CVE-2018-3032 Oracle:CVE-2018-3033 Oracle:CVE-2018-3034 Oracle:CVE-2018-3035 Oracle:CVE-2018-3036 Oracle:CVE-2018-3037 Oracle:CVE-2018-3038 Oracle:CVE-2018-3039 Oracle:CVE-2018-3040 Oracle:CVE-2018-3041 Oracle:CVE-2018-3042 Oracle:CVE-2018-3043 Oracle:CVE-2018-3044 Oracle:CVE-2018-3045 Oracle:CVE-2018-3046 Oracle:CVE-2018-3047 Oracle:CVE-2018-3048 Oracle:CVE-2018-3049 Oracle:CVE-2018-3050 Oracle:CVE-2018-3051 Oracle:CVE-2018-3052 Oracle:CVE-2018-3053 Oracle:CVE-2018-3054 Oracle:CVE-2018-3055 Oracle:CVE-2018-3056 Oracle:CVE-2018-3057 Oracle:CVE-2018-3058 Oracle:CVE-2018-3059 Oracle:CVE-2018-3060 Oracle:CVE-2018-3061 Oracle:CVE-2018-3062 Oracle:CVE-2018-3063 Oracle:CVE-2018-3064 Oracle:CVE-2018-3065 Oracle:CVE-2018-3066 Oracle:CVE-2018-3067 Oracle:CVE-2018-3068 Oracle:CVE-2018-3069 Oracle:CVE-2018-3070 Oracle:CVE-2018-3071 Oracle:CVE-2018-3072 Oracle:CVE-2018-3073 Oracle:CVE-2018-3074 Oracle:CVE-2018-3075 Oracle:CVE-2018-3076 Oracle:CVE-2018-3077 Oracle:CVE-2018-3078 Oracle:CVE-2018-3079 Oracle:CVE-2018-3080 Oracle:CVE-2018-3081 Oracle:CVE-2018-3082 Oracle:CVE-2018-3084 Oracle:CVE-2018-3085 Oracle:CVE-2018-3086 Oracle:CVE-2018-3087 Oracle:CVE-2018-3088 Oracle:CVE-2018-3089 Oracle:CVE-2018-3090 Oracle:CVE-2018-3091 Oracle:CVE-2018-3092 Oracle:CVE-2018-3093 Oracle:CVE-2018-3094 Oracle:CVE-2018-3095 Oracle:CVE-2018-3096 Oracle:CVE-2018-3097 Oracle:CVE-2018-3098 Oracle:CVE-2018-3099 Oracle:CVE-2018-3100 Oracle:CVE-2018-3101 Oracle:CVE-2018-3102 Oracle:CVE-2018-3103 Oracle:CVE-2018-3104 Oracle:CVE-2018-3105 Oracle:CVE-2018-3108 Oracle:CVE-2018-3109 Oracle:CVE-2018-3115 Oracle:CVE-2018-3122 Oracle:CVE-2018-3126 Oracle:CVE-2018-3127 Oracle:CVE-2018-3128 Oracle:CVE-2018-3129 Oracle:CVE-2018-3130 Oracle:CVE-2018-3131 Oracle:CVE-2018-3132 Oracle:CVE-2018-3133 Oracle:CVE-2018-3134 Oracle:CVE-2018-3135 Oracle:CVE-2018-3136 Oracle:CVE-2018-3137 Oracle:CVE-2018-3138 Oracle:CVE-2018-3139 Oracle:CVE-2018-3140 Oracle:CVE-2018-3141 Oracle:CVE-2018-3142 Oracle:CVE-2018-3143 Oracle:CVE-2018-3144 Oracle:CVE-2018-3145 Oracle:CVE-2018-3146 Oracle:CVE-2018-3147 Oracle:CVE-2018-3148 Oracle:CVE-2018-3149 Oracle:CVE-2018-3150 Oracle:CVE-2018-3151 Oracle:CVE-2018-3152 Oracle:CVE-2018-3153 Oracle:CVE-2018-3154 Oracle:CVE-2018-3155 Oracle:CVE-2018-3156 Oracle:CVE-2018-3157 Oracle:CVE-2018-3158 Oracle:CVE-2018-3159 Oracle:CVE-2018-3160 Oracle:CVE-2018-3161 Oracle:CVE-2018-3162 Oracle:CVE-2018-3163 Oracle:CVE-2018-3164 Oracle:CVE-2018-3165 Oracle:CVE-2018-3166 Oracle:CVE-2018-3167 Oracle:CVE-2018-3168 Oracle:CVE-2018-3169 Oracle:CVE-2018-3170 Oracle:CVE-2018-3171 Oracle:CVE-2018-3172 Oracle:CVE-2018-3173 Oracle:CVE-2018-3174 Oracle:CVE-2018-3175 Oracle:CVE-2018-3176 Oracle:CVE-2018-3177 Oracle:CVE-2018-3178 Oracle:CVE-2018-3179 Oracle:CVE-2018-3180 Oracle:CVE-2018-3181 Oracle:CVE-2018-3182 Oracle:CVE-2018-3183 Oracle:CVE-2018-3184 Oracle:CVE-2018-3185 Oracle:CVE-2018-3186 Oracle:CVE-2018-3187 Oracle:CVE-2018-3188 Oracle:CVE-2018-3189 Oracle:CVE-2018-3190 Oracle:CVE-2018-3191 Oracle:CVE-2018-3192 Oracle:CVE-2018-3193 Oracle:CVE-2018-3194 Oracle:CVE-2018-3195 Oracle:CVE-2018-3196 Oracle:CVE-2018-3197 Oracle:CVE-2018-3198 Oracle:CVE-2018-3200 Oracle:CVE-2018-3201 Oracle:CVE-2018-3202 Oracle:CVE-2018-3203 Oracle:CVE-2018-3204 Oracle:CVE-2018-3205 Oracle:CVE-2018-3206 Oracle:CVE-2018-3207 Oracle:CVE-2018-3208 Oracle:CVE-2018-3209 Oracle:CVE-2018-3210 Oracle:CVE-2018-3211 Oracle:CVE-2018-3212 Oracle:CVE-2018-3213 Oracle:CVE-2018-3214 Oracle:CVE-2018-3215 Oracle:CVE-2018-3217 Oracle:CVE-2018-3218 Oracle:CVE-2018-3219 Oracle:CVE-2018-3220 Oracle:CVE-2018-3221 Oracle:CVE-2018-3222 Oracle:CVE-2018-3223 Oracle:CVE-2018-3224 Oracle:CVE-2018-3225 Oracle:CVE-2018-3226 Oracle:CVE-2018-3227 Oracle:CVE-2018-3228 Oracle:CVE-2018-3229 Oracle:CVE-2018-3230 Oracle:CVE-2018-3231 Oracle:CVE-2018-3232 Oracle:CVE-2018-3233 Oracle:CVE-2018-3234 Oracle:CVE-2018-3235 Oracle:CVE-2018-3236 Oracle:CVE-2018-3237 Oracle:CVE-2018-3238 Oracle:CVE-2018-3239 Oracle:CVE-2018-3241 Oracle:CVE-2018-3242 Oracle:CVE-2018-3243 Oracle:CVE-2018-3244 Oracle:CVE-2018-3245 Oracle:CVE-2018-3246 Oracle:CVE-2018-3247 Oracle:CVE-2018-3248 Oracle:CVE-2018-3249 Oracle:CVE-2018-3250 Oracle:CVE-2018-3251 Oracle:CVE-2018-3252 Oracle:CVE-2018-3253 Oracle:CVE-2018-3254 Oracle:CVE-2018-3255 Oracle:CVE-2018-3256 Oracle:CVE-2018-3257 Oracle:CVE-2018-3258 Oracle:CVE-2018-3259 Oracle:CVE-2018-3261 Oracle:CVE-2018-3262 Oracle:CVE-2018-3263 Oracle:CVE-2018-3264 Oracle:CVE-2018-3265 Oracle:CVE-2018-3266 Oracle:CVE-2018-3267 Oracle:CVE-2018-3268 Oracle:CVE-2018-3269 Oracle:CVE-2018-3270 Oracle:CVE-2018-3271 Oracle:CVE-2018-3272 Oracle:CVE-2018-3273 Oracle:CVE-2018-3274 Oracle:CVE-2018-3275 Oracle:CVE-2018-3276 Oracle:CVE-2018-3277 Oracle:CVE-2018-3278 Oracle:CVE-2018-3279 Oracle:CVE-2018-3280 Oracle:CVE-2018-3281 Oracle:CVE-2018-3282 Oracle:CVE-2018-3283 Oracle:CVE-2018-3284 Oracle:CVE-2018-3285 Oracle:CVE-2018-3286 Oracle:CVE-2018-3287 Oracle:CVE-2018-3288 Oracle:CVE-2018-3289 Oracle:CVE-2018-3290 Oracle:CVE-2018-3291 Oracle:CVE-2018-3292 Oracle:CVE-2018-3293 Oracle:CVE-2018-3294 Oracle:CVE-2018-3295 Oracle:CVE-2018-3296 Oracle:CVE-2018-3297 Oracle:CVE-2018-3298 Oracle:CVE-2018-3299 Oracle:CVE-2018-3301 Oracle:CVE-2018-3302 Oracle:CVE-2018-7489 Oracle:CVE-2018-8013 Oracle:CVE-2018-8014 Oracle:CVE-2018-8037 RH:CVE-2017-13077 RH:CVE-2017-13078 RH:CVE-2017-13079 RH:CVE-2017-13080 RH:CVE-2017-13081 RH:CVE-2017-13082 RH:CVE-2017-13084 RH:CVE-2017-13086 RH:CVE-2017-13087 RH:CVE-2017-13088 RHSA-2017:2907 RHSA-2017:2911 SECTRACK:1039570 SECTRACK:1039571 SECTRACK:1039572 SECTRACK:1039573 SECTRACK:1039576 SECTRACK:1039577 SECTRACK:1039578 SECTRACK:1039581 SECTRACK:1039585 SECTRACK:1039703 SECTRACK:1041432 SMASH Issue 191142 SMASH Issue 193422 SUSE:SUSE-SU-2017:2745 SUSE:SUSE-SU-2017:2752 SUSE:openSUSE-SU-2017:2755 UBUNTU:CVE-2017-13077 UBUNTU:CVE-2017-13078 UBUNTU:CVE-2017-13079 UBUNTU:CVE-2017-13080 UBUNTU:CVE-2017-13081 UBUNTU:CVE-2017-13082 UBUNTU:CVE-2017-13084 UBUNTU:CVE-2017-13086 UBUNTU:CVE-2017-13087 UBUNTU:CVE-2017-13088 UBUNTU:USN-3455-1 bdo#1033297 bnc#1056061 bnc#1063667 bnc#1063671 linux.git:commit:1b72bf5a0777d7cec6c2d857ac15599022b3c123 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b linux.git:commit:5f501d555653f8968011a1e65ebb121c8b43c144 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 linux.git:commit:fdf7cb4185b60c68e1a75e61691c4afdc15dea0e rh#1167537 rh#1183461 rh#1202366 rh#1202380 rh#1202384 rh#1202395 rh#1202418 rh#1293972 rh#1369383 rh#1384344 rh#1393454 rh#1397485 rh#1399546 rh#1462147 rh#1462158 rh#1481178 rh#1491692 rh#1491693 rh#1491694 rh#1491696 rh#1491697 rh#1491698 rh#1500301 rh#1500302 rh#1500303 rh#1500304 rh#1519780 rh#1553413 rh#1591854 rh#1607582 rh#1608073 rh#1731271 rh#2044599 rh#2044602 rh#2061700 rh#2116175 rh#2119127 rh#2161287 rh#2270497 |
CVE-2017-13081 | kernel-source-rt:Released | important | 8.1 (CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) | BID:101274 CERT-VN:VU#228519 CISCO:20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II CONFIRM:access.redhat.com:CVE-2017-13088 CONFIRM:cert-portal.siemens.com:CVE-2017-13088 CONFIRM:cert.vde.com:CVE-2017-13080 CONFIRM:cert.vde.com:CVE-2017-13088 CONFIRM:portal.msrc.microsoft.com:CVE-2017-13080 CONFIRM:rockwellautomation.custhelp.com:CVE-2017-13082 CONFIRM:source.android.com:CVE-2017-5754 CONFIRM:source.android.com:CVE-2017-6264 CONFIRM:source.android.com:CVE-2017-6294 CONFIRM:support.apple.com:CVE-2017-13852 CONFIRM:support.apple.com:CVE-2017-13904 CONFIRM:support.apple.com:CVE-2017-3169 CONFIRM:support.hpe.com:CVE-2017-13081 CONFIRM:support.lenovo.com:CVE-2017-13088 CONFIRM:www.arubanetworks.com:CVE-2017-13088 CONFIRM:www.intel.com:CVE-2017-13080 CONFIRM:www.oracle.com:CVE-2017-5715 CONFIRM:www.oracle.com:CVE-2017-5753 CONFIRM:www.oracle.com:CVE-2017-6074 CVE-2017-13077 CVE-2017-13078 CVE-2017-13079 CVE-2017-13080 CVE-2017-13081 CVE-2017-13082 CVE-2017-13084 CVE-2017-13086 CVE-2017-13087 CVE-2017-13088 CVE-2024-2466 D:CVE-2022-2590 DSA-3999 DSA-5378 FREEBSD:FreeBSD-SA-17:07 GENTOO:GLSA-201711-03 MISC:github.com:CVE-2017-13082 MISC:github.com:OSS:2024/Q1/256 MISC:ics-cert.us-cert.gov:CVE-2017-13082 MISC:w1.fi MISC:w1.fi:CVE-2017-13088 MISC:www.krackattacks.com:CVE-2017-13088 MLIST:[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update MLIST:[debian-lts-announce] 20181113 [SECURITY] [DLA 1573-1] firmware-nonfree security update OSS:2017/Q4/83 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/11/10/2 OSS:2022/Q3/99 OSS:2022/Q4/132 OSS:2022/Q4/135 OSS:2024/03/27/4 OSS:2024/Q1/256 Oracle:CVE-2011-4461 Oracle:CVE-2013-1768 Oracle:CVE-2014-0114 Oracle:CVE-2014-3490 Oracle:CVE-2014-3577 Oracle:CVE-2015-0204 Oracle:CVE-2015-0235 Oracle:CVE-2015-5600 Oracle:CVE-2015-6937 Oracle:CVE-2015-7501 Oracle:CVE-2015-7940 Oracle:CVE-2015-9251 Oracle:CVE-2016-0635 Oracle:CVE-2016-0714 Oracle:CVE-2016-0729 Oracle:CVE-2016-1000031 Oracle:CVE-2016-1181 Oracle:CVE-2016-1182 Oracle:CVE-2016-2099 Oracle:CVE-2016-2107 Oracle:CVE-2016-2176 Oracle:CVE-2016-2179 Oracle:CVE-2016-2183 Oracle:CVE-2016-3092 Oracle:CVE-2016-3506 Oracle:CVE-2016-4000 Oracle:CVE-2016-4055 Oracle:CVE-2016-5007 Oracle:CVE-2016-5019 Oracle:CVE-2016-5080 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 Oracle:CVE-2016-6304 Oracle:CVE-2016-6814 Oracle:CVE-2016-7103 Oracle:CVE-2016-7167 Oracle:CVE-2016-9843 Oracle:CVE-2016-9878 Oracle:CVE-2017-0379 Oracle:CVE-2017-10068 Oracle:CVE-2017-12617 Oracle:CVE-2017-13077 Oracle:CVE-2017-13082 Oracle:CVE-2017-14735 Oracle:CVE-2017-15095 Oracle:CVE-2017-17562 Oracle:CVE-2017-3633 Oracle:CVE-2017-3736 Oracle:CVE-2017-3737 Oracle:CVE-2017-5533 Oracle:CVE-2017-5645 Oracle:CVE-2017-5662 Oracle:CVE-2017-5664 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2017-6074 Oracle:CVE-2017-7525 Oracle:CVE-2017-7805 Oracle:CVE-2017-9798 Oracle:CVE-2018-0732 Oracle:CVE-2018-0739 Oracle:CVE-2018-1000120 Oracle:CVE-2018-1000300 Oracle:CVE-2018-11039 Oracle:CVE-2018-1171 Oracle:CVE-2018-11776 Oracle:CVE-2018-1258 Oracle:CVE-2018-1275 Oracle:CVE-2018-1305 Oracle:CVE-2018-13785 Oracle:CVE-2018-1656 Oracle:CVE-2018-2563 Oracle:CVE-2018-2572 Oracle:CVE-2018-2587 Oracle:CVE-2018-2598 Oracle:CVE-2018-2628 Oracle:CVE-2018-2718 Oracle:CVE-2018-2737 Oracle:CVE-2018-2738 Oracle:CVE-2018-2739 Oracle:CVE-2018-2742 Oracle:CVE-2018-2746 Oracle:CVE-2018-2747 Oracle:CVE-2018-2748 Oracle:CVE-2018-2749 Oracle:CVE-2018-2750 Oracle:CVE-2018-2752 Oracle:CVE-2018-2753 Oracle:CVE-2018-2754 Oracle:CVE-2018-2755 Oracle:CVE-2018-2756 Oracle:CVE-2018-2758 Oracle:CVE-2018-2759 Oracle:CVE-2018-2760 Oracle:CVE-2018-2761 Oracle:CVE-2018-2762 Oracle:CVE-2018-2763 Oracle:CVE-2018-2764 Oracle:CVE-2018-2765 Oracle:CVE-2018-2766 Oracle:CVE-2018-2767 Oracle:CVE-2018-2768 Oracle:CVE-2018-2769 Oracle:CVE-2018-2770 Oracle:CVE-2018-2771 Oracle:CVE-2018-2772 Oracle:CVE-2018-2773 Oracle:CVE-2018-2774 Oracle:CVE-2018-2775 Oracle:CVE-2018-2776 Oracle:CVE-2018-2777 Oracle:CVE-2018-2778 Oracle:CVE-2018-2779 Oracle:CVE-2018-2780 Oracle:CVE-2018-2781 Oracle:CVE-2018-2782 Oracle:CVE-2018-2783 Oracle:CVE-2018-2784 Oracle:CVE-2018-2785 Oracle:CVE-2018-2786 Oracle:CVE-2018-2787 Oracle:CVE-2018-2788 Oracle:CVE-2018-2789 Oracle:CVE-2018-2790 Oracle:CVE-2018-2791 Oracle:CVE-2018-2792 Oracle:CVE-2018-2793 Oracle:CVE-2018-2794 Oracle:CVE-2018-2795 Oracle:CVE-2018-2796 Oracle:CVE-2018-2797 Oracle:CVE-2018-2798 Oracle:CVE-2018-2799 Oracle:CVE-2018-2800 Oracle:CVE-2018-2801 Oracle:CVE-2018-2804 Oracle:CVE-2018-2805 Oracle:CVE-2018-2806 Oracle:CVE-2018-2807 Oracle:CVE-2018-2808 Oracle:CVE-2018-2809 Oracle:CVE-2018-2810 Oracle:CVE-2018-2811 Oracle:CVE-2018-2812 Oracle:CVE-2018-2813 Oracle:CVE-2018-2814 Oracle:CVE-2018-2815 Oracle:CVE-2018-2816 Oracle:CVE-2018-2817 Oracle:CVE-2018-2818 Oracle:CVE-2018-2819 Oracle:CVE-2018-2820 Oracle:CVE-2018-2821 Oracle:CVE-2018-2822 Oracle:CVE-2018-2823 Oracle:CVE-2018-2825 Oracle:CVE-2018-2826 Oracle:CVE-2018-2827 Oracle:CVE-2018-2828 Oracle:CVE-2018-2830 Oracle:CVE-2018-2831 Oracle:CVE-2018-2832 Oracle:CVE-2018-2834 Oracle:CVE-2018-2835 Oracle:CVE-2018-2836 Oracle:CVE-2018-2837 Oracle:CVE-2018-2838 Oracle:CVE-2018-2839 Oracle:CVE-2018-2840 Oracle:CVE-2018-2841 Oracle:CVE-2018-2842 Oracle:CVE-2018-2843 Oracle:CVE-2018-2844 Oracle:CVE-2018-2845 Oracle:CVE-2018-2846 Oracle:CVE-2018-2849 Oracle:CVE-2018-2850 Oracle:CVE-2018-2852 Oracle:CVE-2018-2854 Oracle:CVE-2018-2855 Oracle:CVE-2018-2856 Oracle:CVE-2018-2857 Oracle:CVE-2018-2858 Oracle:CVE-2018-2859 Oracle:CVE-2018-2860 Oracle:CVE-2018-2861 Oracle:CVE-2018-2862 Oracle:CVE-2018-2863 Oracle:CVE-2018-2864 Oracle:CVE-2018-2865 Oracle:CVE-2018-2866 Oracle:CVE-2018-2867 Oracle:CVE-2018-2868 Oracle:CVE-2018-2869 Oracle:CVE-2018-2870 Oracle:CVE-2018-2871 Oracle:CVE-2018-2872 Oracle:CVE-2018-2873 Oracle:CVE-2018-2874 Oracle:CVE-2018-2876 Oracle:CVE-2018-2877 Oracle:CVE-2018-2878 Oracle:CVE-2018-2879 Oracle:CVE-2018-2881 Oracle:CVE-2018-2882 Oracle:CVE-2018-2887 Oracle:CVE-2018-2888 Oracle:CVE-2018-2889 Oracle:CVE-2018-2891 Oracle:CVE-2018-2892 Oracle:CVE-2018-2893 Oracle:CVE-2018-2894 Oracle:CVE-2018-2895 Oracle:CVE-2018-2896 Oracle:CVE-2018-2897 Oracle:CVE-2018-2898 Oracle:CVE-2018-2899 Oracle:CVE-2018-2900 Oracle:CVE-2018-2901 Oracle:CVE-2018-2902 Oracle:CVE-2018-2903 Oracle:CVE-2018-2904 Oracle:CVE-2018-2905 Oracle:CVE-2018-2906 Oracle:CVE-2018-2907 Oracle:CVE-2018-2908 Oracle:CVE-2018-2909 Oracle:CVE-2018-2911 Oracle:CVE-2018-2912 Oracle:CVE-2018-2913 Oracle:CVE-2018-2914 Oracle:CVE-2018-2915 Oracle:CVE-2018-2916 Oracle:CVE-2018-2917 Oracle:CVE-2018-2918 Oracle:CVE-2018-2919 Oracle:CVE-2018-2920 Oracle:CVE-2018-2921 Oracle:CVE-2018-2922 Oracle:CVE-2018-2923 Oracle:CVE-2018-2924 Oracle:CVE-2018-2925 Oracle:CVE-2018-2926 Oracle:CVE-2018-2927 Oracle:CVE-2018-2928 Oracle:CVE-2018-2929 Oracle:CVE-2018-2930 Oracle:CVE-2018-2932 Oracle:CVE-2018-2933 Oracle:CVE-2018-2934 Oracle:CVE-2018-2935 Oracle:CVE-2018-2936 Oracle:CVE-2018-2937 Oracle:CVE-2018-2938 Oracle:CVE-2018-2939 Oracle:CVE-2018-2940 Oracle:CVE-2018-2941 Oracle:CVE-2018-2942 Oracle:CVE-2018-2943 Oracle:CVE-2018-2944 Oracle:CVE-2018-2945 Oracle:CVE-2018-2946 Oracle:CVE-2018-2947 Oracle:CVE-2018-2948 Oracle:CVE-2018-2949 Oracle:CVE-2018-2950 Oracle:CVE-2018-2951 Oracle:CVE-2018-2952 Oracle:CVE-2018-2953 Oracle:CVE-2018-2954 Oracle:CVE-2018-2955 Oracle:CVE-2018-2956 Oracle:CVE-2018-2957 Oracle:CVE-2018-2958 Oracle:CVE-2018-2959 Oracle:CVE-2018-2960 Oracle:CVE-2018-2961 Oracle:CVE-2018-2962 Oracle:CVE-2018-2963 Oracle:CVE-2018-2964 Oracle:CVE-2018-2965 Oracle:CVE-2018-2966 Oracle:CVE-2018-2967 Oracle:CVE-2018-2968 Oracle:CVE-2018-2969 Oracle:CVE-2018-2970 Oracle:CVE-2018-2971 Oracle:CVE-2018-2972 Oracle:CVE-2018-2973 Oracle:CVE-2018-2974 Oracle:CVE-2018-2975 Oracle:CVE-2018-2976 Oracle:CVE-2018-2977 Oracle:CVE-2018-2979 Oracle:CVE-2018-2980 Oracle:CVE-2018-2981 Oracle:CVE-2018-2982 Oracle:CVE-2018-2984 Oracle:CVE-2018-2985 Oracle:CVE-2018-2986 Oracle:CVE-2018-2987 Oracle:CVE-2018-2988 Oracle:CVE-2018-2989 Oracle:CVE-2018-2990 Oracle:CVE-2018-2991 Oracle:CVE-2018-2992 Oracle:CVE-2018-2993 Oracle:CVE-2018-2994 Oracle:CVE-2018-2995 Oracle:CVE-2018-2996 Oracle:CVE-2018-2997 Oracle:CVE-2018-2998 Oracle:CVE-2018-2999 Oracle:CVE-2018-3000 Oracle:CVE-2018-3001 Oracle:CVE-2018-3002 Oracle:CVE-2018-3003 Oracle:CVE-2018-3004 Oracle:CVE-2018-3005 Oracle:CVE-2018-3006 Oracle:CVE-2018-3007 Oracle:CVE-2018-3008 Oracle:CVE-2018-3009 Oracle:CVE-2018-3010 Oracle:CVE-2018-3011 Oracle:CVE-2018-3012 Oracle:CVE-2018-3013 Oracle:CVE-2018-3014 Oracle:CVE-2018-3015 Oracle:CVE-2018-3016 Oracle:CVE-2018-3017 Oracle:CVE-2018-3018 Oracle:CVE-2018-3019 Oracle:CVE-2018-3020 Oracle:CVE-2018-3021 Oracle:CVE-2018-3022 Oracle:CVE-2018-3023 Oracle:CVE-2018-3024 Oracle:CVE-2018-3025 Oracle:CVE-2018-3026 Oracle:CVE-2018-3027 Oracle:CVE-2018-3028 Oracle:CVE-2018-3029 Oracle:CVE-2018-3030 Oracle:CVE-2018-3031 Oracle:CVE-2018-3032 Oracle:CVE-2018-3033 Oracle:CVE-2018-3034 Oracle:CVE-2018-3035 Oracle:CVE-2018-3036 Oracle:CVE-2018-3037 Oracle:CVE-2018-3038 Oracle:CVE-2018-3039 Oracle:CVE-2018-3040 Oracle:CVE-2018-3041 Oracle:CVE-2018-3042 Oracle:CVE-2018-3043 Oracle:CVE-2018-3044 Oracle:CVE-2018-3045 Oracle:CVE-2018-3046 Oracle:CVE-2018-3047 Oracle:CVE-2018-3048 Oracle:CVE-2018-3049 Oracle:CVE-2018-3050 Oracle:CVE-2018-3051 Oracle:CVE-2018-3052 Oracle:CVE-2018-3053 Oracle:CVE-2018-3054 Oracle:CVE-2018-3055 Oracle:CVE-2018-3056 Oracle:CVE-2018-3057 Oracle:CVE-2018-3058 Oracle:CVE-2018-3059 Oracle:CVE-2018-3060 Oracle:CVE-2018-3061 Oracle:CVE-2018-3062 Oracle:CVE-2018-3063 Oracle:CVE-2018-3064 Oracle:CVE-2018-3065 Oracle:CVE-2018-3066 Oracle:CVE-2018-3067 Oracle:CVE-2018-3068 Oracle:CVE-2018-3069 Oracle:CVE-2018-3070 Oracle:CVE-2018-3071 Oracle:CVE-2018-3072 Oracle:CVE-2018-3073 Oracle:CVE-2018-3074 Oracle:CVE-2018-3075 Oracle:CVE-2018-3076 Oracle:CVE-2018-3077 Oracle:CVE-2018-3078 Oracle:CVE-2018-3079 Oracle:CVE-2018-3080 Oracle:CVE-2018-3081 Oracle:CVE-2018-3082 Oracle:CVE-2018-3084 Oracle:CVE-2018-3085 Oracle:CVE-2018-3086 Oracle:CVE-2018-3087 Oracle:CVE-2018-3088 Oracle:CVE-2018-3089 Oracle:CVE-2018-3090 Oracle:CVE-2018-3091 Oracle:CVE-2018-3092 Oracle:CVE-2018-3093 Oracle:CVE-2018-3094 Oracle:CVE-2018-3095 Oracle:CVE-2018-3096 Oracle:CVE-2018-3097 Oracle:CVE-2018-3098 Oracle:CVE-2018-3099 Oracle:CVE-2018-3100 Oracle:CVE-2018-3101 Oracle:CVE-2018-3102 Oracle:CVE-2018-3103 Oracle:CVE-2018-3104 Oracle:CVE-2018-3105 Oracle:CVE-2018-3108 Oracle:CVE-2018-3109 Oracle:CVE-2018-3115 Oracle:CVE-2018-3122 Oracle:CVE-2018-3126 Oracle:CVE-2018-3127 Oracle:CVE-2018-3128 Oracle:CVE-2018-3129 Oracle:CVE-2018-3130 Oracle:CVE-2018-3131 Oracle:CVE-2018-3132 Oracle:CVE-2018-3133 Oracle:CVE-2018-3134 Oracle:CVE-2018-3135 Oracle:CVE-2018-3136 Oracle:CVE-2018-3137 Oracle:CVE-2018-3138 Oracle:CVE-2018-3139 Oracle:CVE-2018-3140 Oracle:CVE-2018-3141 Oracle:CVE-2018-3142 Oracle:CVE-2018-3143 Oracle:CVE-2018-3144 Oracle:CVE-2018-3145 Oracle:CVE-2018-3146 Oracle:CVE-2018-3147 Oracle:CVE-2018-3148 Oracle:CVE-2018-3149 Oracle:CVE-2018-3150 Oracle:CVE-2018-3151 Oracle:CVE-2018-3152 Oracle:CVE-2018-3153 Oracle:CVE-2018-3154 Oracle:CVE-2018-3155 Oracle:CVE-2018-3156 Oracle:CVE-2018-3157 Oracle:CVE-2018-3158 Oracle:CVE-2018-3159 Oracle:CVE-2018-3160 Oracle:CVE-2018-3161 Oracle:CVE-2018-3162 Oracle:CVE-2018-3163 Oracle:CVE-2018-3164 Oracle:CVE-2018-3165 Oracle:CVE-2018-3166 Oracle:CVE-2018-3167 Oracle:CVE-2018-3168 Oracle:CVE-2018-3169 Oracle:CVE-2018-3170 Oracle:CVE-2018-3171 Oracle:CVE-2018-3172 Oracle:CVE-2018-3173 Oracle:CVE-2018-3174 Oracle:CVE-2018-3175 Oracle:CVE-2018-3176 Oracle:CVE-2018-3177 Oracle:CVE-2018-3178 Oracle:CVE-2018-3179 Oracle:CVE-2018-3180 Oracle:CVE-2018-3181 Oracle:CVE-2018-3182 Oracle:CVE-2018-3183 Oracle:CVE-2018-3184 Oracle:CVE-2018-3185 Oracle:CVE-2018-3186 Oracle:CVE-2018-3187 Oracle:CVE-2018-3188 Oracle:CVE-2018-3189 Oracle:CVE-2018-3190 Oracle:CVE-2018-3191 Oracle:CVE-2018-3192 Oracle:CVE-2018-3193 Oracle:CVE-2018-3194 Oracle:CVE-2018-3195 Oracle:CVE-2018-3196 Oracle:CVE-2018-3197 Oracle:CVE-2018-3198 Oracle:CVE-2018-3200 Oracle:CVE-2018-3201 Oracle:CVE-2018-3202 Oracle:CVE-2018-3203 Oracle:CVE-2018-3204 Oracle:CVE-2018-3205 Oracle:CVE-2018-3206 Oracle:CVE-2018-3207 Oracle:CVE-2018-3208 Oracle:CVE-2018-3209 Oracle:CVE-2018-3210 Oracle:CVE-2018-3211 Oracle:CVE-2018-3212 Oracle:CVE-2018-3213 Oracle:CVE-2018-3214 Oracle:CVE-2018-3215 Oracle:CVE-2018-3217 Oracle:CVE-2018-3218 Oracle:CVE-2018-3219 Oracle:CVE-2018-3220 Oracle:CVE-2018-3221 Oracle:CVE-2018-3222 Oracle:CVE-2018-3223 Oracle:CVE-2018-3224 Oracle:CVE-2018-3225 Oracle:CVE-2018-3226 Oracle:CVE-2018-3227 Oracle:CVE-2018-3228 Oracle:CVE-2018-3229 Oracle:CVE-2018-3230 Oracle:CVE-2018-3231 Oracle:CVE-2018-3232 Oracle:CVE-2018-3233 Oracle:CVE-2018-3234 Oracle:CVE-2018-3235 Oracle:CVE-2018-3236 Oracle:CVE-2018-3237 Oracle:CVE-2018-3238 Oracle:CVE-2018-3239 Oracle:CVE-2018-3241 Oracle:CVE-2018-3242 Oracle:CVE-2018-3243 Oracle:CVE-2018-3244 Oracle:CVE-2018-3245 Oracle:CVE-2018-3246 Oracle:CVE-2018-3247 Oracle:CVE-2018-3248 Oracle:CVE-2018-3249 Oracle:CVE-2018-3250 Oracle:CVE-2018-3251 Oracle:CVE-2018-3252 Oracle:CVE-2018-3253 Oracle:CVE-2018-3254 Oracle:CVE-2018-3255 Oracle:CVE-2018-3256 Oracle:CVE-2018-3257 Oracle:CVE-2018-3258 Oracle:CVE-2018-3259 Oracle:CVE-2018-3261 Oracle:CVE-2018-3262 Oracle:CVE-2018-3263 Oracle:CVE-2018-3264 Oracle:CVE-2018-3265 Oracle:CVE-2018-3266 Oracle:CVE-2018-3267 Oracle:CVE-2018-3268 Oracle:CVE-2018-3269 Oracle:CVE-2018-3270 Oracle:CVE-2018-3271 Oracle:CVE-2018-3272 Oracle:CVE-2018-3273 Oracle:CVE-2018-3274 Oracle:CVE-2018-3275 Oracle:CVE-2018-3276 Oracle:CVE-2018-3277 Oracle:CVE-2018-3278 Oracle:CVE-2018-3279 Oracle:CVE-2018-3280 Oracle:CVE-2018-3281 Oracle:CVE-2018-3282 Oracle:CVE-2018-3283 Oracle:CVE-2018-3284 Oracle:CVE-2018-3285 Oracle:CVE-2018-3286 Oracle:CVE-2018-3287 Oracle:CVE-2018-3288 Oracle:CVE-2018-3289 Oracle:CVE-2018-3290 Oracle:CVE-2018-3291 Oracle:CVE-2018-3292 Oracle:CVE-2018-3293 Oracle:CVE-2018-3294 Oracle:CVE-2018-3295 Oracle:CVE-2018-3296 Oracle:CVE-2018-3297 Oracle:CVE-2018-3298 Oracle:CVE-2018-3299 Oracle:CVE-2018-3301 Oracle:CVE-2018-3302 Oracle:CVE-2018-7489 Oracle:CVE-2018-8013 Oracle:CVE-2018-8014 Oracle:CVE-2018-8037 RH:CVE-2017-13077 RH:CVE-2017-13078 RH:CVE-2017-13079 RH:CVE-2017-13080 RH:CVE-2017-13081 RH:CVE-2017-13082 RH:CVE-2017-13084 RH:CVE-2017-13086 RH:CVE-2017-13087 RH:CVE-2017-13088 RHSA-2017:2907 RHSA-2017:2911 SECTRACK:1039570 SECTRACK:1039571 SECTRACK:1039572 SECTRACK:1039573 SECTRACK:1039576 SECTRACK:1039577 SECTRACK:1039578 SECTRACK:1039581 SECTRACK:1039585 SECTRACK:1039703 SECTRACK:1041432 SMASH Issue 191142 SUSE:SUSE-SU-2017:2745 SUSE:SUSE-SU-2017:2752 SUSE:openSUSE-SU-2017:2755 UBUNTU:CVE-2017-13077 UBUNTU:CVE-2017-13078 UBUNTU:CVE-2017-13079 UBUNTU:CVE-2017-13080 UBUNTU:CVE-2017-13081 UBUNTU:CVE-2017-13082 UBUNTU:CVE-2017-13084 UBUNTU:CVE-2017-13086 UBUNTU:CVE-2017-13087 UBUNTU:CVE-2017-13088 UBUNTU:USN-3455-1 bdo#1033297 bnc#1056061 linux.git:commit:1b72bf5a0777d7cec6c2d857ac15599022b3c123 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 linux.git:commit:fdf7cb4185b60c68e1a75e61691c4afdc15dea0e rh#1167537 rh#1183461 rh#1202366 rh#1202380 rh#1202384 rh#1202395 rh#1202418 rh#1293972 rh#1369383 rh#1384344 rh#1393454 rh#1397485 rh#1399546 rh#1491692 rh#1491693 rh#1491694 rh#1491696 rh#1491697 rh#1491698 rh#1500301 rh#1500302 rh#1500303 rh#1500304 rh#1519780 rh#1553413 rh#1591854 rh#1607582 rh#1608073 rh#1731271 rh#2044599 rh#2044602 rh#2061700 rh#2116175 rh#2119127 rh#2161287 rh#2270497 |
CVE-2017-13082 | kernel-source-rt:Released | important | 8.1 (CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) | BID:101274 CERT-VN:VU#228519 CISCO:20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II CONFIRM:access.redhat.com:CVE-2017-13088 CONFIRM:cert-portal.siemens.com:CVE-2017-13088 CONFIRM:cert.vde.com:CVE-2017-13080 CONFIRM:cert.vde.com:CVE-2017-13088 CONFIRM:portal.msrc.microsoft.com:CVE-2017-13080 CONFIRM:rockwellautomation.custhelp.com:CVE-2017-13082 CONFIRM:source.android.com:CVE-2017-5754 CONFIRM:source.android.com:CVE-2017-6264 CONFIRM:source.android.com:CVE-2017-6294 CONFIRM:support.apple.com:CVE-2017-13852 CONFIRM:support.apple.com:CVE-2017-13904 CONFIRM:support.apple.com:CVE-2017-3169 CONFIRM:support.hpe.com:CVE-2017-13081 CONFIRM:support.lenovo.com:CVE-2017-13088 CONFIRM:www.arubanetworks.com:CVE-2017-13088 CONFIRM:www.intel.com:CVE-2017-13080 CONFIRM:www.oracle.com:CVE-2017-5715 CONFIRM:www.oracle.com:CVE-2017-5753 CONFIRM:www.oracle.com:CVE-2017-6074 CVE-2017-13077 CVE-2017-13078 CVE-2017-13079 CVE-2017-13080 CVE-2017-13081 CVE-2017-13082 CVE-2017-13084 CVE-2017-13086 CVE-2017-13087 CVE-2017-13088 CVE-2024-2466 D:CVE-2022-2590 DSA-3999 DSA-5378 FREEBSD:FreeBSD-SA-17:07 GENTOO:GLSA-201711-03 MISC:github.com:CVE-2017-13082 MISC:github.com:OSS:2024/Q1/256 MISC:ics-cert.us-cert.gov:CVE-2017-13082 MISC:w1.fi MISC:w1.fi:CVE-2017-13088 MISC:www.krackattacks.com:CVE-2017-13088 MLIST:[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update MLIST:[debian-lts-announce] 20181113 [SECURITY] [DLA 1573-1] firmware-nonfree security update OSS:2017/Q4/83 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/11/10/2 OSS:2022/Q3/99 OSS:2022/Q4/132 OSS:2022/Q4/135 OSS:2024/03/27/4 OSS:2024/Q1/256 Oracle:CVE-2011-4461 Oracle:CVE-2013-1768 Oracle:CVE-2014-0114 Oracle:CVE-2014-3490 Oracle:CVE-2014-3577 Oracle:CVE-2015-0204 Oracle:CVE-2015-0235 Oracle:CVE-2015-5600 Oracle:CVE-2015-6937 Oracle:CVE-2015-7501 Oracle:CVE-2015-7940 Oracle:CVE-2015-9251 Oracle:CVE-2016-0635 Oracle:CVE-2016-0714 Oracle:CVE-2016-0729 Oracle:CVE-2016-1000031 Oracle:CVE-2016-1181 Oracle:CVE-2016-1182 Oracle:CVE-2016-2099 Oracle:CVE-2016-2107 Oracle:CVE-2016-2176 Oracle:CVE-2016-2179 Oracle:CVE-2016-2183 Oracle:CVE-2016-3092 Oracle:CVE-2016-3506 Oracle:CVE-2016-4000 Oracle:CVE-2016-4055 Oracle:CVE-2016-5007 Oracle:CVE-2016-5019 Oracle:CVE-2016-5080 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 Oracle:CVE-2016-6304 Oracle:CVE-2016-6814 Oracle:CVE-2016-7103 Oracle:CVE-2016-7167 Oracle:CVE-2016-9843 Oracle:CVE-2016-9878 Oracle:CVE-2017-0379 Oracle:CVE-2017-10068 Oracle:CVE-2017-12617 Oracle:CVE-2017-13077 Oracle:CVE-2017-13082 Oracle:CVE-2017-14735 Oracle:CVE-2017-15095 Oracle:CVE-2017-17562 Oracle:CVE-2017-3633 Oracle:CVE-2017-3736 Oracle:CVE-2017-3737 Oracle:CVE-2017-5533 Oracle:CVE-2017-5645 Oracle:CVE-2017-5662 Oracle:CVE-2017-5664 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2017-6074 Oracle:CVE-2017-7525 Oracle:CVE-2017-7805 Oracle:CVE-2017-9798 Oracle:CVE-2018-0732 Oracle:CVE-2018-0739 Oracle:CVE-2018-1000120 Oracle:CVE-2018-1000300 Oracle:CVE-2018-11039 Oracle:CVE-2018-1171 Oracle:CVE-2018-11776 Oracle:CVE-2018-1258 Oracle:CVE-2018-1275 Oracle:CVE-2018-1305 Oracle:CVE-2018-13785 Oracle:CVE-2018-1656 Oracle:CVE-2018-2563 Oracle:CVE-2018-2572 Oracle:CVE-2018-2587 Oracle:CVE-2018-2598 Oracle:CVE-2018-2628 Oracle:CVE-2018-2718 Oracle:CVE-2018-2737 Oracle:CVE-2018-2738 Oracle:CVE-2018-2739 Oracle:CVE-2018-2742 Oracle:CVE-2018-2746 Oracle:CVE-2018-2747 Oracle:CVE-2018-2748 Oracle:CVE-2018-2749 Oracle:CVE-2018-2750 Oracle:CVE-2018-2752 Oracle:CVE-2018-2753 Oracle:CVE-2018-2754 Oracle:CVE-2018-2755 Oracle:CVE-2018-2756 Oracle:CVE-2018-2758 Oracle:CVE-2018-2759 Oracle:CVE-2018-2760 Oracle:CVE-2018-2761 Oracle:CVE-2018-2762 Oracle:CVE-2018-2763 Oracle:CVE-2018-2764 Oracle:CVE-2018-2765 Oracle:CVE-2018-2766 Oracle:CVE-2018-2767 Oracle:CVE-2018-2768 Oracle:CVE-2018-2769 Oracle:CVE-2018-2770 Oracle:CVE-2018-2771 Oracle:CVE-2018-2772 Oracle:CVE-2018-2773 Oracle:CVE-2018-2774 Oracle:CVE-2018-2775 Oracle:CVE-2018-2776 Oracle:CVE-2018-2777 Oracle:CVE-2018-2778 Oracle:CVE-2018-2779 Oracle:CVE-2018-2780 Oracle:CVE-2018-2781 Oracle:CVE-2018-2782 Oracle:CVE-2018-2783 Oracle:CVE-2018-2784 Oracle:CVE-2018-2785 Oracle:CVE-2018-2786 Oracle:CVE-2018-2787 Oracle:CVE-2018-2788 Oracle:CVE-2018-2789 Oracle:CVE-2018-2790 Oracle:CVE-2018-2791 Oracle:CVE-2018-2792 Oracle:CVE-2018-2793 Oracle:CVE-2018-2794 Oracle:CVE-2018-2795 Oracle:CVE-2018-2796 Oracle:CVE-2018-2797 Oracle:CVE-2018-2798 Oracle:CVE-2018-2799 Oracle:CVE-2018-2800 Oracle:CVE-2018-2801 Oracle:CVE-2018-2804 Oracle:CVE-2018-2805 Oracle:CVE-2018-2806 Oracle:CVE-2018-2807 Oracle:CVE-2018-2808 Oracle:CVE-2018-2809 Oracle:CVE-2018-2810 Oracle:CVE-2018-2811 Oracle:CVE-2018-2812 Oracle:CVE-2018-2813 Oracle:CVE-2018-2814 Oracle:CVE-2018-2815 Oracle:CVE-2018-2816 Oracle:CVE-2018-2817 Oracle:CVE-2018-2818 Oracle:CVE-2018-2819 Oracle:CVE-2018-2820 Oracle:CVE-2018-2821 Oracle:CVE-2018-2822 Oracle:CVE-2018-2823 Oracle:CVE-2018-2825 Oracle:CVE-2018-2826 Oracle:CVE-2018-2827 Oracle:CVE-2018-2828 Oracle:CVE-2018-2830 Oracle:CVE-2018-2831 Oracle:CVE-2018-2832 Oracle:CVE-2018-2834 Oracle:CVE-2018-2835 Oracle:CVE-2018-2836 Oracle:CVE-2018-2837 Oracle:CVE-2018-2838 Oracle:CVE-2018-2839 Oracle:CVE-2018-2840 Oracle:CVE-2018-2841 Oracle:CVE-2018-2842 Oracle:CVE-2018-2843 Oracle:CVE-2018-2844 Oracle:CVE-2018-2845 Oracle:CVE-2018-2846 Oracle:CVE-2018-2849 Oracle:CVE-2018-2850 Oracle:CVE-2018-2852 Oracle:CVE-2018-2854 Oracle:CVE-2018-2855 Oracle:CVE-2018-2856 Oracle:CVE-2018-2857 Oracle:CVE-2018-2858 Oracle:CVE-2018-2859 Oracle:CVE-2018-2860 Oracle:CVE-2018-2861 Oracle:CVE-2018-2862 Oracle:CVE-2018-2863 Oracle:CVE-2018-2864 Oracle:CVE-2018-2865 Oracle:CVE-2018-2866 Oracle:CVE-2018-2867 Oracle:CVE-2018-2868 Oracle:CVE-2018-2869 Oracle:CVE-2018-2870 Oracle:CVE-2018-2871 Oracle:CVE-2018-2872 Oracle:CVE-2018-2873 Oracle:CVE-2018-2874 Oracle:CVE-2018-2876 Oracle:CVE-2018-2877 Oracle:CVE-2018-2878 Oracle:CVE-2018-2879 Oracle:CVE-2018-2881 Oracle:CVE-2018-2882 Oracle:CVE-2018-2887 Oracle:CVE-2018-2888 Oracle:CVE-2018-2889 Oracle:CVE-2018-2891 Oracle:CVE-2018-2892 Oracle:CVE-2018-2893 Oracle:CVE-2018-2894 Oracle:CVE-2018-2895 Oracle:CVE-2018-2896 Oracle:CVE-2018-2897 Oracle:CVE-2018-2898 Oracle:CVE-2018-2899 Oracle:CVE-2018-2900 Oracle:CVE-2018-2901 Oracle:CVE-2018-2902 Oracle:CVE-2018-2903 Oracle:CVE-2018-2904 Oracle:CVE-2018-2905 Oracle:CVE-2018-2906 Oracle:CVE-2018-2907 Oracle:CVE-2018-2908 Oracle:CVE-2018-2909 Oracle:CVE-2018-2911 Oracle:CVE-2018-2912 Oracle:CVE-2018-2913 Oracle:CVE-2018-2914 Oracle:CVE-2018-2915 Oracle:CVE-2018-2916 Oracle:CVE-2018-2917 Oracle:CVE-2018-2918 Oracle:CVE-2018-2919 Oracle:CVE-2018-2920 Oracle:CVE-2018-2921 Oracle:CVE-2018-2922 Oracle:CVE-2018-2923 Oracle:CVE-2018-2924 Oracle:CVE-2018-2925 Oracle:CVE-2018-2926 Oracle:CVE-2018-2927 Oracle:CVE-2018-2928 Oracle:CVE-2018-2929 Oracle:CVE-2018-2930 Oracle:CVE-2018-2932 Oracle:CVE-2018-2933 Oracle:CVE-2018-2934 Oracle:CVE-2018-2935 Oracle:CVE-2018-2936 Oracle:CVE-2018-2937 Oracle:CVE-2018-2938 Oracle:CVE-2018-2939 Oracle:CVE-2018-2940 Oracle:CVE-2018-2941 Oracle:CVE-2018-2942 Oracle:CVE-2018-2943 Oracle:CVE-2018-2944 Oracle:CVE-2018-2945 Oracle:CVE-2018-2946 Oracle:CVE-2018-2947 Oracle:CVE-2018-2948 Oracle:CVE-2018-2949 Oracle:CVE-2018-2950 Oracle:CVE-2018-2951 Oracle:CVE-2018-2952 Oracle:CVE-2018-2953 Oracle:CVE-2018-2954 Oracle:CVE-2018-2955 Oracle:CVE-2018-2956 Oracle:CVE-2018-2957 Oracle:CVE-2018-2958 Oracle:CVE-2018-2959 Oracle:CVE-2018-2960 Oracle:CVE-2018-2961 Oracle:CVE-2018-2962 Oracle:CVE-2018-2963 Oracle:CVE-2018-2964 Oracle:CVE-2018-2965 Oracle:CVE-2018-2966 Oracle:CVE-2018-2967 Oracle:CVE-2018-2968 Oracle:CVE-2018-2969 Oracle:CVE-2018-2970 Oracle:CVE-2018-2971 Oracle:CVE-2018-2972 Oracle:CVE-2018-2973 Oracle:CVE-2018-2974 Oracle:CVE-2018-2975 Oracle:CVE-2018-2976 Oracle:CVE-2018-2977 Oracle:CVE-2018-2979 Oracle:CVE-2018-2980 Oracle:CVE-2018-2981 Oracle:CVE-2018-2982 Oracle:CVE-2018-2984 Oracle:CVE-2018-2985 Oracle:CVE-2018-2986 Oracle:CVE-2018-2987 Oracle:CVE-2018-2988 Oracle:CVE-2018-2989 Oracle:CVE-2018-2990 Oracle:CVE-2018-2991 Oracle:CVE-2018-2992 Oracle:CVE-2018-2993 Oracle:CVE-2018-2994 Oracle:CVE-2018-2995 Oracle:CVE-2018-2996 Oracle:CVE-2018-2997 Oracle:CVE-2018-2998 Oracle:CVE-2018-2999 Oracle:CVE-2018-3000 Oracle:CVE-2018-3001 Oracle:CVE-2018-3002 Oracle:CVE-2018-3003 Oracle:CVE-2018-3004 Oracle:CVE-2018-3005 Oracle:CVE-2018-3006 Oracle:CVE-2018-3007 Oracle:CVE-2018-3008 Oracle:CVE-2018-3009 Oracle:CVE-2018-3010 Oracle:CVE-2018-3011 Oracle:CVE-2018-3012 Oracle:CVE-2018-3013 Oracle:CVE-2018-3014 Oracle:CVE-2018-3015 Oracle:CVE-2018-3016 Oracle:CVE-2018-3017 Oracle:CVE-2018-3018 Oracle:CVE-2018-3019 Oracle:CVE-2018-3020 Oracle:CVE-2018-3021 Oracle:CVE-2018-3022 Oracle:CVE-2018-3023 Oracle:CVE-2018-3024 Oracle:CVE-2018-3025 Oracle:CVE-2018-3026 Oracle:CVE-2018-3027 Oracle:CVE-2018-3028 Oracle:CVE-2018-3029 Oracle:CVE-2018-3030 Oracle:CVE-2018-3031 Oracle:CVE-2018-3032 Oracle:CVE-2018-3033 Oracle:CVE-2018-3034 Oracle:CVE-2018-3035 Oracle:CVE-2018-3036 Oracle:CVE-2018-3037 Oracle:CVE-2018-3038 Oracle:CVE-2018-3039 Oracle:CVE-2018-3040 Oracle:CVE-2018-3041 Oracle:CVE-2018-3042 Oracle:CVE-2018-3043 Oracle:CVE-2018-3044 Oracle:CVE-2018-3045 Oracle:CVE-2018-3046 Oracle:CVE-2018-3047 Oracle:CVE-2018-3048 Oracle:CVE-2018-3049 Oracle:CVE-2018-3050 Oracle:CVE-2018-3051 Oracle:CVE-2018-3052 Oracle:CVE-2018-3053 Oracle:CVE-2018-3054 Oracle:CVE-2018-3055 Oracle:CVE-2018-3056 Oracle:CVE-2018-3057 Oracle:CVE-2018-3058 Oracle:CVE-2018-3059 Oracle:CVE-2018-3060 Oracle:CVE-2018-3061 Oracle:CVE-2018-3062 Oracle:CVE-2018-3063 Oracle:CVE-2018-3064 Oracle:CVE-2018-3065 Oracle:CVE-2018-3066 Oracle:CVE-2018-3067 Oracle:CVE-2018-3068 Oracle:CVE-2018-3069 Oracle:CVE-2018-3070 Oracle:CVE-2018-3071 Oracle:CVE-2018-3072 Oracle:CVE-2018-3073 Oracle:CVE-2018-3074 Oracle:CVE-2018-3075 Oracle:CVE-2018-3076 Oracle:CVE-2018-3077 Oracle:CVE-2018-3078 Oracle:CVE-2018-3079 Oracle:CVE-2018-3080 Oracle:CVE-2018-3081 Oracle:CVE-2018-3082 Oracle:CVE-2018-3084 Oracle:CVE-2018-3085 Oracle:CVE-2018-3086 Oracle:CVE-2018-3087 Oracle:CVE-2018-3088 Oracle:CVE-2018-3089 Oracle:CVE-2018-3090 Oracle:CVE-2018-3091 Oracle:CVE-2018-3092 Oracle:CVE-2018-3093 Oracle:CVE-2018-3094 Oracle:CVE-2018-3095 Oracle:CVE-2018-3096 Oracle:CVE-2018-3097 Oracle:CVE-2018-3098 Oracle:CVE-2018-3099 Oracle:CVE-2018-3100 Oracle:CVE-2018-3101 Oracle:CVE-2018-3102 Oracle:CVE-2018-3103 Oracle:CVE-2018-3104 Oracle:CVE-2018-3105 Oracle:CVE-2018-3108 Oracle:CVE-2018-3109 Oracle:CVE-2018-3115 Oracle:CVE-2018-3122 Oracle:CVE-2018-3126 Oracle:CVE-2018-3127 Oracle:CVE-2018-3128 Oracle:CVE-2018-3129 Oracle:CVE-2018-3130 Oracle:CVE-2018-3131 Oracle:CVE-2018-3132 Oracle:CVE-2018-3133 Oracle:CVE-2018-3134 Oracle:CVE-2018-3135 Oracle:CVE-2018-3136 Oracle:CVE-2018-3137 Oracle:CVE-2018-3138 Oracle:CVE-2018-3139 Oracle:CVE-2018-3140 Oracle:CVE-2018-3141 Oracle:CVE-2018-3142 Oracle:CVE-2018-3143 Oracle:CVE-2018-3144 Oracle:CVE-2018-3145 Oracle:CVE-2018-3146 Oracle:CVE-2018-3147 Oracle:CVE-2018-3148 Oracle:CVE-2018-3149 Oracle:CVE-2018-3150 Oracle:CVE-2018-3151 Oracle:CVE-2018-3152 Oracle:CVE-2018-3153 Oracle:CVE-2018-3154 Oracle:CVE-2018-3155 Oracle:CVE-2018-3156 Oracle:CVE-2018-3157 Oracle:CVE-2018-3158 Oracle:CVE-2018-3159 Oracle:CVE-2018-3160 Oracle:CVE-2018-3161 Oracle:CVE-2018-3162 Oracle:CVE-2018-3163 Oracle:CVE-2018-3164 Oracle:CVE-2018-3165 Oracle:CVE-2018-3166 Oracle:CVE-2018-3167 Oracle:CVE-2018-3168 Oracle:CVE-2018-3169 Oracle:CVE-2018-3170 Oracle:CVE-2018-3171 Oracle:CVE-2018-3172 Oracle:CVE-2018-3173 Oracle:CVE-2018-3174 Oracle:CVE-2018-3175 Oracle:CVE-2018-3176 Oracle:CVE-2018-3177 Oracle:CVE-2018-3178 Oracle:CVE-2018-3179 Oracle:CVE-2018-3180 Oracle:CVE-2018-3181 Oracle:CVE-2018-3182 Oracle:CVE-2018-3183 Oracle:CVE-2018-3184 Oracle:CVE-2018-3185 Oracle:CVE-2018-3186 Oracle:CVE-2018-3187 Oracle:CVE-2018-3188 Oracle:CVE-2018-3189 Oracle:CVE-2018-3190 Oracle:CVE-2018-3191 Oracle:CVE-2018-3192 Oracle:CVE-2018-3193 Oracle:CVE-2018-3194 Oracle:CVE-2018-3195 Oracle:CVE-2018-3196 Oracle:CVE-2018-3197 Oracle:CVE-2018-3198 Oracle:CVE-2018-3200 Oracle:CVE-2018-3201 Oracle:CVE-2018-3202 Oracle:CVE-2018-3203 Oracle:CVE-2018-3204 Oracle:CVE-2018-3205 Oracle:CVE-2018-3206 Oracle:CVE-2018-3207 Oracle:CVE-2018-3208 Oracle:CVE-2018-3209 Oracle:CVE-2018-3210 Oracle:CVE-2018-3211 Oracle:CVE-2018-3212 Oracle:CVE-2018-3213 Oracle:CVE-2018-3214 Oracle:CVE-2018-3215 Oracle:CVE-2018-3217 Oracle:CVE-2018-3218 Oracle:CVE-2018-3219 Oracle:CVE-2018-3220 Oracle:CVE-2018-3221 Oracle:CVE-2018-3222 Oracle:CVE-2018-3223 Oracle:CVE-2018-3224 Oracle:CVE-2018-3225 Oracle:CVE-2018-3226 Oracle:CVE-2018-3227 Oracle:CVE-2018-3228 Oracle:CVE-2018-3229 Oracle:CVE-2018-3230 Oracle:CVE-2018-3231 Oracle:CVE-2018-3232 Oracle:CVE-2018-3233 Oracle:CVE-2018-3234 Oracle:CVE-2018-3235 Oracle:CVE-2018-3236 Oracle:CVE-2018-3237 Oracle:CVE-2018-3238 Oracle:CVE-2018-3239 Oracle:CVE-2018-3241 Oracle:CVE-2018-3242 Oracle:CVE-2018-3243 Oracle:CVE-2018-3244 Oracle:CVE-2018-3245 Oracle:CVE-2018-3246 Oracle:CVE-2018-3247 Oracle:CVE-2018-3248 Oracle:CVE-2018-3249 Oracle:CVE-2018-3250 Oracle:CVE-2018-3251 Oracle:CVE-2018-3252 Oracle:CVE-2018-3253 Oracle:CVE-2018-3254 Oracle:CVE-2018-3255 Oracle:CVE-2018-3256 Oracle:CVE-2018-3257 Oracle:CVE-2018-3258 Oracle:CVE-2018-3259 Oracle:CVE-2018-3261 Oracle:CVE-2018-3262 Oracle:CVE-2018-3263 Oracle:CVE-2018-3264 Oracle:CVE-2018-3265 Oracle:CVE-2018-3266 Oracle:CVE-2018-3267 Oracle:CVE-2018-3268 Oracle:CVE-2018-3269 Oracle:CVE-2018-3270 Oracle:CVE-2018-3271 Oracle:CVE-2018-3272 Oracle:CVE-2018-3273 Oracle:CVE-2018-3274 Oracle:CVE-2018-3275 Oracle:CVE-2018-3276 Oracle:CVE-2018-3277 Oracle:CVE-2018-3278 Oracle:CVE-2018-3279 Oracle:CVE-2018-3280 Oracle:CVE-2018-3281 Oracle:CVE-2018-3282 Oracle:CVE-2018-3283 Oracle:CVE-2018-3284 Oracle:CVE-2018-3285 Oracle:CVE-2018-3286 Oracle:CVE-2018-3287 Oracle:CVE-2018-3288 Oracle:CVE-2018-3289 Oracle:CVE-2018-3290 Oracle:CVE-2018-3291 Oracle:CVE-2018-3292 Oracle:CVE-2018-3293 Oracle:CVE-2018-3294 Oracle:CVE-2018-3295 Oracle:CVE-2018-3296 Oracle:CVE-2018-3297 Oracle:CVE-2018-3298 Oracle:CVE-2018-3299 Oracle:CVE-2018-3301 Oracle:CVE-2018-3302 Oracle:CVE-2018-7489 Oracle:CVE-2018-8013 Oracle:CVE-2018-8014 Oracle:CVE-2018-8037 RH:CVE-2017-13077 RH:CVE-2017-13078 RH:CVE-2017-13079 RH:CVE-2017-13080 RH:CVE-2017-13081 RH:CVE-2017-13082 RH:CVE-2017-13084 RH:CVE-2017-13086 RH:CVE-2017-13087 RH:CVE-2017-13088 RHSA-2017:2907 RHSA-2017:2911 SECTRACK:1039570 SECTRACK:1039571 SECTRACK:1039572 SECTRACK:1039573 SECTRACK:1039576 SECTRACK:1039577 SECTRACK:1039578 SECTRACK:1039581 SECTRACK:1039585 SECTRACK:1039703 SECTRACK:1041432 SMASH Issue 191142 SUSE:SUSE-SU-2017:2745 SUSE:SUSE-SU-2017:2752 SUSE:openSUSE-SU-2017:2755 UBUNTU:CVE-2017-13077 UBUNTU:CVE-2017-13078 UBUNTU:CVE-2017-13079 UBUNTU:CVE-2017-13080 UBUNTU:CVE-2017-13081 UBUNTU:CVE-2017-13082 UBUNTU:CVE-2017-13084 UBUNTU:CVE-2017-13086 UBUNTU:CVE-2017-13087 UBUNTU:CVE-2017-13088 UBUNTU:USN-3455-1 bdo#1033297 bnc#1056061 linux.git:commit:1b72bf5a0777d7cec6c2d857ac15599022b3c123 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 linux.git:commit:fdf7cb4185b60c68e1a75e61691c4afdc15dea0e rh#1167537 rh#1183461 rh#1202366 rh#1202380 rh#1202384 rh#1202395 rh#1202418 rh#1293972 rh#1369383 rh#1384344 rh#1393454 rh#1397485 rh#1399546 rh#1491692 rh#1491693 rh#1491694 rh#1491696 rh#1491697 rh#1491698 rh#1500301 rh#1500302 rh#1500303 rh#1500304 rh#1519780 rh#1553413 rh#1591854 rh#1607582 rh#1608073 rh#1731271 rh#2044599 rh#2044602 rh#2061700 rh#2116175 rh#2119127 rh#2161287 rh#2270497 |
CVE-2017-13084 | kernel-source-rt:Released | important | 8.1 (CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) | BID:101274 CERT-VN:VU#228519 CISCO:20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II CONFIRM:access.redhat.com:CVE-2017-13088 CONFIRM:cert-portal.siemens.com:CVE-2017-13088 CONFIRM:cert.vde.com:CVE-2017-13080 CONFIRM:cert.vde.com:CVE-2017-13088 CONFIRM:portal.msrc.microsoft.com:CVE-2017-13080 CONFIRM:rockwellautomation.custhelp.com:CVE-2017-13082 CONFIRM:source.android.com:CVE-2017-5754 CONFIRM:source.android.com:CVE-2017-6264 CONFIRM:source.android.com:CVE-2017-6294 CONFIRM:support.apple.com:CVE-2017-13852 CONFIRM:support.apple.com:CVE-2017-13904 CONFIRM:support.apple.com:CVE-2017-3169 CONFIRM:support.hpe.com:CVE-2017-13081 CONFIRM:support.lenovo.com:CVE-2017-13088 CONFIRM:www.arubanetworks.com:CVE-2017-13088 CONFIRM:www.intel.com:CVE-2017-13080 CONFIRM:www.oracle.com:CVE-2017-5715 CONFIRM:www.oracle.com:CVE-2017-5753 CONFIRM:www.oracle.com:CVE-2017-6074 CVE-2017-13077 CVE-2017-13078 CVE-2017-13079 CVE-2017-13080 CVE-2017-13081 CVE-2017-13082 CVE-2017-13084 CVE-2017-13086 CVE-2017-13087 CVE-2017-13088 CVE-2024-2466 D:CVE-2022-2590 DSA-3999 DSA-5378 FREEBSD:FreeBSD-SA-17:07 GENTOO:GLSA-201711-03 MISC:github.com:CVE-2017-13082 MISC:github.com:OSS:2024/Q1/256 MISC:ics-cert.us-cert.gov:CVE-2017-13082 MISC:w1.fi MISC:w1.fi:CVE-2017-13088 MISC:www.krackattacks.com:CVE-2017-13088 MLIST:[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update MLIST:[debian-lts-announce] 20181113 [SECURITY] [DLA 1573-1] firmware-nonfree security update OSS:2017/Q4/83 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/11/10/2 OSS:2022/Q3/99 OSS:2022/Q4/132 OSS:2022/Q4/135 OSS:2024/03/27/4 OSS:2024/Q1/256 Oracle:CVE-2011-4461 Oracle:CVE-2013-1768 Oracle:CVE-2014-0114 Oracle:CVE-2014-3490 Oracle:CVE-2014-3577 Oracle:CVE-2015-0204 Oracle:CVE-2015-0235 Oracle:CVE-2015-5600 Oracle:CVE-2015-6937 Oracle:CVE-2015-7501 Oracle:CVE-2015-7940 Oracle:CVE-2015-9251 Oracle:CVE-2016-0635 Oracle:CVE-2016-0714 Oracle:CVE-2016-0729 Oracle:CVE-2016-1000031 Oracle:CVE-2016-1181 Oracle:CVE-2016-1182 Oracle:CVE-2016-2099 Oracle:CVE-2016-2107 Oracle:CVE-2016-2176 Oracle:CVE-2016-2179 Oracle:CVE-2016-2183 Oracle:CVE-2016-3092 Oracle:CVE-2016-3506 Oracle:CVE-2016-4000 Oracle:CVE-2016-4055 Oracle:CVE-2016-5007 Oracle:CVE-2016-5019 Oracle:CVE-2016-5080 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 Oracle:CVE-2016-6304 Oracle:CVE-2016-6814 Oracle:CVE-2016-7103 Oracle:CVE-2016-7167 Oracle:CVE-2016-9843 Oracle:CVE-2016-9878 Oracle:CVE-2017-0379 Oracle:CVE-2017-10068 Oracle:CVE-2017-12617 Oracle:CVE-2017-13077 Oracle:CVE-2017-13082 Oracle:CVE-2017-14735 Oracle:CVE-2017-15095 Oracle:CVE-2017-17562 Oracle:CVE-2017-3633 Oracle:CVE-2017-3736 Oracle:CVE-2017-3737 Oracle:CVE-2017-5533 Oracle:CVE-2017-5645 Oracle:CVE-2017-5662 Oracle:CVE-2017-5664 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2017-6074 Oracle:CVE-2017-7525 Oracle:CVE-2017-7805 Oracle:CVE-2017-9798 Oracle:CVE-2018-0732 Oracle:CVE-2018-0739 Oracle:CVE-2018-1000120 Oracle:CVE-2018-1000300 Oracle:CVE-2018-11039 Oracle:CVE-2018-1171 Oracle:CVE-2018-11776 Oracle:CVE-2018-1258 Oracle:CVE-2018-1275 Oracle:CVE-2018-1305 Oracle:CVE-2018-13785 Oracle:CVE-2018-1656 Oracle:CVE-2018-2563 Oracle:CVE-2018-2572 Oracle:CVE-2018-2587 Oracle:CVE-2018-2598 Oracle:CVE-2018-2628 Oracle:CVE-2018-2718 Oracle:CVE-2018-2737 Oracle:CVE-2018-2738 Oracle:CVE-2018-2739 Oracle:CVE-2018-2742 Oracle:CVE-2018-2746 Oracle:CVE-2018-2747 Oracle:CVE-2018-2748 Oracle:CVE-2018-2749 Oracle:CVE-2018-2750 Oracle:CVE-2018-2752 Oracle:CVE-2018-2753 Oracle:CVE-2018-2754 Oracle:CVE-2018-2755 Oracle:CVE-2018-2756 Oracle:CVE-2018-2758 Oracle:CVE-2018-2759 Oracle:CVE-2018-2760 Oracle:CVE-2018-2761 Oracle:CVE-2018-2762 Oracle:CVE-2018-2763 Oracle:CVE-2018-2764 Oracle:CVE-2018-2765 Oracle:CVE-2018-2766 Oracle:CVE-2018-2767 Oracle:CVE-2018-2768 Oracle:CVE-2018-2769 Oracle:CVE-2018-2770 Oracle:CVE-2018-2771 Oracle:CVE-2018-2772 Oracle:CVE-2018-2773 Oracle:CVE-2018-2774 Oracle:CVE-2018-2775 Oracle:CVE-2018-2776 Oracle:CVE-2018-2777 Oracle:CVE-2018-2778 Oracle:CVE-2018-2779 Oracle:CVE-2018-2780 Oracle:CVE-2018-2781 Oracle:CVE-2018-2782 Oracle:CVE-2018-2783 Oracle:CVE-2018-2784 Oracle:CVE-2018-2785 Oracle:CVE-2018-2786 Oracle:CVE-2018-2787 Oracle:CVE-2018-2788 Oracle:CVE-2018-2789 Oracle:CVE-2018-2790 Oracle:CVE-2018-2791 Oracle:CVE-2018-2792 Oracle:CVE-2018-2793 Oracle:CVE-2018-2794 Oracle:CVE-2018-2795 Oracle:CVE-2018-2796 Oracle:CVE-2018-2797 Oracle:CVE-2018-2798 Oracle:CVE-2018-2799 Oracle:CVE-2018-2800 Oracle:CVE-2018-2801 Oracle:CVE-2018-2804 Oracle:CVE-2018-2805 Oracle:CVE-2018-2806 Oracle:CVE-2018-2807 Oracle:CVE-2018-2808 Oracle:CVE-2018-2809 Oracle:CVE-2018-2810 Oracle:CVE-2018-2811 Oracle:CVE-2018-2812 Oracle:CVE-2018-2813 Oracle:CVE-2018-2814 Oracle:CVE-2018-2815 Oracle:CVE-2018-2816 Oracle:CVE-2018-2817 Oracle:CVE-2018-2818 Oracle:CVE-2018-2819 Oracle:CVE-2018-2820 Oracle:CVE-2018-2821 Oracle:CVE-2018-2822 Oracle:CVE-2018-2823 Oracle:CVE-2018-2825 Oracle:CVE-2018-2826 Oracle:CVE-2018-2827 Oracle:CVE-2018-2828 Oracle:CVE-2018-2830 Oracle:CVE-2018-2831 Oracle:CVE-2018-2832 Oracle:CVE-2018-2834 Oracle:CVE-2018-2835 Oracle:CVE-2018-2836 Oracle:CVE-2018-2837 Oracle:CVE-2018-2838 Oracle:CVE-2018-2839 Oracle:CVE-2018-2840 Oracle:CVE-2018-2841 Oracle:CVE-2018-2842 Oracle:CVE-2018-2843 Oracle:CVE-2018-2844 Oracle:CVE-2018-2845 Oracle:CVE-2018-2846 Oracle:CVE-2018-2849 Oracle:CVE-2018-2850 Oracle:CVE-2018-2852 Oracle:CVE-2018-2854 Oracle:CVE-2018-2855 Oracle:CVE-2018-2856 Oracle:CVE-2018-2857 Oracle:CVE-2018-2858 Oracle:CVE-2018-2859 Oracle:CVE-2018-2860 Oracle:CVE-2018-2861 Oracle:CVE-2018-2862 Oracle:CVE-2018-2863 Oracle:CVE-2018-2864 Oracle:CVE-2018-2865 Oracle:CVE-2018-2866 Oracle:CVE-2018-2867 Oracle:CVE-2018-2868 Oracle:CVE-2018-2869 Oracle:CVE-2018-2870 Oracle:CVE-2018-2871 Oracle:CVE-2018-2872 Oracle:CVE-2018-2873 Oracle:CVE-2018-2874 Oracle:CVE-2018-2876 Oracle:CVE-2018-2877 Oracle:CVE-2018-2878 Oracle:CVE-2018-2879 Oracle:CVE-2018-2881 Oracle:CVE-2018-2882 Oracle:CVE-2018-2887 Oracle:CVE-2018-2888 Oracle:CVE-2018-2889 Oracle:CVE-2018-2891 Oracle:CVE-2018-2892 Oracle:CVE-2018-2893 Oracle:CVE-2018-2894 Oracle:CVE-2018-2895 Oracle:CVE-2018-2896 Oracle:CVE-2018-2897 Oracle:CVE-2018-2898 Oracle:CVE-2018-2899 Oracle:CVE-2018-2900 Oracle:CVE-2018-2901 Oracle:CVE-2018-2902 Oracle:CVE-2018-2903 Oracle:CVE-2018-2904 Oracle:CVE-2018-2905 Oracle:CVE-2018-2906 Oracle:CVE-2018-2907 Oracle:CVE-2018-2908 Oracle:CVE-2018-2909 Oracle:CVE-2018-2911 Oracle:CVE-2018-2912 Oracle:CVE-2018-2913 Oracle:CVE-2018-2914 Oracle:CVE-2018-2915 Oracle:CVE-2018-2916 Oracle:CVE-2018-2917 Oracle:CVE-2018-2918 Oracle:CVE-2018-2919 Oracle:CVE-2018-2920 Oracle:CVE-2018-2921 Oracle:CVE-2018-2922 Oracle:CVE-2018-2923 Oracle:CVE-2018-2924 Oracle:CVE-2018-2925 Oracle:CVE-2018-2926 Oracle:CVE-2018-2927 Oracle:CVE-2018-2928 Oracle:CVE-2018-2929 Oracle:CVE-2018-2930 Oracle:CVE-2018-2932 Oracle:CVE-2018-2933 Oracle:CVE-2018-2934 Oracle:CVE-2018-2935 Oracle:CVE-2018-2936 Oracle:CVE-2018-2937 Oracle:CVE-2018-2938 Oracle:CVE-2018-2939 Oracle:CVE-2018-2940 Oracle:CVE-2018-2941 Oracle:CVE-2018-2942 Oracle:CVE-2018-2943 Oracle:CVE-2018-2944 Oracle:CVE-2018-2945 Oracle:CVE-2018-2946 Oracle:CVE-2018-2947 Oracle:CVE-2018-2948 Oracle:CVE-2018-2949 Oracle:CVE-2018-2950 Oracle:CVE-2018-2951 Oracle:CVE-2018-2952 Oracle:CVE-2018-2953 Oracle:CVE-2018-2954 Oracle:CVE-2018-2955 Oracle:CVE-2018-2956 Oracle:CVE-2018-2957 Oracle:CVE-2018-2958 Oracle:CVE-2018-2959 Oracle:CVE-2018-2960 Oracle:CVE-2018-2961 Oracle:CVE-2018-2962 Oracle:CVE-2018-2963 Oracle:CVE-2018-2964 Oracle:CVE-2018-2965 Oracle:CVE-2018-2966 Oracle:CVE-2018-2967 Oracle:CVE-2018-2968 Oracle:CVE-2018-2969 Oracle:CVE-2018-2970 Oracle:CVE-2018-2971 Oracle:CVE-2018-2972 Oracle:CVE-2018-2973 Oracle:CVE-2018-2974 Oracle:CVE-2018-2975 Oracle:CVE-2018-2976 Oracle:CVE-2018-2977 Oracle:CVE-2018-2979 Oracle:CVE-2018-2980 Oracle:CVE-2018-2981 Oracle:CVE-2018-2982 Oracle:CVE-2018-2984 Oracle:CVE-2018-2985 Oracle:CVE-2018-2986 Oracle:CVE-2018-2987 Oracle:CVE-2018-2988 Oracle:CVE-2018-2989 Oracle:CVE-2018-2990 Oracle:CVE-2018-2991 Oracle:CVE-2018-2992 Oracle:CVE-2018-2993 Oracle:CVE-2018-2994 Oracle:CVE-2018-2995 Oracle:CVE-2018-2996 Oracle:CVE-2018-2997 Oracle:CVE-2018-2998 Oracle:CVE-2018-2999 Oracle:CVE-2018-3000 Oracle:CVE-2018-3001 Oracle:CVE-2018-3002 Oracle:CVE-2018-3003 Oracle:CVE-2018-3004 Oracle:CVE-2018-3005 Oracle:CVE-2018-3006 Oracle:CVE-2018-3007 Oracle:CVE-2018-3008 Oracle:CVE-2018-3009 Oracle:CVE-2018-3010 Oracle:CVE-2018-3011 Oracle:CVE-2018-3012 Oracle:CVE-2018-3013 Oracle:CVE-2018-3014 Oracle:CVE-2018-3015 Oracle:CVE-2018-3016 Oracle:CVE-2018-3017 Oracle:CVE-2018-3018 Oracle:CVE-2018-3019 Oracle:CVE-2018-3020 Oracle:CVE-2018-3021 Oracle:CVE-2018-3022 Oracle:CVE-2018-3023 Oracle:CVE-2018-3024 Oracle:CVE-2018-3025 Oracle:CVE-2018-3026 Oracle:CVE-2018-3027 Oracle:CVE-2018-3028 Oracle:CVE-2018-3029 Oracle:CVE-2018-3030 Oracle:CVE-2018-3031 Oracle:CVE-2018-3032 Oracle:CVE-2018-3033 Oracle:CVE-2018-3034 Oracle:CVE-2018-3035 Oracle:CVE-2018-3036 Oracle:CVE-2018-3037 Oracle:CVE-2018-3038 Oracle:CVE-2018-3039 Oracle:CVE-2018-3040 Oracle:CVE-2018-3041 Oracle:CVE-2018-3042 Oracle:CVE-2018-3043 Oracle:CVE-2018-3044 Oracle:CVE-2018-3045 Oracle:CVE-2018-3046 Oracle:CVE-2018-3047 Oracle:CVE-2018-3048 Oracle:CVE-2018-3049 Oracle:CVE-2018-3050 Oracle:CVE-2018-3051 Oracle:CVE-2018-3052 Oracle:CVE-2018-3053 Oracle:CVE-2018-3054 Oracle:CVE-2018-3055 Oracle:CVE-2018-3056 Oracle:CVE-2018-3057 Oracle:CVE-2018-3058 Oracle:CVE-2018-3059 Oracle:CVE-2018-3060 Oracle:CVE-2018-3061 Oracle:CVE-2018-3062 Oracle:CVE-2018-3063 Oracle:CVE-2018-3064 Oracle:CVE-2018-3065 Oracle:CVE-2018-3066 Oracle:CVE-2018-3067 Oracle:CVE-2018-3068 Oracle:CVE-2018-3069 Oracle:CVE-2018-3070 Oracle:CVE-2018-3071 Oracle:CVE-2018-3072 Oracle:CVE-2018-3073 Oracle:CVE-2018-3074 Oracle:CVE-2018-3075 Oracle:CVE-2018-3076 Oracle:CVE-2018-3077 Oracle:CVE-2018-3078 Oracle:CVE-2018-3079 Oracle:CVE-2018-3080 Oracle:CVE-2018-3081 Oracle:CVE-2018-3082 Oracle:CVE-2018-3084 Oracle:CVE-2018-3085 Oracle:CVE-2018-3086 Oracle:CVE-2018-3087 Oracle:CVE-2018-3088 Oracle:CVE-2018-3089 Oracle:CVE-2018-3090 Oracle:CVE-2018-3091 Oracle:CVE-2018-3092 Oracle:CVE-2018-3093 Oracle:CVE-2018-3094 Oracle:CVE-2018-3095 Oracle:CVE-2018-3096 Oracle:CVE-2018-3097 Oracle:CVE-2018-3098 Oracle:CVE-2018-3099 Oracle:CVE-2018-3100 Oracle:CVE-2018-3101 Oracle:CVE-2018-3102 Oracle:CVE-2018-3103 Oracle:CVE-2018-3104 Oracle:CVE-2018-3105 Oracle:CVE-2018-3108 Oracle:CVE-2018-3109 Oracle:CVE-2018-3115 Oracle:CVE-2018-3122 Oracle:CVE-2018-3126 Oracle:CVE-2018-3127 Oracle:CVE-2018-3128 Oracle:CVE-2018-3129 Oracle:CVE-2018-3130 Oracle:CVE-2018-3131 Oracle:CVE-2018-3132 Oracle:CVE-2018-3133 Oracle:CVE-2018-3134 Oracle:CVE-2018-3135 Oracle:CVE-2018-3136 Oracle:CVE-2018-3137 Oracle:CVE-2018-3138 Oracle:CVE-2018-3139 Oracle:CVE-2018-3140 Oracle:CVE-2018-3141 Oracle:CVE-2018-3142 Oracle:CVE-2018-3143 Oracle:CVE-2018-3144 Oracle:CVE-2018-3145 Oracle:CVE-2018-3146 Oracle:CVE-2018-3147 Oracle:CVE-2018-3148 Oracle:CVE-2018-3149 Oracle:CVE-2018-3150 Oracle:CVE-2018-3151 Oracle:CVE-2018-3152 Oracle:CVE-2018-3153 Oracle:CVE-2018-3154 Oracle:CVE-2018-3155 Oracle:CVE-2018-3156 Oracle:CVE-2018-3157 Oracle:CVE-2018-3158 Oracle:CVE-2018-3159 Oracle:CVE-2018-3160 Oracle:CVE-2018-3161 Oracle:CVE-2018-3162 Oracle:CVE-2018-3163 Oracle:CVE-2018-3164 Oracle:CVE-2018-3165 Oracle:CVE-2018-3166 Oracle:CVE-2018-3167 Oracle:CVE-2018-3168 Oracle:CVE-2018-3169 Oracle:CVE-2018-3170 Oracle:CVE-2018-3171 Oracle:CVE-2018-3172 Oracle:CVE-2018-3173 Oracle:CVE-2018-3174 Oracle:CVE-2018-3175 Oracle:CVE-2018-3176 Oracle:CVE-2018-3177 Oracle:CVE-2018-3178 Oracle:CVE-2018-3179 Oracle:CVE-2018-3180 Oracle:CVE-2018-3181 Oracle:CVE-2018-3182 Oracle:CVE-2018-3183 Oracle:CVE-2018-3184 Oracle:CVE-2018-3185 Oracle:CVE-2018-3186 Oracle:CVE-2018-3187 Oracle:CVE-2018-3188 Oracle:CVE-2018-3189 Oracle:CVE-2018-3190 Oracle:CVE-2018-3191 Oracle:CVE-2018-3192 Oracle:CVE-2018-3193 Oracle:CVE-2018-3194 Oracle:CVE-2018-3195 Oracle:CVE-2018-3196 Oracle:CVE-2018-3197 Oracle:CVE-2018-3198 Oracle:CVE-2018-3200 Oracle:CVE-2018-3201 Oracle:CVE-2018-3202 Oracle:CVE-2018-3203 Oracle:CVE-2018-3204 Oracle:CVE-2018-3205 Oracle:CVE-2018-3206 Oracle:CVE-2018-3207 Oracle:CVE-2018-3208 Oracle:CVE-2018-3209 Oracle:CVE-2018-3210 Oracle:CVE-2018-3211 Oracle:CVE-2018-3212 Oracle:CVE-2018-3213 Oracle:CVE-2018-3214 Oracle:CVE-2018-3215 Oracle:CVE-2018-3217 Oracle:CVE-2018-3218 Oracle:CVE-2018-3219 Oracle:CVE-2018-3220 Oracle:CVE-2018-3221 Oracle:CVE-2018-3222 Oracle:CVE-2018-3223 Oracle:CVE-2018-3224 Oracle:CVE-2018-3225 Oracle:CVE-2018-3226 Oracle:CVE-2018-3227 Oracle:CVE-2018-3228 Oracle:CVE-2018-3229 Oracle:CVE-2018-3230 Oracle:CVE-2018-3231 Oracle:CVE-2018-3232 Oracle:CVE-2018-3233 Oracle:CVE-2018-3234 Oracle:CVE-2018-3235 Oracle:CVE-2018-3236 Oracle:CVE-2018-3237 Oracle:CVE-2018-3238 Oracle:CVE-2018-3239 Oracle:CVE-2018-3241 Oracle:CVE-2018-3242 Oracle:CVE-2018-3243 Oracle:CVE-2018-3244 Oracle:CVE-2018-3245 Oracle:CVE-2018-3246 Oracle:CVE-2018-3247 Oracle:CVE-2018-3248 Oracle:CVE-2018-3249 Oracle:CVE-2018-3250 Oracle:CVE-2018-3251 Oracle:CVE-2018-3252 Oracle:CVE-2018-3253 Oracle:CVE-2018-3254 Oracle:CVE-2018-3255 Oracle:CVE-2018-3256 Oracle:CVE-2018-3257 Oracle:CVE-2018-3258 Oracle:CVE-2018-3259 Oracle:CVE-2018-3261 Oracle:CVE-2018-3262 Oracle:CVE-2018-3263 Oracle:CVE-2018-3264 Oracle:CVE-2018-3265 Oracle:CVE-2018-3266 Oracle:CVE-2018-3267 Oracle:CVE-2018-3268 Oracle:CVE-2018-3269 Oracle:CVE-2018-3270 Oracle:CVE-2018-3271 Oracle:CVE-2018-3272 Oracle:CVE-2018-3273 Oracle:CVE-2018-3274 Oracle:CVE-2018-3275 Oracle:CVE-2018-3276 Oracle:CVE-2018-3277 Oracle:CVE-2018-3278 Oracle:CVE-2018-3279 Oracle:CVE-2018-3280 Oracle:CVE-2018-3281 Oracle:CVE-2018-3282 Oracle:CVE-2018-3283 Oracle:CVE-2018-3284 Oracle:CVE-2018-3285 Oracle:CVE-2018-3286 Oracle:CVE-2018-3287 Oracle:CVE-2018-3288 Oracle:CVE-2018-3289 Oracle:CVE-2018-3290 Oracle:CVE-2018-3291 Oracle:CVE-2018-3292 Oracle:CVE-2018-3293 Oracle:CVE-2018-3294 Oracle:CVE-2018-3295 Oracle:CVE-2018-3296 Oracle:CVE-2018-3297 Oracle:CVE-2018-3298 Oracle:CVE-2018-3299 Oracle:CVE-2018-3301 Oracle:CVE-2018-3302 Oracle:CVE-2018-7489 Oracle:CVE-2018-8013 Oracle:CVE-2018-8014 Oracle:CVE-2018-8037 RH:CVE-2017-13077 RH:CVE-2017-13078 RH:CVE-2017-13079 RH:CVE-2017-13080 RH:CVE-2017-13081 RH:CVE-2017-13082 RH:CVE-2017-13084 RH:CVE-2017-13086 RH:CVE-2017-13087 RH:CVE-2017-13088 RHSA-2017:2907 RHSA-2017:2911 SECTRACK:1039570 SECTRACK:1039571 SECTRACK:1039572 SECTRACK:1039573 SECTRACK:1039576 SECTRACK:1039577 SECTRACK:1039578 SECTRACK:1039581 SECTRACK:1039585 SECTRACK:1039703 SECTRACK:1041432 SMASH Issue 191142 SUSE:SUSE-SU-2017:2745 SUSE:SUSE-SU-2017:2752 SUSE:openSUSE-SU-2017:2755 UBUNTU:CVE-2017-13077 UBUNTU:CVE-2017-13078 UBUNTU:CVE-2017-13079 UBUNTU:CVE-2017-13080 UBUNTU:CVE-2017-13081 UBUNTU:CVE-2017-13082 UBUNTU:CVE-2017-13084 UBUNTU:CVE-2017-13086 UBUNTU:CVE-2017-13087 UBUNTU:CVE-2017-13088 UBUNTU:USN-3455-1 bdo#1033297 bnc#1056061 linux.git:commit:1b72bf5a0777d7cec6c2d857ac15599022b3c123 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 linux.git:commit:fdf7cb4185b60c68e1a75e61691c4afdc15dea0e rh#1167537 rh#1183461 rh#1202366 rh#1202380 rh#1202384 rh#1202395 rh#1202418 rh#1293972 rh#1369383 rh#1384344 rh#1393454 rh#1397485 rh#1399546 rh#1491692 rh#1491693 rh#1491694 rh#1491696 rh#1491697 rh#1491698 rh#1500301 rh#1500302 rh#1500303 rh#1500304 rh#1519780 rh#1553413 rh#1591854 rh#1607582 rh#1608073 rh#1731271 rh#2044599 rh#2044602 rh#2061700 rh#2116175 rh#2119127 rh#2161287 rh#2270497 |
CVE-2017-13086 | kernel-source-rt:Released | important | 8.1 (CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) | BID:101274 CERT-VN:VU#228519 CISCO:20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II CONFIRM:access.redhat.com:CVE-2017-13088 CONFIRM:cert-portal.siemens.com:CVE-2017-13088 CONFIRM:cert.vde.com:CVE-2017-13080 CONFIRM:cert.vde.com:CVE-2017-13088 CONFIRM:portal.msrc.microsoft.com:CVE-2017-13080 CONFIRM:rockwellautomation.custhelp.com:CVE-2017-13082 CONFIRM:source.android.com:CVE-2017-5754 CONFIRM:source.android.com:CVE-2017-6264 CONFIRM:source.android.com:CVE-2017-6294 CONFIRM:support.apple.com:CVE-2017-13852 CONFIRM:support.apple.com:CVE-2017-13904 CONFIRM:support.apple.com:CVE-2017-3169 CONFIRM:support.hpe.com:CVE-2017-13081 CONFIRM:support.lenovo.com:CVE-2017-13088 CONFIRM:www.arubanetworks.com:CVE-2017-13088 CONFIRM:www.intel.com:CVE-2017-13080 CONFIRM:www.oracle.com:CVE-2017-5715 CONFIRM:www.oracle.com:CVE-2017-5753 CONFIRM:www.oracle.com:CVE-2017-6074 CVE-2017-13077 CVE-2017-13078 CVE-2017-13079 CVE-2017-13080 CVE-2017-13081 CVE-2017-13082 CVE-2017-13084 CVE-2017-13086 CVE-2017-13087 CVE-2017-13088 CVE-2024-2466 D:CVE-2022-2590 DSA-3999 DSA-5378 FREEBSD:FreeBSD-SA-17:07 GENTOO:GLSA-201711-03 MISC:github.com:CVE-2017-13082 MISC:github.com:OSS:2024/Q1/256 MISC:ics-cert.us-cert.gov:CVE-2017-13082 MISC:w1.fi MISC:w1.fi:CVE-2017-13088 MISC:www.krackattacks.com:CVE-2017-13088 MLIST:[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update MLIST:[debian-lts-announce] 20181113 [SECURITY] [DLA 1573-1] firmware-nonfree security update OSS:2017/Q4/83 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/11/10/2 OSS:2022/Q3/99 OSS:2022/Q4/132 OSS:2022/Q4/135 OSS:2024/03/27/4 OSS:2024/Q1/256 Oracle:CVE-2011-4461 Oracle:CVE-2013-1768 Oracle:CVE-2014-0114 Oracle:CVE-2014-3490 Oracle:CVE-2014-3577 Oracle:CVE-2015-0204 Oracle:CVE-2015-0235 Oracle:CVE-2015-5600 Oracle:CVE-2015-6937 Oracle:CVE-2015-7501 Oracle:CVE-2015-7940 Oracle:CVE-2015-9251 Oracle:CVE-2016-0635 Oracle:CVE-2016-0714 Oracle:CVE-2016-0729 Oracle:CVE-2016-1000031 Oracle:CVE-2016-1181 Oracle:CVE-2016-1182 Oracle:CVE-2016-2099 Oracle:CVE-2016-2107 Oracle:CVE-2016-2176 Oracle:CVE-2016-2179 Oracle:CVE-2016-2183 Oracle:CVE-2016-3092 Oracle:CVE-2016-3506 Oracle:CVE-2016-4000 Oracle:CVE-2016-4055 Oracle:CVE-2016-5007 Oracle:CVE-2016-5019 Oracle:CVE-2016-5080 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 Oracle:CVE-2016-6304 Oracle:CVE-2016-6814 Oracle:CVE-2016-7103 Oracle:CVE-2016-7167 Oracle:CVE-2016-9843 Oracle:CVE-2016-9878 Oracle:CVE-2017-0379 Oracle:CVE-2017-10068 Oracle:CVE-2017-12617 Oracle:CVE-2017-13077 Oracle:CVE-2017-13082 Oracle:CVE-2017-14735 Oracle:CVE-2017-15095 Oracle:CVE-2017-17562 Oracle:CVE-2017-3633 Oracle:CVE-2017-3736 Oracle:CVE-2017-3737 Oracle:CVE-2017-5533 Oracle:CVE-2017-5645 Oracle:CVE-2017-5662 Oracle:CVE-2017-5664 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2017-6074 Oracle:CVE-2017-7525 Oracle:CVE-2017-7805 Oracle:CVE-2017-9798 Oracle:CVE-2018-0732 Oracle:CVE-2018-0739 Oracle:CVE-2018-1000120 Oracle:CVE-2018-1000300 Oracle:CVE-2018-11039 Oracle:CVE-2018-1171 Oracle:CVE-2018-11776 Oracle:CVE-2018-1258 Oracle:CVE-2018-1275 Oracle:CVE-2018-1305 Oracle:CVE-2018-13785 Oracle:CVE-2018-1656 Oracle:CVE-2018-2563 Oracle:CVE-2018-2572 Oracle:CVE-2018-2587 Oracle:CVE-2018-2598 Oracle:CVE-2018-2628 Oracle:CVE-2018-2718 Oracle:CVE-2018-2737 Oracle:CVE-2018-2738 Oracle:CVE-2018-2739 Oracle:CVE-2018-2742 Oracle:CVE-2018-2746 Oracle:CVE-2018-2747 Oracle:CVE-2018-2748 Oracle:CVE-2018-2749 Oracle:CVE-2018-2750 Oracle:CVE-2018-2752 Oracle:CVE-2018-2753 Oracle:CVE-2018-2754 Oracle:CVE-2018-2755 Oracle:CVE-2018-2756 Oracle:CVE-2018-2758 Oracle:CVE-2018-2759 Oracle:CVE-2018-2760 Oracle:CVE-2018-2761 Oracle:CVE-2018-2762 Oracle:CVE-2018-2763 Oracle:CVE-2018-2764 Oracle:CVE-2018-2765 Oracle:CVE-2018-2766 Oracle:CVE-2018-2767 Oracle:CVE-2018-2768 Oracle:CVE-2018-2769 Oracle:CVE-2018-2770 Oracle:CVE-2018-2771 Oracle:CVE-2018-2772 Oracle:CVE-2018-2773 Oracle:CVE-2018-2774 Oracle:CVE-2018-2775 Oracle:CVE-2018-2776 Oracle:CVE-2018-2777 Oracle:CVE-2018-2778 Oracle:CVE-2018-2779 Oracle:CVE-2018-2780 Oracle:CVE-2018-2781 Oracle:CVE-2018-2782 Oracle:CVE-2018-2783 Oracle:CVE-2018-2784 Oracle:CVE-2018-2785 Oracle:CVE-2018-2786 Oracle:CVE-2018-2787 Oracle:CVE-2018-2788 Oracle:CVE-2018-2789 Oracle:CVE-2018-2790 Oracle:CVE-2018-2791 Oracle:CVE-2018-2792 Oracle:CVE-2018-2793 Oracle:CVE-2018-2794 Oracle:CVE-2018-2795 Oracle:CVE-2018-2796 Oracle:CVE-2018-2797 Oracle:CVE-2018-2798 Oracle:CVE-2018-2799 Oracle:CVE-2018-2800 Oracle:CVE-2018-2801 Oracle:CVE-2018-2804 Oracle:CVE-2018-2805 Oracle:CVE-2018-2806 Oracle:CVE-2018-2807 Oracle:CVE-2018-2808 Oracle:CVE-2018-2809 Oracle:CVE-2018-2810 Oracle:CVE-2018-2811 Oracle:CVE-2018-2812 Oracle:CVE-2018-2813 Oracle:CVE-2018-2814 Oracle:CVE-2018-2815 Oracle:CVE-2018-2816 Oracle:CVE-2018-2817 Oracle:CVE-2018-2818 Oracle:CVE-2018-2819 Oracle:CVE-2018-2820 Oracle:CVE-2018-2821 Oracle:CVE-2018-2822 Oracle:CVE-2018-2823 Oracle:CVE-2018-2825 Oracle:CVE-2018-2826 Oracle:CVE-2018-2827 Oracle:CVE-2018-2828 Oracle:CVE-2018-2830 Oracle:CVE-2018-2831 Oracle:CVE-2018-2832 Oracle:CVE-2018-2834 Oracle:CVE-2018-2835 Oracle:CVE-2018-2836 Oracle:CVE-2018-2837 Oracle:CVE-2018-2838 Oracle:CVE-2018-2839 Oracle:CVE-2018-2840 Oracle:CVE-2018-2841 Oracle:CVE-2018-2842 Oracle:CVE-2018-2843 Oracle:CVE-2018-2844 Oracle:CVE-2018-2845 Oracle:CVE-2018-2846 Oracle:CVE-2018-2849 Oracle:CVE-2018-2850 Oracle:CVE-2018-2852 Oracle:CVE-2018-2854 Oracle:CVE-2018-2855 Oracle:CVE-2018-2856 Oracle:CVE-2018-2857 Oracle:CVE-2018-2858 Oracle:CVE-2018-2859 Oracle:CVE-2018-2860 Oracle:CVE-2018-2861 Oracle:CVE-2018-2862 Oracle:CVE-2018-2863 Oracle:CVE-2018-2864 Oracle:CVE-2018-2865 Oracle:CVE-2018-2866 Oracle:CVE-2018-2867 Oracle:CVE-2018-2868 Oracle:CVE-2018-2869 Oracle:CVE-2018-2870 Oracle:CVE-2018-2871 Oracle:CVE-2018-2872 Oracle:CVE-2018-2873 Oracle:CVE-2018-2874 Oracle:CVE-2018-2876 Oracle:CVE-2018-2877 Oracle:CVE-2018-2878 Oracle:CVE-2018-2879 Oracle:CVE-2018-2881 Oracle:CVE-2018-2882 Oracle:CVE-2018-2887 Oracle:CVE-2018-2888 Oracle:CVE-2018-2889 Oracle:CVE-2018-2891 Oracle:CVE-2018-2892 Oracle:CVE-2018-2893 Oracle:CVE-2018-2894 Oracle:CVE-2018-2895 Oracle:CVE-2018-2896 Oracle:CVE-2018-2897 Oracle:CVE-2018-2898 Oracle:CVE-2018-2899 Oracle:CVE-2018-2900 Oracle:CVE-2018-2901 Oracle:CVE-2018-2902 Oracle:CVE-2018-2903 Oracle:CVE-2018-2904 Oracle:CVE-2018-2905 Oracle:CVE-2018-2906 Oracle:CVE-2018-2907 Oracle:CVE-2018-2908 Oracle:CVE-2018-2909 Oracle:CVE-2018-2911 Oracle:CVE-2018-2912 Oracle:CVE-2018-2913 Oracle:CVE-2018-2914 Oracle:CVE-2018-2915 Oracle:CVE-2018-2916 Oracle:CVE-2018-2917 Oracle:CVE-2018-2918 Oracle:CVE-2018-2919 Oracle:CVE-2018-2920 Oracle:CVE-2018-2921 Oracle:CVE-2018-2922 Oracle:CVE-2018-2923 Oracle:CVE-2018-2924 Oracle:CVE-2018-2925 Oracle:CVE-2018-2926 Oracle:CVE-2018-2927 Oracle:CVE-2018-2928 Oracle:CVE-2018-2929 Oracle:CVE-2018-2930 Oracle:CVE-2018-2932 Oracle:CVE-2018-2933 Oracle:CVE-2018-2934 Oracle:CVE-2018-2935 Oracle:CVE-2018-2936 Oracle:CVE-2018-2937 Oracle:CVE-2018-2938 Oracle:CVE-2018-2939 Oracle:CVE-2018-2940 Oracle:CVE-2018-2941 Oracle:CVE-2018-2942 Oracle:CVE-2018-2943 Oracle:CVE-2018-2944 Oracle:CVE-2018-2945 Oracle:CVE-2018-2946 Oracle:CVE-2018-2947 Oracle:CVE-2018-2948 Oracle:CVE-2018-2949 Oracle:CVE-2018-2950 Oracle:CVE-2018-2951 Oracle:CVE-2018-2952 Oracle:CVE-2018-2953 Oracle:CVE-2018-2954 Oracle:CVE-2018-2955 Oracle:CVE-2018-2956 Oracle:CVE-2018-2957 Oracle:CVE-2018-2958 Oracle:CVE-2018-2959 Oracle:CVE-2018-2960 Oracle:CVE-2018-2961 Oracle:CVE-2018-2962 Oracle:CVE-2018-2963 Oracle:CVE-2018-2964 Oracle:CVE-2018-2965 Oracle:CVE-2018-2966 Oracle:CVE-2018-2967 Oracle:CVE-2018-2968 Oracle:CVE-2018-2969 Oracle:CVE-2018-2970 Oracle:CVE-2018-2971 Oracle:CVE-2018-2972 Oracle:CVE-2018-2973 Oracle:CVE-2018-2974 Oracle:CVE-2018-2975 Oracle:CVE-2018-2976 Oracle:CVE-2018-2977 Oracle:CVE-2018-2979 Oracle:CVE-2018-2980 Oracle:CVE-2018-2981 Oracle:CVE-2018-2982 Oracle:CVE-2018-2984 Oracle:CVE-2018-2985 Oracle:CVE-2018-2986 Oracle:CVE-2018-2987 Oracle:CVE-2018-2988 Oracle:CVE-2018-2989 Oracle:CVE-2018-2990 Oracle:CVE-2018-2991 Oracle:CVE-2018-2992 Oracle:CVE-2018-2993 Oracle:CVE-2018-2994 Oracle:CVE-2018-2995 Oracle:CVE-2018-2996 Oracle:CVE-2018-2997 Oracle:CVE-2018-2998 Oracle:CVE-2018-2999 Oracle:CVE-2018-3000 Oracle:CVE-2018-3001 Oracle:CVE-2018-3002 Oracle:CVE-2018-3003 Oracle:CVE-2018-3004 Oracle:CVE-2018-3005 Oracle:CVE-2018-3006 Oracle:CVE-2018-3007 Oracle:CVE-2018-3008 Oracle:CVE-2018-3009 Oracle:CVE-2018-3010 Oracle:CVE-2018-3011 Oracle:CVE-2018-3012 Oracle:CVE-2018-3013 Oracle:CVE-2018-3014 Oracle:CVE-2018-3015 Oracle:CVE-2018-3016 Oracle:CVE-2018-3017 Oracle:CVE-2018-3018 Oracle:CVE-2018-3019 Oracle:CVE-2018-3020 Oracle:CVE-2018-3021 Oracle:CVE-2018-3022 Oracle:CVE-2018-3023 Oracle:CVE-2018-3024 Oracle:CVE-2018-3025 Oracle:CVE-2018-3026 Oracle:CVE-2018-3027 Oracle:CVE-2018-3028 Oracle:CVE-2018-3029 Oracle:CVE-2018-3030 Oracle:CVE-2018-3031 Oracle:CVE-2018-3032 Oracle:CVE-2018-3033 Oracle:CVE-2018-3034 Oracle:CVE-2018-3035 Oracle:CVE-2018-3036 Oracle:CVE-2018-3037 Oracle:CVE-2018-3038 Oracle:CVE-2018-3039 Oracle:CVE-2018-3040 Oracle:CVE-2018-3041 Oracle:CVE-2018-3042 Oracle:CVE-2018-3043 Oracle:CVE-2018-3044 Oracle:CVE-2018-3045 Oracle:CVE-2018-3046 Oracle:CVE-2018-3047 Oracle:CVE-2018-3048 Oracle:CVE-2018-3049 Oracle:CVE-2018-3050 Oracle:CVE-2018-3051 Oracle:CVE-2018-3052 Oracle:CVE-2018-3053 Oracle:CVE-2018-3054 Oracle:CVE-2018-3055 Oracle:CVE-2018-3056 Oracle:CVE-2018-3057 Oracle:CVE-2018-3058 Oracle:CVE-2018-3059 Oracle:CVE-2018-3060 Oracle:CVE-2018-3061 Oracle:CVE-2018-3062 Oracle:CVE-2018-3063 Oracle:CVE-2018-3064 Oracle:CVE-2018-3065 Oracle:CVE-2018-3066 Oracle:CVE-2018-3067 Oracle:CVE-2018-3068 Oracle:CVE-2018-3069 Oracle:CVE-2018-3070 Oracle:CVE-2018-3071 Oracle:CVE-2018-3072 Oracle:CVE-2018-3073 Oracle:CVE-2018-3074 Oracle:CVE-2018-3075 Oracle:CVE-2018-3076 Oracle:CVE-2018-3077 Oracle:CVE-2018-3078 Oracle:CVE-2018-3079 Oracle:CVE-2018-3080 Oracle:CVE-2018-3081 Oracle:CVE-2018-3082 Oracle:CVE-2018-3084 Oracle:CVE-2018-3085 Oracle:CVE-2018-3086 Oracle:CVE-2018-3087 Oracle:CVE-2018-3088 Oracle:CVE-2018-3089 Oracle:CVE-2018-3090 Oracle:CVE-2018-3091 Oracle:CVE-2018-3092 Oracle:CVE-2018-3093 Oracle:CVE-2018-3094 Oracle:CVE-2018-3095 Oracle:CVE-2018-3096 Oracle:CVE-2018-3097 Oracle:CVE-2018-3098 Oracle:CVE-2018-3099 Oracle:CVE-2018-3100 Oracle:CVE-2018-3101 Oracle:CVE-2018-3102 Oracle:CVE-2018-3103 Oracle:CVE-2018-3104 Oracle:CVE-2018-3105 Oracle:CVE-2018-3108 Oracle:CVE-2018-3109 Oracle:CVE-2018-3115 Oracle:CVE-2018-3122 Oracle:CVE-2018-3126 Oracle:CVE-2018-3127 Oracle:CVE-2018-3128 Oracle:CVE-2018-3129 Oracle:CVE-2018-3130 Oracle:CVE-2018-3131 Oracle:CVE-2018-3132 Oracle:CVE-2018-3133 Oracle:CVE-2018-3134 Oracle:CVE-2018-3135 Oracle:CVE-2018-3136 Oracle:CVE-2018-3137 Oracle:CVE-2018-3138 Oracle:CVE-2018-3139 Oracle:CVE-2018-3140 Oracle:CVE-2018-3141 Oracle:CVE-2018-3142 Oracle:CVE-2018-3143 Oracle:CVE-2018-3144 Oracle:CVE-2018-3145 Oracle:CVE-2018-3146 Oracle:CVE-2018-3147 Oracle:CVE-2018-3148 Oracle:CVE-2018-3149 Oracle:CVE-2018-3150 Oracle:CVE-2018-3151 Oracle:CVE-2018-3152 Oracle:CVE-2018-3153 Oracle:CVE-2018-3154 Oracle:CVE-2018-3155 Oracle:CVE-2018-3156 Oracle:CVE-2018-3157 Oracle:CVE-2018-3158 Oracle:CVE-2018-3159 Oracle:CVE-2018-3160 Oracle:CVE-2018-3161 Oracle:CVE-2018-3162 Oracle:CVE-2018-3163 Oracle:CVE-2018-3164 Oracle:CVE-2018-3165 Oracle:CVE-2018-3166 Oracle:CVE-2018-3167 Oracle:CVE-2018-3168 Oracle:CVE-2018-3169 Oracle:CVE-2018-3170 Oracle:CVE-2018-3171 Oracle:CVE-2018-3172 Oracle:CVE-2018-3173 Oracle:CVE-2018-3174 Oracle:CVE-2018-3175 Oracle:CVE-2018-3176 Oracle:CVE-2018-3177 Oracle:CVE-2018-3178 Oracle:CVE-2018-3179 Oracle:CVE-2018-3180 Oracle:CVE-2018-3181 Oracle:CVE-2018-3182 Oracle:CVE-2018-3183 Oracle:CVE-2018-3184 Oracle:CVE-2018-3185 Oracle:CVE-2018-3186 Oracle:CVE-2018-3187 Oracle:CVE-2018-3188 Oracle:CVE-2018-3189 Oracle:CVE-2018-3190 Oracle:CVE-2018-3191 Oracle:CVE-2018-3192 Oracle:CVE-2018-3193 Oracle:CVE-2018-3194 Oracle:CVE-2018-3195 Oracle:CVE-2018-3196 Oracle:CVE-2018-3197 Oracle:CVE-2018-3198 Oracle:CVE-2018-3200 Oracle:CVE-2018-3201 Oracle:CVE-2018-3202 Oracle:CVE-2018-3203 Oracle:CVE-2018-3204 Oracle:CVE-2018-3205 Oracle:CVE-2018-3206 Oracle:CVE-2018-3207 Oracle:CVE-2018-3208 Oracle:CVE-2018-3209 Oracle:CVE-2018-3210 Oracle:CVE-2018-3211 Oracle:CVE-2018-3212 Oracle:CVE-2018-3213 Oracle:CVE-2018-3214 Oracle:CVE-2018-3215 Oracle:CVE-2018-3217 Oracle:CVE-2018-3218 Oracle:CVE-2018-3219 Oracle:CVE-2018-3220 Oracle:CVE-2018-3221 Oracle:CVE-2018-3222 Oracle:CVE-2018-3223 Oracle:CVE-2018-3224 Oracle:CVE-2018-3225 Oracle:CVE-2018-3226 Oracle:CVE-2018-3227 Oracle:CVE-2018-3228 Oracle:CVE-2018-3229 Oracle:CVE-2018-3230 Oracle:CVE-2018-3231 Oracle:CVE-2018-3232 Oracle:CVE-2018-3233 Oracle:CVE-2018-3234 Oracle:CVE-2018-3235 Oracle:CVE-2018-3236 Oracle:CVE-2018-3237 Oracle:CVE-2018-3238 Oracle:CVE-2018-3239 Oracle:CVE-2018-3241 Oracle:CVE-2018-3242 Oracle:CVE-2018-3243 Oracle:CVE-2018-3244 Oracle:CVE-2018-3245 Oracle:CVE-2018-3246 Oracle:CVE-2018-3247 Oracle:CVE-2018-3248 Oracle:CVE-2018-3249 Oracle:CVE-2018-3250 Oracle:CVE-2018-3251 Oracle:CVE-2018-3252 Oracle:CVE-2018-3253 Oracle:CVE-2018-3254 Oracle:CVE-2018-3255 Oracle:CVE-2018-3256 Oracle:CVE-2018-3257 Oracle:CVE-2018-3258 Oracle:CVE-2018-3259 Oracle:CVE-2018-3261 Oracle:CVE-2018-3262 Oracle:CVE-2018-3263 Oracle:CVE-2018-3264 Oracle:CVE-2018-3265 Oracle:CVE-2018-3266 Oracle:CVE-2018-3267 Oracle:CVE-2018-3268 Oracle:CVE-2018-3269 Oracle:CVE-2018-3270 Oracle:CVE-2018-3271 Oracle:CVE-2018-3272 Oracle:CVE-2018-3273 Oracle:CVE-2018-3274 Oracle:CVE-2018-3275 Oracle:CVE-2018-3276 Oracle:CVE-2018-3277 Oracle:CVE-2018-3278 Oracle:CVE-2018-3279 Oracle:CVE-2018-3280 Oracle:CVE-2018-3281 Oracle:CVE-2018-3282 Oracle:CVE-2018-3283 Oracle:CVE-2018-3284 Oracle:CVE-2018-3285 Oracle:CVE-2018-3286 Oracle:CVE-2018-3287 Oracle:CVE-2018-3288 Oracle:CVE-2018-3289 Oracle:CVE-2018-3290 Oracle:CVE-2018-3291 Oracle:CVE-2018-3292 Oracle:CVE-2018-3293 Oracle:CVE-2018-3294 Oracle:CVE-2018-3295 Oracle:CVE-2018-3296 Oracle:CVE-2018-3297 Oracle:CVE-2018-3298 Oracle:CVE-2018-3299 Oracle:CVE-2018-3301 Oracle:CVE-2018-3302 Oracle:CVE-2018-7489 Oracle:CVE-2018-8013 Oracle:CVE-2018-8014 Oracle:CVE-2018-8037 RH:CVE-2017-13077 RH:CVE-2017-13078 RH:CVE-2017-13079 RH:CVE-2017-13080 RH:CVE-2017-13081 RH:CVE-2017-13082 RH:CVE-2017-13084 RH:CVE-2017-13086 RH:CVE-2017-13087 RH:CVE-2017-13088 RHSA-2017:2907 RHSA-2017:2911 SECTRACK:1039570 SECTRACK:1039571 SECTRACK:1039572 SECTRACK:1039573 SECTRACK:1039576 SECTRACK:1039577 SECTRACK:1039578 SECTRACK:1039581 SECTRACK:1039585 SECTRACK:1039703 SECTRACK:1041432 SMASH Issue 191142 SUSE:SUSE-SU-2017:2745 SUSE:SUSE-SU-2017:2752 SUSE:openSUSE-SU-2017:2755 UBUNTU:CVE-2017-13077 UBUNTU:CVE-2017-13078 UBUNTU:CVE-2017-13079 UBUNTU:CVE-2017-13080 UBUNTU:CVE-2017-13081 UBUNTU:CVE-2017-13082 UBUNTU:CVE-2017-13084 UBUNTU:CVE-2017-13086 UBUNTU:CVE-2017-13087 UBUNTU:CVE-2017-13088 UBUNTU:USN-3455-1 bdo#1033297 bnc#1056061 linux.git:commit:1b72bf5a0777d7cec6c2d857ac15599022b3c123 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 linux.git:commit:fdf7cb4185b60c68e1a75e61691c4afdc15dea0e rh#1167537 rh#1183461 rh#1202366 rh#1202380 rh#1202384 rh#1202395 rh#1202418 rh#1293972 rh#1369383 rh#1384344 rh#1393454 rh#1397485 rh#1399546 rh#1491692 rh#1491693 rh#1491694 rh#1491696 rh#1491697 rh#1491698 rh#1500301 rh#1500302 rh#1500303 rh#1500304 rh#1519780 rh#1553413 rh#1591854 rh#1607582 rh#1608073 rh#1731271 rh#2044599 rh#2044602 rh#2061700 rh#2116175 rh#2119127 rh#2161287 rh#2270497 |
CVE-2017-13087 | kernel-source-rt:Released | important | 8.1 (CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) | BID:101274 CERT-VN:VU#228519 CISCO:20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II CONFIRM:access.redhat.com:CVE-2017-13088 CONFIRM:cert-portal.siemens.com:CVE-2017-13088 CONFIRM:cert.vde.com:CVE-2017-13080 CONFIRM:cert.vde.com:CVE-2017-13088 CONFIRM:portal.msrc.microsoft.com:CVE-2017-13080 CONFIRM:rockwellautomation.custhelp.com:CVE-2017-13082 CONFIRM:source.android.com:CVE-2017-5754 CONFIRM:source.android.com:CVE-2017-6264 CONFIRM:source.android.com:CVE-2017-6294 CONFIRM:support.apple.com:CVE-2017-13852 CONFIRM:support.apple.com:CVE-2017-13904 CONFIRM:support.apple.com:CVE-2017-3169 CONFIRM:support.hpe.com:CVE-2017-13081 CONFIRM:support.lenovo.com:CVE-2017-13088 CONFIRM:www.arubanetworks.com:CVE-2017-13088 CONFIRM:www.intel.com:CVE-2017-13080 CONFIRM:www.oracle.com:CVE-2017-5715 CONFIRM:www.oracle.com:CVE-2017-5753 CONFIRM:www.oracle.com:CVE-2017-6074 CVE-2017-13077 CVE-2017-13078 CVE-2017-13079 CVE-2017-13080 CVE-2017-13081 CVE-2017-13082 CVE-2017-13084 CVE-2017-13086 CVE-2017-13087 CVE-2017-13088 CVE-2024-2466 D:CVE-2022-2590 DSA-3999 DSA-5378 FREEBSD:FreeBSD-SA-17:07 GENTOO:GLSA-201711-03 MISC:github.com:CVE-2017-13082 MISC:github.com:OSS:2024/Q1/256 MISC:ics-cert.us-cert.gov:CVE-2017-13082 MISC:w1.fi MISC:w1.fi:CVE-2017-13088 MISC:www.krackattacks.com:CVE-2017-13088 MLIST:[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update MLIST:[debian-lts-announce] 20181113 [SECURITY] [DLA 1573-1] firmware-nonfree security update OSS:2017/Q4/83 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/11/10/2 OSS:2022/Q3/99 OSS:2022/Q4/132 OSS:2022/Q4/135 OSS:2024/03/27/4 OSS:2024/Q1/256 Oracle:CVE-2011-4461 Oracle:CVE-2013-1768 Oracle:CVE-2014-0114 Oracle:CVE-2014-3490 Oracle:CVE-2014-3577 Oracle:CVE-2015-0204 Oracle:CVE-2015-0235 Oracle:CVE-2015-5600 Oracle:CVE-2015-6937 Oracle:CVE-2015-7501 Oracle:CVE-2015-7940 Oracle:CVE-2015-9251 Oracle:CVE-2016-0635 Oracle:CVE-2016-0714 Oracle:CVE-2016-0729 Oracle:CVE-2016-1000031 Oracle:CVE-2016-1181 Oracle:CVE-2016-1182 Oracle:CVE-2016-2099 Oracle:CVE-2016-2107 Oracle:CVE-2016-2176 Oracle:CVE-2016-2179 Oracle:CVE-2016-2183 Oracle:CVE-2016-3092 Oracle:CVE-2016-3506 Oracle:CVE-2016-4000 Oracle:CVE-2016-4055 Oracle:CVE-2016-5007 Oracle:CVE-2016-5019 Oracle:CVE-2016-5080 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 Oracle:CVE-2016-6304 Oracle:CVE-2016-6814 Oracle:CVE-2016-7103 Oracle:CVE-2016-7167 Oracle:CVE-2016-9843 Oracle:CVE-2016-9878 Oracle:CVE-2017-0379 Oracle:CVE-2017-10068 Oracle:CVE-2017-12617 Oracle:CVE-2017-13077 Oracle:CVE-2017-13082 Oracle:CVE-2017-14735 Oracle:CVE-2017-15095 Oracle:CVE-2017-17562 Oracle:CVE-2017-3633 Oracle:CVE-2017-3736 Oracle:CVE-2017-3737 Oracle:CVE-2017-5533 Oracle:CVE-2017-5645 Oracle:CVE-2017-5662 Oracle:CVE-2017-5664 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2017-6074 Oracle:CVE-2017-7525 Oracle:CVE-2017-7805 Oracle:CVE-2017-9798 Oracle:CVE-2018-0732 Oracle:CVE-2018-0739 Oracle:CVE-2018-1000120 Oracle:CVE-2018-1000300 Oracle:CVE-2018-11039 Oracle:CVE-2018-1171 Oracle:CVE-2018-11776 Oracle:CVE-2018-1258 Oracle:CVE-2018-1275 Oracle:CVE-2018-1305 Oracle:CVE-2018-13785 Oracle:CVE-2018-1656 Oracle:CVE-2018-2563 Oracle:CVE-2018-2572 Oracle:CVE-2018-2587 Oracle:CVE-2018-2598 Oracle:CVE-2018-2628 Oracle:CVE-2018-2718 Oracle:CVE-2018-2737 Oracle:CVE-2018-2738 Oracle:CVE-2018-2739 Oracle:CVE-2018-2742 Oracle:CVE-2018-2746 Oracle:CVE-2018-2747 Oracle:CVE-2018-2748 Oracle:CVE-2018-2749 Oracle:CVE-2018-2750 Oracle:CVE-2018-2752 Oracle:CVE-2018-2753 Oracle:CVE-2018-2754 Oracle:CVE-2018-2755 Oracle:CVE-2018-2756 Oracle:CVE-2018-2758 Oracle:CVE-2018-2759 Oracle:CVE-2018-2760 Oracle:CVE-2018-2761 Oracle:CVE-2018-2762 Oracle:CVE-2018-2763 Oracle:CVE-2018-2764 Oracle:CVE-2018-2765 Oracle:CVE-2018-2766 Oracle:CVE-2018-2767 Oracle:CVE-2018-2768 Oracle:CVE-2018-2769 Oracle:CVE-2018-2770 Oracle:CVE-2018-2771 Oracle:CVE-2018-2772 Oracle:CVE-2018-2773 Oracle:CVE-2018-2774 Oracle:CVE-2018-2775 Oracle:CVE-2018-2776 Oracle:CVE-2018-2777 Oracle:CVE-2018-2778 Oracle:CVE-2018-2779 Oracle:CVE-2018-2780 Oracle:CVE-2018-2781 Oracle:CVE-2018-2782 Oracle:CVE-2018-2783 Oracle:CVE-2018-2784 Oracle:CVE-2018-2785 Oracle:CVE-2018-2786 Oracle:CVE-2018-2787 Oracle:CVE-2018-2788 Oracle:CVE-2018-2789 Oracle:CVE-2018-2790 Oracle:CVE-2018-2791 Oracle:CVE-2018-2792 Oracle:CVE-2018-2793 Oracle:CVE-2018-2794 Oracle:CVE-2018-2795 Oracle:CVE-2018-2796 Oracle:CVE-2018-2797 Oracle:CVE-2018-2798 Oracle:CVE-2018-2799 Oracle:CVE-2018-2800 Oracle:CVE-2018-2801 Oracle:CVE-2018-2804 Oracle:CVE-2018-2805 Oracle:CVE-2018-2806 Oracle:CVE-2018-2807 Oracle:CVE-2018-2808 Oracle:CVE-2018-2809 Oracle:CVE-2018-2810 Oracle:CVE-2018-2811 Oracle:CVE-2018-2812 Oracle:CVE-2018-2813 Oracle:CVE-2018-2814 Oracle:CVE-2018-2815 Oracle:CVE-2018-2816 Oracle:CVE-2018-2817 Oracle:CVE-2018-2818 Oracle:CVE-2018-2819 Oracle:CVE-2018-2820 Oracle:CVE-2018-2821 Oracle:CVE-2018-2822 Oracle:CVE-2018-2823 Oracle:CVE-2018-2825 Oracle:CVE-2018-2826 Oracle:CVE-2018-2827 Oracle:CVE-2018-2828 Oracle:CVE-2018-2830 Oracle:CVE-2018-2831 Oracle:CVE-2018-2832 Oracle:CVE-2018-2834 Oracle:CVE-2018-2835 Oracle:CVE-2018-2836 Oracle:CVE-2018-2837 Oracle:CVE-2018-2838 Oracle:CVE-2018-2839 Oracle:CVE-2018-2840 Oracle:CVE-2018-2841 Oracle:CVE-2018-2842 Oracle:CVE-2018-2843 Oracle:CVE-2018-2844 Oracle:CVE-2018-2845 Oracle:CVE-2018-2846 Oracle:CVE-2018-2849 Oracle:CVE-2018-2850 Oracle:CVE-2018-2852 Oracle:CVE-2018-2854 Oracle:CVE-2018-2855 Oracle:CVE-2018-2856 Oracle:CVE-2018-2857 Oracle:CVE-2018-2858 Oracle:CVE-2018-2859 Oracle:CVE-2018-2860 Oracle:CVE-2018-2861 Oracle:CVE-2018-2862 Oracle:CVE-2018-2863 Oracle:CVE-2018-2864 Oracle:CVE-2018-2865 Oracle:CVE-2018-2866 Oracle:CVE-2018-2867 Oracle:CVE-2018-2868 Oracle:CVE-2018-2869 Oracle:CVE-2018-2870 Oracle:CVE-2018-2871 Oracle:CVE-2018-2872 Oracle:CVE-2018-2873 Oracle:CVE-2018-2874 Oracle:CVE-2018-2876 Oracle:CVE-2018-2877 Oracle:CVE-2018-2878 Oracle:CVE-2018-2879 Oracle:CVE-2018-2881 Oracle:CVE-2018-2882 Oracle:CVE-2018-2887 Oracle:CVE-2018-2888 Oracle:CVE-2018-2889 Oracle:CVE-2018-2891 Oracle:CVE-2018-2892 Oracle:CVE-2018-2893 Oracle:CVE-2018-2894 Oracle:CVE-2018-2895 Oracle:CVE-2018-2896 Oracle:CVE-2018-2897 Oracle:CVE-2018-2898 Oracle:CVE-2018-2899 Oracle:CVE-2018-2900 Oracle:CVE-2018-2901 Oracle:CVE-2018-2902 Oracle:CVE-2018-2903 Oracle:CVE-2018-2904 Oracle:CVE-2018-2905 Oracle:CVE-2018-2906 Oracle:CVE-2018-2907 Oracle:CVE-2018-2908 Oracle:CVE-2018-2909 Oracle:CVE-2018-2911 Oracle:CVE-2018-2912 Oracle:CVE-2018-2913 Oracle:CVE-2018-2914 Oracle:CVE-2018-2915 Oracle:CVE-2018-2916 Oracle:CVE-2018-2917 Oracle:CVE-2018-2918 Oracle:CVE-2018-2919 Oracle:CVE-2018-2920 Oracle:CVE-2018-2921 Oracle:CVE-2018-2922 Oracle:CVE-2018-2923 Oracle:CVE-2018-2924 Oracle:CVE-2018-2925 Oracle:CVE-2018-2926 Oracle:CVE-2018-2927 Oracle:CVE-2018-2928 Oracle:CVE-2018-2929 Oracle:CVE-2018-2930 Oracle:CVE-2018-2932 Oracle:CVE-2018-2933 Oracle:CVE-2018-2934 Oracle:CVE-2018-2935 Oracle:CVE-2018-2936 Oracle:CVE-2018-2937 Oracle:CVE-2018-2938 Oracle:CVE-2018-2939 Oracle:CVE-2018-2940 Oracle:CVE-2018-2941 Oracle:CVE-2018-2942 Oracle:CVE-2018-2943 Oracle:CVE-2018-2944 Oracle:CVE-2018-2945 Oracle:CVE-2018-2946 Oracle:CVE-2018-2947 Oracle:CVE-2018-2948 Oracle:CVE-2018-2949 Oracle:CVE-2018-2950 Oracle:CVE-2018-2951 Oracle:CVE-2018-2952 Oracle:CVE-2018-2953 Oracle:CVE-2018-2954 Oracle:CVE-2018-2955 Oracle:CVE-2018-2956 Oracle:CVE-2018-2957 Oracle:CVE-2018-2958 Oracle:CVE-2018-2959 Oracle:CVE-2018-2960 Oracle:CVE-2018-2961 Oracle:CVE-2018-2962 Oracle:CVE-2018-2963 Oracle:CVE-2018-2964 Oracle:CVE-2018-2965 Oracle:CVE-2018-2966 Oracle:CVE-2018-2967 Oracle:CVE-2018-2968 Oracle:CVE-2018-2969 Oracle:CVE-2018-2970 Oracle:CVE-2018-2971 Oracle:CVE-2018-2972 Oracle:CVE-2018-2973 Oracle:CVE-2018-2974 Oracle:CVE-2018-2975 Oracle:CVE-2018-2976 Oracle:CVE-2018-2977 Oracle:CVE-2018-2979 Oracle:CVE-2018-2980 Oracle:CVE-2018-2981 Oracle:CVE-2018-2982 Oracle:CVE-2018-2984 Oracle:CVE-2018-2985 Oracle:CVE-2018-2986 Oracle:CVE-2018-2987 Oracle:CVE-2018-2988 Oracle:CVE-2018-2989 Oracle:CVE-2018-2990 Oracle:CVE-2018-2991 Oracle:CVE-2018-2992 Oracle:CVE-2018-2993 Oracle:CVE-2018-2994 Oracle:CVE-2018-2995 Oracle:CVE-2018-2996 Oracle:CVE-2018-2997 Oracle:CVE-2018-2998 Oracle:CVE-2018-2999 Oracle:CVE-2018-3000 Oracle:CVE-2018-3001 Oracle:CVE-2018-3002 Oracle:CVE-2018-3003 Oracle:CVE-2018-3004 Oracle:CVE-2018-3005 Oracle:CVE-2018-3006 Oracle:CVE-2018-3007 Oracle:CVE-2018-3008 Oracle:CVE-2018-3009 Oracle:CVE-2018-3010 Oracle:CVE-2018-3011 Oracle:CVE-2018-3012 Oracle:CVE-2018-3013 Oracle:CVE-2018-3014 Oracle:CVE-2018-3015 Oracle:CVE-2018-3016 Oracle:CVE-2018-3017 Oracle:CVE-2018-3018 Oracle:CVE-2018-3019 Oracle:CVE-2018-3020 Oracle:CVE-2018-3021 Oracle:CVE-2018-3022 Oracle:CVE-2018-3023 Oracle:CVE-2018-3024 Oracle:CVE-2018-3025 Oracle:CVE-2018-3026 Oracle:CVE-2018-3027 Oracle:CVE-2018-3028 Oracle:CVE-2018-3029 Oracle:CVE-2018-3030 Oracle:CVE-2018-3031 Oracle:CVE-2018-3032 Oracle:CVE-2018-3033 Oracle:CVE-2018-3034 Oracle:CVE-2018-3035 Oracle:CVE-2018-3036 Oracle:CVE-2018-3037 Oracle:CVE-2018-3038 Oracle:CVE-2018-3039 Oracle:CVE-2018-3040 Oracle:CVE-2018-3041 Oracle:CVE-2018-3042 Oracle:CVE-2018-3043 Oracle:CVE-2018-3044 Oracle:CVE-2018-3045 Oracle:CVE-2018-3046 Oracle:CVE-2018-3047 Oracle:CVE-2018-3048 Oracle:CVE-2018-3049 Oracle:CVE-2018-3050 Oracle:CVE-2018-3051 Oracle:CVE-2018-3052 Oracle:CVE-2018-3053 Oracle:CVE-2018-3054 Oracle:CVE-2018-3055 Oracle:CVE-2018-3056 Oracle:CVE-2018-3057 Oracle:CVE-2018-3058 Oracle:CVE-2018-3059 Oracle:CVE-2018-3060 Oracle:CVE-2018-3061 Oracle:CVE-2018-3062 Oracle:CVE-2018-3063 Oracle:CVE-2018-3064 Oracle:CVE-2018-3065 Oracle:CVE-2018-3066 Oracle:CVE-2018-3067 Oracle:CVE-2018-3068 Oracle:CVE-2018-3069 Oracle:CVE-2018-3070 Oracle:CVE-2018-3071 Oracle:CVE-2018-3072 Oracle:CVE-2018-3073 Oracle:CVE-2018-3074 Oracle:CVE-2018-3075 Oracle:CVE-2018-3076 Oracle:CVE-2018-3077 Oracle:CVE-2018-3078 Oracle:CVE-2018-3079 Oracle:CVE-2018-3080 Oracle:CVE-2018-3081 Oracle:CVE-2018-3082 Oracle:CVE-2018-3084 Oracle:CVE-2018-3085 Oracle:CVE-2018-3086 Oracle:CVE-2018-3087 Oracle:CVE-2018-3088 Oracle:CVE-2018-3089 Oracle:CVE-2018-3090 Oracle:CVE-2018-3091 Oracle:CVE-2018-3092 Oracle:CVE-2018-3093 Oracle:CVE-2018-3094 Oracle:CVE-2018-3095 Oracle:CVE-2018-3096 Oracle:CVE-2018-3097 Oracle:CVE-2018-3098 Oracle:CVE-2018-3099 Oracle:CVE-2018-3100 Oracle:CVE-2018-3101 Oracle:CVE-2018-3102 Oracle:CVE-2018-3103 Oracle:CVE-2018-3104 Oracle:CVE-2018-3105 Oracle:CVE-2018-3108 Oracle:CVE-2018-3109 Oracle:CVE-2018-3115 Oracle:CVE-2018-3122 Oracle:CVE-2018-3126 Oracle:CVE-2018-3127 Oracle:CVE-2018-3128 Oracle:CVE-2018-3129 Oracle:CVE-2018-3130 Oracle:CVE-2018-3131 Oracle:CVE-2018-3132 Oracle:CVE-2018-3133 Oracle:CVE-2018-3134 Oracle:CVE-2018-3135 Oracle:CVE-2018-3136 Oracle:CVE-2018-3137 Oracle:CVE-2018-3138 Oracle:CVE-2018-3139 Oracle:CVE-2018-3140 Oracle:CVE-2018-3141 Oracle:CVE-2018-3142 Oracle:CVE-2018-3143 Oracle:CVE-2018-3144 Oracle:CVE-2018-3145 Oracle:CVE-2018-3146 Oracle:CVE-2018-3147 Oracle:CVE-2018-3148 Oracle:CVE-2018-3149 Oracle:CVE-2018-3150 Oracle:CVE-2018-3151 Oracle:CVE-2018-3152 Oracle:CVE-2018-3153 Oracle:CVE-2018-3154 Oracle:CVE-2018-3155 Oracle:CVE-2018-3156 Oracle:CVE-2018-3157 Oracle:CVE-2018-3158 Oracle:CVE-2018-3159 Oracle:CVE-2018-3160 Oracle:CVE-2018-3161 Oracle:CVE-2018-3162 Oracle:CVE-2018-3163 Oracle:CVE-2018-3164 Oracle:CVE-2018-3165 Oracle:CVE-2018-3166 Oracle:CVE-2018-3167 Oracle:CVE-2018-3168 Oracle:CVE-2018-3169 Oracle:CVE-2018-3170 Oracle:CVE-2018-3171 Oracle:CVE-2018-3172 Oracle:CVE-2018-3173 Oracle:CVE-2018-3174 Oracle:CVE-2018-3175 Oracle:CVE-2018-3176 Oracle:CVE-2018-3177 Oracle:CVE-2018-3178 Oracle:CVE-2018-3179 Oracle:CVE-2018-3180 Oracle:CVE-2018-3181 Oracle:CVE-2018-3182 Oracle:CVE-2018-3183 Oracle:CVE-2018-3184 Oracle:CVE-2018-3185 Oracle:CVE-2018-3186 Oracle:CVE-2018-3187 Oracle:CVE-2018-3188 Oracle:CVE-2018-3189 Oracle:CVE-2018-3190 Oracle:CVE-2018-3191 Oracle:CVE-2018-3192 Oracle:CVE-2018-3193 Oracle:CVE-2018-3194 Oracle:CVE-2018-3195 Oracle:CVE-2018-3196 Oracle:CVE-2018-3197 Oracle:CVE-2018-3198 Oracle:CVE-2018-3200 Oracle:CVE-2018-3201 Oracle:CVE-2018-3202 Oracle:CVE-2018-3203 Oracle:CVE-2018-3204 Oracle:CVE-2018-3205 Oracle:CVE-2018-3206 Oracle:CVE-2018-3207 Oracle:CVE-2018-3208 Oracle:CVE-2018-3209 Oracle:CVE-2018-3210 Oracle:CVE-2018-3211 Oracle:CVE-2018-3212 Oracle:CVE-2018-3213 Oracle:CVE-2018-3214 Oracle:CVE-2018-3215 Oracle:CVE-2018-3217 Oracle:CVE-2018-3218 Oracle:CVE-2018-3219 Oracle:CVE-2018-3220 Oracle:CVE-2018-3221 Oracle:CVE-2018-3222 Oracle:CVE-2018-3223 Oracle:CVE-2018-3224 Oracle:CVE-2018-3225 Oracle:CVE-2018-3226 Oracle:CVE-2018-3227 Oracle:CVE-2018-3228 Oracle:CVE-2018-3229 Oracle:CVE-2018-3230 Oracle:CVE-2018-3231 Oracle:CVE-2018-3232 Oracle:CVE-2018-3233 Oracle:CVE-2018-3234 Oracle:CVE-2018-3235 Oracle:CVE-2018-3236 Oracle:CVE-2018-3237 Oracle:CVE-2018-3238 Oracle:CVE-2018-3239 Oracle:CVE-2018-3241 Oracle:CVE-2018-3242 Oracle:CVE-2018-3243 Oracle:CVE-2018-3244 Oracle:CVE-2018-3245 Oracle:CVE-2018-3246 Oracle:CVE-2018-3247 Oracle:CVE-2018-3248 Oracle:CVE-2018-3249 Oracle:CVE-2018-3250 Oracle:CVE-2018-3251 Oracle:CVE-2018-3252 Oracle:CVE-2018-3253 Oracle:CVE-2018-3254 Oracle:CVE-2018-3255 Oracle:CVE-2018-3256 Oracle:CVE-2018-3257 Oracle:CVE-2018-3258 Oracle:CVE-2018-3259 Oracle:CVE-2018-3261 Oracle:CVE-2018-3262 Oracle:CVE-2018-3263 Oracle:CVE-2018-3264 Oracle:CVE-2018-3265 Oracle:CVE-2018-3266 Oracle:CVE-2018-3267 Oracle:CVE-2018-3268 Oracle:CVE-2018-3269 Oracle:CVE-2018-3270 Oracle:CVE-2018-3271 Oracle:CVE-2018-3272 Oracle:CVE-2018-3273 Oracle:CVE-2018-3274 Oracle:CVE-2018-3275 Oracle:CVE-2018-3276 Oracle:CVE-2018-3277 Oracle:CVE-2018-3278 Oracle:CVE-2018-3279 Oracle:CVE-2018-3280 Oracle:CVE-2018-3281 Oracle:CVE-2018-3282 Oracle:CVE-2018-3283 Oracle:CVE-2018-3284 Oracle:CVE-2018-3285 Oracle:CVE-2018-3286 Oracle:CVE-2018-3287 Oracle:CVE-2018-3288 Oracle:CVE-2018-3289 Oracle:CVE-2018-3290 Oracle:CVE-2018-3291 Oracle:CVE-2018-3292 Oracle:CVE-2018-3293 Oracle:CVE-2018-3294 Oracle:CVE-2018-3295 Oracle:CVE-2018-3296 Oracle:CVE-2018-3297 Oracle:CVE-2018-3298 Oracle:CVE-2018-3299 Oracle:CVE-2018-3301 Oracle:CVE-2018-3302 Oracle:CVE-2018-7489 Oracle:CVE-2018-8013 Oracle:CVE-2018-8014 Oracle:CVE-2018-8037 RH:CVE-2017-13077 RH:CVE-2017-13078 RH:CVE-2017-13079 RH:CVE-2017-13080 RH:CVE-2017-13081 RH:CVE-2017-13082 RH:CVE-2017-13084 RH:CVE-2017-13086 RH:CVE-2017-13087 RH:CVE-2017-13088 RHSA-2017:2907 RHSA-2017:2911 SECTRACK:1039570 SECTRACK:1039571 SECTRACK:1039572 SECTRACK:1039573 SECTRACK:1039576 SECTRACK:1039577 SECTRACK:1039578 SECTRACK:1039581 SECTRACK:1039585 SECTRACK:1039703 SECTRACK:1041432 SMASH Issue 191142 SUSE:SUSE-SU-2017:2745 SUSE:SUSE-SU-2017:2752 SUSE:openSUSE-SU-2017:2755 UBUNTU:CVE-2017-13077 UBUNTU:CVE-2017-13078 UBUNTU:CVE-2017-13079 UBUNTU:CVE-2017-13080 UBUNTU:CVE-2017-13081 UBUNTU:CVE-2017-13082 UBUNTU:CVE-2017-13084 UBUNTU:CVE-2017-13086 UBUNTU:CVE-2017-13087 UBUNTU:CVE-2017-13088 UBUNTU:USN-3455-1 bdo#1033297 bnc#1056061 linux.git:commit:1b72bf5a0777d7cec6c2d857ac15599022b3c123 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 linux.git:commit:fdf7cb4185b60c68e1a75e61691c4afdc15dea0e rh#1167537 rh#1183461 rh#1202366 rh#1202380 rh#1202384 rh#1202395 rh#1202418 rh#1293972 rh#1369383 rh#1384344 rh#1393454 rh#1397485 rh#1399546 rh#1491692 rh#1491693 rh#1491694 rh#1491696 rh#1491697 rh#1491698 rh#1500301 rh#1500302 rh#1500303 rh#1500304 rh#1519780 rh#1553413 rh#1591854 rh#1607582 rh#1608073 rh#1731271 rh#2044599 rh#2044602 rh#2061700 rh#2116175 rh#2119127 rh#2161287 rh#2270497 |
CVE-2017-13088 | kernel-source-rt:Released | important | 8.1 (CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) | BID:101274 CERT-VN:VU#228519 CISCO:20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II CONFIRM:access.redhat.com:CVE-2017-13088 CONFIRM:cert-portal.siemens.com:CVE-2017-13088 CONFIRM:cert.vde.com:CVE-2017-13080 CONFIRM:cert.vde.com:CVE-2017-13088 CONFIRM:portal.msrc.microsoft.com:CVE-2017-13080 CONFIRM:rockwellautomation.custhelp.com:CVE-2017-13082 CONFIRM:source.android.com:CVE-2017-5754 CONFIRM:source.android.com:CVE-2017-6264 CONFIRM:source.android.com:CVE-2017-6294 CONFIRM:support.apple.com:CVE-2017-13852 CONFIRM:support.apple.com:CVE-2017-13904 CONFIRM:support.apple.com:CVE-2017-3169 CONFIRM:support.hpe.com:CVE-2017-13081 CONFIRM:support.lenovo.com:CVE-2017-13088 CONFIRM:www.arubanetworks.com:CVE-2017-13088 CONFIRM:www.intel.com:CVE-2017-13080 CONFIRM:www.oracle.com:CVE-2017-5715 CONFIRM:www.oracle.com:CVE-2017-5753 CONFIRM:www.oracle.com:CVE-2017-6074 CVE-2017-13077 CVE-2017-13078 CVE-2017-13079 CVE-2017-13080 CVE-2017-13081 CVE-2017-13082 CVE-2017-13084 CVE-2017-13086 CVE-2017-13087 CVE-2017-13088 CVE-2024-2466 D:CVE-2022-2590 DSA-3999 DSA-5378 FREEBSD:FreeBSD-SA-17:07 GENTOO:GLSA-201711-03 MISC:github.com:CVE-2017-13082 MISC:github.com:OSS:2024/Q1/256 MISC:ics-cert.us-cert.gov:CVE-2017-13082 MISC:w1.fi MISC:w1.fi:CVE-2017-13088 MISC:www.krackattacks.com:CVE-2017-13088 MLIST:[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update MLIST:[debian-lts-announce] 20181113 [SECURITY] [DLA 1573-1] firmware-nonfree security update OSS:2017/Q4/83 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/11/10/2 OSS:2022/Q3/99 OSS:2022/Q4/132 OSS:2022/Q4/135 OSS:2024/03/27/4 OSS:2024/Q1/256 Oracle:CVE-2011-4461 Oracle:CVE-2013-1768 Oracle:CVE-2014-0114 Oracle:CVE-2014-3490 Oracle:CVE-2014-3577 Oracle:CVE-2015-0204 Oracle:CVE-2015-0235 Oracle:CVE-2015-5600 Oracle:CVE-2015-6937 Oracle:CVE-2015-7501 Oracle:CVE-2015-7940 Oracle:CVE-2015-9251 Oracle:CVE-2016-0635 Oracle:CVE-2016-0714 Oracle:CVE-2016-0729 Oracle:CVE-2016-1000031 Oracle:CVE-2016-1181 Oracle:CVE-2016-1182 Oracle:CVE-2016-2099 Oracle:CVE-2016-2107 Oracle:CVE-2016-2176 Oracle:CVE-2016-2179 Oracle:CVE-2016-2183 Oracle:CVE-2016-3092 Oracle:CVE-2016-3506 Oracle:CVE-2016-4000 Oracle:CVE-2016-4055 Oracle:CVE-2016-5007 Oracle:CVE-2016-5019 Oracle:CVE-2016-5080 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 Oracle:CVE-2016-6304 Oracle:CVE-2016-6814 Oracle:CVE-2016-7103 Oracle:CVE-2016-7167 Oracle:CVE-2016-9843 Oracle:CVE-2016-9878 Oracle:CVE-2017-0379 Oracle:CVE-2017-10068 Oracle:CVE-2017-12617 Oracle:CVE-2017-13077 Oracle:CVE-2017-13082 Oracle:CVE-2017-14735 Oracle:CVE-2017-15095 Oracle:CVE-2017-17562 Oracle:CVE-2017-3633 Oracle:CVE-2017-3736 Oracle:CVE-2017-3737 Oracle:CVE-2017-5533 Oracle:CVE-2017-5645 Oracle:CVE-2017-5662 Oracle:CVE-2017-5664 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2017-6074 Oracle:CVE-2017-7525 Oracle:CVE-2017-7805 Oracle:CVE-2017-9798 Oracle:CVE-2018-0732 Oracle:CVE-2018-0739 Oracle:CVE-2018-1000120 Oracle:CVE-2018-1000300 Oracle:CVE-2018-11039 Oracle:CVE-2018-1171 Oracle:CVE-2018-11776 Oracle:CVE-2018-1258 Oracle:CVE-2018-1275 Oracle:CVE-2018-1305 Oracle:CVE-2018-13785 Oracle:CVE-2018-1656 Oracle:CVE-2018-2563 Oracle:CVE-2018-2572 Oracle:CVE-2018-2587 Oracle:CVE-2018-2598 Oracle:CVE-2018-2628 Oracle:CVE-2018-2718 Oracle:CVE-2018-2737 Oracle:CVE-2018-2738 Oracle:CVE-2018-2739 Oracle:CVE-2018-2742 Oracle:CVE-2018-2746 Oracle:CVE-2018-2747 Oracle:CVE-2018-2748 Oracle:CVE-2018-2749 Oracle:CVE-2018-2750 Oracle:CVE-2018-2752 Oracle:CVE-2018-2753 Oracle:CVE-2018-2754 Oracle:CVE-2018-2755 Oracle:CVE-2018-2756 Oracle:CVE-2018-2758 Oracle:CVE-2018-2759 Oracle:CVE-2018-2760 Oracle:CVE-2018-2761 Oracle:CVE-2018-2762 Oracle:CVE-2018-2763 Oracle:CVE-2018-2764 Oracle:CVE-2018-2765 Oracle:CVE-2018-2766 Oracle:CVE-2018-2767 Oracle:CVE-2018-2768 Oracle:CVE-2018-2769 Oracle:CVE-2018-2770 Oracle:CVE-2018-2771 Oracle:CVE-2018-2772 Oracle:CVE-2018-2773 Oracle:CVE-2018-2774 Oracle:CVE-2018-2775 Oracle:CVE-2018-2776 Oracle:CVE-2018-2777 Oracle:CVE-2018-2778 Oracle:CVE-2018-2779 Oracle:CVE-2018-2780 Oracle:CVE-2018-2781 Oracle:CVE-2018-2782 Oracle:CVE-2018-2783 Oracle:CVE-2018-2784 Oracle:CVE-2018-2785 Oracle:CVE-2018-2786 Oracle:CVE-2018-2787 Oracle:CVE-2018-2788 Oracle:CVE-2018-2789 Oracle:CVE-2018-2790 Oracle:CVE-2018-2791 Oracle:CVE-2018-2792 Oracle:CVE-2018-2793 Oracle:CVE-2018-2794 Oracle:CVE-2018-2795 Oracle:CVE-2018-2796 Oracle:CVE-2018-2797 Oracle:CVE-2018-2798 Oracle:CVE-2018-2799 Oracle:CVE-2018-2800 Oracle:CVE-2018-2801 Oracle:CVE-2018-2804 Oracle:CVE-2018-2805 Oracle:CVE-2018-2806 Oracle:CVE-2018-2807 Oracle:CVE-2018-2808 Oracle:CVE-2018-2809 Oracle:CVE-2018-2810 Oracle:CVE-2018-2811 Oracle:CVE-2018-2812 Oracle:CVE-2018-2813 Oracle:CVE-2018-2814 Oracle:CVE-2018-2815 Oracle:CVE-2018-2816 Oracle:CVE-2018-2817 Oracle:CVE-2018-2818 Oracle:CVE-2018-2819 Oracle:CVE-2018-2820 Oracle:CVE-2018-2821 Oracle:CVE-2018-2822 Oracle:CVE-2018-2823 Oracle:CVE-2018-2825 Oracle:CVE-2018-2826 Oracle:CVE-2018-2827 Oracle:CVE-2018-2828 Oracle:CVE-2018-2830 Oracle:CVE-2018-2831 Oracle:CVE-2018-2832 Oracle:CVE-2018-2834 Oracle:CVE-2018-2835 Oracle:CVE-2018-2836 Oracle:CVE-2018-2837 Oracle:CVE-2018-2838 Oracle:CVE-2018-2839 Oracle:CVE-2018-2840 Oracle:CVE-2018-2841 Oracle:CVE-2018-2842 Oracle:CVE-2018-2843 Oracle:CVE-2018-2844 Oracle:CVE-2018-2845 Oracle:CVE-2018-2846 Oracle:CVE-2018-2849 Oracle:CVE-2018-2850 Oracle:CVE-2018-2852 Oracle:CVE-2018-2854 Oracle:CVE-2018-2855 Oracle:CVE-2018-2856 Oracle:CVE-2018-2857 Oracle:CVE-2018-2858 Oracle:CVE-2018-2859 Oracle:CVE-2018-2860 Oracle:CVE-2018-2861 Oracle:CVE-2018-2862 Oracle:CVE-2018-2863 Oracle:CVE-2018-2864 Oracle:CVE-2018-2865 Oracle:CVE-2018-2866 Oracle:CVE-2018-2867 Oracle:CVE-2018-2868 Oracle:CVE-2018-2869 Oracle:CVE-2018-2870 Oracle:CVE-2018-2871 Oracle:CVE-2018-2872 Oracle:CVE-2018-2873 Oracle:CVE-2018-2874 Oracle:CVE-2018-2876 Oracle:CVE-2018-2877 Oracle:CVE-2018-2878 Oracle:CVE-2018-2879 Oracle:CVE-2018-2881 Oracle:CVE-2018-2882 Oracle:CVE-2018-2887 Oracle:CVE-2018-2888 Oracle:CVE-2018-2889 Oracle:CVE-2018-2891 Oracle:CVE-2018-2892 Oracle:CVE-2018-2893 Oracle:CVE-2018-2894 Oracle:CVE-2018-2895 Oracle:CVE-2018-2896 Oracle:CVE-2018-2897 Oracle:CVE-2018-2898 Oracle:CVE-2018-2899 Oracle:CVE-2018-2900 Oracle:CVE-2018-2901 Oracle:CVE-2018-2902 Oracle:CVE-2018-2903 Oracle:CVE-2018-2904 Oracle:CVE-2018-2905 Oracle:CVE-2018-2906 Oracle:CVE-2018-2907 Oracle:CVE-2018-2908 Oracle:CVE-2018-2909 Oracle:CVE-2018-2911 Oracle:CVE-2018-2912 Oracle:CVE-2018-2913 Oracle:CVE-2018-2914 Oracle:CVE-2018-2915 Oracle:CVE-2018-2916 Oracle:CVE-2018-2917 Oracle:CVE-2018-2918 Oracle:CVE-2018-2919 Oracle:CVE-2018-2920 Oracle:CVE-2018-2921 Oracle:CVE-2018-2922 Oracle:CVE-2018-2923 Oracle:CVE-2018-2924 Oracle:CVE-2018-2925 Oracle:CVE-2018-2926 Oracle:CVE-2018-2927 Oracle:CVE-2018-2928 Oracle:CVE-2018-2929 Oracle:CVE-2018-2930 Oracle:CVE-2018-2932 Oracle:CVE-2018-2933 Oracle:CVE-2018-2934 Oracle:CVE-2018-2935 Oracle:CVE-2018-2936 Oracle:CVE-2018-2937 Oracle:CVE-2018-2938 Oracle:CVE-2018-2939 Oracle:CVE-2018-2940 Oracle:CVE-2018-2941 Oracle:CVE-2018-2942 Oracle:CVE-2018-2943 Oracle:CVE-2018-2944 Oracle:CVE-2018-2945 Oracle:CVE-2018-2946 Oracle:CVE-2018-2947 Oracle:CVE-2018-2948 Oracle:CVE-2018-2949 Oracle:CVE-2018-2950 Oracle:CVE-2018-2951 Oracle:CVE-2018-2952 Oracle:CVE-2018-2953 Oracle:CVE-2018-2954 Oracle:CVE-2018-2955 Oracle:CVE-2018-2956 Oracle:CVE-2018-2957 Oracle:CVE-2018-2958 Oracle:CVE-2018-2959 Oracle:CVE-2018-2960 Oracle:CVE-2018-2961 Oracle:CVE-2018-2962 Oracle:CVE-2018-2963 Oracle:CVE-2018-2964 Oracle:CVE-2018-2965 Oracle:CVE-2018-2966 Oracle:CVE-2018-2967 Oracle:CVE-2018-2968 Oracle:CVE-2018-2969 Oracle:CVE-2018-2970 Oracle:CVE-2018-2971 Oracle:CVE-2018-2972 Oracle:CVE-2018-2973 Oracle:CVE-2018-2974 Oracle:CVE-2018-2975 Oracle:CVE-2018-2976 Oracle:CVE-2018-2977 Oracle:CVE-2018-2979 Oracle:CVE-2018-2980 Oracle:CVE-2018-2981 Oracle:CVE-2018-2982 Oracle:CVE-2018-2984 Oracle:CVE-2018-2985 Oracle:CVE-2018-2986 Oracle:CVE-2018-2987 Oracle:CVE-2018-2988 Oracle:CVE-2018-2989 Oracle:CVE-2018-2990 Oracle:CVE-2018-2991 Oracle:CVE-2018-2992 Oracle:CVE-2018-2993 Oracle:CVE-2018-2994 Oracle:CVE-2018-2995 Oracle:CVE-2018-2996 Oracle:CVE-2018-2997 Oracle:CVE-2018-2998 Oracle:CVE-2018-2999 Oracle:CVE-2018-3000 Oracle:CVE-2018-3001 Oracle:CVE-2018-3002 Oracle:CVE-2018-3003 Oracle:CVE-2018-3004 Oracle:CVE-2018-3005 Oracle:CVE-2018-3006 Oracle:CVE-2018-3007 Oracle:CVE-2018-3008 Oracle:CVE-2018-3009 Oracle:CVE-2018-3010 Oracle:CVE-2018-3011 Oracle:CVE-2018-3012 Oracle:CVE-2018-3013 Oracle:CVE-2018-3014 Oracle:CVE-2018-3015 Oracle:CVE-2018-3016 Oracle:CVE-2018-3017 Oracle:CVE-2018-3018 Oracle:CVE-2018-3019 Oracle:CVE-2018-3020 Oracle:CVE-2018-3021 Oracle:CVE-2018-3022 Oracle:CVE-2018-3023 Oracle:CVE-2018-3024 Oracle:CVE-2018-3025 Oracle:CVE-2018-3026 Oracle:CVE-2018-3027 Oracle:CVE-2018-3028 Oracle:CVE-2018-3029 Oracle:CVE-2018-3030 Oracle:CVE-2018-3031 Oracle:CVE-2018-3032 Oracle:CVE-2018-3033 Oracle:CVE-2018-3034 Oracle:CVE-2018-3035 Oracle:CVE-2018-3036 Oracle:CVE-2018-3037 Oracle:CVE-2018-3038 Oracle:CVE-2018-3039 Oracle:CVE-2018-3040 Oracle:CVE-2018-3041 Oracle:CVE-2018-3042 Oracle:CVE-2018-3043 Oracle:CVE-2018-3044 Oracle:CVE-2018-3045 Oracle:CVE-2018-3046 Oracle:CVE-2018-3047 Oracle:CVE-2018-3048 Oracle:CVE-2018-3049 Oracle:CVE-2018-3050 Oracle:CVE-2018-3051 Oracle:CVE-2018-3052 Oracle:CVE-2018-3053 Oracle:CVE-2018-3054 Oracle:CVE-2018-3055 Oracle:CVE-2018-3056 Oracle:CVE-2018-3057 Oracle:CVE-2018-3058 Oracle:CVE-2018-3059 Oracle:CVE-2018-3060 Oracle:CVE-2018-3061 Oracle:CVE-2018-3062 Oracle:CVE-2018-3063 Oracle:CVE-2018-3064 Oracle:CVE-2018-3065 Oracle:CVE-2018-3066 Oracle:CVE-2018-3067 Oracle:CVE-2018-3068 Oracle:CVE-2018-3069 Oracle:CVE-2018-3070 Oracle:CVE-2018-3071 Oracle:CVE-2018-3072 Oracle:CVE-2018-3073 Oracle:CVE-2018-3074 Oracle:CVE-2018-3075 Oracle:CVE-2018-3076 Oracle:CVE-2018-3077 Oracle:CVE-2018-3078 Oracle:CVE-2018-3079 Oracle:CVE-2018-3080 Oracle:CVE-2018-3081 Oracle:CVE-2018-3082 Oracle:CVE-2018-3084 Oracle:CVE-2018-3085 Oracle:CVE-2018-3086 Oracle:CVE-2018-3087 Oracle:CVE-2018-3088 Oracle:CVE-2018-3089 Oracle:CVE-2018-3090 Oracle:CVE-2018-3091 Oracle:CVE-2018-3092 Oracle:CVE-2018-3093 Oracle:CVE-2018-3094 Oracle:CVE-2018-3095 Oracle:CVE-2018-3096 Oracle:CVE-2018-3097 Oracle:CVE-2018-3098 Oracle:CVE-2018-3099 Oracle:CVE-2018-3100 Oracle:CVE-2018-3101 Oracle:CVE-2018-3102 Oracle:CVE-2018-3103 Oracle:CVE-2018-3104 Oracle:CVE-2018-3105 Oracle:CVE-2018-3108 Oracle:CVE-2018-3109 Oracle:CVE-2018-3115 Oracle:CVE-2018-3122 Oracle:CVE-2018-3126 Oracle:CVE-2018-3127 Oracle:CVE-2018-3128 Oracle:CVE-2018-3129 Oracle:CVE-2018-3130 Oracle:CVE-2018-3131 Oracle:CVE-2018-3132 Oracle:CVE-2018-3133 Oracle:CVE-2018-3134 Oracle:CVE-2018-3135 Oracle:CVE-2018-3136 Oracle:CVE-2018-3137 Oracle:CVE-2018-3138 Oracle:CVE-2018-3139 Oracle:CVE-2018-3140 Oracle:CVE-2018-3141 Oracle:CVE-2018-3142 Oracle:CVE-2018-3143 Oracle:CVE-2018-3144 Oracle:CVE-2018-3145 Oracle:CVE-2018-3146 Oracle:CVE-2018-3147 Oracle:CVE-2018-3148 Oracle:CVE-2018-3149 Oracle:CVE-2018-3150 Oracle:CVE-2018-3151 Oracle:CVE-2018-3152 Oracle:CVE-2018-3153 Oracle:CVE-2018-3154 Oracle:CVE-2018-3155 Oracle:CVE-2018-3156 Oracle:CVE-2018-3157 Oracle:CVE-2018-3158 Oracle:CVE-2018-3159 Oracle:CVE-2018-3160 Oracle:CVE-2018-3161 Oracle:CVE-2018-3162 Oracle:CVE-2018-3163 Oracle:CVE-2018-3164 Oracle:CVE-2018-3165 Oracle:CVE-2018-3166 Oracle:CVE-2018-3167 Oracle:CVE-2018-3168 Oracle:CVE-2018-3169 Oracle:CVE-2018-3170 Oracle:CVE-2018-3171 Oracle:CVE-2018-3172 Oracle:CVE-2018-3173 Oracle:CVE-2018-3174 Oracle:CVE-2018-3175 Oracle:CVE-2018-3176 Oracle:CVE-2018-3177 Oracle:CVE-2018-3178 Oracle:CVE-2018-3179 Oracle:CVE-2018-3180 Oracle:CVE-2018-3181 Oracle:CVE-2018-3182 Oracle:CVE-2018-3183 Oracle:CVE-2018-3184 Oracle:CVE-2018-3185 Oracle:CVE-2018-3186 Oracle:CVE-2018-3187 Oracle:CVE-2018-3188 Oracle:CVE-2018-3189 Oracle:CVE-2018-3190 Oracle:CVE-2018-3191 Oracle:CVE-2018-3192 Oracle:CVE-2018-3193 Oracle:CVE-2018-3194 Oracle:CVE-2018-3195 Oracle:CVE-2018-3196 Oracle:CVE-2018-3197 Oracle:CVE-2018-3198 Oracle:CVE-2018-3200 Oracle:CVE-2018-3201 Oracle:CVE-2018-3202 Oracle:CVE-2018-3203 Oracle:CVE-2018-3204 Oracle:CVE-2018-3205 Oracle:CVE-2018-3206 Oracle:CVE-2018-3207 Oracle:CVE-2018-3208 Oracle:CVE-2018-3209 Oracle:CVE-2018-3210 Oracle:CVE-2018-3211 Oracle:CVE-2018-3212 Oracle:CVE-2018-3213 Oracle:CVE-2018-3214 Oracle:CVE-2018-3215 Oracle:CVE-2018-3217 Oracle:CVE-2018-3218 Oracle:CVE-2018-3219 Oracle:CVE-2018-3220 Oracle:CVE-2018-3221 Oracle:CVE-2018-3222 Oracle:CVE-2018-3223 Oracle:CVE-2018-3224 Oracle:CVE-2018-3225 Oracle:CVE-2018-3226 Oracle:CVE-2018-3227 Oracle:CVE-2018-3228 Oracle:CVE-2018-3229 Oracle:CVE-2018-3230 Oracle:CVE-2018-3231 Oracle:CVE-2018-3232 Oracle:CVE-2018-3233 Oracle:CVE-2018-3234 Oracle:CVE-2018-3235 Oracle:CVE-2018-3236 Oracle:CVE-2018-3237 Oracle:CVE-2018-3238 Oracle:CVE-2018-3239 Oracle:CVE-2018-3241 Oracle:CVE-2018-3242 Oracle:CVE-2018-3243 Oracle:CVE-2018-3244 Oracle:CVE-2018-3245 Oracle:CVE-2018-3246 Oracle:CVE-2018-3247 Oracle:CVE-2018-3248 Oracle:CVE-2018-3249 Oracle:CVE-2018-3250 Oracle:CVE-2018-3251 Oracle:CVE-2018-3252 Oracle:CVE-2018-3253 Oracle:CVE-2018-3254 Oracle:CVE-2018-3255 Oracle:CVE-2018-3256 Oracle:CVE-2018-3257 Oracle:CVE-2018-3258 Oracle:CVE-2018-3259 Oracle:CVE-2018-3261 Oracle:CVE-2018-3262 Oracle:CVE-2018-3263 Oracle:CVE-2018-3264 Oracle:CVE-2018-3265 Oracle:CVE-2018-3266 Oracle:CVE-2018-3267 Oracle:CVE-2018-3268 Oracle:CVE-2018-3269 Oracle:CVE-2018-3270 Oracle:CVE-2018-3271 Oracle:CVE-2018-3272 Oracle:CVE-2018-3273 Oracle:CVE-2018-3274 Oracle:CVE-2018-3275 Oracle:CVE-2018-3276 Oracle:CVE-2018-3277 Oracle:CVE-2018-3278 Oracle:CVE-2018-3279 Oracle:CVE-2018-3280 Oracle:CVE-2018-3281 Oracle:CVE-2018-3282 Oracle:CVE-2018-3283 Oracle:CVE-2018-3284 Oracle:CVE-2018-3285 Oracle:CVE-2018-3286 Oracle:CVE-2018-3287 Oracle:CVE-2018-3288 Oracle:CVE-2018-3289 Oracle:CVE-2018-3290 Oracle:CVE-2018-3291 Oracle:CVE-2018-3292 Oracle:CVE-2018-3293 Oracle:CVE-2018-3294 Oracle:CVE-2018-3295 Oracle:CVE-2018-3296 Oracle:CVE-2018-3297 Oracle:CVE-2018-3298 Oracle:CVE-2018-3299 Oracle:CVE-2018-3301 Oracle:CVE-2018-3302 Oracle:CVE-2018-7489 Oracle:CVE-2018-8013 Oracle:CVE-2018-8014 Oracle:CVE-2018-8037 RH:CVE-2017-13077 RH:CVE-2017-13078 RH:CVE-2017-13079 RH:CVE-2017-13080 RH:CVE-2017-13081 RH:CVE-2017-13082 RH:CVE-2017-13084 RH:CVE-2017-13086 RH:CVE-2017-13087 RH:CVE-2017-13088 RHSA-2017:2907 RHSA-2017:2911 SECTRACK:1039570 SECTRACK:1039571 SECTRACK:1039572 SECTRACK:1039573 SECTRACK:1039576 SECTRACK:1039577 SECTRACK:1039578 SECTRACK:1039581 SECTRACK:1039585 SECTRACK:1039703 SECTRACK:1041432 SMASH Issue 191142 SUSE:SUSE-SU-2017:2745 SUSE:SUSE-SU-2017:2752 SUSE:openSUSE-SU-2017:2755 UBUNTU:CVE-2017-13077 UBUNTU:CVE-2017-13078 UBUNTU:CVE-2017-13079 UBUNTU:CVE-2017-13080 UBUNTU:CVE-2017-13081 UBUNTU:CVE-2017-13082 UBUNTU:CVE-2017-13084 UBUNTU:CVE-2017-13086 UBUNTU:CVE-2017-13087 UBUNTU:CVE-2017-13088 UBUNTU:USN-3455-1 bdo#1033297 bnc#1056061 linux.git:commit:1b72bf5a0777d7cec6c2d857ac15599022b3c123 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 linux.git:commit:fdf7cb4185b60c68e1a75e61691c4afdc15dea0e rh#1167537 rh#1183461 rh#1202366 rh#1202380 rh#1202384 rh#1202395 rh#1202418 rh#1293972 rh#1369383 rh#1384344 rh#1393454 rh#1397485 rh#1399546 rh#1491692 rh#1491693 rh#1491694 rh#1491696 rh#1491697 rh#1491698 rh#1500301 rh#1500302 rh#1500303 rh#1500304 rh#1519780 rh#1553413 rh#1591854 rh#1607582 rh#1608073 rh#1731271 rh#2044599 rh#2044602 rh#2061700 rh#2116175 rh#2119127 rh#2161287 rh#2270497 |
CVE-2017-13166 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | BID:102367 CONFIRM:bugzilla.redhat.com:CVE-2018-10877 CONFIRM:bugzilla.redhat.com:CVE-2018-10880 CONFIRM:bugzilla.redhat.com:CVE-2018-10882 CONFIRM:help.ecostruxureit.com:CVE-2017-5754 CONFIRM:source.android.com:CVE-2017-6280 CONFIRM:support.f5.com:CVE-2017-18017 CVE-2017-13166 CVE-2017-18017 CVE-2018-10877 CVE-2018-10880 CVE-2018-10882 CVE-2018-13405 DEBIAN:DSA-4120 DEBIAN:DSA-4187 DSA-4120 DSA-4187 DSA-5378 MISC:bugs.launchpad.net:CVE-2017-18017 MISC:git.kernel.org:CVE-2017-18017 MISC:git.kernel.org:OSS:2014/03/05/6 MISC:github.com:CVE-2017-18017 MISC:lkml.org:CVE-2017-18017 MISC:patchwork.ozlabs.org:CVE-2017-18017 MISC:www.arista.com:CVE-2017-18017 MISC:www.kernel.org:CVE-2017-18017 MLIST:[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update OSS:2014/03/05/6 OSS:2022/11/10/2 OSS:2022/12/27/3 OSS:2022/Q4/132 OSS:2022/Q4/135 OSS:2022/Q4/244 Oracle:CVE-2017-0861 Oracle:CVE-2017-5715 RH:CVE-2017-13166 RH:CVE-2017-18017 RHSA-2018:0676 RHSA-2018:1062 RHSA-2018:1130 RHSA-2018:1170 RHSA-2018:1319 RHSA-2018:1737 RHSA-2018:2948 RHSA-2018:3083 RHSA-2018:3096 SMASH Issue 196268 SMASH Issue 197538 SMASH Issue 202009 SUSE:SUSE-SU-2018:0383 SUSE:SUSE-SU-2018:0416 SUSE:SUSE-SU-2018:0482 SUSE:SUSE-SU-2018:0555 SUSE:SUSE-SU-2018:0660 SUSE:SUSE-SU-2018:0834 SUSE:SUSE-SU-2018:0841 SUSE:SUSE-SU-2018:0848 SUSE:SUSE-SU-2018:0986 SUSE:openSUSE-SU-2018:0408 UBUNTU:CVE-2017-13166 UBUNTU:CVE-2017-18017 UBUNTU:USN-3583-1 UBUNTU:USN-3583-2 USN-3583-1 USN-3583-2 bdo#1033297 bnc#1067118 bnc#1072865 bnc#1074488 bnc#1085447 http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2638fd0f92d4397884fd991d8f4925cb3f081901 linux.git:commit:d36260050e1881dce09625a9352d8729c911a6e3 rh#1243852 rh#1495089 rh#1498016 rh#1519780 rh#1531135 rh#1539599 rh#1548412 rh#1596795 rh#1596812 rh#1596842 rh#1599161 rh#2027239 rh#2044863 rh#2061700 rh#2119127 |
CVE-2017-14051 | kernel-source-rt:Not affected | moderate | 6.4 (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | BID:100571 CVE-2017-14051 MISC:bugzilla.kernel.org:CVE-2017-14051 MISC:git.kernel.org:OSS:2020/Q1/69 MISC:patchwork.kernel.org:CVE-2017-14051 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 Oracle:CVE-2017-6074 RH:CVE-2017-14051 SMASH Issue 191306 UBUNTU:CVE-2017-14051 bnc#1056588 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1435719 rh#1462147 rh#1462158 rh#1481178 rh#1487126 |
CVE-2017-14140 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) | BID:100876 CONFIRM:git.kernel.org:CVE-2017-14140 CONFIRM:github.com:CVE-2017-14140 CONFIRM:www.kernel.org:CVE-2017-14140 CVE-2017-14140 DSA-3981 DSA-5378 MISC:git.kernel.org:OSS:2020/Q1/69 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-17558 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2017-5754 RH:CVE-2017-14140 RHSA-2018:0676 RHSA-2018:1062 SMASH Issue 191437 UBUNTU:CVE-2017-14140 bdo#1033297 bdo#866511 bdo#875881 bnc#1057179 rh#1462147 rh#1462158 rh#1481178 rh#1488329 rh#1519780 rh#2061700 rh#2119127 |
CVE-2017-14497 | kernel-source-rt:Not affected | critical | 9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | BID:100871 CONFIRM:git.kernel.org:CVE-2017-14497 CONFIRM:github.com:CVE-2017-14497 CONFIRM:marc.info CONFIRM:marc.info:CVE-2017-14497 CONFIRM:source.android.com:CVE-2017-15849 CVE-2017-14497 D:CVE-2017-14497 DSA-3981 OSS:2017/Q3/476 RH:CVE-2017-14497 SECTRACK:1039371 SECTRACK:1040106 SMASH Issue 192102 UBUNTU:CVE-2017-14497 bdo#866511 bdo#875881 bnc#1059058 rh#1492593 |
CVE-2017-14954 | kernel-source-rt:Unsupported | moderate | 5.3 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) | CVE-2017-14954 MISC:git.kernel.org:CVE-2017-14954 MISC:github.com:CVE-2017-14954 MISC:grsecurity.net:CVE-2017-14954 MISC:twitter.com:CVE-2017-14954 RH:CVE-2017-14954 SMASH Issue 192708 UBUNTU:CVE-2017-14954 bnc#1061284 rh#1497745 |
CVE-2017-14991 | kernel-source-rt:Analysis | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | BID:101185 BID:101187 CONFIRM:github.com:CVE-2017-14991 CONFIRM:github.com:CVE-2017-15010 CONFIRM:nodesecurity.io:CVE-2017-15010 CONFIRM:snyk.io:CVE-2017-15010 CVE-2017-14991 CVE-2017-15010 D:CVE-2017-15010 FEDORA:FEDORA-2019-76f1b57c1c MISC:git.kernel.org OSS:2017/Q4/43 RH:CVE-2017-14991 RH:CVE-2017-15010 RHSA-2017:2912 RHSA-2017:2913 RHSA-2018:1263 RHSA-2018:1264 SMASH Issue 192787 UBUNTU:CVE-2017-14991 UBUNTU:CVE-2017-15010 rh#1493989 rh#1500366 |
CVE-2017-15010 | kernel-source-rt:Analysis | moderate | 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | BID:101185 BID:101187 CONFIRM:github.com:CVE-2017-14991 CONFIRM:github.com:CVE-2017-15010 CONFIRM:nodesecurity.io:CVE-2017-15010 CONFIRM:snyk.io:CVE-2017-15010 CVE-2017-14991 CVE-2017-15010 D:CVE-2017-15010 FEDORA:FEDORA-2019-76f1b57c1c MISC:git.kernel.org OSS:2017/Q4/43 RH:CVE-2017-14991 RH:CVE-2017-15010 RHSA-2017:2912 RHSA-2017:2913 RHSA-2018:1263 RHSA-2018:1264 SMASH Issue 192787 UBUNTU:CVE-2017-14991 UBUNTU:CVE-2017-15010 rh#1493989 rh#1500366 |
CVE-2017-15087 | kernel-source-rt:Already fixed | moderate | () | BID:100855 BID:101556 CONFIRM:bugzilla.novell.com:CVE-2017-12153 CONFIRM:bugzilla.redhat.com:CVE-2017-15087 CONFIRM:git.kernel.org:CVE-2017-12153 CONFIRM:marc.info CONFIRM:marc.info:CVE-2017-12153 CVE-2017-12153 CVE-2017-15087 DSA-3981 MISC:git.kernel.org:OSS:2020/Q1/69 OSS:2017/Q3/437 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 RH:CVE-2017-12153 RH:CVE-2017-15087 RHSA-2017:3110 SMASH Issue 191845 UBUNTU:CVE-2017-12153 UBUNTU:CVE-2017-15087 UBUNTU:USN-3583-1 UBUNTU:USN-3583-2 bdo#866511 bdo#875881 bnc#1058410 linux.git:commit:e785fa0a164aa11001cba931367c7f94ffaff888 rh#1462147 rh#1462158 rh#1481178 rh#1491046 rh#1505788 |
CVE-2017-15102 | kernel-source-rt:Not affected | moderate | 4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | BID:101790 CONFIRM:git.kernel.org:CVE-2017-15102 CONFIRM:github.com:CVE-2017-15102 CVE-2017-15102 DSA-5378 MISC:git.kernel.org:OSS:2020/Q1/69 OSS:2017/Q4/238 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-17558 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2017-5754 RH:CVE-2017-15102 SMASH Issue 194536 UBUNTU:CVE-2017-15102 bdo#1033297 bnc#1066705 rh#1481178 rh#1505905 rh#1519780 rh#2061700 rh#2119127 |
CVE-2017-15116 | kernel-source-rt:Unsupported | low | 3.3 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2017-15116 D:CVE-2017-15116 MISC:bugzilla.redhat.com:CVE-2017-15116 MISC:git.kernel.org:CVE-2017-15116 MISC:github.com:CVE-2017-15116 RH:CVE-2017-15116 RHSA-2018:0676 RHSA-2018:1062 SMASH Issue 195979 UBUNTU:CVE-2017-15116 bnc#1070613 rh#1514609 |
CVE-2017-15127 | kernel-source-rt:Unsupported | moderate | () | BID:102517 CVE-2017-15127 D:CVE-2017-15127 MISC:git.kernel.org:CVE-2017-15127 MISC:github.com:CVE-2017-15127 RH:CVE-2017-15127 RHSA-2018:0676 RHSA-2018:1062 SMASH Issue 196735 UBUNTU:CVE-2017-15127 bnc#1073113 rh#1525218 |
CVE-2017-15299 | kernel-source-rt:Not affected | moderate | 6.2 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2017-15299 D:CVE-2017-15299 DSA-5378 MISC:git.kernel.org:OSS:2014/03/05/6 MISC:marc.info MISC:marc.info:CVE-2017-15299 MISC:www.mail-archive.com:CVE-2017-15299 OSS:2014/03/05/6 OSS:2017/Q4/82 OSS:2022/11/10/2 OSS:2022/12/27/3 OSS:2022/Q4/132 OSS:2022/Q4/135 OSS:2022/Q4/244 Oracle:CVE-2017-0861 Oracle:CVE-2017-5715 Oracle:CVE-2018-5390 RH:CVE-2017-15299 RHSA-2018:0654 SMASH Issue 193363 UBUNTU:CVE-2017-15299 bdo#1033297 bnc#1063416 rh#1243852 rh#1495089 rh#1498016 rh#1519780 rh#1539599 rh#1601704 rh#1707796 rh#1718176 rh#2061700 rh#2119127 |
CVE-2017-15649 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | BID:101573 CVE-2017-15649 D:CVE-2017-15649 MISC:blogs.securiteam.com:CVE-2017-15649 MISC:git.kernel.org:CVE-2017-15649 MISC:git.kernel.org:OSS:2020/Q1/69 MISC:github.com:CVE-2017-15649 MISC:patchwork.ozlabs.org:CVE-2017-15649 MISC:www.kernel.org:CVE-2017-15649 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 RH:CVE-2017-15649 RHSA-2018:0151 RHSA-2018:0152 RHSA-2018:0181 SMASH Issue 193844 SMASH Issue 193849 UBUNTU:CVE-2017-15649 bnc#1064388 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1462147 rh#1462158 rh#1481178 rh#1504574 rh#1667782 rh#1701224 rh#1701842 |
CVE-2017-15670 | glibc:Already fixed | important | 7.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | BID:101517 BID:101521 CONFIRM:sourceware.org:CVE-2017-15670 CONFIRM:sourceware.org:CVE-2017-15671 CVE-2017-15670 CVE-2017-15671 D:CVE-2017-15670 D:CVE-2017-15671 MISC:git.savannah.gnu.org:OSS:2017/Q4/119 OSS:2017/Q4/119 Oracle:CVE-2015-5180 Oracle:CVE-2018-11236 RH:CVE-2017-15670 RH:CVE-2017-15671 RHSA-2018:0805 RHSA-2018:1879 SMASH Issue 193878 SMASH Issue 193879 UBUNTU:CVE-2017-15670 UBUNTU:CVE-2017-15671 bnc#1064569 bnc#1064583 rh#1504804 rh#1504806 rh#1526865 rh#1581269 |
CVE-2017-15671 | glibc:Already fixed | important | 4 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | BID:101517 BID:101521 CONFIRM:sourceware.org:CVE-2017-15670 CONFIRM:sourceware.org:CVE-2017-15671 CVE-2017-15670 CVE-2017-15671 D:CVE-2017-15670 D:CVE-2017-15671 MISC:git.savannah.gnu.org:OSS:2017/Q4/119 OSS:2017/Q4/119 Oracle:CVE-2015-5180 Oracle:CVE-2018-11236 RH:CVE-2017-15670 RH:CVE-2017-15671 RHSA-2018:0805 RHSA-2018:1879 SMASH Issue 193878 SMASH Issue 193879 UBUNTU:CVE-2017-15670 UBUNTU:CVE-2017-15671 bnc#1064569 bnc#1064583 rh#1504804 rh#1504806 rh#1526865 rh#1581269 |
CVE-2017-15868 | kernel-source-rt:Not affected | important | 8.4 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | BID:102084 CONFIRM:git.kernel.org:CVE-2017-15868 CONFIRM:github.com:CVE-2017-15868 CONFIRM:patchwork.kernel.org:CVE-2017-15868 CONFIRM:source.android.com:CVE-2017-6280 CVE-2017-15868 DEBIAN:DSA-4082 DSA-4082 DSA-5378 MLIST:[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-17558 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2017-5754 RH:CVE-2017-15868 SMASH Issue 196216 SMASH Issue 196231 SUSE:SUSE-SU-2018:0011 UBUNTU:CVE-2017-15868 UBUNTU:USN-3583-1 UBUNTU:USN-3583-2 bdo#1033297 bnc#1071470 bnc#1071471 rh#1519780 rh#1522893 rh#2061700 rh#2119127 |
CVE-2017-15873 | busybox:Released | moderate | 7.8 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) | CVE-2017-15873 D:CVE-2017-15873 MISC:bugs.busybox.net:CVE-2017-15873 MISC:git.busybox.net:CVE-2017-15873 MLIST:[debian-lts-announce] 20180727 [SECURITY] [DLA 1445-1] busybox security update MLIST:[debian-lts-announce] 20210215 [SECURITY] [DLA 2559-1] busybox security update RH:CVE-2017-15873 SMASH Issue 194051 UBUNTU:CVE-2017-15873 USN-3935-1 bnc#1064976 rh#1515249 |
CVE-2017-15874 | busybox:Released | low | 3.3 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CVE-2017-15874 D:CVE-2017-15874 MISC:bugs.busybox.net:CVE-2017-15874 RH:CVE-2017-15874 SMASH Issue 194052 UBUNTU:CVE-2017-15874 bnc#1064978 rh#1515286 |
CVE-2017-15951 | kernel-source-rt:Already fixed | low | 3.3 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | BID:101621 CONFIRM:git.kernel.org:CVE-2017-15951 CONFIRM:github.com:CVE-2017-15951 CONFIRM:www.kernel.org:CVE-2017-15951 CVE-2017-15951 D:CVE-2017-15951 DSA-5378 OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-5715 RH:CVE-2017-15951 SMASH Issue 194239 UBUNTU:CVE-2017-15951 bdo#1033297 bnc#1065615 rh#1507539 rh#1519780 rh#2061700 rh#2119127 |
CVE-2017-16526 | kernel-source-rt:Unsupported | moderate | 4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2017-16526 DEBIAN:DSA-4187 DSA-4187 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:github.com:CVE-2017-16526 MISC:groups.google.com:CVE-2017-16526 MLIST:[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update OSS:2017/Q4/223 RH:CVE-2017-16526 SMASH Issue 194502 SMASH Issue 241885 UBUNTU:CVE-2017-16526 UBUNTU:USN-3754-1 bnc#1066624 rh#1510827 |
CVE-2017-16527 | kernel-source-rt:Not affected | moderate | 4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2017-16527 DSA-5378 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:git.kernel.org:OSS:2020/Q1/69 MISC:github.com:CVE-2017-16527 MISC:groups.google.com:CVE-2017-16527 MLIST:[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update OSS:2017/Q4/223 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-17558 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2017-5754 RH:CVE-2017-16527 SMASH Issue 194503 UBUNTU:CVE-2017-16527 UBUNTU:USN-3754-1 bdo#1033297 bnc#1066625 rh#1481178 rh#1510828 rh#1519780 rh#2061700 rh#2119127 |
CVE-2017-16528 | kernel-source-rt:Not affected | moderate | 4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2017-16528 DSA-5378 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:github.com:CVE-2017-16528 MISC:groups.google.com:CVE-2017-16528 OSS:2017/Q4/223 OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2017-5754 RH:CVE-2017-16528 SMASH Issue 194504 UBUNTU:CVE-2017-16528 UBUNTU:USN-3619-1 UBUNTU:USN-3619-2 bdo#1033297 bnc#1066629 rh#1510830 rh#1519780 rh#2061700 rh#2119127 |
CVE-2017-16529 | kernel-source-rt:Not affected | moderate | 4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | BID:103284 CVE-2017-16529 DSA-5378 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:git.kernel.org:OSS:2020/Q1/69 MISC:github.com:CVE-2017-16529 MISC:groups.google.com:CVE-2017-16529 MLIST:[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update OSS:2017/Q4/223 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-17558 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2017-5754 RH:CVE-2017-16529 SMASH Issue 194505 UBUNTU:CVE-2017-16529 UBUNTU:USN-3754-1 bdo#1033297 bnc#1066650 rh#1481178 rh#1510831 rh#1519780 rh#2061700 rh#2119127 |
CVE-2017-16530 | kernel-source-rt:Not affected | moderate | 4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2017-16530 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:github.com:CVE-2017-16530 MISC:groups.google.com:CVE-2017-16530 OSS:2017/Q4/223 RH:CVE-2017-16530 SMASH Issue 194506 UBUNTU:CVE-2017-16530 bnc#1066668 rh#1510832 |
CVE-2017-16531 | kernel-source-rt:Not affected | moderate | 4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | BID:102025 CVE-2017-16531 DSA-5378 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:git.kernel.org:OSS:2020/Q1/69 MISC:github.com:CVE-2017-16531 MISC:groups.google.com:CVE-2017-16531 OSS:2017/Q4/223 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-17558 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2017-5754 RH:CVE-2017-16531 SMASH Issue 194507 UBUNTU:CVE-2017-16531 bdo#1033297 bnc#1066671 rh#1481178 rh#1510833 rh#1519780 rh#2061700 rh#2119127 |
CVE-2017-16532 | kernel-source-rt:Not affected | moderate | 4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2017-16532 D:CVE-2017-16532 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:github.com:CVE-2017-16532 MISC:groups.google.com:CVE-2017-16532 MLIST:[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update OSS:2017/Q4/223 RH:CVE-2017-16532 SMASH Issue 194508 UBUNTU:CVE-2017-16532 UBUNTU:USN-3617-1 UBUNTU:USN-3617-2 UBUNTU:USN-3617-3 UBUNTU:USN-3619-1 UBUNTU:USN-3619-2 UBUNTU:USN-3754-1 bnc#1066673 rh#1510835 |
CVE-2017-16533 | kernel-source-rt:Already fixed | moderate | 4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | BID:102026 CVE-2017-16533 D:CVE-2017-16533 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:github.com:CVE-2017-16533 MISC:groups.google.com:CVE-2017-16533 MLIST:[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update OSS:2017/Q4/223 OSS:2018/09/18/4 RH:CVE-2017-16533 SMASH Issue 194509 UBUNTU:CVE-2017-16533 UBUNTU:USN-3754-1 bnc#1066674 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1510836 rh#1575866 rh#1609664 rh#1660375 rh#1660385 rh#1667782 rh#1686136 rh#1701224 rh#1701842 rh#1890354 |
CVE-2017-16537 | kernel-source-rt:Already fixed | moderate | 4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2017-16537 D:CVE-2017-16537 DSA-5378 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:git.kernel.org:OSS:2020/Q1/69 MISC:groups.google.com:CVE-2017-16537 MISC:patchwork.kernel.org:CVE-2017-16537 OSS:2017/Q4/223 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-17558 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2017-5754 RH:CVE-2017-16537 SMASH Issue 194513 UBUNTU:CVE-2017-16537 bdo#1033297 bnc#1066573 rh#1481178 rh#1510825 rh#1519780 rh#2061700 rh#2119127 |
CVE-2017-16538 | kernel-source-rt:Not affected | moderate | 4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2017-16538 D:CVE-2017-16538 DSA-4073 DSA-4082 DSA-5378 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:groups.google.com:CVE-2017-16538 MISC:patchwork.linuxtv.org:CVE-2017-16538 OSS:2017/Q4/223 OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-17558 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2017-5754 RH:CVE-2017-16538 SMASH Issue 194514 UBUNTU:CVE-2017-16538 bdo#1033297 bnc#1066569 rh#1510826 rh#1519780 rh#2061700 rh#2119127 |
CVE-2017-16544 | busybox:Released | important | 7.8 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) | BUGTRAQ:20190613 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series BUGTRAQ:20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X CONFIRM:www.vmware.com:CVE-2019-5531 CVE-2017-16544 FULLDISC:20190612 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series FULLDISC:20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X FULLDISC:20200313 SEC Consult SA-20200312-0 :: Authenticated Command Injection in Phoenix Contact TC Router & TC Cloud Client FULLDISC:20200827 SEC Consult SA-20200827-0 :: Multiple Vulnerabilities in ZTE mobile Hotspot MS910S FULLDISC:20200902 SEC Consult SA-20200902-0 :: Multiple Vulnerabilities in Red Lion N-Tron 702-W, Red Lion N-Tron 702M12-W FULLDISC:20210113 SEC Consult SA-20210113-0 :: Multiple vulnerabilities in Pepperl+Fuchs IO-Link Master Series FULLDISC:20220617 SEC Consult SA-20220615-0 :: Hardcoded Backdoor User and Outdated Software Components in Nexans FTTO GigaSwitch series MISC:git.busybox.net:CVE-2017-16544 MISC:packetstormsecurity.com:CVE-2015-9261 MISC:packetstormsecurity.com:CVE-2019-5532 MISC:seclists.org:CVE-2021-39243 MISC:us-cert.cisa.gov:CVE-2017-16544 MISC:www.twistlock.com:CVE-2017-16544 MLIST:[debian-lts-announce] 20180727 [SECURITY] [DLA 1445-1] busybox security update MLIST:[debian-lts-announce] 20210215 [SECURITY] [DLA 2559-1] busybox security update RH:CVE-2017-16544 SMASH Issue 195359 UBUNTU:CVE-2017-16544 USN-3935-1 bnc#1069412 rh#1515713 |
CVE-2017-16646 | kernel-source-rt:Already fixed | moderate | 4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | BID:101846 CVE-2017-16646 DSA-5378 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:groups.google.com:CVE-2017-16646 MISC:patchwork.linuxtv.org:CVE-2017-16646 OSS:2017/Q4/244 OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2017-5754 RH:CVE-2017-16646 SMASH Issue 194644 UBUNTU:CVE-2017-16646 bdo#1033297 bnc#1067105 rh#1516272 rh#1519780 rh#2061700 rh#2119127 |
CVE-2017-16647 | kernel-source-rt:Unsupported | moderate | 4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | BID:101767 CVE-2017-16647 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:groups.google.com:CVE-2017-16647 MISC:patchwork.ozlabs.org:CVE-2017-16647 OSS:2017/Q4/244 RH:CVE-2017-16647 SMASH Issue 194645 UBUNTU:CVE-2017-16647 bnc#1067102 rh#1516270 |
CVE-2017-16648 | kernel-source-rt:Not affected | moderate | 4.6 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | BID:101758 CONFIRM:bugzilla.redhat.com:CVE-2018-10880 CONFIRM:bugzilla.redhat.com:CVE-2018-10882 CVE-2017-16648 CVE-2018-10880 CVE-2018-10882 CVE-2018-13405 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:groups.google.com:CVE-2017-16648 MISC:patchwork.kernel.org:CVE-2017-16648 OSS:2017/Q4/244 RH:CVE-2017-16648 RHSA-2018:2948 RHSA-2018:3083 RHSA-2018:3096 SMASH Issue 194646 UBUNTU:CVE-2017-16648 bnc#1067087 rh#1516257 rh#1596812 rh#1596842 rh#1599161 rh#2027239 rh#2044863 |
CVE-2017-16649 | kernel-source-rt:Not affected | moderate | 4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | BID:101761 CVE-2017-16649 DSA-5378 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:git.kernel.org:OSS:2020/Q1/69 MISC:groups.google.com:CVE-2017-16650 MISC:patchwork.ozlabs.org:CVE-2017-16649 OSS:2017/Q4/244 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-17558 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2017-5754 RH:CVE-2017-16649 SMASH Issue 194647 UBUNTU:CVE-2017-16649 bdo#1033297 bnc#1067085 rh#1481178 rh#1516267 rh#1519780 rh#2061700 rh#2119127 |
CVE-2017-16650 | kernel-source-rt:Not affected | moderate | 4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | BID:101791 CVE-2017-16650 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:patchwork.ozlabs.org:CVE-2017-16650 OSS:2017/Q4/244 RH:CVE-2017-16650 SMASH Issue 194648 UBUNTU:CVE-2017-16650 bnc#1067086 rh#1516265 |
CVE-2017-16912 | kernel-source-rt:Not affected | moderate | 6.2 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | BID:102150 CVE-2017-16912 DSA-4187 DSA-5378 MISC:cdn.kernel.org:CVE-2017-16914 MISC:git.kernel.org:CVE-2017-16912 MISC:git.kernel.org:OSS:2014/03/05/6 MISC:secuniaresearch.flexerasoftware.com:CVE-2017-16912 MISC:secuniaresearch.flexerasoftware.com:CVE-2017-16914 MISC:secuniaresearch.flexerasoftware.com:OSS:2018/Q2/165 OSS:2014/03/05/6 OSS:2018/Q1/124 OSS:2022/11/10/2 OSS:2022/12/27/3 OSS:2022/Q4/132 OSS:2022/Q4/135 OSS:2022/Q4/244 Oracle:CVE-2017-0861 Oracle:CVE-2017-5715 RH:CVE-2017-16912 SMASH Issue 199293 UBUNTU:CVE-2017-16912 bdo#1033297 bnc#1078673 rh#1243852 rh#1495089 rh#1498016 rh#1519780 rh#1539599 rh#1541883 rh#2061700 rh#2119127 |
CVE-2017-16939 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | BID:101954 CVE-2017-16939 D:CVE-2017-16939 DEBIAN:DSA-4082 DSA-4082 DSA-5378 MISC:blogs.securiteam.com:CVE-2017-16939 MISC:git.kernel.org:CVE-2017-16939 MISC:github.com:CVE-2017-16939 MISC:seclists.org:CVE-2017-16939 MISC:www.kernel.org:CVE-2017-16939 MLIST:[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update OSS:2017/Q4/323 OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-17558 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2017-5754 Oracle:CVE-2018-3639 RH:CVE-2017-16939 RHSA-2018:0654 RHSA-2018:1318 RHSA-2018:1355 RHSA-2019:1170 RHSA-2019:1190 SMASH Issue 195627 SUSE:SUSE-SU-2018:0011 UBUNTU:CVE-2017-16939 bdo#1033297 bnc#1069702 bnc#1069708 rh#1517220 rh#1519780 rh#1575472 rh#1660375 rh#1660385 rh#2061700 rh#2119127 |
CVE-2017-16995 | kernel-source-rt:Already fixed | moderate | () | BID:102267 BID:102288 BID:102320 BID:102321 BID:102325 CONFIRM:git.kernel.org:/pub/scm/linux/kernel/git/tip/tip.git/commit/ CVE-2017-16995 CVE-2017-16996 CVE-2017-17852 CVE-2017-17853 CVE-2017-17854 CVE-2017-17855 CVE-2017-17856 CVE-2017-17857 CVE-2017-17862 CVE-2017-17863 CVE-2017-17864 DEBIAN:DSA-4073 DSA-4073 DSA-5378 EXPLOIT-DB:44298 EXPLOIT-DB:45010 EXPLOIT-DB:45058 MISC:anonscm.debian.org:CVE-2017-17862 MISC:anonscm.debian.org:CVE-2017-17863 MISC:anonscm.debian.org:CVE-2017-17864 MISC:bugs.chromium.org:CVE-2017-16996 MISC:git.kernel.org:CVE-2017-16995 MISC:git.kernel.org:CVE-2017-16996 MISC:git.kernel.org:CVE-2017-17852 MISC:git.kernel.org:CVE-2017-17853 MISC:git.kernel.org:CVE-2017-17854 MISC:git.kernel.org:CVE-2017-17855 MISC:git.kernel.org:CVE-2017-17856 MISC:git.kernel.org:CVE-2017-17857 MISC:git.kernel.org:CVE-2017-17862 MISC:github.com:CVE-2017-17852 MISC:github.com:CVE-2017-17853 MISC:github.com:CVE-2017-17854 MISC:github.com:CVE-2017-17855 MISC:github.com:CVE-2017-17856 MISC:github.com:CVE-2017-17857 MISC:github.com:CVE-2017-17862 MISC:lists.debian.org:OSS:2017/Q4/433 MISC:openwall.com:CVE-2017-16996 MISC:www.openwall.com:CVE-2017-17852 MISC:www.spinics.net:CVE-2017-17862 MISC:www.spinics.net:CVE-2017-17863 OSS:2017/Q4/429 OSS:2017/Q4/432 OSS:2017/Q4/433 OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-5715 RH:CVE-2017-16995 RH:CVE-2017-16996 RH:CVE-2017-17852 RH:CVE-2017-17853 RH:CVE-2017-17854 RH:CVE-2017-17855 RH:CVE-2017-17856 RH:CVE-2017-17857 RH:CVE-2017-17862 RH:CVE-2017-17863 RH:CVE-2017-17864 SECTRACK:1040057 SECTRACK:1040058 SECTRACK:1040059 SMASH Issue 197144 UBUNTU:CVE-2017-16995 UBUNTU:CVE-2017-16996 UBUNTU:CVE-2017-17852 UBUNTU:CVE-2017-17853 UBUNTU:CVE-2017-17854 UBUNTU:CVE-2017-17855 UBUNTU:CVE-2017-17856 UBUNTU:CVE-2017-17857 UBUNTU:CVE-2017-17862 UBUNTU:CVE-2017-17863 UBUNTU:CVE-2017-17864 UBUNTU:USN-3523-2 UBUNTU:USN-3523-3 UBUNTU:USN-3619-1 UBUNTU:USN-3619-2 UBUNTU:USN-3633-1 bdo#1033297 bnc#1073928 linux.git:commit:0c17d1d2c61936401f4702e1846e2c19b200f958 linux.git:commit:95a762e2c8c942780948091f8f2a4f32fce1ac6f rh#1519780 rh#1528516 rh#1528518 rh#1529120 rh#1529123 rh#1529124 rh#1530269 rh#1530270 rh#1530271 rh#1530272 rh#1530273 rh#1530274 rh#2061700 rh#2119127 |
CVE-2017-16996 | kernel-source-rt:Already fixed | moderate | () | BID:102267 BID:102288 BID:102320 BID:102321 BID:102325 CONFIRM:git.kernel.org:/pub/scm/linux/kernel/git/tip/tip.git/commit/ CVE-2017-16995 CVE-2017-16996 CVE-2017-17852 CVE-2017-17853 CVE-2017-17854 CVE-2017-17855 CVE-2017-17856 CVE-2017-17857 CVE-2017-17862 CVE-2017-17863 CVE-2017-17864 DEBIAN:DSA-4073 DSA-4073 DSA-5378 EXPLOIT-DB:44298 EXPLOIT-DB:45010 EXPLOIT-DB:45058 MISC:anonscm.debian.org:CVE-2017-17862 MISC:anonscm.debian.org:CVE-2017-17863 MISC:anonscm.debian.org:CVE-2017-17864 MISC:bugs.chromium.org:CVE-2017-16996 MISC:git.kernel.org:CVE-2017-16995 MISC:git.kernel.org:CVE-2017-16996 MISC:git.kernel.org:CVE-2017-17852 MISC:git.kernel.org:CVE-2017-17853 MISC:git.kernel.org:CVE-2017-17854 MISC:git.kernel.org:CVE-2017-17855 MISC:git.kernel.org:CVE-2017-17856 MISC:git.kernel.org:CVE-2017-17857 MISC:git.kernel.org:CVE-2017-17862 MISC:github.com:CVE-2017-17852 MISC:github.com:CVE-2017-17853 MISC:github.com:CVE-2017-17854 MISC:github.com:CVE-2017-17855 MISC:github.com:CVE-2017-17856 MISC:github.com:CVE-2017-17857 MISC:github.com:CVE-2017-17862 MISC:lists.debian.org:OSS:2017/Q4/433 MISC:openwall.com:CVE-2017-16996 MISC:www.openwall.com:CVE-2017-17852 MISC:www.spinics.net:CVE-2017-17862 MISC:www.spinics.net:CVE-2017-17863 OSS:2017/Q4/429 OSS:2017/Q4/432 OSS:2017/Q4/433 OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-5715 RH:CVE-2017-16995 RH:CVE-2017-16996 RH:CVE-2017-17852 RH:CVE-2017-17853 RH:CVE-2017-17854 RH:CVE-2017-17855 RH:CVE-2017-17856 RH:CVE-2017-17857 RH:CVE-2017-17862 RH:CVE-2017-17863 RH:CVE-2017-17864 SECTRACK:1040057 SECTRACK:1040058 SECTRACK:1040059 SMASH Issue 197144 UBUNTU:CVE-2017-16995 UBUNTU:CVE-2017-16996 UBUNTU:CVE-2017-17852 UBUNTU:CVE-2017-17853 UBUNTU:CVE-2017-17854 UBUNTU:CVE-2017-17855 UBUNTU:CVE-2017-17856 UBUNTU:CVE-2017-17857 UBUNTU:CVE-2017-17862 UBUNTU:CVE-2017-17863 UBUNTU:CVE-2017-17864 UBUNTU:USN-3523-2 UBUNTU:USN-3523-3 UBUNTU:USN-3619-1 UBUNTU:USN-3619-2 UBUNTU:USN-3633-1 bdo#1033297 bnc#1073928 linux.git:commit:0c17d1d2c61936401f4702e1846e2c19b200f958 linux.git:commit:95a762e2c8c942780948091f8f2a4f32fce1ac6f rh#1519780 rh#1528516 rh#1528518 rh#1529120 rh#1529123 rh#1529124 rh#1530269 rh#1530270 rh#1530271 rh#1530272 rh#1530273 rh#1530274 rh#2061700 rh#2119127 |
CVE-2017-17052 | kernel-source-rt:Unsupported | important | () | BID:102009 CONFIRM:git.kernel.org:CVE-2017-17052 CONFIRM:github.com:CVE-2017-17052 CONFIRM:www.kernel.org:CVE-2017-17053 CVE-2017-17052 RH:CVE-2017-17052 SMASH Issue 195760 UBUNTU:CVE-2017-17052 bnc#1070266 rh#1518632 |
CVE-2017-17087 | vim:Released | low | 4 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) | CVE-2017-17087 D:CVE-2017-17087 MISC:github.com:CVE-2017-17087 MISC:groups.google.com:CVE-2017-17087 MISC:openwall.com:CVE-2017-17087 MISC:security.cucumberlinux.com:CVE-2017-17087 MLIST:[debian-lts-announce] 20190803 [SECURITY] [DLA 1871-1] vim security update MLIST:[debian-lts-announce] 20220110 [SECURITY] [DLA 2876-1] vim security update OSS:2017/Q4/345 RH:CVE-2017-17087 SMASH Issue 196024 UBUNTU:CVE-2017-17087 USN-4582-1 bnc#1070955 rh#1524485 |
CVE-2017-17448 | kernel-source-rt:Already fixed | moderate | 5.7 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L) | BID:102117 CVE-2017-17448 D:CVE-2017-17448 DEBIAN:DSA-4073 DEBIAN:DSA-4082 DSA-4073 DSA-4082 DSA-5378 MISC:patchwork.kernel.org:CVE-2017-17448 OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-17558 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2017-5754 RH:CVE-2017-17448 RHSA-2018:0654 RHSA-2018:0676 RHSA-2018:1062 SMASH Issue 196291 UBUNTU:CVE-2017-17448 UBUNTU:USN-3617-1 UBUNTU:USN-3617-2 UBUNTU:USN-3617-3 UBUNTU:USN-3619-1 UBUNTU:USN-3619-2 UBUNTU:USN-3620-1 UBUNTU:USN-3620-2 UBUNTU:USN-3632-1 bdo#1033297 bnc#1071693 rh#1519780 rh#1525768 rh#2061700 rh#2119127 |
CVE-2017-17450 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N) | BID:102110 CVE-2017-17450 D:CVE-2017-17450 DEBIAN:DSA-4073 DEBIAN:DSA-4082 DSA-4073 DSA-4082 DSA-5378 MISC:lkml.org:CVE-2017-17450 OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-17558 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2017-5754 RH:CVE-2017-17450 SMASH Issue 196289 SUSE:SUSE-SU-2018:0011 UBUNTU:CVE-2017-17450 UBUNTU:USN-3583-1 UBUNTU:USN-3583-2 UBUNTU:USN-3617-1 UBUNTU:USN-3617-2 UBUNTU:USN-3617-3 UBUNTU:USN-3619-1 UBUNTU:USN-3619-2 UBUNTU:USN-3632-1 bdo#1033297 bnc#1071695 rh#1519780 rh#1525761 rh#2061700 rh#2119127 |
CVE-2017-17558 | kernel-source-rt:Not affected | moderate | 4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2017-17558 D:CVE-2017-17558 DEBIAN:DSA-4073 DEBIAN:DSA-4082 DSA-4073 DSA-4082 DSA-5378 MISC:openwall.com:CVE-2017-17558 MISC:www.cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:www.spinics.net:CVE-2017-17558 MLIST:[debian-lts-announce] 20180107 [SECURITY] [DLA 1232-1] linux security update OSS:2017/Q4/392 OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-17558 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2017-5754 RH:CVE-2017-17558 RHSA-2018:0676 RHSA-2018:1062 RHSA-2019:1170 RHSA-2019:1190 SMASH Issue 196498 SUSE:SUSE-SU-2018:0011 UBUNTU:CVE-2017-17558 UBUNTU:USN-3619-1 UBUNTU:USN-3619-2 bdo#1033297 bnc#1072561 rh#1519780 rh#1525474 rh#2061700 rh#2119127 |
CVE-2017-17741 | kernel-source-rt:Not affected | important | 7.1 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H) | BID:102227 CVE-2017-17741 D:CVE-2017-17741 DSA-4073 DSA-4082 DSA-5378 MISC:www.spinics.net:CVE-2017-17741 OSS:2017/Q4/422 OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-5715 Oracle:CVE-2018-3639 RH:CVE-2017-17741 SMASH Issue 196829 UBUNTU:CVE-2017-17741 bdo#1033297 bnc#1073311 linux.git:commit:e39d200fa5bf5b94a0948db0dae44c1b73b84a56 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1519780 rh#1527112 rh#1527393 rh#1575472 rh#1575866 rh#1667782 rh#1701224 rh#1701842 rh#1890354 rh#2061700 rh#2119127 |
CVE-2017-17805 | kernel-source-rt:Not affected | important | 7.1 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H) | BID:102291 CONFIRM:bugzilla.redhat.com:CVE-2018-10880 CONFIRM:bugzilla.redhat.com:CVE-2018-10882 CONFIRM:git.kernel.org:CVE-2017-17805 CONFIRM:github.com:CVE-2017-17805 CONFIRM:www.kernel.org:CVE-2017-17806 CVE-2017-17805 CVE-2018-10880 CVE-2018-10882 CVE-2018-13405 DEBIAN:DSA-4073 DEBIAN:DSA-4082 DSA-4073 DSA-4082 DSA-5378 MLIST:[debian-lts-announce] 20180107 [SECURITY] [DLA 1232-1] linux security update OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-17558 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2017-5754 RH:CVE-2017-17805 RHSA-2018:2948 RHSA-2018:3083 RHSA-2018:3096 RHSA-2019:2473 SMASH Issue 197016 SUSE:SUSE-SU-2018:0010 SUSE:SUSE-SU-2018:0011 SUSE:SUSE-SU-2018:0012 SUSE:openSUSE-SU-2018:0022 SUSE:openSUSE-SU-2018:0023 UBUNTU:CVE-2017-17805 UBUNTU:USN-3617-1 UBUNTU:USN-3617-2 UBUNTU:USN-3617-3 UBUNTU:USN-3619-1 UBUNTU:USN-3619-2 UBUNTU:USN-3620-1 UBUNTU:USN-3620-2 UBUNTU:USN-3632-1 bdo#1033297 bnc#1073792 rh#1519780 rh#1528312 rh#1596812 rh#1596842 rh#1599161 rh#2027239 rh#2044863 rh#2061700 rh#2119127 |
CVE-2017-17806 | kernel-source-rt:Not affected | low | 3.6 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L) | BID:102293 CONFIRM:bugzilla.redhat.com:CVE-2018-10880 CONFIRM:bugzilla.redhat.com:CVE-2018-10882 CONFIRM:git.kernel.org:CVE-2017-17806 CONFIRM:github.com:CVE-2017-17806 CONFIRM:www.kernel.org:CVE-2017-17806 CVE-2017-17806 CVE-2018-10880 CVE-2018-10882 CVE-2018-13405 DEBIAN:DSA-4073 DEBIAN:DSA-4082 DSA-4073 DSA-4082 DSA-5378 MLIST:[debian-lts-announce] 20180107 [SECURITY] [DLA 1232-1] linux security update OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-17558 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2017-5754 RH:CVE-2017-17806 RHSA-2018:2948 RHSA-2018:3083 RHSA-2018:3096 SMASH Issue 197017 SUSE:SUSE-SU-2018:0010 SUSE:SUSE-SU-2018:0011 SUSE:SUSE-SU-2018:0012 SUSE:openSUSE-SU-2018:0022 SUSE:openSUSE-SU-2018:0023 UBUNTU:CVE-2017-17806 UBUNTU:USN-3583-1 UBUNTU:USN-3583-2 UBUNTU:USN-3617-1 UBUNTU:USN-3617-2 UBUNTU:USN-3617-3 UBUNTU:USN-3619-1 UBUNTU:USN-3619-2 UBUNTU:USN-3632-1 bdo#1033297 bnc#1073874 rh#1519780 rh#1528323 rh#1596812 rh#1596842 rh#1599161 rh#2027239 rh#2044863 rh#2061700 rh#2119127 |
CVE-2017-17807 | kernel-source-rt:Not affected | moderate | 5.1 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L) | BID:102301 CONFIRM:git.kernel.org:CVE-2017-17807 CONFIRM:github.com:CVE-2017-17807 CONFIRM:www.kernel.org:CVE-2017-17807 CVE-2017-17807 DEBIAN:DSA-4073 DEBIAN:DSA-4082 DSA-4073 DSA-4082 MLIST:[debian-lts-announce] 20180107 [SECURITY] [DLA 1232-1] linux security update RH:CVE-2017-17807 RHSA-2020:1016 RHSA-2020:1070 SMASH Issue 197018 UBUNTU:CVE-2017-17807 UBUNTU:USN-3617-1 UBUNTU:USN-3617-2 UBUNTU:USN-3617-3 UBUNTU:USN-3619-1 UBUNTU:USN-3619-2 UBUNTU:USN-3620-1 UBUNTU:USN-3620-2 UBUNTU:USN-3632-1 bnc#1073860 rh#1528335 |
CVE-2017-17852 | kernel-source-rt:Already fixed | moderate | () | BID:102267 BID:102288 BID:102320 BID:102321 BID:102325 CONFIRM:git.kernel.org:/pub/scm/linux/kernel/git/tip/tip.git/commit/ CVE-2017-16995 CVE-2017-16996 CVE-2017-17852 CVE-2017-17853 CVE-2017-17854 CVE-2017-17855 CVE-2017-17856 CVE-2017-17857 CVE-2017-17862 CVE-2017-17863 CVE-2017-17864 DEBIAN:DSA-4073 DSA-4073 DSA-5378 EXPLOIT-DB:44298 EXPLOIT-DB:45010 EXPLOIT-DB:45058 MISC:anonscm.debian.org:CVE-2017-17862 MISC:anonscm.debian.org:CVE-2017-17863 MISC:anonscm.debian.org:CVE-2017-17864 MISC:bugs.chromium.org:CVE-2017-16996 MISC:git.kernel.org:CVE-2017-16995 MISC:git.kernel.org:CVE-2017-16996 MISC:git.kernel.org:CVE-2017-17852 MISC:git.kernel.org:CVE-2017-17853 MISC:git.kernel.org:CVE-2017-17854 MISC:git.kernel.org:CVE-2017-17855 MISC:git.kernel.org:CVE-2017-17856 MISC:git.kernel.org:CVE-2017-17857 MISC:git.kernel.org:CVE-2017-17862 MISC:github.com:CVE-2017-17852 MISC:github.com:CVE-2017-17853 MISC:github.com:CVE-2017-17854 MISC:github.com:CVE-2017-17855 MISC:github.com:CVE-2017-17856 MISC:github.com:CVE-2017-17857 MISC:github.com:CVE-2017-17862 MISC:lists.debian.org:OSS:2017/Q4/433 MISC:openwall.com:CVE-2017-16996 MISC:www.openwall.com:CVE-2017-17852 MISC:www.spinics.net:CVE-2017-17862 MISC:www.spinics.net:CVE-2017-17863 OSS:2017/Q4/429 OSS:2017/Q4/432 OSS:2017/Q4/433 OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-5715 RH:CVE-2017-16995 RH:CVE-2017-16996 RH:CVE-2017-17852 RH:CVE-2017-17853 RH:CVE-2017-17854 RH:CVE-2017-17855 RH:CVE-2017-17856 RH:CVE-2017-17857 RH:CVE-2017-17862 RH:CVE-2017-17863 RH:CVE-2017-17864 SECTRACK:1040057 SECTRACK:1040058 SECTRACK:1040059 SMASH Issue 197144 SMASH Issue 197228 UBUNTU:CVE-2017-16995 UBUNTU:CVE-2017-16996 UBUNTU:CVE-2017-17852 UBUNTU:CVE-2017-17853 UBUNTU:CVE-2017-17854 UBUNTU:CVE-2017-17855 UBUNTU:CVE-2017-17856 UBUNTU:CVE-2017-17857 UBUNTU:CVE-2017-17862 UBUNTU:CVE-2017-17863 UBUNTU:CVE-2017-17864 UBUNTU:USN-3523-2 UBUNTU:USN-3523-3 UBUNTU:USN-3619-1 UBUNTU:USN-3619-2 UBUNTU:USN-3633-1 bdo#1033297 bnc#1073928 linux.git:commit:0c17d1d2c61936401f4702e1846e2c19b200f958 linux.git:commit:95a762e2c8c942780948091f8f2a4f32fce1ac6f rh#1519780 rh#1528516 rh#1528518 rh#1529120 rh#1529123 rh#1529124 rh#1530269 rh#1530270 rh#1530271 rh#1530272 rh#1530273 rh#1530274 rh#2061700 rh#2119127 |
CVE-2017-17853 | kernel-source-rt:Already fixed | moderate | () | BID:102267 BID:102288 BID:102320 BID:102321 BID:102325 CONFIRM:git.kernel.org:/pub/scm/linux/kernel/git/tip/tip.git/commit/ CVE-2017-16995 CVE-2017-16996 CVE-2017-17852 CVE-2017-17853 CVE-2017-17854 CVE-2017-17855 CVE-2017-17856 CVE-2017-17857 CVE-2017-17862 CVE-2017-17863 CVE-2017-17864 DEBIAN:DSA-4073 DSA-4073 DSA-5378 EXPLOIT-DB:44298 EXPLOIT-DB:45010 EXPLOIT-DB:45058 MISC:anonscm.debian.org:CVE-2017-17862 MISC:anonscm.debian.org:CVE-2017-17863 MISC:anonscm.debian.org:CVE-2017-17864 MISC:bugs.chromium.org:CVE-2017-16996 MISC:git.kernel.org:CVE-2017-16995 MISC:git.kernel.org:CVE-2017-16996 MISC:git.kernel.org:CVE-2017-17852 MISC:git.kernel.org:CVE-2017-17853 MISC:git.kernel.org:CVE-2017-17854 MISC:git.kernel.org:CVE-2017-17855 MISC:git.kernel.org:CVE-2017-17856 MISC:git.kernel.org:CVE-2017-17857 MISC:git.kernel.org:CVE-2017-17862 MISC:github.com:CVE-2017-17852 MISC:github.com:CVE-2017-17853 MISC:github.com:CVE-2017-17854 MISC:github.com:CVE-2017-17855 MISC:github.com:CVE-2017-17856 MISC:github.com:CVE-2017-17857 MISC:github.com:CVE-2017-17862 MISC:lists.debian.org:OSS:2017/Q4/433 MISC:openwall.com:CVE-2017-16996 MISC:www.openwall.com:CVE-2017-17852 MISC:www.spinics.net:CVE-2017-17862 MISC:www.spinics.net:CVE-2017-17863 OSS:2017/Q4/429 OSS:2017/Q4/432 OSS:2017/Q4/433 OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-5715 RH:CVE-2017-16995 RH:CVE-2017-16996 RH:CVE-2017-17852 RH:CVE-2017-17853 RH:CVE-2017-17854 RH:CVE-2017-17855 RH:CVE-2017-17856 RH:CVE-2017-17857 RH:CVE-2017-17862 RH:CVE-2017-17863 RH:CVE-2017-17864 SECTRACK:1040057 SECTRACK:1040058 SECTRACK:1040059 SMASH Issue 197144 SMASH Issue 197229 UBUNTU:CVE-2017-16995 UBUNTU:CVE-2017-16996 UBUNTU:CVE-2017-17852 UBUNTU:CVE-2017-17853 UBUNTU:CVE-2017-17854 UBUNTU:CVE-2017-17855 UBUNTU:CVE-2017-17856 UBUNTU:CVE-2017-17857 UBUNTU:CVE-2017-17862 UBUNTU:CVE-2017-17863 UBUNTU:CVE-2017-17864 UBUNTU:USN-3523-2 UBUNTU:USN-3523-3 UBUNTU:USN-3619-1 UBUNTU:USN-3619-2 UBUNTU:USN-3633-1 bdo#1033297 bnc#1073928 linux.git:commit:0c17d1d2c61936401f4702e1846e2c19b200f958 linux.git:commit:95a762e2c8c942780948091f8f2a4f32fce1ac6f rh#1519780 rh#1528516 rh#1528518 rh#1529120 rh#1529123 rh#1529124 rh#1530269 rh#1530270 rh#1530271 rh#1530272 rh#1530273 rh#1530274 rh#2061700 rh#2119127 |
CVE-2017-17854 | kernel-source-rt:Already fixed | moderate | 6.2 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H) | BID:102267 BID:102288 BID:102320 BID:102321 BID:102325 CONFIRM:git.kernel.org:/pub/scm/linux/kernel/git/tip/tip.git/commit/ CVE-2017-16995 CVE-2017-16996 CVE-2017-17852 CVE-2017-17853 CVE-2017-17854 CVE-2017-17855 CVE-2017-17856 CVE-2017-17857 CVE-2017-17862 CVE-2017-17863 CVE-2017-17864 DEBIAN:DSA-4073 DSA-4073 DSA-5378 EXPLOIT-DB:44298 EXPLOIT-DB:45010 EXPLOIT-DB:45058 MISC:anonscm.debian.org:CVE-2017-17862 MISC:anonscm.debian.org:CVE-2017-17863 MISC:anonscm.debian.org:CVE-2017-17864 MISC:bugs.chromium.org:CVE-2017-16996 MISC:git.kernel.org:CVE-2017-16995 MISC:git.kernel.org:CVE-2017-16996 MISC:git.kernel.org:CVE-2017-17852 MISC:git.kernel.org:CVE-2017-17853 MISC:git.kernel.org:CVE-2017-17854 MISC:git.kernel.org:CVE-2017-17855 MISC:git.kernel.org:CVE-2017-17856 MISC:git.kernel.org:CVE-2017-17857 MISC:git.kernel.org:CVE-2017-17862 MISC:github.com:CVE-2017-17852 MISC:github.com:CVE-2017-17853 MISC:github.com:CVE-2017-17854 MISC:github.com:CVE-2017-17855 MISC:github.com:CVE-2017-17856 MISC:github.com:CVE-2017-17857 MISC:github.com:CVE-2017-17862 MISC:lists.debian.org:OSS:2017/Q4/433 MISC:openwall.com:CVE-2017-16996 MISC:www.openwall.com:CVE-2017-17852 MISC:www.spinics.net:CVE-2017-17862 MISC:www.spinics.net:CVE-2017-17863 OSS:2017/Q4/429 OSS:2017/Q4/432 OSS:2017/Q4/433 OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-5715 RH:CVE-2017-16995 RH:CVE-2017-16996 RH:CVE-2017-17852 RH:CVE-2017-17853 RH:CVE-2017-17854 RH:CVE-2017-17855 RH:CVE-2017-17856 RH:CVE-2017-17857 RH:CVE-2017-17862 RH:CVE-2017-17863 RH:CVE-2017-17864 SECTRACK:1040057 SECTRACK:1040058 SECTRACK:1040059 SMASH Issue 197144 SMASH Issue 197230 UBUNTU:CVE-2017-16995 UBUNTU:CVE-2017-16996 UBUNTU:CVE-2017-17852 UBUNTU:CVE-2017-17853 UBUNTU:CVE-2017-17854 UBUNTU:CVE-2017-17855 UBUNTU:CVE-2017-17856 UBUNTU:CVE-2017-17857 UBUNTU:CVE-2017-17862 UBUNTU:CVE-2017-17863 UBUNTU:CVE-2017-17864 UBUNTU:USN-3523-2 UBUNTU:USN-3523-3 UBUNTU:USN-3619-1 UBUNTU:USN-3619-2 UBUNTU:USN-3633-1 bdo#1033297 bnc#1073928 linux.git:commit:0c17d1d2c61936401f4702e1846e2c19b200f958 linux.git:commit:95a762e2c8c942780948091f8f2a4f32fce1ac6f rh#1519780 rh#1528516 rh#1528518 rh#1529120 rh#1529123 rh#1529124 rh#1530269 rh#1530270 rh#1530271 rh#1530272 rh#1530273 rh#1530274 rh#2061700 rh#2119127 |
CVE-2017-17855 | kernel-source-rt:Already fixed | moderate | () | BID:102267 BID:102288 BID:102320 BID:102321 BID:102325 CONFIRM:git.kernel.org:/pub/scm/linux/kernel/git/tip/tip.git/commit/ CVE-2017-16995 CVE-2017-16996 CVE-2017-17852 CVE-2017-17853 CVE-2017-17854 CVE-2017-17855 CVE-2017-17856 CVE-2017-17857 CVE-2017-17862 CVE-2017-17863 CVE-2017-17864 DEBIAN:DSA-4073 DSA-4073 DSA-5378 EXPLOIT-DB:44298 EXPLOIT-DB:45010 EXPLOIT-DB:45058 MISC:anonscm.debian.org:CVE-2017-17862 MISC:anonscm.debian.org:CVE-2017-17863 MISC:anonscm.debian.org:CVE-2017-17864 MISC:bugs.chromium.org:CVE-2017-16996 MISC:git.kernel.org:CVE-2017-16995 MISC:git.kernel.org:CVE-2017-16996 MISC:git.kernel.org:CVE-2017-17852 MISC:git.kernel.org:CVE-2017-17853 MISC:git.kernel.org:CVE-2017-17854 MISC:git.kernel.org:CVE-2017-17855 MISC:git.kernel.org:CVE-2017-17856 MISC:git.kernel.org:CVE-2017-17857 MISC:git.kernel.org:CVE-2017-17862 MISC:github.com:CVE-2017-17852 MISC:github.com:CVE-2017-17853 MISC:github.com:CVE-2017-17854 MISC:github.com:CVE-2017-17855 MISC:github.com:CVE-2017-17856 MISC:github.com:CVE-2017-17857 MISC:github.com:CVE-2017-17862 MISC:lists.debian.org:OSS:2017/Q4/433 MISC:openwall.com:CVE-2017-16996 MISC:www.openwall.com:CVE-2017-17852 MISC:www.spinics.net:CVE-2017-17862 MISC:www.spinics.net:CVE-2017-17863 OSS:2017/Q4/429 OSS:2017/Q4/432 OSS:2017/Q4/433 OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-5715 RH:CVE-2017-16995 RH:CVE-2017-16996 RH:CVE-2017-17852 RH:CVE-2017-17853 RH:CVE-2017-17854 RH:CVE-2017-17855 RH:CVE-2017-17856 RH:CVE-2017-17857 RH:CVE-2017-17862 RH:CVE-2017-17863 RH:CVE-2017-17864 SECTRACK:1040057 SECTRACK:1040058 SECTRACK:1040059 SMASH Issue 197144 SMASH Issue 197231 UBUNTU:CVE-2017-16995 UBUNTU:CVE-2017-16996 UBUNTU:CVE-2017-17852 UBUNTU:CVE-2017-17853 UBUNTU:CVE-2017-17854 UBUNTU:CVE-2017-17855 UBUNTU:CVE-2017-17856 UBUNTU:CVE-2017-17857 UBUNTU:CVE-2017-17862 UBUNTU:CVE-2017-17863 UBUNTU:CVE-2017-17864 UBUNTU:USN-3523-2 UBUNTU:USN-3523-3 UBUNTU:USN-3619-1 UBUNTU:USN-3619-2 UBUNTU:USN-3633-1 bdo#1033297 bnc#1073928 linux.git:commit:0c17d1d2c61936401f4702e1846e2c19b200f958 linux.git:commit:95a762e2c8c942780948091f8f2a4f32fce1ac6f rh#1519780 rh#1528516 rh#1528518 rh#1529120 rh#1529123 rh#1529124 rh#1530269 rh#1530270 rh#1530271 rh#1530272 rh#1530273 rh#1530274 rh#2061700 rh#2119127 |
CVE-2017-17856 | kernel-source-rt:Already fixed | moderate | () | BID:102267 BID:102288 BID:102320 BID:102321 BID:102325 CONFIRM:git.kernel.org:/pub/scm/linux/kernel/git/tip/tip.git/commit/ CVE-2017-16995 CVE-2017-16996 CVE-2017-17852 CVE-2017-17853 CVE-2017-17854 CVE-2017-17855 CVE-2017-17856 CVE-2017-17857 CVE-2017-17862 CVE-2017-17863 CVE-2017-17864 DEBIAN:DSA-4073 DSA-4073 DSA-5378 EXPLOIT-DB:44298 EXPLOIT-DB:45010 EXPLOIT-DB:45058 MISC:anonscm.debian.org:CVE-2017-17862 MISC:anonscm.debian.org:CVE-2017-17863 MISC:anonscm.debian.org:CVE-2017-17864 MISC:bugs.chromium.org:CVE-2017-16996 MISC:git.kernel.org:CVE-2017-16995 MISC:git.kernel.org:CVE-2017-16996 MISC:git.kernel.org:CVE-2017-17852 MISC:git.kernel.org:CVE-2017-17853 MISC:git.kernel.org:CVE-2017-17854 MISC:git.kernel.org:CVE-2017-17855 MISC:git.kernel.org:CVE-2017-17856 MISC:git.kernel.org:CVE-2017-17857 MISC:git.kernel.org:CVE-2017-17862 MISC:github.com:CVE-2017-17852 MISC:github.com:CVE-2017-17853 MISC:github.com:CVE-2017-17854 MISC:github.com:CVE-2017-17855 MISC:github.com:CVE-2017-17856 MISC:github.com:CVE-2017-17857 MISC:github.com:CVE-2017-17862 MISC:lists.debian.org:OSS:2017/Q4/433 MISC:openwall.com:CVE-2017-16996 MISC:www.openwall.com:CVE-2017-17852 MISC:www.spinics.net:CVE-2017-17862 MISC:www.spinics.net:CVE-2017-17863 OSS:2017/Q4/429 OSS:2017/Q4/432 OSS:2017/Q4/433 OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-5715 RH:CVE-2017-16995 RH:CVE-2017-16996 RH:CVE-2017-17852 RH:CVE-2017-17853 RH:CVE-2017-17854 RH:CVE-2017-17855 RH:CVE-2017-17856 RH:CVE-2017-17857 RH:CVE-2017-17862 RH:CVE-2017-17863 RH:CVE-2017-17864 SECTRACK:1040057 SECTRACK:1040058 SECTRACK:1040059 SMASH Issue 197144 SMASH Issue 197232 UBUNTU:CVE-2017-16995 UBUNTU:CVE-2017-16996 UBUNTU:CVE-2017-17852 UBUNTU:CVE-2017-17853 UBUNTU:CVE-2017-17854 UBUNTU:CVE-2017-17855 UBUNTU:CVE-2017-17856 UBUNTU:CVE-2017-17857 UBUNTU:CVE-2017-17862 UBUNTU:CVE-2017-17863 UBUNTU:CVE-2017-17864 UBUNTU:USN-3523-2 UBUNTU:USN-3523-3 UBUNTU:USN-3619-1 UBUNTU:USN-3619-2 UBUNTU:USN-3633-1 bdo#1033297 bnc#1073928 linux.git:commit:0c17d1d2c61936401f4702e1846e2c19b200f958 linux.git:commit:95a762e2c8c942780948091f8f2a4f32fce1ac6f rh#1519780 rh#1528516 rh#1528518 rh#1529120 rh#1529123 rh#1529124 rh#1530269 rh#1530270 rh#1530271 rh#1530272 rh#1530273 rh#1530274 rh#2061700 rh#2119127 |
CVE-2017-17857 | kernel-source-rt:Already fixed | moderate | () | BID:102267 BID:102288 BID:102320 BID:102321 BID:102325 CONFIRM:git.kernel.org:/pub/scm/linux/kernel/git/tip/tip.git/commit/ CVE-2017-16995 CVE-2017-16996 CVE-2017-17852 CVE-2017-17853 CVE-2017-17854 CVE-2017-17855 CVE-2017-17856 CVE-2017-17857 CVE-2017-17862 CVE-2017-17863 CVE-2017-17864 DEBIAN:DSA-4073 DSA-4073 DSA-5378 EXPLOIT-DB:44298 EXPLOIT-DB:45010 EXPLOIT-DB:45058 MISC:anonscm.debian.org:CVE-2017-17862 MISC:anonscm.debian.org:CVE-2017-17863 MISC:anonscm.debian.org:CVE-2017-17864 MISC:bugs.chromium.org:CVE-2017-16996 MISC:git.kernel.org:CVE-2017-16995 MISC:git.kernel.org:CVE-2017-16996 MISC:git.kernel.org:CVE-2017-17852 MISC:git.kernel.org:CVE-2017-17853 MISC:git.kernel.org:CVE-2017-17854 MISC:git.kernel.org:CVE-2017-17855 MISC:git.kernel.org:CVE-2017-17856 MISC:git.kernel.org:CVE-2017-17857 MISC:git.kernel.org:CVE-2017-17862 MISC:github.com:CVE-2017-17852 MISC:github.com:CVE-2017-17853 MISC:github.com:CVE-2017-17854 MISC:github.com:CVE-2017-17855 MISC:github.com:CVE-2017-17856 MISC:github.com:CVE-2017-17857 MISC:github.com:CVE-2017-17862 MISC:lists.debian.org:OSS:2017/Q4/433 MISC:openwall.com:CVE-2017-16996 MISC:www.openwall.com:CVE-2017-17852 MISC:www.spinics.net:CVE-2017-17862 MISC:www.spinics.net:CVE-2017-17863 OSS:2017/Q4/429 OSS:2017/Q4/432 OSS:2017/Q4/433 OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-5715 RH:CVE-2017-16995 RH:CVE-2017-16996 RH:CVE-2017-17852 RH:CVE-2017-17853 RH:CVE-2017-17854 RH:CVE-2017-17855 RH:CVE-2017-17856 RH:CVE-2017-17857 RH:CVE-2017-17862 RH:CVE-2017-17863 RH:CVE-2017-17864 SECTRACK:1040057 SECTRACK:1040058 SECTRACK:1040059 SMASH Issue 197144 SMASH Issue 197233 UBUNTU:CVE-2017-16995 UBUNTU:CVE-2017-16996 UBUNTU:CVE-2017-17852 UBUNTU:CVE-2017-17853 UBUNTU:CVE-2017-17854 UBUNTU:CVE-2017-17855 UBUNTU:CVE-2017-17856 UBUNTU:CVE-2017-17857 UBUNTU:CVE-2017-17862 UBUNTU:CVE-2017-17863 UBUNTU:CVE-2017-17864 UBUNTU:USN-3523-2 UBUNTU:USN-3523-3 UBUNTU:USN-3619-1 UBUNTU:USN-3619-2 UBUNTU:USN-3633-1 bdo#1033297 bnc#1073928 linux.git:commit:0c17d1d2c61936401f4702e1846e2c19b200f958 linux.git:commit:95a762e2c8c942780948091f8f2a4f32fce1ac6f rh#1519780 rh#1528516 rh#1528518 rh#1529120 rh#1529123 rh#1529124 rh#1530269 rh#1530270 rh#1530271 rh#1530272 rh#1530273 rh#1530274 rh#2061700 rh#2119127 |
CVE-2017-17862 | kernel-source-rt:Already fixed | moderate | () | BID:102267 BID:102288 BID:102320 BID:102321 BID:102325 CONFIRM:git.kernel.org:/pub/scm/linux/kernel/git/tip/tip.git/commit/ CVE-2017-16995 CVE-2017-16996 CVE-2017-17852 CVE-2017-17853 CVE-2017-17854 CVE-2017-17855 CVE-2017-17856 CVE-2017-17857 CVE-2017-17862 CVE-2017-17863 CVE-2017-17864 DEBIAN:DSA-4073 DSA-4073 DSA-5378 EXPLOIT-DB:44298 EXPLOIT-DB:45010 EXPLOIT-DB:45058 MISC:anonscm.debian.org:CVE-2017-17862 MISC:anonscm.debian.org:CVE-2017-17863 MISC:anonscm.debian.org:CVE-2017-17864 MISC:bugs.chromium.org:CVE-2017-16996 MISC:git.kernel.org:CVE-2017-16995 MISC:git.kernel.org:CVE-2017-16996 MISC:git.kernel.org:CVE-2017-17852 MISC:git.kernel.org:CVE-2017-17853 MISC:git.kernel.org:CVE-2017-17854 MISC:git.kernel.org:CVE-2017-17855 MISC:git.kernel.org:CVE-2017-17856 MISC:git.kernel.org:CVE-2017-17857 MISC:git.kernel.org:CVE-2017-17862 MISC:github.com:CVE-2017-17852 MISC:github.com:CVE-2017-17853 MISC:github.com:CVE-2017-17854 MISC:github.com:CVE-2017-17855 MISC:github.com:CVE-2017-17856 MISC:github.com:CVE-2017-17857 MISC:github.com:CVE-2017-17862 MISC:lists.debian.org:OSS:2017/Q4/433 MISC:openwall.com:CVE-2017-16996 MISC:www.openwall.com:CVE-2017-17852 MISC:www.spinics.net:CVE-2017-17862 MISC:www.spinics.net:CVE-2017-17863 OSS:2017/Q4/429 OSS:2017/Q4/432 OSS:2017/Q4/433 OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-5715 RH:CVE-2017-16995 RH:CVE-2017-16996 RH:CVE-2017-17852 RH:CVE-2017-17853 RH:CVE-2017-17854 RH:CVE-2017-17855 RH:CVE-2017-17856 RH:CVE-2017-17857 RH:CVE-2017-17862 RH:CVE-2017-17863 RH:CVE-2017-17864 SECTRACK:1040057 SECTRACK:1040058 SECTRACK:1040059 SMASH Issue 197144 SMASH Issue 197244 UBUNTU:CVE-2017-16995 UBUNTU:CVE-2017-16996 UBUNTU:CVE-2017-17852 UBUNTU:CVE-2017-17853 UBUNTU:CVE-2017-17854 UBUNTU:CVE-2017-17855 UBUNTU:CVE-2017-17856 UBUNTU:CVE-2017-17857 UBUNTU:CVE-2017-17862 UBUNTU:CVE-2017-17863 UBUNTU:CVE-2017-17864 UBUNTU:USN-3523-2 UBUNTU:USN-3523-3 UBUNTU:USN-3619-1 UBUNTU:USN-3619-2 UBUNTU:USN-3633-1 bdo#1033297 bnc#1073928 linux.git:commit:0c17d1d2c61936401f4702e1846e2c19b200f958 linux.git:commit:95a762e2c8c942780948091f8f2a4f32fce1ac6f rh#1519780 rh#1528516 rh#1528518 rh#1529120 rh#1529123 rh#1529124 rh#1530269 rh#1530270 rh#1530271 rh#1530272 rh#1530273 rh#1530274 rh#2061700 rh#2119127 |
CVE-2017-17863 | kernel-source-rt:Already fixed | moderate | () | BID:102267 BID:102288 BID:102320 BID:102321 BID:102325 CONFIRM:git.kernel.org:/pub/scm/linux/kernel/git/tip/tip.git/commit/ CVE-2017-16995 CVE-2017-16996 CVE-2017-17852 CVE-2017-17853 CVE-2017-17854 CVE-2017-17855 CVE-2017-17856 CVE-2017-17857 CVE-2017-17862 CVE-2017-17863 CVE-2017-17864 DEBIAN:DSA-4073 DSA-4073 DSA-5378 EXPLOIT-DB:44298 EXPLOIT-DB:45010 EXPLOIT-DB:45058 MISC:anonscm.debian.org:CVE-2017-17862 MISC:anonscm.debian.org:CVE-2017-17863 MISC:anonscm.debian.org:CVE-2017-17864 MISC:bugs.chromium.org:CVE-2017-16996 MISC:git.kernel.org:CVE-2017-16995 MISC:git.kernel.org:CVE-2017-16996 MISC:git.kernel.org:CVE-2017-17852 MISC:git.kernel.org:CVE-2017-17853 MISC:git.kernel.org:CVE-2017-17854 MISC:git.kernel.org:CVE-2017-17855 MISC:git.kernel.org:CVE-2017-17856 MISC:git.kernel.org:CVE-2017-17857 MISC:git.kernel.org:CVE-2017-17862 MISC:github.com:CVE-2017-17852 MISC:github.com:CVE-2017-17853 MISC:github.com:CVE-2017-17854 MISC:github.com:CVE-2017-17855 MISC:github.com:CVE-2017-17856 MISC:github.com:CVE-2017-17857 MISC:github.com:CVE-2017-17862 MISC:lists.debian.org:OSS:2017/Q4/433 MISC:openwall.com:CVE-2017-16996 MISC:www.openwall.com:CVE-2017-17852 MISC:www.spinics.net:CVE-2017-17862 MISC:www.spinics.net:CVE-2017-17863 OSS:2017/Q4/429 OSS:2017/Q4/432 OSS:2017/Q4/433 OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-5715 RH:CVE-2017-16995 RH:CVE-2017-16996 RH:CVE-2017-17852 RH:CVE-2017-17853 RH:CVE-2017-17854 RH:CVE-2017-17855 RH:CVE-2017-17856 RH:CVE-2017-17857 RH:CVE-2017-17862 RH:CVE-2017-17863 RH:CVE-2017-17864 SECTRACK:1040057 SECTRACK:1040058 SECTRACK:1040059 SMASH Issue 197144 SMASH Issue 197245 UBUNTU:CVE-2017-16995 UBUNTU:CVE-2017-16996 UBUNTU:CVE-2017-17852 UBUNTU:CVE-2017-17853 UBUNTU:CVE-2017-17854 UBUNTU:CVE-2017-17855 UBUNTU:CVE-2017-17856 UBUNTU:CVE-2017-17857 UBUNTU:CVE-2017-17862 UBUNTU:CVE-2017-17863 UBUNTU:CVE-2017-17864 UBUNTU:USN-3523-2 UBUNTU:USN-3523-3 UBUNTU:USN-3619-1 UBUNTU:USN-3619-2 UBUNTU:USN-3633-1 bdo#1033297 bnc#1073928 linux.git:commit:0c17d1d2c61936401f4702e1846e2c19b200f958 linux.git:commit:95a762e2c8c942780948091f8f2a4f32fce1ac6f rh#1519780 rh#1528516 rh#1528518 rh#1529120 rh#1529123 rh#1529124 rh#1530269 rh#1530270 rh#1530271 rh#1530272 rh#1530273 rh#1530274 rh#2061700 rh#2119127 |
CVE-2017-17864 | kernel-source-rt:Already fixed | moderate | () | BID:102267 BID:102288 BID:102320 BID:102321 BID:102325 CONFIRM:git.kernel.org:/pub/scm/linux/kernel/git/tip/tip.git/commit/ CVE-2017-16995 CVE-2017-16996 CVE-2017-17852 CVE-2017-17853 CVE-2017-17854 CVE-2017-17855 CVE-2017-17856 CVE-2017-17857 CVE-2017-17862 CVE-2017-17863 CVE-2017-17864 DEBIAN:DSA-4073 DSA-4073 DSA-5378 EXPLOIT-DB:44298 EXPLOIT-DB:45010 EXPLOIT-DB:45058 MISC:anonscm.debian.org:CVE-2017-17862 MISC:anonscm.debian.org:CVE-2017-17863 MISC:anonscm.debian.org:CVE-2017-17864 MISC:bugs.chromium.org:CVE-2017-16996 MISC:git.kernel.org:CVE-2017-16995 MISC:git.kernel.org:CVE-2017-16996 MISC:git.kernel.org:CVE-2017-17852 MISC:git.kernel.org:CVE-2017-17853 MISC:git.kernel.org:CVE-2017-17854 MISC:git.kernel.org:CVE-2017-17855 MISC:git.kernel.org:CVE-2017-17856 MISC:git.kernel.org:CVE-2017-17857 MISC:git.kernel.org:CVE-2017-17862 MISC:github.com:CVE-2017-17852 MISC:github.com:CVE-2017-17853 MISC:github.com:CVE-2017-17854 MISC:github.com:CVE-2017-17855 MISC:github.com:CVE-2017-17856 MISC:github.com:CVE-2017-17857 MISC:github.com:CVE-2017-17862 MISC:lists.debian.org:OSS:2017/Q4/433 MISC:openwall.com:CVE-2017-16996 MISC:www.openwall.com:CVE-2017-17852 MISC:www.spinics.net:CVE-2017-17862 MISC:www.spinics.net:CVE-2017-17863 OSS:2017/Q4/429 OSS:2017/Q4/432 OSS:2017/Q4/433 OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-5715 RH:CVE-2017-16995 RH:CVE-2017-16996 RH:CVE-2017-17852 RH:CVE-2017-17853 RH:CVE-2017-17854 RH:CVE-2017-17855 RH:CVE-2017-17856 RH:CVE-2017-17857 RH:CVE-2017-17862 RH:CVE-2017-17863 RH:CVE-2017-17864 SECTRACK:1040057 SECTRACK:1040058 SECTRACK:1040059 SMASH Issue 197144 SMASH Issue 197246 UBUNTU:CVE-2017-16995 UBUNTU:CVE-2017-16996 UBUNTU:CVE-2017-17852 UBUNTU:CVE-2017-17853 UBUNTU:CVE-2017-17854 UBUNTU:CVE-2017-17855 UBUNTU:CVE-2017-17856 UBUNTU:CVE-2017-17857 UBUNTU:CVE-2017-17862 UBUNTU:CVE-2017-17863 UBUNTU:CVE-2017-17864 UBUNTU:USN-3523-2 UBUNTU:USN-3523-3 UBUNTU:USN-3619-1 UBUNTU:USN-3619-2 UBUNTU:USN-3633-1 bdo#1033297 bnc#1073928 linux.git:commit:0c17d1d2c61936401f4702e1846e2c19b200f958 linux.git:commit:95a762e2c8c942780948091f8f2a4f32fce1ac6f rh#1519780 rh#1528516 rh#1528518 rh#1529120 rh#1529123 rh#1529124 rh#1530269 rh#1530270 rh#1530271 rh#1530272 rh#1530273 rh#1530274 rh#2061700 rh#2119127 |
CVE-2017-18017 | kernel-source-rt:Not affected | important | 5.4 (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L) | BID:102367 CONFIRM:bugzilla.redhat.com:CVE-2018-10880 CONFIRM:bugzilla.redhat.com:CVE-2018-10882 CONFIRM:help.ecostruxureit.com:CVE-2017-5754 CONFIRM:source.android.com:CVE-2017-6280 CONFIRM:support.f5.com:CVE-2017-18017 CVE-2017-13166 CVE-2017-18017 CVE-2018-10880 CVE-2018-10882 CVE-2018-13405 DEBIAN:DSA-4120 DEBIAN:DSA-4187 DSA-4120 DSA-4187 DSA-5378 MISC:bugs.launchpad.net:CVE-2017-18017 MISC:git.kernel.org:CVE-2017-18017 MISC:git.kernel.org:OSS:2014/03/05/6 MISC:github.com:CVE-2017-18017 MISC:lkml.org:CVE-2017-18017 MISC:patchwork.ozlabs.org:CVE-2017-18017 MISC:www.arista.com:CVE-2017-18017 MISC:www.kernel.org:CVE-2017-18017 MLIST:[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update OSS:2014/03/05/6 OSS:2022/11/10/2 OSS:2022/12/27/3 OSS:2022/Q4/132 OSS:2022/Q4/135 OSS:2022/Q4/244 Oracle:CVE-2017-0861 Oracle:CVE-2017-5715 RH:CVE-2017-13166 RH:CVE-2017-18017 RHSA-2018:0676 RHSA-2018:1062 RHSA-2018:1130 RHSA-2018:1170 RHSA-2018:1319 RHSA-2018:1737 RHSA-2018:2948 RHSA-2018:3083 RHSA-2018:3096 SMASH Issue 197538 SUSE:SUSE-SU-2018:0383 SUSE:SUSE-SU-2018:0416 SUSE:SUSE-SU-2018:0482 SUSE:SUSE-SU-2018:0555 SUSE:SUSE-SU-2018:0660 SUSE:SUSE-SU-2018:0834 SUSE:SUSE-SU-2018:0841 SUSE:SUSE-SU-2018:0848 SUSE:SUSE-SU-2018:0986 SUSE:openSUSE-SU-2018:0408 UBUNTU:CVE-2017-13166 UBUNTU:CVE-2017-18017 UBUNTU:USN-3583-1 UBUNTU:USN-3583-2 USN-3583-1 USN-3583-2 bdo#1033297 bnc#1067118 bnc#1072865 bnc#1074488 bnc#1085447 http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2638fd0f92d4397884fd991d8f4925cb3f081901 linux.git:commit:d36260050e1881dce09625a9352d8729c911a6e3 rh#1243852 rh#1495089 rh#1498016 rh#1519780 rh#1531135 rh#1539599 rh#1548412 rh#1596812 rh#1596842 rh#1599161 rh#2027239 rh#2044863 rh#2061700 rh#2119127 |
CVE-2017-18075 | kernel-source-rt:Not affected | important | 7.4 (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | BID:102813 CONFIRM:bugzilla.redhat.com:CVE-2018-10877 CONFIRM:bugzilla.redhat.com:CVE-2018-10880 CONFIRM:bugzilla.redhat.com:CVE-2018-10882 CONFIRM:git.kernel.org:CVE-2017-18075 CONFIRM:github.com:CVE-2017-18075 CONFIRM:www.kernel.org:CVE-2017-18075 CVE-2017-18075 CVE-2018-10877 CVE-2018-10880 CVE-2018-10882 CVE-2018-13405 RH:CVE-2017-18075 RHSA-2018:2948 RHSA-2018:3083 RHSA-2018:3096 SMASH Issue 198879 SMASH Issue 198893 UBUNTU:CVE-2017-18075 UBUNTU:USN-3619-1 UBUNTU:USN-3619-2 bnc#1077402 bnc#1077404 rh#1539508 rh#1596795 rh#1596812 rh#1596842 rh#1599161 rh#2027239 rh#2044863 |
CVE-2017-18174 | kernel-source-rt:Already fixed | moderate | 5.3 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L) | CVE-2017-18174 DSA-5378 MISC:git.kernel.org:CVE-2017-18174 MISC:github.com:CVE-2017-18174 OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-5715 RH:CVE-2017-18174 SMASH Issue 199838 UBUNTU:CVE-2017-18174 bdo#1033297 bnc#1080533 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1519780 rh#1544482 rh#1575472 rh#1575866 rh#1667782 rh#1701224 rh#1701842 rh#1890354 rh#2061700 rh#2119127 |
CVE-2017-18193 | kernel-source-rt:Not affected | moderate | 6.2 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | BID:103147 CVE-2017-18193 DSA-4188 DSA-5378 MISC:git.kernel.org:CVE-2017-18193 MISC:github.com:CVE-2017-18193 OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-5715 RH:CVE-2017-18193 SMASH Issue 200689 UBUNTU:CVE-2017-18193 bdo#1033297 bnc#1082478 rh#1519780 rh#1549421 rh#2061700 rh#2119127 |
CVE-2017-18202 | kernel-source-rt:Unsupported | moderate | () | BID:103161 CVE-2017-18202 MISC:git.kernel.org:CVE-2017-18202 MISC:github.com:CVE-2017-18202 MISC:www.kernel.org:CVE-2017-18208 RH:CVE-2017-18202 RHSA-2018:2772 SMASH Issue 200879 UBUNTU:CVE-2017-18202 bnc#1083088 rh#1549621 |
CVE-2017-18204 | kernel-source-rt:Not affected | moderate | 3.3 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | BID:103183 CVE-2017-18204 MISC:git.kernel.org:CVE-2017-18204 MISC:github.com:CVE-2017-18204 MISC:www.kernel.org:CVE-2017-18204 RH:CVE-2017-18204 SMASH Issue 200959 UBUNTU:CVE-2017-18204 UBUNTU:USN-3617-1 UBUNTU:USN-3617-2 UBUNTU:USN-3617-3 UBUNTU:USN-3619-1 UBUNTU:USN-3619-2 UBUNTU:USN-3655-1 UBUNTU:USN-3655-2 bnc#1083244 rh#1495089 rh#1498016 rh#1539599 rh#1550818 |
CVE-2017-18208 | kernel-source-rt:Not affected | moderate | 6.2 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:bugzilla.redhat.com:CVE-2018-10880 CONFIRM:bugzilla.redhat.com:CVE-2018-10882 CVE-2017-18208 CVE-2018-10880 CVE-2018-10882 DSA-5378 MISC:git.kernel.org:CVE-2017-18208 MISC:git.kernel.org:OSS:2014/03/05/6 MISC:github.com:CVE-2017-18208 MISC:www.kernel.org:CVE-2017-18208 OSS:2014/03/05/6 OSS:2022/11/10/2 OSS:2022/12/27/3 OSS:2022/Q4/132 OSS:2022/Q4/135 OSS:2022/Q4/244 Oracle:CVE-2017-0861 Oracle:CVE-2017-5715 RH:CVE-2017-18208 RHSA-2018:2948 RHSA-2018:3083 RHSA-2018:3096 RHSA-2019:3967 RHSA-2019:4057 RHSA-2019:4058 SMASH Issue 201049 UBUNTU:CVE-2017-18208 UBUNTU:USN-3619-1 UBUNTU:USN-3619-2 UBUNTU:USN-3653-1 UBUNTU:USN-3653-2 UBUNTU:USN-3655-1 UBUNTU:USN-3655-2 UBUNTU:USN-3657-1 bdo#1033297 bnc#1083494 rh#1243852 rh#1495089 rh#1498016 rh#1519780 rh#1539599 rh#1551565 rh#1596812 rh#1596842 rh#2061700 rh#2119127 |
CVE-2017-18216 | kernel-source-rt:Unsupported | moderate | 6.2 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | BID:103278 CVE-2017-18216 DSA-4187 DSA-4188 MISC:git.kernel.org:CVE-2017-18216 MISC:github.com:CVE-2017-18216 RH:CVE-2017-18216 SMASH Issue 201214 UBUNTU:CVE-2017-18216 UBUNTU:USN-3776-1 UBUNTU:USN-3776-2 bnc#1084058 rh#1551992 |
CVE-2017-18218 | kernel-source-rt:Not affected | moderate | 6.6 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H) | BID:103277 CVE-2017-18218 DEBIAN:DSA-4188 DSA-4188 MISC:git.kernel.org:CVE-2017-18218 MISC:github.com:CVE-2017-18218 RH:CVE-2017-18218 SMASH Issue 201235 UBUNTU:CVE-2017-18218 bnc#1084055 rh#1551985 |
CVE-2017-18221 | kernel-source-rt:Already fixed | moderate | 6.2 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | BID:103321 CVE-2017-18221 MISC:git.kernel.org:CVE-2017-18221 MISC:github.com:CVE-2017-18221 MISC:www.kernel.org:CVE-2017-18221 RH:CVE-2017-18221 SMASH Issue 201395 UBUNTU:CVE-2017-18221 bnc#1084323 rh#1498016 rh#1539599 rh#1552849 |
CVE-2017-18222 | kernel-source-rt:Not affected | important | 8.4 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | BID:103349 CVE-2017-18222 DSA-4188 MISC:git.kernel.org:CVE-2017-18222 MISC:github.com:CVE-2017-18222 RH:CVE-2017-18222 SMASH Issue 201458 UBUNTU:CVE-2017-18222 bnc#1084529 rh#1553371 |
CVE-2017-18232 | kernel-source-rt:Not affected | low | 3.1 (CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L) | BID:103423 CONFIRM:bugzilla.redhat.com:CVE-2018-10882 CVE-2017-18232 CVE-2018-10882 CVE-2018-13405 DEBIAN:DSA-4187 DSA-4187 MISC:git.kernel.org:CVE-2017-18232 MISC:github.com:CVE-2017-18232 RH:CVE-2017-18232 RHSA-2018:2948 RHSA-2018:3083 RHSA-2018:3096 SMASH Issue 201990 UBUNTU:CVE-2017-18232 bnc#1085413 rh#1558066 rh#1596842 rh#1599161 rh#2027239 rh#2044863 |
CVE-2017-18248 | dbus-1:Released | moderate | 6.5 (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:github.com:CVE-2017-18248 CVE-2017-18248 MISC:security.cucumberlinux.com:CVE-2017-18248 MLIST:[debian-lts-announce] 20180526 [SECURITY] [DLA 1387-1] cups security update RH:CVE-2017-18248 SMASH Issue 202702 UBUNTU:CVE-2017-18248 UBUNTU:USN-3713-1 bnc#1087018 bnc#1087072 rh#1561296 |
CVE-2017-18257 | kernel-source-rt:Already fixed | moderate | () | CVE-2017-18257 DSA-4188 MISC:git.kernel.org:CVE-2017-18257 MISC:git.kernel.org:OSS:2014/03/05/6 MISC:github.com:CVE-2017-18257 OSS:2014/03/05/6 OSS:2022/12/27/3 OSS:2022/Q4/244 RH:CVE-2017-18257 SMASH Issue 203136 UBUNTU:CVE-2017-18257 bnc#1088241 rh#1565455 |
CVE-2017-18270 | kernel-source-rt:Unsupported | moderate | 4.4 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L) | BID:104254 CONFIRM:git.kernel.org:CVE-2017-18270 CONFIRM:github.com:CVE-2017-18270 CONFIRM:support.f5.com:CVE-2017-18270 CONFIRM:www.kernel.org:CVE-2017-18270 CVE-2017-18270 MISC:bugzilla.redhat.com:CVE-2017-18270 RH:CVE-2017-18270 RHSA-2018:0412 RHSA-2018:1062 SMASH Issue 206151 UBUNTU:CVE-2017-18270 UBUNTU:USN-3754-1 bnc#1094186 rh#1580979 rh#1660385 rh#1856774 |
CVE-2017-18344 | kernel-source-rt:Not affected | important | 7.1 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N) | BID:104909 CONFIRM:bugzilla.redhat.com:CVE-2018-10877 CONFIRM:bugzilla.redhat.com:CVE-2018-10880 CONFIRM:bugzilla.redhat.com:CVE-2018-10882 CVE-2017-18344 CVE-2018-10877 CVE-2018-10880 CVE-2018-10882 CVE-2018-13405 EXPLOIT-DB:45175 L3:66852 MISC:bugs.launchpad.net:OSS:2018/Q3/76 MISC:cdn.kernel.org:CVE-2017-18344 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:CVE-2017-18344 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:OSS:2018/Q3/76 OSS:2018/Q3/76 OSS:2019/09/17/1 Oracle:CVE-2017-5753 Oracle:CVE-2018-3646 Oracle:CVE-2018-5390 Oracle:CVE-2019-11477 RH:CVE-2017-18344 RHSA-2018:2948 RHSA-2018:3083 RHSA-2018:3096 RHSA-2018:3459 RHSA-2018:3540 RHSA-2018:3586 RHSA-2018:3590 RHSA-2018:3591 SECTRACK:1041414 SMASH Issue 211759 SMASH Issue 211888 UBUNTU:CVE-2017-18344 UBUNTU:USN-3742-1 UBUNTU:USN-3742-2 bnc#1102851 bnc#1103203 bnc#1103580 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1573699 rh#1596795 rh#1596812 rh#1596842 rh#1599161 rh#1601704 rh#1609664 rh#1610958 rh#1703063 rh#2027239 rh#2044863 |
CVE-2017-18551 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N) | CONFIRM:support.f5.com:CVE-2017-18551 CVE-2017-18551 MISC:cdn.kernel.org:CVE-2017-18551 MISC:git.kernel.org:CVE-2017-18551 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 OSS:2019/09/17/1 Oracle:CVE-2018-12207 Oracle:CVE-2019-11477 Oracle:CVE-2019-14821 RH:CVE-2017-18551 RHSA-2020:2104 RHSA-2020:4060 RHSA-2020:4062 RHSA-2020:5206 RHSA-2020:5430 RHSA-2020:5656 SMASH Issue 240425 SUSE:openSUSE-SU-2019:2173 SUSE:openSUSE-SU-2019:2181 UBUNTU:CVE-2017-18551 bnc#1146163 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1731000 rh#1734243 rh#1734246 rh#1743547 rh#1746628 rh#1746732 rh#1757368 rh#1781514 |
CVE-2017-18552 | kernel-source-rt:Unsupported | important | () | CVE-2017-18552 MISC:git.kernel.org:CVE-2017-18552 RH:CVE-2017-18552 SMASH Issue 240426 UBUNTU:CVE-2017-18552 bnc#1146295 rh#1757358 |
CVE-2017-18595 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L) | CVE-2017-18595 MISC:cdn.kernel.org:CVE-2018-18386 MISC:git.kernel.org:CVE-2017-18595 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 Oracle:CVE-2018-12207 Oracle:CVE-2019-11477 Oracle:CVE-2019-14821 RH:CVE-2017-18595 RHSA-2020:2082 RHSA-2020:2085 RHSA-2020:2104 RHSA-2020:2214 RHSA-2020:2242 RHSA-2020:2277 RHSA-2020:2285 RHSA-2020:2289 RHSA-2020:2522 SMASH Issue 241746 SUSE:openSUSE-SU-2019:2307 SUSE:openSUSE-SU-2019:2308 UBUNTU:CVE-2017-18595 bnc#1149555 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1743547 rh#1746628 rh#1746732 rh#1757368 rh#1758671 rh#1773519 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1851480 rh#1997467 |
CVE-2017-2584 | kernel-source-rt:Not affected | moderate | () | BID:95430 CONFIRM:git.kernel.org:CVE-2017-2584 CVE-2017-2584 D:CVE-2017-2584 DSA-3791 MLIST:[oss-security] 20170113 CVE-2017-2584 Kernel: kvm: use after free in complete_emulated_mmio OSS:2017/Q1/82 Oracle:CVE-2017-6074 RH:CVE-2017-2584 RHSA-2017:1842 RHSA-2017:2077 SECTRACK:1037603 SMASH Issue 178657 UBUNTU:CVE-2017-2584 bnc#1019851 linux.git:commit:129a72a0d3c8e139a04512325384fe5ac119e74d linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1413001 rh#1435719 rh#1462147 rh#1462158 |
CVE-2017-2596 | kernel-source-rt:Already fixed | low | () | BID:95878 CVE-2017-2596 DSA-3791 MLIST:[oss-security] 20170131 CVE-2017-2596 Kernel: kvm: page reference leakage in handle_vmon OSS:2017/Q1/237 Oracle:CVE-2017-6074 RH:CVE-2017-2596 RHSA-2017:1842 RHSA-2017:2077 SMASH Issue 179618 UBUNTU:CVE-2017-2596 bnc#1022785 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1417812 rh#1435719 rh#1462147 rh#1462158 |
CVE-2017-2671 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | BID:97407 CONFIRM:git.kernel.org:CVE-2017-2671 CONFIRM:github.com:CVE-2017-2671 CVE-2017-2671 EXPLOIT-DB:42135 MISC:git.kernel.org:OSS:2020/Q1/69 MISC:github.com:CVE-2017-2671 MISC:twitter.com:CVE-2017-2671 MLIST:[oss-security] 20170404 Re: Linux kernel ping socket / AF_LLC connect() sin_family race OSS:2017/Q2/17 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 Oracle:CVE-2017-6074 RH:CVE-2017-2671 RHSA-2017:1842 RHSA-2017:2077 RHSA-2017:2669 RHSA-2018:1854 SMASH Issue 182286 UBUNTU:CVE-2017-2671 UBUNTU:USN-3754-1 bnc#1031003 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1420236 rh#1435719 rh#1436649 rh#1439087 rh#1462147 rh#1462158 rh#1481178 |
CVE-2017-5547 | kernel-source-rt:Unsupported | low | () | BID:95709 CONFIRM:git.kernel.org:CVE-2017-5547 CONFIRM:github.com:CVE-2017-5547 CONFIRM:www.kernel.org:CVE-2017-5551 CVE-2017-5547 MLIST:[oss-security] 20170120 Re: CVE REQUEST: linux kernel: process with pgid zero able to crash kernel OSS:2017/Q1/161 RH:CVE-2017-5547 SMASH Issue 178974 UBUNTU:CVE-2017-5547 bnc#1021252 rh#1416096 |
CVE-2017-5576 | kernel-source-rt:Already fixed | low | () | BID:95765 BID:95767 CONFIRM:git.kernel.org:CVE-2017-5576 CONFIRM:git.kernel.org:CVE-2017-5577 CONFIRM:github.com:CVE-2017-5576 CONFIRM:github.com:CVE-2017-5577 CONFIRM:www.kernel.org:CVE-2017-6001 CVE-2017-5576 CVE-2017-5577 D:CVE-2017-5576 D:CVE-2017-5577 MLIST:[linux-kernel] 20170118 [PATCH 1/2] drm/vc4: Fix an integer overflow in temporary allocation layout. MLIST:[linux-kernel] 20170118 [PATCH 2/2] drm/vc4: Return -EINVAL on the overflow checks failing. MLIST:[oss-security] 20170122 CVE request: Linux kernel: vc4: int overflow leading to heap-based buffer overflow OSS:2017/Q1/174 Oracle:CVE-2017-6074 RH:CVE-2017-5576 RH:CVE-2017-5577 SMASH Issue 178984 UBUNTU:CVE-2017-5576 UBUNTU:CVE-2017-5577 bnc#1021294 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1416436 rh#1416437 rh#1435719 rh#1462147 rh#1462158 |
CVE-2017-5577 | kernel-source-rt:Already fixed | low | () | BID:95765 BID:95767 CONFIRM:git.kernel.org:CVE-2017-5576 CONFIRM:git.kernel.org:CVE-2017-5577 CONFIRM:github.com:CVE-2017-5576 CONFIRM:github.com:CVE-2017-5577 CONFIRM:www.kernel.org:CVE-2017-6001 CVE-2017-5576 CVE-2017-5577 D:CVE-2017-5576 D:CVE-2017-5577 MLIST:[linux-kernel] 20170118 [PATCH 1/2] drm/vc4: Fix an integer overflow in temporary allocation layout. MLIST:[linux-kernel] 20170118 [PATCH 2/2] drm/vc4: Return -EINVAL on the overflow checks failing. MLIST:[oss-security] 20170122 CVE request: Linux kernel: vc4: int overflow leading to heap-based buffer overflow OSS:2017/Q1/174 Oracle:CVE-2017-6074 RH:CVE-2017-5576 RH:CVE-2017-5577 SMASH Issue 178984 UBUNTU:CVE-2017-5576 UBUNTU:CVE-2017-5577 bnc#1021294 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1416436 rh#1416437 rh#1435719 rh#1462147 rh#1462158 |
CVE-2017-5601 | libarchive:Released | moderate | 4.8 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L) | BID:95837 CVE-2017-5601 D:CVE-2017-5601 L3:61452 MISC:github.com:CVE-2017-5601 MISC:secunia.com RH:CVE-2017-5601 SECTRACK:1037974 SMASH Issue 179494 UBUNTU:CVE-2017-5601 bnc#1022528 bnc#1189528 jsc#CAR-1656 rh#1417912 |
CVE-2017-5618 | screen:Not affected | important | () | BID:95873 CONFIRM:git.savannah.gnu.org:CVE-2017-5618 CONFIRM:savannah.gnu.org:CVE-2017-5618 CVE-2017-5618 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MLIST:[oss-security] 20170129 Re: CVE request: GNU screen escalation MLIST:[screen-devel] 20170124 [bug #50142] root exploit 4.5.0 OSS:2017/Q1/224 RH:CVE-2017-5618 SMASH Issue 179086 SMASH Issue 179552 UBUNTU:CVE-2017-5618 bnc#1021743 oss-sec-2017-q1-181 rh#1416704 |
CVE-2017-5669 | kernel-source-rt:Not affected | moderate | () | BID:96754 CONFIRM:github.com:CVE-2017-5669 CVE-2017-5669 DSA-3804 MISC:bugzilla.kernel.org:CVE-2017-5669 MISC:git.kernel.org:OSS:2020/Q1/69 MISC:github.com:CVE-2017-5669 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 Oracle:CVE-2017-6074 RH:CVE-2017-5669 SECTRACK:1037918 SMASH Issue 180914 UBUNTU:CVE-2017-5669 UBUNTU:USN-3583-1 UBUNTU:USN-3583-2 bnc#1026914 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1420236 rh#1427239 rh#1435719 rh#1439087 rh#1462147 rh#1462158 rh#1481178 |
CVE-2017-5897 | kernel-source-rt:Not affected | moderate | 3.7 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N) | BID:96037 CONFIRM:git.kernel.org:CVE-2017-5897 CONFIRM:source.android.com:CVE-2017-6983 CVE-2017-5897 DSA-3791 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:MLIST:[oss-security] 20170207 Re: CVE Request: Linux: ip6_gre: invalid reads in ip6gre_err() MLIST:[oss-security] 20170207 Re: CVE Request: Linux: ip6_gre: invalid reads in ip6gre_err() OSS:2017/Q1/327 Oracle:CVE-2017-6074 RH:CVE-2017-5897 SECTRACK:1037794 SMASH Issue 179985 UBUNTU:CVE-2017-5897 UBUNTU:USN-3754-1 bnc#1023762 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1419848 rh#1420236 rh#1435719 rh#1462147 rh#1462158 |
CVE-2017-5932 | bash:Not affected | moderate | () | BID:96136 CONFIRM:git.savannah.gnu.org:CVE-2017-5932 CVE-2017-5932 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MLIST:[bug-bash] 20170120 Bash-4.4 Official Patch 7 MLIST:[oss-security] 20170207 Re: CVE Request - Code execution vulnerability in GNU/bash v4.4 autocompletion OSS:2017/Q1/338 RH:CVE-2017-5932 SMASH Issue 180048 UBUNTU:CVE-2017-5932 bnc#1024171 rh#1420674 |
CVE-2017-5967 | kernel-source-rt:Not affected | low | () | BID:96271 CONFIRM:git.kernel.org:CVE-2017-5967 CVE-2017-5967 D:CVE-2017-5967 MISC:bugzilla.kernel.org:CVE-2017-5967 RH:CVE-2017-5967 SMASH Issue 180515 UBUNTU:CVE-2017-5967 bnc#1025209 rh#1422138 |
CVE-2017-5970 | kernel-source-rt:Already fixed | important | () | BID:96233 CONFIRM:git.kernel.org:CVE-2017-5970 CONFIRM:github.com:CVE-2017-5970 CONFIRM:patchwork.ozlabs.org:CVE-2017-5970 CONFIRM:source.android.com:CVE-2017-6074 CVE-2017-5970 D:CVE-2017-5970 DSA-3791 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:git.kernel.org:OSS:2020/Q1/69 MLIST:[oss-security] 20170212 Fwd: [scr293903] Linux kernel - upstream OSS:2017/Q1/414 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 Oracle:CVE-2017-6074 RH:CVE-2017-5970 RHSA-2017:1842 RHSA-2017:2077 RHSA-2017:2669 SMASH Issue 180357 UBUNTU:CVE-2017-5970 bnc#1024938 bnc#1025013 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1420236 rh#1421638 rh#1435719 rh#1439087 rh#1462147 rh#1462158 rh#1481178 |
CVE-2017-5972 | kernel-source-rt:Not affected | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | BID:96231 CVE-2017-5972 D:CVE-2017-5972 EXPLOIT-DB:41350 MISC:access.redhat.com:CVE-2017-5972 MISC:cxsecurity.com:CVE-2017-5972 MISC:githubengineering.com:CVE-2017-5972 MISC:packetstormsecurity.com:CVE-2017-5972 MISC:security-tracker.debian.org:CVE-2017-5972 OSS:2017/Q1/573 RH:CVE-2017-5972 SMASH Issue 180516 UBUNTU:CVE-2017-5972 bnc#1026173 rh#1422081 rh#1428684 |
CVE-2017-6001 | kernel-source-rt:Not affected | moderate | () | BID:94679 BID:96264 CONFIRM:git.kernel.org:CVE-2016-6787 CONFIRM:git.kernel.org:CVE-2017-6001 CONFIRM:github.com:CVE-2016-6787 CONFIRM:github.com:CVE-2017-6001 CONFIRM:source.android.com:CVE-2016-9120 CONFIRM:source.android.com:CVE-2017-6001 CONFIRM:www.kernel.org:CVE-2017-6001 CVE-2016-6786 CVE-2016-6787 CVE-2017-6001 D:CVE-2016-6787 D:CVE-2017-6001 DSA-3791 MLIST:[oss-security] 20170216 Linux: CVE-2017-6001: Incomplete fix for CVE-2016-6786: perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race OSS:2017/Q1/446 RH:CVE-2016-6786 RH:CVE-2016-6787 RH:CVE-2017-6001 RHSA-2017:1842 RHSA-2017:2077 RHSA-2017:2669 RHSA-2018:1854 SMASH Issue 177440 SMASH Issue 177441 SMASH Issue 180623 UBUNTU:CVE-2016-6786 UBUNTU:CVE-2016-6787 UBUNTU:CVE-2017-6001 bnc#1015160 bnc#1025626 rh#1403842 rh#1422825 |
CVE-2017-6004 | pcre:Already fixed | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | BID:96295 CONFIRM:bugs.exim.org:CVE-2017-6004 CONFIRM:vcs.pcre.org:CVE-2017-6004 CVE-2017-6004 D:CVE-2017-6004 GENTOO:GLSA-201706-11 L3:61083 MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 RH:CVE-2017-6004 RHSA-2018:2486 SECTRACK:1037850 SMASH Issue 180627 UBUNTU:CVE-2017-6004 bnc#1025709 bnc#1187847 rh#1425365 |
CVE-2017-6074 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | BID:96310 CONFIRM:github.com:CVE-2017-6074 CONFIRM:source.android.com:CVE-2017-6074 CONFIRM:www.oracle.com:CVE-2018-3081 CONFIRM:www.tenable.com:CVE-2017-6074 CVE-2017-6074 D:CVE-2017-6074 DSA-3791 EXPLOIT-DB:41457 EXPLOIT-DB:41458 L3:47918 MISC:git.kernel.org:MLIST:[oss-security] 20170222 Linux kernel: CVE-2017-6074: DCCP double-free vulnerability (local root) MISC:git.kernel.org:OSS:2020/Q1/69 MISC:www.cve.mitre.org:MLIST:[oss-security] 20170222 Linux kernel: CVE-2017-6074: DCCP double-free vulnerability (local root) MLIST:[oss-security] 20170222 Linux kernel: CVE-2017-6074: DCCP double-free vulnerability (local root) OSS:2017/Q1/471 OSS:2017/Q3/182 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 Oracle:CVE-2017-6074 RH:CVE-2017-6074 RHSA-2017:0293 RHSA-2017:0294 RHSA-2017:0295 RHSA-2017:0316 RHSA-2017:0323 RHSA-2017:0324 RHSA-2017:0345 RHSA-2017:0346 RHSA-2017:0347 RHSA-2017:0365 RHSA-2017:0366 RHSA-2017:0403 RHSA-2017:0501 RHSA-2017:0932 RHSA-2017:1209 SECTRACK:1037876 SMASH Issue 180671 SMASH Issue 183334 UBUNTU:CVE-2017-6074 bnc#1026024 bnc#1033287 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1420236 rh#1423071 rh#1425406 rh#1435719 rh#1439087 rh#1462147 rh#1462158 rh#1481178 |
CVE-2017-6214 | kernel-source-rt:Already fixed | moderate | () | BID:96421 CONFIRM:git.kernel.org:CVE-2017-6214 CONFIRM:github.com:CVE-2017-6214 CONFIRM:source.android.com:CVE-2017-6983 CONFIRM:www.kernel.org:CVE-2017-6214 CVE-2017-6214 D:CVE-2017-6214 DSA-3804 MISC:git.kernel.org:OSS:2020/Q1/69 OSS:2017/Q1/491 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 Oracle:CVE-2017-6074 RH:CVE-2017-6214 RHSA-2017:1372 RHSA-2017:1615 RHSA-2017:1616 RHSA-2017:1647 SECTRACK:1037897 SMASH Issue 180876 UBUNTU:CVE-2017-6214 bnc#1026722 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1420236 rh#1426542 rh#1435719 rh#1439087 rh#1462147 rh#1462158 rh#1481178 |
CVE-2017-6345 | kernel-source-rt:Not affected | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | BID:96510 CONFIRM:git.kernel.org:CVE-2017-6345 CONFIRM:github.com:CVE-2017-6345 CONFIRM:www.kernel.org:CVE-2017-6348 CVE-2017-6345 D:CVE-2017-6345 DSA-3804 MLIST:[oss-security] 20170228 Linux: net/llc: avoid BUG_ON() in skb_orphan() (CVE-2017-6345) OSS:2017/Q1/527 Oracle:CVE-2017-6074 RH:CVE-2017-6345 SMASH Issue 180980 UBUNTU:CVE-2017-6345 bnc#1027190 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1420236 rh#1428485 rh#1435719 rh#1462147 rh#1462158 |
CVE-2017-6346 | kernel-source-rt:Already fixed | low | () | BID:96508 CONFIRM:git.kernel.org:CVE-2017-6346 CONFIRM:github.com:CVE-2017-6346 CONFIRM:source.android.com:CVE-2017-6983 CONFIRM:www.kernel.org:CVE-2017-6348 CVE-2017-6346 D:CVE-2017-6346 DSA-3804 MLIST:[oss-security] 20170228 Linux: packet: fix races in fanout_add() (CVE-2017-6346) OSS:2017/Q1/526 Oracle:CVE-2017-6074 RH:CVE-2017-6346 RHSA-2018:0151 RHSA-2018:0152 RHSA-2018:0181 SMASH Issue 180981 UBUNTU:CVE-2017-6346 bnc#1027189 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1420236 rh#1428487 rh#1435719 rh#1462147 rh#1462158 rh#1504574 |
CVE-2017-6347 | kernel-source-rt:Already fixed | low | () | BID:96487 CONFIRM:git.kernel.org:CVE-2017-6347 CONFIRM:github.com:CVE-2017-6347 CONFIRM:www.kernel.org:CVE-2017-6347 CVE-2017-6347 D:CVE-2017-6347 MISC:git.kernel.org:OSS:2020/Q1/69 MLIST:[oss-security] 20170228 Linux: ip: fix IP_CHECKSUM handling (CVE-2017-6347) OSS:2017/Q1/525 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 Oracle:CVE-2017-6074 RH:CVE-2017-6347 SMASH Issue 180982 UBUNTU:CVE-2017-6347 bnc#1027179 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1427984 rh#1435719 rh#1462147 rh#1462158 rh#1481178 |
CVE-2017-6348 | kernel-source-rt:Not affected | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | BID:96483 CONFIRM:git.kernel.org:CVE-2017-6348 CONFIRM:github.com:CVE-2017-6348 CONFIRM:www.kernel.org:CVE-2017-6348 CVE-2017-6348 D:CVE-2017-6348 DSA-3804 MISC:git.kernel.org:OSS:2020/Q1/69 MLIST:[oss-security] 20170228 Linux: irda: Fix lockdep annotations in hashbin_delete() (CVE-2017-6348) OSS:2017/Q1/524 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 Oracle:CVE-2017-6074 RH:CVE-2017-6348 SMASH Issue 180983 UBUNTU:CVE-2017-6348 UBUNTU:USN-3754-1 bnc#1027178 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1420236 rh#1428491 rh#1435719 rh#1439087 rh#1462147 rh#1462158 rh#1481178 |
CVE-2017-6353 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | BID:96473 CONFIRM:git.kernel.org:CVE-2017-6353 CONFIRM:github.com:CVE-2017-6353 CVE-2017-6353 D:CVE-2017-6353 DSA-3804 MISC:git.kernel.org:OSS:2020/Q1/69 MLIST:[oss-security] 20170227 Linux: CVE-2017-6353: sctp: deny peeloff operation on asocs with threads sleeping on it OSS:2017/Q1/518 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 Oracle:CVE-2017-6074 RH:CVE-2017-6353 SMASH Issue 180960 UBUNTU:CVE-2017-6353 bnc#1027066 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1420236 rh#1428907 rh#1435719 rh#1439087 rh#1462147 rh#1462158 rh#1481178 |
CVE-2017-6421 | kernel-source-rt:Analysis | moderate | () | CONFIRM:source.android.com:CVE-2017-6421 CVE-2017-6421 D:CVE-2017-6421 MISC:source.codeaurora.org:CVE-2017-6421 SECTRACK:1038623 SMASH Issue 190604 bnc#1054134 |
CVE-2017-7184 | kernel-source-rt:Already fixed | moderate | () | BID:97018 CONFIRM:git.kernel.org:CVE-2017-7184 CONFIRM:openwall.com:CVE-2017-7184 CONFIRM:source.android.com:CVE-2017-0635 CVE-2017-7184 D:CVE-2017-7184 MISC:blog.trendmicro.com:CVE-2017-7184 MISC:git.kernel.org:OSS:2020/Q1/69 MISC:twitter.com:CVE-2017-7184 MISC:www.eweek.com:CVE-2017-7184 OSS:2017/Q1/660 OSS:2017/Q1/689 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 Oracle:CVE-2017-6074 RH:CVE-2017-7184 RHSA-2017:2918 RHSA-2017:2930 RHSA-2017:2931 RHSA-2019:4159 SECTRACK:1038166 SMASH Issue 182021 UBUNTU:CVE-2017-7184 ZDI-17-240 bnc#1030573 linux.git:commit:677e806da4d916052585301785d847c3b3e6186a linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 linux.git:commit:f843ee6dd019bcece3e74e76ad9df0155655d0df rh#1435153 rh#1435719 rh#1439087 rh#1462147 rh#1462158 rh#1481178 |
CVE-2017-7186 | pcre:Not affected | moderate | () | BID:97030 CONFIRM:bugs.exim.org:CVE-2017-7186 CONFIRM:vcs.pcre.org:CVE-2017-7186 CVE-2017-7186 GENTOO:GLSA-201710-09 GENTOO:GLSA-201710-25 MISC:blogs.gentoo.org:CVE-2017-7186 OSS:2017/Q1/649 RH:CVE-2017-7186 RHSA-2018:2486 SMASH Issue 182023 UBUNTU:CVE-2017-7186 bnc#1030066 rh#1434504 |
CVE-2017-7187 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | BID:96989 CONFIRM:source.android.com:CVE-2017-11067 CVE-2017-7187 D:CVE-2017-7187 MISC:gist.github.com:CVE-2017-10962 MISC:gist.github.com:CVE-2017-7187 MISC:gist.github.com:CVE-2017-9615 MISC:git.kernel.org:CVE-2017-7187 MISC:git.kernel.org:OSS:2020/Q1/69 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 Oracle:CVE-2017-6074 RH:CVE-2017-7187 RHSA-2017:1842 RHSA-2017:2077 RHSA-2017:2669 SECTRACK:1038086 SMASH Issue 182037 UBUNTU:CVE-2017-7187 bnc#1030213 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1420236 rh#1434327 rh#1435719 rh#1439087 rh#1462147 rh#1462158 rh#1481178 |
CVE-2017-7261 | kernel-source-rt:Already fixed | moderate | () | BID:97096 CVE-2017-7261 D:CVE-2017-7261 MISC:git.kernel.org:OSS:2020/Q1/69 MISC:lists.freedesktop.org:CVE-2017-7261 MISC:marc.info:CVE-2017-7261 OSS:2017/Q1/684 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 Oracle:CVE-2017-6074 RH:CVE-2017-7261 SMASH Issue 182284 UBUNTU:CVE-2017-7261 bnc#1031052 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1420236 rh#1435719 rh#1439087 rh#1462147 rh#1462158 rh#1481178 |
CVE-2017-7273 | kernel-source-rt:Not affected | moderate | 4.6 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | BID:97190 CONFIRM:git.kernel.org:CVE-2017-7273 CONFIRM:github.com:CVE-2017-7273 CONFIRM:www.kernel.org:CVE-2017-7273 CVE-2017-7273 D:CVE-2017-7273 OSS:2018/09/18/4 RH:CVE-2017-7273 SMASH Issue 182331 UBUNTU:CVE-2017-7273 bnc#1031240 bnc#1066674 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1437435 rh#1575866 rh#1609664 rh#1660375 rh#1660385 rh#1667782 rh#1686136 rh#1701224 rh#1701842 rh#1890354 |
CVE-2017-7308 | kernel-source-rt:Already fixed | moderate | () | BID:97234 CONFIRM:patchwork.ozlabs.org:CVE-2017-7308 CONFIRM:source.android.com:CVE-2017-6074 CVE-2017-7308 D:CVE-2017-7308 EXPLOIT-DB:41994 EXPLOIT-DB:44654 MISC:git.kernel.org:OSS:2020/Q1/69 MISC:googleprojectzero.blogspot.com:CVE-2017-7308 MISC:www.cve.mitre.org OSS:2017/Q1/697 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 Oracle:CVE-2017-6074 RH:CVE-2017-7308 RHSA-2017:1297 RHSA-2017:1298 RHSA-2017:1308 RHSA-2018:1854 SMASH Issue 182439 UBUNTU:CVE-2017-7308 bnc#1031579 linux.git:commit:873d50d58f67ef15d2777b5e7f7a5268bb1fbae2 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1420236 rh#1435719 rh#1437404 rh#1439087 rh#1462147 rh#1462158 rh#1481178 |
CVE-2017-7346 | kernel-source-rt:Already fixed | moderate | () | BID:97257 CONFIRM:lists.freedesktop.org:CVE-2017-7346 CONFIRM:marc.info:CVE-2017-7346 CVE-2017-7346 D:CVE-2017-7346 DSA-3927 DSA-3945 OSS:2017/Q1/696 Oracle:CVE-2017-6074 RH:CVE-2017-7346 SMASH Issue 182500 UBUNTU:CVE-2017-7346 bnc#1031796 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1435719 rh#1437431 rh#1462147 rh#1462158 |
CVE-2017-7374 | kernel-source-rt:Already fixed | moderate | () | BID:97308 CONFIRM:git.kernel.org:CVE-2017-14991 CONFIRM:git.kernel.org:CVE-2017-7374 CONFIRM:github.com:CVE-2017-7374 CONFIRM:source.android.com:CVE-2017-14496 CONFIRM:www.kernel.org:CVE-2017-14991 CONFIRM:www.kernel.org:CVE-2017-7374 CVE-2017-7374 D:CVE-2017-7374 Oracle:CVE-2017-6074 RH:CVE-2017-7374 SMASH Issue 182571 UBUNTU:CVE-2017-7374 bnc#1032006 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1435719 rh#1438394 rh#1462147 rh#1462158 |
CVE-2017-7472 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | BID:98422 CONFIRM:bugzilla.novell.com:CVE-2017-7472 CONFIRM:git.kernel.org:CVE-2017-7472 CONFIRM:lkml.org:CVE-2017-7472 CONFIRM:openwall.com:CVE-2017-7472 CONFIRM:patchwork.ozlabs.org:CVE-2017-7487 CONFIRM:www.kernel.org:CVE-2017-7472 CVE-2017-7472 D:CVE-2017-7472 DSA-5378 EXPLOIT-DB:42136 MISC:git.kernel.org OSS:2017/Q2/246 OSS:2017/Q2/251 OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-17558 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2017-5754 RH:CVE-2017-7472 RHSA-2018:0151 RHSA-2018:0152 RHSA-2018:0181 SECTRACK:1038471 SMASH Issue 183784 SUSE:SUSE-SU-2018:0011 UBUNTU:CVE-2017-7472 bdo#1033297 bnc#1034862 linux.git:commit:c9f838d104fed6f2f61d68164712e3204bf5271b linux.git:commit:f205b5dc1c9e62237ac6e21642724d8cbc85f7ee linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1442086 rh#1447734 rh#1519780 rh#1609664 rh#1660375 rh#1660385 rh#1667782 rh#1686136 rh#1701224 rh#1701842 rh#2061700 rh#2119127 |
CVE-2017-7482 | kernel-source-rt:Not affected | moderate | 6.6 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H) | BID:99299 CONFIRM:bugzilla.redhat.com:CVE-2017-7482 CONFIRM:git.kernel.org:CVE-2017-7482 CVE-2017-7482 DEBIAN:DSA-3927 DEBIAN:DSA-3945 DSA-3927 DSA-3945 DSA-5378 MISC:git.kernel.org:OSS:2020/Q1/69 OSS:2017/Q2/602 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2017-5754 Oracle:CVE-2017-6074 RH:CVE-2017-7482 RHSA-2019:0641 SECTRACK:1038787 SMASH Issue 187296 UBUNTU:CVE-2017-7482 bdo#1033297 bnc#1046107 linux.git:commit:5f2f97656ada8d811d3c1bef503ced266fcd53a0 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1435719 rh#1439087 rh#1446288 rh#1462147 rh#1462158 rh#1481178 rh#1519780 rh#2061700 rh#2119127 |
CVE-2017-7495 | kernel-source-rt:Not affected | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) | BID:98491 CONFIRM:git.kernel.org:CVE-2017-7495 CONFIRM:github.com:CVE-2017-7495 CONFIRM:source.android.com:CVE-2017-6983 CONFIRM:www.kernel.org:CVE-2017-7495 CONFIRM:www.openwall.com CVE-2017-7495 MISC:git.kernel.org:CONFIRM:www.openwall.com OSS:2017/Q2/259 RH:CVE-2017-7495 RHSA-2017:1842 RHSA-2017:2077 RHSA-2017:2669 SMASH Issue 185285 UBUNTU:CVE-2017-7495 bnc#1039010 rh#1450261 |
CVE-2017-7518 | kernel-source-rt:Not affected | moderate | 5.3 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) | BID:99263 CONFIRM:access.redhat.com:CVE-2017-7518 CONFIRM:bugzilla.redhat.com:CVE-2017-7518 CVE-2017-7518 DEBIAN:DSA-3981 DSA-3981 MISC:git.kernel.org:OSS:2020/Q1/69 MISC:xenbits.xen.org:MLIST:[oss-security] 20170623 CVE-2017-7518 Kernel: KVM: debug exception via syscall emulation MLIST:[kvm] 20170622 [PATCH] KVM: x86: fix singlestepping over syscall MLIST:[oss-security] 20170623 CVE-2017-7518 Kernel: KVM: debug exception via syscall emulation OSS:2017/Q2/574 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 RH:CVE-2017-7518 RHSA-2018:0395 RHSA-2018:0412 SECTRACK:1038782 SMASH Issue 187258 UBUNTU:CVE-2017-7518 UBUNTU:USN-3619-1 UBUNTU:USN-3619-2 UBUNTU:USN-3754-1 bdo#866511 bdo#875881 bnc#1045922 linux.git:commit:c8401dda2f0a00cd25c0af6a95ed50e478d25de4 rh#1462147 rh#1462158 rh#1464473 rh#1481178 |
CVE-2017-7533 | kernel-source-rt:Already fixed | important | 7.4 (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | BID:100123 CONFIRM:source.android.com:CVE-2017-6276 CVE-2017-7533 DSA-3927 DSA-3945 MISC:git.kernel.org:CVE-2017-7533 MISC:git.kernel.org:MISC:www.openwall.com:OSS:2019/Q2/230 MISC:git.kernel.org:OSS:2020/Q1/69 MISC:github.com:CVE-2017-7533 MISC:openwall.com:CVE-2017-7533 MISC:patchwork.kernel.org:MISC:www.openwall.com:OSS:2019/Q2/230 MISC:www.mail-archive.com:/linux-kernel%40vger.kernel.org/msg1408967.html MISC:www.mail-archive.com:CVE-2017-7533 MISC:www.openwall.com:MLIST:[oss-security] 20190627 Re: linux-distros membership application - Microsoft MLIST:[oss-security] 20190627 Re: linux-distros membership application - Microsoft MLIST:[oss-security] 20190628 Re: linux-distros membership application - Microsoft OSS:2017/Q3/240 OSS:2017/Q4/269 OSS:2019/Q2/230 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 Oracle:CVE-2017-6074 RH:CVE-2017-7533 RHSA-2017:2473 RHSA-2017:2585 RHSA-2017:2669 RHSA-2017:2770 RHSA-2017:2869 SECTRACK:1039075 SMASH Issue 189178 UBUNTU:CVE-2017-7533 bnc#1049483 bnc#1050677 bnc#1050751 bnc#1102721 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1435719 rh#1439087 rh#1462147 rh#1462158 rh#1468283 rh#1481178 |
CVE-2017-7541 | kernel-source-rt:Already fixed | moderate | 6.2 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | BID:99955 CONFIRM:git.kernel.org:CVE-2017-7541 CONFIRM:github.com:CVE-2017-7541 CONFIRM:openwall.com:CVE-2017-7541 CONFIRM:source.android.com:CVE-2017-6264 CONFIRM:www.kernel.org:CVE-2017-7541 CONFIRM:www.spinics.net:CVE-2017-7541 CVE-2017-7541 D:CVE-2017-7541 DSA-3927 DSA-3945 MISC:git.kernel.org MISC:git.kernel.org:OSS:2020/Q1/69 OSS:2017/Q3/208 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 RH:CVE-2017-7541 RHSA-2017:2863 RHSA-2017:2918 RHSA-2017:2930 RHSA-2017:2931 SECTRACK:1038981 SMASH Issue 188815 UBUNTU:CVE-2017-7541 bnc#1049645 rh#1462147 rh#1462158 rh#1473198 rh#1481178 |
CVE-2017-7542 | kernel-source-rt:Not affected | moderate | 6.2 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | BID:99953 CONFIRM:git.kernel.org:CVE-2017-7542 CONFIRM:github.com:CVE-2017-7542 CONFIRM:help.ecostruxureit.com:CVE-2017-5754 CVE-2017-7542 D:CVE-2017-7542 DSA-3927 DSA-3945 MISC:git.kernel.org:OSS:2020/Q1/69 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 Oracle:CVE-2017-6074 RH:CVE-2017-7542 RHSA-2017:2918 RHSA-2017:2930 RHSA-2017:2931 RHSA-2018:0169 SMASH Issue 188934 UBUNTU:CVE-2017-7542 UBUNTU:USN-3583-1 UBUNTU:USN-3583-2 bnc#1049882 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1435719 rh#1439087 rh#1462147 rh#1462158 rh#1473649 rh#1481178 |
CVE-2017-7558 | kernel-source-rt:Unsupported | moderate | () | BID:100466 CONFIRM:bugzilla.redhat.com:CVE-2017-7558 CVE-2017-7558 DEBIAN:DSA-3981 DSA-3981 MLIST:[linux-netdev] 20170823 [PATCH net] sctp: Avoid out-of-bounds reads from address storage OSS:2017/Q3/338 RH:CVE-2017-7558 RHSA-2017:2918 RHSA-2017:2930 RHSA-2017:2931 SECTRACK:1039221 SMASH Issue 190912 UBUNTU:CVE-2017-7558 bdo#866511 bdo#875881 bnc#1055300 linux.git:commit:ee6c88bb754e3d363e568da78086adfedb692447 rh#1480266 |
CVE-2017-7616 | ltp:Released | low | 4 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) | BID:97527 CONFIRM:git.kernel.org:CVE-2017-7616 CONFIRM:github.com:CVE-2017-7616 CVE-2017-7616 MISC:git.kernel.org:OSS:2020/Q1/69 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 Oracle:CVE-2017-6074 RH:CVE-2017-7616 RHSA-2017:1842 RHSA-2017:2077 RHSA-2018:1854 SECTRACK:1038503 SMASH Issue 183348 UBUNTU:CVE-2017-7616 bnc#1033336 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1420236 rh#1435719 rh#1439087 rh#1441088 rh#1462147 rh#1462158 rh#1481178 |
CVE-2017-7889 | kernel-source-rt:Not affected | moderate | 5.9 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) | BID:97690 CVE-2017-7889 DSA-3945 MISC:git.kernel.org:CVE-2017-7889 MISC:git.kernel.org:MISC:www.openwall.com MISC:git.kernel.org:OSS:2020/Q1/69 MISC:github.com:CVE-2017-7889 MISC:www.openwall.com OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 RH:CVE-2017-7889 RHSA-2017:1842 RHSA-2017:2077 RHSA-2017:2669 RHSA-2018:1854 SMASH Issue 183720 UBUNTU:CVE-2017-7889 UBUNTU:USN-3583-1 UBUNTU:USN-3583-2 bnc#1034405 https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=b8f254aa17f720053054c4ecff3920973a83b9d6 rh#1444493 rh#1462147 rh#1462158 rh#1481178 |
CVE-2017-7895 | kernel-source-rt:Ignore | moderate | () | BID:98085 CONFIRM:git.kernel.org:CVE-2017-7895 CONFIRM:github.com:CVE-2017-12852 CONFIRM:github.com:CVE-2017-7895 CVE-2017-7895 D:CVE-2017-7895 DSA-3886 OSS:2017/Q2/196 RH:CVE-2017-7895 RHSA-2017:1615 RHSA-2017:1616 RHSA-2017:1647 RHSA-2017:1715 RHSA-2017:1723 RHSA-2017:1766 RHSA-2017:1798 RHSA-2017:2412 RHSA-2017:2428 RHSA-2017:2429 RHSA-2017:2472 RHSA-2017:2732 SMASH Issue 184482 UBUNTU:CVE-2017-7895 bnc#1036741 rh#1446103 |
CVE-2017-7979 | kernel-source-rt:Unsupported | moderate | () | BID:97969 CVE-2017-7979 D:CVE-2017-7979 MISC:bugs.launchpad.net:CVE-2017-7979 MISC:bugzilla.proxmox.com:CVE-2017-7979 MISC:marc.info:CVE-2017-7979 MISC:www.cve.mitre.org OSS:2017/Q2/98 RH:CVE-2017-7979 SMASH Issue 183859 UBUNTU:CVE-2017-7979 bnc#1035107 linux.git:commit:e0535ce58b92d7baf0b33284a6c4f8f0338f943e rh#1444501 |
CVE-2017-8061 | kernel-source-rt:Unsupported | low | () | BID:97972 CONFIRM:git.kernel.org:CVE-2017-8061 CONFIRM:github.com:CVE-2017-8061 CONFIRM:www.kernel.org:CVE-2017-8061 CVE-2017-8061 RH:CVE-2017-8061 SMASH Issue 184092 UBUNTU:CVE-2017-8061 bnc#1035693 rh#1445333 |
CVE-2017-8062 | kernel-source-rt:Unsupported | low | () | BID:97973 CONFIRM:git.kernel.org:CVE-2017-8062 CONFIRM:github.com:CVE-2017-8062 CONFIRM:www.kernel.org:CVE-2017-8925 CVE-2017-8062 MISC:www.openwall.com RH:CVE-2017-8062 SMASH Issue 184093 UBUNTU:CVE-2017-8062 bnc#1035691 rh#1445332 |
CVE-2017-8063 | kernel-source-rt:Unsupported | low | () | BID:97974 CONFIRM:git.kernel.org:CVE-2017-8063 CONFIRM:github.com:CVE-2017-8063 CONFIRM:www.kernel.org:CVE-2017-8067 CVE-2017-8063 MISC:www.openwall.com RH:CVE-2017-8063 SMASH Issue 184094 UBUNTU:CVE-2017-8063 bnc#1035689 rh#1445334 |
CVE-2017-8064 | kernel-source-rt:Unsupported | low | () | BID:97975 CONFIRM:git.kernel.org:CVE-2017-8064 CONFIRM:github.com:CVE-2017-8064 CONFIRM:www.kernel.org:CVE-2017-8067 CVE-2017-8064 DSA-3886 MISC:www.openwall.com RH:CVE-2017-8064 SMASH Issue 184095 UBUNTU:CVE-2017-8064 bnc#1035681 rh#1445336 |
CVE-2017-8066 | kernel-source-rt:Unsupported | low | () | BID:97992 CONFIRM:git.kernel.org:CVE-2017-8066 CONFIRM:github.com:CVE-2017-8066 CONFIRM:www.kernel.org:CVE-2017-8066 CVE-2017-8066 RH:CVE-2017-8066 SMASH Issue 184097 UBUNTU:CVE-2017-8066 bnc#1035672 rh#1445339 |
CVE-2017-8067 | kernel-source-rt:Unsupported | low | () | BID:97997 CONFIRM:git.kernel.org:CVE-2017-8067 CONFIRM:github.com:CVE-2017-8067 CONFIRM:www.kernel.org:CVE-2017-8067 CVE-2017-8067 MISC:www.openwall.com RH:CVE-2017-8067 SMASH Issue 184098 UBUNTU:CVE-2017-8067 bnc#1035670 rh#1445340 |
CVE-2017-8068 | kernel-source-rt:Unsupported | low | () | BID:98000 BID:98008 CONFIRM:git.kernel.org:CVE-2017-8068 CONFIRM:github.com:CVE-2017-8068 CVE-2017-8068 RH:CVE-2017-8068 SMASH Issue 184099 UBUNTU:CVE-2017-8068 bnc#1035669 rh#1445341 |
CVE-2017-8069 | kernel-source-rt:Unsupported | low | () | BID:38656 BID:68031 BID:76504 BID:91802 BID:92969 BID:95453 BID:96221 BID:96423 BID:97707 BID:99599 CONFIRM:asuswrt.lostrealm.ca:CVE-2017-6549 CONFIRM:framework.zend.com:CVE-2014-4914 CONFIRM:framework.zend.com:CVE-2016-6233 CONFIRM:git.kernel.org:CVE-2017-8069 CONFIRM:github.com:CVE-2013-7450 CONFIRM:github.com:CVE-2015-6521 CONFIRM:github.com:CVE-2015-6748 CONFIRM:github.com:CVE-2016-1505 CONFIRM:github.com:CVE-2016-3095 CONFIRM:github.com:CVE-2016-7405 CONFIRM:github.com:CVE-2017-8069 CONFIRM:hibernate.atlassian.net:CVE-2015-6748 CONFIRM:issues.jboss.org:CVE-2015-6748 CONFIRM:mantisbt.org:CVE-2017-7615 CONFIRM:pulp.plan.io:CVE-2016-3106 CONFIRM:www.atutor.ca:CVE-2017-1000004 CVE-2010-0971 CVE-2010-4179 CVE-2011-2683 CVE-2011-2684 CVE-2013-7450 CVE-2014-4914 CVE-2014-8603 CVE-2014-8604 CVE-2014-8605 CVE-2014-8606 CVE-2014-8607 CVE-2015-5192 CVE-2015-6521 CVE-2015-6748 CVE-2015-9228 CVE-2015-9230 CVE-2016-1505 CVE-2016-3095 CVE-2016-3106 CVE-2016-6233 CVE-2016-7405 CVE-2016-7904 CVE-2016-9121 CVE-2017-1000002 CVE-2017-1000003 CVE-2017-1000004 CVE-2017-10671 CVE-2017-11344 CVE-2017-11345 CVE-2017-11420 CVE-2017-14120 CVE-2017-14121 CVE-2017-14122 CVE-2017-14650 CVE-2017-5940 CVE-2017-6298 CVE-2017-6548 CVE-2017-7615 CVE-2017-8069 D:CVE-2016-1505 D:CVE-2016-7405 D:CVE-2016-7904 D:CVE-2017-11420 D:CVE-2017-5940 D:CVE-2017-7615 D:CVE-2017-8069 DEBIAN:DSA-3265 DEBIAN:DSA-4276 DSA-3265 DSA-3846 DSA-4276 EXPLOIT-DB:11685 EXPLOIT-DB:41573 EXPLOIT-DB:41890 FEDORA:FEDORA-2016-c5ec2c17e6 FEDORA:FEDORA-2016-f75bd73891 FEDORA:FEDORA-2019-7d7083b8be GENTOO:GLSA-201702-03 JVN:JVN#71730320 MISC:bierbaumer.net:CVE-2017-6548 MISC:bugs.launchpad.net:CVE-2011-2683 MISC:bugs.launchpad.net:CVE-2011-2684 MISC:bugs.launchpad.net:MISC:www.openwall.com MISC:build.opensuse.org:MISC:www.openwall.com MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:cxsecurity.com:CVE-2015-9230 MISC:cybersecurityworks.com:CVE-2015-9228 MISC:cybersecurityworks.com:CVE-2015-9230 MISC:dev.cmsmadesimple.org:CVE-2016-7904 MISC:firejail.wordpress.com:CVE-2017-5940 MISC:forum.ait-pro.com:CVE-2015-9230 MISC:framework.zend.com:MISC:www.openwall.com MISC:github.com:CVE-2015-9228 MISC:github.com:CVE-2015-9230 MISC:github.com:CVE-2016-9121 MISC:github.com:CVE-2017-10671 MISC:github.com:CVE-2017-5940 MISC:github.com:CVE-2017-6306 MISC:github.com:MISC:www.openwall.com MISC:github.com:MLIST:[oss-security] 20140613 Re: CVE Request: Horde_Ldap: Stricter parameter check in bind() to detect empty passwords MISC:github.com:MLIST:[oss-security] 20160907 ADOdb PDO driver: incorrect quoting may allow SQL injection MISC:hackerone.com:CVE-2016-9121 MISC:hyp3rlinx.altervista.org:CVE-2017-7615 MISC:marc.info MISC:marc.info:CVE-2017-14650 MISC:osvdb.org:MISC:www.openwall.com:CVE-2012-4519 MISC:packetstormsecurity.com:CVE-2015-9228 MISC:packetstormsecurity.com:CVE-2015-9230 MISC:packetstormsecurity.com:CVE-2017-7615 MISC:packetstormsecurity.org:CVE-2010-0971 MISC:raw.githubusercontent.com MISC:secunia.com:MISC:www.openwall.com:CVE-2012-4519 MISC:security-tracker.debian.org:CVE-2011-2684 MISC:wordpress.org:CVE-2015-9228 MISC:wpvulndb.com:CVE-2015-9228 MISC:wpvulndb.com:CVE-2015-9230 MISC:www.htbridge.com:CVE-2016-10400 MISC:www.openwall.com MISC:www.openwall.com:MISC:www.openwall.com:CVE-2012-4519 MISC:www.securelist.com:MISC:www.openwall.com:CVE-2012-4519 MISC:www.vapid.dhs.org:CVE-2014-8607 MISC:www.waraxe.us:MISC:www.openwall.com:CVE-2012-4519 MISC:www.x41-dsec.de:CVE-2017-6306 MLIST:[debian-lts-announce] 20200126 [SECURITY] [DLA 2075-1] jsoup security update MLIST:[oss-security] 20140711 Re: Zend Framework CVEs MLIST:[oss-security] 20150818 Re: CVE Request: ATutor LMS Version 2.2 with stored XSS and file upload issue MLIST:[oss-security] 20150828 Re: CVE request: XSS vulnerability in jsoup related to incomplete tags at EOF MLIST:[oss-security] 20160107 Re: CVE request for radicale MLIST:[oss-security] 20160418 CVE-2013-7450: Pulp < 2.3.0 distributed the same CA key to all users MLIST:[oss-security] 20160418 Re: CVE request - Pulp < 2.3.0 shipped the same authentication CA key/cert to all users MLIST:[oss-security] 20160519 Pulp 2.8.3 Released to address multiple CVEs MLIST:[oss-security] 20160907 ADOdb PDO driver: incorrect quoting may allow SQL injection MLIST:[oss-security] 20160915 Re: ADOdb PDO driver: incorrect quoting may allow SQL injection OSS:10592 OSS:2014/Q4/279 OSS:2015/Q3/391 OSS:2015/Q3/454 OSS:2016/Q1/41 OSS:2016/Q2/18 OSS:2016/Q2/379 OSS:2016/Q2/93 OSS:2016/Q2/99 OSS:2016/Q3/509 OSS:2016/Q3/520 OSS:2016/Q3/80 OSS:2017/Q1/100 OSS:2017/Q2/644 OSS:2017/Q2/74 OSS:2017/Q3/141 OSS:2017/Q3/142 OSS:2017/Q3/144 OSS:2017/Q3/145 OSS:2017/Q3/171 OSS:2017/Q3/176 OSS:2017/Q3/181 OSS:2017/Q3/492 OSVDB:62904 OSVDB:62905 OSVDB:62906 RH:CVE-2010-4179 RH:CVE-2013-7450 RH:CVE-2015-6748 RH:CVE-2016-3095 RH:CVE-2016-3106 RH:CVE-2017-8069 RHSA-2010:0921 RHSA-2010:0922 RHSA-2015:2559 RHSA-2015:2560 SECTRACK:1024806 SECUNIA:38906 SECUNIA:42406 SECUNIA:58847 SMASH Issue 103584 SMASH Issue 109061 SMASH Issue 117360 SMASH Issue 127616 SMASH Issue 127986 SMASH Issue 148627 SMASH Issue 160423 SMASH Issue 165409 SMASH Issue 168008 SMASH Issue 168020 SMASH Issue 171012 SMASH Issue 172651 SMASH Issue 178698 SMASH Issue 180301 SMASH Issue 180883 SMASH Issue 181456 SMASH Issue 182351 SMASH Issue 183717 SMASH Issue 184100 SMASH Issue 187572 SMASH Issue 188564 SMASH Issue 188671 SMASH Issue 191821 SMASH Issue 191869 SMASH Issue 192338 SMASH Issue 32225 SMASH Issue 66405 SMASH Issue 72309 SMASH Issue 72310 SMASH Issue 90310 SMASH Issue 90881 UBUNTU:CVE-2011-2683 UBUNTU:CVE-2011-2684 UBUNTU:CVE-2014-4914 UBUNTU:CVE-2015-6748 UBUNTU:CVE-2016-1505 UBUNTU:CVE-2016-6233 UBUNTU:CVE-2016-7405 UBUNTU:CVE-2016-9121 UBUNTU:CVE-2017-14650 UBUNTU:CVE-2017-5940 UBUNTU:CVE-2017-6298 UBUNTU:CVE-2017-7615 UBUNTU:CVE-2017-8069 VUPEN:ADV-2010-3091 XF:atutor-add-xss(56852) bdo#633870 bdo#743175 bdo#754201 bdo#865504 bdo#865505 bdo#876400 bnc#1034333 bnc#1035668 rh#1003326 rh#1117545 rh#1258310 rh#1322706 rh#1324926 rh#1328345 rh#1357552 rh#1376365 rh#1422813 rh#1442996 rh#1445343 rh#654856 |
CVE-2017-8070 | kernel-source-rt:Unsupported | low | () | BID:98011 CONFIRM:git.kernel.org:CVE-2017-8070 CONFIRM:github.com:CVE-2017-8070 CVE-2017-8070 D:CVE-2017-8070 RH:CVE-2017-8070 SMASH Issue 184101 UBUNTU:CVE-2017-8070 bnc#1035658 rh#1445328 |
CVE-2017-8106 | kernel-source-rt:Not affected | low | () | CVE-2017-8106 D:CVE-2017-8106 MISC:bugzilla.kernel.org:CVE-2017-8106 MISC:git.kernel.org:OSS:2020/Q1/69 MISC:launchpad.net:CVE-2017-8106 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 Oracle:CVE-2017-6074 RH:CVE-2017-8106 SMASH Issue 184352 UBUNTU:CVE-2017-8106 bnc#1035877 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1420236 rh#1435719 rh#1445828 rh#1462147 rh#1462158 rh#1481178 |
CVE-2017-8824 | kernel-source-rt:Not affected | important | 8.4 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | BID:102056 CONFIRM:help.ecostruxureit.com:CVE-2017-5754 CVE-2017-8824 D:CVE-2017-8824 DEBIAN:DSA-4073 DEBIAN:DSA-4082 DSA-4073 DSA-4082 DSA-5378 EXPLOIT-DB:43234 MISC:lists.openwall.net:CVE-2017-8824 MISC:www.cve.mitre.org:MISC:www.openwall.com:CVE-2017-8824 MISC:www.openwall.com:CVE-2017-8824 MLIST:[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update OSS:2017/Q4/350 OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-17558 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2017-5754 RH:CVE-2017-8824 RHSA-2018:0399 RHSA-2018:0676 RHSA-2018:1062 RHSA-2018:1130 RHSA-2018:1170 RHSA-2018:1216 RHSA-2018:1319 RHSA-2018:3822 SMASH Issue 196027 SMASH Issue 196137 SUSE:SUSE-SU-2018:0011 UBUNTU:CVE-2017-8824 UBUNTU:USN-3581-1 UBUNTU:USN-3581-2 UBUNTU:USN-3581-3 UBUNTU:USN-3582-1 UBUNTU:USN-3582-2 UBUNTU:USN-3583-1 UBUNTU:USN-3583-2 bdo#1033297 bnc#1070771 bnc#1076734 linux.git:commit:67f93df79aeefc3add4e4b31a752600f834236e2 linux.git:commit:69c64866ce072dea1d1e59a0d61e0f66c0dffb76 rh#1519591 rh#1519780 rh#2061700 rh#2119127 |
CVE-2017-8890 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | BID:98562 BID:98583 BID:98586 BID:98597 CONFIRM:git.kernel.org:CVE-2017-8890 CONFIRM:git.kernel.org:CVE-2017-9075 CONFIRM:git.kernel.org:CVE-2017-9077 CONFIRM:github.com:CVE-2017-8890 CONFIRM:github.com:CVE-2017-9075 CONFIRM:github.com:CVE-2017-9077 CONFIRM:patchwork.ozlabs.org:CVE-2017-9075 CONFIRM:patchwork.ozlabs.org:CVE-2017-9077 CONFIRM:source.android.com:CVE-2017-14496 CONFIRM:source.android.com:CVE-2017-6264 CONFIRM:source.android.com:CVE-2017-6983 CVE-2017-8890 CVE-2017-9075 CVE-2017-9076 CVE-2017-9077 D:CVE-2017-8890 D:CVE-2017-9077 DSA-3886 MISC:git.kernel.org MISC:git.kernel.org:OSS:2020/Q1/69 OSS:2017/Q2/366 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 Oracle:CVE-2017-6074 RH:CVE-2017-8890 RH:CVE-2017-9075 RH:CVE-2017-9076 RH:CVE-2017-9077 RHSA-2017:1842 RHSA-2017:2077 RHSA-2017:2669 RHSA-2018:1854 SMASH Issue 185028 SMASH Issue 185510 SMASH Issue 185511 SMASH Issue 185538 UBUNTU:CVE-2017-8890 UBUNTU:CVE-2017-9075 UBUNTU:CVE-2017-9076 UBUNTU:CVE-2017-9077 bnc#1038544 bnc#1038564 bnc#1039883 bnc#1039885 bnc#1040069 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1435719 rh#1439087 rh#1450972 rh#1452688 rh#1452691 rh#1452744 rh#1462147 rh#1462158 rh#1481178 |
CVE-2017-9075 | kernel-source-rt:Not affected | important | 5.5 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | BID:98562 BID:98583 BID:98586 BID:98597 CONFIRM:git.kernel.org:CVE-2017-8890 CONFIRM:git.kernel.org:CVE-2017-9075 CONFIRM:git.kernel.org:CVE-2017-9077 CONFIRM:github.com:CVE-2017-8890 CONFIRM:github.com:CVE-2017-9075 CONFIRM:github.com:CVE-2017-9077 CONFIRM:patchwork.ozlabs.org:CVE-2017-9075 CONFIRM:patchwork.ozlabs.org:CVE-2017-9077 CONFIRM:source.android.com:CVE-2017-14496 CONFIRM:source.android.com:CVE-2017-6264 CONFIRM:source.android.com:CVE-2017-6983 CVE-2017-8890 CVE-2017-9075 CVE-2017-9076 CVE-2017-9077 D:CVE-2017-8890 D:CVE-2017-9077 DSA-3886 MISC:git.kernel.org MISC:git.kernel.org:OSS:2020/Q1/69 OSS:2017/Q2/366 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 Oracle:CVE-2017-6074 RH:CVE-2017-8890 RH:CVE-2017-9075 RH:CVE-2017-9076 RH:CVE-2017-9077 RHSA-2017:1842 RHSA-2017:2077 RHSA-2017:2669 RHSA-2018:1854 SMASH Issue 185028 SMASH Issue 185510 SMASH Issue 185511 SMASH Issue 185538 UBUNTU:CVE-2017-8890 UBUNTU:CVE-2017-9075 UBUNTU:CVE-2017-9076 UBUNTU:CVE-2017-9077 bnc#1038544 bnc#1038564 bnc#1039883 bnc#1039885 bnc#1040069 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1435719 rh#1439087 rh#1450972 rh#1452688 rh#1452691 rh#1452744 rh#1462147 rh#1462158 rh#1481178 |
CVE-2017-9076 | kernel-source-rt:Not affected | important | 6.2 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | BID:98562 BID:98583 BID:98586 BID:98597 CONFIRM:git.kernel.org:CVE-2017-8890 CONFIRM:git.kernel.org:CVE-2017-9075 CONFIRM:git.kernel.org:CVE-2017-9077 CONFIRM:github.com:CVE-2017-8890 CONFIRM:github.com:CVE-2017-9075 CONFIRM:github.com:CVE-2017-9077 CONFIRM:patchwork.ozlabs.org:CVE-2017-9075 CONFIRM:patchwork.ozlabs.org:CVE-2017-9077 CONFIRM:source.android.com:CVE-2017-14496 CONFIRM:source.android.com:CVE-2017-6264 CONFIRM:source.android.com:CVE-2017-6983 CVE-2017-8890 CVE-2017-9075 CVE-2017-9076 CVE-2017-9077 D:CVE-2017-8890 D:CVE-2017-9077 DSA-3886 MISC:git.kernel.org MISC:git.kernel.org:OSS:2020/Q1/69 OSS:2017/Q2/366 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 Oracle:CVE-2017-6074 RH:CVE-2017-8890 RH:CVE-2017-9075 RH:CVE-2017-9076 RH:CVE-2017-9077 RHSA-2017:1842 RHSA-2017:2077 RHSA-2017:2669 RHSA-2018:1854 SMASH Issue 185028 SMASH Issue 185510 SMASH Issue 185511 SMASH Issue 185538 UBUNTU:CVE-2017-8890 UBUNTU:CVE-2017-9075 UBUNTU:CVE-2017-9076 UBUNTU:CVE-2017-9077 bnc#1038544 bnc#1038564 bnc#1039883 bnc#1039885 bnc#1040069 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1435719 rh#1439087 rh#1450972 rh#1452688 rh#1452691 rh#1452744 rh#1462147 rh#1462158 rh#1481178 |
CVE-2017-9077 | kernel-source-rt:Not affected | important | 5.5 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | BID:98562 BID:98583 BID:98586 BID:98597 CONFIRM:git.kernel.org:CVE-2017-8890 CONFIRM:git.kernel.org:CVE-2017-9075 CONFIRM:git.kernel.org:CVE-2017-9077 CONFIRM:github.com:CVE-2017-8890 CONFIRM:github.com:CVE-2017-9075 CONFIRM:github.com:CVE-2017-9077 CONFIRM:patchwork.ozlabs.org:CVE-2017-9075 CONFIRM:patchwork.ozlabs.org:CVE-2017-9077 CONFIRM:source.android.com:CVE-2017-14496 CONFIRM:source.android.com:CVE-2017-6264 CONFIRM:source.android.com:CVE-2017-6983 CVE-2017-8890 CVE-2017-9075 CVE-2017-9076 CVE-2017-9077 D:CVE-2017-8890 D:CVE-2017-9077 DSA-3886 MISC:git.kernel.org MISC:git.kernel.org:OSS:2020/Q1/69 OSS:2017/Q2/366 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 Oracle:CVE-2017-6074 RH:CVE-2017-8890 RH:CVE-2017-9075 RH:CVE-2017-9076 RH:CVE-2017-9077 RHSA-2017:1842 RHSA-2017:2077 RHSA-2017:2669 RHSA-2018:1854 SMASH Issue 185028 SMASH Issue 185510 SMASH Issue 185511 SMASH Issue 185538 UBUNTU:CVE-2017-8890 UBUNTU:CVE-2017-9075 UBUNTU:CVE-2017-9076 UBUNTU:CVE-2017-9077 bnc#1038544 bnc#1038564 bnc#1039883 bnc#1039885 bnc#1040069 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1435719 rh#1439087 rh#1450972 rh#1452688 rh#1452691 rh#1452744 rh#1462147 rh#1462158 rh#1481178 |
CVE-2017-9242 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | BID:98731 CONFIRM:git.kernel.org:CVE-2017-9242 CONFIRM:github.com:CVE-2017-9242 CONFIRM:patchwork.ozlabs.org:CVE-2017-9242 CVE-2017-9242 D:CVE-2017-9242 DSA-3886 MISC:git.kernel.org MISC:git.kernel.org:OSS:2020/Q1/69 OSS:2017/Q2/367 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 Oracle:CVE-2017-6074 RH:CVE-2017-9242 RHSA-2017:1842 RHSA-2017:2077 SMASH Issue 185978 UBUNTU:CVE-2017-9242 bnc#1041431 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1435719 rh#1439087 rh#1456388 rh#1462147 rh#1462158 rh#1481178 |
CVE-2017-9271 | libzypp:Released | moderate | 4 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) | CONFIRM:www.suse.com:CVE-2017-9271 CVE-2017-9271 SMASH Issue 189174 bnc#1050625 rh#1922189 |
CVE-2017-9614 | kernel-source-rt:Not affected | important | () | BID:99928 CONFIRM:source.android.com:CVE-2017-6001 CVE-2017-11600 CVE-2017-9614 D:CVE-2017-9614 DSA-3981 DSA-5378 EXPLOIT-DB:42391 MISC:github.com:CVE-2017-9614 MISC:packetstormsecurity.com:CVE-2017-9614 MISC:seclists.org:CVE-2017-11600 MISC:seclists.org:CVE-2017-9614 OSS:2017/Q3/526 OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-17558 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2017-5754 Oracle:CVE-2018-3646 RH:CVE-2017-11600 RH:CVE-2017-9614 RHSA-2018:1965 RHSA-2018:2003 RHSA-2019:1170 RHSA-2019:1190 SMASH Issue 189055 SMASH Issue 207615 SUSE:SUSE-SU-2018:0011 UBUNTU:CVE-2017-11600 UBUNTU:CVE-2017-9614 bdo#1033297 bdo#866511 bdo#875881 bnc#1050231 bnc#1096564 linux.git:commit:7bab09631c2a303f87a7eb7e3d69e888673b9b7e rh#1474928 rh#1475742 rh#1519780 rh#2061700 rh#2119127 |
CVE-2017-9778 | gdb:Already fixed | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | BID:99244 CONFIRM:sourceware.org:CVE-2017-9778 CVE-2017-9778 D:CVE-2017-9778 RH:CVE-2017-9778 SMASH Issue 187147 UBUNTU:CVE-2017-9778 bnc#1188512 rh#1466255 |
CVE-2017-9986 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | BID:99336 CVE-2017-9986 D:CVE-2017-9986 MISC:bugzilla.kernel.org:CVE-2017-9986 RH:CVE-2017-9986 SMASH Issue 187398 UBUNTU:CVE-2017-9986 bnc#1046600 rh#1470211 |
CVE-2018-0495 | libgcrypt:Already fixed | moderate | 5.1 (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N) | CVE-2018-0495 CVE-2018-12433 CVE-2018-12434 CVE-2018-12436 CVE-2018-12437 CVE-2018-12438 CVE-2018-12439 CVE-2018-12440 CVE-2018-14679 CVE-2018-14680 CVE-2018-14681 CVE-2018-14682 D:CVE-2018-14679 D:CVE-2018-14680 D:CVE-2018-14681 D:CVE-2018-14682 DEBIAN:DSA-4231 DEBIAN:DSA-4260 DSA-4231 MISC:dev.gnupg.org:CVE-2018-0495 MISC:ftp.openbsd.org:CVE-2018-12434 MISC:git.gnupg.org:CVE-2018-0495 MISC:github.com:CVE-2018-12436 MISC:github.com:CVE-2018-14680 MISC:github.com:CVE-2018-14681 MISC:github.com:CVE-2018-14682 MISC:lists.gnupg.org:CVE-2018-0495 MISC:www.nccgroup.trust:CVE-2018-12440 MISC:www.openwall.com:CVE-2018-14679 MISC:www.oracle.com:CVE-2014-0107 MISC:www.wolfssl.com:CVE-2018-12436 MLIST:[debian-lts-announce] 20180629 [SECURITY] [DLA 1405-1] libgcrypt20 security update MLIST:[debian-lts-announce] 20180806 [SECURITY] [DLA-1460-1] libmspack security update OSS:2018/Q3/65 Oracle:CVE-2018-0495 Oracle:CVE-2018-12404 RH:CVE-2018-0495 RHBA-2020:0547 RHSA-2018:3221 RHSA-2018:3327 RHSA-2018:3505 RHSA-2019:1296 RHSA-2019:1297 RHSA-2019:1543 RHSA-2019:2237 RHSA-2020:1267 RHSA-2020:1345 RHSA-2020:1461 SECTRACK:1041144 SECTRACK:1041147 SECTRACK:1041410 SMASH Issue 208024 SMASH Issue 211812 SMASH Issue 211813 SMASH Issue 211814 SMASH Issue 211815 SMASH Issue 211816 SMASH Issue 218353 SMASH Issue 218444 SMASH Issue 218773 UBUNTU:CVE-2018-0495 UBUNTU:CVE-2018-14679 UBUNTU:CVE-2018-14680 UBUNTU:CVE-2018-14681 UBUNTU:CVE-2018-14682 UBUNTU:USN-3689-1 UBUNTU:USN-3689-2 UBUNTU:USN-3692-1 UBUNTU:USN-3692-2 UBUNTU:USN-3728-1 UBUNTU:USN-3728-2 UBUNTU:USN-3728-3 USN-3850-1 USN-3850-2 bdo#904799 bdo#904800 bdo#904801 bdo#904802 bnc#1097410 bnc#1102922 bnc#1103032 rh#1591163 rh#1610890 rh#1610896 rh#1610934 rh#1610941 |
CVE-2018-1000031 | unzip:Not affected | important | () | CVE-2018-1000031 MISC:sec-consult.com:CVE-2018-1000035 OSS:2018/Q1/134 RH:CVE-2018-1000031 SMASH Issue 199642 UBUNTU:CVE-2018-1000031 bnc#1080075 rh#1537059 |
CVE-2018-1000500 | busybox:Released | important | 7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) | CONFIRM:git.busybox.net:CVE-2018-1000500 CVE-2018-1000500 MISC:git.busybox.net:CVE-2018-1000500 MISC:lists.busybox.net:CVE-2018-1000500 RH:CVE-2018-1000500 SMASH Issue 208921 UBUNTU:CVE-2018-1000500 USN-4531-1 bnc#1099263 rh#1595611 |
CVE-2018-1000517 | busybox:Released | important | 5.6 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L) | CVE-2018-1000517 MISC:git.busybox.net:CVE-2018-1000517 MLIST:[debian-lts-announce] 20180727 [SECURITY] [DLA 1445-1] busybox security update MLIST:[debian-lts-announce] 20210215 [SECURITY] [DLA 2559-1] busybox security update RH:CVE-2018-1000517 SMASH Issue 208938 UBUNTU:CVE-2018-1000517 USN-3935-1 bnc#1099260 rh#1595595 |
CVE-2018-10021 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | BID:103356 BID:106503 BID:99619 CONFIRM:bugzilla.kernel.org:CVE-2018-10876 CONFIRM:bugzilla.kernel.org:CVE-2018-10880 CONFIRM:bugzilla.kernel.org:CVE-2018-10882 CONFIRM:bugzilla.redhat.com:CVE-2018-10853 CONFIRM:bugzilla.redhat.com:CVE-2018-10877 CONFIRM:bugzilla.redhat.com:CVE-2018-10880 CONFIRM:bugzilla.redhat.com:CVE-2018-10882 CONFIRM:git.kernel.org:CVE-2018-10853 CONFIRM:git.kernel.org:CVE-2018-10876 CONFIRM:git.kernel.org:CVE-2018-10880 CONFIRM:git.kernel.org:CVE-2018-10882 CONFIRM:github.com:CVE-2017-8831 CONFIRM:github.com:CVE-2018-1000204 CONFIRM:patchwork.ozlabs.org:CVE-2018-10876 CONFIRM:patchwork.ozlabs.org:CVE-2018-10880 CVE-2017-8813 CVE-2017-8831 CVE-2018-1000204 CVE-2018-10021 CVE-2018-10853 CVE-2018-10877 CVE-2018-10880 CVE-2018-10882 CVE-2018-13405 CVE-2018-7995 D:CVE-2017-8831 DEBIAN:DSA-4187 DEBIAN:DSA-4188 DEBIAN:DSA-4266 EXPLOIT-DB:45033 MISC:bugzilla.kernel.org:CVE-2017-8831 MISC:git.kernel.org:CVE-2018-10021 MISC:git.kernel.org:CVE-2018-13405 MISC:git.kernel.org:CVE-2018-7995 MISC:git.kernel.org:OSS:2020/Q1/69 MISC:github.com:CVE-2018-10021 MISC:github.com:CVE-2018-13405 MISC:lkml.org:CVE-2018-7995 MISC:openwall.com:CVE-2018-13405 MISC:twitter.com:CVE-2018-13405 MISC:www.openwall.com:CVE-2018-10853 MISC:www.securityfocus.com:CVE-2017-8831 MLIST:[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update MLIST:[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update MLIST:[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update MLIST:[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package MLIST:[debian-lts-announce] 20180815 [SECURITY] [DLA 1466-1] linux-4.9 security update OSS:2018/09/18/4 OSS:2018/09/25/4 OSS:2018/Q3/208 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 Oracle:CVE-2017-5753 Oracle:CVE-2017-6074 Oracle:CVE-2018-3646 Oracle:CVE-2018-5390 RH:CVE-2017-8831 RH:CVE-2018-10021 RH:CVE-2018-10853 RH:CVE-2018-12232 RHSA-2018:2948 RHSA-2018:3083 RHSA-2018:3096 RHSA-2019:2029 RHSA-2019:2043 RHSA-2020:0036 RHSA-2020:0103 RHSA-2020:0179 SMASH Issue 184883 SMASH Issue 200662 SMASH Issue 203774 SMASH Issue 207826 SMASH Issue 207855 SMASH Issue 207865 SUSE:openSUSE-SU-2019:1407 UBUNTU:CVE-2017-8831 UBUNTU:CVE-2018-10021 UBUNTU:CVE-2018-10853 UBUNTU:CVE-2018-12232 UBUNTU:CVE-2018-7995 UBUNTU:USN-3654-1 UBUNTU:USN-3654-2 UBUNTU:USN-3656-1 UBUNTU:USN-3678-1 UBUNTU:USN-3678-2 UBUNTU:USN-3678-3 UBUNTU:USN-3678-4 UBUNTU:USN-3696-1 UBUNTU:USN-3696-2 UBUNTU:USN-3752-1 UBUNTU:USN-3752-2 UBUNTU:USN-3752-3 UBUNTU:USN-3753-1 UBUNTU:USN-3753-2 UBUNTU:USN-3754-1 UBUNTU:USN-3777-1 UBUNTU:USN-3777-2 UBUNTU:USN-3821-1 UBUNTU:USN-3821-2 bnc#1037994 bnc#1084755 bnc#1089281 bnc#1097104 bnc#1097108 bnc#1097593 http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=318aaf34f1179b39fa9c30fa0f3288b645beee39 linux.git:commit:3c9fa24ca7c9c47605672916491f79e8ccacb9e6 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1435719 rh#1449980 rh#1462147 rh#1462158 rh#1481178 rh#1553911 rh#1566407 rh#1589324 rh#1589890 rh#1590215 rh#1596812 rh#1596842 rh#1599161 rh#1601704 rh#1609664 rh#1619846 rh#1660375 rh#1660385 rh#1667782 rh#1701224 rh#1701842 rh#2027239 rh#2044863 |
CVE-2018-10124 | ltp:Released | low | 4 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | CVE-2018-10124 DSA-5378 MISC:git.kernel.org:CVE-2018-10124 MISC:git.kernel.org:OSS:2014/03/05/6 MISC:github.com:CVE-2018-10124 OSS:2014/03/05/6 OSS:2022/11/10/2 OSS:2022/12/27/3 OSS:2022/Q4/132 OSS:2022/Q4/135 OSS:2022/Q4/244 Oracle:CVE-2017-0861 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2018-3639 RH:CVE-2018-10124 SECTRACK:1040684 SMASH Issue 204053 UBUNTU:CVE-2018-10124 bdo#1033297 bnc#1089752 rh#1243852 rh#1495089 rh#1519780 rh#1527393 rh#1568205 rh#1573699 rh#1575472 rh#1599161 rh#2027239 rh#2044863 rh#2061700 rh#2119127 |
CVE-2018-10322 | kernel-source-rt:Not affected | moderate | 4.6 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | BID:103960 CVE-2018-10322 MISC:bugzilla.kernel.org:CVE-2018-10322 MISC:www.spinics.net:CVE-2018-10322 RH:CVE-2018-10322 RHSA-2018:2948 RHSA-2018:3083 RHSA-2018:3096 SMASH Issue 204778 UBUNTU:CVE-2018-10322 USN-4578-1 USN-4579-1 bnc#1090749 rh#1571623 |
CVE-2018-1065 | kernel-source-rt:Not affected | moderate | 5.9 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:bugzilla.redhat.com:CVE-2018-10880 CONFIRM:bugzilla.redhat.com:CVE-2018-10882 CVE-2018-1065 CVE-2018-10880 CVE-2018-10882 CVE-2018-13405 DEBIAN:DSA-4188 DSA-4188 MISC:git.kernel.org:CVE-2018-1065 MISC:git.kernel.org:OSS:2014/03/05/6 MISC:github.com:CVE-2018-1065 MISC:lists.openwall.net:CVE-2018-1065 MISC:patchwork.ozlabs.org:CVE-2018-1065 OSS:2014/03/05/6 OSS:2018/Q1/212 OSS:2022/12/27/3 OSS:2022/Q4/244 Oracle:CVE-2018-3639 RH:CVE-2018-1065 RHSA-2018:2948 RHSA-2018:3083 RHSA-2018:3096 SECTRACK:1040446 SMASH Issue 201087 UBUNTU:CVE-2018-1065 UBUNTU:USN-3654-1 UBUNTU:USN-3654-2 UBUNTU:USN-3656-1 bnc#1083650 rh#1527393 rh#1547824 rh#1596812 rh#1596842 rh#1599161 rh#2027239 rh#2044863 |
CVE-2018-10853 | kernel-source-rt:Not affected | important | 8.4 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | BID:103356 BID:106503 CONFIRM:bugzilla.kernel.org:CVE-2018-10876 CONFIRM:bugzilla.kernel.org:CVE-2018-10880 CONFIRM:bugzilla.kernel.org:CVE-2018-10882 CONFIRM:bugzilla.redhat.com:CVE-2018-10853 CONFIRM:bugzilla.redhat.com:CVE-2018-10877 CONFIRM:bugzilla.redhat.com:CVE-2018-10880 CONFIRM:bugzilla.redhat.com:CVE-2018-10882 CONFIRM:git.kernel.org:CVE-2018-10853 CONFIRM:git.kernel.org:CVE-2018-10876 CONFIRM:git.kernel.org:CVE-2018-10880 CONFIRM:git.kernel.org:CVE-2018-10882 CONFIRM:patchwork.ozlabs.org:CVE-2018-10876 CONFIRM:patchwork.ozlabs.org:CVE-2018-10880 CVE-2018-10021 CVE-2018-10853 CVE-2018-10877 CVE-2018-10880 CVE-2018-10882 CVE-2018-13405 CVE-2018-7995 DEBIAN:DSA-4187 DEBIAN:DSA-4188 DEBIAN:DSA-4266 EXPLOIT-DB:45033 MISC:git.kernel.org:CVE-2018-10021 MISC:git.kernel.org:CVE-2018-13405 MISC:git.kernel.org:CVE-2018-7995 MISC:github.com:CVE-2018-10021 MISC:github.com:CVE-2018-13405 MISC:lkml.org:CVE-2018-7995 MISC:openwall.com:CVE-2018-13405 MISC:twitter.com:CVE-2018-13405 MISC:www.openwall.com:CVE-2018-10853 MLIST:[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update MLIST:[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update MLIST:[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update MLIST:[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package MLIST:[debian-lts-announce] 20180815 [SECURITY] [DLA 1466-1] linux-4.9 security update OSS:2018/09/18/4 OSS:2018/09/25/4 OSS:2018/Q3/208 Oracle:CVE-2018-3646 Oracle:CVE-2018-5390 RH:CVE-2018-10021 RH:CVE-2018-10853 RHSA-2018:2948 RHSA-2018:3083 RHSA-2018:3096 RHSA-2019:2029 RHSA-2019:2043 RHSA-2020:0036 RHSA-2020:0103 RHSA-2020:0179 SMASH Issue 207826 SMASH Issue 207855 SUSE:openSUSE-SU-2019:1407 UBUNTU:CVE-2018-10021 UBUNTU:CVE-2018-10853 UBUNTU:CVE-2018-7995 UBUNTU:USN-3654-1 UBUNTU:USN-3654-2 UBUNTU:USN-3656-1 UBUNTU:USN-3678-1 UBUNTU:USN-3678-2 UBUNTU:USN-3678-3 UBUNTU:USN-3678-4 UBUNTU:USN-3696-1 UBUNTU:USN-3696-2 UBUNTU:USN-3753-1 UBUNTU:USN-3753-2 UBUNTU:USN-3754-1 UBUNTU:USN-3777-1 UBUNTU:USN-3777-2 UBUNTU:USN-3821-1 UBUNTU:USN-3821-2 bnc#1084755 bnc#1089281 bnc#1097104 bnc#1097108 http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=318aaf34f1179b39fa9c30fa0f3288b645beee39 linux.git:commit:3c9fa24ca7c9c47605672916491f79e8ccacb9e6 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1553911 rh#1566407 rh#1589324 rh#1589890 rh#1601704 rh#1609664 rh#1667782 rh#1701224 rh#1701842 |
CVE-2018-10878 | kernel-source-rt:Not affected | moderate | 6.6 (CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H) | CONFIRM:bugzilla.kernel.org:CVE-2018-10878 CONFIRM:bugzilla.redhat.com:CVE-2018-10878 CONFIRM:git.kernel.org:CVE-2018-10878 CONFIRM:patchwork.ozlabs.org:CVE-2018-10878 CVE-2018-10878 D:CVE-2018-10878 MLIST:[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package OSS:2018/09/18/4 OSS:2018/09/25/4 Oracle:CVE-2018-3646 Oracle:CVE-2018-5390 RH:CVE-2018-10878 RHSA-2018:2948 RHSA-2018:3083 RHSA-2018:3096 SMASH Issue 209216 UBUNTU:CVE-2018-10878 UBUNTU:USN-3753-1 UBUNTU:USN-3753-2 USN-3871-1 USN-3871-3 USN-3871-4 USN-3871-5 bnc#1099813 rh#1575866 rh#1596802 rh#1601704 rh#1609664 rh#1890354 |
CVE-2018-10880 | kernel-source-rt:Not affected | moderate | 5.6 (CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H) | AIXAPAR:IT02314 AIXAPAR:IV61506 BID:100215 BID:100503 BID:100514 BID:100861 BID:101758 BID:102291 BID:102293 BID:102367 BID:102503 BID:102813 BID:103356 BID:103459 BID:103605 BID:104229 BID:104232 BID:104907 BID:104909 BID:105647 BID:105656 BID:105658 BID:106503 BID:67121 BID:79091 BID:91067 BID:91068 BID:91787 BID:91869 BID:93132 BID:93287 BID:93604 BID:94371 BID:94377 BID:94925 BID:95429 BID:99619 BUGTRAQ:20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities BUGTRAQ:20190624 [SECURITY] [DSA 4469-1] libvirt security update CERT-VN:VU#180049 CERT-VN:VU#978508 CERT:TA18-141A CISCO:20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products CISCO:20180522 CPU Side-Channel Information Disclosure Vulnerabilities: May 2018 CONFIRM:access.redhat.com:CVE-2014-0114 CONFIRM:access.redhat.com:CVE-2014-0224 CONFIRM:advisories.mageia.org:CVE-2014-0114 CONFIRM:aix.software.ibm.com:CVE-2014-3470 CONFIRM:blogs.oracle.com:CVE-2014-0224 CONFIRM:bugs.jython.org:CVE-2016-4000 CONFIRM:bugs.launchpad.net:CVE-2015-8866 CONFIRM:bugs.launchpad.net:CVE-2015-8867 CONFIRM:bugs.php.net:CVE-2015-8866 CONFIRM:bugs.php.net:CVE-2015-8867 CONFIRM:bugzilla.kernel.org:CVE-2018-10876 CONFIRM:bugzilla.kernel.org:CVE-2018-10880 CONFIRM:bugzilla.kernel.org:CVE-2018-10882 CONFIRM:bugzilla.redhat.com:CVE-2018-10853 CONFIRM:bugzilla.redhat.com:CVE-2018-10876 CONFIRM:bugzilla.redhat.com:CVE-2018-10877 CONFIRM:bugzilla.redhat.com:CVE-2018-10880 CONFIRM:bugzilla.redhat.com:CVE-2018-10882 CONFIRM:bugzilla.redhat.com:CVE-2018-1120 CONFIRM:bugzilla.redhat.com:CVE-2018-1122 CONFIRM:bugzilla.redhat.com:CVE-2018-1123 CONFIRM:bugzilla.redhat.com:CVE-2018-1124 CONFIRM:bugzilla.redhat.com:CVE-2018-1125 CONFIRM:bugzilla.redhat.com:CVE-2018-1126 CONFIRM:bugzilla.redhat.com:CVE-2018-1130 CONFIRM:cert-portal.siemens.com:CVE-2017-5715 CONFIRM:cert-portal.siemens.com:CVE-2017-5753 CONFIRM:cert-portal.siemens.com:CVE-2018-3640 CONFIRM:commons.apache.org:CVE-2014-0114 CONFIRM:dev.mysql.com:CVE-2014-0224 CONFIRM:developer.arm.com:CVE-2017-5754 CONFIRM:discussions.nessus.org:CVE-2014-0224 CONFIRM:esupport.trendmicro.com:CVE-2014-0224 CONFIRM:filezilla-project.org:CVE-2014-0224 CONFIRM:git.kernel.org:CVE-2017-10661 CONFIRM:git.kernel.org:CVE-2017-17805 CONFIRM:git.kernel.org:CVE-2017-17806 CONFIRM:git.kernel.org:CVE-2017-18075 CONFIRM:git.kernel.org:CVE-2018-1068 CONFIRM:git.kernel.org:CVE-2018-10853 CONFIRM:git.kernel.org:CVE-2018-10876 CONFIRM:git.kernel.org:CVE-2018-10880 CONFIRM:git.kernel.org:CVE-2018-10882 CONFIRM:git.kernel.org:CVE-2018-1120 CONFIRM:git.kernel.org:CVE-2018-1130 CONFIRM:git.kernel.org:CVE-2018-7566 CONFIRM:git.openssl.org:CVE-2014-0224 CONFIRM:git.php.net:CVE-2015-8866 CONFIRM:git.php.net:CVE-2015-8867 CONFIRM:github.com:CVE-2016-1182 CONFIRM:github.com:CVE-2016-9389 CONFIRM:github.com:CVE-2016-9394 CONFIRM:github.com:CVE-2016-9583 CONFIRM:github.com:CVE-2017-10661 CONFIRM:github.com:CVE-2017-14735 CONFIRM:github.com:CVE-2017-17805 CONFIRM:github.com:CVE-2017-17806 CONFIRM:github.com:CVE-2017-18075 CONFIRM:github.com:CVE-2017-8831 CONFIRM:github.com:CVE-2018-1000204 CONFIRM:github.com:CVE-2018-1068 CONFIRM:h20566.www2.hpe.com:CVE-2016-0705 CONFIRM:h20566.www2.hpe.com:CVE-2016-0763 CONFIRM:h20566.www2.hpe.com:CVE-2016-5388 CONFIRM:help.ecostruxureit.com:CVE-2017-5754 CONFIRM:hg.python.org:CVE-2016-4000 CONFIRM:issues.apache.org:CVE-2014-0114 CONFIRM:issues.apache.org:CVE-2015-1832 CONFIRM:issues.apache.org:CVE-2016-1000031 CONFIRM:kb.bluecoat.com:CVE-2014-3470 CONFIRM:kb.juniper.net:CVE-2014-0224 CONFIRM:kb.juniper.net:CVE-2014-3470 CONFIRM:kc.mcafee.com:CVE-2014-3470 CONFIRM:kc.mcafee.com:CVE-2017-12942 CONFIRM:linux.oracle.com:CVE-2014-3510 CONFIRM:nvidia.custhelp.com:CVE-2017-0330 CONFIRM:patchwork.kernel.org:CVE-2018-5750 CONFIRM:patchwork.ozlabs.org:CVE-2018-10876 CONFIRM:patchwork.ozlabs.org:CVE-2018-10880 CONFIRM:portal.msrc.microsoft.com:CVE-2018-3639 CONFIRM:psirt.global.sonicwall.com:CVE-2018-3639 CONFIRM:puppetlabs.com:CVE-2014-0224 CONFIRM:rwkbp.makekb.com:CVE-2015-8965 CONFIRM:security-tracker.debian.org:CVE-2016-1181 CONFIRM:security-tracker.debian.org:CVE-2016-1182 CONFIRM:security.netapp.com:CVE-2014-0114 CONFIRM:security.netapp.com:CVE-2016-1000031 CONFIRM:security.netapp.com:CVE-2016-1182 CONFIRM:security.netapp.com:CVE-2017-5645 CONFIRM:security.netapp.com:CVE-2018-3640 CONFIRM:source.android.com:CVE-2017-10663 CONFIRM:source.android.com:CVE-2017-6280 CONFIRM:support.apple.com:CVE-2014-4979 CONFIRM:support.citrix.com:CVE-2014-3470 CONFIRM:support.citrix.com:CVE-2018-3639 CONFIRM:support.f5.com:CVE-2014-0224 CONFIRM:support.f5.com:CVE-2017-18017 CONFIRM:support.f5.com:CVE-2018-13405 CONFIRM:support.hpe.com:CVE-2018-3640 CONFIRM:support.lenovo.com:CVE-2018-3640 CONFIRM:support.oracle.com:CVE-2018-3639 CONFIRM:svn.apache.org:CVE-2015-1832 CONFIRM:www-01.ibm.com:CVE-2014-0114 CONFIRM:www-01.ibm.com:CVE-2014-0224 CONFIRM:www-01.ibm.com:CVE-2014-3022 CONFIRM:www-01.ibm.com:CVE-2014-3470 CONFIRM:www-01.ibm.com:CVE-2015-1832 CONFIRM:www-947.ibm.com:CVE-2014-0224 CONFIRM:www-947.ibm.com:CVE-2014-3470 CONFIRM:www.blackberry.com:CVE-2014-3470 CONFIRM:www.f-secure.com:CVE-2014-3470 CONFIRM:www.fortiguard.com:CVE-2014-0224 CONFIRM:www.fujitsu.com:CVE-2018-3640 CONFIRM:www.huawei.com:CVE-2014-3470 CONFIRM:www.ibm.com:CVE-2014-0224 CONFIRM:www.ibm.com:CVE-2014-0963 CONFIRM:www.ibm.com:CVE-2014-3470 CONFIRM:www.innominate.com:CVE-2014-0224 CONFIRM:www.intel.com:CVE-2018-3640 CONFIRM:www.intersectalliance.com:CVE-2014-0224 CONFIRM:www.kerio.com:CVE-2014-3857 CONFIRM:www.kernel.org:CVE-2017-10661 CONFIRM:www.kernel.org:CVE-2017-17806 CONFIRM:www.kernel.org:CVE-2017-18075 CONFIRM:www.mitel.com:CVE-2018-3640 CONFIRM:www.novell.com:CVE-2014-3470 CONFIRM:www.openssl.org:CVE-2014-3470 CONFIRM:www.oracle.com:CVE-2014-0114 CONFIRM:www.oracle.com:CVE-2014-4271 CONFIRM:www.oracle.com:CVE-2014-6564 CONFIRM:www.oracle.com:CVE-2015-0437 CONFIRM:www.oracle.com:CVE-2016-5477 CONFIRM:www.oracle.com:CVE-2017-3626 CONFIRM:www.oracle.com:CVE-2017-5689 CONFIRM:www.oracle.com:CVE-2017-5709 CONFIRM:www.oracle.com:CVE-2017-5715 CONFIRM:www.oracle.com:CVE-2017-5753 CONFIRM:www.oracle.com:CVE-2017-6074 CONFIRM:www.splunk.com:CVE-2014-3470 CONFIRM:www.synology.com:CVE-2018-3640 CONFIRM:www.tenable.com:CVE-2014-0224 CONFIRM:www.vmware.com:CVE-2014-0114 CONFIRM:www.vmware.com:CVE-2014-3470 CONFIRM:www.vmware.com:CVE-2014-8371 CONFIRM:www.websense.com:CVE-2015-2773 CONFIRM:www14.software.ibm.com:CVE-2014-3470 CONFIRM:xenbits.xen.org:CVE-2018-3639 CVE-2014-0114 CVE-2014-0224 CVE-2014-4651 CVE-2015-0852 CVE-2015-1832 CVE-2015-2613 CVE-2015-2769 CVE-2015-2770 CVE-2015-7940 CVE-2015-8965 CVE-2015-9251 CVE-2016-0635 CVE-2016-1000031 CVE-2016-1181 CVE-2016-1182 CVE-2016-4000 CVE-2016-5684 CVE-2016-6814 CVE-2016-9389 CVE-2016-9392 CVE-2016-9583 CVE-2017-0379 CVE-2017-10661 CVE-2017-13166 CVE-2017-13168 CVE-2017-13745 CVE-2017-14229 CVE-2017-14735 CVE-2017-15095 CVE-2017-16648 CVE-2017-17805 CVE-2017-17806 CVE-2017-18017 CVE-2017-18075 CVE-2017-18208 CVE-2017-18344 CVE-2017-8813 CVE-2017-8831 CVE-2018-1000026 CVE-2018-1000204 CVE-2018-10021 CVE-2018-1065 CVE-2018-1068 CVE-2018-10853 CVE-2018-10876 CVE-2018-10877 CVE-2018-10880 CVE-2018-10882 CVE-2018-1120 CVE-2018-1122 CVE-2018-1123 CVE-2018-1124 CVE-2018-1125 CVE-2018-1126 CVE-2018-1130 CVE-2018-13405 CVE-2018-3639 CVE-2018-5344 CVE-2018-5750 CVE-2018-7566 CVE-2018-7995 D:CVE-2014-0224 D:CVE-2017-10661 D:CVE-2017-8831 D:CVE-2018-1068 D:CVE-2018-1126 D:CVE-2018-1130 D:CVE-2018-3639 D:CVE-2018-5750 DEBIAN:DSA-3959 DEBIAN:DSA-4073 DEBIAN:DSA-4082 DEBIAN:DSA-4120 DEBIAN:DSA-4187 DEBIAN:DSA-4188 DEBIAN:DSA-4208 DEBIAN:DSA-4210 DEBIAN:DSA-4266 DEBIAN:DSA-4273 DSA-2940 DSA-2950 DSA-3392 DSA-3417 DSA-3893 DSA-3981 DSA-4073 DSA-4082 DSA-4120 DSA-4187 DSA-4188 DSA-4208 DSA-4210 DSA-4266 DSA-4273 DSA-5378 EXPLOIT-DB:43345 EXPLOIT-DB:44695 EXPLOIT-DB:45033 EXPLOIT-DB:45175 FEDORA:FEDORA-2014-9301 FEDORA:FEDORA-2014-9308 FEDORA:FEDORA-2014-9380 FEDORA:FEDORA-2015-16104 FEDORA:FEDORA-2015-16105 FEDORA:FEDORA-2015-16106 FEDORA:FEDORA-2015-7d95466eda FEDORA:FEDORA-2015-992342e82f FEDORA:FEDORA-2015-decbab7c9f FULLDISC:20140607 Re: More OpenSSL issues FULLDISC:20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities GENTOO:GLSA-201407-05 GENTOO:GLSA-201607-09 GENTOO:GLSA-201701-68 GENTOO:GLSA-201710-28 HP:HPSBGN03041 HP:HPSBGN03050 HP:HPSBGN03068 HP:HPSBHF03052 HP:HPSBHF03088 HP:HPSBHF03145 HP:HPSBMU03051 HP:HPSBMU03053 HP:HPSBMU03055 HP:HPSBMU03056 HP:HPSBMU03057 HP:HPSBMU03058 HP:HPSBMU03062 HP:HPSBMU03065 HP:HPSBMU03070 HP:HPSBMU03071 HP:HPSBMU03074 HP:HPSBMU03076 HP:HPSBMU03078 HP:HPSBMU03083 HP:HPSBMU03089 HP:HPSBMU03090 HP:HPSBMU03094 HP:HPSBMU03101 HP:HPSBOV03047 HP:HPSBPI03107 HP:HPSBST03097 HP:HPSBST03098 HP:HPSBST03103 HP:HPSBST03106 HP:HPSBST03160 HP:HPSBST03195 HP:HPSBST03265 HP:HPSBUX03046 HP:SSRT101818 JVN:JVN#03188560 JVN:JVN#65044642 JVNDB:JVNDB-2016-000096 JVNDB:JVNDB-2016-000097 L3:41161 L3:42389 MANDRIVA:MDVSA-2014:095 MANDRIVA:MDVSA-2014:105 MANDRIVA:MDVSA-2014:106 MANDRIVA:MDVSA-2015:062 MISC:blogs.gentoo.org:CVE-2016-9399 MISC:bugs.chromium.org:CVE-2018-3639 MISC:bugs.launchpad.net:CVE-2017-18017 MISC:bugs.launchpad.net:OSS:2018/Q3/76 MISC:bugzilla.kernel.org:CVE-2017-8831 MISC:bugzilla.redhat.com:MLIST:[oss-security] 20200610 kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768 MISC:ccsinjection.lepidum.co.jp:CVE-2014-0224 MISC:cdn.kernel.org:CVE-2017-18344 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:eprint.iacr.org:CVE-2017-0379 MISC:git.gnupg.org:CVE-2017-0379 MISC:git.kernel.org:CVE-2017-18017 MISC:git.kernel.org:CVE-2017-18208 MISC:git.kernel.org:CVE-2018-10021 MISC:git.kernel.org:CVE-2018-1065 MISC:git.kernel.org:CVE-2018-13405 MISC:git.kernel.org:CVE-2018-5344 MISC:git.kernel.org:CVE-2018-7995 MISC:git.kernel.org:OSS:2014/03/05/6 MISC:git.kernel.org:OSS:2018/Q3/35 MISC:git.kernel.org:OSS:2020/Q1/69 MISC:github.com:CVE-2015-9251 MISC:github.com:CVE-2017-14229 MISC:github.com:CVE-2017-18017 MISC:github.com:CVE-2017-18208 MISC:github.com:CVE-2017-18344 MISC:github.com:CVE-2018-10021 MISC:github.com:CVE-2018-1065 MISC:github.com:CVE-2018-13405 MISC:github.com:CVE-2018-5344 MISC:github.com:OSS:2018/Q3/76 MISC:gitlab.com:OSS:2018/Q2/136 MISC:groups.google.com:CVE-2017-16648 MISC:ics-cert.us-cert.gov:CVE-2015-9251 MISC:lists.debian.org:CVE-2017-0379 MISC:lists.openwall.net:CVE-2018-1065 MISC:lkml.org:CVE-2017-18017 MISC:lkml.org:CVE-2018-7995 MISC:mail-archives.apache.org:CVE-2016-6814 MISC:openwall.com:CVE-2018-13405 MISC:patchwork.kernel.org:CVE-2017-16648 MISC:patchwork.ozlabs.org:CVE-2017-18017 MISC:patchwork.ozlabs.org:CVE-2018-1000026 MISC:patchwork.ozlabs.org:CVE-2018-1065 MISC:security-tracker.debian.org:CVE-2016-4000 MISC:security-tracker.debian.org:CVE-2017-0379 MISC:snyk.io:CVE-2015-9251 MISC:snyk.io:CVE-2016-4000 MISC:sw.aveva.com:CVE-2015-9251 MISC:syzkaller.appspot.com:CVE-2018-1130 MISC:twitter.com:CVE-2018-13405 MISC:web-in-security.blogspot.ca:CVE-2015-7940 MISC:www.arista.com:CVE-2017-18017 MISC:www.imperialviolet.org:CVE-2014-0224 MISC:www.kernel.org:CVE-2017-18017 MISC:www.kernel.org:CVE-2017-18208 MISC:www.openwall.com:CVE-2018-1000204 MISC:www.openwall.com:CVE-2018-10853 MISC:www.oracle.com:CVE-2014-0107 MISC:www.oracle.com:CVE-2015-7501 MISC:www.qualys.com:OSS:2018/Q2/122 MISC:www.securityfocus.com:CVE-2017-8831 MISC:www.talosintelligence.com:CVE-2016-5684 MISC:www.tenable.com:CVE-2016-1000031 MISC:www.tenable.com:CVE-2016-6793 MLIST:[alsa-devel] 20180214 [PATCH] ALSA: seq: Fix racy pool initializations MLIST:[announce] 20181105 [SECURITY] Immediately upgrade commons-fileupload to version 1.3.3 when running Struts 2.3.36 or prior MLIST:[apache-ignite-developers] 20180601 [CVE-2014-0114]: Apache Ignite is vulnerable to existing CVE-2014-0114 MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 MLIST:[debian-lts-announce] 20180107 [SECURITY] [DLA 1232-1] linux security update MLIST:[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update MLIST:[debian-lts-announce] 20180531 [SECURITY] [DLA 1390-1] procps security update MLIST:[debian-lts-announce] 20180601 [SECURITY] [DLA 1392-1] linux security update MLIST:[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update MLIST:[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update MLIST:[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package MLIST:[debian-lts-announce] 20180727 [SECURITY] [DLA 1446-1] intel-microcode security update MLIST:[debian-lts-announce] 20180815 [SECURITY] [DLA 1466-1] linux-4.9 security update MLIST:[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update MLIST:[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update MLIST:[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update MLIST:[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update MLIST:[debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update MLIST:[linux-netdev] 20180305 BUG: unable to handle kernel paging request in compat_copy_entries MLIST:[linux-netdev] 20180305 [PATCH net] netfilter: check for out-of-bounds while copying compat entries MLIST:[linux-netdev] 20180306 [PATCH net] dccp: check sk for closed state in dccp_sendmsg() MLIST:[netdev] 20180116 http://lists.openwall.net/netdev/2018/01/16/40 MLIST:[netdev] 20180118 http://lists.openwall.net/netdev/2018/01/18/96 MLIST:[oss-security] 20140616 CVE request for commons-beanutils: 'class' property is exposed, potentially leading to RCE MLIST:[oss-security] 20140707 Re: CVE request for commons-beanutils: 'class' property is exposed, potentially leading to RCE MLIST:[oss-security] 20150828 CVE-2015-0852 [FreeImage] Integer overflow in PluginPCX.cpp MLIST:[oss-security] 20151022 CVE Request: invalid curve attack on bouncycastle MLIST:[oss-security] 20151022 Re: CVE Request: invalid curve attack on bouncycastle MLIST:[oss-security] 20161117 Re: jasper: multiple assertion failures MLIST:[oss-security] 20200610 Re: kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768 MLIST:[oss-security] 20200610 kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768 OSS:2014/03/05/6 OSS:2017/Q3/526 OSS:2017/Q4/244 OSS:2018/09/18/4 OSS:2018/09/25/4 OSS:2018/Q1/212 OSS:2018/Q1/240 OSS:2018/Q2/100 OSS:2018/Q2/136 OSS:2018/Q3/208 OSS:2018/Q3/35 OSS:2018/Q3/76 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 OSS:2020/Q2/177 OSS:2022/11/10/2 OSS:2022/12/27/3 OSS:2022/Q4/132 OSS:2022/Q4/135 OSS:2022/Q4/244 Oracle:CVE-2014-0224 Oracle:CVE-2017-0861 Oracle:CVE-2017-17558 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2017-5754 Oracle:CVE-2017-6074 Oracle:CVE-2018-3639 Oracle:CVE-2018-3646 Oracle:CVE-2018-5390 RH:CVE-2014-0224 RH:CVE-2017-10661 RH:CVE-2017-13166 RH:CVE-2017-13168 RH:CVE-2017-16648 RH:CVE-2017-17805 RH:CVE-2017-17806 RH:CVE-2017-18017 RH:CVE-2017-18075 RH:CVE-2017-18208 RH:CVE-2017-18344 RH:CVE-2017-8831 RH:CVE-2018-1000026 RH:CVE-2018-1000204 RH:CVE-2018-1065 RH:CVE-2018-1068 RH:CVE-2018-10880 RH:CVE-2018-1120 RH:CVE-2018-1122 RH:CVE-2018-1123 RH:CVE-2018-1124 RH:CVE-2018-1125 RH:CVE-2018-1126 RH:CVE-2018-1130 RH:CVE-2018-13405 RH:CVE-2018-3639 RH:CVE-2018-5344 RH:CVE-2018-5750 RH:CVE-2018-7566 RHBA-2020:0547 RHSA-2014:0624 RHSA-2014:0625 RHSA-2014:0626 RHSA-2014:0627 RHSA-2014:0628 RHSA-2014:0629 RHSA-2014:0630 RHSA-2014:0631 RHSA-2014:0632 RHSA-2014:0633 RHSA-2014:0679 RHSA-2014:0680 RHSA-2015:1176 RHSA-2016:2035 RHSA-2016:2036 RHSA-2016:2130 RHSA-2016:2131 RHSA-2016:2595 RHSA-2016:2749 RHSA-2016:2927 RHSA-2016:2928 RHSA-2017:0184 RHSA-2017:0272 RHSA-2017:0868 RHSA-2017:1208 RHSA-2017:2486 RHSA-2017:2596 RHSA-2017:3189 RHSA-2017:3190 RHSA-2018:0342 RHSA-2018:0478 RHSA-2018:0479 RHSA-2018:0480 RHSA-2018:0481 RHSA-2018:0576 RHSA-2018:0577 RHSA-2018:0676 RHSA-2018:1062 RHSA-2018:1130 RHSA-2018:1170 RHSA-2018:1318 RHSA-2018:1319 RHSA-2018:1355 RHSA-2018:1447 RHSA-2018:1448 RHSA-2018:1449 RHSA-2018:1450 RHSA-2018:1451 RHSA-2018:1629 RHSA-2018:1630 RHSA-2018:1632 RHSA-2018:1633 RHSA-2018:1635 RHSA-2018:1636 RHSA-2018:1637 RHSA-2018:1638 RHSA-2018:1639 RHSA-2018:1640 RHSA-2018:1641 RHSA-2018:1642 RHSA-2018:1643 RHSA-2018:1644 RHSA-2018:1645 RHSA-2018:1646 RHSA-2018:1647 RHSA-2018:1648 RHSA-2018:1649 RHSA-2018:1650 RHSA-2018:1651 RHSA-2018:1652 RHSA-2018:1653 RHSA-2018:1654 RHSA-2018:1655 RHSA-2018:1656 RHSA-2018:1657 RHSA-2018:1658 RHSA-2018:1659 RHSA-2018:1660 RHSA-2018:1661 RHSA-2018:1662 RHSA-2018:1663 RHSA-2018:1664 RHSA-2018:1665 RHSA-2018:1666 RHSA-2018:1667 RHSA-2018:1668 RHSA-2018:1669 RHSA-2018:1674 RHSA-2018:1675 RHSA-2018:1676 RHSA-2018:1686 RHSA-2018:1688 RHSA-2018:1689 RHSA-2018:1690 RHSA-2018:1696 RHSA-2018:1700 RHSA-2018:1710 RHSA-2018:1711 RHSA-2018:1737 RHSA-2018:1738 RHSA-2018:1777 RHSA-2018:1820 RHSA-2018:1826 RHSA-2018:1854 RHSA-2018:1965 RHSA-2018:1967 RHSA-2018:1997 RHSA-2018:2001 RHSA-2018:2003 RHSA-2018:2006 RHSA-2018:2060 RHSA-2018:2161 RHSA-2018:2162 RHSA-2018:2164 RHSA-2018:2171 RHSA-2018:2172 RHSA-2018:2216 RHSA-2018:2228 RHSA-2018:2246 RHSA-2018:2250 RHSA-2018:2258 RHSA-2018:2267 RHSA-2018:2268 RHSA-2018:2289 RHSA-2018:2309 RHSA-2018:2328 RHSA-2018:2363 RHSA-2018:2364 RHSA-2018:2384 RHSA-2018:2387 RHSA-2018:2390 RHSA-2018:2394 RHSA-2018:2395 RHSA-2018:2396 RHSA-2018:2669 RHSA-2018:2927 RHSA-2018:2948 RHSA-2018:3083 RHSA-2018:3096 RHSA-2018:3396 RHSA-2018:3397 RHSA-2018:3398 RHSA-2018:3399 RHSA-2018:3400 RHSA-2018:3401 RHSA-2018:3402 RHSA-2018:3407 RHSA-2018:3423 RHSA-2018:3424 RHSA-2018:3425 RHSA-2018:3459 RHSA-2018:3540 RHSA-2018:3586 RHSA-2018:3590 RHSA-2018:3591 RHSA-2019:0148 RHSA-2019:0525 RHSA-2019:0717 RHSA-2019:1046 RHSA-2019:1170 RHSA-2019:1190 RHSA-2019:1483 RHSA-2019:1487 RHSA-2019:1944 RHSA-2019:2189 RHSA-2019:2401 RHSA-2019:2473 RHSA-2019:2476 RHSA-2019:2566 RHSA-2019:2696 RHSA-2019:2730 RHSA-2019:3967 RHSA-2019:4057 RHSA-2019:4058 RHSA-2019:4159 RHSA-2019:4164 RHSA-2020:0036 RHSA-2020:0595 RHSA-2020:1265 RHSA-2020:1464 RHSA-2020:3804 RHSA-2020:3810 SECTRACK:1031032 SECTRACK:1031594 SECTRACK:1034077 SECTRACK:1036056 SECTRACK:1036377 SECTRACK:1036378 SECTRACK:1036393 SECTRACK:1036397 SECTRACK:1037036 SECTRACK:1037046 SECTRACK:1037053 SECTRACK:1037640 SECTRACK:1039600 SECTRACK:1040319 SECTRACK:1040446 SECTRACK:1040949 SECTRACK:1041057 SECTRACK:1041294 SECTRACK:1041414 SECTRACK:1042004 SECUNIA:57477 SECUNIA:58128 SECUNIA:58337 SECUNIA:58385 SECUNIA:58433 SECUNIA:58492 SECUNIA:58579 SECUNIA:58615 SECUNIA:58639 SECUNIA:58660 SECUNIA:58667 SECUNIA:58710 SECUNIA:58713 SECUNIA:58714 SECUNIA:58716 SECUNIA:58719 SECUNIA:58742 SECUNIA:58745 SECUNIA:58759 SECUNIA:58851 SECUNIA:58930 SECUNIA:58945 SECUNIA:58947 SECUNIA:58977 SECUNIA:59004 SECUNIA:59012 SECUNIA:59014 SECUNIA:59040 SECUNIA:59043 SECUNIA:59055 SECUNIA:59063 SECUNIA:59093 SECUNIA:59101 SECUNIA:59118 SECUNIA:59132 SECUNIA:59135 SECUNIA:59142 SECUNIA:59163 SECUNIA:59167 SECUNIA:59175 SECUNIA:59186 SECUNIA:59188 SECUNIA:59189 SECUNIA:59190 SECUNIA:59191 SECUNIA:59192 SECUNIA:59202 SECUNIA:59211 SECUNIA:59214 SECUNIA:59215 SECUNIA:59223 SECUNIA:59228 SECUNIA:59231 SECUNIA:59245 SECUNIA:59246 SECUNIA:59264 SECUNIA:59282 SECUNIA:59284 SECUNIA:59287 SECUNIA:59305 SECUNIA:59306 SECUNIA:59310 SECUNIA:59325 SECUNIA:59338 SECUNIA:59347 SECUNIA:59354 SECUNIA:59362 SECUNIA:59364 SECUNIA:59365 SECUNIA:59368 SECUNIA:59370 SECUNIA:59374 SECUNIA:59375 SECUNIA:59380 SECUNIA:59383 SECUNIA:59389 SECUNIA:59429 SECUNIA:59430 SECUNIA:59435 SECUNIA:59437 SECUNIA:59440 SECUNIA:59441 SECUNIA:59442 SECUNIA:59444 SECUNIA:59445 SECUNIA:59446 SECUNIA:59447 SECUNIA:59448 SECUNIA:59449 SECUNIA:59454 SECUNIA:59459 SECUNIA:59460 SECUNIA:59464 SECUNIA:59479 SECUNIA:59480 SECUNIA:59483 SECUNIA:59502 SECUNIA:59506 SECUNIA:59518 SECUNIA:59525 SECUNIA:59529 SECUNIA:59589 SECUNIA:59602 SECUNIA:59661 SECUNIA:59677 SECUNIA:59704 SECUNIA:59718 SECUNIA:59824 SECUNIA:59827 SECUNIA:59878 SECUNIA:59885 SECUNIA:59894 SECUNIA:59916 SECUNIA:60176 SECUNIA:60177 SECUNIA:60522 SECUNIA:60567 SECUNIA:60577 SECUNIA:60703 SECUNIA:60819 SECUNIA:61254 SECUNIA:61815 SMASH Issue 184883 SMASH Issue 190204 SMASH Issue 194646 SMASH Issue 196268 SMASH Issue 196270 SMASH Issue 196659 SMASH Issue 197016 SMASH Issue 197017 SMASH Issue 197538 SMASH Issue 198115 SMASH Issue 198879 SMASH Issue 198893 SMASH Issue 199072 SMASH Issue 199429 SMASH Issue 201048 SMASH Issue 201049 SMASH Issue 201087 SMASH Issue 201727 SMASH Issue 202009 SMASH Issue 202788 SMASH Issue 204752 SMASH Issue 205325 SMASH Issue 205474 SMASH Issue 207826 SMASH Issue 209218 SMASH Issue 209676 SMASH Issue 211888 SMASH Issue 218336 SMASH Issue 218348 SMASH Issue 218349 SMASH Issue 218448 SMASH Issue 218452 SMASH Issue 218461 SMASH Issue 99325 SUSE:SUSE-SU-2015:0578 SUSE:SUSE-SU-2015:0743 SUSE:SUSE-SU-2018:0010 SUSE:SUSE-SU-2018:0011 SUSE:SUSE-SU-2018:0012 SUSE:SUSE-SU-2018:0383 SUSE:SUSE-SU-2018:0416 SUSE:SUSE-SU-2018:0482 SUSE:SUSE-SU-2018:0555 SUSE:SUSE-SU-2018:0660 SUSE:SUSE-SU-2018:0834 SUSE:SUSE-SU-2018:0841 SUSE:SUSE-SU-2018:0848 SUSE:SUSE-SU-2018:0986 SUSE:openSUSE-SU-2015:0229 SUSE:openSUSE-SU-2015:1911 SUSE:openSUSE-SU-2016:0640 SUSE:openSUSE-SU-2018:0022 SUSE:openSUSE-SU-2018:0023 SUSE:openSUSE-SU-2018:0408 SUSE:openSUSE-SU-2019:1407 SUSE:openSUSE-SU-2019:1438 SUSE:openSUSE-SU-2019:1439 SUSE:openSUSE-SU-2019:2376 SUSE:openSUSE-SU-2019:2379 SUSE:openSUSE-SU-2020:1325 UBUNTU:CVE-2014-0224 UBUNTU:CVE-2017-10661 UBUNTU:CVE-2017-13166 UBUNTU:CVE-2017-13168 UBUNTU:CVE-2017-16648 UBUNTU:CVE-2017-17805 UBUNTU:CVE-2017-17806 UBUNTU:CVE-2017-18017 UBUNTU:CVE-2017-18075 UBUNTU:CVE-2017-18208 UBUNTU:CVE-2017-18344 UBUNTU:CVE-2017-8831 UBUNTU:CVE-2018-1000026 UBUNTU:CVE-2018-1000204 UBUNTU:CVE-2018-10021 UBUNTU:CVE-2018-1065 UBUNTU:CVE-2018-1068 UBUNTU:CVE-2018-10853 UBUNTU:CVE-2018-10880 UBUNTU:CVE-2018-1120 UBUNTU:CVE-2018-1122 UBUNTU:CVE-2018-1123 UBUNTU:CVE-2018-1124 UBUNTU:CVE-2018-1125 UBUNTU:CVE-2018-1126 UBUNTU:CVE-2018-1130 UBUNTU:CVE-2018-13405 UBUNTU:CVE-2018-3639 UBUNTU:CVE-2018-5344 UBUNTU:CVE-2018-5750 UBUNTU:CVE-2018-7566 UBUNTU:CVE-2018-7995 UBUNTU:USN-3583-1 UBUNTU:USN-3583-2 UBUNTU:USN-3617-1 UBUNTU:USN-3617-2 UBUNTU:USN-3617-3 UBUNTU:USN-3619-1 UBUNTU:USN-3619-2 UBUNTU:USN-3620-1 UBUNTU:USN-3620-2 UBUNTU:USN-3631-1 UBUNTU:USN-3631-2 UBUNTU:USN-3632-1 UBUNTU:USN-3651-1 UBUNTU:USN-3652-1 UBUNTU:USN-3653-1 UBUNTU:USN-3653-2 UBUNTU:USN-3654-1 UBUNTU:USN-3654-2 UBUNTU:USN-3655-1 UBUNTU:USN-3655-2 UBUNTU:USN-3656-1 UBUNTU:USN-3657-1 UBUNTU:USN-3658-1 UBUNTU:USN-3658-2 UBUNTU:USN-3658-3 UBUNTU:USN-3674-1 UBUNTU:USN-3674-2 UBUNTU:USN-3677-1 UBUNTU:USN-3677-2 UBUNTU:USN-3678-1 UBUNTU:USN-3678-2 UBUNTU:USN-3678-3 UBUNTU:USN-3678-4 UBUNTU:USN-3679-1 UBUNTU:USN-3680-1 UBUNTU:USN-3693-1 UBUNTU:USN-3696-1 UBUNTU:USN-3696-2 UBUNTU:USN-3697-1 UBUNTU:USN-3697-2 UBUNTU:USN-3698-1 UBUNTU:USN-3698-2 UBUNTU:USN-3727-1 UBUNTU:USN-3742-1 UBUNTU:USN-3742-2 UBUNTU:USN-3752-1 UBUNTU:USN-3752-2 UBUNTU:USN-3752-3 UBUNTU:USN-3753-1 UBUNTU:USN-3753-2 UBUNTU:USN-3754-1 UBUNTU:USN-3756-1 UBUNTU:USN-3777-1 UBUNTU:USN-3777-2 UBUNTU:USN-3777-3 UBUNTU:USN-3798-1 UBUNTU:USN-3798-2 UBUNTU:USN-3820-1 UBUNTU:USN-3820-2 UBUNTU:USN-3820-3 UBUNTU:USN-3821-1 UBUNTU:USN-3821-2 UBUNTU:USN-3822-1 UBUNTU:USN-3822-2 USN-3583-1 USN-3583-2 USN-3871-1 USN-3871-3 USN-3871-4 USN-3871-5 USN-3910-1 USN-3910-2 ZDI-16-570 bdo#1033297 bdo#797165 bdo#864859 bdo#866511 bdo#873383 bdo#875881 bdo#899170 bnc#1037994 bnc#1053152 bnc#1053153 bnc#1067087 bnc#1067118 bnc#1072831 bnc#1072865 bnc#1073792 bnc#1073874 bnc#1074488 bnc#1075825 bnc#1077402 bnc#1077404 bnc#1077892 bnc#1079384 bnc#1083483 bnc#1083494 bnc#1083650 bnc#1084755 bnc#1085107 bnc#1085447 bnc#1089281 bnc#1092904 bnc#1099845 bnc#1102851 bnc#1103203 bnc#1103580 bnc#882572 bnc#885777 bnc#901237 bnc#903703 bnc#905857 bnc#914447 bnc#916239 http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2638fd0f92d4397884fd991d8f4925cb3f081901 http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=318aaf34f1179b39fa9c30fa0f3288b645beee39 linux.git:commit:7f7ccc2ccc2e70c6054685f5e3522efa81556830 linux.git:commit:8cdb5240ec5928b20490a2bb34cb87e9a5f40226 linux.git:commit:d36260050e1881dce09625a9352d8729c911a6e3 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1091938 rh#1103586 rh#1112877 rh#1243852 rh#1343538 rh#1343540 rh#1396963 rh#1396971 rh#1435719 rh#1449980 rh#1462147 rh#1462158 rh#1481136 rh#1481178 rh#1485274 rh#1495089 rh#1498016 rh#1516257 rh#1519780 rh#1527393 rh#1528312 rh#1528323 rh#1531135 rh#1533909 rh#1539508 rh#1539599 rh#1539706 rh#1541846 rh#1547824 rh#1548412 rh#1550142 rh#1551565 rh#1552048 rh#1553911 rh#1566407 rh#1566890 rh#1573699 rh#1575465 rh#1575466 rh#1575472 rh#1575474 rh#1575852 rh#1575853 rh#1575866 rh#1576419 rh#1589324 rh#1589890 rh#1596773 rh#1596795 rh#1596812 rh#1596842 rh#1599161 rh#1601704 rh#1609664 rh#1610958 rh#1658985 rh#1890354 rh#2027239 rh#2044863 rh#2061700 rh#2119127 |
CVE-2018-10882 | kernel-source-rt:Not affected | moderate | 5 (CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H) | AIXAPAR:IT02314 AIXAPAR:IV61506 BID:100215 BID:100503 BID:100514 BID:100861 BID:101758 BID:102291 BID:102293 BID:102367 BID:102503 BID:102813 BID:103316 BID:103356 BID:103423 BID:103605 BID:104229 BID:104232 BID:104909 BID:105647 BID:105656 BID:105658 BID:106503 BID:67121 BID:79091 BID:91067 BID:91068 BID:91787 BID:91869 BID:93132 BID:93287 BID:93604 BID:94371 BID:94377 BID:94925 BID:95429 BID:99619 BUGTRAQ:20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities BUGTRAQ:20190624 [SECURITY] [DSA 4469-1] libvirt security update CERT-VN:VU#180049 CERT-VN:VU#978508 CERT:TA18-141A CISCO:20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products CISCO:20180522 CPU Side-Channel Information Disclosure Vulnerabilities: May 2018 CONFIRM:access.redhat.com:CVE-2014-0114 CONFIRM:access.redhat.com:CVE-2014-0224 CONFIRM:advisories.mageia.org:CVE-2014-0114 CONFIRM:aix.software.ibm.com:CVE-2014-3470 CONFIRM:blogs.oracle.com:CVE-2014-0224 CONFIRM:bugs.jython.org:CVE-2016-4000 CONFIRM:bugs.launchpad.net:CVE-2015-8866 CONFIRM:bugs.launchpad.net:CVE-2015-8867 CONFIRM:bugs.php.net:CVE-2015-8866 CONFIRM:bugs.php.net:CVE-2015-8867 CONFIRM:bugzilla.kernel.org:CVE-2018-10876 CONFIRM:bugzilla.kernel.org:CVE-2018-10880 CONFIRM:bugzilla.kernel.org:CVE-2018-10882 CONFIRM:bugzilla.kernel.org:CVE-2018-7740 CONFIRM:bugzilla.redhat.com:CVE-2018-10853 CONFIRM:bugzilla.redhat.com:CVE-2018-10876 CONFIRM:bugzilla.redhat.com:CVE-2018-10877 CONFIRM:bugzilla.redhat.com:CVE-2018-10880 CONFIRM:bugzilla.redhat.com:CVE-2018-10882 CONFIRM:bugzilla.redhat.com:CVE-2018-1120 CONFIRM:bugzilla.redhat.com:CVE-2018-1122 CONFIRM:bugzilla.redhat.com:CVE-2018-1123 CONFIRM:bugzilla.redhat.com:CVE-2018-1124 CONFIRM:bugzilla.redhat.com:CVE-2018-1125 CONFIRM:bugzilla.redhat.com:CVE-2018-1126 CONFIRM:cert-portal.siemens.com:CVE-2017-5715 CONFIRM:cert-portal.siemens.com:CVE-2017-5753 CONFIRM:cert-portal.siemens.com:CVE-2018-3640 CONFIRM:commons.apache.org:CVE-2014-0114 CONFIRM:dev.mysql.com:CVE-2014-0224 CONFIRM:developer.arm.com:CVE-2017-5754 CONFIRM:discussions.nessus.org:CVE-2014-0224 CONFIRM:esupport.trendmicro.com:CVE-2014-0224 CONFIRM:filezilla-project.org:CVE-2014-0224 CONFIRM:git.kernel.org:CVE-2017-10661 CONFIRM:git.kernel.org:CVE-2017-17805 CONFIRM:git.kernel.org:CVE-2017-17806 CONFIRM:git.kernel.org:CVE-2017-18075 CONFIRM:git.kernel.org:CVE-2018-10853 CONFIRM:git.kernel.org:CVE-2018-10876 CONFIRM:git.kernel.org:CVE-2018-10880 CONFIRM:git.kernel.org:CVE-2018-10882 CONFIRM:git.kernel.org:CVE-2018-1120 CONFIRM:git.kernel.org:CVE-2018-7566 CONFIRM:git.openssl.org:CVE-2014-0224 CONFIRM:git.php.net:CVE-2015-8866 CONFIRM:git.php.net:CVE-2015-8867 CONFIRM:github.com:CVE-2016-1182 CONFIRM:github.com:CVE-2016-9389 CONFIRM:github.com:CVE-2016-9394 CONFIRM:github.com:CVE-2016-9583 CONFIRM:github.com:CVE-2017-10661 CONFIRM:github.com:CVE-2017-14735 CONFIRM:github.com:CVE-2017-17805 CONFIRM:github.com:CVE-2017-17806 CONFIRM:github.com:CVE-2017-18075 CONFIRM:github.com:CVE-2017-8831 CONFIRM:github.com:CVE-2018-1000204 CONFIRM:h20566.www2.hpe.com:CVE-2016-0705 CONFIRM:h20566.www2.hpe.com:CVE-2016-0763 CONFIRM:h20566.www2.hpe.com:CVE-2016-5388 CONFIRM:help.ecostruxureit.com:CVE-2017-5754 CONFIRM:hg.python.org:CVE-2016-4000 CONFIRM:issues.apache.org:CVE-2014-0114 CONFIRM:issues.apache.org:CVE-2015-1832 CONFIRM:issues.apache.org:CVE-2016-1000031 CONFIRM:kb.bluecoat.com:CVE-2014-3470 CONFIRM:kb.juniper.net:CVE-2014-0224 CONFIRM:kb.juniper.net:CVE-2014-3470 CONFIRM:kc.mcafee.com:CVE-2014-3470 CONFIRM:kc.mcafee.com:CVE-2017-12942 CONFIRM:linux.oracle.com:CVE-2014-3510 CONFIRM:nvidia.custhelp.com:CVE-2017-0330 CONFIRM:patchwork.kernel.org:CVE-2018-5750 CONFIRM:patchwork.ozlabs.org:CVE-2018-10876 CONFIRM:patchwork.ozlabs.org:CVE-2018-10880 CONFIRM:portal.msrc.microsoft.com:CVE-2018-3639 CONFIRM:psirt.global.sonicwall.com:CVE-2018-3639 CONFIRM:puppetlabs.com:CVE-2014-0224 CONFIRM:rwkbp.makekb.com:CVE-2015-8965 CONFIRM:security-tracker.debian.org:CVE-2016-1181 CONFIRM:security-tracker.debian.org:CVE-2016-1182 CONFIRM:security.netapp.com:CVE-2014-0114 CONFIRM:security.netapp.com:CVE-2016-1000031 CONFIRM:security.netapp.com:CVE-2016-1182 CONFIRM:security.netapp.com:CVE-2017-5645 CONFIRM:security.netapp.com:CVE-2018-3640 CONFIRM:source.android.com:CVE-2017-10663 CONFIRM:source.android.com:CVE-2017-6280 CONFIRM:support.apple.com:CVE-2014-4979 CONFIRM:support.citrix.com:CVE-2014-3470 CONFIRM:support.citrix.com:CVE-2018-3639 CONFIRM:support.f5.com:CVE-2014-0224 CONFIRM:support.f5.com:CVE-2017-18017 CONFIRM:support.f5.com:CVE-2018-13405 CONFIRM:support.hpe.com:CVE-2018-3640 CONFIRM:support.lenovo.com:CVE-2018-3640 CONFIRM:support.oracle.com:CVE-2018-3639 CONFIRM:svn.apache.org:CVE-2015-1832 CONFIRM:www-01.ibm.com:CVE-2014-0114 CONFIRM:www-01.ibm.com:CVE-2014-0224 CONFIRM:www-01.ibm.com:CVE-2014-3022 CONFIRM:www-01.ibm.com:CVE-2014-3470 CONFIRM:www-01.ibm.com:CVE-2015-1832 CONFIRM:www-947.ibm.com:CVE-2014-0224 CONFIRM:www-947.ibm.com:CVE-2014-3470 CONFIRM:www.blackberry.com:CVE-2014-3470 CONFIRM:www.f-secure.com:CVE-2014-3470 CONFIRM:www.fortiguard.com:CVE-2014-0224 CONFIRM:www.fujitsu.com:CVE-2018-3640 CONFIRM:www.huawei.com:CVE-2014-3470 CONFIRM:www.ibm.com:CVE-2014-0224 CONFIRM:www.ibm.com:CVE-2014-0963 CONFIRM:www.ibm.com:CVE-2014-3470 CONFIRM:www.innominate.com:CVE-2014-0224 CONFIRM:www.intel.com:CVE-2018-3640 CONFIRM:www.intersectalliance.com:CVE-2014-0224 CONFIRM:www.kerio.com:CVE-2014-3857 CONFIRM:www.kernel.org:CVE-2017-10661 CONFIRM:www.kernel.org:CVE-2017-17806 CONFIRM:www.kernel.org:CVE-2017-18075 CONFIRM:www.mitel.com:CVE-2018-3640 CONFIRM:www.novell.com:CVE-2014-3470 CONFIRM:www.openssl.org:CVE-2014-3470 CONFIRM:www.oracle.com:CVE-2014-0114 CONFIRM:www.oracle.com:CVE-2014-4271 CONFIRM:www.oracle.com:CVE-2014-6564 CONFIRM:www.oracle.com:CVE-2015-0437 CONFIRM:www.oracle.com:CVE-2016-5477 CONFIRM:www.oracle.com:CVE-2017-3626 CONFIRM:www.oracle.com:CVE-2017-5689 CONFIRM:www.oracle.com:CVE-2017-5709 CONFIRM:www.oracle.com:CVE-2017-5715 CONFIRM:www.oracle.com:CVE-2017-5753 CONFIRM:www.oracle.com:CVE-2017-6074 CONFIRM:www.splunk.com:CVE-2014-3470 CONFIRM:www.synology.com:CVE-2018-3640 CONFIRM:www.tenable.com:CVE-2014-0224 CONFIRM:www.vmware.com:CVE-2014-0114 CONFIRM:www.vmware.com:CVE-2014-3470 CONFIRM:www.vmware.com:CVE-2014-8371 CONFIRM:www.websense.com:CVE-2015-2773 CONFIRM:www14.software.ibm.com:CVE-2014-3470 CONFIRM:xenbits.xen.org:CVE-2018-3639 CVE-2014-0114 CVE-2014-0224 CVE-2014-4651 CVE-2015-0852 CVE-2015-1832 CVE-2015-2613 CVE-2015-2769 CVE-2015-2770 CVE-2015-7940 CVE-2015-8965 CVE-2015-9251 CVE-2016-0635 CVE-2016-1000031 CVE-2016-1181 CVE-2016-1182 CVE-2016-4000 CVE-2016-5684 CVE-2016-6814 CVE-2016-9389 CVE-2016-9392 CVE-2016-9583 CVE-2017-0379 CVE-2017-10661 CVE-2017-13166 CVE-2017-13168 CVE-2017-13745 CVE-2017-14229 CVE-2017-14735 CVE-2017-15095 CVE-2017-16648 CVE-2017-17805 CVE-2017-17806 CVE-2017-18017 CVE-2017-18075 CVE-2017-18208 CVE-2017-18232 CVE-2017-18344 CVE-2017-8813 CVE-2017-8831 CVE-2018-1000026 CVE-2018-1000204 CVE-2018-10021 CVE-2018-1065 CVE-2018-10853 CVE-2018-10876 CVE-2018-10877 CVE-2018-10880 CVE-2018-10882 CVE-2018-1095 CVE-2018-1120 CVE-2018-1122 CVE-2018-1123 CVE-2018-1124 CVE-2018-1125 CVE-2018-1126 CVE-2018-13405 CVE-2018-3639 CVE-2018-5344 CVE-2018-5750 CVE-2018-7566 CVE-2018-7740 CVE-2018-7995 D:CVE-2014-0224 D:CVE-2017-10661 D:CVE-2017-8831 D:CVE-2018-10882 D:CVE-2018-1126 D:CVE-2018-3639 D:CVE-2018-5750 D:CVE-2018-7740 DEBIAN:DSA-3959 DEBIAN:DSA-4073 DEBIAN:DSA-4082 DEBIAN:DSA-4120 DEBIAN:DSA-4187 DEBIAN:DSA-4188 DEBIAN:DSA-4208 DEBIAN:DSA-4210 DEBIAN:DSA-4266 DEBIAN:DSA-4273 DSA-2940 DSA-2950 DSA-3392 DSA-3417 DSA-3893 DSA-3981 DSA-4073 DSA-4082 DSA-4120 DSA-4187 DSA-4188 DSA-4208 DSA-4210 DSA-4266 DSA-4273 DSA-5378 EXPLOIT-DB:43345 EXPLOIT-DB:44695 EXPLOIT-DB:45033 EXPLOIT-DB:45175 FEDORA:FEDORA-2014-9301 FEDORA:FEDORA-2014-9308 FEDORA:FEDORA-2014-9380 FEDORA:FEDORA-2015-16104 FEDORA:FEDORA-2015-16105 FEDORA:FEDORA-2015-16106 FEDORA:FEDORA-2015-7d95466eda FEDORA:FEDORA-2015-992342e82f FEDORA:FEDORA-2015-decbab7c9f FULLDISC:20140607 Re: More OpenSSL issues FULLDISC:20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities GENTOO:GLSA-201407-05 GENTOO:GLSA-201607-09 GENTOO:GLSA-201701-68 GENTOO:GLSA-201710-28 HP:HPSBGN03041 HP:HPSBGN03050 HP:HPSBGN03068 HP:HPSBHF03052 HP:HPSBHF03088 HP:HPSBHF03145 HP:HPSBMU03051 HP:HPSBMU03053 HP:HPSBMU03055 HP:HPSBMU03056 HP:HPSBMU03057 HP:HPSBMU03058 HP:HPSBMU03062 HP:HPSBMU03065 HP:HPSBMU03070 HP:HPSBMU03071 HP:HPSBMU03074 HP:HPSBMU03076 HP:HPSBMU03078 HP:HPSBMU03083 HP:HPSBMU03089 HP:HPSBMU03090 HP:HPSBMU03094 HP:HPSBMU03101 HP:HPSBOV03047 HP:HPSBPI03107 HP:HPSBST03097 HP:HPSBST03098 HP:HPSBST03103 HP:HPSBST03106 HP:HPSBST03160 HP:HPSBST03195 HP:HPSBST03265 HP:HPSBUX03046 HP:SSRT101818 JVN:JVN#03188560 JVN:JVN#65044642 JVNDB:JVNDB-2016-000096 JVNDB:JVNDB-2016-000097 L3:41161 L3:42389 MANDRIVA:MDVSA-2014:095 MANDRIVA:MDVSA-2014:105 MANDRIVA:MDVSA-2014:106 MANDRIVA:MDVSA-2015:062 MISC:blogs.gentoo.org:CVE-2016-9399 MISC:bugs.chromium.org:CVE-2018-3639 MISC:bugs.launchpad.net:CVE-2017-18017 MISC:bugs.launchpad.net:OSS:2018/Q3/76 MISC:bugzilla.kernel.org:CVE-2017-8831 MISC:bugzilla.kernel.org:CVE-2018-1092 MISC:bugzilla.kernel.org:CVE-2018-1093 MISC:bugzilla.kernel.org:CVE-2018-1094 MISC:bugzilla.kernel.org:CVE-2018-1095 MISC:bugzilla.redhat.com:MLIST:[oss-security] 20200610 kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768 MISC:ccsinjection.lepidum.co.jp:CVE-2014-0224 MISC:cdn.kernel.org:CVE-2017-18344 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:eprint.iacr.org:CVE-2017-0379 MISC:git.gnupg.org:CVE-2017-0379 MISC:git.kernel.org:CVE-2017-18017 MISC:git.kernel.org:CVE-2017-18208 MISC:git.kernel.org:CVE-2017-18232 MISC:git.kernel.org:CVE-2018-10021 MISC:git.kernel.org:CVE-2018-1065 MISC:git.kernel.org:CVE-2018-1095 MISC:git.kernel.org:CVE-2018-13405 MISC:git.kernel.org:CVE-2018-5344 MISC:git.kernel.org:CVE-2018-7995 MISC:git.kernel.org:OSS:2014/03/05/6 MISC:git.kernel.org:OSS:2018/Q3/35 MISC:git.kernel.org:OSS:2020/Q1/69 MISC:github.com:CVE-2015-9251 MISC:github.com:CVE-2017-14229 MISC:github.com:CVE-2017-18017 MISC:github.com:CVE-2017-18208 MISC:github.com:CVE-2017-18232 MISC:github.com:CVE-2017-18344 MISC:github.com:CVE-2018-10021 MISC:github.com:CVE-2018-1065 MISC:github.com:CVE-2018-13405 MISC:github.com:CVE-2018-5344 MISC:github.com:OSS:2018/Q3/76 MISC:gitlab.com:OSS:2018/Q2/136 MISC:groups.google.com:CVE-2017-16648 MISC:ics-cert.us-cert.gov:CVE-2015-9251 MISC:lists.debian.org:CVE-2017-0379 MISC:lists.openwall.net:CVE-2018-1065 MISC:lkml.org:CVE-2017-18017 MISC:lkml.org:CVE-2018-7995 MISC:mail-archives.apache.org:CVE-2016-6814 MISC:openwall.com:CVE-2018-1095 MISC:openwall.com:CVE-2018-13405 MISC:patchwork.kernel.org:CVE-2017-16648 MISC:patchwork.ozlabs.org:CVE-2017-18017 MISC:patchwork.ozlabs.org:CVE-2018-1000026 MISC:patchwork.ozlabs.org:CVE-2018-1065 MISC:security-tracker.debian.org:CVE-2016-4000 MISC:security-tracker.debian.org:CVE-2017-0379 MISC:snyk.io:CVE-2015-9251 MISC:snyk.io:CVE-2016-4000 MISC:sw.aveva.com:CVE-2015-9251 MISC:twitter.com:CVE-2018-13405 MISC:web-in-security.blogspot.ca:CVE-2015-7940 MISC:www.arista.com:CVE-2017-18017 MISC:www.imperialviolet.org:CVE-2014-0224 MISC:www.kernel.org:CVE-2017-18017 MISC:www.kernel.org:CVE-2017-18208 MISC:www.openwall.com:CVE-2018-1000204 MISC:www.openwall.com:CVE-2018-10853 MISC:www.oracle.com:CVE-2014-0107 MISC:www.oracle.com:CVE-2015-7501 MISC:www.qualys.com:OSS:2018/Q2/122 MISC:www.securityfocus.com:CVE-2017-8831 MISC:www.talosintelligence.com:CVE-2016-5684 MISC:www.tenable.com:CVE-2016-1000031 MISC:www.tenable.com:CVE-2016-6793 MLIST:[alsa-devel] 20180214 [PATCH] ALSA: seq: Fix racy pool initializations MLIST:[announce] 20181105 [SECURITY] Immediately upgrade commons-fileupload to version 1.3.3 when running Struts 2.3.36 or prior MLIST:[apache-ignite-developers] 20180601 [CVE-2014-0114]: Apache Ignite is vulnerable to existing CVE-2014-0114 MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 MLIST:[debian-lts-announce] 20180107 [SECURITY] [DLA 1232-1] linux security update MLIST:[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update MLIST:[debian-lts-announce] 20180531 [SECURITY] [DLA 1390-1] procps security update MLIST:[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update MLIST:[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update MLIST:[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package MLIST:[debian-lts-announce] 20180727 [SECURITY] [DLA 1446-1] intel-microcode security update MLIST:[debian-lts-announce] 20180815 [SECURITY] [DLA 1466-1] linux-4.9 security update MLIST:[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update MLIST:[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update MLIST:[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update MLIST:[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update MLIST:[debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update MLIST:[netdev] 20180116 http://lists.openwall.net/netdev/2018/01/16/40 MLIST:[netdev] 20180118 http://lists.openwall.net/netdev/2018/01/18/96 MLIST:[oss-security] 20140616 CVE request for commons-beanutils: 'class' property is exposed, potentially leading to RCE MLIST:[oss-security] 20140707 Re: CVE request for commons-beanutils: 'class' property is exposed, potentially leading to RCE MLIST:[oss-security] 20150828 CVE-2015-0852 [FreeImage] Integer overflow in PluginPCX.cpp MLIST:[oss-security] 20151022 CVE Request: invalid curve attack on bouncycastle MLIST:[oss-security] 20151022 Re: CVE Request: invalid curve attack on bouncycastle MLIST:[oss-security] 20161117 Re: jasper: multiple assertion failures MLIST:[oss-security] 20200610 Re: kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768 MLIST:[oss-security] 20200610 kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768 OSS:2014/03/05/6 OSS:2017/Q3/526 OSS:2017/Q4/244 OSS:2018/09/18/4 OSS:2018/09/25/4 OSS:2018/Q1/212 OSS:2018/Q1/284 OSS:2018/Q2/136 OSS:2018/Q3/208 OSS:2018/Q3/35 OSS:2018/Q3/76 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 OSS:2020/Q2/177 OSS:2022/11/10/2 OSS:2022/12/27/3 OSS:2022/Q4/132 OSS:2022/Q4/135 OSS:2022/Q4/244 Oracle:CVE-2014-0224 Oracle:CVE-2017-0861 Oracle:CVE-2017-17558 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2017-5754 Oracle:CVE-2017-6074 Oracle:CVE-2018-3639 Oracle:CVE-2018-3646 Oracle:CVE-2018-5390 RH:CVE-2014-0224 RH:CVE-2017-10661 RH:CVE-2017-13166 RH:CVE-2017-13168 RH:CVE-2017-16648 RH:CVE-2017-17805 RH:CVE-2017-17806 RH:CVE-2017-18017 RH:CVE-2017-18075 RH:CVE-2017-18208 RH:CVE-2017-18232 RH:CVE-2017-18344 RH:CVE-2017-8831 RH:CVE-2018-1000026 RH:CVE-2018-1000204 RH:CVE-2018-1065 RH:CVE-2018-10882 RH:CVE-2018-1095 RH:CVE-2018-1120 RH:CVE-2018-1122 RH:CVE-2018-1123 RH:CVE-2018-1124 RH:CVE-2018-1125 RH:CVE-2018-1126 RH:CVE-2018-13405 RH:CVE-2018-3639 RH:CVE-2018-5344 RH:CVE-2018-5750 RH:CVE-2018-7566 RH:CVE-2018-7740 RHBA-2020:0547 RHSA-2014:0624 RHSA-2014:0625 RHSA-2014:0626 RHSA-2014:0627 RHSA-2014:0628 RHSA-2014:0629 RHSA-2014:0630 RHSA-2014:0631 RHSA-2014:0632 RHSA-2014:0633 RHSA-2014:0679 RHSA-2014:0680 RHSA-2015:1176 RHSA-2016:2035 RHSA-2016:2036 RHSA-2016:2130 RHSA-2016:2131 RHSA-2016:2595 RHSA-2016:2749 RHSA-2016:2927 RHSA-2016:2928 RHSA-2017:0184 RHSA-2017:0272 RHSA-2017:0868 RHSA-2017:1208 RHSA-2017:2486 RHSA-2017:2596 RHSA-2017:3189 RHSA-2017:3190 RHSA-2018:0342 RHSA-2018:0478 RHSA-2018:0479 RHSA-2018:0480 RHSA-2018:0481 RHSA-2018:0576 RHSA-2018:0577 RHSA-2018:0676 RHSA-2018:1062 RHSA-2018:1130 RHSA-2018:1170 RHSA-2018:1319 RHSA-2018:1447 RHSA-2018:1448 RHSA-2018:1449 RHSA-2018:1450 RHSA-2018:1451 RHSA-2018:1629 RHSA-2018:1630 RHSA-2018:1632 RHSA-2018:1633 RHSA-2018:1635 RHSA-2018:1636 RHSA-2018:1637 RHSA-2018:1638 RHSA-2018:1639 RHSA-2018:1640 RHSA-2018:1641 RHSA-2018:1642 RHSA-2018:1643 RHSA-2018:1644 RHSA-2018:1645 RHSA-2018:1646 RHSA-2018:1647 RHSA-2018:1648 RHSA-2018:1649 RHSA-2018:1650 RHSA-2018:1651 RHSA-2018:1652 RHSA-2018:1653 RHSA-2018:1654 RHSA-2018:1655 RHSA-2018:1656 RHSA-2018:1657 RHSA-2018:1658 RHSA-2018:1659 RHSA-2018:1660 RHSA-2018:1661 RHSA-2018:1662 RHSA-2018:1663 RHSA-2018:1664 RHSA-2018:1665 RHSA-2018:1666 RHSA-2018:1667 RHSA-2018:1668 RHSA-2018:1669 RHSA-2018:1674 RHSA-2018:1675 RHSA-2018:1676 RHSA-2018:1686 RHSA-2018:1688 RHSA-2018:1689 RHSA-2018:1690 RHSA-2018:1696 RHSA-2018:1700 RHSA-2018:1710 RHSA-2018:1711 RHSA-2018:1737 RHSA-2018:1738 RHSA-2018:1777 RHSA-2018:1820 RHSA-2018:1826 RHSA-2018:1854 RHSA-2018:1965 RHSA-2018:1967 RHSA-2018:1997 RHSA-2018:2001 RHSA-2018:2003 RHSA-2018:2006 RHSA-2018:2060 RHSA-2018:2161 RHSA-2018:2162 RHSA-2018:2164 RHSA-2018:2171 RHSA-2018:2172 RHSA-2018:2216 RHSA-2018:2228 RHSA-2018:2246 RHSA-2018:2250 RHSA-2018:2258 RHSA-2018:2267 RHSA-2018:2268 RHSA-2018:2289 RHSA-2018:2309 RHSA-2018:2328 RHSA-2018:2363 RHSA-2018:2364 RHSA-2018:2384 RHSA-2018:2387 RHSA-2018:2390 RHSA-2018:2394 RHSA-2018:2395 RHSA-2018:2396 RHSA-2018:2669 RHSA-2018:2927 RHSA-2018:2948 RHSA-2018:3083 RHSA-2018:3096 RHSA-2018:3396 RHSA-2018:3397 RHSA-2018:3398 RHSA-2018:3399 RHSA-2018:3400 RHSA-2018:3401 RHSA-2018:3402 RHSA-2018:3407 RHSA-2018:3423 RHSA-2018:3424 RHSA-2018:3425 RHSA-2018:3459 RHSA-2018:3540 RHSA-2018:3586 RHSA-2018:3590 RHSA-2018:3591 RHSA-2019:0148 RHSA-2019:0525 RHSA-2019:0717 RHSA-2019:1046 RHSA-2019:1483 RHSA-2019:1487 RHSA-2019:1944 RHSA-2019:2189 RHSA-2019:2401 RHSA-2019:2473 RHSA-2019:2476 RHSA-2019:2566 RHSA-2019:2696 RHSA-2019:2730 RHSA-2019:3967 RHSA-2019:4057 RHSA-2019:4058 RHSA-2019:4159 RHSA-2019:4164 RHSA-2020:0036 RHSA-2020:0595 RHSA-2020:1265 RHSA-2020:1464 RHSA-2020:3804 RHSA-2020:3810 SECTRACK:1031032 SECTRACK:1031594 SECTRACK:1034077 SECTRACK:1036056 SECTRACK:1036377 SECTRACK:1036378 SECTRACK:1036393 SECTRACK:1036397 SECTRACK:1037036 SECTRACK:1037046 SECTRACK:1037053 SECTRACK:1037640 SECTRACK:1039600 SECTRACK:1040319 SECTRACK:1040446 SECTRACK:1040949 SECTRACK:1041057 SECTRACK:1041294 SECTRACK:1041414 SECTRACK:1042004 SECUNIA:57477 SECUNIA:58128 SECUNIA:58337 SECUNIA:58385 SECUNIA:58433 SECUNIA:58492 SECUNIA:58579 SECUNIA:58615 SECUNIA:58639 SECUNIA:58660 SECUNIA:58667 SECUNIA:58710 SECUNIA:58713 SECUNIA:58714 SECUNIA:58716 SECUNIA:58719 SECUNIA:58742 SECUNIA:58745 SECUNIA:58759 SECUNIA:58851 SECUNIA:58930 SECUNIA:58945 SECUNIA:58947 SECUNIA:58977 SECUNIA:59004 SECUNIA:59012 SECUNIA:59014 SECUNIA:59040 SECUNIA:59043 SECUNIA:59055 SECUNIA:59063 SECUNIA:59093 SECUNIA:59101 SECUNIA:59118 SECUNIA:59132 SECUNIA:59135 SECUNIA:59142 SECUNIA:59163 SECUNIA:59167 SECUNIA:59175 SECUNIA:59186 SECUNIA:59188 SECUNIA:59189 SECUNIA:59190 SECUNIA:59191 SECUNIA:59192 SECUNIA:59202 SECUNIA:59211 SECUNIA:59214 SECUNIA:59215 SECUNIA:59223 SECUNIA:59228 SECUNIA:59231 SECUNIA:59245 SECUNIA:59246 SECUNIA:59264 SECUNIA:59282 SECUNIA:59284 SECUNIA:59287 SECUNIA:59305 SECUNIA:59306 SECUNIA:59310 SECUNIA:59325 SECUNIA:59338 SECUNIA:59347 SECUNIA:59354 SECUNIA:59362 SECUNIA:59364 SECUNIA:59365 SECUNIA:59368 SECUNIA:59370 SECUNIA:59374 SECUNIA:59375 SECUNIA:59380 SECUNIA:59383 SECUNIA:59389 SECUNIA:59429 SECUNIA:59430 SECUNIA:59435 SECUNIA:59437 SECUNIA:59440 SECUNIA:59441 SECUNIA:59442 SECUNIA:59444 SECUNIA:59445 SECUNIA:59446 SECUNIA:59447 SECUNIA:59448 SECUNIA:59449 SECUNIA:59454 SECUNIA:59459 SECUNIA:59460 SECUNIA:59464 SECUNIA:59479 SECUNIA:59480 SECUNIA:59483 SECUNIA:59502 SECUNIA:59506 SECUNIA:59518 SECUNIA:59525 SECUNIA:59529 SECUNIA:59589 SECUNIA:59602 SECUNIA:59661 SECUNIA:59677 SECUNIA:59704 SECUNIA:59718 SECUNIA:59824 SECUNIA:59827 SECUNIA:59878 SECUNIA:59885 SECUNIA:59894 SECUNIA:59916 SECUNIA:60176 SECUNIA:60177 SECUNIA:60522 SECUNIA:60567 SECUNIA:60577 SECUNIA:60703 SECUNIA:60819 SECUNIA:61254 SECUNIA:61815 SMASH Issue 184883 SMASH Issue 190204 SMASH Issue 194646 SMASH Issue 196268 SMASH Issue 196270 SMASH Issue 196659 SMASH Issue 197016 SMASH Issue 197017 SMASH Issue 197538 SMASH Issue 198115 SMASH Issue 198879 SMASH Issue 198893 SMASH Issue 199072 SMASH Issue 199429 SMASH Issue 201048 SMASH Issue 201049 SMASH Issue 201087 SMASH Issue 201398 SMASH Issue 201990 SMASH Issue 202009 SMASH Issue 202739 SMASH Issue 202788 SMASH Issue 204752 SMASH Issue 205325 SMASH Issue 207690 SMASH Issue 207826 SMASH Issue 209220 SMASH Issue 209676 SMASH Issue 211888 SMASH Issue 218336 SMASH Issue 218348 SMASH Issue 218349 SMASH Issue 218448 SMASH Issue 218452 SMASH Issue 218461 SMASH Issue 99325 SUSE:SUSE-SU-2015:0578 SUSE:SUSE-SU-2015:0743 SUSE:SUSE-SU-2018:0010 SUSE:SUSE-SU-2018:0011 SUSE:SUSE-SU-2018:0012 SUSE:SUSE-SU-2018:0383 SUSE:SUSE-SU-2018:0416 SUSE:SUSE-SU-2018:0482 SUSE:SUSE-SU-2018:0555 SUSE:SUSE-SU-2018:0660 SUSE:SUSE-SU-2018:0834 SUSE:SUSE-SU-2018:0841 SUSE:SUSE-SU-2018:0848 SUSE:SUSE-SU-2018:0986 SUSE:openSUSE-SU-2015:0229 SUSE:openSUSE-SU-2015:1911 SUSE:openSUSE-SU-2016:0640 SUSE:openSUSE-SU-2018:0022 SUSE:openSUSE-SU-2018:0023 SUSE:openSUSE-SU-2018:0408 SUSE:openSUSE-SU-2019:1407 SUSE:openSUSE-SU-2019:1438 SUSE:openSUSE-SU-2019:1439 SUSE:openSUSE-SU-2019:2376 SUSE:openSUSE-SU-2019:2379 SUSE:openSUSE-SU-2020:1325 UBUNTU:CVE-2014-0224 UBUNTU:CVE-2017-10661 UBUNTU:CVE-2017-13166 UBUNTU:CVE-2017-13168 UBUNTU:CVE-2017-16648 UBUNTU:CVE-2017-17805 UBUNTU:CVE-2017-17806 UBUNTU:CVE-2017-18017 UBUNTU:CVE-2017-18075 UBUNTU:CVE-2017-18208 UBUNTU:CVE-2017-18232 UBUNTU:CVE-2017-18344 UBUNTU:CVE-2017-8831 UBUNTU:CVE-2018-1000026 UBUNTU:CVE-2018-1000204 UBUNTU:CVE-2018-10021 UBUNTU:CVE-2018-1065 UBUNTU:CVE-2018-10853 UBUNTU:CVE-2018-10882 UBUNTU:CVE-2018-1095 UBUNTU:CVE-2018-1120 UBUNTU:CVE-2018-1122 UBUNTU:CVE-2018-1123 UBUNTU:CVE-2018-1124 UBUNTU:CVE-2018-1125 UBUNTU:CVE-2018-1126 UBUNTU:CVE-2018-13405 UBUNTU:CVE-2018-3639 UBUNTU:CVE-2018-5344 UBUNTU:CVE-2018-5750 UBUNTU:CVE-2018-7566 UBUNTU:CVE-2018-7740 UBUNTU:CVE-2018-7995 UBUNTU:USN-3583-1 UBUNTU:USN-3583-2 UBUNTU:USN-3617-1 UBUNTU:USN-3617-2 UBUNTU:USN-3617-3 UBUNTU:USN-3619-1 UBUNTU:USN-3619-2 UBUNTU:USN-3620-1 UBUNTU:USN-3620-2 UBUNTU:USN-3631-1 UBUNTU:USN-3631-2 UBUNTU:USN-3632-1 UBUNTU:USN-3651-1 UBUNTU:USN-3652-1 UBUNTU:USN-3653-1 UBUNTU:USN-3653-2 UBUNTU:USN-3654-1 UBUNTU:USN-3654-2 UBUNTU:USN-3655-1 UBUNTU:USN-3655-2 UBUNTU:USN-3656-1 UBUNTU:USN-3657-1 UBUNTU:USN-3658-1 UBUNTU:USN-3658-2 UBUNTU:USN-3658-3 UBUNTU:USN-3678-1 UBUNTU:USN-3678-2 UBUNTU:USN-3678-3 UBUNTU:USN-3678-4 UBUNTU:USN-3679-1 UBUNTU:USN-3680-1 UBUNTU:USN-3693-1 UBUNTU:USN-3695-1 UBUNTU:USN-3695-2 UBUNTU:USN-3696-1 UBUNTU:USN-3696-2 UBUNTU:USN-3727-1 UBUNTU:USN-3742-1 UBUNTU:USN-3742-2 UBUNTU:USN-3752-1 UBUNTU:USN-3752-2 UBUNTU:USN-3752-3 UBUNTU:USN-3753-1 UBUNTU:USN-3753-2 UBUNTU:USN-3754-1 UBUNTU:USN-3756-1 UBUNTU:USN-3777-1 UBUNTU:USN-3777-2 UBUNTU:USN-3777-3 UBUNTU:USN-3798-1 UBUNTU:USN-3798-2 UBUNTU:USN-3820-1 UBUNTU:USN-3820-2 UBUNTU:USN-3820-3 UBUNTU:USN-3821-1 UBUNTU:USN-3821-2 UBUNTU:USN-3822-1 UBUNTU:USN-3822-2 USN-3583-1 USN-3583-2 USN-3871-1 USN-3871-3 USN-3871-4 USN-3871-5 USN-3910-1 USN-3910-2 ZDI-16-570 bdo#1033297 bdo#797165 bdo#864859 bdo#866511 bdo#873383 bdo#875881 bdo#899170 bnc#1037994 bnc#1053152 bnc#1053153 bnc#1067087 bnc#1067118 bnc#1072831 bnc#1072865 bnc#1073792 bnc#1073874 bnc#1074488 bnc#1075825 bnc#1077402 bnc#1077404 bnc#1077892 bnc#1079384 bnc#1083483 bnc#1083494 bnc#1083650 bnc#1084353 bnc#1084755 bnc#1085413 bnc#1085447 bnc#1087004 bnc#1089281 bnc#1096723 bnc#1099849 bnc#1102851 bnc#1103203 bnc#1103580 bnc#882572 bnc#885777 bnc#901237 bnc#903703 bnc#905857 bnc#914447 bnc#916239 http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2638fd0f92d4397884fd991d8f4925cb3f081901 http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=318aaf34f1179b39fa9c30fa0f3288b645beee39 linux.git:commit:7f7ccc2ccc2e70c6054685f5e3522efa81556830 linux.git:commit:c37e9e013469521d9adb932d17a1795c139b36db linux.git:commit:ce3fd194fcc6fbdc00ce095a852f22df97baa401 linux.git:commit:d36260050e1881dce09625a9352d8729c911a6e3 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1091938 rh#1103586 rh#1112877 rh#1243852 rh#1343538 rh#1343540 rh#1396963 rh#1396971 rh#1435719 rh#1449980 rh#1462147 rh#1462158 rh#1481136 rh#1481178 rh#1485274 rh#1495089 rh#1498016 rh#1516257 rh#1519780 rh#1527393 rh#1528312 rh#1528323 rh#1531135 rh#1533909 rh#1539508 rh#1539599 rh#1539706 rh#1541846 rh#1547824 rh#1548412 rh#1550142 rh#1551565 rh#1552867 rh#1553911 rh#1558066 rh#1560777 rh#1560782 rh#1560788 rh#1560793 rh#1566407 rh#1566890 rh#1575465 rh#1575466 rh#1575472 rh#1575474 rh#1575852 rh#1575853 rh#1575866 rh#1589324 rh#1589890 rh#1596773 rh#1596795 rh#1596812 rh#1596842 rh#1599161 rh#1601704 rh#1609664 rh#1610958 rh#1658985 rh#1890354 rh#2027239 rh#2044863 rh#2061700 rh#2119127 |
CVE-2018-10903 | python-cryptography:Released | important | 5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) | CONFIRM:bugzilla.redhat.com:CVE-2018-10903 CONFIRM:github.com:CVE-2018-10903 CVE-2018-10903 D:CVE-2018-10903 RH:CVE-2018-10903 RHSA-2018:3600 SMASH Issue 211072 UBUNTU:CVE-2018-10903 UBUNTU:USN-3720-1 bnc#1101820 rh#1602931 |
CVE-2018-1092 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2018-1092 DEBIAN:DSA-4187 DEBIAN:DSA-4188 DSA-4187 DSA-4188 MISC:bugzilla.kernel.org:CVE-2018-1092 MISC:bugzilla.kernel.org:CVE-2018-1093 MISC:bugzilla.kernel.org:CVE-2018-1094 MISC:bugzilla.kernel.org:CVE-2018-1095 MISC:git.kernel.org:CVE-2018-1092 MISC:openwall.com:CVE-2018-1095 MLIST:[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update OSS:2018/Q1/284 OSS:2018/Q2/60 Oracle:CVE-2018-3639 RH:CVE-2018-1092 RHSA-2018:2948 RHSA-2018:3083 RHSA-2018:3096 SMASH Issue 202736 UBUNTU:CVE-2018-1092 UBUNTU:USN-3676-1 UBUNTU:USN-3676-2 UBUNTU:USN-3677-1 UBUNTU:USN-3677-2 UBUNTU:USN-3678-1 UBUNTU:USN-3678-2 UBUNTU:USN-3678-3 UBUNTU:USN-3678-4 UBUNTU:USN-3754-1 bnc#1087012 linux.git:commit:8e4b5eae5decd9dfe5a4ee369c22028f90ab4c44 rh#1527393 rh#1560777 rh#1560782 rh#1560788 rh#1560793 |
CVE-2018-1093 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2018-1093 DSA-4188 MISC:bugzilla.kernel.org:CVE-2018-1092 MISC:bugzilla.kernel.org:CVE-2018-1093 MISC:bugzilla.kernel.org:CVE-2018-1094 MISC:bugzilla.kernel.org:CVE-2018-1095 MISC:git.kernel.org:CVE-2018-1093 MLIST:[debian-lts-announce] 20180601 [SECURITY] [DLA 1392-1] linux security update OSS:2018/Q1/284 Oracle:CVE-2018-3639 RH:CVE-2018-1093 RHSA-2018:2948 RHSA-2018:3083 RHSA-2018:3096 SMASH Issue 202737 UBUNTU:CVE-2018-1093 bnc#1087095 linux.git:commit:7dac4a1726a9c64a517d595c40e95e2d0d135f6f rh#1527393 rh#1560777 rh#1560782 rh#1560788 rh#1560793 |
CVE-2018-1094 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2018-1094 MISC:bugzilla.kernel.org:CVE-2018-1092 MISC:bugzilla.kernel.org:CVE-2018-1093 MISC:bugzilla.kernel.org:CVE-2018-1094 MISC:bugzilla.kernel.org:CVE-2018-1095 MISC:git.kernel.org:CVE-2018-1094 MISC:openwall.com:CVE-2018-1095 OSS:2018/Q1/284 Oracle:CVE-2018-3639 RH:CVE-2018-1094 RHSA-2018:2948 RHSA-2018:3083 RHSA-2018:3096 SMASH Issue 202738 UBUNTU:CVE-2018-1094 UBUNTU:USN-3695-1 UBUNTU:USN-3695-2 bnc#1087007 linux.git:commit:a45403b51582a87872927a3e0fc0a389c26867f1 rh#1527393 rh#1560777 rh#1560782 rh#1560788 rh#1560793 |
CVE-2018-10940 | kernel-source-rt:Already fixed | moderate | 6.2 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) | BID:104154 CVE-2018-10940 MISC:git.kernel.org:CVE-2018-10940 MISC:github.com:CVE-2018-10940 MISC:www.kernel.org:CVE-2018-10940 OSS:2018/09/18/4 OSS:2018/09/25/4 Oracle:CVE-2018-3639 RH:CVE-2018-10940 RHSA-2018:2948 RHSA-2018:3083 RHSA-2018:3096 SMASH Issue 205476 UBUNTU:CVE-2018-10940 bnc#1092903 linux.git:commit:e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276 rh#1575866 rh#1577408 rh#1645140 rh#1890354 |
CVE-2018-1095 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:bugzilla.redhat.com:CVE-2018-10882 CVE-2018-10882 CVE-2018-1095 MISC:bugzilla.kernel.org:CVE-2018-1092 MISC:bugzilla.kernel.org:CVE-2018-1093 MISC:bugzilla.kernel.org:CVE-2018-1094 MISC:bugzilla.kernel.org:CVE-2018-1095 MISC:git.kernel.org:CVE-2018-1095 MISC:openwall.com:CVE-2018-1095 OSS:2018/Q1/284 RH:CVE-2018-1095 RHSA-2018:2948 RHSA-2018:3083 RHSA-2018:3096 SMASH Issue 202739 UBUNTU:CVE-2018-1095 UBUNTU:USN-3695-1 UBUNTU:USN-3695-2 bnc#1087004 linux.git:commit:ce3fd194fcc6fbdc00ce095a852f22df97baa401 rh#1560777 rh#1560782 rh#1560788 rh#1560793 rh#1596842 |
CVE-2018-11232 | kernel-source-rt:Unsupported | moderate | () | CVE-2018-11232 MISC:git.kernel.org:CVE-2018-11232 MISC:github.com:CVE-2018-11232 MISC:www.kernel.org:CVE-2018-11232 RH:CVE-2018-11232 SMASH Issue 206090 UBUNTU:CVE-2018-11232 bnc#1093846 rh#1580583 |
CVE-2018-11412 | kernel-source-rt:Not affected | moderate | 6.8 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | BID:104291 CVE-2018-11412 EXPLOIT-DB:44832 MISC:bugs.chromium.org:CVE-2018-11412 MISC:bugzilla.kernel.org:CVE-2018-11412 RH:CVE-2018-11412 RHSA-2019:0525 SMASH Issue 206431 UBUNTU:CVE-2018-11412 bnc#1094678 linux.git:commit:117166efb1ee8f13c38f9e96b258f16d4923f888 linux.git:commit:eb9b5f01c33adebc31cbc236c02695f605b0e417 rh#1582358 |
CVE-2018-11506 | kernel-source-rt:Not affected | moderate | 5.7 (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H) | CVE-2018-11506 D:CVE-2018-11506 L3:53760 MISC:git.kernel.org:CVE-2018-11506 MISC:github.com:CVE-2018-11506 MISC:twitter.com:CVE-2018-11506 MLIST:[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update MLIST:[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update MLIST:[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package RH:CVE-2018-11506 RHSA-2018:2948 SMASH Issue 206566 UBUNTU:CVE-2018-11506 UBUNTU:USN-3752-1 UBUNTU:USN-3752-2 UBUNTU:USN-3752-3 bnc#1094835 rh#1583210 |
CVE-2018-12233 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L) | BID:104452 CVE-2018-12233 DSA-5378 MISC:lkml.org:CVE-2018-12233 MISC:marc.info:CVE-2018-12233 MLIST:[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update MLIST:[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update MLIST:[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2018-3639 Oracle:CVE-2018-3646 RH:CVE-2018-12233 SMASH Issue 207866 UBUNTU:CVE-2018-12233 UBUNTU:USN-3752-1 UBUNTU:USN-3752-2 UBUNTU:USN-3752-3 UBUNTU:USN-3753-1 UBUNTU:USN-3753-2 UBUNTU:USN-3754-1 bdo#1033297 bnc#1097234 rh#1519780 rh#1527393 rh#1573699 rh#1575472 rh#1590205 rh#1599161 rh#2027239 rh#2044863 rh#2061700 rh#2119127 |
CVE-2018-12633 | kernel-source-rt:Unsupported | moderate | () | CVE-2018-12633 MISC:bugzilla.kernel.org:CVE-2018-12633 MISC:git.kernel.org:CVE-2018-12633 MISC:github.com:CVE-2018-12633 RH:CVE-2018-12633 SMASH Issue 208631 UBUNTU:CVE-2018-12633 bnc#1098726 rh#1594170 |
CVE-2018-12699 | binutils:Already fixed | moderate | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | BID:104540 CONFIRM:security.netapp.com:CVE-2021-45078 CVE-2018-12699 D:CVE-2018-12699 FEDORA:FEDORA-2021-3614c0b466 FEDORA:FEDORA-2021-f2c6802743 GLSA-201908-01 GLSA-202208-30 L3:62422 L3:62677 L3:64009 MISC:bugs.launchpad.net:CVE-2018-12700 MISC:gcc.gnu.org:CVE-2018-12700 MISC:sourceware.org:CVE-2018-12700 MISC:sourceware.org:CVE-2021-45078 RH:CVE-2018-12699 SMASH Issue 208719 UBUNTU:CVE-2018-12699 bnc#1098941 bnc#1194310 bnc#1195893 bnc#1202864 jsc#CAR-1348 rh#1595427 rh#2033715 |
CVE-2018-12714 | kernel-source-rt:Unsupported | important | () | BID:104544 CVE-2018-12714 D:CVE-2018-12714 MISC:bugzilla.kernel.org:CVE-2018-12714 MISC:git.kernel.org:CVE-2018-12714 MISC:github.com:CVE-2018-12714 RH:CVE-2018-12714 SMASH Issue 208725 UBUNTU:CVE-2018-12714 bnc#1098933 rh#1595835 |
CVE-2018-12896 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2018-12896 D:CVE-2018-12896 MISC:bugzilla.kernel.org:CVE-2018-12896 MISC:github.com:CVE-2018-12896 OSS:2018/09/18/4 OSS:2018/09/25/4 RH:CVE-2018-12896 SMASH Issue 209270 UBUNTU:CVE-2018-12896 bnc#1099922 rh#1575866 rh#1597759 rh#1890354 |
CVE-2018-12904 | kernel-source-rt:Not affected | important | 8.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H) | CVE-2018-12904 DSA-5378 EXPLOIT-DB:44944 MISC:bugs.chromium.org:CVE-2018-12904 MISC:cdn.kernel.org:CVE-2018-12904 MISC:git.kernel.org:CVE-2018-12904 MISC:github.com:CVE-2018-12904 OSS:2018/Q2/246 OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2018-5390 RH:CVE-2018-12904 SMASH Issue 208874 UBUNTU:CVE-2018-12904 UBUNTU:USN-3752-1 UBUNTU:USN-3752-2 UBUNTU:USN-3752-3 bdo#1033297 bnc#1099183 rh#1519780 rh#1527393 rh#1573699 rh#1575472 rh#1595143 rh#1599161 rh#1601704 rh#2027239 rh#2044863 rh#2061700 rh#2119127 |
CVE-2018-12928 | kernel-source-rt:Not affected | moderate | 3.3 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | BID:104593 CVE-2018-12928 MISC:bugs.launchpad.net:CVE-2018-12928 MISC:marc.info:CVE-2018-12928 RH:CVE-2018-12928 SMASH Issue 209133 UBUNTU:CVE-2018-12928 bnc#1099613 rh#1597826 |
CVE-2018-12929 | kernel-source-rt:Unsupported | moderate | 5.3 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) | BID:104588 CVE-2018-12929 MISC:bugs.launchpad.net:CVE-2018-12931 MISC:marc.info:CVE-2018-12931 RH:CVE-2018-12929 RHSA-2019:0641 SMASH Issue 209134 UBUNTU:CVE-2018-12929 bnc#1099614 rh#1597831 |
CVE-2018-12930 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) | CVE-2018-12930 RH:CVE-2018-12930 RHSA-2019:0641 SMASH Issue 209135 UBUNTU:CVE-2018-12930 bnc#1099619 rh#1597837 |
CVE-2018-12931 | kernel-source-rt:Unsupported | important | () | CVE-2018-12931 RH:CVE-2018-12931 RHSA-2019:0641 SMASH Issue 209136 UBUNTU:CVE-2018-12931 bnc#1099612 rh#1597843 |
CVE-2018-13053 | kernel-source-rt:Already fixed | low | 3.3 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | BID:104671 CVE-2018-13053 D:CVE-2018-13053 DSA-5378 MISC:bugzilla.kernel.org:CVE-2018-13053 MISC:git.kernel.org:CVE-2018-13053 OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2018-3646 Oracle:CVE-2018-5390 RH:CVE-2018-13053 RHSA-2019:0831 RHSA-2019:2029 RHSA-2019:2043 SMASH Issue 209250 UBUNTU:CVE-2018-13053 bdo#1033297 bnc#1099924 rh#1519780 rh#1527393 rh#1573699 rh#1575472 rh#1597747 rh#1599161 rh#1601704 rh#1609664 rh#2027239 rh#2044863 rh#2061700 rh#2119127 |
CVE-2018-13093 | kernel-source-rt:Not affected | moderate | 6.1 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H) | CVE-2018-13093 MISC:bugzilla.kernel.org:CVE-2018-13093 MISC:git.kernel.org:CVE-2018-13093 MISC:github.com:CVE-2018-13093 OSS:2018/09/18/4 OSS:2018/09/25/4 RH:CVE-2018-13093 RHSA-2019:2029 RHSA-2019:2043 SMASH Issue 209317 UBUNTU:CVE-2018-13093 bnc#1100001 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1575866 rh#1597766 rh#1609664 rh#1660375 rh#1660385 rh#1667782 rh#1686136 rh#1701224 rh#1701842 rh#1890354 |
CVE-2018-13095 | kernel-source-rt:Not affected | moderate | 6.1 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H) | CVE-2018-13095 MISC:bugzilla.kernel.org:CVE-2018-13095 MISC:git.kernel.org:CVE-2018-13095 MISC:github.com:CVE-2018-13095 OSS:2018/09/18/4 RH:CVE-2018-13095 RHSA-2019:1350 RHSA-2019:2029 RHSA-2019:2043 SMASH Issue 209319 UBUNTU:CVE-2018-13095 bnc#1099999 rh#1575866 rh#1597775 rh#1890354 |
CVE-2018-13096 | kernel-source-rt:Unsupported | moderate | () | CONFIRM:git.kernel.org:CVE-2018-13096 CVE-2018-13096 MISC:bugzilla.kernel.org:CVE-2018-13096 MISC:git.kernel.org:CVE-2018-13096 MISC:packetstormsecurity.com:CVE-2018-19985 MISC:seclists.org:CVE-2018-19985 MLIST:[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update OSS:2018/09/18/4 RH:CVE-2018-13096 SMASH Issue 209320 SUSE:openSUSE-SU-2018:3202 UBUNTU:CVE-2018-13096 UBUNTU:USN-3821-1 UBUNTU:USN-3821-2 USN-4094-1 USN-4118-1 bnc#1100062 rh#1597782 |
CVE-2018-13405 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N) | AIXAPAR:IT02314 AIXAPAR:IV61506 BID:100215 BID:100503 BID:100514 BID:100861 BID:101758 BID:102291 BID:102293 BID:102367 BID:102503 BID:102813 BID:103356 BID:103423 BID:103459 BID:103605 BID:104229 BID:104232 BID:104909 BID:105647 BID:105656 BID:105658 BID:106503 BID:67121 BID:79091 BID:91067 BID:91068 BID:91787 BID:91869 BID:93132 BID:93287 BID:93604 BID:94371 BID:94377 BID:94925 BID:95429 BID:99619 BUGTRAQ:20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities BUGTRAQ:20190624 [SECURITY] [DSA 4469-1] libvirt security update CERT-VN:VU#180049 CERT-VN:VU#978508 CERT:TA18-141A CISCO:20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products CISCO:20180522 CPU Side-Channel Information Disclosure Vulnerabilities: May 2018 CONFIRM:access.redhat.com:CVE-2014-0114 CONFIRM:access.redhat.com:CVE-2014-0224 CONFIRM:advisories.mageia.org:CVE-2014-0114 CONFIRM:aix.software.ibm.com:CVE-2014-3470 CONFIRM:blogs.oracle.com:CVE-2014-0224 CONFIRM:bugs.jython.org:CVE-2016-4000 CONFIRM:bugs.launchpad.net:CVE-2015-8866 CONFIRM:bugs.launchpad.net:CVE-2015-8867 CONFIRM:bugs.php.net:CVE-2015-8866 CONFIRM:bugs.php.net:CVE-2015-8867 CONFIRM:bugzilla.kernel.org:CVE-2018-10876 CONFIRM:bugzilla.kernel.org:CVE-2018-10880 CONFIRM:bugzilla.kernel.org:CVE-2018-10882 CONFIRM:bugzilla.redhat.com:CVE-2018-10853 CONFIRM:bugzilla.redhat.com:CVE-2018-10876 CONFIRM:bugzilla.redhat.com:CVE-2018-10877 CONFIRM:bugzilla.redhat.com:CVE-2018-10880 CONFIRM:bugzilla.redhat.com:CVE-2018-10882 CONFIRM:bugzilla.redhat.com:CVE-2018-1120 CONFIRM:bugzilla.redhat.com:CVE-2018-1122 CONFIRM:bugzilla.redhat.com:CVE-2018-1123 CONFIRM:bugzilla.redhat.com:CVE-2018-1124 CONFIRM:bugzilla.redhat.com:CVE-2018-1125 CONFIRM:bugzilla.redhat.com:CVE-2018-1126 CONFIRM:cdn.kernel.org:CVE-2018-5803 CONFIRM:cert-portal.siemens.com:CVE-2017-5715 CONFIRM:cert-portal.siemens.com:CVE-2017-5753 CONFIRM:cert-portal.siemens.com:CVE-2018-3640 CONFIRM:commons.apache.org:CVE-2014-0114 CONFIRM:dev.mysql.com:CVE-2014-0224 CONFIRM:developer.arm.com:CVE-2017-5754 CONFIRM:discussions.nessus.org:CVE-2014-0224 CONFIRM:esupport.trendmicro.com:CVE-2014-0224 CONFIRM:filezilla-project.org:CVE-2014-0224 CONFIRM:git.kernel.org:CVE-2017-10661 CONFIRM:git.kernel.org:CVE-2017-17805 CONFIRM:git.kernel.org:CVE-2017-17806 CONFIRM:git.kernel.org:CVE-2017-18075 CONFIRM:git.kernel.org:CVE-2018-1068 CONFIRM:git.kernel.org:CVE-2018-10853 CONFIRM:git.kernel.org:CVE-2018-10876 CONFIRM:git.kernel.org:CVE-2018-10880 CONFIRM:git.kernel.org:CVE-2018-10882 CONFIRM:git.kernel.org:CVE-2018-1120 CONFIRM:git.kernel.org:CVE-2018-13405 CONFIRM:git.kernel.org:CVE-2018-5803 CONFIRM:git.kernel.org:CVE-2018-7566 CONFIRM:git.openssl.org:CVE-2014-0224 CONFIRM:git.php.net:CVE-2015-8866 CONFIRM:git.php.net:CVE-2015-8867 CONFIRM:github.com:CVE-2016-1182 CONFIRM:github.com:CVE-2016-9389 CONFIRM:github.com:CVE-2016-9394 CONFIRM:github.com:CVE-2016-9583 CONFIRM:github.com:CVE-2017-10661 CONFIRM:github.com:CVE-2017-14735 CONFIRM:github.com:CVE-2017-17805 CONFIRM:github.com:CVE-2017-17806 CONFIRM:github.com:CVE-2017-18075 CONFIRM:github.com:CVE-2017-8831 CONFIRM:github.com:CVE-2018-1000204 CONFIRM:github.com:CVE-2018-1068 CONFIRM:h20566.www2.hpe.com:CVE-2016-0705 CONFIRM:h20566.www2.hpe.com:CVE-2016-0763 CONFIRM:h20566.www2.hpe.com:CVE-2016-5388 CONFIRM:help.ecostruxureit.com:CVE-2017-5754 CONFIRM:hg.python.org:CVE-2016-4000 CONFIRM:issues.apache.org:CVE-2014-0114 CONFIRM:issues.apache.org:CVE-2015-1832 CONFIRM:issues.apache.org:CVE-2016-1000031 CONFIRM:kb.bluecoat.com:CVE-2014-3470 CONFIRM:kb.juniper.net:CVE-2014-0224 CONFIRM:kb.juniper.net:CVE-2014-3470 CONFIRM:kc.mcafee.com:CVE-2014-3470 CONFIRM:kc.mcafee.com:CVE-2017-12942 CONFIRM:linux.oracle.com:CVE-2014-3510 CONFIRM:nvidia.custhelp.com:CVE-2017-0330 CONFIRM:patchwork.kernel.org:CVE-2018-5750 CONFIRM:patchwork.ozlabs.org:CVE-2018-10876 CONFIRM:patchwork.ozlabs.org:CVE-2018-10880 CONFIRM:portal.msrc.microsoft.com:CVE-2018-3639 CONFIRM:psirt.global.sonicwall.com:CVE-2018-3639 CONFIRM:puppetlabs.com:CVE-2014-0224 CONFIRM:rwkbp.makekb.com:CVE-2015-8965 CONFIRM:security-tracker.debian.org:CVE-2016-1181 CONFIRM:security-tracker.debian.org:CVE-2016-1182 CONFIRM:security.netapp.com:CVE-2014-0114 CONFIRM:security.netapp.com:CVE-2016-1000031 CONFIRM:security.netapp.com:CVE-2016-1182 CONFIRM:security.netapp.com:CVE-2017-5645 CONFIRM:security.netapp.com:CVE-2018-3640 CONFIRM:source.android.com:CVE-2017-10663 CONFIRM:source.android.com:CVE-2017-6280 CONFIRM:support.apple.com:CVE-2014-4979 CONFIRM:support.citrix.com:CVE-2014-3470 CONFIRM:support.citrix.com:CVE-2018-3639 CONFIRM:support.f5.com:CVE-2014-0224 CONFIRM:support.f5.com:CVE-2017-18017 CONFIRM:support.f5.com:CVE-2018-13405 CONFIRM:support.hpe.com:CVE-2018-3640 CONFIRM:support.lenovo.com:CVE-2018-3640 CONFIRM:support.oracle.com:CVE-2018-3639 CONFIRM:svn.apache.org:CVE-2015-1832 CONFIRM:www-01.ibm.com:CVE-2014-0114 CONFIRM:www-01.ibm.com:CVE-2014-0224 CONFIRM:www-01.ibm.com:CVE-2014-3022 CONFIRM:www-01.ibm.com:CVE-2014-3470 CONFIRM:www-01.ibm.com:CVE-2015-1832 CONFIRM:www-947.ibm.com:CVE-2014-0224 CONFIRM:www-947.ibm.com:CVE-2014-3470 CONFIRM:www.blackberry.com:CVE-2014-3470 CONFIRM:www.f-secure.com:CVE-2014-3470 CONFIRM:www.fortiguard.com:CVE-2014-0224 CONFIRM:www.fujitsu.com:CVE-2018-3640 CONFIRM:www.huawei.com:CVE-2014-3470 CONFIRM:www.ibm.com:CVE-2014-0224 CONFIRM:www.ibm.com:CVE-2014-0963 CONFIRM:www.ibm.com:CVE-2014-3470 CONFIRM:www.innominate.com:CVE-2014-0224 CONFIRM:www.intel.com:CVE-2018-3640 CONFIRM:www.intersectalliance.com:CVE-2014-0224 CONFIRM:www.kerio.com:CVE-2014-3857 CONFIRM:www.kernel.org:CVE-2017-10661 CONFIRM:www.kernel.org:CVE-2017-17806 CONFIRM:www.kernel.org:CVE-2017-18075 CONFIRM:www.mitel.com:CVE-2018-3640 CONFIRM:www.novell.com:CVE-2014-3470 CONFIRM:www.openssl.org:CVE-2014-3470 CONFIRM:www.oracle.com:CVE-2014-0114 CONFIRM:www.oracle.com:CVE-2014-4271 CONFIRM:www.oracle.com:CVE-2014-6564 CONFIRM:www.oracle.com:CVE-2015-0437 CONFIRM:www.oracle.com:CVE-2016-5477 CONFIRM:www.oracle.com:CVE-2017-3626 CONFIRM:www.oracle.com:CVE-2017-5689 CONFIRM:www.oracle.com:CVE-2017-5709 CONFIRM:www.oracle.com:CVE-2017-5715 CONFIRM:www.oracle.com:CVE-2017-5753 CONFIRM:www.oracle.com:CVE-2017-6074 CONFIRM:www.splunk.com:CVE-2014-3470 CONFIRM:www.synology.com:CVE-2018-3640 CONFIRM:www.tenable.com:CVE-2014-0224 CONFIRM:www.vmware.com:CVE-2014-0114 CONFIRM:www.vmware.com:CVE-2014-3470 CONFIRM:www.vmware.com:CVE-2014-8371 CONFIRM:www.websense.com:CVE-2015-2773 CONFIRM:www14.software.ibm.com:CVE-2014-3470 CONFIRM:xenbits.xen.org:CVE-2018-3639 CVE-2014-0114 CVE-2014-0224 CVE-2014-4651 CVE-2015-0852 CVE-2015-1832 CVE-2015-2613 CVE-2015-2769 CVE-2015-2770 CVE-2015-7940 CVE-2015-8965 CVE-2015-9251 CVE-2016-0635 CVE-2016-1000031 CVE-2016-1181 CVE-2016-1182 CVE-2016-4000 CVE-2016-5684 CVE-2016-6814 CVE-2016-9389 CVE-2016-9392 CVE-2016-9583 CVE-2017-0379 CVE-2017-10661 CVE-2017-13166 CVE-2017-13168 CVE-2017-13745 CVE-2017-14229 CVE-2017-14735 CVE-2017-15095 CVE-2017-16012 CVE-2017-16648 CVE-2017-17805 CVE-2017-17806 CVE-2017-18017 CVE-2017-18075 CVE-2017-18232 CVE-2017-18344 CVE-2017-8813 CVE-2017-8831 CVE-2018-1000026 CVE-2018-1000204 CVE-2018-10021 CVE-2018-1065 CVE-2018-1068 CVE-2018-10853 CVE-2018-10876 CVE-2018-10877 CVE-2018-10880 CVE-2018-10882 CVE-2018-1120 CVE-2018-1122 CVE-2018-1123 CVE-2018-1124 CVE-2018-1125 CVE-2018-1126 CVE-2018-13405 CVE-2018-3639 CVE-2018-5344 CVE-2018-5750 CVE-2018-5803 CVE-2018-7566 CVE-2018-7995 D:CVE-2014-0224 D:CVE-2017-10661 D:CVE-2017-8831 D:CVE-2018-1068 D:CVE-2018-1126 D:CVE-2018-3639 D:CVE-2018-5750 D:CVE-2018-5803 DEBIAN:DSA-3959 DEBIAN:DSA-4073 DEBIAN:DSA-4082 DEBIAN:DSA-4120 DEBIAN:DSA-4187 DEBIAN:DSA-4188 DEBIAN:DSA-4208 DEBIAN:DSA-4210 DEBIAN:DSA-4266 DEBIAN:DSA-4273 DSA-2940 DSA-2950 DSA-3392 DSA-3417 DSA-3893 DSA-3981 DSA-4073 DSA-4082 DSA-4120 DSA-4187 DSA-4188 DSA-4208 DSA-4210 DSA-4266 DSA-4273 DSA-5257 DSA-5378 EXPLOIT-DB:43345 EXPLOIT-DB:44695 EXPLOIT-DB:45033 EXPLOIT-DB:45175 FEDORA:FEDORA-2014-9301 FEDORA:FEDORA-2014-9308 FEDORA:FEDORA-2014-9380 FEDORA:FEDORA-2015-16104 FEDORA:FEDORA-2015-16105 FEDORA:FEDORA-2015-16106 FEDORA:FEDORA-2015-7d95466eda FEDORA:FEDORA-2015-992342e82f FEDORA:FEDORA-2015-decbab7c9f FEDORA:FEDORA-2022-3a60c34473 FEDORA:FEDORA-2022-5d0676b098 FULLDISC:20140607 Re: More OpenSSL issues FULLDISC:20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities GENTOO:GLSA-201407-05 GENTOO:GLSA-201607-09 GENTOO:GLSA-201701-68 GENTOO:GLSA-201710-28 HP:HPSBGN03041 HP:HPSBGN03050 HP:HPSBGN03068 HP:HPSBHF03052 HP:HPSBHF03088 HP:HPSBHF03145 HP:HPSBMU03051 HP:HPSBMU03053 HP:HPSBMU03055 HP:HPSBMU03056 HP:HPSBMU03057 HP:HPSBMU03058 HP:HPSBMU03062 HP:HPSBMU03065 HP:HPSBMU03070 HP:HPSBMU03071 HP:HPSBMU03074 HP:HPSBMU03076 HP:HPSBMU03078 HP:HPSBMU03083 HP:HPSBMU03089 HP:HPSBMU03090 HP:HPSBMU03094 HP:HPSBMU03101 HP:HPSBOV03047 HP:HPSBPI03107 HP:HPSBST03097 HP:HPSBST03098 HP:HPSBST03103 HP:HPSBST03106 HP:HPSBST03160 HP:HPSBST03195 HP:HPSBST03265 HP:HPSBUX03046 HP:SSRT101818 JVN:JVN#03188560 JVN:JVN#65044642 JVNDB:JVNDB-2016-000096 JVNDB:JVNDB-2016-000097 L3:41161 L3:42389 MANDRIVA:MDVSA-2014:095 MANDRIVA:MDVSA-2014:105 MANDRIVA:MDVSA-2014:106 MANDRIVA:MDVSA-2015:062 MISC:blogs.gentoo.org:CVE-2016-9399 MISC:bugs.chromium.org:CVE-2018-3639 MISC:bugs.launchpad.net:CVE-2017-18017 MISC:bugs.launchpad.net:OSS:2018/Q3/76 MISC:bugzilla.kernel.org:CVE-2017-8831 MISC:bugzilla.redhat.com:MLIST:[oss-security] 20200610 kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768 MISC:ccsinjection.lepidum.co.jp:CVE-2014-0224 MISC:cdn.kernel.org:CVE-2017-18344 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:eprint.iacr.org:CVE-2017-0379 MISC:git.gnupg.org:CVE-2017-0379 MISC:git.kernel.org:CVE-2017-18017 MISC:git.kernel.org:CVE-2017-18232 MISC:git.kernel.org:CVE-2018-10021 MISC:git.kernel.org:CVE-2018-1065 MISC:git.kernel.org:CVE-2018-13405 MISC:git.kernel.org:CVE-2018-5344 MISC:git.kernel.org:CVE-2018-7995 MISC:git.kernel.org:OSS:2014/03/05/6 MISC:git.kernel.org:OSS:2018/Q3/35 MISC:git.kernel.org:OSS:2020/Q1/69 MISC:github.com:CVE-2015-9251 MISC:github.com:CVE-2017-14229 MISC:github.com:CVE-2017-18017 MISC:github.com:CVE-2017-18232 MISC:github.com:CVE-2017-18344 MISC:github.com:CVE-2018-10021 MISC:github.com:CVE-2018-1065 MISC:github.com:CVE-2018-13405 MISC:github.com:CVE-2018-5344 MISC:github.com:OSS:2018/Q3/76 MISC:gitlab.com:OSS:2018/Q2/136 MISC:groups.google.com:CVE-2017-16648 MISC:ics-cert.us-cert.gov:CVE-2015-9251 MISC:lists.debian.org:CVE-2017-0379 MISC:lists.openwall.net:CVE-2018-1065 MISC:lkml.org:CVE-2017-18017 MISC:lkml.org:CVE-2018-7995 MISC:mail-archives.apache.org:CVE-2016-6814 MISC:openwall.com:CVE-2018-13405 MISC:patchwork.kernel.org:CVE-2017-16648 MISC:patchwork.ozlabs.org:CVE-2017-18017 MISC:patchwork.ozlabs.org:CVE-2018-1000026 MISC:patchwork.ozlabs.org:CVE-2018-1065 MISC:secuniaresearch.flexerasoftware.com:CVE-2018-5803 MISC:security-tracker.debian.org:CVE-2016-4000 MISC:security-tracker.debian.org:CVE-2017-0379 MISC:snyk.io:CVE-2015-9251 MISC:snyk.io:CVE-2016-4000 MISC:sw.aveva.com:CVE-2015-9251 MISC:twitter.com:CVE-2018-13405 MISC:web-in-security.blogspot.ca:CVE-2015-7940 MISC:www.arista.com:CVE-2017-18017 MISC:www.imperialviolet.org:CVE-2014-0224 MISC:www.kernel.org:CVE-2017-18017 MISC:www.openwall.com:CVE-2018-1000204 MISC:www.openwall.com:CVE-2018-10853 MISC:www.oracle.com:CVE-2014-0107 MISC:www.oracle.com:CVE-2015-7501 MISC:www.qualys.com:OSS:2018/Q2/122 MISC:www.securityfocus.com:CVE-2017-8831 MISC:www.talosintelligence.com:CVE-2016-5684 MISC:www.tenable.com:CVE-2016-1000031 MISC:www.tenable.com:CVE-2016-6793 MLIST:[alsa-devel] 20180214 [PATCH] ALSA: seq: Fix racy pool initializations MLIST:[announce] 20181105 [SECURITY] Immediately upgrade commons-fileupload to version 1.3.3 when running Struts 2.3.36 or prior MLIST:[apache-ignite-developers] 20180601 [CVE-2014-0114]: Apache Ignite is vulnerable to existing CVE-2014-0114 MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 MLIST:[debian-lts-announce] 20180107 [SECURITY] [DLA 1232-1] linux security update MLIST:[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update MLIST:[debian-lts-announce] 20180531 [SECURITY] [DLA 1390-1] procps security update MLIST:[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update MLIST:[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update MLIST:[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package MLIST:[debian-lts-announce] 20180727 [SECURITY] [DLA 1446-1] intel-microcode security update MLIST:[debian-lts-announce] 20180815 [SECURITY] [DLA 1466-1] linux-4.9 security update MLIST:[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update MLIST:[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update MLIST:[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update MLIST:[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update MLIST:[debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update MLIST:[linux-netdev] 20180305 BUG: unable to handle kernel paging request in compat_copy_entries MLIST:[linux-netdev] 20180305 [PATCH net] netfilter: check for out-of-bounds while copying compat entries MLIST:[linux-sctp] 20180209 skb_over_panic on INIT/INIT_ACK packet sending MLIST:[netdev] 20180116 http://lists.openwall.net/netdev/2018/01/16/40 MLIST:[netdev] 20180118 http://lists.openwall.net/netdev/2018/01/18/96 MLIST:[netdev] 20180207 [Secunia Research] Linux Kernel Vulnerability - Sending information MLIST:[oss-security] 20140616 CVE request for commons-beanutils: 'class' property is exposed, potentially leading to RCE MLIST:[oss-security] 20140707 Re: CVE request for commons-beanutils: 'class' property is exposed, potentially leading to RCE MLIST:[oss-security] 20150828 CVE-2015-0852 [FreeImage] Integer overflow in PluginPCX.cpp MLIST:[oss-security] 20151022 CVE Request: invalid curve attack on bouncycastle MLIST:[oss-security] 20151022 Re: CVE Request: invalid curve attack on bouncycastle MLIST:[oss-security] 20161117 Re: jasper: multiple assertion failures MLIST:[oss-security] 20200610 Re: kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768 MLIST:[oss-security] 20200610 kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768 OSS:2014/03/05/6 OSS:2017/Q3/526 OSS:2017/Q4/244 OSS:2018/Q1/212 OSS:2018/Q1/240 OSS:2018/Q2/136 OSS:2018/Q3/208 OSS:2018/Q3/35 OSS:2018/Q3/76 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 OSS:2020/Q2/177 OSS:2022/11/10/2 OSS:2022/12/27/3 OSS:2022/Q4/132 OSS:2022/Q4/135 OSS:2022/Q4/244 OSS:2022/Q4/30 Oracle:CVE-2013-2566 Oracle:CVE-2014-0224 Oracle:CVE-2015-1832 Oracle:CVE-2015-8965 Oracle:CVE-2016-0635 Oracle:CVE-2016-6814 Oracle:CVE-2017-0861 Oracle:CVE-2017-14735 Oracle:CVE-2017-17558 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2017-5754 Oracle:CVE-2017-6074 Oracle:CVE-2018-3639 Oracle:CVE-2018-3646 Oracle:CVE-2018-5390 RH:CVE-2014-0224 RH:CVE-2017-10661 RH:CVE-2017-13166 RH:CVE-2017-13168 RH:CVE-2017-16012 RH:CVE-2017-16648 RH:CVE-2017-17805 RH:CVE-2017-17806 RH:CVE-2017-18017 RH:CVE-2017-18075 RH:CVE-2017-18232 RH:CVE-2017-18344 RH:CVE-2017-8831 RH:CVE-2018-1000026 RH:CVE-2018-1000204 RH:CVE-2018-1065 RH:CVE-2018-1068 RH:CVE-2018-1120 RH:CVE-2018-1122 RH:CVE-2018-1123 RH:CVE-2018-1124 RH:CVE-2018-1125 RH:CVE-2018-1126 RH:CVE-2018-13405 RH:CVE-2018-3639 RH:CVE-2018-5344 RH:CVE-2018-5750 RH:CVE-2018-5803 RH:CVE-2018-7566 RHBA-2020:0547 RHSA-2014:0474 RHSA-2014:0497 RHSA-2014:0498 RHSA-2014:0500 RHSA-2014:0511 RHSA-2014:0624 RHSA-2014:0625 RHSA-2014:0626 RHSA-2014:0627 RHSA-2014:0628 RHSA-2014:0629 RHSA-2014:0630 RHSA-2014:0631 RHSA-2014:0632 RHSA-2014:0633 RHSA-2014:0679 RHSA-2014:0680 RHSA-2015:1176 RHSA-2016:2035 RHSA-2016:2036 RHSA-2016:2130 RHSA-2016:2131 RHSA-2016:2595 RHSA-2016:2749 RHSA-2016:2927 RHSA-2016:2928 RHSA-2017:0184 RHSA-2017:0272 RHSA-2017:0868 RHSA-2017:1208 RHSA-2017:2486 RHSA-2017:2596 RHSA-2017:3189 RHSA-2017:3190 RHSA-2018:0342 RHSA-2018:0478 RHSA-2018:0479 RHSA-2018:0480 RHSA-2018:0481 RHSA-2018:0501 RHSA-2018:0576 RHSA-2018:0577 RHSA-2018:0676 RHSA-2018:1062 RHSA-2018:1130 RHSA-2018:1170 RHSA-2018:1318 RHSA-2018:1319 RHSA-2018:1355 RHSA-2018:1447 RHSA-2018:1448 RHSA-2018:1449 RHSA-2018:1450 RHSA-2018:1451 RHSA-2018:1629 RHSA-2018:1630 RHSA-2018:1632 RHSA-2018:1633 RHSA-2018:1635 RHSA-2018:1636 RHSA-2018:1637 RHSA-2018:1638 RHSA-2018:1639 RHSA-2018:1640 RHSA-2018:1641 RHSA-2018:1642 RHSA-2018:1643 RHSA-2018:1644 RHSA-2018:1645 RHSA-2018:1646 RHSA-2018:1647 RHSA-2018:1648 RHSA-2018:1649 RHSA-2018:1650 RHSA-2018:1651 RHSA-2018:1652 RHSA-2018:1653 RHSA-2018:1654 RHSA-2018:1655 RHSA-2018:1656 RHSA-2018:1657 RHSA-2018:1658 RHSA-2018:1659 RHSA-2018:1660 RHSA-2018:1661 RHSA-2018:1662 RHSA-2018:1663 RHSA-2018:1664 RHSA-2018:1665 RHSA-2018:1666 RHSA-2018:1667 RHSA-2018:1668 RHSA-2018:1669 RHSA-2018:1674 RHSA-2018:1675 RHSA-2018:1676 RHSA-2018:1686 RHSA-2018:1688 RHSA-2018:1689 RHSA-2018:1690 RHSA-2018:1696 RHSA-2018:1700 RHSA-2018:1710 RHSA-2018:1711 RHSA-2018:1737 RHSA-2018:1738 RHSA-2018:1777 RHSA-2018:1820 RHSA-2018:1826 RHSA-2018:1854 RHSA-2018:1965 RHSA-2018:1967 RHSA-2018:1997 RHSA-2018:2001 RHSA-2018:2003 RHSA-2018:2006 RHSA-2018:2060 RHSA-2018:2161 RHSA-2018:2162 RHSA-2018:2164 RHSA-2018:2171 RHSA-2018:2172 RHSA-2018:2216 RHSA-2018:2228 RHSA-2018:2246 RHSA-2018:2250 RHSA-2018:2258 RHSA-2018:2267 RHSA-2018:2268 RHSA-2018:2289 RHSA-2018:2309 RHSA-2018:2328 RHSA-2018:2363 RHSA-2018:2364 RHSA-2018:2384 RHSA-2018:2387 RHSA-2018:2390 RHSA-2018:2394 RHSA-2018:2395 RHSA-2018:2396 RHSA-2018:2669 RHSA-2018:2927 RHSA-2018:2948 RHSA-2018:3083 RHSA-2018:3096 RHSA-2018:3396 RHSA-2018:3397 RHSA-2018:3398 RHSA-2018:3399 RHSA-2018:3400 RHSA-2018:3401 RHSA-2018:3402 RHSA-2018:3407 RHSA-2018:3423 RHSA-2018:3424 RHSA-2018:3425 RHSA-2018:3459 RHSA-2018:3540 RHSA-2018:3586 RHSA-2018:3590 RHSA-2018:3591 RHSA-2019:0148 RHSA-2019:0525 RHSA-2019:0641 RHSA-2019:0717 RHSA-2019:1046 RHSA-2019:1170 RHSA-2019:1190 RHSA-2019:1483 RHSA-2019:1487 RHSA-2019:1944 RHSA-2019:2189 RHSA-2019:2401 RHSA-2019:2473 RHSA-2019:2476 RHSA-2019:2566 RHSA-2019:2696 RHSA-2019:2730 RHSA-2019:2995 RHSA-2019:4057 RHSA-2019:4058 RHSA-2019:4159 RHSA-2019:4164 RHSA-2020:0036 RHSA-2020:0595 RHSA-2020:0983 RHSA-2020:1265 RHSA-2020:1464 RHSA-2020:3804 RHSA-2020:3810 SECTRACK:1031032 SECTRACK:1031594 SECTRACK:1034077 SECTRACK:1036056 SECTRACK:1036377 SECTRACK:1036378 SECTRACK:1036393 SECTRACK:1036397 SECTRACK:1037036 SECTRACK:1037046 SECTRACK:1037053 SECTRACK:1037640 SECTRACK:1039600 SECTRACK:1040319 SECTRACK:1040446 SECTRACK:1040949 SECTRACK:1041057 SECTRACK:1041294 SECTRACK:1041414 SECTRACK:1042004 SECUNIA:57477 SECUNIA:58128 SECUNIA:58337 SECUNIA:58385 SECUNIA:58433 SECUNIA:58492 SECUNIA:58579 SECUNIA:58615 SECUNIA:58639 SECUNIA:58660 SECUNIA:58667 SECUNIA:58710 SECUNIA:58713 SECUNIA:58714 SECUNIA:58716 SECUNIA:58719 SECUNIA:58742 SECUNIA:58745 SECUNIA:58759 SECUNIA:58851 SECUNIA:58930 SECUNIA:58945 SECUNIA:58947 SECUNIA:58977 SECUNIA:59004 SECUNIA:59012 SECUNIA:59014 SECUNIA:59040 SECUNIA:59043 SECUNIA:59055 SECUNIA:59063 SECUNIA:59093 SECUNIA:59101 SECUNIA:59118 SECUNIA:59132 SECUNIA:59135 SECUNIA:59142 SECUNIA:59163 SECUNIA:59167 SECUNIA:59175 SECUNIA:59186 SECUNIA:59188 SECUNIA:59189 SECUNIA:59190 SECUNIA:59191 SECUNIA:59192 SECUNIA:59202 SECUNIA:59211 SECUNIA:59214 SECUNIA:59215 SECUNIA:59223 SECUNIA:59228 SECUNIA:59231 SECUNIA:59245 SECUNIA:59246 SECUNIA:59264 SECUNIA:59282 SECUNIA:59284 SECUNIA:59287 SECUNIA:59305 SECUNIA:59306 SECUNIA:59310 SECUNIA:59325 SECUNIA:59338 SECUNIA:59347 SECUNIA:59354 SECUNIA:59362 SECUNIA:59364 SECUNIA:59365 SECUNIA:59368 SECUNIA:59370 SECUNIA:59374 SECUNIA:59375 SECUNIA:59380 SECUNIA:59383 SECUNIA:59389 SECUNIA:59429 SECUNIA:59430 SECUNIA:59435 SECUNIA:59437 SECUNIA:59440 SECUNIA:59441 SECUNIA:59442 SECUNIA:59444 SECUNIA:59445 SECUNIA:59446 SECUNIA:59447 SECUNIA:59448 SECUNIA:59449 SECUNIA:59454 SECUNIA:59459 SECUNIA:59460 SECUNIA:59464 SECUNIA:59479 SECUNIA:59480 SECUNIA:59483 SECUNIA:59502 SECUNIA:59506 SECUNIA:59518 SECUNIA:59525 SECUNIA:59529 SECUNIA:59589 SECUNIA:59602 SECUNIA:59661 SECUNIA:59677 SECUNIA:59704 SECUNIA:59718 SECUNIA:59824 SECUNIA:59827 SECUNIA:59878 SECUNIA:59885 SECUNIA:59894 SECUNIA:59916 SECUNIA:60176 SECUNIA:60177 SECUNIA:60522 SECUNIA:60567 SECUNIA:60577 SECUNIA:60703 SECUNIA:60819 SECUNIA:61254 SECUNIA:61815 SECUNIA:81331 SMASH Issue 184883 SMASH Issue 190204 SMASH Issue 194646 SMASH Issue 196268 SMASH Issue 196270 SMASH Issue 196659 SMASH Issue 197016 SMASH Issue 197017 SMASH Issue 197538 SMASH Issue 198115 SMASH Issue 198879 SMASH Issue 198893 SMASH Issue 199072 SMASH Issue 199429 SMASH Issue 201048 SMASH Issue 201050 SMASH Issue 201087 SMASH Issue 201115 SMASH Issue 201727 SMASH Issue 201990 SMASH Issue 202009 SMASH Issue 202788 SMASH Issue 204752 SMASH Issue 205325 SMASH Issue 207690 SMASH Issue 207826 SMASH Issue 209676 SMASH Issue 211888 SMASH Issue 218336 SMASH Issue 218348 SMASH Issue 218349 SMASH Issue 218448 SMASH Issue 218452 SMASH Issue 218461 SMASH Issue 226841 SMASH Issue 55084 SMASH Issue 99325 SUSE:SUSE-SU-2015:0578 SUSE:SUSE-SU-2015:0743 SUSE:SUSE-SU-2018:0010 SUSE:SUSE-SU-2018:0011 SUSE:SUSE-SU-2018:0012 SUSE:SUSE-SU-2018:0383 SUSE:SUSE-SU-2018:0416 SUSE:SUSE-SU-2018:0482 SUSE:SUSE-SU-2018:0555 SUSE:SUSE-SU-2018:0660 SUSE:SUSE-SU-2018:0834 SUSE:SUSE-SU-2018:0841 SUSE:SUSE-SU-2018:0848 SUSE:SUSE-SU-2018:0986 SUSE:openSUSE-SU-2015:0229 SUSE:openSUSE-SU-2015:1911 SUSE:openSUSE-SU-2016:0640 SUSE:openSUSE-SU-2018:0022 SUSE:openSUSE-SU-2018:0023 SUSE:openSUSE-SU-2018:0408 SUSE:openSUSE-SU-2019:1407 SUSE:openSUSE-SU-2019:1438 SUSE:openSUSE-SU-2019:1439 SUSE:openSUSE-SU-2019:2376 SUSE:openSUSE-SU-2019:2379 SUSE:openSUSE-SU-2020:1325 UBUNTU:CVE-2013-2566 UBUNTU:CVE-2014-0224 UBUNTU:CVE-2017-10661 UBUNTU:CVE-2017-13166 UBUNTU:CVE-2017-13168 UBUNTU:CVE-2017-16648 UBUNTU:CVE-2017-17805 UBUNTU:CVE-2017-17806 UBUNTU:CVE-2017-18017 UBUNTU:CVE-2017-18075 UBUNTU:CVE-2017-18232 UBUNTU:CVE-2017-18344 UBUNTU:CVE-2017-8831 UBUNTU:CVE-2018-1000026 UBUNTU:CVE-2018-1000204 UBUNTU:CVE-2018-10021 UBUNTU:CVE-2018-1065 UBUNTU:CVE-2018-1068 UBUNTU:CVE-2018-10853 UBUNTU:CVE-2018-1120 UBUNTU:CVE-2018-1122 UBUNTU:CVE-2018-1123 UBUNTU:CVE-2018-1124 UBUNTU:CVE-2018-1125 UBUNTU:CVE-2018-1126 UBUNTU:CVE-2018-13405 UBUNTU:CVE-2018-3639 UBUNTU:CVE-2018-5344 UBUNTU:CVE-2018-5750 UBUNTU:CVE-2018-5803 UBUNTU:CVE-2018-7566 UBUNTU:CVE-2018-7995 UBUNTU:USN-3583-1 UBUNTU:USN-3583-2 UBUNTU:USN-3617-1 UBUNTU:USN-3617-2 UBUNTU:USN-3617-3 UBUNTU:USN-3619-1 UBUNTU:USN-3619-2 UBUNTU:USN-3620-1 UBUNTU:USN-3620-2 UBUNTU:USN-3631-1 UBUNTU:USN-3631-2 UBUNTU:USN-3632-1 UBUNTU:USN-3651-1 UBUNTU:USN-3652-1 UBUNTU:USN-3653-1 UBUNTU:USN-3653-2 UBUNTU:USN-3654-1 UBUNTU:USN-3654-2 UBUNTU:USN-3655-1 UBUNTU:USN-3655-2 UBUNTU:USN-3656-1 UBUNTU:USN-3658-1 UBUNTU:USN-3658-2 UBUNTU:USN-3658-3 UBUNTU:USN-3674-1 UBUNTU:USN-3674-2 UBUNTU:USN-3677-1 UBUNTU:USN-3677-2 UBUNTU:USN-3678-1 UBUNTU:USN-3678-2 UBUNTU:USN-3678-3 UBUNTU:USN-3678-4 UBUNTU:USN-3679-1 UBUNTU:USN-3680-1 UBUNTU:USN-3693-1 UBUNTU:USN-3696-1 UBUNTU:USN-3696-2 UBUNTU:USN-3727-1 UBUNTU:USN-3742-1 UBUNTU:USN-3742-2 UBUNTU:USN-3752-1 UBUNTU:USN-3752-2 UBUNTU:USN-3752-3 UBUNTU:USN-3753-1 UBUNTU:USN-3753-2 UBUNTU:USN-3754-1 UBUNTU:USN-3756-1 UBUNTU:USN-3777-1 UBUNTU:USN-3777-2 UBUNTU:USN-3777-3 UBUNTU:USN-3798-1 UBUNTU:USN-3798-2 UBUNTU:USN-3820-1 UBUNTU:USN-3820-2 UBUNTU:USN-3820-3 UBUNTU:USN-3821-1 UBUNTU:USN-3821-2 UBUNTU:USN-3822-1 UBUNTU:USN-3822-2 USN-3583-1 USN-3583-2 USN-3910-1 USN-3910-2 ZDI-16-570 ZDI-22-1462 bdo#1033297 bdo#797165 bdo#802671 bdo#864859 bdo#866511 bdo#873383 bdo#875881 bdo#899170 bnc#1037994 bnc#1053152 bnc#1053153 bnc#1067087 bnc#1067118 bnc#1072831 bnc#1072865 bnc#1073792 bnc#1073874 bnc#1074488 bnc#1075825 bnc#1077402 bnc#1077404 bnc#1077892 bnc#1079384 bnc#1083483 bnc#1083488 bnc#1083650 bnc#1083900 bnc#1084755 bnc#1085107 bnc#1085413 bnc#1085447 bnc#1089281 bnc#1096723 bnc#1100416 bnc#1102851 bnc#1103203 bnc#1103580 bnc#1129735 bnc#1190006 bnc#882572 bnc#885777 bnc#901237 bnc#903703 bnc#905857 bnc#914447 bnc#916239 http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2638fd0f92d4397884fd991d8f4925cb3f081901 http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=318aaf34f1179b39fa9c30fa0f3288b645beee39 jsc#CAR-1230 linux.git:commit:0b7808818cb9df6680f98996b8e9a439fa7bcc2f linux.git:commit:7f7ccc2ccc2e70c6054685f5e3522efa81556830 linux.git:commit:8f033d2becc24aa6bfd2a5c104407963560caabc linux.git:commit:aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d linux.git:commit:b2d03cabe2b2e150ff5a381731ea0355459be09f linux.git:commit:bcca852027e5878aec911a347407ecc88d6fff7f linux.git:commit:d36260050e1881dce09625a9352d8729c911a6e3 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 linux.git:commit:ff05d4b45dd89b922578dac497dcabf57cf771c6 rh#1091938 rh#1103586 rh#1112877 rh#1243852 rh#1343538 rh#1343540 rh#1396963 rh#1396971 rh#1435719 rh#1449980 rh#1462147 rh#1462158 rh#1481136 rh#1481178 rh#1485274 rh#1495089 rh#1498016 rh#1516257 rh#1519780 rh#1527393 rh#1528312 rh#1528323 rh#1531135 rh#1533909 rh#1539508 rh#1539599 rh#1539706 rh#1541846 rh#1547824 rh#1548412 rh#1550142 rh#1551051 rh#1552048 rh#1553911 rh#1558066 rh#1566407 rh#1566890 rh#1573699 rh#1575465 rh#1575466 rh#1575472 rh#1575474 rh#1575852 rh#1575853 rh#1589324 rh#1589890 rh#1591854 rh#1596773 rh#1596795 rh#1596812 rh#1596842 rh#1599161 rh#1601704 rh#1609664 rh#1610958 rh#1658985 rh#2027239 rh#2044863 rh#2061700 rh#2119127 rh#2123056 rh#2134377 rh#2134440 rh#2134451 rh#2134506 rh#2134517 rh#2139586 rh#2139598 |
CVE-2018-13410 | zip:Ignore | critical | () | CVE-2018-13410 MISC:seclists.org:CVE-2018-13410 SMASH Issue 214815 UBUNTU:CVE-2018-13410 bnc#1191696 |
CVE-2018-14326 | check:Analysis | important | () | CVE-2018-14326 D:CVE-2018-14326 FEDORA:FEDORA-2019-1030f4816a FEDORA:FEDORA-2019-6469ad8129 FEDORA:FEDORA-2019-d53d4a79ac MISC:www.openwall.com:CVE-2018-14325 SMASH Issue 210738 UBUNTU:CVE-2018-14326 bnc#1101415 https://github.com/enzo1982/mp4v2/releases/tag/v2.1.0 rh#1601674 |
CVE-2018-14609 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | BID:104917 CVE-2018-14609 D:CVE-2018-14609 DEBIAN:DSA-4308 MISC:bugzilla.kernel.org:CVE-2018-14609 MISC:patchwork.kernel.org:CVE-2018-14609 MLIST:[debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update OSS:2018/09/18/4 Oracle:CVE-2017-5753 RH:CVE-2018-14609 SMASH Issue 211771 UBUNTU:CVE-2018-14609 UBUNTU:USN-3821-1 UBUNTU:USN-3821-2 USN-4094-1 bnc#1102875 rh#1575472 rh#1575866 rh#1609664 rh#1610074 rh#1619846 rh#1660375 rh#1660385 rh#1686136 rh#1890354 |
CVE-2018-14610 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | BID:104917 CVE-2018-14610 D:CVE-2018-14610 MISC:bugzilla.kernel.org:CVE-2018-14610 MISC:patchwork.kernel.org:CVE-2018-14610 MLIST:[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update OSS:2018/09/18/4 Oracle:CVE-2017-5753 RH:CVE-2018-14610 SMASH Issue 211772 UBUNTU:CVE-2018-14610 USN-3932-1 USN-3932-2 USN-4094-1 USN-4118-1 bnc#1102877 rh#1575472 rh#1575866 rh#1609664 rh#1610079 rh#1619846 rh#1660375 rh#1660385 rh#1686136 rh#1890354 |
CVE-2018-14611 | kernel-source-rt:Not affected | moderate | 6.7 (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | BID:104917 CVE-2018-14611 D:CVE-2018-14611 MISC:bugzilla.kernel.org:CVE-2018-14611 MISC:patchwork.kernel.org:CVE-2018-14611 MLIST:[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update OSS:2018/09/18/4 Oracle:CVE-2017-5753 RH:CVE-2018-14611 SMASH Issue 211773 UBUNTU:CVE-2018-14611 USN-3932-1 USN-3932-2 USN-4094-1 USN-4118-1 bnc#1102879 rh#1575472 rh#1575866 rh#1609664 rh#1610084 rh#1619846 rh#1660375 rh#1660385 rh#1686136 rh#1890354 |
CVE-2018-14612 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | BID:104917 CVE-2018-14612 D:CVE-2018-14612 MISC:bugzilla.kernel.org:CVE-2018-14612 MISC:patchwork.kernel.org:CVE-2018-14612 MLIST:[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update OSS:2018/09/18/4 Oracle:CVE-2017-5753 RH:CVE-2018-14612 SMASH Issue 211774 UBUNTU:CVE-2018-14612 USN-3932-1 USN-3932-2 USN-4094-1 USN-4118-1 bnc#1102882 rh#1575472 rh#1575866 rh#1609664 rh#1610088 rh#1619846 rh#1660375 rh#1660385 rh#1686136 rh#1890354 |
CVE-2018-14613 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | BID:104917 CONFIRM:community.otrs.com:CVE-2018-14593 CVE-2018-14613 D:CVE-2018-14613 DEBIAN:DSA-4317 MISC:bugzilla.kernel.org:CVE-2018-14613 MISC:patchwork.kernel.org:CVE-2018-14613 MISC:www.oracle.com:CVE-2021-3450 MLIST:[debian-lts-announce] 20180821 [SECURITY] [DLA 1473-1] otrs2 security update MLIST:[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update OSS:2018/09/18/4 Oracle:CVE-2017-5753 RH:CVE-2018-14613 SMASH Issue 211775 UBUNTU:CVE-2018-14613 USN-3932-1 USN-3932-2 USN-4094-1 USN-4118-1 bnc#1102896 rh#1575472 rh#1575866 rh#1609664 rh#1610092 rh#1619846 rh#1660375 rh#1660385 rh#1686136 rh#1890354 |
CVE-2018-14625 | kernel-source-rt:Already fixed | moderate | 5.3 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H) | CONFIRM:bugzilla.redhat.com:CVE-2018-14625 CVE-2018-14625 MISC:syzkaller.appspot.com:CVE-2018-14625 MLIST:[debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update Oracle:CVE-2017-5753 RH:CVE-2018-14625 RHSA-2019:2029 RHSA-2019:2043 RHSA-2019:4154 SMASH Issue 213527 UBUNTU:CVE-2018-14625 USN-3871-1 USN-3871-3 USN-3871-4 USN-3871-5 USN-3872-1 USN-3878-1 USN-3878-2 bnc#1106615 linux.git:commit:834e772c8db0c6a275d75315d90aba4ebbb1e249 rh#1619846 rh#1660375 rh#1660385 |
CVE-2018-14633 | kernel-source-rt:Not affected | important | 8.8 (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | BID:105388 CONFIRM:bugzilla.redhat.com:CVE-2018-14633 CONFIRM:git.kernel.org:CVE-2018-14633 CVE-2018-14633 DEBIAN:DSA-4308 MISC:seclists.org:CVE-2018-14633 MLIST:[debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update OSS:2018/09/18/4 OSS:2018/09/25/4 OSS:2018/Q3/270 Oracle:CVE-2018-5390 RH:CVE-2018-14633 RHSA-2018:3651 RHSA-2018:3666 RHSA-2019:1946 SMASH Issue 214018 SMASH Issue 214020 UBUNTU:CVE-2018-14633 UBUNTU:USN-3775-1 UBUNTU:USN-3775-2 UBUNTU:USN-3776-1 UBUNTU:USN-3776-2 UBUNTU:USN-3777-1 UBUNTU:USN-3777-2 UBUNTU:USN-3777-3 UBUNTU:USN-3779-1 bnc#1107829 bnc#1107832 linux.git:commit:1816494330a83f2a064499d8ed2797045641f92c linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1575866 rh#1601704 rh#1609664 rh#1626035 rh#1660375 rh#1660385 rh#1667782 rh#1686136 rh#1701224 rh#1701842 rh#1890354 |
CVE-2018-14656 | kernel-source-rt:Unsupported | moderate | () | CONFIRM:bugzilla.redhat.com:CVE-2018-14656 CONFIRM:git.kernel.org:CVE-2018-14656 CVE-2018-14656 MISC:bugs.chromium.org:CVE-2018-14656 MISC:lore.kernel.org:CVE-2018-14656 MISC:seclists.org:CVE-2018-14656 OSS:2018/Q4/9 RH:CVE-2018-14656 SECTRACK:1041804 SMASH Issue 216113 UBUNTU:CVE-2018-14656 bnc#1110710 https://lore.kernel.org/lkml/20180828154901.112726-1-jannh%40google.com/T/ rh#1629940 |
CVE-2018-14678 | kernel-source-rt:Not affected | moderate | 5.1 (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | BID:104924 CVE-2018-14678 D:CVE-2018-14678 DEBIAN:DSA-4308 MISC:xenbits.xen.org:CVE-2018-14678 MLIST:[debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update OSS:2018/09/18/4 OSS:2018/Q3/123 OSS:2018/Q3/69 Oracle:CVE-2018-3646 Oracle:CVE-2018-5390 RH:CVE-2018-14678 SECTRACK:1041397 SMASH Issue 211727 SMASH Issue 211811 UBUNTU:CVE-2018-14678 USN-3931-1 USN-3931-2 bnc#1102715 rh#1575866 rh#1601704 rh#1608559 rh#1609664 rh#1890354 |
CVE-2018-15471 | kernel-source-rt:Already fixed | important | 7.8 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H) | CVE-2018-15471 D:CVE-2018-15471 DEBIAN:DSA-4313 MISC:bugs.chromium.org:CVE-2018-15471 MISC:xenbits.xen.org:CVE-2018-15471 MLIST:[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update OSS:2018/Q3/140 Oracle:CVE-2018-3646 RH:CVE-2018-15471 SMASH Issue 211911 SMASH Issue 213000 UBUNTU:CVE-2018-15471 UBUNTU:USN-3819-1 UBUNTU:USN-3820-1 UBUNTU:USN-3820-2 UBUNTU:USN-3820-3 bnc#1103277 linux.git:commit:780e83c259fc33e8959fed8dfdad17e378d72b62 rh#1609664 rh#1610555 |
CVE-2018-15572 | kernel-source-rt:Not affected | important | 4.7 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2018-15572 DEBIAN:DSA-4308 MISC:cdn.kernel.org:CVE-2018-15594 MISC:git.kernel.org:CVE-2018-15572 MISC:github.com:CVE-2018-15572 MLIST:[debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update OSS:2018/09/18/4 OSS:2018/09/25/4 RH:CVE-2018-15572 SMASH Issue 211578 SMASH Issue 213025 UBUNTU:CVE-2018-15572 UBUNTU:USN-3775-1 UBUNTU:USN-3775-2 UBUNTU:USN-3776-1 UBUNTU:USN-3776-2 UBUNTU:USN-3777-1 UBUNTU:USN-3777-2 UBUNTU:USN-3777-3 bnc#1102517 bnc#1105296 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1575866 rh#1609664 rh#1616245 rh#1660375 rh#1660385 rh#1667782 rh#1686136 rh#1701224 rh#1701842 rh#1890354 |
CVE-2018-15919 | openssh:Ignore | moderate | 5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) | BID:105163 CVE-2018-15919 D:CVE-2018-15919 L3:52440 L3:52578 L3:52580 L3:52775 L3:52893 OSS:2018/Q3/180 OSS:2018/Q3/185 RH:CVE-2018-15919 SMASH Issue 213391 SMASH Issue 232254 UBUNTU:CVE-2018-15919 bnc#1106163 rh#1619063 rh#1623184 |
CVE-2018-16151 | strongswan:Not affected | moderate | 4.8 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N) | CONFIRM:www.strongswan.org:CVE-2018-16152 CVE-2018-16151 CVE-2018-16152 DEBIAN:DSA-4305 DSA-4305 MLIST:[debian-lts-announce] 20180926 [SECURITY] [DLA 1522-1] strongswan security update RH:CVE-2018-16151 RH:CVE-2018-16152 SMASH Issue 214023 UBUNTU:CVE-2018-16151 UBUNTU:CVE-2018-16152 bnc#1107874 rh#1635870 rh#1635873 rh#1635877 |
CVE-2018-16152 | strongswan:Not affected | moderate | 4.8 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N) | CONFIRM:www.strongswan.org:CVE-2018-16152 CVE-2018-16151 CVE-2018-16152 DEBIAN:DSA-4305 DSA-4305 MLIST:[debian-lts-announce] 20180926 [SECURITY] [DLA 1522-1] strongswan security update RH:CVE-2018-16151 RH:CVE-2018-16152 SMASH Issue 214023 SMASH Issue 214024 UBUNTU:CVE-2018-16151 UBUNTU:CVE-2018-16152 bnc#1107874 rh#1635870 rh#1635873 rh#1635877 |
CVE-2018-16276 | kernel-source-rt:Not affected | important | 7.3 (CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H) | CVE-2018-16276 D:CVE-2018-16276 DEBIAN:DSA-4308 MISC:cdn.kernel.org:CVE-2018-16276 MISC:git.kernel.org:CVE-2018-16276 MISC:github.com:CVE-2018-16276 MLIST:[debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update OSS:2018/09/18/4 OSS:2018/09/25/4 RH:CVE-2018-16276 SMASH Issue 213357 UBUNTU:CVE-2018-16276 UBUNTU:USN-3776-1 UBUNTU:USN-3776-2 USN-3847-1 USN-3847-2 USN-3847-3 USN-3849-1 USN-3849-2 bnc#1106095 rh#1624507 |
CVE-2018-16301 | tcpdump:Released | important | () | CONFIRM:github.com:CVE-2018-10103 CONFIRM:github.com:CVE-2018-16301 CVE-2018-16301 RH:CVE-2018-16301 SMASH Issue 244121 UBUNTU:CVE-2018-16301 rh#1760500 |
CVE-2018-16597 | kernel-source-rt:Not affected | moderate | 5.3 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) | BID:105394 BUGTRAQ:20190722 [slackware-security] Slackware 14.2 kernel (SSA:2019-202-01) CONFIRM:git.kernel.org:CVE-2018-16597 CONFIRM:security.netapp.com:CVE-2018-16597 CONFIRM:support.f5.com:CVE-2018-16597 CVE-2018-16597 MISC:packetstormsecurity.com:CVE-2019-13272 OSS:2018/09/18/4 RH:CVE-2018-16597 RHSA-2016:2574 SMASH Issue 213508 SUSE:openSUSE-SU-2018:3202 UBUNTU:CVE-2018-16597 bnc#1106512 rh#1632443 |
CVE-2018-16862 | kernel-source-rt:Already fixed | moderate | 5.3 (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N) | BID:106009 CONFIRM:bugzilla.redhat.com:CVE-2018-16862 CONFIRM:lore.kernel.org:CVE-2018-16862 CVE-2018-16862 MLIST:[oss-security] 20181123 CVE-2018-16862: Linux kernel: cleancache: deleted files infoleak OSS:2018/Q4/169 Oracle:CVE-2017-5753 Oracle:CVE-2018-3639 RH:CVE-2018-16862 SMASH Issue 219603 UBUNTU:CVE-2018-16862 bnc#1117186 rh#1575472 rh#1609664 rh#1619846 rh#1649017 rh#1660375 rh#1660385 |
CVE-2018-16880 | kernel-source-rt:Not affected | moderate | () | BID:106735 CONFIRM:bugzilla.redhat.com:CVE-2018-16880 CONFIRM:support.f5.com:CVE-2018-16880 CVE-2018-16880 Oracle:CVE-2017-5753 Oracle:CVE-2019-11477 Oracle:CVE-2019-5489 RH:CVE-2018-16880 SMASH Issue 223523 SUSE:openSUSE-SU-2019:1404 UBUNTU:CVE-2018-16880 USN-3903-1 USN-3903-2 bnc#1122767 linux.git:commit:b46a0bf78ad7b150ef5910da83859f7f5a514ffd linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1655162 rh#1656472 rh#1664110 rh#1667782 rh#1701224 rh#1701842 rh#1703063 rh#1707796 rh#1710405 rh#1715494 rh#1715554 rh#1716328 rh#1718176 rh#1727756 rh#1729933 rh#1731000 rh#1734243 rh#1734246 |
CVE-2018-16885 | kernel-source-rt:Unsupported | moderate | () | BID:106296 CONFIRM:bugzilla.redhat.com:CVE-2018-16885 CVE-2018-16885 RH:CVE-2018-16885 RHSA-2019:2029 RHSA-2019:2043 SMASH Issue 221531 bnc#1120258 rh#1661503 |
CVE-2018-17540 | strongswan:Not affected | moderate | 7 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H) | CONFIRM:download.strongswan.org:CVE-2018-17540 CONFIRM:www.strongswan.org:CVE-2018-17540 CVE-2018-17540 DEBIAN:DSA-4309 DSA-4309 GENTOO:GLSA-201811-16 MLIST:[debian-lts-announce] 20181002 [SECURITY] [DLA 1528-1] strongswan security update RH:CVE-2018-17540 SMASH Issue 215710 SMASH Issue 215711 UBUNTU:CVE-2018-17540 UBUNTU:USN-3774-1 bnc#1109845 rh#1635877 |
CVE-2018-17953 | pam:Not affected | important | 7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) | CVE-2018-17953 RH:CVE-2018-17953 SMASH Issue 219101 UBUNTU:CVE-2018-17953 bnc#1115640 bnc#1197021 rh#1652593 |
CVE-2018-17972 | kernel-source-rt:Already fixed | moderate | () | BID:105525 CONFIRM:support.f5.com:CVE-2018-17972 CVE-2018-17972 MISC:marc.info:CVE-2018-17972 MLIST:[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update MLIST:[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update MLIST:[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update Oracle:CVE-2019-11477 Oracle:CVE-2019-5489 RH:CVE-2018-17972 RHSA-2019:0512 RHSA-2019:0514 RHSA-2019:0831 RHSA-2019:2473 SMASH Issue 216151 SUSE:openSUSE-SU-2019:1407 UBUNTU:CVE-2018-17972 UBUNTU:USN-3821-1 UBUNTU:USN-3821-2 UBUNTU:USN-3832-1 UBUNTU:USN-3835-1 USN-3871-1 USN-3871-3 USN-3871-4 USN-3871-5 USN-3880-1 USN-3880-2 bnc#1110785 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1205079 rh#1636349 rh#1664110 rh#1667782 rh#1699856 rh#1701224 rh#1701842 rh#1715554 rh#1716328 |
CVE-2018-18021 | kernel-source-rt:Already fixed | low | 3.9 (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L) | BID:105550 CVE-2018-18021 D:CVE-2018-18021 MISC:cdn.kernel.org:CVE-2018-18021 MISC:git.kernel.org:CVE-2018-18021 MISC:github.com:CVE-2018-18021 MISC:www.openwall.com:CVE-2018-18021 OSS:2018/Q4/20 Oracle:CVE-2017-5753 RH:CVE-2018-18021 RHSA-2018:3656 SMASH Issue 216245 UBUNTU:CVE-2018-18021 bnc#1110998 rh#1619846 rh#1635475 rh#1660375 rh#1660385 |
CVE-2018-18312 | perl:Not affected | moderate | 5.3 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) | BID:106179 CONFIRM:metacpan.org:CVE-2018-18312 CONFIRM:metacpan.org:CVE-2018-18314 CONFIRM:rt.perl.org:CVE-2018-18312 CONFIRM:security.netapp.com:CVE-2018-18311 CVE-2018-18312 DEBIAN:DSA-4347 FEDORA:FEDORA-2018-9dbe983805 GLSA-201909-01 MISC:www.oracle.com:CVE-2015-7501 Oracle:CVE-2018-18311 Oracle:CVE-2018-18314 RH:CVE-2018-18312 RHSA-2019:0001 RHSA-2019:0010 SECTRACK:1042181 SMASH Issue 218665 UBUNTU:CVE-2018-18312 UBUNTU:USN-3834-1 bnc#1114675 rh#1646734 |
CVE-2018-18386 | kernel-source-rt:Not affected | moderate | 6.2 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2018-18386 DSA-5378 MISC:cdn.kernel.org:CVE-2018-18386 MISC:git.kernel.org:CVE-2018-18386 MISC:github.com:CVE-2018-18386 OSS:2018/09/18/4 OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2018-3639 RH:CVE-2018-18386 RHSA-2019:0831 SMASH Issue 208752 UBUNTU:CVE-2018-18386 bdo#1033297 bnc#1094825 bnc#1110711 bnc#1112039 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1519780 rh#1527393 rh#1573699 rh#1575472 rh#1575866 rh#1599161 rh#1609664 rh#1640598 rh#1660375 rh#1660385 rh#1667782 rh#1686136 rh#1701224 rh#1701842 rh#1890354 rh#2027239 rh#2044863 rh#2061700 rh#2119127 |
CVE-2018-18397 | kernel-source-rt:Already fixed | moderate | 6.1 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N) | CVE-2018-18397 MISC:bugs.chromium.org:OSS:2018/Q4/219 MISC:cdn.kernel.org:CVE-2018-18397 MISC:git.kernel.org:CVE-2018-18397 MISC:git.kernel.org:OSS:2018/Q4/219 MISC:github.com:CVE-2018-18397 OSS:2018/Q4/219 Oracle:CVE-2017-5753 RH:CVE-2018-18397 RHBA-2019:0327 RHSA-2019:0163 RHSA-2019:0202 RHSA-2019:0324 RHSA-2019:0831 SMASH Issue 219837 UBUNTU:CVE-2018-18397 USN-3901-1 USN-3901-2 USN-3903-1 USN-3903-2 bnc#1117656 rh#1619846 rh#1641548 rh#1660375 rh#1660385 |
CVE-2018-18445 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) | CONFIRM:support.f5.com:CVE-2018-18445 CVE-2018-18445 MISC:bugs.chromium.org:CVE-2018-18445 MISC:cdn.kernel.org:CVE-2018-18445 MISC:git.kernel.org:CVE-2018-18445 MISC:github.com:CVE-2018-18445 OSS:2018/09/18/4 OSS:2018/Q4/69 RH:CVE-2018-18445 RHSA-2019:0512 RHSA-2019:0514 SMASH Issue 216953 UBUNTU:CVE-2018-18445 UBUNTU:USN-3832-1 UBUNTU:USN-3835-1 USN-3847-1 USN-3847-2 USN-3847-3 bnc#1112372 rh#1575866 rh#1640596 rh#1890354 |
CVE-2018-18559 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2018-18559 D:CVE-2018-18559 L3:53934 MISC:blogs.securiteam.com:CVE-2018-18559 OSS:2018/09/18/4 Oracle:CVE-2019-5489 RH:CVE-2018-18559 RHBA-2019:0327 RHSA-2019:0163 RHSA-2019:0188 RHSA-2019:1170 RHSA-2019:1190 RHSA-2019:3967 RHSA-2019:4159 RHSA-2020:0174 SMASH Issue 217761 SMASH Issue 217809 UBUNTU:CVE-2018-18559 bnc#1112859 bnc#1112921 bnc#1129782 rh#1641878 rh#1664110 rh#1680540 rh#1683191 |
CVE-2018-18751 | gettext-runtime:Released | low | 4 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | CVE-2018-18751 MISC:github.com:CVE-2018-18751 RH:CVE-2018-18751 RHSA-2019:3643 RHSA-2020:1138 RHSA-2020:2485 RHSA-2020:2846 SMASH Issue 218203 SUSE:openSUSE-SU-2020:1270 SUSE:openSUSE-SU-2020:1278 SUSE:openSUSE-SU-2020:1385 UBUNTU:CVE-2018-18751 UBUNTU:USN-3815-1 UBUNTU:USN-3815-2 bnc#1113719 rh#1647043 |
CVE-2018-18955 | kernel-source-rt:Unsupported, ltp:Released | moderate | () | BID:105941 CONFIRM:security.netapp.com:CVE-2018-18955 CONFIRM:support.f5.com:CVE-2018-18955 CVE-2018-18955 D:CVE-2018-18955 EXPLOIT-DB:45886 EXPLOIT-DB:45915 MISC:bugs.chromium.org:CVE-2018-18955 MISC:cdn.kernel.org:CVE-2018-18955 MISC:git.kernel.org:CVE-2018-18955 MISC:git.kernel.org:OSS:2018/Q4/150 OSS:2018/Q4/150 RH:CVE-2018-18955 SMASH Issue 219347 UBUNTU:CVE-2018-18955 UBUNTU:USN-3832-1 UBUNTU:USN-3833-1 UBUNTU:USN-3835-1 UBUNTU:USN-3836-1 UBUNTU:USN-3836-2 bnc#1116303 linux.git:commit:d2f007dbe7e4c9583eea6eb04d60001e85c6f1bd rh#1651384 |
CVE-2018-19406 | kernel-source-rt:Unsupported | moderate | () | BID:105988 CVE-2018-19406 D:CVE-2018-19406 MISC:lkml.org:CVE-2018-19406 RH:CVE-2018-19406 SMASH Issue 219518 UBUNTU:CVE-2018-19406 bnc#1116855 rh#1652650 |
CVE-2018-19787 | python-lxml:Released | moderate | 5.4 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N) | CVE-2018-19787 D:CVE-2018-19787 MISC:github.com:CVE-2018-19787 MLIST:[debian-lts-announce] 20181210 [SECURITY] [DLA 1604-1] lxml security update MLIST:[debian-lts-announce] 20201126 [SECURITY] [DLA 2467-1] lxml security update RH:CVE-2018-19787 SMASH Issue 220014 UBUNTU:CVE-2018-19787 USN-3841-1 USN-3841-2 bnc#1118088 jsc#CAR-1590 rh#1660235 |
CVE-2018-19824 | kernel-source-rt:Not affected | moderate | 6.6 (CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | BID:106109 CONFIRM:support.f5.com:CVE-2018-19824 CVE-2018-19824 MISC:git.kernel.org:CVE-2018-19824 MISC:github.com:CVE-2018-19824 MLIST:[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update MLIST:[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update MLIST:[debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update OSS:2018/Q4/199 Oracle:CVE-2017-5753 Oracle:CVE-2018-3639 RH:CVE-2018-19824 RHSA-2019:2029 RHSA-2019:2703 RHSA-2019:2741 SMASH Issue 220051 UBUNTU:CVE-2018-19824 USN-3879-1 USN-3879-2 USN-3930-1 USN-3930-2 USN-3931-1 USN-3931-2 USN-3933-1 USN-3933-2 bnc#1118152 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1575472 rh#1609664 rh#1619846 rh#1655816 rh#1660375 rh#1660385 rh#1667782 rh#1686136 rh#1701224 rh#1701842 |
CVE-2018-20169 | kernel-source-rt:Already fixed | moderate | 6.3 (CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2018-20169 MISC:cdn.kernel.org:CVE-2018-20169 MISC:git.kernel.org:CVE-2018-20169 MISC:github.com:CVE-2018-20169 MLIST:[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update MLIST:[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update MLIST:[debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update Oracle:CVE-2017-5753 Oracle:CVE-2018-3639 RH:CVE-2018-20169 RHSA-2019:3309 RHSA-2019:3517 RHSA-2020:1016 RHSA-2020:1070 RHSA-2020:2522 RHSA-2020:2770 RHSA-2020:2777 RHSA-2020:2851 SMASH Issue 221218 SMASH Issue 221219 UBUNTU:CVE-2018-20169 USN-3879-1 USN-3879-2 USN-4094-1 USN-4118-1 bnc#1119714 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1575472 rh#1609664 rh#1619846 rh#1660375 rh#1660385 rh#1667782 rh#1686136 rh#1701224 rh#1701842 |
CVE-2018-20346 | sqlite3:Ignore | important | 7 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | BID:106323 CONFIRM:chromereleases.googleblog.com:CVE-2018-17480 CONFIRM:support.apple.com:CVE-2019-6200 CONFIRM:support.apple.com:CVE-2019-6202 CONFIRM:support.apple.com:CVE-2019-6205 CONFIRM:support.apple.com:CVE-2019-6212 CONFIRM:www.synology.com:CVE-2018-20346 CVE-2018-20346 D:CVE-2018-20346 FEDORA:FEDORA-2019-49f80a78bc FREEBSD:FreeBSD-EN-19:03 GLSA-201904-21 MISC:access.redhat.com:CVE-2018-20346 MISC:blade.tencent.com:CVE-2018-20346 MISC:bugzilla.redhat.com:OSS:2018/Q4/270 MISC:chromium.googlesource.com:CVE-2018-20346 MISC:crbug.com:CVE-2018-20346 MISC:github.com:CVE-2018-20346 MISC:news.ycombinator.com:CVE-2018-20346 MISC:sqlite.org:CVE-2018-20346 MISC:worthdoingbadly.com:CVE-2018-20346 MISC:www.mail-archive.com:CVE-2018-20346 MISC:www.oracle.com:CVE-2019-2880 MISC:www.sqlite.org:CVE-2018-20346 MLIST:[debian-lts-announce] 20181222 [SECURITY] [DLA 1613-1] sqlite3 security update MLIST:[debian-lts-announce] 20200822 [SECURITY] [DLA 2340-1] sqlite3 security update OSS:2018/Q4/270 RH:CVE-2018-20346 SMASH Issue 221212 SMASH Issue 221689 SUSE:openSUSE-SU-2019:1159 SUSE:openSUSE-SU-2019:1222 UBUNTU:CVE-2018-20346 USN-4019-1 USN-4019-2 bnc#1119687 rh#1659379 |
CVE-2018-20511 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) | CVE-2018-20511 RH:CVE-2018-20511 SMASH Issue 221893 SMASH Issue 221923 UBUNTU:CVE-2018-20511 bnc#1120388 rh#1663072 |
CVE-2018-20573 | yaml-cpp:Released | moderate | 5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | CVE-2018-20573 D:CVE-2018-20573 MISC:github.com:CVE-2018-20573 RH:CVE-2018-20573 SMASH Issue 221934 UBUNTU:CVE-2018-20573 bnc#1121227 jsc#CAR-1660 rh#1665567 |
CVE-2018-20574 | yaml-cpp:Released | moderate | 5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | CVE-2018-20574 D:CVE-2018-20574 MISC:github.com:CVE-2018-20574 RH:CVE-2018-20574 SMASH Issue 221933 UBUNTU:CVE-2018-20574 bnc#1121230 jsc#CAR-1659 rh#1665571 |
CVE-2018-20679 | busybox:Released | moderate | 5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) | CONFIRM:busybox.net:CVE-2016-2148 CVE-2018-20679 FULLDISC:20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X MISC:bugs.busybox.net:CVE-2018-20679 MISC:git.busybox.net:CVE-2018-20679 RH:CVE-2018-20679 SMASH Issue 222539 UBUNTU:CVE-2018-20679 USN-3935-1 bnc#1121426 rh#1666667 rh#1667067 |
CVE-2018-20784 | kernel-source-rt:Not affected | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2018-20784 MISC:cdn.kernel.org:CVE-2018-20784 MISC:git.kernel.org:CVE-2018-20784 MISC:github.com:CVE-2018-20784 RH:CVE-2018-20784 RHSA-2019:1959 RHSA-2019:1971 SMASH Issue 225243 UBUNTU:CVE-2018-20784 USN-4115-1 USN-4118-1 USN-4211-1 USN-4211-2 bnc#1126703 jsc#CAR-1495 rh#1680540 |
CVE-2018-20796 | glibc:Not affected | moderate | 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | BID:107160 CONFIRM:security.netapp.com:CVE-2009-5155 CVE-2018-20796 MISC:debbugs.gnu.org:CVE-2018-20796 MISC:lists.gnu.org:CVE-2018-20796 RH:CVE-2018-20796 SMASH Issue 225378 UBUNTU:CVE-2018-20796 bnc#1127311 rh#1683150 rh#1684374 |
CVE-2018-20836 | kernel-source-rt:Not affected | moderate | 6.2 (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H) | BID:108196 BUGTRAQ:20190812 [SECURITY] [DSA 4495-1] linux security update BUGTRAQ:20190813 [SECURITY] [DSA 4497-1] linux security update CONFIRM:security.netapp.com:CVE-2019-11811 CONFIRM:support.f5.com:CVE-2018-20836 CVE-2018-20836 DSA-4495 DSA-4497 MISC:bugs.launchpad.net:CONFIRM:N/A MISC:git.kernel.org:CVE-2018-20836 MISC:github.com:CVE-2018-20836 MLIST:[debian-lts-announce] 20190814 [SECURITY] [DLA 1884-1] linux security update MLIST:[debian-lts-announce] 20190814 [SECURITY] [DLA 1885-1] linux-4.9 security update OSS:2020/04/06/2 Oracle:CVE-2017-5753 Oracle:CVE-2018-5390 Oracle:CVE-2019-11477 Oracle:CVE-2019-5489 RH:CVE-2018-20836 RHSA-2020:4060 RHSA-2020:4062 RHSA-2020:5656 RHSA-2021:0019 SMASH Issue 232341 SUSE:openSUSE-SU-2019:1716 SUSE:openSUSE-SU-2019:1757 UBUNTU:CVE-2018-20836 USN-4076-1 bnc#1134395 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1601704 rh#1655162 rh#1664110 rh#1667782 rh#1701224 rh#1701842 rh#1703063 rh#1707796 rh#1710405 rh#1715494 rh#1715554 rh#1716328 rh#1716992 rh#1718176 rh#1727756 rh#1729933 rh#1731000 rh#1734243 rh#1734246 |
CVE-2018-20843 | expat:Released | moderate | 5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | BUGTRAQ:20190628 [SECURITY] [DSA 4472-1] expat security update CONFIRM:security.netapp.com:CVE-2018-20843 CONFIRM:support.f5.com:CVE-2018-20843 CONFIRM:www.tenable.com:CVE-2019-16168 CVE-2018-20843 DSA-4472 FEDORA:FEDORA-2019-139fcda84d FEDORA:FEDORA-2019-18868e1715 GLSA-201911-08 MISC:bugs.chromium.org:CVE-2018-20843 MISC:github.com:CVE-2018-20843 MISC:www.oracle.com:CVE-2013-7285 MISC:www.oracle.com:CVE-2019-2880 MISC:www.oracle.com:CVE-2021-3450 MISC:www.oracle.com:CVE-2021-35666 MLIST:[debian-lts-announce] 20190629 [SECURITY] [DLA 1839-1] expat security update Oracle:CVE-2018-20843 RH:CVE-2018-20843 RHSA-2020:2644 RHSA-2020:2646 RHSA-2020:3952 RHSA-2020:4484 RHSA-2020:4846 SMASH Issue 235643 SUSE:openSUSE-SU-2019:1777 UBUNTU:CVE-2018-20843 USN-4040-1 USN-4040-2 bdo#931031 bnc#1139937 rh#1723723 |
CVE-2018-20854 | kernel-source-rt:Unsupported | important | () | CVE-2018-20854 MISC:git.kernel.org:CVE-2018-20854 MISC:github.com:CVE-2018-20854 RH:CVE-2018-20854 SMASH Issue 238066 SMASH Issue 238089 UBUNTU:CVE-2018-20854 bnc#1143038 rh#1738711 |
CVE-2018-20855 | kernel-source-rt:Already fixed | moderate | 5.1 (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N) | CONFIRM:security.netapp.com:CVE-2019-15098 CVE-2018-20855 MISC:cdn.kernel.org:CVE-2018-20855 MISC:git.kernel.org:CVE-2018-20855 MISC:github.com:CVE-2018-20855 Oracle:CVE-2017-5753 Oracle:CVE-2019-11477 Oracle:CVE-2019-5489 RH:CVE-2018-20855 SMASH Issue 238067 SMASH Issue 238090 SUSE:openSUSE-SU-2019:1923 SUSE:openSUSE-SU-2019:1924 UBUNTU:CVE-2018-20855 bnc#1143045 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1655162 rh#1664110 rh#1667782 rh#1701224 rh#1701842 rh#1703063 rh#1707796 rh#1710405 rh#1715494 rh#1715554 rh#1716328 rh#1716992 rh#1718176 rh#1727756 rh#1729933 rh#1731000 rh#1734243 rh#1734246 rh#1738708 rh#1757368 |
CVE-2018-20961 | kernel-source-rt:Ignore | moderate | 5.7 (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H) | BUGTRAQ:20190826 [slackware-security] Slackware 14.2 kernel (SSA:2019-238-01) CONFIRM:security.netapp.com:CVE-2019-15098 CONFIRM:support.f5.com:/csp/article/K58502654 CVE-2018-20961 MISC:cdn.kernel.org:CVE-2018-20961 MISC:git.kernel.org:CVE-2018-20961 MISC:github.com:CVE-2018-20961 MISC:packetstormsecurity.com:/files/154228/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html MISC:packetstormsecurity.com:CVE-2019-0136 RH:CVE-2018-20961 SMASH Issue 239209 UBUNTU:CVE-2018-20961 USN-4145-1 bnc#1144823 rh#1743502 |
CVE-2018-20976 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L) | CVE-2018-20976 MISC:git.kernel.org:CVE-2018-20976 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 OSS:2019/09/17/1 Oracle:CVE-2018-12207 Oracle:CVE-2019-11477 Oracle:CVE-2019-14821 RH:CVE-2018-20976 RHSA-2020:0178 RHSA-2020:0543 RHSA-2020:0592 RHSA-2020:0609 RHSA-2020:0661 SMASH Issue 240427 UBUNTU:CVE-2018-20976 bnc#1146285 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1743547 rh#1746628 rh#1746732 rh#1757368 rh#1781514 |
CVE-2018-21008 | kernel-source-rt:Not affected | moderate | 5.6 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L) | CVE-2018-21008 MISC:cdn.kernel.org:CVE-2018-21008 MISC:git.kernel.org:CVE-2018-21008 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 Oracle:CVE-2019-11477 Oracle:CVE-2019-14821 RH:CVE-2018-21008 SMASH Issue 241748 UBUNTU:CVE-2018-21008 bnc#1149591 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1667782 rh#1743547 rh#1746628 rh#1757368 rh#1759188 rh#1773519 rh#1783498 |
CVE-2018-21232 | re2c:Unsupported | moderate | () | CVE-2018-21232 MISC:github.com:CVE-2018-21232 MISC:www.openwall.com:CVE-2018-21232 OSS:2020/Q2/111 RH:CVE-2018-21232 SMASH Issue 258804 UBUNTU:CVE-2018-21232 bnc#1170890 rh#1837650 |
CVE-2018-25015 | kernel-source-rt:Not affected | important | 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2018-25015 MISC:cdn.kernel.org:CVE-2018-25015 MISC:git.kernel.org:CVE-2018-25015 MISC:sites.google.com:CVE-2018-25015 MISC:syzkaller.appspot.com:CVE-2018-25015 SMASH Issue 301366 bnc#1187046 rh#1969529 |
CVE-2018-25020 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2018-25020 CVE-2018-25020 D:CVE-2018-25020 L3:62421 MISC:github.com:CVE-2018-25020 MISC:packetstormsecurity.com:CVE-2021-33909 SMASH Issue 316802 bnc#1193575 bnc#1193863 bnc#1194309 rh#2031183 |
CVE-2018-25032 | zlib:Released | important | 8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:cert-portal.siemens.com:/productcert/pdf/ssa-333517.pdf CONFIRM:github.com:CVE-2018-25032 CONFIRM:security.netapp.com:CVE-2018-25032 CONFIRM:security.netapp.com:CVE-2022-21569 CONFIRM:support.apple.com:CVE-2018-25032 CVE-2018-25032 D:CVE-2018-25032 DSA-5111 FEDORA:FEDORA-2022-12b89e2aad FEDORA:FEDORA-2022-3a92250fd5 FEDORA:FEDORA-2022-413a80a102 FEDORA:FEDORA-2022-61cf1c64f6 FEDORA:FEDORA-2022-b58a85e167 FEDORA:FEDORA-2022-dbd2935e44 FULLDISC:20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4 FULLDISC:20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6 FULLDISC:20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina GLSA-202210-42 L3:63778 L3:68111 MISC:github.com:CVE-2018-25032 MISC:www.oracle.com:CVE-2022-21586 MLIST:[debian-lts-announce] 20220402 [SECURITY] [DLA 2968-1] zlib security update MLIST:[debian-lts-announce] 20220507 [SECURITY] [DLA 2993-1] libz-mingw-w64 security update MLIST:[debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update OSS:2022/03/24/1 OSS:2022/03/25/2 OSS:2022/03/26/1 OSS:2022/03/28/1 OSS:2022/03/28/3 OSS:2022/Q1/195 Oracle:CVE-2018-25032 RHSA-2022:1591 RHSA-2022:1642 RHSA-2022:1661 RHSA-2022:2192 RHSA-2022:2197 RHSA-2022:2198 RHSA-2022:2201 RHSA-2022:2213 RHSA-2022:2214 RHSA-2022:4584 RHSA-2022:4592 RHSA-2022:4845 RHSA-2022:4896 RHSA-2022:5439 RHSA-2022:7144 RHSA-2022:7813 RHSA-2022:8420 RHSA-2023:0943 RHSA-2023:0975 RHSA-2023:0976 SMASH Issue 327120 SMASH Issue 327236 bdo#1008265 bnc#1197459 jsc#CAR-1618 rh#2067945 |
CVE-2018-5332 | kernel-source-rt:Not affected | low | 3.6 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L) | BID:102507 CONFIRM:git.kernel.org:CVE-2018-5332 CONFIRM:github.com:CVE-2018-5332 CVE-2018-5332 D:CVE-2018-5332 DEBIAN:DSA-4187 DSA-4187 DSA-5378 MLIST:[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-5715 RH:CVE-2018-5332 RHSA-2018:0470 SMASH Issue 198027 UBUNTU:CVE-2018-5332 UBUNTU:USN-3617-1 UBUNTU:USN-3617-2 UBUNTU:USN-3617-3 UBUNTU:USN-3619-1 UBUNTU:USN-3619-2 UBUNTU:USN-3620-1 UBUNTU:USN-3620-2 UBUNTU:USN-3632-1 bdo#1033297 bnc#1075621 rh#1495089 rh#1498016 rh#1519780 rh#1533890 rh#1539599 rh#2061700 rh#2119127 |
CVE-2018-5333 | kernel-source-rt:Not affected | low | 2.9 (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) | BID:102510 CONFIRM:git.kernel.org:CVE-2018-5333 CONFIRM:github.com:CVE-2018-5333 CVE-2018-5333 D:CVE-2018-5333 DSA-4187 DSA-5378 OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-5715 RH:CVE-2018-5333 RHSA-2018:0470 SMASH Issue 198028 UBUNTU:CVE-2018-5333 bdo#1033297 bnc#1075617 rh#1495089 rh#1498016 rh#1519780 rh#1533891 rh#1539599 rh#2061700 rh#2119127 |
CVE-2018-5389 | strongswan:Not affected | moderate | 6.7 (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CERT-VN:VU#857035 CVE-2018-5389 D:CVE-2018-5389 MISC:blogs.cisco.com:CVE-2018-5389 MISC:web-in-security.blogspot.com:CVE-2018-5389 MISC:www.usenix.org:CVE-2018-5389 RH:CVE-2018-5389 SMASH Issue 211125 UBUNTU:CVE-2018-5389 bnc#1101792 rh#1603064 |
CVE-2018-5703 | kernel-source-rt:Not affected | important | 7.7 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H) | CVE-2018-5703 MISC:groups.google.com:CVE-2018-5703 RH:CVE-2018-5703 SMASH Issue 198321 UBUNTU:CVE-2018-5703 bnc#1076200 rh#1535110 |
CVE-2018-5814 | kernel-source-rt:Released | moderate | 5.3 (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:cdn.kernel.org:CVE-2018-5814 CONFIRM:git.kernel.org:CVE-2018-5814 CVE-2018-5814 D:CVE-2018-5814 DSA-5378 MISC:secuniaresearch.flexerasoftware.com:CVE-2018-5814 OSS:2018/Q2/165 OSS:2022/11/10/2 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2018-3639 Oracle:CVE-2018-3646 Oracle:CVE-2018-5390 RH:CVE-2018-5814 SECTRACK:1041050 SECUNIA:81540 SMASH Issue 207587 UBUNTU:CVE-2018-5814 bdo#1033297 bnc#1096480 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1519780 rh#1527393 rh#1573699 rh#1575472 rh#1588620 rh#1599161 rh#1601704 rh#1609664 rh#1667782 rh#1701224 rh#1701842 rh#2027239 rh#2044863 rh#2061700 rh#2119127 |
CVE-2018-5953 | kernel-source-rt:Ignore | low | 3.3 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) | BID:105045 CONFIRM:git.kernel.org:CVE-2018-5953 CVE-2018-5953 D:CVE-2018-5953 MISC:github.com:CVE-2018-5953 MLIST:[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update MLIST:[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update RH:CVE-2018-5953 SMASH Issue 212443 UBUNTU:CVE-2018-5953 bnc#1104131 rh#1614057 |
CVE-2018-5995 | kernel-source-rt:Unsupported | low | 3.3 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) | BID:105049 CVE-2018-5995 D:CVE-2018-5995 DSA-4497 MISC:github.com:CVE-2018-5995 MLIST:[debian-lts-announce] 20190528 [SECURITY] [DLA 1799-1] linux security update MLIST:[debian-lts-announce] 20190528 [SECURITY] [DLA 1799-2] linux security update RH:CVE-2018-5995 SMASH Issue 212444 UBUNTU:CVE-2018-5995 bnc#1104130 rh#1614061 |
CVE-2018-6554 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | BID:105302 CVE-2018-6554 D:CVE-2018-6554 DEBIAN:DSA-4308 MLIST:[debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update MLIST:[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update MLIST:[stable] 20180904 [PATCH 1/2] irda: Fix memory leak caused by repeated binds of irda socket OSS:2018/09/18/4 OSS:2018/09/25/4 RH:CVE-2018-6554 SMASH Issue 213505 UBUNTU:CVE-2018-6554 UBUNTU:USN-3775-1 UBUNTU:USN-3775-2 UBUNTU:USN-3776-1 UBUNTU:USN-3776-2 UBUNTU:USN-3777-1 UBUNTU:USN-3777-2 UBUNTU:USN-3777-3 bnc#1106509 rh#1575866 rh#1623610 rh#1890354 |
CVE-2018-6555 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L) | BID:105304 CVE-2018-6555 D:CVE-2018-6555 DEBIAN:DSA-4308 MLIST:[debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update MLIST:[stable] 20180904 [PATCH 2/2] irda: Only insert new objects into the global database via setsockopt OSS:2018/09/18/4 OSS:2018/09/25/4 RH:CVE-2018-6555 SMASH Issue 213506 UBUNTU:CVE-2018-6555 UBUNTU:USN-3775-1 UBUNTU:USN-3775-2 UBUNTU:USN-3776-1 UBUNTU:USN-3776-2 UBUNTU:USN-3777-1 UBUNTU:USN-3777-2 UBUNTU:USN-3777-3 bnc#1106511 rh#1575866 rh#1623614 rh#1890354 |
CVE-2018-6952 | patch:Released | low | 3.3 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | BID:103047 CVE-2018-6952 D:CVE-2018-6952 MISC:savannah.gnu.org:CVE-2018-6952 RH:CVE-2018-6952 RHSA-2019:2033 SMASH Issue 199945 UBUNTU:CVE-2018-6952 bnc#1080985 jsc#CAR-1824 rh#1545053 rh#1818934 |
CVE-2018-7480 | kernel-source-rt:Not affected | moderate | 6.7 (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:H) | CVE-2018-7480 DEBIAN:DSA-4188 DSA-4188 MISC:git.kernel.org:CVE-2018-7480 MISC:github.com:CVE-2018-7480 OSS:2018/09/18/4 RH:CVE-2018-7480 SMASH Issue 200843 UBUNTU:CVE-2018-7480 UBUNTU:USN-3654-1 UBUNTU:USN-3654-2 UBUNTU:USN-3656-1 bnc#1082863 rh#1549427 |
CVE-2018-7492 | kernel-source-rt:Already fixed | moderate | 6.2 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | BID:103185 CVE-2018-7492 D:CVE-2018-7492 DSA-4187 DSA-5378 MISC:git.kernel.org:CVE-2018-7492 MISC:git.kernel.org:OSS:2014/03/05/6 MISC:github.com:CVE-2018-7492 MISC:patchwork.kernel.org:CVE-2018-7492 MISC:www.kernel.org:CVE-2018-7492 MISC:xorl.wordpress.com:CVE-2018-7492 OSS:2014/03/05/6 OSS:2018/Q1/191 OSS:2022/11/10/2 OSS:2022/12/27/3 OSS:2022/Q4/132 OSS:2022/Q4/135 OSS:2022/Q4/244 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2018-3639 Oracle:CVE-2018-3646 RH:CVE-2018-7492 SMASH Issue 200869 UBUNTU:CVE-2018-7492 bdo#1033297 bnc#1082962 rh#1519780 rh#1527393 rh#1573699 rh#1575472 rh#1599161 rh#2027239 rh#2044863 rh#2061700 rh#2119127 |
CVE-2018-7995 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | BID:103356 BID:106503 BID:99619 CONFIRM:bugzilla.kernel.org:CVE-2018-10876 CONFIRM:bugzilla.kernel.org:CVE-2018-10880 CONFIRM:bugzilla.kernel.org:CVE-2018-10882 CONFIRM:bugzilla.redhat.com:CVE-2018-10853 CONFIRM:bugzilla.redhat.com:CVE-2018-10876 CONFIRM:bugzilla.redhat.com:CVE-2018-10877 CONFIRM:bugzilla.redhat.com:CVE-2018-10880 CONFIRM:bugzilla.redhat.com:CVE-2018-10882 CONFIRM:git.kernel.org:CVE-2018-10853 CONFIRM:git.kernel.org:CVE-2018-10876 CONFIRM:git.kernel.org:CVE-2018-10880 CONFIRM:git.kernel.org:CVE-2018-10882 CONFIRM:github.com:CVE-2017-8831 CONFIRM:github.com:CVE-2018-1000204 CONFIRM:patchwork.ozlabs.org:CVE-2018-10876 CONFIRM:patchwork.ozlabs.org:CVE-2018-10880 CONFIRM:source.android.com:CVE-2017-6280 CVE-2017-13168 CVE-2017-8813 CVE-2017-8831 CVE-2018-1000204 CVE-2018-10021 CVE-2018-10853 CVE-2018-10876 CVE-2018-10877 CVE-2018-10880 CVE-2018-10882 CVE-2018-13405 CVE-2018-7995 D:CVE-2017-8831 D:CVE-2018-7995 DEBIAN:DSA-4187 DEBIAN:DSA-4188 DEBIAN:DSA-4266 DSA-4187 DSA-4188 EXPLOIT-DB:45033 MISC:bugzilla.kernel.org:CVE-2017-8831 MISC:git.kernel.org:CVE-2018-10021 MISC:git.kernel.org:CVE-2018-13405 MISC:git.kernel.org:CVE-2018-7995 MISC:git.kernel.org:OSS:2020/Q1/69 MISC:github.com:CVE-2018-10021 MISC:github.com:CVE-2018-13405 MISC:lkml.org:CVE-2018-7995 MISC:openwall.com:CVE-2018-13405 MISC:twitter.com:CVE-2018-13405 MISC:www.openwall.com:CVE-2018-10853 MISC:www.securityfocus.com:CVE-2017-8831 MLIST:[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update MLIST:[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update MLIST:[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update MLIST:[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package MLIST:[debian-lts-announce] 20180815 [SECURITY] [DLA 1466-1] linux-4.9 security update OSS:2018/09/18/4 OSS:2018/09/25/4 OSS:2018/Q3/208 OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 Oracle:CVE-2017-6074 Oracle:CVE-2018-3646 Oracle:CVE-2018-5390 RH:CVE-2017-13168 RH:CVE-2017-8831 RH:CVE-2018-10021 RH:CVE-2018-10853 RH:CVE-2018-7995 RHSA-2018:2948 RHSA-2018:3083 RHSA-2018:3096 RHSA-2019:2029 RHSA-2019:2043 RHSA-2020:0036 RHSA-2020:0103 RHSA-2020:0179 SMASH Issue 184883 SMASH Issue 196270 SMASH Issue 196659 SMASH Issue 201551 SMASH Issue 207826 SMASH Issue 207855 SUSE:openSUSE-SU-2019:1407 UBUNTU:CVE-2017-13168 UBUNTU:CVE-2017-8831 UBUNTU:CVE-2018-10021 UBUNTU:CVE-2018-10853 UBUNTU:CVE-2018-7995 UBUNTU:USN-3654-1 UBUNTU:USN-3654-2 UBUNTU:USN-3656-1 UBUNTU:USN-3678-1 UBUNTU:USN-3678-2 UBUNTU:USN-3678-3 UBUNTU:USN-3678-4 UBUNTU:USN-3696-1 UBUNTU:USN-3696-2 UBUNTU:USN-3752-1 UBUNTU:USN-3752-2 UBUNTU:USN-3752-3 UBUNTU:USN-3753-1 UBUNTU:USN-3753-2 UBUNTU:USN-3754-1 UBUNTU:USN-3777-1 UBUNTU:USN-3777-2 UBUNTU:USN-3820-1 UBUNTU:USN-3820-2 UBUNTU:USN-3820-3 UBUNTU:USN-3821-1 UBUNTU:USN-3821-2 UBUNTU:USN-3822-1 UBUNTU:USN-3822-2 bnc#1037994 bnc#1072831 bnc#1084755 bnc#1089281 bnc#1097104 bnc#1097108 http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=318aaf34f1179b39fa9c30fa0f3288b645beee39 linux.git:commit:3c9fa24ca7c9c47605672916491f79e8ccacb9e6 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1435719 rh#1449980 rh#1462147 rh#1462158 rh#1481178 rh#1553911 rh#1566407 rh#1589324 rh#1589890 rh#1596812 rh#1596842 rh#1599161 rh#1601704 rh#1609664 rh#1658985 rh#1667782 rh#1701224 rh#1701842 rh#2027239 rh#2044863 |
CVE-2018-8740 | sqlite3:Already fixed | low | 4 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | BID:103466 CVE-2018-8740 FEDORA:FEDORA-2019-49f80a78bc MISC:bugs.chromium.org:CVE-2018-8740 MISC:bugs.launchpad.net:CVE-2018-8740 MISC:www.sqlite.org:CVE-2018-8740 MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 MLIST:[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 MLIST:[debian-lts-announce] 20190111 [SECURITY] [DLA 1633-1] sqlite3 security update MLIST:[debian-lts-announce] 20200822 [SECURITY] [DLA 2340-1] sqlite3 security update OSS:2018/Q1/244 Oracle:CVE-2019-8457 RH:CVE-2018-8740 SMASH Issue 202195 SUSE:openSUSE-SU-2019:1426 UBUNTU:CVE-2018-8740 USN-4205-1 USN-4394-1 bnc#1085790 https://lists.debian.org/debian-lts-announce/2023/05/msg00022.html rh#1558804 rh#1716881 |
CVE-2018-8769 | elfutils:Not affected | moderate | 4.4 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L) | CONFIRM:sourceware.org:CVE-2018-8769 CVE-2018-8769 D:CVE-2018-8769 RH:CVE-2018-8769 SMASH Issue 202205 UBUNTU:CVE-2018-8769 bnc#1085809 rh#1559241 |
CVE-2018-8822 | kernel-source-rt:Already fixed | moderate | 6.4 (CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H) | BID:103476 CONFIRM:www.mail-archive.com:CVE-2018-8822 CVE-2018-8822 D:CVE-2018-8822 DEBIAN:DSA-4187 DEBIAN:DSA-4188 DSA-4187 DSA-4188 DSA-5378 MISC:git.kernel.org:OSS:2014/03/05/6 MLIST:[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update OSS:2014/03/05/6 OSS:2022/11/10/2 OSS:2022/12/27/3 OSS:2022/Q4/132 OSS:2022/Q4/135 OSS:2022/Q4/244 Oracle:CVE-2017-0861 Oracle:CVE-2017-5715 Oracle:CVE-2018-3639 RH:CVE-2018-8822 SMASH Issue 202284 UBUNTU:CVE-2018-8822 UBUNTU:USN-3653-1 UBUNTU:USN-3653-2 UBUNTU:USN-3654-1 UBUNTU:USN-3654-2 UBUNTU:USN-3655-1 UBUNTU:USN-3655-2 UBUNTU:USN-3656-1 UBUNTU:USN-3657-1 bdo#1033297 bnc#1086162 https://www.mail-archive.com/netdev%40vger.kernel.org/msg223373.html rh#1243852 rh#1495089 rh#1519780 rh#1527393 rh#1558697 rh#2061700 rh#2119127 |
CVE-2019-0136 | kernel-source-rt:Already fixed | important | 7.4 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H) | BID:108777 CONFIRM:support.lenovo.com:CVE-2019-0136 CVE-2019-0136 JVN:JVN#75617741 L3:62183 MISC:git.kernel.org:OSS:2020/Q1/69 MISC:packetstormsecurity.com:CVE-2019-0136 MISC:www.intel.com:CVE-2018-12147 MISC:www.intel.com:CVE-2019-0136 MLIST:[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update MLIST:[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update MLIST:[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update OSS:2020/02/11/1 OSS:2020/02/11/2 OSS:2020/02/14/4 Oracle:CVE-2018-3693 RHSA-2020:3220 RHSA-2021:4687 SMASH Issue 235112 UBUNTU:CVE-2019-0136 USN-4115-1 USN-4118-1 USN-4145-1 USN-4147-1 bnc#1193068 bnc#1193157 bnc#1193161 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1420236 rh#1481178 rh#2010970 rh#2027798 |
CVE-2019-1010065 | crash:Unsupported | low | () | CVE-2019-1010065 FEDORA:FEDORA-2019-2e68c0a0ee FEDORA:FEDORA-2019-52f83932a1 MISC:github.com:CVE-2019-1010065 MISC:issuetracker.google.com:CVE-2019-1010065 MLIST:[debian-lts-announce] 20220620 [SECURITY] [DLA 3054-1] sleuthkit security update SMASH Issue 237652 UBUNTU:CVE-2019-1010065 bnc#1142201 rh#1735531 |
CVE-2019-10125 | kernel-source-rt:Not affected | critical | () | BID:107655 CONFIRM:security.netapp.com:CVE-2019-10124 CONFIRM:support.f5.com:CVE-2019-10125 CVE-2019-10125 MISC:patchwork.kernel.org:CVE-2019-10125 RH:CVE-2019-10125 SMASH Issue 227195 UBUNTU:CVE-2019-10125 bnc#1130695 rh#1695074 |
CVE-2019-10142 | kernel-source-rt:Not affected | important | () | CVE-2019-10142 MISC:bugzilla.redhat.com:OSS:2019/Q2/126 MISC:git.kernel.org:OSS:2019/Q2/126 OSS:2019/Q2/126 RH:CVE-2019-10142 SMASH Issue 233416 UBUNTU:CVE-2019-10142 bnc#1135955 rh#1711194 |
CVE-2019-10155 | strongswan:Analysis | low | () | CONFIRM:bugzilla.redhat.com:CVE-2019-10155 CVE-2019-10155 FEDORA:FEDORA-2019-1bd9cfb718 FEDORA:FEDORA-2019-f7fb531958 MISC:libreswan.org:CVE-2019-10155 RH:CVE-2019-10155 RHSA-2019:3391 SMASH Issue 234817 UBUNTU:CVE-2019-10155 rh#1714141 |
CVE-2019-10207 | kernel-source-rt:Not affected | moderate | 5.3 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) | CONFIRM:bugzilla.redhat.com:CVE-2019-10207 CONFIRM:security.netapp.com:CVE-2019-10207 CVE-2019-10207 DSA-4495 DSA-4497 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 OSS:2019/09/17/1 OSS:2019/Q3/81 Oracle:CVE-2018-12207 Oracle:CVE-2019-11477 Oracle:CVE-2019-14821 RH:CVE-2019-10207 RHSA-2019:3309 RHSA-2019:3517 RHSA-2020:1016 RHSA-2020:1070 SMASH Issue 237982 SMASH Issue 237987 UBUNTU:CVE-2019-10207 bnc#1123959 bnc#1142857 linux.git:commit:b36a1552d7319bbfd5cf7f08726c23c5c66d4f73 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1731000 rh#1733874 rh#1734243 rh#1734246 rh#1743547 rh#1746628 rh#1746732 rh#1757368 rh#1781514 |
CVE-2019-10638 | kernel-source-rt:Not affected | moderate | 5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) | BID:109092 BUGTRAQ:20190812 [SECURITY] [DSA 4495-1] linux security update BUGTRAQ:20190813 [SECURITY] [DSA 4497-1] linux security update BUGTRAQ:20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01) CONFIRM:security.netapp.com:CVE-2019-12984 CVE-2019-10638 D:CVE-2019-10638 DSA-4495 DSA-4497 MISC:arxiv.org:CVE-2019-10638 MISC:cdn.kernel.org:CVE-2019-10638 MISC:cdn.kernel.org:CVE-2019-11486 MISC:git.kernel.org:CVE-2019-10638 MISC:github.com:CVE-2019-10638 MISC:packetstormsecurity.com:CVE-2019-15098 MISC:www.oracle.com:CVE-2021-3450 MLIST:[debian-lts-announce] 20190814 [SECURITY] [DLA 1884-1] linux security update MLIST:[debian-lts-announce] 20190814 [SECURITY] [DLA 1885-1] linux-4.9 security update Oracle:CVE-2017-5753 Oracle:CVE-2019-11477 Oracle:CVE-2019-5489 RH:CVE-2019-10638 RHSA-2019:3309 RHSA-2019:3517 RHSA-2020:1016 RHSA-2020:1070 SMASH Issue 236581 SMASH Issue 237719 SUSE:openSUSE-SU-2019:1716 SUSE:openSUSE-SU-2019:1757 UBUNTU:CVE-2019-10638 USN-4114-1 USN-4115-1 USN-4116-1 USN-4117-1 USN-4118-1 bnc#1140575 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1655162 rh#1664110 rh#1667782 rh#1701224 rh#1701842 rh#1703063 rh#1707796 rh#1710405 rh#1715494 rh#1715554 rh#1716328 rh#1716992 rh#1718176 rh#1727756 rh#1729931 rh#1729933 rh#1731000 rh#1734243 rh#1734246 |
CVE-2019-11477 | kernel-source-rt:Already fixed | important | 8.2 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H) | BID:108818 BUGTRAQ:20190722 [SECURITY] [DSA 4484-1] linux security update CERT-VN:VU#905115 CONFIRM:cert-portal.siemens.com:CVE-2019-11477 CONFIRM:kb.pulsesecure.net:CVE-2019-11477 CONFIRM:kc.mcafee.com:CVE-2019-11477 CONFIRM:psirt.global.sonicwall.com:CVE-2019-11477 CONFIRM:psirt.global.sonicwall.com:CVE-2019-11478 CONFIRM:psirt.global.sonicwall.com:CVE-2019-11479 CONFIRM:security.netapp.com:CVE-2019-11477 CONFIRM:support.f5.com:CVE-2019-11477 CONFIRM:support.f5.com:CVE-2019-11478 CONFIRM:support.f5.com:CVE-2019-11479 CONFIRM:www.arubanetworks.com:CVE-2019-11477 CONFIRM:www.huawei.com:CVE-2019-11477 CONFIRM:www.synology.com:CVE-2019-11477 CONFIRM:www.vmware.com:CVE-2019-11477 CVE-2019-11477 CVE-2019-11478 CVE-2019-11479 DSA-4465 MISC:access.redhat.com:CVE-2019-11477 MISC:azure.microsoft.com:MLIST:[oss-security] 20190706 Re: linux-distros membership application - Microsoft MISC:bugs.chromium.org:MISC:www.openwall.com:CVE-2019-11190 MISC:bugs.launchpad.net:MLIST:[oss-security] 20190628 Re: linux-distros membership application - Microsoft MISC:git.kernel.org:CVE-2019-11477 MISC:git.kernel.org:CVE-2019-11478 MISC:git.kernel.org:CVE-2019-11479 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MLIST:[oss-security] 20190617 Linux and FreeBSD Kernel: Multiple TCP-based remote denial of service issues MISC:packetstormsecurity.com:CVE-2019-0136 MISC:packetstormsecurity.com:CVE-2019-11477 MISC:packetstormsecurity.com:CVE-2019-11478 MISC:wiki.ubuntu.com:CVE-2019-11477 MISC:www.oracle.com:CVE-2013-7285 MISC:www.oracle.com:CVE-2014-3596 MISC:www.us-cert.gov:CVE-2019-11477 MISC:www.us-cert.gov:CVE-2019-11479 MLIST:[oss-security] 20190617 Linux and FreeBSD Kernel: Multiple TCP-based remote denial of service issues MLIST:[oss-security] 20190620 Re: Linux and FreeBSD Kernel: Multiple TCP-based remote denial of service issues MLIST:[oss-security] 20190628 Re: linux-distros membership application - Microsoft MLIST:[oss-security] 20190706 Re: linux-distros membership application - Microsoft MLIST:[oss-security] 20191023 Membership application for linux-distros - VMware MLIST:[oss-security] 20191029 Re: Membership application for linux-distros - VMware OSS:2019/04/03/4 OSS:2019/09/17/1 OSS:2019/Q2/182 OSS:2019/Q2/234 Oracle:CVE-2017-5753 Oracle:CVE-2018-12207 Oracle:CVE-2018-5390 Oracle:CVE-2019-11477 Oracle:CVE-2019-14821 Oracle:CVE-2019-5489 RH:CVE-2019-11477 RH:CVE-2019-11478 RH:CVE-2019-11479 RHSA-2019:1479 RHSA-2019:1480 RHSA-2019:1481 RHSA-2019:1482 RHSA-2019:1483 RHSA-2019:1484 RHSA-2019:1485 RHSA-2019:1486 RHSA-2019:1487 RHSA-2019:1488 RHSA-2019:1489 RHSA-2019:1490 RHSA-2019:1594 RHSA-2019:1602 RHSA-2019:1699 SMASH Issue 234528 UBUNTU:CVE-2019-11477 UBUNTU:CVE-2019-11478 UBUNTU:CVE-2019-11479 USN-4041-1 USN-4041-2 bdo#928989 bnc#1137586 bnc#1137597 linux.git:commit:3b4929f65b0d8249f19a50245cd88ed1a2f78cff linux.git:commit:5f3e2bf008c2221478101ee72f5cb4654b9fc363 linux.git:commit:967c05aee439e6e5d7d805e195b3a20ef5c433d6 linux.git:commit:b617158dc096709d8600c53b6052144d12b89fab linux.git:commit:f070ef2ac66716357066b683fb0baf55f8191a2e linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1205079 rh#1601704 rh#1646768 rh#1655162 rh#1664110 rh#1667782 rh#1699856 rh#1701224 rh#1701842 rh#1703063 rh#1707796 rh#1710405 rh#1715494 rh#1715554 rh#1716328 rh#1716992 rh#1718176 rh#1719123 rh#1719128 rh#1719129 rh#1727756 rh#1729933 rh#1731000 rh#1734243 rh#1734246 rh#1743547 rh#1746628 rh#1746732 rh#1757368 rh#1781514 |
CVE-2019-11478 | kernel-source-rt:Already fixed | important | 5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | BID:108818 BUGTRAQ:20190722 [SECURITY] [DSA 4484-1] linux security update CERT-VN:VU#905115 CONFIRM:cert-portal.siemens.com:CVE-2019-11477 CONFIRM:kb.pulsesecure.net:CVE-2019-11477 CONFIRM:kc.mcafee.com:CVE-2019-11477 CONFIRM:psirt.global.sonicwall.com:CVE-2019-11477 CONFIRM:psirt.global.sonicwall.com:CVE-2019-11478 CONFIRM:psirt.global.sonicwall.com:CVE-2019-11479 CONFIRM:security.netapp.com:CVE-2019-11477 CONFIRM:support.f5.com:CVE-2019-11477 CONFIRM:support.f5.com:CVE-2019-11478 CONFIRM:support.f5.com:CVE-2019-11479 CONFIRM:www.arubanetworks.com:CVE-2019-11477 CONFIRM:www.huawei.com:CVE-2019-11477 CONFIRM:www.synology.com:CVE-2019-11477 CONFIRM:www.vmware.com:CVE-2019-11477 CVE-2019-11477 CVE-2019-11478 CVE-2019-11479 DSA-4465 MISC:access.redhat.com:CVE-2019-11477 MISC:azure.microsoft.com:MLIST:[oss-security] 20190706 Re: linux-distros membership application - Microsoft MISC:bugs.chromium.org:MISC:www.openwall.com:CVE-2019-11190 MISC:bugs.launchpad.net:MLIST:[oss-security] 20190628 Re: linux-distros membership application - Microsoft MISC:git.kernel.org:CVE-2019-11477 MISC:git.kernel.org:CVE-2019-11478 MISC:git.kernel.org:CVE-2019-11479 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MLIST:[oss-security] 20190617 Linux and FreeBSD Kernel: Multiple TCP-based remote denial of service issues MISC:packetstormsecurity.com:CVE-2019-0136 MISC:packetstormsecurity.com:CVE-2019-11477 MISC:packetstormsecurity.com:CVE-2019-11478 MISC:wiki.ubuntu.com:CVE-2019-11477 MISC:www.oracle.com:CVE-2013-7285 MISC:www.oracle.com:CVE-2014-3596 MISC:www.us-cert.gov:CVE-2019-11477 MISC:www.us-cert.gov:CVE-2019-11479 MLIST:[oss-security] 20190617 Linux and FreeBSD Kernel: Multiple TCP-based remote denial of service issues MLIST:[oss-security] 20190620 Re: Linux and FreeBSD Kernel: Multiple TCP-based remote denial of service issues MLIST:[oss-security] 20190628 Re: linux-distros membership application - Microsoft MLIST:[oss-security] 20190706 Re: linux-distros membership application - Microsoft MLIST:[oss-security] 20191023 Membership application for linux-distros - VMware MLIST:[oss-security] 20191029 Re: Membership application for linux-distros - VMware OSS:2019/04/03/4 OSS:2019/09/17/1 OSS:2019/Q2/182 OSS:2019/Q2/234 Oracle:CVE-2017-5753 Oracle:CVE-2018-12207 Oracle:CVE-2018-5390 Oracle:CVE-2019-11477 Oracle:CVE-2019-14821 Oracle:CVE-2019-5489 RH:CVE-2019-11477 RH:CVE-2019-11478 RH:CVE-2019-11479 RHSA-2019:1479 RHSA-2019:1480 RHSA-2019:1481 RHSA-2019:1482 RHSA-2019:1483 RHSA-2019:1484 RHSA-2019:1485 RHSA-2019:1486 RHSA-2019:1487 RHSA-2019:1488 RHSA-2019:1489 RHSA-2019:1490 RHSA-2019:1594 RHSA-2019:1602 RHSA-2019:1699 SMASH Issue 234528 UBUNTU:CVE-2019-11477 UBUNTU:CVE-2019-11478 UBUNTU:CVE-2019-11479 USN-4041-1 USN-4041-2 bdo#928989 bnc#1137586 bnc#1137597 linux.git:commit:3b4929f65b0d8249f19a50245cd88ed1a2f78cff linux.git:commit:5f3e2bf008c2221478101ee72f5cb4654b9fc363 linux.git:commit:967c05aee439e6e5d7d805e195b3a20ef5c433d6 linux.git:commit:b617158dc096709d8600c53b6052144d12b89fab linux.git:commit:f070ef2ac66716357066b683fb0baf55f8191a2e linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1205079 rh#1601704 rh#1646768 rh#1655162 rh#1664110 rh#1667782 rh#1699856 rh#1701224 rh#1701842 rh#1703063 rh#1707796 rh#1710405 rh#1715494 rh#1715554 rh#1716328 rh#1716992 rh#1718176 rh#1719123 rh#1719128 rh#1719129 rh#1727756 rh#1729933 rh#1731000 rh#1734243 rh#1734246 rh#1743547 rh#1746628 rh#1746732 rh#1757368 rh#1781514 |
CVE-2019-11479 | kernel-source-rt:Already fixed | important | 7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | BID:108818 BUGTRAQ:20190722 [SECURITY] [DSA 4484-1] linux security update CERT-VN:VU#905115 CONFIRM:cert-portal.siemens.com:CVE-2019-11477 CONFIRM:kb.pulsesecure.net:CVE-2019-11477 CONFIRM:kc.mcafee.com:CVE-2019-11477 CONFIRM:psirt.global.sonicwall.com:CVE-2019-11477 CONFIRM:psirt.global.sonicwall.com:CVE-2019-11478 CONFIRM:psirt.global.sonicwall.com:CVE-2019-11479 CONFIRM:security.netapp.com:CVE-2019-11477 CONFIRM:support.f5.com:CVE-2019-11477 CONFIRM:support.f5.com:CVE-2019-11478 CONFIRM:support.f5.com:CVE-2019-11479 CONFIRM:www.arubanetworks.com:CVE-2019-11477 CONFIRM:www.huawei.com:CVE-2019-11477 CONFIRM:www.synology.com:CVE-2019-11477 CONFIRM:www.vmware.com:CVE-2019-11477 CVE-2019-11477 CVE-2019-11478 CVE-2019-11479 DSA-4465 MISC:access.redhat.com:CVE-2019-11477 MISC:azure.microsoft.com:MLIST:[oss-security] 20190706 Re: linux-distros membership application - Microsoft MISC:bugs.chromium.org:MISC:www.openwall.com:CVE-2019-11190 MISC:bugs.launchpad.net:MLIST:[oss-security] 20190628 Re: linux-distros membership application - Microsoft MISC:git.kernel.org:CVE-2019-11477 MISC:git.kernel.org:CVE-2019-11478 MISC:git.kernel.org:CVE-2019-11479 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MLIST:[oss-security] 20190617 Linux and FreeBSD Kernel: Multiple TCP-based remote denial of service issues MISC:packetstormsecurity.com:CVE-2019-0136 MISC:packetstormsecurity.com:CVE-2019-11477 MISC:packetstormsecurity.com:CVE-2019-11478 MISC:wiki.ubuntu.com:CVE-2019-11477 MISC:www.oracle.com:CVE-2013-7285 MISC:www.oracle.com:CVE-2014-3596 MISC:www.us-cert.gov:CVE-2019-11477 MISC:www.us-cert.gov:CVE-2019-11479 MLIST:[oss-security] 20190617 Linux and FreeBSD Kernel: Multiple TCP-based remote denial of service issues MLIST:[oss-security] 20190620 Re: Linux and FreeBSD Kernel: Multiple TCP-based remote denial of service issues MLIST:[oss-security] 20190628 Re: linux-distros membership application - Microsoft MLIST:[oss-security] 20190706 Re: linux-distros membership application - Microsoft MLIST:[oss-security] 20191023 Membership application for linux-distros - VMware MLIST:[oss-security] 20191029 Re: Membership application for linux-distros - VMware OSS:2019/04/03/4 OSS:2019/09/17/1 OSS:2019/Q2/182 OSS:2019/Q2/234 Oracle:CVE-2017-5753 Oracle:CVE-2018-12207 Oracle:CVE-2018-5390 Oracle:CVE-2019-11477 Oracle:CVE-2019-14821 Oracle:CVE-2019-5489 RH:CVE-2019-11477 RH:CVE-2019-11478 RH:CVE-2019-11479 RHSA-2019:1479 RHSA-2019:1480 RHSA-2019:1481 RHSA-2019:1482 RHSA-2019:1483 RHSA-2019:1484 RHSA-2019:1485 RHSA-2019:1486 RHSA-2019:1487 RHSA-2019:1488 RHSA-2019:1489 RHSA-2019:1490 RHSA-2019:1594 RHSA-2019:1602 RHSA-2019:1699 SMASH Issue 234528 UBUNTU:CVE-2019-11477 UBUNTU:CVE-2019-11478 UBUNTU:CVE-2019-11479 USN-4041-1 USN-4041-2 bdo#928989 bnc#1137586 bnc#1137597 linux.git:commit:3b4929f65b0d8249f19a50245cd88ed1a2f78cff linux.git:commit:5f3e2bf008c2221478101ee72f5cb4654b9fc363 linux.git:commit:967c05aee439e6e5d7d805e195b3a20ef5c433d6 linux.git:commit:b617158dc096709d8600c53b6052144d12b89fab linux.git:commit:f070ef2ac66716357066b683fb0baf55f8191a2e linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1205079 rh#1601704 rh#1646768 rh#1655162 rh#1664110 rh#1667782 rh#1699856 rh#1701224 rh#1701842 rh#1703063 rh#1707796 rh#1710405 rh#1715494 rh#1715554 rh#1716328 rh#1716992 rh#1718176 rh#1719123 rh#1719128 rh#1719129 rh#1727756 rh#1729933 rh#1731000 rh#1734243 rh#1734246 rh#1743547 rh#1746628 rh#1746732 rh#1757368 rh#1781514 |
CVE-2019-11599 | kernel-source-rt:Not affected | moderate | 6.1 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H) | BID:108113 BUGTRAQ:20190618 [SECURITY] [DSA 4465-1] linux security update BUGTRAQ:20190722 [slackware-security] Slackware 14.2 kernel (SSA:2019-202-01) CONFIRM:security.netapp.com:CVE-2018-20509 CONFIRM:security.netapp.com:CVE-2019-11599 CONFIRM:support.f5.com:CVE-2019-11599 CVE-2019-11599 DSA-4465 EXPLOIT-DB:46781 MISC:cdn.kernel.org:CVE-2019-11599 MISC:git.kernel.org:CVE-2019-11599 MISC:git.kernel.org:MLIST:[oss-security] 20190429 Linux kernel: multiple issues MISC:git.kernel.org:MLIST:[oss-security] 20190430 Re: Linux kernel: multiple issues MISC:github.com:CVE-2019-11599 MISC:packetstormsecurity.com:CVE-2019-11599 MISC:packetstormsecurity.com:CVE-2019-13272 MISC:www.oracle.com:CVE-2021-3450 MLIST:[debian-lts-announce] 20190528 [SECURITY] [DLA 1799-1] linux security update MLIST:[debian-lts-announce] 20190528 [SECURITY] [DLA 1799-2] linux security update MLIST:[debian-lts-announce] 20190618 [SECURITY] [DLA 1824-1] linux-4.9 security update MLIST:[oss-security] 20190429 Linux kernel: multiple issues MLIST:[oss-security] 20190429 Re: Linux kernel: multiple issues MLIST:[oss-security] 20190430 Re: Linux kernel: multiple issues OSS:2019/Q2/74 OSS:2019/Q2/75 OSS:2019/Q2/77 Oracle:CVE-2017-5753 Oracle:CVE-2019-11477 Oracle:CVE-2019-5489 RH:CVE-2019-11599 RHSA-2019:2029 RHSA-2019:2043 RHSA-2019:3309 RHSA-2019:3517 RHSA-2020:0100 RHSA-2020:0103 RHSA-2020:0179 RHSA-2020:0328 RHSA-2020:0339 RHSA-2020:0374 RHSA-2020:0375 RHSA-2020:0543 SMASH Issue 230436 SMASH Issue 230464 SUSE:openSUSE-SU-2019:1716 SUSE:openSUSE-SU-2019:1757 UBUNTU:CVE-2019-11599 USN-4069-1 USN-4069-2 USN-4095-1 USN-4115-1 USN-4118-1 bdo#928989 bnc#1133738 https://support.f5.com/csp/article/K51674118?utm_source=f5support&%3Butm_medium=RSS linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 pz#1752 pz#1790 rh#1655162 rh#1664110 rh#1667782 rh#1696015 rh#1701224 rh#1701842 rh#1703063 rh#1705937 rh#1707796 rh#1710405 rh#1715494 rh#1715554 rh#1716328 rh#1716992 rh#1718176 rh#1727756 rh#1729933 rh#1731000 rh#1734243 rh#1734246 rh#1774671 |
CVE-2019-11810 | kernel-source-rt:Not affected | low | 3.9 (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L) | BID:108286 CONFIRM:security.netapp.com:CVE-2019-11811 CONFIRM:support.f5.com:CVE-2019-11810 CVE-2019-11810 MISC:cdn.kernel.org:CVE-2019-11810 MISC:git.kernel.org:CVE-2019-11810 MISC:github.com:CVE-2019-11810 MLIST:[debian-lts-announce] 20190617 [SECURITY] [DLA 1823-1] linux security update Oracle:CVE-2017-5753 Oracle:CVE-2019-11477 Oracle:CVE-2019-5489 RH:CVE-2019-11810 RHSA-2019:1959 RHSA-2019:1971 RHSA-2019:2029 RHSA-2019:2043 RHSA-2019:2736 RHSA-2019:2837 RHSA-2019:3217 RHSA-2020:0036 SMASH Issue 232343 SUSE:openSUSE-SU-2019:1923 SUSE:openSUSE-SU-2019:1924 UBUNTU:CVE-2019-11810 USN-4005-1 USN-4008-1 USN-4008-3 USN-4115-1 USN-4118-1 bnc#1134399 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1655162 rh#1664110 rh#1667782 rh#1701224 rh#1701842 rh#1703063 rh#1707796 rh#1709164 rh#1710405 rh#1715494 rh#1715554 rh#1716328 rh#1716992 rh#1718176 rh#1727756 rh#1729933 rh#1731000 rh#1734243 rh#1734246 rh#1757368 |
CVE-2019-11811 | kernel-source-rt:Not affected | low | 3.9 (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L) | BID:108410 CONFIRM:security.netapp.com:CVE-2019-11811 CONFIRM:support.f5.com:CVE-2019-11811 CVE-2019-11811 MISC:cdn.kernel.org:CVE-2019-10124 MISC:git.kernel.org:CVE-2019-11811 MISC:github.com:CVE-2019-11811 Oracle:CVE-2017-5753 Oracle:CVE-2019-11477 Oracle:CVE-2019-5489 RH:CVE-2019-11811 RHSA-2019:1873 RHSA-2019:1891 RHSA-2019:1959 RHSA-2019:1971 RHSA-2019:4057 RHSA-2019:4058 RHSA-2020:0036 RHSA-2020:2854 SMASH Issue 232344 SUSE:openSUSE-SU-2019:1479 UBUNTU:CVE-2019-11811 bnc#1134397 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1655162 rh#1664110 rh#1667782 rh#1701224 rh#1701842 rh#1703063 rh#1707796 rh#1709180 rh#1710405 rh#1715494 rh#1715554 rh#1716328 rh#1718176 rh#1727756 rh#1729933 rh#1731000 rh#1734243 rh#1734246 |
CVE-2019-11922 | zstd:Already fixed | low | 0 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N) | CONFIRM:www.facebook.com:CVE-2019-11922 CVE-2019-11922 DSA-4850 MISC:github.com:CVE-2019-11922 MISC:www.oracle.com:CVE-2013-7285 Oracle:CVE-2019-11922 SMASH Issue 238018 SMASH Issue 277625 SUSE:openSUSE-SU-2019:1845 SUSE:openSUSE-SU-2019:1952 SUSE:openSUSE-SU-2019:2008 UBUNTU:CVE-2019-11922 USN-4108-1 bdo#981404 bnc#1142941 rh#2124187 |
CVE-2019-12379 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | BID:108478 CONFIRM:security.netapp.com:CVE-2019-12380 CVE-2019-12379 FEDORA:FEDORA-2019-7ec378191e FEDORA:FEDORA-2019-f40bd7826f MISC:git.kernel.org:CVE-2019-12379 MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/ MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/ RH:CVE-2019-12379 SMASH Issue 233865 UBUNTU:CVE-2019-12379 bnc#1136602 rh#1715491 |
CVE-2019-12455 | kernel-source-rt:Not affected | moderate | () | CONFIRM:security.netapp.com:CVE-2019-12380 CVE-2019-12455 D:CVE-2019-12455 FEDORA:FEDORA-2019-f40bd7826f MISC:git.kernel.org:CVE-2019-12455 MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/ MISC:www.mail-archive.com:CVE-2019-12455 RH:CVE-2019-12455 SMASH Issue 234027 UBUNTU:CVE-2019-12455 bnc#1136946 https://www.mail-archive.com/linux-kernel%40vger.kernel.org/msg2010240.html rh#1716990 |
CVE-2019-12456 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:support.f5.com:CVE-2019-12456 CVE-2019-12456 D:CVE-2019-12456 FEDORA:FEDORA-2019-83858fc57b FEDORA:FEDORA-2019-c03eda3cc6 MISC:bugs.chromium.org:MISC:www.openwall.com:CVE-2019-11190 MISC:git.kernel.org:CVE-2019-12456 MISC:lkml.org:CVE-2019-12456 OSS:2019/04/03/4 Oracle:CVE-2017-5753 Oracle:CVE-2018-5390 Oracle:CVE-2019-11477 Oracle:CVE-2019-5489 RH:CVE-2019-12456 SMASH Issue 234039 SMASH Issue 234058 SUSE:openSUSE-SU-2019:1570 SUSE:openSUSE-SU-2019:1571 SUSE:openSUSE-SU-2019:1579 UBUNTU:CVE-2019-12456 bnc#1136922 bnc#1136978 bnc#1136993 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MDURACJVGIBIYBSGDZJTRDPX46H5WPZW/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OBJHGQXA4PQ5EOGCOXEH3KFDNVZ2I4X7/ https://support.f5.com/csp/article/K84310302?utm_source=f5support&%3Butm_medium=RSS linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1601704 rh#1655162 rh#1664110 rh#1667782 rh#1699856 rh#1701224 rh#1701842 rh#1703063 rh#1707796 rh#1710405 rh#1715494 rh#1715554 rh#1716328 rh#1716992 rh#1717182 rh#1718176 rh#1727756 rh#1729933 rh#1731000 rh#1734243 rh#1734246 rh#1783498 rh#1851480 |
CVE-2019-12614 | kernel-source-rt:Already fixed | moderate | 6.2 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | BID:108550 CVE-2019-12614 D:CVE-2019-12614 FEDORA:FEDORA-2019-83858fc57b FEDORA:FEDORA-2019-c03eda3cc6 MISC:git.kernel.org:CVE-2019-12614 MISC:lkml.org:CVE-2019-12614 Oracle:CVE-2017-5753 Oracle:CVE-2018-5390 Oracle:CVE-2019-11477 Oracle:CVE-2019-5489 RH:CVE-2019-12614 RHSA-2020:2104 RHSA-2020:4060 RHSA-2020:4431 SMASH Issue 234210 SMASH Issue 234214 UBUNTU:CVE-2019-12614 bnc#1137194 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1601704 rh#1655162 rh#1664110 rh#1667782 rh#1701224 rh#1701842 rh#1703063 rh#1707796 rh#1710405 rh#1715494 rh#1715554 rh#1716328 rh#1716992 rh#1718176 rh#1727756 rh#1729933 rh#1731000 rh#1734243 rh#1734246 |
CVE-2019-12615 | kernel-source-rt:Unsupported | moderate | 6.2 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | BID:108549 CONFIRM:security.netapp.com:CVE-2019-12380 CONFIRM:support.f5.com:CVE-2019-12615 CVE-2019-12615 D:CVE-2019-12615 MISC:git.kernel.org:CVE-2019-12615 MISC:www.mail-archive.com:CVE-2019-12615 RH:CVE-2019-12615 SMASH Issue 234211 SMASH Issue 234215 UBUNTU:CVE-2019-12615 bnc#1137195 rh#1718179 |
CVE-2019-12749 | dbus-1:Released | important | 7.1 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N) | BID:108751 BUGTRAQ:20190613 [SECURITY] [DSA 4462-1] dbus security update CVE-2019-12749 D:CVE-2019-12749 DSA-4462 FEDORA:FEDORA-2019-d5ded5326b GLSA-201909-08 L3:56948 MISC:gitlab.freedesktop.org:MLIST:[oss-security] 20190611 CVE-2019-12749: DBusServer DBUS_COOKIE_SHA1 authentication bypass MISC:lists.freedesktop.org:MLIST:[oss-security] 20190611 CVE-2019-12749: DBusServer DBUS_COOKIE_SHA1 authentication bypass MISC:www.openwall.com:CVE-2019-12749 MLIST:[debian-lts-announce] 20190614 [SECURITY] [DLA 1818-1] dbus security update MLIST:[oss-security] 20190611 CVE-2019-12749: DBusServer DBUS_COOKIE_SHA1 authentication bypass OSS:2019/Q2/156 RH:CVE-2019-12749 RHSA-2019:1726 RHSA-2019:2868 RHSA-2019:2870 RHSA-2019:3707 RHSA-2020:4032 SMASH Issue 234787 SMASH Issue 234788 SUSE:openSUSE-SU-2019:1604 SUSE:openSUSE-SU-2019:1671 SUSE:openSUSE-SU-2019:1750 UBUNTU:CVE-2019-12749 USN-4015-1 USN-4015-2 bdo#930375 bnc#1137832 bnc#1166220 rh#1719344 |
CVE-2019-12817 | kernel-source-rt:Not affected | important | 8.1 (CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L) | BID:108884 BUGTRAQ:20190812 [SECURITY] [DSA 4495-1] linux security update CONFIRM:cdn.kernel.org:CVE-2019-12817 CONFIRM:support.f5.com:CVE-2019-12817 CVE-2019-12817 DSA-4495 FEDORA:FEDORA-2019-6817686c4d FEDORA:FEDORA-2019-69c132b061 MISC:git.kernel.org:MLIST:[oss-security] 20190625 CVE-2019-12817: Linux kernel: powerpc: Unrelated processes may be able to read/write to each other's virtual memory MLIST:[oss-security] 20190625 CVE-2019-12817: Linux kernel: powerpc: Unrelated processes may be able to read/write to each other's virtual memory OSS:2019/Q2/200 Oracle:CVE-2017-5753 Oracle:CVE-2019-11477 Oracle:CVE-2019-5489 RH:CVE-2019-12817 RHSA-2019:2703 SMASH Issue 235155 SUSE:openSUSE-SU-2019:1757 UBUNTU:CVE-2019-12817 USN-4031-1 bnc#1138263 bnc#1138264 bnc#1139619 linux.git:commit:26df62aaae9f85e900cd5f1a5c28e44488f60de6 linux.git:commit:8b8dc695143642c6a8bee2242f2f7af4232298ab linux.git:commit:b7cbb5240130520ba572ab1146431ad01d1f5099 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1655162 rh#1664110 rh#1667782 rh#1701224 rh#1701842 rh#1703063 rh#1707796 rh#1710405 rh#1715494 rh#1715554 rh#1716328 rh#1716992 rh#1718176 rh#1720616 rh#1727756 rh#1729933 rh#1731000 rh#1734243 rh#1734246 |
CVE-2019-12818 | kernel-source-rt:Already fixed | moderate | 4.1 (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | BID:108776 CVE-2019-12818 MISC:bugs.chromium.org:MISC:www.openwall.com:CVE-2019-11190 MISC:git.kernel.org:CVE-2019-12818 MISC:github.com:CVE-2019-12818 MISC:www.kernel.org:CVE-2019-12818 OSS:2019/04/03/4 Oracle:CVE-2017-5753 Oracle:CVE-2018-5390 Oracle:CVE-2019-11477 Oracle:CVE-2019-5489 RH:CVE-2019-12818 SMASH Issue 235149 SUSE:openSUSE-SU-2019:1570 SUSE:openSUSE-SU-2019:1571 UBUNTU:CVE-2019-12818 bnc#1138293 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1601704 rh#1655162 rh#1664110 rh#1667782 rh#1699856 rh#1701224 rh#1701842 rh#1703063 rh#1707796 rh#1710405 rh#1715494 rh#1715554 rh#1716328 rh#1716992 rh#1718176 rh#1721967 rh#1727756 rh#1729933 rh#1731000 rh#1734243 rh#1734246 |
CVE-2019-12819 | kernel-source-rt:Already fixed | low | 3.4 (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L) | BID:108768 CVE-2019-12819 MISC:bugs.chromium.org:MISC:www.openwall.com:CVE-2019-11190 MISC:git.kernel.org:CVE-2019-12819 MISC:github.com:CVE-2019-12819 OSS:2019/04/03/4 Oracle:CVE-2017-5753 Oracle:CVE-2019-11477 Oracle:CVE-2019-5489 RH:CVE-2019-12819 RHSA-2020:1567 RHSA-2020:1769 SMASH Issue 235150 SMASH Issue 235159 SUSE:openSUSE-SU-2019:1570 SUSE:openSUSE-SU-2019:1571 UBUNTU:CVE-2019-12819 bnc#1138291 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1655162 rh#1664110 rh#1667782 rh#1699856 rh#1701224 rh#1701842 rh#1703063 rh#1707796 rh#1710405 rh#1715494 rh#1715554 rh#1716328 rh#1716992 rh#1718176 rh#1721962 rh#1727756 rh#1729933 rh#1731000 rh#1734243 rh#1734246 |
CVE-2019-12972 | binutils:Released | moderate | () | BID:108903 CVE-2019-12972 GLSA-202007-39 MISC:sourceware.org:CVE-2019-12972 RH:CVE-2019-12972 SMASH Issue 235748 SMASH Issue 236057 SUSE:openSUSE-SU-2020:1790 SUSE:openSUSE-SU-2020:1804 UBUNTU:CVE-2019-12972 USN-4336-1 bnc#1140126 rh#1831873 |
CVE-2019-13117 | libxslt:Released | moderate | 4.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N) | CONFIRM:security.netapp.com:CVE-2019-13117 CONFIRM:security.netapp.com:CVE-2020-2583 CVE-2019-13117 FEDORA:FEDORA-2019-fdf6ec39b4 MISC:bugs.chromium.org:CVE-2019-13117 MISC:gitlab.gnome.org:CVE-2019-13117 MISC:oss-fuzz.com:CVE-2019-13117 MISC:www.oracle.com:CVE-2014-3596 MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 MLIST:[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 MLIST:[debian-lts-announce] 20190722 [SECURITY] [DLA 1860-1] libxslt security update MLIST:[oss-security] 20191117 Nokogiri security update v1.10.5 OSS:2019/Q4/71 Oracle:CVE-2019-13117 Oracle:CVE-2019-13118 Oracle:CVE-2019-18197 RH:CVE-2019-13117 SMASH Issue 235949 SUSE:openSUSE-SU-2020:0731 UBUNTU:CVE-2019-13117 USN-4164-1 bnc#1140095 rh#1728541 rh#1728546 rh#1770768 |
CVE-2019-13118 | libxslt:Released | low | 3.3 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N) | BUGTRAQ:20190723 APPLE-SA-2019-7-22-1 iOS 12.4 BUGTRAQ:20190723 APPLE-SA-2019-7-22-4 watchOS 5.3 BUGTRAQ:20190723 APPLE-SA-2019-7-22-5 tvOS 12.4 BUGTRAQ:20190724 APPLE-SA-2019-7-23-1 iCloud for Windows 7.13 BUGTRAQ:20190724 APPLE-SA-2019-7-23-2 iTunes for Windows 12.9.6 BUGTRAQ:20190724 APPLE-SA-2019-7-23-3 iCloud for Windows 10.6 BUGTRAQ:20190814 APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra BUGTRAQ:20190814 APPLE-SA-2019-8-13-2 Additional information for APPLE-SA-2019-7-22-1 iOS 12.4 BUGTRAQ:20190814 APPLE-SA-2019-8-13-3 Additional information for APPLE-SA-2019-7-22-4 watchOS 5.3 BUGTRAQ:20190814 APPLE-SA-2019-8-13-4 Additional information for APPLE-SA-2019-7-22-5 tvOS 12.4 CONFIRM:security.netapp.com:CVE-2019-13117 CONFIRM:security.netapp.com:CVE-2020-2583 CONFIRM:support.apple.com:CVE-2018-19860 CONFIRM:support.apple.com:CVE-2019-13118 CVE-2019-13118 FEDORA:FEDORA-2019-fdf6ec39b4 FULLDISC:20190723 APPLE-SA-2019-7-22-1 iOS 12.4 FULLDISC:20190723 APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra FULLDISC:20190723 APPLE-SA-2019-7-22-4 watchOS 5.3 FULLDISC:20190723 APPLE-SA-2019-7-22-5 tvOS 12.4 FULLDISC:20190726 APPLE-SA-2019-7-23-1 iCloud for Windows 7.13 FULLDISC:20190726 APPLE-SA-2019-7-23-2 iTunes for Windows 12.9.6 FULLDISC:20190726 APPLE-SA-2019-7-23-3 iCloud for Windows 10.6 FULLDISC:20190816 APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra FULLDISC:20190816 APPLE-SA-2019-8-13-2 Additional information for APPLE-SA-2019-7-22-1 iOS 12.4 FULLDISC:20190816 APPLE-SA-2019-8-13-3 Additional information for APPLE-SA-2019-7-22-4 watchOS 5.3 FULLDISC:20190816 APPLE-SA-2019-8-13-4 Additional information for APPLE-SA-2019-7-22-5 tvOS 12.4 MISC:bugs.chromium.org:CVE-2019-13118 MISC:gitlab.gnome.org:CVE-2019-13118 MISC:oss-fuzz.com:CVE-2019-13118 MISC:www.oracle.com:CVE-2014-3596 MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 MLIST:[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 MLIST:[debian-lts-announce] 20190722 [SECURITY] [DLA 1860-1] libxslt security update MLIST:[oss-security] 20191117 Nokogiri security update v1.10.5 OSS:2019/Q4/71 Oracle:CVE-2019-13117 Oracle:CVE-2019-13118 Oracle:CVE-2019-18197 RH:CVE-2019-13118 SMASH Issue 235950 SUSE:openSUSE-SU-2020:0731 UBUNTU:CVE-2019-13118 USN-4164-1 bnc#1140101 rh#1728541 rh#1728546 rh#1770768 |
CVE-2019-13224 | oniguruma:Released | moderate | 6.6 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H) | CONFIRM:github.com:CVE-2019-13224 CONFIRM:support.f5.com:CVE-2019-13224 CVE-2019-13224 FEDORA:FEDORA-2019-3f3d0953db FEDORA:FEDORA-2019-5409bb5e68 GLSA-201911-03 L3:64172 MLIST:[debian-lts-announce] 20190717 [SECURITY] [DLA 1854-1] libonig security update RH:CVE-2019-13224 RHSA-2020:3662 SMASH Issue 236862 UBUNTU:CVE-2019-13224 USN-4088-1 bnc#1142847 bnc#1203568 rh#1728970 rh#1768997 rh#1802061 rh#1802068 |
CVE-2019-13272 | kernel-source-rt:Already fixed | important | 7.4 (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | BUGTRAQ:20190722 [SECURITY] [DSA 4484-1] linux security update BUGTRAQ:20190722 [slackware-security] Slackware 14.2 kernel (SSA:2019-202-01) CONFIRM:security.netapp.com:CVE-2019-12984 CONFIRM:support.f5.com:CVE-2019-13272 CVE-2019-13272 DSA-4484 FEDORA:FEDORA-2019-a95015e60f MISC:cdn.kernel.org:CVE-2019-13272 MISC:git.kernel.org:CVE-2019-13272 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:CVE-2019-13272 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:packetstormsecurity.com:/files/165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html MISC:packetstormsecurity.com:CVE-2019-13272 MLIST:[debian-lts-announce] 20190723 [SECURITY] [DLA 1862-1] linux security update MLIST:[debian-lts-announce] 20190723 [SECURITY] [DLA 1863-1] linux-4.9 security update OSS:2019/09/17/1 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-13272 RHSA-2019:2405 RHSA-2019:2411 RHSA-2019:2809 SMASH Issue 236639 SMASH Issue 236640 UBUNTU:CVE-2019-13272 USN-4093-1 USN-4094-1 USN-4095-1 USN-4117-1 USN-4118-1 bnc#1140671 bnc#1156321 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 pz#1903 rh#1646768 rh#1655162 rh#1730895 rh#1743547 rh#1746732 rh#1757368 rh#1781514 |
CVE-2019-13636 | patch:Released | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N) | CVE-2019-13636 DSA-4489 MISC:git.savannah.gnu.org:CVE-2019-13636 MLIST:[debian-lts-announce] 20190719 [SECURITY] [DLA 1856-1] patch security update RH:CVE-2019-13636 RHSA-2020:1852 SMASH Issue 237588 UBUNTU:CVE-2019-13636 USN-4071-1 USN-4071-2 bdo#932401 bdo#933140 bnc#1142041 jsc#CAR-1825 rh#1732781 |
CVE-2019-13648 | kernel-source-rt:Already fixed | moderate | 6.2 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:git.kernel.org:CVE-2019-13648 CVE-2019-13648 DSA-4495 DSA-4497 MISC:patchwork.ozlabs.org:CVE-2019-13648 MLIST:[oss-security] 20190730 CVE-2019-13648: Linux kernel: powerpc: kernel crash in TM handling triggerable by any local user OSS:2019/Q3/101 Oracle:CVE-2017-5753 Oracle:CVE-2019-11477 Oracle:CVE-2019-5489 RH:CVE-2019-13648 RHSA-2019:3517 RHSA-2020:1016 RHSA-2020:3019 SMASH Issue 237721 UBUNTU:CVE-2019-13648 bnc#1142254 bnc#1142265 linux.git:commit:f16d80b75a096c52354c6e0a574993f3b0dfbdfe linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1655162 rh#1664110 rh#1667782 rh#1701224 rh#1701842 rh#1703063 rh#1707796 rh#1710405 rh#1715494 rh#1715554 rh#1716328 rh#1716992 rh#1718176 rh#1727756 rh#1729933 rh#1731000 rh#1734243 rh#1734246 rh#1735630 |
CVE-2019-14250 | binutils:Released | moderate | 5.3 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) | BID:109354 CONFIRM:security.netapp.com:CVE-2019-14250 CVE-2019-14250 D:CVE-2019-14250 GLSA-202007-39 MISC:gcc.gnu.org:CVE-2019-14250 RH:CVE-2019-14250 SMASH Issue 237923 SUSE:openSUSE-SU-2019:2364 SUSE:openSUSE-SU-2019:2365 SUSE:openSUSE-SU-2020:0716 SUSE:openSUSE-SU-2020:1790 SUSE:openSUSE-SU-2020:1804 UBUNTU:CVE-2019-14250 USN-4326-1 USN-4336-1 bnc#1142649 rh#1739490 |
CVE-2019-14283 | kernel-source-rt:Already fixed | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H) | CVE-2019-14283 D:CVE-2019-14283 DSA-4495 DSA-4497 MISC:cdn.kernel.org:CVE-2019-14283 MISC:git.kernel.org:CVE-2019-14283 MISC:github.com:CVE-2019-14283 Oracle:CVE-2017-5753 Oracle:CVE-2019-11477 Oracle:CVE-2019-5489 RH:CVE-2019-14283 RHSA-2020:1016 RHSA-2020:1070 RHSA-2020:2522 SMASH Issue 238104 UBUNTU:CVE-2019-14283 bnc#1143191 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1655162 rh#1664110 rh#1667782 rh#1701224 rh#1701842 rh#1703063 rh#1707796 rh#1710405 rh#1715494 rh#1715554 rh#1716328 rh#1716992 rh#1718176 rh#1727756 rh#1729933 rh#1731000 rh#1734243 rh#1734246 rh#1757368 |
CVE-2019-14444 | binutils:Released | low | 3.3 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:security.netapp.com:CVE-2019-14250 CVE-2019-14444 GLSA-202007-39 MISC:sourceware.org:CVE-2019-14444 RH:CVE-2019-14444 SMASH Issue 238329 SUSE:openSUSE-SU-2020:1790 SUSE:openSUSE-SU-2020:1804 UBUNTU:CVE-2019-14444 USN-4336-1 bnc#1143609 rh#1740469 |
CVE-2019-14821 | kernel-source-rt:Not affected | moderate | 6.8 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H) | BUGTRAQ:20190925 [SECURITY] [DSA 4531-1] linux security update BUGTRAQ:20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01) CONFIRM:bugzilla.redhat.com:CVE-2019-14821 CONFIRM:security.netapp.com:CVE-2019-15916 CVE-2019-14821 DSA-4531 FEDORA:FEDORA-2019-15e141c6a7 FEDORA:FEDORA-2019-a570a92d5a L3:67469 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:git.kernel.org:MLIST:[oss-security] 20190920 CVE-2019-14821 Kernel: KVM: OOB memory access via mmio ring buffer MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/TRZQQQANZWQMPILZV7OTS3RGGRLLE2Q7/ MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/YW3QNMPENPFEGVTOFPSNOBL7JEIJS25P/ MISC:packetstormsecurity.com:CVE-2019-0136 MISC:packetstormsecurity.com:CVE-2019-15098 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MISC:www.oracle.com:CVE-2019-2880 MLIST:[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update MLIST:[debian-lts-announce] 20191001 [SECURITY] [DLA 1940-1] linux-4.9 security update MLIST:[oss-security] 20190920 CVE-2019-14821 Kernel: KVM: OOB memory access via mmio ring buffer OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2019/Q3/238 Oracle:CVE-2018-12207 Oracle:CVE-2019-11477 Oracle:CVE-2019-14821 RH:CVE-2019-14821 RHSA-2019:3309 RHSA-2019:3517 RHSA-2019:3978 RHSA-2019:3979 RHSA-2019:4154 RHSA-2019:4256 RHSA-2020:0027 RHSA-2020:0204 RHSA-2020:2851 SMASH Issue 242949 SMASH Issue 242952 SUSE:openSUSE-SU-2019:2307 SUSE:openSUSE-SU-2019:2308 UBUNTU:CVE-2019-14821 USN-4157-1 USN-4157-2 USN-4162-1 USN-4162-2 USN-4163-1 USN-4163-2 bnc#1151350 linux.git:commit:404e634fdb96a3c99c7517353bfafbd88e04ab41 linux.git:commit:b60fe990c6b07ef6d4df67bc0530c7c90a62623a linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1743547 rh#1746628 rh#1746708 rh#1746732 rh#1757368 rh#1773519 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1851480 rh#1997467 |
CVE-2019-14855 | gpg2:Won't fix | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N) | CONFIRM:bugzilla.redhat.com:CVE-2019-14855 CVE-2019-14855 MISC:lists.gnupg.org:CVE-2019-14855 MISC:rwc.iacr.org:CVE-2019-14855 RH:CVE-2019-14855 SMASH Issue 247968 UBUNTU:CVE-2019-14855 USN-4516-1 bnc#1157900 jsc#CAR-1246 rh#1770900 |
CVE-2019-14895 | kernel-source-rt:Already fixed | important | 8 (CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:bugzilla.redhat.com:CVE-2019-14895 CVE-2019-14895 FEDORA:FEDORA-2019-8846a1a5a2 FEDORA:FEDORA-2019-91f6e7bb71 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/D4ISVNIC44SOGXTUBCIZFSUNQJ5LRKNZ/ MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/MN6MLCN7G7VFTSXSZYXKXEFCUMFBUAXQ/ MISC:packetstormsecurity.com:CVE-2019-14615 MISC:packetstormsecurity.com:CVE-2019-14897 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MISC:patchwork.kernel.org:OSS:2019/Q4/95 MISC:www.openwall.com:CVE-2019-14895 MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2019/Q4/95 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-14895 RHSA-2020:0328 RHSA-2020:0339 RHSA-2020:0374 RHSA-2020:0375 RHSA-2020:0543 RHSA-2020:0592 RHSA-2020:0609 RHSA-2020:0653 RHSA-2020:0661 RHSA-2020:0664 RHSA-2020:0831 RHSA-2020:1493 SMASH Issue 247598 SMASH Issue 247663 SUSE:openSUSE-SU-2019:2675 UBUNTU:CVE-2019-14895 USN-4225-1 USN-4225-2 USN-4226-1 USN-4227-1 USN-4227-2 USN-4228-1 USN-4228-2 bnc#1157158 bnc#1173660 linux.git:commit:040cda8a15210f19da7e29232c897ca6ca6cc950 linux.git:commit:3d94a4a8373bf5f45cf5f939e88b8354dbf2311b linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1773519 rh#1774870 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1795624 rh#1851480 rh#1997467 |
CVE-2019-14896 | kernel-source-rt:Already fixed | important | 8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:bugzilla.redhat.com:CVE-2019-14896 CONFIRM:security.netapp.com:CVE-2019-10207 CVE-2019-14896 FEDORA:FEDORA-2019-8846a1a5a2 FEDORA:FEDORA-2019-91f6e7bb71 MISC:bugs.launchpad.net:CONFIRM:N/A MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/D4ISVNIC44SOGXTUBCIZFSUNQJ5LRKNZ/ MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/MN6MLCN7G7VFTSXSZYXKXEFCUMFBUAXQ/ MISC:packetstormsecurity.com:CVE-2019-14615 MISC:packetstormsecurity.com:CVE-2019-14897 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MISC:patchwork.kernel.org:OSS:2019/Q4/95 MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2019/Q4/95 OSS:2020/04/06/2 OSS:2020/04/30/5 OSS:2020/06/04/4 RH:CVE-2019-14896 RHSA-2020:3548 SMASH Issue 247597 SMASH Issue 247667 SUSE:openSUSE-SU-2020:0336 UBUNTU:CVE-2019-14896 USN-4225-1 USN-4225-2 USN-4226-1 USN-4227-1 USN-4227-2 USN-4228-1 USN-4228-2 bnc#1157157 linux.git:commit:e5e884b42639c74b5b57dc277909915c0aefc8bb linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1667782 rh#1773519 rh#1774875 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1795624 rh#1831726 rh#1831849 rh#1832860 rh#1839634 rh#1842525 rh#1851480 rh#1997467 |
CVE-2019-14897 | kernel-source-rt:Already fixed | important | 8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:bugzilla.redhat.com:CVE-2019-14897 CVE-2019-14897 FEDORA:FEDORA-2019-8846a1a5a2 FEDORA:FEDORA-2019-91f6e7bb71 MISC:bugs.launchpad.net:CONFIRM:N/A MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/D4ISVNIC44SOGXTUBCIZFSUNQJ5LRKNZ/ MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/MN6MLCN7G7VFTSXSZYXKXEFCUMFBUAXQ/ MISC:packetstormsecurity.com:CVE-2019-14615 MISC:packetstormsecurity.com:CVE-2019-14897 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MISC:patchwork.kernel.org:OSS:2019/Q4/95 MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2019/Q4/95 OSS:2020/04/06/2 OSS:2020/04/30/5 OSS:2020/06/04/4 RH:CVE-2019-14897 SMASH Issue 247596 SMASH Issue 247662 SUSE:openSUSE-SU-2020:0336 UBUNTU:CVE-2019-14897 USN-4225-1 USN-4225-2 USN-4226-1 USN-4227-1 USN-4227-2 USN-4228-1 USN-4228-2 bnc#1157155 linux.git:commit:e5e884b42639c74b5b57dc277909915c0aefc8bb linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1667782 rh#1773519 rh#1774879 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1795624 rh#1831726 rh#1831849 rh#1832860 rh#1839634 rh#1842525 rh#1851480 rh#1997467 |
CVE-2019-14901 | kernel-source-rt:Already fixed | important | 8.8 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:bugzilla.redhat.com:CVE-2019-14901 CVE-2019-14901 FEDORA:FEDORA-2019-8846a1a5a2 FEDORA:FEDORA-2019-91f6e7bb71 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/D4ISVNIC44SOGXTUBCIZFSUNQJ5LRKNZ/ MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/MN6MLCN7G7VFTSXSZYXKXEFCUMFBUAXQ/ MISC:packetstormsecurity.com:CVE-2019-14615 MISC:packetstormsecurity.com:CVE-2019-14897 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2019/Q4/97 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-14901 RHSA-2020:0204 RHSA-2020:0328 RHSA-2020:0339 RHSA-2020:0374 RHSA-2020:0375 RHSA-2020:1493 SMASH Issue 247533 SMASH Issue 247882 SUSE:openSUSE-SU-2019:2675 UBUNTU:CVE-2019-14901 USN-4225-1 USN-4225-2 USN-4226-1 USN-4227-1 USN-4227-2 USN-4228-1 USN-4228-2 bnc#1157042 bnc#1173661 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1795624 rh#1851480 rh#1997467 |
CVE-2019-15030 | kernel-source-rt:Already fixed | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L) | CONFIRM:security.netapp.com:CVE-2019-15916 CVE-2019-15030 CVE-2019-15031 D:CVE-2019-15031 MISC:git.kernel.org:CVE-2019-15030 MISC:git.kernel.org:CVE-2019-15031 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MISC:patchwork.ozlabs.org:MISC:www.openwall.com:CVE-2019-15030 MISC:www.openwall.com:CVE-2019-15030 MISC:www.openwall.com:CVE-2019-15031 OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2019/Q3/209 OSS:2019/Q3/210 Oracle:CVE-2018-12207 Oracle:CVE-2019-11477 Oracle:CVE-2019-14821 RH:CVE-2019-15030 RH:CVE-2019-15031 RHSA-2020:0740 RHSA-2020:1372 RHSA-2020:1493 SMASH Issue 241870 SMASH Issue 241871 SUSE:openSUSE-SU-2019:2173 SUSE:openSUSE-SU-2019:2181 UBUNTU:CVE-2019-15030 UBUNTU:CVE-2019-15031 USN-4135-1 USN-4135-2 bnc#1149713 linux.git:commit:8205d5d98ef7f155de211f5e2eb6ca03d95a5a60 linux.git:commit:a8318c13e79badb92bc6640704a64cc022a6eb97 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1743547 rh#1746628 rh#1757368 rh#1759313 rh#1760063 rh#1773519 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1851480 rh#1997467 |
CVE-2019-15031 | kernel-source-rt:Already fixed | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L) | CONFIRM:security.netapp.com:CVE-2019-15916 CVE-2019-15030 CVE-2019-15031 D:CVE-2019-15031 MISC:git.kernel.org:CVE-2019-15030 MISC:git.kernel.org:CVE-2019-15031 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MISC:patchwork.ozlabs.org:MISC:www.openwall.com:CVE-2019-15030 MISC:www.openwall.com:CVE-2019-15030 MISC:www.openwall.com:CVE-2019-15031 OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2019/Q3/209 OSS:2019/Q3/210 Oracle:CVE-2018-12207 Oracle:CVE-2019-11477 Oracle:CVE-2019-14821 RH:CVE-2019-15030 RH:CVE-2019-15031 RHSA-2020:0740 RHSA-2020:1372 RHSA-2020:1493 SMASH Issue 241869 SMASH Issue 241871 SUSE:openSUSE-SU-2019:2173 SUSE:openSUSE-SU-2019:2181 UBUNTU:CVE-2019-15030 UBUNTU:CVE-2019-15031 USN-4135-1 USN-4135-2 bnc#1149713 linux.git:commit:8205d5d98ef7f155de211f5e2eb6ca03d95a5a60 linux.git:commit:a8318c13e79badb92bc6640704a64cc022a6eb97 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1743547 rh#1746628 rh#1757368 rh#1759313 rh#1760063 rh#1773519 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1851480 rh#1997467 |
CVE-2019-15090 | kernel-source-rt:Already fixed | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-15098 CVE-2019-15090 MISC:cdn.kernel.org:CVE-2019-15090 MISC:git.kernel.org:CVE-2019-15090 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:CVE-2019-15090 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 OSS:2019/09/17/1 Oracle:CVE-2019-11477 Oracle:CVE-2019-14821 RH:CVE-2019-15090 RHSA-2020:1016 RHSA-2020:1567 RHSA-2020:1769 SMASH Issue 240280 SUSE:openSUSE-SU-2019:2173 SUSE:openSUSE-SU-2019:2181 UBUNTU:CVE-2019-15090 USN-4115-1 USN-4118-1 USN-4147-1 bnc#1146399 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1743526 rh#1743547 rh#1746628 rh#1757368 |
CVE-2019-15098 | kernel-source-rt:Already fixed | moderate | 5.2 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H) | BUGTRAQ:20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01) CONFIRM:security.netapp.com:CVE-2019-15098 CONFIRM:support.f5.com:CVE-2019-15098 CVE-2019-15098 CVE-2019-15215 CVE-2019-15290 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:git.kernel.org:MLIST:[oss-security] 20190927 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:lore.kernel.org:CVE-2019-15098 MISC:packetstormsecurity.com:CVE-2019-15098 MISC:syzkaller.appspot.com:CVE-2019-15290 MISC:www.cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:www.openwall.com:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update MLIST:[oss-security] 20190820 Linux kernel: multiple vulnerabilities in the USB subsystem x2 MLIST:[oss-security] 20190821 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2 MLIST:[oss-security] 20190927 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2 OSS:2019/09/17/1 OSS:2019/Q3/146 OSS:2019/Q3/250 OSS:2019/Q3/252 Oracle:CVE-2018-12207 Oracle:CVE-2019-11477 Oracle:CVE-2019-14821 RH:CVE-2019-15098 RH:CVE-2019-15290 SMASH Issue 240282 SMASH Issue 240548 SUSE:openSUSE-SU-2019:2173 SUSE:openSUSE-SU-2019:2181 UBUNTU:CVE-2019-15098 UBUNTU:CVE-2019-15290 USN-4184-1 USN-4185-1 USN-4186-1 USN-4186-2 bnc#1146378 bnc#1146543 linux.git:commit:39d170b3cb62ba98567f5c4f40c27b5864b304e5 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1743547 rh#1743552 rh#1746628 rh#1746732 rh#1749977 rh#1757368 rh#1781514 |
CVE-2019-15099 | kernel-source-rt:Already fixed | moderate | 4.6 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-15098 CONFIRM:support.f5.com:/csp/article/K76295179 CVE-2019-15099 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:lore.kernel.org:CVE-2019-15099 OSS:2019/09/17/1 Oracle:CVE-2019-11477 Oracle:CVE-2019-14821 RH:CVE-2019-15099 RHSA-2020:1493 RHSA-2020:1567 RHSA-2020:1769 SMASH Issue 240283 SUSE:openSUSE-SU-2019:2181 UBUNTU:CVE-2019-15099 USN-4258-1 USN-4284-1 USN-4287-1 USN-4287-2 bnc#1146368 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1743547 rh#1743560 rh#1746628 rh#1757368 |
CVE-2019-15117 | kernel-source-rt:Already fixed | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2019-15117 D:CVE-2019-15117 MISC:git.kernel.org:CVE-2019-15117 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:lore.kernel.org:CVE-2019-15117 OSS:2019/09/17/1 Oracle:CVE-2019-11477 Oracle:CVE-2019-14821 RH:CVE-2019-15117 SMASH Issue 240325 SMASH Issue 240334 UBUNTU:CVE-2019-15117 bnc#1145920 bnc#1173934 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1731000 rh#1734243 rh#1734246 rh#1743547 rh#1746628 rh#1746769 rh#1757368 |
CVE-2019-15211 | kernel-source-rt:Already fixed | moderate | 4.6 (CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-15098 CVE-2019-15211 CVE-2019-15215 MISC:cdn.kernel.org:CVE-2019-15211 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:git.kernel.org:CVE-2019-15211 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MISC:syzkaller.appspot.com:CVE-2019-15211 MISC:www.cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115 MLIST:[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update MLIST:[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update MLIST:[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update MLIST:[oss-security] 20190820 Linux kernel: multiple vulnerabilities in the USB subsystem x2 OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2019/Q3/146 Oracle:CVE-2017-17558 Oracle:CVE-2018-12207 Oracle:CVE-2019-11477 Oracle:CVE-2019-14821 RH:CVE-2019-15211 SMASH Issue 240496 SUSE:openSUSE-SU-2019:2173 SUSE:openSUSE-SU-2019:2181 SUSE:openSUSE-SU-2019:2675 UBUNTU:CVE-2019-15211 USN-4115-1 USN-4118-1 USN-4145-1 USN-4147-1 bnc#1146519 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1743544 rh#1743547 rh#1746628 rh#1746732 rh#1757368 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1795624 rh#1851480 rh#1997467 |
CVE-2019-15212 | kernel-source-rt:Not affected | moderate | 5.7 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H) | CONFIRM:security.netapp.com:CVE-2019-15098 CVE-2019-15212 CVE-2019-15215 MISC:cdn.kernel.org:CVE-2019-15212 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:git.kernel.org:CVE-2019-15212 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:syzkaller.appspot.com:CVE-2019-15212 MISC:www.cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115 MLIST:[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update MLIST:[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update MLIST:[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update MLIST:[oss-security] 20190820 Linux kernel: multiple vulnerabilities in the USB subsystem x2 OSS:2019/09/17/1 OSS:2019/Q3/146 Oracle:CVE-2018-12207 Oracle:CVE-2019-11477 Oracle:CVE-2019-14821 RH:CVE-2019-15212 SMASH Issue 240494 SUSE:openSUSE-SU-2019:2173 SUSE:openSUSE-SU-2019:2181 UBUNTU:CVE-2019-15212 USN-4115-1 USN-4118-1 USN-4147-1 bnc#1146391 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1743547 rh#1743556 rh#1746628 rh#1746732 rh#1757368 rh#1781514 |
CVE-2019-15213 | kernel-source-rt:Not affected | moderate | 5.2 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H) | CONFIRM:security.netapp.com:CVE-2019-15098 CVE-2019-15213 MISC:cdn.kernel.org:CVE-2019-14283 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:git.kernel.org:CVE-2019-15213 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MISC:syzkaller.appspot.com:CVE-2019-15213 MISC:www.cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115 MLIST:[oss-security] 20190820 Linux kernel: multiple vulnerabilities in the USB subsystem x2 OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2019/Q3/146 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-15213 SMASH Issue 240495 SUSE:openSUSE-SU-2019:2675 UBUNTU:CVE-2019-15213 bnc#1146544 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1743580 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1795624 rh#1851480 rh#1997467 |
CVE-2019-15214 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2019-15214 MISC:cdn.kernel.org:CVE-2019-11599 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:git.kernel.org:CVE-2019-15214 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:syzkaller.appspot.com:CVE-2019-15214 MISC:www.cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115 MLIST:[oss-security] 20190820 Linux kernel: multiple vulnerabilities in the USB subsystem x2 OSS:2019/09/17/1 OSS:2019/Q3/146 Oracle:CVE-2018-12207 Oracle:CVE-2019-11477 Oracle:CVE-2019-14821 RH:CVE-2019-15214 RHSA-2019:3517 RHSA-2020:1016 SMASH Issue 240497 UBUNTU:CVE-2019-15214 bnc#1146550 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1743547 rh#1743591 rh#1746628 rh#1746732 rh#1757368 rh#1781514 |
CVE-2019-15215 | kernel-source-rt:Already fixed | moderate | 4.9 (CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H) | BUGTRAQ:20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01) CONFIRM:security.netapp.com:CVE-2019-15098 CONFIRM:support.f5.com:CVE-2019-15098 CVE-2019-15098 CVE-2019-15211 CVE-2019-15212 CVE-2019-15215 CVE-2019-15216 CVE-2019-15218 CVE-2019-15219 CVE-2019-15220 CVE-2019-15221 CVE-2019-15222 CVE-2019-15223 CVE-2019-15290 CVE-2019-15291 D:CVE-2019-15216 D:CVE-2019-15218 D:CVE-2019-15219 D:CVE-2019-15220 D:CVE-2019-15221 D:CVE-2019-15222 D:CVE-2019-15223 MISC:cdn.kernel.org:CVE-2019-13272 MISC:cdn.kernel.org:CVE-2019-15211 MISC:cdn.kernel.org:CVE-2019-15212 MISC:cdn.kernel.org:CVE-2019-15216 MISC:cdn.kernel.org:CVE-2019-15220 MISC:cdn.kernel.org:CVE-2019-15222 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:git.kernel.org:CVE-2019-15211 MISC:git.kernel.org:CVE-2019-15212 MISC:git.kernel.org:CVE-2019-15215 MISC:git.kernel.org:CVE-2019-15216 MISC:git.kernel.org:CVE-2019-15218 MISC:git.kernel.org:CVE-2019-15219 MISC:git.kernel.org:CVE-2019-15220 MISC:git.kernel.org:CVE-2019-15221 MISC:git.kernel.org:CVE-2019-15222 MISC:git.kernel.org:CVE-2019-15223 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:git.kernel.org:MLIST:[oss-security] 20190927 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:lore.kernel.org:CVE-2019-15098 MISC:packetstormsecurity.com:CVE-2019-15098 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MISC:syzkaller.appspot.com:CVE-2019-15211 MISC:syzkaller.appspot.com:CVE-2019-15212 MISC:syzkaller.appspot.com:CVE-2019-15215 MISC:syzkaller.appspot.com:CVE-2019-15216 MISC:syzkaller.appspot.com:CVE-2019-15218 MISC:syzkaller.appspot.com:CVE-2019-15219 MISC:syzkaller.appspot.com:CVE-2019-15220 MISC:syzkaller.appspot.com:CVE-2019-15221 MISC:syzkaller.appspot.com:CVE-2019-15222 MISC:syzkaller.appspot.com:CVE-2019-15223 MISC:syzkaller.appspot.com:CVE-2019-15290 MISC:syzkaller.appspot.com:CVE-2019-15291 MISC:www.cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:www.openwall.com:MLIST:[oss-security] 20190822 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2 MISC:www.openwall.com:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 MISC:www.oracle.com:CVE-2021-3450 MLIST:[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update MLIST:[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update MLIST:[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update MLIST:[oss-security] 20190820 Linux kernel: multiple vulnerabilities in the USB subsystem x2 MLIST:[oss-security] 20190821 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2 MLIST:[oss-security] 20190822 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2 MLIST:[oss-security] 20190927 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2 OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2019/Q3/146 OSS:2019/Q3/149 OSS:2019/Q3/250 OSS:2019/Q3/252 Oracle:CVE-2017-17558 Oracle:CVE-2018-12207 Oracle:CVE-2019-11477 Oracle:CVE-2019-14821 RH:CVE-2019-15098 RH:CVE-2019-15211 RH:CVE-2019-15212 RH:CVE-2019-15215 RH:CVE-2019-15216 RH:CVE-2019-15218 RH:CVE-2019-15219 RH:CVE-2019-15220 RH:CVE-2019-15221 RH:CVE-2019-15222 RH:CVE-2019-15223 RH:CVE-2019-15290 RH:CVE-2019-15291 RHSA-2020:1016 RHSA-2020:1070 RHSA-2020:1567 RHSA-2020:1769 SMASH Issue 240282 SMASH Issue 240477 SMASH Issue 240478 SMASH Issue 240479 SMASH Issue 240480 SMASH Issue 240481 SMASH Issue 240482 SMASH Issue 240484 SMASH Issue 240494 SMASH Issue 240496 SMASH Issue 240498 SMASH Issue 240549 SUSE:openSUSE-SU-2019:2173 SUSE:openSUSE-SU-2019:2181 SUSE:openSUSE-SU-2019:2675 UBUNTU:CVE-2019-15098 UBUNTU:CVE-2019-15211 UBUNTU:CVE-2019-15212 UBUNTU:CVE-2019-15215 UBUNTU:CVE-2019-15216 UBUNTU:CVE-2019-15218 UBUNTU:CVE-2019-15219 UBUNTU:CVE-2019-15220 UBUNTU:CVE-2019-15221 UBUNTU:CVE-2019-15222 UBUNTU:CVE-2019-15223 UBUNTU:CVE-2019-15290 UBUNTU:CVE-2019-15291 USN-4115-1 USN-4118-1 USN-4145-1 USN-4147-1 USN-4184-1 USN-4185-1 USN-4186-1 USN-4186-2 USN-4286-1 USN-4286-2 bnc#1146361 bnc#1146378 bnc#1146391 bnc#1146413 bnc#1146425 bnc#1146519 bnc#1146524 bnc#1146526 bnc#1146529 bnc#1146531 bnc#1146535 bnc#1146540 bnc#1146543 linux.git:commit:39d170b3cb62ba98567f5c4f40c27b5864b304e5 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1743544 rh#1743547 rh#1743552 rh#1743556 rh#1745514 rh#1745523 rh#1745530 rh#1745536 rh#1746628 rh#1746732 rh#1749973 rh#1749974 rh#1749975 rh#1749976 rh#1749977 rh#1749978 rh#1757368 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1795624 rh#1851480 rh#1997467 |
CVE-2019-15216 | kernel-source-rt:Already fixed | moderate | 4.9 (CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-15098 CVE-2019-15215 CVE-2019-15216 D:CVE-2019-15216 MISC:cdn.kernel.org:CVE-2019-15216 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:git.kernel.org:CVE-2019-15216 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:syzkaller.appspot.com:CVE-2019-15216 MISC:www.cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:www.openwall.com:MLIST:[oss-security] 20190822 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2 MLIST:[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update MLIST:[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update MLIST:[oss-security] 20190820 Linux kernel: multiple vulnerabilities in the USB subsystem x2 MLIST:[oss-security] 20190822 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2 OSS:2019/09/17/1 OSS:2019/Q3/146 OSS:2019/Q3/149 Oracle:CVE-2018-12207 Oracle:CVE-2019-11477 Oracle:CVE-2019-14821 RH:CVE-2019-15216 SMASH Issue 240484 SUSE:openSUSE-SU-2019:2173 SUSE:openSUSE-SU-2019:2181 UBUNTU:CVE-2019-15216 USN-4115-1 USN-4118-1 bnc#1146361 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1743547 rh#1745523 rh#1746628 rh#1746732 rh#1757368 rh#1781514 |
CVE-2019-15217 | kernel-source-rt:Not affected | moderate | 4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-15098 CVE-2019-15217 D:CVE-2019-15217 MISC:cdn.kernel.org:CVE-2019-14283 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:git.kernel.org:CVE-2019-15217 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:syzkaller.appspot.com:CVE-2019-15217 MISC:www.cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:www.openwall.com:MLIST:[oss-security] 20190822 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2 MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update MLIST:[oss-security] 20190820 Linux kernel: multiple vulnerabilities in the USB subsystem x2 MLIST:[oss-security] 20190822 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2 OSS:2019/09/17/1 OSS:2019/Q3/146 Oracle:CVE-2018-12207 Oracle:CVE-2019-11477 Oracle:CVE-2019-14821 RH:CVE-2019-15217 RHSA-2020:4060 RHSA-2020:4062 SMASH Issue 240483 SUSE:openSUSE-SU-2019:2173 SUSE:openSUSE-SU-2019:2181 UBUNTU:CVE-2019-15217 USN-4147-1 USN-4286-1 USN-4286-2 USN-4302-1 bnc#1146547 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1743547 rh#1745528 rh#1746628 rh#1746732 rh#1757368 rh#1781514 |
CVE-2019-15218 | kernel-source-rt:Not affected | moderate | 4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-15098 CVE-2019-15215 CVE-2019-15218 D:CVE-2019-15218 MISC:cdn.kernel.org:CVE-2019-15212 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:git.kernel.org:CVE-2019-15218 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:syzkaller.appspot.com:CVE-2019-15218 MISC:www.cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:www.openwall.com:MLIST:[oss-security] 20190822 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2 MISC:www.oracle.com:CVE-2021-3450 MLIST:[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update MLIST:[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update MLIST:[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update MLIST:[oss-security] 20190820 Linux kernel: multiple vulnerabilities in the USB subsystem x2 MLIST:[oss-security] 20190822 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2 OSS:2019/09/17/1 OSS:2019/Q3/146 Oracle:CVE-2018-12207 Oracle:CVE-2019-11477 Oracle:CVE-2019-14821 RH:CVE-2019-15218 SMASH Issue 240482 SUSE:openSUSE-SU-2019:2173 SUSE:openSUSE-SU-2019:2181 UBUNTU:CVE-2019-15218 USN-4115-1 USN-4118-1 USN-4147-1 bnc#1146413 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1743547 rh#1745530 rh#1746628 rh#1746732 rh#1757368 rh#1781514 |
CVE-2019-15219 | kernel-source-rt:Not affected | moderate | 4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-15098 CVE-2019-15215 CVE-2019-15219 D:CVE-2019-15219 MISC:cdn.kernel.org:CVE-2019-15212 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:git.kernel.org:CVE-2019-15219 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:syzkaller.appspot.com:CVE-2019-15219 MISC:www.cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:www.openwall.com:MLIST:[oss-security] 20190822 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2 MLIST:[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update MLIST:[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update MLIST:[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update MLIST:[oss-security] 20190820 Linux kernel: multiple vulnerabilities in the USB subsystem x2 MLIST:[oss-security] 20190822 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2 OSS:2019/09/17/1 OSS:2019/Q3/146 Oracle:CVE-2018-12207 Oracle:CVE-2019-11477 Oracle:CVE-2019-14821 RH:CVE-2019-15219 SMASH Issue 240481 SUSE:openSUSE-SU-2019:2173 SUSE:openSUSE-SU-2019:2181 UBUNTU:CVE-2019-15219 bnc#1146524 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1743547 rh#1745536 rh#1746628 rh#1746732 rh#1757368 rh#1781514 |
CVE-2019-15220 | kernel-source-rt:Not affected | moderate | 5.2 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-15098 CVE-2019-15215 CVE-2019-15220 D:CVE-2019-15220 MISC:cdn.kernel.org:CVE-2019-15220 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:git.kernel.org:CVE-2019-15220 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:syzkaller.appspot.com:CVE-2019-15220 MISC:www.cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115 MLIST:[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update MLIST:[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update MLIST:[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update MLIST:[oss-security] 20190820 Linux kernel: multiple vulnerabilities in the USB subsystem x2 OSS:2019/09/17/1 OSS:2019/Q3/146 Oracle:CVE-2018-12207 Oracle:CVE-2019-11477 Oracle:CVE-2019-14821 RH:CVE-2019-15220 SMASH Issue 240480 SUSE:openSUSE-SU-2019:2173 SUSE:openSUSE-SU-2019:2181 UBUNTU:CVE-2019-15220 USN-4115-1 USN-4118-1 USN-4147-1 USN-4286-1 USN-4286-2 bnc#1146526 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1743547 rh#1746628 rh#1746732 rh#1749973 rh#1757368 rh#1781514 |
CVE-2019-15221 | kernel-source-rt:Already fixed | moderate | 4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-15098 CVE-2019-15215 CVE-2019-15221 D:CVE-2019-15221 MISC:cdn.kernel.org:CVE-2019-13272 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:git.kernel.org:CVE-2019-15221 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:syzkaller.appspot.com:CVE-2019-15221 MISC:www.cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115 MLIST:[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update MLIST:[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update MLIST:[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update MLIST:[oss-security] 20190820 Linux kernel: multiple vulnerabilities in the USB subsystem x2 OSS:2019/09/17/1 OSS:2019/Q3/146 Oracle:CVE-2018-12207 Oracle:CVE-2019-11477 Oracle:CVE-2019-14821 RH:CVE-2019-15221 RHSA-2020:1016 RHSA-2020:1070 RHSA-2020:1567 RHSA-2020:1769 SMASH Issue 240479 SUSE:openSUSE-SU-2019:2173 SUSE:openSUSE-SU-2019:2181 UBUNTU:CVE-2019-15221 USN-4115-1 USN-4118-1 USN-4147-1 USN-4286-1 USN-4286-2 bnc#1146529 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1743547 rh#1746628 rh#1746732 rh#1749974 rh#1757368 rh#1781514 |
CVE-2019-15222 | kernel-source-rt:Not affected | moderate | 4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-15098 CVE-2019-15215 CVE-2019-15222 D:CVE-2019-15222 MISC:cdn.kernel.org:CVE-2019-15222 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:git.kernel.org:CVE-2019-15222 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:syzkaller.appspot.com:CVE-2019-15222 MISC:www.cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115 MLIST:[oss-security] 20190820 Linux kernel: multiple vulnerabilities in the USB subsystem x2 OSS:2019/09/17/1 OSS:2019/Q3/146 Oracle:CVE-2019-11477 Oracle:CVE-2019-14821 RH:CVE-2019-15222 SMASH Issue 240478 SUSE:openSUSE-SU-2019:2173 SUSE:openSUSE-SU-2019:2181 UBUNTU:CVE-2019-15222 bnc#1146531 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1743547 rh#1746628 rh#1749975 rh#1757368 |
CVE-2019-15223 | kernel-source-rt:Unsupported | moderate | 4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-15098 CVE-2019-15215 CVE-2019-15223 D:CVE-2019-15223 MISC:cdn.kernel.org:CVE-2019-15212 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:git.kernel.org:CVE-2019-15223 MISC:syzkaller.appspot.com:CVE-2019-15223 MISC:www.cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115 MLIST:[oss-security] 20190820 Linux kernel: multiple vulnerabilities in the USB subsystem x2 OSS:2019/Q3/146 RH:CVE-2019-15223 RHSA-2020:1567 RHSA-2020:1769 SMASH Issue 240477 UBUNTU:CVE-2019-15223 USN-4147-1 bnc#1146535 rh#1749976 |
CVE-2019-15290 | kernel-source-rt:Already fixed | moderate | 5.2 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H) | BUGTRAQ:20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01) CONFIRM:security.netapp.com:CVE-2019-15098 CONFIRM:support.f5.com:CVE-2019-15098 CVE-2019-15098 CVE-2019-15215 CVE-2019-15290 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:git.kernel.org:MLIST:[oss-security] 20190927 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:lore.kernel.org:CVE-2019-15098 MISC:packetstormsecurity.com:CVE-2019-15098 MISC:syzkaller.appspot.com:CVE-2019-15290 MISC:www.cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:www.openwall.com:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update MLIST:[oss-security] 20190820 Linux kernel: multiple vulnerabilities in the USB subsystem x2 MLIST:[oss-security] 20190821 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2 MLIST:[oss-security] 20190927 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2 OSS:2019/09/17/1 OSS:2019/Q3/146 OSS:2019/Q3/250 OSS:2019/Q3/252 Oracle:CVE-2018-12207 Oracle:CVE-2019-11477 Oracle:CVE-2019-14821 RH:CVE-2019-15098 RH:CVE-2019-15290 SMASH Issue 240282 SMASH Issue 240548 SUSE:openSUSE-SU-2019:2173 SUSE:openSUSE-SU-2019:2181 UBUNTU:CVE-2019-15098 UBUNTU:CVE-2019-15290 USN-4184-1 USN-4185-1 USN-4186-1 USN-4186-2 bnc#1146378 bnc#1146543 linux.git:commit:39d170b3cb62ba98567f5c4f40c27b5864b304e5 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1743547 rh#1743552 rh#1746628 rh#1746732 rh#1749977 rh#1757368 rh#1781514 |
CVE-2019-15291 | kernel-source-rt:Already fixed | moderate | 4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2019-15215 CVE-2019-15291 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:syzkaller.appspot.com:CVE-2019-15291 MISC:www.cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146 MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:www.openwall.com:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 MLIST:[oss-security] 20190820 Linux kernel: multiple vulnerabilities in the USB subsystem x2 MLIST:[oss-security] 20190821 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2 OSS:2019/09/17/1 OSS:2019/Q3/146 Oracle:CVE-2018-12207 Oracle:CVE-2019-11477 Oracle:CVE-2019-14821 RH:CVE-2019-15291 SMASH Issue 240549 UBUNTU:CVE-2019-15291 bnc#1146540 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1743547 rh#1746628 rh#1746732 rh#1749978 rh#1757368 rh#1781514 |
CVE-2019-15292 | kernel-source-rt:Not affected | important | 8.1 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2019-15098 CONFIRM:support.f5.com:/csp/article/K27112954 CVE-2019-15292 MISC:cdn.kernel.org:CVE-2019-15292 MISC:git.kernel.org:CVE-2019-15292 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MLIST:[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update MLIST:[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update MLIST:[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update OSS:2019/09/17/1 Oracle:CVE-2018-12207 Oracle:CVE-2019-11477 Oracle:CVE-2019-14821 RH:CVE-2019-15292 SMASH Issue 240718 SUSE:openSUSE-SU-2019:2173 SUSE:openSUSE-SU-2019:2181 UBUNTU:CVE-2019-15292 USN-4115-1 USN-4118-1 bnc#1146678 bnc#1173939 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1743547 rh#1746628 rh#1746732 rh#1757368 rh#1781514 |
CVE-2019-15504 | kernel-source-rt:Not affected | important | 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2019-15098 CONFIRM:support.f5.com:/csp/article/K33554143 CVE-2019-15504 FEDORA:FEDORA-2019-4c91a2f76e FEDORA:FEDORA-2019-97380355ae MISC:lore.kernel.org:CVE-2019-15504 RH:CVE-2019-15504 SMASH Issue 241022 UBUNTU:CVE-2019-15504 USN-4157-1 USN-4157-2 bnc#1147116 bnc#1185852 linux.git:commit:8b51dc7291473093c821195c4b6af85fadedbc2f rh#1746725 |
CVE-2019-15505 | kernel-source-rt:Not affected | moderate | 6.1 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H) | BUGTRAQ:20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01) CONFIRM:security.netapp.com:CVE-2019-15098 CONFIRM:support.f5.com:CVE-2019-15505 CVE-2019-15505 FEDORA:FEDORA-2019-4c91a2f76e FEDORA:FEDORA-2019-97380355ae MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:git.linuxtv.org:CVE-2019-15505 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:lore.kernel.org:CVE-2019-15505 MISC:packetstormsecurity.com:CVE-2019-15098 MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update OSS:2019/09/17/1 Oracle:CVE-2018-12207 Oracle:CVE-2019-11477 Oracle:CVE-2019-14821 RH:CVE-2019-15505 SMASH Issue 241023 UBUNTU:CVE-2019-15505 USN-4157-1 USN-4157-2 USN-4162-1 USN-4162-2 USN-4163-1 USN-4163-2 bnc#1147122 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1743547 rh#1746628 rh#1746732 rh#1757368 rh#1781514 |
CVE-2019-1563 | openssl-1_1:Already fixed | moderate | 5.3 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N) | BUGTRAQ:20190912 [slackware-security] openssl (SSA:2019-254-03) BUGTRAQ:20191001 [SECURITY] [DSA 4539-1] openssl security update BUGTRAQ:20191001 [SECURITY] [DSA 4540-1] openssl1.0 security update CONFIRM:git.openssl.org:CVE-2019-1563 CONFIRM:security.netapp.com:CVE-2019-1549 CONFIRM:support.f5.com:CVE-2019-1563 CONFIRM:www.openssl.org:CVE-2019-1547 CONFIRM:www.tenable.com:CVE-2019-1551 CVE-2019-1563 D:CVE-2019-1563 DSA-4539 DSA-4540 FEDORA:FEDORA-2019-d15aac6c4e FEDORA:FEDORA-2019-d51641f152 GLSA-201911-04 L3:64689 MISC:packetstormsecurity.com:CVE-2019-1547 MISC:www.oracle.com:CVE-2013-7285 MISC:www.oracle.com:CVE-2014-3596 MISC:www.oracle.com:CVE-2015-7501 MISC:www.oracle.com:CVE-2019-0217 MISC:www.oracle.com:CVE-2019-2880 MLIST:[debian-lts-announce] 20190925 [SECURITY] [DLA 1932-1] openssl security update Oracle:CVE-2019-1547 Oracle:CVE-2019-1549 Oracle:CVE-2019-1551 RH:CVE-2019-1563 RHSA-2020:1336 RHSA-2020:1337 RHSA-2020:1840 SMASH Issue 242157 SMASH Issue 252538 SUSE:openSUSE-SU-2019:2158 SUSE:openSUSE-SU-2019:2189 SUSE:openSUSE-SU-2019:2268 SUSE:openSUSE-SU-2019:2269 UBUNTU:CVE-2019-1563 USN-4376-1 USN-4376-2 USN-4504-1 bnc#1150250 rh#1752100 rh#1780995 |
CVE-2019-15666 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2019-15916 CONFIRM:support.f5.com:CVE-2019-15666 CVE-2019-15666 D:CVE-2019-15666 MISC:cdn.kernel.org:CVE-2019-15666 MISC:git.kernel.org:CVE-2019-15666 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MLIST:[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update MLIST:[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update OSS:2019/09/17/1 OSS:2020/06/04/4 Oracle:CVE-2018-12207 Oracle:CVE-2019-11477 Oracle:CVE-2019-14821 RH:CVE-2019-15666 RHSA-2019:3309 RHSA-2019:3517 RHSA-2020:1493 SMASH Issue 241290 SUSE:openSUSE-SU-2019:2173 SUSE:openSUSE-SU-2019:2181 UBUNTU:CVE-2019-15666 bnc#1148394 bnc#1172140 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1743547 rh#1746628 rh#1746732 rh#1747334 rh#1757368 rh#1781514 rh#1842525 |
CVE-2019-15794 | kernel-source-rt:Not affected | important | () | CVE-2019-15794 MISC:git.launchpad.net:CVE-2019-15794 MISC:usn.ubuntu.com:CVE-2019-15794 RH:CVE-2019-15794 SMASH Issue 248124 UBUNTU:CVE-2019-15794 bnc#1158156 rh#1831055 |
CVE-2019-15807 | kernel-source-rt:Not affected | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-15916 CONFIRM:support.f5.com:CVE-2019-15807 CVE-2019-15807 D:CVE-2019-15807 MISC:cdn.kernel.org:CVE-2019-12984 MISC:git.kernel.org:CVE-2019-15807 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MLIST:[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update MLIST:[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update MLIST:[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update OSS:2019/09/17/1 Oracle:CVE-2018-12207 Oracle:CVE-2019-11477 Oracle:CVE-2019-14821 RH:CVE-2019-15807 RHSA-2020:4060 RHSA-2020:4062 SMASH Issue 241484 SMASH Issue 241498 UBUNTU:CVE-2019-15807 bnc#1148938 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1743547 rh#1746628 rh#1746732 rh#1747216 rh#1757368 rh#1781514 |
CVE-2019-15847 | gcc:Ignore, gcc7:Ignore | moderate | 6.2 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) | CVE-2019-15847 D:CVE-2019-15847 MISC:gcc.gnu.org:CVE-2019-15847 RH:CVE-2019-15847 RHSA-2020:0924 RHSA-2020:1864 RHSA-2020:2274 SMASH Issue 241632 SUSE:openSUSE-SU-2019:2364 SUSE:openSUSE-SU-2019:2365 SUSE:openSUSE-SU-2020:0716 UBUNTU:CVE-2019-15847 bnc#1149145 jsc#CAR-2254 rh#1755523 |
CVE-2019-15916 | kernel-source-rt:Not affected | low | 3.7 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) | CONFIRM:security.netapp.com:CVE-2019-15916 CONFIRM:support.f5.com:CVE-2019-15916 CVE-2019-15916 MISC:cdn.kernel.org:CVE-2019-15916 MISC:git.kernel.org:CVE-2019-15916 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-15916 RHSA-2019:3309 RHSA-2019:3517 RHSA-2020:0740 RHSA-2020:1016 RHSA-2020:1070 RHSA-2020:2522 RHSA-2020:2851 SMASH Issue 241740 SUSE:openSUSE-SU-2019:2675 UBUNTU:CVE-2019-15916 bnc#1149448 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1750813 rh#1773519 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1851480 rh#1997467 |
CVE-2019-15918 | kernel-source-rt:Unsupported | moderate | 6.1 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-15916 CVE-2019-15918 MISC:cdn.kernel.org:CVE-2019-11599 MISC:github.com:CVE-2019-15918 RH:CVE-2019-15918 SMASH Issue 241755 UBUNTU:CVE-2019-15918 USN-4162-1 USN-4162-2 bnc#1149548 rh#1760550 |
CVE-2019-15919 | kernel-source-rt:Already fixed | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2019-15919 MISC:cdn.kernel.org:CVE-2019-11599 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:CVE-2019-15919 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 OSS:2019/09/17/1 Oracle:CVE-2019-11477 Oracle:CVE-2019-14821 RH:CVE-2019-15919 RHSA-2019:3517 SMASH Issue 241756 SMASH Issue 241777 UBUNTU:CVE-2019-15919 bnc#1149552 bnc#1172957 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1743547 rh#1746628 rh#1750410 rh#1757368 |
CVE-2019-15920 | kernel-source-rt:Already fixed | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2019-15916 CVE-2019-15920 MISC:cdn.kernel.org:CVE-2019-11599 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:CVE-2019-15920 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 OSS:2019/09/17/1 Oracle:CVE-2019-11477 Oracle:CVE-2019-14821 RH:CVE-2019-15920 RHSA-2019:3517 SMASH Issue 241757 SUSE:openSUSE-SU-2019:2173 SUSE:openSUSE-SU-2019:2181 UBUNTU:CVE-2019-15920 bnc#1149626 bnc#1156335 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1743547 rh#1746628 rh#1757368 rh#1760864 |
CVE-2019-15924 | kernel-source-rt:Not affected | low | 3.7 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) | CVE-2019-15924 D:CVE-2019-15924 MISC:cdn.kernel.org:CVE-2019-15924 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:CVE-2019-15924 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MLIST:[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update OSS:2019/09/17/1 Oracle:CVE-2018-12207 Oracle:CVE-2019-11477 Oracle:CVE-2019-14821 RH:CVE-2019-15924 RHSA-2019:3309 RHSA-2019:3517 SMASH Issue 241761 UBUNTU:CVE-2019-15924 bnc#1149612 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1743547 rh#1746628 rh#1746732 rh#1757368 rh#1763869 rh#1781514 |
CVE-2019-15925 | kernel-source-rt:Not affected | important | () | CONFIRM:security.netapp.com:CVE-2019-15916 CVE-2019-15925 D:CVE-2019-15925 MISC:cdn.kernel.org:CVE-2019-14283 MISC:git.kernel.org:CVE-2019-15925 RH:CVE-2019-15925 RHSA-2020:4431 RHSA-2020:4609 SMASH Issue 241762 UBUNTU:CVE-2019-15925 USN-4147-1 bnc#1149532 rh#1759052 |
CVE-2019-15926 | kernel-source-rt:Not affected | moderate | 4.8 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L) | CONFIRM:security.netapp.com:CVE-2019-15916 CONFIRM:support.f5.com:/csp/article/K32034450 CVE-2019-15926 D:CVE-2019-15926 MISC:cdn.kernel.org:CVE-2019-14283 MISC:git.kernel.org:CVE-2019-15926 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MLIST:[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update MLIST:[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update MLIST:[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update OSS:2019/09/17/1 Oracle:CVE-2018-12207 Oracle:CVE-2019-11477 Oracle:CVE-2019-14821 RH:CVE-2019-15926 SMASH Issue 241763 SUSE:openSUSE-SU-2019:2173 SUSE:openSUSE-SU-2019:2181 UBUNTU:CVE-2019-15926 USN-4145-1 USN-4147-1 bnc#1149527 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1743547 rh#1746628 rh#1746732 rh#1750802 rh#1757368 rh#1781514 |
CVE-2019-15927 | kernel-source-rt:Not affected | moderate | 4.9 (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L) | CONFIRM:security.netapp.com:CVE-2019-15916 CVE-2019-15927 D:CVE-2019-15927 MISC:cdn.kernel.org:CVE-2018-20784 MISC:git.kernel.org:CVE-2019-15927 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 OSS:2019/09/17/1 Oracle:CVE-2018-12207 Oracle:CVE-2019-11477 Oracle:CVE-2019-14821 RH:CVE-2019-15927 RHSA-2019:2029 RHSA-2019:3517 SMASH Issue 241764 SUSE:openSUSE-SU-2019:2173 SUSE:openSUSE-SU-2019:2181 UBUNTU:CVE-2019-15927 bnc#1149522 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1743547 rh#1746628 rh#1746732 rh#1757368 rh#1759059 rh#1781514 |
CVE-2019-16056 | python3:Released | moderate | 6.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N) | CONFIRM:security.netapp.com:CVE-2019-16056 CVE-2019-16056 D:CVE-2019-16056 FEDORA:FEDORA-2019-0d3fcae639 FEDORA:FEDORA-2019-232f092db0 FEDORA:FEDORA-2019-2b1f72899a FEDORA:FEDORA-2019-4954d8773c FEDORA:FEDORA-2019-50772cf122 FEDORA:FEDORA-2019-57462fa10d FEDORA:FEDORA-2019-5dc275c9f2 FEDORA:FEDORA-2019-74ba24605e FEDORA:FEDORA-2019-758824a3ff FEDORA:FEDORA-2019-7ec5bb5d22 FEDORA:FEDORA-2019-986622833f FEDORA:FEDORA-2019-a268ba7b23 FEDORA:FEDORA-2019-aba3cca74a FEDORA:FEDORA-2019-b06ec6159b FEDORA:FEDORA-2019-d202cda4f8 MISC:bugs.python.org:CVE-2019-16056 MISC:github.com:CVE-2019-16056 MISC:www.oracle.com:CVE-2015-7501 MISC:www.oracle.com:CVE-2019-2880 MLIST:[bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image MLIST:[debian-lts-announce] 20190916 [SECURITY] [DLA 1924-1] python3.4 security update MLIST:[debian-lts-announce] 20190916 [SECURITY] [DLA 1925-1] python2.7 security update MLIST:[debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update MLIST:[debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update Oracle:CVE-2018-20852 Oracle:CVE-2019-15903 Oracle:CVE-2019-16056 Oracle:CVE-2019-9636 RH:CVE-2019-16056 RHBA-2020:1539 RHBA-2020:1540 RHSA-2019:3725 RHSA-2019:3948 RHSA-2020:1131 RHSA-2020:1132 RHSA-2020:1605 RHSA-2020:1764 RHSA-2020:2520 SMASH Issue 241920 SUSE:openSUSE-SU-2019:2389 SUSE:openSUSE-SU-2019:2393 SUSE:openSUSE-SU-2019:2438 SUSE:openSUSE-SU-2019:2453 SUSE:openSUSE-SU-2020:0086 UBUNTU:CVE-2019-16056 USN-4151-1 USN-4151-2 bnc#1149955 rh#1749839 rh#1752592 rh#750555 |
CVE-2019-16089 | kernel-source-rt:Not affected | low | 2.9 (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) | CONFIRM:security.netapp.com:CVE-2019-15916 CONFIRM:support.f5.com:CVE-2019-16089 CVE-2019-16089 MISC:lore.kernel.org:CVE-2019-16089 RH:CVE-2019-16089 SMASH Issue 241942 UBUNTU:CVE-2019-16089 USN-4414-1 USN-4425-1 USN-4439-1 USN-4440-1 bnc#1150004 rh#1751393 |
CVE-2019-16163 | oniguruma:Released | low | 3.3 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CVE-2019-16163 FEDORA:FEDORA-2019-6a931c8eec FEDORA:FEDORA-2019-e4819c6510 L3:64172 MISC:github.com:CVE-2019-16163 MLIST:[debian-lts-announce] 20190912 [SECURITY] [DLA 1918-1] libonig security update RH:CVE-2019-16163 RHSA-2020:3662 SMASH Issue 242069 UBUNTU:CVE-2019-16163 USN-4460-1 bnc#1150130 rh#1768997 |
CVE-2019-16168 | sqlite3:Released | moderate | 6.5 (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:kc.mcafee.com:CVE-2020-15719 CONFIRM:security.netapp.com:CVE-2019-16168 CONFIRM:security.netapp.com:CVE-2020-2583 CONFIRM:www.tenable.com:CVE-2019-16168 CONFIRM:www.tenable.com:CVE-2021-23358 CVE-2019-16168 FEDORA:FEDORA-2019-b1636e0b70 GLSA-202003-16 MISC:www.mail-archive.com:CVE-2019-16168 MISC:www.oracle.com:CVE-2014-3596 MISC:www.oracle.com:CVE-2019-2880 MISC:www.sqlite.org:CVE-2019-16168 MLIST:[debian-lts-announce] 20200822 [SECURITY] [DLA 2340-1] sqlite3 security update Oracle:CVE-2019-16168 RH:CVE-2019-16168 RHSA-2020:4442 RHSA-2021:1968 SMASH Issue 242074 SUSE:openSUSE-SU-2019:2298 SUSE:openSUSE-SU-2019:2300 UBUNTU:CVE-2019-16168 USN-4205-1 bnc#1150137 rh#1768986 |
CVE-2019-16413 | kernel-source-rt:Not affected | moderate | 6.2 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-15916 CVE-2019-16413 D:CVE-2019-16413 MISC:cdn.kernel.org:CVE-2019-10124 MISC:git.kernel.org:CVE-2019-16413 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:CVE-2019-16413 OSS:2019/09/17/1 Oracle:CVE-2018-12207 Oracle:CVE-2019-11477 Oracle:CVE-2019-14821 RH:CVE-2019-16413 SMASH Issue 242945 UBUNTU:CVE-2019-16413 bnc#1151347 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1743547 rh#1746628 rh#1746732 rh#1757321 rh#1757368 rh#1781514 |
CVE-2019-16714 | kernel-source-rt:Unsupported | moderate | 5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) | CONFIRM:security.netapp.com:CVE-2019-16746 CONFIRM:support.f5.com:CVE-2019-16714 CVE-2019-16714 D:CVE-2019-16714 MISC:cdn.kernel.org:CVE-2019-16714 MISC:github.com:MLIST:[oss-security] 20190925 CVE-2019-16714: Linux kernel net/rds: info leak vulnerability in rds6_inc_info_copy MISC:nvd.nist.gov:MLIST:[oss-security] 20190925 CVE-2019-16714: Linux kernel net/rds: info leak vulnerability in rds6_inc_info_copy MLIST:[oss-security] 20190924 CVE-2019-16714: info leak in RDS rds6_inc_info_copy MLIST:[oss-security] 20190925 CVE-2019-16714: Linux kernel net/rds: info leak vulnerability in rds6_inc_info_copy OSS:2019/Q3/246 OSS:2019/Q3/247 RH:CVE-2019-16714 SMASH Issue 243158 SMASH Issue 243194 UBUNTU:CVE-2019-16714 USN-4157-1 USN-4157-2 bnc#1151791 rh#1755544 |
CVE-2019-16746 | kernel-source-rt:Not affected | important | 7.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) | BUGTRAQ:20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01) CONFIRM:security.netapp.com:CVE-2019-16746 CVE-2019-16746 D:CVE-2019-16746 FEDORA:FEDORA-2019-057d691fd4 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:marc.info:CVE-2019-16746 MISC:packetstormsecurity.com:CVE-2019-15098 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MISC:www.oracle.com:CVE-2021-3450 MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2020/04/30/5 OSS:2020/06/04/4 OSS:2020/06/18/1 OSS:2020/07/28/2 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-16746 RHSA-2020:1016 RHSA-2020:1070 RHSA-2020:1769 SMASH Issue 243204 SMASH Issue 243355 SUSE:openSUSE-SU-2020:0336 SUSE:openSUSE-SU-2020:1153 UBUNTU:CVE-2019-16746 USN-4183-1 USN-4186-1 USN-4209-1 USN-4210-1 bnc#1152107 bnc#1173659 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1708775 rh#1760306 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1795624 rh#1831726 rh#1831849 rh#1832397 rh#1832860 rh#1839634 rh#1842525 rh#1847832 rh#1849926 rh#1851480 rh#1865751 rh#1997467 |
CVE-2019-16994 | kernel-source-rt:Not affected | moderate | 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | CONFIRM:security.netapp.com:CVE-2019-16746 CVE-2019-16994 MISC:bugs.launchpad.net:CONFIRM:N/A MISC:git.kernel.org:CVE-2019-16994 MISC:github.com:CVE-2019-16994 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2020/04/06/2 OSS:2020/04/30/5 OSS:2020/06/04/4 RH:CVE-2019-16994 RHSA-2019:3309 RHSA-2019:3517 RHSA-2020:4060 RHSA-2020:4062 SMASH Issue 243538 SUSE:openSUSE-SU-2020:0336 UBUNTU:CVE-2019-16994 bnc#1161523 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1759681 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1795624 rh#1831726 rh#1831849 rh#1832860 rh#1839634 rh#1842525 rh#1851480 rh#1997467 |
CVE-2019-16995 | kernel-source-rt:Not affected | moderate | 6.2 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-16746 CVE-2019-16995 MISC:cdn.kernel.org:CVE-2019-16995 MISC:git.kernel.org:CVE-2019-16995 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:CVE-2019-16995 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-16995 SMASH Issue 243539 SMASH Issue 243901 SUSE:openSUSE-SU-2019:2444 SUSE:openSUSE-SU-2019:2503 UBUNTU:CVE-2019-16995 bnc#1152685 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1743547 rh#1746732 rh#1757368 rh#1759684 rh#1773519 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1851480 rh#1997467 |
CVE-2019-17006 | mozilla-nss:Released | moderate | 6.8 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N) | CONFIRM:cert-portal.siemens.com:CVE-2018-12404 CONFIRM:security.netapp.com:CVE-2019-17006 CVE-2019-17006 MISC:bugzilla.mozilla.org:CVE-2019-17006 MISC:developer.mozilla.org:CVE-2019-17006 MISC:us-cert.cisa.gov:CVE-2019-17006 RH:CVE-2019-17006 RHSA-2020:3280 RHSA-2020:4076 RHSA-2021:0758 RHSA-2021:0876 RHSA-2021:1026 SMASH Issue 249778 UBUNTU:CVE-2019-17006 bnc#1159819 rh#1775916 rh#1826177 |
CVE-2019-17007 | mozilla-nss:Already fixed | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:cert-portal.siemens.com:CVE-2018-12404 CVE-2019-17007 DSA-4579 L3:64517 MISC:bugzilla.mozilla.org:CVE-2019-17007 MISC:developer.mozilla.org:CVE-2019-17007 MISC:us-cert.cisa.gov:CVE-2019-17006 RH:CVE-2019-17007 RHEA-2019:3280 RHSA-2019:1951 RHSA-2019:2237 RHSA-2021:0876 SMASH Issue 248091 UBUNTU:CVE-2019-17007 bnc#1132479 bnc#1184805 pz#1798 rh#1703979 |
CVE-2019-17053 | kernel-source-rt:Ignore | low | 4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L) | CVE-2019-17053 MISC:git.kernel.org:CVE-2019-17052 MISC:git.kernel.org:CVE-2019-17053 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 OSS:2019/09/17/1 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-17053 RHSA-2020:1567 RHSA-2020:1769 RHSA-2020:4060 RHSA-2020:4062 SMASH Issue 243912 UBUNTU:CVE-2019-17053 bnc#1152789 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1743547 rh#1746628 rh#1746732 rh#1757368 rh#1758242 rh#1781514 |
CVE-2019-17133 | kernel-source-rt:Already fixed | important | 8.8 (CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | BUGTRAQ:20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01) CONFIRM:security.netapp.com:CVE-2019-16746 CVE-2019-17133 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:marc.info:CVE-2019-17133 MISC:packetstormsecurity.com:CVE-2019-15098 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MISC:www.oracle.com:CVE-2021-3450 MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 Oracle:CVE-2018-12207 Oracle:CVE-2018-5390 Oracle:CVE-2019-11477 Oracle:CVE-2019-14821 RH:CVE-2019-17133 RHSA-2020:0174 RHSA-2020:0374 RHSA-2020:0375 RHSA-2020:0543 RHSA-2020:0592 RHSA-2020:0609 RHSA-2020:0653 RHSA-2020:0661 RHSA-2020:0664 RHSA-2020:0790 SMASH Issue 244203 SMASH Issue 244249 SUSE:openSUSE-SU-2019:2392 SUSE:openSUSE-SU-2019:2444 UBUNTU:CVE-2019-17133 USN-4208-1 USN-4210-1 USN-4211-1 USN-4211-2 USN-4226-1 bnc#1153158 bnc#1153161 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1601704 rh#1646768 rh#1703063 rh#1743547 rh#1746628 rh#1746732 rh#1757368 rh#1771909 rh#1773519 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1851480 rh#1997467 |
CVE-2019-17450 | binutils:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:security.netapp.com:CVE-2019-17450 CVE-2019-17450 GLSA-202007-39 MISC:sourceware.org:CVE-2019-17450 RH:CVE-2019-17450 RHSA-2020:4465 SMASH Issue 244717 SUSE:openSUSE-SU-2020:1790 SUSE:openSUSE-SU-2020:1804 UBUNTU:CVE-2019-17450 USN-4336-1 bnc#1153770 rh#1771677 |
CVE-2019-17451 | binutils:Released | low | 4 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | CONFIRM:security.netapp.com:CVE-2019-17450 CVE-2019-17451 GLSA-202007-39 MISC:sourceware.org:CVE-2019-17451 RH:CVE-2019-17451 RHSA-2020:1797 SMASH Issue 244718 SUSE:openSUSE-SU-2020:1790 SUSE:openSUSE-SU-2020:1804 UBUNTU:CVE-2019-17451 USN-4336-1 bnc#1153768 rh#1771668 |
CVE-2019-17666 | kernel-source-rt:Already fixed | moderate | 5.4 (CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L) | CONFIRM:security.netapp.com:CVE-2019-16746 CVE-2019-17666 FEDORA:FEDORA-2019-6a67ff8793 MISC:arstechnica.com:CVE-2019-17666 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:lkml.org:CVE-2019-17666 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MISC:twitter.com:CVE-2019-17666 MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-17666 RHBA-2020:0930 RHSA-2020:0328 RHSA-2020:0339 RHSA-2020:0543 RHSA-2020:0661 RHSA-2020:0740 RHSA-2020:0831 RHSA-2020:0834 RHSA-2020:0839 RHSA-2020:1347 RHSA-2020:1353 RHSA-2020:1465 RHSA-2020:1473 RHSA-2020:1524 SMASH Issue 245234 SUSE:openSUSE-SU-2019:2392 SUSE:openSUSE-SU-2019:2444 UBUNTU:CVE-2019-17666 USN-4183-1 USN-4184-1 USN-4185-1 USN-4186-1 USN-4186-2 bnc#1154372 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1743547 rh#1746732 rh#1757368 rh#1763690 rh#1773519 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1851480 rh#1997467 |
CVE-2019-18197 | libxslt:Released | important | 7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2019-18197 CONFIRM:security.netapp.com:CVE-2020-2754 CVE-2019-18197 MISC:bugs.chromium.org:CVE-2019-18197 MISC:gitlab.gnome.org:CVE-2019-18197 MISC:www.oracle.com:CVE-2019-2880 MLIST:[debian-lts-announce] 20191027 [SECURITY] [DLA 1973-1] libxslt security update MLIST:[oss-security] 20191117 Nokogiri security update v1.10.5 OSS:2019/Q4/71 Oracle:CVE-2019-13117 Oracle:CVE-2019-13118 Oracle:CVE-2019-18197 RH:CVE-2019-18197 RHSA-2020:0514 RHSA-2020:4005 RHSA-2020:4464 SMASH Issue 245445 SUSE:openSUSE-SU-2020:0189 SUSE:openSUSE-SU-2020:0210 SUSE:openSUSE-SU-2020:0233 SUSE:openSUSE-SU-2020:0731 UBUNTU:CVE-2019-18197 USN-4164-1 bnc#1154609 rh#1728541 rh#1728546 rh#1770768 |
CVE-2019-18198 | kernel-source-rt:Unsupported | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2019-16746 CVE-2019-18198 MISC:cdn.kernel.org:CVE-2019-18198 MISC:git.kernel.org:CVE-2019-18198 MISC:github.com:CVE-2019-18198 MISC:launchpad.net:CVE-2019-18198 RH:CVE-2019-18198 SMASH Issue 245442 UBUNTU:CVE-2019-18198 USN-4161-1 bnc#1154617 rh#1771486 |
CVE-2019-18218 | file:Released | critical | 9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2019-18218 CVE-2019-18218 DSA-4550 FEDORA:FEDORA-2019-18036b898e FEDORA:FEDORA-2019-554c3c691f FEDORA:FEDORA-2019-97dcb2762a GLSA-202003-24 MISC:bugs.chromium.org:CVE-2019-18218 MISC:github.com:CVE-2019-18218 MLIST:[debian-lts-announce] 20191023 [SECURITY] [DLA 1969-1] file security update MLIST:[debian-lts-announce] 20210715 [SECURITY] [DLA 2708-1] php7.0 security update RH:CVE-2019-18218 RHSA-2021:4374 SMASH Issue 245465 SMASH Issue 245468 SUSE:openSUSE-SU-2020:0677 UBUNTU:CVE-2019-18218 USN-4172-1 USN-4172-2 bnc#1154661 rh#1765272 |
CVE-2019-18282 | kernel-source-rt:Already fixed | moderate | 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) | CONFIRM:git.kernel.org:CVE-2019-18282 CONFIRM:security.netapp.com:CVE-2019-19966 CVE-2019-18282 MISC:cdn.kernel.org:CVE-2019-19049 MISC:www.computer.org:CVE-2019-18282 MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update RH:CVE-2019-18282 RHSA-2020:1567 RHSA-2020:1769 RHSA-2020:5437 RHSA-2020:5441 SMASH Issue 251268 UBUNTU:CVE-2019-18282 bnc#1161121 rh#1796360 |
CVE-2019-18348 | python3:Released | moderate | 6.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) | CONFIRM:security.netapp.com:CVE-2019-18348 CVE-2019-18348 FEDORA:FEDORA-2019-57462fa10d FEDORA:FEDORA-2019-b06ec6159b FEDORA:FEDORA-2019-d202cda4f8 FEDORA:FEDORA-2020-8bdd3fd7a4 FEDORA:FEDORA-2020-ea5bdbcc90 MISC:bugs.python.org:CVE-2019-18348 MISC:www.oracle.com:CVE-2013-7285 MLIST:[debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update RH:CVE-2019-18348 RHSA-2020:4273 RHSA-2020:4285 SMASH Issue 245655 SUSE:openSUSE-SU-2020:0696 UBUNTU:CVE-2019-18348 USN-4333-1 USN-4333-2 bnc#1155094 rh#1727276 rh#1800749 |
CVE-2019-18786 | kernel-source-rt:Unsupported | low | 3.3 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) | CVE-2019-18786 RH:CVE-2019-18786 SMASH Issue 246556 UBUNTU:CVE-2019-18786 USN-4284-1 USN-4285-1 USN-4287-1 USN-4287-2 bnc#1156043 rh#1772538 upstream patch |
CVE-2019-18805 | kernel-source-rt:Not affected | low | 2.3 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L) | CONFIRM:security.netapp.com:CVE-2019-18680 CVE-2019-18805 MISC:cdn.kernel.org:CVE-2019-15924 MISC:git.kernel.org:CVE-2019-18805 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-18805 RHSA-2020:0740 RHSA-2020:1567 RHSA-2020:1769 SMASH Issue 246686 SUSE:openSUSE-SU-2019:2503 SUSE:openSUSE-SU-2019:2507 UBUNTU:CVE-2019-18805 bnc#1156187 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1743547 rh#1746732 rh#1771496 rh#1773519 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1851480 rh#1997467 |
CVE-2019-18808 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-18680 CVE-2019-18808 CVE-2021-3744 DSA-5096 FEDORA:FEDORA-2019-124a241044 FEDORA:FEDORA-2019-b86a7bdba0 FEDORA:FEDORA-2021-79cbbefebe FEDORA:FEDORA-2021-9dd76a1ed0 FEDORA:FEDORA-2021-ffda3d6fa1 MISC:access.redhat.com:/errata/RHSA-2022:1975 MISC:access.redhat.com:/errata/RHSA-2022:1988 MISC:access.redhat.com:/security/cve/CVE-2021-3744 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:CVE-2019-18808 MISC:github.com:CVE-2021-3744 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:kernel.googlesource.com:CVE-2021-3744 MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/7BLLVKYAIETEORUPTFO3TR3C33ZPFXQM/ MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/LAT3RERO6QBKSPJBNNRWY3D4NCGTFOS7/ MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/SYKURLXBB2555ASWMPDNMBUPD6AG2JKQ/ MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MISC:seclists.org:CVE-2021-3744 MISC:www.oracle.com:CVE-2022-21586 MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2021/07/22/1 OSS:2021/09/14/1 OSS:2021/Q3/164 OSS:2022/01/25/12 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-18808 RHSA-2020:2854 RHSA-2020:4060 RHSA-2020:4062 RHSA-2020:4431 RHSA-2020:4609 RHSA-2022:1975 RHSA-2022:1988 SMASH Issue 246712 SMASH Issue 308494 SUSE:openSUSE-SU-2020:0336 UBUNTU:CVE-2019-18808 USN-4525-1 USN-4526-1 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1156259 bnc#1189884 jsc#CAR-938 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1777418 rh#1781514 rh#1783498 rh#1783515 rh#1795624 rh#1851480 rh#1980646 rh#1997467 rh#2000627 rh#2044561 rh#2053632 rh#2055502 rh#2059923 |
CVE-2019-18809 | kernel-source-rt:Already fixed | moderate | 4.3 (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-18680 CVE-2019-18809 FEDORA:FEDORA-2019-124a241044 FEDORA:FEDORA-2019-b86a7bdba0 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:CVE-2019-18809 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-18809 RHSA-2020:4431 RHSA-2020:4609 SMASH Issue 246713 SUSE:openSUSE-SU-2019:2675 UBUNTU:CVE-2019-18809 USN-4285-1 USN-4287-1 USN-4287-2 USN-4300-1 bnc#1156258 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1777449 rh#1781514 rh#1783498 rh#1783515 rh#1795624 rh#1851480 rh#1997467 |
CVE-2019-18814 | kernel-source-rt:Released | moderate | 5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) | CONFIRM:security.netapp.com:CVE-2019-18680 CONFIRM:support.f5.com:CVE-2019-18814 CVE-2019-18814 MISC:lore.kernel.org:CVE-2019-18814 MLIST:[debian-lts-announce] 20200812 [SECURITY] [DLA 2323-1] linux-4.19 new package RH:CVE-2019-18814 SMASH Issue 246718 SMASH Issue 246739 UBUNTU:CVE-2019-18814 bnc#1156256 rh#1772518 |
CVE-2019-19039 | kernel-source-rt:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N) | CVE-2019-19039 MISC:github.com:CVE-2019-19039 MLIST:[debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update RH:CVE-2019-19039 SMASH Issue 247696 UBUNTU:CVE-2019-19039 USN-4414-1 bnc#1157719 rh#1775803 |
CVE-2019-19043 | kernel-source-rt:Unsupported | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-18680 CVE-2019-19043 FEDORA:FEDORA-2019-021c968423 FEDORA:FEDORA-2019-34a75d7e61 MISC:github.com:CVE-2019-19043 RH:CVE-2019-19043 SMASH Issue 247481 UBUNTU:CVE-2019-19043 USN-4300-1 bnc#1159375 rh#1774972 |
CVE-2019-19044 | kernel-source-rt:Unsupported | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-18680 CVE-2019-19044 MISC:cdn.kernel.org:CVE-2019-19044 MISC:github.com:CVE-2019-19044 RH:CVE-2019-19044 SMASH Issue 247482 UBUNTU:CVE-2019-19044 USN-4225-1 bnc#1159370 rh#1774977 |
CVE-2019-19045 | kernel-source-rt:Already fixed | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-18680 CVE-2019-19045 MISC:bugs.launchpad.net:CONFIRM:N/A MISC:cdn.kernel.org:CVE-2019-19044 MISC:github.com:CVE-2019-19045 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2020/04/06/2 OSS:2020/04/30/5 OSS:2020/06/04/4 RH:CVE-2019-19045 RHSA-2020:1567 RHSA-2020:1769 SMASH Issue 247483 SUSE:openSUSE-SU-2020:0336 UBUNTU:CVE-2019-19045 USN-4225-1 USN-4225-2 USN-4226-1 USN-4227-1 USN-4227-2 bnc#1161522 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1795624 rh#1831726 rh#1831849 rh#1832860 rh#1839634 rh#1842525 rh#1851480 rh#1997467 |
CVE-2019-19047 | kernel-source-rt:Already fixed | low | 1.9 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L) | CONFIRM:security.netapp.com:CVE-2019-18680 CVE-2019-19047 MISC:cdn.kernel.org:CVE-2019-19044 MISC:github.com:CVE-2019-19047 RH:CVE-2019-19047 RHSA-2020:1567 RHSA-2020:1769 SMASH Issue 247485 UBUNTU:CVE-2019-19047 USN-4225-1 bnc#1157715 rh#1774991 |
CVE-2019-19048 | kernel-source-rt:Not affected | important | () | CONFIRM:security.netapp.com:CVE-2019-18680 CVE-2019-19048 MISC:cdn.kernel.org:CVE-2019-19048 MISC:github.com:CVE-2019-19048 RH:CVE-2019-19048 SMASH Issue 247486 UBUNTU:CVE-2019-19048 USN-4208-1 USN-4226-1 bnc#1157720 rh#1774994 |
CVE-2019-19049 | kernel-source-rt:Already fixed | moderate | 1.6 (CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L) | CVE-2019-19049 MISC:cdn.kernel.org:CVE-2019-19049 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:CVE-2019-19049 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-19049 SMASH Issue 247487 SUSE:openSUSE-SU-2019:2675 UBUNTU:CVE-2019-19049 bnc#1157173 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1795624 rh#1851480 rh#1997467 |
CVE-2019-19050 | kernel-source-rt:Unsupported | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-18680 CVE-2019-19050 FEDORA:FEDORA-2019-021c968423 FEDORA:FEDORA-2019-34a75d7e61 MISC:github.com:CVE-2019-19050 MISC:packetstormsecurity.com:CVE-2019-14615 RH:CVE-2019-19050 SMASH Issue 247488 UBUNTU:CVE-2019-19050 USN-4258-1 USN-4284-1 bnc#1157336 rh#1774998 |
CVE-2019-19051 | kernel-source-rt:Already fixed | moderate | 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | CONFIRM:security.netapp.com:CVE-2019-18680 CVE-2019-19051 MISC:cdn.kernel.org:CVE-2019-19044 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:CVE-2019-19051 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-19051 SMASH Issue 247489 SUSE:openSUSE-SU-2020:0336 UBUNTU:CVE-2019-19051 USN-4225-1 USN-4225-2 USN-4286-1 USN-4286-2 USN-4302-1 USN-4344-1 bnc#1159024 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1795624 rh#1851480 rh#1997467 |
CVE-2019-19054 | kernel-source-rt:Already fixed | moderate | 2.9 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) | CONFIRM:security.netapp.com:CVE-2019-18680 CVE-2019-19054 FEDORA:FEDORA-2019-021c968423 FEDORA:FEDORA-2019-34a75d7e61 MISC:bugs.launchpad.net:CONFIRM:N/A MISC:github.com:CVE-2019-19054 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2020/04/06/2 OSS:2020/04/30/5 OSS:2020/06/04/4 RH:CVE-2019-19054 SMASH Issue 247492 SUSE:openSUSE-SU-2020:0336 UBUNTU:CVE-2019-19054 USN-4525-1 USN-4526-1 USN-4527-1 bnc#1161518 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1775063 rh#1781514 rh#1783498 rh#1783515 rh#1795624 rh#1831726 rh#1831849 rh#1832860 rh#1839634 rh#1842525 rh#1851480 rh#1997467 |
CVE-2019-19056 | kernel-source-rt:Already fixed | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-18680 CVE-2019-19056 FEDORA:FEDORA-2019-021c968423 FEDORA:FEDORA-2019-34a75d7e61 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:CVE-2019-19056 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-19056 RHSA-2020:4431 RHSA-2020:4609 SMASH Issue 247494 SUSE:openSUSE-SU-2019:2675 UBUNTU:CVE-2019-19056 USN-4286-1 USN-4286-2 USN-4300-1 USN-4301-1 USN-4302-1 bnc#1157197 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1775097 rh#1781514 rh#1783498 rh#1783515 rh#1795624 rh#1851480 rh#1997467 |
CVE-2019-19059 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-18680 CVE-2019-19059 FEDORA:FEDORA-2019-021c968423 FEDORA:FEDORA-2019-34a75d7e61 MISC:github.com:CVE-2019-19059 RH:CVE-2019-19059 RHSA-2020:1567 RHSA-2020:1769 RHSA-2020:4060 RHSA-2020:4062 SMASH Issue 247497 UBUNTU:CVE-2019-19059 USN-4300-1 USN-4301-1 bnc#1157296 rh#1775042 |
CVE-2019-19060 | kernel-source-rt:Already fixed | moderate | 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | CONFIRM:security.netapp.com:CVE-2019-18680 CVE-2019-19060 MISC:cdn.kernel.org:CVE-2019-19048 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:CVE-2019-19060 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-19060 SMASH Issue 247498 SUSE:openSUSE-SU-2019:2675 UBUNTU:CVE-2019-19060 USN-4208-1 USN-4210-1 USN-4226-1 USN-4364-1 bnc#1157178 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1775035 rh#1781514 rh#1783498 rh#1783515 rh#1795624 rh#1851480 rh#1997467 |
CVE-2019-19061 | kernel-source-rt:Unsupported | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-18680 CVE-2019-19061 MISC:cdn.kernel.org:CVE-2019-19048 MISC:github.com:CVE-2019-19061 RH:CVE-2019-19061 SMASH Issue 247499 UBUNTU:CVE-2019-19061 USN-4208-1 USN-4526-1 bnc#1157192 rh#1775029 |
CVE-2019-19063 | kernel-source-rt:Not affected | moderate | 4.6 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | BUGTRAQ:20200109 [slackware-security] Slackware 14.2 kernel (SSA:2020-008-01) CONFIRM:security.netapp.com:CVE-2019-18680 CVE-2019-19063 FEDORA:FEDORA-2019-021c968423 FEDORA:FEDORA-2019-34a75d7e61 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:CVE-2019-19063 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:packetstormsecurity.com:CVE-2019-19332 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MISC:www.oracle.com:CVE-2021-3450 OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-19063 RHSA-2020:4060 RHSA-2020:4062 RHSA-2020:4431 RHSA-2020:4609 SMASH Issue 247501 SUSE:openSUSE-SU-2019:2675 UBUNTU:CVE-2019-19063 USN-4254-1 USN-4254-2 USN-4284-1 USN-4285-1 USN-4287-1 USN-4287-2 bnc#1157298 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1775015 rh#1781514 rh#1783498 rh#1783515 rh#1795624 rh#1851480 rh#1997467 |
CVE-2019-19064 | kernel-source-rt:Unsupported | moderate | 1.6 (CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L) | CVE-2019-19064 FEDORA:FEDORA-2019-021c968423 FEDORA:FEDORA-2019-34a75d7e61 MISC:github.com:CVE-2019-19064 RH:CVE-2019-19064 SMASH Issue 247502 UBUNTU:CVE-2019-19064 USN-4300-1 bnc#1157300 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/ rh#1775010 |
CVE-2019-19066 | kernel-source-rt:Already fixed | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-18680 CVE-2019-19066 FEDORA:FEDORA-2019-021c968423 FEDORA:FEDORA-2019-34a75d7e61 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:CVE-2019-19066 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MISC:www.oracle.com:CVE-2021-3450 MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-19066 SMASH Issue 247504 SUSE:openSUSE-SU-2020:0336 UBUNTU:CVE-2019-19066 USN-4286-1 USN-4286-2 USN-4300-1 USN-4301-1 USN-4302-1 bnc#1157303 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1667782 rh#1773519 rh#1774976 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1795624 rh#1851480 rh#1997467 |
CVE-2019-19068 | kernel-source-rt:Already fixed | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-18680 CVE-2019-19068 FEDORA:FEDORA-2019-021c968423 FEDORA:FEDORA-2019-34a75d7e61 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:CVE-2019-19068 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-19068 RHSA-2020:4431 RHSA-2020:4609 SMASH Issue 247506 SUSE:openSUSE-SU-2019:2675 UBUNTU:CVE-2019-19068 USN-4286-1 USN-4286-2 USN-4300-1 USN-4301-1 USN-4302-1 bnc#1157307 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1773519 rh#1774963 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1795624 rh#1851480 rh#1997467 |
CVE-2019-19069 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-18680 CVE-2019-19069 MISC:cdn.kernel.org:CVE-2019-19048 MISC:github.com:CVE-2019-19069 RH:CVE-2019-19069 SMASH Issue 247507 UBUNTU:CVE-2019-19069 USN-4208-1 bnc#1157064 rh#1774960 |
CVE-2019-19070 | kernel-source-rt:Not affected | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2019-19070 FEDORA:FEDORA-2019-021c968423 FEDORA:FEDORA-2019-34a75d7e61 MISC:github.com:CVE-2019-19070 RH:CVE-2019-19070 SMASH Issue 247508 UBUNTU:CVE-2019-19070 bnc#1157294 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/ rh#1774957 |
CVE-2019-19071 | kernel-source-rt:Not affected | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-18680 CVE-2019-19071 FEDORA:FEDORA-2019-021c968423 FEDORA:FEDORA-2019-34a75d7e61 MISC:github.com:CVE-2019-19071 RH:CVE-2019-19071 SMASH Issue 247509 UBUNTU:CVE-2019-19071 USN-4258-1 USN-4284-1 USN-4287-1 USN-4287-2 bnc#1157067 rh#1774949 |
CVE-2019-19072 | kernel-source-rt:Already fixed | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-18680 CVE-2019-19072 FEDORA:FEDORA-2019-021c968423 FEDORA:FEDORA-2019-34a75d7e61 MISC:github.com:CVE-2019-19072 RH:CVE-2019-19072 RHSA-2020:4431 RHSA-2020:4609 SMASH Issue 247510 UBUNTU:CVE-2019-19072 USN-4225-1 USN-4225-2 USN-4226-1 bnc#1157069 rh#1774946 |
CVE-2019-19073 | kernel-source-rt:Already fixed | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-18680 CVE-2019-19073 FEDORA:FEDORA-2019-021c968423 FEDORA:FEDORA-2019-34a75d7e61 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:CVE-2019-19073 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MISC:www.oracle.com:CVE-2021-3450 MLIST:[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update MLIST:[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-19073 RHSA-2020:1567 RHSA-2020:1769 SMASH Issue 247511 SUSE:openSUSE-SU-2019:2675 UBUNTU:CVE-2019-19073 USN-4526-1 USN-4527-1 bnc#1157070 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1773519 rh#1774937 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1795624 rh#1851480 rh#1997467 |
CVE-2019-19074 | kernel-source-rt:Already fixed | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-18680 CVE-2019-19074 FEDORA:FEDORA-2019-021c968423 FEDORA:FEDORA-2019-34a75d7e61 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:CVE-2019-19074 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MISC:www.oracle.com:CVE-2021-3450 MLIST:[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update MLIST:[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-19074 RHSA-2020:1567 RHSA-2020:1769 SMASH Issue 247512 SUSE:openSUSE-SU-2019:2675 UBUNTU:CVE-2019-19074 USN-4526-1 USN-4527-1 bnc#1157143 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1773519 rh#1774933 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1795624 rh#1851480 rh#1997467 |
CVE-2019-19075 | kernel-source-rt:Already fixed | low | 3.7 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) | CONFIRM:security.netapp.com:CVE-2019-18680 CVE-2019-19075 MISC:cdn.kernel.org:CVE-2019-18810 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:CVE-2019-19075 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-19075 SMASH Issue 247513 SUSE:openSUSE-SU-2019:2675 UBUNTU:CVE-2019-19075 USN-4208-1 USN-4210-1 USN-4226-1 bnc#1157162 bnc#1173958 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1776842 rh#1781514 rh#1783498 rh#1783515 rh#1795624 rh#1851480 rh#1997467 |
CVE-2019-19076 | kernel-source-rt:Not affected | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-18680 CVE-2019-19076 MISC:cdn.kernel.org:CVE-2019-19076 MISC:git.kernel.org:CVE-2019-19076 MISC:github.com:CVE-2019-19076 MISC:lore.kernel.org:CVE-2019-19076 RH:CVE-2019-19076 SMASH Issue 247514 UBUNTU:CVE-2019-19076 USN-4209-1 bnc#1157164 https://lore.kernel.org/lkml/20191204103955.63c4d9af%40cakuba.netronome.com/ linux.git:commit:1d1997db870f4058676439ef7014390ba9e24eb2 rh#1776852 |
CVE-2019-19077 | kernel-source-rt:Already fixed | moderate | 5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-18680 CVE-2019-19077 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:CVE-2019-19077 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-19077 RHSA-2020:1567 RHSA-2020:1769 SMASH Issue 247515 SUSE:openSUSE-SU-2019:2675 UBUNTU:CVE-2019-19077 USN-4258-1 USN-4284-1 bnc#1157171 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1775724 rh#1781514 rh#1783498 rh#1783515 rh#1795624 rh#1851480 rh#1997467 |
CVE-2019-19078 | kernel-source-rt:Already fixed | moderate | 4.6 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-18680 CVE-2019-19078 FEDORA:FEDORA-2019-8846a1a5a2 FEDORA:FEDORA-2019-91f6e7bb71 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:CVE-2019-19078 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MISC:www.oracle.com:CVE-2021-3450 OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-19078 SMASH Issue 247516 SUSE:openSUSE-SU-2019:2675 UBUNTU:CVE-2019-19078 USN-4258-1 USN-4284-1 USN-4287-1 USN-4287-2 bnc#1157032 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1776353 rh#1781514 rh#1783498 rh#1783515 rh#1795624 rh#1851480 rh#1997467 |
CVE-2019-19080 | kernel-source-rt:Already fixed | moderate | 5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-18680 CVE-2019-19080 MISC:cdn.kernel.org:CVE-2019-18198 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:CVE-2019-19080 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-19080 SMASH Issue 247518 SUSE:openSUSE-SU-2019:2675 UBUNTU:CVE-2019-19080 bnc#1157044 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1776372 rh#1781514 rh#1783498 rh#1783515 rh#1795624 rh#1851480 rh#1997467 |
CVE-2019-19081 | kernel-source-rt:Already fixed | moderate | 5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-18680 CVE-2019-19081 MISC:cdn.kernel.org:CVE-2019-18198 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:CVE-2019-19081 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-19081 SMASH Issue 247519 SUSE:openSUSE-SU-2019:2675 UBUNTU:CVE-2019-19081 bnc#1157045 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1776375 rh#1781514 rh#1783498 rh#1783515 rh#1795624 rh#1851480 rh#1997467 |
CVE-2019-19082 | kernel-source-rt:Already fixed | moderate | 5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-18680 CVE-2019-19082 CVE-2019-25161 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:CVE-2019-19082 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-19082 SMASH Issue 247520 SUSE:openSUSE-SU-2019:2675 UBUNTU:CVE-2019-19082 USN-4258-1 USN-4284-1 USN-4287-1 USN-4287-2 bnc#1157046 https://git.kernel.org/stable/c/104c307147ad379617472dd91a5bcb368d72bd6d https://git.kernel.org/stable/c/60e1b411bf0fd9fda2d2de7f45dc3b1d9960b85e linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1776832 rh#1781514 rh#1783498 rh#1783515 rh#1795624 rh#1851480 rh#1997467 |
CVE-2019-19203 | oniguruma:Released | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2019-19203 FEDORA:FEDORA-2019-73197ff9a0 FEDORA:FEDORA-2019-d942abd0d4 L3:64172 MISC:github.com:CVE-2019-19012 MISC:github.com:CVE-2019-19203 RH:CVE-2019-19203 RHSA-2020:3662 RHSA-2020:5275 SMASH Issue 247788 UBUNTU:CVE-2019-19203 bnc#1164550 rh#1802061 |
CVE-2019-19204 | oniguruma:Released | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2019-19204 FEDORA:FEDORA-2019-73197ff9a0 FEDORA:FEDORA-2019-d942abd0d4 L3:64172 MISC:github.com:CVE-2019-19012 MISC:github.com:CVE-2019-19204 MLIST:[debian-lts-announce] 20191204 [SECURITY] [DLA 2020-1] libonig security update RH:CVE-2019-19204 RHSA-2020:3662 RHSA-2020:5275 SMASH Issue 247789 UBUNTU:CVE-2019-19204 bnc#1164569 rh#1802068 |
CVE-2019-19227 | kernel-source-rt:Not affected | moderate | 4.8 (CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2019-19227 MISC:cdn.kernel.org:CVE-2019-19227 MISC:git.kernel.org:CVE-2019-19227 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-19227 SMASH Issue 247840 SUSE:openSUSE-SU-2019:2675 UBUNTU:CVE-2019-19227 bnc#1157678 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1795624 rh#1851480 rh#1997467 |
CVE-2019-19241 | kernel-source-rt:Not affected | important | () | CONFIRM:security.netapp.com:CVE-2019-10207 CVE-2019-19241 MISC:cdn.kernel.org:CVE-2019-19602 MISC:git.kernel.org:CVE-2019-19241 RH:CVE-2019-19241 SMASH Issue 249213 UBUNTU:CVE-2019-19241 USN-4284-1 bnc#1159441 pz#1975 rh#1784942 |
CVE-2019-19244 | sqlite3:Released | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CVE-2019-19244 MISC:github.com:CVE-2019-19244 MISC:www.oracle.com:CVE-2019-2880 RH:CVE-2019-19244 SMASH Issue 247931 UBUNTU:CVE-2019-19244 USN-4205-1 bnc#1157818 rh#1777945 |
CVE-2019-19246 | oniguruma:Released | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2019-19246 FEDORA:FEDORA-2019-d942abd0d4 L3:64172 MISC:bugs.php.net:CVE-2019-19246 MISC:github.com:CVE-2019-19246 MLIST:[debian-lts-announce] 20191204 [SECURITY] [DLA 2020-1] libonig security update RH:CVE-2019-19246 RHSA-2020:3662 RHSA-2020:5275 SMASH Issue 247917 UBUNTU:CVE-2019-19246 USN-4460-1 bnc#1157805 rh#1777537 |
CVE-2019-19252 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-10207 CVE-2019-19252 MISC:git.kernel.org:CVE-2019-19252 MISC:lore.kernel.org:CVE-2019-19252 RH:CVE-2019-19252 SMASH Issue 247920 UBUNTU:CVE-2019-19252 bnc#1157813 rh#1778860 |
CVE-2019-19317 | sqlite3:Released | low | 4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N) | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2019-19317 CVE-2019-19317 MISC:github.com:CVE-2019-19317 MISC:www.oracle.com:CVE-2019-2880 RH:CVE-2019-19317 SMASH Issue 248456 UBUNTU:CVE-2019-19317 bnc#1158812 rh#1784111 |
CVE-2019-19318 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-10207 CVE-2019-19318 MISC:bugs.launchpad.net:CONFIRM:N/A MISC:github.com:CVE-2019-19318 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MLIST:[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2020/04/06/2 OSS:2020/04/30/5 OSS:2020/06/04/4 RH:CVE-2019-19318 SMASH Issue 248077 SUSE:openSUSE-SU-2020:0336 UBUNTU:CVE-2019-19318 USN-4414-1 bnc#1158026 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1784141 rh#1795624 rh#1831726 rh#1831849 rh#1832860 rh#1839634 rh#1842525 rh#1851480 rh#1997467 |
CVE-2019-19319 | kernel-source-rt:Not affected | moderate | 6.6 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H) | CONFIRM:git.kernel.org:CVE-2019-19319 CONFIRM:security.netapp.com:CVE-2019-10207 CVE-2019-19319 DSA-4698 MISC:bugs.launchpad.net:CONFIRM:N/A MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:CVE-2019-19319 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2020/04/06/2 OSS:2020/04/30/5 OSS:2020/06/04/4 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-19319 RHSA-2020:4431 RHSA-2020:4609 SMASH Issue 248078 SUSE:openSUSE-SU-2020:0336 UBUNTU:CVE-2019-19319 USN-4391-1 bdo#952660 bnc#1158021 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1667782 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1784130 rh#1795624 rh#1831726 rh#1831849 rh#1832860 rh#1839634 rh#1842525 rh#1851480 rh#1997467 |
CVE-2019-19332 | kernel-source-rt:Already fixed | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:bugzilla.redhat.com:CVE-2019-19332 CONFIRM:security.netapp.com:CVE-2019-19966 CVE-2019-19332 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:lore.kernel.org:/kvm/000000000000ea5ec20598d90e50%40google.com/ MISC:lore.kernel.org:CVE-2019-19332 MISC:packetstormsecurity.com:CVE-2019-19332 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MISC:www.openwall.com:CVE-2019-19332 MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2019/Q4/159 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-19332 RHSA-2020:4060 RHSA-2020:4062 RHSA-2020:4431 RHSA-2020:4609 SMASH Issue 248363 SUSE:openSUSE-SU-2020:0336 UBUNTU:CVE-2019-19332 USN-4254-1 USN-4254-2 USN-4258-1 USN-4284-1 USN-4287-1 USN-4287-2 bnc#1158827 linux.git:commit:433f4ba1904100da65a311033f17a9bf586b287e linux.git:commit:aedc0650f9135f3b92b39cbed1a8fe98d8088825 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1779594 rh#1781514 rh#1783498 rh#1783515 rh#1795624 rh#1851480 rh#1997467 |
CVE-2019-19377 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2019-10207 CVE-2019-19377 L3:65879 MISC:github.com:CVE-2019-19377 MLIST:[debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update RH:CVE-2019-19377 SMASH Issue 248192 UBUNTU:CVE-2019-19377 USN-4367-1 USN-4369-1 USN-4414-1 bnc#1158266 bnc#1162338 linux.git:commit:b3ff8f1d380e65dddd772542aa9bff6c86bf715a rh#1781894 |
CVE-2019-19378 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2019-10207 CVE-2019-19378 MISC:github.com:CVE-2019-19378 RH:CVE-2019-19378 SMASH Issue 248190 UBUNTU:CVE-2019-19378 bnc#1158270 bnc#1185853 rh#1781899 |
CVE-2019-19447 | kernel-source-rt:Already fixed | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2019-10207 CVE-2019-19447 MISC:bugs.launchpad.net:CONFIRM:N/A MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:CVE-2019-19447 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2020/04/06/2 OSS:2020/04/30/5 OSS:2020/06/04/4 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-19447 RHSA-2020:2104 RHSA-2020:4060 RHSA-2020:4062 RHSA-2020:4431 RHSA-2020:4609 RHSA-2020:5206 RHSA-2020:5430 RHSA-2020:5656 SMASH Issue 248544 SUSE:openSUSE-SU-2020:0336 UBUNTU:CVE-2019-19447 bnc#1158819 bnc#1173869 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1667782 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1781679 rh#1783498 rh#1783515 rh#1795624 rh#1831726 rh#1831849 rh#1832860 rh#1839634 rh#1842525 rh#1851480 rh#1997467 |
CVE-2019-19448 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2019-10207 CVE-2019-19448 MISC:github.com:CVE-2019-19448 MLIST:[debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update MLIST:[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update MLIST:[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update RH:CVE-2019-19448 SMASH Issue 248545 UBUNTU:CVE-2019-19448 USN-4578-1 bnc#1158820 bnc#1162369 linux.git:commit:bf53d4687b8f3f6b752f091eb85f62369a515dfd rh#1781674 |
CVE-2019-19449 | kernel-source-rt:Not affected | important | 7.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H) | CONFIRM:security.netapp.com:CVE-2019-10207 CVE-2019-19449 MISC:github.com:CVE-2019-19449 RH:CVE-2019-19449 SMASH Issue 248546 UBUNTU:CVE-2019-19449 bnc#1158821 rh#1781668 |
CVE-2019-19462 | kernel-source-rt:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CONFIRM:security.netapp.com:CVE-2019-19462 CVE-2019-19462 DSA-4698 DSA-4699 L3:64868 MISC:bugs.launchpad.net:CONFIRM:N/A MISC:lore.kernel.org:CVE-2019-19462 MISC:syzkaller-ppc64.appspot.com:CVE-2019-19462 MISC:syzkaller.appspot.com:CVE-2019-19462 MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update OSS:2020/04/06/2 OSS:2020/04/30/5 OSS:2020/06/04/4 OSS:2020/06/18/1 RH:CVE-2019-19462 SMASH Issue 248189 SUSE:openSUSE-SU-2020:0801 SUSE:openSUSE-SU-2020:0935 UBUNTU:CVE-2019-19462 USN-4414-1 USN-4425-1 USN-4439-1 USN-4440-1 bdo#952660 bdo#960271 bnc#1158265 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1708775 rh#1774983 rh#1781839 rh#1795624 rh#1831726 rh#1831849 rh#1832397 rh#1832860 rh#1839634 rh#1842525 rh#1847832 rh#1849926 |
CVE-2019-19523 | kernel-source-rt:Already fixed | moderate | 5.7 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H) | CVE-2019-19523 MISC:cdn.kernel.org:CVE-2019-19523 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:cve.mitre.org:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 MISC:git.kernel.org:CVE-2019-19523 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:www.openwall.com:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2019/Q4/115 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-19523 RHSA-2020:4060 RHSA-2020:4062 RHSA-2021:1578 RHSA-2021:1739 SMASH Issue 248284 SUSE:openSUSE-SU-2020:0336 UBUNTU:CVE-2019-19523 bnc#1158823 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783434 rh#1783498 rh#1783515 rh#1795624 rh#1851480 rh#1997467 |
CVE-2019-19524 | kernel-source-rt:Already fixed | low | 2.4 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | BUGTRAQ:20200109 [slackware-security] Slackware 14.2 kernel (SSA:2020-008-01) CVE-2019-19524 MISC:cdn.kernel.org:CVE-2019-19524 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:cve.mitre.org:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 MISC:git.kernel.org:CVE-2019-19524 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:packetstormsecurity.com:CVE-2019-19332 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:www.openwall.com:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2019/Q4/115 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-19524 RHSA-2020:2104 RHSA-2020:4060 RHSA-2020:4062 RHSA-2020:4431 RHSA-2020:4609 SMASH Issue 248279 SUSE:openSUSE-SU-2019:2675 UBUNTU:CVE-2019-19524 USN-4225-1 USN-4225-2 USN-4226-1 USN-4227-1 USN-4227-2 USN-4228-1 USN-4228-2 bnc#1158413 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783459 rh#1783498 rh#1783515 rh#1795624 rh#1851480 rh#1997467 |
CVE-2019-19525 | kernel-source-rt:Already fixed | moderate | 4.3 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) | CVE-2019-19525 MISC:cdn.kernel.org:CVE-2019-19076 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:cve.mitre.org:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 MISC:git.kernel.org:CVE-2019-19525 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:www.openwall.com:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2019/Q4/115 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-19525 SMASH Issue 248278 SUSE:openSUSE-SU-2019:2675 UBUNTU:CVE-2019-19525 bnc#1158417 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783478 rh#1783498 rh#1783515 rh#1795624 rh#1851480 rh#1997467 |
CVE-2019-19526 | kernel-source-rt:Already fixed | moderate | 4.6 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2019-19526 MISC:cdn.kernel.org:CVE-2019-19048 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:cve.mitre.org:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 MISC:git.kernel.org:CVE-2019-19526 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:www.openwall.com:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2019/Q4/115 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-19526 SMASH Issue 248281 SUSE:openSUSE-SU-2020:0336 UBUNTU:CVE-2019-19526 USN-4226-1 bnc#1158893 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783494 rh#1783498 rh#1783515 rh#1795624 rh#1851480 rh#1997467 |
CVE-2019-19527 | kernel-source-rt:Already fixed | moderate | 5.7 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H) | CVE-2019-19527 MISC:cdn.kernel.org:CVE-2019-19527 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:cve.mitre.org:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 MISC:git.kernel.org:CVE-2019-19527 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:www.openwall.com:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2019/Q4/115 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-19527 RHSA-2020:1372 RHSA-2020:1378 RHSA-2020:3220 RHSA-2020:3221 RHSA-2020:4236 SMASH Issue 248280 SUSE:openSUSE-SU-2020:0336 UBUNTU:CVE-2019-19527 bnc#1158900 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1795624 rh#1851480 rh#1997467 |
CVE-2019-19528 | kernel-source-rt:Already fixed | moderate | 4.3 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) | CVE-2019-19528 MISC:cdn.kernel.org:CVE-2019-19523 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:cve.mitre.org:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 MISC:git.kernel.org:CVE-2019-19528 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:www.openwall.com:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2019/Q4/115 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-19528 RHSA-2021:1578 RHSA-2021:1739 SMASH Issue 248276 SUSE:openSUSE-SU-2019:2675 UBUNTU:CVE-2019-19528 bnc#1158407 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783498 rh#1783507 rh#1783515 rh#1795624 rh#1851480 rh#1997467 |
CVE-2019-19529 | kernel-source-rt:Already fixed | moderate | 4.6 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2019-19529 MISC:cdn.kernel.org:CVE-2019-19044 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:cve.mitre.org:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 MISC:git.kernel.org:CVE-2019-19529 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:www.openwall.com:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2019/Q4/115 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-19529 SMASH Issue 248275 SUSE:openSUSE-SU-2019:2675 UBUNTU:CVE-2019-19529 USN-4225-1 USN-4225-2 USN-4226-1 USN-4227-1 USN-4227-2 bnc#1158381 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1795624 rh#1851480 rh#1997467 |
CVE-2019-19530 | kernel-source-rt:Not affected | moderate | 4.6 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2019-19530 MISC:cdn.kernel.org:CVE-2019-19527 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:cve.mitre.org:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 MISC:git.kernel.org:CVE-2019-19530 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:www.openwall.com:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2019/Q4/115 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-19530 RHSA-2020:4060 RHSA-2020:4062 SMASH Issue 248273 SUSE:openSUSE-SU-2019:2675 UBUNTU:CVE-2019-19530 bnc#1158410 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1783518 rh#1795624 rh#1851480 rh#1997467 |
CVE-2019-19531 | kernel-source-rt:Already fixed | low | 2.1 (CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CVE-2019-19531 MISC:cdn.kernel.org:CVE-2019-19531 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:cve.mitre.org:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 MISC:git.kernel.org:CVE-2019-19531 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:www.openwall.com:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2019/Q4/115 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-19531 SMASH Issue 248285 SUSE:openSUSE-SU-2019:2675 UBUNTU:CVE-2019-19531 bnc#1158445 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1783523 rh#1795624 rh#1851480 rh#1997467 |
CVE-2019-19532 | kernel-source-rt:Already fixed | moderate | 6.8 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2019-19532 MISC:cdn.kernel.org:CVE-2019-19048 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:cve.mitre.org:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 MISC:git.kernel.org:CVE-2019-19532 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:www.openwall.com:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2019/Q4/115 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-19532 RHSA-2020:1567 RHSA-2020:1769 RHSA-2021:0856 RHSA-2021:0857 RHSA-2021:1531 RHSA-2021:2164 RHSA-2021:2355 SMASH Issue 248282 UBUNTU:CVE-2019-19532 USN-4226-1 bnc#1158824 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1781821 rh#1783498 rh#1783515 rh#1795624 rh#1851480 rh#1997467 |
CVE-2019-19533 | kernel-source-rt:Already fixed | low | 2.4 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) | CVE-2019-19533 MISC:cdn.kernel.org:CVE-2019-18198 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:cve.mitre.org:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 MISC:git.kernel.org:CVE-2019-19533 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:www.openwall.com:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2019/Q4/115 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-19533 RHSA-2020:4431 RHSA-2020:4609 SMASH Issue 248283 UBUNTU:CVE-2019-19533 bnc#1158834 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1783534 rh#1795624 rh#1851480 rh#1997467 |
CVE-2019-19534 | kernel-source-rt:Already fixed | low | 2.4 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) | CVE-2019-19534 MISC:cdn.kernel.org:CVE-2019-19044 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:cve.mitre.org:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 MISC:git.kernel.org:CVE-2019-19534 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:www.openwall.com:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2019/Q4/115 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-19534 RHSA-2020:1567 RHSA-2020:1769 RHSA-2020:4060 RHSA-2020:4062 SMASH Issue 248274 SUSE:openSUSE-SU-2019:2675 UBUNTU:CVE-2019-19534 USN-4225-1 USN-4225-2 USN-4226-1 USN-4227-1 USN-4227-2 USN-4228-1 USN-4228-2 bnc#1158398 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1783540 rh#1795624 rh#1851480 rh#1997467 |
CVE-2019-19535 | kernel-source-rt:Already fixed | moderate | 4.6 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) | CVE-2019-19535 MISC:cdn.kernel.org:CVE-2019-19531 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:cve.mitre.org:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 MISC:git.kernel.org:CVE-2019-19535 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:www.openwall.com:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 MISC:www.oracle.com:CVE-2021-3450 MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2019/Q4/115 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-19535 SMASH Issue 248271 SUSE:openSUSE-SU-2020:0336 UBUNTU:CVE-2019-19535 bnc#1158903 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1783547 rh#1795624 rh#1851480 rh#1997467 |
CVE-2019-19536 | kernel-source-rt:Not affected | low | 2.4 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) | CVE-2019-19536 MISC:cdn.kernel.org:CVE-2019-19531 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:cve.mitre.org:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 MISC:git.kernel.org:CVE-2019-19536 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:www.openwall.com:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2019/Q4/115 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-19536 SMASH Issue 248272 SUSE:openSUSE-SU-2019:2675 UBUNTU:CVE-2019-19536 bnc#1158394 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1783552 rh#1795624 rh#1851480 rh#1997467 |
CVE-2019-19537 | kernel-source-rt:Not affected | moderate | 4.6 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2019-19537 MISC:cdn.kernel.org:CVE-2019-19527 MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:cve.mitre.org:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 MISC:git.kernel.org:CVE-2019-19537 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115 MISC:www.openwall.com:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3 OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2019/Q4/115 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-19537 RHSA-2020:4060 RHSA-2020:4062 RHSA-2020:4431 RHSA-2020:4609 SMASH Issue 248277 UBUNTU:CVE-2019-19537 bnc#1158904 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1783561 rh#1795624 rh#1851480 rh#1997467 |
CVE-2019-19543 | kernel-source-rt:Already fixed | low | 2.3 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L) | CONFIRM:security.netapp.com:CVE-2019-19543 CVE-2019-19543 MISC:cdn.kernel.org:CVE-2019-19543 MISC:git.kernel.org:CVE-2019-19543 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-19543 RHSA-2020:4431 RHSA-2020:4609 SMASH Issue 248310 SUSE:openSUSE-SU-2019:2675 UBUNTU:CVE-2019-19543 bnc#1158427 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1781810 rh#1783498 rh#1783515 rh#1795624 rh#1851480 rh#1997467 |
CVE-2019-19602 | kernel-source-rt:Already fixed | low | 3.6 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L) | CONFIRM:security.netapp.com:CVE-2019-10207 CVE-2019-19602 MISC:bugzilla.kernel.org:CVE-2019-19602 MISC:cdn.kernel.org:CVE-2019-19602 MISC:git.kernel.org:CVE-2019-19602 MISC:github.com:CVE-2019-19602 RH:CVE-2019-19602 RHSA-2020:4431 SMASH Issue 248463 UBUNTU:CVE-2019-19602 USN-4284-1 bnc#1158887 rh#1784572 |
CVE-2019-19603 | sqlite3:Released | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2019-19317 CVE-2019-19603 MISC:github.com:CVE-2019-19603 MISC:www.oracle.com:CVE-2019-2880 MISC:www.sqlite.org:CVE-2019-19603 MLIST:[guacamole-issues] 20210618 [jira] [Created] (GUACAMOLE-1368) Latest docker image fails security scans. RH:CVE-2019-19603 RHSA-2021:4396 SMASH Issue 248618 UBUNTU:CVE-2019-19603 USN-4394-1 bnc#1158960 rh#1785318 |
CVE-2019-19645 | sqlite3:Released | moderate | 5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2019-19317 CONFIRM:www.tenable.com:CVE-2021-23358 CVE-2019-19645 MISC:github.com:CVE-2019-19645 MISC:www.oracle.com:CVE-2019-2880 RH:CVE-2019-19645 SMASH Issue 248603 UBUNTU:CVE-2019-19645 USN-4394-1 bnc#1158958 rh#1783305 |
CVE-2019-19646 | sqlite3:Released | moderate | 6.3 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2019-19317 CONFIRM:www.tenable.com:CVE-2021-23358 CVE-2019-19646 MISC:github.com:CVE-2019-19646 MISC:www.oracle.com:CVE-2019-2880 MISC:www.sqlite.org:CVE-2019-19603 Oracle:CVE-2019-19646 RH:CVE-2019-19646 SMASH Issue 248619 UBUNTU:CVE-2019-19646 bnc#1158959 rh#1786743 |
CVE-2019-19768 | kernel-source-rt:Already fixed | moderate | 5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) | CONFIRM:security.netapp.com:CVE-2019-10207 CVE-2019-19768 DSA-4698 MISC:bugs.launchpad.net:CONFIRM:N/A MISC:bugzilla.kernel.org:CVE-2019-19768 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2020/04/06/2 OSS:2020/04/30/5 OSS:2020/06/04/4 RH:CVE-2019-19768 RHSA-2020:1567 RHSA-2020:1769 RHSA-2020:1966 RHSA-2020:2082 RHSA-2020:2085 RHSA-2020:2104 RHSA-2020:2199 RHSA-2020:2203 RHSA-2020:2214 RHSA-2020:2242 RHSA-2020:2277 RHSA-2020:2285 RHSA-2020:2289 RHSA-2020:2291 RHSA-2020:2519 RHSA-2020:2522 SMASH Issue 248985 SUSE:openSUSE-SU-2020:0388 UBUNTU:CVE-2019-19768 USN-4342-1 USN-4344-1 USN-4345-1 USN-4346-1 bdo#952660 bnc#1159285 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1667782 rh#1707796 rh#1773519 rh#1774983 rh#1783498 rh#1786164 rh#1795624 rh#1831726 rh#1831849 rh#1832860 rh#1839634 rh#1842525 rh#1851480 |
CVE-2019-19769 | kernel-source-rt:Released | moderate | 5.3 (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H) | CONFIRM:security.netapp.com:CVE-2019-10207 CVE-2019-19769 FEDORA:FEDORA-2020-73c00eda1c FEDORA:FEDORA-2020-76966b3419 MISC:bugzilla.kernel.org:CVE-2019-19769 RH:CVE-2019-19769 SMASH Issue 248986 UBUNTU:CVE-2019-19769 USN-4368-1 bnc#1159280 linux.git:commit:6d390e4b5d48ec03bb87e63cf0a2bff5f4e116da rh#1786174 |
CVE-2019-19770 | kernel-source-rt:Already fixed | moderate | 5.7 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H) | CONFIRM:security.netapp.com:CVE-2019-10207 CVE-2019-19770 MISC:bugs.launchpad.net:CONFIRM:N/A MISC:bugzilla.kernel.org:CVE-2019-19770 MISC:lore.kernel.org:CVE-2019-19770 MLIST:[debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update OSS:2020/04/06/2 OSS:2020/04/30/5 OSS:2020/06/04/4 RH:CVE-2019-19770 RHSA-2020:4431 RHSA-2020:4609 SMASH Issue 248987 SUSE:openSUSE-SU-2020:0543 UBUNTU:CVE-2019-19770 bnc#1159198 https://lore.kernel.org/linux-block/20200402000002.7442-1-mcgrof%40kernel.org/ linux.git:commit:bad8e64fb19d3a0de5e564d9a7271c31bd684369 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1707796 rh#1774983 rh#1786179 rh#1795624 rh#1831726 rh#1831849 rh#1832860 rh#1839634 rh#1842525 |
CVE-2019-19813 | kernel-source-rt:Not affected | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H) | CONFIRM:security.netapp.com:CVE-2019-10207 CVE-2019-19813 MISC:github.com:CVE-2019-19813 MLIST:[debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update MLIST:[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update RH:CVE-2019-19813 SMASH Issue 249200 UBUNTU:CVE-2019-19813 USN-4414-1 bnc#1159435 rh#1784911 |
CVE-2019-19814 | kernel-source-rt:Not affected | critical | () | CONFIRM:security.netapp.com:CVE-2019-10207 CVE-2019-19814 MISC:github.com:CVE-2019-19814 RH:CVE-2019-19814 SMASH Issue 249201 UBUNTU:CVE-2019-19814 bnc#1159437 rh#1784917 |
CVE-2019-19816 | kernel-source-rt:Not affected | important | 7.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2019-10207 CVE-2019-19816 MISC:github.com:CVE-2019-19816 MLIST:[debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update MLIST:[debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update MLIST:[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update RH:CVE-2019-19816 SMASH Issue 249203 SMASH Issue 270185 UBUNTU:CVE-2019-19816 USN-4414-1 bnc#1159439 bnc#1173871 rh#1784923 |
CVE-2019-19880 | sqlite3:Already fixed | important | () | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2019-19880 CONFIRM:security.netapp.com:CVE-2019-19923 CVE-2019-19880 CVE-2019-19923 CVE-2019-19926 CVE-2020-6381 CVE-2020-6382 CVE-2020-6385 CVE-2020-6387 CVE-2020-6388 CVE-2020-6389 CVE-2020-6390 CVE-2020-6391 CVE-2020-6392 CVE-2020-6393 CVE-2020-6394 CVE-2020-6395 CVE-2020-6396 CVE-2020-6397 CVE-2020-6398 CVE-2020-6399 CVE-2020-6400 CVE-2020-6401 CVE-2020-6402 CVE-2020-6403 CVE-2020-6404 CVE-2020-6405 CVE-2020-6406 CVE-2020-6408 CVE-2020-6409 CVE-2020-6410 CVE-2020-6411 CVE-2020-6412 CVE-2020-6413 CVE-2020-6414 CVE-2020-6415 CVE-2020-6416 CVE-2020-6417 D:CVE-2020-6391 DSA-4638 FEDORA:FEDORA-2020-39e0b8bd14 FEDORA:FEDORA-2020-f6271d7afa GLSA-202003-08 MISC:chromereleases.googleblog.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6382 MISC:crbug.com:CVE-2020-6385 MISC:crbug.com:CVE-2020-6387 MISC:crbug.com:CVE-2020-6388 MISC:crbug.com:CVE-2020-6389 MISC:crbug.com:CVE-2020-6390 MISC:crbug.com:CVE-2020-6391 MISC:crbug.com:CVE-2020-6392 MISC:crbug.com:CVE-2020-6393 MISC:crbug.com:CVE-2020-6394 MISC:crbug.com:CVE-2020-6395 MISC:crbug.com:CVE-2020-6396 MISC:crbug.com:CVE-2020-6397 MISC:crbug.com:CVE-2020-6398 MISC:crbug.com:CVE-2020-6399 MISC:crbug.com:CVE-2020-6400 MISC:crbug.com:CVE-2020-6401 MISC:crbug.com:CVE-2020-6402 MISC:crbug.com:CVE-2020-6403 MISC:crbug.com:CVE-2020-6404 MISC:crbug.com:CVE-2020-6405 MISC:crbug.com:CVE-2020-6406 MISC:crbug.com:CVE-2020-6408 MISC:crbug.com:CVE-2020-6409 MISC:crbug.com:CVE-2020-6410 MISC:crbug.com:CVE-2020-6411 MISC:crbug.com:CVE-2020-6412 MISC:crbug.com:CVE-2020-6413 MISC:crbug.com:CVE-2020-6414 MISC:crbug.com:CVE-2020-6415 MISC:crbug.com:CVE-2020-6416 MISC:crbug.com:CVE-2020-6417 MISC:github.com:CVE-2019-19880 MISC:github.com:CVE-2019-19923 MISC:github.com:CVE-2019-19926 MISC:packetstormsecurity.com:CVE-2020-6388 MISC:packetstormsecurity.com:CVE-2020-6390 MISC:www.oracle.com:CVE-2019-2880 Oracle:CVE-2019-18197 RH:CVE-2019-19880 RH:CVE-2019-19923 RH:CVE-2019-19926 RH:CVE-2020-6381 RH:CVE-2020-6382 RH:CVE-2020-6385 RH:CVE-2020-6387 RH:CVE-2020-6388 RH:CVE-2020-6389 RH:CVE-2020-6390 RH:CVE-2020-6391 RH:CVE-2020-6392 RH:CVE-2020-6393 RH:CVE-2020-6394 RH:CVE-2020-6395 RH:CVE-2020-6396 RH:CVE-2020-6397 RH:CVE-2020-6398 RH:CVE-2020-6399 RH:CVE-2020-6400 RH:CVE-2020-6401 RH:CVE-2020-6402 RH:CVE-2020-6403 RH:CVE-2020-6404 RH:CVE-2020-6405 RH:CVE-2020-6406 RH:CVE-2020-6408 RH:CVE-2020-6409 RH:CVE-2020-6410 RH:CVE-2020-6411 RH:CVE-2020-6412 RH:CVE-2020-6413 RH:CVE-2020-6414 RH:CVE-2020-6415 RH:CVE-2020-6416 RH:CVE-2020-6417 RHSA-2020:0514 RHSA-2020:1810 RHSA-2020:4442 SMASH Issue 249293 SMASH Issue 252466 SUSE:openSUSE-SU-2020:0189 SUSE:openSUSE-SU-2020:0210 SUSE:openSUSE-SU-2020:0233 UBUNTU:CVE-2019-19880 UBUNTU:CVE-2019-19923 UBUNTU:CVE-2019-19926 UBUNTU:CVE-2020-6381 UBUNTU:CVE-2020-6382 UBUNTU:CVE-2020-6385 UBUNTU:CVE-2020-6387 UBUNTU:CVE-2020-6388 UBUNTU:CVE-2020-6389 UBUNTU:CVE-2020-6390 UBUNTU:CVE-2020-6391 UBUNTU:CVE-2020-6392 UBUNTU:CVE-2020-6393 UBUNTU:CVE-2020-6394 UBUNTU:CVE-2020-6395 UBUNTU:CVE-2020-6396 UBUNTU:CVE-2020-6397 UBUNTU:CVE-2020-6398 UBUNTU:CVE-2020-6399 UBUNTU:CVE-2020-6400 UBUNTU:CVE-2020-6401 UBUNTU:CVE-2020-6402 UBUNTU:CVE-2020-6403 UBUNTU:CVE-2020-6404 UBUNTU:CVE-2020-6405 UBUNTU:CVE-2020-6406 UBUNTU:CVE-2020-6408 UBUNTU:CVE-2020-6409 UBUNTU:CVE-2020-6410 UBUNTU:CVE-2020-6411 UBUNTU:CVE-2020-6412 UBUNTU:CVE-2020-6413 UBUNTU:CVE-2020-6414 UBUNTU:CVE-2020-6415 UBUNTU:CVE-2020-6416 UBUNTU:CVE-2020-6417 USN-4298-1 USN-4298-2 bnc#1159491 bnc#1162833 rh#1770768 rh#1787032 rh#1788846 rh#1789364 rh#1801160 rh#1801161 rh#1801162 rh#1801163 rh#1801164 rh#1801165 rh#1801166 rh#1801167 rh#1801168 rh#1801169 rh#1801170 rh#1801171 rh#1801172 rh#1801173 rh#1801174 rh#1801175 rh#1801176 rh#1801177 rh#1801178 rh#1801179 rh#1801180 rh#1801181 rh#1801182 rh#1801184 rh#1801185 rh#1801186 rh#1801187 rh#1801188 rh#1801189 rh#1801190 rh#1801191 rh#1801192 rh#1801193 |
CVE-2019-19922 | kernel-source-rt:Unsupported | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-19966 CVE-2019-19922 MISC:cdn.kernel.org:CVE-2019-19048 MISC:git.kernel.org:CVE-2019-19922 MISC:github.com:CVE-2019-19922 MISC:relistan.com:CVE-2019-19922 MISC:www.oracle.com:CVE-2021-3450 MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update RH:CVE-2019-19922 RHSA-2020:1493 RHSA-2020:1567 RHSA-2020:1769 SMASH Issue 249665 UBUNTU:CVE-2019-19922 USN-4226-1 bnc#1159717 rh#1792512 |
CVE-2019-19923 | sqlite3:Released | moderate | 6.3 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2019-19880 CONFIRM:security.netapp.com:CVE-2019-19923 CVE-2019-19880 CVE-2019-19923 CVE-2019-19926 CVE-2020-6381 CVE-2020-6382 CVE-2020-6385 CVE-2020-6387 CVE-2020-6388 CVE-2020-6389 CVE-2020-6390 CVE-2020-6391 CVE-2020-6392 CVE-2020-6393 CVE-2020-6394 CVE-2020-6395 CVE-2020-6396 CVE-2020-6397 CVE-2020-6398 CVE-2020-6399 CVE-2020-6400 CVE-2020-6401 CVE-2020-6402 CVE-2020-6403 CVE-2020-6404 CVE-2020-6405 CVE-2020-6406 CVE-2020-6408 CVE-2020-6409 CVE-2020-6410 CVE-2020-6411 CVE-2020-6412 CVE-2020-6413 CVE-2020-6414 CVE-2020-6415 CVE-2020-6416 CVE-2020-6417 D:CVE-2020-6391 DSA-4638 FEDORA:FEDORA-2020-39e0b8bd14 FEDORA:FEDORA-2020-f6271d7afa GLSA-202003-08 MISC:chromereleases.googleblog.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6382 MISC:crbug.com:CVE-2020-6385 MISC:crbug.com:CVE-2020-6387 MISC:crbug.com:CVE-2020-6388 MISC:crbug.com:CVE-2020-6389 MISC:crbug.com:CVE-2020-6390 MISC:crbug.com:CVE-2020-6391 MISC:crbug.com:CVE-2020-6392 MISC:crbug.com:CVE-2020-6393 MISC:crbug.com:CVE-2020-6394 MISC:crbug.com:CVE-2020-6395 MISC:crbug.com:CVE-2020-6396 MISC:crbug.com:CVE-2020-6397 MISC:crbug.com:CVE-2020-6398 MISC:crbug.com:CVE-2020-6399 MISC:crbug.com:CVE-2020-6400 MISC:crbug.com:CVE-2020-6401 MISC:crbug.com:CVE-2020-6402 MISC:crbug.com:CVE-2020-6403 MISC:crbug.com:CVE-2020-6404 MISC:crbug.com:CVE-2020-6405 MISC:crbug.com:CVE-2020-6406 MISC:crbug.com:CVE-2020-6408 MISC:crbug.com:CVE-2020-6409 MISC:crbug.com:CVE-2020-6410 MISC:crbug.com:CVE-2020-6411 MISC:crbug.com:CVE-2020-6412 MISC:crbug.com:CVE-2020-6413 MISC:crbug.com:CVE-2020-6414 MISC:crbug.com:CVE-2020-6415 MISC:crbug.com:CVE-2020-6416 MISC:crbug.com:CVE-2020-6417 MISC:github.com:CVE-2019-19880 MISC:github.com:CVE-2019-19923 MISC:github.com:CVE-2019-19926 MISC:packetstormsecurity.com:CVE-2020-6388 MISC:packetstormsecurity.com:CVE-2020-6390 MISC:www.oracle.com:CVE-2019-2880 Oracle:CVE-2019-18197 RH:CVE-2019-19880 RH:CVE-2019-19923 RH:CVE-2019-19926 RH:CVE-2020-6381 RH:CVE-2020-6382 RH:CVE-2020-6385 RH:CVE-2020-6387 RH:CVE-2020-6388 RH:CVE-2020-6389 RH:CVE-2020-6390 RH:CVE-2020-6391 RH:CVE-2020-6392 RH:CVE-2020-6393 RH:CVE-2020-6394 RH:CVE-2020-6395 RH:CVE-2020-6396 RH:CVE-2020-6397 RH:CVE-2020-6398 RH:CVE-2020-6399 RH:CVE-2020-6400 RH:CVE-2020-6401 RH:CVE-2020-6402 RH:CVE-2020-6403 RH:CVE-2020-6404 RH:CVE-2020-6405 RH:CVE-2020-6406 RH:CVE-2020-6408 RH:CVE-2020-6409 RH:CVE-2020-6410 RH:CVE-2020-6411 RH:CVE-2020-6412 RH:CVE-2020-6413 RH:CVE-2020-6414 RH:CVE-2020-6415 RH:CVE-2020-6416 RH:CVE-2020-6417 RHSA-2020:0514 RHSA-2020:1810 RHSA-2020:4442 SMASH Issue 249763 SMASH Issue 252466 SUSE:openSUSE-SU-2020:0189 SUSE:openSUSE-SU-2020:0210 SUSE:openSUSE-SU-2020:0233 UBUNTU:CVE-2019-19880 UBUNTU:CVE-2019-19923 UBUNTU:CVE-2019-19926 UBUNTU:CVE-2020-6381 UBUNTU:CVE-2020-6382 UBUNTU:CVE-2020-6385 UBUNTU:CVE-2020-6387 UBUNTU:CVE-2020-6388 UBUNTU:CVE-2020-6389 UBUNTU:CVE-2020-6390 UBUNTU:CVE-2020-6391 UBUNTU:CVE-2020-6392 UBUNTU:CVE-2020-6393 UBUNTU:CVE-2020-6394 UBUNTU:CVE-2020-6395 UBUNTU:CVE-2020-6396 UBUNTU:CVE-2020-6397 UBUNTU:CVE-2020-6398 UBUNTU:CVE-2020-6399 UBUNTU:CVE-2020-6400 UBUNTU:CVE-2020-6401 UBUNTU:CVE-2020-6402 UBUNTU:CVE-2020-6403 UBUNTU:CVE-2020-6404 UBUNTU:CVE-2020-6405 UBUNTU:CVE-2020-6406 UBUNTU:CVE-2020-6408 UBUNTU:CVE-2020-6409 UBUNTU:CVE-2020-6410 UBUNTU:CVE-2020-6411 UBUNTU:CVE-2020-6412 UBUNTU:CVE-2020-6413 UBUNTU:CVE-2020-6414 UBUNTU:CVE-2020-6415 UBUNTU:CVE-2020-6416 UBUNTU:CVE-2020-6417 USN-4298-1 USN-4298-2 bnc#1160309 bnc#1162833 rh#1770768 rh#1787032 rh#1788846 rh#1789364 rh#1801160 rh#1801161 rh#1801162 rh#1801163 rh#1801164 rh#1801165 rh#1801166 rh#1801167 rh#1801168 rh#1801169 rh#1801170 rh#1801171 rh#1801172 rh#1801173 rh#1801174 rh#1801175 rh#1801176 rh#1801177 rh#1801178 rh#1801179 rh#1801180 rh#1801181 rh#1801182 rh#1801184 rh#1801185 rh#1801186 rh#1801187 rh#1801188 rh#1801189 rh#1801190 rh#1801191 rh#1801192 rh#1801193 |
CVE-2019-19924 | sqlite3:Released | moderate | 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N) | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2019-19923 CVE-2019-19924 MISC:github.com:CVE-2019-19924 MISC:www.oracle.com:CVE-2019-2880 MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 MLIST:[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 RH:CVE-2019-19924 RHSA-2020:1810 SMASH Issue 249764 UBUNTU:CVE-2019-19924 USN-4298-1 bnc#1159850 rh#1788842 |
CVE-2019-19925 | sqlite3:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2019-19923 CVE-2019-19925 DSA-4638 MISC:github.com:CVE-2019-19925 MISC:www.oracle.com:CVE-2019-2880 RH:CVE-2019-19925 RHSA-2020:0514 RHSA-2020:1810 SMASH Issue 249768 SUSE:openSUSE-SU-2020:0189 SUSE:openSUSE-SU-2020:0210 SUSE:openSUSE-SU-2020:0233 UBUNTU:CVE-2019-19925 USN-4298-1 bnc#1159847 rh#1788866 |
CVE-2019-19926 | sqlite3:Released | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2019-19880 CONFIRM:security.netapp.com:CVE-2019-19923 CVE-2019-19880 CVE-2019-19923 CVE-2019-19926 CVE-2020-6381 CVE-2020-6382 CVE-2020-6385 CVE-2020-6387 CVE-2020-6388 CVE-2020-6389 CVE-2020-6390 CVE-2020-6391 CVE-2020-6392 CVE-2020-6393 CVE-2020-6394 CVE-2020-6395 CVE-2020-6396 CVE-2020-6397 CVE-2020-6398 CVE-2020-6399 CVE-2020-6400 CVE-2020-6401 CVE-2020-6402 CVE-2020-6403 CVE-2020-6404 CVE-2020-6405 CVE-2020-6406 CVE-2020-6408 CVE-2020-6409 CVE-2020-6410 CVE-2020-6411 CVE-2020-6412 CVE-2020-6413 CVE-2020-6414 CVE-2020-6415 CVE-2020-6416 CVE-2020-6417 D:CVE-2020-6391 DSA-4638 FEDORA:FEDORA-2020-39e0b8bd14 FEDORA:FEDORA-2020-f6271d7afa GLSA-202003-08 MISC:chromereleases.googleblog.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6382 MISC:crbug.com:CVE-2020-6385 MISC:crbug.com:CVE-2020-6387 MISC:crbug.com:CVE-2020-6388 MISC:crbug.com:CVE-2020-6389 MISC:crbug.com:CVE-2020-6390 MISC:crbug.com:CVE-2020-6391 MISC:crbug.com:CVE-2020-6392 MISC:crbug.com:CVE-2020-6393 MISC:crbug.com:CVE-2020-6394 MISC:crbug.com:CVE-2020-6395 MISC:crbug.com:CVE-2020-6396 MISC:crbug.com:CVE-2020-6397 MISC:crbug.com:CVE-2020-6398 MISC:crbug.com:CVE-2020-6399 MISC:crbug.com:CVE-2020-6400 MISC:crbug.com:CVE-2020-6401 MISC:crbug.com:CVE-2020-6402 MISC:crbug.com:CVE-2020-6403 MISC:crbug.com:CVE-2020-6404 MISC:crbug.com:CVE-2020-6405 MISC:crbug.com:CVE-2020-6406 MISC:crbug.com:CVE-2020-6408 MISC:crbug.com:CVE-2020-6409 MISC:crbug.com:CVE-2020-6410 MISC:crbug.com:CVE-2020-6411 MISC:crbug.com:CVE-2020-6412 MISC:crbug.com:CVE-2020-6413 MISC:crbug.com:CVE-2020-6414 MISC:crbug.com:CVE-2020-6415 MISC:crbug.com:CVE-2020-6416 MISC:crbug.com:CVE-2020-6417 MISC:github.com:CVE-2019-19880 MISC:github.com:CVE-2019-19923 MISC:github.com:CVE-2019-19926 MISC:packetstormsecurity.com:CVE-2020-6388 MISC:packetstormsecurity.com:CVE-2020-6390 MISC:www.oracle.com:CVE-2019-2880 Oracle:CVE-2019-18197 RH:CVE-2019-19880 RH:CVE-2019-19923 RH:CVE-2019-19926 RH:CVE-2020-6381 RH:CVE-2020-6382 RH:CVE-2020-6385 RH:CVE-2020-6387 RH:CVE-2020-6388 RH:CVE-2020-6389 RH:CVE-2020-6390 RH:CVE-2020-6391 RH:CVE-2020-6392 RH:CVE-2020-6393 RH:CVE-2020-6394 RH:CVE-2020-6395 RH:CVE-2020-6396 RH:CVE-2020-6397 RH:CVE-2020-6398 RH:CVE-2020-6399 RH:CVE-2020-6400 RH:CVE-2020-6401 RH:CVE-2020-6402 RH:CVE-2020-6403 RH:CVE-2020-6404 RH:CVE-2020-6405 RH:CVE-2020-6406 RH:CVE-2020-6408 RH:CVE-2020-6409 RH:CVE-2020-6410 RH:CVE-2020-6411 RH:CVE-2020-6412 RH:CVE-2020-6413 RH:CVE-2020-6414 RH:CVE-2020-6415 RH:CVE-2020-6416 RH:CVE-2020-6417 RHSA-2020:0514 RHSA-2020:1810 RHSA-2020:4442 SMASH Issue 249666 SMASH Issue 252466 SUSE:openSUSE-SU-2020:0189 SUSE:openSUSE-SU-2020:0210 SUSE:openSUSE-SU-2020:0233 UBUNTU:CVE-2019-19880 UBUNTU:CVE-2019-19923 UBUNTU:CVE-2019-19926 UBUNTU:CVE-2020-6381 UBUNTU:CVE-2020-6382 UBUNTU:CVE-2020-6385 UBUNTU:CVE-2020-6387 UBUNTU:CVE-2020-6388 UBUNTU:CVE-2020-6389 UBUNTU:CVE-2020-6390 UBUNTU:CVE-2020-6391 UBUNTU:CVE-2020-6392 UBUNTU:CVE-2020-6393 UBUNTU:CVE-2020-6394 UBUNTU:CVE-2020-6395 UBUNTU:CVE-2020-6396 UBUNTU:CVE-2020-6397 UBUNTU:CVE-2020-6398 UBUNTU:CVE-2020-6399 UBUNTU:CVE-2020-6400 UBUNTU:CVE-2020-6401 UBUNTU:CVE-2020-6402 UBUNTU:CVE-2020-6403 UBUNTU:CVE-2020-6404 UBUNTU:CVE-2020-6405 UBUNTU:CVE-2020-6406 UBUNTU:CVE-2020-6408 UBUNTU:CVE-2020-6409 UBUNTU:CVE-2020-6410 UBUNTU:CVE-2020-6411 UBUNTU:CVE-2020-6412 UBUNTU:CVE-2020-6413 UBUNTU:CVE-2020-6414 UBUNTU:CVE-2020-6415 UBUNTU:CVE-2020-6416 UBUNTU:CVE-2020-6417 USN-4298-1 USN-4298-2 bnc#1159715 bnc#1162833 rh#1770768 rh#1787032 rh#1788846 rh#1789364 rh#1801160 rh#1801161 rh#1801162 rh#1801163 rh#1801164 rh#1801165 rh#1801166 rh#1801167 rh#1801168 rh#1801169 rh#1801170 rh#1801171 rh#1801172 rh#1801173 rh#1801174 rh#1801175 rh#1801176 rh#1801177 rh#1801178 rh#1801179 rh#1801180 rh#1801181 rh#1801182 rh#1801184 rh#1801185 rh#1801186 rh#1801187 rh#1801188 rh#1801189 rh#1801190 rh#1801191 rh#1801192 rh#1801193 |
CVE-2019-19956 | libxml2:Released | moderate | 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | CONFIRM:cert-portal.siemens.com:CVE-2019-19956 CONFIRM:security.netapp.com:CVE-2019-19956 CONFIRM:us-cert.cisa.gov:CVE-2019-19956 CVE-2019-19956 FEDORA:FEDORA-2020-0c71c00af4 FEDORA:FEDORA-2020-7694e8be73 MISC:gitlab.gnome.org:CVE-2019-19956 MISC:www.oracle.com:CVE-2015-7501 MLIST:[debian-lts-announce] 20191228 [SECURITY] [DLA 2048-1] libxml2 security update MLIST:[debian-lts-announce] 20200909 [SECURITY] [DLA 2369-1] libxml2 security update Oracle:CVE-2020-7595 RH:CVE-2019-19956 RHSA-2020:2644 RHSA-2020:2646 RHSA-2020:3996 RHSA-2020:4479 SMASH Issue 249766 SUSE:openSUSE-SU-2020:0681 SUSE:openSUSE-SU-2020:0781 UBUNTU:CVE-2019-19956 USN-4274-1 bnc#1159928 rh#1788856 rh#1799734 rh#1799786 |
CVE-2019-19959 | sqlite3:Released | moderate | 5.4 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L) | CVE-2019-19959 MISC:github.com:CVE-2019-19959 RH:CVE-2019-19959 RHSA-2020:1810 SMASH Issue 250347 UBUNTU:CVE-2019-19959 bnc#1160438 rh#1789595 |
CVE-2019-19965 | kernel-source-rt:Already fixed | moderate | 4.2 (CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-19966 CVE-2019-19965 MISC:bugs.launchpad.net:CONFIRM:N/A MISC:git.kernel.org:CVE-2019-19965 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2020/04/06/2 OSS:2020/04/30/5 OSS:2020/06/04/4 RH:CVE-2019-19965 SMASH Issue 249775 SMASH Issue 249937 SUSE:openSUSE-SU-2020:0336 UBUNTU:CVE-2019-19965 USN-4284-1 USN-4285-1 USN-4286-1 USN-4286-2 USN-4287-1 USN-4287-2 bnc#1159911 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1667782 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1794404 rh#1795624 rh#1831726 rh#1831849 rh#1832860 rh#1839634 rh#1842525 rh#1851480 rh#1997467 |
CVE-2019-20054 | kernel-source-rt:Not affected | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-19966 CVE-2019-20054 MISC:bugs.launchpad.net:CONFIRM:N/A MISC:cdn.kernel.org:CVE-2019-15921 MISC:cdn.kernel.org:CVE-2019-15924 MISC:git.kernel.org:CVE-2019-20054 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2020/04/06/2 OSS:2020/04/30/5 OSS:2020/06/04/4 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-20054 RHSA-2020:1493 RHSA-2020:4060 RHSA-2020:4062 RHSA-2020:4431 RHSA-2020:4609 SMASH Issue 249908 SUSE:openSUSE-SU-2020:0336 UBUNTU:CVE-2019-20054 bnc#1159910 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1667782 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1790063 rh#1795624 rh#1831726 rh#1831849 rh#1832860 rh#1839634 rh#1842525 rh#1851480 rh#1997467 |
CVE-2019-20096 | kernel-source-rt:Not affected | moderate | 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | CVE-2019-20096 MISC:bugs.launchpad.net:CONFIRM:N/A MISC:cdn.kernel.org:CVE-2019-19227 MISC:git.kernel.org:CVE-2019-20096 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:packetstormsecurity.com:CVE-2019-14615 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2020/04/06/2 OSS:2020/04/30/5 OSS:2020/06/04/4 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 RH:CVE-2019-20096 SMASH Issue 249933 SMASH Issue 249936 SUSE:openSUSE-SU-2020:0336 UBUNTU:CVE-2019-20096 USN-4285-1 USN-4286-1 USN-4286-2 USN-4287-1 USN-4287-2 bnc#1159908 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1667782 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1791959 rh#1795624 rh#1831726 rh#1831849 rh#1832860 rh#1839634 rh#1842525 rh#1851480 rh#1997467 |
CVE-2019-20218 | sqlite3:Released | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2019-20218 GLSA-202007-26 MISC:github.com:CVE-2019-20218 MISC:www.oracle.com:CVE-2019-2880 MLIST:[debian-lts-announce] 20200822 [SECURITY] [DLA 2340-1] sqlite3 security update MLIST:[debian-lts-announce] 20201210 [SECURITY] [DLA 2340-2] sqlite3 regression update RH:CVE-2019-20218 RHSA-2020:4442 SMASH Issue 250278 UBUNTU:CVE-2019-20218 USN-4298-1 bnc#1160439 rh#1791313 |
CVE-2019-20388 | libxml2:Released | low | 3.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:security.netapp.com:CVE-2019-20388 CVE-2019-20388 FEDORA:FEDORA-2020-0c71c00af4 FEDORA:FEDORA-2020-41fe1680f6 FEDORA:FEDORA-2020-7694e8be73 GLSA-202010-04 MISC:gitlab.gnome.org:CVE-2019-20388 MISC:www.oracle.com:CVE-2015-7501 MISC:www.oracle.com:CVE-2021-35666 MISC:www.oracle.com:CVE-2022-21498 MISC:www.oracle.com:CVE-2022-21586 MLIST:[debian-lts-announce] 20200909 [SECURITY] [DLA 2369-1] libxml2 security update Oracle:CVE-2020-7595 RH:CVE-2019-20388 RHSA-2020:2644 RHSA-2020:2646 RHSA-2020:3996 RHSA-2020:4479 SMASH Issue 251484 SUSE:openSUSE-SU-2020:0681 UBUNTU:CVE-2019-20388 bnc#1161521 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/ rh#1788856 rh#1799734 rh#1799786 |
CVE-2019-2054 | kernel-source-rt:Not affected | important | 8.4 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:source.android.com:CVE-2018-6243 CVE-2019-2054 D:CVE-2019-2054 MISC:packetstormsecurity.com:CVE-2019-0136 MISC:packetstormsecurity.com:CVE-2019-2054 RH:CVE-2019-2054 SMASH Issue 232414 UBUNTU:CVE-2019-2054 USN-4076-1 USN-4095-2 bnc#1134561 bnc#1181039 rh#1709898 |
CVE-2019-20636 | kernel-source-rt:Already fixed | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2019-20636 CVE-2019-20636 MISC:bugs.launchpad.net:CONFIRM:N/A MISC:cdn.kernel.org:CVE-2019-20636 MISC:git.kernel.org:CVE-2019-20636 MISC:github.com:CVE-2019-20636 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2020/04/06/2 OSS:2020/04/30/5 OSS:2020/06/04/4 RH:CVE-2019-20636 RHSA-2020:2854 RHSA-2020:4060 RHSA-2020:4062 RHSA-2020:4431 RHSA-2020:4609 RHSA-2020:5430 RHSA-2020:5656 RHSA-2021:0019 SMASH Issue 256077 SMASH Issue 256757 UBUNTU:CVE-2019-20636 bnc#1168075 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1667782 rh#1707796 rh#1773519 rh#1774983 rh#1783498 rh#1795624 rh#1824059 rh#1831726 rh#1831849 rh#1832860 rh#1839634 rh#1842525 rh#1851480 |
CVE-2019-20794 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:github.com:CVE-2019-20794 CONFIRM:security.netapp.com:CVE-2019-11599 CONFIRM:sourceforge.net:CVE-2019-20794 CVE-2019-20794 MLIST:[oss-security] 20200824 CVE-2019-20794 kernel: task processes not being properly ended could lead to resource exhaustion OSS:2020/Q3/131 RH:CVE-2019-20794 SMASH Issue 259355 UBUNTU:CVE-2019-20794 bnc#1171737 rh#1849005 |
CVE-2019-20806 | kernel-source-rt:Not affected | low | 2.9 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) | CONFIRM:security.netapp.com:CVE-2019-20806 CVE-2019-20806 DSA-4698 MISC:cdn.kernel.org:CVE-2020-7053 MISC:git.kernel.org:CVE-2019-20806 MISC:github.com:CVE-2019-20806 MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update OSS:2020/04/30/5 OSS:2020/06/04/4 RH:CVE-2019-20806 SMASH Issue 260141 SUSE:openSUSE-SU-2020:0801 UBUNTU:CVE-2019-20806 bdo#952660 bnc#1172199 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1831726 rh#1831849 rh#1832860 rh#1839634 rh#1842525 rh#1842547 |
CVE-2019-20807 | vim:Released | moderate | 6.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L) | CONFIRM:support.apple.com:CVE-2019-14899 CVE-2019-20807 D:CVE-2019-20807 FULLDISC:20200717 APPLE-SA-2020-07-15-2 macOS Catalina 10.15.6, Security Update 2020-004 Mojave, Security Update 2020-004 High Sierra MISC:github.com:CVE-2019-20807 MISC:www.starwindsoftware.com:CVE-2019-20807 MLIST:[debian-lts-announce] 20220110 [SECURITY] [DLA 2876-1] vim security update RH:CVE-2019-20807 RHSA-2020:4453 SMASH Issue 260198 SMASH Issue 260199 SUSE:openSUSE-SU-2020:0794 UBUNTU:CVE-2019-20807 USN-4582-1 bnc#1172225 rh#1842658 |
CVE-2019-20810 | kernel-source-rt:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CONFIRM:cdn.kernel.org:CVE-2020-12768 CVE-2019-20810 L3:64868 MISC:bugs.launchpad.net:CONFIRM:N/A MISC:git.kernel.org:CVE-2019-20810 MLIST:[debian-lts-announce] 20200812 [SECURITY] [DLA 2323-1] linux-4.19 new package OSS:2020/04/06/2 OSS:2020/04/30/5 OSS:2020/06/04/4 OSS:2020/06/18/1 OSS:2020/07/28/2 RH:CVE-2019-20810 SMASH Issue 260495 SUSE:openSUSE-SU-2020:0935 SUSE:openSUSE-SU-2020:1153 UBUNTU:CVE-2019-20810 USN-4427-1 USN-4439-1 USN-4440-1 USN-4483-1 USN-4485-1 bnc#1172458 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1708775 rh#1774983 rh#1795624 rh#1831726 rh#1831849 rh#1832397 rh#1832860 rh#1839634 rh#1842525 rh#1847832 rh#1849926 rh#1850249 rh#1865751 |
CVE-2019-20811 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N) | CVE-2019-20811 DSA-4698 MISC:cdn.kernel.org:CVE-2019-15921 MISC:git.kernel.org:CVE-2019-20811 MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update RH:CVE-2019-20811 RHSA-2019:3517 RHSA-2020:5023 RHSA-2020:5026 SMASH Issue 260496 UBUNTU:CVE-2019-20811 USN-4527-1 bdo#952660 bnc#1172456 rh#1846439 |
CVE-2019-20812 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2019-20812 L3:64868 MISC:bugs.launchpad.net:CONFIRM:N/A MISC:cdn.kernel.org:CVE-2019-20812 MISC:git.kernel.org:CVE-2019-20812 MISC:www.oracle.com:CVE-2021-3450 OSS:2020/04/06/2 OSS:2020/04/30/5 OSS:2020/06/04/4 OSS:2020/06/18/1 RH:CVE-2019-20812 RHSA-2020:4431 SMASH Issue 260497 SUSE:openSUSE-SU-2020:0801 SUSE:openSUSE-SU-2020:0935 UBUNTU:CVE-2019-20812 bnc#1172453 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1774983 rh#1795624 rh#1831726 rh#1831849 rh#1832397 rh#1832860 rh#1839634 rh#1842525 rh#1846462 rh#1847832 rh#1849926 |
CVE-2019-20838 | pcre:Released | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:support.apple.com:CVE-2019-14899 CONFIRM:support.apple.com:CVE-2019-20838 CONFIRM:www.pcre.org:CVE-2015-2325 CVE-2019-20838 FULLDISC:20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1 FULLDISC:20210201 APPLE-SA-2021-02-01-1 macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave MISC:bugs.gentoo.org:CVE-2019-20838 MISC:lists.apache.org:/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E MLIST:[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar RH:CVE-2019-20838 RHSA-2021:4373 RHSA-2021:4613 RHSA-2021:4614 SMASH Issue 261517 UBUNTU:CVE-2019-20838 bnc#1172973 jsc#CAR-641 rh#1848444 |
CVE-2019-20907 | python3:Released | moderate | 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | CONFIRM:bugs.python.org:CVE-2019-20907 CONFIRM:github.com:CVE-2019-20907 CONFIRM:security.netapp.com:CVE-2019-20907 CVE-2019-20907 FEDORA:FEDORA-2020-1ddd5273d6 FEDORA:FEDORA-2020-826b24c329 FEDORA:FEDORA-2020-87c0a0a52d FEDORA:FEDORA-2020-97d775e649 FEDORA:FEDORA-2020-982b2950db FEDORA:FEDORA-2020-aab24d3714 FEDORA:FEDORA-2020-bb919e575e FEDORA:FEDORA-2020-c3b07cc5c9 FEDORA:FEDORA-2020-c539babb0a FEDORA:FEDORA-2020-d30881c970 FEDORA:FEDORA-2020-d808fdd597 FEDORA:FEDORA-2020-dfb11916cc FEDORA:FEDORA-2020-e9251de272 FEDORA:FEDORA-2020-efb908b6a8 GLSA-202008-01 MISC:www.oracle.com:CVE-2012-2098 MLIST:[debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update MLIST:[debian-lts-announce] 20201119 [SECURITY] [DLA 2456-1] python3.5 security update RH:CVE-2019-20907 RHSA-2020:4273 RHSA-2020:4285 RHSA-2020:4299 RHSA-2020:4433 RHSA-2020:4641 RHSA-2020:4654 RHSA-2020:5009 RHSA-2020:5010 RHSA-2021:0528 RHSA-2021:0761 RHSA-2021:0881 SMASH Issue 263148 SUSE:openSUSE-SU-2020:1254 SUSE:openSUSE-SU-2020:1257 SUSE:openSUSE-SU-2020:1258 SUSE:openSUSE-SU-2020:1265 UBUNTU:CVE-2019-20907 USN-4428-1 bnc#1174091 https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html rh#1856481 |
CVE-2019-20908 | kernel-source-rt:Already fixed | important | 7.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N) | CVE-2019-20908 MISC:cdn.kernel.org:CVE-2019-20908 MISC:cve.mitre.org:MLIST:[oss-security] 20200730 Re: UEFI SecureBoot bypass fixes rolled out to kernels below radar MISC:git.kernel.org:CVE-2019-20908 MISC:git.zx2c4.com:CVE-2019-20908 MISC:mailarchives.bentasker.co.uk:CVE-2019-20908 MISC:www.openwall.com:MLIST:[oss-security] 20200730 Re: UEFI SecureBoot bypass fixes rolled out to kernels below radar MLIST:[oss-security] 20200720 Re: Re: lockdown bypass on ubuntu 18.04's 4.15 kernel for loading unsigned modules MLIST:[oss-security] 20200729 multiple secure boot grub2 and linux kernel vulnerabilities MLIST:[oss-security] 20200730 Re: UEFI SecureBoot bypass fixes rolled out to kernels below radar MLIST:[oss-security] 20200730 UEFI SecureBoot bypass fixes rolled out to kernels below radar OSS:2020/06/18/1 OSS:2020/07/28/2 OSS:2020/Q3/41 OSS:2020/Q3/65 OSS:2020/Q3/67 RH:CVE-2019-20908 RHSA-2020:3218 RHSA-2020:3219 RHSA-2020:3222 RHSA-2020:3228 SMASH Issue 262662 SMASH Issue 263806 SUSE:openSUSE-SU-2020:1153 UBUNTU:CVE-2019-20908 USN-4426-1 USN-4427-1 USN-4439-1 USN-4440-1 bnc#1173567 bnc#1174187 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1708775 rh#1832397 rh#1847832 rh#1849926 rh#1852942 rh#1857859 rh#1865751 |
CVE-2019-20916 | python-setuptools:Released, python3:Released | moderate | 6.8 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N) | CVE-2019-20916 MISC:github.com:CVE-2019-20916 MISC:www.oracle.com:CVE-2022-21498 MISC:www.oracle.com:CVE-2022-21586 MLIST:[debian-lts-announce] 20200911 [SECURITY] [DLA 2370-1] python-pip security update Oracle:CVE-2019-20916 RH:CVE-2019-20916 RHSA-2020:4273 RHSA-2020:4285 RHSA-2020:4432 RHSA-2020:4654 RHSA-2022:5234 SMASH Issue 266797 SUSE:openSUSE-SU-2020:1598 SUSE:openSUSE-SU-2020:1613 UBUNTU:CVE-2019-20916 bnc#1176262 jsc#CAR-1484 rh#1868135 |
CVE-2019-20934 | kernel-source-rt:Already fixed | important | 7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2019-20934 MISC:cdn.kernel.org:CVE-2019-15211 MISC:git.kernel.org:CVE-2019-20934 RH:CVE-2019-20934 RHSA-2021:2725 RHSA-2021:2726 RHSA-2021:3987 SMASH Issue 272432 bnc#1179663 bnc#1179666 pz#1913 rh#1902788 |
CVE-2019-25013 | glibc:Released | moderate | 5.3 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-25013 CVE-2019-25013 FEDORA:FEDORA-2021-6e581c051a FEDORA:FEDORA-2021-6feb090c97 GLSA-202107-07 L3:67771 MISC:lists.apache.org:/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E MISC:sourceware.org:CVE-2019-25013 MISC:www.oracle.com:CVE-2022-21498 MLIST:[debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update MLIST:[kafka-dev] 20210420 [jira] [Created] (KAFKA-12698) CVE-2019-25013 vulnerability reported in Kafka MLIST:[kafka-jira] 20210420 [jira] [Created] (KAFKA-12698) CVE-2019-25013 vulnerability reported in Kafka MLIST:[kafka-jira] 20210423 [jira] [Comment Edited] (KAFKA-12698) CVE-2019-25013 high priority vulnerability reported in Kafka MLIST:[kafka-jira] 20210423 [jira] [Commented] (KAFKA-12698) CVE-2019-25013 high priority vulnerability reported in Kafka MLIST:[kafka-jira] 20210423 [jira] [Updated] (KAFKA-12698) CVE-2019-25013 high priority vulnerability reported in Kafka MLIST:[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar MLIST:[zookeeper-dev] 20210423 [jira] [Created] (ZOOKEEPER-4285) High CVE-2019-25013 reported by Clair scanner for Zookeeper 3.6.1 MLIST:[zookeeper-issues] 20210423 [jira] [Created] (ZOOKEEPER-4285) High CVE-2019-25013 reported by Clair scanner for Zookeeper 3.6.1 MLIST:[zookeeper-issues] 20210506 [jira] [Resolved] (ZOOKEEPER-4285) High CVE-2019-25013 reported by Clair scanner for Zookeeper 3.6.1 RH:CVE-2019-25013 RHSA-2021:0348 RHSA-2021:1585 SMASH Issue 274507 bnc#1182117 https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f%40%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7%40%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2%40%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9%40%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff%40%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece%40%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc%40%3Cdev.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c%40%3Cissues.zookeeper.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=ee7a3144c9922808181009b7b3e50e852fb4999b rh#1912960 |
CVE-2019-25044 | kernel-source-rt:Not affected | important | 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2019-25044 CVE-2019-25044 MISC:cdn.kernel.org:CVE-2020-7053 MISC:git.kernel.org:CVE-2019-25044 MISC:sites.google.com:CVE-2019-25044 MISC:syzkaller.appspot.com:CVE-2019-25044 SMASH Issue 284323 bnc#1186175 bnc#1186176 jsc#CAR-612 rh#1961292 |
CVE-2019-25045 | kernel-source-rt:Not affected | important | 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2019-25045 CVE-2019-25045 MISC:cdn.kernel.org:CVE-2019-15666 MISC:git.kernel.org:CVE-2019-25045 MISC:sites.google.com:CVE-2019-25045 MISC:syzkaller.appspot.com:CVE-2019-25045 SMASH Issue 301365 bnc#1187049 rh#1969541 |
CVE-2019-25160 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2019-25160 SMASH Issue 395204 bnc#1220394 https://git.kernel.org/stable/c/1c973f9c7cc2b3caae93192fdc8ecb3f0b4ac000 https://git.kernel.org/stable/c/5578de4834fe0f2a34fedc7374be691443396d1f https://git.kernel.org/stable/c/97bc3683c24999ee621d847c9348c75d2fe86272 https://git.kernel.org/stable/c/c61d01faa5550e06794dcf86125ccd325bfad950 https://git.kernel.org/stable/c/dc18101f95fa6e815f426316b8b9a5cee28a334e https://git.kernel.org/stable/c/e3713abc4248aa6bcc11173d754c418b02a62cbb https://git.kernel.org/stable/c/fbf9578919d6c91100ec63acf2cba641383f6c78 https://git.kernel.org/stable/c/fcfe700acdc1c72eab231300e82b962bac2b2b2c rh#2266290 |
CVE-2019-2708 | libdb-4_8:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2019-2708 MISC:www.oracle.com:CVE-2018-2880 Oracle:CVE-2019-2708 RH:CVE-2019-2708 RHSA-2021:1675 SMASH Issue 229896 bnc#1174414 rh#1853242 |
CVE-2019-3459 | kernel-source-rt:Not affected | moderate | 2.6 (CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:bugzilla.novell.com:CVE-2019-3459 CONFIRM:git.kernel.org:CVE-2019-3459 CONFIRM:git.kernel.org:CVE-2019-3460 CONFIRM:people.canonical.com:CVE-2019-3459 CONFIRM:people.canonical.com:CVE-2019-3460 CVE-2019-3459 CVE-2019-3460 MISC:access.redhat.com:CVE-2019-3459 MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q2/225 MISC:www.openwall.com:MLIST:[oss-security] 20190811 Re: linux-distros membership application - Microsoft MLIST:[debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update MLIST:[debian-lts-announce] 20190528 [SECURITY] [DLA 1799-1] linux security update MLIST:[debian-lts-announce] 20190528 [SECURITY] [DLA 1799-2] linux security update MLIST:[linux-bluetooth] 20190110 [PATCH 1/2] Bluetooth: check message types in l2cap_get_conf_opt MLIST:[linux-bluetooth] 20190110 [PATCH 2/2] Bluetooth: check the buffer size for some messages before parsing MLIST:[oss-security] 20190111 Linux kernel: Bluetooth: two remote infoleaks (CVE-2019-3459, CVE-2019-3460) MLIST:[oss-security] 20190627 Re: linux-distros membership application - Microsoft MLIST:[oss-security] 20190628 Re: linux-distros membership application - Microsoft MLIST:[oss-security] 20190811 Re: linux-distros membership application - Microsoft OSS:2019/Q2/225 Oracle:CVE-2017-5753 Oracle:CVE-2018-5390 RH:CVE-2019-3459 RH:CVE-2019-3460 RHSA-2019:2029 RHSA-2019:2043 RHSA-2019:3309 RHSA-2019:3517 RHSA-2020:0740 SMASH Issue 222041 UBUNTU:CVE-2019-3459 UBUNTU:CVE-2019-3460 bnc#1120758 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1575472 rh#1601704 rh#1609664 rh#1660375 rh#1660385 rh#1663176 rh#1663179 rh#1667782 rh#1686136 rh#1701224 rh#1701842 rh#1707796 rh#1718176 |
CVE-2019-3460 | kernel-source-rt:Not affected | moderate | 2.6 (CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:bugzilla.novell.com:CVE-2019-3459 CONFIRM:git.kernel.org:CVE-2019-3459 CONFIRM:git.kernel.org:CVE-2019-3460 CONFIRM:people.canonical.com:CVE-2019-3459 CONFIRM:people.canonical.com:CVE-2019-3460 CVE-2019-3459 CVE-2019-3460 MISC:access.redhat.com:CVE-2019-3459 MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q2/225 MISC:www.openwall.com:MLIST:[oss-security] 20190811 Re: linux-distros membership application - Microsoft MLIST:[debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update MLIST:[debian-lts-announce] 20190528 [SECURITY] [DLA 1799-1] linux security update MLIST:[debian-lts-announce] 20190528 [SECURITY] [DLA 1799-2] linux security update MLIST:[linux-bluetooth] 20190110 [PATCH 1/2] Bluetooth: check message types in l2cap_get_conf_opt MLIST:[linux-bluetooth] 20190110 [PATCH 2/2] Bluetooth: check the buffer size for some messages before parsing MLIST:[oss-security] 20190111 Linux kernel: Bluetooth: two remote infoleaks (CVE-2019-3459, CVE-2019-3460) MLIST:[oss-security] 20190627 Re: linux-distros membership application - Microsoft MLIST:[oss-security] 20190628 Re: linux-distros membership application - Microsoft MLIST:[oss-security] 20190811 Re: linux-distros membership application - Microsoft OSS:2019/Q2/225 Oracle:CVE-2017-5753 Oracle:CVE-2018-5390 RH:CVE-2019-3459 RH:CVE-2019-3460 RHSA-2019:2029 RHSA-2019:2043 RHSA-2019:3309 RHSA-2019:3517 RHSA-2020:0740 SMASH Issue 222041 UBUNTU:CVE-2019-3459 UBUNTU:CVE-2019-3460 bnc#1120758 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1575472 rh#1601704 rh#1609664 rh#1660375 rh#1660385 rh#1663176 rh#1663179 rh#1667782 rh#1686136 rh#1701224 rh#1701842 rh#1707796 rh#1718176 |
CVE-2019-3701 | kernel-source-rt:Already fixed | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2019-3701 MISC:bugs.launchpad.net:CONFIRM:N/A MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2020/04/06/2 OSS:2020/04/30/5 OSS:2020/06/04/4 RH:CVE-2019-3701 SMASH Issue 221922 UBUNTU:CVE-2019-3701 bnc#1120386 linux.git:commit:0aaa81377c5a01f686bcdb8c7a6929a7bf330c68 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1663729 rh#1667782 rh#1707796 rh#1773519 rh#1774983 rh#1783498 rh#1795624 rh#1831726 rh#1831849 rh#1832860 rh#1839634 rh#1842525 |
CVE-2019-3819 | kernel-source-rt:Not affected | moderate | 4.2 (CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H) | BID:106730 CONFIRM:bugzilla.redhat.com:CVE-2019-3819 CVE-2019-3819 MLIST:[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update MLIST:[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update MLIST:[debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update Oracle:CVE-2017-5753 RH:CVE-2019-3819 RHSA-2019:2029 RHSA-2019:2043 SMASH Issue 223750 SUSE:openSUSE-SU-2019:1193 UBUNTU:CVE-2019-3819 USN-3932-1 USN-3932-2 USN-4115-1 USN-4118-1 bnc#1123161 linux.git:commit:13054abbaa4f1fd4e6f3b4b63439ec033b4c8035 linux.git:commit:d47e3da1759230e394096fd742aad423c291ba48 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1609664 rh#1631036 rh#1660375 rh#1660385 rh#1667782 rh#1669187 rh#1686136 rh#1701224 rh#1701842 rh#1731000 rh#1734243 rh#1734246 rh#1757368 |
CVE-2019-3843 | systemd:Already fixed | moderate | 4.5 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L) | BID:108116 CONFIRM:bugzilla.redhat.com:CVE-2019-3843 CONFIRM:security.netapp.com:CVE-2019-3843 CVE-2019-3843 FEDORA:FEDORA-2019-7322053e74 MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 MLIST:[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 RH:CVE-2019-3843 RHSA-2020:1794 SMASH Issue 230356 UBUNTU:CVE-2019-3843 USN-4269-1 bnc#1133506 pz#1771 rh#1668521 rh#1684607 |
CVE-2019-3844 | systemd:Already fixed | moderate | 4.5 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L) | BID:108096 CONFIRM:bugzilla.redhat.com:CVE-2019-3844 CONFIRM:security.netapp.com:CVE-2019-3843 CVE-2019-3844 MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 MLIST:[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 RH:CVE-2019-3844 RHSA-2020:1794 SMASH Issue 230355 UBUNTU:CVE-2019-3844 USN-4269-1 bnc#1133509 rh#1668521 rh#1684610 |
CVE-2019-3882 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | BUGTRAQ:20190813 [SECURITY] [DSA 4497-1] linux security update CONFIRM:bugzilla.redhat.com:CVE-2019-3882 CONFIRM:security.netapp.com:CVE-2019-11486 CVE-2019-3882 D:CVE-2019-3882 DSA-4497 MLIST:[debian-lts-announce] 20190528 [SECURITY] [DLA 1799-1] linux security update MLIST:[debian-lts-announce] 20190528 [SECURITY] [DLA 1799-2] linux security update MLIST:[debian-lts-announce] 20190814 [SECURITY] [DLA 1885-1] linux-4.9 security update Oracle:CVE-2017-5753 Oracle:CVE-2019-11477 Oracle:CVE-2019-5489 RH:CVE-2019-3882 RHSA-2019:2029 RHSA-2019:2043 RHSA-2019:3309 RHSA-2019:3517 SMASH Issue 228701 SMASH Issue 228702 SUSE:openSUSE-SU-2019:1404 SUSE:openSUSE-SU-2019:1407 SUSE:openSUSE-SU-2019:1479 UBUNTU:CVE-2019-3882 USN-3979-1 USN-3980-1 USN-3980-2 USN-3981-1 USN-3981-2 USN-3982-1 USN-3982-2 bnc#1131427 linux.git:commit:3e28fb0fcb69dbedfe254939143198b46d83bfa1 linux.git:commit:492855939bdb59c6f947b0b5b44af9ad82b7e38c linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1575472 rh#1575866 rh#1609664 rh#1655162 rh#1660375 rh#1660385 rh#1664110 rh#1667782 rh#1686136 rh#1689426 rh#1701224 rh#1701842 rh#1703063 rh#1707796 rh#1710405 rh#1715494 rh#1715554 rh#1716328 rh#1718176 rh#1727756 rh#1729933 rh#1731000 rh#1734243 rh#1734246 rh#1890354 |
CVE-2019-5010 | python3:Released | important | 7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2019-5010 D:CVE-2013-2882 D:CVE-2015-3194 GLSA-202003-26 MISC:github.com:MLIST:[oss-security] 20190819 [ANNOUNCE] Security release of Kubernetes v1.15.3, v1.14.6, v1.13.10 - CVE-2019-9512 and CVE-2019-9514 MISC:github.com:OSS:2023/10/18/8 MISC:rustsec.org:OSS:2023/10/18/8 MISC:talosintelligence.com:CVE-2019-5010 MLIST:[bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image MLIST:[debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update MLIST:[debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update OSS:2023/10/18/8 Oracle:CVE-2016-2183 Oracle:CVE-2016-6304 Oracle:CVE-2017-3736 Oracle:CVE-2018-0732 Oracle:CVE-2018-20852 Oracle:CVE-2019-15903 Oracle:CVE-2019-16056 Oracle:CVE-2019-9511 Oracle:CVE-2019-9517 Oracle:CVE-2019-9636 Oracle:CVE-2021-22884 RH:CVE-2019-5010 RHBA-2020:0547 RHSA-2019:2030 RHSA-2019:3520 RHSA-2019:3725 SMASH Issue 222820 SUSE:openSUSE-SU-2020:0086 UBUNTU:CVE-2019-5010 bnc#1122191 https://github.com/advisories/GHSA-xpw8-rcwv-8f8p https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61 https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/ https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487 rh#1103586 rh#1369383 rh#1666519 rh#1752592 rh#1932024 rh#2161287 rh#750555 |
CVE-2019-5108 | kernel-source-rt:Not affected | important | 7.4 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-19966 CVE-2019-5108 DSA-4698 L3:57698 L3:57724 MISC:git.kernel.org:CVE-2019-5108 MISC:packetstormsecurity.com:CVE-2019-14615 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MISC:talosintelligence.com:CVE-2019-5108 MISC:www.oracle.com:CVE-2021-3450 MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 RH:CVE-2019-5108 RHBA-2020:3527 RHSA-2020:1016 RHSA-2020:1493 RHSA-2020:1567 RHSA-2020:1769 SMASH Issue 249683 UBUNTU:CVE-2019-5108 USN-4285-1 USN-4286-1 USN-4286-2 USN-4287-1 USN-4287-2 bdo#952660 bnc#1159912 bnc#1159913 bnc#1173340 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1667782 rh#1708775 rh#1773519 rh#1783498 rh#1789927 rh#1831849 rh#1832860 rh#1849926 |
CVE-2019-5489 | kernel-source-rt:Already fixed | moderate | 5.6 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N) | BID:106478 BUGTRAQ:20190618 [SECURITY] [DSA 4465-1] linux security update CONFIRM:security.netapp.com:CVE-2019-5489 CONFIRM:www.huawei.com:CVE-2019-5489 CVE-2019-5489 D:CVE-2019-5489 DSA-4465 MISC:arxiv.org:CVE-2019-5489 MISC:bugs.chromium.org:MISC:www.openwall.com:CVE-2019-11190 MISC:git.kernel.org:CVE-2019-5489 MISC:github.com:CVE-2019-5489 MISC:www.oracle.com:CVE-2015-7501 MISC:www.theregister.co.uk:CVE-2019-5489 MLIST:[debian-lts-announce] 20190617 [SECURITY] [DLA 1823-1] linux security update MLIST:[debian-lts-announce] 20190618 [SECURITY] [DLA 1824-1] linux-4.9 security update OSS:2019/04/03/4 OSS:2019/Q1/28 Oracle:CVE-2017-5753 Oracle:CVE-2019-11477 Oracle:CVE-2019-5489 RH:CVE-2019-5489 RHSA-2019:2029 RHSA-2019:2043 RHSA-2019:2473 RHSA-2019:2808 RHSA-2019:2809 RHSA-2019:2837 RHSA-2019:3309 RHSA-2019:3517 RHSA-2019:3967 RHSA-2019:4056 RHSA-2019:4057 RHSA-2019:4058 RHSA-2019:4159 RHSA-2019:4164 RHSA-2019:4255 RHSA-2020:0204 SMASH Issue 222259 SMASH Issue 222272 SUSE:openSUSE-SU-2019:1479 SUSE:openSUSE-SU-2019:1570 SUSE:openSUSE-SU-2019:1579 UBUNTU:CVE-2019-5489 bdo#928989 bnc#1120843 bnc#1120885 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1205079 rh#1655162 rh#1664110 rh#1667782 rh#1699856 rh#1701224 rh#1701842 rh#1703063 rh#1707796 rh#1710405 rh#1715494 rh#1715554 rh#1716328 rh#1718176 rh#1727756 rh#1729933 rh#1731000 rh#1734243 rh#1734246 |
CVE-2019-5747 | busybox:Released | low | 3.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N) | BUGTRAQ:20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X CVE-2019-5747 D:CVE-2019-5747 FULLDISC:20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X MISC:bugs.busybox.net:CVE-2018-20679 MISC:git.busybox.net:CVE-2019-5747 MISC:packetstormsecurity.com:CVE-2015-9261 RH:CVE-2019-5747 SMASH Issue 222536 UBUNTU:CVE-2019-5747 USN-3935-1 bnc#1121428 rh#1667067 |
CVE-2019-5805 | libxslt:Ignore | important | () | BUGTRAQ:20190813 [SECURITY] [DSA 4500-1] chromium security update CVE-2019-5805 CVE-2019-5815 D:CVE-2019-5797 DSA-4500 FEDORA:FEDORA-2019-8fb8240d14 FEDORA:FEDORA-2019-a1af621faf GLSA-201908-18 MISC:bugs.chromium.org:CVE-2019-5815 MISC:chromereleases.googleblog.com:CVE-2019-5805 MISC:crbug.com:CVE-2019-5805 MISC:gitlab.gnome.org:CVE-2019-5815 MLIST:[debian-lts-announce] 20220909 [SECURITY] [DLA 3101-1] libxslt security update RH:CVE-2019-5805 RH:CVE-2019-5815 RHSA-2019:1021 SMASH Issue 230193 SMASH Issue 230205 SUSE:openSUSE-SU-2019:1666 UBUNTU:CVE-2019-5805 UBUNTU:CVE-2019-5815 bnc#1133313 rh#1702895 rh#1702905 rh#1706805 |
CVE-2019-5815 | libxslt:Ignore | important | () | BUGTRAQ:20190813 [SECURITY] [DSA 4500-1] chromium security update CVE-2019-5805 CVE-2019-5815 D:CVE-2019-5797 DSA-4500 FEDORA:FEDORA-2019-8fb8240d14 FEDORA:FEDORA-2019-a1af621faf GLSA-201908-18 MISC:bugs.chromium.org:CVE-2019-5815 MISC:chromereleases.googleblog.com:CVE-2019-5805 MISC:crbug.com:CVE-2019-5805 MISC:gitlab.gnome.org:CVE-2019-5815 MLIST:[debian-lts-announce] 20220909 [SECURITY] [DLA 3101-1] libxslt security update RH:CVE-2019-5805 RH:CVE-2019-5815 RHSA-2019:1021 SMASH Issue 230196 SMASH Issue 230205 SUSE:openSUSE-SU-2019:1666 UBUNTU:CVE-2019-5805 UBUNTU:CVE-2019-5815 bnc#1133313 rh#1702895 rh#1702905 rh#1706805 |
CVE-2019-6285 | yaml-cpp:Released | moderate | 5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | CVE-2019-6285 D:CVE-2019-6285 MISC:github.com:CVE-2019-6285 RH:CVE-2019-6285 SMASH Issue 222773 UBUNTU:CVE-2019-6285 bnc#1122004 jsc#CAR-1658 rh#1668104 |
CVE-2019-6292 | yaml-cpp:Released | moderate | 5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | CVE-2019-6292 D:CVE-2019-6292 MISC:github.com:CVE-2019-6292 RH:CVE-2019-6292 SMASH Issue 222778 UBUNTU:CVE-2019-6292 bnc#1122021 jsc#CAR-1657 rh#1668108 |
CVE-2019-6974 | kernel-source-rt:Already fixed | important | 7.8 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H) | BID:107127 CONFIRM:support.f5.com:CVE-2019-6974 CVE-2019-6974 EXPLOIT-DB:46388 MISC:cdn.kernel.org:CVE-2019-6974 MISC:git.kernel.org:CVE-2019-6974 MLIST:[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update MLIST:[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update MLIST:[debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update Oracle:CVE-2017-5753 RH:CVE-2019-6974 RHBA-2019:0959 RHSA-2019:0818 RHSA-2019:0833 RHSA-2019:2809 RHSA-2019:3967 RHSA-2020:0103 SMASH Issue 224390 UBUNTU:CVE-2019-6974 USN-3930-1 USN-3930-2 USN-3931-1 USN-3931-2 USN-3932-1 USN-3932-2 USN-3933-1 USN-3933-2 bnc#1124728 linux.git:commit:6fb845f0e78de19eaaf6a2d351702474e44b6a9e linux.git:commit:cfa39381173d5f969daf43582c95ad679189cbc9 linux.git:commit:e303a067ceede918fbf90ff3dc8affbb98bad4e8 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 pz#1765 rh#1575472 rh#1609664 rh#1660375 rh#1660385 rh#1667782 rh#1671913 rh#1686136 rh#1701224 rh#1701842 |
CVE-2019-7222 | kernel-source-rt:Already fixed | low | 2.8 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N) | BID:106963 CONFIRM:security.netapp.com:CVE-2018-19985 CVE-2019-7222 FEDORA:FEDORA-2019-164946aa7f FEDORA:FEDORA-2019-3da64f3e61 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-7221 MISC:github.com:CVE-2019-7221 MISC:packetstormsecurity.com:CVE-2019-7222 MISC:www.openwall.com:CVE-2019-7221 MLIST:[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update MLIST:[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update MLIST:[debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update MLIST:[opensuse-security-announce] 20190218 [security-announce] openSUSE-SU-2019:0203-1: important: Security update for the Linux Kernel Oracle:CVE-2017-5753 RH:CVE-2019-7222 RHSA-2019:2029 RHSA-2019:2043 RHSA-2019:3309 RHSA-2019:3517 SMASH Issue 224391 SMASH Issue 224423 UBUNTU:CVE-2019-7222 USN-3930-1 USN-3930-2 USN-3931-1 USN-3931-2 USN-3932-1 USN-3932-2 USN-3933-1 USN-3933-2 bnc#1124735 linux.git:commit:353c0956a618a07ba4bbe7ad00ff29fe70e8412a linux.git:commit:6fb845f0e78de19eaaf6a2d351702474e44b6a9e linux.git:commit:e303a067ceede918fbf90ff3dc8affbb98bad4e8 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 pz#1759 pz#1760 pz#1765 rh#1575472 rh#1609664 rh#1660375 rh#1660385 rh#1667782 rh#1671930 rh#1686136 rh#1701224 rh#1701842 |
CVE-2019-7308 | kernel-source-rt:Not affected | important | 5.6 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N) | CVE-2019-7308 MISC:bugs.chromium.org:CVE-2019-7308 Oracle:CVE-2017-5753 RH:CVE-2019-7308 SMASH Issue 224076 UBUNTU:CVE-2019-7308 bnc#1124055 rh#1672355 rh#1686136 |
CVE-2019-8912 | kernel-source-rt:Already fixed | important | 7.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | BID:107063 CVE-2019-8912 L3:53779 MISC:bugzilla.redhat.com:CVE-2019-8912 MISC:patchwork.ozlabs.org:CVE-2019-8912 Oracle:CVE-2017-5753 RH:CVE-2019-8912 RHSA-2020:0174 SMASH Issue 224994 SUSE:openSUSE-SU-2019:1193 UBUNTU:CVE-2019-8912 USN-3930-1 USN-3930-2 USN-3931-1 USN-3931-2 bnc#1125907 bnc#1126284 rh#1678685 rh#1686136 |
CVE-2019-8956 | kernel-source-rt:Not affected | important | () | CONFIRM:support.f5.com:CVE-2019-8956 CVE-2019-8956 MISC:cdn.kernel.org:CVE-2019-6974 MISC:git.kernel.org:CVE-2019-8956 MISC:secuniaresearch.flexerasoftware.com:CVE-2019-8956 RH:CVE-2019-8956 SMASH Issue 224146 UBUNTU:CVE-2019-8956 USN-3930-1 USN-3930-2 bnc#1124136 rh#1679889 |
CVE-2019-8980 | kernel-source-rt:Already fixed | low | 3.3 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | BID:107120 CONFIRM:support.f5.com:CVE-2019-8980 CVE-2019-8980 MISC:www.mail-archive.com:CVE-2019-8980 MLIST:[debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update Oracle:CVE-2017-5753 RH:CVE-2019-8980 RHSA-2020:1567 RHSA-2020:1769 SMASH Issue 225117 SUSE:openSUSE-SU-2019:1193 UBUNTU:CVE-2019-8980 USN-3930-1 USN-3930-2 USN-3931-1 USN-3931-2 bnc#1126209 rh#1679972 rh#1686136 |
CVE-2019-9003 | kernel-source-rt:Already fixed | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | BID:107145 CONFIRM:security.netapp.com:CVE-2019-9003 CVE-2019-9003 MISC:cdn.kernel.org:CVE-2019-9003 MISC:git.kernel.org:CVE-2019-9003 MISC:github.com:CVE-2019-9003 Oracle:CVE-2017-5753 Oracle:CVE-2019-11477 Oracle:CVE-2019-5489 RH:CVE-2019-9003 RHSA-2019:1167 SMASH Issue 225261 SUSE:openSUSE-SU-2019:1404 UBUNTU:CVE-2019-9003 USN-3930-1 USN-3930-2 bnc#1126704 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1655162 rh#1664110 rh#1667782 rh#1681007 rh#1701224 rh#1701842 rh#1703063 rh#1707796 rh#1710405 rh#1715494 rh#1715554 rh#1716328 rh#1718176 rh#1727756 rh#1729933 rh#1731000 rh#1734243 rh#1734246 |
CVE-2019-9074 | binutils:Released | moderate | 6.2 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-9070 CONFIRM:support.f5.com:CVE-2019-9074 CVE-2019-9074 D:CVE-2019-9074 GLSA-202107-24 MISC:sourceware.org:CVE-2019-9074 RH:CVE-2019-9074 SMASH Issue 225329 SUSE:openSUSE-SU-2020:1790 SUSE:openSUSE-SU-2020:1804 UBUNTU:CVE-2019-9074 USN-4336-1 bnc#1126831 rh#1680665 |
CVE-2019-9075 | binutils:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:security.netapp.com:CVE-2019-9070 CONFIRM:support.f5.com:CVE-2019-9075 CVE-2019-9075 D:CVE-2019-9075 GLSA-202107-24 MISC:sourceware.org:CVE-2019-9075 RH:CVE-2019-9075 SMASH Issue 225330 SUSE:openSUSE-SU-2020:1790 SUSE:openSUSE-SU-2020:1804 UBUNTU:CVE-2019-9075 USN-4336-1 bnc#1126829 rh#1680669 |
CVE-2019-9077 | binutils:Released | moderate | 5.3 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) | BID:107139 CONFIRM:security.netapp.com:CVE-2019-9070 CONFIRM:support.f5.com:CVE-2019-9077 CVE-2019-9077 D:CVE-2019-9077 GLSA-202107-24 MISC:sourceware.org:CVE-2019-9077 RH:CVE-2019-9077 SMASH Issue 225332 SUSE:openSUSE-SU-2020:1790 SUSE:openSUSE-SU-2020:1804 UBUNTU:CVE-2019-9077 USN-4336-1 bnc#1126826 rh#1680675 |
CVE-2019-9162 | kernel-source-rt:Not affected | important | () | BID:107159 CONFIRM:security.netapp.com:CVE-2019-9003 CONFIRM:support.f5.com:CVE-2019-9162 CVE-2019-9162 EXPLOIT-DB:46477 MISC:cdn.kernel.org:CVE-2019-9162 MISC:git.kernel.org:CVE-2019-9162 MISC:github.com:CVE-2019-9162 RH:CVE-2019-9162 SMASH Issue 225411 UBUNTU:CVE-2019-9162 USN-3930-1 USN-3930-2 bnc#1127324 pz#1776 rh#1683191 |
CVE-2019-9192 | glibc:Ignore | low | 2.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:support.f5.com:CVE-2019-9192 CVE-2019-9192 MISC:sourceware.org:CVE-2019-9192 RH:CVE-2019-9192 SMASH Issue 231590 UBUNTU:CVE-2019-9192 bnc#1182116 https://support.f5.com/csp/article/K26346590?utm_source=f5support&%3Butm_medium=RSS rh#1684374 |
CVE-2019-9475 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2019-9475 MISC:source.android.com:CVE-2018-9425 SMASH Issue 301981 bnc#1189429 |
CVE-2019-9740 | python3:Already fixed | moderate | 5.4 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N) | BID:107466 BUGTRAQ:20191021 [slackware-security] python (SSA:2019-293-01) CONFIRM:security.netapp.com:CVE-2019-9740 CVE-2019-9740 D:CVE-2019-9740 FEDORA:FEDORA-2019-1ffd6b6064 FEDORA:FEDORA-2019-57462fa10d FEDORA:FEDORA-2019-7723d4774a FEDORA:FEDORA-2019-7df59302e0 FEDORA:FEDORA-2019-b06ec6159b FEDORA:FEDORA-2019-d202cda4f8 FEDORA:FEDORA-2019-ec26883852 GLSA-202003-26 MISC:bugs.python.org:CVE-2019-9740 MISC:github.com:MLIST:[oss-security] 20210204 [CVE-2020-15693, CVE-2020-15694] Nim - stdlib Httpclient - Header Crlf Injection & Server Response Validation MISC:nvd.nist.gov:MLIST:[oss-security] 20210204 [CVE-2020-15693, CVE-2020-15694] Nim - stdlib Httpclient - Header Crlf Injection & Server Response Validation MISC:packetstormsecurity.com:CVE-2019-9740 MISC:www.oracle.com:CVE-2022-21586 MLIST:[debian-lts-announce] 20190625 [SECURITY] [DLA 1834-1] python2.7 security update MLIST:[debian-lts-announce] 20190625 [SECURITY] [DLA 1835-1] python3.4 security update MLIST:[debian-lts-announce] 20190625 [SECURITY] [DLA 1835-2] python3.4 regression update MLIST:[debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update MLIST:[debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update MLIST:[oss-security] 20210204 [CVE-2020-15693, CVE-2020-15694] Nim - stdlib Httpclient - Header Crlf Injection & Server Response Validation OSS:2021/Q1/104 RH:CVE-2019-9740 RHBA-2020:0547 RHSA-2019:1260 RHSA-2019:2030 RHSA-2019:3335 RHSA-2019:3520 RHSA-2019:3725 RHSA-2020:1268 RHSA-2020:1346 RHSA-2020:1462 SMASH Issue 226038 SUSE:openSUSE-SU-2019:2131 SUSE:openSUSE-SU-2019:2133 UBUNTU:CVE-2019-9740 USN-4127-1 USN-4127-2 bnc#1129071 rh#1649153 rh#1688169 rh#1695572 rh#2244340 |
CVE-2020-0110 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:www.intel.com:CVE-2020-0110 CVE-2020-0110 MISC:source.android.com:CVE-2020-0024 RH:CVE-2020-0110 SMASH Issue 259198 UBUNTU:CVE-2020-0110 bnc#1171374 bnc#1174874 rh#1836936 |
CVE-2020-0305 | kernel-source-rt:Released | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2020-0305 MISC:source.android.com:CVE-2020-0124 OSS:2020/04/30/5 OSS:2020/06/18/1 OSS:2020/07/28/2 RH:CVE-2020-0305 RHSA-2020:4431 RHSA-2020:4609 SMASH Issue 263973 SUSE:openSUSE-SU-2020:1153 SUSE:openSUSE-SU-2020:1236 UBUNTU:CVE-2020-0305 bnc#1174462 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1708775 rh#1831849 rh#1832397 rh#1832860 rh#1839634 rh#1847832 rh#1849926 rh#1860065 rh#1865751 |
CVE-2020-0404 | kernel-source-rt:Released | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2020-0404 MISC:source.android.com:CVE-2020-0074 MISC:www.oracle.com:CVE-2022-21586 RH:CVE-2020-0404 RHSA-2022:1975 RHSA-2022:1988 SMASH Issue 266919 SUSE:openSUSE-SU-2020:1586 SUSE:openSUSE-SU-2020:1655 UBUNTU:CVE-2020-0404 bnc#1176423 rh#1919791 |
CVE-2020-0427 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2020-0427 MISC:packetstormsecurity.com:CVE-2020-0427 MISC:source.android.com:CVE-2020-0387 MISC:www.starwindsoftware.com:CVE-2020-0427 MLIST:[debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update RH:CVE-2020-0427 RHSA-2021:0856 RHSA-2021:0857 RHSA-2021:4140 RHSA-2021:4356 SMASH Issue 267625 SUSE:openSUSE-SU-2020:1586 SUSE:openSUSE-SU-2020:1655 UBUNTU:CVE-2020-0427 bnc#1176725 rh#1919893 |
CVE-2020-0431 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2020-0431 MISC:source.android.com:CVE-2020-0387 RH:CVE-2020-0431 RHSA-2021:1578 RHSA-2021:1739 SMASH Issue 267629 SUSE:openSUSE-SU-2020:1586 SUSE:openSUSE-SU-2020:1655 UBUNTU:CVE-2020-0431 bnc#1176722 bnc#1176896 rh#1919889 |
CVE-2020-0432 | kernel-source-rt:Released | important | 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2020-0432 MISC:source.android.com:CVE-2020-0387 RH:CVE-2020-0432 SMASH Issue 267630 SUSE:openSUSE-SU-2020:1586 SUSE:openSUSE-SU-2020:1655 UBUNTU:CVE-2020-0432 bnc#1176721 bnc#1177165 rh#1919906 |
CVE-2020-0444 | kernel-source-rt:Released | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2020-0444 MISC:source.android.com:CVE-2020-0016 RH:CVE-2020-0444 RHSA-2020:4431 RHSA-2021:0686 RHSA-2021:0689 RHSA-2021:0763 RHSA-2021:0765 RHSA-2021:0774 SMASH Issue 273331 bnc#1180027 bnc#1180028 rh#1920474 |
CVE-2020-0465 | kernel-source-rt:Released | important | 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2020-0465 MISC:source.android.com:CVE-2020-0016 RH:CVE-2020-0465 RHSA-2022:0620 RHSA-2022:0622 SMASH Issue 273340 bnc#1180029 bnc#1180030 rh#1920471 |
CVE-2020-0466 | kernel-source-rt:Released | important | 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2020-0466 MISC:source.android.com:CVE-2020-0016 RH:CVE-2020-0466 RHSA-2021:1081 RHSA-2021:1093 RHSA-2021:2099 RHSA-2021:2106 RHSA-2021:2167 RHSA-2021:2185 RHSA-2021:2190 RHSA-2022:0529 RHSA-2022:0531 RHSA-2022:0533 RHSA-2022:0592 RHSA-2022:0620 RHSA-2022:0622 RHSA-2022:0712 RHSA-2022:0718 RHSA-2022:1104 RHSA-2022:1417 SMASH Issue 273341 bnc#1180031 bnc#1180032 rh#1920480 |
CVE-2020-0543 | kernel-source-rt:Released | moderate | 6.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N) | CONFIRM:cert-portal.siemens.com:CVE-2020-0543 CONFIRM:kc.mcafee.com:CVE-2019-3738 CVE-2020-0543 FEDORA:FEDORA-2020-11ddbfbdf0 FEDORA:FEDORA-2020-1afbe7ba2d FEDORA:FEDORA-2020-3364913ace FEDORA:FEDORA-2020-e8835a5f8e L3:63823 MISC:bugs.launchpad.net:CONFIRM:N/A MISC:www.intel.com:OSS:2020/Q2/176 MISC:xenbits.xen.org:OSS:2019/Q4/67 MISC:xenbits.xen.org:OSS:2020/Q2/176 MLIST:[oss-security] 20200714 Flatcar membership on the linux-distros list OSS:2020/04/06/2 OSS:2020/04/30/5 OSS:2020/06/04/4 OSS:2020/Q2/176 OSS:2020/Q2/182 OSS:2020/Q3/26 RH:CVE-2020-0543 RHSA-2020:2431 RHSA-2020:2432 RHSA-2020:2433 RHSA-2020:2677 RHSA-2020:2679 RHSA-2020:2680 RHSA-2020:2706 RHSA-2020:2707 RHSA-2020:2757 RHSA-2020:2758 RHSA-2020:2771 RHSA-2020:2842 RHSA-2021:3027 RHSA-2021:3028 RHSA-2021:3029 RHSA-2021:3176 RHSA-2021:3255 RHSA-2021:3317 RHSA-2021:3322 RHSA-2021:3323 RHSA-2021:3364 SMASH Issue 245557 SMASH Issue 253043 SUSE:openSUSE-SU-2020:0818 SUSE:openSUSE-SU-2020:0965 SUSE:openSUSE-SU-2020:0985 UBUNTU:CVE-2020-0543 USN-4385-1 USN-4387-1 USN-4388-1 USN-4389-1 USN-4390-1 USN-4391-1 USN-4392-1 USN-4393-1 bdo#952660 bdo#960271 bnc#1154824 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1708775 rh#1774983 rh#1795624 rh#1827165 rh#1831726 rh#1831849 rh#1832860 rh#1839634 rh#1842525 rh#1849926 |
CVE-2020-10135 | kernel-source-rt:Released | moderate | 5 (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L) | CERT-VN:VU#647177 CONFIRM:www.bluetooth.com:CVE-2020-10135 CVE-2020-10135 DSA-5161 FULLDISC:20200602 BIAS (Bluetooth Impersonation Attack) CVE 2020-10135 reproduction MISC:francozappa.github.io:CVE-2020-10135 MISC:packetstormsecurity.com:CVE-2020-10135 OSS:2020/04/30/5 OSS:2020/06/18/1 OSS:2020/07/28/2 RH:CVE-2020-10135 SMASH Issue 259679 SUSE:openSUSE-SU-2020:1153 SUSE:openSUSE-SU-2020:1236 UBUNTU:CVE-2020-10135 ZDI-23-1834 bnc#1171988 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1708775 rh#1832397 rh#1832860 rh#1839634 rh#1847832 rh#1849926 rh#1865751 rh#2039448 rh#2058395 rh#2064604 rh#2074208 rh#2084458 rh#2086753 rh#2089815 rh#2090723 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2104423 |
CVE-2020-10375 | python3:Analysis | moderate | () | CVE-2020-10375 L3:64282 L3:65722 MISC:www.smarty-online.de:CVE-2020-10375 MISC:www.x41-dsec.de:CVE-2020-10375 SMASH Issue 277351 |
CVE-2020-10543 | perl:Released | moderate | 6.4 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H) | CONFIRM:github.com:CVE-2020-10543 CONFIRM:security.netapp.com:CVE-2020-10543 CVE-2020-10543 FEDORA:FEDORA-2020-fd73c08076 GLSA-202006-03 L3:68185 MISC:www.oracle.com:CVE-2012-2098 MISC:www.oracle.com:CVE-2013-7285 MISC:www.oracle.com:CVE-2021-3450 MISC:www.oracle.com:CVE-2021-35666 MISC:www.oracle.com:CVE-2022-21403 MISC:www.oracle.com:CVE-2022-21498 N/A:N/A Oracle:CVE-2020-10543 Oracle:CVE-2020-10878 RH:CVE-2020-10543 RHSA-2021:0343 RHSA-2021:0883 RHSA-2021:1032 RHSA-2021:1266 RHSA-2021:1678 RHSA-2021:2792 SMASH Issue 259609 SMASH Issue 259610 SUSE:openSUSE-SU-2020:0850 UBUNTU:CVE-2020-10543 bnc#1171863 rh#1837975 rh#1837988 rh#1838000 |
CVE-2020-10711 | kernel-source-rt:Already fixed | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:bugzilla.redhat.com:CVE-2020-10711 CONFIRM:security.netapp.com:CVE-2019-11599 CONFIRM:www.openwall.com:CVE-2020-10711 CVE-2020-10711 DSA-4698 DSA-4699 L3:64868 MISC:bugs.launchpad.net:CONFIRM:N/A MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update OSS:2020/04/06/2 OSS:2020/04/30/5 OSS:2020/06/04/4 OSS:2020/06/18/1 OSS:2020/Q2/104 RH:CVE-2020-10711 RHSA-2020:2082 RHSA-2020:2085 RHSA-2020:2102 RHSA-2020:2103 RHSA-2020:2104 RHSA-2020:2125 RHSA-2020:2171 RHSA-2020:2199 RHSA-2020:2203 RHSA-2020:2214 RHSA-2020:2242 RHSA-2020:2277 RHSA-2020:2285 RHSA-2020:2289 RHSA-2020:2291 RHSA-2020:2429 RHSA-2020:2519 RHSA-2020:2522 SMASH Issue 259049 SMASH Issue 259050 SUSE:openSUSE-SU-2020:0801 SUSE:openSUSE-SU-2020:0935 UBUNTU:CVE-2020-10711 USN-4411-1 USN-4412-1 USN-4413-1 USN-4414-1 USN-4419-1 bdo#952660 bdo#960271 bnc#1171191 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1774983 rh#1795624 rh#1825116 rh#1831726 rh#1831849 rh#1832397 rh#1832860 rh#1839634 rh#1842525 rh#1847832 rh#1849926 |
CVE-2020-10720 | kernel-source-rt:Already fixed | moderate | 4.8 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L) | CVE-2020-10720 MISC:bugs.launchpad.net:CONFIRM:N/A MISC:git.kernel.org:CVE-2020-10720 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2020/04/06/2 OSS:2020/04/30/5 OSS:2020/06/04/4 RH:CVE-2020-10720 RHSA-2019:3309 RHSA-2019:3517 RHSA-2020:2854 SMASH Issue 258750 UBUNTU:CVE-2020-10720 bnc#1170778 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1667782 rh#1708775 rh#1773519 rh#1774983 rh#1781204 rh#1783498 rh#1795624 rh#1831726 rh#1831849 rh#1832860 rh#1839634 rh#1842525 rh#1849926 |
CVE-2020-10732 | kernel-source-rt:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) | CONFIRM:bugzilla.redhat.com:CVE-2020-10732 CONFIRM:security.netapp.com:CVE-2020-10732 CVE-2020-10732 L3:64868 MISC:bugs.launchpad.net:CONFIRM:N/A MISC:git.kernel.org:CVE-2020-10732 MISC:github.com:CVE-2020-10732 MISC:github.com:OSS:2020/Q2/88 MISC:lore.kernel.org:/lkml/CAG_fn=VZZ7yUxtOGzuTLkr7wmfXWtKK9BHHYawj=rt9XWnCYvg%40mail.gmail.com/ MISC:lore.kernel.org:CVE-2020-10732 MISC:twitter.com:CVE-2020-10732 OSS:2020/04/06/2 OSS:2020/04/30/5 OSS:2020/06/04/4 OSS:2020/06/18/1 OSS:2020/Q2/88 RH:CVE-2020-10732 RHSA-2020:4060 RHSA-2020:4062 RHSA-2020:4431 RHSA-2020:4609 SMASH Issue 259058 SUSE:openSUSE-SU-2020:0801 SUSE:openSUSE-SU-2020:0935 UBUNTU:CVE-2020-10732 USN-4411-1 USN-4427-1 USN-4439-1 USN-4440-1 USN-4485-1 bdo#952660 bdo#960271 bnc#1171220 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1708775 rh#1774983 rh#1795624 rh#1831399 rh#1831726 rh#1831849 rh#1832397 rh#1832860 rh#1839634 rh#1842525 rh#1847832 rh#1849926 |
CVE-2020-10735 | python3:Released | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2020-10735 D:CVE-2020-10735 FEDORA:FEDORA-2022-0b3904c674 FEDORA:FEDORA-2022-141f632a6f FEDORA:FEDORA-2022-29d436596f FEDORA:FEDORA-2022-46a44a7f83 FEDORA:FEDORA-2022-4b31e33ed0 FEDORA:FEDORA-2022-66b65beccb FEDORA:FEDORA-2022-6d57598a23 FEDORA:FEDORA-2022-72213986b8 FEDORA:FEDORA-2022-79843dfb3c FEDORA:FEDORA-2022-8535093cba FEDORA:FEDORA-2022-958fd7a32e FEDORA:FEDORA-2022-ac82a548df FEDORA:FEDORA-2022-b01214472e FEDORA:FEDORA-2022-b8b34e62ab FEDORA:FEDORA-2022-c072cdc3c8 FEDORA:FEDORA-2022-d1682fef04 FEDORA:FEDORA-2022-d4570fc1a6 FEDORA:FEDORA-2022-dd5032bedf FEDORA:FEDORA-2022-f330bbfda2 FEDORA:FEDORA-2022-f511f8f58b L3:64282 L3:64314 L3:64315 L3:64542 L3:65195 L3:65722 MISC:access.redhat.com:/errata/RHSA-2022:6766 MISC:access.redhat.com:/errata/RHSA-2022:7323 MISC:access.redhat.com:CVE-2020-10735 MISC:docs.google.com:CVE-2020-10735 MISC:github.com:CVE-2020-10735 MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/2VCU6EVQDIXNCEDJUCTFIER2WVNNDTYZ/ MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/32AAQKABEKFCB5DDV5OONRZK6BS23HPW/ MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/4EWKR2SPX3JORLWCXFY3KN2U5B5CIUQQ/ MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/6XL6E5A3I36TRR73VNBOXNIQP4AMZDFZ/ MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/76YE7AM37MRU76XJV4M27CWDAMUGNRYK/ MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/HSRPVJZL6DJFWKYRHMNJB7VCEUCBKRF5/ MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/IFGV7P2PYFBMK32OKHCAC2ZPJQV5AUDF/ MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/NHC6IUU7CLRQ3QLPWUXLONSG3SXFTR47/ MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/OKYE2DOI2X7WZXAWTQJZAXYIWM37HDCY/ MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/OT5U223OE5ZOUHZAZYSYSWVJQIKDE73E/ MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/OT5WQB7Z3CXOWVBD2AFAHYPA5ONYFFZ4/ MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/PD7FTLJOIGMUSCDR3JAN6WRFHJEE4PH5/ MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/SZYJSGLSCQOKXXFVJVJQAXLEOJBIWGEL/ MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/TD7JDDKJXK6D26XAN3YRFNM2LAJHT5UO/ MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/TMWPRAAJS7I6U3U45V7GZVXWNSECI22M/ MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/U4ZZV4CDFRMTPDBI7C5L43RFL3XLIGUY/ MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/UBPDVCDIUCEBE7C4NAGNA2KQJYOTPBAZ/ MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/V7ZUJDHK7KNG6SLIFXW7MNZ6O2PUJYK6/ MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/WXF6MQ74HVIDDSR5AE2UDR24I6D4FEPC/ MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/ZEOAJWGGY55QU35UM2OVZATBW5MX2OZD/ OSS:2022/09/21/1 OSS:2022/09/21/4 OSS:2022/Q3/215 Oracle:CVE-2020-10735 RHSA-2022:6766 RHSA-2022:7323 RHSA-2023:0833 RHSA-2023:2763 RHSA-2023:2764 SMASH Issue 341485 bnc#1203125 https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html jsc#CAR-2014 rh#1834423 |
CVE-2020-10741 | kernel-source-rt:Unsupported | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L) | CONFIRM:bugzilla.redhat.com:CVE-2020-10741 CVE-2020-10741 MISC:git.kernel.org:CVE-2020-10741 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2020-10741 MISC:git.zx2c4.com:MISC:www.openwall.com:CVE-2020-10741 MISC:lists.openwall.net:CVE-2020-10741 MISC:lore.kernel.org:MISC:www.openwall.com:CVE-2020-10741 MISC:www.cvedetails.com:MISC:www.openwall.com:CVE-2020-10741 MISC:www.openwall.com:CVE-2020-10741 MISC:www.openwall.com:MISC:www.openwall.com:CVE-2020-10741 RH:CVE-2020-10741 RHSA-2020:4060 RHSA-2020:4062 RHSA-2020:4431 RHSA-2020:4609 SMASH Issue 259444 bnc#1171985 rh#1822077 |
CVE-2020-10751 | kernel-source-rt:Released | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N) | CONFIRM:bugzilla.redhat.com:CVE-2020-10751 CONFIRM:lore.kernel.org:CVE-2020-10751 CVE-2020-10751 DSA-4698 DSA-4699 L3:57993 L3:58164 L3:64868 MISC:bugs.launchpad.net:CONFIRM:N/A MISC:git.kernel.org:MLIST:[oss-security] 20200527 CVE-2020-10751 - Linux kernel: SELinux netlink permission check bypass MISC:lore.kernel.org:/selinux/CACT4Y+b8HiV6KFuAPysZD=5hmyO4QisgxCKi4DHU3CfMPSP=yg%40mail.gmail.com/ MISC:www.openwall.com:MLIST:[oss-security] 20200527 CVE-2020-10751 - Linux kernel: SELinux netlink permission check bypass MISC:www.oracle.com:CVE-2021-3450 MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update MLIST:[oss-security] 20200527 CVE-2020-10751 - Linux kernel: SELinux netlink permission check bypass OSS:2020/04/06/2 OSS:2020/04/30/5 OSS:2020/06/04/4 OSS:2020/06/18/1 OSS:2020/07/28/2 OSS:2020/Q2/147 Oracle:CVE-2019-14821 RH:CVE-2020-10751 RHSA-2020:4060 RHSA-2020:4062 RHSA-2020:4431 RHSA-2020:4609 SMASH Issue 259048 SMASH Issue 259809 SUSE:openSUSE-SU-2020:0801 SUSE:openSUSE-SU-2020:0935 UBUNTU:CVE-2020-10751 USN-4389-1 USN-4390-1 USN-4391-1 USN-4412-1 USN-4413-1 bdo#952660 bdo#960271 bnc#1171189 bnc#1173060 bnc#1174956 bnc#1175734 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1708775 rh#1731000 rh#1734243 rh#1734246 rh#1743547 rh#1746732 rh#1757368 rh#1774983 rh#1795624 rh#1831726 rh#1831849 rh#1832397 rh#1832860 rh#1833535 rh#1839634 rh#1842525 rh#1847832 rh#1849926 |
CVE-2020-10757 | kernel-source-rt:Released | important | 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2020-10757 CVE-2020-10757 DSA-4698 DSA-4699 FEDORA:FEDORA-2020-203ffedeb5 MISC:bugs.launchpad.net:CONFIRM:N/A MISC:git.kernel.org:CVE-2020-10757 MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/IEM47BXZJLODRH5YNNZSAQ2NVM63MYMC/ MISC:www.openwall.com:CVE-2020-10757 MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update OSS:2020/04/06/2 OSS:2020/04/30/5 OSS:2020/06/04/4 OSS:2020/Q2/168 RH:CVE-2020-10757 RHSA-2020:3010 RHSA-2020:3016 RHSA-2020:3041 RHSA-2020:3220 RHSA-2020:3221 RHSA-2020:3222 RHSA-2020:3226 RHSA-2020:3598 SMASH Issue 260301 SUSE:openSUSE-SU-2020:0801 UBUNTU:CVE-2020-10757 USN-4426-1 USN-4439-1 USN-4440-1 USN-4483-1 bdo#952660 bdo#960271 bnc#1172317 bnc#1172437 linux.git:commit:5bfea2d9b17f1034a68147a8b03b9789af5700f9 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1774983 rh#1795624 rh#1831726 rh#1831849 rh#1832860 rh#1839634 rh#1842525 |
CVE-2020-10766 | kernel-source-rt:Released | moderate | 5.6 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N) | CONFIRM:bugzilla.redhat.com:CVE-2020-10766 CVE-2020-10766 L3:64868 MISC:bugzilla.redhat.com:MLIST:[oss-security] 20200610 kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768 MISC:git.kernel.org:CVE-2020-10766 MLIST:[oss-security] 20200610 Re: kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768 MLIST:[oss-security] 20200610 kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768 OSS:2020/04/30/5 OSS:2020/06/18/1 OSS:2020/07/28/2 OSS:2020/Q2/177 Oracle:CVE-2018-3639 RH:CVE-2020-10766 RHSA-2020:3010 RHSA-2020:3016 RHSA-2020:3041 RHSA-2020:3073 RHSA-2020:3222 RHSA-2020:3297 SMASH Issue 261192 UBUNTU:CVE-2020-10766 bnc#1172781 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1708775 rh#1832397 rh#1832860 rh#1839634 rh#1845840 rh#1847832 rh#1849926 rh#1865751 |
CVE-2020-10767 | kernel-source-rt:Released | moderate | 5.9 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N) | CONFIRM:bugzilla.redhat.com:CVE-2020-10767 CVE-2020-10767 L3:64868 MISC:bugzilla.redhat.com:MLIST:[oss-security] 20200610 kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768 MISC:git.kernel.org:CVE-2020-10767 MLIST:[oss-security] 20200610 Re: kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768 MLIST:[oss-security] 20200610 kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768 OSS:2020/04/30/5 OSS:2020/06/18/1 OSS:2020/07/28/2 OSS:2020/Q2/177 Oracle:CVE-2018-3639 RH:CVE-2020-10767 RHSA-2020:3010 RHSA-2020:3016 RHSA-2020:3041 RHSA-2020:3073 RHSA-2020:3222 RHSA-2020:3297 SMASH Issue 261190 UBUNTU:CVE-2020-10767 bnc#1172782 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1708775 rh#1832397 rh#1832860 rh#1839634 rh#1845867 rh#1847832 rh#1849926 rh#1865751 |
CVE-2020-10768 | kernel-source-rt:Released | moderate | 6.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N) | CONFIRM:bugzilla.redhat.com:CVE-2020-10768 CVE-2020-10768 L3:64868 MISC:bugzilla.redhat.com:MLIST:[oss-security] 20200610 kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768 MISC:git.kernel.org:CVE-2020-10768 MLIST:[oss-security] 20200610 Re: kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768 MLIST:[oss-security] 20200610 kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768 OSS:2020/04/30/5 OSS:2020/06/18/1 OSS:2020/07/28/2 OSS:2020/Q2/177 Oracle:CVE-2018-3639 RH:CVE-2020-10768 RHSA-2020:3010 RHSA-2020:3016 RHSA-2020:3041 RHSA-2020:3073 RHSA-2020:3222 RHSA-2020:3297 SMASH Issue 261191 UBUNTU:CVE-2020-10768 bnc#1172783 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1708775 rh#1832397 rh#1832860 rh#1839634 rh#1845868 rh#1847832 rh#1849926 rh#1865751 |
CVE-2020-10773 | kernel-source-rt:Released | low | 2.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N) | CONFIRM:bugzilla.redhat.com:CVE-2020-10773 CVE-2020-10773 L3:64868 MISC:git.kernel.org:CVE-2020-10773 OSS:2020/04/30/5 OSS:2020/06/18/1 OSS:2020/07/28/2 RH:CVE-2020-10773 RHSA-2020:4431 SMASH Issue 261446 UBUNTU:CVE-2020-10773 bnc#1172999 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1708775 rh#1831849 rh#1832397 rh#1832860 rh#1839634 rh#1846380 rh#1847832 rh#1849926 rh#1865751 |
CVE-2020-10774 | kernel-source-rt:Unsupported | moderate | () | CVE-2020-10774 RH:CVE-2020-10774 RHSA-2020:4431 RHSA-2020:4609 SMASH Issue 261502 UBUNTU:CVE-2020-10774 rh#1846964 |
CVE-2020-10781 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:bugzilla.redhat.com:CVE-2020-10781 CVE-2020-10781 MISC:git.kernel.org:CVE-2020-10781 MISC:www.openwall.com:CVE-2020-10781 MLIST:[debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update OSS:2020/04/30/5 OSS:2020/06/18/1 OSS:2020/07/28/2 OSS:2020/Q2/201 RH:CVE-2020-10781 SMASH Issue 261685 UBUNTU:CVE-2020-10781 bnc#1173074 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1708775 rh#1832397 rh#1832860 rh#1839634 rh#1847832 rh#1849926 rh#1865751 |
CVE-2020-10878 | perl:Released | moderate | 6.4 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H) | CONFIRM:github.com:CVE-2020-10543 CONFIRM:github.com:CVE-2020-10878 CONFIRM:security.netapp.com:CVE-2020-10543 CVE-2020-10878 FEDORA:FEDORA-2020-fd73c08076 GLSA-202006-03 L3:68185 MISC:www.oracle.com:CVE-2012-2098 MISC:www.oracle.com:CVE-2013-7285 MISC:www.oracle.com:CVE-2021-3450 MISC:www.oracle.com:CVE-2021-35666 MISC:www.oracle.com:CVE-2022-21403 MISC:www.oracle.com:CVE-2022-21498 N/A:N/A Oracle:CVE-2020-10543 Oracle:CVE-2020-10878 RH:CVE-2020-10878 RHSA-2021:0343 RHSA-2021:0883 RHSA-2021:1032 RHSA-2021:1266 RHSA-2021:1678 RHSA-2021:2792 SMASH Issue 259611 SMASH Issue 259612 SUSE:openSUSE-SU-2020:0850 UBUNTU:CVE-2020-10878 bnc#1171864 rh#1837975 rh#1837988 rh#1838000 |
CVE-2020-11080 | nghttp2:Released | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:github.com:CVE-2020-11080 CVE-2020-11080 D:CVE-2020-11080 DSA-4696 FEDORA:FEDORA-2020-43d5a372fc FEDORA:FEDORA-2020-f7d15c8b77 MISC:github.com:CVE-2020-11080 MISC:www.oracle.com:CVE-2012-2098 MISC:www.oracle.com:CVE-2013-7285 MISC:www.oracle.com:CVE-2015-7501 MISC:www.oracle.com:CVE-2022-21498 MLIST:[debian-lts-announce] 20211017 [SECURITY] [DLA 2786-1] nghttp2 security update N/A:N/A Oracle:CVE-2020-11080 Oracle:CVE-2020-8174 RH:CVE-2020-11080 RHSA-2020:2523 RHSA-2020:2524 RHSA-2020:2644 RHSA-2020:2646 RHSA-2020:2755 RHSA-2020:2784 RHSA-2020:2823 RHSA-2020:2847 RHSA-2020:2848 RHSA-2020:2849 RHSA-2020:2850 RHSA-2020:2852 RHSA-2020:2895 RHSA-2020:3042 RHSA-2020:3084 SMASH Issue 260502 SMASH Issue 276221 SUSE:openSUSE-SU-2020:0802 UBUNTU:CVE-2020-11080 bdo#962145 bnc#1172442 bnc#1181358 https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html jsc#CAR-1026 rh#1813344 rh#1844929 |
CVE-2020-11501 | gnutls:Released | important | 7.4 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N) | CONFIRM:security.netapp.com:CVE-2020-11501 CVE-2020-11501 DSA-4652 FEDORA:FEDORA-2020-d14280a6e8 FEDORA:FEDORA-2020-f90fb78f70 GLSA-202004-06 MISC:gitlab.com:CVE-2020-11501 MISC:www.gnutls.org:CVE-2020-11501 RH:CVE-2020-11501 RHSA-2020:1998 SMASH Issue 256260 SUSE:openSUSE-SU-2020:0501 UBUNTU:CVE-2020-11501 USN-4322-1 Upstream Bug Upstream Fix bdo#955556 bnc#1168345 rh#1821896 |
CVE-2020-11565 | kernel-source-rt:Ignore | moderate | 4.8 (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H) | CVE-2020-11565 DSA-4667 DSA-4698 MISC:git.kernel.org:CVE-2020-11565 MISC:github.com:CVE-2020-11565 MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update RH:CVE-2020-11565 RHSA-2020:2854 RHSA-2020:4060 RHSA-2020:4062 RHSA-2020:4431 RHSA-2020:4609 SMASH Issue 256525 UBUNTU:CVE-2020-11565 USN-4363-1 USN-4364-1 USN-4367-1 USN-4368-1 USN-4369-1 bdo#952660 bnc#1168831 rh#1824918 |
CVE-2020-11608 | kernel-source-rt:Already fixed | moderate | 4.3 (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-20636 CVE-2020-11608 DSA-4698 MISC:bugs.launchpad.net:CONFIRM:N/A MISC:cdn.kernel.org:CVE-2020-11608 MISC:git.kernel.org:CVE-2020-11608 MISC:github.com:CVE-2020-11608 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2020/04/06/2 OSS:2020/04/30/5 OSS:2020/06/04/4 RH:CVE-2020-11608 RHSA-2021:1578 RHSA-2021:1739 SMASH Issue 256577 SUSE:openSUSE-SU-2020:0801 UBUNTU:CVE-2020-11608 USN-4345-1 USN-4364-1 USN-4368-1 USN-4369-1 bdo#952660 bnc#1168829 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1667782 rh#1707796 rh#1773519 rh#1774983 rh#1783498 rh#1795624 rh#1831726 rh#1831849 rh#1832860 rh#1833445 rh#1839634 rh#1842525 rh#1851480 |
CVE-2020-11609 | kernel-source-rt:Already fixed | moderate | 4.3 (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-20636 CVE-2020-11609 DSA-4698 MISC:bugs.launchpad.net:CONFIRM:N/A MISC:cdn.kernel.org:CVE-2020-11608 MISC:git.kernel.org:CVE-2020-11609 MISC:github.com:CVE-2020-11609 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2020/04/06/2 OSS:2020/04/30/5 OSS:2020/06/04/4 RH:CVE-2020-11609 SMASH Issue 256580 SMASH Issue 256607 SUSE:openSUSE-SU-2020:0801 UBUNTU:CVE-2020-11609 USN-4345-1 USN-4364-1 USN-4368-1 USN-4369-1 bdo#952660 bnc#1168854 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1667782 rh#1707796 rh#1773519 rh#1774983 rh#1783498 rh#1795624 rh#1831726 rh#1831849 rh#1832860 rh#1833452 rh#1839634 rh#1842525 rh#1851480 |
CVE-2020-11668 | kernel-source-rt:Released | important | 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2019-20636 CVE-2020-11668 DSA-4698 L3:61626 MISC:bugs.launchpad.net:CONFIRM:N/A MISC:cdn.kernel.org:CVE-2020-11608 MISC:git.kernel.org:CVE-2020-11668 MISC:github.com:CVE-2020-11668 MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update OSS:2020/04/06/2 RH:CVE-2020-11668 RHSA-2020:4431 RHSA-2020:4609 RHSA-2021:2725 RHSA-2021:2726 SMASH Issue 256751 SMASH Issue 256949 UBUNTU:CVE-2020-11668 USN-4345-1 USN-4364-1 USN-4368-1 USN-4369-1 bdo#952660 bnc#1168952 bnc#1173942 bnc#1190327 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1707796 rh#1824792 |
CVE-2020-11669 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2020-11669 CVE-2020-11669 MISC:bugs.launchpad.net:CONFIRM:N/A MISC:cdn.kernel.org:CVE-2020-7053 MISC:git.kernel.org:CVE-2020-11669 MISC:git.kernel.org:MLIST:[oss-security] 20200415 CVE-2020-11669: Linux kernel 4.10 to 5.1: powerpc: guest can cause DoS on POWER9 KVM hosts MISC:github.com:CVE-2020-11669 MISC:lists.ozlabs.org:CVE-2020-11669 MISC:lists.ozlabs.org:MLIST:[oss-security] 20200415 CVE-2020-11669: Linux kernel 4.10 to 5.1: powerpc: guest can cause DoS on POWER9 KVM hosts MLIST:[oss-security] 20200415 CVE-2020-11669: Linux kernel 4.10 to 5.1: powerpc: guest can cause DoS on POWER9 KVM hosts MLIST:[oss-security] 20200415 Re: CVE-2020-11669: Linux kernel 4.10 to 5.1: powerpc: guest can cause DoS on POWER9 KVM hosts OSS:2020/04/06/2 OSS:2020/04/30/5 OSS:2020/06/04/4 OSS:2020/Q2/26 RH:CVE-2020-11669 RHSA-2019:3517 RHSA-2021:1379 SMASH Issue 256965 SUSE:openSUSE-SU-2020:0543 UBUNTU:CVE-2020-11669 USN-4368-1 bnc#1169390 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1707796 rh#1774983 rh#1795624 rh#1824803 rh#1831726 rh#1831849 rh#1832860 rh#1839634 rh#1842525 |
CVE-2020-11725 | kernel-source-rt:Ignore | low | 0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N) | CVE-2020-11725 MISC:github.com:CVE-2020-11725 MISC:lore.kernel.org:CVE-2020-11725 MISC:twitter.com:CVE-2020-11725 RH:CVE-2020-11725 SMASH Issue 256999 UBUNTU:CVE-2020-11725 bnc#1169384 https://lore.kernel.org/alsa-devel/s5h4ktmlfpx.wl-tiwai%40suse.de/ rh#1824923 |
CVE-2020-11884 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:git.kernel.org:CVE-2020-11884 CONFIRM:security.netapp.com:CVE-2019-11599 CVE-2020-11884 DSA-4667 FEDORA:FEDORA-2020-16f9239805 FEDORA:FEDORA-2020-64d46a6e29 FEDORA:FEDORA-2020-b453269c4e MISC:git.kernel.org:CVE-2020-11884 RH:CVE-2020-11884 RHSA-2020:2102 RHSA-2020:2199 RHSA-2020:2429 SMASH Issue 258142 SMASH Issue 258143 UBUNTU:CVE-2020-11884 USN-4342-1 USN-4343-1 USN-4345-1 bnc#1170030 bnc#1173947 linux.git:commit:316ec154810960052d4586b634156c54d0778f74 linux.git:commit:3f777e19d171670ab558a6d5e6b1ac7f9b6c574f rh#1828149 |
CVE-2020-12049 | dbus-1:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:www.openwall.com:CVE-2020-12049 CVE-2020-12049 Debian MISC:gitlab.freedesktop.org:CONFIRM:www.openwall.com:CVE-2020-12049 MISC:gitlab.freedesktop.org:CVE-2020-12049 MISC:lists.freedesktop.org:CONFIRM:www.openwall.com:CVE-2020-12049 OSS:2020/Q2/167 RH:CVE-2020-12049 RHSA-2020:2894 RHSA-2020:3014 RHSA-2020:3044 RHSA-2020:3298 SMASH Issue 260692 UBUNTU:CVE-2020-12049 bnc#1172505 http://packetstormsecurity.com/files/172840/D-Bus-File-Descriptor-Leak-Denial-Of-Service.html https://security.gentoo.org/glsa/202007-46 https://securitylab.github.com/advisories/GHSL-2020-057-DBus-DoS-file-descriptor-leak https://usn.ubuntu.com/4398-1/ https://usn.ubuntu.com/4398-2/ jsc#CAR-941 rh#1849041 |
CVE-2020-12114 | kernel-source-rt:Already fixed | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-11599 CVE-2020-12114 DSA-4698 DSA-4699 MISC:bugs.launchpad.net:CONFIRM:N/A MISC:git.kernel.org:MISC:www.openwall.com:CVE-2020-12114 MISC:packetstormsecurity.com:CVE-2020-14386 MISC:www.openwall.com:CVE-2020-12114 MISC:www.oracle.com:CVE-2021-3450 MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update OSS:2020/04/06/2 OSS:2020/04/30/5 OSS:2020/06/04/4 OSS:2020/Q2/86 RH:CVE-2020-12114 RHSA-2021:1578 RHSA-2021:1739 RHSA-2021:2185 RHSA-2021:2190 SMASH Issue 258962 SUSE:openSUSE-SU-2020:0801 UBUNTU:CVE-2020-12114 USN-4387-1 USN-4388-1 USN-4389-1 USN-4390-1 USN-4391-1 USN-4392-1 bdo#952660 bdo#960271 bnc#1171098 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1708775 rh#1774983 rh#1795624 rh#1831726 rh#1831849 rh#1832860 rh#1839634 rh#1842525 rh#1848652 rh#1849926 |
CVE-2020-12351 | kernel-source-rt:Released | important | 7.5 (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2020-12351 MISC:packetstormsecurity.com:CVE-2020-12352 MISC:www.intel.com:CVE-2020-12351 RH:CVE-2020-12351 RHSA-2020:4276 RHSA-2020:4277 RHSA-2020:4278 RHSA-2020:4279 RHSA-2020:4280 RHSA-2020:4281 RHSA-2020:4286 RHSA-2020:4287 RHSA-2020:4288 RHSA-2020:4289 RHSA-2020:4685 RHSA-2020:4686 SMASH Issue 269152 UBUNTU:CVE-2020-12351 bdo#908712 bnc#1177724 bnc#1177729 rh#1886521 rh#1891483 |
CVE-2020-12352 | kernel-source-rt:Released | moderate | 3.1 (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) | CVE-2020-12352 MISC:packetstormsecurity.com:CVE-2020-0427 MISC:packetstormsecurity.com:CVE-2020-12352 MISC:www.intel.com:CVE-2020-12351 RH:CVE-2020-12352 RHSA-2020:4276 RHSA-2020:4277 RHSA-2020:4278 RHSA-2020:4279 RHSA-2020:4280 RHSA-2020:4281 RHSA-2020:4286 RHSA-2020:4287 RHSA-2020:4288 RHSA-2020:4289 RHSA-2020:4685 RHSA-2020:4686 RHSA-2020:4990 RHSA-2020:4991 SMASH Issue 269151 UBUNTU:CVE-2020-12352 bdo#908712 bnc#1177725 rh#1886529 rh#1891484 |
CVE-2020-12362 | kernel-source-rt:Released | important | 7.5 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H) | CVE-2020-12362 MISC:www.intel.com:CVE-2020-0518 RH:CVE-2020-12362 RHSA-2021:1578 RHSA-2021:1620 RHSA-2021:1739 RHSA-2021:2106 RHSA-2021:2164 RHSA-2021:2185 RHSA-2021:2190 RHSA-2021:2293 RHSA-2021:2314 RHSA-2021:2316 RHSA-2021:2355 RHSA-2021:2523 RHSA-2021:2735 SMASH Issue 277030 SMASH Issue 277032 bnc#1181720 bnc#1182033 https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html rh#1930246 |
CVE-2020-12363 | kernel-source-rt:Released | low | 1.9 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L) | CVE-2020-12363 MISC:www.intel.com:CVE-2020-0518 RH:CVE-2020-12363 RHSA-2021:1578 RHSA-2021:1620 RHSA-2021:1739 RHSA-2021:2314 RHSA-2021:2316 SMASH Issue 277031 bnc#1181735 https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html rh#1930249 |
CVE-2020-12364 | kernel-source-rt:Released | low | 1.9 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L) | CVE-2020-12364 MISC:www.intel.com:CVE-2020-0518 RH:CVE-2020-12364 RHSA-2021:1578 RHSA-2021:1620 RHSA-2021:1739 RHSA-2021:2314 RHSA-2021:2316 SMASH Issue 277028 bnc#1181736 https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html rh#1930251 |
CVE-2020-12373 | kernel-source-rt:Released | low | 1.9 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L) | CVE-2020-12373 MISC:www.intel.com:CVE-2020-0518 MISC:www.intel.com:CVE-2020-12373 SMASH Issue 277029 bnc#1181738 |
CVE-2020-12399 | mozilla-nss:Released | moderate | 4.4 (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N) | CVE-2020-12399 DSA-4695 DSA-4702 DSA-4726 GLSA-202007-49 MISC:bugzilla.mozilla.org:CVE-2020-12399 MISC:www.mozilla.org:CVE-2020-12398 MISC:www.mozilla.org:CVE-2020-12399 MLIST:[debian-lts-announce] 20200929 [SECURITY] [DLA 2388-1] nss security update RH:CVE-2020-12399 RHSA-2020:3280 SMASH Issue 259689 UBUNTU:CVE-2020-12399 USN-4421-1 bnc#1171978 bnc#1172402 rh#1775916 rh#1826177 |
CVE-2020-12400 | mozilla-nss:Released | critical | () | CVE-2020-12400 CVE-2020-12401 CVE-2020-12403 CVE-2020-6829 D:CVE-2020-12403 MISC:bugzilla.mozilla.org:CVE-2020-12400 MISC:bugzilla.mozilla.org:CVE-2020-12401 MISC:bugzilla.mozilla.org:CVE-2020-6829 MISC:developer.mozilla.org:CVE-2020-12403 MISC:www.mozilla.org:CVE-2020-15663 MISC:www.mozilla.org:CVE-2020-15664 RH:CVE-2020-12400 RH:CVE-2020-12401 RH:CVE-2020-12403 RH:CVE-2020-6829 RHSA-2020:4076 RHSA-2021:0538 RHSA-2021:0758 RHSA-2021:0876 RHSA-2021:1026 SMASH Issue 264606 SMASH Issue 264622 UBUNTU:CVE-2020-12400 UBUNTU:CVE-2020-12401 UBUNTU:CVE-2020-12403 UBUNTU:CVE-2020-6829 bnc#1174763 https://lists.debian.org/debian-lts-announce/2023/02/msg00021.html https://security.netapp.com/advisory/ntap-20230324-0006/ rh#1826187 rh#1851294 rh#1853983 rh#1868931 |
CVE-2020-12401 | mozilla-nss:Released | critical | () | CVE-2020-12400 CVE-2020-12401 CVE-2020-12403 CVE-2020-6829 D:CVE-2020-12403 MISC:bugzilla.mozilla.org:CVE-2020-12400 MISC:bugzilla.mozilla.org:CVE-2020-12401 MISC:bugzilla.mozilla.org:CVE-2020-6829 MISC:developer.mozilla.org:CVE-2020-12403 MISC:www.mozilla.org:CVE-2020-15663 MISC:www.mozilla.org:CVE-2020-15664 RH:CVE-2020-12400 RH:CVE-2020-12401 RH:CVE-2020-12403 RH:CVE-2020-6829 RHSA-2020:4076 RHSA-2021:0538 RHSA-2021:0758 RHSA-2021:0876 RHSA-2021:1026 SMASH Issue 264607 SMASH Issue 264622 UBUNTU:CVE-2020-12400 UBUNTU:CVE-2020-12401 UBUNTU:CVE-2020-12403 UBUNTU:CVE-2020-6829 bnc#1174763 https://lists.debian.org/debian-lts-announce/2023/02/msg00021.html https://security.netapp.com/advisory/ntap-20230324-0006/ rh#1826187 rh#1851294 rh#1853983 rh#1868931 |
CVE-2020-12402 | mozilla-nss:Released | moderate | 4.4 (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N) | CVE-2020-12402 DSA-4726 FEDORA:FEDORA-2020-16741ac7ff FEDORA:FEDORA-2020-3ef1937475 GLSA-202007-10 MISC:bugzilla.mozilla.org:CVE-2020-12402 MISC:www.mozilla.org:CVE-2020-12402 MLIST:[debian-lts-announce] 20200929 [SECURITY] [DLA 2388-1] nss security update Mitre RH:CVE-2020-12402 RHSA-2020:3280 RHSA-2020:4076 SMASH Issue 261683 SMASH Issue 261688 SUSE:openSUSE-SU-2020:0953 SUSE:openSUSE-SU-2020:0955 SUSE:openSUSE-SU-2020:0983 SUSE:openSUSE-SU-2020:1017 UBUNTU:CVE-2020-12402 USN-4417-1 USN-4417-2 bnc#1173032 rh#1775916 rh#1826177 rh#1826231 |
CVE-2020-12403 | mozilla-nss:Released | critical | () | CVE-2020-12400 CVE-2020-12401 CVE-2020-12403 CVE-2020-6829 D:CVE-2020-12403 MISC:bugzilla.mozilla.org:CVE-2020-12400 MISC:bugzilla.mozilla.org:CVE-2020-12401 MISC:bugzilla.mozilla.org:CVE-2020-6829 MISC:developer.mozilla.org:CVE-2020-12403 MISC:www.mozilla.org:CVE-2020-15663 MISC:www.mozilla.org:CVE-2020-15664 RH:CVE-2020-12400 RH:CVE-2020-12401 RH:CVE-2020-12403 RH:CVE-2020-6829 RHSA-2020:4076 RHSA-2021:0538 RHSA-2021:0758 RHSA-2021:0876 RHSA-2021:1026 SMASH Issue 264621 SMASH Issue 264622 UBUNTU:CVE-2020-12400 UBUNTU:CVE-2020-12401 UBUNTU:CVE-2020-12403 UBUNTU:CVE-2020-6829 bnc#1174763 https://lists.debian.org/debian-lts-announce/2023/02/msg00021.html https://security.netapp.com/advisory/ntap-20230324-0006/ rh#1826187 rh#1851294 rh#1853983 rh#1868931 |
CVE-2020-12464 | kernel-source-rt:Already fixed | low | 1.8 (CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:security.netapp.com:CVE-2019-11599 CVE-2020-12464 DSA-4698 DSA-4699 MISC:bugs.launchpad.net:CONFIRM:N/A MISC:cdn.kernel.org:CVE-2020-12464 MISC:git.kernel.org:CVE-2020-12464 MISC:github.com:CVE-2020-12464 MISC:lkml.org:CVE-2020-12464 MISC:patchwork.kernel.org:CVE-2020-12464 MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update OSS:2020/04/06/2 OSS:2020/04/30/5 OSS:2020/06/04/4 RH:CVE-2020-12464 RHSA-2021:1578 RHSA-2021:1739 SMASH Issue 258832 SUSE:openSUSE-SU-2020:0801 UBUNTU:CVE-2020-12464 USN-4387-1 USN-4388-1 USN-4389-1 USN-4390-1 USN-4391-1 bdo#952660 bdo#960271 bnc#1170901 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1708775 rh#1774983 rh#1795624 rh#1831726 rh#1831849 rh#1832860 rh#1839634 rh#1842525 rh#1849926 |
CVE-2020-12465 | kernel-source-rt:Not affected | important | 7.1 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H) | CONFIRM:security.netapp.com:CVE-2019-11599 CVE-2020-12465 MISC:cdn.kernel.org:CVE-2020-12465 MISC:git.kernel.org:CVE-2020-12465 MISC:github.com:CVE-2020-12465 RH:CVE-2020-12465 RHSA-2020:4431 SMASH Issue 258779 SMASH Issue 258833 UBUNTU:CVE-2020-12465 bnc#1170828 bnc#1170888 rh#1831699 |
CVE-2020-12652 | kernel-source-rt:Released | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2019-11599 CVE-2020-12652 DSA-4698 MISC:bugs.launchpad.net:CONFIRM:N/A MISC:cdn.kernel.org:CVE-2020-12652 MISC:git.kernel.org:CVE-2020-12652 MISC:github.com:CVE-2020-12652 MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update OSS:2020/04/06/2 OSS:2020/04/30/5 OSS:2020/06/04/4 RH:CVE-2020-12652 SMASH Issue 259051 SUSE:openSUSE-SU-2020:0801 UBUNTU:CVE-2020-12652 bdo#952660 bnc#1171218 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1708775 rh#1774983 rh#1795624 rh#1831726 rh#1831849 rh#1832860 rh#1839634 rh#1842525 rh#1849926 |
CVE-2020-12656 | kernel-source-rt:Released | low | 2.9 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) | CVE-2020-12656 L3:64868 MISC:bugs.launchpad.net:CONFIRM:N/A MISC:bugzilla.kernel.org:CVE-2020-12656 OSS:2020/04/06/2 OSS:2020/04/30/5 OSS:2020/06/04/4 OSS:2020/06/18/1 RH:CVE-2020-12656 SMASH Issue 259055 SUSE:openSUSE-SU-2020:0801 SUSE:openSUSE-SU-2020:0935 UBUNTU:CVE-2020-12656 USN-4483-1 USN-4485-1 bnc#1171219 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1708775 rh#1774983 rh#1795624 rh#1831726 rh#1831849 rh#1832397 rh#1832860 rh#1839634 rh#1842525 rh#1847832 rh#1849926 |
CVE-2020-12657 | kernel-source-rt:Already fixed | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2019-11599 CVE-2020-12657 MISC:bugs.launchpad.net:CONFIRM:N/A MISC:cdn.kernel.org:CVE-2020-12657 MISC:git.kernel.org:CVE-2020-12657 MISC:github.com:CVE-2020-12657 MISC:patchwork.kernel.org:CVE-2020-12657 OSS:2020/04/06/2 OSS:2020/04/30/5 OSS:2020/06/04/4 RH:CVE-2020-12657 RHSA-2020:2427 RHSA-2020:2428 RHSA-2020:2429 RHSA-2020:2567 RHSA-2020:2667 RHSA-2020:2669 SMASH Issue 259056 SUSE:openSUSE-SU-2020:0801 UBUNTU:CVE-2020-12657 USN-4363-1 USN-4367-1 USN-4368-1 USN-4369-1 bnc#1171205 bnc#1201585 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1708775 rh#1774983 rh#1795624 rh#1831726 rh#1831849 rh#1832860 rh#1832866 rh#1839634 rh#1842525 rh#1849926 |
CVE-2020-12659 | kernel-source-rt:Already fixed | moderate | 5.1 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H) | CONFIRM:security.netapp.com:CVE-2019-11599 CVE-2020-12659 MISC:bugzilla.kernel.org:CVE-2020-12659 MISC:cdn.kernel.org:CVE-2020-12659 MISC:git.kernel.org:CVE-2020-12659 MISC:github.com:CVE-2020-12659 OSS:2020/04/30/5 OSS:2020/06/04/4 RH:CVE-2020-12659 RHSA-2020:4431 RHSA-2020:4609 SMASH Issue 259057 SUSE:openSUSE-SU-2020:0801 UBUNTU:CVE-2020-12659 USN-4387-1 USN-4388-1 USN-4389-1 bnc#1171214 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1831726 rh#1831849 rh#1832860 rh#1832876 rh#1839634 rh#1842525 |
CVE-2020-12723 | perl:Released | moderate | 6.4 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H) | CONFIRM:github.com:CVE-2020-10543 CONFIRM:github.com:CVE-2020-12723 CONFIRM:security.netapp.com:CVE-2020-10543 CVE-2020-12723 FEDORA:FEDORA-2020-fd73c08076 GLSA-202006-03 L3:68185 MISC:github.com:CVE-2020-12723 MISC:www.oracle.com:CVE-2012-2098 MISC:www.oracle.com:CVE-2013-7285 MISC:www.oracle.com:CVE-2021-3450 MISC:www.oracle.com:CVE-2021-35666 MISC:www.oracle.com:CVE-2022-21403 MISC:www.oracle.com:CVE-2022-21498 N/A:N/A Oracle:CVE-2020-10543 Oracle:CVE-2020-10878 RH:CVE-2020-12723 RHSA-2021:0343 RHSA-2021:0557 RHSA-2021:0883 RHSA-2021:1032 RHSA-2021:1266 RHSA-2021:2184 SMASH Issue 259613 SMASH Issue 259614 SUSE:openSUSE-SU-2020:0850 UBUNTU:CVE-2020-12723 bnc#1171866 rh#1837975 rh#1837988 rh#1838000 |
CVE-2020-12762 | json-c:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) | CONFIRM:cert-portal.siemens.com:CVE-2021-25220 CONFIRM:github.com:CVE-2020-12762 CONFIRM:security.netapp.com:CVE-2020-12762 CVE-2020-12762 DSA-4741 FEDORA:FEDORA-2020-63c6f4ab1d FEDORA:FEDORA-2020-7eb7eac270 FEDORA:FEDORA-2020-847ad856ab GLSA-202006-13 L3:65298 MISC:github.com:CVE-2020-12762 MLIST:[debian-lts-announce] 20200531 [SECURITY] [DLA 2228-1] json-c security update MLIST:[debian-lts-announce] 20200531 [SECURITY] [DLA 2228-2] json-c regression update MLIST:[debian-lts-announce] 20200730 [SECURITY] [DLA 2301-1] json-c security update RH:CVE-2020-12762 RHSA-2021:4382 SMASH Issue 259359 UBUNTU:CVE-2020-12762 USN-4360-1 USN-4360-4 bnc#1171479 https://lists.debian.org/debian-lts-announce/2023/06/msg00023.html rh#1835253 |
CVE-2020-12768 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:cdn.kernel.org:CVE-2020-12768 CONFIRM:git.kernel.org:CVE-2020-12768 CVE-2020-12768 DSA-4699 OSS:2020/04/30/5 OSS:2020/06/04/4 RH:CVE-2020-12768 SMASH Issue 259365 UBUNTU:CVE-2020-12768 USN-4411-1 USN-4412-1 USN-4413-1 bdo#960271 bnc#1171736 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1831726 rh#1831849 rh#1832860 rh#1834829 rh#1839634 rh#1842525 |
CVE-2020-12769 | kernel-source-rt:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CONFIRM:cdn.kernel.org:CVE-2020-12769 CONFIRM:git.kernel.org:CVE-2020-12769 CONFIRM:lkml.org:CVE-2020-12769 CONFIRM:security.netapp.com:CVE-2019-11599 CVE-2020-12769 L3:64868 MISC:bugs.launchpad.net:CONFIRM:N/A MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update OSS:2020/04/06/2 OSS:2020/04/30/5 OSS:2020/06/04/4 OSS:2020/06/18/1 RH:CVE-2020-12769 SMASH Issue 259366 SUSE:openSUSE-SU-2020:0801 SUSE:openSUSE-SU-2020:0935 UBUNTU:CVE-2020-12769 USN-4391-1 bnc#1171983 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1774983 rh#1795624 rh#1831726 rh#1831849 rh#1832397 rh#1832860 rh#1834821 rh#1839634 rh#1842525 rh#1847832 rh#1849926 |
CVE-2020-12770 | kernel-source-rt:Released | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H) | CONFIRM:git.kernel.org:CVE-2020-12770 CONFIRM:lkml.org:CVE-2020-12770 CONFIRM:security.netapp.com:CVE-2019-11599 CVE-2020-12770 DSA-4698 DSA-4699 FEDORA:FEDORA-2020-4c69987c40 FEDORA:FEDORA-2020-5a69decc0c FEDORA:FEDORA-2020-c6b9fff7f8 MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update RH:CVE-2020-12770 RHSA-2020:4060 RHSA-2020:4062 RHSA-2020:4431 RHSA-2020:4609 RHSA-2020:5206 RHSA-2020:5430 RHSA-2020:5656 SMASH Issue 259367 UBUNTU:CVE-2020-12770 USN-4411-1 USN-4412-1 USN-4413-1 USN-4414-1 USN-4419-1 bdo#952660 bdo#960271 bnc#1171420 jsc#CAR-1908 rh#1834845 |
CVE-2020-12771 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:lkml.org:CVE-2020-12771 CONFIRM:security.netapp.com:CVE-2019-11599 CVE-2020-12771 MISC:www.oracle.com:CVE-2021-3450 MLIST:[debian-lts-announce] 20200812 [SECURITY] [DLA 2323-1] linux-4.19 new package MLIST:[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update MLIST:[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update OSS:2020/04/30/5 OSS:2020/06/18/1 OSS:2020/07/28/2 RH:CVE-2020-12771 SMASH Issue 259368 SUSE:openSUSE-SU-2020:1062 SUSE:openSUSE-SU-2020:1153 UBUNTU:CVE-2020-12771 USN-4462-1 USN-4463-1 USN-4465-1 USN-4483-1 USN-4485-1 bnc#1171732 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1708775 rh#1832397 rh#1832860 rh#1834862 rh#1839634 rh#1847832 rh#1849926 rh#1865751 |
CVE-2020-12826 | kernel-source-rt:Won't fix | moderate | 5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) | CONFIRM:security.netapp.com:CVE-2019-11599 CVE-2020-12826 MISC:cdn.kernel.org:CVE-2020-12657 MISC:github.com:CVE-2020-12826 MISC:lists.openwall.net:CVE-2020-10741 MISC:www.openwall.com:CVE-2020-10741 MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update RH:CVE-2020-12826 RHSA-2020:4060 RHSA-2020:4062 RHSA-2020:4431 RHSA-2020:4609 SMASH Issue 259558 UBUNTU:CVE-2020-12826 USN-4367-1 USN-4369-1 USN-4391-1 bnc#1171727 jsc#CAR-1249 rh#1822077 |
CVE-2020-12888 | kernel-source-rt:Released | moderate | 5.3 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2019-11599 CVE-2020-12888 FEDORA:FEDORA-2020-5436586091 FEDORA:FEDORA-2020-57bf620276 L3:64868 MISC:lore.kernel.org:CVE-2020-12888 MLIST:[debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update MLIST:[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update MLIST:[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update MLIST:[oss-security] 20200519 CVE-2020-12888 Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario OSS:2020/04/30/5 OSS:2020/06/18/1 OSS:2020/07/28/2 OSS:2020/Q2/129 RH:CVE-2020-12888 RHSA-2020:2664 RHSA-2020:2665 RHSA-2020:2831 RHSA-2020:2832 RHSA-2020:2851 RHSA-2020:2854 RHSA-2020:3010 RHSA-2020:3016 RHSA-2020:3019 RHSA-2020:3041 RHSA-2020:3222 RHSA-2020:3230 SMASH Issue 259583 SUSE:openSUSE-SU-2020:0935 SUSE:openSUSE-SU-2020:1153 UBUNTU:CVE-2020-12888 USN-4525-1 USN-4526-1 bnc#1171868 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:abafbc551fddede3e0a08dee1dcde08fc0eb8476 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1708775 rh#1832397 rh#1832860 rh#1836244 rh#1839634 rh#1847832 rh#1849926 rh#1865751 |
CVE-2020-13143 | kernel-source-rt:Released | low | 4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | CONFIRM:security.netapp.com:CVE-2019-11599 CVE-2020-13143 DSA-4698 DSA-4699 L3:64868 MISC:bugs.launchpad.net:CONFIRM:N/A MISC:git.kernel.org:CVE-2020-13143 MISC:www.spinics.net:CVE-2020-13143 MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update OSS:2020/04/06/2 OSS:2020/04/30/5 OSS:2020/06/04/4 OSS:2020/06/18/1 RH:CVE-2020-13143 SMASH Issue 259680 SMASH Issue 264267 SUSE:openSUSE-SU-2020:0801 SUSE:openSUSE-SU-2020:0935 UBUNTU:CVE-2020-13143 USN-4411-1 USN-4412-1 USN-4413-1 USN-4414-1 USN-4419-1 bdo#952660 bdo#960271 bnc#1171982 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1774983 rh#1795624 rh#1831726 rh#1831849 rh#1832397 rh#1832860 rh#1839634 rh#1842525 rh#1846382 rh#1847832 rh#1849926 |
CVE-2020-13434 | sqlite3:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2020-13434 CONFIRM:support.apple.com:CVE-2019-14899 CONFIRM:support.apple.com:CVE-2020-13434 CONFIRM:support.apple.com:CVE-2020-9773 CVE-2020-13434 FEDORA:FEDORA-2020-0477f8840e FREEBSD:FreeBSD-SA-20:22 FULLDISC:20201115 APPLE-SA-2020-11-13-3 Additional information for APPLE-SA-2020-09-16-1 iOS 14.0 and iPadOS 14.0 FULLDISC:20201115 APPLE-SA-2020-11-13-4 Additional information for APPLE-SA-2020-09-16-2 tvOS 14.0 FULLDISC:20201115 APPLE-SA-2020-11-13-6 Additional information for APPLE-SA-2020-09-16-4 watchOS 7.0 FULLDISC:20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1 GLSA-202007-26 L3:61084 MISC:www.oracle.com:CVE-2015-7501 MISC:www.oracle.com:CVE-2021-3450 MISC:www.oracle.com:CVE-2022-21498 MISC:www.sqlite.org:CVE-2020-13434 MLIST:[debian-lts-announce] 20200526 [SECURITY] [DLA 2221-1] sqlite3 MLIST:[debian-lts-announce] 20200822 [SECURITY] [DLA 2340-1] sqlite3 security update Oracle:CVE-2019-19646 Oracle:CVE-2020-13434 RH:CVE-2020-13434 RHSA-2021:1581 RHSA-2021:1968 SMASH Issue 260002 UBUNTU:CVE-2020-13434 USN-4394-1 bnc#1172115 bnc#1187849 rh#1841223 |
CVE-2020-13435 | sqlite3:Released | important | 7.1 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2020-13434 CONFIRM:support.apple.com:CVE-2019-14899 CONFIRM:support.apple.com:CVE-2020-13434 CONFIRM:support.apple.com:CVE-2020-9773 CVE-2020-13435 FEDORA:FEDORA-2020-0477f8840e FREEBSD:FreeBSD-SA-20:22 FULLDISC:20201115 APPLE-SA-2020-11-13-3 Additional information for APPLE-SA-2020-09-16-1 iOS 14.0 and iPadOS 14.0 FULLDISC:20201115 APPLE-SA-2020-11-13-4 Additional information for APPLE-SA-2020-09-16-2 tvOS 14.0 FULLDISC:20201115 APPLE-SA-2020-11-13-6 Additional information for APPLE-SA-2020-09-16-4 watchOS 7.0 FULLDISC:20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1 GLSA-202007-26 MISC:www.oracle.com:CVE-2015-7501 MISC:www.oracle.com:CVE-2021-3450 MISC:www.sqlite.org:CVE-2020-13435 RH:CVE-2020-13435 RHSA-2021:4396 SMASH Issue 260003 SMASH Issue 260079 UBUNTU:CVE-2020-13435 USN-4394-1 bnc#1172091 rh#1841231 |
CVE-2020-13529 | systemd:Not affected | moderate | 6.1 (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2020-13529 CVE-2020-13529 D:CVE-2020-13529 FEDORA:FEDORA-2021-166e461c8d GLSA-202107-48 MISC:github.com:MLIST:[oss-security] 20210907 Re: Pop!_OS Membership to linux-distros list MISC:talosintelligence.com:CVE-2020-13529 MLIST:[oss-security] 20210804 Re: Pop!_OS Membership to linux-distros list MLIST:[oss-security] 20210817 Re: Pop!_OS Membership to linux-distros list MLIST:[oss-security] 20210907 Re: Pop!_OS Membership to linux-distros list OSS:2021/Q3/67 RHSA-2021:4361 SMASH Issue 283925 bnc#1185972 rh#1959397 |
CVE-2020-13630 | sqlite3:Released | moderate | 5.4 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L) | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2020-13630 CONFIRM:support.apple.com:CVE-2019-14899 CONFIRM:support.apple.com:CVE-2020-13434 CONFIRM:support.apple.com:CVE-2020-9773 CVE-2020-13630 FEDORA:FEDORA-2020-0477f8840e FREEBSD:FreeBSD-SA-20:22 FULLDISC:20201115 APPLE-SA-2020-11-13-3 Additional information for APPLE-SA-2020-09-16-1 iOS 14.0 and iPadOS 14.0 FULLDISC:20201115 APPLE-SA-2020-11-13-4 Additional information for APPLE-SA-2020-09-16-2 tvOS 14.0 FULLDISC:20201115 APPLE-SA-2020-11-13-6 Additional information for APPLE-SA-2020-09-16-4 watchOS 7.0 FULLDISC:20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1 GLSA-202007-26 MISC:bugs.chromium.org:CVE-2020-13630 MISC:sqlite.org:CVE-2020-13630 MISC:www.oracle.com:CVE-2013-7285 MISC:www.oracle.com:CVE-2015-7501 MLIST:[debian-lts-announce] 20200822 [SECURITY] [DLA 2340-1] sqlite3 security update Oracle:CVE-2020-13631 RH:CVE-2020-13630 RHSA-2020:4442 RHSA-2021:1968 SMASH Issue 260164 UBUNTU:CVE-2020-13630 USN-4394-1 bnc#1172234 rh#1841562 |
CVE-2020-13631 | sqlite3:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N) | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2020-13630 CONFIRM:support.apple.com:CVE-2019-14899 CONFIRM:support.apple.com:CVE-2020-13434 CONFIRM:support.apple.com:CVE-2020-9773 CVE-2020-13631 FEDORA:FEDORA-2020-0477f8840e FREEBSD:FreeBSD-SA-20:22 FULLDISC:20201115 APPLE-SA-2020-11-13-3 Additional information for APPLE-SA-2020-09-16-1 iOS 14.0 and iPadOS 14.0 FULLDISC:20201115 APPLE-SA-2020-11-13-4 Additional information for APPLE-SA-2020-09-16-2 tvOS 14.0 FULLDISC:20201115 APPLE-SA-2020-11-13-6 Additional information for APPLE-SA-2020-09-16-4 watchOS 7.0 FULLDISC:20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1 GLSA-202007-26 MISC:bugs.chromium.org:CVE-2020-13630 MISC:sqlite.org:CVE-2020-13631 MISC:www.oracle.com:CVE-2013-7285 MISC:www.oracle.com:CVE-2015-7501 MLIST:[guacamole-issues] 20210618 [jira] [Created] (GUACAMOLE-1368) Latest docker image fails security scans. Oracle:CVE-2020-13631 RH:CVE-2020-13631 RHSA-2020:4442 RHSA-2021:1968 SMASH Issue 260165 UBUNTU:CVE-2020-13631 USN-4394-1 bnc#1172236 rh#1841562 rh#1841568 |
CVE-2020-13632 | sqlite3:Released | moderate | 4.3 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2020-13630 CVE-2020-13632 FEDORA:FEDORA-2020-0477f8840e FREEBSD:FreeBSD-SA-20:22 GLSA-202007-26 MISC:bugs.chromium.org:CVE-2020-13630 MISC:sqlite.org:CVE-2020-13632 MISC:www.oracle.com:CVE-2013-7285 MISC:www.oracle.com:CVE-2015-7501 MLIST:[debian-lts-announce] 20200822 [SECURITY] [DLA 2340-1] sqlite3 security update Oracle:CVE-2020-13631 RH:CVE-2020-13632 RHSA-2020:4442 RHSA-2021:1968 SMASH Issue 260166 UBUNTU:CVE-2020-13632 USN-4394-1 bnc#1172240 rh#1841562 rh#1841574 |
CVE-2020-13777 | gnutls:Released | important | 7.4 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N) | CONFIRM:gnutls.org:CVE-2020-13777 CONFIRM:security.netapp.com:CVE-2020-13777 CVE-2020-13777 DSA-4697 FEDORA:FEDORA-2020-0cce3578e2 FEDORA:FEDORA-2020-4f78f122a3 FEDORA:FEDORA-2020-76b705bb63 FEDORA:FEDORA-2020-ea11cb5ccc GLSA-202006-01 RH:CVE-2020-13777 RHSA-2020:2637 RHSA-2020:2638 RHSA-2020:2639 SMASH Issue 260689 SUSE:openSUSE-SU-2020:0790 UBUNTU:CVE-2020-13777 USN-4384-1 bdo#962289 bnc#1172506 https://www.debian.org/security/2020/dsa-4697 rh#1843723 |
CVE-2020-13844 | gcc:Released, gcc7:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CONFIRM:developer.arm.com:CVE-2017-5754 CONFIRM:developer.arm.com:CVE-2020-13844 CONFIRM:gcc.gnu.org:CVE-2020-13844 CONFIRM:lists.llvm.org:CVE-2020-13844 CVE-2020-13844 MISC:developer.arm.com:CVE-2020-13844 RH:CVE-2020-13844 SMASH Issue 260950 SUSE:openSUSE-SU-2020:1692 SUSE:openSUSE-SU-2020:1693 UBUNTU:CVE-2020-13844 bnc#1172798 bnc#1172875 rh#1848279 |
CVE-2020-13974 | kernel-source-rt:Released | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2020-13974 L3:64868 MISC:git.kernel.org:CVE-2020-13974 MISC:lkml.org:CVE-2020-13974 MISC:www.oracle.com:CVE-2022-21586 MLIST:[debian-lts-announce] 20200812 [SECURITY] [DLA 2323-1] linux-4.19 new package OSS:2020/04/30/5 OSS:2020/06/18/1 OSS:2020/07/28/2 RHSA-2022:1975 RHSA-2022:1988 SMASH Issue 260964 SUSE:openSUSE-SU-2020:0935 SUSE:openSUSE-SU-2020:1153 UBUNTU:CVE-2020-13974 USN-4427-1 USN-4439-1 USN-4440-1 USN-4483-1 USN-4485-1 bnc#1172775 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1708775 rh#1831849 rh#1832397 rh#1832860 rh#1839634 rh#1847832 rh#1849926 rh#1865751 rh#2016169 |
CVE-2020-14145 | openssh:Released | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N) | CONFIRM:security.netapp.com:CVE-2020-14145 CVE-2020-14145 GLSA-202105-35 L3:58527 MISC:anongit.mindrot.org:MLIST:[oss-security] 20201202 Some mitigation for openssh CVE-2020-14145 MISC:docs.ssh-mitm.at:CVE-2020-14145 MISC:github.com:CVE-2020-14145 MISC:www.fzi.de:CVE-2020-14002 MLIST:[oss-security] 20201202 Some mitigation for openssh CVE-2020-14145 OSS:2020/05/27/1 OSS:2020/Q4/178 RH:CVE-2020-14145 RHSA-2021:4368 SMASH Issue 262543 UBUNTU:CVE-2020-14145 bnc#1173513 bnc#1177569 rh#1852930 rh#1860487 |
CVE-2020-14155 | pcre:Released | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:about.gitlab.com:CVE-2020-14155 CONFIRM:security.netapp.com:CVE-2020-14155 CONFIRM:support.apple.com:CVE-2019-14899 CONFIRM:support.apple.com:CVE-2019-20838 CONFIRM:www.pcre.org:CVE-2015-2325 CVE-2020-14155 FULLDISC:20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1 FULLDISC:20210201 APPLE-SA-2021-02-01-1 macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave L3:58310 L3:58341 MISC:bugs.gentoo.org:CVE-2019-20838 MISC:lists.apache.org:/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E MISC:www.oracle.com:CVE-2022-21498 MLIST:[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar Oracle:CVE-2020-14155 RH:CVE-2020-14155 RHSA-2021:4373 RHSA-2021:4613 RHSA-2021:4614 SMASH Issue 261553 UBUNTU:CVE-2020-14155 bnc#1172974 bnc#1176477 bnc#1176602 jsc#CAR-656 rh#1848436 |
CVE-2020-14304 | kernel-source-rt:Ignore | low | 2.3 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N) | CONFIRM:bugzilla.redhat.com:CVE-2020-14304 CVE-2020-14304 RH:CVE-2020-14304 SMASH Issue 262238 UBUNTU:CVE-2020-14304 bdo#960702 bnc#1173327 rh#1847539 |
CVE-2020-14305 | kernel-source-rt:Not affected | moderate | 4.3 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N) | CONFIRM:security.netapp.com:CVE-2020-14305 CVE-2020-14305 MISC:bugs.openvz.org:CVE-2020-14305 MISC:patchwork.ozlabs.org:CVE-2020-14305 RH:CVE-2020-14305 RHSA-2020:4060 RHSA-2020:4062 SMASH Issue 262272 UBUNTU:CVE-2020-14305 bnc#1173346 rh#1850716 |
CVE-2020-14314 | kernel-source-rt:Released | low | 2.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:bugzilla.redhat.com:CVE-2020-14314 CVE-2020-14314 MISC:git.kernel.org:CVE-2020-14314 MISC:lore.kernel.org:CVE-2020-14314 MISC:www.starwindsoftware.com:CVE-2020-14314 MLIST:[debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update MLIST:[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update MLIST:[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update RH:CVE-2020-14314 RHSA-2020:5437 RHSA-2020:5441 RHSA-2021:1578 RHSA-2021:1739 SMASH Issue 262901 UBUNTU:CVE-2020-14314 USN-4576-1 USN-4578-1 USN-4579-1 bnc#1173798 rh#1853922 |
CVE-2020-14331 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2020-14331 MISC:lists.openwall.net:CVE-2020-14331 MISC:www.openwall.com:CVE-2020-14331 MLIST:[debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update MLIST:[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update MLIST:[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update OSS:2020/06/18/1 OSS:2020/07/28/2 OSS:2020/Q3/61 RH:CVE-2020-14331 RHSA-2020:4286 RHSA-2020:4289 RHSA-2020:5023 RHSA-2020:5026 SMASH Issue 263842 SMASH Issue 263843 UBUNTU:CVE-2020-14331 bnc#1174205 bnc#1174247 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:ebfdfeeae8c01fcb2b3b74ffaf03876e20835d2d linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1708775 rh#1832397 rh#1847832 rh#1849926 rh#1858679 rh#1865751 |
CVE-2020-14343 | python-PyYAML:Released | important | 8.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) | CVE-2020-14343 L3:63616 MISC:www.oracle.com:CVE-2022-21498 MISC:www.oracle.com:CVE-2022-21586 Oracle:CVE-2020-14343 RH:CVE-2020-14343 RHSA-2021:2583 RHSA-2021:4702 SMASH Issue 264211 UBUNTU:CVE-2020-14343 bnc#1174514 bnc#1201021 https://github.com/SeldonIO/seldon-core/issues/2252 https://github.com/yaml/pyyaml/issues/420 rh#1860466 |
CVE-2020-14351 | kernel-source-rt:Released | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2020-14351 MLIST:[debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update MLIST:[debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update RH:CVE-2020-14351 RHSA-2021:0537 RHSA-2021:0558 RHSA-2021:0686 RHSA-2021:0765 RHSA-2021:0774 RHSA-2021:0848 RHSA-2021:0856 RHSA-2021:0857 RHSA-2021:0878 RHSA-2021:1028 RHSA-2021:1267 SMASH Issue 268404 UBUNTU:CVE-2020-14351 bnc#1177086 rh#1862849 |
CVE-2020-14356 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2020-14356 CVE-2020-14356 MISC:bugzilla.kernel.org:CVE-2020-14356 MISC:lore.kernel.org:CVE-2020-14356 MLIST:[debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update MLIST:[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update MLIST:[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update RH:CVE-2020-14356 RHSA-2021:1578 RHSA-2021:1739 SMASH Issue 265138 SUSE:openSUSE-SU-2020:1236 SUSE:openSUSE-SU-2020:1325 UBUNTU:CVE-2020-14356 USN-4483-1 USN-4484-1 USN-4526-1 bnc#1175213 rh#1868453 rh#1877920 |
CVE-2020-14381 | kernel-source-rt:Already fixed | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2020-14381 MISC:git.kernel.org:CVE-2020-14381 RH:CVE-2020-14381 RHSA-2020:4431 RHSA-2020:4609 SMASH Issue 266398 UBUNTU:CVE-2020-14381 bnc#1176011 bnc#1176012 rh#1874311 |
CVE-2020-14385 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:bugzilla.redhat.com:CVE-2020-14385 CVE-2020-14385 MISC:git.kernel.org:CVE-2020-14385 MLIST:[debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update RH:CVE-2020-14385 RHSA-2020:4286 RHSA-2020:4287 RHSA-2020:4289 RHSA-2020:4331 RHSA-2020:4332 RHSA-2020:5050 RHSA-2020:5199 RHSA-2020:5437 RHSA-2020:5441 SMASH Issue 266667 SUSE:openSUSE-SU-2020:1586 UBUNTU:CVE-2020-14385 USN-4576-1 bnc#1176137 rh#1874800 |
CVE-2020-14386 | kernel-source-rt:Released | important | 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:bugzilla.redhat.com:CVE-2020-14386 CVE-2020-14386 FEDORA:FEDORA-2020-468121099e MISC:git.kernel.org:CVE-2020-14386 MISC:packetstormsecurity.com:CVE-2020-14386 MISC:seclists.org:CVE-2020-14386 MLIST:[debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update MLIST:[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update MLIST:[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update OSS:2020/Q3/146 OSS:2021/09/17/2 OSS:2021/09/17/4 OSS:2021/09/21/1 OSS:2021/Q3/176 RH:CVE-2020-14386 RHSA-2020:4286 RHSA-2020:4287 RHSA-2020:4289 RHSA-2020:4331 RHSA-2020:4332 RHSA-2020:5199 SMASH Issue 266581 SMASH Issue 266669 SUSE:openSUSE-SU-2020:1655 UBUNTU:CVE-2020-14386 bnc#1176069 linux.git:commit:acf69c946233259ab4d64f8869d4037a198c7f06 rh#1875699 |
CVE-2020-14390 | kernel-source-rt:Released | important | 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2020-14390 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2020-14390 MISC:seclists.org:CVE-2020-14390 MISC:www.openwall.com:CVE-2020-14390 MLIST:[debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update MLIST:[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update MLIST:[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update OSS:2020/Q3/174 RH:CVE-2020-14390 SMASH Issue 266807 SUSE:openSUSE-SU-2020:1586 SUSE:openSUSE-SU-2020:1655 UBUNTU:CVE-2020-14390 bnc#1176235 bnc#1176253 rh#1876788 |
CVE-2020-14416 | kernel-source-rt:Released | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2020-14416 L3:64868 MISC:cdn.kernel.org:CVE-2020-14416 MISC:git.kernel.org:CVE-2020-14416 OSS:2020/04/30/5 OSS:2020/06/04/4 OSS:2020/06/18/1 OSS:2020/07/28/2 RH:CVE-2020-14416 SMASH Issue 261786 SUSE:openSUSE-SU-2020:0935 SUSE:openSUSE-SU-2020:1153 UBUNTU:CVE-2020-14416 bnc#1162002 bnc#1173105 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1708775 rh#1831726 rh#1831849 rh#1832397 rh#1832860 rh#1839634 rh#1842525 rh#1847832 rh#1849926 rh#1865751 |
CVE-2020-14422 | python3:Released | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2020-14422 CVE-2020-14422 FEDORA:FEDORA-2020-1ddd5273d6 FEDORA:FEDORA-2020-705c6ea5be FEDORA:FEDORA-2020-87c0a0a52d FEDORA:FEDORA-2020-982b2950db FEDORA:FEDORA-2020-b513391ca8 FEDORA:FEDORA-2020-bb919e575e FEDORA:FEDORA-2020-c3b07cc5c9 FEDORA:FEDORA-2020-c539babb0a FEDORA:FEDORA-2020-d30881c970 FEDORA:FEDORA-2020-d808fdd597 FEDORA:FEDORA-2020-dfb11916cc FEDORA:FEDORA-2020-efb908b6a8 GLSA-202008-01 MISC:bugs.python.org:CVE-2020-14422 MISC:github.com:CVE-2020-14422 MISC:www.oracle.com:CVE-2012-2098 MLIST:[debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update RH:CVE-2020-14422 RHSA-2020:4285 RHSA-2020:4299 RHSA-2020:4433 RHSA-2020:4641 RHSA-2020:5010 SMASH Issue 261807 SUSE:openSUSE-SU-2020:0931 SUSE:openSUSE-SU-2020:0940 SUSE:openSUSE-SU-2020:0989 SUSE:openSUSE-SU-2020:1002 UBUNTU:CVE-2020-14422 USN-4428-1 bnc#1173274 https://lists.debian.org/debian-lts-announce/2023/05/msg00016.html rh#1854926 rh#1856481 |
CVE-2020-14871 | openssh:Not affected | critical | () | CVE-2020-14871 MISC:packetstormsecurity.com:CVE-2020-14871 MISC:www.oracle.com:CVE-2013-7285 MLIST:[oss-security] 20210302 Announce: OpenSSH 8.5 released OSS:2021/Q1/190 Oracle:CVE-2020-14871 SMASH Issue 269926 bnc#1183542 |
CVE-2020-15358 | sqlite3:Released | moderate | 6.3 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2020-15358 CONFIRM:support.apple.com:CVE-2019-14899 CONFIRM:support.apple.com:CVE-2019-20838 CONFIRM:support.apple.com:CVE-2020-13434 CONFIRM:support.apple.com:CVE-2020-15358 CONFIRM:support.apple.com:CVE-2020-9773 CVE-2020-15358 FULLDISC:20201115 APPLE-SA-2020-11-13-3 Additional information for APPLE-SA-2020-09-16-1 iOS 14.0 and iPadOS 14.0 FULLDISC:20201115 APPLE-SA-2020-11-13-4 Additional information for APPLE-SA-2020-09-16-2 tvOS 14.0 FULLDISC:20201115 APPLE-SA-2020-11-13-6 Additional information for APPLE-SA-2020-09-16-4 watchOS 7.0 FULLDISC:20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1 FULLDISC:20210201 APPLE-SA-2021-02-01-1 macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave GLSA-202007-26 L3:60104 MISC:www.oracle.com:CVE-2012-2098 MISC:www.oracle.com:CVE-2013-7285 MISC:www.oracle.com:CVE-2021-3450 MISC:www.oracle.com:CVE-2022-21498 MISC:www.sqlite.org:CVE-2020-15358 RH:CVE-2020-15358 RHSA-2021:1581 SMASH Issue 262458 SMASH Issue 301422 UBUNTU:CVE-2020-15358 USN-4438-1 bnc#1173641 bnc#1183309 rh#1851957 |
CVE-2020-15393 | kernel-source-rt:Released | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2020-15393 MISC:git.kernel.org:CVE-2020-15393 MISC:lkml.org:CVE-2020-15393 MLIST:[debian-lts-announce] 20200812 [SECURITY] [DLA 2323-1] linux-4.19 new package MLIST:[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update MLIST:[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update OSS:2020/04/30/5 OSS:2020/06/18/1 OSS:2020/07/28/2 RH:CVE-2020-15393 SMASH Issue 262568 SUSE:openSUSE-SU-2020:1062 SUSE:openSUSE-SU-2020:1153 UBUNTU:CVE-2020-15393 USN-4463-1 USN-4465-1 USN-4483-1 USN-4485-1 bnc#1173514 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1708775 rh#1832397 rh#1832860 rh#1839634 rh#1847832 rh#1849926 rh#1852584 rh#1865751 |
CVE-2020-15436 | kernel-source-rt:Released | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2020-15436 CVE-2020-15436 MISC:lkml.org:CVE-2020-15436 RH:CVE-2020-15436 RHSA-2021:0336 RHSA-2021:0338 RHSA-2021:0354 RHSA-2021:1376 RHSA-2021:2523 SMASH Issue 272188 bnc#1179141 rh#1901168 |
CVE-2020-15437 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2020-15437 MISC:lkml.org:CVE-2020-15437 RH:CVE-2020-15437 RHSA-2021:1578 RHSA-2021:1739 SMASH Issue 272189 bnc#1179140 rh#1901161 |
CVE-2020-15780 | kernel-source-rt:Released | important | 7.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N) | CVE-2020-15780 MISC:cdn.kernel.org:CVE-2020-15780 MISC:cve.mitre.org:MLIST:[oss-security] 20200730 Re: UEFI SecureBoot bypass fixes rolled out to kernels below radar MISC:git.kernel.org:CVE-2020-15780 MISC:git.zx2c4.com:CVE-2020-15780 MISC:www.openwall.com:MLIST:[oss-security] 20200730 Re: UEFI SecureBoot bypass fixes rolled out to kernels below radar MLIST:[oss-security] 20200720 Re: Re: lockdown bypass on mainline kernel for loading unsigned modules MLIST:[oss-security] 20200729 multiple secure boot grub2 and linux kernel vulnerabilities MLIST:[oss-security] 20200730 Re: UEFI SecureBoot bypass fixes rolled out to kernels below radar MLIST:[oss-security] 20200730 UEFI SecureBoot bypass fixes rolled out to kernels below radar OSS:2020/04/30/5 OSS:2020/06/18/1 OSS:2020/07/28/2 OSS:2020/Q3/42 OSS:2020/Q3/65 OSS:2020/Q3/67 RH:CVE-2020-15780 RHSA-2020:3218 RHSA-2020:3219 RHSA-2020:3222 RHSA-2020:3228 SMASH Issue 262663 SMASH Issue 263830 SUSE:openSUSE-SU-2020:1153 SUSE:openSUSE-SU-2020:1236 UBUNTU:CVE-2020-15780 USN-4425-1 USN-4426-1 USN-4439-1 USN-4440-1 bnc#1173573 bnc#1174186 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1708775 rh#1832397 rh#1832860 rh#1839634 rh#1847832 rh#1849926 rh#1852962 rh#1857894 rh#1865751 |
CVE-2020-15888 | lua53:Not affected | important | 7.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H) | CVE-2020-15888 MISC:github.com:CVE-2020-15888 MISC:lua-users.org:CVE-2020-15888 RH:CVE-2020-15888 SMASH Issue 264073 UBUNTU:CVE-2020-15888 bnc#1174367 rh#1860310 |
CVE-2020-16119 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:lore.kernel.org:CVE-2020-16119 CONFIRM:security.netapp.com:CVE-2020-16119 CVE-2020-16119 OSS:2020/Q4/59 RH:CVE-2020-16119 SMASH Issue 268976 SMASH Issue 268977 UBUNTU:CVE-2020-16119 bdo#993948 bdo#993978 bnc#1177471 git.launchpad.net:CVE-2020-16119 launchpad.net:CVE-2020-16119 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 rh#1886374 ubuntu.com:CVE-2020-16119 |
CVE-2020-16120 | kernel-source-rt:Released | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) | CONFIRM:git.kernel.org:CVE-2020-16120 CONFIRM:www.openwall.com:CVE-2020-16120 CVE-2020-16120 MISC:bugs.debian.org:CONFIRM:www.openwall.com:CVE-2020-16120 OSS:2020/Q4/58 RH:CVE-2020-16120 SMASH Issue 268974 SMASH Issue 268975 UBUNTU:CVE-2020-16120 bnc#1177470 launchpad.net:CVE-2020-16120 rh#1886387 ubuntu.com:CVE-2020-16119 |
CVE-2020-16155 | perl:Not affected | moderate | 5.3 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2020-16155 MISC:blog.hackeriet.no:CVE-2020-16156 MISC:metacpan.org:CVE-2020-16155 SMASH Issue 317301 bnc#1193811 |
CVE-2020-16156 | perl:Won't fix | important | 8.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N) | CVE-2020-16156 FEDORA:FEDORA-2022-21e8372c42 FEDORA:FEDORA-2022-84fd87f7eb L3:63619 MISC:blog.hackeriet.no:CVE-2020-16156 MISC:blogs.perl.org:CVE-2020-16156 MISC:metacpan.org:CVE-2020-16156 Oracle:CVE-2020-16156 SMASH Issue 317300 bnc#1193771 bnc#1201023 jsc#CAR-1756 rh#2035273 |
CVE-2020-16166 | kernel-source-rt:Released | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N) | CONFIRM:security.netapp.com:CVE-2020-16166 CVE-2020-16166 FEDORA:FEDORA-2020-2cd6393548 FEDORA:FEDORA-2020-8d634e31c0 MISC:arxiv.org:CVE-2020-16166 MISC:git.kernel.org:CVE-2020-16166 MISC:github.com:CVE-2020-16166 MISC:www.oracle.com:CVE-2021-3450 MLIST:[debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update MLIST:[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update MLIST:[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update OSS:2020/06/18/1 OSS:2020/07/28/2 RH:CVE-2020-16166 RHSA-2020:4279 RHSA-2020:5418 RHSA-2020:5428 RHSA-2020:5473 RHSA-2020:5506 RHSA-2021:0184 SMASH Issue 264603 SUSE:openSUSE-SU-2020:1153 SUSE:openSUSE-SU-2020:1236 UBUNTU:CVE-2020-16166 USN-4525-1 USN-4526-1 bnc#1174757 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1708775 rh#1832397 rh#1847832 rh#1849926 rh#1865751 |
CVE-2020-16590 | binutils:Not affected | low | 4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | CONFIRM:security.netapp.com:CVE-2020-16590 CVE-2020-16590 MISC:sourceware.org:CVE-2020-16590 RH:CVE-2020-16590 SMASH Issue 273028 bnc#1179898 jsc#CAR-1440 rh#1906782 |
CVE-2020-16591 | binutils:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2020-16590 CVE-2020-16591 MISC:sourceware.org:CVE-2020-16591 RH:CVE-2020-16591 SMASH Issue 273029 bnc#1179899 jsc#CAR-1441 rh#1906771 |
CVE-2020-16592 | binutils:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2020-16590 CVE-2020-16592 FEDORA:FEDORA-2020-18ec0bf4bb FEDORA:FEDORA-2020-f903e139b1 MISC:sourceware.org:CVE-2020-16592 RH:CVE-2020-16592 SMASH Issue 273030 bnc#1179900 jsc#CAR-1442 rh#1906777 |
CVE-2020-16593 | binutils:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2020-16593 CVE-2020-16593 MISC:sourceware.org:CVE-2020-16593 RH:CVE-2020-16593 SMASH Issue 273031 bnc#1179901 jsc#CAR-1443 rh#1906772 |
CVE-2020-16598 | binutils:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CVE-2020-16598 MISC:sourceware.org:CVE-2020-16598 RH:CVE-2020-16598 SMASH Issue 273032 bnc#1179902 jsc#CAR-1444 rh#1906756 rh#1906772 |
CVE-2020-16599 | binutils:Already fixed | low | 4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | CONFIRM:security.netapp.com:CVE-2020-16593 CVE-2020-16599 MISC:sourceware.org:CVE-2020-16599 RH:CVE-2020-16599 SMASH Issue 273033 bnc#1179903 jsc#CAR-1445 rh#1906762 rh#2150768 |
CVE-2020-1747 | python-PyYAML:Released | important | 8.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) | CONFIRM:bugzilla.redhat.com:CVE-2020-1747 CVE-2020-1747 FEDORA:FEDORA-2020-40c35d7b37 FEDORA:FEDORA-2020-bdb0bfa928 FEDORA:FEDORA-2020-e9741a6a15 FEDORA:FEDORA-2021-3342569a0f FEDORA:FEDORA-2021-eed7193502 MISC:github.com:CVE-2020-1747 MISC:www.oracle.com:CVE-2022-21586 Oracle:CVE-2020-14343 RH:CVE-2020-1747 RHSA-2020:4641 SMASH Issue 254019 SUSE:openSUSE-SU-2020:0507 SUSE:openSUSE-SU-2020:0630 UBUNTU:CVE-2020-1747 bnc#1165439 rh#1807367 rh#1860466 |
CVE-2020-1749 | kernel-source-rt:Released | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) | CONFIRM:bugzilla.redhat.com:CVE-2020-1749 CVE-2020-1749 L3:61406 OSS:2020/06/04/4 RH:CVE-2020-1749 RHSA-2020:1567 RHSA-2020:1769 RHSA-2020:4060 RHSA-2020:4062 RHSA-2021:0354 SMASH Issue 254158 UBUNTU:CVE-2020-1749 bnc#1165629 bnc#1165631 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1809833 rh#1842525 |
CVE-2020-1752 | glibc:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H) | CONFIRM:bugzilla.redhat.com:CVE-2020-1752 CONFIRM:security.netapp.com:CVE-2020-1752 CONFIRM:sourceware.org:CVE-2020-1752 CVE-2020-1752 GLSA-202101-20 MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 MLIST:[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 MLIST:[debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update RH:CVE-2020-1752 RHSA-2020:4444 SMASH Issue 254346 UBUNTU:CVE-2020-1752 USN-4416-1 bnc#1167631 rh#1810670 rh#1810718 |
CVE-2020-19185 | ncurses:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CVE-2020-19185 SMASH Issue 375945 bnc#1214489 http://seclists.org/fulldisclosure/2023/Dec/10 http://seclists.org/fulldisclosure/2023/Dec/11 http://seclists.org/fulldisclosure/2023/Dec/9 https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc1.md https://security.netapp.com/advisory/ntap-20231006-0005/ https://support.apple.com/kb/HT214036 https://support.apple.com/kb/HT214037 https://support.apple.com/kb/HT214038 jsc#CAR-2823 rh#2234924 |
CVE-2020-19186 | ncurses:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CVE-2020-19186 SMASH Issue 375946 bnc#1214490 http://seclists.org/fulldisclosure/2023/Dec/10 http://seclists.org/fulldisclosure/2023/Dec/11 http://seclists.org/fulldisclosure/2023/Dec/9 https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc2.md https://security.netapp.com/advisory/ntap-20231006-0005/ https://support.apple.com/kb/HT214036 https://support.apple.com/kb/HT214037 https://support.apple.com/kb/HT214038 jsc#CAR-2826 rh#2234908 |
CVE-2020-19187 | ncurses:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CVE-2020-19187 SMASH Issue 375947 bnc#1214491 http://seclists.org/fulldisclosure/2023/Dec/10 http://seclists.org/fulldisclosure/2023/Dec/11 http://seclists.org/fulldisclosure/2023/Dec/9 https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc3.md https://security.netapp.com/advisory/ntap-20231006-0005/ https://support.apple.com/kb/HT214036 https://support.apple.com/kb/HT214037 https://support.apple.com/kb/HT214038 jsc#CAR-2830 rh#2234911 |
CVE-2020-19188 | ncurses:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CVE-2020-19188 SMASH Issue 375948 bnc#1214492 http://seclists.org/fulldisclosure/2023/Dec/10 http://seclists.org/fulldisclosure/2023/Dec/11 http://seclists.org/fulldisclosure/2023/Dec/9 https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc4.md https://security.netapp.com/advisory/ntap-20231006-0005/ https://support.apple.com/kb/HT214036 https://support.apple.com/kb/HT214037 https://support.apple.com/kb/HT214038 jsc#CAR-2825 rh#2234913 |
CVE-2020-19189 | ncurses:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CVE-2020-19189 SMASH Issue 375949 bnc#1214493 http://seclists.org/fulldisclosure/2023/Dec/10 http://seclists.org/fulldisclosure/2023/Dec/11 http://seclists.org/fulldisclosure/2023/Dec/9 https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc5.md https://lists.debian.org/debian-lts-announce/2023/09/msg00033.html https://security.netapp.com/advisory/ntap-20231006-0005/ https://support.apple.com/kb/HT214036 https://support.apple.com/kb/HT214037 https://support.apple.com/kb/HT214038 jsc#CAR-2824 rh#2234926 |
CVE-2020-19190 | ncurses:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CVE-2020-19190 SMASH Issue 375950 bnc#1214494 http://seclists.org/fulldisclosure/2023/Dec/10 http://seclists.org/fulldisclosure/2023/Dec/11 http://seclists.org/fulldisclosure/2023/Dec/9 https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc6.md https://security.netapp.com/advisory/ntap-20231006-0005/ https://support.apple.com/kb/HT214036 https://support.apple.com/kb/HT214037 https://support.apple.com/kb/HT214038 jsc#CAR-2827 rh#2234923 |
CVE-2020-1967 | openssl-1_1:Released | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:git.openssl.org:CVE-2020-1967 CONFIRM:kb.pulsesecure.net:CVE-2020-1967 CONFIRM:security.netapp.com:CVE-2020-14539 CONFIRM:security.netapp.com:CVE-2020-1967 CONFIRM:www.openssl.org:CVE-2020-1967 CONFIRM:www.synology.com:CVE-2020-1967 CONFIRM:www.tenable.com:CVE-2019-1551 CONFIRM:www.tenable.com:CVE-2020-1967 CONFIRM:www.tenable.com:CVE-2021-3449 CVE-2020-1967 DSA-4661 FEDORA:FEDORA-2020-d7b29838f6 FEDORA:FEDORA-2020-da2d1ef2d7 FEDORA:FEDORA-2020-fcc91a28e8 FREEBSD:FreeBSD-SA-20:11 FULLDISC:20200501 CVE-2020-1967: proving sigalg != NULL GLSA-202004-10 MISC:github.com:CVE-2020-1967 MISC:packetstormsecurity.com:CVE-2020-1967 MISC:www.oracle.com:CVE-2012-2098 MISC:www.oracle.com:CVE-2013-7285 MISC:www.oracle.com:CVE-2015-7501 MISC:www.oracle.com:CVE-2021-3450 MLIST:[oss-security] 20200422 [CVE-2020-1967] OpenSSL 1.1.1d+ Segmentation fault in SSL_check_chain MLIST:[tomcat-dev] 20200422 Re: Time for Tomcat Native 1.2.24? MLIST:[tomcat-dev] 20200422 Time for Tomcat Native 1.2.24? MLIST:[tomcat-dev] 20200423 Re: Time for Tomcat Native 1.2.24? OSS:2020/Q2/53 Oracle:CVE-2020-1967 RH:CVE-2020-1967 SMASH Issue 257025 SMASH Issue 257026 SUSE:openSUSE-SU-2020:0933 SUSE:openSUSE-SU-2020:0945 UBUNTU:CVE-2020-1967 bnc#1169407 openssl.git:commit:3656c08ab4b1b892730cb5e808b6f4298b08a2e6 openssl.git:commit:a87f3fe01a5a894aa27ccd6a239155fd129988e4 rh#1823670 |
CVE-2020-1968 | openssl-1_1:Not affected | moderate | 5.3 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N) | CONFIRM:security.netapp.com:CVE-2020-1968 CONFIRM:www.openssl.org:CVE-2020-1968 CVE-2020-1968 GLSA-202210-02 MISC:www.oracle.com:CVE-2012-2098 MISC:www.oracle.com:CVE-2021-3450 MISC:www.oracle.com:CVE-2021-35666 MISC:www.oracle.com:CVE-2022-21498 MLIST:[debian-lts-announce] 20200925 [SECURITY] [DLA 2378-1] openssl1.0 security update N/A:N/A Oracle:CVE-2020-1968 RH:CVE-2020-1968 SMASH Issue 266935 UBUNTU:CVE-2020-1968 USN-4504-1 bnc#1176331 rh#1877458 |
CVE-2020-1971 | openssl:Released, openssl-1_1:Released | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:git.openssl.org:CVE-2020-1971 CONFIRM:kb.pulsesecure.net:CVE-2020-1971 CONFIRM:security.netapp.com:CVE-2020-1971 CONFIRM:security.netapp.com:CVE-2021-2154 CONFIRM:www.openssl.org:CVE-2020-1971 CONFIRM:www.tenable.com:CVE-2019-1551 CONFIRM:www.tenable.com:CVE-2021-23841 CONFIRM:www.tenable.com:CVE-2021-3449 CVE-2020-1971 DSA-4807 FEDORA:FEDORA-2020-a31b01e945 FEDORA:FEDORA-2020-ef1870065a FREEBSD:FreeBSD-SA-20:33 GLSA-202012-13 MISC:bugs.ghostscript.com:OSS:2021/Q3/165 MISC:www.oracle.com:CVE-2012-2098 MISC:www.oracle.com:CVE-2021-3450 MISC:www.oracle.com:CVE-2021-35666 MISC:www.oracle.com:CVE-2022-21498 MLIST:[debian-lts-announce] 20201214 [SECURITY] [DLA 2492-1] openssl security update MLIST:[debian-lts-announce] 20201214 [SECURITY] [DLA 2493-1] openssl1.0 security update MLIST:[pulsar-commits] 20201216 [GitHub] [pulsar] phijohns-tibco opened a new issue #8978: OpenSSL needs to be updated to 1.1.1i current version is unsupported. MLIST:[tomcat-dev] 20210207 [Bug 65126] New: A security vulnerability cve-2020-1971 in Tomcat dependency Library in version 9.0.40. N/A:N/A OSS:2021/09/14/2 OSS:2021/Q3/165 Oracle:CVE-2020-1971 RH:CVE-2020-1971 RHSA-2020:5422 RHSA-2020:5476 RHSA-2020:5566 RHSA-2020:5588 RHSA-2020:5623 RHSA-2020:5637 RHSA-2020:5639 RHSA-2020:5640 RHSA-2020:5641 RHSA-2020:5642 RHSA-2021:0056 RHSA-2021:0486 RHSA-2021:0488 RHSA-2021:0489 RHSA-2021:0491 RHSA-2021:0494 RHSA-2021:0495 SMASH Issue 272598 bnc#1179491 https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f960d81215ebf3f65e03d4d5d857fb9b666d6920 https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c%40%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143%40%3Ccommits.pulsar.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/ https://security.netapp.com/advisory/ntap-20240621-0006/ openssl.git:commit:b33c48b75aaf33c93aeda42d7138616b9e6a64cb rh#1903409 |
CVE-2020-19909 | curl:Won't fix | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CVE-2020-19909 SMASH Issue 375955 bnc#1214495 https://daniel.haxx.se/blog/2023/08/26/cve-2020-19909-is-everything-that-is-wrong-with-cves/ https://github.com/curl/curl/pull/4166 |
CVE-2020-21047 | elfutils:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CVE-2020-21047 L3:67082 SMASH Issue 375958 bnc#1214589 bnc#1216981 https://lists.debian.org/debian-lts-announce/2023/09/msg00026.html https://sourceware.org/bugzilla/show_bug.cgi?id=25068 https://sourceware.org/git/?p=elfutils.git;a=commitdiff;h=99dc63b10b3878616b85df2dfd2e4e7103e414b8 jsc#CAR-2831 rh#2223918 |
CVE-2020-21583 | util-linux:Not affected | important | 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2020-21583 SMASH Issue 375965 bdo#786804 bnc#1214593 https://packetstormsecurity.com/files/132061/hwclock-Privilege-Escalation.html rh#2238716 |
CVE-2020-21913 | icu:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CVE-2020-21913 D:CVE-2020-21913 DSA-5014 MISC:github.com:CVE-2020-21913 MISC:unicode-org.atlassian.net:CVE-2020-21913 SMASH Issue 310436 bnc#1193951 jsc#CAR-1349 rh#2006950 |
CVE-2020-22916 | xz:Analysis | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CVE-2020-22916 SMASH Issue 375984 bnc#1214590 http://web.archive.org/web/20230918084612/https://github.com/snappyJack/CVE-request-XZ-5.2.5-has-denial-of-service-vulnerability https://github.com/snappyJack/CVE-request-XZ-5.2.5-has-denial-of-service-vulnerability https://github.com/tukaani-project/xz/issues/61 https://security-tracker.debian.org/tracker/CVE-2020-22916 https://tukaani.org/xz/ rh#2234987 |
CVE-2020-24370 | lua53:Released | low | 4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | CVE-2020-24370 FEDORA:FEDORA-2020-c83556709c FEDORA:FEDORA-2020-d7ed9f18ff MISC:github.com:CVE-2020-24370 MISC:lua-users.org:CVE-2020-24370 MLIST:[debian-lts-announce] 20200926 [SECURITY] [DLA 2381-1] lua5.3 security update RH:CVE-2020-24370 RHSA-2021:4510 SMASH Issue 265441 UBUNTU:CVE-2020-24370 bnc#1175448 https://lists.debian.org/debian-lts-announce/2023/06/msg00031.html rh#1870290 |
CVE-2020-24371 | lua53:Released | moderate | 5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2020-24371 MISC:github.com:CVE-2020-24371 MISC:www.lua.org:CVE-2020-24371 RH:CVE-2020-24371 SMASH Issue 265442 UBUNTU:CVE-2020-24371 bnc#1175449 rh#1870294 |
CVE-2020-24394 | kernel-source-rt:Already fixed | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2020-24394 CVE-2020-24394 MISC:cdn.kernel.org:CVE-2020-24394 MISC:git.kernel.org:CVE-2020-24394 MISC:www.oracle.com:CVE-2021-3450 MISC:www.starwindsoftware.com:CVE-2020-24394 RH:CVE-2020-24394 RHSA-2020:5437 RHSA-2020:5441 RHSA-2021:0526 RHSA-2021:0760 RHSA-2021:0878 RHSA-2021:1578 RHSA-2021:1739 SMASH Issue 265662 SUSE:openSUSE-SU-2020:1325 UBUNTU:CVE-2020-24394 USN-4465-1 USN-4483-1 USN-4485-1 bdo#962254 bnc#1175518 bnc#1175992 rh#1869141 |
CVE-2020-24490 | kernel-source-rt:Released | important | 8.8 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:www.intel.com:CVE-2020-24490 CVE-2020-24490 RH:CVE-2020-24490 RHSA-2020:4685 RHSA-2020:4686 SMASH Issue 269150 UBUNTU:CVE-2020-24490 bnc#1177726 bnc#1177727 bnc#1177728 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1888449 |
CVE-2020-24502 | kernel-source-rt:Not affected | low | 3.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L) | CVE-2020-24502 MISC:www.intel.com:CVE-2020-24502 RH:CVE-2020-24502 RHSA-2021:4140 RHSA-2021:4356 SMASH Issue 278166 bnc#1182409 rh#1930379 |
CVE-2020-24503 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) | CVE-2020-24503 MISC:www.intel.com:CVE-2020-24502 RH:CVE-2020-24503 RHSA-2021:4140 RHSA-2021:4356 SMASH Issue 278167 bnc#1182405 rh#1930381 |
CVE-2020-24504 | kernel-source-rt:Not affected | moderate | 6.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H) | CVE-2020-24504 MISC:www.intel.com:CVE-2020-24502 RH:CVE-2020-24504 RHSA-2021:4140 RHSA-2021:4356 SMASH Issue 278168 bnc#1182404 rh#1930376 |
CVE-2020-24586 | kernel-source-rt:Released | moderate | 4.7 (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N) | CISCO:20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021 CONFIRM:www.intel.com:CVE-2020-24587 CVE-2020-24586 CVE-2020-24587 MISC:github.com:CVE-2020-26147 MISC:www.arista.com:CVE-2020-26135 MISC:www.fragattacks.com:CVE-2020-26147 MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update MLIST:[oss-security] 20210511 various 802.11 security issues - fragattacks.com OSS:2021/Q2/126 RHSA-2021:4140 RHSA-2021:4356 SMASH Issue 283857 SMASH Issue 283858 bnc#1185859 https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html jsc#CAR-1025 linux.git:commit:3edc6b0d6c061a70d8ca3c3c72eb1f58ce29bfb1 linux.git:commit:94034c40ab4a3fcf581fbc7f8fdf4e29943c4a24 linux.git:commit:c3944a5621026c176001493d48ee66ff94e1a39a rh#1959642 rh#1959654 |
CVE-2020-24587 | kernel-source-rt:Released | moderate | 4.2 (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N) | CISCO:20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021 CONFIRM:www.intel.com:CVE-2020-24587 CVE-2020-24586 CVE-2020-24587 MISC:github.com:CVE-2020-26147 MISC:www.arista.com:CVE-2020-26135 MISC:www.fragattacks.com:CVE-2020-26147 MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update MLIST:[oss-security] 20210511 various 802.11 security issues - fragattacks.com OSS:2021/Q2/126 RHSA-2021:4140 RHSA-2021:4356 SMASH Issue 283856 SMASH Issue 283858 SMASH Issue 283863 bnc#1185859 bnc#1185862 https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html jsc#CAR-1024 jsc#CAR-1025 linux.git:commit:3edc6b0d6c061a70d8ca3c3c72eb1f58ce29bfb1 linux.git:commit:94034c40ab4a3fcf581fbc7f8fdf4e29943c4a24 linux.git:commit:c3944a5621026c176001493d48ee66ff94e1a39a rh#1959642 rh#1959654 |
CVE-2020-24588 | kernel-source-rt:Released | moderate | 6.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) | CISCO:20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021 CONFIRM:cert-portal.siemens.com:CVE-2020-26141 CONFIRM:www.intel.com:CVE-2020-24587 CVE-2020-24588 MISC:github.com:CVE-2020-26147 MISC:www.arista.com:CVE-2020-26135 MISC:www.fragattacks.com:CVE-2020-26147 MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update MLIST:[oss-security] 20210511 various 802.11 security issues - fragattacks.com OSS:2021/Q2/126 RHSA-2021:4140 RHSA-2021:4356 SMASH Issue 283861 SMASH Issue 283862 bnc#1185861 https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html linux.git:commit:079a108feba474b4b32bd3471db03e11f2f83b81 linux.git:commit:270032a2a9c4535799736142e1e7c413ca7b836e linux.git:commit:28131d896d6d316bc1f6f305d1a9ed6d96c3f2a1 linux.git:commit:2b8a1fee3488c602aca8bea004a087e60806a5cf linux.git:commit:2c2bdd2372afcfcf24fe11c65ebe3361b7e1cd9f linux.git:commit:5e7a2c6494813e58252caf342f5ddb166ad44d1a linux.git:commit:734223d78428de3c7c7d7bc04daf258085780d90 linux.git:commit:d7333a8ec8ca88b106a2f9729b119cb09c7e41dc rh#1959657 |
CVE-2020-24659 | gnutls:Released | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2020-24659 CVE-2020-24659 FEDORA:FEDORA-2020-0ab6656303 FEDORA:FEDORA-2020-de51ee7cc9 GLSA-202009-01 MISC:gitlab.com:CVE-2020-24659 MISC:www.gnutls.org:CVE-2020-24659 RH:CVE-2020-24659 RHSA-2020:5483 SMASH Issue 266770 SUSE:openSUSE-SU-2020:1724 UBUNTU:CVE-2020-24659 USN-4491-1 bnc#1176181 http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00060.html rh#1872021 |
CVE-2020-24736 | sqlite3:Not affected | moderate | () | CVE-2020-24736 RHSA-2023:3840 SMASH Issue 363080 bnc#1210416 https://security.netapp.com/advisory/ntap-20230526-0005/ https://www.sqlite.org/src/info/4feb3159c6bc3f7e33959 rh#2186385 |
CVE-2020-24977 | libxml2:Released | moderate | 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) | CONFIRM:security.netapp.com:CVE-2020-24977 CVE-2020-24977 FEDORA:FEDORA-2020-20ab468a33 FEDORA:FEDORA-2020-35087800be FEDORA:FEDORA-2020-7773c53bc8 FEDORA:FEDORA-2020-7dd29dacad FEDORA:FEDORA-2020-935f62c3d9 FEDORA:FEDORA-2020-b60dbdd538 FEDORA:FEDORA-2020-b6aaf25741 FEDORA:FEDORA-2020-be489044df FEDORA:FEDORA-2020-dd2fc19b78 FEDORA:FEDORA-2020-ff317550e4 GLSA-202107-05 MISC:gitlab.gnome.org:CVE-2020-24977 MISC:www.oracle.com:CVE-2021-35666 MISC:www.oracle.com:CVE-2022-21498 MISC:www.oracle.com:CVE-2022-21586 MLIST:[debian-lts-announce] 20200909 [SECURITY] [DLA 2369-1] libxml2 security update MLIST:[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar Oracle:CVE-2020-24977 RH:CVE-2020-24977 RHSA-2021:1597 SMASH Issue 266743 SUSE:openSUSE-SU-2020:1430 SUSE:openSUSE-SU-2020:1465 UBUNTU:CVE-2020-24977 bnc#1176179 rh#1877788 |
CVE-2020-25211 | kernel-source-rt:Released | moderate | 5.9 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) | CONFIRM:security.netapp.com:CVE-2020-25211 CVE-2020-25211 DSA-4774 FEDORA:FEDORA-2020-3c6fedeb83 FEDORA:FEDORA-2020-5920a7a0b2 MISC:git.kernel.org:CVE-2020-25211 MISC:twitter.com:CVE-2020-25211 MLIST:[debian-lts-announce] 20201028 [SECURITY] [DLA 2417-1] linux-4.19 security update MLIST:[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update MLIST:[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update RH:CVE-2020-25211 RHSA-2021:0003 RHSA-2021:0004 RHSA-2021:0184 RHSA-2021:0189 RHSA-2021:0763 RHSA-2021:0765 RHSA-2021:0774 RHSA-2021:0856 RHSA-2021:0857 RHSA-2021:1531 RHSA-2021:2164 RHSA-2021:2355 SMASH Issue 267015 UBUNTU:CVE-2020-25211 bdo#908712 bnc#1176395 rh#1877571 |
CVE-2020-25212 | kernel-source-rt:Released | important | 7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2020-25212 L3:58429 MISC:cdn.kernel.org:CVE-2020-25212 MISC:git.kernel.org:CVE-2020-25212 MISC:twitter.com:CVE-2020-25212 MLIST:[debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update MLIST:[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update MLIST:[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update RH:CVE-2020-25212 RHSA-2020:4279 RHSA-2020:5437 RHSA-2020:5441 RHSA-2021:0526 RHSA-2021:0760 RHSA-2021:0878 RHSA-2021:1578 RHSA-2021:1739 SMASH Issue 267017 SUSE:openSUSE-SU-2020:1655 SUSE:openSUSE-SU-2020:1682 SUSE:openSUSE-SU-2020:1698 UBUNTU:CVE-2020-25212 USN-4525-1 USN-4527-1 USN-4578-1 bnc#1176381 bnc#1176382 bnc#1177027 rh#1877575 |
CVE-2020-25219 | libproxy:Released | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2020-25219 DSA-4800 FEDORA:FEDORA-2020-2407cb0512 FEDORA:FEDORA-2020-7e1e9abf77 FEDORA:FEDORA-2020-f92d372cf1 MISC:github.com:CVE-2020-25219 MLIST:[debian-lts-announce] 20200912 [SECURITY] [DLA 2372-1] libproxy security update RH:CVE-2020-25219 SMASH Issue 267057 SUSE:openSUSE-SU-2020:1676 SUSE:openSUSE-SU-2020:1680 UBUNTU:CVE-2020-25219 USN-4514-1 bdo#968366 bdo#971394 bnc#1176410 rh#1880349 |
CVE-2020-25221 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:/advisory/ntap-20201001-0003/ CVE-2020-25221 MISC:cdn.kernel.org:CVE-2020-25221 MISC:git.kernel.org:CVE-2020-25221 MISC:www.openwall.com:CVE-2020-25221 MLIST:[oss-security] 20200910 Re: CVE Request: Linux kernel vsyscall page refcounting error OSS:2020/09/08/4 OSS:2020/Q3/170 RH:CVE-2020-25221 SMASH Issue 266849 UBUNTU:CVE-2020-25221 bnc#1176286 rh#1884341 |
CVE-2020-25284 | kernel-source-rt:Released | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2020-25284 MISC:git.kernel.org:CVE-2020-25284 MISC:twitter.com:CVE-2020-25284 MLIST:[debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update MLIST:[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update MLIST:[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update RH:CVE-2020-25284 RHSA-2021:1578 RHSA-2021:1739 SMASH Issue 267311 SUSE:openSUSE-SU-2020:1586 SUSE:openSUSE-SU-2020:1655 UBUNTU:CVE-2020-25284 bnc#1176482 rh#1882594 |
CVE-2020-25285 | kernel-source-rt:Released | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2020-25285 CVE-2020-25285 MISC:cdn.kernel.org:CVE-2020-25285 MISC:git.kernel.org:CVE-2020-25285 MISC:twitter.com:CVE-2020-25285 MLIST:[debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update MLIST:[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update MLIST:[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update RH:CVE-2020-25285 RHSA-2021:1578 RHSA-2021:1739 SMASH Issue 267312 UBUNTU:CVE-2020-25285 USN-4576-1 USN-4579-1 bnc#1176485 bnc#1176487 rh#1882591 |
CVE-2020-25639 | kernel-source-rt:Released | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2020-25639 FEDORA:FEDORA-2021-1db4ab0a3d FEDORA:FEDORA-2021-a2d3ad5dda RH:CVE-2020-25639 SMASH Issue 268023 UBUNTU:CVE-2020-25639 bnc#1176846 rh#1876995 |
CVE-2020-25641 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2020-25641 MISC:git.kernel.org:OSS:2020/Q3/204 MISC:www.kernel.org:CVE-2020-25641 MLIST:[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update MLIST:[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update MLIST:[oss-security] 20201006 Re: CVE-2020-25641 kernel: soft lockup when submitting zero length bvecs. OSS:2020/Q3/204 RH:CVE-2020-25641 RHSA-2020:4431 RHSA-2020:4609 RHSA-2020:5079 RHSA-2020:5374 RHSA-2021:0073 RHSA-2021:0136 SMASH Issue 268132 SUSE:openSUSE-SU-2020:1655 SUSE:openSUSE-SU-2020:1698 UBUNTU:CVE-2020-25641 USN-4576-1 bnc#1177121 rh#1881424 rh#1882201 |
CVE-2020-25643 | kernel-source-rt:Released | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2020-25643 CVE-2020-25643 DSA-4774 MISC:git.kernel.org:CVE-2020-25643 MISC:www.starwindsoftware.com:CVE-2020-25643 MLIST:[debian-lts-announce] 20201028 [SECURITY] [DLA 2417-1] linux-4.19 security update MLIST:[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update MLIST:[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update RH:CVE-2020-25643 RHSA-2020:5437 RHSA-2020:5441 RHSA-2021:1578 RHSA-2021:1739 SMASH Issue 268633 SUSE:openSUSE-SU-2020:1655 SUSE:openSUSE-SU-2020:1698 UBUNTU:CVE-2020-25643 bdo#908712 bnc#1177206 bnc#1177226 rh#1879981 |
CVE-2020-25645 | kernel-source-rt:Released | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) | CONFIRM:security.netapp.com:CVE-2020-25645 CVE-2020-25645 DSA-4774 MISC:packetstormsecurity.com:CVE-2020-0427 MLIST:[debian-lts-announce] 20201028 [SECURITY] [DLA 2417-1] linux-4.19 security update MLIST:[debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update RH:CVE-2020-25645 RHSA-2021:0856 RHSA-2021:0857 SMASH Issue 268997 SUSE:openSUSE-SU-2020:1682 SUSE:openSUSE-SU-2020:1698 UBUNTU:CVE-2020-25645 bdo#908712 bnc#1177511 bnc#1177513 rh#1883988 |
CVE-2020-25648 | mozilla-nss:Released | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2020-25648 FEDORA:FEDORA-2020-a857113c7a FEDORA:FEDORA-2020-bb91bf9b8e FEDORA:FEDORA-2020-f29254bd5e MISC:developer.mozilla.org:CVE-2020-25648 MISC:www.oracle.com:CVE-2021-35666 MISC:www.oracle.com:CVE-2022-21498 MLIST:[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar N/A:N/A Oracle:CVE-2020-25648 RH:CVE-2020-25648 RHBA-2021:2854 RHSA-2021:1384 RHSA-2021:3572 SMASH Issue 269713 UBUNTU:CVE-2020-25648 bnc#1177917 https://lists.debian.org/debian-lts-announce/2023/10/msg00039.html rh#1887319 |
CVE-2020-25656 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2020-25656 MISC:lkml.org:CVE-2020-25656 MISC:www.starwindsoftware.com:CVE-2020-25656 MLIST:[debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update MLIST:[debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update OSS:2020/Q4/63 RH:CVE-2020-25656 RHSA-2021:0856 RHSA-2021:0857 SMASH Issue 269168 SMASH Issue 269169 UBUNTU:CVE-2020-25656 bnc#1177766 linux.git:commit:82e61c3909db51d91b9d3e2071557b6435018b80 rh#1888726 |
CVE-2020-25659 | python-cryptography:Released | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N) | CVE-2020-25659 MISC:github.com:CVE-2020-25659 MISC:www.oracle.com:CVE-2022-21498 MISC:www.oracle.com:CVE-2022-21586 RH:CVE-2020-25659 RHSA-2021:1608 RHSA-2021:2239 RHSA-2021:3254 SMASH Issue 270230 UBUNTU:CVE-2020-25659 bnc#1178168 openssl.git:commit:7fc67e0a33102aa47bbaa56533eeecb98c0450f7 rh#1889988 rh#2254432 |
CVE-2020-25668 | kernel-source-rt:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2020-25668 CVE-2020-25668 MISC:bugzilla.redhat.com:CVE-2020-25668 MISC:git.kernel.org:CVE-2020-25668 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2020-25668 MISC:github.com:MISC:www.openwall.com:CVE-2020-25668 MISC:www.openwall.com:CVE-2020-25668 MLIST:[debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update MLIST:[debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update MLIST:[oss-security] 20201030 CVE-2020-25668: Linux kernel concurrency use-after-free in vt MLIST:[oss-security] 20201104 Re: CVE-2020-25668: Linux kernel concurrency use-after-free in vt OSS:2020/10/30/1, OSS:2020/11/04/3, OSS:2020/Q4/84 RH:CVE-2020-25668 SMASH Issue 270218 SMASH Issue 270604 UBUNTU:CVE-2020-25668 bnc#1178123 bnc#1178421 bnc#1178622 rh#1893287 |
CVE-2020-25669 | kernel-source-rt:Released | moderate | 4.3 (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2020-25669 CVE-2020-25669 MISC:github.com:MISC:www.openwall.com:CVE-2020-25669 MISC:www.openwall.com:CVE-2020-25669 MLIST:[debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update MLIST:[debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update MLIST:[oss-security] 20201105 CVE-2020-25669: Linux Kernel use-after-free in sunkbd_reinit MLIST:[oss-security] 20201120 Re: CVE-2020-25669: Linux Kernel use-after-free in sunkbd_reinit OSS:2020/11/05/2, OSS:2020/11/20/5, OSS:2020/Q4/99 RH:CVE-2020-25669 SMASH Issue 270272 SMASH Issue 270273 UBUNTU:CVE-2020-25669 bnc#1178182 rh#1892176 |
CVE-2020-25670 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2020-25673 CVE-2020-25670 CVE-2020-25671 CVE-2020-25672 CVE-2020-25673 D:CVE-2020-25670 D:CVE-2020-25671 D:CVE-2020-25673 FEDORA:FEDORA-2021-1c170a7c7c FEDORA:FEDORA-2021-21360476b6 FEDORA:FEDORA-2021-d56567bdab MISC:git.kernel.org:MLIST:[oss-security] 20210511 CVE-2021-23134: Linux kernel: UAF in nfc sockets MISC:lore.kernel.org:MISC:www.openwall.com:CVE-2020-25672 MISC:www.openwall.com:CVE-2020-25672 MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update MLIST:[oss-security] 20201101 [CVE-2020-25670,CVE-2020-25671,CVE-2020-25672,CVE-2020-25673]Linux kernel: many bugs in nfc socket MLIST:[oss-security] 20210511 CVE-2021-23134: Linux kernel: UAF in nfc sockets OSS:2020/Q4/85 OSS:2021/Q2/118 RH:CVE-2020-25670 RH:CVE-2020-25671 RH:CVE-2020-25672 RH:CVE-2020-25673 SMASH Issue 270267 SMASH Issue 270271 UBUNTU:CVE-2020-25670 UBUNTU:CVE-2020-25671 UBUNTU:CVE-2020-25672 UBUNTU:CVE-2020-25673 bnc#1178181 bnc#1194680 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PW3OASG7OEMHANDWBM5US5WKTOC76KMH/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UTVACC6PGS6OSD3EYY7FZUAZT2EUMFH5/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VEIEGQXUW37YHZ5MTAZTDCIMHUN26NJS/ linux.git:commit:7574fcdbdcb335763b6b322f6928dc0fd5730451 linux.git:commit:8a4cd82d62b5ec7e5482333a72b58a4eea4979f0 linux.git:commit:c33b1cc62ac05c1dbb1cdafe2eb66da01c76ca8d rh#1894550 rh#1894552 rh#1894556 rh#1894558 |
CVE-2020-25671 | kernel-source-rt:Released | important | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2020-25673 CVE-2020-25670 CVE-2020-25671 CVE-2020-25672 CVE-2020-25673 D:CVE-2020-25670 D:CVE-2020-25671 D:CVE-2020-25673 FEDORA:FEDORA-2021-1c170a7c7c FEDORA:FEDORA-2021-21360476b6 FEDORA:FEDORA-2021-d56567bdab MISC:git.kernel.org:MLIST:[oss-security] 20210511 CVE-2021-23134: Linux kernel: UAF in nfc sockets MISC:lore.kernel.org:MISC:www.openwall.com:CVE-2020-25672 MISC:www.openwall.com:CVE-2020-25672 MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update MLIST:[oss-security] 20201101 [CVE-2020-25670,CVE-2020-25671,CVE-2020-25672,CVE-2020-25673]Linux kernel: many bugs in nfc socket MLIST:[oss-security] 20210511 CVE-2021-23134: Linux kernel: UAF in nfc sockets OSS:2020/Q4/85 OSS:2021/Q2/118 RH:CVE-2020-25670 RH:CVE-2020-25671 RH:CVE-2020-25672 RH:CVE-2020-25673 SMASH Issue 270268 SMASH Issue 270271 UBUNTU:CVE-2020-25670 UBUNTU:CVE-2020-25671 UBUNTU:CVE-2020-25672 UBUNTU:CVE-2020-25673 bnc#1178181 bnc#1194680 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PW3OASG7OEMHANDWBM5US5WKTOC76KMH/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UTVACC6PGS6OSD3EYY7FZUAZT2EUMFH5/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VEIEGQXUW37YHZ5MTAZTDCIMHUN26NJS/ linux.git:commit:7574fcdbdcb335763b6b322f6928dc0fd5730451 linux.git:commit:8a4cd82d62b5ec7e5482333a72b58a4eea4979f0 linux.git:commit:c33b1cc62ac05c1dbb1cdafe2eb66da01c76ca8d rh#1894550 rh#1894552 rh#1894556 rh#1894558 |
CVE-2020-25672 | kernel-source-rt:Released | important | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2020-25673 CVE-2020-25670 CVE-2020-25671 CVE-2020-25672 CVE-2020-25673 D:CVE-2020-25670 D:CVE-2020-25671 D:CVE-2020-25673 FEDORA:FEDORA-2021-1c170a7c7c FEDORA:FEDORA-2021-21360476b6 FEDORA:FEDORA-2021-d56567bdab MISC:git.kernel.org:MLIST:[oss-security] 20210511 CVE-2021-23134: Linux kernel: UAF in nfc sockets MISC:lore.kernel.org:MISC:www.openwall.com:CVE-2020-25672 MISC:www.openwall.com:CVE-2020-25672 MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update MLIST:[oss-security] 20201101 [CVE-2020-25670,CVE-2020-25671,CVE-2020-25672,CVE-2020-25673]Linux kernel: many bugs in nfc socket MLIST:[oss-security] 20210511 CVE-2021-23134: Linux kernel: UAF in nfc sockets OSS:2020/Q4/85 OSS:2021/Q2/118 RH:CVE-2020-25670 RH:CVE-2020-25671 RH:CVE-2020-25672 RH:CVE-2020-25673 SMASH Issue 270269 SMASH Issue 270271 UBUNTU:CVE-2020-25670 UBUNTU:CVE-2020-25671 UBUNTU:CVE-2020-25672 UBUNTU:CVE-2020-25673 bnc#1178181 bnc#1194680 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PW3OASG7OEMHANDWBM5US5WKTOC76KMH/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UTVACC6PGS6OSD3EYY7FZUAZT2EUMFH5/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VEIEGQXUW37YHZ5MTAZTDCIMHUN26NJS/ linux.git:commit:7574fcdbdcb335763b6b322f6928dc0fd5730451 linux.git:commit:8a4cd82d62b5ec7e5482333a72b58a4eea4979f0 linux.git:commit:c33b1cc62ac05c1dbb1cdafe2eb66da01c76ca8d rh#1894550 rh#1894552 rh#1894556 rh#1894558 |
CVE-2020-25673 | kernel-source-rt:Released | important | 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2020-25673 CVE-2020-25670 CVE-2020-25671 CVE-2020-25672 CVE-2020-25673 D:CVE-2020-25670 D:CVE-2020-25671 D:CVE-2020-25673 FEDORA:FEDORA-2021-1c170a7c7c FEDORA:FEDORA-2021-21360476b6 FEDORA:FEDORA-2021-d56567bdab MISC:git.kernel.org:MLIST:[oss-security] 20210511 CVE-2021-23134: Linux kernel: UAF in nfc sockets MISC:lore.kernel.org:MISC:www.openwall.com:CVE-2020-25672 MISC:www.openwall.com:CVE-2020-25672 MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update MLIST:[oss-security] 20201101 [CVE-2020-25670,CVE-2020-25671,CVE-2020-25672,CVE-2020-25673]Linux kernel: many bugs in nfc socket MLIST:[oss-security] 20210511 CVE-2021-23134: Linux kernel: UAF in nfc sockets OSS:2020/Q4/85 OSS:2021/Q2/118 RH:CVE-2020-25670 RH:CVE-2020-25671 RH:CVE-2020-25672 RH:CVE-2020-25673 SMASH Issue 270270 SMASH Issue 270271 UBUNTU:CVE-2020-25670 UBUNTU:CVE-2020-25671 UBUNTU:CVE-2020-25672 UBUNTU:CVE-2020-25673 bnc#1178181 bnc#1194680 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PW3OASG7OEMHANDWBM5US5WKTOC76KMH/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UTVACC6PGS6OSD3EYY7FZUAZT2EUMFH5/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VEIEGQXUW37YHZ5MTAZTDCIMHUN26NJS/ linux.git:commit:7574fcdbdcb335763b6b322f6928dc0fd5730451 linux.git:commit:8a4cd82d62b5ec7e5482333a72b58a4eea4979f0 linux.git:commit:c33b1cc62ac05c1dbb1cdafe2eb66da01c76ca8d rh#1894550 rh#1894552 rh#1894556 rh#1894558 |
CVE-2020-25704 | kernel-source-rt:Already fixed | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2020-25704 MISC:git.kernel.org:CVE-2020-25704 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2020-25704 MISC:www.openwall.com:CVE-2020-25704 MISC:www.starwindsoftware.com:CVE-2020-25704 MLIST:[debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update MLIST:[debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update OSS:2020/11/09/1 OSS:2020/Q4/103 RH:CVE-2020-25704 RHSA-2021:1578 RHSA-2021:1739 RHSA-2021:2718 RHSA-2021:2719 RHSA-2022:0063 RHSA-2022:0065 SMASH Issue 270757 SMASH Issue 271209 bnc#1178393 rh#1895961 |
CVE-2020-25705 | kernel-source-rt:Already fixed | important | 7.4 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N) | CONFIRM:cert-portal.siemens.com:CVE-2020-25705 CONFIRM:security.netapp.com:CVE-2020-25705 CVE-2020-25705 D:CVE-2020-25705 DSA-5096 MLIST:[debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update MLIST:[debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update OSS:2021/07/22/1 OSS:2022/01/25/12 RH:CVE-2020-25705 RHSA-2021:0537 RHSA-2021:0558 RHSA-2021:0686 RHSA-2021:0765 RHSA-2021:0774 RHSA-2021:0856 RHSA-2021:0857 RHSA-2021:1531 RHSA-2021:2164 RHSA-2021:2355 SADDNS-URL SMASH Issue 265902 SMASH Issue 271665 SMASH Issue 271666 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1175721 bnc#1178782 bnc#1178783 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1894579 rh#1980646 rh#1997467 rh#2014230 rh#2044561 rh#2053632 rh#2059923 |
CVE-2020-26088 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2020-26088 MISC:cdn.kernel.org:CVE-2020-26088 MISC:github.com:CVE-2020-26088 MLIST:[debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update MLIST:[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update MLIST:[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update RH:CVE-2020-26088 SMASH Issue 268175 SUSE:openSUSE-SU-2020:1586 SUSE:openSUSE-SU-2020:1655 UBUNTU:CVE-2020-26088 USN-4578-1 bnc#1176990 rh#1882508 |
CVE-2020-26116 | python3:Released | moderate | 6.8 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N) | CONFIRM:security.netapp.com:CVE-2020-26116 CVE-2020-26116 FEDORA:FEDORA-2020-221823ebdd FEDORA:FEDORA-2020-887d3fa26f FEDORA:FEDORA-2020-d30881c970 FEDORA:FEDORA-2020-d42cb01973 FEDORA:FEDORA-2020-e33acdea18 GLSA-202101-18 MISC:bugs.python.org:CVE-2020-26116 MISC:python-security.readthedocs.io:CVE-2020-26116 MISC:www.oracle.com:CVE-2021-35666 MLIST:[debian-lts-announce] 20201119 [SECURITY] [DLA 2456-1] python3.5 security update RH:CVE-2020-26116 RHSA-2020:4273 RHSA-2020:4285 RHSA-2020:4299 RHSA-2021:0034 RHSA-2021:0079 RHSA-2021:1631 RHSA-2021:1633 RHSA-2021:1761 RHSA-2021:1879 RHSA-2021:3366 RHSA-2022:5235 SMASH Issue 268421 SUSE:openSUSE-SU-2020:1859 UBUNTU:CVE-2020-26116 USN-4581-1 bnc#1177211 https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html rh#1883014 rh#1883632 |
CVE-2020-26139 | kernel-source-rt:Released | moderate | 4.3 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) | CISCO:20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021 CONFIRM:cert-portal.siemens.com:CVE-2020-26141 CVE-2020-26139 MISC:github.com:CVE-2020-26147 MISC:www.arista.com:CVE-2020-26135 MISC:www.fragattacks.com:CVE-2020-26147 MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update MLIST:[oss-security] 20210511 various 802.11 security issues - fragattacks.com OSS:2021/Q2/126 RHSA-2021:4140 RHSA-2021:4356 SMASH Issue 284051 bnc#1186062 jsc#CAR-1023 rh#1959663 |
CVE-2020-26140 | kernel-source-rt:Released | important | 6.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) | CISCO:20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021 CONFIRM:cert-portal.siemens.com:CVE-2020-26141 CVE-2020-26140 CVE-2020-26142 CVE-2020-26143 CVE-2020-26144 CVE-2020-26146 MISC:github.com:CVE-2020-26147 MISC:www.arista.com:CVE-2020-26135 MISC:www.fragattacks.com:CVE-2020-26147 MLIST:[oss-security] 20210511 various 802.11 security issues - fragattacks.com OSS:2021/Q2/126 RHSA-2021:4140 RHSA-2021:4356 SMASH Issue 283864 SMASH Issue 284052 bnc#1185863 bnc#1188528 jsc#CAR-606 rh#1960490 rh#1960494 rh#1960496 rh#1960498 rh#1960502 |
CVE-2020-26141 | kernel-source-rt:Released | moderate | 4.2 (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N) | CISCO:20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021 CONFIRM:cert-portal.siemens.com:CVE-2020-26141 CVE-2020-26141 CVE-2020-26147 D:CVE-2020-26147 MISC:github.com:CVE-2020-26147 MISC:www.arista.com:CVE-2020-26135 MISC:www.fragattacks.com:CVE-2020-26147 MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update MLIST:[oss-security] 20210511 various 802.11 security issues - fragattacks.com OSS:2021/Q2/126 RHSA-2021:4140 RHSA-2021:4356 SMASH Issue 284054 bnc#1185987 jsc#CAR-1022 linux.git:commit:0dc267b13f3a7e8424a898815dd357211b737330 linux.git:commit:965a7d72e798eb7af0aa67210e37cf7ecd1c9cad rh#1960492 rh#1960504 |
CVE-2020-26142 | kernel-source-rt:Released | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) | CISCO:20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021 CONFIRM:cert-portal.siemens.com:CVE-2020-26141 CVE-2020-26140 CVE-2020-26142 CVE-2020-26143 CVE-2020-26144 CVE-2020-26146 MISC:github.com:CVE-2020-26147 MISC:www.arista.com:CVE-2020-26135 MISC:www.fragattacks.com:CVE-2020-26147 MLIST:[oss-security] 20210511 various 802.11 security issues - fragattacks.com OSS:2021/Q2/126 RHSA-2021:4140 RHSA-2021:4356 SMASH Issue 283864 SMASH Issue 284049 bnc#1185863 bnc#1188528 jsc#CAR-606 rh#1960490 rh#1960494 rh#1960496 rh#1960498 rh#1960502 |
CVE-2020-26143 | kernel-source-rt:Released | important | 6.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) | CISCO:20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021 CONFIRM:cert-portal.siemens.com:CVE-2020-26141 CVE-2020-26140 CVE-2020-26142 CVE-2020-26143 CVE-2020-26144 CVE-2020-26146 MISC:github.com:CVE-2020-26147 MISC:www.arista.com:CVE-2020-26135 MISC:www.fragattacks.com:CVE-2020-26147 MLIST:[oss-security] 20210511 various 802.11 security issues - fragattacks.com OSS:2021/Q2/126 RHSA-2021:4140 RHSA-2021:4356 SMASH Issue 283864 SMASH Issue 284050 bnc#1185863 bnc#1188528 jsc#CAR-606 rh#1960490 rh#1960494 rh#1960496 rh#1960498 rh#1960502 |
CVE-2020-26144 | kernel-source-rt:Released | important | 6.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) | CISCO:20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021 CONFIRM:cert-portal.siemens.com:CVE-2020-26141 CVE-2020-26140 CVE-2020-26142 CVE-2020-26143 CVE-2020-26144 CVE-2020-26146 MISC:github.com:CVE-2020-26147 MISC:www.arista.com:CVE-2020-26135 MISC:www.fragattacks.com:CVE-2020-26147 MLIST:[oss-security] 20210511 various 802.11 security issues - fragattacks.com OSS:2021/Q2/126 RHSA-2021:4140 RHSA-2021:4356 SMASH Issue 283864 SMASH Issue 284048 bnc#1185863 bnc#1188528 jsc#CAR-606 rh#1960490 rh#1960494 rh#1960496 rh#1960498 rh#1960502 |
CVE-2020-26145 | kernel-source-rt:Released | moderate | 5.4 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N) | CONFIRM:cert-portal.siemens.com:CVE-2020-26141 CVE-2020-26145 MISC:github.com:CVE-2020-26147 MISC:www.fragattacks.com:CVE-2020-26147 MLIST:[oss-security] 20210511 various 802.11 security issues - fragattacks.com OSS:2021/Q2/126 RHSA-2021:4140 RHSA-2021:4356 SMASH Issue 283859 SMASH Issue 283860 bnc#1185860 jsc#CAR-1021 linux.git:commit:40e7462dad6f3d06efdb17d26539e61ab6e34db1 linux.git:commit:65c415a144ad8132b6a6d97d4a1919ffc728e2d1 rh#1960500 |
CVE-2020-26146 | kernel-source-rt:Released | important | 5.3 (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N) | CISCO:20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021 CONFIRM:cert-portal.siemens.com:CVE-2020-26141 CVE-2020-26140 CVE-2020-26142 CVE-2020-26143 CVE-2020-26144 CVE-2020-26146 MISC:github.com:CVE-2020-26147 MISC:www.arista.com:CVE-2020-26135 MISC:www.fragattacks.com:CVE-2020-26147 MLIST:[oss-security] 20210511 various 802.11 security issues - fragattacks.com OSS:2021/Q2/126 RHSA-2021:4140 RHSA-2021:4356 SMASH Issue 283864 SMASH Issue 284047 bnc#1185863 bnc#1188528 jsc#CAR-606 rh#1960490 rh#1960494 rh#1960496 rh#1960498 rh#1960502 |
CVE-2020-26147 | kernel-source-rt:Released | moderate | () | CISCO:20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021 CONFIRM:cert-portal.siemens.com:CVE-2020-26141 CVE-2020-26141 CVE-2020-26147 D:CVE-2020-26147 MISC:github.com:CVE-2020-26147 MISC:www.arista.com:CVE-2020-26135 MISC:www.fragattacks.com:CVE-2020-26147 MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update MLIST:[oss-security] 20210511 various 802.11 security issues - fragattacks.com OSS:2021/Q2/126 RHSA-2021:4140 RHSA-2021:4356 SMASH Issue 284053 SMASH Issue 284054 bnc#1185987 jsc#CAR-1022 linux.git:commit:0dc267b13f3a7e8424a898815dd357211b737330 linux.git:commit:965a7d72e798eb7af0aa67210e37cf7ecd1c9cad rh#1960492 rh#1960504 |
CVE-2020-26154 | libproxy:Released | important | 8 (CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2020-26154 DSA-4800 FEDORA:FEDORA-2020-15b775b07e FEDORA:FEDORA-2020-941b563a80 MISC:github.com:CVE-2020-26154 MLIST:[debian-lts-announce] 20201113 [SECURITY] [DLA 2450-1] libproxy security update RH:CVE-2020-26154 SMASH Issue 268490 SUSE:openSUSE-SU-2020:1676 SUSE:openSUSE-SU-2020:1680 UBUNTU:CVE-2020-26154 bdo#968366 bdo#971394 bnc#1177143 rh#1869639 |
CVE-2020-26159 | oniguruma:Released | moderate | 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | CVE-2020-26159 FEDORA:FEDORA-2020-952c499e9d FEDORA:FEDORA-2020-bc758654d1 FEDORA:FEDORA-2020-d53469eceb L3:64172 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:github.com:CVE-2020-26159 MISC:github.com:MLIST:[oss-security] 20200930 [cve-request@...re.org: Re: [scr966354] oniguruma regular expression library - fixed in devel version cbe9f8bd9cfc6c3c87a60fbae58fa1a85db59df0] MLIST:[debian-lts-announce] 20210130 [SECURITY] [DLA 2431-2] libonig regression update MLIST:[oss-security] 20200930 [cve-request@...re.org: Re: [scr966354] oniguruma regular expression library - fixed in devel version cbe9f8bd9cfc6c3c87a60fbae58fa1a85db59df0] OSS:2020/Q3/210 RH:CVE-2020-26159 SMASH Issue 268561 UBUNTU:CVE-2020-26159 bnc#1177179 rh#1884111 |
CVE-2020-26541 | kernel-source-rt:Released | moderate | 6 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N) | CVE-2020-26541 MISC:lkml.org:CVE-2020-26541 RH:CVE-2020-26541 RHBA-2021:2854 RHSA-2021:2570 RHSA-2021:2599 RHSA-2021:2666 RHSA-2021:2718 RHSA-2021:2719 SMASH Issue 268715 UBUNTU:CVE-2020-26541 bnc#1177282 linux.git:commit:56c5812623f95313f6a46fbf0beee7fa17c68bbf linux.git:commit:b0e22b47f650b53dbb094cd0011a48f6f3ae3e29 rh#1886285 |
CVE-2020-26555 | kernel-source-rt:Released | moderate | 5.4 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N) | CVE-2020-26555 L3:67651 SMASH Issue 272737 bnc#1215237 jsc#CAR-2903 jsc#CAR-2907 linux.git:commit:1ffc6f8cc33268731fcf9629fc4438f6db1191fc linux.git:commit:33155c4aae5260475def6f7438e4e35564f4f3ba rh#1918601 |
CVE-2020-26556 | kernel-source-rt:Not affected | moderate | 4.6 (CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L) | CVE-2020-26556 L3:66835 SMASH Issue 377978 bnc#1215239 bnc#1215554 rh#1960012 |
CVE-2020-26557 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) | CVE-2020-26557 SMASH Issue 377979 bnc#1215240 rh#1960009 |
CVE-2020-26558 | kernel-source-rt:Released | moderate | 4.2 (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N) | CERT-VN:VU#799380 CONFIRM:www.intel.com:CVE-2020-26558 CVE-2020-26558 D:CVE-2020-26558 DSA-4951 FEDORA:FEDORA-2021-a35b44fd9f GLSA-202209-16 L3:61103 L3:66747 MISC:kb.cert.org:CVE-2020-26560 MISC:www.bluetooth.com:CVE-2020-26560 MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update MLIST:[debian-lts-announce] 20210626 [SECURITY] [DLA 2692-1] bluez security update RHSA-2021:4432 SMASH Issue 272738 SMASH Issue 272739 bdo#989614 bnc#1179610 bnc#1187900 bnc#1215220 linux.git:commit:1ffc6f8cc33268731fcf9629fc4438f6db1191fc linux.git:commit:33155c4aae5260475def6f7438e4e35564f4f3ba rh#1918601 rh#1918602 rh#1959994 rh#1960009 rh#1960011 rh#1960012 |
CVE-2020-26559 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) | CVE-2020-26559 L3:66835 SMASH Issue 377980 bnc#1215242 rh#1960011 |
CVE-2020-26560 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) | CVE-2020-26560 L3:66835 SMASH Issue 377981 bnc#1215243 rh#1959994 |
CVE-2020-27068 | kernel-source-rt:Released | moderate | 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) | CVE-2020-27068 MISC:source.android.com:CVE-2020-0244 MISC:source.android.com:CVE-2022-20233 SMASH Issue 273513 bnc#1180086 |
CVE-2020-27170 | kernel-source-rt:Released | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2020-27170 CVE-2020-27171 FEDORA:FEDORA-2021-9503fffad9 FEDORA:FEDORA-2021-e49da8a226 FEDORA:FEDORA-2021-f0181b8085 MISC:cdn.kernel.org:CVE-2021-28950 MISC:git.kernel.org:CVE-2020-27170 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2020-27171 MISC:packetstormsecurity.com:CVE-2020-27170 MISC:www.openwall.com:CVE-2020-27170 MISC:www.openwall.com:CVE-2020-27171 MLIST:[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update MLIST:[oss-security] 20210324 Re: [CVE-2020-27170] Protection against speculatively out-of-bounds loads in the Linux kernel can be bypassed by unprivileged local users to leak content of kernel memory MLIST:[oss-security] 20210324 Re: [CVE-2020-27171] Numeric error when restricting speculative pointer arithmetic allows unprivileged local users to leak content of kernel memory OSS:2021/Q1/240 OSS:2021/Q1/241 RH:CVE-2020-27170 RH:CVE-2020-27171 RHSA-2021:2314 RHSA-2021:2316 SMASH Issue 280024 SMASH Issue 280026 bnc#1183686 bnc#1183775 jsc#CAR-483 rh#1940623 rh#1940627 |
CVE-2020-27171 | kernel-source-rt:Released | moderate | 6 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H) | CVE-2020-27170 CVE-2020-27171 FEDORA:FEDORA-2021-9503fffad9 FEDORA:FEDORA-2021-e49da8a226 FEDORA:FEDORA-2021-f0181b8085 MISC:cdn.kernel.org:CVE-2021-28950 MISC:git.kernel.org:CVE-2020-27170 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2020-27171 MISC:packetstormsecurity.com:CVE-2020-27170 MISC:www.openwall.com:CVE-2020-27170 MISC:www.openwall.com:CVE-2020-27171 MLIST:[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update MLIST:[oss-security] 20210324 Re: [CVE-2020-27170] Protection against speculatively out-of-bounds loads in the Linux kernel can be bypassed by unprivileged local users to leak content of kernel memory MLIST:[oss-security] 20210324 Re: [CVE-2020-27171] Numeric error when restricting speculative pointer arithmetic allows unprivileged local users to leak content of kernel memory OSS:2021/Q1/240 OSS:2021/Q1/241 RH:CVE-2020-27170 RH:CVE-2020-27171 RHSA-2021:2314 RHSA-2021:2316 SMASH Issue 280025 SMASH Issue 280026 bnc#1183686 bnc#1183775 jsc#CAR-483 rh#1940623 rh#1940627 |
CVE-2020-27194 | kernel-source-rt:Not affected | moderate | () | CVE-2020-27194 MISC:cdn.kernel.org:CVE-2020-27194 MISC:github.com:CVE-2020-27194 RH:CVE-2020-27194 SMASH Issue 269591 UBUNTU:CVE-2020-27194 bnc#1177889 rh#1889477 |
CVE-2020-27418 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2020-27418 SMASH Issue 375995 bnc#1214919 http://fedora.com https://patchwork.freedesktop.org/patch/356372/ rh#2236834 |
CVE-2020-27618 | glibc:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:security.netapp.com:CVE-2020-27618 CONFIRM:sourceware.org:CVE-2016-10228 CVE-2020-27618 GLSA-202107-07 L3:67771 MISC:www.oracle.com:CVE-2022-21403 MISC:www.oracle.com:CVE-2022-21498 MLIST:[debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update Oracle:CVE-2020-27618 RH:CVE-2020-27618 RHSA-2021:1585 SMASH Issue 270652 UBUNTU:CVE-2020-27618 bnc#1178386 rh#1893708 |
CVE-2020-27619 | python3:Released | important | 8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2020-27619 CVE-2020-27619 D:CVE-2020-27619 FEDORA:FEDORA-2021-12df7f7382 FEDORA:FEDORA-2021-98720f3785 MISC:bugs.python.org:CVE-2020-27619 MISC:github.com:CVE-2020-27619 MISC:lists.apache.org:/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E MISC:www.oracle.com:CVE-2022-21586 MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 MLIST:[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 MLIST:[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar RH:CVE-2020-27619 RHSA-2021:1633 RHSA-2021:3252 RHSA-2021:3254 RHSA-2021:4151 RHSA-2021:4162 SMASH Issue 270036 UBUNTU:CVE-2020-27619 bnc#1178009 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/ https://security.gentoo.org/glsa/202402-04 rh#1889886 |
CVE-2020-27673 | kernel-source-rt:Released | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2020-27673 GLSA-202011-06 MISC:git.kernel.org:CVE-2020-27673 MISC:github.com:CVE-2020-27673 MISC:xenbits.xen.org:CVE-2020-27673 MLIST:[debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update MLIST:[debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update MLIST:[oss-security] 20210119 Xen Security Advisory 332 v4 (CVE-2020-27673) - Rogue guests can cause DoS of Dom0 via high frequency events OSS:2021/Q1/54 RH:CVE-2020-27673 SMASH Issue 268926 SMASH Issue 270104 SUSE:openSUSE-SU-2020:1783 SUSE:openSUSE-SU-2020:1844 UBUNTU:CVE-2020-27673 bnc#1177411 rh#1891110 |
CVE-2020-27675 | kernel-source-rt:Released | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2020-27675 FEDORA:FEDORA-2020-09e4d062fe FEDORA:FEDORA-2020-474d747b60 FEDORA:FEDORA-2020-920a258c79 GLSA-202011-06 MISC:git.kernel.org:CVE-2020-27675 MISC:github.com:CVE-2020-27675 MISC:xenbits.xen.org:CVE-2020-27675 MLIST:[debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update MLIST:[debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update MLIST:[oss-security] 20210119 Xen Security Advisory 331 v3 (CVE-2020-27675) - Race condition in Linux event handler may crash dom0 OSS:2021/Q1/51 RH:CVE-2020-27675 SMASH Issue 268925 SMASH Issue 270106 UBUNTU:CVE-2020-27675 bnc#1177410 rh#1891114 |
CVE-2020-27777 | kernel-source-rt:Released | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2020-27777 L3:67660 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2020-27777 MISC:www.openwall.com:CVE-2020-27777 OSS:2020/10/09/1 OSS:2020/11/23/2 OSS:2020/Q4/155 RH:CVE-2020-27777 RHSA-2021:3327 RHSA-2021:4356 SMASH Issue 272144 bnc#1179107 rh#1900844 |
CVE-2020-27783 | python-lxml:Released | moderate | 6.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) | CONFIRM:security.netapp.com:CVE-2020-27783 CVE-2020-27783 DSA-4810 FEDORA:FEDORA-2020-0e055ea503 FEDORA:FEDORA-2020-307946cfb6 MISC:advisory.checkmarx.net:CVE-2020-27783 MLIST:[debian-lts-announce] 20201218 [SECURITY] [DLA 2467-2] lxml regression update N/A:N/A RH:CVE-2020-27783 RHSA-2021:1761 RHSA-2021:1879 RHSA-2021:1898 RHSA-2021:3254 SMASH Issue 272347 bnc#1179534 jsc#CAR-1591 rh#1901633 |
CVE-2020-27784 | kernel-source-rt:Released | low | 4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H) | CVE-2020-27784 MISC:git.kernel.org:CVE-2020-27784 SMASH Issue 341085 bnc#1202895 rh#1901728 |
CVE-2020-27786 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2020-27786 CVE-2020-27786 MISC:git.kernel.org:MLIST:[oss-security] 20201203 Re: Linux Kernel: ALSA: use-after-free Write in snd_rawmidi_kernel_write1 MLIST:[oss-security] 20201203 Re: Linux Kernel: ALSA: use-after-free Write in snd_rawmidi_kernel_write1 OSS:2020/Q4/179 RH:CVE-2020-27786 RHSA-2021:1578 RHSA-2021:1739 SMASH Issue 272654 bnc#1179601 bnc#1179616 rh#1900933 |
CVE-2020-27815 | kernel-source-rt:Released | important | 7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2020-27815 CVE-2020-27815 DSA-4843 MISC:bugzilla.redhat.com:CVE-2020-27815 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2020-27815 MISC:www.openwall.com:CVE-2020-27815 MLIST:[debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update MLIST:[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update MLIST:[oss-security] 20201201 CVE-2020-27815 Linux kernel: jfs: array-index-out-of-bounds in dbAdjTree MLIST:[oss-security] 20201228 Re: CVE-2020-27815 Linux kernel: jfs: array-index-out-of-bounds in dbAdjTree OSS:2020/11/30/5%2C OSS:2020/11/30/5, OSS:2020/12/28/1%2C OSS:2020/12/28/1, OSS:2020/Q4/173 RH:CVE-2020-27815 SMASH Issue 272471 bdo#970736 bdo#972345 bdo#977048 bdo#977615 bnc#1179454 bnc#1179458 https://bugzilla.redhat.com/show_bug.cgi?id=1897668%2C rh#1897668 |
CVE-2020-27820 | kernel-source:Released, kernel-source-azure:Released, kernel-source-rt:Released | low | 3.1 (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L) | CVE-2020-27820 MISC:access.redhat.com:/errata/RHSA-2022:1975 MISC:access.redhat.com:/errata/RHSA-2022:1988 MISC:lore.kernel.org:/dri-devel/20201103194912.184413-2-jcline%40redhat.com/ MISC:lore.kernel.org:/dri-devel/20201103194912.184413-3-jcline%40redhat.com/ MISC:lore.kernel.org:/dri-devel/20201103194912.184413-4-jcline%40redhat.com/ MISC:lore.kernel.org:CVE-2020-27820 MISC:www.oracle.com:CVE-2022-21586 RH:CVE-2020-27820 RHSA-2022:1975 RHSA-2022:1988 SMASH Issue 272666 bnc#1179599 linux.git:commit:f55aaf63bde0d0336c3823bb3713bd4a464abbcf rh#1901726 |
CVE-2020-27825 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2020-27825 CVE-2020-27825 DSA-4843 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2020-27815 MISC:github.com:OSS:2020/Q4/204 MLIST:[debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update MLIST:[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update OSS:2020/11/30/5, OSS:2020/12/28/1, OSS:2020/Q4/204 RH:CVE-2020-27825 SMASH Issue 273159 bdo#970736 bdo#972345 bdo#977048 bdo#977615 bnc#1179960 bnc#1179961 jsc#CAR-1430 rh#1905155 |
CVE-2020-27830 | kernel-source-rt:Released | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2020-27830 DSA-4843 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2020-27815 MLIST:[debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update MLIST:[oss-security] 20201208 Re: Linux kernel NULL-ptr deref bug in spk_ttyio_receive_buf2 OSS:2020/11/30/5, OSS:2020/12/28/1, OSS:2020/Q4/189 OSS:2020/Q4/192 RH:CVE-2020-27830 SMASH Issue 272780 SMASH Issue 272808 bdo#970736 bdo#972345 bdo#977048 bdo#977615 bnc#1179656 rh#1919900 |
CVE-2020-27835 | kernel-source-rt:Released | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2020-27835 RH:CVE-2020-27835 RHSA-2021:1578 RHSA-2021:1739 SMASH Issue 272967 bnc#1179878 rh#1901709 |
CVE-2020-28097 | kernel-source-rt:Ignore | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2020-28097 CVE-2020-28097 MISC:cdn.kernel.org:CVE-2020-36312 MISC:git.kernel.org:CVE-2020-28097 MISC:github.com:CVE-2020-28097 MISC:seclists.org:CVE-2020-28097 SMASH Issue 302908 bnc#1176278 bnc#1187723 jsc#CAR-1002 rh#1880006 rh#1976208 |
CVE-2020-28374 | kernel-source-rt:Released | important | 8.1 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N) | CONFIRM:cdn.kernel.org:CVE-2020-28374 CONFIRM:git.kernel.org:CVE-2020-28374 CONFIRM:security.netapp.com:CVE-2020-28374 CVE-2020-28374 DSA-4843 FEDORA:FEDORA-2021-082e638d02 FEDORA:FEDORA-2021-4a91649cf3 FEDORA:FEDORA-2021-620fb40359 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2020-27815 MISC:packetstormsecurity.com:CVE-2020-0427 MISC:www.openwall.com:CVE-2021-3139 MLIST:[debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update MLIST:[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update MLIST:[oss-security] 20210113 Re: CVE-2020-28374: Linux SCSI target (LIO) unrestricted copy offload OSS:2020/11/30/5, OSS:2020/12/28/1, OSS:2021/Q1/31 RH:CVE-2020-28374 RHSA-2021:0856 RHSA-2021:0857 RHSA-2021:0862 RHSA-2021:1081 RHSA-2021:1093 RHSA-2021:1376 RHSA-2021:1377 RHSA-2021:1531 RHSA-2021:1532 RHSA-2021:2099 RHSA-2021:2106 RHSA-2021:2167 RHSA-2021:2185 RHSA-2021:2190 RHSA-2021:2732 SMASH Issue 270735 bdo#970736 bdo#972345 bdo#977048 bdo#977615 bnc#1178372 bnc#1178684 bnc#1180676 linux.git:commit:2896c93811e39d63a4d9b63ccf12a8fbc226e5e4 rh#1899804 |
CVE-2020-28588 | kernel-source-rt:Not affected | low | 2.9 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N) | CVE-2020-28588 MISC:talosintelligence.com:CVE-2020-28588 RH:CVE-2020-28588 SMASH Issue 278597 bnc#1182806 linux.git:commit:4f134b89a24b965991e7c345b9a4591821f7c2a6 rh#1933127 |
CVE-2020-28600 | file:Analysis | moderate | () | CVE-2020-28600 MISC:talosintelligence.com:CVE-2020-28600 SMASH Issue 283908 bnc#1185975 rh#1959716 |
CVE-2020-28915 | kernel-source-rt:Released | moderate | 5.1 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L) | CVE-2020-28915 MISC:cdn.kernel.org:CVE-2020-27194 MISC:git.kernel.org:CVE-2020-28915 MISC:syzkaller.appspot.com:CVE-2020-28915 RH:CVE-2020-28915 RHSA-2022:5316 RHSA-2022:5344 SMASH Issue 271838 bnc#1178886 rh#1899177 |
CVE-2020-28941 | kernel-source-rt:Released | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2020-28941 FEDORA:FEDORA-2020-4700a73bd5 FEDORA:FEDORA-2020-8c15928d23 MISC:git.kernel.org:CVE-2020-28941 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2020-28941 MISC:github.com:CVE-2020-28941 MISC:www.openwall.com:CVE-2020-28941 MLIST:[debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update MLIST:[oss-security] 20201119 Re: Linux kernel NULL-ptr deref bug in spk_ttyio_ldisc_close OSS:2020/11/19/3 OSS:2020/Q4/146 RH:CVE-2020-28941 SMASH Issue 271527 bnc#1178740 rh#1899985 |
CVE-2020-28974 | kernel-source-rt:Released | moderate | 5.1 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L) | CONFIRM:security.netapp.com:CVE-2020-28974 CVE-2020-28974 MISC:cdn.kernel.org:CVE-2020-28974 MISC:git.kernel.org:MLIST:[oss-security] 20201124 Re: Linux kernel slab-out-of-bounds Read in fbcon MISC:nvd.nist.gov:MLIST:[oss-security] 20201124 Re: Linux kernel slab-out-of-bounds Read in fbcon MISC:seclists.org:CVE-2020-28974 MLIST:[debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update MLIST:[debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update MLIST:[oss-security] 20201124 Re: Linux kernel slab-out-of-bounds Read in fbcon OSS:2020/Q4/165 RH:CVE-2020-28974 RHSA-2021:1578 RHSA-2021:1739 SMASH Issue 271216 SMASH Issue 272124 bnc#1178589 rh#1903126 |
CVE-2020-29361 | p11-kit:Unsupported | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2020-29361 DSA-4822 MISC:github.com:CVE-2020-29361 MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 MLIST:[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 MLIST:[debian-lts-announce] 20210104 [SECURITY] [DLA 2513-1] p11-kit security update RH:CVE-2020-29361 RHSA-2021:1609 SMASH Issue 273408 bnc#1180064 jsc#CAR-1020 rh#1903592 |
CVE-2020-29362 | p11-kit:Unsupported | moderate | 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) | CVE-2020-29362 DSA-4822 L3:63742 MISC:github.com:CVE-2020-29361 MISC:github.com:CVE-2020-29362 MLIST:[debian-lts-announce] 20210104 [SECURITY] [DLA 2513-1] p11-kit security update RH:CVE-2020-29362 RHSA-2021:1609 SMASH Issue 273410 bnc#1180065 bnc#1201534 jsc#CAR-1019 rh#1903590 |
CVE-2020-29363 | p11-kit:Not affected | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2020-29363 DSA-4822 MISC:github.com:CVE-2020-29361 MISC:github.com:CVE-2020-29363 MISC:www.oracle.com:CVE-2022-21498 Oracle:CVE-2020-29363 RH:CVE-2020-29363 RHSA-2021:1609 SMASH Issue 273409 bnc#1180066 rh#1903588 |
CVE-2020-29368 | kernel-source-rt:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2020-29368 CVE-2020-29368 DSA-5096 MISC:bugs.chromium.org:CVE-2020-29368 MISC:cdn.kernel.org:CVE-2020-29368 MISC:git.kernel.org:CVE-2020-29368 OSS:2021/07/22/1 OSS:2022/01/25/12 RH:CVE-2020-29368 RHSA-2021:4140 RHSA-2021:4356 RHSA-2022:5220 RHSA-2022:5224 RHSA-2022:5626 RHSA-2022:5633 SMASH Issue 272433 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1179660 bnc#1179664 linux.git:commit:3bff7e3f1f16dc7305d12905c51c278b54970f0e linux.git:commit:53a05ad9f21d858d24f76d12b3e990405f2036d1 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 linux.git:commit:c145e0b47c77ebeefdfd73dbb344577b2fc9b065 rh#1903244 rh#1980646 rh#1997467 rh#2044561 rh#2053632 rh#2059923 |
CVE-2020-29369 | kernel-source-rt:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2020-29369 CVE-2020-29369 MISC:bugs.chromium.org:MLIST:[oss-security] 20210219 Re: CVE-2021-20200: Linux kernel: close race between munmap() and expand_upwards()/downwards() MISC:cdn.kernel.org:CVE-2020-29369 MISC:git.kernel.org:MLIST:[oss-security] 20210219 Re: CVE-2021-20200: Linux kernel: close race between munmap() and expand_upwards()/downwards() MLIST:[oss-security] 20210210 Re: CVE-2021-20200: Linux kernel: close race between munmap() and expand_upwards()/downwards() MLIST:[oss-security] 20210219 Re: CVE-2021-20200: Linux kernel: close race between munmap() and expand_upwards()/downwards() OSS:2021/Q1/136 RH:CVE-2020-29369 SMASH Issue 272434 bnc#1173504 bnc#1179432 bnc#1179646 rh#1903262 |
CVE-2020-29370 | kernel-source-rt:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2020-29370 CVE-2020-29370 MISC:bugs.chromium.org:CVE-2020-29370 MISC:cdn.kernel.org:CVE-2020-29370 MISC:git.kernel.org:CVE-2020-29370 RH:CVE-2020-29370 SMASH Issue 272435 bnc#1179435 bnc#1179648 rh#1875840 rh#1903278 |
CVE-2020-29371 | kernel-source-rt:Released | low | 4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) | CVE-2020-29371 MISC:bugs.chromium.org:CVE-2020-29371 MISC:cdn.kernel.org:CVE-2020-29371 MISC:git.kernel.org:CVE-2020-29371 RH:CVE-2020-29371 SMASH Issue 272436 bnc#1179429 rh#1894589 |
CVE-2020-29372 | kernel-source-rt:Not affected | low | 0 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N) | CVE-2020-29372 MISC:bugs.chromium.org:CVE-2020-29372 MISC:cdn.kernel.org:CVE-2020-12464 MISC:git.kernel.org:CVE-2020-29372 MISC:packetstormsecurity.com:CVE-2020-27170 RH:CVE-2020-29372 SMASH Issue 272437 bnc#1179433 rh#1874535 rh#1903283 |
CVE-2020-29373 | kernel-source-rt:Released | important | 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) | CONFIRM:cdn.kernel.org:CVE-2020-12768 CVE-2020-29373 MISC:bugs.chromium.org:CVE-2020-29373 MISC:git.kernel.org:CVE-2020-29373 RH:CVE-2020-29373 SMASH Issue 272438 bnc#1179434 bnc#1179779 rh#1875818 rh#1903291 |
CVE-2020-29374 | kernel-source-rt:Already fixed | low | 3.6 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N) | CONFIRM:security.netapp.com:CVE-2020-29374 CVE-2020-29374 DSA-5096 L3:60485 MISC:bugs.chromium.org:CVE-2020-29368 MISC:cdn.kernel.org:CVE-2020-29374 MISC:git.kernel.org:CVE-2020-29374 MISC:packetstormsecurity.com:CVE-2020-27170 MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update OSS:2021/07/22/1 OSS:2022/01/25/12 RH:CVE-2020-29374 SMASH Issue 272439 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1179428 bnc#1184308 jsc#CAR-1018 linux.git:commit:3bff7e3f1f16dc7305d12905c51c278b54970f0e linux.git:commit:53a05ad9f21d858d24f76d12b3e990405f2036d1 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 linux.git:commit:c145e0b47c77ebeefdfd73dbb344577b2fc9b065 rh#1903249 rh#1980646 rh#1997467 rh#2044561 rh#2053632 rh#2055502 rh#2059923 |
CVE-2020-29534 | kernel-source-rt:Not affected | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2020-29534 MISC:bugs.chromium.org:CVE-2020-29534 MISC:cdn.kernel.org:CVE-2020-29534 MISC:git.kernel.org:CVE-2020-29534 RH:CVE-2020-29534 SMASH Issue 272707 bnc#1179598 rh#1905497 |
CVE-2020-29562 | glibc:Released | moderate | 6.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2020-29562 CVE-2020-29562 FEDORA:FEDORA-2021-6e581c051a GLSA-202101-20 L3:67771 MISC:sourceware.org:CVE-2020-29562 MLIST:[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar RH:CVE-2020-29562 SMASH Issue 272742 bnc#1179694 rh#1905217 |
CVE-2020-29568 | kernel-source-rt:Released | moderate | 6.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H) | CVE-2020-29568 DSA-4843 GLSA-202107-30 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2020-27815 MISC:xenbits.xenproject.org:CVE-2020-29568 MLIST:[debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update MLIST:[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update OSS:2020/11/30/5, OSS:2020/12/28/1, OSS:2020/Q4/217 SMASH Issue 272608 SMASH Issue 272827 bdo#970736 bdo#972345 bdo#977048 bdo#977615 bnc#1179508 rh#1905658 |
CVE-2020-29569 | kernel-source-rt:Released | important | 8.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2020-29569 CVE-2020-29569 DSA-4843 GLSA-202107-30 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2020-27815 MISC:xenbits.xenproject.org:CVE-2020-29569 MLIST:[debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update MLIST:[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update OSS:2020/11/30/5, OSS:2020/12/28/1, OSS:2020/Q4/216 SMASH Issue 272609 SMASH Issue 272828 bdo#970736 bdo#972345 bdo#977048 bdo#977615 bnc#1179509 bnc#1180008 rh#1905636 |
CVE-2020-29573 | glibc:Released | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2020-29562 CVE-2020-29573 GLSA-202101-20 L3:60728 L3:60856 L3:62250 L3:67771 MISC:sourceware.org:CVE-2020-29573 RH:CVE-2020-29573 RHSA-2021:0348 RHSA-2021:2813 RHSA-2021:2998 RHSA-2021:3315 SMASH Issue 272771 bnc#1179721 bnc#1185816 bnc#1186446 bnc#1193392 rh#1905213 |
CVE-2020-29660 | kernel-source-rt:Released | important | 7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2020-29660 CVE-2020-29660 CVE-2020-29661 DSA-4843 FEDORA:FEDORA-2020-b732958765 FEDORA:FEDORA-2020-bc0cc81a7a L3:66541 L3:66770 L3:67469 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2020-27815 MISC:git.kernel.org:MLIST:[oss-security] 20201210 2 kernel issues MISC:packetstormsecurity.com:CVE-2020-29661 MISC:www.oracle.com:CVE-2021-35666 MLIST:[debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update MLIST:[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update MLIST:[oss-security] 20201210 2 kernel issues OSS:2020/11/30/5, OSS:2020/12/28/1, OSS:2020/Q4/202 Oracle:CVE-2020-29661 RH:CVE-2020-29660 RH:CVE-2020-29661 RHSA-2021:0354 RHSA-2021:0537 RHSA-2021:0558 RHSA-2021:0686 RHSA-2021:0689 RHSA-2021:0763 RHSA-2021:0765 RHSA-2021:0774 RHSA-2021:0856 RHSA-2021:0857 RHSA-2021:0862 RHSA-2021:0878 RHSA-2021:0940 RHSA-2021:1028 RHSA-2021:1031 RHSA-2021:1288 RHSA-2021:2164 RHSA-2021:4140 RHSA-2021:4356 SMASH Issue 272809 SMASH Issue 272964 bdo#970736 bdo#972345 bdo#977048 bdo#977615 bnc#1179745 bnc#1179877 rh#1906522 rh#1906525 |
CVE-2020-29661 | kernel-source-rt:Released | important | 7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2020-29660 CVE-2020-29660 CVE-2020-29661 DSA-4843 FEDORA:FEDORA-2020-b732958765 FEDORA:FEDORA-2020-bc0cc81a7a L3:66541 L3:66770 L3:67469 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2020-27815 MISC:git.kernel.org:MLIST:[oss-security] 20201210 2 kernel issues MISC:packetstormsecurity.com:CVE-2020-29661 MISC:www.oracle.com:CVE-2021-35666 MLIST:[debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update MLIST:[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update MLIST:[oss-security] 20201210 2 kernel issues OSS:2020/11/30/5, OSS:2020/12/28/1, OSS:2020/Q4/202 Oracle:CVE-2020-29661 RH:CVE-2020-29660 RH:CVE-2020-29661 RHSA-2021:0354 RHSA-2021:0537 RHSA-2021:0558 RHSA-2021:0686 RHSA-2021:0689 RHSA-2021:0763 RHSA-2021:0765 RHSA-2021:0774 RHSA-2021:0856 RHSA-2021:0857 RHSA-2021:0862 RHSA-2021:0878 RHSA-2021:0940 RHSA-2021:1028 RHSA-2021:1031 RHSA-2021:1288 RHSA-2021:2164 RHSA-2021:4140 RHSA-2021:4356 SMASH Issue 272809 SMASH Issue 272965 bdo#970736 bdo#972345 bdo#977048 bdo#977615 bnc#1179745 bnc#1179877 rh#1906522 rh#1906525 |
CVE-2020-35448 | binutils:Unsupported | moderate | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CONFIRM:security.netapp.com:CVE-2020-35448 CVE-2020-35448 GLSA-202107-24 MISC:sourceware.org:CVE-2020-35448 RHSA-2021:4364 SMASH Issue 274063 bnc#1184794 jsc#CAR-1017 rh#1950478 |
CVE-2020-35457 | glib2:Ignore | important | () | CVE-2020-35457 MISC:gitlab.gnome.org:CVE-2020-35457 SMASH Issue 273376 bnc#1193464 |
CVE-2020-35493 | binutils:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2020-35493 CVE-2020-35493 FEDORA:FEDORA-2020-28c78a6ac3 GLSA-202107-24 RH:CVE-2020-35493 SMASH Issue 274140 SMASH Issue 274255 bnc#1180451 jsc#CAR-1446 rh#1911437 |
CVE-2020-35494 | binutils:Not affected | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2020-35493 CVE-2020-35494 FEDORA:FEDORA-2020-28c78a6ac3 GLSA-202107-24 RH:CVE-2020-35494 SMASH Issue 274139 SMASH Issue 274256 bnc#1180452 rh#1911439 |
CVE-2020-35495 | binutils:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2020-35493 CVE-2020-35495 FEDORA:FEDORA-2020-28c78a6ac3 GLSA-202107-24 RH:CVE-2020-35495 SMASH Issue 274137 SMASH Issue 274257 bnc#1180453 rh#1911441 |
CVE-2020-35496 | binutils:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2020-35493 CVE-2020-35496 FEDORA:FEDORA-2020-28c78a6ac3 GLSA-202107-24 RH:CVE-2020-35496 SMASH Issue 274138 SMASH Issue 274258 bnc#1180454 jsc#CAR-1447 rh#1911444 |
CVE-2020-35499 | kernel-source-rt:Not affected | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2020-35499 RH:CVE-2020-35499 SMASH Issue 274266 SMASH Issue 274267 bnc#1180460 rh#1910048 |
CVE-2020-35501 | kernel-source-rt:Not affected | moderate | 6 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N) | CVE-2020-35501 OSS:2021/Q1/155 OSS:2021/Q1/158 OSS:2021/Q1/179 RH:CVE-2020-35501 SMASH Issue 278232 bnc#1182435 rh#1908577 |
CVE-2020-35507 | binutils:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2020-35493 CVE-2020-35507 GLSA-202107-24 RH:CVE-2020-35507 SMASH Issue 274268 bnc#1180461 jsc#CAR-1448 rh#1911691 |
CVE-2020-35508 | kernel-source-rt:Not affected | moderate | 4.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L) | CONFIRM:security.netapp.com:CVE-2020-35508 CVE-2020-35508 MISC:access.redhat.com:/errata/RHSA-2021:2718 MISC:access.redhat.com:/errata/RHSA-2021:2719 MISC:github.com:CVE-2020-35508 RH:CVE-2020-35508 RHSA-2021:1578 RHSA-2021:1739 RHSA-2021:2718 RHSA-2021:2719 SMASH Issue 274481 bnc#1180529 rh#1902724 |
CVE-2020-35512 | dbus-1:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2020-35512 L3:64519 MISC:bugs.gentoo.org:CVE-2020-35512 RH:CVE-2020-35512 SMASH Issue 274738 bnc#1187105 https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128 https://security-tracker.debian.org/tracker/CVE-2020-35512 jsc#CAR-1016 rh#1909101 |
CVE-2020-35513 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2020-35513 MISC:patchwork.kernel.org:CVE-2020-35513 RH:CVE-2020-35513 RHSA-2021:0336 RHSA-2021:0338 SMASH Issue 276218 bnc#1181362 rh#1911309 |
CVE-2020-35519 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2020-35519 CVE-2020-35519 L3:65879 OSS:2021/Q1/228 RH:CVE-2020-35519 SMASH Issue 279990 bnc#1183696 bnc#1184953 rh#1908251 |
CVE-2020-35525 | sqlite3:Already fixed | moderate | 5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2020-35525 MISC:www.sqlite.org:CVE-2020-35525 RHSA-2022:7108 SMASH Issue 341039 bnc#1202910 https://security.netapp.com/advisory/ntap-20230706-0007/ rh#2122324 |
CVE-2020-35527 | sqlite3:Not affected | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2020-35527 CVE-2020-35527 MISC:www.sqlite.org:CVE-2020-35527 RHSA-2022:7108 SMASH Issue 341040 bnc#1202912 rh#2122329 |
CVE-2020-35536 | gcc:Ignore, gcc7:Won't fix | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CVE-2020-35536 D:CVE-2020-35536 MISC:gcc.gnu.org:CVE-2020-35536 SMASH Issue 341086 bnc#1202918 jsc#CAR-2000 rh#2122380 |
CVE-2020-35537 | gcc:Ignore, gcc7:Won't fix | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CVE-2020-35537 D:CVE-2020-35537 MISC:gcc.gnu.org:CVE-2020-35537 SMASH Issue 341087 bnc#1202922 jsc#CAR-2001 rh#2122381 |
CVE-2020-36158 | kernel-source-rt:Released | important | 8.8 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2020-36158 CVE-2020-36158 DSA-4843 FEDORA:FEDORA-2021-3465ada1ca MISC:git.kernel.org:CVE-2020-36158 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2020-27815 MISC:github.com:CVE-2020-36158 MISC:lore.kernel.org:CVE-2020-36158 MISC:patchwork.kernel.org:CVE-2020-36158 MLIST:[debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update MLIST:[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update OSS:2020/11/30/5, OSS:2020/12/28/1, RH:CVE-2020-36158 RHSA-2021:4140 RHSA-2021:4356 SMASH Issue 274526 bdo#970736 bdo#972345 bdo#977048 bdo#977615 bnc#1180559 bnc#1180562 jsc#CAR-1015 rh#1913348 |
CVE-2020-36242 | python-cryptography:Released | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:github.com:CVE-2020-36242 CVE-2020-36242 FEDORA:FEDORA-2021-8e36e7ed1a MISC:github.com:CVE-2020-36242 MISC:www.oracle.com:CVE-2022-21498 MISC:www.oracle.com:CVE-2022-21586 Oracle:CVE-2020-36242 RH:CVE-2020-36242 RHSA-2021:1608 RHSA-2021:2239 RHSA-2021:3254 SMASH Issue 277390 bnc#1182066 jsc#CAR-1014 rh#1926226 |
CVE-2020-36310 | kernel-source-rt:Released | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2020-36310 DSA-5095 DSA-5096 MISC:cdn.kernel.org:CVE-2020-36310 MISC:git.kernel.org:CVE-2020-36310 OSS:2021/07/22/1 OSS:2022/01/25/12 RH:CVE-2020-36310 SMASH Issue 281255 bdo#988044 bdo#989285 bdo#990279 bdo#990411 bdo#994050 bnc#1184512 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1947982 rh#1980646 rh#1997467 rh#2044561 rh#2053632 rh#2059923 |
CVE-2020-36311 | kernel-source-rt:Released | low | 4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | CVE-2020-36311 DSA-4941 MISC:cdn.kernel.org:CVE-2020-36311 MISC:git.kernel.org:CVE-2020-36311 MLIST:[debian-lts-announce] 20210720 [SECURITY] [DLA 2714-1] linux-4.19 security update RH:CVE-2020-36311 SMASH Issue 281256 bnc#1184511 rh#1947994 |
CVE-2020-36312 | kernel-source-rt:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2020-36312 MISC:cdn.kernel.org:CVE-2020-36312 MISC:git.kernel.org:CVE-2020-36312 RH:CVE-2020-36312 RHSA-2021:4140 RHSA-2021:4356 SMASH Issue 281257 bnc#1184509 jsc#CAR-1001 rh#1947991 |
CVE-2020-36313 | kernel-source-rt:Not affected | important | () | CONFIRM:security.netapp.com:CVE-2020-36313 CVE-2020-36313 MISC:cdn.kernel.org:CVE-2020-36313 MISC:git.kernel.org:CVE-2020-36313 RH:CVE-2020-36313 SMASH Issue 281258 bnc#1184504 rh#1947986 |
CVE-2020-36322 | kernel-source-rt:Released | important | 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H) | CVE-2020-36322 DSA-5096 L3:61260 L3:61406 L3:61476 MISC:cdn.kernel.org:CVE-2020-36322 MISC:git.kernel.org:CVE-2020-36322 MISC:github.com:OSS:2021/Q2/224 MISC:www.starwindsoftware.com:CVE-2020-36322 MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update OSS:2021/06/19/1 OSS:2021/07/22/1 OSS:2022/01/25/12 RHSA-2021:1578 RHSA-2022:0063 RHSA-2022:0065 RHSA-2022:0072 RHSA-2022:0078 SMASH Issue 280771 SMASH Issue 281984 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1184211 bnc#1184952 bnc#1188554 bnc#1189664 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1949560 rh#1980646 rh#1997467 rh#2044561 rh#2053632 rh#2055502 rh#2059923 |
CVE-2020-36385 | kernel-source-rt:Released | important | 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2020-36385 CVE-2020-36385 L3:61406 MISC:cdn.kernel.org:CVE-2020-36385 MISC:git.kernel.org:CVE-2020-36385 MISC:sites.google.com:CVE-2020-36385 MISC:syzkaller.appspot.com:CVE-2020-36385 MISC:www.starwindsoftware.com:CVE-2020-36385 RHSA-2021:3987 RHSA-2021:4056 RHSA-2021:4088 RHSA-2021:4122 RHSA-2021:4597 RHSA-2021:4687 RHSA-2021:4692 RHSA-2021:4768 RHSA-2021:4770 RHSA-2021:4773 RHSA-2021:4774 RHSA-2021:4777 RHSA-2021:4779 RHSA-2021:4798 RHSA-2021:4859 RHSA-2021:4871 RHSA-2021:4875 RHSA-2021:4971 RHSA-2021:5035 RHSA-2022:0157 SMASH Issue 301329 bnc#1187050 bnc#1187052 jsc#CAR-1000 rh#1974319 |
CVE-2020-36386 | kernel-source-rt:Released | moderate | 5.1 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L) | CVE-2020-36386 MISC:cdn.kernel.org:CVE-2020-36386 MISC:git.kernel.org:CVE-2020-36386 MISC:sites.google.com:CVE-2020-36386 MISC:syzkaller.appspot.com:CVE-2020-36386 RHSA-2021:4140 RHSA-2021:4356 SMASH Issue 301364 bnc#1187038 jsc#CAR-998 rh#1969489 |
CVE-2020-36387 | kernel-source-rt:Not affected | important | 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2020-36387 MISC:cdn.kernel.org:CVE-2020-26088 MISC:git.kernel.org:CVE-2020-36387 MISC:sites.google.com:CVE-2020-36387 MISC:syzkaller.appspot.com:CVE-2020-36387 SMASH Issue 301363 bnc#1187053 https://security.netapp.com/advisory/ntap-20210727-0006/ rh#1969497 |
CVE-2020-36394 | pam:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2020-36394 MISC:seclists.org:CVE-2020-36394 SMASH Issue 302787 bnc#1188682 |
CVE-2020-36516 | kernel-source-rt:Released | important | 8.1 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2020-36516 CVE-2020-36516 D:CVE-2020-36516 L3:64310 L3:64329 MISC:dl.acm.org:CVE-2020-36516 RHSA-2022:7444 RHSA-2022:7683 RHSA-2022:7933 RHSA-2022:8267 SMASH Issue 324891 bnc#1196616 bnc#1196867 jsc#CAR-1577 rh#2059928 |
CVE-2020-36557 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2020-36557 L3:64012 L3:64525 L3:64549 L3:64602 MISC:cdn.kernel.org:CVE-2020-36557 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2020-25668 RHSA-2021:1578 SMASH Issue 337947 SMASH Issue 337949 bnc#1201429 bnc#1201742 jsc#CAR-1918 rh#2112688 |
CVE-2020-36558 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2020-36558 L3:64525 L3:64549 L3:64602 MISC:cdn.kernel.org:CVE-2020-36558 MISC:git.kernel.org:CVE-2020-36558 RHSA-2022:7444 RHSA-2022:7683 RHSA-2023:5627 SMASH Issue 337946 SMASH Issue 337948 bnc#1200910 bnc#1201752 jsc#CAR-1919 rh#2112693 |
CVE-2020-36691 | kernel-source-rt:Ignore | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2020-36691 MISC:cdn.kernel.org:CVE-2020-36310 SMASH Issue 360815 SMASH Issue 361172 bnc#1209613 bnc#1209777 https://github.com/torvalds/linux/commit/7690aa1cdf7c4565ad6b013b324c28b685505e24 jsc#CAR-2473 rh#2181614 |
CVE-2020-36694 | kernel-source-rt:Not affected | moderate | 6.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H) | CVE-2020-36694 D:CVE-2020-36694 MISC:cdn.kernel.org:CVE-2020-36385 RHSA-2021:1578 RHSA-2021:1739 SMASH Issue 367086 bnc#1211596 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cc00bcaa589914096edef7fb87ca5cee4a166b5c https://security.netapp.com/advisory/ntap-20230622-0005/ https://syzkaller.appspot.com/bug?id=0c4fd9c6aa04ec116d01e915d3b186f71a212cb2 rh#2212140 |
CVE-2020-36766 | kernel-source-rt:Released | low | 2.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N) | CVE-2020-36766 SMASH Issue 378140 bnc#1215299 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.6 https://github.com/torvalds/linux/commit/6c42227c3467549ddc65efe99c869021d2f4a570 jsc#CAR-2908 rh#2239712 |
CVE-2020-36775 | kernel-source-rt:Not affected | moderate | 5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2020-36775 SMASH Issue 395207 bnc#1220412 https://git.kernel.org/stable/c/0478ccdc8ea016de1ebaf6fe6da0275c2b258c5b https://git.kernel.org/stable/c/8e8542437bb4070423c9754d5ba270ffdbae8c8d https://git.kernel.org/stable/c/df77fbd8c5b222c680444801ffd20e8bbc90a56e rh#2266267 |
CVE-2020-36776 | kernel-source-rt:Not affected | low | 2.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N) | CVE-2020-36776 SMASH Issue 395343 bnc#1220506 https://git.kernel.org/stable/c/34ab17cc6c2c1ac93d7e5d53bb972df9a968f085 https://git.kernel.org/stable/c/6bf443acf6ca4f666d0e4225614ba9993a3aa1a9 https://git.kernel.org/stable/c/876a5f33e5d961d879c5436987c09b3d9ef70379 https://git.kernel.org/stable/c/c24a20912eef00587416628149c438e885eb1304 rh#2266748 |
CVE-2020-36777 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) | CVE-2020-36777 SMASH Issue 395344 bnc#1220526 https://git.kernel.org/stable/c/06854b943e0571ccbd7ad0a529babed1a98ff275 https://git.kernel.org/stable/c/32168ca1f123316848fffb85d059860adf3c409f https://git.kernel.org/stable/c/43263fd43083e412311fa764cd04a727b0c6a749 https://git.kernel.org/stable/c/9185b3b1c143b8da409c19ac5a785aa18d67a81b https://git.kernel.org/stable/c/9ad15e214fcd73694ea51967d86055f47b802066 https://git.kernel.org/stable/c/bf9a40ae8d722f281a2721779595d6df1c33a0bf https://git.kernel.org/stable/c/cd89f79be5d553c78202f686e8e4caa5fbe94e98 https://git.kernel.org/stable/c/cede24d13be6c2a62be6d7ceea63c2719b0cfa82 rh#2266746 |
CVE-2020-36778 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2020-36778 SMASH Issue 395415 bnc#1220555 https://git.kernel.org/stable/c/a42ac16e6573f19c78f556ea292f5b534fcc4514 https://git.kernel.org/stable/c/a85c5c7a3aa8041777ff691400b4046e56149fd3 https://git.kernel.org/stable/c/c977426db644ba476938125597947979e8aba725 https://git.kernel.org/stable/c/e2ba996577eaea423694dc69ae43d56f1410a22b rh#2266940 |
CVE-2020-36779 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2020-36779 SMASH Issue 395416 bnc#1220558 https://git.kernel.org/stable/c/2c662660ce2bd3b09dae21a9a9ac9395e1e6c00b https://git.kernel.org/stable/c/c323b270a52a26aa8038a4d1fd9a850904a41166 https://git.kernel.org/stable/c/c7ea772c9fcf711ed566814b92eecaffc0e2bfd0 https://git.kernel.org/stable/c/d791b90f5c5e5aa8ccf9e33386c16bd2b7e333a4 rh#2266942 |
CVE-2020-36780 | kernel-source-rt:Already fixed | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2020-36780 SMASH Issue 395417 bnc#1220556 https://git.kernel.org/stable/c/3a4f326463117cee3adcb72999ca34a9aaafda93 https://git.kernel.org/stable/c/7e1764312440c5df9dfe6b436035a03673b0c1b9 https://git.kernel.org/stable/c/9223505e938ba3db5907e058f4209770cff2f2a7 https://git.kernel.org/stable/c/d3406ab52097328a3bc4cbe124bfd8f6d51fb86f https://git.kernel.org/stable/c/e547640cee7981fd751d2c9cde3a61bdb678b755 rh#2266944 |
CVE-2020-36781 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2020-36781 SMASH Issue 395418 bnc#1220557 https://git.kernel.org/stable/c/1ecc0ebc2ebbad4a22a670a07d27a21fa0b59c77 https://git.kernel.org/stable/c/3a0cdd336d92c429b51a79bf4f64b17eafa0325d https://git.kernel.org/stable/c/47ff617217ca6a13194fcb35c6c3a0c57c080693 https://git.kernel.org/stable/c/ff406f6cd09c273337ab4854292e4aca48f8affd rh#2266946 |
CVE-2020-36782 | kernel-source-rt:Already fixed | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2020-36782 SMASH Issue 395419 bnc#1220560 https://git.kernel.org/stable/c/278e5bbdb9a94fa063c0f9bcde2479d0b8042462 https://git.kernel.org/stable/c/815859cb1d2302e74f11bf6894bceace9ca9eb4a https://git.kernel.org/stable/c/b100650d80cd2292f6c152f5f2943b5944b3e8ce https://git.kernel.org/stable/c/bb300acc867e937edc2a6898e92b21f88e4e4e66 https://git.kernel.org/stable/c/cc49d206414240483bb93ffa3d80243e6a776916 rh#2266948 |
CVE-2020-36783 | kernel-source-rt:Already fixed | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2020-36783 SMASH Issue 395420 bnc#1220561 https://git.kernel.org/stable/c/223125e37af8a641ea4a09747a6a52172fc4b903 https://git.kernel.org/stable/c/4734c4b1d9573c9d20bbc46cf37dde095ee011b8 https://git.kernel.org/stable/c/7ee35cde1e810ad6ca589980b9ec2b7b62946a5b https://git.kernel.org/stable/c/96c4a03658d661666c360959aa80cdabfe2972ed https://git.kernel.org/stable/c/e80ae8bde41266d3b8bf012460b6593851766006 rh#2266950 |
CVE-2020-36785 | kernel-source-rt:Not affected | moderate | 5.9 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) | CVE-2020-36785 SMASH Issue 395422 bnc#1220576 https://git.kernel.org/stable/c/801c1d505894008c888bc71d08d5cff5d87f8aba https://git.kernel.org/stable/c/8267ccd7b9df7ab682043507dd682fe0621cf045 https://git.kernel.org/stable/c/ba11bbf303fafb33989e95473e409f6ab412b18d https://git.kernel.org/stable/c/d218c7a0284f6b92a7b82d2e19706e18663b4193 rh#2266954 |
CVE-2020-36786 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2020-36786 SMASH Issue 395423 bnc#1220605 https://git.kernel.org/stable/c/27d2eab69f7da8e94e4751ac5c6d22d809275484 https://git.kernel.org/stable/c/4f0f37d03cde8f4341df8454f9b40a67fda94a33 https://git.kernel.org/stable/c/6045b01dd0e3cd3759eafe7f290ed04c957500b1 https://git.kernel.org/stable/c/cc4cc2fb5aaf9adb83c02211eb13b16cfcb7ba64 rh#2266956 |
CVE-2020-36787 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L) | CVE-2020-36787 SMASH Issue 395424 bnc#1220616 https://git.kernel.org/stable/c/1dc1d30ac101bb8335d9852de2107af60c2580e7 https://git.kernel.org/stable/c/2964c37563e86cfdc439f217eb3c5a69adfdba6a https://git.kernel.org/stable/c/3536169f8531c2c5b153921dc7d1ac9fd570cda7 https://git.kernel.org/stable/c/75321dc8aebe3f30eff226028fe6da340fe0bf02 https://git.kernel.org/stable/c/a59d01384c80a8a4392665802df57c3df20055f5 rh#2266958 |
CVE-2020-36788 | kernel-source-rt:Not affected | moderate | 5.8 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H) | CVE-2020-36788 SMASH Issue 406845 bnc#1224816 https://git.kernel.org/stable/c/548f2ff8ea5e0ce767ae3418d1ec5308990be87d https://git.kernel.org/stable/c/bcf34aa5082ee2343574bc3f4d1c126030913e54 https://git.kernel.org/stable/c/f86e19d918a85492ad1a01fcdc0ad5ecbdac6f96 rh#2282961 |
CVE-2020-3702 | kernel-source-rt:Released | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) | CONFIRM:www.arista.com:CVE-2020-3702 CONFIRM:www.qualcomm.com:CVE-2018-13903 CVE-2020-3702 D:CVE-2020-3702 DSA-5096 L3:61810 OSS:2021/07/22/1 OSS:2022/01/25/12 SMASH Issue 266908 bdo#988044 bdo#989285 bdo#990411 bdo#993948 bdo#993978 bdo#994050 bnc#1191193 bnc#1191293 bnc#1191529 jsc#CAR-1137 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2010852 rh#2044561 rh#2053632 rh#2059923 |
CVE-2020-4788 | kernel-source-rt:Released | moderate | 5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N) | CONFIRM:www.ibm.com:/support/pages/node/6370729 CONFIRM:www.ibm.com:CVE-2020-4788 CVE-2020-4788 FEDORA:FEDORA-2020-4700a73bd5 FEDORA:FEDORA-2020-8c15928d23 MISC:exchange.xforce.ibmcloud.com:MLIST:[oss-security] 20201120 CVE-2020-4788: Speculation on incompletely validated data on IBM Power9 MISC:www.oracle.com:CVE-2022-21586 MLIST:[oss-security] 20201120 CVE-2020-4788: Speculation on incompletely validated data on IBM Power9 MLIST:[oss-security] 20201123 Re: CVE-2020-4788: Speculation on incompletely validated data on IBM Power9 OSS:2020/Q4/151 RH:CVE-2020-4788 RHSA-2022:1988 SMASH Issue 269117 XF:ibm-i-cve20204788-info-disc (189296) bnc#1177666 linux.git:commit:9a32a7e78bd0cd9a9b6332cbdc345ee5ffd0c5de linux.git:commit:dda3f4252e6c8b833a2ef164afd3da9808d0f07c linux.git:commit:f79643787e0a0762d2409b7b8334e83f22d85695 rh#1888433 |
CVE-2020-6381 | sqlite3:Released | important | () | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2019-19880 CONFIRM:security.netapp.com:CVE-2019-19923 CVE-2019-19880 CVE-2019-19923 CVE-2019-19926 CVE-2020-6381 CVE-2020-6382 CVE-2020-6385 CVE-2020-6387 CVE-2020-6388 CVE-2020-6389 CVE-2020-6390 CVE-2020-6391 CVE-2020-6392 CVE-2020-6393 CVE-2020-6394 CVE-2020-6395 CVE-2020-6396 CVE-2020-6397 CVE-2020-6398 CVE-2020-6399 CVE-2020-6400 CVE-2020-6401 CVE-2020-6402 CVE-2020-6403 CVE-2020-6404 CVE-2020-6405 CVE-2020-6406 CVE-2020-6408 CVE-2020-6409 CVE-2020-6410 CVE-2020-6411 CVE-2020-6412 CVE-2020-6413 CVE-2020-6414 CVE-2020-6415 CVE-2020-6416 CVE-2020-6417 D:CVE-2020-6391 DSA-4638 FEDORA:FEDORA-2020-39e0b8bd14 FEDORA:FEDORA-2020-f6271d7afa GLSA-202003-08 MISC:chromereleases.googleblog.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6382 MISC:crbug.com:CVE-2020-6385 MISC:crbug.com:CVE-2020-6387 MISC:crbug.com:CVE-2020-6388 MISC:crbug.com:CVE-2020-6389 MISC:crbug.com:CVE-2020-6390 MISC:crbug.com:CVE-2020-6391 MISC:crbug.com:CVE-2020-6392 MISC:crbug.com:CVE-2020-6393 MISC:crbug.com:CVE-2020-6394 MISC:crbug.com:CVE-2020-6395 MISC:crbug.com:CVE-2020-6396 MISC:crbug.com:CVE-2020-6397 MISC:crbug.com:CVE-2020-6398 MISC:crbug.com:CVE-2020-6399 MISC:crbug.com:CVE-2020-6400 MISC:crbug.com:CVE-2020-6401 MISC:crbug.com:CVE-2020-6402 MISC:crbug.com:CVE-2020-6403 MISC:crbug.com:CVE-2020-6404 MISC:crbug.com:CVE-2020-6405 MISC:crbug.com:CVE-2020-6406 MISC:crbug.com:CVE-2020-6408 MISC:crbug.com:CVE-2020-6409 MISC:crbug.com:CVE-2020-6410 MISC:crbug.com:CVE-2020-6411 MISC:crbug.com:CVE-2020-6412 MISC:crbug.com:CVE-2020-6413 MISC:crbug.com:CVE-2020-6414 MISC:crbug.com:CVE-2020-6415 MISC:crbug.com:CVE-2020-6416 MISC:crbug.com:CVE-2020-6417 MISC:github.com:CVE-2019-19880 MISC:github.com:CVE-2019-19923 MISC:github.com:CVE-2019-19926 MISC:packetstormsecurity.com:CVE-2020-6388 MISC:packetstormsecurity.com:CVE-2020-6390 MISC:www.oracle.com:CVE-2019-2880 Oracle:CVE-2019-18197 RH:CVE-2019-19880 RH:CVE-2019-19923 RH:CVE-2019-19926 RH:CVE-2020-6381 RH:CVE-2020-6382 RH:CVE-2020-6385 RH:CVE-2020-6387 RH:CVE-2020-6388 RH:CVE-2020-6389 RH:CVE-2020-6390 RH:CVE-2020-6391 RH:CVE-2020-6392 RH:CVE-2020-6393 RH:CVE-2020-6394 RH:CVE-2020-6395 RH:CVE-2020-6396 RH:CVE-2020-6397 RH:CVE-2020-6398 RH:CVE-2020-6399 RH:CVE-2020-6400 RH:CVE-2020-6401 RH:CVE-2020-6402 RH:CVE-2020-6403 RH:CVE-2020-6404 RH:CVE-2020-6405 RH:CVE-2020-6406 RH:CVE-2020-6408 RH:CVE-2020-6409 RH:CVE-2020-6410 RH:CVE-2020-6411 RH:CVE-2020-6412 RH:CVE-2020-6413 RH:CVE-2020-6414 RH:CVE-2020-6415 RH:CVE-2020-6416 RH:CVE-2020-6417 RHSA-2020:0514 RHSA-2020:1810 RHSA-2020:4442 SMASH Issue 252466 SUSE:openSUSE-SU-2020:0189 SUSE:openSUSE-SU-2020:0210 SUSE:openSUSE-SU-2020:0233 UBUNTU:CVE-2019-19880 UBUNTU:CVE-2019-19923 UBUNTU:CVE-2019-19926 UBUNTU:CVE-2020-6381 UBUNTU:CVE-2020-6382 UBUNTU:CVE-2020-6385 UBUNTU:CVE-2020-6387 UBUNTU:CVE-2020-6388 UBUNTU:CVE-2020-6389 UBUNTU:CVE-2020-6390 UBUNTU:CVE-2020-6391 UBUNTU:CVE-2020-6392 UBUNTU:CVE-2020-6393 UBUNTU:CVE-2020-6394 UBUNTU:CVE-2020-6395 UBUNTU:CVE-2020-6396 UBUNTU:CVE-2020-6397 UBUNTU:CVE-2020-6398 UBUNTU:CVE-2020-6399 UBUNTU:CVE-2020-6400 UBUNTU:CVE-2020-6401 UBUNTU:CVE-2020-6402 UBUNTU:CVE-2020-6403 UBUNTU:CVE-2020-6404 UBUNTU:CVE-2020-6405 UBUNTU:CVE-2020-6406 UBUNTU:CVE-2020-6408 UBUNTU:CVE-2020-6409 UBUNTU:CVE-2020-6410 UBUNTU:CVE-2020-6411 UBUNTU:CVE-2020-6412 UBUNTU:CVE-2020-6413 UBUNTU:CVE-2020-6414 UBUNTU:CVE-2020-6415 UBUNTU:CVE-2020-6416 UBUNTU:CVE-2020-6417 USN-4298-1 USN-4298-2 bnc#1162833 rh#1770768 rh#1787032 rh#1788846 rh#1789364 rh#1801160 rh#1801161 rh#1801162 rh#1801163 rh#1801164 rh#1801165 rh#1801166 rh#1801167 rh#1801168 rh#1801169 rh#1801170 rh#1801171 rh#1801172 rh#1801173 rh#1801174 rh#1801175 rh#1801176 rh#1801177 rh#1801178 rh#1801179 rh#1801180 rh#1801181 rh#1801182 rh#1801184 rh#1801185 rh#1801186 rh#1801187 rh#1801188 rh#1801189 rh#1801190 rh#1801191 rh#1801192 rh#1801193 |
CVE-2020-6382 | sqlite3:Released | important | () | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2019-19880 CONFIRM:security.netapp.com:CVE-2019-19923 CVE-2019-19880 CVE-2019-19923 CVE-2019-19926 CVE-2020-6381 CVE-2020-6382 CVE-2020-6385 CVE-2020-6387 CVE-2020-6388 CVE-2020-6389 CVE-2020-6390 CVE-2020-6391 CVE-2020-6392 CVE-2020-6393 CVE-2020-6394 CVE-2020-6395 CVE-2020-6396 CVE-2020-6397 CVE-2020-6398 CVE-2020-6399 CVE-2020-6400 CVE-2020-6401 CVE-2020-6402 CVE-2020-6403 CVE-2020-6404 CVE-2020-6405 CVE-2020-6406 CVE-2020-6408 CVE-2020-6409 CVE-2020-6410 CVE-2020-6411 CVE-2020-6412 CVE-2020-6413 CVE-2020-6414 CVE-2020-6415 CVE-2020-6416 CVE-2020-6417 D:CVE-2020-6391 DSA-4638 FEDORA:FEDORA-2020-39e0b8bd14 FEDORA:FEDORA-2020-f6271d7afa GLSA-202003-08 MISC:chromereleases.googleblog.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6382 MISC:crbug.com:CVE-2020-6385 MISC:crbug.com:CVE-2020-6387 MISC:crbug.com:CVE-2020-6388 MISC:crbug.com:CVE-2020-6389 MISC:crbug.com:CVE-2020-6390 MISC:crbug.com:CVE-2020-6391 MISC:crbug.com:CVE-2020-6392 MISC:crbug.com:CVE-2020-6393 MISC:crbug.com:CVE-2020-6394 MISC:crbug.com:CVE-2020-6395 MISC:crbug.com:CVE-2020-6396 MISC:crbug.com:CVE-2020-6397 MISC:crbug.com:CVE-2020-6398 MISC:crbug.com:CVE-2020-6399 MISC:crbug.com:CVE-2020-6400 MISC:crbug.com:CVE-2020-6401 MISC:crbug.com:CVE-2020-6402 MISC:crbug.com:CVE-2020-6403 MISC:crbug.com:CVE-2020-6404 MISC:crbug.com:CVE-2020-6405 MISC:crbug.com:CVE-2020-6406 MISC:crbug.com:CVE-2020-6408 MISC:crbug.com:CVE-2020-6409 MISC:crbug.com:CVE-2020-6410 MISC:crbug.com:CVE-2020-6411 MISC:crbug.com:CVE-2020-6412 MISC:crbug.com:CVE-2020-6413 MISC:crbug.com:CVE-2020-6414 MISC:crbug.com:CVE-2020-6415 MISC:crbug.com:CVE-2020-6416 MISC:crbug.com:CVE-2020-6417 MISC:github.com:CVE-2019-19880 MISC:github.com:CVE-2019-19923 MISC:github.com:CVE-2019-19926 MISC:packetstormsecurity.com:CVE-2020-6388 MISC:packetstormsecurity.com:CVE-2020-6390 MISC:www.oracle.com:CVE-2019-2880 Oracle:CVE-2019-18197 RH:CVE-2019-19880 RH:CVE-2019-19923 RH:CVE-2019-19926 RH:CVE-2020-6381 RH:CVE-2020-6382 RH:CVE-2020-6385 RH:CVE-2020-6387 RH:CVE-2020-6388 RH:CVE-2020-6389 RH:CVE-2020-6390 RH:CVE-2020-6391 RH:CVE-2020-6392 RH:CVE-2020-6393 RH:CVE-2020-6394 RH:CVE-2020-6395 RH:CVE-2020-6396 RH:CVE-2020-6397 RH:CVE-2020-6398 RH:CVE-2020-6399 RH:CVE-2020-6400 RH:CVE-2020-6401 RH:CVE-2020-6402 RH:CVE-2020-6403 RH:CVE-2020-6404 RH:CVE-2020-6405 RH:CVE-2020-6406 RH:CVE-2020-6408 RH:CVE-2020-6409 RH:CVE-2020-6410 RH:CVE-2020-6411 RH:CVE-2020-6412 RH:CVE-2020-6413 RH:CVE-2020-6414 RH:CVE-2020-6415 RH:CVE-2020-6416 RH:CVE-2020-6417 RHSA-2020:0514 RHSA-2020:1810 RHSA-2020:4442 SMASH Issue 252466 SUSE:openSUSE-SU-2020:0189 SUSE:openSUSE-SU-2020:0210 SUSE:openSUSE-SU-2020:0233 UBUNTU:CVE-2019-19880 UBUNTU:CVE-2019-19923 UBUNTU:CVE-2019-19926 UBUNTU:CVE-2020-6381 UBUNTU:CVE-2020-6382 UBUNTU:CVE-2020-6385 UBUNTU:CVE-2020-6387 UBUNTU:CVE-2020-6388 UBUNTU:CVE-2020-6389 UBUNTU:CVE-2020-6390 UBUNTU:CVE-2020-6391 UBUNTU:CVE-2020-6392 UBUNTU:CVE-2020-6393 UBUNTU:CVE-2020-6394 UBUNTU:CVE-2020-6395 UBUNTU:CVE-2020-6396 UBUNTU:CVE-2020-6397 UBUNTU:CVE-2020-6398 UBUNTU:CVE-2020-6399 UBUNTU:CVE-2020-6400 UBUNTU:CVE-2020-6401 UBUNTU:CVE-2020-6402 UBUNTU:CVE-2020-6403 UBUNTU:CVE-2020-6404 UBUNTU:CVE-2020-6405 UBUNTU:CVE-2020-6406 UBUNTU:CVE-2020-6408 UBUNTU:CVE-2020-6409 UBUNTU:CVE-2020-6410 UBUNTU:CVE-2020-6411 UBUNTU:CVE-2020-6412 UBUNTU:CVE-2020-6413 UBUNTU:CVE-2020-6414 UBUNTU:CVE-2020-6415 UBUNTU:CVE-2020-6416 UBUNTU:CVE-2020-6417 USN-4298-1 USN-4298-2 bnc#1162833 rh#1770768 rh#1787032 rh#1788846 rh#1789364 rh#1801160 rh#1801161 rh#1801162 rh#1801163 rh#1801164 rh#1801165 rh#1801166 rh#1801167 rh#1801168 rh#1801169 rh#1801170 rh#1801171 rh#1801172 rh#1801173 rh#1801174 rh#1801175 rh#1801176 rh#1801177 rh#1801178 rh#1801179 rh#1801180 rh#1801181 rh#1801182 rh#1801184 rh#1801185 rh#1801186 rh#1801187 rh#1801188 rh#1801189 rh#1801190 rh#1801191 rh#1801192 rh#1801193 |
CVE-2020-6385 | sqlite3:Released | important | () | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2019-19880 CONFIRM:security.netapp.com:CVE-2019-19923 CVE-2019-19880 CVE-2019-19923 CVE-2019-19926 CVE-2020-6381 CVE-2020-6382 CVE-2020-6385 CVE-2020-6387 CVE-2020-6388 CVE-2020-6389 CVE-2020-6390 CVE-2020-6391 CVE-2020-6392 CVE-2020-6393 CVE-2020-6394 CVE-2020-6395 CVE-2020-6396 CVE-2020-6397 CVE-2020-6398 CVE-2020-6399 CVE-2020-6400 CVE-2020-6401 CVE-2020-6402 CVE-2020-6403 CVE-2020-6404 CVE-2020-6405 CVE-2020-6406 CVE-2020-6408 CVE-2020-6409 CVE-2020-6410 CVE-2020-6411 CVE-2020-6412 CVE-2020-6413 CVE-2020-6414 CVE-2020-6415 CVE-2020-6416 CVE-2020-6417 D:CVE-2020-6391 DSA-4638 FEDORA:FEDORA-2020-39e0b8bd14 FEDORA:FEDORA-2020-f6271d7afa GLSA-202003-08 MISC:chromereleases.googleblog.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6382 MISC:crbug.com:CVE-2020-6385 MISC:crbug.com:CVE-2020-6387 MISC:crbug.com:CVE-2020-6388 MISC:crbug.com:CVE-2020-6389 MISC:crbug.com:CVE-2020-6390 MISC:crbug.com:CVE-2020-6391 MISC:crbug.com:CVE-2020-6392 MISC:crbug.com:CVE-2020-6393 MISC:crbug.com:CVE-2020-6394 MISC:crbug.com:CVE-2020-6395 MISC:crbug.com:CVE-2020-6396 MISC:crbug.com:CVE-2020-6397 MISC:crbug.com:CVE-2020-6398 MISC:crbug.com:CVE-2020-6399 MISC:crbug.com:CVE-2020-6400 MISC:crbug.com:CVE-2020-6401 MISC:crbug.com:CVE-2020-6402 MISC:crbug.com:CVE-2020-6403 MISC:crbug.com:CVE-2020-6404 MISC:crbug.com:CVE-2020-6405 MISC:crbug.com:CVE-2020-6406 MISC:crbug.com:CVE-2020-6408 MISC:crbug.com:CVE-2020-6409 MISC:crbug.com:CVE-2020-6410 MISC:crbug.com:CVE-2020-6411 MISC:crbug.com:CVE-2020-6412 MISC:crbug.com:CVE-2020-6413 MISC:crbug.com:CVE-2020-6414 MISC:crbug.com:CVE-2020-6415 MISC:crbug.com:CVE-2020-6416 MISC:crbug.com:CVE-2020-6417 MISC:github.com:CVE-2019-19880 MISC:github.com:CVE-2019-19923 MISC:github.com:CVE-2019-19926 MISC:packetstormsecurity.com:CVE-2020-6388 MISC:packetstormsecurity.com:CVE-2020-6390 MISC:www.oracle.com:CVE-2019-2880 Oracle:CVE-2019-18197 RH:CVE-2019-19880 RH:CVE-2019-19923 RH:CVE-2019-19926 RH:CVE-2020-6381 RH:CVE-2020-6382 RH:CVE-2020-6385 RH:CVE-2020-6387 RH:CVE-2020-6388 RH:CVE-2020-6389 RH:CVE-2020-6390 RH:CVE-2020-6391 RH:CVE-2020-6392 RH:CVE-2020-6393 RH:CVE-2020-6394 RH:CVE-2020-6395 RH:CVE-2020-6396 RH:CVE-2020-6397 RH:CVE-2020-6398 RH:CVE-2020-6399 RH:CVE-2020-6400 RH:CVE-2020-6401 RH:CVE-2020-6402 RH:CVE-2020-6403 RH:CVE-2020-6404 RH:CVE-2020-6405 RH:CVE-2020-6406 RH:CVE-2020-6408 RH:CVE-2020-6409 RH:CVE-2020-6410 RH:CVE-2020-6411 RH:CVE-2020-6412 RH:CVE-2020-6413 RH:CVE-2020-6414 RH:CVE-2020-6415 RH:CVE-2020-6416 RH:CVE-2020-6417 RHSA-2020:0514 RHSA-2020:1810 RHSA-2020:4442 SMASH Issue 252466 SUSE:openSUSE-SU-2020:0189 SUSE:openSUSE-SU-2020:0210 SUSE:openSUSE-SU-2020:0233 UBUNTU:CVE-2019-19880 UBUNTU:CVE-2019-19923 UBUNTU:CVE-2019-19926 UBUNTU:CVE-2020-6381 UBUNTU:CVE-2020-6382 UBUNTU:CVE-2020-6385 UBUNTU:CVE-2020-6387 UBUNTU:CVE-2020-6388 UBUNTU:CVE-2020-6389 UBUNTU:CVE-2020-6390 UBUNTU:CVE-2020-6391 UBUNTU:CVE-2020-6392 UBUNTU:CVE-2020-6393 UBUNTU:CVE-2020-6394 UBUNTU:CVE-2020-6395 UBUNTU:CVE-2020-6396 UBUNTU:CVE-2020-6397 UBUNTU:CVE-2020-6398 UBUNTU:CVE-2020-6399 UBUNTU:CVE-2020-6400 UBUNTU:CVE-2020-6401 UBUNTU:CVE-2020-6402 UBUNTU:CVE-2020-6403 UBUNTU:CVE-2020-6404 UBUNTU:CVE-2020-6405 UBUNTU:CVE-2020-6406 UBUNTU:CVE-2020-6408 UBUNTU:CVE-2020-6409 UBUNTU:CVE-2020-6410 UBUNTU:CVE-2020-6411 UBUNTU:CVE-2020-6412 UBUNTU:CVE-2020-6413 UBUNTU:CVE-2020-6414 UBUNTU:CVE-2020-6415 UBUNTU:CVE-2020-6416 UBUNTU:CVE-2020-6417 USN-4298-1 USN-4298-2 bnc#1162833 rh#1770768 rh#1787032 rh#1788846 rh#1789364 rh#1801160 rh#1801161 rh#1801162 rh#1801163 rh#1801164 rh#1801165 rh#1801166 rh#1801167 rh#1801168 rh#1801169 rh#1801170 rh#1801171 rh#1801172 rh#1801173 rh#1801174 rh#1801175 rh#1801176 rh#1801177 rh#1801178 rh#1801179 rh#1801180 rh#1801181 rh#1801182 rh#1801184 rh#1801185 rh#1801186 rh#1801187 rh#1801188 rh#1801189 rh#1801190 rh#1801191 rh#1801192 rh#1801193 |
CVE-2020-6387 | sqlite3:Released | important | () | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2019-19880 CONFIRM:security.netapp.com:CVE-2019-19923 CVE-2019-19880 CVE-2019-19923 CVE-2019-19926 CVE-2020-6381 CVE-2020-6382 CVE-2020-6385 CVE-2020-6387 CVE-2020-6388 CVE-2020-6389 CVE-2020-6390 CVE-2020-6391 CVE-2020-6392 CVE-2020-6393 CVE-2020-6394 CVE-2020-6395 CVE-2020-6396 CVE-2020-6397 CVE-2020-6398 CVE-2020-6399 CVE-2020-6400 CVE-2020-6401 CVE-2020-6402 CVE-2020-6403 CVE-2020-6404 CVE-2020-6405 CVE-2020-6406 CVE-2020-6408 CVE-2020-6409 CVE-2020-6410 CVE-2020-6411 CVE-2020-6412 CVE-2020-6413 CVE-2020-6414 CVE-2020-6415 CVE-2020-6416 CVE-2020-6417 D:CVE-2020-6391 DSA-4638 FEDORA:FEDORA-2020-39e0b8bd14 FEDORA:FEDORA-2020-f6271d7afa GLSA-202003-08 MISC:chromereleases.googleblog.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6382 MISC:crbug.com:CVE-2020-6385 MISC:crbug.com:CVE-2020-6387 MISC:crbug.com:CVE-2020-6388 MISC:crbug.com:CVE-2020-6389 MISC:crbug.com:CVE-2020-6390 MISC:crbug.com:CVE-2020-6391 MISC:crbug.com:CVE-2020-6392 MISC:crbug.com:CVE-2020-6393 MISC:crbug.com:CVE-2020-6394 MISC:crbug.com:CVE-2020-6395 MISC:crbug.com:CVE-2020-6396 MISC:crbug.com:CVE-2020-6397 MISC:crbug.com:CVE-2020-6398 MISC:crbug.com:CVE-2020-6399 MISC:crbug.com:CVE-2020-6400 MISC:crbug.com:CVE-2020-6401 MISC:crbug.com:CVE-2020-6402 MISC:crbug.com:CVE-2020-6403 MISC:crbug.com:CVE-2020-6404 MISC:crbug.com:CVE-2020-6405 MISC:crbug.com:CVE-2020-6406 MISC:crbug.com:CVE-2020-6408 MISC:crbug.com:CVE-2020-6409 MISC:crbug.com:CVE-2020-6410 MISC:crbug.com:CVE-2020-6411 MISC:crbug.com:CVE-2020-6412 MISC:crbug.com:CVE-2020-6413 MISC:crbug.com:CVE-2020-6414 MISC:crbug.com:CVE-2020-6415 MISC:crbug.com:CVE-2020-6416 MISC:crbug.com:CVE-2020-6417 MISC:github.com:CVE-2019-19880 MISC:github.com:CVE-2019-19923 MISC:github.com:CVE-2019-19926 MISC:packetstormsecurity.com:CVE-2020-6388 MISC:packetstormsecurity.com:CVE-2020-6390 MISC:www.oracle.com:CVE-2019-2880 Oracle:CVE-2019-18197 RH:CVE-2019-19880 RH:CVE-2019-19923 RH:CVE-2019-19926 RH:CVE-2020-6381 RH:CVE-2020-6382 RH:CVE-2020-6385 RH:CVE-2020-6387 RH:CVE-2020-6388 RH:CVE-2020-6389 RH:CVE-2020-6390 RH:CVE-2020-6391 RH:CVE-2020-6392 RH:CVE-2020-6393 RH:CVE-2020-6394 RH:CVE-2020-6395 RH:CVE-2020-6396 RH:CVE-2020-6397 RH:CVE-2020-6398 RH:CVE-2020-6399 RH:CVE-2020-6400 RH:CVE-2020-6401 RH:CVE-2020-6402 RH:CVE-2020-6403 RH:CVE-2020-6404 RH:CVE-2020-6405 RH:CVE-2020-6406 RH:CVE-2020-6408 RH:CVE-2020-6409 RH:CVE-2020-6410 RH:CVE-2020-6411 RH:CVE-2020-6412 RH:CVE-2020-6413 RH:CVE-2020-6414 RH:CVE-2020-6415 RH:CVE-2020-6416 RH:CVE-2020-6417 RHSA-2020:0514 RHSA-2020:1810 RHSA-2020:4442 SMASH Issue 252466 SUSE:openSUSE-SU-2020:0189 SUSE:openSUSE-SU-2020:0210 SUSE:openSUSE-SU-2020:0233 UBUNTU:CVE-2019-19880 UBUNTU:CVE-2019-19923 UBUNTU:CVE-2019-19926 UBUNTU:CVE-2020-6381 UBUNTU:CVE-2020-6382 UBUNTU:CVE-2020-6385 UBUNTU:CVE-2020-6387 UBUNTU:CVE-2020-6388 UBUNTU:CVE-2020-6389 UBUNTU:CVE-2020-6390 UBUNTU:CVE-2020-6391 UBUNTU:CVE-2020-6392 UBUNTU:CVE-2020-6393 UBUNTU:CVE-2020-6394 UBUNTU:CVE-2020-6395 UBUNTU:CVE-2020-6396 UBUNTU:CVE-2020-6397 UBUNTU:CVE-2020-6398 UBUNTU:CVE-2020-6399 UBUNTU:CVE-2020-6400 UBUNTU:CVE-2020-6401 UBUNTU:CVE-2020-6402 UBUNTU:CVE-2020-6403 UBUNTU:CVE-2020-6404 UBUNTU:CVE-2020-6405 UBUNTU:CVE-2020-6406 UBUNTU:CVE-2020-6408 UBUNTU:CVE-2020-6409 UBUNTU:CVE-2020-6410 UBUNTU:CVE-2020-6411 UBUNTU:CVE-2020-6412 UBUNTU:CVE-2020-6413 UBUNTU:CVE-2020-6414 UBUNTU:CVE-2020-6415 UBUNTU:CVE-2020-6416 UBUNTU:CVE-2020-6417 USN-4298-1 USN-4298-2 bnc#1162833 rh#1770768 rh#1787032 rh#1788846 rh#1789364 rh#1801160 rh#1801161 rh#1801162 rh#1801163 rh#1801164 rh#1801165 rh#1801166 rh#1801167 rh#1801168 rh#1801169 rh#1801170 rh#1801171 rh#1801172 rh#1801173 rh#1801174 rh#1801175 rh#1801176 rh#1801177 rh#1801178 rh#1801179 rh#1801180 rh#1801181 rh#1801182 rh#1801184 rh#1801185 rh#1801186 rh#1801187 rh#1801188 rh#1801189 rh#1801190 rh#1801191 rh#1801192 rh#1801193 |
CVE-2020-6388 | sqlite3:Released | important | () | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2019-19880 CONFIRM:security.netapp.com:CVE-2019-19923 CVE-2019-19880 CVE-2019-19923 CVE-2019-19926 CVE-2020-6381 CVE-2020-6382 CVE-2020-6385 CVE-2020-6387 CVE-2020-6388 CVE-2020-6389 CVE-2020-6390 CVE-2020-6391 CVE-2020-6392 CVE-2020-6393 CVE-2020-6394 CVE-2020-6395 CVE-2020-6396 CVE-2020-6397 CVE-2020-6398 CVE-2020-6399 CVE-2020-6400 CVE-2020-6401 CVE-2020-6402 CVE-2020-6403 CVE-2020-6404 CVE-2020-6405 CVE-2020-6406 CVE-2020-6408 CVE-2020-6409 CVE-2020-6410 CVE-2020-6411 CVE-2020-6412 CVE-2020-6413 CVE-2020-6414 CVE-2020-6415 CVE-2020-6416 CVE-2020-6417 D:CVE-2020-6391 DSA-4638 FEDORA:FEDORA-2020-39e0b8bd14 FEDORA:FEDORA-2020-f6271d7afa GLSA-202003-08 MISC:chromereleases.googleblog.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6382 MISC:crbug.com:CVE-2020-6385 MISC:crbug.com:CVE-2020-6387 MISC:crbug.com:CVE-2020-6388 MISC:crbug.com:CVE-2020-6389 MISC:crbug.com:CVE-2020-6390 MISC:crbug.com:CVE-2020-6391 MISC:crbug.com:CVE-2020-6392 MISC:crbug.com:CVE-2020-6393 MISC:crbug.com:CVE-2020-6394 MISC:crbug.com:CVE-2020-6395 MISC:crbug.com:CVE-2020-6396 MISC:crbug.com:CVE-2020-6397 MISC:crbug.com:CVE-2020-6398 MISC:crbug.com:CVE-2020-6399 MISC:crbug.com:CVE-2020-6400 MISC:crbug.com:CVE-2020-6401 MISC:crbug.com:CVE-2020-6402 MISC:crbug.com:CVE-2020-6403 MISC:crbug.com:CVE-2020-6404 MISC:crbug.com:CVE-2020-6405 MISC:crbug.com:CVE-2020-6406 MISC:crbug.com:CVE-2020-6408 MISC:crbug.com:CVE-2020-6409 MISC:crbug.com:CVE-2020-6410 MISC:crbug.com:CVE-2020-6411 MISC:crbug.com:CVE-2020-6412 MISC:crbug.com:CVE-2020-6413 MISC:crbug.com:CVE-2020-6414 MISC:crbug.com:CVE-2020-6415 MISC:crbug.com:CVE-2020-6416 MISC:crbug.com:CVE-2020-6417 MISC:github.com:CVE-2019-19880 MISC:github.com:CVE-2019-19923 MISC:github.com:CVE-2019-19926 MISC:packetstormsecurity.com:CVE-2020-6388 MISC:packetstormsecurity.com:CVE-2020-6390 MISC:www.oracle.com:CVE-2019-2880 Oracle:CVE-2019-18197 RH:CVE-2019-19880 RH:CVE-2019-19923 RH:CVE-2019-19926 RH:CVE-2020-6381 RH:CVE-2020-6382 RH:CVE-2020-6385 RH:CVE-2020-6387 RH:CVE-2020-6388 RH:CVE-2020-6389 RH:CVE-2020-6390 RH:CVE-2020-6391 RH:CVE-2020-6392 RH:CVE-2020-6393 RH:CVE-2020-6394 RH:CVE-2020-6395 RH:CVE-2020-6396 RH:CVE-2020-6397 RH:CVE-2020-6398 RH:CVE-2020-6399 RH:CVE-2020-6400 RH:CVE-2020-6401 RH:CVE-2020-6402 RH:CVE-2020-6403 RH:CVE-2020-6404 RH:CVE-2020-6405 RH:CVE-2020-6406 RH:CVE-2020-6408 RH:CVE-2020-6409 RH:CVE-2020-6410 RH:CVE-2020-6411 RH:CVE-2020-6412 RH:CVE-2020-6413 RH:CVE-2020-6414 RH:CVE-2020-6415 RH:CVE-2020-6416 RH:CVE-2020-6417 RHSA-2020:0514 RHSA-2020:1810 RHSA-2020:4442 SMASH Issue 252466 SUSE:openSUSE-SU-2020:0189 SUSE:openSUSE-SU-2020:0210 SUSE:openSUSE-SU-2020:0233 UBUNTU:CVE-2019-19880 UBUNTU:CVE-2019-19923 UBUNTU:CVE-2019-19926 UBUNTU:CVE-2020-6381 UBUNTU:CVE-2020-6382 UBUNTU:CVE-2020-6385 UBUNTU:CVE-2020-6387 UBUNTU:CVE-2020-6388 UBUNTU:CVE-2020-6389 UBUNTU:CVE-2020-6390 UBUNTU:CVE-2020-6391 UBUNTU:CVE-2020-6392 UBUNTU:CVE-2020-6393 UBUNTU:CVE-2020-6394 UBUNTU:CVE-2020-6395 UBUNTU:CVE-2020-6396 UBUNTU:CVE-2020-6397 UBUNTU:CVE-2020-6398 UBUNTU:CVE-2020-6399 UBUNTU:CVE-2020-6400 UBUNTU:CVE-2020-6401 UBUNTU:CVE-2020-6402 UBUNTU:CVE-2020-6403 UBUNTU:CVE-2020-6404 UBUNTU:CVE-2020-6405 UBUNTU:CVE-2020-6406 UBUNTU:CVE-2020-6408 UBUNTU:CVE-2020-6409 UBUNTU:CVE-2020-6410 UBUNTU:CVE-2020-6411 UBUNTU:CVE-2020-6412 UBUNTU:CVE-2020-6413 UBUNTU:CVE-2020-6414 UBUNTU:CVE-2020-6415 UBUNTU:CVE-2020-6416 UBUNTU:CVE-2020-6417 USN-4298-1 USN-4298-2 bnc#1162833 rh#1770768 rh#1787032 rh#1788846 rh#1789364 rh#1801160 rh#1801161 rh#1801162 rh#1801163 rh#1801164 rh#1801165 rh#1801166 rh#1801167 rh#1801168 rh#1801169 rh#1801170 rh#1801171 rh#1801172 rh#1801173 rh#1801174 rh#1801175 rh#1801176 rh#1801177 rh#1801178 rh#1801179 rh#1801180 rh#1801181 rh#1801182 rh#1801184 rh#1801185 rh#1801186 rh#1801187 rh#1801188 rh#1801189 rh#1801190 rh#1801191 rh#1801192 rh#1801193 |
CVE-2020-6389 | sqlite3:Released | important | () | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2019-19880 CONFIRM:security.netapp.com:CVE-2019-19923 CVE-2019-19880 CVE-2019-19923 CVE-2019-19926 CVE-2020-6381 CVE-2020-6382 CVE-2020-6385 CVE-2020-6387 CVE-2020-6388 CVE-2020-6389 CVE-2020-6390 CVE-2020-6391 CVE-2020-6392 CVE-2020-6393 CVE-2020-6394 CVE-2020-6395 CVE-2020-6396 CVE-2020-6397 CVE-2020-6398 CVE-2020-6399 CVE-2020-6400 CVE-2020-6401 CVE-2020-6402 CVE-2020-6403 CVE-2020-6404 CVE-2020-6405 CVE-2020-6406 CVE-2020-6408 CVE-2020-6409 CVE-2020-6410 CVE-2020-6411 CVE-2020-6412 CVE-2020-6413 CVE-2020-6414 CVE-2020-6415 CVE-2020-6416 CVE-2020-6417 D:CVE-2020-6391 DSA-4638 FEDORA:FEDORA-2020-39e0b8bd14 FEDORA:FEDORA-2020-f6271d7afa GLSA-202003-08 MISC:chromereleases.googleblog.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6382 MISC:crbug.com:CVE-2020-6385 MISC:crbug.com:CVE-2020-6387 MISC:crbug.com:CVE-2020-6388 MISC:crbug.com:CVE-2020-6389 MISC:crbug.com:CVE-2020-6390 MISC:crbug.com:CVE-2020-6391 MISC:crbug.com:CVE-2020-6392 MISC:crbug.com:CVE-2020-6393 MISC:crbug.com:CVE-2020-6394 MISC:crbug.com:CVE-2020-6395 MISC:crbug.com:CVE-2020-6396 MISC:crbug.com:CVE-2020-6397 MISC:crbug.com:CVE-2020-6398 MISC:crbug.com:CVE-2020-6399 MISC:crbug.com:CVE-2020-6400 MISC:crbug.com:CVE-2020-6401 MISC:crbug.com:CVE-2020-6402 MISC:crbug.com:CVE-2020-6403 MISC:crbug.com:CVE-2020-6404 MISC:crbug.com:CVE-2020-6405 MISC:crbug.com:CVE-2020-6406 MISC:crbug.com:CVE-2020-6408 MISC:crbug.com:CVE-2020-6409 MISC:crbug.com:CVE-2020-6410 MISC:crbug.com:CVE-2020-6411 MISC:crbug.com:CVE-2020-6412 MISC:crbug.com:CVE-2020-6413 MISC:crbug.com:CVE-2020-6414 MISC:crbug.com:CVE-2020-6415 MISC:crbug.com:CVE-2020-6416 MISC:crbug.com:CVE-2020-6417 MISC:github.com:CVE-2019-19880 MISC:github.com:CVE-2019-19923 MISC:github.com:CVE-2019-19926 MISC:packetstormsecurity.com:CVE-2020-6388 MISC:packetstormsecurity.com:CVE-2020-6390 MISC:www.oracle.com:CVE-2019-2880 Oracle:CVE-2019-18197 RH:CVE-2019-19880 RH:CVE-2019-19923 RH:CVE-2019-19926 RH:CVE-2020-6381 RH:CVE-2020-6382 RH:CVE-2020-6385 RH:CVE-2020-6387 RH:CVE-2020-6388 RH:CVE-2020-6389 RH:CVE-2020-6390 RH:CVE-2020-6391 RH:CVE-2020-6392 RH:CVE-2020-6393 RH:CVE-2020-6394 RH:CVE-2020-6395 RH:CVE-2020-6396 RH:CVE-2020-6397 RH:CVE-2020-6398 RH:CVE-2020-6399 RH:CVE-2020-6400 RH:CVE-2020-6401 RH:CVE-2020-6402 RH:CVE-2020-6403 RH:CVE-2020-6404 RH:CVE-2020-6405 RH:CVE-2020-6406 RH:CVE-2020-6408 RH:CVE-2020-6409 RH:CVE-2020-6410 RH:CVE-2020-6411 RH:CVE-2020-6412 RH:CVE-2020-6413 RH:CVE-2020-6414 RH:CVE-2020-6415 RH:CVE-2020-6416 RH:CVE-2020-6417 RHSA-2020:0514 RHSA-2020:1810 RHSA-2020:4442 SMASH Issue 252466 SUSE:openSUSE-SU-2020:0189 SUSE:openSUSE-SU-2020:0210 SUSE:openSUSE-SU-2020:0233 UBUNTU:CVE-2019-19880 UBUNTU:CVE-2019-19923 UBUNTU:CVE-2019-19926 UBUNTU:CVE-2020-6381 UBUNTU:CVE-2020-6382 UBUNTU:CVE-2020-6385 UBUNTU:CVE-2020-6387 UBUNTU:CVE-2020-6388 UBUNTU:CVE-2020-6389 UBUNTU:CVE-2020-6390 UBUNTU:CVE-2020-6391 UBUNTU:CVE-2020-6392 UBUNTU:CVE-2020-6393 UBUNTU:CVE-2020-6394 UBUNTU:CVE-2020-6395 UBUNTU:CVE-2020-6396 UBUNTU:CVE-2020-6397 UBUNTU:CVE-2020-6398 UBUNTU:CVE-2020-6399 UBUNTU:CVE-2020-6400 UBUNTU:CVE-2020-6401 UBUNTU:CVE-2020-6402 UBUNTU:CVE-2020-6403 UBUNTU:CVE-2020-6404 UBUNTU:CVE-2020-6405 UBUNTU:CVE-2020-6406 UBUNTU:CVE-2020-6408 UBUNTU:CVE-2020-6409 UBUNTU:CVE-2020-6410 UBUNTU:CVE-2020-6411 UBUNTU:CVE-2020-6412 UBUNTU:CVE-2020-6413 UBUNTU:CVE-2020-6414 UBUNTU:CVE-2020-6415 UBUNTU:CVE-2020-6416 UBUNTU:CVE-2020-6417 USN-4298-1 USN-4298-2 bnc#1162833 rh#1770768 rh#1787032 rh#1788846 rh#1789364 rh#1801160 rh#1801161 rh#1801162 rh#1801163 rh#1801164 rh#1801165 rh#1801166 rh#1801167 rh#1801168 rh#1801169 rh#1801170 rh#1801171 rh#1801172 rh#1801173 rh#1801174 rh#1801175 rh#1801176 rh#1801177 rh#1801178 rh#1801179 rh#1801180 rh#1801181 rh#1801182 rh#1801184 rh#1801185 rh#1801186 rh#1801187 rh#1801188 rh#1801189 rh#1801190 rh#1801191 rh#1801192 rh#1801193 |
CVE-2020-6390 | sqlite3:Released | important | () | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2019-19880 CONFIRM:security.netapp.com:CVE-2019-19923 CVE-2019-19880 CVE-2019-19923 CVE-2019-19926 CVE-2020-6381 CVE-2020-6382 CVE-2020-6385 CVE-2020-6387 CVE-2020-6388 CVE-2020-6389 CVE-2020-6390 CVE-2020-6391 CVE-2020-6392 CVE-2020-6393 CVE-2020-6394 CVE-2020-6395 CVE-2020-6396 CVE-2020-6397 CVE-2020-6398 CVE-2020-6399 CVE-2020-6400 CVE-2020-6401 CVE-2020-6402 CVE-2020-6403 CVE-2020-6404 CVE-2020-6405 CVE-2020-6406 CVE-2020-6408 CVE-2020-6409 CVE-2020-6410 CVE-2020-6411 CVE-2020-6412 CVE-2020-6413 CVE-2020-6414 CVE-2020-6415 CVE-2020-6416 CVE-2020-6417 D:CVE-2020-6391 DSA-4638 FEDORA:FEDORA-2020-39e0b8bd14 FEDORA:FEDORA-2020-f6271d7afa GLSA-202003-08 MISC:chromereleases.googleblog.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6382 MISC:crbug.com:CVE-2020-6385 MISC:crbug.com:CVE-2020-6387 MISC:crbug.com:CVE-2020-6388 MISC:crbug.com:CVE-2020-6389 MISC:crbug.com:CVE-2020-6390 MISC:crbug.com:CVE-2020-6391 MISC:crbug.com:CVE-2020-6392 MISC:crbug.com:CVE-2020-6393 MISC:crbug.com:CVE-2020-6394 MISC:crbug.com:CVE-2020-6395 MISC:crbug.com:CVE-2020-6396 MISC:crbug.com:CVE-2020-6397 MISC:crbug.com:CVE-2020-6398 MISC:crbug.com:CVE-2020-6399 MISC:crbug.com:CVE-2020-6400 MISC:crbug.com:CVE-2020-6401 MISC:crbug.com:CVE-2020-6402 MISC:crbug.com:CVE-2020-6403 MISC:crbug.com:CVE-2020-6404 MISC:crbug.com:CVE-2020-6405 MISC:crbug.com:CVE-2020-6406 MISC:crbug.com:CVE-2020-6408 MISC:crbug.com:CVE-2020-6409 MISC:crbug.com:CVE-2020-6410 MISC:crbug.com:CVE-2020-6411 MISC:crbug.com:CVE-2020-6412 MISC:crbug.com:CVE-2020-6413 MISC:crbug.com:CVE-2020-6414 MISC:crbug.com:CVE-2020-6415 MISC:crbug.com:CVE-2020-6416 MISC:crbug.com:CVE-2020-6417 MISC:github.com:CVE-2019-19880 MISC:github.com:CVE-2019-19923 MISC:github.com:CVE-2019-19926 MISC:packetstormsecurity.com:CVE-2020-6388 MISC:packetstormsecurity.com:CVE-2020-6390 MISC:www.oracle.com:CVE-2019-2880 Oracle:CVE-2019-18197 RH:CVE-2019-19880 RH:CVE-2019-19923 RH:CVE-2019-19926 RH:CVE-2020-6381 RH:CVE-2020-6382 RH:CVE-2020-6385 RH:CVE-2020-6387 RH:CVE-2020-6388 RH:CVE-2020-6389 RH:CVE-2020-6390 RH:CVE-2020-6391 RH:CVE-2020-6392 RH:CVE-2020-6393 RH:CVE-2020-6394 RH:CVE-2020-6395 RH:CVE-2020-6396 RH:CVE-2020-6397 RH:CVE-2020-6398 RH:CVE-2020-6399 RH:CVE-2020-6400 RH:CVE-2020-6401 RH:CVE-2020-6402 RH:CVE-2020-6403 RH:CVE-2020-6404 RH:CVE-2020-6405 RH:CVE-2020-6406 RH:CVE-2020-6408 RH:CVE-2020-6409 RH:CVE-2020-6410 RH:CVE-2020-6411 RH:CVE-2020-6412 RH:CVE-2020-6413 RH:CVE-2020-6414 RH:CVE-2020-6415 RH:CVE-2020-6416 RH:CVE-2020-6417 RHSA-2020:0514 RHSA-2020:1810 RHSA-2020:4442 SMASH Issue 252466 SUSE:openSUSE-SU-2020:0189 SUSE:openSUSE-SU-2020:0210 SUSE:openSUSE-SU-2020:0233 UBUNTU:CVE-2019-19880 UBUNTU:CVE-2019-19923 UBUNTU:CVE-2019-19926 UBUNTU:CVE-2020-6381 UBUNTU:CVE-2020-6382 UBUNTU:CVE-2020-6385 UBUNTU:CVE-2020-6387 UBUNTU:CVE-2020-6388 UBUNTU:CVE-2020-6389 UBUNTU:CVE-2020-6390 UBUNTU:CVE-2020-6391 UBUNTU:CVE-2020-6392 UBUNTU:CVE-2020-6393 UBUNTU:CVE-2020-6394 UBUNTU:CVE-2020-6395 UBUNTU:CVE-2020-6396 UBUNTU:CVE-2020-6397 UBUNTU:CVE-2020-6398 UBUNTU:CVE-2020-6399 UBUNTU:CVE-2020-6400 UBUNTU:CVE-2020-6401 UBUNTU:CVE-2020-6402 UBUNTU:CVE-2020-6403 UBUNTU:CVE-2020-6404 UBUNTU:CVE-2020-6405 UBUNTU:CVE-2020-6406 UBUNTU:CVE-2020-6408 UBUNTU:CVE-2020-6409 UBUNTU:CVE-2020-6410 UBUNTU:CVE-2020-6411 UBUNTU:CVE-2020-6412 UBUNTU:CVE-2020-6413 UBUNTU:CVE-2020-6414 UBUNTU:CVE-2020-6415 UBUNTU:CVE-2020-6416 UBUNTU:CVE-2020-6417 USN-4298-1 USN-4298-2 bnc#1162833 rh#1770768 rh#1787032 rh#1788846 rh#1789364 rh#1801160 rh#1801161 rh#1801162 rh#1801163 rh#1801164 rh#1801165 rh#1801166 rh#1801167 rh#1801168 rh#1801169 rh#1801170 rh#1801171 rh#1801172 rh#1801173 rh#1801174 rh#1801175 rh#1801176 rh#1801177 rh#1801178 rh#1801179 rh#1801180 rh#1801181 rh#1801182 rh#1801184 rh#1801185 rh#1801186 rh#1801187 rh#1801188 rh#1801189 rh#1801190 rh#1801191 rh#1801192 rh#1801193 |
CVE-2020-6391 | sqlite3:Released | important | () | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2019-19880 CONFIRM:security.netapp.com:CVE-2019-19923 CVE-2019-19880 CVE-2019-19923 CVE-2019-19926 CVE-2020-6381 CVE-2020-6382 CVE-2020-6385 CVE-2020-6387 CVE-2020-6388 CVE-2020-6389 CVE-2020-6390 CVE-2020-6391 CVE-2020-6392 CVE-2020-6393 CVE-2020-6394 CVE-2020-6395 CVE-2020-6396 CVE-2020-6397 CVE-2020-6398 CVE-2020-6399 CVE-2020-6400 CVE-2020-6401 CVE-2020-6402 CVE-2020-6403 CVE-2020-6404 CVE-2020-6405 CVE-2020-6406 CVE-2020-6408 CVE-2020-6409 CVE-2020-6410 CVE-2020-6411 CVE-2020-6412 CVE-2020-6413 CVE-2020-6414 CVE-2020-6415 CVE-2020-6416 CVE-2020-6417 D:CVE-2020-6391 DSA-4638 FEDORA:FEDORA-2020-39e0b8bd14 FEDORA:FEDORA-2020-f6271d7afa GLSA-202003-08 MISC:chromereleases.googleblog.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6382 MISC:crbug.com:CVE-2020-6385 MISC:crbug.com:CVE-2020-6387 MISC:crbug.com:CVE-2020-6388 MISC:crbug.com:CVE-2020-6389 MISC:crbug.com:CVE-2020-6390 MISC:crbug.com:CVE-2020-6391 MISC:crbug.com:CVE-2020-6392 MISC:crbug.com:CVE-2020-6393 MISC:crbug.com:CVE-2020-6394 MISC:crbug.com:CVE-2020-6395 MISC:crbug.com:CVE-2020-6396 MISC:crbug.com:CVE-2020-6397 MISC:crbug.com:CVE-2020-6398 MISC:crbug.com:CVE-2020-6399 MISC:crbug.com:CVE-2020-6400 MISC:crbug.com:CVE-2020-6401 MISC:crbug.com:CVE-2020-6402 MISC:crbug.com:CVE-2020-6403 MISC:crbug.com:CVE-2020-6404 MISC:crbug.com:CVE-2020-6405 MISC:crbug.com:CVE-2020-6406 MISC:crbug.com:CVE-2020-6408 MISC:crbug.com:CVE-2020-6409 MISC:crbug.com:CVE-2020-6410 MISC:crbug.com:CVE-2020-6411 MISC:crbug.com:CVE-2020-6412 MISC:crbug.com:CVE-2020-6413 MISC:crbug.com:CVE-2020-6414 MISC:crbug.com:CVE-2020-6415 MISC:crbug.com:CVE-2020-6416 MISC:crbug.com:CVE-2020-6417 MISC:github.com:CVE-2019-19880 MISC:github.com:CVE-2019-19923 MISC:github.com:CVE-2019-19926 MISC:packetstormsecurity.com:CVE-2020-6388 MISC:packetstormsecurity.com:CVE-2020-6390 MISC:www.oracle.com:CVE-2019-2880 Oracle:CVE-2019-18197 RH:CVE-2019-19880 RH:CVE-2019-19923 RH:CVE-2019-19926 RH:CVE-2020-6381 RH:CVE-2020-6382 RH:CVE-2020-6385 RH:CVE-2020-6387 RH:CVE-2020-6388 RH:CVE-2020-6389 RH:CVE-2020-6390 RH:CVE-2020-6391 RH:CVE-2020-6392 RH:CVE-2020-6393 RH:CVE-2020-6394 RH:CVE-2020-6395 RH:CVE-2020-6396 RH:CVE-2020-6397 RH:CVE-2020-6398 RH:CVE-2020-6399 RH:CVE-2020-6400 RH:CVE-2020-6401 RH:CVE-2020-6402 RH:CVE-2020-6403 RH:CVE-2020-6404 RH:CVE-2020-6405 RH:CVE-2020-6406 RH:CVE-2020-6408 RH:CVE-2020-6409 RH:CVE-2020-6410 RH:CVE-2020-6411 RH:CVE-2020-6412 RH:CVE-2020-6413 RH:CVE-2020-6414 RH:CVE-2020-6415 RH:CVE-2020-6416 RH:CVE-2020-6417 RHSA-2020:0514 RHSA-2020:1810 RHSA-2020:4442 SMASH Issue 252466 SUSE:openSUSE-SU-2020:0189 SUSE:openSUSE-SU-2020:0210 SUSE:openSUSE-SU-2020:0233 UBUNTU:CVE-2019-19880 UBUNTU:CVE-2019-19923 UBUNTU:CVE-2019-19926 UBUNTU:CVE-2020-6381 UBUNTU:CVE-2020-6382 UBUNTU:CVE-2020-6385 UBUNTU:CVE-2020-6387 UBUNTU:CVE-2020-6388 UBUNTU:CVE-2020-6389 UBUNTU:CVE-2020-6390 UBUNTU:CVE-2020-6391 UBUNTU:CVE-2020-6392 UBUNTU:CVE-2020-6393 UBUNTU:CVE-2020-6394 UBUNTU:CVE-2020-6395 UBUNTU:CVE-2020-6396 UBUNTU:CVE-2020-6397 UBUNTU:CVE-2020-6398 UBUNTU:CVE-2020-6399 UBUNTU:CVE-2020-6400 UBUNTU:CVE-2020-6401 UBUNTU:CVE-2020-6402 UBUNTU:CVE-2020-6403 UBUNTU:CVE-2020-6404 UBUNTU:CVE-2020-6405 UBUNTU:CVE-2020-6406 UBUNTU:CVE-2020-6408 UBUNTU:CVE-2020-6409 UBUNTU:CVE-2020-6410 UBUNTU:CVE-2020-6411 UBUNTU:CVE-2020-6412 UBUNTU:CVE-2020-6413 UBUNTU:CVE-2020-6414 UBUNTU:CVE-2020-6415 UBUNTU:CVE-2020-6416 UBUNTU:CVE-2020-6417 USN-4298-1 USN-4298-2 bnc#1162833 rh#1770768 rh#1787032 rh#1788846 rh#1789364 rh#1801160 rh#1801161 rh#1801162 rh#1801163 rh#1801164 rh#1801165 rh#1801166 rh#1801167 rh#1801168 rh#1801169 rh#1801170 rh#1801171 rh#1801172 rh#1801173 rh#1801174 rh#1801175 rh#1801176 rh#1801177 rh#1801178 rh#1801179 rh#1801180 rh#1801181 rh#1801182 rh#1801184 rh#1801185 rh#1801186 rh#1801187 rh#1801188 rh#1801189 rh#1801190 rh#1801191 rh#1801192 rh#1801193 |
CVE-2020-6392 | sqlite3:Released | important | () | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2019-19880 CONFIRM:security.netapp.com:CVE-2019-19923 CVE-2019-19880 CVE-2019-19923 CVE-2019-19926 CVE-2020-6381 CVE-2020-6382 CVE-2020-6385 CVE-2020-6387 CVE-2020-6388 CVE-2020-6389 CVE-2020-6390 CVE-2020-6391 CVE-2020-6392 CVE-2020-6393 CVE-2020-6394 CVE-2020-6395 CVE-2020-6396 CVE-2020-6397 CVE-2020-6398 CVE-2020-6399 CVE-2020-6400 CVE-2020-6401 CVE-2020-6402 CVE-2020-6403 CVE-2020-6404 CVE-2020-6405 CVE-2020-6406 CVE-2020-6408 CVE-2020-6409 CVE-2020-6410 CVE-2020-6411 CVE-2020-6412 CVE-2020-6413 CVE-2020-6414 CVE-2020-6415 CVE-2020-6416 CVE-2020-6417 D:CVE-2020-6391 DSA-4638 FEDORA:FEDORA-2020-39e0b8bd14 FEDORA:FEDORA-2020-f6271d7afa GLSA-202003-08 MISC:chromereleases.googleblog.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6382 MISC:crbug.com:CVE-2020-6385 MISC:crbug.com:CVE-2020-6387 MISC:crbug.com:CVE-2020-6388 MISC:crbug.com:CVE-2020-6389 MISC:crbug.com:CVE-2020-6390 MISC:crbug.com:CVE-2020-6391 MISC:crbug.com:CVE-2020-6392 MISC:crbug.com:CVE-2020-6393 MISC:crbug.com:CVE-2020-6394 MISC:crbug.com:CVE-2020-6395 MISC:crbug.com:CVE-2020-6396 MISC:crbug.com:CVE-2020-6397 MISC:crbug.com:CVE-2020-6398 MISC:crbug.com:CVE-2020-6399 MISC:crbug.com:CVE-2020-6400 MISC:crbug.com:CVE-2020-6401 MISC:crbug.com:CVE-2020-6402 MISC:crbug.com:CVE-2020-6403 MISC:crbug.com:CVE-2020-6404 MISC:crbug.com:CVE-2020-6405 MISC:crbug.com:CVE-2020-6406 MISC:crbug.com:CVE-2020-6408 MISC:crbug.com:CVE-2020-6409 MISC:crbug.com:CVE-2020-6410 MISC:crbug.com:CVE-2020-6411 MISC:crbug.com:CVE-2020-6412 MISC:crbug.com:CVE-2020-6413 MISC:crbug.com:CVE-2020-6414 MISC:crbug.com:CVE-2020-6415 MISC:crbug.com:CVE-2020-6416 MISC:crbug.com:CVE-2020-6417 MISC:github.com:CVE-2019-19880 MISC:github.com:CVE-2019-19923 MISC:github.com:CVE-2019-19926 MISC:packetstormsecurity.com:CVE-2020-6388 MISC:packetstormsecurity.com:CVE-2020-6390 MISC:www.oracle.com:CVE-2019-2880 Oracle:CVE-2019-18197 RH:CVE-2019-19880 RH:CVE-2019-19923 RH:CVE-2019-19926 RH:CVE-2020-6381 RH:CVE-2020-6382 RH:CVE-2020-6385 RH:CVE-2020-6387 RH:CVE-2020-6388 RH:CVE-2020-6389 RH:CVE-2020-6390 RH:CVE-2020-6391 RH:CVE-2020-6392 RH:CVE-2020-6393 RH:CVE-2020-6394 RH:CVE-2020-6395 RH:CVE-2020-6396 RH:CVE-2020-6397 RH:CVE-2020-6398 RH:CVE-2020-6399 RH:CVE-2020-6400 RH:CVE-2020-6401 RH:CVE-2020-6402 RH:CVE-2020-6403 RH:CVE-2020-6404 RH:CVE-2020-6405 RH:CVE-2020-6406 RH:CVE-2020-6408 RH:CVE-2020-6409 RH:CVE-2020-6410 RH:CVE-2020-6411 RH:CVE-2020-6412 RH:CVE-2020-6413 RH:CVE-2020-6414 RH:CVE-2020-6415 RH:CVE-2020-6416 RH:CVE-2020-6417 RHSA-2020:0514 RHSA-2020:1810 RHSA-2020:4442 SMASH Issue 252466 SUSE:openSUSE-SU-2020:0189 SUSE:openSUSE-SU-2020:0210 SUSE:openSUSE-SU-2020:0233 UBUNTU:CVE-2019-19880 UBUNTU:CVE-2019-19923 UBUNTU:CVE-2019-19926 UBUNTU:CVE-2020-6381 UBUNTU:CVE-2020-6382 UBUNTU:CVE-2020-6385 UBUNTU:CVE-2020-6387 UBUNTU:CVE-2020-6388 UBUNTU:CVE-2020-6389 UBUNTU:CVE-2020-6390 UBUNTU:CVE-2020-6391 UBUNTU:CVE-2020-6392 UBUNTU:CVE-2020-6393 UBUNTU:CVE-2020-6394 UBUNTU:CVE-2020-6395 UBUNTU:CVE-2020-6396 UBUNTU:CVE-2020-6397 UBUNTU:CVE-2020-6398 UBUNTU:CVE-2020-6399 UBUNTU:CVE-2020-6400 UBUNTU:CVE-2020-6401 UBUNTU:CVE-2020-6402 UBUNTU:CVE-2020-6403 UBUNTU:CVE-2020-6404 UBUNTU:CVE-2020-6405 UBUNTU:CVE-2020-6406 UBUNTU:CVE-2020-6408 UBUNTU:CVE-2020-6409 UBUNTU:CVE-2020-6410 UBUNTU:CVE-2020-6411 UBUNTU:CVE-2020-6412 UBUNTU:CVE-2020-6413 UBUNTU:CVE-2020-6414 UBUNTU:CVE-2020-6415 UBUNTU:CVE-2020-6416 UBUNTU:CVE-2020-6417 USN-4298-1 USN-4298-2 bnc#1162833 rh#1770768 rh#1787032 rh#1788846 rh#1789364 rh#1801160 rh#1801161 rh#1801162 rh#1801163 rh#1801164 rh#1801165 rh#1801166 rh#1801167 rh#1801168 rh#1801169 rh#1801170 rh#1801171 rh#1801172 rh#1801173 rh#1801174 rh#1801175 rh#1801176 rh#1801177 rh#1801178 rh#1801179 rh#1801180 rh#1801181 rh#1801182 rh#1801184 rh#1801185 rh#1801186 rh#1801187 rh#1801188 rh#1801189 rh#1801190 rh#1801191 rh#1801192 rh#1801193 |
CVE-2020-6393 | sqlite3:Released | important | () | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2019-19880 CONFIRM:security.netapp.com:CVE-2019-19923 CVE-2019-19880 CVE-2019-19923 CVE-2019-19926 CVE-2020-6381 CVE-2020-6382 CVE-2020-6385 CVE-2020-6387 CVE-2020-6388 CVE-2020-6389 CVE-2020-6390 CVE-2020-6391 CVE-2020-6392 CVE-2020-6393 CVE-2020-6394 CVE-2020-6395 CVE-2020-6396 CVE-2020-6397 CVE-2020-6398 CVE-2020-6399 CVE-2020-6400 CVE-2020-6401 CVE-2020-6402 CVE-2020-6403 CVE-2020-6404 CVE-2020-6405 CVE-2020-6406 CVE-2020-6408 CVE-2020-6409 CVE-2020-6410 CVE-2020-6411 CVE-2020-6412 CVE-2020-6413 CVE-2020-6414 CVE-2020-6415 CVE-2020-6416 CVE-2020-6417 D:CVE-2020-6391 DSA-4638 FEDORA:FEDORA-2020-39e0b8bd14 FEDORA:FEDORA-2020-f6271d7afa GLSA-202003-08 MISC:chromereleases.googleblog.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6382 MISC:crbug.com:CVE-2020-6385 MISC:crbug.com:CVE-2020-6387 MISC:crbug.com:CVE-2020-6388 MISC:crbug.com:CVE-2020-6389 MISC:crbug.com:CVE-2020-6390 MISC:crbug.com:CVE-2020-6391 MISC:crbug.com:CVE-2020-6392 MISC:crbug.com:CVE-2020-6393 MISC:crbug.com:CVE-2020-6394 MISC:crbug.com:CVE-2020-6395 MISC:crbug.com:CVE-2020-6396 MISC:crbug.com:CVE-2020-6397 MISC:crbug.com:CVE-2020-6398 MISC:crbug.com:CVE-2020-6399 MISC:crbug.com:CVE-2020-6400 MISC:crbug.com:CVE-2020-6401 MISC:crbug.com:CVE-2020-6402 MISC:crbug.com:CVE-2020-6403 MISC:crbug.com:CVE-2020-6404 MISC:crbug.com:CVE-2020-6405 MISC:crbug.com:CVE-2020-6406 MISC:crbug.com:CVE-2020-6408 MISC:crbug.com:CVE-2020-6409 MISC:crbug.com:CVE-2020-6410 MISC:crbug.com:CVE-2020-6411 MISC:crbug.com:CVE-2020-6412 MISC:crbug.com:CVE-2020-6413 MISC:crbug.com:CVE-2020-6414 MISC:crbug.com:CVE-2020-6415 MISC:crbug.com:CVE-2020-6416 MISC:crbug.com:CVE-2020-6417 MISC:github.com:CVE-2019-19880 MISC:github.com:CVE-2019-19923 MISC:github.com:CVE-2019-19926 MISC:packetstormsecurity.com:CVE-2020-6388 MISC:packetstormsecurity.com:CVE-2020-6390 MISC:www.oracle.com:CVE-2019-2880 Oracle:CVE-2019-18197 RH:CVE-2019-19880 RH:CVE-2019-19923 RH:CVE-2019-19926 RH:CVE-2020-6381 RH:CVE-2020-6382 RH:CVE-2020-6385 RH:CVE-2020-6387 RH:CVE-2020-6388 RH:CVE-2020-6389 RH:CVE-2020-6390 RH:CVE-2020-6391 RH:CVE-2020-6392 RH:CVE-2020-6393 RH:CVE-2020-6394 RH:CVE-2020-6395 RH:CVE-2020-6396 RH:CVE-2020-6397 RH:CVE-2020-6398 RH:CVE-2020-6399 RH:CVE-2020-6400 RH:CVE-2020-6401 RH:CVE-2020-6402 RH:CVE-2020-6403 RH:CVE-2020-6404 RH:CVE-2020-6405 RH:CVE-2020-6406 RH:CVE-2020-6408 RH:CVE-2020-6409 RH:CVE-2020-6410 RH:CVE-2020-6411 RH:CVE-2020-6412 RH:CVE-2020-6413 RH:CVE-2020-6414 RH:CVE-2020-6415 RH:CVE-2020-6416 RH:CVE-2020-6417 RHSA-2020:0514 RHSA-2020:1810 RHSA-2020:4442 SMASH Issue 252466 SUSE:openSUSE-SU-2020:0189 SUSE:openSUSE-SU-2020:0210 SUSE:openSUSE-SU-2020:0233 UBUNTU:CVE-2019-19880 UBUNTU:CVE-2019-19923 UBUNTU:CVE-2019-19926 UBUNTU:CVE-2020-6381 UBUNTU:CVE-2020-6382 UBUNTU:CVE-2020-6385 UBUNTU:CVE-2020-6387 UBUNTU:CVE-2020-6388 UBUNTU:CVE-2020-6389 UBUNTU:CVE-2020-6390 UBUNTU:CVE-2020-6391 UBUNTU:CVE-2020-6392 UBUNTU:CVE-2020-6393 UBUNTU:CVE-2020-6394 UBUNTU:CVE-2020-6395 UBUNTU:CVE-2020-6396 UBUNTU:CVE-2020-6397 UBUNTU:CVE-2020-6398 UBUNTU:CVE-2020-6399 UBUNTU:CVE-2020-6400 UBUNTU:CVE-2020-6401 UBUNTU:CVE-2020-6402 UBUNTU:CVE-2020-6403 UBUNTU:CVE-2020-6404 UBUNTU:CVE-2020-6405 UBUNTU:CVE-2020-6406 UBUNTU:CVE-2020-6408 UBUNTU:CVE-2020-6409 UBUNTU:CVE-2020-6410 UBUNTU:CVE-2020-6411 UBUNTU:CVE-2020-6412 UBUNTU:CVE-2020-6413 UBUNTU:CVE-2020-6414 UBUNTU:CVE-2020-6415 UBUNTU:CVE-2020-6416 UBUNTU:CVE-2020-6417 USN-4298-1 USN-4298-2 bnc#1162833 rh#1770768 rh#1787032 rh#1788846 rh#1789364 rh#1801160 rh#1801161 rh#1801162 rh#1801163 rh#1801164 rh#1801165 rh#1801166 rh#1801167 rh#1801168 rh#1801169 rh#1801170 rh#1801171 rh#1801172 rh#1801173 rh#1801174 rh#1801175 rh#1801176 rh#1801177 rh#1801178 rh#1801179 rh#1801180 rh#1801181 rh#1801182 rh#1801184 rh#1801185 rh#1801186 rh#1801187 rh#1801188 rh#1801189 rh#1801190 rh#1801191 rh#1801192 rh#1801193 |
CVE-2020-6394 | sqlite3:Released | important | () | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2019-19880 CONFIRM:security.netapp.com:CVE-2019-19923 CVE-2019-19880 CVE-2019-19923 CVE-2019-19926 CVE-2020-6381 CVE-2020-6382 CVE-2020-6385 CVE-2020-6387 CVE-2020-6388 CVE-2020-6389 CVE-2020-6390 CVE-2020-6391 CVE-2020-6392 CVE-2020-6393 CVE-2020-6394 CVE-2020-6395 CVE-2020-6396 CVE-2020-6397 CVE-2020-6398 CVE-2020-6399 CVE-2020-6400 CVE-2020-6401 CVE-2020-6402 CVE-2020-6403 CVE-2020-6404 CVE-2020-6405 CVE-2020-6406 CVE-2020-6408 CVE-2020-6409 CVE-2020-6410 CVE-2020-6411 CVE-2020-6412 CVE-2020-6413 CVE-2020-6414 CVE-2020-6415 CVE-2020-6416 CVE-2020-6417 D:CVE-2020-6391 DSA-4638 FEDORA:FEDORA-2020-39e0b8bd14 FEDORA:FEDORA-2020-f6271d7afa GLSA-202003-08 MISC:chromereleases.googleblog.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6382 MISC:crbug.com:CVE-2020-6385 MISC:crbug.com:CVE-2020-6387 MISC:crbug.com:CVE-2020-6388 MISC:crbug.com:CVE-2020-6389 MISC:crbug.com:CVE-2020-6390 MISC:crbug.com:CVE-2020-6391 MISC:crbug.com:CVE-2020-6392 MISC:crbug.com:CVE-2020-6393 MISC:crbug.com:CVE-2020-6394 MISC:crbug.com:CVE-2020-6395 MISC:crbug.com:CVE-2020-6396 MISC:crbug.com:CVE-2020-6397 MISC:crbug.com:CVE-2020-6398 MISC:crbug.com:CVE-2020-6399 MISC:crbug.com:CVE-2020-6400 MISC:crbug.com:CVE-2020-6401 MISC:crbug.com:CVE-2020-6402 MISC:crbug.com:CVE-2020-6403 MISC:crbug.com:CVE-2020-6404 MISC:crbug.com:CVE-2020-6405 MISC:crbug.com:CVE-2020-6406 MISC:crbug.com:CVE-2020-6408 MISC:crbug.com:CVE-2020-6409 MISC:crbug.com:CVE-2020-6410 MISC:crbug.com:CVE-2020-6411 MISC:crbug.com:CVE-2020-6412 MISC:crbug.com:CVE-2020-6413 MISC:crbug.com:CVE-2020-6414 MISC:crbug.com:CVE-2020-6415 MISC:crbug.com:CVE-2020-6416 MISC:crbug.com:CVE-2020-6417 MISC:github.com:CVE-2019-19880 MISC:github.com:CVE-2019-19923 MISC:github.com:CVE-2019-19926 MISC:packetstormsecurity.com:CVE-2020-6388 MISC:packetstormsecurity.com:CVE-2020-6390 MISC:www.oracle.com:CVE-2019-2880 Oracle:CVE-2019-18197 RH:CVE-2019-19880 RH:CVE-2019-19923 RH:CVE-2019-19926 RH:CVE-2020-6381 RH:CVE-2020-6382 RH:CVE-2020-6385 RH:CVE-2020-6387 RH:CVE-2020-6388 RH:CVE-2020-6389 RH:CVE-2020-6390 RH:CVE-2020-6391 RH:CVE-2020-6392 RH:CVE-2020-6393 RH:CVE-2020-6394 RH:CVE-2020-6395 RH:CVE-2020-6396 RH:CVE-2020-6397 RH:CVE-2020-6398 RH:CVE-2020-6399 RH:CVE-2020-6400 RH:CVE-2020-6401 RH:CVE-2020-6402 RH:CVE-2020-6403 RH:CVE-2020-6404 RH:CVE-2020-6405 RH:CVE-2020-6406 RH:CVE-2020-6408 RH:CVE-2020-6409 RH:CVE-2020-6410 RH:CVE-2020-6411 RH:CVE-2020-6412 RH:CVE-2020-6413 RH:CVE-2020-6414 RH:CVE-2020-6415 RH:CVE-2020-6416 RH:CVE-2020-6417 RHSA-2020:0514 RHSA-2020:1810 RHSA-2020:4442 SMASH Issue 252466 SUSE:openSUSE-SU-2020:0189 SUSE:openSUSE-SU-2020:0210 SUSE:openSUSE-SU-2020:0233 UBUNTU:CVE-2019-19880 UBUNTU:CVE-2019-19923 UBUNTU:CVE-2019-19926 UBUNTU:CVE-2020-6381 UBUNTU:CVE-2020-6382 UBUNTU:CVE-2020-6385 UBUNTU:CVE-2020-6387 UBUNTU:CVE-2020-6388 UBUNTU:CVE-2020-6389 UBUNTU:CVE-2020-6390 UBUNTU:CVE-2020-6391 UBUNTU:CVE-2020-6392 UBUNTU:CVE-2020-6393 UBUNTU:CVE-2020-6394 UBUNTU:CVE-2020-6395 UBUNTU:CVE-2020-6396 UBUNTU:CVE-2020-6397 UBUNTU:CVE-2020-6398 UBUNTU:CVE-2020-6399 UBUNTU:CVE-2020-6400 UBUNTU:CVE-2020-6401 UBUNTU:CVE-2020-6402 UBUNTU:CVE-2020-6403 UBUNTU:CVE-2020-6404 UBUNTU:CVE-2020-6405 UBUNTU:CVE-2020-6406 UBUNTU:CVE-2020-6408 UBUNTU:CVE-2020-6409 UBUNTU:CVE-2020-6410 UBUNTU:CVE-2020-6411 UBUNTU:CVE-2020-6412 UBUNTU:CVE-2020-6413 UBUNTU:CVE-2020-6414 UBUNTU:CVE-2020-6415 UBUNTU:CVE-2020-6416 UBUNTU:CVE-2020-6417 USN-4298-1 USN-4298-2 bnc#1162833 rh#1770768 rh#1787032 rh#1788846 rh#1789364 rh#1801160 rh#1801161 rh#1801162 rh#1801163 rh#1801164 rh#1801165 rh#1801166 rh#1801167 rh#1801168 rh#1801169 rh#1801170 rh#1801171 rh#1801172 rh#1801173 rh#1801174 rh#1801175 rh#1801176 rh#1801177 rh#1801178 rh#1801179 rh#1801180 rh#1801181 rh#1801182 rh#1801184 rh#1801185 rh#1801186 rh#1801187 rh#1801188 rh#1801189 rh#1801190 rh#1801191 rh#1801192 rh#1801193 |
CVE-2020-6395 | sqlite3:Released | important | () | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2019-19880 CONFIRM:security.netapp.com:CVE-2019-19923 CVE-2019-19880 CVE-2019-19923 CVE-2019-19926 CVE-2020-6381 CVE-2020-6382 CVE-2020-6385 CVE-2020-6387 CVE-2020-6388 CVE-2020-6389 CVE-2020-6390 CVE-2020-6391 CVE-2020-6392 CVE-2020-6393 CVE-2020-6394 CVE-2020-6395 CVE-2020-6396 CVE-2020-6397 CVE-2020-6398 CVE-2020-6399 CVE-2020-6400 CVE-2020-6401 CVE-2020-6402 CVE-2020-6403 CVE-2020-6404 CVE-2020-6405 CVE-2020-6406 CVE-2020-6408 CVE-2020-6409 CVE-2020-6410 CVE-2020-6411 CVE-2020-6412 CVE-2020-6413 CVE-2020-6414 CVE-2020-6415 CVE-2020-6416 CVE-2020-6417 D:CVE-2020-6391 DSA-4638 FEDORA:FEDORA-2020-39e0b8bd14 FEDORA:FEDORA-2020-f6271d7afa GLSA-202003-08 MISC:chromereleases.googleblog.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6382 MISC:crbug.com:CVE-2020-6385 MISC:crbug.com:CVE-2020-6387 MISC:crbug.com:CVE-2020-6388 MISC:crbug.com:CVE-2020-6389 MISC:crbug.com:CVE-2020-6390 MISC:crbug.com:CVE-2020-6391 MISC:crbug.com:CVE-2020-6392 MISC:crbug.com:CVE-2020-6393 MISC:crbug.com:CVE-2020-6394 MISC:crbug.com:CVE-2020-6395 MISC:crbug.com:CVE-2020-6396 MISC:crbug.com:CVE-2020-6397 MISC:crbug.com:CVE-2020-6398 MISC:crbug.com:CVE-2020-6399 MISC:crbug.com:CVE-2020-6400 MISC:crbug.com:CVE-2020-6401 MISC:crbug.com:CVE-2020-6402 MISC:crbug.com:CVE-2020-6403 MISC:crbug.com:CVE-2020-6404 MISC:crbug.com:CVE-2020-6405 MISC:crbug.com:CVE-2020-6406 MISC:crbug.com:CVE-2020-6408 MISC:crbug.com:CVE-2020-6409 MISC:crbug.com:CVE-2020-6410 MISC:crbug.com:CVE-2020-6411 MISC:crbug.com:CVE-2020-6412 MISC:crbug.com:CVE-2020-6413 MISC:crbug.com:CVE-2020-6414 MISC:crbug.com:CVE-2020-6415 MISC:crbug.com:CVE-2020-6416 MISC:crbug.com:CVE-2020-6417 MISC:github.com:CVE-2019-19880 MISC:github.com:CVE-2019-19923 MISC:github.com:CVE-2019-19926 MISC:packetstormsecurity.com:CVE-2020-6388 MISC:packetstormsecurity.com:CVE-2020-6390 MISC:www.oracle.com:CVE-2019-2880 Oracle:CVE-2019-18197 RH:CVE-2019-19880 RH:CVE-2019-19923 RH:CVE-2019-19926 RH:CVE-2020-6381 RH:CVE-2020-6382 RH:CVE-2020-6385 RH:CVE-2020-6387 RH:CVE-2020-6388 RH:CVE-2020-6389 RH:CVE-2020-6390 RH:CVE-2020-6391 RH:CVE-2020-6392 RH:CVE-2020-6393 RH:CVE-2020-6394 RH:CVE-2020-6395 RH:CVE-2020-6396 RH:CVE-2020-6397 RH:CVE-2020-6398 RH:CVE-2020-6399 RH:CVE-2020-6400 RH:CVE-2020-6401 RH:CVE-2020-6402 RH:CVE-2020-6403 RH:CVE-2020-6404 RH:CVE-2020-6405 RH:CVE-2020-6406 RH:CVE-2020-6408 RH:CVE-2020-6409 RH:CVE-2020-6410 RH:CVE-2020-6411 RH:CVE-2020-6412 RH:CVE-2020-6413 RH:CVE-2020-6414 RH:CVE-2020-6415 RH:CVE-2020-6416 RH:CVE-2020-6417 RHSA-2020:0514 RHSA-2020:1810 RHSA-2020:4442 SMASH Issue 252466 SUSE:openSUSE-SU-2020:0189 SUSE:openSUSE-SU-2020:0210 SUSE:openSUSE-SU-2020:0233 UBUNTU:CVE-2019-19880 UBUNTU:CVE-2019-19923 UBUNTU:CVE-2019-19926 UBUNTU:CVE-2020-6381 UBUNTU:CVE-2020-6382 UBUNTU:CVE-2020-6385 UBUNTU:CVE-2020-6387 UBUNTU:CVE-2020-6388 UBUNTU:CVE-2020-6389 UBUNTU:CVE-2020-6390 UBUNTU:CVE-2020-6391 UBUNTU:CVE-2020-6392 UBUNTU:CVE-2020-6393 UBUNTU:CVE-2020-6394 UBUNTU:CVE-2020-6395 UBUNTU:CVE-2020-6396 UBUNTU:CVE-2020-6397 UBUNTU:CVE-2020-6398 UBUNTU:CVE-2020-6399 UBUNTU:CVE-2020-6400 UBUNTU:CVE-2020-6401 UBUNTU:CVE-2020-6402 UBUNTU:CVE-2020-6403 UBUNTU:CVE-2020-6404 UBUNTU:CVE-2020-6405 UBUNTU:CVE-2020-6406 UBUNTU:CVE-2020-6408 UBUNTU:CVE-2020-6409 UBUNTU:CVE-2020-6410 UBUNTU:CVE-2020-6411 UBUNTU:CVE-2020-6412 UBUNTU:CVE-2020-6413 UBUNTU:CVE-2020-6414 UBUNTU:CVE-2020-6415 UBUNTU:CVE-2020-6416 UBUNTU:CVE-2020-6417 USN-4298-1 USN-4298-2 bnc#1162833 rh#1770768 rh#1787032 rh#1788846 rh#1789364 rh#1801160 rh#1801161 rh#1801162 rh#1801163 rh#1801164 rh#1801165 rh#1801166 rh#1801167 rh#1801168 rh#1801169 rh#1801170 rh#1801171 rh#1801172 rh#1801173 rh#1801174 rh#1801175 rh#1801176 rh#1801177 rh#1801178 rh#1801179 rh#1801180 rh#1801181 rh#1801182 rh#1801184 rh#1801185 rh#1801186 rh#1801187 rh#1801188 rh#1801189 rh#1801190 rh#1801191 rh#1801192 rh#1801193 |
CVE-2020-6396 | sqlite3:Released | important | () | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2019-19880 CONFIRM:security.netapp.com:CVE-2019-19923 CVE-2019-19880 CVE-2019-19923 CVE-2019-19926 CVE-2020-6381 CVE-2020-6382 CVE-2020-6385 CVE-2020-6387 CVE-2020-6388 CVE-2020-6389 CVE-2020-6390 CVE-2020-6391 CVE-2020-6392 CVE-2020-6393 CVE-2020-6394 CVE-2020-6395 CVE-2020-6396 CVE-2020-6397 CVE-2020-6398 CVE-2020-6399 CVE-2020-6400 CVE-2020-6401 CVE-2020-6402 CVE-2020-6403 CVE-2020-6404 CVE-2020-6405 CVE-2020-6406 CVE-2020-6408 CVE-2020-6409 CVE-2020-6410 CVE-2020-6411 CVE-2020-6412 CVE-2020-6413 CVE-2020-6414 CVE-2020-6415 CVE-2020-6416 CVE-2020-6417 D:CVE-2020-6391 DSA-4638 FEDORA:FEDORA-2020-39e0b8bd14 FEDORA:FEDORA-2020-f6271d7afa GLSA-202003-08 MISC:chromereleases.googleblog.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6382 MISC:crbug.com:CVE-2020-6385 MISC:crbug.com:CVE-2020-6387 MISC:crbug.com:CVE-2020-6388 MISC:crbug.com:CVE-2020-6389 MISC:crbug.com:CVE-2020-6390 MISC:crbug.com:CVE-2020-6391 MISC:crbug.com:CVE-2020-6392 MISC:crbug.com:CVE-2020-6393 MISC:crbug.com:CVE-2020-6394 MISC:crbug.com:CVE-2020-6395 MISC:crbug.com:CVE-2020-6396 MISC:crbug.com:CVE-2020-6397 MISC:crbug.com:CVE-2020-6398 MISC:crbug.com:CVE-2020-6399 MISC:crbug.com:CVE-2020-6400 MISC:crbug.com:CVE-2020-6401 MISC:crbug.com:CVE-2020-6402 MISC:crbug.com:CVE-2020-6403 MISC:crbug.com:CVE-2020-6404 MISC:crbug.com:CVE-2020-6405 MISC:crbug.com:CVE-2020-6406 MISC:crbug.com:CVE-2020-6408 MISC:crbug.com:CVE-2020-6409 MISC:crbug.com:CVE-2020-6410 MISC:crbug.com:CVE-2020-6411 MISC:crbug.com:CVE-2020-6412 MISC:crbug.com:CVE-2020-6413 MISC:crbug.com:CVE-2020-6414 MISC:crbug.com:CVE-2020-6415 MISC:crbug.com:CVE-2020-6416 MISC:crbug.com:CVE-2020-6417 MISC:github.com:CVE-2019-19880 MISC:github.com:CVE-2019-19923 MISC:github.com:CVE-2019-19926 MISC:packetstormsecurity.com:CVE-2020-6388 MISC:packetstormsecurity.com:CVE-2020-6390 MISC:www.oracle.com:CVE-2019-2880 Oracle:CVE-2019-18197 RH:CVE-2019-19880 RH:CVE-2019-19923 RH:CVE-2019-19926 RH:CVE-2020-6381 RH:CVE-2020-6382 RH:CVE-2020-6385 RH:CVE-2020-6387 RH:CVE-2020-6388 RH:CVE-2020-6389 RH:CVE-2020-6390 RH:CVE-2020-6391 RH:CVE-2020-6392 RH:CVE-2020-6393 RH:CVE-2020-6394 RH:CVE-2020-6395 RH:CVE-2020-6396 RH:CVE-2020-6397 RH:CVE-2020-6398 RH:CVE-2020-6399 RH:CVE-2020-6400 RH:CVE-2020-6401 RH:CVE-2020-6402 RH:CVE-2020-6403 RH:CVE-2020-6404 RH:CVE-2020-6405 RH:CVE-2020-6406 RH:CVE-2020-6408 RH:CVE-2020-6409 RH:CVE-2020-6410 RH:CVE-2020-6411 RH:CVE-2020-6412 RH:CVE-2020-6413 RH:CVE-2020-6414 RH:CVE-2020-6415 RH:CVE-2020-6416 RH:CVE-2020-6417 RHSA-2020:0514 RHSA-2020:1810 RHSA-2020:4442 SMASH Issue 252466 SUSE:openSUSE-SU-2020:0189 SUSE:openSUSE-SU-2020:0210 SUSE:openSUSE-SU-2020:0233 UBUNTU:CVE-2019-19880 UBUNTU:CVE-2019-19923 UBUNTU:CVE-2019-19926 UBUNTU:CVE-2020-6381 UBUNTU:CVE-2020-6382 UBUNTU:CVE-2020-6385 UBUNTU:CVE-2020-6387 UBUNTU:CVE-2020-6388 UBUNTU:CVE-2020-6389 UBUNTU:CVE-2020-6390 UBUNTU:CVE-2020-6391 UBUNTU:CVE-2020-6392 UBUNTU:CVE-2020-6393 UBUNTU:CVE-2020-6394 UBUNTU:CVE-2020-6395 UBUNTU:CVE-2020-6396 UBUNTU:CVE-2020-6397 UBUNTU:CVE-2020-6398 UBUNTU:CVE-2020-6399 UBUNTU:CVE-2020-6400 UBUNTU:CVE-2020-6401 UBUNTU:CVE-2020-6402 UBUNTU:CVE-2020-6403 UBUNTU:CVE-2020-6404 UBUNTU:CVE-2020-6405 UBUNTU:CVE-2020-6406 UBUNTU:CVE-2020-6408 UBUNTU:CVE-2020-6409 UBUNTU:CVE-2020-6410 UBUNTU:CVE-2020-6411 UBUNTU:CVE-2020-6412 UBUNTU:CVE-2020-6413 UBUNTU:CVE-2020-6414 UBUNTU:CVE-2020-6415 UBUNTU:CVE-2020-6416 UBUNTU:CVE-2020-6417 USN-4298-1 USN-4298-2 bnc#1162833 rh#1770768 rh#1787032 rh#1788846 rh#1789364 rh#1801160 rh#1801161 rh#1801162 rh#1801163 rh#1801164 rh#1801165 rh#1801166 rh#1801167 rh#1801168 rh#1801169 rh#1801170 rh#1801171 rh#1801172 rh#1801173 rh#1801174 rh#1801175 rh#1801176 rh#1801177 rh#1801178 rh#1801179 rh#1801180 rh#1801181 rh#1801182 rh#1801184 rh#1801185 rh#1801186 rh#1801187 rh#1801188 rh#1801189 rh#1801190 rh#1801191 rh#1801192 rh#1801193 |
CVE-2020-6397 | sqlite3:Released | important | () | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2019-19880 CONFIRM:security.netapp.com:CVE-2019-19923 CVE-2019-19880 CVE-2019-19923 CVE-2019-19926 CVE-2020-6381 CVE-2020-6382 CVE-2020-6385 CVE-2020-6387 CVE-2020-6388 CVE-2020-6389 CVE-2020-6390 CVE-2020-6391 CVE-2020-6392 CVE-2020-6393 CVE-2020-6394 CVE-2020-6395 CVE-2020-6396 CVE-2020-6397 CVE-2020-6398 CVE-2020-6399 CVE-2020-6400 CVE-2020-6401 CVE-2020-6402 CVE-2020-6403 CVE-2020-6404 CVE-2020-6405 CVE-2020-6406 CVE-2020-6408 CVE-2020-6409 CVE-2020-6410 CVE-2020-6411 CVE-2020-6412 CVE-2020-6413 CVE-2020-6414 CVE-2020-6415 CVE-2020-6416 CVE-2020-6417 D:CVE-2020-6391 DSA-4638 FEDORA:FEDORA-2020-39e0b8bd14 FEDORA:FEDORA-2020-f6271d7afa GLSA-202003-08 MISC:chromereleases.googleblog.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6382 MISC:crbug.com:CVE-2020-6385 MISC:crbug.com:CVE-2020-6387 MISC:crbug.com:CVE-2020-6388 MISC:crbug.com:CVE-2020-6389 MISC:crbug.com:CVE-2020-6390 MISC:crbug.com:CVE-2020-6391 MISC:crbug.com:CVE-2020-6392 MISC:crbug.com:CVE-2020-6393 MISC:crbug.com:CVE-2020-6394 MISC:crbug.com:CVE-2020-6395 MISC:crbug.com:CVE-2020-6396 MISC:crbug.com:CVE-2020-6397 MISC:crbug.com:CVE-2020-6398 MISC:crbug.com:CVE-2020-6399 MISC:crbug.com:CVE-2020-6400 MISC:crbug.com:CVE-2020-6401 MISC:crbug.com:CVE-2020-6402 MISC:crbug.com:CVE-2020-6403 MISC:crbug.com:CVE-2020-6404 MISC:crbug.com:CVE-2020-6405 MISC:crbug.com:CVE-2020-6406 MISC:crbug.com:CVE-2020-6408 MISC:crbug.com:CVE-2020-6409 MISC:crbug.com:CVE-2020-6410 MISC:crbug.com:CVE-2020-6411 MISC:crbug.com:CVE-2020-6412 MISC:crbug.com:CVE-2020-6413 MISC:crbug.com:CVE-2020-6414 MISC:crbug.com:CVE-2020-6415 MISC:crbug.com:CVE-2020-6416 MISC:crbug.com:CVE-2020-6417 MISC:github.com:CVE-2019-19880 MISC:github.com:CVE-2019-19923 MISC:github.com:CVE-2019-19926 MISC:packetstormsecurity.com:CVE-2020-6388 MISC:packetstormsecurity.com:CVE-2020-6390 MISC:www.oracle.com:CVE-2019-2880 Oracle:CVE-2019-18197 RH:CVE-2019-19880 RH:CVE-2019-19923 RH:CVE-2019-19926 RH:CVE-2020-6381 RH:CVE-2020-6382 RH:CVE-2020-6385 RH:CVE-2020-6387 RH:CVE-2020-6388 RH:CVE-2020-6389 RH:CVE-2020-6390 RH:CVE-2020-6391 RH:CVE-2020-6392 RH:CVE-2020-6393 RH:CVE-2020-6394 RH:CVE-2020-6395 RH:CVE-2020-6396 RH:CVE-2020-6397 RH:CVE-2020-6398 RH:CVE-2020-6399 RH:CVE-2020-6400 RH:CVE-2020-6401 RH:CVE-2020-6402 RH:CVE-2020-6403 RH:CVE-2020-6404 RH:CVE-2020-6405 RH:CVE-2020-6406 RH:CVE-2020-6408 RH:CVE-2020-6409 RH:CVE-2020-6410 RH:CVE-2020-6411 RH:CVE-2020-6412 RH:CVE-2020-6413 RH:CVE-2020-6414 RH:CVE-2020-6415 RH:CVE-2020-6416 RH:CVE-2020-6417 RHSA-2020:0514 RHSA-2020:1810 RHSA-2020:4442 SMASH Issue 252466 SUSE:openSUSE-SU-2020:0189 SUSE:openSUSE-SU-2020:0210 SUSE:openSUSE-SU-2020:0233 UBUNTU:CVE-2019-19880 UBUNTU:CVE-2019-19923 UBUNTU:CVE-2019-19926 UBUNTU:CVE-2020-6381 UBUNTU:CVE-2020-6382 UBUNTU:CVE-2020-6385 UBUNTU:CVE-2020-6387 UBUNTU:CVE-2020-6388 UBUNTU:CVE-2020-6389 UBUNTU:CVE-2020-6390 UBUNTU:CVE-2020-6391 UBUNTU:CVE-2020-6392 UBUNTU:CVE-2020-6393 UBUNTU:CVE-2020-6394 UBUNTU:CVE-2020-6395 UBUNTU:CVE-2020-6396 UBUNTU:CVE-2020-6397 UBUNTU:CVE-2020-6398 UBUNTU:CVE-2020-6399 UBUNTU:CVE-2020-6400 UBUNTU:CVE-2020-6401 UBUNTU:CVE-2020-6402 UBUNTU:CVE-2020-6403 UBUNTU:CVE-2020-6404 UBUNTU:CVE-2020-6405 UBUNTU:CVE-2020-6406 UBUNTU:CVE-2020-6408 UBUNTU:CVE-2020-6409 UBUNTU:CVE-2020-6410 UBUNTU:CVE-2020-6411 UBUNTU:CVE-2020-6412 UBUNTU:CVE-2020-6413 UBUNTU:CVE-2020-6414 UBUNTU:CVE-2020-6415 UBUNTU:CVE-2020-6416 UBUNTU:CVE-2020-6417 USN-4298-1 USN-4298-2 bnc#1162833 rh#1770768 rh#1787032 rh#1788846 rh#1789364 rh#1801160 rh#1801161 rh#1801162 rh#1801163 rh#1801164 rh#1801165 rh#1801166 rh#1801167 rh#1801168 rh#1801169 rh#1801170 rh#1801171 rh#1801172 rh#1801173 rh#1801174 rh#1801175 rh#1801176 rh#1801177 rh#1801178 rh#1801179 rh#1801180 rh#1801181 rh#1801182 rh#1801184 rh#1801185 rh#1801186 rh#1801187 rh#1801188 rh#1801189 rh#1801190 rh#1801191 rh#1801192 rh#1801193 |
CVE-2020-6398 | sqlite3:Released | important | () | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2019-19880 CONFIRM:security.netapp.com:CVE-2019-19923 CVE-2019-19880 CVE-2019-19923 CVE-2019-19926 CVE-2020-6381 CVE-2020-6382 CVE-2020-6385 CVE-2020-6387 CVE-2020-6388 CVE-2020-6389 CVE-2020-6390 CVE-2020-6391 CVE-2020-6392 CVE-2020-6393 CVE-2020-6394 CVE-2020-6395 CVE-2020-6396 CVE-2020-6397 CVE-2020-6398 CVE-2020-6399 CVE-2020-6400 CVE-2020-6401 CVE-2020-6402 CVE-2020-6403 CVE-2020-6404 CVE-2020-6405 CVE-2020-6406 CVE-2020-6408 CVE-2020-6409 CVE-2020-6410 CVE-2020-6411 CVE-2020-6412 CVE-2020-6413 CVE-2020-6414 CVE-2020-6415 CVE-2020-6416 CVE-2020-6417 D:CVE-2020-6391 DSA-4638 FEDORA:FEDORA-2020-39e0b8bd14 FEDORA:FEDORA-2020-f6271d7afa GLSA-202003-08 MISC:chromereleases.googleblog.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6382 MISC:crbug.com:CVE-2020-6385 MISC:crbug.com:CVE-2020-6387 MISC:crbug.com:CVE-2020-6388 MISC:crbug.com:CVE-2020-6389 MISC:crbug.com:CVE-2020-6390 MISC:crbug.com:CVE-2020-6391 MISC:crbug.com:CVE-2020-6392 MISC:crbug.com:CVE-2020-6393 MISC:crbug.com:CVE-2020-6394 MISC:crbug.com:CVE-2020-6395 MISC:crbug.com:CVE-2020-6396 MISC:crbug.com:CVE-2020-6397 MISC:crbug.com:CVE-2020-6398 MISC:crbug.com:CVE-2020-6399 MISC:crbug.com:CVE-2020-6400 MISC:crbug.com:CVE-2020-6401 MISC:crbug.com:CVE-2020-6402 MISC:crbug.com:CVE-2020-6403 MISC:crbug.com:CVE-2020-6404 MISC:crbug.com:CVE-2020-6405 MISC:crbug.com:CVE-2020-6406 MISC:crbug.com:CVE-2020-6408 MISC:crbug.com:CVE-2020-6409 MISC:crbug.com:CVE-2020-6410 MISC:crbug.com:CVE-2020-6411 MISC:crbug.com:CVE-2020-6412 MISC:crbug.com:CVE-2020-6413 MISC:crbug.com:CVE-2020-6414 MISC:crbug.com:CVE-2020-6415 MISC:crbug.com:CVE-2020-6416 MISC:crbug.com:CVE-2020-6417 MISC:github.com:CVE-2019-19880 MISC:github.com:CVE-2019-19923 MISC:github.com:CVE-2019-19926 MISC:packetstormsecurity.com:CVE-2020-6388 MISC:packetstormsecurity.com:CVE-2020-6390 MISC:www.oracle.com:CVE-2019-2880 Oracle:CVE-2019-18197 RH:CVE-2019-19880 RH:CVE-2019-19923 RH:CVE-2019-19926 RH:CVE-2020-6381 RH:CVE-2020-6382 RH:CVE-2020-6385 RH:CVE-2020-6387 RH:CVE-2020-6388 RH:CVE-2020-6389 RH:CVE-2020-6390 RH:CVE-2020-6391 RH:CVE-2020-6392 RH:CVE-2020-6393 RH:CVE-2020-6394 RH:CVE-2020-6395 RH:CVE-2020-6396 RH:CVE-2020-6397 RH:CVE-2020-6398 RH:CVE-2020-6399 RH:CVE-2020-6400 RH:CVE-2020-6401 RH:CVE-2020-6402 RH:CVE-2020-6403 RH:CVE-2020-6404 RH:CVE-2020-6405 RH:CVE-2020-6406 RH:CVE-2020-6408 RH:CVE-2020-6409 RH:CVE-2020-6410 RH:CVE-2020-6411 RH:CVE-2020-6412 RH:CVE-2020-6413 RH:CVE-2020-6414 RH:CVE-2020-6415 RH:CVE-2020-6416 RH:CVE-2020-6417 RHSA-2020:0514 RHSA-2020:1810 RHSA-2020:4442 SMASH Issue 252466 SUSE:openSUSE-SU-2020:0189 SUSE:openSUSE-SU-2020:0210 SUSE:openSUSE-SU-2020:0233 UBUNTU:CVE-2019-19880 UBUNTU:CVE-2019-19923 UBUNTU:CVE-2019-19926 UBUNTU:CVE-2020-6381 UBUNTU:CVE-2020-6382 UBUNTU:CVE-2020-6385 UBUNTU:CVE-2020-6387 UBUNTU:CVE-2020-6388 UBUNTU:CVE-2020-6389 UBUNTU:CVE-2020-6390 UBUNTU:CVE-2020-6391 UBUNTU:CVE-2020-6392 UBUNTU:CVE-2020-6393 UBUNTU:CVE-2020-6394 UBUNTU:CVE-2020-6395 UBUNTU:CVE-2020-6396 UBUNTU:CVE-2020-6397 UBUNTU:CVE-2020-6398 UBUNTU:CVE-2020-6399 UBUNTU:CVE-2020-6400 UBUNTU:CVE-2020-6401 UBUNTU:CVE-2020-6402 UBUNTU:CVE-2020-6403 UBUNTU:CVE-2020-6404 UBUNTU:CVE-2020-6405 UBUNTU:CVE-2020-6406 UBUNTU:CVE-2020-6408 UBUNTU:CVE-2020-6409 UBUNTU:CVE-2020-6410 UBUNTU:CVE-2020-6411 UBUNTU:CVE-2020-6412 UBUNTU:CVE-2020-6413 UBUNTU:CVE-2020-6414 UBUNTU:CVE-2020-6415 UBUNTU:CVE-2020-6416 UBUNTU:CVE-2020-6417 USN-4298-1 USN-4298-2 bnc#1162833 rh#1770768 rh#1787032 rh#1788846 rh#1789364 rh#1801160 rh#1801161 rh#1801162 rh#1801163 rh#1801164 rh#1801165 rh#1801166 rh#1801167 rh#1801168 rh#1801169 rh#1801170 rh#1801171 rh#1801172 rh#1801173 rh#1801174 rh#1801175 rh#1801176 rh#1801177 rh#1801178 rh#1801179 rh#1801180 rh#1801181 rh#1801182 rh#1801184 rh#1801185 rh#1801186 rh#1801187 rh#1801188 rh#1801189 rh#1801190 rh#1801191 rh#1801192 rh#1801193 |
CVE-2020-6399 | sqlite3:Released | important | () | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2019-19880 CONFIRM:security.netapp.com:CVE-2019-19923 CVE-2019-19880 CVE-2019-19923 CVE-2019-19926 CVE-2020-6381 CVE-2020-6382 CVE-2020-6385 CVE-2020-6387 CVE-2020-6388 CVE-2020-6389 CVE-2020-6390 CVE-2020-6391 CVE-2020-6392 CVE-2020-6393 CVE-2020-6394 CVE-2020-6395 CVE-2020-6396 CVE-2020-6397 CVE-2020-6398 CVE-2020-6399 CVE-2020-6400 CVE-2020-6401 CVE-2020-6402 CVE-2020-6403 CVE-2020-6404 CVE-2020-6405 CVE-2020-6406 CVE-2020-6408 CVE-2020-6409 CVE-2020-6410 CVE-2020-6411 CVE-2020-6412 CVE-2020-6413 CVE-2020-6414 CVE-2020-6415 CVE-2020-6416 CVE-2020-6417 D:CVE-2020-6391 DSA-4638 FEDORA:FEDORA-2020-39e0b8bd14 FEDORA:FEDORA-2020-f6271d7afa GLSA-202003-08 MISC:chromereleases.googleblog.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6382 MISC:crbug.com:CVE-2020-6385 MISC:crbug.com:CVE-2020-6387 MISC:crbug.com:CVE-2020-6388 MISC:crbug.com:CVE-2020-6389 MISC:crbug.com:CVE-2020-6390 MISC:crbug.com:CVE-2020-6391 MISC:crbug.com:CVE-2020-6392 MISC:crbug.com:CVE-2020-6393 MISC:crbug.com:CVE-2020-6394 MISC:crbug.com:CVE-2020-6395 MISC:crbug.com:CVE-2020-6396 MISC:crbug.com:CVE-2020-6397 MISC:crbug.com:CVE-2020-6398 MISC:crbug.com:CVE-2020-6399 MISC:crbug.com:CVE-2020-6400 MISC:crbug.com:CVE-2020-6401 MISC:crbug.com:CVE-2020-6402 MISC:crbug.com:CVE-2020-6403 MISC:crbug.com:CVE-2020-6404 MISC:crbug.com:CVE-2020-6405 MISC:crbug.com:CVE-2020-6406 MISC:crbug.com:CVE-2020-6408 MISC:crbug.com:CVE-2020-6409 MISC:crbug.com:CVE-2020-6410 MISC:crbug.com:CVE-2020-6411 MISC:crbug.com:CVE-2020-6412 MISC:crbug.com:CVE-2020-6413 MISC:crbug.com:CVE-2020-6414 MISC:crbug.com:CVE-2020-6415 MISC:crbug.com:CVE-2020-6416 MISC:crbug.com:CVE-2020-6417 MISC:github.com:CVE-2019-19880 MISC:github.com:CVE-2019-19923 MISC:github.com:CVE-2019-19926 MISC:packetstormsecurity.com:CVE-2020-6388 MISC:packetstormsecurity.com:CVE-2020-6390 MISC:www.oracle.com:CVE-2019-2880 Oracle:CVE-2019-18197 RH:CVE-2019-19880 RH:CVE-2019-19923 RH:CVE-2019-19926 RH:CVE-2020-6381 RH:CVE-2020-6382 RH:CVE-2020-6385 RH:CVE-2020-6387 RH:CVE-2020-6388 RH:CVE-2020-6389 RH:CVE-2020-6390 RH:CVE-2020-6391 RH:CVE-2020-6392 RH:CVE-2020-6393 RH:CVE-2020-6394 RH:CVE-2020-6395 RH:CVE-2020-6396 RH:CVE-2020-6397 RH:CVE-2020-6398 RH:CVE-2020-6399 RH:CVE-2020-6400 RH:CVE-2020-6401 RH:CVE-2020-6402 RH:CVE-2020-6403 RH:CVE-2020-6404 RH:CVE-2020-6405 RH:CVE-2020-6406 RH:CVE-2020-6408 RH:CVE-2020-6409 RH:CVE-2020-6410 RH:CVE-2020-6411 RH:CVE-2020-6412 RH:CVE-2020-6413 RH:CVE-2020-6414 RH:CVE-2020-6415 RH:CVE-2020-6416 RH:CVE-2020-6417 RHSA-2020:0514 RHSA-2020:1810 RHSA-2020:4442 SMASH Issue 252466 SUSE:openSUSE-SU-2020:0189 SUSE:openSUSE-SU-2020:0210 SUSE:openSUSE-SU-2020:0233 UBUNTU:CVE-2019-19880 UBUNTU:CVE-2019-19923 UBUNTU:CVE-2019-19926 UBUNTU:CVE-2020-6381 UBUNTU:CVE-2020-6382 UBUNTU:CVE-2020-6385 UBUNTU:CVE-2020-6387 UBUNTU:CVE-2020-6388 UBUNTU:CVE-2020-6389 UBUNTU:CVE-2020-6390 UBUNTU:CVE-2020-6391 UBUNTU:CVE-2020-6392 UBUNTU:CVE-2020-6393 UBUNTU:CVE-2020-6394 UBUNTU:CVE-2020-6395 UBUNTU:CVE-2020-6396 UBUNTU:CVE-2020-6397 UBUNTU:CVE-2020-6398 UBUNTU:CVE-2020-6399 UBUNTU:CVE-2020-6400 UBUNTU:CVE-2020-6401 UBUNTU:CVE-2020-6402 UBUNTU:CVE-2020-6403 UBUNTU:CVE-2020-6404 UBUNTU:CVE-2020-6405 UBUNTU:CVE-2020-6406 UBUNTU:CVE-2020-6408 UBUNTU:CVE-2020-6409 UBUNTU:CVE-2020-6410 UBUNTU:CVE-2020-6411 UBUNTU:CVE-2020-6412 UBUNTU:CVE-2020-6413 UBUNTU:CVE-2020-6414 UBUNTU:CVE-2020-6415 UBUNTU:CVE-2020-6416 UBUNTU:CVE-2020-6417 USN-4298-1 USN-4298-2 bnc#1162833 rh#1770768 rh#1787032 rh#1788846 rh#1789364 rh#1801160 rh#1801161 rh#1801162 rh#1801163 rh#1801164 rh#1801165 rh#1801166 rh#1801167 rh#1801168 rh#1801169 rh#1801170 rh#1801171 rh#1801172 rh#1801173 rh#1801174 rh#1801175 rh#1801176 rh#1801177 rh#1801178 rh#1801179 rh#1801180 rh#1801181 rh#1801182 rh#1801184 rh#1801185 rh#1801186 rh#1801187 rh#1801188 rh#1801189 rh#1801190 rh#1801191 rh#1801192 rh#1801193 |
CVE-2020-6400 | sqlite3:Released | important | () | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2019-19880 CONFIRM:security.netapp.com:CVE-2019-19923 CVE-2019-19880 CVE-2019-19923 CVE-2019-19926 CVE-2020-6381 CVE-2020-6382 CVE-2020-6385 CVE-2020-6387 CVE-2020-6388 CVE-2020-6389 CVE-2020-6390 CVE-2020-6391 CVE-2020-6392 CVE-2020-6393 CVE-2020-6394 CVE-2020-6395 CVE-2020-6396 CVE-2020-6397 CVE-2020-6398 CVE-2020-6399 CVE-2020-6400 CVE-2020-6401 CVE-2020-6402 CVE-2020-6403 CVE-2020-6404 CVE-2020-6405 CVE-2020-6406 CVE-2020-6408 CVE-2020-6409 CVE-2020-6410 CVE-2020-6411 CVE-2020-6412 CVE-2020-6413 CVE-2020-6414 CVE-2020-6415 CVE-2020-6416 CVE-2020-6417 D:CVE-2020-6391 DSA-4638 FEDORA:FEDORA-2020-39e0b8bd14 FEDORA:FEDORA-2020-f6271d7afa GLSA-202003-08 MISC:chromereleases.googleblog.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6382 MISC:crbug.com:CVE-2020-6385 MISC:crbug.com:CVE-2020-6387 MISC:crbug.com:CVE-2020-6388 MISC:crbug.com:CVE-2020-6389 MISC:crbug.com:CVE-2020-6390 MISC:crbug.com:CVE-2020-6391 MISC:crbug.com:CVE-2020-6392 MISC:crbug.com:CVE-2020-6393 MISC:crbug.com:CVE-2020-6394 MISC:crbug.com:CVE-2020-6395 MISC:crbug.com:CVE-2020-6396 MISC:crbug.com:CVE-2020-6397 MISC:crbug.com:CVE-2020-6398 MISC:crbug.com:CVE-2020-6399 MISC:crbug.com:CVE-2020-6400 MISC:crbug.com:CVE-2020-6401 MISC:crbug.com:CVE-2020-6402 MISC:crbug.com:CVE-2020-6403 MISC:crbug.com:CVE-2020-6404 MISC:crbug.com:CVE-2020-6405 MISC:crbug.com:CVE-2020-6406 MISC:crbug.com:CVE-2020-6408 MISC:crbug.com:CVE-2020-6409 MISC:crbug.com:CVE-2020-6410 MISC:crbug.com:CVE-2020-6411 MISC:crbug.com:CVE-2020-6412 MISC:crbug.com:CVE-2020-6413 MISC:crbug.com:CVE-2020-6414 MISC:crbug.com:CVE-2020-6415 MISC:crbug.com:CVE-2020-6416 MISC:crbug.com:CVE-2020-6417 MISC:github.com:CVE-2019-19880 MISC:github.com:CVE-2019-19923 MISC:github.com:CVE-2019-19926 MISC:packetstormsecurity.com:CVE-2020-6388 MISC:packetstormsecurity.com:CVE-2020-6390 MISC:www.oracle.com:CVE-2019-2880 Oracle:CVE-2019-18197 RH:CVE-2019-19880 RH:CVE-2019-19923 RH:CVE-2019-19926 RH:CVE-2020-6381 RH:CVE-2020-6382 RH:CVE-2020-6385 RH:CVE-2020-6387 RH:CVE-2020-6388 RH:CVE-2020-6389 RH:CVE-2020-6390 RH:CVE-2020-6391 RH:CVE-2020-6392 RH:CVE-2020-6393 RH:CVE-2020-6394 RH:CVE-2020-6395 RH:CVE-2020-6396 RH:CVE-2020-6397 RH:CVE-2020-6398 RH:CVE-2020-6399 RH:CVE-2020-6400 RH:CVE-2020-6401 RH:CVE-2020-6402 RH:CVE-2020-6403 RH:CVE-2020-6404 RH:CVE-2020-6405 RH:CVE-2020-6406 RH:CVE-2020-6408 RH:CVE-2020-6409 RH:CVE-2020-6410 RH:CVE-2020-6411 RH:CVE-2020-6412 RH:CVE-2020-6413 RH:CVE-2020-6414 RH:CVE-2020-6415 RH:CVE-2020-6416 RH:CVE-2020-6417 RHSA-2020:0514 RHSA-2020:1810 RHSA-2020:4442 SMASH Issue 252466 SUSE:openSUSE-SU-2020:0189 SUSE:openSUSE-SU-2020:0210 SUSE:openSUSE-SU-2020:0233 UBUNTU:CVE-2019-19880 UBUNTU:CVE-2019-19923 UBUNTU:CVE-2019-19926 UBUNTU:CVE-2020-6381 UBUNTU:CVE-2020-6382 UBUNTU:CVE-2020-6385 UBUNTU:CVE-2020-6387 UBUNTU:CVE-2020-6388 UBUNTU:CVE-2020-6389 UBUNTU:CVE-2020-6390 UBUNTU:CVE-2020-6391 UBUNTU:CVE-2020-6392 UBUNTU:CVE-2020-6393 UBUNTU:CVE-2020-6394 UBUNTU:CVE-2020-6395 UBUNTU:CVE-2020-6396 UBUNTU:CVE-2020-6397 UBUNTU:CVE-2020-6398 UBUNTU:CVE-2020-6399 UBUNTU:CVE-2020-6400 UBUNTU:CVE-2020-6401 UBUNTU:CVE-2020-6402 UBUNTU:CVE-2020-6403 UBUNTU:CVE-2020-6404 UBUNTU:CVE-2020-6405 UBUNTU:CVE-2020-6406 UBUNTU:CVE-2020-6408 UBUNTU:CVE-2020-6409 UBUNTU:CVE-2020-6410 UBUNTU:CVE-2020-6411 UBUNTU:CVE-2020-6412 UBUNTU:CVE-2020-6413 UBUNTU:CVE-2020-6414 UBUNTU:CVE-2020-6415 UBUNTU:CVE-2020-6416 UBUNTU:CVE-2020-6417 USN-4298-1 USN-4298-2 bnc#1162833 rh#1770768 rh#1787032 rh#1788846 rh#1789364 rh#1801160 rh#1801161 rh#1801162 rh#1801163 rh#1801164 rh#1801165 rh#1801166 rh#1801167 rh#1801168 rh#1801169 rh#1801170 rh#1801171 rh#1801172 rh#1801173 rh#1801174 rh#1801175 rh#1801176 rh#1801177 rh#1801178 rh#1801179 rh#1801180 rh#1801181 rh#1801182 rh#1801184 rh#1801185 rh#1801186 rh#1801187 rh#1801188 rh#1801189 rh#1801190 rh#1801191 rh#1801192 rh#1801193 |
CVE-2020-6401 | sqlite3:Released | important | () | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2019-19880 CONFIRM:security.netapp.com:CVE-2019-19923 CVE-2019-19880 CVE-2019-19923 CVE-2019-19926 CVE-2020-6381 CVE-2020-6382 CVE-2020-6385 CVE-2020-6387 CVE-2020-6388 CVE-2020-6389 CVE-2020-6390 CVE-2020-6391 CVE-2020-6392 CVE-2020-6393 CVE-2020-6394 CVE-2020-6395 CVE-2020-6396 CVE-2020-6397 CVE-2020-6398 CVE-2020-6399 CVE-2020-6400 CVE-2020-6401 CVE-2020-6402 CVE-2020-6403 CVE-2020-6404 CVE-2020-6405 CVE-2020-6406 CVE-2020-6408 CVE-2020-6409 CVE-2020-6410 CVE-2020-6411 CVE-2020-6412 CVE-2020-6413 CVE-2020-6414 CVE-2020-6415 CVE-2020-6416 CVE-2020-6417 D:CVE-2020-6391 DSA-4638 FEDORA:FEDORA-2020-39e0b8bd14 FEDORA:FEDORA-2020-f6271d7afa GLSA-202003-08 MISC:chromereleases.googleblog.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6382 MISC:crbug.com:CVE-2020-6385 MISC:crbug.com:CVE-2020-6387 MISC:crbug.com:CVE-2020-6388 MISC:crbug.com:CVE-2020-6389 MISC:crbug.com:CVE-2020-6390 MISC:crbug.com:CVE-2020-6391 MISC:crbug.com:CVE-2020-6392 MISC:crbug.com:CVE-2020-6393 MISC:crbug.com:CVE-2020-6394 MISC:crbug.com:CVE-2020-6395 MISC:crbug.com:CVE-2020-6396 MISC:crbug.com:CVE-2020-6397 MISC:crbug.com:CVE-2020-6398 MISC:crbug.com:CVE-2020-6399 MISC:crbug.com:CVE-2020-6400 MISC:crbug.com:CVE-2020-6401 MISC:crbug.com:CVE-2020-6402 MISC:crbug.com:CVE-2020-6403 MISC:crbug.com:CVE-2020-6404 MISC:crbug.com:CVE-2020-6405 MISC:crbug.com:CVE-2020-6406 MISC:crbug.com:CVE-2020-6408 MISC:crbug.com:CVE-2020-6409 MISC:crbug.com:CVE-2020-6410 MISC:crbug.com:CVE-2020-6411 MISC:crbug.com:CVE-2020-6412 MISC:crbug.com:CVE-2020-6413 MISC:crbug.com:CVE-2020-6414 MISC:crbug.com:CVE-2020-6415 MISC:crbug.com:CVE-2020-6416 MISC:crbug.com:CVE-2020-6417 MISC:github.com:CVE-2019-19880 MISC:github.com:CVE-2019-19923 MISC:github.com:CVE-2019-19926 MISC:packetstormsecurity.com:CVE-2020-6388 MISC:packetstormsecurity.com:CVE-2020-6390 MISC:www.oracle.com:CVE-2019-2880 Oracle:CVE-2019-18197 RH:CVE-2019-19880 RH:CVE-2019-19923 RH:CVE-2019-19926 RH:CVE-2020-6381 RH:CVE-2020-6382 RH:CVE-2020-6385 RH:CVE-2020-6387 RH:CVE-2020-6388 RH:CVE-2020-6389 RH:CVE-2020-6390 RH:CVE-2020-6391 RH:CVE-2020-6392 RH:CVE-2020-6393 RH:CVE-2020-6394 RH:CVE-2020-6395 RH:CVE-2020-6396 RH:CVE-2020-6397 RH:CVE-2020-6398 RH:CVE-2020-6399 RH:CVE-2020-6400 RH:CVE-2020-6401 RH:CVE-2020-6402 RH:CVE-2020-6403 RH:CVE-2020-6404 RH:CVE-2020-6405 RH:CVE-2020-6406 RH:CVE-2020-6408 RH:CVE-2020-6409 RH:CVE-2020-6410 RH:CVE-2020-6411 RH:CVE-2020-6412 RH:CVE-2020-6413 RH:CVE-2020-6414 RH:CVE-2020-6415 RH:CVE-2020-6416 RH:CVE-2020-6417 RHSA-2020:0514 RHSA-2020:1810 RHSA-2020:4442 SMASH Issue 252466 SUSE:openSUSE-SU-2020:0189 SUSE:openSUSE-SU-2020:0210 SUSE:openSUSE-SU-2020:0233 UBUNTU:CVE-2019-19880 UBUNTU:CVE-2019-19923 UBUNTU:CVE-2019-19926 UBUNTU:CVE-2020-6381 UBUNTU:CVE-2020-6382 UBUNTU:CVE-2020-6385 UBUNTU:CVE-2020-6387 UBUNTU:CVE-2020-6388 UBUNTU:CVE-2020-6389 UBUNTU:CVE-2020-6390 UBUNTU:CVE-2020-6391 UBUNTU:CVE-2020-6392 UBUNTU:CVE-2020-6393 UBUNTU:CVE-2020-6394 UBUNTU:CVE-2020-6395 UBUNTU:CVE-2020-6396 UBUNTU:CVE-2020-6397 UBUNTU:CVE-2020-6398 UBUNTU:CVE-2020-6399 UBUNTU:CVE-2020-6400 UBUNTU:CVE-2020-6401 UBUNTU:CVE-2020-6402 UBUNTU:CVE-2020-6403 UBUNTU:CVE-2020-6404 UBUNTU:CVE-2020-6405 UBUNTU:CVE-2020-6406 UBUNTU:CVE-2020-6408 UBUNTU:CVE-2020-6409 UBUNTU:CVE-2020-6410 UBUNTU:CVE-2020-6411 UBUNTU:CVE-2020-6412 UBUNTU:CVE-2020-6413 UBUNTU:CVE-2020-6414 UBUNTU:CVE-2020-6415 UBUNTU:CVE-2020-6416 UBUNTU:CVE-2020-6417 USN-4298-1 USN-4298-2 bnc#1162833 rh#1770768 rh#1787032 rh#1788846 rh#1789364 rh#1801160 rh#1801161 rh#1801162 rh#1801163 rh#1801164 rh#1801165 rh#1801166 rh#1801167 rh#1801168 rh#1801169 rh#1801170 rh#1801171 rh#1801172 rh#1801173 rh#1801174 rh#1801175 rh#1801176 rh#1801177 rh#1801178 rh#1801179 rh#1801180 rh#1801181 rh#1801182 rh#1801184 rh#1801185 rh#1801186 rh#1801187 rh#1801188 rh#1801189 rh#1801190 rh#1801191 rh#1801192 rh#1801193 |
CVE-2020-6402 | sqlite3:Released | important | () | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2019-19880 CONFIRM:security.netapp.com:CVE-2019-19923 CVE-2019-19880 CVE-2019-19923 CVE-2019-19926 CVE-2020-6381 CVE-2020-6382 CVE-2020-6385 CVE-2020-6387 CVE-2020-6388 CVE-2020-6389 CVE-2020-6390 CVE-2020-6391 CVE-2020-6392 CVE-2020-6393 CVE-2020-6394 CVE-2020-6395 CVE-2020-6396 CVE-2020-6397 CVE-2020-6398 CVE-2020-6399 CVE-2020-6400 CVE-2020-6401 CVE-2020-6402 CVE-2020-6403 CVE-2020-6404 CVE-2020-6405 CVE-2020-6406 CVE-2020-6408 CVE-2020-6409 CVE-2020-6410 CVE-2020-6411 CVE-2020-6412 CVE-2020-6413 CVE-2020-6414 CVE-2020-6415 CVE-2020-6416 CVE-2020-6417 D:CVE-2020-6391 DSA-4638 FEDORA:FEDORA-2020-39e0b8bd14 FEDORA:FEDORA-2020-f6271d7afa GLSA-202003-08 MISC:chromereleases.googleblog.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6382 MISC:crbug.com:CVE-2020-6385 MISC:crbug.com:CVE-2020-6387 MISC:crbug.com:CVE-2020-6388 MISC:crbug.com:CVE-2020-6389 MISC:crbug.com:CVE-2020-6390 MISC:crbug.com:CVE-2020-6391 MISC:crbug.com:CVE-2020-6392 MISC:crbug.com:CVE-2020-6393 MISC:crbug.com:CVE-2020-6394 MISC:crbug.com:CVE-2020-6395 MISC:crbug.com:CVE-2020-6396 MISC:crbug.com:CVE-2020-6397 MISC:crbug.com:CVE-2020-6398 MISC:crbug.com:CVE-2020-6399 MISC:crbug.com:CVE-2020-6400 MISC:crbug.com:CVE-2020-6401 MISC:crbug.com:CVE-2020-6402 MISC:crbug.com:CVE-2020-6403 MISC:crbug.com:CVE-2020-6404 MISC:crbug.com:CVE-2020-6405 MISC:crbug.com:CVE-2020-6406 MISC:crbug.com:CVE-2020-6408 MISC:crbug.com:CVE-2020-6409 MISC:crbug.com:CVE-2020-6410 MISC:crbug.com:CVE-2020-6411 MISC:crbug.com:CVE-2020-6412 MISC:crbug.com:CVE-2020-6413 MISC:crbug.com:CVE-2020-6414 MISC:crbug.com:CVE-2020-6415 MISC:crbug.com:CVE-2020-6416 MISC:crbug.com:CVE-2020-6417 MISC:github.com:CVE-2019-19880 MISC:github.com:CVE-2019-19923 MISC:github.com:CVE-2019-19926 MISC:packetstormsecurity.com:CVE-2020-6388 MISC:packetstormsecurity.com:CVE-2020-6390 MISC:www.oracle.com:CVE-2019-2880 Oracle:CVE-2019-18197 RH:CVE-2019-19880 RH:CVE-2019-19923 RH:CVE-2019-19926 RH:CVE-2020-6381 RH:CVE-2020-6382 RH:CVE-2020-6385 RH:CVE-2020-6387 RH:CVE-2020-6388 RH:CVE-2020-6389 RH:CVE-2020-6390 RH:CVE-2020-6391 RH:CVE-2020-6392 RH:CVE-2020-6393 RH:CVE-2020-6394 RH:CVE-2020-6395 RH:CVE-2020-6396 RH:CVE-2020-6397 RH:CVE-2020-6398 RH:CVE-2020-6399 RH:CVE-2020-6400 RH:CVE-2020-6401 RH:CVE-2020-6402 RH:CVE-2020-6403 RH:CVE-2020-6404 RH:CVE-2020-6405 RH:CVE-2020-6406 RH:CVE-2020-6408 RH:CVE-2020-6409 RH:CVE-2020-6410 RH:CVE-2020-6411 RH:CVE-2020-6412 RH:CVE-2020-6413 RH:CVE-2020-6414 RH:CVE-2020-6415 RH:CVE-2020-6416 RH:CVE-2020-6417 RHSA-2020:0514 RHSA-2020:1810 RHSA-2020:4442 SMASH Issue 252466 SUSE:openSUSE-SU-2020:0189 SUSE:openSUSE-SU-2020:0210 SUSE:openSUSE-SU-2020:0233 UBUNTU:CVE-2019-19880 UBUNTU:CVE-2019-19923 UBUNTU:CVE-2019-19926 UBUNTU:CVE-2020-6381 UBUNTU:CVE-2020-6382 UBUNTU:CVE-2020-6385 UBUNTU:CVE-2020-6387 UBUNTU:CVE-2020-6388 UBUNTU:CVE-2020-6389 UBUNTU:CVE-2020-6390 UBUNTU:CVE-2020-6391 UBUNTU:CVE-2020-6392 UBUNTU:CVE-2020-6393 UBUNTU:CVE-2020-6394 UBUNTU:CVE-2020-6395 UBUNTU:CVE-2020-6396 UBUNTU:CVE-2020-6397 UBUNTU:CVE-2020-6398 UBUNTU:CVE-2020-6399 UBUNTU:CVE-2020-6400 UBUNTU:CVE-2020-6401 UBUNTU:CVE-2020-6402 UBUNTU:CVE-2020-6403 UBUNTU:CVE-2020-6404 UBUNTU:CVE-2020-6405 UBUNTU:CVE-2020-6406 UBUNTU:CVE-2020-6408 UBUNTU:CVE-2020-6409 UBUNTU:CVE-2020-6410 UBUNTU:CVE-2020-6411 UBUNTU:CVE-2020-6412 UBUNTU:CVE-2020-6413 UBUNTU:CVE-2020-6414 UBUNTU:CVE-2020-6415 UBUNTU:CVE-2020-6416 UBUNTU:CVE-2020-6417 USN-4298-1 USN-4298-2 bnc#1162833 rh#1770768 rh#1787032 rh#1788846 rh#1789364 rh#1801160 rh#1801161 rh#1801162 rh#1801163 rh#1801164 rh#1801165 rh#1801166 rh#1801167 rh#1801168 rh#1801169 rh#1801170 rh#1801171 rh#1801172 rh#1801173 rh#1801174 rh#1801175 rh#1801176 rh#1801177 rh#1801178 rh#1801179 rh#1801180 rh#1801181 rh#1801182 rh#1801184 rh#1801185 rh#1801186 rh#1801187 rh#1801188 rh#1801189 rh#1801190 rh#1801191 rh#1801192 rh#1801193 |
CVE-2020-6403 | sqlite3:Released | important | () | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2019-19880 CONFIRM:security.netapp.com:CVE-2019-19923 CVE-2019-19880 CVE-2019-19923 CVE-2019-19926 CVE-2020-6381 CVE-2020-6382 CVE-2020-6385 CVE-2020-6387 CVE-2020-6388 CVE-2020-6389 CVE-2020-6390 CVE-2020-6391 CVE-2020-6392 CVE-2020-6393 CVE-2020-6394 CVE-2020-6395 CVE-2020-6396 CVE-2020-6397 CVE-2020-6398 CVE-2020-6399 CVE-2020-6400 CVE-2020-6401 CVE-2020-6402 CVE-2020-6403 CVE-2020-6404 CVE-2020-6405 CVE-2020-6406 CVE-2020-6408 CVE-2020-6409 CVE-2020-6410 CVE-2020-6411 CVE-2020-6412 CVE-2020-6413 CVE-2020-6414 CVE-2020-6415 CVE-2020-6416 CVE-2020-6417 D:CVE-2020-6391 DSA-4638 FEDORA:FEDORA-2020-39e0b8bd14 FEDORA:FEDORA-2020-f6271d7afa GLSA-202003-08 MISC:chromereleases.googleblog.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6382 MISC:crbug.com:CVE-2020-6385 MISC:crbug.com:CVE-2020-6387 MISC:crbug.com:CVE-2020-6388 MISC:crbug.com:CVE-2020-6389 MISC:crbug.com:CVE-2020-6390 MISC:crbug.com:CVE-2020-6391 MISC:crbug.com:CVE-2020-6392 MISC:crbug.com:CVE-2020-6393 MISC:crbug.com:CVE-2020-6394 MISC:crbug.com:CVE-2020-6395 MISC:crbug.com:CVE-2020-6396 MISC:crbug.com:CVE-2020-6397 MISC:crbug.com:CVE-2020-6398 MISC:crbug.com:CVE-2020-6399 MISC:crbug.com:CVE-2020-6400 MISC:crbug.com:CVE-2020-6401 MISC:crbug.com:CVE-2020-6402 MISC:crbug.com:CVE-2020-6403 MISC:crbug.com:CVE-2020-6404 MISC:crbug.com:CVE-2020-6405 MISC:crbug.com:CVE-2020-6406 MISC:crbug.com:CVE-2020-6408 MISC:crbug.com:CVE-2020-6409 MISC:crbug.com:CVE-2020-6410 MISC:crbug.com:CVE-2020-6411 MISC:crbug.com:CVE-2020-6412 MISC:crbug.com:CVE-2020-6413 MISC:crbug.com:CVE-2020-6414 MISC:crbug.com:CVE-2020-6415 MISC:crbug.com:CVE-2020-6416 MISC:crbug.com:CVE-2020-6417 MISC:github.com:CVE-2019-19880 MISC:github.com:CVE-2019-19923 MISC:github.com:CVE-2019-19926 MISC:packetstormsecurity.com:CVE-2020-6388 MISC:packetstormsecurity.com:CVE-2020-6390 MISC:www.oracle.com:CVE-2019-2880 Oracle:CVE-2019-18197 RH:CVE-2019-19880 RH:CVE-2019-19923 RH:CVE-2019-19926 RH:CVE-2020-6381 RH:CVE-2020-6382 RH:CVE-2020-6385 RH:CVE-2020-6387 RH:CVE-2020-6388 RH:CVE-2020-6389 RH:CVE-2020-6390 RH:CVE-2020-6391 RH:CVE-2020-6392 RH:CVE-2020-6393 RH:CVE-2020-6394 RH:CVE-2020-6395 RH:CVE-2020-6396 RH:CVE-2020-6397 RH:CVE-2020-6398 RH:CVE-2020-6399 RH:CVE-2020-6400 RH:CVE-2020-6401 RH:CVE-2020-6402 RH:CVE-2020-6403 RH:CVE-2020-6404 RH:CVE-2020-6405 RH:CVE-2020-6406 RH:CVE-2020-6408 RH:CVE-2020-6409 RH:CVE-2020-6410 RH:CVE-2020-6411 RH:CVE-2020-6412 RH:CVE-2020-6413 RH:CVE-2020-6414 RH:CVE-2020-6415 RH:CVE-2020-6416 RH:CVE-2020-6417 RHSA-2020:0514 RHSA-2020:1810 RHSA-2020:4442 SMASH Issue 252466 SUSE:openSUSE-SU-2020:0189 SUSE:openSUSE-SU-2020:0210 SUSE:openSUSE-SU-2020:0233 UBUNTU:CVE-2019-19880 UBUNTU:CVE-2019-19923 UBUNTU:CVE-2019-19926 UBUNTU:CVE-2020-6381 UBUNTU:CVE-2020-6382 UBUNTU:CVE-2020-6385 UBUNTU:CVE-2020-6387 UBUNTU:CVE-2020-6388 UBUNTU:CVE-2020-6389 UBUNTU:CVE-2020-6390 UBUNTU:CVE-2020-6391 UBUNTU:CVE-2020-6392 UBUNTU:CVE-2020-6393 UBUNTU:CVE-2020-6394 UBUNTU:CVE-2020-6395 UBUNTU:CVE-2020-6396 UBUNTU:CVE-2020-6397 UBUNTU:CVE-2020-6398 UBUNTU:CVE-2020-6399 UBUNTU:CVE-2020-6400 UBUNTU:CVE-2020-6401 UBUNTU:CVE-2020-6402 UBUNTU:CVE-2020-6403 UBUNTU:CVE-2020-6404 UBUNTU:CVE-2020-6405 UBUNTU:CVE-2020-6406 UBUNTU:CVE-2020-6408 UBUNTU:CVE-2020-6409 UBUNTU:CVE-2020-6410 UBUNTU:CVE-2020-6411 UBUNTU:CVE-2020-6412 UBUNTU:CVE-2020-6413 UBUNTU:CVE-2020-6414 UBUNTU:CVE-2020-6415 UBUNTU:CVE-2020-6416 UBUNTU:CVE-2020-6417 USN-4298-1 USN-4298-2 bnc#1162833 rh#1770768 rh#1787032 rh#1788846 rh#1789364 rh#1801160 rh#1801161 rh#1801162 rh#1801163 rh#1801164 rh#1801165 rh#1801166 rh#1801167 rh#1801168 rh#1801169 rh#1801170 rh#1801171 rh#1801172 rh#1801173 rh#1801174 rh#1801175 rh#1801176 rh#1801177 rh#1801178 rh#1801179 rh#1801180 rh#1801181 rh#1801182 rh#1801184 rh#1801185 rh#1801186 rh#1801187 rh#1801188 rh#1801189 rh#1801190 rh#1801191 rh#1801192 rh#1801193 |
CVE-2020-6404 | sqlite3:Released | important | () | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2019-19880 CONFIRM:security.netapp.com:CVE-2019-19923 CVE-2019-19880 CVE-2019-19923 CVE-2019-19926 CVE-2020-6381 CVE-2020-6382 CVE-2020-6385 CVE-2020-6387 CVE-2020-6388 CVE-2020-6389 CVE-2020-6390 CVE-2020-6391 CVE-2020-6392 CVE-2020-6393 CVE-2020-6394 CVE-2020-6395 CVE-2020-6396 CVE-2020-6397 CVE-2020-6398 CVE-2020-6399 CVE-2020-6400 CVE-2020-6401 CVE-2020-6402 CVE-2020-6403 CVE-2020-6404 CVE-2020-6405 CVE-2020-6406 CVE-2020-6408 CVE-2020-6409 CVE-2020-6410 CVE-2020-6411 CVE-2020-6412 CVE-2020-6413 CVE-2020-6414 CVE-2020-6415 CVE-2020-6416 CVE-2020-6417 D:CVE-2020-6391 DSA-4638 FEDORA:FEDORA-2020-39e0b8bd14 FEDORA:FEDORA-2020-f6271d7afa GLSA-202003-08 MISC:chromereleases.googleblog.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6382 MISC:crbug.com:CVE-2020-6385 MISC:crbug.com:CVE-2020-6387 MISC:crbug.com:CVE-2020-6388 MISC:crbug.com:CVE-2020-6389 MISC:crbug.com:CVE-2020-6390 MISC:crbug.com:CVE-2020-6391 MISC:crbug.com:CVE-2020-6392 MISC:crbug.com:CVE-2020-6393 MISC:crbug.com:CVE-2020-6394 MISC:crbug.com:CVE-2020-6395 MISC:crbug.com:CVE-2020-6396 MISC:crbug.com:CVE-2020-6397 MISC:crbug.com:CVE-2020-6398 MISC:crbug.com:CVE-2020-6399 MISC:crbug.com:CVE-2020-6400 MISC:crbug.com:CVE-2020-6401 MISC:crbug.com:CVE-2020-6402 MISC:crbug.com:CVE-2020-6403 MISC:crbug.com:CVE-2020-6404 MISC:crbug.com:CVE-2020-6405 MISC:crbug.com:CVE-2020-6406 MISC:crbug.com:CVE-2020-6408 MISC:crbug.com:CVE-2020-6409 MISC:crbug.com:CVE-2020-6410 MISC:crbug.com:CVE-2020-6411 MISC:crbug.com:CVE-2020-6412 MISC:crbug.com:CVE-2020-6413 MISC:crbug.com:CVE-2020-6414 MISC:crbug.com:CVE-2020-6415 MISC:crbug.com:CVE-2020-6416 MISC:crbug.com:CVE-2020-6417 MISC:github.com:CVE-2019-19880 MISC:github.com:CVE-2019-19923 MISC:github.com:CVE-2019-19926 MISC:packetstormsecurity.com:CVE-2020-6388 MISC:packetstormsecurity.com:CVE-2020-6390 MISC:www.oracle.com:CVE-2019-2880 Oracle:CVE-2019-18197 RH:CVE-2019-19880 RH:CVE-2019-19923 RH:CVE-2019-19926 RH:CVE-2020-6381 RH:CVE-2020-6382 RH:CVE-2020-6385 RH:CVE-2020-6387 RH:CVE-2020-6388 RH:CVE-2020-6389 RH:CVE-2020-6390 RH:CVE-2020-6391 RH:CVE-2020-6392 RH:CVE-2020-6393 RH:CVE-2020-6394 RH:CVE-2020-6395 RH:CVE-2020-6396 RH:CVE-2020-6397 RH:CVE-2020-6398 RH:CVE-2020-6399 RH:CVE-2020-6400 RH:CVE-2020-6401 RH:CVE-2020-6402 RH:CVE-2020-6403 RH:CVE-2020-6404 RH:CVE-2020-6405 RH:CVE-2020-6406 RH:CVE-2020-6408 RH:CVE-2020-6409 RH:CVE-2020-6410 RH:CVE-2020-6411 RH:CVE-2020-6412 RH:CVE-2020-6413 RH:CVE-2020-6414 RH:CVE-2020-6415 RH:CVE-2020-6416 RH:CVE-2020-6417 RHSA-2020:0514 RHSA-2020:1810 RHSA-2020:4442 SMASH Issue 252466 SUSE:openSUSE-SU-2020:0189 SUSE:openSUSE-SU-2020:0210 SUSE:openSUSE-SU-2020:0233 UBUNTU:CVE-2019-19880 UBUNTU:CVE-2019-19923 UBUNTU:CVE-2019-19926 UBUNTU:CVE-2020-6381 UBUNTU:CVE-2020-6382 UBUNTU:CVE-2020-6385 UBUNTU:CVE-2020-6387 UBUNTU:CVE-2020-6388 UBUNTU:CVE-2020-6389 UBUNTU:CVE-2020-6390 UBUNTU:CVE-2020-6391 UBUNTU:CVE-2020-6392 UBUNTU:CVE-2020-6393 UBUNTU:CVE-2020-6394 UBUNTU:CVE-2020-6395 UBUNTU:CVE-2020-6396 UBUNTU:CVE-2020-6397 UBUNTU:CVE-2020-6398 UBUNTU:CVE-2020-6399 UBUNTU:CVE-2020-6400 UBUNTU:CVE-2020-6401 UBUNTU:CVE-2020-6402 UBUNTU:CVE-2020-6403 UBUNTU:CVE-2020-6404 UBUNTU:CVE-2020-6405 UBUNTU:CVE-2020-6406 UBUNTU:CVE-2020-6408 UBUNTU:CVE-2020-6409 UBUNTU:CVE-2020-6410 UBUNTU:CVE-2020-6411 UBUNTU:CVE-2020-6412 UBUNTU:CVE-2020-6413 UBUNTU:CVE-2020-6414 UBUNTU:CVE-2020-6415 UBUNTU:CVE-2020-6416 UBUNTU:CVE-2020-6417 USN-4298-1 USN-4298-2 bnc#1162833 rh#1770768 rh#1787032 rh#1788846 rh#1789364 rh#1801160 rh#1801161 rh#1801162 rh#1801163 rh#1801164 rh#1801165 rh#1801166 rh#1801167 rh#1801168 rh#1801169 rh#1801170 rh#1801171 rh#1801172 rh#1801173 rh#1801174 rh#1801175 rh#1801176 rh#1801177 rh#1801178 rh#1801179 rh#1801180 rh#1801181 rh#1801182 rh#1801184 rh#1801185 rh#1801186 rh#1801187 rh#1801188 rh#1801189 rh#1801190 rh#1801191 rh#1801192 rh#1801193 |
CVE-2020-6405 | sqlite3:Released | important | () | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2019-19880 CONFIRM:security.netapp.com:CVE-2019-19923 CVE-2019-19880 CVE-2019-19923 CVE-2019-19926 CVE-2020-6381 CVE-2020-6382 CVE-2020-6385 CVE-2020-6387 CVE-2020-6388 CVE-2020-6389 CVE-2020-6390 CVE-2020-6391 CVE-2020-6392 CVE-2020-6393 CVE-2020-6394 CVE-2020-6395 CVE-2020-6396 CVE-2020-6397 CVE-2020-6398 CVE-2020-6399 CVE-2020-6400 CVE-2020-6401 CVE-2020-6402 CVE-2020-6403 CVE-2020-6404 CVE-2020-6405 CVE-2020-6406 CVE-2020-6408 CVE-2020-6409 CVE-2020-6410 CVE-2020-6411 CVE-2020-6412 CVE-2020-6413 CVE-2020-6414 CVE-2020-6415 CVE-2020-6416 CVE-2020-6417 D:CVE-2020-6391 DSA-4638 FEDORA:FEDORA-2020-39e0b8bd14 FEDORA:FEDORA-2020-f6271d7afa GLSA-202003-08 MISC:chromereleases.googleblog.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6382 MISC:crbug.com:CVE-2020-6385 MISC:crbug.com:CVE-2020-6387 MISC:crbug.com:CVE-2020-6388 MISC:crbug.com:CVE-2020-6389 MISC:crbug.com:CVE-2020-6390 MISC:crbug.com:CVE-2020-6391 MISC:crbug.com:CVE-2020-6392 MISC:crbug.com:CVE-2020-6393 MISC:crbug.com:CVE-2020-6394 MISC:crbug.com:CVE-2020-6395 MISC:crbug.com:CVE-2020-6396 MISC:crbug.com:CVE-2020-6397 MISC:crbug.com:CVE-2020-6398 MISC:crbug.com:CVE-2020-6399 MISC:crbug.com:CVE-2020-6400 MISC:crbug.com:CVE-2020-6401 MISC:crbug.com:CVE-2020-6402 MISC:crbug.com:CVE-2020-6403 MISC:crbug.com:CVE-2020-6404 MISC:crbug.com:CVE-2020-6405 MISC:crbug.com:CVE-2020-6406 MISC:crbug.com:CVE-2020-6408 MISC:crbug.com:CVE-2020-6409 MISC:crbug.com:CVE-2020-6410 MISC:crbug.com:CVE-2020-6411 MISC:crbug.com:CVE-2020-6412 MISC:crbug.com:CVE-2020-6413 MISC:crbug.com:CVE-2020-6414 MISC:crbug.com:CVE-2020-6415 MISC:crbug.com:CVE-2020-6416 MISC:crbug.com:CVE-2020-6417 MISC:github.com:CVE-2019-19880 MISC:github.com:CVE-2019-19923 MISC:github.com:CVE-2019-19926 MISC:packetstormsecurity.com:CVE-2020-6388 MISC:packetstormsecurity.com:CVE-2020-6390 MISC:www.oracle.com:CVE-2019-2880 Oracle:CVE-2019-18197 RH:CVE-2019-19880 RH:CVE-2019-19923 RH:CVE-2019-19926 RH:CVE-2020-6381 RH:CVE-2020-6382 RH:CVE-2020-6385 RH:CVE-2020-6387 RH:CVE-2020-6388 RH:CVE-2020-6389 RH:CVE-2020-6390 RH:CVE-2020-6391 RH:CVE-2020-6392 RH:CVE-2020-6393 RH:CVE-2020-6394 RH:CVE-2020-6395 RH:CVE-2020-6396 RH:CVE-2020-6397 RH:CVE-2020-6398 RH:CVE-2020-6399 RH:CVE-2020-6400 RH:CVE-2020-6401 RH:CVE-2020-6402 RH:CVE-2020-6403 RH:CVE-2020-6404 RH:CVE-2020-6405 RH:CVE-2020-6406 RH:CVE-2020-6408 RH:CVE-2020-6409 RH:CVE-2020-6410 RH:CVE-2020-6411 RH:CVE-2020-6412 RH:CVE-2020-6413 RH:CVE-2020-6414 RH:CVE-2020-6415 RH:CVE-2020-6416 RH:CVE-2020-6417 RHSA-2020:0514 RHSA-2020:1810 RHSA-2020:4442 SMASH Issue 252466 SUSE:openSUSE-SU-2020:0189 SUSE:openSUSE-SU-2020:0210 SUSE:openSUSE-SU-2020:0233 UBUNTU:CVE-2019-19880 UBUNTU:CVE-2019-19923 UBUNTU:CVE-2019-19926 UBUNTU:CVE-2020-6381 UBUNTU:CVE-2020-6382 UBUNTU:CVE-2020-6385 UBUNTU:CVE-2020-6387 UBUNTU:CVE-2020-6388 UBUNTU:CVE-2020-6389 UBUNTU:CVE-2020-6390 UBUNTU:CVE-2020-6391 UBUNTU:CVE-2020-6392 UBUNTU:CVE-2020-6393 UBUNTU:CVE-2020-6394 UBUNTU:CVE-2020-6395 UBUNTU:CVE-2020-6396 UBUNTU:CVE-2020-6397 UBUNTU:CVE-2020-6398 UBUNTU:CVE-2020-6399 UBUNTU:CVE-2020-6400 UBUNTU:CVE-2020-6401 UBUNTU:CVE-2020-6402 UBUNTU:CVE-2020-6403 UBUNTU:CVE-2020-6404 UBUNTU:CVE-2020-6405 UBUNTU:CVE-2020-6406 UBUNTU:CVE-2020-6408 UBUNTU:CVE-2020-6409 UBUNTU:CVE-2020-6410 UBUNTU:CVE-2020-6411 UBUNTU:CVE-2020-6412 UBUNTU:CVE-2020-6413 UBUNTU:CVE-2020-6414 UBUNTU:CVE-2020-6415 UBUNTU:CVE-2020-6416 UBUNTU:CVE-2020-6417 USN-4298-1 USN-4298-2 bnc#1162833 rh#1770768 rh#1787032 rh#1788846 rh#1789364 rh#1801160 rh#1801161 rh#1801162 rh#1801163 rh#1801164 rh#1801165 rh#1801166 rh#1801167 rh#1801168 rh#1801169 rh#1801170 rh#1801171 rh#1801172 rh#1801173 rh#1801174 rh#1801175 rh#1801176 rh#1801177 rh#1801178 rh#1801179 rh#1801180 rh#1801181 rh#1801182 rh#1801184 rh#1801185 rh#1801186 rh#1801187 rh#1801188 rh#1801189 rh#1801190 rh#1801191 rh#1801192 rh#1801193 |
CVE-2020-6406 | sqlite3:Released | important | () | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2019-19880 CONFIRM:security.netapp.com:CVE-2019-19923 CVE-2019-19880 CVE-2019-19923 CVE-2019-19926 CVE-2020-6381 CVE-2020-6382 CVE-2020-6385 CVE-2020-6387 CVE-2020-6388 CVE-2020-6389 CVE-2020-6390 CVE-2020-6391 CVE-2020-6392 CVE-2020-6393 CVE-2020-6394 CVE-2020-6395 CVE-2020-6396 CVE-2020-6397 CVE-2020-6398 CVE-2020-6399 CVE-2020-6400 CVE-2020-6401 CVE-2020-6402 CVE-2020-6403 CVE-2020-6404 CVE-2020-6405 CVE-2020-6406 CVE-2020-6408 CVE-2020-6409 CVE-2020-6410 CVE-2020-6411 CVE-2020-6412 CVE-2020-6413 CVE-2020-6414 CVE-2020-6415 CVE-2020-6416 CVE-2020-6417 D:CVE-2020-6391 DSA-4638 FEDORA:FEDORA-2020-39e0b8bd14 FEDORA:FEDORA-2020-f6271d7afa GLSA-202003-08 MISC:chromereleases.googleblog.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6382 MISC:crbug.com:CVE-2020-6385 MISC:crbug.com:CVE-2020-6387 MISC:crbug.com:CVE-2020-6388 MISC:crbug.com:CVE-2020-6389 MISC:crbug.com:CVE-2020-6390 MISC:crbug.com:CVE-2020-6391 MISC:crbug.com:CVE-2020-6392 MISC:crbug.com:CVE-2020-6393 MISC:crbug.com:CVE-2020-6394 MISC:crbug.com:CVE-2020-6395 MISC:crbug.com:CVE-2020-6396 MISC:crbug.com:CVE-2020-6397 MISC:crbug.com:CVE-2020-6398 MISC:crbug.com:CVE-2020-6399 MISC:crbug.com:CVE-2020-6400 MISC:crbug.com:CVE-2020-6401 MISC:crbug.com:CVE-2020-6402 MISC:crbug.com:CVE-2020-6403 MISC:crbug.com:CVE-2020-6404 MISC:crbug.com:CVE-2020-6405 MISC:crbug.com:CVE-2020-6406 MISC:crbug.com:CVE-2020-6408 MISC:crbug.com:CVE-2020-6409 MISC:crbug.com:CVE-2020-6410 MISC:crbug.com:CVE-2020-6411 MISC:crbug.com:CVE-2020-6412 MISC:crbug.com:CVE-2020-6413 MISC:crbug.com:CVE-2020-6414 MISC:crbug.com:CVE-2020-6415 MISC:crbug.com:CVE-2020-6416 MISC:crbug.com:CVE-2020-6417 MISC:github.com:CVE-2019-19880 MISC:github.com:CVE-2019-19923 MISC:github.com:CVE-2019-19926 MISC:packetstormsecurity.com:CVE-2020-6388 MISC:packetstormsecurity.com:CVE-2020-6390 MISC:www.oracle.com:CVE-2019-2880 Oracle:CVE-2019-18197 RH:CVE-2019-19880 RH:CVE-2019-19923 RH:CVE-2019-19926 RH:CVE-2020-6381 RH:CVE-2020-6382 RH:CVE-2020-6385 RH:CVE-2020-6387 RH:CVE-2020-6388 RH:CVE-2020-6389 RH:CVE-2020-6390 RH:CVE-2020-6391 RH:CVE-2020-6392 RH:CVE-2020-6393 RH:CVE-2020-6394 RH:CVE-2020-6395 RH:CVE-2020-6396 RH:CVE-2020-6397 RH:CVE-2020-6398 RH:CVE-2020-6399 RH:CVE-2020-6400 RH:CVE-2020-6401 RH:CVE-2020-6402 RH:CVE-2020-6403 RH:CVE-2020-6404 RH:CVE-2020-6405 RH:CVE-2020-6406 RH:CVE-2020-6408 RH:CVE-2020-6409 RH:CVE-2020-6410 RH:CVE-2020-6411 RH:CVE-2020-6412 RH:CVE-2020-6413 RH:CVE-2020-6414 RH:CVE-2020-6415 RH:CVE-2020-6416 RH:CVE-2020-6417 RHSA-2020:0514 RHSA-2020:1810 RHSA-2020:4442 SMASH Issue 252466 SUSE:openSUSE-SU-2020:0189 SUSE:openSUSE-SU-2020:0210 SUSE:openSUSE-SU-2020:0233 UBUNTU:CVE-2019-19880 UBUNTU:CVE-2019-19923 UBUNTU:CVE-2019-19926 UBUNTU:CVE-2020-6381 UBUNTU:CVE-2020-6382 UBUNTU:CVE-2020-6385 UBUNTU:CVE-2020-6387 UBUNTU:CVE-2020-6388 UBUNTU:CVE-2020-6389 UBUNTU:CVE-2020-6390 UBUNTU:CVE-2020-6391 UBUNTU:CVE-2020-6392 UBUNTU:CVE-2020-6393 UBUNTU:CVE-2020-6394 UBUNTU:CVE-2020-6395 UBUNTU:CVE-2020-6396 UBUNTU:CVE-2020-6397 UBUNTU:CVE-2020-6398 UBUNTU:CVE-2020-6399 UBUNTU:CVE-2020-6400 UBUNTU:CVE-2020-6401 UBUNTU:CVE-2020-6402 UBUNTU:CVE-2020-6403 UBUNTU:CVE-2020-6404 UBUNTU:CVE-2020-6405 UBUNTU:CVE-2020-6406 UBUNTU:CVE-2020-6408 UBUNTU:CVE-2020-6409 UBUNTU:CVE-2020-6410 UBUNTU:CVE-2020-6411 UBUNTU:CVE-2020-6412 UBUNTU:CVE-2020-6413 UBUNTU:CVE-2020-6414 UBUNTU:CVE-2020-6415 UBUNTU:CVE-2020-6416 UBUNTU:CVE-2020-6417 USN-4298-1 USN-4298-2 bnc#1162833 rh#1770768 rh#1787032 rh#1788846 rh#1789364 rh#1801160 rh#1801161 rh#1801162 rh#1801163 rh#1801164 rh#1801165 rh#1801166 rh#1801167 rh#1801168 rh#1801169 rh#1801170 rh#1801171 rh#1801172 rh#1801173 rh#1801174 rh#1801175 rh#1801176 rh#1801177 rh#1801178 rh#1801179 rh#1801180 rh#1801181 rh#1801182 rh#1801184 rh#1801185 rh#1801186 rh#1801187 rh#1801188 rh#1801189 rh#1801190 rh#1801191 rh#1801192 rh#1801193 |
CVE-2020-6408 | sqlite3:Released | important | () | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2019-19880 CONFIRM:security.netapp.com:CVE-2019-19923 CVE-2019-19880 CVE-2019-19923 CVE-2019-19926 CVE-2020-6381 CVE-2020-6382 CVE-2020-6385 CVE-2020-6387 CVE-2020-6388 CVE-2020-6389 CVE-2020-6390 CVE-2020-6391 CVE-2020-6392 CVE-2020-6393 CVE-2020-6394 CVE-2020-6395 CVE-2020-6396 CVE-2020-6397 CVE-2020-6398 CVE-2020-6399 CVE-2020-6400 CVE-2020-6401 CVE-2020-6402 CVE-2020-6403 CVE-2020-6404 CVE-2020-6405 CVE-2020-6406 CVE-2020-6408 CVE-2020-6409 CVE-2020-6410 CVE-2020-6411 CVE-2020-6412 CVE-2020-6413 CVE-2020-6414 CVE-2020-6415 CVE-2020-6416 CVE-2020-6417 D:CVE-2020-6391 DSA-4638 FEDORA:FEDORA-2020-39e0b8bd14 FEDORA:FEDORA-2020-f6271d7afa GLSA-202003-08 MISC:chromereleases.googleblog.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6382 MISC:crbug.com:CVE-2020-6385 MISC:crbug.com:CVE-2020-6387 MISC:crbug.com:CVE-2020-6388 MISC:crbug.com:CVE-2020-6389 MISC:crbug.com:CVE-2020-6390 MISC:crbug.com:CVE-2020-6391 MISC:crbug.com:CVE-2020-6392 MISC:crbug.com:CVE-2020-6393 MISC:crbug.com:CVE-2020-6394 MISC:crbug.com:CVE-2020-6395 MISC:crbug.com:CVE-2020-6396 MISC:crbug.com:CVE-2020-6397 MISC:crbug.com:CVE-2020-6398 MISC:crbug.com:CVE-2020-6399 MISC:crbug.com:CVE-2020-6400 MISC:crbug.com:CVE-2020-6401 MISC:crbug.com:CVE-2020-6402 MISC:crbug.com:CVE-2020-6403 MISC:crbug.com:CVE-2020-6404 MISC:crbug.com:CVE-2020-6405 MISC:crbug.com:CVE-2020-6406 MISC:crbug.com:CVE-2020-6408 MISC:crbug.com:CVE-2020-6409 MISC:crbug.com:CVE-2020-6410 MISC:crbug.com:CVE-2020-6411 MISC:crbug.com:CVE-2020-6412 MISC:crbug.com:CVE-2020-6413 MISC:crbug.com:CVE-2020-6414 MISC:crbug.com:CVE-2020-6415 MISC:crbug.com:CVE-2020-6416 MISC:crbug.com:CVE-2020-6417 MISC:github.com:CVE-2019-19880 MISC:github.com:CVE-2019-19923 MISC:github.com:CVE-2019-19926 MISC:packetstormsecurity.com:CVE-2020-6388 MISC:packetstormsecurity.com:CVE-2020-6390 MISC:www.oracle.com:CVE-2019-2880 Oracle:CVE-2019-18197 RH:CVE-2019-19880 RH:CVE-2019-19923 RH:CVE-2019-19926 RH:CVE-2020-6381 RH:CVE-2020-6382 RH:CVE-2020-6385 RH:CVE-2020-6387 RH:CVE-2020-6388 RH:CVE-2020-6389 RH:CVE-2020-6390 RH:CVE-2020-6391 RH:CVE-2020-6392 RH:CVE-2020-6393 RH:CVE-2020-6394 RH:CVE-2020-6395 RH:CVE-2020-6396 RH:CVE-2020-6397 RH:CVE-2020-6398 RH:CVE-2020-6399 RH:CVE-2020-6400 RH:CVE-2020-6401 RH:CVE-2020-6402 RH:CVE-2020-6403 RH:CVE-2020-6404 RH:CVE-2020-6405 RH:CVE-2020-6406 RH:CVE-2020-6408 RH:CVE-2020-6409 RH:CVE-2020-6410 RH:CVE-2020-6411 RH:CVE-2020-6412 RH:CVE-2020-6413 RH:CVE-2020-6414 RH:CVE-2020-6415 RH:CVE-2020-6416 RH:CVE-2020-6417 RHSA-2020:0514 RHSA-2020:1810 RHSA-2020:4442 SMASH Issue 252466 SUSE:openSUSE-SU-2020:0189 SUSE:openSUSE-SU-2020:0210 SUSE:openSUSE-SU-2020:0233 UBUNTU:CVE-2019-19880 UBUNTU:CVE-2019-19923 UBUNTU:CVE-2019-19926 UBUNTU:CVE-2020-6381 UBUNTU:CVE-2020-6382 UBUNTU:CVE-2020-6385 UBUNTU:CVE-2020-6387 UBUNTU:CVE-2020-6388 UBUNTU:CVE-2020-6389 UBUNTU:CVE-2020-6390 UBUNTU:CVE-2020-6391 UBUNTU:CVE-2020-6392 UBUNTU:CVE-2020-6393 UBUNTU:CVE-2020-6394 UBUNTU:CVE-2020-6395 UBUNTU:CVE-2020-6396 UBUNTU:CVE-2020-6397 UBUNTU:CVE-2020-6398 UBUNTU:CVE-2020-6399 UBUNTU:CVE-2020-6400 UBUNTU:CVE-2020-6401 UBUNTU:CVE-2020-6402 UBUNTU:CVE-2020-6403 UBUNTU:CVE-2020-6404 UBUNTU:CVE-2020-6405 UBUNTU:CVE-2020-6406 UBUNTU:CVE-2020-6408 UBUNTU:CVE-2020-6409 UBUNTU:CVE-2020-6410 UBUNTU:CVE-2020-6411 UBUNTU:CVE-2020-6412 UBUNTU:CVE-2020-6413 UBUNTU:CVE-2020-6414 UBUNTU:CVE-2020-6415 UBUNTU:CVE-2020-6416 UBUNTU:CVE-2020-6417 USN-4298-1 USN-4298-2 bnc#1162833 rh#1770768 rh#1787032 rh#1788846 rh#1789364 rh#1801160 rh#1801161 rh#1801162 rh#1801163 rh#1801164 rh#1801165 rh#1801166 rh#1801167 rh#1801168 rh#1801169 rh#1801170 rh#1801171 rh#1801172 rh#1801173 rh#1801174 rh#1801175 rh#1801176 rh#1801177 rh#1801178 rh#1801179 rh#1801180 rh#1801181 rh#1801182 rh#1801184 rh#1801185 rh#1801186 rh#1801187 rh#1801188 rh#1801189 rh#1801190 rh#1801191 rh#1801192 rh#1801193 |
CVE-2020-6409 | sqlite3:Released | important | () | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2019-19880 CONFIRM:security.netapp.com:CVE-2019-19923 CVE-2019-19880 CVE-2019-19923 CVE-2019-19926 CVE-2020-6381 CVE-2020-6382 CVE-2020-6385 CVE-2020-6387 CVE-2020-6388 CVE-2020-6389 CVE-2020-6390 CVE-2020-6391 CVE-2020-6392 CVE-2020-6393 CVE-2020-6394 CVE-2020-6395 CVE-2020-6396 CVE-2020-6397 CVE-2020-6398 CVE-2020-6399 CVE-2020-6400 CVE-2020-6401 CVE-2020-6402 CVE-2020-6403 CVE-2020-6404 CVE-2020-6405 CVE-2020-6406 CVE-2020-6408 CVE-2020-6409 CVE-2020-6410 CVE-2020-6411 CVE-2020-6412 CVE-2020-6413 CVE-2020-6414 CVE-2020-6415 CVE-2020-6416 CVE-2020-6417 D:CVE-2020-6391 DSA-4638 FEDORA:FEDORA-2020-39e0b8bd14 FEDORA:FEDORA-2020-f6271d7afa GLSA-202003-08 MISC:chromereleases.googleblog.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6382 MISC:crbug.com:CVE-2020-6385 MISC:crbug.com:CVE-2020-6387 MISC:crbug.com:CVE-2020-6388 MISC:crbug.com:CVE-2020-6389 MISC:crbug.com:CVE-2020-6390 MISC:crbug.com:CVE-2020-6391 MISC:crbug.com:CVE-2020-6392 MISC:crbug.com:CVE-2020-6393 MISC:crbug.com:CVE-2020-6394 MISC:crbug.com:CVE-2020-6395 MISC:crbug.com:CVE-2020-6396 MISC:crbug.com:CVE-2020-6397 MISC:crbug.com:CVE-2020-6398 MISC:crbug.com:CVE-2020-6399 MISC:crbug.com:CVE-2020-6400 MISC:crbug.com:CVE-2020-6401 MISC:crbug.com:CVE-2020-6402 MISC:crbug.com:CVE-2020-6403 MISC:crbug.com:CVE-2020-6404 MISC:crbug.com:CVE-2020-6405 MISC:crbug.com:CVE-2020-6406 MISC:crbug.com:CVE-2020-6408 MISC:crbug.com:CVE-2020-6409 MISC:crbug.com:CVE-2020-6410 MISC:crbug.com:CVE-2020-6411 MISC:crbug.com:CVE-2020-6412 MISC:crbug.com:CVE-2020-6413 MISC:crbug.com:CVE-2020-6414 MISC:crbug.com:CVE-2020-6415 MISC:crbug.com:CVE-2020-6416 MISC:crbug.com:CVE-2020-6417 MISC:github.com:CVE-2019-19880 MISC:github.com:CVE-2019-19923 MISC:github.com:CVE-2019-19926 MISC:packetstormsecurity.com:CVE-2020-6388 MISC:packetstormsecurity.com:CVE-2020-6390 MISC:www.oracle.com:CVE-2019-2880 Oracle:CVE-2019-18197 RH:CVE-2019-19880 RH:CVE-2019-19923 RH:CVE-2019-19926 RH:CVE-2020-6381 RH:CVE-2020-6382 RH:CVE-2020-6385 RH:CVE-2020-6387 RH:CVE-2020-6388 RH:CVE-2020-6389 RH:CVE-2020-6390 RH:CVE-2020-6391 RH:CVE-2020-6392 RH:CVE-2020-6393 RH:CVE-2020-6394 RH:CVE-2020-6395 RH:CVE-2020-6396 RH:CVE-2020-6397 RH:CVE-2020-6398 RH:CVE-2020-6399 RH:CVE-2020-6400 RH:CVE-2020-6401 RH:CVE-2020-6402 RH:CVE-2020-6403 RH:CVE-2020-6404 RH:CVE-2020-6405 RH:CVE-2020-6406 RH:CVE-2020-6408 RH:CVE-2020-6409 RH:CVE-2020-6410 RH:CVE-2020-6411 RH:CVE-2020-6412 RH:CVE-2020-6413 RH:CVE-2020-6414 RH:CVE-2020-6415 RH:CVE-2020-6416 RH:CVE-2020-6417 RHSA-2020:0514 RHSA-2020:1810 RHSA-2020:4442 SMASH Issue 252466 SUSE:openSUSE-SU-2020:0189 SUSE:openSUSE-SU-2020:0210 SUSE:openSUSE-SU-2020:0233 UBUNTU:CVE-2019-19880 UBUNTU:CVE-2019-19923 UBUNTU:CVE-2019-19926 UBUNTU:CVE-2020-6381 UBUNTU:CVE-2020-6382 UBUNTU:CVE-2020-6385 UBUNTU:CVE-2020-6387 UBUNTU:CVE-2020-6388 UBUNTU:CVE-2020-6389 UBUNTU:CVE-2020-6390 UBUNTU:CVE-2020-6391 UBUNTU:CVE-2020-6392 UBUNTU:CVE-2020-6393 UBUNTU:CVE-2020-6394 UBUNTU:CVE-2020-6395 UBUNTU:CVE-2020-6396 UBUNTU:CVE-2020-6397 UBUNTU:CVE-2020-6398 UBUNTU:CVE-2020-6399 UBUNTU:CVE-2020-6400 UBUNTU:CVE-2020-6401 UBUNTU:CVE-2020-6402 UBUNTU:CVE-2020-6403 UBUNTU:CVE-2020-6404 UBUNTU:CVE-2020-6405 UBUNTU:CVE-2020-6406 UBUNTU:CVE-2020-6408 UBUNTU:CVE-2020-6409 UBUNTU:CVE-2020-6410 UBUNTU:CVE-2020-6411 UBUNTU:CVE-2020-6412 UBUNTU:CVE-2020-6413 UBUNTU:CVE-2020-6414 UBUNTU:CVE-2020-6415 UBUNTU:CVE-2020-6416 UBUNTU:CVE-2020-6417 USN-4298-1 USN-4298-2 bnc#1162833 rh#1770768 rh#1787032 rh#1788846 rh#1789364 rh#1801160 rh#1801161 rh#1801162 rh#1801163 rh#1801164 rh#1801165 rh#1801166 rh#1801167 rh#1801168 rh#1801169 rh#1801170 rh#1801171 rh#1801172 rh#1801173 rh#1801174 rh#1801175 rh#1801176 rh#1801177 rh#1801178 rh#1801179 rh#1801180 rh#1801181 rh#1801182 rh#1801184 rh#1801185 rh#1801186 rh#1801187 rh#1801188 rh#1801189 rh#1801190 rh#1801191 rh#1801192 rh#1801193 |
CVE-2020-6410 | sqlite3:Released | important | () | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2019-19880 CONFIRM:security.netapp.com:CVE-2019-19923 CVE-2019-19880 CVE-2019-19923 CVE-2019-19926 CVE-2020-6381 CVE-2020-6382 CVE-2020-6385 CVE-2020-6387 CVE-2020-6388 CVE-2020-6389 CVE-2020-6390 CVE-2020-6391 CVE-2020-6392 CVE-2020-6393 CVE-2020-6394 CVE-2020-6395 CVE-2020-6396 CVE-2020-6397 CVE-2020-6398 CVE-2020-6399 CVE-2020-6400 CVE-2020-6401 CVE-2020-6402 CVE-2020-6403 CVE-2020-6404 CVE-2020-6405 CVE-2020-6406 CVE-2020-6408 CVE-2020-6409 CVE-2020-6410 CVE-2020-6411 CVE-2020-6412 CVE-2020-6413 CVE-2020-6414 CVE-2020-6415 CVE-2020-6416 CVE-2020-6417 D:CVE-2020-6391 DSA-4638 FEDORA:FEDORA-2020-39e0b8bd14 FEDORA:FEDORA-2020-f6271d7afa GLSA-202003-08 MISC:chromereleases.googleblog.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6382 MISC:crbug.com:CVE-2020-6385 MISC:crbug.com:CVE-2020-6387 MISC:crbug.com:CVE-2020-6388 MISC:crbug.com:CVE-2020-6389 MISC:crbug.com:CVE-2020-6390 MISC:crbug.com:CVE-2020-6391 MISC:crbug.com:CVE-2020-6392 MISC:crbug.com:CVE-2020-6393 MISC:crbug.com:CVE-2020-6394 MISC:crbug.com:CVE-2020-6395 MISC:crbug.com:CVE-2020-6396 MISC:crbug.com:CVE-2020-6397 MISC:crbug.com:CVE-2020-6398 MISC:crbug.com:CVE-2020-6399 MISC:crbug.com:CVE-2020-6400 MISC:crbug.com:CVE-2020-6401 MISC:crbug.com:CVE-2020-6402 MISC:crbug.com:CVE-2020-6403 MISC:crbug.com:CVE-2020-6404 MISC:crbug.com:CVE-2020-6405 MISC:crbug.com:CVE-2020-6406 MISC:crbug.com:CVE-2020-6408 MISC:crbug.com:CVE-2020-6409 MISC:crbug.com:CVE-2020-6410 MISC:crbug.com:CVE-2020-6411 MISC:crbug.com:CVE-2020-6412 MISC:crbug.com:CVE-2020-6413 MISC:crbug.com:CVE-2020-6414 MISC:crbug.com:CVE-2020-6415 MISC:crbug.com:CVE-2020-6416 MISC:crbug.com:CVE-2020-6417 MISC:github.com:CVE-2019-19880 MISC:github.com:CVE-2019-19923 MISC:github.com:CVE-2019-19926 MISC:packetstormsecurity.com:CVE-2020-6388 MISC:packetstormsecurity.com:CVE-2020-6390 MISC:www.oracle.com:CVE-2019-2880 Oracle:CVE-2019-18197 RH:CVE-2019-19880 RH:CVE-2019-19923 RH:CVE-2019-19926 RH:CVE-2020-6381 RH:CVE-2020-6382 RH:CVE-2020-6385 RH:CVE-2020-6387 RH:CVE-2020-6388 RH:CVE-2020-6389 RH:CVE-2020-6390 RH:CVE-2020-6391 RH:CVE-2020-6392 RH:CVE-2020-6393 RH:CVE-2020-6394 RH:CVE-2020-6395 RH:CVE-2020-6396 RH:CVE-2020-6397 RH:CVE-2020-6398 RH:CVE-2020-6399 RH:CVE-2020-6400 RH:CVE-2020-6401 RH:CVE-2020-6402 RH:CVE-2020-6403 RH:CVE-2020-6404 RH:CVE-2020-6405 RH:CVE-2020-6406 RH:CVE-2020-6408 RH:CVE-2020-6409 RH:CVE-2020-6410 RH:CVE-2020-6411 RH:CVE-2020-6412 RH:CVE-2020-6413 RH:CVE-2020-6414 RH:CVE-2020-6415 RH:CVE-2020-6416 RH:CVE-2020-6417 RHSA-2020:0514 RHSA-2020:1810 RHSA-2020:4442 SMASH Issue 252466 SUSE:openSUSE-SU-2020:0189 SUSE:openSUSE-SU-2020:0210 SUSE:openSUSE-SU-2020:0233 UBUNTU:CVE-2019-19880 UBUNTU:CVE-2019-19923 UBUNTU:CVE-2019-19926 UBUNTU:CVE-2020-6381 UBUNTU:CVE-2020-6382 UBUNTU:CVE-2020-6385 UBUNTU:CVE-2020-6387 UBUNTU:CVE-2020-6388 UBUNTU:CVE-2020-6389 UBUNTU:CVE-2020-6390 UBUNTU:CVE-2020-6391 UBUNTU:CVE-2020-6392 UBUNTU:CVE-2020-6393 UBUNTU:CVE-2020-6394 UBUNTU:CVE-2020-6395 UBUNTU:CVE-2020-6396 UBUNTU:CVE-2020-6397 UBUNTU:CVE-2020-6398 UBUNTU:CVE-2020-6399 UBUNTU:CVE-2020-6400 UBUNTU:CVE-2020-6401 UBUNTU:CVE-2020-6402 UBUNTU:CVE-2020-6403 UBUNTU:CVE-2020-6404 UBUNTU:CVE-2020-6405 UBUNTU:CVE-2020-6406 UBUNTU:CVE-2020-6408 UBUNTU:CVE-2020-6409 UBUNTU:CVE-2020-6410 UBUNTU:CVE-2020-6411 UBUNTU:CVE-2020-6412 UBUNTU:CVE-2020-6413 UBUNTU:CVE-2020-6414 UBUNTU:CVE-2020-6415 UBUNTU:CVE-2020-6416 UBUNTU:CVE-2020-6417 USN-4298-1 USN-4298-2 bnc#1162833 rh#1770768 rh#1787032 rh#1788846 rh#1789364 rh#1801160 rh#1801161 rh#1801162 rh#1801163 rh#1801164 rh#1801165 rh#1801166 rh#1801167 rh#1801168 rh#1801169 rh#1801170 rh#1801171 rh#1801172 rh#1801173 rh#1801174 rh#1801175 rh#1801176 rh#1801177 rh#1801178 rh#1801179 rh#1801180 rh#1801181 rh#1801182 rh#1801184 rh#1801185 rh#1801186 rh#1801187 rh#1801188 rh#1801189 rh#1801190 rh#1801191 rh#1801192 rh#1801193 |
CVE-2020-6411 | sqlite3:Released | important | () | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2019-19880 CONFIRM:security.netapp.com:CVE-2019-19923 CVE-2019-19880 CVE-2019-19923 CVE-2019-19926 CVE-2020-6381 CVE-2020-6382 CVE-2020-6385 CVE-2020-6387 CVE-2020-6388 CVE-2020-6389 CVE-2020-6390 CVE-2020-6391 CVE-2020-6392 CVE-2020-6393 CVE-2020-6394 CVE-2020-6395 CVE-2020-6396 CVE-2020-6397 CVE-2020-6398 CVE-2020-6399 CVE-2020-6400 CVE-2020-6401 CVE-2020-6402 CVE-2020-6403 CVE-2020-6404 CVE-2020-6405 CVE-2020-6406 CVE-2020-6408 CVE-2020-6409 CVE-2020-6410 CVE-2020-6411 CVE-2020-6412 CVE-2020-6413 CVE-2020-6414 CVE-2020-6415 CVE-2020-6416 CVE-2020-6417 D:CVE-2020-6391 DSA-4638 FEDORA:FEDORA-2020-39e0b8bd14 FEDORA:FEDORA-2020-f6271d7afa GLSA-202003-08 MISC:chromereleases.googleblog.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6382 MISC:crbug.com:CVE-2020-6385 MISC:crbug.com:CVE-2020-6387 MISC:crbug.com:CVE-2020-6388 MISC:crbug.com:CVE-2020-6389 MISC:crbug.com:CVE-2020-6390 MISC:crbug.com:CVE-2020-6391 MISC:crbug.com:CVE-2020-6392 MISC:crbug.com:CVE-2020-6393 MISC:crbug.com:CVE-2020-6394 MISC:crbug.com:CVE-2020-6395 MISC:crbug.com:CVE-2020-6396 MISC:crbug.com:CVE-2020-6397 MISC:crbug.com:CVE-2020-6398 MISC:crbug.com:CVE-2020-6399 MISC:crbug.com:CVE-2020-6400 MISC:crbug.com:CVE-2020-6401 MISC:crbug.com:CVE-2020-6402 MISC:crbug.com:CVE-2020-6403 MISC:crbug.com:CVE-2020-6404 MISC:crbug.com:CVE-2020-6405 MISC:crbug.com:CVE-2020-6406 MISC:crbug.com:CVE-2020-6408 MISC:crbug.com:CVE-2020-6409 MISC:crbug.com:CVE-2020-6410 MISC:crbug.com:CVE-2020-6411 MISC:crbug.com:CVE-2020-6412 MISC:crbug.com:CVE-2020-6413 MISC:crbug.com:CVE-2020-6414 MISC:crbug.com:CVE-2020-6415 MISC:crbug.com:CVE-2020-6416 MISC:crbug.com:CVE-2020-6417 MISC:github.com:CVE-2019-19880 MISC:github.com:CVE-2019-19923 MISC:github.com:CVE-2019-19926 MISC:packetstormsecurity.com:CVE-2020-6388 MISC:packetstormsecurity.com:CVE-2020-6390 MISC:www.oracle.com:CVE-2019-2880 Oracle:CVE-2019-18197 RH:CVE-2019-19880 RH:CVE-2019-19923 RH:CVE-2019-19926 RH:CVE-2020-6381 RH:CVE-2020-6382 RH:CVE-2020-6385 RH:CVE-2020-6387 RH:CVE-2020-6388 RH:CVE-2020-6389 RH:CVE-2020-6390 RH:CVE-2020-6391 RH:CVE-2020-6392 RH:CVE-2020-6393 RH:CVE-2020-6394 RH:CVE-2020-6395 RH:CVE-2020-6396 RH:CVE-2020-6397 RH:CVE-2020-6398 RH:CVE-2020-6399 RH:CVE-2020-6400 RH:CVE-2020-6401 RH:CVE-2020-6402 RH:CVE-2020-6403 RH:CVE-2020-6404 RH:CVE-2020-6405 RH:CVE-2020-6406 RH:CVE-2020-6408 RH:CVE-2020-6409 RH:CVE-2020-6410 RH:CVE-2020-6411 RH:CVE-2020-6412 RH:CVE-2020-6413 RH:CVE-2020-6414 RH:CVE-2020-6415 RH:CVE-2020-6416 RH:CVE-2020-6417 RHSA-2020:0514 RHSA-2020:1810 RHSA-2020:4442 SMASH Issue 252466 SUSE:openSUSE-SU-2020:0189 SUSE:openSUSE-SU-2020:0210 SUSE:openSUSE-SU-2020:0233 UBUNTU:CVE-2019-19880 UBUNTU:CVE-2019-19923 UBUNTU:CVE-2019-19926 UBUNTU:CVE-2020-6381 UBUNTU:CVE-2020-6382 UBUNTU:CVE-2020-6385 UBUNTU:CVE-2020-6387 UBUNTU:CVE-2020-6388 UBUNTU:CVE-2020-6389 UBUNTU:CVE-2020-6390 UBUNTU:CVE-2020-6391 UBUNTU:CVE-2020-6392 UBUNTU:CVE-2020-6393 UBUNTU:CVE-2020-6394 UBUNTU:CVE-2020-6395 UBUNTU:CVE-2020-6396 UBUNTU:CVE-2020-6397 UBUNTU:CVE-2020-6398 UBUNTU:CVE-2020-6399 UBUNTU:CVE-2020-6400 UBUNTU:CVE-2020-6401 UBUNTU:CVE-2020-6402 UBUNTU:CVE-2020-6403 UBUNTU:CVE-2020-6404 UBUNTU:CVE-2020-6405 UBUNTU:CVE-2020-6406 UBUNTU:CVE-2020-6408 UBUNTU:CVE-2020-6409 UBUNTU:CVE-2020-6410 UBUNTU:CVE-2020-6411 UBUNTU:CVE-2020-6412 UBUNTU:CVE-2020-6413 UBUNTU:CVE-2020-6414 UBUNTU:CVE-2020-6415 UBUNTU:CVE-2020-6416 UBUNTU:CVE-2020-6417 USN-4298-1 USN-4298-2 bnc#1162833 rh#1770768 rh#1787032 rh#1788846 rh#1789364 rh#1801160 rh#1801161 rh#1801162 rh#1801163 rh#1801164 rh#1801165 rh#1801166 rh#1801167 rh#1801168 rh#1801169 rh#1801170 rh#1801171 rh#1801172 rh#1801173 rh#1801174 rh#1801175 rh#1801176 rh#1801177 rh#1801178 rh#1801179 rh#1801180 rh#1801181 rh#1801182 rh#1801184 rh#1801185 rh#1801186 rh#1801187 rh#1801188 rh#1801189 rh#1801190 rh#1801191 rh#1801192 rh#1801193 |
CVE-2020-6412 | sqlite3:Released | important | () | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2019-19880 CONFIRM:security.netapp.com:CVE-2019-19923 CVE-2019-19880 CVE-2019-19923 CVE-2019-19926 CVE-2020-6381 CVE-2020-6382 CVE-2020-6385 CVE-2020-6387 CVE-2020-6388 CVE-2020-6389 CVE-2020-6390 CVE-2020-6391 CVE-2020-6392 CVE-2020-6393 CVE-2020-6394 CVE-2020-6395 CVE-2020-6396 CVE-2020-6397 CVE-2020-6398 CVE-2020-6399 CVE-2020-6400 CVE-2020-6401 CVE-2020-6402 CVE-2020-6403 CVE-2020-6404 CVE-2020-6405 CVE-2020-6406 CVE-2020-6408 CVE-2020-6409 CVE-2020-6410 CVE-2020-6411 CVE-2020-6412 CVE-2020-6413 CVE-2020-6414 CVE-2020-6415 CVE-2020-6416 CVE-2020-6417 D:CVE-2020-6391 DSA-4638 FEDORA:FEDORA-2020-39e0b8bd14 FEDORA:FEDORA-2020-f6271d7afa GLSA-202003-08 MISC:chromereleases.googleblog.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6382 MISC:crbug.com:CVE-2020-6385 MISC:crbug.com:CVE-2020-6387 MISC:crbug.com:CVE-2020-6388 MISC:crbug.com:CVE-2020-6389 MISC:crbug.com:CVE-2020-6390 MISC:crbug.com:CVE-2020-6391 MISC:crbug.com:CVE-2020-6392 MISC:crbug.com:CVE-2020-6393 MISC:crbug.com:CVE-2020-6394 MISC:crbug.com:CVE-2020-6395 MISC:crbug.com:CVE-2020-6396 MISC:crbug.com:CVE-2020-6397 MISC:crbug.com:CVE-2020-6398 MISC:crbug.com:CVE-2020-6399 MISC:crbug.com:CVE-2020-6400 MISC:crbug.com:CVE-2020-6401 MISC:crbug.com:CVE-2020-6402 MISC:crbug.com:CVE-2020-6403 MISC:crbug.com:CVE-2020-6404 MISC:crbug.com:CVE-2020-6405 MISC:crbug.com:CVE-2020-6406 MISC:crbug.com:CVE-2020-6408 MISC:crbug.com:CVE-2020-6409 MISC:crbug.com:CVE-2020-6410 MISC:crbug.com:CVE-2020-6411 MISC:crbug.com:CVE-2020-6412 MISC:crbug.com:CVE-2020-6413 MISC:crbug.com:CVE-2020-6414 MISC:crbug.com:CVE-2020-6415 MISC:crbug.com:CVE-2020-6416 MISC:crbug.com:CVE-2020-6417 MISC:github.com:CVE-2019-19880 MISC:github.com:CVE-2019-19923 MISC:github.com:CVE-2019-19926 MISC:packetstormsecurity.com:CVE-2020-6388 MISC:packetstormsecurity.com:CVE-2020-6390 MISC:www.oracle.com:CVE-2019-2880 Oracle:CVE-2019-18197 RH:CVE-2019-19880 RH:CVE-2019-19923 RH:CVE-2019-19926 RH:CVE-2020-6381 RH:CVE-2020-6382 RH:CVE-2020-6385 RH:CVE-2020-6387 RH:CVE-2020-6388 RH:CVE-2020-6389 RH:CVE-2020-6390 RH:CVE-2020-6391 RH:CVE-2020-6392 RH:CVE-2020-6393 RH:CVE-2020-6394 RH:CVE-2020-6395 RH:CVE-2020-6396 RH:CVE-2020-6397 RH:CVE-2020-6398 RH:CVE-2020-6399 RH:CVE-2020-6400 RH:CVE-2020-6401 RH:CVE-2020-6402 RH:CVE-2020-6403 RH:CVE-2020-6404 RH:CVE-2020-6405 RH:CVE-2020-6406 RH:CVE-2020-6408 RH:CVE-2020-6409 RH:CVE-2020-6410 RH:CVE-2020-6411 RH:CVE-2020-6412 RH:CVE-2020-6413 RH:CVE-2020-6414 RH:CVE-2020-6415 RH:CVE-2020-6416 RH:CVE-2020-6417 RHSA-2020:0514 RHSA-2020:1810 RHSA-2020:4442 SMASH Issue 252466 SUSE:openSUSE-SU-2020:0189 SUSE:openSUSE-SU-2020:0210 SUSE:openSUSE-SU-2020:0233 UBUNTU:CVE-2019-19880 UBUNTU:CVE-2019-19923 UBUNTU:CVE-2019-19926 UBUNTU:CVE-2020-6381 UBUNTU:CVE-2020-6382 UBUNTU:CVE-2020-6385 UBUNTU:CVE-2020-6387 UBUNTU:CVE-2020-6388 UBUNTU:CVE-2020-6389 UBUNTU:CVE-2020-6390 UBUNTU:CVE-2020-6391 UBUNTU:CVE-2020-6392 UBUNTU:CVE-2020-6393 UBUNTU:CVE-2020-6394 UBUNTU:CVE-2020-6395 UBUNTU:CVE-2020-6396 UBUNTU:CVE-2020-6397 UBUNTU:CVE-2020-6398 UBUNTU:CVE-2020-6399 UBUNTU:CVE-2020-6400 UBUNTU:CVE-2020-6401 UBUNTU:CVE-2020-6402 UBUNTU:CVE-2020-6403 UBUNTU:CVE-2020-6404 UBUNTU:CVE-2020-6405 UBUNTU:CVE-2020-6406 UBUNTU:CVE-2020-6408 UBUNTU:CVE-2020-6409 UBUNTU:CVE-2020-6410 UBUNTU:CVE-2020-6411 UBUNTU:CVE-2020-6412 UBUNTU:CVE-2020-6413 UBUNTU:CVE-2020-6414 UBUNTU:CVE-2020-6415 UBUNTU:CVE-2020-6416 UBUNTU:CVE-2020-6417 USN-4298-1 USN-4298-2 bnc#1162833 rh#1770768 rh#1787032 rh#1788846 rh#1789364 rh#1801160 rh#1801161 rh#1801162 rh#1801163 rh#1801164 rh#1801165 rh#1801166 rh#1801167 rh#1801168 rh#1801169 rh#1801170 rh#1801171 rh#1801172 rh#1801173 rh#1801174 rh#1801175 rh#1801176 rh#1801177 rh#1801178 rh#1801179 rh#1801180 rh#1801181 rh#1801182 rh#1801184 rh#1801185 rh#1801186 rh#1801187 rh#1801188 rh#1801189 rh#1801190 rh#1801191 rh#1801192 rh#1801193 |
CVE-2020-6413 | sqlite3:Released | important | () | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2019-19880 CONFIRM:security.netapp.com:CVE-2019-19923 CVE-2019-19880 CVE-2019-19923 CVE-2019-19926 CVE-2020-6381 CVE-2020-6382 CVE-2020-6385 CVE-2020-6387 CVE-2020-6388 CVE-2020-6389 CVE-2020-6390 CVE-2020-6391 CVE-2020-6392 CVE-2020-6393 CVE-2020-6394 CVE-2020-6395 CVE-2020-6396 CVE-2020-6397 CVE-2020-6398 CVE-2020-6399 CVE-2020-6400 CVE-2020-6401 CVE-2020-6402 CVE-2020-6403 CVE-2020-6404 CVE-2020-6405 CVE-2020-6406 CVE-2020-6408 CVE-2020-6409 CVE-2020-6410 CVE-2020-6411 CVE-2020-6412 CVE-2020-6413 CVE-2020-6414 CVE-2020-6415 CVE-2020-6416 CVE-2020-6417 D:CVE-2020-6391 DSA-4638 FEDORA:FEDORA-2020-39e0b8bd14 FEDORA:FEDORA-2020-f6271d7afa GLSA-202003-08 MISC:chromereleases.googleblog.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6382 MISC:crbug.com:CVE-2020-6385 MISC:crbug.com:CVE-2020-6387 MISC:crbug.com:CVE-2020-6388 MISC:crbug.com:CVE-2020-6389 MISC:crbug.com:CVE-2020-6390 MISC:crbug.com:CVE-2020-6391 MISC:crbug.com:CVE-2020-6392 MISC:crbug.com:CVE-2020-6393 MISC:crbug.com:CVE-2020-6394 MISC:crbug.com:CVE-2020-6395 MISC:crbug.com:CVE-2020-6396 MISC:crbug.com:CVE-2020-6397 MISC:crbug.com:CVE-2020-6398 MISC:crbug.com:CVE-2020-6399 MISC:crbug.com:CVE-2020-6400 MISC:crbug.com:CVE-2020-6401 MISC:crbug.com:CVE-2020-6402 MISC:crbug.com:CVE-2020-6403 MISC:crbug.com:CVE-2020-6404 MISC:crbug.com:CVE-2020-6405 MISC:crbug.com:CVE-2020-6406 MISC:crbug.com:CVE-2020-6408 MISC:crbug.com:CVE-2020-6409 MISC:crbug.com:CVE-2020-6410 MISC:crbug.com:CVE-2020-6411 MISC:crbug.com:CVE-2020-6412 MISC:crbug.com:CVE-2020-6413 MISC:crbug.com:CVE-2020-6414 MISC:crbug.com:CVE-2020-6415 MISC:crbug.com:CVE-2020-6416 MISC:crbug.com:CVE-2020-6417 MISC:github.com:CVE-2019-19880 MISC:github.com:CVE-2019-19923 MISC:github.com:CVE-2019-19926 MISC:packetstormsecurity.com:CVE-2020-6388 MISC:packetstormsecurity.com:CVE-2020-6390 MISC:www.oracle.com:CVE-2019-2880 Oracle:CVE-2019-18197 RH:CVE-2019-19880 RH:CVE-2019-19923 RH:CVE-2019-19926 RH:CVE-2020-6381 RH:CVE-2020-6382 RH:CVE-2020-6385 RH:CVE-2020-6387 RH:CVE-2020-6388 RH:CVE-2020-6389 RH:CVE-2020-6390 RH:CVE-2020-6391 RH:CVE-2020-6392 RH:CVE-2020-6393 RH:CVE-2020-6394 RH:CVE-2020-6395 RH:CVE-2020-6396 RH:CVE-2020-6397 RH:CVE-2020-6398 RH:CVE-2020-6399 RH:CVE-2020-6400 RH:CVE-2020-6401 RH:CVE-2020-6402 RH:CVE-2020-6403 RH:CVE-2020-6404 RH:CVE-2020-6405 RH:CVE-2020-6406 RH:CVE-2020-6408 RH:CVE-2020-6409 RH:CVE-2020-6410 RH:CVE-2020-6411 RH:CVE-2020-6412 RH:CVE-2020-6413 RH:CVE-2020-6414 RH:CVE-2020-6415 RH:CVE-2020-6416 RH:CVE-2020-6417 RHSA-2020:0514 RHSA-2020:1810 RHSA-2020:4442 SMASH Issue 252466 SUSE:openSUSE-SU-2020:0189 SUSE:openSUSE-SU-2020:0210 SUSE:openSUSE-SU-2020:0233 UBUNTU:CVE-2019-19880 UBUNTU:CVE-2019-19923 UBUNTU:CVE-2019-19926 UBUNTU:CVE-2020-6381 UBUNTU:CVE-2020-6382 UBUNTU:CVE-2020-6385 UBUNTU:CVE-2020-6387 UBUNTU:CVE-2020-6388 UBUNTU:CVE-2020-6389 UBUNTU:CVE-2020-6390 UBUNTU:CVE-2020-6391 UBUNTU:CVE-2020-6392 UBUNTU:CVE-2020-6393 UBUNTU:CVE-2020-6394 UBUNTU:CVE-2020-6395 UBUNTU:CVE-2020-6396 UBUNTU:CVE-2020-6397 UBUNTU:CVE-2020-6398 UBUNTU:CVE-2020-6399 UBUNTU:CVE-2020-6400 UBUNTU:CVE-2020-6401 UBUNTU:CVE-2020-6402 UBUNTU:CVE-2020-6403 UBUNTU:CVE-2020-6404 UBUNTU:CVE-2020-6405 UBUNTU:CVE-2020-6406 UBUNTU:CVE-2020-6408 UBUNTU:CVE-2020-6409 UBUNTU:CVE-2020-6410 UBUNTU:CVE-2020-6411 UBUNTU:CVE-2020-6412 UBUNTU:CVE-2020-6413 UBUNTU:CVE-2020-6414 UBUNTU:CVE-2020-6415 UBUNTU:CVE-2020-6416 UBUNTU:CVE-2020-6417 USN-4298-1 USN-4298-2 bnc#1162833 rh#1770768 rh#1787032 rh#1788846 rh#1789364 rh#1801160 rh#1801161 rh#1801162 rh#1801163 rh#1801164 rh#1801165 rh#1801166 rh#1801167 rh#1801168 rh#1801169 rh#1801170 rh#1801171 rh#1801172 rh#1801173 rh#1801174 rh#1801175 rh#1801176 rh#1801177 rh#1801178 rh#1801179 rh#1801180 rh#1801181 rh#1801182 rh#1801184 rh#1801185 rh#1801186 rh#1801187 rh#1801188 rh#1801189 rh#1801190 rh#1801191 rh#1801192 rh#1801193 |
CVE-2020-6414 | sqlite3:Released | important | () | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2019-19880 CONFIRM:security.netapp.com:CVE-2019-19923 CVE-2019-19880 CVE-2019-19923 CVE-2019-19926 CVE-2020-6381 CVE-2020-6382 CVE-2020-6385 CVE-2020-6387 CVE-2020-6388 CVE-2020-6389 CVE-2020-6390 CVE-2020-6391 CVE-2020-6392 CVE-2020-6393 CVE-2020-6394 CVE-2020-6395 CVE-2020-6396 CVE-2020-6397 CVE-2020-6398 CVE-2020-6399 CVE-2020-6400 CVE-2020-6401 CVE-2020-6402 CVE-2020-6403 CVE-2020-6404 CVE-2020-6405 CVE-2020-6406 CVE-2020-6408 CVE-2020-6409 CVE-2020-6410 CVE-2020-6411 CVE-2020-6412 CVE-2020-6413 CVE-2020-6414 CVE-2020-6415 CVE-2020-6416 CVE-2020-6417 D:CVE-2020-6391 DSA-4638 FEDORA:FEDORA-2020-39e0b8bd14 FEDORA:FEDORA-2020-f6271d7afa GLSA-202003-08 MISC:chromereleases.googleblog.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6382 MISC:crbug.com:CVE-2020-6385 MISC:crbug.com:CVE-2020-6387 MISC:crbug.com:CVE-2020-6388 MISC:crbug.com:CVE-2020-6389 MISC:crbug.com:CVE-2020-6390 MISC:crbug.com:CVE-2020-6391 MISC:crbug.com:CVE-2020-6392 MISC:crbug.com:CVE-2020-6393 MISC:crbug.com:CVE-2020-6394 MISC:crbug.com:CVE-2020-6395 MISC:crbug.com:CVE-2020-6396 MISC:crbug.com:CVE-2020-6397 MISC:crbug.com:CVE-2020-6398 MISC:crbug.com:CVE-2020-6399 MISC:crbug.com:CVE-2020-6400 MISC:crbug.com:CVE-2020-6401 MISC:crbug.com:CVE-2020-6402 MISC:crbug.com:CVE-2020-6403 MISC:crbug.com:CVE-2020-6404 MISC:crbug.com:CVE-2020-6405 MISC:crbug.com:CVE-2020-6406 MISC:crbug.com:CVE-2020-6408 MISC:crbug.com:CVE-2020-6409 MISC:crbug.com:CVE-2020-6410 MISC:crbug.com:CVE-2020-6411 MISC:crbug.com:CVE-2020-6412 MISC:crbug.com:CVE-2020-6413 MISC:crbug.com:CVE-2020-6414 MISC:crbug.com:CVE-2020-6415 MISC:crbug.com:CVE-2020-6416 MISC:crbug.com:CVE-2020-6417 MISC:github.com:CVE-2019-19880 MISC:github.com:CVE-2019-19923 MISC:github.com:CVE-2019-19926 MISC:packetstormsecurity.com:CVE-2020-6388 MISC:packetstormsecurity.com:CVE-2020-6390 MISC:www.oracle.com:CVE-2019-2880 Oracle:CVE-2019-18197 RH:CVE-2019-19880 RH:CVE-2019-19923 RH:CVE-2019-19926 RH:CVE-2020-6381 RH:CVE-2020-6382 RH:CVE-2020-6385 RH:CVE-2020-6387 RH:CVE-2020-6388 RH:CVE-2020-6389 RH:CVE-2020-6390 RH:CVE-2020-6391 RH:CVE-2020-6392 RH:CVE-2020-6393 RH:CVE-2020-6394 RH:CVE-2020-6395 RH:CVE-2020-6396 RH:CVE-2020-6397 RH:CVE-2020-6398 RH:CVE-2020-6399 RH:CVE-2020-6400 RH:CVE-2020-6401 RH:CVE-2020-6402 RH:CVE-2020-6403 RH:CVE-2020-6404 RH:CVE-2020-6405 RH:CVE-2020-6406 RH:CVE-2020-6408 RH:CVE-2020-6409 RH:CVE-2020-6410 RH:CVE-2020-6411 RH:CVE-2020-6412 RH:CVE-2020-6413 RH:CVE-2020-6414 RH:CVE-2020-6415 RH:CVE-2020-6416 RH:CVE-2020-6417 RHSA-2020:0514 RHSA-2020:1810 RHSA-2020:4442 SMASH Issue 252466 SUSE:openSUSE-SU-2020:0189 SUSE:openSUSE-SU-2020:0210 SUSE:openSUSE-SU-2020:0233 UBUNTU:CVE-2019-19880 UBUNTU:CVE-2019-19923 UBUNTU:CVE-2019-19926 UBUNTU:CVE-2020-6381 UBUNTU:CVE-2020-6382 UBUNTU:CVE-2020-6385 UBUNTU:CVE-2020-6387 UBUNTU:CVE-2020-6388 UBUNTU:CVE-2020-6389 UBUNTU:CVE-2020-6390 UBUNTU:CVE-2020-6391 UBUNTU:CVE-2020-6392 UBUNTU:CVE-2020-6393 UBUNTU:CVE-2020-6394 UBUNTU:CVE-2020-6395 UBUNTU:CVE-2020-6396 UBUNTU:CVE-2020-6397 UBUNTU:CVE-2020-6398 UBUNTU:CVE-2020-6399 UBUNTU:CVE-2020-6400 UBUNTU:CVE-2020-6401 UBUNTU:CVE-2020-6402 UBUNTU:CVE-2020-6403 UBUNTU:CVE-2020-6404 UBUNTU:CVE-2020-6405 UBUNTU:CVE-2020-6406 UBUNTU:CVE-2020-6408 UBUNTU:CVE-2020-6409 UBUNTU:CVE-2020-6410 UBUNTU:CVE-2020-6411 UBUNTU:CVE-2020-6412 UBUNTU:CVE-2020-6413 UBUNTU:CVE-2020-6414 UBUNTU:CVE-2020-6415 UBUNTU:CVE-2020-6416 UBUNTU:CVE-2020-6417 USN-4298-1 USN-4298-2 bnc#1162833 rh#1770768 rh#1787032 rh#1788846 rh#1789364 rh#1801160 rh#1801161 rh#1801162 rh#1801163 rh#1801164 rh#1801165 rh#1801166 rh#1801167 rh#1801168 rh#1801169 rh#1801170 rh#1801171 rh#1801172 rh#1801173 rh#1801174 rh#1801175 rh#1801176 rh#1801177 rh#1801178 rh#1801179 rh#1801180 rh#1801181 rh#1801182 rh#1801184 rh#1801185 rh#1801186 rh#1801187 rh#1801188 rh#1801189 rh#1801190 rh#1801191 rh#1801192 rh#1801193 |
CVE-2020-6415 | sqlite3:Released | important | () | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2019-19880 CONFIRM:security.netapp.com:CVE-2019-19923 CVE-2019-19880 CVE-2019-19923 CVE-2019-19926 CVE-2020-6381 CVE-2020-6382 CVE-2020-6385 CVE-2020-6387 CVE-2020-6388 CVE-2020-6389 CVE-2020-6390 CVE-2020-6391 CVE-2020-6392 CVE-2020-6393 CVE-2020-6394 CVE-2020-6395 CVE-2020-6396 CVE-2020-6397 CVE-2020-6398 CVE-2020-6399 CVE-2020-6400 CVE-2020-6401 CVE-2020-6402 CVE-2020-6403 CVE-2020-6404 CVE-2020-6405 CVE-2020-6406 CVE-2020-6408 CVE-2020-6409 CVE-2020-6410 CVE-2020-6411 CVE-2020-6412 CVE-2020-6413 CVE-2020-6414 CVE-2020-6415 CVE-2020-6416 CVE-2020-6417 D:CVE-2020-6391 DSA-4638 FEDORA:FEDORA-2020-39e0b8bd14 FEDORA:FEDORA-2020-f6271d7afa GLSA-202003-08 MISC:chromereleases.googleblog.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6382 MISC:crbug.com:CVE-2020-6385 MISC:crbug.com:CVE-2020-6387 MISC:crbug.com:CVE-2020-6388 MISC:crbug.com:CVE-2020-6389 MISC:crbug.com:CVE-2020-6390 MISC:crbug.com:CVE-2020-6391 MISC:crbug.com:CVE-2020-6392 MISC:crbug.com:CVE-2020-6393 MISC:crbug.com:CVE-2020-6394 MISC:crbug.com:CVE-2020-6395 MISC:crbug.com:CVE-2020-6396 MISC:crbug.com:CVE-2020-6397 MISC:crbug.com:CVE-2020-6398 MISC:crbug.com:CVE-2020-6399 MISC:crbug.com:CVE-2020-6400 MISC:crbug.com:CVE-2020-6401 MISC:crbug.com:CVE-2020-6402 MISC:crbug.com:CVE-2020-6403 MISC:crbug.com:CVE-2020-6404 MISC:crbug.com:CVE-2020-6405 MISC:crbug.com:CVE-2020-6406 MISC:crbug.com:CVE-2020-6408 MISC:crbug.com:CVE-2020-6409 MISC:crbug.com:CVE-2020-6410 MISC:crbug.com:CVE-2020-6411 MISC:crbug.com:CVE-2020-6412 MISC:crbug.com:CVE-2020-6413 MISC:crbug.com:CVE-2020-6414 MISC:crbug.com:CVE-2020-6415 MISC:crbug.com:CVE-2020-6416 MISC:crbug.com:CVE-2020-6417 MISC:github.com:CVE-2019-19880 MISC:github.com:CVE-2019-19923 MISC:github.com:CVE-2019-19926 MISC:packetstormsecurity.com:CVE-2020-6388 MISC:packetstormsecurity.com:CVE-2020-6390 MISC:www.oracle.com:CVE-2019-2880 Oracle:CVE-2019-18197 RH:CVE-2019-19880 RH:CVE-2019-19923 RH:CVE-2019-19926 RH:CVE-2020-6381 RH:CVE-2020-6382 RH:CVE-2020-6385 RH:CVE-2020-6387 RH:CVE-2020-6388 RH:CVE-2020-6389 RH:CVE-2020-6390 RH:CVE-2020-6391 RH:CVE-2020-6392 RH:CVE-2020-6393 RH:CVE-2020-6394 RH:CVE-2020-6395 RH:CVE-2020-6396 RH:CVE-2020-6397 RH:CVE-2020-6398 RH:CVE-2020-6399 RH:CVE-2020-6400 RH:CVE-2020-6401 RH:CVE-2020-6402 RH:CVE-2020-6403 RH:CVE-2020-6404 RH:CVE-2020-6405 RH:CVE-2020-6406 RH:CVE-2020-6408 RH:CVE-2020-6409 RH:CVE-2020-6410 RH:CVE-2020-6411 RH:CVE-2020-6412 RH:CVE-2020-6413 RH:CVE-2020-6414 RH:CVE-2020-6415 RH:CVE-2020-6416 RH:CVE-2020-6417 RHSA-2020:0514 RHSA-2020:1810 RHSA-2020:4442 SMASH Issue 252466 SUSE:openSUSE-SU-2020:0189 SUSE:openSUSE-SU-2020:0210 SUSE:openSUSE-SU-2020:0233 UBUNTU:CVE-2019-19880 UBUNTU:CVE-2019-19923 UBUNTU:CVE-2019-19926 UBUNTU:CVE-2020-6381 UBUNTU:CVE-2020-6382 UBUNTU:CVE-2020-6385 UBUNTU:CVE-2020-6387 UBUNTU:CVE-2020-6388 UBUNTU:CVE-2020-6389 UBUNTU:CVE-2020-6390 UBUNTU:CVE-2020-6391 UBUNTU:CVE-2020-6392 UBUNTU:CVE-2020-6393 UBUNTU:CVE-2020-6394 UBUNTU:CVE-2020-6395 UBUNTU:CVE-2020-6396 UBUNTU:CVE-2020-6397 UBUNTU:CVE-2020-6398 UBUNTU:CVE-2020-6399 UBUNTU:CVE-2020-6400 UBUNTU:CVE-2020-6401 UBUNTU:CVE-2020-6402 UBUNTU:CVE-2020-6403 UBUNTU:CVE-2020-6404 UBUNTU:CVE-2020-6405 UBUNTU:CVE-2020-6406 UBUNTU:CVE-2020-6408 UBUNTU:CVE-2020-6409 UBUNTU:CVE-2020-6410 UBUNTU:CVE-2020-6411 UBUNTU:CVE-2020-6412 UBUNTU:CVE-2020-6413 UBUNTU:CVE-2020-6414 UBUNTU:CVE-2020-6415 UBUNTU:CVE-2020-6416 UBUNTU:CVE-2020-6417 USN-4298-1 USN-4298-2 bnc#1162833 rh#1770768 rh#1787032 rh#1788846 rh#1789364 rh#1801160 rh#1801161 rh#1801162 rh#1801163 rh#1801164 rh#1801165 rh#1801166 rh#1801167 rh#1801168 rh#1801169 rh#1801170 rh#1801171 rh#1801172 rh#1801173 rh#1801174 rh#1801175 rh#1801176 rh#1801177 rh#1801178 rh#1801179 rh#1801180 rh#1801181 rh#1801182 rh#1801184 rh#1801185 rh#1801186 rh#1801187 rh#1801188 rh#1801189 rh#1801190 rh#1801191 rh#1801192 rh#1801193 |
CVE-2020-6416 | sqlite3:Released | important | () | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2019-19880 CONFIRM:security.netapp.com:CVE-2019-19923 CVE-2019-19880 CVE-2019-19923 CVE-2019-19926 CVE-2020-6381 CVE-2020-6382 CVE-2020-6385 CVE-2020-6387 CVE-2020-6388 CVE-2020-6389 CVE-2020-6390 CVE-2020-6391 CVE-2020-6392 CVE-2020-6393 CVE-2020-6394 CVE-2020-6395 CVE-2020-6396 CVE-2020-6397 CVE-2020-6398 CVE-2020-6399 CVE-2020-6400 CVE-2020-6401 CVE-2020-6402 CVE-2020-6403 CVE-2020-6404 CVE-2020-6405 CVE-2020-6406 CVE-2020-6408 CVE-2020-6409 CVE-2020-6410 CVE-2020-6411 CVE-2020-6412 CVE-2020-6413 CVE-2020-6414 CVE-2020-6415 CVE-2020-6416 CVE-2020-6417 D:CVE-2020-6391 DSA-4638 FEDORA:FEDORA-2020-39e0b8bd14 FEDORA:FEDORA-2020-f6271d7afa GLSA-202003-08 MISC:chromereleases.googleblog.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6382 MISC:crbug.com:CVE-2020-6385 MISC:crbug.com:CVE-2020-6387 MISC:crbug.com:CVE-2020-6388 MISC:crbug.com:CVE-2020-6389 MISC:crbug.com:CVE-2020-6390 MISC:crbug.com:CVE-2020-6391 MISC:crbug.com:CVE-2020-6392 MISC:crbug.com:CVE-2020-6393 MISC:crbug.com:CVE-2020-6394 MISC:crbug.com:CVE-2020-6395 MISC:crbug.com:CVE-2020-6396 MISC:crbug.com:CVE-2020-6397 MISC:crbug.com:CVE-2020-6398 MISC:crbug.com:CVE-2020-6399 MISC:crbug.com:CVE-2020-6400 MISC:crbug.com:CVE-2020-6401 MISC:crbug.com:CVE-2020-6402 MISC:crbug.com:CVE-2020-6403 MISC:crbug.com:CVE-2020-6404 MISC:crbug.com:CVE-2020-6405 MISC:crbug.com:CVE-2020-6406 MISC:crbug.com:CVE-2020-6408 MISC:crbug.com:CVE-2020-6409 MISC:crbug.com:CVE-2020-6410 MISC:crbug.com:CVE-2020-6411 MISC:crbug.com:CVE-2020-6412 MISC:crbug.com:CVE-2020-6413 MISC:crbug.com:CVE-2020-6414 MISC:crbug.com:CVE-2020-6415 MISC:crbug.com:CVE-2020-6416 MISC:crbug.com:CVE-2020-6417 MISC:github.com:CVE-2019-19880 MISC:github.com:CVE-2019-19923 MISC:github.com:CVE-2019-19926 MISC:packetstormsecurity.com:CVE-2020-6388 MISC:packetstormsecurity.com:CVE-2020-6390 MISC:www.oracle.com:CVE-2019-2880 Oracle:CVE-2019-18197 RH:CVE-2019-19880 RH:CVE-2019-19923 RH:CVE-2019-19926 RH:CVE-2020-6381 RH:CVE-2020-6382 RH:CVE-2020-6385 RH:CVE-2020-6387 RH:CVE-2020-6388 RH:CVE-2020-6389 RH:CVE-2020-6390 RH:CVE-2020-6391 RH:CVE-2020-6392 RH:CVE-2020-6393 RH:CVE-2020-6394 RH:CVE-2020-6395 RH:CVE-2020-6396 RH:CVE-2020-6397 RH:CVE-2020-6398 RH:CVE-2020-6399 RH:CVE-2020-6400 RH:CVE-2020-6401 RH:CVE-2020-6402 RH:CVE-2020-6403 RH:CVE-2020-6404 RH:CVE-2020-6405 RH:CVE-2020-6406 RH:CVE-2020-6408 RH:CVE-2020-6409 RH:CVE-2020-6410 RH:CVE-2020-6411 RH:CVE-2020-6412 RH:CVE-2020-6413 RH:CVE-2020-6414 RH:CVE-2020-6415 RH:CVE-2020-6416 RH:CVE-2020-6417 RHSA-2020:0514 RHSA-2020:1810 RHSA-2020:4442 SMASH Issue 252466 SUSE:openSUSE-SU-2020:0189 SUSE:openSUSE-SU-2020:0210 SUSE:openSUSE-SU-2020:0233 UBUNTU:CVE-2019-19880 UBUNTU:CVE-2019-19923 UBUNTU:CVE-2019-19926 UBUNTU:CVE-2020-6381 UBUNTU:CVE-2020-6382 UBUNTU:CVE-2020-6385 UBUNTU:CVE-2020-6387 UBUNTU:CVE-2020-6388 UBUNTU:CVE-2020-6389 UBUNTU:CVE-2020-6390 UBUNTU:CVE-2020-6391 UBUNTU:CVE-2020-6392 UBUNTU:CVE-2020-6393 UBUNTU:CVE-2020-6394 UBUNTU:CVE-2020-6395 UBUNTU:CVE-2020-6396 UBUNTU:CVE-2020-6397 UBUNTU:CVE-2020-6398 UBUNTU:CVE-2020-6399 UBUNTU:CVE-2020-6400 UBUNTU:CVE-2020-6401 UBUNTU:CVE-2020-6402 UBUNTU:CVE-2020-6403 UBUNTU:CVE-2020-6404 UBUNTU:CVE-2020-6405 UBUNTU:CVE-2020-6406 UBUNTU:CVE-2020-6408 UBUNTU:CVE-2020-6409 UBUNTU:CVE-2020-6410 UBUNTU:CVE-2020-6411 UBUNTU:CVE-2020-6412 UBUNTU:CVE-2020-6413 UBUNTU:CVE-2020-6414 UBUNTU:CVE-2020-6415 UBUNTU:CVE-2020-6416 UBUNTU:CVE-2020-6417 USN-4298-1 USN-4298-2 bnc#1162833 rh#1770768 rh#1787032 rh#1788846 rh#1789364 rh#1801160 rh#1801161 rh#1801162 rh#1801163 rh#1801164 rh#1801165 rh#1801166 rh#1801167 rh#1801168 rh#1801169 rh#1801170 rh#1801171 rh#1801172 rh#1801173 rh#1801174 rh#1801175 rh#1801176 rh#1801177 rh#1801178 rh#1801179 rh#1801180 rh#1801181 rh#1801182 rh#1801184 rh#1801185 rh#1801186 rh#1801187 rh#1801188 rh#1801189 rh#1801190 rh#1801191 rh#1801192 rh#1801193 |
CVE-2020-6417 | sqlite3:Released | important | () | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2019-19880 CONFIRM:security.netapp.com:CVE-2019-19923 CVE-2019-19880 CVE-2019-19923 CVE-2019-19926 CVE-2020-6381 CVE-2020-6382 CVE-2020-6385 CVE-2020-6387 CVE-2020-6388 CVE-2020-6389 CVE-2020-6390 CVE-2020-6391 CVE-2020-6392 CVE-2020-6393 CVE-2020-6394 CVE-2020-6395 CVE-2020-6396 CVE-2020-6397 CVE-2020-6398 CVE-2020-6399 CVE-2020-6400 CVE-2020-6401 CVE-2020-6402 CVE-2020-6403 CVE-2020-6404 CVE-2020-6405 CVE-2020-6406 CVE-2020-6408 CVE-2020-6409 CVE-2020-6410 CVE-2020-6411 CVE-2020-6412 CVE-2020-6413 CVE-2020-6414 CVE-2020-6415 CVE-2020-6416 CVE-2020-6417 D:CVE-2020-6391 DSA-4638 FEDORA:FEDORA-2020-39e0b8bd14 FEDORA:FEDORA-2020-f6271d7afa GLSA-202003-08 MISC:chromereleases.googleblog.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6381 MISC:crbug.com:CVE-2020-6382 MISC:crbug.com:CVE-2020-6385 MISC:crbug.com:CVE-2020-6387 MISC:crbug.com:CVE-2020-6388 MISC:crbug.com:CVE-2020-6389 MISC:crbug.com:CVE-2020-6390 MISC:crbug.com:CVE-2020-6391 MISC:crbug.com:CVE-2020-6392 MISC:crbug.com:CVE-2020-6393 MISC:crbug.com:CVE-2020-6394 MISC:crbug.com:CVE-2020-6395 MISC:crbug.com:CVE-2020-6396 MISC:crbug.com:CVE-2020-6397 MISC:crbug.com:CVE-2020-6398 MISC:crbug.com:CVE-2020-6399 MISC:crbug.com:CVE-2020-6400 MISC:crbug.com:CVE-2020-6401 MISC:crbug.com:CVE-2020-6402 MISC:crbug.com:CVE-2020-6403 MISC:crbug.com:CVE-2020-6404 MISC:crbug.com:CVE-2020-6405 MISC:crbug.com:CVE-2020-6406 MISC:crbug.com:CVE-2020-6408 MISC:crbug.com:CVE-2020-6409 MISC:crbug.com:CVE-2020-6410 MISC:crbug.com:CVE-2020-6411 MISC:crbug.com:CVE-2020-6412 MISC:crbug.com:CVE-2020-6413 MISC:crbug.com:CVE-2020-6414 MISC:crbug.com:CVE-2020-6415 MISC:crbug.com:CVE-2020-6416 MISC:crbug.com:CVE-2020-6417 MISC:github.com:CVE-2019-19880 MISC:github.com:CVE-2019-19923 MISC:github.com:CVE-2019-19926 MISC:packetstormsecurity.com:CVE-2020-6388 MISC:packetstormsecurity.com:CVE-2020-6390 MISC:www.oracle.com:CVE-2019-2880 Oracle:CVE-2019-18197 RH:CVE-2019-19880 RH:CVE-2019-19923 RH:CVE-2019-19926 RH:CVE-2020-6381 RH:CVE-2020-6382 RH:CVE-2020-6385 RH:CVE-2020-6387 RH:CVE-2020-6388 RH:CVE-2020-6389 RH:CVE-2020-6390 RH:CVE-2020-6391 RH:CVE-2020-6392 RH:CVE-2020-6393 RH:CVE-2020-6394 RH:CVE-2020-6395 RH:CVE-2020-6396 RH:CVE-2020-6397 RH:CVE-2020-6398 RH:CVE-2020-6399 RH:CVE-2020-6400 RH:CVE-2020-6401 RH:CVE-2020-6402 RH:CVE-2020-6403 RH:CVE-2020-6404 RH:CVE-2020-6405 RH:CVE-2020-6406 RH:CVE-2020-6408 RH:CVE-2020-6409 RH:CVE-2020-6410 RH:CVE-2020-6411 RH:CVE-2020-6412 RH:CVE-2020-6413 RH:CVE-2020-6414 RH:CVE-2020-6415 RH:CVE-2020-6416 RH:CVE-2020-6417 RHSA-2020:0514 RHSA-2020:1810 RHSA-2020:4442 SMASH Issue 252466 SUSE:openSUSE-SU-2020:0189 SUSE:openSUSE-SU-2020:0210 SUSE:openSUSE-SU-2020:0233 UBUNTU:CVE-2019-19880 UBUNTU:CVE-2019-19923 UBUNTU:CVE-2019-19926 UBUNTU:CVE-2020-6381 UBUNTU:CVE-2020-6382 UBUNTU:CVE-2020-6385 UBUNTU:CVE-2020-6387 UBUNTU:CVE-2020-6388 UBUNTU:CVE-2020-6389 UBUNTU:CVE-2020-6390 UBUNTU:CVE-2020-6391 UBUNTU:CVE-2020-6392 UBUNTU:CVE-2020-6393 UBUNTU:CVE-2020-6394 UBUNTU:CVE-2020-6395 UBUNTU:CVE-2020-6396 UBUNTU:CVE-2020-6397 UBUNTU:CVE-2020-6398 UBUNTU:CVE-2020-6399 UBUNTU:CVE-2020-6400 UBUNTU:CVE-2020-6401 UBUNTU:CVE-2020-6402 UBUNTU:CVE-2020-6403 UBUNTU:CVE-2020-6404 UBUNTU:CVE-2020-6405 UBUNTU:CVE-2020-6406 UBUNTU:CVE-2020-6408 UBUNTU:CVE-2020-6409 UBUNTU:CVE-2020-6410 UBUNTU:CVE-2020-6411 UBUNTU:CVE-2020-6412 UBUNTU:CVE-2020-6413 UBUNTU:CVE-2020-6414 UBUNTU:CVE-2020-6415 UBUNTU:CVE-2020-6416 UBUNTU:CVE-2020-6417 USN-4298-1 USN-4298-2 bnc#1162833 rh#1770768 rh#1787032 rh#1788846 rh#1789364 rh#1801160 rh#1801161 rh#1801162 rh#1801163 rh#1801164 rh#1801165 rh#1801166 rh#1801167 rh#1801168 rh#1801169 rh#1801170 rh#1801171 rh#1801172 rh#1801173 rh#1801174 rh#1801175 rh#1801176 rh#1801177 rh#1801178 rh#1801179 rh#1801180 rh#1801181 rh#1801182 rh#1801184 rh#1801185 rh#1801186 rh#1801187 rh#1801188 rh#1801189 rh#1801190 rh#1801191 rh#1801192 rh#1801193 |
CVE-2020-6829 | mozilla-nss:Released | critical | () | CVE-2020-12400 CVE-2020-12401 CVE-2020-12403 CVE-2020-6829 D:CVE-2020-12403 MISC:bugzilla.mozilla.org:CVE-2020-12400 MISC:bugzilla.mozilla.org:CVE-2020-12401 MISC:bugzilla.mozilla.org:CVE-2020-6829 MISC:developer.mozilla.org:CVE-2020-12403 MISC:www.mozilla.org:CVE-2020-15663 MISC:www.mozilla.org:CVE-2020-15664 RH:CVE-2020-12400 RH:CVE-2020-12401 RH:CVE-2020-12403 RH:CVE-2020-6829 RHSA-2020:4076 RHSA-2021:0538 RHSA-2021:0758 RHSA-2021:0876 RHSA-2021:1026 SMASH Issue 264605 SMASH Issue 264622 UBUNTU:CVE-2020-12400 UBUNTU:CVE-2020-12401 UBUNTU:CVE-2020-12403 UBUNTU:CVE-2020-6829 bnc#1174763 https://lists.debian.org/debian-lts-announce/2023/02/msg00021.html https://security.netapp.com/advisory/ntap-20230324-0006/ rh#1826187 rh#1851294 rh#1853983 rh#1868931 |
CVE-2020-7053 | kernel-source-rt:Not affected | moderate | 5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) | CONFIRM:bugs.launchpad.net:CVE-2020-7053 CVE-2020-7053 MISC:bugs.launchpad.net:CONFIRM:N/A MISC:cdn.kernel.org:CVE-2020-7053 MISC:git.kernel.org:CVE-2020-7053 MISC:lore.kernel.org:CVE-2020-7053 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2020/04/06/2 OSS:2020/04/30/5 OSS:2020/06/04/4 RH:CVE-2020-7053 RHSA-2020:1567 RHSA-2020:1769 RHSA-2021:0856 RHSA-2021:0857 SMASH Issue 250881 UBUNTU:CVE-2020-7053 bnc#1160966 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1795624 rh#1831726 rh#1831849 rh#1832860 rh#1839634 rh#1842525 rh#1851480 rh#1997467 |
CVE-2020-7595 | libxml2:Released | moderate | 4.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:cert-portal.siemens.com:CVE-2019-19956 CONFIRM:security.netapp.com:CVE-2019-20388 CONFIRM:us-cert.cisa.gov:CVE-2019-19956 CVE-2020-7595 FEDORA:FEDORA-2020-0c71c00af4 FEDORA:FEDORA-2020-41fe1680f6 FEDORA:FEDORA-2020-7694e8be73 GLSA-202010-04 MISC:gitlab.gnome.org:CVE-2020-7595 MISC:www.oracle.com:CVE-2015-7501 MISC:www.oracle.com:CVE-2021-35666 MISC:www.oracle.com:CVE-2022-21498 MISC:www.oracle.com:CVE-2022-21586 MLIST:[debian-lts-announce] 20200909 [SECURITY] [DLA 2369-1] libxml2 security update Oracle:CVE-2019-13117 Oracle:CVE-2019-2737 Oracle:CVE-2019-2739 Oracle:CVE-2019-2740 Oracle:CVE-2019-2758 Oracle:CVE-2019-2805 Oracle:CVE-2019-2938 Oracle:CVE-2019-2974 Oracle:CVE-2020-2574 Oracle:CVE-2020-7595 RH:CVE-2020-7595 RHSA-2020:2644 RHSA-2020:2646 RHSA-2020:3996 RHSA-2020:4479 SMASH Issue 251504 SUSE:openSUSE-SU-2020:0681 UBUNTU:CVE-2020-7595 USN-4274-1 bnc#1161517 rh#1728546 rh#1788856 rh#1799734 rh#1799786 |
CVE-2020-8025 | permissions:Released | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L) | CVE-2020-8025 RH:CVE-2020-8025 SMASH Issue 259623 SMASH Issue 263312 UBUNTU:CVE-2020-8025 bnc#1171883 rh#1919933 |
CVE-2020-8037 | tcpdump:Released | moderate | 4.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:support.apple.com:CVE-2020-3838 CONFIRM:support.apple.com:CVE-2020-7463 CVE-2020-8037 FEDORA:FEDORA-2020-c5e78886d6 FEDORA:FEDORA-2020-fae2e1f2bc FULLDISC:20210427 APPLE-SA-2021-04-26-3 Security Update 2021-002 Catalina MISC:github.com:CVE-2020-8037 MLIST:[debian-lts-announce] 20201110 [SECURITY] [DLA 2444-1] tcpdump security update RH:CVE-2020-8037 RHSA-2021:4236 SMASH Issue 270846 UBUNTU:CVE-2020-8037 bnc#1178466 rh#1895080 |
CVE-2020-8169 | curl:Released | moderate | 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) | CONFIRM:cert-portal.siemens.com:CVE-2020-8286 CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CVE-2020-8169 DSA-4881 MISC:curl.haxx.se:OSS:2020/Q2/208 MISC:curl.haxx.se:OSS:2020/Q2/209 MISC:curl.se:CVE-2020-8169 MISC:github.com:OSS:2020/Q2/208 MISC:hackerone.com:CVE-2020-8169 OSS:2020/Q2/208 OSS:2020/Q3/6 OSS:2020/Q3/60 OSS:2020/Q3/8 RH:CVE-2020-8169 RHSA-2021:2471 RHSA-2021:2472 SMASH Issue 261677 SMASH Issue 261678 UBUNTU:CVE-2020-8169 bdo#965280 bdo#965281 bdo#968831 bdo#977161 bdo#977162 bdo#977163 bnc#1173026 https://www.debian.org/security/2021/dsa-4881 rh#1847915 rh#1847916 |
CVE-2020-8177 | curl:Released | important | 8.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H) | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CVE-2020-8177 DSA-4881 MISC:curl.haxx.se:OSS:2020/Q2/208 MISC:curl.haxx.se:OSS:2020/Q2/209 MISC:curl.se:CVE-2020-8177 MISC:github.com:OSS:2020/Q2/209 MISC:github.com:OSS:2020/Q3/4 MISC:github.com:OSS:2020/Q3/50 MISC:hackerone.com:CVE-2020-8177 MISC:nvd.nist.gov:OSS:2020/Q3/4 MISC:www.oracle.com:CVE-2022-21403 OSS:2020/Q2/209 OSS:2020/Q3/4 OSS:2020/Q3/45 OSS:2020/Q3/50 OSS:2020/Q3/6 OSS:2020/Q3/60 OSS:2020/Q3/8 RH:CVE-2020-8177 RHSA-2020:4599 RHSA-2020:5002 RHSA-2020:5417 SMASH Issue 261679 SMASH Issue 261680 SMASH Issue 262764 UBUNTU:CVE-2020-8177 bdo#965280 bdo#965281 bdo#968831 bdo#977161 bdo#977162 bdo#977163 bnc#1173027 https://www.debian.org/security/2021/dsa-4881 rh#1847915 |
CVE-2020-8231 | curl:Released | low | 3.7 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N) | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CVE-2020-8231 DSA-4881 GLSA-202012-14 MISC:curl.haxx.se:OSS:2020/Q3/123 MISC:github.com:OSS:2020/Q3/123 MISC:hackerone.com:CVE-2020-8231 MISC:www.oracle.com:CVE-2022-21498 MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 MLIST:[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 OSS:2020/Q3/123 Oracle:CVE-2020-8231 RH:CVE-2020-8231 RHSA-2021:1610 SMASH Issue 265013 SMASH Issue 265014 UBUNTU:CVE-2020-8231 bdo#965280 bdo#965281 bdo#968831 bdo#977161 bdo#977162 bdo#977163 bnc#1175109 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E https://www.debian.org/security/2021/dsa-4881 rh#1868032 |
CVE-2020-8277 | c-ares:Released | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:nodejs.org:CVE-2020-8277 CVE-2020-8277 FEDORA:FEDORA-2020-307e873389 FEDORA:FEDORA-2020-7473744de1 FEDORA:FEDORA-2021-afed2b904e FEDORA:FEDORA-2021-ee913722db GLSA-202012-11 GLSA-202101-07 MISC:hackerone.com:CVE-2020-8277 MISC:www.oracle.com:CVE-2012-2098 MISC:www.oracle.com:CVE-2021-3450 MISC:www.oracle.com:CVE-2021-35666 MISC:www.oracle.com:CVE-2022-21498 N/A:N/A Oracle:CVE-2020-8277 RH:CVE-2020-8277 RHSA-2020:5305 RHSA-2020:5499 RHSA-2021:0421 RHSA-2021:0551 SMASH Issue 271836 SMASH Issue 271837 bnc#1178882 rh#1898554 |
CVE-2020-8284 | curl:Released | moderate | 4.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N) | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2020-8284 CONFIRM:support.apple.com:CVE-2020-3838 CONFIRM:support.apple.com:CVE-2020-7463 CVE-2020-8284 DSA-4881 FEDORA:FEDORA-2020-7ab62c73bc FEDORA:FEDORA-2020-ceaf490686 GLSA-202012-14 MISC:curl.se:MLIST:[oss-security] 20201209 [SECURITY ADVISORY] curl: trusting FTP PASV responses MISC:github.com:MLIST:[oss-security] 20201209 [SECURITY ADVISORY] curl: trusting FTP PASV responses MISC:hackerone.com:CVE-2020-8284 MISC:www.oracle.com:CVE-2021-3450 MISC:www.oracle.com:CVE-2022-21403 MISC:www.oracle.com:CVE-2022-21498 MLIST:[debian-lts-announce] 20201219 [SECURITY] [DLA 2500-1] curl security update N/A:N/A OSS:2020/Q4/197 RH:CVE-2020-8284 RHSA-2021:1610 RHSA-2021:2471 RHSA-2021:2472 SMASH Issue 272450 SMASH Issue 272451 bdo#965280 bdo#965281 bdo#968831 bdo#977161 bdo#977162 bdo#977163 bnc#1179398 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/ https://www.debian.org/security/2021/dsa-4881 rh#1902667 |
CVE-2020-8285 | curl:Released | moderate | 6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2020-8284 CONFIRM:support.apple.com:CVE-2020-3838 CONFIRM:support.apple.com:CVE-2020-7463 CVE-2020-8285 DSA-4881 FEDORA:FEDORA-2020-7ab62c73bc FEDORA:FEDORA-2020-ceaf490686 FULLDISC:20210427 APPLE-SA-2021-04-26-3 Security Update 2021-002 Catalina GLSA-202012-14 MISC:curl.se:OSS:2020/Q4/198 MISC:github.com:CVE-2020-8285 MISC:github.com:OSS:2020/Q4/198 MISC:hackerone.com:CVE-2020-8285 MISC:www.oracle.com:CVE-2021-3450 MISC:www.oracle.com:CVE-2022-21403 MISC:www.oracle.com:CVE-2022-21498 MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 MLIST:[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 MLIST:[debian-lts-announce] 20201219 [SECURITY] [DLA 2500-1] curl security update N/A:N/A OSS:2020/Q4/198 Oracle:CVE-2020-8285 RH:CVE-2020-8285 RHSA-2021:1610 RHSA-2021:2471 RHSA-2021:2472 SMASH Issue 272452 SMASH Issue 272453 bdo#965280 bdo#965281 bdo#968831 bdo#977161 bdo#977162 bdo#977163 bnc#1179399 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/ https://www.debian.org/security/2021/dsa-4881 jsc#CAR-999 rh#1902687 |
CVE-2020-8286 | curl:Released | moderate | 6.5 (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N) | CONFIRM:cert-portal.siemens.com:CVE-2020-8286 CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2020-8284 CONFIRM:support.apple.com:CVE-2020-3838 CONFIRM:support.apple.com:CVE-2020-7463 CVE-2020-8286 DSA-4881 FEDORA:FEDORA-2020-7ab62c73bc FEDORA:FEDORA-2020-ceaf490686 FULLDISC:20210427 APPLE-SA-2021-04-26-2 macOS Big Sur 11.3 FULLDISC:20210427 APPLE-SA-2021-04-26-3 Security Update 2021-002 Catalina FULLDISC:20210427 APPLE-SA-2021-04-26-4 Security Update 2021-003 Mojave GLSA-202012-14 MISC:curl.se:OSS:2020/Q4/199 MISC:github.com:OSS:2020/Q4/199 MISC:hackerone.com:CVE-2020-8286 MISC:www.oracle.com:CVE-2021-3450 MISC:www.oracle.com:CVE-2022-21498 MLIST:[debian-lts-announce] 20201219 [SECURITY] [DLA 2500-1] curl security update N/A:N/A OSS:2020/Q4/199 Oracle:CVE-2020-8286 RH:CVE-2020-8286 RHSA-2021:1610 RHSA-2021:2471 RHSA-2021:2472 SMASH Issue 272731 SMASH Issue 272732 bdo#965280 bdo#965281 bdo#968831 bdo#977161 bdo#977162 bdo#977163 bnc#1179593 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/ https://www.debian.org/security/2021/dsa-4881 rh#1906096 |
CVE-2020-8428 | kernel-source-rt:Already fixed | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2020-9383 CVE-2020-8428 DSA-4667 DSA-4698 MISC:bugs.launchpad.net:CONFIRM:N/A MISC:git.kernel.org:CVE-2020-8428 MISC:git.kernel.org:MLIST:[oss-security] 20200202 Re: Linux kernel: user-triggerable read-after-free crash or 1-bit infoleak oracle in open(2) MISC:github.com:CVE-2020-8428 MISC:packetstormsecurity.com:CVE-2020-8428 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MISC:www.openwall.com:CVE-2020-8428 MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update MLIST:[oss-security] 20200129 Re: Linux kernel: user-triggerable read-after-free crash or 1-bit infoleak oracle in open(2) MLIST:[oss-security] 20200202 Re: Linux kernel: user-triggerable read-after-free crash or 1-bit infoleak oracle in open(2) OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2020/04/06/2 OSS:2020/04/30/5 OSS:2020/06/04/4 OSS:2020/Q1/41 RH:CVE-2020-8428 SMASH Issue 252052 SUSE:openSUSE-SU-2020:0336 UBUNTU:CVE-2020-8428 USN-4318-1 USN-4319-1 USN-4320-1 USN-4324-1 USN-4325-1 bdo#952660 bnc#1162109 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1773519 rh#1774983 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1795624 rh#1796939 rh#1831726 rh#1831849 rh#1832860 rh#1839634 rh#1842525 rh#1851480 rh#1997467 |
CVE-2020-8492 | python3:Released | moderate | 6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2020-8492 CVE-2020-8492 FEDORA:FEDORA-2020-6a88dad4a0 FEDORA:FEDORA-2020-8bdd3fd7a4 FEDORA:FEDORA-2020-98e0f0f11b FEDORA:FEDORA-2020-ea5bdbcc90 GLSA-202005-09 MISC:bugs.python.org:CVE-2020-8492 MISC:github.com:CVE-2020-8492 MISC:python-security.readthedocs.io:CVE-2020-8492 MLIST:[debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update RH:CVE-2020-8492 RHSA-2020:3888 RHSA-2020:4285 RHSA-2020:4433 RHSA-2020:4641 SMASH Issue 252192 SUSE:openSUSE-SU-2020:0274 UBUNTU:CVE-2020-8492 USN-4333-1 USN-4333-2 bnc#1162367 https://lists.apache.org/thread.html/rdb31a608dd6758c6093fd645aea3fbf022dd25b37109b6aaea5bc0b5@%3Ccommits.cassandra.apache.org%3E https://lists.apache.org/thread.html/rfec113c733162b39633fd86a2d0f34bf42ac35f711b3ec1835c774da@%3Ccommits.cassandra.apache.org%3E https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html rh#1800749 rh#1809065 |
CVE-2020-8647 | kernel-source-rt:Already fixed | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L) | CVE-2020-8647 DSA-4698 MISC:bugs.launchpad.net:CONFIRM:N/A MISC:bugzilla.kernel.org:CVE-2020-8647 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2020/04/06/2 OSS:2020/04/30/5 OSS:2020/06/04/4 RH:CVE-2020-8647 RHSA-2020:4060 RHSA-2020:4062 RHSA-2020:4431 RHSA-2020:4609 RHSA-2022:1209 RHSA-2022:1213 SMASH Issue 252527 SUSE:openSUSE-SU-2020:0388 UBUNTU:CVE-2020-8647 bdo#952660 bnc#1162929 linux.git:commit:513dc792d6060d5ef572e43852683097a8420f56 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1667782 rh#1707796 rh#1773519 rh#1774983 rh#1783498 rh#1795624 rh#1802563 rh#1831726 rh#1831849 rh#1832860 rh#1839634 rh#1842525 rh#1851480 |
CVE-2020-8648 | kernel-source-rt:Already fixed | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2020-8648 CVE-2020-8648 DSA-4698 MISC:bugs.launchpad.net:CONFIRM:N/A MISC:bugzilla.kernel.org:CVE-2020-8648 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2020/04/06/2 OSS:2020/04/30/5 OSS:2020/06/04/4 RH:CVE-2020-8648 RHSA-2020:4431 RHSA-2020:4609 RHSA-2021:2314 RHSA-2021:2316 RHSA-2021:3320 RHSA-2021:3522 SMASH Issue 252528 SUSE:openSUSE-SU-2020:0336 UBUNTU:CVE-2020-8648 USN-4342-1 USN-4344-1 USN-4345-1 USN-4346-1 bdo#952660 bnc#1162928 linux.git:commit:07e6124a1a46b4b5a9b3cacc0c306b50da87abf5 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1667782 rh#1773519 rh#1774983 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1795624 rh#1802559 rh#1831726 rh#1831849 rh#1832860 rh#1839634 rh#1842525 rh#1851480 rh#1997467 |
CVE-2020-8649 | kernel-source-rt:Already fixed | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L) | CVE-2020-8649 DSA-4698 MISC:bugs.launchpad.net:CONFIRM:N/A MISC:bugzilla.kernel.org:CVE-2020-8649 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2020/04/06/2 OSS:2020/04/30/5 OSS:2020/06/04/4 RH:CVE-2020-8649 RHSA-2020:4060 RHSA-2020:4062 RHSA-2020:4431 RHSA-2020:4609 RHSA-2022:1209 RHSA-2022:1213 SMASH Issue 252529 SUSE:openSUSE-SU-2020:0388 UBUNTU:CVE-2020-8649 bdo#952660 bnc#1162931 linux.git:commit:513dc792d6060d5ef572e43852683097a8420f56 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1667782 rh#1707796 rh#1773519 rh#1774983 rh#1783498 rh#1795624 rh#1802555 rh#1831726 rh#1831849 rh#1832860 rh#1839634 rh#1842525 rh#1851480 |
CVE-2020-8694 | kernel-source-rt:Released | moderate | 5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N) | CONFIRM:cert-portal.siemens.com:CVE-2020-8745 CVE-2020-8694 MISC:git.kernel.org:OSS:2020/Q4/110 MISC:www.intel.com:CVE-2020-8694 MISC:www.intel.com:MLIST:[oss-security] 20201126 Xen Security Advisory 351 v2 (CVE-2020-28368) - Information leak via power sidechannel MLIST:[debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update MLIST:[debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update OSS:2020/Q4/110 RH:CVE-2020-8694 SMASH Issue 258389 SMASH Issue 258391 bnc#1170415 bnc#1178700 rh#1828580 |
CVE-2020-8834 | kernel-source-rt:Not affected | important | 7.1 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H) | CONFIRM:N/A CVE-2020-8834 MISC:bugs.launchpad.net:CONFIRM:N/A MISC:git.kernel.org:MLIST:[oss-security] 20210510 Re: CVE-2021-23133: Linux kernel: race condition in sctp sockets MISC:github.com:MLIST:[oss-security] 20211007 CVE-2021-33035: Apache OpenOffice: Buffer overflow from a crafted DBF file N/A OSS:2020/04/06/2 OSS:2020/04/30/5 OSS:2020/06/04/4 OSS:2020/Q2/15 OSS:2020/Q4/161 OSS:2021/Q4/14 RH:CVE-2020-8834 RHSA-2020:2854 SMASH Issue 256214 SMASH Issue 256215 SUSE:openSUSE-SU-2020:0543 UBUNTU:CVE-2020-8834 USN-4318-1 bnc#1168276 bnc#1173945 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1707796 rh#1774983 rh#1795624 rh#1819615 rh#1831726 rh#1831849 rh#1832860 rh#1839634 rh#1842525 |
CVE-2020-8835 | kernel-source-rt:Already fixed | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:N/A CONFIRM:security.netapp.com:CVE-2019-20636 CVE-2020-8835 FEDORA:FEDORA-2020-4ef0bcc89c FEDORA:FEDORA-2020-666f3b1ac3 FEDORA:FEDORA-2020-73c00eda1c MISC:bugs.launchpad.net:CONFIRM:N/A MISC:git.kernel.org:MLIST:[oss-security] 20210510 Re: CVE-2021-23133: Linux kernel: race condition in sctp sockets MISC:github.com:MLIST:[oss-security] 20211007 CVE-2021-33035: Apache OpenOffice: Buffer overflow from a crafted DBF file MISC:people.canonical.com:CONFIRM:N/A MISC:www.qualys.com:MISC:www.openwall.com:CVE-2021-33909 MISC:www.thezdi.com:MISC:www.openwall.com:CVE-2021-33909 N/A OSS:2020/03/30/3 OSS:2020/Q1/127 OSS:2020/Q4/161 OSS:2021/07/20/1 OSS:2021/Q4/14 RH:CVE-2020-8835 SMASH Issue 255943 SMASH Issue 255944 UBUNTU:CVE-2020-8835 USN-4313-1 ZDI-20-350 bnc#1167722 bnc#1173755 rh#1817350 |
CVE-2020-8992 | kernel-source-rt:Already fixed | low | 2.1 (CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:security.netapp.com:CVE-2020-9383 CVE-2020-8992 MISC:bugs.launchpad.net:CONFIRM:N/A MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MISC:patchwork.ozlabs.org:CVE-2020-8992 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2020/04/06/2 OSS:2020/04/30/5 OSS:2020/06/04/4 RH:CVE-2020-8992 SMASH Issue 253189 SUSE:openSUSE-SU-2020:0336 UBUNTU:CVE-2020-8992 USN-4318-1 USN-4324-1 USN-4342-1 USN-4344-1 USN-4419-1 bnc#1164069 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1667782 rh#1773519 rh#1774983 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1795624 rh#1805887 rh#1831726 rh#1831849 rh#1832860 rh#1839634 rh#1842525 rh#1997467 |
CVE-2020-9327 | sqlite3:Released | moderate | 4.3 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2020-9327 CVE-2020-9327 GLSA-202003-16 MISC:www.oracle.com:CVE-2012-2098 MISC:www.oracle.com:CVE-2013-7285 MISC:www.oracle.com:CVE-2015-7501 MISC:www.oracle.com:CVE-2021-3450 MISC:www.sqlite.org:CVE-2020-9327 RH:CVE-2020-9327 RHSA-2020:4442 SMASH Issue 253635 UBUNTU:CVE-2020-9327 USN-4298-1 bnc#1164719 rh#1809315 |
CVE-2020-9383 | kernel-source-rt:Already fixed | moderate | 4.3 (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CONFIRM:security.netapp.com:CVE-2020-9383 CVE-2020-9383 DSA-4698 L3:2 L3:56672 L3:56786 L3:57054 L3:60875 MISC:bugs.launchpad.net:CONFIRM:N/A MISC:git.kernel.org:CVE-2020-9383 MISC:github.com:CVE-2020-9383 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 OSS:2020/04/06/2 OSS:2020/04/30/5 OSS:2020/06/04/4 RH:CVE-2020-9383 RHSA-2020:2104 RHSA-2020:4060 RHSA-2020:4062 SMASH Issue 253765 SUSE:openSUSE-SU-2020:0388 UBUNTU:CVE-2020-9383 USN-4342-1 USN-4344-1 USN-4345-1 USN-4346-1 bdo#952660 bnc#1161561 bnc#1164507 bnc#1165111 bnc#1167316 bnc#1186627 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1667782 rh#1707796 rh#1773519 rh#1774983 rh#1783498 rh#1795624 rh#1810685 rh#1831726 rh#1831849 rh#1832860 rh#1839634 rh#1842525 rh#1851480 |
CVE-2020-9391 | kernel-source-rt:Unsupported | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2020-9383 CVE-2020-9391 FEDORA:FEDORA-2020-3cd64d683c MISC:bugzilla.redhat.com:MLIST:[oss-security] 20200225 CVE-2020-9391: Ignoring the top byte of addresses in brk causes heap corruption (AArch64) MISC:git.kernel.org:MLIST:[oss-security] 20200225 CVE-2020-9391: Ignoring the top byte of addresses in brk causes heap corruption (AArch64) MLIST:[oss-security] 20200225 CVE-2020-9391: Ignoring the top byte of addresses in brk causes heap corruption (AArch64) OSS:2020/Q1/94 RH:CVE-2020-9391 SMASH Issue 253741 UBUNTU:CVE-2020-9391 bnc#1165015 rh#1814237 |
CVE-2021-0129 | kernel-source-rt:Released | moderate | 6.4 (CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N) | CONFIRM:security.netapp.com:CVE-2021-0129 CONFIRM:www.intel.com:CVE-2020-26558 CVE-2021-0129 D:CVE-2021-0129 DSA-4951 GLSA-202209-16 MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update MLIST:[debian-lts-announce] 20210626 [SECURITY] [DLA 2692-1] bluez security update RHSA-2021:4140 RHSA-2021:4356 SMASH Issue 300781 SMASH Issue 300782 bdo#989614 bnc#1186463 rh#1918602 rh#1965038 |
CVE-2021-0342 | kernel-source-rt:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:source.android.com:CVE-2020-27059 CVE-2021-0342 RH:CVE-2021-0342 RHSA-2021:1578 RHSA-2021:1739 SMASH Issue 275073 bnc#1180812 bnc#1180859 rh#1915799 |
CVE-2021-0512 | kernel-source-rt:Released | important | 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-0512 MISC:source.android.com:CVE-2021-0533 RHSA-2021:3443 RHSA-2021:3445 RHSA-2021:3446 RHSA-2021:4056 RHSA-2021:4088 RHSA-2021:4122 RHSA-2021:4750 SMASH Issue 302634 bnc#1187595 bnc#1187597 rh#1974491 |
CVE-2021-0605 | kernel-source-rt:Released | important | 7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-0605 MISC:source.android.com:CVE-2021-0572 RHSA-2021:1578 RHSA-2021:1739 SMASH Issue 302724 SMASH Issue 302725 bnc#1187601 bnc#1187687 rh#1974823 |
CVE-2021-0606 | kernel-source-rt:Not affected | moderate | () | CVE-2021-0606 MISC:source.android.com:CVE-2021-0572 SMASH Issue 302726 SMASH Issue 302727 bnc#1187602 rh#1974827 |
CVE-2021-0707 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-0707 MISC:source.android.com:CVE-2021-39809 SMASH Issue 328864 bnc#1198437 bnc#1199332 rh#2123654 |
CVE-2021-0920 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-0920 DSA-5096 MISC:source.android.com:CVE-2021-1048 MLIST:[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update OSS:2021/07/22/1 OSS:2022/01/25/12 RHSA-2022:0590 RHSA-2022:0592 RHSA-2022:0620 RHSA-2022:0622 RHSA-2022:0629 RHSA-2022:0636 RHSA-2022:0771 RHSA-2022:0772 RHSA-2022:0777 RHSA-2022:0819 RHSA-2022:0823 RHSA-2022:0825 RHSA-2022:0841 RHSA-2022:0849 RHSA-2022:0851 RHSA-2022:0958 RHSA-2022:1103 RHSA-2022:1104 RHSA-2022:1106 RHSA-2022:1107 RHSA-2022:1263 RHSA-2022:1324 RHSA-2022:1373 RHSA-2022:1417 SMASH Issue 317304 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1193731 bnc#1194463 jsc#CAR-1457 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2029923 rh#2031930 rh#2044561 rh#2053632 rh#2059923 |
CVE-2021-0924 | kernel-source-rt:Not affected | important | () | CVE-2021-0924 MISC:source.android.com:CVE-2021-1048 SMASH Issue 317753 bnc#1193792 rh#2034699 |
CVE-2021-0929 | kernel-source-rt:Not affected | important | () | CVE-2021-0929 MISC:source.android.com:CVE-2021-1048 SMASH Issue 317748 bnc#1193794 rh#2034702 |
CVE-2021-0935 | kernel-source-rt:Already fixed | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-0935 DSA-5096 L3:62097 MISC:source.android.com:CVE-2021-0941 OSS:2021/07/22/1 OSS:2021/09/15/4 OSS:2022/01/25/12 SMASH Issue 313510 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1192032 bnc#1192042 bnc#1192638 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#1999544 rh#2010970 rh#2018225 rh#2044561 rh#2053632 rh#2059923 |
CVE-2021-0938 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2021-0938 MISC:source.android.com:CVE-2021-0941 SMASH Issue 313508 bnc#1192039 jsc#CAR-1186 rh#2018212 |
CVE-2021-0939 | kernel-source-rt:Not affected | low | () | CVE-2021-0939 MISC:source.android.com:CVE-2021-0941 SMASH Issue 313507 bnc#1192043 |
CVE-2021-0941 | kernel-source-rt:Released | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-0941 MISC:source.android.com:CVE-2021-0941 RHSA-2022:1975 RHSA-2022:1988 SMASH Issue 313505 bnc#1192045 bnc#1192048 rh#2018205 |
CVE-2021-0961 | kernel-source-rt:Not affected | moderate | () | CVE-2021-0961 MISC:source.android.com:CVE-2021-0971 SMASH Issue 317737 bnc#1193790 rh#2033723 |
CVE-2021-1043 | kernel-source-rt:Not affected | low | 4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N) | CVE-2021-1043 MISC:source.android.com:CVE-2021-1045 SMASH Issue 317665 bnc#1199357 jsc#CAR-1755 |
CVE-2021-1048 | kernel-source-rt:Already fixed | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-1048 MISC:source.android.com:CVE-2021-1048 SMASH Issue 317289 bnc#1193729 bnc#1194457 jsc#CAR-1378 rh#2031928 |
CVE-2021-20177 | kernel-source-rt:Released | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-20177 MISC:bugzilla.kernel.org:OSS:2021/Q1/20 MISC:git.kernel.org:OSS:2021/Q1/20 OSS:2021/Q1/20 RH:CVE-2021-20177 SMASH Issue 274991 bdo#970736 bdo#972345 bdo#977048 bdo#977615 bnc#1180765 jsc#CAR-997 rh#1914719 |
CVE-2021-20193 | tar:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CVE-2021-20193 GLSA-202105-29 MISC:git.savannah.gnu.org:CVE-2021-20193 MISC:savannah.gnu.org:CVE-2021-20193 RH:CVE-2021-20193 SMASH Issue 275732 bnc#1181131 rh#1917565 |
CVE-2021-20194 | kernel-source-rt:Released | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-20194 CVE-2021-20194 MISC:access.redhat.com:/errata/RHSA-2021:4140 MISC:access.redhat.com:/errata/RHSA-2021:4356 RH:CVE-2021-20194 RHSA-2021:4140 RHSA-2021:4356 SMASH Issue 277515 ZDI-21-100 bnc#1181637 bnc#1182010 rh#1912683 |
CVE-2021-20197 | binutils:Released | moderate | 6.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N) | CONFIRM:security.netapp.com:CVE-2021-20197 CVE-2021-20197 GLSA-202208-30 L3:60708 L3:61451 MISC:access.redhat.com:/errata/RHSA-2021:4364 MISC:sourceware.org:CVE-2021-20197 RH:CVE-2021-20197 RHSA-2021:4364 SMASH Issue 276583 bnc#1181452 bnc#1185742 bnc#1189527 jsc#CAR-1439 rh#1911437 rh#1911439 rh#1911441 rh#1911444 rh#1911691 rh#1913743 rh#1947111 |
CVE-2021-20200 | kernel-source-rt:Ignore | low | () | CVE-2021-20200 MISC:bugs.chromium.org:MLIST:[oss-security] 20210219 Re: CVE-2021-20200: Linux kernel: close race between munmap() and expand_upwards()/downwards() MISC:git.kernel.org:MLIST:[oss-security] 20210219 Re: CVE-2021-20200: Linux kernel: close race between munmap() and expand_upwards()/downwards() MLIST:[oss-security] 20210210 Re: CVE-2021-20200: Linux kernel: close race between munmap() and expand_upwards()/downwards() MLIST:[oss-security] 20210219 Re: CVE-2021-20200: Linux kernel: close race between munmap() and expand_upwards()/downwards() OSS:2021/Q1/136 RH:CVE-2021-20200 SMASH Issue 277651 bnc#1182109 rh#1908249 |
CVE-2021-20219 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-20219 OSS:2021/Q1/221 RH:CVE-2021-20219 SMASH Issue 279934 bnc#1184397 rh#1923738 |
CVE-2021-20226 | kernel-source-rt:Not affected | important | 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-20226 CVE-2021-20226 OSS:2021/Q1/111 RH:CVE-2021-20226 SMASH Issue 274506 SMASH Issue 277302 ZDI-21-001 bnc#1180564 bnc#1181846 rh#1873476 |
CVE-2021-20227 | sqlite3:Not affected | moderate | () | CONFIRM:security.netapp.com:CVE-2021-20227 CVE-2021-20227 GLSA-202103-04 GLSA-202210-40 MISC:www.oracle.com:CVE-2021-3450 MISC:www.oracle.com:CVE-2021-35666 MISC:www.sqlite.org:CVE-2021-20227 N/A:N/A Oracle:CVE-2021-20227 RH:CVE-2021-20227 SMASH Issue 276169 SMASH Issue 277207 bnc#1181261 rh#1924886 |
CVE-2021-20231 | gnutls:Not affected | important | 7.4 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-20231 CVE-2021-20231 FEDORA:FEDORA-2021-18bef34f05 MISC:www.gnutls.org:CVE-2021-20231 MLIST:[spark-issues] 20210413 [jira] [Created] (SPARK-35054) Getting Critical Vulnerability CVE-2021-20231 on spark 3.0.0 branch MLIST:[spark-issues] 20210417 [jira] [Commented] (SPARK-35054) Getting Critical Vulnerability CVE-2021-20231 on spark 3.0.0 branch MLIST:[spark-issues] 20210423 [jira] [Resolved] (SPARK-35054) Getting Critical Vulnerability CVE-2021-20231 on spark 3.0.0 branch MLIST:[spark-issues] 20210425 [jira] [Commented] (SPARK-35054) Getting Critical Vulnerability CVE-2021-20231 on spark 3.0.0 branch MLIST:[spark-issues] 20210426 [jira] [Commented] (SPARK-35054) Getting Critical Vulnerability CVE-2021-20231 on spark 3.0.0 branch MLIST:[spark-issues] 20210426 [jira] [Updated] (SPARK-35054) Getting Critical Vulnerability CVE-2021-20231 on spark 3.0.0 branch MLIST:[spark-issues] 20210429 [jira] [Commented] (SPARK-35054) Getting Critical Vulnerability CVE-2021-20231 on spark 3.0.0 branch MLIST:[spark-issues] 20210430 [jira] [Commented] (SPARK-35054) Getting Critical Vulnerability CVE-2021-20231 on spark 3.0.0 branch RH:CVE-2021-20231 RHSA-2021:4451 SMASH Issue 279725 bnc#1183457 rh#1922276 |
CVE-2021-20232 | gnutls:Not affected | important | 7.4 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-20231 CVE-2021-20232 FEDORA:FEDORA-2021-18bef34f05 MISC:www.gnutls.org:CVE-2021-20231 MLIST:[spark-issues] 20210413 [jira] [Created] (SPARK-35054) Getting Critical Vulnerability CVE-2021-20231 on spark 3.0.0 branch MLIST:[spark-issues] 20210417 [jira] [Commented] (SPARK-35054) Getting Critical Vulnerability CVE-2021-20231 on spark 3.0.0 branch MLIST:[spark-issues] 20210423 [jira] [Resolved] (SPARK-35054) Getting Critical Vulnerability CVE-2021-20231 on spark 3.0.0 branch MLIST:[spark-issues] 20210425 [jira] [Commented] (SPARK-35054) Getting Critical Vulnerability CVE-2021-20231 on spark 3.0.0 branch MLIST:[spark-issues] 20210426 [jira] [Commented] (SPARK-35054) Getting Critical Vulnerability CVE-2021-20231 on spark 3.0.0 branch MLIST:[spark-issues] 20210426 [jira] [Updated] (SPARK-35054) Getting Critical Vulnerability CVE-2021-20231 on spark 3.0.0 branch MLIST:[spark-issues] 20210429 [jira] [Commented] (SPARK-35054) Getting Critical Vulnerability CVE-2021-20231 on spark 3.0.0 branch MLIST:[spark-issues] 20210430 [jira] [Commented] (SPARK-35054) Getting Critical Vulnerability CVE-2021-20231 on spark 3.0.0 branch RH:CVE-2021-20232 RHSA-2021:4451 SMASH Issue 279724 bnc#1183456 rh#1922275 |
CVE-2021-20239 | kernel-source-rt:Not affected | moderate | 6.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N) | CVE-2021-20239 RH:CVE-2021-20239 RHSA-2021:4140 RHSA-2021:4356 SMASH Issue 277983 bnc#1182330 rh#1923636 |
CVE-2021-20248 | rpm:Won't fix | moderate | 4.6 (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L) | CVE-2021-20248 RH:CVE-2021-20248 SMASH Issue 279681 bnc#1183547 jsc#CAR-996 rh#1927740 |
CVE-2021-20249 | rpm:Ignore | moderate | 4.2 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N) | CVE-2021-20249 RH:CVE-2021-20249 SMASH Issue 279683 bnc#1183544 rh#1927742 |
CVE-2021-20261 | kernel-source-rt:Already fixed | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-20261 MISC:git.kernel.org:OSS:2021/Q1/204 OSS:2021/Q1/204 RH:CVE-2021-20261 SMASH Issue 279574 bnc#1183400 bnc#1183402 jsc#CAR-421 rh#1932150 |
CVE-2021-20265 | kernel-source-rt:Not affected | moderate | 5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-20265 L3:66541 L3:66770 L3:67469 MISC:git.kernel.org:CVE-2021-20265 MISC:www.oracle.com:CVE-2021-35666 RH:CVE-2021-20265 RHSA-2021:0856 RHSA-2021:0857 RHSA-2021:1288 SMASH Issue 279195 bnc#1183089 rh#1908827 |
CVE-2021-20266 | rpm:Released | low | 3.1 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-20266 D:CVE-2021-20266 FEDORA:FEDORA-2021-2383d950fd FEDORA:FEDORA-2021-8d52a8a999 GLSA-202107-43 L3:61826 L3:62712 RH:CVE-2021-20266 RHSA-2021:4489 SMASH Issue 279682 bnc#1183632 bnc#1191360 jsc#CAR-995 rh#1927741 |
CVE-2021-20268 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-20268 CVE-2021-20268 MISC:lore.kernel.org:CVE-2021-20268 RH:CVE-2021-20268 SMASH Issue 279234 bnc#1183077 bnc#1183095 rh#1923816 |
CVE-2021-20269 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2021-20269 MISC:access.redhat.com:/errata/RHSA-2021:4404 MISC:bugzilla.redhat.com:OSS:2021/Q1/205 OSS:2021/Q1/205 RH:CVE-2021-20269 RHSA-2021:4404 SMASH Issue 279353 bnc#1189468 rh#1934261 |
CVE-2021-20270 | python-Pygments:Unsupported | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-20270 DSA-4870 DSA-4889 MLIST:[debian-lts-announce] 20210505 [SECURITY] [DLA 2648-1] mediawiki security update RH:CVE-2021-20270 RHSA-2021:0781 RHSA-2021:3252 RHSA-2021:4139 RHSA-2021:4150 RHSA-2021:4151 SMASH Issue 279276 bnc#1183169 jsc#CAR-994 rh#1922136 |
CVE-2021-20271 | rpm:Released | low | 3.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L) | CVE-2021-20271 FEDORA:FEDORA-2021-2383d950fd FEDORA:FEDORA-2021-662680e477 FEDORA:FEDORA-2021-8d52a8a999 GLSA-202107-43 MISC:access.redhat.com:/errata/RHBA-2021:2854 MISC:access.redhat.com:/errata/RHSA-2021:2574 MISC:access.redhat.com:/errata/RHSA-2021:2791 MISC:access.redhat.com:/errata/RHSA-2021:4771 MISC:access.redhat.com:/errata/RHSA-2021:4785 MISC:access.redhat.com:/errata/RHSA-2021:4975 MISC:github.com:CVE-2021-20271 MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/ MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/ MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/ MISC:www.starwindsoftware.com:CVE-2021-20271 RH:CVE-2021-20271 RHBA-2021:2854 RHSA-2021:2574 RHSA-2021:2791 RHSA-2021:4771 RHSA-2021:4785 RHSA-2021:4975 SMASH Issue 279680 bnc#1183545 jsc#CAR-1203 rh#1934125 |
CVE-2021-20284 | binutils:Unsupported | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2021-20284 CVE-2021-20284 GLSA-202208-30 MISC:access.redhat.com:/errata/RHSA-2021:4364 MISC:sourceware.org:CVE-2021-20284 RH:CVE-2021-20284 RHSA-2021:4364 SMASH Issue 279586 bnc#1183511 jsc#CAR-993 rh#1937784 |
CVE-2021-20292 | kernel-source-rt:Already fixed | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-20292 MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update RH:CVE-2021-20292 SMASH Issue 280020 bnc#1183723 jsc#CAR-1673 rh#1939686 |
CVE-2021-20294 | binutils:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H) | CVE-2021-20294 D:CVE-2021-20294 GLSA-202208-30 MISC:sourceware.org:CVE-2021-20294 MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 MLIST:[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 RH:CVE-2021-20294 SMASH Issue 280541 bnc#1184519 jsc#CAR-992 rh#1943533 |
CVE-2021-20305 | libnettle:Released | important | 8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-20305 D:CVE-2021-20305 DSA-4933 FEDORA:FEDORA-2021-454a0f6f76 GLSA-202105-31 RH:CVE-2021-20305 RHSA-2021:1145 RHSA-2021:1206 RHSA-2021:1245 RHSA-2021:1246 RHSA-2021:2280 RHSA-2021:2356 RHSA-2021:2758 RHSA-2021:2760 SMASH Issue 280836 bdo#985652 bdo#989631 bnc#1183835 bnc#1184401 jsc#CAR-478 rh#1942533 |
CVE-2021-20317 | kernel-source-rt:Already fixed | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:cert-portal.siemens.com:CVE-2022-0847 CVE-2021-20317 DSA-5096 MISC:git.kernel.org:CVE-2021-20317 MLIST:[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update OSS:2021/07/22/1 OSS:2022/01/25/12 RHSA-2021:4646 RHSA-2021:4647 RHSA-2021:4648 RHSA-2021:4650 RHSA-2021:4871 RHSA-2021:4875 SMASH Issue 310782 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1191125 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2005258 rh#2044561 rh#2053632 rh#2055502 rh#2059923 |
CVE-2021-20320 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2021-20320 MISC:lore.kernel.org:CVE-2021-20320 SMASH Issue 310338 SMASH Issue 312311 bnc#1190601 jsc#CAR-1131 rh#2010090 |
CVE-2021-20321 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-20321 DSA-5096 MISC:lore.kernel.org:CVE-2021-20321 MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update OSS:2021/07/22/1 OSS:2022/01/25/12 RHSA-2021:5227 RHSA-2021:5241 SMASH Issue 312529 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1191647 jsc#CAR-1132 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2013242 rh#2044561 rh#2053632 rh#2055502 rh#2059923 |
CVE-2021-20322 | kernel-source-rt:Released | important | 7.4 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N) | CONFIRM:security.netapp.com:CVE-2021-20322 CVE-2021-20322 DSA-5096 MISC:git.kernel.org:CVE-2021-20322 MISC:www.oracle.com:CVE-2022-21586 MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update OSS:2021/07/22/1 OSS:2022/01/25/12 RHSA-2022:1975 RHSA-2022:1988 RHSA-2022:4829 RHSA-2022:4835 SMASH Issue 312780 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1191790 bnc#1191813 jsc#CAR-1151 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1894579 rh#1980646 rh#1997467 rh#2014230 rh#2044561 rh#2053632 rh#2055502 rh#2059923 |
CVE-2021-21781 | kernel-source-rt:Released | low | 4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) | CVE-2021-21781 D:CVE-2021-21781 MISC:talosintelligence.com:CVE-2021-21781 MISC:www.oracle.com:CVE-2022-21586 RHSA-2022:1988 SMASH Issue 304006 bnc#1188445 rh#1981950 |
CVE-2021-22543 | kernel-source-rt:Released | important | 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-22543 CVE-2021-22543 D:CVE-2021-22543 FEDORA:FEDORA-2021-95f2f1cfc7 FEDORA:FEDORA-2021-fe826f202e MISC:github.com:MLIST:[oss-security] 20210626 Re: CVE-2021-22543 - /dev/kvm LPE MLIST:[debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update MLIST:[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update MLIST:[oss-security] 20210526 CVE-2021-22543 - /dev/kvm LPE MLIST:[oss-security] 20210526 Re: CVE-2021-22543 - /dev/kvm LPE MLIST:[oss-security] 20210626 Re: CVE-2021-22543 - /dev/kvm LPE OSS:2021/Q2/167 RHSA-2021:3044 RHSA-2021:3057 RHSA-2021:3088 RHSA-2021:3173 RHSA-2021:3181 RHSA-2021:3235 RHSA-2021:3363 RHSA-2021:3375 RHSA-2021:3380 RHSA-2021:3725 RHSA-2021:3766 RHSA-2021:3767 RHSA-2021:3768 RHSA-2021:3801 RHSA-2021:3802 RHSA-2021:3812 RHSA-2021:3814 RHSA-2021:3943 RHSA-2021:3987 RHSA-2021:4000 RHSA-2022:5640 SMASH Issue 300801 bnc#1186482 bnc#1186483 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4G5YBUVEPHZYXMKNGBZ3S6INFCTEEL4E/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ROQIXQB7ZAWI3KSGSHR6H5RDUWZI775S/ jsc#CAR-650 rh#1965461 |
CVE-2021-22555 | kernel-source-rt:Released, ltp:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-22555 CVE-2021-22555 MISC:git.kernel.org:CVE-2021-22555 MISC:github.com:CVE-2021-22555 MISC:packetstormsecurity.com:CVE-2021-22555 MISC:packetstormsecurity.com:CVE-2021-33909 RHSA-2021:3044 RHSA-2021:3057 RHSA-2021:3088 RHSA-2021:3173 RHSA-2021:3181 RHSA-2021:3235 RHSA-2021:3321 RHSA-2021:3327 RHSA-2021:3328 RHSA-2021:3363 RHSA-2021:3375 RHSA-2021:3380 RHSA-2021:3381 RHSA-2021:3399 RHSA-2021:3477 RHSA-2021:3522 RHSA-2021:3523 RHSA-2021:3725 RHSA-2021:3812 RHSA-2021:3814 SMASH Issue 303620 bnc#1188116 bnc#1188117 jsc#CAR-991 rh#1980101 |
CVE-2021-22569 | protobuf:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CVE-2021-22569 MISC:bugs.chromium.org:CVE-2021-22569 MISC:cloud.google.com:CVE-2021-22569 MISC:www.oracle.com:CVE-2022-21498 OSS:2022/01/12/4 OSS:2022/01/12/7 OSS:2022/Q1/29 Oracle:CVE-2021-22569 RHSA-2022:1013 RHSA-2022:4623 RHSA-2022:5532 RHSA-2022:5903 RHSA-2022:6835 RHSA-2022:7896 RHSA-2022:8761 SMASH Issue 319908 bnc#1194530 https://lists.debian.org/debian-lts-announce/2023/04/msg00019.html jsc#CAR-1389 rh#2039903 |
CVE-2021-22570 | protobuf:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:N/A CONFIRM:security.netapp.com:CVE-2022-21490 CVE-2021-22570 D:CVE-2021-22570 FEDORA:FEDORA-2022-2d3e6eb9e4 FEDORA:FEDORA-2022-486d5f349d FEDORA:FEDORA-2022-49b52819a4 FEDORA:FEDORA-2022-57923346cf FEDORA:FEDORA-2022-d1a15f9cdb FEDORA:FEDORA-2022-fedff53e4e FEDORA:FEDORA-2022-ffe4a1cedd MISC:www.oracle.com:CVE-2022-21498 Oracle:CVE-2021-22570 RHSA-2022:7464 RHSA-2022:7970 RHSA-2022:8847 RHSA-2022:8860 SMASH Issue 321783 bnc#1195258 https://lists.debian.org/debian-lts-announce/2023/04/msg00019.html jsc#CAR-1482 rh#2049429 |
CVE-2021-22600 | kernel-source-rt:Released | important | 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:/advisory/ntap-20230110-0002/ CVE-2021-22600 DSA-5096 MISC:git.kernel.org:CVE-2021-22600 MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update OSS:2021/07/22/1 OSS:2022/01/25/12 SMASH Issue 321782 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1195184 bnc#1195307 jsc#CAR-1511 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2044561 rh#2047912 rh#2053632 rh#2055502 rh#2059923 |
CVE-2021-22876 | curl:Released | moderate | 6.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N) | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2021-22890 CVE-2021-22876 FEDORA:FEDORA-2021-065371f385 FEDORA:FEDORA-2021-26a293c72b FEDORA:FEDORA-2021-cab5c9befb GLSA-202105-36 MISC:curl.se:OSS:2021/Q1/279 MISC:github.com:OSS:2021/Q1/279 MISC:hackerone.com:CVE-2021-22876 MLIST:[debian-lts-announce] 20210517 [SECURITY] [DLA 2664-1] curl security update N/A:N/A OSS:2021/Q1/279 RH:CVE-2021-22876 RHSA-2021:2471 RHSA-2021:2472 RHSA-2021:4511 RHSA-2022:1354 SMASH Issue 280318 SMASH Issue 280319 bdo#965280 bdo#965281 bdo#968831 bdo#977161 bdo#977162 bdo#977163 bnc#1183933 bnc#1183934 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/ jsc#CAR-424 rh#1941964 |
CVE-2021-22890 | curl:Released | low | 3.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N) | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2021-22890 CVE-2021-22890 FEDORA:FEDORA-2021-065371f385 FEDORA:FEDORA-2021-26a293c72b FEDORA:FEDORA-2021-cab5c9befb GLSA-202105-36 MISC:curl.se:OSS:2021/Q1/280 MISC:github.com:OSS:2021/Q1/280 MISC:hackerone.com:CVE-2021-22890 N/A:N/A OSS:2021/Q1/280 RH:CVE-2021-22890 RHSA-2021:2471 RHSA-2021:2472 SMASH Issue 280320 SMASH Issue 280321 bdo#965280 bdo#965281 bdo#968831 bdo#977161 bdo#977162 bdo#977163 bnc#1183934 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/ jsc#CAR-423 rh#1941965 |
CVE-2021-22897 | curl:Not affected | moderate | () | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2021-22901 CVE-2021-22897 MISC:curl.se:CVE-2021-22897 MISC:github.com:CVE-2021-22897 MISC:hackerone.com:CVE-2021-22897 MISC:www.oracle.com:CVE-2022-21403 MISC:www.oracle.com:CVE-2022-21498 N/A:N/A SMASH Issue 300783 bnc#1186488 rh#1964904 |
CVE-2021-22898 | curl:Released | moderate | 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CVE-2021-22898 CVE-2023-23916 CVE-2023-27538 D:CVE-2022-27774 DSA-5197 FEDORA:FEDORA-2021-5d21b90a30 FEDORA:FEDORA-2021-83fdddca0f MISC:curl.se:MLIST:[oss-security] 20210721 [SECURITY ADVISORY] curl: TELNET stack contents disclosure again MISC:curl.se:OSS:2022/Q2/210 MISC:curl.se:OSS:2022/Q2/96 MISC:github.com:MLIST:[oss-security] 20210721 [SECURITY ADVISORY] curl: TELNET stack contents disclosure again MISC:github.com:OSS:2021/Q2/165 MISC:github.com:OSS:2023/02/15/3 MISC:github.com:OSS:2023/03/20/6 MISC:hackerone.com:CVE-2021-22898 MISC:www.oracle.com:CVE-2022-21403 MISC:www.oracle.com:CVE-2022-21498 MLIST:[debian-lts-announce] 20210813 [SECURITY] [DLA 2734-1] curl security update MLIST:[debian-lts-announce] 20220828 [SECURITY] [DLA 3085-1] curl security update MLIST:[guacamole-issues] 20210618 [jira] [Created] (GUACAMOLE-1368) Latest docker image fails security scans. MLIST:[oss-security] 20210721 [SECURITY ADVISORY] curl: TELNET stack contents disclosure again N/A:N/A OSS:2021/Q2/165 OSS:2021/Q3/27 OSS:2023/02/15/3 OSS:2023/03/20/6 Oracle:CVE-2022-27782 Oracle:CVE-2022-32206 Oracle:CVE-2022-32207 RHSA-2021:4511 SMASH Issue 284453 SMASH Issue 284454 bdo#1010252 bdo#1010253 bdo#1010254 bdo#1010295 bdo#989228 bdo#991492 bnc#1186114 https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/ jsc#CAR-642 rh#1964887 rh#1970902 rh#2077541 rh#2077547 rh#2078388 rh#2078408 rh#2082204 rh#2082215 rh#2099300 rh#2099305 rh#2099306 |
CVE-2021-22901 | curl:Not affected | important | () | CONFIRM:cert-portal.siemens.com:CVE-2021-22924 CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2021-22901 CONFIRM:security.netapp.com:CVE-2021-2412 CVE-2021-22901 MISC:curl.se:OSS:2021/Q2/166 MISC:github.com:OSS:2021/Q2/166 MISC:hackerone.com:CVE-2021-22901 MISC:www.oracle.com:CVE-2022-21403 MISC:www.oracle.com:CVE-2022-21498 N/A:N/A OSS:2021/Q2/166 Oracle:CVE-2021-22901 RHSA-2021:2471 RHSA-2021:2472 SMASH Issue 284455 SMASH Issue 284456 bnc#1185579 bnc#1186115 rh#1963146 |
CVE-2021-22918 | libuv:Not affected | moderate | () | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2021-22921 CVE-2021-22918 DSA-4936 MISC:hackerone.com:CVE-2021-22918 MISC:nodejs.org:CVE-2021-22921 RHSA-2021:2931 RHSA-2021:2932 RHSA-2021:3073 RHSA-2021:3074 RHSA-2021:3075 RHSA-2021:3638 RHSA-2021:3639 SMASH Issue 303414 SMASH Issue 303415 bdo#990561 bnc#1187973 https://security.gentoo.org/glsa/202401-23 rh#1979338 |
CVE-2021-22922 | curl:Released, curl-mini:Released | moderate | 6.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N) | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2021-22926 CVE-2021-22922 FEDORA:FEDORA-2021-5d21b90a30 GLSA-202212-01 MISC:curl.se:OSS:2021/Q3/24 MISC:github.com:OSS:2021/Q3/25 MISC:hackerone.com:CVE-2021-22922 MISC:www.oracle.com:CVE-2021-35666 MLIST:[kafka-dev] 20210831 Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image MLIST:[kafka-dev] 20210901 Re: [EXTERNAL] Re: Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image MLIST:[kafka-users] 20210831 Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image MLIST:[kafka-users] 20210901 Re: [EXTERNAL] Re: Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image OSS:2021/Q3/24 RHSA-2021:3582 RHSA-2021:3903 SMASH Issue 303763 SMASH Issue 303764 bnc#1188217 https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ jsc#CAR-840 rh#1981435 |
CVE-2021-22923 | curl:Released, curl-mini:Released | moderate | 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2021-22926 CVE-2021-22923 FEDORA:FEDORA-2021-5d21b90a30 GLSA-202212-01 MISC:curl.se:OSS:2021/Q3/25 MISC:github.com:OSS:2021/Q3/25 MISC:hackerone.com:CVE-2021-22923 MISC:www.oracle.com:CVE-2021-35666 OSS:2021/Q3/25 RHSA-2021:3582 RHSA-2021:3903 SMASH Issue 303765 SMASH Issue 303766 bnc#1188218 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ jsc#CAR-839 rh#1981438 |
CVE-2021-22924 | curl:Released, curl-mini:Released | moderate | 5.4 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N) | CONFIRM:cert-portal.siemens.com:CVE-2021-22924 CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2021-22926 CVE-2021-22924 CVE-2023-23916 CVE-2023-27538 D:CVE-2022-27774 DSA-5197 FEDORA:FEDORA-2021-5d21b90a30 MISC:cert-portal.siemens.com:CVE-2022-32262 MISC:curl.se:OSS:2021/Q3/26 MISC:curl.se:OSS:2022/Q2/210 MISC:curl.se:OSS:2022/Q2/96 MISC:github.com:OSS:2021/Q3/26 MISC:github.com:OSS:2023/02/15/3 MISC:github.com:OSS:2023/03/20/6 MISC:hackerone.com:CVE-2021-22924 MISC:www.oracle.com:CVE-2021-35666 MISC:www.oracle.com:CVE-2022-21403 MLIST:[debian-lts-announce] 20210813 [SECURITY] [DLA 2734-1] curl security update MLIST:[debian-lts-announce] 20220828 [SECURITY] [DLA 3085-1] curl security update MLIST:[kafka-dev] 20210831 Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image MLIST:[kafka-dev] 20210901 Re: [EXTERNAL] Re: Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image MLIST:[kafka-users] 20210831 Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image MLIST:[kafka-users] 20210901 Re: [EXTERNAL] Re: Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image OSS:2021/Q3/26 OSS:2023/02/15/3 OSS:2023/03/20/6 Oracle:CVE-2022-27782 Oracle:CVE-2022-32206 Oracle:CVE-2022-32207 RHSA-2021:3582 RHSA-2022:1354 SMASH Issue 303767 SMASH Issue 303768 bdo#1010252 bdo#1010253 bdo#1010254 bdo#1010295 bdo#989228 bdo#991492 bnc#1188219 https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ jsc#CAR-990 rh#1981460 rh#2077541 rh#2077547 rh#2078388 rh#2078408 rh#2082204 rh#2082215 rh#2099300 rh#2099305 rh#2099306 |
CVE-2021-22925 | curl:Released, curl-mini:Released | moderate | 4.3 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2021-22926 CONFIRM:support.apple.com:CVE-2021-22925 CVE-2021-22925 FEDORA:FEDORA-2021-5d21b90a30 FULLDISC:20210921 APPLE-SA-2021-09-20-7 Additional information for APPLE-SA-2021-09-13-3 macOS Big Sur 11.6 FULLDISC:20210921 APPLE-SA-2021-09-20-8 Additional information for APPLE-SA-2021-09-13-4 Security Update 2021-005 Catalina GLSA-202212-01 MISC:cert-portal.siemens.com:CVE-2022-32262 MISC:curl.se:MLIST:[oss-security] 20210721 [SECURITY ADVISORY] curl: TELNET stack contents disclosure again MISC:github.com:MLIST:[oss-security] 20210721 [SECURITY ADVISORY] curl: TELNET stack contents disclosure again MISC:hackerone.com:CVE-2021-22925 MISC:www.oracle.com:CVE-2021-35666 MISC:www.oracle.com:CVE-2022-21403 OSS:2021/Q3/27 RHSA-2021:4511 SMASH Issue 303769 SMASH Issue 303770 bnc#1188220 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ jsc#CAR-837 jsc#CAR-838 rh#1970902 |
CVE-2021-22926 | curl:Not affected | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2021-22926 CONFIRM:security.netapp.com:CVE-2021-35648 CVE-2021-22926 GLSA-202212-01 MISC:hackerone.com:CVE-2021-22926 MISC:www.oracle.com:CVE-2021-35666 MISC:www.oracle.com:CVE-2022-21403 MLIST:[kafka-dev] 20210831 Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image MLIST:[kafka-dev] 20210901 Re: [EXTERNAL] Re: Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image MLIST:[kafka-users] 20210831 Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image MLIST:[kafka-users] 20210901 Re: [EXTERNAL] Re: Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image Oracle:CVE-2021-22926 SMASH Issue 304615 SMASH Issue 304616 bnc#1188510 https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E rh#2016088 |
CVE-2021-22945 | curl:Not affected | moderate | 6.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2021-22947 CONFIRM:support.apple.com:CVE-2022-0158 CVE-2021-22945 CVE-2023-23916 CVE-2023-27538 D:CVE-2022-27774 DSA-5197 FEDORA:FEDORA-2021-1d24845e93 FEDORA:FEDORA-2021-fc96a3a749 FULLDISC:20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3 GLSA-202212-01 MISC:curl.se:OSS:2021/Q3/166 MISC:curl.se:OSS:2022/Q2/210 MISC:curl.se:OSS:2022/Q2/96 MISC:github.com:OSS:2021/Q3/166 MISC:github.com:OSS:2023/02/15/3 MISC:github.com:OSS:2023/03/20/6 MISC:hackerone.com:CVE-2021-22945 MISC:www.oracle.com:CVE-2021-35666 OSS:2021/Q3/166 OSS:2023/02/15/3 OSS:2023/03/20/6 Oracle:CVE-2022-27782 Oracle:CVE-2022-32206 Oracle:CVE-2022-32207 SMASH Issue 309113 SMASH Issue 309114 bdo#1010252 bdo#1010253 bdo#1010254 bdo#1010295 bdo#989228 bdo#991492 bnc#1190213 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/ rh#2001527 rh#2077541 rh#2077547 rh#2078388 rh#2078408 rh#2082204 rh#2082215 rh#2099300 rh#2099305 rh#2099306 |
CVE-2021-22946 | curl:Released | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N) | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2021-22947 CONFIRM:security.netapp.com:CVE-2022-21380 CONFIRM:support.apple.com:CVE-2022-0158 CVE-2021-22946 CVE-2023-23916 CVE-2023-27538 D:CVE-2022-27774 DSA-5197 FEDORA:FEDORA-2021-1d24845e93 FEDORA:FEDORA-2021-fc96a3a749 FULLDISC:20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3 GLSA-202212-01 MISC:curl.se:OSS:2021/Q3/167 MISC:curl.se:OSS:2022/Q2/210 MISC:curl.se:OSS:2022/Q2/96 MISC:github.com:OSS:2021/Q3/167 MISC:github.com:OSS:2021/Q3/168 MISC:github.com:OSS:2023/02/15/3 MISC:github.com:OSS:2023/03/20/6 MISC:hackerone.com:CVE-2021-22946 MISC:www.oracle.com:CVE-2021-35666 MISC:www.oracle.com:CVE-2022-21403 MISC:www.oracle.com:CVE-2022-21498 MISC:www.oracle.com:CVE-2022-21586 MLIST:[debian-lts-announce] 20210930 [SECURITY] [DLA 2773-1] curl security update MLIST:[debian-lts-announce] 20220828 [SECURITY] [DLA 3085-1] curl security update OSS:2021/Q3/167 OSS:2023/02/15/3 OSS:2023/03/20/6 Oracle:CVE-2021-22946 Oracle:CVE-2022-27782 Oracle:CVE-2022-32206 Oracle:CVE-2022-32207 RHSA-2021:4059 RHSA-2022:0635 RHSA-2022:1354 SMASH Issue 309780 SMASH Issue 309781 bdo#1010252 bdo#1010253 bdo#1010254 bdo#1010295 bdo#989228 bdo#991492 bnc#1190373 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/ jsc#CAR-1052 rh#2003175 rh#2077541 rh#2077547 rh#2078388 rh#2078408 rh#2082204 rh#2082215 rh#2099300 rh#2099305 rh#2099306 |
CVE-2021-22947 | curl:Released | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N) | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2021-22947 CONFIRM:support.apple.com:CVE-2022-0158 CVE-2021-22947 CVE-2023-23916 CVE-2023-27538 D:CVE-2022-27774 DSA-5197 FEDORA:FEDORA-2021-1d24845e93 FEDORA:FEDORA-2021-fc96a3a749 FULLDISC:20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3 GLSA-202212-01 MISC:curl.se:OSS:2021/Q3/168 MISC:curl.se:OSS:2022/Q2/210 MISC:curl.se:OSS:2022/Q2/96 MISC:github.com:OSS:2021/Q3/168 MISC:github.com:OSS:2023/02/15/3 MISC:github.com:OSS:2023/03/20/6 MISC:hackerone.com:CVE-2021-22947 MISC:www.oracle.com:CVE-2021-35666 MISC:www.oracle.com:CVE-2022-21403 MISC:www.oracle.com:CVE-2022-21498 MISC:www.oracle.com:CVE-2022-21586 MLIST:[debian-lts-announce] 20210930 [SECURITY] [DLA 2773-1] curl security update MLIST:[debian-lts-announce] 20220828 [SECURITY] [DLA 3085-1] curl security update OSS:2021/Q3/168 OSS:2023/02/15/3 OSS:2023/03/20/6 Oracle:CVE-2022-27782 Oracle:CVE-2022-32206 Oracle:CVE-2022-32207 RHSA-2021:4059 RHSA-2022:0635 RHSA-2022:1354 SMASH Issue 309782 SMASH Issue 309783 bdo#1010252 bdo#1010253 bdo#1010254 bdo#1010295 bdo#989228 bdo#991492 bnc#1190374 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/ jsc#CAR-1053 rh#2003191 rh#2077541 rh#2077547 rh#2078388 rh#2078408 rh#2082204 rh#2082215 rh#2099300 rh#2099305 rh#2099306 |
CVE-2021-23133 | kernel-source-rt:Already fixed | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:N/A CONFIRM:security.netapp.com:CVE-2021-23133 CVE-2021-23133 FEDORA:FEDORA-2021-8cd093f639 FEDORA:FEDORA-2021-a963f04012 FEDORA:FEDORA-2021-e6b4847979 MISC:git.kernel.org:MLIST:[oss-security] 20210510 Re: CVE-2021-23133: Linux kernel: race condition in sctp sockets MISC:github.com:MLIST:[oss-security] 20211007 CVE-2021-33035: Apache OpenOffice: Buffer overflow from a crafted DBF file MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update MLIST:[oss-security] 20210510 Re: CVE-2021-23133: Linux kernel: race condition in sctp sockets OSS:2021/04/18/2 OSS:2021/Q2/32 OSS:2021/Q4/14 RHSA-2021:4140 RHSA-2021:4356 SMASH Issue 281717 SMASH Issue 282222 bnc#1184675 bnc#1185901 jsc#CAR-988 jsc#CAR-989 linux.git:commit:34e5b01186858b36c4d7c87e1a025071e8e2401f linux.git:commit:b166a20b07382b8bc1dcee2a448715c9c2c81b5b rh#1948772 |
CVE-2021-23134 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-23134 FEDORA:FEDORA-2021-05152dbcf5 FEDORA:FEDORA-2021-286375de1e MISC:git.kernel.org:MLIST:[oss-security] 20210511 CVE-2021-23134: Linux kernel: UAF in nfc sockets MISC:www.openwall.com:CVE-2021-23134 MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update MLIST:[oss-security] 20210511 CVE-2021-23134: Linux kernel: UAF in nfc sockets OSS:2021/Q2/118 SMASH Issue 283962 bnc#1186060 bnc#1186061 jsc#CAR-987 linux.git:commit:c61760e6940dd4039a7f5e84a6afc9cdbf4d82b6 rh#1959514 |
CVE-2021-23177 | libarchive:Released | moderate | 6.6 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L) | CVE-2021-23177 CVE-2021-31566 MISC:access.redhat.com:CVE-2021-23177 MISC:access.redhat.com:CVE-2021-31566 MISC:github.com:CVE-2021-23177 MISC:github.com:CVE-2021-31566 MLIST:[debian-lts-announce] 20221122 [SECURITY] [DLA 3202-1] libarchive security update RHSA-2022:0892 SMASH Issue 314413 SMASH Issue 317801 SMASH Issue 323516 bnc#1192425 bnc#1192426 bnc#1192427 bnc#1195844 jsc#CAR-1521 jsc#CAR-1956 jsc#CAR-2031 rh#2024237 rh#2024245 |
CVE-2021-23336 | python3:Released | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H) | CONFIRM:security.netapp.com:CVE-2021-23336 CONFIRM:snyk.io:CVE-2020-28473 CVE-2021-23336 D:CVE-2021-23336 FEDORA:FEDORA-2021-12df7f7382 FEDORA:FEDORA-2021-1bb399a5af FEDORA:FEDORA-2021-2897f5366c FEDORA:FEDORA-2021-309bc2e727 FEDORA:FEDORA-2021-3352c1c802 FEDORA:FEDORA-2021-5a09621ebb FEDORA:FEDORA-2021-7547ad987f FEDORA:FEDORA-2021-7c1bb32d13 FEDORA:FEDORA-2021-7d3a9004e2 FEDORA:FEDORA-2021-907f3bacae FEDORA:FEDORA-2021-98720f3785 FEDORA:FEDORA-2021-b1843407ca FEDORA:FEDORA-2021-b326fcb83f FEDORA:FEDORA-2021-b6b6093b3a FEDORA:FEDORA-2021-b76ede8f4d FEDORA:FEDORA-2021-e22bb0e548 FEDORA:FEDORA-2021-e525e48886 FEDORA:FEDORA-2021-ef83e8525a FEDORA:FEDORA-2021-f4fd9372c7 GLSA-202104-04 MISC:bugs.python.org:MLIST:[oss-security] 20210219 Django security releases: CVE-2021-23336: Web cache poisoning via ``django.utils.http.limited_parse_qsl()`` MISC:github.com:CVE-2021-23336 MISC:github.com:MLIST:[oss-security] 20210219 Django security releases: CVE-2021-23336: Web cache poisoning via ``django.utils.http.limited_parse_qsl()`` MISC:nvd.nist.gov:MLIST:[oss-security] 20210501 CVE-2021-28359: Apache Airflow Reflected XSS via Origin Query Argument in URL MISC:snyk.io:CVE-2021-23336 MISC:www.oracle.com:CVE-2021-3450 MISC:www.oracle.com:CVE-2021-35666 MISC:www.oracle.com:CVE-2022-21403 MLIST:[airflow-users] 20210501 CVE-2021-28359: Apache Airflow Reflected XSS via Origin Query Argument in URL MLIST:[announce] 20210501 Apache Airflow CVE: CVE-2021-28359: Apache Airflow Reflected XSS via Origin Query Argument in URL MLIST:[debian-lts-announce] 20210219 [SECURITY] [DLA 2569-1] python-django security update MLIST:[debian-lts-announce] 20210405 [SECURITY] [DLA 2619-1] python3.5 security update MLIST:[debian-lts-announce] 20210417 [SECURITY] [DLA 2628-1] python2.7 security update MLIST:[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar MLIST:[oss-security] 20210219 Django security releases: CVE-2021-23336: Web cache poisoning via ``django.utils.http.limited_parse_qsl()`` MLIST:[oss-security] 20210501 CVE-2021-28359: Apache Airflow Reflected XSS via Origin Query Argument in URL N/A:N/A OSS:2021/Q1/163 Oracle:CVE-2021-23336 RH:CVE-2021-23336 RHSA-2021:1633 RHSA-2021:3252 RHSA-2021:3254 RHSA-2021:4151 RHSA-2021:4162 SMASH Issue 277966 bnc#1182379 https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html jsc#CAR-1483 rh#1928904 |
CVE-2021-23839 | openssl:Not affected, openssl-1_1:Not affected | moderate | () | CONFIRM:cert-portal.siemens.com:CVE-2021-25220 CONFIRM:git.openssl.org:CVE-2021-23839 CONFIRM:kb.pulsesecure.net:CVE-2021-23841 CONFIRM:security.netapp.com:CVE-2021-23839 CONFIRM:www.openssl.org:CVE-2021-23839 CVE-2021-23839 MISC:www.oracle.com:CVE-2021-3450 MISC:www.oracle.com:CVE-2021-35666 MISC:www.oracle.com:CVE-2022-21498 N/A:N/A RH:CVE-2021-23839 RHSA-2021:3016 SMASH Issue 278031 bnc#1182332 https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=30919ab80a478f2d81f2e9acdcca3fa4740cd547 https://security.netapp.com/advisory/ntap-20240621-0006/ openssl.git:commit:d9461cbe87b91fec98c4ab99a6f47621390e4aa2 rh#1930294 |
CVE-2021-23840 | openssl:Released, openssl-1_1:Released | moderate | 6.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H) | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:git.openssl.org:CVE-2021-23840 CONFIRM:kb.pulsesecure.net:CVE-2021-23841 CONFIRM:kc.mcafee.com:CVE-2021-31835 CONFIRM:security.netapp.com:CVE-2021-23839 CONFIRM:www.openssl.org:CVE-2021-23839 CONFIRM:www.tenable.com:CVE-2021-23840 CONFIRM:www.tenable.com:CVE-2021-23841 CONFIRM:www.tenable.com:CVE-2021-3449 CVE-2021-23840 DSA-4855 GLSA-202103-03 L3:68186 MISC:www.oracle.com:CVE-2021-3450 MISC:www.oracle.com:CVE-2021-35666 MISC:www.oracle.com:CVE-2022-21403 MISC:www.oracle.com:CVE-2022-21498 MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 MLIST:[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 N/A:N/A Oracle:CVE-2021-23840 RH:CVE-2021-23840 RHSA-2021:1168 RHSA-2021:3016 RHSA-2021:3798 RHSA-2021:4198 RHSA-2021:4424 RHSA-2021:4613 RHSA-2021:4614 RHSA-2021:4861 RHSA-2021:4863 SMASH Issue 278032 bdo#947949 bnc#1182333 https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1 https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E https://security.netapp.com/advisory/ntap-20240621-0006/ openssl.git:commit:c9fb704cf3af5524eb8e79961e31b60eee8c3c47 rh#1930324 |
CVE-2021-23841 | openssl:Released, openssl-1_1:Released | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:cert-portal.siemens.com:CVE-2021-25220 CONFIRM:git.openssl.org:CVE-2021-23840 CONFIRM:git.openssl.org:CVE-2021-23841 CONFIRM:kb.pulsesecure.net:CVE-2021-23841 CONFIRM:security.netapp.com:CVE-2021-2154 CONFIRM:security.netapp.com:CVE-2021-23839 CONFIRM:support.apple.com:CVE-2021-23841 CONFIRM:www.openssl.org:CVE-2021-23839 CONFIRM:www.tenable.com:CVE-2021-23840 CONFIRM:www.tenable.com:CVE-2021-23841 CVE-2021-23841 DSA-4855 FULLDISC:20210526 APPLE-SA-2021-05-25-1 iOS 14.6 and iPadOS 14.6 FULLDISC:20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4 FULLDISC:20210526 APPLE-SA-2021-05-25-5 Safari 14.1.1 GLSA-202103-03 MISC:www.oracle.com:CVE-2021-3450 MISC:www.oracle.com:CVE-2021-35666 MISC:www.oracle.com:CVE-2022-21498 N/A:N/A Oracle:CVE-2021-23841 RH:CVE-2021-23841 RHSA-2021:1168 RHSA-2021:3016 RHSA-2021:3798 RHSA-2021:4198 RHSA-2021:4424 RHSA-2021:4613 RHSA-2021:4614 RHSA-2021:4861 RHSA-2021:4863 SMASH Issue 278030 bdo#947949 bnc#1182331 https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=122a19ab48091c657f7cb1fb3af9fc07bd557bbf https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807 https://security.netapp.com/advisory/ntap-20240621-0006/ openssl.git:commit:8130d654d1de922ea224fa18ee3bc7262edc39c0 rh#1930310 |
CVE-2021-24031 | zstd:Released | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) | CVE-2021-24031 MISC:github.com:CVE-2021-24031 MISC:www.facebook.com:CVE-2021-24031 RH:CVE-2021-24031 SMASH Issue 279114 bdo#981404 bnc#1183371 jsc#CAR-986 rh#1934852 |
CVE-2021-24032 | zstd:Released | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) | CVE-2021-24032 MISC:github.com:CVE-2021-24032 MISC:www.facebook.com:CVE-2021-24032 RH:CVE-2021-24032 SMASH Issue 278912 bdo#982519 bnc#1183370 jsc#CAR-985 rh#1928090 |
CVE-2021-25217 | dhcp:Released | important | 7.4 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H) | CONFIRM:cert-portal.siemens.com:CVE-2021-25217 CONFIRM:cert-portal.siemens.com:CVE-2021-25220 CONFIRM:security.netapp.com:CVE-2021-25217 CVE-2021-25217 D:CVE-2021-25217 FEDORA:FEDORA-2021-08cdb4dc34 FEDORA:FEDORA-2021-8ca8263bde L3:63286 L3:66542 L3:67383 L3:67471 MISC:downloads.isc.org:MLIST:[oss-security] 20210526 ISC has disclosed a vulnerability in ISC DHCP (CVE-2021-25217) MISC:kb.isc.org:MLIST:[oss-security] 20210526 ISC has disclosed a vulnerability in ISC DHCP (CVE-2021-25217) MLIST:[debian-lts-announce] 20210603 [SECURITY] [DLA 2674-1] isc-dhcp security update MLIST:[oss-security] 20210526 ISC has disclosed a vulnerability in ISC DHCP (CVE-2021-25217) OSS:2021/Q2/170 RHSA-2021:2357 RHSA-2021:2359 RHSA-2021:2405 RHSA-2021:2414 RHSA-2021:2415 RHSA-2021:2416 RHSA-2021:2418 RHSA-2021:2419 RHSA-2021:2420 RHSA-2021:2469 RHSA-2021:2519 RHSA-2021:2555 SMASH Issue 300591 SMASH Issue 300592 bnc#1186382 https://security.gentoo.org/glsa/202305-22 jsc#CAR-649 rh#1963258 |
CVE-2021-26318 | kernel-source-rt:Not affected | moderate | 5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N) | CVE-2021-26318 MISC:www.amd.com:CVE-2021-26318 SMASH Issue 312587 bnc#1191653 |
CVE-2021-26341 | kernel-source-rt:Released | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N) | CONFIRM:developer.arm.com:CVE-2017-5754 CONFIRM:security.netapp.com:CVE-2022-0002 CVE-2021-26341 CVE-2021-26401 CVE-2022-0001 CVE-2022-0002 CVE-2022-23960 D:CVE-2022-1016 D:CVE-2022-2153 D:CVE-2022-23960 D:CVE-2022-32296 DSA-5096 DSA-5161 DSA-5173 DSA-5184 DSA-5378 L3:65520 MISC:developer.arm.com:CVE-2021-28664 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:OSS:2022/04/02/2 MISC:research.nccgroup.com:OSS:2022/09/02/9 MISC:www.amd.com:CVE-2021-26341 MISC:www.amd.com:CVE-2021-26401 MISC:www.intel.com:CVE-2022-0002 MISC:www.oracle.com:CVE-2022-21586 MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update OSS:2021/07/22/1 OSS:2022/01/25/12 OSS:2022/03/18/2 OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/22/1 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/11/10/2 OSS:2022/Q1/171 OSS:2022/Q3/141 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-5715 Oracle:CVE-2022-21123 RHSA-2022:1975 RHSA-2022:1988 RHSA-2022:7683 RHSA-2023:0187 RHSA-2023:0399 RHSA-2023:0400 RHSA-2023:2148 RHSA-2023:2458 RHSA-2023:2736 RHSA-2023:2951 SMASH Issue 312331 SMASH Issue 325598 SMASH Issue 325599 SMASH Issue 335925 ZDI-23-1834 bdo#1006346 bdo#1013299 bdo#1033297 bdo#922204 bdo#988044 bdo#989285 bdo#990279 bdo#990411 bdo#994050 bnc#1191580 bnc#1195283 bnc#1195330 bnc#1196657 bnc#1196901 bnc#1196915 bnc#1201050 https://www.kb.cert.org/vuls/id/155143 jsc#CAR-1593 jsc#CAR-1883 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1519780 rh#1832397 rh#1980646 rh#1997467 rh#2039448 rh#2044561 rh#2053632 rh#2056381 rh#2058395 rh#2058955 rh#2059923 rh#2061633 rh#2061700 rh#2061703 rh#2061712 rh#2061721 rh#2062284 rh#2064604 rh#2066614 rh#2066706 rh#2066819 rh#2069736 rh#2070694 rh#2071047 rh#2073064 rh#2074208 rh#2074441 rh#2084435 rh#2084458 rh#2085300 rh#2086753 rh#2088021 rh#2089815 rh#2090237 rh#2090240 rh#2090241 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2104423 rh#2119127 rh#2141026 |
CVE-2021-26401 | kernel-source-rt:Released | moderate | 5.6 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N) | CONFIRM:developer.arm.com:CVE-2017-5754 CONFIRM:security.netapp.com:CVE-2022-0002 CVE-2021-26341 CVE-2021-26401 CVE-2022-0001 CVE-2022-0002 CVE-2022-23960 D:CVE-2022-1016 D:CVE-2022-2153 D:CVE-2022-23960 D:CVE-2022-32296 DSA-5096 DSA-5161 DSA-5173 DSA-5184 DSA-5378 L3:65520 MISC:developer.arm.com:CVE-2021-28664 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:OSS:2022/04/02/2 MISC:research.nccgroup.com:OSS:2022/09/02/9 MISC:www.amd.com:CVE-2021-26341 MISC:www.amd.com:CVE-2021-26401 MISC:www.intel.com:CVE-2022-0002 MISC:www.oracle.com:CVE-2022-21586 MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update OSS:2021/07/22/1 OSS:2022/01/25/12 OSS:2022/03/18/2 OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/22/1 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/11/10/2 OSS:2022/Q1/171 OSS:2022/Q3/141 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-5715 Oracle:CVE-2022-21123 RHSA-2022:1975 RHSA-2022:1988 RHSA-2022:7683 RHSA-2023:0187 RHSA-2023:0399 RHSA-2023:0400 RHSA-2023:2148 RHSA-2023:2458 RHSA-2023:2736 RHSA-2023:2951 SMASH Issue 312331 SMASH Issue 325453 ZDI-23-1834 bdo#1006346 bdo#1013299 bdo#1033297 bdo#922204 bdo#988044 bdo#989285 bdo#990279 bdo#990411 bdo#994050 bnc#1191580 bnc#1195283 bnc#1195330 bnc#1196657 bnc#1196901 bnc#1196915 https://www.kb.cert.org/vuls/id/155143 jsc#CAR-1593 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1519780 rh#1832397 rh#1980646 rh#1997467 rh#2039448 rh#2044561 rh#2053632 rh#2056381 rh#2058395 rh#2058955 rh#2059923 rh#2061633 rh#2061700 rh#2061703 rh#2061712 rh#2061721 rh#2062284 rh#2064604 rh#2066614 rh#2066706 rh#2066819 rh#2069736 rh#2070694 rh#2071047 rh#2073064 rh#2074208 rh#2074441 rh#2084435 rh#2084458 rh#2085300 rh#2086753 rh#2088021 rh#2089815 rh#2090237 rh#2090240 rh#2090241 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2104423 rh#2119127 rh#2141026 |
CVE-2021-26708 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-26708 CVE-2021-26708 MISC:a13xp0p0v.github.io:MLIST:[oss-security] 20210409 Re: Linux kernel: Exploitable vulnerabilities in AF_VSOCK implementation MISC:a13xp0p0v.github.io:OSS:2022/Q1/83 MISC:access.redhat.com:OSS:2022/Q1/83 MISC:cdn.kernel.org:CVE-2021-26708 MISC:git.kernel.org:MLIST:[oss-security] 20210205 Re: Linux kernel: Exploitable vulnerabilities in AF_VSOCK implementation MISC:git.kernel.org:OSS:2022/01/18/7 MISC:git.kernel.org:OSS:2022/Q1/83 MISC:github.com:OSS:2022/01/18/7 MISC:nvd.nist.gov:MLIST:[oss-security] 20210205 Re: Linux kernel: Exploitable vulnerabilities in AF_VSOCK implementation MISC:security-tracker.debian.org:OSS:2022/Q1/83 MISC:ubuntu.com:OSS:2022/Q1/83 MISC:www.openwall.com:CVE-2021-26708 MISC:www.openwall.com:OSS:2022/Q1/83 MISC:www.suse.com:OSS:2022/Q1/83 MLIST:[oss-security] 20210205 Re: Linux kernel: Exploitable vulnerabilities in AF_VSOCK implementation MLIST:[oss-security] 20210409 Re: Linux kernel: Exploitable vulnerabilities in AF_VSOCK implementation OSS:2021/02/04/5 OSS:2021/Q1/113 OSS:2021/Q2/14 OSS:2022/01/18/7 OSS:2022/01/25/14 OSS:2022/Q1/83 RH:CVE-2021-26708 RHSA-2021:1081 RHSA-2021:1093 SMASH Issue 277209 bnc#1181806 bnc#1183298 rh#1925588 |
CVE-2021-26930 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-26932 CVE-2021-26930 FEDORA:FEDORA-2021-7143aca8cb FEDORA:FEDORA-2021-8d45d297c6 MISC:xenbits.xen.org:CVE-2021-26930 MLIST:[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update MLIST:[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update OSS:2021/Q1/149 SMASH Issue 277322 bnc#1181843 bnc#1182294 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=871997bc9e423f05c7da7c9178e62dde5df2a7f8 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2XQR52ICKRK3GC4HDWLMWF2U55YGAR63/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GWQWPWYZRXVFJI5M3VCM72X27IB7CKOB/ jsc#CAR-984 |
CVE-2021-26931 | kernel-source-rt:Released | moderate | 6.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2021-26932 CVE-2021-26931 FEDORA:FEDORA-2021-7143aca8cb FEDORA:FEDORA-2021-8d45d297c6 MISC:xenbits.xen.org:CVE-2021-26931 MLIST:[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update MLIST:[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update OSS:2021/Q1/147 SMASH Issue 277048 bnc#1181753 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3194a1746e8aabe86075fd3c5e7cf1f4632d7f16 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5a264285ed1cd32e26d9de4f3c8c6855e467fd63 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7c77474b2d22176d2bfb592ec74e0f2cb71352c9 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2XQR52ICKRK3GC4HDWLMWF2U55YGAR63/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GWQWPWYZRXVFJI5M3VCM72X27IB7CKOB/ jsc#CAR-982 jsc#CAR-983 |
CVE-2021-26932 | kernel-source-rt:Released | moderate | 5.9 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2021-26932 CVE-2021-26932 FEDORA:FEDORA-2021-7143aca8cb FEDORA:FEDORA-2021-8d45d297c6 MISC:xenbits.xen.org:CVE-2021-26932 MLIST:[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update MLIST:[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update OSS:2021/Q1/146 SMASH Issue 277046 bnc#1181747 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ebee0eab08594b2bd5db716288a4f1ae5936e9bc https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2XQR52ICKRK3GC4HDWLMWF2U55YGAR63/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GWQWPWYZRXVFJI5M3VCM72X27IB7CKOB/ jsc#CAR-981 |
CVE-2021-26934 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-26932 CVE-2021-26934 FEDORA:FEDORA-2021-47f53a940a FEDORA:FEDORA-2021-4c819bf1ad MISC:xenbits.xen.org:CVE-2021-26934 OSS:2021/Q1/145 SMASH Issue 277049 bnc#1181755 bnc#1185892 |
CVE-2021-26937 | screen:Unsupported | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-26937 DSA-4861 FEDORA:FEDORA-2021-5e9894a0c5 FEDORA:FEDORA-2021-9107eeb95c GLSA-202105-11 MISC:ftp.gnu.org:CVE-2021-26937 MISC:lists.gnu.org:MLIST:[oss-security] 20210210 Re: screen crash processing combining characters MISC:www.openwall.com:CVE-2021-26937 MLIST:[debian-lts-announce] 20210219 [SECURITY] [DLA 2570-1] screen security update MLIST:[oss-security] 20210210 Re: screen crash processing combining characters OSS:2021/Q1/129 RH:CVE-2021-26937 RHSA-2021:0742 RHSA-2022:1074 SMASH Issue 277539 bdo#982435 bnc#1182092 jsc#CAR-980 rh#1927062 |
CVE-2021-27218 | glib2:Released | moderate | 5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N) | CONFIRM:security.netapp.com:CVE-2021-27218 CVE-2021-27218 FEDORA:FEDORA-2021-7b5e2e6844 FEDORA:FEDORA-2021-7c71cda8da GLSA-202107-13 MISC:gitlab.gnome.org:CVE-2021-27218 MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 MLIST:[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 MLIST:[debian-lts-announce] 20220606 [SECURITY] [DLA 3044-1] glib2.0 security update MLIST:[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar RH:CVE-2021-27218 RHSA-2021:3058 RHSA-2021:4526 SMASH Issue 277973 bnc#1182328 jsc#CAR-979 rh#1929847 |
CVE-2021-27219 | glib2:Released | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H) | CONFIRM:security.netapp.com:CVE-2021-27218 CVE-2021-21149 CVE-2021-21150 CVE-2021-21151 CVE-2021-21152 CVE-2021-21153 CVE-2021-21154 CVE-2021-21155 CVE-2021-21156 CVE-2021-21157 CVE-2021-27219 FEDORA:FEDORA-2021-7b5e2e6844 FEDORA:FEDORA-2021-7c71cda8da FEDORA:FEDORA-2021-aa764a8531 FEDORA:FEDORA-2021-c88a96bd4b GLSA-202104-08 GLSA-202107-13 MISC:chromereleases.googleblog.com:CVE-2021-21149 MISC:crbug.com:CVE-2021-21149 MISC:crbug.com:CVE-2021-21150 MISC:crbug.com:CVE-2021-21151 MISC:crbug.com:CVE-2021-21152 MISC:crbug.com:CVE-2021-21153 MISC:crbug.com:CVE-2021-21154 MISC:crbug.com:CVE-2021-21155 MISC:crbug.com:CVE-2021-21156 MISC:crbug.com:CVE-2021-21157 MISC:gitlab.gnome.org:CVE-2021-27219 MISC:packetstormsecurity.com:CVE-2021-21156 MLIST:[debian-lts-announce] 20220606 [SECURITY] [DLA 3044-1] glib2.0 security update MLIST:[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar RH:CVE-2021-27219 RHBA-2021:2854 RHSA-2021:2147 RHSA-2021:2170 RHSA-2021:2171 RHSA-2021:2172 RHSA-2021:2173 RHSA-2021:2174 RHSA-2021:2175 RHSA-2021:2203 RHSA-2021:2204 RHSA-2021:2467 RHSA-2021:2519 RHSA-2021:2522 RHSA-2021:4526 SMASH Issue 277974 bnc#1182362 jsc#CAR-978 rh#1929858 |
CVE-2021-27291 | python-Pygments:Unsupported | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-27291 DSA-4878 DSA-4889 FEDORA:FEDORA-2021-166dfc62b2 FEDORA:FEDORA-2021-3f975f68c8 MISC:gist.github.com:CVE-2021-27291 MISC:github.com:CVE-2021-27291 MLIST:[debian-lts-announce] 20210319 [SECURITY] [DLA 2600-1] pygments security update MLIST:[debian-lts-announce] 20210505 [SECURITY] [DLA 2648-1] mediawiki security update MLIST:[debian-lts-announce] 20210506 [SECURITY] [DLA 2648-2] mediawiki regression update RH:CVE-2021-27291 RHSA-2021:0781 RHSA-2021:3252 RHSA-2021:4139 RHSA-2021:4150 RHSA-2021:4151 SMASH Issue 279986 bdo#985574 bnc#1184812 https://www.debian.org/security/2021/dsa-4878 https://www.debian.org/security/2021/dsa-4889 jsc#CAR-977 rh#1940603 |
CVE-2021-27363 | kernel-source-rt:Released | important | 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2021-27363 CVE-2021-27363 L3:60356 L3:60484 L3:60501 L3:61966 MISC:blog.grimm-co.com:CVE-2021-27363 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2021-27364 MISC:packetstormsecurity.com:CVE-2020-27170 MISC:www.openwall.com:CVE-2021-27363 MLIST:[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update MLIST:[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update OSS:2021/Q1/196 RH:CVE-2021-27363 RHSA-2021:1069 RHSA-2021:1070 RHSA-2021:1071 RHSA-2021:1081 RHSA-2021:1093 RHSA-2021:1171 RHSA-2021:1173 RHSA-2021:1267 RHSA-2021:1272 RHSA-2021:1279 RHSA-2021:1288 RHSA-2021:1289 RHSA-2021:1295 RHSA-2021:1373 RHSA-2021:1376 RHSA-2021:1377 RHSA-2021:1379 RHSA-2021:1531 RHSA-2021:1532 SMASH Issue 278534 SMASH Issue 278536 bnc#1182713 bnc#1182715 bnc#1182716 bnc#1182717 bnc#1183120 bnc#1183816 bnc#1184307 bnc#1184343 bnc#1191932 jsc#CAR-975 jsc#CAR-976 rh#1930078 rh#1930079 rh#1930080 |
CVE-2021-27364 | kernel-source-rt:Released | important | 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2021-27363 CVE-2021-27364 L3:66541 L3:66770 L3:67469 MISC:blog.grimm-co.com:CVE-2021-27363 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2021-27364 MISC:packetstormsecurity.com:CVE-2020-27170 MISC:www.openwall.com:CVE-2021-27364 MLIST:[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update MLIST:[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update OSS:2021/Q1/196 RH:CVE-2021-27364 RHSA-2021:1069 RHSA-2021:1070 RHSA-2021:1071 RHSA-2021:1081 RHSA-2021:1093 RHSA-2021:1171 RHSA-2021:1173 RHSA-2021:1267 RHSA-2021:1272 RHSA-2021:1279 RHSA-2021:1288 RHSA-2021:1289 RHSA-2021:1295 RHSA-2021:1373 RHSA-2021:1376 RHSA-2021:1377 RHSA-2021:1379 RHSA-2021:1531 RHSA-2021:1532 SMASH Issue 278535 bnc#1182715 bnc#1182716 bnc#1182717 jsc#CAR-974 rh#1930078 rh#1930079 rh#1930080 |
CVE-2021-27365 | kernel-source-rt:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-27363 CVE-2021-27365 L3:66541 L3:66770 L3:67469 MISC:blog.grimm-co.com:CVE-2021-27363 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2021-27364 MISC:packetstormsecurity.com:CVE-2020-27170 MISC:www.openwall.com:CVE-2021-27363 MISC:www.openwall.com:CVE-2021-27364 MLIST:[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update MLIST:[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update OSS:2021/Q1/196 RH:CVE-2021-27365 RHSA-2021:1069 RHSA-2021:1070 RHSA-2021:1071 RHSA-2021:1081 RHSA-2021:1093 RHSA-2021:1171 RHSA-2021:1173 RHSA-2021:1267 RHSA-2021:1272 RHSA-2021:1279 RHSA-2021:1288 RHSA-2021:1289 RHSA-2021:1295 RHSA-2021:1373 RHSA-2021:1376 RHSA-2021:1377 RHSA-2021:1379 RHSA-2021:1531 RHSA-2021:1532 SMASH Issue 278532 SMASH Issue 278533 bnc#1182712 bnc#1182715 bnc#1182716 bnc#1182717 bnc#1183491 jsc#CAR-973 rh#1930078 rh#1930079 rh#1930080 |
CVE-2021-27645 | glibc:Not affected | low | 2.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-27645 FEDORA:FEDORA-2021-2ba993d6c5 FEDORA:FEDORA-2021-6749bfcfd9 GLSA-202107-07 MISC:sourceware.org:CVE-2021-27645 MLIST:[debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update RH:CVE-2021-27645 RHSA-2021:4358 SMASH Issue 278526 bnc#1182733 rh#1932589 |
CVE-2021-27853 | kernel-source-rt:Not affected | moderate | 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N) | CISCO:20220927 Vulnerabilities in Layer 2 Network Security Controls Affecting Cisco Products: September 2022 CONFIRM:datatracker.ietf.org:CVE-2021-27862 CONFIRM:standards.ieee.org:CVE-2021-27861 CONFIRM:standards.ieee.org:CVE-2021-27862 CVE-2021-27853 D:CVE-2021-27853 MISC:blog.champtar.fr:CVE-2021-27862 MISC:kb.cert.org:CVE-2021-27862 SMASH Issue 343692 bnc#1182622 bnc#1203840 rh#2010795 |
CVE-2021-27854 | kernel-source-rt:Not affected | moderate | 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N) | CONFIRM:datatracker.ietf.org:CVE-2021-27862 CONFIRM:standards.ieee.org:CVE-2021-27861 CONFIRM:standards.ieee.org:CVE-2021-27862 CVE-2021-27854 D:CVE-2021-27854 MISC:blog.champtar.fr:CVE-2021-27862 MISC:kb.cert.org:CVE-2021-27862 SMASH Issue 343693 bnc#1203839 rh#2010816 |
CVE-2021-27861 | kernel-source-rt:Not affected | moderate | 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N) | CONFIRM:datatracker.ietf.org:CVE-2021-27862 CONFIRM:standards.ieee.org:CVE-2021-27861 CONFIRM:standards.ieee.org:CVE-2021-27862 CVE-2021-27861 D:CVE-2021-27861 MISC:blog.champtar.fr:CVE-2021-27862 MISC:kb.cert.org:CVE-2021-27862 SMASH Issue 343694 bnc#1203838 rh#2130301 |
CVE-2021-27862 | kernel-source-rt:Not affected | moderate | 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N) | CONFIRM:datatracker.ietf.org:CVE-2021-27862 CONFIRM:standards.ieee.org:CVE-2021-27862 CVE-2021-27862 D:CVE-2021-27862 MISC:blog.champtar.fr:CVE-2021-27862 MISC:kb.cert.org:CVE-2021-27862 SMASH Issue 278451 SMASH Issue 343695 bnc#1182623 bnc#1203837 rh#2130298 |
CVE-2021-27919 | zip:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CVE-2021-27919 FEDORA:FEDORA-2021-6a3024b3fd FEDORA:FEDORA-2021-e71b05ba7b GLSA-202208-02 MISC:groups.google.com:CVE-2021-27918 RH:CVE-2021-27919 SMASH Issue 279511 SMASH Issue 279512 bnc#1183334 rh#1937909 |
CVE-2021-28038 | kernel-source-rt:Released | moderate | 6.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2021-27363 CVE-2021-28038 MISC:xenbits.xen.org:CVE-2021-28038 MLIST:[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update MLIST:[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update MLIST:[oss-security] 20210305 Xen Security Advisory 367 v2 (CVE-2021-28038) - Linux: netback fails to honor grant mapping errors OSS:2021/Q1/194 SMASH Issue 279267 SMASH Issue 279302 bnc#1183022 bnc#1183069 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2991397d23ec597405b116d96de3813420bdcbc3 rh#1936565 |
CVE-2021-28039 | kernel-source-rt:Not affected | moderate | 6.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2021-27363 CVE-2021-28039 MISC:xenbits.xen.org:CVE-2021-28039 MLIST:[oss-security] 20210305 Xen Security Advisory 369 v2 (CVE-2021-28039) - Linux: special config may crash when trying to map foreign pages OSS:2021/Q1/195 SMASH Issue 279268 SMASH Issue 279301 bnc#1183035 bnc#1183071 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=882213990d32fd224340a4533f6318dd152be4b2 rh#1936568 |
CVE-2021-28041 | openssh:Not affected | important | 7.1 (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-28041 CVE-2021-28041 D:CVE-2021-28041 FEDORA:FEDORA-2021-1d3698089d FEDORA:FEDORA-2021-f68a5a75ba GLSA-202105-35 L3:60650 MISC:github.com:CVE-2021-28041 MISC:www.openssh.com:CVE-2020-15778 MISC:www.openssh.com:CVE-2021-28041 MISC:www.openwall.com:CVE-2021-28041 N/A:N/A RH:CVE-2021-28041 SMASH Issue 279339 bnc#1183137 bnc#1185404 rh#1935055 |
CVE-2021-28153 | glib2:Unsupported | low | 3.7 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N) | CONFIRM:security.netapp.com:CVE-2021-28153 CVE-2021-28153 FEDORA:FEDORA-2021-5c81cb03d0 FEDORA:FEDORA-2021-a1f51fc418 GLSA-202107-13 MISC:gitlab.gnome.org:CVE-2021-28153 MLIST:[debian-lts-announce] 20220606 [SECURITY] [DLA 3044-1] glib2.0 security update RH:CVE-2021-28153 RHSA-2021:4385 RHSA-2022:8418 SMASH Issue 279711 bnc#1183533 jsc#CAR-1678 rh#1938291 |
CVE-2021-28375 | kernel-source-rt:Released | important | 7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-28375 CVE-2021-28375 FEDORA:FEDORA-2021-14f6642aa6 FEDORA:FEDORA-2021-90083c9c0f FEDORA:FEDORA-2021-bb755ed5e3 MISC:git.kernel.org:CVE-2021-28375 MISC:lore.kernel.org:CVE-2021-28375 RH:CVE-2021-28375 SMASH Issue 279802 bnc#1183596 bnc#1184955 jsc#CAR-484 rh#1939164 |
CVE-2021-28660 | kernel-source-rt:Released | important | 8 (CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-28660 CVE-2021-28660 FEDORA:FEDORA-2021-bb755ed5e3 MISC:git.kernel.org:CVE-2021-28660 MISC:git.kernel.org:OSS:2022/11/18/1 MISC:github.com:OSS:2022/11/18/1 MLIST:[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update OSS:2022/11/18/1 OSS:2022/11/21/2 RH:CVE-2021-28660 SMASH Issue 279869 bnc#1183593 bnc#1183658 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TJPVQZPY3DHPV5I3IVNMSMO6D3PKZISX/ jsc#CAR-972 rh#1940590 |
CVE-2021-28688 | kernel-source-rt:Released | moderate | 6.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H) | CVE-2021-28688 MISC:xenbits.xenproject.org:CVE-2021-28688 MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update OSS:2021/Q1/276 SMASH Issue 279927 SMASH Issue 280142 bnc#1183646 jsc#CAR-971 rh#1945663 |
CVE-2021-28691 | kernel-source-rt:Not affected | important | 7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-28691 CVE-2021-28691 D:CVE-2021-28691 GLSA-202107-30 MISC:xenbits.xenproject.org:CVE-2021-28691 OSS:2021/Q2/192 SMASH Issue 300698 SMASH Issue 300699 bnc#1186430 linux.git:commit:107866a8eb0b664675a260f1ba0655010fac1e08 rh#1970536 |
CVE-2021-28711 | kernel-source:Released, kernel-source-azure:Released, kernel-source-rt:Released | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-28711 CVE-2021-28712 CVE-2021-28713 DSA-5050 DSA-5096 MISC:xenbits.xenproject.org:CVE-2021-28713 MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update OSS:2021/07/22/1 OSS:2021/Q4/175 OSS:2022/01/13/1 OSS:2022/01/25/12 SMASH Issue 316357 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bdo#996974 bnc#1193440 jsc#CAR-1429 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2034940 rh#2044561 rh#2053632 rh#2055502 rh#2059923 |
CVE-2021-28712 | kernel-source:Released, kernel-source-azure:Released, kernel-source-rt:Released | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-28711 CVE-2021-28712 CVE-2021-28713 DSA-5050 DSA-5096 MISC:xenbits.xenproject.org:CVE-2021-28713 MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update OSS:2021/07/22/1 OSS:2021/Q4/175 OSS:2022/01/13/1 OSS:2022/01/25/12 SMASH Issue 316357 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bdo#996974 bnc#1193440 jsc#CAR-1429 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2034940 rh#2044561 rh#2053632 rh#2055502 rh#2059923 |
CVE-2021-28713 | kernel-source:Released, kernel-source-azure:Released, kernel-source-rt:Released | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-28711 CVE-2021-28712 CVE-2021-28713 DSA-5050 DSA-5096 MISC:xenbits.xenproject.org:CVE-2021-28713 MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update OSS:2021/07/22/1 OSS:2021/Q4/175 OSS:2022/01/13/1 OSS:2022/01/25/12 SMASH Issue 316357 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bdo#996974 bnc#1193440 jsc#CAR-1429 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2034940 rh#2044561 rh#2053632 rh#2055502 rh#2059923 |
CVE-2021-28714 | kernel-source:Released, kernel-source-azure:Released, kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-28714 CVE-2021-28715 DSA-5050 DSA-5096 MISC:xenbits.xenproject.org:CVE-2021-28715 MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update OSS:2021/07/22/1 OSS:2021/Q4/176 OSS:2022/01/13/1 OSS:2022/01/25/12 SMASH Issue 316358 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bdo#996974 bnc#1193442 jsc#CAR-1428 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2031199 rh#2044561 rh#2053632 rh#2055502 rh#2059923 |
CVE-2021-28715 | kernel-source:Released, kernel-source-azure:Released, kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-28714 CVE-2021-28715 DSA-5050 DSA-5096 MISC:xenbits.xenproject.org:CVE-2021-28715 MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update OSS:2021/07/22/1 OSS:2021/Q4/176 OSS:2022/01/13/1 OSS:2022/01/25/12 SMASH Issue 316358 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bdo#996974 bnc#1193442 jsc#CAR-1428 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2031199 rh#2044561 rh#2053632 rh#2055502 rh#2059923 |
CVE-2021-28831 | busybox:Released | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-28831 FEDORA:FEDORA-2021-2024803354 FEDORA:FEDORA-2021-d20c8a4730 FEDORA:FEDORA-2021-e82915eee1 GLSA-202105-09 L3:60714 MISC:git.busybox.net:CVE-2021-28831 MLIST:[debian-lts-announce] 20210401 [SECURITY] [DLA 2614-1] busybox security update RH:CVE-2021-28831 SMASH Issue 280137 bnc#1184522 bnc#1185752 jsc#CAR-970 rh#1941028 |
CVE-2021-28861 | python3:Released | important | 7.4 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N) | CVE-2021-28861 D:CVE-2021-28861 FEDORA:FEDORA-2022-01d5789c08 FEDORA:FEDORA-2022-15f1aa7dc7 FEDORA:FEDORA-2022-20116fb6aa FEDORA:FEDORA-2022-2173709172 FEDORA:FEDORA-2022-4ac2e16969 FEDORA:FEDORA-2022-61d8e8d880 FEDORA:FEDORA-2022-79843dfb3c FEDORA:FEDORA-2022-7ca361a226 FEDORA:FEDORA-2022-7fff0f2b0b FEDORA:FEDORA-2022-a27e239f5a FEDORA:FEDORA-2022-a2be4bd5d8 FEDORA:FEDORA-2022-d1682fef04 FEDORA:FEDORA-2022-f511f8f58b FEDORA:FEDORA-2022-fde69532df L3:64282 L3:64457 L3:64458 L3:64535 L3:64542 L3:64636 L3:65722 MISC:bugs.python.org:CVE-2021-28861 MISC:github.com:CVE-2021-28861 MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/IFGV7P2PYFBMK32OKHCAC2ZPJQV5AUDF/ MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/OKYE2DOI2X7WZXAWTQJZAXYIWM37HDCY/ MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/WXF6MQ74HVIDDSR5AE2UDR24I6D4FEPC/ RHSA-2022:6766 RHSA-2022:8353 RHSA-2023:0833 RHSA-2023:2763 RHSA-2023:2764 SMASH Issue 340514 bnc#1202624 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2TRINJE3INWDVIHIABW4L2NP3RUSK7BJ/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LTSPFIULY2GZJN3QYNFVM4JSU6H4D6J/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5OABQ5CMPQETJLFHROAXDIDXCMDTNVYG/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DISZAFSIQ7IAPAEQTC7G2Z5QUA2V2PSW/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HPX4XHT2FGVQYLY2STT2MRVENILNZTTU/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I3MQT5ZE3QH5PVDJMERTBOCILHK35CBE/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KRGKPYA5YHIXQAMRIXO5DSCX7D4UUW4Q/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QLE5INSVJUZJGY5OJXV6JREXWD7UDHYN/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S7G66SRWUM36ENQ3X6LAIG7HAB27D4XJ/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TZEPOPUFC42KXXSLFPZ47ZZRGPOR7SQE/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X46T4EFTIBXZRYTGASBDEZGYJINH2OWV/ https://security.gentoo.org/glsa/202305-02 jsc#CAR-1977 rh#2120642 |
CVE-2021-28950 | kernel-source-rt:Released | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-28950 DSA-5096 FEDORA:FEDORA-2021-e49da8a226 FEDORA:FEDORA-2021-f0181b8085 MISC:cdn.kernel.org:CVE-2021-28950 MISC:git.kernel.org:CVE-2021-28950 MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update OSS:2021/07/22/1 OSS:2022/01/25/12 RH:CVE-2021-28950 RHSA-2021:1578 RHSA-2021:4140 RHSA-2021:4356 RHSA-2021:4648 RHSA-2021:4650 SMASH Issue 280165 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1184194 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1941762 rh#1949560 rh#1980646 rh#1997467 rh#2044561 rh#2053632 rh#2055502 rh#2059923 |
CVE-2021-28951 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2021-28971 CVE-2021-28951 FEDORA:FEDORA-2021-68b0dd2373 FEDORA:FEDORA-2021-9503fffad9 FEDORA:FEDORA-2021-e636ce53df MISC:git.kernel.org:CVE-2021-28951 RH:CVE-2021-28951 SMASH Issue 280166 bnc#1184195 rh#1941769 |
CVE-2021-28952 | kernel-source-rt:Ignore | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-28971 CVE-2021-28952 FEDORA:FEDORA-2021-68b0dd2373 FEDORA:FEDORA-2021-9503fffad9 FEDORA:FEDORA-2021-e636ce53df MISC:git.kernel.org:CVE-2021-28952 MISC:lore.kernel.org:CVE-2021-28952 RH:CVE-2021-28952 SMASH Issue 280167 bnc#1184197 bnc#1184199 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1941774 |
CVE-2021-28957 | python-lxml:Released | moderate | 6.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) | CONFIRM:security.netapp.com:CVE-2021-28957 CVE-2021-28957 DSA-4880 FEDORA:FEDORA-2021-28723f9670 FEDORA:FEDORA-2021-4cdb0f68c7 GLSA-202208-06 MISC:bugs.launchpad.net:CVE-2021-28957 MISC:github.com:CVE-2021-28957 MISC:www.oracle.com:CVE-2021-35666 MLIST:[debian-lts-announce] 20210324 [SECURITY] [DLA 2606-1] lxml security update RH:CVE-2021-28957 RHSA-2021:3254 RHSA-2021:4151 RHSA-2021:4158 RHSA-2021:4160 RHSA-2021:4162 SMASH Issue 280170 bdo#985643 bnc#1184177 jsc#CAR-419 rh#1941534 |
CVE-2021-28964 | kernel-source-rt:Released | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2021-28971 CVE-2021-28964 FEDORA:FEDORA-2021-68b0dd2373 FEDORA:FEDORA-2021-9503fffad9 FEDORA:FEDORA-2021-e636ce53df MISC:git.kernel.org:CVE-2021-28964 MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update RH:CVE-2021-28964 SMASH Issue 280191 bnc#1184193 rh#1941804 |
CVE-2021-28971 | kernel-source-rt:Released | moderate | 5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2021-28971 CVE-2021-28971 FEDORA:FEDORA-2021-68b0dd2373 FEDORA:FEDORA-2021-9503fffad9 FEDORA:FEDORA-2021-e636ce53df MISC:git.kernel.org:CVE-2021-28971 MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update RH:CVE-2021-28971 RHSA-2021:4140 RHSA-2021:4356 SMASH Issue 280207 bnc#1184196 rh#1941784 |
CVE-2021-28972 | kernel-source-rt:Released | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-28971 CVE-2021-28972 FEDORA:FEDORA-2021-68b0dd2373 FEDORA:FEDORA-2021-9503fffad9 FEDORA:FEDORA-2021-e636ce53df L3:67660 MISC:git.kernel.org:CVE-2021-28972 RH:CVE-2021-28972 SMASH Issue 280206 bnc#1184198 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1941781 |
CVE-2021-29154 | kernel-source-rt:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-29154 CVE-2021-29154 FEDORA:FEDORA-2021-e71c033f88 L3:60843 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2021-29154 MISC:news.ycombinator.com:CVE-2021-29154 MISC:packetstormsecurity.com:CVE-2021-3493 MISC:www.openwall.com:CVE-2021-29154 MISC:www.oracle.com:CVE-2022-21586 MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update OSS:2021/04/08/1 OSS:2021/Q2/12 RH:CVE-2021-29154 RHSA-2021:3327 RHSA-2021:3328 RHSA-2022:1975 RHSA-2022:1988 SMASH Issue 281203 SMASH Issue 281211 bnc#1184391 bnc#1184710 bnc#1186408 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=26f55a59dc65ff77cd1c4b37991e26497fc68049 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e4d4d456436bfb2fe412ee2cd489f7658449b098 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W5YFGIIF24475A2LNW3UWHW2SNCS3G7M/ rh#1946684 |
CVE-2021-29155 | kernel-source-rt:Released | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) | CVE-2021-29155 FEDORA:FEDORA-2021-8cd093f639 FEDORA:FEDORA-2021-a963f04012 FEDORA:FEDORA-2021-e6b4847979 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2021-29155 MISC:www.kernel.org:CVE-2021-29155 MISC:www.openwall.com:CVE-2021-29155 MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update OSS:2021/04/18/4 OSS:2021/Q2/34 RHSA-2021:4140 RHSA-2021:4356 SMASH Issue 282223 bnc#1184942 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=073815b756c51ba9d8384d924c5d1c03ca3d1ae4 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=24c109bb1537c12c02aeed2d51a347b4d6a9b76e https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6f55b2f2a1178856c19bbce2f71449926e731914 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7fedb63a8307dda0ec3b8969a3b233a1dd7ea8e0 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9601148392520e2e134936e76788fc2a6371e7be https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a6aaece00a57fa6f22575364b3903dfbccf5345d https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b658bbb844e28f1862867f37e8ca11a8e2aa94a3 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f528819334881fd622fdadeddb3f7edaed8b7c9b https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CUX2CA63453G34C6KYVBLJXJXEARZI2X/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAEQ3H6HKNO6KUCGRZVYSFSAGEUX23JL/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XZASHZVCOFJ4VU2I3BN5W5EPHWJQ7QWX/ jsc#CAR-969 rh#1951595 |
CVE-2021-29256 | kernel-source-rt:Ignore | important | 8.8 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:developer.arm.com:CVE-2021-28664 CVE-2021-29256 SMASH Issue 300624 bnc#1186494 |
CVE-2021-29264 | kernel-source-rt:Released | moderate | 6.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-29264 MISC:git.kernel.org:CVE-2021-29264 MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update RH:CVE-2021-29264 SMASH Issue 280593 bnc#1184168 rh#1944689 |
CVE-2021-29265 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-29265 MISC:cdn.kernel.org:CVE-2021-29265 MISC:git.kernel.org:CVE-2021-29265 MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update RH:CVE-2021-29265 SMASH Issue 280594 bnc#1184167 rh#1944695 |
CVE-2021-29266 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2021-29266 CVE-2021-29266 MISC:cdn.kernel.org:CVE-2021-29266 MISC:git.kernel.org:CVE-2021-29266 RH:CVE-2021-29266 SMASH Issue 280595 bnc#1184166 rh#1944700 |
CVE-2021-29646 | kernel-source-rt:Not affected | moderate | () | CVE-2021-29646 FEDORA:FEDORA-2021-2306e89112 FEDORA:FEDORA-2021-41fb54ae9f FEDORA:FEDORA-2021-6b0f287b8b MISC:cdn.kernel.org:CVE-2021-29646 MISC:git.kernel.org:CVE-2021-29646 RH:CVE-2021-29646 RHSA-2021:4140 RHSA-2021:4356 SMASH Issue 280754 bnc#1184191 rh#1945345 |
CVE-2021-29647 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2021-29647 FEDORA:FEDORA-2021-2306e89112 FEDORA:FEDORA-2021-41fb54ae9f FEDORA:FEDORA-2021-6b0f287b8b MISC:cdn.kernel.org:CVE-2021-29646 MISC:git.kernel.org:CVE-2021-29647 MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update RH:CVE-2021-29647 SMASH Issue 280755 bnc#1184192 jsc#CAR-968 rh#1945361 |
CVE-2021-29648 | kernel-source-rt:Not affected | moderate | () | CVE-2021-29648 FEDORA:FEDORA-2021-2306e89112 FEDORA:FEDORA-2021-41fb54ae9f FEDORA:FEDORA-2021-6b0f287b8b MISC:cdn.kernel.org:CVE-2021-29646 MISC:git.kernel.org:CVE-2021-29648 RH:CVE-2021-29648 SMASH Issue 280756 bnc#1184200 rh#1945373 |
CVE-2021-29649 | kernel-source-rt:Not affected | moderate | () | CVE-2021-29649 FEDORA:FEDORA-2021-2306e89112 FEDORA:FEDORA-2021-41fb54ae9f FEDORA:FEDORA-2021-6b0f287b8b MISC:cdn.kernel.org:CVE-2021-29646 MISC:git.kernel.org:CVE-2021-29649 RH:CVE-2021-29649 SMASH Issue 280757 bnc#1184205 rh#1945379 |
CVE-2021-29650 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-29650 FEDORA:FEDORA-2021-2306e89112 FEDORA:FEDORA-2021-41fb54ae9f FEDORA:FEDORA-2021-6b0f287b8b MISC:cdn.kernel.org:CVE-2021-29646 MISC:git.kernel.org:CVE-2021-29650 MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update RH:CVE-2021-29650 RHSA-2021:3327 RHSA-2021:3328 RHSA-2021:4140 RHSA-2021:4356 SMASH Issue 280758 bnc#1184208 jsc#CAR-482 rh#1945388 |
CVE-2021-29657 | kernel-source-rt:Not affected | important | 8.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H) | CONFIRM:cdn.kernel.org:CVE-2021-29657 CONFIRM:git.kernel.org:CVE-2021-29657 CVE-2021-29657 MISC:bugs.chromium.org:CVE-2021-29657 MISC:packetstormsecurity.com:CVE-2021-29657 SMASH Issue 305041 bnc#1188637 https://security.netapp.com/advisory/ntap-20210902-0008/ linux.git:commit:a58d9166a756a0f4a6618e4f593232593d6df134 rh#1995153 |
CVE-2021-29921 | python3:Not affected | important | 8.6 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H) | CONFIRM:security.netapp.com:CVE-2021-29921 CVE-2021-29921 MISC:bugs.python.org:CVE-2021-29921 MISC:docs.python.org:CVE-2021-29921 MISC:github.com:CVE-2020-15590 MISC:github.com:CVE-2021-29921 MISC:python-security.readthedocs.io:CVE-2021-29921 MISC:sick.codes:CVE-2021-29921 MISC:www.oracle.com:CVE-2021-35666 MISC:www.oracle.com:CVE-2022-21403 MISC:www.oracle.com:CVE-2022-21498 MISC:www.oracle.com:CVE-2022-21586 N/A:N/A Oracle:CVE-2021-29921 RHSA-2021:3254 RHSA-2021:4160 RHSA-2021:4162 SMASH Issue 283522 bnc#1185706 https://security.gentoo.org/glsa/202305-02 rh#1957458 |
CVE-2021-30002 | kernel-source-rt:Released | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-30002 MISC:cdn.kernel.org:CVE-2021-30002 MISC:git.kernel.org:CVE-2021-30002 MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update RH:CVE-2021-30002 RHSA-2022:7444 RHSA-2022:7683 SMASH Issue 280605 SMASH Issue 280914 bnc#1184120 jsc#CAR-967 rh#1946279 |
CVE-2021-30178 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-30178 FEDORA:FEDORA-2021-57a7ba61f8 FEDORA:FEDORA-2021-8b64847a44 FEDORA:FEDORA-2021-e71c033f88 MISC:git.kernel.org:CVE-2021-30178 RH:CVE-2021-30178 SMASH Issue 281260 bnc#1184499 rh#1947139 |
CVE-2021-30541 | libxslt:Ignore | important | () | CVE-2021-30541 CVE-2021-30559 CVE-2021-30560 CVE-2021-30561 CVE-2021-30562 CVE-2021-30563 CVE-2021-30564 DSA-5216 MISC:chromereleases.googleblog.com:CVE-2021-30564 MISC:crbug.com:CVE-2021-30541 MISC:crbug.com:CVE-2021-30559 MISC:crbug.com:CVE-2021-30560 MISC:crbug.com:CVE-2021-30561 MISC:crbug.com:CVE-2021-30562 MISC:crbug.com:CVE-2021-30563 MISC:crbug.com:CVE-2021-30564 MLIST:[debian-lts-announce] 20220909 [SECURITY] [DLA 3101-1] libxslt security update SMASH Issue 304388 SMASH Issue 317492 bnc#1188373 rh#1982843 rh#1982844 rh#1982845 rh#1982846 rh#1982847 rh#1982848 rh#1982849 |
CVE-2021-30559 | libxslt:Ignore | important | () | CVE-2021-30541 CVE-2021-30559 CVE-2021-30560 CVE-2021-30561 CVE-2021-30562 CVE-2021-30563 CVE-2021-30564 DSA-5216 MISC:chromereleases.googleblog.com:CVE-2021-30564 MISC:crbug.com:CVE-2021-30541 MISC:crbug.com:CVE-2021-30559 MISC:crbug.com:CVE-2021-30560 MISC:crbug.com:CVE-2021-30561 MISC:crbug.com:CVE-2021-30562 MISC:crbug.com:CVE-2021-30563 MISC:crbug.com:CVE-2021-30564 MLIST:[debian-lts-announce] 20220909 [SECURITY] [DLA 3101-1] libxslt security update SMASH Issue 304389 SMASH Issue 317492 bnc#1188373 rh#1982843 rh#1982844 rh#1982845 rh#1982846 rh#1982847 rh#1982848 rh#1982849 |
CVE-2021-30560 | libxslt:Released | important | 8.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) | CVE-2021-30541 CVE-2021-30559 CVE-2021-30560 CVE-2021-30561 CVE-2021-30562 CVE-2021-30563 CVE-2021-30564 DSA-5216 L3:65331 L3:65884 L3:65885 L3:65897 MISC:chromereleases.googleblog.com:CVE-2021-30564 MISC:crbug.com:CVE-2021-30541 MISC:crbug.com:CVE-2021-30559 MISC:crbug.com:CVE-2021-30560 MISC:crbug.com:CVE-2021-30561 MISC:crbug.com:CVE-2021-30562 MISC:crbug.com:CVE-2021-30563 MISC:crbug.com:CVE-2021-30564 MLIST:[debian-lts-announce] 20220909 [SECURITY] [DLA 3101-1] libxslt security update SMASH Issue 304384 SMASH Issue 317492 bnc#1188373 bnc#1208574 bnc#1208729 https://security.gentoo.org/glsa/202310-23 jsc#CAR-2388 rh#1982843 rh#1982844 rh#1982845 rh#1982846 rh#1982847 rh#1982848 rh#1982849 |
CVE-2021-30561 | libxslt:Ignore | important | () | CVE-2021-30541 CVE-2021-30559 CVE-2021-30560 CVE-2021-30561 CVE-2021-30562 CVE-2021-30563 CVE-2021-30564 DSA-5216 MISC:chromereleases.googleblog.com:CVE-2021-30564 MISC:crbug.com:CVE-2021-30541 MISC:crbug.com:CVE-2021-30559 MISC:crbug.com:CVE-2021-30560 MISC:crbug.com:CVE-2021-30561 MISC:crbug.com:CVE-2021-30562 MISC:crbug.com:CVE-2021-30563 MISC:crbug.com:CVE-2021-30564 MLIST:[debian-lts-announce] 20220909 [SECURITY] [DLA 3101-1] libxslt security update SMASH Issue 304385 SMASH Issue 317492 bnc#1188373 rh#1982843 rh#1982844 rh#1982845 rh#1982846 rh#1982847 rh#1982848 rh#1982849 |
CVE-2021-30562 | libxslt:Ignore | important | () | CVE-2021-30541 CVE-2021-30559 CVE-2021-30560 CVE-2021-30561 CVE-2021-30562 CVE-2021-30563 CVE-2021-30564 DSA-5216 MISC:chromereleases.googleblog.com:CVE-2021-30564 MISC:crbug.com:CVE-2021-30541 MISC:crbug.com:CVE-2021-30559 MISC:crbug.com:CVE-2021-30560 MISC:crbug.com:CVE-2021-30561 MISC:crbug.com:CVE-2021-30562 MISC:crbug.com:CVE-2021-30563 MISC:crbug.com:CVE-2021-30564 MLIST:[debian-lts-announce] 20220909 [SECURITY] [DLA 3101-1] libxslt security update SMASH Issue 304387 SMASH Issue 317492 bnc#1188373 rh#1982843 rh#1982844 rh#1982845 rh#1982846 rh#1982847 rh#1982848 rh#1982849 |
CVE-2021-30563 | libxslt:Ignore | important | () | CVE-2021-30541 CVE-2021-30559 CVE-2021-30560 CVE-2021-30561 CVE-2021-30562 CVE-2021-30563 CVE-2021-30564 DSA-5216 MISC:chromereleases.googleblog.com:CVE-2021-30564 MISC:crbug.com:CVE-2021-30541 MISC:crbug.com:CVE-2021-30559 MISC:crbug.com:CVE-2021-30560 MISC:crbug.com:CVE-2021-30561 MISC:crbug.com:CVE-2021-30562 MISC:crbug.com:CVE-2021-30563 MISC:crbug.com:CVE-2021-30564 MLIST:[debian-lts-announce] 20220909 [SECURITY] [DLA 3101-1] libxslt security update SMASH Issue 304386 SMASH Issue 317492 bnc#1188373 rh#1982843 rh#1982844 rh#1982845 rh#1982846 rh#1982847 rh#1982848 rh#1982849 |
CVE-2021-30564 | libxslt:Ignore | important | () | CVE-2021-30541 CVE-2021-30559 CVE-2021-30560 CVE-2021-30561 CVE-2021-30562 CVE-2021-30563 CVE-2021-30564 DSA-5216 MISC:chromereleases.googleblog.com:CVE-2021-30564 MISC:crbug.com:CVE-2021-30541 MISC:crbug.com:CVE-2021-30559 MISC:crbug.com:CVE-2021-30560 MISC:crbug.com:CVE-2021-30561 MISC:crbug.com:CVE-2021-30562 MISC:crbug.com:CVE-2021-30563 MISC:crbug.com:CVE-2021-30564 MLIST:[debian-lts-announce] 20220909 [SECURITY] [DLA 3101-1] libxslt security update SMASH Issue 304383 SMASH Issue 317492 bnc#1188373 rh#1982843 rh#1982844 rh#1982845 rh#1982846 rh#1982847 rh#1982848 rh#1982849 |
CVE-2021-31239 | sqlite3:Already fixed | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-31239 D:CVE-2021-31239 MISC:www.sqlite.org:CVE-2022-35737 SMASH Issue 365535 bnc#1211222 https://github.com/Tsiming/Vulnerabilities/blob/main/SQLite/CVE-2021-31239 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/73XUIHJ6UT75VFPDPLJOXJON7MVIKVZI/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FXFL4TDAH72PRCPD5UPZMJMKIMVOPLTI/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/73XUIHJ6UT75VFPDPLJOXJON7MVIKVZI/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FXFL4TDAH72PRCPD5UPZMJMKIMVOPLTI/ https://security.gentoo.org/glsa/202311-03 https://security.netapp.com/advisory/ntap-20230609-0010/ https://www.sqlite.org/forum/forumpost/d9fce1a89b rh#2207557 |
CVE-2021-31440 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-31440 CVE-2021-31440 MISC:git.kernel.org:CVE-2021-31440 RHSA-2021:4140 RHSA-2021:4356 SMASH Issue 283382 ZDI-21-503 bnc#1190126 bnc#1190127 https://www.zerodayinitiative.com/advisories/ZDI-21-503/ rh#1964028 |
CVE-2021-31566 | libarchive:Released | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L) | CVE-2021-23177 CVE-2021-31566 MISC:access.redhat.com:CVE-2021-23177 MISC:access.redhat.com:CVE-2021-31566 MISC:github.com:CVE-2021-23177 MISC:github.com:CVE-2021-31566 MLIST:[debian-lts-announce] 20221122 [SECURITY] [DLA 3202-1] libarchive security update RHSA-2022:0892 SMASH Issue 314413 SMASH Issue 317800 bnc#1192426 bnc#1192427 jsc#CAR-1521 rh#2024237 rh#2024245 |
CVE-2021-3177 | python3:Released | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2021-3177 CVE-2021-3177 FEDORA:FEDORA-2021-076a2dccba FEDORA:FEDORA-2021-17668e344a FEDORA:FEDORA-2021-3352c1c802 FEDORA:FEDORA-2021-42ba9feb47 FEDORA:FEDORA-2021-66547ff92d FEDORA:FEDORA-2021-7547ad987f FEDORA:FEDORA-2021-851c6e4e2d FEDORA:FEDORA-2021-907f3bacae FEDORA:FEDORA-2021-cc3ff94cfc FEDORA:FEDORA-2021-ced31f3f0c FEDORA:FEDORA-2021-d5cde50865 FEDORA:FEDORA-2021-e3a5a74610 FEDORA:FEDORA-2021-f4fd9372c7 FEDORA:FEDORA-2021-faf88b9499 GLSA-202101-18 MISC:bugs.python.org:CVE-2021-3177 MISC:github.com:CVE-2021-3177 MISC:news.ycombinator.com:CVE-2021-3177 MISC:python-security.readthedocs.io:CVE-2021-3177 MISC:www.oracle.com:CVE-2021-35666 MISC:www.oracle.com:CVE-2022-21403 MISC:www.oracle.com:CVE-2022-21586 MLIST:[debian-lts-announce] 20210405 [SECURITY] [DLA 2619-1] python3.5 security update MLIST:[debian-lts-announce] 20220212 [SECURITY] [DLA 2919-1] python2.7 security update MLIST:[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar N/A:N/A Oracle:CVE-2021-3177 RH:CVE-2021-3177 RHSA-2021:1633 RHSA-2021:1761 RHSA-2021:1879 RHSA-2021:3252 RHSA-2021:3254 RHSA-2022:5235 SMASH Issue 275777 bnc#1181126 https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html jsc#CAR-966 rh#1918168 |
CVE-2021-3178 | kernel-source-rt:Ignore | moderate | 5.7 (CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N) | CVE-2021-3178 FEDORA:FEDORA-2021-3bcc7198c8 MISC:git.kernel.org:CVE-2021-3178 MISC:patchwork.kernel.org:CVE-2021-3178 MLIST:[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update RH:CVE-2021-3178 SMASH Issue 275778 bnc#1181162 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5SGB7TNDVQEOJ7NVTGX56UWHDNQM5TRC/ https://patchwork.kernel.org/project/linux-nfs/patch/20210111210129.GA11652%40fieldses.org/ rh#1918179 |
CVE-2021-31795 | kernel-source-rt:Not affected | moderate | () | CVE-2021-31795 MISC:mcyoloswagham.github.io:CVE-2021-31795 SMASH Issue 282853 bnc#1185354 |
CVE-2021-31829 | kernel-source-rt:Already fixed | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) | CVE-2021-31829 FEDORA:FEDORA-2021-5ad5249c43 FEDORA:FEDORA-2021-7c085ca697 FEDORA:FEDORA-2021-9c0276e935 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2021-31829 MISC:github.com:CVE-2021-31829 MISC:www.openwall.com:CVE-2021-31829 MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update OSS:2021/Q2/92 RHSA-2021:4140 RHSA-2021:4356 SMASH Issue 283421 bnc#1188561 rh#1957788 |
CVE-2021-31916 | kernel-source-rt:Released | moderate | 6.8 (CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-31916 D:CVE-2021-31916 MISC:github.com:CVE-2021-31916 MISC:seclists.org:CVE-2021-31916 MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update RHSA-2021:4140 RHSA-2021:4356 SMASH Issue 283275 bnc#1192781 rh#1946965 |
CVE-2021-3200 | libsolv:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H) | CVE-2021-3200 L3:60837 MISC:github.com:CVE-2021-3200 MISC:www.oracle.com:CVE-2022-21498 Oracle:CVE-2021-3200 RHSA-2021:4408 RHSA-2022:5498 SMASH Issue 284558 bnc#1186229 bnc#1186393 rh#1962307 |
CVE-2021-32078 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CONFIRM:git.kernel.org:CVE-2021-32078 CONFIRM:github.com:CVE-2021-32078 CVE-2021-32078 MISC:kirtikumarar.com:CVE-2021-32078 SMASH Issue 302472 bnc#1187489 rh#1973436 |
CVE-2021-32292 | json-c:Not affected | critical | () | CVE-2021-32292 DSA-5486 SMASH Issue 376000 bnc#1214699 https://github.com/json-c/json-c/issues/654 https://security.netapp.com/advisory/ntap-20230929-0010/ https://www.debian.org/security/2023/dsa-5486 rh#2235514 |
CVE-2021-32399 | kernel-source-rt:Released | important | 7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-32399 CVE-2021-32399 L3:60782 MISC:git.kernel.org:CVE-2021-32399 MISC:github.com:MLIST:[oss-security] 20210511 CVE-2021-32399 Linux device detach race condition MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update MLIST:[oss-security] 20210511 CVE-2021-32399 Linux device detach race condition OSS:2021/Q2/116 RHSA-2021:2714 RHSA-2021:2715 RHSA-2021:2716 RHSA-2021:2736 RHSA-2021:3173 RHSA-2021:3181 RHSA-2021:3320 RHSA-2021:3321 RHSA-2021:3327 RHSA-2021:3328 RHSA-2021:3363 RHSA-2021:3375 RHSA-2021:3380 RHSA-2021:3381 RHSA-2021:3392 RHSA-2021:3399 RHSA-2021:3477 RHSA-2021:3522 RHSA-2021:3523 RHSA-2021:3725 RHSA-2022:0157 SMASH Issue 283935 bnc#1184611 bnc#1185898 bnc#1185899 bnc#1186136 jsc#CAR-965 rh#1970807 |
CVE-2021-32606 | kernel-source-rt:Not affected | important | 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-32606 FEDORA:FEDORA-2021-4f852b79d1 FEDORA:FEDORA-2021-8832eab899 FEDORA:FEDORA-2021-bae582b42c MISC:cve.mitre.org:MLIST:[oss-security] 20210512 Re: Linux kernel: net/can/isotp: race condition leads to local privilege escalation MISC:git.kernel.org:MLIST:[oss-security] 20210528 Re: Linux kernel: net/can/isotp: race condition leads to local privilege escalation MISC:oss-security.openwall.org:MLIST:[oss-security] 20210514 Re: Linux kernel: net/can/isotp: race condition leads to local privilege escalation MISC:www.openwall.com:CVE-2021-32606 MLIST:[oss-security] 20210512 Re: Linux kernel: net/can/isotp: race condition leads to local privilege escalation MLIST:[oss-security] 20210514 Re: Linux kernel: net/can/isotp: race condition leads to local privilege escalation MLIST:[oss-security] 20210528 Re: Linux kernel: net/can/isotp: race condition leads to local privilege escalation OSS:2021/05/11/16 OSS:2021/Q2/132 OSS:2021/Q2/136 SMASH Issue 284122 bnc#1185564 bnc#1185953 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2b17c400aeb44daf041627722581ade527bb3c1d https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/73D53S4IZFPFQMRABMXXLW4AJK3EULDX/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GI7Z7UBWBGD3ABNIL2DC7RQDCGA4UVQW/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HD3NJBG25AADVGPRC63RX2JOQBMPSWK4/ https://security.netapp.com/advisory/ntap-20210625-0001/ rh#1959673 |
CVE-2021-33033 | kernel-source-rt:Released | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-33033 DSA-5096 L3:60834 MISC:cdn.kernel.org:CVE-2021-29265 MISC:cdn.kernel.org:CVE-2021-33033 MISC:git.kernel.org:CVE-2021-33033 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2021-29154 MISC:sites.google.com:CVE-2021-33033 MISC:syzkaller.appspot.com:CVE-2021-33033 OSS:2021/04/08/1 OSS:2021/07/22/1 OSS:2022/01/25/12 RHSA-2021:2725 RHSA-2021:2726 RHSA-2021:4140 RHSA-2021:4356 SMASH Issue 284322 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1186109 bnc#1186283 bnc#1186390 jsc#CAR-964 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1961300 rh#1975949 rh#1980646 rh#1997467 rh#2044561 rh#2053632 rh#2059923 |
CVE-2021-33034 | kernel-source-rt:Released | important | 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H) | CVE-2021-33034 FEDORA:FEDORA-2021-bae582b42c MISC:cdn.kernel.org:CVE-2021-33034 MISC:git.kernel.org:CVE-2021-33034 MISC:sites.google.com:CVE-2021-33034 MISC:syzkaller.appspot.com:CVE-2021-33034 MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update RHBA-2021:2854 RHSA-2021:2563 RHSA-2021:2570 RHSA-2021:2599 RHSA-2021:2666 RHSA-2021:2668 RHSA-2021:2718 RHSA-2021:2719 RHSA-2021:2720 RHSA-2021:2725 RHSA-2021:2726 RHSA-2021:2727 RHSA-2021:2728 RHSA-2021:2729 RHSA-2021:2730 RHSA-2021:2731 RHSA-2021:2732 RHSA-2021:2733 RHSA-2021:2734 RHSA-2021:2736 RHSA-2021:2737 SMASH Issue 284321 bnc#1186111 bnc#1186285 jsc#CAR-963 rh#1961305 |
CVE-2021-33061 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2021-33096 CVE-2021-33061 MISC:www.intel.com:CVE-2021-33096 SMASH Issue 323345 bnc#1196426 jsc#CAR-1722 linux.git:commit:008ca35f6e87be1d60b6af3d1ae247c6d5c2531d rh#2024713 |
CVE-2021-33098 | kernel-source:Released, kernel-source-azure:Released, kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2021-33098 CVE-2021-33098 MISC:www.intel.com:CVE-2021-33098 RHSA-2021:4356 SMASH Issue 315198 bnc#1192877 jsc#CAR-1431 rh#2068236 |
CVE-2021-33135 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-33135 D:CVE-2021-33135 MISC:www.intel.com:CVE-2021-33135 SMASH Issue 331674 bnc#1199515 rh#2087926 |
CVE-2021-33200 | kernel-source-rt:Released | important | 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-33200 CVE-2021-33200 FEDORA:FEDORA-2021-0b35886add FEDORA:FEDORA-2021-646098b5b8 L3:68137 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2021-33200 MISC:www.openwall.com:CVE-2021-33200 OSS:2021/05/27/1 OSS:2021/Q2/171 RHSA-2021:4140 RHSA-2021:4356 SMASH Issue 300862 bnc#1186484 bnc#1186498 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3d0220f6861d713213b015b582e9f21e5b28d2e0 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a7036191277f9fa68d92f2071ddc38c09b1e5ee5 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bb01a1bba579b4b1c5566af24d95f1767859771e https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7LR3OKKPHIBGOMHN476CMLW2T7UG53QX/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJCABL43FT3FKRX5DBPZG25FNKR6CEK4/ jsc#CAR-651 rh#1965458 |
CVE-2021-3326 | glibc:Released | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2021-3326 CVE-2021-3326 GLSA-202107-07 L3:66039 L3:67771 MISC:sourceware.org:CVE-2021-3326 MISC:www.oracle.com:CVE-2022-21403 MISC:www.oracle.com:CVE-2022-21498 MLIST:[debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update MLIST:[oss-security] 20210128 Re: glibc iconv crash with ISO-2022-JP-3 OSS:2021/Q1/80 Oracle:CVE-2021-3326 RH:CVE-2021-3326 RHSA-2021:1585 SMASH Issue 276667 bnc#1181505 rh#1921916 |
CVE-2021-33294 | elfutils:Won't fix | low | 2.5 (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L) | CVE-2021-33294 L3:67082 SMASH Issue 372807 bnc#1213464 https://sourceware.org/bugzilla/show_bug.cgi?id=27501 https://sourceware.org/pipermail/elfutils-devel/2021q1/003607.html jsc#CAR-2740 rh#2223918 |
CVE-2021-3345 | libgcrypt:Not affected | important | () | CVE-2021-3345 MISC:bugs.gentoo.org:CVE-2021-3345 MISC:git.gnupg.org:CVE-2021-3345 MISC:gnupg.org:CVE-2021-3345 MISC:lists.gnupg.org:CVE-2021-3345 N/A:N/A Oracle:CVE-2021-3345 RH:CVE-2021-3345 SMASH Issue 276793 bnc#1181632 rh#1923210 |
CVE-2021-3347 | kernel-source-rt:Released | important | 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-3347 CVE-2021-3347 DSA-4843 FEDORA:FEDORA-2021-6e805a5051 FEDORA:FEDORA-2021-879c756377 MISC:elongl.github.io:MISC:www.openwall.com:CVE-2014-3153 MISC:git.kernel.org:CVE-2021-3347 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2020-27815 MISC:github.com:MISC:www.openwall.com:CVE-2014-3153 MISC:www.openwall.com:CVE-2014-3153 MISC:www.openwall.com:CVE-2021-3347 MLIST:[debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update MLIST:[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update MLIST:[oss-security] 20210129 Re: Linux Kernel: local priv escalation via futexes MLIST:[oss-security] 20210201 Re: Linux Kernel: local priv escalation via futexes OSS:2020/11/30/5, OSS:2020/12/28/1, OSS:2021/Q1/85 RH:CVE-2021-3347 RHSA-2021:1081 RHSA-2021:1093 RHSA-2021:1272 RHSA-2021:1279 RHSA-2021:1295 RHSA-2021:1379 RHSA-2021:2099 RHSA-2021:2106 RHSA-2021:2285 RHSA-2021:2314 RHSA-2021:2316 RHSA-2021:2730 RHSA-2021:2731 RHSA-2021:2732 RHSA-2021:2733 RHSA-2021:2735 RHSA-2021:3399 RHSA-2021:3522 RHSA-2021:3523 SMASH Issue 276215 SMASH Issue 276788 bdo#970736 bdo#972345 bdo#977048 bdo#977615 bnc#1181349 bnc#1181553 jsc#CAR-962 rh#1922249 |
CVE-2021-3348 | kernel-source-rt:Released | moderate | 5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-3348 MISC:git.kernel.org:MLIST:[oss-security] 20210201 Re: Re: Linux kernel: linux-block: nbd: use-after-free Read in nbd_queue_rq MISC:www.openwall.com:CVE-2021-3348 MLIST:[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update MLIST:[oss-security] 20210201 Re: Re: Linux kernel: linux-block: nbd: use-after-free Read in nbd_queue_rq OSS:2021/Q1/92 RH:CVE-2021-3348 RHSA-2021:4140 RHSA-2021:4356 SMASH Issue 276681 bnc#1181504 bnc#1181645 jsc#CAR-961 rh#1921958 |
CVE-2021-33560 | libgcrypt:Released | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) | CVE-2021-33560 D:CVE-2021-33560 FEDORA:FEDORA-2021-24d4e06195 FEDORA:FEDORA-2021-31fdc84207 GLSA-202210-13 MISC:dev.gnupg.org:CVE-2021-33560 MISC:www.oracle.com:CVE-2021-35666 MISC:www.oracle.com:CVE-2022-21403 MISC:www.oracle.com:CVE-2022-21498 MISC:www.oracle.com:CVE-2022-21586 MLIST:[debian-lts-announce] 20210624 [SECURITY] [DLA 2691-1] libgcrypt20 security update Oracle:CVE-2021-33560 RHSA-2021:4409 SMASH Issue 301428 bnc#1187212 jsc#CAR-690 rh#1970096 |
CVE-2021-33574 | glibc:Released | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2021-33574 CVE-2021-33574 D:CVE-2021-33574 FEDORA:FEDORA-2021-7ddb8b0537 FEDORA:FEDORA-2021-f29b4643c7 GLSA-202107-07 MISC:sourceware.org:CVE-2021-33574 MLIST:[debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update RHSA-2021:4358 SMASH Issue 300753 bnc#1186489 jsc#CAR-895 jsc#CAR-897 rh#1965408 rh#1993517 |
CVE-2021-33624 | kernel-source-rt:Released | moderate | 5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N) | CONFIRM:github.com:CVE-2021-33624 CONFIRM:www.openwall.com:CVE-2021-33624 CVE-2021-33624 D:CVE-2021-33624 MISC:git.kernel.org:CONFIRM:www.openwall.com:CVE-2021-33624 MISC:www.usenix.org:CVE-2021-33624 MLIST:[debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update OSS:2021/Q2/226 SMASH Issue 302614 bnc#1187554 jsc#CAR-720 rh#1974456 |
CVE-2021-33630 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-33630 OSS:2024/01/30/10 OSS:2024/01/30/3 OSS:2024/01/30/4 OSS:2024/01/30/5 OSS:2024/01/30/9 OSS:2024/01/31/2 OSS:2024/01/31/3 OSS:2024/02/02/6 OSS:2024/02/02/9 OSS:2024/02/03/1 OSS:2024/Q1/65 SMASH Issue 391669 bnc#1219402 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e8b9bfa110896f95d602d8c98d5f9d67e41d78c https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c099c4fdc438014d5893629e70a8ba934433ee8 https://gitee.com/src-openeuler/kernel/pulls/1389 https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1030 https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1031 jsc#CAR-3086 rh#2261974 |
CVE-2021-33631 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-33631 OSS:2024/01/30/10 OSS:2024/01/30/3 OSS:2024/01/30/4 OSS:2024/01/30/5 OSS:2024/01/30/9 OSS:2024/01/31/2 OSS:2024/01/31/3 OSS:2024/02/02/6 OSS:2024/02/02/9 OSS:2024/02/03/1 OSS:2024/Q1/65 SMASH Issue 391670 bnc#1219412 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e8b9bfa110896f95d602d8c98d5f9d67e41d78c https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c099c4fdc438014d5893629e70a8ba934433ee8 https://gitee.com/src-openeuler/kernel/pulls/1389 https://gitee.com/src-openeuler/kernel/pulls/1396 https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1030 https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1031 https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1032 https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1033 https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1034 https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1035 jsc#CAR-3087 rh#2261976 |
CVE-2021-33655 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-33655 D:CVE-2021-33655 DSA-5191 L3:64525 L3:64549 L3:64602 L3:66047 MISC:git.kernel.org:CVE-2021-33655 MISC:github.com:OSS:2022/07/02/3 MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update OSS:2022/07/02/3 OSS:2022/07/19/2 OSS:2022/Q3/55 RHSA-2023:2148 RHSA-2023:2458 RHSA-2023:2736 RHSA-2023:2951 SMASH Issue 337631 ZDI-23-1834 bnc#1201635 bnc#1202087 jsc#CAR-1912 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:f63c2c2032c2e3caad9add3b82cc6e91c376fd26 rh#2092427 rh#2093146 rh#2104114 rh#2104423 rh#2107924 rh#2108691 |
CVE-2021-33656 | kernel-source-rt:Released | moderate | 6.3 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H) | CVE-2021-33656 L3:64743 L3:66042 MISC:git.kernel.org:CVE-2021-33656 MISC:www.openeuler.org:CVE-2021-33656 MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update OSS:2022/07/19/3 OSS:2022/Q3/56 RHSA-2023:2736 RHSA-2023:2951 RHSA-2023:4789 SMASH Issue 337630 bnc#1201636 jsc#CAR-1911 rh#2108696 |
CVE-2021-33909 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:cdn.kernel.org:CVE-2021-33909 CONFIRM:github.com:CVE-2021-33909 CONFIRM:psirt.global.sonicwall.com:CVE-2022-0847 CONFIRM:security.netapp.com:CVE-2021-33909 CVE-2021-33909 DSA-4941 FEDORA:FEDORA-2021-07dc0b3eb1 L3:61265 L3:61406 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2021-33910 MISC:packetstormsecurity.com:CVE-2021-33909 MISC:packetstormsecurity.com:CVE-2021-33910 MISC:www.openwall.com:CVE-2021-33909 MISC:www.openwall.com:CVE-2021-33910 MISC:www.oracle.com:CVE-2022-21403 MISC:www.qualys.com:MISC:www.openwall.com:CVE-2021-33909 MISC:www.thezdi.com:MISC:www.openwall.com:CVE-2021-33909 MLIST:[debian-lts-announce] 20210720 [SECURITY] [DLA 2713-1] linux security update MLIST:[debian-lts-announce] 20210720 [SECURITY] [DLA 2713-2] linux security update MLIST:[debian-lts-announce] 20210720 [SECURITY] [DLA 2714-1] linux-4.19 security update MLIST:[oss-security] 20210722 Re: CVE-2021-33909: size_t-to-int vulnerability in Linux's filesystem layer OSS:2021/07/20/1 OSS:2021/07/20/2 OSS:2021/08/25/10 OSS:2021/09/17/2 OSS:2021/09/17/4 OSS:2021/09/21/1 OSS:2021/Q3/176 OSS:2021/Q3/19 OSS:2021/Q3/20 Oracle:CVE-2021-33909 RHSA-2021:2714 RHSA-2021:2715 RHSA-2021:2716 RHSA-2021:2718 RHSA-2021:2719 RHSA-2021:2720 RHSA-2021:2722 RHSA-2021:2723 RHSA-2021:2725 RHSA-2021:2726 RHSA-2021:2727 RHSA-2021:2728 RHSA-2021:2729 RHSA-2021:2730 RHSA-2021:2731 RHSA-2021:2732 RHSA-2021:2733 RHSA-2021:2734 RHSA-2021:2735 RHSA-2021:2736 RHSA-2021:2737 RHSA-2021:2763 SMASH Issue 303536 SMASH Issue 303538 bnc#1188062 bnc#1188257 bnc#1188581 jsc#CAR-960 rh#1970273 |
CVE-2021-33910 | systemd:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:cert-portal.siemens.com:CVE-2022-0847 CONFIRM:security.netapp.com:CVE-2021-33910 CVE-2021-33910 D:CVE-2021-33910 DSA-4942 FEDORA:FEDORA-2021-166e461c8d FEDORA:FEDORA-2021-2a6ba64260 GLSA-202107-48 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2021-33910 MISC:github.com:CVE-2021-33910 MISC:github.com:MLIST:[oss-security] 20210907 Re: Pop!_OS Membership to linux-distros list MISC:packetstormsecurity.com:CVE-2021-33910 MISC:www.openwall.com:CVE-2021-33910 MISC:www.qualys.com:MISC:www.openwall.com:CVE-2021-33909 MLIST:[oss-security] 20210804 Re: Pop!_OS Membership to linux-distros list MLIST:[oss-security] 20210817 Re: Pop!_OS Membership to linux-distros list MLIST:[oss-security] 20210907 Re: Pop!_OS Membership to linux-distros list OSS:2018/09/25/4 OSS:2021/07/20/2 OSS:2021/Q3/20 OSS:2021/Q3/67 Oracle:CVE-2018-16864 Oracle:CVE-2021-33909 RHSA-2021:2717 RHSA-2021:2721 RHSA-2021:2724 RHSA-2021:2736 SMASH Issue 303537 SMASH Issue 303539 bnc#1188063 jsc#CAR-836 rh#1666690 rh#1970887 |
CVE-2021-33928 | libsolv:Not affected | low | 0 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N) | CVE-2021-33928 MISC:github.com:CVE-2021-33930 RHSA-2021:4060 RHSA-2022:5498 SMASH Issue 309027 bnc#1190148 rh#2000699 |
CVE-2021-33929 | libsolv:Not affected | low | 0 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N) | CVE-2021-33929 MISC:github.com:CVE-2021-33930 RHSA-2021:4060 RHSA-2022:5498 SMASH Issue 309026 bnc#1190149 rh#2000703 |
CVE-2021-33930 | libsolv:Not affected | low | 0 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N) | CVE-2021-33930 MISC:github.com:CVE-2021-33930 RHSA-2021:4060 RHSA-2022:5498 SMASH Issue 309025 bnc#1190150 rh#2000705 |
CVE-2021-33938 | libsolv:Not affected | low | 0 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N) | CVE-2021-33938 MISC:github.com:CVE-2021-33938 RHSA-2021:4060 RHSA-2022:5498 SMASH Issue 309024 bnc#1190147 rh#2000707 |
CVE-2021-3411 | kernel-source-rt:Not affected | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-3411 MISC:blog.pi3.com.pl:CVE-2021-3411 MISC:lists.openwall.net:OSS:2021/Q1/165 OSS:2021/Q1/165 RH:CVE-2021-3411 SMASH Issue 278292 SMASH Issue 278293 bnc#1182498 rh#1928236 |
CVE-2021-3421 | rpm:Released | moderate | 5.3 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N) | CVE-2021-3421 FEDORA:FEDORA-2021-2383d950fd FEDORA:FEDORA-2021-662680e477 FEDORA:FEDORA-2021-8d52a8a999 GLSA-202107-43 RH:CVE-2021-3421 RHSA-2021:2574 RHSA-2021:2791 SMASH Issue 279684 bnc#1183543 jsc#CAR-959 rh#1927747 |
CVE-2021-3426 | python3:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CONFIRM:security.netapp.com:CVE-2021-3426 CVE-2021-3426 D:CVE-2021-3426 FEDORA:FEDORA-2021-067c9deff1 FEDORA:FEDORA-2021-0a8f3ffbc0 FEDORA:FEDORA-2021-1769a23935 FEDORA:FEDORA-2021-2ab6f060d9 FEDORA:FEDORA-2021-a26257ccf5 FEDORA:FEDORA-2021-a311bf10d4 FEDORA:FEDORA-2021-b6b6093b3a GLSA-202104-04 MISC:www.oracle.com:CVE-2021-35666 MISC:www.oracle.com:CVE-2022-21403 MLIST:[debian-lts-announce] 20210405 [SECURITY] [DLA 2619-1] python3.5 security update Oracle:CVE-2021-3426 RH:CVE-2021-3426 RHSA-2021:3254 RHSA-2021:4160 RHSA-2021:4162 RHSA-2021:4399 SMASH Issue 279513 bnc#1183374 https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html jsc#CAR-958 rh#1935913 |
CVE-2021-3428 | kernel-source-rt:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CVE-2021-3428 MISC:bugzilla.redhat.com:CVE-2021-3428 MISC:ubuntu.com:CVE-2021-3428 OSS:2021/03/17/1 OSS:2021/Q1/212 RH:CVE-2021-3428 RHSA-2021:1578 RHSA-2021:1739 SMASH Issue 279782 bnc#1183509 rh#1936786 |
CVE-2021-34401 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:nvidia.custhelp.com:CVE-2021-34406 CVE-2021-34401 SMASH Issue 320895 bnc#1194896 rh#2044512 |
CVE-2021-34402 | kernel-source-rt:Not affected | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:nvidia.custhelp.com:CVE-2021-34406 CVE-2021-34402 SMASH Issue 320893 bnc#1194894 rh#2044518 |
CVE-2021-34403 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:nvidia.custhelp.com:CVE-2021-34406 CVE-2021-34403 SMASH Issue 320892 SMASH Issue 321791 bnc#1194897 rh#2044524 |
CVE-2021-34406 | kernel-source-rt:Not affected | low | 4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | CONFIRM:nvidia.custhelp.com:CVE-2021-34406 CVE-2021-34406 SMASH Issue 320889 bnc#1194893 rh#2044510 |
CVE-2021-3444 | kernel-source-rt:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-3444 CVE-2021-3444 L3:60854 MISC:git.kernel.org:CVE-2021-3444 MISC:packetstormsecurity.com:CVE-2020-27170 MISC:www.openwall.com:CVE-2021-3444 MLIST:[oss-security] 20210323 [CVE-2021-3444] Linux kernel bpf verifier incorrect mod32 truncation OSS:2021/Q1/259 RH:CVE-2021-3444 SMASH Issue 280324 bnc#1184170 bnc#1184171 bnc#1186443 rh#1930078 rh#1930079 rh#1930080 rh#1942667 |
CVE-2021-3449 | openssl:Not affected, openssl-1_1:Released | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CISCO:20210325 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: March 2021 CONFIRM:cert-portal.siemens.com:CVE-2021-3449 CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:git.openssl.org:CVE-2021-3449 CONFIRM:kb.pulsesecure.net:CVE-2021-3450 CONFIRM:kc.mcafee.com:CVE-2021-3149 CONFIRM:psirt.global.sonicwall.com:CVE-2021-3450 CONFIRM:security.netapp.com:CVE-2021-2154 CONFIRM:security.netapp.com:CVE-2021-3449 CONFIRM:www.openssl.org:CVE-2021-3449 CONFIRM:www.tenable.com:CVE-2021-23841 CONFIRM:www.tenable.com:CVE-2021-3449 CONFIRM:www.tenable.com:CVE-2021-3450 CVE-2021-3449 DSA-4875 FEDORA:FEDORA-2021-cbf14ab8f9 GLSA-202103-03 MISC:security.FreeBSD.org:CVE-2021-3449 MISC:www.oracle.com:CVE-2021-3450 MISC:www.oracle.com:CVE-2021-35666 MISC:www.oracle.com:CVE-2022-21498 MISC:www.oracle.com:CVE-2022-21586 MLIST:[debian-lts-announce] 20210831 [SECURITY] [DLA 2751-1] postgresql-9.6 security update MLIST:[oss-security] 20210327 OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing MLIST:[oss-security] 20210327 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing MLIST:[oss-security] 20210328 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing N/A:N/A OSS:2021/Q1/266 Oracle:CVE-2021-3449 RH:CVE-2021-3449 RHSA-2021:1024 RHSA-2021:1063 RHSA-2021:1131 RHSA-2021:1189 RHSA-2021:1195 RHSA-2021:1196 RHSA-2021:1199 RHSA-2021:1200 RHSA-2021:1202 RHSA-2021:1203 SMASH Issue 280181 SMASH Issue 280182 bnc#1183852 https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fb9fa6b51defd48157eeb207f52181f735d96148 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/ https://security.netapp.com/advisory/ntap-20240621-0006/ openssl.git:commit:02b1636fe3db274497304a3e95a4e32ced7e841b openssl.git:commit:112580c27b829b0ac0874d5c5787195f27c7952c openssl.git:commit:2b9e2afc382490592078cdb69d06f54f0fefd4c6 openssl.git:commit:39a140597d874e554b736885ac4dea16ac40a87a rh#1941554 |
CVE-2021-3450 | openssl:Not affected, openssl-1_1:Not affected | important | 7.4 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N) | CISCO:20210325 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: March 2021 CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:git.openssl.org:CVE-2021-3450 CONFIRM:kb.pulsesecure.net:CVE-2021-3450 CONFIRM:kc.mcafee.com:CVE-2021-3149 CONFIRM:psirt.global.sonicwall.com:CVE-2021-3450 CONFIRM:security.netapp.com:CVE-2021-3449 CONFIRM:www.openssl.org:CVE-2021-3449 CONFIRM:www.tenable.com:CVE-2019-16168 CONFIRM:www.tenable.com:CVE-2021-23841 CONFIRM:www.tenable.com:CVE-2021-3450 CVE-2021-3450 FEDORA:FEDORA-2021-cbf14ab8f9 GLSA-202103-03 L3:68186 MISC:mta.openssl.org:CVE-2021-3450 MISC:security.FreeBSD.org:CVE-2021-3449 MISC:www.oracle.com:CVE-2021-3450 MISC:www.oracle.com:CVE-2021-35666 MISC:www.oracle.com:CVE-2022-21498 MISC:www.oracle.com:CVE-2022-21586 MLIST:[oss-security] 20210327 OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing MLIST:[oss-security] 20210327 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing MLIST:[oss-security] 20210328 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing N/A:N/A OSS:2021/Q1/266 Oracle:CVE-2021-3450 RH:CVE-2021-3450 RHSA-2021:1024 RHSA-2021:1189 RHSA-2021:1195 RHSA-2021:1196 RHSA-2021:1199 RHSA-2021:1200 RHSA-2021:1202 RHSA-2021:1203 SMASH Issue 280179 SMASH Issue 280180 bnc#1183851 rh#1941547 |
CVE-2021-34556 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2021-34556 D:CVE-2021-34556 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2021-34556 MISC:www.openwall.com:CVE-2021-34556 MISC:www.openwall.com:CVE-2021-35477 OSS:2021/Q3/63 SMASH Issue 305424 bnc#1188983 jsc#CAR-848 rh#1989212 |
CVE-2021-34693 | kernel-source-rt:Released | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) | CVE-2021-34693 D:CVE-2021-34693 DSA-4941 MISC:github.com:MLIST:[oss-security] 20210615 CVE-2021-34693: Infoleak in CAN BCM protocol in Linux kernel MISC:lore.kernel.org:CVE-2021-34693 MLIST:[debian-lts-announce] 20210720 [SECURITY] [DLA 2713-1] linux security update MLIST:[debian-lts-announce] 20210720 [SECURITY] [DLA 2713-2] linux security update MLIST:[debian-lts-announce] 20210720 [SECURITY] [DLA 2714-1] linux-4.19 security update MLIST:[oss-security] 20210615 CVE-2021-34693: Infoleak in CAN BCM protocol in Linux kernel OSS:2021/Q2/218 SMASH Issue 302295 bnc#1187452 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5e87ddbe3942e27e939bdc02deb8579b0cbd8ecc https://lore.kernel.org/netdev/trinity-87eaea25-2a7d-4aa9-92a5-269b822e5d95-1623609211076%403c-app-gmx-bs04/T/ jsc#CAR-957 rh#1972265 |
CVE-2021-3483 | kernel-source-rt:Released | moderate | 6.5 (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-3483 CVE-2021-3483 MISC:git.kernel.org:MLIST:[oss-security] 20210407 CVE-2021-3483: Linux kernel: a use-after-free bug in nosy driver MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update MLIST:[oss-security] 20210407 CVE-2021-3483: Linux kernel: a use-after-free bug in nosy driver OSS:2021/Q2/10 RH:CVE-2021-3483 SMASH Issue 281204 SMASH Issue 281205 bnc#1184393 bnc#1186401 jsc#CAR-956 rh#1948045 |
CVE-2021-34866 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-34866 CVE-2021-34866 SMASH Issue 312594 ZDI-21-1148 bnc#1191645 bnc#1191646 https://www.zerodayinitiative.com/advisories/ZDI-21-1148/ rh#2000457 |
CVE-2021-3487 | binutils:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-3487 FEDORA:FEDORA-2021-7ca24ddc86 FEDORA:FEDORA-2021-9bd201dd4d FEDORA:FEDORA-2021-d23d016509 GLSA-202208-30 RH:CVE-2021-3487 RHSA-2021:4364 SMASH Issue 281603 bnc#1184620 jsc#CAR-1013 rh#1947111 |
CVE-2021-3489 | kernel-source-rt:Not affected | important | 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-3489 D:CVE-2021-3489 MISC:git.kernel.org:MLIST:[oss-security] CVE-2021-3489 - Linux kernel eBPF RINGBUF map oversized allocation MLIST:[oss-security] CVE-2021-3489 - Linux kernel eBPF RINGBUF map oversized allocation OSS:2021/Q2/124 RHSA-2021:4140 RHSA-2021:4356 SMASH Issue 283443 SMASH Issue 283444 ZDI-21-590 bnc#1185640 bnc#1185856 rh#1959559 ubuntu.com:CVE-2021-3491 |
CVE-2021-3490 | kernel-source-rt:Not affected | important | 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-3490 D:CVE-2021-3490 MISC:git.kernel.org:MLIST:[oss-security] CVE-2021-3490 - Linux kernel eBPF bitwise ops ALU32 bounds tracking MLIST:[oss-security] CVE-2021-3490 - Linux kernel eBPF bitwise ops ALU32 bounds tracking OSS:2021/Q2/125 SMASH Issue 283445 SMASH Issue 283446 ZDI-21-606 bnc#1185641 bnc#1185796 rh#1959556 ubuntu.com:CVE-2021-3491 |
CVE-2021-3491 | kernel-source-rt:Released | important | 7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-3491 D:CVE-2021-3491 MISC:git.kernel.org:MLIST:[oss-security] CVE-2021-3491 - Linux kernel io_uring PROVIDE_BUFFERS MAX_RW_COUNT bypass MLIST:[oss-security] CVE-2021-3491 - Linux kernel io_uring PROVIDE_BUFFERS MAX_RW_COUNT bypass OSS:2021/Q2/127 SMASH Issue 283448 SMASH Issue 283449 ZDI-21-589 bnc#1185642 bnc#1187090 linux.git:commit:d1f82808877bb10d3deee7cf3374a4eb3fb582db rh#1959565 ubuntu.com:CVE-2021-3491 |
CVE-2021-3492 | kernel-source-rt:Not affected | moderate | 5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-3492 MISC:git.launchpad.net:MISC:www.openwall.com:CVE-2021-3492 MISC:packetstormsecurity.com:CVE-2021-3492 MISC:ubuntu.com:CVE-2021-3492 MISC:www.openwall.com:CVE-2021-3492 MISC:www.zerodayinitiative.com:CVE-2021-3492 OSS:2021/Q2/25 SMASH Issue 282189 bnc#1184944 rh#1950499 |
CVE-2021-3493 | kernel-source-rt:Not affected | important | 7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-3493 D:CVE-2021-3493 MISC:git.kernel.org:CVE-2021-3493 MISC:packetstormsecurity.com:CVE-2021-3493 MISC:ubuntu.com:CVE-2021-3492 MISC:www.openwall.com:CVE-2021-3493 OSS:2021/04/16/1 OSS:2021/Q2/24 SMASH Issue 282190 bnc#1184900 rh#1950506 |
CVE-2021-34981 | kernel-source-rt:Released | important | 7.5 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H) | CVE-2021-34981 L3:62278 L3:64525 L3:64549 L3:66054 SMASH Issue 313300 SMASH Issue 313608 ZDI-21-1223 bnc#1191961 bnc#1192595 bnc#1193499 https://www.zerodayinitiative.com/advisories/ZDI-21-1223/ jsc#CAR-1181 rh#2017077 |
CVE-2021-3501 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-3501 CVE-2021-3501 MISC:git.kernel.org:CVE-2021-3501 RHSA-2021:2165 RHSA-2021:2168 RHSA-2021:2169 RHSA-2021:2522 SMASH Issue 282978 bnc#1185380 rh#1950136 |
CVE-2021-35039 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:cdn.kernel.org:CVE-2021-35039 CONFIRM:github.com:CVE-2021-35039 CVE-2021-35039 D:CVE-2021-35039 MISC:www.openwall.com:CVE-2021-35039 MLIST:[debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update MLIST:[oss-security] 20210706 CVE-2021-35039: Linux kernel loading unsigned kernel modules via init_module syscall OSS:2021/Q3/6 SMASH Issue 303531 bnc#1188080 bnc#1188126 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0c18f29aae7ce3dadd26d8ee3505d07cc982df75 https://security.netapp.com/advisory/ntap-20210813-0004/ jsc#CAR-955 rh#1980069 |
CVE-2021-3506 | kernel-source-rt:Not affected | moderate | 5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2021-3506 CVE-2021-3506 MISC:git.kernel.org:MLIST:[oss-security] 20210508 Re: Linux kernel: f2fs: out-of-bounds memory access bug MISC:www.mail-archive.com:CVE-2021-3506 MISC:www.openwall.com:CVE-2021-3506 MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update MLIST:[oss-security] 20210508 Re: Linux kernel: f2fs: out-of-bounds memory access bug OSS:2021/Q2/107 SMASH Issue 282255 bnc#1184999 jsc#CAR-1003 rh#1944298 |
CVE-2021-3516 | libxml2:Released | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2021-3516 CVE-2021-3516 D:CVE-2021-3516 FEDORA:FEDORA-2021-b950000d2b FEDORA:FEDORA-2021-e3ed1ba38b GLSA-202107-05 MISC:gitlab.gnome.org:CVE-2021-3516 MISC:www.oracle.com:CVE-2022-21403 MLIST:[debian-lts-announce] 20210510 [SECURITY] [DLA 2653-1] libxml2 security update RHBA-2021:2854 RHSA-2021:2569 RHSA-2022:1389 RHSA-2022:1390 SMASH Issue 282976 bnc#1185409 jsc#CAR-954 rh#1954225 |
CVE-2021-3517 | libxml2:Released | important | 8.6 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H) | CONFIRM:security.netapp.com:CVE-2021-3517 CONFIRM:security.netapp.com:CVE-2021-35603 CVE-2021-3517 FEDORA:FEDORA-2021-b950000d2b FEDORA:FEDORA-2021-e3ed1ba38b GLSA-202107-05 L3:60727 MISC:www.oracle.com:CVE-2021-35666 MISC:www.oracle.com:CVE-2022-21403 MISC:www.oracle.com:CVE-2022-21498 MISC:www.oracle.com:CVE-2022-21586 MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 MLIST:[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 MLIST:[debian-lts-announce] 20210510 [SECURITY] [DLA 2653-1] libxml2 security update Oracle:CVE-2021-3517 Oracle:CVE-2021-3518 RHBA-2021:2854 RHSA-2021:2569 RHSA-2022:1389 RHSA-2022:1390 SMASH Issue 282977 bnc#1185410 bnc#1185811 jsc#CAR-953 rh#1954232 |
CVE-2021-3518 | libxml2:Released | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2021-3517 CONFIRM:support.apple.com:CVE-2020-36331 CONFIRM:support.apple.com:CVE-2021-3518 CVE-2021-3518 FEDORA:FEDORA-2021-b950000d2b FEDORA:FEDORA-2021-e3ed1ba38b FULLDISC:20210723 APPLE-SA-2021-07-21-1 iOS 14.7 and iPadOS 14.7 FULLDISC:20210723 APPLE-SA-2021-07-21-2 macOS Big Sur 11.5 FULLDISC:20210723 APPLE-SA-2021-07-21-5 watchOS 7.6 FULLDISC:20210723 APPLE-SA-2021-07-21-6 tvOS 14.7 GLSA-202107-05 MISC:www.oracle.com:CVE-2021-35666 MISC:www.oracle.com:CVE-2022-21498 MISC:www.oracle.com:CVE-2022-21586 MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 MLIST:[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 MLIST:[debian-lts-announce] 20210510 [SECURITY] [DLA 2653-1] libxml2 security update Oracle:CVE-2021-3518 RHBA-2021:2854 RHSA-2021:2569 RHSA-2022:1389 RHSA-2022:1390 SMASH Issue 282975 bnc#1185408 jsc#CAR-952 rh#1954242 |
CVE-2021-3520 | lz4:Released | important | 8.6 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H) | CONFIRM:security.netapp.com:CVE-2021-3520 CVE-2021-3520 DSA-4919 MISC:access.redhat.com:/errata/RHBA-2021:2854 MISC:access.redhat.com:/errata/RHSA-2021:2575 MISC:access.redhat.com:/errata/RHSA-2022:1345 MISC:access.redhat.com:/errata/RHSA-2022:5606 MISC:access.redhat.com:/errata/RHSA-2022:6407 MISC:access.redhat.com:/security/cve/CVE-2021-3520 MISC:www.oracle.com:CVE-2021-35666 MISC:www.oracle.com:CVE-2022-21498 N/A:N/A Oracle:CVE-2021-3520 RHBA-2021:2854 RHSA-2021:2575 RHSA-2022:1345 RHSA-2022:5606 RHSA-2022:6407 SMASH Issue 283025 bdo#987856 bnc#1185438 jsc#CAR-951 rh#1954559 |
CVE-2021-3521 | rpm:Unsupported | moderate | 4.4 (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N) | CVE-2021-3521 D:CVE-2021-3521 GLSA-202210-22 MISC:access.redhat.com:/errata/RHSA-2022:0254 MISC:access.redhat.com:/errata/RHSA-2022:0368 MISC:access.redhat.com:/errata/RHSA-2022:0634 MISC:access.redhat.com:CVE-2021-3521 MISC:github.com:CVE-2021-3521 Oracle:CVE-2021-3521 RHSA-2022:0254 RHSA-2022:0368 RHSA-2022:0634 SMASH Issue 311327 bnc#1191175 jsc#CAR-1094 rh#1941098 |
CVE-2021-3530 | binutils:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:security.netapp.com:CVE-2021-3530 CVE-2021-3530 GLSA-202208-30 MISC:src.fedoraproject.org:CVE-2021-3530 SMASH Issue 283368 bnc#1185597 rh#1956423 |
CVE-2021-35331 | tcl:Ignore | important | () | CVE-2021-35331 D:CVE-2021-35331 MISC:core.tcl-lang.org:CVE-2021-35331 MISC:github.com:CVE-2021-35331 MISC:sqlite.org:CVE-2021-35331 SMASH Issue 303487 |
CVE-2021-3537 | libxml2:Released | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2021-3517 CVE-2021-3537 FEDORA:FEDORA-2021-b950000d2b FEDORA:FEDORA-2021-e3ed1ba38b GLSA-202107-05 L3:60741 MISC:www.oracle.com:CVE-2021-35666 MISC:www.oracle.com:CVE-2022-21498 MISC:www.oracle.com:CVE-2022-21586 MLIST:[debian-lts-announce] 20210510 [SECURITY] [DLA 2653-1] libxml2 security update Oracle:CVE-2021-3537 RHBA-2021:2854 RHSA-2021:2569 RHSA-2022:1389 RHSA-2022:1390 SMASH Issue 283523 bnc#1185698 bnc#1185879 jsc#CAR-950 rh#1956522 |
CVE-2021-3541 | libxml2:Released | moderate | 6.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2021-3541 CVE-2021-3541 MISC:www.oracle.com:CVE-2022-21403 RHBA-2021:2854 RHSA-2021:2569 RHSA-2022:1389 RHSA-2022:1390 SMASH Issue 284196 bnc#1186015 jsc#CAR-723 rh#1950515 |
CVE-2021-3542 | kernel-source-rt:Released | important | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-42739 CVE-2021-3542 CVE-2021-42739 D:CVE-2021-42739 DSA-5096 FEDORA:FEDORA-2021-7de33b7016 FEDORA:FEDORA-2021-8364530ebf FEDORA:FEDORA-2021-fdef34e26f MISC:git.kernel.org:CVE-2021-42739 MISC:lore.kernel.org:CVE-2021-42739 MISC:seclists.org:CVE-2021-42739 MISC:www.oracle.com:CVE-2022-21586 MISC:www.starwindsoftware.com:CVE-2021-42739 MLIST:[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update OSS:2021/07/22/1 OSS:2022/01/25/12 RHSA-2022:0063 RHSA-2022:0065 RHSA-2022:1975 RHSA-2022:1988 SMASH Issue 281716 SMASH Issue 283854 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1184673 bnc#1186063 bnc#1192036 https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ%40mwanda/ jsc#CAR-1185 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1951739 rh#1980646 rh#1997467 rh#2044561 rh#2053632 rh#2055502 rh#2059923 |
CVE-2021-3543 | kernel-source-rt:Not affected | important | () | CVE-2021-3543 MISC:lore.kernel.org:CVE-2021-3543 RHSA-2021:2168 RHSA-2021:2169 SMASH Issue 284320 SMASH Issue 284469 bnc#1185091 rh#1953022 |
CVE-2021-35465 | gcc:Not affected, gcc7:Unsupported | low | () | CONFIRM:developer.arm.com:CVE-2021-35465 CVE-2021-35465 D:CVE-2021-35465 MISC:developer.arm.com:CVE-2021-28664 SMASH Issue 307823 bnc#1189751 |
CVE-2021-35477 | kernel-source-rt:Released | moderate | 6.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N) | CVE-2021-35477 D:CVE-2021-35477 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2021-34556 MISC:www.openwall.com:CVE-2021-34556 MISC:www.openwall.com:CVE-2021-35477 OSS:2021/Q3/63 SMASH Issue 305425 bnc#1188985 jsc#CAR-849 rh#1989216 |
CVE-2021-3549 | binutils:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-3549 GLSA-202208-30 L3:60836 SMASH Issue 284281 bnc#1186116 bnc#1186392 jsc#CAR-609 rh#1960717 |
CVE-2021-3564 | kernel-source-rt:Already fixed | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-3564 MISC:access.redhat.com:/errata/RHSA-2021:4140 MISC:access.redhat.com:/errata/RHSA-2021:4356 MISC:access.redhat.com:/errata/RHSA-2022:0620 MISC:access.redhat.com:/errata/RHSA-2022:0622 MISC:access.redhat.com:/security/cve/CVE-2021-3564 MISC:www.openwall.com:CVE-2021-3564 MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update MLIST:[oss-security] 20210525 CVE-2021-3564 Linux Bluetooth device initialization implementation bug MLIST:[oss-security] 20210601 Re: CVE-2021-3564 Linux Bluetooth device initialization implementation bug OSS:2021/Q2/160 RHSA-2021:4140 RHSA-2021:4356 RHSA-2022:0620 RHSA-2022:0622 SMASH Issue 300669 bnc#1186207 linux.git:commit:579028dec182c026b9a85725682f1dfbdc825eaa linux.git:commit:6a137caec23aeb9e036cdfd8a46dd8a366460e5d rh#1964139 |
CVE-2021-3570 | linuxptp:Released | important | 8.8 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-3570 DSA-4938 FEDORA:FEDORA-2021-1b42c2f458 FEDORA:FEDORA-2021-a5b584004c MLIST:[debian-lts-announce] 20210731 [SECURITY] [DLA 2723-1] linuxptp security update OSS:2021/Q3/4 RHSA-2021:2657 RHSA-2021:2658 RHSA-2021:2659 RHSA-2021:2660 SMASH Issue 302807 SMASH Issue 302808 bdo#990748 bnc#1187646 jsc#CAR-858 rh#1966240 |
CVE-2021-3571 | linuxptp:Not affected | important | 7.1 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H) | CVE-2021-3571 FEDORA:FEDORA-2021-1b42c2f458 FEDORA:FEDORA-2021-a5b584004c OSS:2021/Q3/4 RHSA-2021:4321 SMASH Issue 302809 SMASH Issue 302810 bnc#1187647 rh#1966241 |
CVE-2021-3572 | python3:Released | moderate | 4.5 (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N) | CVE-2021-3572 MISC:www.oracle.com:CVE-2022-21498 MISC:www.oracle.com:CVE-2022-21586 Oracle:CVE-2021-3572 RHSA-2021:3254 RHSA-2021:4160 RHSA-2021:4162 RHSA-2021:4455 SMASH Issue 301019 bnc#1186819 https://security.netapp.com/advisory/ntap-20240621-0006/ jsc#CAR-1547 rh#1962856 |
CVE-2021-3573 | kernel-source-rt:Released | important | 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-3573 D:CVE-2021-3573 DSA-5096 L3:61097 L3:61125 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2021-3573 MISC:github.com:OSS:2023/Q3/0 MISC:www.openwall.com:CVE-2021-3573 OSS:2021/06/08/2 OSS:2021/07/22/1 OSS:2021/Q2/188 OSS:2021/Q3/28 OSS:2022/01/25/12 OSS:2023/07/02/1 RHSA-2021:4140 RHSA-2021:4356 RHSA-2022:0620 RHSA-2022:0622 SMASH Issue 301015 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1186666 bnc#1187054 bnc#1187889 bnc#1187934 bnc#1187999 bnc#1188613 jsc#CAR-842 linux.git:commit:58ce6d5b271ab25fb2056f84a8e5546945eb5fc9 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 linux.git:commit:e04480920d1eec9c061841399aa6f35b6f987d8b rh#1966578 rh#1980646 rh#1997467 rh#2044561 rh#2053632 rh#2059923 |
CVE-2021-3580 | libnettle:Released | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2021-3580 CVE-2021-3580 D:CVE-2021-3580 MLIST:[debian-lts-announce] 20210918 [SECURITY] [DLA 2760-1] nettle security update RHSA-2021:4451 SMASH Issue 301375 bdo#985652 bdo#989631 bnc#1187060 https://security.gentoo.org/glsa/202401-24 jsc#CAR-835 rh#1967983 |
CVE-2021-3587 | kernel-source-rt:Already fixed | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-3587 CVE-2021-38208 MISC:cdn.kernel.org:CVE-2021-38208 MISC:cve.mitre.org:MLIST:[oss-security] 20210817 Re: Linux kernel: nfc: null ptr dereference in llcp_sock_getname MISC:github.com:CVE-2021-38208 MLIST:[oss-security] 20210817 Re: Linux kernel: nfc: null ptr dereference in llcp_sock_getname OSS:2021/Q2/187 OSS:2021/Q2/189 OSS:2021/Q3/104 OSS:2021/Q3/105 OSS:2021/Q3/117 SMASH Issue 301352 bnc#1186665 bnc#1187055 jsc#CAR-949 rh#1968057 rh#1992810 |
CVE-2021-35942 | glibc:Released | moderate | 5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N) | CONFIRM:security.netapp.com:CVE-2021-35942 CONFIRM:sourceware.org:CVE-2021-35942 CVE-2021-35942 GLSA-202208-24 MISC:sourceware.org:CVE-2021-35942 MLIST:[debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update RHSA-2021:4358 SMASH Issue 303290 bnc#1187911 jsc#CAR-755 rh#1977975 |
CVE-2021-3600 | kernel-source-rt:Already fixed | important | 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-3600 OSS:2021/Q2/228 RHSA-2021:4140 RHSA-2021:4356 SMASH Issue 302816 bnc#1187721 bnc#1187724 https://git.kernel.org/linus/e88b2c6e5a4d9ce30d75391e4d950da74bb2bd90 https://ubuntu.com/security/notices/USN-5003-1 jsc#CAR-1637 rh#1981954 |
CVE-2021-3601 | openssl:Not affected, openssl-1_1:Not affected | low | 3.3 (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N) | CVE-2021-3601 SMASH Issue 302306 bnc#1189259 rh#1970201 |
CVE-2021-36084 | libselinux:Not affected | moderate | () | CVE-2021-36084 MISC:bugs.chromium.org:CVE-2021-36084 MISC:github.com:CVE-2021-36084 RHSA-2021:4513 SMASH Issue 303334 bnc#1187966 rh#1979662 |
CVE-2021-36085 | libselinux:Not affected | moderate | () | CVE-2021-36085 MISC:bugs.chromium.org:CVE-2021-36085 MISC:github.com:CVE-2021-36085 RHSA-2021:4513 SMASH Issue 303333 bnc#1187965 rh#1979664 |
CVE-2021-36086 | libselinux:Not affected | low | () | CVE-2021-36086 MISC:bugs.chromium.org:CVE-2021-36086 MISC:github.com:CVE-2021-36086 RHSA-2021:4513 SMASH Issue 303332 bnc#1187964 rh#1979666 |
CVE-2021-36087 | checkpolicy:Not affected, libselinux:Not affected, libsemanage:Not affected, libsepol:Not affected, policycoreutils:Not affected | low | () | CVE-2021-36087 FEDORA:FEDORA-2021-67efe88c29 MISC:bugs.chromium.org:CVE-2021-36087 MISC:github.com:CVE-2021-36087 MISC:lore.kernel.org:CVE-2021-36087 RHSA-2021:4513 SMASH Issue 303331 bnc#1187928 rh#1979668 |
CVE-2021-3609 | kernel-source-rt:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-3609 CVE-2021-3609 L3:61640 MISC:access.redhat.com:/errata/RHSA-2021:3044 MISC:access.redhat.com:/errata/RHSA-2021:3057 MISC:access.redhat.com:/errata/RHSA-2021:3088 MISC:access.redhat.com:/errata/RHSA-2021:3235 MISC:access.redhat.com:/errata/RHSA-2021:3363 MISC:access.redhat.com:/errata/RHSA-2021:3375 MISC:access.redhat.com:/errata/RHSA-2021:3380 MISC:access.redhat.com:/errata/RHSA-2021:3442 MISC:access.redhat.com:/errata/RHSA-2021:3444 MISC:access.redhat.com:/security/cve/CVE-2021-3609 MISC:github.com:CVE-2021-3609 MISC:github.com:OSS:2021/Q2/224 OSS:2021/06/19/1 OSS:2021/Q2/224 RHSA-2021:3044 RHSA-2021:3057 RHSA-2021:3088 RHSA-2021:3235 RHSA-2021:3363 RHSA-2021:3375 RHSA-2021:3380 RHSA-2021:3442 RHSA-2021:3444 SMASH Issue 301820 SMASH Issue 302539 bnc#1187215 bnc#1188323 bnc#1190389 jsc#CAR-841 rh#1971651 |
CVE-2021-3612 | kernel-source-rt:Released | low | 4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) | CONFIRM:security.netapp.com:CVE-2021-3612 CVE-2021-3612 FEDORA:FEDORA-2021-a95108d156 MISC:lore.kernel.org:CVE-2021-3612 MISC:www.oracle.com:CVE-2022-21586 MLIST:[debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update MLIST:[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update RHSA-2022:1975 RHSA-2022:1988 SMASH Issue 302657 bnc#1187585 rh#1974079 |
CVE-2021-3635 | kernel-source-rt:Already fixed | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-3635 RHSA-2021:4140 RHSA-2021:4356 SMASH Issue 305898 bnc#1189169 rh#1976946 |
CVE-2021-36368 | openssh:Won't fix | low | 0 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N) | CONFIRM:bugzilla.mindrot.org:CVE-2021-36368 CVE-2021-36368 D:CVE-2021-36368 MISC:docs.ssh-mitm.at:CVE-2021-36368 MISC:github.com:CVE-2021-36368 MISC:security-tracker.debian.org:CVE-2021-36368 MISC:www.openssh.com:CVE-2020-15778 SMASH Issue 326103 SMASH Issue 340561 bnc#1202652 rh#2086690 |
CVE-2021-3640 | kernel-source-rt:Released | important | 7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-45868 CVE-2021-3640 D:CVE-2021-3573 D:CVE-2021-3640 DSA-5096 MISC:access.redhat.com:/errata/RHSA-2022:7444 MISC:access.redhat.com:/errata/RHSA-2022:7683 MISC:access.redhat.com:/errata/RHSA-2022:7933 MISC:access.redhat.com:/errata/RHSA-2022:8267 MISC:access.redhat.com:/security/cve/CVE-2021-3640 MISC:git.kernel.org:CVE-2021-3640 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2021-3573 MISC:github.com:OSS:2023/Q3/0 MISC:lkml.org:/lkml/2021/8/28/238 MISC:ubuntu.com:CVE-2021-3640 MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update OSS:2021/06/08/2 OSS:2021/07/22/1 OSS:2021/Q3/28 OSS:2022/01/25/12 OSS:2023/07/02/1 RHSA-2022:7444 RHSA-2022:7683 RHSA-2022:7933 RHSA-2022:8267 SMASH Issue 303981 SMASH Issue 303982 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1188172 bnc#1188613 bnc#1191530 jsc#CAR-947 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2044561 rh#2053632 rh#2055502 rh#2059923 |
CVE-2021-3648 | binutils:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CVE-2021-3648 SMASH Issue 304015 bnc#1188374 rh#1982320 |
CVE-2021-3653 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-3653 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2021-3653 MISC:github.com:MISC:www.openwall.com:CVE-2021-3653 MISC:packetstormsecurity.com:CVE-2021-33909 MISC:www.openwall.com:CVE-2021-3653 MLIST:[debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update MLIST:[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update OSS:2021/08/16/1 OSS:2021/Q3/102 RHSA-2021:3547 RHSA-2021:3548 RHSA-2021:3676 RHSA-2021:3767 RHSA-2021:3801 RHSA-2021:3802 RHSA-2021:3812 RHSA-2021:3904 RHSA-2021:3909 RHSA-2021:3987 RHSA-2021:4692 RHSA-2021:4768 SMASH Issue 307075 SMASH Issue 307076 bdo#993948 bdo#993978 bnc#1189399 bnc#1189420 jsc#CAR-894 linux.git:commit:02a3715449a0edf06a37efe3862bc7732099a220 linux.git:commit:0f923e07124df069ba68d8bb12324398f4b6b709 linux.git:commit:faf6b755629627f19feafa75b32e81cd7738f12d rh#1983686 |
CVE-2021-3655 | kernel-source-rt:Released | low | 4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) | CVE-2021-3655 D:CVE-2021-3655 MLIST:[debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update MLIST:[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update SMASH Issue 304618 bnc#1188563 jsc#CAR-1224 rh#1984024 |
CVE-2021-3656 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-3656 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2021-3653 MISC:github.com:MISC:www.openwall.com:CVE-2021-3653 MISC:www.openwall.com:CVE-2021-3653 OSS:2021/08/16/1 OSS:2021/Q3/102 RHSA-2021:3676 RHSA-2021:3801 RHSA-2021:3802 RHSA-2021:3812 RHSA-2021:3904 RHSA-2021:3909 RHSA-2021:3987 RHSA-2021:4056 RHSA-2021:4088 SMASH Issue 307077 SMASH Issue 307078 bdo#993948 bdo#993978 bnc#1189400 bnc#1189418 jsc#CAR-893 linux.git:commit:02a3715449a0edf06a37efe3862bc7732099a220 linux.git:commit:c7dfa4009965a9b2d7b329ee970eb8da0d32f0bc linux.git:commit:faf6b755629627f19feafa75b32e81cd7738f12d rh#1983988 |
CVE-2021-3659 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-3659 MISC:access.redhat.com:CVE-2021-3659 MISC:git.kernel.org:CVE-2021-33033 RHSA-2021:4140 RHSA-2021:4356 SMASH Issue 305262 bnc#1188876 jsc#CAR-908 rh#1975949 |
CVE-2021-3669 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-3669 MISC:access.redhat.com:/errata/RHSA-2022:1975 MISC:access.redhat.com:/errata/RHSA-2022:1988 MISC:access.redhat.com:CVE-2021-3669 MISC:bugzilla.redhat.com:CVE-2021-3669 MISC:security-tracker.debian.org:CVE-2021-3669 RHSA-2022:1975 RHSA-2022:1988 SMASH Issue 305426 bnc#1188986 jsc#CAR-1136 rh#1986473 |
CVE-2021-36690 | sqlite3:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:support.apple.com:CVE-2022-1725 CONFIRM:support.apple.com:CVE-2022-26744 CONFIRM:support.apple.com:CVE-2022-32911 CVE-2021-36690 FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-11 tvOS 16 FULLDISC:20221030 APPLE-SA-2022-10-27-13 watchOS 9 FULLDISC:20221030 APPLE-SA-2022-10-27-3 Additional information for APPLE-SA-2022-09-12-1 iOS 16 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 L3:63842 L3:65975 MISC:sqlite.com:CVE-2021-36690 MISC:www.oracle.com:CVE-2022-21403 MISC:www.sqlite.org:CVE-2021-36690 SMASH Issue 307939 bnc#1189802 bnc#1201952 jsc#CAR-948 |
CVE-2021-3672 | c-ares:Released | important | 8.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N) | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CVE-2021-3672 DSA-4954 MISC:c-ares.haxx.se:CVE-2021-3672 MISC:github.com:OSS:2021/Q3/84 MISC:www.oracle.com:CVE-2022-21586 OSS:2021/Q3/84 RHSA-2021:3280 RHSA-2021:3281 RHSA-2021:3623 RHSA-2021:3638 RHSA-2021:3639 RHSA-2021:3666 RHSA-2022:2043 SMASH Issue 305288 bdo#992053 bnc#1188881 https://security.gentoo.org/glsa/202401-02 jsc#CAR-845 rh#1988342 |
CVE-2021-36770 | perl:Not affected | important | 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:github.com:CVE-2021-36770 CONFIRM:metacpan.org:CVE-2021-36770 CONFIRM:news.cpanel.com:CVE-2021-36770 CONFIRM:security.netapp.com:CVE-2021-36770 CVE-2021-36770 FEDORA:FEDORA-2021-44c65203cc FEDORA:FEDORA-2021-92e07de1dd MISC:security-tracker.debian.org:CVE-2021-36770 Oracle:CVE-2021-36770 SMASH Issue 304526 bnc#1188467 rh#1983786 |
CVE-2021-3679 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-3679 DSA-4978 MISC:git.kernel.org:CVE-2021-3679 MLIST:[debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update MLIST:[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update RHSA-2021:4140 RHSA-2021:4356 SMASH Issue 305631 bdo#993948 bdo#993978 bnc#1189057 jsc#CAR-857 rh#1989165 |
CVE-2021-36976 | libarchive:Released | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:support.apple.com:CVE-2021-36976 CONFIRM:support.apple.com:CVE-2022-0158 CVE-2021-36976 FEDORA:FEDORA-2022-9bb794c5f5 FULLDISC:20220314 APPLE-SA-2022-03-14-1 iOS 15.4 and iPadOS 15.4 FULLDISC:20220314 APPLE-SA-2022-03-14-2 watchOS 8.5 FULLDISC:20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3 GLSA-202208-26 MISC:bugs.chromium.org:CVE-2021-36976 MISC:github.com:CVE-2021-36976 SMASH Issue 304599 bnc#1188572 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SE5NJQNM22ZE5Z55LPAGCUHSBQZBKMKC/ jsc#CAR-1004 rh#1984646 |
CVE-2021-3711 | openssl:Released, openssl-1_1:Released | critical | 9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:git.openssl.org:CVE-2021-3711 CONFIRM:security.netapp.com:CVE-2021-35648 CONFIRM:security.netapp.com:CVE-2021-3712 CONFIRM:www.openssl.org:CVE-2021-3712 CONFIRM:www.tenable.com:CVE-2021-3712 CVE-2021-3711 DSA-4963 GLSA-202209-02 GLSA-202210-02 L3:61987 L3:64702 L3:68186 MISC:www.oracle.com:CVE-2021-35666 MISC:www.oracle.com:CVE-2022-21403 MISC:www.oracle.com:CVE-2022-21498 MLIST:[tomcat-dev] 20210825 OpenSSL security announcement - do we need a Tomcat Native release? MLIST:[tomcat-dev] 20210826 Re: OpenSSL security announcement - do we need a Tomcat Native release? OSS:2021/08/26/2 OSS:2021/Q3/130 Oracle:CVE-2021-3711 Oracle:CVE-2021-3712 SMASH Issue 307461 bnc#1189520 bnc#1192100 https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46 https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e%40%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1%40%3Cdev.tomcat.apache.org%3E https://security.netapp.com/advisory/ntap-20240621-0006/ jsc#CAR-939 openssl.git:commit:36cf45ef3ba71e44a8be06ee81cb31aa02cb0010 rh#1995623 rh#1995634 |
CVE-2021-3712 | openssl:Released, openssl-1_1:Released | moderate | 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:cert-portal.siemens.com:CVE-2021-3712 CONFIRM:git.openssl.org:CVE-2021-3712 CONFIRM:kc.mcafee.com:CVE-2021-31835 CONFIRM:security.netapp.com:CVE-2021-3712 CONFIRM:www.openssl.org:CVE-2021-3712 CONFIRM:www.tenable.com:CVE-2021-3712 CVE-2021-3712 DSA-4963 GLSA-202209-02 GLSA-202210-02 L3:68186 MISC:www.oracle.com:CVE-2021-35666 MISC:www.oracle.com:CVE-2022-21403 MISC:www.oracle.com:CVE-2022-21498 MLIST:[debian-lts-announce] 20210926 [SECURITY] [DLA 2766-1] openssl security update MLIST:[debian-lts-announce] 20210930 [SECURITY] [DLA 2774-1] openssl1.0 security update MLIST:[tomcat-dev] 20210825 OpenSSL security announcement - do we need a Tomcat Native release? MLIST:[tomcat-dev] 20210826 Re: OpenSSL security announcement - do we need a Tomcat Native release? OSS:2021/08/26/2 OSS:2021/Q3/130 Oracle:CVE-2021-3712 RHSA-2021:4613 RHSA-2021:4614 RHSA-2021:4861 RHSA-2021:4863 RHSA-2021:5226 RHSA-2022:0064 SMASH Issue 307462 bnc#1189521 https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11 https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12 https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e%40%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1%40%3Cdev.tomcat.apache.org%3E https://security.netapp.com/advisory/ntap-20240621-0006/ jsc#CAR-940 openssl.git:commit:030c5aba94788f152f9ceef3549815df45bef702 openssl.git:commit:1747d4658b3830951068a6a6c1fa2b45c4731fb3 openssl.git:commit:1f365708a3318a5f1a395f90c38b584a58d37fb9 openssl.git:commit:7c038a6bcd98d4bbfd2c2892a87a1138d2f7c5f3 openssl.git:commit:918430ba80d94ec8f05383b43b1872b1ebb13e1a openssl.git:commit:95f8c1e142df835d03b5b62521383a462fc5470d openssl.git:commit:98624776c4d501c8badd6f772ab7048ac9191cb9 openssl.git:commit:ad6ac17489241574136b7d035f01f6175dd9c941 openssl.git:commit:b2b3b9c9936b91315adc0f3254879cb2fd5ca2bd openssl.git:commit:d2015a783e64613d8e4a142fa05048d1863df944 rh#1995634 |
CVE-2021-3714 | kernel-source-rt:Won't fix | moderate | 5.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N) | CVE-2021-3714 MISC:access.redhat.com:CVE-2021-3714 MISC:arxiv.org:CVE-2021-3714 SMASH Issue 327734 bnc#1202680 jsc#CAR-1981 rh#1931327 |
CVE-2021-3715 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-3715 L3:61659 MISC:git.kernel.org:OSS:2021/Q3/154 MISC:github.com:CVE-2021-3715 OSS:2021/09/07/1 OSS:2021/Q3/154 RHSA-2020:4431 RHSA-2020:4609 RHSA-2021:3438 RHSA-2021:3439 RHSA-2021:3441 RHSA-2021:3442 RHSA-2021:3443 RHSA-2021:3444 RHSA-2021:3445 RHSA-2021:3446 RHSA-2021:3477 RHSA-2022:7173 SMASH Issue 309163 bnc#1190349 bnc#1190350 bnc#1190456 jsc#CAR-1051 rh#1993988 |
CVE-2021-37159 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2021-37159 CVE-2021-37159 MISC:www.oracle.com:CVE-2022-21586 MISC:www.spinics.net:CVE-2021-37159 MLIST:[debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update MLIST:[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update RHSA-2022:1975 RHSA-2022:1988 SMASH Issue 304799 bnc#1188601 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a6ecfb39ba9d7316057cea823b196b734f6b18ca https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=dcb713d53e2eadf42b878c12a471e74dc6ed3145 jsc#CAR-1005 rh#1985353 |
CVE-2021-3732 | kernel-source-rt:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) | CVE-2021-3732 MISC:git.kernel.org:CVE-2021-3732 MISC:github.com:CVE-2021-3732 MISC:ubuntu.com:CVE-2021-3732 RHSA-2021:4140 RHSA-2021:4356 SMASH Issue 307801 bdo#993948 bdo#993978 bnc#1189706 jsc#CAR-1058 rh#1995249 |
CVE-2021-37322 | binutils:Already fixed | moderate | 4.5 (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L) | CVE-2021-37322 D:CVE-2021-37322 MISC:gcc.gnu.org:CVE-2021-37322 SMASH Issue 315352 bnc#1192900 rh#2031177 |
CVE-2021-3733 | python3:Unsupported | low | 4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | CONFIRM:security.netapp.com:CVE-2021-3733 CVE-2021-3733 MISC:bugs.python.org:CVE-2021-3733 MISC:github.com:CVE-2021-3733 MISC:ubuntu.com:CVE-2021-3733 RHSA-2021:3254 RHSA-2021:4057 RHSA-2021:4160 RHSA-2022:1663 RHSA-2022:1764 RHSA-2022:1821 SMASH Issue 306136 SMASH Issue 307812 bnc#1189287 https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html jsc#CAR-1006 rh#1995234 |
CVE-2021-3736 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) | CVE-2021-3736 MISC:access.redhat.com:CVE-2021-3736 MISC:github.com:CVE-2021-3736 SMASH Issue 314138 bnc#1192345 rh#1995570 |
CVE-2021-3737 | python3:Unsupported | moderate | 6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2021-3737 CVE-2021-3737 MISC:bugs.python.org:CVE-2021-3737 MISC:github.com:CVE-2021-3737 MISC:python-security.readthedocs.io:CVE-2021-3737 MISC:ubuntu.com:CVE-2021-3737 MISC:www.oracle.com:CVE-2022-21586 Oracle:CVE-2021-3737 RHSA-2021:4160 RHSA-2022:1663 RHSA-2022:1764 RHSA-2022:1821 RHSA-2022:1986 SMASH Issue 306132 SMASH Issue 308388 bnc#1189241 https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html jsc#CAR-936 rh#1995162 |
CVE-2021-3739 | kernel-source-rt:Released | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2021-3739 CVE-2021-3739 MISC:git.kernel.org:CVE-2021-3739 MISC:github.com:CVE-2021-3739 MISC:ubuntu.com:CVE-2021-3739 OSS:2021/08/25/3 OSS:2021/Q3/131 SMASH Issue 308408 bdo#993948 bdo#993978 bnc#1189832 jsc#CAR-935 rh#1997958 |
CVE-2021-3743 | kernel-source-rt:Released | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2021-3743 CVE-2021-3743 MISC:access.redhat.com:/errata/RHSA-2022:1975 MISC:access.redhat.com:/errata/RHSA-2022:1988 MISC:access.redhat.com:/security/cve/CVE-2021-3743 MISC:git.kernel.org:CVE-2021-3743 MISC:github.com:CVE-2021-3743 MISC:lists.openwall.net:CVE-2021-3743 MISC:www.oracle.com:CVE-2022-21586 OSS:2021/08/27/2 OSS:2021/Q3/136 RHSA-2022:1975 RHSA-2022:1988 SMASH Issue 308486 bdo#993948 bdo#993978 bnc#1189883 jsc#CAR-937 rh#1997961 |
CVE-2021-3744 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2019-18808 CVE-2021-3744 DSA-5096 FEDORA:FEDORA-2021-79cbbefebe FEDORA:FEDORA-2021-9dd76a1ed0 FEDORA:FEDORA-2021-ffda3d6fa1 MISC:access.redhat.com:/errata/RHSA-2022:1975 MISC:access.redhat.com:/errata/RHSA-2022:1988 MISC:access.redhat.com:/security/cve/CVE-2021-3744 MISC:github.com:CVE-2021-3744 MISC:kernel.googlesource.com:CVE-2021-3744 MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/7BLLVKYAIETEORUPTFO3TR3C33ZPFXQM/ MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/LAT3RERO6QBKSPJBNNRWY3D4NCGTFOS7/ MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/SYKURLXBB2555ASWMPDNMBUPD6AG2JKQ/ MISC:seclists.org:CVE-2021-3744 MISC:www.oracle.com:CVE-2022-21586 MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update OSS:2021/07/22/1 OSS:2021/09/14/1 OSS:2021/Q3/164 OSS:2022/01/25/12 RHSA-2022:1975 RHSA-2022:1988 SMASH Issue 308493 SMASH Issue 308494 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1189884 jsc#CAR-938 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2000627 rh#2044561 rh#2053632 rh#2055502 rh#2059923 |
CVE-2021-3752 | kernel-source-rt:Released | important | 7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-3752 CVE-2021-3752 DSA-5096 MISC:lore.kernel.org:CVE-2021-3752 MISC:www.oracle.com:CVE-2022-21586 MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update OSS:2021/07/22/1 OSS:2021/09/15/4 OSS:2021/Q3/169 OSS:2022/01/25/12 RHSA-2022:0620 RHSA-2022:0622 RHSA-2022:1975 RHSA-2022:1988 SMASH Issue 308793 SMASH Issue 308794 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1190023 bnc#1190432 https://lore.kernel.org/lkml/20211115165435.133245729%40linuxfoundation.org/ jsc#CAR-1135 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#1999544 rh#2044561 rh#2053632 rh#2055502 rh#2059923 |
CVE-2021-3753 | kernel-source-rt:Released | low | 2.9 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N) | CONFIRM:security.netapp.com:CVE-2021-3753 CVE-2021-3753 MISC:git.kernel.org:OSS:2021/09/01/4 MISC:github.com:OSS:2021/Q3/146 OSS:2021/09/01/4 OSS:2021/Q3/146 SMASH Issue 308795 SMASH Issue 308796 bdo#993948 bdo#993978 bnc#1190025 jsc#CAR-1012 rh#1999589 |
CVE-2021-3755 | rsync:Ignore | low | 0 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N) | CVE-2021-3755 SMASH Issue 308816 bnc#1190045 rh#1999680 |
CVE-2021-37576 | kernel-source-rt:Released | important | 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-37576 D:CVE-2021-37576 DSA-4978 MISC:git.kernel.org:MLIST:[oss-security] 20210727 Re: Linux kernel: powerpc: KVM guest to host memory corruption MISC:lore.kernel.org:CVE-2021-37576 MLIST:[oss-security] 20210727 Re: Linux kernel: powerpc: KVM guest to host memory corruption OSS:2021/Q3/50 RHSA-2021:3436 RHSA-2021:3442 RHSA-2021:3443 RHSA-2021:3444 RHSA-2021:3446 RHSA-2021:3447 RHSA-2021:3725 RHSA-2021:3766 RHSA-2021:3768 RHSA-2021:3801 RHSA-2021:3812 RHSA-2021:3814 RHSA-2021:3987 RHSA-2021:4000 SMASH Issue 305200 bdo#993948 bdo#993978 bnc#1188838 bnc#1188842 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WDFA7DSQIPM7XPNXJBXFWXHJFVUBCAG6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2YZ2DNURMYYVDT2NYAFDESJC35KCUDS/ https://security.netapp.com/advisory/ntap-20210917-0005/ jsc#CAR-834 rh#1986506 |
CVE-2021-3759 | kernel-source-rt:Released | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-3759 MISC:access.redhat.com:CVE-2021-3759 MISC:lore.kernel.org:CVE-2021-3759 MLIST:[debian-lts-announce] 20221222 [SECURITY] [DLA 3244-1] linux-5.10 security update RHSA-2022:1975 RHSA-2022:1988 SMASH Issue 308860 bnc#1190115 jsc#CAR-1007 rh#1999675 |
CVE-2021-3760 | kernel-source-rt:Released | moderate | 6.4 (CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-3760 CVE-2021-3760 DSA-5096 MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update OSS:2021/07/22/1 OSS:2021/Q4/55 OSS:2022/01/25/12 SMASH Issue 308868 SMASH Issue 308869 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1190067 jsc#CAR-1226 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2000585 rh#2044561 rh#2053632 rh#2055502 rh#2059923 |
CVE-2021-37600 | util-linux:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CVE-2021-37600 D:CVE-2021-37600 MISC:github.com:CVE-2021-37600 SMASH Issue 305296 bnc#1188921 https://lists.debian.org/debian-lts-announce/2024/04/msg00005.html https://security.gentoo.org/glsa/202401-08 https://security.netapp.com/advisory/ntap-20210902-0002/ jsc#CAR-846 rh#1987320 |
CVE-2021-3764 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-3764 DSA-5096 MISC:access.redhat.com:CVE-2021-3764 MISC:github.com:CVE-2021-3744 MISC:security-tracker.debian.org:CVE-2021-3764 OSS:2021/07/22/1 OSS:2022/01/25/12 RHSA-2022:1975 RHSA-2022:1988 SMASH Issue 309862 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1190534 jsc#CAR-1067 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2044561 rh#2053632 rh#2059923 |
CVE-2021-3770 | vim:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) | CONFIRM:huntr.dev:CVE-2021-3770 CONFIRM:security.netapp.com:CVE-2021-3770 CVE-2021-3770 FEDORA:FEDORA-2021-4a43cbe0b4 FEDORA:FEDORA-2021-5fa81a2b04 FEDORA:FEDORA-2021-e982f972f2 GLSA-202208-32 MISC:github.com:MLIST:[oss-security] 20210930 3 new CVE's in vim MLIST:[oss-security] 20210930 3 new CVE's in vim OSS:2021/Q3/192 SMASH Issue 309124 bnc#1190379 rh#2001929 |
CVE-2021-3772 | kernel-source-rt:Released | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2021-3772 CVE-2021-3772 DSA-5096 L3:62841 MISC:access.redhat.com:/errata/RHSA-2022:1975 MISC:access.redhat.com:/errata/RHSA-2022:1988 MISC:access.redhat.com:/security/cve/CVE-2021-3772 MISC:git.kernel.org:CVE-2021-3772 MISC:ubuntu.com:CVE-2021-3772 MISC:www.oracle.com:CVE-2022-21586 MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update OSS:2021/07/22/1 OSS:2022/01/25/12 RHSA-2022:1975 RHSA-2022:1988 SMASH Issue 309286 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1190351 bnc#1196715 jsc#CAR-1228 linux.git:commit:32f8807a48ae55be0e76880cfe8607a18b5bb0df linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1984024 rh#1997467 rh#2000694 rh#2044561 rh#2053632 rh#2055502 rh#2059923 |
CVE-2021-3773 | kernel-obs-build:Analysis, kernel-rt:Analysis, kernel-rt_debug:Analysis, kernel-source-rt:Analysis, kernel-syms-rt:Analysis | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N) | CVE-2021-3773 MISC:www.oracle.com:CVE-2022-21586 OSS:2021/Q3/159 RHSA-2022:1975 RHSA-2022:1988 SMASH Issue 308503 SMASH Issue 309115 bnc#1189897 rh#2004949 |
CVE-2021-3778 | vim:Released | moderate | 5.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) | CONFIRM:huntr.dev:CVE-2021-3778 CONFIRM:security.netapp.com:CVE-2021-3778 CVE-2021-3778 FEDORA:FEDORA-2021-6988830606 FEDORA:FEDORA-2021-84f4cf3244 FEDORA:FEDORA-2021-968f57ec98 GLSA-202208-32 MISC:github.com:MLIST:[oss-security] 20210930 3 new CVE's in vim MLIST:[debian-lts-announce] 20220110 [SECURITY] [DLA 2876-1] vim security update MLIST:[oss-security] 20210930 3 new CVE's in vim RHSA-2021:4517 SMASH Issue 310107 bnc#1190533 rh#2004621 |
CVE-2021-3796 | vim:Released | moderate | 5.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) | CONFIRM:huntr.dev:CVE-2021-3796 CONFIRM:security.netapp.com:CVE-2021-3796 CVE-2021-3796 D:CVE-2021-3796 FEDORA:FEDORA-2021-6988830606 FEDORA:FEDORA-2021-84f4cf3244 FEDORA:FEDORA-2021-968f57ec98 GLSA-202208-32 MISC:github.com:MLIST:[oss-security] 20210930 3 new CVE's in vim MLIST:[debian-lts-announce] 20220110 [SECURITY] [DLA 2876-1] vim security update MLIST:[oss-security] 20210930 3 new CVE's in vim OSS:2021/Q3/192 RHSA-2021:4517 SMASH Issue 310113 bnc#1190570 jsc#CAR-1069 rh#2004728 |
CVE-2021-3800 | glib2:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N) | CONFIRM:security.netapp.com:CVE-2021-3800 CVE-2021-3800 MISC:access.redhat.com:CVE-2021-3800 MISC:git.savannah.gnu.org:OSS:2017/06/23/8 MISC:gitlab.gnome.org:CVE-2021-3800 MLIST:[debian-lts-announce] 20220915 [SECURITY] [DLA 3110-1] glib2.0 security update OSS:2014/07/14/1 OSS:2017/06/23/8 OSS:2022/Q1/80 RHSA-2021:4385 SMASH Issue 311784 bnc#1191489 rh#1938284 |
CVE-2021-38160 | kernel-source-rt:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:cdn.kernel.org:CVE-2021-33909 CONFIRM:security.netapp.com:CVE-2021-38203 CVE-2021-38160 D:CVE-2021-38160 DSA-4978 L3:61611 MISC:github.com:CVE-2021-38160 MLIST:[debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update MLIST:[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update SMASH Issue 305969 bdo#993948 bdo#993978 bnc#1190117 bnc#1190118 bnc#1190263 https://access.redhat.com/security/cve/cve-2021-38160 jsc#CAR-1059 rh#1991722 |
CVE-2021-38166 | kernel-source-rt:Not affected | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-38166 CVE-2021-38166 D:CVE-2021-38166 DSA-4978 FEDORA:FEDORA-2021-b22606e88b FEDORA:FEDORA-2021-f35f45a76f MISC:git.kernel.org:CVE-2021-38166 MISC:lore.kernel.org:CVE-2021-38166 SMASH Issue 305976 bdo#993948 bdo#993978 bnc#1189233 rh#1993190 |
CVE-2021-38185 | cpio:Released | important | 8.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) | CVE-2021-38185 D:CVE-2021-38185 MISC:git.savannah.gnu.org:CVE-2021-38185 MISC:github.com:CVE-2021-38185 MISC:lists.gnu.org:CVE-2021-38185 RHSA-2022:1991 SMASH Issue 305980 bnc#1189206 https://lists.debian.org/debian-lts-announce/2023/06/msg00007.html jsc#CAR-860 rh#1991731 |
CVE-2021-38198 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-38198 L3:61441 MISC:cdn.kernel.org:CVE-2021-38198 MISC:github.com:CVE-2021-38198 SMASH Issue 306047 bnc#1189262 bnc#1189278 bnc#1189487 jsc#CAR-862 rh#1992264 |
CVE-2021-38199 | kernel-source-rt:Already fixed | moderate | 6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:cdn.kernel.org:CVE-2021-33909 CVE-2021-38199 MISC:github.com:CVE-2021-38199 SMASH Issue 306046 bdo#993948 bdo#993978 bnc#1189265 jsc#CAR-863 rh#1992271 |
CVE-2021-38200 | kernel-source-rt:Not affected | moderate | () | CVE-2021-38200 MISC:cdn.kernel.org:CVE-2021-38207 MISC:github.com:CVE-2021-38200 SMASH Issue 306045 bnc#1189276 rh#1992276 |
CVE-2021-38201 | kernel-source-rt:Not affected | important | () | CONFIRM:cdn.kernel.org:CVE-2021-33909 CONFIRM:security.netapp.com:CVE-2021-38203 CVE-2021-38201 MISC:github.com:CVE-2021-38201 RHSA-2021:3440 RHSA-2021:3447 SMASH Issue 306044 bnc#1189288 rh#1992731 |
CVE-2021-38202 | kernel-source-rt:Not affected | important | () | CONFIRM:cdn.kernel.org:CVE-2021-33909 CVE-2021-38202 MISC:github.com:CVE-2021-38202 SMASH Issue 306043 bnc#1189289 rh#1992741 |
CVE-2021-38203 | kernel-source-rt:Not affected | moderate | () | CONFIRM:cdn.kernel.org:CVE-2021-33909 CONFIRM:security.netapp.com:CVE-2021-38203 CVE-2021-38203 MISC:github.com:CVE-2021-38203 SMASH Issue 306042 bnc#1189290 rh#1992745 |
CVE-2021-38204 | kernel-source-rt:Released | moderate | 4.2 (CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-38204 MISC:cdn.kernel.org:CVE-2021-38204 MISC:github.com:CVE-2021-38204 SMASH Issue 306041 bnc#1189291 rh#1992754 |
CVE-2021-38205 | kernel-source-rt:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) | CVE-2021-38205 MISC:cdn.kernel.org:CVE-2021-38205 MISC:github.com:CVE-2021-38205 MLIST:[debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update SMASH Issue 306040 bnc#1189292 jsc#CAR-871 rh#1992774 |
CVE-2021-38206 | kernel-source-rt:Not affected | moderate | 6.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-38206 MISC:cdn.kernel.org:CVE-2021-38207 MISC:github.com:CVE-2021-38206 SMASH Issue 306039 bnc#1189296 jsc#CAR-872 rh#1992779 |
CVE-2021-38207 | kernel-source-rt:Released | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-38207 MISC:cdn.kernel.org:CVE-2021-38207 MISC:github.com:CVE-2021-38207 SMASH Issue 306038 bnc#1189298 jsc#CAR-873 rh#1992798 |
CVE-2021-38208 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-3587 CVE-2021-38208 MISC:cdn.kernel.org:CVE-2021-38208 MISC:cve.mitre.org:MLIST:[oss-security] 20210817 Re: Linux kernel: nfc: null ptr dereference in llcp_sock_getname MISC:github.com:CVE-2021-38208 MLIST:[oss-security] 20210817 Re: Linux kernel: nfc: null ptr dereference in llcp_sock_getname OSS:2021/Q2/187 OSS:2021/Q2/189 OSS:2021/Q3/104 OSS:2021/Q3/105 OSS:2021/Q3/117 SMASH Issue 301352 SMASH Issue 306037 bnc#1186665 bnc#1187055 jsc#CAR-949 rh#1968057 rh#1992810 |
CVE-2021-38209 | kernel-source-rt:Already fixed | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) | CVE-2021-38209 MISC:cdn.kernel.org:CVE-2021-38209 MISC:github.com:CVE-2021-38209 SMASH Issue 306036 bnc#1189393 jsc#CAR-892 rh#1992815 |
CVE-2021-3826 | binutils:Ignore | moderate | 6.6 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H) | CVE-2021-3826 FEDORA:FEDORA-2022-19538a3732 FEDORA:FEDORA-2022-667ee398b1 FEDORA:FEDORA-2022-8e1df11a7a FEDORA:FEDORA-2022-affcf9eea6 FEDORA:FEDORA-2022-c9a1fd5370 MISC:gcc.gnu.org:CVE-2021-3826 RHSA-2023:3269 SMASH Issue 341159 bnc#1202969 https://gcc.gnu.org/git/?p=gcc.git%3Ba=commit%3Bh=5481040197402be6dfee265bd2ff5a4c88e30505 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4MYLS3VR4OPL5ECRWOR4ZHMGXUSCJFZY/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AKZ2DTS3ATVN5PANNVLKLE5OP4OF25Q/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7MTEHT3G6YKJ7F7MSGWYSI4UM3XBAYXZ/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AXFC74WRZ2Q7F2TSUKPYNIL7ZPBWYI6L/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/ jsc#CAR-2060 rh#2122627 |
CVE-2021-38300 | kernel-source-rt:Not affected | important | () | CONFIRM:cdn.kernel.org:CVE-2021-38300 CONFIRM:git.kernel.org:CVE-2021-38300 CONFIRM:security.netapp.com:CVE-2021-38300 CVE-2021-38300 D:CVE-2021-38300 DSA-5096 MISC:www.openwall.com:CVE-2021-38300 MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update OSS:2021/07/22/1 OSS:2021/Q3/170 OSS:2022/01/25/12 SMASH Issue 309865 bdo#988044 bdo#989285 bdo#990411 bdo#994050 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2002750 rh#2044561 rh#2053632 rh#2055502 rh#2059923 |
CVE-2021-3847 | kernel-source-rt:Won't fix | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-3847 DSA-5402 MISC:bugs.launchpad.net:MLIST:[oss-security] 20160224 User Namespaces Overlayfs Xattr Setgid Privilege Escalation: Overlayfs OSS:2021/10/14/3 OSS:2021/10/18/1 OSS:2021/Q4/33 SMASH Issue 312626 bnc#1191694 jsc#CAR-1139 rh#2009704 rh#2159505 |
CVE-2021-38604 | glibc:Not affected | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2021-38604 CVE-2021-38604 FEDORA:FEDORA-2021-16dc1f33af GLSA-202208-24 MISC:blog.tuxcare.com:CVE-2021-38604 MISC:sourceware.org:CVE-2021-38604 MISC:www.oracle.com:CVE-2022-21586 SMASH Issue 307148 bnc#1189426 jsc#CAR-896 rh#1965408 rh#1993517 |
CVE-2021-3864 | kernel-source-rt:Not affected | important | 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-3864 DSA-5096 L3:62774 L3:63354 L3:63732 L3:63772 L3:63817 L3:64525 L3:64526 L3:64549 MISC:access.redhat.com:CVE-2021-3864 MISC:lore.kernel.org:CVE-2021-3864 MISC:security-tracker.debian.org:CVE-2021-3864 OSS:2021/07/22/1 OSS:2021/10/20/2 OSS:2022/01/25/12 OSS:2022/11/30/1 OSS:2022/Q4/163 Oracle:CVE-2022-0492 SMASH Issue 311607 SMASH Issue 312222 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1191281 bnc#1192449 bnc#1196384 bnc#1199680 bnc#1201500 bnc#1201712 bnc#1201860 https://lore.kernel.org/all/20211221021744.864115-1-longman%40redhat.com/ https://lore.kernel.org/all/20211226150310.GA992%401wt.eu/ https://lore.kernel.org/lkml/20211228170910.623156-1-wander%40redhat.com/ jsc#CAR-1234 linux.git:commit:04aa64375f48a5d430b5550d9271f8428883e550 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2015046 rh#2029923 rh#2044561 rh#2051505 rh#2053632 rh#2059923 rh#2147572 |
CVE-2021-3872 | vim:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) | CONFIRM:huntr.dev:CVE-2021-3778 CONFIRM:huntr.dev:CVE-2021-3796 CONFIRM:huntr.dev:CVE-2021-3872 CONFIRM:huntr.dev:CVE-2021-3903 CONFIRM:huntr.dev:CVE-2021-3984 CONFIRM:huntr.dev:CVE-2021-4019 CONFIRM:huntr.dev:CVE-2021-4069 CONFIRM:security.netapp.com:CVE-2021-3778 CONFIRM:security.netapp.com:CVE-2021-3796 CVE-2021-3872 D:CVE-2021-3778 D:CVE-2021-3796 D:CVE-2021-3872 D:CVE-2021-4019 FEDORA:FEDORA-2021-469afb66c9 FEDORA:FEDORA-2021-541ddd1f94 FEDORA:FEDORA-2021-6988830606 FEDORA:FEDORA-2021-84f4cf3244 FEDORA:FEDORA-2021-968f57ec98 FEDORA:FEDORA-2021-a5e55a9e02 FEDORA:FEDORA-2021-af135cabe2 FEDORA:FEDORA-2021-b0ac29efb1 GLSA-202208-32 L3:61812 L3:62281 L3:62355 L3:62356 L3:62635 L3:62636 L3:63347 MISC:github.com:CVE-2021-3872 MISC:github.com:CVE-2021-3903 MISC:github.com:CVE-2021-3984 MISC:github.com:CVE-2021-4019 MISC:github.com:CVE-2021-4069 MISC:github.com:MLIST:[oss-security] 20210930 3 new CVE's in vim MLIST:[debian-lts-announce] 20220110 [SECURITY] [DLA 2876-1] vim security update MLIST:[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update MLIST:[debian-lts-announce] 20220620 [SECURITY] [DLA 3053-1] vim security update MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update MLIST:[oss-security] 20210930 3 new CVE's in vim OSS:2021/Q3/192 OSS:2022/01/15/1 OSS:2022/Q1/40 RHSA-2021:4517 RHSA-2022:0366 SMASH Issue 310103 SMASH Issue 312873 bnc#1190533 bnc#1191295 bnc#1191893 bnc#1193526 bnc#1193870 bnc#1193872 bnc#1195687 bnc#1195688 bnc#1199666 jsc#CAR-1066 jsc#CAR-1069 jsc#CAR-1179 jsc#CAR-1197 jsc#CAR-1295 jsc#CAR-1296 jsc#CAR-1308 rh#2004621 rh#2004728 rh#2016056 rh#2018558 rh#2028122 rh#2028212 rh#2029513 |
CVE-2021-3875 | vim:Released | important | 7.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H) | CONFIRM:huntr.dev:CVE-2021-3875 CVE-2021-3875 D:CVE-2021-3875 FEDORA:FEDORA-2021-6988830606 FEDORA:FEDORA-2021-84f4cf3244 GLSA-202208-32 L3:62100 L3:62844 L3:64527 L3:65303 MISC:github.com:CVE-2021-3875 OSS:2022/01/15/1 OSS:2022/Q1/40 SMASH Issue 312730 bnc#1191770 bnc#1192641 bnc#1196720 jsc#CAR-1148 rh#2014661 rh#2018558 |
CVE-2021-3892 | kernel-source-rt:Already fixed | moderate | 5.3 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-3892 SMASH Issue 313722 bnc#1192261 rh#2014623 |
CVE-2021-3894 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CVE-2021-3894 CVE-2022-0322 D:CVE-2022-0322 DSA-5096 MISC:git.kernel.org:CVE-2022-0322 MISC:www.oracle.com:CVE-2022-21586 OSS:2021/07/22/1 OSS:2022/01/25/12 RHSA-2022:1975 RHSA-2022:1988 SMASH Issue 321260 SMASH Issue 322486 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1194985 bnc#1195489 jsc#CAR-1516 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2014970 rh#2042822 rh#2044561 rh#2053632 rh#2059923 |
CVE-2021-3896 | kernel-source-rt:Released | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-3896 CVE-2021-43389 DSA-5096 MISC:cdn.kernel.org:CVE-2021-43056 MISC:git.kernel.org:CVE-2021-43389 MISC:lore.kernel.org:CVE-2021-43389 MISC:seclists.org:CVE-2021-43389 MISC:www.oracle.com:CVE-2022-21586 MLIST:[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update OSS:2021/07/22/1 OSS:2021/11/05/1 OSS:2021/Q4/100 OSS:2022/01/25/12 RHSA-2022:1975 RHSA-2022:1988 SMASH Issue 313334 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1191958 jsc#CAR-1227 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2013180 rh#2044561 rh#2053632 rh#2055502 rh#2059923 |
CVE-2021-3903 | vim:Released | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L) | CONFIRM:huntr.dev:CVE-2021-3903 CVE-2021-3903 FEDORA:FEDORA-2021-a5e55a9e02 FEDORA:FEDORA-2021-af135cabe2 FEDORA:FEDORA-2021-b0ac29efb1 L3:62281 MISC:github.com:CVE-2021-3903 MLIST:[debian-lts-announce] 20220620 [SECURITY] [DLA 3053-1] vim security update OSS:2022/01/15/1 SMASH Issue 313699 bnc#1192167 jsc#CAR-1197 rh#2018558 |
CVE-2021-3923 | kernel-source-rt:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) | CVE-2021-3923 RHSA-2022:1975 RHSA-2022:1988 SMASH Issue 361177 bnc#1209778 https://lore.kernel.org/all/20220204100036.GA12348@kili/ rh#2019643 |
CVE-2021-3927 | vim:Released | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L) | CONFIRM:huntr.dev:CVE-2021-3927 CVE-2021-3927 FEDORA:FEDORA-2021-58ab85548d FEDORA:FEDORA-2021-b0ac29efb1 FEDORA:FEDORA-2021-cfadac570a GLSA-202208-32 MISC:github.com:CVE-2021-3927 MLIST:[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update OSS:2022/01/15/1 OSS:2022/Q1/40 SMASH Issue 314328 bnc#1192481 jsc#CAR-1236 rh#2021290 |
CVE-2021-3928 | vim:Released | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L) | CONFIRM:huntr.dev:CVE-2021-3928 CVE-2021-3928 FEDORA:FEDORA-2021-58ab85548d FEDORA:FEDORA-2021-b0ac29efb1 FEDORA:FEDORA-2021-cfadac570a GLSA-202208-32 L3:63555 MISC:github.com:CVE-2021-3928 MLIST:[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update OSS:2022/01/15/1 OSS:2022/Q1/40 SMASH Issue 314327 bnc#1192478 bnc#1200668 jsc#CAR-1235 rh#2021292 |
CVE-2021-39537 | ncurses:Released | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:support.apple.com:CVE-2022-1720 CONFIRM:support.apple.com:CVE-2022-1725 CONFIRM:support.apple.com:CVE-2022-32894 CVE-2021-39537 FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6 FULLDISC:20221030 APPLE-SA-2022-10-27-9 Additional information for APPLE-SA-2022-09-12-3 macOS Big Sur 11.7 MISC:cvsweb.netbsd.org:CVE-2021-39537 MISC:lists.gnu.org:CVE-2021-39537 SMASH Issue 310505 bnc#1190793 https://lists.debian.org/debian-lts-announce/2023/12/msg00004.html https://security.netapp.com/advisory/ntap-20230427-0012/ jsc#CAR-1201 rh#2006978 |
CVE-2021-39636 | kernel-source-rt:Not affected | moderate | () | CVE-2021-39636 MISC:source.android.com:CVE-2021-39657 SMASH Issue 317659 bnc#1193812 rh#2068577 |
CVE-2021-39648 | kernel-source-rt:Released | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N) | CVE-2021-39648 MISC:source.android.com:CVE-2021-39657 SMASH Issue 317647 bnc#1193861 jsc#CAR-1515 rh#2068259 |
CVE-2021-39656 | kernel-source-rt:Not affected | moderate | () | CVE-2021-39656 MISC:source.android.com:CVE-2021-39657 SMASH Issue 317640 bnc#1193862 |
CVE-2021-39657 | kernel-source-rt:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-39657 MISC:source.android.com:CVE-2021-39657 SMASH Issue 317639 bnc#1193864 jsc#CAR-1510 |
CVE-2021-3968 | vim:Released | important | () | CONFIRM:huntr.dev:CVE-2021-3968 CVE-2021-3968 FEDORA:FEDORA-2021-5cd9df120e FEDORA:FEDORA-2021-b0ac29efb1 GLSA-202208-32 L3:65211 L3:65301 L3:65303 MISC:github.com:CVE-2021-3968 OSS:2022/01/15/1 OSS:2022/Q1/40 SMASH Issue 315394 bnc#1192902 rh#2025056 |
CVE-2021-39685 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-39685 DSA-5096 MISC:source.android.com:CVE-2021-39709 OSS:2021/07/22/1 OSS:2021/Q4/164 OSS:2022/01/25/12 SMASH Issue 317621 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bdo#996974 bnc#1193802 bnc#1194459 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2036100 rh#2044561 rh#2053632 rh#2059923 |
CVE-2021-39686 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-39686 DSA-5096 MISC:source.android.com:CVE-2021-39709 OSS:2021/07/22/1 OSS:2022/01/25/12 SMASH Issue 325614 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1196954 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2044561 rh#2053632 rh#2059923 rh#2063219 |
CVE-2021-39698 | kernel-source-rt:Released | important | 7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-39698 DSA-5096 L3:65426 MISC:source.android.com:CVE-2021-39709 OSS:2021/07/22/1 OSS:2022/01/25/12 SMASH Issue 325615 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1196956 bnc#1196959 jsc#CAR-1586 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2044561 rh#2053632 rh#2059923 rh#2063228 |
CVE-2021-39711 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2021-39711 MISC:source.android.com:CVE-2021-39793 SMASH Issue 326482 bnc#1197219 rh#2106098 |
CVE-2021-39713 | kernel-source-rt:Not affected | important | 7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-39713 DSA-5096 L3:63158 L3:63335 L3:64525 L3:64549 MISC:packetstormsecurity.com:CVE-2022-29581 MISC:source.android.com:CVE-2021-39793 MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update OSS:2021/07/22/1 OSS:2022/01/25/12 OSS:2022/11/30/1 OSS:2022/Q4/163 SMASH Issue 325616 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1196973 bnc#1197211 bnc#1198799 bnc#1199614 jsc#CAR-1698 linux.git:commit:04aa64375f48a5d430b5550d9271f8428883e550 linux.git:commit:31185df7e2b1d2fa1de4900247a12d7b9c7087eb linux.git:commit:33172ab50a53578a95691310f49567c9266968b0 linux.git:commit:3777ea7bac3113005b7180e6b9dadf16d19a5827 linux.git:commit:42baefac638f06314298087394b982ead9ec444b linux.git:commit:5cadd4bb1d7fc9ab201ac14620d1a478357e4ebd linux.git:commit:66e3531b33ee51dad17c463b4d9c9f52e341503d linux.git:commit:6b1775f26a2da2b05a6dc8ec2b5d14e9a4701a1a linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 linux.git:commit:abf1fd5919d6238ee3bc5eb4a9b6c3947caa6638 linux.git:commit:b0576cc9c6b843d99c6982888d59a56209341888 linux.git:commit:d3b6372c5881cb54925212abb62c521df8ba4809 rh#1980646 rh#1997467 rh#2029923 rh#2044561 rh#2053632 rh#2059923 rh#2063236 rh#2147572 |
CVE-2021-39714 | kernel-source-rt:Not affected | important | 7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-39714 MISC:source.android.com:CVE-2021-39793 MISC:source.android.com:CVE-2022-20408 SMASH Issue 326480 bnc#1197214 bnc#1197218 jsc#CAR-1597 rh#2106094 |
CVE-2021-39715 | kernel-source-rt:Not affected | moderate | () | CVE-2021-39715 MISC:source.android.com:CVE-2021-39793 SMASH Issue 326479 bnc#1197210 rh#2106104 |
CVE-2021-39725 | kernel-source-rt:Not affected | moderate | () | CVE-2021-39725 MISC:source.android.com:CVE-2021-39793 SMASH Issue 326469 bnc#1197206 |
CVE-2021-3973 | vim:Released | critical | () | CONFIRM:huntr.dev:CVE-2021-3973 CVE-2021-3973 FEDORA:FEDORA-2021-5cd9df120e FEDORA:FEDORA-2021-b0ac29efb1 GLSA-202208-32 L3:65211 L3:65301 L3:65303 MISC:github.com:CVE-2021-3973 MLIST:[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update OSS:2022/01/15/1 OSS:2022/Q1/40 SMASH Issue 315393 bnc#1192903 rh#2025059 |
CVE-2021-39735 | kernel-source-rt:Not affected | moderate | () | CVE-2021-39735 MISC:source.android.com:CVE-2021-39793 SMASH Issue 326460 bnc#1197205 |
CVE-2021-3974 | vim:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:huntr.dev:CVE-2021-3974 CVE-2021-3974 FEDORA:FEDORA-2021-5cd9df120e FEDORA:FEDORA-2021-b0ac29efb1 GLSA-202208-32 L3:64932 L3:65211 L3:65303 MISC:github.com:CVE-2021-3974 MLIST:[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update OSS:2022/01/15/1 OSS:2022/Q1/40 SMASH Issue 315400 bnc#1192904 jsc#CAR-1275 rh#2025061 |
CVE-2021-39792 | kernel-source-rt:Not affected | low | () | CVE-2021-39792 MISC:source.android.com:CVE-2021-39793 SMASH Issue 326457 bnc#1197203 |
CVE-2021-39800 | kernel-source-rt:Not affected | low | () | CVE-2021-39800 MISC:source.android.com:CVE-2021-39809 SMASH Issue 328856 bnc#1198444 |
CVE-2021-39801 | kernel-source-rt:Not affected | important | () | CVE-2021-39801 MISC:source.android.com:CVE-2021-39809 SMASH Issue 328855 bnc#1198443 |
CVE-2021-39802 | kernel-source-rt:Not affected | important | () | CVE-2021-39802 MISC:source.android.com:CVE-2021-39809 SMASH Issue 328854 bnc#1198445 |
CVE-2021-3984 | vim:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:huntr.dev:CVE-2021-3984 CVE-2021-3984 MISC:github.com:CVE-2021-3984 RHSA-2022:0366 SMASH Issue 316126 bnc#1193298 jsc#CAR-1296 rh#2028122 |
CVE-2021-3995 | util-linux:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:/advisory/ntap-20221209-0002/ CVE-2021-3995 CVE-2021-3996 DSA-5055 FULLDISC:20221208 Race condition in snap-confine's must_mkdir_and_open_with_perms() (CVE-2022-3328) MISC:access.redhat.com:CVE-2021-3996 MISC:bugzilla.redhat.com:CVE-2021-3995 MISC:github.com:OSS:2022/Q1/66 MISC:mirrors.edge.kernel.org:CVE-2021-3996 MISC:packetstormsecurity.com:/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html MISC:www.qualys.com:OSS:2022/11/30/2 OSS:2022/01/24/2 OSS:2022/11/30/2 OSS:2022/Q1/66 SMASH Issue 321257 SMASH Issue 321258 bnc#1194976 https://security.gentoo.org/glsa/202401-08 rh#2024628 rh#2024631 |
CVE-2021-3996 | util-linux:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:/advisory/ntap-20221209-0002/ CVE-2021-3995 CVE-2021-3996 DSA-5055 FULLDISC:20221208 Race condition in snap-confine's must_mkdir_and_open_with_perms() (CVE-2022-3328) MISC:access.redhat.com:CVE-2021-3996 MISC:bugzilla.redhat.com:CVE-2021-3995 MISC:github.com:OSS:2022/Q1/66 MISC:mirrors.edge.kernel.org:CVE-2021-3996 MISC:packetstormsecurity.com:/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html MISC:www.qualys.com:OSS:2022/11/30/2 OSS:2022/01/24/2 OSS:2022/11/30/2 OSS:2022/Q1/66 SMASH Issue 321256 SMASH Issue 321258 bnc#1194976 https://security.gentoo.org/glsa/202401-08 rh#2024628 rh#2024631 |
CVE-2021-3997 | systemd:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-3997 D:CVE-2021-3997 MISC:access.redhat.com:CVE-2021-3997 MISC:github.com:CVE-2021-3997 MISC:github.com:OSS:2022/Q1/18 OSS:2022/01/10/2 OSS:2022/Q1/18 SMASH Issue 319295 SMASH Issue 319296 bnc#1194178 https://security.gentoo.org/glsa/202305-15 rh#2024639 |
CVE-2021-3998 | glibc:Not affected | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N) | CONFIRM:security.netapp.com:CVE-2021-3998 CVE-2021-3998 MISC:access.redhat.com:CVE-2021-3998 MISC:security-tracker.debian.org:CVE-2021-3998 MISC:sourceware.org:CVE-2021-3998 OSS:2022/01/24/4 OSS:2022/Q1/68 SMASH Issue 320032 bnc#1194620 https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=84d2d0fe20bdf94feed82b21b4d7d136db471f03 https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=ee8d5e33adb284601c00c94687bc907e10aec9bb rh#2024633 |
CVE-2021-3999 | glibc:Released | important | 7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-3999 CVE-2021-3999 L3:64698 MISC:access.redhat.com:/errata/RHSA-2022:0896 MISC:access.redhat.com:CVE-2021-3999 MISC:security-tracker.debian.org:CVE-2021-3999 MISC:sourceware.org:/git/gitweb.cgi MISC:sourceware.org:CVE-2021-3999 MLIST:[debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update OSS:2022/01/24/4 OSS:2022/Q1/68 RHSA-2022:0896 SMASH Issue 320033 bnc#1194640 jsc#CAR-1456 rh#2024637 |
CVE-2021-4001 | kernel-source:Released, kernel-source-azure:Released, kernel-source-rt:Released | important | 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-4001 MISC:git.kernel.org:CVE-2021-4001 SMASH Issue 315528 bnc#1192990 bnc#1192991 jsc#CAR-1276 rh#2025645 |
CVE-2021-4002 | kernel-source:Released, kernel-source-azure:Released, kernel-source-rt:Released | moderate | 5.1 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N) | CVE-2021-4002 D:CVE-2021-4002 DSA-5096 MISC:git.kernel.org:CVE-2021-4002 MISC:www.oracle.com:CVE-2022-21586 MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update OSS:2021/07/22/1 OSS:2021/11/25/1 OSS:2021/Q4/133 OSS:2022/01/25/12 RHSA-2022:1975 RHSA-2022:1988 SMASH Issue 315498 SMASH Issue 315550 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1192946 bnc#1192973 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2025726 rh#2044561 rh#2053632 rh#2055502 rh#2059923 |
CVE-2021-40153 | squashfs:Unsupported | moderate | 6.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N) | CVE-2021-40153 CVE-2021-41072 D:CVE-2021-40153 D:CVE-2021-41072 DSA-4967 DSA-4987 MISC:bugs.launchpad.net:CVE-2021-40153 MISC:github.com:CVE-2021-40153 MISC:github.com:CVE-2021-41072 MLIST:[debian-lts-announce] 20211020 [SECURITY] [DLA 2789-1] squashfs-tools security update SMASH Issue 308509 SMASH Issue 310108 bdo#994262 bnc#1189936 bnc#1190531 https://lists.debian.org/debian-lts-announce/2021/08/msg00030.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GSMRKVJMJFX3MB7D3PXJSYY3TLZROE5S/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAOZ4BKWAC4Y3U2K5MMW3S77HWWXHQDL/ https://security.gentoo.org/glsa/202305-29 https://www.debian.org/security/2021/dsa-4967 https://www.debian.org/security/2021/dsa-4987 jsc#CAR-1065 jsc#CAR-942 rh#1998621 rh#2004957 |
CVE-2021-4019 | vim:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:huntr.dev:CVE-2021-4019 CVE-2021-4019 D:CVE-2021-4019 MISC:github.com:CVE-2021-4019 RHSA-2022:0366 SMASH Issue 316098 bnc#1193294 jsc#CAR-1295 rh#2028212 |
CVE-2021-4023 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-4023 SMASH Issue 315872 bnc#1193107 rh#2026484 |
CVE-2021-4028 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:/advisory/ntap-20221228-0002/ CVE-2021-4028 MISC:access.redhat.com:CVE-2021-4028 MISC:git.kernel.org:CVE-2021-4028 MISC:lkml.org:CVE-2021-4028 RHSA-2022:0590 RHSA-2022:0629 RHSA-2022:0636 RHSA-2022:0771 RHSA-2022:0772 RHSA-2022:0777 RHSA-2022:0823 RHSA-2022:0851 RHSA-2022:0958 RHSA-2022:1185 RHSA-2022:1198 RHSA-2022:1199 RHSA-2022:1263 RHSA-2022:1324 RHSA-2022:1373 RHSA-2022:1535 RHSA-2022:1550 RHSA-2022:1555 RHSA-2022:2186 RHSA-2022:2188 RHSA-2022:2189 RHSA-2022:2211 RHSA-2022:4896 SMASH Issue 315947 bnc#1193167 bnc#1193529 rh#2027201 |
CVE-2021-4032 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-4032 MISC:git.kernel.org:CVE-2021-4032 MISC:lkml.org:CVE-2021-4032 SMASH Issue 315980 bnc#1193187 rh#2027403 |
CVE-2021-4037 | kernel-source-rt:Released | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N) | CVE-2021-4037 DSA-5257 MISC:access.redhat.com:CVE-2021-4037 MISC:bugzilla.redhat.com:CVE-2021-4037 MISC:git.kernel.org:CVE-2021-4037 MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update OSS:2022/Q4/30 RHSA-2022:1975 RHSA-2022:1988 RHSA-2022:4829 RHSA-2022:4835 SMASH Issue 316070 ZDI-22-1462 bnc#1198702 linux.git:commit:0b7808818cb9df6680f98996b8e9a439fa7bcc2f linux.git:commit:8f033d2becc24aa6bfd2a5c104407963560caabc linux.git:commit:aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d linux.git:commit:b2d03cabe2b2e150ff5a381731ea0355459be09f linux.git:commit:bcca852027e5878aec911a347407ecc88d6fff7f linux.git:commit:ff05d4b45dd89b922578dac497dcabf57cf771c6 rh#1599161 rh#2027239 rh#2044863 rh#2123056 rh#2134377 rh#2134440 rh#2134451 rh#2134506 rh#2134517 rh#2139586 rh#2139598 |
CVE-2021-4044 | openssl:Not affected, openssl-1_1:Not affected | important | () | CONFIRM:git.openssl.org:CVE-2021-4044 CONFIRM:security.netapp.com:CVE-2021-4044 CONFIRM:www.openssl.org:CVE-2021-4044 CVE-2021-4044 SMASH Issue 317413 bnc#1193740 https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=758754966791c537ea95241438454aa86f91f256 openssl.git:commit:0fcf2351ecff5db21cba431704e4da631b74904a openssl.git:commit:6894e20b50c1204bfc990093b4e7ccd10f92865d openssl.git:commit:752aa4a6f0f3098258fb6be5592fd18929da59c0 openssl.git:commit:c1c1bb7c5e2baa109baec62d2af09d24caae5557 rh#2033761 |
CVE-2021-40490 | kernel-source-rt:Released | moderate | 6.1 (CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-40490 CVE-2021-40490 D:CVE-2021-40490 DSA-4978 FEDORA:FEDORA-2021-4ca1b080bb FEDORA:FEDORA-2021-60f1d2eba1 MISC:git.kernel.org:CVE-2021-40490 MLIST:[debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update MLIST:[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update SMASH Issue 309071 bdo#993948 bdo#993978 bnc#1190159 jsc#CAR-1011 rh#2001951 |
CVE-2021-40528 | libgcrypt:Already fixed | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N) | CVE-2021-40528 GLSA-202210-13 MISC:eprint.iacr.org:CVE-2021-40530 MISC:git.gnupg.org:CVE-2021-40528 MISC:ibm.github.io:CVE-2021-40530 Oracle:CVE-2021-40528 RHSA-2022:5311 SMASH Issue 309149 bnc#1190239 jsc#CAR-1038 rh#2002816 |
CVE-2021-4069 | vim:Released | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N) | CONFIRM:huntr.dev:CVE-2021-4069 CVE-2021-4069 FEDORA:FEDORA-2021-541ddd1f94 FEDORA:FEDORA-2021-b0ac29efb1 MISC:github.com:CVE-2021-4069 SMASH Issue 316361 bnc#1193466 jsc#CAR-1308 rh#2029513 |
CVE-2021-4083 | kernel-source:Released, kernel-source-azure:Released, kernel-source-rt:Released | important | 7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-4083 CVE-2021-4083 DSA-5096 MISC:git.kernel.org:CVE-2021-4083 MISC:www.oracle.com:CVE-2022-21586 MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update OSS:2021/07/22/1 OSS:2022/01/25/12 RHSA-2022:0820 RHSA-2022:0821 RHSA-2022:0823 RHSA-2022:0851 RHSA-2022:0925 RHSA-2022:0958 RHSA-2022:1103 RHSA-2022:1104 RHSA-2022:1107 RHSA-2022:1185 RHSA-2022:1198 RHSA-2022:1199 RHSA-2022:1263 RHSA-2022:1324 RHSA-2022:1373 RHSA-2022:1413 RHSA-2022:1418 RHSA-2022:1455 RHSA-2022:1975 RHSA-2022:1988 RHSA-2022:2189 RHSA-2022:4896 SMASH Issue 317361 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1193727 bnc#1194460 jsc#CAR-1379 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2029923 rh#2044561 rh#2053632 rh#2055502 rh#2059923 |
CVE-2021-4090 | kernel-source-rt:Not affected | moderate | 6.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2021-4090 CVE-2021-4090 D:CVE-2021-4090 MISC:lore.kernel.org:CVE-2021-4090 SMASH Issue 317066 bnc#1193663 rh#2025101 |
CVE-2021-4093 | kernel-source-rt:Not affected | important | () | CVE-2021-4093 MISC:bugs.chromium.org:CVE-2021-4093 RHSA-2022:1975 RHSA-2022:1988 SMASH Issue 317122 bnc#1193716 rh#2028584 |
CVE-2021-4095 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-4095 D:CVE-2021-4095 FEDORA:FEDORA-2022-0816754490 FEDORA:FEDORA-2022-8efcea6e67 MISC:access.redhat.com:OSS:2021/Q4/157 MISC:git.kernel.org:OSS:2022/01/17/1 MISC:patchwork.kernel.org:OSS:2021/Q4/157 MISC:patchwork.kernel.org:OSS:2022/01/17/1 OSS:2021/Q4/157 OSS:2022/01/17/1 SMASH Issue 317123 bnc#1193769 rh#2031194 |
CVE-2021-41072 | squashfs:Unsupported | moderate | 6.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N) | CVE-2021-40153 CVE-2021-41072 D:CVE-2021-40153 D:CVE-2021-41072 DSA-4967 DSA-4987 MISC:bugs.launchpad.net:CVE-2021-40153 MISC:github.com:CVE-2021-40153 MISC:github.com:CVE-2021-41072 MLIST:[debian-lts-announce] 20211020 [SECURITY] [DLA 2789-1] squashfs-tools security update SMASH Issue 308509 SMASH Issue 309949 bdo#994262 bnc#1189936 bnc#1190531 https://lists.debian.org/debian-lts-announce/2021/08/msg00030.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GSMRKVJMJFX3MB7D3PXJSYY3TLZROE5S/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAOZ4BKWAC4Y3U2K5MMW3S77HWWXHQDL/ https://security.gentoo.org/glsa/202305-29 https://www.debian.org/security/2021/dsa-4967 https://www.debian.org/security/2021/dsa-4987 jsc#CAR-1065 jsc#CAR-942 rh#1998621 rh#2004957 |
CVE-2021-41073 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-41073 CVE-2021-41073 D:CVE-2021-41073 DSA-4978 FEDORA:FEDORA-2021-884d245ef8 FEDORA:FEDORA-2021-e0d6215753 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2021-41073 MISC:github.com:OSS:2022/Q2/169 MISC:www.openwall.com:CVE-2021-41073 OSS:2021/Q3/181 OSS:2022/06/04/4 OSS:2022/Q2/169 SMASH Issue 310391 bdo#993948 bdo#993978 bnc#1190664 rh#2007567 |
CVE-2021-4122 | cryptsetup:Not affected | moderate | 5.9 (CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N) | CVE-2021-4122 DSA-5070 MISC:access.redhat.com:CVE-2021-4122 MISC:access.redhat.com:OSS:2022/Q1/34 MISC:bugzilla.redhat.com:CVE-2021-4122 MISC:gitlab.com:CVE-2021-4122 MISC:mirrors.edge.kernel.org:CVE-2021-4122 OSS:2022/Q1/34 RHSA-2022:0370 SMASH Issue 319781 SMASH Issue 319782 bdo#1003686 bdo#949336 bnc#1194469 rh#2032401 |
CVE-2021-4135 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2021-4135 DSA-5096 MISC:git.kernel.org:CVE-2021-4135 OSS:2021/07/22/1 OSS:2022/01/25/12 SMASH Issue 317979 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1193927 jsc#CAR-1394 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2026786 rh#2044561 rh#2053632 rh#2059923 |
CVE-2021-4136 | vim:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) | CONFIRM:huntr.dev:CVE-2021-4136 CONFIRM:support.apple.com:CVE-2018-25032 CONFIRM:support.apple.com:CVE-2022-0158 CONFIRM:support.apple.com:CVE-2022-26704 CVE-2021-4136 D:CVE-2021-4136 FEDORA:FEDORA-2022-48b86d586f FEDORA:FEDORA-2022-a3d70b50f0 FULLDISC:20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3 FULLDISC:20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6 FULLDISC:20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina GLSA-202208-32 L3:64932 L3:65211 L3:65301 L3:65303 MISC:github.com:CVE-2021-4136 OSS:2022/01/15/1 OSS:2022/Q1/40 SMASH Issue 317952 bnc#1193905 rh#2034720 |
CVE-2021-4148 | kernel-source-rt:Not affected | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-4148 MISC:lkml.org:CVE-2021-4148 SMASH Issue 318526 bnc#1193983 rh#2026487 |
CVE-2021-4149 | kernel-source:Released, kernel-source-azure:Released, kernel-source-rt:Released | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-4149 MISC:lkml.org:CVE-2021-4149 MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update SMASH Issue 318525 bnc#1194001 jsc#CAR-1393 rh#2026485 |
CVE-2021-4150 | kernel-source-rt:Not affected | moderate | () | CVE-2021-4150 MISC:lkml.org:CVE-2021-4150 SMASH Issue 318524 bnc#1193994 rh#2025938 |
CVE-2021-4154 | kernel-source-rt:Released | important | 8.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-4154 CVE-2021-4154 MISC:cloud.google.com:CVE-2021-4154 MISC:git.kernel.org:CVE-2021-4154 RHSA-2022:0186 RHSA-2022:0187 RHSA-2022:0231 RHSA-2022:0819 RHSA-2022:0825 RHSA-2022:0841 RHSA-2022:0849 SMASH Issue 317818 SMASH Issue 318587 bnc#1193842 bnc#1194461 jsc#CAR-1380 rh#2034514 |
CVE-2021-4155 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2021-4155 DSA-5096 MISC:access.redhat.com:OSS:2022/Q1/17 MISC:git.kernel.org:OSS:2022/Q1/17 MISC:security-tracker.debian.org:CVE-2021-4155 OSS:2021/07/22/1 OSS:2022/01/10/1 OSS:2022/01/25/12 OSS:2022/Q1/17 RHSA-2022:0176 RHSA-2022:0186 RHSA-2022:0187 RHSA-2022:0188 RHSA-2022:0231 RHSA-2022:0232 RHSA-2022:0335 RHSA-2022:0344 RHSA-2022:0529 RHSA-2022:0530 RHSA-2022:0531 RHSA-2022:0533 RHSA-2022:0540 RHSA-2022:0590 RHSA-2022:0592 RHSA-2022:0620 RHSA-2022:0622 RHSA-2022:0629 RHSA-2022:0636 RHSA-2022:0712 RHSA-2022:0718 RHSA-2022:0958 RHSA-2022:1263 RHSA-2022:1417 SMASH Issue 319525 SMASH Issue 319526 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bdo#996974 bnc#1194272 jsc#CAR-1522 linux.git:commit:4d1b97f9ce7c0d2af2bb85b12d48e6902172a28e linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2034813 rh#2044561 rh#2053632 rh#2059923 |
CVE-2021-4157 | kernel-source-rt:Released | low | 3.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L) | CONFIRM:security.netapp.com:CVE-2021-4157 CVE-2021-4157 D:CVE-2021-4157 MISC:lore.kernel.org:CVE-2021-4157 MISC:www.oracle.com:CVE-2022-21586 RHSA-2022:1975 RHSA-2022:1988 SMASH Issue 318614 bnc#1194013 rh#2034342 |
CVE-2021-4159 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2021-4159 D:CVE-2021-4159 MISC:access.redhat.com:CVE-2021-4159 MISC:git.kernel.org:CVE-2021-4159 MISC:security-tracker.debian.org:CVE-2021-4159 MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update SMASH Issue 319410 SMASH Issue 319411 bnc#1194227 jsc#CAR-1358 rh#2036024 |
CVE-2021-4160 | openssl-1_1:Not affected | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N) | CONFIRM:cert-portal.siemens.com:CVE-2021-25220 CONFIRM:git.openssl.org:CVE-2021-4160 CONFIRM:www.openssl.org:CVE-2021-4160 CVE-2021-4160 DSA-5103 GLSA-202210-02 MISC:www.oracle.com:CVE-2022-21498 MISC:www.oracle.com:CVE-2022-21586 Oracle:CVE-2021-4160 SMASH Issue 322087 bdo#989604 bnc#1195379 https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3bf7b73ea7123045b8f972badc67ed6878e6c37f https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6fc1aaaf303185aa5e483e06bdfae16daa9193a7 https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb https://security.netapp.com/advisory/ntap-20240621-0006/ rh#2048651 |
CVE-2021-41617 | openssh:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-41617 CVE-2021-41617 D:CVE-2021-41617 DSA-5586 FEDORA:FEDORA-2021-1f7339271d FEDORA:FEDORA-2021-f8df0f8563 FEDORA:FEDORA-2021-fa0e94198f L3:62175 L3:64523 L3:66086 MISC:www.openssh.com:CVE-2020-15778 MISC:www.openssh.com:CVE-2021-41617 MISC:www.openwall.com:CVE-2021-41617 MISC:www.oracle.com:CVE-2022-21498 MISC:www.oracle.com:CVE-2022-21586 MISC:www.starwindsoftware.com:CVE-2021-41617 OSS:2021/09/26/1 Oracle:CVE-2021-41617 RHSA-2021:4782 RHSA-2022:2013 SMASH Issue 310923 bdo#1033166 bdo#995130 bnc#1190975 bnc#1193033 https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/ https://www.debian.org/security/2023/dsa-5586 https://www.tenable.com/plugins/nessus/154174 jsc#CAR-1092 rh#2008291 |
CVE-2021-4166 | vim:Released | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L) | CONFIRM:huntr.dev:CVE-2021-4166 CONFIRM:support.apple.com:CVE-2018-25032 CONFIRM:support.apple.com:CVE-2022-0158 CONFIRM:support.apple.com:CVE-2022-26704 CVE-2021-4166 FEDORA:FEDORA-2022-48b86d586f FEDORA:FEDORA-2022-a3d70b50f0 FULLDISC:20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3 FULLDISC:20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6 FULLDISC:20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina GLSA-202208-32 MISC:github.com:CVE-2021-4166 OSS:2022/01/15/1 OSS:2022/Q1/40 SMASH Issue 318841 bnc#1194093 jsc#CAR-1356 rh#2035928 |
CVE-2021-4173 | vim:Not affected | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H) | CONFIRM:huntr.dev:CVE-2021-4173 CONFIRM:support.apple.com:CVE-2018-25032 CONFIRM:support.apple.com:CVE-2022-0158 CONFIRM:support.apple.com:CVE-2022-26704 CVE-2021-4173 FEDORA:FEDORA-2022-48b86d586f FEDORA:FEDORA-2022-a3d70b50f0 FULLDISC:20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3 FULLDISC:20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6 FULLDISC:20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina GLSA-202208-32 MISC:github.com:CVE-2021-4173 OSS:2022/01/15/1 OSS:2022/Q1/40 SMASH Issue 319171 bnc#1194108 rh#2035930 |
CVE-2021-41864 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:cdn.kernel.org:CVE-2021-41864 CONFIRM:security.netapp.com:CVE-2021-41864 CVE-2021-41864 D:CVE-2021-41864 DSA-5096 FEDORA:FEDORA-2021-79cbbefebe FEDORA:FEDORA-2021-9dd76a1ed0 FEDORA:FEDORA-2021-ffda3d6fa1 MISC:git.kernel.org:CVE-2021-41864 MISC:github.com:CVE-2021-41864 MLIST:[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update OSS:2021/07/22/1 OSS:2022/01/25/12 RHSA-2022:1975 RHSA-2022:1988 SMASH Issue 311579 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1191317 bnc#1191318 bnc#1191530 jsc#CAR-1100 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2010463 rh#2044561 rh#2053632 rh#2055502 rh#2059923 |
CVE-2021-4187 | vim:Not affected | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H) | CONFIRM:huntr.dev:CVE-2021-4187 CONFIRM:support.apple.com:CVE-2018-25032 CONFIRM:support.apple.com:CVE-2022-0158 CONFIRM:support.apple.com:CVE-2022-26704 CVE-2021-4187 FEDORA:FEDORA-2022-48b86d586f FEDORA:FEDORA-2022-a3d70b50f0 FULLDISC:20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3 FULLDISC:20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6 FULLDISC:20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina GLSA-202208-32 MISC:github.com:CVE-2021-4187 OSS:2022/01/15/1 OSS:2022/Q1/40 SMASH Issue 319269 bnc#1194301 rh#2036129 |
CVE-2021-4189 | python3:Already fixed | moderate | 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) | CONFIRM:security.netapp.com:CVE-2021-4189 CVE-2021-4189 MISC:access.redhat.com:CVE-2021-4189 MISC:bugs.python.org:CVE-2021-4189 MISC:github.com:CVE-2021-4189 MISC:python-security.readthedocs.io:CVE-2021-4189 MISC:security-tracker.debian.org:CVE-2021-4189 RHSA-2021:3254 RHSA-2022:1663 RHSA-2022:1821 RHSA-2022:1986 SMASH Issue 319261 bnc#1194146 https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html jsc#CAR-1357 rh#2036020 |
CVE-2021-4192 | vim:Released | moderate | 5.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) | CONFIRM:huntr.dev:CVE-2021-4192 CONFIRM:support.apple.com:CVE-2018-25032 CONFIRM:support.apple.com:CVE-2022-0158 CONFIRM:support.apple.com:CVE-2022-26704 CVE-2021-4192 D:CVE-2021-4192 FEDORA:FEDORA-2022-48b86d586f FULLDISC:20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3 FULLDISC:20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6 FULLDISC:20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina GLSA-202208-32 MISC:github.com:CVE-2021-4192 MLIST:[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update OSS:2022/01/15/1 OSS:2022/Q1/40 RHSA-2022:0366 SMASH Issue 319345 bnc#1194217 jsc#CAR-1391 rh#2039685 |
CVE-2021-4193 | vim:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:huntr.dev:CVE-2021-4193 CONFIRM:support.apple.com:CVE-2018-25032 CONFIRM:support.apple.com:CVE-2022-0158 CONFIRM:support.apple.com:CVE-2022-26704 CVE-2021-4193 D:CVE-2021-4193 FEDORA:FEDORA-2022-48b86d586f FULLDISC:20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3 FULLDISC:20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6 FULLDISC:20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina GLSA-202208-32 MISC:github.com:CVE-2021-4193 MLIST:[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update OSS:2022/01/15/1 OSS:2022/Q1/40 RHSA-2022:0366 SMASH Issue 319344 bnc#1194216 jsc#CAR-1392 rh#2039687 |
CVE-2021-4197 | kernel-source-rt:Released | moderate | 6.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N) | CONFIRM:security.netapp.com:CVE-2021-4197 CVE-2021-4197 D:CVE-2022-1016 D:CVE-2022-2153 D:CVE-2022-32296 DSA-5127 DSA-5161 DSA-5173 DSA-5184 MISC:anatomic.rip:OSS:2024/Q2/172 MISC:blog.exodusintel.com:OSS:2024/Q2/172 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:git.kernel.org:OSS:2024/Q2/172 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:OSS:2022/04/02/2 MISC:github.com:OSS:2022/Q3/101 MISC:lore.kernel.org:CVE-2021-4197 MISC:research.nccgroup.com:OSS:2022/09/02/9 MISC:ruia-ruia.github.io:OSS:2022/Q3/101 MISC:www.oracle.com:CVE-2022-21586 OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/04/22/3 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/22/1 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/Q3/101 OSS:2022/Q3/141 OSS:2024/04/24/3 OSS:2024/Q2/172 Oracle:CVE-2022-21123 RHSA-2022:1975 RHSA-2022:1988 RHSA-2022:5626 RHSA-2022:5633 SMASH Issue 319448 ZDI-23-1834 bdo#1006346 bdo#1013299 bdo#922204 bnc#1194302 https://bugs.chromium.org/p/project-zero/issues/detail?id=2504 jsc#CAR-1517 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1832397 rh#2035652 rh#2039448 rh#2056381 rh#2058395 rh#2058955 rh#2061633 rh#2062284 rh#2064604 rh#2066614 rh#2066706 rh#2066819 rh#2069736 rh#2070694 rh#2071047 rh#2073064 rh#2074208 rh#2074441 rh#2078456 rh#2084435 rh#2084458 rh#2085300 rh#2086753 rh#2088021 rh#2089815 rh#2090237 rh#2090240 rh#2090241 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2104423 rh#2141026 |
CVE-2021-41990 | strongswan:Released | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:cert-portal.siemens.com:CVE-2021-41991 CONFIRM:www.strongswan.org:CVE-2021-41990 CONFIRM:www.strongswan.org:CVE-2021-41991 CVE-2021-41990 CVE-2021-41991 DSA-4989 FEDORA:FEDORA-2021-0b37146973 FEDORA:FEDORA-2021-95fab6a482 FEDORA:FEDORA-2021-b3df83339e MISC:github.com:CVE-2021-41991 MLIST:[debian-lts-announce] 20211019 [SECURITY] [DLA 2788-1] strongswan security update SMASH Issue 311831 SMASH Issue 311832 bnc#1191367 jsc#CAR-1121 rh#2015610 rh#2015613 |
CVE-2021-41991 | strongswan:Released | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:cert-portal.siemens.com:CVE-2021-41991 CONFIRM:www.strongswan.org:CVE-2021-41990 CONFIRM:www.strongswan.org:CVE-2021-41991 CVE-2021-41990 CVE-2021-41991 DSA-4989 FEDORA:FEDORA-2021-0b37146973 FEDORA:FEDORA-2021-95fab6a482 FEDORA:FEDORA-2021-b3df83339e MISC:github.com:CVE-2021-41991 MLIST:[debian-lts-announce] 20211019 [SECURITY] [DLA 2788-1] strongswan security update SMASH Issue 311830 SMASH Issue 311832 SMASH Issue 312010 bnc#1191367 bnc#1191435 jsc#CAR-1121 jsc#CAR-1122 rh#2015610 rh#2015613 |
CVE-2021-42008 | kernel-source-rt:Released | important | 8.8 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-42008 CVE-2021-42008 D:CVE-2021-42008 MISC:cdn.kernel.org:CVE-2021-42008 MISC:git.kernel.org:CVE-2021-42008 MISC:www.youtube.com:CVE-2021-42008 MLIST:[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update SMASH Issue 311719 bnc#1191315 bnc#1191660 jsc#CAR-1229 rh#2010970 |
CVE-2021-4202 | kernel-source-rt:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-4202 CVE-2021-4202 D:CVE-2021-4202 DSA-5096 MISC:git.kernel.org:CVE-2021-4202 MISC:github.com:OSS:2022/06/07/2 OSS:2021/07/22/1 OSS:2022/01/25/12 OSS:2022/06/01/2 OSS:2022/06/04/2 OSS:2022/06/07/2 SMASH Issue 319778 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1194529 bnc#1194533 jsc#CAR-1518 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2036682 rh#2044561 rh#2053632 rh#2059923 |
CVE-2021-4203 | kernel-source-rt:Released | moderate | 5.8 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L) | CONFIRM:security.netapp.com:CVE-2021-4203 CVE-2021-4203 D:CVE-2021-4203 DSA-5096 MISC:bugs.chromium.org:CVE-2021-4203 MISC:git.kernel.org:CVE-2021-4203 MISC:lore.kernel.org:CVE-2021-4203 MISC:www.oracle.com:CVE-2022-21586 OSS:2021/07/22/1 OSS:2022/01/25/12 RHSA-2022:1975 RHSA-2022:1988 RHSA-2022:5626 RHSA-2022:5633 SMASH Issue 319780 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1194535 jsc#CAR-1390 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2036934 rh#2044561 rh#2053632 rh#2059923 |
CVE-2021-4204 | kernel-source-rt:Not affected, ltp:Released | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:/advisory/ntap-20221228-0003/ CVE-2021-4204 MISC:access.redhat.com:CVE-2021-4204 MISC:github.com:OSS:2022/06/07/2 MISC:security-tracker.debian.org:CVE-2021-4204 OSS:2022/01/11/4 OSS:2022/06/01/2 OSS:2022/06/04/2 OSS:2022/06/07/2 OSS:2022/Q1/22 SMASH Issue 319206 bnc#1194111 rh#2039178 |
CVE-2021-4209 | gnutls:Released | moderate | 6.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2021-4209 CVE-2021-4209 MISC:access.redhat.com:CVE-2021-4209 MISC:gitlab.com:CVE-2021-4209 SMASH Issue 323952 bnc#1196167 jsc#CAR-1543 rh#2044156 |
CVE-2021-4214 | libpng16:Ignore | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:security.netapp.com:CVE-2021-4214 CVE-2021-4214 MISC:access.redhat.com:CVE-2021-4214 MISC:github.com:CVE-2021-4214 MISC:security-tracker.debian.org:CVE-2021-4214 SMASH Issue 321667 bnc#1195401 jsc#CAR-1491 rh#2043393 |
CVE-2021-4217 | unzip:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H) | CVE-2021-4217 MISC:access.redhat.com:CVE-2021-4217 MISC:bugs.launchpad.net:CVE-2021-4217 SMASH Issue 321826 bnc#1196175 rh#2044583 |
CVE-2021-4218 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-4218 MISC:access.redhat.com:CVE-2021-4218 MISC:bugs.centos.org:CVE-2021-4218 SMASH Issue 322272 bnc#1195374 rh#2048359 |
CVE-2021-42252 | kernel-source-rt:Already fixed | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-42252 MISC:cdn.kernel.org:CVE-2021-42252 MISC:git.kernel.org:CVE-2021-42252 SMASH Issue 309961 SMASH Issue 312272 bnc#1190479 bnc#1192444 jsc#CAR-1231 rh#2013097 |
CVE-2021-42327 | kernel-source-rt:Not affected | important | 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-42327 FEDORA:FEDORA-2021-a093973910 MISC:git.kernel.org:CVE-2021-42327 MISC:www.mail-archive.com:CVE-2021-42327 SMASH Issue 313292 bnc#1191949 bnc#1225423 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f23750b5b3d98653b31d4469592935ef6364ad67 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDDEW4APTYKJK365HC2JZIVXYUV7ZRN7/ https://security.netapp.com/advisory/ntap-20211118-0005/ https://www.mail-archive.com/amd-gfx%40lists.freedesktop.org/msg69080.html linux.git:commit:3f4e54bd312d3dafb59daf2b97ffa08abebe60f5 linux.git:commit:839e59a34394905fef73093e8605f50a9eb6d802 rh#2016692 |
CVE-2021-42373 | busybox:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2021-42377 CVE-2021-42373 CVE-2021-42374 CVE-2021-42375 CVE-2021-42376 CVE-2021-42377 CVE-2021-42378 CVE-2021-42379 CVE-2021-42380 CVE-2021-42381 CVE-2021-42382 CVE-2021-42383 CVE-2021-42384 CVE-2021-42385 CVE-2021-42386 D:CVE-2021-42373 D:CVE-2021-42374 D:CVE-2021-42375 D:CVE-2021-42376 D:CVE-2021-42377 D:CVE-2021-42378 D:CVE-2021-42379 D:CVE-2021-42380 D:CVE-2021-42381 FEDORA:FEDORA-2021-5a95823596 FEDORA:FEDORA-2021-c52c0fe490 N/A:N/A SMASH Issue 315036 SMASH Issue 315365 bnc#1192869 https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog jsc#CAR-1324 rh#2023876 rh#2023881 rh#2023888 rh#2023891 rh#2023895 rh#2023900 rh#2023904 rh#2023912 rh#2023927 rh#2023929 rh#2023931 rh#2023933 rh#2023936 rh#2023938 |
CVE-2021-42374 | busybox:Released | moderate | 5.7 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2021-42377 CVE-2021-42373 CVE-2021-42374 CVE-2021-42375 CVE-2021-42376 CVE-2021-42377 CVE-2021-42378 CVE-2021-42379 CVE-2021-42380 CVE-2021-42381 CVE-2021-42382 CVE-2021-42383 CVE-2021-42384 CVE-2021-42385 CVE-2021-42386 D:CVE-2021-42373 D:CVE-2021-42374 D:CVE-2021-42375 D:CVE-2021-42376 D:CVE-2021-42377 D:CVE-2021-42378 D:CVE-2021-42379 D:CVE-2021-42380 D:CVE-2021-42381 FEDORA:FEDORA-2021-5a95823596 FEDORA:FEDORA-2021-c52c0fe490 N/A:N/A SMASH Issue 315038 SMASH Issue 315365 bnc#1192869 https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog jsc#CAR-1324 rh#2023876 rh#2023881 rh#2023888 rh#2023891 rh#2023895 rh#2023900 rh#2023904 rh#2023912 rh#2023927 rh#2023929 rh#2023931 rh#2023933 rh#2023936 rh#2023938 |
CVE-2021-42375 | busybox:Released | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2021-42377 CVE-2021-42373 CVE-2021-42374 CVE-2021-42375 CVE-2021-42376 CVE-2021-42377 CVE-2021-42378 CVE-2021-42379 CVE-2021-42380 CVE-2021-42381 CVE-2021-42382 CVE-2021-42383 CVE-2021-42384 CVE-2021-42385 CVE-2021-42386 D:CVE-2021-42373 D:CVE-2021-42374 D:CVE-2021-42375 D:CVE-2021-42376 D:CVE-2021-42377 D:CVE-2021-42378 D:CVE-2021-42379 D:CVE-2021-42380 D:CVE-2021-42381 FEDORA:FEDORA-2021-5a95823596 FEDORA:FEDORA-2021-c52c0fe490 N/A:N/A SMASH Issue 315039 SMASH Issue 315365 bnc#1192869 https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog jsc#CAR-1324 rh#2023876 rh#2023881 rh#2023888 rh#2023891 rh#2023895 rh#2023900 rh#2023904 rh#2023912 rh#2023927 rh#2023929 rh#2023931 rh#2023933 rh#2023936 rh#2023938 |
CVE-2021-42376 | busybox:Released | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2021-42377 CVE-2021-42373 CVE-2021-42374 CVE-2021-42375 CVE-2021-42376 CVE-2021-42377 CVE-2021-42378 CVE-2021-42379 CVE-2021-42380 CVE-2021-42381 CVE-2021-42382 CVE-2021-42383 CVE-2021-42384 CVE-2021-42385 CVE-2021-42386 D:CVE-2021-42373 D:CVE-2021-42374 D:CVE-2021-42375 D:CVE-2021-42376 D:CVE-2021-42377 D:CVE-2021-42378 D:CVE-2021-42379 D:CVE-2021-42380 D:CVE-2021-42381 FEDORA:FEDORA-2021-5a95823596 FEDORA:FEDORA-2021-c52c0fe490 N/A:N/A SMASH Issue 315040 SMASH Issue 315365 bnc#1192869 https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog jsc#CAR-1324 rh#2023876 rh#2023881 rh#2023888 rh#2023891 rh#2023895 rh#2023900 rh#2023904 rh#2023912 rh#2023927 rh#2023929 rh#2023931 rh#2023933 rh#2023936 rh#2023938 |
CVE-2021-42377 | busybox:Released | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-42377 CVE-2021-42373 CVE-2021-42374 CVE-2021-42375 CVE-2021-42376 CVE-2021-42377 CVE-2021-42378 CVE-2021-42379 CVE-2021-42380 CVE-2021-42381 CVE-2021-42382 CVE-2021-42383 CVE-2021-42384 CVE-2021-42385 CVE-2021-42386 D:CVE-2021-42373 D:CVE-2021-42374 D:CVE-2021-42375 D:CVE-2021-42376 D:CVE-2021-42377 D:CVE-2021-42378 D:CVE-2021-42379 D:CVE-2021-42380 D:CVE-2021-42381 FEDORA:FEDORA-2021-5a95823596 FEDORA:FEDORA-2021-c52c0fe490 N/A:N/A SMASH Issue 315041 SMASH Issue 315365 bnc#1192869 https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog jsc#CAR-1324 rh#2023876 rh#2023881 rh#2023888 rh#2023891 rh#2023895 rh#2023900 rh#2023904 rh#2023912 rh#2023927 rh#2023929 rh#2023931 rh#2023933 rh#2023936 rh#2023938 |
CVE-2021-42378 | busybox:Released | moderate | 6.6 (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-42377 CVE-2021-42373 CVE-2021-42374 CVE-2021-42375 CVE-2021-42376 CVE-2021-42377 CVE-2021-42378 CVE-2021-42379 CVE-2021-42380 CVE-2021-42381 CVE-2021-42382 CVE-2021-42383 CVE-2021-42384 CVE-2021-42385 CVE-2021-42386 D:CVE-2021-42373 D:CVE-2021-42374 D:CVE-2021-42375 D:CVE-2021-42376 D:CVE-2021-42377 D:CVE-2021-42378 D:CVE-2021-42379 D:CVE-2021-42380 D:CVE-2021-42381 FEDORA:FEDORA-2021-5a95823596 FEDORA:FEDORA-2021-c52c0fe490 N/A:N/A SMASH Issue 315042 SMASH Issue 315365 bnc#1192869 https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog jsc#CAR-1324 rh#2023876 rh#2023881 rh#2023888 rh#2023891 rh#2023895 rh#2023900 rh#2023904 rh#2023912 rh#2023927 rh#2023929 rh#2023931 rh#2023933 rh#2023936 rh#2023938 |
CVE-2021-42379 | busybox:Released | moderate | 6.6 (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-42377 CVE-2021-42373 CVE-2021-42374 CVE-2021-42375 CVE-2021-42376 CVE-2021-42377 CVE-2021-42378 CVE-2021-42379 CVE-2021-42380 CVE-2021-42381 CVE-2021-42382 CVE-2021-42383 CVE-2021-42384 CVE-2021-42385 CVE-2021-42386 D:CVE-2021-42373 D:CVE-2021-42374 D:CVE-2021-42375 D:CVE-2021-42376 D:CVE-2021-42377 D:CVE-2021-42378 D:CVE-2021-42379 D:CVE-2021-42380 D:CVE-2021-42381 FEDORA:FEDORA-2021-5a95823596 FEDORA:FEDORA-2021-c52c0fe490 N/A:N/A SMASH Issue 315043 SMASH Issue 315365 bnc#1192869 https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog jsc#CAR-1324 rh#2023876 rh#2023881 rh#2023888 rh#2023891 rh#2023895 rh#2023900 rh#2023904 rh#2023912 rh#2023927 rh#2023929 rh#2023931 rh#2023933 rh#2023936 rh#2023938 |
CVE-2021-42380 | busybox:Released | moderate | 6.6 (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-42377 CVE-2021-42373 CVE-2021-42374 CVE-2021-42375 CVE-2021-42376 CVE-2021-42377 CVE-2021-42378 CVE-2021-42379 CVE-2021-42380 CVE-2021-42381 CVE-2021-42382 CVE-2021-42383 CVE-2021-42384 CVE-2021-42385 CVE-2021-42386 D:CVE-2021-42373 D:CVE-2021-42374 D:CVE-2021-42375 D:CVE-2021-42376 D:CVE-2021-42377 D:CVE-2021-42378 D:CVE-2021-42379 D:CVE-2021-42380 D:CVE-2021-42381 FEDORA:FEDORA-2021-5a95823596 FEDORA:FEDORA-2021-c52c0fe490 N/A:N/A SMASH Issue 315044 SMASH Issue 315365 bnc#1192869 https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog jsc#CAR-1324 rh#2023876 rh#2023881 rh#2023888 rh#2023891 rh#2023895 rh#2023900 rh#2023904 rh#2023912 rh#2023927 rh#2023929 rh#2023931 rh#2023933 rh#2023936 rh#2023938 |
CVE-2021-42381 | busybox:Released | moderate | 6.6 (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-42377 CVE-2021-42373 CVE-2021-42374 CVE-2021-42375 CVE-2021-42376 CVE-2021-42377 CVE-2021-42378 CVE-2021-42379 CVE-2021-42380 CVE-2021-42381 CVE-2021-42382 CVE-2021-42383 CVE-2021-42384 CVE-2021-42385 CVE-2021-42386 D:CVE-2021-42373 D:CVE-2021-42374 D:CVE-2021-42375 D:CVE-2021-42376 D:CVE-2021-42377 D:CVE-2021-42378 D:CVE-2021-42379 D:CVE-2021-42380 D:CVE-2021-42381 FEDORA:FEDORA-2021-5a95823596 FEDORA:FEDORA-2021-c52c0fe490 N/A:N/A SMASH Issue 315045 SMASH Issue 315365 bnc#1192869 https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog jsc#CAR-1324 rh#2023876 rh#2023881 rh#2023888 rh#2023891 rh#2023895 rh#2023900 rh#2023904 rh#2023912 rh#2023927 rh#2023929 rh#2023931 rh#2023933 rh#2023936 rh#2023938 |
CVE-2021-42382 | busybox:Released | moderate | 6.6 (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-42377 CVE-2021-42373 CVE-2021-42374 CVE-2021-42375 CVE-2021-42376 CVE-2021-42377 CVE-2021-42378 CVE-2021-42379 CVE-2021-42380 CVE-2021-42381 CVE-2021-42382 CVE-2021-42383 CVE-2021-42384 CVE-2021-42385 CVE-2021-42386 D:CVE-2021-42373 D:CVE-2021-42374 D:CVE-2021-42375 D:CVE-2021-42376 D:CVE-2021-42377 D:CVE-2021-42378 D:CVE-2021-42379 D:CVE-2021-42380 D:CVE-2021-42381 FEDORA:FEDORA-2021-5a95823596 FEDORA:FEDORA-2021-c52c0fe490 N/A:N/A SMASH Issue 315046 SMASH Issue 315365 bnc#1192869 https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog jsc#CAR-1324 rh#2023876 rh#2023881 rh#2023888 rh#2023891 rh#2023895 rh#2023900 rh#2023904 rh#2023912 rh#2023927 rh#2023929 rh#2023931 rh#2023933 rh#2023936 rh#2023938 |
CVE-2021-42383 | busybox:Released | moderate | 6.6 (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-42377 CVE-2021-42373 CVE-2021-42374 CVE-2021-42375 CVE-2021-42376 CVE-2021-42377 CVE-2021-42378 CVE-2021-42379 CVE-2021-42380 CVE-2021-42381 CVE-2021-42382 CVE-2021-42383 CVE-2021-42384 CVE-2021-42385 CVE-2021-42386 D:CVE-2021-42373 D:CVE-2021-42374 D:CVE-2021-42375 D:CVE-2021-42376 D:CVE-2021-42377 D:CVE-2021-42378 D:CVE-2021-42379 D:CVE-2021-42380 D:CVE-2021-42381 FEDORA:FEDORA-2021-5a95823596 FEDORA:FEDORA-2021-c52c0fe490 N/A:N/A SMASH Issue 315047 SMASH Issue 315365 bnc#1192869 https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog jsc#CAR-1324 rh#2023876 rh#2023881 rh#2023888 rh#2023891 rh#2023895 rh#2023900 rh#2023904 rh#2023912 rh#2023927 rh#2023929 rh#2023931 rh#2023933 rh#2023936 rh#2023938 |
CVE-2021-42384 | busybox:Released | moderate | 6.6 (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-42377 CVE-2021-42373 CVE-2021-42374 CVE-2021-42375 CVE-2021-42376 CVE-2021-42377 CVE-2021-42378 CVE-2021-42379 CVE-2021-42380 CVE-2021-42381 CVE-2021-42382 CVE-2021-42383 CVE-2021-42384 CVE-2021-42385 CVE-2021-42386 D:CVE-2021-42373 D:CVE-2021-42374 D:CVE-2021-42375 D:CVE-2021-42376 D:CVE-2021-42377 D:CVE-2021-42378 D:CVE-2021-42379 D:CVE-2021-42380 D:CVE-2021-42381 FEDORA:FEDORA-2021-5a95823596 FEDORA:FEDORA-2021-c52c0fe490 N/A:N/A SMASH Issue 315048 SMASH Issue 315365 bnc#1192869 https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog jsc#CAR-1324 rh#2023876 rh#2023881 rh#2023888 rh#2023891 rh#2023895 rh#2023900 rh#2023904 rh#2023912 rh#2023927 rh#2023929 rh#2023931 rh#2023933 rh#2023936 rh#2023938 |
CVE-2021-42385 | busybox:Released | moderate | 6.6 (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-42377 CVE-2021-42373 CVE-2021-42374 CVE-2021-42375 CVE-2021-42376 CVE-2021-42377 CVE-2021-42378 CVE-2021-42379 CVE-2021-42380 CVE-2021-42381 CVE-2021-42382 CVE-2021-42383 CVE-2021-42384 CVE-2021-42385 CVE-2021-42386 D:CVE-2021-42373 D:CVE-2021-42374 D:CVE-2021-42375 D:CVE-2021-42376 D:CVE-2021-42377 D:CVE-2021-42378 D:CVE-2021-42379 D:CVE-2021-42380 D:CVE-2021-42381 FEDORA:FEDORA-2021-5a95823596 FEDORA:FEDORA-2021-c52c0fe490 N/A:N/A SMASH Issue 315049 SMASH Issue 315365 bnc#1192869 https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog jsc#CAR-1324 rh#2023876 rh#2023881 rh#2023888 rh#2023891 rh#2023895 rh#2023900 rh#2023904 rh#2023912 rh#2023927 rh#2023929 rh#2023931 rh#2023933 rh#2023936 rh#2023938 |
CVE-2021-42386 | busybox:Released | moderate | 6.6 (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-42377 CVE-2021-42373 CVE-2021-42374 CVE-2021-42375 CVE-2021-42376 CVE-2021-42377 CVE-2021-42378 CVE-2021-42379 CVE-2021-42380 CVE-2021-42381 CVE-2021-42382 CVE-2021-42383 CVE-2021-42384 CVE-2021-42385 CVE-2021-42386 D:CVE-2021-42373 D:CVE-2021-42374 D:CVE-2021-42375 D:CVE-2021-42376 D:CVE-2021-42377 D:CVE-2021-42378 D:CVE-2021-42379 D:CVE-2021-42380 D:CVE-2021-42381 FEDORA:FEDORA-2021-5a95823596 FEDORA:FEDORA-2021-c52c0fe490 N/A:N/A SMASH Issue 315050 SMASH Issue 315365 bnc#1192869 https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog jsc#CAR-1324 rh#2023876 rh#2023881 rh#2023888 rh#2023891 rh#2023895 rh#2023900 rh#2023904 rh#2023912 rh#2023927 rh#2023929 rh#2023931 rh#2023933 rh#2023936 rh#2023938 |
CVE-2021-42574 | vim:Ignore | important | 8.3 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H) | CERT-VN:VU#999008 CVE-2021-42574 CVE-2021-42694 D:CVE-2021-42574 D:CVE-2021-42694 FEDORA:FEDORA-2021-0578e23912 FEDORA:FEDORA-2021-443139f67c FEDORA:FEDORA-2021-7ad3a01f6a GLSA-202210-09 MISC:blog.rust-lang.org:MLIST:[oss-security] 20211101 Trojan Source Attacks MISC:cwe.mitre.org:CVE-2021-42694 MISC:trojansource.codes:CVE-2021-42694 MISC:www.scyon.nl:CVE-2021-42694 MISC:www.starwindsoftware.com:CVE-2021-42574 MISC:www.unicode.org:CVE-2021-42574 MISC:www.unicode.org:CVE-2021-42694 MLIST:[oss-security] 20211101 CVE-2021-42574: rustc 1.56.0 and bidirectional-override codepoints in source code MLIST:[oss-security] 20211101 Re: CVE-2021-42574: rustc 1.56.0 and bidirectional-override codepoints in source code MLIST:[oss-security] 20211101 Trojan Source Attacks MLIST:[oss-security] 20211102 Re: CVE-2021-42574: rustc 1.56.0 and bidirectional-override codepoints in source code MLIST:[oss-security] 20211102 Re: Trojan Source Attacks OSS:2021/Q4/75 OSS:2021/Q4/80 RHSA-2021:4033 RHSA-2021:4034 RHSA-2021:4035 RHSA-2021:4036 RHSA-2021:4037 RHSA-2021:4038 RHSA-2021:4039 RHSA-2021:4585 RHSA-2021:4586 RHSA-2021:4587 RHSA-2021:4588 RHSA-2021:4589 RHSA-2021:4590 RHSA-2021:4591 RHSA-2021:4592 RHSA-2021:4593 RHSA-2021:4594 RHSA-2021:4595 RHSA-2021:4596 RHSA-2021:4598 RHSA-2021:4599 RHSA-2021:4600 RHSA-2021:4601 RHSA-2021:4602 RHSA-2021:4649 RHSA-2021:4669 RHSA-2021:4694 RHSA-2021:4723 RHSA-2021:4724 RHSA-2021:4729 RHSA-2021:4730 RHSA-2021:4743 SMASH Issue 312846 SMASH Issue 312847 bnc#1191820 bnc#1192244 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/ rh#2005819 rh#2015365 |
CVE-2021-42694 | vim:Ignore | important | () | CERT-VN:VU#999008 CVE-2021-42574 CVE-2021-42694 D:CVE-2021-42574 D:CVE-2021-42694 FEDORA:FEDORA-2021-0578e23912 FEDORA:FEDORA-2021-443139f67c FEDORA:FEDORA-2021-7ad3a01f6a GLSA-202210-09 MISC:blog.rust-lang.org:MLIST:[oss-security] 20211101 Trojan Source Attacks MISC:cwe.mitre.org:CVE-2021-42694 MISC:trojansource.codes:CVE-2021-42694 MISC:www.scyon.nl:CVE-2021-42694 MISC:www.starwindsoftware.com:CVE-2021-42574 MISC:www.unicode.org:CVE-2021-42574 MISC:www.unicode.org:CVE-2021-42694 MLIST:[oss-security] 20211101 CVE-2021-42574: rustc 1.56.0 and bidirectional-override codepoints in source code MLIST:[oss-security] 20211101 Re: CVE-2021-42574: rustc 1.56.0 and bidirectional-override codepoints in source code MLIST:[oss-security] 20211101 Trojan Source Attacks MLIST:[oss-security] 20211102 Re: CVE-2021-42574: rustc 1.56.0 and bidirectional-override codepoints in source code MLIST:[oss-security] 20211102 Re: Trojan Source Attacks OSS:2021/Q4/75 OSS:2021/Q4/80 RHSA-2021:4033 RHSA-2021:4034 RHSA-2021:4035 RHSA-2021:4036 RHSA-2021:4037 RHSA-2021:4038 RHSA-2021:4039 RHSA-2021:4585 RHSA-2021:4586 RHSA-2021:4587 RHSA-2021:4588 RHSA-2021:4589 RHSA-2021:4590 RHSA-2021:4591 RHSA-2021:4592 RHSA-2021:4593 RHSA-2021:4594 RHSA-2021:4595 RHSA-2021:4596 RHSA-2021:4598 RHSA-2021:4599 RHSA-2021:4600 RHSA-2021:4601 RHSA-2021:4602 RHSA-2021:4649 RHSA-2021:4669 RHSA-2021:4694 RHSA-2021:4723 RHSA-2021:4724 RHSA-2021:4729 RHSA-2021:4730 RHSA-2021:4743 SMASH Issue 312847 SMASH Issue 313459 bnc#1191820 bnc#1192244 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/ rh#2005819 rh#2015365 |
CVE-2021-42739 | kernel-source-rt:Released | important | 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-42739 CVE-2021-3542 CVE-2021-42739 D:CVE-2021-42739 DSA-5096 FEDORA:FEDORA-2021-7de33b7016 FEDORA:FEDORA-2021-8364530ebf FEDORA:FEDORA-2021-fdef34e26f MISC:git.kernel.org:CVE-2021-42739 MISC:lore.kernel.org:CVE-2021-42739 MISC:seclists.org:CVE-2021-42739 MISC:www.oracle.com:CVE-2022-21586 MISC:www.starwindsoftware.com:CVE-2021-42739 MLIST:[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update OSS:2021/07/22/1 OSS:2022/01/25/12 RHSA-2022:0063 RHSA-2022:0065 RHSA-2022:1975 RHSA-2022:1988 SMASH Issue 281716 SMASH Issue 313154 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1184673 bnc#1186063 bnc#1192036 https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ%40mwanda/ jsc#CAR-1185 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1951739 rh#1980646 rh#1997467 rh#2044561 rh#2053632 rh#2055502 rh#2059923 |
CVE-2021-43056 | kernel-source-rt:Released | moderate | 6.8 (CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H) | CVE-2021-43056 D:CVE-2021-43056 FEDORA:FEDORA-2021-4320606094 FEDORA:FEDORA-2021-4fed2b55c4 FEDORA:FEDORA-2021-ed8c2e1098 MISC:cdn.kernel.org:CVE-2021-43056 MISC:git.kernel.org:CVE-2021-43056 MISC:git.kernel.org:MLIST:[oss-security] 20211028 Re: Linux kernel: powerpc: KVM guest can trigger host crash on Power8 MISC:lore.kernel.org:CVE-2021-43056 MLIST:[oss-security] 20211028 Re: Linux kernel: powerpc: KVM guest can trigger host crash on Power8 OSS:2021/Q4/67 RHSA-2022:1988 SMASH Issue 313706 bnc#1192107 jsc#CAR-1225 rh#2017073 |
CVE-2021-43057 | kernel-source-rt:Not affected | important | () | CVE-2021-43057 D:CVE-2021-43057 MISC:bugs.chromium.org:CVE-2021-43057 MISC:cdn.kernel.org:CVE-2021-43057 MISC:git.kernel.org:CVE-2021-43057 SMASH Issue 313716 bnc#1192260 https://security.netapp.com/advisory/ntap-20211125-0001/ rh#2019163 |
CVE-2021-43085 | openssl:Not affected, openssl-1_1:Not affected | low | () | CVE-2021-43085 MISC:github.com:CVE-2021-43085 SMASH Issue 327184 bnc#1197505 rh#2069364 |
CVE-2021-43267 | kernel-source-rt:Not affected | critical | 9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-43267 CVE-2021-43267 FEDORA:FEDORA-2021-a093973910 FEDORA:FEDORA-2021-bdd146e463 MISC:cdn.kernel.org:CVE-2021-43267 MISC:github.com:CVE-2021-43267 OSS:2022/02/10/1 OSS:2022/Q1/130 RHSA-2021:4644 RHSA-2021:4645 RHSA-2021:4646 RHSA-2021:4647 RHSA-2021:4648 RHSA-2021:4650 RHSA-2021:4750 SMASH Issue 314118 bnc#1192341 linux.git:commit:271351d255b09e39c7f6437738cba595f9b235be linux.git:commit:9aa422ad326634b76309e8ff342c246800621216 rh#2020362 |
CVE-2021-43389 | kernel-source-rt:Released | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-3896 CVE-2021-43389 DSA-5096 MISC:cdn.kernel.org:CVE-2021-43056 MISC:git.kernel.org:CVE-2021-43389 MISC:lore.kernel.org:CVE-2021-43389 MISC:seclists.org:CVE-2021-43389 MISC:www.oracle.com:CVE-2022-21586 MLIST:[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update OSS:2021/07/22/1 OSS:2021/11/05/1 OSS:2021/Q4/100 OSS:2022/01/25/12 RHSA-2022:1975 RHSA-2022:1988 SMASH Issue 313334 SMASH Issue 314288 SMASH Issue 314326 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1191958 jsc#CAR-1227 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2013180 rh#2044561 rh#2053632 rh#2055502 rh#2059923 |
CVE-2021-43396 | glibc:Ignore | low | 3.7 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N) | CVE-2021-43396 MISC:blog.tuxcare.com:CVE-2021-43396 MISC:sourceware.org:CVE-2021-43396 MISC:www.oracle.com:CVE-2022-21586 SMASH Issue 314285 bnc#1192397 https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=ff012870b2c02a62598c04daa1e54632e020fd7d jsc#CAR-1233 rh#2020652 |
CVE-2021-43519 | lua53:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CVE-2021-43519 FEDORA:FEDORA-2022-473560d1a6 FEDORA:FEDORA-2022-e6b2bd5b50 MISC:lua-users.org:CVE-2021-43519 RHSA-2023:0957 RHSA-2023:1211 SMASH Issue 314538 bnc#1192613 jsc#CAR-1247 rh#2047672 |
CVE-2021-43527 | mozilla-nss:Released | important | 8.8 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:cert-portal.siemens.com:CVE-2021-43527 CONFIRM:security.netapp.com:CVE-2021-43527 CVE-2021-43527 D:CVE-2021-43527 DSA-5016 GLSA-202212-05 L3:68187 MISC:bugzilla.mozilla.org:CVE-2021-43527 MISC:ftp.mozilla.org:CVE-2021-43527 MISC:www.mozilla.org:CVE-2021-43527 MISC:www.mozilla.org:OSS:2021/Q4/138 MISC:www.oracle.com:CVE-2022-21498 MISC:www.starwindsoftware.com:CVE-2021-43527 OSS:2021/Q4/138 Oracle:CVE-2021-43527 RHSA-2021:4903 RHSA-2021:4904 RHSA-2021:4907 RHSA-2021:4909 RHSA-2021:4919 RHSA-2021:4932 RHSA-2021:4933 RHSA-2021:4946 RHSA-2021:4953 RHSA-2021:4954 RHSA-2021:4969 RHSA-2021:4994 RHSA-2021:5006 RHSA-2021:5035 SMASH Issue 315950 SMASH Issue 315951 bnc#1193170 jsc#CAR-1438 rh#2024370 rh#2088353 |
CVE-2021-43618 | gmp:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2021-43618 CVE-2021-43618 D:CVE-2021-43618 FULLDISC:20221016 Re: over 2000 packages depend on abort()ing libgmp MISC:gmplib.org:CVE-2021-43618 MLIST:[debian-lts-announce] 20211202 [SECURITY] [DLA 2837-1] gmp security update OSS:2022/10/13/3 OSS:2022/Q4/21 SMASH Issue 314975 bdo#994405 bnc#1192717 https://security.gentoo.org/glsa/202309-13 jsc#CAR-1251 rh#2024904 |
CVE-2021-43818 | python-lxml:Released | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N) | CONFIRM:github.com:CVE-2021-43818 CONFIRM:security.netapp.com:CVE-2021-43818 CVE-2021-43818 DSA-5043 FEDORA:FEDORA-2021-6e8fb79f90 FEDORA:FEDORA-2021-9f9e7c5c4f FEDORA:FEDORA-2022-7129fbaeed FEDORA:FEDORA-2022-96c79bf003 GLSA-202208-06 MISC:github.com:CVE-2021-43818 MISC:www.oracle.com:CVE-2022-21498 MISC:www.oracle.com:CVE-2022-21586 MLIST:[debian-lts-announce] 20211230 [SECURITY] [DLA 2871-1] lxml security update RHSA-2022:1664 RHSA-2022:1763 RHSA-2022:1764 RHSA-2022:1821 RHSA-2022:1932 RHSA-2022:5498 SMASH Issue 317292 bdo#1001885 bnc#1193752 jsc#CAR-1340 rh#2032569 |
CVE-2021-43975 | kernel-source:Released, kernel-source-azure:Released, kernel-source-rt:Released | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-43976 CVE-2021-43975 DSA-5096 FEDORA:FEDORA-2021-c09b851eb0 FEDORA:FEDORA-2021-eab8c5a263 MISC:git.kernel.org:CVE-2021-43975 MISC:lore.kernel.org:CVE-2021-43975 MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update OSS:2021/07/22/1 OSS:2022/01/25/12 SMASH Issue 315180 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1192845 jsc#CAR-1273 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2024989 rh#2044561 rh#2053632 rh#2055502 rh#2059923 |
CVE-2021-43976 | kernel-source:Released, kernel-source-azure:Released, kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2021-43976 CVE-2021-43976 DSA-5092 DSA-5096 FEDORA:FEDORA-2021-c09b851eb0 FEDORA:FEDORA-2021-eab8c5a263 MISC:patchwork.kernel.org:CVE-2021-43976 MISC:www.oracle.com:CVE-2022-21586 MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update OSS:2021/07/22/1 OSS:2022/01/25/12 RHSA-2022:1975 RHSA-2022:1988 SMASH Issue 315179 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1192847 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=04d80663f67ccef893061b49ec8a42ff7045ae84 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/ https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+%40Zekuns-MBP-16.fios-router.home/ jsc#CAR-1274 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2025003 rh#2044561 rh#2053632 rh#2055502 rh#2059923 |
CVE-2021-4439 | kernel-source-rt:Already fixed | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L) | CVE-2021-4439 SMASH Issue 411611 bnc#1226670 https://git.kernel.org/stable/c/1f3e2e97c003f80c4b087092b225c8787ff91e4d https://git.kernel.org/stable/c/24219a977bfe3d658687e45615c70998acdbac5a https://git.kernel.org/stable/c/285e9210b1fab96a11c0be3ed5cea9dd48b6ac54 https://git.kernel.org/stable/c/7d91adc0ccb060ce564103315189466eb822cc6a https://git.kernel.org/stable/c/7f221ccbee4ec662e2292d490a43ce6c314c4594 https://git.kernel.org/stable/c/9b6b2db77bc3121fe435f1d4b56e34de443bec75 https://git.kernel.org/stable/c/cc20226e218a2375d50dd9ac14fb4121b43375ff https://git.kernel.org/stable/c/e8b8de17e164c9f1b7777f1c6f99d05539000036 rh#2293302 |
CVE-2021-4440 | kernel-source-rt:Already fixed | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L) | CVE-2021-4440 SMASH Issue 412076 bnc#1227069 https://git.kernel.org/stable/c/1424ab4bb386df9cc590c73afa55f13e9b00dea2 rh#2294289 |
CVE-2021-44568 | libsolv:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CVE-2021-44568 CVE-2021-44569 CVE-2021-44570 CVE-2021-44571 CVE-2021-44573 CVE-2021-44574 CVE-2021-44575 CVE-2021-44576 CVE-2021-44577 FEDORA:FEDORA-2022-f8921a3891 MISC:github.com:CVE-2021-44568 MISC:github.com:CVE-2021-44569 MISC:github.com:CVE-2021-44570 MISC:github.com:CVE-2021-44571 MISC:github.com:CVE-2021-44573 MISC:github.com:CVE-2021-44574 MISC:github.com:CVE-2021-44575 MISC:github.com:CVE-2021-44576 MISC:github.com:CVE-2021-44577 RHSA-2022:5498 SMASH Issue 324458 SMASH Issue 324473 bnc#1196288 rh#2056775 rh#2056777 rh#2056780 rh#2056782 rh#2056783 rh#2056791 rh#2056792 rh#2056794 rh#2057178 |
CVE-2021-44569 | libsolv:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CVE-2021-44568 CVE-2021-44569 CVE-2021-44570 CVE-2021-44571 CVE-2021-44573 CVE-2021-44574 CVE-2021-44575 CVE-2021-44576 CVE-2021-44577 FEDORA:FEDORA-2022-f8921a3891 MISC:github.com:CVE-2021-44568 MISC:github.com:CVE-2021-44569 MISC:github.com:CVE-2021-44570 MISC:github.com:CVE-2021-44571 MISC:github.com:CVE-2021-44573 MISC:github.com:CVE-2021-44574 MISC:github.com:CVE-2021-44575 MISC:github.com:CVE-2021-44576 MISC:github.com:CVE-2021-44577 RHSA-2022:5498 SMASH Issue 324458 SMASH Issue 324465 bnc#1196288 rh#2056775 rh#2056777 rh#2056780 rh#2056782 rh#2056783 rh#2056791 rh#2056792 rh#2056794 rh#2057178 |
CVE-2021-44570 | libsolv:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CVE-2021-44568 CVE-2021-44569 CVE-2021-44570 CVE-2021-44571 CVE-2021-44573 CVE-2021-44574 CVE-2021-44575 CVE-2021-44576 CVE-2021-44577 FEDORA:FEDORA-2022-f8921a3891 MISC:github.com:CVE-2021-44568 MISC:github.com:CVE-2021-44569 MISC:github.com:CVE-2021-44570 MISC:github.com:CVE-2021-44571 MISC:github.com:CVE-2021-44573 MISC:github.com:CVE-2021-44574 MISC:github.com:CVE-2021-44575 MISC:github.com:CVE-2021-44576 MISC:github.com:CVE-2021-44577 RHSA-2022:5498 SMASH Issue 324458 SMASH Issue 324464 bnc#1196288 rh#2056775 rh#2056777 rh#2056780 rh#2056782 rh#2056783 rh#2056791 rh#2056792 rh#2056794 rh#2057178 |
CVE-2021-44571 | libsolv:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CVE-2021-44568 CVE-2021-44569 CVE-2021-44570 CVE-2021-44571 CVE-2021-44573 CVE-2021-44574 CVE-2021-44575 CVE-2021-44576 CVE-2021-44577 FEDORA:FEDORA-2022-f8921a3891 MISC:github.com:CVE-2021-44568 MISC:github.com:CVE-2021-44569 MISC:github.com:CVE-2021-44570 MISC:github.com:CVE-2021-44571 MISC:github.com:CVE-2021-44573 MISC:github.com:CVE-2021-44574 MISC:github.com:CVE-2021-44575 MISC:github.com:CVE-2021-44576 MISC:github.com:CVE-2021-44577 RHSA-2022:5498 SMASH Issue 324458 SMASH Issue 324463 bnc#1196288 rh#2056775 rh#2056777 rh#2056780 rh#2056782 rh#2056783 rh#2056791 rh#2056792 rh#2056794 rh#2057178 |
CVE-2021-44573 | libsolv:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CVE-2021-44568 CVE-2021-44569 CVE-2021-44570 CVE-2021-44571 CVE-2021-44573 CVE-2021-44574 CVE-2021-44575 CVE-2021-44576 CVE-2021-44577 FEDORA:FEDORA-2022-f8921a3891 MISC:github.com:CVE-2021-44568 MISC:github.com:CVE-2021-44569 MISC:github.com:CVE-2021-44570 MISC:github.com:CVE-2021-44571 MISC:github.com:CVE-2021-44573 MISC:github.com:CVE-2021-44574 MISC:github.com:CVE-2021-44575 MISC:github.com:CVE-2021-44576 MISC:github.com:CVE-2021-44577 RHSA-2022:5498 SMASH Issue 324458 SMASH Issue 324462 bnc#1196288 rh#2056775 rh#2056777 rh#2056780 rh#2056782 rh#2056783 rh#2056791 rh#2056792 rh#2056794 rh#2057178 |
CVE-2021-44574 | libsolv:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CVE-2021-44568 CVE-2021-44569 CVE-2021-44570 CVE-2021-44571 CVE-2021-44573 CVE-2021-44574 CVE-2021-44575 CVE-2021-44576 CVE-2021-44577 FEDORA:FEDORA-2022-f8921a3891 MISC:github.com:CVE-2021-44568 MISC:github.com:CVE-2021-44569 MISC:github.com:CVE-2021-44570 MISC:github.com:CVE-2021-44571 MISC:github.com:CVE-2021-44573 MISC:github.com:CVE-2021-44574 MISC:github.com:CVE-2021-44575 MISC:github.com:CVE-2021-44576 MISC:github.com:CVE-2021-44577 RHSA-2022:5498 SMASH Issue 324458 SMASH Issue 324461 bnc#1196288 rh#2056775 rh#2056777 rh#2056780 rh#2056782 rh#2056783 rh#2056791 rh#2056792 rh#2056794 rh#2057178 |
CVE-2021-44575 | libsolv:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CVE-2021-44568 CVE-2021-44569 CVE-2021-44570 CVE-2021-44571 CVE-2021-44573 CVE-2021-44574 CVE-2021-44575 CVE-2021-44576 CVE-2021-44577 FEDORA:FEDORA-2022-f8921a3891 MISC:github.com:CVE-2021-44568 MISC:github.com:CVE-2021-44569 MISC:github.com:CVE-2021-44570 MISC:github.com:CVE-2021-44571 MISC:github.com:CVE-2021-44573 MISC:github.com:CVE-2021-44574 MISC:github.com:CVE-2021-44575 MISC:github.com:CVE-2021-44576 MISC:github.com:CVE-2021-44577 RHSA-2022:5498 SMASH Issue 324458 SMASH Issue 324460 bnc#1196288 rh#2056775 rh#2056777 rh#2056780 rh#2056782 rh#2056783 rh#2056791 rh#2056792 rh#2056794 rh#2057178 |
CVE-2021-44576 | libsolv:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CVE-2021-44568 CVE-2021-44569 CVE-2021-44570 CVE-2021-44571 CVE-2021-44573 CVE-2021-44574 CVE-2021-44575 CVE-2021-44576 CVE-2021-44577 FEDORA:FEDORA-2022-f8921a3891 MISC:github.com:CVE-2021-44568 MISC:github.com:CVE-2021-44569 MISC:github.com:CVE-2021-44570 MISC:github.com:CVE-2021-44571 MISC:github.com:CVE-2021-44573 MISC:github.com:CVE-2021-44574 MISC:github.com:CVE-2021-44575 MISC:github.com:CVE-2021-44576 MISC:github.com:CVE-2021-44577 RHSA-2022:5498 SMASH Issue 324458 SMASH Issue 324459 bnc#1196288 rh#2056775 rh#2056777 rh#2056780 rh#2056782 rh#2056783 rh#2056791 rh#2056792 rh#2056794 rh#2057178 |
CVE-2021-44577 | libsolv:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CVE-2021-44568 CVE-2021-44569 CVE-2021-44570 CVE-2021-44571 CVE-2021-44573 CVE-2021-44574 CVE-2021-44575 CVE-2021-44576 CVE-2021-44577 FEDORA:FEDORA-2022-f8921a3891 MISC:github.com:CVE-2021-44568 MISC:github.com:CVE-2021-44569 MISC:github.com:CVE-2021-44570 MISC:github.com:CVE-2021-44571 MISC:github.com:CVE-2021-44573 MISC:github.com:CVE-2021-44574 MISC:github.com:CVE-2021-44575 MISC:github.com:CVE-2021-44576 MISC:github.com:CVE-2021-44577 RHSA-2022:5498 SMASH Issue 324458 bnc#1196288 rh#2056775 rh#2056777 rh#2056780 rh#2056782 rh#2056783 rh#2056791 rh#2056792 rh#2056794 rh#2057178 |
CVE-2021-44647 | lua53:Not affected | moderate | () | CVE-2021-44647 D:CVE-2021-44647 FEDORA:FEDORA-2022-473560d1a6 MISC:access.redhat.com:CVE-2021-44647 MISC:lua-users.org:CVE-2021-44647 SMASH Issue 320015 bnc#1194575 https://security.gentoo.org/glsa/202305-23 rh#2044415 |
CVE-2021-44733 | kernel-source-rt:Released | moderate | 4.2 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L) | CONFIRM:security.netapp.com:CVE-2021-45469 CVE-2021-44733 DSA-5096 MISC:git.kernel.org:CVE-2021-44733 MISC:github.com:CVE-2021-44733 MISC:lore.kernel.org:CVE-2021-44733 MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update OSS:2021/07/22/1 OSS:2022/01/25/12 RHSA-2022:1975 RHSA-2022:1988 SMASH Issue 317533 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1193767 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=dfd0743f1d9ea76931510ed150334d571fbab49d https://lore.kernel.org/lkml/20211215092501.1861229-1-jens.wiklander%40linaro.org/ jsc#CAR-1514 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2030747 rh#2044561 rh#2053632 rh#2055502 rh#2059923 |
CVE-2021-44879 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:cdn.kernel.org:CVE-2021-44879 CVE-2021-44879 MISC:bugzilla.kernel.org:OSS:2022/Q1/136 MISC:git.kernel.org:OSS:2022/Q1/136 MISC:lore.kernel.org:CVE-2021-44879 OSS:2022/Q1/136 SMASH Issue 323636 bnc#1195987 https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html https://lore.kernel.org/linux-f2fs-devel/20211206144421.3735-3-chao%40kernel.org/T/ jsc#CAR-1603 rh#2054135 |
CVE-2021-44964 | lua53:Not affected | important | 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-44964 MISC:github.com:CVE-2021-44964 MISC:lua-users.org:CVE-2021-44964 RHSA-2023:0957 RHSA-2023:1211 SMASH Issue 326197 bnc#1197165 rh#2064772 |
CVE-2021-45079 | strongswan:Released | moderate | 6.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L) | CVE-2021-45079 D:CVE-2021-45079 DSA-5056 MISC:www.strongswan.org:CVE-2021-45079 SMASH Issue 319785 SMASH Issue 319786 bnc#1194471 jsc#CAR-1388 rh#2042047 |
CVE-2021-45095 | kernel-source-rt:Released | moderate | 4.3 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) | CVE-2021-45095 D:CVE-2021-45095 DSA-5050 DSA-5096 MISC:git.kernel.org:CVE-2021-45095 MISC:github.com:CVE-2021-45095 MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update OSS:2021/07/22/1 OSS:2022/01/13/1 OSS:2022/01/25/12 SMASH Issue 317794 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bdo#996974 bnc#1193867 jsc#CAR-1509 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2035338 rh#2044561 rh#2053632 rh#2055502 rh#2059923 |
CVE-2021-45100 | kernel-source-rt:Not affected | important | () | CONFIRM:security.netapp.com:CVE-2021-45100 CVE-2021-45100 MISC:github.com:CVE-2021-45100 MISC:marc.info:CVE-2021-45100 SMASH Issue 317789 bnc#1193865 rh#2035345 |
CVE-2021-45346 | sqlite3:Ignore | low | 3.1 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N) | CONFIRM:security.netapp.com:CVE-2021-45346 CVE-2021-45346 D:CVE-2021-45346 MISC:github.com:CVE-2021-45346 MISC:sqlite.org:CVE-2021-45346 MISC:www.sqlite.org:CVE-2021-45346 SMASH Issue 323752 bnc#1196611 rh#2054793 |
CVE-2021-45402 | kernel-source-rt:Not affected | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L) | CVE-2021-45402 MISC:git.kernel.org:CVE-2021-45402 SMASH Issue 323625 bnc#1196130 rh#2054865 |
CVE-2021-45469 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-45469 CVE-2021-45469 DSA-5050 DSA-5096 FEDORA:FEDORA-2021-a7a558062e FEDORA:FEDORA-2021-c387682aa1 MISC:bugzilla.kernel.org:CVE-2021-45469 MISC:git.kernel.org:CVE-2021-45469 MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update OSS:2021/07/22/1 OSS:2021/12/25/1 OSS:2021/Q4/179 OSS:2022/01/13/1 OSS:2022/01/25/12 SMASH Issue 318807 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bdo#996974 bnc#1194060 bnc#1194462 jsc#CAR-1381 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2035817 rh#2044561 rh#2053632 rh#2055502 rh#2059923 |
CVE-2021-45480 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-45480 DSA-5050 DSA-5096 MISC:cdn.kernel.org:CVE-2021-45480 MISC:github.com:CVE-2021-45480 MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update OSS:2021/07/22/1 OSS:2022/01/13/1 OSS:2022/01/25/12 SMASH Issue 318830 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bdo#996974 bnc#1194090 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2035946 rh#2044561 rh#2053632 rh#2055502 rh#2059923 |
CVE-2021-45485 | kernel-source:Released, kernel-source-azure:Released, kernel-source-rt:Released | low | 3.7 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N) | CONFIRM:security.netapp.com:CVE-2021-45485 CVE-2021-45485 D:CVE-2021-45485 MISC:arxiv.org:CVE-2021-45489 MISC:cdn.kernel.org:CVE-2021-38205 MISC:git.kernel.org:CVE-2021-45485 MISC:www.oracle.com:CVE-2022-21586 RHSA-2022:1975 RHSA-2022:1988 RHSA-2022:6983 RHSA-2022:6991 SMASH Issue 318835 bnc#1194094 jsc#CAR-1396 rh#2039911 |
CVE-2021-45486 | kernel-source:Released, kernel-source-azure:Released, kernel-source-rt:Released | low | 3.7 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N) | CVE-2021-45486 D:CVE-2021-45486 MISC:arxiv.org:CVE-2021-45489 MISC:cdn.kernel.org:CVE-2021-33034 MISC:git.kernel.org:CVE-2021-45486 MISC:www.oracle.com:CVE-2022-21586 RHSA-2022:1975 RHSA-2022:1988 RHSA-2022:6983 RHSA-2022:6991 SMASH Issue 318834 bnc#1194087 jsc#CAR-1367 rh#2039914 |
CVE-2021-45868 | kernel-source-rt:Released | moderate | 5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2021-45868 CVE-2021-45868 D:CVE-2021-45868 L3:66496 L3:67104 MISC:bugzilla.kernel.org:CVE-2021-45868 MISC:cdn.kernel.org:CVE-2021-45868 MISC:git.kernel.org:CVE-2021-45868 MISC:git.kernel.org:OSS:2022/03/17/2 MISC:oss-security.openwall.org:MLIST:[oss-security] 20210504 21Nails: Multiple vulnerabilities in Exim OSS:2022/03/17/1 OSS:2022/03/17/2 SMASH Issue 326638 bnc#1197366 jsc#CAR-1682 rh#2065662 |
CVE-2021-45960 | expat:Released | moderate | 6.4 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H) | CONFIRM:security.netapp.com:CVE-2021-45960 CONFIRM:www.tenable.com:CVE-2022-23990 CVE-2021-45960 DSA-5073 GLSA-202209-24 MISC:bugzilla.mozilla.org:CVE-2021-45960 MISC:cert-portal.siemens.com:CVE-2022-32262 MISC:github.com:CVE-2021-45960 OSS:2022/01/17/3 Oracle:CVE-2022-23990 RHSA-2022:0951 RHSA-2022:1069 RHSA-2022:7144 SMASH Issue 319382 bdo#1002994 bdo#1003474 bnc#1194251 jsc#CAR-1359 rh#2044451 rh#2044455 rh#2044457 rh#2044464 rh#2044467 rh#2044479 rh#2044484 rh#2044488 rh#2044613 rh#2048356 |
CVE-2021-45985 | lua53:Not affected | moderate | 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-45985 D:CVE-2021-45985 SMASH Issue 362875 bnc#1210274 http://lua-users.org/lists/lua-l/2021-12/msg00019.html https://github.com/lua/lua/commit/cf613cdc6fa367257fc61c256f63d917350858b5 https://www.lua.org/bugs.html#5.4.3-11 rh#2185579 |
CVE-2021-46059 | vim:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CVE-2021-46059 MISC:huntr.dev:CVE-2021-46059 OSS:2022/Q1/40 SMASH Issue 319842 bnc#1194556 jsc#CAR-1395 rh#2039850 |
CVE-2021-46143 | expat:Released | important | 8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2021-46143 CONFIRM:www.tenable.com:CVE-2022-23990 CVE-2021-46143 D:CVE-2021-46143 DSA-5073 GLSA-202209-24 MISC:cert-portal.siemens.com:CVE-2022-32262 MISC:github.com:CVE-2021-46143 OSS:2022/01/17/3 Oracle:CVE-2022-23990 RHSA-2022:0951 RHSA-2022:1069 RHSA-2022:7144 RHSA-2022:7692 SMASH Issue 319700 bdo#1002994 bdo#1003474 bnc#1194362 jsc#CAR-1372 rh#2044451 rh#2044455 rh#2044457 rh#2044464 rh#2044467 rh#2044479 rh#2044484 rh#2044488 rh#2044613 rh#2048356 |
CVE-2021-46195 | binutils:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CVE-2021-46195 MISC:gcc.gnu.org:CVE-2021-46195 RHSA-2022:8415 SMASH Issue 320483 bnc#1194783 rh#2046300 |
CVE-2021-46283 | kernel-source-rt:Not affected | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-46283 DSA-5096 MISC:cdn.kernel.org:CVE-2021-38207 MISC:git.kernel.org:CVE-2021-46283 MISC:syzkaller.appspot.com:CVE-2021-46283 OSS:2021/07/22/1 OSS:2022/01/25/12 SMASH Issue 319976 SMASH Issue 320048 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1194518 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2039811 rh#2044561 rh#2053632 rh#2059923 |
CVE-2021-46778 | kernel-source-rt:Ignore | moderate | 5.3 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N) | CVE-2021-46778 MISC:www.amd.com:CVE-2021-46778 SMASH Issue 339296 bnc#1202291 rh#2114996 |
CVE-2021-46828 | libtirpc:Released | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2021-46828 CVE-2021-46828 D:CVE-2021-46828 DSA-5200 GLSA-202210-33 L3:63849 L3:64826 L3:65541 MISC:git.linux-nfs.org:CVE-2021-46828 MLIST:[debian-lts-announce] 20220812 [SECURITY] [DLA 3071-1] libtirpc security update RHBA-2022:2065 RHSA-2022:8400 SMASH Issue 337821 SMASH Issue 337822 bdo#1015873 bnc#1201680 bnc#1201970 jsc#CAR-1917 rh#2109352 |
CVE-2021-46848 | libtasn1:Released | critical | 9.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2021-46848 CVE-2021-46848 FEDORA:FEDORA-2022-061f857481 FEDORA:FEDORA-2022-19056934a7 FEDORA:FEDORA-2022-3c933ffaca FEDORA:FEDORA-2022-3f9ee1ad91 L3:64548 L3:64601 L3:65170 MISC:bugs.gentoo.org:CVE-2021-46848 MISC:gitlab.com:CVE-2021-46848 MLIST:[debian-lts-announce] 20230109 [SECURITY] [DLA 3263-1] libtasn1-6 security update Oracle:CVE-2021-46848 RHSA-2023:0116 RHSA-2023:0343 SMASH Issue 346096 bnc#1204690 jsc#CAR-2143 rh#2140058 |
CVE-2021-46905 | kernel-source-rt:Not affected | low | 4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-46905 SMASH Issue 395120 bnc#1220418 https://git.kernel.org/stable/c/0c71d4c89559f72cec2592d078681a843bce570e https://git.kernel.org/stable/c/0f000005da31f6947f843ce6b3e3a960540c6e00 https://git.kernel.org/stable/c/24b699bea7553fc0b98dad9d864befb6005ac7f1 https://git.kernel.org/stable/c/2ad5692db72874f02b9ad551d26345437ea4f7f3 https://git.kernel.org/stable/c/41c44e1f3112d7265dae522c026399b2a42d19ef https://git.kernel.org/stable/c/5871761c5f0f20d6e98bf3b6bd7486d857589554 https://git.kernel.org/stable/c/5c17cfe155d21954b4c7e2a78fa771cebcd86725 https://git.kernel.org/stable/c/90642ee9eb581a13569b1c0bd57e85d962215273 https://git.kernel.org/stable/c/d7fad2ce15bdbbd0fec3ebe999fd7cab2267f53e rh#2266253 |
CVE-2021-46907 | kernel-source-rt:Not affected | low | 0 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N) | CVE-2021-46907 SMASH Issue 395251 bnc#1220422 https://git.kernel.org/stable/c/04c4f2ee3f68c9a4bf1653d15f1a9a435ae33f7a https://git.kernel.org/stable/c/7f64753835a78c7d2cc2932a5808ef3b7fd4c050 https://git.kernel.org/stable/c/ce541d7b59566a0d94c7c99bfb5d34b050e6af70 rh#2266406 |
CVE-2021-46908 | kernel-source-rt:Not affected | moderate | 5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N) | CVE-2021-46908 SMASH Issue 395252 bnc#1220425 https://git.kernel.org/stable/c/4ccdc6c6cae38b91c871293fb0ed8c6845a61b51 https://git.kernel.org/stable/c/4f3ff11204eac0ee23acf64deecb3bad7b0db0c6 https://git.kernel.org/stable/c/9601148392520e2e134936e76788fc2a6371e7be rh#2266407 |
CVE-2021-46909 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-46909 SMASH Issue 395253 bnc#1220442 https://git.kernel.org/stable/c/1fc087fdb98d556b416c82ed6e3964a30885f47a https://git.kernel.org/stable/c/2643da6aa57920d9159a1a579fb04f89a2b0d29a https://git.kernel.org/stable/c/30e3b4f256b4e366a61658c294f6a21b8626dda7 https://git.kernel.org/stable/c/532747fd5c7aaa17ee5cf79f3e947c31eb0e35cf https://git.kernel.org/stable/c/871b569a3e67f570df9f5ba195444dc7c621293b https://git.kernel.org/stable/c/c3efce8cc9807339633ee30e39882f4c8626ee1d jsc#CAR-3143 rh#2266408 |
CVE-2021-46910 | kernel-source-rt:Not affected | moderate | () | CVE-2021-46910 SMASH Issue 395254 bnc#1220446 https://git.kernel.org/stable/c/5965ac11b1d5fcb38464728931649cd9df79c7c9 https://git.kernel.org/stable/c/d624833f5984d484c5e3196f34b926f9e71dafee rh#2266414 |
CVE-2021-46911 | kernel-source-rt:Not affected | moderate | 5.3 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H) | CVE-2021-46911 SMASH Issue 395255 bnc#1220400 https://git.kernel.org/stable/c/1a73e427b824133940c2dd95ebe26b6dce1cbf10 https://git.kernel.org/stable/c/8348665d4181c68b0ca1205b48e1753d78bc810f https://git.kernel.org/stable/c/8d5a9dbd2116a852f8f0f91f6fbc42a0afe1091f rh#2266422 |
CVE-2021-46912 | kernel-source-rt:Not affected | moderate | () | CVE-2021-46912 SMASH Issue 395256 bnc#1220461 https://git.kernel.org/stable/c/1ccdf1bed140820240e383ba0accc474ffc7f006 https://git.kernel.org/stable/c/35d7491e2f77ce480097cabcaf93ed409e916e12 https://git.kernel.org/stable/c/97684f0970f6e112926de631fdd98d9693c7e5c1 rh#2266421 |
CVE-2021-46913 | kernel-source-rt:Not affected | moderate | () | CVE-2021-46913 SMASH Issue 395257 bnc#1220462 https://git.kernel.org/stable/c/47d8de3c226574a3ddb8b87d0c152028d1bafef4 https://git.kernel.org/stable/c/4d8f9065830e526c83199186c5f56a6514f457d2 https://git.kernel.org/stable/c/e51ff3ffc316377cca21de8b80404eed0c37b3c3 rh#2266386 |
CVE-2021-46914 | kernel-source-rt:Not affected | moderate | 4.3 (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-46914 SMASH Issue 395258 bnc#1220465 https://git.kernel.org/stable/c/be07581aacae7cd0a073afae8e8862032f794309 https://git.kernel.org/stable/c/debb9df311582c83fe369baa35fa4b92e8a9c58a https://git.kernel.org/stable/c/f1b4be4a753caa4056496f679d70550d0c11a264 rh#2266427 |
CVE-2021-46916 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-46916 SMASH Issue 395260 bnc#1220435 https://git.kernel.org/stable/c/31166efb1cee348eb6314e9c0095d84cbeb66b9d https://git.kernel.org/stable/c/758d19098df4b0bbca9f40d6ae6c82c9c18b9bba rh#2266371 |
CVE-2021-46917 | kernel-source-rt:Not affected | low | 3.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L) | CVE-2021-46917 SMASH Issue 395261 bnc#1220432 https://git.kernel.org/stable/c/e5eb9757fe4c2392e069246ae78badc573af1833 https://git.kernel.org/stable/c/ea9aadc06a9f10ad20a90edc0a484f1147d88a7a https://git.kernel.org/stable/c/f7dc8f5619165e1fa3383d0c2519f502d9e2a1a9 rh#2266376 |
CVE-2021-46918 | kernel-source-rt:Not affected | moderate | () | CVE-2021-46918 SMASH Issue 395262 bnc#1220429 https://git.kernel.org/stable/c/6df0e6c57dfc064af330071f372f11aa8c584997 https://git.kernel.org/stable/c/c84b8982d7aa9b4717dc36a1c6cbc93ee153b500 rh#2266373 |
CVE-2021-46919 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-46919 SMASH Issue 395263 bnc#1220414 https://git.kernel.org/stable/c/05b7791c4c4aa8304368fdc55ae911f6b34e7281 https://git.kernel.org/stable/c/0fff71c5a311e1264988179f7dcc217fda15fadd https://git.kernel.org/stable/c/4ecf25595273203010bc8318c4aee60ad64037ae rh#2266397 |
CVE-2021-46920 | kernel-source-rt:Not affected | low | 1.9 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-46920 SMASH Issue 395264 bnc#1220426 https://git.kernel.org/stable/c/02981a44a0e402089775416371bd2e0c935685f8 https://git.kernel.org/stable/c/a5ad12d5d69c63af289a37f05187a0c6fe93553d https://git.kernel.org/stable/c/ea941ac294d75d0ace50797aebf0056f6f8f7a7f rh#2266398 |
CVE-2021-46922 | kernel-source-rt:Not affected | moderate | () | CVE-2021-46922 SMASH Issue 395277 bnc#1220475 https://git.kernel.org/stable/c/39c8d760d44cb3fa0d67e8cd505df81cf4d80999 https://git.kernel.org/stable/c/9d5171eab462a63e2fbebfccf6026e92be018f20 https://git.kernel.org/stable/c/bf84ef2dd2ccdcd8f2658476d34b51455f970ce4 rh#2266457 |
CVE-2021-46923 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) | CVE-2021-46923 SMASH Issue 395278 bnc#1220457 https://git.kernel.org/stable/c/012e332286e2bb9f6ac77d195f17e74b2963d663 https://git.kernel.org/stable/c/47b5d0a7532d39e42a938f81e3904268145c341d rh#2266312 |
CVE-2021-46926 | kernel-source-rt:Not affected | moderate | () | CVE-2021-46926 SMASH Issue 395281 bnc#1220478 https://git.kernel.org/stable/c/385f287f9853da402d94278e59f594501c1d1dad https://git.kernel.org/stable/c/cce476954401e3421afafb25bbaa926050688b1d rh#2266370 |
CVE-2021-46927 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-46927 SMASH Issue 395282 bnc#1220443 https://git.kernel.org/stable/c/3a0152b219523227c2a62a0a122cf99608287176 https://git.kernel.org/stable/c/90d2beed5e753805c5eab656b8d48257638fe543 rh#2266365 |
CVE-2021-46928 | kernel-source-rt:Not affected | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-46928 SMASH Issue 395283 bnc#1220480 https://git.kernel.org/stable/c/484730e5862f6b872dca13840bed40fd7c60fa26 https://git.kernel.org/stable/c/d01e9ce1af6116f812491d3d3873d204f10ae0b8 https://git.kernel.org/stable/c/e96373f0a5f484bc1e193f9951dcb3adf24bf3f7 rh#2266453 |
CVE-2021-46929 | kernel-source-rt:Already fixed | important | 7.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) | CVE-2021-46929 L3:68095 L3:68137 SMASH Issue 395284 bnc#1220482 bnc#1222400 https://git.kernel.org/stable/c/5ec7d18d1813a5bead0b495045606c93873aecbb https://git.kernel.org/stable/c/75799e71df1da11394740b43ae5686646179561d https://git.kernel.org/stable/c/769d14abd35e0e153b5149c3e1e989a9d719e3ff https://git.kernel.org/stable/c/831de271452b87657fcf8d715ee20519b79caef5 https://git.kernel.org/stable/c/8873140f95d4977bf37e4cf0d5c5e3f6e34cdd3e https://git.kernel.org/stable/c/af6e6e58f7ebf86b4e7201694b1e4f3a62cbc3ec rh#2266357 |
CVE-2021-46931 | kernel-source-rt:Not affected | moderate | 6.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-46931 SMASH Issue 395286 bnc#1220486 https://git.kernel.org/stable/c/07f13d58a8ecc3baf9a488588fb38c5cb0db484f https://git.kernel.org/stable/c/73665165b64a8f3c5b3534009a69be55bb744f05 https://git.kernel.org/stable/c/918fc3855a6507a200e9cf22c20be852c0982687 rh#2266337 |
CVE-2021-46933 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L) | CVE-2021-46933 SMASH Issue 395288 bnc#1220487 https://git.kernel.org/stable/c/1c4ace3e6b8575745c50dca9e76e0021e697d645 https://git.kernel.org/stable/c/240fc586e83d645912accce081a48aa63a45f6ee https://git.kernel.org/stable/c/33f6a0cbb7772146e1c11f38028fffbfed14728b https://git.kernel.org/stable/c/52500239e3f2d6fc77b6f58632a9fb98fe74ac09 https://git.kernel.org/stable/c/b1e0887379422975f237d43d8839b751a6bcf154 https://git.kernel.org/stable/c/cc8c8028c21b2a3842a1e98e99e55028df275919 https://git.kernel.org/stable/c/ebef2aa29f370b5096c16020c104e393192ef684 https://git.kernel.org/stable/c/f976dd7011150244a7ba820f2c331e9fb253befa rh#2266448 |
CVE-2021-46935 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-46935 SMASH Issue 395290 bnc#1220438 https://git.kernel.org/stable/c/103b16a8c51f96d5fe063022869ea906c256e5da https://git.kernel.org/stable/c/17691bada6b2f1d5f1c0f6d28cd9d0727023b0ff https://git.kernel.org/stable/c/1cb8444f3114f0bb2f6e3bcadcf09aa4a28425d4 https://git.kernel.org/stable/c/2d2df539d05205fd83c404d5f2dff48d36f9b495 https://git.kernel.org/stable/c/7c7064402609aeb6fb11be1b4ec10673ff17b593 https://git.kernel.org/stable/c/cfd0d84ba28c18b531648c9d4a35ecca89ad9901 rh#2266436 |
CVE-2021-46937 | kernel-source-rt:Not affected | moderate | () | CVE-2021-46937 SMASH Issue 395292 bnc#1220488 https://git.kernel.org/stable/c/ebb3f994dd92f8fb4d70c7541091216c1e10cb71 https://git.kernel.org/stable/c/ffe4a1ba1a82c416a6b3a09d46594f6a885ae141 rh#2266378 |
CVE-2021-46938 | kernel-source-rt:Not affected | important | () | CVE-2021-46938 SMASH Issue 395345 bnc#1220554 https://git.kernel.org/stable/c/1cb02dc76f4c0a2749a02b26469512d6984252e9 https://git.kernel.org/stable/c/6086f957416a6e87236c06079fcaba7a3998aeca https://git.kernel.org/stable/c/772b9f59657665af3b68d24d12b9d172d31f0dfb https://git.kernel.org/stable/c/8ae0185255eaf05bd66f4215c81e99bf01140fd9 https://git.kernel.org/stable/c/8e947c8f4a5620df77e43c9c75310dc510250166 https://git.kernel.org/stable/c/a992a283c0b77d0a7c2c348add0e6a21fb1dab67 https://git.kernel.org/stable/c/b42c0a33dfdd451d9be62dd5de58c39f2750b6e3 https://git.kernel.org/stable/c/d757bf4c69cda3c3ab7f775dfabbf5a80e2f6f9d rh#2266499 |
CVE-2021-46939 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-46939 SMASH Issue 395346 bnc#1220580 https://git.kernel.org/stable/c/1fca00920327be96f3318224f502e4d5460f9545 https://git.kernel.org/stable/c/2a1bd74b8186d7938bf004f5603f25b84785f63e https://git.kernel.org/stable/c/6e2418576228eeb12e7ba82edb8f9500623942ff https://git.kernel.org/stable/c/859b47a43f5a0e5b9a92b621dc6ceaad39fb5c8b https://git.kernel.org/stable/c/91ca6f6a91f679c8645d7f3307e03ce86ad518c4 https://git.kernel.org/stable/c/a33614d52e97fc8077eb0b292189ca7d964cc534 https://git.kernel.org/stable/c/aafe104aa9096827a429bc1358f8260ee565b7cc https://git.kernel.org/stable/c/c64da3294a7d59a4bf6874c664c13be892f15f44 https://git.kernel.org/stable/c/d43d56dbf452ccecc1ec735cd4b6840118005d7c rh#2266497 |
CVE-2021-46940 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-46940 SMASH Issue 395347 bnc#1220624 https://git.kernel.org/stable/c/13a779de4175df602366d129e41782ad7168cef0 https://git.kernel.org/stable/c/337b1546cde87fb8588ddaedf0201b769baa572a https://git.kernel.org/stable/c/dbdf22fc825fdb1d97f23230064e0f9819471628 https://git.kernel.org/stable/c/ea6803ff2cd1a2d7d880256bf562172b708a76ff rh#2266494 |
CVE-2021-46942 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-46942 SMASH Issue 395349 bnc#1220602 https://git.kernel.org/stable/c/734551df6f9bedfbefcd113ede665945e9de0b99 https://git.kernel.org/stable/c/cb5e0b3d0f993a6268c1a2c7ede2f9aa0c17ef68 rh#2266507 |
CVE-2021-46943 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-46943 SMASH Issue 395350 bnc#1220583 https://git.kernel.org/stable/c/34892ea938387d83ffcfb7775ec55f0f80767916 https://git.kernel.org/stable/c/6fb617e37a39db0a3eca4489431359d0bdf3b9bc https://git.kernel.org/stable/c/a03fb1e8a110658215a4cefc3e2ad53279e496a6 https://git.kernel.org/stable/c/ad91849996f9dd79741a961fd03585a683b08356 https://git.kernel.org/stable/c/c6b81b897f6f9445d57f8d47c4e060ec21556137 rh#2266490 |
CVE-2021-46944 | kernel-source-rt:Already fixed | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-46944 SMASH Issue 395351 bnc#1220566 https://git.kernel.org/stable/c/14d0e99c3ef6b0648535a31bf2eaabb4eff97b9e https://git.kernel.org/stable/c/3630901933afba1d16c462b04d569b7576339223 https://git.kernel.org/stable/c/517f6f570566a863c2422b843c8b7d099474f6a9 https://git.kernel.org/stable/c/74ba0adb5e983503b18a96121d965cad34ac7ce3 https://git.kernel.org/stable/c/ff792ae52005c85a2d829c153e08d99a356e007d rh#2266488 |
CVE-2021-46945 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L) | CVE-2021-46945 SMASH Issue 395352 bnc#1220504 https://git.kernel.org/stable/c/1e9ea8f4637026b8e965128953f2da061ccae9c4 https://git.kernel.org/stable/c/64e1eebe2131183174f4fbb6b1491355f96c6cde https://git.kernel.org/stable/c/ac2f7ca51b0929461ea49918f27c11b680f28995 rh#2266486 |
CVE-2021-46946 | kernel-source-rt:Ignore | low | 0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N) | CVE-2021-46946 SMASH Issue 395353 bnc#1220636 https://git.kernel.org/stable/c/098b257563b959f4ca6c1d82fde0ee727792cb19 https://git.kernel.org/stable/c/539ba4ebc467260225898e67ea53cbb73308f894 https://git.kernel.org/stable/c/7687f5aba0f50c7ff8040e506bae184e59c8e7b8 https://git.kernel.org/stable/c/9c61387630a54e35b96a90608aafd369ffb86f39 https://git.kernel.org/stable/c/a149d2a5cabbf6507a7832a1c4fd2593c55fd450 https://git.kernel.org/stable/c/d2e121be8d318524a61e13ca15b5bfab2d0b63c7 https://git.kernel.org/stable/c/e18d76a12b34791bc0318a0e0c0fa5863cd8dabf https://git.kernel.org/stable/c/e70db6e43286a17c3dfc840fcee662de183b6a81 https://git.kernel.org/stable/c/f42789ee5f96743cdb5f69445cab3609458733f7 rh#2266484 |
CVE-2021-46947 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-46947 SMASH Issue 395354 bnc#1220614 https://git.kernel.org/stable/c/99ba0ea616aabdc8e26259fd722503e012199a76 https://git.kernel.org/stable/c/ebeac958b690123a0b40aa61f688f2f170035fad rh#2266481 |
CVE-2021-46948 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-46948 SMASH Issue 395355 bnc#1220642 https://git.kernel.org/stable/c/35c7a83ad1bb1d48ae249346e61b1132bcbf9052 https://git.kernel.org/stable/c/83b09a1807415608b387c7bc748d329fefc5617e https://git.kernel.org/stable/c/bf2b941d0a6f2d3b9f5fa3c4c21bdd54f71ce253 https://git.kernel.org/stable/c/e531db1ea6f98c9612cb2de093a107c7eadfb96c rh#2266479 |
CVE-2021-46949 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-46949 SMASH Issue 395356 bnc#1220645 https://git.kernel.org/stable/c/5b1faa92289b53cad654123ed2bc8e10f6ddd4ac https://git.kernel.org/stable/c/98d91180748986bfb6dfb3e72765f3225719a647 https://git.kernel.org/stable/c/a1570985ec04116cc665b760faf666a104154170 https://git.kernel.org/stable/c/fb791572d6747ef385f628450f8d57cd132e6e5a rh#2266477 |
CVE-2021-46950 | kernel-source-rt:Already fixed | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N) | CVE-2021-46950 SMASH Issue 395357 bnc#1220662 https://git.kernel.org/stable/c/12216d0919b64ee2ea5dc7a50e455670f44383d5 https://git.kernel.org/stable/c/2417b9869b81882ab90fd5ed1081a1cb2d4db1dd https://git.kernel.org/stable/c/538244fba59fde17186322776247cd9c05be86dd https://git.kernel.org/stable/c/59452e551784b7a57a45d971727e9db63b192515 https://git.kernel.org/stable/c/661061a45e32d8b2cc0e306da9f169ad44011382 https://git.kernel.org/stable/c/6920cef604fa57f9409e3960413e9cc11f5c5a40 https://git.kernel.org/stable/c/a6e17cab00fc5bf85472434c52ac751426257c6f rh#2266504 |
CVE-2021-46951 | kernel-source-rt:Already fixed | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-46951 SMASH Issue 395358 bnc#1220615 https://git.kernel.org/stable/c/2f12258b5224cfaa808c54fd29345f3c1cbfca76 https://git.kernel.org/stable/c/3818b753277f5ca0c170bf5b98e0a5a225542fcb https://git.kernel.org/stable/c/48cff270b037022e37835d93361646205ca25101 https://git.kernel.org/stable/c/60a01ecc9f68067e4314a0b55148e39e5d58a51b https://git.kernel.org/stable/c/ac07c557ca12ec9276c0375517bac7ae5be4e50c rh#2266475 |
CVE-2021-46952 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-46952 SMASH Issue 395359 bnc#1220600 https://git.kernel.org/stable/c/2f3380121d49e829fb73ba86240c181bc32ad897 https://git.kernel.org/stable/c/3d0163821c035040a46d816a42c0780f0f0a30a8 https://git.kernel.org/stable/c/96fa26b74cdcf9f5c98996bf36bec9fb5b19ffe2 https://git.kernel.org/stable/c/c09f11ef35955785f92369e25819bf0629df2e59 rh#2266510 |
CVE-2021-46953 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-46953 SMASH Issue 395360 bnc#1220599 https://git.kernel.org/stable/c/1ecd5b129252249b9bc03d7645a7bda512747277 https://git.kernel.org/stable/c/42e69521ee1fa5abf21f478d147d06bbfe6bf6a8 https://git.kernel.org/stable/c/504632a3577a049dd9bb7aabae5b4476f9c586b4 https://git.kernel.org/stable/c/596e079c362ac17ed02aa1b99fdc444d62072a01 https://git.kernel.org/stable/c/7b2162db1498c71962a4bb2f776fa4e76d4d305b https://git.kernel.org/stable/c/c3385a9122f8db15b453e07bfc88117fce7f3724 https://git.kernel.org/stable/c/e0f2d86481eaa83df33b0793f75212919db7a19d rh#2266471 |
CVE-2021-46954 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-46954 SMASH Issue 395361 bnc#1220511 https://git.kernel.org/stable/c/018bb8da5b5888e19585f9b802f036afe643fcef https://git.kernel.org/stable/c/31fe34a0118e0acc958c802e830ad5d37ef6b1d3 https://git.kernel.org/stable/c/8e6dfb7beeb6489ac1365b8a71052e737f5da76e rh#2266501 |
CVE-2021-46956 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-46956 SMASH Issue 395363 bnc#1220516 https://git.kernel.org/stable/c/310efc95c72c13faf855c692d19cd4d054d827c8 https://git.kernel.org/stable/c/5116e79fc6e6725b8acdad8b7e928a83ab7b47e6 https://git.kernel.org/stable/c/9b9d60c0eb8ada99cce2a9ab5c15dffc523b01ae https://git.kernel.org/stable/c/c79c5e0178922a9e092ec8fed026750f39dcaef4 https://git.kernel.org/stable/c/d19555ff225d0896a33246a49279e6d578095f15 rh#2266466 |
CVE-2021-46957 | kernel-source-rt:Not affected | moderate | () | CVE-2021-46957 SMASH Issue 395364 bnc#1220518 https://git.kernel.org/stable/c/b1ebaa0e1318494a7637099a26add50509e37964 https://git.kernel.org/stable/c/fd0f06590d35c99f98d12c7984897ec4201a6263 rh#2266463 |
CVE-2021-46958 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-46958 SMASH Issue 395365 bnc#1220521 https://git.kernel.org/stable/c/061dde8245356d8864d29e25207aa4daa0be4d3c https://git.kernel.org/stable/c/633f7f216663587f17601eaa1cf2ac3d5654874c https://git.kernel.org/stable/c/a4794be7b00b7eda4b45fffd283ab7d76df7e5d6 https://git.kernel.org/stable/c/e2da98788369bfba1138bada72765c47989a4338 rh#2266461 |
CVE-2021-46959 | kernel-source-rt:Not affected | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-46959 SMASH Issue 395862 bnc#1220734 https://git.kernel.org/stable/c/001c8e83646ad3b847b18f6ac55a54367d917d74 https://git.kernel.org/stable/c/28a5529068c51cdf0295ab1e11a99a3a909a03e4 https://git.kernel.org/stable/c/62bb2c7f2411a0045c24831f11ecacfc35610815 https://git.kernel.org/stable/c/794aaf01444d4e765e2b067cba01cc69c1c68ed9 https://git.kernel.org/stable/c/8735248ebb918d25427965f0db07939ed0473ec6 https://git.kernel.org/stable/c/8bf96425c90f5c1dcf3b7b9df568019a1d4b8a0e https://git.kernel.org/stable/c/8e029707f50a82c53172359c686b2536ab54e58c https://git.kernel.org/stable/c/c7fabe372a9031acd00498bc718ce27c253abfd1 https://git.kernel.org/stable/c/cee78aa24578edac8cf00513dca618c0acc17cd7 rh#2267198 |
CVE-2021-46960 | kernel-source-rt:Already fixed | low | 2.3 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-46960 SMASH Issue 395366 bnc#1220528 https://git.kernel.org/stable/c/83728cbf366e334301091d5b808add468ab46b27 https://git.kernel.org/stable/c/93f3339b22ba17e66f0808737467b70ba087eaec https://git.kernel.org/stable/c/aaa0faa5c28a91c362352d6b35dc3ed10df56fb0 https://git.kernel.org/stable/c/b399c1a3ea0b9d10047ff266d65533df7f15532f https://git.kernel.org/stable/c/e486f8397f3f14a7cadc166138141fdb14379a54 https://git.kernel.org/stable/c/e94851629c49c65b4fbb29a5725ddfd7988f8f20 https://git.kernel.org/stable/c/f59a9242942fef0de7b926e438ba4eae65d4b4dd rh#2266822 |
CVE-2021-46962 | kernel-source-rt:Already fixed | moderate | () | CVE-2021-46962 SMASH Issue 395368 bnc#1220532 https://git.kernel.org/stable/c/0d8941b9b2d3e7b3481fdf43b1a6189d162175b7 https://git.kernel.org/stable/c/25ac6ce65f1ab458982d15ec1caf441acd37106a https://git.kernel.org/stable/c/d6e7fda496978f2763413b5523557b38dc2bf6c2 https://git.kernel.org/stable/c/e29c84857e2d51aa017ce04284b962742fb97d9e https://git.kernel.org/stable/c/ebe0f12cf4c044f812c6d17011531582f9ac8bb3 rh#2266818 |
CVE-2021-46964 | kernel-source-rt:Already fixed | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-46964 SMASH Issue 395370 bnc#1220538 https://git.kernel.org/stable/c/0f86d66b38501e3ac66cf2d9f9f8ad6838bad0e6 https://git.kernel.org/stable/c/4ecd42dec858b6632c5f024fe13e9ad6c30f2734 https://git.kernel.org/stable/c/f02d4086a8f36a0e1aaebf559b54cf24a177a486 rh#2266814 |
CVE-2021-46965 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L) | CVE-2021-46965 SMASH Issue 395371 bnc#1220510 https://git.kernel.org/stable/c/34ec706bf0b7c4ca249a729c1bcb91f706c7a7be https://git.kernel.org/stable/c/4d786870e3262ec098a3b4ed10b895176bc66ecb https://git.kernel.org/stable/c/4e4ebb827bf09311469ffd9d0c14ed40ed9747aa https://git.kernel.org/stable/c/683313993dbe1651c7aa00bb42a041d70e914925 rh#2266812 |
CVE-2021-46966 | kernel-source-rt:Already fixed | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-46966 SMASH Issue 395372 bnc#1220572 https://git.kernel.org/stable/c/1d53ca5d131074c925ce38361fb0376d3bf7e394 https://git.kernel.org/stable/c/62dc2440ebb552aa0d7f635e1697e077d9d21203 https://git.kernel.org/stable/c/72814a94c38a33239793f7622cec6ace1e540c4b https://git.kernel.org/stable/c/8b04d57f30caf76649d0567551589af9a66ca9be https://git.kernel.org/stable/c/90575d1d9311b753cf1718f4ce9061ddda7dfd23 https://git.kernel.org/stable/c/a5b26a2e362f572d87e9fd35435680e557052a17 https://git.kernel.org/stable/c/b7a5baaae212a686ceb812c32fceed79c03c0234 https://git.kernel.org/stable/c/e483bb9a991bdae29a0caa4b3a6d002c968f94aa https://git.kernel.org/stable/c/f16737caf41fc06cfe6e49048becb09657074d4b rh#2266808 |
CVE-2021-46967 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-46967 SMASH Issue 395373 bnc#1220527 https://git.kernel.org/stable/c/3a3e0fad16d40a2aa68ddf7eea4acdf48b22dd44 https://git.kernel.org/stable/c/3b8b6399666a29daa30b0bb3f5c9e3fc81c5a6a6 https://git.kernel.org/stable/c/93dbbf20e3ffad14f04227a0b7105f6e6f0387ce https://git.kernel.org/stable/c/940230a5c31e2714722aee04c521a21f484b4df7 rh#2266804 |
CVE-2021-46968 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) | CVE-2021-46968 SMASH Issue 395374 bnc#1220689 https://git.kernel.org/stable/c/026499a9c2e002e621ad568d1378324ae97e5524 https://git.kernel.org/stable/c/055a063a18bcd19b93709e3eac8078d6b2f04599 https://git.kernel.org/stable/c/70fac8088cfad9f3b379c9082832b4d7532c16c2 https://git.kernel.org/stable/c/971dc8706cee47393d393905d294ea47e39503d3 rh#2266802 |
CVE-2021-46969 | kernel-source-rt:Not affected | moderate | 5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) | CVE-2021-46969 SMASH Issue 395375 bnc#1220694 https://git.kernel.org/stable/c/0ecc1c70dcd32c0f081b173a1a5d89952686f271 https://git.kernel.org/stable/c/a99b661c3187365f81026d89b1133a76cd2652b3 rh#2266798 |
CVE-2021-46970 | kernel-source-rt:Not affected | low | () | CVE-2021-46970 SMASH Issue 395376 bnc#1220601 https://git.kernel.org/stable/c/0fccbf0a3b690b162f53b13ed8bc442ea33437dc https://git.kernel.org/stable/c/abd1510c08a13c88d24b622a83c82e87ff1d3135 https://git.kernel.org/stable/c/ed541cff35cbdb695f0c98ef506dd7218883fc07 rh#2266835 |
CVE-2021-46971 | kernel-source-rt:Already fixed | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-46971 SMASH Issue 395377 bnc#1220697 https://git.kernel.org/stable/c/08ef1af4de5fe7de9c6d69f1e22e51b66e385d9b https://git.kernel.org/stable/c/4348d3b5027bc3ff6336368b6c60605d4ef8e1ce https://git.kernel.org/stable/c/b246759284d6a2bc5b6f1009caeeb3abce2ec9ff https://git.kernel.org/stable/c/c7b0208ee370b89d20486fae71cd9abb759819c1 https://git.kernel.org/stable/c/f5809ca4c311b71bfaba6d13f4e39eab0557895e jsc#CAR-3162 rh#2266833 |
CVE-2021-46972 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-46972 SMASH Issue 395378 bnc#1220609 https://git.kernel.org/stable/c/71d58457a8afc650da5d3292a7f7029317654d95 https://git.kernel.org/stable/c/cf3e3330bc5719fa9d658e3e2f596bde89344a94 https://git.kernel.org/stable/c/d587cfaef72b1b6f4b2774827123bce91f497cc8 https://git.kernel.org/stable/c/eaab1d45cdb4bb0c846bd23c3d666d5b90af7b41 rh#2266831 |
CVE-2021-46973 | kernel-source-rt:Not affected | moderate | 5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) | CVE-2021-46973 SMASH Issue 395379 bnc#1220699 https://git.kernel.org/stable/c/03c649dee8b1eb5600212a249542a70f47a5ab40 https://git.kernel.org/stable/c/47a017f33943278570c072bc71681809b2567b3a https://git.kernel.org/stable/c/48ec949ac979b4b42d740f67b6177797af834f80 https://git.kernel.org/stable/c/ea474054c2cc6e1284604b21361f475c7cc8c0a0 rh#2266828 |
CVE-2021-46974 | kernel-source-rt:Already fixed | moderate | 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N) | CVE-2021-46974 SMASH Issue 395380 bnc#1220700 https://git.kernel.org/stable/c/0e2dfdc74a7f4036127356d42ea59388f153f42c https://git.kernel.org/stable/c/2cfa537674cd1051a3b8111536d77d0558f33d5d https://git.kernel.org/stable/c/4d542ddb88fb2f39bf7f14caa2902f3e8d06f6ba https://git.kernel.org/stable/c/53e0db429b37a32b8fc706d0d90eb4583ad13848 https://git.kernel.org/stable/c/6eba92a4d4be8feb4dc33976abac544fa99d6ecc https://git.kernel.org/stable/c/7cf64d8679ca1cb20cf57d6a88bfee79a0922a66 https://git.kernel.org/stable/c/b9b34ddbe2076ade359cd5ce7537d5ed019e9807 rh#2266826 |
CVE-2021-46975 | kernel-source-rt:Not affected | low | 3.2 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N) | CVE-2021-46975 SMASH Issue 395381 bnc#1220505 https://git.kernel.org/stable/c/2671fa4dc0109d3fb581bc3078fdf17b5d9080f6 https://git.kernel.org/stable/c/671c54ea8c7ff47bd88444f3fffb65bf9799ce43 https://git.kernel.org/stable/c/68122479c128a929f8f7bdd951cfdc8dd0e75b8f https://git.kernel.org/stable/c/9b288479f7a901a14ce703938596438559d7df55 https://git.kernel.org/stable/c/baea536cf51f8180ab993e374cb134b5edad25e2 https://git.kernel.org/stable/c/d3598eb3915cc0c0d8cab42f4a6258ff44c4033e https://git.kernel.org/stable/c/da50f56e826e1db141693297afb99370ebc160dd https://git.kernel.org/stable/c/fbf85a34ce17c4cf0a37ee253f4c582bbfb8231b rh#2266824 |
CVE-2021-46976 | kernel-source-rt:Not affected | moderate | () | CVE-2021-46976 SMASH Issue 395425 bnc#1220621 https://git.kernel.org/stable/c/402be8a101190969fc7ff122d07e262df86e132b https://git.kernel.org/stable/c/608441de3976c526b02af4d7063093c8adf351e3 https://git.kernel.org/stable/c/805c990a9c54b9451d3daff640b850909c31ab9d https://git.kernel.org/stable/c/f7520970d5353cb1fa4d9089a1b23669c5da97fe rh#2266928 |
CVE-2021-46977 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-46977 SMASH Issue 395426 bnc#1220606 https://git.kernel.org/stable/c/31f29749ee970c251b3a7e5b914108425940d089 https://git.kernel.org/stable/c/5104d7ffcf24749939bea7fdb5378d186473f890 https://git.kernel.org/stable/c/5adcdeb57007ccf8ab7ac20bf787ffb6fafb1a94 https://git.kernel.org/stable/c/e3ea1895df719c4ef87862501bb10d95f4177bed rh#2266924 |
CVE-2021-46978 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-46978 SMASH Issue 395427 bnc#1220610 https://git.kernel.org/stable/c/200a45649ab7361bc80c70aebf7165b64f9a6c9f https://git.kernel.org/stable/c/bd0e8455b85b651a4c77de9616e307129b15aaa7 https://git.kernel.org/stable/c/c8bf64e3fb77cc19bad146fbe26651985b117194 https://git.kernel.org/stable/c/f5c7e8425f18fdb9bdb7d13340651d7876890329 rh#2266919 |
CVE-2021-46979 | kernel-source-rt:Not affected | moderate | () | CVE-2021-46979 SMASH Issue 395428 bnc#1220623 https://git.kernel.org/stable/c/11e1cae5da4096552f7c091476cbadbc0d1817da https://git.kernel.org/stable/c/901f84de0e16bde10a72d7eb2f2eb73fcde8fa1a https://git.kernel.org/stable/c/ab6c935ba3a04317632f3b8b68675bdbaf395303 rh#2266917 |
CVE-2021-46980 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-46980 SMASH Issue 395429 bnc#1220663 https://git.kernel.org/stable/c/1f4642b72be79757f050924a9b9673b6a02034bc https://git.kernel.org/stable/c/5e9c6f58b01e6fdfbc740390c01f542a35c97e57 https://git.kernel.org/stable/c/a453bfd7ef15fd9d524004d3ca7b05353a302911 https://git.kernel.org/stable/c/e5366bea0277425e1868ba20eeb27c879d5a6e2d rh#2266914 |
CVE-2021-46981 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-46981 SMASH Issue 395430 bnc#1220611 https://git.kernel.org/stable/c/1c4962df938891af9ab4775f5224ef8601764107 https://git.kernel.org/stable/c/54b78ba7e96e5fe1edb8054e375d31a6c0dc60dc https://git.kernel.org/stable/c/79ebe9110fa458d58f1fceb078e2068d7ad37390 https://git.kernel.org/stable/c/b31d237796fd618379ec8e0f4de3370b5e4aeee7 https://git.kernel.org/stable/c/cde4b55cfb24522dcbba80bbdb0c082303e76c43 rh#2266911 |
CVE-2021-46982 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-46982 SMASH Issue 395431 bnc#1220617 https://git.kernel.org/stable/c/5639b73fd3bc6fc8ca72e3a9ac15aacaabd7ebff https://git.kernel.org/stable/c/64acb100fe3beb5d20184d0ae3307235bd3555c4 https://git.kernel.org/stable/c/936158b15e2648253afb824d252c910c496d34b5 https://git.kernel.org/stable/c/a949dc5f2c5cfe0c910b664650f45371254c0744 rh#2266908 |
CVE-2021-46983 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-46983 SMASH Issue 395432 bnc#1220639 https://git.kernel.org/stable/c/17fb6dfa5162b89ecfa07df891a53afec321abe8 https://git.kernel.org/stable/c/5bdb34466ad8370546dfa0497594fb1d6f2fed90 https://git.kernel.org/stable/c/64f3410c7bfc389b1a58611d0799f4a36ce4b6b5 https://git.kernel.org/stable/c/8cc365f9559b86802afc0208389f5c8d46b4ad61 rh#2266906 |
CVE-2021-46984 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-46984 SMASH Issue 395433 bnc#1220631 https://git.kernel.org/stable/c/0b6b4b90b74c27bea968c214d820ba4254b903a5 https://git.kernel.org/stable/c/2ef3c76540c49167a0bc3d5f80d00fd1fc4586df https://git.kernel.org/stable/c/54dbe2d2c1fcabf650c7a8b747601da355cd7f9f https://git.kernel.org/stable/c/a287cd84e047045f5a4d4da793414e848de627c6 https://git.kernel.org/stable/c/efed9a3337e341bd0989161b97453b52567bc59d rh#2266750 |
CVE-2021-46985 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-46985 SMASH Issue 395434 bnc#1220620 https://git.kernel.org/stable/c/0c8bd174f0fc131bc9dfab35cd8784f59045da87 https://git.kernel.org/stable/c/5ab9857dde7c3ea3faef6b128d718cf8ba98721b https://git.kernel.org/stable/c/6901a4f795e0e8d65ae779cb37fc22e0bf294712 https://git.kernel.org/stable/c/69cc821e89ce572884548ac54c4f80eec7a837a5 https://git.kernel.org/stable/c/a7e17a8d421ae23c920240625b4413c7b94d94a4 https://git.kernel.org/stable/c/c5c8f6ffc942cf42f990f22e35bcf4cbe9d8c2fb https://git.kernel.org/stable/c/dafd4c0b5e835db020cff11c74b4af9493a58e72 https://git.kernel.org/stable/c/e2381174daeae0ca35eddffef02dcc8de8c1ef8a rh#2266904 |
CVE-2021-46986 | kernel-source-rt:Not affected | moderate | 5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) | CVE-2021-46986 SMASH Issue 395435 bnc#1220701 https://git.kernel.org/stable/c/1ea775021282d90e1d08d696b7ab54aa75d688e5 https://git.kernel.org/stable/c/b4b8e9601d7ee8806d2687f081a42485d27674a1 https://git.kernel.org/stable/c/bb9c74a5bd1462499fe5ccb1e3c5ac40dcfa9139 https://git.kernel.org/stable/c/bc0cdd72493236fb72b390ad38ce581e353c143c rh#2266902 |
CVE-2021-46987 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-46987 SMASH Issue 395436 bnc#1220704 https://git.kernel.org/stable/c/96157707c0420e3d3edfe046f1cc797fee117ade https://git.kernel.org/stable/c/d5347827d0b4b2250cbce6eccaa1c81dc78d8651 https://git.kernel.org/stable/c/f9baa501b4fd6962257853d46ddffbc21f27e344 rh#2266752 |
CVE-2021-46990 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-46990 SMASH Issue 395439 bnc#1220743 https://git.kernel.org/stable/c/0b4eb172cc12dc102cd0ad013e53ee4463db9508 https://git.kernel.org/stable/c/0c25a7bb697f2e6ee65b6d63782f675bf129511a https://git.kernel.org/stable/c/2db22ba4e0e103f00e0512e0ecce36ac78c644f8 https://git.kernel.org/stable/c/5bc00fdda1e934c557351a9c751a205293e68cbf https://git.kernel.org/stable/c/8382b15864e5014261b4f36c2aa89723612ee058 https://git.kernel.org/stable/c/aec86b052df6541cc97c5fca44e5934cbea4963b https://git.kernel.org/stable/c/d2e3590ca39ccfd8a5a46d8c7f095cb6c7b9ae92 https://git.kernel.org/stable/c/dd0d6117052faace5440db20fc37175efe921c7d https://git.kernel.org/stable/c/ee4b7aab93c2631c3bb0753023c5dda592bb666b rh#2266896 |
CVE-2021-46993 | kernel-source-rt:Not affected | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H) | CVE-2021-46993 SMASH Issue 395442 bnc#1220622 https://git.kernel.org/stable/c/3da3f804b82a0a382d523a21acf4cf3bb35f936d https://git.kernel.org/stable/c/42ee47c7e3569d9a0e2cb5053c496d97d380472f https://git.kernel.org/stable/c/687f523c134b7f0bd040ee1230f6d17990d54172 https://git.kernel.org/stable/c/6d2f8909a5fabb73fe2a63918117943986c39b6c https://git.kernel.org/stable/c/f7347c85490b92dd144fa1fba9e1eca501656ab3 jsc#CAR-3153 rh#2266888 |
CVE-2021-46994 | kernel-source-rt:Not affected | moderate | () | CVE-2021-46994 SMASH Issue 395443 bnc#1220654 https://git.kernel.org/stable/c/03c427147b2d3e503af258711af4fc792b89b0af https://git.kernel.org/stable/c/6f8f1c27b577de15f69fefce3c502bb6300d825c https://git.kernel.org/stable/c/e1e10a390fd9479209c4d834d916ca5e6d5d396b https://git.kernel.org/stable/c/eecb4df8ec9f896b19ee05bfa632ac6c1dcd8f21 rh#2266885 |
CVE-2021-46995 | kernel-source-rt:Not affected | moderate | () | CVE-2021-46995 SMASH Issue 395444 bnc#1220655 https://git.kernel.org/stable/c/15f8f96ec7fc35024d4e03296e4d838fcea33d83 https://git.kernel.org/stable/c/4cc7faa406975b460aa674606291dea197c1210c rh#2266883 |
CVE-2021-46996 | kernel-source-rt:Not affected | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-46996 SMASH Issue 395445 bnc#1220652 https://git.kernel.org/stable/c/2c784a500f5edd337258b0fdb2f31bc9abde1a23 https://git.kernel.org/stable/c/59fa98bfa1f4013d658d990cac88c87b46ff410c https://git.kernel.org/stable/c/85dfd816fabfc16e71786eda0a33a7046688b5b0 https://git.kernel.org/stable/c/dd3bebf515f336214a91994348a2b86b9a1d3d7f rh#2266881 |
CVE-2021-46997 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-46997 SMASH Issue 395446 bnc#1220748 https://git.kernel.org/stable/c/4d6a38da8e79e94cbd1344aa90876f0f805db705 https://git.kernel.org/stable/c/51524fa8b5f7b879ba569227738375d283b79382 https://git.kernel.org/stable/c/d8d52005f57bbb4a4ec02f647e2555d327135c68 https://git.kernel.org/stable/c/e67a83f078005461b59b4c776e6b5addd11725fa rh#2266879 |
CVE-2021-46998 | kernel-source-rt:Already fixed | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-46998 SMASH Issue 395447 bnc#1220625 https://git.kernel.org/stable/c/25a87b1f566b5eb2af2857a928f0e2310d900976 https://git.kernel.org/stable/c/643001b47adc844ae33510c4bb93c236667008a3 https://git.kernel.org/stable/c/6892396ebf04ea2c021d80e10f4075e014cd7cc3 https://git.kernel.org/stable/c/7afdd6aba95c8a526038e7abe283eeac3e4320f1 https://git.kernel.org/stable/c/d90529392aaf498dafa95d212295d64b2cea4e24 https://git.kernel.org/stable/c/f7f6f07774091a6ddd98500b85386c3c6afb30d3 rh#2266877 |
CVE-2021-46999 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-46999 SMASH Issue 395448 bnc#1220667 https://git.kernel.org/stable/c/0bfd913c2121b3d553bfd52810fe6061d542d625 https://git.kernel.org/stable/c/35b4f24415c854cd718ccdf38dbea6297f010aae https://git.kernel.org/stable/c/61b877bad9bb0d82b7d8841be50872557090a704 https://git.kernel.org/stable/c/b1b31948c0af44628e43353828453461bb74098f https://git.kernel.org/stable/c/d624f2991b977821375fbd56c91b0c91d456a697 https://git.kernel.org/stable/c/f01988ecf3654f805282dce2d3bb9afe68d2691e rh#2266874 |
CVE-2021-47000 | kernel-source-rt:Already fixed | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-47000 SMASH Issue 395449 bnc#1220669 https://git.kernel.org/stable/c/0a219432127d396120fc88cabd82785e0ff72a2f https://git.kernel.org/stable/c/1775c7ddacfcea29051c67409087578f8f4d751b https://git.kernel.org/stable/c/22fa4c8288f1ec40f6d62d7a32c57ac176f9f0bc https://git.kernel.org/stable/c/2ad8af2b70e986284050213230428b823b950a38 https://git.kernel.org/stable/c/bf45c9fe99aa8003d2703f1bd353f956dea47e40 rh#2266871 |
CVE-2021-47002 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47002 SMASH Issue 395451 bnc#1220676 https://git.kernel.org/stable/c/1e10f58f1c9a6b667b045513c7a4e6111c24fe7c https://git.kernel.org/stable/c/b9f83ffaa0c096b4c832a43964fe6bff3acffe10 https://git.kernel.org/stable/c/c664aaec9aee544538a78ba4893a44bc73a6d742 rh#2266867 |
CVE-2021-47003 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47003 SMASH Issue 395452 bnc#1220677 https://git.kernel.org/stable/c/2280b4cc29d8cdd2be3d1b2d1ea4f958e2131c97 https://git.kernel.org/stable/c/28ac8e03c43dfc6a703aa420d18222540b801120 https://git.kernel.org/stable/c/5756f757c72501ef1a16f5f63f940623044180e9 https://git.kernel.org/stable/c/7bc402f843e7817a4a808e7b9ab0bcd7ffd55bfa rh#2266865 |
CVE-2021-47004 | kernel-source-rt:Not affected | moderate | () | CVE-2021-47004 SMASH Issue 395453 bnc#1220653 https://git.kernel.org/stable/c/105155a8146ddb54c119d8318964eef3859d109d https://git.kernel.org/stable/c/1e116f87825f01a6380286472196882746b16f63 https://git.kernel.org/stable/c/211372b2571520e394b56b431a0705586013b3ff https://git.kernel.org/stable/c/61461fc921b756ae16e64243f72af2bfc2e620db rh#2266863 |
CVE-2021-47006 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47006 SMASH Issue 395455 bnc#1220751 https://git.kernel.org/stable/c/3ed8832aeaa9a37b0fc386bb72ff604352567c80 https://git.kernel.org/stable/c/555a70f7fff03bd669123487905c47ae27dbdaac https://git.kernel.org/stable/c/630146203108bf6b8934eec0dfdb3e46dcb917de https://git.kernel.org/stable/c/7eeacc6728c5478e3c01bc82a1f08958eaa12366 https://git.kernel.org/stable/c/a506bd5756290821a4314f502b4bafc2afcf5260 https://git.kernel.org/stable/c/a9938d6d78a238d6ab8de57a4d3dcf77adceb9bb https://git.kernel.org/stable/c/dabe299425b1a53a69461fed7ac8922ea6733a25 https://git.kernel.org/stable/c/ed1f67465327cec4457bb988775245b199da86e6 rh#2266857 |
CVE-2021-47007 | kernel-source-rt:Not affected | moderate | () | CVE-2021-47007 SMASH Issue 395456 bnc#1220691 https://git.kernel.org/stable/c/1c20a4896409f5ca1c770e1880c33d0a28a8b10f https://git.kernel.org/stable/c/3ab0598e6d860ef49d029943ba80f627c15c15d6 https://git.kernel.org/stable/c/822054e5026c43b1dd60cf387dd999e95ee2ecc2 https://git.kernel.org/stable/c/860afd680d9cc1dabd61cda3cd246f60aa1eb705 rh#2266854 |
CVE-2021-47008 | kernel-source-rt:Not affected | moderate | 6.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H) | CVE-2021-47008 SMASH Issue 395457 bnc#1220596 https://git.kernel.org/stable/c/a3ba26ecfb569f4aa3f867e80c02aa65f20aadad https://git.kernel.org/stable/c/fb9e14f4f8217a0980f8da2c8ff70dee058cbe47 https://git.kernel.org/stable/c/fd722a57fe0b80133dacae4e1c852ee4212f9b2e rh#2266851 |
CVE-2021-47009 | kernel-source-rt:Not affected | moderate | () | CVE-2021-47009 SMASH Issue 395458 bnc#1220733 https://git.kernel.org/stable/c/1c4031014106aff48e1e686e40101c31eab5d44c https://git.kernel.org/stable/c/31c9a4b24d86cbb36ff0d7a085725a3b4f0138c8 https://git.kernel.org/stable/c/3e24fbd37e72e8a67b74991970fecc82d14f57af https://git.kernel.org/stable/c/83a775d5f9bfda95b1c295f95a3a041a40c7f321 rh#2266756 |
CVE-2021-47010 | kernel-source-rt:Already fixed | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N) | CVE-2021-47010 SMASH Issue 395459 bnc#1220791 https://git.kernel.org/stable/c/6c1ea8bee75df8fe2184a50fcd0f70bf82986f42 https://git.kernel.org/stable/c/8d432592f30fcc34ef5a10aac4887b4897884493 https://git.kernel.org/stable/c/9884f745108f7d25b189bbcd6754e284fb29ab68 https://git.kernel.org/stable/c/992de06308d9a9584d59b96d294ac676f924e437 https://git.kernel.org/stable/c/e7d7bedd507bb732e600403b7a96f9fe48d0ca31 https://git.kernel.org/stable/c/efe1532a6e1a8e3c343d04fff510f0ed80328f9c rh#2266849 |
CVE-2021-47011 | kernel-source-rt:Not affected | moderate | () | CVE-2021-47011 SMASH Issue 395460 bnc#1220793 https://git.kernel.org/stable/c/31df8bc4d3feca9f9c6b2cd06fd64a111ae1a0e6 https://git.kernel.org/stable/c/89b1ed358e01e1b0417f5d3b0082359a23355552 https://git.kernel.org/stable/c/9f38f03ae8d5f57371b71aa6b4275765b65454fd https://git.kernel.org/stable/c/c3ae6a3f3ca4f02f6ccddf213c027302586580d0 rh#2266847 |
CVE-2021-47014 | kernel-source-rt:Not affected | moderate | 6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CVE-2021-47014 SMASH Issue 395463 bnc#1220630 https://git.kernel.org/stable/c/0648941f4c8bbf8b4b6c0b270889ae7aa769b921 https://git.kernel.org/stable/c/f77bd544a6bbe69aa50d9ed09f13494cf36ff806 rh#2266738 |
CVE-2021-47015 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47015 SMASH Issue 395464 bnc#1220794 https://git.kernel.org/stable/c/3fbc5bc651d688fbea2a59cdc91520a2f5334d0a https://git.kernel.org/stable/c/4fcaad2b7dac3f16704f8118c7e481024ddbd3ed https://git.kernel.org/stable/c/b1523e4ba293b2a32d9fabaf70c1dcaa6e3e2847 https://git.kernel.org/stable/c/bbd6f0a948139970f4a615dff189d9a503681a39 https://git.kernel.org/stable/c/e187ef83c04a5d23e68d39cfdff1a1931e29890c rh#2266760 |
CVE-2021-47016 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47016 SMASH Issue 395863 bnc#1220760 https://git.kernel.org/stable/c/1dfb26df15fc7036a74221d43de7427f74293dae https://git.kernel.org/stable/c/43262178c043032e7c42d00de44c818ba05f9967 https://git.kernel.org/stable/c/5d34225169346cab5145978d153b9ce90e9ace21 https://git.kernel.org/stable/c/73fdeb612d25b5e105c219e05434285a45d23576 https://git.kernel.org/stable/c/f6a90818a32058fca62cda3a2027a6a2364e1878 jsc#CAR-3169 rh#2267200 |
CVE-2021-47017 | kernel-source-rt:Not affected | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47017 SMASH Issue 395465 bnc#1220678 https://git.kernel.org/stable/c/3b1ac40c6012140828caa79e592a438a18ebf71b https://git.kernel.org/stable/c/5e413c0831ff4700d1739db3fa3ae9f859744676 https://git.kernel.org/stable/c/8392df5d7e0b6a7d21440da1fc259f9938f4dec3 https://git.kernel.org/stable/c/8bb054fb336f4250002fff4e0b075221c05c3c65 rh#2266588 |
CVE-2021-47018 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N) | CVE-2021-47018 SMASH Issue 395466 bnc#1220774 https://git.kernel.org/stable/c/4b9fb2c9039a206d37f215936a4d5bee7b1bf9cd https://git.kernel.org/stable/c/9ccba66d4d2aff9a3909aa77d57ea8b7cc166f3c https://git.kernel.org/stable/c/a84df7c80bdac598d6ac9268ae578da6928883e8 https://git.kernel.org/stable/c/abb07dc5e8b61ab7b1dde20dd73aa01a3aeb183f rh#2266594 |
CVE-2021-47019 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47019 SMASH Issue 395467 bnc#1220629 https://git.kernel.org/stable/c/b13cbc536990ff609afa878b6211cd6f6265ba60 https://git.kernel.org/stable/c/fe3fccde8870764ba3e60610774bd7bc9f8faeff rh#2266597 |
CVE-2021-47020 | kernel-source-rt:Already fixed | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) | CVE-2021-47020 SMASH Issue 395864 bnc#1220785 https://git.kernel.org/stable/c/2f17ac005b320c85d686088cfd4c2e7017912b88 https://git.kernel.org/stable/c/342260fe821047c3d515e3d28085d73fbdce3e80 https://git.kernel.org/stable/c/48f17f96a81763c7c8bf5500460a359b9939359f https://git.kernel.org/stable/c/7c468deae306d0cbbd539408c26cfec04c66159a https://git.kernel.org/stable/c/870533403ffa28ff63e173045fc5369365642002 https://git.kernel.org/stable/c/effd2bd62b416f6629e18e3ce077c60de14cfdea rh#2267202 |
CVE-2021-47021 | kernel-source-rt:Not affected | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47021 SMASH Issue 395468 bnc#1220634 https://git.kernel.org/stable/c/81483309ce861a9fa7835322787f68a443fea364 https://git.kernel.org/stable/c/d754c80ae82a662e692a82faad71b8c218cb7f52 https://git.kernel.org/stable/c/e9d32af478cfc3744a45245c0b126738af4b3ac4 rh#2266961 |
CVE-2021-47022 | kernel-source-rt:Not affected | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47022 SMASH Issue 395469 bnc#1220635 https://git.kernel.org/stable/c/107bcbb219ac84d885ac63b25246f8d33212bc47 https://git.kernel.org/stable/c/4fa28c807da54c1d720b3cc12e48eb9bea1e2c8f https://git.kernel.org/stable/c/6c5b2b0c6e5a6ce2d8f9f85b8b72bfad60eaa506 https://git.kernel.org/stable/c/8ab31da7b89f71c4c2defcca989fab7b42f87d71 rh#2266963 |
CVE-2021-47023 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47023 SMASH Issue 395470 bnc#1220786 https://git.kernel.org/stable/c/0ce6052802be2cb61a57b753e41301339c88c839 https://git.kernel.org/stable/c/333980481b99edb24ebd5d1a53af70a15d9146de https://git.kernel.org/stable/c/9d1ba11fabdd8f25abb24272ef1621417981320b https://git.kernel.org/stable/c/b5bba6ede42693f50ce1c9944315cefed7491061 rh#2266965 |
CVE-2021-47025 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47025 SMASH Issue 395472 bnc#1220788 https://git.kernel.org/stable/c/5cad9e2caa9613fdcd246bd4ebf0ffbec1cba2ca https://git.kernel.org/stable/c/b34ea31fe013569d42b7e8681ef3f717f77c5b72 rh#2266969 |
CVE-2021-47026 | kernel-source-rt:Not affected | moderate | () | CVE-2021-47026 SMASH Issue 395473 bnc#1220685 https://git.kernel.org/stable/c/676171f9405dcaa45a33d18241c32f387dbaae39 https://git.kernel.org/stable/c/7f4a8592ff29f19c5a2ca549d0973821319afaad https://git.kernel.org/stable/c/b64415c6b3476cf9fa4d0aea3807065b8403a937 https://git.kernel.org/stable/c/d3cca8067d43dfee4a3535c645b55f618708dccb rh#2266971 |
CVE-2021-47027 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47027 SMASH Issue 395474 bnc#1220633 https://git.kernel.org/stable/c/a46b536cd60c0dbd4bf767c62a8774dec52bf099 https://git.kernel.org/stable/c/e230f0c44f011f3270680a506b19b7e84c5e8923 rh#2266973 |
CVE-2021-47028 | kernel-source-rt:Not affected | low | () | CVE-2021-47028 SMASH Issue 395475 bnc#1220686 https://git.kernel.org/stable/c/4bd926e5ca88eac4d95eacb806b229f8729bc62e https://git.kernel.org/stable/c/dfc8a71448c7d4fec38fb22bdc8a76d79c14b6da https://git.kernel.org/stable/c/f43b941fd61003659a3f0e039595e5e525917aa8 rh#2266975 |
CVE-2021-47029 | kernel-source-rt:Not affected | low | 2.3 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-47029 SMASH Issue 395476 bnc#1220650 https://git.kernel.org/stable/c/2554b9cb4b5e097c6071ec3ed5bc7c665c477ca7 https://git.kernel.org/stable/c/c996f0346e40e3b1ac2ebaf0681df898fb157f60 rh#2266977 |
CVE-2021-47030 | kernel-source-rt:Not affected | moderate | () | CVE-2021-47030 SMASH Issue 395477 bnc#1220656 https://git.kernel.org/stable/c/49cc85059a2cb656f96ff3693f891e8fe8f669a9 https://git.kernel.org/stable/c/54b989653c5531bc4416ced33f146b9cb633d978 rh#2266980 |
CVE-2021-47031 | kernel-source-rt:Not affected | low | () | CVE-2021-47031 SMASH Issue 395478 bnc#1220657 https://git.kernel.org/stable/c/4811226374453607175ea057777faa7e7f752204 https://git.kernel.org/stable/c/782b3e86ea970e899f8e723db9f64708a15ca30e rh#2266982 |
CVE-2021-47032 | kernel-source-rt:Not affected | low | () | CVE-2021-47032 SMASH Issue 395479 bnc#1220658 https://git.kernel.org/stable/c/4a9dcd6efb2a268fc5707dcfb3b0c412975c4462 https://git.kernel.org/stable/c/4e7914ce23306b28d377ec395e00e5fde0e6f96e https://git.kernel.org/stable/c/7dcf3c04f0aca746517a77433b33d40868ca4749 https://git.kernel.org/stable/c/e2cdc9cb33c5963efe1a7c022753386f9463d1b7 rh#2266984 |
CVE-2021-47033 | kernel-source-rt:Not affected | low | () | CVE-2021-47033 SMASH Issue 395480 bnc#1220659 https://git.kernel.org/stable/c/75bc5f779a7664d1fc19cb915039439c6e58bb94 https://git.kernel.org/stable/c/821ae236ccea989a1fcc6abfc4d5b74ad4ba39d2 https://git.kernel.org/stable/c/a025277a80add18c33d01042525a74fe5b875f25 https://git.kernel.org/stable/c/ebee7885bb12a8fe2c2f9bac87dbd87a05b645f9 rh#2266988 |
CVE-2021-47034 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47034 SMASH Issue 395481 bnc#1220687 https://git.kernel.org/stable/c/01ac203e2119d8922126886ddea309fb676f955f https://git.kernel.org/stable/c/73f9dccb29e4f82574bec2765c0090cdb0404301 https://git.kernel.org/stable/c/84c0762633f2a7ac8399e6b97d3b9bb8e6e1d50f https://git.kernel.org/stable/c/b3d5d0983388d6c4fb35f7d722556d5595f167a7 https://git.kernel.org/stable/c/b8b2f37cf632434456182e9002d63cbc4cccc50c https://git.kernel.org/stable/c/e40c52ee67b155ad59f59e73ea136d02685f0e0d rh#2266990 |
CVE-2021-47035 | kernel-source-rt:Not affected | moderate | () | CVE-2021-47035 SMASH Issue 395482 bnc#1220688 https://git.kernel.org/stable/c/25faff78138933244c678c7fc78f7c0340fa04a0 https://git.kernel.org/stable/c/66c24699f266ff310381a9552d3576eea8ad6e20 https://git.kernel.org/stable/c/89bd620798704a8805fc9db0d71d7f812cf5b3d2 https://git.kernel.org/stable/c/c848416cc05afc1589edba04fe00b85c2f797ee3 https://git.kernel.org/stable/c/eea53c5816889ee8b64544fa2e9311a81184ff9c rh#2266992 |
CVE-2021-47036 | kernel-source-rt:Not affected | moderate | 6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CVE-2021-47036 SMASH Issue 395483 bnc#1220671 https://git.kernel.org/stable/c/18f25dc399901426dff61e676ba603ff52c666f7 https://git.kernel.org/stable/c/450687386cd16d081b58cd7a342acff370a96078 rh#2266994 |
CVE-2021-47037 | kernel-source-rt:Not affected | moderate | () | CVE-2021-47037 SMASH Issue 395484 bnc#1220752 https://git.kernel.org/stable/c/62413972f5266568848a36fd15160397b211fa74 https://git.kernel.org/stable/c/6893df3753beafa5f7351228a9dd8157a57d7492 https://git.kernel.org/stable/c/96fadf7e8ff49fdb74754801228942b67c3eeebd rh#2266996 |
CVE-2021-47038 | kernel-source-rt:Not affected | moderate | () | CVE-2021-47038 SMASH Issue 395485 bnc#1220753 https://git.kernel.org/stable/c/17486960d79b900c45e0bb8fbcac0262848582ba https://git.kernel.org/stable/c/332e69eb3bd90370f2d9f2c2ca7974ff523dea17 https://git.kernel.org/stable/c/7cc0ba67883c6c8d3bddb283f56c167fc837a555 https://git.kernel.org/stable/c/fee71f480bc1dec5f6ae3b0b185ff12a62bceabc rh#2266998 |
CVE-2021-47039 | kernel-source-rt:Not affected | moderate | () | CVE-2021-47039 SMASH Issue 395486 bnc#1220647 https://git.kernel.org/stable/c/07f86aa8f4fe077be1b018cc177eb8c6573e5671 https://git.kernel.org/stable/c/1ffec389a6431782a8a28805830b6fae9bf00af1 https://git.kernel.org/stable/c/2a3a8bbca28b899806844c00d49ed1b7ccb50957 rh#2267001 |
CVE-2021-47040 | kernel-source-rt:Not affected | moderate | 6 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H) | CVE-2021-47040 SMASH Issue 395487 bnc#1220754 https://git.kernel.org/stable/c/38134ada0ceea3e848fe993263c0ff6207fd46e7 https://git.kernel.org/stable/c/51bf90901952aaac564bbdb36b2b503050c53dd9 https://git.kernel.org/stable/c/84b8c266c4bfe9ed5128e13253c388deb74b1b03 https://git.kernel.org/stable/c/cbbc13b115b8f18e0a714d89f87fbdc499acfe2d rh#2267003 |
CVE-2021-47042 | kernel-source-rt:Not affected | moderate | () | CVE-2021-47042 SMASH Issue 395489 bnc#1220756 https://git.kernel.org/stable/c/296443139f893b554dddd56a99ba8471ab5802d4 https://git.kernel.org/stable/c/616cf23b6cf40ad6f03ffbddfa1b6c4eb68d8ae1 rh#2267008 |
CVE-2021-47043 | kernel-source-rt:Not affected | moderate | () | CVE-2021-47043 SMASH Issue 395490 bnc#1220757 https://git.kernel.org/stable/c/00b68a7478343afdf83f30c43e64db5296057030 https://git.kernel.org/stable/c/5a465c5391a856a0c1e9554964d660676c35d1b2 https://git.kernel.org/stable/c/711acdf0228dc71601247f28b56f13e850e395c8 https://git.kernel.org/stable/c/940d01eceb3a7866fbfca136a55a5625fc75a565 rh#2267010 |
CVE-2021-47044 | kernel-source-rt:Not affected | moderate | () | CVE-2021-47044 SMASH Issue 395491 bnc#1220759 https://git.kernel.org/stable/c/2f3eab368e313dba35fc2f51ede778bf7b030b54 https://git.kernel.org/stable/c/39a2a6eb5c9b66ea7c8055026303b3aa681b49a5 https://git.kernel.org/stable/c/805cea93e66ca7deaaf6ad3b67224ce47c104c2f https://git.kernel.org/stable/c/80862cbf76c2646f709a57c4517aefe0b094c774 rh#2267012 |
CVE-2021-47045 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47045 SMASH Issue 395492 bnc#1220640 https://git.kernel.org/stable/c/8dd1c125f7f838abad009b64bff5f0a11afe3cb6 https://git.kernel.org/stable/c/9bdcfbed2a9fe24d2c7eaa1bad7c705e18de8cc7 https://git.kernel.org/stable/c/a09677de458d500b00701f6036baa423d9995408 rh#2266724 |
CVE-2021-47046 | kernel-source-rt:Not affected | moderate | () | CVE-2021-47046 SMASH Issue 395493 bnc#1220758 https://git.kernel.org/stable/c/080bd41d6478a64edf96704fddcda52b1fd5fed7 https://git.kernel.org/stable/c/403c4528e5887af3deb9838cb77a557631d1e138 https://git.kernel.org/stable/c/6a58310d5d1e5b02d0fc9b393ba540c9367bced5 https://git.kernel.org/stable/c/8e6fafd5a22e7a2eb216f5510db7aab54cc545c1 rh#2267014 |
CVE-2021-47047 | kernel-source-rt:Not affected | moderate | () | CVE-2021-47047 SMASH Issue 395494 bnc#1220761 https://git.kernel.org/stable/c/126bdb606fd2802454e6048caef1be3e25dd121e https://git.kernel.org/stable/c/5980a3b9c933408bc22b0e349b78c3ebd7cbf880 https://git.kernel.org/stable/c/bad5a23cf2b477fa78b85fd392736dae09a1e818 https://git.kernel.org/stable/c/c26c026eb496261dbc0adbf606cc81989cd2038c rh#2266758 |
CVE-2021-47048 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47048 SMASH Issue 395495 bnc#1220577 https://git.kernel.org/stable/c/1231279389b5e638bc3b66b9741c94077aed4b5a https://git.kernel.org/stable/c/23269ac9f123eca3aea7682d3345c02e71ed696c https://git.kernel.org/stable/c/a2c5bedb2d55dd27c642c7b9fb6886d7ad7bdb58 https://git.kernel.org/stable/c/d67e0d6bd92ebbb0294e7062bbf5cdc773764e62 rh#2266614 |
CVE-2021-47049 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47049 SMASH Issue 395496 bnc#1220692 https://git.kernel.org/stable/c/2728f289b3270b0e273292b46c534421a33bbfd5 https://git.kernel.org/stable/c/3e9bf43f7f7a46f21ec071cb47be92d0874c48da https://git.kernel.org/stable/c/d5c7b42c9f56ca46b286daa537d181bd7f69214f https://git.kernel.org/stable/c/f37dd5d1b5d38a79a4f7b8dd7bbb705505f05560 rh#2267016 |
CVE-2021-47050 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47050 SMASH Issue 395497 bnc#1220762 https://git.kernel.org/stable/c/59e27d7c94aa02da039b000d33c304c179395801 https://git.kernel.org/stable/c/71bcc1b4a1743534d8abdcb57ff912e6bc390438 https://git.kernel.org/stable/c/a74cb41af7dbe019e4096171f8bc641c7ce910ad https://git.kernel.org/stable/c/e16acc3a37f09e18835dc5d8014942c2ef6ca957 rh#2266735 |
CVE-2021-47051 | kernel-source-rt:Not affected | moderate | () | CVE-2021-47051 SMASH Issue 395498 bnc#1220764 https://git.kernel.org/stable/c/4a01ad002d2e03c399af536562693752af7c81b1 https://git.kernel.org/stable/c/6a2b5cee0d31ab6cc51030c441135b0e31217282 https://git.kernel.org/stable/c/a03675497970a93fcf25d81d9d92a59c2d7377a7 https://git.kernel.org/stable/c/b8207bfc539cd07d15e753ff2d179c5b61c673b1 https://git.kernel.org/stable/c/ce02e58ddf8658a4c3bed2296f32a5873b3f7cce rh#2266728 |
CVE-2021-47052 | kernel-source-rt:Not affected | moderate | () | CVE-2021-47052 SMASH Issue 395499 bnc#1220765 https://git.kernel.org/stable/c/0e596b3734649041ed77edc86a23c0442bbe062b https://git.kernel.org/stable/c/854b7737199848a91f6adfa0a03cf6f0c46c86e8 https://git.kernel.org/stable/c/b7bd0657c2036add71981d88a7fae50188150b6e https://git.kernel.org/stable/c/dfd6443bf49ac17adf882ca46c40c506a0284bd6 rh#2266722 |
CVE-2021-47053 | kernel-source-rt:Not affected | moderate | () | CVE-2021-47053 SMASH Issue 395500 bnc#1220766 https://git.kernel.org/stable/c/2c67a9333da9d0a3b87310e0d116b7c9070c7b00 https://git.kernel.org/stable/c/50274b01ac1689b1a3f6bc4b5b3dbf361a55dd3a https://git.kernel.org/stable/c/c633e025bd04f54d7b33331cfcdb71354b08ce59 https://git.kernel.org/stable/c/d3d702084d125689edb2b9395c707e09b471352e rh#2266720 |
CVE-2021-47055 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47055 SMASH Issue 395866 bnc#1220768 https://git.kernel.org/stable/c/077259f5e777c3c8821f6b41dee709fcda27306b https://git.kernel.org/stable/c/1e97743fd180981bef5f01402342bb54bf1c6366 https://git.kernel.org/stable/c/5880afefe0cb9b2d5e801816acd58bfe91a96981 https://git.kernel.org/stable/c/75ed985bd6c8ac1d4e673e93ea9d96c9908c1d37 https://git.kernel.org/stable/c/7b6552719c0ccbbea29dde4be141da54fdb5877e https://git.kernel.org/stable/c/9625b00cac6630479c0ff4b9fafa88bee636e1f0 https://git.kernel.org/stable/c/a08799d3e8c8088640956237c183f83463c39668 https://git.kernel.org/stable/c/f4d28d8b9b0e7c4ae04214b8d7e0b0466ec6bcaf https://git.kernel.org/stable/c/f73b29819c6314c0ba8b7d5892dfb03487424bee rh#2267185 |
CVE-2021-47056 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47056 SMASH Issue 395867 bnc#1220769 https://git.kernel.org/stable/c/05ec8192ee4bfdf2a8894a68350dac9f1a155fa6 https://git.kernel.org/stable/c/09d16cee6285d37cc76311c29add6d97a7e4acda https://git.kernel.org/stable/c/1ea500ce6f7c9106e4a561d28e69215f3d451818 https://git.kernel.org/stable/c/1f50392650ae794a1aea41c213c6a3e1c824413c https://git.kernel.org/stable/c/20fd40fc6f2c2b41dc6f637f88d494b14e9c21f1 https://git.kernel.org/stable/c/446045cf682af12d9294765f6c46084b374b5654 https://git.kernel.org/stable/c/8609f5cfdc872fc3a462efa6a3eca5cb1e2f6446 https://git.kernel.org/stable/c/f4c4e07140687f42bfa40e091bb4a55d7960ce4d rh#2267183 |
CVE-2021-47057 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47057 SMASH Issue 395868 bnc#1220780 https://git.kernel.org/stable/c/617ec35ed51f731a593ae7274228ef2cfc9cb781 https://git.kernel.org/stable/c/6516cb852d704ff8d615de1f93cd443a99736c3d https://git.kernel.org/stable/c/98b5ef3e97b16eaeeedb936f8bda3594ff84a70e https://git.kernel.org/stable/c/e1f2d739849c3239df1ea3f97d40bade4b808410 rh#2267181 |
CVE-2021-47058 | kernel-source-rt:Already fixed | moderate | 5.1 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H) | CVE-2021-47058 SMASH Issue 395869 bnc#1220779 https://git.kernel.org/stable/c/2dc1554d5f0fdaf47cc5bea442b84b9226fea867 https://git.kernel.org/stable/c/b9e569ae1da3a113b3acee8703c94777fd20938a https://git.kernel.org/stable/c/c764e375ae647832de1ee73d43a4bb3ef8a8f43d https://git.kernel.org/stable/c/d8897f7b2283a500666c85ef06e820df38ed7b52 https://git.kernel.org/stable/c/e41a962f82e7afb5b1ee644f48ad0b3aee656268 https://git.kernel.org/stable/c/eb949f891226c012138ffd9df90d1e509f428ae6 rh#2267179 |
CVE-2021-47059 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47059 SMASH Issue 395870 bnc#1220781 https://git.kernel.org/stable/c/1dbc6a1e25be8575d6c4114d1d2b841a796507f7 https://git.kernel.org/stable/c/1f12aaf07f61122cf5074d29714ee26f8d44b0e7 https://git.kernel.org/stable/c/50e7b39b808430ad49a637dc6fb72ca93b451b13 https://git.kernel.org/stable/c/ca065a93699f8cf3f42c60eefed73086007e928e rh#2267177 |
CVE-2021-47062 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47062 SMASH Issue 395873 bnc#1220747 https://git.kernel.org/stable/c/ba7bf5d6336aa9c0d977b161bfa420c56d46ee40 https://git.kernel.org/stable/c/bd0cced2ae93195668f983d443f7f17e8efd24d2 https://git.kernel.org/stable/c/c36b16d29f3af5f32fc1b2a3401bf48f71cabee1 rh#2267171 |
CVE-2021-47063 | kernel-source-rt:Already fixed | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47063 SMASH Issue 395874 bnc#1220777 https://git.kernel.org/stable/c/18149b420c9bd93c443e8d1f48a063d71d9f6aa1 https://git.kernel.org/stable/c/4d906839d321c2efbf3fed4bc31ffd9ff55b75c0 https://git.kernel.org/stable/c/98d7d76a74e48ec3ddf2e23950adff7edcab9327 https://git.kernel.org/stable/c/ce450934a00cf896e648fde08d0bd1426653d7a2 rh#2267169 |
CVE-2021-47064 | kernel-source-rt:Not affected | low | 3.6 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L) | CVE-2021-47064 SMASH Issue 395875 bnc#1220741 https://git.kernel.org/stable/c/91b9548d413fda488ea853cd1b9f59b572db3a0c https://git.kernel.org/stable/c/9b68ce2856dadc0e1cb6fd21fbeb850da49efd08 https://git.kernel.org/stable/c/9fa26701cd1fc4d932d431971efc5746325bdfce https://git.kernel.org/stable/c/b4403cee6400c5f679e9c4a82b91d61aa961eccf rh#2267167 |
CVE-2021-47065 | kernel-source-rt:Already fixed | moderate | 6.3 (CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H) | CVE-2021-47065 SMASH Issue 395876 bnc#1220749 https://git.kernel.org/stable/c/2ff25985ea9ccc6c9af2c77b0b49045adcc62e0e https://git.kernel.org/stable/c/5f3dbced8eaa5c9ed7d6943f3fea99f235a6516a https://git.kernel.org/stable/c/6b5aa0cf321c25f41e09a61c83ee4dc7ab9549cb https://git.kernel.org/stable/c/95fb153c6027924cda3422120169d1890737f3a0 https://git.kernel.org/stable/c/9cd09722e18a08b6a3d68b8bccfac39ddc22434c rh#2267165 |
CVE-2021-47066 | kernel-source-rt:Not affected | moderate | 5.1 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H) | CVE-2021-47066 SMASH Issue 395877 bnc#1220782 https://git.kernel.org/stable/c/29ffa50f33de824b5491f8239c88c4a0efdd03af https://git.kernel.org/stable/c/53f8208e11abd6dde9480dfcb97fecdb1bc2ac18 https://git.kernel.org/stable/c/cab2e8e5997b592fdb7d02cf2387b4b8e3057174 https://git.kernel.org/stable/c/ceaf2966ab082bbc4d26516f97b3ca8a676e2af8 rh#2267162 |
CVE-2021-47067 | kernel-source-rt:Not affected | moderate | 4.3 (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47067 SMASH Issue 395878 bnc#1220750 https://git.kernel.org/stable/c/a1ad124c836816fac8bd5e461d36eaf33cee4e24 https://git.kernel.org/stable/c/dc4452867200fa94589b382740952b58aa1c3e6c https://git.kernel.org/stable/c/ef85bb582c41524e9e68dfdbde48e519dac4ab3d https://git.kernel.org/stable/c/ff39adf5d31c72025bba799aec69c5c86d81d549 rh#2267192 |
CVE-2021-47068 | kernel-source-rt:Already fixed | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47068 L3:68040 SMASH Issue 395879 bnc#1220739 bnc#1221130 https://git.kernel.org/stable/c/18175fe17ae043a0b81e5d511f8817825784c299 https://git.kernel.org/stable/c/18ae4a192a4496e48a5490b52812645d2413307c https://git.kernel.org/stable/c/26157c82ba756767b2bd66d28a71b1bc454447f6 https://git.kernel.org/stable/c/374cdde4dcc9c909a60713abdbbf96d5e3e09f91 https://git.kernel.org/stable/c/48fba458fe54cc2a980a05c13e6c19b8b2cfb610 https://git.kernel.org/stable/c/6b7021ed36dabf29e56842e3408781cd3b82ef6e https://git.kernel.org/stable/c/c61760e6940dd4039a7f5e84a6afc9cdbf4d82b6 https://git.kernel.org/stable/c/ccddad6dd28530e716448e594c9ca7c76ccd0570 https://git.kernel.org/stable/c/e32352070bcac22be6ed8ab635debc280bb65b8c rh#2267190 |
CVE-2021-47069 | kernel-source-rt:Already fixed | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47069 SMASH Issue 396007 bnc#1220826 https://git.kernel.org/stable/c/4528c0c323085e645b8765913b4a7fd42cf49b65 https://git.kernel.org/stable/c/807fa14536b26803b858da878b643be72952a097 https://git.kernel.org/stable/c/a11ddb37bf367e6b5239b95ca759e5389bb46048 rh#2267513 |
CVE-2021-47070 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2021-47070 SMASH Issue 396008 bnc#1220829 https://git.kernel.org/stable/c/0b0226be3a52dadd965644bc52a807961c2c26df https://git.kernel.org/stable/c/5f59240cf25b2f7a0fdffc2701482a70310fec07 rh#2267516 |
CVE-2021-47071 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2021-47071 SMASH Issue 396009 bnc#1220846 https://git.kernel.org/stable/c/3ee098f96b8b6c1a98f7f97915f8873164e6af9d https://git.kernel.org/stable/c/53486c467e356e06aa37047c984fccd64d78c827 https://git.kernel.org/stable/c/cdd91637d4ef33e2be19a8e16e72e7d00c996d76 https://git.kernel.org/stable/c/d84b5e912212b05f6b5bde9f682046accfbe0354 rh#2267373 |
CVE-2021-47072 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47072 SMASH Issue 396010 bnc#1220847 https://git.kernel.org/stable/c/54a40fc3a1da21b52dbf19f72fdc27a2ec740760 https://git.kernel.org/stable/c/6d0924c5b742036b4f20a0ffdf2b6cf3f963f5f6 rh#2267370 |
CVE-2021-47073 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47073 SMASH Issue 396011 bnc#1220850 https://git.kernel.org/stable/c/0cf036a0d325200e6c27b90908e51195bbc557b1 https://git.kernel.org/stable/c/3a53587423d25c87af4b4126a806a0575104b45e https://git.kernel.org/stable/c/6fa78a6b9a3beb676a010dc489c1257f7e432525 https://git.kernel.org/stable/c/75cfc833da4a2111106d4c134e93e0c7f41e35e7 https://git.kernel.org/stable/c/8d746ea7c687bab060a2c05a35c449302406cd52 rh#2267518 |
CVE-2021-47075 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2021-47075 SMASH Issue 396013 bnc#1220856 https://git.kernel.org/stable/c/4720f29acb3fe67aa8aa71e6b675b079d193aaeb https://git.kernel.org/stable/c/afb680ed7ecbb7fd66ddb43650e9b533fd8b4b9a https://git.kernel.org/stable/c/fec356a61aa3d3a66416b4321f1279e09e0f256f jsc#CAR-3178 rh#2267523 |
CVE-2021-47077 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47077 SMASH Issue 396015 bnc#1220861 https://git.kernel.org/stable/c/11014efcec378bb0050a6cf08eaf375e3693400a https://git.kernel.org/stable/c/73578af92a0fae6609b955fcc9113e50e413c80f https://git.kernel.org/stable/c/a6362a737572f66051deb7637f3f77ddf7a4402f rh#2267527 |
CVE-2021-47079 | kernel-source-rt:Not affected | moderate | () | CVE-2021-47079 SMASH Issue 396017 bnc#1220841 https://git.kernel.org/stable/c/beab753fe3b4e087411a850a64c6cd748544d8a1 https://git.kernel.org/stable/c/ff67dbd554b2aaa22be933eced32610ff90209dd rh#2267531 |
CVE-2021-47080 | kernel-source-rt:Not affected | moderate | () | CVE-2021-47080 SMASH Issue 396018 bnc#1220842 https://git.kernel.org/stable/c/54d87913f147a983589923c7f651f97de9af5be1 https://git.kernel.org/stable/c/66ab7fcdac34b890017f04f391507ef5b2b89a13 https://git.kernel.org/stable/c/e6871b4270c05f8b212e7d98aee82b357972c80a rh#2267533 |
CVE-2021-47081 | kernel-source-rt:Not affected | moderate | () | CVE-2021-47081 SMASH Issue 396019 bnc#1220844 https://git.kernel.org/stable/c/115726c5d312b462c9d9931ea42becdfa838a076 https://git.kernel.org/stable/c/b49f5af30b0e4064fbd91e83823a4bfcb2c7a3e7 rh#2267535 |
CVE-2021-47084 | kernel-source-rt:Not affected | moderate | 4.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L) | CVE-2021-47084 SMASH Issue 396230 bnc#1220922 https://git.kernel.org/stable/c/3e0588c291d6ce225f2b891753ca41d45ba42469 https://git.kernel.org/stable/c/450121075a6a6f1d50f97225d3396315309d61a1 https://git.kernel.org/stable/c/896193a02a2981e60c40d4614fd095ce92135ccd https://git.kernel.org/stable/c/8a1a314965a17c62084a056b4f2cb7a770854c90 https://git.kernel.org/stable/c/b5b193d0c67180fefdc664650138e3b7959df615 https://git.kernel.org/stable/c/cb6c99aedd2c843056a598a8907a6128cb07603b https://git.kernel.org/stable/c/eaa816a86e629cbcc0a94f38391fee09231628c7 https://git.kernel.org/stable/c/ef5f7bfa19e3fc366f4c6d1a841ceaddf7a9f5d4 rh#2267941 |
CVE-2021-47085 | kernel-source-rt:Ignore | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47085 SMASH Issue 396231 bnc#1220951 https://git.kernel.org/stable/c/03d00f7f1815ec00dab5035851b3de83afd054a8 https://git.kernel.org/stable/c/371a874ea06f147d6ca30be43dad33683965eba6 https://git.kernel.org/stable/c/7dd52af1eb5798f590d9d9e1c56ed8f5744ee0ca https://git.kernel.org/stable/c/83ba6ec97c74fb1a60f7779a26b6a94b28741d8a https://git.kernel.org/stable/c/a5c6a13e9056d87805ba3042c208fbd4164ad22b https://git.kernel.org/stable/c/a7b0ae2cc486fcb601f9f9d87d98138cc7b7f7f9 https://git.kernel.org/stable/c/b2f37aead1b82a770c48b5d583f35ec22aabb61e https://git.kernel.org/stable/c/b68f41c6320b2b7fbb54a95f07a69f3dc7e56c59 rh#2267940 |
CVE-2021-47086 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47086 SMASH Issue 396232 bnc#1220952 https://git.kernel.org/stable/c/0bbdd62ce9d44f3a22059b3d20a0df977d9f6d59 https://git.kernel.org/stable/c/311601f114859d586d5ef8833d60d3aa23282161 https://git.kernel.org/stable/c/48c76fc53582e7f13c1e0b11c916e503256c4d0b https://git.kernel.org/stable/c/52ad5da8e316fa11e3a50b3f089aa63e4089bf52 https://git.kernel.org/stable/c/53ccdc73eedaf0e922c45b569b797d2796fbaafa https://git.kernel.org/stable/c/75a2f31520095600f650597c0ac41f48b5ba0068 https://git.kernel.org/stable/c/982b6ba1ce626ef87e5c29f26f2401897554f235 https://git.kernel.org/stable/c/b10c7d745615a092a50c2e03ce70446d2bec2aca rh#2267939 |
CVE-2021-47087 | kernel-source-rt:Not affected | moderate | 5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) | CVE-2021-47087 SMASH Issue 396233 bnc#1220954 https://git.kernel.org/stable/c/18549bf4b21c739a9def39f27dcac53e27286ab5 https://git.kernel.org/stable/c/806142c805cacd098e61bdc0f72c778a2389fe4a https://git.kernel.org/stable/c/91e94e42f6fc49635f1a16d8ae3f79552bcfda29 https://git.kernel.org/stable/c/ad338d825e3f7b96ee542bf313728af2d19fe9ad rh#2267938 |
CVE-2021-47088 | kernel-source-rt:Not affected | important | () | CVE-2021-47088 SMASH Issue 396234 bnc#1220956 https://git.kernel.org/stable/c/330c6117a82c16a9a365a51cec5c9ab30b13245c https://git.kernel.org/stable/c/34796417964b8d0aef45a99cf6c2d20cebe33733 rh#2267937 |
CVE-2021-47089 | kernel-source-rt:Not affected | low | 4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-47089 SMASH Issue 396235 bnc#1220958 https://git.kernel.org/stable/c/0129ab1f268b6cf88825eae819b9b84aa0a85634 https://git.kernel.org/stable/c/2f06c8293d27f6337f907042c602c9c953988c48 rh#2267936 |
CVE-2021-47090 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47090 SMASH Issue 396236 bnc#1220948 https://git.kernel.org/stable/c/1f207076740101fed87074a6bc924dbe806f08a5 https://git.kernel.org/stable/c/2a57d83c78f889bf3f54eede908d0643c40d5418 https://git.kernel.org/stable/c/c691e7575eff76e563b0199c23ec46bd454f43e3 rh#2267935 |
CVE-2021-47091 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47091 SMASH Issue 396237 bnc#1220959 https://git.kernel.org/stable/c/87a270625a89fc841f1a7e21aae6176543d8385c https://git.kernel.org/stable/c/ac61b9c6c0549aaeb98194cf429d93c41bfe5f79 https://git.kernel.org/stable/c/c1d1ec4db5f7264cfc21993e59e8f2dcecf4b44f rh#2267934 |
CVE-2021-47092 | kernel-source-rt:Not affected | low | 3.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L) | CVE-2021-47092 SMASH Issue 396238 bnc#1220950 https://git.kernel.org/stable/c/a80dfc025924024d2c61a4c1b8ef62b2fce76a04 https://git.kernel.org/stable/c/e4e4e7cb229821cd215031abc47efdab5486a67c rh#2267932 |
CVE-2021-47093 | kernel-source-rt:Not affected | moderate | 6 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H) | CVE-2021-47093 SMASH Issue 396239 bnc#1220978 https://git.kernel.org/stable/c/26a8b09437804fabfb1db080d676b96c0de68e7c https://git.kernel.org/stable/c/7a37f2e370699e2feca3dca6c8178c71ceee7e8a https://git.kernel.org/stable/c/9ca1324755f1f8629a370af5cc315b175331f5d1 rh#2267931 |
CVE-2021-47094 | kernel-source-rt:Not affected | important | 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H) | CVE-2021-47094 SMASH Issue 396240 bnc#1221551 bnc#1222401 https://git.kernel.org/stable/c/3a0f64de479cae75effb630a2e0a237ca0d0623c https://git.kernel.org/stable/c/d884eefd75cc54887bc2e9e724207443525dfb2c rh#2267929 |
CVE-2021-47095 | kernel-source-rt:Not affected | moderate | 5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47095 SMASH Issue 396241 bnc#1220979 https://git.kernel.org/stable/c/1f6ab847461ce7dd89ae9db2dd4658c993355d7c https://git.kernel.org/stable/c/34f35f8f14bc406efc06ee4ff73202c6fd245d15 https://git.kernel.org/stable/c/77a7311ca167aa5b7055c549a940a56e73ee5f29 https://git.kernel.org/stable/c/8efd6a3391f7b0b19fb0c38e50add06ca30c94af rh#2267928 |
CVE-2021-47096 | kernel-source-rt:Not affected | low | 4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) | CVE-2021-47096 SMASH Issue 396242 bnc#1220981 https://git.kernel.org/stable/c/39a8fc4971a00d22536aeb7d446ee4a97810611b https://git.kernel.org/stable/c/b398fcbe4de1e1100867fdb6f447c6fbc8fe7085 rh#2267927 |
CVE-2021-47097 | kernel-source-rt:Not affected | low | 4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-47097 SMASH Issue 396243 bnc#1220982 https://git.kernel.org/stable/c/1d72d9f960ccf1052a0630a68c3d358791dbdaaa https://git.kernel.org/stable/c/676c572439e58b7ee6b7ca3f1e5595382921045c https://git.kernel.org/stable/c/a7f95328c6f0afffdc4555f16e3bbab8bbf0d9be https://git.kernel.org/stable/c/dfd5b60b5342b6b505a104e48f08ad9b9bdbbd7b rh#2267925 |
CVE-2021-47098 | kernel-source-rt:Not affected | moderate | () | CVE-2021-47098 SMASH Issue 396244 bnc#1220983 https://git.kernel.org/stable/c/55840b9eae5367b5d5b29619dc2fb7e4596dba46 https://git.kernel.org/stable/c/d105f30bea9104c590a9e5b495cb8a49bdfe405f rh#2267920 |
CVE-2021-47099 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47099 SMASH Issue 396245 bnc#1220955 https://git.kernel.org/stable/c/9695b7de5b4760ed22132aca919570c0190cb0ce https://git.kernel.org/stable/c/d2269ae48598e05b59ec9ea9e6e44fd33941130d rh#2267919 |
CVE-2021-47102 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47102 SMASH Issue 396248 bnc#1221009 https://git.kernel.org/stable/c/2efc2256febf214e7b2bdaa21fe6c3c3146acdcb https://git.kernel.org/stable/c/5c553a0cd1263e4da5f220d80fa713fc3959c1d0 rh#2267915 |
CVE-2021-47104 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2021-47104 SMASH Issue 396253 bnc#1220960 https://git.kernel.org/stable/c/0aaec9c5f60754b56f84460ea439b8c5e91f4caa https://git.kernel.org/stable/c/1ced0a3015a95c6a6db45e37250912c4c86697ab https://git.kernel.org/stable/c/76b648063eb36c72dfc0a6896de8a0a7d2c7841c https://git.kernel.org/stable/c/79dcbd8176152b860028b62f81a635d987365752 https://git.kernel.org/stable/c/7cf6466e00a77b0a914b7b2c28a1fc7947d55e59 https://git.kernel.org/stable/c/aefcc25f3a0cd28a87d11d41d30419a12cd26a34 https://git.kernel.org/stable/c/bee90911e0138c76ee67458ac0d58b38a3190f65 https://git.kernel.org/stable/c/d53456492b5d02033c73dfa0f3b94c86337791ba rh#2267828 |
CVE-2021-47105 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-47105 SMASH Issue 396254 bnc#1220961 https://git.kernel.org/stable/c/ad6d20da2cfbe14b7b1200d15f39e65988b0b9e8 https://git.kernel.org/stable/c/afe8a3ba85ec2a6b6849367e25c06a2f8e0ddd05 jsc#CAR-3193 rh#2267912 |
CVE-2021-47106 | kernel-source-rt:Not affected | moderate | 6.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H) | CVE-2021-47106 SMASH Issue 396255 bnc#1220962 https://git.kernel.org/stable/c/0f7d9b31ce7abdbb29bf018131ac920c9f698518 https://git.kernel.org/stable/c/9d558e5f0d6fdd0a568f73dceb0b40c4f5012e5a rh#2267829 |
CVE-2021-47107 | kernel-source-rt:Not affected | moderate | 6.3 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) | CVE-2021-47107 SMASH Issue 396256 bnc#1220965 https://git.kernel.org/stable/c/53b1119a6e5028b125f431a0116ba73510d82a72 https://git.kernel.org/stable/c/9e291a6a28d32545ed2fd959a8165144d1724df1 https://git.kernel.org/stable/c/eabc0aab98e5218ceecd82069b0d6fdfff5ee885 rh#2267911 |
CVE-2021-47108 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47108 SMASH Issue 396257 bnc#1220986 https://git.kernel.org/stable/c/3b8e19a0aa3933a785be9f1541afd8d398c4ec69 https://git.kernel.org/stable/c/71d07ebc5000b9c1d140e99e7493b0bafa954776 rh#2267910 |
CVE-2021-47110 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47110 SMASH Issue 397844 bnc#1221532 https://git.kernel.org/stable/c/1df2dc09926f61319116c80ee85701df33577d70 https://git.kernel.org/stable/c/3b0becf8b1ecf642a9edaf4c9628ffc641e490d6 https://git.kernel.org/stable/c/9084fe1b3572664ad276f427dce575f580c9799a https://git.kernel.org/stable/c/c02027b5742b5aa804ef08a4a9db433295533046 rh#2269873 |
CVE-2021-47111 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47111 SMASH Issue 397845 bnc#1221536 https://git.kernel.org/stable/c/107866a8eb0b664675a260f1ba0655010fac1e08 https://git.kernel.org/stable/c/6b53db8c4c14b4e7256f058d202908b54a7b85b4 https://git.kernel.org/stable/c/caec9bcaeb1a5f03f2d406305355c853af10c13e rh#2269871 |
CVE-2021-47112 | kernel-source-rt:Already fixed | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-47112 SMASH Issue 397846 bnc#1221541 https://git.kernel.org/stable/c/38b858da1c58ad46519a257764e059e663b59ff2 https://git.kernel.org/stable/c/7620a669111b52f224d006dea9e1e688e2d62c54 https://git.kernel.org/stable/c/8b79feffeca28c5459458fe78676b081e87c93a4 https://git.kernel.org/stable/c/d1629b5b925de9b27979e929dae7fcb766daf6b6 rh#2269869 |
CVE-2021-47114 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47114 SMASH Issue 397848 bnc#1221548 https://git.kernel.org/stable/c/0a31dd6fd2f4e7db538fb6eb1f06973d81f8dd3b https://git.kernel.org/stable/c/33e03adafb29eedae1bae9cdb50c1385279fcf65 https://git.kernel.org/stable/c/624fa7baa3788dc9e57840ba5b94bc22b03cda57 https://git.kernel.org/stable/c/6bba4471f0cc1296fe3c2089b9e52442d3074b2e https://git.kernel.org/stable/c/a1700479524bb9cb5e8ae720236a6fabd003acae https://git.kernel.org/stable/c/c8d5faee46242c3f33b8a71a4d7d52214785bfcc https://git.kernel.org/stable/c/cc2edb99ea606a45182b5ea38cc8f4e583aa0774 https://git.kernel.org/stable/c/cec4e857ffaa8c447f51cd8ab4e72350077b6770 rh#2269865 |
CVE-2021-47115 | kernel-source-rt:Ignore | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47115 SMASH Issue 397849 bnc#1221572 https://git.kernel.org/stable/c/0c4559736d9a4ec1ca58ba98ca34e7c4da4c422b https://git.kernel.org/stable/c/39c15bd2e5d11bcf7f4c3dba2aad9e1e110a5d94 https://git.kernel.org/stable/c/48ee0db61c8299022ec88c79ad137f290196cac2 https://git.kernel.org/stable/c/4ac06a1e013cf5fdd963317ffd3b968560f33bba https://git.kernel.org/stable/c/5d4c4b06ed9fb7a69d0b2e2a73fc73226d25ab70 https://git.kernel.org/stable/c/93e4ac2a9979a9a4ecc158409ed9c3044dc0ae1f https://git.kernel.org/stable/c/eb6875d48590d8e564092e831ff07fa384d7e477 https://git.kernel.org/stable/c/ffff05b9ee5c74c04bba2801c1f99b31975d74d9 rh#2269863 |
CVE-2021-47116 | kernel-source-rt:Not affected | moderate | () | CVE-2021-47116 SMASH Issue 397850 bnc#1221574 https://git.kernel.org/stable/c/04fb2baa0b147f51db065a1b13a11954abe592d0 https://git.kernel.org/stable/c/2050c6e5b161e5e25ce3c420fef58b24fa388a49 https://git.kernel.org/stable/c/a8867f4e3809050571c98de7a2d465aff5e4daf5 rh#2269861 |
CVE-2021-47117 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47117 SMASH Issue 397851 bnc#1221575 https://git.kernel.org/stable/c/082cd4ec240b8734a82a89ffb890216ac98fec68 https://git.kernel.org/stable/c/48105dc98c9ca35af418746277b087cb2bc6df7c https://git.kernel.org/stable/c/569496aa3776eea1ff0d49d0174ac1b7e861e107 https://git.kernel.org/stable/c/5b3a9a2be59478b013a430ac57b0f3d65471b071 https://git.kernel.org/stable/c/920697b004e49cb026e2e15fe91be065bf0741b7 https://git.kernel.org/stable/c/d3b668b96ad3192c0581a248ae2f596cd054792a https://git.kernel.org/stable/c/d8116743ef5432336289256b2f7c117299213eb9 https://git.kernel.org/stable/c/e33bafad30d34cfa5e9787cb099cab05e2677fcb rh#2269859 |
CVE-2021-47118 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47118 SMASH Issue 397852 bnc#1221605 https://git.kernel.org/stable/c/0711f0d7050b9e07c44bc159bbc64ac0a1022c7f https://git.kernel.org/stable/c/2cd6eedfa6344f5ef5c3dac3aee57a39b5b46dff https://git.kernel.org/stable/c/4dbd8808a591b49b717862e6e0081bcf14a87788 https://git.kernel.org/stable/c/7178be006d495ffb741c329012da289b62dddfe6 https://git.kernel.org/stable/c/764c2e892d1fe895392aff62fb353fdce43bb529 https://git.kernel.org/stable/c/b8ff869f20152fbe66b6c2e2715d26a2f9897cca https://git.kernel.org/stable/c/d106f05432e60f9f62d456ef017687f5c73cb414 https://git.kernel.org/stable/c/f86c80515a8a3703e0ca2e56deb50fc2879c5ea4 rh#2269856 |
CVE-2021-47119 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47119 SMASH Issue 397853 bnc#1221608 https://git.kernel.org/stable/c/01d349a481f0591230300a9171330136f9159bcd https://git.kernel.org/stable/c/1385b23396d511d5233b8b921ac3058b3f86a5e1 https://git.kernel.org/stable/c/afd09b617db3786b6ef3dc43e28fe728cfea84df rh#2269854 |
CVE-2021-47120 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47120 SMASH Issue 397854 bnc#1221606 https://git.kernel.org/stable/c/368c5d45a87e1bcc7f1e98e0c255c37b7b12c5d6 https://git.kernel.org/stable/c/4b4f6cecca446abcb686c6e6c451d4f1ec1a7497 https://git.kernel.org/stable/c/9cf27473f21913a3eaf4702dd2a25415afd5f33f https://git.kernel.org/stable/c/b5d013c4c76b276890135b5d32803c4c63924b77 rh#2269850 |
CVE-2021-47121 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47121 SMASH Issue 397855 bnc#1221535 https://git.kernel.org/stable/c/46403c1f80b0d3f937ff9c4f5edc63bb64bc5051 https://git.kernel.org/stable/c/4d94f530cd24c85aede6e72b8923f371b45d6886 https://git.kernel.org/stable/c/7f5d86669fa4d485523ddb1d212e0a2d90bd62bb https://git.kernel.org/stable/c/81afc61cb6e2b553f2c5f992fa79e0ae73857141 https://git.kernel.org/stable/c/9ea0ab48e755d8f29fe89eb235fb86176fdb597f https://git.kernel.org/stable/c/cc302e30a504e6b60a9ac8df7988646f46cd0294 https://git.kernel.org/stable/c/dde8686985ec24d6b00487080a906609bd613ea1 https://git.kernel.org/stable/c/e8b37f5009ea7095529790f022859711e6939c76 rh#2269848 |
CVE-2021-47122 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47122 SMASH Issue 397856 bnc#1221537 https://git.kernel.org/stable/c/3be863c11cab725add9fef4237ed4e232c3fc3bb https://git.kernel.org/stable/c/4bca2034b41c15b62d47a19158bb76235fd4455d https://git.kernel.org/stable/c/6a0e317f61094d377335547e015dd2ff12caf893 https://git.kernel.org/stable/c/9348c1f10932f13b299cbc8b1bd5f780751fae49 https://git.kernel.org/stable/c/af2806345a37313f01b1c9f15e046745b8ee2daa https://git.kernel.org/stable/c/b042e2b2039565eb8f0eb51c14fbe1ef463c8cd8 https://git.kernel.org/stable/c/b53558a950a89824938e9811eddfc8efcd94e1bb https://git.kernel.org/stable/c/f52f4fd67264c70cd0b4ba326962ebe12d9cba94 rh#2269845 |
CVE-2021-47123 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47123 SMASH Issue 397857 bnc#1221547 bnc#1221758 https://git.kernel.org/stable/c/1f64f5e903b9d1d157875721e02adadc9d6f0a5d https://git.kernel.org/stable/c/447c19f3b5074409c794b350b10306e1da1ef4ba rh#2269843 |
CVE-2021-47124 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47124 SMASH Issue 397858 bnc#1221549 https://git.kernel.org/stable/c/0b2a990e5d2f76d020cb840c456e6ec5f0c27530 https://git.kernel.org/stable/c/6f5d7a45f58d3abe3a936de1441b8d6318f978ff https://git.kernel.org/stable/c/876808dba2ff7509bdd7f230c4f374a0caf4f410 https://git.kernel.org/stable/c/a298232ee6b9a1d5d732aa497ff8be0d45b5bd82 https://git.kernel.org/stable/c/ff4a96ba5c8f9b266706280ff8021d2ef3f17e86 rh#2269841 |
CVE-2021-47125 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47125 SMASH Issue 397859 bnc#1221554 https://git.kernel.org/stable/c/2411c02d03892a5057499f8102d0cc1e0f852416 https://git.kernel.org/stable/c/944d671d5faa0d78980a3da5c0f04960ef1ad893 rh#2269839 |
CVE-2021-47127 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47127 SMASH Issue 397861 bnc#1221558 https://git.kernel.org/stable/c/1d34fa4fcf06649036ba0c97854fcf7a741ee18c https://git.kernel.org/stable/c/e102db780e1c14f10c70dafa7684af22a745b51d rh#2269834 |
CVE-2021-47128 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47128 SMASH Issue 397862 bnc#1221559 https://git.kernel.org/stable/c/acc43fc6cf0d50612193813c5906a1ab9d433e1e https://git.kernel.org/stable/c/ff40e51043af63715ab413995ff46996ecf9583f https://git.kernel.org/stable/c/ff5039ec75c83d2ed5b781dc7733420ee8c985fc rh#2269831 |
CVE-2021-47130 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47130 SMASH Issue 397864 bnc#1221552 https://git.kernel.org/stable/c/8a452d62e7cea3c8a2676a3b89a9118755a1a271 https://git.kernel.org/stable/c/bcd9a0797d73eeff659582f23277e7ab6e5f18f3 https://git.kernel.org/stable/c/c440cd080761b18a52cac20f2a42e5da1e3995af rh#2269826 |
CVE-2021-47132 | kernel-source-rt:Not affected | moderate | 6.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H) | CVE-2021-47132 SMASH Issue 397866 bnc#1221550 https://git.kernel.org/stable/c/b5941f066b4ca331db225a976dae1d6ca8cf0ae3 https://git.kernel.org/stable/c/b9c78b1a95966a7bd2ddae05b73eafc0cda4fba3 rh#2269818 |
CVE-2021-47133 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47133 SMASH Issue 397867 bnc#1221542 https://git.kernel.org/stable/c/29beadea66a226d744d5ffdcde6b984623053d24 https://git.kernel.org/stable/c/5ad755fd2b326aa2bc8910b0eb351ee6aece21b1 rh#2269816 |
CVE-2021-47134 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47134 SMASH Issue 397868 bnc#1221540 https://git.kernel.org/stable/c/5148066edbdc89c6fe5bc419c31a5c22e5f83bdb https://git.kernel.org/stable/c/668a84c1bfb2b3fd5a10847825a854d63fac7baa https://git.kernel.org/stable/c/8a7e8b4e5631a03ea2fee27957857a56612108ca rh#2269814 |
CVE-2021-47135 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47135 SMASH Issue 397869 bnc#1221560 https://git.kernel.org/stable/c/6919e8a24e70b6ba148fe07f44f835bcdd1a8d02 https://git.kernel.org/stable/c/d874e6c06952382897d35bf4094193cd44ae91bd rh#2269812 |
CVE-2021-47136 | kernel-source-rt:Not affected | moderate | 5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) | CVE-2021-47136 SMASH Issue 398783 bnc#1221931 https://git.kernel.org/stable/c/86ab133b695ed7ba1f8786b12f4ca43137ad8c18 https://git.kernel.org/stable/c/9453d45ecb6c2199d72e73c993e9d98677a2801b https://git.kernel.org/stable/c/ac493452e937b8939eaf2d24cac51a4804b6c20e rh#2271498 |
CVE-2021-47137 | kernel-source-rt:Not affected | moderate | 6.4 (CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H) | CVE-2021-47137 SMASH Issue 398784 bnc#1221932 https://git.kernel.org/stable/c/46dd4abced3cb2c912916f4a5353e0927db0c4a2 https://git.kernel.org/stable/c/5ac72351655f8b033a2935646f53b7465c903418 https://git.kernel.org/stable/c/8bb1077448d43a871ed667520763e3b9f9b7975d https://git.kernel.org/stable/c/c7718ee96dbc2f9c5fc3b578abdf296dd44b9c20 jsc#CAR-3248 rh#2271499 |
CVE-2021-47138 | kernel-source-rt:Already fixed | moderate | 4.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L) | CVE-2021-47138 SMASH Issue 398785 bnc#1221934 https://git.kernel.org/stable/c/02f03883fdb10ad7e66717c70ea163a8d27ae6e7 https://git.kernel.org/stable/c/0bf49b3c8d8b3a43ce09f1b2db70e5484d31fcdf https://git.kernel.org/stable/c/285207a558ab456aa7d8aa877ecc7e91fcc51710 https://git.kernel.org/stable/c/88c380df84fbd03f9b137c2b9d0a44b9f2f553b0 rh#2271484 |
CVE-2021-47139 | kernel-source-rt:Already fixed | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47139 SMASH Issue 398786 bnc#1221935 https://git.kernel.org/stable/c/0921a0620b5077796fddffb22a8e6bc635a4bb50 https://git.kernel.org/stable/c/a289a7e5c1d49b7d47df9913c1cc81fb48fab613 https://git.kernel.org/stable/c/a663c1e418a3b5b8e8edfad4bc8e7278c312d6fc rh#2271483 |
CVE-2021-47140 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47140 SMASH Issue 398787 bnc#1221930 https://git.kernel.org/stable/c/d6177a6556f853785867e2ec6d5b7f4906f0d809 https://git.kernel.org/stable/c/f3f2cf46291a693eab21adb94171b0128c2a9ec1 rh#2271482 |
CVE-2021-47141 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47141 SMASH Issue 398788 bnc#1221949 https://git.kernel.org/stable/c/5218e919c8d06279884aa0baf76778a6817d5b93 https://git.kernel.org/stable/c/5278c75266c5094d3c0958793bf12fc90300e580 https://git.kernel.org/stable/c/821149ee88c206fa37e79c1868cc270518484876 https://git.kernel.org/stable/c/da21a35c00ff1a1794d4f166d3b3fa8db4d0f6fb rh#2271481 |
CVE-2021-47142 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47142 SMASH Issue 398789 bnc#1221952 https://git.kernel.org/stable/c/0707c3fea8102d211631ba515ef2159707561b0d https://git.kernel.org/stable/c/1e5c37385097c35911b0f8a0c67ffd10ee1af9a2 https://git.kernel.org/stable/c/3293cf3513d69f00c14d43e2020826d45ea0e46a https://git.kernel.org/stable/c/7398c2aab4da960761ec182d04d6d5abbb4a226e https://git.kernel.org/stable/c/952ab3f9f48eb0e8050596d41951cf516be6b122 https://git.kernel.org/stable/c/a849e218556f932576c0fb1c5a88714b61709a17 https://git.kernel.org/stable/c/d4ea141fd4b40636a8326df5a377d9c5cf9b3faa https://git.kernel.org/stable/c/f98cdf084405333ee2f5be548a91b2d168e49276 rh#2271480 |
CVE-2021-47144 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47144 SMASH Issue 398791 bnc#1221989 https://git.kernel.org/stable/c/599e5d61ace952b0bb9bd942b198bbd0cfded1d7 https://git.kernel.org/stable/c/95a4ec905e51a30c64cf2d78b04a7acbeae5ca94 https://git.kernel.org/stable/c/9fdb8ed37a3a44f9c49372b69f87fd5f61cb3240 https://git.kernel.org/stable/c/dde2656e0bbb2ac7d83a7bd95a8d5c3c95bbc009 https://git.kernel.org/stable/c/fa7e6abc75f3d491bc561734312d065dc9dc2a77 rh#2271478 |
CVE-2021-47147 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47147 SMASH Issue 398794 bnc#1221975 https://git.kernel.org/stable/c/0e38e702f1152479e6afac34f151dbfd99417f99 https://git.kernel.org/stable/c/9c1bb37f8cad5e2ee1933fa1da9a6baa7876a8e4 rh#2271496 |
CVE-2021-47148 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47148 SMASH Issue 398795 bnc#1221976 https://git.kernel.org/stable/c/389146bc6d2bbb20714d06624b74856320ce40f7 https://git.kernel.org/stable/c/e5cc361e21648b75f935f9571d4003aaee480214 rh#2271495 |
CVE-2021-47149 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47149 SMASH Issue 398796 bnc#1221972 https://git.kernel.org/stable/c/22049c3d40f08facd1867548716a484dad6b3251 https://git.kernel.org/stable/c/52202be1cd996cde6e8969a128dc27ee45a7cb5e https://git.kernel.org/stable/c/6dbf1101594f7c76990b63c35b5a40205a914b6b https://git.kernel.org/stable/c/71723a796ab7881f491d663c6cd94b29be5fba50 https://git.kernel.org/stable/c/7883d3895d0fbb0ba9bff0f8665f99974b45210f https://git.kernel.org/stable/c/b92170e209f7746ed72eaac98f2c2f4b9af734e6 https://git.kernel.org/stable/c/c4f1c23edbe921ab2ecd6140d700e756cd44c5f7 https://git.kernel.org/stable/c/f14bf57a08779a5dee9936f63ada0149ea89c5e6 rh#2271488 |
CVE-2021-47151 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47151 SMASH Issue 398798 bnc#1221971 https://git.kernel.org/stable/c/4e3cea8035b6f1b9055e69cc6ebf9fa4e50763ae https://git.kernel.org/stable/c/93d1dbe7043b3c9492bdf396b2e98a008435b55b https://git.kernel.org/stable/c/a00593737f8bac2c9e97b696e7ff84a4446653e8 rh#2271485 |
CVE-2021-47152 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47152 SMASH Issue 398799 bnc#1221968 https://git.kernel.org/stable/c/18e7f0580da15cac1e79d73683ada5a9e70980f8 https://git.kernel.org/stable/c/29249eac5225429b898f278230a6ca2baa1ae154 https://git.kernel.org/stable/c/3267a061096efc91eda52c2a0c61ba76e46e4b34 rh#2271475 |
CVE-2021-47153 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47153 SMASH Issue 398800 bnc#1221969 https://git.kernel.org/stable/c/04cc05e3716ae31b17ecdab7bc55c8170def1b8b https://git.kernel.org/stable/c/09c9e79f4c10cfb6b9e0e1b4dd355232e4b5a3b3 https://git.kernel.org/stable/c/1f583d3813f204449037cd2acbfc09168171362a https://git.kernel.org/stable/c/b523feb7e8e44652f92f3babb953a976e7ccbbef https://git.kernel.org/stable/c/c70e1ba2e7e65255a0ce004f531dd90dada97a8c https://git.kernel.org/stable/c/dfa8929e117b0228a7765f5c3f5988a4a028f3c6 https://git.kernel.org/stable/c/e4d8716c3dcec47f1557024add24e1f3c09eb24b https://git.kernel.org/stable/c/f9469082126cebb7337db3992d143f5e4edfe629 rh#2271476 |
CVE-2021-47161 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47161 SMASH Issue 398814 bnc#1221966 https://git.kernel.org/stable/c/00450ed03a17143e2433b461a656ef9cd17c2f1d https://git.kernel.org/stable/c/10a089bae827ec30ad9b6cb7048020a62fae0cfa https://git.kernel.org/stable/c/12391be4724acc9269e1845ccbd881df37de4b56 https://git.kernel.org/stable/c/15d1cc4b4b585f9a2ce72c52cca004d5d735bdf1 https://git.kernel.org/stable/c/680ec0549a055eb464dce6ffb4bfb736ef87236e https://git.kernel.org/stable/c/fe6921e3b8451a537e01c031b8212366bb386e3e rh#2271460 |
CVE-2021-47164 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47164 SMASH Issue 398808 bnc#1221978 https://git.kernel.org/stable/c/2e4b0b95a489259f9d35a3db17023061f8f3d587 https://git.kernel.org/stable/c/83026d83186bc48bb41ee4872f339b83f31dfc55 https://git.kernel.org/stable/c/bdfd3593a8248eea6ecfcbf7b47b56b86515672d rh#2271451 |
CVE-2021-47165 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47165 SMASH Issue 398806 bnc#1221965 https://git.kernel.org/stable/c/4ce2bf20b4a6e307e114847d60b2bf40a6a1fac0 https://git.kernel.org/stable/c/7cfc4ea78fc103ea51ecbacd9236abb5b1c490d2 https://git.kernel.org/stable/c/b4298d33c1fcce511ffe84d8d3de07e220300f9b https://git.kernel.org/stable/c/b4b91033a0b11fe9ade58156cd9168f89f4a8c1a https://git.kernel.org/stable/c/d66083c0d6f5125a4d982aa177dd71ab4cd3d212 https://git.kernel.org/stable/c/e256a0eb43e17209e347409a80805b1659398d68 rh#2271448 |
CVE-2021-47166 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47166 L3:68117 L3:68118 L3:68119 L3:68120 L3:68123 L3:68126 L3:68151 SMASH Issue 398816 bnc#1221998 https://git.kernel.org/stable/c/0d0ea309357dea0d85a82815f02157eb7fcda39f https://git.kernel.org/stable/c/2fe1cac336b55a1f79e603e9ce3552c3623e90eb https://git.kernel.org/stable/c/40f139a6d50c232c0d1fd1c5e65a845c62db0ede https://git.kernel.org/stable/c/7087db95c0a06ab201b8ebfac6a7ec1e34257997 https://git.kernel.org/stable/c/785917316b25685c9b3a2a88f933139f2de75e33 https://git.kernel.org/stable/c/b291baae24f876acd5a5dd57d0bb2bbac8a68b0c https://git.kernel.org/stable/c/c757c1f1e65d89429db1409429436cf40d47c008 https://git.kernel.org/stable/c/e8b8418ce14ae66ee55179901edd12191ab06a9e rh#2271443 |
CVE-2021-47167 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47167 L3:68117 L3:68118 L3:68119 L3:68120 L3:68123 L3:68126 L3:68151 SMASH Issue 398817 bnc#1221991 https://git.kernel.org/stable/c/15ac6f14787649e8ebd75c142e2c5d2a243c8490 https://git.kernel.org/stable/c/1fc5f4eb9d31268ac3ce152d74ad5501ad24ca3e https://git.kernel.org/stable/c/56517ab958b7c11030e626250c00b9b1a24b41eb https://git.kernel.org/stable/c/ee21cd3aa8548e0cbc8c67a80b62113aedd2d101 rh#2271433 |
CVE-2021-47168 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47168 SMASH Issue 398818 bnc#1222002 https://git.kernel.org/stable/c/769b01ea68b6c49dc3cde6adf7e53927dacbd3a8 https://git.kernel.org/stable/c/945ebef997227ca8c20bad7f8a8358c8ee57a84a https://git.kernel.org/stable/c/9b367fe770b1b80d7bf64ed0d177544a44405f6e https://git.kernel.org/stable/c/9d280ab53df1d4a1043bd7a9e7c6a2f9cfbfe040 https://git.kernel.org/stable/c/b287521e9e94bb342ebe5fd8c3fd7db9aef4e6f1 https://git.kernel.org/stable/c/d34fb628f6ef522f996205a9e578216bbee09e84 https://git.kernel.org/stable/c/e411df81cd862ef3d5b878120b2a2fef0ca9cdb1 https://git.kernel.org/stable/c/f299522eda1566cbfbae4b15c82970fc41b03714 rh#2271432 |
CVE-2021-47169 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47169 SMASH Issue 398819 bnc#1222000 https://git.kernel.org/stable/c/016002848c82eeb5d460489ce392d91fe18c475c https://git.kernel.org/stable/c/1cc57cb32c84e059bd158494f746b665fc14d1b1 https://git.kernel.org/stable/c/1e04d5d5fe5e76af68f834e1941fcbfa439653be https://git.kernel.org/stable/c/35265552c7fe9553c75e324c80f45e28ff14eb6e https://git.kernel.org/stable/c/6a931ceb0b9401fe18d0c500e08164bf9cc7be4b https://git.kernel.org/stable/c/915452f40e2f495e187276c4407a4f567ec2307e https://git.kernel.org/stable/c/9b07b6973f7359e2dd6a9fe6db0c142634c823b7 https://git.kernel.org/stable/c/c697244ce940ec07e2d745ccb63ca97fc0266fbc rh#2271471 |
CVE-2021-47170 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47170 SMASH Issue 398820 bnc#1222004 https://git.kernel.org/stable/c/2ab21d6e1411999b5fb43434f421f00bf50002eb https://git.kernel.org/stable/c/2c835fede13e03f2743a333e4370b5ed2db91e83 https://git.kernel.org/stable/c/4f2629ea67e7225c3fd292c7fe4f5b3c9d6392de https://git.kernel.org/stable/c/8d83f109e920d2776991fa142bb904d985dca2ed https://git.kernel.org/stable/c/9f7cb3f01a10d9064cf13b3d26fb7e7a5827d098 rh#2271470 |
CVE-2021-47171 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47171 SMASH Issue 398821 bnc#1221994 https://git.kernel.org/stable/c/200dbfcad8011e50c3cec269ed7b980836eeb1fa https://git.kernel.org/stable/c/22c840596af0c09068b6cf948616e6496e59e07f https://git.kernel.org/stable/c/46a8b29c6306d8bbfd92b614ef65a47c900d8e70 https://git.kernel.org/stable/c/635ac38b36255d3cfb8312cf7c471334f4d537e0 https://git.kernel.org/stable/c/70c886ac93f87ae7214a0c69151a28a8075dd95b https://git.kernel.org/stable/c/9e6a3eccb28779710cbbafc4f4258d92509c6d07 https://git.kernel.org/stable/c/9e6b8c1ff9d997e1fa16cbd2d60739adf6dc1bbc https://git.kernel.org/stable/c/b95fb96e6339e34694dd578fb6bde3575b01af17 rh#2271469 |
CVE-2021-47172 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47172 SMASH Issue 398822 bnc#1221992 https://git.kernel.org/stable/c/26da8040eccc6c6b0e415e9a3baf72fd39eb2fdc https://git.kernel.org/stable/c/f2a772c51206b0c3f262e4f6a3812c89a650191b https://git.kernel.org/stable/c/f49149964d2423fb618fb6b755bb1eaa431cca2c https://git.kernel.org/stable/c/f70122825076117787b91e7f219e21c09f11a5b9 rh#2271468 |
CVE-2021-47173 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47173 SMASH Issue 398809 bnc#1221993 https://git.kernel.org/stable/c/36b5ff1db1a4ef4fdbc2bae364344279f033ad88 https://git.kernel.org/stable/c/386918878ce4cd676e4607233866e03c9399a46a https://git.kernel.org/stable/c/5394ae9d8c7961dd93807fdf1b12a1dde96b0a55 https://git.kernel.org/stable/c/5f46b2410db2c8f26b8bb91b40deebf4ec184391 https://git.kernel.org/stable/c/7889c70e6173ef358f3cd7578db127a489035a42 https://git.kernel.org/stable/c/a3c3face38cb49932c62adcc1289914f1c742096 https://git.kernel.org/stable/c/bcb30cc8f8befcbdbcf7a016e4dfd4747c54a364 https://git.kernel.org/stable/c/dcb4b8ad6a448532d8b681b5d1a7036210b622de rh#2271467 |
CVE-2021-47174 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47174 SMASH Issue 398823 bnc#1221990 https://git.kernel.org/stable/c/727a2b4fc951ee69847d4904d98961856ea9fbe6 https://git.kernel.org/stable/c/b1f45a26bd322525c14edd9504f6d46dfad679a4 https://git.kernel.org/stable/c/f0b3d338064e1fe7531f0d2977e35f3b334abfb4 rh#2271466 |
CVE-2021-47175 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47175 SMASH Issue 398824 bnc#1222003 https://git.kernel.org/stable/c/7a1bdec12e43e29cc34a4394590337069d8812ce https://git.kernel.org/stable/c/e6294c06e7c62ffdd5bf3df696d3a4fcbb753d3c https://git.kernel.org/stable/c/e70f7a11876a1a788ceadf75e9e5f7af2c868680 rh#2271465 |
CVE-2021-47176 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47176 SMASH Issue 398811 bnc#1221996 https://git.kernel.org/stable/c/6a16810068e70959bc1df686424aa35ce05578f1 https://git.kernel.org/stable/c/a16be88a3d7e5efcb59a15edea87a8bd369630c6 https://git.kernel.org/stable/c/aa8579bc084673c651204f7cd0d6308a47dffc16 https://git.kernel.org/stable/c/c0c8a8397fa8a74d04915f4d3d28cb4a5d401427 rh#2271463 |
CVE-2021-47177 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47177 SMASH Issue 398825 bnc#1221997 https://git.kernel.org/stable/c/044bbe8b92ab4e542de7f6c93c88ea65cccd8e29 https://git.kernel.org/stable/c/0ee74d5a48635c848c20f152d0d488bf84641304 https://git.kernel.org/stable/c/22da9f4978381a99f1abaeaf6c9b83be6ab5ddd8 https://git.kernel.org/stable/c/2ec5e9bb6b0560c90d315559c28a99723c80b996 https://git.kernel.org/stable/c/ca466561eef36d1ec657673e3944eb6340bddb5b https://git.kernel.org/stable/c/f01134321d04f47c718bb41b799bcdeda27873d2 rh#2271462 |
CVE-2021-47178 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47178 SMASH Issue 398805 bnc#1221995 https://git.kernel.org/stable/c/70ca3c57ff914113f681e657634f7fbfa68e1ad1 https://git.kernel.org/stable/c/a20b6eaf4f35046a429cde57bee7eb5f13d6857f https://git.kernel.org/stable/c/a222d2794c53f8165de20aa91b39e35e4b72bce9 rh#2271461 |
CVE-2021-47179 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47179 L3:68117 L3:68118 L3:68119 L3:68120 L3:68123 L3:68126 L3:68151 SMASH Issue 398826 bnc#1222001 https://git.kernel.org/stable/c/39785761feadf261bc5101372b0b0bbaf6a94494 https://git.kernel.org/stable/c/42637ca25c7d7b5a92804a679af5192e8c1a9f48 https://git.kernel.org/stable/c/4e1ba532dbc1a0e19fc2458d74ab8d98680c4e42 https://git.kernel.org/stable/c/a421d218603ffa822a0b8045055c03eae394a7eb https://git.kernel.org/stable/c/aba3c7795f51717ae316f3566442dee7cc3eeccb https://git.kernel.org/stable/c/b090d110e66636bca473fd8b98d5c97b555a965a https://git.kernel.org/stable/c/f9890652185b72b8de9ebeb4406037640b6e1b53 rh#2271459 |
CVE-2021-47180 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47180 SMASH Issue 398827 bnc#1221999 https://git.kernel.org/stable/c/0365701bc44e078682ee1224866a71897495c7ef https://git.kernel.org/stable/c/2c2fb2df46ea866b49fea5ec7112ec3cd4896c74 https://git.kernel.org/stable/c/448a1cb12977f52142e6feb12022c59662d88dc1 https://git.kernel.org/stable/c/4a621621c7af3cec21c47c349b30cd9c3cea11c8 https://git.kernel.org/stable/c/65234f50a90b64b335cbb9164b8a98c2a0d031dd https://git.kernel.org/stable/c/af2a4426baf71163c0c354580ae98c7888a9aba7 https://git.kernel.org/stable/c/b34cb7ac32cc8e5471dc773180ea9ae676b1a745 https://git.kernel.org/stable/c/e0652f8bb44d6294eeeac06d703185357f25d50b rh#2271458 |
CVE-2021-47181 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47181 SMASH Issue 401354 bnc#1222660 https://git.kernel.org/stable/c/06cfb4cb2241e704d72e3045cf4d7dfb567fbce0 https://git.kernel.org/stable/c/14651496a3de6807a17c310f63c894ea0c5d858e https://git.kernel.org/stable/c/1ba7605856e05fa991d4654ac69e5ace66c767b9 https://git.kernel.org/stable/c/28be095eb612a489705d38c210afaf1103c5f4f8 https://git.kernel.org/stable/c/3ee15f1af17407be381bcf06a78fa60b471242dd https://git.kernel.org/stable/c/679eee466d0f9ffa60a2b0c6ec19be5128927f04 https://git.kernel.org/stable/c/b3f43659eb0b9af2e6ef18a8d829374610b19e7a https://git.kernel.org/stable/c/f87a79c04a33ab4e5be598c7b0867e6ef193d702 rh#2274628 |
CVE-2021-47183 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47183 SMASH Issue 401332 bnc#1222664 https://git.kernel.org/stable/c/1854f53ccd88ad4e7568ddfafafffe71f1ceb0a6 https://git.kernel.org/stable/c/28de48a7cea495ab48082d9ff4ef63f7cb4e563a rh#2274626 |
CVE-2021-47184 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47184 SMASH Issue 401331 bnc#1222666 https://git.kernel.org/stable/c/37d9e304acd903a445df8208b8a13d707902dea6 https://git.kernel.org/stable/c/78f2a9e831f9610e3655a0be5e675e1aa2472089 https://git.kernel.org/stable/c/87c421ab4a43433cb009fea44bbbc77f46913e1d https://git.kernel.org/stable/c/c30162da91327e4cdf7cd03079f096bb3654738c https://git.kernel.org/stable/c/e91e8427a1e1633a0261e3bb0201c836ac5b3890 https://git.kernel.org/stable/c/f866513ead4370402428ef724b03c3312295c178 rh#2274625 |
CVE-2021-47185 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47185 SMASH Issue 401367 bnc#1222669 https://git.kernel.org/stable/c/0380f643f3a7a61b0845cdc738959c2ad5735d61 https://git.kernel.org/stable/c/3968ddcf05fb4b9409cd1859feb06a5b0550a1c1 https://git.kernel.org/stable/c/4c1623651a0936ee197859824cdae6ebbd04d3ed https://git.kernel.org/stable/c/4f300f47dbcf9c3d4b2ea76c8554c8f360400725 https://git.kernel.org/stable/c/5c34486f04700f1ba04907231dce0cc2705c2d7d https://git.kernel.org/stable/c/77e9fed33056f2a88eba9dd4d2d5412f0c7d1f41 https://git.kernel.org/stable/c/b1ffc16ec05ae40d82b6e373322d62e9d6b54fbc https://git.kernel.org/stable/c/d491c84df5c469dd9621863b6a770b3428137063 rh#2274624 |
CVE-2021-47186 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47186 SMASH Issue 401368 bnc#1222702 https://git.kernel.org/stable/c/3e6db079751afd527bf3db32314ae938dc571916 https://git.kernel.org/stable/c/9404c4145542c23019a80ab1bb2ecf73cd057b10 https://git.kernel.org/stable/c/a7d91625863d4ffed63b993b5e6dc1298b6430c9 rh#2274623 |
CVE-2021-47187 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47187 SMASH Issue 401352 bnc#1222703 https://git.kernel.org/stable/c/118c826ef8b43efe0fda8faf419673707ee8c5e5 https://git.kernel.org/stable/c/3f1dcaff642e75c1d2ad03f783fa8a3b1f56dd50 https://git.kernel.org/stable/c/a14d7038ea201c5526375becfc43b9ba281b1e82 https://git.kernel.org/stable/c/e52fecdd0c142b95c720683885b06ee3f0e065c8 rh#2274622 |
CVE-2021-47189 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47189 SMASH Issue 401369 bnc#1222706 https://git.kernel.org/stable/c/45da9c1767ac31857df572f0a909fbe88fd5a7e9 https://git.kernel.org/stable/c/47e6f9f69153247109042010f3a77579e9dc61ff https://git.kernel.org/stable/c/637d652d351fd4f263ef302dc52f3971d314e500 https://git.kernel.org/stable/c/670f6b3867c8f0f11e5097f353b164cecfec6179 https://git.kernel.org/stable/c/6adbc07ebcaf8bead08b21687d49e0fc94400987 https://git.kernel.org/stable/c/804a9d239ae9cbe88e861a7cd62319cc6ec7b136 https://git.kernel.org/stable/c/bd660a20fea3ec60a49709ef5360f145ec0fe779 https://git.kernel.org/stable/c/ed058d735a70f4b063323f1a7bb33cda0f987513 rh#2274620 |
CVE-2021-47192 | kernel-source-rt:Not affected | moderate | () | CVE-2021-47192 SMASH Issue 401339 bnc#1222867 https://git.kernel.org/stable/c/4edd8cd4e86dd3047e5294bbefcc0a08f66a430f https://git.kernel.org/stable/c/a792e0128d232251edb5fdf42fb0f9fbb0b44a73 https://git.kernel.org/stable/c/bcc0e3175a976b7fa9a353960808adb0bb49ead8 https://git.kernel.org/stable/c/edd783162bf2385b43de6764f2d4c6e9f4f6be27 rh#2274617 |
CVE-2021-47193 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47193 SMASH Issue 401337 bnc#1222879 https://git.kernel.org/stable/c/269a4311b15f68d24e816f43f123888f241ed13d https://git.kernel.org/stable/c/51e6ed83bb4ade7c360551fa4ae55c4eacea354b rh#2274616 |
CVE-2021-47194 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47194 SMASH Issue 401329 bnc#1222829 https://git.kernel.org/stable/c/0738cdb636c21ab552eaecf905efa4a6070e3ebc https://git.kernel.org/stable/c/4e458abbb4a523f1413bfe15c079cf4e24c15b21 https://git.kernel.org/stable/c/52affc201fc22a1ab9a59ef0ed641a9adfcb8d13 https://git.kernel.org/stable/c/563fbefed46ae4c1f70cffb8eb54c02df480b2c2 https://git.kernel.org/stable/c/5a9b671c8d74a3e1b999e7a0c7f366079bcc93dd https://git.kernel.org/stable/c/7b97b5776daa0b39dbdadfea176f9cc0646d4a66 https://git.kernel.org/stable/c/8f06bb8c216bcd172394f61e557727e691b4cb24 https://git.kernel.org/stable/c/b8a045e2a9b234cfbc06cf36923886164358ddec rh#2274615 |
CVE-2021-47195 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47195 SMASH Issue 401358 bnc#1222832 https://git.kernel.org/stable/c/37330f37f6666c7739a44b2b6b95b047ccdbed2d https://git.kernel.org/stable/c/6c53b45c71b4920b5e62f0ea8079a1da382b9434 rh#2274614 |
CVE-2021-47196 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47196 SMASH Issue 401366 bnc#1222773 https://git.kernel.org/stable/c/6cd7397d01c4a3e09757840299e4f114f0aa5fa0 https://git.kernel.org/stable/c/b70e072feffa0ba5c41a99b9524b9878dee7748e rh#2274613 |
CVE-2021-47197 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47197 SMASH Issue 401333 bnc#1222776 https://git.kernel.org/stable/c/2ae38157080616a13a9fe3f0b4b6ec0070aa408a https://git.kernel.org/stable/c/471c492890557bd58f73314bb4ad85d5a8fd5026 https://git.kernel.org/stable/c/76ded29d3fcda4928da8849ffc446ea46871c1c2 rh#2274612 |
CVE-2021-47198 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47198 SMASH Issue 401326 bnc#1222883 https://git.kernel.org/stable/c/79b20beccea3a3938a8500acef4e6b9d7c66142f https://git.kernel.org/stable/c/dbebf865b3239595c1d4dba063b122862583b52a rh#2274611 |
CVE-2021-47199 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47199 SMASH Issue 401356 bnc#1222785 https://git.kernel.org/stable/c/486e8de6e233ff2999493533c6259d1cb538653b https://git.kernel.org/stable/c/806401c20a0f9c51b6c8fd7035671e6ca841f6c2 rh#2274610 |
CVE-2021-47200 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47200 SMASH Issue 401351 bnc#1222838 https://git.kernel.org/stable/c/4f8e469a2384dfa4047145b0093126462cbb6dc0 https://git.kernel.org/stable/c/8244a3bc27b3efd057da154b8d7e414670d5044f rh#2274609 |
CVE-2021-47202 | kernel-source-rt:Analysis | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47202 SMASH Issue 401373 bnc#1222878 https://git.kernel.org/stable/c/0750f769b95841b34a9fe8c418dd792ff526bf86 https://git.kernel.org/stable/c/6a315471cb6a07f651e1d3adc8962730f4fcccac https://git.kernel.org/stable/c/828f4c31684da94ecf0b44a2cbd35bbede04f0bd https://git.kernel.org/stable/c/96cfe05051fd8543cdedd6807ec59a0e6c409195 https://git.kernel.org/stable/c/ef2590a5305e0b8e9342f84c2214aa478ee7f28e rh#2274607 |
CVE-2021-47203 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47203 SMASH Issue 401371 bnc#1222881 https://git.kernel.org/stable/c/16bcbfb56d759c25665f786e33ec633b9508a08f https://git.kernel.org/stable/c/814d3610c4ce86e8cf285b2cdac0057a42e82de5 https://git.kernel.org/stable/c/99154581b05c8fb22607afb7c3d66c1bace6aa5d https://git.kernel.org/stable/c/ad4776b5eb2e58af1226847fcd3b4f6d051674dd https://git.kernel.org/stable/c/b291d147d0268e93ad866f8bc820ea14497abc9b https://git.kernel.org/stable/c/c097bd5a59162156d9c2077a2f58732ffbaa9fca https://git.kernel.org/stable/c/ec70d80a8642900086447ba0cdc79e3f44d42e8f https://git.kernel.org/stable/c/f05a0191b90156e539cccc189b9d87ca2a4d9305 rh#2274634 |
CVE-2021-47205 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47205 SMASH Issue 401374 SMASH Issue 401375 bnc#1222888 https://git.kernel.org/stable/c/9bec2b9c6134052994115d2d3374e96f2ccb9b9d https://git.kernel.org/stable/c/b5dd513daa70ee8f6d281a20bd28485ee9bb7db2 rh#2274632 |
CVE-2021-47206 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47206 SMASH Issue 401349 bnc#1222894 https://git.kernel.org/stable/c/065334f6640d074a1caec2f8b0091467a22f9483 https://git.kernel.org/stable/c/2474eb7fc3bfbce10f7b8ea431fcffe5dd5f5100 https://git.kernel.org/stable/c/28e016e02118917e50a667bc72fb80098cf2b460 https://git.kernel.org/stable/c/2f18f97a1a787154a372c0738f1576f14b693d91 https://git.kernel.org/stable/c/951b8239fd24678b56c995c5c0456ab12e059d19 https://git.kernel.org/stable/c/9eff2b2e59fda25051ab36cd1cb5014661df657b https://git.kernel.org/stable/c/bb6ed2e05eb6e8619b30fa854f9becd50c11723f https://git.kernel.org/stable/c/f98986b7acb4219f95789095eced93ed69d81d35 rh#2274631 |
CVE-2021-47207 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47207 SMASH Issue 401327 bnc#1222790 https://git.kernel.org/stable/c/16721797dcef2c7c030ffe73a07f39a65f9323c3 https://git.kernel.org/stable/c/1ac6cd87d8ddd36c43620f82c4d65b058f725f0f https://git.kernel.org/stable/c/3e28e083dcdf03a18a083f8a47b6bb6b1604b5be https://git.kernel.org/stable/c/542fa721594a02d2aee0370a764d306ef48d030c https://git.kernel.org/stable/c/a0d21bb3279476c777434c40d969ea88ca64f9aa https://git.kernel.org/stable/c/ab4c1ebc40f699f48346f634d7b72b9c5193f315 https://git.kernel.org/stable/c/c6d2cefdd05c4810c416fb8d384b5c377bd977bc https://git.kernel.org/stable/c/cb09c760c201f82df83babc92a5ffea0a01807fc rh#2274630 |
CVE-2021-47209 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47209 SMASH Issue 401336 bnc#1222796 https://git.kernel.org/stable/c/512e21c150c1c3ee298852660f3a796e267e62ec https://git.kernel.org/stable/c/b027789e5e50494c2325cc70c8642e7fd6059479 rh#2274577 |
CVE-2021-47210 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47210 SMASH Issue 401341 bnc#1222901 https://git.kernel.org/stable/c/2a897d384513ba7f7ef05611338b9a6ec6aeac00 https://git.kernel.org/stable/c/2c71811c963b6c310a29455d521d31a7ea6c5b5e https://git.kernel.org/stable/c/30dcfcda8992dc42f18e7d35b6a1fa72372d382d https://git.kernel.org/stable/c/b7a0a63f3fed57d413bb857de164ea9c3984bc4e https://git.kernel.org/stable/c/eff8b7628410cb2eb562ca0d5d1f12e27063733e rh#2274576 |
CVE-2021-47212 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47212 SMASH Issue 401362 bnc#1222709 https://git.kernel.org/stable/c/a51a6da375d82aed5c8f83abd13e7d060421bd48 https://git.kernel.org/stable/c/ba50cd9451f6c49cf0841c0a4a146ff6a2822699 rh#2274574 |
CVE-2021-47214 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47214 SMASH Issue 401342 bnc#1222710 https://git.kernel.org/stable/c/b5069d44e2fbc4a9093d005b3ef0949add3dd27e https://git.kernel.org/stable/c/cc30042df6fcc82ea18acf0dace831503e60a0b7 rh#2274572 |
CVE-2021-47215 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47215 SMASH Issue 401340 bnc#1222704 https://git.kernel.org/stable/c/cc4a9cc03faa6d8db1a6954bb536f2c1e63bdff6 https://git.kernel.org/stable/c/ebeda7a9528ae690e6bf12791a868f0cca8391f2 rh#2274571 |
CVE-2021-47218 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47218 SMASH Issue 401370 bnc#1222791 https://git.kernel.org/stable/c/83c8ab8503adf56bf68dafc7a382f4946c87da79 https://git.kernel.org/stable/c/b17dd53cac769dd13031b0ca34f90cc65e523fab https://git.kernel.org/stable/c/dc27f3c5d10c58069672215787a96b4fae01818b rh#2274568 |
CVE-2021-47220 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47220 SMASH Issue 406846 bnc#1224859 https://git.kernel.org/stable/c/174c27583b3807ac96228c442735b02622d8d1c3 https://git.kernel.org/stable/c/4bf584a03eec674975ee9fe36c8583d9d470dab1 https://git.kernel.org/stable/c/58b5e02c6ca0e2b7c87cd8023ff786ef3c0eef74 https://git.kernel.org/stable/c/7f9745ab342bcce5efd5d4d2297d0a3dd9db0eac https://git.kernel.org/stable/c/fa8c413e6b74ae5d12daf911c73238c5bdacd8e6 https://git.kernel.org/stable/c/fd7c4bd582494934be15d41aebe0dbe23790605f https://git.kernel.org/stable/c/ff4c63f3e8cb7af2ce51cc56b031e08fd23c758b rh#2282599 |
CVE-2021-47221 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47221 SMASH Issue 406847 bnc#1224858 https://git.kernel.org/stable/c/ce6e8bee7a3883e8008b30f5887dbb426aac6a35 https://git.kernel.org/stable/c/e41a49fadbc80b60b48d3c095d9e2ee7ef7c9a8e https://git.kernel.org/stable/c/f6ed2357541612a13a5841b3af4dc32ed984a25f rh#2282597 |
CVE-2021-47225 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-47225 SMASH Issue 406844 bnc#1224828 https://git.kernel.org/stable/c/8043903fcb72f545c52e3ec74d6fd82ef79ce7c5 https://git.kernel.org/stable/c/d5befb224edbe53056c2c18999d630dafb4a08b9 rh#2282592 |
CVE-2021-47227 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47227 SMASH Issue 406853 bnc#1224852 https://git.kernel.org/stable/c/076f732b16a5bf842686e1b43ab6021a2d98233e https://git.kernel.org/stable/c/484cea4f362e1eeb5c869abbfb5f90eae6421b38 https://git.kernel.org/stable/c/ec25ea1f3f05d6f8ee51d1277efea986eafd4f2a rh#2282590 |
CVE-2021-47228 | kernel-source-rt:Not affected | low | 4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-47228 SMASH Issue 406854 bnc#1224826 https://git.kernel.org/stable/c/208bb686e7fa7fff16e8fa78ff0db34aa9acdbd7 https://git.kernel.org/stable/c/8d651ee9c71bb12fc0c8eb2786b66cbe5aa3e43b https://git.kernel.org/stable/c/b7a05aba39f733ec337c5b952e112dd2dc4fc404 rh#2282589 |
CVE-2021-47229 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47229 SMASH Issue 406855 bnc#1224854 https://git.kernel.org/stable/c/1a1dbc4473974867fe8c5f195c17b341c8e82867 https://git.kernel.org/stable/c/3d213a4ddf49a860be6e795482c17f87e0c82b2a https://git.kernel.org/stable/c/400e6b1860c8be61388d0b77814c53260f96e17a https://git.kernel.org/stable/c/4c90f90a91d75c3c73dd633827c90e8746d9f54d https://git.kernel.org/stable/c/b00a9aaa4be20ad6e3311fb78a485eae0899e89a https://git.kernel.org/stable/c/f18139966d072dab8e4398c95ce955a9742e04f7 rh#2282588 |
CVE-2021-47231 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47231 SMASH Issue 406857 bnc#1224849 https://git.kernel.org/stable/c/6bd3d80d1f019cefa7011056c54b323f1d8b8e83 https://git.kernel.org/stable/c/6f87c0e21ad20dd3d22108e33db1c552dfa352a0 https://git.kernel.org/stable/c/89df95ce32be204eef2e7d4b2f6fb552fb191a68 https://git.kernel.org/stable/c/91c02557174be7f72e46ed7311e3bea1939840b0 https://git.kernel.org/stable/c/a115198caaab6d663bef75823a3c5f0802306d60 https://git.kernel.org/stable/c/d0760a4ef85697bc756d06eae17ae27f3f055401 rh#2282586 |
CVE-2021-47232 | kernel-source-rt:Not affected | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47232 SMASH Issue 406859 bnc#1224848 https://git.kernel.org/stable/c/1071065eeb33d32b7d98c2ce7591881ae7381705 https://git.kernel.org/stable/c/2030043e616cab40f510299f09b636285e0a3678 https://git.kernel.org/stable/c/22cba878abf646cd3a02ee7c8c2cef7afe66a256 https://git.kernel.org/stable/c/509ab6bfdd0c76daebbad0f0af07da712116de22 rh#2282585 |
CVE-2021-47233 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47233 SMASH Issue 406860 bnc#1224850 https://git.kernel.org/stable/c/ba8a26a7ce8617f9f3d6230de34b2302df086b41 https://git.kernel.org/stable/c/cb2381cbecb81a8893b2d1e1af29bc2e5531df27 https://git.kernel.org/stable/c/dc68f0c9e4a001e02376fe87f4bdcacadb27e8a1 rh#2282584 |
CVE-2021-47236 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47236 SMASH Issue 406863 bnc#1224841 https://git.kernel.org/stable/c/05b2b9f7d24b5663d9b47427fe1555bdafd3ea02 https://git.kernel.org/stable/c/14184ec5c958b589ba934da7363a2877879204df https://git.kernel.org/stable/c/1bcacd6088d61c0ac6a990d87975600a81f3247e https://git.kernel.org/stable/c/81de2ed06df8b5451e050fe6a318af3263dbff3f https://git.kernel.org/stable/c/b4f7a9fc9d094c0c4a66f2ad7c37b1dbe9e78f88 https://git.kernel.org/stable/c/c3b26fdf1b32f91c7a3bc743384b4a298ab53ad7 https://git.kernel.org/stable/c/f12554b0ff639e74612cc01b3b4a049e098d2d65 https://git.kernel.org/stable/c/f4e6a7f19c82f39b1803e91c54718f0d7143767d rh#2282581 |
CVE-2021-47239 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47239 SMASH Issue 406867 bnc#1224846 https://git.kernel.org/stable/c/14616c372a7be01a2fb8c56c9d8debd232b9e43d https://git.kernel.org/stable/c/2fc8300c9cfa5167fcb5b1a2a07db6f53e82f59b https://git.kernel.org/stable/c/4252bf6c2b245f47011098113d405ffad6ad5d5b https://git.kernel.org/stable/c/56b786d86694e079d8aad9b314e015cd4ac02a3d https://git.kernel.org/stable/c/570a52cf3e01d19f7fd1a251dfc52b0cd86c13cb https://git.kernel.org/stable/c/64160d1741a3de5204d1a822e058e0b4cc526504 https://git.kernel.org/stable/c/7cc8b2e05fcea6edd022d26e82091d781af8fd9b https://git.kernel.org/stable/c/c4e3be2e7742863e454ce31faf8fd0109c00050b rh#2282578 |
CVE-2021-47240 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47240 SMASH Issue 406868 bnc#1224843 https://git.kernel.org/stable/c/19892ab9c9d838e2e5a7744d36e4bb8b7c3292fe https://git.kernel.org/stable/c/26b8d10703a9be45d6097946b2b4011f7dd2c56f https://git.kernel.org/stable/c/960b08dd36de1e341e3eb43d1c547513e338f4f8 https://git.kernel.org/stable/c/ad9d24c9429e2159d1e279dc3a83191ccb4daf1d https://git.kernel.org/stable/c/f8111c0d7ed42ede41a3d0d393b104de0730a8a6 rh#2282577 |
CVE-2021-47241 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47241 SMASH Issue 406869 bnc#1224842 https://git.kernel.org/stable/c/cfc7f0e70d649e6d2233fba0d9390b525677d971 https://git.kernel.org/stable/c/e175aef902697826d344ce3a12189329848fe898 https://git.kernel.org/stable/c/fb3a948143688e14e2cfd2a2812877923d0e5e92 rh#2282575 |
CVE-2021-47242 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-47242 SMASH Issue 406870 bnc#1224829 https://git.kernel.org/stable/c/27ef25c72373222aaa5fe7b5cd890ae9cfb89a8d https://git.kernel.org/stable/c/499ada5073361c631f2a3c4a8aed44d53b6f82ec rh#2282573 |
CVE-2021-47244 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47244 SMASH Issue 406872 bnc#1224839 https://git.kernel.org/stable/c/07718be265680dcf496347d475ce1a5442f55ad7 https://git.kernel.org/stable/c/73eeba71dc9932970befa009e68272a3d5ec4a58 https://git.kernel.org/stable/c/76e02b8905d0691e89e104a882f3bba7dd0f6037 rh#2282569 |
CVE-2021-47246 | kernel-source-rt:Already fixed | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-47246 SMASH Issue 406875 bnc#1224831 https://git.kernel.org/stable/c/4b16118665e94c90a3e84a5190486fd0e4eedd74 https://git.kernel.org/stable/c/a3e5fd9314dfc4314a9567cde96e1aef83a7458a https://git.kernel.org/stable/c/b374c1304f6d3d4752ad1412427b7bf02bb1fd61 https://git.kernel.org/stable/c/be7f3f401d224e1efe8112b2fa8b837eeb8c5e52 rh#2282567 |
CVE-2021-47251 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47251 SMASH Issue 406880 bnc#1224881 https://git.kernel.org/stable/c/5a1cd67a801cf5ef989c4783e07b86a25b143126 https://git.kernel.org/stable/c/d1b949c70206178b12027f66edc088d40375b5cb https://git.kernel.org/stable/c/e298aa358f0ca658406d524b6639fe389cb6e11e rh#2282561 |
CVE-2021-47252 | kernel-source-rt:Already fixed | low | 0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N) | CVE-2021-47252 SMASH Issue 406881 bnc#1224882 https://git.kernel.org/stable/c/282baa8104af44e04c4af3e7f933b44267c7f86f https://git.kernel.org/stable/c/2eb4e0b3631832a4291c8bf4c9db873f60b128c8 https://git.kernel.org/stable/c/45011f2973f6b52cf50db397bb27bf805f5f0e7f https://git.kernel.org/stable/c/6031daaaf6d5c359c99dfffa102e332df234ff09 https://git.kernel.org/stable/c/77a99aad5bc3ea105806ebae6be3cbadc2fc615e https://git.kernel.org/stable/c/9f460ae31c4435fd022c443a6029352217a16ac1 https://git.kernel.org/stable/c/e7fbd8184fa9e85f0d648c499841cb7ff6dec9f4 https://git.kernel.org/stable/c/e8e9d2968a9d08bf5c683afca182f1537edebf8d rh#2282559 |
CVE-2021-47253 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-47253 SMASH Issue 406882 bnc#1224886 https://git.kernel.org/stable/c/9e8c2af010463197315fa54a6c17e74988b5259c https://git.kernel.org/stable/c/aa000f828e60ac15d6340f606ec4a673966f5b0b https://git.kernel.org/stable/c/c5699e2d863f58221044efdc3fa712dd32d55cde rh#2282558 |
CVE-2021-47254 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47254 SMASH Issue 406883 bnc#1224888 https://git.kernel.org/stable/c/0364742decb0f02bc183404868b82896f7992595 https://git.kernel.org/stable/c/094bf5670e762afa243d2c41a5c4ab71c7447bf4 https://git.kernel.org/stable/c/1ab19c5de4c537ec0d9b21020395a5b5a6c059b2 https://git.kernel.org/stable/c/38ce329534500bf4ae71f81df6a37a406cf187b4 https://git.kernel.org/stable/c/86fd5b27db743a0ce0cc245e3a34813b2aa6ec1d https://git.kernel.org/stable/c/92869945cc5b78ee8a1ef90336fe070893e3458a https://git.kernel.org/stable/c/a61156314b66456ab6a291ed5deba1ebd002ab3c https://git.kernel.org/stable/c/e87ef30fe73e7e10d2c85bdcc778dcec24dca553 rh#2282556 |
CVE-2021-47255 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47255 SMASH Issue 406884 bnc#1224832 https://git.kernel.org/stable/c/018685461a5b9a9a70e664ac77aef0d7415a3fd5 https://git.kernel.org/stable/c/218bf772bddd221489c38dde6ef8e917131161f6 https://git.kernel.org/stable/c/a2aff09807fbe4018c269d3773a629949058b210 https://git.kernel.org/stable/c/bf99ea52970caeb4583bdba1192c1f9b53b12c84 rh#2282555 |
CVE-2021-47259 | kernel-source-rt:Already fixed | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47259 SMASH Issue 406888 bnc#1224953 https://git.kernel.org/stable/c/3e3c7ebbfac152d08be75c92802a64a1f6471a15 https://git.kernel.org/stable/c/42c10b0db064e45f5c5ae7019bbf2168ffab766c https://git.kernel.org/stable/c/476bdb04c501fc64bf3b8464ffddefc8dbe01577 https://git.kernel.org/stable/c/72651c6579a25317a90536181d311c663d0329ab https://git.kernel.org/stable/c/c3b6cf64dfe4ef96e7341508d50d6998da7062c7 https://git.kernel.org/stable/c/c7eab9e2d7b4e983ce280276fb920af649955897 rh#2282548 |
CVE-2021-47260 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47260 SMASH Issue 406889 bnc#1224834 https://git.kernel.org/stable/c/0057ecef9f324007c0ba5fcca4ddd131178ce78b https://git.kernel.org/stable/c/09226e8303beeec10f2ff844d2e46d1371dc58e0 https://git.kernel.org/stable/c/279ad78a00f8b9c5ff24171a59297187a3bd44b7 https://git.kernel.org/stable/c/4b380a7d84ef2ce3f4f5bec5d8706ed937ac6502 https://git.kernel.org/stable/c/58ddf61f10b8f9b7b1341644bfee2f1c6508d4e1 https://git.kernel.org/stable/c/634f17ff1d59905eb3b4bbbc00805961d08beaee https://git.kernel.org/stable/c/a979e601000982a3ca693171a6d4dffc47f8ad00 https://git.kernel.org/stable/c/fab8bfdfb4aac9e4e8363666333adfdf21e89106 rh#2282547 |
CVE-2021-47262 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-47262 SMASH Issue 406892 bnc#1224836 https://git.kernel.org/stable/c/796d3bd4ac9316e70c181189318cd2bd98af34bc https://git.kernel.org/stable/c/9fb088ce13bc3c59a51260207b487db3e556f275 https://git.kernel.org/stable/c/d046f724bbd725a24007b7e52b2d675249870888 https://git.kernel.org/stable/c/f31500b0d437a2464ca5972d8f5439e156b74960 rh#2282545 |
CVE-2021-47263 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N) | CVE-2021-47263 SMASH Issue 406893 bnc#1224955 https://git.kernel.org/stable/c/dbec64b11c65d74f31427e2b9d5746fbf17bf840 https://git.kernel.org/stable/c/dd55331d493b7ea75c5db1f24d6822946fde2862 https://git.kernel.org/stable/c/e0b518a2eb44d8a74c19e50f79a8ed393e96d634 rh#2282544 |
CVE-2021-47264 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47264 SMASH Issue 406894 bnc#1224887 https://git.kernel.org/stable/c/047fd16015a79180771650aa6ce71f68b2c23368 https://git.kernel.org/stable/c/0e2c9aeb00289f279b8181fbd4c20765127d8943 https://git.kernel.org/stable/c/41daf6ba594d55f201c50280ebcd430590441da1 rh#2282542 |
CVE-2021-47265 | kernel-source-rt:Ignore | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47265 SMASH Issue 406895 bnc#1224957 https://git.kernel.org/stable/c/2adcb4c5a52a2623cd2b43efa7041e74d19f3a5e https://git.kernel.org/stable/c/8dc1b0e0ca204596c50bcd159ee069ae0f998176 jsc#CAR-3570 rh#2282540 |
CVE-2021-47267 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47267 SMASH Issue 406897 bnc#1224993 https://git.kernel.org/stable/c/032e288097a553db5653af552dd8035cd2a0ba96 https://git.kernel.org/stable/c/45f9a2fe737dc0a5df270787f2231aee8985cd59 https://git.kernel.org/stable/c/5ef23506695b01d5d56a13a092a97f2478069d75 https://git.kernel.org/stable/c/70cd19cb5bd94bbb5bacfc9c1e4ee0071699a604 https://git.kernel.org/stable/c/b972eff874637402ddc4a7dd11fb22538a0b6d28 https://git.kernel.org/stable/c/ca6bc277430d90375452b60b047763a090b7673e https://git.kernel.org/stable/c/fd24be23abf3e94260be0f00bb42c7e91d495f87 rh#2282538 |
CVE-2021-47268 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47268 SMASH Issue 406899 bnc#1224994 https://git.kernel.org/stable/c/18eaf0de50eadeeb395b83310b259b21ad8ed0a6 https://git.kernel.org/stable/c/3a13ff7ef4349d70d1d18378d661117dd5af8efe https://git.kernel.org/stable/c/d0a06696a8a4d99f649240b6f9b8a2e55452ecf5 rh#2282537 |
CVE-2021-47269 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47269 SMASH Issue 406900 bnc#1224996 https://git.kernel.org/stable/c/366369b89bedd59b1425386e8d4a18a466e420e4 https://git.kernel.org/stable/c/470403639114895e2697c766fbe17be8d0e9b67a https://git.kernel.org/stable/c/60156089f07e724e4dc8483702d5e1ede4522749 https://git.kernel.org/stable/c/788755756dd4a6aba1de479fec20b0fa600e7f19 https://git.kernel.org/stable/c/96b74a99d360235c24052f1d060e64ac53f43528 https://git.kernel.org/stable/c/990dc90750772622d44ca2ea6652c521e6f67e16 https://git.kernel.org/stable/c/bd551e7c85939de2182010273450bfa78c3742fc https://git.kernel.org/stable/c/d00889080ab60051627dab1d85831cd9db750e2a rh#2282536 |
CVE-2021-47270 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47270 SMASH Issue 406901 bnc#1224997 https://git.kernel.org/stable/c/10770d2ac0094b053c8897d96d7b2737cd72f7c5 https://git.kernel.org/stable/c/4b289a0f3033f465b4fd51ba995251a7867a2aa2 https://git.kernel.org/stable/c/8cd5f45c1b769e3e9e0f4325dd08b6c3749dc7ee https://git.kernel.org/stable/c/90c4d05780d47e14a50e11a7f17373104cd47d25 https://git.kernel.org/stable/c/b4903f7fdc484628d0b8022daf86e2439d3ab4db https://git.kernel.org/stable/c/beb1e67a5ca8d69703c776db9000527f44c0c93c https://git.kernel.org/stable/c/f17aae7c4009160f0630a91842a281773976a5bc rh#2282535 |
CVE-2021-47271 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47271 SMASH Issue 406902 bnc#1224999 https://git.kernel.org/stable/c/a9aecef198faae3240921b707bc09b602e966fce https://git.kernel.org/stable/c/ae746b6f4ce619cf4032fd798a232b010907a397 rh#2282534 |
CVE-2021-47272 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47272 SMASH Issue 406903 bnc#1224970 https://git.kernel.org/stable/c/03715ea2e3dbbc56947137ce3b4ac18a726b2f87 https://git.kernel.org/stable/c/4aad390363d2b9b3e92428dd34d27bb7ea8f1ee8 https://git.kernel.org/stable/c/851dee5a5da56564a70290713aee665403bb0b24 rh#2282532 |
CVE-2021-47273 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47273 SMASH Issue 406904 bnc#1224885 https://git.kernel.org/stable/c/4d2aa178d2ad2fb156711113790dde13e9aa2376 https://git.kernel.org/stable/c/750a0d75564293be3ed50f13ef7f38ab75106421 https://git.kernel.org/stable/c/d8dd3754e707104a34f8ec595034d503ea8871a2 rh#2282526 |
CVE-2021-47274 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47274 SMASH Issue 406905 bnc#1224990 https://git.kernel.org/stable/c/2d598902799886d67947406f26ee8e5fd2ca097f https://git.kernel.org/stable/c/31ceae385556c37e4d286cb6378696448f566883 https://git.kernel.org/stable/c/3e08a9f9760f4a70d633c328a76408e62d6f80a3 https://git.kernel.org/stable/c/43c32c22254b9328d7abb1c2b0f689dc67838e60 https://git.kernel.org/stable/c/b16a249eca2230c2cd66fa1d4b94743bd9b6ef92 https://git.kernel.org/stable/c/d63f00ec908b3be635ead5d6029cc94246e1f38d https://git.kernel.org/stable/c/edcce01e0e50840a9aa6a70baed21477bdd2c9f9 rh#2282525 |
CVE-2021-47275 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47275 SMASH Issue 406906 bnc#1224965 https://git.kernel.org/stable/c/41fe8d088e96472f63164e213de44ec77be69478 https://git.kernel.org/stable/c/555002a840ab88468e252b0eedf0b05e2ce7099c rh#2282524 |
CVE-2021-47276 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47276 SMASH Issue 406907 bnc#1224966 https://git.kernel.org/stable/c/0bc62e398bbd9e600959e610def5109957437b28 https://git.kernel.org/stable/c/3e4ddeb68751fb4fb657199aed9cfd5d02796875 https://git.kernel.org/stable/c/4aedc2bc2b32c93555f47c95610efb89cc1ec09b https://git.kernel.org/stable/c/6c14133d2d3f768e0a35128faac8aa6ed4815051 https://git.kernel.org/stable/c/7e4e824b109f1d41ccf223fbb0565d877d6223a2 https://git.kernel.org/stable/c/862dcc14f2803c556bdd73b43c27b023fafce2fb https://git.kernel.org/stable/c/97524384762c1fb9b3ded931498dd2047bd0de81 https://git.kernel.org/stable/c/acf671ba79c1feccc3ec7cfdcffead4efcec49e7 rh#2282523 |
CVE-2021-47278 | kernel-source-rt:Not affected | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47278 SMASH Issue 406909 bnc#1224919 https://git.kernel.org/stable/c/0b67808ade8893a1b3608ddd74fac7854786c919 https://git.kernel.org/stable/c/c597d5c59c7a6417dba06590f59b922e01188e8d rh#2282519 |
CVE-2021-47279 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47279 SMASH Issue 406910 bnc#1224964 https://git.kernel.org/stable/c/2147684be1ebdaf845783139b9bc4eba3fecd9e4 https://git.kernel.org/stable/c/fbf649cd6d64d40c03c5397ecd6b1ae922ba7afc rh#2282518 |
CVE-2021-47280 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47280 SMASH Issue 406912 bnc#1224982 https://git.kernel.org/stable/c/17dab9326ff263c62dab1dbac4492e2938a049e4 https://git.kernel.org/stable/c/491d52e0078860b33b6c14f0a7ac74ca1b603bd6 https://git.kernel.org/stable/c/7d233ba700ceb593905ea82b42dadb4ec8ef85e9 https://git.kernel.org/stable/c/b246b4c70c1250e7814f409b243000f9c0bf79a3 https://git.kernel.org/stable/c/b436acd1cf7fac0ba987abd22955d98025c80c2b https://git.kernel.org/stable/c/f773f8cccac13c7e7bbd9182e7996c727742488e rh#2282517 |
CVE-2021-47282 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47282 SMASH Issue 406914 bnc#1224986 https://git.kernel.org/stable/c/01415ff85a24308059e06ca3e97fd7bf75648690 https://git.kernel.org/stable/c/13817d466eb8713a1ffd254f537402f091d48444 https://git.kernel.org/stable/c/82a8ffba54d31e97582051cb56ba1f988018681e https://git.kernel.org/stable/c/b5502580cf958b094f3b69dfe4eece90eae01fbc rh#2282515 |
CVE-2021-47284 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47284 SMASH Issue 406916 bnc#1224987 https://git.kernel.org/stable/c/143fc7220961220eecc04669e5909af8847bf8c8 https://git.kernel.org/stable/c/4c1fcb6ec964b44edbf84235134582a5ffae1521 https://git.kernel.org/stable/c/6249193e03709ea625e10706ecaf17fea0427d3d https://git.kernel.org/stable/c/958cb1078ca60d214826fd90a0961a447fade59a https://git.kernel.org/stable/c/9d7d4649dc1c53acf76df260fd519db698ed20d7 https://git.kernel.org/stable/c/9f6f852550d0e1b7735651228116ae9d300f69b3 https://git.kernel.org/stable/c/a0a37e4454ca1c0b424edc2c9c2487c2c46a1be6 https://git.kernel.org/stable/c/bf78e25bd3f487208e042c67c8a31706c2dba265 rh#2282923 |
CVE-2021-47285 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47285 SMASH Issue 406917 bnc#1224981 https://git.kernel.org/stable/c/1e5cab50208c8fb7351b798cb1d569debfeb994a https://git.kernel.org/stable/c/38cb2e23188af29c43966acee9dbb18b62e26cfe https://git.kernel.org/stable/c/8ab78863e9eff11910e1ac8bcf478060c29b379e https://git.kernel.org/stable/c/90d0a3c76965d7a10fc87c07be3e9714e2130d5c https://git.kernel.org/stable/c/c08e0be44759d0b5affc5888be4aa5e536873335 https://git.kernel.org/stable/c/d6a21a3fb03300fbaa9fc3ed99f8b0962ce28362 https://git.kernel.org/stable/c/ec72482564ff99c6832d33610d9f8ab7ecc81b6d https://git.kernel.org/stable/c/f3ed12af6bbbaf79eddb0ae14656b8ecacea74f0 rh#2282513 |
CVE-2021-47286 | kernel-source-rt:Not affected | moderate | 5.9 (CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H) | CVE-2021-47286 SMASH Issue 406919 bnc#1224890 https://git.kernel.org/stable/c/3efec3b4b16fc7af25676a94230a8ab2a3bb867c https://git.kernel.org/stable/c/546362a9ef2ef40b57c6605f14e88ced507f8dd0 https://git.kernel.org/stable/c/aed4f5b51aba41e2afd7cfda20a0571a6a67dfe9 rh#2282512 |
CVE-2021-47287 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47287 SMASH Issue 406920 bnc#1224985 https://git.kernel.org/stable/c/4afa0c22eed33cfe0c590742387f0d16f32412f3 https://git.kernel.org/stable/c/ce5b3de58fc21303722df46551f7eb9a91afb409 rh#2282511 |
CVE-2021-47288 | kernel-source-rt:Already fixed | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L) | CVE-2021-47288 SMASH Issue 406921 bnc#1224889 https://git.kernel.org/stable/c/4487b968e5eacd02c493303dc2b61150bb7fe4b2 https://git.kernel.org/stable/c/8d4abca95ecc82fc8c41912fa0085281f19cc29f https://git.kernel.org/stable/c/b9a178f189bb6d75293573e181928735f5e3e070 https://git.kernel.org/stable/c/c6ddeb63dd543b5474b0217c4e47538b7ffd7686 https://git.kernel.org/stable/c/e617fa62f6cf859a7b042cdd6c73af905ff8fca3 https://git.kernel.org/stable/c/e818f2ff648581a6c553ae2bebc5dcef9a8bb90c https://git.kernel.org/stable/c/e991457afdcb5f4dbc5bc9d79eaf775be33e7092 https://git.kernel.org/stable/c/ec731c6ef564ee6fc101fc5d73e3a3a953d09a00 rh#2282510 |
CVE-2021-47289 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47289 SMASH Issue 406922 bnc#1224984 https://git.kernel.org/stable/c/38f54217b423c0101d03a00feec6fb8ec608b12e https://git.kernel.org/stable/c/cae3fa3d8165761f3000f523b11cfa1cd35206bc https://git.kernel.org/stable/c/ccf23a0888077a25a0793a746c3941db2a7562e4 https://git.kernel.org/stable/c/fc68f42aa737dc15e7665a4101d4168aadb8e4c4 rh#2282508 |
CVE-2021-47290 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47290 SMASH Issue 406923 bnc#1224884 https://git.kernel.org/stable/c/a47fa41381a09e5997afd762664db4f5f6657e03 https://git.kernel.org/stable/c/e7732c5a19a15a62b0b23fd683a639b0483e1f40 rh#2282507 |
CVE-2021-47292 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47292 SMASH Issue 406925 bnc#1224979 https://git.kernel.org/stable/c/362a9e65289284f36403058eea2462d0330c1f24 https://git.kernel.org/stable/c/502731a03f27cba1513fbbff77e508185ffce5bb rh#2282505 |
CVE-2021-47296 | kernel-source-rt:Already fixed | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47296 SMASH Issue 406930 bnc#1224891 https://git.kernel.org/stable/c/9bafc34dc4ad0cef18727c557f21ed3c3304df50 https://git.kernel.org/stable/c/a4a488915feaad38345cc01b80d52e8200ff5209 https://git.kernel.org/stable/c/bc4188a2f56e821ea057aca6bf444e138d06c252 https://git.kernel.org/stable/c/e14ef1095387f764d95614d3ec9e4d07c82a3533 https://git.kernel.org/stable/c/f38527f1890543cdfca8dfd06f75f9887cce6151 rh#2282491 |
CVE-2021-47298 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47298 SMASH Issue 406932 bnc#1224974 https://git.kernel.org/stable/c/6c508a1c6c62793dc6e6872cad4b200097bab7c9 https://git.kernel.org/stable/c/715f378f42909c401ec043f5150c4fdf57fb8889 https://git.kernel.org/stable/c/7e6b27a69167f97c56b5437871d29e9722c3e470 rh#2282485 |
CVE-2021-47299 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47299 SMASH Issue 406933 bnc#1224973 https://git.kernel.org/stable/c/5acc7d3e8d342858405fbbc671221f676b547ce7 https://git.kernel.org/stable/c/a7537dc73e69ad9c0b67ad24ad3ebee954ed0af6 https://git.kernel.org/stable/c/ca9ba1de8f09976b45ccc8e655c51c6201992139 rh#2282484 |
CVE-2021-47300 | kernel-source-rt:Not affected | low | () | CVE-2021-47300 SMASH Issue 406934 bnc#1224972 https://git.kernel.org/stable/c/39f1735c8107ef43a53c4daf82f330d880488d8f https://git.kernel.org/stable/c/5dd0a6b8582ffbfa88351949d50eccd5b6694ade https://git.kernel.org/stable/c/cbb086074dab631ac43f8645cbac1d7b148e05c4 |
CVE-2021-47301 | kernel-source-rt:Already fixed | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47301 SMASH Issue 406936 bnc#1224916 https://git.kernel.org/stable/c/7b292608db23ccbbfbfa50cdb155d01725d7a52e https://git.kernel.org/stable/c/88e0720133d42d34851c8721cf5f289a50a8710f https://git.kernel.org/stable/c/8e24c12f2ff6d32fd9f057382f08e748ec97194c https://git.kernel.org/stable/c/d3ccb18ed5ac3283c7b31ecc685b499e580d5492 https://git.kernel.org/stable/c/d7367f781e5a9ca5df9082b15b272b55e76931f8 https://git.kernel.org/stable/c/f153664d8e70c11d0371341613651e1130e20240 |
CVE-2021-47302 | kernel-source-rt:Already fixed | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47302 SMASH Issue 406937 bnc#1224917 https://git.kernel.org/stable/c/56ea7ed103b46970e171eb1c95916f393d64eeff https://git.kernel.org/stable/c/a9508e0edfe369ac95d0825bcdca976436ce780f https://git.kernel.org/stable/c/e15f629036bac005fc758b4ad17896cf2312add4 https://git.kernel.org/stable/c/ea5e36b7367ea0a36ef73a163768f16d2977bd83 rh#2282481 |
CVE-2021-47303 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47303 SMASH Issue 406873 bnc#1224962 https://git.kernel.org/stable/c/599148d40366bd5d1d504a3a8fcd65e21107e500 https://git.kernel.org/stable/c/a9f36bf3613c65cb587c70fac655c775d911409b https://git.kernel.org/stable/c/f263a81451c12da5a342d90572e317e611846f2c |
CVE-2021-47304 | kernel-source-rt:Not affected | low | () | CVE-2021-47304 SMASH Issue 406938 bnc#1224971 https://git.kernel.org/stable/c/ad4ba3404931745a5977ad12db4f0c34080e52f7 https://git.kernel.org/stable/c/be5d1b61a2ad28c7e57fe8bfa277373e8ecffcdc https://git.kernel.org/stable/c/fe77b85828ca9ddc42977b79de9e40d18545b4fe |
CVE-2021-47305 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47305 SMASH Issue 406939 bnc#1224968 https://git.kernel.org/stable/c/0d514185ae792d3a1903c8e1a83899aa996705ce https://git.kernel.org/stable/c/19edcd97727aae9362444a859a24d99a8730cb27 https://git.kernel.org/stable/c/19f51c2529339280d2c8c6427cd3e21ddf1ac3f8 https://git.kernel.org/stable/c/41f45e91c92c8480242ea448d54e28c753b13902 https://git.kernel.org/stable/c/e0355a0ad31a1d677b2a4514206de4902bd550e8 https://git.kernel.org/stable/c/ffe000217c5068c5da07ccb1c0f8cce7ad767435 |
CVE-2021-47307 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47307 SMASH Issue 406941 bnc#1224961 https://git.kernel.org/stable/c/03313d1c3a2f086bb60920607ab79ac8f8578306 https://git.kernel.org/stable/c/ae3d181f4e912f51af7776ea165f199b16fc165d https://git.kernel.org/stable/c/e58c162789becede894d3e94c0ce6695a2ef5796 https://git.kernel.org/stable/c/f7d1fa65e74263d11f90ddd33b4d4cd905a93759 rh#2282475 |
CVE-2021-47308 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47308 SMASH Issue 406942 bnc#1224963 https://git.kernel.org/stable/c/0fe70c15f9435bb3c50954778245d62ee38b0e03 https://git.kernel.org/stable/c/44651522941c623e20882b3b443f23f77de1ea8b https://git.kernel.org/stable/c/4921b1618045ffab71b1050bf0014df3313a2289 https://git.kernel.org/stable/c/8511293e643a18b248510ae5734e4f360754348c https://git.kernel.org/stable/c/a4a54c54af2516caa9c145015844543cfc84316a https://git.kernel.org/stable/c/b27c4577557045f1ab3cdfeabfc7f3cd24aca1fe rh#2282474 |
CVE-2021-47312 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47312 SMASH Issue 406947 bnc#1225048 https://git.kernel.org/stable/c/4ca041f919f13783b0b03894783deee00dbca19a https://git.kernel.org/stable/c/70a5a1950cca02c5cd161bb3846b4d983eed97d3 rh#2282469 |
CVE-2021-47313 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L) | CVE-2021-47313 SMASH Issue 406948 bnc#1225051 https://git.kernel.org/stable/c/b775383355755885b19d2acef977f1ca132e80a3 https://git.kernel.org/stable/c/e1b2b2b61d30d7ce057ec17237c217d152ed97f2 https://git.kernel.org/stable/c/fe2535a44904a77615a3af8e8fd7dafb98fb0e1b |
CVE-2021-47314 | kernel-source-rt:Already fixed | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-47314 SMASH Issue 406950 bnc#1224893 https://git.kernel.org/stable/c/3b45b8a7d549bd92ec94b5357c2c2c1a7ed107e4 https://git.kernel.org/stable/c/443f6ca6fd186b4fa4e6f377b6e19a91feb1a0d5 https://git.kernel.org/stable/c/48ee69825f7480622ed447b0249123236d3b3ad0 https://git.kernel.org/stable/c/7626ffbea708e5aba6912295c012d2b409a1769f https://git.kernel.org/stable/c/8018476756066e97ecb886c3dc024aeb7d5792ad https://git.kernel.org/stable/c/8e0d09b1232d0538066c40ed4c13086faccbdff6 https://git.kernel.org/stable/c/a6b45b4932f7b0c36b41fb56a35ad679ece939a0 https://git.kernel.org/stable/c/b5789e23773f4a852fbfe244b63f675e265d3a7f https://git.kernel.org/stable/c/ee1aa737ba0b75ab8af3444c4ae5bdba36aed6e6 |
CVE-2021-47315 | kernel-source-rt:Already fixed | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-47315 SMASH Issue 406951 bnc#1224892 https://git.kernel.org/stable/c/28f71fd81ebd3b386bf5c7c5539664156f7d72c1 https://git.kernel.org/stable/c/3b132ab67fc7a358fff35e808fa65d4bea452521 https://git.kernel.org/stable/c/6b3b002de90738e3c85853a682ce7e0fa078d42b https://git.kernel.org/stable/c/83af5816308b490b05fc8fa27fc1bdc769df200a https://git.kernel.org/stable/c/8d071d270afba468708faca5f7b6d9e656f75e27 https://git.kernel.org/stable/c/94bc2fe46102d1e060fc749c0c19511e76c9995f https://git.kernel.org/stable/c/b7a2bcb4a3731d68f938207f75ed3e1d41774510 https://git.kernel.org/stable/c/bd051b3e184fa56eeb6276ee913ba4d48069024b https://git.kernel.org/stable/c/d0d04b95e8ed0223844a1d58497c686fe2e4a955 https://git.kernel.org/stable/c/d9213d4f372d30b5bc4d921795d6bed0c0e3eebf |
CVE-2021-47316 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47316 SMASH Issue 406952 bnc#1225052 https://git.kernel.org/stable/c/650e6f383a6eb40f7c0a010982a74ab4b6893870 https://git.kernel.org/stable/c/ab1016d39cc052064e32f25ad18ef8767a0ee3b8 https://git.kernel.org/stable/c/e79057d15d96ef19de4de6d7e479bae3d58a2a8d rh#2282464 |
CVE-2021-47317 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47317 SMASH Issue 406953 bnc#1225055 https://git.kernel.org/stable/c/0d435b6d94b05dcfd836d758a63145aa566618e2 https://git.kernel.org/stable/c/419ac821766cbdb9fd85872bb3f1a589df05c94c https://git.kernel.org/stable/c/7284dab07e4d51d453cc42851fae9ec4fac6ef2f |
CVE-2021-47318 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47318 SMASH Issue 406954 bnc#1225057 https://git.kernel.org/stable/c/83150f5d05f065fb5c12c612f119015cabdcc124 https://git.kernel.org/stable/c/ccdf7e073170886bc370c613e269de610a794c4a |
CVE-2021-47319 | kernel-source-rt:Ignore | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L) | CVE-2021-47319 SMASH Issue 406955 bnc#1225054 https://git.kernel.org/stable/c/04c6e60b884cb5e94ff32af46867fb41d5848358 https://git.kernel.org/stable/c/102d6bc6475ab09bab579c18704e6cf8d898e93c https://git.kernel.org/stable/c/29a2f4a3214aa14d61cc9737c9f886dae9dbb710 https://git.kernel.org/stable/c/381bde79d11e596002edfd914e6714291826967a https://git.kernel.org/stable/c/600942d2fd49b90e44857d20c774b20d16f3130f https://git.kernel.org/stable/c/863da837964c80c72e368a4f748c30d25daa1815 https://git.kernel.org/stable/c/b71ba22e7c6c6b279c66f53ee7818709774efa1f https://git.kernel.org/stable/c/ca2b8ae93a6da9839dc7f9eb9199b18aa03c3dae https://git.kernel.org/stable/c/cd24da0db9f75ca11eaf6060f0ccb90e2f3be3b0 jsc#CAR-3585 |
CVE-2021-47320 | kernel-source-rt:Already fixed | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L) | CVE-2021-47320 SMASH Issue 406957 bnc#1225058 https://git.kernel.org/stable/c/0704f617040c397ae73c1f88f3956787ec5d6529 https://git.kernel.org/stable/c/1fcb6fcd74a222d9ead54d405842fc763bb86262 https://git.kernel.org/stable/c/2e3960f276b4574a9bb0dfa31a7497302f6363b2 https://git.kernel.org/stable/c/4b515308ab875c7e8ada8e606fe0c64762da5ed4 https://git.kernel.org/stable/c/687cf32865b2d6960214bce523f2afac58dd3cd2 https://git.kernel.org/stable/c/8a2b308a54c5ec224fedc753617f99b29ffcd883 https://git.kernel.org/stable/c/c8fc86e9df6a6a03f5a8e15a3b7a5c75fd05aa38 https://git.kernel.org/stable/c/cef9d9acb7c80ed6bace894b6334557fd493863b https://git.kernel.org/stable/c/d0b32dc1409f7e65e4fcc34e236462268e69a357 rh#2282441 |
CVE-2021-47321 | kernel-source-rt:Already fixed | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47321 SMASH Issue 406918 bnc#1225060 https://git.kernel.org/stable/c/1a053c4d716898a53c2e31c574a70ea0c37044a3 https://git.kernel.org/stable/c/4c05dac488a660fe2925c047ecb119e7afaaeb1e https://git.kernel.org/stable/c/58606882ad8ec6c39e0f40344b922921ef94ab4d https://git.kernel.org/stable/c/66ba9cf929b1c4fabf545bd4c18f6f64e23e46e4 https://git.kernel.org/stable/c/8bec568d7518b1504a602ed5376bb322e4dbb270 https://git.kernel.org/stable/c/ca96b8ea5e74956071154bdb456778cc3027e79f https://git.kernel.org/stable/c/d0212f095ab56672f6f36aabc605bda205e1e0bf https://git.kernel.org/stable/c/db222f1477ad5692cd454709b714949807e5d111 https://git.kernel.org/stable/c/ecd620e0fb1ff7f78fdb593379b2e6938c99707a rh#2282440 |
CVE-2021-47322 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-47322 SMASH Issue 406958 bnc#1225061 https://git.kernel.org/stable/c/3731d44bba8e0116b052b1b374476c5f6dd9a456 https://git.kernel.org/stable/c/5c7ef8a3705542136a1e19b070e951f0730b2153 https://git.kernel.org/stable/c/7aec9f862411906f8c27071ba65a1e110ad7d2fd https://git.kernel.org/stable/c/7c96a2ee45be41d5a167e6332d202086752c36bb rh#2282439 |
CVE-2021-47323 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47323 SMASH Issue 406959 bnc#1225026 https://git.kernel.org/stable/c/0015581a79bbf8e521f85dddb7d3e4a66b9f51d4 https://git.kernel.org/stable/c/2aef07017fae21c3d8acea9656b10e3b9c0f1e04 https://git.kernel.org/stable/c/522e75ed63f67e815d4ec0deace67df22d9ce78e https://git.kernel.org/stable/c/7c56c5508dc20a6b133bc669fc34327a6711c24c https://git.kernel.org/stable/c/90b7c141132244e8e49a34a4c1e445cce33e07f4 https://git.kernel.org/stable/c/a173e3b62cf6dd3c4a0a10c8a82eedfcae81a566 https://git.kernel.org/stable/c/b3c41ea5bc34d8c7b19e230d80e0e555c6f5057d https://git.kernel.org/stable/c/b4565a8a2d6bffb05bfbec11399d261ec16fe373 https://git.kernel.org/stable/c/f0feab82f6a0323f54d85e8b512a2be64f83648a rh#2282438 |
CVE-2021-47324 | kernel-source-rt:Already fixed | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47324 SMASH Issue 406960 bnc#1225030 bnc#1225038 https://git.kernel.org/stable/c/0ac50a76cf3cd63db000648b3b19f3f98b8aaa76 https://git.kernel.org/stable/c/146cc288fb80c662c9c35e7bc58325d1ac0a7875 https://git.kernel.org/stable/c/63a3dc24bd053792f84cb4eef0168b1266202a02 https://git.kernel.org/stable/c/862f2b5a7c38762ac9e369daefbf361a91aca685 https://git.kernel.org/stable/c/8adbbe6c86bb13e14f8a19e036ae5f4f5661fd90 https://git.kernel.org/stable/c/a397cb4576fc2fc802562418b3a50b8f67d60d31 https://git.kernel.org/stable/c/b4ebf4a4692e84163a69444c70ad515de06e2259 https://git.kernel.org/stable/c/c08a6b31e4917034f0ed0cb457c3bb209576f542 https://git.kernel.org/stable/c/dc9403097be52d57a5c9c35efa9be79d166a78af rh#2282437 |
CVE-2021-47326 | kernel-source-rt:Ignore | low | 0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N) | CVE-2021-47326 SMASH Issue 406962 bnc#1225045 https://git.kernel.org/stable/c/00fcd8f33e9b9f57115c3b1cfc4cb96450c18796 https://git.kernel.org/stable/c/2beb4a53fc3f1081cedc1c1a198c7f56cc4fc60c https://git.kernel.org/stable/c/74569cb9ed7bc60e395927f55d3dc3be143a0164 https://git.kernel.org/stable/c/74d6fcea1d896800e60f1c675137efebd1a6c9a6 https://git.kernel.org/stable/c/afb04d0b5543a5bf8e157b9119fbfc52606f4c11 rh#2282435 |
CVE-2021-47329 | kernel-source-rt:Won't fix | low | 1.9 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-47329 SMASH Issue 406965 bnc#1225083 https://git.kernel.org/stable/c/04b6b9ea80906e3b41ff120b45db31768947cf72 https://git.kernel.org/stable/c/0680db6f41920b2c91c7df3cc9cd5968701a6f74 https://git.kernel.org/stable/c/0c6226601c3e191a44a57d8f9f814b7e5c308959 https://git.kernel.org/stable/c/b5438f48fdd8e1c3f130d32637511efd32038152 https://git.kernel.org/stable/c/e623f79691c5104317669ab36ec316a90c05062f jsc#CAR-3590 rh#2282432 |
CVE-2021-47330 | kernel-source-rt:Already fixed | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-47330 SMASH Issue 406966 bnc#1225084 https://git.kernel.org/stable/c/331f5923fce4f45b8170ccf06c529e8eb28f37bc https://git.kernel.org/stable/c/34f4590f5ec9859ea9136249f528173d150bd584 https://git.kernel.org/stable/c/7a80f71601af015856a0aeb1e3c294037ac3dd32 https://git.kernel.org/stable/c/b2ef1f5de40342de44fc5355321595f91774dab5 https://git.kernel.org/stable/c/b5a2799cd62ed30c81b22c23028d9ee374e2138c https://git.kernel.org/stable/c/c39cf4df19acf0133fa284a8cd83fad42cd13cc2 https://git.kernel.org/stable/c/cddee5c287e26f6b2ba5c0ffdfc3a846f2f10461 https://git.kernel.org/stable/c/ee16bed959862a6de2913f71a04cb563d7237b67 https://git.kernel.org/stable/c/fad92b11047a748c996ebd6cfb164a63814eeb2e rh#2282431 |
CVE-2021-47331 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47331 SMASH Issue 406967 bnc#1225087 https://git.kernel.org/stable/c/1a133a0996d6b4c83509d570ed4edcba34c44f25 https://git.kernel.org/stable/c/436906fd248e018403bcda61a9311d9af02912f1 https://git.kernel.org/stable/c/880287910b1892ed2cb38977893b947382a09d21 https://git.kernel.org/stable/c/8e8d910e9a3a7fba86140aff4924c30955ab228b rh#2282429 |
CVE-2021-47332 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47332 SMASH Issue 406968 bnc#1225091 https://git.kernel.org/stable/c/7d7f30cf182e55023fa8fde4c084b2d37c6be69d https://git.kernel.org/stable/c/82e5ee742fdd8874fe996181b87fafe1eb5f1196 https://git.kernel.org/stable/c/88262229b778f4f7a896da828d966f94dcb35d19 https://git.kernel.org/stable/c/bee295f5e03510252d18b25cc1d26230256eb87a https://git.kernel.org/stable/c/cae0cf651adccee2c3f376e78f30fbd788d0829f rh#2282428 |
CVE-2021-47333 | kernel-source-rt:Already fixed | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47333 SMASH Issue 406970 bnc#1225113 https://git.kernel.org/stable/c/09d154990ca82d14aed2b72796f6c8845e2e605d https://git.kernel.org/stable/c/3ce3e45cc333da707d4d6eb433574b990bcc26f5 https://git.kernel.org/stable/c/58f69684ba03e5b0e0a3ae844a845280c0f06309 https://git.kernel.org/stable/c/717cf5ae52322ddbdf3ac2c584b34c5970b0d174 https://git.kernel.org/stable/c/d2639ffdcad463b358b6bef8645ff81715daffcb rh#2282427 |
CVE-2021-47334 | kernel-source-rt:Already fixed | moderate | 6.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H) | CVE-2021-47334 SMASH Issue 406971 bnc#1225112 https://git.kernel.org/stable/c/1512e7dc5eb08b7d92a12e2bfcd9cb8c4a1ec069 https://git.kernel.org/stable/c/29ba8e2ba89ee2862a26d91204dd5fe77ceee25a https://git.kernel.org/stable/c/38660031e80eaa6cc9370b031c180612f414b00d https://git.kernel.org/stable/c/481a76d4749ee3a27f902ba213fdcbb4bb39720e https://git.kernel.org/stable/c/5b06ca113bf197aab2ab61288f42506e0049fbab https://git.kernel.org/stable/c/7272b591c4cb9327c43443f67b8fbae7657dd9ae https://git.kernel.org/stable/c/a7268e8a227d5a4f0bd1584f556246b0224ab274 https://git.kernel.org/stable/c/b9c87ce3bc6331f82811a8cf8e930423c22523a3 https://git.kernel.org/stable/c/ef1067d2baa847d53c9988510d99fb494de4d12c rh#2282426 |
CVE-2021-47335 | kernel-source-rt:Not affected | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47335 SMASH Issue 406972 bnc#1224927 https://git.kernel.org/stable/c/79fa5d944c875711253a23b8155b36883c696409 https://git.kernel.org/stable/c/86786603014e0a22d0d6af8e80ae4b8687927048 https://git.kernel.org/stable/c/cad83c968c2ebe97905f900326988ed37146c347 https://git.kernel.org/stable/c/e472b276a0d2180808009be38105e12754432e2a rh#2282425 |
CVE-2021-47336 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47336 SMASH Issue 406973 bnc#1225111 https://git.kernel.org/stable/c/135122f174c357b7a3e58f40fa5792156c5e93e6 https://git.kernel.org/stable/c/258fd821f69378453c071b9dd767b298810fc766 https://git.kernel.org/stable/c/3780348c1a0e14ffefcaf1fc521f815bcaac94b0 https://git.kernel.org/stable/c/49ec114a6e62d8d320037ce71c1aaf9650b3cafd https://git.kernel.org/stable/c/5c2dca9a7a7ff6a2df34158903515e2e4fd3d2b2 https://git.kernel.org/stable/c/5f9880403e6b71d56924748ba331daf836243fca https://git.kernel.org/stable/c/8f5c773a2871cf446e3f36b2834fb25bbb28512b https://git.kernel.org/stable/c/cbd87ba6a13891acf6180783f8234a8b7a3e3d4d jsc#CAR-3597 rh#2282424 |
CVE-2021-47337 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47337 SMASH Issue 406974 bnc#1224926 https://git.kernel.org/stable/c/887bfae2732b5b02a86a859fd239d34f7ff93c05 https://git.kernel.org/stable/c/8e4212ecf0713dd57d0e3209a66201da582149b1 https://git.kernel.org/stable/c/93aa71ad7379900e61c8adff6a710a4c18c7c99b https://git.kernel.org/stable/c/c1671d2d2ef8a84837eea1b4d99ca0c6a66fb691 https://git.kernel.org/stable/c/d2f0b960d07e52bb664471b4de0ed8b08c636b3a https://git.kernel.org/stable/c/e1bd3fac2baa3d5c04375980c1d5263a3335af92 https://git.kernel.org/stable/c/ea518b70ed5e4598c8d706f37fc16f7b06e440bd https://git.kernel.org/stable/c/f3d0a109240c9bed5c60d819014786be3a2fe515 rh#2282423 |
CVE-2021-47338 | kernel-source-rt:Already fixed | moderate | 5.1 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H) | CVE-2021-47338 SMASH Issue 406975 bnc#1224924 https://git.kernel.org/stable/c/087bff9acd2ec6db3f61aceb3224bde90fe0f7f8 https://git.kernel.org/stable/c/0af778269a522c988ef0b4188556aba97fb420cc https://git.kernel.org/stable/c/359311b85ebec7c07c3a08ae2f3def946cad33fa https://git.kernel.org/stable/c/d6e76469157d8f240e5dec6f8411aa8d306b1126 https://git.kernel.org/stable/c/f193509afc7ff37a46862610c93b896044d5b693 rh#2282422 |
CVE-2021-47339 | kernel-source-rt:Not affected | moderate | 5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) | CVE-2021-47339 SMASH Issue 406976 bnc#1225102 https://git.kernel.org/stable/c/7b53cca764f9b291b7907fcd39d9e66ad728ee0b https://git.kernel.org/stable/c/bfb48b54db25c3b4ef4bef5e0691464ebc4aa335 https://git.kernel.org/stable/c/dc02c0b2bd6096f2f3ce63e1fc317aeda05f74d8 rh#2282421 |
CVE-2021-47340 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47340 SMASH Issue 406977 bnc#1225148 https://git.kernel.org/stable/c/3bb27e27240289b47d3466f647a55c567adbdc3a https://git.kernel.org/stable/c/42f102ea1943ecb10a0756bf75424de5d1d5beed https://git.kernel.org/stable/c/49def1b0644892e3b113673c13d650c3060b43bc https://git.kernel.org/stable/c/745c9a59422c63f661f4374ed5181740db4130a1 https://git.kernel.org/stable/c/7bde24bde490f3139eee147efc6d60d6040fe975 https://git.kernel.org/stable/c/8018936950360f1c503bb385e158cfc5e4945d18 https://git.kernel.org/stable/c/9d574f985fe33efd6911f4d752de6f485a1ea732 https://git.kernel.org/stable/c/a21e5cb1a64c904f1f0ef7b2d386fc7d2b1d2ce2 https://git.kernel.org/stable/c/aff8d95b69051d0cf4acc3d91f22299fdbb9dfb3 rh#2282420 |
CVE-2021-47341 | kernel-source-rt:Already fixed | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47341 SMASH Issue 406979 bnc#1224923 https://git.kernel.org/stable/c/069d44a24c0ff8f85adf49233aae7a8ca16f5c7e https://git.kernel.org/stable/c/23fa2e46a5556f787ce2ea1a315d3ab93cced204 https://git.kernel.org/stable/c/679837dc0abaa2c6e2a7bcd86483e05eee1d5066 https://git.kernel.org/stable/c/8d7c539316d652d217e5e82b89ee204c812a7061 https://git.kernel.org/stable/c/f2ff9d03432fcb160e9f7d4be26174d89de2779a rh#2282418 |
CVE-2021-47342 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47342 SMASH Issue 406943 bnc#1225149 bnc#1225154 https://git.kernel.org/stable/c/61bb4a1c417e5b95d9edb4f887f131de32e419cb https://git.kernel.org/stable/c/7ed572cdf11081f8f9e07abd4bea56a3f2c4edbd https://git.kernel.org/stable/c/b663890d854403e566169f7e90aed5cd6ff64f6b jsc#CAR-3613 rh#2282417 |
CVE-2021-47344 | kernel-source-rt:Already fixed | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47344 SMASH Issue 406981 bnc#1224922 https://git.kernel.org/stable/c/021c294dff030f3ba38eb81e400ba123db32ecbc https://git.kernel.org/stable/c/0a045eac8d0427b64577a24d74bb8347c905ac65 https://git.kernel.org/stable/c/0edd6759167295ea9969e89283b81017b4c688aa https://git.kernel.org/stable/c/5f3f81f1c96b501d180021c23c25e9f48eaab235 https://git.kernel.org/stable/c/b0633051a6cb24186ff04ce1af99c7de18c1987e https://git.kernel.org/stable/c/bbc80a972a3c5d7eba3f6c9c07af8fea42f5c513 https://git.kernel.org/stable/c/c57b2bd3247925e253729dce283d6bf6abc9339d https://git.kernel.org/stable/c/c57bfd8000d7677bf435873b440eec0c47f73a08 https://git.kernel.org/stable/c/d69b39d89f362cfeeb54a68690768d0d257b2c8f rh#2282410 |
CVE-2021-47345 | kernel-source-rt:Ignore | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-47345 SMASH Issue 406982 bnc#1225157 https://git.kernel.org/stable/c/032c68b4f5be128a2167f35b558b7cec88fe4972 https://git.kernel.org/stable/c/07583ba2e2d8947c3d365d97608cb436510885ac https://git.kernel.org/stable/c/3d08b5917984f737f32d5bee9737b9075c3895c6 https://git.kernel.org/stable/c/40b613db3a95bc27998e4097d74c2f7e5d083a0b https://git.kernel.org/stable/c/4893c938f2a140a74be91779e45e4a7fa111198f https://git.kernel.org/stable/c/74f160ead74bfe5f2b38afb4fcf86189f9ff40c9 https://git.kernel.org/stable/c/e2da8ce2a9543f3ca5c93369bd1fe6eeb572101a https://git.kernel.org/stable/c/e4e062da082a199357ba4911145f331d40139ad8 https://git.kernel.org/stable/c/f4f553d67236145fa5fd203ed7b35b9377e19939 jsc#CAR-3617 rh#2282409 |
CVE-2021-47346 | kernel-source-rt:Not affected | low | 3.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L) | CVE-2021-47346 SMASH Issue 406983 bnc#1224921 https://git.kernel.org/stable/c/0115687be7b13993066aef602253a53d55f5b11f https://git.kernel.org/stable/c/04bd77ef4f4d9fc6102023b85f4590fc2130aac5 https://git.kernel.org/stable/c/35c1c4bd2d59ad734129d4e232af9d1098023918 https://git.kernel.org/stable/c/5fae8a946ac2df879caf3f79a193d4766d00239b https://git.kernel.org/stable/c/733d4d95c0101d5f277b8e4910411d016e49a9dc https://git.kernel.org/stable/c/ef0a06acc6b16388640ad367eedfa2a17f1945db jsc#CAR-3556 rh#2282408 |
CVE-2021-47347 | kernel-source-rt:Already fixed | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47347 SMASH Issue 406985 bnc#1225177 bnc#1225305 https://git.kernel.org/stable/c/0f6c0488368c9ac1aa685821916fadba32f5d1ef https://git.kernel.org/stable/c/115103f6e3f1c26c473766c16439c7c8b235529a https://git.kernel.org/stable/c/302e2ee34c5f7c5d805b7f835d9a6f2b43474e2a https://git.kernel.org/stable/c/40af3960a15339e8bbd3be50c3bc7b35e1a0b6ea https://git.kernel.org/stable/c/57ad99ae3c6738ba87bad259bb57c641ca68ebf6 https://git.kernel.org/stable/c/c5e4a10d7bd5d4f419d8b9705dff60cf69b302a1 https://git.kernel.org/stable/c/d10a87a3535cce2b890897914f5d0d83df669c63 https://git.kernel.org/stable/c/d3d8b9c9c7843dce31e284927d4c9904fd5a510a https://git.kernel.org/stable/c/d71dddeb5380613f9ef199f3e7368fd78fb1a46e rh#2282407 |
CVE-2021-47348 | kernel-source-rt:Not affected | moderate | 5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) | CVE-2021-47348 SMASH Issue 406986 bnc#1225178 https://git.kernel.org/stable/c/06888d571b513cbfc0b41949948def6cb81021b2 https://git.kernel.org/stable/c/3b2b93a485fb7a970bc8b5daef16f4cf579d172f https://git.kernel.org/stable/c/44c7c901cb368a9f2493748f213b247b5872639f https://git.kernel.org/stable/c/c5b518f4b98dbb2bc31b6a55e6aaa1e0e2948f2e rh#2282405 |
CVE-2021-47349 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47349 SMASH Issue 406987 bnc#1225179 https://git.kernel.org/stable/c/1f9482aa8d412b4ba06ce6ab8e333fb8ca29a06e https://git.kernel.org/stable/c/35af69c7c0490fdccfc159c6a87e4d1dc070838a https://git.kernel.org/stable/c/a3041d39d3c14da97fa3476835aba043ba810cf0 rh#2282404 |
CVE-2021-47350 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47350 SMASH Issue 406988 bnc#1225181 https://git.kernel.org/stable/c/500f81cec9f1bfa5210aa9dd5ba9a06e22f62a35 https://git.kernel.org/stable/c/8a96ec5ebf96ad8e2ba7b1b34103a0be5140fc70 https://git.kernel.org/stable/c/a82471a14aad90f79d1608d2bcbb019f0ffb53f0 https://git.kernel.org/stable/c/cd5d5e602f502895e47e18cd46804d6d7014e65c https://git.kernel.org/stable/c/d2e52d4664097a6c1f591d869ec594bd7a0d4925 rh#2282403 |
CVE-2021-47351 | kernel-source-rt:Not affected | moderate | 6.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H) | CVE-2021-47351 SMASH Issue 406989 bnc#1225182 https://git.kernel.org/stable/c/38dde03eb239605f428f3f1e4baa73d4933a4cc6 https://git.kernel.org/stable/c/7adc05b73d91a5e3d4ca7714fa53ad9b70c53d08 https://git.kernel.org/stable/c/9558612cb829f2c022b788f55d6b8437d5234a82 https://git.kernel.org/stable/c/c0756f75c22149d20fcb7d8409827cee905eb386 https://git.kernel.org/stable/c/f4e3634a3b642225a530c292fdb1e8a4007507f5 jsc#CAR-3624 rh#2282402 |
CVE-2021-47352 | kernel-source-rt:Ignore | moderate | 6.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N) | CVE-2021-47352 SMASH Issue 406990 bnc#1225124 https://git.kernel.org/stable/c/3133e01514c3c498f2b01ff210ee6134b70c663c https://git.kernel.org/stable/c/ad993a95c508417acdeb15244109e009e50d8758 https://git.kernel.org/stable/c/ba710baa1cc1b17a0483f7befe03e696efd17292 https://git.kernel.org/stable/c/c92298d228f61589dd21657af2bea95fc866b813 jsc#CAR-3598 rh#2282401 |
CVE-2021-47353 | kernel-source-rt:Ignore | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47353 SMASH Issue 406992 bnc#1225128 https://git.kernel.org/stable/c/21bf1414580c36ffc8d8de043beb3508cf812238 https://git.kernel.org/stable/c/2f3d9ddd32a28803baa547e6274983b67d5e287c https://git.kernel.org/stable/c/3638705ecd5ad2785e996f820121c0ad15ce64b5 https://git.kernel.org/stable/c/371566f63cbd0bb6fbb25b8fe9d5798268d35af9 https://git.kernel.org/stable/c/5150877e4d99f85057a458daac7cd7c01005d5c6 https://git.kernel.org/stable/c/80d505aee6398cf8beb72475c7edcf1733c1c68b https://git.kernel.org/stable/c/aebed6b19e51a34003d998da5ebb1dfdd2cb1d02 https://git.kernel.org/stable/c/baea588a42d675e35daeaddd10fbc9700550bc4d https://git.kernel.org/stable/c/fa236c2b2d4436d9f19ee4e5d5924e90ffd7bb43 jsc#CAR-3599 rh#2282400 |
CVE-2021-47354 | kernel-source-rt:Already fixed | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N) | CVE-2021-47354 SMASH Issue 406993 bnc#1225140 https://git.kernel.org/stable/c/0687411e2a8858262de2fc4a1d576016fd77292e https://git.kernel.org/stable/c/0b10ab80695d61422337ede6ff496552d8ace99d https://git.kernel.org/stable/c/50d7e03ad487cc45fc85164a299b945a41756ac0 https://git.kernel.org/stable/c/a8e23e3c1ff9ec598ab1b3a941ace6045027781f https://git.kernel.org/stable/c/c32d0f0e164ffab2a56c7cf8e612584b4b740e2e rh#2282399 |
CVE-2021-47355 | kernel-source-rt:Ignore | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47355 SMASH Issue 406994 bnc#1225141 https://git.kernel.org/stable/c/2f958b6f6ba0854b39be748d21dfe71e0fe6580f https://git.kernel.org/stable/c/34e7434ba4e97f4b85c1423a59b2922ba7dff2ea https://git.kernel.org/stable/c/4e2a0848ea2cab0716d46f85a8ccd5fa9a493e51 https://git.kernel.org/stable/c/5b991df8881088448cb223e769e37cab8dd40706 https://git.kernel.org/stable/c/99779c9d9ffc7775da6f7fd8a7c93ac61657bed5 https://git.kernel.org/stable/c/a7a7b2848312cc4c3a42b6e42a8ab2e441857aba https://git.kernel.org/stable/c/a7f7c42e31157d1f0871d6a8e1a0b73a6b4ea785 https://git.kernel.org/stable/c/bdf5334250c69fabf555b7322c75249ea7d5f148 https://git.kernel.org/stable/c/c471569632654e57c83512e0fc1ba0dbb4544ad6 jsc#CAR-3601 rh#2282397 |
CVE-2021-47356 | kernel-source-rt:Already fixed | moderate | 5.8 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H) | CVE-2021-47356 SMASH Issue 406995 bnc#1225143 https://git.kernel.org/stable/c/009fc857c5f6fda81f2f7dd851b2d54193a8e733 https://git.kernel.org/stable/c/3ecd228c636ee17c14662729737fa07242a93cb0 https://git.kernel.org/stable/c/49331c07ef0f8fdfa42b30ba6a83a657b29d7fbe https://git.kernel.org/stable/c/54ff3202928952a100c477248e65ac6db01258a7 https://git.kernel.org/stable/c/5f2818185da0fe82a932f0856633038b66faf124 https://git.kernel.org/stable/c/61370ff07e0acc657559a8fac02551dfeb9d3020 https://git.kernel.org/stable/c/7867ddc5f3de7f289aee63233afc0df4b62834c5 https://git.kernel.org/stable/c/b7ee9ae1e0cf55a037c4a99af2acc5d78cb7802d https://git.kernel.org/stable/c/ed7c3739d0a07e2ec3ccbffe7e93cea01c438cda rh#2282394 |
CVE-2021-47358 | kernel-source-rt:Ignore | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47358 SMASH Issue 406997 bnc#1224920 https://git.kernel.org/stable/c/4dc56951a8d9d61d364d346c61a5f1d70b4f5e14 https://git.kernel.org/stable/c/64062fcaca8872f063ec9da011e7bf30470be33f https://git.kernel.org/stable/c/92b67aaafb7c449db9f0c3dcabc0ff967cb3a42d https://git.kernel.org/stable/c/92dc0b1f46e12cfabd28d709bb34f7a39431b44f https://git.kernel.org/stable/c/9872ff6fdce8b229f01993b611b5d1719cb70ff1 https://git.kernel.org/stable/c/a5cfd51f6348e8fd7531461366946039c29c7e69 https://git.kernel.org/stable/c/b9e697e60ce9890e9258a73eb061288e7d68e5e6 jsc#CAR-3555 rh#2282392 |
CVE-2021-47359 | kernel-source-rt:Not affected | low | 2.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-47359 SMASH Issue 406998 bnc#1225145 https://git.kernel.org/stable/c/71826b068884050d5fdd37fda857ba1539c513d3 https://git.kernel.org/stable/c/9f6c7aff21f81ae8856da1f63847d1362d523409 jsc#CAR-3603 rh#2282391 |
CVE-2021-47360 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47360 SMASH Issue 406999 bnc#1225122 https://git.kernel.org/stable/c/5fdb55c1ac9585eb23bb2541d5819224429e103d https://git.kernel.org/stable/c/aa2c274c279ff365a06a4cba263f04965895166e https://git.kernel.org/stable/c/b95483d8d94b41fa31a84c1d86710b7907a37621 https://git.kernel.org/stable/c/d5b0473707fa53b03a5db0256ce62b2874bddbc7 rh#2282389 |
CVE-2021-47362 | kernel-source-rt:Ignore | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47362 SMASH Issue 407001 bnc#1225153 https://git.kernel.org/stable/c/06a18e64256f7aecb5a27df02faa3568fcd3c105 https://git.kernel.org/stable/c/68d4fbe6220cd1f3d07cab0a4901e62f8c12cc68 https://git.kernel.org/stable/c/ab39d3cef526ba09c4c6923b4cd7e6ec1c5d4faa jsc#CAR-3609 rh#2282387 |
CVE-2021-47363 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47363 SMASH Issue 407002 bnc#1225156 https://git.kernel.org/stable/c/563f23b002534176f49524b5ca0e1d94d8906c40 https://git.kernel.org/stable/c/e9d32ec26e7f01d1af13bdc687f586362546aa25 rh#2282386 |
CVE-2021-47364 | kernel-source-rt:Not affected | low | 3.6 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L) | CVE-2021-47364 SMASH Issue 407003 bnc#1225158 https://git.kernel.org/stable/c/8d6a21e4cd6a319b0662cbe4ad6199e276ac776a https://git.kernel.org/stable/c/bb509a6ffed2c8b0950f637ab5779aa818ed1596 https://git.kernel.org/stable/c/f217b6c1e28ed0b353634ce4d92a155b80bd1671 rh#2282385 |
CVE-2021-47365 | kernel-source-rt:Already fixed | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47365 SMASH Issue 407004 bnc#1224895 https://git.kernel.org/stable/c/581b2027af0018944ba301d68e7af45c6d1128b5 https://git.kernel.org/stable/c/d130b5fdd42254d92948d06347940276140c927e rh#2282382 |
CVE-2021-47366 | kernel-source-rt:Not affected | moderate | 6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N) | CVE-2021-47366 SMASH Issue 406851 bnc#1225160 https://git.kernel.org/stable/c/b537a3c21775075395af475dcc6ef212fcf29db8 https://git.kernel.org/stable/c/e66fc460d6dcf85cf12288e133a081205aebcd97 jsc#CAR-3618 rh#2282380 |
CVE-2021-47367 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47367 SMASH Issue 407005 bnc#1225123 https://git.kernel.org/stable/c/afd92d82c9d715fb97565408755acad81573591a https://git.kernel.org/stable/c/f020bb63b5d2e5576acadd10e158fe3b04af67ba rh#2282379 |
CVE-2021-47369 | kernel-source-rt:Already fixed | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47369 SMASH Issue 407008 bnc#1225164 https://git.kernel.org/stable/c/248f064af222a1f97ee02c84a98013dfbccad386 https://git.kernel.org/stable/c/9b00fb12cdc9d8d1c3ffe82a78e74738127803fc https://git.kernel.org/stable/c/db94f89e1dadf693c15c2d60de0c34777cea5779 rh#2282377 |
CVE-2021-47370 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47370 SMASH Issue 407009 bnc#1225183 https://git.kernel.org/stable/c/977d293e23b48a1129830d7968605f61c4af71a0 https://git.kernel.org/stable/c/f8ff625a8082db8c2b58dcb5229b27928943b94b rh#2282376 |
CVE-2021-47371 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L) | CVE-2021-47371 SMASH Issue 407010 bnc#1225167 https://git.kernel.org/stable/c/3106a0847525befe3e22fc723909d1b21eb0d520 https://git.kernel.org/stable/c/741760fa6252628a3d3afad439b72437d4b123d9 rh#2282375 |
CVE-2021-47373 | kernel-source-rt:Ignore | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-47373 SMASH Issue 407012 bnc#1225190 https://git.kernel.org/stable/c/280bef512933b2dda01d681d8cbe499b98fc5bdd https://git.kernel.org/stable/c/42d3711c23781045e7a5cd28536c774b9a66d20b https://git.kernel.org/stable/c/568662e37f927e3dc3e475f3ff7cf4ab7719c5e7 https://git.kernel.org/stable/c/5701e8bff314c155e7afdc467b1e0389d86853d0 https://git.kernel.org/stable/c/7d39992d45acd6f2d6b2f62389c55b61fb3d486b https://git.kernel.org/stable/c/e0c1c2e5da19685a20557a50f10c6aa4fa26aa84 jsc#CAR-3627 rh#2282373 |
CVE-2021-47374 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-47374 SMASH Issue 407013 bnc#1225191 https://git.kernel.org/stable/c/510e1a724ab1bf38150be2c1acabb303f98d0047 https://git.kernel.org/stable/c/de4afec2d2946c92c62a15ab341c70b287289e6a rh#2282372 |
CVE-2021-47375 | kernel-source-rt:Already fixed | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47375 SMASH Issue 407014 bnc#1225193 bnc#1225194 https://git.kernel.org/stable/c/3815fe7371d2411ce164281cef40d9fc7b323dee https://git.kernel.org/stable/c/488da313edf3abea7f7733efe011c96b23740ab5 https://git.kernel.org/stable/c/5afedf670caf30a2b5a52da96eb7eac7dee6a9c9 https://git.kernel.org/stable/c/677e362ba807f3aafe6f405c07e0b37244da5222 https://git.kernel.org/stable/c/a5f8e86192612d0183047448d8bbe7918b3f1a26 https://git.kernel.org/stable/c/d56171d9360c0170c5c5f8f7e2362a2e999eca40 https://git.kernel.org/stable/c/dacfd5e4d1142bfb3809aab3634a375f6f373269 https://git.kernel.org/stable/c/ebb8d26d93c3ec3c7576c52a8373a2309423c069 rh#2282370 |
CVE-2021-47377 | kernel-source-rt:Ignore | low | 0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N) | CVE-2021-47377 SMASH Issue 407016 bnc#1225200 https://git.kernel.org/stable/c/29917bbb07c30be295dece245c7c21872e1a6fbb https://git.kernel.org/stable/c/372d3e6ea1e115942fdfb4b25f7003d822d071be https://git.kernel.org/stable/c/6bba79c6a073741b672b0bf86a1f03c0fe47f973 https://git.kernel.org/stable/c/8480ed9c2bbd56fc86524998e5f2e3e22f5038f6 https://git.kernel.org/stable/c/922fd5b6bb13ad31ff36e86e2eba2f26d8135272 https://git.kernel.org/stable/c/c5d5a43dd2b649a0a290bfed00fb76d1aff89be6 jsc#CAR-3630 rh#2282363 |
CVE-2021-47380 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47380 SMASH Issue 407019 bnc#1225205 https://git.kernel.org/stable/c/283e4bee701dfcd409dd293f19a268bb2bc8ff38 https://git.kernel.org/stable/c/d46ef750ed58cbeeba2d9a55c99231c30a172764 rh#2282360 |
CVE-2021-47381 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47381 SMASH Issue 407020 bnc#1225206 https://git.kernel.org/stable/c/a6bb576ead074ca6fa3b53cb1c5d4037a23de81b https://git.kernel.org/stable/c/ac4dfccb96571ca03af7cac64b7a0b2952c97f3a rh#2282359 |
CVE-2021-47382 | kernel-source-rt:Already fixed | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47382 SMASH Issue 407021 bnc#1225207 https://git.kernel.org/stable/c/0bfe741741327822d1482c7edef0184636d08b40 https://git.kernel.org/stable/c/d2b59bd4b06d84a4eadb520b0f71c62fe8ec0a62 rh#2282358 |
CVE-2021-47384 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47384 SMASH Issue 407023 bnc#1225209 https://git.kernel.org/stable/c/6cb01fe630eaffc5a2c3f7364436caddba286623 https://git.kernel.org/stable/c/746011193f44f97f8784edcf8327c587946745fc https://git.kernel.org/stable/c/7c4fd5de39f273626a2b0f3a446d2cc85cd47616 https://git.kernel.org/stable/c/dd4d747ef05addab887dc8ff0d6ab9860bbcd783 jsc#CAR-3634 rh#2282356 |
CVE-2021-47385 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47385 SMASH Issue 407025 bnc#1225210 https://git.kernel.org/stable/c/0f36b88173f028e372668ae040ab1a496834d278 https://git.kernel.org/stable/c/1499bb2c3a87a2efea0065adab2bd66badee61c3 https://git.kernel.org/stable/c/200ced5ba724d8bbf29dfac4ed1e17a39ccaccd1 https://git.kernel.org/stable/c/24af1fe376e22c42238a4a604d31e46c486876c3 jsc#CAR-3635 rh#2282355 |
CVE-2021-47386 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47386 SMASH Issue 407026 bnc#1225268 https://git.kernel.org/stable/c/16887ae4e3defd2c4e7913b6c539f33eaf4eac5c https://git.kernel.org/stable/c/44d3c480e4e2a75bf6296a18b4356157991ccd80 https://git.kernel.org/stable/c/516d9055039017a20a698103be2b556b4c976bb8 https://git.kernel.org/stable/c/943c15ac1b84d378da26bba41c83c67e16499ac4 jsc#CAR-3652 rh#2282354 |
CVE-2021-47388 | kernel-source-rt:Already fixed | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47388 SMASH Issue 407028 bnc#1225214 https://git.kernel.org/stable/c/27d3eb5616ee2c0a3b30c3fa34813368ed1f3dc9 https://git.kernel.org/stable/c/31de381aef0ab1b342f62485118dc8a19363dc78 https://git.kernel.org/stable/c/3d5d629c99c468458022e9b381789de3595bf4dd https://git.kernel.org/stable/c/447d001b875d0e7f211c4ba004916028da994258 https://git.kernel.org/stable/c/50149e0866a82cef33e680ee68dc380a5bc75d32 https://git.kernel.org/stable/c/57de2dcb18742dc2860861c9f496da7d42b67da0 https://git.kernel.org/stable/c/94513069eb549737bcfc3d988d6ed4da948a2de8 https://git.kernel.org/stable/c/f556e1d6fb9f2923a9a36f3df638c7d79ba09dbb rh#2282352 |
CVE-2021-47389 | kernel-source-rt:Not affected | moderate | 5.6 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H) | CVE-2021-47389 SMASH Issue 407029 bnc#1225126 https://git.kernel.org/stable/c/efd7866e114dcb44f86d151e843f8276b7efbc67 https://git.kernel.org/stable/c/f1815e0aa770f2127c5df31eb5c2f0e37b60fa77 rh#2282351 |
CVE-2021-47390 | kernel-source-rt:Not affected | moderate | 5.1 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H) | CVE-2021-47390 SMASH Issue 407030 bnc#1225125 https://git.kernel.org/stable/c/2f9b68f57c6278c322793a06063181deded0ad69 https://git.kernel.org/stable/c/99a9e9b80f19fc63be005a33d76211dd23114792 https://git.kernel.org/stable/c/bebabb76ad9acca8858e0371e102fb60d708e25b rh#2282350 |
CVE-2021-47391 | kernel-source-rt:Already fixed | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47391 SMASH Issue 407031 bnc#1225318 bnc#1225319 https://git.kernel.org/stable/c/03d884671572af8bcfbc9e63944c1021efce7589 https://git.kernel.org/stable/c/305d568b72f17f674155a2a8275f865f207b3808 https://git.kernel.org/stable/c/9a085fa9b7d644a234465091e038c1911e1a4f2a rh#2282349 |
CVE-2021-47392 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47392 SMASH Issue 407032 bnc#1225320 https://git.kernel.org/stable/c/3f4e68902d2e545033c80d7ad62fd9a439e573f4 https://git.kernel.org/stable/c/ca465e1f1f9b38fe916a36f7d80c5d25f2337c81 https://git.kernel.org/stable/c/e56a5146ef8cb51cd7c9e748267dce7564448a35 rh#2282347 |
CVE-2021-47393 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47393 SMASH Issue 407034 bnc#1225321 https://git.kernel.org/stable/c/5c6e0bce647d9cb32a17d58ffa669b3421fcc6ca https://git.kernel.org/stable/c/76bbb482d33bfcd7e9070ecf594c9ec73e01c930 https://git.kernel.org/stable/c/a6c42ae1530f94724d3c42cf91fe3d3c5e394f8a https://git.kernel.org/stable/c/aa85fb7bde558bb2e364e85976b14b259c8b6fe8 https://git.kernel.org/stable/c/e6fab7af6ba1bc77c78713a83876f60ca7a4a064 rh#2282345 |
CVE-2021-47394 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47394 SMASH Issue 407035 bnc#1225323 https://git.kernel.org/stable/c/a499b03bf36b0c2e3b958a381d828678ab0ffc5e https://git.kernel.org/stable/c/f65c73d3aabb87d4353e0bc4a718b5ae8c43fd04 rh#2282344 |
CVE-2021-47395 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47395 SMASH Issue 407036 bnc#1225326 https://git.kernel.org/stable/c/1282bb00835ff79d2d9c023055d514df5b4de260 https://git.kernel.org/stable/c/13cb6d826e0ac0d144b0d48191ff1a111d32f0c6 https://git.kernel.org/stable/c/76538c7b4df314bb937e44c5cb1782f37d47443c https://git.kernel.org/stable/c/997ee230e4f5285cd98445c102d9033c7ec4814b https://git.kernel.org/stable/c/ab85997465b972d39d9747fc16311fa5773374b2 https://git.kernel.org/stable/c/ce5f372f5f084ff51c285fc27b232f15a3d00f0b https://git.kernel.org/stable/c/e5bb852aa2ad963074f0ad73030dbc20a30853e3 rh#2282342 |
CVE-2021-47396 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47396 SMASH Issue 407037 bnc#1225327 https://git.kernel.org/stable/c/2c204cf594df3b9468368dc9d0b24d482d93cda7 https://git.kernel.org/stable/c/313bbd1990b6ddfdaa7da098d0c56b098a833572 https://git.kernel.org/stable/c/9bee85de2c8155388c09a2e1530a243ec1c96f05 https://git.kernel.org/stable/c/ed2adf69e29848d1eb9df99633dde655421c92ed rh#2282341 |
CVE-2021-47398 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) | CVE-2021-47398 SMASH Issue 407039 bnc#1225131 https://git.kernel.org/stable/c/714bfabe5f2901d96902e271d7217601fe4703e5 https://git.kernel.org/stable/c/7d5cfafe8b4006a75b55c2f1fdfdb363f9a5cc98 rh#2282339 |
CVE-2021-47399 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47399 SMASH Issue 407040 bnc#1225328 https://git.kernel.org/stable/c/20f6c4a31a525edd9ea6243712b868ba0e4e331e https://git.kernel.org/stable/c/2744341dd52e935344ca1b4bf189ba0d182a3e8e https://git.kernel.org/stable/c/513e605d7a9ce136886cb42ebb2c40e9a6eb6333 rh#2282337 |
CVE-2021-47404 | kernel-source-rt:Already fixed | moderate | 6 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H) | CVE-2021-47404 SMASH Issue 407046 bnc#1225303 https://git.kernel.org/stable/c/1c83c38dec83d57bc18d0c01d82c413d3b34ccb9 https://git.kernel.org/stable/c/1e4ce418b1cb1a810256b5fb3fd33d22d1325993 https://git.kernel.org/stable/c/6fc4476dda58f6c00097c7ddec3b772513f57525 https://git.kernel.org/stable/c/708107b80aa616976d1c5fa60ac0c1390749db5e https://git.kernel.org/stable/c/a4faa7153b87fbcfe4be15f4278676f79ca6e019 https://git.kernel.org/stable/c/bb8b72374db69afa25a5b65cf1c092860c6fe914 https://git.kernel.org/stable/c/dedfc35a2de2bae9fa3da8210a05bfd515f83fee https://git.kernel.org/stable/c/fe9bb925e7096509711660d39c0493a1546e9550 rh#2282332 |
CVE-2021-47405 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47405 SMASH Issue 407047 bnc#1225238 https://git.kernel.org/stable/c/2b704864c92dcec2b295f276fcfbfb81d9831f81 https://git.kernel.org/stable/c/764ac04de056801dfe52a716da63f6e7018e7f3b https://git.kernel.org/stable/c/7ce4e49146612261265671b1d30d117139021030 https://git.kernel.org/stable/c/965147067fa1bedff3ae1f07ce3f89f1a14d2df3 https://git.kernel.org/stable/c/c3156fea4d8a0e643625dff69a0421e872d1fdae https://git.kernel.org/stable/c/efc5c8d29256955cc90d8d570849b2d6121ed09f https://git.kernel.org/stable/c/f7744fa16b96da57187dc8e5634152d3b63d72de https://git.kernel.org/stable/c/f7ac4d24e1610b92689946fa88177673f1e88a3f rh#2282331 |
CVE-2021-47406 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47406 SMASH Issue 407048 bnc#1225304 https://git.kernel.org/stable/c/1fd95c05d8f742abfe906620780aee4dbe1a2db0 https://git.kernel.org/stable/c/27e10c5d31ff1d222c7f797f1ee96d422859ba67 https://git.kernel.org/stable/c/a63474dbf692dd09b50fed592bc41f6de5f102fc rh#2282330 |
CVE-2021-47410 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47410 SMASH Issue 407053 bnc#1225331 https://git.kernel.org/stable/c/197ae17722e989942b36e33e044787877f158574 https://git.kernel.org/stable/c/ac7d732b24f4061f8a732ada49b054ab38c63e15 rh#2282326 |
CVE-2021-47411 | kernel-source-rt:Ignore | low | 0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N) | CVE-2021-47411 SMASH Issue 407054 bnc#1225231 https://git.kernel.org/stable/c/648f59a06b0e1fec7a4158cdee9acd362e493ce1 https://git.kernel.org/stable/c/8bab4c09f24ec8d4a7a78ab343620f89d3a24804 rh#2282325 |
CVE-2021-47413 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47413 SMASH Issue 407056 bnc#1225333 https://git.kernel.org/stable/c/66dd03b10e1c0b2fae006c6e34c18ea8ee033e7b https://git.kernel.org/stable/c/8253a34bfae3278baca52fc1209b7c29270486ca https://git.kernel.org/stable/c/b3265b88e83b16c7be762fa5fb7e0632bce0002c rh#2282323 |
CVE-2021-47414 | kernel-source-rt:Unsupported | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47414 SMASH Issue 407057 bnc#1225334 https://git.kernel.org/stable/c/427faa29e06f0709476ea1bd59758f997ec8b64e https://git.kernel.org/stable/c/bb8958d5dc79acbd071397abb57b8756375fe1ce https://git.kernel.org/stable/c/f1c7aa87c423e765e3862349c2f095fdfccdd9b3 jsc#CAR-3658 rh#2282321 |
CVE-2021-47415 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47415 SMASH Issue 407058 bnc#1225335 https://git.kernel.org/stable/c/24d5f16e407b75bc59d5419b957a9cab423b2681 https://git.kernel.org/stable/c/432d8185e9ffce97e3866ca71c39b0807a456920 rh#2282320 |
CVE-2021-47416 | kernel-source-rt:Already fixed | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-47416 SMASH Issue 407059 bnc#1225189 bnc#1225336 https://git.kernel.org/stable/c/064c2616234a7394867c924b5c1303974f3a4f4d https://git.kernel.org/stable/c/0d2dd40a7be61b89a7c99dae8ee96389d27b413a https://git.kernel.org/stable/c/2250392d930bd0d989f24d355d6355b0150256e7 https://git.kernel.org/stable/c/2397b9e118721292429fea8807a698e71b94795f https://git.kernel.org/stable/c/25e9f88c7e3cc35f5e3d3db199660d28a15df639 https://git.kernel.org/stable/c/414bb4ead1362ef2c8592db723c017258f213988 https://git.kernel.org/stable/c/ca6e11c337daf7925ff8a2aac8e84490a8691905 https://git.kernel.org/stable/c/f4f502a04ee1e543825af78f47eb7785015cd9f6 rh#2282319 |
CVE-2021-47417 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47417 SMASH Issue 406866 bnc#1225227 https://git.kernel.org/stable/c/9e8e7504e09831c469b67d6dc11d9a72654bdb8c https://git.kernel.org/stable/c/b0e875bac0fab3e7a7431c2eee36a8ccc0c712ac rh#2282318 |
CVE-2021-47419 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47419 SMASH Issue 407061 bnc#1225338 https://git.kernel.org/stable/c/3ec73ffeef54596c32aff0e73fe60971b9c8b866 https://git.kernel.org/stable/c/7a1c1af341041221b3acb9d7036cc2b43e0efa75 https://git.kernel.org/stable/c/a56d447f196fa9973c568f54c0d76d5391c3b0c0 https://git.kernel.org/stable/c/c951c08a5996365aecbc5f1a9bddec3905e1ddfc rh#2282315 |
CVE-2021-47420 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-47420 SMASH Issue 407062 bnc#1225339 https://git.kernel.org/stable/c/7e5ce6029b627efb4a004746cfdc1eeff850e6eb https://git.kernel.org/stable/c/b072ef1215aca33186e3a10109e872e528a9e516 rh#2282313 |
CVE-2021-47421 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47421 SMASH Issue 407063 bnc#1225353 https://git.kernel.org/stable/c/248b061689a40f4fed05252ee2c89f87cf26d7d8 https://git.kernel.org/stable/c/72e9a1bf9b722628c28092e0c2cd8717edd201dc rh#2282312 |
CVE-2021-47422 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47422 SMASH Issue 407064 bnc#1225233 https://git.kernel.org/stable/c/0b3d4945cc7e7ea1acd52cb06dfa83bfe265b6d5 https://git.kernel.org/stable/c/0b4e9fc14973a94ac0520f19b3633493ae13c912 https://git.kernel.org/stable/c/65fff0a8efcdca8d84ffe3e23057c3b32403482d rh#2282311 |
CVE-2021-47423 | kernel-source-rt:Already fixed | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-47423 SMASH Issue 407065 bnc#1225366 https://git.kernel.org/stable/c/11cd944bb87d9e575b94c07c952105eda745b459 https://git.kernel.org/stable/c/1508b09945bde393326a9dab73b1fc35f672d771 https://git.kernel.org/stable/c/88c3610045ca6e699331b6bb5c095c5565f30721 https://git.kernel.org/stable/c/9f9d4c88b2edc7924e19c44909cfc3fa4e4d3d43 https://git.kernel.org/stable/c/df0c9418923679bc6d0060bdb1b5bf2c755159e0 https://git.kernel.org/stable/c/f5a8703a9c418c6fc54eb772712dfe7641e3991c https://git.kernel.org/stable/c/f69556a42043b5444ca712ee889829ba89fdcba8 rh#2282310 |
CVE-2021-47424 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47424 SMASH Issue 407066 bnc#1225367 https://git.kernel.org/stable/c/17063cac4088b8e2fc0f633abddca5426ed58312 https://git.kernel.org/stable/c/2e5a20573a926302b233b0c2e1077f5debc7ab2e https://git.kernel.org/stable/c/60ad4cde0ad28921f9ea25b0201c774b95ffa4b4 https://git.kernel.org/stable/c/75099439209d3cda439a1d9b00d19a50f0066fef https://git.kernel.org/stable/c/97aeed72af4f83ae51534f0a2473ff52f8d66236 rh#2282308 |
CVE-2021-47425 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47425 SMASH Issue 407067 bnc#1225223 https://git.kernel.org/stable/c/3d9d458a8aaafa47268ea4f1b4114a9f12927989 https://git.kernel.org/stable/c/60bacf259e8c2eb2324f3e13275200baaee9494b https://git.kernel.org/stable/c/6558b646ce1c2a872fe1c2c7cb116f05a2c1950f https://git.kernel.org/stable/c/90f1077c9184ec2ae9989e4642f211263f301694 https://git.kernel.org/stable/c/b8090a84d7758b929d348bafbd86bb7a10c5fb63 https://git.kernel.org/stable/c/f86de018fd7a24ee07372d55ffa7824f0c674a95 rh#2282307 |
CVE-2021-47426 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-47426 SMASH Issue 407068 bnc#1225370 https://git.kernel.org/stable/c/29fdb11ca88d3c490a3d56f0dc77eb9444d086be https://git.kernel.org/stable/c/686cb8b9f6b46787f035afe8fbd132a74e6b1bdd https://git.kernel.org/stable/c/a326f9c01cfbee4450ae49ce618ae6cbc0f76842 https://git.kernel.org/stable/c/d590a410e472417a22336c7c37685bfb38e801f2 rh#2282306 |
CVE-2021-47427 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47427 SMASH Issue 407069 bnc#1225225 https://git.kernel.org/stable/c/1642f51ac0d4f2b55d5748094c49ff8f7191b93c https://git.kernel.org/stable/c/258aad75c62146453d03028a44f2f1590d58e1f6 rh#2282305 |
CVE-2021-47429 | kernel-source-rt:Not affected | important | 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H) | CVE-2021-47429 SMASH Issue 407071 bnc#1225388 https://git.kernel.org/stable/c/d7a8e38999fbd6910516e44cb43f9f4317e54f73 https://git.kernel.org/stable/c/f08fb25bc66986b0952724530a640d9970fa52c1 rh#2282302 |
CVE-2021-47430 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47430 SMASH Issue 407072 bnc#1225228 https://git.kernel.org/stable/c/3958b9c34c2729597e182cc606cc43942fd19f7c https://git.kernel.org/stable/c/4e9ec1c65da98c293f75d83755dfa5e03075a6d0 https://git.kernel.org/stable/c/f2447f6587b8ffe42ba04d14ce67d429a1163e5e rh#2282301 |
CVE-2021-47431 | kernel-source-rt:Already fixed | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-47431 SMASH Issue 407073 bnc#1225390 https://git.kernel.org/stable/c/18d1c5ea3798ba42cfa0f8b2264d873463facb03 https://git.kernel.org/stable/c/621ddffb70db824eabd63d18ac635180fe9500f9 https://git.kernel.org/stable/c/66805763a97f8f7bdf742fc0851d85c02ed9411f https://git.kernel.org/stable/c/83d857d6b0967b6709cd38750c3ce2ed8ced1a95 rh#2282300 |
CVE-2021-47434 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47434 SMASH Issue 407288 bnc#1225232 https://git.kernel.org/stable/c/01c2dcb67e71c351006dd17cbba86c26b7f61eaf https://git.kernel.org/stable/c/22bcb65ea41072ab5d03c0c6290e04e0df6d09a0 https://git.kernel.org/stable/c/62c182b5e763e5f4062e72678e72ce3e02dd4d1b https://git.kernel.org/stable/c/dec944bb7079b37968cf69c8a438f91f15c4cc61 https://git.kernel.org/stable/c/e54abefe703ab7c4e5983e889babd1447738ca42 https://git.kernel.org/stable/c/ff0e50d3564f33b7f4b35cadeabd951d66cfc570 rh#2282880 |
CVE-2021-47436 | kernel-source-rt:Already fixed | moderate | () | CVE-2021-47436 SMASH Issue 407290 bnc#1225244 https://git.kernel.org/stable/c/5ed60a430fb5f3d93e7fef66264daef466b4d10c https://git.kernel.org/stable/c/9ab5d539bc975b8dcde86eca1b58d836b657732e https://git.kernel.org/stable/c/9d89e287116796bf987cc48f5c8632ef3048f8eb https://git.kernel.org/stable/c/c2115b2b16421d93d4993f3fe4c520e91d6fe801 https://git.kernel.org/stable/c/e923bce31ffefe4f60edfc6b84f62d4a858f3676 https://git.kernel.org/stable/c/ff9249aab39820be11b6975a10d94253b7d426fc rh#2282878 |
CVE-2021-47437 | kernel-source-rt:Not affected | moderate | () | CVE-2021-47437 SMASH Issue 407291 bnc#1225245 https://git.kernel.org/stable/c/04e03b907022ebd876f422f17efcc2c6cc934dc6 https://git.kernel.org/stable/c/9da1b86865ab4376408c58cd9fec332c8bdb5c73 rh#2282876 |
CVE-2021-47439 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47439 SMASH Issue 407293 bnc#1225246 https://git.kernel.org/stable/c/383239a33cf29ebee9ce0d4e0e5c900b77a16148 https://git.kernel.org/stable/c/ef1100ef20f29aec4e62abeccdb5bdbebba1e378 https://git.kernel.org/stable/c/f2e1de075018cf71bcd7d628e9f759cb8540b0c3 rh#2282873 |
CVE-2021-47441 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47441 SMASH Issue 407295 bnc#1225224 https://git.kernel.org/stable/c/332fdf951df8b870e3da86b122ae304e2aabe88c https://git.kernel.org/stable/c/ae0993739e14a102d506aa09e11b0065f3144f10 https://git.kernel.org/stable/c/df8e58716afb3bee2b59de66b1ba1033f2e26303 https://git.kernel.org/stable/c/e59d839743b50cb1d3f42a786bea48cc5621d254 rh#2282851 |
CVE-2021-47442 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47442 SMASH Issue 407296 bnc#1225263 https://git.kernel.org/stable/c/071bdef36391958c89af5fa2172f691b31baa212 https://git.kernel.org/stable/c/291c932fc3692e4d211a445ba8aa35663831bac7 https://git.kernel.org/stable/c/2bde4aca56db9fe25405d39ddb062531493a65db https://git.kernel.org/stable/c/50cb95487c265187289810addec5093d4fed8329 https://git.kernel.org/stable/c/6432d7f1d1c3aa74cfe8f5e3afdf81b786c32e86 https://git.kernel.org/stable/c/74569c78aa84f8c958f1334b465bc530906ec99a https://git.kernel.org/stable/c/88c890b0b9a1fb9fcd01c61ada515e8b636c34f9 https://git.kernel.org/stable/c/fcce6e5255474ca33c27dda0cdf9bf5087278873 rh#2282850 |
CVE-2021-47443 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47443 SMASH Issue 407297 bnc#1225262 https://git.kernel.org/stable/c/3f2960b39f22e26cf8addae93c3f5884d1c183c9 https://git.kernel.org/stable/c/429054ec51e648d241a7e0b465cf44f6633334c5 https://git.kernel.org/stable/c/564249219e5b5673a8416b5181875d828c3f1e8c https://git.kernel.org/stable/c/58e7dcc9ca29c14e44267a4d0ea61e3229124907 https://git.kernel.org/stable/c/7ab488d7228a9dceb2456867f1f0919decf6efed https://git.kernel.org/stable/c/9881b0c860649f27ef2565deef011e516390f416 https://git.kernel.org/stable/c/a67d47e32c91e2b10402cb8c081774cbf08edb2e https://git.kernel.org/stable/c/b7b023e6ff567e991c31cd425b0e1d16779c938b rh#2282849 |
CVE-2021-47444 | kernel-source-rt:Not affected | moderate | () | CVE-2021-47444 SMASH Issue 407298 bnc#1225243 https://git.kernel.org/stable/c/09f3946bb452918dbfb1982add56f9ffaae393dc https://git.kernel.org/stable/c/97794170b696856483f74b47bfb6049780d2d3a0 https://git.kernel.org/stable/c/a7b45024f66f9ec769e8dbb1a51ae83cd05929c7 rh#2282848 |
CVE-2021-47445 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47445 SMASH Issue 407299 bnc#1225261 https://git.kernel.org/stable/c/0cd063aa0a09822cc1620fc59a67fe2f9f6338ac https://git.kernel.org/stable/c/2133c4fc8e1348dcb752f267a143fe2254613b34 https://git.kernel.org/stable/c/46c8ddede0273d1d132beefa9de8b820326982be https://git.kernel.org/stable/c/7f642b93710b6b1119bdff90be01e6b5a2a5d669 https://git.kernel.org/stable/c/91a340768b012f5b910a203a805b97a345b3db37 https://git.kernel.org/stable/c/bacac7d26849c8e903ceb7466d9ce8dc3c2797eb https://git.kernel.org/stable/c/f175b9a83e5c252d7c74acddc792840016caae0a https://git.kernel.org/stable/c/f302be08e3de94db8863a0b2958b2bb3e8e998e6 rh#2282847 |
CVE-2021-47446 | kernel-source-rt:Not affected | moderate | () | CVE-2021-47446 SMASH Issue 407300 bnc#1225240 https://git.kernel.org/stable/c/3962d626eb3e3b23ebb2e2a61537fa764acbfe11 https://git.kernel.org/stable/c/980d74e7d03ccf2eaa11d133416946bd880c7c08 rh#2282846 |
CVE-2021-47447 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47447 SMASH Issue 407301 bnc#1225260 https://git.kernel.org/stable/c/3eda901995371d390ef82d0b6462f4ea8efbcfdf https://git.kernel.org/stable/c/d59e44e7821a8f2bb6f2e846b9167397a5f01608 rh#2282914 |
CVE-2021-47448 | kernel-source-rt:Not affected | moderate | 5.7 (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H) | CVE-2021-47448 SMASH Issue 407302 bnc#1225129 https://git.kernel.org/stable/c/1a4554e94f0deff9fc1dc5addf93fa579cc29711 https://git.kernel.org/stable/c/612f71d7328c14369924384ad2170aae2a6abd92 rh#2282913 |
CVE-2021-47449 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47449 SMASH Issue 407303 bnc#1225259 https://git.kernel.org/stable/c/4d4a223a86afe658cd878800f09458e8bb54415d https://git.kernel.org/stable/c/61616be899975404df44c20ab902464b60882cd7 rh#2282911 |
CVE-2021-47450 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47450 SMASH Issue 407304 bnc#1225258 https://git.kernel.org/stable/c/1d58a17ef54599506d44c45ac95be27273a4d2b1 https://git.kernel.org/stable/c/b372264c66ef78f2cab44e877fbd765ad6d24c39 rh#2282909 |
CVE-2021-47451 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47451 SMASH Issue 407305 bnc#1225237 https://git.kernel.org/stable/c/2a670c323055282c9b72794a491d53cef86bbeaf https://git.kernel.org/stable/c/902c0b1887522a099aa4e1e6b4b476c2fe5dd13e https://git.kernel.org/stable/c/cae7cab804c943d723d52724a3aeb07a3f4a2650 rh#2282907 |
CVE-2021-47452 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47452 SMASH Issue 407306 bnc#1225257 https://git.kernel.org/stable/c/68a3765c659f809dcaac20030853a054646eb739 https://git.kernel.org/stable/c/90c7c58aa2bd02c65a4c63b7dfe0b16eab12cf9f rh#2282906 |
CVE-2021-47453 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47453 SMASH Issue 407307 bnc#1225239 https://git.kernel.org/stable/c/73e30a62b19b9fbb4e6a3465c59da186630d5f2e https://git.kernel.org/stable/c/777682e59840e24e6c5672197e6ffbcf4bff823b rh#2282905 |
CVE-2021-47454 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47454 SMASH Issue 407308 bnc#1225255 https://git.kernel.org/stable/c/3ea0b497a7a2fff6a4b7090310c9f52c91975934 https://git.kernel.org/stable/c/53770a411559cf7bc0906d1df319cc533d2f4f58 https://git.kernel.org/stable/c/787252a10d9422f3058df9a4821f389e5326c440 rh#2282904 |
CVE-2021-47456 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47456 SMASH Issue 407310 bnc#1225256 https://git.kernel.org/stable/c/0e5afdc2315b0737edcf55bede4ee1640d2d464d https://git.kernel.org/stable/c/1248582e47a9f7ce0ecd156c39fc61f8b6aa3699 https://git.kernel.org/stable/c/1c616528ba4aeb1125a06b407572ab7b56acae38 https://git.kernel.org/stable/c/28f28e4bc3a5e0051faa963f10b778ab38c1db69 https://git.kernel.org/stable/c/34914971bb3244db4ce2be44e9438a9b30c56250 https://git.kernel.org/stable/c/447d44cd2f67a20b596ede3ca3cd67086dfd9ca9 https://git.kernel.org/stable/c/949fe9b35570361bc6ee2652f89a0561b26eec98 https://git.kernel.org/stable/c/adbda14730aacce41c0d3596415aa39ad63eafd9 rh#2282902 |
CVE-2021-47457 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47457 SMASH Issue 407311 bnc#1225235 https://git.kernel.org/stable/c/053bc12df0d6097c1126d0e14fa778a0a8faeb64 https://git.kernel.org/stable/c/9acf636215a6ce9362fe618e7da4913b8bfe84c8 https://git.kernel.org/stable/c/a76abedd2be3926d6deba236a935c7f98abf9110 rh#2282901 |
CVE-2021-47459 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47459 SMASH Issue 407313 bnc#1225253 https://git.kernel.org/stable/c/6e8811707e2df0c6ba920f0cad3a3bca7b42132f https://git.kernel.org/stable/c/864e77771a24c877aaf53aee019f78619cbcd668 https://git.kernel.org/stable/c/a0e47d2833b4f65e6c799f28c6b636d36b8b936d https://git.kernel.org/stable/c/d9d52a3ebd284882f5562c88e55991add5d01586 rh#2282898 |
CVE-2021-47460 | kernel-source-rt:Already fixed | low | () | CVE-2021-47460 SMASH Issue 407314 bnc#1225251 https://git.kernel.org/stable/c/5314454ea3ff6fc746eaf71b9a7ceebed52888fa https://git.kernel.org/stable/c/560edd14de2bf9dbc0129681eeb4d5ef87cc105f https://git.kernel.org/stable/c/8e6bfb4f70168ddfd32fb6dc028ad52faaf1f32e https://git.kernel.org/stable/c/a3a089c241cd49b33a8cdd7fcb37cc87a086912a https://git.kernel.org/stable/c/b05caf023b14cbed9223bb5b48ecc7bffe38f632 https://git.kernel.org/stable/c/f1b98569e81c37d7e0deada7172f8f60860c1360 https://git.kernel.org/stable/c/fa9b6b6c953e3f6441ed6cf83b4c771dac2dae08 |
CVE-2021-47461 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47461 SMASH Issue 407277 bnc#1225249 https://git.kernel.org/stable/c/149958ecd0627a9f1e9c678c25c665400054cd6a https://git.kernel.org/stable/c/3cda4bfffd4f755645577aaa9e96a606657b4525 https://git.kernel.org/stable/c/cb185d5f1ebf900f4ae3bf84cee212e6dd035aca rh#2282896 |
CVE-2021-47462 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47462 SMASH Issue 407315 bnc#1225250 https://git.kernel.org/stable/c/6d2aec9e123bb9c49cb5c7fc654f25f81e688e8c https://git.kernel.org/stable/c/9ee4e9ae98f1f262d6fae0d266cfdf3ba2c321d9 rh#2282895 |
CVE-2021-47463 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47463 SMASH Issue 407316 bnc#1225127 https://git.kernel.org/stable/c/79f9bc5843142b649575f887dccdf1c07ad75c20 https://git.kernel.org/stable/c/b77ba1e02345bafd703f0d407bdbd88c3be1f767 rh#2282893 |
CVE-2021-47464 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47464 SMASH Issue 407317 bnc#1225393 https://git.kernel.org/stable/c/16802fa4c33eb1a8efb23f1e93365190e4047d05 https://git.kernel.org/stable/c/4e9e46a700201b4c85081fd478c99c692a9aaa0d https://git.kernel.org/stable/c/6e3ee990c90494561921c756481d0e2125d8b895 https://git.kernel.org/stable/c/d6f451f1f60c58d73038c7c3177066f8f084e2a2 rh#2282892 |
CVE-2021-47465 | kernel-source-rt:Already fixed | important | 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H) | CVE-2021-47465 SMASH Issue 407318 bnc#1225341 https://git.kernel.org/stable/c/6d077c37c4643394b1bae9682da48164fc147ea8 https://git.kernel.org/stable/c/80bbb0bc3a0288442f7fe6fc514f4ee1cb06ccb7 https://git.kernel.org/stable/c/9b4416c5095c20e110c82ae602c254099b83b72f https://git.kernel.org/stable/c/fbd724c49bead048ae9fc1a5b7bff2fb3e54f855 rh#2282891 |
CVE-2021-47466 | kernel-source-rt:Ignore | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L) | CVE-2021-47466 SMASH Issue 407285 bnc#1225342 https://git.kernel.org/stable/c/42b81946e3ac9ea0372ba16e05160dc11e02694f https://git.kernel.org/stable/c/4f5d1c29cfab5cb0ab885059818751bdef32e2bb https://git.kernel.org/stable/c/568f906340b43120abd6fcc67c37396482f85930 https://git.kernel.org/stable/c/9037c57681d25e4dcc442d940d6dbe24dd31f461 jsc#CAR-3660 rh#2282890 |
CVE-2021-47467 | kernel-source-rt:Not affected | low | 0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N) | CVE-2021-47467 SMASH Issue 407319 bnc#1225344 https://git.kernel.org/stable/c/bbdd158b40b66a9403391a517f24ef6613573446 https://git.kernel.org/stable/c/f62314b1ced25c58b86e044fc951cd6a1ea234cf rh#2282889 |
CVE-2021-47468 | kernel-source-rt:Already fixed | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47468 SMASH Issue 407320 bnc#1225346 https://git.kernel.org/stable/c/37e4f57b22cc5ebb3f80cf0f74fdeb487f082367 https://git.kernel.org/stable/c/4054b869dc263228d30a4755800b78f0f2ba0c89 https://git.kernel.org/stable/c/6510e80a0b81b5d814e3aea6297ba42f5e76f73c https://git.kernel.org/stable/c/6f95c97e0f9d6eb39c3f2cb45e8fa4268d1b372b https://git.kernel.org/stable/c/9f591cbdbed3d7822b2bdba89b34a6d7b434317d https://git.kernel.org/stable/c/a5b34409d3fc52114c828be4adbc30744fa3258b https://git.kernel.org/stable/c/ef269a8808cb1759245a98a7fe16fceaebad894c https://git.kernel.org/stable/c/f5966ba53013149bcf94e1536644a958dd00a026 rh#2282887 |
CVE-2021-47469 | kernel-source-rt:Ignore | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47469 SMASH Issue 407321 bnc#1225347 https://git.kernel.org/stable/c/6098475d4cb48d821bdf453c61118c56e26294f0 https://git.kernel.org/stable/c/722ef19a161ce3fffb3d1b01ce2301c306639bdd jsc#CAR-3661 rh#2282886 |
CVE-2021-47470 | kernel-source-rt:Not affected | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47470 SMASH Issue 407322 bnc#1225186 https://git.kernel.org/stable/c/159d8cfbd0428d487c53be4722f33cdab0d25d83 https://git.kernel.org/stable/c/67823a544414def2a36c212abadb55b23bcda00c rh#2282885 |
CVE-2021-47471 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47471 SMASH Issue 407323 bnc#1225187 https://git.kernel.org/stable/c/3cfc183052c3dbf8eae57b6c1685dab00ed3db4a https://git.kernel.org/stable/c/b0e6db0656ddfd8bb57303c2ef61ee1c1cc694a8 https://git.kernel.org/stable/c/f40c2281d2c0674d32ba732fee45222d76495472 rh#2282884 |
CVE-2021-47472 | kernel-source-rt:Analysis | low | 2.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-47472 SMASH Issue 407324 bnc#1225189 https://git.kernel.org/stable/c/0c4e87ba11eb331dca2315d484d08441b8c13193 https://git.kernel.org/stable/c/2bc10dca9432fadb09e45127e258fc7127fd346d https://git.kernel.org/stable/c/3a0dc2e35a5d6546b1db87fe985582dadc64fe7b https://git.kernel.org/stable/c/4ec0f9abc512cc02fb04daa89ccf6697e80ab417 https://git.kernel.org/stable/c/6a18d155d5b35ad50c8fac2be091212487ae58ec https://git.kernel.org/stable/c/8121d0d4fd108280f5cd7b7fe8c6592adaa37be9 https://git.kernel.org/stable/c/8ba94a7f7b9fc2a2b808ccceb99b77135deae21a https://git.kernel.org/stable/c/a9831afa2dc8a18205403907c41aa4e0950ac611 https://git.kernel.org/stable/c/ab609f25d19858513919369ff3d9a63c02cd9e2e https://git.kernel.org/stable/c/b0feaa8376f52357bf2fd020d0c471713a859728 https://git.kernel.org/stable/c/b89f4537d7fdbd0bafb6d8a66a484e0bc99871a4 https://git.kernel.org/stable/c/bc5f2f3431ced08300e4cb3aff35f1da14c26433 https://git.kernel.org/stable/c/c828115a14eacbf42042770fd68543f134e89efa https://git.kernel.org/stable/c/fd2400dd4f1b8bd7a309b1b424d9e0d188151b01 https://git.kernel.org/stable/c/fdbffd95c4ce94d2197c504008eaac46b16bc5a4 rh#2282883 |
CVE-2021-47473 | kernel-source-rt:Already fixed | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-47473 SMASH Issue 407276 bnc#1225192 https://git.kernel.org/stable/c/7fb223d0ad801f633c78cbe42b1d1b55f5d163ad https://git.kernel.org/stable/c/96f0aebf29be25254fa585af43924e34aa21fd9a https://git.kernel.org/stable/c/a7fbb56e6c941d9f59437b96412a348e66388d3e rh#2282882 |
CVE-2021-47474 | kernel-source-rt:Not affected | moderate | 6.8 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47474 SMASH Issue 407352 bnc#1224915 https://git.kernel.org/stable/c/063f576c43d589a4c153554b681d32b3f8317c7b https://git.kernel.org/stable/c/0866dcaa828c21bc2f94dac00e086078f11b5772 https://git.kernel.org/stable/c/1ae4715121a57bc6fa29fd992127b01907f2f993 https://git.kernel.org/stable/c/47b4636ebdbeba2044b3db937c4d2b6a4fe3d0f2 https://git.kernel.org/stable/c/78cdfd62bd54af615fba9e3ca1ba35de39d3871d https://git.kernel.org/stable/c/7b0e356189327287d0eb98ec081bd6dd97068cd3 https://git.kernel.org/stable/c/7cfb35db607760698d299fd1cf7402dfa8f09973 https://git.kernel.org/stable/c/b7fd7f3387f070215e6be341e68eb5c087eeecc0 https://git.kernel.org/stable/c/e0e6a63fd97ad95fe05dfd77268a1952551e11a7 jsc#CAR-3552 rh#2282949 |
CVE-2021-47475 | kernel-source-rt:Not affected | moderate | 4.6 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47475 SMASH Issue 407353 bnc#1224914 https://git.kernel.org/stable/c/06ac746d57e6d32b062e220415c607b7e2e0fa50 https://git.kernel.org/stable/c/199acd8c110e3ae62833c24f632b0bb1c9f012a9 https://git.kernel.org/stable/c/278484ae93297b1bb1ce755f9d3b6d95a48c7d47 https://git.kernel.org/stable/c/33d7a470730dfe7c9bfc8da84575cf2cedd60d00 https://git.kernel.org/stable/c/40d2a7e278e2e7c0a5fd7e997e7eb63945bf93f7 https://git.kernel.org/stable/c/5229159f1d052821007aff1a1beb7873eacf1a9f https://git.kernel.org/stable/c/7a2021b896de1ad559d33b5c5cdd20b982242088 https://git.kernel.org/stable/c/a23461c47482fc232ffc9b819539d1f837adf2b1 https://git.kernel.org/stable/c/ec85bcff4ed09260243d8f39faba99e1041718ba jsc#CAR-3551 rh#2282948 |
CVE-2021-47476 | kernel-source-rt:Not affected | moderate | 4.6 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47476 SMASH Issue 407354 bnc#1224913 https://git.kernel.org/stable/c/4a9d43cb5d5f39fa39fc1da438517004cc95f7ea https://git.kernel.org/stable/c/58478143771b20ab219937b1c30a706590a59224 https://git.kernel.org/stable/c/907767da8f3a925b060c740e0b5c92ea7dbec440 https://git.kernel.org/stable/c/aa39738423503825625853b643b9e99d11c23816 https://git.kernel.org/stable/c/b0156b7c9649d8f55a2ce3d3258509f1b2a181c3 https://git.kernel.org/stable/c/bc51111bf6e8e7b6cc94b133e4c291273a16acd1 https://git.kernel.org/stable/c/d6a727a681a39ae4f73081a9bedb45d14f95bdd1 https://git.kernel.org/stable/c/df7b1238f3b599a0b9284249772cdfd1ea83a632 https://git.kernel.org/stable/c/ef143dc0c3defe56730ecd3a9de7b3e1d7e557c1 jsc#CAR-3550 rh#2282947 |
CVE-2021-47477 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L) | CVE-2021-47477 SMASH Issue 407355 bnc#1224912 https://git.kernel.org/stable/c/20cebb8b620dc987e55ddc46801de986e081757e https://git.kernel.org/stable/c/365a346cda82f51d835c49136a00a9df8a78c7f2 https://git.kernel.org/stable/c/39ea61037ae78f14fa121228dd962ea3280eacf3 https://git.kernel.org/stable/c/3ac273d154d634e2034508a14db82a95d7ad12ed https://git.kernel.org/stable/c/3efb7af8ac437085b6c776e5b54830b149d86efe https://git.kernel.org/stable/c/536de747bc48262225889a533db6650731ab25d3 https://git.kernel.org/stable/c/786f5b03450454557ff858a8bead5d7c0cbf78d6 https://git.kernel.org/stable/c/8a52bc480992c7c9da3ebfea456af731f50a4b97 https://git.kernel.org/stable/c/a6af69768d5cb4b2528946d53be5fa19ade37723 jsc#CAR-3549 rh#2282946 |
CVE-2021-47479 | kernel-source-rt:Not affected | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47479 SMASH Issue 407357 bnc#1224911 https://git.kernel.org/stable/c/a65c9afe9f2f55b7a7fb4a25ab654cd4139683a4 https://git.kernel.org/stable/c/befd23bd3b17f1a3f9c943a8580b47444c7c63ed https://git.kernel.org/stable/c/c052cc1a069c3e575619cf64ec427eb41176ca70 https://git.kernel.org/stable/c/c430094541a80575259a94ff879063ef01473506 jsc#CAR-3548 rh#2282944 |
CVE-2021-47481 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47481 SMASH Issue 407359 bnc#1224910 https://git.kernel.org/stable/c/5508546631a0f555d7088203dec2614e41b5106e https://git.kernel.org/stable/c/5f6995295f65d1ee6f36d466d26afd98eb797afe rh#2282942 |
CVE-2021-47482 | kernel-source-rt:Already fixed | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-47482 SMASH Issue 407360 bnc#1224909 https://git.kernel.org/stable/c/07533f1a673ce1126d0a72ef1e4b5eaaa3dd6d20 https://git.kernel.org/stable/c/0c6b199f09be489c48622537a550787fc80aea73 https://git.kernel.org/stable/c/6422e8471890273994fe8cc6d452b0dcd2c9483e https://git.kernel.org/stable/c/6f68cd634856f8ca93bafd623ba5357e0f648c68 https://git.kernel.org/stable/c/a8f7359259dd5923adc6129284fdad12fc5db347 https://git.kernel.org/stable/c/b0a2cd38553c77928ef1646ed1518486b1e70ae8 https://git.kernel.org/stable/c/e50f957652190b5a88a8ebce7e5ab14ebd0d3f00 https://git.kernel.org/stable/c/fbf150b16a3635634b7dfb7f229d8fcd643c6c51 rh#2282941 |
CVE-2021-47483 | kernel-source-rt:Already fixed | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47483 SMASH Issue 407361 bnc#1224907 bnc#1224908 https://git.kernel.org/stable/c/1cead23c1c0bc766dacb900a3b0269f651ad596f https://git.kernel.org/stable/c/36e911a16b377bde0ad91a8c679069d0d310b1a6 https://git.kernel.org/stable/c/3dae1a4eced3ee733d7222e69b8a55caf2d61091 https://git.kernel.org/stable/c/50cc1462a668dc62949a1127388bc3af785ce047 https://git.kernel.org/stable/c/55e6d8037805b3400096d621091dfbf713f97e83 https://git.kernel.org/stable/c/758ced2c3878ff789801e6fee808e185c5cf08d6 https://git.kernel.org/stable/c/e72dce9afbdbfa70d9b44f5908a50ff6c4858999 https://git.kernel.org/stable/c/fc081477b47dfc3a6cb50a96087fc29674013fc2 rh#2282939 |
CVE-2021-47484 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47484 SMASH Issue 407362 bnc#1224905 https://git.kernel.org/stable/c/c2d4c543f74c90f883e8ec62a31973ae8807d354 https://git.kernel.org/stable/c/f1e3cd1cc80204fd02b9e9843450925a2af90dc0 rh#2282938 |
CVE-2021-47486 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47486 SMASH Issue 407364 bnc#1224903 https://git.kernel.org/stable/c/27de809a3d83a6199664479ebb19712533d6fd9b https://git.kernel.org/stable/c/cac6b043cea3e120f4fccec16f7381747cbfdc0d https://git.kernel.org/stable/c/e1b80a5ebe5431caeb20f88c32d4a024777a2d41 rh#2282936 |
CVE-2021-47487 | kernel-source-rt:Ignore | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47487 SMASH Issue 407365 bnc#1225423 https://git.kernel.org/stable/c/5afa7898ab7a0ec9c28556a91df714bf3c2f725e https://git.kernel.org/stable/c/d3ed72495a59fbfb9377450c8dfe94389a6509a7 https://git.kernel.org/stable/c/eb3b6805e3e9d98b2507201fd061a231988ce623 rh#2282933 |
CVE-2021-47488 | kernel-source-rt:Not affected | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47488 SMASH Issue 407366 bnc#1224902 https://git.kernel.org/stable/c/01599bf7cc2b49c3d2be886cb438647dc25446ed https://git.kernel.org/stable/c/04f8ef5643bcd8bcde25dfdebef998aea480b2ba https://git.kernel.org/stable/c/b529f88d93884cf8ccafda793ee3d27b82fa578d rh#2282929 |
CVE-2021-47489 | kernel-source-rt:Not affected | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47489 SMASH Issue 407367 bnc#1224901 https://git.kernel.org/stable/c/3f4e54bd312d3dafb59daf2b97ffa08abebe60f5 https://git.kernel.org/stable/c/9eb4bdd554fc31a5ef6bf645a20ff21618ce45a9 rh#2282928 |
CVE-2021-47491 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47491 SMASH Issue 407369 bnc#1224900 https://git.kernel.org/stable/c/5fcb6fce74ffa614d964667110cf1a516c48c6d9 https://git.kernel.org/stable/c/6d67b2a73b8e3a079c355bab3c1aef7d85a044b8 https://git.kernel.org/stable/c/a4aeaa06d45e90f9b279f0b09de84bd00006e733 rh#2282925 |
CVE-2021-47492 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47492 SMASH Issue 407370 bnc#1224898 https://git.kernel.org/stable/c/5e669d8ab30ab61dec3c36e27b4711f07611e6fc https://git.kernel.org/stable/c/69a7fa5cb0de06c8956b040f19a7248c8c8308ca https://git.kernel.org/stable/c/74c42e1baacf206338b1dd6b6199ac964512b5bb rh#2282924 |
CVE-2021-47493 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47493 SMASH Issue 407371 bnc#1225439 https://git.kernel.org/stable/c/2e382600e8856ea654677b5134ee66e03ea72bc2 https://git.kernel.org/stable/c/5043fbd294f5909a080ade0f04b70a4da9e122b7 https://git.kernel.org/stable/c/6f1b228529ae49b0f85ab89bcdb6c365df401558 rh#2282922 |
CVE-2021-47494 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47494 SMASH Issue 407372 bnc#1225450 https://git.kernel.org/stable/c/09b1d5dc6ce1c9151777f6c4e128a59457704c97 https://git.kernel.org/stable/c/3c897f39b71fe68f90599f6a45b5f7bf5618420e https://git.kernel.org/stable/c/4c22227e39c7a0b4dab55617ee8d34d171fab8d4 rh#2282921 |
CVE-2021-47495 | kernel-source-rt:Already fixed | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-47495 SMASH Issue 407373 bnc#1225351 https://git.kernel.org/stable/c/002d82227c0abe29118cf80f7e2f396b22d448ed https://git.kernel.org/stable/c/397430b50a363d8b7bdda00522123f82df6adc5e https://git.kernel.org/stable/c/492140e45d2bf27c1014243f8616a9b612144e20 https://git.kernel.org/stable/c/524f333e98138d909a0a0c574a9ff6737dce2767 https://git.kernel.org/stable/c/693ecbe8f799405f8775719deedb1f76265d375a https://git.kernel.org/stable/c/74b3b27cf9fecce00cd8918b7882fd81191d0aa4 https://git.kernel.org/stable/c/7e8b6a4f18edee070213cb6a77118e8a412253c5 https://git.kernel.org/stable/c/b9eba0a4a527e04d712f0e0401e5391ef124b33e rh#2282920 |
CVE-2021-47502 | kernel-source-rt:Not affected | important | 7.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H) | CVE-2021-47502 SMASH Issue 407663 bnc#1225369 https://git.kernel.org/stable/c/1089dac26c6b4b833323ae6c0ceab29fb30ede72 https://git.kernel.org/stable/c/23ba28616d3063bd4c4953598ed5e439ca891101 https://git.kernel.org/stable/c/339ffb5b56005582aacc860524d2d208604049d1 rh#2283452 |
CVE-2021-47503 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47503 SMASH Issue 407654 bnc#1225374 https://git.kernel.org/stable/c/1e434d2687e8bc0b3cdc9dd093c0e9047c0b4add https://git.kernel.org/stable/c/653926205741add87a6cf452e21950eebc6ac10b https://git.kernel.org/stable/c/f8dccc1bdea7e21b5ec06c957aef8831c772661c rh#2283451 |
CVE-2021-47504 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-47504 SMASH Issue 407664 bnc#1225382 https://git.kernel.org/stable/c/78a780602075d8b00c98070fa26e389b3b3efa72 https://git.kernel.org/stable/c/8e12976c0c19ebc14b60046b1348c516a74c25a2 rh#2283450 |
CVE-2021-47505 | kernel-source-rt:Already fixed | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47505 SMASH Issue 407665 bnc#1225400 https://git.kernel.org/stable/c/321fba81ec034f88aea4898993c1bf15605c023f https://git.kernel.org/stable/c/4105e6a128e8a98455dfc9e6dbb2ab0c33c4497f https://git.kernel.org/stable/c/47ffefd88abfffe8a040bcc1dd0554d4ea6f7689 https://git.kernel.org/stable/c/50252e4b5e989ce64555c7aef7516bdefc2fea72 https://git.kernel.org/stable/c/60d311f9e6381d779d7d53371f87285698ecee24 rh#2283448 |
CVE-2021-47506 | kernel-source-rt:Already fixed | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47506 SMASH Issue 407666 bnc#1225404 https://git.kernel.org/stable/c/04a8d07f3d58308b92630045560799a3faa3ebce https://git.kernel.org/stable/c/148c816f10fd11df27ca6a9b3238cdd42fa72cd3 https://git.kernel.org/stable/c/2becaa990b93cbd2928292c0b669d3abb6cf06d4 https://git.kernel.org/stable/c/33645d3e22720cac1e4548f8fef57bf0649536ee https://git.kernel.org/stable/c/348714018139c39533c55661a0c7c990671396b4 https://git.kernel.org/stable/c/548ec0805c399c65ed66c6641be467f717833ab5 https://git.kernel.org/stable/c/e0759696de6851d7536efddfdd2dfed4c4df1f09 https://git.kernel.org/stable/c/eeb0711801f5e19ef654371b627682aed3b11373 rh#2283447 |
CVE-2021-47507 | kernel-source-rt:Ignore | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47507 SMASH Issue 407668 bnc#1225405 https://git.kernel.org/stable/c/8bf902fee5893cfc2f04a698abab47629699ae9a https://git.kernel.org/stable/c/b10252c7ae9c9d7c90552f88b544a44ee773af64 https://git.kernel.org/stable/c/c520943a00ad5015704969ad3304c956bcd49d25 https://git.kernel.org/stable/c/f5734b1714ca355703e9ea8fb61d04beff1790b9 jsc#CAR-3683 rh#2283445 |
CVE-2021-47508 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L) | CVE-2021-47508 SMASH Issue 407669 bnc#1225408 https://git.kernel.org/stable/c/ca06c5cb1b6dbfe67655b33c02fc394d65824519 https://git.kernel.org/stable/c/da5e817d9d75422eaaa05490d0b9a5e328fc1a51 jsc#CAR-3684 rh#2283444 |
CVE-2021-47510 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-47510 SMASH Issue 407671 bnc#1225410 https://git.kernel.org/stable/c/477675049ca803aa95ff77468ffbddd966b415b0 https://git.kernel.org/stable/c/84c25448929942edacba905cecc0474e91114e7a rh#2283442 |
CVE-2021-47512 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47512 SMASH Issue 407673 bnc#1225424 https://git.kernel.org/stable/c/2a51edaf5cc563574878b93d7ef3d5955dda7030 https://git.kernel.org/stable/c/61c2402665f1e10c5742033fce18392e369931d7 https://git.kernel.org/stable/c/d86216dfda7c98375f809e26a30bfdaaba21d46e rh#2283440 |
CVE-2021-47513 | kernel-source-rt:Not affected | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47513 SMASH Issue 407674 bnc#1225380 https://git.kernel.org/stable/c/973a0373e88cc19129bd6ef0ec193040535397d9 https://git.kernel.org/stable/c/e8b1d7698038e76363859fb47ae0a262080646f5 rh#2283439 |
CVE-2021-47514 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-47514 SMASH Issue 407675 bnc#1225425 https://git.kernel.org/stable/c/4b7e90672af8e0c78205db006f1b0a20ebd07f5f https://git.kernel.org/stable/c/4dbb0dad8e63fcd0b5a117c2861d2abe7ff5f186 https://git.kernel.org/stable/c/fe30b70ca84da9c4aca85c03ad86e7a9b89c5ded rh#2283437 |
CVE-2021-47516 | kernel-source-rt:Already fixed | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-47516 SMASH Issue 407677 bnc#1225427 https://git.kernel.org/stable/c/2e0e072e62fdaf7816220af08e05c020f0fcb77a https://git.kernel.org/stable/c/3e93abcdcec0436fbf0b6a88ae806902426895a2 https://git.kernel.org/stable/c/484069b5de9d223cc1c64c6f80389a99cfef51f1 https://git.kernel.org/stable/c/c56c96303e9289cc34716b1179597b6f470833de https://git.kernel.org/stable/c/eb51f639ef3fd5498b7def290ed8681b6aadd9a7 https://git.kernel.org/stable/c/f707820c09239d6f67699d9b2ff57863cc7905b0 rh#2283435 |
CVE-2021-47517 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47517 SMASH Issue 407678 bnc#1225428 bnc#1225429 https://git.kernel.org/stable/c/7c26da3be1e9843a15b5318f90db8a564479d2ac https://git.kernel.org/stable/c/cfd719f04267108f5f5bf802b9d7de69e99a99f9 https://git.kernel.org/stable/c/dde91ccfa25fd58f64c397d91b81a4b393100ffa rh#2283434 |
CVE-2021-47519 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-47519 SMASH Issue 407680 bnc#1225430 https://git.kernel.org/stable/c/31cb32a590d62b18f69a9a6d433f4e69c74fdd56 https://git.kernel.org/stable/c/75a422165477dd12d2d20aa7c9ee7c9a281c9908 rh#2283432 |
CVE-2021-47520 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47520 SMASH Issue 407681 bnc#1225431 bnc#1225434 https://git.kernel.org/stable/c/3a3c46e2eff0577454860a203be1a8295f4acb76 https://git.kernel.org/stable/c/3e193ef4e0a3f5bf92ede83ef214cb09d01b00aa https://git.kernel.org/stable/c/6c73fc931658d8cbc8a1714b326cb31eb71d16a7 https://git.kernel.org/stable/c/703dde112021c93d6e89443c070e7dbd4dea612e https://git.kernel.org/stable/c/94cddf1e9227a171b27292509d59691819c458db https://git.kernel.org/stable/c/abb4eff3dcd2e583060082a18a8dbf31f02689d4 https://git.kernel.org/stable/c/affbad02bf80380a7403885b9fe4a1587d1bb4f3 https://git.kernel.org/stable/c/bafe343a885c70dddf358379cf0b2a1c07355d8d jsc#CAR-3688 rh#2283431 |
CVE-2021-47521 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47521 SMASH Issue 407682 bnc#1225435 https://git.kernel.org/stable/c/1a295fea90e1acbe80c6d4940f5ff856edcd6bec https://git.kernel.org/stable/c/1dd5b819f7e406dc15bbc7670596ff25261aaa2a https://git.kernel.org/stable/c/3ec6ca6b1a8e64389f0212b5a1b0f6fed1909e45 https://git.kernel.org/stable/c/474f9a8534f5f89841240a7e978bafd6e1e039ce https://git.kernel.org/stable/c/923f4dc5df679f678e121c20bf2fd70f7bf3e288 https://git.kernel.org/stable/c/c8718026ba287168ff9ad0ccc4f9a413062cba36 https://git.kernel.org/stable/c/cbd86110546f7f730a1f5d7de56c944a336c15c4 https://git.kernel.org/stable/c/ccf070183e4655824936c0f96c4a2bcca93419aa rh#2283430 |
CVE-2021-47522 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47522 SMASH Issue 407683 bnc#1225437 https://git.kernel.org/stable/c/58f15f5ae7786c824868f3a7e093859b74669ce7 https://git.kernel.org/stable/c/6272b17001e6fdcf7b4a16206287010a1523fa6e https://git.kernel.org/stable/c/8e0ceff632f48175ec7fb4706129c55ca8a7c7bd https://git.kernel.org/stable/c/918aa1ef104d286d16b9e7ef139a463ac7a296f0 rh#2283429 |
CVE-2021-47524 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47524 SMASH Issue 407685 bnc#1225377 https://git.kernel.org/stable/c/888fc81107cacd2a4f681bac7bb785cef868214f https://git.kernel.org/stable/c/dd5e90b16cca8a697cbe17b72e2a5f49291cabb2 rh#2283427 |
CVE-2021-47525 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47525 SMASH Issue 407686 bnc#1225441 https://git.kernel.org/stable/c/05f929b395dec8957b636ff14e66b277ed022ed9 https://git.kernel.org/stable/c/602824cf9aa9db8830ffe5cfb2cd54365cada4fe rh#2283426 |
CVE-2021-47526 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47526 SMASH Issue 407687 bnc#1225376 https://git.kernel.org/stable/c/0f55f89d98c8b3e12b4f55f71c127a173e29557c https://git.kernel.org/stable/c/189c99c629bbf85916c02c153f904649cc0a9d7f rh#2283425 |
CVE-2021-47527 | kernel-source-rt:Ignore | moderate | () | CVE-2021-47527 L3:62411 Oracle:CVE-2021-43527 SMASH Issue 319539 SMASH Issue 319540 bnc#1194288 https://git.kernel.org/stable/c/00de977f9e0aa9760d9a79d1e41ff780f74e3424 https://git.kernel.org/stable/c/011f6c92b5bf6e1fbfdedc8b5232f64c1c493206 https://git.kernel.org/stable/c/1179b168fa3f3a6aae3bd140000455a0e58457db https://git.kernel.org/stable/c/64e491c1634b73d3bddc081d08620bdc92ab2c12 https://git.kernel.org/stable/c/c5da8aa441053958594f94254592bb41264bdfbf https://git.kernel.org/stable/c/e1722acf4f0d4d67b60f57e08ce16f8b66cd4b8f https://git.kernel.org/stable/c/e74d9663fd57640fc3394abb5c76fa95b9cc2f2e rh#2024370 rh#2283424 |
CVE-2021-47528 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47528 SMASH Issue 407688 bnc#1225368 https://git.kernel.org/stable/c/37307f7020ab38dde0892a578249bf63d00bca64 https://git.kernel.org/stable/c/7d94bc8e335cb33918e52efdbe192c36707bfa24 rh#2283423 |
CVE-2021-47529 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47529 SMASH Issue 407689 bnc#1225373 https://git.kernel.org/stable/c/4768935c25403ba96e7a745645df24a51a774b7e https://git.kernel.org/stable/c/a571bc28326d9f3e13f5f2d9cda2883e0631b0ce rh#2283422 |
CVE-2021-47530 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-47530 SMASH Issue 407690 bnc#1225442 https://git.kernel.org/stable/c/4c3cdbf2540319ea674f1f3c54f31f14c6f39647 https://git.kernel.org/stable/c/ea0006d390a28012f8187717aea61498b2b341e5 rh#2283421 |
CVE-2021-47531 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47531 SMASH Issue 407691 bnc#1225443 https://git.kernel.org/stable/c/3466d9e217b337bf473ee629c608e53f9f3ab786 https://git.kernel.org/stable/c/8e2b7fe5e8a4be5e571561d9afcfbd92097288ba rh#2283420 |
CVE-2021-47532 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-47532 SMASH Issue 407692 bnc#1225444 https://git.kernel.org/stable/c/59ba1b2b4825342676300f66d785764be3fcb093 https://git.kernel.org/stable/c/a4eb55901df1dce8c6944438bbdf57caf08911e2 rh#2283419 |
CVE-2021-47533 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47533 SMASH Issue 407693 bnc#1225445 https://git.kernel.org/stable/c/2931db9a5ed219546cf2ae0546698faf78281b89 https://git.kernel.org/stable/c/d134c5ff71c7f2320fc7997f2fbbdedf0c76889a rh#2283418 |
CVE-2021-47534 | kernel-source-rt:Not affected | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47534 SMASH Issue 407695 https://git.kernel.org/stable/c/049cfff8d53a30cae3349ff71a4c01b7d9981bc2 https://git.kernel.org/stable/c/53f9601e908d42481addd67cdb01a9288c611124 rh#2283417 |
CVE-2021-47535 | kernel-source-rt:Not affected | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H) | CVE-2021-47535 SMASH Issue 407696 bnc#1225446 https://git.kernel.org/stable/c/83e54fcf0b14ca2d869dd37abe1bb6542805f538 https://git.kernel.org/stable/c/b4d25abf9720b69a03465b09d0d62d1998ed6708 https://git.kernel.org/stable/c/d646856a600e8635ba498f20b194219b158626e8 rh#2283416 |
CVE-2021-47537 | kernel-source-rt:Not affected | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47537 SMASH Issue 407697 bnc#1225375 https://git.kernel.org/stable/c/1c0ddef45b7e3dbe3ed073695d20faa572b7056a https://git.kernel.org/stable/c/e07a097b4986afb8f925d0bb32612e1d3e88ce15 rh#2283414 |
CVE-2021-47538 | kernel-source-rt:Already fixed | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-47538 SMASH Issue 407698 bnc#1225448 https://git.kernel.org/stable/c/3e70e3a72d80b16094faccbe438cd53761c3503a https://git.kernel.org/stable/c/60f0b9c42cb80833a03ca57c1c8b078d716e71d1 https://git.kernel.org/stable/c/913c24af2d13a3fd304462916ee98e298d56bdce https://git.kernel.org/stable/c/9469273e616ca8f1b6e3773c5019f21b4c8d828c https://git.kernel.org/stable/c/beacff50edbd6c9659a6f15fc7f6126909fade29 rh#2283413 |
CVE-2021-47539 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-47539 SMASH Issue 407676 bnc#1225452 https://git.kernel.org/stable/c/35b40f724c4ef0f683d94dab3af9ab38261d782b https://git.kernel.org/stable/c/bc97458620e38961af9505cc060ad4cf5c9e4af7 https://git.kernel.org/stable/c/ca77fba821351190777b236ce749d7c4d353102e rh#2283412 |
CVE-2021-47540 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47540 SMASH Issue 407700 bnc#1225386 https://git.kernel.org/stable/c/14b03b8cebdf18ff13c39d58501b625411314de2 https://git.kernel.org/stable/c/6e53d6d26920d5221d3f4d4f5ffdd629ea69aa5c https://git.kernel.org/stable/c/932b338f4e5c4cb0c2ed640da3bced1e63620198 rh#2283411 |
CVE-2021-47541 | kernel-source-rt:Already fixed | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47541 SMASH Issue 407701 bnc#1225453 bnc#1225454 https://git.kernel.org/stable/c/676dc7d9b15bf8733233a2db1ec3f9091ab34275 https://git.kernel.org/stable/c/75917372eef0dbfb290ae45474314d35f97aea18 https://git.kernel.org/stable/c/addad7643142f500080417dd7272f49b7a185570 https://git.kernel.org/stable/c/be12572c5ddc8ad7453bada4eec8fa46967dc757 https://git.kernel.org/stable/c/e461a9816a1ac5b4aeb61621b817225b61e46a68 https://git.kernel.org/stable/c/f1d43efa59f1edd3e7eca0e94559b4c6b1cd4e2b rh#2283410 |
CVE-2021-47542 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47542 SMASH Issue 407702 bnc#1225455 https://git.kernel.org/stable/c/15fa12c119f869173f9b710cbe6a4a14071d2105 https://git.kernel.org/stable/c/3a061d54e260b701b538873b43e399d9b8b83e03 https://git.kernel.org/stable/c/550658a2d61e4eaf522c8ebc7fad76dc376bfb45 https://git.kernel.org/stable/c/57af54a56024435d83e44c78449513b414eb6edf https://git.kernel.org/stable/c/b4f217d6fcc00c3fdc0921a7691f30be7490b073 https://git.kernel.org/stable/c/bbeb0325a7460ebf1e03f5e0bfc5c652fba9519f https://git.kernel.org/stable/c/c5ef33c1489b2cd74368057fa00b5d2183bb5853 https://git.kernel.org/stable/c/e2dabc4f7e7b60299c20a36d6a7b24ed9bf8e572 rh#2283408 |
CVE-2021-47543 | kernel-source-rt:Ignore | low | 0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N) | CVE-2021-47543 SMASH Issue 407703 bnc#1225456 https://git.kernel.org/stable/c/71e284dcebecb9fd204ff11097469cc547723ad1 https://git.kernel.org/stable/c/d9fc706108c15f8bc2d4ccccf8e50f74830fabd9 https://git.kernel.org/stable/c/df5990db088d4c7fea9a2f9b8195a7859e1768c4 https://git.kernel.org/stable/c/ff061b5bda73c4f785b4703eeb0848fd99e5608a jsc#CAR-3695 rh#2283407 |
CVE-2021-47545 | kernel-source-rt:Ignore | low | 0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N) | CVE-2021-47545 SMASH Issue 407705 bnc#1225469 https://git.kernel.org/stable/c/0ca1f534a776cc7d42f2c33da4732b74ec2790cd https://git.kernel.org/stable/c/24a139c105fa0f7f99888cf328bf6a02fc841675 https://git.kernel.org/stable/c/5b5c6f57a1f81499db4c8ea597898cb1b87de0b6 https://git.kernel.org/stable/c/a4c17ebdd6249cb4e061358d3693383f6628e069 https://git.kernel.org/stable/c/b380d09e44e8479e71e3ae8446b515a5b3166244 https://git.kernel.org/stable/c/c5c8a26c0dc69a400553245e92d741fe55f91095 jsc#CAR-3700 rh#2283404 |
CVE-2021-47547 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L) | CVE-2021-47547 SMASH Issue 407707 bnc#1225505 https://git.kernel.org/stable/c/12f907cb11576b8cd0b1d95a16d1f10ed5bb7237 https://git.kernel.org/stable/c/142ead3dc70411bd5977e8c47a6d8bf22287b3f8 https://git.kernel.org/stable/c/2c1a6a9a011d622a7c61324a97a49801ba425eff https://git.kernel.org/stable/c/61217be886b5f7402843677e4be7e7e83de9cb41 https://git.kernel.org/stable/c/77ff166909458646e66450e42909e0adacc99049 https://git.kernel.org/stable/c/d3dedaa5a601107cfedda087209772c76e364d58 https://git.kernel.org/stable/c/ec5bd0aef1cec96830d0c7e06d3597d9e786cc98 https://git.kernel.org/stable/c/f059fa40f0fcc6bc7a12e0f2a2504e9a4ff74f1f rh#2283402 |
CVE-2021-47549 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47549 SMASH Issue 407709 bnc#1225508 https://git.kernel.org/stable/c/0769449b0a5eabc3545337217ae690e46673e73a https://git.kernel.org/stable/c/325ea49fc43cbc03a5e1e37de8f0ca6357ced4b1 https://git.kernel.org/stable/c/4a46b2f5dce02539e88a300800812bd24a45e097 https://git.kernel.org/stable/c/6c8ad7e8cf29eb55836e7a0215f967746ab2b504 https://git.kernel.org/stable/c/77393806c76b6b44f1c44bd957788c8bd9152c45 https://git.kernel.org/stable/c/91ba94d3f7afca195b224f77a72044fbde1389ce https://git.kernel.org/stable/c/adf098e2a8a1e1fc075d6a5ba2edd13cf7189082 https://git.kernel.org/stable/c/cdcd80292106df5cda325426e96495503e41f947 rh#2283400 |
CVE-2021-47550 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47550 SMASH Issue 407710 bnc#1225379 https://git.kernel.org/stable/c/27dfaedc0d321b4ea4e10c53e4679d6911ab17aa https://git.kernel.org/stable/c/75752ada77e0726327adf68018b9f50ae091baeb https://git.kernel.org/stable/c/c746945fb6bcbe3863c9ea6369c7ef376e38e5eb rh#2283399 |
CVE-2021-47553 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47553 SMASH Issue 407712 bnc#1225464 https://git.kernel.org/stable/c/229c555260cb9c1ccdab861e16f0410f1718f302 https://git.kernel.org/stable/c/dce1ca0525bfdc8a69a9343bc714fbc19a2f04b3 https://git.kernel.org/stable/c/e6ee7abd6bfe559ad9989004b34c320fd638c526 rh#2283396 |
CVE-2021-47554 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47554 SMASH Issue 407713 bnc#1225466 https://git.kernel.org/stable/c/bb93ce4b150dde79f58e34103cbd1fe829796649 https://git.kernel.org/stable/c/e4d58ac67e63727aa45a4a26185876f598e8b3dd rh#2283395 |
CVE-2021-47555 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L) | CVE-2021-47555 SMASH Issue 407714 bnc#1225467 https://git.kernel.org/stable/c/01d9cc2dea3fde3bad6d27f464eff463496e2b00 https://git.kernel.org/stable/c/5e44178864b38dd70b877985abd7d86fdb95f27d https://git.kernel.org/stable/c/6e800ee43218a56acc93676bbb3d93b74779e555 https://git.kernel.org/stable/c/f7fc72a508cf115c273a7a29350069def1041890 rh#2283394 |
CVE-2021-47556 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47556 SMASH Issue 407694 bnc#1225383 https://git.kernel.org/stable/c/0276af2176c78771da7f311621a25d7608045827 https://git.kernel.org/stable/c/abfdd9e2f0f9699015d72317f74154d3e53664e6 rh#2283393 |
CVE-2021-47557 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47557 SMASH Issue 407715 bnc#1225468 https://git.kernel.org/stable/c/ae2659d2c670252759ee9c823c4e039c0e05a6f2 https://git.kernel.org/stable/c/de6d25924c2a8c2988c6a385990cafbe742061bf https://git.kernel.org/stable/c/e25bdbc7e951ae5728fee1f4c09485df113d013c rh#2283392 |
CVE-2021-47558 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47558 SMASH Issue 407716 bnc#1225492 https://git.kernel.org/stable/c/a92f0eebb8dc008b9e8c51c6f7b8c93b27a29a43 https://git.kernel.org/stable/c/b270bfe697367776eca2e6759a71d700fb8d82a2 rh#2283391 |
CVE-2021-47560 | kernel-source-rt:Ignore | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47560 SMASH Issue 407653 bnc#1225495 https://git.kernel.org/stable/c/63b08b1f6834bbb0b4f7783bf63b80c8c8e9a047 https://git.kernel.org/stable/c/90d0736876c50ecde1a3275636a06b9ddb1cace9 https://git.kernel.org/stable/c/da4d70199e5d82da664a80077508d6c18f5e76df jsc#CAR-3699 rh#2283389 |
CVE-2021-47561 | kernel-source-rt:Not affected | important | 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H) | CVE-2021-47561 SMASH Issue 407718 bnc#1225496 https://git.kernel.org/stable/c/84e1d0bf1d7121759622dabf8fbef4c99ad597c5 https://git.kernel.org/stable/c/cc432b0727ce404cc13e8f6b5ce29f412c3f9f1f rh#2283388 |
CVE-2021-47562 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47562 SMASH Issue 407719 bnc#1225499 https://git.kernel.org/stable/c/1eb5395add786613c7c5579d3947aa0b8f0ec241 https://git.kernel.org/stable/c/792b2086584f25d84081a526beee80d103c2a913 https://git.kernel.org/stable/c/992ba40a67638dfe2772b84dfc8168dc328d5c4c rh#2283387 |
CVE-2021-47563 | kernel-source-rt:Already fixed | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47563 SMASH Issue 407699 bnc#1225500 https://git.kernel.org/stable/c/1f10b09ccc832698ef4624a6ab9a213b6ccbda76 https://git.kernel.org/stable/c/e65a8707b4cd756d26d246bb2b9fab06eebafac1 https://git.kernel.org/stable/c/f65ee535df775a13a1046c0a0b2d72db342f8a5b rh#2283386 |
CVE-2021-47564 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47564 SMASH Issue 407720 bnc#1225501 https://git.kernel.org/stable/c/03e5203d2161a00afe4d97d206d2293e40b2f253 https://git.kernel.org/stable/c/5dca8eff4627315df98feec09fff9dfe3356325e https://git.kernel.org/stable/c/e8d032507cb7912baf1d3e0af54516f823befefd rh#2283467 |
CVE-2021-47565 | kernel-source-rt:Already fixed | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47565 SMASH Issue 407721 bnc#1225384 https://git.kernel.org/stable/c/0d4b29eaadc1f59cec0c7e85eae77d08fcca9824 https://git.kernel.org/stable/c/0ee4ba13e09c9d9c1cb6abb59da8295d9952328b https://git.kernel.org/stable/c/2bf9c5a5039c8f4b037236aed505e6a25c1d5f7b https://git.kernel.org/stable/c/58ef2c7a6de13721865d84b80eecf56d6cba0937 https://git.kernel.org/stable/c/5d4d50b1f159a5ebab7617f47121b4370aa58afe https://git.kernel.org/stable/c/7e324f734a914957b8cc3ff4b4c9f0409558adb5 https://git.kernel.org/stable/c/8485649a7655e791a6e4e9f15b4d30fdae937184 https://git.kernel.org/stable/c/dd035ca0e7a142870a970d46b1d19276cfe2bc8c rh#2283466 |
CVE-2021-47567 | kernel-source-rt:Not affected | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47567 SMASH Issue 407723 bnc#1225399 https://git.kernel.org/stable/c/5bb60ea611db1e04814426ed4bd1c95d1487678e https://git.kernel.org/stable/c/c4e3ff8b8b1d54f0c755670174c453b06e17114b https://git.kernel.org/stable/c/dfe906da9a1abebdebe8b15bb3e66a2578f6c4c7 rh#2283462 |
CVE-2021-47568 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47568 SMASH Issue 407651 bnc#1225395 https://git.kernel.org/stable/c/11e659827c3a2facb3a04e08cc97ff14d5091f51 https://git.kernel.org/stable/c/178ca6f85aa3231094467691f5ea1ff2f398aa8d rh#2283461 |
CVE-2021-47569 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-47569 SMASH Issue 407724 bnc#1225515 https://git.kernel.org/stable/c/3d2a1e68fd9904fdc1b02f2e7d40ca47df7ba39f https://git.kernel.org/stable/c/617a89484debcd4e7999796d693cf0b77d2519de rh#2283460 |
CVE-2021-47570 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L) | CVE-2021-47570 SMASH Issue 407725 bnc#1225516 https://git.kernel.org/stable/c/be4ea8f383551b9dae11b8dfff1f38b3b5436e9a https://git.kernel.org/stable/c/c8d3775745adacf9784a7a80a82d047051752573 rh#2283459 |
CVE-2021-47573 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47573 SMASH Issue 411391 bnc#1226532 https://git.kernel.org/stable/c/0fd08a34e8e3b67ec9bd8287ac0facf8374b844a https://git.kernel.org/stable/c/25898389795bd85d8e1520c0c75c3ad906c17da7 https://git.kernel.org/stable/c/269d7124bcfad2558d2329d0fe603ca20b20d3f4 https://git.kernel.org/stable/c/3e04b9e6aa7d77287e70a400be83060d2b7b2cfe https://git.kernel.org/stable/c/4ed9f5c511ce95cb8db05ff82026ea901f45fd76 https://git.kernel.org/stable/c/5ac3b68b79c9e964dd6f3cf80ff825518e502b79 https://git.kernel.org/stable/c/8ac3b6ee7c9ff2df7c99624bb1235e2e55623825 https://git.kernel.org/stable/c/caf9b51829a50590b84daea924a0fd62d32bc952 rh#2293262 |
CVE-2021-47574 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47574 SMASH Issue 411419 bnc#1226534 https://git.kernel.org/stable/c/3559ca594f15fcd23ed10c0056d40d71e5dab8e5 https://git.kernel.org/stable/c/3e68d099f09c260a7dee28b99af02fe6977a9e66 https://git.kernel.org/stable/c/4bf81386e3d6e5083c93d51eff70260bcec091bb https://git.kernel.org/stable/c/81900aa7d7a130dec4c55b68875e30fb8c9effec https://git.kernel.org/stable/c/99120c8230fdd5e8b72a6e4162db9e1c0a61954a https://git.kernel.org/stable/c/a29c8b5226eda52e6d6ff151d9343558ea3ad451 https://git.kernel.org/stable/c/b27d47950e481f292c0a5ad57357edb9d95d03ba https://git.kernel.org/stable/c/d31b3379179d64724d3bbfa87bd4ada94e3237de rh#2293260 |
CVE-2021-47575 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47575 SMASH Issue 411406 bnc#1226535 https://git.kernel.org/stable/c/153d1ea3272209fc970116f09051002d14422cde https://git.kernel.org/stable/c/560e64413b4a6d9bd6630e350d5f2e6a05f6ffe3 https://git.kernel.org/stable/c/57e46acb3b48ea4e8efb1e1bea2e89e0c6cc43e2 https://git.kernel.org/stable/c/68b78f976ca47d52c03c41eded207a312e46b934 https://git.kernel.org/stable/c/728389c21176b2095fa58e858d5ef1d2f2aac429 https://git.kernel.org/stable/c/8fa3a370cc2af858a9ba662ca4f2bd0917550563 https://git.kernel.org/stable/c/c7eaa5082bccfc00dfdb500ac6cc86d6f24ca027 https://git.kernel.org/stable/c/fe415186b43df0db1f17fa3a46275fd92107fe71 rh#2293254 |
CVE-2021-47577 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47577 SMASH Issue 411410 bnc#1226538 https://git.kernel.org/stable/c/4b4e5bbf9386d4ec21d91c0cb0fd60b9bba778ec https://git.kernel.org/stable/c/71a85387546e50b1a37b0fa45dadcae3bfb35cf6 rh#2293252 |
CVE-2021-47578 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47578 SMASH Issue 411414 bnc#1226539 https://git.kernel.org/stable/c/3344b58b53a76199dae48faa396e9fc37bf86992 https://git.kernel.org/stable/c/47d11d35203b0aa13533634e270fe2c3610e531b https://git.kernel.org/stable/c/aa1f912712a109b6306746133de7e5343f016b26 rh#2293251 |
CVE-2021-47579 | kernel-source-rt:Won't fix | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2021-47579 SMASH Issue 411342 bnc#1226540 https://git.kernel.org/stable/c/1f5573cfe7a7056e80a92c7a037a3e69f3a13d1c https://git.kernel.org/stable/c/445d2dc63e5871d218f21b8f62ab29ac72f2e6b8 https://git.kernel.org/stable/c/6859985a2fbda5d1586bf44538853e1be69e85f7 https://git.kernel.org/stable/c/d2ccdd4e4efab06178608a34d7bfb20a54104c02 https://git.kernel.org/stable/c/f9f300a92297be8250547347fd52216ef0177ae0 jsc#CAR-3789 rh#2293250 |
CVE-2021-47580 | kernel-source-rt:Won't fix | important | 7.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L) | CVE-2021-47580 SMASH Issue 411389 bnc#1226550 https://git.kernel.org/stable/c/3085147645938eb41f0bc0e25ef9791e71f5ee4b https://git.kernel.org/stable/c/36e07d7ede88a1f1ef8f0f209af5b7612324ac2c https://git.kernel.org/stable/c/bdb854f134b964528fa543e0351022eb45bd7346 jsc#CAR-3790 rh#2293249 |
CVE-2021-47581 | kernel-source-rt:Not affected | moderate | () | CVE-2021-47581 SMASH Issue 411412 bnc#1226573 https://git.kernel.org/stable/c/0928efb09178e01d3dc8e8849aa1c807436c3c37 https://git.kernel.org/stable/c/0d99b3c6bd39a0a023e972d8f912fd47698bbbb8 https://git.kernel.org/stable/c/88f20cccbeec9a5e83621df5cc2453b5081454dc https://git.kernel.org/stable/c/9bebb2eedf679b3be4acaa20efda97f32c999d74 https://git.kernel.org/stable/c/b4226b387436315e7f57465c15335f4f4b5b075d https://git.kernel.org/stable/c/bd926d189210cd1d5b4e618e45898053be6b4b3b https://git.kernel.org/stable/c/be81992f9086b230623ae3ebbc85ecee4d00a3d3 https://git.kernel.org/stable/c/c9f17e92917fd5786be872626a3928979ecc4c39 rh#2293248 |
CVE-2021-47582 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47582 SMASH Issue 411422 bnc#1226559 https://git.kernel.org/stable/c/403716741c6c2c510dce44e88f085a740f535de6 https://git.kernel.org/stable/c/ae8709b296d80c7f45aa1f35c0e7659ad69edce1 rh#2293247 |
CVE-2021-47583 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47583 SMASH Issue 411443 bnc#1226563 https://git.kernel.org/stable/c/44870a9e7a3c24acbb3f888b2a7cc22c9bdf7e7f https://git.kernel.org/stable/c/4b2d9600b31f9ba7adbc9f3c54a068615d27b390 https://git.kernel.org/stable/c/8c6fdf62bfe1bc72bfceeaf832ef7499c7ed09ba https://git.kernel.org/stable/c/96f182c9f48b984447741f054ec301fdc8517035 https://git.kernel.org/stable/c/b99bdf127af91d53919e96292c05f737c45ea59a rh#2293245 |
CVE-2021-47584 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47584 SMASH Issue 411385 bnc#1226564 https://git.kernel.org/stable/c/3a1a4eb574178c21241a6200f4785572e661c472 https://git.kernel.org/stable/c/a7c80674538f15f85d68138240aae440b8039519 https://git.kernel.org/stable/c/edaa26334c117a584add6053f48d63a988d25a6e rh#2293244 |
CVE-2021-47585 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47585 SMASH Issue 411341 bnc#1226556 https://git.kernel.org/stable/c/005d9292b5b2e71a009f911bd85d755009b37242 https://git.kernel.org/stable/c/493ff661d434d6bdf02e3a21adae04d7a0b4265d https://git.kernel.org/stable/c/f35838a6930296fc1988764cfa54cb3f705c0665 rh#2293243 |
CVE-2021-47586 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47586 SMASH Issue 411409 bnc#1226561 https://git.kernel.org/stable/c/0546b224cc7717cc8a2db076b0bb069a9c430794 https://git.kernel.org/stable/c/0b4a5d1e15ce72f69be48f38dc0401dab890ae0f rh#2293242 |
CVE-2021-47590 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47590 SMASH Issue 411387 bnc#1226565 https://git.kernel.org/stable/c/23311b92755ffa9087332d1bb8c71c0f6a10cc08 https://git.kernel.org/stable/c/3d79e3756ca90f7a6087b77b62c1d9c0801e0820 rh#2293237 |
CVE-2021-47591 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47591 SMASH Issue 411353 bnc#1226570 https://git.kernel.org/stable/c/3de0c86d42f841d1d64f316cd949e65c566f0734 https://git.kernel.org/stable/c/404cd9a22150f24acf23a8df2ad0c094ba379f57 rh#2293236 |
CVE-2021-47592 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47592 SMASH Issue 411361 bnc#1226572 https://git.kernel.org/stable/c/97cb5c82aa1dd85a39b1bd021c8b5f18af623779 https://git.kernel.org/stable/c/aeb7c75cb77478fdbf821628e9c95c4baa9adc63 rh#2293235 |
CVE-2021-47593 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47593 SMASH Issue 411345 bnc#1226551 https://git.kernel.org/stable/c/451f1eded7f56e93aaf52eb547ba97742d9c0e97 https://git.kernel.org/stable/c/c26ac0ea3a91c210cf90452e625dc441adf3e549 https://git.kernel.org/stable/c/d6692b3b97bdc165d150f4c1505751a323a80717 rh#2293234 |
CVE-2021-47594 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47594 SMASH Issue 411393 bnc#1226560 https://git.kernel.org/stable/c/1456a0004cc54c58adb2501cb0c95dc8b3c83e9e https://git.kernel.org/stable/c/b0cdc5dbcf2ba0d99785da5aabf1b17943805b8a rh#2293232 |
CVE-2021-47595 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47595 SMASH Issue 411359 bnc#1226552 https://git.kernel.org/stable/c/491c1253441e2fdc8f6a6f4976e3f13440419b7a https://git.kernel.org/stable/c/81fbdd45652d8605a029e78ef14a6aaa529c4e72 https://git.kernel.org/stable/c/c062f2a0b04d86c5b8c9d973bea43493eaca3d32 rh#2293231 |
CVE-2021-47596 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47596 SMASH Issue 411439 bnc#1226558 https://git.kernel.org/stable/c/12512bc8f25b8ba9795dfbae0e9ca57ff13fd542 https://git.kernel.org/stable/c/27cbf64a766e86f068ce6214f04c00ceb4db1af4 https://git.kernel.org/stable/c/4f4a353f6fe033807cd026a5de81c67469ff19b0 rh#2293230 |
CVE-2021-47601 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47601 SMASH Issue 411458 bnc#1226576 https://git.kernel.org/stable/c/640e28d618e82be78fb43b4bf5113bc90d6aa442 https://git.kernel.org/stable/c/832f3655c6138c23576ed268e31cc76e0f05f2b1 https://git.kernel.org/stable/c/9d7482771fac8d8e38e763263f2ca0ca12dd22c6 rh#2293225 |
CVE-2021-47604 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47604 SMASH Issue 411375 bnc#1226566 https://git.kernel.org/stable/c/dc1db0060c02d119fd4196924eff2d1129e9a442 https://git.kernel.org/stable/c/ebbbc5fea3f648175df1aa3f127c78eb0252cc2a rh#2293222 |
CVE-2021-47605 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47605 SMASH Issue 411372 bnc#1226579 https://git.kernel.org/stable/c/e6c67560b4341914bec32ec536e931c22062af65 https://git.kernel.org/stable/c/ff9f9c6e74848170fcb45c8403c80d661484c8c9 rh#2293215 |
CVE-2021-47607 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2021-47607 SMASH Issue 411395 bnc#1226580 https://git.kernel.org/stable/c/a82fe085f344ef20b452cd5f481010ff96b5c4cd https://git.kernel.org/stable/c/f87a6c160ecc8c7b417d25f508d3f076fe346136 rh#2293206 |
CVE-2021-47608 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47608 SMASH Issue 411373 bnc#1226569 https://git.kernel.org/stable/c/423628125a484538111c2c6d9bb1588eb086053b https://git.kernel.org/stable/c/7d3baf0afa3aa9102d6a521a8e4c41888bb79882 rh#2293205 |
CVE-2021-47610 | kernel-source-rt:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47610 SMASH Issue 411396 bnc#1226581 https://git.kernel.org/stable/c/26d776fd0f79f093a5d0ce1a4c7c7a992bc3264c https://git.kernel.org/stable/c/f6db3d98f876870c35e96693cfd54752f6199e59 rh#2293269 |
CVE-2021-47613 | kernel-source-rt:Not affected | moderate | 5.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L) | CVE-2021-47613 SMASH Issue 411445 bnc#1226600 https://git.kernel.org/stable/c/9cbb957441ed8873577d7d313a3d79d69f1dad5c https://git.kernel.org/stable/c/b503de239f62eca898cfb7e820d9a35499137d22 rh#2293266 |
CVE-2021-47614 | kernel-source-rt:Not affected | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47614 SMASH Issue 411347 bnc#1226601 https://git.kernel.org/stable/c/11eebcf63e98fcf047a876a51d76afdabc3b8b9b https://git.kernel.org/stable/c/1e11a39a82e95ce86f849f40dda0d9c0498cebd9 rh#2293265 |
CVE-2021-47615 | kernel-source-rt:Not affected | low | 3.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L) | CVE-2021-47615 SMASH Issue 411427 bnc#1226602 https://git.kernel.org/stable/c/c44979ace49b4aede3cc7cb5542316e53a4005c9 https://git.kernel.org/stable/c/e3bc4d4b50cae7db08e50dbe43f771c906e97701 https://git.kernel.org/stable/c/f0ae4afe3d35e67db042c58a52909e06262b740f rh#2293264 |
CVE-2021-47616 | kernel-source-rt:Not affected | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2021-47616 SMASH Issue 411363 bnc#1226603 https://git.kernel.org/stable/c/84b01721e8042cdd1e8ffeb648844a09cd4213e0 https://git.kernel.org/stable/c/acb53e47db1fbc7cd37ab10b46388f045a76e383 rh#2293263 |
CVE-2021-47618 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-47618 SMASH Issue 411541 bnc#1226644 https://git.kernel.org/stable/c/1515e72aae803fc6b466adf918e71c4e4c9d5b3d https://git.kernel.org/stable/c/8b59b0a53c840921b625378f137e88adfa87647e https://git.kernel.org/stable/c/ba1863be105b06e10d0e2f6b1b8a0570801cfc71 rh#2293295 |
CVE-2022-0001 | kernel-source-rt:Released | moderate | 5.6 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N) | CONFIRM:developer.arm.com:CVE-2017-5754 CONFIRM:security.netapp.com:CVE-2022-0002 CVE-2021-26341 CVE-2021-26401 CVE-2022-0001 CVE-2022-0002 CVE-2022-23960 D:CVE-2022-1016 D:CVE-2022-2153 D:CVE-2022-23960 D:CVE-2022-32296 DSA-5096 DSA-5161 DSA-5173 DSA-5184 DSA-5378 L3:65520 MISC:developer.arm.com:CVE-2021-28664 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:OSS:2022/04/02/2 MISC:research.nccgroup.com:OSS:2022/09/02/9 MISC:www.amd.com:CVE-2021-26341 MISC:www.amd.com:CVE-2021-26401 MISC:www.intel.com:CVE-2022-0002 MISC:www.oracle.com:CVE-2022-21586 MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update OSS:2021/07/22/1 OSS:2022/01/25/12 OSS:2022/03/18/2 OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/22/1 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/11/10/2 OSS:2022/Q1/171 OSS:2022/Q3/141 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-5715 Oracle:CVE-2022-21123 RHSA-2022:1975 RHSA-2022:1988 RHSA-2022:7683 RHSA-2023:0187 RHSA-2023:0399 RHSA-2023:0400 RHSA-2023:2148 RHSA-2023:2458 RHSA-2023:2736 RHSA-2023:2951 SMASH Issue 312331 ZDI-23-1834 bdo#1006346 bdo#1013299 bdo#1033297 bdo#922204 bdo#988044 bdo#989285 bdo#990279 bdo#990411 bdo#994050 bnc#1191580 bnc#1195283 bnc#1195330 bnc#1196657 bnc#1196901 bnc#1196915 https://www.kb.cert.org/vuls/id/155143 jsc#CAR-1593 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1519780 rh#1832397 rh#1980646 rh#1997467 rh#2039448 rh#2044561 rh#2053632 rh#2056381 rh#2058395 rh#2058955 rh#2059923 rh#2061633 rh#2061700 rh#2061703 rh#2061712 rh#2061721 rh#2062284 rh#2064604 rh#2066614 rh#2066706 rh#2066819 rh#2069736 rh#2070694 rh#2071047 rh#2073064 rh#2074208 rh#2074441 rh#2084435 rh#2084458 rh#2085300 rh#2086753 rh#2088021 rh#2089815 rh#2090237 rh#2090240 rh#2090241 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2104423 rh#2119127 rh#2141026 |
CVE-2022-0002 | kernel-source-rt:Released | moderate | 5.6 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N) | CONFIRM:developer.arm.com:CVE-2017-5754 CONFIRM:security.netapp.com:CVE-2022-0002 CVE-2021-26341 CVE-2021-26401 CVE-2022-0001 CVE-2022-0002 CVE-2022-23960 D:CVE-2022-1016 D:CVE-2022-2153 D:CVE-2022-23960 D:CVE-2022-32296 DSA-5096 DSA-5161 DSA-5173 DSA-5184 DSA-5378 L3:65520 MISC:developer.arm.com:CVE-2021-28664 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:OSS:2022/04/02/2 MISC:research.nccgroup.com:OSS:2022/09/02/9 MISC:www.amd.com:CVE-2021-26341 MISC:www.amd.com:CVE-2021-26401 MISC:www.intel.com:CVE-2022-0002 MISC:www.oracle.com:CVE-2022-21586 MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update OSS:2021/07/22/1 OSS:2022/01/25/12 OSS:2022/03/18/2 OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/22/1 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/11/10/2 OSS:2022/Q1/171 OSS:2022/Q3/141 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-5715 Oracle:CVE-2022-21123 RHSA-2022:1975 RHSA-2022:1988 RHSA-2022:7683 RHSA-2023:0187 RHSA-2023:0399 RHSA-2023:0400 RHSA-2023:2148 RHSA-2023:2458 RHSA-2023:2736 RHSA-2023:2951 SMASH Issue 312331 ZDI-23-1834 bdo#1006346 bdo#1013299 bdo#1033297 bdo#922204 bdo#988044 bdo#989285 bdo#990279 bdo#990411 bdo#994050 bnc#1191580 bnc#1195283 bnc#1195330 bnc#1196657 bnc#1196901 bnc#1196915 https://www.kb.cert.org/vuls/id/155143 jsc#CAR-1593 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1519780 rh#1832397 rh#1980646 rh#1997467 rh#2039448 rh#2044561 rh#2053632 rh#2056381 rh#2058395 rh#2058955 rh#2059923 rh#2061633 rh#2061700 rh#2061703 rh#2061712 rh#2061721 rh#2062284 rh#2064604 rh#2066614 rh#2066706 rh#2066819 rh#2069736 rh#2070694 rh#2071047 rh#2073064 rh#2074208 rh#2074441 rh#2084435 rh#2084458 rh#2085300 rh#2086753 rh#2088021 rh#2089815 rh#2090237 rh#2090240 rh#2090241 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2104423 rh#2119127 rh#2141026 |
CVE-2022-0128 | vim:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N) | CONFIRM:huntr.dev:CVE-2022-0128 CONFIRM:support.apple.com:CVE-2018-25032 CONFIRM:support.apple.com:CVE-2022-0158 CONFIRM:support.apple.com:CVE-2022-26704 CVE-2022-0128 FULLDISC:20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3 FULLDISC:20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6 FULLDISC:20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina GLSA-202208-32 MISC:github.com:CVE-2022-0128 OSS:2022/01/15/1 OSS:2022/Q1/40 SMASH Issue 319761 bnc#1194388 rh#2044954 |
CVE-2022-0156 | vim:Not affected | moderate | 6.6 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H) | CONFIRM:huntr.dev:CVE-2022-0156 CONFIRM:support.apple.com:CVE-2022-0158 CVE-2022-0156 FEDORA:FEDORA-2022-20e66c6698 FEDORA:FEDORA-2022-48b86d586f FULLDISC:20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3 FULLDISC:20220721 APPLE-SA-2022-07-20-3 macOS Big Sur 11.6.8 GLSA-202208-32 MISC:github.com:CVE-2022-0156 OSS:2022/01/15/1 OSS:2022/Q1/40 SMASH Issue 319929 bnc#1194559 rh#2039843 |
CVE-2022-0158 | vim:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:huntr.dev:CVE-2022-0158 CONFIRM:support.apple.com:CVE-2022-0158 CVE-2022-0158 FEDORA:FEDORA-2022-20e66c6698 FEDORA:FEDORA-2022-48b86d586f FULLDISC:20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3 FULLDISC:20220721 APPLE-SA-2022-07-20-3 macOS Big Sur 11.6.8 GLSA-202208-32 MISC:github.com:CVE-2022-0158 OSS:2022/01/15/1 OSS:2022/Q1/40 SMASH Issue 319927 bnc#1194553 rh#2039846 |
CVE-2022-0168 | kernel-source-rt:Released | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-0168 MISC:access.redhat.com:/errata/RHSA-2022:7444 MISC:access.redhat.com:/errata/RHSA-2022:7683 MISC:access.redhat.com:/errata/RHSA-2022:7933 MISC:access.redhat.com:/errata/RHSA-2022:8267 MISC:access.redhat.com:CVE-2022-0168 MISC:git.kernel.org:CVE-2022-0168 RHSA-2022:7444 RHSA-2022:7683 RHSA-2022:7933 RHSA-2022:8267 SMASH Issue 327008 bnc#1197472 jsc#CAR-1617 rh#2037386 |
CVE-2022-0171 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-0171 DSA-5257 MISC:access.redhat.com:CVE-2022-0171 MISC:git.kernel.org:CVE-2022-0171 MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update OSS:2022/Q4/30 SMASH Issue 331582 ZDI-22-1462 bnc#1199509 jsc#CAR-1762 linux.git:commit:0b7808818cb9df6680f98996b8e9a439fa7bcc2f linux.git:commit:8f033d2becc24aa6bfd2a5c104407963560caabc linux.git:commit:aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d linux.git:commit:b2d03cabe2b2e150ff5a381731ea0355459be09f linux.git:commit:bcca852027e5878aec911a347407ecc88d6fff7f linux.git:commit:ff05d4b45dd89b922578dac497dcabf57cf771c6 rh#2038940 rh#2123056 rh#2134377 rh#2134440 rh#2134451 rh#2134506 rh#2134517 rh#2139586 rh#2139598 |
CVE-2022-0185 | kernel-source-rt:Released, ltp:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-0185 CVE-2022-0185 MISC:a13xp0p0v.github.io:MLIST:[oss-security] 20210409 Re: Linux kernel: Exploitable vulnerabilities in AF_VSOCK implementation MISC:a13xp0p0v.github.io:OSS:2022/Q1/83 MISC:access.redhat.com:/errata/RHSA-2022:0176 MISC:access.redhat.com:/errata/RHSA-2022:0186 MISC:access.redhat.com:/errata/RHSA-2022:0187 MISC:access.redhat.com:/errata/RHSA-2022:0188 MISC:access.redhat.com:/errata/RHSA-2022:0231 MISC:access.redhat.com:/errata/RHSA-2022:0232 MISC:access.redhat.com:/errata/RHSA-2022:0540 MISC:access.redhat.com:OSS:2022/Q1/83 MISC:git.kernel.org:OSS:2022/01/18/7 MISC:git.kernel.org:OSS:2022/Q1/83 MISC:github.com:CVE-2022-0185 MISC:github.com:OSS:2022/01/18/7 MISC:security-tracker.debian.org:OSS:2022/Q1/83 MISC:ubuntu.com:OSS:2022/Q1/83 MISC:www.openwall.com:OSS:2022/Q1/83 MISC:www.suse.com:OSS:2022/Q1/83 MISC:www.willsroot.io:CVE-2022-0185 OSS:2022/01/18/7 OSS:2022/01/25/14 OSS:2022/Q1/55 OSS:2022/Q1/83 RHSA-2022:0176 RHSA-2022:0186 RHSA-2022:0187 RHSA-2022:0188 RHSA-2022:0231 RHSA-2022:0232 RHSA-2022:0540 SMASH Issue 319975 SMASH Issue 319981 bdo#988044 bdo#996974 bnc#1194517 bnc#1194737 jsc#CAR-1453 rh#2040358 |
CVE-2022-0213 | vim:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:huntr.dev:CVE-2022-0213 CVE-2022-0213 GLSA-202208-32 MISC:github.com:CVE-2022-0213 MLIST:[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update OSS:2022/01/15/1 OSS:2022/Q1/40 SMASH Issue 320470 bnc#1194885 jsc#CAR-1436 rh#2043779 |
CVE-2022-0261 | vim:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:huntr.dev:CVE-2022-0261 CONFIRM:support.apple.com:CVE-2022-1720 CONFIRM:support.apple.com:CVE-2022-1725 CVE-2022-0261 FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6 GLSA-202208-32 MISC:github.com:CVE-2022-0261 MLIST:[debian-lts-announce] 20220516 [SECURITY] [DLA 3011-1] vim security update MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update RHSA-2022:0894 SMASH Issue 320852 bnc#1194872 jsc#CAR-1435 rh#2044607 |
CVE-2022-0264 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2022-0264 SMASH Issue 320792 bnc#1194226 bnc#1194826 rh#2041547 |
CVE-2022-0286 | kernel-source-rt:Not affected | moderate | 5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-0286 MISC:git.kernel.org:CVE-2022-0286 MISC:syzkaller.appspot.com:CVE-2022-0286 MISC:www.oracle.com:CVE-2022-21586 RHSA-2022:1975 RHSA-2022:1988 SMASH Issue 322204 bnc#1195371 rh#2037019 |
CVE-2022-0318 | vim:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:huntr.dev:CVE-2022-0318 CONFIRM:support.apple.com:CVE-2022-1720 CONFIRM:support.apple.com:CVE-2022-1725 CVE-2022-0318 D:CVE-2022-0318 FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6 GLSA-202208-32 MISC:github.com:CVE-2022-0318 MLIST:[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update RHSA-2022:0894 SMASH Issue 321378 bnc#1195004 jsc#CAR-1452 rh#2045355 |
CVE-2022-0319 | vim:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N) | CONFIRM:huntr.dev:CVE-2022-0319 CONFIRM:support.apple.com:CVE-2022-1720 CONFIRM:support.apple.com:CVE-2022-1725 CVE-2022-0319 D:CVE-2022-0319 FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6 GLSA-202208-32 MISC:github.com:CVE-2022-0319 MLIST:[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update SMASH Issue 321458 bnc#1195066 jsc#CAR-1592 rh#2049556 |
CVE-2022-0322 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2021-3894 CVE-2022-0322 D:CVE-2022-0322 DSA-5096 MISC:git.kernel.org:CVE-2022-0322 MISC:www.oracle.com:CVE-2022-21586 OSS:2021/07/22/1 OSS:2022/01/25/12 RHSA-2022:1975 RHSA-2022:1988 SMASH Issue 321260 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1194985 bnc#1195489 jsc#CAR-1516 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2014970 rh#2042822 rh#2044561 rh#2053632 rh#2059923 |
CVE-2022-0330 | kernel-source-rt:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-0330 CVE-2022-0330 DSA-5096 OSS:2021/07/22/1 OSS:2022/01/25/12 OSS:2022/11/30/1 OSS:2022/Q1/81 OSS:2022/Q4/163 RHSA-2022:0592 RHSA-2022:0620 RHSA-2022:0622 RHSA-2022:0712 RHSA-2022:0718 RHSA-2022:0771 RHSA-2022:0772 RHSA-2022:0777 RHSA-2022:0819 RHSA-2022:0820 RHSA-2022:0821 RHSA-2022:0823 RHSA-2022:0825 RHSA-2022:0841 RHSA-2022:0849 RHSA-2022:0851 RHSA-2022:0925 RHSA-2022:0958 RHSA-2022:1103 RHSA-2022:1104 RHSA-2022:1106 RHSA-2022:1107 RHSA-2022:1263 SMASH Issue 321027 SMASH Issue 321410 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1194880 bnc#1195950 jsc#CAR-1513 linux.git:commit:04aa64375f48a5d430b5550d9271f8428883e550 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2042404 rh#2044561 rh#2053632 rh#2059923 rh#2147572 |
CVE-2022-0351 | vim:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:huntr.dev:CVE-2022-0351 CONFIRM:support.apple.com:CVE-2022-1720 CONFIRM:support.apple.com:CVE-2022-1725 CVE-2022-0351 D:CVE-2022-0351 FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6 GLSA-202208-32 MISC:github.com:CVE-2022-0351 MLIST:[debian-lts-announce] 20220516 [SECURITY] [DLA 3011-1] vim security update MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update SMASH Issue 321730 bnc#1195126 jsc#CAR-1461 rh#2046436 |
CVE-2022-0359 | vim:Released | moderate | 6.6 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H) | CONFIRM:huntr.dev:CVE-2022-0359 CONFIRM:support.apple.com:CVE-2022-1720 CONFIRM:support.apple.com:CVE-2022-1725 CVE-2022-0359 D:CVE-2022-0359 FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6 GLSA-202208-32 MISC:github.com:CVE-2022-0359 MLIST:[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update RHSA-2022:0894 SMASH Issue 321758 bnc#1195203 jsc#CAR-1476 rh#2046479 |
CVE-2022-0361 | vim:Released | moderate | 6.6 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H) | CONFIRM:huntr.dev:CVE-2022-0361 CONFIRM:support.apple.com:CVE-2022-1720 CONFIRM:support.apple.com:CVE-2022-1725 CVE-2022-0361 FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6 GLSA-202208-32 L3:64069 MISC:github.com:CVE-2022-0361 MLIST:[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update RHSA-2022:0894 SMASH Issue 321785 bnc#1195202 jsc#CAR-1475 rh#2050053 |
CVE-2022-0368 | vim:Not affected | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H) | CONFIRM:huntr.dev:CVE-2022-0368 CONFIRM:support.apple.com:CVE-2022-1720 CONFIRM:support.apple.com:CVE-2022-1725 CVE-2022-0368 FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6 GLSA-202208-32 MISC:github.com:CVE-2022-0368 MLIST:[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update SMASH Issue 321801 bnc#1195205 rh#2048353 |
CVE-2022-0382 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2022-0382 MISC:github.com:CVE-2022-0382 SMASH Issue 321811 bnc#1195199 rh#2046440 |
CVE-2022-0391 | python3:Already fixed | moderate | 6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N) | CONFIRM:security.netapp.com:CVE-2022-0391 CVE-2022-0391 FEDORA:FEDORA-2022-18ad73aba6 FEDORA:FEDORA-2022-ef99a016f6 MISC:bugs.python.org:MISC:www.openwall.com:CVE-2021-32052 MISC:www.oracle.com:CVE-2022-21498 RHSA-2021:3254 RHSA-2022:1663 RHSA-2022:1764 RHSA-2022:1821 RHSA-2022:6457 SMASH Issue 321856 bnc#1195396 https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html https://security.gentoo.org/glsa/202305-02 jsc#CAR-1490 rh#2047376 |
CVE-2022-0392 | vim:Released | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L) | CONFIRM:huntr.dev:CVE-2022-0392 CONFIRM:support.apple.com:CVE-2022-1720 CONFIRM:support.apple.com:CVE-2022-1725 CVE-2022-0392 FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6 GLSA-202208-32 MISC:github.com:CVE-2022-0392 MLIST:[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update RHSA-2022:0894 SMASH Issue 322085 bnc#1195332 jsc#CAR-1485 rh#2049175 |
CVE-2022-0393 | vim:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:huntr.dev:CVE-2022-0393 CVE-2022-0393 FEDORA:FEDORA-2022-48bf3cb1c4 FEDORA:FEDORA-2022-da2fb07efb GLSA-202208-32 MISC:github.com:CVE-2022-0393 SMASH Issue 322084 bnc#1195336 rh#2049180 |
CVE-2022-0400 | kernel-source-rt:Ignore | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-0400 MISC:access.redhat.com:CVE-2022-0400 MISC:bugzilla.redhat.com:CVE-2022-0400 SMASH Issue 321944 bnc#1195329 rh#2044575 |
CVE-2022-0407 | vim:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) | CONFIRM:huntr.dev:CVE-2022-0407 CVE-2022-0407 D:CVE-2022-0407 GLSA-202208-32 L3:64932 L3:65211 L3:65301 L3:65303 MISC:github.com:CVE-2022-0407 SMASH Issue 322172 SMASH Issue 322217 SMASH Issue 322290 bnc#1195354 rh#2049007 |
CVE-2022-0408 | vim:Not affected | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H) | CONFIRM:huntr.dev:CVE-2022-0408 CVE-2022-0408 D:CVE-2022-0408 FEDORA:FEDORA-2022-48bf3cb1c4 FEDORA:FEDORA-2022-da2fb07efb GLSA-202208-32 MISC:github.com:CVE-2022-0408 MLIST:[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update SMASH Issue 322171 bnc#1195459 rh#2048515 |
CVE-2022-0413 | vim:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) | CONFIRM:huntr.dev:CVE-2022-0413 CVE-2022-0413 D:CVE-2022-0413 FEDORA:FEDORA-2022-48bf3cb1c4 FEDORA:FEDORA-2022-da2fb07efb GLSA-202208-32 L3:64932 L3:65211 L3:65303 MISC:github.com:CVE-2022-0413 MLIST:[debian-lts-announce] 20220516 [SECURITY] [DLA 3011-1] vim security update MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update RHSA-2022:0894 SMASH Issue 322169 bnc#1195356 jsc#CAR-1488 rh#2048519 |
CVE-2022-0417 | vim:Not affected | moderate | 6.6 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H) | CONFIRM:huntr.dev:CVE-2022-0417 CVE-2022-0417 D:CVE-2022-0417 FEDORA:FEDORA-2022-48bf3cb1c4 FEDORA:FEDORA-2022-da2fb07efb GLSA-202208-32 MISC:github.com:CVE-2022-0417 MLIST:[debian-lts-announce] 20220620 [SECURITY] [DLA 3053-1] vim security update MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update SMASH Issue 322303 bnc#1195499 rh#2050149 |
CVE-2022-0433 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-0433 MISC:git.kernel.org:CVE-2022-0433 MISC:lore.kernel.org:CVE-2022-0433 SMASH Issue 322224 bnc#1195373 rh#2048259 |
CVE-2022-0435 | kernel-source-rt:Released | important | 8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-0435 CVE-2022-0435 DSA-5096 OSS:2021/07/22/1 OSS:2022/01/25/12 OSS:2022/02/10/1 OSS:2022/Q1/130 RHSA-2022:0771 RHSA-2022:0772 RHSA-2022:0777 RHSA-2022:0819 RHSA-2022:0825 RHSA-2022:0841 RHSA-2022:0849 RHSA-2022:1186 RHSA-2022:1209 RHSA-2022:1213 RHSA-2022:1589 RHSA-2022:1619 SMASH Issue 321933 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1195254 bnc#1195308 jsc#CAR-1519 linux.git:commit:271351d255b09e39c7f6437738cba595f9b235be linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 linux.git:commit:9aa422ad326634b76309e8ff342c246800621216 rh#1980646 rh#1997467 rh#2044561 rh#2048738 rh#2053632 rh#2059923 |
CVE-2022-0443 | vim:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L) | CONFIRM:huntr.dev:CVE-2022-0443 CVE-2022-0443 D:CVE-2022-0443 FEDORA:FEDORA-2022-48bf3cb1c4 FEDORA:FEDORA-2022-da2fb07efb GLSA-202208-32 MISC:github.com:CVE-2022-0443 MLIST:[debian-lts-announce] 20220516 [SECURITY] [DLA 3011-1] vim security update MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update SMASH Issue 322483 bnc#1195509 rh#2050182 |
CVE-2022-0480 | kernel-source-rt:Won't fix | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-0480 MISC:access.redhat.com:CVE-2022-0480 MISC:git.kernel.org:CVE-2022-0480 MISC:github.com:CVE-2022-0480 MISC:lore.kernel.org:CVE-2022-0480 MISC:ubuntu.com:CVE-2022-0480 SMASH Issue 322419 bnc#1195487 https://lore.kernel.org/linux-mm/20210902215519.AWcuVc3li%25akpm%40linux-foundation.org/ rh#2049700 |
CVE-2022-0487 | kernel-source-rt:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-0487 DSA-5095 DSA-5096 MISC:git.kernel.org:CVE-2022-0487 MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update OSS:2021/07/22/1 OSS:2022/01/25/12 SMASH Issue 319974 SMASH Issue 322579 bdo#988044 bdo#989285 bdo#990279 bdo#990411 bdo#994050 bnc#1194516 bnc#1195949 jsc#CAR-1489 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2044561 rh#2053632 rh#2055502 rh#2059923 |
CVE-2022-0492 | kernel-source-rt:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-0492 CVE-2022-0492 DSA-5095 DSA-5096 L3:62814 MISC:git.kernel.org:OSS:2022/Q1/123 MISC:packetstormsecurity.com:CVE-2022-0492 MISC:packetstormsecurity.com:CVE-2022-29581 MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update OSS:2021/07/22/1 OSS:2022/01/25/12 OSS:2022/Q1/123 Oracle:CVE-2022-0492 RHSA-2022:0819 RHSA-2022:0820 RHSA-2022:0821 RHSA-2022:0823 RHSA-2022:0825 RHSA-2022:0849 RHSA-2022:0851 RHSA-2022:0925 RHSA-2022:0958 RHSA-2022:1413 RHSA-2022:1417 RHSA-2022:1418 RHSA-2022:1455 RHSA-2022:2186 RHSA-2022:2189 RHSA-2022:2211 RHSA-2022:4642 RHSA-2022:4644 RHSA-2022:4655 RHSA-2022:4717 RHSA-2022:4721 RHSA-2022:5157 SMASH Issue 322592 SMASH Issue 322593 bdo#988044 bdo#989285 bdo#990279 bdo#990411 bdo#994050 bnc#1195543 bnc#1195908 bnc#1196578 http://packetstormsecurity.com/files/176099/Docker-cgroups-Container-Escape.html jsc#CAR-1520 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2044561 rh#2051505 rh#2053632 rh#2055502 rh#2059923 |
CVE-2022-0494 | kernel-source-rt:Not affected | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) | CVE-2022-0494 D:CVE-2022-1016 D:CVE-2022-2153 D:CVE-2022-32296 DSA-5161 DSA-5173 DSA-5184 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:OSS:2022/04/02/2 MISC:lore.kernel.org:CVE-2022-0494 MISC:research.nccgroup.com:OSS:2022/09/02/9 MISC:www.debian.org:CVE-2022-32250 MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/22/1 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/Q3/141 Oracle:CVE-2022-21123 RHSA-2022:6002 RHSA-2022:6003 RHSA-2022:6243 RHSA-2022:6248 RHSA-2022:7110 RHSA-2022:7134 SMASH Issue 326886 ZDI-23-1834 bdo#1006346 bdo#1013299 bdo#922204 bnc#1197386 jsc#CAR-1606 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:eadb2f47a3ced5c64b23b90fd2a3463f63726066 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1832397 rh#2039448 rh#2056381 rh#2058395 rh#2058955 rh#2061633 rh#2062284 rh#2064604 rh#2066614 rh#2066706 rh#2066819 rh#2069736 rh#2070694 rh#2071047 rh#2073064 rh#2074208 rh#2074441 rh#2084183 rh#2084435 rh#2084458 rh#2085300 rh#2086753 rh#2088021 rh#2089815 rh#2090237 rh#2090240 rh#2090241 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2104423 rh#2141026 |
CVE-2022-0500 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-0500 CVE-2022-0500 MISC:git.kernel.org:CVE-2022-0500 SMASH Issue 324384 bnc#1196261 bnc#1196811 jsc#CAR-1589 rh#2044578 |
CVE-2022-0516 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-0516 CVE-2022-0516 DSA-5092 DSA-5096 MISC:git.kernel.org:CVE-2022-0516 MISC:git.kernel.org:OSS:2022/Q1/132 OSS:2021/07/22/1 OSS:2022/01/25/12 OSS:2022/Q1/132 RHSA-2022:0777 RHSA-2022:0825 SMASH Issue 322550 SMASH Issue 323433 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1195516 bnc#1195947 jsc#CAR-1601 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2044561 rh#2050237 rh#2053632 rh#2055502 rh#2059923 |
CVE-2022-0529 | unzip:Released | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H) | CVE-2022-0529 DSA-5202 MISC:github.com:CVE-2022-0530 MLIST:[debian-lts-announce] 20220922 [SECURITY] [DLA 3118-1] unzip security update SMASH Issue 322963 bdo#1010355 bnc#1196180 https://security.gentoo.org/glsa/202310-17 jsc#CAR-1544 rh#2051395 rh#2051402 |
CVE-2022-0530 | unzip:Released | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:support.apple.com:CVE-2018-25032 CVE-2022-0530 DSA-5202 FULLDISC:20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4 FULLDISC:20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6 FULLDISC:20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina MISC:github.com:CVE-2022-0530 MLIST:[debian-lts-announce] 20220922 [SECURITY] [DLA 3118-1] unzip security update SMASH Issue 322962 bdo#1010355 bnc#1196177 https://security.gentoo.org/glsa/202310-17 rh#2051395 |
CVE-2022-0554 | vim:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:huntr.dev:CVE-2022-0554 CONFIRM:support.apple.com:CVE-2022-1725 CVE-2022-0554 D:CVE-2022-0554 FEDORA:FEDORA-2022-48bf3cb1c4 FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 GLSA-202208-32 MISC:github.com:CVE-2022-0554 MLIST:[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update RHSA-2022:5242 SMASH Issue 323482 bnc#1195846 rh#2058483 |
CVE-2022-0563 | util-linux:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CONFIRM:security.netapp.com:CVE-2022-0563 CVE-2022-0563 MISC:lore.kernel.org:CVE-2022-0563 SMASH Issue 323744 bnc#1196241 https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u https://security.gentoo.org/glsa/202401-08 rh#2053151 |
CVE-2022-0572 | vim:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:huntr.dev:CVE-2022-0572 CONFIRM:support.apple.com:CVE-2022-1725 CVE-2022-0572 FEDORA:FEDORA-2022-48bf3cb1c4 FEDORA:FEDORA-2022-9cef12c14c FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 MISC:github.com:CVE-2022-0572 MLIST:[debian-lts-announce] 20220516 [SECURITY] [DLA 3011-1] vim security update MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update SMASH Issue 323715 bnc#1196023 rh#2054278 |
CVE-2022-0615 | kernel-source-rt:Not affected | important | () | CVE-2022-0615 MISC:support.eset.com:CVE-2022-0615 SMASH Issue 324835 bnc#1196541 |
CVE-2022-0617 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-0617 DSA-5095 DSA-5096 MISC:access.redhat.com:OSS:2022/04/13/2 MISC:cve.mitre.org:OSS:2022/04/13/2 MISC:git.kernel.org:CVE-2022-0617 MISC:lore.kernel.org:CVE-2022-0617 MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update OSS:2021/07/22/1 OSS:2022/01/25/12 OSS:2022/04/13/2 OSS:2022/Q2/40 RHSA-2022:7444 RHSA-2022:7683 RHSA-2022:7933 RHSA-2022:8267 SMASH Issue 323880 bdo#988044 bdo#989285 bdo#990279 bdo#990411 bdo#994050 bnc#1196079 jsc#CAR-1538 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2044561 rh#2053632 rh#2055502 rh#2059923 |
CVE-2022-0629 | vim:Not affected | moderate | 5.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H) | CONFIRM:huntr.dev:CVE-2022-0629 CONFIRM:support.apple.com:CVE-2022-1725 CVE-2022-0629 D:CVE-2022-0629 FEDORA:FEDORA-2022-48bf3cb1c4 FEDORA:FEDORA-2022-8622ebdebb FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 GLSA-202208-32 MISC:github.com:CVE-2022-0629 MLIST:[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update SMASH Issue 324097 bnc#1196226 rh#2055695 |
CVE-2022-0644 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-0644 SMASH Issue 323951 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1196155 jsc#CAR-1602 rh#2026491 |
CVE-2022-0646 | kernel-source-rt:Not affected | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-0646 CVE-2022-0646 D:CVE-2022-0646 MISC:lore.kernel.org:CVE-2022-0646 SMASH Issue 324074 bnc#1196090 https://lore.kernel.org/all/20220211011552.1861886-1-jk%40codeconstruct.com.au rh#2055206 |
CVE-2022-0685 | vim:Not affected | important | () | CONFIRM:huntr.dev:CVE-2022-0685 CONFIRM:support.apple.com:CVE-2022-1725 CVE-2022-0685 D:CVE-2022-0685 FEDORA:FEDORA-2022-48bf3cb1c4 FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 GLSA-202208-32 MISC:github.com:CVE-2022-0685 MLIST:[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update SMASH Issue 324393 bnc#1196227 rh#2057820 |
CVE-2022-0696 | vim:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:huntr.dev:CVE-2022-0696 CONFIRM:support.apple.com:CVE-2022-1725 CVE-2022-0696 FEDORA:FEDORA-2022-48bf3cb1c4 FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 L3:64619 MISC:github.com:CVE-2022-0696 MLIST:[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update SMASH Issue 324457 bnc#1196361 rh#2056805 |
CVE-2022-0714 | vim:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L) | CONFIRM:huntr.dev:CVE-2022-0714 CONFIRM:support.apple.com:CVE-2022-1725 CVE-2022-0714 D:CVE-2022-0714 FEDORA:FEDORA-2022-48bf3cb1c4 FEDORA:FEDORA-2022-63ca9a1129 FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 GLSA-202208-32 MISC:github.com:CVE-2022-0714 MLIST:[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update SMASH Issue 324507 bnc#1196358 rh#2057187 |
CVE-2022-0729 | vim:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:huntr.dev:CVE-2022-0729 CONFIRM:support.apple.com:CVE-2022-1725 CVE-2022-0729 D:CVE-2022-0729 FEDORA:FEDORA-2022-48bf3cb1c4 FEDORA:FEDORA-2022-63ca9a1129 FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 GLSA-202208-32 MISC:github.com:CVE-2022-0729 MLIST:[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update SMASH Issue 324555 bnc#1196437 rh#2057716 |
CVE-2022-0742 | kernel-source-rt:Not affected | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2022-0742 CVE-2022-0742 MISC:git.kernel.org:CVE-2022-0742 OSS:2022/03/15/3 OSS:2022/Q1/183 SMASH Issue 326212 bnc#1197128 bnc#1197129 rh#2059294 |
CVE-2022-0778 | openssl:Not affected, openssl-1_1:Released | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:cert-portal.siemens.com:CVE-2022-0778 CONFIRM:git.openssl.org:CVE-2022-0778 CONFIRM:psirt.global.sonicwall.com:CVE-2022-0778 CONFIRM:security.netapp.com:CVE-2022-0778 CONFIRM:security.netapp.com:CVE-2022-21490 CONFIRM:support.apple.com:CVE-2018-25032 CONFIRM:www.openssl.org:CVE-2022-0778 CONFIRM:www.tenable.com:CVE-2022-0778 CONFIRM:www.tenable.com:CVE-2022-24828 CVE-2022-0778 DSA-5103 FEDORA:FEDORA-2022-8bb51f6901 FEDORA:FEDORA-2022-9e88b5d8d7 FEDORA:FEDORA-2022-a5f51502f0 FULLDISC:20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4 FULLDISC:20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6 FULLDISC:20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina GLSA-202210-02 MISC:packetstormsecurity.com:CVE-2022-0778 MISC:www.oracle.com:CVE-2022-21498 MISC:www.oracle.com:CVE-2022-21586 MLIST:[debian-lts-announce] 20220317 [SECURITY] [DLA 2952-1] openssl security update MLIST:[debian-lts-announce] 20220317 [SECURITY] [DLA 2953-1] openssl1.0 security update Oracle:CVE-2022-0778 RHSA-2022:1065 RHSA-2022:1066 RHSA-2022:1071 RHSA-2022:1073 RHSA-2022:1076 RHSA-2022:1077 RHSA-2022:1078 RHSA-2022:1082 RHSA-2022:1091 RHSA-2022:1112 RHSA-2022:1263 RHSA-2022:1389 RHSA-2022:1390 RHSA-2022:1519 RHSA-2022:1520 RHSA-2022:4896 RHSA-2022:4899 RHSA-2022:4956 RHSA-2022:5326 SMASH Issue 325569 SMASH Issue 325570 bdo#989604 bnc#1196877 https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65 https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83 https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/ https://security.netapp.com/advisory/ntap-20240621-0006/ jsc#CAR-1594 openssl.git:commit:9eafb53614bf65797db25f467946e735e1b43dc9 rh#2062202 |
CVE-2022-0812 | kernel-source-rt:Released | moderate | 6.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2022-0812 D:CVE-2022-1016 D:CVE-2022-2153 D:CVE-2022-32296 DSA-5161 DSA-5173 DSA-5184 MISC:access.redhat.com:CVE-2022-0812 MISC:bugzilla.redhat.com:CVE-2022-0812 MISC:git.kernel.org:CVE-2022-0812 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:OSS:2022/04/02/2 MISC:research.nccgroup.com:OSS:2022/09/02/9 MISC:ubuntu.com:CVE-2022-0812 OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/22/1 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/Q3/141 Oracle:CVE-2022-21123 SMASH Issue 325040 ZDI-23-1834 bdo#1006346 bdo#1013299 bdo#922204 bnc#1196639 https://security.netapp.com/advisory/ntap-20230427-0011/ jsc#CAR-1650 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1832397 rh#2039448 rh#2056381 rh#2058395 rh#2058955 rh#2061633 rh#2062284 rh#2064604 rh#2066614 rh#2066706 rh#2066819 rh#2069736 rh#2070694 rh#2071047 rh#2073064 rh#2074208 rh#2074441 rh#2084435 rh#2084458 rh#2085300 rh#2086753 rh#2088021 rh#2089815 rh#2090237 rh#2090240 rh#2090241 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2104423 rh#2141026 |
CVE-2022-0847 | kernel-source-rt:Released, ltp:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:cert-portal.siemens.com:CVE-2022-0847 CONFIRM:psirt.global.sonicwall.com:CVE-2022-0847 CONFIRM:security.netapp.com:CVE-2022-0847 CVE-2022-0847 MISC:dirtypipe.cm4all.com:CVE-2022-0847 MISC:packetstormsecurity.com:CVE-2022-0847 MISC:www.suse.com:CVE-2022-0847 OSS:2022/03/07/1 OSS:2022/Q1/170 RHSA-2022:0819 RHSA-2022:0820 RHSA-2022:0821 RHSA-2022:0822 RHSA-2022:0823 RHSA-2022:0825 RHSA-2022:0831 RHSA-2022:0841 SMASH Issue 325027 SMASH Issue 325327 bnc#1196584 bnc#1196601 http://packetstormsecurity.com/files/176534/Linux-4.20-KTLS-Read-Only-Write.html jsc#CAR-1576 rh#2060795 |
CVE-2022-0850 | kernel-source-rt:Released | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L) | CVE-2022-0850 MISC:access.redhat.com:CVE-2022-0850 MISC:git.kernel.org:CVE-2022-0850 MISC:syzkaller.appspot.com:CVE-2022-0850 RHSA-2022:1975 RHSA-2022:1988 SMASH Issue 325331 bnc#1196761 jsc#CAR-1649 rh#2060606 |
CVE-2022-0854 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2022-0854 D:CVE-2022-1016 D:CVE-2022-2153 D:CVE-2022-32296 DSA-5161 DSA-5173 DSA-5184 MISC:git.kernel.org:CVE-2022-0854 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:OSS:2022/04/02/2 MISC:research.nccgroup.com:OSS:2022/09/02/9 MISC:www.debian.org:CVE-2022-32250 MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/22/1 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/Q3/141 Oracle:CVE-2022-21123 RHSA-2022:7444 RHSA-2022:7683 RHSA-2022:7933 RHSA-2022:8267 SMASH Issue 326812 ZDI-23-1834 bdo#1006346 bdo#1013299 bdo#922204 bnc#1196823 jsc#CAR-1619 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:eadb2f47a3ced5c64b23b90fd2a3463f63726066 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1832397 rh#2039448 rh#2056381 rh#2058395 rh#2058955 rh#2061633 rh#2062284 rh#2064604 rh#2066614 rh#2066706 rh#2066819 rh#2069736 rh#2070694 rh#2071047 rh#2073064 rh#2074208 rh#2074441 rh#2084183 rh#2084435 rh#2084458 rh#2085300 rh#2086753 rh#2088021 rh#2089815 rh#2090237 rh#2090240 rh#2090241 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2104423 rh#2141026 |
CVE-2022-0886 | kernel-source-rt:Released | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2022-0995 CVE-2022-0886 CVE-2022-27666 D:CVE-2022-1016 D:CVE-2022-2153 D:CVE-2022-27666 D:CVE-2022-32296 DSA-5127 DSA-5161 DSA-5173 DSA-5184 MISC:anatomic.rip:OSS:2024/Q2/172 MISC:blog.exodusintel.com:OSS:2024/Q2/172 MISC:cdn.kernel.org:CVE-2022-27666 MISC:git.kernel.org:CVE-2022-27666 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:git.kernel.org:OSS:2024/Q2/172 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:CVE-2022-27666 MISC:github.com:OSS:2022/04/02/2 MISC:github.com:OSS:2022/Q3/101 MISC:research.nccgroup.com:OSS:2022/09/02/9 MISC:ruia-ruia.github.io:OSS:2022/Q3/101 OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/04/22/3 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/22/1 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/Q3/101 OSS:2022/Q3/141 OSS:2024/04/24/3 OSS:2024/Q2/172 Oracle:CVE-2022-21123 RHSA-2022:4809 RHSA-2022:4829 RHSA-2022:4835 RHSA-2022:4924 RHSA-2022:4942 RHSA-2022:5214 RHSA-2022:5219 RHSA-2022:5220 RHSA-2022:5224 RHSA-2022:5249 RHSA-2022:5267 RHSA-2022:5316 RHSA-2022:5344 RHSA-2022:5476 RHSA-2022:5678 SMASH Issue 326065 SMASH Issue 327016 ZDI-23-1834 bdo#1006346 bdo#1013299 bdo#922204 bnc#1197131 bnc#1197133 bnc#1197462 https://bugs.chromium.org/p/project-zero/issues/detail?id=2504 jsc#CAR-1595 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1832397 rh#2039448 rh#2056381 rh#2058395 rh#2058955 rh#2061633 rh#2062284 rh#2064604 rh#2066614 rh#2066706 rh#2066819 rh#2067299 rh#2069736 rh#2070694 rh#2071047 rh#2073064 rh#2074208 rh#2074441 rh#2078456 rh#2084435 rh#2084458 rh#2085300 rh#2086753 rh#2088021 rh#2089815 rh#2090237 rh#2090240 rh#2090241 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2104423 rh#2141026 |
CVE-2022-0943 | vim:Not affected | important | () | CONFIRM:huntr.dev:CVE-2022-0943 CONFIRM:support.apple.com:CVE-2022-1725 CVE-2022-0943 D:CVE-2022-0943 FEDORA:FEDORA-2022-b718ebbfce FEDORA:FEDORA-2022-e62adccfca FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 GLSA-202208-32 MISC:github.com:CVE-2022-0943 MLIST:[debian-lts-announce] 20220620 [SECURITY] [DLA 3053-1] vim security update MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update RHSA-2022:5242 SMASH Issue 326149 bnc#1197225 rh#2064064 |
CVE-2022-0995 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-0995 CVE-2022-0995 MISC:git.kernel.org:CVE-2022-0995 MISC:packetstormsecurity.com:CVE-2022-0995 SMASH Issue 326386 bnc#1197246 bnc#1197337 rh#2063786 |
CVE-2022-0998 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-0998 CVE-2022-0998 MISC:git.kernel.org:OSS:2022/04/02/1 MISC:lore.kernel.org:CVE-2022-0998 OSS:2022/04/02/1 OSS:2022/Q2/0 SMASH Issue 326509 SMASH Issue 327959 bnc#1197247 bnc#1197338 rh#2057506 |
CVE-2022-1011 | kernel-source-rt:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-1011 CVE-2022-1011 D:CVE-2022-1016 D:CVE-2022-2153 D:CVE-2022-32296 DSA-5161 DSA-5173 DSA-5184 FEDORA:FEDORA-2022-9342e59a98 FEDORA:FEDORA-2022-de4474b89d L3:64306 L3:64525 L3:64549 L3:66073 MISC:git.kernel.org:CVE-2022-1011 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:OSS:2022/04/02/2 MISC:packetstormsecurity.com:CVE-2022-1011 MISC:research.nccgroup.com:OSS:2022/09/02/9 MISC:www.oracle.com:CVE-2022-21586 MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/22/1 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/Q3/141 Oracle:CVE-2022-21123 RHSA-2022:1975 RHSA-2022:1988 SMASH Issue 326653 ZDI-23-1834 bdo#1006346 bdo#1013299 bdo#922204 bnc#1197343 bnc#1197344 jsc#CAR-1599 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1832397 rh#2039448 rh#2056381 rh#2058395 rh#2058955 rh#2061633 rh#2062284 rh#2064604 rh#2064855 rh#2066614 rh#2066706 rh#2066819 rh#2069736 rh#2070694 rh#2071047 rh#2073064 rh#2074208 rh#2074441 rh#2084435 rh#2084458 rh#2085300 rh#2086753 rh#2088021 rh#2089815 rh#2090237 rh#2090240 rh#2090241 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2104423 rh#2141026 |
CVE-2022-1012 | kernel-source-rt:Released | moderate | 6.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2022-1012 CVE-2022-1012 D:CVE-2022-1016 D:CVE-2022-2153 D:CVE-2022-32296 DSA-5161 DSA-5173 DSA-5184 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:OSS:2022/04/02/2 MISC:kernel.googlesource.com:CVE-2022-1012 MISC:lore.kernel.org:CVE-2022-1012 MISC:research.nccgroup.com:OSS:2022/09/02/9 OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/22/1 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/Q3/141 Oracle:CVE-2022-21123 RHSA-2022:5214 RHSA-2022:5220 RHSA-2022:5224 RHSA-2022:5249 RHSA-2022:5267 RHSA-2022:5626 RHSA-2022:5633 RHSA-2022:5636 RHSA-2022:5819 RHSA-2022:5834 RHSA-2022:6551 SMASH Issue 331349 ZDI-23-1834 bdo#1006346 bdo#1013299 bdo#922204 bnc#1199482 bnc#1199694 jsc#CAR-1763 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1832397 rh#2039448 rh#2056381 rh#2058395 rh#2058955 rh#2061633 rh#2062284 rh#2064604 rh#2066614 rh#2066706 rh#2066819 rh#2069736 rh#2070694 rh#2071047 rh#2073064 rh#2074208 rh#2074441 rh#2084435 rh#2084458 rh#2085300 rh#2086753 rh#2088021 rh#2089815 rh#2090237 rh#2090240 rh#2090241 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2104423 rh#2141026 |
CVE-2022-1015 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-1015 CVE-2022-1016 CVE-2023-0179 D:CVE-2022-1016 D:CVE-2022-2153 D:CVE-2022-32296 DSA-5161 DSA-5173 DSA-5184 DSA-5324 L3:65449 L3:65879 L3:66739 MISC:access.redhat.com:/errata/RHSA-2022:7444 MISC:access.redhat.com:/errata/RHSA-2022:7683 MISC:access.redhat.com:/errata/RHSA-2022:7933 MISC:access.redhat.com:/errata/RHSA-2022:8267 MISC:access.redhat.com:CVE-2022-1016 MISC:blog.dbouman.nl:CVE-2022-1015 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:OSS:2022/04/02/2 MISC:packetstormsecurity.com:CVE-2022-42722 MISC:research.nccgroup.com:OSS:2022/09/02/9 OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/22/1 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/Q1/205 OSS:2022/Q3/141 OSS:2023/01/13/2 OSS:2023/02/23/1 OSS:2023/Q1/20 Oracle:CVE-2022-21123 RHSA-2022:7444 RHSA-2022:7683 RHSA-2022:7933 RHSA-2022:8267 RHSA-2023:0951 RHSA-2023:0979 RHSA-2023:1008 RHSA-2023:1202 RHSA-2023:1203 RHSA-2023:1435 RHSA-2023:4137 RHSA-2023:4138 SMASH Issue 326549 SMASH Issue 326808 SMASH Issue 329989 SMASH Issue 353369 ZDI-23-1834 bdo#1006346 bdo#1013299 bdo#922204 bnc#1197227 bnc#1197335 bnc#1207034 bnc#1207139 http://packetstormsecurity.com/files/171601/Kernel-Live-Patch-Security-Notice-LNS-0093-1.html https://security.netapp.com/advisory/ntap-20230511-0003/ jsc#CAR-1620 linux.git:commit:696e1a48b1a1b01edad542a1ef293665864a4dd0 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1832397 rh#2039448 rh#2056381 rh#2058395 rh#2058955 rh#2061633 rh#2062284 rh#2064604 rh#2065323 rh#2066614 rh#2066706 rh#2066819 rh#2069736 rh#2070694 rh#2071047 rh#2073064 rh#2074208 rh#2074441 rh#2084435 rh#2084458 rh#2085300 rh#2086753 rh#2088021 rh#2089815 rh#2090237 rh#2090240 rh#2090241 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2104423 rh#2141026 rh#2161713 |
CVE-2022-1016 | kernel-source-rt:Released | important | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2022-1015 CVE-2022-1016 D:CVE-2022-1016 D:CVE-2022-2153 D:CVE-2022-32296 DSA-5161 DSA-5173 DSA-5184 MISC:access.redhat.com:/errata/RHSA-2022:7444 MISC:access.redhat.com:/errata/RHSA-2022:7683 MISC:access.redhat.com:/errata/RHSA-2022:7933 MISC:access.redhat.com:/errata/RHSA-2022:8267 MISC:access.redhat.com:CVE-2022-1016 MISC:blog.dbouman.nl:CVE-2022-1015 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:OSS:2022/04/02/2 MISC:packetstormsecurity.com:CVE-2022-42722 MISC:research.nccgroup.com:OSS:2022/09/02/9 OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/22/1 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/Q1/205 OSS:2022/Q3/141 OSS:2023/01/13/2 OSS:2023/02/23/1 Oracle:CVE-2022-21123 RHSA-2022:7444 RHSA-2022:7683 RHSA-2022:7933 RHSA-2022:8267 RHSA-2023:4137 RHSA-2023:4138 SMASH Issue 326549 SMASH Issue 326807 ZDI-23-1834 bdo#1006346 bdo#1013299 bdo#922204 bnc#1197227 jsc#CAR-1620 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1832397 rh#2039448 rh#2056381 rh#2058395 rh#2058955 rh#2061633 rh#2062284 rh#2064604 rh#2065323 rh#2066614 rh#2066706 rh#2066819 rh#2069736 rh#2070694 rh#2071047 rh#2073064 rh#2074208 rh#2074441 rh#2084435 rh#2084458 rh#2085300 rh#2086753 rh#2088021 rh#2089815 rh#2090237 rh#2090240 rh#2090241 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2104423 rh#2141026 |
CVE-2022-1043 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-1043 MISC:access.redhat.com:CVE-2022-1043 MISC:github.com:CVE-2022-1043 MISC:packetstormsecurity.com:/files/170834/io_uring-Same-Type-Object-Reuse-Privilege-Escalation.html MISC:www.zerodayinitiative.com:CVE-2022-1043 SMASH Issue 326934 bnc#1197393 bnc#1197596 rh#1997328 |
CVE-2022-1048 | kernel-source-rt:Released | important | 7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-1353 CVE-2022-1048 D:CVE-2022-1016 D:CVE-2022-2153 D:CVE-2022-32296 DSA-5127 DSA-5161 DSA-5173 DSA-5184 L3:64306 L3:64525 L3:64549 L3:66075 MISC:anatomic.rip:OSS:2024/Q2/172 MISC:blog.exodusintel.com:OSS:2024/Q2/172 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:git.kernel.org:OSS:2024/Q2/172 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:OSS:2022/04/02/2 MISC:github.com:OSS:2022/Q3/101 MISC:lore.kernel.org:CVE-2022-1048 MISC:research.nccgroup.com:OSS:2022/09/02/9 MISC:ruia-ruia.github.io:OSS:2022/Q3/101 OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/04/22/3 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/22/1 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/Q1/204 OSS:2022/Q3/101 OSS:2022/Q3/141 OSS:2024/04/24/3 OSS:2024/Q2/172 Oracle:CVE-2022-21123 RHSA-2022:7444 RHSA-2022:7683 RHSA-2022:7933 RHSA-2022:8267 SMASH Issue 326830 SMASH Issue 326948 ZDI-23-1834 bdo#1006346 bdo#1013299 bdo#922204 bnc#1197331 bnc#1197597 https://bugs.chromium.org/p/project-zero/issues/detail?id=2504 https://lore.kernel.org/lkml/20220322170720.3529-5-tiwai%40suse.de/T/#m1d3b791b815556012c6be92f1c4a7086b854f7f3 jsc#CAR-1634 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1832397 rh#2039448 rh#2056381 rh#2058395 rh#2058955 rh#2061633 rh#2062284 rh#2064604 rh#2066614 rh#2066706 rh#2066819 rh#2069736 rh#2070694 rh#2071047 rh#2073064 rh#2074208 rh#2074441 rh#2078456 rh#2084435 rh#2084458 rh#2085300 rh#2086753 rh#2088021 rh#2089815 rh#2090237 rh#2090240 rh#2090241 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2104423 rh#2141026 |
CVE-2022-1055 | kernel-source-rt:Released | important | 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:N/A CONFIRM:security.netapp.com:CVE-2022-1055 CVE-2022-1055 D:CVE-2022-1055 MISC:packetstormsecurity.com:CVE-2022-29581 RHSA-2022:6002 RHSA-2022:6003 RHSA-2022:7444 RHSA-2022:7683 SMASH Issue 327545 bnc#1197702 bnc#1197705 jsc#CAR-1635 rh#2070220 |
CVE-2022-1097 | mozilla-nss:Released | important | 7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H) | CONFIRM:github.com:CVE-2022-24713 CVE-2022-1097 CVE-2022-1196 CVE-2022-1197 CVE-2022-24713 CVE-2022-28281 CVE-2022-28282 CVE-2022-28283 CVE-2022-28284 CVE-2022-28285 CVE-2022-28286 CVE-2022-28287 CVE-2022-28288 CVE-2022-28289 D:CVE-2022-24713 DSA-5113 DSA-5118 FEDORA:FEDORA-2022-8436ac4c39 FEDORA:FEDORA-2022-ceb3e03c5e FEDORA:FEDORA-2022-d20d44ba98 GLSA-202208-08 GLSA-202208-14 MISC:bugzilla.mozilla.org:/buglist.cgi MISC:bugzilla.mozilla.org:/show_bug.cgi MISC:github.com:CVE-2022-24713 MISC:groups.google.com:CVE-2022-24713 MISC:www.mozilla.org:/security/advisories/mfsa2022-13/ MISC:www.mozilla.org:/security/advisories/mfsa2022-14/ MISC:www.mozilla.org:/security/advisories/mfsa2022-15/ MLIST:[debian-lts-announce] 20220407 [SECURITY] [DLA 2971-1] firefox-esr security update MLIST:[debian-lts-announce] 20220411 [SECURITY] [DLA 2978-1] thunderbird security update Mozilla Foundation Security Advisory 2022-13 RHSA-2022:1283 RHSA-2022:1284 RHSA-2022:1285 RHSA-2022:1286 RHSA-2022:1287 RHSA-2022:1301 RHSA-2022:1302 RHSA-2022:1303 RHSA-2022:1305 RHSA-2022:1326 SMASH Issue 327815 SMASH Issue 327877 bnc#1197903 jsc#CAR-1667 rh#2072559 rh#2072560 rh#2072561 rh#2072562 rh#2072563 rh#2072564 rh#2072565 rh#2072566 rh#2072963 xf#223379 |
CVE-2022-1116 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-1116 CVE-2022-1116 L3:65426 MISC:git.kernel.org:CVE-2022-1116 MISC:kernel.dance:CVE-2022-1116 MISC:packetstormsecurity.com:CVE-2022-29581 SMASH Issue 332133 bnc#1199647 bnc#1199648 jsc#CAR-1774 rh#2087936 |
CVE-2022-1154 | vim:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H) | CONFIRM:huntr.dev:CVE-2022-1154 CVE-2022-1154 FEDORA:FEDORA-2022-d776fcfe60 FEDORA:FEDORA-2022-e62adccfca GLSA-202208-32 MISC:github.com:CVE-2022-1154 MISC:www.oracle.com:CVE-2022-21586 MLIST:[debian-lts-announce] 20220516 [SECURITY] [DLA 3011-1] vim security update MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update Oracle:CVE-2022-1154 RHSA-2022:1552 RHSA-2022:5242 SMASH Issue 327694 bnc#1197813 https://security.gentoo.org/glsa/202305-16 rh#2073013 |
CVE-2022-1158 | kernel-source-rt:Released | important | 7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-1158 MISC:git.kernel.org:OSS:2022/04/08/4 MISC:github.com:OSS:2022/04/08/4 OSS:2022/04/08/4 OSS:2022/Q2/22 RHSA-2022:7444 RHSA-2022:7683 RHSA-2022:7933 RHSA-2022:8267 RHSA-2022:8673 RHSA-2022:8685 RHSA-2022:8686 RHSA-2022:8809 RHSA-2022:8831 RHSA-2022:8940 RHSA-2022:8941 RHSA-2022:8973 RHSA-2022:8974 RHSA-2022:8989 RHSA-2022:9082 SMASH Issue 327524 SMASH Issue 327604 bnc#1197660 bnc#1198133 https://security.netapp.com/advisory/ntap-20230214-0003/ jsc#CAR-1757 rh#2069793 |
CVE-2022-1160 | vim:Not affected | moderate | 6.3 (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H) | CONFIRM:huntr.dev:CVE-2022-1160 CVE-2022-1160 FEDORA:FEDORA-2022-d776fcfe60 FEDORA:FEDORA-2022-e62adccfca GLSA-202208-32 MISC:github.com:CVE-2022-1160 SMASH Issue 327708 bnc#1197814 https://security.gentoo.org/glsa/202305-16 rh#2070437 |
CVE-2022-1184 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-1184 DSA-5257 MISC:access.redhat.com:/errata/RHSA-2022:7444 MISC:access.redhat.com:/errata/RHSA-2022:7683 MISC:access.redhat.com:/errata/RHSA-2022:7933 MISC:access.redhat.com:/errata/RHSA-2022:8267 MISC:access.redhat.com:CVE-2022-1184 MISC:ubuntu.com:CVE-2022-1184 MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update OSS:2022/Q4/30 RHSA-2022:7444 RHSA-2022:7683 RHSA-2022:7933 RHSA-2022:8267 SMASH Issue 329431 ZDI-22-1462 bdo#1006346 bdo#1013299 bdo#922204 bnc#1198577 linux.git:commit:0b7808818cb9df6680f98996b8e9a439fa7bcc2f linux.git:commit:61a1d87a324ad5e3ed27c6699dfc93218fcf3201 linux.git:commit:65f8ea4cd57dbd46ea13b41dc8bac03176b04233 linux.git:commit:8f033d2becc24aa6bfd2a5c104407963560caabc linux.git:commit:aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d linux.git:commit:b2d03cabe2b2e150ff5a381731ea0355459be09f linux.git:commit:bcca852027e5878aec911a347407ecc88d6fff7f linux.git:commit:ff05d4b45dd89b922578dac497dcabf57cf771c6 rh#2070205 rh#2123056 rh#2134377 rh#2134440 rh#2134451 rh#2134506 rh#2134517 rh#2139586 rh#2139598 rh#2189896 |
CVE-2022-1195 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-1195 D:CVE-2022-1016 D:CVE-2022-2153 D:CVE-2022-32296 DSA-5127 DSA-5161 DSA-5173 DSA-5184 MISC:anatomic.rip:OSS:2024/Q2/172 MISC:blog.exodusintel.com:OSS:2024/Q2/172 MISC:git.kernel.org:CVE-2022-1195 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:git.kernel.org:OSS:2024/Q2/172 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:OSS:2022/04/02/2 MISC:github.com:OSS:2022/Q3/101 MISC:research.nccgroup.com:OSS:2022/09/02/9 MISC:ruia-ruia.github.io:OSS:2022/Q3/101 OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/04/22/3 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/22/1 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/Q3/101 OSS:2022/Q3/141 OSS:2024/04/24/3 OSS:2024/Q2/172 Oracle:CVE-2022-21123 SMASH Issue 327765 ZDI-23-1834 bdo#1006346 bdo#1013299 bdo#922204 bnc#1198029 https://bugs.chromium.org/p/project-zero/issues/detail?id=2504 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1832397 rh#2039448 rh#2056381 rh#2058395 rh#2058955 rh#2061633 rh#2062284 rh#2064604 rh#2066614 rh#2066706 rh#2066819 rh#2069736 rh#2070694 rh#2071047 rh#2073064 rh#2074208 rh#2074441 rh#2078456 rh#2084435 rh#2084458 rh#2085300 rh#2086753 rh#2088021 rh#2089815 rh#2090237 rh#2090240 rh#2090241 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2104423 rh#2141026 |
CVE-2022-1196 | mozilla-nss:Released | important | 6.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) | CONFIRM:github.com:CVE-2022-24713 CVE-2022-1097 CVE-2022-1196 CVE-2022-1197 CVE-2022-24713 CVE-2022-28281 CVE-2022-28282 CVE-2022-28283 CVE-2022-28284 CVE-2022-28285 CVE-2022-28286 CVE-2022-28287 CVE-2022-28288 CVE-2022-28289 D:CVE-2022-24713 DSA-5113 DSA-5118 FEDORA:FEDORA-2022-8436ac4c39 FEDORA:FEDORA-2022-ceb3e03c5e FEDORA:FEDORA-2022-d20d44ba98 GLSA-202208-08 GLSA-202208-14 MISC:bugzilla.mozilla.org:/buglist.cgi MISC:bugzilla.mozilla.org:/show_bug.cgi MISC:github.com:CVE-2022-24713 MISC:groups.google.com:CVE-2022-24713 MISC:www.mozilla.org:/security/advisories/mfsa2022-13/ MISC:www.mozilla.org:/security/advisories/mfsa2022-14/ MISC:www.mozilla.org:/security/advisories/mfsa2022-15/ MLIST:[debian-lts-announce] 20220407 [SECURITY] [DLA 2971-1] firefox-esr security update MLIST:[debian-lts-announce] 20220411 [SECURITY] [DLA 2978-1] thunderbird security update Mozilla Foundation Security Advisory 2022-13 RHSA-2022:1283 RHSA-2022:1284 RHSA-2022:1285 RHSA-2022:1286 RHSA-2022:1287 RHSA-2022:1301 RHSA-2022:1302 RHSA-2022:1303 RHSA-2022:1305 RHSA-2022:1326 SMASH Issue 327815 bnc#1197903 jsc#CAR-1667 rh#2072559 rh#2072560 rh#2072561 rh#2072562 rh#2072563 rh#2072564 rh#2072565 rh#2072566 rh#2072963 xf#223379 |
CVE-2022-1197 | mozilla-nss:Released | important | 6.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) | CONFIRM:github.com:CVE-2022-24713 CVE-2022-1097 CVE-2022-1196 CVE-2022-1197 CVE-2022-24713 CVE-2022-28281 CVE-2022-28282 CVE-2022-28283 CVE-2022-28284 CVE-2022-28285 CVE-2022-28286 CVE-2022-28287 CVE-2022-28288 CVE-2022-28289 D:CVE-2022-24713 DSA-5113 DSA-5118 FEDORA:FEDORA-2022-8436ac4c39 FEDORA:FEDORA-2022-ceb3e03c5e FEDORA:FEDORA-2022-d20d44ba98 GLSA-202208-08 GLSA-202208-14 MISC:bugzilla.mozilla.org:/buglist.cgi MISC:bugzilla.mozilla.org:/show_bug.cgi MISC:github.com:CVE-2022-24713 MISC:groups.google.com:CVE-2022-24713 MISC:www.mozilla.org:/security/advisories/mfsa2022-13/ MISC:www.mozilla.org:/security/advisories/mfsa2022-14/ MISC:www.mozilla.org:/security/advisories/mfsa2022-15/ MLIST:[debian-lts-announce] 20220407 [SECURITY] [DLA 2971-1] firefox-esr security update MLIST:[debian-lts-announce] 20220411 [SECURITY] [DLA 2978-1] thunderbird security update Mozilla Foundation Security Advisory 2022-13 RHSA-2022:1283 RHSA-2022:1284 RHSA-2022:1285 RHSA-2022:1286 RHSA-2022:1287 RHSA-2022:1301 RHSA-2022:1302 RHSA-2022:1303 RHSA-2022:1305 RHSA-2022:1326 SMASH Issue 327815 SMASH Issue 328343 bnc#1197903 jsc#CAR-1667 rh#2072559 rh#2072560 rh#2072561 rh#2072562 rh#2072563 rh#2072564 rh#2072565 rh#2072566 rh#2072963 xf#223379 |
CVE-2022-1198 | kernel-source-rt:Not affected | moderate | 5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-1198 D:CVE-2022-1016 D:CVE-2022-32296 DSA-5161 DSA-5173 DSA-5184 MISC:access.redhat.com:CVE-2022-1198 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:OSS:2022/04/02/2 MISC:research.nccgroup.com:OSS:2022/09/02/9 OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/22/1 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/Q2/2 OSS:2022/Q3/141 Oracle:CVE-2022-21123 SMASH Issue 327769 ZDI-23-1834 bdo#1006346 bdo#1013299 bdo#922204 bnc#1198030 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1832397 rh#2039448 rh#2056381 rh#2058395 rh#2058955 rh#2061633 rh#2062284 rh#2064604 rh#2066614 rh#2066706 rh#2066819 rh#2070689 rh#2070694 rh#2071047 rh#2073064 rh#2074208 rh#2074441 rh#2084435 rh#2084458 rh#2085300 rh#2086753 rh#2088021 rh#2089815 rh#2090237 rh#2090240 rh#2090241 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2104423 rh#2141026 |
CVE-2022-1199 | kernel-source-rt:Not affected | moderate | 5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:/advisory/ntap-20221228-0006/ CVE-2022-1199 D:CVE-2022-1016 D:CVE-2022-2153 D:CVE-2022-32296 DSA-5161 DSA-5173 DSA-5184 MISC:access.redhat.com:CVE-2022-1199 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:OSS:2022/04/02/2 MISC:research.nccgroup.com:OSS:2022/09/02/9 OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/22/1 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/Q2/4 OSS:2022/Q3/141 Oracle:CVE-2022-21123 SMASH Issue 327770 ZDI-23-1834 bdo#1006346 bdo#1013299 bdo#922204 bnc#1198028 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1832397 rh#2039448 rh#2056381 rh#2058395 rh#2058955 rh#2061633 rh#2062284 rh#2064604 rh#2066614 rh#2066706 rh#2066819 rh#2069736 rh#2070694 rh#2071047 rh#2073064 rh#2074208 rh#2074441 rh#2084435 rh#2084458 rh#2085300 rh#2086753 rh#2088021 rh#2089815 rh#2090237 rh#2090240 rh#2090241 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2104423 rh#2141026 |
CVE-2022-1204 | kernel-source-rt:Not affected | moderate | 5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-1204 D:CVE-2022-1016 D:CVE-2022-2153 D:CVE-2022-32296 DSA-5161 DSA-5173 DSA-5184 MISC:access.redhat.com:CVE-2022-1204 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:OSS:2022/04/02/2 MISC:research.nccgroup.com:OSS:2022/09/02/9 MISC:security-tracker.debian.org:CVE-2022-1204 OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/22/1 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/Q2/1 OSS:2022/Q3/141 Oracle:CVE-2022-21123 SMASH Issue 327883 ZDI-23-1834 bdo#1006346 bdo#1013299 bdo#922204 bnc#1198025 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1832397 rh#2039448 rh#2056381 rh#2058395 rh#2058955 rh#2061633 rh#2062284 rh#2064604 rh#2066614 rh#2066706 rh#2066819 rh#2069736 rh#2070694 rh#2071047 rh#2071051 rh#2073064 rh#2074208 rh#2074441 rh#2084435 rh#2084458 rh#2085300 rh#2086753 rh#2088021 rh#2089815 rh#2090237 rh#2090240 rh#2090241 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2104423 rh#2141026 |
CVE-2022-1205 | kernel-source-rt:Not affected | moderate | 5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-1205 D:CVE-2022-1016 D:CVE-2022-2153 D:CVE-2022-32296 DSA-5161 DSA-5173 DSA-5184 MISC:access.redhat.com:CVE-2022-1205 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:OSS:2022/04/02/2 MISC:research.nccgroup.com:OSS:2022/09/02/9 OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/22/1 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/Q2/3 OSS:2022/Q3/141 Oracle:CVE-2022-21123 SMASH Issue 327882 ZDI-23-1834 bdo#1006346 bdo#1013299 bdo#922204 bnc#1198027 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1832397 rh#2039448 rh#2056381 rh#2058395 rh#2058955 rh#2061633 rh#2062284 rh#2064604 rh#2066614 rh#2066706 rh#2066819 rh#2069736 rh#2070694 rh#2071047 rh#2073064 rh#2074208 rh#2074441 rh#2084435 rh#2084458 rh#2085300 rh#2086753 rh#2088021 rh#2089815 rh#2090237 rh#2090240 rh#2090241 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2104423 rh#2141026 |
CVE-2022-1247 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-1247 L3:64302 L3:64306 L3:64525 L3:64549 MISC:access.redhat.com:CVE-2022-1247 SMASH Issue 331344 bnc#1199434 bnc#1199696 rh#2066799 |
CVE-2022-1249 | pesign:Not affected | low | () | CVE-2022-1249 SMASH Issue 328265 bnc#1198157 rh#2065771 |
CVE-2022-1263 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-1263 MISC:access.redhat.com:CVE-2022-1263 MISC:github.com:CVE-2022-1263 OSS:2022/04/07/1 OSS:2022/Q2/12 RHSA-2022:7444 RHSA-2022:7683 RHSA-2022:7933 RHSA-2022:8267 SMASH Issue 328341 bnc#1198189 rh#2072698 |
CVE-2022-1271 | gzip:Released, xz:Released | important | 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-1271 CVE-2022-1271 DSA-5122 DSA-5123 GLSA-202209-01 L3:63462 L3:63468 MISC:access.redhat.com:CVE-2022-1271 MISC:git.tukaani.org:CVE-2022-1271 MISC:lists.gnu.org:CVE-2022-1271 MISC:security-tracker.debian.org:CVE-2022-1271 MISC:tukaani.org:CVE-2022-1271 MISC:tukaani.org:OSS:2022/04/07/8 OSS:2022/04/07/8 OSS:2022/Q2/21 Oracle:CVE-2022-1271 RHSA-2022:1537 RHSA-2022:1592 RHSA-2022:1665 RHSA-2022:1676 RHSA-2022:2191 RHSA-2022:4582 RHSA-2022:4896 RHSA-2022:4940 RHSA-2022:4991 RHSA-2022:4992 RHSA-2022:4993 RHSA-2022:4994 RHSA-2022:5052 RHSA-2022:5439 SMASH Issue 328097 SMASH Issue 328398 ZDI-22-1458 ZDI-22-619 bdo#1009167 bdo#1009168 bnc#1198062 bnc#1200199 bnc#1200208 jsc#CAR-1661 rh#2073310 |
CVE-2022-1280 | kernel-source-rt:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-1280 OSS:2022/04/12/3 OSS:2022/Q2/39 RHSA-2022:7683 RHSA-2022:7933 RHSA-2022:8267 SMASH Issue 327827 SMASH Issue 328420 bnc#1197914 bnc#1198590 jsc#CAR-1679 rh#2071022 |
CVE-2022-1292 | openssl:Not affected, openssl-1_1:Released | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:git.openssl.org:CVE-2022-1292 CONFIRM:psirt.global.sonicwall.com:CVE-2022-1292 CONFIRM:security.netapp.com:CVE-2022-1473 CONFIRM:security.netapp.com:CVE-2022-21569 CONFIRM:www.openssl.org:CVE-2022-1473 CVE-2022-1292 D:CVE-2022-1292 DSA-5139 FEDORA:FEDORA-2022-b651cb69e6 FEDORA:FEDORA-2022-c9c02865f6 GLSA-202210-02 L3:63379 L3:63382 L3:68186 MISC:www.oracle.com:CVE-2022-21586 MLIST:[debian-lts-announce] 20220515 [SECURITY] [DLA 3008-1] openssl security update Oracle:CVE-2022-1292 Oracle:CVE-2022-2068 RHSA-2022:5818 RHSA-2022:6224 RHSA-2022:8840 RHSA-2022:8841 RHSA-2022:8913 RHSA-2022:8917 SMASH Issue 330566 bnc#1199166 bnc#1199336 bnc#1199823 bnc#1199844 https://cert-portal.siemens.com/productcert/pdf/ssa-953464.pdf jsc#CAR-1735 openssl.git:commit:7c33270707b568c524a8ef125fe611a8872cb5e8 openssl.git:commit:ce60b13707add7e6b54c5817376234c4043506ed rh#2081494 rh#2097310 |
CVE-2022-1304 | e2fsprogs:Released | moderate | 7 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H) | CVE-2022-1304 MISC:access.redhat.com:/errata/RHSA-2022:7720 MISC:access.redhat.com:/errata/RHSA-2022:8361 MISC:access.redhat.com:/security/cve/CVE-2022-1304 Oracle:CVE-2022-1304 RHSA-2022:7720 RHSA-2022:8361 SMASH Issue 328572 bnc#1198446 jsc#CAR-1823 rh#2069726 |
CVE-2022-1343 | openssl:Not affected, openssl-1_1:Not affected | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N) | CONFIRM:git.openssl.org:CVE-2022-1343 CONFIRM:security.netapp.com:CVE-2022-1473 CONFIRM:www.openssl.org:CVE-2022-1473 CVE-2022-1343 RHSA-2022:6224 SMASH Issue 330567 bnc#1199167 https://cert-portal.siemens.com/productcert/pdf/ssa-953464.pdf openssl.git:commit:21f89f542d745adbf1131338929ae538e200d50d rh#2087911 |
CVE-2022-1348 | logrotate:Not affected | moderate | 5.1 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L) | CVE-2022-1348 FEDORA:FEDORA-2022-87c0f05204 FEDORA:FEDORA-2022-ff0188b37c MISC:bugzilla.redhat.com:CVE-2022-1348 MISC:github.com:OSS:2022/05/25/5 OSS:2022/05/25/3 OSS:2022/05/25/4 OSS:2022/05/25/5 RHSA-2022:8393 SMASH Issue 332242 SMASH Issue 332243 bnc#1199652 rh#2075074 |
CVE-2022-1353 | kernel-source-rt:Released | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2022-1353 CVE-2022-1353 D:CVE-2022-2153 DSA-5127 DSA-5161 DSA-5173 DSA-5184 L3:66049 MISC:anatomic.rip:OSS:2024/Q2/172 MISC:blog.exodusintel.com:OSS:2024/Q2/172 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:git.kernel.org:OSS:2024/Q2/172 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:CVE-2022-1353 MISC:github.com:OSS:2022/04/02/2 MISC:github.com:OSS:2022/Q3/101 MISC:research.nccgroup.com:OSS:2022/09/02/9 MISC:ruia-ruia.github.io:OSS:2022/Q3/101 MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/04/22/3 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/22/1 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/Q3/101 OSS:2022/Q3/141 OSS:2024/04/24/3 OSS:2024/Q2/172 Oracle:CVE-2022-21123 RHSA-2022:5934 RHSA-2022:5998 RHSA-2022:6243 RHSA-2022:6248 RHSA-2022:7110 RHSA-2022:7134 RHSA-2022:7933 RHSA-2022:8267 RHSA-2023:4801 RHSA-2023:4814 SMASH Issue 329048 ZDI-23-1834 bdo#1006346 bdo#1013299 bdo#922204 bnc#1198516 https://bugs.chromium.org/p/project-zero/issues/detail?id=2504 jsc#CAR-1684 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1832397 rh#2039448 rh#2056381 rh#2058395 rh#2058955 rh#2061633 rh#2062284 rh#2064604 rh#2066614 rh#2066706 rh#2066819 rh#2069736 rh#2070694 rh#2071047 rh#2073064 rh#2074208 rh#2074441 rh#2078456 rh#2084435 rh#2084458 rh#2085300 rh#2086753 rh#2088021 rh#2089815 rh#2090237 rh#2090240 rh#2090241 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2104423 rh#2141026 |
CVE-2022-1381 | vim:Released | moderate | 5.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) | CONFIRM:huntr.dev:CVE-2022-1381 CONFIRM:support.apple.com:CVE-2022-1725 CVE-2022-1381 D:CVE-2022-1381 FEDORA:FEDORA-2022-b605768c94 FEDORA:FEDORA-2022-e304fffd34 FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 GLSA-202208-32 MISC:github.com:CVE-2022-1381 SMASH Issue 329434 bnc#1198596 https://security.gentoo.org/glsa/202305-16 rh#2076170 |
CVE-2022-1419 | kernel-source-rt:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-1419 D:CVE-2022-1016 D:CVE-2022-2153 D:CVE-2022-32296 DSA-5161 DSA-5173 DSA-5184 L3:64060 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:OSS:2022/04/02/2 MISC:research.nccgroup.com:OSS:2022/09/02/9 OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/22/1 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/Q2/49 OSS:2022/Q3/141 Oracle:CVE-2022-21123 SMASH Issue 329712 ZDI-23-1834 bdo#1006346 bdo#1013299 bdo#922204 bnc#1198742 bnc#1201655 jsc#CAR-1720 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1832397 rh#2039448 rh#2056381 rh#2058395 rh#2058955 rh#2061633 rh#2062284 rh#2064604 rh#2066614 rh#2066706 rh#2066819 rh#2069736 rh#2070694 rh#2071047 rh#2073064 rh#2074208 rh#2074441 rh#2077560 rh#2084435 rh#2084458 rh#2085300 rh#2086753 rh#2088021 rh#2089815 rh#2090237 rh#2090240 rh#2090241 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2104423 rh#2141026 |
CVE-2022-1420 | vim:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:huntr.dev:CVE-2022-1420 CONFIRM:support.apple.com:CVE-2022-1725 CVE-2022-1420 D:CVE-2022-1420 FEDORA:FEDORA-2022-b605768c94 FEDORA:FEDORA-2022-e304fffd34 FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 GLSA-202208-32 MISC:github.com:CVE-2022-1420 RHSA-2022:5242 SMASH Issue 329709 bnc#1198748 https://security.gentoo.org/glsa/202305-16 rh#2077734 |
CVE-2022-1434 | openssl:Not affected, openssl-1_1:Not affected | important | 8.8 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:git.openssl.org:CVE-2022-1434 CONFIRM:security.netapp.com:CVE-2022-1473 CONFIRM:www.openssl.org:CVE-2022-1473 CVE-2022-1434 SMASH Issue 330568 bnc#1199168 https://cert-portal.siemens.com/productcert/pdf/ssa-953464.pdf openssl.git:commit:33219939c782cf363b30e9e899b9997fb1ced440 rh#2087912 rh#2087913 xf#225617 |
CVE-2022-1462 | kernel-source-rt:Released | moderate | 6.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H) | CVE-2022-1462 MISC:github.com:OSS:2022/Q2/155 MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update OSS:2022/Q2/155 RHSA-2023:2148 RHSA-2023:2458 RHSA-2023:2736 RHSA-2023:2951 SMASH Issue 329994 SMASH Issue 329995 bnc#1198829 rh#2078466 |
CVE-2022-1473 | openssl:Not affected, openssl-1_1:Not affected | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:git.openssl.org:CVE-2022-1473 CONFIRM:security.netapp.com:CVE-2022-1473 CONFIRM:www.openssl.org:CVE-2022-1473 CVE-2022-1473 GLSA-202210-02 RHSA-2022:6224 SMASH Issue 330569 bnc#1199169 https://cert-portal.siemens.com/productcert/pdf/ssa-953464.pdf rh#2087913 |
CVE-2022-1508 | kernel-source-rt:Not affected | moderate | 6.8 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L) | CVE-2022-1508 MISC:access.redhat.com:CVE-2022-1508 MISC:git.kernel.org:CVE-2022-1508 MISC:ubuntu.com:CVE-2022-1508 SMASH Issue 330184 bnc#1198968 rh#2075533 |
CVE-2022-1516 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-1516 D:CVE-2022-1016 D:CVE-2022-2153 D:CVE-2022-32296 DSA-5161 DSA-5173 DSA-5184 MISC:git.kernel.org:CVE-2022-1516 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:OSS:2022/04/02/2 MISC:github.com:OSS:2022/06/19/1 MISC:research.nccgroup.com:OSS:2022/09/02/9 MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/19/1 OSS:2022/06/22/1 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/Q2/201 OSS:2022/Q3/141 Oracle:CVE-2022-21123 SMASH Issue 330276 ZDI-23-1834 bdo#1006346 bdo#1013299 bdo#922204 bnc#1199012 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1832397 rh#2039448 rh#2056381 rh#2058395 rh#2058955 rh#2061633 rh#2062284 rh#2064604 rh#2066614 rh#2066706 rh#2066819 rh#2069736 rh#2070694 rh#2071047 rh#2073064 rh#2074208 rh#2074441 rh#2079802 rh#2084435 rh#2084458 rh#2085300 rh#2086753 rh#2088021 rh#2089815 rh#2090237 rh#2090240 rh#2090241 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2104423 rh#2141026 |
CVE-2022-1586 | pcre:Released | important | 8.6 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L) | CONFIRM:security.netapp.com:CVE-2022-1587 CVE-2022-1586 FEDORA:FEDORA-2022-19f4c34184 FEDORA:FEDORA-2022-9c9691d058 FEDORA:FEDORA-2022-a3edad0ab6 FEDORA:FEDORA-2022-e56085ba31 L3:64059 MISC:bugzilla.redhat.com:CVE-2022-1586 MISC:github.com:CVE-2022-1586 Oracle:CVE-2022-1586 RHSA-2022:5251 RHSA-2022:5809 SMASH Issue 330794 bnc#1199232 https://lists.debian.org/debian-lts-announce/2023/03/msg00014.html jsc#CAR-1749 rh#2077976 |
CVE-2022-1587 | pcre:Not affected | important | 8.6 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L) | CONFIRM:security.netapp.com:CVE-2022-1587 CVE-2022-1587 FEDORA:FEDORA-2022-19f4c34184 FEDORA:FEDORA-2022-9c9691d058 FEDORA:FEDORA-2022-a3edad0ab6 FEDORA:FEDORA-2022-e56085ba31 L3:63788 L3:64059 MISC:bugzilla.redhat.com:CVE-2022-1587 MISC:github.com:CVE-2022-1587 Oracle:CVE-2022-1587 RHSA-2022:5251 SMASH Issue 330795 bnc#1199235 bnc#1201754 https://lists.debian.org/debian-lts-announce/2023/03/msg00014.html rh#2077983 |
CVE-2022-1616 | vim:Released | moderate | 5.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) | CONFIRM:huntr.dev:CVE-2022-1616 CONFIRM:support.apple.com:CVE-2022-1725 CVE-2022-1616 D:CVE-2022-1616 FEDORA:FEDORA-2022-8df66cdbef FEDORA:FEDORA-2022-e92c3ce170 FEDORA:FEDORA-2022-f0db3943d9 FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 GLSA-202208-32 MISC:github.com:CVE-2022-1616 MLIST:[debian-lts-announce] 20220516 [SECURITY] [DLA 3011-1] vim security update MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update SMASH Issue 331072 bnc#1199331 https://security.gentoo.org/glsa/202305-16 jsc#CAR-1751 rh#2083017 |
CVE-2022-1619 | vim:Released | moderate | 5.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) | CONFIRM:huntr.dev:CVE-2022-1619 CONFIRM:security.netapp.com:CVE-2022-1619 CONFIRM:support.apple.com:CVE-2022-1725 CVE-2022-1619 D:CVE-2022-1619 FEDORA:FEDORA-2022-8df66cdbef FEDORA:FEDORA-2022-e92c3ce170 FEDORA:FEDORA-2022-f0db3943d9 FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 GLSA-202208-32 MISC:github.com:CVE-2022-1619 MLIST:[debian-lts-announce] 20220516 [SECURITY] [DLA 3011-1] vim security update MLIST:[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update SMASH Issue 331075 bnc#1199333 https://security.gentoo.org/glsa/202305-16 rh#2083026 |
CVE-2022-1620 | vim:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:huntr.dev:CVE-2022-1620 CONFIRM:support.apple.com:CVE-2022-1725 CVE-2022-1620 D:CVE-2022-1620 FEDORA:FEDORA-2022-8df66cdbef FEDORA:FEDORA-2022-e92c3ce170 FEDORA:FEDORA-2022-f0db3943d9 FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 GLSA-202208-32 L3:63688 MISC:github.com:CVE-2022-1620 SMASH Issue 331074 bnc#1199334 bnc#1201281 https://security.gentoo.org/glsa/202305-16 jsc#CAR-1752 rh#2083029 |
CVE-2022-1621 | vim:Not affected | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H) | CONFIRM:huntr.dev:CVE-2022-1621 CONFIRM:support.apple.com:CVE-2022-1725 CVE-2022-1621 FEDORA:FEDORA-2022-8df66cdbef FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 GLSA-202208-32 MISC:github.com:CVE-2022-1621 MLIST:[debian-lts-announce] 20220516 [SECURITY] [DLA 3011-1] vim security update MLIST:[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update RHSA-2022:5242 RHSA-2022:5319 SMASH Issue 331173 bnc#1199435 https://security.gentoo.org/glsa/202305-16 rh#2083924 |
CVE-2022-1629 | vim:Not affected | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H) | CONFIRM:huntr.dev:CVE-2022-1629 CONFIRM:support.apple.com:CVE-2022-1725 CVE-2022-1629 FEDORA:FEDORA-2022-8df66cdbef FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 GLSA-202208-32 MISC:github.com:CVE-2022-1629 RHSA-2022:5242 RHSA-2022:5319 SMASH Issue 331172 bnc#1199436 https://security.gentoo.org/glsa/202305-16 rh#2083931 |
CVE-2022-1651 | kernel-source-rt:Not affected | moderate | 5.3 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2022-1671 CVE-2022-1651 D:CVE-2022-1651 MISC:git.kernel.org:CVE-2022-1651 SMASH Issue 331345 bnc#1199433 rh#2083455 |
CVE-2022-1652 | kernel-source-rt:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CERT-VN:VU#647177 CONFIRM:security.netapp.com:CVE-2022-1652 CVE-2022-1652 D:CVE-2022-1016 D:CVE-2022-2153 DSA-5161 DSA-5173 DSA-5184 L3:64306 L3:64525 L3:64549 L3:66060 MISC:francozappa.github.io:CVE-2020-10135 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:OSS:2022/04/02/2 MISC:research.nccgroup.com:OSS:2022/09/02/9 OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/22/1 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/Q2/91 OSS:2022/Q3/141 Oracle:CVE-2022-21123 SMASH Issue 330428 SMASH Issue 331140 ZDI-23-1834 bdo#1006346 bdo#1013299 bdo#922204 bnc#1199063 bnc#1200057 jsc#CAR-1806 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1832397 rh#2039448 rh#2056381 rh#2058395 rh#2058955 rh#2061633 rh#2062284 rh#2064604 rh#2066614 rh#2066706 rh#2066819 rh#2069736 rh#2070694 rh#2071047 rh#2073064 rh#2074208 rh#2074441 rh#2084435 rh#2084458 rh#2085300 rh#2086753 rh#2088021 rh#2089815 rh#2090237 rh#2090240 rh#2090241 rh#2090723 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2104423 rh#2141026 |
CVE-2022-1664 | update-alternatives:Released | low | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N) | CONFIRM:security.netapp.com:CVE-2022-1664 CVE-2022-1664 DSA-5147 MISC:git.dpkg.org:CVE-2022-1664 MISC:lists.debian.org:CVE-2022-1664 SMASH Issue 332928 bnc#1199944 |
CVE-2022-1671 | kernel-source-rt:Not affected | moderate | 6.6 (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2022-1671 CVE-2022-1671 D:CVE-2022-1671 MISC:git.kernel.org:CVE-2022-1671 SMASH Issue 331346 bnc#1199439 rh#2083992 |
CVE-2022-1674 | vim:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:huntr.dev:CVE-2022-1674 CONFIRM:support.apple.com:CVE-2022-1725 CVE-2022-1674 FEDORA:FEDORA-2022-74b9e404c1 FEDORA:FEDORA-2022-d044e7e0b4 FEDORA:FEDORA-2022-d20b51de9c FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 GLSA-202208-32 MISC:github.com:CVE-2022-1674 SMASH Issue 331586 bnc#1199502 https://security.gentoo.org/glsa/202305-16 rh#2085393 |
CVE-2022-1678 | kernel-source-rt:Not affected | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:bugzilla.openanolis.cn:CVE-2022-1678 CONFIRM:security.netapp.com:CVE-2022-1678 CVE-2022-1678 MISC:anas.openanolis.cn:CVE-2022-1678 MISC:gitee.com:CVE-2022-1678 MISC:github.com:CVE-2022-1678 MISC:lore.kernel.org:CVE-2022-1678 SMASH Issue 332942 bnc#1199939 rh#2091704 |
CVE-2022-1679 | kernel-source-rt:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-1679 CVE-2022-1679 L3:63649 L3:64302 L3:64306 L3:64525 L3:64549 L3:66067 MISC:lore.kernel.org:CVE-2022-1679 MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update RHSA-2022:7933 RHSA-2022:8267 RHSA-2023:2736 RHSA-2023:2951 SMASH Issue 331563 bnc#1199487 bnc#1199696 bnc#1201080 bnc#1201083 https://lore.kernel.org/lkml/87ilqc7jv9.fsf%40kernel.org/t/ jsc#CAR-1766 rh#2066799 rh#2084125 |
CVE-2022-1706 | systemd-presets-common-SUSE:Released | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) | CVE-2022-1706 FEDORA:FEDORA-2022-393948cc9e FEDORA:FEDORA-2022-5df5dc8ec5 FEDORA:FEDORA-2022-7846cac830 MISC:github.com:CVE-2022-1706 RHSA-2022:5068 RHSA-2022:8126 SMASH Issue 331765 bnc#1199524 rh#2082274 |
CVE-2022-1720 | vim:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:huntr.dev:CVE-2022-1720 CONFIRM:support.apple.com:CVE-2022-1720 CONFIRM:support.apple.com:CVE-2022-1725 CONFIRM:support.apple.com:CVE-2022-32894 CVE-2022-1720 FEDORA:FEDORA-2022-719f3ec21b FEDORA:FEDORA-2022-bb7f3cacbf FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6 FULLDISC:20221030 APPLE-SA-2022-10-27-9 Additional information for APPLE-SA-2022-09-12-3 macOS Big Sur 11.7 GLSA-202208-32 MISC:github.com:CVE-2022-1720 MLIST:[debian-lts-announce] 20220620 [SECURITY] [DLA 3053-1] vim security update MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update SMASH Issue 335182 bnc#1200732 https://security.gentoo.org/glsa/202305-16 jsc#CAR-1861 rh#2099979 |
CVE-2022-1725 | vim:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:huntr.dev:CVE-2022-1725 CONFIRM:support.apple.com:CVE-2022-1725 CVE-2022-1725 FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 MISC:github.com:CVE-2022-1725 SMASH Issue 343922 bnc#1204118 https://security.gentoo.org/glsa/202305-16 rh#2132561 |
CVE-2022-1729 | kernel-source-rt:Released | important | 8.2 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H) | CVE-2022-1729 D:CVE-2022-1016 D:CVE-2022-2153 D:CVE-2022-32296 DSA-5161 DSA-5173 DSA-5184 MISC:git.kernel.org:CVE-2022-1729 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:OSS:2022/04/02/2 MISC:research.nccgroup.com:OSS:2022/09/02/9 OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/22/1 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/Q2/122 OSS:2022/Q3/141 Oracle:CVE-2022-21123 RHSA-2022:5157 RHSA-2022:5220 RHSA-2022:5224 RHSA-2022:5232 RHSA-2022:5236 RHSA-2022:5249 RHSA-2022:5267 RHSA-2022:5564 RHSA-2022:5565 RHSA-2022:5626 RHSA-2022:5633 RHSA-2022:5636 RHSA-2022:5806 RHSA-2022:6432 RHSA-2022:6741 SMASH Issue 331771 SMASH Issue 331903 ZDI-23-1834 bdo#1006346 bdo#1013299 bdo#922204 bnc#1199507 bnc#1199697 https://security.netapp.com/advisory/ntap-20230214-0006/ jsc#CAR-1801 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1832397 rh#2039448 rh#2056381 rh#2058395 rh#2058955 rh#2061633 rh#2062284 rh#2064604 rh#2066614 rh#2066706 rh#2066819 rh#2069736 rh#2070694 rh#2071047 rh#2073064 rh#2074208 rh#2074441 rh#2084435 rh#2084458 rh#2085300 rh#2086753 rh#2088021 rh#2089815 rh#2090237 rh#2090240 rh#2090241 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2104423 rh#2141026 |
CVE-2022-1733 | vim:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N) | CONFIRM:huntr.dev:CVE-2022-1733 CONFIRM:support.apple.com:CVE-2022-1725 CVE-2022-1733 FEDORA:FEDORA-2022-74b9e404c1 FEDORA:FEDORA-2022-d044e7e0b4 FEDORA:FEDORA-2022-d6d1ac4ca7 FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 GLSA-202208-32 MISC:github.com:CVE-2022-1733 SMASH Issue 332132 bnc#1199655 https://security.gentoo.org/glsa/202305-16 rh#2087600 |
CVE-2022-1734 | kernel-source-rt:Released | important | 7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-1734 CVE-2022-1734 D:CVE-2022-1016 D:CVE-2022-1734 D:CVE-2022-2153 D:CVE-2022-32296 DSA-5161 DSA-5173 DSA-5184 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:CVE-2022-1734 MISC:github.com:OSS:2022/04/02/2 MISC:research.nccgroup.com:OSS:2022/09/02/9 MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/05/4 OSS:2022/06/09/1 OSS:2022/06/22/1 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/Q2/173 OSS:2022/Q3/141 Oracle:CVE-2022-21123 SMASH Issue 331958 ZDI-23-1834 bdo#1006346 bdo#1013299 bdo#922204 bnc#1199605 bnc#1199606 jsc#CAR-1769 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1832397 rh#2039448 rh#2056381 rh#2058395 rh#2058955 rh#2061633 rh#2062284 rh#2064604 rh#2066614 rh#2066706 rh#2066819 rh#2069736 rh#2070694 rh#2071047 rh#2073064 rh#2074208 rh#2074441 rh#2084435 rh#2084458 rh#2085300 rh#2086753 rh#2086766 rh#2088021 rh#2089815 rh#2090237 rh#2090240 rh#2090241 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2104423 rh#2141026 |
CVE-2022-1735 | vim:Released | moderate | 5.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) | CONFIRM:huntr.dev:CVE-2022-1735 CONFIRM:support.apple.com:CVE-2022-1725 CVE-2022-1735 FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 GLSA-202208-32 L3:64069 MISC:github.com:CVE-2022-1735 SMASH Issue 332115 bnc#1199651 https://security.gentoo.org/glsa/202305-16 jsc#CAR-1775 rh#2088240 |
CVE-2022-1769 | vim:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N) | CONFIRM:huntr.dev:CVE-2022-1769 CONFIRM:support.apple.com:CVE-2022-1725 CVE-2022-1769 FEDORA:FEDORA-2022-74b9e404c1 FEDORA:FEDORA-2022-d044e7e0b4 FEDORA:FEDORA-2022-d6d1ac4ca7 FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 GLSA-202208-32 MISC:github.com:CVE-2022-1769 SMASH Issue 332131 bnc#1199658 https://security.gentoo.org/glsa/202305-16 rh#2087594 |
CVE-2022-1771 | vim:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:huntr.dev:CVE-2022-1771 CVE-2022-1771 GLSA-202208-32 L3:64287 MISC:github.com:CVE-2022-1771 SMASH Issue 332321 bnc#1199693 https://security.gentoo.org/glsa/202305-16 jsc#CAR-1787 rh#2088241 |
CVE-2022-1785 | vim:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:huntr.dev:CVE-2022-1785 CVE-2022-1785 D:CVE-2022-1785 GLSA-202208-32 MISC:github.com:CVE-2022-1785 MLIST:[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update RHSA-2022:5813 RHSA-2022:5942 SMASH Issue 332391 bnc#1199745 https://security.gentoo.org/glsa/202305-16 jsc#CAR-1798 rh#2088689 |
CVE-2022-1786 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-1786 CVE-2022-1786 DSA-5161 MISC:git.kernel.org:CVE-2022-32250 MISC:research.nccgroup.com:OSS:2022/09/02/9 MISC:www.debian.org:CVE-2022-32250 OSS:2022/05/31/1 OSS:2022/08/25/1 OSS:2022/09/02/9 OSS:2022/Q2/134 OSS:2022/Q3/141 SMASH Issue 332049 SMASH Issue 332282 ZDI-23-1834 bnc#1199599 bnc#1199700 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:eadb2f47a3ced5c64b23b90fd2a3463f63726066 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#2039448 rh#2058395 rh#2064604 rh#2074208 rh#2084183 rh#2086753 rh#2087760 rh#2089815 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2104423 |
CVE-2022-1789 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CERT-VN:VU#647177 CVE-2022-1789 D:CVE-2022-1789 DSA-5161 FEDORA:FEDORA-2022-3b86247c11 FEDORA:FEDORA-2022-be819b07a3 FEDORA:FEDORA-2022-ef8c8a5925 MISC:francozappa.github.io:CVE-2020-10135 MISC:git.kernel.org:CVE-2022-32250 MISC:research.nccgroup.com:OSS:2022/09/02/9 OSS:2022/05/31/1 OSS:2022/08/25/1 OSS:2022/09/02/9 OSS:2022/Q2/144 OSS:2022/Q3/141 RHSA-2023:2148 RHSA-2023:2458 RHSA-2023:2736 RHSA-2023:2951 SMASH Issue 332283 SMASH Issue 332284 ZDI-23-1834 bnc#1199674 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:eadb2f47a3ced5c64b23b90fd2a3463f63726066 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1832397 rh#2039448 rh#2058395 rh#2064604 rh#2074208 rh#2084183 rh#2084458 rh#2086753 rh#2089815 rh#2090723 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2104423 |
CVE-2022-1796 | vim:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:huntr.dev:CVE-2022-1796 CVE-2022-1796 GLSA-202208-32 L3:63627 L3:64014 MISC:github.com:CVE-2022-1796 SMASH Issue 332422 bnc#1199747 bnc#1201035 bnc#1202876 https://security.gentoo.org/glsa/202305-16 jsc#CAR-1799 rh#2088693 rh#2101293 rh#2102159 |
CVE-2022-1836 | kernel-source-rt:Released | moderate | 5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-1836 CVE-2022-33981 D:CVE-2022-1016 D:CVE-2022-2153 D:CVE-2022-32296 DSA-5161 DSA-5173 DSA-5184 L3:64743 MISC:cdn.kernel.org:CVE-2022-33981 MISC:exchange.xforce.ibmcloud.com:CVE-2022-33981 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:CVE-2022-33981 MISC:github.com:OSS:2022/04/02/2 MISC:research.nccgroup.com:OSS:2022/09/02/9 MISC:seclists.org:CVE-2022-33981 MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/22/1 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/Q3/141 Oracle:CVE-2022-21123 SMASH Issue 330078 SMASH Issue 332751 ZDI-23-1834 bdo#1006346 bdo#1013299 bdo#922204 bnc#1198866 bnc#1200692 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1832397 rh#2039448 rh#2056381 rh#2058395 rh#2058955 rh#2061633 rh#2062284 rh#2064604 rh#2066614 rh#2066706 rh#2066819 rh#2069736 rh#2070694 rh#2071047 rh#2073064 rh#2074208 rh#2074441 rh#2080330 rh#2084435 rh#2084458 rh#2085300 rh#2086753 rh#2088021 rh#2089815 rh#2090237 rh#2090240 rh#2090241 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2104423 rh#2141026 |
CVE-2022-1851 | vim:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:huntr.dev:CVE-2022-1851 CONFIRM:support.apple.com:CVE-2022-1725 CVE-2022-1851 D:CVE-2022-1851 FEDORA:FEDORA-2022-5ce148636b FEDORA:FEDORA-2022-bb2daad935 FEDORA:FEDORA-2022-d94440bf0e FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 GLSA-202208-32 MISC:github.com:CVE-2022-1851 MLIST:[debian-lts-announce] 20220620 [SECURITY] [DLA 3053-1] vim security update MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update SMASH Issue 332922 bnc#1199936 https://security.gentoo.org/glsa/202305-16 rh#2091676 |
CVE-2022-1852 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-1852 DSA-5161 OSS:2022/Q2/161 RHSA-2022:7444 RHSA-2022:7683 RHSA-2022:7933 RHSA-2022:8267 SMASH Issue 332791 SMASH Issue 332792 ZDI-23-1834 bnc#1199875 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#2039448 rh#2058395 rh#2064604 rh#2074208 rh#2086753 rh#2089815 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2104423 |
CVE-2022-1882 | kernel-source-rt:Not affected | important | 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-1882 CVE-2022-1882 MISC:lore.kernel.org:CVE-2022-1882 RHSA-2023:2148 RHSA-2023:2458 SMASH Issue 332911 bnc#1199904 bnc#1200058 rh#2089701 |
CVE-2022-1886 | vim:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:huntr.dev:CVE-2022-1886 CVE-2022-1886 FEDORA:FEDORA-2022-bb2daad935 GLSA-202208-32 MISC:github.com:CVE-2022-1886 SMASH Issue 332971 bnc#1199969 https://security.gentoo.org/glsa/202305-16 rh#2092973 |
CVE-2022-1897 | vim:Released | moderate | 5.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) | CONFIRM:huntr.dev:CVE-2022-1897 CONFIRM:support.apple.com:CVE-2022-1725 CVE-2022-1897 D:CVE-2022-1897 FEDORA:FEDORA-2022-5ce148636b FEDORA:FEDORA-2022-bb2daad935 FEDORA:FEDORA-2022-d94440bf0e FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 GLSA-202208-32 L3:64069 MISC:github.com:CVE-2022-1897 MLIST:[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update RHSA-2022:5813 RHSA-2022:5942 SMASH Issue 333152 bnc#1200010 bnc#1203113 https://security.gentoo.org/glsa/202305-16 jsc#CAR-1808 rh#2050053 rh#2091682 |
CVE-2022-1898 | vim:Released | moderate | 5.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) | CONFIRM:huntr.dev:CVE-2022-1898 CONFIRM:support.apple.com:CVE-2022-1725 CVE-2022-1898 D:CVE-2022-1898 FEDORA:FEDORA-2022-5ce148636b FEDORA:FEDORA-2022-bb2daad935 FEDORA:FEDORA-2022-d94440bf0e FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 GLSA-202208-32 L3:64069 MISC:github.com:CVE-2022-1898 MLIST:[debian-lts-announce] 20220620 [SECURITY] [DLA 3053-1] vim security update MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update SMASH Issue 333150 bnc#1200011 https://security.gentoo.org/glsa/202305-16 jsc#CAR-1809 rh#2091679 |
CVE-2022-1919 | mozilla-nss:Released | important | () | CVE-2022-1919 CVE-2022-31736 CVE-2022-31737 CVE-2022-31738 CVE-2022-31739 CVE-2022-31740 CVE-2022-31742 CVE-2022-31743 CVE-2022-31744 CVE-2022-31745 CVE-2022-31747 CVE-2022-31748 D:CVE-2022-1919 DSA-5156 DSA-5158 DSA-5172 DSA-5175 GLSA-202208-08 Google Chrome Releases Web site MISC:bugzilla.mozilla.org:/buglist.cgi MISC:bugzilla.mozilla.org:/show_bug.cgi MISC:crbug.com:CVE-2022-1919 MISC:www.mozilla.org:/security/advisories/mfsa2022-20/ MISC:www.mozilla.org:/security/advisories/mfsa2022-21/ MISC:www.mozilla.org:/security/advisories/mfsa2022-22/ MISC:www.mozilla.org:/security/advisories/mfsa2022-25/ MISC:www.mozilla.org:/security/advisories/mfsa2022-26/ RHSA-2022:4870 RHSA-2022:4871 RHSA-2022:4872 RHSA-2022:4873 RHSA-2022:4875 RHSA-2022:4876 RHSA-2022:4887 RHSA-2022:4888 RHSA-2022:4889 RHSA-2022:4890 RHSA-2022:4891 RHSA-2022:4892 RHSA-2022:5469 RHSA-2022:5470 RHSA-2022:5472 RHSA-2022:5473 RHSA-2022:5474 RHSA-2022:5475 RHSA-2022:5477 RHSA-2022:5478 RHSA-2022:5479 RHSA-2022:5480 RHSA-2022:5481 RHSA-2022:5482 SMASH Issue 333185 bnc#1200027 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKLJ3B3D5BCVWE3QNP4N7HHF26OHD567/ rh#2092018 rh#2092019 rh#2092021 rh#2092022 rh#2092023 rh#2092024 rh#2092025 rh#2092026 rh#2092416 rh#2102165 |
CVE-2022-1927 | vim:Released | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L) | CONFIRM:huntr.dev:CVE-2022-1927 CONFIRM:support.apple.com:CVE-2022-1725 CVE-2022-1927 D:CVE-2022-1927 FEDORA:FEDORA-2022-5ce148636b FEDORA:FEDORA-2022-bb2daad935 FEDORA:FEDORA-2022-d94440bf0e FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 GLSA-202208-32 MISC:github.com:CVE-2022-1927 RHSA-2022:5813 RHSA-2022:5942 SMASH Issue 333175 bnc#1200012 https://security.gentoo.org/glsa/202305-16 rh#2091687 |
CVE-2022-1941 | protobuf:Released | moderate | 6.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:cloud.google.com:CVE-2022-1941 CONFIRM:github.com:CVE-2022-1941 CVE-2022-1941 D:CVE-2022-1941 FEDORA:FEDORA-2022-25f35ed634 L3:64558 OSS:2022/09/27/1 OSS:2022/Q3/236 Oracle:CVE-2022-1941 SMASH Issue 343244 SMASH Issue 343744 bnc#1203681 bnc#1204630 bnc#1205141 https://lists.debian.org/debian-lts-announce/2023/04/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPCGUT3T5L6C3IDWUPSUO22QDCGQKTOP/ jsc#CAR-2051 rh#2291470 |
CVE-2022-1942 | vim:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L) | CONFIRM:huntr.dev:CVE-2022-1942 CONFIRM:support.apple.com:CVE-2022-1725 CVE-2022-1942 D:CVE-2022-1942 FEDORA:FEDORA-2022-bb2daad935 FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 GLSA-202208-32 MISC:github.com:CVE-2022-1942 MLIST:[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update SMASH Issue 333259 bnc#1200125 https://security.gentoo.org/glsa/202305-16 rh#2092890 |
CVE-2022-1943 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-1943 D:CVE-2022-1943 MISC:git.kernel.org:CVE-2022-1943 SMASH Issue 333203 bnc#1200055 rh#2086412 |
CVE-2022-1966 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-1966 CVE-2022-32250 DSA-5161 FEDORA:FEDORA-2022-80cc9873be FEDORA:FEDORA-2022-8269eaf361 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/04/1 MISC:research.nccgroup.com:OSS:2022/09/02/9 MISC:www.cve.org:OSS:2022/Q2/202 OSS:2022/05/31/1 OSS:2022/06/03/1 OSS:2022/06/04/1 OSS:2022/06/20/1 OSS:2022/08/25/1 OSS:2022/09/02/9 OSS:2022/Q2/165 OSS:2022/Q2/202 OSS:2022/Q3/141 RHSA-2022:5214 RHSA-2022:5216 RHSA-2022:5220 RHSA-2022:5224 RHSA-2022:5232 RHSA-2022:5236 RHSA-2022:5249 RHSA-2022:5267 RHSA-2022:5439 RHSA-2022:5476 SMASH Issue 333177 SMASH Issue 333285 ZDI-23-1834 bnc#1200015 bnc#1200268 bnc#1200494 jsc#CAR-1820 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:eadb2f47a3ced5c64b23b90fd2a3463f63726066 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#2039448 rh#2058395 rh#2064604 rh#2074208 rh#2084183 rh#2086753 rh#2089815 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2104423 |
CVE-2022-1968 | vim:Released | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L) | CONFIRM:huntr.dev:CVE-2022-1968 CONFIRM:support.apple.com:CVE-2022-1725 CVE-2022-1968 D:CVE-2022-1968 FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 GLSA-202208-32 MISC:github.com:CVE-2022-1968 MLIST:[debian-lts-announce] 20220620 [SECURITY] [DLA 3053-1] vim security update MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update SMASH Issue 333520 bnc#1200270 https://security.gentoo.org/glsa/202305-16 jsc#CAR-1826 rh#2094695 |
CVE-2022-1972 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-1972 CVE-2022-2078 DSA-5161 MISC:git.kernel.org:CVE-2022-2078 MISC:github.com:OSS:2022/Q2/164 MISC:www.debian.org:CVE-2022-32250 OSS:2022/Q2/164 RHSA-2022:6582 RHSA-2022:6610 RHSA-2022:7444 RHSA-2022:7683 SMASH Issue 333178 ZDI-23-1834 bnc#1200019 bnc#1200266 bnc#1200522 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#2039448 rh#2058395 rh#2064604 rh#2074208 rh#2086753 rh#2089815 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2104423 |
CVE-2022-1973 | kernel-source-rt:Not affected | important | () | CONFIRM:security.netapp.com:/advisory/ntap-20230120-0001/ CVE-2022-1973 OSS:2022/Q2/179 SMASH Issue 333184 SMASH Issue 333757 bnc#1200023 rh#2092542 |
CVE-2022-1974 | kernel-source-rt:Released | moderate | 6.8 (CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-1974 D:CVE-2022-1016 D:CVE-2022-2153 D:CVE-2022-32296 DSA-5161 DSA-5173 DSA-5184 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:CVE-2022-1974 MISC:github.com:OSS:2022/04/02/2 MISC:research.nccgroup.com:OSS:2022/09/02/9 OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/22/1 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/Q2/170 OSS:2022/Q3/141 Oracle:CVE-2022-21123 SMASH Issue 333306 ZDI-23-1834 bdo#1006346 bdo#1013299 bdo#922204 bnc#1200144 bnc#1200265 jsc#CAR-1821 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1832397 rh#2039448 rh#2056381 rh#2058395 rh#2058955 rh#2061633 rh#2062284 rh#2064604 rh#2066614 rh#2066706 rh#2066819 rh#2069736 rh#2070694 rh#2071047 rh#2073064 rh#2074208 rh#2074441 rh#2084435 rh#2084443 rh#2084458 rh#2085300 rh#2086753 rh#2088021 rh#2089815 rh#2090237 rh#2090240 rh#2090241 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2104423 rh#2141026 |
CVE-2022-1975 | kernel-source-rt:Released | moderate | 4.5 (CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-1975 D:CVE-2022-1016 D:CVE-2022-2153 D:CVE-2022-32296 DSA-5161 DSA-5173 DSA-5184 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:CVE-2022-1975 MISC:github.com:OSS:2022/04/02/2 MISC:research.nccgroup.com:OSS:2022/09/02/9 OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/22/1 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/Q2/171 OSS:2022/Q3/141 Oracle:CVE-2022-21123 SMASH Issue 333305 ZDI-23-1834 bdo#1006346 bdo#1013299 bdo#922204 bnc#1200143 jsc#CAR-1822 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1832397 rh#2039448 rh#2056381 rh#2058395 rh#2058955 rh#2061633 rh#2062284 rh#2064604 rh#2066614 rh#2066706 rh#2066819 rh#2069736 rh#2070694 rh#2071047 rh#2073064 rh#2074208 rh#2074441 rh#2084435 rh#2084458 rh#2085300 rh#2086753 rh#2088021 rh#2089815 rh#2090237 rh#2090240 rh#2090241 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2104423 rh#2141026 |
CVE-2022-1976 | kernel-source-rt:Not affected | important | () | CVE-2022-1976 MISC:git.kernel.org:CVE-2022-1976 OSS:2022/Q2/195 SMASH Issue 333232 bnc#1200050 https://security.netapp.com/advisory/ntap-20230214-0005/ rh#2092549 |
CVE-2022-1998 | kernel-source-rt:Not affected | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-1998 CVE-2022-1998 MISC:git.kernel.org:CVE-2022-1998 MISC:seclists.org:CVE-2022-1998 RHSA-2022:7933 RHSA-2022:8267 SMASH Issue 333691 bnc#1200284 rh#2052312 |
CVE-2022-2000 | vim:Not affected | important | () | CONFIRM:huntr.dev:CVE-2022-2000 CONFIRM:support.apple.com:CVE-2022-1720 CONFIRM:support.apple.com:CVE-2022-1725 CONFIRM:support.apple.com:CVE-2022-32894 CVE-2022-2000 FEDORA:FEDORA-2022-c302c5f62d FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6 FULLDISC:20221030 APPLE-SA-2022-10-27-9 Additional information for APPLE-SA-2022-09-12-3 macOS Big Sur 11.7 GLSA-202208-32 MISC:github.com:CVE-2022-2000 MLIST:[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update SMASH Issue 334139 bnc#1200405 https://security.gentoo.org/glsa/202305-16 rh#2097374 |
CVE-2022-20008 | kernel-source-rt:Released | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) | CVE-2022-20008 MISC:source.android.com:CVE-2022-20116 SMASH Issue 331304 bnc#1199564 jsc#CAR-1776 |
CVE-2022-20009 | kernel-source-rt:Already fixed | moderate | 6.8 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-20009 MISC:source.android.com:CVE-2022-20116 SMASH Issue 331303 bnc#1199566 |
CVE-2022-20117 | kernel-source-rt:Not affected | low | () | CVE-2022-20117 MISC:source.android.com:CVE-2022-20121 SMASH Issue 331281 bnc#1199569 |
CVE-2022-20118 | kernel-source-rt:Not affected | moderate | () | CVE-2022-20118 MISC:source.android.com:CVE-2022-20121 SMASH Issue 331280 bnc#1199570 |
CVE-2022-20119 | kernel-source-rt:Not affected | low | () | CVE-2022-20119 MISC:source.android.com:CVE-2022-20121 SMASH Issue 331279 bnc#1199563 |
CVE-2022-20132 | kernel-source-rt:Released | moderate | 4.9 (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L) | CVE-2022-20132 L3:66043 MISC:source.android.com:CVE-2022-20210 SMASH Issue 334795 bnc#1200619 jsc#CAR-1851 jsc#CAR-1852 rh#2173712 |
CVE-2022-20141 | kernel-source-rt:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-20141 L3:64060 MISC:source.android.com:CVE-2022-20210 RHSA-2023:2148 RHSA-2023:2458 RHSA-2023:2736 RHSA-2023:2951 SMASH Issue 334784 bnc#1200604 bnc#1200605 jsc#CAR-1850 rh#2114937 |
CVE-2022-20148 | kernel-source-rt:Not affected | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-20148 MISC:source.android.com:CVE-2022-20233 SMASH Issue 334777 bnc#1200610 rh#2122497 |
CVE-2022-20153 | kernel-source-rt:Not affected | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-20153 MISC:source.android.com:CVE-2022-20233 SMASH Issue 334773 bnc#1200609 rh#2150845 |
CVE-2022-20154 | kernel-source-rt:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-20154 L3:68095 L3:68137 MISC:source.android.com:CVE-2022-20233 SMASH Issue 334772 bnc#1200599 bnc#1200608 jsc#CAR-1849 rh#2150863 |
CVE-2022-20158 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-20158 D:CVE-2022-20158 MISC:source.android.com:CVE-2022-20408 SMASH Issue 339663 bnc#1202345 jsc#CAR-1962 |
CVE-2022-20166 | kernel-source-rt:Released | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H) | CVE-2022-20166 L3:66040 MISC:source.android.com:CVE-2022-20233 SMASH Issue 334765 bnc#1200598 jsc#CAR-1862 rh#2122089 |
CVE-2022-20368 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-20368 L3:66063 MISC:source.android.com:CVE-2022-20408 RHSA-2022:7444 RHSA-2022:7683 RHSA-2022:7933 RHSA-2022:8267 SMASH Issue 339645 bnc#1202346 jsc#CAR-1963 rh#2123695 |
CVE-2022-20369 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-20369 L3:66072 MISC:source.android.com:CVE-2022-20408 MLIST:[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update SMASH Issue 339644 bnc#1202347 jsc#CAR-1964 rh#2137505 |
CVE-2022-20371 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-20371 MISC:source.android.com:CVE-2022-20408 SMASH Issue 339642 bnc#1202348 |
CVE-2022-20382 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-20382 MISC:source.android.com:CVE-2022-20408 SMASH Issue 339631 bnc#1202349 |
CVE-2022-2042 | vim:Not affected | important | () | CONFIRM:huntr.dev:CVE-2022-2042 CONFIRM:support.apple.com:CVE-2022-1720 CONFIRM:support.apple.com:CVE-2022-1725 CONFIRM:support.apple.com:CVE-2022-32894 CVE-2022-2042 FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6 FULLDISC:20221030 APPLE-SA-2022-10-27-9 Additional information for APPLE-SA-2022-09-12-3 macOS Big Sur 11.7 GLSA-202208-32 MISC:github.com:CVE-2022-2042 SMASH Issue 334212 bnc#1200471 https://security.gentoo.org/glsa/202305-16 rh#2097768 |
CVE-2022-20567 | kernel-source-rt:Already fixed | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-20567 MISC:source.android.com:/security/bulletin/pixel/2022-12-01 SMASH Issue 351105 bnc#1208850 rh#2174464 |
CVE-2022-20572 | kernel-source-rt:Already fixed | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-20572 MISC:source.android.com:/security/bulletin/pixel/2022-12-01 RHSA-2022:7444 RHSA-2022:7683 RHSA-2022:7933 RHSA-2022:8267 SMASH Issue 351100 bnc#1210532 rh#2186545 |
CVE-2022-2068 | openssl:Not affected, openssl-1_1:Released | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:git.openssl.org:CVE-2022-2068 CONFIRM:security.netapp.com:CVE-2022-2068 CONFIRM:www.openssl.org:CVE-2022-2068 CVE-2022-2068 DSA-5169 FEDORA:FEDORA-2022-3b7d0abd0b FEDORA:FEDORA-2022-41890e9e44 L3:65090 L3:68186 MISC:cert-portal.siemens.com:/productcert/pdf/ssa-332410.pdf Oracle:CVE-2022-1292 Oracle:CVE-2022-2068 RHSA-2022:5818 RHSA-2022:6224 RHSA-2022:8840 RHSA-2022:8841 RHSA-2022:8913 RHSA-2022:8917 SMASH Issue 334634 SMASH Issue 334635 bnc#1200550 bnc#1201283 bnc#1207568 jsc#CAR-1865 openssl.git:commit:7c33270707b568c524a8ef125fe611a8872cb5e8 openssl.git:commit:ce60b13707add7e6b54c5817376234c4043506ed rh#2081494 rh#2097310 |
CVE-2022-2078 | kernel-source-rt:Not affected | moderate | () | CVE-2022-1972 CVE-2022-2078 DSA-5161 MISC:git.kernel.org:CVE-2022-2078 MISC:github.com:OSS:2022/Q2/164 MISC:www.debian.org:CVE-2022-32250 OSS:2022/Q2/164 RHSA-2022:6582 RHSA-2022:6610 RHSA-2022:7444 RHSA-2022:7683 SMASH Issue 333178 SMASH Issue 334420 ZDI-23-1834 bnc#1200019 bnc#1200266 bnc#1200522 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#2039448 rh#2058395 rh#2064604 rh#2074208 rh#2086753 rh#2089815 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2104423 |
CVE-2022-2097 | openssl:Not affected, openssl-1_1:Released | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) | CONFIRM:git.openssl.org:CVE-2022-2097 CONFIRM:security.netapp.com:CVE-2022-2097 CONFIRM:www.openssl.org:CVE-2022-2097 CVE-2022-2097 D:CVE-2022-2097 DSA-5343 FEDORA:FEDORA-2022-3fdc2d3047 FEDORA:FEDORA-2022-41890e9e44 FEDORA:FEDORA-2022-89a17be281 GLSA-202210-02 MISC:cert-portal.siemens.com:/productcert/pdf/ssa-332410.pdf Oracle:CVE-2022-2097 RHSA-2022:5818 RHSA-2022:6224 SMASH Issue 336071 SMASH Issue 336072 bdo#1023424 bnc#1201099 bnc#1201100 https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=919925673d6c9cfed3c1085497f5dfbbed5fc431 https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a98f339ddd7e8f487d6e0088d4a9a42324885a93 https://lists.debian.org/debian-lts-announce/2023/02/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R6CK57NBQFTPUMXAPJURCGXUYT76NQAK/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V6567JERRHHJW2GNGJGKDRNHR7SNPZK7/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCMNWKERPBKOEBNL7CLTTX3ZZCZLH7XA/ https://security.netapp.com/advisory/ntap-20230420-0008/ https://security.netapp.com/advisory/ntap-20240621-0006/ https://www.debian.org/security/2023/dsa-5343 jsc#CAR-1900 openssl.git:commit:6ebf6d51596f51d23ccbc17930778d104a57d99c rh#2104905 |
CVE-2022-21123 | kernel-source-rt:Released | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N) | CONFIRM:security.netapp.com:CVE-2022-21166 CONFIRM:security.netapp.com:CVE-2022-21180 CONFIRM:xenbits.xen.org:CVE-2022-21124 CVE-2022-21123 CVE-2022-21125 CVE-2022-21127 CVE-2022-21166 CVE-2022-21180 D:CVE-2022-1016 D:CVE-2022-21125 D:CVE-2022-21127 D:CVE-2022-21180 D:CVE-2022-2153 D:CVE-2022-26373 D:CVE-2022-32296 D:CVE-2022-36879 D:CVE-2022-36946 DSA-5161 DSA-5173 DSA-5178 DSA-5184 DSA-5207 FEDORA:FEDORA-2022-177a008b98 FEDORA:FEDORA-2022-2c9f8224f8 FEDORA:FEDORA-2022-391e24517d FEDORA:FEDORA-2022-925fc688c1 GLSA-202208-23 L3:65395 L3:65396 L3:65397 L3:66064 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:OSS:2022/04/02/2 MISC:research.nccgroup.com:OSS:2022/09/02/9 MISC:www.intel.com:CVE-2022-21166 MISC:www.intel.com:CVE-2022-21180 MISC:www.intel.com:OSS:2022/06/14/4 MISC:xenbits.xen.org:OSS:2019/Q4/67 MISC:xenbits.xen.org:OSS:2020/Q2/176 MISC:xenbits.xen.org:OSS:2022/Q2/197 MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/14/4 OSS:2022/06/16/1 OSS:2022/06/22/1 OSS:2022/08/09/5 OSS:2022/08/09/6 OSS:2022/08/09/7 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/11/08/1 OSS:2022/11/10/2 OSS:2022/Q2/197 OSS:2022/Q2/200 OSS:2022/Q3/114 OSS:2022/Q3/115 OSS:2022/Q3/116 OSS:2022/Q3/141 Oracle:CVE-2022-21123 RHSA-2022:5937 RHSA-2022:5939 RHSA-2022:6437 RHSA-2022:6460 RHSA-2022:6872 RHSA-2022:6983 RHSA-2022:6991 RHSA-2022:7279 RHSA-2022:7280 RHSA-2022:7933 RHSA-2022:8267 RHSA-2022:8973 RHSA-2022:8974 SMASH Issue 332241 ZDI-22-1117 ZDI-22-1118 ZDI-23-1834 bdo#1006346 bdo#1010947 bdo#1013299 bdo#922204 bnc#1199650 jsc#CAR-1838 linux.git:commit:470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:9ad36309e2719a884f946678e0296be10f0bb4c1 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1832397 rh#2039448 rh#2056381 rh#2058395 rh#2058955 rh#2061633 rh#2062284 rh#2064604 rh#2066614 rh#2066706 rh#2066819 rh#2069736 rh#2070694 rh#2071047 rh#2073064 rh#2074208 rh#2074441 rh#2084435 rh#2084458 rh#2085300 rh#2086730 rh#2086753 rh#2088021 rh#2089815 rh#2090226 rh#2090237 rh#2090240 rh#2090241 rh#2090243 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2103148 rh#2103153 rh#2104423 rh#2114849 rh#2114874 rh#2114878 rh#2115065 rh#2115278 rh#2119855 rh#2141026 |
CVE-2022-21125 | kernel-source-rt:Released | moderate | 5.6 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N) | CONFIRM:security.netapp.com:CVE-2022-21166 CONFIRM:security.netapp.com:CVE-2022-21180 CONFIRM:xenbits.xen.org:CVE-2022-21124 CVE-2022-21123 CVE-2022-21125 CVE-2022-21127 CVE-2022-21166 CVE-2022-21180 D:CVE-2022-1016 D:CVE-2022-21125 D:CVE-2022-21127 D:CVE-2022-21180 D:CVE-2022-2153 D:CVE-2022-26373 D:CVE-2022-32296 D:CVE-2022-36879 D:CVE-2022-36946 DSA-5161 DSA-5173 DSA-5178 DSA-5184 DSA-5207 FEDORA:FEDORA-2022-177a008b98 FEDORA:FEDORA-2022-2c9f8224f8 FEDORA:FEDORA-2022-391e24517d FEDORA:FEDORA-2022-925fc688c1 GLSA-202208-23 L3:65395 L3:65396 L3:65397 L3:66064 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:OSS:2022/04/02/2 MISC:research.nccgroup.com:OSS:2022/09/02/9 MISC:www.intel.com:CVE-2022-21166 MISC:www.intel.com:CVE-2022-21180 MISC:www.intel.com:OSS:2022/06/14/4 MISC:xenbits.xen.org:OSS:2019/Q4/67 MISC:xenbits.xen.org:OSS:2020/Q2/176 MISC:xenbits.xen.org:OSS:2022/Q2/197 MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/14/4 OSS:2022/06/16/1 OSS:2022/06/22/1 OSS:2022/08/09/5 OSS:2022/08/09/6 OSS:2022/08/09/7 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/11/08/1 OSS:2022/11/10/2 OSS:2022/Q2/197 OSS:2022/Q2/200 OSS:2022/Q3/114 OSS:2022/Q3/115 OSS:2022/Q3/116 OSS:2022/Q3/141 Oracle:CVE-2022-21123 RHSA-2022:5937 RHSA-2022:5939 RHSA-2022:6437 RHSA-2022:6460 RHSA-2022:6872 RHSA-2022:6983 RHSA-2022:6991 RHSA-2022:7279 RHSA-2022:7280 RHSA-2022:7933 RHSA-2022:8267 RHSA-2022:8973 RHSA-2022:8974 SMASH Issue 332241 ZDI-22-1117 ZDI-22-1118 ZDI-23-1834 bdo#1006346 bdo#1010947 bdo#1013299 bdo#922204 bnc#1199650 jsc#CAR-1838 linux.git:commit:470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:9ad36309e2719a884f946678e0296be10f0bb4c1 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1832397 rh#2039448 rh#2056381 rh#2058395 rh#2058955 rh#2061633 rh#2062284 rh#2064604 rh#2066614 rh#2066706 rh#2066819 rh#2069736 rh#2070694 rh#2071047 rh#2073064 rh#2074208 rh#2074441 rh#2084435 rh#2084458 rh#2085300 rh#2086730 rh#2086753 rh#2088021 rh#2089815 rh#2090226 rh#2090237 rh#2090240 rh#2090241 rh#2090243 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2103148 rh#2103153 rh#2104423 rh#2114849 rh#2114874 rh#2114878 rh#2115065 rh#2115278 rh#2119855 rh#2141026 |
CVE-2022-21127 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CONFIRM:security.netapp.com:CVE-2022-21166 CONFIRM:security.netapp.com:CVE-2022-21180 CONFIRM:xenbits.xen.org:CVE-2022-21124 CVE-2022-21123 CVE-2022-21125 CVE-2022-21127 CVE-2022-21166 CVE-2022-21180 D:CVE-2022-1016 D:CVE-2022-21125 D:CVE-2022-21127 D:CVE-2022-21180 D:CVE-2022-2153 D:CVE-2022-26373 D:CVE-2022-32296 D:CVE-2022-36879 D:CVE-2022-36946 DSA-5161 DSA-5173 DSA-5178 DSA-5184 DSA-5207 FEDORA:FEDORA-2022-177a008b98 FEDORA:FEDORA-2022-2c9f8224f8 FEDORA:FEDORA-2022-391e24517d FEDORA:FEDORA-2022-925fc688c1 GLSA-202208-23 L3:65395 L3:65396 L3:65397 L3:66064 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:OSS:2022/04/02/2 MISC:research.nccgroup.com:OSS:2022/09/02/9 MISC:www.intel.com:CVE-2022-21166 MISC:www.intel.com:CVE-2022-21180 MISC:www.intel.com:OSS:2022/06/14/4 MISC:xenbits.xen.org:OSS:2019/Q4/67 MISC:xenbits.xen.org:OSS:2020/Q2/176 MISC:xenbits.xen.org:OSS:2022/Q2/197 MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/14/4 OSS:2022/06/16/1 OSS:2022/06/22/1 OSS:2022/08/09/5 OSS:2022/08/09/6 OSS:2022/08/09/7 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/11/08/1 OSS:2022/11/10/2 OSS:2022/Q2/197 OSS:2022/Q2/200 OSS:2022/Q3/114 OSS:2022/Q3/115 OSS:2022/Q3/116 OSS:2022/Q3/141 Oracle:CVE-2022-21123 RHSA-2022:5937 RHSA-2022:5939 RHSA-2022:6437 RHSA-2022:6460 RHSA-2022:6872 RHSA-2022:6983 RHSA-2022:6991 RHSA-2022:7279 RHSA-2022:7280 RHSA-2022:7933 RHSA-2022:8267 RHSA-2022:8973 RHSA-2022:8974 SMASH Issue 332241 ZDI-22-1117 ZDI-22-1118 ZDI-23-1834 bdo#1006346 bdo#1010947 bdo#1013299 bdo#922204 bnc#1199650 jsc#CAR-1838 linux.git:commit:470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:9ad36309e2719a884f946678e0296be10f0bb4c1 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1832397 rh#2039448 rh#2056381 rh#2058395 rh#2058955 rh#2061633 rh#2062284 rh#2064604 rh#2066614 rh#2066706 rh#2066819 rh#2069736 rh#2070694 rh#2071047 rh#2073064 rh#2074208 rh#2074441 rh#2084435 rh#2084458 rh#2085300 rh#2086730 rh#2086753 rh#2088021 rh#2089815 rh#2090226 rh#2090237 rh#2090240 rh#2090241 rh#2090243 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2103148 rh#2103153 rh#2104423 rh#2114849 rh#2114874 rh#2114878 rh#2115065 rh#2115278 rh#2119855 rh#2141026 |
CVE-2022-21166 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CONFIRM:security.netapp.com:CVE-2022-21166 CONFIRM:security.netapp.com:CVE-2022-21180 CONFIRM:xenbits.xen.org:CVE-2022-21124 CVE-2022-21123 CVE-2022-21125 CVE-2022-21127 CVE-2022-21166 CVE-2022-21180 D:CVE-2022-1016 D:CVE-2022-21125 D:CVE-2022-21127 D:CVE-2022-21180 D:CVE-2022-2153 D:CVE-2022-26373 D:CVE-2022-32296 D:CVE-2022-36879 D:CVE-2022-36946 DSA-5161 DSA-5173 DSA-5178 DSA-5184 DSA-5207 FEDORA:FEDORA-2022-177a008b98 FEDORA:FEDORA-2022-2c9f8224f8 FEDORA:FEDORA-2022-391e24517d FEDORA:FEDORA-2022-925fc688c1 GLSA-202208-23 L3:65395 L3:65396 L3:65397 L3:66064 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:OSS:2022/04/02/2 MISC:research.nccgroup.com:OSS:2022/09/02/9 MISC:www.intel.com:CVE-2022-21166 MISC:www.intel.com:CVE-2022-21180 MISC:www.intel.com:OSS:2022/06/14/4 MISC:xenbits.xen.org:OSS:2019/Q4/67 MISC:xenbits.xen.org:OSS:2020/Q2/176 MISC:xenbits.xen.org:OSS:2022/Q2/197 MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/14/4 OSS:2022/06/16/1 OSS:2022/06/22/1 OSS:2022/08/09/5 OSS:2022/08/09/6 OSS:2022/08/09/7 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/11/08/1 OSS:2022/11/10/2 OSS:2022/Q2/197 OSS:2022/Q2/200 OSS:2022/Q3/114 OSS:2022/Q3/115 OSS:2022/Q3/116 OSS:2022/Q3/141 Oracle:CVE-2022-21123 RHSA-2022:5937 RHSA-2022:5939 RHSA-2022:6437 RHSA-2022:6460 RHSA-2022:6872 RHSA-2022:6983 RHSA-2022:6991 RHSA-2022:7279 RHSA-2022:7280 RHSA-2022:7933 RHSA-2022:8267 RHSA-2022:8973 RHSA-2022:8974 SMASH Issue 332241 ZDI-22-1117 ZDI-22-1118 ZDI-23-1834 bdo#1006346 bdo#1010947 bdo#1013299 bdo#922204 bnc#1199650 jsc#CAR-1838 linux.git:commit:470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:9ad36309e2719a884f946678e0296be10f0bb4c1 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1832397 rh#2039448 rh#2056381 rh#2058395 rh#2058955 rh#2061633 rh#2062284 rh#2064604 rh#2066614 rh#2066706 rh#2066819 rh#2069736 rh#2070694 rh#2071047 rh#2073064 rh#2074208 rh#2074441 rh#2084435 rh#2084458 rh#2085300 rh#2086730 rh#2086753 rh#2088021 rh#2089815 rh#2090226 rh#2090237 rh#2090240 rh#2090241 rh#2090243 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2103148 rh#2103153 rh#2104423 rh#2114849 rh#2114874 rh#2114878 rh#2115065 rh#2115278 rh#2119855 rh#2141026 |
CVE-2022-21180 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CONFIRM:security.netapp.com:CVE-2022-21166 CONFIRM:security.netapp.com:CVE-2022-21180 CONFIRM:xenbits.xen.org:CVE-2022-21124 CVE-2022-21123 CVE-2022-21125 CVE-2022-21127 CVE-2022-21166 CVE-2022-21180 D:CVE-2022-1016 D:CVE-2022-21125 D:CVE-2022-21127 D:CVE-2022-21180 D:CVE-2022-2153 D:CVE-2022-26373 D:CVE-2022-32296 D:CVE-2022-36879 D:CVE-2022-36946 DSA-5161 DSA-5173 DSA-5178 DSA-5184 DSA-5207 FEDORA:FEDORA-2022-177a008b98 FEDORA:FEDORA-2022-2c9f8224f8 FEDORA:FEDORA-2022-391e24517d FEDORA:FEDORA-2022-925fc688c1 GLSA-202208-23 L3:65395 L3:65396 L3:65397 L3:66064 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:OSS:2022/04/02/2 MISC:research.nccgroup.com:OSS:2022/09/02/9 MISC:www.intel.com:CVE-2022-21166 MISC:www.intel.com:CVE-2022-21180 MISC:www.intel.com:OSS:2022/06/14/4 MISC:xenbits.xen.org:OSS:2019/Q4/67 MISC:xenbits.xen.org:OSS:2020/Q2/176 MISC:xenbits.xen.org:OSS:2022/Q2/197 MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/14/4 OSS:2022/06/16/1 OSS:2022/06/22/1 OSS:2022/08/09/5 OSS:2022/08/09/6 OSS:2022/08/09/7 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/11/08/1 OSS:2022/11/10/2 OSS:2022/Q2/197 OSS:2022/Q2/200 OSS:2022/Q3/114 OSS:2022/Q3/115 OSS:2022/Q3/116 OSS:2022/Q3/141 Oracle:CVE-2022-21123 RHSA-2022:5937 RHSA-2022:5939 RHSA-2022:6437 RHSA-2022:6460 RHSA-2022:6872 RHSA-2022:6983 RHSA-2022:6991 RHSA-2022:7279 RHSA-2022:7280 RHSA-2022:7933 RHSA-2022:8267 RHSA-2022:8973 RHSA-2022:8974 SMASH Issue 332241 ZDI-22-1117 ZDI-22-1118 ZDI-23-1834 bdo#1006346 bdo#1010947 bdo#1013299 bdo#922204 bnc#1199650 jsc#CAR-1838 linux.git:commit:470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:9ad36309e2719a884f946678e0296be10f0bb4c1 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1832397 rh#2039448 rh#2056381 rh#2058395 rh#2058955 rh#2061633 rh#2062284 rh#2064604 rh#2066614 rh#2066706 rh#2066819 rh#2069736 rh#2070694 rh#2071047 rh#2073064 rh#2074208 rh#2074441 rh#2084435 rh#2084458 rh#2085300 rh#2086730 rh#2086753 rh#2088021 rh#2089815 rh#2090226 rh#2090237 rh#2090240 rh#2090241 rh#2090243 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2103148 rh#2103153 rh#2104423 rh#2114849 rh#2114874 rh#2114878 rh#2115065 rh#2115278 rh#2119855 rh#2141026 |
CVE-2022-2124 | vim:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:huntr.dev:CVE-2022-2124 CONFIRM:support.apple.com:CVE-2022-1720 CONFIRM:support.apple.com:CVE-2022-1725 CONFIRM:support.apple.com:CVE-2022-32894 CVE-2022-2124 D:CVE-2022-2124 FEDORA:FEDORA-2022-719f3ec21b FEDORA:FEDORA-2022-bb7f3cacbf FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6 FULLDISC:20221030 APPLE-SA-2022-10-27-9 Additional information for APPLE-SA-2022-09-12-3 macOS Big Sur 11.7 GLSA-202208-32 MISC:github.com:CVE-2022-2124 MLIST:[debian-lts-announce] 20220620 [SECURITY] [DLA 3053-1] vim security update SMASH Issue 335122 bnc#1200697 https://security.gentoo.org/glsa/202305-16 rh#2099558 |
CVE-2022-2125 | vim:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:huntr.dev:CVE-2022-2125 CONFIRM:support.apple.com:CVE-2022-1720 CONFIRM:support.apple.com:CVE-2022-1725 CONFIRM:support.apple.com:CVE-2022-32894 CVE-2022-2125 FEDORA:FEDORA-2022-719f3ec21b FEDORA:FEDORA-2022-bb7f3cacbf FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6 FULLDISC:20221030 APPLE-SA-2022-10-27-9 Additional information for APPLE-SA-2022-09-12-3 macOS Big Sur 11.7 GLSA-202208-32 L3:64619 MISC:github.com:CVE-2022-2125 SMASH Issue 335120 bnc#1200698 https://security.gentoo.org/glsa/202305-16 jsc#CAR-1860 rh#2099590 |
CVE-2022-2126 | vim:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:huntr.dev:CVE-2022-2126 CONFIRM:support.apple.com:CVE-2022-1720 CONFIRM:support.apple.com:CVE-2022-1725 CONFIRM:support.apple.com:CVE-2022-32894 CVE-2022-2126 FEDORA:FEDORA-2022-719f3ec21b FEDORA:FEDORA-2022-bb7f3cacbf FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6 FULLDISC:20221030 APPLE-SA-2022-10-27-9 Additional information for APPLE-SA-2022-09-12-3 macOS Big Sur 11.7 GLSA-202208-32 MISC:github.com:CVE-2022-2126 MLIST:[debian-lts-announce] 20220620 [SECURITY] [DLA 3053-1] vim security update SMASH Issue 335119 bnc#1200700 https://security.gentoo.org/glsa/202305-16 rh#2099596 |
CVE-2022-2129 | vim:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:huntr.dev:CVE-2022-2129 CVE-2022-2129 FEDORA:FEDORA-2022-719f3ec21b FEDORA:FEDORA-2022-bb7f3cacbf GLSA-202208-32 MISC:github.com:CVE-2022-2129 MLIST:[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update SMASH Issue 335123 bnc#1200701 https://security.gentoo.org/glsa/202305-16 rh#2099586 |
CVE-2022-21385 | kernel-source-rt:Already fixed | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-21385 L3:66041 MISC:git.kernel.org:CVE-2022-21385 MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835 MISC:github.com:MISC:www.openwall.com:CVE-2019-14835 MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895 OSS:2019/09/17/1 OSS:2019/11/02/1 OSS:2019/11/22/2 OSS:2019/12/16/1 Oracle:CVE-2018-12207 Oracle:CVE-2019-14821 SMASH Issue 341103 bnc#1154848 bnc#1202897 linux.git:commit:f68f2ff91512c199ec24883001245912afc17873 rh#1646768 rh#1773519 rh#1774988 rh#1774996 rh#1775004 rh#1781514 rh#1783498 rh#1783515 rh#1851480 rh#1997467 |
CVE-2022-21499 | kernel-source-rt:Released | important | 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-21499 DSA-5161 L3:64060 L3:64302 L3:64306 L3:64525 L3:64549 L3:66066 MISC:git.kernel.org:CVE-2022-21499 MISC:git.kernel.org:CVE-2022-32250 MISC:packetstormsecurity.com:CVE-2022-34918 MISC:research.nccgroup.com:OSS:2022/09/02/9 MISC:www.debian.org:CVE-2022-32250 OSS:2022/05/31/1 OSS:2022/08/25/1 OSS:2022/09/02/9 OSS:2022/Q2/137 OSS:2022/Q3/141 RHSA-2022:7444 RHSA-2022:7683 RHSA-2022:7933 RHSA-2022:8267 SMASH Issue 331342 ZDI-23-1834 bnc#1199426 bnc#1200059 jsc#CAR-1805 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:eadb2f47a3ced5c64b23b90fd2a3463f63726066 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#2039448 rh#2058395 rh#2064604 rh#2074208 rh#2084183 rh#2086753 rh#2089815 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2104423 |
CVE-2022-21505 | kernel-source-rt:Released | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-21505 OSS:2022/Q3/57 RHSA-2023:2148 RHSA-2023:2458 SMASH Issue 337173 SMASH Issue 337174 bnc#1201458 jsc#CAR-1915 linux.git:commit:543ce63b664e2c2f9533d089a4664b559c3e6b5b rh#2106830 |
CVE-2022-2153 | kernel-source-rt:Released | moderate | 6.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H) | CVE-2022-2153 D:CVE-2022-1016 D:CVE-2022-2153 D:CVE-2022-32296 DSA-5161 DSA-5173 DSA-5184 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:CVE-2022-2153 MISC:github.com:OSS:2022/04/02/2 MISC:research.nccgroup.com:OSS:2022/09/02/9 MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/22/1 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/Q2/205 OSS:2022/Q3/141 Oracle:CVE-2022-21123 RHSA-2022:7444 RHSA-2022:7683 RHSA-2022:7933 RHSA-2022:8267 SMASH Issue 335226 ZDI-23-1834 bdo#1006346 bdo#1013299 bdo#922204 bnc#1200788 jsc#CAR-1864 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1832397 rh#2039448 rh#2056381 rh#2058395 rh#2058955 rh#2061633 rh#2062284 rh#2064604 rh#2066614 rh#2066706 rh#2066819 rh#2069736 rh#2070694 rh#2071047 rh#2073064 rh#2074208 rh#2074441 rh#2084435 rh#2084458 rh#2085300 rh#2086753 rh#2088021 rh#2089815 rh#2090237 rh#2090240 rh#2090241 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2104423 rh#2141026 |
CVE-2022-2175 | vim:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:huntr.dev:CVE-2022-2175 CVE-2022-2175 D:CVE-2022-2175 FEDORA:FEDORA-2022-719f3ec21b FEDORA:FEDORA-2022-bb7f3cacbf GLSA-202208-32 L3:64808 MISC:github.com:CVE-2022-2175 SMASH Issue 335384 bnc#1200904 bnc#1201039 https://security.gentoo.org/glsa/202305-16 jsc#CAR-1870 rh#2101293 |
CVE-2022-2182 | vim:Released | moderate | 3.9 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L) | CONFIRM:huntr.dev:CVE-2022-2182 CVE-2022-2182 FEDORA:FEDORA-2022-719f3ec21b FEDORA:FEDORA-2022-bb7f3cacbf GLSA-202208-32 MISC:github.com:CVE-2022-2182 SMASH Issue 335348 bnc#1200903 https://security.gentoo.org/glsa/202305-16 jsc#CAR-1871 rh#2102153 |
CVE-2022-2183 | vim:Released | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L) | CONFIRM:huntr.dev:CVE-2022-2183 CVE-2022-2183 FEDORA:FEDORA-2022-719f3ec21b FEDORA:FEDORA-2022-bb7f3cacbf GLSA-202208-32 MISC:github.com:CVE-2022-2183 SMASH Issue 335347 bnc#1200902 https://security.gentoo.org/glsa/202305-16 jsc#CAR-1869 rh#2102159 |
CVE-2022-2196 | kernel-source-rt:Already fixed | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) | CVE-2022-2196 MISC:git.kernel.org:/pub/scm/linux/kernel/git/torvalds/linux.git/commit/ MISC:kernel.dance:/ RHSA-2023:2148 RHSA-2023:2458 RHSA-2023:2736 RHSA-2023:2951 SMASH Issue 353105 bnc#1206992 https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html jsc#CAR-2282 linux.git:commit:2e7eab81425ad6c875f2ed47c0ce01e78afc38a5 rh#2160023 |
CVE-2022-22058 | kernel-source-rt:Not affected | important | () | CONFIRM:www.qualcomm.com:CVE-2022-25659 CVE-2022-22058 SMASH Issue 343645 bnc#1203777 |
CVE-2022-2206 | vim:Released | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L) | CONFIRM:huntr.dev:CVE-2022-2206 CVE-2022-2206 D:CVE-2022-2206 FEDORA:FEDORA-2022-719f3ec21b FEDORA:FEDORA-2022-bb7f3cacbf GLSA-202208-32 MISC:github.com:CVE-2022-2206 SMASH Issue 335614 bnc#1201155 https://security.gentoo.org/glsa/202305-16 jsc#CAR-1880 rh#2102188 |
CVE-2022-2207 | vim:Released | moderate | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:huntr.dev:CVE-2022-2207 CVE-2022-2207 FEDORA:FEDORA-2022-719f3ec21b FEDORA:FEDORA-2022-bb7f3cacbf GLSA-202208-32 MISC:github.com:CVE-2022-2207 SMASH Issue 335687 bnc#1201153 https://security.gentoo.org/glsa/202305-16 rh#2102185 |
CVE-2022-22075 | kernel-source-rt:Not affected | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) | CVE-2022-22075 D:CVE-2022-22075 SMASH Issue 359729 bnc#1209195 https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin |
CVE-2022-2208 | vim:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:huntr.dev:CVE-2022-2208 CVE-2022-2208 FEDORA:FEDORA-2022-719f3ec21b FEDORA:FEDORA-2022-bb7f3cacbf GLSA-202208-32 MISC:github.com:CVE-2022-2208 SMASH Issue 335683 bnc#1201152 https://security.gentoo.org/glsa/202305-16 rh#2102183 |
CVE-2022-2209 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H) | CVE-2022-2209 MISC:github.com:CVE-2022-2209 MISC:kernel.dance:CVE-2022-2209 SMASH Issue 338098 bnc#1201828 |
CVE-2022-2210 | vim:Released | moderate | 5.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) | CONFIRM:huntr.dev:CVE-2022-2210 CVE-2022-2210 FEDORA:FEDORA-2022-719f3ec21b FEDORA:FEDORA-2022-bb7f3cacbf GLSA-202208-32 MISC:github.com:CVE-2022-2210 SMASH Issue 335714 bnc#1201151 https://security.gentoo.org/glsa/202305-16 rh#2102177 |
CVE-2022-2231 | vim:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:huntr.dev:CVE-2022-2231 CVE-2022-2231 FEDORA:FEDORA-2022-719f3ec21b FEDORA:FEDORA-2022-bb7f3cacbf GLSA-202208-32 MISC:github.com:CVE-2022-2231 SMASH Issue 335823 bnc#1201150 https://security.gentoo.org/glsa/202305-16 rh#2102173 |
CVE-2022-2257 | vim:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:huntr.dev:CVE-2022-2257 CVE-2022-2257 FEDORA:FEDORA-2022-9d7a58e376 FEDORA:FEDORA-2022-b06fbea2c7 GLSA-202208-32 MISC:github.com:CVE-2022-2257 SMASH Issue 336035 bnc#1201154 https://security.gentoo.org/glsa/202305-16 jsc#CAR-1879 rh#2103133 |
CVE-2022-22576 | curl:Released | moderate | 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) | CONFIRM:security.netapp.com:CVE-2022-27776 CVE-2022-22576 CVE-2023-23916 CVE-2023-27538 D:CVE-2022-27774 DSA-5197 GLSA-202212-01 MISC:curl.se:OSS:2022/Q2/210 MISC:curl.se:OSS:2022/Q2/61 MISC:curl.se:OSS:2022/Q2/96 MISC:github.com:OSS:2023/02/15/3 MISC:github.com:OSS:2023/03/20/6 MISC:hackerone.com:CVE-2022-22576 MLIST:[debian-lts-announce] 20220828 [SECURITY] [DLA 3085-1] curl security update OSS:2022/Q2/61 OSS:2023/02/15/3 OSS:2023/03/20/6 Oracle:CVE-2022-27782 Oracle:CVE-2022-32206 Oracle:CVE-2022-32207 RHSA-2022:5245 RHSA-2022:5313 SMASH Issue 329491 bdo#1010252 bdo#1010253 bdo#1010254 bdo#1010295 bdo#989228 bdo#991492 bnc#1198614 jsc#CAR-1717 rh#2077541 rh#2077547 rh#2078388 rh#2078408 rh#2082204 rh#2082215 rh#2099300 rh#2099305 rh#2099306 |
CVE-2022-2264 | vim:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:huntr.dev:CVE-2022-2264 CVE-2022-2264 D:CVE-2022-2264 FEDORA:FEDORA-2022-9d7a58e376 FEDORA:FEDORA-2022-b06fbea2c7 GLSA-202208-32 MISC:github.com:CVE-2022-2264 SMASH Issue 336078 bnc#1201132 https://security.gentoo.org/glsa/202305-16 rh#2103951 |
CVE-2022-2274 | openssl:Not affected, openssl-1_1:Not affected | critical | 9.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H) | CONFIRM:git.openssl.org:CVE-2022-2274 CONFIRM:github.com:CVE-2022-2274 CONFIRM:security.netapp.com:CVE-2022-2274 CONFIRM:www.openssl.org:CVE-2022-2097 CVE-2022-2274 D:CVE-2022-2274 Oracle:CVE-2022-2274 SMASH Issue 336034 bnc#1201148 rh#2102943 |
CVE-2022-22822 | expat:Released | important | 7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H) | CONFIRM:www.tenable.com:CVE-2022-23990 CVE-2022-22822 DSA-5073 GLSA-202209-24 MISC:cert-portal.siemens.com:CVE-2022-32262 MISC:github.com:CVE-2022-22827 OSS:2022/01/17/3 Oracle:CVE-2022-23990 RHSA-2022:0951 RHSA-2022:1069 RHSA-2022:7144 RHSA-2022:7692 SMASH Issue 319787 SMASH Issue 319788 bdo#1002994 bdo#1003474 bnc#1194474 jsc#CAR-1382 rh#2044451 rh#2044455 rh#2044457 rh#2044464 rh#2044467 rh#2044479 rh#2044484 rh#2044488 rh#2044613 rh#2048356 |
CVE-2022-22823 | expat:Released | important | 7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H) | CONFIRM:www.tenable.com:CVE-2022-23990 CVE-2022-22823 DSA-5073 GLSA-202209-24 MISC:cert-portal.siemens.com:CVE-2022-32262 MISC:github.com:CVE-2022-22827 OSS:2022/01/17/3 Oracle:CVE-2022-23990 RHSA-2022:0951 RHSA-2022:1069 RHSA-2022:7144 RHSA-2022:7692 SMASH Issue 319789 SMASH Issue 319790 bdo#1002994 bdo#1003474 bnc#1194476 jsc#CAR-1383 rh#2044451 rh#2044455 rh#2044457 rh#2044464 rh#2044467 rh#2044479 rh#2044484 rh#2044488 rh#2044613 rh#2048356 |
CVE-2022-22824 | expat:Released | important | 7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H) | CONFIRM:www.tenable.com:CVE-2022-23990 CVE-2022-22824 DSA-5073 GLSA-202209-24 MISC:cert-portal.siemens.com:CVE-2022-32262 MISC:github.com:CVE-2022-22827 OSS:2022/01/17/3 Oracle:CVE-2022-23990 RHSA-2022:0951 RHSA-2022:1069 RHSA-2022:7144 RHSA-2022:7692 SMASH Issue 319791 SMASH Issue 319792 bdo#1002994 bdo#1003474 bnc#1194477 jsc#CAR-1384 rh#2044451 rh#2044455 rh#2044457 rh#2044464 rh#2044467 rh#2044479 rh#2044484 rh#2044488 rh#2044613 rh#2048356 |
CVE-2022-22825 | expat:Released | important | 7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H) | CONFIRM:www.tenable.com:CVE-2022-23990 CVE-2022-22825 DSA-5073 GLSA-202209-24 MISC:cert-portal.siemens.com:CVE-2022-32262 MISC:github.com:CVE-2022-22827 OSS:2022/01/17/3 Oracle:CVE-2022-23990 RHSA-2022:0951 RHSA-2022:1069 RHSA-2022:7144 RHSA-2022:7692 SMASH Issue 319793 SMASH Issue 319794 bdo#1002994 bdo#1003474 bnc#1194478 jsc#CAR-1385 rh#2044451 rh#2044455 rh#2044457 rh#2044464 rh#2044467 rh#2044479 rh#2044484 rh#2044488 rh#2044613 rh#2048356 |
CVE-2022-22826 | expat:Released | important | 7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H) | CONFIRM:www.tenable.com:CVE-2022-23990 CVE-2022-22826 DSA-5073 GLSA-202209-24 MISC:cert-portal.siemens.com:CVE-2022-32262 MISC:github.com:CVE-2022-22827 OSS:2022/01/17/3 Oracle:CVE-2022-23990 RHSA-2022:0951 RHSA-2022:1069 RHSA-2022:7144 RHSA-2022:7692 SMASH Issue 319795 SMASH Issue 319796 bdo#1002994 bdo#1003474 bnc#1194479 jsc#CAR-1386 rh#2044451 rh#2044455 rh#2044457 rh#2044464 rh#2044467 rh#2044479 rh#2044484 rh#2044488 rh#2044613 rh#2048356 |
CVE-2022-22827 | expat:Released | important | 7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H) | CONFIRM:www.tenable.com:CVE-2022-23990 CVE-2022-22827 DSA-5073 GLSA-202209-24 MISC:cert-portal.siemens.com:CVE-2022-32262 MISC:github.com:CVE-2022-22827 OSS:2022/01/17/3 Oracle:CVE-2022-23990 RHSA-2022:0951 RHSA-2022:1069 RHSA-2022:7144 RHSA-2022:7692 SMASH Issue 319797 SMASH Issue 319798 bdo#1002994 bdo#1003474 bnc#1194480 jsc#CAR-1387 rh#2044451 rh#2044455 rh#2044457 rh#2044464 rh#2044467 rh#2044479 rh#2044484 rh#2044488 rh#2044613 rh#2048356 |
CVE-2022-2284 | vim:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:huntr.dev:CVE-2022-2284 CVE-2022-2284 D:CVE-2022-2284 FEDORA:FEDORA-2022-9d7a58e376 FEDORA:FEDORA-2022-b06fbea2c7 GLSA-202208-32 MISC:github.com:CVE-2022-2284 SMASH Issue 336170 bnc#1201133 https://security.gentoo.org/glsa/202305-16 jsc#CAR-1876 rh#2103872 |
CVE-2022-2285 | vim:Released | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L) | CONFIRM:huntr.dev:CVE-2022-2285 CVE-2022-2285 D:CVE-2022-2285 FEDORA:FEDORA-2022-9d7a58e376 FEDORA:FEDORA-2022-b06fbea2c7 GLSA-202208-32 L3:64808 MISC:github.com:CVE-2022-2285 MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update SMASH Issue 336169 bnc#1201134 bnc#1206218 https://security.gentoo.org/glsa/202305-16 jsc#CAR-1878 rh#2103874 |
CVE-2022-2286 | vim:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:huntr.dev:CVE-2022-2286 CVE-2022-2286 D:CVE-2022-2286 FEDORA:FEDORA-2022-9d7a58e376 FEDORA:FEDORA-2022-b06fbea2c7 GLSA-202208-32 MISC:github.com:CVE-2022-2286 SMASH Issue 336175 bnc#1201135 https://security.gentoo.org/glsa/202305-16 jsc#CAR-1877 rh#2103875 |
CVE-2022-2287 | vim:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:huntr.dev:CVE-2022-2287 CVE-2022-2287 D:CVE-2022-2287 FEDORA:FEDORA-2022-9d7a58e376 FEDORA:FEDORA-2022-b06fbea2c7 GLSA-202208-32 MISC:github.com:CVE-2022-2287 SMASH Issue 336178 bnc#1201136 https://security.gentoo.org/glsa/202305-16 rh#2103876 |
CVE-2022-2288 | vim:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L) | CONFIRM:huntr.dev:CVE-2022-2288 CVE-2022-2288 D:CVE-2022-2288 FEDORA:FEDORA-2022-9d7a58e376 FEDORA:FEDORA-2022-b06fbea2c7 GLSA-202208-32 MISC:github.com:CVE-2022-2288 SMASH Issue 336180 bnc#1201137 https://security.gentoo.org/glsa/202305-16 rh#2103878 |
CVE-2022-2289 | vim:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L) | CONFIRM:huntr.dev:CVE-2022-2289 CVE-2022-2289 D:CVE-2022-2289 FEDORA:FEDORA-2022-9d7a58e376 FEDORA:FEDORA-2022-b06fbea2c7 GLSA-202208-32 MISC:github.com:CVE-2022-2289 SMASH Issue 336181 bnc#1201139 https://security.gentoo.org/glsa/202305-16 rh#2103880 |
CVE-2022-22942 | kernel-source-rt:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-22942 DSA-5096 OSS:2021/07/22/1 OSS:2022/01/25/12 OSS:2022/01/27/4 OSS:2022/02/03/1 OSS:2022/Q1/98 RHSA-2022:0592 RHSA-2022:0620 RHSA-2022:0622 RHSA-2022:0771 RHSA-2022:0772 RHSA-2022:0777 RHSA-2022:0819 RHSA-2022:0820 RHSA-2022:0821 RHSA-2022:0823 RHSA-2022:0825 RHSA-2022:0841 RHSA-2022:0849 RHSA-2022:0851 RHSA-2022:0925 RHSA-2022:0958 RHSA-2022:1103 RHSA-2022:1107 RHSA-2022:1263 RHSA-2022:1324 RHSA-2022:1373 SMASH Issue 321574 SMASH Issue 321575 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1195065 bnc#1195951 https://github.com/vmware/photon/wiki/Security-Update-3.0-356 https://github.com/vmware/photon/wiki/Security-Update-4.0-148 jsc#CAR-1492 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2044561 rh#2044809 rh#2053632 rh#2059923 |
CVE-2022-23036 | kernel-source-rt:Released | important | 7.5 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H) | CVE-2022-23036 CVE-2022-23037 CVE-2022-23038 CVE-2022-23039 CVE-2022-23040 CVE-2022-23041 CVE-2022-23042 L3:64302 L3:64306 L3:64525 L3:64549 MISC:xenbits.xenproject.org:CVE-2022-23042 MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update OSS:2022/Q1/173 SMASH Issue 324768 bnc#1196488 bnc#1199141 jsc#CAR-1588 linux.git:commit:31185df7e2b1d2fa1de4900247a12d7b9c7087eb linux.git:commit:33172ab50a53578a95691310f49567c9266968b0 linux.git:commit:3777ea7bac3113005b7180e6b9dadf16d19a5827 linux.git:commit:42baefac638f06314298087394b982ead9ec444b linux.git:commit:5cadd4bb1d7fc9ab201ac14620d1a478357e4ebd linux.git:commit:66e3531b33ee51dad17c463b4d9c9f52e341503d linux.git:commit:6b1775f26a2da2b05a6dc8ec2b5d14e9a4701a1a linux.git:commit:abf1fd5919d6238ee3bc5eb4a9b6c3947caa6638 linux.git:commit:b0576cc9c6b843d99c6982888d59a56209341888 linux.git:commit:d3b6372c5881cb54925212abb62c521df8ba4809 rh#2063839 |
CVE-2022-23037 | kernel-source-rt:Released | important | 7.5 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H) | CVE-2022-23036 CVE-2022-23037 CVE-2022-23038 CVE-2022-23039 CVE-2022-23040 CVE-2022-23041 CVE-2022-23042 L3:64302 L3:64306 L3:64525 L3:64549 MISC:xenbits.xenproject.org:CVE-2022-23042 MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update OSS:2022/Q1/173 SMASH Issue 324768 SMASH Issue 325445 bnc#1196488 bnc#1199141 jsc#CAR-1588 linux.git:commit:31185df7e2b1d2fa1de4900247a12d7b9c7087eb linux.git:commit:33172ab50a53578a95691310f49567c9266968b0 linux.git:commit:3777ea7bac3113005b7180e6b9dadf16d19a5827 linux.git:commit:42baefac638f06314298087394b982ead9ec444b linux.git:commit:5cadd4bb1d7fc9ab201ac14620d1a478357e4ebd linux.git:commit:66e3531b33ee51dad17c463b4d9c9f52e341503d linux.git:commit:6b1775f26a2da2b05a6dc8ec2b5d14e9a4701a1a linux.git:commit:abf1fd5919d6238ee3bc5eb4a9b6c3947caa6638 linux.git:commit:b0576cc9c6b843d99c6982888d59a56209341888 linux.git:commit:d3b6372c5881cb54925212abb62c521df8ba4809 rh#2063839 |
CVE-2022-23038 | kernel-source-rt:Released | important | 7.5 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H) | CVE-2022-23036 CVE-2022-23037 CVE-2022-23038 CVE-2022-23039 CVE-2022-23040 CVE-2022-23041 CVE-2022-23042 L3:64302 L3:64306 L3:64525 L3:64549 MISC:xenbits.xenproject.org:CVE-2022-23042 MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update OSS:2022/Q1/173 SMASH Issue 324768 SMASH Issue 325446 bnc#1196488 bnc#1199141 jsc#CAR-1588 linux.git:commit:31185df7e2b1d2fa1de4900247a12d7b9c7087eb linux.git:commit:33172ab50a53578a95691310f49567c9266968b0 linux.git:commit:3777ea7bac3113005b7180e6b9dadf16d19a5827 linux.git:commit:42baefac638f06314298087394b982ead9ec444b linux.git:commit:5cadd4bb1d7fc9ab201ac14620d1a478357e4ebd linux.git:commit:66e3531b33ee51dad17c463b4d9c9f52e341503d linux.git:commit:6b1775f26a2da2b05a6dc8ec2b5d14e9a4701a1a linux.git:commit:abf1fd5919d6238ee3bc5eb4a9b6c3947caa6638 linux.git:commit:b0576cc9c6b843d99c6982888d59a56209341888 linux.git:commit:d3b6372c5881cb54925212abb62c521df8ba4809 rh#2063839 |
CVE-2022-23039 | kernel-source-rt:Released | important | 7.5 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H) | CVE-2022-23036 CVE-2022-23037 CVE-2022-23038 CVE-2022-23039 CVE-2022-23040 CVE-2022-23041 CVE-2022-23042 L3:64302 L3:64306 L3:64525 L3:64549 MISC:xenbits.xenproject.org:CVE-2022-23042 MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update OSS:2022/Q1/173 SMASH Issue 324768 SMASH Issue 325447 bnc#1196488 bnc#1199141 jsc#CAR-1588 linux.git:commit:31185df7e2b1d2fa1de4900247a12d7b9c7087eb linux.git:commit:33172ab50a53578a95691310f49567c9266968b0 linux.git:commit:3777ea7bac3113005b7180e6b9dadf16d19a5827 linux.git:commit:42baefac638f06314298087394b982ead9ec444b linux.git:commit:5cadd4bb1d7fc9ab201ac14620d1a478357e4ebd linux.git:commit:66e3531b33ee51dad17c463b4d9c9f52e341503d linux.git:commit:6b1775f26a2da2b05a6dc8ec2b5d14e9a4701a1a linux.git:commit:abf1fd5919d6238ee3bc5eb4a9b6c3947caa6638 linux.git:commit:b0576cc9c6b843d99c6982888d59a56209341888 linux.git:commit:d3b6372c5881cb54925212abb62c521df8ba4809 rh#2063839 |
CVE-2022-2304 | vim:Released | moderate | 5.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) | CONFIRM:huntr.dev:CVE-2022-2304 CVE-2022-2304 D:CVE-2022-2304 FEDORA:FEDORA-2022-9d7a58e376 FEDORA:FEDORA-2022-b06fbea2c7 GLSA-202208-32 MISC:github.com:CVE-2022-2304 MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update SMASH Issue 336284 bnc#1201249 https://security.gentoo.org/glsa/202305-16 rh#2104416 |
CVE-2022-23040 | kernel-source-rt:Released | important | 7.5 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H) | CVE-2022-23036 CVE-2022-23037 CVE-2022-23038 CVE-2022-23039 CVE-2022-23040 CVE-2022-23041 CVE-2022-23042 L3:64302 L3:64306 L3:64525 L3:64549 MISC:xenbits.xenproject.org:CVE-2022-23042 MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update OSS:2022/Q1/173 SMASH Issue 324768 SMASH Issue 325448 bnc#1196488 bnc#1199141 jsc#CAR-1588 linux.git:commit:31185df7e2b1d2fa1de4900247a12d7b9c7087eb linux.git:commit:33172ab50a53578a95691310f49567c9266968b0 linux.git:commit:3777ea7bac3113005b7180e6b9dadf16d19a5827 linux.git:commit:42baefac638f06314298087394b982ead9ec444b linux.git:commit:5cadd4bb1d7fc9ab201ac14620d1a478357e4ebd linux.git:commit:66e3531b33ee51dad17c463b4d9c9f52e341503d linux.git:commit:6b1775f26a2da2b05a6dc8ec2b5d14e9a4701a1a linux.git:commit:abf1fd5919d6238ee3bc5eb4a9b6c3947caa6638 linux.git:commit:b0576cc9c6b843d99c6982888d59a56209341888 linux.git:commit:d3b6372c5881cb54925212abb62c521df8ba4809 rh#2063839 |
CVE-2022-23041 | kernel-source-rt:Released | important | 7.5 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H) | CVE-2022-23036 CVE-2022-23037 CVE-2022-23038 CVE-2022-23039 CVE-2022-23040 CVE-2022-23041 CVE-2022-23042 L3:64302 L3:64306 L3:64525 L3:64549 MISC:xenbits.xenproject.org:CVE-2022-23042 MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update OSS:2022/Q1/173 SMASH Issue 324768 bnc#1196488 bnc#1199141 jsc#CAR-1588 linux.git:commit:31185df7e2b1d2fa1de4900247a12d7b9c7087eb linux.git:commit:33172ab50a53578a95691310f49567c9266968b0 linux.git:commit:3777ea7bac3113005b7180e6b9dadf16d19a5827 linux.git:commit:42baefac638f06314298087394b982ead9ec444b linux.git:commit:5cadd4bb1d7fc9ab201ac14620d1a478357e4ebd linux.git:commit:66e3531b33ee51dad17c463b4d9c9f52e341503d linux.git:commit:6b1775f26a2da2b05a6dc8ec2b5d14e9a4701a1a linux.git:commit:abf1fd5919d6238ee3bc5eb4a9b6c3947caa6638 linux.git:commit:b0576cc9c6b843d99c6982888d59a56209341888 linux.git:commit:d3b6372c5881cb54925212abb62c521df8ba4809 rh#2063839 |
CVE-2022-23042 | kernel-source-rt:Released | important | 7.5 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H) | CVE-2022-23036 CVE-2022-23037 CVE-2022-23038 CVE-2022-23039 CVE-2022-23040 CVE-2022-23041 CVE-2022-23042 L3:64302 L3:64306 L3:64525 L3:64549 MISC:xenbits.xenproject.org:CVE-2022-23042 MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update OSS:2022/Q1/173 SMASH Issue 324768 bnc#1196488 bnc#1199141 jsc#CAR-1588 linux.git:commit:31185df7e2b1d2fa1de4900247a12d7b9c7087eb linux.git:commit:33172ab50a53578a95691310f49567c9266968b0 linux.git:commit:3777ea7bac3113005b7180e6b9dadf16d19a5827 linux.git:commit:42baefac638f06314298087394b982ead9ec444b linux.git:commit:5cadd4bb1d7fc9ab201ac14620d1a478357e4ebd linux.git:commit:66e3531b33ee51dad17c463b4d9c9f52e341503d linux.git:commit:6b1775f26a2da2b05a6dc8ec2b5d14e9a4701a1a linux.git:commit:abf1fd5919d6238ee3bc5eb4a9b6c3947caa6638 linux.git:commit:b0576cc9c6b843d99c6982888d59a56209341888 linux.git:commit:d3b6372c5881cb54925212abb62c521df8ba4809 rh#2063839 |
CVE-2022-2308 | kernel-source-rt:Not affected | moderate | () | CVE-2022-2308 SMASH Issue 340315 bnc#1202573 linux.git:commit:46f8a29272e51b6df7393d58fc5cb8967397ef2b rh#2103900 |
CVE-2022-2309 | python-lxml:Released | moderate | 6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:huntr.dev:CVE-2022-2309 CONFIRM:security.netapp.com:CVE-2022-2309 CVE-2022-2309 D:CVE-2022-2309 FEDORA:FEDORA-2022-ed0eeb6a20 FEDORA:FEDORA-2022-ed17f59c1d GLSA-202208-06 MISC:github.com:CVE-2022-2309 RHSA-2022:8226 SMASH Issue 336287 bnc#1201253 rh#2107571 |
CVE-2022-2318 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:/advisory/ntap-20230120-0001/ CONFIRM:security.netapp.com:CVE-2022-23181 CVE-2022-2318 CVE-2022-23181 D:CVE-2021-43980 D:CVE-2022-23181 DSA-5191 DSA-5265 L3:63558 L3:64743 L3:66057 MISC:github.com:CVE-2022-2318 MISC:github.com:OSS:2022/07/02/3 MISC:lists.apache.org:CVE-2022-23181 MISC:www.oracle.com:CVE-2022-21498 MISC:www.oracle.com:CVE-2022-21586 MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update MLIST:[debian-lts-announce] 20221026 [SECURITY] [DLA 3160-1] tomcat9 security update OSS:2022/07/02/3 OSS:2022/Q3/23 Oracle:CVE-2020-9484 Oracle:CVE-2022-23181 RHSA-2022:5532 RHSA-2022:7272 RHSA-2022:7273 RHSA-2023:0272 SMASH Issue 321850 SMASH Issue 321934 SMASH Issue 336296 ZDI-23-1834 bnc#1195255 bnc#1201251 jsc#CAR-1885 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:f63c2c2032c2e3caad9add3b82cc6e91c376fd26 rh#1838332 rh#2047417 rh#2092427 rh#2093146 rh#2104114 rh#2104423 rh#2107924 rh#2108691 rh#2130599 |
CVE-2022-23218 | glibc:Released | moderate | 5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) | CVE-2022-23218 GLSA-202208-24 L3:64698 MISC:sourceware.org:CVE-2022-23218 MISC:www.oracle.com:CVE-2022-21586 MLIST:[debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update Oracle:CVE-2022-23218 RHSA-2022:0896 SMASH Issue 320464 bnc#1194770 jsc#CAR-1433 rh#2042013 |
CVE-2022-23219 | glibc:Released | moderate | 5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) | CVE-2022-23219 GLSA-202208-24 L3:64698 MISC:sourceware.org:CVE-2022-23219 MISC:www.oracle.com:CVE-2022-21586 MLIST:[debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update Oracle:CVE-2022-23219 RHSA-2022:0896 SMASH Issue 320463 bnc#1194768 jsc#CAR-1432 rh#2042017 |
CVE-2022-23222 | kernel-source-rt:Not affected, ltp:Released | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-23222 CVE-2022-23222 D:CVE-2022-23222 DSA-5050 DSA-5096 FEDORA:FEDORA-2022-952bb7b856 FEDORA:FEDORA-2022-edbd74424e MISC:github.com:OSS:2022/Q2/176 OSS:2021/07/22/1 OSS:2022/01/13/1 OSS:2022/01/14/1 OSS:2022/01/18/2 OSS:2022/01/25/12 OSS:2022/06/01/1 OSS:2022/06/04/3 OSS:2022/06/07/3 OSS:2022/Q1/38 OSS:2022/Q1/49 OSS:2022/Q2/176 SMASH Issue 320458 SMASH Issue 320775 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bdo#996974 bnc#1194765 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=64620e0a1e712a778095bd35cbb277dc2259281f https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FCR3LIRUEXR7CA63W5M2HT3K63MZGKBR/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z5VTIZZUPC73IEJNZX66BY2YCBRZAELB/ linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2043520 rh#2044561 rh#2053632 rh#2059923 |
CVE-2022-2327 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H) | CONFIRM:git.kernel.org:CVE-2022-2327 CONFIRM:security.netapp.com:/advisory/ntap-20230203-0009/ CVE-2022-2327 MISC:kernel.dance:CVE-2022-2209 SMASH Issue 338099 bnc#1201829 |
CVE-2022-23308 | libxml2:Released | moderate | 7 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H) | CONFIRM:github.com:CVE-2022-23308 CONFIRM:security.netapp.com:CVE-2022-23308 CONFIRM:support.apple.com:CVE-2018-25032 CONFIRM:support.apple.com:CVE-2022-23308 CVE-2022-23308 D:CVE-2022-23308 FEDORA:FEDORA-2022-050c712ed7 FULLDISC:20220516 APPLE-SA-2022-05-16-1 iOS 15.5 and iPadOS 15.5 FULLDISC:20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4 FULLDISC:20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6 FULLDISC:20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina FULLDISC:20220516 APPLE-SA-2022-05-16-5 watchOS 8.6 FULLDISC:20220516 APPLE-SA-2022-05-16-6 tvOS 15.5 GLSA-202210-03 L3:62986 L3:63416 L3:63420 MISC:gitlab.gnome.org:CVE-2022-23308 MISC:www.oracle.com:CVE-2022-21586 MLIST:[debian-lts-announce] 20220408 [SECURITY] [DLA 2972-1] libxml2 security update Oracle:CVE-2022-23308 RHSA-2022:0899 RHSA-2022:1389 RHSA-2022:1390 SMASH Issue 324493 bnc#1196490 bnc#1197514 bnc#1200032 bnc#1200040 jsc#CAR-1565 rh#2056913 |
CVE-2022-2343 | vim:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:huntr.dev:CVE-2022-2343 CVE-2022-2343 D:CVE-2022-2343 FEDORA:FEDORA-2022-9d7a58e376 GLSA-202208-32 MISC:github.com:CVE-2022-2343 SMASH Issue 336558 bnc#1201356 https://security.gentoo.org/glsa/202305-16 jsc#CAR-1888 rh#2106779 |
CVE-2022-2344 | vim:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:huntr.dev:CVE-2022-2344 CVE-2022-2344 FEDORA:FEDORA-2022-9d7a58e376 GLSA-202208-32 MISC:github.com:CVE-2022-2344 SMASH Issue 336556 bnc#1201359 https://security.gentoo.org/glsa/202305-16 jsc#CAR-1889 rh#2106787 |
CVE-2022-2345 | vim:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:huntr.dev:CVE-2022-2345 CVE-2022-2345 D:CVE-2022-2345 FEDORA:FEDORA-2022-9d7a58e376 GLSA-202208-32 MISC:github.com:CVE-2022-2345 SMASH Issue 336591 bnc#1201363 https://security.gentoo.org/glsa/202305-16 jsc#CAR-1890 rh#2106775 |
CVE-2022-23491 | mozilla-nss:Released | moderate | 6.6 (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-23491 D:CVE-2022-23491 L3:64895 MISC:github.com:/certifi/python-certifi/security/advisories/GHSA-43fp-rhv2-5gv8 MISC:groups.google.com:/a/mozilla.org/g/dev-security-policy/c/oxX69KFvsm4/m/yLohoVqtCgAJ Oracle:CVE-2022-23491 RHBA-2023:0589 SMASH Issue 350038 bnc#1206212 bnc#1206587 rh#2180089 |
CVE-2022-2380 | kernel-source-rt:Not affected | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H) | CVE-2022-2380 MISC:git.kernel.org:CVE-2022-2380 SMASH Issue 336707 bnc#1201378 rh#2105785 |
CVE-2022-23816 | kernel-source-rt:Not affected | moderate | 5.6 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N) | CONFIRM:www.intel.com:CVE-2022-29901 CVE-2022-23816 D:CVE-2022-26373 D:CVE-2022-36879 D:CVE-2022-36946 DSA-5184 DSA-5207 MISC:www.intel.com:OSS:2022/07/12/2 OSS:2022/07/12/2 OSS:2022/07/12/4 OSS:2022/07/12/5 OSS:2022/07/13/1 OSS:2022/08/09/5 OSS:2022/08/09/6 OSS:2022/08/09/7 OSS:2022/Q3/114 OSS:2022/Q3/115 OSS:2022/Q3/116 OSS:2022/Q3/44 RHSA-2022:7110 RHSA-2022:7134 RHSA-2022:7337 RHSA-2022:7338 RHSA-2022:7933 RHSA-2022:8267 RHSA-2022:8973 RHSA-2022:8974 SMASH Issue 336843 ZDI-22-1117 ZDI-22-1118 bnc#1201456 jsc#CAR-1906 linux.git:commit:470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2 linux.git:commit:9ad36309e2719a884f946678e0296be10f0bb4c1 rh#2090226 rh#2103148 rh#2114849 rh#2114874 rh#2114878 rh#2115065 rh#2115278 rh#2119855 |
CVE-2022-23825 | kernel-source-rt:Ignore | moderate | 5.6 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N) | CONFIRM:www.intel.com:CVE-2022-29901 CVE-2022-23825 D:CVE-2022-26373 D:CVE-2022-36879 D:CVE-2022-36946 DSA-5184 DSA-5207 DSA-5378 FEDORA:FEDORA-2022-3e6ce58029 FEDORA:FEDORA-2022-8aab5b5cde FEDORA:FEDORA-2022-a0d7a5eaf2 FEDORA:FEDORA-2022-c69ef9c1dd MISC:www.amd.com:CVE-2022-23825 MISC:www.intel.com:OSS:2022/07/12/2 OSS:2022/07/12/2 OSS:2022/07/12/4 OSS:2022/07/12/5 OSS:2022/07/13/1 OSS:2022/08/09/5 OSS:2022/08/09/6 OSS:2022/08/09/7 OSS:2022/11/08/1 OSS:2022/11/10/2 OSS:2022/Q3/114 OSS:2022/Q3/115 OSS:2022/Q3/116 OSS:2022/Q3/44 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-5715 Oracle:CVE-2022-21123 RHSA-2022:7110 RHSA-2022:7134 RHSA-2022:7337 RHSA-2022:7338 RHSA-2022:7933 RHSA-2022:8267 RHSA-2022:8973 RHSA-2022:8974 SMASH Issue 336844 ZDI-22-1117 ZDI-22-1118 bdo#1033297 bnc#1201457 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D4RW5FCIYFNCQOEFJEUIRW3DGYW7CWBG/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KLSRW4LLTAT3CZMOYVNTC7YIYGX3KLED/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M27MB3QFNIJV4EQQSXWARHP3OGX6CR6K/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM/ https://security.gentoo.org/glsa/202402-07 jsc#CAR-1916 linux.git:commit:470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2 linux.git:commit:9ad36309e2719a884f946678e0296be10f0bb4c1 rh#1519780 rh#2061700 rh#2090226 rh#2090237 rh#2090240 rh#2090241 rh#2103148 rh#2103153 rh#2114849 rh#2114874 rh#2114878 rh#2115065 rh#2115278 rh#2119127 rh#2119855 |
CVE-2022-23852 | expat:Released | important | 8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-23852 CONFIRM:www.tenable.com:CVE-2022-23990 CVE-2022-23852 D:CVE-2022-23852 DSA-5073 GLSA-202209-24 MISC:cert-portal.siemens.com:CVE-2022-32262 MISC:github.com:CVE-2022-23852 MISC:www.oracle.com:CVE-2022-21498 MLIST:[debian-lts-announce] 20220307 [SECURITY] [DLA 2935-1] expat security update Oracle:CVE-2022-23990 RHSA-2022:0951 RHSA-2022:1069 RHSA-2022:4834 RHSA-2022:7144 SMASH Issue 321506 bdo#1002994 bdo#1003474 bnc#1195054 jsc#CAR-1454 rh#2044451 rh#2044455 rh#2044457 rh#2044464 rh#2044467 rh#2044479 rh#2044484 rh#2044488 rh#2044613 rh#2048356 |
CVE-2022-23901 | re2c:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H) | CVE-2022-23901 MISC:github.com:CVE-2022-23901 SMASH Issue 327522 bnc#1197693 |
CVE-2022-23960 | kernel-source-rt:Released | moderate | 5.6 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N) | CONFIRM:developer.arm.com:CVE-2017-5754 CONFIRM:security.netapp.com:CVE-2022-0002 CVE-2021-26341 CVE-2021-26401 CVE-2022-0001 CVE-2022-0002 CVE-2022-23960 CVE-2022-25368 D:CVE-2022-1016 D:CVE-2022-2153 D:CVE-2022-23960 D:CVE-2022-32296 DSA-5096 DSA-5161 DSA-5173 DSA-5184 DSA-5378 L3:65520 MISC:amperecomputing.com:CVE-2022-25368 MISC:developer.arm.com:CVE-2021-28664 MISC:developer.arm.com:CVE-2022-25368 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:OSS:2022/04/02/2 MISC:research.nccgroup.com:OSS:2022/09/02/9 MISC:www.amd.com:CVE-2021-26341 MISC:www.amd.com:CVE-2021-26401 MISC:www.intel.com:CVE-2022-0002 MISC:www.oracle.com:CVE-2022-21586 MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update OSS:2021/07/22/1 OSS:2022/01/25/12 OSS:2022/03/18/2 OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/22/1 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/11/10/2 OSS:2022/Q1/171 OSS:2022/Q3/141 OSS:2022/Q4/132 OSS:2022/Q4/135 Oracle:CVE-2017-5715 Oracle:CVE-2022-21123 RHSA-2022:1975 RHSA-2022:1988 RHSA-2022:7683 RHSA-2023:0187 RHSA-2023:0399 RHSA-2023:0400 RHSA-2023:2148 RHSA-2023:2458 RHSA-2023:2736 RHSA-2023:2951 SMASH Issue 312331 SMASH Issue 325165 SMASH Issue 325839 ZDI-23-1834 bdo#1006346 bdo#1013299 bdo#1033297 bdo#922204 bdo#988044 bdo#989285 bdo#990279 bdo#990411 bdo#994050 bnc#1191580 bnc#1195283 bnc#1195330 bnc#1196657 bnc#1196901 bnc#1196915 bnc#1197000 https://www.kb.cert.org/vuls/id/155143 jsc#CAR-1593 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1519780 rh#1832397 rh#1980646 rh#1997467 rh#2039448 rh#2044561 rh#2053632 rh#2056381 rh#2058395 rh#2058955 rh#2059923 rh#2061633 rh#2061700 rh#2061703 rh#2061712 rh#2061721 rh#2062284 rh#2064604 rh#2066614 rh#2066706 rh#2066819 rh#2069736 rh#2070694 rh#2071047 rh#2073064 rh#2074208 rh#2074441 rh#2084435 rh#2084458 rh#2085300 rh#2086753 rh#2088021 rh#2089815 rh#2090237 rh#2090240 rh#2090241 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2104423 rh#2119127 rh#2141026 |
CVE-2022-23990 | expat:Released | important | 8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:www.tenable.com:CVE-2022-23990 CVE-2022-23990 DSA-5073 FEDORA:FEDORA-2022-88f6a3d290 FEDORA:FEDORA-2022-d2abd0858e GLSA-202209-24 MISC:cert-portal.siemens.com:CVE-2022-32262 MISC:github.com:CVE-2022-23990 MISC:www.oracle.com:CVE-2022-21498 Oracle:CVE-2022-23990 RHSA-2022:7144 RHSA-2022:7811 SMASH Issue 321796 bdo#1002994 bdo#1003474 bnc#1195217 jsc#CAR-1477 rh#2044451 rh#2044455 rh#2044457 rh#2044464 rh#2044467 rh#2044479 rh#2044484 rh#2044488 rh#2044613 rh#2048356 |
CVE-2022-24122 | kernel-source-rt:Not affected | important | 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-24122 CVE-2022-24122 D:CVE-2022-24122 FEDORA:FEDORA-2022-57fd391bf8 FEDORA:FEDORA-2022-667a5c6e26 MISC:git.kernel.org:CVE-2022-24122 MISC:github.com:CVE-2022-24122 OSS:2022/01/29/1 OSS:2022/Q1/104 SMASH Issue 322165 bnc#1195306 bnc#1196028 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HSR3AI2IQGRKZCHNKF6S25JGDKUEAWWL/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VVSZKUJAZ2VN6LJ35J2B6YD6BOPQTU3B/ rh#2048492 |
CVE-2022-24448 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2022-24448 DSA-5092 DSA-5096 MISC:cdn.kernel.org:CVE-2022-24448 MISC:git.kernel.org:CVE-2022-24448 MISC:github.com:CVE-2022-24448 MISC:lore.kernel.org:CVE-2022-24448 MISC:www.spinics.net:CVE-2022-24448 MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update OSS:2021/07/22/1 OSS:2022/01/25/12 RHSA-2022:7444 RHSA-2022:7683 RHSA-2022:7933 RHSA-2022:8267 SMASH Issue 322734 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1195612 jsc#CAR-1499 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2044561 rh#2051444 rh#2053632 rh#2055502 rh#2059923 |
CVE-2022-24695 | kernel-source-rt:Ignore | moderate | 4.3 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) | CVE-2022-24695 MISC:www.computer.org:/csdl/proceedings-article/sp/2023/933600a521/1He7Yja1AYM SMASH Issue 368229 bnc#1212028 https://sp2023.ieee-security.org/program-papers.html https://www.bluetooth.com/specifications/specs/core-specification/ |
CVE-2022-24713 | mozilla-nss:Released | moderate | 4.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:github.com:CVE-2022-24713 CVE-2022-1097 CVE-2022-1196 CVE-2022-1197 CVE-2022-24713 CVE-2022-28281 CVE-2022-28282 CVE-2022-28283 CVE-2022-28284 CVE-2022-28285 CVE-2022-28286 CVE-2022-28287 CVE-2022-28288 CVE-2022-28289 D:CVE-2022-24713 DSA-5113 DSA-5118 FEDORA:FEDORA-2022-8436ac4c39 FEDORA:FEDORA-2022-ceb3e03c5e FEDORA:FEDORA-2022-d20d44ba98 GLSA-202208-08 GLSA-202208-14 MISC:bugzilla.mozilla.org:/buglist.cgi MISC:bugzilla.mozilla.org:/show_bug.cgi MISC:github.com:CVE-2022-24713 MISC:groups.google.com:CVE-2022-24713 MISC:www.mozilla.org:/security/advisories/mfsa2022-13/ MISC:www.mozilla.org:/security/advisories/mfsa2022-14/ MISC:www.mozilla.org:/security/advisories/mfsa2022-15/ MLIST:[debian-lts-announce] 20220407 [SECURITY] [DLA 2971-1] firefox-esr security update MLIST:[debian-lts-announce] 20220411 [SECURITY] [DLA 2978-1] thunderbird security update Mozilla Foundation Security Advisory 2022-13 RHSA-2022:1283 RHSA-2022:1284 RHSA-2022:1285 RHSA-2022:1286 RHSA-2022:1287 RHSA-2022:1301 RHSA-2022:1302 RHSA-2022:1303 RHSA-2022:1305 RHSA-2022:1326 SMASH Issue 325578 SMASH Issue 327815 bnc#1196972 bnc#1197903 jsc#CAR-1667 rh#2072559 rh#2072560 rh#2072561 rh#2072562 rh#2072563 rh#2072564 rh#2072565 rh#2072566 rh#2072963 xf#223379 |
CVE-2022-24958 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2022-24958 CVE-2022-24958 D:CVE-2022-24958 FEDORA:FEDORA-2022-2aa7c08b53 FEDORA:FEDORA-2022-9d4e48836d MISC:git.kernel.org:CVE-2022-24958 MISC:github.com:CVE-2022-24958 MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update SMASH Issue 323537 bnc#1195905 jsc#CAR-1523 rh#2053548 |
CVE-2022-24959 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-24959 D:CVE-2022-24959 DSA-5092 DSA-5096 MISC:cdn.kernel.org:CVE-2022-24448 MISC:github.com:CVE-2022-24959 MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update OSS:2021/07/22/1 OSS:2022/01/25/12 SMASH Issue 323536 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1195897 jsc#CAR-1508 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2044561 rh#2053552 rh#2053632 rh#2055502 rh#2059923 |
CVE-2022-2503 | kernel-source-rt:Released | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:github.com:CVE-2022-2503 CVE-2022-2503 D:CVE-2022-2503 RHSA-2022:7933 RHSA-2022:8267 RHSA-2023:5627 SMASH Issue 339685 bnc#1202677 https://security.netapp.com/advisory/ntap-20230214-0005/ jsc#CAR-1980 rh#2177862 |
CVE-2022-2509 | gnutls:Released | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-2509 DSA-5203 FEDORA:FEDORA-2022-5470992bfc MISC:access.redhat.com:CVE-2022-2509 MISC:lists.gnupg.org:CVE-2022-2509 MLIST:[debian-lts-announce] 20220812 [SECURITY] [DLA 3070-1] gnutls28 security update Oracle:CVE-2022-2509 RHSA-2022:6854 RHSA-2022:7105 SMASH Issue 338507 bnc#1202020 jsc#CAR-1940 rh#2108977 |
CVE-2022-2522 | vim:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:huntr.dev:CVE-2022-2522 CVE-2022-2522 L3:64124 L3:64808 MISC:github.com:CVE-2022-2522 MISC:huntr.dev:CVE-2022-2522 SMASH Issue 338141 bnc#1201863 bnc#1203356 https://security.gentoo.org/glsa/202305-16 jsc#CAR-1923 rh#2112299 |
CVE-2022-25235 | expat:Released | important | 7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-25315 CVE-2022-25235 D:CVE-2022-25235 DSA-5085 FEDORA:FEDORA-2022-04f206996b FEDORA:FEDORA-2022-3d9d67f558 GLSA-202209-24 L3:63782 MISC:cert-portal.siemens.com:CVE-2022-32262 MISC:github.com:CVE-2022-25235 MISC:www.oracle.com:CVE-2022-21498 MLIST:[debian-lts-announce] 20220307 [SECURITY] [DLA 2935-1] expat security update OSS:2022/02/19/1 Oracle:CVE-2022-25236 Oracle:CVE-2022-25315 RHSA-2022:0815 RHSA-2022:0816 RHSA-2022:0817 RHSA-2022:0818 RHSA-2022:0824 RHSA-2022:0843 RHSA-2022:0845 RHSA-2022:0847 RHSA-2022:0850 RHSA-2022:0853 RHSA-2022:0951 RHSA-2022:1012 RHSA-2022:1053 RHSA-2022:1068 RHSA-2022:1069 RHSA-2022:1070 RHSA-2022:1263 RHSA-2022:1309 RHSA-2022:1539 RHSA-2022:1540 RHSA-2022:1643 RHSA-2022:1644 RHSA-2022:7144 RHSA-2022:7811 SMASH Issue 323930 bdo#1005894 bdo#1005895 bnc#1196026 jsc#CAR-1532 rh#2056350 rh#2056354 rh#2056363 rh#2056366 rh#2056370 |
CVE-2022-25236 | expat:Released, python3:Released | important | 7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-25315 CVE-2022-25236 D:CVE-2022-25236 DSA-5085 FEDORA:FEDORA-2022-04f206996b FEDORA:FEDORA-2022-3d9d67f558 GLSA-202209-24 L3:63782 MISC:cert-portal.siemens.com:CVE-2022-32262 MISC:github.com:CVE-2022-25236 MISC:packetstormsecurity.com:CVE-2022-22787 MISC:www.oracle.com:CVE-2022-21498 MLIST:[debian-lts-announce] 20220307 [SECURITY] [DLA 2935-1] expat security update OSS:2022/02/19/1 Oracle:CVE-2022-25236 Oracle:CVE-2022-25315 RHSA-2022:0815 RHSA-2022:0816 RHSA-2022:0817 RHSA-2022:0818 RHSA-2022:0824 RHSA-2022:0843 RHSA-2022:0845 RHSA-2022:0847 RHSA-2022:0850 RHSA-2022:0853 RHSA-2022:0951 RHSA-2022:1012 RHSA-2022:1053 RHSA-2022:1068 RHSA-2022:1069 RHSA-2022:1070 RHSA-2022:1263 RHSA-2022:1309 RHSA-2022:7144 RHSA-2022:7811 SMASH Issue 323929 bdo#1005894 bdo#1005895 bnc#1196025 bnc#1196784 jsc#CAR-1531 rh#2056350 rh#2056354 rh#2056363 rh#2056366 rh#2056370 |
CVE-2022-25258 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-25258 CVE-2022-25258 D:CVE-2022-25258 DSA-5092 DSA-5096 FEDORA:FEDORA-2022-9d4e48836d MISC:cdn.kernel.org:CVE-2022-25258 MISC:github.com:CVE-2022-25258 MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update OSS:2021/07/22/1 OSS:2022/01/25/12 SMASH Issue 324016 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1196095 bnc#1196132 jsc#CAR-1604 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2044561 rh#2053632 rh#2055502 rh#2059923 |
CVE-2022-2526 | systemd:Not affected | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2022-2526 CVE-2022-2526 L3:64045 MISC:github.com:CVE-2022-2526 Oracle:CVE-2022-2526 RHSA-2022:6160 RHSA-2022:6161 RHSA-2022:6162 RHSA-2022:6163 RHSA-2022:6206 RHSA-2022:6551 SMASH Issue 340316 bnc#1202574 bnc#1203000 jsc#CAR-1975 rh#2109926 |
CVE-2022-25265 | gcc:Not affected, kernel-source-rt:Not affected | important | () | CONFIRM:security.netapp.com:CVE-2022-25265 CVE-2022-25265 D:CVE-2022-25265 MISC:github.com:CVE-2022-25265 RHSA-2023:2736 RHSA-2023:2951 SMASH Issue 324010 bnc#1196134 rh#2055499 |
CVE-2022-25313 | expat:Released | moderate | 6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2022-25315 CVE-2022-25313 D:CVE-2022-25313 DSA-5085 FEDORA:FEDORA-2022-04f206996b FEDORA:FEDORA-2022-3d9d67f558 GLSA-202209-24 MISC:cert-portal.siemens.com:CVE-2022-32262 MISC:github.com:CVE-2022-25313 MISC:www.oracle.com:CVE-2022-21498 MLIST:[debian-lts-announce] 20220307 [SECURITY] [DLA 2935-1] expat security update OSS:2022/02/19/1 Oracle:CVE-2022-25236 Oracle:CVE-2022-25315 RHSA-2022:5244 RHSA-2022:5314 RHSA-2022:7143 RHSA-2022:7144 RHSA-2022:7811 SMASH Issue 324167 bdo#1005894 bdo#1005895 bnc#1196168 jsc#CAR-1540 rh#2056350 rh#2056354 rh#2056363 rh#2056366 rh#2056370 |
CVE-2022-25314 | expat:Released | important | 8.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-25315 CVE-2022-25314 D:CVE-2022-25314 DSA-5085 FEDORA:FEDORA-2022-04f206996b FEDORA:FEDORA-2022-3d9d67f558 GLSA-202209-24 MISC:cert-portal.siemens.com:CVE-2022-32262 MISC:github.com:CVE-2022-25314 MISC:www.oracle.com:CVE-2022-21498 OSS:2022/02/19/1 Oracle:CVE-2022-25236 Oracle:CVE-2022-25315 RHSA-2022:5244 RHSA-2022:5314 RHSA-2022:7144 RHSA-2022:7811 SMASH Issue 324166 bdo#1005894 bdo#1005895 bnc#1196169 jsc#CAR-1541 rh#2056350 rh#2056354 rh#2056363 rh#2056366 rh#2056370 |
CVE-2022-25315 | expat:Released | important | 8.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-25315 CVE-2022-25315 D:CVE-2022-25315 DSA-5085 FEDORA:FEDORA-2022-04f206996b FEDORA:FEDORA-2022-3d9d67f558 GLSA-202209-24 L3:63782 MISC:cert-portal.siemens.com:CVE-2022-32262 MISC:github.com:CVE-2022-25315 MISC:www.oracle.com:CVE-2022-21498 MLIST:[debian-lts-announce] 20220307 [SECURITY] [DLA 2935-1] expat security update OSS:2022/02/19/1 Oracle:CVE-2022-25236 Oracle:CVE-2022-25315 RHSA-2022:0815 RHSA-2022:0816 RHSA-2022:0817 RHSA-2022:0818 RHSA-2022:0824 RHSA-2022:0843 RHSA-2022:0845 RHSA-2022:0847 RHSA-2022:0850 RHSA-2022:0853 RHSA-2022:0951 RHSA-2022:1012 RHSA-2022:1053 RHSA-2022:1068 RHSA-2022:1069 RHSA-2022:1070 RHSA-2022:1263 RHSA-2022:1309 RHSA-2022:7144 RHSA-2022:7811 SMASH Issue 324165 bdo#1005894 bdo#1005895 bnc#1196171 jsc#CAR-1542 rh#2056350 rh#2056354 rh#2056363 rh#2056366 rh#2056370 |
CVE-2022-25368 | kernel-source-rt:Already fixed | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2022-23960 CVE-2022-25368 MISC:amperecomputing.com:CVE-2022-25368 MISC:developer.arm.com:CVE-2022-25368 RHSA-2022:7683 SMASH Issue 325839 bnc#1197000 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 rh#2062284 rh#2141026 |
CVE-2022-25375 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2022-25375 DSA-5092 DSA-5096 MISC:cdn.kernel.org:CVE-2022-25258 MISC:github.com:CVE-2022-25375 MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update OSS:2021/07/22/1 OSS:2022/01/25/12 OSS:2022/02/21/1 OSS:2022/Q1/151 SMASH Issue 324397 SMASH Issue 324456 bdo#988044 bdo#989285 bdo#990411 bdo#994050 bnc#1196235 jsc#CAR-1600 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2044561 rh#2053632 rh#2055502 rh#2059923 |
CVE-2022-25636 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-25636 CVE-2022-25636 DSA-5095 DSA-5096 MISC:git.kernel.org:CVE-2022-25636 MISC:git.kernel.org:OSS:2022/02/21/2 MISC:github.com:CVE-2022-25636 MISC:nickgregory.me:CVE-2022-25636 MISC:packetstormsecurity.com:CVE-2022-0492 MISC:www.oracle.com:CVE-2022-21586 OSS:2021/07/22/1 OSS:2022/01/25/12 OSS:2022/02/21/2 OSS:2022/02/22/1 OSS:2022/Q1/153 Oracle:CVE-2022-25636 RHSA-2022:1413 RHSA-2022:1418 RHSA-2022:1455 RHSA-2022:1535 RHSA-2022:1550 RHSA-2022:1555 RHSA-2022:4896 SMASH Issue 324487 bdo#988044 bdo#989285 bdo#990279 bdo#990411 bdo#994050 bnc#1196299 bnc#1196301 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951 rh#1980646 rh#1997467 rh#2044561 rh#2053632 rh#2056830 rh#2059923 |
CVE-2022-2571 | vim:Released | moderate | 5.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) | CONFIRM:huntr.dev:CVE-2022-2571 CVE-2022-2571 MISC:github.com:CVE-2022-2571 SMASH Issue 338574 bnc#1202046 jsc#CAR-1941 rh#2116877 |
CVE-2022-2580 | vim:Released | moderate | 5.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) | CONFIRM:huntr.dev:CVE-2022-2580 CVE-2022-2580 MISC:github.com:CVE-2022-2580 SMASH Issue 338573 bnc#1202049 jsc#CAR-1946 rh#2116874 |
CVE-2022-2581 | vim:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N) | CONFIRM:huntr.dev:CVE-2022-2581 CVE-2022-2581 L3:64124 MISC:github.com:CVE-2022-2581 SMASH Issue 338572 bnc#1202050 jsc#CAR-1945 rh#2116873 |
CVE-2022-2585 | kernel-source-rt:Not affected | important | 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-2585 D:CVE-2022-26373 D:CVE-2022-36879 D:CVE-2022-36946 DSA-5184 DSA-5207 OSS:2022/08/09/5 OSS:2022/08/09/6 OSS:2022/08/09/7 OSS:2022/Q3/114 OSS:2022/Q3/115 OSS:2022/Q3/116 RHSA-2022:7318 RHSA-2022:7319 RHSA-2022:7330 SMASH Issue 338820 SMASH Issue 338821 ZDI-22-1117 ZDI-22-1118 bnc#1202094 bnc#1202163 https://lore.kernel.org/lkml/20220809170751.164716-1-cascardo@canonical.com/T/#u https://ubuntu.com/security/notices/USN-5564-1 https://ubuntu.com/security/notices/USN-5565-1 https://ubuntu.com/security/notices/USN-5566-1 https://ubuntu.com/security/notices/USN-5567-1 linux.git:commit:470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2 linux.git:commit:9ad36309e2719a884f946678e0296be10f0bb4c1 rh#2090226 rh#2103148 rh#2114849 rh#2114874 rh#2114878 rh#2115065 rh#2115278 rh#2119855 |
CVE-2022-2586 | kernel-source-rt:Released | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-2586 D:CVE-2022-26373 D:CVE-2022-36879 D:CVE-2022-36946 DSA-5184 DSA-5207 L3:65547 OSS:2022/08/09/5 OSS:2022/08/09/6 OSS:2022/08/09/7 OSS:2022/Q3/114 OSS:2022/Q3/115 OSS:2022/Q3/116 RHSA-2022:7444 RHSA-2022:7683 RHSA-2022:7933 RHSA-2022:8267 SMASH Issue 338822 SMASH Issue 338823 ZDI-22-1117 ZDI-22-1118 bnc#1202095 https://lore.kernel.org/netfilter-devel/20220809170148.164591-1-cascardo@canonical.com/T/#t https://ubuntu.com/security/notices/USN-5557-1 https://ubuntu.com/security/notices/USN-5560-1 https://ubuntu.com/security/notices/USN-5560-2 https://ubuntu.com/security/notices/USN-5562-1 https://ubuntu.com/security/notices/USN-5564-1 https://ubuntu.com/security/notices/USN-5565-1 https://ubuntu.com/security/notices/USN-5566-1 https://ubuntu.com/security/notices/USN-5567-1 https://ubuntu.com/security/notices/USN-5582-1 https://www.zerodayinitiative.com/advisories/ZDI-22-1118/ jsc#CAR-1960 linux.git:commit:470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2 linux.git:commit:9ad36309e2719a884f946678e0296be10f0bb4c1 rh#2090226 rh#2103148 rh#2114849 rh#2114874 rh#2114878 rh#2115065 rh#2115278 rh#2119855 |
CVE-2022-2588 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-36946 CVE-2022-2588 CVE-2022-3635 CVE-2022-42703 D:CVE-2022-26373 D:CVE-2022-3635 D:CVE-2022-36879 D:CVE-2022-36946 DSA-5184 DSA-5207 DSA-5324 L3:63917 L3:64012 L3:64086 L3:64306 L3:64310 L3:64329 L3:64525 L3:64549 L3:64602 L3:64716 L3:64728 L3:64743 L3:65176 L3:65426 L3:66045 MISC:bugs.chromium.org:CVE-2022-42703 MISC:cdn.kernel.org:CVE-2022-42703 MISC:git.kernel.org:CVE-2022-42703 MISC:github.com:CVE-2022-42703 MISC:googleprojectzero.blogspot.com:/2022/12/exploiting-CVE-2022-42703-bringing-back-the-stack-attack.html MISC:marc.info:CVE-2022-36946 MLIST:[debian-lts-announce] 20220911 [SECURITY] [DLA 3102-1] linux-5.10 new package MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update OSS:2022/08/09/5 OSS:2022/08/09/6 OSS:2022/08/09/7 OSS:2022/Q3/114 OSS:2022/Q3/115 OSS:2022/Q3/116 RHSA-2022:6551 RHSA-2022:6872 RHSA-2022:6875 RHSA-2022:6978 RHSA-2022:6983 RHSA-2022:6991 RHSA-2022:7110 RHSA-2022:7134 RHSA-2022:7137 RHSA-2022:7146 RHSA-2022:7171 RHSA-2022:7173 RHSA-2022:7279 RHSA-2022:7280 RHSA-2022:7337 RHSA-2022:7338 RHSA-2022:7344 RHSA-2022:7885 RHSA-2023:1091 RHSA-2023:1092 RHSA-2023:2148 RHSA-2023:2458 RHSA-2023:2736 RHSA-2023:2951 RHSA-2023:3388 RHSA-2023:4022 RHSA-2023:4023 RHSA-2023:4137 RHSA-2023:4138 SMASH Issue 338824 SMASH Issue 338825 ZDI-22-1117 ZDI-22-1118 bnc#1201941 bnc#1202096 bnc#1202961 bnc#1203613 bnc#1204168 bnc#1204170 bnc#1204631 bnc#1204636 bnc#1205058 bnc#1205085 git.kernel.org:CVE-2022-3635 https://github.com/Markakd/CVE-2022-2588 https://lore.kernel.org/netdev/20220809170518.164662-1-cascardo@canonical.com/T/#u https://ubuntu.com/security/notices/USN-5557-1 https://ubuntu.com/security/notices/USN-5560-1 https://ubuntu.com/security/notices/USN-5560-2 https://ubuntu.com/security/notices/USN-5562-1 https://ubuntu.com/security/notices/USN-5564-1 https://ubuntu.com/security/notices/USN-5565-1 https://ubuntu.com/security/notices/USN-5566-1 https://ubuntu.com/security/notices/USN-5567-1 https://ubuntu.com/security/notices/USN-5582-1 https://ubuntu.com/security/notices/USN-5588-1 https://www.zerodayinitiative.com/advisories/ZDI-22-1117/ jsc#CAR-1930 jsc#CAR-1961 jsc#CAR-2091 jsc#CAR-2137 linux.git:commit:31185df7e2b1d2fa1de4900247a12d7b9c7087eb linux.git:commit:33172ab50a53578a95691310f49567c9266968b0 linux.git:commit:3777ea7bac3113005b7180e6b9dadf16d19a5827 linux.git:commit:42baefac638f06314298087394b982ead9ec444b linux.git:commit:470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2 linux.git:commit:5cadd4bb1d7fc9ab201ac14620d1a478357e4ebd linux.git:commit:66e3531b33ee51dad17c463b4d9c9f52e341503d linux.git:commit:6b1775f26a2da2b05a6dc8ec2b5d14e9a4701a1a linux.git:commit:9ad36309e2719a884f946678e0296be10f0bb4c1 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:abf1fd5919d6238ee3bc5eb4a9b6c3947caa6638 linux.git:commit:b0576cc9c6b843d99c6982888d59a56209341888 linux.git:commit:d3b6372c5881cb54925212abb62c521df8ba4809 linux.git:commit:eadb2f47a3ced5c64b23b90fd2a3463f63726066 linux.git:commit:fd3d91ab1c6ab0628fe642dd570b56302c30a792 rh#1832397 rh#2015046 rh#2063236 rh#2066706 rh#2066799 rh#2084125 rh#2084183 rh#2090226 rh#2103148 rh#2108691 rh#2112688 rh#2112693 rh#2114849 rh#2114874 rh#2114878 rh#2115065 rh#2115278 rh#2119855 rh#2120664 rh#2122960 rh#2124475 rh#2130141 rh#2132640 rh#2133483 rh#2148458 rh#2150953 vuldb.com:CVE-2022-3635 |
CVE-2022-2590 | kernel-source-rt:Not affected, ltp:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-2590 D:CVE-2022-2590 MISC:lists.openwall.net:OSS:2022/08/08/2 MISC:lore.kernel.org:CVE-2022-2590 OSS:2022/08/08/1 OSS:2022/08/08/2 OSS:2022/08/08/7 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/Q3/99 Oracle:CVE-2016-5195 SMASH Issue 338546 SMASH Issue 338547 bnc#1202013 bnc#1202089 https://lore.kernel.org/linux-mm/20220808073232.8808-1-david%40redhat.com/ linux.git:commit:5535be3099717646781ce1540cf725965d680e7b rh#1384344 rh#2116175 |
CVE-2022-2598 | vim:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:huntr.dev:CVE-2022-2598 CVE-2022-2598 MISC:github.com:CVE-2022-2598 MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update SMASH Issue 338568 bnc#1202051 jsc#CAR-1947 rh#2116868 |
CVE-2022-2602 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-2602 DSA-5257 OSS:2022/Q4/30 SMASH Issue 344902 SMASH Issue 344903 ZDI-22-1462 bnc#1204228 bnc#1205186 http://packetstormsecurity.com/files/176533/Linux-Broken-Unix-GC-Interaction-Use-After-Free.html https://ubuntu.com/security/notices/USN-5691-1 https://ubuntu.com/security/notices/USN-5692-1 https://ubuntu.com/security/notices/USN-5693-1 https://ubuntu.com/security/notices/USN-5700-1 https://ubuntu.com/security/notices/USN-5752-1 linux.git:commit:0b7808818cb9df6680f98996b8e9a439fa7bcc2f linux.git:commit:8f033d2becc24aa6bfd2a5c104407963560caabc linux.git:commit:aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d linux.git:commit:b2d03cabe2b2e150ff5a381731ea0355459be09f linux.git:commit:bcca852027e5878aec911a347407ecc88d6fff7f linux.git:commit:ff05d4b45dd89b922578dac497dcabf57cf771c6 rh#2123056 rh#2134377 rh#2134440 rh#2134451 rh#2134506 rh#2134517 rh#2139586 rh#2139598 |
CVE-2022-26280 | libarchive:Released | important | 7.4 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H) | CVE-2022-26280 CVE-2022-28066 D:CVE-2022-26280 FEDORA:FEDORA-2022-bbb5ec21b2 GLSA-202208-26 MISC:github.com:CVE-2022-26280 RHSA-2022:5252 SMASH Issue 327442 bnc#1197634 bnc#1199230 jsc#CAR-1633 jsc#CAR-1743 rh#2071931 |
CVE-2022-26365 | kernel-source-rt:Released | moderate | 6.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H) | CONFIRM:xenbits.xen.org:CVE-2022-33742 CVE-2022-26365 CVE-2022-33740 CVE-2022-33741 CVE-2022-33742 D:CVE-2022-26365 D:CVE-2022-33740 D:CVE-2022-33741 DSA-5191 FEDORA:FEDORA-2022-2c9f8224f8 FEDORA:FEDORA-2022-c4ec706488 MISC:github.com:OSS:2022/07/02/3 MISC:xenbits.xenproject.org:CVE-2022-33742 MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update OSS:2022/07/02/3 OSS:2022/07/05/6 OSS:2022/Q3/22 SMASH Issue 335221 SMASH Issue 335223 ZDI-23-1834 bnc#1200762 jsc#CAR-1882 linux.git:commit:2400617da7eebf9167d71a46122828bc479d64c9 linux.git:commit:2f446ffe9d737e9a844b97887919c4fda18246e7 linux.git:commit:307c8de2b02344805ebead3440d8feed28f2f010 linux.git:commit:4491001c2e0fa69efbb748c96ec96b100a5cdb7e linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:e35e5b6f695d241ffb1d223207da58a1fbcdff4b linux.git:commit:f63c2c2032c2e3caad9add3b82cc6e91c376fd26 rh#2092427 rh#2093146 rh#2104114 rh#2104423 rh#2104746 rh#2107924 rh#2108691 |
CVE-2022-26373 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CONFIRM:security.netapp.com:CVE-2022-26373 CVE-2022-26373 D:CVE-2022-26373 D:CVE-2022-36879 D:CVE-2022-36946 DSA-5184 DSA-5207 L3:65516 L3:67055 MISC:www.intel.com:CVE-2022-26373 MLIST:[debian-lts-announce] 20220911 [SECURITY] [DLA 3102-1] linux-5.10 new package MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update OSS:2022/08/09/5 OSS:2022/08/09/6 OSS:2022/08/09/7 OSS:2022/Q3/114 OSS:2022/Q3/115 OSS:2022/Q3/116 RHSA-2022:7337 RHSA-2022:7338 RHSA-2022:7444 RHSA-2022:7683 RHSA-2022:7933 RHSA-2022:8267 RHSA-2022:8973 RHSA-2022:8974 RHSA-2023:0440 SMASH Issue 337835 bnc#1201726 linux.git:commit:470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2 linux.git:commit:9ad36309e2719a884f946678e0296be10f0bb4c1 rh#2090226 rh#2103148 rh#2114849 rh#2114874 rh#2114878 rh#2115065 rh#2115278 rh#2119855 |
CVE-2022-2639 | kernel-source-rt:Released | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H) | CVE-2022-2639 MISC:github.com:CVE-2022-2639 RHSA-2022:7444 RHSA-2022:7683 RHSA-2022:7933 RHSA-2022:8267 RHSA-2022:8765 RHSA-2022:8767 RHSA-2022:8768 RHSA-2022:8809 RHSA-2022:8831 RHSA-2022:8940 RHSA-2022:8941 RHSA-2022:8973 RHSA-2022:8974 RHSA-2022:8989 RHSA-2022:9082 RHSA-2023:0058 RHSA-2023:0059 SMASH Issue 338841 bnc#1202154 jsc#CAR-1950 rh#2084479 |
CVE-2022-26488 | python3:Not affected | moderate | () | CONFIRM:security.netapp.com:CVE-2022-26488 CVE-2022-26488 MISC:mail.python.org:CVE-2022-26488 SMASH Issue 325794 bnc#1203151 |
CVE-2022-26490 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-26490 CVE-2022-26490 D:CVE-2022-1016 D:CVE-2022-2153 D:CVE-2022-26490 D:CVE-2022-32296 DSA-5127 DSA-5161 DSA-5173 DSA-5184 FEDORA:FEDORA-2022-9342e59a98 FEDORA:FEDORA-2022-de4474b89d L3:65879 MISC:anatomic.rip:OSS:2024/Q2/172 MISC:blog.exodusintel.com:OSS:2024/Q2/172 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:git.kernel.org:OSS:2024/Q2/172 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:CVE-2022-26490 MISC:github.com:OSS:2022/04/02/2 MISC:github.com:OSS:2022/Q3/101 MISC:research.nccgroup.com:OSS:2022/09/02/9 MISC:ruia-ruia.github.io:OSS:2022/Q3/101 MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/04/22/3 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/22/1 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/Q3/101 OSS:2022/Q3/141 OSS:2024/04/24/3 OSS:2024/Q2/172 Oracle:CVE-2022-21123 SMASH Issue 325424 ZDI-23-1834 bdo#1006346 bdo#1013299 bdo#922204 bnc#1196830 bnc#1201656 https://bugs.chromium.org/p/project-zero/issues/detail?id=2504 jsc#CAR-1573 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1832397 rh#2039448 rh#2056381 rh#2058395 rh#2058955 rh#2061633 rh#2062284 rh#2064232 rh#2064604 rh#2066614 rh#2066706 rh#2066819 rh#2069736 rh#2070694 rh#2071047 rh#2073064 rh#2074208 rh#2074441 rh#2078456 rh#2084435 rh#2084458 rh#2085300 rh#2086753 rh#2088021 rh#2089815 rh#2090237 rh#2090240 rh#2090241 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2104423 rh#2141026 |
CVE-2022-2663 | kernel-source-rt:Released | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N) | CVE-2022-2663 D:CVE-2022-2663 DSA-5257 L3:66055 MISC:dgl.cx:CVE-2022-2663 MISC:lore.kernel.org:CVE-2022-2663 MISC:www.youtube.com:CVE-2022-2663 MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update OSS:2022/08/30/1 OSS:2022/Q4/30 RHSA-2023:2148 RHSA-2023:2458 RHSA-2023:2736 RHSA-2023:2951 SMASH Issue 338826 SMASH Issue 341245 ZDI-22-1462 bnc#1202097 https://lore.kernel.org/netfilter-devel/20220826045658.100360-1-dgl%40dgl.cx/T/ jsc#CAR-2008 linux.git:commit:0b7808818cb9df6680f98996b8e9a439fa7bcc2f linux.git:commit:8f033d2becc24aa6bfd2a5c104407963560caabc linux.git:commit:aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d linux.git:commit:b2d03cabe2b2e150ff5a381731ea0355459be09f linux.git:commit:bcca852027e5878aec911a347407ecc88d6fff7f linux.git:commit:ff05d4b45dd89b922578dac497dcabf57cf771c6 rh#2123056 rh#2134377 rh#2134440 rh#2134451 rh#2134506 rh#2134517 rh#2139586 rh#2139598 |
CVE-2022-26878 | kernel-source-rt:Not affected | low | 4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | CONFIRM:cdn.kernel.org:CVE-2021-44879 CVE-2022-26878 D:CVE-2022-26878 MISC:cdn.kernel.org:CVE-2022-26878 MISC:git.kernel.org:CVE-2022-26878 MISC:lore.kernel.org:CVE-2022-26878 OSS:2022/03/11/1 OSS:2022/Q1/175 SMASH Issue 325992 bnc#1197035 rh#2064113 |
CVE-2022-26966 | kernel-source-rt:Released | moderate | 4.6 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) | CONFIRM:security.netapp.com:CVE-2022-27223 CVE-2022-26966 D:CVE-2022-26966 MISC:cdn.kernel.org:CVE-2022-25258 MISC:git.kernel.org:CVE-2022-26966 MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update SMASH Issue 325454 SMASH Issue 326105 bnc#1196836 jsc#CAR-1596 rh#2063718 |
CVE-2022-27223 | kernel-source-rt:Not affected | moderate | 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | CONFIRM:security.netapp.com:CVE-2022-27223 CVE-2022-27223 D:CVE-2022-27223 MISC:cdn.kernel.org:CVE-2022-27223 MISC:github.com:CVE-2022-27223 MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update SMASH Issue 326379 bnc#1197245 rh#2064626 |
CVE-2022-27666 | kernel-source-rt:Released | important | 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-0995 CVE-2022-0886 CVE-2022-27666 D:CVE-2022-1016 D:CVE-2022-2153 D:CVE-2022-27666 D:CVE-2022-32296 DSA-5127 DSA-5161 DSA-5173 DSA-5184 MISC:anatomic.rip:OSS:2024/Q2/172 MISC:blog.exodusintel.com:OSS:2024/Q2/172 MISC:cdn.kernel.org:CVE-2022-27666 MISC:git.kernel.org:CVE-2022-27666 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:git.kernel.org:OSS:2024/Q2/172 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:CVE-2022-27666 MISC:github.com:OSS:2022/04/02/2 MISC:github.com:OSS:2022/Q3/101 MISC:research.nccgroup.com:OSS:2022/09/02/9 MISC:ruia-ruia.github.io:OSS:2022/Q3/101 OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/04/22/3 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/22/1 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/Q3/101 OSS:2022/Q3/141 OSS:2024/04/24/3 OSS:2024/Q2/172 Oracle:CVE-2022-21123 RHSA-2022:4809 RHSA-2022:4829 RHSA-2022:4835 RHSA-2022:4924 RHSA-2022:4942 RHSA-2022:5214 RHSA-2022:5219 RHSA-2022:5220 RHSA-2022:5224 RHSA-2022:5249 RHSA-2022:5267 RHSA-2022:5316 RHSA-2022:5344 RHSA-2022:5476 RHSA-2022:5678 SMASH Issue 327016 ZDI-23-1834 bdo#1006346 bdo#1013299 bdo#922204 bnc#1197131 bnc#1197133 bnc#1197462 https://bugs.chromium.org/p/project-zero/issues/detail?id=2504 jsc#CAR-1595 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1832397 rh#2039448 rh#2056381 rh#2058395 rh#2058955 rh#2061633 rh#2062284 rh#2064604 rh#2066614 rh#2066706 rh#2066819 rh#2067299 rh#2069736 rh#2070694 rh#2071047 rh#2073064 rh#2074208 rh#2074441 rh#2078456 rh#2084435 rh#2084458 rh#2085300 rh#2086753 rh#2088021 rh#2089815 rh#2090237 rh#2090240 rh#2090241 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2104423 rh#2141026 |
CVE-2022-27774 | curl:Ignore | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) | CONFIRM:security.netapp.com:CVE-2022-27776 CVE-2022-27774 CVE-2023-23916 CVE-2023-27538 D:CVE-2022-27774 DSA-5197 GLSA-202212-01 MISC:curl.se:OSS:2022/Q2/210 MISC:curl.se:OSS:2022/Q2/62 MISC:curl.se:OSS:2022/Q2/96 MISC:github.com:OSS:2023/02/15/3 MISC:github.com:OSS:2023/03/20/6 MISC:hackerone.com:CVE-2022-27774 MLIST:[debian-lts-announce] 20230128 [SECURITY] [DLA 3288-1] curl security update OSS:2022/Q2/62 OSS:2023/02/15/3 OSS:2023/03/20/6 Oracle:CVE-2022-27782 Oracle:CVE-2022-32206 Oracle:CVE-2022-32207 RHSA-2022:5245 RHSA-2022:5313 SMASH Issue 329490 bdo#1010252 bdo#1010253 bdo#1010254 bdo#1010295 bdo#989228 bdo#991492 bnc#1198608 jsc#CAR-1715 rh#2077541 rh#2077547 rh#2078388 rh#2078408 rh#2082204 rh#2082215 rh#2099300 rh#2099305 rh#2099306 |
CVE-2022-27775 | curl:Released | moderate | 5.6 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L) | CONFIRM:security.netapp.com:CVE-2022-27776 CVE-2022-27775 CVE-2023-23916 CVE-2023-27538 D:CVE-2022-27774 DSA-5197 GLSA-202212-01 MISC:curl.se:OSS:2022/Q2/210 MISC:curl.se:OSS:2022/Q2/63 MISC:curl.se:OSS:2022/Q2/96 MISC:github.com:OSS:2023/02/15/3 MISC:github.com:OSS:2023/03/20/6 MISC:hackerone.com:CVE-2022-27775 OSS:2022/Q2/63 OSS:2023/02/15/3 OSS:2023/03/20/6 Oracle:CVE-2022-27782 Oracle:CVE-2022-32206 Oracle:CVE-2022-32207 RHSA-2022:8299 SMASH Issue 329695 SMASH Issue 329696 bdo#1010252 bdo#1010253 bdo#1010254 bdo#1010295 bdo#989228 bdo#991492 bnc#1198723 jsc#CAR-1718 rh#2077541 rh#2077547 rh#2078388 rh#2078408 rh#2082204 rh#2082215 rh#2099300 rh#2099305 rh#2099306 |
CVE-2022-27776 | curl:Released | moderate | 4.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N) | CONFIRM:security.netapp.com:CVE-2022-27776 CVE-2022-27776 CVE-2023-23916 CVE-2023-27538 D:CVE-2022-27774 DSA-5197 FEDORA:FEDORA-2022-bca2c95559 FEDORA:FEDORA-2022-f83aec6d57 GLSA-202212-01 MISC:curl.se:OSS:2022/Q2/210 MISC:curl.se:OSS:2022/Q2/64 MISC:curl.se:OSS:2022/Q2/96 MISC:github.com:OSS:2023/02/15/3 MISC:github.com:OSS:2023/03/20/6 MISC:hackerone.com:CVE-2022-27776 MLIST:[debian-lts-announce] 20220828 [SECURITY] [DLA 3085-1] curl security update OSS:2022/Q2/64 OSS:2023/02/15/3 OSS:2023/03/20/6 Oracle:CVE-2018-1000007 Oracle:CVE-2022-27782 Oracle:CVE-2022-32206 Oracle:CVE-2022-32207 RHSA-2022:5245 RHSA-2022:5313 SMASH Issue 329920 bdo#1010252 bdo#1010253 bdo#1010254 bdo#1010295 bdo#989228 bdo#991492 bnc#1198766 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7N5ZBWLNNPZKFK7Q4KEHGCJ2YELQEUJP/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKKOQXPYLMBSEVDHFS32BPBR3ZQJKY5B/ jsc#CAR-1716 rh#1955316 rh#2077541 rh#2077547 rh#2078388 rh#2078408 rh#2082204 rh#2082215 rh#2099300 rh#2099305 rh#2099306 |
CVE-2022-27778 | curl:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N) | CONFIRM:security.netapp.com:CVE-2022-21569 CONFIRM:security.netapp.com:CVE-2022-30115 CVE-2022-27778 MISC:curl.se:OSS:2022/Q2/92 MISC:hackerone.com:CVE-2022-27778 MISC:www.oracle.com:CVE-2022-21586 OSS:2022/Q2/92 Oracle:CVE-2022-27778 SMASH Issue 330782 SMASH Issue 330783 bnc#1199220 rh#2082194 |
CVE-2022-27779 | curl:Not affected | moderate | 6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N) | CONFIRM:security.netapp.com:CVE-2022-30115 CVE-2022-27779 GLSA-202212-01 MISC:curl.se:OSS:2022/Q2/93 MISC:hackerone.com:CVE-2022-27779 OSS:2022/Q2/93 SMASH Issue 330784 SMASH Issue 330785 bnc#1199221 rh#2082202 |
CVE-2022-27780 | curl:Not affected | moderate | 6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N) | CONFIRM:security.netapp.com:CVE-2022-30115 CVE-2022-27780 GLSA-202212-01 MISC:curl.se:OSS:2022/Q2/94 MISC:hackerone.com:CVE-2022-27780 OSS:2022/Q2/94 SMASH Issue 330786 SMASH Issue 330787 bnc#1199222 rh#2082203 |
CVE-2022-27781 | curl:Released | low | 3.7 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) | CONFIRM:security.netapp.com:CVE-2022-30115 CVE-2022-27781 CVE-2023-23916 CVE-2023-27538 D:CVE-2022-27774 DSA-5197 GLSA-202212-01 MISC:curl.se:OSS:2022/Q2/210 MISC:curl.se:OSS:2022/Q2/95 MISC:curl.se:OSS:2022/Q2/96 MISC:github.com:OSS:2023/02/15/3 MISC:github.com:OSS:2023/03/20/6 MISC:hackerone.com:CVE-2022-27781 MLIST:[debian-lts-announce] 20220828 [SECURITY] [DLA 3085-1] curl security update OSS:2022/Q2/95 OSS:2023/02/15/3 OSS:2023/03/20/6 Oracle:CVE-2022-27782 Oracle:CVE-2022-32206 Oracle:CVE-2022-32207 RHSA-2022:8840 RHSA-2022:8841 SMASH Issue 330788 SMASH Issue 330789 bdo#1010252 bdo#1010253 bdo#1010254 bdo#1010295 bdo#989228 bdo#991492 bnc#1199223 jsc#CAR-1767 rh#2077541 rh#2077547 rh#2078388 rh#2078408 rh#2082204 rh#2082215 rh#2099300 rh#2099305 rh#2099306 |
CVE-2022-27782 | curl:Released | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) | CONFIRM:security.netapp.com:CVE-2022-30115 CVE-2022-27782 CVE-2023-23916 CVE-2023-27538 D:CVE-2022-27774 DSA-5197 GLSA-202212-01 L3:64216 L3:64537 MISC:curl.se:OSS:2022/Q2/210 MISC:curl.se:OSS:2022/Q2/96 MISC:github.com:OSS:2023/02/15/3 MISC:github.com:OSS:2023/03/20/6 MISC:hackerone.com:CVE-2022-27782 MLIST:[debian-lts-announce] 20220828 [SECURITY] [DLA 3085-1] curl security update OSS:2022/Q2/96 OSS:2023/02/15/3 OSS:2023/03/20/6 Oracle:CVE-2022-27782 Oracle:CVE-2022-32206 Oracle:CVE-2022-32207 RHSA-2022:5245 RHSA-2022:5313 SMASH Issue 330790 SMASH Issue 330791 bdo#1010252 bdo#1010253 bdo#1010254 bdo#1010295 bdo#989228 bdo#991492 bnc#1199224 jsc#CAR-1768 rh#2077541 rh#2077547 rh#2078388 rh#2078408 rh#2082204 rh#2082215 rh#2099300 rh#2099305 rh#2099306 |
CVE-2022-2785 | kernel-source-rt:Not affected | moderate | () | CONFIRM:git.kernel.org:CVE-2022-2785 CONFIRM:lore.kernel.org:CVE-2022-2785 CVE-2022-2785 SMASH Issue 343369 bnc#1203734 rh#2129419 |
CVE-2022-27943 | binutils:Ignore | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CVE-2022-27943 D:CVE-2022-27943 FEDORA:FEDORA-2022-c9a1fd5370 L3:64643 MISC:gcc.gnu.org:CVE-2022-27943 MISC:sourceware.org:CVE-2022-27943 SMASH Issue 327299 bnc#1197592 jsc#CAR-1631 rh#2071728 |
CVE-2022-27950 | kernel-source-rt:Not affected | moderate | 5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-27950 MISC:cdn.kernel.org:CVE-2022-27950 MISC:git.kernel.org:CVE-2022-27950 MISC:git.kernel.org:OSS:2022/03/13/1 MISC:github.com:CVE-2022-27950 OSS:2022/03/13/1 RHSA-2022:7444 RHSA-2022:7683 SMASH Issue 327324 bnc#1197646 rh#2069408 |
CVE-2022-28066 | libarchive:Released | important | 5.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) | CVE-2022-26280 CVE-2022-28066 D:CVE-2022-26280 FEDORA:FEDORA-2022-bbb5ec21b2 GLSA-202208-26 MISC:github.com:CVE-2022-26280 RHSA-2022:5252 SMASH Issue 327442 SMASH Issue 330728 bnc#1197634 bnc#1199230 jsc#CAR-1633 jsc#CAR-1743 rh#2071931 |
CVE-2022-2816 | vim:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:huntr.dev:CVE-2022-2816 CVE-2022-2816 D:CVE-2022-2816 FEDORA:FEDORA-2022-6f5e420e52 L3:64177 L3:64184 MISC:github.com:CVE-2022-2816 SMASH Issue 339915 bnc#1202421 https://security.gentoo.org/glsa/202305-16 jsc#CAR-1968 rh#2119042 |
CVE-2022-2817 | vim:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:huntr.dev:CVE-2022-2817 CVE-2022-2817 D:CVE-2022-2817 FEDORA:FEDORA-2022-6f5e420e52 MISC:github.com:CVE-2022-2817 SMASH Issue 339912 bnc#1202420 https://security.gentoo.org/glsa/202305-16 jsc#CAR-1966 rh#2119043 |
CVE-2022-2819 | vim:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:huntr.dev:CVE-2022-2819 CVE-2022-2819 FEDORA:FEDORA-2022-6f5e420e52 L3:64177 L3:64184 MISC:github.com:CVE-2022-2819 SMASH Issue 339855 bnc#1202414 https://security.gentoo.org/glsa/202305-16 jsc#CAR-1965 rh#2118594 |
CVE-2022-28281 | mozilla-nss:Released | important | 7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H) | CONFIRM:github.com:CVE-2022-24713 CVE-2022-1097 CVE-2022-1196 CVE-2022-1197 CVE-2022-24713 CVE-2022-28281 CVE-2022-28282 CVE-2022-28283 CVE-2022-28284 CVE-2022-28285 CVE-2022-28286 CVE-2022-28287 CVE-2022-28288 CVE-2022-28289 D:CVE-2022-24713 DSA-5113 DSA-5118 FEDORA:FEDORA-2022-8436ac4c39 FEDORA:FEDORA-2022-ceb3e03c5e FEDORA:FEDORA-2022-d20d44ba98 GLSA-202208-08 GLSA-202208-14 MISC:bugzilla.mozilla.org:/buglist.cgi MISC:bugzilla.mozilla.org:/show_bug.cgi MISC:github.com:CVE-2022-24713 MISC:groups.google.com:CVE-2022-24713 MISC:www.mozilla.org:/security/advisories/mfsa2022-13/ MISC:www.mozilla.org:/security/advisories/mfsa2022-14/ MISC:www.mozilla.org:/security/advisories/mfsa2022-15/ MLIST:[debian-lts-announce] 20220407 [SECURITY] [DLA 2971-1] firefox-esr security update MLIST:[debian-lts-announce] 20220411 [SECURITY] [DLA 2978-1] thunderbird security update Mozilla Foundation Security Advisory 2022-13 RHSA-2022:1283 RHSA-2022:1284 RHSA-2022:1285 RHSA-2022:1286 RHSA-2022:1287 RHSA-2022:1301 RHSA-2022:1302 RHSA-2022:1303 RHSA-2022:1305 RHSA-2022:1326 SMASH Issue 327815 bnc#1197903 jsc#CAR-1667 rh#2072559 rh#2072560 rh#2072561 rh#2072562 rh#2072563 rh#2072564 rh#2072565 rh#2072566 rh#2072963 xf#223379 |
CVE-2022-28282 | mozilla-nss:Released | important | 6.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) | CONFIRM:github.com:CVE-2022-24713 CVE-2022-1097 CVE-2022-1196 CVE-2022-1197 CVE-2022-24713 CVE-2022-28281 CVE-2022-28282 CVE-2022-28283 CVE-2022-28284 CVE-2022-28285 CVE-2022-28286 CVE-2022-28287 CVE-2022-28288 CVE-2022-28289 D:CVE-2022-24713 DSA-5113 DSA-5118 FEDORA:FEDORA-2022-8436ac4c39 FEDORA:FEDORA-2022-ceb3e03c5e FEDORA:FEDORA-2022-d20d44ba98 GLSA-202208-08 GLSA-202208-14 MISC:bugzilla.mozilla.org:/buglist.cgi MISC:bugzilla.mozilla.org:/show_bug.cgi MISC:github.com:CVE-2022-24713 MISC:groups.google.com:CVE-2022-24713 MISC:www.mozilla.org:/security/advisories/mfsa2022-13/ MISC:www.mozilla.org:/security/advisories/mfsa2022-14/ MISC:www.mozilla.org:/security/advisories/mfsa2022-15/ MLIST:[debian-lts-announce] 20220407 [SECURITY] [DLA 2971-1] firefox-esr security update MLIST:[debian-lts-announce] 20220411 [SECURITY] [DLA 2978-1] thunderbird security update Mozilla Foundation Security Advisory 2022-13 RHSA-2022:1283 RHSA-2022:1284 RHSA-2022:1285 RHSA-2022:1286 RHSA-2022:1287 RHSA-2022:1301 RHSA-2022:1302 RHSA-2022:1303 RHSA-2022:1305 RHSA-2022:1326 SMASH Issue 327815 bnc#1197903 jsc#CAR-1667 rh#2072559 rh#2072560 rh#2072561 rh#2072562 rh#2072563 rh#2072564 rh#2072565 rh#2072566 rh#2072963 xf#223379 |
CVE-2022-28283 | mozilla-nss:Released | important | 5.4 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N) | CONFIRM:github.com:CVE-2022-24713 CVE-2022-1097 CVE-2022-1196 CVE-2022-1197 CVE-2022-24713 CVE-2022-28281 CVE-2022-28282 CVE-2022-28283 CVE-2022-28284 CVE-2022-28285 CVE-2022-28286 CVE-2022-28287 CVE-2022-28288 CVE-2022-28289 D:CVE-2022-24713 DSA-5113 DSA-5118 FEDORA:FEDORA-2022-8436ac4c39 FEDORA:FEDORA-2022-ceb3e03c5e FEDORA:FEDORA-2022-d20d44ba98 GLSA-202208-08 GLSA-202208-14 MISC:bugzilla.mozilla.org:/buglist.cgi MISC:bugzilla.mozilla.org:/show_bug.cgi MISC:github.com:CVE-2022-24713 MISC:groups.google.com:CVE-2022-24713 MISC:www.mozilla.org:/security/advisories/mfsa2022-13/ MISC:www.mozilla.org:/security/advisories/mfsa2022-14/ MISC:www.mozilla.org:/security/advisories/mfsa2022-15/ MLIST:[debian-lts-announce] 20220407 [SECURITY] [DLA 2971-1] firefox-esr security update MLIST:[debian-lts-announce] 20220411 [SECURITY] [DLA 2978-1] thunderbird security update Mozilla Foundation Security Advisory 2022-13 RHSA-2022:1283 RHSA-2022:1284 RHSA-2022:1285 RHSA-2022:1286 RHSA-2022:1287 RHSA-2022:1301 RHSA-2022:1302 RHSA-2022:1303 RHSA-2022:1305 RHSA-2022:1326 SMASH Issue 327815 bnc#1197903 jsc#CAR-1667 rh#2072559 rh#2072560 rh#2072561 rh#2072562 rh#2072563 rh#2072564 rh#2072565 rh#2072566 rh#2072963 xf#223379 |
CVE-2022-28284 | mozilla-nss:Released | important | 6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N) | CONFIRM:github.com:CVE-2022-24713 CVE-2022-1097 CVE-2022-1196 CVE-2022-1197 CVE-2022-24713 CVE-2022-28281 CVE-2022-28282 CVE-2022-28283 CVE-2022-28284 CVE-2022-28285 CVE-2022-28286 CVE-2022-28287 CVE-2022-28288 CVE-2022-28289 D:CVE-2022-24713 DSA-5113 DSA-5118 FEDORA:FEDORA-2022-8436ac4c39 FEDORA:FEDORA-2022-ceb3e03c5e FEDORA:FEDORA-2022-d20d44ba98 GLSA-202208-08 GLSA-202208-14 MISC:bugzilla.mozilla.org:/buglist.cgi MISC:bugzilla.mozilla.org:/show_bug.cgi MISC:github.com:CVE-2022-24713 MISC:groups.google.com:CVE-2022-24713 MISC:www.mozilla.org:/security/advisories/mfsa2022-13/ MISC:www.mozilla.org:/security/advisories/mfsa2022-14/ MISC:www.mozilla.org:/security/advisories/mfsa2022-15/ MLIST:[debian-lts-announce] 20220407 [SECURITY] [DLA 2971-1] firefox-esr security update MLIST:[debian-lts-announce] 20220411 [SECURITY] [DLA 2978-1] thunderbird security update Mozilla Foundation Security Advisory 2022-13 RHSA-2022:1283 RHSA-2022:1284 RHSA-2022:1285 RHSA-2022:1286 RHSA-2022:1287 RHSA-2022:1301 RHSA-2022:1302 RHSA-2022:1303 RHSA-2022:1305 RHSA-2022:1326 SMASH Issue 327815 bnc#1197903 jsc#CAR-1667 rh#2072559 rh#2072560 rh#2072561 rh#2072562 rh#2072563 rh#2072564 rh#2072565 rh#2072566 rh#2072963 xf#223379 |
CVE-2022-28285 | mozilla-nss:Released | important | 6.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) | CONFIRM:github.com:CVE-2022-24713 CVE-2022-1097 CVE-2022-1196 CVE-2022-1197 CVE-2022-24713 CVE-2022-28281 CVE-2022-28282 CVE-2022-28283 CVE-2022-28284 CVE-2022-28285 CVE-2022-28286 CVE-2022-28287 CVE-2022-28288 CVE-2022-28289 D:CVE-2022-24713 DSA-5113 DSA-5118 FEDORA:FEDORA-2022-8436ac4c39 FEDORA:FEDORA-2022-ceb3e03c5e FEDORA:FEDORA-2022-d20d44ba98 GLSA-202208-08 GLSA-202208-14 MISC:bugzilla.mozilla.org:/buglist.cgi MISC:bugzilla.mozilla.org:/show_bug.cgi MISC:github.com:CVE-2022-24713 MISC:groups.google.com:CVE-2022-24713 MISC:www.mozilla.org:/security/advisories/mfsa2022-13/ MISC:www.mozilla.org:/security/advisories/mfsa2022-14/ MISC:www.mozilla.org:/security/advisories/mfsa2022-15/ MLIST:[debian-lts-announce] 20220407 [SECURITY] [DLA 2971-1] firefox-esr security update MLIST:[debian-lts-announce] 20220411 [SECURITY] [DLA 2978-1] thunderbird security update Mozilla Foundation Security Advisory 2022-13 RHSA-2022:1283 RHSA-2022:1284 RHSA-2022:1285 RHSA-2022:1286 RHSA-2022:1287 RHSA-2022:1301 RHSA-2022:1302 RHSA-2022:1303 RHSA-2022:1305 RHSA-2022:1326 SMASH Issue 327815 bnc#1197903 jsc#CAR-1667 rh#2072559 rh#2072560 rh#2072561 rh#2072562 rh#2072563 rh#2072564 rh#2072565 rh#2072566 rh#2072963 xf#223379 |
CVE-2022-28286 | mozilla-nss:Released | important | 4.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N) | CONFIRM:github.com:CVE-2022-24713 CVE-2022-1097 CVE-2022-1196 CVE-2022-1197 CVE-2022-24713 CVE-2022-28281 CVE-2022-28282 CVE-2022-28283 CVE-2022-28284 CVE-2022-28285 CVE-2022-28286 CVE-2022-28287 CVE-2022-28288 CVE-2022-28289 D:CVE-2022-24713 DSA-5113 DSA-5118 FEDORA:FEDORA-2022-8436ac4c39 FEDORA:FEDORA-2022-ceb3e03c5e FEDORA:FEDORA-2022-d20d44ba98 GLSA-202208-08 GLSA-202208-14 MISC:bugzilla.mozilla.org:/buglist.cgi MISC:bugzilla.mozilla.org:/show_bug.cgi MISC:github.com:CVE-2022-24713 MISC:groups.google.com:CVE-2022-24713 MISC:www.mozilla.org:/security/advisories/mfsa2022-13/ MISC:www.mozilla.org:/security/advisories/mfsa2022-14/ MISC:www.mozilla.org:/security/advisories/mfsa2022-15/ MLIST:[debian-lts-announce] 20220407 [SECURITY] [DLA 2971-1] firefox-esr security update MLIST:[debian-lts-announce] 20220411 [SECURITY] [DLA 2978-1] thunderbird security update Mozilla Foundation Security Advisory 2022-13 RHSA-2022:1283 RHSA-2022:1284 RHSA-2022:1285 RHSA-2022:1286 RHSA-2022:1287 RHSA-2022:1301 RHSA-2022:1302 RHSA-2022:1303 RHSA-2022:1305 RHSA-2022:1326 SMASH Issue 327815 bnc#1197903 jsc#CAR-1667 rh#2072559 rh#2072560 rh#2072561 rh#2072562 rh#2072563 rh#2072564 rh#2072565 rh#2072566 rh#2072963 xf#223379 |
CVE-2022-28287 | mozilla-nss:Released | important | 4.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:github.com:CVE-2022-24713 CVE-2022-1097 CVE-2022-1196 CVE-2022-1197 CVE-2022-24713 CVE-2022-28281 CVE-2022-28282 CVE-2022-28283 CVE-2022-28284 CVE-2022-28285 CVE-2022-28286 CVE-2022-28287 CVE-2022-28288 CVE-2022-28289 D:CVE-2022-24713 DSA-5113 DSA-5118 FEDORA:FEDORA-2022-8436ac4c39 FEDORA:FEDORA-2022-ceb3e03c5e FEDORA:FEDORA-2022-d20d44ba98 GLSA-202208-08 GLSA-202208-14 MISC:bugzilla.mozilla.org:/buglist.cgi MISC:bugzilla.mozilla.org:/show_bug.cgi MISC:github.com:CVE-2022-24713 MISC:groups.google.com:CVE-2022-24713 MISC:www.mozilla.org:/security/advisories/mfsa2022-13/ MISC:www.mozilla.org:/security/advisories/mfsa2022-14/ MISC:www.mozilla.org:/security/advisories/mfsa2022-15/ MLIST:[debian-lts-announce] 20220407 [SECURITY] [DLA 2971-1] firefox-esr security update MLIST:[debian-lts-announce] 20220411 [SECURITY] [DLA 2978-1] thunderbird security update Mozilla Foundation Security Advisory 2022-13 RHSA-2022:1283 RHSA-2022:1284 RHSA-2022:1285 RHSA-2022:1286 RHSA-2022:1287 RHSA-2022:1301 RHSA-2022:1302 RHSA-2022:1303 RHSA-2022:1305 RHSA-2022:1326 SMASH Issue 327815 bnc#1197903 jsc#CAR-1667 rh#2072559 rh#2072560 rh#2072561 rh#2072562 rh#2072563 rh#2072564 rh#2072565 rh#2072566 rh#2072963 xf#223379 |
CVE-2022-28288 | mozilla-nss:Released | important | 7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H) | CONFIRM:github.com:CVE-2022-24713 CVE-2022-1097 CVE-2022-1196 CVE-2022-1197 CVE-2022-24713 CVE-2022-28281 CVE-2022-28282 CVE-2022-28283 CVE-2022-28284 CVE-2022-28285 CVE-2022-28286 CVE-2022-28287 CVE-2022-28288 CVE-2022-28289 D:CVE-2022-24713 DSA-5113 DSA-5118 FEDORA:FEDORA-2022-8436ac4c39 FEDORA:FEDORA-2022-ceb3e03c5e FEDORA:FEDORA-2022-d20d44ba98 GLSA-202208-08 GLSA-202208-14 MISC:bugzilla.mozilla.org:/buglist.cgi MISC:bugzilla.mozilla.org:/show_bug.cgi MISC:github.com:CVE-2022-24713 MISC:groups.google.com:CVE-2022-24713 MISC:www.mozilla.org:/security/advisories/mfsa2022-13/ MISC:www.mozilla.org:/security/advisories/mfsa2022-14/ MISC:www.mozilla.org:/security/advisories/mfsa2022-15/ MLIST:[debian-lts-announce] 20220407 [SECURITY] [DLA 2971-1] firefox-esr security update MLIST:[debian-lts-announce] 20220411 [SECURITY] [DLA 2978-1] thunderbird security update Mozilla Foundation Security Advisory 2022-13 RHSA-2022:1283 RHSA-2022:1284 RHSA-2022:1285 RHSA-2022:1286 RHSA-2022:1287 RHSA-2022:1301 RHSA-2022:1302 RHSA-2022:1303 RHSA-2022:1305 RHSA-2022:1326 SMASH Issue 327815 bnc#1197903 jsc#CAR-1667 rh#2072559 rh#2072560 rh#2072561 rh#2072562 rh#2072563 rh#2072564 rh#2072565 rh#2072566 rh#2072963 xf#223379 |
CVE-2022-28289 | mozilla-nss:Released | important | 7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H) | CONFIRM:github.com:CVE-2022-24713 CVE-2022-1097 CVE-2022-1196 CVE-2022-1197 CVE-2022-24713 CVE-2022-28281 CVE-2022-28282 CVE-2022-28283 CVE-2022-28284 CVE-2022-28285 CVE-2022-28286 CVE-2022-28287 CVE-2022-28288 CVE-2022-28289 D:CVE-2022-24713 DSA-5113 DSA-5118 FEDORA:FEDORA-2022-8436ac4c39 FEDORA:FEDORA-2022-ceb3e03c5e FEDORA:FEDORA-2022-d20d44ba98 GLSA-202208-08 GLSA-202208-14 MISC:bugzilla.mozilla.org:/buglist.cgi MISC:bugzilla.mozilla.org:/show_bug.cgi MISC:github.com:CVE-2022-24713 MISC:groups.google.com:CVE-2022-24713 MISC:www.mozilla.org:/security/advisories/mfsa2022-13/ MISC:www.mozilla.org:/security/advisories/mfsa2022-14/ MISC:www.mozilla.org:/security/advisories/mfsa2022-15/ MLIST:[debian-lts-announce] 20220407 [SECURITY] [DLA 2971-1] firefox-esr security update MLIST:[debian-lts-announce] 20220411 [SECURITY] [DLA 2978-1] thunderbird security update Mozilla Foundation Security Advisory 2022-13 RHSA-2022:1283 RHSA-2022:1284 RHSA-2022:1285 RHSA-2022:1286 RHSA-2022:1287 RHSA-2022:1301 RHSA-2022:1302 RHSA-2022:1303 RHSA-2022:1305 RHSA-2022:1326 SMASH Issue 327815 bnc#1197903 jsc#CAR-1667 rh#2072559 rh#2072560 rh#2072561 rh#2072562 rh#2072563 rh#2072564 rh#2072565 rh#2072566 rh#2072963 xf#223379 |
CVE-2022-28321 | pam:Already fixed | critical | () | CVE-2022-28321 D:CVE-2022-28321 MISC:download.opensuse.org:CVE-2022-28321 MISC:www.suse.com:CVE-2022-28321 SMASH Issue 331760 bnc#1197654 rh#2175261 |
CVE-2022-28348 | kernel-source-rt:Not affected | critical | () | CONFIRM:developer.arm.com:CVE-2022-28350 CVE-2022-28348 D:CVE-2022-28348 MISC:developer.arm.com:CVE-2021-28664 SMASH Issue 332375 bnc#1199720 |
CVE-2022-28349 | kernel-source-rt:Not affected | critical | () | CONFIRM:developer.arm.com:CVE-2022-28350 CVE-2022-28349 D:CVE-2022-28349 MISC:developer.arm.com:CVE-2021-28664 SMASH Issue 332374 bnc#1199761 |
CVE-2022-28350 | kernel-source-rt:Not affected | critical | () | CONFIRM:developer.arm.com:CVE-2022-28350 CVE-2022-28350 D:CVE-2022-28350 MISC:developer.arm.com:CVE-2021-28664 SMASH Issue 332373 bnc#1199762 |
CVE-2022-28356 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2022-28796 CVE-2022-28356 D:CVE-2022-1016 D:CVE-2022-2153 D:CVE-2022-28356 D:CVE-2022-32296 DSA-5127 DSA-5161 DSA-5173 DSA-5184 L3:66496 L3:67104 MISC:anatomic.rip:OSS:2024/Q2/172 MISC:blog.exodusintel.com:OSS:2024/Q2/172 MISC:cdn.kernel.org:CVE-2022-28356 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:git.kernel.org:OSS:2022/Q2/9 MISC:git.kernel.org:OSS:2024/Q2/172 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:CVE-2022-28356 MISC:github.com:OSS:2022/04/02/2 MISC:github.com:OSS:2022/Q3/101 MISC:research.nccgroup.com:OSS:2022/09/02/9 MISC:ruia-ruia.github.io:OSS:2022/Q3/101 MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/04/06/1 OSS:2022/04/22/3 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/22/1 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/Q2/9 OSS:2022/Q3/101 OSS:2022/Q3/141 OSS:2024/04/24/3 OSS:2024/Q2/172 Oracle:CVE-2022-21123 SMASH Issue 326949 SMASH Issue 327961 ZDI-23-1834 bdo#1006346 bdo#1013299 bdo#922204 bnc#1197390 bnc#1197391 https://bugs.chromium.org/p/project-zero/issues/detail?id=2504 jsc#CAR-1662 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1832397 rh#2039448 rh#2056381 rh#2058395 rh#2058955 rh#2061633 rh#2062284 rh#2064604 rh#2066614 rh#2066706 rh#2066819 rh#2069736 rh#2070694 rh#2071047 rh#2073064 rh#2074208 rh#2074441 rh#2078456 rh#2084435 rh#2084458 rh#2085300 rh#2086753 rh#2088021 rh#2089815 rh#2090237 rh#2090240 rh#2090241 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2104423 rh#2141026 |
CVE-2022-28388 | kernel-source-rt:Released | moderate | 5.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) | CONFIRM:security.netapp.com:CVE-2022-28390 CVE-2022-28388 D:CVE-2022-32296 DSA-5127 DSA-5161 DSA-5173 DSA-5184 FEDORA:FEDORA-2022-5cd9d787dc FEDORA:FEDORA-2022-91633399ff FEDORA:FEDORA-2022-af492757d9 MISC:anatomic.rip:OSS:2024/Q2/172 MISC:blog.exodusintel.com:OSS:2024/Q2/172 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:git.kernel.org:OSS:2024/Q2/172 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:CVE-2022-28388 MISC:github.com:OSS:2022/04/02/2 MISC:github.com:OSS:2022/Q3/101 MISC:research.nccgroup.com:OSS:2022/09/02/9 MISC:ruia-ruia.github.io:OSS:2022/Q3/101 OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/04/22/3 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/22/1 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/Q3/101 OSS:2022/Q3/141 OSS:2024/04/24/3 OSS:2024/Q2/172 Oracle:CVE-2022-21123 RHSA-2023:2148 RHSA-2023:2458 SMASH Issue 327988 ZDI-23-1834 bdo#1006346 bdo#1013299 bdo#922204 bnc#1198032 https://bugs.chromium.org/p/project-zero/issues/detail?id=2504 jsc#CAR-1643 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1832397 rh#2039448 rh#2056381 rh#2058395 rh#2058955 rh#2061633 rh#2062284 rh#2064604 rh#2066614 rh#2066706 rh#2066819 rh#2070694 rh#2071047 rh#2073064 rh#2073091 rh#2074208 rh#2074441 rh#2078456 rh#2084435 rh#2084458 rh#2085300 rh#2086753 rh#2088021 rh#2089815 rh#2090237 rh#2090240 rh#2090241 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2104423 rh#2141026 |
CVE-2022-28389 | kernel-source-rt:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-28390 CVE-2022-28389 D:CVE-2022-2153 D:CVE-2022-32296 DSA-5127 DSA-5161 DSA-5173 DSA-5184 FEDORA:FEDORA-2022-5cd9d787dc FEDORA:FEDORA-2022-91633399ff FEDORA:FEDORA-2022-af492757d9 MISC:anatomic.rip:OSS:2024/Q2/172 MISC:blog.exodusintel.com:OSS:2024/Q2/172 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:git.kernel.org:OSS:2024/Q2/172 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:CVE-2022-28389 MISC:github.com:OSS:2022/04/02/2 MISC:github.com:OSS:2022/Q3/101 MISC:research.nccgroup.com:OSS:2022/09/02/9 MISC:ruia-ruia.github.io:OSS:2022/Q3/101 OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/04/22/3 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/22/1 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/Q3/101 OSS:2022/Q3/141 OSS:2024/04/24/3 OSS:2024/Q2/172 Oracle:CVE-2022-21123 SMASH Issue 327987 ZDI-23-1834 bdo#1006346 bdo#1013299 bdo#922204 bnc#1198033 bnc#1201657 https://bugs.chromium.org/p/project-zero/issues/detail?id=2504 jsc#CAR-1642 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1832397 rh#2039448 rh#2056381 rh#2058395 rh#2058955 rh#2061633 rh#2062284 rh#2064604 rh#2066614 rh#2066706 rh#2066819 rh#2069736 rh#2070694 rh#2071047 rh#2073064 rh#2073086 rh#2074208 rh#2074441 rh#2078456 rh#2084435 rh#2084458 rh#2085300 rh#2086753 rh#2088021 rh#2089815 rh#2090237 rh#2090240 rh#2090241 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2104423 rh#2141026 |
CVE-2022-28390 | kernel-source-rt:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-28390 CVE-2022-28390 D:CVE-2022-2153 D:CVE-2022-32296 DSA-5127 DSA-5161 DSA-5173 DSA-5184 FEDORA:FEDORA-2022-5cd9d787dc FEDORA:FEDORA-2022-91633399ff FEDORA:FEDORA-2022-af492757d9 L3:65157 MISC:anatomic.rip:OSS:2024/Q2/172 MISC:blog.exodusintel.com:OSS:2024/Q2/172 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:git.kernel.org:OSS:2024/Q2/172 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:CVE-2022-28390 MISC:github.com:OSS:2022/04/02/2 MISC:github.com:OSS:2022/Q3/101 MISC:research.nccgroup.com:OSS:2022/09/02/9 MISC:ruia-ruia.github.io:OSS:2022/Q3/101 MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/04/22/3 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/22/1 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/Q3/101 OSS:2022/Q3/141 OSS:2024/04/24/3 OSS:2024/Q2/172 Oracle:CVE-2022-21123 RHSA-2022:7444 RHSA-2022:7683 RHSA-2022:7933 RHSA-2022:8267 SMASH Issue 327986 ZDI-23-1834 bdo#1006346 bdo#1013299 bdo#922204 bnc#1198031 bnc#1201517 https://bugs.chromium.org/p/project-zero/issues/detail?id=2504 jsc#CAR-1644 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1832397 rh#2039448 rh#2056381 rh#2058395 rh#2058955 rh#2061633 rh#2062284 rh#2064604 rh#2066614 rh#2066706 rh#2066819 rh#2069736 rh#2070694 rh#2071047 rh#2073064 rh#2074208 rh#2074441 rh#2078456 rh#2084435 rh#2084458 rh#2085300 rh#2086753 rh#2088021 rh#2089815 rh#2090237 rh#2090240 rh#2090241 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2104423 rh#2141026 |
CVE-2022-28391 | busybox:Not affected | important | 7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H) | CVE-2022-28391 L3:63232 MISC:git.alpinelinux.org:CVE-2022-28391 MISC:gitlab.alpinelinux.org:CVE-2022-28391 SMASH Issue 327985 bnc#1198092 bnc#1199106 jsc#CAR-1648 rh#2080958 |
CVE-2022-2845 | vim:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:huntr.dev:CVE-2022-2845 CVE-2022-2845 D:CVE-2022-2845 FEDORA:FEDORA-2022-3b33d04743 FEDORA:FEDORA-2022-b9edf60581 L3:64287 MISC:github.com:CVE-2022-2845 SMASH Issue 340113 bnc#1202515 bnc#1204083 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C72HDIMR3KTTAO7QGTXWUMPBNFUFIBRD/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWOJOA7PZZAMBI5GFTL6PWHXMWSDLUXL/ https://security.gentoo.org/glsa/202305-16 jsc#CAR-1972 rh#2119844 |
CVE-2022-2849 | vim:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:huntr.dev:CVE-2022-2849 CVE-2022-2849 FEDORA:FEDORA-2022-b9edf60581 L3:64287 MISC:github.com:CVE-2022-2849 SMASH Issue 340140 bnc#1202512 https://security.gentoo.org/glsa/202305-16 jsc#CAR-1971 rh#2122137 |
CVE-2022-2862 | vim:Released | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L) | CONFIRM:huntr.dev:CVE-2022-2862 CVE-2022-2862 FEDORA:FEDORA-2022-b9edf60581 MISC:github.com:CVE-2022-2862 SMASH Issue 340136 bnc#1202511 https://security.gentoo.org/glsa/202305-16 jsc#CAR-1970 rh#2122139 |
CVE-2022-28693 | kernel-source-rt:Released | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2022-28693 RHSA-2022:7110 RHSA-2022:7134 RHSA-2022:7337 RHSA-2022:7338 RHSA-2022:7933 RHSA-2022:8267 RHSA-2022:8973 RHSA-2022:8974 SMASH Issue 337169 SMASH Issue 337170 bnc#1201455 rh#2107465 |
CVE-2022-2873 | kernel-source-rt:Not affected | moderate | 4.2 (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:/advisory/ntap-20230120-0001/ CVE-2022-2873 DSA-5324 MISC:lore.kernel.org:CVE-2022-2873 RHSA-2023:0832 RHSA-2023:0854 RHSA-2023:0951 RHSA-2023:0979 RHSA-2023:5627 SMASH Issue 340163 bnc#1202558 https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html rh#2119048 |
CVE-2022-28737 | binutils:Released | important | 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-28737 D:CVE-2022-28737 L3:64532 L3:64533 L3:64726 L3:65878 L3:65882 L3:65890 MISC:lists.gnu.org:OSS:2022/06/07/5 OSS:2022/06/07/5 RHSA-2022:5095 RHSA-2022:5096 RHSA-2022:5098 RHSA-2022:5099 RHSA-2022:5100 SMASH Issue 328973 SMASH Issue 328974 bnc#1198458 bnc#1211494 bnc#1211498 bnc#1211510 rh#2090899 |
CVE-2022-2874 | vim:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:huntr.dev:CVE-2022-2874 CVE-2022-2874 MISC:github.com:CVE-2022-2874 SMASH Issue 340196 bnc#1202552 https://security.gentoo.org/glsa/202305-16 jsc#CAR-1974 rh#2193207 |
CVE-2022-28748 | kernel-source-rt:Released | low | 3.7 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N) | CVE-2022-28748 SMASH Issue 323937 SMASH Issue 328344 bnc#1196018 jsc#CAR-1663 |
CVE-2022-28796 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-28796 CVE-2022-28796 D:CVE-2022-28796 MISC:cdn.kernel.org:CVE-2022-28356 MISC:github.com:CVE-2022-28796 SMASH Issue 328443 bnc#1198325 bnc#1198594 rh#2073941 |
CVE-2022-28805 | lua53:Not affected | moderate | 6.6 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L) | CVE-2022-28805 D:CVE-2022-28805 FEDORA:FEDORA-2022-5b5889f43a FEDORA:FEDORA-2022-b9ed35a7ad MISC:github.com:CVE-2022-28805 MISC:lua-users.org:CVE-2022-28805 RHSA-2023:2582 SMASH Issue 328442 bnc#1198328 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RJNJ66IFDUKWJJZXHGOLRGIA3HWWC36R/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UHYZOEFDVLVAD6EEP4CDW6DNONIVVHPA/ https://security.gentoo.org/glsa/202305-23 jsc#CAR-1675 rh#2073884 |
CVE-2022-2889 | vim:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:huntr.dev:CVE-2022-2889 CVE-2022-2889 D:CVE-2022-2889 FEDORA:FEDORA-2022-3b33d04743 MISC:github.com:CVE-2022-2889 SMASH Issue 340320 bnc#1202599 https://security.gentoo.org/glsa/202305-16 jsc#CAR-1978 rh#2119864 |
CVE-2022-28893 | kernel-source-rt:Released | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2022-28893 CVE-2022-28893 D:CVE-2022-28893 DSA-5161 MISC:git.kernel.org:CVE-2022-28893 MISC:git.kernel.org:CVE-2022-32250 MISC:github.com:OSS:2022/04/11/5 MISC:research.nccgroup.com:OSS:2022/09/02/9 MISC:www.debian.org:CVE-2022-32250 OSS:2022/04/11/3 OSS:2022/04/11/4 OSS:2022/04/11/5 OSS:2022/05/31/1 OSS:2022/08/25/1 OSS:2022/09/02/9 OSS:2022/Q2/29 OSS:2022/Q3/141 RHSA-2022:7444 RHSA-2022:7683 RHSA-2022:7933 RHSA-2022:8267 SMASH Issue 328557 SMASH Issue 328558 ZDI-23-1834 bnc#1198330 jsc#CAR-1676 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:eadb2f47a3ced5c64b23b90fd2a3463f63726066 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#2039448 rh#2058395 rh#2064604 rh#2074208 rh#2084183 rh#2086753 rh#2089815 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2104423 |
CVE-2022-2905 | kernel-source-rt:Released | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) | CVE-2022-2905 MISC:lore.kernel.org:CVE-2022-2905 MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update OSS:2022/Q3/148 SMASH Issue 340932 bnc#1202564 bnc#1202860 jsc#CAR-1997 rh#2121800 |
CVE-2022-29154 | rsync:Released | important | 8.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) | CVE-2022-29154 D:CVE-2022-29154 FEDORA:FEDORA-2022-15da0cf165 FEDORA:FEDORA-2022-25e4dbedf9 L3:64035 L3:64047 L3:64136 L3:64217 L3:64299 L3:64539 L3:64848 MISC:github.com:CVE-2022-29154 MISC:github.com:OSS:2022/08/02/1 OSS:2022/08/02/1 OSS:2022/Q3/77 RHSA-2022:6170 RHSA-2022:6171 RHSA-2022:6172 RHSA-2022:6173 RHSA-2022:6180 RHSA-2022:6181 RHSA-2022:6551 SMASH Issue 338112 SMASH Issue 338113 bnc#1201840 jsc#CAR-1949 rh#1666127 rh#2110928 |
CVE-2022-29156 | kernel-source-rt:Not affected | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-29156 CVE-2022-29156 D:CVE-2022-29156 MISC:cdn.kernel.org:CVE-2022-27223 MISC:github.com:CVE-2022-29156 SMASH Issue 328982 bnc#1198515 rh#2075431 |
CVE-2022-2923 | vim:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:huntr.dev:CVE-2022-2923 CVE-2022-2923 D:CVE-2022-2923 FEDORA:FEDORA-2022-3b33d04743 MISC:github.com:CVE-2022-2923 SMASH Issue 340393 bnc#1202687 https://security.gentoo.org/glsa/202305-16 jsc#CAR-1982 rh#2120989 |
CVE-2022-2928 | dhcp:Released | moderate | 6.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:kb.isc.org:CVE-2022-2928 CVE-2022-2928 D:CVE-2022-2928 D:CVE-2022-2929 DSA-5251 FEDORA:FEDORA-2022-9ca9a94e28 FEDORA:FEDORA-2022-c4f274a54f FEDORA:FEDORA-2022-f5a45757df MLIST:[debian-lts-announce] 20221010 [SECURITY] [DLA 3146-1] isc-dhcp security update OSS:2022/Q4/6 RHSA-2023:2502 RHSA-2023:3000 SMASH Issue 344215 SMASH Issue 344216 bdo#1021320 bnc#1203988 https://security.gentoo.org/glsa/202305-22 jsc#CAR-2083 rh#2132001 rh#2132002 |
CVE-2022-2929 | dhcp:Released | moderate | 6.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:kb.isc.org:CVE-2022-2929 CVE-2022-2929 D:CVE-2022-2928 D:CVE-2022-2929 DSA-5251 FEDORA:FEDORA-2022-9ca9a94e28 FEDORA:FEDORA-2022-c4f274a54f FEDORA:FEDORA-2022-f5a45757df MLIST:[debian-lts-announce] 20221010 [SECURITY] [DLA 3146-1] isc-dhcp security update OSS:2022/Q4/6 RHSA-2023:2502 RHSA-2023:3000 SMASH Issue 344217 SMASH Issue 344218 bdo#1021320 bnc#1203989 https://security.gentoo.org/glsa/202305-22 jsc#CAR-2084 rh#2132001 rh#2132002 |
CVE-2022-2938 | kernel-source-rt:Already fixed | moderate | 6.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:/advisory/ntap-20221223-0002/ CVE-2022-2938 MISC:git.kernel.org:CVE-2022-2938 RHSA-2022:7444 RHSA-2022:7683 SMASH Issue 340387 bnc#1202623 jsc#CAR-1994 rh#2120175 |
CVE-2022-29458 | ncurses:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:support.apple.com:CVE-2022-1725 CVE-2022-29458 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 MISC:lists.gnu.org:CVE-2022-29458 MLIST:[debian-lts-announce] 20221029 [SECURITY] [DLA 3167-1] ncurses security update SMASH Issue 329442 bnc#1198627 jsc#CAR-1692 rh#2076483 |
CVE-2022-2946 | vim:Released | moderate | 5.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) | CONFIRM:huntr.dev:CVE-2022-2946 CVE-2022-2946 D:CVE-2022-2946 FEDORA:FEDORA-2022-3b33d04743 MISC:github.com:CVE-2022-2946 MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update SMASH Issue 340574 bnc#1202689 https://security.gentoo.org/glsa/202305-16 jsc#CAR-1983 rh#2120993 |
CVE-2022-29581 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-29581 CVE-2022-29581 D:CVE-2022-1016 D:CVE-2022-2153 D:CVE-2022-32296 DSA-5161 DSA-5173 DSA-5184 L3:64602 MISC:git.kernel.org:CVE-2022-29581 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:OSS:2022/04/02/2 MISC:kernel.dance:CVE-2022-29581 MISC:packetstormsecurity.com:CVE-2022-29581 MISC:packetstormsecurity.com:CVE-2022-34918 MISC:research.nccgroup.com:OSS:2022/09/02/9 OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/05/18/2 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/22/1 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/Q2/118 OSS:2022/Q3/141 Oracle:CVE-2022-21123 RHSA-2022:7444 RHSA-2022:7683 RHSA-2022:7933 RHSA-2022:8267 SMASH Issue 332127 ZDI-23-1834 bdo#1006346 bdo#1013299 bdo#922204 bnc#1199665 bnc#1199695 jsc#CAR-1784 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1832397 rh#2039448 rh#2056381 rh#2058395 rh#2058955 rh#2061633 rh#2062284 rh#2064604 rh#2066614 rh#2066706 rh#2066819 rh#2069736 rh#2070694 rh#2071047 rh#2073064 rh#2074208 rh#2074441 rh#2084435 rh#2084458 rh#2085300 rh#2086753 rh#2088021 rh#2089815 rh#2090237 rh#2090240 rh#2090241 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2104423 rh#2141026 |
CVE-2022-29582 | kernel-source-rt:Not affected | important | 7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-29582 DSA-5127 MISC:anatomic.rip:OSS:2024/Q2/172 MISC:blog.exodusintel.com:OSS:2024/Q2/172 MISC:cdn.kernel.org:CVE-2022-29582 MISC:git.kernel.org:CVE-2022-29582 MISC:git.kernel.org:OSS:2024/Q2/172 MISC:github.com:CVE-2022-29582 MISC:github.com:OSS:2022/Q3/101 MISC:ruia-ruia.github.io:OSS:2022/Q3/101 OSS:2022/04/22/3 OSS:2022/04/22/4 OSS:2022/08/08/3 OSS:2022/Q2/54 OSS:2022/Q3/101 OSS:2024/04/24/3 OSS:2024/Q2/172 SMASH Issue 329921 bnc#1198287 bnc#1198811 bnc#1199750 https://bugs.chromium.org/p/project-zero/issues/detail?id=2504 rh#2056381 rh#2061633 rh#2066706 rh#2066819 rh#2073064 rh#2074441 rh#2078456 |
CVE-2022-2959 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-2959 L3:64716 L3:64743 MISC:github.com:CVE-2022-2959 MISC:www.zerodayinitiative.com:CVE-2022-2959 RHSA-2022:8973 RHSA-2022:8974 RHSA-2022:9082 RHSA-2023:0300 RHSA-2023:0334 RHSA-2023:0348 SMASH Issue 340559 ZDI-22-1165 bnc#1202681 bnc#1202685 https://security.netapp.com/advisory/ntap-20230214-0005/ rh#2103681 |
CVE-2022-2961 | kernel-source-rt:Not affected | moderate | 6.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H) | CVE-2022-2961 MISC:access.redhat.com:CVE-2022-2961 SMASH Issue 340532 bnc#1202660 https://security.netapp.com/advisory/ntap-20230214-0004/ rh#2120595 |
CVE-2022-2964 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:/advisory/ntap-20230113-0001/ CVE-2022-2964 L3:64716 L3:64743 L3:64933 L3:65176 RHSA-2023:0101 RHSA-2023:0114 RHSA-2023:0123 RHSA-2023:0300 RHSA-2023:0334 RHSA-2023:0348 RHSA-2023:0392 RHSA-2023:0395 RHSA-2023:0396 RHSA-2023:0399 RHSA-2023:0400 RHSA-2023:0404 RHSA-2023:0496 RHSA-2023:0499 RHSA-2023:0512 RHSA-2023:0526 RHSA-2023:0531 RHSA-2023:0536 RHSA-2023:0856 RHSA-2023:0858 RHSA-2023:1130 RHSA-2023:1192 SMASH Issue 340540 bnc#1202686 bnc#1203008 rh#2067482 |
CVE-2022-2977 | kernel-source-rt:Released | moderate | 4.2 (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H) | CVE-2022-2977 MISC:git.kernel.org:CVE-2022-2977 SMASH Issue 340602 bnc#1202672 https://security.netapp.com/advisory/ntap-20230214-0006/ jsc#CAR-1979 rh#2120146 |
CVE-2022-2978 | kernel-source-rt:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-2978 L3:64459 L3:64525 L3:64549 L3:64716 L3:64743 MISC:lore.kernel.org:CVE-2022-2978 MLIST:[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update SMASH Issue 340617 bnc#1202700 bnc#1204745 jsc#CAR-1995 rh#2120664 |
CVE-2022-2980 | vim:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:huntr.dev:CVE-2022-2980 CVE-2022-2980 FEDORA:FEDORA-2022-b9edf60581 MISC:github.com:CVE-2022-2980 SMASH Issue 340858 bnc#1203155 https://security.gentoo.org/glsa/202305-16 jsc#CAR-2012 rh#2123709 |
CVE-2022-2982 | vim:Released | moderate | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:huntr.dev:CVE-2022-2982 CVE-2022-2982 FEDORA:FEDORA-2022-b9edf60581 MISC:github.com:CVE-2022-2982 SMASH Issue 340857 bnc#1203152 https://security.gentoo.org/glsa/202305-16 jsc#CAR-2013 rh#2123714 |
CVE-2022-29824 | libxml2:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-29824 CVE-2022-29824 D:CVE-2022-29824 DSA-5142 FEDORA:FEDORA-2022-9136d646e4 FEDORA:FEDORA-2022-be6d83642a FEDORA:FEDORA-2022-f624aad735 GLSA-202210-03 L3:64015 L3:64301 L3:64305 L3:64536 MISC:gitlab.gnome.org:CVE-2022-29824 MISC:packetstormsecurity.com:CVE-2022-29824 MISC:www.oracle.com:CVE-2022-21586 MLIST:[debian-lts-announce] 20220516 [SECURITY] [DLA 3012-1] libxml2 security update Oracle:CVE-2022-29824 RHSA-2022:5250 RHSA-2022:5317 RHSA-2022:8841 SMASH Issue 330532 SMASH Issue 330533 bdo#1010526 bnc#1199132 jsc#CAR-1736 rh#2082158 |
CVE-2022-29900 | kernel-source-rt:Released | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N) | CONFIRM:comsec.ethz.ch:CVE-2022-29901 CONFIRM:security.netapp.com:CVE-2022-29901 CONFIRM:www.intel.com:CVE-2022-29901 CONFIRM:xenbits.xen.org:CVE-2022-29900 CVE-2022-29900 CVE-2022-29901 D:CVE-2022-26373 D:CVE-2022-36879 D:CVE-2022-36946 DSA-5184 DSA-5207 FEDORA:FEDORA-2022-3e6ce58029 FEDORA:FEDORA-2022-8aab5b5cde FEDORA:FEDORA-2022-a0d7a5eaf2 FEDORA:FEDORA-2022-c69ef9c1dd L3:65147 MISC:www.amd.com:CVE-2022-23825 MISC:www.intel.com:OSS:2022/07/12/2 MLIST:[debian-lts-announce] 20220911 [SECURITY] [DLA 3102-1] linux-5.10 new package MLIST:[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update OSS:2022/07/12/2 OSS:2022/07/12/4 OSS:2022/07/12/5 OSS:2022/07/13/1 OSS:2022/08/09/5 OSS:2022/08/09/6 OSS:2022/08/09/7 OSS:2022/11/08/1 OSS:2022/11/10/2 OSS:2022/Q3/114 OSS:2022/Q3/115 OSS:2022/Q3/116 OSS:2022/Q3/44 Oracle:CVE-2022-21123 RHSA-2022:7110 RHSA-2022:7134 RHSA-2022:7337 RHSA-2022:7338 RHSA-2022:7933 RHSA-2022:8267 RHSA-2022:8973 RHSA-2022:8974 SMASH Issue 332271 SMASH Issue 332272 ZDI-22-1117 ZDI-22-1118 bnc#1199657 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D4RW5FCIYFNCQOEFJEUIRW3DGYW7CWBG/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M27MB3QFNIJV4EQQSXWARHP3OGX6CR6K/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM/ https://security.gentoo.org/glsa/202402-07 https://www.secpod.com/blog/retbleed-intel-and-amd-processor-information-disclosure-vulnerability/ jsc#CAR-1894 linux.git:commit:470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2 linux.git:commit:9ad36309e2719a884f946678e0296be10f0bb4c1 rh#2090226 rh#2090237 rh#2090240 rh#2090241 rh#2103148 rh#2103153 rh#2114849 rh#2114874 rh#2114878 rh#2115065 rh#2115278 rh#2119855 |
CVE-2022-29901 | kernel-source-rt:Released | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N) | CONFIRM:comsec.ethz.ch:CVE-2022-29901 CONFIRM:security.netapp.com:CVE-2022-29901 CONFIRM:www.intel.com:CVE-2022-29901 CONFIRM:xenbits.xen.org:CVE-2022-29900 CVE-2022-29900 CVE-2022-29901 D:CVE-2022-26373 D:CVE-2022-36879 D:CVE-2022-36946 DSA-5184 DSA-5207 FEDORA:FEDORA-2022-3e6ce58029 FEDORA:FEDORA-2022-8aab5b5cde FEDORA:FEDORA-2022-a0d7a5eaf2 FEDORA:FEDORA-2022-c69ef9c1dd L3:65147 MISC:www.amd.com:CVE-2022-23825 MISC:www.intel.com:OSS:2022/07/12/2 MLIST:[debian-lts-announce] 20220911 [SECURITY] [DLA 3102-1] linux-5.10 new package MLIST:[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update OSS:2022/07/12/2 OSS:2022/07/12/4 OSS:2022/07/12/5 OSS:2022/07/13/1 OSS:2022/08/09/5 OSS:2022/08/09/6 OSS:2022/08/09/7 OSS:2022/11/08/1 OSS:2022/11/10/2 OSS:2022/Q3/114 OSS:2022/Q3/115 OSS:2022/Q3/116 OSS:2022/Q3/44 Oracle:CVE-2022-21123 RHSA-2022:7110 RHSA-2022:7134 RHSA-2022:7337 RHSA-2022:7338 RHSA-2022:7933 RHSA-2022:8267 RHSA-2022:8973 RHSA-2022:8974 SMASH Issue 332271 SMASH Issue 335849 ZDI-22-1117 ZDI-22-1118 bnc#1199657 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D4RW5FCIYFNCQOEFJEUIRW3DGYW7CWBG/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M27MB3QFNIJV4EQQSXWARHP3OGX6CR6K/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM/ https://security.gentoo.org/glsa/202402-07 https://www.secpod.com/blog/retbleed-intel-and-amd-processor-information-disclosure-vulnerability/ jsc#CAR-1894 linux.git:commit:470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2 linux.git:commit:9ad36309e2719a884f946678e0296be10f0bb4c1 rh#2090226 rh#2090237 rh#2090240 rh#2090241 rh#2103148 rh#2103153 rh#2114849 rh#2114874 rh#2114878 rh#2115065 rh#2115278 rh#2119855 |
CVE-2022-2991 | kernel-source-rt:Released | important | 8.2 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H) | CVE-2022-2991 L3:64310 L3:64716 L3:64743 L3:65879 MISC:git.kernel.org:CVE-2022-2991 MISC:www.zerodayinitiative.com:CVE-2022-2991 SMASH Issue 336733 SMASH Issue 340678 ZDI-22-961 bnc#1201420 bnc#1202799 bnc#1203993 jsc#CAR-1893 rh#2107066 |
CVE-2022-29968 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) | CONFIRM:security.netapp.com:CVE-2022-29968 CVE-2022-29968 D:CVE-2022-29968 FEDORA:FEDORA-2022-a0f65397a3 FEDORA:FEDORA-2022-e9378a3573 FEDORA:FEDORA-2022-fd85148be2 MISC:github.com:CVE-2022-29968 SMASH Issue 330430 bnc#1199087 rh#2080940 |
CVE-2022-30065 | busybox:Released | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:cert-portal.siemens.com:/productcert/pdf/ssa-333517.pdf CVE-2022-30065 MISC:bugs.busybox.net:CVE-2022-30065 SMASH Issue 332353 bnc#1199744 jsc#CAR-1969 rh#2088233 |
CVE-2022-30115 | curl:Not affected | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) | CONFIRM:security.netapp.com:CVE-2022-30115 CVE-2022-30115 CVE-2022-42916 CVE-2022-43551 GLSA-202212-01 MISC:curl.se:OSS:2022/Q2/97 MISC:github.com:OSS:2022/10/26/4 MISC:github.com:OSS:2022/12/21/1 MISC:hackerone.com:CVE-2022-30115 OSS:2022/10/26/4 OSS:2022/12/21/1 OSS:2022/Q2/97 SMASH Issue 330792 SMASH Issue 330793 bnc#1199225 rh#2082223 |
CVE-2022-3016 | vim:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:huntr.dev:CVE-2022-3016 CVE-2022-3016 D:CVE-2022-3016 FEDORA:FEDORA-2022-b9edf60581 MISC:github.com:CVE-2022-3016 SMASH Issue 340968 bnc#1202862 https://security.gentoo.org/glsa/202305-16 jsc#CAR-1998 rh#2124208 |
CVE-2022-3028 | kernel-source-rt:Released | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-3028 D:CVE-2022-3028 FEDORA:FEDORA-2022-35c14ba5bb FEDORA:FEDORA-2022-6835ddb6d8 FEDORA:FEDORA-2022-ccb0138bb6 L3:66052 MISC:github.com:CVE-2022-3028 MISC:lore.kernel.org:CVE-2022-3028 MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update Oracle:CVE-2022-3028 RHSA-2023:2148 RHSA-2023:2458 RHSA-2023:2736 RHSA-2023:2951 SMASH Issue 341035 bnc#1202898 https://security.netapp.com/advisory/ntap-20230214-0004/ jsc#CAR-2003 rh#2122228 |
CVE-2022-3037 | vim:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:huntr.dev:CVE-2022-3037 CVE-2022-3037 FEDORA:FEDORA-2022-221bd89404 FEDORA:FEDORA-2022-35d9bdb7dc FEDORA:FEDORA-2022-b9edf60581 MISC:github.com:CVE-2022-3037 SMASH Issue 341171 bnc#1202962 jsc#CAR-2002 rh#2122907 |
CVE-2022-30594 | kernel-source-rt:Released | important | 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-30594 CVE-2022-30594 D:CVE-2022-1016 D:CVE-2022-2153 D:CVE-2022-30594 D:CVE-2022-32296 DSA-5161 DSA-5173 DSA-5184 L3:64302 L3:64306 L3:67233 MISC:bugs.chromium.org:CVE-2022-30594 MISC:cdn.kernel.org:CVE-2022-30594 MISC:git.kernel.org:CVE-2022-30594 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:CVE-2022-30594 MISC:github.com:OSS:2022/04/02/2 MISC:packetstormsecurity.com:/files/170362/Linux-PT_SUSPEND_SECCOMP-Permission-Bypass-Ptracer-Death-Race.html MISC:packetstormsecurity.com:CVE-2022-29581 MISC:research.nccgroup.com:OSS:2022/09/02/9 MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/22/1 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/Q3/141 Oracle:CVE-2022-21123 RHSA-2022:7318 RHSA-2022:7319 RHSA-2023:0300 RHSA-2023:0334 RHSA-2023:2736 RHSA-2023:2951 SMASH Issue 331596 ZDI-23-1834 bdo#1006346 bdo#1013299 bdo#922204 bnc#1199505 bnc#1199602 bnc#1204122 jsc#CAR-1761 linux.git:commit:31185df7e2b1d2fa1de4900247a12d7b9c7087eb linux.git:commit:33172ab50a53578a95691310f49567c9266968b0 linux.git:commit:3777ea7bac3113005b7180e6b9dadf16d19a5827 linux.git:commit:42baefac638f06314298087394b982ead9ec444b linux.git:commit:5cadd4bb1d7fc9ab201ac14620d1a478357e4ebd linux.git:commit:66e3531b33ee51dad17c463b4d9c9f52e341503d linux.git:commit:6b1775f26a2da2b05a6dc8ec2b5d14e9a4701a1a linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:abf1fd5919d6238ee3bc5eb4a9b6c3947caa6638 linux.git:commit:b0576cc9c6b843d99c6982888d59a56209341888 linux.git:commit:d3b6372c5881cb54925212abb62c521df8ba4809 linux.git:commit:eadb2f47a3ced5c64b23b90fd2a3463f63726066 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1832397 rh#2039448 rh#2056381 rh#2058395 rh#2058955 rh#2061633 rh#2062284 rh#2064604 rh#2066614 rh#2066706 rh#2066799 rh#2066819 rh#2069736 rh#2070694 rh#2071047 rh#2073064 rh#2074208 rh#2074441 rh#2084125 rh#2084183 rh#2084435 rh#2084458 rh#2085300 rh#2086753 rh#2088021 rh#2089815 rh#2090237 rh#2090240 rh#2090241 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2104423 rh#2141026 |
CVE-2022-3061 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-3061 DSA-5257 MISC:git.kernel.org:CVE-2022-3061 MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update OSS:2022/Q4/30 SMASH Issue 341123 ZDI-22-1462 bnc#1202913 jsc#CAR-1999 linux.git:commit:04e5eac8f3ab2ff52fa191c187a46d4fdbc1e288 linux.git:commit:0b7808818cb9df6680f98996b8e9a439fa7bcc2f linux.git:commit:8f033d2becc24aa6bfd2a5c104407963560caabc linux.git:commit:aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d linux.git:commit:b2d03cabe2b2e150ff5a381731ea0355459be09f linux.git:commit:bcca852027e5878aec911a347407ecc88d6fff7f linux.git:commit:e421946be7d9bf545147bea8419ef8239cb7ca52 linux.git:commit:ff05d4b45dd89b922578dac497dcabf57cf771c6 rh#2122526 rh#2123056 rh#2134377 rh#2134440 rh#2134451 rh#2134506 rh#2134517 rh#2139586 rh#2139598 |
CVE-2022-3077 | kernel-source-rt:Not affected | low | 4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N) | CVE-2022-3077 MISC:github.com:CVE-2022-3077 RHSA-2023:0300 RHSA-2023:0334 SMASH Issue 341338 bnc#1203040 rh#2123309 |
CVE-2022-3078 | kernel-source-rt:Not affected | low | 4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | CVE-2022-3078 MISC:git.kernel.org:CVE-2022-3078 SMASH Issue 341339 bnc#1203041 rh#2123310 |
CVE-2022-3099 | vim:Released | moderate | 5.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) | CONFIRM:huntr.dev:CVE-2022-3099 CVE-2022-3099 D:CVE-2022-3099 FEDORA:FEDORA-2022-3f5099bcc9 FEDORA:FEDORA-2022-b9edf60581 FEDORA:FEDORA-2022-c28b637883 MISC:github.com:CVE-2022-3099 MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update SMASH Issue 341478 bnc#1203110 https://security.gentoo.org/glsa/202305-16 jsc#CAR-2010 rh#2124157 |
CVE-2022-3103 | kernel-source-rt:Not affected | important | () | CVE-2022-3103 MISC:github.com:CVE-2022-3103 SMASH Issue 343596 bnc#1203801 rh#2130189 |
CVE-2022-3104 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-3104 D:CVE-2022-3104 MISC:git.kernel.org:/pub/scm/linux/kernel/git/torvalds/linux.git/commit/ SMASH Issue 350613 bnc#1206396 rh#2153062 |
CVE-2022-3105 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-3105 D:CVE-2022-3105 MISC:git.kernel.org:/pub/scm/linux/kernel/git/torvalds/linux.git/commit/ RHSA-2022:1975 RHSA-2022:1988 SMASH Issue 350615 bnc#1206398 rh#2153067 |
CVE-2022-3106 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-3106 D:CVE-2022-3106 MISC:git.kernel.org:/pub/scm/linux/kernel/git/torvalds/linux.git/commit/ RHSA-2022:1975 RHSA-2022:1988 SMASH Issue 350614 bnc#1206397 rh#2153066 |
CVE-2022-3107 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-3107 D:CVE-2022-3107 MISC:git.kernel.org:/pub/scm/linux/kernel/git/torvalds/linux.git/commit/ RHSA-2022:7444 RHSA-2022:7683 RHSA-2022:7933 RHSA-2022:8267 SMASH Issue 350612 bnc#1206395 rh#2153060 |
CVE-2022-3108 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-3108 D:CVE-2022-3108 MISC:git.kernel.org:/pub/scm/linux/kernel/git/torvalds/linux.git/commit/ RHSA-2022:1975 RHSA-2022:1988 RHSA-2022:7933 RHSA-2022:8267 SMASH Issue 350606 bnc#1206389 rh#2153052 |
CVE-2022-3110 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-3110 D:CVE-2022-3110 MISC:git.kernel.org:/pub/scm/linux/kernel/git/torvalds/linux.git/commit/ SMASH Issue 350609 bnc#1206392 rh#2153055 |
CVE-2022-3111 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-3111 D:CVE-2022-3111 MISC:git.kernel.org:/pub/scm/linux/kernel/git/torvalds/linux.git/commit/ SMASH Issue 350611 bnc#1206394 rh#2153059 |
CVE-2022-3112 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-3112 D:CVE-2022-3112 MISC:git.kernel.org:/pub/scm/linux/kernel/git/torvalds/linux.git/commit/ SMASH Issue 350616 bnc#1206399 jsc#CAR-2250 rh#2153068 |
CVE-2022-3113 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-3113 MISC:git.kernel.org:/pub/scm/linux/kernel/git/torvalds/linux.git/commit/ SMASH Issue 350607 bnc#1206390 linux.git:commit:53dbe08504442dc7ba4865c09b3bbf5fe849681b rh#2153053 |
CVE-2022-3114 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-3114 MISC:git.kernel.org:/pub/scm/linux/kernel/git/torvalds/linux.git/commit/ SMASH Issue 350608 bnc#1206391 rh#2153054 |
CVE-2022-3115 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-3115 MISC:git.kernel.org:/pub/scm/linux/kernel/git/torvalds/linux.git/commit/ SMASH Issue 350610 bnc#1206393 rh#2153058 |
CVE-2022-31252 | permissions:Released | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-31252 SMASH Issue 341328 SMASH Issue 341329 bnc#1203018 jsc#CAR-2053 |
CVE-2022-3134 | vim:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:huntr.dev:CVE-2022-3134 CVE-2022-3134 MISC:github.com:CVE-2022-3134 MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update SMASH Issue 341690 bnc#1203194 https://security.gentoo.org/glsa/202305-16 jsc#CAR-2019 rh#2126085 |
CVE-2022-3153 | vim:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:huntr.dev:CVE-2022-3153 CVE-2022-3153 MISC:github.com:CVE-2022-3153 SMASH Issue 341919 bnc#1203272 https://security.gentoo.org/glsa/202305-16 jsc#CAR-2024 rh#2126401 |
CVE-2022-3169 | kernel-source-rt:Released | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-3169 MISC:bugzilla.kernel.org:CVE-2022-3169 MLIST:[debian-lts-announce] 20221222 [SECURITY] [DLA 3244-1] linux-5.10 security update SMASH Issue 341955 bnc#1203290 jsc#CAR-2027 rh#2125341 |
CVE-2022-3170 | kernel-source-rt:Not affected | important | () | CVE-2022-3170 MISC:github.com:CVE-2022-3170 SMASH Issue 342091 bnc#1203321 rh#2125879 |
CVE-2022-3171 | protobuf:Released | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:github.com:CVE-2022-3171 CVE-2022-3171 D:CVE-2022-3171 FEDORA:FEDORA-2022-25f35ed634 GLSA-202301-09 Oracle:CVE-2022-3171 Oracle:CVE-2022-3510 RHSA-2022:7896 RHSA-2022:9023 RHSA-2023:1006 RHSA-2023:4983 SMASH Issue 344939 bnc#1204256 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPCGUT3T5L6C3IDWUPSUO22QDCGQKTOP/ jsc#CAR-2106 rh#2137645 rh#2184161 rh#2184176 |
CVE-2022-31736 | mozilla-nss:Released | important | 7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H) | CVE-2022-1919 CVE-2022-31736 CVE-2022-31737 CVE-2022-31738 CVE-2022-31739 CVE-2022-31740 CVE-2022-31742 CVE-2022-31743 CVE-2022-31744 CVE-2022-31745 CVE-2022-31747 CVE-2022-31748 D:CVE-2022-1919 DSA-5156 DSA-5158 DSA-5172 DSA-5175 GLSA-202208-08 Google Chrome Releases Web site MISC:bugzilla.mozilla.org:/buglist.cgi MISC:bugzilla.mozilla.org:/show_bug.cgi MISC:crbug.com:CVE-2022-1919 MISC:www.mozilla.org:/security/advisories/mfsa2022-20/ MISC:www.mozilla.org:/security/advisories/mfsa2022-21/ MISC:www.mozilla.org:/security/advisories/mfsa2022-22/ MISC:www.mozilla.org:/security/advisories/mfsa2022-25/ MISC:www.mozilla.org:/security/advisories/mfsa2022-26/ RHSA-2022:4870 RHSA-2022:4871 RHSA-2022:4872 RHSA-2022:4873 RHSA-2022:4875 RHSA-2022:4876 RHSA-2022:4887 RHSA-2022:4888 RHSA-2022:4889 RHSA-2022:4890 RHSA-2022:4891 RHSA-2022:4892 RHSA-2022:5469 RHSA-2022:5470 RHSA-2022:5472 RHSA-2022:5473 RHSA-2022:5474 RHSA-2022:5475 RHSA-2022:5477 RHSA-2022:5478 RHSA-2022:5479 RHSA-2022:5480 RHSA-2022:5481 RHSA-2022:5482 SMASH Issue 333185 bnc#1200027 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKLJ3B3D5BCVWE3QNP4N7HHF26OHD567/ rh#2092018 rh#2092019 rh#2092021 rh#2092022 rh#2092023 rh#2092024 rh#2092025 rh#2092026 rh#2092416 rh#2102165 |
CVE-2022-31737 | mozilla-nss:Released | important | 7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H) | CVE-2022-1919 CVE-2022-31736 CVE-2022-31737 CVE-2022-31738 CVE-2022-31739 CVE-2022-31740 CVE-2022-31742 CVE-2022-31743 CVE-2022-31744 CVE-2022-31745 CVE-2022-31747 CVE-2022-31748 D:CVE-2022-1919 DSA-5156 DSA-5158 DSA-5172 DSA-5175 GLSA-202208-08 Google Chrome Releases Web site MISC:bugzilla.mozilla.org:/buglist.cgi MISC:bugzilla.mozilla.org:/show_bug.cgi MISC:crbug.com:CVE-2022-1919 MISC:www.mozilla.org:/security/advisories/mfsa2022-20/ MISC:www.mozilla.org:/security/advisories/mfsa2022-21/ MISC:www.mozilla.org:/security/advisories/mfsa2022-22/ MISC:www.mozilla.org:/security/advisories/mfsa2022-25/ MISC:www.mozilla.org:/security/advisories/mfsa2022-26/ RHSA-2022:4870 RHSA-2022:4871 RHSA-2022:4872 RHSA-2022:4873 RHSA-2022:4875 RHSA-2022:4876 RHSA-2022:4887 RHSA-2022:4888 RHSA-2022:4889 RHSA-2022:4890 RHSA-2022:4891 RHSA-2022:4892 RHSA-2022:5469 RHSA-2022:5470 RHSA-2022:5472 RHSA-2022:5473 RHSA-2022:5474 RHSA-2022:5475 RHSA-2022:5477 RHSA-2022:5478 RHSA-2022:5479 RHSA-2022:5480 RHSA-2022:5481 RHSA-2022:5482 SMASH Issue 333185 bnc#1200027 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKLJ3B3D5BCVWE3QNP4N7HHF26OHD567/ rh#2092018 rh#2092019 rh#2092021 rh#2092022 rh#2092023 rh#2092024 rh#2092025 rh#2092026 rh#2092416 rh#2102165 |
CVE-2022-31738 | mozilla-nss:Released | important | 7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H) | CVE-2022-1919 CVE-2022-31736 CVE-2022-31737 CVE-2022-31738 CVE-2022-31739 CVE-2022-31740 CVE-2022-31742 CVE-2022-31743 CVE-2022-31744 CVE-2022-31745 CVE-2022-31747 CVE-2022-31748 D:CVE-2022-1919 DSA-5156 DSA-5158 DSA-5172 DSA-5175 GLSA-202208-08 Google Chrome Releases Web site MISC:bugzilla.mozilla.org:/buglist.cgi MISC:bugzilla.mozilla.org:/show_bug.cgi MISC:crbug.com:CVE-2022-1919 MISC:www.mozilla.org:/security/advisories/mfsa2022-20/ MISC:www.mozilla.org:/security/advisories/mfsa2022-21/ MISC:www.mozilla.org:/security/advisories/mfsa2022-22/ MISC:www.mozilla.org:/security/advisories/mfsa2022-25/ MISC:www.mozilla.org:/security/advisories/mfsa2022-26/ RHSA-2022:4870 RHSA-2022:4871 RHSA-2022:4872 RHSA-2022:4873 RHSA-2022:4875 RHSA-2022:4876 RHSA-2022:4887 RHSA-2022:4888 RHSA-2022:4889 RHSA-2022:4890 RHSA-2022:4891 RHSA-2022:4892 RHSA-2022:5469 RHSA-2022:5470 RHSA-2022:5472 RHSA-2022:5473 RHSA-2022:5474 RHSA-2022:5475 RHSA-2022:5477 RHSA-2022:5478 RHSA-2022:5479 RHSA-2022:5480 RHSA-2022:5481 RHSA-2022:5482 SMASH Issue 333185 bnc#1200027 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKLJ3B3D5BCVWE3QNP4N7HHF26OHD567/ rh#2092018 rh#2092019 rh#2092021 rh#2092022 rh#2092023 rh#2092024 rh#2092025 rh#2092026 rh#2092416 rh#2102165 |
CVE-2022-31739 | mozilla-nss:Released | important | 7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H) | CVE-2022-1919 CVE-2022-31736 CVE-2022-31737 CVE-2022-31738 CVE-2022-31739 CVE-2022-31740 CVE-2022-31742 CVE-2022-31743 CVE-2022-31744 CVE-2022-31745 CVE-2022-31747 CVE-2022-31748 D:CVE-2022-1919 DSA-5156 DSA-5158 DSA-5172 DSA-5175 GLSA-202208-08 Google Chrome Releases Web site MISC:bugzilla.mozilla.org:/buglist.cgi MISC:bugzilla.mozilla.org:/show_bug.cgi MISC:crbug.com:CVE-2022-1919 MISC:www.mozilla.org:/security/advisories/mfsa2022-20/ MISC:www.mozilla.org:/security/advisories/mfsa2022-21/ MISC:www.mozilla.org:/security/advisories/mfsa2022-22/ MISC:www.mozilla.org:/security/advisories/mfsa2022-25/ MISC:www.mozilla.org:/security/advisories/mfsa2022-26/ RHSA-2022:4870 RHSA-2022:4871 RHSA-2022:4872 RHSA-2022:4873 RHSA-2022:4875 RHSA-2022:4876 RHSA-2022:4887 RHSA-2022:4888 RHSA-2022:4889 RHSA-2022:4890 RHSA-2022:4891 RHSA-2022:4892 RHSA-2022:5469 RHSA-2022:5470 RHSA-2022:5472 RHSA-2022:5473 RHSA-2022:5474 RHSA-2022:5475 RHSA-2022:5477 RHSA-2022:5478 RHSA-2022:5479 RHSA-2022:5480 RHSA-2022:5481 RHSA-2022:5482 SMASH Issue 333185 bnc#1200027 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKLJ3B3D5BCVWE3QNP4N7HHF26OHD567/ rh#2092018 rh#2092019 rh#2092021 rh#2092022 rh#2092023 rh#2092024 rh#2092025 rh#2092026 rh#2092416 rh#2102165 |
CVE-2022-31740 | mozilla-nss:Released | important | 7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H) | CVE-2022-1919 CVE-2022-31736 CVE-2022-31737 CVE-2022-31738 CVE-2022-31739 CVE-2022-31740 CVE-2022-31742 CVE-2022-31743 CVE-2022-31744 CVE-2022-31745 CVE-2022-31747 CVE-2022-31748 D:CVE-2022-1919 DSA-5156 DSA-5158 DSA-5172 DSA-5175 GLSA-202208-08 Google Chrome Releases Web site MISC:bugzilla.mozilla.org:/buglist.cgi MISC:bugzilla.mozilla.org:/show_bug.cgi MISC:crbug.com:CVE-2022-1919 MISC:www.mozilla.org:/security/advisories/mfsa2022-20/ MISC:www.mozilla.org:/security/advisories/mfsa2022-21/ MISC:www.mozilla.org:/security/advisories/mfsa2022-22/ MISC:www.mozilla.org:/security/advisories/mfsa2022-25/ MISC:www.mozilla.org:/security/advisories/mfsa2022-26/ RHSA-2022:4870 RHSA-2022:4871 RHSA-2022:4872 RHSA-2022:4873 RHSA-2022:4875 RHSA-2022:4876 RHSA-2022:4887 RHSA-2022:4888 RHSA-2022:4889 RHSA-2022:4890 RHSA-2022:4891 RHSA-2022:4892 RHSA-2022:5469 RHSA-2022:5470 RHSA-2022:5472 RHSA-2022:5473 RHSA-2022:5474 RHSA-2022:5475 RHSA-2022:5477 RHSA-2022:5478 RHSA-2022:5479 RHSA-2022:5480 RHSA-2022:5481 RHSA-2022:5482 SMASH Issue 333185 bnc#1200027 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKLJ3B3D5BCVWE3QNP4N7HHF26OHD567/ rh#2092018 rh#2092019 rh#2092021 rh#2092022 rh#2092023 rh#2092024 rh#2092025 rh#2092026 rh#2092416 rh#2102165 |
CVE-2022-31741 | mozilla-nss:Released | important | 7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H) | CVE-2022-31741 MISC:bugzilla.mozilla.org:/show_bug.cgi MISC:www.mozilla.org:/security/advisories/mfsa2022-20/ MISC:www.mozilla.org:/security/advisories/mfsa2022-21/ MISC:www.mozilla.org:/security/advisories/mfsa2022-22/ RHSA-2022:4870 RHSA-2022:4871 RHSA-2022:4872 RHSA-2022:4873 RHSA-2022:4875 RHSA-2022:4876 RHSA-2022:4887 RHSA-2022:4888 RHSA-2022:4889 RHSA-2022:4890 RHSA-2022:4891 RHSA-2022:4892 SMASH Issue 349979 bnc#1200027 rh#2092024 |
CVE-2022-31742 | mozilla-nss:Released | important | 6.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) | CVE-2022-1919 CVE-2022-31736 CVE-2022-31737 CVE-2022-31738 CVE-2022-31739 CVE-2022-31740 CVE-2022-31742 CVE-2022-31743 CVE-2022-31744 CVE-2022-31745 CVE-2022-31747 CVE-2022-31748 D:CVE-2022-1919 DSA-5156 DSA-5158 DSA-5172 DSA-5175 GLSA-202208-08 Google Chrome Releases Web site MISC:bugzilla.mozilla.org:/buglist.cgi MISC:bugzilla.mozilla.org:/show_bug.cgi MISC:crbug.com:CVE-2022-1919 MISC:www.mozilla.org:/security/advisories/mfsa2022-20/ MISC:www.mozilla.org:/security/advisories/mfsa2022-21/ MISC:www.mozilla.org:/security/advisories/mfsa2022-22/ MISC:www.mozilla.org:/security/advisories/mfsa2022-25/ MISC:www.mozilla.org:/security/advisories/mfsa2022-26/ RHSA-2022:4870 RHSA-2022:4871 RHSA-2022:4872 RHSA-2022:4873 RHSA-2022:4875 RHSA-2022:4876 RHSA-2022:4887 RHSA-2022:4888 RHSA-2022:4889 RHSA-2022:4890 RHSA-2022:4891 RHSA-2022:4892 RHSA-2022:5469 RHSA-2022:5470 RHSA-2022:5472 RHSA-2022:5473 RHSA-2022:5474 RHSA-2022:5475 RHSA-2022:5477 RHSA-2022:5478 RHSA-2022:5479 RHSA-2022:5480 RHSA-2022:5481 RHSA-2022:5482 SMASH Issue 333185 bnc#1200027 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKLJ3B3D5BCVWE3QNP4N7HHF26OHD567/ rh#2092018 rh#2092019 rh#2092021 rh#2092022 rh#2092023 rh#2092024 rh#2092025 rh#2092026 rh#2092416 rh#2102165 |
CVE-2022-31743 | mozilla-nss:Released | important | () | CVE-2022-1919 CVE-2022-31736 CVE-2022-31737 CVE-2022-31738 CVE-2022-31739 CVE-2022-31740 CVE-2022-31742 CVE-2022-31743 CVE-2022-31744 CVE-2022-31745 CVE-2022-31747 CVE-2022-31748 D:CVE-2022-1919 DSA-5156 DSA-5158 DSA-5172 DSA-5175 GLSA-202208-08 Google Chrome Releases Web site MISC:bugzilla.mozilla.org:/buglist.cgi MISC:bugzilla.mozilla.org:/show_bug.cgi MISC:crbug.com:CVE-2022-1919 MISC:www.mozilla.org:/security/advisories/mfsa2022-20/ MISC:www.mozilla.org:/security/advisories/mfsa2022-21/ MISC:www.mozilla.org:/security/advisories/mfsa2022-22/ MISC:www.mozilla.org:/security/advisories/mfsa2022-25/ MISC:www.mozilla.org:/security/advisories/mfsa2022-26/ RHSA-2022:4870 RHSA-2022:4871 RHSA-2022:4872 RHSA-2022:4873 RHSA-2022:4875 RHSA-2022:4876 RHSA-2022:4887 RHSA-2022:4888 RHSA-2022:4889 RHSA-2022:4890 RHSA-2022:4891 RHSA-2022:4892 RHSA-2022:5469 RHSA-2022:5470 RHSA-2022:5472 RHSA-2022:5473 RHSA-2022:5474 RHSA-2022:5475 RHSA-2022:5477 RHSA-2022:5478 RHSA-2022:5479 RHSA-2022:5480 RHSA-2022:5481 RHSA-2022:5482 SMASH Issue 333185 bnc#1200027 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKLJ3B3D5BCVWE3QNP4N7HHF26OHD567/ rh#2092018 rh#2092019 rh#2092021 rh#2092022 rh#2092023 rh#2092024 rh#2092025 rh#2092026 rh#2092416 rh#2102165 |
CVE-2022-31744 | mozilla-nss:Released | important | () | CVE-2022-1919 CVE-2022-31736 CVE-2022-31737 CVE-2022-31738 CVE-2022-31739 CVE-2022-31740 CVE-2022-31742 CVE-2022-31743 CVE-2022-31744 CVE-2022-31745 CVE-2022-31747 CVE-2022-31748 D:CVE-2022-1919 DSA-5156 DSA-5158 DSA-5172 DSA-5175 GLSA-202208-08 Google Chrome Releases Web site MISC:bugzilla.mozilla.org:/buglist.cgi MISC:bugzilla.mozilla.org:/show_bug.cgi MISC:crbug.com:CVE-2022-1919 MISC:www.mozilla.org:/security/advisories/mfsa2022-20/ MISC:www.mozilla.org:/security/advisories/mfsa2022-21/ MISC:www.mozilla.org:/security/advisories/mfsa2022-22/ MISC:www.mozilla.org:/security/advisories/mfsa2022-25/ MISC:www.mozilla.org:/security/advisories/mfsa2022-26/ RHSA-2022:4870 RHSA-2022:4871 RHSA-2022:4872 RHSA-2022:4873 RHSA-2022:4875 RHSA-2022:4876 RHSA-2022:4887 RHSA-2022:4888 RHSA-2022:4889 RHSA-2022:4890 RHSA-2022:4891 RHSA-2022:4892 RHSA-2022:5469 RHSA-2022:5470 RHSA-2022:5472 RHSA-2022:5473 RHSA-2022:5474 RHSA-2022:5475 RHSA-2022:5477 RHSA-2022:5478 RHSA-2022:5479 RHSA-2022:5480 RHSA-2022:5481 RHSA-2022:5482 SMASH Issue 333185 bnc#1200027 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKLJ3B3D5BCVWE3QNP4N7HHF26OHD567/ rh#2092018 rh#2092019 rh#2092021 rh#2092022 rh#2092023 rh#2092024 rh#2092025 rh#2092026 rh#2092416 rh#2102165 |
CVE-2022-31745 | mozilla-nss:Released | important | () | CVE-2022-1919 CVE-2022-31736 CVE-2022-31737 CVE-2022-31738 CVE-2022-31739 CVE-2022-31740 CVE-2022-31742 CVE-2022-31743 CVE-2022-31744 CVE-2022-31745 CVE-2022-31747 CVE-2022-31748 D:CVE-2022-1919 DSA-5156 DSA-5158 DSA-5172 DSA-5175 GLSA-202208-08 Google Chrome Releases Web site MISC:bugzilla.mozilla.org:/buglist.cgi MISC:bugzilla.mozilla.org:/show_bug.cgi MISC:crbug.com:CVE-2022-1919 MISC:www.mozilla.org:/security/advisories/mfsa2022-20/ MISC:www.mozilla.org:/security/advisories/mfsa2022-21/ MISC:www.mozilla.org:/security/advisories/mfsa2022-22/ MISC:www.mozilla.org:/security/advisories/mfsa2022-25/ MISC:www.mozilla.org:/security/advisories/mfsa2022-26/ RHSA-2022:4870 RHSA-2022:4871 RHSA-2022:4872 RHSA-2022:4873 RHSA-2022:4875 RHSA-2022:4876 RHSA-2022:4887 RHSA-2022:4888 RHSA-2022:4889 RHSA-2022:4890 RHSA-2022:4891 RHSA-2022:4892 RHSA-2022:5469 RHSA-2022:5470 RHSA-2022:5472 RHSA-2022:5473 RHSA-2022:5474 RHSA-2022:5475 RHSA-2022:5477 RHSA-2022:5478 RHSA-2022:5479 RHSA-2022:5480 RHSA-2022:5481 RHSA-2022:5482 SMASH Issue 333185 bnc#1200027 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKLJ3B3D5BCVWE3QNP4N7HHF26OHD567/ rh#2092018 rh#2092019 rh#2092021 rh#2092022 rh#2092023 rh#2092024 rh#2092025 rh#2092026 rh#2092416 rh#2102165 |
CVE-2022-31747 | mozilla-nss:Released | important | 7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H) | CVE-2022-1919 CVE-2022-31736 CVE-2022-31737 CVE-2022-31738 CVE-2022-31739 CVE-2022-31740 CVE-2022-31742 CVE-2022-31743 CVE-2022-31744 CVE-2022-31745 CVE-2022-31747 CVE-2022-31748 D:CVE-2022-1919 DSA-5156 DSA-5158 DSA-5172 DSA-5175 GLSA-202208-08 Google Chrome Releases Web site MISC:bugzilla.mozilla.org:/buglist.cgi MISC:bugzilla.mozilla.org:/show_bug.cgi MISC:crbug.com:CVE-2022-1919 MISC:www.mozilla.org:/security/advisories/mfsa2022-20/ MISC:www.mozilla.org:/security/advisories/mfsa2022-21/ MISC:www.mozilla.org:/security/advisories/mfsa2022-22/ MISC:www.mozilla.org:/security/advisories/mfsa2022-25/ MISC:www.mozilla.org:/security/advisories/mfsa2022-26/ RHSA-2022:4870 RHSA-2022:4871 RHSA-2022:4872 RHSA-2022:4873 RHSA-2022:4875 RHSA-2022:4876 RHSA-2022:4887 RHSA-2022:4888 RHSA-2022:4889 RHSA-2022:4890 RHSA-2022:4891 RHSA-2022:4892 RHSA-2022:5469 RHSA-2022:5470 RHSA-2022:5472 RHSA-2022:5473 RHSA-2022:5474 RHSA-2022:5475 RHSA-2022:5477 RHSA-2022:5478 RHSA-2022:5479 RHSA-2022:5480 RHSA-2022:5481 RHSA-2022:5482 SMASH Issue 333185 bnc#1200027 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKLJ3B3D5BCVWE3QNP4N7HHF26OHD567/ rh#2092018 rh#2092019 rh#2092021 rh#2092022 rh#2092023 rh#2092024 rh#2092025 rh#2092026 rh#2092416 rh#2102165 |
CVE-2022-31748 | mozilla-nss:Released | important | () | CVE-2022-1919 CVE-2022-31736 CVE-2022-31737 CVE-2022-31738 CVE-2022-31739 CVE-2022-31740 CVE-2022-31742 CVE-2022-31743 CVE-2022-31744 CVE-2022-31745 CVE-2022-31747 CVE-2022-31748 D:CVE-2022-1919 DSA-5156 DSA-5158 DSA-5172 DSA-5175 GLSA-202208-08 Google Chrome Releases Web site MISC:bugzilla.mozilla.org:/buglist.cgi MISC:bugzilla.mozilla.org:/show_bug.cgi MISC:crbug.com:CVE-2022-1919 MISC:www.mozilla.org:/security/advisories/mfsa2022-20/ MISC:www.mozilla.org:/security/advisories/mfsa2022-21/ MISC:www.mozilla.org:/security/advisories/mfsa2022-22/ MISC:www.mozilla.org:/security/advisories/mfsa2022-25/ MISC:www.mozilla.org:/security/advisories/mfsa2022-26/ RHSA-2022:4870 RHSA-2022:4871 RHSA-2022:4872 RHSA-2022:4873 RHSA-2022:4875 RHSA-2022:4876 RHSA-2022:4887 RHSA-2022:4888 RHSA-2022:4889 RHSA-2022:4890 RHSA-2022:4891 RHSA-2022:4892 RHSA-2022:5469 RHSA-2022:5470 RHSA-2022:5472 RHSA-2022:5473 RHSA-2022:5474 RHSA-2022:5475 RHSA-2022:5477 RHSA-2022:5478 RHSA-2022:5479 RHSA-2022:5480 RHSA-2022:5481 RHSA-2022:5482 SMASH Issue 333185 bnc#1200027 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKLJ3B3D5BCVWE3QNP4N7HHF26OHD567/ rh#2092018 rh#2092019 rh#2092021 rh#2092022 rh#2092023 rh#2092024 rh#2092025 rh#2092026 rh#2092416 rh#2102165 |
CVE-2022-3176 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-3176 DSA-5257 L3:64743 MISC:git.kernel.org:CVE-2022-3176 MISC:kernel.dance:CVE-2022-3176 MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update OSS:2022/Q4/30 SMASH Issue 342371 SMASH Issue 342372 ZDI-22-1462 bnc#1203391 bnc#1203511 https://security.netapp.com/advisory/ntap-20230216-0003/ jsc#CAR-2032 rh#2123056 rh#2127890 rh#2134377 rh#2134440 rh#2134451 rh#2134506 rh#2134517 rh#2139586 rh#2139598 |
CVE-2022-3202 | kernel-source-rt:Not affected | moderate | 6.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H) | CONFIRM:security.netapp.com:/advisory/ntap-20221228-0007/ CVE-2022-3202 MISC:github.com:CVE-2022-3202 SMASH Issue 342199 bnc#1203389 rh#2126423 |
CVE-2022-3219 | gpg2:Won't fix | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-3219 SMASH Issue 342465 bnc#1203440 https://access.redhat.com/security/cve/CVE-2022-3219 https://dev.gnupg.org/D556 https://dev.gnupg.org/T5993 https://marc.info/?l=oss-security&m=165696590211434&w=4 https://security.netapp.com/advisory/ntap-20230324-0001/ jsc#CAR-2030 rh#2127010 |
CVE-2022-32205 | curl:Not affected | moderate | 4.9 (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:cert-portal.siemens.com:/productcert/pdf/ssa-333517.pdf CONFIRM:security.netapp.com:CVE-2022-32208 CONFIRM:support.apple.com:CVE-2022-1725 CVE-2022-32205 CVE-2023-23916 CVE-2023-27538 D:CVE-2022-27774 DSA-5197 FEDORA:FEDORA-2022-1b3d7f6973 FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 GLSA-202212-01 MISC:curl.se:OSS:2022/Q2/209 MISC:curl.se:OSS:2022/Q2/210 MISC:curl.se:OSS:2022/Q2/96 MISC:github.com:OSS:2023/02/15/3 MISC:github.com:OSS:2023/03/20/6 MISC:hackerone.com:CVE-2022-32205 OSS:2022/Q2/209 OSS:2023/02/15/3 OSS:2023/03/20/6 Oracle:CVE-2022-27782 Oracle:CVE-2022-32206 Oracle:CVE-2022-32207 SMASH Issue 335196 SMASH Issue 335197 bdo#1010252 bdo#1010253 bdo#1010254 bdo#1010295 bdo#989228 bdo#991492 bnc#1200734 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/ rh#2077541 rh#2077547 rh#2078388 rh#2078408 rh#2082204 rh#2082215 rh#2099296 rh#2099300 rh#2099305 rh#2099306 |
CVE-2022-32206 | curl:Released | moderate | 4.9 (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:cert-portal.siemens.com:/productcert/pdf/ssa-333517.pdf CONFIRM:security.netapp.com:CVE-2022-32208 CONFIRM:support.apple.com:CVE-2022-1725 CVE-2022-32206 CVE-2023-23916 CVE-2023-27538 D:CVE-2022-27774 DSA-5197 FEDORA:FEDORA-2022-1b3d7f6973 FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 GLSA-202212-01 MISC:curl.se:OSS:2022/Q2/210 MISC:curl.se:OSS:2022/Q2/96 MISC:github.com:OSS:2023/02/15/3 MISC:github.com:OSS:2023/03/20/6 MISC:hackerone.com:CVE-2022-32206 MLIST:[debian-lts-announce] 20220828 [SECURITY] [DLA 3085-1] curl security update OSS:2022/Q2/210 OSS:2023/02/15/3 OSS:2023/03/20/6 Oracle:CVE-2022-27782 Oracle:CVE-2022-32206 Oracle:CVE-2022-32207 RHSA-2022:6157 RHSA-2022:6159 RHSA-2022:8840 RHSA-2022:8841 RHSA-2023:3460 SMASH Issue 335198 SMASH Issue 335199 bdo#1010252 bdo#1010253 bdo#1010254 bdo#1010295 bdo#989228 bdo#991492 bnc#1200735 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/ jsc#CAR-1873 rh#2077541 rh#2077547 rh#2078388 rh#2078408 rh#2082204 rh#2082215 rh#2099300 rh#2099305 rh#2099306 |
CVE-2022-32207 | curl:Not affected | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) | CONFIRM:security.netapp.com:CVE-2022-32208 CONFIRM:support.apple.com:CVE-2022-1725 CVE-2022-32207 CVE-2023-23916 CVE-2023-27538 D:CVE-2022-27774 DSA-5197 FEDORA:FEDORA-2022-1b3d7f6973 FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 GLSA-202212-01 MISC:curl.se:OSS:2022/Q2/210 MISC:curl.se:OSS:2022/Q2/211 MISC:curl.se:OSS:2022/Q2/96 MISC:github.com:OSS:2023/02/15/3 MISC:github.com:OSS:2023/03/20/6 MISC:hackerone.com:CVE-2022-32207 OSS:2022/Q2/211 OSS:2023/02/15/3 OSS:2023/03/20/6 Oracle:CVE-2022-27782 Oracle:CVE-2022-32206 Oracle:CVE-2022-32207 RHSA-2022:6157 RHSA-2022:8840 RHSA-2022:8841 SMASH Issue 335200 SMASH Issue 335201 bdo#1010252 bdo#1010253 bdo#1010254 bdo#1010295 bdo#989228 bdo#991492 bnc#1200736 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/ rh#2077541 rh#2077547 rh#2078388 rh#2078408 rh#2082204 rh#2082215 rh#2099300 rh#2099305 rh#2099306 |
CVE-2022-32208 | curl:Released | moderate | 6.6 (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-32208 CONFIRM:support.apple.com:CVE-2022-1725 CVE-2022-32208 CVE-2023-23916 CVE-2023-27538 D:CVE-2022-27774 DSA-5197 FEDORA:FEDORA-2022-1b3d7f6973 FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 GLSA-202212-01 MISC:curl.se:OSS:2022/Q2/210 MISC:curl.se:OSS:2022/Q2/212 MISC:curl.se:OSS:2022/Q2/96 MISC:github.com:OSS:2023/02/15/3 MISC:github.com:OSS:2023/03/20/6 MISC:hackerone.com:CVE-2022-32208 MLIST:[debian-lts-announce] 20220828 [SECURITY] [DLA 3085-1] curl security update OSS:2022/Q2/212 OSS:2023/02/15/3 OSS:2023/03/20/6 Oracle:CVE-2022-27782 Oracle:CVE-2022-32206 Oracle:CVE-2022-32207 RHSA-2022:6157 RHSA-2022:6159 RHSA-2022:8840 RHSA-2022:8841 SMASH Issue 335202 SMASH Issue 335203 bdo#1010252 bdo#1010253 bdo#1010254 bdo#1010295 bdo#989228 bdo#991492 bnc#1200737 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/ jsc#CAR-1874 rh#2077541 rh#2077547 rh#2078388 rh#2078408 rh#2082204 rh#2082215 rh#2099300 rh#2099305 rh#2099306 |
CVE-2022-32221 | curl:Released | important | 7.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) | CONFIRM:security.netapp.com:/advisory/ntap-20230110-0006/ CONFIRM:support.apple.com:/kb/HT213604 CONFIRM:support.apple.com:/kb/HT213605 CVE-2022-32221 CVE-2023-28322 D:CVE-2022-32221 DSA-5330 FULLDISC:20230123 APPLE-SA-2023-01-23-4 macOS Ventura 13.2 FULLDISC:20230123 APPLE-SA-2023-01-23-5 macOS Monterey 12.6.3 GLSA-202212-01 L3:64595 L3:64729 L3:64816 L3:65222 L3:67177 MISC:github.com:OSS:2023/05/17/4 MISC:hackerone.com:/reports/1704017 MLIST:[debian-lts-announce] 20230128 [SECURITY] [DLA 3288-1] curl security update OSS:2022/Q4/47 OSS:2023/05/17/4 OSS:2023/Q2/168 Oracle:CVE-2022-32221 RHSA-2022:8840 RHSA-2022:8841 RHSA-2023:0333 RHSA-2023:4139 RHSA-2023:4354 RHSA-2023:4628 RHSA-2023:4629 RHSA-2023:5598 SMASH Issue 345343 SMASH Issue 345344 SMASH Issue 347686 SMASH Issue 349077 SMASH Issue 350078 SMASH Issue 357312 SMASH Issue 365644 bnc#1204383 bnc#1205287 bnc#1205834 bnc#1206236 bnc#1208340 bnc#1211233 http://seclists.org/fulldisclosure/2023/Jul/47 http://seclists.org/fulldisclosure/2023/Jul/48 http://seclists.org/fulldisclosure/2023/Jul/52 https://hackerone.com/reports/1954658 https://lists.debian.org/debian-lts-announce/2023/12/msg00015.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/ https://security.gentoo.org/glsa/202310-12 https://security.netapp.com/advisory/ntap-20230208-0002/ https://security.netapp.com/advisory/ntap-20230609-0009/ https://support.apple.com/kb/HT213843 https://support.apple.com/kb/HT213844 https://support.apple.com/kb/HT213845 jsc#CAR-2142 rh#2135411 rh#2196793 |
CVE-2022-32250 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-32250 CVE-2022-1966 CVE-2022-32250 D:CVE-2022-1016 D:CVE-2022-2153 D:CVE-2022-32250 D:CVE-2022-32296 DSA-5161 DSA-5173 DSA-5184 FEDORA:FEDORA-2022-80cc9873be FEDORA:FEDORA-2022-8269eaf361 L3:63532 L3:64043 L3:64051 L3:64053 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/04/1 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:OSS:2022/04/02/2 MISC:github.com:OSS:2022/07/02/3 MISC:research.nccgroup.com:OSS:2022/09/02/9 MISC:www.cve.org:OSS:2022/Q2/202 MISC:www.debian.org:CVE-2022-32250 MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/03/1 OSS:2022/06/04/1 OSS:2022/06/20/1 OSS:2022/06/22/1 OSS:2022/07/02/3 OSS:2022/07/03/5 OSS:2022/07/03/6 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/Q2/165 OSS:2022/Q2/202 OSS:2022/Q3/141 OSS:2022/Q3/7 Oracle:CVE-2022-21123 RHSA-2022:5214 RHSA-2022:5216 RHSA-2022:5220 RHSA-2022:5224 RHSA-2022:5232 RHSA-2022:5236 RHSA-2022:5249 RHSA-2022:5267 RHSA-2022:5439 RHSA-2022:5476 RHSA-2022:5626 RHSA-2022:5633 RHSA-2022:5636 RHSA-2022:5641 RHSA-2022:5648 RHSA-2022:5802 RHSA-2022:5804 RHSA-2022:5805 RHSA-2022:5806 RHSA-2022:5819 RHSA-2022:5834 RHSA-2022:5839 RHSA-2022:6073 RHSA-2022:6075 RHSA-2022:6551 SMASH Issue 333177 SMASH Issue 333630 SMASH Issue 334440 SMASH Issue 341246 SMASH Issue 341247 SMASH Issue 341256 ZDI-23-1834 bdo#1006346 bdo#1013299 bdo#922204 bnc#1200015 bnc#1200268 bnc#1200494 bnc#1200529 bnc#1202992 bnc#1202993 bnc#1203002 jsc#CAR-1820 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:eadb2f47a3ced5c64b23b90fd2a3463f63726066 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1832397 rh#2039448 rh#2056381 rh#2058395 rh#2058955 rh#2061633 rh#2062284 rh#2064604 rh#2066614 rh#2066706 rh#2066819 rh#2069736 rh#2070694 rh#2071047 rh#2073064 rh#2074208 rh#2074441 rh#2084183 rh#2084435 rh#2084458 rh#2085300 rh#2086753 rh#2088021 rh#2089815 rh#2090237 rh#2090240 rh#2090241 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2104423 rh#2141026 |
CVE-2022-32296 | kernel-source-rt:Released | moderate | 5.3 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2022-32296 D:CVE-2022-1016 D:CVE-2022-2153 D:CVE-2022-32296 DSA-5161 DSA-5173 DSA-5184 MISC:arxiv.org:CVE-2022-32296 MISC:cdn.kernel.org:CVE-2022-32296 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:CVE-2022-32296 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:CVE-2022-32296 MISC:github.com:OSS:2022/04/02/2 MISC:research.nccgroup.com:OSS:2022/09/02/9 MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/22/1 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/Q3/141 Oracle:CVE-2022-21123 SMASH Issue 333685 ZDI-23-1834 bdo#1006346 bdo#1013299 bdo#922204 bnc#1200288 jsc#CAR-1909 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1832397 rh#2039448 rh#2056381 rh#2058395 rh#2058955 rh#2061633 rh#2062284 rh#2064604 rh#2066614 rh#2066706 rh#2066819 rh#2069736 rh#2070694 rh#2071047 rh#2073064 rh#2074208 rh#2074441 rh#2084435 rh#2084458 rh#2085300 rh#2086753 rh#2088021 rh#2089815 rh#2090237 rh#2090240 rh#2090241 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2104423 rh#2141026 |
CVE-2022-3234 | vim:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) | CONFIRM:huntr.dev:CVE-2022-3234 CVE-2022-3234 D:CVE-2022-3234 FEDORA:FEDORA-2022-40161673a3 FEDORA:FEDORA-2022-4bc60c32a2 FEDORA:FEDORA-2022-fff548cfab L3:64818 L3:65162 L3:65211 L3:65303 L3:65457 MISC:github.com:CVE-2022-3234 MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update SMASH Issue 342850 bnc#1203508 https://security.gentoo.org/glsa/202305-16 rh#2129370 |
CVE-2022-3235 | vim:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:huntr.dev:CVE-2022-3235 CVE-2022-3235 D:CVE-2022-3235 FEDORA:FEDORA-2022-40161673a3 FEDORA:FEDORA-2022-4bc60c32a2 FEDORA:FEDORA-2022-fff548cfab MISC:github.com:CVE-2022-3235 MLIST:[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update SMASH Issue 342857 bnc#1203509 https://security.gentoo.org/glsa/202305-16 jsc#CAR-2034 rh#2129371 |
CVE-2022-3238 | kernel-source-rt:Not affected | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-3238 SMASH Issue 346058 bnc#1204655 rh#2127927 |
CVE-2022-3239 | kernel-source-rt:Released | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-3239 MISC:git.kernel.org:CVE-2022-3239 RHSA-2022:7933 RHSA-2022:8267 RHSA-2023:2736 RHSA-2023:2951 SMASH Issue 342879 bnc#1203552 bnc#1203557 https://security.netapp.com/advisory/ntap-20230214-0006/ jsc#CAR-2038 rh#2127985 |
CVE-2022-3256 | vim:Not affected | moderate | 6.6 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L) | CONFIRM:huntr.dev:CVE-2022-3256 CVE-2022-3256 FEDORA:FEDORA-2022-40161673a3 FEDORA:FEDORA-2022-4bc60c32a2 FEDORA:FEDORA-2022-fff548cfab MISC:github.com:CVE-2022-3256 MLIST:[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update SMASH Issue 343249 bnc#1204117 https://security.gentoo.org/glsa/202305-16 rh#2132571 |
CVE-2022-3278 | vim:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:huntr.dev:CVE-2022-3278 CVE-2022-3278 D:CVE-2022-3278 FEDORA:FEDORA-2022-40161673a3 FEDORA:FEDORA-2022-4bc60c32a2 FEDORA:FEDORA-2022-fff548cfab MISC:github.com:CVE-2022-3278 SMASH Issue 343398 bnc#1203799 https://security.gentoo.org/glsa/202305-16 jsc#CAR-2058 rh#2129831 |
CVE-2022-3296 | vim:Released | moderate | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N) | CONFIRM:huntr.dev:CVE-2022-3296 CVE-2022-3296 D:CVE-2022-3296 FEDORA:FEDORA-2022-40161673a3 FEDORA:FEDORA-2022-4bc60c32a2 FEDORA:FEDORA-2022-fff548cfab L3:64619 MISC:github.com:CVE-2022-3296 SMASH Issue 343565 bnc#1203796 https://security.gentoo.org/glsa/202305-16 jsc#CAR-2056 rh#2129835 |
CVE-2022-3297 | vim:Released | moderate | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:huntr.dev:CVE-2022-3297 CVE-2022-3297 D:CVE-2022-3297 FEDORA:FEDORA-2022-40161673a3 FEDORA:FEDORA-2022-4bc60c32a2 FEDORA:FEDORA-2022-fff548cfab MISC:github.com:CVE-2022-3297 SMASH Issue 343566 bnc#1203797 https://security.gentoo.org/glsa/202305-16 jsc#CAR-2057 rh#2129838 |
CVE-2022-32981 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-32981 MISC:git.kernel.org:CVE-2022-32981 OSS:2022/06/14/3 OSS:2022/Q2/196 SMASH Issue 334200 bnc#1200470 rh#2097387 |
CVE-2022-3303 | kernel-source-rt:Released | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-3303 D:CVE-2022-3303 DSA-5257 L3:66058 MISC:git.kernel.org:CVE-2022-3303 MISC:lore.kernel.org:CVE-2022-3303 MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update OSS:2022/Q4/30 SMASH Issue 343591 ZDI-22-1462 bnc#1203769 jsc#CAR-2059 jsc#CAR-2061 linux.git:commit:0b7808818cb9df6680f98996b8e9a439fa7bcc2f linux.git:commit:8f033d2becc24aa6bfd2a5c104407963560caabc linux.git:commit:aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d linux.git:commit:b2d03cabe2b2e150ff5a381731ea0355459be09f linux.git:commit:bcca852027e5878aec911a347407ecc88d6fff7f linux.git:commit:ff05d4b45dd89b922578dac497dcabf57cf771c6 rh#2123056 rh#2129859 rh#2134377 rh#2134440 rh#2134451 rh#2134506 rh#2134517 rh#2139586 rh#2139598 |
CVE-2022-33099 | lua53:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CVE-2022-33099 D:CVE-2022-33099 FEDORA:FEDORA-2022-5b5889f43a FEDORA:FEDORA-2022-b9ed35a7ad MISC:github.com:CVE-2022-33099 MISC:lua-users.org:CVE-2022-33099 MISC:www.lua.org:CVE-2022-33099 RHSA-2022:7329 SMASH Issue 336077 bnc#1201146 rh#2104427 |
CVE-2022-3324 | vim:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H) | CONFIRM:huntr.dev:CVE-2022-3324 CVE-2022-3324 FEDORA:FEDORA-2022-40161673a3 FEDORA:FEDORA-2022-4bc60c32a2 FEDORA:FEDORA-2022-fff548cfab L3:64320 L3:64527 L3:64619 L3:64621 L3:64818 L3:64822 MISC:github.com:CVE-2022-3324 MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update SMASH Issue 343731 bnc#1203820 bnc#1204102 bnc#1205060 bnc#1205396 bnc#1206245 https://security.gentoo.org/glsa/202305-16 jsc#CAR-2062 jsc#CAR-2063 rh#2132558 |
CVE-2022-3344 | kernel-source-rt:Not affected | moderate | 6.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H) | CVE-2022-3344 MISC:lore.kernel.org:CVE-2022-3344 SMASH Issue 346003 bnc#1204652 linux.git:commit:16ae56d7e0528559bf8dc9070e3bfd8ba3de80df linux.git:commit:ed129ec9057f89d615ba0c81a4984a90345a1684 rh#2130278 |
CVE-2022-3352 | vim:Released | moderate | 5.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) | CONFIRM:huntr.dev:CVE-2022-3352 CVE-2022-3352 FEDORA:FEDORA-2022-40161673a3 FEDORA:FEDORA-2022-4bc60c32a2 FEDORA:FEDORA-2022-fff548cfab MISC:github.com:CVE-2022-3352 MLIST:[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update SMASH Issue 344055 bnc#1203924 https://security.gentoo.org/glsa/202305-16 jsc#CAR-2066 rh#2131087 |
CVE-2022-3358 | openssl:Not affected, openssl-1_1:Not affected | moderate | 6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N) | CONFIRM:git.openssl.org:CVE-2022-3358 CONFIRM:psirt.global.sonicwall.com:CVE-2022-3786 CONFIRM:security.netapp.com:CVE-2022-3358 CONFIRM:www.openssl.org:CVE-2022-3358 CVE-2022-3358 RHSA-2023:2523 SMASH Issue 344658 bnc#1204226 https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=5485c56679d7c49b96e8fc8ca708b0b7e7c03c4b https://security.gentoo.org/glsa/202402-08 openssl.git:commit:25d47cccf203c3b71171e78865e48ea061a039a8 rh#2134740 |
CVE-2022-33740 | kernel-source-rt:Released | moderate | 6.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H) | CONFIRM:xenbits.xen.org:CVE-2022-33742 CVE-2022-26365 CVE-2022-33740 CVE-2022-33741 CVE-2022-33742 D:CVE-2022-26365 D:CVE-2022-33740 D:CVE-2022-33741 DSA-5191 FEDORA:FEDORA-2022-2c9f8224f8 FEDORA:FEDORA-2022-c4ec706488 MISC:github.com:OSS:2022/07/02/3 MISC:xenbits.xenproject.org:CVE-2022-33742 MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update OSS:2022/07/02/3 OSS:2022/07/05/6 OSS:2022/Q3/22 SMASH Issue 335219 SMASH Issue 335223 ZDI-23-1834 bnc#1200762 jsc#CAR-1882 linux.git:commit:2400617da7eebf9167d71a46122828bc479d64c9 linux.git:commit:2f446ffe9d737e9a844b97887919c4fda18246e7 linux.git:commit:307c8de2b02344805ebead3440d8feed28f2f010 linux.git:commit:4491001c2e0fa69efbb748c96ec96b100a5cdb7e linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:e35e5b6f695d241ffb1d223207da58a1fbcdff4b linux.git:commit:f63c2c2032c2e3caad9add3b82cc6e91c376fd26 rh#2092427 rh#2093146 rh#2104114 rh#2104423 rh#2104746 rh#2107924 rh#2108691 |
CVE-2022-33741 | kernel-source-rt:Released | moderate | 6.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H) | CONFIRM:xenbits.xen.org:CVE-2022-33742 CVE-2022-26365 CVE-2022-33740 CVE-2022-33741 CVE-2022-33742 D:CVE-2022-26365 D:CVE-2022-33740 D:CVE-2022-33741 DSA-5191 FEDORA:FEDORA-2022-2c9f8224f8 FEDORA:FEDORA-2022-c4ec706488 MISC:github.com:OSS:2022/07/02/3 MISC:xenbits.xenproject.org:CVE-2022-33742 MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update OSS:2022/07/02/3 OSS:2022/07/05/6 OSS:2022/Q3/22 SMASH Issue 335222 SMASH Issue 335223 ZDI-23-1834 bnc#1200762 jsc#CAR-1882 linux.git:commit:2400617da7eebf9167d71a46122828bc479d64c9 linux.git:commit:2f446ffe9d737e9a844b97887919c4fda18246e7 linux.git:commit:307c8de2b02344805ebead3440d8feed28f2f010 linux.git:commit:4491001c2e0fa69efbb748c96ec96b100a5cdb7e linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:e35e5b6f695d241ffb1d223207da58a1fbcdff4b linux.git:commit:f63c2c2032c2e3caad9add3b82cc6e91c376fd26 rh#2092427 rh#2093146 rh#2104114 rh#2104423 rh#2104746 rh#2107924 rh#2108691 |
CVE-2022-33742 | kernel-source-rt:Released | moderate | 6.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H) | CONFIRM:xenbits.xen.org:CVE-2022-33742 CVE-2022-26365 CVE-2022-33740 CVE-2022-33741 CVE-2022-33742 D:CVE-2022-26365 D:CVE-2022-33740 D:CVE-2022-33741 DSA-5191 FEDORA:FEDORA-2022-2c9f8224f8 FEDORA:FEDORA-2022-c4ec706488 MISC:github.com:OSS:2022/07/02/3 MISC:xenbits.xenproject.org:CVE-2022-33742 MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update OSS:2022/07/02/3 OSS:2022/07/05/6 OSS:2022/Q3/22 SMASH Issue 335220 SMASH Issue 335223 ZDI-23-1834 bnc#1200762 jsc#CAR-1882 linux.git:commit:2400617da7eebf9167d71a46122828bc479d64c9 linux.git:commit:2f446ffe9d737e9a844b97887919c4fda18246e7 linux.git:commit:307c8de2b02344805ebead3440d8feed28f2f010 linux.git:commit:4491001c2e0fa69efbb748c96ec96b100a5cdb7e linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:e35e5b6f695d241ffb1d223207da58a1fbcdff4b linux.git:commit:f63c2c2032c2e3caad9add3b82cc6e91c376fd26 rh#2092427 rh#2093146 rh#2104114 rh#2104423 rh#2104746 rh#2107924 rh#2108691 |
CVE-2022-33743 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:xenbits.xen.org:CVE-2022-33743 CVE-2022-33743 DSA-5191 MISC:github.com:OSS:2022/07/02/3 MISC:xenbits.xenproject.org:CVE-2022-33743 OSS:2022/07/02/3 OSS:2022/07/05/5 OSS:2022/Q3/21 RHSA-2023:2148 RHSA-2023:2458 SMASH Issue 335224 SMASH Issue 336060 ZDI-23-1834 bnc#1200763 bnc#1201629 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:f63c2c2032c2e3caad9add3b82cc6e91c376fd26 rh#2092427 rh#2093146 rh#2104114 rh#2104423 rh#2107924 rh#2108691 |
CVE-2022-33744 | kernel-source-rt:Not affected | moderate | () | CONFIRM:xenbits.xen.org:CVE-2022-33744 CVE-2022-33744 DSA-5191 MISC:github.com:OSS:2022/07/02/3 MISC:xenbits.xenproject.org:CVE-2022-33744 MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update OSS:2022/07/02/3 OSS:2022/07/05/4 OSS:2022/Q3/20 SMASH Issue 335225 SMASH Issue 336061 ZDI-23-1834 bnc#1200764 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:b75cd218274e01d026dc5240e86fdeb44bbed0c8 linux.git:commit:f63c2c2032c2e3caad9add3b82cc6e91c376fd26 rh#2092427 rh#2093146 rh#2104114 rh#2104423 rh#2107924 rh#2108691 |
CVE-2022-33981 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-1836 CVE-2022-33981 D:CVE-2022-1016 D:CVE-2022-2153 D:CVE-2022-32296 DSA-5161 DSA-5173 DSA-5184 L3:64743 MISC:cdn.kernel.org:CVE-2022-33981 MISC:exchange.xforce.ibmcloud.com:CVE-2022-33981 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:OSS:2022/06/22/1 MISC:github.com:CVE-2022-1198 MISC:github.com:CVE-2022-1199 MISC:github.com:CVE-2022-1205 MISC:github.com:CVE-2022-33981 MISC:github.com:OSS:2022/04/02/2 MISC:research.nccgroup.com:OSS:2022/09/02/9 MISC:seclists.org:CVE-2022-33981 MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update OSS:2022/04/02/2 OSS:2022/04/02/3 OSS:2022/04/02/4 OSS:2022/04/02/5 OSS:2022/05/20/2 OSS:2022/05/31/1 OSS:2022/06/22/1 OSS:2022/08/25/1 OSS:2022/08/25/2 OSS:2022/09/02/9 OSS:2022/Q3/141 Oracle:CVE-2022-21123 SMASH Issue 330078 SMASH Issue 335107 ZDI-23-1834 bdo#1006346 bdo#1013299 bdo#922204 bnc#1198866 bnc#1200692 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#1832397 rh#2039448 rh#2056381 rh#2058395 rh#2058955 rh#2061633 rh#2062284 rh#2064604 rh#2066614 rh#2066706 rh#2066819 rh#2069736 rh#2070694 rh#2071047 rh#2073064 rh#2074208 rh#2074441 rh#2080330 rh#2084435 rh#2084458 rh#2085300 rh#2086753 rh#2088021 rh#2089815 rh#2090237 rh#2090240 rh#2090241 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2099504 rh#2104423 rh#2141026 |
CVE-2022-3424 | kernel-source-rt:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-3424 L3:64459 L3:64743 L3:65176 L3:66061 SMASH Issue 344423 bnc#1204166 bnc#1204167 https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz@163.com/ https://security.netapp.com/advisory/ntap-20230406-0005/ https://www.spinics.net/lists/kernel/msg4518970.html jsc#CAR-2090 rh#2132640 |
CVE-2022-3435 | kernel-source-rt:Released | moderate | 5.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H) | CVE-2022-3435 D:CVE-2022-3435 FEDORA:FEDORA-2022-1a5b125ac6 FEDORA:FEDORA-2022-2cfbe17910 FEDORA:FEDORA-2022-b948fc3cfb MLIST:[debian-lts-announce] 20221222 [SECURITY] [DLA 3244-1] linux-5.10 security update RHSA-2023:2148 RHSA-2023:2458 SMASH Issue 344554 ZDI-22-1405 bnc#1204171 jsc#CAR-2092 lore.kernel.org:CVE-2022-3435 rh#2133490 vuldb.com:CVE-2022-3435 |
CVE-2022-34494 | kernel-source-rt:Not affected | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-34494 D:CVE-2022-34494 MISC:cdn.kernel.org:CVE-2022-34495 MISC:github.com:CVE-2022-34494 SMASH Issue 335612 bnc#1201158 rh#2102205 |
CVE-2022-34495 | kernel-source-rt:Not affected | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-34495 D:CVE-2022-34495 MISC:cdn.kernel.org:CVE-2022-34495 MISC:github.com:CVE-2022-34495 SMASH Issue 335613 bnc#1201159 rh#2102218 |
CVE-2022-3479 | mozilla-nss:Released | moderate | 6.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-3479 GLSA-202212-05 MISC:bugzilla.mozilla.org:CVE-2022-3479 Oracle:CVE-2022-3479 SMASH Issue 344985 bnc#1204272 jsc#CAR-2100 rh#2134331 |
CVE-2022-34903 | gpg2:Released | moderate | 6.8 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N) | CONFIRM:security.netapp.com:CVE-2022-34903 CVE-2022-34903 D:CVE-2022-34903 DSA-5174 FEDORA:FEDORA-2022-0dbfb7e270 FEDORA:FEDORA-2022-1124e5882d FEDORA:FEDORA-2022-1747eea46c FEDORA:FEDORA-2022-aa14d396dd MISC:dev.gnupg.org:CVE-2022-34903 OSS:2022/06/30/1 OSS:2022/07/02/1 OSS:2022/Q3/0 RHSA-2022:6463 RHSA-2022:6602 SMASH Issue 336147 bdo#1014157 bnc#1201225 jsc#CAR-1881 rh#2102868 rh#2103242 |
CVE-2022-3491 | vim:Released | low | 4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | CONFIRM:huntr.dev:/bounties/6e6e05c2-2cf7-4aa5-a817-a62007bf92cb CVE-2022-3491 D:CVE-2022-3491 L3:64806 MISC:github.com:/vim/vim/commit/3558afe9e9e904cabb8475392d859f2d2fc21041 SMASH Issue 349719 bnc#1206028 https://security.gentoo.org/glsa/202305-16 jsc#CAR-2221 jsc#PED-1802 rh#2150770 |
CVE-2022-34918 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-34918 CVE-2022-34918 DSA-5161 DSA-5191 MISC:git.kernel.org:CVE-2022-32250 MISC:git.kernel.org:CVE-2022-34918 MISC:github.com:OSS:2022/07/02/3 MISC:lore.kernel.org:CVE-2022-34918 MISC:packetstormsecurity.com:CVE-2022-34918 MISC:research.nccgroup.com:OSS:2022/09/02/9 MISC:www.randorisec.fr:CVE-2022-34918 OSS:2022/05/31/1 OSS:2022/07/02/3 OSS:2022/07/05/1 OSS:2022/08/06/5 OSS:2022/08/25/1 OSS:2022/09/02/9 OSS:2022/Q3/141 OSS:2022/Q3/17 RHSA-2022:6582 RHSA-2022:6592 RHSA-2022:6610 SMASH Issue 336246 SMASH Issue 336265 ZDI-23-1834 bnc#1201171 bnc#1201177 bnc#1201222 linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8 linux.git:commit:f63c2c2032c2e3caad9add3b82cc6e91c376fd26 linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9 rh#2039448 rh#2058395 rh#2064604 rh#2074208 rh#2086753 rh#2089815 rh#2092427 rh#2092537 rh#2093146 rh#2096178 rh#2096901 rh#2104114 rh#2104423 rh#2107924 rh#2108691 |
CVE-2022-3509 | protobuf:Already fixed | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-3509 MISC:github.com:/protocolbuffers/protobuf/commit/a3888f53317a8018e7a439bac4abeb8f3425d5e9 Oracle:CVE-2022-3171 Oracle:CVE-2022-3510 RHSA-2023:1855 RHSA-2023:3815 SMASH Issue 350310 bnc#1206544 jsc#CAR-2247 rh#2137645 rh#2184161 rh#2184176 |
CVE-2022-3510 | protobuf:Already fixed | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-3510 MISC:github.com:/protocolbuffers/protobuf/commit/db7c17803320525722f45c1d26fc08bc41d1bf48 Oracle:CVE-2022-3171 Oracle:CVE-2022-3510 RHSA-2023:1855 RHSA-2023:3815 SMASH Issue 350309 bnc#1206545 jsc#CAR-2251 rh#2137645 rh#2184161 rh#2184176 |
CVE-2022-3515 | libksba:Released | critical | 9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-3515 DSA-5255 L3:64462 L3:64547 L3:64676 L3:64691 L3:64821 L3:65108 L3:65223 MISC:access.redhat.com:/security/cve/CVE-2022-3515 MISC:dev.gnupg.org:/rK4b7d9cd4a018898d7714ce06f3faf2626c14582b MISC:www.gnupg.org:/blog/20221017-pepe-left-the-ksba.html RHSA-2022:7088 RHSA-2022:7089 RHSA-2022:7090 RHSA-2022:7209 RHSA-2022:7283 RHSA-2022:7927 RHSA-2022:8598 SMASH Issue 345319 SMASH Issue 345320 bdo#1021928 bnc#1204357 https://security.netapp.com/advisory/ntap-20230706-0008/ jsc#CAR-2114 rh#2135610 |
CVE-2022-3520 | vim:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) | CONFIRM:huntr.dev:/bounties/c1db3b70-f4fe-481f-8a24-0b1449c94246 CVE-2022-3520 L3:64932 L3:65186 L3:65231 L3:65301 L3:65303 MISC:github.com:/vim/vim/commit/36343ae0fb7247e060abfd35fb8e4337b33abb4b SMASH Issue 349542 bnc#1206071 https://security.gentoo.org/glsa/202305-16 jsc#CAR-2218 jsc#PED-1802 rh#2150924 |
CVE-2022-3521 | kernel-source-rt:Released | moderate | 5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-3521 D:CVE-2022-3521 L3:67179 MISC:git.kernel.org:CVE-2022-3521 MISC:vuldb.com:CVE-2022-3521 MLIST:[debian-lts-announce] 20221222 [SECURITY] [DLA 3244-1] linux-5.10 security update MLIST:[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update SMASH Issue 345305 bnc#1204355 jsc#CAR-2108 rh#2150975 |
CVE-2022-3522 | kernel-source-rt:Won't fix | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-3522 D:CVE-2022-3522 L3:64743 L3:65224 L3:65237 L3:65449 MISC:git.kernel.org:CVE-2022-3522 MISC:vuldb.com:CVE-2022-3522 RHSA-2023:2148 RHSA-2023:2458 RHSA-2023:2736 RHSA-2023:2951 SMASH Issue 345304 bnc#1204358 rh#2150979 |
CVE-2022-3523 | kernel-source-rt:Released | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-3523 D:CVE-2022-3523 MISC:git.kernel.org:CVE-2022-3523 MISC:vuldb.com:CVE-2022-3523 SMASH Issue 345303 bnc#1204363 jsc#CAR-2144 rh#2143906 |
CVE-2022-3524 | kernel-source-rt:Released | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-3524 D:CVE-2022-3524 L3:66071 MISC:git.kernel.org:CVE-2022-3524 MISC:vuldb.com:CVE-2022-3524 MLIST:[debian-lts-announce] 20221222 [SECURITY] [DLA 3244-1] linux-5.10 security update MLIST:[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update RHSA-2023:2148 RHSA-2023:2458 RHSA-2023:2736 RHSA-2023:2951 SMASH Issue 345302 bnc#1204354 jsc#CAR-2107 rh#2150947 |
CVE-2022-35252 | curl:Released | low | 3.7 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) | CONFIRM:security.netapp.com:CVE-2022-35252 CONFIRM:support.apple.com:/kb/HT213603 CONFIRM:support.apple.com:/kb/HT213604 CVE-2022-35252 D:CVE-2022-35252 FULLDISC:20230123 APPLE-SA-2023-01-23-5 macOS Monterey 12.6.3 FULLDISC:20230123 APPLE-SA-2023-01-23-6 macOS Big Sur 11.7.3 GLSA-202212-01 MISC:hackerone.com:CVE-2022-35252 MLIST:[debian-lts-announce] 20230128 [SECURITY] [DLA 3288-1] curl security update Oracle:CVE-2022-2509 RHSA-2022:8840 RHSA-2022:8841 RHSA-2023:2478 RHSA-2023:2963 SMASH Issue 340371 SMASH Issue 340372 bnc#1202593 jsc#CAR-2004 rh#2108977 rh#2120718 |
CVE-2022-3526 | kernel-source-rt:Not affected | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-3526 D:CVE-2022-3526 MISC:git.kernel.org:CVE-2022-3526 MISC:vuldb.com:CVE-2022-3526 SMASH Issue 345307 bnc#1204353 rh#2161341 |
CVE-2022-35260 | curl:Not affected | moderate | 5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:/advisory/ntap-20230110-0006/ CONFIRM:support.apple.com:/kb/HT213604 CONFIRM:support.apple.com:/kb/HT213605 CVE-2022-35260 FULLDISC:20230123 APPLE-SA-2023-01-23-4 macOS Ventura 13.2 FULLDISC:20230123 APPLE-SA-2023-01-23-5 macOS Monterey 12.6.3 GLSA-202212-01 MISC:hackerone.com:/reports/1721098 OSS:2022/Q4/48 SMASH Issue 345345 SMASH Issue 345346 bnc#1204384 rh#2135412 |
CVE-2022-3527 | iproute2:Won't fix | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CVE-2022-3527 D:CVE-2022-3527 L3:64410 MISC:git.kernel.org:CVE-2022-3527 MISC:vuldb.com:CVE-2022-3527 SMASH Issue 345308 bnc#1204376 bnc#1204590 |
CVE-2022-3528 | iproute2:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CVE-2022-3528 D:CVE-2022-3528 L3:64410 MISC:git.kernel.org:CVE-2022-3528 MISC:vuldb.com:CVE-2022-3528 SMASH Issue 345309 bnc#1204374 |
CVE-2022-3529 | iproute2:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CVE-2022-3529 L3:64410 MISC:git.kernel.org:CVE-2022-3529 MISC:vuldb.com:CVE-2022-3529 SMASH Issue 345311 bnc#1204373 |
CVE-2022-3530 | iproute2:Won't fix | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CVE-2022-3530 L3:64410 MISC:git.kernel.org:CVE-2022-3530 MISC:vuldb.com:CVE-2022-3530 SMASH Issue 345310 bnc#1204372 jsc#CAR-2110 |
CVE-2022-3531 | kernel-source-rt:Not affected | low | 0 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N) | CVE-2022-3531 D:CVE-2022-3531 SMASH Issue 345334 bnc#1204420 git.kernel.org:CVE-2022-3531 vuldb.com:CVE-2022-3531 |
CVE-2022-3532 | kernel-source-rt:Not affected | low | 0 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N) | CVE-2022-3532 D:CVE-2022-3532 SMASH Issue 345333 bnc#1204418 git.kernel.org:CVE-2022-3532 vuldb.com:CVE-2022-3532 |
CVE-2022-3533 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-3533 D:CVE-2022-3533 SMASH Issue 345332 bnc#1204393 git.kernel.org:CVE-2022-3533 rh#2165625 vuldb.com:CVE-2022-3533 |
CVE-2022-3534 | kernel-source-rt:Not affected | important | 7.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H) | CVE-2022-3534 L3:64716 L3:64743 SMASH Issue 345331 bnc#1204391 git.kernel.org:CVE-2022-3534 rh#2165706 vuldb.com:CVE-2022-3534 |
CVE-2022-3535 | kernel-source-rt:Released | low | 2.3 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L) | CVE-2022-3535 SMASH Issue 345330 bnc#1204417 git.kernel.org:CVE-2022-3535 jsc#CAR-2124 vuldb.com:CVE-2022-3535 |
CVE-2022-3541 | kernel-source-rt:Not affected | important | () | CONFIRM:security.netapp.com:/advisory/ntap-20221228-0001/ CVE-2022-3541 SMASH Issue 345388 bnc#1204403 git.kernel.org:CVE-2022-3541 rh#2168174 vuldb.com:CVE-2022-3541 |
CVE-2022-3542 | kernel-source-rt:Released | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-3542 L3:67179 SMASH Issue 345387 bnc#1204402 git.kernel.org:CVE-2022-3542 jsc#CAR-2125 rh#2156672 vuldb.com:CVE-2022-3542 |
CVE-2022-3543 | kernel-source-rt:Not affected | moderate | () | CVE-2022-3543 SMASH Issue 345386 bnc#1204401 git.kernel.org:CVE-2022-3543 rh#2161185 vuldb.com:CVE-2022-3543 |
CVE-2022-3544 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-3544 L3:67179 SMASH Issue 345385 bnc#1204404 git.kernel.org:CVE-2022-3544 rh#2161210 vuldb.com:CVE-2022-3544 |
CVE-2022-3545 | kernel-source-rt:Released | important | 7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:/advisory/ntap-20221223-0003/ CVE-2022-3545 DSA-5324 L3:64716 L3:64743 L3:65426 L3:67191 SMASH Issue 345384 bnc#1204415 bnc#1204424 git.kernel.org:CVE-2022-3545 https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html jsc#CAR-2119 rh#2161310 vuldb.com:CVE-2022-3545 |
CVE-2022-3560 | pesign:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-3560 OSS:2023/Q1/66 RHSA-2023:1065 RHSA-2023:1066 RHSA-2023:1067 RHSA-2023:1093 RHSA-2023:1107 RHSA-2023:1572 RHSA-2023:1586 RHSA-2023:1829 SMASH Issue 341148 SMASH Issue 345556 bnc#1202933 jsc#CAR-2347 rh#2135420 |
CVE-2022-3564 | kernel-source-rt:Released | important | 8 (CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:/advisory/ntap-20221223-0001/ CVE-2022-3564 L3:64933 L3:65173 L3:65176 L3:65185 L3:66491 MISC:git.kernel.org:CVE-2022-3564 MISC:vuldb.com:CVE-2022-3564 MLIST:[debian-lts-announce] 20221222 [SECURITY] [DLA 3244-1] linux-5.10 security update MLIST:[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update RHSA-2023:0856 RHSA-2023:0858 RHSA-2023:0951 RHSA-2023:0979 RHSA-2023:1008 RHSA-2023:1202 RHSA-2023:1203 RHSA-2023:1220 RHSA-2023:1221 RHSA-2023:1251 RHSA-2023:1435 RHSA-2023:1559 RHSA-2023:1560 RHSA-2023:1666 RHSA-2023:2736 RHSA-2023:2951 RHSA-2023:3277 RHSA-2023:3278 RHSA-2023:3388 RHSA-2023:3431 RHSA-2023:3491 RHSA-2023:4020 RHSA-2023:4021 RHSA-2023:4150 RHSA-2023:4151 RHSA-2023:4215 SMASH Issue 345418 bnc#1206073 bnc#1206314 bnc#1206819 jsc#CAR-2232 rh#2067482 rh#2127890 rh#2150999 |
CVE-2022-3565 | kernel-source-rt:Released | important | 7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-3565 L3:64459 L3:64743 L3:65176 L3:65224 L3:65237 L3:66074 MISC:git.kernel.org:CVE-2022-3565 MISC:vuldb.com:CVE-2022-3565 MLIST:[debian-lts-announce] 20221222 [SECURITY] [DLA 3244-1] linux-5.10 security update MLIST:[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update SMASH Issue 345417 bnc#1204431 bnc#1204432 jsc#CAR-2120 rh#2150953 |
CVE-2022-3566 | kernel-source-rt:Released | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-3566 L3:66044 MISC:git.kernel.org:CVE-2022-3566 MISC:vuldb.com:CVE-2022-3566 RHSA-2023:2148 RHSA-2023:2458 RHSA-2023:2736 RHSA-2023:2951 SMASH Issue 345416 bnc#1204405 bnc#1212288 jsc#CAR-2116 rh#2143893 |
CVE-2022-3567 | kernel-source-rt:Released | moderate | 5.3 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-3567 MISC:git.kernel.org:CVE-2022-3567 MISC:vuldb.com:CVE-2022-3567 RHSA-2023:2148 RHSA-2023:2458 RHSA-2023:2736 RHSA-2023:2951 SMASH Issue 345415 bnc#1204414 jsc#CAR-2117 rh#2143943 |
CVE-2022-35737 | sqlite3:Released | moderate | 6.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N) | CONFIRM:security.netapp.com:CVE-2022-35737 CONFIRM:sqlite.org:CVE-2022-35737 CVE-2022-35737 GLSA-202210-40 L3:64120 L3:65975 MISC:blog.trailofbits.com:CVE-2022-35737 MISC:kb.cert.org:CVE-2022-35737 MISC:www.sqlite.org:CVE-2022-35737 Oracle:CVE-2022-35737 RHSA-2023:0110 RHSA-2023:0339 SMASH Issue 338036 SMASH Issue 338037 bnc#1201783 bnc#1203345 jsc#CAR-2023 jsc#CAR-2025 rh#2110291 |
CVE-2022-3577 | kernel-source-rt:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-3577 L3:64716 L3:64743 MISC:git.kernel.org:CVE-2022-3577 SMASH Issue 345587 bnc#1204470 bnc#1204486 jsc#CAR-2127 rh#2135717 |
CVE-2022-3586 | kernel-source-rt:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-3586 L3:64459 L3:64525 L3:64549 L3:64716 L3:64743 L3:65176 L3:65426 L3:66050 MISC:github.com:CVE-2022-3586 MISC:www.zerodayinitiative.com:CVE-2022-3586 MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update SMASH Issue 345558 bnc#1204439 bnc#1204576 bnc#1204803 jsc#CAR-2122 jsc#CAR-2123 rh#2120664 rh#2124475 rh#2132640 rh#2150953 |
CVE-2022-3591 | vim:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) | CONFIRM:huntr.dev:/bounties/a5a998c2-4b07-47a7-91be-dbc1886b3921 CVE-2022-3591 L3:64805 L3:64806 L3:64932 L3:65186 L3:65231 L3:65301 MISC:github.com:/vim/vim/commit/8f3c3c6cd044e3b5bf08dbfa3b3f04bb3f711bad SMASH Issue 349583 bnc#1206072 bnc#1206202 bnc#1206203 https://security.gentoo.org/glsa/202305-16 jsc#CAR-2219 jsc#PED-1802 rh#2150770 rh#2150925 |
CVE-2022-3593 | iproute2:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CVE-2022-3593 SMASH Issue 345717 bnc#1204484 git.kernel.org:CVE-2022-3593 vuldb.com:CVE-2022-3593 |
CVE-2022-3594 | kernel-source-rt:Released | moderate | 5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-3594 L3:67179 MLIST:[debian-lts-announce] 20221222 [SECURITY] [DLA 3244-1] linux-5.10 security update MLIST:[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update SMASH Issue 345716 bnc#1204479 git.kernel.org:CVE-2022-3594 jsc#CAR-2126 rh#2149024 vuldb.com:CVE-2022-3594 |
CVE-2022-3595 | kernel-source-rt:Not affected | moderate | () | CVE-2022-3595 SMASH Issue 345715 bnc#1204476 git.kernel.org:CVE-2022-3595 rh#2143935 vuldb.com:CVE-2022-3595 |
CVE-2022-3602 | openssl:Not affected, openssl-1_1:Not affected | important | 8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CERT-VN:VU#794340 CISCO:20221028 Vulnerabilities in OpenSSL Affecting Cisco Products: November 2022 CONFIRM:git.openssl.org:CVE-2022-3602 CONFIRM:git.openssl.org:CVE-2022-3786 CONFIRM:psirt.global.sonicwall.com:CVE-2022-3786 CONFIRM:security.netapp.com:CVE-2022-3786 CONFIRM:www.openssl.org:CVE-2022-3786 CVE-2022-3602 CVE-2022-3786 FEDORA:FEDORA-2022-0f1d2e0537 FEDORA:FEDORA-2022-502f096dce GLSA-202211-01 MISC:git.openssl.org:CVE-2022-3602 MISC:git.openssl.org:CVE-2022-3786 MISC:lists.fedoraproject.org:CVE-2022-3786 MISC:packetstormsecurity.com:CVE-2022-3786 OSS:2022/11/01/15 OSS:2022/11/01/16 OSS:2022/11/01/17 OSS:2022/11/01/18 OSS:2022/11/01/19 OSS:2022/11/01/20 OSS:2022/11/01/21 OSS:2022/11/01/24 OSS:2022/11/02/1 OSS:2022/11/02/10 OSS:2022/11/02/11 OSS:2022/11/02/12 OSS:2022/11/02/13 OSS:2022/11/02/14 OSS:2022/11/02/15 OSS:2022/11/02/2 OSS:2022/11/02/3 OSS:2022/11/02/5 OSS:2022/11/02/6 OSS:2022/11/02/7 OSS:2022/11/02/9 OSS:2022/11/03/1 OSS:2022/11/03/10 OSS:2022/11/03/11 OSS:2022/11/03/2 OSS:2022/11/03/3 OSS:2022/11/03/5 OSS:2022/11/03/6 OSS:2022/11/03/7 OSS:2022/11/03/9 OSS:2022/Q4/103 OSS:2022/Q4/84 RHSA-2022:7288 RHSA-2022:7384 SMASH Issue 346121 bnc#1204714 openssl.git:commit:3b421ebc64c7b52f1b9feb3812bdc7781c784332 openssl.git:commit:680e65b94c916af259bfdc2e25f1ab6e0c7a97d6 openssl.git:commit:a0af4a3c8b18c435a5a4afb28b3ad1a2730e6ea8 rh#2137723 rh#2139104 |
CVE-2022-3606 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-3606 D:CVE-2022-3606 SMASH Issue 345752 bnc#1204502 git.kernel.org:CVE-2022-3606 rh#2155196 vuldb.com:CVE-2022-3606 |
CVE-2022-36123 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:cdn.kernel.org:CVE-2022-36123 CONFIRM:github.com:CVE-2022-36123 CONFIRM:security.netapp.com:CVE-2022-36123 CVE-2022-36123 D:CVE-2022-36123 L3:64716 L3:64743 MISC:github.com:CVE-2022-36123 MISC:sick.codes:CVE-2022-36123 SMASH Issue 338514 bnc#1202010 bnc#1202583 jsc#CAR-1948 rh#2115342 |
CVE-2022-3619 | kernel-source-rt:Not affected | moderate | 5.3 (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-3619 RHSA-2023:2148 RHSA-2023:2458 RHSA-2023:2736 RHSA-2023:2951 SMASH Issue 345963 bnc#1204569 git.kernel.org:CVE-2022-3619 rh#2154235 vuldb.com:CVE-2022-3619 |
CVE-2022-3621 | kernel-source-rt:Released | moderate | 4.3 (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-3621 L3:66051 MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update MLIST:[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update SMASH Issue 345961 bnc#1204574 git.kernel.org:CVE-2022-3621 rh#2140883 vuldb.com:CVE-2022-3621 |
CVE-2022-36227 | libarchive:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CVE-2022-36227 FEDORA:FEDORA-2022-e15be0091f MISC:bugs.gentoo.org:CVE-2022-36227 MISC:github.com:/libarchive/libarchive/blob/v3.0.0a/libarchive/archive_write.c MISC:github.com:CVE-2022-36227 MLIST:[debian-lts-announce] 20230130 [SECURITY] [DLA 3294-1] libarchive security update RHSA-2023:2532 RHSA-2023:3018 SMASH Issue 348558 bnc#1205629 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V67OO2UUQAUJS3IK4JZPF6F3LUCBU6IS/ https://security.gentoo.org/glsa/202309-14 jsc#CAR-2183 rh#2144972 |
CVE-2022-3623 | kernel-source-rt:Released | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-3623 DSA-5324 RHSA-2023:2148 RHSA-2023:2458 RHSA-2023:2736 RHSA-2023:2951 SMASH Issue 345960 bnc#1204575 git.kernel.org:CVE-2022-3623 https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html jsc#CAR-2139 rh#2165721 vuldb.com:CVE-2022-3623 |
CVE-2022-3624 | kernel-source-rt:Not affected | low | () | CVE-2022-3624 D:CVE-2022-3624 SMASH Issue 346002 bnc#1204639 git.kernel.org:CVE-2022-3624 rh#2151641 vuldb.com:CVE-2022-3624 |
CVE-2022-3625 | kernel-source-rt:Released | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-3625 D:CVE-2022-3625 MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update RHSA-2023:2148 RHSA-2023:2458 RHSA-2023:2736 RHSA-2023:2951 SMASH Issue 346001 bnc#1204637 git.kernel.org:CVE-2022-3625 jsc#CAR-2140 rh#2144720 vuldb.com:CVE-2022-3625 |
CVE-2022-3628 | kernel-source-rt:Released | moderate | 4.6 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-3628 MISC:git.kernel.org:/pub/scm/linux/kernel/git/torvalds/linux.git/patch/drivers/net/wireless/broadcom/brcm80211/brcmfmac/fweh.c OSS:2022/Q4/60 RHSA-2023:2148 RHSA-2023:2458 RHSA-2023:2736 RHSA-2023:2951 SMASH Issue 346607 bnc#1204868 jsc#CAR-2149 linux.git:commit:6788ba8aed4e28e90f72d68a9d794e34eac17295 rh#2150960 |
CVE-2022-36280 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-36280 DSA-5324 MISC:bugzilla.openanolis.cn:CVE-2022-36280 RHSA-2023:2148 RHSA-2023:2458 SMASH Issue 342043 bnc#1203332 https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html rh#2133450 |
CVE-2022-3629 | kernel-source-rt:Released | low | 2.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2022-3629 D:CVE-2022-3629 MISC:vuldb.com:/ MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update SMASH Issue 346000 bnc#1204635 git.kernel.org:CVE-2022-3629 jsc#CAR-2138 rh#2151644 vuldb.com:CVE-2022-3629 |
CVE-2022-3630 | kernel-source-rt:Not affected | moderate | () | CVE-2022-3630 D:CVE-2022-3630 SMASH Issue 345999 bnc#1204634 git.kernel.org:CVE-2022-3630 rh#2151651 vuldb.com:CVE-2022-3630 |
CVE-2022-3633 | kernel-source-rt:Not affected | low | 2.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2022-3633 D:CVE-2022-3633 MISC:git.kernel.org:CVE-2022-3633 MISC:vuldb.com:/ MISC:vuldb.com:CVE-2022-3633 MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update SMASH Issue 345997 bnc#1204650 rh#2151655 |
CVE-2022-3635 | kernel-source-rt:Released | important | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-36946 CVE-2022-2588 CVE-2022-3635 CVE-2022-42703 D:CVE-2022-26373 D:CVE-2022-3635 D:CVE-2022-36879 D:CVE-2022-36946 DSA-5184 DSA-5207 DSA-5324 L3:63917 L3:64012 L3:64086 L3:64306 L3:64310 L3:64329 L3:64525 L3:64549 L3:64602 L3:64716 L3:64728 L3:64743 L3:65176 L3:65426 L3:66045 MISC:bugs.chromium.org:CVE-2022-42703 MISC:cdn.kernel.org:CVE-2022-42703 MISC:git.kernel.org:CVE-2022-42703 MISC:github.com:CVE-2022-42703 MISC:googleprojectzero.blogspot.com:/2022/12/exploiting-CVE-2022-42703-bringing-back-the-stack-attack.html MISC:marc.info:CVE-2022-36946 MLIST:[debian-lts-announce] 20220911 [SECURITY] [DLA 3102-1] linux-5.10 new package MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update OSS:2022/08/09/5 OSS:2022/08/09/6 OSS:2022/08/09/7 OSS:2022/Q3/114 OSS:2022/Q3/115 OSS:2022/Q3/116 RHSA-2022:6551 RHSA-2022:6872 RHSA-2022:6875 RHSA-2022:6978 RHSA-2022:6983 RHSA-2022:6991 RHSA-2022:7110 RHSA-2022:7134 RHSA-2022:7137 RHSA-2022:7146 RHSA-2022:7171 RHSA-2022:7173 RHSA-2022:7279 RHSA-2022:7280 RHSA-2022:7337 RHSA-2022:7338 RHSA-2022:7344 RHSA-2022:7885 RHSA-2023:1091 RHSA-2023:1092 RHSA-2023:2148 RHSA-2023:2458 RHSA-2023:2736 RHSA-2023:2951 RHSA-2023:3388 RHSA-2023:4022 RHSA-2023:4023 RHSA-2023:4137 RHSA-2023:4138 SMASH Issue 338825 SMASH Issue 345996 ZDI-22-1117 ZDI-22-1118 bnc#1201941 bnc#1202096 bnc#1202961 bnc#1203613 bnc#1204168 bnc#1204170 bnc#1204631 bnc#1204636 bnc#1205058 bnc#1205085 git.kernel.org:CVE-2022-3635 https://github.com/Markakd/CVE-2022-2588 https://lore.kernel.org/netdev/20220809170518.164662-1-cascardo@canonical.com/T/#u https://ubuntu.com/security/notices/USN-5557-1 https://ubuntu.com/security/notices/USN-5560-1 https://ubuntu.com/security/notices/USN-5560-2 https://ubuntu.com/security/notices/USN-5562-1 https://ubuntu.com/security/notices/USN-5564-1 https://ubuntu.com/security/notices/USN-5565-1 https://ubuntu.com/security/notices/USN-5566-1 https://ubuntu.com/security/notices/USN-5567-1 https://ubuntu.com/security/notices/USN-5582-1 https://ubuntu.com/security/notices/USN-5588-1 https://www.zerodayinitiative.com/advisories/ZDI-22-1117/ jsc#CAR-1930 jsc#CAR-1961 jsc#CAR-2091 jsc#CAR-2137 linux.git:commit:31185df7e2b1d2fa1de4900247a12d7b9c7087eb linux.git:commit:33172ab50a53578a95691310f49567c9266968b0 linux.git:commit:3777ea7bac3113005b7180e6b9dadf16d19a5827 linux.git:commit:42baefac638f06314298087394b982ead9ec444b linux.git:commit:470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2 linux.git:commit:5cadd4bb1d7fc9ab201ac14620d1a478357e4ebd linux.git:commit:66e3531b33ee51dad17c463b4d9c9f52e341503d linux.git:commit:6b1775f26a2da2b05a6dc8ec2b5d14e9a4701a1a linux.git:commit:9ad36309e2719a884f946678e0296be10f0bb4c1 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:abf1fd5919d6238ee3bc5eb4a9b6c3947caa6638 linux.git:commit:b0576cc9c6b843d99c6982888d59a56209341888 linux.git:commit:d3b6372c5881cb54925212abb62c521df8ba4809 linux.git:commit:eadb2f47a3ced5c64b23b90fd2a3463f63726066 linux.git:commit:fd3d91ab1c6ab0628fe642dd570b56302c30a792 rh#1832397 rh#2015046 rh#2063236 rh#2066706 rh#2066799 rh#2084125 rh#2084183 rh#2090226 rh#2103148 rh#2108691 rh#2112688 rh#2112693 rh#2114849 rh#2114874 rh#2114878 rh#2115065 rh#2115278 rh#2119855 rh#2120664 rh#2122960 rh#2124475 rh#2130141 rh#2132640 rh#2133483 rh#2148458 rh#2150953 vuldb.com:CVE-2022-3635 |
CVE-2022-3636 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-3636 D:CVE-2022-3636 DSA-5333 L3:64716 L3:64743 SMASH Issue 345995 bdo#1011160 bdo#1014494 bdo#1022555 bdo#1024737 bdo#1029653 bnc#1204638 git.kernel.org:CVE-2022-3636 rh#2180984 vuldb.com:CVE-2022-3636 |
CVE-2022-3640 | kernel-source-rt:Not affected | important | 7.1 (CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H) | CVE-2022-3640 FEDORA:FEDORA-2022-64ab9153c0 FEDORA:FEDORA-2022-65a0a3504a FEDORA:FEDORA-2022-7aadaadebc L3:64716 L3:64743 L3:65426 MISC:git.kernel.org:CVE-2022-3640 MISC:vuldb.com:CVE-2022-3640 MLIST:[debian-lts-announce] 20221222 [SECURITY] [DLA 3244-1] linux-5.10 security update MLIST:[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update RHSA-2023:2148 RHSA-2023:2458 SMASH Issue 346035 bnc#1204619 bnc#1204624 rh#2139610 |
CVE-2022-36402 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-36402 MISC:bugzilla.openanolis.cn:CVE-2022-36402 SMASH Issue 342760 bnc#1203517 rh#2133451 |
CVE-2022-3642 | kernel-source-rt:Not affected | moderate | 4.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CVE-2022-3642 MISC:git.kernel.org:CVE-2022-3642 MISC:vuldb.com:CVE-2022-3642 SMASH Issue 346021 bnc#1204626 |
CVE-2022-3643 | kernel-source-rt:Released | moderate | 6.3 (CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H) | CVE-2022-3643 D:CVE-2022-3643 MISC:xenbits.xenproject.org:/xsa/advisory-423.txt MLIST:[debian-lts-announce] 20221222 [SECURITY] [DLA 3244-1] linux-5.10 security update MLIST:[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update OSS:2022/12/07/2 OSS:2022/Q4/170 OSS:2022/Q4/174 SMASH Issue 349925 SMASH Issue 349926 bnc#1206113 http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html jsc#CAR-2233 linux.git:commit:ad7f402ae4f466647c3a669b8a6f3e5d4271c84a rh#2158198 |
CVE-2022-3646 | kernel-source-rt:Released | low | 2.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2022-3646 L3:66078 MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update MLIST:[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update SMASH Issue 346042 bnc#1204646 bnc#1212328 git.kernel.org:CVE-2022-3646 rh#2155501 vuldb.com:CVE-2022-3646 |
CVE-2022-3649 | kernel-source-rt:Released | low | 3.1 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2022-3649 L3:66069 MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update MLIST:[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update SMASH Issue 346040 bnc#1204647 git.kernel.org:CVE-2022-3649 https://security.netapp.com/advisory/ntap-20230214-0009/ rh#2140882 vuldb.com:CVE-2022-3649 |
CVE-2022-36879 | kernel-source-rt:Released | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2022-36946 CVE-2022-36879 D:CVE-2022-26373 D:CVE-2022-36879 D:CVE-2022-36946 DSA-5184 DSA-5207 L3:66077 MISC:git.kernel.org:CVE-2022-36879 MISC:github.com:CVE-2022-36879 MLIST:[debian-lts-announce] 20220911 [SECURITY] [DLA 3102-1] linux-5.10 new package MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update OSS:2022/08/09/5 OSS:2022/08/09/6 OSS:2022/08/09/7 OSS:2022/Q3/114 OSS:2022/Q3/115 OSS:2022/Q3/116 RHSA-2023:2148 RHSA-2023:2458 RHSA-2023:2736 RHSA-2023:2951 RHSA-2023:5627 SMASH Issue 338283 ZDI-22-1117 ZDI-22-1118 bnc#1201948 jsc#CAR-1932 linux.git:commit:470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2 linux.git:commit:9ad36309e2719a884f946678e0296be10f0bb4c1 rh#2090226 rh#2103148 rh#2114849 rh#2114874 rh#2114878 rh#2115065 rh#2115278 rh#2119855 |
CVE-2022-36946 | kernel-source-rt:Released | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:CVE-2022-36946 CVE-2022-36946 D:CVE-2022-26373 D:CVE-2022-36879 D:CVE-2022-36946 DSA-5207 L3:63917 L3:64012 L3:64086 L3:66062 MISC:marc.info:CVE-2022-36946 MLIST:[debian-lts-announce] 20220911 [SECURITY] [DLA 3102-1] linux-5.10 new package MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update OSS:2022/08/09/5 OSS:2022/08/09/6 OSS:2022/08/09/7 OSS:2022/Q3/114 OSS:2022/Q3/115 OSS:2022/Q3/116 RHSA-2022:7444 RHSA-2022:7683 RHSA-2022:7933 RHSA-2022:8267 SMASH Issue 338379 ZDI-22-1117 ZDI-22-1118 bnc#1201940 bnc#1201941 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=99a63d36cb3ed5ca3aa6fcb64cffbeaf3b0fb164 jsc#CAR-1930 linux.git:commit:470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2 linux.git:commit:9ad36309e2719a884f946678e0296be10f0bb4c1 rh#2090226 rh#2103148 rh#2114849 rh#2114874 rh#2114878 rh#2115065 rh#2115278 rh#2119855 |
CVE-2022-3705 | vim:Released | moderate | 5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L) | CONFIRM:security.netapp.com:/advisory/ntap-20221223-0004/ CONFIRM:support.apple.com:/kb/HT213605 CVE-2022-3705 FEDORA:FEDORA-2022-06e4f1dd58 FEDORA:FEDORA-2022-3d354ef0fb FEDORA:FEDORA-2022-4bc60c32a2 FULLDISC:20230123 APPLE-SA-2023-01-23-4 macOS Ventura 13.2 MISC:github.com:CVE-2022-3705 MISC:vuldb.com:CVE-2022-3705 MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update SMASH Issue 346313 bnc#1204779 https://security.gentoo.org/glsa/202305-16 jsc#CAR-2228 rh#2139086 |
CVE-2022-3707 | kernel-source-rt:Released | moderate | 5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-3707 RHSA-2023:2148 RHSA-2023:2458 RHSA-2023:2736 RHSA-2023:2951 SMASH Issue 346309 bnc#1204780 https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz@163.com/ jsc#CAR-2148 rh#2137979 |
CVE-2022-3715 | bash:Not affected | moderate | () | CVE-2022-3715 RHSA-2023:0340 SMASH Issue 346346 bnc#1204787 rh#2126720 |
CVE-2022-37434 | rsync:Not affected, zlib:Released | important | 8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-37434 CONFIRM:support.apple.com:CVE-2022-1725 CONFIRM:support.apple.com:CVE-2022-28739 CONFIRM:support.apple.com:CVE-2022-37434 CVE-2022-37434 D:CVE-2022-37434 DSA-5218 FEDORA:FEDORA-2022-0b517a5397 FEDORA:FEDORA-2022-15da0cf165 FEDORA:FEDORA-2022-25e4dbedf9 FEDORA:FEDORA-2022-3c28ae0cd8 FEDORA:FEDORA-2022-b8232d1cca FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 L3:63905 L3:63921 L3:64058 L3:64065 L3:64541 L3:64597 L3:66999 MISC:github.com:CVE-2022-37434 MISC:github.com:OSS:2022/08/09/1 MLIST:[debian-lts-announce] 20220912 [SECURITY] [DLA 3103-1] zlib security update OSS:2022/08/05/2 OSS:2022/08/09/1 OSS:2022/Q3/86 Oracle:CVE-2022-37434 RHSA-2022:7106 RHSA-2022:7314 RHSA-2022:7793 RHSA-2022:8291 RHSA-2022:8841 RHSA-2023:1095 SMASH Issue 338964 bdo#1016710 bnc#1202175 bnc#1202267 bnc#1202315 bnc#1203030 bnc#1203059 http://seclists.org/fulldisclosure/2022/Oct/37 http://seclists.org/fulldisclosure/2022/Oct/38 http://seclists.org/fulldisclosure/2022/Oct/42 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/ https://security.netapp.com/advisory/ntap-20230427-0007/ jsc#CAR-1952 rh#2116639 |
CVE-2022-37454 | python3:Released | important | 8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-37454 D:CVE-2022-37454 DSA-5267 DSA-5269 DSA-5277 FEDORA:FEDORA-2022-1ecc10276e FEDORA:FEDORA-2022-f2a5082860 L3:64492 L3:64731 MISC:csrc.nist.gov:CVE-2022-37454 MISC:github.com:CVE-2022-37454 MISC:lists.fedoraproject.org:CVE-2022-37454 MISC:mouha.be:CVE-2022-37454 MISC:news.ycombinator.com:CVE-2022-37454 MLIST:[debian-lts-announce] 20221031 [SECURITY] [DLA 3174-1] pysha3 security update MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3175-1] python3.7 security update Oracle:CVE-2022-37454 RHSA-2023:0848 RHSA-2023:0965 RHSA-2023:2417 RHSA-2023:2903 SMASH Issue 345978 SMASH Issue 345979 bdo#1023030 bnc#1204577 https://eprint.iacr.org/2023/331 https://news.ycombinator.com/item?id=35050307 https://security.gentoo.org/glsa/202305-02 jsc#CAR-2147 openssl.git:commit:56a51b5a1ecd54eadc80bed4bfe5044a340787c1 rh#2140200 |
CVE-2022-3786 | openssl:Not affected, openssl-1_1:Not affected | important | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CERT-VN:VU#794340 CISCO:20221028 Vulnerabilities in OpenSSL Affecting Cisco Products: November 2022 CONFIRM:git.openssl.org:CVE-2022-3602 CONFIRM:git.openssl.org:CVE-2022-3786 CONFIRM:psirt.global.sonicwall.com:CVE-2022-3786 CONFIRM:security.netapp.com:CVE-2022-3786 CONFIRM:www.openssl.org:CVE-2022-3786 CVE-2022-3602 CVE-2022-3786 FEDORA:FEDORA-2022-0f1d2e0537 FEDORA:FEDORA-2022-502f096dce GLSA-202211-01 MISC:git.openssl.org:CVE-2022-3602 MISC:git.openssl.org:CVE-2022-3786 MISC:lists.fedoraproject.org:CVE-2022-3786 MISC:packetstormsecurity.com:CVE-2022-3786 OSS:2022/11/01/15 OSS:2022/11/01/16 OSS:2022/11/01/17 OSS:2022/11/01/18 OSS:2022/11/01/19 OSS:2022/11/01/20 OSS:2022/11/01/21 OSS:2022/11/01/24 OSS:2022/11/02/1 OSS:2022/11/02/10 OSS:2022/11/02/11 OSS:2022/11/02/12 OSS:2022/11/02/13 OSS:2022/11/02/14 OSS:2022/11/02/15 OSS:2022/11/02/2 OSS:2022/11/02/3 OSS:2022/11/02/5 OSS:2022/11/02/6 OSS:2022/11/02/7 OSS:2022/11/02/9 OSS:2022/11/03/1 OSS:2022/11/03/10 OSS:2022/11/03/11 OSS:2022/11/03/2 OSS:2022/11/03/3 OSS:2022/11/03/5 OSS:2022/11/03/6 OSS:2022/11/03/7 OSS:2022/11/03/9 OSS:2022/Q4/103 OSS:2022/Q4/84 RHSA-2022:7288 RHSA-2022:7384 SMASH Issue 346121 bnc#1204714 openssl.git:commit:3b421ebc64c7b52f1b9feb3812bdc7781c784332 openssl.git:commit:680e65b94c916af259bfdc2e25f1ab6e0c7a97d6 openssl.git:commit:a0af4a3c8b18c435a5a4afb28b3ad1a2730e6ea8 rh#2137723 rh#2139104 |
CVE-2022-38096 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-38096 MISC:bugzilla.openanolis.cn:CVE-2022-38096 SMASH Issue 341984 bnc#1203331 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2133452 |
CVE-2022-38126 | binutils:Ignore | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-38126 L3:65870 MISC:sourceware.org:CVE-2022-38126 SMASH Issue 341161 bnc#1202966 bnc#1211485 jsc#CAR-2006 rh#2122662 |
CVE-2022-38127 | binutils:Released | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-38127 L3:65870 MISC:sourceware.org:CVE-2022-38127 SMASH Issue 341162 bnc#1202967 jsc#CAR-2007 rh#2122668 |
CVE-2022-38128 | binutils:Not affected | low | 2.5 (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L) | CVE-2022-38128 MISC:sourceware.org:CVE-2022-38128 SMASH Issue 341297 bnc#1203016 rh#2122674 |
CVE-2022-3821 | systemd:Ignore | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-3821 FEDORA:FEDORA-2022-8ac4104a02 MISC:github.com:CVE-2022-3821 RHSA-2023:0100 RHSA-2023:0336 SMASH Issue 346908 bnc#1204968 https://lists.debian.org/debian-lts-announce/2023/06/msg00036.html https://security.gentoo.org/glsa/202305-15 jsc#CAR-2162 rh#2139327 |
CVE-2022-38457 | kernel-source-rt:Won't fix | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-38457 MISC:bugzilla.openanolis.cn:CVE-2022-38457 SMASH Issue 341982 bnc#1203330 rh#2133455 |
CVE-2022-38472 | mozilla-nss:Released | important | 7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H) | CVE-2022-38472 CVE-2022-38473 CVE-2022-38474 CVE-2022-38475 CVE-2022-38476 CVE-2022-38477 CVE-2022-38478 D:CVE-2022-38478 DSA-5217 DSA-5221 L3:64727 MISC:bugzilla.mozilla.org:/buglist.cgi MISC:bugzilla.mozilla.org:/show_bug.cgi MISC:www.mozilla.org:/security/advisories/mfsa2022-33/ MISC:www.mozilla.org:/security/advisories/mfsa2022-34/ MISC:www.mozilla.org:/security/advisories/mfsa2022-35/ MISC:www.mozilla.org:/security/advisories/mfsa2022-36/ MISC:www.mozilla.org:/security/advisories/mfsa2022-37/ Mozilla Foundation Security Advisory 2022-34 Mozilla Foundation Security Advisory 2022-36 RHSA-2022:6164 RHSA-2022:6165 RHSA-2022:6166 RHSA-2022:6167 RHSA-2022:6168 RHSA-2022:6169 RHSA-2022:6174 RHSA-2022:6175 RHSA-2022:6176 RHSA-2022:6177 RHSA-2022:6178 RHSA-2022:6179 SMASH Issue 340541 SMASH Issue 340550 bnc#1202645 rh#2120673 rh#2120674 rh#2120678 rh#2120695 rh#2120696 xf#234199 |
CVE-2022-38473 | mozilla-nss:Released | important | 7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H) | CVE-2022-38472 CVE-2022-38473 CVE-2022-38474 CVE-2022-38475 CVE-2022-38476 CVE-2022-38477 CVE-2022-38478 D:CVE-2022-38478 DSA-5217 DSA-5221 L3:64727 MISC:bugzilla.mozilla.org:/buglist.cgi MISC:bugzilla.mozilla.org:/show_bug.cgi MISC:www.mozilla.org:/security/advisories/mfsa2022-33/ MISC:www.mozilla.org:/security/advisories/mfsa2022-34/ MISC:www.mozilla.org:/security/advisories/mfsa2022-35/ MISC:www.mozilla.org:/security/advisories/mfsa2022-36/ MISC:www.mozilla.org:/security/advisories/mfsa2022-37/ Mozilla Foundation Security Advisory 2022-34 Mozilla Foundation Security Advisory 2022-36 RHSA-2022:6164 RHSA-2022:6165 RHSA-2022:6166 RHSA-2022:6167 RHSA-2022:6168 RHSA-2022:6169 RHSA-2022:6174 RHSA-2022:6175 RHSA-2022:6176 RHSA-2022:6177 RHSA-2022:6178 RHSA-2022:6179 SMASH Issue 340542 SMASH Issue 340550 bnc#1202645 rh#2120673 rh#2120674 rh#2120678 rh#2120695 rh#2120696 xf#234199 |
CVE-2022-38474 | mozilla-nss:Released | important | () | CVE-2022-38472 CVE-2022-38473 CVE-2022-38474 CVE-2022-38475 CVE-2022-38476 CVE-2022-38477 CVE-2022-38478 D:CVE-2022-38478 DSA-5217 DSA-5221 L3:64727 MISC:bugzilla.mozilla.org:/buglist.cgi MISC:bugzilla.mozilla.org:/show_bug.cgi MISC:www.mozilla.org:/security/advisories/mfsa2022-33/ MISC:www.mozilla.org:/security/advisories/mfsa2022-34/ MISC:www.mozilla.org:/security/advisories/mfsa2022-35/ MISC:www.mozilla.org:/security/advisories/mfsa2022-36/ MISC:www.mozilla.org:/security/advisories/mfsa2022-37/ Mozilla Foundation Security Advisory 2022-34 Mozilla Foundation Security Advisory 2022-36 RHSA-2022:6164 RHSA-2022:6165 RHSA-2022:6166 RHSA-2022:6167 RHSA-2022:6168 RHSA-2022:6169 RHSA-2022:6174 RHSA-2022:6175 RHSA-2022:6176 RHSA-2022:6177 RHSA-2022:6178 RHSA-2022:6179 SMASH Issue 340549 SMASH Issue 340550 bnc#1202645 rh#2120673 rh#2120674 rh#2120678 rh#2120695 rh#2120696 xf#234199 |
CVE-2022-38475 | mozilla-nss:Released | important | () | CVE-2022-38472 CVE-2022-38473 CVE-2022-38474 CVE-2022-38475 CVE-2022-38476 CVE-2022-38477 CVE-2022-38478 D:CVE-2022-38478 DSA-5217 DSA-5221 L3:64727 MISC:bugzilla.mozilla.org:/buglist.cgi MISC:bugzilla.mozilla.org:/show_bug.cgi MISC:www.mozilla.org:/security/advisories/mfsa2022-33/ MISC:www.mozilla.org:/security/advisories/mfsa2022-34/ MISC:www.mozilla.org:/security/advisories/mfsa2022-35/ MISC:www.mozilla.org:/security/advisories/mfsa2022-36/ MISC:www.mozilla.org:/security/advisories/mfsa2022-37/ Mozilla Foundation Security Advisory 2022-34 Mozilla Foundation Security Advisory 2022-36 RHSA-2022:6164 RHSA-2022:6165 RHSA-2022:6166 RHSA-2022:6167 RHSA-2022:6168 RHSA-2022:6169 RHSA-2022:6174 RHSA-2022:6175 RHSA-2022:6176 RHSA-2022:6177 RHSA-2022:6178 RHSA-2022:6179 SMASH Issue 340548 SMASH Issue 340550 bnc#1202645 rh#2120673 rh#2120674 rh#2120678 rh#2120695 rh#2120696 xf#234199 |
CVE-2022-38476 | mozilla-nss:Released | important | () | CVE-2022-38472 CVE-2022-38473 CVE-2022-38474 CVE-2022-38475 CVE-2022-38476 CVE-2022-38477 CVE-2022-38478 D:CVE-2022-38478 DSA-5217 DSA-5221 L3:64727 MISC:bugzilla.mozilla.org:/buglist.cgi MISC:bugzilla.mozilla.org:/show_bug.cgi MISC:www.mozilla.org:/security/advisories/mfsa2022-33/ MISC:www.mozilla.org:/security/advisories/mfsa2022-34/ MISC:www.mozilla.org:/security/advisories/mfsa2022-35/ MISC:www.mozilla.org:/security/advisories/mfsa2022-36/ MISC:www.mozilla.org:/security/advisories/mfsa2022-37/ Mozilla Foundation Security Advisory 2022-34 Mozilla Foundation Security Advisory 2022-36 RHSA-2022:6164 RHSA-2022:6165 RHSA-2022:6166 RHSA-2022:6167 RHSA-2022:6168 RHSA-2022:6169 RHSA-2022:6174 RHSA-2022:6175 RHSA-2022:6176 RHSA-2022:6177 RHSA-2022:6178 RHSA-2022:6179 SMASH Issue 340543 SMASH Issue 340550 bnc#1202645 rh#2120673 rh#2120674 rh#2120678 rh#2120695 rh#2120696 xf#234199 |
CVE-2022-38477 | mozilla-nss:Released | important | 7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H) | CVE-2022-38472 CVE-2022-38473 CVE-2022-38474 CVE-2022-38475 CVE-2022-38476 CVE-2022-38477 CVE-2022-38478 D:CVE-2022-38478 DSA-5217 DSA-5221 L3:64727 MISC:bugzilla.mozilla.org:/buglist.cgi MISC:bugzilla.mozilla.org:/show_bug.cgi MISC:www.mozilla.org:/security/advisories/mfsa2022-33/ MISC:www.mozilla.org:/security/advisories/mfsa2022-34/ MISC:www.mozilla.org:/security/advisories/mfsa2022-35/ MISC:www.mozilla.org:/security/advisories/mfsa2022-36/ MISC:www.mozilla.org:/security/advisories/mfsa2022-37/ Mozilla Foundation Security Advisory 2022-34 Mozilla Foundation Security Advisory 2022-36 RHSA-2022:6164 RHSA-2022:6165 RHSA-2022:6166 RHSA-2022:6167 RHSA-2022:6168 RHSA-2022:6169 RHSA-2022:6174 RHSA-2022:6175 RHSA-2022:6176 RHSA-2022:6177 RHSA-2022:6178 RHSA-2022:6179 SMASH Issue 340546 SMASH Issue 340550 bnc#1202645 rh#2120673 rh#2120674 rh#2120678 rh#2120695 rh#2120696 xf#234199 |
CVE-2022-38478 | mozilla-nss:Released | important | 7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H) | CVE-2022-38472 CVE-2022-38473 CVE-2022-38474 CVE-2022-38475 CVE-2022-38476 CVE-2022-38477 CVE-2022-38478 D:CVE-2022-38478 DSA-5217 DSA-5221 L3:64727 MISC:bugzilla.mozilla.org:/buglist.cgi MISC:bugzilla.mozilla.org:/show_bug.cgi MISC:www.mozilla.org:/security/advisories/mfsa2022-33/ MISC:www.mozilla.org:/security/advisories/mfsa2022-34/ MISC:www.mozilla.org:/security/advisories/mfsa2022-35/ MISC:www.mozilla.org:/security/advisories/mfsa2022-36/ MISC:www.mozilla.org:/security/advisories/mfsa2022-37/ Mozilla Foundation Security Advisory 2022-34 Mozilla Foundation Security Advisory 2022-36 RHSA-2022:6164 RHSA-2022:6165 RHSA-2022:6166 RHSA-2022:6167 RHSA-2022:6168 RHSA-2022:6169 RHSA-2022:6174 RHSA-2022:6175 RHSA-2022:6176 RHSA-2022:6177 RHSA-2022:6178 RHSA-2022:6179 SMASH Issue 340547 SMASH Issue 340550 bnc#1202645 rh#2120673 rh#2120674 rh#2120678 rh#2120695 rh#2120696 xf#234199 |
CVE-2022-38533 | binutils:Won't fix | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N) | CONFIRM:security.netapp.com:CVE-2022-38533 CVE-2022-38533 D:CVE-2022-38533 FEDORA:FEDORA-2022-19538a3732 FEDORA:FEDORA-2022-667ee398b1 L3:64795 MISC:sourceware.org:CVE-2022-38533 SMASH Issue 340903 bnc#1202816 https://github.com/bminor/binutils-gdb/commit/45d92439aebd0386ef8af76e1796d08cfe457e1d https://security.gentoo.org/glsa/202309-15 https://sourceware.org/bugzilla/show_bug.cgi?id=29495 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=45d92439aebd0386ef8af76e1796d08cfe457e1d jsc#CAR-1996 rh#2124569 |
CVE-2022-3857 | libpng16:Analysis | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CVE-2022-3857 SMASH Issue 347910 bnc#1205432 https://security.netapp.com/advisory/ntap-20230406-0004/ https://sourceforge.net/p/libpng/bugs/300/ rh#2142600 |
CVE-2022-3903 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-3903 L3:66053 MISC:lore.kernel.org:CVE-2022-3903 SMASH Issue 347386 bnc#1205220 jsc#CAR-2170 rh#2140985 |
CVE-2022-39046 | glibc:Not affected | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) | CONFIRM:security.netapp.com:CVE-2022-39046 CVE-2022-39046 D:CVE-2022-39046 MISC:sourceware.org:CVE-2022-39046 MISC:sourceware.org:OSS:2024/01/30/6 OSS:2024/01/30/6 OSS:2024/01/30/8 SMASH Issue 341242 bnc#1203011 http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html http://seclists.org/fulldisclosure/2024/Feb/3 https://security.gentoo.org/glsa/202310-03 rh#2123394 |
CVE-2022-3910 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-3910 MISC:github.com:CVE-2022-3910 MISC:kernel.dance:CVE-2022-3910 SMASH Issue 348698 bnc#1205670 rh#2144960 |
CVE-2022-39188 | kernel-source-rt:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-39188 D:CVE-2022-3522 D:CVE-2022-39188 DSA-5257 DSA-5324 DSA-5333 DSA-5480 L3:64310 L3:64459 L3:64525 L3:64549 L3:64602 L3:64716 L3:64743 L3:64933 L3:65176 L3:65224 L3:65237 L3:65426 L3:66074 L3:66076 MISC:bugs.chromium.org:CVE-2022-39188 MISC:cdn.kernel.org:CVE-2022-39188 MISC:git.kernel.org:CVE-2022-3176 MISC:git.kernel.org:CVE-2022-3522 MISC:git.kernel.org:CVE-2022-3565 MISC:git.kernel.org:CVE-2022-39188 MISC:github.com:CVE-2022-39188 MISC:kernel.dance:CVE-2022-3176 MISC:lore.kernel.org:CVE-2022-39188 MISC:vuldb.com:CVE-2022-3522 MISC:vuldb.com:CVE-2022-3565 MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update MLIST:[debian-lts-announce] 20221222 [SECURITY] [DLA 3244-1] linux-5.10 security update MLIST:[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update OSS:2022/08/09/6 OSS:2022/Q4/30 RHSA-2023:2148 RHSA-2023:2458 RHSA-2023:2736 RHSA-2023:2951 RHSA-2023:3388 RHSA-2023:4801 RHSA-2023:4814 SMASH Issue 341411 ZDI-22-1462 bdo#1011160 bdo#1014494 bdo#1022555 bdo#1024737 bdo#1029653 bnc#1203107 bnc#1203116 bnc#1203391 bnc#1203511 bnc#1204167 bnc#1204432 bnc#1205765 bnc#1205883 https://security.netapp.com/advisory/ntap-20230216-0003/ jsc#CAR-2011 jsc#CAR-2032 jsc#CAR-2090 jsc#CAR-2120 linux.git:commit:0b7808818cb9df6680f98996b8e9a439fa7bcc2f linux.git:commit:8f033d2becc24aa6bfd2a5c104407963560caabc linux.git:commit:9ad36309e2719a884f946678e0296be10f0bb4c1 linux.git:commit:aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d linux.git:commit:b2d03cabe2b2e150ff5a381731ea0355459be09f linux.git:commit:bcca852027e5878aec911a347407ecc88d6fff7f linux.git:commit:fd3d91ab1c6ab0628fe642dd570b56302c30a792 linux.git:commit:ff05d4b45dd89b922578dac497dcabf57cf771c6 rh#2067482 rh#2099504 rh#2103681 rh#2108696 rh#2114849 rh#2122960 rh#2123056 rh#2124475 rh#2124788 rh#2127890 rh#2130141 rh#2132640 rh#2133483 rh#2134377 rh#2134440 rh#2134451 rh#2134506 rh#2134517 rh#2135717 rh#2138818 rh#2139586 rh#2139598 rh#2139610 rh#2148458 rh#2150953 rh#2150979 rh#2161310 rh#2165706 rh#2176035 rh#2180984 |
CVE-2022-39189 | kernel-source-rt:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-39189 DSA-5480 L3:64716 L3:64743 L3:65426 MISC:bugs.chromium.org:CVE-2022-39189 MISC:cdn.kernel.org:CVE-2022-39189 MISC:git.kernel.org:CVE-2022-39189 MISC:github.com:CVE-2022-39189 RHSA-2023:2148 RHSA-2023:2458 RHSA-2023:2736 RHSA-2023:2951 SMASH Issue 341410 bnc#1203066 bnc#1203067 https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html https://security.netapp.com/advisory/ntap-20230214-0007/ https://www.debian.org/security/2023/dsa-5480 jsc#CAR-2009 rh#2124788 |
CVE-2022-39190 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-39190 MISC:cdn.kernel.org:CVE-2022-39190 MISC:github.com:CVE-2022-39190 MISC:lore.kernel.org:CVE-2022-39190 MISC:twitter.com:CVE-2022-39190 MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update RHSA-2022:7933 RHSA-2022:8267 SMASH Issue 341409 bnc#1203117 rh#2129152 |
CVE-2022-3977 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-3977 MISC:git.kernel.org:/pub/scm/linux/kernel/git/torvalds/linux.git/commit/ OSS:2022/Q4/139 SMASH Issue 347879 bnc#1207048 https://security.netapp.com/advisory/ntap-20230223-0005/ rh#2142371 |
CVE-2022-39842 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-39842 D:CVE-2022-39842 DSA-5257 L3:64716 L3:64743 MISC:cdn.kernel.org:CVE-2022-39188 MISC:github.com:CVE-2022-39842 MISC:lore.kernel.org:/all/YylaC1wHHyLw22D3@kadam/T/ MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update OSS:2022/Q4/30 SMASH Issue 341494 ZDI-22-1462 bnc#1203124 https://lore.kernel.org/all/YylaC1wHHyLw22D3%40kadam/T/ linux.git:commit:0b7808818cb9df6680f98996b8e9a439fa7bcc2f linux.git:commit:8f033d2becc24aa6bfd2a5c104407963560caabc linux.git:commit:aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d linux.git:commit:b2d03cabe2b2e150ff5a381731ea0355459be09f linux.git:commit:bcca852027e5878aec911a347407ecc88d6fff7f linux.git:commit:ff05d4b45dd89b922578dac497dcabf57cf771c6 rh#2123056 rh#2124470 rh#2134377 rh#2134440 rh#2134451 rh#2134506 rh#2134517 rh#2139586 rh#2139598 |
CVE-2022-3996 | openssl:Not affected, openssl-1_1:Not affected | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-3996 MISC:github.com:/openssl/openssl/commit/7725e7bfe6f2ce8146b6552b44e0d226be7638e7 MISC:www.openssl.org:/news/secadv/20221213.txt SMASH Issue 350449 bnc#1206374 openssl.git:commit:4d0340a6d2f327700a059f0b8f954d6160f8eef5 rh#2153239 |
CVE-2022-40133 | kernel-source-rt:Won't fix | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-40133 MISC:bugzilla.openanolis.cn:CVE-2022-40133 SMASH Issue 341974 bnc#1203329 rh#2133453 |
CVE-2022-40303 | libxml2:Released | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:/advisory/ntap-20221209-0003/ CONFIRM:support.apple.com:/kb/HT213531 CONFIRM:support.apple.com:/kb/HT213533 CONFIRM:support.apple.com:/kb/HT213534 CONFIRM:support.apple.com:/kb/HT213535 CONFIRM:support.apple.com:/kb/HT213536 CVE-2022-40303 D:CVE-2022-40303 DSA-5271 FULLDISC:20221220 APPLE-SA-2022-12-13-2 iOS 15.7.2 and iPadOS 15.7.2 FULLDISC:20221220 APPLE-SA-2022-12-13-5 macOS Monterey 12.6.2 FULLDISC:20221220 APPLE-SA-2022-12-13-6 macOS Big Sur 11.7.2 FULLDISC:20221220 APPLE-SA-2022-12-13-7 tvOS 16.2 L3:64463 L3:64669 L3:64819 L3:64824 L3:66102 MISC:gitlab.gnome.org:CVE-2022-40303 RHSA-2022:8841 RHSA-2023:0173 RHSA-2023:0338 SMASH Issue 345322 SMASH Issue 345323 bdo#1022224 bdo#1022225 bnc#1204366 jsc#CAR-2112 rh#2136266 |
CVE-2022-40304 | libxml2:Released | important | 8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:/advisory/ntap-20221209-0003/ CONFIRM:support.apple.com:/kb/HT213531 CONFIRM:support.apple.com:/kb/HT213533 CONFIRM:support.apple.com:/kb/HT213534 CONFIRM:support.apple.com:/kb/HT213535 CONFIRM:support.apple.com:/kb/HT213536 CVE-2022-40304 DSA-5271 FULLDISC:20221220 APPLE-SA-2022-12-13-2 iOS 15.7.2 and iPadOS 15.7.2 FULLDISC:20221220 APPLE-SA-2022-12-13-5 macOS Monterey 12.6.2 FULLDISC:20221220 APPLE-SA-2022-12-13-6 macOS Big Sur 11.7.2 FULLDISC:20221220 APPLE-SA-2022-12-13-7 tvOS 16.2 L3:64463 L3:64536 L3:64669 L3:64819 L3:64824 L3:65225 L3:66102 MISC:gitlab.gnome.org:CVE-2022-40303 MISC:gitlab.gnome.org:CVE-2022-40304 Oracle:CVE-2022-40304 RHSA-2022:8841 RHSA-2023:0173 RHSA-2023:0338 SMASH Issue 345324 SMASH Issue 345325 bdo#1022224 bdo#1022225 bnc#1204367 jsc#CAR-2113 rh#2136288 |
CVE-2022-40307 | kernel-source-rt:Released | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-40307 D:CVE-2022-40307 DSA-5257 MISC:github.com:CVE-2022-40307 MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update OSS:2022/Q4/30 SMASH Issue 341969 ZDI-22-1462 bnc#1203322 jsc#CAR-2028 linux.git:commit:0b7808818cb9df6680f98996b8e9a439fa7bcc2f linux.git:commit:8f033d2becc24aa6bfd2a5c104407963560caabc linux.git:commit:aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d linux.git:commit:b2d03cabe2b2e150ff5a381731ea0355459be09f linux.git:commit:bcca852027e5878aec911a347407ecc88d6fff7f linux.git:commit:ff05d4b45dd89b922578dac497dcabf57cf771c6 rh#2123056 rh#2127424 rh#2134377 rh#2134440 rh#2134451 rh#2134506 rh#2134517 rh#2139586 rh#2139598 |
CVE-2022-40476 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-40476 MISC:git.kernel.org:CVE-2022-40476 MISC:lore.kernel.org:CVE-2022-40476 MISC:mirrors.edge.kernel.org:CVE-2022-40476 SMASH Issue 342456 bnc#1203435 rh#2133407 |
CVE-2022-40617 | strongswan:Released | moderate | 6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:www.strongswan.org:CVE-2022-40617 CVE-2022-40617 D:CVE-2022-40617 DSA-5249 FEDORA:FEDORA-2022-525510c815 SMASH Issue 343006 SMASH Issue 343007 bdo#1021271 bnc#1203556 jsc#CAR-2089 rh#2132444 |
CVE-2022-40674 | expat:Released | important | 8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-40674 CVE-2022-40674 DSA-5236 FEDORA:FEDORA-2022-15ec504440 FEDORA:FEDORA-2022-c22feb71ba FEDORA:FEDORA-2022-c68d90efc3 FEDORA:FEDORA-2022-d93b3bd8b9 FEDORA:FEDORA-2022-dcb1d7bcb1 GLSA-202209-24 GLSA-202211-06 L3:64174 L3:64317 L3:64328 L3:64394 L3:64544 L3:64594 L3:64660 L3:64679 L3:65221 L3:65340 MISC:github.com:CVE-2022-40674 MLIST:[debian-lts-announce] 20220925 [SECURITY] [DLA 3119-1] expat security update RHSA-2022:6831 RHSA-2022:6832 RHSA-2022:6833 RHSA-2022:6834 RHSA-2022:6838 RHSA-2022:6878 RHSA-2022:6921 RHSA-2022:6967 RHSA-2022:6995 RHSA-2022:6996 RHSA-2022:6997 RHSA-2022:6998 RHSA-2022:7019 RHSA-2022:7020 RHSA-2022:7021 RHSA-2022:7022 RHSA-2022:7023 RHSA-2022:7024 RHSA-2022:7025 RHSA-2022:7026 RHSA-2022:8598 RHSA-2022:8841 RHSA-2023:3068 SMASH Issue 342404 bdo#1019761 bnc#1203438 bnc#1203571 jsc#CAR-2029 rh#2130769 |
CVE-2022-40735 | openssl:Not affected, openssl-1_1:Not affected | important | () | CVE-2022-40735 MISC:gist.github.com:CVE-2022-40735 MISC:github.com:CVE-2002-20001 MISC:link.springer.com:CVE-2022-40735 MISC:nvlpubs.nist.gov:CVE-2022-40735 MISC:raw.githubusercontent.com:CVE-2022-40735 MISC:www.researchgate.net:CVE-2022-40735 MISC:www.rfc-editor.org:CVE-2022-40735 SMASH Issue 348108 bnc#1205476 https://dheatattack.gitlab.io/ https://ieeexplore.ieee.org/document/10374117 |
CVE-2022-40768 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2022-40768 D:CVE-2022-40768 FEDORA:FEDORA-2022-1a5b125ac6 FEDORA:FEDORA-2022-2cfbe17910 FEDORA:FEDORA-2022-b948fc3cfb MISC:git.kernel.org:CVE-2022-40768 MISC:lore.kernel.org:CVE-2022-40768 MLIST:[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update OSS:2022/09/09/1 OSS:2022/09/19/1 OSS:2022/Q3/208 SMASH Issue 342851 bnc#1203514 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6022f210461fef67e6e676fd8544ca02d1bcfa7a https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR/ https://lore.kernel.org/all/20220908145154.2284098-1-gregkh%40linuxfoundation.org/ jsc#CAR-2036 rh#2128462 |
CVE-2022-40897 | python-setuptools:Released | moderate | 4.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:github.com:/pypa/setuptools/compare/v65.5.0...v65.5.1 CVE-2022-40897 D:CVE-2022-40897 MISC:github.com:/pypa/setuptools/blob/fe8a98e696241487ba6ac9f91faa38ade939ec5d/setuptools/package_index.py MISC:github.com:/pypa/setuptools/commit/43a9c9bfa6aa626ec2a22540bea28d2ca77964be MISC:pyup.io:/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/ MISC:pyup.io:/vulnerabilities/CVE-2022-40897/52495/ RHSA-2023:0835 RHSA-2023:0952 SMASH Issue 351672 bnc#1206667 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ADES3NLOE5QJKBLGNZNI2RGVOSQXA37R/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YNA2BAH2ACBZ4TVJZKFLCR7L23BG5C3H/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ADES3NLOE5QJKBLGNZNI2RGVOSQXA37R/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YNA2BAH2ACBZ4TVJZKFLCR7L23BG5C3H/ https://security.netapp.com/advisory/ntap-20230214-0001/ https://security.netapp.com/advisory/ntap-20240621-0006/ jsc#CAR-2252 rh#2158559 |
CVE-2022-40899 | python3:Not affected | moderate | 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | CVE-2022-40899 D:CVE-2022-40899 MISC:github.com:/PythonCharmers/python-future/blob/master/src/future/backports/http/cookiejar.py MISC:github.com:/PythonCharmers/python-future/pull/610 MISC:github.com:/python/cpython/pull/17157 MISC:pypi.org:/project/future/ MISC:pyup.io:/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/ RHSA-2023:2101 RHSA-2023:4466 SMASH Issue 351670 bnc#1206673 rh#2165866 |
CVE-2022-4095 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-4095 L3:64728 L3:64999 L3:65173 L3:65185 L3:65224 L3:65237 L3:66070 L3:66496 L3:67104 MISC:git.kernel.org:OSS:2022/11/18/1 OSS:2022/Q4/151 SMASH Issue 348226 SMASH Issue 348515 bnc#1205514 bnc#1205594 https://security.netapp.com/advisory/ntap-20230420-0005/ jsc#CAR-2182 rh#2144991 |
CVE-2022-40982 | kernel-source-rt:Released | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) | CVE-2022-40982 DSA-5474 DSA-5475 L3:66852 OSS:2023/Q3/98 SMASH Issue 350726 bdo#1043305 bnc#1206418 bnc#1214083 http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html https://access.redhat.com/solutions/7027704 https://aws.amazon.com/security/security-bulletins/AWS-2023-007/ https://downfall.page https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/ https://security.netapp.com/advisory/ntap-20230811-0001/ https://www.debian.org/security/2023/dsa-5474 https://www.debian.org/security/2023/dsa-5475 https://xenbits.xen.org/xsa/advisory-435.html jsc#CAR-2837 rh#2223949 |
CVE-2022-41218 | kernel-source-rt:Released | important | 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-41218 DSA-5324 L3:64310 L3:64525 L3:64549 L3:64602 L3:64716 L3:64743 L3:65426 MISC:git.kernel.org:CVE-2022-41218 MISC:lore.kernel.org:CVE-2022-41218 OSS:2022/09/23/4 OSS:2022/09/24/1 OSS:2022/09/24/2 OSS:2022/Q3/233 OSS:2022/Q3/234 RHSA-2023:2736 RHSA-2023:2951 SMASH Issue 341205 SMASH Issue 343074 bnc#1202960 bnc#1203606 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fd3d91ab1c6ab0628fe642dd570b56302c30a792 https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html https://lore.kernel.org/all/20220908132754.30532-1-tiwai%40suse.de/ jsc#CAR-2046 linux.git:commit:fd3d91ab1c6ab0628fe642dd570b56302c30a792 rh#2122960 |
CVE-2022-41222 | kernel-source-rt:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-41222 L3:64716 L3:64743 L3:65426 MISC:bugs.chromium.org:CVE-2022-41222 MISC:cdn.kernel.org:CVE-2021-38205 MISC:git.kernel.org:CVE-2022-41222 MISC:packetstormsecurity.com:CVE-2022-41222 MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update RHSA-2023:0832 RHSA-2023:0839 RHSA-2023:0854 RHSA-2023:1130 RHSA-2023:1192 RHSA-2023:3491 SMASH Issue 343137 bnc#1203622 bnc#1203624 http://packetstormsecurity.com/files/171005/Kernel-Live-Patch-Security-Notice-LNS-0091-1.html https://security.netapp.com/advisory/ntap-20230214-0008/ jsc#CAR-2047 rh#2138818 rh#2176035 |
CVE-2022-4127 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-4127 MISC:github.com:CVE-2022-4127 MISC:lore.kernel.org:CVE-2022-4127 SMASH Issue 348786 bnc#1205703 rh#2134370 |
CVE-2022-4128 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-4128 MISC:github.com:CVE-2022-4128 MISC:lore.kernel.org:CVE-2022-4128 RHSA-2023:2148 RHSA-2023:2458 SMASH Issue 348787 bnc#1205704 rh#2134380 |
CVE-2022-4129 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-4129 FEDORA:FEDORA-2022-24041b1667 FEDORA:FEDORA-2022-b36cd53dca FEDORA:FEDORA-2022-e4460c41bc MISC:lore.kernel.org:CVE-2022-4129 RHSA-2023:2148 RHSA-2023:2458 RHSA-2023:2736 RHSA-2023:2951 SMASH Issue 348788 bnc#1205711 https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5SPXMXXFANDASPCKER2JIQO2F3UHCP/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AM5KFIE6JNZXHBA5A2KYDZAT3MEX2B67/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOKXNIM2R4FQCDRQV67UMAY6EBC72QFG/ https://lore.kernel.org/all/20221114191619.124659-1-jakub%40cloudflare.com/t https://lore.kernel.org/netdev/20221121085426.21315-1-jakub%40cloudflare.com/t jsc#CAR-2185 rh#2134528 |
CVE-2022-4139 | kernel-source-rt:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-4139 L3:65426 MISC:nvd.nist.gov:OSS:2022/11/30/1 OSS:2022/11/30/1 OSS:2022/Q4/163 RHSA-2023:0101 RHSA-2023:0114 RHSA-2023:0123 RHSA-2023:0300 RHSA-2023:0334 RHSA-2023:0348 RHSA-2023:0440 RHSA-2023:0441 RHSA-2023:0496 RHSA-2023:0499 RHSA-2023:0512 RHSA-2023:0526 RHSA-2023:0531 RHSA-2023:0536 RHSA-2023:0859 SMASH Issue 348872 bnc#1205700 bnc#1205815 https://security.netapp.com/advisory/ntap-20230309-0004/ linux.git:commit:04aa64375f48a5d430b5550d9271f8428883e550 rh#2147572 |
CVE-2022-41409 | pcre:Not affected | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-41409 SMASH Issue 372815 bnc#1213514 https://github.com/PCRE2Project/pcre2/commit/94e1c001761373b7d9450768aa15d04c25547a35 https://github.com/PCRE2Project/pcre2/issues/141 jsc#CAR-2760 rh#2260814 |
CVE-2022-4141 | vim:Released | important | 7.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H) | CONFIRM:huntr.dev:CVE-2022-4141 CVE-2022-4141 FEDORA:FEDORA-2022-1e14f3ae45 FEDORA:FEDORA-2022-fc4c513d06 L3:65301 L3:65303 L3:65457 MISC:github.com:CVE-2022-4141 SMASH Issue 348936 bnc#1205797 https://lists.debian.org/debian-lts-announce/2023/06/msg00015.html https://security.gentoo.org/glsa/202305-16 jsc#CAR-2193 rh#2148991 |
CVE-2022-41674 | kernel-source-rt:Released | important | 8.8 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-41674 D:CVE-2022-41674 D:CVE-2022-42719 DSA-5257 FEDORA:FEDORA-2022-1a5b125ac6 FEDORA:FEDORA-2022-2cfbe17910 FEDORA:FEDORA-2022-b948fc3cfb L3:64716 L3:64743 L3:65426 MISC:git.kernel.org:CVE-2022-41674 MISC:packetstormsecurity.com:CVE-2022-42722 MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update OSS:2022/10/13/2 OSS:2022/10/13/5 OSS:2022/Q4/30 RHSA-2023:2148 RHSA-2023:2458 RHSA-2023:2736 RHSA-2023:2951 SMASH Issue 343657 ZDI-22-1462 bnc#1203770 bnc#1203994 bnc#1204051 bnc#1204292 jsc#CAR-2102 linux.git:commit:0b7808818cb9df6680f98996b8e9a439fa7bcc2f linux.git:commit:8f033d2becc24aa6bfd2a5c104407963560caabc linux.git:commit:aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d linux.git:commit:b2d03cabe2b2e150ff5a381731ea0355459be09f linux.git:commit:bcca852027e5878aec911a347407ecc88d6fff7f linux.git:commit:ff05d4b45dd89b922578dac497dcabf57cf771c6 rh#2123056 rh#2134377 rh#2134440 rh#2134451 rh#2134506 rh#2134517 rh#2139586 rh#2139598 |
CVE-2022-41808 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2022-41808 SMASH Issue 365966 bnc#1211315 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00809.html rh#2209264 |
CVE-2022-41848 | kernel-source-rt:Released | moderate | 6.4 (CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-41848 L3:65869 L3:66068 MISC:git.kernel.org:CVE-2022-41848 MISC:lore.kernel.org:CVE-2022-41848 SMASH Issue 344090 bnc#1203987 jsc#CAR-2068 rh#2131374 |
CVE-2022-41849 | kernel-source-rt:Released | moderate | 6.3 (CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-41849 L3:67179 MISC:lore.kernel.org:CVE-2022-41849 MLIST:[debian-lts-announce] 20221222 [SECURITY] [DLA 3244-1] linux-5.10 security update MLIST:[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update SMASH Issue 344089 bnc#1203992 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5610bcfe8693c02e2e4c8b31427f1bdbdecc839c https://lore.kernel.org/all/20220925133243.GA383897%40ubuntu/T/ rh#2135327 |
CVE-2022-41850 | kernel-source-rt:Released | low | 4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L) | CVE-2022-41850 L3:66065 MISC:lore.kernel.org:CVE-2022-41850 MLIST:[debian-lts-announce] 20221222 [SECURITY] [DLA 3244-1] linux-5.10 security update MLIST:[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update SMASH Issue 344088 bnc#1203960 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cacdb14b1c8d3804a3a7d31773bc7569837b71a4 https://lore.kernel.org/all/20220904193115.GA28134%40ubuntu/t/#u jsc#CAR-2067 rh#2131378 |
CVE-2022-41858 | kernel-source-rt:Released | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-41858 L3:65869 L3:66056 MISC:github.com:/torvalds/linux/commit/ec4eb8a86ade4d22633e1da2a7d85a846b7d1798 SMASH Issue 348695 bnc#1205671 https://security.netapp.com/advisory/ntap-20230223-0006/ jsc#CAR-2184 rh#2144379 |
CVE-2022-42010 | dbus-1:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2022-42010 D:CVE-2022-42010 D:CVE-2022-42011 D:CVE-2022-42012 DSA-5250 FEDORA:FEDORA-2022-076544c8aa FEDORA:FEDORA-2022-7a963a79d1 FEDORA:FEDORA-2022-b0c2f2ab74 MISC:gitlab.freedesktop.org:CVE-2022-42010 MISC:gitlab.freedesktop.org:OSS:2022/10/06/1 OSS:2022/10/06/1 OSS:2022/Q4/7 RHSA-2022:8812 RHSA-2022:8977 RHSA-2023:0096 RHSA-2023:0335 SMASH Issue 344317 bdo#1004543 bdo#1005889 bnc#1204111 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/ https://security.gentoo.org/glsa/202305-08 jsc#CAR-2086 rh#2133616 rh#2133617 rh#2133618 |
CVE-2022-42011 | dbus-1:Released | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L) | CVE-2022-42011 D:CVE-2022-42010 D:CVE-2022-42011 D:CVE-2022-42012 DSA-5250 FEDORA:FEDORA-2022-076544c8aa FEDORA:FEDORA-2022-7a963a79d1 FEDORA:FEDORA-2022-b0c2f2ab74 MISC:gitlab.freedesktop.org:CVE-2022-42011 MISC:gitlab.freedesktop.org:OSS:2022/10/06/1 OSS:2022/10/06/1 OSS:2022/Q4/7 RHSA-2022:8812 RHSA-2022:8977 RHSA-2023:0096 RHSA-2023:0335 SMASH Issue 344339 bdo#1004543 bdo#1005889 bnc#1204112 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/ https://security.gentoo.org/glsa/202305-08 jsc#CAR-2087 rh#2133616 rh#2133617 rh#2133618 |
CVE-2022-42012 | dbus-1:Released | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L) | CVE-2022-42012 D:CVE-2022-42010 D:CVE-2022-42011 D:CVE-2022-42012 DSA-5250 FEDORA:FEDORA-2022-076544c8aa FEDORA:FEDORA-2022-7a963a79d1 FEDORA:FEDORA-2022-b0c2f2ab74 L3:67797 MISC:gitlab.freedesktop.org:CVE-2022-42012 MISC:gitlab.freedesktop.org:OSS:2022/10/06/1 OSS:2022/10/06/1 OSS:2022/Q4/7 RHSA-2022:8812 RHSA-2022:8977 RHSA-2023:0096 RHSA-2023:0335 SMASH Issue 344340 bdo#1004543 bdo#1005889 bnc#1204113 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/ https://security.gentoo.org/glsa/202305-08 jsc#CAR-2088 rh#2133616 rh#2133617 rh#2133618 |
CVE-2022-4203 | openssl:Not affected, openssl-1_1:Not affected | moderate | 6.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H) | CVE-2022-4203 RHSA-2023:0946 RHSA-2023:1199 SMASH Issue 354987 SMASH Issue 354988 bnc#1207535 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=c927a3492698c254637da836762f9b1f86cffabc https://security.gentoo.org/glsa/202402-08 https://www.openssl.org/news/secadv/20230207.txt openssl.git:commit:399c2da08ab9c6a382f8e9950742a022e847fec0 openssl.git:commit:748f478f814bc8e418542c68599ec7dbcbac97b2 rh#2164488 |
CVE-2022-42328 | kernel-source-rt:Released | moderate | 5.7 (CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-42328 CVE-2022-42329 D:CVE-2022-42328 D:CVE-2022-42329 MISC:xenbits.xenproject.org:/xsa/advisory-424.txt MLIST:[debian-lts-announce] 20221222 [SECURITY] [DLA 3244-1] linux-5.10 security update MLIST:[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update OSS:2022/12/08/2 OSS:2022/12/08/3 OSS:2022/12/09/2 OSS:2022/Q4/171 SMASH Issue 349927 SMASH Issue 349929 bnc#1206114 jsc#CAR-2234 linux.git:commit:74e7e1efdad45580cc3839f2a155174cf158f9b5 rh#2156215 |
CVE-2022-42329 | kernel-source-rt:Released | moderate | 5.7 (CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-42328 CVE-2022-42329 D:CVE-2022-42328 D:CVE-2022-42329 MISC:xenbits.xenproject.org:/xsa/advisory-424.txt MLIST:[debian-lts-announce] 20221222 [SECURITY] [DLA 3244-1] linux-5.10 security update MLIST:[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update OSS:2022/12/08/2 OSS:2022/12/08/3 OSS:2022/12/09/2 OSS:2022/Q4/171 SMASH Issue 349928 SMASH Issue 349929 bnc#1206114 jsc#CAR-2234 linux.git:commit:74e7e1efdad45580cc3839f2a155174cf158f9b5 rh#2156215 |
CVE-2022-42432 | kernel-source-rt:Released | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N) | CVE-2022-42432 RHSA-2022:7933 RHSA-2022:8267 SMASH Issue 346050 ZDI-22-1457 bnc#1204614 https://patchwork.ozlabs.org/project/netfilter-devel/patch/20220907082618.1193201-1-pablo@netfilter.org/ https://www.zerodayinitiative.com/advisories/ZDI-22-1457/ jsc#CAR-2136 rh#2182888 |
CVE-2022-4269 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-4269 DSA-5480 MISC:lore.kernel.org:/netdev/33dc43f587ec1388ba456b4915c75f02a8aae226.1663945716.git.dcaratti@redhat.com/ RHSA-2023:1130 RHSA-2023:1202 RHSA-2023:1203 RHSA-2023:1220 RHSA-2023:1221 RHSA-2023:1469 RHSA-2023:1470 RHSA-2023:1566 RHSA-2023:1584 SMASH Issue 349329 bnc#1206024 https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html https://lore.kernel.org/netdev/33dc43f587ec1388ba456b4915c75f02a8aae226.1663945716.git.dcaratti%40redhat.com/ https://security.netapp.com/advisory/ntap-20230929-0001/ https://www.debian.org/security/2023/dsa-5480 jsc#CAR-2220 rh#2150272 |
CVE-2022-42703 | kernel-source-rt:Released | important | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-36946 CVE-2022-2588 CVE-2022-3635 CVE-2022-42703 D:CVE-2022-26373 D:CVE-2022-3635 D:CVE-2022-36879 D:CVE-2022-36946 DSA-5184 DSA-5207 DSA-5324 L3:63917 L3:64012 L3:64086 L3:64306 L3:64310 L3:64329 L3:64525 L3:64549 L3:64602 L3:64716 L3:64728 L3:64743 L3:65176 L3:65426 L3:66045 MISC:bugs.chromium.org:CVE-2022-42703 MISC:cdn.kernel.org:CVE-2022-42703 MISC:git.kernel.org:CVE-2022-42703 MISC:github.com:CVE-2022-42703 MISC:googleprojectzero.blogspot.com:/2022/12/exploiting-CVE-2022-42703-bringing-back-the-stack-attack.html MISC:marc.info:CVE-2022-36946 MLIST:[debian-lts-announce] 20220911 [SECURITY] [DLA 3102-1] linux-5.10 new package MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update OSS:2022/08/09/5 OSS:2022/08/09/6 OSS:2022/08/09/7 OSS:2022/Q3/114 OSS:2022/Q3/115 OSS:2022/Q3/116 RHSA-2022:6551 RHSA-2022:6872 RHSA-2022:6875 RHSA-2022:6978 RHSA-2022:6983 RHSA-2022:6991 RHSA-2022:7110 RHSA-2022:7134 RHSA-2022:7137 RHSA-2022:7146 RHSA-2022:7171 RHSA-2022:7173 RHSA-2022:7279 RHSA-2022:7280 RHSA-2022:7337 RHSA-2022:7338 RHSA-2022:7344 RHSA-2022:7885 RHSA-2023:1091 RHSA-2023:1092 RHSA-2023:2148 RHSA-2023:2458 RHSA-2023:2736 RHSA-2023:2951 RHSA-2023:3388 RHSA-2023:4022 RHSA-2023:4023 RHSA-2023:4137 RHSA-2023:4138 SMASH Issue 338825 SMASH Issue 344558 ZDI-22-1117 ZDI-22-1118 bnc#1201941 bnc#1202096 bnc#1202961 bnc#1203613 bnc#1204168 bnc#1204170 bnc#1204631 bnc#1204636 bnc#1205058 bnc#1205085 git.kernel.org:CVE-2022-3635 https://github.com/Markakd/CVE-2022-2588 https://lore.kernel.org/netdev/20220809170518.164662-1-cascardo@canonical.com/T/#u https://ubuntu.com/security/notices/USN-5557-1 https://ubuntu.com/security/notices/USN-5560-1 https://ubuntu.com/security/notices/USN-5560-2 https://ubuntu.com/security/notices/USN-5562-1 https://ubuntu.com/security/notices/USN-5564-1 https://ubuntu.com/security/notices/USN-5565-1 https://ubuntu.com/security/notices/USN-5566-1 https://ubuntu.com/security/notices/USN-5567-1 https://ubuntu.com/security/notices/USN-5582-1 https://ubuntu.com/security/notices/USN-5588-1 https://www.zerodayinitiative.com/advisories/ZDI-22-1117/ jsc#CAR-1930 jsc#CAR-1961 jsc#CAR-2091 jsc#CAR-2137 linux.git:commit:31185df7e2b1d2fa1de4900247a12d7b9c7087eb linux.git:commit:33172ab50a53578a95691310f49567c9266968b0 linux.git:commit:3777ea7bac3113005b7180e6b9dadf16d19a5827 linux.git:commit:42baefac638f06314298087394b982ead9ec444b linux.git:commit:470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2 linux.git:commit:5cadd4bb1d7fc9ab201ac14620d1a478357e4ebd linux.git:commit:66e3531b33ee51dad17c463b4d9c9f52e341503d linux.git:commit:6b1775f26a2da2b05a6dc8ec2b5d14e9a4701a1a linux.git:commit:9ad36309e2719a884f946678e0296be10f0bb4c1 linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76 linux.git:commit:abf1fd5919d6238ee3bc5eb4a9b6c3947caa6638 linux.git:commit:b0576cc9c6b843d99c6982888d59a56209341888 linux.git:commit:d3b6372c5881cb54925212abb62c521df8ba4809 linux.git:commit:eadb2f47a3ced5c64b23b90fd2a3463f63726066 linux.git:commit:fd3d91ab1c6ab0628fe642dd570b56302c30a792 rh#1832397 rh#2015046 rh#2063236 rh#2066706 rh#2066799 rh#2084125 rh#2084183 rh#2090226 rh#2103148 rh#2108691 rh#2112688 rh#2112693 rh#2114849 rh#2114874 rh#2114878 rh#2115065 rh#2115278 rh#2119855 rh#2120664 rh#2122960 rh#2124475 rh#2130141 rh#2132640 rh#2133483 rh#2148458 rh#2150953 vuldb.com:CVE-2022-3635 |
CVE-2022-42719 | kernel-source-rt:Released | important | 7.5 (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:/advisory/ntap-20230203-0008/ CVE-2022-42719 D:CVE-2022-42719 DSA-5257 FEDORA:FEDORA-2022-1a5b125ac6 FEDORA:FEDORA-2022-2cfbe17910 FEDORA:FEDORA-2022-b948fc3cfb L3:64716 L3:64743 L3:65426 MISC:git.kernel.org:CVE-2022-42719 MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update OSS:2022/10/13/2 OSS:2022/10/13/5 OSS:2022/Q4/30 SMASH Issue 344559 ZDI-22-1462 bnc#1204051 bnc#1204292 http://packetstormsecurity.com/files/171005/Kernel-Live-Patch-Security-Notice-LNS-0091-1.html jsc#CAR-2103 linux.git:commit:0b7808818cb9df6680f98996b8e9a439fa7bcc2f linux.git:commit:8f033d2becc24aa6bfd2a5c104407963560caabc linux.git:commit:aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d linux.git:commit:b2d03cabe2b2e150ff5a381731ea0355459be09f linux.git:commit:bcca852027e5878aec911a347407ecc88d6fff7f linux.git:commit:ff05d4b45dd89b922578dac497dcabf57cf771c6 rh#2123056 rh#2134377 rh#2134440 rh#2134451 rh#2134506 rh#2134517 rh#2139586 rh#2139598 |
CVE-2022-42720 | kernel-source-rt:Released | important | 7.5 (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:/advisory/ntap-20230203-0008/ CVE-2022-42720 D:CVE-2022-42720 DSA-5257 FEDORA:FEDORA-2022-1a5b125ac6 FEDORA:FEDORA-2022-2cfbe17910 FEDORA:FEDORA-2022-b948fc3cfb L3:64716 L3:64743 L3:65426 MISC:git.kernel.org:CVE-2022-42720 MISC:packetstormsecurity.com:CVE-2022-42722 MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update OSS:2022/10/13/5 OSS:2022/Q4/30 RHSA-2023:2148 RHSA-2023:2458 RHSA-2023:2736 RHSA-2023:2951 SMASH Issue 344278 ZDI-22-1462 bnc#1204059 bnc#1204291 jsc#CAR-2104 linux.git:commit:0b7808818cb9df6680f98996b8e9a439fa7bcc2f linux.git:commit:8f033d2becc24aa6bfd2a5c104407963560caabc linux.git:commit:aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d linux.git:commit:b2d03cabe2b2e150ff5a381731ea0355459be09f linux.git:commit:bcca852027e5878aec911a347407ecc88d6fff7f linux.git:commit:ff05d4b45dd89b922578dac497dcabf57cf771c6 rh#2123056 rh#2134377 rh#2134440 rh#2134451 rh#2134506 rh#2134517 rh#2139586 rh#2139598 |
CVE-2022-42721 | kernel-source-rt:Released | important | 7.5 (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:/advisory/ntap-20230203-0008/ CVE-2022-42721 D:CVE-2022-42721 DSA-5257 FEDORA:FEDORA-2022-1a5b125ac6 FEDORA:FEDORA-2022-2cfbe17910 FEDORA:FEDORA-2022-b948fc3cfb L3:64716 L3:64743 L3:65426 MISC:git.kernel.org:CVE-2022-42721 MISC:packetstormsecurity.com:CVE-2022-42722 MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update OSS:2022/10/13/5 OSS:2022/Q4/30 RHSA-2023:2148 RHSA-2023:2458 RHSA-2023:2736 RHSA-2023:2951 SMASH Issue 344279 ZDI-22-1462 bnc#1204060 bnc#1204290 jsc#CAR-2105 linux.git:commit:0b7808818cb9df6680f98996b8e9a439fa7bcc2f linux.git:commit:8f033d2becc24aa6bfd2a5c104407963560caabc linux.git:commit:aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d linux.git:commit:b2d03cabe2b2e150ff5a381731ea0355459be09f linux.git:commit:bcca852027e5878aec911a347407ecc88d6fff7f linux.git:commit:ff05d4b45dd89b922578dac497dcabf57cf771c6 rh#2123056 rh#2134377 rh#2134440 rh#2134451 rh#2134506 rh#2134517 rh#2139586 rh#2139598 |
CVE-2022-42722 | kernel-source-rt:Not affected | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:/advisory/ntap-20230203-0008/ CVE-2022-42722 D:CVE-2022-42722 DSA-5257 FEDORA:FEDORA-2022-1a5b125ac6 FEDORA:FEDORA-2022-2cfbe17910 FEDORA:FEDORA-2022-b948fc3cfb L3:64716 L3:64743 L3:65426 MISC:git.kernel.org:CVE-2022-42722 MISC:packetstormsecurity.com:CVE-2022-42722 MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update OSS:2022/10/13/5 OSS:2022/Q4/30 RHSA-2023:2148 RHSA-2023:2458 RHSA-2023:2736 RHSA-2023:2951 SMASH Issue 344419 ZDI-22-1462 bnc#1204125 bnc#1204289 jsc#CAR-2101 linux.git:commit:0b7808818cb9df6680f98996b8e9a439fa7bcc2f linux.git:commit:8f033d2becc24aa6bfd2a5c104407963560caabc linux.git:commit:aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d linux.git:commit:b2d03cabe2b2e150ff5a381731ea0355459be09f linux.git:commit:bcca852027e5878aec911a347407ecc88d6fff7f linux.git:commit:ff05d4b45dd89b922578dac497dcabf57cf771c6 rh#2123056 rh#2134377 rh#2134440 rh#2134451 rh#2134506 rh#2134517 rh#2139586 rh#2139598 |
CVE-2022-42895 | kernel-source-rt:Released | moderate | 6.8 (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H) | CVE-2022-42895 MISC:github.com:OSS:2022/Q4/190 MISC:kernel.dance:CVE-2022-42895 OSS:2022/Q4/190 SMASH Issue 348814 bnc#1205705 jsc#CAR-2186 linux.git:commit:b1a2cd50c0357f243b7435a732b4e62ba3157a2e rh#2147356 |
CVE-2022-42896 | kernel-source-rt:Released | moderate | 6.8 (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N) | CVE-2022-42896 MISC:github.com:OSS:2022/Q4/191 MISC:kernel.dance:CVE-2022-42896 OSS:2022/Q4/191 RHSA-2023:2148 RHSA-2023:2458 RHSA-2023:3461 RHSA-2023:3462 RHSA-2023:3517 RHSA-2023:4137 RHSA-2023:4138 RHSA-2023:4230 RHSA-2023:4517 RHSA-2023:4531 RHSA-2023:4541 RHSA-2023:4789 RHSA-2023:4888 RHSA-2023:5580 RHSA-2023:5588 RHSA-2023:5589 SMASH Issue 348813 bnc#1205709 jsc#CAR-2187 linux.git:commit:711f8c3fb3db61897080468586b970c87c61d9e4 rh#2147364 |
CVE-2022-42915 | curl:Not affected | important | 7.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) | CONFIRM:security.netapp.com:/advisory/ntap-20221209-0010/ CONFIRM:support.apple.com:/kb/HT213604 CONFIRM:support.apple.com:/kb/HT213605 CVE-2022-42915 D:CVE-2022-42915 FEDORA:FEDORA-2022-01ffde372c FEDORA:FEDORA-2022-39688a779d FEDORA:FEDORA-2022-e9d65906c4 FULLDISC:20230123 APPLE-SA-2023-01-23-4 macOS Ventura 13.2 FULLDISC:20230123 APPLE-SA-2023-01-23-5 macOS Monterey 12.6.3 GLSA-202212-01 OSS:2022/Q4/49 Oracle:CVE-2022-42915 RHSA-2022:8840 RHSA-2022:8841 SMASH Issue 345347 SMASH Issue 345348 bnc#1204385 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37YEVVC6NAF6H7UHH6YAUY5QEVY6LIH2/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVU3IMZCKR4VE6KJ4GCWRL2ILLC6OV76/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q27V5YYMXUVI6PRZQVECON32XPVWTKDK/ rh#2135413 |
CVE-2022-42916 | curl:Not affected | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) | CONFIRM:security.netapp.com:/advisory/ntap-20221209-0010/ CONFIRM:security.netapp.com:CVE-2022-30115 CONFIRM:support.apple.com:/kb/HT213604 CONFIRM:support.apple.com:/kb/HT213605 CVE-2022-30115 CVE-2022-42916 CVE-2022-43551 D:CVE-2022-42916 FEDORA:FEDORA-2022-01ffde372c FEDORA:FEDORA-2022-39688a779d FEDORA:FEDORA-2022-d7ee33d4ad FEDORA:FEDORA-2022-e9d65906c4 FULLDISC:20230123 APPLE-SA-2023-01-23-4 macOS Ventura 13.2 FULLDISC:20230123 APPLE-SA-2023-01-23-5 macOS Monterey 12.6.3 GLSA-202212-01 MISC:curl.se:OSS:2022/Q2/97 MISC:github.com:OSS:2022/10/26/4 MISC:github.com:OSS:2022/12/21/1 MISC:hackerone.com:/reports/1755083 MISC:hackerone.com:CVE-2022-30115 MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/TVWZW5CNSJ7UYAF2BGSYAWAEXDJYUBHA/ OSS:2022/10/26/4 OSS:2022/12/21/1 OSS:2022/Q2/97 OSS:2022/Q4/204 OSS:2022/Q4/50 Oracle:CVE-2022-42916 Oracle:CVE-2022-43551 RHSA-2022:8840 RHSA-2022:8841 RHSA-2023:3354 RHSA-2023:3355 SMASH Issue 330793 SMASH Issue 345349 SMASH Issue 345350 SMASH Issue 350247 bnc#1199225 bnc#1204386 bnc#1206308 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37YEVVC6NAF6H7UHH6YAUY5QEVY6LIH2/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVU3IMZCKR4VE6KJ4GCWRL2ILLC6OV76/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q27V5YYMXUVI6PRZQVECON32XPVWTKDK/ https://security.gentoo.org/glsa/202310-12 https://security.netapp.com/advisory/ntap-20230427-0007/ rh#2082223 rh#2135416 rh#2152639 |
CVE-2022-42919 | python3:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:github.com:/python/cpython/compare/v3.10.8...v3.10.9 CONFIRM:github.com:/python/cpython/compare/v3.9.15...v3.9.16 CONFIRM:security.netapp.com:/advisory/ntap-20221209-0006/ CVE-2022-42919 D:CVE-2022-42919 FEDORA:FEDORA-2022-028c09eaa7 FEDORA:FEDORA-2022-1166a1df1e FEDORA:FEDORA-2022-462f39dd2f FEDORA:FEDORA-2022-a7cad6bd22 FEDORA:FEDORA-2022-b17bf30e88 FEDORA:FEDORA-2022-f44dd1bec2 FEDORA:FEDORA-2023-097dd40685 FEDORA:FEDORA-2023-af5206f71d MISC:github.com:/python/cpython/issues/97514 MISC:github.com:CVE-2022-42919 RHSA-2022:8492 RHSA-2022:8493 SMASH Issue 346621 bnc#1204886 https://security.gentoo.org/glsa/202305-02 rh#2138705 |
CVE-2022-4292 | vim:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) | CONFIRM:huntr.dev:/bounties/da3d4c47-e57a-451e-993d-9df0ed31f57b CONFIRM:security.netapp.com:/advisory/ntap-20230113-0005/ CVE-2022-4292 FEDORA:FEDORA-2023-340f1d6ab9 L3:64932 L3:65186 L3:65231 L3:65301 L3:65303 L3:65540 MISC:github.com:/vim/vim/commit/c3d27ada14acd02db357f2d16347acc22cb17e93 SMASH Issue 349830 bnc#1206075 https://security.gentoo.org/glsa/202305-16 jsc#CAR-2229 jsc#PED-1802 rh#2151558 |
CVE-2022-4293 | vim:Released | moderate | 6.8 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H) | CONFIRM:huntr.dev:/bounties/385a835f-6e33-4d00-acce-ac99f3939143 CONFIRM:security.netapp.com:/advisory/ntap-20230203-0007/ CVE-2022-4293 L3:65874 MISC:github.com:/vim/vim/commit/cdef1cefa2a440911c727558562f83ed9b00e16b SMASH Issue 349829 bnc#1206077 https://security.gentoo.org/glsa/202305-16 jsc#CAR-2230 jsc#PED-1802 rh#2151566 |
CVE-2022-4304 | openssl:Not affected, openssl-1_1:Released | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N) | CVE-2022-4304 DSA-5343 L3:65184 L3:65622 L3:66264 L3:66298 L3:66706 RHSA-2023:0946 RHSA-2023:1199 RHSA-2023:1405 RHSA-2023:2165 RHSA-2023:2932 RHSA-2023:3354 RHSA-2023:3355 RHSA-2023:3408 RHSA-2023:3420 RHSA-2023:3421 RHSA-2023:4128 SMASH Issue 354985 SMASH Issue 354986 bdo#1023424 bnc#1207534 bnc#1208070 https://security.gentoo.org/glsa/202402-08 https://www.openssl.org/news/secadv/20230207.txt jsc#CAR-2339 openssl.git:commit:b1892d21f8f0435deb0250f24a97915dc641c807 openssl.git:commit:f06ef1657a3d4322153b26231a7afa3d55724e52 rh#2164487 |
CVE-2022-43551 | curl:Not affected | important | 6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N) | CONFIRM:security.netapp.com:/advisory/ntap-20221209-0010/ CONFIRM:security.netapp.com:CVE-2022-30115 CONFIRM:support.apple.com:/kb/HT213604 CONFIRM:support.apple.com:/kb/HT213605 CVE-2022-30115 CVE-2022-42916 CVE-2022-43551 D:CVE-2022-42916 FEDORA:FEDORA-2022-01ffde372c FEDORA:FEDORA-2022-39688a779d FEDORA:FEDORA-2022-d7ee33d4ad FEDORA:FEDORA-2022-e9d65906c4 FULLDISC:20230123 APPLE-SA-2023-01-23-4 macOS Ventura 13.2 FULLDISC:20230123 APPLE-SA-2023-01-23-5 macOS Monterey 12.6.3 GLSA-202212-01 MISC:curl.se:OSS:2022/Q2/97 MISC:github.com:OSS:2022/10/26/4 MISC:github.com:OSS:2022/12/21/1 MISC:hackerone.com:/reports/1755083 MISC:hackerone.com:CVE-2022-30115 MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/TVWZW5CNSJ7UYAF2BGSYAWAEXDJYUBHA/ OSS:2022/10/26/4 OSS:2022/12/21/1 OSS:2022/Q2/97 OSS:2022/Q4/204 OSS:2022/Q4/50 Oracle:CVE-2022-42916 Oracle:CVE-2022-43551 RHSA-2022:8840 RHSA-2022:8841 RHSA-2023:3354 RHSA-2023:3355 SMASH Issue 330793 SMASH Issue 345349 SMASH Issue 350247 SMASH Issue 350248 bnc#1199225 bnc#1204386 bnc#1206308 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37YEVVC6NAF6H7UHH6YAUY5QEVY6LIH2/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVU3IMZCKR4VE6KJ4GCWRL2ILLC6OV76/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q27V5YYMXUVI6PRZQVECON32XPVWTKDK/ https://security.gentoo.org/glsa/202310-12 https://security.netapp.com/advisory/ntap-20230427-0007/ rh#2082223 rh#2135416 rh#2152639 |
CVE-2022-43552 | curl:Released | moderate | 5.6 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L) | CVE-2022-43552 DSA-5330 L3:66794 OSS:2022/Q4/205 RHSA-2023:2478 RHSA-2023:2963 RHSA-2023:3354 RHSA-2023:3355 SMASH Issue 350249 SMASH Issue 350250 bnc#1206309 http://seclists.org/fulldisclosure/2023/Mar/17 https://hackerone.com/reports/1764858 https://security.gentoo.org/glsa/202310-12 https://security.netapp.com/advisory/ntap-20230214-0002/ https://support.apple.com/kb/HT213670 jsc#CAR-2237 rh#2152652 |
CVE-2022-43680 | expat:Released | important | 8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:CVE-2022-43680 CVE-2022-43680 DSA-5266 FEDORA:FEDORA-2022-3cf0e7ebc7 FEDORA:FEDORA-2022-49db80f821 FEDORA:FEDORA-2022-5f1e2e9016 FEDORA:FEDORA-2022-ae2559a8f4 FEDORA:FEDORA-2022-c43235716e FEDORA:FEDORA-2022-f3a939e960 GLSA-202210-38 L3:64675 L3:64679 L3:64732 L3:64817 L3:65221 MISC:github.com:CVE-2022-43680 MLIST:[debian-lts-announce] 20221028 [SECURITY] [DLA 3165-1] expat security update OSS:2023/12/28/5 OSS:2023/Q4/345 OSS:2024/01/03/5 OSS:2024/Q1/7 Oracle:CVE-2022-43680 RHSA-2023:0103 RHSA-2023:0337 RHSA-2023:3355 SMASH Issue 346080 SMASH Issue 348518 SMASH Issue 348548 SMASH Issue 357311 bdo#1022743 bnc#1204708 bnc#1205590 bnc#1205598 bnc#1205837 bnc#1206239 bnc#1208339 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AJ5VY2VYXE4WTRGQ6LMGLF6FV3SY37YE/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BY4OPSIB33ETNUXZY2UPZ4NGQ3OKDY4D/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPQVIF6TOJNY2T3ZZETFKR4G34FFREBQ/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FFCOMBSOJKLIKCGCJWHLJXO4EVYBG7AR/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IUJ2BULJTZ2BMSKQHB6US674P55UCWWS/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XG5XOOB7CD55CEE6OJYKSACSIMQ4RWQ6/ jsc#CAR-2145 rh#2130769 rh#2140059 |
CVE-2022-43750 | kernel-source-rt:Released | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-43750 D:CVE-2022-43750 L3:65869 MISC:cdn.kernel.org:CVE-2022-43750 MISC:git.kernel.org:CVE-2022-43750 MISC:github.com:CVE-2022-43750 MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update MLIST:[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update RHSA-2023:1987 RHSA-2023:1988 RHSA-2023:2148 RHSA-2023:2458 RHSA-2023:2736 RHSA-2023:2951 SMASH Issue 346065 SMASH Issue 346176 bnc#1204653 jsc#CAR-2141 rh#2151270 |
CVE-2022-4378 | kernel-source-rt:Released | important | 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-4378 L3:65173 L3:65185 L3:65426 L3:65804 L3:66541 L3:66770 L3:67393 L3:67469 MISC:git.kernel.org:/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-6.0/proc-avoid-integer-type-confusion-in-get_proc_long.patch MISC:git.kernel.org:/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-6.0/proc-proc_skip_spaces-shouldn-t-think-it-is-working-on-c-strings.patch OSS:2022/Q4/178 RHSA-2023:0856 RHSA-2023:0858 RHSA-2023:0944 RHSA-2023:0945 RHSA-2023:0951 RHSA-2023:0979 RHSA-2023:1008 RHSA-2023:1091 RHSA-2023:1092 RHSA-2023:1101 RHSA-2023:1103 RHSA-2023:1109 RHSA-2023:1110 RHSA-2023:1202 RHSA-2023:1203 RHSA-2023:1220 RHSA-2023:1221 RHSA-2023:1251 RHSA-2023:1435 RHSA-2023:1566 RHSA-2023:1584 RHSA-2023:1659 RHSA-2023:1705 RHSA-2023:1706 RHSA-2023:1822 RHSA-2023:3388 RHSA-2023:3431 RHSA-2023:3491 SMASH Issue 350057 bnc#1206207 bnc#1206228 http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html jsc#CAR-2235 rh#2152548 |
CVE-2022-4379 | kernel-source-rt:Not affected | important | 7.4 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H) | CVE-2022-4379 FEDORA:FEDORA-2023-3fd7349f60 FEDORA:FEDORA-2023-f4f9182dc8 L3:65871 MISC:git.kernel.org:/pub/scm/linux/kernel/git/torvalds/linux.git/commit/ OSS:2022/Q4/185 RHSA-2023:0951 RHSA-2023:0979 RHSA-2023:1008 RHSA-2023:1202 RHSA-2023:1203 RHSA-2023:1435 SMASH Issue 350058 bnc#1206209 bnc#1206373 https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LECFVUHKIRBV5JJBE3KQCLGKNYJPBRCN/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAVD6JIILAVSRHZ4VXSV3RAAGUXKVXZA/ rh#2152807 |
CVE-2022-4382 | kernel-source-rt:Not affected | important | 7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-4382 OSS:2022/12/14/5 OSS:2022/Q4/187 SMASH Issue 350187 SMASH Issue 350198 bnc#1206258 bnc#1206363 rh#2182440 |
CVE-2022-43945 | kernel-source-rt:Released | important | 8.8 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:/advisory/ntap-20221215-0006/ CVE-2022-43945 L3:64728 L3:64999 L3:65173 L3:65185 L3:65426 L3:65628 L3:66491 MISC:git.kernel.org:CVE-2022-43945 OSS:2022/Q4/151 RHSA-2022:8973 RHSA-2022:8974 RHSA-2022:9082 RHSA-2023:0300 RHSA-2023:0334 RHSA-2023:0348 RHSA-2023:0832 RHSA-2023:0839 RHSA-2023:0854 SMASH Issue 347218 bnc#1205128 bnc#1205130 bnc#1205833 bnc#1207075 http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html jsc#CAR-2169 rh#2133483 rh#2141752 rh#2144991 rh#2148458 |
CVE-2022-44032 | kernel-source-rt:Not affected | moderate | 4.3 (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-44032 D:CVE-2022-44032 L3:66046 MISC:lore.kernel.org:CVE-2022-44032 MISC:lore.kernel.org:CVE-2022-44033 SMASH Issue 346615 bnc#1204894 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9b12f050c76f090cc6d0aebe0ef76fed79ec3f15 https://lore.kernel.org/lkml/20220915020834.GA110086%40ubuntu/ https://lore.kernel.org/lkml/20220919040701.GA302806%40ubuntu/ rh#2161999 |
CVE-2022-44033 | kernel-source-rt:Not affected | moderate | 4.3 (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-44033 D:CVE-2022-44033 L3:66059 MISC:lore.kernel.org:CVE-2022-44033 SMASH Issue 346614 bnc#1204922 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9b12f050c76f090cc6d0aebe0ef76fed79ec3f15 https://lore.kernel.org/lkml/20220915020834.GA110086%40ubuntu/ https://lore.kernel.org/lkml/20220919040457.GA302681%40ubuntu/ rh#2162096 |
CVE-2022-44034 | kernel-source-rt:Not affected | moderate | 6.4 (CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-44034 D:CVE-2022-44034 MISC:lore.kernel.org:CVE-2022-44034 SMASH Issue 346613 bnc#1204901 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9b12f050c76f090cc6d0aebe0ef76fed79ec3f15 https://lore.kernel.org/lkml/20220916050333.GA188358%40ubuntu/ https://lore.kernel.org/lkml/20220919101825.GA313940%40ubuntu/ rh#2162104 |
CVE-2022-4415 | systemd:Ignore | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2022-4415 MISC:github.com:/systemd/systemd/commit/b7641425659243c09473cd8fb3aef2c0d4a3eb9c OSS:2022/12/21/3 OSS:2022/Q4/206 Oracle:CVE-2022-4415 RHSA-2023:0837 RHSA-2023:0954 SMASH Issue 347034 SMASH Issue 350284 bnc#1205000 jsc#CAR-2216 rh#2155515 |
CVE-2022-4450 | openssl:Not affected, openssl-1_1:Released | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-4450 DSA-5343 L3:68186 RHSA-2023:0946 RHSA-2023:1199 RHSA-2023:1405 RHSA-2023:2165 RHSA-2023:2932 RHSA-2023:3354 RHSA-2023:3355 RHSA-2023:3408 RHSA-2023:3420 RHSA-2023:3421 SMASH Issue 354991 SMASH Issue 354992 bdo#1023424 bnc#1207538 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=63bcf189be73a9cc1264059bed6f57974be74a83 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=bbcf509bd046b34cca19c766bbddc31683d0858b https://security.gentoo.org/glsa/202402-08 https://www.openssl.org/news/secadv/20230207.txt jsc#CAR-2340 openssl.git:commit:bc07d371865095643ec4f7190f26b174830a2f02 openssl.git:commit:dc341a46677fe19f055bd2eea0e3a2af21053903 openssl.git:commit:ee6243f3947107d655f6dee96f63861561a5aaeb rh#2164494 |
CVE-2022-45061 | python3:Released | moderate | 6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:/advisory/ntap-20221209-0007/ CVE-2022-45061 FEDORA:FEDORA-2022-18b234c18b FEDORA:FEDORA-2022-3d7e44dbd5 FEDORA:FEDORA-2022-3e859b6bc6 FEDORA:FEDORA-2022-45d2cfdfa4 FEDORA:FEDORA-2022-50deb53896 FEDORA:FEDORA-2022-6b8b96f883 FEDORA:FEDORA-2022-6ba889e0e3 FEDORA:FEDORA-2022-6d51289820 FEDORA:FEDORA-2022-6f4e6120d7 FEDORA:FEDORA-2022-93c6916349 FEDORA:FEDORA-2022-b2f06fbb62 FEDORA:FEDORA-2022-bcf089dd07 FEDORA:FEDORA-2022-dbb811d203 FEDORA:FEDORA-2022-de755fd092 FEDORA:FEDORA-2022-e1ce71ff40 FEDORA:FEDORA-2022-e699dd5247 FEDORA:FEDORA-2022-e6d0495206 FEDORA:FEDORA-2022-fbf6a320fe FEDORA:FEDORA-2022-fd3771db30 FEDORA:FEDORA-2022-fdb2739feb FEDORA:FEDORA-2023-097dd40685 FEDORA:FEDORA-2023-78b4ce2f23 FEDORA:FEDORA-2023-943556a733 FEDORA:FEDORA-2023-a990c93ed0 FEDORA:FEDORA-2023-af5206f71d FEDORA:FEDORA-2023-f1381c83af L3:65873 MISC:github.com:CVE-2022-45061 Oracle:CVE-2022-45061 RHSA-2023:0833 RHSA-2023:0953 RHSA-2023:2763 RHSA-2023:2764 RHSA-2023:2860 SMASH Issue 347485 bnc#1205244 https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4MYQ3IV6NWA4CKSXEHW45CH2YNDHEPH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BWJREJHWVRBYDP43YB5WRL3QC7UBA7BR/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QCKD4AFBHXIMHS64ZER2U7QRT33HNE7L/ https://security.gentoo.org/glsa/202305-02 jsc#CAR-2171 rh#2144072 |
CVE-2022-4543 | kernel-source-rt:Won't fix | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2022-4543 MISC:www.willsroot.io:/2022/12/entrybleed.html OSS:2022/12/16/3 OSS:2022/Q4/198 SMASH Issue 350945 SMASH Issue 350946 bnc#1206463 jsc#CAR-2248 rh#2133483 rh#2153871 |
CVE-2022-45869 | kernel-source-rt:Not affected | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-45869 D:CVE-2022-45869 MISC:git.kernel.org:CVE-2022-45869 RHSA-2023:4377 RHSA-2023:4378 SMASH Issue 349178 bnc#1205882 linux.git:commit:47b0c2e4c220f2251fd8dcfbb44479819c715e15 rh#2151317 |
CVE-2022-45873 | systemd:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-45873 FEDORA:FEDORA-2022-ef4f57b072 MISC:github.com:CVE-2022-45873 RHSA-2023:0954 SMASH Issue 348841 bnc#1205713 rh#2149063 |
CVE-2022-45884 | kernel-source-rt:Unsupported | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:/advisory/ntap-20230113-0006/ CVE-2022-45884 D:CVE-2022-45884 MISC:lore.kernel.org:CVE-2022-45884 MISC:lore.kernel.org:CVE-2022-45887 SMASH Issue 348923 bnc#1205756 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=627bb528b086b4136315c25d6a447a98ea9448d3 https://lore.kernel.org/linux-media/20221115131822.6640-1-imv4bel%40gmail.com/ https://lore.kernel.org/linux-media/20221115131822.6640-4-imv4bel%40gmail.com/ jsc#CAR-2188 rh#2148510 |
CVE-2022-45885 | kernel-source-rt:Won't fix | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:/advisory/ntap-20230113-0006/ CVE-2022-45885 D:CVE-2022-45885 MISC:lore.kernel.org:CVE-2022-45885 MISC:lore.kernel.org:CVE-2022-45887 SMASH Issue 348922 bnc#1205758 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6769a0b7ee0c3b31e1b22c3fadff2bfb642de23f https://lore.kernel.org/linux-media/20221115131822.6640-1-imv4bel%40gmail.com/ https://lore.kernel.org/linux-media/20221115131822.6640-2-imv4bel%40gmail.com/ jsc#CAR-2189 rh#2148513 |
CVE-2022-45886 | kernel-source-rt:Ignore | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:/advisory/ntap-20230113-0006/ CVE-2022-45886 D:CVE-2022-45886 MISC:lore.kernel.org:CVE-2022-45886 MISC:lore.kernel.org:CVE-2022-45887 SMASH Issue 348921 bnc#1205760 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4172385b0c9ac366dcab78eda48c26814b87ed1a https://lore.kernel.org/linux-media/20221115131822.6640-1-imv4bel%40gmail.com/ https://lore.kernel.org/linux-media/20221115131822.6640-3-imv4bel%40gmail.com/ jsc#CAR-2190 rh#2148517 |
CVE-2022-45887 | kernel-source-rt:Released | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:/advisory/ntap-20230113-0006/ CVE-2022-45887 D:CVE-2022-45887 L3:67651 MISC:lore.kernel.org:CVE-2022-45887 SMASH Issue 348920 bnc#1205762 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=517a281338322ff8293f988771c98aaa7205e457 https://lore.kernel.org/linux-media/20221115131822.6640-1-imv4bel%40gmail.com/ https://lore.kernel.org/linux-media/20221115131822.6640-5-imv4bel%40gmail.com/ jsc#CAR-2191 rh#2148520 |
CVE-2022-45888 | kernel-source-rt:Not affected | low | 4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:/advisory/ntap-20230113-0006/ CVE-2022-45888 D:CVE-2022-45888 MISC:lore.kernel.org:CVE-2022-45888 SMASH Issue 348919 bnc#1205764 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=282a4b71816b6076029017a7bab3a9dcee12a920 https://lore.kernel.org/all/20221022175404.GA375335%40ubuntu/ rh#2148523 |
CVE-2022-45919 | kernel-source-rt:Released | important | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:/advisory/ntap-20230113-0008/ CVE-2022-45919 CVE-2023-1077 CVE-2023-3159 D:CVE-2022-45919 DSA-5480 DSA-5492 L3:65449 L3:66178 L3:66431 L3:66432 L3:66463 L3:66491 L3:66496 L3:66505 L3:66852 L3:67104 MISC:lore.kernel.org:CVE-2022-45919 OSS:2023/Q1/126 SMASH Issue 348997 SMASH Issue 358071 ZDI-24-593 bnc#1205803 bnc#1208600 bnc#1208839 bnc#1208912 bnc#1212128 bnc#1212347 bnc#1212744 bnc#1213937 bnc#1214100 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=280a8ab81733da8bc442253c700a52c4c0886ffd https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=7c4a5b89a0b5a57a64b601775b296abf77a9fe97 https://github.com/torvalds/linux/commit/b7c81f80246fac44077166f3e07103affe6db8ff https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html https://lore.kernel.org/linux-media/20221121063308.GA33821%40ubuntu/T/#u https://security.netapp.com/advisory/ntap-20230511-0002/ jsc#CAR-2403 jsc#CAR-2670 jsc#CAR-2698 linux.git:commit:3e337087c3b5805fe0b8a46ba622a962880b5d64 rh#2150999 rh#2151956 rh#2173436 rh#2179000 rh#2187773 rh#2187931 rh#2192671 rh#2213414 rh#2218672 rh#2226780 |
CVE-2022-45934 | kernel-source-rt:Released | moderate | 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | CONFIRM:security.netapp.com:/advisory/ntap-20230113-0008/ CVE-2022-45934 D:CVE-2022-45934 DSA-5324 FEDORA:FEDORA-2022-90162a1d88 L3:66048 MISC:git.kernel.org:CVE-2022-45934 SMASH Issue 348992 bnc#1205796 https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html jsc#CAR-2192 rh#2151959 |
CVE-2022-4662 | kernel-source-rt:Released | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-4662 MISC:lore.kernel.org:/all/20220913140355.910732567@linuxfoundation.org/ MISC:lore.kernel.org:CVE-2022-3903 RHSA-2023:2148 RHSA-2023:2458 RHSA-2023:2736 RHSA-2023:2951 SMASH Issue 351604 bnc#1206664 rh#2155788 |
CVE-2022-46663 | less:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CVE-2022-46663 D:CVE-2022-46663 OSS:2023/02/07/7 RHSA-2023:3725 SMASH Issue 355855 SMASH Issue 355856 bnc#1207815 http://www.greenwoodsoftware.com/less/news.609.html https://github.com/gwsw/less/commit/a78e1351113cef564d790a730d657a321624d79c https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LR7AUWB34JD4PCW3HHASBEDGGHFWPAQP/ https://security.gentoo.org/glsa/202310-11 rh#2169621 |
CVE-2022-46781 | kernel-source-rt:Not affected | low | () | CONFIRM:developer.arm.com:CVE-2022-28350 CVE-2022-46781 SMASH Issue 362628 bnc#1210235 |
CVE-2022-46908 | sqlite3:Released | important | 7.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L) | CONFIRM:security.netapp.com:/advisory/ntap-20230203-0005/ CVE-2022-46908 L3:67673 MISC:news.ycombinator.com:/item MISC:sqlite.org:/forum/forumpost/07beac8056151b2f MISC:sqlite.org:/src/info/cefc032473ac5ad2 Oracle:CVE-2022-46908 SMASH Issue 350271 bnc#1206337 https://security.gentoo.org/glsa/202311-03 jsc#CAR-2241 rh#2152844 |
CVE-2022-4696 | kernel-source-rt:Not affected | important | () | CVE-2022-4696 D:CVE-2022-4696 DSA-5324 MISC:git.kernel.org:/pub/scm/linux/kernel/git/stable/linux.git/commit/ MISC:kernel.dance:/ SMASH Issue 353441 bnc#1207118 rh#2164424 |
CVE-2022-47024 | vim:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CVE-2022-47024 MISC:github.com:/vim/vim/commit/a63ad78ed31e36dbdf3a9cd28071dcdbefce7d19 RHSA-2023:0958 SMASH Issue 354444 bnc#1207397 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EX6N2DB75A73MQGVW3CS4VTNPAYVM2M/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PZWIJBSQX53P7DHV77KRXJIXA4GH7XHC/ https://security.gentoo.org/glsa/202305-16 rh#2163613 |
CVE-2022-4744 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-4744 D:CVE-2022-4744 L3:65564 L3:65952 RHSA-2023:1466 RHSA-2023:1467 RHSA-2023:1468 RHSA-2023:1469 RHSA-2023:1470 RHSA-2023:1471 SMASH Issue 360933 bnc#1209635 bnc#1209672 http://packetstormsecurity.com/files/171912/CentOS-Stream-9-Missing-Kernel-Security-Fix.html https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=158b515f703e https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html https://security.netapp.com/advisory/ntap-20230526-0009/ rh#2156322 |
CVE-2022-47518 | kernel-source-rt:Not affected | moderate | 5.7 (CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:security.netapp.com:/advisory/ntap-20230113-0007/ CVE-2022-47518 D:CVE-2022-47518 MISC:github.com:/torvalds/linux/commit/0cdfa9e6f0915e3d243e2393bfa8a22e12d553b0 MISC:lore.kernel.org:/r/20221123153543.8568-5-philipturnbull@github.com MLIST:[debian-lts-announce] 20221222 [SECURITY] [DLA 3244-1] linux-5.10 security update SMASH Issue 351233 bnc#1206511 rh#2158373 |
CVE-2022-47519 | kernel-source-rt:Not affected | important | 8 (CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:/advisory/ntap-20230113-0007/ CVE-2022-47519 D:CVE-2022-47519 MISC:github.com:/torvalds/linux/commit/051ae669e4505abbe05165bebf6be7922de11f41 MISC:lore.kernel.org:/r/20221123153543.8568-3-philipturnbull@github.com MLIST:[debian-lts-announce] 20221222 [SECURITY] [DLA 3244-1] linux-5.10 security update SMASH Issue 351232 bnc#1206512 rh#2158377 |
CVE-2022-47520 | kernel-source-rt:Released | important | 8.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:L) | CONFIRM:security.netapp.com:/advisory/ntap-20230113-0007/ CVE-2022-47520 D:CVE-2022-47520 MISC:github.com:/torvalds/linux/commit/cd21d99e595ec1d8721e1058dcdd4f1f7de1d793 MISC:lore.kernel.org:/r/20221123153543.8568-2-philipturnbull@github.com MLIST:[debian-lts-announce] 20221222 [SECURITY] [DLA 3244-1] linux-5.10 security update SMASH Issue 351231 bnc#1206515 bnc#1207823 jsc#CAR-2245 rh#2158381 |
CVE-2022-47521 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H) | CONFIRM:security.netapp.com:/advisory/ntap-20230113-0007/ CVE-2022-47521 D:CVE-2022-47521 MISC:github.com:/torvalds/linux/commit/f9b62f9843c7b0afdaecabbcebf1dbba18599408 MISC:lore.kernel.org:/r/20221123153543.8568-4-philipturnbull@github.com MLIST:[debian-lts-announce] 20221222 [SECURITY] [DLA 3244-1] linux-5.10 security update SMASH Issue 351230 bnc#1206516 rh#2158399 |
CVE-2022-47629 | libksba:Released | important | 8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-47629 DSA-5305 GLSA-202212-07 L3:64938 L3:65223 L3:65297 L3:65300 L3:65451 L3:65542 MISC:dev.gnupg.org:/T6284 MISC:git.gnupg.org:/cgi-bin/gitweb.cgi MLIST:[debian-lts-announce] 20221224 [SECURITY] [DLA 3248-1] libksba security update Oracle:CVE-2022-47629 RHSA-2023:0530 RHSA-2023:0592 RHSA-2023:0593 RHSA-2023:0594 RHSA-2023:0624 RHSA-2023:0625 RHSA-2023:0626 RHSA-2023:0629 RHSA-2023:0756 RHSA-2023:0859 SMASH Issue 351489 bnc#1206579 bnc#1206826 bnc#1208341 bnc#1208643 bnc#1208648 bnc#1209321 bnc#1209710 https://security.netapp.com/advisory/ntap-20230316-0011/ jsc#CAR-2249 rh#2135610 rh#2161571 |
CVE-2022-47929 | kernel-source-rt:Released | moderate | 4.2 (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:cdn.kernel.org:/pub/linux/kernel/v6.x/ChangeLog-6.1.6 CONFIRM:git.kernel.org:/pub/scm/linux/kernel/git/torvalds/linux.git/commit/ CVE-2022-47929 DSA-5324 MISC:tldp.org:/HOWTO/Traffic-Control-HOWTO/components.html MISC:www.spinics.net:/lists/netdev/msg555705.html RHSA-2023:2148 RHSA-2023:2458 RHSA-2023:2736 RHSA-2023:2951 SMASH Issue 354036 bnc#1207237 https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html jsc#CAR-2295 rh#2168246 |
CVE-2022-47938 | kernel-source-rt:Not affected | moderate | 6.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-47938 MISC:cdn.kernel.org:/pub/linux/kernel/v5.x/ChangeLog-5.19.2 MISC:git.kernel.org:/cgit/linux/kernel/git/torvalds/linux.git/commit/ MISC:github.com:/torvalds/linux/commit/824d4f64c20093275f72fc8101394d75ff6a249e MISC:www.zerodayinitiative.com:OSS:2022/12/23/10 OSS:2022/12/22/8 OSS:2022/12/23/10 OSS:2022/Q4/235 SMASH Issue 351613 ZDI-22-1689 bnc#1206658 rh#2155943 rh#2155945 rh#2155946 rh#2155947 rh#2156340 |
CVE-2022-47939 | kernel-source-rt:Not affected | critical | 10 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) | CVE-2022-47939 MISC:cdn.kernel.org:/pub/linux/kernel/v5.x/ChangeLog-5.19.2 MISC:git.kernel.org:/cgit/linux/kernel/git/torvalds/linux.git/commit/ MISC:github.com:/torvalds/linux/commit/cf6531d98190fa2cf92a6d8bbc8af0a4740a223c MISC:www.zerodayinitiative.com:OSS:2022/12/23/10 OSS:2022/12/22/8 OSS:2022/12/23/10 OSS:2022/Q4/235 SMASH Issue 351680 ZDI-22-1690 bnc#1206654 https://www.secpod.com/blog/zero-day-server-message-block-smb-server-in-linux-kernel-5-15-has-a-critical-vulnerability-patch-ksmbd-immediately/ rh#2155943 rh#2155945 rh#2155946 rh#2155947 rh#2156340 |
CVE-2022-47940 | kernel-source-rt:Not affected | critical | 9.6 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H) | CVE-2022-47940 MISC:cdn.kernel.org:/pub/linux/kernel/v5.x/ChangeLog-5.18.18 MISC:git.kernel.org:/cgit/linux/kernel/git/torvalds/linux.git/commit/ MISC:github.com:/torvalds/linux/commit/158a66b245739e15858de42c0ba60fcf3de9b8e6 MISC:www.zerodayinitiative.com:OSS:2022/12/23/10 OSS:2022/12/22/8 OSS:2022/12/23/10 OSS:2022/Q4/235 OSS:2022/Q4/269 SMASH Issue 351725 SMASH Issue 351726 bnc#1206679 rh#2155943 rh#2155944 rh#2155945 rh#2155946 rh#2155947 rh#2156340 |
CVE-2022-47941 | kernel-source-rt:Not affected | moderate | 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | CVE-2022-47941 MISC:cdn.kernel.org:/pub/linux/kernel/v5.x/ChangeLog-5.19.2 MISC:git.kernel.org:/cgit/linux/kernel/git/torvalds/linux.git/commit/ MISC:github.com:/torvalds/linux/commit/aa7253c2393f6dcd6a1468b0792f6da76edad917 MISC:www.zerodayinitiative.com:OSS:2022/12/23/10 OSS:2022/12/22/8 OSS:2022/12/23/10 OSS:2022/Q4/235 SMASH Issue 351682 ZDI-22-1687 bnc#1206656 rh#2155943 rh#2155945 rh#2155946 rh#2155947 rh#2156340 |
CVE-2022-47942 | kernel-source-rt:Not affected | important | 8.5 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H) | CVE-2022-47942 MISC:cdn.kernel.org:/pub/linux/kernel/v5.x/ChangeLog-5.19.2 MISC:git.kernel.org:/cgit/linux/kernel/git/torvalds/linux.git/commit/ MISC:github.com:/torvalds/linux/commit/8f0541186e9ad1b62accc9519cc2b7a7240272a7 MISC:www.zerodayinitiative.com:OSS:2022/12/23/10 OSS:2022/12/22/8 OSS:2022/12/23/10 OSS:2022/Q4/235 SMASH Issue 351683 ZDI-22-1688 bnc#1206657 rh#2155943 rh#2155945 rh#2155946 rh#2155947 rh#2156340 |
CVE-2022-47943 | kernel-source-rt:Not affected | critical | 9.6 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H) | CVE-2022-47943 MISC:cdn.kernel.org:/pub/linux/kernel/v5.x/ChangeLog-5.19.2 MISC:git.kernel.org:/cgit/linux/kernel/git/torvalds/linux.git/commit/ MISC:github.com:/torvalds/linux/commit/ac60778b87e45576d7bfdbd6f53df902654e6f09 MISC:www.zerodayinitiative.com:OSS:2022/12/23/10 OSS:2022/12/22/8 OSS:2022/12/23/10 OSS:2022/Q4/269 SMASH Issue 351681 bnc#1206655 https://security.netapp.com/advisory/ntap-20230216-0006/ rh#2155943 rh#2155945 rh#2155946 rh#2155947 rh#2156340 |
CVE-2022-47946 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-47946 D:CVE-2022-47946 MISC:git.kernel.org:/pub/scm/linux/kernel/git/stable/linux.git/commit/ OSS:2022/12/22/2 OSS:2022/12/27/1 OSS:2022/Q4/242 SMASH Issue 351737 bnc#1206714 rh#2155840 |
CVE-2022-48174 | busybox:Already fixed | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) | CVE-2022-48174 L3:66810 L3:68110 L3:68206 RHSA-2023:5178 SMASH Issue 376060 bnc#1214538 bnc#1215448 https://bugs.busybox.net/show_bug.cgi?id=15216 jsc#CAR-2839 rh#2237153 |
CVE-2022-48303 | tar:Released | moderate | 4.3 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N) | CVE-2022-48303 D:CVE-2022-48303 L3:65174 MISC:savannah.gnu.org:/bugs/ MISC:savannah.gnu.org:/patch/ RHSA-2023:0842 RHSA-2023:0959 RHSA-2023:5610 SMASH Issue 355635 bnc#1207753 bnc#1208031 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CRY7VEL4AIG3GLIEVCTOXRZNSVYDYYUD/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5VQYCO52Z7GAVCLRYUITN7KXHLRZQS4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CRY7VEL4AIG3GLIEVCTOXRZNSVYDYYUD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5VQYCO52Z7GAVCLRYUITN7KXHLRZQS4/ jsc#CAR-2327 rh#2149722 |
CVE-2022-4842 | kernel-source-rt:Not affected | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-4842 MISC:lore.kernel.org:/ntfs3/784f82c4-de71-b8c3-afd6-468869a369af@paragon-software.com/T/ SMASH Issue 352071 bnc#1202210 bnc#1206749 rh#2156927 |
CVE-2022-48423 | kernel-source-rt:Not affected | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48423 D:CVE-2022-48423 SMASH Issue 360594 bnc#1209479 https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.3 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=54e45702b648b7c0000e90b3e9b890e367e16ea8 https://security.netapp.com/advisory/ntap-20230505-0003/ rh#2179832 |
CVE-2022-48424 | kernel-source-rt:Not affected | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48424 D:CVE-2022-48424 SMASH Issue 360595 bnc#1209475 https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.3 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4f1dc7d9756e66f3f876839ea174df2e656b7f79 https://security.netapp.com/advisory/ntap-20230505-0002/ rh#2179836 |
CVE-2022-48425 | kernel-source-rt:Not affected | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48425 D:CVE-2022-48425 SMASH Issue 360596 bnc#1209501 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=467333af2f7b95eeaa61a5b5369a80063cd971fd https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/fs/ntfs3?id=467333af2f7b95eeaa61a5b5369a80063cd971fd https://security.netapp.com/advisory/ntap-20230413-0006/ rh#2179841 |
CVE-2022-48502 | kernel-source-rt:Not affected | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-48502 SMASH Issue 368041 bnc#1211887 https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0e8235d28f3a0e9eda9f02ff67ee566d5f42b66b https://security.netapp.com/advisory/ntap-20230703-0004/ https://syzkaller.appspot.com/bug?extid=8778f030156c6cd16d72 rh#2212763 |
CVE-2022-48554 | file:Not affected | moderate | () | CVE-2022-48554 DSA-5489 SMASH Issue 376066 bnc#1214507 http://seclists.org/fulldisclosure/2024/Mar/21 http://seclists.org/fulldisclosure/2024/Mar/24 http://seclists.org/fulldisclosure/2024/Mar/25 https://bugs.astron.com/view.php?id=310 https://security.netapp.com/advisory/ntap-20231116-0002/ https://support.apple.com/kb/HT214081 https://support.apple.com/kb/HT214084 https://support.apple.com/kb/HT214086 https://support.apple.com/kb/HT214088 https://www.debian.org/security/2023/dsa-5489 rh#2235714 |
CVE-2022-48626 | kernel-source-rt:Already fixed | moderate | 5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) | CVE-2022-48626 SMASH Issue 395112 bnc#1220366 https://git.kernel.org/stable/c/3a0a7ec5574b510b067cfc734b8bdb6564b31d4e https://git.kernel.org/stable/c/7f901d53f120d1921f84f7b9b118e87e94b403c5 https://git.kernel.org/stable/c/9c25d5ff1856b91bd4365e813f566cb59aaa9552 https://git.kernel.org/stable/c/af0e6c49438b1596e4be8a267d218a0c88a42323 https://git.kernel.org/stable/c/bd2db32e7c3e35bd4d9b8bbff689434a50893546 https://git.kernel.org/stable/c/be93028d306dac9f5b59ebebd9ec7abcfc69c156 https://git.kernel.org/stable/c/e6f580d0b3349646d4ee1ce0057eb273e8fb7e2e https://git.kernel.org/stable/c/f5dc193167591e88797262ec78515a0cbe79ff5f rh#2266029 |
CVE-2022-48628 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L) | CVE-2022-48628 SMASH Issue 396047 bnc#1220848 https://git.kernel.org/stable/c/47f82395f04a976d4fa97de7f2acffa1c1096571 https://git.kernel.org/stable/c/89744b64914426cbabceb3d8a149176b5dafdfb5 https://git.kernel.org/stable/c/e3dfcab2080dc1f9a4b09cc1327361bc2845bfcd rh#2267507 |
CVE-2022-48630 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48630 SMASH Issue 396332 bnc#1220990 https://git.kernel.org/stable/c/05d4d17475d8d094c519bb51658bc47899c175e3 https://git.kernel.org/stable/c/16287397ec5c08aa58db6acf7dbc55470d78087d https://git.kernel.org/stable/c/233a3cc60e7a8fe0be8cf9934ae7b67ba25a866c https://git.kernel.org/stable/c/71a89789552b7faf3ef27969b9bc783fa0df3550 https://git.kernel.org/stable/c/8a06f25f5941c145773204f2f7abef95b4ffb8ce https://git.kernel.org/stable/c/8be06f62b426801dba43ddf8893952a0e62ab6ae rh#2267959 |
CVE-2022-48631 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48631 SMASH Issue 403388 bnc#1223475 https://git.kernel.org/stable/c/29a5b8a137ac8eb410cc823653a29ac0e7b7e1b0 https://git.kernel.org/stable/c/2f5e9de15e4f55fbf56f22d4a2ce406246cc462d https://git.kernel.org/stable/c/958b0ee23f5ac106e7cc11472b71aa2ea9a033bc https://git.kernel.org/stable/c/bb7eb3ca4b3b0d2c7872cf1a41c30f5e5bd65df0 https://git.kernel.org/stable/c/be4df018c0be5ebecf1ca510feacc23be415cefc rh#2277842 |
CVE-2022-48632 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48632 SMASH Issue 403389 bnc#1223481 https://git.kernel.org/stable/c/3b5ab5fbe69ebbee5692c72b05071a43fc0655d8 https://git.kernel.org/stable/c/48ee0a864d1af02eea98fc825cc230d61517a71e https://git.kernel.org/stable/c/dc2a0c587006f29b724069740c48654b9dcaebd2 https://git.kernel.org/stable/c/de24aceb07d426b6f1c59f33889d6a964770547b rh#2277840 |
CVE-2022-48633 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48633 SMASH Issue 403390 bnc#1223489 https://git.kernel.org/stable/c/55c077d97fa67e9f19952bb24122a8316b089474 https://git.kernel.org/stable/c/b6f25c3b94f2aadbf5cbef954db4073614943d74 rh#2277839 |
CVE-2022-48634 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48634 SMASH Issue 403391 bnc#1223501 https://git.kernel.org/stable/c/63e37a79f7bd939314997e29c2f5a9f0ef184281 https://git.kernel.org/stable/c/a6ed7624bf4d0a32f2631e74828bca7b7bf15afd https://git.kernel.org/stable/c/c5812807e416618477d1bb0049727ce8bb8292fd https://git.kernel.org/stable/c/e5ae504c8623476e13032670f1a6d6344d53ec9b rh#2277837 |
CVE-2022-48635 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48635 SMASH Issue 403392 bnc#1223497 https://git.kernel.org/stable/c/17d9c15c9b9e7fb285f7ac5367dfb5f00ff575e3 https://git.kernel.org/stable/c/60644dffac87b1bb47bdb393aa29d5f2ffcf41a0 https://git.kernel.org/stable/c/929ef155e1da41c06f4d8ca86ae12b851a83a744 rh#2277835 |
CVE-2022-48636 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48636 SMASH Issue 403393 bnc#1223512 https://git.kernel.org/stable/c/2e473351400e3dd66f0b71eddcef82ee45a584c1 https://git.kernel.org/stable/c/49f401a98b318761ca2e15d4c7869a20043fbed4 https://git.kernel.org/stable/c/650a2e79d176db753654d3dde88e53a2033036ac https://git.kernel.org/stable/c/aaba5ff2742043705bc4c02fd0b2b246e2e16da1 https://git.kernel.org/stable/c/d3a67c21b18f33c79382084af556557c442f12a6 https://git.kernel.org/stable/c/d86b4267834e6d4af62e3073e48166e349ab1b70 https://git.kernel.org/stable/c/db7ba07108a48c0f95b74fabbfd5d63e924f992d https://git.kernel.org/stable/c/f5fcc9d6d71d9ff7fdbdd4b89074e6e24fffc20b rh#2277833 |
CVE-2022-48637 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48637 SMASH Issue 403394 bnc#1223517 https://git.kernel.org/stable/c/08483e4c0c83b221b8891434a04cec405dee94a6 https://git.kernel.org/stable/c/32afa1f23e42cc635ccf4c39f24514d03d1e8338 https://git.kernel.org/stable/c/c31f26c8f69f776759cbbdfb38e40ea91aa0dd65 rh#2277831 |
CVE-2022-48640 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48640 SMASH Issue 403397 bnc#1223499 https://git.kernel.org/stable/c/0e400d602f46360752e4b32ce842dba3808e15e6 https://git.kernel.org/stable/c/2c8e8ab53acfc78da0b4a65f30cb5d306e7d78f7 https://git.kernel.org/stable/c/ec3a6f4ffe556a28f6f5028bf7c4412557e7051b rh#2277826 |
CVE-2022-48641 | kernel-source-rt:Not affected | moderate | () | CVE-2022-48641 SMASH Issue 403398 bnc#1223476 https://git.kernel.org/stable/c/11ebf32fde46572b0aaf3c2bdd97d923ef5a03ab https://git.kernel.org/stable/c/1e98318af2f163eadaff815abcef38d27ca92c1e https://git.kernel.org/stable/c/38cf372b17f0a5f35c1b716a100532d539f0eb33 https://git.kernel.org/stable/c/62ce44c4fff947eebdf10bb582267e686e6835c9 https://git.kernel.org/stable/c/754e8b74281dd54a324698803483f47cf3355ae1 https://git.kernel.org/stable/c/d5917b7af7cae0e2804f9d127a03268035098b7f https://git.kernel.org/stable/c/ebd97dbe3c55d68346b9c5fb00634a7f5b10bbee rh#2277825 |
CVE-2022-48643 | kernel-source-rt:Not affected | moderate | () | CVE-2022-48643 SMASH Issue 403400 bnc#1223480 https://git.kernel.org/stable/c/710e3f526bd23a0d33435dedc52c3144de284378 https://git.kernel.org/stable/c/8bcad2a931313aeba076b76922d5813ef97d0a91 https://git.kernel.org/stable/c/91aa52652f4b37089aff3cb53e83049d826fef6d https://git.kernel.org/stable/c/921ebde3c0d22c8cba74ce8eb3cc4626abff1ccd rh#2277820 |
CVE-2022-48646 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48646 SMASH Issue 403403 bnc#1223502 https://git.kernel.org/stable/c/589c6eded10c77a12b7b2cf235b6b19a2bdb91fa https://git.kernel.org/stable/c/a4eadca702dff0768dd01be6789bbec2a18e5b0a rh#2277816 |
CVE-2022-48647 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48647 SMASH Issue 403404 bnc#1223519 https://git.kernel.org/stable/c/360910b88d1466a90644a4e0533803b594344a2b https://git.kernel.org/stable/c/5f623a77cfc2d501d72bcb4f9ee71721e6c766ff https://git.kernel.org/stable/c/b4afd3878f961d3517f27b3213730fceef77945c https://git.kernel.org/stable/c/f232af4295653afa4ade3230462b3be15ad16419 rh#2277815 |
CVE-2022-48648 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48648 SMASH Issue 403405 bnc#1223503 https://git.kernel.org/stable/c/0a242eb2913a4aa3d6fbdb86559f27628e9466f3 https://git.kernel.org/stable/c/8547c7bfc0617e7184e4da65b9b96681fcfe9998 https://git.kernel.org/stable/c/b3b41d4d95d3822b2e459ecbc80d030ea6aec5e7 https://git.kernel.org/stable/c/b3b952168ee1f220ba729fa100fd9d5aa752eb03 rh#2277814 |
CVE-2022-48649 | kernel-source-rt:Not affected | moderate | () | CVE-2022-48649 SMASH Issue 403406 bnc#1223500 https://git.kernel.org/stable/c/c673c6ceac53fb2e631c9fbbd79957099a08927f https://git.kernel.org/stable/c/d71608a877362becdc94191f190902fac1e64d35 rh#2277813 |
CVE-2022-48650 | kernel-source-rt:Already fixed | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48650 SMASH Issue 403407 bnc#1223509 https://git.kernel.org/stable/c/601be20fc6a1b762044d2398befffd6bf236cebf https://git.kernel.org/stable/c/6a4236ed47f5b0a57eb6b8fb1c351b15b3d341d7 https://git.kernel.org/stable/c/89df49e561b4a8948521fc3f8a013012eaa08f82 rh#2277812 |
CVE-2022-48652 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48652 SMASH Issue 403409 bnc#1223520 https://git.kernel.org/stable/c/7c945e5b4787db47d728120b56c934ba05f99864 https://git.kernel.org/stable/c/a509702cac95a8b450228a037c8542f57e538e5b rh#2277810 |
CVE-2022-48653 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2022-48653 SMASH Issue 403410 bnc#1223474 https://git.kernel.org/stable/c/149979e87eb7a365d3d0b259bed79d84ff585a93 https://git.kernel.org/stable/c/23c619190318376769ad7b61504c2ea0703fb783 https://git.kernel.org/stable/c/34447d64b8d28e4d6a73d73f07c879959d68fbfe rh#2277809 |
CVE-2022-48654 | kernel-source-rt:Already fixed | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) | CVE-2022-48654 SMASH Issue 403411 bnc#1223482 https://git.kernel.org/stable/c/559c36c5a8d730c49ef805a72b213d3bba155cc8 https://git.kernel.org/stable/c/5d75fef3e61e797fab5c3fbba88caa74ab92ad47 https://git.kernel.org/stable/c/633c81c0449663f57d4138326d036dc6cfad674e https://git.kernel.org/stable/c/721ea8ac063d70c2078c4e762212705de6151764 https://git.kernel.org/stable/c/816eab147e5c6f6621922b8515ad9010ceb1735e rh#2277808 |
CVE-2022-48655 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2022-48655 SMASH Issue 403412 bnc#1223477 https://git.kernel.org/stable/c/1f08a1b26cfc53b7715abc46857c6023bb1b87de https://git.kernel.org/stable/c/7184491fc515f391afba23d0e9b690caaea72daf https://git.kernel.org/stable/c/8e65edf0d37698f7a6cb174608d3ec7976baf49e https://git.kernel.org/stable/c/e9076ffbcaed5da6c182b144ef9f6e24554af268 https://git.kernel.org/stable/c/f2277d9e2a0d092c13bae7ee82d75432bb8b5108 rh#2277807 |
CVE-2022-48656 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2022-48656 SMASH Issue 403413 bnc#1223479 https://git.kernel.org/stable/c/a17df55bf6d536712da6902a83db82b82e67d5a2 https://git.kernel.org/stable/c/aa11dae059a439af82bae541b134f8f53ac177b5 https://git.kernel.org/stable/c/dd5a6c5a08752b613e83ad2cb5133e72a64b876d https://git.kernel.org/stable/c/f9fdb0b86f087c2b7f6c6168dd0985a3c1eda87e rh#2277806 |
CVE-2022-48657 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2022-48657 SMASH Issue 403414 bnc#1223484 https://git.kernel.org/stable/c/3c3edb82d67b2be9231174ac2af4af60d4af7549 https://git.kernel.org/stable/c/904f881b57360cf85de962d84d8614d94431f60e https://git.kernel.org/stable/c/bb6d99e27cbe6b30e4e3bbd32927fd3b0bdec6eb https://git.kernel.org/stable/c/d4955c0ad77dbc684fc716387070ac24801b8bca rh#2277805 |
CVE-2022-48658 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48658 SMASH Issue 403415 bnc#1223496 https://git.kernel.org/stable/c/61703b248be993eb4997b00ae5d3318e6d8f3c5b https://git.kernel.org/stable/c/df6cb39335cf5a1b918e8dbd8ba7cd9f1d00e45a https://git.kernel.org/stable/c/e45cc288724f0cfd497bb5920bcfa60caa335729 rh#2277803 |
CVE-2022-48660 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2022-48660 SMASH Issue 403417 bnc#1223487 https://git.kernel.org/stable/c/657803b918e097e47d99d1489da83a603c36bcdd https://git.kernel.org/stable/c/69bef19d6b9700e96285f4b4e28691cda3dcd0d1 https://git.kernel.org/stable/c/97da736cd11ae73bdf2f5e21e24446b8349e0168 https://git.kernel.org/stable/c/b1489043d3b9004dd8d5a0357b08b5f0e6691c43 rh#2277800 |
CVE-2022-48661 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2022-48661 SMASH Issue 403418 bnc#1223488 https://git.kernel.org/stable/c/02743c4091ccfb246f5cdbbe3f44b152d5d12933 https://git.kernel.org/stable/c/41f857033c44442a27f591fda8d986e7c9e42872 https://git.kernel.org/stable/c/9b26723e058faaf11b532fb4aa16d6849d581790 rh#2277799 |
CVE-2022-48662 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-48662 SMASH Issue 403419 bnc#1223505 bnc#1223521 https://git.kernel.org/stable/c/713fa3e4591f65f804bdc88e8648e219fabc9ee1 https://git.kernel.org/stable/c/d119888b09bd567e07c6b93a07f175df88857e02 https://git.kernel.org/stable/c/f799e0568d6c153368b177e0bbbde7dcc4ce7f1d rh#2277798 |
CVE-2022-48663 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48663 SMASH Issue 403420 bnc#1223523 https://git.kernel.org/stable/c/18352095a0d581f6aeb1e9fc9d68cc0152cd64b4 https://git.kernel.org/stable/c/af0bfabf06c74c260265c30ba81a34e7dec0e881 https://git.kernel.org/stable/c/b7df41a6f79dfb18ba2203f8c5f0e9c0b9b57f68 https://git.kernel.org/stable/c/bdea98b98f844bd8a983ca880893e509a8b4162f rh#2277797 |
CVE-2022-48665 | kernel-source-rt:Not affected | moderate | 6.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N) | CVE-2022-48665 SMASH Issue 403422 bnc#1223526 https://git.kernel.org/stable/c/17244f71765dfec39e84493993993e896c376d09 https://git.kernel.org/stable/c/2e9ceb6728f1dc2fa4b5d08f37d88cbc49a20a62 rh#2277794 |
CVE-2022-48666 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48666 SMASH Issue 403423 bnc#1223527 https://git.kernel.org/stable/c/2e7eb4c1e8af8385de22775bd0be552f59b28c9a https://git.kernel.org/stable/c/8fe4ce5836e932f5766317cb651c1ff2a4cd0506 rh#2277792 |
CVE-2022-48669 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48669 SMASH Issue 403805 bnc#1223756 https://git.kernel.org/stable/c/1699fb915b9f61794d559b55114c09a390aaf234 https://git.kernel.org/stable/c/7f7d39fe3d80d6143404940b2413010cf6527029 https://git.kernel.org/stable/c/a3f22feb2220a945d1c3282e34199e8bcdc5afc4 https://git.kernel.org/stable/c/cda9c0d556283e2d4adaa9960b2dc19b16156bae https://git.kernel.org/stable/c/d0647c3e81eff62b66d46fd4e475318cb8cb3610 rh#2278537 |
CVE-2022-48671 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48671 SMASH Issue 404289 bnc#1223929 https://git.kernel.org/stable/c/07191f984842d50020789ff14c75da436a7f46a9 https://git.kernel.org/stable/c/321488cfac7d0eb6d97de467015ff754f85813ff https://git.kernel.org/stable/c/43626dade36fa74d3329046f4ae2d7fdefe401c6 https://git.kernel.org/stable/c/5db17805b6ba4c34dab303f49aea3562fc25af75 https://git.kernel.org/stable/c/99bc25748e394d17f9e8b10cc7f273b8e64c1c7e https://git.kernel.org/stable/c/9f267393b036f1470fb12fb892d59e7ff8aeb58d rh#2278940 |
CVE-2022-48674 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-48674 SMASH Issue 404282 bnc#1223942 https://git.kernel.org/stable/c/2f44013e39984c127c6efedf70e6b5f4e9dcf315 https://git.kernel.org/stable/c/8ddd001cef5e82d19192e6861068463ecca5f556 https://git.kernel.org/stable/c/94c34faaafe7b55adc2d8d881db195b646959b9e rh#2278937 |
CVE-2022-48675 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48675 SMASH Issue 404291 bnc#1223894 https://git.kernel.org/stable/c/819110054b14d7272b4188db997a3d80f75ab785 https://git.kernel.org/stable/c/83c43fd872e32c8071d5582eb7c40f573a8342f3 https://git.kernel.org/stable/c/85eaeb5058f0f04dffb124c97c86b4f18db0b833 https://git.kernel.org/stable/c/e8de6cb5755eae7b793d8c00c8696c8667d44a7f rh#2278933 |
CVE-2022-48682 | fdupes:Ignore | moderate | () | CVE-2022-48682 SMASH Issue 334079 SMASH Issue 403211 bnc#1200381 https://github.com/adrianlopezroche/fdupes/blob/4b6bcde1b3eb1cebe87cd30814f7d6cf4ee46e95/fdupes.c https://github.com/adrianlopezroche/fdupes/commit/85680897148f1ac33b55418e00334116e419717f https://github.com/adrianlopezroche/fdupes/compare/v2.1.2...v2.2.0 rh#2277277 |
CVE-2022-48686 | kernel-source-rt:Ignore | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-48686 SMASH Issue 404293 bnc#1223948 bnc#1226337 https://git.kernel.org/stable/c/13c80a6c112467bab5e44d090767930555fc17a5 https://git.kernel.org/stable/c/160f3549a907a50e51a8518678ba2dcf2541abea https://git.kernel.org/stable/c/19816a0214684f70b49b25075ff8c402fdd611d3 https://git.kernel.org/stable/c/5914fa32ef1b7766fea933f9eed94ac5c00aa7ff https://git.kernel.org/stable/c/c3eb461aa56e6fa94fb80442ba2586bd223a8886 jsc#CAR-3447 rh#2278931 |
CVE-2022-48687 | kernel-source-rt:Already fixed | important | 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H) | CVE-2022-48687 SMASH Issue 404294 bnc#1223952 bnc#1224043 https://git.kernel.org/stable/c/076f2479fc5a15c4a970ca3b5e57d42ba09a31fa https://git.kernel.org/stable/c/3df71e11a4773d775c3633c44319f7acdb89011c https://git.kernel.org/stable/c/55195563ec29f80f984237b743de0e2b6ba4d093 https://git.kernel.org/stable/c/56ad3f475482bca55b0ae544031333018eb145b3 https://git.kernel.org/stable/c/84a53580c5d2138c7361c7c3eea5b31827e63b35 https://git.kernel.org/stable/c/dc9dbd65c803af1607484fed5da50d41dc8dd864 https://git.kernel.org/stable/c/f684c16971ed5e77dfa25a9ad25b5297e1f58eab rh#2278930 |
CVE-2022-48688 | kernel-source-rt:Ignore | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48688 SMASH Issue 404295 bnc#1223953 https://git.kernel.org/stable/c/2ed94383f3a2693dbf5bc47c514b42524bd8f9ae https://git.kernel.org/stable/c/342d77769a6cceb3df7720a1e18baa4339eee3fc https://git.kernel.org/stable/c/38af35bec59a8431a1eb29da994a0a45cba275d9 https://git.kernel.org/stable/c/5332a094514852d5e58c278cf4193adb937337fc https://git.kernel.org/stable/c/c49f320e2492738d478bc427dcd54ccfe0cba746 https://git.kernel.org/stable/c/fb8396aeda5872369a8ed6d2301e2c86e303c520 jsc#CAR-3448 rh#2278929 |
CVE-2022-48689 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48689 SMASH Issue 404296 bnc#1223959 https://git.kernel.org/stable/c/3261400639463a853ba2b3be8bd009c2a8089775 https://git.kernel.org/stable/c/6730c48ed6b0cd939fc9b30b2d621ce0b89bea83 https://git.kernel.org/stable/c/8527c9a6bf8e54fef0a8d3d7d8874a48c725c915 rh#2278932 |
CVE-2022-48690 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48690 SMASH Issue 404335 bnc#1223960 https://git.kernel.org/stable/c/07f40e9f0ff342eb3e97d5c544783b7cb641689c https://git.kernel.org/stable/c/7e753eb675f0523207b184558638ee2eed6c9ac2 rh#2279001 |
CVE-2022-48691 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48691 SMASH Issue 404297 bnc#1223961 https://git.kernel.org/stable/c/1ce55ec5cb7c573c983dffbe290b8d17caf1f157 https://git.kernel.org/stable/c/77972a36ecc4db7fc7c68f0e80714263c5f03f65 https://git.kernel.org/stable/c/910891a2a44cdc49efcc4fe7459c1085ba00d0f4 https://git.kernel.org/stable/c/94ed8eeb8d9aeb00e4f4e19b83a2e28b6442fbc5 rh#2278948 |
CVE-2022-48692 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48692 SMASH Issue 404298 bnc#1223962 https://git.kernel.org/stable/c/12f35199a2c0551187edbf8eb01379f0598659fa https://git.kernel.org/stable/c/a8edd49c94b4b08019ed7d6dd794fca8078a4deb https://git.kernel.org/stable/c/f022576aa03c2385ea7f2b27ee5b331e43abf624 https://git.kernel.org/stable/c/f2c70f56f762e5dc3b0d7dc438fbb137cb116413 rh#2278946 |
CVE-2022-48694 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48694 SMASH Issue 404300 bnc#1223964 https://git.kernel.org/stable/c/14d148401c5202fec3a071e24785481d540b22c3 https://git.kernel.org/stable/c/5becc531a3fa8da75158a8993f56cc3e0717716e https://git.kernel.org/stable/c/ead54ced6321099978d30d62dc49c282a6e70574 rh#2278943 |
CVE-2022-48696 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48696 SMASH Issue 404312 bnc#1223920 https://git.kernel.org/stable/c/15ff1f17847c19174b260bd7dd0de33edcebd45e https://git.kernel.org/stable/c/f5723cfc01932c7a8d5c78dbf7e067e537c91439 rh#2278959 |
CVE-2022-48699 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48699 SMASH Issue 404315 bnc#1223996 https://git.kernel.org/stable/c/0c32a93963e03c03e561d5a066eedad211880ba3 https://git.kernel.org/stable/c/26e9a1ded8923510e5529fbb28390b22228700c2 https://git.kernel.org/stable/c/c2e406596571659451f4b95e37ddfd5a8ef1d0dc rh#2278952 |
CVE-2022-48700 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2022-48700 SMASH Issue 404316 bnc#1223957 https://git.kernel.org/stable/c/5321908ef74fb593e0dbc8737d25038fc86c9986 https://git.kernel.org/stable/c/578d644edc7d2c1ff53f7e4d0a25da473deb4a03 https://git.kernel.org/stable/c/5d721bf222936f5cf3ee15ced53cc483ecef7e46 https://git.kernel.org/stable/c/873aefb376bbc0ed1dd2381ea1d6ec88106fdbd4 jsc#CAR-3450 rh#2278951 |
CVE-2022-48703 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48703 SMASH Issue 404319 bnc#1223924 https://git.kernel.org/stable/c/7931e28098a4c1a2a6802510b0cbe57546d2049d https://git.kernel.org/stable/c/dae42083b045a4ddf71c57cf350cb2412b5915c2 rh#2278960 |
CVE-2022-48705 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48705 SMASH Issue 404333 bnc#1223895 https://git.kernel.org/stable/c/f7f3001723e337568017e8617974f29bc8b2f595 https://git.kernel.org/stable/c/fa3fbe64037839f448dc569212bafc5a495d8219 rh#2278997 |
CVE-2022-48706 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L) | CVE-2022-48706 SMASH Issue 407153 bnc#1225524 https://git.kernel.org/stable/c/5d2cc32c1c10bd889125d2adc16a6bc3338dcd3e https://git.kernel.org/stable/c/6b04456e248761cf68f562f2fd7c04e591fcac94 rh#2282602 |
CVE-2022-48707 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48707 SMASH Issue 407007 bnc#1225519 https://git.kernel.org/stable/c/4fa4302d6dc7de7e8e74dc7405611a2efb4bf54b https://git.kernel.org/stable/c/a04c7d062b537ff787d00da95bdfe343260d4beb rh#2282601 |
CVE-2022-48709 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48709 SMASH Issue 407098 bnc#1225095 https://git.kernel.org/stable/c/47f4ff6f23f00f5501ff2d7054c1a37c170a7aa0 https://git.kernel.org/stable/c/4a606ce68426c88ff2563382b33cc34f3485fe57 rh#2282606 |
CVE-2022-48711 | kernel-source-rt:Already fixed | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-48711 SMASH Issue 411544 bnc#1226672 https://git.kernel.org/stable/c/175db196e45d6f0e6047eccd09c8ba55465eb131 https://git.kernel.org/stable/c/1f1788616157b0222b0c2153828b475d95e374a7 https://git.kernel.org/stable/c/3c7e5943553594f68bbc070683db6bb6f6e9e78e https://git.kernel.org/stable/c/59ff7514f8c56f166aadca49bcecfa028e0ad50f https://git.kernel.org/stable/c/9aa422ad326634b76309e8ff342c246800621216 https://git.kernel.org/stable/c/d692e3406e052dbf9f6d9da0cba36cb763272529 https://git.kernel.org/stable/c/f1af11edd08dd8376f7a84487cbb0ea8203e3a1d https://git.kernel.org/stable/c/fde4ddeadd099bf9fbb9ccbee8e1b5c20d530a2d rh#2293291 |
CVE-2022-48712 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L) | CVE-2022-48712 SMASH Issue 411545 bnc#1226673 https://git.kernel.org/stable/c/14aa3f49c7fc6424763f4323bfbc3a807b0727dc https://git.kernel.org/stable/c/1b6762ecdf3cf12113772427c904aa3c420a1802 https://git.kernel.org/stable/c/62e46e0ffc02daa8fcfc02f7a932cc8a19601b19 https://git.kernel.org/stable/c/cdce59a1549190b66f8e3fe465c2b2f714b98a94 rh#2293290 |
CVE-2022-48714 | kernel-source-rt:Not affected | low | 2.3 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L) | CVE-2022-48714 SMASH Issue 411548 bnc#1226622 https://git.kernel.org/stable/c/5e457aeab52a5947619e1f18047f4d2f3212b3eb https://git.kernel.org/stable/c/6304a613a97d6dcd49b93fbad31e9f39d1e138d6 https://git.kernel.org/stable/c/b293dcc473d22a62dc6d78de2b15e4f49515db56 https://git.kernel.org/stable/c/d578933f6226d5419af9306746efa1c693cbaf9c rh#2293288 |
CVE-2022-48716 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N) | CVE-2022-48716 SMASH Issue 411550 bnc#1226678 https://git.kernel.org/stable/c/9167f2712dc8c24964840a4d1e2ebf130e846b95 https://git.kernel.org/stable/c/aa7152f9f117b3e66b3c0d4158ca4c6d46ab229f https://git.kernel.org/stable/c/c5c1546a654f613e291a7c5d6f3660fc1eb6d0c7 rh#2293286 |
CVE-2022-48718 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48718 SMASH Issue 411553 bnc#1226616 https://git.kernel.org/stable/c/622c9a3a7868e1eeca39c55305ca3ebec4742b64 https://git.kernel.org/stable/c/6f9267e01cca749137349d8ffb0d0ebbadf567f4 https://git.kernel.org/stable/c/86a337bb803040e4401b87c974a7fb92efe3d0e1 rh#2293284 |
CVE-2022-48719 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48719 SMASH Issue 411554 bnc#1226682 https://git.kernel.org/stable/c/203a35ebb49cdce377416b0690215d3ce090d364 https://git.kernel.org/stable/c/4a81f6da9cb2d1ef911131a6fd8bd15cb61fc772 rh#2293283 |
CVE-2022-48720 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2022-48720 SMASH Issue 411555 bnc#1226683 https://git.kernel.org/stable/c/2e7f5b6ee1a7a2c628253a95b0a95b582901ef1b https://git.kernel.org/stable/c/8299be160aad8548071d080518712dec0df92bd5 https://git.kernel.org/stable/c/9cef24c8b76c1f6effe499d2f131807c90f7ce9a https://git.kernel.org/stable/c/e7a0b3a0806dae3cc81931f0e83055ca2ac6f455 rh#2293282 |
CVE-2022-48721 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48721 SMASH Issue 411556 bnc#1226685 https://git.kernel.org/stable/c/0ef6049f664941bc0f75828b3a61877635048b27 https://git.kernel.org/stable/c/341adeec9adad0874f29a0a1af35638207352a39 https://git.kernel.org/stable/c/504078fbe9dd570d685361b57784a6050bc40aaa rh#2293281 |
CVE-2022-48723 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48723 SMASH Issue 411558 bnc#1226617 https://git.kernel.org/stable/c/37c2c83ca4f1ef4b6908181ac98e18360af89b42 https://git.kernel.org/stable/c/447c3d4046d7b54052d07d8b27e15e6edea5662c https://git.kernel.org/stable/c/dd00b4f8f768d81c3788a8ac88fdb3d745e55ea3 https://git.kernel.org/stable/c/e895e067d73e154b1ebc84a124e00831e311d9b0 rh#2293279 |
CVE-2022-48725 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48725 SMASH Issue 411582 bnc#1226618 https://git.kernel.org/stable/c/2989ba9532babac66e79997ccff73c015b69700c https://git.kernel.org/stable/c/a75badebfdc0b3823054bedf112edb54d6357c75 https://git.kernel.org/stable/c/fa3b844a50845c817660146c27c0fc29b08d3116 rh#2293335 |
CVE-2022-48726 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-48726 SMASH Issue 411571 bnc#1226686 https://git.kernel.org/stable/c/2923948ffe0835f7114e948b35bcc42bc9b3baa1 https://git.kernel.org/stable/c/36e8169ec973359f671f9ec7213547059cae972e https://git.kernel.org/stable/c/75c610212b9f1756b9384911d3a2c347eee8031c https://git.kernel.org/stable/c/ee2477e8ccd3d978eeac0dc5a981b286d9bb7b0a rh#2293334 |
CVE-2022-48727 | kernel-source-rt:Not affected | moderate | 4.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L) | CVE-2022-48727 SMASH Issue 411590 bnc#1226690 https://git.kernel.org/stable/c/1c71dbc8a179d99dd9bb7e7fc1888db613cf85de https://git.kernel.org/stable/c/57e2986c3b25092691a6e3d6ee9168caf8978932 https://git.kernel.org/stable/c/e1e852746997500f1873f60b954da5f02cc2dba3 rh#2293333 |
CVE-2022-48728 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48728 SMASH Issue 411601 bnc#1226691 https://git.kernel.org/stable/c/1899c3cad265c4583658aed5293d02e8af84276b https://git.kernel.org/stable/c/4a9bd1e6780fc59f81466ec3489d5ad535a37190 https://git.kernel.org/stable/c/5f8f55b92edd621f056bdf09e572092849fabd83 https://git.kernel.org/stable/c/a3dd4d2682f2a796121609e5f3bbeb1243198c53 rh#2293332 |
CVE-2022-48729 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48729 SMASH Issue 411589 bnc#1226710 https://git.kernel.org/stable/c/1530d84fba1e459ba55f46aa42649b88773210e7 https://git.kernel.org/stable/c/8c83d39cc730378bbac64d67a551897b203a606e rh#2293331 |
CVE-2022-48730 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2022-48730 SMASH Issue 411572 bnc#1226713 https://git.kernel.org/stable/c/24f8e12d965b24f8aea762589e0e9fe2025c005e https://git.kernel.org/stable/c/5d40f1bdad3dd1a177f21a90ad4353c1ed40ba3a https://git.kernel.org/stable/c/92c4cfaee6872038563c5b6f2e8e613f9d84d47d https://git.kernel.org/stable/c/cc8f7940d9c2d45f67b3d1a2f2b7a829ca561bed rh#2293330 |
CVE-2022-48731 | kernel-source-rt:Not affected | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48731 SMASH Issue 411608 bnc#1226620 https://git.kernel.org/stable/c/352715593e81b917ce1b321e794549815b850134 https://git.kernel.org/stable/c/a5389c80992f0001ee505838fe6a8b20897ce96e https://git.kernel.org/stable/c/c10a0f877fe007021d70f9cada240f42adc2b5db https://git.kernel.org/stable/c/cebb0aceb21ad91429617a40e3a17444fabf1529 https://git.kernel.org/stable/c/d3533ee20e9a0e2e8f60384da7450d43d1c63d1a rh#2293328 |
CVE-2022-48735 | kernel-source-rt:Unsupported | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-48735 SMASH Issue 411578 bnc#1226719 https://git.kernel.org/stable/c/0e629052f013eeb61494d4df2f1f647c2a9aef47 https://git.kernel.org/stable/c/549f8ffc7b2f7561bea7f90930b6c5104318e87b https://git.kernel.org/stable/c/813e9f3e06d22e29872d4fd51b54992d89cf66c8 https://git.kernel.org/stable/c/a7de1002135cf94367748ffc695a29812d7633b5 rh#2293324 |
CVE-2022-48738 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48738 SMASH Issue 411567 bnc#1226674 https://git.kernel.org/stable/c/40f598698129b5ceaf31012f9501b775c7b6e57d https://git.kernel.org/stable/c/586ef863c94354a7e00e5ae5ef01443d1dc99bc7 https://git.kernel.org/stable/c/65a61b1f56f5386486757930069fbdce94af08bf https://git.kernel.org/stable/c/68fd718724284788fc5f379e0b7cac541429ece7 https://git.kernel.org/stable/c/817f7c9335ec01e0f5e8caffc4f1dcd5e458a4c0 https://git.kernel.org/stable/c/9e8895f1b3d4433f6d78aa6578e9db61ca6e6830 https://git.kernel.org/stable/c/a9394f21fba027147bf275b083c77955864c366a https://git.kernel.org/stable/c/bb72d2dda85564c66d909108ea6903937a41679d rh#2293321 |
CVE-2022-48739 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2022-48739 SMASH Issue 411546 bnc#1226675 https://git.kernel.org/stable/c/06feec6005c9d9500cd286ec440aabf8b2ddd94d https://git.kernel.org/stable/c/10007bd96b6c4c3cfaea9e76c311b06a07a5e260 https://git.kernel.org/stable/c/1552e66be325a21d7eff49f46013fb402165a0ac rh#2293320 |
CVE-2022-48740 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48740 SMASH Issue 411599 bnc#1226699 https://git.kernel.org/stable/c/186edf7e368c40d06cf727a1ad14698ea67b74ad https://git.kernel.org/stable/c/70caa32e6d81f45f0702070c0e4dfe945e92fbd7 https://git.kernel.org/stable/c/7ed9cbf7ac0d4ed86b356e1b944304ae9ee450d4 https://git.kernel.org/stable/c/f446089a268c8fc6908488e991d28a9b936293db rh#2293319 |
CVE-2022-48741 | kernel-source-rt:Not affected | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48741 SMASH Issue 411560 bnc#1226625 https://git.kernel.org/stable/c/4ee7e4a6c9b298da44029ed9ec8ed23ae49cc209 https://git.kernel.org/stable/c/9c7f8a35c5a83740c0e3ea540b6ad145c50d79aa https://git.kernel.org/stable/c/e6b678c1a3673de6a5d2f4e22bb725a086a0701a rh#2293318 |
CVE-2022-48745 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48745 SMASH Issue 411591 bnc#1226702 https://git.kernel.org/stable/c/2a038dd1d942f8fbc495c58fa592ff24af05f1c2 https://git.kernel.org/stable/c/3c5193a87b0fea090aa3f769d020337662d87b5e https://git.kernel.org/stable/c/502c37b033fab7cde3e95a570af4f073306be45e https://git.kernel.org/stable/c/f895ebeb44d09d02674cfdd0cfc2bf687603918c rh#2293314 |
CVE-2022-48746 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48746 SMASH Issue 411584 bnc#1226703 https://git.kernel.org/stable/c/4fad499d7fece448e7230d5e5b92f6d8a073e0bb https://git.kernel.org/stable/c/a01ee1b8165f4161459b5ec4e728bc7130fe8cd4 https://git.kernel.org/stable/c/ec41332e02bd0acf1f24206867bb6a02f5877a62 https://git.kernel.org/stable/c/fe70126da6063c29ca161cdec7ad1dae9af836b3 rh#2293313 |
CVE-2022-48747 | kernel-source-rt:Not affected | moderate | 5.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H) | CVE-2022-48747 SMASH Issue 411602 bnc#1226643 https://git.kernel.org/stable/c/3ee859e384d453d6ac68bfd5971f630d9fa46ad3 https://git.kernel.org/stable/c/4633a79ff8bc82770486a063a08b55e5162521d8 https://git.kernel.org/stable/c/6cbf4c731d7812518cd857c2cfc3da9fd120f6ae https://git.kernel.org/stable/c/941d5180c430ce5b0f7a3622ef9b76077bfa3d82 https://git.kernel.org/stable/c/b63e120189fd92aff00096d11e2fc5253f60248b rh#2293312 |
CVE-2022-48748 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L) | CVE-2022-48748 SMASH Issue 411593 bnc#1226647 https://git.kernel.org/stable/c/14be8d448fca6fe7b2a413831eedd55aef6c6511 https://git.kernel.org/stable/c/446ff1fc37c74093e81db40811a07b5a19f1d797 https://git.kernel.org/stable/c/c5e216e880fa6f2cd9d4a6541269377657163098 https://git.kernel.org/stable/c/fd20d9738395cf8e27d0a17eba34169699fccdff rh#2293311 |
CVE-2022-48749 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48749 SMASH Issue 411600 bnc#1226650 https://git.kernel.org/stable/c/170b22234d5495f5e0844246e23f004639ee89ba https://git.kernel.org/stable/c/1ebc18836d5df09061657f8c548e594cbb519476 https://git.kernel.org/stable/c/8f069f6dde518dfebe86e848508c07e497bd9298 https://git.kernel.org/stable/c/93a6e920d8ccb4df846c03b6e72f7e08843d294c rh#2293310 |
CVE-2022-48750 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48750 SMASH Issue 411566 bnc#1226651 https://git.kernel.org/stable/c/79da533d3cc717ccc05ddbd3190da8a72bc2408b https://git.kernel.org/stable/c/cfb7d12f2e4a4d694f49e9b4ebb352f7b67cdfbb rh#2293309 |
CVE-2022-48752 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48752 SMASH Issue 411583 bnc#1226709 https://git.kernel.org/stable/c/28aaed966e76807a71de79dd40a8eee9042374dd https://git.kernel.org/stable/c/55402a4618721f350a9ab660bb42717d8aa18e7c https://git.kernel.org/stable/c/fa4ad064a6bd49208221df5e62adf27b426d1720 https://git.kernel.org/stable/c/fb6433b48a178d4672cb26632454ee0b21056eaa rh#2293306 |
CVE-2022-48753 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48753 SMASH Issue 411594 bnc#1226693 https://git.kernel.org/stable/c/83114df32ae779df57e0af99a8ba6c3968b2ba3d https://git.kernel.org/stable/c/fe4214a07e0b53d2af711f57519e33739c5df23f rh#2293305 |
CVE-2022-48761 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48761 SMASH Issue 411598 bnc#1226701 https://git.kernel.org/stable/c/20c51a4c52208f98e27308c456a1951778f41fa5 https://git.kernel.org/stable/c/8b05ad29acb972850ad795fa850e814b2e758b83 https://git.kernel.org/stable/c/9df478463d9feb90dae24f183383961cf123a0ec https://git.kernel.org/stable/c/d5755832a1e47f5d8773f0776e211ecd4e02da72 rh#2293375 |
CVE-2022-48762 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48762 SMASH Issue 411573 bnc#1226707 https://git.kernel.org/stable/c/3758a6c74e08bdc15ccccd6872a6ad37d165239a https://git.kernel.org/stable/c/47fe7a1c5e3e011eeb4ab79f2d54a794fdd1c3eb rh#2293373 |
CVE-2022-48763 | kernel-source-rt:Not affected | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48763 SMASH Issue 411587 bnc#1226628 https://git.kernel.org/stable/c/080dbe7e9b86a0392d8dffc00d9971792afc121f https://git.kernel.org/stable/c/b4c0d89c92e957ecccce12e66b63875d0cc7af7e https://git.kernel.org/stable/c/e302786233e6bc512986d007c96458ccf5ca21c7 https://git.kernel.org/stable/c/f7e570780efc5cec9b2ed1e0472a7da14e864fdb rh#2293372 |
CVE-2022-48764 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48764 SMASH Issue 411607 bnc#1226700 https://git.kernel.org/stable/c/811f95ff95270e6048197821434d9301e3d7f07c https://git.kernel.org/stable/c/b9ee734a14bb685b2088f2176d82b34cb4e30dbc rh#2293345 |
CVE-2022-48765 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48765 SMASH Issue 411603 bnc#1226697 https://git.kernel.org/stable/c/35fe7cfbab2e81f1afb23fc4212210b1de6d9633 https://git.kernel.org/stable/c/54b3439c8e70e0bcfea59aeef9dd98908cbbf655 https://git.kernel.org/stable/c/ce55f63f6cea4cab8ae9212f73285648a5baa30d rh#2293344 |
CVE-2022-48766 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48766 SMASH Issue 411580 bnc#1226704 https://git.kernel.org/stable/c/25f1488bdbba63415239ff301fe61a8546140d9f https://git.kernel.org/stable/c/456ba2433844a6483cc4c933aa8f43d24575e341 rh#2293343 |
CVE-2022-48767 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48767 SMASH Issue 411604 bnc#1226715 https://git.kernel.org/stable/c/36d433ae3242aa714176378850e6d1a5a3e78f18 https://git.kernel.org/stable/c/932a9b5870d38b87ba0a9923c804b1af7d3605b9 https://git.kernel.org/stable/c/a0c22e970cd78b81c94691e6cb09713e8074d580 https://git.kernel.org/stable/c/e7be12ca7d3947765b0d7c1c7e0537e748da993a rh#2293342 |
CVE-2022-48768 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48768 SMASH Issue 411585 bnc#1226720 https://git.kernel.org/stable/c/8a8878ebb596281f50fc0b9a6e1f23f0d7f154e8 https://git.kernel.org/stable/c/d71b06aa995007eafd247626d0669b9364c42ad7 https://git.kernel.org/stable/c/df86e2fe808c3536a9dba353cc2bebdfea00d0cf https://git.kernel.org/stable/c/e33fa4a46ee22de88a700e2e3d033da8214a5175 https://git.kernel.org/stable/c/e629e7b525a179e29d53463d992bdee759c950fb rh#2293341 |
CVE-2022-48770 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-48770 SMASH Issue 411605 bnc#1226730 https://git.kernel.org/stable/c/0bcd484587b3b3092e448d27dc369e347e1810c3 https://git.kernel.org/stable/c/b82ef4985a6d05e80f604624332430351df7b79a https://git.kernel.org/stable/c/b992f01e66150fc5e90be4a96f5eb8e634c8249e https://git.kernel.org/stable/c/ff6bdc205fd0a83bd365405d4e31fb5905826996 rh#2293338 |
CVE-2022-48771 | kernel-source-rt:Already fixed | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-48771 SMASH Issue 411581 bnc#1226732 https://git.kernel.org/stable/c/0008a0c78fc33a84e2212a7c04e6b21a36ca6f4d https://git.kernel.org/stable/c/1d833b27fb708d6fdf5de9f6b3a8be4bd4321565 https://git.kernel.org/stable/c/6066977961fc6f437bc064f628cf9b0e4571c56c https://git.kernel.org/stable/c/84b1259fe36ae0915f3d6ddcea6377779de48b82 https://git.kernel.org/stable/c/a0f90c8815706981c483a652a6aefca51a5e191c https://git.kernel.org/stable/c/ae2b20f27732fe92055d9e7b350abc5cdf3e2414 https://git.kernel.org/stable/c/e8d092a62449dcfc73517ca43963d2b8f44d0516 rh#2293337 |
CVE-2022-4899 | zstd:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2022-4899 Oracle:CVE-2022-4899 SMASH Issue 360632 bnc#1209533 https://github.com/facebook/zstd/issues/3200 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/ https://security.netapp.com/advisory/ntap-20230725-0005/ rh#2179864 |
CVE-2022-4904 | c-ares:Released | moderate | 6.9 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L) | CVE-2022-4904 RHSA-2023:1533 RHSA-2023:1582 RHSA-2023:1742 RHSA-2023:1743 RHSA-2023:1744 RHSA-2023:2654 RHSA-2023:2655 RHSA-2023:4035 RHSA-2023:5533 SMASH Issue 356508 SMASH Issue 356565 bnc#1208067 https://github.com/c-ares/c-ares/issues/496 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33LDNS6RPOPP36Z4MPWXALUQZXJCWJS2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33LDNS6RPOPP36Z4MPWXALUQZXJCWJS2/ https://security.gentoo.org/glsa/202401-02 jsc#CAR-2350 rh#2168631 |
CVE-2022-4967 | strongswan:Not affected | low | () | CVE-2022-4967 SMASH Issue 403518 SMASH Issue 403519 bnc#1223543 https://github.com/strongswan/strongswan/commit/e4b4aabc4996fc61c37deab7858d07bc4d220136 https://security.netapp.com/advisory/ntap-20240614-0006/ https://www.strongswan.org/blog/2024/05/13/strongswan-vulnerability-(cve-2022-4967).html rh#2280412 |
CVE-2023-0030 | kernel-source-rt:Not affected | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-0030 L3:67931 SMASH Issue 352485 bnc#1206777 https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10 https://security.netapp.com/advisory/ntap-20230413-0010/ jsc#CAR-2258 rh#2157270 |
CVE-2023-0045 | kernel-source-rt:Released | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2023-0045 D:CVE-2023-0045 OSS:2023/Q1/81 SMASH Issue 356072 bnc#1207773 https://git.kernel.org/tip/a664ec9158eeddd75121d39c9a0758016097fa96 https://github.com/google/security-research/security/advisories/GHSA-9x5g-vmxf-4qj8 https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html https://security.netapp.com/advisory/ntap-20230714-0001/ jsc#CAR-2336 rh#2167288 |
CVE-2023-0047 | kernel-source-rt:Ignore | moderate | 5.9 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H) | CVE-2023-0047 SMASH Issue 352707 bnc#1206896 jsc#CAR-2269 rh#2144910 |
CVE-2023-0049 | vim:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N) | CONFIRM:huntr.dev:/bounties/5e6f325c-ba54-4bf0-b050-dca048fd3fd9 CVE-2023-0049 FEDORA:FEDORA-2023-0f6a9433cf FEDORA:FEDORA-2023-208f2107d5 MISC:github.com:/vim/vim/commit/7b17eb4b063a234376c1ec909ee293e42cff290c SMASH Issue 352728 bnc#1206866 http://seclists.org/fulldisclosure/2023/Mar/17 https://security.gentoo.org/glsa/202305-16 https://support.apple.com/kb/HT213670 jsc#CAR-2267 rh#2158269 |
CVE-2023-0051 | vim:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N) | CONFIRM:huntr.dev:/bounties/1c8686db-baa6-42dc-ba45-aed322802de9 CVE-2023-0051 MISC:github.com:/vim/vim/commit/c32949b0779106ed5710ae3bffc5053e49083ab4 SMASH Issue 352715 bnc#1206867 http://seclists.org/fulldisclosure/2023/Mar/17 https://security.gentoo.org/glsa/202305-16 https://support.apple.com/kb/HT213670 jsc#CAR-2266 rh#2161348 |
CVE-2023-0054 | vim:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N) | CONFIRM:huntr.dev:/bounties/b289ee0f-fd16-4147-bd01-c6289c45e49d CVE-2023-0054 MISC:github.com:/vim/vim/commit/3ac1d97a1d9353490493d30088256360435f7731 SMASH Issue 352710 bnc#1206868 http://seclists.org/fulldisclosure/2023/Mar/17 https://lists.debian.org/debian-lts-announce/2023/06/msg00015.html https://security.gentoo.org/glsa/202305-16 https://support.apple.com/kb/HT213670 jsc#CAR-2265 rh#2161349 |
CVE-2023-0122 | kernel-source-rt:Not affected | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-0122 MISC:git.kernel.org:/pub/scm/linux/kernel/git/torvalds/linux.git/commit/ MISC:github.com:OSS:2023/01/18/1 OSS:2023/01/18/1 OSS:2023/Q1/16 SMASH Issue 353113 bnc#1207050 https://security.netapp.com/advisory/ntap-20230302-0002/ rh#2157927 |
CVE-2023-0179 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2022-1015 CVE-2023-0179 DSA-5324 L3:65449 L3:66739 OSS:2023/01/13/2 OSS:2023/02/23/1 OSS:2023/Q1/20 RHSA-2023:0951 RHSA-2023:0979 RHSA-2023:1008 RHSA-2023:1202 RHSA-2023:1203 RHSA-2023:1435 SMASH Issue 353368 SMASH Issue 353369 bnc#1207034 bnc#1207139 http://packetstormsecurity.com/files/171601/Kernel-Live-Patch-Security-Notice-LNS-0093-1.html https://security.netapp.com/advisory/ntap-20230511-0003/ linux.git:commit:696e1a48b1a1b01edad542a1ef293665864a4dd0 rh#2065323 rh#2161713 |
CVE-2023-0210 | kernel-source-rt:Not affected | important | () | CVE-2023-0210 OSS:2023/01/04/1 OSS:2023/01/11/1 OSS:2023/Q1/15 SMASH Issue 351900 SMASH Issue 353357 bnc#1206707 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=797805d81baa814f76cf7bdab35f86408a79d707 https://github.com/cifsd-team/ksmbd/commit/8824b7af409f51f1316e92e9887c2fd48c0b26d6 https://security.netapp.com/advisory/ntap-20230517-0002/ https://securityonline.info/cve-2023-0210-flaw-in-linux-kernel-allows-unauthenticated-remote-dos-attacks/ rh#2163499 |
CVE-2023-0215 | openssl:Not affected, openssl-1_1:Released | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-0215 D:CVE-2023-0215 DSA-5343 L3:66264 L3:68186 OSS:2023/Q1/129 Oracle:CVE-2023-0215 RHSA-2023:0946 RHSA-2023:1199 RHSA-2023:1405 RHSA-2023:2165 RHSA-2023:2932 RHSA-2023:3354 RHSA-2023:3355 RHSA-2023:3408 RHSA-2023:3420 RHSA-2023:3421 RHSA-2023:4128 SMASH Issue 354989 SMASH Issue 354990 bdo#1023424 bnc#1207536 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8818064ce3c3c0f1b740a5aaba2a987e75bfbafd https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9816136fe31d92ace4037d5da5257f763aeeb4eb https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=c3829dd8825c654652201e16f8a0a0c46ee3f344 https://security.gentoo.org/glsa/202402-08 https://security.netapp.com/advisory/ntap-20230427-0007/ https://security.netapp.com/advisory/ntap-20230427-0009/ https://security.netapp.com/advisory/ntap-20240621-0006/ https://www.openssl.org/news/secadv/20230207.txt jsc#CAR-2341 openssl.git:commit:c400a1fe477b44a5eacbad2be8d50f2eaa92925c rh#2164492 |
CVE-2023-0216 | openssl:Not affected, openssl-1_1:Not affected | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-0216 RHSA-2023:0946 RHSA-2023:1199 SMASH Issue 354993 SMASH Issue 354994 bnc#1207539 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=934a04f0e775309cadbef0aa6b9692e1b12a76c6 https://security.gentoo.org/glsa/202402-08 https://www.openssl.org/news/secadv/20230207.txt openssl.git:commit:80253dbdc92bec584f4a9866b43f8674156d838a rh#2164497 |
CVE-2023-0217 | openssl:Not affected, openssl-1_1:Not affected | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-0217 RHSA-2023:0946 RHSA-2023:1199 SMASH Issue 354995 SMASH Issue 354996 bnc#1207540 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=23985bac83fd50c8e29431009302b5442f985096 https://security.gentoo.org/glsa/202402-08 https://www.openssl.org/news/secadv/20230207.txt openssl.git:commit:a9e6100bc98439ca787aa1fce541550ad1ff3e84 openssl.git:commit:bcec03c33cc00a7b5eb89ebeeee59e604570a86a rh#2164499 |
CVE-2023-0240 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-0240 MISC:git.kernel.org:/pub/scm/linux/kernel/git/stable/linux.git/commit/io_uring MISC:github.com:/gregkh/linux/commit/1e6fa5216a0e59ef02e8b6b40d553238a3b81d49 MISC:kernel.dance:/ SMASH Issue 355667 bnc#1216818 rh#2165852 |
CVE-2023-0266 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-0266 DSA-5324 L3:65871 L3:65876 L3:66505 MISC:git.kernel.org:/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-5.10/alsa-pcm-move-rwsem-lock-inside-snd_ctl_elem_read-to-prevent-uaf.patch MISC:github.com:/torvalds/linux/commit/becf9e5d553c2389d857a3c178ce80fdb34a02e1 RHSA-2023:1202 RHSA-2023:1203 RHSA-2023:1435 RHSA-2023:1469 RHSA-2023:1470 RHSA-2023:1471 RHSA-2023:1554 RHSA-2023:1556 RHSA-2023:1557 RHSA-2023:1559 RHSA-2023:1560 RHSA-2023:1566 RHSA-2023:1584 RHSA-2023:1588 RHSA-2023:1590 RHSA-2023:1659 RHSA-2023:1660 RHSA-2023:1662 RHSA-2023:1666 RHSA-2023:1677 SMASH Issue 353695 SMASH Issue 353696 bnc#1207134 bnc#1207190 bnc#1209477 https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html jsc#CAR-2319 linux.git:commit:56b88b50565cd8b946a2d00b0c83927b7ebb055e rh#2163379 |
CVE-2023-0286 | openssl:Not affected, openssl-1_1:Released | important | 7.4 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H) | CVE-2023-0286 DSA-5343 L3:65311 L3:65809 L3:65887 L3:66264 L3:66545 L3:67378 L3:67470 L3:68205 RHSA-2023:0946 RHSA-2023:1199 RHSA-2023:1335 RHSA-2023:1405 RHSA-2023:1437 RHSA-2023:1438 RHSA-2023:1439 RHSA-2023:1440 RHSA-2023:1441 RHSA-2023:2022 RHSA-2023:2165 RHSA-2023:2932 RHSA-2023:3354 RHSA-2023:3355 RHSA-2023:3420 RHSA-2023:3421 RHSA-2023:4124 RHSA-2023:4128 RHSA-2023:4252 RHSA-2023:5209 SMASH Issue 354983 SMASH Issue 354984 bdo#1023424 bnc#1207533 bnc#1207569 bnc#1208677 https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.6.2-relnotes.txt https://ftp.openbsd.org/pub/OpenBSD/patches/7.2/common/018_x509.patch.sig https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c6c9d439b484e1ba9830d8454a34fa4f80fdfe9 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2f7530077e0ef79d98718138716bc51ca0cad658 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fd2af07dc083a350c959147097003a14a5e8ac4d https://security.gentoo.org/glsa/202402-08 https://www.openssl.org/news/secadv/20230207.txt jsc#CAR-2359 openssl.git:commit:399c2da08ab9c6a382f8e9950742a022e847fec0 openssl.git:commit:7880536fe17c2b5450e279155bedd51771d28c9f rh#2164440 |
CVE-2023-0288 | vim:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N) | CONFIRM:huntr.dev:/bounties/550a0852-9be0-4abe-906c-f803b34e41d3 CVE-2023-0288 FEDORA:FEDORA-2023-340f1d6ab9 MISC:github.com:/vim/vim/commit/232bdaaca98c34a99ffadf27bf6ee08be6cc8f6a SMASH Issue 353711 bnc#1207162 http://seclists.org/fulldisclosure/2023/Mar/17 https://support.apple.com/kb/HT213670 jsc#CAR-2293 rh#2163130 |
CVE-2023-0361 | gnutls:Released | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N) | CVE-2023-0361 DSA-5349 Oracle:CVE-2023-0361 RHSA-2023:1141 RHSA-2023:1200 RHSA-2023:1569 RHSA-2023:3361 SMASH Issue 356679 bnc#1208143 https://access.redhat.com/security/cve/CVE-2023-0361 https://github.com/tlsfuzzer/tlsfuzzer/pull/679 https://gitlab.com/gnutls/gnutls/-/issues/1050 https://lists.debian.org/debian-lts-announce/2023/02/msg00015.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFIA3X4IZ3CW7SRQ2UHNHNPMRIAWF2FI/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WS4KVDOG6QTALWHC2QE4Y7VPDRMLTRWQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z634YBXAJ5VLDI62IOPBVP5K6YFHAWCY/ https://security.netapp.com/advisory/ntap-20230324-0005/ https://security.netapp.com/advisory/ntap-20230725-0005/ jsc#CAR-2362 rh#2162596 |
CVE-2023-0386 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-0386 DSA-5402 RHSA-2023:1554 RHSA-2023:1566 RHSA-2023:1584 RHSA-2023:1659 RHSA-2023:1660 RHSA-2023:1677 RHSA-2023:1681 RHSA-2023:1691 RHSA-2023:1703 RHSA-2023:1970 RHSA-2023:1980 RHSA-2023:1984 SMASH Issue 360808 bnc#1209615 bnc#1210499 http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4f11ada10d0a https://lists.debian.org/debian-lts-announce/2023/06/msg00008.html https://security.netapp.com/advisory/ntap-20230420-0004/ https://www.debian.org/security/2023/dsa-5402 jsc#CAR-2468 rh#2159505 |
CVE-2023-0394 | kernel-source-rt:Released | moderate | 6.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-0394 DSA-5324 L3:66496 L3:67104 MISC:git.kernel.org:/pub/scm/linux/kernel/git/torvalds/linux.git/commit/ OSS:2023/Q1/41 RHSA-2023:2148 RHSA-2023:2458 RHSA-2023:2736 RHSA-2023:2951 SMASH Issue 353826 SMASH Issue 354210 bnc#1207168 bnc#1207187 https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html https://security.netapp.com/advisory/ntap-20230302-0005/ jsc#CAR-2320 rh#2162120 |
CVE-2023-0401 | openssl:Not affected, openssl-1_1:Not affected | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-0401 RHSA-2023:0946 RHSA-2023:1199 SMASH Issue 354997 SMASH Issue 354998 bnc#1207541 bnc#1210509 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=d3b6dfd70db844c4499bec6ad6601623a565e674 https://security.gentoo.org/glsa/202402-08 https://www.openssl.org/news/secadv/20230207.txt openssl.git:commit:6eebe6c0238178356114a96a7858f36b24172847 rh#2164500 |
CVE-2023-0433 | vim:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CONFIRM:huntr.dev:/bounties/ae933869-a1ec-402a-bbea-d51764c6618e CVE-2023-0433 D:CVE-2023-0433 MISC:github.com:/vim/vim/commit/11977f917506d950b7e0cae558bd9189260b253b SMASH Issue 354510 bnc#1207396 http://seclists.org/fulldisclosure/2023/Mar/17 http://seclists.org/fulldisclosure/2023/Mar/18 http://seclists.org/fulldisclosure/2023/Mar/21 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EX6N2DB75A73MQGVW3CS4VTNPAYVM2M/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PZWIJBSQX53P7DHV77KRXJIXA4GH7XHC/ https://support.apple.com/kb/HT213670 https://support.apple.com/kb/HT213675 https://support.apple.com/kb/HT213677 jsc#CAR-2322 rh#2163612 |
CVE-2023-0458 | kernel-source-rt:Not affected | moderate | 5.3 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2023-0458 RHSA-2023:4377 RHSA-2023:4378 RHSA-2023:4801 RHSA-2023:4814 SMASH Issue 364554 bnc#1210905 https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/diff/kernel/sys.c?id=v6.1.8&id2=v6.1.7 https://github.com/torvalds/linux/commit/739790605705ddcf18f21782b9c99ad7d53a8c11 https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html rh#2193219 |
CVE-2023-0459 | kernel-source-rt:Released | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2023-0459 L3:66852 RHSA-2022:1975 RHSA-2022:1988 SMASH Issue 367485 bnc#1211738 https://github.com/torvalds/linux/commit/4b842e4e25b12951fa10dedb4bc16bc47e3b850c https://github.com/torvalds/linux/commit/74e19ef0ff8061ef55957c3abd71614ef0f42f47 jsc#CAR-2653 rh#2216383 |
CVE-2023-0461 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-0461 L3:65394 L3:65952 RHSA-2023:1556 RHSA-2023:1557 RHSA-2023:1662 RHSA-2023:1841 RHSA-2023:1923 RHSA-2023:2148 RHSA-2023:2458 RHSA-2023:2736 RHSA-2023:2951 RHSA-2023:3190 RHSA-2023:3191 RHSA-2023:3465 RHSA-2023:3470 RHSA-2023:3490 RHSA-2023:3491 RHSA-2023:4125 RHSA-2023:4126 RHSA-2023:4146 SMASH Issue 358681 bnc#1208787 bnc#1208911 bnc#1209072 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2c02d41d71f90a5168391b6a5f2954112ba2307c https://kernel.dance/#2c02d41d71f90a5168391b6a5f2954112ba2307c https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html jsc#CAR-2395 rh#2176192 |
CVE-2023-0464 | openssl:Not affected, openssl-1_1:Ignore | moderate | 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | CVE-2023-0464 CVE-2023-0466 D:CVE-2023-0464 DSA-5417 L3:65602 L3:65615 L3:65958 L3:66080 L3:68186 MISC:www.couchbase.com:/alerts/ OSS:2023/09/28/4 OSS:2023/Q1/187 Oracle:CVE-2023-0464 RHSA-2023:3722 SMASH Issue 360932 bdo#1034720 bnc#1209624 bnc#1209987 bnc#1210039 bnc#1211881 bnc#1212330 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2017771e2db3e2b96f89bbe8766c3209f6a99545 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2dcd4f1e3115f38cefa43e3efbe9b801c27e642e https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=51e8a84ce742db0f6c70510d0159dad8f7825908 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=879f7080d7e141f415c79eaa3a8ac4a3dad0348b https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=959c59c7a0164117e7f8366466a32bb1f8d77ff1 https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html https://security.gentoo.org/glsa/202402-08 https://security.netapp.com/advisory/ntap-20240621-0006/ https://www.debian.org/security/2023/dsa-5417 https://www.openssl.org/news/secadv/20230322.txt jsc#CAR-2469 openssl.git:commit:3a81370f75b832102e9969533a25ca53fe0b254e openssl.git:commit:591feddc61f113827883ad8bae05109ee01ccd41 openssl.git:commit:5ab3f71a33cb0140fc29ae9244cd4f8331c2f3a5 openssl.git:commit:986f9a674d49d1e13459e04bd721237c721c44f4 openssl.git:commit:a4e726428608e352283d745cb0716248d29ecf26 openssl.git:commit:e4142ec43bcc08ffdb090580e24c24a7da302a32 rh#2181082 rh#2182561 rh#2182565 |
CVE-2023-0465 | openssl:Ignore, openssl-1_1:Ignore | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N) | CVE-2023-0465 CVE-2023-0466 DSA-5417 L3:65958 L3:66081 L3:66706 OSS:2023/09/28/4 OSS:2023/Q1/202 RHSA-2023:3722 SMASH Issue 361662 bdo#1034720 bnc#1209878 bnc#1210513 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=10325176f3d3e98c6e2b3bf5ab1e3b334de6947a https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1dd43e0709fece299b15208f36cc7c76209ba0bb https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=51e8a84ce742db0f6c70510d0159dad8f7825908 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=b013765abfa80036dc779dd0e50602c57bb3bf95 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=facfb1ab745646e97a1920977ae4a9965ea61d5c https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html https://security.gentoo.org/glsa/202402-08 https://security.netapp.com/advisory/ntap-20230414-0001/ https://www.debian.org/security/2023/dsa-5417 https://www.openssl.org/news/secadv/20230328.txt openssl.git:commit:591feddc61f113827883ad8bae05109ee01ccd41 openssl.git:commit:5ab3f71a33cb0140fc29ae9244cd4f8331c2f3a5 openssl.git:commit:986f9a674d49d1e13459e04bd721237c721c44f4 openssl.git:commit:a4e726428608e352283d745cb0716248d29ecf26 openssl.git:commit:e4142ec43bcc08ffdb090580e24c24a7da302a32 rh#2182561 rh#2182565 |
CVE-2023-0466 | openssl:Not affected, openssl-1_1:Ignore | moderate | 2 (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N) | BID:92988 CONFIRM:github.com:CVE-2016-7420 CVE-2016-7420 CVE-2023-0464 CVE-2023-0465 CVE-2023-0466 CVE-2023-4863 CVE-2023-4900 CVE-2023-4901 CVE-2023-4902 CVE-2023-4903 CVE-2023-4904 CVE-2023-4905 CVE-2023-4906 CVE-2023-4907 CVE-2023-4908 CVE-2023-4909 CVE-2023-5129 D:CVE-2016-7420 D:CVE-2023-0464 DSA-5417 DSA-5496 DSA-5497 DSA-5497-2 DSA-5498 DSA-5499 L3:65602 L3:65615 L3:65958 L3:66080 L3:66081 L3:66082 L3:66706 L3:66814 L3:67108 L3:67109 L3:68186 MISC:bugs.chromium.org:OSS:2023/09/22/6 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:github.com:OSS:2023/09/21/4 MISC:github.com:OSS:2023/09/22/1 MISC:www.couchbase.com:/alerts/ MISC:www.openwall.com MLIST:[oss-security] 20160915 Re: Does a documentation bug elevate to CVE status? - Crypto++ OSS:2016/Q3/520 OSS:2016/Q3/527 OSS:2016/Q3/559 OSS:2016/Q3/600 OSS:2023/09/21/4 OSS:2023/09/22/1 OSS:2023/09/22/3 OSS:2023/09/22/4 OSS:2023/09/22/5 OSS:2023/09/22/6 OSS:2023/09/22/7 OSS:2023/09/22/8 OSS:2023/09/26/1 OSS:2023/09/26/7 OSS:2023/09/28/1 OSS:2023/09/28/2 OSS:2023/09/28/4 OSS:2023/Q1/187 OSS:2023/Q1/202 OSS:2023/Q3/204 Oracle:CVE-2023-0464 RHSA-2023:3722 RHSA-2023:5183 RHSA-2023:5184 RHSA-2023:5185 RHSA-2023:5186 RHSA-2023:5187 RHSA-2023:5188 RHSA-2023:5189 RHSA-2023:5190 RHSA-2023:5191 RHSA-2023:5192 RHSA-2023:5197 RHSA-2023:5198 RHSA-2023:5200 RHSA-2023:5201 RHSA-2023:5202 RHSA-2023:5204 RHSA-2023:5205 RHSA-2023:5214 RHSA-2023:5222 RHSA-2023:5223 RHSA-2023:5224 RHSA-2023:5236 RHSA-2023:5309 SMASH Issue 172679 SMASH Issue 360932 SMASH Issue 361662 SMASH Issue 361666 SMASH Issue 377966 SMASH Issue 379829 UBUNTU:CVE-2016-7420 bdo#1034720 bdo#1042111 bnc#1008266 bnc#1209624 bnc#1209873 bnc#1209878 bnc#1209987 bnc#1210039 bnc#1210513 bnc#1211881 bnc#1212330 bnc#1212332 bnc#1215231 bnc#1215245 bnc#1215279 bnc#1215347 bnc#1215349 bnc#1215453 bnc#1215715 https://adamcaudill.com/2023/09/14/whose-cve-is-it-anyway/ https://blog.isosceles.com/the-webp-0day/ https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_12.html https://chromium.googlesource.com/webm/libwebp/+/2af26267cdfcb63a88e5c74a85927a12d6ca1d76 https://chromium.googlesource.com/webm/libwebp/+/902bc9190331343b2017211debcec8d2ab87e17a https://crbug.com/1430867 https://crbug.com/1441228 https://crbug.com/1446709 https://crbug.com/1449874 https://crbug.com/1451543 https://crbug.com/1453501 https://crbug.com/1454515 https://crbug.com/1459281 https://crbug.com/1462104 https://crbug.com/1463293 https://crbug.com/1479274 https://en.bandisoft.com/honeyview/history/ https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=0d16b7e99aafc0b4a6d729eec65a411a7e025f0a https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=10325176f3d3e98c6e2b3bf5ab1e3b334de6947a https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1dd43e0709fece299b15208f36cc7c76209ba0bb https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2017771e2db3e2b96f89bbe8766c3209f6a99545 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2dcd4f1e3115f38cefa43e3efbe9b801c27e642e https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=51e8a84ce742db0f6c70510d0159dad8f7825908 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=73398dea26de9899fb4baa94098ad0a61f435c72 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=879f7080d7e141f415c79eaa3a8ac4a3dad0348b https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=959c59c7a0164117e7f8366466a32bb1f8d77ff1 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=b013765abfa80036dc779dd0e50602c57bb3bf95 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=facfb1ab745646e97a1920977ae4a9965ea61d5c https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fc814a30fc4f0bc54fcea7d9a7462f5457aab061 https://github.com/webmproject/libwebp/commit/902bc9190331343b2017211debcec8d2ab87e17a https://github.com/webmproject/libwebp/releases/tag/v1.3.2 https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html https://lists.debian.org/debian-lts-announce/2023/09/msg00015.html https://lists.debian.org/debian-lts-announce/2023/09/msg00016.html https://lists.debian.org/debian-lts-announce/2023/09/msg00017.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FYYKLG6CRGEDTNRBSU26EEWAO6D6U645/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZDGWWMJREPAGKWCJKSCM4WYLANSKIFX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PYZV7TMKF4QHZ54SFJX54BDN52VHGGCX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHOLML7N2G5KCAZXFWC5IDFFHSQS5SDB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/ https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4863 https://news.ycombinator.com/item?id=37478403 https://security-tracker.debian.org/tracker/CVE-2023-4863 https://security.gentoo.org/glsa/202309-05 https://security.gentoo.org/glsa/202401-10 https://security.gentoo.org/glsa/202401-34 https://security.gentoo.org/glsa/202402-08 https://security.netapp.com/advisory/ntap-20230414-0001/ https://security.netapp.com/advisory/ntap-20230929-0011/ https://security.netapp.com/advisory/ntap-20240621-0006/ https://sethmlarson.dev/security-developer-in-residence-weekly-report-16 https://stackdiary.com/critical-vulnerability-in-webp-codec-cve-2023-4863/ https://www.bentley.com/advisories/be-2023-0001/ https://www.bleepingcomputer.com/news/google/google-fixes-another-chrome-zero-day-bug-exploited-in-attacks/ https://www.debian.org/security/2023/dsa-5417 https://www.debian.org/security/2023/dsa-5496 https://www.debian.org/security/2023/dsa-5497 https://www.debian.org/security/2023/dsa-5498 https://www.debian.org/security/2023/dsa-5499 https://www.mozilla.org/en-US/security/advisories/mfsa2023-40/ https://www.openssl.org/news/secadv/20230322.txt https://www.openssl.org/news/secadv/20230328.txt jsc#CAR-2469 jsc#CAR-2478 openssl.git:commit:3a81370f75b832102e9969533a25ca53fe0b254e openssl.git:commit:591feddc61f113827883ad8bae05109ee01ccd41 openssl.git:commit:5ab3f71a33cb0140fc29ae9244cd4f8331c2f3a5 openssl.git:commit:986f9a674d49d1e13459e04bd721237c721c44f4 openssl.git:commit:a4e726428608e352283d745cb0716248d29ecf26 openssl.git:commit:e4142ec43bcc08ffdb090580e24c24a7da302a32 rh#1376696 rh#2181082 rh#2182561 rh#2182565 rh#2238431 rh#2238821 rh#2238822 rh#2240759 |
CVE-2023-0468 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-0468 SMASH Issue 354948 bnc#1207511 rh#2164024 |
CVE-2023-0469 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-0469 D:CVE-2023-2236 SMASH Issue 354947 bnc#1207521 bnc#1210990 rh#2163723 rh#2196759 |
CVE-2023-0512 | vim:Released | important | 7.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H) | CONFIRM:huntr.dev:/bounties/de83736a-1936-4872-830b-f1e9b0ad2a74 CVE-2023-0512 L3:65231 L3:65312 L3:65540 L3:65672 MISC:github.com:/vim/vim/commit/870219c58c0804bdc55419b2e455c06ac715a835 SMASH Issue 355679 bnc#1207780 bnc#1208349 bnc#1208678 bnc#1209706 http://seclists.org/fulldisclosure/2023/Mar/17 http://seclists.org/fulldisclosure/2023/Mar/18 http://seclists.org/fulldisclosure/2023/Mar/21 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IE44W6WMMREYCW3GJHPSYP7NK2VT5NY6/ https://support.apple.com/kb/HT213670 https://support.apple.com/kb/HT213675 https://support.apple.com/kb/HT213677 jsc#CAR-2328 rh#2165798 |
CVE-2023-0590 | kernel-source-rt:Released | important | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-0590 CVE-2023-23454 CVE-2023-23455 DSA-5324 L3:65098 L3:65173 L3:65176 L3:65185 L3:65224 L3:65237 L3:65449 L3:65869 L3:65871 L3:65876 L3:65879 L3:65952 L3:66496 L3:67104 MISC:git.kernel.org:/pub/scm/linux/kernel/git/torvalds/linux.git/commit/ OSS:2023/01/10/1 OSS:2023/01/10/4 RHSA-2023:2148 RHSA-2023:2458 RHSA-2023:2736 RHSA-2023:2951 RHSA-2023:5627 SMASH Issue 353573 SMASH Issue 355766 bnc#1207036 bnc#1207125 bnc#1207188 bnc#1207189 bnc#1207657 bnc#1207795 bnc#1207822 bnc#1208342 bnc#1208355 https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html https://lore.kernel.org/all/20221018203258.2793282-1-edumazet%40google.com/ https://lore.kernel.org/all/20221018203258.2793282-1-edumazet@google.com/ jsc#CAR-2288 jsc#CAR-2292 jsc#CAR-2329 rh#2150953 rh#2150979 rh#2165741 rh#2168297 rh#2168332 |
CVE-2023-0597 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2023-0597 OSS:2023/07/28/1 SMASH Issue 355950 bnc#1207845 https://git.kernel.org/linus/97e3d26b5e5f371b3ee223d94dd123e6c442ba80 jsc#CAR-2337 rh#2165926 rh#2217523 |
CVE-2023-0615 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-0615 SMASH Issue 355892 bnc#1207844 rh#2166287 |
CVE-2023-0634 | shadow:Not affected | important | 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H) | CVE-2023-0634 MISC:access.redhat.com:/security/cve/CVE-2023-0634 MISC:codeql.github.com:/codeql-query-help/cpp/cpp-uncontrolled-process-operation/ MISC:github.com:/shadow-maint/shadow/pull/642 SMASH Issue 355966 bnc#1207857 rh#2166544 |
CVE-2023-0687 | glibc:Not affected | low | 0 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N) | CVE-2023-0687 D:CVE-2023-0687 L3:65252 MISC:patchwork.sourceware.org:/project/glibc/patch/20230204114138.5436-1-leo@yuriev.ru/ MISC:sourceware.org:/bugzilla/show_bug.cgi MISC:vuldb.com:/ SMASH Issue 356308 bnc#1207975 bnc#1208409 https://patchwork.sourceware.org/project/glibc/patch/20230204114138.5436-1-leo%40yuriev.ru/ jsc#CAR-2335 rh#2167610 |
CVE-2023-0767 | mozilla-nss:Released | important | 8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-0767 DSA-5350 DSA-5353 DSA-5355 L3:66270 L3:66422 L3:66594 L3:67380 L3:67467 L3:68187 RHSA-2023:1252 RHSA-2023:1332 RHSA-2023:1365 RHSA-2023:1366 RHSA-2023:1368 RHSA-2023:1369 RHSA-2023:1370 RHSA-2023:1406 RHSA-2023:1436 RHSA-2023:1479 RHSA-2023:1677 SMASH Issue 356669 SMASH Issue 356670 bnc#1208138 https://alas.aws.amazon.com/AL2/ALAS-2023-1992.html https://bugzilla.mozilla.org/show_bug.cgi?id=1804640 https://www.mozilla.org/security/advisories/mfsa2023-05/ https://www.mozilla.org/security/advisories/mfsa2023-06/ https://www.mozilla.org/security/advisories/mfsa2023-07/ jsc#CAR-2378 rh#2170377 |
CVE-2023-1032 | kernel-source-rt:Not affected | moderate | () | CVE-2023-1032 OSS:2023/03/13/2 OSS:2023/Q1/140 SMASH Issue 359911 bnc#1209240 https://ubuntu.com/security/notices/USN-5977-1 https://ubuntu.com/security/notices/USN-6024-1 https://ubuntu.com/security/notices/USN-6033-1 rh#2179153 |
CVE-2023-1073 | kernel-source-rt:Released | moderate | 6.3 (CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-1073 MISC:git.kernel.org:OSS:2023/11/05/1 OSS:2023/01/17/3 OSS:2023/01/18/3 OSS:2023/11/05/2 OSS:2023/11/05/3 SMASH Issue 352501 SMASH Issue 358571 bnc#1206784 https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/id=b12fece4c64857e5fab4290bf01b2e0317a88456 https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html https://www.openwall.com/lists/osssecurity/2023/01/17/3 jsc#CAR-2353 jsc#PED-568 rh#2173403 |
CVE-2023-1074 | kernel-source-rt:Released | important | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-1074 OSS:2023/01/23/1 OSS:2023/11/05/4 SMASH Issue 351709 SMASH Issue 358573 bnc#1206677 https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=458e279f861d3f61796894cd158b780765a1569f https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html jsc#CAR-2351 rh#2173430 |
CVE-2023-1075 | kernel-source-rt:Ignore | low | 2.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N) | CVE-2023-1075 D:CVE-2023-1075 OSS:2023/Q1/125 SMASH Issue 358069 SMASH Issue 358576 bnc#1208598 https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=ffe2a22562444720b05bdfeb999c03e810d84cbb jsc#CAR-2401 rh#2173434 |
CVE-2023-1076 | kernel-source-rt:Released | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2023-1076 D:CVE-2023-1076 DSA-5480 DSA-5492 OSS:2023/Q1/124 SMASH Issue 358070 SMASH Issue 358635 bnc#1208599 https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=66b2c338adce580dfce2199591e65e2bab889cff https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=a096ccca6e503a5c575717ff8a36ace27510ab0a https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html jsc#CAR-2402 linux.git:commit:5c9241f3ceab3257abe2923a59950db0dc8bb737 linux.git:commit:666c135b2d859a00ee74c8645b2affacfae45421 linux.git:commit:9bc3047374d5bec163e83e743709e23753376f0c rh#2173435 rh#2229498 |
CVE-2023-1077 | kernel-source-rt:Released | important | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:/advisory/ntap-20230113-0008/ CVE-2022-45919 CVE-2023-1077 CVE-2023-3159 D:CVE-2022-45919 DSA-5480 DSA-5492 L3:65449 L3:66178 L3:66431 L3:66432 L3:66463 L3:66491 L3:66496 L3:66505 L3:66852 L3:67104 MISC:lore.kernel.org:CVE-2022-45919 OSS:2023/Q1/126 SMASH Issue 358071 SMASH Issue 358634 ZDI-24-593 bnc#1205803 bnc#1208600 bnc#1208839 bnc#1208912 bnc#1212128 bnc#1212347 bnc#1212744 bnc#1213937 bnc#1214100 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=280a8ab81733da8bc442253c700a52c4c0886ffd https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=7c4a5b89a0b5a57a64b601775b296abf77a9fe97 https://github.com/torvalds/linux/commit/b7c81f80246fac44077166f3e07103affe6db8ff https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html https://lore.kernel.org/linux-media/20221121063308.GA33821%40ubuntu/T/#u https://security.netapp.com/advisory/ntap-20230511-0002/ jsc#CAR-2403 jsc#CAR-2670 jsc#CAR-2698 linux.git:commit:3e337087c3b5805fe0b8a46ba622a962880b5d64 rh#2150999 rh#2151956 rh#2173436 rh#2179000 rh#2187773 rh#2187931 rh#2192671 rh#2213414 rh#2218672 rh#2226780 |
CVE-2023-1078 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-1078 MISC:git.kernel.org:OSS:2023/11/05/1 MISC:www.openwall.com:OSS:2023/11/05/1 OSS:2023/01/17/3 OSS:2023/01/18/3 OSS:2023/01/23/1 OSS:2023/11/05/1 SMASH Issue 358072 SMASH Issue 358633 bnc#1208601 bnc#1208603 bnc#1208838 https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=458e279f861d3f61796894cd158b780765a1569f https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=4ab3a086d10eeec1424f2e8a968827a6336203df https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=66b2c338adce580dfce2199591e65e2bab889cff https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=7c4a5b89a0b5a57a64b601775b296abf77a9fe97 https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=a096ccca6e503a5c575717ff8a36ace27510ab0a https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=f753a68980cf4b59a80fe677619da2b1804f526d https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=ffe2a22562444720b05bdfeb999c03e810d84cbb https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html https://security.netapp.com/advisory/ntap-20230505-0004/ jsc#CAR-2404 rh#2173440 |
CVE-2023-1079 | kernel-source-rt:Ignore | moderate | 6.3 (CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-1079 MISC:git.kernel.org:OSS:2023/11/05/1 MISC:www.openwall.com:OSS:2023/11/05/1 OSS:2023/01/17/3 OSS:2023/01/18/3 OSS:2023/01/23/1 OSS:2023/11/05/1 OSS:2023/Q1/123 SMASH Issue 358077 SMASH Issue 358632 bnc#1208604 https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=458e279f861d3f61796894cd158b780765a1569f https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=4ab3a086d10eeec1424f2e8a968827a6336203df https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=66b2c338adce580dfce2199591e65e2bab889cff https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=7c4a5b89a0b5a57a64b601775b296abf77a9fe97 https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=a096ccca6e503a5c575717ff8a36ace27510ab0a https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=f753a68980cf4b59a80fe677619da2b1804f526d https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=ffe2a22562444720b05bdfeb999c03e810d84cbb https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html jsc#CAR-2406 rh#2173444 |
CVE-2023-1095 | kernel-source-rt:Released | moderate | 5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-1095 L3:65524 RHSA-2022:7933 RHSA-2022:8267 RHSA-2023:2736 RHSA-2023:2951 RHSA-2023:5627 RHSA-2023:5628 SMASH Issue 358675 bnc#1208777 bnc#1209647 https://github.com/torvalds/linux/commit/580077855a40741cf511766129702d97ff02f4d9 jsc#CAR-2394 rh#2173973 |
CVE-2023-1118 | kernel-source-rt:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-1118 L3:65449 L3:65683 L3:65869 L3:65871 L3:65876 L3:65879 L3:66431 L3:66432 OSS:2023/Q1/128 SMASH Issue 358916 bnc#1208837 bnc#1208910 bnc#1211486 bnc#1211491 https://github.com/torvalds/linux/commit/29b0589a865b6f66d141d79b2dd1373e4e50fe17 https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html https://security.netapp.com/advisory/ntap-20230413-0003/ jsc#CAR-2405 linux.git:commit:56b88b50565cd8b946a2d00b0c83927b7ebb055e rh#2163379 rh#2165741 rh#2174400 rh#2178212 rh#2181847 rh#2182443 |
CVE-2023-1127 | vim:Released | moderate | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CVE-2023-1127 D:CVE-2023-1127 SMASH Issue 358957 bnc#1208828 https://github.com/vim/vim/commit/e0f869196930ef5f25a0ac41c9215b09c9ce2d3c https://huntr.dev/bounties/2d4d309e-4c96-415f-9070-36d0815f1beb https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IE44W6WMMREYCW3GJHPSYP7NK2VT5NY6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PDVN5HSWPNVP4QXBPCEGZDLZKURLJWTE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJ6TMKKBXHGVUHWFGM4X46VIJO7ZAG2W/ jsc#CAR-2400 rh#2174662 |
CVE-2023-1170 | vim:Released | moderate | 5.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) | CVE-2023-1170 SMASH Issue 359176 bnc#1208959 https://github.com/vim/vim/commit/1c73b65229c25e3c1fd8824ba958f7cc4d604f9c https://huntr.dev/bounties/286e0090-e654-46d2-ac60-29f81799d0a4 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIAKPMKJ4OZ6NYRZJO7YWMNQL2BICLYV/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IE44W6WMMREYCW3GJHPSYP7NK2VT5NY6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4KDAU76Z7QNSPKZX2JAJ6O7KIEOXWTL/ rh#2176462 |
CVE-2023-1175 | vim:Released | moderate | 5.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) | CVE-2023-1175 D:CVE-2023-1175 SMASH Issue 359192 bnc#1208957 https://github.com/vim/vim/commit/c99cbf8f289bdda5d4a77d7ec415850a520330ba https://huntr.dev/bounties/7e93fc17-92eb-4ae7-b01a-93bb460b643e https://lists.debian.org/debian-lts-announce/2023/06/msg00015.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIAKPMKJ4OZ6NYRZJO7YWMNQL2BICLYV/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IE44W6WMMREYCW3GJHPSYP7NK2VT5NY6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4KDAU76Z7QNSPKZX2JAJ6O7KIEOXWTL/ rh#2176457 |
CVE-2023-1192 | kernel-source-rt:Released | moderate | 6.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-1192 CVE-2023-52572 SMASH Issue 359331 bnc#1208995 https://access.redhat.com/security/cve/CVE-2023-1192 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d527f51331cace562393a8038d870b3e9916686f https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=98bea253aa28ad8be2ce565a9ca21beb4a9419e5 https://git.kernel.org/stable/c/76569e3819e0bb59fc19b1b8688b017e627c268a https://git.kernel.org/stable/c/908b3b5e97d25e879de3d1f172a255665491c2c3 https://git.kernel.org/stable/c/d527f51331cace562393a8038d870b3e9916686f jsc#CAR-2708 rh#2154178 rh#2267746 |
CVE-2023-1193 | kernel-source-rt:Not affected | moderate | () | CVE-2023-1193 SMASH Issue 359262 bnc#1208972 https://access.redhat.com/security/cve/CVE-2023-1193 https://lkml.kernel.org/linux-cifs/20230401084951.6085-2-linkinjeon@kernel.org/T/ rh#2154177 |
CVE-2023-1194 | kernel-source-rt:Not affected | important | 7.1 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H) | CVE-2023-1194 SMASH Issue 359254 bnc#1208968 https://access.redhat.com/security/cve/CVE-2023-1194 https://security.netapp.com/advisory/ntap-20231221-0006/ https://www.spinics.net/lists/stable-commits/msg303065.html rh#2154176 |
CVE-2023-1195 | kernel-source-rt:Released | low | 2.2 (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L) | CVE-2023-1195 D:CVE-2023-1195 RHSA-2023:2148 RHSA-2023:2458 RHSA-2023:2736 RHSA-2023:2951 SMASH Issue 359253 bnc#1208971 https://github.com/torvalds/linux/commit/153695d36ead0ccc4d0256953c751cabf673e621 rh#2154171 |
CVE-2023-1206 | kernel-source-rt:Released | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-1206 D:CVE-2023-1206 DSA-5480 DSA-5492 L3:67651 RHSA-2023:5603 RHSA-2023:5604 RHSA-2023:5627 SMASH Issue 370454 bnc#1212703 https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html https://security.netapp.com/advisory/ntap-20230929-0006/ https://www.debian.org/security/2023/dsa-5480 https://www.debian.org/security/2023/dsa-5492 jsc#CAR-2722 rh#2175903 |
CVE-2023-1249 | kernel-source-rt:Released | moderate | 5.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H) | CVE-2023-1249 SMASH Issue 359384 bnc#1209039 http://packetstormsecurity.com/files/171912/CentOS-Stream-9-Missing-Kernel-Security-Fix.html https://patchwork.kernel.org/project/linux-fsdevel/patch/87iltzn3nd.fsf_-_@email.froward.int.ebiederm.org/ jsc#CAR-2418 rh#2169719 |
CVE-2023-1252 | kernel-source-rt:Not affected | moderate | 5.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H) | CVE-2023-1252 SMASH Issue 359385 bnc#1209045 https://lore.kernel.org/lkml/20211115165433.449951285@linuxfoundation.org/ https://security.netapp.com/advisory/ntap-20230505-0005/ rh#2176140 |
CVE-2023-1255 | openssl:Not affected, openssl-1_1:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-1255 D:CVE-2023-1255 OSS:2023/04/20/13 OSS:2023/Q2/86 RHSA-2023:3722 SMASH Issue 364125 bnc#1210714 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=02ac9c9420275868472f33b01def01218742b8bb https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=bc2f61ad70971869b242fc1cb445b98bad50074a https://security.netapp.com/advisory/ntap-20230908-0006/ https://www.openssl.org/news/secadv/20230419.txt openssl.git:commit:72dfe46550ee1f1bbfacd49f071419365bc23304 openssl.git:commit:e6990079c2413625d2039ebed49ea17a5b8cf935 rh#2188461 |
CVE-2023-1264 | vim:Unsupported | moderate | 5.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) | CVE-2023-1264 SMASH Issue 359479 bnc#1209042 https://github.com/vim/vim/commit/7ac5023a5f1a37baafbe1043645f97ba3443d9f6 https://huntr.dev/bounties/b2989095-88f3-413a-9a39-c1c58a6e6815 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIAKPMKJ4OZ6NYRZJO7YWMNQL2BICLYV/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IE44W6WMMREYCW3GJHPSYP7NK2VT5NY6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4KDAU76Z7QNSPKZX2JAJ6O7KIEOXWTL/ rh#2176413 |
CVE-2023-1281 | kernel-source-rt:Already fixed | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-1281 L3:65564 L3:65683 L3:65871 L3:65876 L3:65952 OSS:2023/04/11/3 OSS:2023/Q2/14 RHSA-2023:3852 RHSA-2023:3853 RHSA-2023:4125 RHSA-2023:4126 RHSA-2023:4130 RHSA-2023:4145 RHSA-2023:4146 RHSA-2023:4255 RHSA-2023:4256 RHSA-2023:4262 RHSA-2023:4517 RHSA-2023:4531 RHSA-2023:4541 SMASH Issue 360924 bnc#1209634 bnc#1209683 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee059170b1f7e94e55fa6cadee544e176a6e59c2 https://kernel.dance/#ee059170b1f7e94e55fa6cadee544e176a6e59c2 https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html https://security.netapp.com/advisory/ntap-20230427-0004/ jsc#CAR-2471 rh#2181847 |
CVE-2023-1295 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-1295 SMASH Issue 370718 bnc#1212836 https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=788d0824269bef539fe31a785b1517882eafed93 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9eac1904d3364254d622bf2c771c4f85cd435fc2 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b5dba59e0cf7e2cc4d3b3b1ac5fe81ddf21959eb https://kernel.dance/788d0824269bef539fe31a785b1517882eafed93 https://kernel.dance/9eac1904d3364254d622bf2c771c4f85cd435fc2 https://security.netapp.com/advisory/ntap-20230731-0006/ rh#2218350 |
CVE-2023-1355 | vim:Already fixed | moderate | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CVE-2023-1355 D:CVE-2023-1355 SMASH Issue 359814 bnc#1209187 https://github.com/vim/vim/commit/d13dd30240e32071210f55b587182ff48757ea46 https://huntr.dev/bounties/4d0a9615-d438-4f5c-8dd6-aa22f4b716d9 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IE44W6WMMREYCW3GJHPSYP7NK2VT5NY6/ jsc#CAR-2425 rh#2179911 |
CVE-2023-1380 | kernel-source-rt:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) | CVE-2023-1380 DSA-5480 OSS:2023/03/14/1 OSS:2023/Q1/141 SMASH Issue 359978 bnc#1209287 http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html https://lore.kernel.org/linux-wireless/20230309104457.22628-1-jisoo.jang%40yonsei.ac.kr/T/#u https://lore.kernel.org/linux-wireless/20230309104457.22628-1-jisoo.jang@yonsei.ac.kr/T/#u https://security.netapp.com/advisory/ntap-20230511-0001/ https://www.debian.org/security/2023/dsa-5480 jsc#CAR-2440 rh#2177883 |
CVE-2023-1382 | kernel-source-rt:Released | moderate | 6.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-1382 D:CVE-2023-1382 RHSA-2023:2148 RHSA-2023:2458 SMASH Issue 359983 bnc#1209288 https://lore.kernel.org/netdev/bc7bd3183f1c275c820690fc65b708238fe9e38e.1668807842.git.lucien.xin@gmail.com/T/#u jsc#CAR-2441 rh#2177371 |
CVE-2023-1390 | kernel-source-rt:Ignore | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-1390 L3:65871 L3:65876 L3:65879 L3:65968 RHSA-2021:1578 RHSA-2021:1739 RHSA-2023:3190 RHSA-2023:3191 RHSA-2023:4125 RHSA-2023:4126 RHSA-2023:4146 SMASH Issue 360010 bnc#1209289 bnc#1210779 https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5 https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6 https://infosec.exchange/@_mattata/109427999461122360 https://security.netapp.com/advisory/ntap-20230420-0001/ jsc#CAR-2442 rh#2178212 |
CVE-2023-1476 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-1476 RHSA-2023:1659 SMASH Issue 360545 bnc#1209476 https://access.redhat.com/errata/RHSA-2023:1659 https://access.redhat.com/security/cve/CVE-2023-1476 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=97113eb39fa7972722ff490b947d8af023e1f6a2 rh#2138818 rh#2176035 |
CVE-2023-1513 | kernel-source-rt:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2023-1513 SMASH Issue 360634 bnc#1209532 https://github.com/torvalds/linux/commit/2c10b61421a28e95a46ab489fd56c0f442ff6952 https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html https://lore.kernel.org/kvm/20230214103304.3689213-1-gregkh@linuxfoundation.org/ jsc#CAR-2464 rh#2179892 |
CVE-2023-1579 | binutils:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CVE-2023-1579 D:CVE-2023-1579 L3:65664 L3:66386 L3:66735 SMASH Issue 360828 bnc#1209642 bnc#1210293 https://security.gentoo.org/glsa/202309-15 https://security.netapp.com/advisory/ntap-20230511-0009/ https://sourceware.org/bugzilla/show_bug.cgi?id=29988 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=11d171f1910b508a81d21faa087ad1af573407d8 rh#2180905 |
CVE-2023-1582 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-1582 RHSA-2023:2736 RHSA-2023:2951 SMASH Issue 360934 bnc#1209636 https://lore.kernel.org/linux-mm/Yg6ac8WlwtnDH6M0@kroah.com/ rh#2180936 |
CVE-2023-1583 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-1583 D:CVE-2023-1583 SMASH Issue 360961 bnc#1209637 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=02a4d923e4400a36d340ea12d8058f69ebf3a383 https://git.kernel.org/pub/scm/linux/kernel/git/axboe/linux-block.git/commit/?h=io_uring-6.3&id=761efd55a0227aca3a69deacdaa112fffd44fe37 rh#2180970 |
CVE-2023-1611 | kernel-source-rt:Already fixed | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-1611 D:CVE-2023-1611 SMASH Issue 361101 bnc#1209687 https://github.com/torvalds/linux/commit/2f1a6be12ab6c8470d5776e68644726c94257c54 https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5QCM6XO4HSPLGR3DFYWFRIA3GCBIHZR4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZWECAZ7V7EPSXMINO6Q6KWNKDY2CO6ZW/ https://lore.kernel.org/linux-btrfs/35b9a70650ea947387cf352914a8774b4f7e8a6f.1679481128.git.fdmanana@suse.com/ jsc#CAR-2688 rh#2181342 |
CVE-2023-1637 | kernel-source-rt:Analysis | moderate | 4.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L) | CVE-2023-1637 RHSA-2023:4789 RHSA-2023:5069 RHSA-2023:5091 RHSA-2023:5628 SMASH Issue 361373 bnc#1209779 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e2a1256b17b16f9b9adf1b6fea56819e7b68e463 https://sourceware.org/bugzilla/show_bug.cgi?id=27398 rh#2181891 |
CVE-2023-1652 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-1652 D:CVE-2023-1652 SMASH Issue 361418 bnc#1209788 bnc#1209797 https://access.redhat.com/security/cve/cve-2023-1652 https://security.netapp.com/advisory/ntap-20230511-0006/ rh#2182031 |
CVE-2023-1670 | kernel-source-rt:Released | moderate | 4.4 (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H) | CVE-2023-1670 D:CVE-2023-1670 L3:67931 SMASH Issue 361652 bnc#1209871 https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html https://lore.kernel.org/all/20230316161526.1568982-1-zyytlz.wz@163.com/ https://security.netapp.com/advisory/ntap-20230526-0010/ jsc#CAR-2477 rh#2182111 |
CVE-2023-1801 | tcpdump:Not affected | moderate | () | CVE-2023-1801 SMASH Issue 362808 SMASH Issue 362821 bnc#1210265 https://github.com/the-tcpdump-group/tcpdump/commit/03c037bbd75588beba3ee09f26d17783d21e30bc https://github.com/the-tcpdump-group/tcpdump/commit/7578e1c04ee280dda50c4c2813e7d55f539c6501 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOA2BJFERAC3VRQIRHJOWN4HZY4ZA7CH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYL5DEVHRJYF2CM5LTCZKEYFYDZAIZSN/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLLZCG23MU6O4QOG2CX3DLEL3YXP6LAI/ https://support.apple.com/kb/HT213844 https://support.apple.com/kb/HT213845 rh#2185498 |
CVE-2023-1829 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-1829 D:CVE-2023-1829 L3:67174 L3:67191 L3:67760 OSS:2023/04/11/3 OSS:2023/Q2/14 RHSA-2023:4515 RHSA-2023:4516 RHSA-2023:4517 RHSA-2023:4531 RHSA-2023:4541 RHSA-2023:4789 RHSA-2023:4888 RHSA-2023:4961 RHSA-2023:4962 RHSA-2023:4967 SMASH Issue 363207 ZDI-23-898 bnc#1210335 bnc#1210619 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c710f75256bb3cf05ac7b1672c82b92c43f3d28 https://kernel.dance/#8c710f75256bb3cf05ac7b1672c82b92c43f3d28 https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html https://security.netapp.com/advisory/ntap-20230601-0001/ jsc#CAR-2805 rh#2181847 rh#2188470 |
CVE-2023-1838 | kernel-source-rt:Analysis | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-1838 SMASH Issue 362333 bnc#1210203 https://lore.kernel.org/netdev/20220516084213.26854-1-jasowang%40redhat.com/T/ https://lore.kernel.org/netdev/20220516084213.26854-1-jasowang@redhat.com/T/ https://security.netapp.com/advisory/ntap-20230517-0003/ rh#2087568 |
CVE-2023-1855 | kernel-source-rt:Analysis | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-1855 SMASH Issue 362390 bnc#1210202 https://github.com/torvalds/linux/commit/cb090e64cf25602b9adaf32d5dfc9c8bec493cd1 https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html https://lore.kernel.org/all/20230318122758.2140868-1-linux@roeck-us.net/ rh#2184578 |
CVE-2023-1859 | kernel-source-rt:Released | low | 1.9 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L) | CVE-2023-1859 L3:66738 SMASH Issue 362393 bnc#1210169 bnc#1215206 https://lore.kernel.org/all/20230313090002.3308025-1-zyytlz.wz@163.com/ jsc#CAR-2504 rh#2184395 |
CVE-2023-1872 | kernel-source-rt:Already fixed | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-1872 SMASH Issue 363238 bnc#1210414 bnc#1210417 http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.10.y&id=08681391b84da27133deefaaddefd0acfa90c2be https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.10.y&id=da24142b1ef9fd5d36b76e36bab328a5b27523e8 https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html https://security.netapp.com/advisory/ntap-20230601-0002/ jsc#CAR-2528 rh#2186621 |
CVE-2023-1972 | binutils:Analysis | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CVE-2023-1972 SMASH Issue 362910 bnc#1210297 https://security.gentoo.org/glsa/202309-15 https://sourceware.org/bugzilla/show_bug.cgi?id=30285 rh#2185646 |
CVE-2023-1989 | kernel-source-rt:Already fixed | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-1989 DSA-5492 L3:65968 L3:66431 L3:66432 L3:66491 L3:66496 L3:66505 L3:67104 SMASH Issue 363047 bnc#1210336 bnc#1210500 https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=f132c2d13088 https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html https://security.netapp.com/advisory/ntap-20230601-0004/ https://www.debian.org/security/2023/dsa-5492 jsc#CAR-2677 jsc#CAR-2678 rh#2185945 |
CVE-2023-1990 | kernel-source-rt:Already fixed | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-1990 L3:65564 L3:65763 L3:66491 L3:66496 L3:66505 L3:67104 SMASH Issue 363075 bnc#1209853 bnc#1210337 bnc#1210501 bnc#1210896 https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html https://lore.kernel.org/all/20230312160837.2040857-1-zyytlz.wz@163.com/ jsc#CAR-2542 rh#2156322 rh#2181847 rh#2182443 rh#2183247 rh#2187773 |
CVE-2023-1998 | kernel-source-rt:Not affected | moderate | 5.6 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N) | CVE-2023-1998 RHSA-2023:4377 RHSA-2023:4378 RHSA-2023:5603 RHSA-2023:5604 SMASH Issue 363668 SMASH Issue 363669 bnc#1210506 https://github.com/google/security-research/security/advisories/GHSA-mj4w-6495-6crx https://github.com/torvalds/linux/commit/6921ed9049bc7457f66c1596c5b78aec0dae4a9d https://kernel.dance/#6921ed9049bc7457f66c1596c5b78aec0dae4a9d https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html rh#2187257 |
CVE-2023-2002 | kernel-source-rt:Not affected | moderate | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | BID:46878 BID:47185 BID:50663 BID:53965 BID:55361 BID:62042 BID:62044 BID:62049 BID:62050 BID:63889 BID:64952 BID:64953 BID:64954 BID:65459 BID:65943 BID:66095 BID:67906 BID:68048 BID:68126 BID:68157 BID:68176 BID:68214 BID:68224 BID:68881 BID:69214 BID:69216 BID:69396 BID:69428 BID:69489 BID:69763 BID:69768 BID:69770 BID:69779 BID:69781 BID:69799 BID:70314 BID:70319 BID:70691 BID:70742 BID:70747 BID:70749 BID:70766 BID:70883 BID:70965 BID:71078 BID:71081 BID:71363 BID:71650 BID:71684 BID:72061 BID:72320 BID:72322 BID:72324 BID:72607 BID:74951 BID:74963 BID:74964 BID:75001 BUGTRAQ:20110317 [PRE-SA-2011-02] Information disclosure vulnerability in the OSF partition handling code of the Linux kernel BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console CONFIRM:bugs.launchpad.net:CVE-2014-8134 CONFIRM:bugzilla.novell.com:CVE-2014-8134 CONFIRM:code.google.com:CVE-2014-4611 CONFIRM:downloads.avaya.com:CVE-2011-1763 CONFIRM:ftp.osuosl.org:CVE-2011-4914 CONFIRM:ftp.osuosl.org:CVE-2012-4444 CONFIRM:git.busybox.net:CVE-2014-9645 CONFIRM:git.kernel.org:CVE-2010-5313 CONFIRM:git.kernel.org:CVE-2011-1090 CONFIRM:git.kernel.org:CVE-2011-1163 CONFIRM:git.kernel.org:CVE-2011-1476 CONFIRM:git.kernel.org:CVE-2011-1585 CONFIRM:git.kernel.org:CVE-2011-4127 CONFIRM:git.kernel.org:CVE-2011-4132 CONFIRM:git.kernel.org:CVE-2012-0810 CONFIRM:git.kernel.org:CVE-2012-2313 CONFIRM:git.kernel.org:CVE-2012-2319 CONFIRM:git.kernel.org:CVE-2012-3400 CONFIRM:git.kernel.org:CVE-2012-6657 CONFIRM:git.kernel.org:CVE-2013-7281 CONFIRM:git.kernel.org:CVE-2013-7421 CONFIRM:git.kernel.org:CVE-2014-0101 CONFIRM:git.kernel.org:CVE-2014-0181 CONFIRM:git.kernel.org:CVE-2014-0206 CONFIRM:git.kernel.org:CVE-2014-1739 CONFIRM:git.kernel.org:CVE-2014-1874 CONFIRM:git.kernel.org:CVE-2014-2309 CONFIRM:git.kernel.org:CVE-2014-3153 CONFIRM:git.kernel.org:CVE-2014-3181 CONFIRM:git.kernel.org:CVE-2014-3182 CONFIRM:git.kernel.org:CVE-2014-3184 CONFIRM:git.kernel.org:CVE-2014-3186 CONFIRM:git.kernel.org:CVE-2014-3601 CONFIRM:git.kernel.org:CVE-2014-3610 CONFIRM:git.kernel.org:CVE-2014-3646 CONFIRM:git.kernel.org:CVE-2014-3673 CONFIRM:git.kernel.org:CVE-2014-3687 CONFIRM:git.kernel.org:CVE-2014-3688 CONFIRM:git.kernel.org:CVE-2014-3690 CONFIRM:git.kernel.org:CVE-2014-4027 CONFIRM:git.kernel.org:CVE-2014-4608 CONFIRM:git.kernel.org:CVE-2014-4611 CONFIRM:git.kernel.org:CVE-2014-4667 CONFIRM:git.kernel.org:CVE-2014-4943 CONFIRM:git.kernel.org:CVE-2014-5077 CONFIRM:git.kernel.org:CVE-2014-5206 CONFIRM:git.kernel.org:CVE-2014-5207 CONFIRM:git.kernel.org:CVE-2014-5472 CONFIRM:git.kernel.org:CVE-2014-6410 CONFIRM:git.kernel.org:CVE-2014-7842 CONFIRM:git.kernel.org:CVE-2014-7970 CONFIRM:git.kernel.org:CVE-2014-7975 CONFIRM:git.kernel.org:CVE-2014-8160 CONFIRM:git.kernel.org:CVE-2014-8369 CONFIRM:git.kernel.org:CVE-2014-8709 CONFIRM:git.kernel.org:CVE-2014-8884 CONFIRM:git.kernel.org:CVE-2014-9322 CONFIRM:git.kernel.org:CVE-2014-9420 CONFIRM:git.kernel.org:CVE-2014-9644 CONFIRM:git.kernel.org:CVE-2014-9728 CONFIRM:git.kernel.org:CVE-2014-9729 CONFIRM:git.kernel.org:CVE-2014-9730 CONFIRM:git.kernel.org:CVE-2014-9731 CONFIRM:git.kernel.org:CVE-2015-1593 CONFIRM:github.com:CVE-2010-5313 CONFIRM:github.com:CVE-2011-1476 CONFIRM:github.com:CVE-2011-1585 CONFIRM:github.com:CVE-2011-4127 CONFIRM:github.com:CVE-2012-2313 CONFIRM:github.com:CVE-2012-2319 CONFIRM:github.com:CVE-2012-3400 CONFIRM:github.com:CVE-2012-6657 CONFIRM:github.com:CVE-2013-7281 CONFIRM:github.com:CVE-2013-7421 CONFIRM:github.com:CVE-2014-0101 CONFIRM:github.com:CVE-2014-0131 CONFIRM:github.com:CVE-2014-1874 CONFIRM:github.com:CVE-2014-3181 CONFIRM:github.com:CVE-2014-3182 CONFIRM:github.com:CVE-2014-3184 CONFIRM:github.com:CVE-2014-3185 CONFIRM:github.com:CVE-2014-3186 CONFIRM:github.com:CVE-2014-3673 CONFIRM:github.com:CVE-2014-3687 CONFIRM:github.com:CVE-2014-3688 CONFIRM:github.com:CVE-2014-3690 CONFIRM:github.com:CVE-2014-4027 CONFIRM:github.com:CVE-2014-4608 CONFIRM:github.com:CVE-2014-4611 CONFIRM:github.com:CVE-2014-4667 CONFIRM:github.com:CVE-2014-4943 CONFIRM:github.com:CVE-2014-5077 CONFIRM:github.com:CVE-2014-5206 CONFIRM:github.com:CVE-2014-5207 CONFIRM:github.com:CVE-2014-5472 CONFIRM:github.com:CVE-2014-6410 CONFIRM:github.com:CVE-2014-7841 CONFIRM:github.com:CVE-2014-7842 CONFIRM:github.com:CVE-2014-8133 CONFIRM:github.com:CVE-2014-8160 CONFIRM:github.com:CVE-2014-8709 CONFIRM:github.com:CVE-2014-8884 CONFIRM:github.com:CVE-2014-9322 CONFIRM:github.com:CVE-2014-9420 CONFIRM:github.com:CVE-2014-9644 CONFIRM:github.com:CVE-2014-9728 CONFIRM:github.com:CVE-2014-9729 CONFIRM:github.com:CVE-2014-9730 CONFIRM:github.com:CVE-2014-9731 CONFIRM:github.com:CVE-2017-6429 CONFIRM:help.joyent.com:CVE-2014-9322 CONFIRM:kb.juniper.net:CVE-2012-3400 CONFIRM:linux.oracle.com:CVE-2014-1874 CONFIRM:linux.oracle.com:CVE-2014-3153 CONFIRM:linux.oracle.com:CVE-2014-3687 CONFIRM:linux.oracle.com:CVE-2014-4667 CONFIRM:linux.oracle.com:CVE-2014-4943 CONFIRM:linux.oracle.com:CVE-2014-7841 CONFIRM:mirror.linux.org.au:CVE-2010-5313 CONFIRM:ozlabs.org:CVE-2014-4171 CONFIRM:patchwork.kernel.org:CVE-2011-1495 CONFIRM:source.android.com:CVE-2016-2427 CONFIRM:source.android.com:CVE-2017-0404 CONFIRM:source.android.com:CVE-2017-6426 CONFIRM:support.f5.com:CVE-2014-0101 CONFIRM:support.f5.com:CVE-2014-4027 CONFIRM:support.f5.com:CVE-2014-7841 CONFIRM:support.f5.com:CVE-2014-8134 CONFIRM:www.kernel.org:CVE-2011-1163 CONFIRM:www.kernel.org:CVE-2012-2100 CONFIRM:www.kernel.org:CVE-2012-2313 CONFIRM:www.kernel.org:CVE-2012-2384 CONFIRM:www.kernel.org:CVE-2012-3511 CONFIRM:www.kernel.org:CVE-2012-4398 CONFIRM:www.kernel.org:CVE-2013-1826 CONFIRM:www.kernel.org:CVE-2013-2899 CONFIRM:www.kernel.org:CVE-2013-6367 CONFIRM:www.kernel.org:CVE-2014-0181 CONFIRM:www.kernel.org:CVE-2014-0206 CONFIRM:www.kernel.org:CVE-2014-1739 CONFIRM:www.kernel.org:CVE-2014-1874 CONFIRM:www.kernel.org:CVE-2014-3185 CONFIRM:www.kernel.org:CVE-2014-3690 CONFIRM:www.kernel.org:CVE-2014-4508 CONFIRM:www.kernel.org:CVE-2014-7842 CONFIRM:www.kernel.org:CVE-2014-8884 CONFIRM:www.kernel.org:CVE-2014-9322 CONFIRM:www.kernel.org:CVE-2014-9914 CONFIRM:www.kernel.org:CVE-2015-1573 CONFIRM:www.kernel.org:CVE-2015-4167 CONFIRM:www.oracle.com CONFIRM:www.oracle.com:CVE-2015-1351 CONFIRM:www.oracle.com:CVE-2015-8391 CONFIRM:www.oracle.com:CVE-2015-8472 CONFIRM:www.oracle.com:CVE-2016-2802 CONFIRM:www.oracle.com:CVE-2016-5240 CONFIRM:www.vmware.com:CVE-2011-1659 CVE-2009-4067 CVE-2010-5313 CVE-2011-1090 CVE-2011-1163 CVE-2011-1476 CVE-2011-1494 CVE-2011-1495 CVE-2011-1585 CVE-2011-4127 CVE-2011-4132 CVE-2012-0810 CVE-2012-2313 CVE-2012-2319 CVE-2012-3400 CVE-2012-4398 CVE-2012-6657 CVE-2013-2147 CVE-2013-2888 CVE-2013-2889 CVE-2013-2890 CVE-2013-2891 CVE-2013-2892 CVE-2013-2893 CVE-2013-2894 CVE-2013-2895 CVE-2013-2896 CVE-2013-2897 CVE-2013-2898 CVE-2013-2899 CVE-2013-2929 CVE-2013-4299 CVE-2013-6382 CVE-2013-6405 CVE-2013-6463 CVE-2013-7263 CVE-2013-7421 CVE-2014-0101 CVE-2014-0131 CVE-2014-0181 CVE-2014-0206 CVE-2014-1444 CVE-2014-1445 CVE-2014-1446 CVE-2014-1739 CVE-2014-1874 CVE-2014-2309 CVE-2014-3153 CVE-2014-3181 CVE-2014-3182 CVE-2014-3184 CVE-2014-3185 CVE-2014-3186 CVE-2014-3601 CVE-2014-3610 CVE-2014-3646 CVE-2014-3673 CVE-2014-3687 CVE-2014-3688 CVE-2014-3690 CVE-2014-3917 CVE-2014-4027 CVE-2014-4171 CVE-2014-4508 CVE-2014-4608 CVE-2014-4611 CVE-2014-4652 CVE-2014-4653 CVE-2014-4654 CVE-2014-4655 CVE-2014-4656 CVE-2014-4667 CVE-2014-4943 CVE-2014-5077 CVE-2014-5206 CVE-2014-5207 CVE-2014-5471 CVE-2014-5472 CVE-2014-6410 CVE-2014-7822 CVE-2014-7841 CVE-2014-7842 CVE-2014-7970 CVE-2014-7975 CVE-2014-8133 CVE-2014-8134 CVE-2014-8160 CVE-2014-8369 CVE-2014-8709 CVE-2014-8884 CVE-2014-9090 CVE-2014-9322 CVE-2014-9419 CVE-2014-9420 CVE-2014-9584 CVE-2014-9644 CVE-2014-9645 CVE-2014-9728 CVE-2014-9729 CVE-2014-9730 CVE-2014-9731 CVE-2015-1593 CVE-2015-1805 CVE-2015-4167 CVE-2015-7303 CVE-2015-7838 CVE-2015-7839 CVE-2015-8028 CVE-2015-8029 CVE-2015-8030 CVE-2015-8220 CVE-2015-8561 CVE-2015-8572 CVE-2015-8580 CVE-2015-8843 CVE-2016-1715 CVE-2016-4065 CVE-2023-2002 D:CVE-2010-5313 D:CVE-2013-7263 D:CVE-2013-7421 D:CVE-2014-0181 D:CVE-2014-1739 D:CVE-2014-3153 D:CVE-2014-3601 D:CVE-2014-3690 D:CVE-2014-4027 D:CVE-2014-4508 D:CVE-2014-4608 D:CVE-2014-4611 D:CVE-2014-4667 D:CVE-2014-4943 D:CVE-2014-5077 D:CVE-2014-5206 D:CVE-2014-5207 D:CVE-2014-5471 D:CVE-2014-5472 D:CVE-2014-7842 D:CVE-2014-7970 D:CVE-2014-7975 D:CVE-2014-8134 D:CVE-2014-8369 D:CVE-2014-8709 D:CVE-2014-8884 D:CVE-2014-9420 D:CVE-2014-9644 D:CVE-2014-9645 D:CVE-2015-1593 D:CVE-2022-2590 D:CVE-2023-2002 DSA-2240 DSA-2264 DSA-2389 DSA-2906 DSA-2949 DSA-2992 DSA-3060 DSA-3093 DSA-3128 DSA-3170 DSA-5378 DSA-5480 EXPLOIT-DB:34923 EXPLOIT-DB:35370 EXPLOIT-DB:36266 EXPLOIT-DB:36267 FATE 316723 FATE 318328 FEDORA:FEDORA-2015-0515 FEDORA:FEDORA-2015-0517 GENTOO:GLSA-201503-13 HP:HPSBGN02970 HP:HPSBGN03282 HP:HPSBGN03285 L3:36459 L3:36692 L3:36914 L3:37001 L3:37134 L3:38981 L3:41048 L3:41049 L3:41094 L3:41357 L3:41435 L3:41518 L3:41686 L3:41740 L3:41763 L3:41839 L3:41907 L3:42007 L3:42020 L3:42021 L3:42036 L3:42066 L3:42075 L3:42107 L3:42117 L3:42120 L3:42139 L3:42193 L3:42354 L3:42485 L3:42544 L3:42673 L3:42747 L3:43073 L3:44416 L3:47323 L3:65764 MANDRIVA:MDVSA-2015:057 MANDRIVA:MDVSA-2015:058 MISC:blog.securitymouse.com:CVE-2014-4611 MISC:bugs.launchpad.net:MLIST:[oss-security] 20120902 CVE Request -- kernel: request_module() OOM local DoS MISC:bugzilla.redhat.com:MLIST:[oss-security] 20141113 Linux kernel: SCTP issues MISC:code.google.com:CVE-2014-3181 MISC:code.google.com:CVE-2014-3182 MISC:code.google.com:CVE-2014-3184 MISC:code.google.com:CVE-2014-3185 MISC:code.google.com:CVE-2014-3186 MISC:code.google.com:CVE-2014-5472 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:elongl.github.io:MISC:www.openwall.com:CVE-2014-3153 MISC:fastcompression.blogspot.fr:CVE-2014-4611 MISC:git.kernel.org MISC:git.kernel.org:/ MISC:git.kernel.org:MLIST:[oss-security] 20110415 Re: CVE Request: cifs session reuse MISC:git.kernel.org:MLIST:[oss-security] 20140307 Re: CVE Request: Linux kernel: IPv6: crash due to router advertisement flooding MISC:git.kernel.org:MLIST:[oss-security] 20140611 Re: CVE request: Linux kernel / target information leak MISC:git.kernel.org:MLIST:[oss-security] 20140627 Re: CVE request -- Linux kernel: sctp: sk_ack_backlog wrap-around problem MISC:git.kernel.org:MLIST:[oss-security] 20140813 Re: CVE Request: ro bind mount bypass using user namespaces MISC:git.kernel.org:MLIST:[oss-security] 20140915 Re: CVE request for Linux kernel: udf: Avoid infinite loop when processing indirect ICBs MISC:git.kernel.org:MLIST:[oss-security] 20141021 CVE-2014-3690: KVM DoS triggerable by malicious host userspace MISC:git.kernel.org:MLIST:[oss-security] 20141024 kvm issues MISC:git.kernel.org:MLIST:[oss-security] 20141113 CVE-2014-7842 Linux kernel: kvm: reporting emulation failures to userspace MISC:git.kernel.org:MLIST:[oss-security] 20141113 Linux kernel: SCTP issues MISC:git.kernel.org:MLIST:[oss-security] 20141126 Re: CVE Request: Linux kernel LDT handling bugs MISC:git.kernel.org:MLIST:[oss-security] 20141215 Linux kernel: multiple x86_64 vulnerabilities MISC:git.kernel.org:MLIST:[oss-security] 20150320 Re: CVE Request: Linux kernel execution in the early microcode loader. MISC:git.kernel.org:OSS:2014/03/05/6 MISC:git.kernel.org:OSS:2023/04/16/3 MISC:github.com:MISC:www.openwall.com:CVE-2014-3153 MISC:hmarco.org:CVE-2015-1593 MISC:labs.mwrinfosecurity.com:CVE-2009-4067 MISC:lists.debian.org:MLIST:[oss-security] 20140605 Linux kernel futex local privilege escalation (CVE-2014-3153) MISC:packetstormsecurity.com:CVE-2014-5207 MISC:patchwork.ozlabs.org:MLIST:[oss-security] 20140307 Re: CVE Request: Linux kernel: IPv6: crash due to router advertisement flooding MISC:patchwork.ozlabs.org:MLIST:[oss-security] 20140725 Re: CVE request Linux Kernel: net: SCTP: NULL pointer dereference MISC:plus.google.com:CVE-2014-9645 MISC:speirofr.appspot.com:CVE-2014-1739 MISC:twitter.com:CVE-2014-4611 MISC:www.oberhumer.com:CVE-2014-4608 MISC:www.openwall.com:CVE-2014-3153 MISC:www.pre-cert.de:CVE-2011-1163 MISC:www.securitymouse.com:CVE-2014-4608 MISC:www.securitymouse.com:CVE-2014-4611 MISC:www.spinics.net:MLIST:[oss-security] 20140618 CVE-2014-4171 - Linux kernel mm/shmem.c denial of service MISC:www.zerodayinitiative.com MISC:xorl.wordpress.com:CVE-2011-4132 MLIST:[kvm] 20141205 [PATCH] x86, kvm: Clear paravirt_enabled on KVM guests for espfix32's benefit MLIST:[linux-fsdevel] 20141008 [PATCH] mnt: Prevent pivot_root from creating a loop in the mount tree MLIST:[linux-input] 20130828 [PATCH 01/14] HID: validate HID report id size MLIST:[linux-input] 20130828 [PATCH 03/14] HID: zeroplus: validate output report details MLIST:[linux-input] 20130828 [PATCH 04/14] HID: sony: validate HID output report details MLIST:[linux-input] 20130828 [PATCH 05/14] HID: steelseries: validate output report details MLIST:[linux-input] 20130828 [PATCH 06/14] HID: pantherlord: validate output report details MLIST:[linux-input] 20130828 [PATCH 07/14] HID: LG: validate HID output report details MLIST:[linux-input] 20130828 [PATCH 08/14] HID: lenovo-tpkbd: validate output report details MLIST:[linux-input] 20130828 [PATCH 09/14] HID: logitech-dj: validate output report details MLIST:[linux-input] 20130828 [PATCH 10/14] HID: ntrig: validate feature report details MLIST:[linux-input] 20130828 [PATCH 11/14] HID: multitouch: validate feature report details MLIST:[linux-input] 20130828 [PATCH 12/14] HID: sensor-hub: validate feature report details MLIST:[linux-input] 20130828 [PATCH 13/14] HID: picolcd_core: validate output report details MLIST:[linux-kernel] 20110405 [PATCH] drivers/scsi/mpt2sas: prevent heap overflows and unchecked reads MLIST:[linux-kernel] 20120207 [PATCH 5/5] kmod: make __request_module() killable MLIST:[linux-kernel] 20130304 Re: user ns: arbitrary module loading MLIST:[linux-kernel] 20130603 [patch] cciss: info leak in cciss_ioctl32_passthru() MLIST:[linux-kernel] 20130603 [patch] cpqarray: info leak in ida_locked_ioctl() MLIST:[linux-kernel] 20140528 [PATCH 1/2] auditsc: audit_krule mask accesses need bounds checking MLIST:[linux-kernel] 20140616 Re: 3.15: kernel BUG at kernel/auditsc.c:1525! MLIST:[linux-kernel] 20141024 [PATCH 13/14] kvm: fix excessive pages un-pinning in kvm_iommu_map error path. MLIST:[linux-kernel] 20150107 Re: [PATH] Fix stack randomization on x86_64 bit MLIST:[mm-commits] 20110314 + fs-partitions-osfc-corrupted-osf-partition-table-can-cause-information-disclosure.patch added to -mm tree MLIST:[mm-commits] 20140617 + shmem-fix-faulting-into-a-hole-while-its-punched.patch added to -mm tree MLIST:[netdev] 20140310 [PATCH 0/5] skbuff: fix skb_segment with zero copy skbs MLIST:[netdev] 20140310 [PATCH 5/5] skbuff: skb_segment: orphan frags before copying MLIST:[netdev] 20140423 [PATCH 0/5]: Preventing abuse when passing file descriptors MLIST:[netfilter-devel] 20140925 [PATCH nf] netfilter: conntrack: disable generic protocol tracking MLIST:[oss-security] 20110307 CVE request - kernel: nfs4: Ensure that ACL pages sent over NFS were not allocated from the slab MLIST:[oss-security] 20110307 Re: CVE request - kernel: nfs4: Ensure that ACL pages sent over NFS were not allocated from the slab MLIST:[oss-security] 20110315 CVE Request: kernel: fs/partitions: Corrupted OSF partition table can cause information disclosure MLIST:[oss-security] 20110315 Re: CVE Request: kernel: fs/partitions: Corrupted OSF partition table can cause information disclosure MLIST:[oss-security] 20110325 Re: CVE request: kernel: two OSS fixes MLIST:[oss-security] 20110405 CVE request: kernel: two issues in mpt2sas MLIST:[oss-security] 20110406 Re: CVE request: kernel: two issues in mpt2sas MLIST:[oss-security] 20110415 Re: CVE Request: cifs session reuse MLIST:[oss-security] 20111111 CVE Request -- kernel: jbd/jbd2: invalid value of first log block leads to oops MLIST:[oss-security] 20111113 Re: CVE Request -- kernel: jbd/jbd2: invalid value of first log block leads to oops MLIST:[oss-security] 20111222 CVE-2011-4127 kernel: possible privilege escalation via SG_IO ioctl MLIST:[oss-security] 20120504 Re: CVE Request: more tight ioctl permissions in dl2k driver MLIST:[oss-security] 20120507 Re: CVE request: Linux kernel: Buffer overflow in HFS plus filesystem MLIST:[oss-security] 20120709 Re: CVE Request: Stability fixes in UDF Logical Volume Descriptor handling MLIST:[oss-security] 20120902 CVE Request -- kernel: request_module() OOM local DoS MLIST:[oss-security] 20130605 Re: CVE request: kernel: cpqarray/c: info leak in ida_locked_ioctl() MLIST:[oss-security] 20130828 Linux HID security flaws MLIST:[oss-security] 20131128 Re: CVE Request: Linux kernel: net: uninitialised memory leakage MLIST:[oss-security] 20140107 oss-sec: CVE split and a missed file MLIST:[oss-security] 20140115 Re: CVE request: assorted kernel infoleak security fixes MLIST:[oss-security] 20140206 Re: CVE Request: Linux kernel: SELinux local DoS MLIST:[oss-security] 20140304 CVE-2014-0101 -- Linux kernel: net: sctp: null pointer dereference when processing authenticated cookie_echo chunk MLIST:[oss-security] 20140307 Re: CVE Request: Linux kernel: IPv6: crash due to router advertisement flooding MLIST:[oss-security] 20140310 CVE-2014-0131 -- kernel: net: use-after-free during segmentation with zerocopy MLIST:[oss-security] 20140423 Re: CVE-2014-0181: Linux network reconfiguration due to incorrect netlink checks MLIST:[oss-security] 20140529 Re: CVE request: Linux kernel DoS with syscall auditing MLIST:[oss-security] 20140605 Linux kernel futex local privilege escalation (CVE-2014-3153) MLIST:[oss-security] 20140605 Re: Linux kernel futex local privilege escalation (CVE-2014-3153) MLIST:[oss-security] 20140606 Re: Linux kernel futex local privilege escalation (CVE-2014-3153) MLIST:[oss-security] 20140611 Re: CVE request: Linux kernel / target information leak MLIST:[oss-security] 20140618 CVE-2014-4171 - Linux kernel mm/shmem.c denial of service MLIST:[oss-security] 20140619 CVE request: Another Linux syscall auditing bug MLIST:[oss-security] 20140620 Re: CVE request: Another Linux syscall auditing bug MLIST:[oss-security] 20140626 LMS-2014-06-16-2: Linux Kernel LZO MLIST:[oss-security] 20140626 LMS-2014-06-16-5: Linux Kernel LZ4 MLIST:[oss-security] 20140627 Re: CVE request -- Linux kernel: sctp: sk_ack_backlog wrap-around problem MLIST:[oss-security] 20140716 CVE-2014-4943: Linux privilege escalation in ppp over l2tp sockets MLIST:[oss-security] 20140725 Re: CVE request Linux Kernel: net: SCTP: NULL pointer dereference MLIST:[oss-security] 20140812 CVE Request: ro bind mount bypass using user namespaces MLIST:[oss-security] 20140813 Re: CVE Request: ro bind mount bypass using user namespaces MLIST:[oss-security] 20140826 CVE Request: Linux Kernel unbound recursion in ISOFS MLIST:[oss-security] 20140827 Re: CVE Request: Linux Kernel unbound recursion in ISOFS MLIST:[oss-security] 20140911 Multiple Linux USB driver CVE assignment MLIST:[oss-security] 20140911 Re: Multiple Linux USB driver CVE assignment MLIST:[oss-security] 20140915 Re: CVE request Linux kernel: net: guard tcp_set_keepalive against crash MLIST:[oss-security] 20140915 Re: CVE request for Linux kernel: udf: Avoid infinite loop when processing indirect ICBs MLIST:[oss-security] 20141008 CVE-2014-7970: Linux VFS denial of service MLIST:[oss-security] 20141008 CVE-2014-7975: 0-day umount denial of service MLIST:[oss-security] 20141021 CVE-2014-3690: KVM DoS triggerable by malicious host userspace MLIST:[oss-security] 20141024 CVE-2014-8369 - Linux kernel iommu.c excessive unpinning MLIST:[oss-security] 20141024 kvm issues MLIST:[oss-security] 20141029 Re: CVE-2014-3690: KVM DoS triggerable by malicious host userspace MLIST:[oss-security] 20141109 Re: CVE Request: Linux kernel mac80211 plain text leak MLIST:[oss-security] 20141113 CVE-2014-7841 Linux kernel: net: sctp: NULL pointer dereference in af->from_addr_param on malformed packet MLIST:[oss-security] 20141113 CVE-2014-7842 Linux kernel: kvm: reporting emulation failures to userspace MLIST:[oss-security] 20141113 Linux kernel: SCTP issues MLIST:[oss-security] 20141114 Re: CVE Request: Linux kernel: ttusb-dec: overflow by descriptor MLIST:[oss-security] 20141215 Linux kernel: multiple x86_64 vulnerabilities MLIST:[oss-security] 20141225 Re: CVE Request Linux kernel: fs: isofs: infinite loop in CE records MLIST:[oss-security] 20150114 CVE-2014-8160 Linux Kernel: SCTP firewalling fails until SCTP module is loaded MLIST:[oss-security] 20150124 Re: CVE Request: Linux kernel crypto api unprivileged arbitrary module load MLIST:[oss-security] 20150213 Re: CVE-Request -- Linux ASLR integer overflow MLIST:[oss-security] 20150602 CVE request Linux kernel: fs: udf heap overflow in __udf_adinicb_readpage MLIST:[oss-security] 20150602 CVE request Linux kernel: fs: udf kernel oops MLIST:[oss-security] 20150603 CVE request Linux kernel: udf: information leakage when reading symlink MLIST:[oss-security] 20150606 CVE-2015-1805 Linux kernel: pipe: iovec overrun leading to memory corruption MLIST:[oss-security] 20201112 CVE-2014-4508 MLIST:[oss-security] 20210201 Re: Linux Kernel: local priv escalation via futexes MLIST:[stable] 20141008 [PATCH] fs: Add a missing permission check to do_umount MLIST:[target-devel] 20140616 [PATCH] target: Explicitly clear ramdisk_mcp backend pages MLIST:[xfs] 20131031 [patch] xfs: underflow bug in xfs_attrlist_by_handle() OSS:11016 OSS:11654 OSS:11779 OSS:12052 OSS:12309 OSS:2014/03/05/6 OSS:2014/Q2/162 OSS:2014/Q2/163 OSS:2014/Q2/168 OSS:2014/Q2/169 OSS:2014/Q2/170 OSS:2014/Q2/529 OSS:2014/Q2/638 OSS:2014/Q3/357 OSS:2014/Q3/452 OSS:2014/Q4/228 OSS:2014/Q4/229 OSS:2014/Q4/416 OSS:2014/Q4/605 OSS:2015/Q2/652 OSS:2016/Q2/365 OSS:2017/Q2/500 OSS:2020/Q4/121 OSS:2021/Q1/95 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/11/10/2 OSS:2022/12/27/3 OSS:2022/Q3/99 OSS:2022/Q4/132 OSS:2022/Q4/135 OSS:2022/Q4/244 OSS:2023/04/16/3 OSS:2023/10/10/4 OSS:2023/Q2/31 OSVDB:109277 OSVDB:110055 OSVDB:115919 Oracle:CVE-2015-6937 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 Oracle:CVE-2017-0861 Oracle:CVE-2017-5715 RAEDERWERK:38981 RH:CVE-2010-5313 RH:CVE-2011-1090 RH:CVE-2011-1163 RH:CVE-2011-1476 RH:CVE-2011-1494 RH:CVE-2011-1495 RH:CVE-2011-1585 RH:CVE-2011-4127 RH:CVE-2011-4132 RH:CVE-2012-2313 RH:CVE-2012-2319 RH:CVE-2012-3400 RH:CVE-2012-4398 RH:CVE-2012-6657 RH:CVE-2013-2147 RH:CVE-2013-2888 RH:CVE-2013-2889 RH:CVE-2013-2890 RH:CVE-2013-2891 RH:CVE-2013-2892 RH:CVE-2013-2893 RH:CVE-2013-2894 RH:CVE-2013-2895 RH:CVE-2013-2896 RH:CVE-2013-2897 RH:CVE-2013-2898 RH:CVE-2013-2899 RH:CVE-2013-2929 RH:CVE-2013-4299 RH:CVE-2013-6382 RH:CVE-2013-7263 RH:CVE-2013-7421 RH:CVE-2014-0101 RH:CVE-2014-0131 RH:CVE-2014-0181 RH:CVE-2014-0206 RH:CVE-2014-1444 RH:CVE-2014-1445 RH:CVE-2014-1446 RH:CVE-2014-1739 RH:CVE-2014-1874 RH:CVE-2014-2309 RH:CVE-2014-3153 RH:CVE-2014-3181 RH:CVE-2014-3182 RH:CVE-2014-3184 RH:CVE-2014-3185 RH:CVE-2014-3186 RH:CVE-2014-3601 RH:CVE-2014-3610 RH:CVE-2014-3646 RH:CVE-2014-3673 RH:CVE-2014-3687 RH:CVE-2014-3688 RH:CVE-2014-3690 RH:CVE-2014-3917 RH:CVE-2014-4027 RH:CVE-2014-4171 RH:CVE-2014-4508 RH:CVE-2014-4608 RH:CVE-2014-4611 RH:CVE-2014-4667 RH:CVE-2014-4943 RH:CVE-2014-5077 RH:CVE-2014-5206 RH:CVE-2014-5207 RH:CVE-2014-5471 RH:CVE-2014-5472 RH:CVE-2014-6410 RH:CVE-2014-7841 RH:CVE-2014-7842 RH:CVE-2014-7970 RH:CVE-2014-7975 RH:CVE-2014-8133 RH:CVE-2014-8134 RH:CVE-2014-8160 RH:CVE-2014-8369 RH:CVE-2014-8709 RH:CVE-2014-8884 RH:CVE-2014-9090 RH:CVE-2014-9322 RH:CVE-2014-9419 RH:CVE-2014-9420 RH:CVE-2014-9644 RH:CVE-2014-9645 RH:CVE-2014-9728 RH:CVE-2014-9729 RH:CVE-2014-9730 RH:CVE-2014-9731 RH:CVE-2015-1593 RH:CVE-2015-1805 RH:CVE-2015-4167 RHSA-2010:0631 RHSA-2010:0660 RHSA-2010:0661 RHSA-2010:0670 RHSA-2010:0676 RHSA-2010:0677 RHSA-2010:0882 RHSA-2011:0429 RHSA-2011:0500 RHSA-2011:0542 RHSA-2011:0833 RHSA-2011:0883 RHSA-2011:1253 RHSA-2011:1386 RHSA-2011:1849 RHSA-2011:1850 RHSA-2012:0007 RHSA-2012:0010 RHSA-2012:0107 RHSA-2012:0333 RHSA-2012:0350 RHSA-2012:0358 RHSA-2012:1174 RHSA-2012:1282 RHSA-2012:1304 RHSA-2012:1323 RHSA-2012:1347 RHSA-2012:1426 RHSA-2012:1481 RHSA-2012:1491 RHSA-2012:1541 RHSA-2012:1589 RHSA-2013:0223 RHSA-2013:0594 RHSA-2013:1166 RHSA-2013:1264 RHSA-2013:1348 RHSA-2013:1436 RHSA-2013:1449 RHSA-2013:1450 RHSA-2013:1460 RHSA-2013:1490 RHSA-2013:1519 RHSA-2013:1520 RHSA-2013:1527 RHSA-2013:1645 RHSA-2013:1783 RHSA-2013:1860 RHSA-2014:0100 RHSA-2014:0159 RHSA-2014:0285 RHSA-2014:0328 RHSA-2014:0419 RHSA-2014:0432 RHSA-2014:0433 RHSA-2014:0439 RHSA-2014:0520 RHSA-2014:0771 RHSA-2014:0786 RHSA-2014:0800 RHSA-2014:0900 RHSA-2014:0913 RHSA-2014:0923 RHSA-2014:0924 RHSA-2014:0925 RHSA-2014:1023 RHSA-2014:1025 RHSA-2014:1083 RHSA-2014:1143 RHSA-2014:1167 RHSA-2014:1281 RHSA-2014:1318 RHSA-2014:1392 RHSA-2014:1668 RHSA-2014:1724 RHSA-2014:1763 RHSA-2014:1843 RHSA-2014:1872 RHSA-2014:1959 RHSA-2014:1971 RHSA-2014:1997 RHSA-2014:1998 RHSA-2014:2008 RHSA-2014:2009 RHSA-2014:2010 RHSA-2014:2028 RHSA-2014:2029 RHSA-2014:2030 RHSA-2014:2031 RHSA-2015:0009 RHSA-2015:0043 RHSA-2015:0062 RHSA-2015:0087 RHSA-2015:0102 RHSA-2015:0115 RHSA-2015:0126 RHSA-2015:0284 RHSA-2015:0285 RHSA-2015:0290 RHSA-2015:0674 RHSA-2015:0695 RHSA-2015:0782 RHSA-2015:0803 RHSA-2015:0864 RHSA-2015:0869 RHSA-2015:1042 RHSA-2015:1081 RHSA-2015:1082 RHSA-2015:1120 RHSA-2015:1137 RHSA-2015:1138 RHSA-2015:1139 RHSA-2015:1190 RHSA-2015:1199 RHSA-2015:1211 RHSA-2015:1221 RHSA-2015:1272 RHSA-2015:2152 RHSA-2015:2411 RHSA-2016:0068 RHSA-2016:0103 RHSA-2016:0494 RHSA-2016:0617 RHSA-2016:0855 RHSA-2017:1842 RHSA-2017:2077 RHSA-2018:1252 RHSA-2019:3517 RHSA-2021:0181 RHSA-2023:3708 RHSA-2023:3723 RHSA-2023:4137 RHSA-2023:4138 RHSA-2023:4789 RHSA-2023:4961 RHSA-2023:4962 RHSA-2023:5244 RHSA-2023:5255 SECTRACK:1025225 SECTRACK:1025336 SECTRACK:1026325 SECTRACK:1029894 SECTRACK:1030450 SECTRACK:1030451 SECTRACK:1030479 SECTRACK:1030491 SECTRACK:1030610 SECTRACK:1030681 SECTRACK:1030991 SECTRACK:1031180 SECTRACK:1032454 SECTRACK:1033187 SECTRACK:1038201 SECUNIA:46397 SECUNIA:48898 SECUNIA:50506 SECUNIA:50811 SECUNIA:55077 SECUNIA:55882 SECUNIA:56036 SECUNIA:57250 SECUNIA:58500 SECUNIA:58964 SECUNIA:58990 SECUNIA:59029 SECUNIA:59092 SECUNIA:59134 SECUNIA:59153 SECUNIA:59216 SECUNIA:59262 SECUNIA:59278 SECUNIA:59309 SECUNIA:59386 SECUNIA:59406 SECUNIA:59567 SECUNIA:59597 SECUNIA:59599 SECUNIA:59777 SECUNIA:59790 SECUNIA:60011 SECUNIA:60071 SECUNIA:60174 SECUNIA:60220 SECUNIA:60238 SECUNIA:60380 SECUNIA:60393 SECUNIA:60430 SECUNIA:60545 SECUNIA:60564 SECUNIA:60596 SECUNIA:60744 SECUNIA:60830 SECUNIA:61142 SECUNIA:61145 SECUNIA:61310 SECUNIA:62305 SECUNIA:62326 SECUNIA:62336 SECUNIA:62428 SECUNIA:62563 SECUNIA:62597 SECUNIA:62633 SECUNIA:62634 SECUNIA:62735 SECUNIA:62801 SMASH Issue 100007 SMASH Issue 102948 SMASH Issue 102973 SMASH Issue 103001 SMASH Issue 103006 SMASH Issue 103024 SMASH Issue 103042 SMASH Issue 103056 SMASH Issue 103066 SMASH Issue 103072 SMASH Issue 103602 SMASH Issue 104049 SMASH Issue 104985 SMASH Issue 105171 SMASH Issue 105212 SMASH Issue 105429 SMASH Issue 105465 SMASH Issue 106127 SMASH Issue 106129 SMASH Issue 106131 SMASH Issue 106132 SMASH Issue 106168 SMASH Issue 106206 SMASH Issue 108788 SMASH Issue 109023 SMASH Issue 109031 SMASH Issue 110107 SMASH Issue 110127 SMASH Issue 110150 SMASH Issue 110597 SMASH Issue 110719 SMASH Issue 110758 SMASH Issue 111113 SMASH Issue 111199 SMASH Issue 111365 SMASH Issue 111502 SMASH Issue 111768 SMASH Issue 111836 SMASH Issue 112147 SMASH Issue 112357 SMASH Issue 112673 SMASH Issue 112776 SMASH Issue 112827 SMASH Issue 112842 SMASH Issue 112849 SMASH Issue 112850 SMASH Issue 112859 SMASH Issue 113136 SMASH Issue 113141 SMASH Issue 113165 SMASH Issue 113304 SMASH Issue 113891 SMASH Issue 114236 SMASH Issue 114237 SMASH Issue 114238 SMASH Issue 114239 SMASH Issue 114240 SMASH Issue 114241 SMASH Issue 114242 SMASH Issue 114244 SMASH Issue 114245 SMASH Issue 114249 SMASH Issue 114250 SMASH Issue 114251 SMASH Issue 114252 SMASH Issue 114253 SMASH Issue 114255 SMASH Issue 114257 SMASH Issue 114258 SMASH Issue 114261 SMASH Issue 114262 SMASH Issue 114263 SMASH Issue 114264 SMASH Issue 119253 SMASH Issue 149481 SMASH Issue 149674 SMASH Issue 149738 SMASH Issue 149742 SMASH Issue 149750 SMASH Issue 155972 SMASH Issue 155985 SMASH Issue 155986 SMASH Issue 155988 SMASH Issue 155999 SMASH Issue 156000 SMASH Issue 156003 SMASH Issue 156005 SMASH Issue 156023 SMASH Issue 156025 SMASH Issue 156026 SMASH Issue 179211 SMASH Issue 194696 SMASH Issue 217705 SMASH Issue 363659 SMASH Issue 44515 SMASH Issue 44691 SMASH Issue 44693 SMASH Issue 44698 SMASH Issue 45367 SMASH Issue 45388 SMASH Issue 46136 SMASH Issue 46137 SMASH Issue 46138 SMASH Issue 47337 SMASH Issue 47905 SMASH Issue 48577 SMASH Issue 52470 SMASH Issue 52476 SMASH Issue 53236 SMASH Issue 53878 SMASH Issue 54969 SMASH Issue 73595 SMASH Issue 87437 SMASH Issue 89804 SMASH Issue 91755 SMASH Issue 94554 SMASH Issue 95116 SMASH Issue 98234 SMASH Issue 99230 SMASH Issue 99567 SMASH Issue 99607 SMASH Issue 99768 SMASH Issue 99794 SMASH Issue 99968 SMASH Issue 99988 SMASH Issue 99990 SREASON:8189 SUSE:SUSE-SU-2012:0554 SUSE:SUSE-SU-2014:0775 SUSE:SUSE-SU-2014:0796 SUSE:SUSE-SU-2014:0837 SUSE:SUSE-SU-2014:1316 SUSE:SUSE-SU-2014:1319 SUSE:SUSE-SU-2015:0178 SUSE:SUSE-SU-2015:0481 SUSE:SUSE-SU-2015:0529 SUSE:SUSE-SU-2015:0652 SUSE:SUSE-SU-2015:0736 SUSE:SUSE-SU-2015:0812 SUSE:SUSE-SU-2015:1324 SUSE:SUSE-SU-2015:1489 SUSE:SUSE-SU-2015:1490 SUSE:SUSE-SU-2015:1592 SUSE:SUSE-SU-2015:1611 SUSE:openSUSE-SU-2014:0878 SUSE:openSUSE-SU-2014:0924 SUSE:openSUSE-SU-2015:0566 SUSE:openSUSE-SU-2015:0714 SUSE:openSUSE-SU-2015:1382 UBUNTU:CVE-2010-5313 UBUNTU:CVE-2011-1090 UBUNTU:CVE-2011-1163 UBUNTU:CVE-2011-1476 UBUNTU:CVE-2011-1494 UBUNTU:CVE-2011-1495 UBUNTU:CVE-2011-1585 UBUNTU:CVE-2011-4127 UBUNTU:CVE-2011-4132 UBUNTU:CVE-2012-2313 UBUNTU:CVE-2012-2319 UBUNTU:CVE-2012-3400 UBUNTU:CVE-2012-4398 UBUNTU:CVE-2012-6657 UBUNTU:CVE-2013-2147 UBUNTU:CVE-2013-2888 UBUNTU:CVE-2013-2889 UBUNTU:CVE-2013-2890 UBUNTU:CVE-2013-2891 UBUNTU:CVE-2013-2892 UBUNTU:CVE-2013-2893 UBUNTU:CVE-2013-2894 UBUNTU:CVE-2013-2895 UBUNTU:CVE-2013-2896 UBUNTU:CVE-2013-2897 UBUNTU:CVE-2013-2898 UBUNTU:CVE-2013-2899 UBUNTU:CVE-2013-2929 UBUNTU:CVE-2013-4299 UBUNTU:CVE-2013-6382 UBUNTU:CVE-2013-6405 UBUNTU:CVE-2013-7263 UBUNTU:CVE-2013-7421 UBUNTU:CVE-2014-0101 UBUNTU:CVE-2014-0131 UBUNTU:CVE-2014-0181 UBUNTU:CVE-2014-0206 UBUNTU:CVE-2014-1444 UBUNTU:CVE-2014-1445 UBUNTU:CVE-2014-1446 UBUNTU:CVE-2014-1739 UBUNTU:CVE-2014-1874 UBUNTU:CVE-2014-2309 UBUNTU:CVE-2014-3153 UBUNTU:CVE-2014-3181 UBUNTU:CVE-2014-3182 UBUNTU:CVE-2014-3184 UBUNTU:CVE-2014-3185 UBUNTU:CVE-2014-3186 UBUNTU:CVE-2014-3601 UBUNTU:CVE-2014-3610 UBUNTU:CVE-2014-3646 UBUNTU:CVE-2014-3647 UBUNTU:CVE-2014-3673 UBUNTU:CVE-2014-3687 UBUNTU:CVE-2014-3688 UBUNTU:CVE-2014-3690 UBUNTU:CVE-2014-3917 UBUNTU:CVE-2014-4027 UBUNTU:CVE-2014-4171 UBUNTU:CVE-2014-4508 UBUNTU:CVE-2014-4608 UBUNTU:CVE-2014-4611 UBUNTU:CVE-2014-4667 UBUNTU:CVE-2014-4943 UBUNTU:CVE-2014-5077 UBUNTU:CVE-2014-5206 UBUNTU:CVE-2014-5207 UBUNTU:CVE-2014-5471 UBUNTU:CVE-2014-5472 UBUNTU:CVE-2014-6410 UBUNTU:CVE-2014-7826 UBUNTU:CVE-2014-7841 UBUNTU:CVE-2014-7842 UBUNTU:CVE-2014-7970 UBUNTU:CVE-2014-7975 UBUNTU:CVE-2014-8133 UBUNTU:CVE-2014-8134 UBUNTU:CVE-2014-8160 UBUNTU:CVE-2014-8369 UBUNTU:CVE-2014-8709 UBUNTU:CVE-2014-8884 UBUNTU:CVE-2014-9090 UBUNTU:CVE-2014-9322 UBUNTU:CVE-2014-9419 UBUNTU:CVE-2014-9420 UBUNTU:CVE-2014-9644 UBUNTU:CVE-2014-9645 UBUNTU:CVE-2014-9728 UBUNTU:CVE-2014-9729 UBUNTU:CVE-2014-9730 UBUNTU:CVE-2014-9731 UBUNTU:CVE-2015-1593 UBUNTU:CVE-2015-1805 UBUNTU:CVE-2015-4167 UBUNTU:USN-1529-1 UBUNTU:USN-1555-1 UBUNTU:USN-1556-1 UBUNTU:USN-1557-1 UBUNTU:USN-1994-1 UBUNTU:USN-1996-1 UBUNTU:USN-1997-1 UBUNTU:USN-1999-1 UBUNTU:USN-2015-1 UBUNTU:USN-2016-1 UBUNTU:USN-2040-1 UBUNTU:USN-2041-1 UBUNTU:USN-2042-1 UBUNTU:USN-2043-1 UBUNTU:USN-2044-1 UBUNTU:USN-2045-1 UBUNTU:USN-2046-1 UBUNTU:USN-2066-1 UBUNTU:USN-2067-1 UBUNTU:USN-2109-1 UBUNTU:USN-2110-1 UBUNTU:USN-2128-1 UBUNTU:USN-2129-1 UBUNTU:USN-2133-1 UBUNTU:USN-2134-1 UBUNTU:USN-2135-1 UBUNTU:USN-2136-1 UBUNTU:USN-2137-1 UBUNTU:USN-2138-1 UBUNTU:USN-2139-1 UBUNTU:USN-2140-1 UBUNTU:USN-2141-1 UBUNTU:USN-2173-1 UBUNTU:USN-2174-1 UBUNTU:USN-2237-1 UBUNTU:USN-2240-1 UBUNTU:USN-2259-1 UBUNTU:USN-2261-1 UBUNTU:USN-2263-1 UBUNTU:USN-2264-1 UBUNTU:USN-2317-1 UBUNTU:USN-2318-1 UBUNTU:USN-2334-1 UBUNTU:USN-2335-1 UBUNTU:USN-2354-1 UBUNTU:USN-2355-1 UBUNTU:USN-2356-1 UBUNTU:USN-2357-1 UBUNTU:USN-2358-1 UBUNTU:USN-2359-1 UBUNTU:USN-2374-1 UBUNTU:USN-2375-1 UBUNTU:USN-2376-1 UBUNTU:USN-2377-1 UBUNTU:USN-2378-1 UBUNTU:USN-2379-1 UBUNTU:USN-2394-1 UBUNTU:USN-2415-1 UBUNTU:USN-2416-1 UBUNTU:USN-2417-1 UBUNTU:USN-2418-1 UBUNTU:USN-2419-1 UBUNTU:USN-2420-1 UBUNTU:USN-2421-1 UBUNTU:USN-2490-1 UBUNTU:USN-2491-1 UBUNTU:USN-2492-1 UBUNTU:USN-2493-1 UBUNTU:USN-2513-1 UBUNTU:USN-2514-1 UBUNTU:USN-2515-1 UBUNTU:USN-2516-1 UBUNTU:USN-2517-1 UBUNTU:USN-2518-1 UBUNTU:USN-2543-1 UBUNTU:USN-2544-1 UBUNTU:USN-2545-1 UBUNTU:USN-2546-1 UBUNTU:USN-2560-1 UBUNTU:USN-2564-1 UBUNTU:USN-2565-1 UBUNTU:USN-2679-1 UBUNTU:USN-2680-1 UBUNTU:USN-2681-1 XF:linux-kernel-cve20141444-info-disc(90443) XF:linux-kernel-cve20141445-info-disc(90444) XF:linux-kernel-cve20141446-info-disc(90445) XF:linux-kernel-cve20143601-dos(95689) XF:linux-kernel-cve20144943-priv-esc(94665) XF:linux-kernel-cve20145077-dos(95134) XF:linux-kernel-cve20145207-sec-bypass(95266) XF:linux-kernel-cve20145472-dos(95556) XF:linux-kernel-cve20147970-dos(96921) XF:linux-kernel-cve20147975-dos(96994) XF:linux-kernel-cve20148709-info-disclsoure(98922) XF:linux-kernel-isofs-bo(95481) bdo#1033297 bdo#618485 bdo#728705 bdo#766195 bnc#1210533 bnc#1210566 bnc#1210897 bnc#677286 bnc#679812 bnc#681175 bnc#681999 bnc#685402 bnc#687812 bnc#730118 bnc#730200 bnc#738400 bnc#758813 bnc#760902 bnc#769784 bnc#778463 bnc#779488 bnc#816099 bnc#823260 bnc#829110 bnc#835839 bnc#846404 bnc#846656 bnc#847652 bnc#853040 bnc#854722 bnc#856659 bnc#857643 bnc#863335 bnc#864401 bnc#864404 bnc#864409 bnc#864411 bnc#867531 bnc#867723 bnc#875051 bnc#876086 bnc#876594 bnc#877593 bnc#880484 bnc#880892 bnc#881008 bnc#882228 bnc#882639 bnc#882804 bnc#883223 bnc#883518 bnc#883724 bnc#883795 bnc#883948 bnc#883949 bnc#884324 bnc#885389 bnc#885422 bnc#887082 bnc#887597 bnc#889173 bnc#891689 bnc#892235 bnc#892490 bnc#892782 bnc#894213 bnc#895841 bnc#896382 bnc#896385 bnc#896390 bnc#896391 bnc#896392 bnc#896689 bnc#896779 bnc#897995 bnc#899192 bnc#899338 bnc#900392 bnc#900644 bnc#902232 bnc#902346 bnc#902349 bnc#902351 bnc#902675 bnc#903096 bnc#903640 bnc#904013 bnc#904659 bnc#904700 bnc#904876 bnc#905100 bnc#905312 bnc#905522 bnc#905739 bnc#905744 bnc#905748 bnc#905764 bnc#907196 bnc#907551 bnc#907611 bnc#907818 bnc#907822 bnc#908069 bnc#908550 bnc#908551 bnc#908572 bnc#908825 bnc#908926 bnc#909077 bnc#909078 bnc#909088 bnc#909092 bnc#909095 bnc#909264 bnc#909565 bnc#909740 bnc#909846 bnc#910013 bnc#910251 bnc#910321 bnc#911181 bnc#911325 bnc#911326 bnc#912171 bnc#912654 bnc#912705 bnc#913059 bnc#914355 bnc#914423 bnc#915209 bnc#915322 bnc#916515 bnc#917839 bnc#917884 bnc#918554 bnc#922980 bnc#924392 bnc#931125 bnc#959156 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1bb57e940e1958e40d51f2078f50c3a96a9b2d75 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1df2ae31c724e57be9d7ac00d78db8a5dabdd050 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1eafbfeb7bdf59cfe173304c76188f3fd5f1fd05 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1fd819ecb90cc9b822cd84d3056ddba315d3340f http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=206a81c18401c0cde6e579164f752c4b147324ce http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2172fa709ab32ca60e86179dc67d0857be8e2c98 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=26b87c7881006311828bb0ab271a551a62dcceb4 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=350b8bdd689cd2ab2c67c8a86a0be86cfa0751a7 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3cf521f7dc87c031617fd47e4b7aa2593c2f3daf http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3e10986d1d698140747fcfc2761ec9cb64c1d582 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=41bdc78544b8a93a9c6814b8bbbfef966272abbe http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4ff67b720c02c36e54d55b88c2931879b7db1cd2 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6817ae225cd650fb1c3295d769298c38b1eba818 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=844817e47eef14141cf59b8d5ac08dd11c0a9189 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a2b9e6c1a35afcc0973acb72e591c714e78885ff http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ad3e14d7c5268c2e24477c6ef54bbdf88add5d36 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=adee11b2085bee90bd8f4f52123ffb07882d6256 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b69040d8e39f20d5215a03502a8e8b4c6ab78395 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b769f49463711205d57286e64cf535ed4daf59e9 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c54def7bd64d7c0b6993336abcffb8444795bf38 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d974baa398f34393db76be45f7d4d04fbdbb4a0a http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=db29a9508a9246e77087c5531e45b2c88ec6988b http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e9e3d724e2145f5039b423c290ce2b2c3d8f94bc http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=edfbbf388f293d70bf4b7c0bc38774d05e6f711a http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=8762202dd0d6e46854f786bdb6fb3780a1625efe http://www.debian.org/security/2014/dsa-2949 https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html https://security.netapp.com/advisory/ntap-20240202-0004/ https://support.f5.com/csp/article/K17120?utm_source=f5support&%3Butm_medium=RSS https://www.debian.org/security/2023/dsa-5480 jsc#CAR-2540 linux.git:commit:0a9cd0a80ac559357c6a90d26c55270ed752aa26 linux.git:commit:0d0826019e529f21c84687521d03f60cd241ca7d linux.git:commit:0ef3a56b1c466629cd0bf482b09c7b0e5a085bb5 linux.git:commit:0fb6bd06e06792469acc15bbe427361b56ada528 linux.git:commit:10b5b5361a3c2a7fff9dbfa0f127adc2531e7732 linux.git:commit:1e87a2456b0227ca4ab881e19a11bb99d164e792 linux.git:commit:22e04f6b4b04a8afe9af9239224591d06ba3b24d linux.git:commit:297502abb32e225fb23801fcdb0e4f6f8e17099a linux.git:commit:29e8f59cf1ff91f2854563faddc5f61098cf4958 linux.git:commit:29fa6825463c97e5157284db80107d1bfac5d77b linux.git:commit:2d7a85f4b06e9c27ff629f07a524c48074f07f81 linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051 linux.git:commit:350b8bdd689cd2ab2c67c8a86a0be86cfa0751a7 linux.git:commit:380cf5ba6b0a0b307f4afb62b186ca801defb203 linux.git:commit:3d32e4dbe71374a6780eaf51d719d76f9a9bf22f linux.git:commit:412f30105ec6735224535791eed5cdc02888ecb4 linux.git:commit:41df7f6d43723deb7364340b44bc5d94bf717456 linux.git:commit:43622021d2e2b82ea03d883926605bdd0525e1d1 linux.git:commit:47ab1a2de42031021965b81cbab4f3b4c5696d07 linux.git:commit:4e7c22d447bb6d7e37bfe39ff658486ae78e8d77 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b linux.git:commit:554086d85e71f30abe46fc014fea31929a7c6a8a linux.git:commit:58f09e00ae095e46ef9edfcf3a5fd9ccdfad065e linux.git:commit:627aad1c01da6f881e7f98d71fd928ca0c316b1a linux.git:commit:78214e81a1bf43740ce89bb5efda78eac2f8ef83 linux.git:commit:786235eeba0e1e85e5cbbb9f97d1087ad03dfa21 linux.git:commit:8142b215501f8b291a108a202b3a053a265b03dd linux.git:commit:84fca9f38c5d646e95cdeef70e41cf15db549b95 linux.git:commit:854e8bb1aa06c578c2c9145fa6bfe3680ef63b23 linux.git:commit:875b4e3763dbc941f15143dd1a18d10bb0be303b linux.git:commit:8821f5dc187bdf16cfb32ef5aa8c3035273fa79a linux.git:commit:8e205f779d1443a94b5ae81aa359cb535dd3021e linux.git:commit:9446edb9a1740989cf6c20daf7510fb9a23be14a linux.git:commit:9e8910257397372633e74b333ef891f20c800ee4 linux.git:commit:a1480dcc3c706e309a88884723446f2e84fedd5b linux.git:commit:a642fc305053cc1c6e47e4f4df327895747ab485 linux.git:commit:cc6b54aa54bf40b762cab45a9fc8aa81653146eb linux.git:commit:ce9d7f7b45930ed16c512aabcfe651d44f1c8619 linux.git:commit:d049f74f2dbe71354d43d393ac3a188947811348 linux.git:commit:d1fc98ba961db83293f804a1037e905c03b301cf linux.git:commit:e6a623460e5fc960ac3ee9f946d3106233fd28d8 linux.git:commit:e9c243a5a6de0be8e584c604d353412584b592f8 linux.git:commit:e9c6a182649f4259db704ae15a91ac820e63b0ca linux.git:commit:e9de42d8eeffdc23af0144cafa9e3deacc489fb9 linux.git:commit:edfbbf388f293d70bf4b7c0bc38774d05e6f711a linux.git:commit:f8567a3845ac05bb28f3c1b478ef752762bd39ef linux.git:commit:fb21b84e7f809ef04b1e5aed5d463cf0d4866638 rh#1000137 rh#1000360 rh#1000373 rh#1000414 rh#1000429 rh#1000451 rh#1000474 rh#1000494 rh#1000519 rh#1000536 rh#1004233 rh#1007690 rh#1007939 rh#1028148 rh#1033603 rh#1035875 rh#1039845 rh#1053610 rh#1053613 rh#1053620 rh#1062356 rh#1067558 rh#1070618 rh#1070705 rh#1074471 rh#1074589 rh#1094232 rh#1094265 rh#1094602 rh#1102571 rh#1103626 rh#1108744 rh#1109774 rh#1111180 rh#1111590 rh#1112436 rh#1113406 rh#1113409 rh#1113445 rh#1113470 rh#1113899 rh#1113967 rh#1119458 rh#1122982 rh#1129662 rh#1131951 rh#1134099 rh#1141173 rh#1141210 rh#1141391 rh#1141400 rh#1141407 rh#1141742 rh#1141809 rh#1144825 rh#1144883 rh#1147850 rh#1151095 rh#1151108 rh#1153322 rh#1155731 rh#1155745 rh#1156518 rh#1163087 rh#1163762 rh#1163792 rh#1164266 rh#1170691 rh#1172765 rh#1172797 rh#1172806 rh#1173580 rh#1175235 rh#1177260 rh#1182059 rh#1183744 rh#1185469 rh#1185707 rh#1190546 rh#1192519 rh#1202855 rh#1205079 rh#1228204 rh#1228220 rh#1228229 rh#1243852 rh#1303961 rh#1384344 rh#1495089 rh#1519780 rh#2061700 rh#2116175 rh#2119127 rh#2162080 rh#2162082 rh#2162084 rh#2162087 rh#2187308 rh#562582 rh#606611 rh#620300 rh#621435 rh#624327 rh#625688 rh#627440 rh#630551 rh#630804 rh#631623 rh#638085 rh#640036 rh#651264 rh#651892 rh#652508 rh#652529 rh#652534 rh#652957 rh#682641 rh#688021 rh#694021 rh#697394 rh#722393 rh#736425 rh#742846 rh#752375 rh#753341 rh#794557 rh#814278 rh#818820 rh#819471 rh#822754 rh#843139 rh#853474 rh#916646 rh#917012 rh#917013 rh#917017 rh#971242 rh#999890 rh#999960 |
CVE-2023-2006 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-2006 SMASH Issue 363441 ZDI-23-439 bnc#1210447 bnc#1210457 https://github.com/torvalds/linux/commit/3bcd6c7eaa53 https://security.netapp.com/advisory/ntap-20230609-0004/ https://www.zerodayinitiative.com/advisories/ZDI-23-439/ rh#2189112 |
CVE-2023-2007 | kernel-source-rt:Won't fix | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N) | CVE-2023-2007 D:CVE-2023-2007 DSA-5480 SMASH Issue 363438 ZDI-23-440 bnc#1210448 https://github.com/torvalds/linux/commit/b04e75a4a8a81887386a0d2dbf605a48e779d2a0 https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html https://security.netapp.com/advisory/ntap-20240119-0011/ https://www.debian.org/security/2023/dsa-5480 jsc#CAR-2529 rh#2208311 |
CVE-2023-2008 | kernel-source-rt:Ignore | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-2008 RHSA-2022:7933 RHSA-2022:8267 RHSA-2023:3465 RHSA-2023:3470 RHSA-2023:3490 SMASH Issue 363435 ZDI-23-441 bnc#1210453 https://bugzilla.redhat.com/show_bug.cgiid=2186862 https://github.com/torvalds/linux/commit/05b252cccb2e5c3f56119d25de684b4f810ba4 https://security.netapp.com/advisory/ntap-20230517-0007/ https://www.zerodayinitiative.com/advisories/ZDI-23-441/ jsc#CAR-2530 rh#2186862 |
CVE-2023-2019 | kernel-source-rt:Not affected | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-2019 SMASH Issue 363434 ZDI-23-442 bnc#1210454 https://github.com/torvalds/linux/commit/180a6a3ee60a https://www.zerodayinitiative.com/advisories/ZDI-CAN-17811/ rh#2189137 |
CVE-2023-20569 | kernel-source-rt:Released | moderate | 5.6 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N) | CVE-2023-20569 DSA-5475 OSS:2023/08/08/4 OSS:2023/Q3/97 SMASH Issue 372385 SMASH Issue 372386 bnc#1213287 bnc#1214082 http://xenbits.xen.org/xsa/advisory-434.html https://comsec.ethz.ch/research/microarch/inception/ https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4E4TZNMLYL2KETY23IPA43QXFAVJ46V/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKK3IA63LSKM4EC3TN4UM6DDEIOWEQIG/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/ https://security.netapp.com/advisory/ntap-20240605-0006/ https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7005 https://www.debian.org/security/2023/dsa-5475 jsc#CAR-2834 rh#2207625 |
CVE-2023-20583 | kernel-source-rt:Analysis | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2023-20583 SMASH Issue 373919 bnc#1213892 https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7006 rh#2228322 |
CVE-2023-20588 | kernel-source-rt:Analysis | moderate | 6 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N) | CVE-2023-20588 DSA-5480 DSA-5492 MISC:git.kernel.org:OSS:2023/09/25/4 MISC:git.kernel.org:OSS:2023/09/25/7 MISC:github.com:OSS:2023/10/03/12 OSS:2023/09/25/3 OSS:2023/09/25/4 OSS:2023/09/25/5 OSS:2023/09/25/7 OSS:2023/09/25/8 OSS:2023/09/26/5 OSS:2023/09/26/8 OSS:2023/09/26/9 OSS:2023/09/27/1 OSS:2023/10/03/12 OSS:2023/10/03/13 OSS:2023/10/03/14 OSS:2023/10/03/15 OSS:2023/10/03/16 OSS:2023/10/03/9 OSS:2023/10/04/1 OSS:2023/10/04/2 OSS:2023/10/04/3 OSS:2023/10/04/4 OSS:2023/Q3/220 OSS:2023/Q3/222 SMASH Issue 374081 SMASH Issue 374082 bnc#1213927 bnc#1215474 http://xenbits.xen.org/xsa/advisory-439.html https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGZCACEHT6ZZZGG36QQMGROBM4FLWYJX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIOYP4ZOBML4RCUM3MHRFZUQL445MZM3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJTUVYZMP6BNF342DS3W7XGOGXC6JPN5/ https://security.netapp.com/advisory/ntap-20240531-0005/ https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7007 https://www.debian.org/security/2023/dsa-5480 https://www.debian.org/security/2023/dsa-5492 rh#2230125 |
CVE-2023-20593 | kernel-source-rt:Released | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) | CVE-2023-20593 DSA-5459 DSA-5461 DSA-5462 L3:66447 L3:66852 MISC:git.kernel.org:OSS:2023/07/24/3 MISC:git.kernel.org:OSS:2023/07/25/17 MISC:git.kernel.org:OSS:2023/07/25/6 MISC:git.kernel.org:OSS:2023/09/25/4 MISC:git.kernel.org:OSS:2023/09/25/7 MISC:github.com:OSS:2023/07/26/1 OSS:2023/07/24/3 OSS:2023/07/25/1 OSS:2023/07/25/12 OSS:2023/07/25/13 OSS:2023/07/25/14 OSS:2023/07/25/15 OSS:2023/07/25/16 OSS:2023/07/25/17 OSS:2023/07/25/5 OSS:2023/07/25/6 OSS:2023/07/26/1 OSS:2023/07/31/2 OSS:2023/08/08/6 OSS:2023/08/08/7 OSS:2023/08/08/8 OSS:2023/08/16/4 OSS:2023/08/16/5 OSS:2023/09/14/1 OSS:2023/09/22/11 OSS:2023/09/22/9 OSS:2023/09/25/4 OSS:2023/09/25/7 OSS:2023/Q3/215 OSS:2023/Q3/59 OSS:2023/Q3/80 OSS:2023/Q3/86 RHSA-2023:4696 RHSA-2023:4699 RHSA-2023:4789 RHSA-2023:4819 RHSA-2023:4821 RHSA-2023:5068 RHSA-2023:5069 RHSA-2023:5091 RHSA-2023:5244 RHSA-2023:5245 RHSA-2023:5255 RHSA-2023:5419 RHSA-2023:5591 RHSA-2023:5607 SMASH Issue 372383 SMASH Issue 372384 bdo#1041863 bnc#1213286 bnc#1213616 bnc#1213877 http://seclists.org/fulldisclosure/2023/Jul/43 http://xenbits.xen.org/xsa/advisory-433.html https://cmpxchg8b.com/zenbleed.html https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html https://lists.debian.org/debian-lts-announce/2023/07/msg00033.html https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP6WQO3CDPLE5O635N7TAL5KCZ6HZ4FE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD2G74BXS2SWOE3FIQJ6X76S3A7PDGML/ https://security.netapp.com/advisory/ntap-20240531-0004/ https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7008 https://www.debian.org/security/2023/dsa-5459 https://www.debian.org/security/2023/dsa-5461 https://www.debian.org/security/2023/dsa-5462 jsc#CAR-2762 rh#2217845 |
CVE-2023-20941 | kernel-source-rt:Not affected | moderate | () | CVE-2023-20941 D:CVE-2023-20941 SMASH Issue 364040 bnc#1210676 https://source.android.com/security/bulletin/2023-04-01 |
CVE-2023-21102 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-21102 RHSA-2023:5069 RHSA-2023:5091 SMASH Issue 366599 bnc#1212155 bnc#1212346 https://source.android.com/security/bulletin/2023-05-01 rh#2213455 |
CVE-2023-21106 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-21106 SMASH Issue 366602 bnc#1211654 bnc#1211655 https://source.android.com/security/bulletin/2023-05-01 rh#2209238 |
CVE-2023-2124 | kernel-source-rt:Released | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-2124 DSA-5448 DSA-5480 OSS:2023/Q2/62 RHSA-2023:3708 RHSA-2023:3723 RHSA-2023:4137 RHSA-2023:4138 RHSA-2023:4515 RHSA-2023:4517 RHSA-2023:4541 RHSA-2023:4789 RHSA-2023:4815 RHSA-2023:4817 RHSA-2023:4961 RHSA-2023:4962 SMASH Issue 363666 bnc#1210498 bnc#1211903 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/xfs/xfs_buf_item_recover.c?h=v6.4-rc1&id=22ed903eee23a5b174e240f1cdfa9acf393a5210 https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html https://security.netapp.com/advisory/ntap-20230622-0010/ https://syzkaller.appspot.com/bug?extid=7e9494b8b399902e994e https://www.debian.org/security/2023/dsa-5448 https://www.debian.org/security/2023/dsa-5480 jsc#CAR-2541 rh#2187439 |
CVE-2023-21264 | kernel-source-rt:Not affected | moderate | () | CVE-2023-21264 SMASH Issue 375319 bnc#1214289 https://android.googlesource.com/kernel/common/+/53625a846a7b4 https://android.googlesource.com/kernel/common/+/b35a06182451f https://source.android.com/security/bulletin/2023-08-01 |
CVE-2023-2137 | sqlite3:Analysis | important | 8.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) | CVE-2023-2137 DSA-5393 L3:67661 L3:67667 SMASH Issue 363978 bnc#1210660 bnc#1220063 bnc#1220115 https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop_18.html https://crbug.com/1430644 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4AOSGAOPXLBK4A5ZRTVZ4M6QKVLSWMWG/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ES2CDRHR2Y4WY6DNDIAPYZFXJU3ZBFAV/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FEJZMAUB4XP44HSHEBDWEKFGA7DUHY42/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHHD6KNH4WLUE6JG6HRQZWNAJMHJ32X7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RJQI63HWZFL6M26Q6UOHKDY6LD2PFC5Z/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLO7BL2MHZYPY6O3OAEAQL3SKYMGGO6M/ https://security.gentoo.org/glsa/202309-17 https://www.debian.org/security/2023/dsa-5393 rh#2187899 |
CVE-2023-21400 | kernel-source-rt:Not affected | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-21400 DSA-5480 OSS:2023/07/14/2 OSS:2023/07/19/2 OSS:2023/07/19/7 OSS:2023/07/25/7 OSS:2023/Q3/38 SMASH Issue 372327 bnc#1213272 http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=788d0824269bef539fe31a785b1517882eafed93 https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html https://security.netapp.com/advisory/ntap-20240119-0012/ https://source.android.com/security/bulletin/pixel/2023-07-01 https://www.debian.org/security/2023/dsa-5480 rh#2222087 |
CVE-2023-2156 | kernel-source-rt:Not affected | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-2156 D:CVE-2023-2156 DSA-5448 DSA-5453 L3:66616 OSS:2023/05/17/8 OSS:2023/05/17/9 OSS:2023/05/18/1 OSS:2023/05/19/1 OSS:2023/Q2/172 SMASH Issue 365193 ZDI-23-547 bnc#1211131 bnc#1211395 bnc#1214541 https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html https://security.netapp.com/advisory/ntap-20230622-0001/ https://www.debian.org/security/2023/dsa-5448 https://www.debian.org/security/2023/dsa-5453 https://www.zerodayinitiative.com/advisories/ZDI-23-547/ linux.git:commit:a2f4c143d76b1a47c91ef9bc46907116b111da0b rh#2196292 |
CVE-2023-2162 | kernel-source-rt:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-2162 L3:65763 L3:66431 L3:66432 L3:66491 L3:66496 L3:66505 L3:67104 L3:67931 SMASH Issue 363819 bnc#1210647 bnc#1210662 https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html https://www.spinics.net/lists/linux-scsi/msg181542.html jsc#CAR-2545 rh#2187773 |
CVE-2023-2163 | kernel-source-rt:Released | important | 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N) | CVE-2023-2163 SMASH Issue 379444 bnc#1215518 bnc#1215519 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=71b547f561247897a0a14f3082730156c0533fed jsc#CAR-2910 rh#2240249 |
CVE-2023-21636 | kernel-source-rt:Not affected | important | () | CVE-2023-21636 SMASH Issue 377231 bnc#1215069 https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin |
CVE-2023-2166 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-2166 D:CVE-2023-2166 SMASH Issue 363822 bnc#1210627 https://lore.kernel.org/lkml/CAO4mrfcV_07hbj8NUuZrA8FH-kaRsrFy-2metecpTuE5kKHn5w@mail.gmail.com/ rh#2187813 |
CVE-2023-2176 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-2176 L3:66432 L3:66491 L3:66496 L3:67104 SMASH Issue 363981 bnc#1210629 bnc#1210630 https://security.netapp.com/advisory/ntap-20230609-0005/ https://www.spinics.net/lists/linux-rdma/msg114749.html jsc#CAR-2654 rh#2187931 |
CVE-2023-2177 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-2177 RHSA-2023:2148 RHSA-2023:2458 RHSA-2023:2736 RHSA-2023:2951 SMASH Issue 363988 bnc#1210643 https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=181d8d2066c0 jsc#CAR-2546 rh#2187953 |
CVE-2023-2194 | kernel-source-rt:Ignore | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L) | CVE-2023-2194 RHSA-2023:3708 RHSA-2023:3723 RHSA-2023:4517 RHSA-2023:4541 SMASH Issue 364113 bnc#1210715 https://github.com/torvalds/linux/commit/92fbb6d1296f https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html jsc#CAR-2547 rh#2188396 |
CVE-2023-22024 | kernel-source-rt:Not affected | moderate | () | CVE-2023-22024 SMASH Issue 379541 bnc#1215615 https://linux.oracle.com/cve/CVE-2023-22024.html |
CVE-2023-2222 | binutils:Analysis | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CVE-2023-2222 L3:66802 SMASH Issue 364165 bnc#1210733 bnc#1215431 rh#2188562 |
CVE-2023-2235 | kernel-source-rt:Already fixed | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-2235 D:CVE-2023-2235 RHSA-2023:3705 RHSA-2023:3708 RHSA-2023:3723 RHSA-2023:4137 RHSA-2023:4138 RHSA-2023:4517 RHSA-2023:4541 RHSA-2023:5627 SMASH Issue 364832 bnc#1210986 bnc#1210987 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fd0815f632c24878e325821943edccc7fde947a2 https://kernel.dance/fd0815f632c24878e325821943edccc7fde947a2 https://security.netapp.com/advisory/ntap-20230609-0002/ jsc#CAR-2559 rh#2192589 |
CVE-2023-2236 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-2236 D:CVE-2023-2236 SMASH Issue 364833 bnc#1210990 bnc#1210991 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9d94c04c0db024922e886c9fd429659f22f48ea4 https://kernel.dance/9d94c04c0db024922e886c9fd429659f22f48ea4 https://security.netapp.com/advisory/ntap-20230601-0010/ rh#2196759 |
CVE-2023-22387 | kernel-source-rt:Ignore | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-22387 SMASH Issue 371182 bnc#1212971 https://www.qualcomm.com/company/product-security/bulletins/july-2023-bulletin |
CVE-2023-2248 | kernel-source-rt:Won't fix | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-2248 D:CVE-2023-2248 DSA-5402 L3:65968 SMASH Issue 364834 ZDI-24-593 bnc#1210988 bnc#1210989 bnc#1211260 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3037933448f60f9acb705997eae62013ecb81e0d https://kernel.dance/3037933448f60f9acb705997eae62013ecb81e0d jsc#CAR-2562 linux.git:commit:3e337087c3b5805fe0b8a46ba622a962880b5d64 rh#2192671 rh#2226780 |
CVE-2023-2269 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-2269 D:CVE-2023-2269 DSA-5448 DSA-5480 SMASH Issue 364413 bnc#1210806 https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63AJUCJTZCII2JMAF7MGZEM66KY7IALT/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FBLBKW2WM5YSTS6OGEU5SYHXSJ5EWSTV/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IXHBLWYNSUBS77TYPOJTADPDXKBH2F4U/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/63AJUCJTZCII2JMAF7MGZEM66KY7IALT/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FBLBKW2WM5YSTS6OGEU5SYHXSJ5EWSTV/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXHBLWYNSUBS77TYPOJTADPDXKBH2F4U/ https://lore.kernel.org/lkml/ZD1xyZxb3rHot8PV%40redhat.com/t/ https://lore.kernel.org/lkml/ZD1xyZxb3rHot8PV@redhat.com/t/ https://security.netapp.com/advisory/ntap-20230929-0004/ https://www.debian.org/security/2023/dsa-5448 https://www.debian.org/security/2023/dsa-5480 jsc#CAR-2548 rh#2189388 |
CVE-2023-22995 | kernel-source-rt:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2023-22995 D:CVE-2023-22995 SMASH Issue 358646 bnc#1208741 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17 https://github.com/torvalds/linux/commit/fa0ef93868a6062babe1144df2807a8b1d4924d2 https://security.netapp.com/advisory/ntap-20230331-0004/ jsc#CAR-2407 rh#2174458 |
CVE-2023-22996 | kernel-source-rt:Not affected | moderate | 6 (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H) | CVE-2023-22996 MISC:cdn.kernel.org:CVE-2022-30594 SMASH Issue 358816 bnc#1208781 https://github.com/torvalds/linux/commit/4b41a9d0fe3db5f91078a380f62f0572c3ecf2dd rh#2182398 |
CVE-2023-22997 | kernel-source-rt:Not affected | low | 4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H) | CVE-2023-22997 SMASH Issue 358817 bnc#1208782 https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.2 https://github.com/torvalds/linux/commit/45af1d7aae7d5520d2858f8517a1342646f015db rh#2182422 |
CVE-2023-22998 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-22998 RHSA-2023:2148 RHSA-2023:2458 RHSA-2023:2736 RHSA-2023:2951 SMASH Issue 358818 bnc#1208776 https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0.3 https://github.com/torvalds/linux/commit/c24968734abfed81c8f93dc5f44a7b7a9aecadfa https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html rh#2182429 |
CVE-2023-22999 | kernel-source-rt:Not affected | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CONFIRM:cdn.kernel.org:CVE-2021-44879 CVE-2023-22999 SMASH Issue 358819 bnc#1208785 https://github.com/torvalds/linux/commit/b52fe2dbb3e655eb1483000adfab68a219549e13 rh#2182395 |
CVE-2023-23000 | kernel-source-rt:Released | low | 2.9 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) | CVE-2023-23000 SMASH Issue 358958 bnc#1208816 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17 https://github.com/torvalds/linux/commit/045a31b95509c8f25f5f04ec5e0dec5cd09f2c5f https://security.netapp.com/advisory/ntap-20230331-0004/ jsc#CAR-2399 rh#2182435 |
CVE-2023-23001 | kernel-source-rt:Not affected | low | 2.9 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) | CONFIRM:cdn.kernel.org:CVE-2021-44879 CVE-2023-23001 SMASH Issue 358963 bnc#1208829 https://github.com/torvalds/linux/commit/3ba880a12df5aa4488c18281701b5b1bc3d4531a rh#2182473 |
CVE-2023-23002 | kernel-source-rt:Not affected | moderate | 4.2 (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:cdn.kernel.org:CVE-2021-44879 CVE-2023-23002 SMASH Issue 358964 bnc#1208840 https://github.com/torvalds/linux/commit/6845667146a28c09b5dfc401c1ad112374087944 rh#2182493 |
CVE-2023-23003 | kernel-source-rt:Not affected | low | 4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H) | CVE-2023-23003 SMASH Issue 358965 bnc#1208842 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16 https://github.com/torvalds/linux/commit/0a515a06c5ebfa46fee3ac519e418f801e718da4 https://security.netapp.com/advisory/ntap-20230331-0003/ rh#2182662 |
CVE-2023-23004 | kernel-source-rt:Released | low | 4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H) | CVE-2023-23004 MISC:cdn.kernel.org:CVE-2022-39188 SMASH Issue 358966 bnc#1208843 https://github.com/torvalds/linux/commit/15342f930ebebcfe36f2415049736a77d7d2e045 https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html rh#2182680 |
CVE-2023-23005 | kernel-source-rt:Not affected | low | 0 (CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:N) | CVE-2023-23005 SMASH Issue 358967 bnc#1208844 https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2 https://github.com/torvalds/linux/commit/4a625ceee8a0ab0273534cb6b432ce6b331db5ee rh#2182689 |
CVE-2023-23006 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H) | CVE-2023-23006 SMASH Issue 358968 bnc#1208845 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.13 https://github.com/torvalds/linux/commit/6b8b42585886c59a008015083282aae434349094 rh#2182726 |
CVE-2023-23039 | kernel-source-rt:Not affected | moderate | () | CVE-2023-23039 D:CVE-2023-23039 SMASH Issue 357928 bnc#1208641 https://lkml.org/lkml/2023/1/1/169 rh#2174866 |
CVE-2023-23454 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-0590 CVE-2023-23454 CVE-2023-23455 DSA-5324 L3:65098 L3:65173 L3:65176 L3:65185 L3:65224 L3:65237 L3:65449 L3:65869 L3:65871 L3:65876 L3:65879 L3:65952 L3:66496 L3:67104 MISC:git.kernel.org:/pub/scm/linux/kernel/git/torvalds/linux.git/commit/ OSS:2023/01/10/1 OSS:2023/01/10/4 RHSA-2023:2148 RHSA-2023:2458 RHSA-2023:2736 RHSA-2023:2951 RHSA-2023:5627 SMASH Issue 353573 bnc#1207036 bnc#1207125 bnc#1207188 bnc#1207189 bnc#1207657 bnc#1207795 bnc#1207822 bnc#1208342 bnc#1208355 https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html https://lore.kernel.org/all/20221018203258.2793282-1-edumazet%40google.com/ https://lore.kernel.org/all/20221018203258.2793282-1-edumazet@google.com/ jsc#CAR-2288 jsc#CAR-2292 jsc#CAR-2329 rh#2150953 rh#2150979 rh#2165741 rh#2168297 rh#2168332 |
CVE-2023-23455 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-0590 CVE-2023-23454 CVE-2023-23455 DSA-5324 L3:65098 L3:65173 L3:65176 L3:65185 L3:65224 L3:65237 L3:65449 L3:65869 L3:65871 L3:65876 L3:65879 L3:65952 L3:66496 L3:67104 MISC:git.kernel.org:/pub/scm/linux/kernel/git/torvalds/linux.git/commit/ OSS:2023/01/10/1 OSS:2023/01/10/4 RHSA-2023:2148 RHSA-2023:2458 RHSA-2023:2736 RHSA-2023:2951 RHSA-2023:5627 SMASH Issue 353572 SMASH Issue 353573 bnc#1207036 bnc#1207125 bnc#1207188 bnc#1207189 bnc#1207657 bnc#1207795 bnc#1207822 bnc#1208342 bnc#1208355 https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html https://lore.kernel.org/all/20221018203258.2793282-1-edumazet%40google.com/ https://lore.kernel.org/all/20221018203258.2793282-1-edumazet@google.com/ jsc#CAR-2288 jsc#CAR-2292 jsc#CAR-2329 rh#2150953 rh#2150979 rh#2165741 rh#2168297 rh#2168332 |
CVE-2023-23559 | kernel-source-rt:Released | moderate | 6.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L) | CVE-2023-23559 L3:66496 L3:67104 MISC:patchwork.kernel.org:/project/linux-wireless/patch/20230110173007.57110-1-szymon.heidrich@gmail.com/ SMASH Issue 353426 SMASH Issue 353645 bnc#1207051 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b870e73a56c4cccbec33224233eaf295839f228c https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html https://patchwork.kernel.org/project/linux-wireless/patch/20230110173007.57110-1-szymon.heidrich%40gmail.com/ https://security.netapp.com/advisory/ntap-20230302-0003/ jsc#CAR-2291 rh#2170114 |
CVE-2023-23586 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2023-23586 MISC:git.kernel.org:/pub/scm/linux/kernel/git/stable/linux.git/commit/io_uring MISC:kernel.dance:/ SMASH Issue 357583 bnc#1208474 rh#2174754 |
CVE-2023-23914 | curl:Not affected | important | 7.4 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N) | CVE-2023-23914 CVE-2023-23915 OSS:2023/Q1/98 OSS:2023/Q1/99 Oracle:CVE-2023-23914 RHSA-2023:3354 RHSA-2023:3355 SMASH Issue 356339 SMASH Issue 356340 SMASH Issue 356341 bnc#1207990 bnc#1207991 https://hackerone.com/reports/1813864 https://hackerone.com/reports/1826048 https://hackerone.com/reports/1874716 https://security.gentoo.org/glsa/202310-12 https://security.netapp.com/advisory/ntap-20230309-0006/ rh#2167797 rh#2167813 |
CVE-2023-23915 | curl:Not affected | important | 7.4 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N) | CVE-2023-23914 CVE-2023-23915 OSS:2023/Q1/98 OSS:2023/Q1/99 Oracle:CVE-2023-23914 RHSA-2023:3354 RHSA-2023:3355 SMASH Issue 356341 bnc#1207991 https://hackerone.com/reports/1826048 https://hackerone.com/reports/1874716 https://security.gentoo.org/glsa/202310-12 https://security.netapp.com/advisory/ntap-20230309-0006/ rh#2167797 rh#2167813 |
CVE-2023-23916 | curl:Released, curl-mini:Released | moderate | 6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CONFIRM:cert-portal.siemens.com:/productcert/pdf/ssa-333517.pdf CONFIRM:cert-portal.siemens.com:CVE-2021-22924 CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2021-22926 CONFIRM:security.netapp.com:CVE-2021-22947 CONFIRM:security.netapp.com:CVE-2022-21380 CONFIRM:security.netapp.com:CVE-2022-27776 CONFIRM:security.netapp.com:CVE-2022-30115 CONFIRM:security.netapp.com:CVE-2022-32208 CONFIRM:support.apple.com:CVE-2022-0158 CONFIRM:support.apple.com:CVE-2022-1725 CVE-2021-22898 CVE-2021-22924 CVE-2021-22945 CVE-2021-22946 CVE-2021-22947 CVE-2022-22576 CVE-2022-27774 CVE-2022-27775 CVE-2022-27776 CVE-2022-27781 CVE-2022-27782 CVE-2022-32205 CVE-2022-32206 CVE-2022-32207 CVE-2022-32208 CVE-2023-23916 CVE-2023-27538 D:CVE-2022-27774 DSA-5197 DSA-5365 FEDORA:FEDORA-2021-1d24845e93 FEDORA:FEDORA-2021-5d21b90a30 FEDORA:FEDORA-2021-83fdddca0f FEDORA:FEDORA-2021-fc96a3a749 FEDORA:FEDORA-2022-1b3d7f6973 FEDORA:FEDORA-2022-bca2c95559 FEDORA:FEDORA-2022-f83aec6d57 FULLDISC:20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3 FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 GLSA-202212-01 L3:64216 L3:64537 MISC:cert-portal.siemens.com:CVE-2022-32262 MISC:curl.se:MLIST:[oss-security] 20210721 [SECURITY ADVISORY] curl: TELNET stack contents disclosure again MISC:curl.se:OSS:2021/Q3/166 MISC:curl.se:OSS:2021/Q3/167 MISC:curl.se:OSS:2021/Q3/168 MISC:curl.se:OSS:2021/Q3/26 MISC:curl.se:OSS:2022/Q2/209 MISC:curl.se:OSS:2022/Q2/210 MISC:curl.se:OSS:2022/Q2/211 MISC:curl.se:OSS:2022/Q2/212 MISC:curl.se:OSS:2022/Q2/61 MISC:curl.se:OSS:2022/Q2/62 MISC:curl.se:OSS:2022/Q2/63 MISC:curl.se:OSS:2022/Q2/64 MISC:curl.se:OSS:2022/Q2/95 MISC:curl.se:OSS:2022/Q2/96 MISC:github.com:MLIST:[oss-security] 20210721 [SECURITY ADVISORY] curl: TELNET stack contents disclosure again MISC:github.com:OSS:2021/Q2/165 MISC:github.com:OSS:2021/Q3/166 MISC:github.com:OSS:2021/Q3/167 MISC:github.com:OSS:2021/Q3/168 MISC:github.com:OSS:2021/Q3/26 MISC:github.com:OSS:2023/02/15/3 MISC:github.com:OSS:2023/03/20/6 MISC:hackerone.com:CVE-2021-22898 MISC:hackerone.com:CVE-2021-22924 MISC:hackerone.com:CVE-2021-22945 MISC:hackerone.com:CVE-2021-22946 MISC:hackerone.com:CVE-2021-22947 MISC:hackerone.com:CVE-2022-22576 MISC:hackerone.com:CVE-2022-27774 MISC:hackerone.com:CVE-2022-27775 MISC:hackerone.com:CVE-2022-27776 MISC:hackerone.com:CVE-2022-27781 MISC:hackerone.com:CVE-2022-27782 MISC:hackerone.com:CVE-2022-32205 MISC:hackerone.com:CVE-2022-32206 MISC:hackerone.com:CVE-2022-32207 MISC:hackerone.com:CVE-2022-32208 MISC:www.oracle.com:CVE-2021-35666 MISC:www.oracle.com:CVE-2022-21403 MISC:www.oracle.com:CVE-2022-21498 MISC:www.oracle.com:CVE-2022-21586 MLIST:[debian-lts-announce] 20210813 [SECURITY] [DLA 2734-1] curl security update MLIST:[debian-lts-announce] 20210930 [SECURITY] [DLA 2773-1] curl security update MLIST:[debian-lts-announce] 20220828 [SECURITY] [DLA 3085-1] curl security update MLIST:[debian-lts-announce] 20230128 [SECURITY] [DLA 3288-1] curl security update MLIST:[guacamole-issues] 20210618 [jira] [Created] (GUACAMOLE-1368) Latest docker image fails security scans. MLIST:[kafka-dev] 20210831 Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image MLIST:[kafka-dev] 20210901 Re: [EXTERNAL] Re: Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image MLIST:[kafka-users] 20210831 Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image MLIST:[kafka-users] 20210901 Re: [EXTERNAL] Re: Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image MLIST:[oss-security] 20210721 [SECURITY ADVISORY] curl: TELNET stack contents disclosure again N/A:N/A OSS:2021/Q2/165 OSS:2021/Q3/166 OSS:2021/Q3/167 OSS:2021/Q3/168 OSS:2021/Q3/26 OSS:2021/Q3/27 OSS:2022/Q2/209 OSS:2022/Q2/210 OSS:2022/Q2/211 OSS:2022/Q2/212 OSS:2022/Q2/61 OSS:2022/Q2/62 OSS:2022/Q2/63 OSS:2022/Q2/64 OSS:2022/Q2/95 OSS:2022/Q2/96 OSS:2023/02/15/3 OSS:2023/03/20/6 OSS:2023/Q1/100 Oracle:CVE-2018-1000007 Oracle:CVE-2021-22946 Oracle:CVE-2022-27782 Oracle:CVE-2022-32206 Oracle:CVE-2022-32207 Oracle:CVE-2023-23916 RHSA-2021:3582 RHSA-2021:4059 RHSA-2021:4511 RHSA-2022:0635 RHSA-2022:1354 RHSA-2022:5245 RHSA-2022:5313 RHSA-2022:6157 RHSA-2022:6159 RHSA-2022:8299 RHSA-2022:8840 RHSA-2022:8841 RHSA-2023:1140 RHSA-2023:1701 RHSA-2023:1842 RHSA-2023:3354 RHSA-2023:3355 RHSA-2023:3460 RHSA-2023:4139 SMASH Issue 284454 SMASH Issue 303768 SMASH Issue 309114 SMASH Issue 309781 SMASH Issue 309783 SMASH Issue 329490 SMASH Issue 329491 SMASH Issue 329695 SMASH Issue 329920 SMASH Issue 330789 SMASH Issue 330791 SMASH Issue 335197 SMASH Issue 335198 SMASH Issue 335201 SMASH Issue 335203 SMASH Issue 356343 SMASH Issue 356344 bdo#1010252 bdo#1010253 bdo#1010254 bdo#1010295 bdo#989228 bdo#991492 bnc#1186114 bnc#1188219 bnc#1190213 bnc#1190373 bnc#1190374 bnc#1198608 bnc#1198614 bnc#1198723 bnc#1198766 bnc#1199223 bnc#1199224 bnc#1200734 bnc#1200735 bnc#1200736 bnc#1200737 bnc#1207992 https://hackerone.com/reports/1826048 https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E https://lists.debian.org/debian-lts-announce/2023/02/msg00035.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7N5ZBWLNNPZKFK7Q4KEHGCJ2YELQEUJP/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BQKE6TXYDHOTFHLTBZ5X73GTKI7II5KO/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKKOQXPYLMBSEVDHFS32BPBR3ZQJKY5B/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BQKE6TXYDHOTFHLTBZ5X73GTKI7II5KO/ https://security.gentoo.org/glsa/202310-12 https://security.netapp.com/advisory/ntap-20230309-0006/ https://www.debian.org/security/2023/dsa-5365 jsc#CAR-1052 jsc#CAR-1053 jsc#CAR-1715 jsc#CAR-1716 jsc#CAR-1717 jsc#CAR-1718 jsc#CAR-1767 jsc#CAR-1768 jsc#CAR-1873 jsc#CAR-1874 jsc#CAR-2379 jsc#CAR-642 jsc#CAR-990 rh#1955316 rh#1964887 rh#1970902 rh#1981460 rh#2001527 rh#2003175 rh#2003191 rh#2077541 rh#2077547 rh#2078388 rh#2078408 rh#2082204 rh#2082215 rh#2099296 rh#2099300 rh#2099305 rh#2099306 rh#2167815 |
CVE-2023-23931 | python-cryptography:Ignore | low | 4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N) | CVE-2023-23931 Oracle:CVE-2023-23931 RHSA-2023:4693 RHSA-2023:4971 SMASH Issue 356403 bnc#1208036 https://github.com/pyca/cryptography/pull/8230/commits/94a50a9731f35405f0357fa5f3b177d46a726ab3 https://github.com/pyca/cryptography/security/advisories/GHSA-w7pp-m8wf-vj6r jsc#CAR-2352 rh#2171817 |
CVE-2023-24023 | kernel-source-rt:Analysis | moderate | 6.8 (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N) | CVE-2023-24023 SMASH Issue 386272 bnc#1218148 https://dl.acm.org/doi/10.1145/3576915.3623066 https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/bluffs-vulnerability/ rh#2254961 |
CVE-2023-2426 | vim:Ignore | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H) | CVE-2023-2426 D:CVE-2023-2426 SMASH Issue 364825 bnc#1210996 https://github.com/vim/vim/commit/caf642c25de526229264cab9425e7c9979f3509b https://huntr.dev/bounties/3451be4c-91c8-4d08-926b-cbff7396f425 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LOJP6M7ZTKZQYOGVOOAY6TIE6ACBJL55/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PCLJN4QINITA3ZASKLEJ64C5TFNKELMO/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LOJP6M7ZTKZQYOGVOOAY6TIE6ACBJL55/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCLJN4QINITA3ZASKLEJ64C5TFNKELMO/ https://support.apple.com/kb/HT213844 https://support.apple.com/kb/HT213845 jsc#CAR-2560 rh#2196578 |
CVE-2023-2430 | kernel-source-rt:Not affected | moderate | 6.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H) | CVE-2023-2430 D:CVE-2023-2430 DSA-5492 SMASH Issue 364828 bnc#1211014 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e12d7a46f65ae4b7d58a5e0c1cbfa825cf8 https://www.debian.org/security/2023/dsa-5492 rh#2192175 |
CVE-2023-24329 | python3:Released | important | 7.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L) | CVE-2023-24329 L3:65333 L3:65880 L3:65896 L3:66357 L3:66429 L3:66797 RHSA-2023:3550 RHSA-2023:3555 RHSA-2023:3556 RHSA-2023:3585 RHSA-2023:3591 RHSA-2023:3594 RHSA-2023:3595 RHSA-2023:3776 RHSA-2023:3777 RHSA-2023:3780 RHSA-2023:3781 RHSA-2023:3796 RHSA-2023:3810 RHSA-2023:3811 RHSA-2023:3931 RHSA-2023:3932 RHSA-2023:3934 RHSA-2023:3935 RHSA-2023:3936 RHSA-2023:4004 RHSA-2023:4008 RHSA-2023:4032 RHSA-2023:4038 RHSA-2023:4203 RHSA-2023:4282 SMASH Issue 357592 bnc#1208471 bnc#1208731 bnc#1209324 bnc#1211496 bnc#1211543 https://github.com/python/cpython/issues/102153 https://github.com/python/cpython/pull/99421 https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PEVICI7YNGGMSL3UCMWGE66QFLATH72/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DSL6NSOAXWBJJ67XPLSSC74MNKZF3BBO/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EM2XLZSTXG44TMFXF4E6VTGKR2MQCW3G/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F2NY75GFDZ5T6YPN44D3VMFT5SUVTOTG/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GR5US3BYILYJ4SKBV6YBNPRUBAL5P2CN/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H23OSKC6UG6IWOQAUPW74YUHWRWVXJP7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTLGV2HYFF4AMYJL25VDIGAIHCU7UPA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LWC4WGXER5P6Q75RFGL7QUTPP3N5JR7T/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MZEHSXSCMA4WWQKXT6QV7AAR6SWNZ2VP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O5SP4RT3RRS434ZS2HQKQJ3VZW7YPKYR/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OHHJHJRLEF3TDT2K3676CAUVRDD4CCMR/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PEUN6T22UJFXR7J5F6UUHCXXPKJ2DVHI/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PURM5CFDABEWAIWZFD2MQ7ZJGCPYSQ44/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q3J5N24ECS4B6MJDRO6UAYU6GPLYBDCL/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QRQHN7RWJQJHYP6E5EKESOYP5VDSHZG4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RA2MBEEES6L46OD64OBSVUUMGKNGMOWW/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T4IDB5OAR5Y4UK3HLMZBW4WEL2B7YFMJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZH26JGNZ5XYPZ5SAU3NKSBSPRE5OHTG/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U2MZOJYGFCB5PPT6AKMAU72N7QOYWLBP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UONZWLB4QVLQIY5CPDLEUEKH6WX4VQMC/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTOAUJNDWZDRWVSXJ354AYZYKRMT56HU/ https://pointernull.com/security/python-url-parse-problem.html https://security.netapp.com/advisory/ntap-20230324-0004/ https://www.kb.cert.org/vuls/id/127587 jsc#CAR-2387 rh#2173917 |
CVE-2023-24593 | glib2:Ignore | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-24593 SMASH Issue 361018 bnc#1209714 jsc#CAR-2474 rh#2181183 |
CVE-2023-24626 | screen:Not affected | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-24626 D:CVE-2023-24626 SMASH Issue 362813 bnc#1210272 https://git.savannah.gnu.org/cgit/screen.git/patch/?id=e9ad41bfedb4537a6f0de20f00b27c7739f168f7 https://savannah.gnu.org/bugs/?63195 https://www.exploit-db.com/exploits/51252 jsc#CAR-2505 rh#2185517 |
CVE-2023-2483 | kernel-source-rt:Released | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-2483 CVE-2023-33203 SMASH Issue 364941 bnc#1210685 bnc#1211037 bnc#1211038 https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.9 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6b6bc5b8bd2d4ca9e1efa9ae0f98a0b0687ace75 jsc#CAR-2655 rh#2192667 |
CVE-2023-25012 | kernel-source-rt:Released | moderate | 6.8 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-25012 D:CVE-2023-25012 MISC:git.kernel.org:OSS:2023/11/05/1 MISC:lore.kernel.org:/all/20230125-hid-unregister-leds-v1-1-9a5192dcef16@diag.uniroma1.it/ MISC:seclists.org:/oss-sec/2023/q1/53 MISC:www.openwall.com:OSS:2023/11/05/1 OSS:2023/01/17/3 OSS:2023/01/18/3 OSS:2023/01/23/1 OSS:2023/02/02/1 OSS:2023/11/05/1 OSS:2023/Q1/74 SMASH Issue 355951 bnc#1207560 bnc#1207846 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=27d2a2fd844ec7da70d19fabb482304fd1e0595b https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=76ca8da989c7d97a7f76c75d475fe95a584439d7 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9fefb6201c4f8dd9f58c581b2a66e5cde2895ea2 https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=458e279f861d3f61796894cd158b780765a1569f https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=4ab3a086d10eeec1424f2e8a968827a6336203df https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=66b2c338adce580dfce2199591e65e2bab889cff https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=7c4a5b89a0b5a57a64b601775b296abf77a9fe97 https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=a096ccca6e503a5c575717ff8a36ace27510ab0a https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=f753a68980cf4b59a80fe677619da2b1804f526d https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=ffe2a22562444720b05bdfeb999c03e810d84cbb https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html https://lore.kernel.org/all/20230125-hid-unregister-leds-v1-1-9a5192dcef16%40diag.uniroma1.it/ jsc#CAR-2332 rh#2172948 rh#2173444 |
CVE-2023-2513 | kernel-source-rt:Ignore | moderate | 6.6 (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-2513 RHSA-2023:2148 RHSA-2023:2458 SMASH Issue 365100 bnc#1211105 bnc#1211109 https://github.com/torvalds/linux/commit/67d7d8ad99be https://lore.kernel.org/all/20220616021358.2504451-1-libaokun1@huawei.com/ jsc#CAR-2565 rh#2193097 |
CVE-2023-25136 | openssh:Not affected | moderate | () | CVE-2023-25136 MISC:bugzilla.mindrot.org:/show_bug.cgi MISC:ftp.openbsd.org:/pub/OpenBSD/patches/7.2/common/017_sshd.patch.sig MISC:github.com:/openssh/openssh-portable/commit/486c4dc3b83b4b67d663fb0fa62bc24138ec3946 OSS:2023/02/02/2 OSS:2023/02/13/1 OSS:2023/02/22/1 OSS:2023/02/22/2 OSS:2023/02/23/3 OSS:2023/03/06/1 OSS:2023/03/09/2 Oracle:CVE-2023-25136 RHSA-2023:2645 SMASH Issue 356036 https://jfrog.com/blog/openssh-pre-auth-double-free-cve-2023-25136-writeup-and-proof-of-concept/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JGAUIXJ3TEKCRKVWFQ6GDAGQFTIIGQQP/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R7LKQDFZWKYHQ65TBSH2X2HJQ4V2THS3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JGAUIXJ3TEKCRKVWFQ6GDAGQFTIIGQQP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7LKQDFZWKYHQ65TBSH2X2HJQ4V2THS3/ https://news.ycombinator.com/item?id=34711565 https://security.gentoo.org/glsa/202307-01 https://security.netapp.com/advisory/ntap-20230309-0003/ rh#2167636 |
CVE-2023-25139 | glibc:Not affected | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-25139 MISC:sourceware.org:/bugzilla/show_bug.cgi MISC:sourceware.org:OSS:2023/Q1/91 OSS:2023/02/10/1 OSS:2023/Q1/91 SMASH Issue 356035 bnc#1208189 https://security.netapp.com/advisory/ntap-20230302-0010/ rh#2167666 |
CVE-2023-25180 | glib2:Ignore | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-25180 SMASH Issue 361017 bnc#1209713 jsc#CAR-2475 rh#2181182 |
CVE-2023-25584 | binutils:Not affected | low | 2.5 (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L) | CVE-2023-25584 SMASH Issue 356371 bnc#1208041 https://access.redhat.com/security/cve/CVE-2023-25584 https://security.netapp.com/advisory/ntap-20231103-0002/ https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=77c225bdeb410cf60da804879ad41622f5f1aa44 jsc#CAR-2346 rh#2167467 |
CVE-2023-25586 | binutils:Not affected | low | 2.5 (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L) | CVE-2023-25586 SMASH Issue 356373 bnc#1208039 https://access.redhat.com/security/cve/CVE-2023-25586 https://security.netapp.com/advisory/ntap-20231103-0003/ https://sourceware.org/bugzilla/show_bug.cgi?id=29855 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5830876a0cca17bef3b2d54908928e72cca53502 rh#2167502 |
CVE-2023-25775 | kernel-source-rt:Not affected | moderate | 5.6 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L) | CVE-2023-25775 SMASH Issue 375070 bnc#1216959 http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00794.html https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html https://security.netapp.com/advisory/ntap-20230915-0013/ linux.git:commit:bb6d73d9add68ad270888db327514384dfa44958 rh#2231410 |
CVE-2023-2593 | kernel-source-rt:Not affected | moderate | () | CVE-2023-2593 SMASH Issue 366977 ZDI-23-693 bnc#1211527 |
CVE-2023-2598 | kernel-source-rt:Not affected | important | () | CVE-2023-2598 D:CVE-2023-2598 MISC:anatomic.rip:OSS:2024/Q2/172 MISC:blog.exodusintel.com:OSS:2024/Q2/172 MISC:git.kernel.org:OSS:2023/05/08/3 MISC:git.kernel.org:OSS:2024/Q2/172 MISC:ruia-ruia.github.io:OSS:2022/Q3/101 OSS:2023/05/08/3 OSS:2023/Q2/135 OSS:2024/04/24/3 OSS:2024/Q2/172 SMASH Issue 364984 bnc#1211046 https://bugs.chromium.org/p/project-zero/issues/detail?id=2504 https://security.netapp.com/advisory/ntap-20230703-0006/ rh#2203054 |
CVE-2023-2602 | libcap:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2023-2602 OSS:2023/Q2/158 RHSA-2023:4524 RHSA-2023:5071 SMASH Issue 366550 bnc#1211418 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZ57ICDLMVYEREXQGZWL4GWI7FRJCRQT/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPEGCFMCN5KGCFX5Y2VTKR732TTD4ADW/ https://www.x41-dsec.de/static/reports/X41-libcap-Code-Review-2023-OSTIF-Final-Report.pdf rh#2209114 |
CVE-2023-2603 | libcap:Released | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L) | CVE-2023-2603 D:CVE-2023-2603 L3:66196 OSS:2023/Q2/158 RHSA-2023:4524 RHSA-2023:5071 SMASH Issue 366549 bnc#1211419 bnc#1212804 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZ57ICDLMVYEREXQGZWL4GWI7FRJCRQT/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPEGCFMCN5KGCFX5Y2VTKR732TTD4ADW/ https://www.x41-dsec.de/static/reports/X41-libcap-Code-Review-2023-OSTIF-Final-Report.pdf jsc#CAR-2656 rh#2209113 |
CVE-2023-26083 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CONFIRM:developer.arm.com:CVE-2022-28350 CVE-2023-26083 SMASH Issue 362629 bnc#1210236 https://www.cybersecurity-help.cz/vdb/SB2023033049 https://www.cybersecurity-help.cz/vulnerabilities/74210/ |
CVE-2023-2612 | kernel-source-rt:Not affected | moderate | () | CVE-2023-2612 SMASH Issue 367948 bnc#1211902 http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/kinetic/commit/?id=02b47547824b1cd0d55c6744f91886f04de8947e https://ubuntu.com/security/CVE-2023-2612 https://ubuntu.com/security/notices/USN-6122-1 https://ubuntu.com/security/notices/USN-6123-1 https://ubuntu.com/security/notices/USN-6124-1 https://ubuntu.com/security/notices/USN-6127-1 |
CVE-2023-26242 | kernel-source-rt:Not affected | important | () | CVE-2023-26242 D:CVE-2023-26242 SMASH Issue 357783 bnc#1208518 https://patchwork.kernel.org/project/linux-fpga/patch/20230206054326.89323-1-k1rh4.lee%40gmail.com https://patchwork.kernel.org/project/linux-fpga/patch/20230206054326.89323-1-k1rh4.lee@gmail.com https://security.netapp.com/advisory/ntap-20230406-0002/ |
CVE-2023-26463 | strongswan:Not affected | critical | 9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-26463 D:CVE-2023-26463 SMASH Issue 358159 SMASH Issue 358160 bnc#1208608 https://github.com/strongswan/strongswan/releases https://security.netapp.com/advisory/ntap-20230517-0010/ https://www.strongswan.org/blog/2023/03/02/strongswan-vulnerability-%28cve-2023-26463%29.html rh#2176444 |
CVE-2023-2650 | openssl:Not affected, openssl-1_1:Released | moderate | 6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CVE-2023-2650 DSA-5417 L3:66079 L3:66117 L3:66118 L3:66349 L3:66350 OSS:2023/05/30/1 OSS:2023/Q2/204 Oracle:CVE-2023-2650 RHSA-2023:3722 SMASH Issue 366638 bdo#1034720 bnc#1211430 bnc#1212329 bnc#1212459 bnc#1212460 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=423a2bc737a908ad0c77bda470b2b59dc879936b https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=853c5e56ee0b8650c73140816bb8b91d6163422c https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9e209944b35cf82368071f160a744b6178f9b098 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=db779b0e10b047f2585615e0b8f2acdf21f8544a https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0009 https://security.gentoo.org/glsa/202402-08 https://security.netapp.com/advisory/ntap-20230703-0001/ https://security.netapp.com/advisory/ntap-20231027-0009/ https://www.debian.org/security/2023/dsa-5417 https://www.openssl.org/news/secadv/20230530.txt jsc#CAR-2660 openssl.git:commit:d63b3e7959e79f98d60760a739f7876dc5adc838 rh#2207947 |
CVE-2023-26544 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-26544 SMASH Issue 358312 bnc#1208697 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=887bfc546097fbe8071dac13b2fef73b77920899 https://lkml.org/lkml/2023/2/20/128 https://security.netapp.com/advisory/ntap-20230316-0010/ rh#2182441 |
CVE-2023-26545 | kernel-source-rt:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-26545 D:CVE-2022-4744 L3:65564 L3:65683 L3:65763 L3:65871 L3:65876 OSS:2023/04/11/3 OSS:2023/Q2/14 SMASH Issue 358313 bnc#1208700 bnc#1208909 bnc#1209853 https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.13 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fda6c89fe3d9aca073495a664e1d5aea28cd4377 https://github.com/torvalds/linux/commit/fda6c89fe3d9aca073495a664e1d5aea28cd4377 https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html https://security.netapp.com/advisory/ntap-20230316-0009/ jsc#CAR-2389 rh#2156322 rh#2181847 rh#2182443 |
CVE-2023-26604 | systemd:Ignore | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-26604 L3:65455 L3:65888 L3:66021 RHSA-2023:3837 SMASH Issue 359129 bnc#1208958 bnc#1209327 bnc#1211504 http://packetstormsecurity.com/files/174130/systemd-246-Local-Root-Privilege-Escalation.html https://blog.compass-security.com/2012/10/dangerous-sudoers-entries-part-2-insecure-functionality/ https://github.com/systemd/systemd/blob/main/NEWS#L4335-L4340 https://lists.debian.org/debian-lts-announce/2023/03/msg00032.html https://medium.com/@zenmoviefornotification/saidov-maxim-cve-2023-26604-c1232a526ba7 https://security.netapp.com/advisory/ntap-20230505-0009/ jsc#CAR-2416 rh#2175611 |
CVE-2023-26605 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-26605 D:CVE-2023-26605 SMASH Issue 358350 bnc#1208699 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4e3c51f4e805291b057d12f5dda5aeb50a538dc4 https://lkml.org/lkml/2023/2/22/3 https://security.netapp.com/advisory/ntap-20230316-0010/ rh#2179680 |
CVE-2023-26606 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-26606 D:CVE-2023-26606 SMASH Issue 358351 bnc#1208694 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=557d19675a470bb0a98beccec38c5dc3735c20fa https://lkml.org/lkml/2023/2/20/860 https://security.netapp.com/advisory/ntap-20230316-0010/ rh#2179668 |
CVE-2023-26607 | kernel-source-rt:Not affected | important | () | CVE-2023-26607 D:CVE-2023-26607 SMASH Issue 358352 bnc#1208703 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=36a4d82dddbbd421d2b8e79e1cab68c8126d5075 https://lkml.org/lkml/2023/2/21/1353 https://security.netapp.com/advisory/ntap-20230316-0010/ rh#2179671 |
CVE-2023-27043 | python3:Not affected | moderate | 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N) | CVE-2023-27043 D:CVE-2023-27043 L3:65765 L3:66797 L3:67963 SMASH Issue 363947 bnc#1210638 bnc#1210898 bnc#1215396 http://python.com http://python.org https://github.com/python/cpython/issues/102988 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZAEFSFZDNBNJPNOUTLG5COISGQDLMGV/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/75DTHSTNOFFNAWHXKMDXS7EJWC6W2FUC/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ARI7VDSNTQVXRQFM6IK5GSSLEIYV4VZH/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BQAKLUJMHFGVBRDPEY57BJGNCE5UUPHW/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HXYVPEZUA3465AEFX5JVFVP7KIFZMF3N/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6M5I6OQHJABNEYY555HUMMKX3Y4P25Z/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NEUNZSZ3CVSM2QWVYH3N2XGOCDWNYUA3/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORLXS5YTKN65E2Q2NWKXMFS5FWQHRNZW/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2MAICLFDDO3QVNHTZ2OCERZQ34R2PIC/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2W2BZQIHMCKRI5FNBJERFYMS5PK6TAH/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PHVGRKQAGANCSGFI3QMYOCIMS4IFOZA5/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU6Y2S5CBN5BWCBDAJFTGIBZLK3S2G3J/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QDRDDPDN3VFIYXJIYEABY6USX5EU66AG/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDDC2VOX7OQC6OHMYTVD4HLFZIV6PYBC/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SINP4OVYNB2AGDYI2GS37EMW3H3F7XPZ/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SOX7BCN6YL7B3RFPEEXPIU5CMTEHJOKR/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZXC32CJ7TWDPJO6GY2XIQRO7JZX5FLP/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWMBD4LNHWEXRI6YVFWJMTJQUL5WOFTS/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YQVY5C5REXWJIORJIL2FIL3ALOEJEF72/ https://python-security.readthedocs.io/vuln/email-parseaddr-realname.html https://security.netapp.com/advisory/ntap-20230601-0003/ jsc#CAR-2543 rh#2173917 rh#2196183 |
CVE-2023-27534 | curl:Released | moderate | 4.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L) | CVE-2023-27534 D:CVE-2023-27534 OSS:2023/Q1/175 RHSA-2023:3354 RHSA-2023:3355 SMASH Issue 359852 SMASH Issue 359853 bnc#1209210 bnc#1219273 https://hackerone.com/reports/1892351 https://lists.debian.org/debian-lts-announce/2024/03/msg00016.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/ https://security.gentoo.org/glsa/202310-12 https://security.netapp.com/advisory/ntap-20230420-0012/ jsc#CAR-2458 rh#2179069 |
CVE-2023-27536 | curl:Ignore | moderate | 5.8 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H) | CVE-2023-27536 D:CVE-2023-27536 L3:66794 RHSA-2023:4523 SMASH Issue 359856 SMASH Issue 359857 bnc#1209212 https://hackerone.com/reports/1895135 https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/ https://security.gentoo.org/glsa/202310-12 https://security.netapp.com/advisory/ntap-20230420-0010/ jsc#CAR-2460 rh#2179092 |
CVE-2023-27537 | curl:Not affected | moderate | 5.8 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H) | CVE-2023-27537 OSS:2023/Q1/178 SMASH Issue 359858 SMASH Issue 359859 bnc#1209213 https://hackerone.com/reports/1897203 https://security.gentoo.org/glsa/202310-12 https://security.netapp.com/advisory/ntap-20230420-0010/ rh#2179097 |
CVE-2023-27538 | curl:Released, curl-mini:Released | moderate | 5.8 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H) | CONFIRM:cert-portal.siemens.com:/productcert/pdf/ssa-333517.pdf CONFIRM:cert-portal.siemens.com:CVE-2021-22924 CONFIRM:cert-portal.siemens.com:CVE-2021-3672 CONFIRM:security.netapp.com:CVE-2021-22926 CONFIRM:security.netapp.com:CVE-2021-22947 CONFIRM:security.netapp.com:CVE-2022-21380 CONFIRM:security.netapp.com:CVE-2022-27776 CONFIRM:security.netapp.com:CVE-2022-30115 CONFIRM:security.netapp.com:CVE-2022-32208 CONFIRM:support.apple.com:CVE-2022-0158 CONFIRM:support.apple.com:CVE-2022-1725 CVE-2021-22898 CVE-2021-22924 CVE-2021-22945 CVE-2021-22946 CVE-2021-22947 CVE-2022-22576 CVE-2022-27774 CVE-2022-27775 CVE-2022-27776 CVE-2022-27781 CVE-2022-27782 CVE-2022-32205 CVE-2022-32206 CVE-2022-32207 CVE-2022-32208 CVE-2023-23916 CVE-2023-27538 D:CVE-2022-27774 D:CVE-2023-27538 DSA-5197 FEDORA:FEDORA-2021-1d24845e93 FEDORA:FEDORA-2021-5d21b90a30 FEDORA:FEDORA-2021-83fdddca0f FEDORA:FEDORA-2021-fc96a3a749 FEDORA:FEDORA-2022-1b3d7f6973 FEDORA:FEDORA-2022-bca2c95559 FEDORA:FEDORA-2022-f83aec6d57 FULLDISC:20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3 FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 GLSA-202212-01 L3:63557 L3:63635 L3:63745 L3:64216 L3:64537 L3:66794 MISC:cert-portal.siemens.com:CVE-2022-32262 MISC:curl.se:MLIST:[oss-security] 20210721 [SECURITY ADVISORY] curl: TELNET stack contents disclosure again MISC:curl.se:OSS:2021/Q3/166 MISC:curl.se:OSS:2021/Q3/167 MISC:curl.se:OSS:2021/Q3/168 MISC:curl.se:OSS:2021/Q3/26 MISC:curl.se:OSS:2022/Q2/209 MISC:curl.se:OSS:2022/Q2/210 MISC:curl.se:OSS:2022/Q2/211 MISC:curl.se:OSS:2022/Q2/212 MISC:curl.se:OSS:2022/Q2/61 MISC:curl.se:OSS:2022/Q2/62 MISC:curl.se:OSS:2022/Q2/63 MISC:curl.se:OSS:2022/Q2/64 MISC:curl.se:OSS:2022/Q2/95 MISC:curl.se:OSS:2022/Q2/96 MISC:github.com:MLIST:[oss-security] 20210721 [SECURITY ADVISORY] curl: TELNET stack contents disclosure again MISC:github.com:OSS:2021/Q2/165 MISC:github.com:OSS:2021/Q3/166 MISC:github.com:OSS:2021/Q3/167 MISC:github.com:OSS:2021/Q3/168 MISC:github.com:OSS:2021/Q3/26 MISC:github.com:OSS:2023/02/15/3 MISC:github.com:OSS:2023/03/20/6 MISC:hackerone.com:CVE-2021-22898 MISC:hackerone.com:CVE-2021-22924 MISC:hackerone.com:CVE-2021-22945 MISC:hackerone.com:CVE-2021-22946 MISC:hackerone.com:CVE-2021-22947 MISC:hackerone.com:CVE-2022-22576 MISC:hackerone.com:CVE-2022-27774 MISC:hackerone.com:CVE-2022-27775 MISC:hackerone.com:CVE-2022-27776 MISC:hackerone.com:CVE-2022-27781 MISC:hackerone.com:CVE-2022-27782 MISC:hackerone.com:CVE-2022-32205 MISC:hackerone.com:CVE-2022-32206 MISC:hackerone.com:CVE-2022-32207 MISC:hackerone.com:CVE-2022-32208 MISC:www.oracle.com:CVE-2021-35666 MISC:www.oracle.com:CVE-2022-21403 MISC:www.oracle.com:CVE-2022-21498 MISC:www.oracle.com:CVE-2022-21586 MLIST:[debian-lts-announce] 20210813 [SECURITY] [DLA 2734-1] curl security update MLIST:[debian-lts-announce] 20210930 [SECURITY] [DLA 2773-1] curl security update MLIST:[debian-lts-announce] 20220828 [SECURITY] [DLA 3085-1] curl security update MLIST:[debian-lts-announce] 20230128 [SECURITY] [DLA 3288-1] curl security update MLIST:[guacamole-issues] 20210618 [jira] [Created] (GUACAMOLE-1368) Latest docker image fails security scans. MLIST:[kafka-dev] 20210831 Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image MLIST:[kafka-dev] 20210901 Re: [EXTERNAL] Re: Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image MLIST:[kafka-users] 20210831 Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image MLIST:[kafka-users] 20210901 Re: [EXTERNAL] Re: Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image MLIST:[oss-security] 20210721 [SECURITY ADVISORY] curl: TELNET stack contents disclosure again N/A:N/A OSS:2021/Q2/165 OSS:2021/Q3/166 OSS:2021/Q3/167 OSS:2021/Q3/168 OSS:2021/Q3/26 OSS:2021/Q3/27 OSS:2022/Q2/209 OSS:2022/Q2/210 OSS:2022/Q2/211 OSS:2022/Q2/212 OSS:2022/Q2/61 OSS:2022/Q2/62 OSS:2022/Q2/63 OSS:2022/Q2/64 OSS:2022/Q2/95 OSS:2022/Q2/96 OSS:2023/02/15/3 OSS:2023/03/20/6 OSS:2023/Q1/179 Oracle:CVE-2018-1000007 Oracle:CVE-2021-22946 Oracle:CVE-2022-27782 Oracle:CVE-2022-32206 Oracle:CVE-2022-32207 RHSA-2021:3582 RHSA-2021:4059 RHSA-2021:4511 RHSA-2022:0635 RHSA-2022:1354 RHSA-2022:5245 RHSA-2022:5313 RHSA-2022:6157 RHSA-2022:6159 RHSA-2022:8299 RHSA-2022:8840 RHSA-2022:8841 RHSA-2023:3460 SMASH Issue 284454 SMASH Issue 303768 SMASH Issue 309114 SMASH Issue 309781 SMASH Issue 309783 SMASH Issue 329490 SMASH Issue 329491 SMASH Issue 329695 SMASH Issue 329920 SMASH Issue 330789 SMASH Issue 330791 SMASH Issue 335132 SMASH Issue 335197 SMASH Issue 335198 SMASH Issue 335201 SMASH Issue 335203 SMASH Issue 335905 SMASH Issue 337387 SMASH Issue 343660 SMASH Issue 347191 SMASH Issue 359860 SMASH Issue 359861 bdo#1010252 bdo#1010253 bdo#1010254 bdo#1010295 bdo#989228 bdo#991492 bnc#1186114 bnc#1188219 bnc#1190213 bnc#1190373 bnc#1190374 bnc#1198608 bnc#1198614 bnc#1198723 bnc#1198766 bnc#1199223 bnc#1199224 bnc#1200694 bnc#1200734 bnc#1200735 bnc#1200736 bnc#1200737 bnc#1201032 bnc#1201550 bnc#1203786 bnc#1205070 bnc#1209214 https://hackerone.com/reports/1898475 https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7N5ZBWLNNPZKFK7Q4KEHGCJ2YELQEUJP/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKKOQXPYLMBSEVDHFS32BPBR3ZQJKY5B/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/ https://security.gentoo.org/glsa/202310-12 https://security.netapp.com/advisory/ntap-20230420-0010/ jsc#CAR-1052 jsc#CAR-1053 jsc#CAR-1715 jsc#CAR-1716 jsc#CAR-1717 jsc#CAR-1718 jsc#CAR-1767 jsc#CAR-1768 jsc#CAR-1873 jsc#CAR-1874 jsc#CAR-2461 jsc#CAR-642 jsc#CAR-990 rh#1955316 rh#1964887 rh#1970902 rh#1981460 rh#2001527 rh#2003175 rh#2003191 rh#2077541 rh#2077547 rh#2078388 rh#2078408 rh#2082204 rh#2082215 rh#2099296 rh#2099300 rh#2099305 rh#2099306 rh#2179103 |
CVE-2023-28319 | curl:Not affected | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N) | CVE-2023-28319 OSS:2023/Q2/165 RHSA-2023:4628 RHSA-2023:4629 SMASH Issue 365637 SMASH Issue 365638 bnc#1211230 http://seclists.org/fulldisclosure/2023/Jul/47 http://seclists.org/fulldisclosure/2023/Jul/48 http://seclists.org/fulldisclosure/2023/Jul/52 https://hackerone.com/reports/1913733 https://security.gentoo.org/glsa/202310-12 https://security.netapp.com/advisory/ntap-20230609-0009/ https://support.apple.com/kb/HT213843 https://support.apple.com/kb/HT213844 https://support.apple.com/kb/HT213845 rh#2196778 |
CVE-2023-28322 | curl:Released | important | 6.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L) | CONFIRM:security.netapp.com:/advisory/ntap-20230110-0006/ CONFIRM:support.apple.com:/kb/HT213604 CONFIRM:support.apple.com:/kb/HT213605 CVE-2022-32221 CVE-2023-28322 D:CVE-2022-32221 DSA-5330 FULLDISC:20230123 APPLE-SA-2023-01-23-4 macOS Ventura 13.2 FULLDISC:20230123 APPLE-SA-2023-01-23-5 macOS Monterey 12.6.3 GLSA-202212-01 L3:64595 L3:64729 L3:64816 L3:65222 L3:67177 MISC:github.com:OSS:2023/05/17/4 MISC:hackerone.com:/reports/1704017 MLIST:[debian-lts-announce] 20230128 [SECURITY] [DLA 3288-1] curl security update OSS:2022/Q4/47 OSS:2023/05/17/4 OSS:2023/Q2/168 Oracle:CVE-2022-32221 RHSA-2022:8840 RHSA-2022:8841 RHSA-2023:0333 RHSA-2023:4139 RHSA-2023:4354 RHSA-2023:4628 RHSA-2023:4629 RHSA-2023:5598 SMASH Issue 345344 SMASH Issue 347686 SMASH Issue 349077 SMASH Issue 350078 SMASH Issue 357312 SMASH Issue 365643 SMASH Issue 365644 bnc#1204383 bnc#1205287 bnc#1205834 bnc#1206236 bnc#1208340 bnc#1211233 http://seclists.org/fulldisclosure/2023/Jul/47 http://seclists.org/fulldisclosure/2023/Jul/48 http://seclists.org/fulldisclosure/2023/Jul/52 https://hackerone.com/reports/1954658 https://lists.debian.org/debian-lts-announce/2023/12/msg00015.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/ https://security.gentoo.org/glsa/202310-12 https://security.netapp.com/advisory/ntap-20230208-0002/ https://security.netapp.com/advisory/ntap-20230609-0009/ https://support.apple.com/kb/HT213843 https://support.apple.com/kb/HT213844 https://support.apple.com/kb/HT213845 jsc#CAR-2142 rh#2135411 rh#2196793 |
CVE-2023-28327 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-28327 D:CVE-2023-28327 RHSA-2023:5603 RHSA-2023:5604 SMASH Issue 359986 bnc#1209290 jsc#CAR-2443 rh#2177382 |
CVE-2023-28328 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-28328 D:CVE-2023-28328 L3:67931 SMASH Issue 359989 bnc#1209291 https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html rh#2177389 |
CVE-2023-28410 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-28410 SMASH Issue 365865 SMASH Issue 365866 bnc#1211263 bnc#1211819 https://security.netapp.com/advisory/ntap-20230622-0004/ https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00886.html rh#2203831 |
CVE-2023-28464 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-28464 DSA-5492 L3:65968 L3:67672 OSS:2023/03/28/2 OSS:2023/03/28/3 OSS:2023/Q1/200 SMASH Issue 359519 SMASH Issue 361140 ZDI-24-593 bnc#1209052 bnc#1211111 bnc#1211936 https://lore.kernel.org/lkml/20230309074645.74309-1-wzhmmmmm%40gmail.com/ https://lore.kernel.org/lkml/20230309074645.74309-1-wzhmmmmm@gmail.com/ https://security.netapp.com/advisory/ntap-20230517-0004/ jsc#CAR-2486 linux.git:commit:3e337087c3b5805fe0b8a46ba622a962880b5d64 linux.git:commit:a85fb91e3d728bdfc80833167e8162cce8bc7004 rh#2177759 rh#2178212 rh#2181330 rh#2192671 rh#2226780 rh#2282686 |
CVE-2023-28466 | kernel-source-rt:Ignore | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-28466 D:CVE-2023-28466 L3:65952 L3:66431 L3:66491 L3:66496 L3:67104 RHSA-2023:3708 RHSA-2023:3723 RHSA-2023:3819 RHSA-2023:3847 RHSA-2023:4789 RHSA-2023:4801 RHSA-2023:4814 SMASH Issue 360258 bnc#1209366 bnc#1210452 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962 https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html https://security.netapp.com/advisory/ntap-20230427-0006/ jsc#CAR-2444 rh#2179000 |
CVE-2023-28484 | libxml2:Already fixed | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-28484 D:CVE-2023-28484 DSA-5391 L3:66798 RHSA-2023:4349 RHSA-2023:4529 RHSA-2023:4628 SMASH Issue 363077 bdo#1034436 bdo#1034437 bnc#1210411 https://gitlab.gnome.org/GNOME/libxml2/-/issues/491 https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.10.4 https://lists.debian.org/debian-lts-announce/2023/04/msg00031.html https://security.netapp.com/advisory/ntap-20230601-0006/ https://security.netapp.com/advisory/ntap-20240201-0005/ jsc#CAR-2525 rh#2185994 |
CVE-2023-28531 | openssh:Not affected | critical | () | CVE-2023-28531 D:CVE-2023-28531 DSA-5586 OSS:2023/03/15/8 SMASH Issue 360496 bdo#1033166 bdo#995130 bnc#1209420 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AN2UDTXEUSKFIOIYMV6JNI5VSBMYZOFT/ https://security.gentoo.org/glsa/202307-01 https://security.netapp.com/advisory/ntap-20230413-0008/ https://www.debian.org/security/2023/dsa-5586 rh#2179334 |
CVE-2023-2860 | kernel-source-rt:Released | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N) | CVE-2023-2860 SMASH Issue 366978 SMASH Issue 367635 ZDI-23-692 bnc#1211592 https://access.redhat.com/security/cve/CVE-2023-2860 https://www.zerodayinitiative.com/advisories/ZDI-CAN-18511 jsc#CAR-2663 rh#2218122 |
CVE-2023-28772 | kernel-source-rt:Ignore | important | 7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-28772 L3:65561 L3:65968 L3:66573 MISC:cdn.kernel.org:CVE-2021-38205 SMASH Issue 360715 bnc#1209549 bnc#1209832 bnc#1211110 https://github.com/torvalds/linux/commit/d3b16034a24a112bb83aeb669ac5b9b01f744bb7 https://lkml.kernel.org/r/20210626032156.47889-1-yun.zhou@windriver.com https://lore.kernel.org/lkml/20210625122453.5e2fe304@oasis.local.home/ https://security.netapp.com/advisory/ntap-20230427-0005/ jsc#CAR-2463 rh#2181330 |
CVE-2023-28866 | kernel-source-rt:Not affected | moderate | 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) | CVE-2023-28866 D:CVE-2023-28866 SMASH Issue 361390 bnc#1209780 https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=95084403f8c070ccf5d7cbe72352519c1798a40a https://lore.kernel.org/lkml/20230321015018.1759683-1-iam@sung-woo.kim/ https://patchwork.kernel.org/project/bluetooth/patch/20230322232543.3079578-1-luiz.dentz@gmail.com rh#2185519 |
CVE-2023-2898 | kernel-source-rt:Not affected | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-2898 D:CVE-2023-2898 DSA-5480 DSA-5492 SMASH Issue 367493 bnc#1211742 https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html https://lore.kernel.org/linux-f2fs-devel/20230522124203.3838360-1-chao%40kernel.org/ https://lore.kernel.org/linux-f2fs-devel/20230522124203.3838360-1-chao@kernel.org/ https://security.netapp.com/advisory/ntap-20230929-0002/ https://www.debian.org/security/2023/dsa-5480 https://www.debian.org/security/2023/dsa-5492 rh#2210102 |
CVE-2023-29383 | shadow:Ignore | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-29383 D:CVE-2023-29383 SMASH Issue 363570 bnc#1210507 https://github.com/shadow-maint/shadow/commit/e5905c4b84d4fb90aefcd96ee618411ebfac663d https://github.com/shadow-maint/shadow/pull/687 https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2023-29383-abusing-linux-chfn-to-misrepresent-etc-passwd/ https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=31797 jsc#CAR-2538 rh#2187184 |
CVE-2023-29469 | libxml2:Already fixed | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-29469 D:CVE-2023-29469 DSA-5391 L3:66798 RHSA-2023:4349 RHSA-2023:4529 RHSA-2023:4628 SMASH Issue 363076 bdo#1034436 bdo#1034437 bnc#1210412 bnc#1215397 https://gitlab.gnome.org/GNOME/libxml2/-/issues/510 https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.10.4 https://lists.debian.org/debian-lts-announce/2023/04/msg00031.html https://security.netapp.com/advisory/ntap-20230601-0006/ jsc#CAR-2526 rh#2185984 rh#2185994 |
CVE-2023-29491 | ncurses:Ignore | moderate | 6.5 (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H) | CVE-2023-29491 D:CVE-2023-29491 L3:65786 L3:66173 L3:66702 OSS:2023/04/12/5 OSS:2023/04/13/4 OSS:2023/04/19/10 OSS:2023/04/19/11 OSS:2023/Q2/19 RHSA-2023:5249 SMASH Issue 363267 bnc#1210434 bnc#1210992 bnc#1212736 bnc#1215011 http://ncurses.scripts.mit.edu/?p=ncurses.git%3Ba=commit%3Bh=eb51b1ea1f75a0ec17c9c5937cb28df1e8eeec56 http://ncurses.scripts.mit.edu/?p=ncurses.git;a=commit;h=eb51b1ea1f75a0ec17c9c5937cb28df1e8eeec56 https://lists.debian.org/debian-lts-announce/2023/12/msg00004.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/ https://security.netapp.com/advisory/ntap-20230517-0009/ https://support.apple.com/kb/HT213843 https://support.apple.com/kb/HT213844 https://support.apple.com/kb/HT213845 jsc#CAR-2558 rh#2191704 |
CVE-2023-29499 | glib2:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CVE-2023-29499 SMASH Issue 368200 bnc#1211947 https://access.redhat.com/security/cve/CVE-2023-29499 https://gitlab.gnome.org/GNOME/glib/-/issues/2794 https://lists.debian.org/debian-lts-announce/2023/09/msg00030.html https://security.gentoo.org/glsa/202311-18 https://security.netapp.com/advisory/ntap-20231103-0001/ jsc#CAR-2758 rh#2211828 rh#2211833 |
CVE-2023-2975 | openssl:Not affected, openssl-1_1:Not affected | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N) | CVE-2023-2975 OSS:2023/07/15/1 OSS:2023/07/19/5 OSS:2023/Q3/39 OSS:2023/Q3/45 SMASH Issue 372553 bnc#1213383 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=00e2f5eea29994d19293ec4e8c8775ba73678598 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc https://security.gentoo.org/glsa/202402-08 https://security.netapp.com/advisory/ntap-20230725-0004/ https://www.openssl.org/news/secadv/20230714.txt openssl.git:commit:1e398bec538978b9957e69bf9e12b3c626290bea openssl.git:commit:c426c281cfc23ab182f7d7d7a35229e7db1494d9 rh#2223016 |
CVE-2023-2985 | kernel-source-rt:Released | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-2985 D:CVE-2023-2985 SMASH Issue 367838 bnc#1211867 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=07db5e247ab5858439b14dd7cc1fe538b9efcf32 jsc#CAR-2664 rh#2211097 |
CVE-2023-3006 | kernel-source-rt:Analysis | moderate | 4.8 (CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2023-3006 SMASH Issue 367972 bnc#1211855 https://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git/commit/?id=0e5d5ae837c8 linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109 rh#2062284 rh#2141026 |
CVE-2023-3022 | kernel-source-rt:Not affected | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-3022 RHSA-2022:1975 RHSA-2023:1130 SMASH Issue 368014 bnc#1211906 https://github.com/torvalds/linux/commit/a65120bae4b7 rh#2211440 |
CVE-2023-30456 | kernel-source-rt:Won't fix | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L) | CVE-2023-30456 D:CVE-2023-30456 SMASH Issue 362849 bnc#1210294 http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.8 https://github.com/torvalds/linux/commit/112e66017bff7f2837030f34c2bc19501e9212d5 https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html https://security.netapp.com/advisory/ntap-20230511-0007/ jsc#CAR-2665 rh#2188468 |
CVE-2023-30571 | libarchive:Analysis | low | 3.9 (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N) | CVE-2023-30571 SMASH Issue 367776 bnc#1211842 https://github.com/libarchive/libarchive/issues/1876 https://groups.google.com/g/libarchive-announce rh#2210921 |
CVE-2023-30772 | kernel-source-rt:Released | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-30772 SMASH Issue 363510 SMASH Issue 363637 bnc#1210329 https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.9 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=06615d11cc78162dfd5116efb71f29eb29502d37 https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html jsc#CAR-2539 rh#2216121 |
CVE-2023-3090 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-3090 DSA-5448 DSA-5480 L3:66407 L3:66491 L3:66496 L3:66505 L3:67104 L3:67569 L3:67605 RHSA-2023:4377 RHSA-2023:4378 RHSA-2023:4380 RHSA-2023:4515 RHSA-2023:4516 RHSA-2023:4801 RHSA-2023:4814 RHSA-2023:4815 RHSA-2023:4817 RHSA-2023:4828 RHSA-2023:4829 RHSA-2023:4961 RHSA-2023:4962 RHSA-2023:4967 RHSA-2023:5221 RHSA-2023:5244 RHSA-2023:5255 RHSA-2023:5548 RHSA-2023:5627 SMASH Issue 370835 ZDI-23-900 bnc#1212842 bnc#1212849 bnc#1213727 http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=90cbed5247439a966b645b34eb0a2e037836ea8e https://kernel.dance/90cbed5247439a966b645b34eb0a2e037836ea8e https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html https://security.netapp.com/advisory/ntap-20230731-0002/ https://www.debian.org/security/2023/dsa-5448 https://www.debian.org/security/2023/dsa-5480 jsc#CAR-2718 rh#2217271 rh#2218672 rh#2220892 rh#2221463 |
CVE-2023-3106 | kernel-source-rt:Not affected | moderate | 6.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H) | CVE-2023-3106 L3:67931 SMASH Issue 372135 bnc#1213251 https://access.redhat.com/security/cve/CVE-2023-3106 https://github.com/torvalds/linux/commit/1ba5bf993c6a3142e18e68ea6452b347f9cb5635 rh#2221501 |
CVE-2023-3108 | kernel-source-rt:Already fixed | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-3108 D:CVE-2023-3108 SMASH Issue 371773 bnc#1213195 https://access.redhat.com/security/cve/CVE-2023-3108 https://github.com/torvalds/linux/commit/9399f0c51489ae8c16d6559b82a452fdc1895e91 rh#2221472 |
CVE-2023-31081 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-31081 D:CVE-2023-31081 SMASH Issue 364288 bnc#1210782 https://lore.kernel.org/all/CA+UBctDXyiosaiR7YNKCs8k0aWu4gU+YutRcnC+TDJkXpHjQag%40mail.gmail.com/ https://lore.kernel.org/all/CA+UBctDXyiosaiR7YNKCs8k0aWu4gU+YutRcnC+TDJkXpHjQag@mail.gmail.com/ https://security.netapp.com/advisory/ntap-20230929-0003/ |
CVE-2023-31082 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-31082 D:CVE-2023-31082 SMASH Issue 364289 bnc#1210781 https://lore.kernel.org/all/CA+UBctCZok5FSQ=LPRA+A-jocW=L8FuMVZ_7MNqhh483P5yN8A%40mail.gmail.com/ https://lore.kernel.org/all/CA+UBctCZok5FSQ=LPRA+A-jocW=L8FuMVZ_7MNqhh483P5yN8A@mail.gmail.com/ https://security.netapp.com/advisory/ntap-20230929-0003/ rh#2212938 |
CVE-2023-31083 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-31083 D:CVE-2023-31083 SMASH Issue 364290 bnc#1210780 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9c33663af9ad115f90c076a1828129a3fbadea98 https://lore.kernel.org/all/CA+UBctC3p49aTgzbVgkSZ2+TQcqq4fPDO7yZitFT5uBPDeCO2g%40mail.gmail.com/ https://lore.kernel.org/all/CA+UBctC3p49aTgzbVgkSZ2+TQcqq4fPDO7yZitFT5uBPDeCO2g@mail.gmail.com/ https://security.netapp.com/advisory/ntap-20230929-0003/ jsc#CAR-3006 rh#2213132 |
CVE-2023-31084 | kernel-source-rt:Analysis | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-31084 D:CVE-2023-31084 DSA-5448 DSA-5480 SMASH Issue 364291 bnc#1210783 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b8c75e4a1b325ea0a9433fa8834be97b5836b946 https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6HIEOLEOURP4BJZMIL7UGGPYRRB44UDN/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AOATNX5UFL7V7W2QDIQKOHFFHYKWFP4W/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6HIEOLEOURP4BJZMIL7UGGPYRRB44UDN/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AOATNX5UFL7V7W2QDIQKOHFFHYKWFP4W/ https://lore.kernel.org/all/CA+UBctCu7fXn4q41O_3=id1+OdyQ85tZY1x+TkT-6OVBL6KAUw%40mail.gmail.com/ https://lore.kernel.org/all/CA+UBctCu7fXn4q41O_3=id1+OdyQ85tZY1x+TkT-6OVBL6KAUw@mail.gmail.com/ https://security.netapp.com/advisory/ntap-20230929-0003/ https://www.debian.org/security/2023/dsa-5448 https://www.debian.org/security/2023/dsa-5480 linux.git:commit:b8c75e4a1b325ea0a9433fa8834be97b5836b946 rh#2213139 |
CVE-2023-31085 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-31085 D:CVE-2023-31085 L3:67651 SMASH Issue 364292 bnc#1210778 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=017c73a34a661a861712f7cc1393a123e5b2208c https://lore.kernel.org/all/687864524.118195.1681799447034.JavaMail.zimbra%40nod.at/ https://lore.kernel.org/all/687864524.118195.1681799447034.JavaMail.zimbra@nod.at/ https://security.netapp.com/advisory/ntap-20230929-0003/ jsc#CAR-2961 rh#2213149 |
CVE-2023-3111 | kernel-source-rt:Released | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-3111 DSA-5480 L3:67651 SMASH Issue 368421 bnc#1212051 https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html https://patchwork.kernel.org/project/linux-btrfs/patch/20220721074829.2905233-1-r33s3n6@gmail.com/ https://security.netapp.com/advisory/ntap-20230703-0007/ https://www.debian.org/security/2023/dsa-5480 jsc#CAR-2930 rh#2212513 |
CVE-2023-3117 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-3117 CVE-2023-3390 D:CVE-2023-3117 DSA-5448 DSA-5461 DSA-5480 DSA-5492 L3:66697 L3:66952 RHSA-2023:4789 RHSA-2023:4888 RHSA-2023:4961 RHSA-2023:4962 RHSA-2023:4967 RHSA-2023:5069 RHSA-2023:5091 RHSA-2023:5093 RHSA-2023:5221 RHSA-2023:5235 RHSA-2023:5238 RHSA-2023:5244 RHSA-2023:5255 SMASH Issue 370938 bnc#1212846 bnc#1212934 bnc#1213245 bnc#1214994 http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1240eb93f0616b21c675416516ff3d74798fdc97 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1240eb93f0616b21c675416516ff3d74798fdc97 https://kernel.dance/1240eb93f0616b21c675416516ff3d74798fdc97 https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html https://security.netapp.com/advisory/ntap-20230818-0004/ https://www.debian.org/security/2023/dsa-5448 https://www.debian.org/security/2023/dsa-5461 jsc#CAR-2719 rh#2213260 rh#2218605 rh#2219270 rh#2227020 rh#2231800 |
CVE-2023-31248 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-31248 DSA-5453 OSS:2023/07/05/2 OSS:2023/Q3/5 RHSA-2023:5069 RHSA-2023:5091 RHSA-2023:5093 RHSA-2023:5575 RHSA-2023:5603 RHSA-2023:5604 SMASH Issue 371263 ZDI-23-899 bnc#1213061 bnc#1213064 http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGZC5XOANA75OJ4XARBBXYSLDKUIJI5E/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPHI46ROSSLVAV4R5LJWJYU747JGOS6D/ https://lore.kernel.org/netfilter-devel/20230705121627.GC19489@breakpoint.cc/T/ https://security.netapp.com/advisory/ntap-20240201-0001/ https://www.debian.org/security/2023/dsa-5453 rh#2220893 |
CVE-2023-3141 | kernel-source-rt:Released | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H) | CVE-2023-3141 D:CVE-2023-35825 L3:66852 SMASH Issue 368742 bnc#1211449 bnc#1212129 bnc#1212503 https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.4 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=63264422785021704c39b38f65a78ab9e4a186d7 https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html https://lore.kernel.org/lkml/CAPDyKFoV9aZObZ5GBm0U_-UVeVkBN_rAG-kH3BKoP4EXdYM4bw@mail.gmail.com/t/ https://security.netapp.com/advisory/ntap-20230706-0004/ jsc#CAR-2669 rh#2213199 rh#2215837 |
CVE-2023-31436 | kernel-source-rt:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-31436 D:CVE-2023-2248 D:CVE-2023-31436 DSA-5402 L3:65968 L3:66431 L3:66432 L3:66491 L3:66496 L3:66505 L3:67104 L3:67994 L3:68106 SMASH Issue 364688 ZDI-24-593 bnc#1210940 bnc#1210988 bnc#1211260 http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.13 https://github.com/torvalds/linux/commit/3037933448f60f9acb705997eae62013ecb81e0d https://lists.debian.org/debian-lts-announce/2023/06/msg00008.html https://security.netapp.com/advisory/ntap-20230609-0001/ https://www.debian.org/security/2023/dsa-5402 https://www.spinics.net/lists/stable-commits/msg294885.html jsc#CAR-2557 linux.git:commit:3e337087c3b5805fe0b8a46ba622a962880b5d64 rh#2192671 rh#2226780 |
CVE-2023-31437 | systemd:Won't fix, systemd-mini:Won't fix | low | 2.3 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N) | CVE-2023-31437 D:CVE-2023-31437 MISC:github.com:CVE-2021-33910 SMASH Issue 369319 bnc#1212353 https://github.com/kastel-security/Journald https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf |
CVE-2023-31438 | systemd:Won't fix, systemd-mini:Won't fix | low | 2.3 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N) | CVE-2023-31438 D:CVE-2023-31438 MISC:github.com:CVE-2021-33910 SMASH Issue 369320 bnc#1212354 https://github.com/kastel-security/Journald https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf https://github.com/systemd/systemd/pull/28886 |
CVE-2023-31439 | systemd:Won't fix, systemd-mini:Won't fix | low | 2.3 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N) | CVE-2023-31439 MISC:github.com:CVE-2021-33910 SMASH Issue 369321 bnc#1212355 https://github.com/kastel-security/Journald https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf https://github.com/systemd/systemd/pull/28885 |
CVE-2023-31484 | perl:Already fixed | important | 7.4 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N) | CVE-2023-31484 D:CVE-2023-31484 L3:65805 L3:65970 L3:66174 L3:66175 L3:66435 L3:66493 L3:66504 MISC:github.com:OSS:2023/04/18/14 OSS:2023/04/18/14 OSS:2023/04/29/1 OSS:2023/05/03/3 OSS:2023/05/03/5 OSS:2023/05/07/2 OSS:2023/Q2/106 SMASH Issue 364812 bnc#1210999 bnc#1211123 bnc#1211938 bnc#1212737 bnc#1212738 bnc#1213845 bnc#1214097 bnc#1214113 https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/ https://github.com/andk/cpanpm/pull/175 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BM6UW55CNFUTNGD5ZRKGUKKKFDJGMFHL/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LEGCEOKFJVBJ2QQ6S2H4NAEWTUERC7SB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BM6UW55CNFUTNGD5ZRKGUKKKFDJGMFHL/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LEGCEOKFJVBJ2QQ6S2H4NAEWTUERC7SB/ https://metacpan.org/dist/CPAN/changes https://security.netapp.com/advisory/ntap-20240621-0007/ jsc#CAR-2561 rh#2218667 |
CVE-2023-3159 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CONFIRM:security.netapp.com:/advisory/ntap-20230113-0008/ CVE-2022-45919 CVE-2023-1077 CVE-2023-3159 D:CVE-2022-45919 DSA-5480 DSA-5492 L3:65449 L3:66178 L3:66431 L3:66432 L3:66463 L3:66491 L3:66496 L3:66505 L3:66852 L3:67104 MISC:lore.kernel.org:CVE-2022-45919 OSS:2023/Q1/126 SMASH Issue 358071 SMASH Issue 368823 ZDI-24-593 bnc#1205803 bnc#1208600 bnc#1208839 bnc#1208912 bnc#1212128 bnc#1212347 bnc#1212744 bnc#1213937 bnc#1214100 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=280a8ab81733da8bc442253c700a52c4c0886ffd https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=7c4a5b89a0b5a57a64b601775b296abf77a9fe97 https://github.com/torvalds/linux/commit/b7c81f80246fac44077166f3e07103affe6db8ff https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html https://lore.kernel.org/linux-media/20221121063308.GA33821%40ubuntu/T/#u https://security.netapp.com/advisory/ntap-20230511-0002/ jsc#CAR-2403 jsc#CAR-2670 jsc#CAR-2698 linux.git:commit:3e337087c3b5805fe0b8a46ba622a962880b5d64 rh#2150999 rh#2151956 rh#2173436 rh#2179000 rh#2187773 rh#2187931 rh#2192671 rh#2213414 rh#2218672 rh#2226780 |
CVE-2023-3161 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-3161 L3:66852 RHSA-2023:5603 RHSA-2023:5604 SMASH Issue 368829 bnc#1212154 https://github.com/torvalds/linux/commit/2b09d5d364986f724f17001ccfe4126b9b43a0be jsc#CAR-2671 rh#2213485 |
CVE-2023-32001 | curl:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N) | CVE-2023-32001 DSA-5460 OSS:2023/Q3/41 SMASH Issue 372147 SMASH Issue 372148 bnc#1213237 https://hackerone.com/reports/2039870 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BGJ7POX4ATGERTSBFJPW2EQH4Z65PSZJ/ https://www.debian.org/security/2023/dsa-5460 rh#2222604 |
CVE-2023-3212 | kernel-source-rt:Not affected | moderate | 4.3 (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-3212 DSA-5448 DSA-5480 SMASH Issue 369112 bnc#1212265 https://github.com/torvalds/linux/commit/504a10d9e46bc37b23d0a1ae2f28973c8516e636 https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html https://security.netapp.com/advisory/ntap-20230929-0005/ https://www.debian.org/security/2023/dsa-5448 https://www.debian.org/security/2023/dsa-5480 rh#2214348 |
CVE-2023-3220 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-3220 SMASH Issue 370020 bnc#1212556 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=93340e10b9c5fc86730d149636e0aa8b47bb5a34 rh#2216386 |
CVE-2023-32233 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-32233 DSA-5402 DSA-5480 DSA-5492 L3:65867 L3:66162 L3:66268 L3:66448 L3:66496 L3:66616 L3:66617 L3:67104 MISC:git.kernel.org:OSS:2023/05/08/4 OSS:2023/05/08/4 OSS:2023/05/15/5 OSS:2023/Q2/133 RHSA-2023:3349 RHSA-2023:3350 RHSA-2023:3351 RHSA-2023:3465 RHSA-2023:3470 RHSA-2023:3490 RHSA-2023:3705 RHSA-2023:3708 RHSA-2023:3723 RHSA-2023:3852 RHSA-2023:3853 RHSA-2023:4125 RHSA-2023:4126 RHSA-2023:4130 RHSA-2023:4145 RHSA-2023:4146 RHSA-2023:4255 RHSA-2023:4256 RHSA-2023:4262 RHSA-2023:4696 RHSA-2023:4699 RHSA-2023:5419 RHSA-2023:5574 RHSA-2023:5621 RHSA-2023:5622 SMASH Issue 364983 SMASH Issue 365249 ZDI-23-547 ZDI-24-593 bnc#1211043 bnc#1211187 bnc#1211475 bnc#1212725 bnc#1213891 bnc#1214105 bnc#1214541 bnc#1214542 http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c1592a89942e9678f7d9c8030efa777c0d57edab https://github.com/torvalds/linux/commit/c1592a89942e9678f7d9c8030efa777c0d57edab https://lists.debian.org/debian-lts-announce/2023/06/msg00008.html https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html https://news.ycombinator.com/item?id=35879660 https://security.netapp.com/advisory/ntap-20230616-0002/ https://www.debian.org/security/2023/dsa-5402 jsc#CAR-2672 linux.git:commit:3e337087c3b5805fe0b8a46ba622a962880b5d64 linux.git:commit:a2f4c143d76b1a47c91ef9bc46907116b111da0b rh#2151956 rh#2162120 rh#2168297 rh#2173436 rh#2179000 rh#2187773 rh#2187931 rh#2192671 rh#2196105 rh#2196292 rh#2213414 rh#2218672 rh#2226780 |
CVE-2023-32246 | kernel-source-rt:Not affected | moderate | () | CVE-2023-32246 SMASH Issue 366976 ZDI-23-694 bnc#1211528 |
CVE-2023-32247 | kernel-source-rt:Not affected | important | () | CVE-2023-32247 SMASH Issue 366975 ZDI-23-695 bnc#1211529 https://access.redhat.com/security/cve/CVE-2023-32247 https://security.netapp.com/advisory/ntap-20230915-0011/ https://www.zerodayinitiative.com/advisories/ZDI-CAN-20478/ rh#2219803 |
CVE-2023-32248 | kernel-source-rt:Not affected | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-32248 SMASH Issue 366974 ZDI-23-696 bnc#1211530 https://access.redhat.com/security/cve/CVE-2023-32248 https://security.netapp.com/advisory/ntap-20230915-0006/ https://www.zerodayinitiative.com/advisories/ZDI-CAN-20479/ rh#2219818 |
CVE-2023-32249 | kernel-source-rt:Not affected | moderate | () | CVE-2023-32249 SMASH Issue 366973 ZDI-23-697 bnc#1211531 |
CVE-2023-32250 | kernel-source-rt:Not affected | important | () | CVE-2023-32250 DSA-5448 SMASH Issue 366972 ZDI-23-698 bnc#1211532 https://access.redhat.com/security/cve/CVE-2023-32250 https://security.netapp.com/advisory/ntap-20230824-0004/ https://www.zerodayinitiative.com/advisories/ZDI-23-698/ rh#2208849 |
CVE-2023-32251 | kernel-source-rt:Not affected | low | () | CVE-2023-32251 SMASH Issue 366971 ZDI-23-699 bnc#1211533 |
CVE-2023-32252 | kernel-source-rt:Not affected | important | () | CVE-2023-32252 SMASH Issue 366970 ZDI-23-700 bnc#1211534 https://access.redhat.com/security/cve/CVE-2023-32252 https://security.netapp.com/advisory/ntap-20231124-0001/ https://www.zerodayinitiative.com/advisories/ZDI-CAN-20590/ rh#2219815 |
CVE-2023-32253 | kernel-source-rt:Not affected | moderate | () | CVE-2023-32253 SMASH Issue 366969 ZDI-23-701 bnc#1211535 |
CVE-2023-32254 | kernel-source-rt:Not affected | important | () | CVE-2023-32254 DSA-5448 SMASH Issue 366968 ZDI-23-702 bnc#1211536 https://access.redhat.com/security/cve/CVE-2023-32254 https://security.netapp.com/advisory/ntap-20230824-0004/ https://www.zerodayinitiative.com/advisories/ZDI-23-702/ rh#2191658 |
CVE-2023-32255 | kernel-source-rt:Not affected | moderate | () | CVE-2023-32255 SMASH Issue 366967 ZDI-23-703 bnc#1211537 |
CVE-2023-32256 | kernel-source-rt:Not affected | important | () | CVE-2023-32256 SMASH Issue 366966 ZDI-23-704 bnc#1211538 |
CVE-2023-32257 | kernel-source-rt:Not affected | important | () | CVE-2023-32257 SMASH Issue 366965 ZDI-23-705 bnc#1211539 https://access.redhat.com/security/cve/CVE-2023-32257 https://security.netapp.com/advisory/ntap-20230915-0011/ https://www.zerodayinitiative.com/advisories/ZDI-CAN-20596/ rh#2219806 |
CVE-2023-32258 | kernel-source-rt:Not affected | important | () | CVE-2023-32258 SMASH Issue 366964 ZDI-23-706 bnc#1211540 https://access.redhat.com/security/cve/CVE-2023-32258 https://security.netapp.com/advisory/ntap-20230915-0011/ https://www.zerodayinitiative.com/advisories/ZDI-CAN-20796/ rh#2219809 |
CVE-2023-32269 | kernel-source-rt:Ignore | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-32269 L3:66496 L3:67104 SMASH Issue 365269 bnc#1211186 https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.11 https://github.com/torvalds/linux/commit/611792920925fb088ddccbe2783c7f92fdfb6b64 jsc#CAR-2673 rh#2210940 |
CVE-2023-32611 | glib2:Already fixed | moderate | 6.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-32611 SMASH Issue 368201 bnc#1211951 https://access.redhat.com/security/cve/CVE-2023-32611 https://gitlab.gnome.org/GNOME/glib/-/issues/2797 https://lists.debian.org/debian-lts-announce/2023/09/msg00030.html https://security.gentoo.org/glsa/202311-18 https://security.netapp.com/advisory/ntap-20231027-0005/ jsc#CAR-2759 rh#2211829 |
CVE-2023-32629 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-32629 D:CVE-2023-32629 SMASH Issue 373438 ZDI-23-1009 bnc#1213685 bnc#1213707 http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html https://lists.ubuntu.com/archives/kernel-team/2023-July/140920.html https://ubuntu.com/security/notices/USN-6250-1 https://wiz.io/blog/ubuntu-overlayfs-vulnerability rh#2229734 |
CVE-2023-32636 | glib2:Already fixed | moderate | 6.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-32636 SMASH Issue 368203 bnc#1211948 https://gitlab.gnome.org/GNOME/glib/-/issues/2841 https://https://discourse.gnome.org/t/multiple-fixes-for-gvariant-normalisation-issues-in-glib/12835 https://security.netapp.com/advisory/ntap-20231110-0002/ rh#2211827 rh#2211828 rh#2211832 rh#2211833 |
CVE-2023-32643 | glib2:Not affected | important | 8.8 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-32643 SMASH Issue 368202 bnc#1211946 https://gitlab.gnome.org/GNOME/glib/-/issues/2840 https://https://discourse.gnome.org/t/multiple-fixes-for-gvariant-normalisation-issues-in-glib/12835 https://security.netapp.com/advisory/ntap-20240426-0005/ rh#2211827 rh#2211828 rh#2211832 rh#2211833 |
CVE-2023-32665 | glib2:Already fixed | moderate | 6.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-32665 SMASH Issue 368199 bnc#1211945 https://access.redhat.com/security/cve/CVE-2023-32665 https://gitlab.gnome.org/GNOME/glib/-/issues/2121 https://lists.debian.org/debian-lts-announce/2023/09/msg00030.html https://security.gentoo.org/glsa/202311-18 https://security.netapp.com/advisory/ntap-20240426-0006/ jsc#CAR-2757 rh#2211827 rh#2211832 |
CVE-2023-3268 | kernel-source-rt:Released | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L) | CVE-2023-3268 D:CVE-2023-3268 DSA-5448 DSA-5480 L3:66852 SMASH Issue 369734 bnc#1212502 https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=43ec16f1450f4936025a9bdf1a273affdb9732c1 https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html https://lore.kernel.org/lkml/1682238502-1892-1-git-send-email-yangpc@wangsu.com/T/ https://security.netapp.com/advisory/ntap-20230824-0006/ https://www.debian.org/security/2023/dsa-5448 https://www.debian.org/security/2023/dsa-5480 jsc#CAR-2658 rh#2215502 |
CVE-2023-3269 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H) | CVE-2023-3269 D:CVE-2023-3269 DSA-5448 MISC:git.kernel.org:OSS:2023/07/05/1 MLIST:[oss-security] 20190605 Re: CVE-2019-10149: Exim 4.87 to 4.91: possible remote exploit OSS:2022/02/03/1 OSS:2022/05/15/1 OSS:2023/07/05/1 OSS:2023/07/28/1 OSS:2023/08/25/1 OSS:2023/08/25/4 OSS:2023/Q3/4 SMASH Issue 369589 SMASH Issue 369594 bnc#1212395 bnc#1213760 http://seclists.org/fulldisclosure/2023/Jul/43 https://access.redhat.com/security/cve/CVE-2023-3269 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6AAA64CUPSMBW6XDTXPQJ3KQWYQ4K7L/ https://security.netapp.com/advisory/ntap-20230908-0001/ rh#2165926 rh#2215268 rh#2217523 |
CVE-2023-3312 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-3312 SMASH Issue 369860 bnc#1212536 https://patchwork.kernel.org/project/linux-pm/patch/20230323174026.950622-1-krzysztof.kozlowski@linaro.org/ https://security.netapp.com/advisory/ntap-20230731-0005/ rh#2215847 |
CVE-2023-33203 | kernel-source-rt:Released | moderate | () | CVE-2023-2483 CVE-2023-33203 SMASH Issue 364941 SMASH Issue 366901 bnc#1210685 bnc#1211037 bnc#1211038 https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.9 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6b6bc5b8bd2d4ca9e1efa9ae0f98a0b0687ace75 jsc#CAR-2655 rh#2192667 |
CVE-2023-33250 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2023-33250 D:CVE-2023-33250 SMASH Issue 367082 bnc#1211597 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=804ca14d04df09bf7924bacc5ad22a4bed80c94f https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=dbe245cdf5189e88d680379ed13901356628b650 https://groups.google.com/g/syzkaller/c/G6P9yecsTZ8/m/iiqFVOM9BwAJ https://lore.kernel.org/linux-iommu/ZDabT%2FuRl%2FjxFhm0%40ip-172-31-85-199.ec2.internal/T/ https://lore.kernel.org/linux-iommu/ZDabT%2FuRl%2FjxFhm0@ip-172-31-85-199.ec2.internal/T/ https://security.netapp.com/advisory/ntap-20230622-0006/ rh#2215758 |
CVE-2023-33288 | kernel-source-rt:Released | moderate | 4.8 (CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H) | CVE-2023-33288 D:CVE-2023-33288 SMASH Issue 367092 bnc#1211590 https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.9 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=47c29d69212911f50bdcdd0564b5999a559010d4 https://github.com/torvalds/linux/commit/47c29d69212911f50bdcdd0564b5999a559010d4 https://lore.kernel.org/all/CAHk-=whcaHLNpb7Mu_QX7ABwPgyRyfW-V8=v4Mv0S22fpjY4JQ@mail.gmail.com/ https://lore.kernel.org/lkml/20230309174728.233732-1-zyytlz.wz@163.com/ jsc#CAR-2674 rh#2209244 |
CVE-2023-3338 | kernel-source-rt:Not affected | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-3338 D:CVE-2023-3338 DSA-5480 L3:66432 OSS:2023/Q2/276 SMASH Issue 369945 SMASH Issue 370255 bnc#1212532 https://access.redhat.com/security/cve/CVE-2023-3338 https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html https://security.netapp.com/advisory/ntap-20230824-0005/ https://www.debian.org/security/2023/dsa-5480 rh#2217451 rh#2218618 |
CVE-2023-3355 | kernel-source-rt:Not affected | low | 1.9 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L) | CVE-2023-3355 SMASH Issue 370588 bnc#1212778 https://access.redhat.com/security/cve/CVE-2023-3355 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d839f0811a31322c087a859c2b181e2383daa7be rh#2217820 |
CVE-2023-3357 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-3357 D:CVE-2023-3357 SMASH Issue 370120 bnc#1212605 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=53ffa6a9f83b2170c60591da1ead8791d5a42e81 rh#2169482 |
CVE-2023-3358 | kernel-source-rt:Already fixed | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-3358 D:CVE-2023-3358 SMASH Issue 370119 bnc#1212606 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b3d40c3ec3dc4ad78017de6c3a38979f57aaaab8 jsc#CAR-2687 rh#2169343 |
CVE-2023-3359 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-3359 D:CVE-2023-3359 SMASH Issue 370118 bnc#1212608 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b0576ade3aaf24b376ea1a4406ae138e2a22b0c0 rh#2168251 |
CVE-2023-33595 | python3:Not affected | moderate | () | CVE-2023-33595 SMASH Issue 368795 bnc#1212127 https://github.com/python/cpython/issues/103824 https://github.com/python/cpython/pull/103993/commits/c120bc2d354ca3d27d0c7a53bf65574ddaabaf3a |
CVE-2023-3389 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2023-3389 DSA-5480 SMASH Issue 370836 bnc#1212838 http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.10.y&id=4716c73b188566865bdd79c3a6709696a224ac04 https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.15.y&id=0e388fce7aec40992eadee654193cad345d62663 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef7dfac51d8ed961b742218f526bd589f3900a59 https://kernel.dance/0e388fce7aec40992eadee654193cad345d62663 https://kernel.dance/4716c73b188566865bdd79c3a6709696a224ac04 https://kernel.dance/ef7dfac51d8ed961b742218f526bd589f3900a59 https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html https://security.netapp.com/advisory/ntap-20230731-0001/ https://www.debian.org/security/2023/dsa-5480 rh#2218604 |
CVE-2023-3390 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-3117 CVE-2023-3390 D:CVE-2023-3117 DSA-5448 DSA-5461 DSA-5480 DSA-5492 L3:66697 L3:66952 RHSA-2023:4789 RHSA-2023:4888 RHSA-2023:4961 RHSA-2023:4962 RHSA-2023:4967 RHSA-2023:5069 RHSA-2023:5091 RHSA-2023:5093 RHSA-2023:5221 RHSA-2023:5235 RHSA-2023:5238 RHSA-2023:5244 RHSA-2023:5255 SMASH Issue 370850 SMASH Issue 370938 bnc#1212846 bnc#1212934 bnc#1213245 bnc#1214994 http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1240eb93f0616b21c675416516ff3d74798fdc97 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1240eb93f0616b21c675416516ff3d74798fdc97 https://kernel.dance/1240eb93f0616b21c675416516ff3d74798fdc97 https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html https://security.netapp.com/advisory/ntap-20230818-0004/ https://www.debian.org/security/2023/dsa-5448 https://www.debian.org/security/2023/dsa-5461 jsc#CAR-2719 rh#2213260 rh#2218605 rh#2219270 rh#2227020 rh#2231800 |
CVE-2023-33951 | kernel-source-rt:Not affected | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L) | CVE-2023-33951 SMASH Issue 366963 SMASH Issue 367634 ZDI-23-707 bnc#1211593 https://access.redhat.com/errata/RHSA-2023:6583 https://access.redhat.com/errata/RHSA-2023:6901 https://access.redhat.com/errata/RHSA-2023:7077 https://access.redhat.com/security/cve/CVE-2023-33951 https://www.zerodayinitiative.com/advisories/ZDI-CAN-20110/ rh#2218195 rh#2218212 rh#2245663 |
CVE-2023-33952 | kernel-source-rt:Not affected | important | 8.2 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H) | CVE-2023-33952 SMASH Issue 366962 SMASH Issue 367633 ZDI-23-708 bnc#1211595 bnc#1212348 https://access.redhat.com/errata/RHSA-2023:6583 https://access.redhat.com/errata/RHSA-2023:6901 https://access.redhat.com/errata/RHSA-2023:7077 https://access.redhat.com/security/cve/CVE-2023-33952 https://www.zerodayinitiative.com/advisories/ZDI-CAN-20292 rh#2218195 rh#2218212 rh#2245663 |
CVE-2023-3397 | kernel-source-rt:Ignore | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-3397 L3:66407 SMASH Issue 370458 bnc#1212704 bnc#1212935 https://access.redhat.com/security/cve/CVE-2023-3397 https://www.spinics.net/lists/kernel/msg4788636.html jsc#CAR-2721 rh#2217271 |
CVE-2023-34255 | kernel-source-rt:Already fixed | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-34255 SMASH Issue 368047 bnc#1211903 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=22ed903eee23a5b174e240f1cdfa9acf393a5210 https://syzkaller.appspot.com/bug?extid=7e9494b8b399902e994e |
CVE-2023-34256 | kernel-source-rt:Not affected | low | 4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | CVE-2023-34256 SMASH Issue 368048 bnc#1211895 https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.3 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4f04351888a83e595571de672e0a4a8b74f4fb31 https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html https://syzkaller.appspot.com/bug?extid=8785e41224a3afd04321 jsc#CAR-2675 rh#2227263 |
CVE-2023-34319 | kernel-source-rt:Released | moderate | 6.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H) | CVE-2023-34319 DSA-5480 DSA-5492 OSS:2023/Q3/96 SMASH Issue 373186 SMASH Issue 373187 bnc#1213546 http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html https://security.netapp.com/advisory/ntap-20240202-0001/ https://xenbits.xenproject.org/xsa/advisory-432.html https://xenbits.xenproject.org/xsa/advisory-438.html jsc#CAR-2808 linux.git:commit:534fc31d09b706a16d83533e16b5dc855caf7576 rh#2230156 |
CVE-2023-3439 | kernel-source-rt:Not affected | moderate | () | CVE-2023-3439 D:CVE-2023-3439 MISC:github.com:OSS:2023/Q3/0 OSS:2023/07/02/1 OSS:2023/Q3/0 SMASH Issue 370708 bnc#1212845 https://github.com/torvalds/linux/commit/b561275d633bcd8e0e8055ab86f1a13df75a0269 rh#2217915 |
CVE-2023-3446 | openssl:Released, openssl-1_1:Released | moderate | 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | CVE-2023-3446 L3:66413 L3:66414 L3:67802 OSS:2023/07/19/4 OSS:2023/07/19/5 OSS:2023/07/19/6 OSS:2023/07/31/1 OSS:2023/09/14/1 OSS:2023/09/22/11 OSS:2023/09/22/9 OSS:2023/11/06/2 OSS:2023/Q3/215 OSS:2023/Q3/44 OSS:2023/Q3/85 OSS:2024/02/08/2 OSS:2024/03/11/1 OSS:2024/05/16/1 OSS:2024/Q1/205 OSS:2024/Q2/243 SMASH Issue 372979 bnc#1213487 bnc#1213735 bnc#1213736 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1fa20cf2f506113c761777127a38bce5068740eb https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8780a896543a654e757db1b9396383f9d8095528 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fc9867c1e03c22ebf56943be205202e576aabf23 https://github.com/nodejs/undici/security/advisories/GHSA-3787-6prv-h9w3 https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html https://security.gentoo.org/glsa/202402-08 https://security.netapp.com/advisory/ntap-20230803-0011/ https://www.openssl.org/news/secadv/20230719.txt jsc#CAR-2747 openssl.git:commit:1c16253f3c3a8d1e25918c3f404aae6a5b0893de openssl.git:commit:4b29762802c05fa871f0e1efcf804e86db0ddaa2 openssl.git:commit:4d4657cb6ba364dfa60681948b0a30c40bee31ca openssl.git:commit:4ec53ad6e1791daafbe26bdbd539f2ba9172959a openssl.git:commit:9e0094e2aa1b3428a12d5095132f133c078d3c3d openssl.git:commit:afb19f07aecc84998eeea56c4d65f5e0499abb5a openssl.git:commit:ede782b4c8868d1f09c9cd237f82b6f35b7dba8b rh#2224962 rh#2227852 rh#2248616 |
CVE-2023-34969 | dbus-1:Released | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-34969 D:CVE-2023-34969 RHSA-2023:4498 RHSA-2023:4569 RHSA-2023:5193 SMASH Issue 368822 bnc#1212126 https://gitlab.freedesktop.org/dbus/dbus/-/issues/457 https://lists.debian.org/debian-lts-announce/2023/10/msg00033.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZYCDRMD7B4XO4HF6C6YTLH4YUD7TANP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZYCDRMD7B4XO4HF6C6YTLH4YUD7TANP/ https://security.netapp.com/advisory/ntap-20231208-0007/ jsc#CAR-2676 rh#2213166 |
CVE-2023-35001 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-35001 DSA-5453 L3:66407 L3:67059 L3:67191 L3:67233 OSS:2023/07/05/3 OSS:2023/Q3/6 RHSA-2023:4961 RHSA-2023:4962 RHSA-2023:4967 RHSA-2023:5069 RHSA-2023:5091 RHSA-2023:5093 RHSA-2023:5221 RHSA-2023:5235 RHSA-2023:5238 RHSA-2023:5244 RHSA-2023:5255 RHSA-2023:5414 RHSA-2023:5548 RHSA-2023:5574 RHSA-2023:5575 RHSA-2023:5603 RHSA-2023:5604 RHSA-2023:5621 RHSA-2023:5622 RHSA-2023:5627 SMASH Issue 371262 ZDI-23-900 bnc#1213059 bnc#1213063 bnc#1216905 http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGZC5XOANA75OJ4XARBBXYSLDKUIJI5E/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPHI46ROSSLVAV4R5LJWJYU747JGOS6D/ https://lore.kernel.org/netfilter-devel/20230705121515.747251-1-cascardo@canonical.com/T/ https://security.netapp.com/advisory/ntap-20230824-0007/ https://www.debian.org/security/2023/dsa-5453 jsc#CAR-2723 rh#2220892 |
CVE-2023-3567 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-3567 L3:66407 L3:66432 L3:66730 L3:66852 L3:67174 L3:67191 L3:67233 SMASH Issue 371602 bnc#1213167 bnc#1213244 bnc#1215161 http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html https://access.redhat.com/errata/RHSA-2024:0412 https://access.redhat.com/errata/RHSA-2024:0431 https://access.redhat.com/errata/RHSA-2024:0432 https://access.redhat.com/errata/RHSA-2024:0439 https://access.redhat.com/errata/RHSA-2024:0448 https://access.redhat.com/errata/RHSA-2024:0575 https://access.redhat.com/errata/RHSA-2024:2394 https://access.redhat.com/errata/RHSA-2024:2950 https://access.redhat.com/errata/RHSA-2024:3138 https://access.redhat.com/security/cve/CVE-2023-3567 https://www.spinics.net/lists/stable-commits/msg285184.html jsc#CAR-2734 rh#2221463 |
CVE-2023-35788 | kernel-source-rt:Released | important | 7.4 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H) | CVE-2023-35788 DSA-5448 DSA-5480 MISC:git.kernel.org:OSS:2023/06/07/1 OSS:2023/06/07/1 OSS:2023/06/17/1 OSS:2023/Q2/234 RHSA-2023:4377 RHSA-2023:4378 RHSA-2023:4380 RHSA-2023:4515 RHSA-2023:4516 RHSA-2023:4697 RHSA-2023:4698 RHSA-2023:4789 RHSA-2023:4815 RHSA-2023:4817 RHSA-2023:4819 RHSA-2023:4821 RHSA-2023:4829 RHSA-2023:4834 RHSA-2023:4888 RHSA-2023:4961 RHSA-2023:4962 RHSA-2023:4967 RHSA-2023:5221 RHSA-2023:5244 RHSA-2023:5255 RHSA-2023:5575 RHSA-2023:5603 RHSA-2023:5604 SMASH Issue 369796 bnc#1212504 bnc#1212509 http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.7 https://git.kernel.org/linus/4d56304e5827c8cc8cc18c75343d283af7c4825c https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html https://security.netapp.com/advisory/ntap-20230714-0002/ https://www.debian.org/security/2023/dsa-5448 https://www.debian.org/security/2023/dsa-5480 jsc#CAR-2680 jsc#CAR-2681 rh#2215768 |
CVE-2023-35823 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-35823 D:CVE-2023-35823 SMASH Issue 369820 bnc#1212494 https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=30cf57da176cca80f11df0d9b7f71581fe601389 https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html https://lore.kernel.org/all/49bb0b6a-e669-d4e7-d742-a19d2763e947@xs4all.nl/ https://lore.kernel.org/lkml/20230318085023.832510-1-zyytlz.wz@163.com/t/ https://security.netapp.com/advisory/ntap-20230803-0002/ rh#2215835 rh#2216007 |
CVE-2023-35824 | kernel-source-rt:Released | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-35824 D:CVE-2023-35824 L3:66852 SMASH Issue 369821 bnc#1212501 https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5abda7a16698d4d1f47af1168d8fa2c640116b4a https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html https://lore.kernel.org/all/49bb0b6a-e669-d4e7-d742-a19d2763e947@xs4all.nl/ https://lore.kernel.org/lkml/20230318081506.795147-1-zyytlz.wz@163.com/ https://security.netapp.com/advisory/ntap-20230803-0002/ jsc#CAR-2683 rh#2215836 |
CVE-2023-35825 | kernel-source-rt:Ignore | moderate | () | CVE-2023-35825 D:CVE-2023-35825 SMASH Issue 369822 bnc#1212503 https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.4 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=63264422785021704c39b38f65a78ab9e4a186d7 https://lore.kernel.org/all/20230523164950.435226211@linuxfoundation.org/ https://lore.kernel.org/lkml/20230501030540.3254928-4-sashal@kernel.org/ rh#2215837 |
CVE-2023-35826 | kernel-source-rt:Not affected | moderate | 5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-35826 D:CVE-2023-35826 SMASH Issue 369823 bnc#1212505 https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=50d0a7aea4809cef87979d4669911276aa23b71f https://lore.kernel.org/all/a4dafa22-3ee3-dbe1-fd50-fee07883ce1a%40xs4all.nl/ https://lore.kernel.org/all/a4dafa22-3ee3-dbe1-fd50-fee07883ce1a@xs4all.nl/ https://lore.kernel.org/linux-arm-kernel/20230308032333.1893394-1-zyytlz.wz%40163.com/T/ https://lore.kernel.org/linux-arm-kernel/20230308032333.1893394-1-zyytlz.wz@163.com/T/ https://security.netapp.com/advisory/ntap-20230803-0002/ rh#2215838 |
CVE-2023-35827 | kernel-source-rt:Not affected | moderate | () | CVE-2023-35827 D:CVE-2023-35827 L3:68095 L3:68137 SMASH Issue 369824 bnc#1212514 https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html https://lore.kernel.org/lkml/cca0b40b-d6f8-54c7-1e46-83cb62d0a2f1%40huawei.com/T/ https://lore.kernel.org/lkml/cca0b40b-d6f8-54c7-1e46-83cb62d0a2f1@huawei.com/T/ https://security.netapp.com/advisory/ntap-20230803-0003/ https://www.spinics.net/lists/netdev/msg886947.html rh#2215840 |
CVE-2023-35828 | kernel-source-rt:Already fixed | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-35828 D:CVE-2023-35828 SMASH Issue 369825 bnc#1212513 https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2b947f8769be8b8181dc795fd292d3e7120f5204 https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html https://lore.kernel.org/all/20230327121700.52d881e0%40canb.auug.org.au/ https://lore.kernel.org/all/20230327121700.52d881e0@canb.auug.org.au/ https://lore.kernel.org/lkml/CAJedcCwkuznS1kSTvJXhzPoavcZDWNhNMshi-Ux0spSVRwU=RA%40mail.gmail.com/T/ https://lore.kernel.org/lkml/CAJedcCwkuznS1kSTvJXhzPoavcZDWNhNMshi-Ux0spSVRwU=RA@mail.gmail.com/T/ https://security.netapp.com/advisory/ntap-20230803-0002/ jsc#CAR-2682 rh#2215839 |
CVE-2023-35829 | kernel-source-rt:Not affected | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-35829 D:CVE-2023-35829 SMASH Issue 369826 bnc#1212495 https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3228cec23b8b29215e18090c6ba635840190993d https://lore.kernel.org/all/a4dafa22-3ee3-dbe1-fd50-fee07883ce1a%40xs4all.nl/ https://lore.kernel.org/all/a4dafa22-3ee3-dbe1-fd50-fee07883ce1a@xs4all.nl/ https://lore.kernel.org/lkml/20230307173900.1299387-1-zyytlz.wz%40163.com/T/ https://lore.kernel.org/lkml/20230307173900.1299387-1-zyytlz.wz@163.com/T/ https://security.netapp.com/advisory/ntap-20230803-0002/ rh#2215841 |
CVE-2023-35945 | nghttp2:Ignore | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-35945 DSA-5570 L3:67207 L3:67577 L3:67609 RHSA-2023:4624 RHSA-2023:4625 RHSA-2023:5175 SMASH Issue 372438 bnc#1215713 bnc#1217560 bnc#1219707 https://github.com/envoyproxy/envoy/security/advisories/GHSA-jfxv-29pc-x22r https://github.com/nghttp2/nghttp2/blob/e7f59406556c80904b81b593d38508591bb7523a/lib/nghttp2_session.c#L3346 jsc#CAR-2915 rh#2217983 rh#2242803 rh#2243296 rh#2243877 rh#2253521 rh#2279365 |
CVE-2023-3609 | kernel-source-rt:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-3609 DSA-5480 L3:67174 L3:67191 RHSA-2023:5574 RHSA-2023:5621 RHSA-2023:5622 RHSA-2023:5628 SMASH Issue 373241 bnc#1213586 bnc#1213587 http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=04c55383fa5689357bcdd2c8036725a55ed632bc https://kernel.dance/04c55383fa5689357bcdd2c8036725a55ed632bc https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html https://security.netapp.com/advisory/ntap-20230818-0005/ https://www.debian.org/security/2023/dsa-5480 jsc#CAR-2763 rh#2225201 |
CVE-2023-3610 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-3610 DSA-5461 RHSA-2023:5069 RHSA-2023:5091 RHSA-2023:5093 SMASH Issue 373242 bnc#1213580 bnc#1213584 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=4bedf9eee016286c835e3d8fa981ddece5338795 https://kernel.dance/4bedf9eee016286c835e3d8fa981ddece5338795 https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html https://security.netapp.com/advisory/ntap-20230818-0005/ https://www.debian.org/security/2023/dsa-5461 rh#2225198 |
CVE-2023-3611 | kernel-source-rt:Released | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-3611 DSA-5480 DSA-5492 L3:67994 L3:68063 SMASH Issue 373243 bnc#1213585 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e337087c3b5805fe0b8a46ba622a962880b5d64 https://kernel.dance/3e337087c3b5805fe0b8a46ba622a962880b5d64 https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html https://security.netapp.com/advisory/ntap-20230908-0002/ https://www.debian.org/security/2023/dsa-5480 https://www.debian.org/security/2023/dsa-5492 jsc#CAR-2764 rh#2225191 |
CVE-2023-36191 | sqlite3:Won't fix | low | 0 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N) | CVE-2023-36191 D:CVE-2023-36191 L3:66557 SMASH Issue 370250 bnc#1212643 bnc#1214320 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KREKCQTJDVI2AEBG5ECZPSOQXIC2L5XL/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBAHED5YFJPRGSEKNZIYHZBGSVHGEHOH/ https://www.sqlite.org/forum/forumpost/19f55ef73b jsc#CAR-2696 rh#2216936 |
CVE-2023-3640 | kernel-source-rt:Won't fix | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2023-3640 OSS:2023/07/28/1 SMASH Issue 372250 bnc#1213271 https://access.redhat.com/security/cve/CVE-2023-3640 rh#2165926 rh#2217523 |
CVE-2023-36632 | python3:Won't fix | low | 3.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L) | CVE-2023-36632 D:CVE-2023-36632 SMASH Issue 370459 bnc#1212717 https://docs.python.org/3/library/email.html https://docs.python.org/3/library/email.utils.html https://github.com/Daybreak2019/PoC_python3.9_Vul/blob/main/RecursionError-email.utils.parseaddr.py https://github.com/python/cpython/issues/103800 jsc#CAR-2697 rh#2217338 |
CVE-2023-36660 | libnettle:Not affected | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H) | CVE-2023-36660 D:CVE-2023-36660 SMASH Issue 368752 SMASH Issue 370462 bnc#1212112 bnc#1212708 https://git.lysator.liu.se/nettle/nettle/-/commit/867a4548b95705291a3afdd66d76e7f17ba2618f https://git.lysator.liu.se/nettle/nettle/-/compare/nettle_3.9_release_20230514...nettle_3.9.1_release_20230601 https://security.gentoo.org/glsa/202401-24 rh#2217430 |
CVE-2023-37453 | kernel-source-rt:Not affected | moderate | 4.6 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-37453 SMASH Issue 371496 bnc#1213123 bnc#1226474 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1e4c574225cc5a0553115e5eb5787d1474db5b0f https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=85d07c55621676d47d873d2749b88f783cd4d5a1 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=de28e469da75359a2bb8cd8778b78aa64b1be1f4 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ff33299ec8bb80cdcc073ad9c506bd79bb2ed20b https://lore.kernel.org/all/000000000000c0ffe505fe86c9ca%40google.com/T/ https://lore.kernel.org/all/000000000000c0ffe505fe86c9ca@google.com/T/ https://lore.kernel.org/all/000000000000e56434059580f86e%40google.com/T/ https://lore.kernel.org/all/000000000000e56434059580f86e@google.com/T/ https://syzkaller.appspot.com/bug?extid=18996170f8096c6174d0 rh#2221039 |
CVE-2023-37454 | kernel-source-rt:Analysis | moderate | () | CVE-2023-37454 SMASH Issue 371497 bnc#1213122 https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-37454 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6f861765464f43a71462d52026fbddfc858239a5 https://lore.kernel.org/all/00000000000056e02f05dfb6e11a%40google.com/T/ https://lore.kernel.org/all/00000000000056e02f05dfb6e11a@google.com/T/ https://syzkaller.appspot.com/bug?extid=26873a72980f8fa8bc55 https://syzkaller.appspot.com/bug?extid=60864ed35b1073540d57 https://syzkaller.appspot.com/bug?extid=61564e5023b7229ec85d rh#2221038 |
CVE-2023-3772 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-3772 DSA-5492 OSS:2023/08/10/1 OSS:2023/08/10/3 OSS:2023/Q3/103 SMASH Issue 373392 bnc#1213666 https://access.redhat.com/errata/RHSA-2023:6583 https://access.redhat.com/errata/RHSA-2023:6901 https://access.redhat.com/errata/RHSA-2023:7077 https://access.redhat.com/errata/RHSA-2024:0412 https://access.redhat.com/errata/RHSA-2024:0575 https://access.redhat.com/security/cve/CVE-2023-3772 https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html https://www.debian.org/security/2023/dsa-5492 jsc#CAR-2769 linux.git:commit:00374d9b6d9f932802b55181be9831aa948e5b7c rh#2218943 |
CVE-2023-3773 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2023-3773 DSA-5492 SMASH Issue 373393 bnc#1213667 https://access.redhat.com/security/cve/CVE-2023-3773 https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html https://www.debian.org/security/2023/dsa-5492 linux.git:commit:55cef78c244d0d076f5a75a35530ca63c92f4426 linux.git:commit:5d6ba607d6cb5c58a4ddf33381e18c83dbb4098f linux.git:commit:5e2424708da7207087934c5c75211e8584d553a0 linux.git:commit:79c8651587504ba263d2fd67fd4406240fb21f69 linux.git:commit:b3003e1b54e057f5f3124e437b80c3bef26ed3fe rh#2218944 |
CVE-2023-3776 | kernel-source-rt:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-3776 DSA-5480 DSA-5492 L3:66812 L3:66852 L3:67174 L3:67191 L3:67233 L3:67846 L3:67866 L3:67994 L3:68063 RHSA-2023:5069 RHSA-2023:5091 RHSA-2023:5093 RHSA-2023:5221 RHSA-2023:5244 RHSA-2023:5255 RHSA-2023:5628 SMASH Issue 373244 bnc#1213588 bnc#1215119 bnc#1215450 http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=0323bce598eea038714f941ce2b22541c46d488f https://kernel.dance/0323bce598eea038714f941ce2b22541c46d488f https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html https://security.netapp.com/advisory/ntap-20240202-0003/ https://www.debian.org/security/2023/dsa-5480 https://www.debian.org/security/2023/dsa-5492 jsc#CAR-2765 rh#2225097 rh#2225511 rh#2237757 rh#2237760 rh#2237894 rh#2237901 rh#2237902 rh#2245514 rh#2261965 |
CVE-2023-3777 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-3777 DSA-5492 SMASH Issue 377512 bnc#1215095 bnc#1215097 http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8 https://kernel.dance/6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8 https://www.debian.org/security/2023/dsa-5492 rh#2237750 |
CVE-2023-38039 | curl:Not affected | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-38039 L3:67171 OSS:2023/Q3/175 SMASH Issue 377440 SMASH Issue 377441 bnc#1215026 bnc#1217439 http://seclists.org/fulldisclosure/2023/Oct/17 http://seclists.org/fulldisclosure/2024/Jan/34 http://seclists.org/fulldisclosure/2024/Jan/37 http://seclists.org/fulldisclosure/2024/Jan/38 https://hackerone.com/reports/2072338 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DCZMYODALBLVOXVJEN2LF2MLANEYL4F/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6KGKB2JNZVT276JYSKI6FV2VFJUGDOJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEAWTYHC3RT6ZRS5OZRHLAIENVN6CCIS/ https://security.gentoo.org/glsa/202310-12 https://security.netapp.com/advisory/ntap-20231013-0005/ https://support.apple.com/kb/HT214036 https://support.apple.com/kb/HT214057 https://support.apple.com/kb/HT214058 https://support.apple.com/kb/HT214063 https://www.insyde.com/security-pledge/SA-2023064 jsc#CAR-2866 rh#2239135 |
CVE-2023-3812 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-3812 L3:67174 L3:67191 SMASH Issue 373089 bnc#1213543 bnc#1213706 https://access.redhat.com/errata/RHSA-2023:6799 https://access.redhat.com/errata/RHSA-2023:6813 https://access.redhat.com/errata/RHSA-2023:7370 https://access.redhat.com/errata/RHSA-2023:7379 https://access.redhat.com/errata/RHSA-2023:7382 https://access.redhat.com/errata/RHSA-2023:7389 https://access.redhat.com/errata/RHSA-2023:7411 https://access.redhat.com/errata/RHSA-2023:7418 https://access.redhat.com/errata/RHSA-2023:7548 https://access.redhat.com/errata/RHSA-2023:7549 https://access.redhat.com/errata/RHSA-2023:7554 https://access.redhat.com/errata/RHSA-2024:0340 https://access.redhat.com/errata/RHSA-2024:0378 https://access.redhat.com/errata/RHSA-2024:0412 https://access.redhat.com/errata/RHSA-2024:0461 https://access.redhat.com/errata/RHSA-2024:0554 https://access.redhat.com/errata/RHSA-2024:0562 https://access.redhat.com/errata/RHSA-2024:0563 https://access.redhat.com/errata/RHSA-2024:0575 https://access.redhat.com/errata/RHSA-2024:0593 https://access.redhat.com/errata/RHSA-2024:1961 https://access.redhat.com/errata/RHSA-2024:2006 https://access.redhat.com/errata/RHSA-2024:2008 https://access.redhat.com/security/cve/CVE-2023-3812 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=363a5328f4b0 jsc#CAR-2761 rh#2224048 |
CVE-2023-3817 | openssl:Released, openssl-1_1:Released | moderate | 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | CVE-2023-3817 OSS:2023/07/31/1 OSS:2023/09/14/1 OSS:2023/09/22/11 OSS:2023/09/22/9 OSS:2023/11/06/2 OSS:2023/Q3/215 OSS:2023/Q3/85 OSS:2024/02/08/2 OSS:2024/03/11/1 OSS:2024/05/16/1 OSS:2024/Q1/205 OSS:2024/Q2/243 SMASH Issue 373803 bnc#1213853 http://seclists.org/fulldisclosure/2023/Jul/43 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a1eb62c29db6cb5eec707f9338aee00f44e26f5 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9002fd07327a91f35ba6c1307e71fa6fd4409b7f https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=91ddeba0f2269b017dc06c46c993a788974b1aa5 https://github.com/nodejs/undici/security/advisories/GHSA-3787-6prv-h9w3 https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html https://security.gentoo.org/glsa/202402-08 https://security.netapp.com/advisory/ntap-20230818-0014/ https://security.netapp.com/advisory/ntap-20231027-0008/ https://security.netapp.com/advisory/ntap-20240621-0006/ https://www.openssl.org/news/secadv/20230731.txt jsc#CAR-2778 openssl.git:commit:1c16253f3c3a8d1e25918c3f404aae6a5b0893de openssl.git:commit:4b29762802c05fa871f0e1efcf804e86db0ddaa2 openssl.git:commit:4d4657cb6ba364dfa60681948b0a30c40bee31ca openssl.git:commit:4ec53ad6e1791daafbe26bdbd539f2ba9172959a openssl.git:commit:9e0094e2aa1b3428a12d5095132f133c078d3c3d openssl.git:commit:afb19f07aecc84998eeea56c4d65f5e0499abb5a openssl.git:commit:ede782b4c8868d1f09c9cd237f82b6f35b7dba8b rh#2224962 rh#2227852 rh#2248616 |
CVE-2023-38325 | python-cryptography:Not affected | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-38325 SMASH Issue 372583 bnc#1213378 https://github.com/pyca/cryptography/compare/41.0.1...41.0.2 https://github.com/pyca/cryptography/issues/9207 https://github.com/pyca/cryptography/pull/9208 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMCCTYY3CSNQBFFYYC5DAV6KATHWCUZK/ https://pypi.org/project/cryptography/#history https://security.netapp.com/advisory/ntap-20230824-0010/ rh#2231271 |
CVE-2023-38408 | openssh:Released | important | 7.5 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-38408 D:CVE-2023-38408 L3:66353 L3:66396 L3:66408 L3:66440 L3:66460 L3:66495 L3:66564 L3:66682 L3:67067 L3:67097 L3:67098 L3:67473 L3:67527 L3:68028 MISC:bugs.chromium.org:CVE-2016-10009 MISC:bugs.chromium.org:OSS:2023/07/19/9 MISC:www.openssh.com:CVE-2020-15778 MISC:www.qualys.com:MISC:www.openwall.com:CVE-2021-33909 OSS:2023/07/19/9 OSS:2023/07/20/1 OSS:2023/07/20/2 OSS:2023/09/14/1 OSS:2023/09/22/11 OSS:2023/09/22/9 OSS:2023/Q3/215 OSS:2023/Q3/49 RHSA-2023:4329 RHSA-2023:4381 RHSA-2023:4382 RHSA-2023:4383 RHSA-2023:4384 RHSA-2023:4412 RHSA-2023:4413 RHSA-2023:4419 RHSA-2023:4428 RHSA-2023:4889 SMASH Issue 372998 bnc#1213504 bnc#1213536 bnc#1213703 bnc#1213728 bnc#1213850 bnc#1213924 bnc#1214095 bnc#1214345 bnc#1214843 bnc#1216874 http://packetstormsecurity.com/files/173661/OpenSSH-Forwarded-SSH-Agent-Remote-Code-Execution.html https://blog.qualys.com/vulnerabilities-threat-research/2023/07/19/cve-2023-38408-remote-code-execution-in-opensshs-forwarded-ssh-agent https://github.com/openbsd/src/commit/7bc29a9d5cd697290aa056e94ecee6253d3425f8 https://github.com/openbsd/src/commit/f03a4faa55c4ce0818324701dadbf91988d7351d https://github.com/openbsd/src/commit/f8f5a6b003981bb824329dc987d101977beda7ca https://lists.debian.org/debian-lts-announce/2023/08/msg00021.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CEBTJJINE2I3FHAUKKNQWMFGYMLSMWKQ/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAXVQS6ZYTULFAK3TEJHRLKZALJS3AOU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CEBTJJINE2I3FHAUKKNQWMFGYMLSMWKQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAXVQS6ZYTULFAK3TEJHRLKZALJS3AOU/ https://news.ycombinator.com/item?id=36790196 https://security.gentoo.org/glsa/202307-01 https://security.netapp.com/advisory/ntap-20230803-0010/ https://support.apple.com/kb/HT213940 https://www.openssh.com/txt/release-9.3p2 https://www.qualys.com/2023/07/19/cve-2023-38408/rce-openssh-forwarded-ssh-agent.txt https://www.vicarius.io/vsociety/posts/exploring-opensshs-agent-forwarding-rce-cve-2023-38408 jsc#CAR-2749 rh#2224173 |
CVE-2023-38409 | kernel-source-rt:Not affected | low | 2.9 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) | CVE-2023-38409 D:CVE-2023-38409 SMASH Issue 372746 bnc#1213417 https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.12 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=fffb0b52d5258554c645c966c6cbef7de50b851d rh#2230042 |
CVE-2023-38426 | kernel-source-rt:Not affected | critical | () | CVE-2023-38426 D:CVE-2023-38426 SMASH Issue 372752 bnc#1213421 https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.4 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/ksmbd?id=02f76c401d17e409ed45bf7887148fcc22c93c85 https://security.netapp.com/advisory/ntap-20230915-0010/ |
CVE-2023-38427 | kernel-source-rt:Not affected | critical | () | CVE-2023-38427 D:CVE-2023-38427 SMASH Issue 372753 bnc#1213422 https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.8 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/smb/server?id=f1a411873c85b642f13b01f21b534c2bab81fc1b https://security.netapp.com/advisory/ntap-20230824-0011/ rh#2239898 |
CVE-2023-38428 | kernel-source-rt:Not affected | critical | () | CVE-2023-38428 D:CVE-2023-38428 SMASH Issue 372754 bnc#1213423 https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.4 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/ksmbd?id=f0a96d1aafd8964e1f9955c830a3e5cb3c60a90f https://security.netapp.com/advisory/ntap-20230831-0001/ |
CVE-2023-38429 | kernel-source-rt:Not affected | critical | () | CVE-2023-38429 D:CVE-2023-38429 SMASH Issue 372755 bnc#1213424 https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.4 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/ksmbd?id=443d61d1fa9faa60ef925513d83742902390100f |
CVE-2023-38430 | kernel-source-rt:Not affected | critical | () | CVE-2023-38430 D:CVE-2023-38430 SMASH Issue 372756 bnc#1213425 https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.9 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/smb/server?id=1c1bcf2d3ea061613119b534f57507c377df20f9 https://security.netapp.com/advisory/ntap-20230831-0003/ |
CVE-2023-38431 | kernel-source-rt:Not affected | critical | () | CVE-2023-38431 D:CVE-2023-38431 SMASH Issue 372757 bnc#1213426 https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.8 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/smb/server?id=368ba06881c395f1c9a7ba22203cf8d78b4addc0 https://security.netapp.com/advisory/ntap-20230824-0011/ |
CVE-2023-38432 | kernel-source-rt:Not affected | critical | () | CVE-2023-38432 D:CVE-2023-38432 SMASH Issue 372758 bnc#1213427 https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.10 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/smb/server?id=2b9b8f3b68edb3d67d79962f02e26dbb5ae3808d https://security.netapp.com/advisory/ntap-20230831-0002/ rh#2243624 |
CVE-2023-38545 | curl:Not affected | important | 8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-38545 DSA-5523 OSS:2023/Q4/80 Oracle:CVE-2023-38545 SMASH Issue 380621 SMASH Issue 380622 bnc#1215888 http://seclists.org/fulldisclosure/2024/Jan/34 http://seclists.org/fulldisclosure/2024/Jan/37 http://seclists.org/fulldisclosure/2024/Jan/38 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/ https://security.netapp.com/advisory/ntap-20231027-0009/ https://security.netapp.com/advisory/ntap-20240201-0005/ https://support.apple.com/kb/HT214036 https://support.apple.com/kb/HT214057 https://support.apple.com/kb/HT214058 https://support.apple.com/kb/HT214063 https://www.secpod.com/blog/high-severity-heap-buffer-overflow-vulnerability/ rh#2241933 |
CVE-2023-38546 | curl:Released | moderate | 4.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L) | CVE-2023-38546 DSA-5523 OSS:2023/Q4/81 SMASH Issue 380623 SMASH Issue 380624 bnc#1215889 http://seclists.org/fulldisclosure/2024/Jan/34 http://seclists.org/fulldisclosure/2024/Jan/37 http://seclists.org/fulldisclosure/2024/Jan/38 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/ https://support.apple.com/kb/HT214036 https://support.apple.com/kb/HT214057 https://support.apple.com/kb/HT214058 https://support.apple.com/kb/HT214063 jsc#CAR-2934 rh#2241938 |
CVE-2023-3863 | kernel-source-rt:Released | important | 7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-3863 DSA-5480 DSA-5492 L3:66812 L3:67174 L3:67191 L3:67233 L3:67569 L3:67608 SMASH Issue 373296 bnc#1213601 bnc#1213603 https://access.redhat.com/security/cve/CVE-2023-3863 https://github.com/torvalds/linux/commit/6709d4b7bc2e079241fdef15d1160581c5261c10 https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html https://security.netapp.com/advisory/ntap-20240202-0002/ https://www.debian.org/security/2023/dsa-5480 https://www.debian.org/security/2023/dsa-5492 jsc#CAR-2766 rh#2225126 |
CVE-2023-3865 | kernel-source-rt:Not affected | important | 7.1 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:H) | CVE-2023-3865 SMASH Issue 373725 ZDI-23-980 bnc#1213813 |
CVE-2023-3866 | kernel-source-rt:Not affected | moderate | () | CVE-2023-3866 SMASH Issue 373726 ZDI-23-979 bnc#1213814 |
CVE-2023-38851 | file:Ignore | moderate | () | CVE-2023-38851 SMASH Issue 375448 bnc#1214308 https://github.com/libxls/libxls/issues/124 rh#2236660 |
CVE-2023-38852 | file:Analysis | moderate | () | CVE-2023-38852 SMASH Issue 375449 bnc#1214309 https://github.com/libxls/libxls/issues/124 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JQYGEBDBCOWBRHOW44BSSRADUOZBXHUE/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YHBUPYF2NX34HNAWZ3WYHKWU3KWVQUSV/ rh#2232479 |
CVE-2023-38853 | file:Analysis | moderate | () | CVE-2023-38853 SMASH Issue 375450 bnc#1214310 https://github.com/libxls/libxls/issues/124 rh#2236661 |
CVE-2023-38854 | file:Analysis | moderate | () | CVE-2023-38854 SMASH Issue 375451 bnc#1214311 https://github.com/libxls/libxls/issues/124 rh#2236662 |
CVE-2023-38855 | file:Analysis | moderate | () | CVE-2023-38855 SMASH Issue 375452 bnc#1214312 https://github.com/libxls/libxls/issues/124 rh#2236663 |
CVE-2023-38856 | file:Analysis | moderate | () | CVE-2023-38856 SMASH Issue 375453 bnc#1214313 https://github.com/libxls/libxls/issues/124 rh#2236664 |
CVE-2023-39176 | kernel-source-rt:Not affected | moderate | 5.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N) | CVE-2023-39176 SMASH Issue 410023 ZDI-24-586 bnc#1226176 |
CVE-2023-39179 | kernel-source-rt:Not affected | important | 7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:L) | CVE-2023-39179 SMASH Issue 410021 ZDI-24-588 bnc#1226180 |
CVE-2023-39180 | kernel-source-rt:Not affected | low | 4 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L) | CVE-2023-39180 SMASH Issue 410020 ZDI-24-589 bnc#1226179 |
CVE-2023-39189 | kernel-source-rt:Released | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N) | CVE-2023-39189 L3:67651 SMASH Issue 381121 ZDI-24-592 bnc#1216046 https://access.redhat.com/errata/RHSA-2024:2394 https://access.redhat.com/errata/RHSA-2024:2950 https://access.redhat.com/errata/RHSA-2024:3138 https://access.redhat.com/security/cve/CVE-2023-39189 https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html jsc#CAR-2929 rh#2226777 |
CVE-2023-39190 | kernel-source-rt:Not affected | low | () | CVE-2023-39190 SMASH Issue 373697 ZDI-24-593 bnc#1216056 linux.git:commit:3e337087c3b5805fe0b8a46ba622a962880b5d64 rh#2192671 rh#2226780 |
CVE-2023-39191 | kernel-source-rt:Not affected | important | 8.2 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H) | CVE-2023-39191 SMASH Issue 380410 ZDI-23-1489 bnc#1215863 bnc#1215887 https://access.redhat.com/errata/RHSA-2023:6583 https://access.redhat.com/errata/RHSA-2024:0381 https://access.redhat.com/errata/RHSA-2024:0439 https://access.redhat.com/errata/RHSA-2024:0448 https://access.redhat.com/security/cve/CVE-2023-39191 https://www.zerodayinitiative.com/advisories/ZDI-CAN-19399/ rh#2226783 |
CVE-2023-39192 | kernel-source-rt:Released | moderate | 6 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H) | CVE-2023-39192 L3:67651 SMASH Issue 380409 ZDI-23-1490 bnc#1215858 https://access.redhat.com/errata/RHSA-2024:2950 https://access.redhat.com/errata/RHSA-2024:3138 https://access.redhat.com/security/cve/CVE-2023-39192 https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html https://www.zerodayinitiative.com/advisories/ZDI-CAN-18408/ jsc#CAR-2926 rh#2226784 |
CVE-2023-39193 | kernel-source-rt:Released | moderate | 5.1 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L) | CVE-2023-39193 L3:67651 SMASH Issue 380408 ZDI-23-1491 ZDI-23-1492 bnc#1215860 bnc#1215861 https://access.redhat.com/errata/RHSA-2024:2394 https://access.redhat.com/errata/RHSA-2024:2950 https://access.redhat.com/errata/RHSA-2024:3138 https://access.redhat.com/security/cve/CVE-2023-39193 https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html https://www.zerodayinitiative.com/advisories/ZDI-CAN-18866/ jsc#CAR-2924 rh#2226787 rh#2226788 |
CVE-2023-39194 | kernel-source-rt:Released | low | 3.2 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N) | CVE-2023-39194 SMASH Issue 380572 ZDI-23-1491 ZDI-23-1492 bnc#1215861 https://access.redhat.com/errata/RHSA-2024:2394 https://access.redhat.com/errata/RHSA-2024:2950 https://access.redhat.com/errata/RHSA-2024:3138 https://access.redhat.com/security/cve/CVE-2023-39194 https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html https://www.zerodayinitiative.com/advisories/ZDI-CAN-18111/ jsc#CAR-2925 rh#2226787 rh#2226788 |
CVE-2023-39197 | kernel-source-rt:Not affected | low | 4 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N) | CVE-2023-39197 L3:67651 SMASH Issue 384393 bnc#1216976 https://access.redhat.com/security/cve/CVE-2023-39197 rh#2218342 |
CVE-2023-39198 | kernel-source-rt:Released | important | 7.5 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H) | CVE-2023-39198 L3:67569 L3:67607 SMASH Issue 384365 bnc#1216965 bnc#1217116 https://access.redhat.com/errata/RHSA-2024:2394 https://access.redhat.com/errata/RHSA-2024:2950 https://access.redhat.com/errata/RHSA-2024:3138 https://access.redhat.com/security/cve/CVE-2023-39198 https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html jsc#CAR-2984 rh#2218332 |
CVE-2023-39615 | libxml2:Released | moderate | 6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CVE-2023-39615 SMASH Issue 376613 bnc#1214768 https://gitlab.gnome.org/GNOME/libxml2/-/issues/535 jsc#CAR-2842 rh#2235864 |
CVE-2023-39810 | busybox:Analysis | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L) | CVE-2023-39810 SMASH Issue 376554 bnc#1214733 http://busybox.com https://www.pentagrid.ch/en/blog/busybox-cpio-directory-traversal-vulnerability/ rh#2235824 |
CVE-2023-4004 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-4004 DSA-5480 DSA-5492 RHSA-2023:4961 RHSA-2023:4962 RHSA-2023:4967 RHSA-2023:5069 RHSA-2023:5091 RHSA-2023:5093 RHSA-2023:5221 RHSA-2023:5244 RHSA-2023:5255 RHSA-2023:5548 RHSA-2023:5627 SMASH Issue 373771 bnc#1213812 bnc#1214812 http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html https://access.redhat.com/errata/RHSA-2023:4961 https://access.redhat.com/errata/RHSA-2023:4962 https://access.redhat.com/errata/RHSA-2023:4967 https://access.redhat.com/errata/RHSA-2023:5069 https://access.redhat.com/errata/RHSA-2023:5091 https://access.redhat.com/errata/RHSA-2023:5093 https://access.redhat.com/errata/RHSA-2023:5221 https://access.redhat.com/errata/RHSA-2023:5244 https://access.redhat.com/errata/RHSA-2023:5255 https://access.redhat.com/errata/RHSA-2023:5548 https://access.redhat.com/errata/RHSA-2023:5627 https://access.redhat.com/errata/RHSA-2023:7382 https://access.redhat.com/errata/RHSA-2023:7389 https://access.redhat.com/errata/RHSA-2023:7411 https://access.redhat.com/errata/RHSA-2023:7417 https://access.redhat.com/errata/RHSA-2023:7431 https://access.redhat.com/errata/RHSA-2023:7434 https://access.redhat.com/security/cve/CVE-2023-4004 https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html https://patchwork.ozlabs.org/project/netfilter-devel/patch/20230719190824.21196-1-fw@strlen.de/ https://security.netapp.com/advisory/ntap-20231027-0001/ https://www.debian.org/security/2023/dsa-5480 https://www.debian.org/security/2023/dsa-5492 rh#2225275 |
CVE-2023-4010 | kernel-source-rt:Analysis | moderate | 4.6 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-4010 SMASH Issue 373859 bnc#1214030 https://access.redhat.com/security/cve/CVE-2023-4010 https://github.com/wanrenmi/a-usb-kernel-bug rh#2227726 |
CVE-2023-4015 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-4015 DSA-5492 SMASH Issue 377513 bnc#1215104 bnc#1215106 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0a771f7b266b02d262900c75f1e175c7fe76fec2 https://kernel.dance/0a771f7b266b02d262900c75f1e175c7fe76fec2 https://www.debian.org/security/2023/dsa-5492 rh#2237752 |
CVE-2023-4016 | procps:Released | low | 2.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2023-4016 L3:67181 SMASH Issue 373963 bnc#1214290 bnc#1217469 https://gitlab.com/procps-ng/procps https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SUETRRT24OFGPYK6ACPM5VUGHNKH5CQ5/ jsc#CAR-2833 rh#2228494 |
CVE-2023-40283 | kernel-source-rt:Released | moderate | 5.7 (CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CVE-2023-40283 DSA-5480 DSA-5492 L3:66697 SMASH Issue 375226 bnc#1214233 http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.10 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1728137b33c00d5a2b5110ed7aafb42e7c32e4a1 https://github.com/torvalds/linux/commit/1728137b33c00d5a2b5110ed7aafb42e7c32e4a1 https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html https://security.netapp.com/advisory/ntap-20231020-0007/ https://www.debian.org/security/2023/dsa-5480 https://www.debian.org/security/2023/dsa-5492 jsc#CAR-2807 rh#2231800 |
CVE-2023-4039 | gcc:Released, gcc7:Released | important | 8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-4039 SMASH Issue 374459 SMASH Issue 374460 bnc#1214052 https://developer.arm.com/Arm%20Security%20Center/GCC%20Stack%20Protector%20Vulnerability%20AArch64 https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-x7ch-h5rf-w2mf jsc#CAR-2900 jsc#CAR-2906 rh#2233236 |
CVE-2023-40791 | kernel-source-rt:Not affected | moderate | () | CVE-2023-40791 SMASH Issue 381907 bnc#1216255 https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.12 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f443fd5af5dbd531f880d3645d5dd36976cf087f https://lkml.org/lkml/2023/8/3/323 https://lore.kernel.org/linux-crypto/20571.1690369076%40warthog.procyon.org.uk/ https://lore.kernel.org/linux-crypto/20571.1690369076@warthog.procyon.org.uk/ https://security.netapp.com/advisory/ntap-20231110-0009/ rh#2244712 |
CVE-2023-4128 | kernel-source-rt:Released | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-4128 DSA-5480 DSA-5492 L3:67138 RHSA-2023:5235 RHSA-2023:5238 RHSA-2023:5548 RHSA-2023:5575 RHSA-2023:5580 RHSA-2023:5588 RHSA-2023:5589 RHSA-2023:5603 RHSA-2023:5604 RHSA-2023:5627 RHSA-2023:5628 SMASH Issue 374906 bnc#1214149 bnc#1215113 bnc#1217283 http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html https://access.redhat.com/errata/RHSA-2023:5235 https://access.redhat.com/errata/RHSA-2023:5238 https://access.redhat.com/errata/RHSA-2023:5548 https://access.redhat.com/errata/RHSA-2023:5575 https://access.redhat.com/errata/RHSA-2023:5580 https://access.redhat.com/errata/RHSA-2023:5588 https://access.redhat.com/errata/RHSA-2023:5589 https://access.redhat.com/errata/RHSA-2023:5603 https://access.redhat.com/errata/RHSA-2023:5604 https://access.redhat.com/errata/RHSA-2023:5627 https://access.redhat.com/errata/RHSA-2023:5628 https://access.redhat.com/errata/RHSA-2023:5775 https://access.redhat.com/errata/RHSA-2023:5794 https://access.redhat.com/security/cve/CVE-2023-4128 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=76e42ae831991c828cffa8c37736ebfb831ad5ec https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8 https://kernel.dance/3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81 https://kernel.dance/76e42ae831991c828cffa8c37736ebfb831ad5ec https://kernel.dance/b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8 https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/344H6HO6SSC4KT7PDFXSDIXKMKHISSGF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3TYLSJ2SAI7RF56ZLQ5CQWCJLVJSD73Q/ https://lore.kernel.org/netdev/193d6cdf-d6c9-f9be-c36a-b2a7551d5fb6@mojatatu.com/ https://security.netapp.com/advisory/ntap-20231027-0002/ https://www.debian.org/security/2023/dsa-5480 https://www.debian.org/security/2023/dsa-5492 jsc#CAR-2802 rh#2225511 rh#2237757 rh#2237894 rh#2237901 rh#2237902 rh#2261965 |
CVE-2023-4132 | kernel-source-rt:Not affected | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-4132 DSA-5480 DSA-5492 SMASH Issue 374116 bnc#1213969 https://access.redhat.com/errata/RHSA-2023:6901 https://access.redhat.com/errata/RHSA-2023:7077 https://access.redhat.com/errata/RHSA-2024:0575 https://access.redhat.com/errata/RHSA-2024:0724 https://access.redhat.com/security/cve/CVE-2023-4132 https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html https://security.netapp.com/advisory/ntap-20231020-0005/ https://www.debian.org/security/2023/dsa-5480 https://www.debian.org/security/2023/dsa-5492 rh#2221707 |
CVE-2023-4133 | kernel-source-rt:Released | moderate | 5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-4133 SMASH Issue 374115 bnc#1213970 https://access.redhat.com/errata/RHSA-2024:2394 https://access.redhat.com/errata/RHSA-2024:2950 https://access.redhat.com/errata/RHSA-2024:3138 https://access.redhat.com/security/cve/CVE-2023-4133 jsc#CAR-2792 rh#2221702 |
CVE-2023-4134 | kernel-source-rt:Released | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-4134 SMASH Issue 374118 bnc#1213971 jsc#CAR-2793 rh#2221700 |
CVE-2023-4147 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-4147 DSA-5480 DSA-5492 RHSA-2023:5069 RHSA-2023:5091 RHSA-2023:5093 SMASH Issue 374140 bnc#1213968 bnc#1215118 https://access.redhat.com/errata/RHSA-2023:5069 https://access.redhat.com/errata/RHSA-2023:5091 https://access.redhat.com/errata/RHSA-2023:5093 https://access.redhat.com/errata/RHSA-2023:7382 https://access.redhat.com/errata/RHSA-2023:7389 https://access.redhat.com/errata/RHSA-2023:7411 https://access.redhat.com/security/cve/CVE-2023-4147 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0ebc1064e4874d5987722a2ddbc18f94aa53b211 https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html https://security.netapp.com/advisory/ntap-20231020-0006/ https://www.debian.org/security/2023/dsa-5480 https://www.debian.org/security/2023/dsa-5492 https://www.spinics.net/lists/stable/msg671573.html rh#2225239 |
CVE-2023-4155 | kernel-source-rt:Not affected | moderate | 6.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H) | CVE-2023-4155 DSA-5492 SMASH Issue 374365 bnc#1214022 https://access.redhat.com/security/cve/CVE-2023-4155 linux.git:commit:7588dbcebcbf0193ab5b76987396d0254270b04a rh#2213802 |
CVE-2023-41913 | strongswan:Released | moderate | 7 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L) | CVE-2023-41913 DSA-5560 L3:67210 SMASH Issue 384174 SMASH Issue 384175 bnc#1216901 bnc#1217563 https://github.com/strongswan/strongswan/releases https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPJZPYHBCRXUQGGKQE6TYH4J4RIJH6HO/ https://www.strongswan.org/blog/2023/11/20/strongswan-vulnerability-%28cve-2023-41913%29.html jsc#CAR-3003 rh#2254560 |
CVE-2023-4194 | kernel-source-rt:Released | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2023-4194 DSA-5480 DSA-5492 SMASH Issue 374309 bnc#1214019 https://access.redhat.com/errata/RHSA-2023:6583 https://access.redhat.com/security/cve/CVE-2023-4194 https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/344H6HO6SSC4KT7PDFXSDIXKMKHISSGF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3TYLSJ2SAI7RF56ZLQ5CQWCJLVJSD73Q/ https://lore.kernel.org/all/20230731164237.48365-1-lersek@redhat.com/ https://lore.kernel.org/all/20230731164237.48365-2-lersek@redhat.com/ https://lore.kernel.org/all/20230731164237.48365-3-lersek@redhat.com/ https://security.netapp.com/advisory/ntap-20231027-0002/ https://www.debian.org/security/2023/dsa-5480 https://www.debian.org/security/2023/dsa-5492 jsc#CAR-2796 linux.git:commit:5c9241f3ceab3257abe2923a59950db0dc8bb737 linux.git:commit:666c135b2d859a00ee74c8645b2affacfae45421 linux.git:commit:9bc3047374d5bec163e83e743709e23753376f0c rh#2173435 rh#2229498 |
CVE-2023-4205 | kernel-source-rt:Not affected | low | 0 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N) | CVE-2023-4205 SMASH Issue 374367 bnc#1214050 https://access.redhat.com/security/cve/CVE-2023-4205 https://www.spinics.net/lists/kernel/msg4876594.html rh#2228101 |
CVE-2023-4206 | kernel-source-rt:Ignore | important | () | CVE-2023-4206 DSA-5492 SMASH Issue 377514 bnc#1215110 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8 https://kernel.dance/b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8 https://www.debian.org/security/2023/dsa-5492 rh#2237757 rh#2237894 rh#2237901 rh#2237902 |
CVE-2023-4207 | kernel-source-rt:Ignore | important | () | CVE-2023-4207 DSA-5492 SMASH Issue 377515 bnc#1215113 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=76e42ae831991c828cffa8c37736ebfb831ad5ec https://kernel.dance/76e42ae831991c828cffa8c37736ebfb831ad5ec https://www.debian.org/security/2023/dsa-5492 rh#2237757 rh#2237894 rh#2237901 rh#2237902 |
CVE-2023-4208 | kernel-source-rt:Ignore | important | () | CVE-2023-4208 DSA-5492 SMASH Issue 377516 bnc#1215114 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81 https://kernel.dance/3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81 https://www.debian.org/security/2023/dsa-5492 rh#2237757 rh#2237894 rh#2237901 rh#2237902 |
CVE-2023-42363 | busybox:Analysis | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CVE-2023-42363 SMASH Issue 386216 bnc#1217580 https://bugs.busybox.net/show_bug.cgi?id=15865 rh#2252027 |
CVE-2023-42364 | busybox:Analysis | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CVE-2023-42364 SMASH Issue 386219 bnc#1217584 https://bugs.busybox.net/show_bug.cgi?id=15868 rh#2251855 |
CVE-2023-42365 | busybox:Analysis | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CVE-2023-42365 SMASH Issue 386220 bnc#1217585 https://bugs.busybox.net/show_bug.cgi?id=15871 rh#2251853 |
CVE-2023-42366 | busybox:Analysis | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CVE-2023-42366 SMASH Issue 386221 bnc#1217586 https://bugs.busybox.net/show_bug.cgi?id=15874 rh#2251851 |
CVE-2023-4273 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-4273 DSA-5480 DSA-5492 SMASH Issue 374794 bnc#1214120 bnc#1214123 https://access.redhat.com/security/cve/CVE-2023-4273 https://dfir.ru/2023/08/23/cve-2023-4273-a-vulnerability-in-the-linux-exfat-driver/ https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/344H6HO6SSC4KT7PDFXSDIXKMKHISSGF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3TYLSJ2SAI7RF56ZLQ5CQWCJLVJSD73Q/ https://security.netapp.com/advisory/ntap-20231027-0002/ https://www.debian.org/security/2023/dsa-5480 https://www.debian.org/security/2023/dsa-5492 jsc#CAR-2799 rh#2221609 |
CVE-2023-42752 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-42752 OSS:2023/Q3/192 SMASH Issue 377729 SMASH Issue 379098 bnc#1215146 bnc#1215468 http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html https://access.redhat.com/security/cve/CVE-2023-42752 https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=915d975b2ffa https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=c3b704d4a4a2 rh#2239828 |
CVE-2023-42753 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-42753 L3:67695 OSS:2023/09/22/10 OSS:2023/Q3/216 SMASH Issue 377730 SMASH Issue 379116 bnc#1215147 bnc#1215150 bnc#1218613 http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html https://access.redhat.com/errata/RHSA-2023:7370 https://access.redhat.com/errata/RHSA-2023:7379 https://access.redhat.com/errata/RHSA-2023:7382 https://access.redhat.com/errata/RHSA-2023:7389 https://access.redhat.com/errata/RHSA-2023:7411 https://access.redhat.com/errata/RHSA-2023:7418 https://access.redhat.com/errata/RHSA-2023:7539 https://access.redhat.com/errata/RHSA-2023:7558 https://access.redhat.com/errata/RHSA-2024:0089 https://access.redhat.com/errata/RHSA-2024:0113 https://access.redhat.com/errata/RHSA-2024:0134 https://access.redhat.com/errata/RHSA-2024:0340 https://access.redhat.com/errata/RHSA-2024:0346 https://access.redhat.com/errata/RHSA-2024:0347 https://access.redhat.com/errata/RHSA-2024:0371 https://access.redhat.com/errata/RHSA-2024:0376 https://access.redhat.com/errata/RHSA-2024:0378 https://access.redhat.com/errata/RHSA-2024:0402 https://access.redhat.com/errata/RHSA-2024:0403 https://access.redhat.com/errata/RHSA-2024:0412 https://access.redhat.com/errata/RHSA-2024:0461 https://access.redhat.com/errata/RHSA-2024:0562 https://access.redhat.com/errata/RHSA-2024:0563 https://access.redhat.com/errata/RHSA-2024:0593 https://access.redhat.com/errata/RHSA-2024:0999 https://access.redhat.com/security/cve/CVE-2023-42753 https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html jsc#CAR-2952 rh#2239843 rh#2240527 |
CVE-2023-42754 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-42754 L3:67931 OSS:2023/Q4/14 SMASH Issue 379112 SMASH Issue 379113 bnc#1215467 bnc#1220875 https://access.redhat.com/errata/RHSA-2024:2394 https://access.redhat.com/errata/RHSA-2024:2950 https://access.redhat.com/errata/RHSA-2024:3138 https://access.redhat.com/security/cve/CVE-2023-42754 https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GISYSL3F6WIEVGHJGLC2MFNTUXHPTKQH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GPMICQ2HVZO5UAM5KPXHAZKA2U3ZDOO6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V5PDNWPKAP3WL5RQZ4RIDS6MG32OHH5R/ jsc#CAR-2909 rh#2239845 rh#2267759 |
CVE-2023-42756 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-42756 OSS:2023/Q3/242 SMASH Issue 379890 SMASH Issue 379891 bnc#1215767 https://access.redhat.com/errata/RHSA-2024:2394 https://access.redhat.com/security/cve/CVE-2023-42756 https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GISYSL3F6WIEVGHJGLC2MFNTUXHPTKQH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GPMICQ2HVZO5UAM5KPXHAZKA2U3ZDOO6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V5PDNWPKAP3WL5RQZ4RIDS6MG32OHH5R/ rh#2239848 |
CVE-2023-4385 | kernel-source-rt:Released | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-4385 L3:66697 L3:67931 SMASH Issue 375580 bnc#1214348 https://access.redhat.com/security/cve/CVE-2023-4385 https://github.com/torvalds/linux/commit/0d4837fdb796f99369cf7691d33de1b856bcaf1f jsc#CAR-2816 rh#2219272 |
CVE-2023-4387 | kernel-source-rt:Released | moderate | 6.6 (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-4387 L3:66697 SMASH Issue 375581 bnc#1214350 https://access.redhat.com/security/cve/CVE-2023-4387 https://github.com/torvalds/linux/commit/9e7fef9521e73ca8afd7da9e58c14654b02dfad8 jsc#CAR-2832 rh#2219270 |
CVE-2023-4389 | kernel-source-rt:Released | moderate | 5.8 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H) | CVE-2023-4389 SMASH Issue 375582 bnc#1214351 https://access.redhat.com/security/cve/CVE-2023-4389 https://patchwork.kernel.org/project/linux-btrfs/patch/20220324134454.15192-1-baijiaju1990@gmail.com/ jsc#CAR-2815 rh#2219271 |
CVE-2023-4394 | kernel-source-rt:Not affected | moderate | 6 (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:H) | CVE-2023-4394 SMASH Issue 375624 bnc#1214352 https://access.redhat.com/security/cve/CVE-2023-4394 https://patchwork.kernel.org/project/linux-btrfs/patch/20220815151606.3479183-1-r33s3n6@gmail.com/ rh#2219263 |
CVE-2023-44466 | kernel-source-rt:Not affected | important | () | CVE-2023-44466 SMASH Issue 380312 bnc#1215871 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a282a2f10539dce2aa619e71e1817570d557fc97 https://github.com/google/security-research/security/advisories/GHSA-jg27-jx6w-xwph https://github.com/torvalds/linux/commit/a282a2f10539dce2aa619e71e1817570d557fc97 https://security.netapp.com/advisory/ntap-20231116-0003/ https://www.spinics.net/lists/ceph-devel/msg57909.html rh#2241342 |
CVE-2023-4458 | kernel-source-rt:Not affected | low | 4 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N) | CVE-2023-4458 SMASH Issue 410019 ZDI-24-590 bnc#1226178 |
CVE-2023-4459 | kernel-source-rt:Analysis | moderate | 6.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-4459 SMASH Issue 375883 bnc#1214451 https://access.redhat.com/errata/RHSA-2024:0412 https://access.redhat.com/errata/RHSA-2024:1250 https://access.redhat.com/errata/RHSA-2024:1306 https://access.redhat.com/errata/RHSA-2024:1367 https://access.redhat.com/errata/RHSA-2024:1382 https://access.redhat.com/errata/RHSA-2024:2006 https://access.redhat.com/errata/RHSA-2024:2008 https://access.redhat.com/security/cve/CVE-2023-4459 https://github.com/torvalds/linux/commit/edf410cb74dc612fd47ef5be319c5a0bcd6e6ccd rh#2219268 |
CVE-2023-4527 | glibc:Not affected | important | 7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H) | CVE-2023-4527 MISC:lists.gnu.org:OSS:2023/09/25/1 OSS:2023/09/25/1 OSS:2023/Q3/218 RHSA-2023:5453 RHSA-2023:5455 SMASH Issue 377993 bnc#1215280 https://access.redhat.com/errata/RHSA-2023:5453 https://access.redhat.com/errata/RHSA-2023:5455 https://access.redhat.com/security/cve/CVE-2023-4527 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DBUQRRPB47TC3NJOUIBVWUGFHBJAFDL/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DFG4P76UHHZEWQ26FWBXG76N2QLKKPZA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAQWHTSVOCOZ5K6KPIWKRT3JX4RTZUR/ https://security.gentoo.org/glsa/202310-03 https://security.netapp.com/advisory/ntap-20231116-0012/ rh#2234712 |
CVE-2023-45322 | libxml2:Ignore | moderate | 6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CVE-2023-45322 L3:67795 OSS:2023/Q4/60 SMASH Issue 381061 bnc#1216129 bnc#1221178 http://www.openwall.com/lists/oss-security/2023/10/06/5 https://gitlab.gnome.org/GNOME/libxml2/-/issues/344 https://gitlab.gnome.org/GNOME/libxml2/-/issues/583 jsc#CAR-2940 rh#2242945 |
CVE-2023-4563 | kernel-source-rt:Not affected | low | 0 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N) | CVE-2023-4563 CVE-2023-52433 SMASH Issue 376555 bnc#1214727 https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4 https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a jsc#CAR-2935 rh#2235306 rh#2265184 |
CVE-2023-4569 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2023-4569 DSA-5492 SMASH Issue 376556 bnc#1214729 https://access.redhat.com/security/cve/CVE-2023-4569 https://patchwork.ozlabs.org/project/netfilter-devel/patch/20230812110526.49808-1-fw@strlen.de/ https://www.debian.org/security/2023/dsa-5492 rh#2235470 |
CVE-2023-45853 | zlib:Released | moderate | 5.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) | BID:71846 CVE-2014-9485 CVE-2023-45853 L3:66984 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:github.com:OSS:2024/01/24/10 MLIST:[oss-security] 20141231 cve request: miniunzip directory traversal MLIST:[oss-security] 20150103 Re: cve request: miniunzip directory traversal OSS:2023/10/20/9 OSS:2023/Q4/167 OSS:2024/01/24/10 SMASH Issue 112007 SMASH Issue 381862 UBUNTU:CVE-2014-9485 bdo#774321 bnc#1216378 bnc#1216473 https://chromium.googlesource.com/chromium/src/+/d709fb23806858847131027da95ef4c548813356 https://chromium.googlesource.com/chromium/src/+/de29dd6c7151d3cd37cb4cf0036800ddfb1d8b61 https://github.com/madler/zlib/blob/ac8f12c97d1afd9bafa9c710f827d40a407d3266/contrib/README.contrib#L1-L4 https://github.com/madler/zlib/pull/843 https://lists.debian.org/debian-lts-announce/2023/11/msg00026.html https://pypi.org/project/pyminizip/#history https://security.gentoo.org/glsa/202401-18 https://security.netapp.com/advisory/ntap-20231130-0009/ https://www.winimage.com/zLibDll/minizip.html jsc#CAR-2948 rh#2244556 |
CVE-2023-45862 | kernel-source-rt:Released | moderate | 6.4 (CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-45862 SMASH Issue 381141 SMASH Issue 381884 bnc#1216051 https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.5 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce33e64c1788912976b61314b56935abd4bc97ef https://security.netapp.com/advisory/ntap-20231116-0004/ jsc#CAR-2944 rh#2244715 |
CVE-2023-45863 | kernel-source-rt:Released | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-45863 L3:67093 L3:67651 SMASH Issue 381154 SMASH Issue 381885 bnc#1216058 https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.3 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3bb2a01caa813d3a1845d378bbe4169ef280d394 https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html jsc#CAR-2959 rh#2244720 |
CVE-2023-45871 | kernel-source-rt:Released | moderate | 5.3 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-45871 L3:67093 SMASH Issue 381887 bnc#1216259 https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.3 https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=bb5ed01cd2428cd25b1c88a3a9cba87055eb289f https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html https://security.netapp.com/advisory/ntap-20231110-0001/ jsc#CAR-2962 rh#2244723 |
CVE-2023-45898 | kernel-source-rt:Not affected | important | () | CVE-2023-45898 SMASH Issue 381908 bnc#1216262 https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.4 https://github.com/torvalds/linux/commit/768d612f79822d30a1e7d132a4d4b05337ce42ec https://lkml.org/lkml/2023/8/13/477 https://lore.kernel.org/lkml/aa03f191-445c-0d2e-d6d7-0a3208d7df7a@huawei.com/T/ https://www.spinics.net/lists/stable-commits/msg317086.html rh#2245711 |
CVE-2023-4610 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-4610 SMASH Issue 380723 bnc#1215932 rh#2229691 |
CVE-2023-4611 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-4611 SMASH Issue 376626 bnc#1214772 https://access.redhat.com/security/cve/CVE-2023-4611 https://www.spinics.net/lists/stable-commits/msg310136.html jsc#CAR-2841 rh#2227244 |
CVE-2023-46219 | curl:Not affected | low | 4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) | CVE-2023-46219 DSA-5587 OSS:2023/Q4/262 SMASH Issue 386280 SMASH Issue 386281 bnc#1217574 https://hackerone.com/reports/2236133 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOGXU25FMMT2X6UUITQ7EZZYMJ42YWWD/ https://security.netapp.com/advisory/ntap-20240119-0007/ https://www.debian.org/security/2023/dsa-5587 rh#2252034 |
CVE-2023-4622 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-4622 DSA-5492 L3:66812 L3:67191 L3:67233 L3:67569 L3:67603 SMASH Issue 377519 bnc#1215117 bnc#1215442 bnc#1217666 http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-6.1.y&id=790c2f9d15b594350ae9bca7b236f2b1859de02c https://kernel.dance/790c2f9d15b594350ae9bca7b236f2b1859de02c https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html https://www.debian.org/security/2023/dsa-5492 jsc#CAR-2867 rh#2085300 rh#2220892 rh#2221463 rh#2225097 rh#2225511 rh#2237757 rh#2237760 rh#2245514 rh#2261965 |
CVE-2023-4623 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-4623 DSA-5480 DSA-5492 L3:66812 L3:67174 L3:67191 L3:67233 L3:67569 L3:67602 L3:67846 L3:67866 SMASH Issue 377520 bnc#1215115 bnc#1215440 http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b3d26c5702c7d6c45456326e56d2ccf3f103e60f https://kernel.dance/b3d26c5702c7d6c45456326e56d2ccf3f103e60f https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html jsc#CAR-2874 rh#2225511 rh#2237757 rh#2237894 rh#2237901 rh#2237902 rh#2261965 |
CVE-2023-4641 | shadow:Already fixed | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) | CVE-2023-4641 SMASH Issue 376775 bnc#1214806 https://access.redhat.com/errata/RHSA-2023:6632 https://access.redhat.com/errata/RHSA-2023:7112 https://access.redhat.com/errata/RHSA-2024:0417 https://access.redhat.com/errata/RHSA-2024:2577 https://access.redhat.com/security/cve/CVE-2023-4641 jsc#CAR-2847 rh#2215945 |
CVE-2023-46813 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-46813 SMASH Issue 370298 SMASH Issue 383264 bnc#1212649 bnc#1216898 https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.9 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=63e44bc52047f182601e7817da969a105aa1f721 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a37cd2a59d0cb270b1bba568fd3a3b8668b9d3ba https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b9cb9c45583b911e0db71d09caa6b56469eb2bdf https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html rh#2246944 |
CVE-2023-46862 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-46862 SMASH Issue 383410 bnc#1216693 https://bugzilla.kernel.org/show_bug.cgi?id=218032#c4 https://github.com/torvalds/linux/commit/7644b1a1c9a7ae8ab99175989bfc8676055edb46 https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html rh#2246980 |
CVE-2023-47233 | kernel-source-rt:Released | moderate | 4.3 (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-47233 SMASH Issue 383440 SMASH Issue 384128 bnc#1216702 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0f7352557a35ab7888bc7831411ec8a3cbe20d78 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html https://lore.kernel.org/all/20231104054709.716585-1-zyytlz.wz%40163.com/ https://lore.kernel.org/all/20231104054709.716585-1-zyytlz.wz@163.com/ https://marc.info/?l=linux-kernel&m=169907678011243&w=2 jsc#CAR-3032 linux.git:commit:0f7352557a35ab7888bc7831411ec8a3cbe20d78 rh#2248430 rh#2281213 |
CVE-2023-4732 | kernel-source-rt:Not affected | moderate | () | CVE-2023-4732 SMASH Issue 377016 bnc#1214926 https://access.redhat.com/errata/RHSA-2023:6901 https://access.redhat.com/errata/RHSA-2023:7077 https://access.redhat.com/errata/RHSA-2023:7539 https://access.redhat.com/errata/RHSA-2024:0412 https://access.redhat.com/security/cve/CVE-2023-4732 rh#2236982 |
CVE-2023-4806 | glibc:Not affected | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-4806 MISC:sourceware.org:OSS:2023/10/03/4 OSS:2023/10/03/4 OSS:2023/10/03/5 OSS:2023/10/03/6 OSS:2023/10/03/8 OSS:2023/Q4/20 RHSA-2023:5453 RHSA-2023:5455 SMASH Issue 377994 bnc#1215281 https://access.redhat.com/errata/RHSA-2023:5453 https://access.redhat.com/errata/RHSA-2023:5455 https://access.redhat.com/errata/RHSA-2023:7409 https://access.redhat.com/security/cve/CVE-2023-4806 https://access.redhat.com/security/cve/CVE-2023-5156 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DBUQRRPB47TC3NJOUIBVWUGFHBJAFDL/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DFG4P76UHHZEWQ26FWBXG76N2QLKKPZA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAQWHTSVOCOZ5K6KPIWKRT3JX4RTZUR/ https://security.gentoo.org/glsa/202310-03 https://security.netapp.com/advisory/ntap-20240125-0008/ rh#2237782 rh#2240541 |
CVE-2023-4807 | openssl:Not affected, openssl-1_1:Not affected | important | () | CVE-2023-4807 OSS:2023/09/08/1 OSS:2023/09/08/3 OSS:2023/Q3/164 SMASH Issue 377740 bnc#1215170 http://packetstormsecurity.com/files/174593/OpenSSL-Security-Advisory-20230908.html https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=4bfac4471f53c4f74c8d81020beb938f92d84ca5 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6754de4a121ec7f261b16723180df6592cbb4508 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a632d534c73eeb3e3db8c7540d811194ef7c79ff https://security.netapp.com/advisory/ntap-20230921-0001/ https://www.openssl.org/news/secadv/20230908.txt openssl.git:commit:0be7510f49e498532708fd03628fc3fc62ee7875 rh#2238009 |
CVE-2023-4813 | glibc:Released | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-4813 OSS:2023/10/03/8 RHSA-2023:5453 RHSA-2023:5455 SMASH Issue 377995 bnc#1215286 https://access.redhat.com/errata/RHSA-2023:5453 https://access.redhat.com/errata/RHSA-2023:5455 https://access.redhat.com/errata/RHSA-2023:7409 https://access.redhat.com/security/cve/CVE-2023-4813 https://security.netapp.com/advisory/ntap-20231110-0003/ jsc#CAR-2883 rh#2237798 |
CVE-2023-4881 | kernel-source-rt:Released | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L) | CVE-2023-4881 SMASH Issue 377878 bnc#1215221 https://access.redhat.com/security/cve/CVE-2023-4881 jsc#CAR-2901 jsc#CAR-2905 rh#2238312 |
CVE-2023-4911 | glibc:Not affected | important | 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-4911 DSA-5514 GNU Web site MISC:git.altlinux.org:OSS:2023/10/03/3 MISC:git.rockylinux.org:OSS:2023/10/14/3 MISC:sourceware.org:OSS:2023/10/03/3 MISC:www.cloudlinux.com:OSS:2017/07/02/2 OSS:2017/07/02/2 OSS:2023/10/03/2 OSS:2023/10/03/3 OSS:2023/10/05/1 OSS:2023/10/13/11 OSS:2023/10/14/3 OSS:2023/10/14/5 OSS:2023/10/14/6 OSS:2023/Q4/18 OSS:2023/Q4/97 RHSA-2023:5453 RHSA-2023:5454 RHSA-2023:5455 RHSA-2023:5476 SMASH Issue 379454 bnc#1215501 bnc#1215502 http://packetstormsecurity.com/files/174986/glibc-ld.so-Local-Privilege-Escalation.html http://packetstormsecurity.com/files/176288/Glibc-Tunables-Privilege-Escalation.html http://seclists.org/fulldisclosure/2023/Oct/11 https://access.redhat.com/errata/RHSA-2023:5453 https://access.redhat.com/errata/RHSA-2023:5454 https://access.redhat.com/errata/RHSA-2023:5455 https://access.redhat.com/errata/RHSA-2023:5476 https://access.redhat.com/errata/RHSA-2024:0033 https://access.redhat.com/security/cve/CVE-2023-4911 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DBUQRRPB47TC3NJOUIBVWUGFHBJAFDL/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DFG4P76UHHZEWQ26FWBXG76N2QLKKPZA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAQWHTSVOCOZ5K6KPIWKRT3JX4RTZUR/ https://security.gentoo.org/glsa/202310-03 https://security.netapp.com/advisory/ntap-20231013-0006/ https://www.debian.org/security/2023/dsa-5514 https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt https://www.qualys.com/cve-2023-4911/ rh#2238352 rh#2241966 xf#267581 |
CVE-2023-4921 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-4921 L3:66812 L3:67174 L3:67191 L3:67233 L3:67763 L3:67994 L3:68105 SMASH Issue 378087 bnc#1215275 bnc#1215300 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8fc134fee27f2263988ae38920bc03da416b03d8 https://kernel.dance/8fc134fee27f2263988ae38920bc03da416b03d8 https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html jsc#CAR-2902 jsc#CAR-2904 rh#2245514 |
CVE-2023-50431 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2023-50431 SMASH Issue 387509 bnc#1217930 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a9f07790a4b2250f0140e9a61c7f842fd9b618c7 https://lists.freedesktop.org/archives/dri-devel/2023-November/431772.html rh#2253957 |
CVE-2023-51042 | kernel-source-rt:Released | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-51042 SMASH Issue 391990 bnc#1219128 https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.12 https://github.com/torvalds/linux/commit/2e54154b9f27262efd0cb4f903cc7d5ad1fe9628 jsc#CAR-3080 rh#2259866 |
CVE-2023-51043 | kernel-source-rt:Released | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-51043 SMASH Issue 391991 bnc#1219120 https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.5 https://github.com/torvalds/linux/commit/4e076c73e4f6e90816b30fcd4a0d7ab365087255 jsc#CAR-3077 rh#2260005 |
CVE-2023-51384 | openssh:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N) | CVE-2023-51384 DSA-5586 L3:67419 OSS:2023/12/18/2 SMASH Issue 388572 bdo#1033166 bdo#995130 bnc#1218214 http://seclists.org/fulldisclosure/2024/Mar/21 https://github.com/openssh/openssh-portable/commit/881d9c6af9da4257c69c327c4e2f1508b2fa754b https://security.netapp.com/advisory/ntap-20240105-0005/ https://support.apple.com/kb/HT214084 https://www.debian.org/security/2023/dsa-5586 https://www.openssh.com/txt/release-9.6 rh#2255268 |
CVE-2023-5156 | glibc:Not affected | low | 3.7 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) | CVE-2023-5156 MISC:sourceware.org:OSS:2023/10/03/4 OSS:2023/10/03/4 OSS:2023/10/03/5 OSS:2023/10/03/6 OSS:2023/10/03/8 OSS:2023/Q4/20 SMASH Issue 379740 bnc#1215714 https://access.redhat.com/security/cve/CVE-2023-4806 https://access.redhat.com/security/cve/CVE-2023-5156 https://security.gentoo.org/glsa/202402-01 https://sourceware.org/bugzilla/show_bug.cgi?id=30884 https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=ec6b95c3303c700eb89eebeda2d7264cc184a796 rh#2237782 rh#2240541 |
CVE-2023-5158 | kernel-source-rt:Not affected | moderate | 6.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H) | CVE-2023-5158 SMASH Issue 379743 bnc#1215710 https://access.redhat.com/security/cve/CVE-2023-5158 rh#2240561 |
CVE-2023-51767 | openssh:Won't fix | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N) | CVE-2023-51767 L3:67494 L3:67646 L3:67647 L3:67648 L3:67824 MISC:groups.google.com:MLIST:[oss-security] 20211112 Multiple vulnerabilities in Jenkins plugins MISC:www.jenkins.io:OSS:2024/Q1/190 MISC:www.jenkins.io:OSS:2024/Q2/136 OSS:2024/03/06/3 OSS:2024/04/17/8 OSS:2024/Q1/190 OSS:2024/Q2/136 SMASH Issue 389286 bnc#1218386 bnc#1219946 bnc#1219947 bnc#1219948 https://access.redhat.com/security/cve/CVE-2023-51767 https://arxiv.org/abs/2309.02545 https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/auth-passwd.c#L77 https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/monitor.c#L878 https://security.netapp.com/advisory/ntap-20240125-0006/ https://ubuntu.com/security/CVE-2023-51767 jsc#CAR-3040 rh#2254210 rh#2255271 rh#2255850 |
CVE-2023-51779 | kernel-source-rt:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-51779 L3:67651 L3:67681 L3:67695 L3:67846 L3:67866 SMASH Issue 390056 bnc#1218559 bnc#1218610 https://github.com/torvalds/linux/commit/2e07e8348ea454615e268222ae3fc240421be768 https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html jsc#CAR-3050 rh#2256822 rh#2261903 |
CVE-2023-5178 | kernel-source-rt:Not affected | important | 7.2 (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-5178 L3:67093 OSS:2023/Q4/106 SMASH Issue 379892 SMASH Issue 379893 bnc#1215768 bnc#1216044 bnc#1217008 https://access.redhat.com/errata/RHSA-2023:7370 https://access.redhat.com/errata/RHSA-2023:7379 https://access.redhat.com/errata/RHSA-2023:7418 https://access.redhat.com/errata/RHSA-2023:7548 https://access.redhat.com/errata/RHSA-2023:7549 https://access.redhat.com/errata/RHSA-2023:7551 https://access.redhat.com/errata/RHSA-2023:7554 https://access.redhat.com/errata/RHSA-2023:7557 https://access.redhat.com/errata/RHSA-2023:7559 https://access.redhat.com/errata/RHSA-2024:0340 https://access.redhat.com/errata/RHSA-2024:0378 https://access.redhat.com/errata/RHSA-2024:0386 https://access.redhat.com/errata/RHSA-2024:0412 https://access.redhat.com/errata/RHSA-2024:0431 https://access.redhat.com/errata/RHSA-2024:0432 https://access.redhat.com/errata/RHSA-2024:0461 https://access.redhat.com/errata/RHSA-2024:0554 https://access.redhat.com/errata/RHSA-2024:0575 https://access.redhat.com/errata/RHSA-2024:1268 https://access.redhat.com/errata/RHSA-2024:1269 https://access.redhat.com/errata/RHSA-2024:1278 https://access.redhat.com/security/cve/CVE-2023-5178 https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html https://lore.kernel.org/linux-nvme/20231002105428.226515-1-sagi@grimberg.me/ https://security.netapp.com/advisory/ntap-20231208-0004/ jsc#CAR-2916 rh#2241924 rh#2244720 rh#2244723 rh#2246945 |
CVE-2023-51781 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-51781 SMASH Issue 390671 bnc#1218731 https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.8 https://github.com/torvalds/linux/commit/189ff16722ee36ced4d2a2469d4ab65a8fee4198 https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html rh#2257683 |
CVE-2023-5197 | kernel-source-rt:Not affected | moderate | 6.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H) | CVE-2023-5197 SMASH Issue 380136 bnc#1218216 http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f15f29fd4779be8a418b66e9d52979bb6d6c2325 https://kernel.dance/f15f29fd4779be8a418b66e9d52979bb6d6c2325 https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html rh#2241143 |
CVE-2023-52071 | curl:Not affected | low | 2.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L) | CVE-2023-52071 SMASH Issue 392512 bnc#1219333 https://github.com/curl/curl/commit/73980f9ace6c7577e7fcab8008bbde8a0a231692 https://github.com/curl/curl/commit/af3f4e41#r127212213 |
CVE-2023-52433 | kernel-source-rt:Not affected | low | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2019-25162 CVE-2020-36784 CVE-2021-46906 CVE-2021-46921 CVE-2021-46941 CVE-2021-46963 CVE-2021-46988 CVE-2021-46991 CVE-2021-47013 CVE-2021-47041 CVE-2021-47054 CVE-2021-47078 CVE-2021-47082 CVE-2021-47100 CVE-2021-47103 CVE-2022-48627 CVE-2023-4244 CVE-2023-4563 CVE-2023-51780 CVE-2023-52433 CVE-2023-52445 CVE-2023-52464 CVE-2023-52470 CVE-2023-52475 CVE-2023-52476 CVE-2023-52478 CVE-2023-52482 CVE-2023-52486 CVE-2023-52488 CVE-2023-52500 CVE-2023-52507 CVE-2023-52515 CVE-2023-52530 CVE-2023-52532 CVE-2023-52578 CVE-2023-52595 CVE-2023-52597 CVE-2023-52607 CVE-2024-26584 CVE-2024-26595 CVE-2024-26600 CVE-2024-26614 CVE-2024-26625 L3:67569 L3:67599 L3:67600 L3:67601 L3:67602 L3:67603 L3:67604 L3:67605 L3:67606 L3:67607 L3:67608 L3:67681 L3:67695 L3:67706 L3:67844 L3:67846 L3:67866 L3:68095 L3:68137 MISC:git.kernel.org:OSS:2024/Q2/86 MISC:jonathanspw.com:OSS:2024/Q2/86 OSS:2024/04/10/22 OSS:2024/04/10/23 OSS:2024/04/14/1 OSS:2024/04/15/2 OSS:2024/04/17/5 OSS:2024/Q2/116 OSS:2024/Q2/86 SMASH Issue 376555 SMASH Issue 377517 SMASH Issue 390670 SMASH Issue 393419 SMASH Issue 394578 bnc#1214727 bnc#1215420 bnc#1215424 bnc#1218730 bnc#1218733 bnc#1219466 bnc#1219695 bnc#1219696 bnc#1219697 bnc#1219698 bnc#1219699 bnc#1219700 bnc#1219701 bnc#1219702 bnc#1219703 bnc#1219704 bnc#1220137 bnc#1220294 bnc#1220354 bnc#1221570 https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.8 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660 https://git.kernel.org/stable/c/00f6abd3509b1d70d0ab0fbe65ce5685cebed8be https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4 https://git.kernel.org/stable/c/03344e843ab6dd3b3f2cadfb65ed910590856c70 https://git.kernel.org/stable/c/03caf75da1059f0460666c826e9f50e13dfd0017 https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4 https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83 https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc https://git.kernel.org/stable/c/0671f42a9c1084db10d68ac347d08dbf6689ecb3 https://git.kernel.org/stable/c/06beaa1a9f6e501213195e47c30416032fd2bbd5 https://git.kernel.org/stable/c/07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f https://git.kernel.org/stable/c/084c24e788d9cf29c55564de368bf5284f2bb5db https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1 https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088 https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681 https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82 https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754 https://git.kernel.org/stable/c/140cfd9980124aecb6c03ef2e69c72d0548744de https://git.kernel.org/stable/c/145febd85c3bcc5c74d87ef9a598fc7d9122d532 https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1 https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265 https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4 https://git.kernel.org/stable/c/150a3a3871490e8c454ffbac2e60abeafcecff99 https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02 https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834 https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2 https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3 https://git.kernel.org/stable/c/1fd5d262e7442192ac7611ff1597a36c5b044323 https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8 https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41 https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611 https://git.kernel.org/stable/c/2259e1901b2d8c0e8538fc99e77de443b939e749 https://git.kernel.org/stable/c/22e6d783a33015bcdf0979015e4eac603912bea7 https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829 https://git.kernel.org/stable/c/23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6 https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213 https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a https://git.kernel.org/stable/c/2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7 https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528 https://git.kernel.org/stable/c/2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4 https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206 https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53 https://git.kernel.org/stable/c/2cf0005d315549b8d2b940ff96a66c2a889aa795 https://git.kernel.org/stable/c/2d59a0ed8b26b8f3638d8afc31f839e27759f1f6 https://git.kernel.org/stable/c/2ee4d79c364914989c80de382c0b1a7259a7e4b3 https://git.kernel.org/stable/c/2ee52ae94baa https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4 https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46 https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36 https://git.kernel.org/stable/c/30410519328c94367e561fd878e5f0d3a0303585 https://git.kernel.org/stable/c/30773ea47d41773f9611ffb4ebc9bda9d19a9e7e https://git.kernel.org/stable/c/3151051b787f7cd7e3329ea0016eb9113c248812 https://git.kernel.org/stable/c/319116227e52d49eee671f0aa278bac89b3c1b69 https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b https://git.kernel.org/stable/c/3233d8bf7893550045682192cb227af7fa3defeb https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0 https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7 https://git.kernel.org/stable/c/376e21a9e4c2c63ee5d8d3aa74be5082c3882229 https://git.kernel.org/stable/c/38318f23a7ef86a8b1862e5e8078c4de121960c3 https://git.kernel.org/stable/c/3863989497652488a50f00e96de4331e5efabc6c https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1 https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc https://git.kernel.org/stable/c/3a04410b0bc7e056e0843ac598825dd359246d18 https://git.kernel.org/stable/c/3a76ec28824c01b57aa1f0927841d75e4f167cb8 https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5 https://git.kernel.org/stable/c/403d201d1fd144cb249836dafb222f6375871c6c https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573 https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5 https://git.kernel.org/stable/c/437b5f57732bb4cc32cc9f8895d2010ee9ff521c https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4 https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8 https://git.kernel.org/stable/c/47aa8fcd5e8b5563af4042a00f25ba89bef8f33d https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c https://git.kernel.org/stable/c/4ebc10aa7cd17fd9857dedac69600465c9dd16d1 https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244 https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb https://git.kernel.org/stable/c/5902f9453a313be8fe78cbd7e7ca9dba9319fc6e https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4 https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6 https://git.kernel.org/stable/c/5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1 https://git.kernel.org/stable/c/60ade0d56b06537a28884745059b3801c78e03bc https://git.kernel.org/stable/c/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0 https://git.kernel.org/stable/c/64babb17e8150771c58575d8f93a35c5296b499f https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93 https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc https://git.kernel.org/stable/c/67f29896fdc83298eed5a6576ff8f9873f709228 https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100 https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f https://git.kernel.org/stable/c/6a8086a42dfbf548a42bf2ae4faa291645c72c66 https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e https://git.kernel.org/stable/c/6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c https://git.kernel.org/stable/c/6b950c712a9a05cdda4aea7fcb2848766576c11b https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f https://git.kernel.org/stable/c/6ce2f297a7168274547d0b5aea6c7c16268b8a96 https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57 https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21 https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538 https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601 https://git.kernel.org/stable/c/732a3bea7aba5b15026ea42d14953c3425cc7dc2 https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957 https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412 https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310 https://git.kernel.org/stable/c/7ed9d238c7dbb1fdb63ad96a6184985151b0171c https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1 https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56 https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39 https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9 https://git.kernel.org/stable/c/82808cc026811fbc3ecf0c0b267a12a339eead56 https://git.kernel.org/stable/c/829a713450b8fb127cbabfc1244c1d8179ec5107 https://git.kernel.org/stable/c/82fa9ced35d88581cffa4a1c856fc41fca96d80a https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5 https://git.kernel.org/stable/c/84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896 https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848 https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3 https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9 https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87 https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2 https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394 https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0 https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7 https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462 https://git.kernel.org/stable/c/8e51f084b5716653f19e291ed5f026791d4b3ed4 https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757 https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105 https://git.kernel.org/stable/c/906c538340dde6d891df89fe7dac8eaa724e40da https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012 https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449 https://git.kernel.org/stable/c/94810fc52925eb122a922df7f9966cf3f4ba7391 https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18 https://git.kernel.org/stable/c/999d606a820c36ae9b9e9611360c8b3d8d4bb777 https://git.kernel.org/stable/c/9a8c544158f68f656d1734eb5ba00c4f817b76b1 https://git.kernel.org/stable/c/9af7dfb3c9d7985172a240f85e684c5cd33e29ce https://git.kernel.org/stable/c/9c333d9891f34cea8af1b229dc754552304c8eee https://git.kernel.org/stable/c/9db9feb841f7449772f9393c16b9ef4536d8c127 https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398 https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d https://git.kernel.org/stable/c/9dd334a8245011ace45e53298175c7b659edb3e7 https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904 https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8 https://git.kernel.org/stable/c/a399dd80e697a02cfb23e2fc09b87849994043d9 https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802 https://git.kernel.org/stable/c/a45fc41beed8e0fe31864619c34aa00797fb60c1 https://git.kernel.org/stable/c/a5ef7d68cea1344cf524f04981c2b3f80bedbb0d https://git.kernel.org/stable/c/a6191e91c10e50bd51db65a00e03d02b6b0cf8c4 https://git.kernel.org/stable/c/a62225d951d77eb20208fed8fc199e0c9b1df08b https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729 https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053 https://git.kernel.org/stable/c/a910e0f6304726da30a212feecec65cb97ff7a80 https://git.kernel.org/stable/c/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23 https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694 https://git.kernel.org/stable/c/ac3ed969a40357b0542d20f096a6d43acdfa6cc7 https://git.kernel.org/stable/c/ac6ad7c2a862d682bb584a4bc904d89fa7721af8 https://git.kernel.org/stable/c/ad53127973034c63b5348715a1043d0e80ceb330 https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5 https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855 https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9 https://git.kernel.org/stable/c/b2b000069a4c307b09548dc2243f31f3ca0eac9c https://git.kernel.org/stable/c/b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43 https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551 https://git.kernel.org/stable/c/b5332a9f3f3d884a1b646ce155e664cc558c1722 https://git.kernel.org/stable/c/b67d7b1bfc46d05c1a58b172516454698e8d5004 https://git.kernel.org/stable/c/b988b1bb0053c0dcd26187d29ef07566a565cf55 https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5 https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882 https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3 https://git.kernel.org/stable/c/bfd0feb1b109cb63b87fdcd00122603787c75a1a https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926 https://git.kernel.org/stable/c/c1322eaeb8af0d8985b5cc5fa759140fa0e57b84 https://git.kernel.org/stable/c/c13e7331745852d0dd7c35eabbe181cbd5b01172 https://git.kernel.org/stable/c/c323ed65f66e5387ee0a73452118d49f1dae81b8 https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85 https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89 https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366 https://git.kernel.org/stable/c/c65391dd9f0a47617e96e38bd27e277cbe1c40b0 https://git.kernel.org/stable/c/c6f8e0dc8da1cd78d640dee392071cc2326ec1b2 https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955 https://git.kernel.org/stable/c/c87d7d910775a025e230fd6359b60627e392460f https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5 https://git.kernel.org/stable/c/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72 https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06 https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4 https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f https://git.kernel.org/stable/c/d0b5b1f12429df3cd9751ab8b2f53729b77733b7 https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839 https://git.kernel.org/stable/c/d482d61025e303a2bef3733a011b6b740215cfa1 https://git.kernel.org/stable/c/d540a4370aba378fbedf349ba0bb68e96e24243d https://git.kernel.org/stable/c/d558fcdb17139728347bccc60a16af3e639649d2 https://git.kernel.org/stable/c/d57ff04e0ed6f3be1682ae861ead33f879225e07 https://git.kernel.org/stable/c/d718c15a2bf9ae082d5ae4d177fb19ef23cb4132 https://git.kernel.org/stable/c/d7afdf360f4ac142832b098b4de974e867cc063c https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3 https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452 https://git.kernel.org/stable/c/dbc1b89981f9c5360277071d33d7f04a43ffda4a https://git.kernel.org/stable/c/dbf4ab821804df071c8b566d9813083125e6d97b https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322 https://git.kernel.org/stable/c/ded85b0c0edd8f45fec88783d7555a5b982449c1 https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057 https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48 https://git.kernel.org/stable/c/e3213ff99a35 https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8 https://git.kernel.org/stable/c/e53899771a02f798d436655efbd9d4b46c0f9265 https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4 https://git.kernel.org/stable/c/ec3634ebe23fc3c44ebc67c6d25917300bc68c08 https://git.kernel.org/stable/c/ec36c134dd020d28e312c2f1766f85525e747aab https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809 https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0 https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37 https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa https://git.kernel.org/stable/c/f3783c415bf6d2ead3d7aa2c38802bbe10723646 https://git.kernel.org/stable/c/f46c8a75263f97bda13c739ba1c90aced0d3b071 https://git.kernel.org/stable/c/f55261469be87c55df13db76dc945f6bcd825105 https://git.kernel.org/stable/c/f6781add1c311c17eff43e14c786004bbacf901e https://git.kernel.org/stable/c/f71edacbd4f99c0e12fe4a4007ab4d687d0688db https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9 https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97 https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50 https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275 https://git.kernel.org/stable/c/ffd29dc45bc0355393859049f6becddc3ed08f74 https://github.com/Notselwyn/CVE-2024-1086 https://github.com/torvalds/linux/commit/24e90b9e34f9e039f56b5f25f6e6eb92cdd8f4b3 https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8 https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html https://security.netapp.com/advisory/ntap-20240419-0001/ jsc#CAR-2935 jsc#CAR-3056 jsc#CAR-3060 jsc#CAR-3114 linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7 linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662 rh#2218332 rh#2235306 rh#2237755 rh#2237757 rh#2237760 rh#2239843 rh#2246945 rh#2252731 rh#2255283 rh#2255497 rh#2256279 rh#2256786 rh#2256822 rh#2257682 rh#2260046 rh#2261903 rh#2262126 rh#2262983 rh#2263856 rh#2265184 rh#2265519 rh#2265654 rh#2265799 rh#2265800 rh#2265838 rh#2266249 rh#2266270 rh#2266296 rh#2266358 rh#2266440 rh#2266816 rh#2266841 rh#2266894 rh#2266900 rh#2266916 rh#2267006 rh#2267028 rh#2267036 rh#2267041 rh#2267187 rh#2267509 rh#2267529 rh#2267705 rh#2267758 rh#2267787 rh#2267914 rh#2267943 rh#2268218 rh#2268291 rh#2268311 rh#2268315 rh#2269070 rh#2269211 rh#2269217 rh#2270703 rh#2275620 |
CVE-2023-52436 | kernel-source-rt:Not affected | important | () | CVE-2023-52436 SMASH Issue 394647 bnc#1220139 https://git.kernel.org/stable/c/12cf91e23b126718a96b914f949f2cdfeadc7b2a https://git.kernel.org/stable/c/16ae3132ff7746894894927c1892493693b89135 https://git.kernel.org/stable/c/2525d1ba225b5c167162fa344013c408e8b4de36 https://git.kernel.org/stable/c/32a6cfc67675ee96fe107aeed5af9776fec63f11 https://git.kernel.org/stable/c/3e47740091b05ac8d7836a33afd8646b6863ca52 https://git.kernel.org/stable/c/5de9e9dd1828db9b8b962f7ca42548bd596deb8a https://git.kernel.org/stable/c/e26b6d39270f5eab0087453d9b544189a38c8564 https://git.kernel.org/stable/c/f6c30bfe5a49bc38cae985083a11016800708fea https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html rh#2265267 |
CVE-2023-52437 | kernel-source-rt:Ignore | moderate | () | CVE-2023-52437 SMASH Issue 394648 bnc#1220154 https://git.kernel.org/stable/c/0de40f76d567133b871cd6ad46bb87afbce46983 https://git.kernel.org/stable/c/84c39986fe6dd77aa15f08712339f5d4eb7dbe27 https://git.kernel.org/stable/c/87165c64fe1a98bbab7280c58df3c83be2c98478 https://git.kernel.org/stable/c/aab69ef769707ad987ff905d79e0bd6591812580 https://git.kernel.org/stable/c/bed0acf330b2c50c688f6d9cfbcac2aa57a8e613 https://git.kernel.org/stable/c/bed9e27baf52a09b7ba2a3714f1e24e17ced386d https://git.kernel.org/stable/c/cfa46838285814c3a27faacf7357f0a65bb5d152 https://git.kernel.org/stable/c/e16a0bbdb7e590a6607b0d82915add738c03c069 rh#2265269 |
CVE-2023-52438 | kernel-source-rt:Not affected | moderate | 6 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:H) | CVE-2023-52438 SMASH Issue 394649 bnc#1220135 https://git.kernel.org/stable/c/3f489c2067c5824528212b0fc18b28d51332d906 https://git.kernel.org/stable/c/8ad4d580e8aff8de2a4d57c5930fcc29f1ffd4a6 https://git.kernel.org/stable/c/9fa04c93f24138747807fe75b5591bb680098f56 https://git.kernel.org/stable/c/a49087ab93508b60d9b8add91707a22dda832869 https://git.kernel.org/stable/c/a53e15e592b4dcc91c3a3b8514e484a0bdbc53a3 https://git.kernel.org/stable/c/c8c1158ffb007197f31f9d9170cf13e4f34cbb5c https://git.kernel.org/stable/c/e074686e993ff1be5f21b085a3b1b4275ccd5727 https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html rh#2265273 |
CVE-2023-52440 | kernel-source-rt:Not affected | important | () | CVE-2023-52440 CVE-2024-26592 CVE-2024-26594 MISC:lore.kernel.org:OSS:2024/Q1/233 MISC:www.openwall.com:OSS:2024/Q1/233 MISC:www.zerodayinitiative.com:OSS:2024/Q1/233 OSS:2022/12/22/8 OSS:2023/01/04/1 OSS:2024/03/18/2 OSS:2024/Q1/233 SMASH Issue 394723 ZDI-24-229 bnc#1220182 https://git.kernel.org/stable/c/30fd6521b2fbd9b767e438e31945e5ea3e3a2fba https://git.kernel.org/stable/c/4b081ce0d830b684fdf967abc3696d1261387254 https://git.kernel.org/stable/c/7f1d6cb0eb6af3a8088dc24b7ddee9a9711538c4 https://git.kernel.org/stable/c/bd554ed4fdc3d38404a1c43d428432577573e809 https://git.kernel.org/stable/c/ecd7e1c562cb08e41957fcd4b0e404de5ab38e20 |
CVE-2023-52441 | kernel-source-rt:Not affected | important | () | CVE-2023-52441 CVE-2024-26592 CVE-2024-26594 MISC:lore.kernel.org:OSS:2024/Q1/233 MISC:www.openwall.com:OSS:2024/Q1/233 MISC:www.zerodayinitiative.com:OSS:2024/Q1/233 OSS:2022/12/22/8 OSS:2023/01/04/1 OSS:2024/03/18/2 OSS:2024/Q1/233 SMASH Issue 394724 ZDI-24-228 bnc#1220183 https://git.kernel.org/stable/c/330d900620dfc9893011d725b3620cd2ee0bc2bc https://git.kernel.org/stable/c/536bb492d39bb6c080c92f31e8a55fe9934f452b https://git.kernel.org/stable/c/5c0df9d30c289d6b9d7d44e2a450de2f8e3cf40b https://git.kernel.org/stable/c/aa669ef229ae8dd779da9caa24e254964545895f |
CVE-2023-52442 | kernel-source-rt:Not affected | critical | () | CVE-2023-52442 CVE-2024-26592 CVE-2024-26594 MISC:lore.kernel.org:OSS:2024/Q1/233 MISC:www.openwall.com:OSS:2024/Q1/233 MISC:www.zerodayinitiative.com:OSS:2024/Q1/233 OSS:2022/12/22/8 OSS:2023/01/04/1 OSS:2024/03/18/2 OSS:2024/Q1/233 SMASH Issue 394725 ZDI-24-227 bnc#1220184 https://git.kernel.org/stable/c/017d85c94f02090a87f4a473dbe0d6ee0da72693 https://git.kernel.org/stable/c/3df0411e132ee74a87aa13142dfd2b190275332e https://git.kernel.org/stable/c/4c2b350b2e269e3fd17bbfa42de1b42775b777ac https://git.kernel.org/stable/c/becb5191d1d5fdfca0198a2e37457bbbf4fe266f |
CVE-2023-52444 | kernel-source-rt:Not affected | important | () | CVE-2023-52444 SMASH Issue 394899 bnc#1220234 https://git.kernel.org/stable/c/02160112e6d45c2610b049df6eb693d7a2e57b46 https://git.kernel.org/stable/c/2fb4867f4405aea8c0519d7d188207f232a57862 https://git.kernel.org/stable/c/53edb549565f55ccd0bdf43be3d66ce4c2d48b28 https://git.kernel.org/stable/c/5624a3c1b1ebc8991318e1cce2aa719542991024 https://git.kernel.org/stable/c/6f866885e147d33efc497f1095f35b2ee5ec7310 https://git.kernel.org/stable/c/d3c0b49aaa12a61d560528f5d605029ab57f0728 https://git.kernel.org/stable/c/f0145860c20be6bae6785c7a2249577674702ac7 https://git.kernel.org/stable/c/f100ba617d8be6c98a68f3744ef7617082975b77 |
CVE-2023-52446 | kernel-source-rt:Not affected | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-52446 SMASH Issue 394901 bnc#1220247 https://git.kernel.org/stable/c/59e5791f59dd83e8aa72a4e74217eabb6e8cfd90 https://git.kernel.org/stable/c/d048dced8ea5eac6723ae873a40567e6f101ea42 https://git.kernel.org/stable/c/f9ff6ef1c73cd9e1a6bb1ab3e57c5d141a536306 rh#2265655 |
CVE-2023-52447 | kernel-source-rt:Not affected | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-52447 SMASH Issue 394902 bnc#1220251 https://git.kernel.org/stable/c/37d98fb9c3144c0fddf7f6e99aece9927ac8dce6 https://git.kernel.org/stable/c/62fca83303d608ad4fec3f7428c8685680bb01b0 https://git.kernel.org/stable/c/876673364161da50eed6b472d746ef88242b2368 https://git.kernel.org/stable/c/90c445799fd1dc214d7c6279c144e33a35e29ef2 https://git.kernel.org/stable/c/bfd9b20c4862f41d4590fde11d70a5eeae53dcc5 https://git.kernel.org/stable/c/f91cd728b10c51f6d4a39957ccd56d1e802fc8ee rh#2265652 |
CVE-2023-52450 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52450 SMASH Issue 394905 bnc#1220237 https://git.kernel.org/stable/c/1692cf434ba13ee212495b5af795b6a07e986ce4 https://git.kernel.org/stable/c/3d6f4a78b104c65e4256c3776c9949f49a1b459e https://git.kernel.org/stable/c/bf1bf09e6b599758851457f3999779622a48d015 rh#2265649 |
CVE-2023-52452 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N) | CVE-2023-52452 SMASH Issue 394907 bnc#1220257 https://git.kernel.org/stable/c/0954982db8283016bf38e9db2da5adf47a102e19 https://git.kernel.org/stable/c/6b4a64bafd107e521c01eec3453ce94a3fb38529 https://git.kernel.org/stable/c/fbcf372c8eda2290470268e0afb5ab5d5f5d5fde rh#2265647 |
CVE-2023-52453 | kernel-source-rt:Not affected | moderate | () | CVE-2023-52453 SMASH Issue 394966 bnc#1220337 https://git.kernel.org/stable/c/45f80b2f230df10600e6fa1b83b28bf1c334185e https://git.kernel.org/stable/c/6bda81e24a35a856f58e6a5786de579b07371603 https://git.kernel.org/stable/c/be12ad45e15b5ee0e2526a50266ba1d295d26a88 |
CVE-2023-52454 | kernel-source-rt:Already fixed | moderate | 6.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52454 SMASH Issue 394967 bnc#1220320 https://git.kernel.org/stable/c/24e05760186dc070d3db190ca61efdbce23afc88 https://git.kernel.org/stable/c/2871aa407007f6f531fae181ad252486e022df42 https://git.kernel.org/stable/c/4cb3cf7177ae3666be7fb27d4ad4d72a295fb02d https://git.kernel.org/stable/c/70154e8d015c9b4fb56c1a2ef1fc8b83d45c7f68 https://git.kernel.org/stable/c/ee5e7632e981673f42a50ade25e71e612e543d9d https://git.kernel.org/stable/c/efa56305908ba20de2104f1b8508c6a7401833be https://git.kernel.org/stable/c/f775f2621c2ac5cc3a0b3a64665dad4fb146e510 https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html rh#2265791 |
CVE-2023-52455 | kernel-source-rt:Not affected | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-52455 SMASH Issue 394968 bnc#1220332 https://git.kernel.org/stable/c/5e23e283910c9f30248732ae0770bcb0c9438abf https://git.kernel.org/stable/c/98b8a550da83cc392a14298c4b3eaaf0332ae6ad https://git.kernel.org/stable/c/bb57f6705960bebeb832142ce9abf43220c3eab1 rh#2265793 |
CVE-2023-52456 | kernel-source-rt:Not affected | low | 4 (CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52456 SMASH Issue 394969 bnc#1220364 https://git.kernel.org/stable/c/63ee7be01a3f7d28b1ea8b8d7944f12bb7b0ed06 https://git.kernel.org/stable/c/6e04a9d30509fb53ba6df5d655ed61d607a7cfda https://git.kernel.org/stable/c/763cd68746317b5d746dc2649a3295c1efb41181 https://git.kernel.org/stable/c/78d60dae9a0c9f09aa3d6477c94047df2fe6f7b0 https://git.kernel.org/stable/c/9a662d06c22ddfa371958c2071dc350436be802b https://git.kernel.org/stable/c/ff168d4fdb0e1ba35fb413a749b3d6cce918ec19 https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html rh#2265792 |
CVE-2023-52457 | kernel-source-rt:Not affected | moderate | 4.2 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L) | CVE-2023-52457 SMASH Issue 394970 bnc#1220350 https://git.kernel.org/stable/c/828cd829483f0cda920710997aed79130b0af690 https://git.kernel.org/stable/c/887a558d0298d36297daea039954c39940228d9b https://git.kernel.org/stable/c/95e4e0031effad9837af557ecbfd4294a4d8aeee https://git.kernel.org/stable/c/ad90d0358bd3b4554f243a425168fc7cebe7d04e https://git.kernel.org/stable/c/b502fb43f7fb55aaf07f6092ab44657595214b93 https://git.kernel.org/stable/c/bc57f3ef8a9eb0180606696f586a6dcfaa175ed0 https://git.kernel.org/stable/c/d74173bda29aba58f822175d983d07c8ed335494 |
CVE-2023-52458 | kernel-source-rt:Not affected | moderate | () | CVE-2023-52458 SMASH Issue 394971 bnc#1220428 https://git.kernel.org/stable/c/5010c27120962c85d2f421d2cf211791c9603503 https://git.kernel.org/stable/c/6f64f866aa1ae6975c95d805ed51d7e9433a0016 https://git.kernel.org/stable/c/8f6dfa1f1efe6dcca2d43e575491d8fcbe922f62 https://git.kernel.org/stable/c/bcdc288e7bc008daf38ef0401b53e4a8bb61bbe5 https://git.kernel.org/stable/c/cb16cc1abda18a9514106d2ac8c8d7abc0be5ed8 https://git.kernel.org/stable/c/ef31cc87794731ffcb578a195a2c47d744e25fb8 rh#2265794 |
CVE-2023-52459 | kernel-source-rt:Not affected | moderate | () | CVE-2023-52459 SMASH Issue 394972 bnc#1220318 https://git.kernel.org/stable/c/3de6ee94aae701fa949cd3b5df6b6a440ddfb8f2 https://git.kernel.org/stable/c/49d82811428469566667f22749610b8c132cdb3e https://git.kernel.org/stable/c/b7062628caeaec90e8f691ebab2d70f31b7b6b91 rh#2265795 |
CVE-2023-52460 | kernel-source-rt:Not affected | moderate | () | CVE-2023-52460 SMASH Issue 394973 bnc#1220319 https://git.kernel.org/stable/c/6b80326efff093d037e0971831dca6ebddba9b45 https://git.kernel.org/stable/c/b719a9c15d52d4f56bdea8241a5d90fd9197ce99 |
CVE-2023-52461 | kernel-source-rt:Not affected | moderate | () | CVE-2023-52461 SMASH Issue 394974 bnc#1220322 https://git.kernel.org/stable/c/1470d173925d697b497656b93f7c5bddae2e64b2 https://git.kernel.org/stable/c/2bbe6ab2be53858507f11f99f856846d04765ae3 rh#2265796 |
CVE-2023-52462 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N) | CVE-2023-52462 SMASH Issue 394975 bnc#1220325 https://git.kernel.org/stable/c/2757f17972d87773b3677777f5682510f13c66ef https://git.kernel.org/stable/c/40617d45ea05535105e202a8a819e388a2b1f036 https://git.kernel.org/stable/c/67e6707f07354ed1acb4e65552e97c60cf9d69cf https://git.kernel.org/stable/c/8dc15b0670594543c356567a1a45b0182ec63174 https://git.kernel.org/stable/c/ab125ed3ec1c10ccc36bc98c7a4256ad114a3dae https://git.kernel.org/stable/c/fc3e3c50a0a4cac1463967c110686189e4a59104 rh#2265798 |
CVE-2023-52463 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52463 SMASH Issue 394976 bnc#1220328 https://git.kernel.org/stable/c/0049fe7e4a85849bdd778cdb72e51a791ff3d737 https://git.kernel.org/stable/c/0e8d2444168dd519fea501599d150e62718ed2fe https://git.kernel.org/stable/c/2aa141f8bc580f8f9811dfe4e0e6009812b73826 https://git.kernel.org/stable/c/94c742324ed7e42c5bd6a9ed22e4ec6d764db4d8 https://git.kernel.org/stable/c/d4a714873db0866cc471521114eeac4a5072d548 https://git.kernel.org/stable/c/d4a9aa7db574a0da64307729cc031fb68597aa8b rh#2265797 |
CVE-2023-52465 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52465 SMASH Issue 395129 bnc#1220434 https://git.kernel.org/stable/c/88f04bc3e737155e13caddf0ba8ed19db87f0212 https://git.kernel.org/stable/c/bd3d2ec447ede9da822addf3960a5f4275e3ae76 https://git.kernel.org/stable/c/e2717302fbc20f148bcda362facee0444b949a3a rh#2266207 |
CVE-2023-52466 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L) | CVE-2023-52466 SMASH Issue 395130 bnc#1220417 https://git.kernel.org/stable/c/3171e46d677a668eed3086da78671f1e4f5b8405 https://git.kernel.org/stable/c/5b3e25efe16e06779a9a7c7610217c1b921ec179 https://git.kernel.org/stable/c/bd26159dcaaa3e9a927070efd348e7ce7e5ee933 rh#2266210 |
CVE-2023-52467 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52467 SMASH Issue 395131 bnc#1220433 https://git.kernel.org/stable/c/3ef1130deee98997275904d9bfc37af75e1e906c https://git.kernel.org/stable/c/41673c66b3d0c09915698fec5c13b24336f18dd1 https://git.kernel.org/stable/c/527e8c5f3d00299822612c495d5adf1f8f43c001 https://git.kernel.org/stable/c/7f2c410ac470959b88e03dadd94b7a0b71df7973 https://git.kernel.org/stable/c/927626a2073887ee30ba00633260d4d203f8e875 https://git.kernel.org/stable/c/c3e3a2144bf50877551138ffce9f7aa6ddfe385b https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html rh#2266212 |
CVE-2023-52468 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-52468 SMASH Issue 395132 bnc#1220431 https://git.kernel.org/stable/c/0f1486dafca3398c4c46b9f6e6452fa27e73b559 https://git.kernel.org/stable/c/93ec4a3b76404bce01bd5c9032bef5df6feb1d62 https://git.kernel.org/stable/c/b57196a5ec5e4c0ffecde8348b085b778c7dce04 rh#2266340 |
CVE-2023-52471 | kernel-source-rt:Not affected | moderate | 6.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52471 SMASH Issue 395135 bnc#1220424 https://git.kernel.org/stable/c/3027e7b15b02d2d37e3f82d6b8404f6d37e3b8cf https://git.kernel.org/stable/c/3cd9b9bee33f39f6c6d52360fe381b89a7b12695 rh#2266347 |
CVE-2023-52472 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2023-52472 CVE-2023-52473 SMASH Issue 395136 SMASH Issue 395137 bnc#1220427 bnc#1220430 https://git.kernel.org/stable/c/02871710b93058eb1249d5847c0b2d1c2c3c98ae https://git.kernel.org/stable/c/04e6ccfc93c5a1aa1d75a537cf27e418895e20ea https://git.kernel.org/stable/c/2831f4d3bfa68e64c5f83e96688be779c87b3511 https://git.kernel.org/stable/c/335176dd8ebaca6493807dceea33c478305667fa https://git.kernel.org/stable/c/95ad8b6879e2e49d02e3bfc0e1fb46421633fe2a https://git.kernel.org/stable/c/d872ca165cb67112f2841ef9c37d51ef7e63d1e4 rh#2266363 rh#2266364 |
CVE-2023-52473 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52472 CVE-2023-52473 SMASH Issue 395137 bnc#1220430 https://git.kernel.org/stable/c/02871710b93058eb1249d5847c0b2d1c2c3c98ae https://git.kernel.org/stable/c/04e6ccfc93c5a1aa1d75a537cf27e418895e20ea https://git.kernel.org/stable/c/2831f4d3bfa68e64c5f83e96688be779c87b3511 https://git.kernel.org/stable/c/335176dd8ebaca6493807dceea33c478305667fa https://git.kernel.org/stable/c/95ad8b6879e2e49d02e3bfc0e1fb46421633fe2a https://git.kernel.org/stable/c/d872ca165cb67112f2841ef9c37d51ef7e63d1e4 rh#2266363 rh#2266364 |
CVE-2023-52479 | kernel-source-rt:Not affected | moderate | () | CVE-2023-52479 SMASH Issue 395796 bnc#1220695 https://git.kernel.org/stable/c/694e13732e830cbbfedb562e57f28644927c33fd https://git.kernel.org/stable/c/8226ffc759ea59f10067b9acdf7f94bae1c69930 https://git.kernel.org/stable/c/c69813471a1ec081a0b9bf0c6bd7e8afd818afce https://git.kernel.org/stable/c/d5b0e9d3563e7e314a850e81f42b2ef6f39882f9 rh#2267034 |
CVE-2023-52480 | kernel-source-rt:Not affected | important | () | CVE-2023-52480 SMASH Issue 395797 bnc#1220665 https://git.kernel.org/stable/c/18ced78b0ebccc2d16f426143dc56ab3aad666be https://git.kernel.org/stable/c/53ff5cf89142b978b1a5ca8dc4d4425e6a09745f https://git.kernel.org/stable/c/a2ca5fd3dbcc665e1169044fa0c9e3eba779202b https://git.kernel.org/stable/c/c77fd3e25a51ac92b0f1b347a96eff6a0b4f066f rh#2267032 |
CVE-2023-52481 | kernel-source-rt:Not affected | moderate | 6 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H) | CVE-2023-52481 SMASH Issue 395798 bnc#1220887 https://git.kernel.org/stable/c/32b0a4ffcaea44a00a61e40c0d1bcc50362aee25 https://git.kernel.org/stable/c/471470bc7052d28ce125901877dd10e4c048e513 https://git.kernel.org/stable/c/6e3ae2927b432a3b7c8374f14dbc1bd9ebe4372c jsc#CAR-3210 rh#2267030 |
CVE-2023-52483 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-52483 SMASH Issue 395800 bnc#1220738 bnc#1223291 https://git.kernel.org/stable/c/1db0724a01b558feb1ecae551782add1951a114a https://git.kernel.org/stable/c/2405f64a95a7a094eb24cba9bcfaffd1ea264de4 https://git.kernel.org/stable/c/5093bbfc10ab6636b32728e35813cbd79feb063c https://git.kernel.org/stable/c/6c52b12159049046483fdb0c411a0a1869c41a67 rh#2267026 |
CVE-2023-52484 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52484 SMASH Issue 395801 bnc#1220797 https://git.kernel.org/stable/c/3283a1bce9bbc978059f790b84f3c10c32492429 https://git.kernel.org/stable/c/d5afb4b47e13161b3f33904d45110f9e6463bad6 https://git.kernel.org/stable/c/f5a604757aa8e37ea9c7011dc9da54fa1b30f29b https://git.kernel.org/stable/c/f90f4c562003ac3d3b135c5a40a5383313f27264 rh#2267023 |
CVE-2023-52485 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52485 SMASH Issue 395842 bnc#1220835 https://git.kernel.org/stable/c/303197775a97416b62d4da69280d0c120a20e009 https://git.kernel.org/stable/c/8892780834ae294bc3697c7d0e056d7743900b39 rh#2267195 |
CVE-2023-52487 | kernel-source-rt:Not affected | moderate | () | CVE-2023-52487 SMASH Issue 397129 bnc#1221341 https://git.kernel.org/stable/c/74cec142f89bf85c6c99c5db957da9f663f9f16f https://git.kernel.org/stable/c/d76fdd31f953ac5046555171620f2562715e9b71 https://git.kernel.org/stable/c/e24d6f5a7f2d95a98a46257a5a5a5381d572894f rh#2269067 |
CVE-2023-52490 | kernel-source-rt:Not affected | moderate | () | CVE-2023-52490 SMASH Issue 397131 bnc#1221325 https://git.kernel.org/stable/c/3889a418b6eb9a1113fb989aaadecf2f64964767 https://git.kernel.org/stable/c/9128bfbc5c80d8f4874dd0a0424d1f5fb010df1b https://git.kernel.org/stable/c/d1adb25df7111de83b64655a80b5a135adbded61 rh#2269187 |
CVE-2023-52491 | kernel-source-rt:Not affected | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52491 SMASH Issue 397132 bnc#1221281 https://git.kernel.org/stable/c/1b1036c60a37a30caf6759a90fe5ecd06ec35590 https://git.kernel.org/stable/c/206c857dd17d4d026de85866f1b5f0969f2a109e https://git.kernel.org/stable/c/43872f44eee6c6781fea1348b38885d8e78face9 https://git.kernel.org/stable/c/6e2f37022f0fc0893da4d85a0500c9d547fffd4c https://git.kernel.org/stable/c/8254d54d00eb6cdb8367399c7f912eb8d354ecd7 https://git.kernel.org/stable/c/9fec4db7fff54d9b0306a332bab31eac47eeb5f6 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2269185 |
CVE-2023-52492 | kernel-source-rt:Not affected | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52492 SMASH Issue 397133 bnc#1221276 https://git.kernel.org/stable/c/047fce470412ab64cb7345f9ff5d06919078ad79 https://git.kernel.org/stable/c/2ab32986a0b9e329eb7f8f04dd57cc127f797c08 https://git.kernel.org/stable/c/7f0ccfad2031eddcc510caf4e57f2d4aa2d8a50b https://git.kernel.org/stable/c/9263fd2a63487c6d04cbb7b74a48fb12e1e352d0 https://git.kernel.org/stable/c/9de69732dde4e443c1c7f89acbbed2c45a6a8e17 https://git.kernel.org/stable/c/f5c24d94512f1b288262beda4d3dcb9629222fc7 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2269183 |
CVE-2023-52493 | kernel-source-rt:Not affected | moderate | 5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52493 SMASH Issue 397134 bnc#1221274 https://git.kernel.org/stable/c/01bd694ac2f682fb8017e16148b928482bc8fa4b https://git.kernel.org/stable/c/20a6dea2d1c68d4e03c6bb50bc12e72e226b5c0e https://git.kernel.org/stable/c/3c5ec66b4b3f6816f3a6161538672e389e537690 https://git.kernel.org/stable/c/6e4c84316e2b70709f0d00c33ba3358d9fc8eece https://git.kernel.org/stable/c/b8eff20d87092e14cac976d057cb0aea2f1d0830 https://git.kernel.org/stable/c/eaefb9464031215d63c0a8a7e2bfaa00736aa17e https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2269181 |
CVE-2023-52494 | kernel-source-rt:Not affected | moderate | 5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52494 SMASH Issue 397135 bnc#1221273 https://git.kernel.org/stable/c/2df39ac8f813860f79782807c3f7acff40b3c551 https://git.kernel.org/stable/c/94991728c84f8df54fd9eec9b85855ef9057ea08 https://git.kernel.org/stable/c/a9ebfc405fe1be145f414eafadcbf09506082010 https://git.kernel.org/stable/c/ecf8320111822a1ae5d5fc512953eab46d543d0b https://git.kernel.org/stable/c/eff9704f5332a13b08fbdbe0f84059c9e7051d5f rh#2269179 |
CVE-2023-52495 | kernel-source-rt:Not affected | moderate | () | CVE-2023-52495 SMASH Issue 397136 bnc#1221271 https://git.kernel.org/stable/c/532a5557da6892a6b2d5793052e1bce1f4c9e177 https://git.kernel.org/stable/c/c4fb7d2eac9ff9bfc35a2e4d40c7169a332416e0 https://git.kernel.org/stable/c/d26edf4ee3672cc9828f2a3ffae34086a712574d rh#2269177 |
CVE-2023-52496 | kernel-source-rt:Not affected | moderate | () | CVE-2023-52496 SMASH Issue 396605 bnc#1221163 rh#2268451 |
CVE-2023-52497 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L) | CVE-2023-52497 SMASH Issue 395941 bnc#1220879 https://git.kernel.org/stable/c/33bf23c9940dbd3a22aad7f0cda4c84ed5701847 https://git.kernel.org/stable/c/3c12466b6b7bf1e56f9b32c366a3d83d87afb4de https://git.kernel.org/stable/c/77cbc04a1a8610e303a0e0d74f2676667876a184 https://git.kernel.org/stable/c/a0180e940cf1aefa7d516e20b259ad34f7a8b379 https://git.kernel.org/stable/c/bffc4cc334c5bb31ded54bc3cfd651735a3cb79e https://git.kernel.org/stable/c/f36d200a80a3ca025532ed60dd1ac21b620e14ae https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2267333 |
CVE-2023-52498 | kernel-source-rt:Analysis | moderate | () | CVE-2023-52498 SMASH Issue 397137 bnc#1221269 https://git.kernel.org/stable/c/7839d0078e0d5e6cc2fa0b0dfbee71de74f1e557 https://git.kernel.org/stable/c/9bd3dce27b01c51295b60e1433e1dadfb16649f7 https://git.kernel.org/stable/c/a1d62c775b07213c73f81ae842424c74dd14b5f0 https://git.kernel.org/stable/c/e1c9d32c98309ae764893a481552d3f99d46cb34 https://git.kernel.org/stable/c/e681e29d1f59a04ef773296e4bebb17b1b79f8fe https://git.kernel.org/stable/c/f46eb832389f162ad13cb780d0b8cde93641990d https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2269063 |
CVE-2023-52499 | kernel-source-rt:Not affected | moderate | () | CVE-2023-52499 SMASH Issue 396048 bnc#1220881 https://git.kernel.org/stable/c/29017ab1a539101d9c7bec63cc13a019f97b2820 https://git.kernel.org/stable/c/70f6756ad96dd70177dddcfac2fe4bd4bb320746 https://git.kernel.org/stable/c/8ac2689502f986a46f4221e239d4ff2897f1ccb3 https://git.kernel.org/stable/c/f0eee815babed70a749d2496a7678be5b45b4c14 rh#2267784 |
CVE-2023-52501 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2023-52501 SMASH Issue 396050 bnc#1220885 https://git.kernel.org/stable/c/344f2f3e61a90f0150c754796ec9a17fcaeec03d https://git.kernel.org/stable/c/75fc9e99b3a71006720ad1e029db11a4b5c32d4a https://git.kernel.org/stable/c/95a404bd60af6c4d9d8db01ad14fe8957ece31ca https://git.kernel.org/stable/c/b08a4938229dbb530a35c41b83002a1457c6ff49 https://git.kernel.org/stable/c/cee5151c5410e868826b8afecfb356f3799ebea3 rh#2267782 |
CVE-2023-52503 | kernel-source-rt:Not affected | moderate | 4.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L) | CVE-2023-52503 SMASH Issue 396052 bnc#1220915 https://git.kernel.org/stable/c/1680c82929bc14d706065f123dab77f2f1293116 https://git.kernel.org/stable/c/1c95574350cd63bc3c5c2fa06658010768f2a0ce https://git.kernel.org/stable/c/60c3e7a00db954947c265b55099c21b216f2a05c https://git.kernel.org/stable/c/da7ce52a2f6c468946195b116615297d3d113a27 https://git.kernel.org/stable/c/f4384b3e54ea813868bb81a861bf5b2406e15d8f rh#2267780 |
CVE-2023-52504 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52504 SMASH Issue 396053 bnc#1221553 https://git.kernel.org/stable/c/3719d3c36aa853d5a2401af9f8d6b116c91ad5ae https://git.kernel.org/stable/c/3770c38cd6a60494da29ac2da73ff8156440a2d1 https://git.kernel.org/stable/c/5b784489c8158518bf7a466bb3cc045b0fb66b4b https://git.kernel.org/stable/c/6788b10620ca6e98575d1e06e72a8974aad7657e https://git.kernel.org/stable/c/cd287cc208dfe6bd6da98e7f88e723209242c9b4 https://git.kernel.org/stable/c/d35652a5fc9944784f6f50a5c979518ff8dacf61 https://git.kernel.org/stable/c/ecba5afe86f30605eb9dfb7f265a8de0218d4cfc rh#2267779 |
CVE-2023-52505 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H) | CVE-2023-52505 SMASH Issue 396054 bnc#1220830 https://git.kernel.org/stable/c/139ad1143151a07be93bf741d4ea7c89e59f89ce https://git.kernel.org/stable/c/6f901f8448c6b25ed843796b114471d2a3fc5dfb https://git.kernel.org/stable/c/c2d7c79898b427d263c64a4841987eec131f2d4e rh#2267778 |
CVE-2023-52506 | kernel-source-rt:Not affected | moderate | () | CVE-2023-52506 SMASH Issue 396055 bnc#1220867 https://git.kernel.org/stable/c/19878758accf6b2788091a771d9f9fee7bab11ab https://git.kernel.org/stable/c/b795fb9f5861ee256070d59e33130980a01fadd7 https://git.kernel.org/stable/c/f105e893a8edd48bdf4bef9fef845a9ff402f737 rh#2267777 |
CVE-2023-52508 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52508 SMASH Issue 396057 bnc#1221015 https://git.kernel.org/stable/c/8ae5b3a685dc59a8cf7ccfe0e850999ba9727a3c https://git.kernel.org/stable/c/be90c9e29dd59b7d19a73297a1590ff3ec1d22ea https://git.kernel.org/stable/c/dd46b3ac7322baf3772b33b29726e94f98289db7 rh#2267775 |
CVE-2023-52509 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-52509 L3:68040 SMASH Issue 396058 bnc#1220836 bnc#1223290 https://git.kernel.org/stable/c/105abd68ad8f781985113aee2e92e0702b133705 https://git.kernel.org/stable/c/3971442870713de527684398416970cf025b4f89 https://git.kernel.org/stable/c/616761cf9df9af838c0a1a1232a69322a9eb67e6 https://git.kernel.org/stable/c/65d34cfd4e347054eb4193bc95d9da7eaa72dee5 https://git.kernel.org/stable/c/6f6fa8061f756aedb93af12a8a5d3cf659127965 https://git.kernel.org/stable/c/db9aafa19547833240f58c2998aed7baf414dc82 rh#2267774 |
CVE-2023-52511 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52511 SMASH Issue 396060 bnc#1221012 https://git.kernel.org/stable/c/171f8a49f212e87a8b04087568e1b3d132e36a18 https://git.kernel.org/stable/c/b3c21c9c7289692f4019f163c3b06d8bdf78b355 https://git.kernel.org/stable/c/e15bb292b24630ee832bfc7fd616bd72c7682bbb https://git.kernel.org/stable/c/ff05ed4ae214011464a0156f05cac1b0b46b5fbc jsc#CAR-3201 rh#2267772 |
CVE-2023-52512 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52512 SMASH Issue 396061 bnc#1221021 https://git.kernel.org/stable/c/6c18c386fd13dbb3ff31a1086dabb526780d9bda https://git.kernel.org/stable/c/87d315a34133edcb29c4cadbf196ec6c30dfd47b https://git.kernel.org/stable/c/c9d7cac0fd27c74dd368e80dc4b5d0f9f2e13cf8 rh#2267771 |
CVE-2023-52514 | kernel-source-rt:Ignore | low | 0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N) | CVE-2023-52514 SMASH Issue 396063 bnc#1221024 https://git.kernel.org/stable/c/1375d9600c38c231163de584656b07aef9a27b0d https://git.kernel.org/stable/c/65edea77d7006140c6290e7f46009d75e02d3273 https://git.kernel.org/stable/c/b23c83ad2c638420ec0608a9de354507c41bec29 rh#2267803 |
CVE-2023-52516 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52516 SMASH Issue 396065 bnc#1221035 https://git.kernel.org/stable/c/ac0d068099349cbca3d93f2e3b15bb329364b08c https://git.kernel.org/stable/c/be8f49029eca3efbad0d74dbff3cb9129994ffab https://git.kernel.org/stable/c/c79300599923daaa30f417c75555d5566b3d31ae https://git.kernel.org/stable/c/fb5a4315591dae307a65fc246ca80b5159d296e1 https://git.kernel.org/stable/c/fe2b811a02c3244ebf6059039e4a9e715e26a9e3 rh#2267801 |
CVE-2023-52517 | kernel-source-rt:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52517 SMASH Issue 396066 bnc#1221055 https://git.kernel.org/stable/c/1f11f4202caf5710204d334fe63392052783876d https://git.kernel.org/stable/c/36b29974a7ad2ff604c24ad348f940506c7b1209 https://git.kernel.org/stable/c/4e149d524678431638ff378ef6025e4e89b71097 https://git.kernel.org/stable/c/bd1ec7f9983b5cd3c77e0f7cda3fa8aed041af2f rh#2267800 |
CVE-2023-52518 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52518 SMASH Issue 396067 bnc#1221056 https://git.kernel.org/stable/c/626535077ba9dc110787540d1fe24881094c15a1 https://git.kernel.org/stable/c/b938790e70540bf4f2e653dcd74b232494d06c8f https://git.kernel.org/stable/c/eea5a8f0c3b7c884d2351e75fbdd0a3d7def5ae1 rh#2267799 |
CVE-2023-52519 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52519 SMASH Issue 396068 bnc#1220920 https://git.kernel.org/stable/c/60fb3f054c99608ddb1f2466c07108da6292951e https://git.kernel.org/stable/c/8781fe259dd5a178fdd1069401bbd1437f9491c5 https://git.kernel.org/stable/c/8f02139ad9a7e6e5c05712f8c1501eebed8eacfd https://git.kernel.org/stable/c/cdcc04e844a2d22d9d25cef1e8e504a174ea9f8f rh#2267798 |
CVE-2023-52520 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52520 SMASH Issue 396069 bnc#1220921 https://git.kernel.org/stable/c/124cf0ea4b82e1444ec8c7420af4e7db5558c293 https://git.kernel.org/stable/c/528ab3e605cabf2f9c9bd5944d3bfe15f6e94f81 https://git.kernel.org/stable/c/af21c9119a37cecb7ff27ce0c2f3cf721e9d0ec4 https://git.kernel.org/stable/c/c6e3023579de8d33256771ac0745239029e81106 rh#2267797 |
CVE-2023-52521 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52521 SMASH Issue 396070 bnc#1220923 https://git.kernel.org/stable/c/5685f8a6fae1fbe480493b980a1fdbe67c86a094 https://git.kernel.org/stable/c/6a86b5b5cd76d2734304a0173f5f01aa8aa2025e https://git.kernel.org/stable/c/e562de67dc9196f2415f117796a2108c00ac7fc6 jsc#CAR-3188 rh#2267796 |
CVE-2023-52523 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52523 SMASH Issue 396072 bnc#1220926 https://git.kernel.org/stable/c/b80e31baa43614e086a9d29dc1151932b1bd7fc5 https://git.kernel.org/stable/c/b8f97e47b6fb84fcf2f5a22e725eefb6cf5070c2 https://git.kernel.org/stable/c/bc8b89b6963803a123f64aa9494155a037b3d728 https://git.kernel.org/stable/c/ded6e448028f0f91b6af35985afca01fa02a9089 rh#2267794 |
CVE-2023-52525 | kernel-source-rt:Not affected | low | 3.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CVE-2023-52525 SMASH Issue 396074 bnc#1220840 https://git.kernel.org/stable/c/10a18c8bac7f60d32b7af22da03b66f350beee38 https://git.kernel.org/stable/c/16cc18b9080892d1a0200a38e36ae52e464bc555 https://git.kernel.org/stable/c/5afb996349cb6d1f14d6ba9aaa7aed3bd82534f6 https://git.kernel.org/stable/c/6b706286473db4fd54b5f869faa67f4a8cb18e99 https://git.kernel.org/stable/c/71b1d2b57f145c8469aa9346f0fd57bf59b2b89c https://git.kernel.org/stable/c/aef7a0300047e7b4707ea0411dc9597cba108fc8 https://git.kernel.org/stable/c/b8e260654a29de872e7cb85387d8ab8974694e8e https://git.kernel.org/stable/c/be2ff39b1504c5359f4a083c1cfcad21d666e216 rh#2267792 |
CVE-2023-52526 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52526 SMASH Issue 396075 bnc#1220897 https://git.kernel.org/stable/c/6a5a8f0a9740f865693d5aa97a42cc4504538e18 https://git.kernel.org/stable/c/75a5221630fe5aa3fedba7a06be618db0f79ba1e https://git.kernel.org/stable/c/c955751cbf864cf2055117dd3fe7f780d2a57b56 rh#2267791 |
CVE-2023-52529 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52529 SMASH Issue 396078 bnc#1220929 https://git.kernel.org/stable/c/bb0707fde7492121917fd9ddb43829e96ec0bb9e https://git.kernel.org/stable/c/e1cd4004cde7c9b694bbdd8def0e02288ee58c74 https://git.kernel.org/stable/c/f237b17611fa3501f43f12d1cb64323e10fdcb4f https://git.kernel.org/stable/c/f566efa7de1e35e6523f4acbaf85068a540be07d rh#2267788 |
CVE-2023-52559 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52559 SMASH Issue 396082 bnc#1220933 https://git.kernel.org/stable/c/29298c85a81abdc512e87537515ed4b1a9601d0e https://git.kernel.org/stable/c/496c591f0b389eb782f36d9d4c2564b9a865eed0 https://git.kernel.org/stable/c/59df44bfb0ca4c3ee1f1c3c5d0ee8e314844799e https://git.kernel.org/stable/c/c12ef025add77ca3a0902e8719d552b6d47b4282 rh#2267733 |
CVE-2023-52560 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52560 SMASH Issue 396083 bnc#1220934 https://git.kernel.org/stable/c/45120b15743fa7c0aa53d5db6dfb4c8f87be4abd https://git.kernel.org/stable/c/6b522001693aa113d97a985abc5f6932972e8e86 https://git.kernel.org/stable/c/9a4fe81a8644b717d57d81ce5849e16583b13fe8 rh#2267730 |
CVE-2023-52562 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52562 SMASH Issue 396085 bnc#1220936 https://git.kernel.org/stable/c/46a9ea6681907a3be6b6b0d43776dccc62cad6cf https://git.kernel.org/stable/c/51988be187b041e5355245957b0b9751fa382e0d https://git.kernel.org/stable/c/a5569bb187521432f509b69dda7d29f78b2d38b0 rh#2267737 |
CVE-2023-52563 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52563 SMASH Issue 396086 bnc#1220937 https://git.kernel.org/stable/c/099f0af9d98231bb74956ce92508e87cbcb896be https://git.kernel.org/stable/c/43b63e088887a8b82750e16762f77100ffa76cba https://git.kernel.org/stable/c/66cb6d74f5a1b6eafe3370b56bf2cb575a91acbc https://git.kernel.org/stable/c/ee335e0094add7fc2c7034e0534e1920d61d2078 rh#2267728 |
CVE-2023-52564 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52564 MISC:lists.openwall.net:OSS:2024/Q2/96 OSS:2024/04/11/11 OSS:2024/04/11/9 OSS:2024/04/12/1 OSS:2024/04/12/2 OSS:2024/Q2/96 OSS:2024/Q2/98 SMASH Issue 396087 bnc#1220938 https://git.kernel.org/stable/c/29346e217b8ab8a52889b88f00b268278d6b7668 https://git.kernel.org/stable/c/2bff660e0ff349dee84dc4f6f6d10da4497f5b28 https://git.kernel.org/stable/c/6d5c8862932d31a810b6545f7d69ecc124402c6e https://git.kernel.org/stable/c/a48d2bcd23f2c98d575bc2f9b7a3fbd16aeea9eb https://git.kernel.org/stable/c/c61d0b87a7028c2c10faffc524d748334c7b9827 rh#2267738 |
CVE-2023-52565 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52565 SMASH Issue 396088 bnc#1220939 https://git.kernel.org/stable/c/09635bf4cdd4adf2160198a6041bcc7ca46c0558 https://git.kernel.org/stable/c/41ebaa5e0eebea4c3bac96b72f9f8ae0d77c0bdb https://git.kernel.org/stable/c/8bcf70d787f7d53a3b85ad394f926cfef3eed023 rh#2267724 |
CVE-2023-52566 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52566 SMASH Issue 396089 bnc#1220940 https://git.kernel.org/stable/c/193b5a1c6c67c36b430989dc063fe7ea4e200a33 https://git.kernel.org/stable/c/28df4646ad8b433340772edc90ca709cdefc53e2 https://git.kernel.org/stable/c/3936e8714907cd55e37c7cc50e50229e4a9042e8 https://git.kernel.org/stable/c/7130a87ca32396eb9bf48b71a2d42259ae44c6c7 https://git.kernel.org/stable/c/7ee29facd8a9c5a26079148e36bcf07141b3a6bc https://git.kernel.org/stable/c/980663f1d189eedafd18d80053d9cf3e2ceb5c8c https://git.kernel.org/stable/c/bb61224f6abc8e71bfdf06d7c984e23460875f5b https://git.kernel.org/stable/c/fb1084e63ee56958b0a56e17a50a4fd86445b9c1 jsc#CAR-3196 rh#2267719 |
CVE-2023-52567 | kernel-source-rt:Not affected | low | 2.3 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L) | CVE-2023-52567 SMASH Issue 396090 bnc#1220839 https://git.kernel.org/stable/c/2b837f13a818f96304736453ac53b66a70aaa4f2 https://git.kernel.org/stable/c/3345cc5f02f1fb4c4dcb114706f2210d879ab933 https://git.kernel.org/stable/c/bf3c728e3692cc6d998874f0f27d433117348742 https://git.kernel.org/stable/c/c334650150c29234b0923476f51573ae1b2f252a https://git.kernel.org/stable/c/cce7fc8b29961b64fadb1ce398dc5ff32a79643b https://git.kernel.org/stable/c/e14afa4450cb7e4cf93e993a765801203d41d014 https://git.kernel.org/stable/c/e14f68a48fd445a083ac0750fafcb064df5f18f7 https://git.kernel.org/stable/c/ee5732caaffba3a37e753fdb89b4958db9a61847 rh#2267739 |
CVE-2023-52568 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52568 SMASH Issue 396091 bnc#1220941 https://git.kernel.org/stable/c/1348f7f15d7c7798456856bee74a4235c2da994e https://git.kernel.org/stable/c/811ba2ef0cb6402672e64ba1419d6ef95aa3405d https://git.kernel.org/stable/c/c6c2adcba50c2622ed25ba5d5e7f05f584711358 rh#2267740 |
CVE-2023-52570 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52570 SMASH Issue 396093 bnc#1220925 https://git.kernel.org/stable/c/52093779b1830ac184a23848d971f06404cf513e https://git.kernel.org/stable/c/c01b2e0ee22ef8b4dd7509a93aecc0ac0826bae4 https://git.kernel.org/stable/c/c777b11d34e0f47dbbc4b018ef65ad030f2b283a rh#2267744 |
CVE-2023-52571 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52571 SMASH Issue 396094 bnc#1220945 https://git.kernel.org/stable/c/488ef44c068e79752dba8eda0b75f524f111a695 https://git.kernel.org/stable/c/70326b46b6a043f7e7404b2ff678b033c06d6577 https://git.kernel.org/stable/c/fe6406238d5a24e9fb0286c71edd67b99d8db58d rh#2267745 |
CVE-2023-52572 | kernel-source-rt:Released | moderate | 0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N) | CVE-2023-1192 CVE-2023-52572 SMASH Issue 359331 SMASH Issue 396095 bnc#1208995 bnc#1220946 https://access.redhat.com/security/cve/CVE-2023-1192 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d527f51331cace562393a8038d870b3e9916686f https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=98bea253aa28ad8be2ce565a9ca21beb4a9419e5 https://git.kernel.org/stable/c/76569e3819e0bb59fc19b1b8688b017e627c268a https://git.kernel.org/stable/c/908b3b5e97d25e879de3d1f172a255665491c2c3 https://git.kernel.org/stable/c/d527f51331cace562393a8038d870b3e9916686f jsc#CAR-2708 rh#2154178 rh#2267746 |
CVE-2023-52575 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52575 SMASH Issue 396098 bnc#1220871 https://git.kernel.org/stable/c/01b057b2f4cc2d905a0bd92195657dbd9a7005ab https://git.kernel.org/stable/c/13ea4b92e8759d2f6c330a73cde31ad9c313021b https://git.kernel.org/stable/c/adbcec23c8423e3d5df1839c5ae91599dcf703cb https://git.kernel.org/stable/c/ae806c74c0634b0c23855066d8ba28d850fd1260 https://git.kernel.org/stable/c/e3cb8b2c391b1f287eb76df4ba37880f4ea56d8a rh#2267751 |
CVE-2023-52576 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52576 SMASH Issue 396099 bnc#1220872 https://git.kernel.org/stable/c/34cf99c250d5cd2530b93a57b0de31d3aaf8685b https://git.kernel.org/stable/c/d2dfbc0e3b7a04c2d941421a958dc31c897fb204 https://git.kernel.org/stable/c/eef16bfdb212da60f5144689f2967fb25b051a2b rh#2267755 |
CVE-2023-52577 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52577 SMASH Issue 396100 bnc#1220873 https://git.kernel.org/stable/c/1512d8f45d3c5d0b5baa00bd8e600492fa569f40 https://git.kernel.org/stable/c/26df9ab5de308caa1503d937533c56c35793018d https://git.kernel.org/stable/c/4600beae416d754a3cedbb1ecea8181ec05073b6 https://git.kernel.org/stable/c/60d73c62e3e4464f375758b6f2459c13d46465b6 https://git.kernel.org/stable/c/62c218124fe58372e0e1f60d5b634d21c264b337 https://git.kernel.org/stable/c/6af289746a636f71f4c0535a9801774118486c7a https://git.kernel.org/stable/c/73be49248a04746096339a48a33fa2f03bd85969 https://git.kernel.org/stable/c/a6f4d582e25d512c9b492670b6608436694357b3 rh#2267757 |
CVE-2023-52579 | kernel-source-rt:Not affected | low | () | CVE-2023-52579 SMASH Issue 396102 bnc#1220875 https://git.kernel.org/stable/c/0113d9c9d1ccc07f5a3710dac4aa24b6d711278c https://git.kernel.org/stable/c/084c7ac9e8d60bf21a423490021b7c3427312955 https://git.kernel.org/stable/c/2712545e535d7a2e4c53b9c9658a9c88c6055862 https://git.kernel.org/stable/c/810fd23d9715474aa27997584e8fc9396ef3cb67 https://git.kernel.org/stable/c/8689c9ace976d6c078e6dc844b09598796e84099 https://git.kernel.org/stable/c/8860d354f653628b6330e1c5b06b2828948135a4 https://git.kernel.org/stable/c/a2cf7bd75b3992e8df68dd5fdc6499b67d45f6e0 https://git.kernel.org/stable/c/cda20fcddf53f0f959641c8ef4d50ab87ffa5124 rh#2239845 rh#2267759 |
CVE-2023-52580 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52580 SMASH Issue 396103 bnc#1220876 https://git.kernel.org/stable/c/488ea2a3e2666022f79abfdd7d12e8305fc27a40 https://git.kernel.org/stable/c/48e105a2a1a10adc21c0ae717969f5e8e990ba48 https://git.kernel.org/stable/c/75ad80ed88a182ab2ad5513e448cf07b403af5c3 https://git.kernel.org/stable/c/f90a7b9586d72f907092078a9f394733ca502cc9 rh#2267760 |
CVE-2023-52581 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52581 SMASH Issue 396104 bnc#1220877 https://git.kernel.org/stable/c/09c85f2d21ab6b5acba31a037985b13e8e6565b8 https://git.kernel.org/stable/c/4aea243b6853d06c1d160a9955b759189aa02b14 https://git.kernel.org/stable/c/7cf055b43756b10aa2b851c927c940f5ed652125 https://git.kernel.org/stable/c/7e5d732e6902eb6a37b35480796838a145ae5f07 https://git.kernel.org/stable/c/a995a68e8a3b48533e47c856865d109a1f1a9d01 https://git.kernel.org/stable/c/cf5000a7787cbc10341091d37245a42c119d26c5 https://git.kernel.org/stable/c/ef99506eaf1dc31feff1adfcfd68bc5535a22171 rh#2267761 |
CVE-2023-52582 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52582 SMASH Issue 396105 bnc#1220878 https://git.kernel.org/stable/c/d9f5537479d4ec97ea92ff24e81a517d5772581a https://git.kernel.org/stable/c/df1c357f25d808e30b216188330e708e09e1a412 https://git.kernel.org/stable/c/df9950d37df113db59495fa09d060754366a2b7c rh#2267762 |
CVE-2023-52584 | kernel-source-rt:Not affected | moderate | 5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) | CVE-2023-52584 SMASH Issue 396441 bnc#1221079 https://git.kernel.org/stable/c/521f28eedd6b14228c46e3b81e3bf9b90c2818d8 https://git.kernel.org/stable/c/9a3881b1f07db1bb55cb0108e6f05cfd027eaf2e https://git.kernel.org/stable/c/e821d50ab5b956ed0effa49faaf29912fd4106d9 https://git.kernel.org/stable/c/f8dcafcb54632536684336161da8bdd52120f95e rh#2268337 |
CVE-2023-52585 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52585 SMASH Issue 396442 bnc#1221080 https://git.kernel.org/stable/c/0eb296233f86750102aa43b97879b8d8311f249a https://git.kernel.org/stable/c/195a6289282e039024ad30ba66e6f94a4d0fbe49 https://git.kernel.org/stable/c/467139546f3fb93913de064461b1a43a212d7626 https://git.kernel.org/stable/c/7e6d6f27522bcd037856234b720ff607b9c4a09b https://git.kernel.org/stable/c/92cb363d16ac1e41c9764cdb513d0e89a6ff4915 https://git.kernel.org/stable/c/b8d55a90fd55b767c25687747e2b24abd1ef8680 https://git.kernel.org/stable/c/c364e7a34c85c2154fb2e47561965d5b5a0b69b1 rh#2268335 |
CVE-2023-52586 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52586 SMASH Issue 396443 bnc#1221081 https://git.kernel.org/stable/c/14f109bf74dd67e1d0469fed859c8e506b0df53f https://git.kernel.org/stable/c/45284ff733e4caf6c118aae5131eb7e7cf3eea5a rh#2268333 |
CVE-2023-52588 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N) | CVE-2023-52588 SMASH Issue 396445 bnc#1221083 https://git.kernel.org/stable/c/417b8a91f4e8831cadaf85c3f15c6991c1f54dde https://git.kernel.org/stable/c/4961acdd65c956e97c1a000c82d91a8c1cdbe44b https://git.kernel.org/stable/c/7c972c89457511007dfc933814c06786905e515c https://git.kernel.org/stable/c/7ea0f29d9fd84905051be020c0df7d557e286136 https://git.kernel.org/stable/c/b8094c0f1aae329b1c60a275a780d6c2c9ff7aa3 rh#2268329 |
CVE-2023-52589 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52589 SMASH Issue 396446 bnc#1221084 https://git.kernel.org/stable/c/7bb1a2822aa2c2de4e09bf7c56dd93bd532f1fa7 https://git.kernel.org/stable/c/870565f063a58576e8a4529f122cac4325c6b395 https://git.kernel.org/stable/c/bf808f58681cab64c81cd814551814fd34e540fe https://git.kernel.org/stable/c/fab483438342984f2a315fe13c882a80f0f7e545 rh#2268327 |
CVE-2023-52590 | kernel-source-rt:Already fixed | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L) | CVE-2023-52590 SMASH Issue 396447 bnc#1221088 https://git.kernel.org/stable/c/9d618d19b29c2943527e3a43da0a35aea91062fc https://git.kernel.org/stable/c/de940cede3c41624e2de27f805b490999f419df9 jsc#CAR-3219 rh#2268325 |
CVE-2023-52592 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52592 SMASH Issue 396449 bnc#1221101 https://git.kernel.org/stable/c/12473265f50c1e27b0dfd9735738ac418c4bfcce https://git.kernel.org/stable/c/5f3e436832e86b826a6450eb8d1aaa51205a758e https://git.kernel.org/stable/c/90dbf4535668042fac0d7201ce9e2c8c770c578a https://git.kernel.org/stable/c/ab26541270c722eedf8eefd62797c3ce3d18a91b https://git.kernel.org/stable/c/fc3a5534e2a8855427403113cbeb54af5837bbe0 rh#2268321 |
CVE-2023-52593 | kernel-source-rt:Not affected | moderate | 5.7 (CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) | CVE-2023-52593 SMASH Issue 396450 bnc#1221042 https://git.kernel.org/stable/c/3739121443f5114c6bcf6d841a5124deb006b878 https://git.kernel.org/stable/c/574dcd3126aa2eed75437137843f254b1190dd03 https://git.kernel.org/stable/c/9ab224744a47363f74ea29c6894c405e3bcf5132 https://git.kernel.org/stable/c/fe0a7776d4d19e613bb8dd80fe2d78ae49e8b49d rh#2268319 |
CVE-2023-52596 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52596 SMASH Issue 396453 bnc#1221047 https://git.kernel.org/stable/c/15893975e9e382f8294ea8d926f08dc2d8d39ede https://git.kernel.org/stable/c/2ae7081bc10123b187e36a4f3a8e53768de31489 https://git.kernel.org/stable/c/315552310c7de92baea4e570967066569937a843 rh#2268313 |
CVE-2023-52599 | kernel-source-rt:Not affected | important | () | CVE-2023-52599 SMASH Issue 396456 bnc#1221062 https://git.kernel.org/stable/c/3537f92cd22c672db97fae6997481e678ad14641 https://git.kernel.org/stable/c/49f9637aafa6e63ba686c13cb8549bf5e6920402 https://git.kernel.org/stable/c/5a6660139195f5e2fbbda459eeecb8788f3885fe https://git.kernel.org/stable/c/6996d43b14486f4a6655b10edc541ada1b580b4b https://git.kernel.org/stable/c/6aa30020879042d46df9f747e4f0a486eea6fe98 https://git.kernel.org/stable/c/de6a91aed1e0b1a23e9c11e7d7557f088eeeb017 https://git.kernel.org/stable/c/e2b77d107b33bb31c8b1f5c4cb8f277b23728f1e https://git.kernel.org/stable/c/f423528488e4f9606cef858eceea210bf1163f41 rh#2268307 |
CVE-2023-52600 | kernel-source-rt:Not affected | important | () | CVE-2023-52600 SMASH Issue 396457 bnc#1221071 https://git.kernel.org/stable/c/1696d6d7d4a1b373e96428d0fe1166bd7c3c795e https://git.kernel.org/stable/c/32e8f2d95528d45828c613417cb2827d866cbdce https://git.kernel.org/stable/c/81b4249ef37297fb17ba102a524039a05c6c5d35 https://git.kernel.org/stable/c/8e44dc3f96e903815dab1d74fff8faafdc6feb61 https://git.kernel.org/stable/c/93df0a2a0b3cde2d7ab3a52ed46ea1d6d4aaba5f https://git.kernel.org/stable/c/bacdaa04251382d7efd4f09f9a0686bfcc297e2e https://git.kernel.org/stable/c/bc6ef64dbe71136f327d63b2b9071b828af2c2a8 https://git.kernel.org/stable/c/e0e1958f4c365e380b17ccb35617345b31ef7bf3 rh#2268305 |
CVE-2023-52601 | kernel-source-rt:Not affected | important | () | CVE-2023-52601 SMASH Issue 396458 bnc#1221068 https://git.kernel.org/stable/c/2037cb9d95f1741885f7daf50e8a028c4ade5317 https://git.kernel.org/stable/c/2e16a1389b5a7983b45cb2aa20b0e3f0ee364d6c https://git.kernel.org/stable/c/3d3898b4d72c677d47fe3cb554449f2df5c12555 https://git.kernel.org/stable/c/3f8217c323fd6ecd6829a0c3ae7ac3f14eac368e https://git.kernel.org/stable/c/70780914cb57e2ba711e0ac1b677aaaa75103603 https://git.kernel.org/stable/c/74ecdda68242b174920fe7c6133a856fb7d8559b https://git.kernel.org/stable/c/8393c80cce45f40c1256d72e21ad351b3650c57e https://git.kernel.org/stable/c/fc67a2e18f4c4e3f07e9f9ae463da24530470e73 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2268303 |
CVE-2023-52602 | kernel-source-rt:Not affected | important | () | CVE-2023-52602 SMASH Issue 396459 bnc#1221070 https://git.kernel.org/stable/c/1b9d6828589d57f94a23fb1c46112cda39d7efdb https://git.kernel.org/stable/c/1c40ca3d39d769931b28295b3145c25f1decf5a6 https://git.kernel.org/stable/c/6c6a96c3d74df185ee344977d46944d6f33bb4dd https://git.kernel.org/stable/c/7110650b85dd2f1cee819acd1345a9013a1a62f7 https://git.kernel.org/stable/c/bff9d4078a232c01e42e9377d005fb2f4d31a472 https://git.kernel.org/stable/c/cab0c265ba182fd266c2aa3c69d7e40640a7f612 https://git.kernel.org/stable/c/ce8bc22e948634a5c0a3fa58a179177d0e3f3950 https://git.kernel.org/stable/c/fa5492ee89463a7590a1449358002ff7ef63529f rh#2268301 |
CVE-2023-52603 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52603 SMASH Issue 396460 bnc#1221066 https://git.kernel.org/stable/c/27e56f59bab5ddafbcfe69ad7a4a6ea1279c1b16 https://git.kernel.org/stable/c/6e2902ecc77e9760a9fc447f56d598383e2372d2 https://git.kernel.org/stable/c/7aa33854477d9c346f5560a1a1fcb3fe7783e2a8 https://git.kernel.org/stable/c/e30b52a2ea3d1e0aaee68096957cf90a2f4ec5af https://git.kernel.org/stable/c/e4cbc857d75d4e22a1f75446e7480b1f305d8d60 https://git.kernel.org/stable/c/e4ce01c25ccbea02a09a5291c21749b1fc358e39 https://git.kernel.org/stable/c/edff092a59260bf0b0a2eba219cb3da6372c2f9f https://git.kernel.org/stable/c/fd3486a893778770557649fe28afa5e463d4ed07 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2268299 |
CVE-2023-52604 | kernel-source-rt:Not affected | important | () | CVE-2023-52604 SMASH Issue 396461 bnc#1221067 https://git.kernel.org/stable/c/42f433785f108893de0dd5260bafb85d7d51db03 https://git.kernel.org/stable/c/59342822276f753e49d27ef5eebffbba990572b9 https://git.kernel.org/stable/c/6a44065dd604972ec1fbcccbdc4a70d266a89cdd https://git.kernel.org/stable/c/6fe8b702125aeee6ce83f20092a2341446704e7b https://git.kernel.org/stable/c/9862ec7ac1cbc6eb5ee4a045b5d5b8edbb2f7e68 https://git.kernel.org/stable/c/98f9537fe61b8382b3cc5dd97347531698517c56 https://git.kernel.org/stable/c/de34de6e57bbbc868e4fcf9e98c76b3587cabb0b https://git.kernel.org/stable/c/e3e95c6850661c77e6dab079d9b5374a618ebb15 rh#2268297 |
CVE-2023-52605 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52605 SMASH Issue 396462 bnc#1221039 https://git.kernel.org/stable/c/33650372e3ead97c5ab3b84d9ad97737bc5e00c0 https://git.kernel.org/stable/c/5457b0cbaa0238fc56b855c4ef2c0b9cc9c559ab https://git.kernel.org/stable/c/72d9b9747e78979510e9aafdd32eb99c7aa30dd1 https://git.kernel.org/stable/c/77846571b3ba6a6125a20ad109bb8514ba884cf9 https://git.kernel.org/stable/c/b17a71435e7e153e949df018244a98b4ede04069 https://git.kernel.org/stable/c/b7b33627be0626b16ca321b982d6a2261ef7f703 https://git.kernel.org/stable/c/d2049af7ddbc361702c3e1f09bd6c5e9488454ca https://git.kernel.org/stable/c/f066171de33d71ff0f7c46bd17636a5a26db3fb6 jsc#CAR-3203 rh#2268295 |
CVE-2023-52606 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52606 SMASH Issue 396463 bnc#1221069 https://git.kernel.org/stable/c/0580f4403ad33f379eef865c2a6fe94de37febdf https://git.kernel.org/stable/c/28b8ba8eebf26f66d9f2df4ba550b6b3b136082c https://git.kernel.org/stable/c/42084a428a139f1a429f597d44621e3a18f3e414 https://git.kernel.org/stable/c/848e1d7fd710900397e1d0e7584680c1c04e3afd https://git.kernel.org/stable/c/8f9abaa6d7de0a70fc68acaedce290c1f96e2e59 https://git.kernel.org/stable/c/abd26515d4b767ba48241eea77b28ce0872aef3e https://git.kernel.org/stable/c/beee482cc4c9a6b1dcffb2e190b4fd8782258678 https://git.kernel.org/stable/c/de4f5ed63b8a199704d8cdcbf810309d7eb4b36b https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html jsc#CAR-3218 rh#2268293 |
CVE-2023-52608 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52608 SMASH Issue 397442 bnc#1221375 https://git.kernel.org/stable/c/12dc4217f16551d6dee9cbefc23fdb5659558cda https://git.kernel.org/stable/c/437a310b22244d4e0b78665c3042e5d1c0f45306 https://git.kernel.org/stable/c/614cc65032dcb0b64d23f5c5e338a8a04b12be5d https://git.kernel.org/stable/c/7f95f6997f4fdd17abec3200cae45420a5489350 https://git.kernel.org/stable/c/9b5e1b93c83ee5fc9f5d7bd2d45b421bd87774a2 rh#2269432 |
CVE-2023-52609 | kernel-source-rt:Not affected | moderate | () | CVE-2023-52609 SMASH Issue 398025 bnc#1221609 https://git.kernel.org/stable/c/252a2a5569eb9f8d16428872cc24dea1ac0bb097 https://git.kernel.org/stable/c/6696f76c32ff67fec26823fc2df46498e70d9bf3 https://git.kernel.org/stable/c/67f16bf2cc1698fd50e01ee8a2becc5a8e6d3a3e https://git.kernel.org/stable/c/77d210e8db4d61d43b2d16df66b1ec46fad2ee01 https://git.kernel.org/stable/c/7e7a0d86542b0ea903006d3f42f33c4f7ead6918 https://git.kernel.org/stable/c/95b1d336b0642198b56836b89908d07b9a0c9608 https://git.kernel.org/stable/c/98fee5bee97ad47b527a997d5786410430d1f0e9 https://git.kernel.org/stable/c/9a9ab0d963621d9d12199df9817e66982582d5a5 rh#2270082 |
CVE-2023-52611 | kernel-source-rt:Not affected | moderate | () | CVE-2023-52611 SMASH Issue 398027 bnc#1221611 https://git.kernel.org/stable/c/00384f565a91c08c4bedae167f749b093d10e3fe https://git.kernel.org/stable/c/0e9ffff72a0674cd6656314dbd99cdd2123a3030 https://git.kernel.org/stable/c/5b5ddf21b978ec315cab9d9e7e6ac7374791a8c7 rh#2270077 |
CVE-2023-52613 | kernel-source-rt:Not affected | moderate | () | CVE-2023-52613 SMASH Issue 398029 bnc#1221619 https://git.kernel.org/stable/c/15ef92e9c41124ee9d88b01208364f3fe1f45f84 https://git.kernel.org/stable/c/6010a9fc14eb1feab5cafd84422001134fe8ec58 https://git.kernel.org/stable/c/70481755ed77400e783200e2d022e5fea16060ce rh#2270073 |
CVE-2023-52616 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52616 SMASH Issue 398032 bnc#1221612 https://git.kernel.org/stable/c/0c3687822259a7628c85cd21a3445cbe3c367165 https://git.kernel.org/stable/c/2bb86817b33c9d704e127f92b838035a72c315b6 https://git.kernel.org/stable/c/7abdfd45a650c714d5ebab564bb1b988f14d9b49 https://git.kernel.org/stable/c/7ebf812b7019fd2d4d5a7ca45ef4bf3a6f4bda0a https://git.kernel.org/stable/c/ba3c5574203034781ac4231acf117da917efcd2a https://git.kernel.org/stable/c/bb44477d4506e52785693a39f03cdc6a2c5e8598 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2270091 |
CVE-2023-52617 | kernel-source-rt:Unsupported | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52617 SMASH Issue 398033 bnc#1221613 https://git.kernel.org/stable/c/0233b836312e39a3c763fb53512b3fa455b473b3 https://git.kernel.org/stable/c/1d83c85922647758c1f1e4806a4c5c3cf591a20a https://git.kernel.org/stable/c/4a5d0528cf19dbf060313dffbe047bc11c90c24c https://git.kernel.org/stable/c/d8c293549946ee5078ed0ab77793cec365559355 https://git.kernel.org/stable/c/df25461119d987b8c81d232cfe4411e91dcabe66 https://git.kernel.org/stable/c/e129c7fa7070fbce57feb0bfc5eaa65eef44b693 https://git.kernel.org/stable/c/ff1c7e2fb9e9c3f53715fbe04d3ac47b80be7eb8 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html jsc#CAR-3242 rh#2270088 |
CVE-2023-52618 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N) | CVE-2023-52618 SMASH Issue 398034 bnc#1221615 https://git.kernel.org/stable/c/5b9ea86e662035a886ccb5c76d56793cba618827 https://git.kernel.org/stable/c/95bc866c11974d3e4a9d922275ea8127ff809cf7 https://git.kernel.org/stable/c/9e4bf6a08d1e127bcc4bd72557f2dfafc6bc7f41 https://git.kernel.org/stable/c/a2c6206f18104fba7f887bf4dbbfe4c41adc4339 https://git.kernel.org/stable/c/af7bbdac89739e2e7380387fda598848d3b7010f https://git.kernel.org/stable/c/f6abd5e17da33eba15df2bddc93413e76c2b55f7 rh#2270086 |
CVE-2023-52621 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52621 SMASH Issue 399006 bnc#1222073 https://git.kernel.org/stable/c/169410eba271afc9f0fb476d996795aa26770c6d https://git.kernel.org/stable/c/483cb92334cd7f1d5387dccc0ab5d595d27a669d https://git.kernel.org/stable/c/c7f1b6146f4a46d727c0d046284c28b6882c6304 https://git.kernel.org/stable/c/d6d6fe4bb105595118f12abeed4a7bdd450853f3 rh#2271690 |
CVE-2023-52624 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52624 SMASH Issue 399008 bnc#1222083 https://git.kernel.org/stable/c/2ef98c6d753a744e333b7e34b9cf687040fba57d https://git.kernel.org/stable/c/e5ffd1263dd5b44929c676171802e7b6af483f21 rh#2271684 |
CVE-2023-52625 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52625 SMASH Issue 399009 bnc#1222085 https://git.kernel.org/stable/c/820c3870c491946a78950cdf961bf40e28c1025f https://git.kernel.org/stable/c/8e57c06bf4b0f51a4d6958e15e1a99c9520d00fa rh#2271682 |
CVE-2023-52626 | kernel-source-rt:Not affected | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H) | CVE-2023-52626 SMASH Issue 399003 bnc#1222054 https://git.kernel.org/stable/c/33cdeae8c6fb58cc445f859b67c014dc9f60b4e0 https://git.kernel.org/stable/c/3876638b2c7ebb2c9d181de1191db0de8cac143a https://git.kernel.org/stable/c/40e0d0746390c5b0c31144f4f1688d72f3f8d790 rh#2271680 |
CVE-2023-52627 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52627 SMASH Issue 399010 bnc#1222051 https://git.kernel.org/stable/c/020e71c7ffc25dfe29ed9be6c2d39af7bd7f661f https://git.kernel.org/stable/c/137568aa540a9f587c48ff7d4c51cdba08cfe9a4 https://git.kernel.org/stable/c/1eba6f7ffa295a0eec098c107043074be7cc4ec5 https://git.kernel.org/stable/c/49f322ce1f265935f15e5512da69a399f27a5091 https://git.kernel.org/stable/c/55aca2ce91a63740278502066beaddbd841af9c6 https://git.kernel.org/stable/c/89c4e63324e208a23098f7fb15c00487cecbfed2 rh#2271678 |
CVE-2023-52628 | kernel-source-rt:Already fixed | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-52628 L3:68040 SMASH Issue 399435 ZDI-24-297 ZDI-24-298 ZDI-24-299 bnc#1222117 bnc#1222118 https://git.kernel.org/stable/c/1ad7b189cc1411048434e8595ffcbe7873b71082 https://git.kernel.org/stable/c/28a97c43c9e32f437ebb8d6126f9bb7f3ca9521a https://git.kernel.org/stable/c/a7d86a77c33ba1c357a7504341172cc1507f0698 https://git.kernel.org/stable/c/c8f292322ff16b9a2272a67de396c09a50e09dce https://git.kernel.org/stable/c/d9ebfc0f21377690837ebbd119e679243e0099cc https://git.kernel.org/stable/c/fd94d9dadee58e09b49075240fe83423eb1dcd36 rh#2272041 |
CVE-2023-52629 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52629 SMASH Issue 399612 bnc#1222231 https://git.kernel.org/stable/c/246f80a0b17f8f582b2c0996db02998239057c65 https://git.kernel.org/stable/c/610dbd8ac271aa36080aac50b928d700ee3fe4de rh#2272204 |
CVE-2023-52630 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52630 SMASH Issue 399954 bnc#1222270 https://git.kernel.org/stable/c/1e4d3f8bd880e02932a9ea179f90bfa74fd2e899 https://git.kernel.org/stable/c/27b216130e64651e76ed583742a1b4e4d08a67c3 https://git.kernel.org/stable/c/2a427b49d02995ea4a6ff93a1432c40fa4d36821 https://git.kernel.org/stable/c/9f56f38331171c9a19754004f0664686d67ee48d https://git.kernel.org/stable/c/cd33b330cb21675189e747953845f5c3689e4912 https://git.kernel.org/stable/c/e5dc63f01e027721c29f82069f7e97e2149fa131 rh#2272771 |
CVE-2023-52631 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52631 SMASH Issue 399949 bnc#1222264 https://git.kernel.org/stable/c/686820fe141ea0220fc6fdfc7e5694f915cf64b2 https://git.kernel.org/stable/c/ae4acad41b0f93f1c26cc0fc9135bb79d8282d0b https://git.kernel.org/stable/c/b2dd7b953c25ffd5912dda17e980e7168bebcf6c https://git.kernel.org/stable/c/ec1bedd797588fe38fc11cba26d77bb1d9b194c6 https://git.kernel.org/stable/c/fb7bcd1722bc9bc55160378f5f99c01198fd14a7 rh#2272769 |
CVE-2023-52632 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52632 SMASH Issue 399955 bnc#1222274 https://git.kernel.org/stable/c/1556c242e64cdffe58736aa650b0b395854fe4d4 https://git.kernel.org/stable/c/2a9de42e8d3c82c6990d226198602be44f43f340 https://git.kernel.org/stable/c/752312f6a79440086ac0f9b08d7776870037323c https://git.kernel.org/stable/c/b602f098f716723fa5c6c96a486e0afba83b7b94 rh#2272804 |
CVE-2023-52633 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52633 SMASH Issue 399956 bnc#1222263 https://git.kernel.org/stable/c/0c7478a2da3f5fe106b4658338873d50c86ac7ab https://git.kernel.org/stable/c/4f7dad73df4cdb2b7042103d3922745d040ad025 https://git.kernel.org/stable/c/abe4eaa8618bb36c2b33e9cdde0499296a23448c https://git.kernel.org/stable/c/b427f55e9d4185f6f17cc1e3296eb8d0c4425283 https://git.kernel.org/stable/c/de3e9d8e8d1ae0a4d301109d1ec140796901306c rh#2272802 |
CVE-2023-52634 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52634 SMASH Issue 399957 bnc#1222278 https://git.kernel.org/stable/c/2ce156482a6fef349d2eba98e5070c412d3af662 https://git.kernel.org/stable/c/ce29728ef6485a367934cc100249c66dd3cde5b6 rh#2272806 |
CVE-2023-52636 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52636 SMASH Issue 399959 bnc#1222247 https://git.kernel.org/stable/c/8e46a2d068c92a905d01cbb018b00d66991585ab https://git.kernel.org/stable/c/bd9442e553ab8bf74b8be3b3c0a43bf4af4dc9b8 https://git.kernel.org/stable/c/da9c33a70f095d5d55c36d0bfeba969e31de08ae rh#2272820 |
CVE-2023-52637 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52637 SMASH Issue 400152 bnc#1222291 https://git.kernel.org/stable/c/08de58abedf6e69396e1207e4f99ef8904b2b532 https://git.kernel.org/stable/c/41ccb5bcbf03f02d820bc6ea8390811859f558f8 https://git.kernel.org/stable/c/4dd684d4bb3cd5454e0bf6e2a1bdfbd5c9c872ed https://git.kernel.org/stable/c/978e50ef8c38dc71bd14d1b0143d554ff5d188ba https://git.kernel.org/stable/c/efe7cf828039aedb297c1f9920b638fffee6aabc https://git.kernel.org/stable/c/f84e7534457dcd7835be743517c35378bb4e7c50 https://git.kernel.org/stable/c/fc74b9cb789cae061bbca7b203a3842e059f6b5d https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2273085 |
CVE-2023-52638 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52638 SMASH Issue 400153 bnc#1222299 https://git.kernel.org/stable/c/03358aba991668d3bb2c65b3c82aa32c36851170 https://git.kernel.org/stable/c/26dfe112ec2e95fe0099681f6aec33da13c2dd8e https://git.kernel.org/stable/c/559b6322f9480bff68cfa98d108991e945a4f284 https://git.kernel.org/stable/c/6cdedc18ba7b9dacc36466e27e3267d201948c8d https://git.kernel.org/stable/c/aedda066d717a0b4335d7e0a00b2e3a61e40afcf rh#2273082 |
CVE-2023-52639 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52639 SMASH Issue 400155 bnc#1222300 https://git.kernel.org/stable/c/28bb27824f25f36e5f80229a358d66ee09244082 https://git.kernel.org/stable/c/5df3b81a567eb565029563f26f374ae3803a1dfc https://git.kernel.org/stable/c/f5572c0323cf8b4f1f0618178648a25b8fb8a380 https://git.kernel.org/stable/c/fe752331d4b361d43cfd0b89534b4b2176057c32 rh#2273080 |
CVE-2023-52640 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52640 SMASH Issue 400205 bnc#1222301 https://git.kernel.org/stable/c/0830c5cf19bdec50d0ede4755ddc463663deb21c https://git.kernel.org/stable/c/52fff5799e3d1b5803ecd2f5f19c13c65f4f7b23 https://git.kernel.org/stable/c/6ed6cdbe88334ca3430c5aee7754dc4597498dfb https://git.kernel.org/stable/c/731ab1f9828800df871c5a7ab9ffe965317d3f15 https://git.kernel.org/stable/c/a585faf0591548fe0920641950ebfa8a6eefe1cd rh#2273089 |
CVE-2023-52641 | kernel-source-rt:Analysis | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52641 SMASH Issue 400206 bnc#1222303 https://git.kernel.org/stable/c/50545eb6cd5f7ff852a01fa29b7372524ef948cc https://git.kernel.org/stable/c/847b68f58c212f0439c5a8101b3841f32caffccd https://git.kernel.org/stable/c/947c3f3d31ea185ddc8e7f198873f17d36deb24c https://git.kernel.org/stable/c/aaab47f204aaf47838241d57bf8662c8840de60a https://git.kernel.org/stable/c/ee8db6475cb15c8122855f72ad4cfa5375af6a7b rh#2273087 |
CVE-2023-52643 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52643 SMASH Issue 402303 bnc#1222960 https://git.kernel.org/stable/c/1c6d19c8cbf6abcea2c8fca2db26abca2cbf0363 https://git.kernel.org/stable/c/359f220d0e753bba840eac19ffedcdc816b532f2 https://git.kernel.org/stable/c/3db312e06851996e7fb27cb5a8ccab4c0f9cdb93 https://git.kernel.org/stable/c/95a0d596bbd0552a78e13ced43f2be1038883c81 https://git.kernel.org/stable/c/b90126c86d83912688501826643ea698f0df1728 rh#2275624 |
CVE-2023-52645 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52645 SMASH Issue 402447 bnc#1223033 https://git.kernel.org/stable/c/339ddc983bc1622341d95f244c361cda3da3a4ff https://git.kernel.org/stable/c/3cd1d92ee1dbf3e8f988767eb75f26207397792b https://git.kernel.org/stable/c/475426ad1ae0bfdfd8f160ed9750903799392438 https://git.kernel.org/stable/c/c41336f4d69057cbf88fed47951379b384540df5 https://git.kernel.org/stable/c/f83b9abee9faa4868a6fac4669b86f4c215dae25 rh#2275771 |
CVE-2023-52647 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52647 SMASH Issue 403694 bnc#1223764 https://git.kernel.org/stable/c/91c8ce42fcde09f1da24acab9013b3e19cb88a4e https://git.kernel.org/stable/c/c4bd29bf5b7f67925bc1abd16069f22dadf5f061 https://git.kernel.org/stable/c/c95318607fbe8fdd44991a8dad2e44118e6b8812 https://git.kernel.org/stable/c/eb2f932100288dbb881eadfed02e1459c6b9504c rh#2278541 |
CVE-2023-52648 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52648 SMASH Issue 403695 bnc#1223765 https://git.kernel.org/stable/c/0a23f95af7f28dae7c0f7c82578ca5e1a239d461 https://git.kernel.org/stable/c/105f72cc48c4c93f4578fcc61e06276471858e92 https://git.kernel.org/stable/c/27571c64f1855881753e6f33c3186573afbab7ba https://git.kernel.org/stable/c/75baad63c033b3b900d822bffbc96c9d3649bc75 rh#2278539 |
CVE-2023-52649 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52649 SMASH Issue 403806 bnc#1223768 https://git.kernel.org/stable/c/046c1184ce60b0a37d48134f17ddbc1f32ce02bd https://git.kernel.org/stable/c/2fee84030d12d9fddfa874e4562d71761a129277 https://git.kernel.org/stable/c/92800aaeff51b8358d1e0a7eb74daf8aa2d7ce9d https://git.kernel.org/stable/c/9556c167673057d48ce4a0da675026fe046654c1 rh#2278524 |
CVE-2023-52654 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52654 SMASH Issue 404881 bnc#1224099 https://git.kernel.org/stable/c/18824f592aad4124d79751bbc1500ea86ac3ff29 https://git.kernel.org/stable/c/3fe1ea5f921bf5b71cbfdc4469fb96c05936610e https://git.kernel.org/stable/c/5a33d385eb36991a91e3dddb189d8679e2aac2be https://git.kernel.org/stable/c/705318a99a138c29a512a72c3e0043b3cd7f55f4 https://git.kernel.org/stable/c/bcedd497b3b4a0be56f3adf7c7542720eced0792 https://git.kernel.org/stable/c/f2f57f51b53be153a522300454ddb3887722fb2c rh#2280458 |
CVE-2023-52655 | kernel-source-rt:Analysis | moderate | () | CVE-2023-52655 SMASH Issue 385277 SMASH Issue 404984 bnc#1217169 https://git.kernel.org/stable/c/2ebf775f0541ae0d474836fa0cf3220e502f8e3e https://git.kernel.org/stable/c/46412b2fb1f9cc895d6d4036bf24f640b5d86dab https://git.kernel.org/stable/c/82c386d73689a45d5ee8c1290827bce64056dddd https://git.kernel.org/stable/c/84f2e5b3e70f08fce3cb1ff73414631c5e490204 https://git.kernel.org/stable/c/ccab434e674ca95d483788b1895a70c21b7f016a https://git.kernel.org/stable/c/d69581c17608d81824dd497d9a54b6a5b6139975 rh#2280452 |
CVE-2023-52657 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52657 SMASH Issue 406324 bnc#1224722 https://git.kernel.org/stable/c/2e443ed55fe3ffb08327b331a9f45e9382413c94 https://git.kernel.org/stable/c/955558030954b9637b41c97b730f9b38c92ac488 https://git.kernel.org/stable/c/baac292852c0e347626fb5436916947188e5838f https://git.kernel.org/stable/c/c51468ac328d3922747be55507c117e47da813e6 rh#2281147 |
CVE-2023-52658 | kernel-source-rt:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52658 SMASH Issue 406339 bnc#1224719 https://git.kernel.org/stable/c/1bcdd66d33edb446903132456c948f0b764ef2f9 https://git.kernel.org/stable/c/3fba8eab2cfc7334e0f132d29dfd2552f2f2a579 https://git.kernel.org/stable/c/8deeefb24786ea7950b37bde4516b286c877db00 rh#2281149 |
CVE-2023-52659 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52659 SMASH Issue 406356 bnc#1224442 https://git.kernel.org/stable/c/325956b0173f11e98f90462be4829a8b8b0682ce https://git.kernel.org/stable/c/7e1471888a5e6e846e9b4d306e5327db2b58e64e https://git.kernel.org/stable/c/814305b5c23cb815ada68d43019f39050472b25f https://git.kernel.org/stable/c/8e5647a723c49d73b9f108a8bb38e8c29d3948ea rh#2281145 |
CVE-2023-52660 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52660 SMASH Issue 406357 bnc#1224443 https://git.kernel.org/stable/c/abd34206f396d3ae50cddbd5aa840b8cd7f68c63 https://git.kernel.org/stable/c/b39b4d207d4f236a74e20d291f6356f2231fd9ee https://git.kernel.org/stable/c/edcf92bc66d8361c51dff953a55210e5cfd95587 https://git.kernel.org/stable/c/ffb635bb398fc07cb38f8a7b4a82cbe5f412f08e jsc#CAR-3466 rh#2281143 |
CVE-2023-52661 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N) | CVE-2023-52661 SMASH Issue 406473 bnc#1224445 https://git.kernel.org/stable/c/2388c36e028fff7f8ffd515681a14c6c2c07fea7 https://git.kernel.org/stable/c/45c8034db47842b25a3ab6139d71e13b4e67b9b3 https://git.kernel.org/stable/c/5c8dc26e31b8b410ad1895e0d314def50c76eed0 https://git.kernel.org/stable/c/845322a9c06dd1dcf35b6c4e3af89684297c23cc https://git.kernel.org/stable/c/f3f407ccbe84a34de9be3195d22cdd5969f3fd9f https://git.kernel.org/stable/c/fa74e4f5d0821829545b9f7034a0e577c205c101 rh#2281362 |
CVE-2023-52662 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L) | CVE-2023-52662 SMASH Issue 406430 bnc#1224449 https://git.kernel.org/stable/c/03b1072616a8f7d6e8594f643b416a9467c83fbf https://git.kernel.org/stable/c/40624af6674745e174c754a20d7c53c250e65e7a https://git.kernel.org/stable/c/6fc6233f6db1579b69b54b44571f1a7fde8186e6 https://git.kernel.org/stable/c/83e0f220d1e992fa074157fcf14945bf170ffbc5 https://git.kernel.org/stable/c/89709105a6091948ffb6ec2427954cbfe45358ce https://git.kernel.org/stable/c/d1e546ab91c670e536a274a75481034ab7534876 rh#2281360 |
CVE-2023-52663 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52663 SMASH Issue 406420 bnc#1224630 https://git.kernel.org/stable/c/222be59e5eed1554119294edc743ee548c2371d0 https://git.kernel.org/stable/c/7296152e58858f928db448826eb7ba5ae611297b https://git.kernel.org/stable/c/88028c45d5871dfc449b2b0a27abf6428453a5ec https://git.kernel.org/stable/c/be4760799c6a7c01184467287f0de41e0dd255f8 rh#2281358 |
CVE-2023-52665 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52665 SMASH Issue 406450 bnc#1224599 https://git.kernel.org/stable/c/482b718a84f08b6fc84879c3e90cc57dba11c115 https://git.kernel.org/stable/c/d0f0780f03df54d08ced118d27834ee5008724e4 https://git.kernel.org/stable/c/f70557d48215b14a9284ac3a6ae7e4ee1d039f10 rh#2281354 |
CVE-2023-52666 | kernel-source-rt:Ignore | low | 0 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N) | CVE-2023-52666 SMASH Issue 406415 bnc#1224745 https://git.kernel.org/stable/c/5349fd419e4f685d609c85b781f2b70f0fb14848 https://git.kernel.org/stable/c/6fc0a265e1b932e5e97a038f99e29400a93baad0 https://git.kernel.org/stable/c/e61fc656ceeaec65f19a92f0ffbeb562b7941e8d https://git.kernel.org/stable/c/e9ec6665de8f706b4f4133b87b2bd02a159ec57b https://git.kernel.org/stable/c/ecfd93955994ecc2a1308f5ee4bd90c7fca9a8c6 rh#2281352 |
CVE-2023-52667 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52667 SMASH Issue 406446 bnc#1224603 https://git.kernel.org/stable/c/2897c981ee63e1be5e530b1042484626a10b26d8 https://git.kernel.org/stable/c/65a4ade8a6d205979292e88beeb6a626ddbd4779 https://git.kernel.org/stable/c/72a729868592752b5a294d27453da264106983b1 https://git.kernel.org/stable/c/aef855df7e1bbd5aa4484851561211500b22707e https://git.kernel.org/stable/c/b2fa86b2aceb4bc9ada51cea90f61546d7512cbe rh#2281350 |
CVE-2023-52668 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52668 SMASH Issue 406389 bnc#1224690 https://git.kernel.org/stable/c/1908e9d01e5395adff68d9d308a0fb15337e6272 https://git.kernel.org/stable/c/6f74989f5909cdec9b1274641f0fa306b15bb476 https://git.kernel.org/stable/c/b18f3b60b35a8c01c9a2a0f0d6424c6d73971dc3 rh#2281348 |
CVE-2023-52671 | kernel-source-rt:Not affected | moderate | 6.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H) | CVE-2023-52671 SMASH Issue 406461 bnc#1224729 https://git.kernel.org/stable/c/4b6b479b2da6badff099b2e3abf0248936eefbf5 https://git.kernel.org/stable/c/ae62f1dde66a6f0eee98defc4c7a346bd5acd239 https://git.kernel.org/stable/c/e7b2b108cdeab76a7e7324459e50b0c1214c0386 rh#2281342 |
CVE-2023-52672 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52672 SMASH Issue 406433 bnc#1224614 https://git.kernel.org/stable/c/162ae0e78bdabf84ef10c1293c4ed7865cb7d3c8 https://git.kernel.org/stable/c/3efbd114b91525bb095b8ae046382197d92126b9 https://git.kernel.org/stable/c/68e51bdb1194f11d3452525b99c98aff6f837b24 https://git.kernel.org/stable/c/6fb70694f8d1ac34e45246b0ac988f025e1e5b55 https://git.kernel.org/stable/c/b87a1229d8668fbc78ebd9ca0fc797a76001c60f https://git.kernel.org/stable/c/e95aada4cb93d42e25c30a0ef9eb2923d9711d4a rh#2281340 |
CVE-2023-52673 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52673 SMASH Issue 406439 bnc#1224741 https://git.kernel.org/stable/c/43235db21fc23559f50a62f8f273002eeb506f5a https://git.kernel.org/stable/c/efb91fea652a42fcc037d2a9ef4ecd1ffc5ff4b7 rh#2281338 |
CVE-2023-52676 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-52676 SMASH Issue 406477 bnc#1224730 bnc#1226336 https://git.kernel.org/stable/c/1d38a9ee81570c4bd61f557832dead4d6f816760 https://git.kernel.org/stable/c/ad140fc856f0b1d5e2215bcb6d0cc247a86805a2 https://git.kernel.org/stable/c/e5ad9ecb84405637df82732ee02ad741a5f782a6 rh#2281332 |
CVE-2023-52677 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52677 SMASH Issue 406388 bnc#1224693 https://git.kernel.org/stable/c/1d7a03052846f34d624d0ab41a879adf5e85c85f https://git.kernel.org/stable/c/420370f3ae3d3b883813fd3051a38805160b2b9f https://git.kernel.org/stable/c/890cfe5337e0aaf03ece1429db04d23c88da72e7 https://git.kernel.org/stable/c/8db56df4a954b774bdc68917046a685a9fa2e4bc https://git.kernel.org/stable/c/938f70d14618ec72e10d6fcf8a546134136d7c13 rh#2281330 |
CVE-2023-52678 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52678 SMASH Issue 406429 bnc#1224617 https://git.kernel.org/stable/c/4525525cb7161d08f95d0e47025323dd10214313 https://git.kernel.org/stable/c/499839eca34ad62d43025ec0b46b80e77065f6d8 https://git.kernel.org/stable/c/4ac4e023ed7ab1c7c67d2d12b7b6198fcd099e5c https://git.kernel.org/stable/c/5024cce888e11e5688f77df81db9e14828495d64 rh#2281328 |
CVE-2023-52681 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52681 SMASH Issue 406478 bnc#1224505 https://git.kernel.org/stable/c/48be1364dd387e375e1274b76af986cb8747be2c https://git.kernel.org/stable/c/547713d502f7b4b8efccd409cff84d731a23853b https://git.kernel.org/stable/c/92be3095c6ca1cdc46237839c6087555be9160e3 https://git.kernel.org/stable/c/ea6b597fcaca99562fa56a473bcbbbd79b40af03 rh#2281322 |
CVE-2023-52682 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52682 SMASH Issue 406466 bnc#1224734 https://git.kernel.org/stable/c/4535be48780431753505e74e1b1ad4836a189bc2 https://git.kernel.org/stable/c/55fdc1c24a1d6229fe0ecf31335fb9a2eceaaa00 https://git.kernel.org/stable/c/9bfd5ea71521d0e522ba581c6ccc5db93759c0c3 https://git.kernel.org/stable/c/f904c156d8011d8291ffd5b6b398f3747e294986 rh#2281319 |
CVE-2023-52684 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52684 SMASH Issue 406390 bnc#1224689 https://git.kernel.org/stable/c/6c57d7b593c4a4e60db65d5ce0fe1d9f79ccbe9b https://git.kernel.org/stable/c/85fdbf6840455be64eac16bdfe0df3368ee3d0f0 rh#2281315 |
CVE-2023-52685 | kernel-source-rt:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52685 SMASH Issue 406465 bnc#1224728 https://git.kernel.org/stable/c/3b333cded94fbe5ce30d699b316c4715151268ae https://git.kernel.org/stable/c/48dcfc42ce705b652c0619cb99846afc43029de9 https://git.kernel.org/stable/c/86222a8fc16ec517de8da2604d904c9df3a08e5d https://git.kernel.org/stable/c/8fb12524c86bdd542a54857d5d076b1b6778c78c https://git.kernel.org/stable/c/a34946ec3de88a16cc3a87fdab50aad06255a22b https://git.kernel.org/stable/c/acd413da3e1f37582207cd6078a41d57c9011918 https://git.kernel.org/stable/c/d1fe1aede684bd014714dacfdc75586a9ad38657 https://git.kernel.org/stable/c/f9b891a7e8fcf83901f8507241e23e7420103b61 rh#2281313 |
CVE-2023-52687 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52687 SMASH Issue 406480 bnc#1224501 https://git.kernel.org/stable/c/4c0ac81a172a69a7733290915276672787e904ec https://git.kernel.org/stable/c/8084b788c2fb1260f7d44c032d5124680b20d2b2 https://git.kernel.org/stable/c/87e02063d07708cac5bfe9fd3a6a242898758ac8 https://git.kernel.org/stable/c/fc0b785802b856566df3ac943e38a072557001c4 rh#2281309 |
CVE-2023-52688 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52688 SMASH Issue 406421 bnc#1224631 https://git.kernel.org/stable/c/898d8b3e1414cd900492ee6a0b582f8095ba4a1a https://git.kernel.org/stable/c/b4e593a7a22fa3c7d0550ef51c90b5c21f790aa8 rh#2281307 |
CVE-2023-52689 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52689 SMASH Issue 406395 bnc#1224684 https://git.kernel.org/stable/c/74e3de7cdcc31ce75ab42350ae0946eff62a2da2 https://git.kernel.org/stable/c/993f7b42fa066b055e3a19b7f76ad8157c0927a0 rh#2281305 |
CVE-2023-52690 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52690 SMASH Issue 406436 bnc#1224611 https://git.kernel.org/stable/c/1eefa93faf69188540b08b024794fa90b1d82e8b https://git.kernel.org/stable/c/2a82c4439b903639e0a1f21990cd399fb0a49c19 https://git.kernel.org/stable/c/9a260f2dd827bbc82cc60eb4f4d8c22707d80742 https://git.kernel.org/stable/c/a9c05cbb6644a2103c75b6906e9dafb9981ebd13 https://git.kernel.org/stable/c/dd8422ff271c22058560832fc3006324ded895a9 https://git.kernel.org/stable/c/ed8d023cfa97b559db58c0e1afdd2eec7a83d8f2 https://git.kernel.org/stable/c/f84c1446daa552e9699da8d1f8375eac0f65edc7 https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html rh#2281303 |
CVE-2023-52692 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52692 SMASH Issue 406413 bnc#1224628 https://git.kernel.org/stable/c/145c5aa51486171025ab47f35cff34bff8d0cea3 https://git.kernel.org/stable/c/51d5697e1c0380d482c3eab002bfc8d0be177e99 https://git.kernel.org/stable/c/996fde492ad9b9563ee483b363af40d7696a8467 https://git.kernel.org/stable/c/be96acd3eaa790d10a5b33e65267f52d02f6ad88 https://git.kernel.org/stable/c/ca459dfa7d4ed9098fcf13e410963be6ae9b6bf3 rh#2281298 |
CVE-2023-52694 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52694 SMASH Issue 406462 bnc#1224598 https://git.kernel.org/stable/c/08ccff6ece35f08e8107e975903c370d849089e5 https://git.kernel.org/stable/c/53926e2a39629702f7f809d614b3ca89c2478205 https://git.kernel.org/stable/c/81f1bd85960b7a089a91e679ff7cd2524390bbf1 https://git.kernel.org/stable/c/a8657406e12aa10412134622c58977ac657f16d2 https://git.kernel.org/stable/c/ce3e112e7ae854249d8755906acc5f27e1542114 https://git.kernel.org/stable/c/e00ec5901954d85b39b5f10f94e60ab9af463eb1 https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html rh#2281294 |
CVE-2023-52695 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52695 SMASH Issue 406479 bnc#1224506 https://git.kernel.org/stable/c/0fe85301b95077ac4fa4a91909d38b7341e81187 https://git.kernel.org/stable/c/dbf5d3d02987faa0eec3710dd687cd912362d7b5 rh#2281292 |
CVE-2023-52697 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52697 SMASH Issue 406460 bnc#1224596 https://git.kernel.org/stable/c/582231a8c4f73ac153493687ecc1bed853e9c9ef https://git.kernel.org/stable/c/a410d58117d6da4b7d41f3c91365f191d006bc3d https://git.kernel.org/stable/c/e38e252dbceeef7d2f848017132efd68e9ae1416 rh#2281288 |
CVE-2023-52701 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) | CVE-2023-52701 SMASH Issue 407126 bnc#1225021 https://git.kernel.org/stable/c/2558b8039d059342197610498c8749ad294adee5 https://git.kernel.org/stable/c/863a7de987f02a901bf215509276a7de0370e0f9 rh#2282608 |
CVE-2023-52702 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52702 SMASH Issue 407162 bnc#1224945 https://git.kernel.org/stable/c/1563e998a938f095548054ef09e277b562b79536 https://git.kernel.org/stable/c/2fa28f5c6fcbfc794340684f36d2581b4f2d20b5 https://git.kernel.org/stable/c/c0f65ee0a3329eb4b94beaef0268633696e2d0c6 https://git.kernel.org/stable/c/e336a9e08618203a456fb5367f1387b14554f55e rh#2282610 |
CVE-2023-52703 | kernel-source-rt:Unsupported | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) | CVE-2023-52703 SMASH Issue 407207 bnc#1225549 https://git.kernel.org/stable/c/02df3170c04a8356cd571ab9155a42f030190abc https://git.kernel.org/stable/c/1b5de7d44890b78519acbcc80d8d1f23ff2872e5 https://git.kernel.org/stable/c/338f826d3afead6e4df521f7972a4bef04a72efb https://git.kernel.org/stable/c/525bdcb0838d19d918c7786151ee14661967a030 https://git.kernel.org/stable/c/723ef7b66f37c0841f5a451ccbce47ee1641e081 https://git.kernel.org/stable/c/a753352622b4f3c0219e0e9c73114b2848ae6042 https://git.kernel.org/stable/c/c68f345b7c425b38656e1791a0486769a8797016 jsc#CAR-3710 rh#2282612 |
CVE-2023-52704 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52704 SMASH Issue 407216 bnc#1225226 https://git.kernel.org/stable/c/7f9f6c54da876b3f0bece2b569456ceb96965ed7 https://git.kernel.org/stable/c/eedeb787ebb53de5c5dcf7b7b39d01bf1b0f037d rh#2282611 |
CVE-2023-52706 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52706 SMASH Issue 406991 bnc#1225473 https://git.kernel.org/stable/c/79eeab1d85e0fee4c0bc36f3b6ddf3920f39f74b https://git.kernel.org/stable/c/854e1ecff266033d3149666d3c5b8b0e174b4210 rh#2282614 |
CVE-2023-52731 | kernel-source-rt:Not affected | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52731 SMASH Issue 407186 bnc#1224929 https://git.kernel.org/stable/c/3efc61d95259956db25347e2a9562c3e54546e20 https://git.kernel.org/stable/c/87b9802ca824fcee7915e717e9a60471af62e8e9 https://git.kernel.org/stable/c/f1d91f0e9d5a240a809698d7d9c5a538e7dcc149 rh#2282787 |
CVE-2023-52734 | kernel-source-rt:Ignore | low | 0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N) | CVE-2023-52734 SMASH Issue 407187 bnc#1225234 https://git.kernel.org/stable/c/90fcf55d83b20da1091f926a291af05fb74f61c6 https://git.kernel.org/stable/c/99875ea9b5b47995bfb3c684d21eb17feb4b7e6a https://git.kernel.org/stable/c/de5ca4c3852f896cacac2bf259597aab5e17d9e3 https://git.kernel.org/stable/c/f6415c9c9a0b3881543d38528a58b54af4351522 https://git.kernel.org/stable/c/fbe71c5dacaa5a9960323215f118958174c81aa0 jsc#CAR-3670 rh#2282728 |
CVE-2023-52735 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52735 SMASH Issue 406898 bnc#1225475 https://git.kernel.org/stable/c/5b4a79ba65a1ab479903fff2e604865d229b70a9 https://git.kernel.org/stable/c/7499859881488da97589f3c79cc66fa75748ad49 https://git.kernel.org/stable/c/f312367f5246e04df564d341044286e9e37a97ba rh#2282618 |
CVE-2023-52737 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52737 SMASH Issue 407195 bnc#1225484 https://git.kernel.org/stable/c/519b7e13b5ae8dd38da1e52275705343be6bb508 https://git.kernel.org/stable/c/d8c594da79bc0244e610a70594e824a401802be1 |
CVE-2023-52738 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52738 SMASH Issue 407137 bnc#1225005 https://git.kernel.org/stable/c/2bcbbef9cace772f5b7128b11401c515982de34b https://git.kernel.org/stable/c/2e557c8ca2c585bdef591b8503ba83b85f5d0afd https://git.kernel.org/stable/c/5ad7bbf3dba5c4a684338df1f285080f2588b535 rh#2282684 |
CVE-2023-52739 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-52739 SMASH Issue 407080 bnc#1225118 bnc#1225119 https://git.kernel.org/stable/c/0a626e27f984dfbe96bd8e4fd08f20a2ede3ea23 https://git.kernel.org/stable/c/3af734f3eac6f70ef8e272a80da40544b9d0f2b5 https://git.kernel.org/stable/c/3b4c045a98f53a8890a94bb5846a390c8e39e673 https://git.kernel.org/stable/c/462a8e08e0e6287e5ce13187257edbf24213ed03 |
CVE-2023-52740 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52740 SMASH Issue 406911 bnc#1225471 https://git.kernel.org/stable/c/2ea31e2e62bbc4d11c411eeb36f1b02841dbcab1 https://git.kernel.org/stable/c/6f097c24815e67909a1fcc2c605586d02babd673 https://git.kernel.org/stable/c/86f7e423933608d536015a0f2eb9e0338c1227e0 rh#2282741 |
CVE-2023-52744 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52744 SMASH Issue 407078 bnc#1225121 https://git.kernel.org/stable/c/360682fe7df262d94fae54f737c487bec0f9190d https://git.kernel.org/stable/c/5d9745cead1f121974322b94ceadfb4d1e67960e https://git.kernel.org/stable/c/8f5fe1cd8e6a97f94840b55f59ed08cbc397086f rh#2282775 |
CVE-2023-52745 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52745 SMASH Issue 407116 bnc#1225032 https://git.kernel.org/stable/c/1b4ef90cbcfa603b3bb536fbd6f261197012b6f6 https://git.kernel.org/stable/c/4a779187db39b2f32d048a752573e56e4e77807f https://git.kernel.org/stable/c/7197460dcd43ff0e4a502ba855dd82d37c2848cc https://git.kernel.org/stable/c/b1afb666c32931667c15ad1b58e7203f0119dcaf https://git.kernel.org/stable/c/e632291a2dbce45a24cddeb5fe28fe71d724ba43 |
CVE-2023-52746 | kernel-source-rt:Not affected | low | 2.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N) | CVE-2023-52746 SMASH Issue 407086 bnc#1225114 https://git.kernel.org/stable/c/419674224390fca298020fc0751a20812f84b12d https://git.kernel.org/stable/c/5dc688fae6b7be9dbbf5304a3d2520d038e06db5 https://git.kernel.org/stable/c/a893cc644812728e86e9aff517fd5698812ecef0 https://git.kernel.org/stable/c/b6ee896385380aa621102e8ea402ba12db1cabff rh#2282702 |
CVE-2023-52748 | kernel-source-rt:Not affected | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H) | CVE-2023-52748 SMASH Issue 407099 bnc#1225093 https://git.kernel.org/stable/c/3eebe636cac53886bd5d1cdd55e082ec9e84983f https://git.kernel.org/stable/c/526dd7540a09ecf87b5f54f3ab4e0a2528f25a79 https://git.kernel.org/stable/c/6fca08fd3085253b48fcb1bd243a0a5e18821a00 https://git.kernel.org/stable/c/c041f5ddef00c731c541e00bc8ae97b8c84c682f https://git.kernel.org/stable/c/e0d4e8acb3789c5a8651061fbab62ca24a45c063 https://git.kernel.org/stable/c/e4088d7d8f1123006d46a42edf51b8c960a58ef9 |
CVE-2023-52750 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52750 SMASH Issue 406949 bnc#1225485 https://git.kernel.org/stable/c/146a15b873353f8ac28dc281c139ff611a3c4848 https://git.kernel.org/stable/c/69e619d2fd056fe1f5d0adf01584f2da669e0d28 https://git.kernel.org/stable/c/936c9c10efaefaf1ab3ef020e1f8aaaaff1ad2f9 https://git.kernel.org/stable/c/bd31e534721ab95ef237020fe6995c899ffdf21a https://git.kernel.org/stable/c/d08a1e75253b4e19ae290b1c35349f12cfcebc0a https://git.kernel.org/stable/c/ef0224ee5399ea8a46bc07dc6c6494961ed5fdd2 rh#2282617 |
CVE-2023-52751 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52751 SMASH Issue 407182 bnc#1225489 https://git.kernel.org/stable/c/5c86919455c1edec99ebd3338ad213b59271a71b https://git.kernel.org/stable/c/6db94d08359c43f2c8fe372811cdee04564a41b9 https://git.kernel.org/stable/c/93877b9afc2994c89362007aac480a7b150f386f |
CVE-2023-52755 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52755 SMASH Issue 407087 bnc#1225481 https://git.kernel.org/stable/c/09d9d8b40a3338193619c14ed4dc040f4f119e70 https://git.kernel.org/stable/c/712e01f32e577e7e48ab0adb5fe550646a3d93cb https://git.kernel.org/stable/c/8387c94d73ec66eb597c7a23a8d9eadf64bfbafa https://git.kernel.org/stable/c/aaf0a07d60887d6c36fc46a24de0083744f07819 https://git.kernel.org/stable/c/eebff19acaa35820cb09ce2ccb3d21bee2156ffb rh#2282663 |
CVE-2023-52756 | kernel-source-rt:Ignore | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N) | CVE-2023-52756 SMASH Issue 407168 bnc#1225461 https://git.kernel.org/stable/c/1fb3a9c59e7f7d2b1d737a0d6e02e31d5b516455 https://git.kernel.org/stable/c/45d0a298e05adee521f6fe605d6a88341ba07edd https://git.kernel.org/stable/c/a7ee519e8095d9c834086d0ff40da11415e1e4d7 https://git.kernel.org/stable/c/a98ff250b5af87f92f17bb9725cb21de1931ee57 https://git.kernel.org/stable/c/bce1f7c7e9812da57de1dda293cba87c693e9958 https://git.kernel.org/stable/c/c19a8794bf4fe45cff997f07a75ea84cc9e5d89c https://git.kernel.org/stable/c/d27abbfd4888d79dd24baf50e774631046ac4732 https://git.kernel.org/stable/c/e52518b9cb9fc98fc043c8fb2b8cfc619ca8a88b https://git.kernel.org/stable/c/eca19db60f99925461f49c3fd743733881395728 |
CVE-2023-52758 | kernel-source-rt:Ignore | low | 0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N) | CVE-2023-52758 SMASH Issue 407085 bnc#1225270 https://git.kernel.org/stable/c/38ada2f304f6f2065dd59613ef236a26f4dd73cd https://git.kernel.org/stable/c/aff8be2cad74a22525cd89cdff0b72a5c9a4c0c6 https://git.kernel.org/stable/c/bef76b8544939518dafa3325bcd438b111136437 https://git.kernel.org/stable/c/cc9c54232f04aef3a5d7f64a0ece7df00f1aaa3d https://git.kernel.org/stable/c/fe4eb2157d8c45b127bd88b1376c38c27b741293 rh#2282746 |
CVE-2023-52759 | kernel-source-rt:Analysis | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52759 SMASH Issue 407129 bnc#1225560 https://git.kernel.org/stable/c/119565e566f91ff3588ffcd5812f0c8061586c6b https://git.kernel.org/stable/c/1c28dace66015b675a343b89b0c87abbfda05ff4 https://git.kernel.org/stable/c/212f112fe5e90e98eb8d48585682880dae139f4c https://git.kernel.org/stable/c/2a054b87a1b799b391e578597a42ee6e57a987ae https://git.kernel.org/stable/c/2bb42a27a92ff3984c9fa5fbe128eced3ea693f2 https://git.kernel.org/stable/c/4c6a08125f2249531ec01783a5f4317d7342add5 https://git.kernel.org/stable/c/53fc16c1ad84f5467ec24341670b63aa759335d3 https://git.kernel.org/stable/c/5bfda356e903633d16ae1bac1ee38364e12628a3 https://git.kernel.org/stable/c/b4deec69fe32b58dc5fb4ace52456ece85b75561 rh#2282666 |
CVE-2023-52760 | kernel-source-rt:Not affected | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-52760 SMASH Issue 407143 bnc#1225562 https://git.kernel.org/stable/c/08a28272faa750d4357ea2cb48d2baefd778ea81 https://git.kernel.org/stable/c/bdcb8aa434c6d36b5c215d02a9ef07551be25a37 |
CVE-2023-52761 | kernel-source-rt:Not affected | low | () | CVE-2023-52761 SMASH Issue 407213 bnc#1225459 https://git.kernel.org/stable/c/1493baaf09e3c1899959c8a107cd1207e16d1788 https://git.kernel.org/stable/c/be97d0db5f44c0674480cb79ac6f5b0529b84c76 https://git.kernel.org/stable/c/eff53aea3855f71992c043cebb1c00988c17ee20 rh#2282739 |
CVE-2023-52763 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52763 SMASH Issue 407206 bnc#1225570 https://git.kernel.org/stable/c/39c71357e68e2f03766f9321b9f4882e49ff1442 https://git.kernel.org/stable/c/3cb79a365e7cce8f121bba91312e2ddd206b9781 https://git.kernel.org/stable/c/b53e9758a31c683fc8615df930262192ed5f034b https://git.kernel.org/stable/c/e64d23dc65810be4e3395d72df0c398f60c991f9 https://git.kernel.org/stable/c/eed74230435c61eeb58abaa275b1820e6a4b7f02 |
CVE-2023-52765 | kernel-source-rt:Not affected | low | () | CVE-2023-52765 SMASH Issue 407120 bnc#1225029 https://git.kernel.org/stable/c/4ce77b023d42a9f1062eecf438df1af4b4072eb2 https://git.kernel.org/stable/c/7b439aaa62fee474a0d84d67a25f4984467e7b95 https://git.kernel.org/stable/c/affae18838db5e6b463ee30c821385695af56dc2 https://git.kernel.org/stable/c/db98de0809f12b0edb9cd1be78e1ec1bfeba8f40 |
CVE-2023-52766 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2023-52766 SMASH Issue 407167 https://git.kernel.org/stable/c/45a832f989e520095429589d5b01b0c65da9b574 https://git.kernel.org/stable/c/4c86cb2321bd9c72d3b945ce7f747961beda8e65 https://git.kernel.org/stable/c/7c2b91b30d74d7c407118ad72502d4ca28af1af6 https://git.kernel.org/stable/c/8be39f66915b40d26ea2c18ba84b5c3d5da6809b https://git.kernel.org/stable/c/d23ad76f240c0f597b7a9eb79905d246f27d40df |
CVE-2023-52767 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52767 SMASH Issue 407147 bnc#1224998 https://git.kernel.org/stable/c/2214e2bb5489145aba944874d0ee1652a0a63dc8 https://git.kernel.org/stable/c/53f2cb491b500897a619ff6abd72f565933760f0 https://git.kernel.org/stable/c/944900fe2736c07288efe2d9394db4d3ca23f2c9 |
CVE-2023-52768 | kernel-source-rt:Not affected | moderate | 5.6 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H) | CVE-2023-52768 SMASH Issue 407138 bnc#1225004 https://git.kernel.org/stable/c/05ac1a198a63ad66bf5ae8b7321407c102d40ef3 https://git.kernel.org/stable/c/3ce1c2c3999b232258f7aabab311d47dda75605c https://git.kernel.org/stable/c/4b0d6ddb6466d10df878a7787f175a0e4adc3e27 https://git.kernel.org/stable/c/541b3757fd443a68ed8d25968eae511a8275e7c8 https://git.kernel.org/stable/c/6aaf7cd8bdfe245d3c9a8b48fe70c2011965948e |
CVE-2023-52769 | kernel-source-rt:Not affected | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-52769 SMASH Issue 407141 bnc#1225001 https://git.kernel.org/stable/c/6afc57ea315e0f660b1f870a681737bb7b71faef https://git.kernel.org/stable/c/afd3425bd69610f318403084fe491e24a1357fb9 https://git.kernel.org/stable/c/d908ca431e20b0e4bfc5d911d1744910ed779bdb |
CVE-2023-52770 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52770 SMASH Issue 407112 bnc#1225033 https://git.kernel.org/stable/c/9de787139b0258a5dd1f498780c26d76b61d2958 https://git.kernel.org/stable/c/d83309e7e006cee8afca83523559017c824fbf7a https://git.kernel.org/stable/c/f803982190f0265fd36cf84670aa6daefc2b0768 rh#2282700 |
CVE-2023-52771 | kernel-source-rt:Not affected | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52771 SMASH Issue 407133 bnc#1225007 https://git.kernel.org/stable/c/37179fcc916bce8c3cc7b36d67ef814cce55142b https://git.kernel.org/stable/c/6b2e428e673b3f55965674a426c40922e91388aa https://git.kernel.org/stable/c/8d2ad999ca3c64cb08cf6a58d227b9d9e746d708 rh#2282720 |
CVE-2023-52772 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-52772 SMASH Issue 407150 bnc#1224989 bnc#1224991 https://git.kernel.org/stable/c/069a3ec329ff43e7869a3d94c62cd03203016bce https://git.kernel.org/stable/c/4b7b492615cf3017190f55444f7016812b66611d https://git.kernel.org/stable/c/75bcfc188abf4fae9c1d5f5dc0a03540be602eef https://git.kernel.org/stable/c/d179189eec426fe4801e4b91efa1889faed12700 https://git.kernel.org/stable/c/eae0b295ce16d8c8b4114c3037993191b4bb92f0 rh#2282771 |
CVE-2023-52773 | kernel-source-rt:Not affected | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52773 SMASH Issue 407110 bnc#1225041 https://git.kernel.org/stable/c/1d07b7e84276777dad3c8cfebdf8e739606f90c9 https://git.kernel.org/stable/c/5b14cf37b9f01de0b28c6f8960019d4c7883ce42 https://git.kernel.org/stable/c/b71f4ade1b8900d30c661d6c27f87c35214c398c https://git.kernel.org/stable/c/fb5c134ca589fe670430acc9e7ebf2691ca2476d rh#2282671 |
CVE-2023-52775 | kernel-source-rt:Not affected | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N) | CVE-2023-52775 SMASH Issue 406890 bnc#1225088 https://git.kernel.org/stable/c/5ada292b5c504720a0acef8cae9acc62a694d19c https://git.kernel.org/stable/c/7234d2b5dffa5af77fd4e0deaebab509e130c6b1 https://git.kernel.org/stable/c/90072af9efe8c7bd7d086709014ddd44cebd5e7c https://git.kernel.org/stable/c/94a0ae698b4d5d5bb598e23228002a1491c50add https://git.kernel.org/stable/c/e6d71b437abc2f249e3b6a1ae1a7228e09c6e563 rh#2282690 |
CVE-2023-52776 | kernel-source-rt:Not affected | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N) | CVE-2023-52776 SMASH Issue 407203 bnc#1225090 https://git.kernel.org/stable/c/69bd216e049349886405b1c87a55dce3d35d1ba7 https://git.kernel.org/stable/c/774de37c147fea81f2c2e4be5082304f4f71d535 https://git.kernel.org/stable/c/d7a5f7f76568e48869916d769e28b9f3ca70c78e rh#2282776 |
CVE-2023-52777 | kernel-source-rt:Not affected | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-52777 SMASH Issue 407149 bnc#1224992 https://git.kernel.org/stable/c/0cf7577b6b3153b4b49deea9719fe43f96469c6d https://git.kernel.org/stable/c/1dea3c0720a146bd7193969f2847ccfed5be2221 https://git.kernel.org/stable/c/cf9c7d783a2bf9305df4ef5b93d9063a52e18fca https://git.kernel.org/stable/c/e83246ecd3b193f8d91fce778e8a5ba747fc7d8a rh#2282642 |
CVE-2023-52778 | kernel-source-rt:Not affected | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H) | CVE-2023-52778 SMASH Issue 407158 bnc#1224948 https://git.kernel.org/stable/c/342b528c0e849bed9def76dadaa470d3af678e94 https://git.kernel.org/stable/c/57ced2eb77343a91d28f4a73675b05fe7b555def https://git.kernel.org/stable/c/70ff9b65a72885b3a2dfde6709da1f19b85fa696 https://git.kernel.org/stable/c/9fce92f050f448a0d1ddd9083ef967d9930f1e52 rh#2282716 |
CVE-2023-52779 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52779 SMASH Issue 407122 bnc#1225027 https://git.kernel.org/stable/c/3fb0fa08641903304b9d81d52a379ff031dc41d4 https://git.kernel.org/stable/c/8a924db2d7b5eb69ba08b1a0af46e9f1359a9bdf rh#2282724 |
CVE-2023-52780 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52780 SMASH Issue 407178 bnc#1224933 https://git.kernel.org/stable/c/00768b3e90e648227eaa959d9d279f5e32823df1 https://git.kernel.org/stable/c/230dc06e2495487d88b3410da055bb618febb19b https://git.kernel.org/stable/c/2b0e99072654edd601d05c0061a20337af5008ba https://git.kernel.org/stable/c/ca8add922f9c7f6e2e3c71039da8e0dcc64b87ed rh#2282675 |
CVE-2023-52781 | kernel-source-rt:Ignore | moderate | 4.3 (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2023-52781 SMASH Issue 407194 bnc#1225092 https://git.kernel.org/stable/c/64c27b7b2357ddb38b6afebaf46d5bff4d250702 https://git.kernel.org/stable/c/7c0244cc311a4038505b73682b7c8ceaa5c7a8c8 https://git.kernel.org/stable/c/974bba5c118f4c2baf00de0356e3e4f7928b4cbc https://git.kernel.org/stable/c/9ef94ec8e52eaf7b9abc5b5f8f5b911751112223 https://git.kernel.org/stable/c/f89fef7710b2ba0f7a1e46594e530dcf2f77be91 jsc#CAR-3592 rh#2282698 |
CVE-2023-52782 | kernel-source-rt:Not affected | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52782 SMASH Issue 406984 bnc#1225103 https://git.kernel.org/stable/c/4d510506b46504664eacf8a44a9e8f3e54c137b8 https://git.kernel.org/stable/c/7e3f3ba97e6cc6fce5bf62df2ca06c8e59040167 https://git.kernel.org/stable/c/a9d6c0c5a6bd9ca88e964f8843ea41bc085de866 rh#2282705 |
CVE-2023-52783 | kernel-source-rt:Not affected | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52783 SMASH Issue 406858 bnc#1225104 https://git.kernel.org/stable/c/61a55071653974dab172d4c5d699bb365cfd13c9 https://git.kernel.org/stable/c/8ba2c459668cfe2aaacc5ebcd35b4b9ef8643013 rh#2282722 |
CVE-2023-52785 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52785 SMASH Issue 407156 bnc#1224950 https://git.kernel.org/stable/c/27900d7119c464b43cd9eac69c85884d17bae240 https://git.kernel.org/stable/c/8f15a7e3c054d960bbd1521110700450bbf798a1 https://git.kernel.org/stable/c/f84d461f33a6b27304d468d9cfb56c0cefdb4ee7 rh#2282651 |
CVE-2023-52786 | kernel-source-rt:Not affected | low | 3.6 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L) | CVE-2023-52786 SMASH Issue 407171 bnc#1224939 https://git.kernel.org/stable/c/7343c23ebcadbedc23a7063d1e24d976eccb0d0d https://git.kernel.org/stable/c/ce56d21355cd6f6937aca32f1f44ca749d1e4808 https://git.kernel.org/stable/c/e3b83d87c93eb6fc96a80b5e8527f7dc9f5a11bc rh#2282779 |
CVE-2023-52787 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52787 SMASH Issue 407199 bnc#1225105 https://git.kernel.org/stable/c/b0077e269f6c152e807fdac90b58caf012cdbaab https://git.kernel.org/stable/c/b5c8e0ff76d10f6bf70a7237678f27c20cf59bc9 https://git.kernel.org/stable/c/b80056bd75a16e4550873ecefe12bc8fd190b1cf https://git.kernel.org/stable/c/e9c309ded295b7f8849097d71ae231456ca79f78 rh#2282755 |
CVE-2023-52788 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52788 SMASH Issue 406969 bnc#1225106 https://git.kernel.org/stable/c/10f49cdfd5fb342a1a9641930dc040c570694e98 https://git.kernel.org/stable/c/1566e8be73fd5fa424e88d2a4cffdc34f970f0e1 https://git.kernel.org/stable/c/471aa951bf1206d3c10d0daa67005b8e4db4ff83 https://git.kernel.org/stable/c/55db76caa782baa4a1bf02296e2773c38a524a3e https://git.kernel.org/stable/c/bf8e105030083e7b71591cdf437e464bcd8a0c09 rh#2282652 |
CVE-2023-52789 | kernel-source-rt:Ignore | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52789 SMASH Issue 407095 bnc#1225180 https://git.kernel.org/stable/c/38cd56fc9de78bf3c878790785e8c231116ef9d3 https://git.kernel.org/stable/c/460284dfb10b207980c6f3f7046e33446ceb38ac https://git.kernel.org/stable/c/4a24a31826246b15477399febd13292b0c9f0ee9 https://git.kernel.org/stable/c/4ef41a7f33ffe1a335e7db7e1564ddc6afad47cc https://git.kernel.org/stable/c/6c80f48912b5bd4965352d1a9a989e21743a4a06 https://git.kernel.org/stable/c/7cebc86481bf16049e266f6774d90f2fd4f8d5d2 https://git.kernel.org/stable/c/8f8771757b130383732195497e47fba2aba76d3a https://git.kernel.org/stable/c/909963e0c16778cec28efb1affc21558825f4200 https://git.kernel.org/stable/c/d81ffb87aaa75f842cd7aa57091810353755b3e6 jsc#CAR-3625 rh#2282756 |
CVE-2023-52790 | kernel-source-rt:Not affected | moderate | () | CVE-2023-52790 SMASH Issue 407196 bnc#1225107 https://git.kernel.org/stable/c/53c87e846e335e3c18044c397cc35178163d7827 https://git.kernel.org/stable/c/ce7612496a4ba6068bc68aa1fa9d947dadb4ad9b rh#2282634 |
CVE-2023-52792 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52792 SMASH Issue 407024 bnc#1225477 https://git.kernel.org/stable/c/0718588c7aaa7a1510b4de972370535b61dddd0d https://git.kernel.org/stable/c/07ffcd8ec79cf7383e1e45815f4842fd357991c2 https://git.kernel.org/stable/c/9090c5537c93cd0811ab7bfbd925b57addfffb60 https://git.kernel.org/stable/c/90db4c1d5ebaf574d3c3065c055977982c378a83 rh#2282632 |
CVE-2023-52793 | kernel-source-rt:Ignore | low | 0 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N) | CVE-2023-52793 SMASH Issue 407166 bnc#1224943 https://git.kernel.org/stable/c/61576b7a0f28f924da06bead92a39a6d9aa2404a https://git.kernel.org/stable/c/9220c3ef6fefbf18f24aeedb1142a642b3de0596 https://git.kernel.org/stable/c/de4825a444560f8cb78b03dda3ba873fab88bc4f rh#2282769 |
CVE-2023-52794 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) | CVE-2023-52794 SMASH Issue 407121 bnc#1225028 https://git.kernel.org/stable/c/0a8585281b11e3a0723bba8d8085d61f0b55f37c https://git.kernel.org/stable/c/6a3866dbdcf39ac93e98708e6abced511733dc18 https://git.kernel.org/stable/c/fae633cfb729da2771b5433f6b84ae7e8b4aa5f7 rh#2282718 |
CVE-2023-52795 | kernel-source-rt:Not affected | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-52795 SMASH Issue 407103 bnc#1225085 https://git.kernel.org/stable/c/ae8ea4e200675a940c365b496ef8e3fb4123601c https://git.kernel.org/stable/c/bf04132cd64ccde4e9e9765d489c83fe83c09b7f https://git.kernel.org/stable/c/c0f8b8fb7df9d1a38652eb5aa817afccd3c56111 https://git.kernel.org/stable/c/e07754e0a1ea2d63fb29574253d1fd7405607343 rh#2282701 |
CVE-2023-52797 | kernel-source-rt:Not affected | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H) | CVE-2023-52797 SMASH Issue 407083 bnc#1225115 https://git.kernel.org/stable/c/2c86b24095fcf72cf51bc72d12e4350163b4e11d https://git.kernel.org/stable/c/45a0de41ec383c8b7c6d442734ba3852dd2fc4a7 https://git.kernel.org/stable/c/c6e316ac05532febb0c966fa9b55f5258ed037be rh#2282726 |
CVE-2023-52798 | kernel-source-rt:Not affected | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-52798 SMASH Issue 407159 bnc#1224947 https://git.kernel.org/stable/c/1fd878e1750190a612b5de2af357cca422ec0822 https://git.kernel.org/stable/c/21ebb0aba580d347e12f01ce5f6e75044427b3d5 https://git.kernel.org/stable/c/3b6c14833165f689cc5928574ebafe52bbce5f1e https://git.kernel.org/stable/c/426e718ce9ba60013364a54233feee309356cb82 https://git.kernel.org/stable/c/ca420ac4f9451f22347bae44b18ab47ba2c267ec https://git.kernel.org/stable/c/f882f51905517575c9f793a3dff567af90ef9a10 rh#2282648 |
CVE-2023-52800 | kernel-source-rt:Not affected | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-52800 SMASH Issue 407100 https://git.kernel.org/stable/c/03ed26935bebf6b6fd8a656490bf3dcc71b72679 https://git.kernel.org/stable/c/3a51e6b4da71fdfa43ec006d6abc020f3e22d14e https://git.kernel.org/stable/c/3f77c7d605b29df277d77e9ee75d96e7ad145d2d https://git.kernel.org/stable/c/423762f021825b5e57c3d6f01ff96a9ff19cdcd8 https://git.kernel.org/stable/c/69cede2a5a5f60e3f5602b901b52cb64edd2ea6c https://git.kernel.org/stable/c/e3199b3fac65c9f103055390b6fd07c5cffa5961 rh#2282764 |
CVE-2023-52801 | kernel-source-rt:Not affected | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52801 SMASH Issue 407135 bnc#1225006 https://git.kernel.org/stable/c/836db2e7e4565d8218923b3552304a1637e2f28d https://git.kernel.org/stable/c/e7250ab7ca4998fe026f2149805b03e09dc32498 https://git.kernel.org/stable/c/fcb32111f01ddf3cbd04644cde1773428e31de6a rh#2282709 |
CVE-2023-52802 | kernel-source-rt:Not affected | low | 0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N) | CVE-2023-52802 SMASH Issue 407114 bnc#1225474 https://git.kernel.org/stable/c/3a23b384e7e3d64d5587ad10729a34d4f761517e https://git.kernel.org/stable/c/5b82e4240533bcd4691e50b64ec86d0d7fbd21b9 https://git.kernel.org/stable/c/b028f89c56e964a22d3ddb8eab1a0e7e980841b9 https://git.kernel.org/stable/c/b80aaff5f7817d50798ac61ed75973f004dd5202 rh#2282620 |
CVE-2023-52803 | kernel-source-rt:Ignore | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-52803 SMASH Issue 407132 bnc#1225008 https://git.kernel.org/stable/c/194454afa6aa9d6ed74f0c57127bc8beb27c20df https://git.kernel.org/stable/c/1cdb52ffd6600a37bd355d8dce58ecd03e55e618 https://git.kernel.org/stable/c/7749fd2dbef72a52b5c9ffdbf877691950ed4680 https://git.kernel.org/stable/c/bfca5fb4e97c46503ddfc582335917b0cc228264 https://git.kernel.org/stable/c/cc2e7ebbeb1d0601f7f3c8d93b78fcc03a95e44a https://git.kernel.org/stable/c/dedf2a0eb9448ae73b270743e6ea9b108189df46 jsc#CAR-3576 rh#2282727 |
CVE-2023-52806 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52806 SMASH Issue 407125 bnc#1225554 https://git.kernel.org/stable/c/2527775616f3638f4fd54649eba8c7b84d5e4250 https://git.kernel.org/stable/c/25354bae4fc310c3928e8a42fda2d486f67745d7 https://git.kernel.org/stable/c/43b91df291c8802268ab3cfd8fccfdf135800ed4 https://git.kernel.org/stable/c/4a320da7f7cbdab2098b103c47f45d5061f42edd https://git.kernel.org/stable/c/631a96e9eb4228ff75fce7e72d133ca81194797e https://git.kernel.org/stable/c/758c7733cb821041f5fd403b7b97c0b95d319323 https://git.kernel.org/stable/c/7de25112de8222fd20564769e6c99dc9f9738a0b https://git.kernel.org/stable/c/f93dc90c2e8ed664985e366aa6459ac83cdab236 https://git.kernel.org/stable/c/fe7c1a0c2b25c82807cb46fc3aadbf2664a682b0 jsc#CAR-3714 rh#2282753 |
CVE-2023-52807 | kernel-source-rt:Not affected | moderate | 5.1 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H) | CVE-2023-52807 SMASH Issue 407094 bnc#1225097 https://git.kernel.org/stable/c/07f5b8c47152cadbd9102e053dcb60685820aa09 https://git.kernel.org/stable/c/53aba458f23846112c0d44239580ff59bc5c36c3 https://git.kernel.org/stable/c/be1f703f39efa27b7371b9a4cd983317f1366792 https://git.kernel.org/stable/c/f79d985c69060047426be68b7e4c1663d5d731b4 rh#2282711 |
CVE-2023-52808 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52808 SMASH Issue 407212 bnc#1225555 https://git.kernel.org/stable/c/33331b265aac9441ac0c1a5442e3f05d038240ec https://git.kernel.org/stable/c/6de426f9276c448e2db7238911c97fb157cb23be https://git.kernel.org/stable/c/75a2656260fe8c7eeabda6ff4600b29e183f48db https://git.kernel.org/stable/c/b4465009e7d60c6111946db4c8f1e50d401ed7be https://git.kernel.org/stable/c/f0bfc8a5561fb0b2c48183dcbfe00bdd6d973bd3 rh#2282665 |
CVE-2023-52812 | kernel-source-rt:Not affected | moderate | 5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) | CVE-2023-52812 SMASH Issue 407177 bnc#1225564 https://git.kernel.org/stable/c/09f617219fe9ccd8d7b65dc3e879b5889f663b5a https://git.kernel.org/stable/c/406e8845356d18bdf3d3a23b347faf67706472ec https://git.kernel.org/stable/c/5b4574b663d0a1a0a62d5232429b7db9ae6d0670 rh#2282782 |
CVE-2023-52814 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52814 SMASH Issue 407136 bnc#1225565 https://git.kernel.org/stable/c/80285ae1ec8717b597b20de38866c29d84d321a1 https://git.kernel.org/stable/c/9b70fc7d70e8ef7c4a65034c9487f58609e708a1 https://git.kernel.org/stable/c/b0702ee4d811708251cdf54d4a1d3e888d365111 https://git.kernel.org/stable/c/b93a25de28af153312f0fc979b0663fc4bd3442b https://git.kernel.org/stable/c/c11cf5e117f50f5a767054600885acd981449afe https://git.kernel.org/stable/c/da46e63482fdc5e35c008865c22ac64027f6f0c2 rh#2282655 |
CVE-2023-52815 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52815 SMASH Issue 407222 bnc#1225568 https://git.kernel.org/stable/c/33fb1a555354bd593f785935ddcb5d9dd4d3847f https://git.kernel.org/stable/c/70f831f21155c692bb336c434936fd6f24f3f81a https://git.kernel.org/stable/c/8c6c85a073768df68c1a3fea143d013a38c66d34 https://git.kernel.org/stable/c/cd90511557fdfb394bb4ac4c3b539b007383914c https://git.kernel.org/stable/c/eaa03ea366c85ae3cb69c8d4bbc67c8bc2167a27 rh#2282781 |
CVE-2023-52816 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52816 SMASH Issue 407144 bnc#1225529 https://git.kernel.org/stable/c/2806f880379232e789957c2078d612669eb7a69c https://git.kernel.org/stable/c/282c1d793076c2edac6c3db51b7e8ed2b41d60a5 https://git.kernel.org/stable/c/3f7a400d5e80f99581e3e8a9843e1f6118bf454f https://git.kernel.org/stable/c/56649c43d40ce0147465a2d5756d300e87f9ee1c https://git.kernel.org/stable/c/d33a35b13cbfec3238043f196fa87a6384f9d087 rh#2282734 |
CVE-2023-52820 | kernel-source-rt:Ignore | low | 0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N) | CVE-2023-52820 SMASH Issue 407225 bnc#1225269 https://git.kernel.org/stable/c/0f5f56745188b06f13509e5054231cb7a4cb047d https://git.kernel.org/stable/c/301e597e7b81efa307dd0969ff8f2af9d7b9064e https://git.kernel.org/stable/c/ea42bc330723644a0bd01d7124a601ab60b27747 https://git.kernel.org/stable/c/f37d63e219c39199a59b8b8a211412ff27192830 rh#2282688 |
CVE-2023-52822 | kernel-source-rt:Ignore | low | 0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N) | CVE-2023-52822 SMASH Issue 407128 bnc#1225035 https://git.kernel.org/stable/c/06ab64a0d836ac430c5f94669710a78aa43942cb https://git.kernel.org/stable/c/1eacb4c96e73225a2f6f276bade006abbe4d8341 https://git.kernel.org/stable/c/21e29f1437b7c36c76efa908589578eaf0f50900 https://git.kernel.org/stable/c/412ce89669341dfd8ed98a4746ad3dbe9653a7b8 https://git.kernel.org/stable/c/689b33b94f096e717cd8f140a8b5502e7e4fe759 jsc#CAR-3580 rh#2282626 |
CVE-2023-52823 | kernel-source-rt:Not affected | low | 0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N) | CVE-2023-52823 SMASH Issue 407102 bnc#1225039 https://git.kernel.org/stable/c/4fc857cc5cb9b7ce6940898857d773564973a584 https://git.kernel.org/stable/c/569c8d82f95eb5993c84fb61a649a9c4ddd208b3 https://git.kernel.org/stable/c/8332523b13dbfcce60f631dfb34ac90df021b4bd https://git.kernel.org/stable/c/b0ed017a2b9735753eb95798d9f60176480424ca https://git.kernel.org/stable/c/d4f2c09d4672f0e997ba4b1b589cc376be7ec938 rh#2282635 |
CVE-2023-52824 | kernel-source-rt:Ignore | low | 0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N) | CVE-2023-52824 SMASH Issue 406928 bnc#1225042 https://git.kernel.org/stable/c/0f403ebad98e6151aaa9c96c9aae5549aa4d87cd https://git.kernel.org/stable/c/22260dabcfe30ab70440d91aa1e4a703d13925c4 https://git.kernel.org/stable/c/6995df256e4f5841fb45cf40d04f94b62b8067e1 https://git.kernel.org/stable/c/c7acf02df1673a4ea7d6401ac4bc773ffe6a88f6 https://git.kernel.org/stable/c/ca0776571d3163bd03b3e8c9e3da936abfaecbf6 rh#2282694 |
CVE-2023-52825 | kernel-source-rt:Not affected | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-52825 SMASH Issue 407165 bnc#1225076 https://git.kernel.org/stable/c/50f35a907c4f9ed431fd3dbb8b871ef1cbb0718e https://git.kernel.org/stable/c/709c348261618da7ed89d6c303e2ceb9e453ba74 https://git.kernel.org/stable/c/7d43cdd22cd81a2b079e864c4321b9aba4c6af34 https://git.kernel.org/stable/c/c772eacbd6d0845fc922af8716bb9d29ae27b8cf https://git.kernel.org/stable/c/fc0210720127cc6302e6d6f3de48f49c3fcf5659 rh#2282658 |
CVE-2023-52827 | kernel-source-rt:Not affected | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) | CVE-2023-52827 SMASH Issue 407201 bnc#1225078 https://git.kernel.org/stable/c/1bc44a505a229bb1dd4957e11aa594edeea3690e https://git.kernel.org/stable/c/79527c21a3ce04cffc35ea54f74ee087e532be57 https://git.kernel.org/stable/c/c9e44111da221246efb2e623ae1be40a5cf6542c rh#2282777 |
CVE-2023-52828 | kernel-source-rt:Analysis | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52828 SMASH Issue 406978 bnc#1225079 https://git.kernel.org/stable/c/327b92e8cb527ae097961ffd1610c720481947f5 https://git.kernel.org/stable/c/6058e4829696412457729a00734969acc6fd1d18 https://git.kernel.org/stable/c/66d9111f3517f85ef2af0337ece02683ce0faf21 https://git.kernel.org/stable/c/821a7e4143af115b840ec199eb179537e18af922 https://git.kernel.org/stable/c/aa42a7cb92647786719fe9608685da345883878f https://git.kernel.org/stable/c/cf353904a82873e952633fcac4385c2fcd3a46e1 rh#2282668 |
CVE-2023-52829 | kernel-source-rt:Not affected | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) | CVE-2023-52829 SMASH Issue 407180 bnc#1225081 https://git.kernel.org/stable/c/4dd0547e8b45faf6f95373be5436b66cde326c0e https://git.kernel.org/stable/c/b302dce3d9edea5b93d1902a541684a967f3c63c https://git.kernel.org/stable/c/dfe13eaab043130f90dd3d57c7d88577c04adc97 rh#2282692 |
CVE-2023-52831 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52831 SMASH Issue 407210 bnc#1225533 https://git.kernel.org/stable/c/3073f6df783d9d75f7f69f73e16c7ef85d6cfb63 https://git.kernel.org/stable/c/335a47ed71e332c82339d1aec0c7f6caccfcda13 https://git.kernel.org/stable/c/3410b702354702b500bde10e3cc1f9db8731d908 https://git.kernel.org/stable/c/38685e2a0476127db766f81b1c06019ddc4c9ffa rh#2282740 |
CVE-2023-52836 | kernel-source-rt:Not affected | low | 0 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N) | CVE-2023-52836 SMASH Issue 407179 bnc#1225609 https://git.kernel.org/stable/c/304a2c4aad0fff887ce493e4197bf9cbaf394479 https://git.kernel.org/stable/c/9ed2d68b3925145f5f51c46559484881d6082f75 https://git.kernel.org/stable/c/bccdd808902f8c677317cec47c306e42b93b849e https://git.kernel.org/stable/c/c56df79d68677cf062da1b6e3b33e74299a92dfc https://git.kernel.org/stable/c/d4d37c9e6a4dbcca958dabd99216550525c7e389 https://git.kernel.org/stable/c/d8267cabbe1bed15ccf8b0e684c528bf8eeef715 https://git.kernel.org/stable/c/dcd85e3c929368076a7592b27f541e0da8b427f5 https://git.kernel.org/stable/c/e36407713163363e65566e7af0abe207d5f59a0c https://git.kernel.org/stable/c/e89d0ed45a419c485bae999426ecf92697cbdda3 jsc#CAR-3732 rh#2282695 |
CVE-2023-52837 | kernel-source-rt:Not affected | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-52837 SMASH Issue 407176 bnc#1224935 https://git.kernel.org/stable/c/327462725b0f759f093788dfbcb2f1fd132f956b https://git.kernel.org/stable/c/4e9b3ec84dc97909876641dad14e0a2300d6c2a3 https://git.kernel.org/stable/c/56bd7901b5e9dbc9112036ea615ebcba1565fafe https://git.kernel.org/stable/c/879947f4180bc6e83af64eb0515e0cf57fce15db rh#2282637 |
CVE-2023-52838 | kernel-source-rt:Not affected | low | 2.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2023-52838 SMASH Issue 407119 bnc#1225031 https://git.kernel.org/stable/c/18d26f9baca7d0d309303e3074a2252b8310884a https://git.kernel.org/stable/c/382e1931e0c9cd58a5a8519cdc6cd9dc4d82b485 https://git.kernel.org/stable/c/6c66d737b2726ac7784269ddf32a31634f8f269d https://git.kernel.org/stable/c/7bc7b82fb2191b0d50a80ee4e27030918767dd1d https://git.kernel.org/stable/c/8e4b510fe91782522b7ca0ca881b663b5d35e513 https://git.kernel.org/stable/c/a4dfebec32ec6d420a5506dd56a7834c91be28e4 https://git.kernel.org/stable/c/aba6ab57a910ad4b940c2024d15f2cdbf5b7f76b https://git.kernel.org/stable/c/b346a531159d08c564a312a9eaeea691704f3c00 rh#2282761 |
CVE-2023-52839 | kernel-source-rt:Not affected | low | 2.3 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L) | CVE-2023-52839 SMASH Issue 407091 bnc#1225100 https://git.kernel.org/stable/c/61e3d993c8bd3e80f8f1363ed5e04f88ab531b72 https://git.kernel.org/stable/c/85be1a73fd298ed3fd060dfce97caef5f9928c57 rh#2282751 |
CVE-2023-52841 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52841 SMASH Issue 407209 bnc#1225592 https://git.kernel.org/stable/c/1fd6eb12642e0c32692924ff359c07de4b781d78 https://git.kernel.org/stable/c/64863ba8e6b7651d994c6e6d506cc8aa2ac45edb https://git.kernel.org/stable/c/980be4c3b0d51c0f873fd750117774561c66cf68 https://git.kernel.org/stable/c/a254ee1ddc592ae1efcce96b8c014e1bd2d5a2b4 https://git.kernel.org/stable/c/aae7598aff291d4d140be1355aa20930af948785 https://git.kernel.org/stable/c/cb13001411999adb158b39e76d94705eb2da100d rh#2282708 |
CVE-2023-52842 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52842 SMASH Issue 407124 bnc#1225025 https://git.kernel.org/stable/c/0b8906fb48b99e993d6e8a12539f618f4854dd26 https://git.kernel.org/stable/c/34c4effacfc329aeca5635a69fd9e0f6c90b4101 https://git.kernel.org/stable/c/cd12535b97dd7d18cf655ec78ce1cf1f29a576be rh#2282696 |
CVE-2023-52844 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52844 SMASH Issue 406956 bnc#1225590 https://git.kernel.org/stable/c/3387490c89b10aeb4e71d78b65dbc9ba4b2385b9 https://git.kernel.org/stable/c/5c26aae3723965c291c65dd2ecad6a3240d422b0 https://git.kernel.org/stable/c/5cfcc8de7d733a1137b86954cc28ce99972311ad https://git.kernel.org/stable/c/76a2c5df6ca8bd8ada45e953b8c72b746f42918d https://git.kernel.org/stable/c/a51335704a3f90eaf23a6864faefca34b382490a https://git.kernel.org/stable/c/d17269fb9161995303985ab2fe6f16cfb72152f9 rh#2282725 |
CVE-2023-52845 | kernel-source-rt:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52845 SMASH Issue 407118 bnc#1225585 https://git.kernel.org/stable/c/19b3f72a41a8751e26bffc093bb7e1cef29ad579 https://git.kernel.org/stable/c/2199260c42e6fbc5af8adae3bf78e623407c91b0 https://git.kernel.org/stable/c/2426425d686b43adbc4f2f4a367b494f06f159d6 https://git.kernel.org/stable/c/3907b89cd17fcc23e9a80789c36856f00ece0ba8 https://git.kernel.org/stable/c/4c731e98fe4d678e87ba3e4d45d3cf0a5a193dc4 https://git.kernel.org/stable/c/560992f41c0cea44b7603bc9e6c73bffbf6b5709 https://git.kernel.org/stable/c/6744008c354bca2e4686a5b6056ee6b535d9f67d https://git.kernel.org/stable/c/abc1582119e8c4af14cedb0db6541fd603f45a04 https://git.kernel.org/stable/c/b33d130f07f1decd756b849ab03c23d11d4dd294 rh#2282759 |
CVE-2023-52846 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-52846 SMASH Issue 407093 bnc#1225098 bnc#1225099 https://git.kernel.org/stable/c/1787b9f0729d318d67cf7c5a95f0c3dba9a7cc18 https://git.kernel.org/stable/c/6086258bd5ea7b5c706ff62da42b8e271b2401db https://git.kernel.org/stable/c/876f8ab52363f649bcc74072157dfd7adfbabc0d https://git.kernel.org/stable/c/a1a485e45d24b1cd8fe834fd6f1b06e2903827da https://git.kernel.org/stable/c/d103fb6726904e353b4773188ee3d3acb4078363 https://git.kernel.org/stable/c/ddf4e04e946aaa6c458b8b6829617cc44af2bffd rh#2282765 |
CVE-2023-52847 | kernel-source-rt:Unsupported | moderate | 5.8 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H) | CVE-2023-52847 SMASH Issue 407052 bnc#1225588 https://git.kernel.org/stable/c/1871014d6ef4812ad11ef7d838d73ce09d632267 https://git.kernel.org/stable/c/20568d06f6069cb835e05eed432edf962645d226 https://git.kernel.org/stable/c/2f3d9198cdae1cb079ec8652f4defacd481eab2b https://git.kernel.org/stable/c/51c94256a83fe4e17406c66ff3e1ad7d242d8574 https://git.kernel.org/stable/c/847599fffa528b2cdec4e21b6bf7586dad982132 https://git.kernel.org/stable/c/b35fdade92c5058a5e727e233fe263b828de2c9a https://git.kernel.org/stable/c/bbc3b8dd2cb7817e703f112d988e4f4728f0f2a9 https://git.kernel.org/stable/c/bd5b50b329e850d467e7bcc07b2b6bde3752fbda rh#2282717 |
CVE-2023-52848 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52848 SMASH Issue 407198 bnc#1225385 https://git.kernel.org/stable/c/10b2a6c0dade67b5a2b2d17fb75c457ea1985fad https://git.kernel.org/stable/c/a4639380bbe66172df329f8b54aa7d2e943f0f64 https://git.kernel.org/stable/c/eb42e1862aa7934c2c21890097ce4993c5e0d192 rh#2282721 |
CVE-2023-52849 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52849 SMASH Issue 407157 bnc#1224949 https://git.kernel.org/stable/c/0ca074f7d788627a4e0b047ca5fbdb5fc567220c https://git.kernel.org/stable/c/20bd0198bebdd706bd4614b3933ef70d7c19618f https://git.kernel.org/stable/c/7c7371b41a14e86f53e7dbe5baa7b1d3e0ab324b https://git.kernel.org/stable/c/88d3917f82ed4215a2154432c26de1480a61b209 https://git.kernel.org/stable/c/cad22a757029c3a1985c221a2d4a6491ad4035ae rh#2282619 |
CVE-2023-52850 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52850 SMASH Issue 407130 bnc#1225014 https://git.kernel.org/stable/c/24c06295f28335ced3aad53dd4b0a0bae7b9b100 https://git.kernel.org/stable/c/64f55cebb4339ae771e9e7f3f42bee2489e2fa00 https://git.kernel.org/stable/c/66b4c5f980d741f3a47e4b65eeaf2797f2d59294 https://git.kernel.org/stable/c/88d4b23a629ebd34f682f770cb6c2116c851f7b8 rh#2282677 |
CVE-2023-52851 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52851 SMASH Issue 407208 bnc#1225587 https://git.kernel.org/stable/c/2ef422f063b74adcc4a4a9004b0a87bb55e0a836 https://git.kernel.org/stable/c/437f033e30c897bb3723eac9e9003cd9f88d00a3 https://git.kernel.org/stable/c/4f4a7a7d1404297f2a92df0046f7e64dc5c52dd9 https://git.kernel.org/stable/c/6387f269d84e6e149499408c4d1fc805017729b2 rh#2282667 |
CVE-2023-52852 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-52852 SMASH Issue 407081 bnc#1225116 bnc#1225117 https://git.kernel.org/stable/c/8c4504cc0c64862740a6acb301e0cfa59580dbc5 https://git.kernel.org/stable/c/932ddb5c29e884cc6fac20417ece72ba4a35c401 https://git.kernel.org/stable/c/9375ea7f269093d7c884857ae1f47633a91f429c https://git.kernel.org/stable/c/9d065aa52b6ee1b06f9c4eca881c9b4425a12ba2 https://git.kernel.org/stable/c/b0327c84e91a0f4f0abced8cb83ec86a7083f086 rh#2282747 |
CVE-2023-52854 | kernel-source-rt:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52854 SMASH Issue 407134 bnc#1225584 https://git.kernel.org/stable/c/0dd34a7ad395dbcf6ae60e48e9786050e25b9bc5 https://git.kernel.org/stable/c/1734a79e951914f1db2c65e635012a35db1c674b https://git.kernel.org/stable/c/1e901bcb8af19416b65f5063a4af7996e5a51d7f https://git.kernel.org/stable/c/41aad9d6953984d134fc50f631f24ef476875d4d https://git.kernel.org/stable/c/7ddc21e317b360c3444de3023bcc83b85fabae2f https://git.kernel.org/stable/c/c7c26d0ef5d20f00dbb2ae3befcabbe0efa77275 rh#2282644 |
CVE-2023-52855 | kernel-source-rt:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52855 SMASH Issue 407193 bnc#1225583 https://git.kernel.org/stable/c/14c9ec34e8118fbffd7f5431814d767726323e72 https://git.kernel.org/stable/c/3e851a77a13ce944d703721793f49ee82622986d https://git.kernel.org/stable/c/64c47749fc7507ed732e155c958253968c1d275e https://git.kernel.org/stable/c/6b21a22728852d020a6658d39cd7bb7e14b07790 https://git.kernel.org/stable/c/a7bee9598afb38004841a41dd8fe68c1faff4e90 https://git.kernel.org/stable/c/bdb3dd4096302d6b87441fdc528439f171b04be6 https://git.kernel.org/stable/c/ef307bc6ef04e8c1ea843231db58e3afaafa9fa6 https://git.kernel.org/stable/c/fcaafb574fc88a52dce817f039f7ff2f9da38001 https://git.kernel.org/stable/c/fed492aa6493a91a77ebd51da6fb939c98d94a0d rh#2282758 |
CVE-2023-52856 | kernel-source-rt:Not affected | moderate | 4.6 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52856 SMASH Issue 407181 bnc#1224932 https://git.kernel.org/stable/c/42071feab712ba2a139b8928f7e0f8d3a6fc719e https://git.kernel.org/stable/c/44283993144a03af9df31934d6c32bbd42d1a347 https://git.kernel.org/stable/c/7bf0cb8f40280a85034990dfe42be8ca8f80f37a https://git.kernel.org/stable/c/b65e3249f3ca96e3c736af889461d80d675feab6 https://git.kernel.org/stable/c/fcd9895e365474709844eeb31cfe53d912c3596e rh#2282672 |
CVE-2023-52857 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52857 SMASH Issue 407205 bnc#1225581 https://git.kernel.org/stable/c/0d8a1df39d3fc34560e2cc663b5c340d06a25396 https://git.kernel.org/stable/c/96312a251d4dcee5d36e32edba3002bfde0ddd9c https://git.kernel.org/stable/c/b0b0d811eac6b4c52cb9ad632fa6384cf48869e7 rh#2282625 |
CVE-2023-52858 | kernel-source-rt:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52858 SMASH Issue 407214 bnc#1225566 https://git.kernel.org/stable/c/1d89430fc3158f872d492f1b88d07262f48290c0 https://git.kernel.org/stable/c/2befa515c1bb6cdd33c262b909d93d1973a219aa https://git.kernel.org/stable/c/4f861b63945e076f9f003a5fad958174096df1ee https://git.kernel.org/stable/c/5fbea47eebff5daeca7d918c99289bcd3ae4dc8d https://git.kernel.org/stable/c/a836efc21ef04608333d6d05753e558ebd1f85d0 https://git.kernel.org/stable/c/e8ae4b49dd9cfde69d8de8c0c0cd7cf1b004482e https://git.kernel.org/stable/c/e964d21dc034b650d719c4ea39564bec72b42f94 rh#2282693 |
CVE-2023-52859 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52859 SMASH Issue 407145 bnc#1225582 https://git.kernel.org/stable/c/0e1e88bba286621b886218363de07b319d6208b2 https://git.kernel.org/stable/c/3405f364f82d4f5407a8b4c519dc15d24b847fda https://git.kernel.org/stable/c/75bab28ffd05ec8879c197890b1bd1dfec8d3f63 https://git.kernel.org/stable/c/b660420f449d094b1fabfa504889810b3a63cdd5 https://git.kernel.org/stable/c/b805cafc604bfdb671fae7347a57f51154afa735 rh#2282745 |
CVE-2023-52860 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52860 SMASH Issue 407175 bnc#1224936 https://git.kernel.org/stable/c/3f5827371763f2d9c70719c270055a81d030f3d0 https://git.kernel.org/stable/c/4589403a343bb0c72a6faf5898386ff964d4e01a https://git.kernel.org/stable/c/50b560783f7f71790bcf70e9e9855155fb0af8c1 https://git.kernel.org/stable/c/d04ff5437a45f275db5530efb49b68d0ec851f6f rh#2282697 |
CVE-2023-52861 | kernel-source-rt:Not affected | moderate | 4.3 (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52861 SMASH Issue 407170 bnc#1224941 https://git.kernel.org/stable/c/1374561a7cbc9a000b77bb0473bb2c19daf18d86 https://git.kernel.org/stable/c/1669d7b21a664aa531856ce85b01359a376baebc https://git.kernel.org/stable/c/2c80c4f0d2845645f41cbb7c9304c8efbdbd4331 https://git.kernel.org/stable/c/d0375f6858c4ff7244b62b02eb5e93428e1916cd rh#2282685 |
CVE-2023-52862 | kernel-source-rt:Not affected | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52862 SMASH Issue 407127 bnc#1225015 https://git.kernel.org/stable/c/0c3601a2fbfb265ce283651480e30c8e60459112 https://git.kernel.org/stable/c/8b72c5d4a5d25e76b16283397c40b8b3c0d70019 https://git.kernel.org/stable/c/97ef07182ac46b069bb5e7d46cb903a764d67898 rh#2282752 |
CVE-2023-52863 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52863 SMASH Issue 407204 bnc#1225586 https://git.kernel.org/stable/c/2a5b3370a1d9750eca325292e291c8c7cb8cf2e0 https://git.kernel.org/stable/c/33de53a2706066d526173dc743faf43d92c62105 https://git.kernel.org/stable/c/7d870088db4863c514a7f8751cd593751983029a https://git.kernel.org/stable/c/b3e7eb23a6e97642ff3190431c06475d9ca1e062 https://git.kernel.org/stable/c/c49f14cc1bb12c625a1c572e8a95b6adefd4d8eb https://git.kernel.org/stable/c/f62b8969847850ba7596cb145cc47c65ea57dae0 rh#2282629 |
CVE-2023-52865 | kernel-source-rt:Ignore | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52865 SMASH Issue 407101 bnc#1225086 https://git.kernel.org/stable/c/122ac6496e4975ddd7ec1edba4f6fc1e15e39478 https://git.kernel.org/stable/c/2705c5b97f504e831ae1935c05f0e44f80dfa6b3 https://git.kernel.org/stable/c/357df1c2f6ace96defd557fad709ed1f9f70e16c https://git.kernel.org/stable/c/3aefc6fcfbada57fac27f470602d5565e5b76cb4 https://git.kernel.org/stable/c/4c79cbfb8e9e2311be77182893fda5ea4068c836 https://git.kernel.org/stable/c/606f6366a35a3329545e38129804d65ef26ed7d2 https://git.kernel.org/stable/c/81b16286110728674dcf81137be0687c5055e7bf https://git.kernel.org/stable/c/be3f12f16038a558f08fa93cc32fa715746a5235 https://git.kernel.org/stable/c/c26feedbc561f2a3cee1a4f717e61bdbdfb4fa92 jsc#CAR-3591 rh#2282786 |
CVE-2023-52866 | kernel-source-rt:Not affected | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52866 SMASH Issue 407079 bnc#1225120 https://git.kernel.org/stable/c/64da1f6147dac7f8499d4937a0d7ea990bf569e8 https://git.kernel.org/stable/c/6c8f953728d75104d994893f58801c457274335a https://git.kernel.org/stable/c/91cfe0bbaa1c434d4271eb6e1d7aaa1fe8d121f6 rh#2282783 |
CVE-2023-52867 | kernel-source-rt:Ignore | moderate | 5.1 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H) | CVE-2023-52867 SMASH Issue 407131 bnc#1225009 https://git.kernel.org/stable/c/112d4b02d94bf9fa4f1d3376587878400dd74783 https://git.kernel.org/stable/c/19534a7a225f1bf2da70a9a90d41d0215f8f6b45 https://git.kernel.org/stable/c/341e79f8aec6af6b0061b8171d77b085835c6a58 https://git.kernel.org/stable/c/347f025a02b3a5d715a0b471fc3b1439c338ad94 https://git.kernel.org/stable/c/7b063c93bece827fde237fae1c101bceeee4e896 https://git.kernel.org/stable/c/caaa74541459c4c9e2c10046cf66ad2890483d0f https://git.kernel.org/stable/c/d9b4fa249deaae1145d6fc2b64dae718e5c7a855 https://git.kernel.org/stable/c/dd05484f99d16715a88eedfca363828ef9a4c2d4 https://git.kernel.org/stable/c/ddc42881f170f1f518496f5a70447501335fc783 jsc#CAR-3577 rh#2282670 |
CVE-2023-52869 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52869 SMASH Issue 407104 bnc#1225050 https://git.kernel.org/stable/c/1c426da79f9fc7b761021b5eb44185ba119cd44a https://git.kernel.org/stable/c/379b120e4f27fd1cf636a5f85570c4d240a3f688 https://git.kernel.org/stable/c/63f637309baadf81a095f2653e3b807d4b5814b9 https://git.kernel.org/stable/c/a19d48f7c5d57c0f0405a7d4334d1d38fe9d3c1c https://git.kernel.org/stable/c/ad5cb6deb41417ef41b9d6ff54f789212108606f https://git.kernel.org/stable/c/bb166bdae1a7d7db30e9be7e6ccaba606debc05f rh#2282622 |
CVE-2023-52870 | kernel-source-rt:Not affected | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52870 SMASH Issue 407173 bnc#1224937 https://git.kernel.org/stable/c/10cc81124407d862f0f747db4baa9c006510b480 https://git.kernel.org/stable/c/2617aa8ceaf30e41d3eb7f5fef3445542bef193a https://git.kernel.org/stable/c/533ca5153ad6c7b7d47ae0114b14d0333964b946 https://git.kernel.org/stable/c/b5ff3e89b4e7f46ad2aa0de7e08d18e6f87d71bc https://git.kernel.org/stable/c/b82681042724924ae3ba0f2f2eeec217fa31e830 https://git.kernel.org/stable/c/dd1f30d68fa98eb672c0a259297b761656a9025f rh#2282729 |
CVE-2023-52872 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52872 SMASH Issue 407211 bnc#1225591 https://git.kernel.org/stable/c/19d34b73234af542cc8a218cf398dee73cdb1890 https://git.kernel.org/stable/c/3a75b205de43365f80a33b98ec9289785da56243 https://git.kernel.org/stable/c/81a4dd5e6c78f5d8952fa8c9d36565db1fe01444 https://git.kernel.org/stable/c/ce4df90333c4fe65acb8b5089fdfe9b955ce976a https://git.kernel.org/stable/c/df6cfab66ff2a44bd23ad5dd5309cb3421bb6593 rh#2282733 |
CVE-2023-52873 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52873 SMASH Issue 407033 bnc#1225589 https://git.kernel.org/stable/c/1f57f78fbacf630430bf954e5a84caafdfea30c0 https://git.kernel.org/stable/c/3994387ba3564976731179c4d4a6d7850ddda71a https://git.kernel.org/stable/c/a90239551abc181687f8c0ba60b276f7d75c141e https://git.kernel.org/stable/c/ca6d565a2319d69d9766e6ecbb5af827fc4afb2b https://git.kernel.org/stable/c/df1c4a9efa3f5b6fb5e0ae63890230dbe2190b7e https://git.kernel.org/stable/c/f6a7c51cf07a399ec067d39f0a22f1817c5c7d2b https://git.kernel.org/stable/c/fbe466f06d4ea18745da0d57540539b7b36936ae rh#2282768 |
CVE-2023-52874 | kernel-source-rt:Not affected | low | 3.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N) | CVE-2023-52874 SMASH Issue 407106 bnc#1225049 https://git.kernel.org/stable/c/2191950d35d8f81620ea8d4e04d983f664fe3a8a https://git.kernel.org/stable/c/5d092b66119d774853cc9308522620299048a662 https://git.kernel.org/stable/c/de4c5bacca4f50233f1f791bec9eeb4dee1b14cd rh#2282630 |
CVE-2023-52875 | kernel-source-rt:Ignore | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52875 SMASH Issue 407097 bnc#1225096 https://git.kernel.org/stable/c/001e5def774fa1a8f2b29567c0b0cd3e3a859a96 https://git.kernel.org/stable/c/0d6e24b422a2166a9297a8286ff2e6ab9a5e8cd3 https://git.kernel.org/stable/c/1953e62366da5460dc712e045f94fb0d8918999d https://git.kernel.org/stable/c/1bf9c204aef4cc55ce46a7ff2d4dc7e5f86551a7 https://git.kernel.org/stable/c/2a18dd653284550900b02107c3c7b3ac5e0eb802 https://git.kernel.org/stable/c/6fccee2af400edaed9cf349d506c5971d4762739 https://git.kernel.org/stable/c/d1175cf4bd2b4c5f7c43f677ea1ce9ad2c18d055 https://git.kernel.org/stable/c/d1461f0c9ca0827c03730fe9652ebbf6316a2a95 https://git.kernel.org/stable/c/e61934720af4a58ffd43a63ffdd6f3a0bd7d7b47 jsc#CAR-3593 rh#2282723 |
CVE-2023-52877 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52877 SMASH Issue 407164 bnc#1224944 https://git.kernel.org/stable/c/4987daf86c152ff882d51572d154ad12e4ff3a4b https://git.kernel.org/stable/c/9ee038590d808a95d16adf92818dcd4752273c08 https://git.kernel.org/stable/c/b37a168c0137156042a0ca9626651b5a789e822b https://git.kernel.org/stable/c/e5f53a68a596e04df3fde3099273435a30b6fdac https://git.kernel.org/stable/c/e7a802447c491903aa7cb45967aa2a934a4e63fc rh#2282712 |
CVE-2023-52879 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52879 SMASH Issue 407090 bnc#1225101 https://git.kernel.org/stable/c/2c9de867ca285c397cd71af703763fe416265706 https://git.kernel.org/stable/c/2fa74d29fc1899c237d51bf9a6e132ea5c488976 https://git.kernel.org/stable/c/9034c87d61be8cff989017740a91701ac8195a1d https://git.kernel.org/stable/c/961c4511c7578d6b8f39118be919016ec3db1c1e https://git.kernel.org/stable/c/a98172e36e5f1b3d29ad71fade2d611cfcc2fe6f https://git.kernel.org/stable/c/bb32500fb9b78215e4ef6ee8b4345c5f5d7eafb4 https://git.kernel.org/stable/c/cbc7c29dff0fa18162f2a3889d82eeefd67305e0 rh#2282730 |
CVE-2023-52883 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52883 SMASH Issue 411595 bnc#1226630 https://git.kernel.org/stable/c/51b79f33817544e3b4df838d86e8e8e4388ff684 https://git.kernel.org/stable/c/fefac8c4686fd81fde6830c6dae32f9001d2ac28 rh#2293300 |
CVE-2023-52884 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-52884 SMASH Issue 411740 bnc#1226764 https://git.kernel.org/stable/c/7b4e0b39182cf5e677c1fc092a3ec40e621c25b6 https://git.kernel.org/stable/c/9400caf566f65c703e99d95f87b00c4b445627a7 https://git.kernel.org/stable/c/a4c638ab25786bd5aab5978fe51b2b9be16a4ebd https://git.kernel.org/stable/c/a5fc298fa8f67cf1f0e1fc126eab70578cd40adc https://git.kernel.org/stable/c/f99809fdeb50d65bcbc1661ef391af94eebb8a75 rh#2293685 |
CVE-2023-5345 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-5345 SMASH Issue 380594 bnc#1215899 bnc#1215971 http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e6e43b8aa7cd3c3af686caf0c2e11819a886d705 https://kernel.dance/e6e43b8aa7cd3c3af686caf0c2e11819a886d705 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GISYSL3F6WIEVGHJGLC2MFNTUXHPTKQH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GPMICQ2HVZO5UAM5KPXHAZKA2U3ZDOO6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V5PDNWPKAP3WL5RQZ4RIDS6MG32OHH5R/ rh#2242172 |
CVE-2023-5363 | openssl:Not affected, openssl-1_1:Not affected | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) | CVE-2023-5363 DSA-5532 OSS:2023/10/24/1 OSS:2023/Q4/179 SMASH Issue 381640 SMASH Issue 381641 bnc#1216163 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=0df40630850fb2740e6be6890bb905d3fc623b2d https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=5f69f5c65e483928c4b28ed16af6e5742929f1ee https://security.netapp.com/advisory/ntap-20231027-0010/ https://security.netapp.com/advisory/ntap-20240201-0003/ https://security.netapp.com/advisory/ntap-20240201-0004/ https://www.debian.org/security/2023/dsa-5532 https://www.openssl.org/news/secadv/20231024.txt openssl.git:commit:1e6e682ac27abd9d028f5a7876f7da1a176c175a openssl.git:commit:a2fe10ca39f9a8e251b98bc03c3b1bbb6ad1496f openssl.git:commit:f3a7e6c057b5054aa05710f3d528b92e3e885268 rh#2243839 |
CVE-2023-5633 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-5633 SMASH Issue 382746 bnc#1216527 bnc#1216645 https://access.redhat.com/errata/RHSA-2024:0113 https://access.redhat.com/errata/RHSA-2024:0134 https://access.redhat.com/errata/RHSA-2024:0461 https://access.redhat.com/security/cve/CVE-2023-5633 rh#2218195 rh#2218212 rh#2245663 |
CVE-2023-5678 | openssl:Not affected, openssl-1_1:Released | moderate | 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | CVE-2023-5678 L3:67118 L3:67208 L3:67230 L3:67500 L3:67501 L3:67560 L3:67561 L3:67577 L3:67614 L3:67652 OSS:2023/11/06/2 OSS:2024/02/08/2 OSS:2024/03/11/1 OSS:2024/05/16/1 OSS:2024/Q1/205 OSS:2024/Q2/243 SMASH Issue 384240 bnc#1216922 bnc#1217150 bnc#1217151 bnc#1217561 bnc#1217663 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=34efaef6c103d636ab507a0cc34dca4d3aecc055 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=710fee740904b6290fef0dd5536fbcedbc38ff0c https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=db925ae2e65d0d925adef429afc37f75bd1c2017 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ddeb4b6c6d527e54ce9a99cba785c0f7776e54b6 https://github.com/nodejs/undici/security/advisories/GHSA-3787-6prv-h9w3 https://security.netapp.com/advisory/ntap-20231130-0010/ https://www.openssl.org/news/secadv/20231106.txt jsc#CAR-2983 openssl.git:commit:1c16253f3c3a8d1e25918c3f404aae6a5b0893de openssl.git:commit:4b29762802c05fa871f0e1efcf804e86db0ddaa2 openssl.git:commit:4d4657cb6ba364dfa60681948b0a30c40bee31ca openssl.git:commit:4ec53ad6e1791daafbe26bdbd539f2ba9172959a openssl.git:commit:9e0094e2aa1b3428a12d5095132f133c078d3c3d openssl.git:commit:afb19f07aecc84998eeea56c4d65f5e0499abb5a openssl.git:commit:ede782b4c8868d1f09c9cd237f82b6f35b7dba8b rh#2224962 rh#2227852 rh#2248616 |
CVE-2023-5717 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-5717 L3:67093 L3:67204 L3:67569 L3:67601 L3:67681 SMASH Issue 383061 bnc#1216584 bnc#1216644 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/events?id=32671e3799ca2e4590773fd0e63aaa4229e50c06 https://kernel.dance/32671e3799ca2e4590773fd0e63aaa4229e50c06 https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html jsc#CAR-2958 rh#2246945 |
CVE-2023-5972 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-5972 SMASH Issue 386005 bnc#1217473 https://access.redhat.com/security/cve/CVE-2023-5972 https://github.com/torvalds/linux/commit/505ce0630ad5d31185695f8a29dde8d29f28faa7 https://github.com/torvalds/linux/commit/52177bbf19e6e9398375a148d2e13ed492b40b80 rh#2248189 |
CVE-2023-6039 | kernel-source-rt:Not affected | moderate | 6.3 (CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-6039 SMASH Issue 384474 bnc#1217068 https://access.redhat.com/security/cve/CVE-2023-6039 https://github.com/torvalds/linux/commit/1e7417c188d0a83fb385ba2dbe35fd2563f2b6f3 rh#2248755 |
CVE-2023-6040 | kernel-source-rt:Analysis | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N) | CVE-2023-6040 MISC:git.kernel.org:OSS:2024/Q1/18 OSS:2024/01/12/1 OSS:2024/Q1/18 SMASH Issue 390957 bnc#1218752 http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html rh#2258013 |
CVE-2023-6111 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-6111 SMASH Issue 384856 bnc#1217164 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=93995bf4af2c5a99e2a87f0cd5ce547d31eb7630 https://kernel.dance/93995bf4af2c5a99e2a87f0cd5ce547d31eb7630 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3OXWBKK7RTQOGGDLQGCZFS753VLGS2GD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3S55P23EYAWDHXZPJEVTGIRZZRICYI3Z/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IG6IF3FUY7LVZJMFRPANAU4L4PSJ3ESQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YQ7JVDEDZV5SNHG5EW7RHKK2ZN56HSGB/ rh#2250105 |
CVE-2023-6121 | kernel-source-rt:Released | moderate | 4.3 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) | CVE-2023-6121 SMASH Issue 385444 bnc#1217250 https://access.redhat.com/errata/RHSA-2024:2394 https://access.redhat.com/errata/RHSA-2024:2950 https://access.redhat.com/errata/RHSA-2024:3138 https://access.redhat.com/security/cve/CVE-2023-6121 https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html jsc#CAR-3004 rh#2250043 |
CVE-2023-6129 | openssl:Not affected, openssl-1_1:Not affected | moderate | 6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L) | CVE-2023-6129 OSS:2024/01/09/1 OSS:2024/02/08/2 OSS:2024/03/11/1 OSS:2024/Q1/15 OSS:2024/Q1/205 SMASH Issue 390487 bnc#1218690 https://github.com/nodejs/undici/security/advisories/GHSA-3787-6prv-h9w3 https://github.com/openssl/openssl/commit/050d26383d4e264966fb83428e72d5d48f402d35 https://github.com/openssl/openssl/commit/5b139f95c9a47a55a0c54100f3837b1eee942b04 https://github.com/openssl/openssl/commit/f3fc5808fe9ff74042d639839610d03b8fdcc015 https://security.netapp.com/advisory/ntap-20240216-0009/ https://security.netapp.com/advisory/ntap-20240426-0008/ https://security.netapp.com/advisory/ntap-20240426-0013/ https://security.netapp.com/advisory/ntap-20240503-0011/ https://www.openssl.org/news/secadv/20240109.txt openssl.git:commit:858c7bc210a406cc7f891ac2aed78692d2e02937 openssl.git:commit:8d847a3ffd4f0b17ee33962cf69c36224925b34f rh#2257571 |
CVE-2023-6176 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-6176 SMASH Issue 385442 bnc#1217332 bnc#1217522 http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html https://access.redhat.com/errata/RHSA-2024:2394 https://access.redhat.com/errata/RHSA-2024:2950 https://access.redhat.com/errata/RHSA-2024:3138 https://access.redhat.com/security/cve/CVE-2023-6176 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cfaa80c91f6f99b9342b6557f0f0e1143e434066 jsc#CAR-3005 rh#2219359 |
CVE-2023-6200 | kernel-source-rt:Not affected | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-6200 SMASH Issue 392383 ZDI-24-842 bnc#1219297 bnc#1219298 https://access.redhat.com/security/cve/CVE-2023-6200 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dade3f6a1e4e rh#2250377 |
CVE-2023-6237 | openssl:Not affected, openssl-1_1:Not affected | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-6237 OSS:2024/02/08/2 OSS:2024/03/11/1 OSS:2024/Q1/205 OSS:2024/Q1/22 SMASH Issue 391206 bnc#1218810 https://github.com/nodejs/undici/security/advisories/GHSA-3787-6prv-h9w3 https://github.com/openssl/openssl/commit/0b0f7abfb37350794a4b8960fafc292cd5d1b84d https://github.com/openssl/openssl/commit/18c02492138d1eb8b6548cb26e7b625fb2414a2a https://github.com/openssl/openssl/commit/a830f551557d3d66a84bbb18a5b889c640c36294 https://security.netapp.com/advisory/ntap-20240531-0007/ https://www.openssl.org/news/secadv/20240115.txt openssl.git:commit:38b2508f638787842750aec9a75745e1d8786743 openssl.git:commit:e09fc1d746a4fd15bb5c3d7bbbab950aadd005db rh#2258502 |
CVE-2023-6238 | kernel-source-rt:Not affected | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-6238 L3:67275 L3:67844 SMASH Issue 385737 bnc#1217384 bnc#1217388 bnc#1217879 https://access.redhat.com/security/cve/CVE-2023-6238 jsc#CAR-2991 rh#2250834 |
CVE-2023-6240 | kernel-source-rt:Analysis | moderate | 6.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N) | CVE-2023-6240 SMASH Issue 392981 bnc#1219556 https://access.redhat.com/errata/RHSA-2024:1881 https://access.redhat.com/errata/RHSA-2024:1882 https://access.redhat.com/errata/RHSA-2024:2758 https://access.redhat.com/errata/RHSA-2024:3414 https://access.redhat.com/errata/RHSA-2024:3421 https://access.redhat.com/errata/RHSA-2024:3618 https://access.redhat.com/errata/RHSA-2024:3627 https://access.redhat.com/security/cve/CVE-2023-6240 https://people.redhat.com/~hkario/marvin/ https://securitypitfalls.wordpress.com/2023/10/16/experiment-with-side-channel-attacks-yourself/ rh#2250843 |
CVE-2023-6246 | glibc:Not affected | important | 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-6246 CVE-2023-6779 CVE-2023-6780 MISC:sourceware.org:OSS:2024/01/30/6 MISC:sourceware.org:OSS:2024/01/30/7 OSS:2024/01/30/6 OSS:2024/01/30/7 OSS:2024/01/30/8 OSS:2024/Q1/68 SMASH Issue 391322 SMASH Issue 391325 bnc#1218863 bnc#1218867 bnc#1218868 http://packetstormsecurity.com/files/176931/glibc-qsort-Out-Of-Bounds-Read-Write.html http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html http://seclists.org/fulldisclosure/2024/Feb/3 http://seclists.org/fulldisclosure/2024/Feb/5 https://access.redhat.com/security/cve/CVE-2023-6246 https://access.redhat.com/security/cve/CVE-2023-6779 https://access.redhat.com/security/cve/CVE-2023-6780 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D2FIH77VHY3KCRROCXOT6L27WMZXSJ2G/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ/ https://security.gentoo.org/glsa/202402-01 https://security.netapp.com/advisory/ntap-20240216-0007/ https://security.netapp.com/advisory/ntap-20240223-0006/ https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt rh#2249053 rh#2254395 rh#2254396 |
CVE-2023-6270 | kernel-source-rt:Already fixed | important | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-6270 CVE-2024-26898 L3:67569 L3:67606 L3:67695 L3:67706 L3:67756 L3:67844 L3:67846 L3:67866 L3:68017 L3:68142 SMASH Issue 390054 bnc#1218562 bnc#1218813 bnc#1219702 bnc#1220853 bnc#1223016 bnc#1223017 bnc#1223335 bnc#1225020 https://access.redhat.com/security/cve/CVE-2023-6270 https://git.kernel.org/stable/c/079cba4f4e307c69878226fdf5228c20aa1c969c https://git.kernel.org/stable/c/1a54aa506b3b2f31496731039e49778f54eee881 https://git.kernel.org/stable/c/74ca3ef68d2f449bc848c0a814cefc487bf755fa https://git.kernel.org/stable/c/7dd09fa80b0765ce68bfae92f4e2f395ccf0fba4 https://git.kernel.org/stable/c/a16fbb80064634b254520a46395e36b87ca4731e https://git.kernel.org/stable/c/ad80c34944d7175fa1f5c7a55066020002921a99 https://git.kernel.org/stable/c/eb48680b0255a9e8a9bdc93d6a55b11c31262e62 https://git.kernel.org/stable/c/f98364e926626c678fb4b9004b75cacf92ff0662 https://git.kernel.org/stable/c/faf0b4c5e00bb680e8e43ac936df24d3f48c8e65 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html jsc#CAR-3065 linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662 rh#2256786 rh#2275652 rh#2277171 rh#2277811 rh#2278445 |
CVE-2023-6356 | kernel-source-rt:Not affected | moderate | 6.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-6356 SMASH Issue 387556 bnc#1217987 https://access.redhat.com/errata/RHSA-2024:0723 https://access.redhat.com/errata/RHSA-2024:0724 https://access.redhat.com/errata/RHSA-2024:0725 https://access.redhat.com/errata/RHSA-2024:0881 https://access.redhat.com/errata/RHSA-2024:0897 https://access.redhat.com/errata/RHSA-2024:1248 https://access.redhat.com/errata/RHSA-2024:3810 https://access.redhat.com/security/cve/CVE-2023-6356 https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html https://security.netapp.com/advisory/ntap-20240415-0002/ rh#2254054 |
CVE-2023-6531 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-6531 SMASH Issue 389413 bnc#1218447 bnc#1218487 https://access.redhat.com/errata/RHSA-2024:2394 https://access.redhat.com/security/cve/CVE-2023-6531 https://lore.kernel.org/all/c716c88321939156909cfa1bd8b0faaf1c804103.1701868795.git.asml.silence@gmail.com/ jsc#CAR-3045 rh#2253034 |
CVE-2023-6535 | kernel-source-rt:Not affected | moderate | 6.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-6535 SMASH Issue 387555 bnc#1217988 https://access.redhat.com/errata/RHSA-2024:0723 https://access.redhat.com/errata/RHSA-2024:0724 https://access.redhat.com/errata/RHSA-2024:0725 https://access.redhat.com/errata/RHSA-2024:0881 https://access.redhat.com/errata/RHSA-2024:0897 https://access.redhat.com/errata/RHSA-2024:1248 https://access.redhat.com/errata/RHSA-2024:3810 https://access.redhat.com/security/cve/CVE-2023-6535 https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html https://security.netapp.com/advisory/ntap-20240415-0003/ rh#2254053 |
CVE-2023-6546 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-6546 MISC:bugzilla.kernel.org:OSS:2024/04/16/2 MISC:git.kernel.org:OSS:2024/04/16/2 MISC:lists.openwall.net:OSS:2024/Q2/96 OSS:2024/04/10/18 OSS:2024/04/10/21 OSS:2024/04/11/7 OSS:2024/04/11/9 OSS:2024/04/12/1 OSS:2024/04/12/2 OSS:2024/04/14/1 OSS:2024/04/16/2 OSS:2024/04/17/1 OSS:2024/Q2/103 OSS:2024/Q2/82 OSS:2024/Q2/96 SMASH Issue 389007 ZDI-24-020 bnc#1218335 bnc#1222685 https://access.redhat.com/errata/RHSA-2024:0930 https://access.redhat.com/errata/RHSA-2024:0937 https://access.redhat.com/errata/RHSA-2024:1018 https://access.redhat.com/errata/RHSA-2024:1019 https://access.redhat.com/errata/RHSA-2024:1055 https://access.redhat.com/errata/RHSA-2024:1250 https://access.redhat.com/errata/RHSA-2024:1253 https://access.redhat.com/errata/RHSA-2024:1306 https://access.redhat.com/errata/RHSA-2024:1607 https://access.redhat.com/errata/RHSA-2024:1612 https://access.redhat.com/errata/RHSA-2024:1614 https://access.redhat.com/errata/RHSA-2024:2394 https://access.redhat.com/errata/RHSA-2024:2621 https://access.redhat.com/errata/RHSA-2024:2697 https://access.redhat.com/security/cve/CVE-2023-6546 https://github.com/torvalds/linux/commit/3c4f8333b582487a2d1e02171f1465531cde53e3 https://www.zerodayinitiative.com/advisories/ZDI-CAN-20527 rh#2255498 |
CVE-2023-6560 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-6560 SMASH Issue 387226 bnc#1217867 http://packetstormsecurity.com/files/176405/io_uring-__io_uaddr_map-Dangerous-Multi-Page-Handling.html https://access.redhat.com/security/cve/CVE-2023-6560 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AU4NHBDEDLRW33O76Y6LFECEYNQET5GZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UCQIPFUQXKXRCH5Y4RP3C5NK4IHNBNVK/ https://patchwork.kernel.org/project/io-uring/patch/20231130194633.649319-2-axboe@kernel.dk/ rh#2253249 |
CVE-2023-6606 | kernel-source-rt:Released | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H) | CVE-2023-6606 L3:67651 SMASH Issue 387411 bnc#1217947 https://access.redhat.com/errata/RHSA-2024:0723 https://access.redhat.com/errata/RHSA-2024:0725 https://access.redhat.com/errata/RHSA-2024:0881 https://access.redhat.com/errata/RHSA-2024:0897 https://access.redhat.com/errata/RHSA-2024:1188 https://access.redhat.com/errata/RHSA-2024:1248 https://access.redhat.com/security/cve/CVE-2023-6606 https://bugzilla.kernel.org/show_bug.cgi?id=218218 https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html jsc#CAR-3029 linux.git:commit:b35858b3786ddbb56e1c35138ba25d6adf8d0bef rh#2253611 |
CVE-2023-6610 | kernel-source-rt:Released | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H) | CVE-2023-6610 SMASH Issue 387412 bnc#1217946 https://access.redhat.com/errata/RHSA-2024:0723 https://access.redhat.com/errata/RHSA-2024:0724 https://access.redhat.com/errata/RHSA-2024:0725 https://access.redhat.com/errata/RHSA-2024:0881 https://access.redhat.com/errata/RHSA-2024:0897 https://access.redhat.com/errata/RHSA-2024:1248 https://access.redhat.com/security/cve/CVE-2023-6610 https://bugzilla.kernel.org/show_bug.cgi?id=218219 jsc#CAR-3030 linux.git:commit:567320c46a60a3c39b69aa1df802d753817a3f86 rh#2253614 |
CVE-2023-6622 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-6622 SMASH Issue 387419 bnc#1217938 https://access.redhat.com/errata/RHSA-2024:2394 https://access.redhat.com/errata/RHSA-2024:2950 https://access.redhat.com/errata/RHSA-2024:3138 https://access.redhat.com/security/cve/CVE-2023-6622 https://github.com/torvalds/linux/commit/3701cd390fd731ee7ae8b8006246c8db82c72bea https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAOVK2F3ALGKYIQ5IOMAYEC2DGI7BWAW/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G3AGDVE3KBLOOYBPISFDS74R4YAZEDAY/ rh#2253632 |
CVE-2023-6679 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2023-6679 SMASH Issue 387545 bnc#1217944 https://access.redhat.com/errata/RHSA-2024:0439 https://access.redhat.com/errata/RHSA-2024:0448 https://access.redhat.com/errata/RHSA-2024:0461 https://access.redhat.com/security/cve/CVE-2023-6679 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LBVHM4LGMFIHBN4UBESYRFMYX3WUICV5/ https://lore.kernel.org/netdev/20231211083758.1082853-1-jiri@resnulli.us/ rh#2253986 |
CVE-2023-6779 | glibc:Not affected | important | 7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-6246 CVE-2023-6779 CVE-2023-6780 MISC:sourceware.org:OSS:2024/01/30/6 MISC:sourceware.org:OSS:2024/01/30/7 OSS:2024/01/30/6 OSS:2024/01/30/7 OSS:2024/01/30/8 OSS:2024/Q1/68 SMASH Issue 391323 SMASH Issue 391325 bnc#1218863 bnc#1218867 bnc#1218868 http://packetstormsecurity.com/files/176931/glibc-qsort-Out-Of-Bounds-Read-Write.html http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html http://seclists.org/fulldisclosure/2024/Feb/3 http://seclists.org/fulldisclosure/2024/Feb/5 https://access.redhat.com/security/cve/CVE-2023-6246 https://access.redhat.com/security/cve/CVE-2023-6779 https://access.redhat.com/security/cve/CVE-2023-6780 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D2FIH77VHY3KCRROCXOT6L27WMZXSJ2G/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ/ https://security.gentoo.org/glsa/202402-01 https://security.netapp.com/advisory/ntap-20240216-0007/ https://security.netapp.com/advisory/ntap-20240223-0006/ https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt rh#2249053 rh#2254395 rh#2254396 |
CVE-2023-6780 | glibc:Not affected | important | 7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-6246 CVE-2023-6779 CVE-2023-6780 MISC:sourceware.org:OSS:2024/01/30/6 MISC:sourceware.org:OSS:2024/01/30/7 OSS:2024/01/30/6 OSS:2024/01/30/7 OSS:2024/01/30/8 OSS:2024/Q1/68 SMASH Issue 391324 SMASH Issue 391325 bnc#1218863 bnc#1218867 bnc#1218868 http://packetstormsecurity.com/files/176931/glibc-qsort-Out-Of-Bounds-Read-Write.html http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html http://seclists.org/fulldisclosure/2024/Feb/3 http://seclists.org/fulldisclosure/2024/Feb/5 https://access.redhat.com/security/cve/CVE-2023-6246 https://access.redhat.com/security/cve/CVE-2023-6779 https://access.redhat.com/security/cve/CVE-2023-6780 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D2FIH77VHY3KCRROCXOT6L27WMZXSJ2G/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ/ https://security.gentoo.org/glsa/202402-01 https://security.netapp.com/advisory/ntap-20240216-0007/ https://security.netapp.com/advisory/ntap-20240223-0006/ https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt rh#2249053 rh#2254395 rh#2254396 |
CVE-2023-6817 | kernel-source-rt:Not affected | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-6817 OSS:2023/12/22/13 OSS:2023/12/22/6 OSS:2023/Q4/316 SMASH Issue 388542 bnc#1218195 http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=317eb9685095678f2c9f5a8189de698c5354316a https://kernel.dance/317eb9685095678f2c9f5a8189de698c5354316a https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html rh#2255139 |
CVE-2023-6931 | kernel-source-rt:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-6931 L3:67364 L3:67569 L3:67600 L3:67681 SMASH Issue 388672 bnc#1218258 bnc#1218259 bnc#1218405 bnc#1219696 https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=382c27f4ed28f803b1f1473ac2d8db0afc795a1b https://kernel.dance/382c27f4ed28f803b1f1473ac2d8db0afc795a1b https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html jsc#CAR-3035 rh#2252731 rh#2255283 rh#2255286 |
CVE-2023-6932 | kernel-source-rt:Released | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-6932 L3:67364 L3:67569 L3:67599 L3:67651 L3:67681 L3:67846 L3:67866 SMASH Issue 388673 bnc#1218253 bnc#1218255 bnc#1219695 http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=e2b706c691905fe78468c361aaabc719d0a496f1 https://kernel.dance/e2b706c691905fe78468c361aaabc719d0a496f1 https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html jsc#CAR-3034 rh#2255283 |
CVE-2023-7008 | systemd:Not affected | moderate | 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N) | CVE-2023-7008 SMASH Issue 388806 bnc#1218297 https://access.redhat.com/errata/RHSA-2024:2463 https://access.redhat.com/errata/RHSA-2024:3203 https://access.redhat.com/security/cve/CVE-2023-7008 https://github.com/systemd/systemd/issues/25676 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GMDEG5PKONWNHOEYSUDRT6JEOISRMN2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QHNBXGKJWISJETTTDTZKTBFIBJUOSLKL/ rh#2222261 rh#2222672 |
CVE-2023-7104 | sqlite3:Ignore | moderate | 5.5 (CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) | CVE-2023-7104 SMASH Issue 389619 bnc#1218453 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/ https://security.netapp.com/advisory/ntap-20240112-0008/ https://sqlite.org/forum/forumpost/5bcbf4571c https://sqlite.org/src/info/0e4e7a05c4204b47 https://vuldb.com/?ctiid.248999 https://vuldb.com/?id.248999 jsc#CAR-3044 rh#2256194 |
CVE-2024-0193 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2024-0193 SMASH Issue 389846 bnc#1218495 bnc#1218496 https://access.redhat.com/errata/RHSA-2024:1018 https://access.redhat.com/errata/RHSA-2024:1019 https://access.redhat.com/errata/RHSA-2024:1248 https://access.redhat.com/security/cve/CVE-2024-0193 rh#2255653 |
CVE-2024-0232 | sqlite3:Not affected | moderate | 5.1 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L) | CVE-2024-0232 SMASH Issue 390871 bnc#1218735 https://access.redhat.com/security/cve/CVE-2024-0232 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/ https://security.netapp.com/advisory/ntap-20240315-0007/ rh#2243754 |
CVE-2024-0443 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2024-0443 SMASH Issue 390914 bnc#1218767 https://access.redhat.com/errata/RHSA-2023:6583 https://access.redhat.com/errata/RHSA-2023:7077 https://access.redhat.com/errata/RHSA-2023:7370 https://access.redhat.com/security/cve/CVE-2024-0443 https://lore.kernel.org/linux-block/20221215033132.230023-3-longman@redhat.com/ rh#2257968 |
CVE-2024-0564 | kernel-source-rt:Analysis | moderate | 6.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) | CVE-2024-0564 L3:68163 SMASH Issue 391868 bnc#1219054 https://access.redhat.com/security/cve/CVE-2024-0564 https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1680513 https://link.springer.com/conference/wisa https://wisa.or.kr/accepted rh#2258514 |
CVE-2024-0582 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2024-0582 MISC:anatomic.rip:OSS:2024/Q2/172 MISC:blog.exodusintel.com:OSS:2024/Q2/172 MISC:git.kernel.org:OSS:2024/Q2/172 MISC:ruia-ruia.github.io:OSS:2022/Q3/101 OSS:2024/04/24/3 OSS:2024/Q2/172 SMASH Issue 391282 bnc#1218840 https://access.redhat.com/security/cve/CVE-2024-0582 https://bugs.chromium.org/p/project-zero/issues/detail?id=2504 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c392cbecd8eca4c53f2bf508731257d9d0a21c2d rh#2254050 |
CVE-2024-0584 | kernel-source-rt:Already fixed | moderate | 6.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H) | CVE-2024-0584 SMASH Issue 391300 bnc#1218857 https://access.redhat.com/security/cve/CVE-2024-0584 https://lore.kernel.org/netdev/170083982540.9628.4546899811301303734.git-patchwork-notify@kernel.org/T/ rh#2258584 |
CVE-2024-0641 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-0641 SMASH Issue 391544 bnc#1218916 https://access.redhat.com/security/cve/CVE-2024-0641 https://github.com/torvalds/linux/commit/08e50cf071847323414df0835109b6f3560d44f5 rh#2258757 |
CVE-2024-0646 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2024-0646 SMASH Issue 391567 bnc#1218941 bnc#1218942 https://access.redhat.com/errata/RHSA-2024:0723 https://access.redhat.com/errata/RHSA-2024:0724 https://access.redhat.com/errata/RHSA-2024:0725 https://access.redhat.com/errata/RHSA-2024:0850 https://access.redhat.com/errata/RHSA-2024:0851 https://access.redhat.com/errata/RHSA-2024:0876 https://access.redhat.com/errata/RHSA-2024:0881 https://access.redhat.com/errata/RHSA-2024:0897 https://access.redhat.com/errata/RHSA-2024:1248 https://access.redhat.com/errata/RHSA-2024:1250 https://access.redhat.com/errata/RHSA-2024:1251 https://access.redhat.com/errata/RHSA-2024:1253 https://access.redhat.com/errata/RHSA-2024:1268 https://access.redhat.com/errata/RHSA-2024:1269 https://access.redhat.com/errata/RHSA-2024:1278 https://access.redhat.com/errata/RHSA-2024:1306 https://access.redhat.com/errata/RHSA-2024:1367 https://access.redhat.com/errata/RHSA-2024:1368 https://access.redhat.com/errata/RHSA-2024:1377 https://access.redhat.com/errata/RHSA-2024:1382 https://access.redhat.com/errata/RHSA-2024:1404 https://access.redhat.com/security/cve/CVE-2024-0646 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c5a595000e267 https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html rh#2253908 |
CVE-2024-0671 | kernel-source-rt:Not affected | low | () | CONFIRM:developer.arm.com:CVE-2022-28350 CVE-2024-0671 SMASH Issue 402720 bnc#1223184 |
CVE-2024-0727 | openssl:Not affected, openssl-1_1:Released | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) | CVE-2024-0727 OSS:2024/02/08/2 OSS:2024/03/11/1 OSS:2024/Q1/205 OSS:2024/Q1/56 SMASH Issue 392059 bnc#1219243 https://github.com/nodejs/undici/security/advisories/GHSA-3787-6prv-h9w3 https://github.com/openssl/openssl/commit/09df4395b5071217b76dc7d3d2e630eb8c5a79c2 https://github.com/openssl/openssl/commit/775acfdbd0c6af9ac855f34969cdab0c0c90844a https://github.com/openssl/openssl/commit/d135eeab8a5dbf72b3da5240bab9ddb7678dbd2c https://github.openssl.org/openssl/extended-releases/commit/03b3941d60c4bce58fab69a0c22377ab439bc0e8 https://github.openssl.org/openssl/extended-releases/commit/aebaa5883e31122b404e450732dc833dc9dee539 https://security.netapp.com/advisory/ntap-20240208-0006/ https://www.openssl.org/news/secadv/20240125.txt jsc#CAR-3084 openssl.git:commit:041962b429ebe748c8b6b7922980dfb6decfef26 openssl.git:commit:8a85df7c60ba1372ee98acc5982e902d75f52130 rh#2259944 |
CVE-2024-0775 | kernel-source-rt:Released | important | 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H) | CVE-2024-0775 L3:67695 L3:68095 L3:68137 SMASH Issue 391869 bnc#1219053 bnc#1219079 bnc#1219082 https://access.redhat.com/security/cve/CVE-2024-0775 https://scm.linefinity.com/common/linux-stable/commit/4c0b4818b1f636bc96359f7817a2d8bab6370162 jsc#CAR-3074 rh#2259414 |
CVE-2024-0841 | kernel-source-rt:Analysis | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-0841 SMASH Issue 392382 bnc#1219264 https://access.redhat.com/errata/RHSA-2024:2394 https://access.redhat.com/errata/RHSA-2024:2950 https://access.redhat.com/errata/RHSA-2024:3138 https://access.redhat.com/security/cve/CVE-2024-0841 rh#2256490 |
CVE-2024-0853 | curl:Not affected | low | 3.8 (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N) | CVE-2024-0853 OSS:2024/Q1/73 SMASH Issue 392119 bnc#1219149 https://curl.se/docs/CVE-2024-0853.json https://hackerone.com/reports/2298922 https://security.netapp.com/advisory/ntap-20240307-0004/ https://security.netapp.com/advisory/ntap-20240426-0009/ https://security.netapp.com/advisory/ntap-20240503-0012/ rh#2262097 |
CVE-2024-1065 | kernel-source-rt:Not affected | low | () | CONFIRM:developer.arm.com:CVE-2022-28350 CVE-2024-1065 SMASH Issue 402721 bnc#1223185 |
CVE-2024-1085 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2024-1085 SMASH Issue 392616 bnc#1219429 bnc#1219432 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7 https://kernel.dance/b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7 rh#2262127 |
CVE-2024-1086 | kernel-source-rt:Released | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2024-1086 L3:67695 L3:68095 L3:68137 L3:68242 MISC:git.kernel.org:OSS:2024/Q2/86 MISC:jonathanspw.com:OSS:2024/Q2/86 OSS:2024/04/10/22 OSS:2024/04/10/23 OSS:2024/04/14/1 OSS:2024/04/15/2 OSS:2024/04/17/5 OSS:2024/Q2/116 OSS:2024/Q2/86 SMASH Issue 392617 bnc#1219434 bnc#1219435 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660 https://github.com/Notselwyn/CVE-2024-1086 https://kernel.dance/f342de4e2f33e0e39165d8639387aa6c19dff660 https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/ https://news.ycombinator.com/item?id=39828424 https://pwning.tech/nftables/ https://security.netapp.com/advisory/ntap-20240614-0009/ jsc#CAR-3088 rh#2262126 rh#2269217 |
CVE-2024-1312 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2024-1312 SMASH Issue 393351 bnc#1219731 https://access.redhat.com/security/cve/CVE-2024-1312 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/mm/memory.c?h=v6.8-rc3&id=657b5146955eba331e01b9a6ae89ce2e716ba306 rh#2225569 |
CVE-2024-2004 | curl:Not affected | low | 3.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N) | CVE-2024-2004 MISC:github.com:OSS:2024/Q1/253 OSS:2024/03/27/1 OSS:2024/Q1/253 SMASH Issue 398212 SMASH Issue 398213 bnc#1221665 https://curl.se/docs/CVE-2024-2004.json https://hackerone.com/reports/2384833 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D44YLAUFJU6BZ4XFG2FYV7SBKXB5IZ6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMD6UYKCCRCYETWQZUJ65ZRFULT6SHLI/ https://security.netapp.com/advisory/ntap-20240524-0006/ rh#2270500 |
CVE-2024-21485 | dash:Analysis | moderate | () | CVE-2024-21485 SMASH Issue 392840 bnc#1219469 https://github.com/plotly/dash/commit/9920073c9a8619ae8f90fcec1924f2f3a4332a8c https://github.com/plotly/dash/issues/2729 https://github.com/plotly/dash/pull/2732 https://github.com/plotly/dash/releases/tag/v2.15.0 https://security.snyk.io/vuln/SNYK-JS-DASHCORECOMPONENTS-6183084 https://security.snyk.io/vuln/SNYK-JS-DASHHTMLCOMPONENTS-6226337 https://security.snyk.io/vuln/SNYK-PYTHON-DASH-6226335 https://security.snyk.io/vuln/SNYK-PYTHON-DASHCORECOMPONENTS-6226334 https://security.snyk.io/vuln/SNYK-PYTHON-DASHHTMLCOMPONENTS-6226336 |
CVE-2024-21803 | kernel-source-rt:Analysis | important | () | CVE-2024-21803 SMASH Issue 392519 bnc#1219351 https://bugzilla.openanolis.cn/show_bug.cgi?id=8081 rh#2256822 rh#2261903 |
CVE-2024-21823 | kernel-source-rt:Not affected | moderate | 6.8 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H) | CVE-2024-21823 MISC:www.intel.com:OSS:2024/Q2/242 OSS:2024/05/15/1 OSS:2024/Q2/242 SMASH Issue 403963 bnc#1223625 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DW2MIOIMOFUSNLHLRYX23AFR36BMKD65/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OTB4HWU2PTVW5NEYHHLOCXDKG3PYA534/ linux.git:commit:796aec4a5b5850967af0c42d4e84df2d748d570b rh#2278989 |
CVE-2024-2193 | kernel-source-rt:Won't fix | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2024-2193 OSS:2024/03/12/14 OSS:2024/Q1/220 SMASH Issue 387230 SMASH Issue 397295 bnc#1217857 bnc#1221334 https://download.vusec.net/papers/ghostrace_sec24.pdf https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=944d5fe50f3f03daacfea16300e656a1691c4a23 https://ibm.github.io/system-security-research-updates/2024/03/12/ghostrace https://kb.cert.org/vuls/id/488902 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/ https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7016.html https://www.kb.cert.org/vuls/id/488902 https://www.vusec.net/projects/ghostrace/ https://xenbits.xen.org/xsa/advisory-453.html rh#2262051 |
CVE-2024-22365 | pam:Ignore | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-22365 OSS:2024/01/18/3 OSS:2024/Q1/31 SMASH Issue 389839 SMASH Issue 390436 bnc#1218475 https://github.com/linux-pam/linux-pam https://github.com/linux-pam/linux-pam/commit/031bb5a5d0d950253b68138b498dc93be69a64cb https://github.com/linux-pam/linux-pam/releases/tag/v1.6.0 jsc#CAR-3075 rh#2257722 |
CVE-2024-22386 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-22386 SMASH Issue 393019 bnc#1219615 https://bugzilla.openanolis.cn/show_bug.cgi?id=8147 jsc#CAR-3102 |
CVE-2024-22705 | kernel-source-rt:Not affected | moderate | 4.3 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) | CVE-2024-22705 SMASH Issue 391994 bnc#1219102 https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.10 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d10c77873ba1e9e6b91905018e29e196fd5f863d rh#2259864 |
CVE-2024-2379 | curl:Not affected | moderate | 4.3 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) | CVE-2024-2379 MISC:github.com:OSS:2024/Q1/254 OSS:2024/03/27/2 OSS:2024/Q1/254 SMASH Issue 398214 SMASH Issue 398215 bnc#1221666 https://curl.se/docs/CVE-2024-2379.json https://hackerone.com/reports/2410774 https://security.netapp.com/advisory/ntap-20240531-0001/ rh#2270499 |
CVE-2024-23850 | kernel-source-rt:Not affected | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-23850 SMASH Issue 391981 bnc#1219126 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZOU3745CWCDZ7EMKMXB2OEEIB5Q3IWM/ https://lore.kernel.org/all/6a80cb4b32af89787dadee728310e5e2ca85343f.1705741883.git.wqu%40suse.com/ https://lore.kernel.org/lkml/CALGdzuo6awWdau3X=8XK547x2vX_-VoFmH1aPsqosRTQ5WzJVA%40mail.gmail.com/ rh#2260044 |
CVE-2024-2398 | curl:Not affected | moderate | 6.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-2398 MISC:github.com:OSS:2024/Q1/255 OSS:2024/03/27/3 OSS:2024/Q1/255 SMASH Issue 398216 SMASH Issue 398217 bnc#1221667 https://curl.se/docs/CVE-2024-2398.json https://hackerone.com/reports/2402845 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D44YLAUFJU6BZ4XFG2FYV7SBKXB5IZ6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMD6UYKCCRCYETWQZUJ65ZRFULT6SHLI/ https://security.netapp.com/advisory/ntap-20240503-0009/ rh#2270498 |
CVE-2024-2466 | kernel-source-rt:Released | moderate | 5.4 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N) | APPLE:APPLE-SA-2010-03-29-1 APPLE:APPLE-SA-2016-05-16-4 BID:101274 BID:102118 BID:102371 BID:102376 BID:102378 BID:103954 BID:104768 BID:104773 BID:104774 BID:104780 BID:105117 BID:105118 BID:105126 BID:105587 BID:105590 BID:105591 BID:105601 BID:105602 BID:105608 BID:105615 BID:105617 BID:105622 BID:106128 BID:85801 BID:90726 BID:91319 BID:93841 BID:95131 BID:98888 BUGTRAQ:20170801 [security bulletin] HPESBHF03763 rev.1 - HPE Comware 7, IMC, VCX products using OpenSSL, Remote Denial of Service (DoS) BUGTRAQ:20190624 [SECURITY] [DSA 4469-1] libvirt security update BUGTRAQ:20191112 FreeBSD Security Advisory FreeBSD-SA-19:26.mcu CERT-VN:VU#180049 CERT-VN:VU#228519 CERT-VN:VU#584653 CISCO:20160927 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: September 2016 CISCO:20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II CISCO:20180104 CPU Side-Channel Information Disclosure Vulnerabilities CONFIRM:01.org:CVE-2017-5753 CONFIRM:01.org:CVE-2017-5754 CONFIRM:access.redhat.com:CVE-2017-13088 CONFIRM:access.redhat.com:CVE-2017-5754 CONFIRM:aws.amazon.com:CVE-2017-5754 CONFIRM:blog.mozilla.org:CVE-2017-5754 CONFIRM:bto.bluecoat.com:CVE-2016-7052 CONFIRM:bugs.eclipse.org:CVE-2018-12539 CONFIRM:bugs.launchpad.net:CVE-2015-8866 CONFIRM:bugs.launchpad.net:CVE-2015-8867 CONFIRM:bugs.php.net:CVE-2015-8866 CONFIRM:bugs.php.net:CVE-2015-8867 CONFIRM:bugs.php.net:CVE-2016-4070 CONFIRM:bugzilla.redhat.com:CVE-2015-7559 CONFIRM:bugzilla.redhat.com:CVE-2016-8610 CONFIRM:cdrdv2.intel.com:CVE-2017-5754 CONFIRM:cdrdv2.intel.com:CVE-2018-3693 CONFIRM:cert-portal.siemens.com:/productcert/pdf/ssa-412672.pdf CONFIRM:cert-portal.siemens.com:CVE-2017-13088 CONFIRM:cert-portal.siemens.com:CVE-2017-5715 CONFIRM:cert-portal.siemens.com:CVE-2017-5753 CONFIRM:cert.vde.com:CVE-2017-13080 CONFIRM:cert.vde.com:CVE-2017-13088 CONFIRM:cert.vde.com:CVE-2017-5754 CONFIRM:curl.haxx.se:CVE-2016-3739 CONFIRM:developer.arm.com:CVE-2017-5754 CONFIRM:git.openssl.org:CVE-2016-2177 CONFIRM:git.openssl.org:CVE-2016-8610 CONFIRM:git.php.net:CVE-2015-8866 CONFIRM:git.php.net:CVE-2015-8867 CONFIRM:github.com:CVE-2016-9840 CONFIRM:github.com:CVE-2016-9841 CONFIRM:github.com:CVE-2016-9842 CONFIRM:github.com:CVE-2016-9843 CONFIRM:github.com:CVE-2017-1000071 CONFIRM:h20566.www2.hpe.com:CVE-2016-2177 CONFIRM:h20566.www2.hpe.com:CVE-2016-5388 CONFIRM:h20566.www2.hpe.com:CVE-2016-5773 CONFIRM:h20566.www2.hpe.com:CVE-2016-6306 CONFIRM:h20566.www2.hpe.com:CVE-2017-5787 CONFIRM:help.ecostruxureit.com:CVE-2017-5754 CONFIRM:issues.apache.org:CVE-2015-7559 CONFIRM:kb.juniper.net:CVE-2016-7052 CONFIRM:kb.pulsesecure.net:CVE-2016-6306 CONFIRM:kc.mcafee.com:CVE-2016-2177 CONFIRM:kc.mcafee.com:CVE-2016-6306 CONFIRM:nodejs.org:CVE-2017-3738 CONFIRM:nvidia.custhelp.com:CVE-2017-5754 CONFIRM:portal.msrc.microsoft.com:CVE-2017-13080 CONFIRM:portal.msrc.microsoft.com:CVE-2017-5754 CONFIRM:rockwellautomation.custhelp.com:CVE-2017-13082 CONFIRM:security-center.intel.com:CVE-2017-5715 CONFIRM:security.netapp.com:CVE-2016-8610 CONFIRM:security.netapp.com:CVE-2016-9843 CONFIRM:security.netapp.com:CVE-2017-10388 CONFIRM:security.netapp.com:CVE-2017-3738 CONFIRM:security.netapp.com:CVE-2017-5645 CONFIRM:security.netapp.com:CVE-2017-5664 CONFIRM:security.netapp.com:CVE-2017-5754 CONFIRM:security.netapp.com:CVE-2018-2973 CONFIRM:security.netapp.com:CVE-2018-3214 CONFIRM:security.paloaltonetworks.com:CVE-2016-8610 CONFIRM:security.paloaltonetworks.com:CVE-2017-5715 CONFIRM:securityadvisories.paloaltonetworks.com:CVE-2016-8610 CONFIRM:securityadvisories.paloaltonetworks.com:CVE-2017-5715 CONFIRM:source.android.com:CVE-2017-5754 CONFIRM:source.android.com:CVE-2017-6264 CONFIRM:source.android.com:CVE-2017-6294 CONFIRM:support.apple.com:CVE-2009-0689 CONFIRM:support.apple.com:CVE-2016-4073 CONFIRM:support.apple.com:CVE-2017-13852 CONFIRM:support.apple.com:CVE-2017-13873 CONFIRM:support.apple.com:CVE-2017-13877 CONFIRM:support.apple.com:CVE-2017-13904 CONFIRM:support.apple.com:CVE-2017-3169 CONFIRM:support.apple.com:CVE-2017-6464 CONFIRM:support.citrix.com:CVE-2017-5754 CONFIRM:support.f5.com:CVE-2016-2177 CONFIRM:support.f5.com:CVE-2017-5754 CONFIRM:support.hpe.com:CVE-2016-6306 CONFIRM:support.hpe.com:CVE-2016-7052 CONFIRM:support.hpe.com:CVE-2016-8610 CONFIRM:support.hpe.com:CVE-2017-13081 CONFIRM:support.hpe.com:CVE-2017-3738 CONFIRM:support.hpe.com:CVE-2017-5664 CONFIRM:support.hpe.com:CVE-2017-5754 CONFIRM:support.hpe.com:CVE-2018-2940 CONFIRM:support.hpe.com:CVE-2018-2973 CONFIRM:support.hpe.com:CVE-2018-3136 CONFIRM:support.lenovo.com:CVE-2017-13088 CONFIRM:support.lenovo.com:CVE-2017-5754 CONFIRM:www-01.ibm.com:CVE-2016-7052 CONFIRM:www.arubanetworks.com:CVE-2017-13088 CONFIRM:www.arubanetworks.com:CVE-2017-5715 CONFIRM:www.arubanetworks.com:CVE-2017-5754 CONFIRM:www.citect.schneider-electric.com:CVE-2017-5571 CONFIRM:www.codeaurora.org:CVE-2017-5754 CONFIRM:www.huawei.com:CVE-2016-6306 CONFIRM:www.ibm.com:CVE-2018-1656 CONFIRM:www.intel.com:CVE-2017-13080 CONFIRM:www.mitel.com:CVE-2017-5754 CONFIRM:www.openssl.org CONFIRM:www.openssl.org:CVE-2017-3738 CONFIRM:www.oracle.com:CVE-2014-0114 CONFIRM:www.oracle.com:CVE-2015-4879 CONFIRM:www.oracle.com:CVE-2016-4957 CONFIRM:www.oracle.com:CVE-2016-6304 CONFIRM:www.oracle.com:CVE-2016-7039 CONFIRM:www.oracle.com:CVE-2016-8296 CONFIRM:www.oracle.com:CVE-2017-10365 CONFIRM:www.oracle.com:CVE-2017-3636 CONFIRM:www.oracle.com:CVE-2017-5689 CONFIRM:www.oracle.com:CVE-2017-5709 CONFIRM:www.oracle.com:CVE-2017-5715 CONFIRM:www.oracle.com:CVE-2017-5753 CONFIRM:www.oracle.com:CVE-2017-6074 CONFIRM:www.oracle.com:CVE-2018-18223 CONFIRM:www.oracle.com:CVE-2018-2639 CONFIRM:www.oracle.com:CVE-2018-2819 CONFIRM:www.oracle.com:CVE-2018-3081 CONFIRM:www.pcre.org:CVE-2015-2325 CONFIRM:www.php.net:CVE-2009-3558 CONFIRM:www.php.net:CVE-2016-9935 CONFIRM:www.php.net:CVE-2016-9936 CONFIRM:www.schneider-electric.com:CVE-2017-5571 CONFIRM:www.splunk.com:CVE-2016-6304 CONFIRM:www.suse.com:CVE-2017-5754 CONFIRM:www.synology.com:CVE-2017-5754 CONFIRM:www.tenable.com:CVE-2016-7052 CONFIRM:www.tenable.com:CVE-2016-8625 CONFIRM:www.tenable.com:CVE-2016-9260 CONFIRM:www.tenable.com:CVE-2017-3738 CONFIRM:www.vmware.com:CVE-2017-5715 CONFIRM:www.vmware.com:CVE-2017-5753 CONFIRM:x-stream.github.io:CVE-2013-7285 CONFIRM:xenbits.xen.org:CVE-2017-5754 CVE-2009-3559 CVE-2014-3490 CVE-2015-2325 CVE-2015-2326 CVE-2015-5328 CVE-2015-7559 CVE-2016-2177 CVE-2016-3739 CVE-2016-4070 CVE-2016-8610 CVE-2016-9840 CVE-2016-9841 CVE-2016-9842 CVE-2017-13077 CVE-2017-13078 CVE-2017-13079 CVE-2017-13080 CVE-2017-13081 CVE-2017-13082 CVE-2017-13084 CVE-2017-13086 CVE-2017-13087 CVE-2017-13088 CVE-2017-3738 CVE-2017-5664 CVE-2017-5715 CVE-2017-5753 CVE-2017-5754 CVE-2018-1000872 CVE-2018-12539 CVE-2018-1517 CVE-2018-1656 CVE-2018-2767 CVE-2018-2797 CVE-2018-2815 CVE-2018-2825 CVE-2018-2938 CVE-2018-2940 CVE-2018-2952 CVE-2018-2964 CVE-2018-2973 CVE-2018-3136 CVE-2018-3139 CVE-2018-3149 CVE-2018-3169 CVE-2018-3180 CVE-2018-3183 CVE-2018-3209 CVE-2018-3211 CVE-2018-3214 CVE-2024-2466 D:CVE-2016-2141 D:CVE-2016-2177 D:CVE-2016-3739 D:CVE-2017-3738 D:CVE-2018-1517 D:CVE-2018-1656 D:CVE-2022-2590 DEBIAN:DSA-3773 DEBIAN:DSA-4065 DEBIAN:DSA-4078 DEBIAN:DSA-4082 DEBIAN:DSA-4120 DEBIAN:DSA-4157 DEBIAN:DSA-4187 DEBIAN:DSA-4188 DEBIAN:DSA-4213 DEBIAN:DSA-4326 DEBIAN:DSA-4341 DSA-3673 DSA-3891 DSA-3892 DSA-3999 DSA-4065 DSA-4078 DSA-4082 DSA-4120 DSA-4157 DSA-4187 DSA-4188 DSA-5378 EXPLOIT-DB:43427 FREEBSD:FreeBSD-SA-16:26 FREEBSD:FreeBSD-SA-16:35 FREEBSD:FreeBSD-SA-17:07 FREEBSD:FreeBSD-SA-17:12 FREEBSD:FreeBSD-SA-18:03 FREEBSD:FreeBSD-SA-19:26 FULLDISC:20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities GENTOO:GLSA-201612-16 GENTOO:GLSA-201701-47 GENTOO:GLSA-201701-56 GENTOO:GLSA-201711-03 GENTOO:GLSA-201712-03 GENTOO:GLSA-201810-06 GLSA-201908-10 GLSA-202007-54 L3:52429 L3:53225 L3:63823 L3:64100 MANDRIVA:MDVSA-2009:302 MISC:access.redhat.com:CVE-2014-0245 MISC:blog.diniscruz.com:CVE-2013-7285 MISC:bugs.exim.org:CVE-2015-2325 MISC:bugs.exim.org:CVE-2015-2326 MISC:bugs.php.net:CVE-2009-3559 MISC:bugzilla.redhat.com:CVE-2014-0245 MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877 MISC:exchange.xforce.ibmcloud.com:CVE-2014-4172 MISC:fortiguard.com:CVE-2015-2325 MISC:fortiguard.com:CVE-2015-2326 MISC:github.com:CVE-2014-4172 MISC:github.com:CVE-2017-13082 MISC:github.com:CVE-2017-3738 MISC:github.com:CVE-2018-1000872 MISC:github.com:MLIST:[oss-security] 20160608 CVE-2016-2177: OpenSSL undefined pointer arithmetic MISC:github.com:MLIST:[oss-security] 20161205 Re: CVE Request: zlib security issues found during audit MISC:github.com:OSS:2024/Q1/256 MISC:googleprojectzero.blogspot.com:CVE-2017-5754 MISC:ics-cert.us-cert.gov:CVE-2017-13082 MISC:ics-cert.us-cert.gov:CVE-2017-5571 MISC:issues.apache.org:CVE-2014-4651 MISC:issues.jasig.org:CVE-2014-4172 MISC:lists.fedoraproject.org:CVE-2014-4172 MISC:meltdownattack.com:CVE-2017-5754 MISC:packetstormsecurity.com:CVE-2017-5715 MISC:packetstormsecurity.com:CVE-2017-5753 MISC:seclists.org:CVE-2014-4651 MISC:security.360.cn:CVE-2016-8610 MISC:security.googleblog.com:CVE-2017-5754 MISC:spectreattack.com:CVE-2017-5753 MISC:w1.fi MISC:w1.fi:CVE-2017-13088 MISC:web.archive.org:CVE-2013-7285 MISC:wiki.mozilla.org:CVE-2016-9843 MISC:www.arista.com:CVE-2016-6306 MISC:www.debian.org:CVE-2014-4172 MISC:www.krackattacks.com:CVE-2017-13088 MISC:www.mail-archive.com:CVE-2014-4172 MISC:www.openssl.org:CVE-2016-6302 MISC:www.oracle.com:CVE-2013-7285 MISC:www.oracle.com:CVE-2014-0107 MISC:www.oracle.com:CVE-2014-3596 MISC:www.oracle.com:CVE-2015-0226 MISC:www.oracle.com:CVE-2015-7501 MISC:www.oracle.com:CVE-2016-1000031 MISC:www.oracle.com:CVE-2019-0217 MISC:www.oracle.com:CVE-2019-2880 MLIST:[activemq-issues] 20190718 [jira] [Updated] (AMQ-7236) SEV-1 Security vulnerability in spring-expression-4.3.11.RELEASE.jar (spring framework) and xstream-1.4.10.jar MLIST:[activemq-issues] 20190826 [jira] [Created] (AMQ-7288) Security Vulnerabilities in ActiveMQ dependent libraries. MLIST:[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update MLIST:[debian-lts-announce] 20180107 [SECURITY] [DLA 1232-1] linux security update MLIST:[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update MLIST:[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update MLIST:[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update MLIST:[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package MLIST:[debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update MLIST:[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update MLIST:[debian-lts-announce] 20181105 [SECURITY] [DLA 1566-1] mysql-5.5 security update MLIST:[debian-lts-announce] 20181113 [SECURITY] [DLA 1573-1] firmware-nonfree security update MLIST:[debian-lts-announce] 20181122 [SECURITY] [DLA 1590-1] openjdk-7 security update MLIST:[debian-lts-announce] 20190324 [SECURITY] [DLA 1725-1] rsync security update MLIST:[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update MLIST:[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update MLIST:[debian-lts-announce] 20200129 [SECURITY] [DLA 2085-1] zlib security update MLIST:[debian-lts-announce] 20200320 [SECURITY] [DLA 2148-1] amd64-microcode security update MLIST:[oss-security] 20091120 CVE request: php 5.3.1 update MLIST:[oss-security] 20091120 Re: CVE request: php 5.3.1 update MLIST:[oss-security] 20140109 Re: CVE request: remote code execution via deserialization in XStream MLIST:[oss-security] 20160423 Re: CVE request: PHP issues fixed in 7.0.5, 5.6.20 and 5.5.34 releases MLIST:[oss-security] 20160608 CVE-2016-2177: OpenSSL undefined pointer arithmetic MLIST:[oss-security] 20161205 Re: CVE Request: zlib security issues found during audit MLIST:[php-announce] 20091119 5.3.1 Release announcement MLIST:[tomcat-dev] 20190319 svn commit: r1855831 [24/30] - in /tomcat/site/trunk: ./ docs/ xdocs/ MLIST:[tomcat-dev] 20190319 svn commit: r1855831 [25/30] - in /tomcat/site/trunk: ./ docs/ xdocs/ MLIST:[tomcat-dev] 20190325 svn commit: r1856174 [22/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/ MLIST:[tomcat-dev] 20190325 svn commit: r1856174 [23/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/ MLIST:[tomcat-dev] 20190325 svn commit: r1856174 [24/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/ MLIST:[tomcat-dev] 20190413 svn commit: r1857494 [16/20] - in /tomcat/site/trunk: ./ docs/ xdocs/ MLIST:[tomcat-dev] 20190413 svn commit: r1857494 [17/20] - in /tomcat/site/trunk: ./ docs/ xdocs/ MLIST:[tomcat-dev] 20190413 svn commit: r1857496 [3/4] - in /tomcat/site/trunk: ./ docs/ xdocs/ MLIST:[tomcat-dev] 20190415 svn commit: r1857582 [17/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/ MLIST:[tomcat-dev] 20190415 svn commit: r1857582 [18/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/ MLIST:[tomcat-dev] 20190415 svn commit: r1857582 [19/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/ MLIST:[tomcat-users] 20170606 [SECURITY] CVE-2017-5664 Apache Tomcat Security Constraint Bypass MLIST:[xstream-user] 20130717 Re: Is it possible to unregister the DynamicProxyConverter using the SpringOXM wrapper MLIST:[xstream-user] 20130718 Re: Is it possible to unregister the DynamicProxyConverter using the SpringOXM wrapper OSS:2016/Q2/362 OSS:2016/Q2/500 OSS:2016/Q4/224 OSS:2016/Q4/602 OSS:2017/Q4/83 OSS:2018/Q1/10 OSS:2018/Q1/180 OSS:2018/Q1/181 OSS:2018/Q1/258 OSS:2018/Q1/3 OSS:2018/Q1/32 OSS:2018/Q1/35 OSS:2018/Q1/40 OSS:2018/Q1/44 OSS:2018/Q1/45 OSS:2018/Q1/55 OSS:2018/Q1/60 OSS:2018/Q1/65 OSS:2018/Q1/9 OSS:2018/Q2/21 OSS:2018/Q4/155 OSS:2022/08/08/8 OSS:2022/08/09/4 OSS:2022/08/15/1 OSS:2022/11/10/2 OSS:2022/Q3/99 OSS:2022/Q4/132 OSS:2022/Q4/135 OSS:2024/03/27/4 OSS:2024/Q1/256 Oracle:CVE-2011-4461 Oracle:CVE-2013-1768 Oracle:CVE-2013-2566 Oracle:CVE-2014-0107 Oracle:CVE-2014-0114 Oracle:CVE-2014-3490 Oracle:CVE-2014-3577 Oracle:CVE-2015-0204 Oracle:CVE-2015-0226 Oracle:CVE-2015-0235 Oracle:CVE-2015-1832 Oracle:CVE-2015-3253 Oracle:CVE-2015-5600 Oracle:CVE-2015-6937 Oracle:CVE-2015-7501 Oracle:CVE-2015-7940 Oracle:CVE-2015-8965 Oracle:CVE-2015-9251 Oracle:CVE-2016-0635 Oracle:CVE-2016-0714 Oracle:CVE-2016-0729 Oracle:CVE-2016-1000031 Oracle:CVE-2016-1181 Oracle:CVE-2016-1182 Oracle:CVE-2016-2099 Oracle:CVE-2016-2107 Oracle:CVE-2016-2141 Oracle:CVE-2016-2176 Oracle:CVE-2016-2179 Oracle:CVE-2016-2183 Oracle:CVE-2016-2510 Oracle:CVE-2016-3092 Oracle:CVE-2016-3506 Oracle:CVE-2016-3739 Oracle:CVE-2016-4000 Oracle:CVE-2016-4055 Oracle:CVE-2016-5007 Oracle:CVE-2016-5019 Oracle:CVE-2016-5080 Oracle:CVE-2016-5195 Oracle:CVE-2016-5244 Oracle:CVE-2016-5385 Oracle:CVE-2016-5616 Oracle:CVE-2016-5617 Oracle:CVE-2016-5684 Oracle:CVE-2016-6304 Oracle:CVE-2016-6814 Oracle:CVE-2016-7103 Oracle:CVE-2016-7167 Oracle:CVE-2016-9389 Oracle:CVE-2016-9392 Oracle:CVE-2016-9583 Oracle:CVE-2016-9841 Oracle:CVE-2016-9843 Oracle:CVE-2016-9878 Oracle:CVE-2017-0379 Oracle:CVE-2017-10068 Oracle:CVE-2017-12617 Oracle:CVE-2017-13077 Oracle:CVE-2017-13082 Oracle:CVE-2017-13745 Oracle:CVE-2017-14229 Oracle:CVE-2017-14735 Oracle:CVE-2017-15095 Oracle:CVE-2017-17562 Oracle:CVE-2017-3633 Oracle:CVE-2017-3732 Oracle:CVE-2017-3736 Oracle:CVE-2017-3737 Oracle:CVE-2017-5533 Oracle:CVE-2017-5645 Oracle:CVE-2017-5662 Oracle:CVE-2017-5664 Oracle:CVE-2017-5715 Oracle:CVE-2017-5753 Oracle:CVE-2017-5754 Oracle:CVE-2017-6074 Oracle:CVE-2017-7525 Oracle:CVE-2017-7658 Oracle:CVE-2017-7805 Oracle:CVE-2017-9798 Oracle:CVE-2018-0732 Oracle:CVE-2018-0734 Oracle:CVE-2018-0739 Oracle:CVE-2018-1000120 Oracle:CVE-2018-1000180 Oracle:CVE-2018-1000300 Oracle:CVE-2018-1000632 Oracle:CVE-2018-10933 Oracle:CVE-2018-11039 Oracle:CVE-2018-11212 Oracle:CVE-2018-1171 Oracle:CVE-2018-11763 Oracle:CVE-2018-11775 Oracle:CVE-2018-11776 Oracle:CVE-2018-11784 Oracle:CVE-2018-1258 Oracle:CVE-2018-1275 Oracle:CVE-2018-1305 Oracle:CVE-2018-13785 Oracle:CVE-2018-14718 Oracle:CVE-2018-14721 Oracle:CVE-2018-1656 Oracle:CVE-2018-2562 Oracle:CVE-2018-2563 Oracle:CVE-2018-2572 Oracle:CVE-2018-2587 Oracle:CVE-2018-2598 Oracle:CVE-2018-2612 Oracle:CVE-2018-2622 Oracle:CVE-2018-2628 Oracle:CVE-2018-2640 Oracle:CVE-2018-2665 Oracle:CVE-2018-2668 Oracle:CVE-2018-2718 Oracle:CVE-2018-2737 Oracle:CVE-2018-2738 Oracle:CVE-2018-2739 Oracle:CVE-2018-2742 Oracle:CVE-2018-2746 Oracle:CVE-2018-2747 Oracle:CVE-2018-2748 Oracle:CVE-2018-2749 Oracle:CVE-2018-2750 Oracle:CVE-2018-2752 Oracle:CVE-2018-2753 Oracle:CVE-2018-2754 Oracle:CVE-2018-2755 Oracle:CVE-2018-2756 Oracle:CVE-2018-2758 Oracle:CVE-2018-2759 Oracle:CVE-2018-2760 Oracle:CVE-2018-2761 Oracle:CVE-2018-2762 Oracle:CVE-2018-2763 Oracle:CVE-2018-2764 Oracle:CVE-2018-2765 Oracle:CVE-2018-2766 Oracle:CVE-2018-2767 Oracle:CVE-2018-2768 Oracle:CVE-2018-2769 Oracle:CVE-2018-2770 Oracle:CVE-2018-2771 Oracle:CVE-2018-2772 Oracle:CVE-2018-2773 Oracle:CVE-2018-2774 Oracle:CVE-2018-2775 Oracle:CVE-2018-2776 Oracle:CVE-2018-2777 Oracle:CVE-2018-2778 Oracle:CVE-2018-2779 Oracle:CVE-2018-2780 Oracle:CVE-2018-2781 Oracle:CVE-2018-2782 Oracle:CVE-2018-2783 Oracle:CVE-2018-2784 Oracle:CVE-2018-2785 Oracle:CVE-2018-2786 Oracle:CVE-2018-2787 Oracle:CVE-2018-2788 Oracle:CVE-2018-2789 Oracle:CVE-2018-2790 Oracle:CVE-2018-2791 Oracle:CVE-2018-2792 Oracle:CVE-2018-2793 Oracle:CVE-2018-2794 Oracle:CVE-2018-2795 Oracle:CVE-2018-2796 Oracle:CVE-2018-2797 Oracle:CVE-2018-2798 Oracle:CVE-2018-2799 Oracle:CVE-2018-2800 Oracle:CVE-2018-2801 Oracle:CVE-2018-2804 Oracle:CVE-2018-2805 Oracle:CVE-2018-2806 Oracle:CVE-2018-2807 Oracle:CVE-2018-2808 Oracle:CVE-2018-2809 Oracle:CVE-2018-2810 Oracle:CVE-2018-2811 Oracle:CVE-2018-2812 Oracle:CVE-2018-2813 Oracle:CVE-2018-2814 Oracle:CVE-2018-2815 Oracle:CVE-2018-2816 Oracle:CVE-2018-2817 Oracle:CVE-2018-2818 Oracle:CVE-2018-2819 Oracle:CVE-2018-2820 Oracle:CVE-2018-2821 Oracle:CVE-2018-2822 Oracle:CVE-2018-2823 Oracle:CVE-2018-2825 Oracle:CVE-2018-2826 Oracle:CVE-2018-2827 Oracle:CVE-2018-2828 Oracle:CVE-2018-2830 Oracle:CVE-2018-2831 Oracle:CVE-2018-2832 Oracle:CVE-2018-2834 Oracle:CVE-2018-2835 Oracle:CVE-2018-2836 Oracle:CVE-2018-2837 Oracle:CVE-2018-2838 Oracle:CVE-2018-2839 Oracle:CVE-2018-2840 Oracle:CVE-2018-2841 Oracle:CVE-2018-2842 Oracle:CVE-2018-2843 Oracle:CVE-2018-2844 Oracle:CVE-2018-2845 Oracle:CVE-2018-2846 Oracle:CVE-2018-2849 Oracle:CVE-2018-2850 Oracle:CVE-2018-2852 Oracle:CVE-2018-2854 Oracle:CVE-2018-2855 Oracle:CVE-2018-2856 Oracle:CVE-2018-2857 Oracle:CVE-2018-2858 Oracle:CVE-2018-2859 Oracle:CVE-2018-2860 Oracle:CVE-2018-2861 Oracle:CVE-2018-2862 Oracle:CVE-2018-2863 Oracle:CVE-2018-2864 Oracle:CVE-2018-2865 Oracle:CVE-2018-2866 Oracle:CVE-2018-2867 Oracle:CVE-2018-2868 Oracle:CVE-2018-2869 Oracle:CVE-2018-2870 Oracle:CVE-2018-2871 Oracle:CVE-2018-2872 Oracle:CVE-2018-2873 Oracle:CVE-2018-2874 Oracle:CVE-2018-2876 Oracle:CVE-2018-2877 Oracle:CVE-2018-2878 Oracle:CVE-2018-2879 Oracle:CVE-2018-2881 Oracle:CVE-2018-2882 Oracle:CVE-2018-2887 Oracle:CVE-2018-2888 Oracle:CVE-2018-2889 Oracle:CVE-2018-2891 Oracle:CVE-2018-2892 Oracle:CVE-2018-2893 Oracle:CVE-2018-2894 Oracle:CVE-2018-2895 Oracle:CVE-2018-2896 Oracle:CVE-2018-2897 Oracle:CVE-2018-2898 Oracle:CVE-2018-2899 Oracle:CVE-2018-2900 Oracle:CVE-2018-2901 Oracle:CVE-2018-2902 Oracle:CVE-2018-2903 Oracle:CVE-2018-2904 Oracle:CVE-2018-2905 Oracle:CVE-2018-2906 Oracle:CVE-2018-2907 Oracle:CVE-2018-2908 Oracle:CVE-2018-2909 Oracle:CVE-2018-2911 Oracle:CVE-2018-2912 Oracle:CVE-2018-2913 Oracle:CVE-2018-2914 Oracle:CVE-2018-2915 Oracle:CVE-2018-2916 Oracle:CVE-2018-2917 Oracle:CVE-2018-2918 Oracle:CVE-2018-2919 Oracle:CVE-2018-2920 Oracle:CVE-2018-2921 Oracle:CVE-2018-2922 Oracle:CVE-2018-2923 Oracle:CVE-2018-2924 Oracle:CVE-2018-2925 Oracle:CVE-2018-2926 Oracle:CVE-2018-2927 Oracle:CVE-2018-2928 Oracle:CVE-2018-2929 Oracle:CVE-2018-2930 Oracle:CVE-2018-2932 Oracle:CVE-2018-2933 Oracle:CVE-2018-2934 Oracle:CVE-2018-2935 Oracle:CVE-2018-2936 Oracle:CVE-2018-2937 Oracle:CVE-2018-2938 Oracle:CVE-2018-2939 Oracle:CVE-2018-2940 Oracle:CVE-2018-2941 Oracle:CVE-2018-2942 Oracle:CVE-2018-2943 Oracle:CVE-2018-2944 Oracle:CVE-2018-2945 Oracle:CVE-2018-2946 Oracle:CVE-2018-2947 Oracle:CVE-2018-2948 Oracle:CVE-2018-2949 Oracle:CVE-2018-2950 Oracle:CVE-2018-2951 Oracle:CVE-2018-2952 Oracle:CVE-2018-2953 Oracle:CVE-2018-2954 Oracle:CVE-2018-2955 Oracle:CVE-2018-2956 Oracle:CVE-2018-2957 Oracle:CVE-2018-2958 Oracle:CVE-2018-2959 Oracle:CVE-2018-2960 Oracle:CVE-2018-2961 Oracle:CVE-2018-2962 Oracle:CVE-2018-2963 Oracle:CVE-2018-2964 Oracle:CVE-2018-2965 Oracle:CVE-2018-2966 Oracle:CVE-2018-2967 Oracle:CVE-2018-2968 Oracle:CVE-2018-2969 Oracle:CVE-2018-2970 Oracle:CVE-2018-2971 Oracle:CVE-2018-2972 Oracle:CVE-2018-2973 Oracle:CVE-2018-2974 Oracle:CVE-2018-2975 Oracle:CVE-2018-2976 Oracle:CVE-2018-2977 Oracle:CVE-2018-2979 Oracle:CVE-2018-2980 Oracle:CVE-2018-2981 Oracle:CVE-2018-2982 Oracle:CVE-2018-2984 Oracle:CVE-2018-2985 Oracle:CVE-2018-2986 Oracle:CVE-2018-2987 Oracle:CVE-2018-2988 Oracle:CVE-2018-2989 Oracle:CVE-2018-2990 Oracle:CVE-2018-2991 Oracle:CVE-2018-2992 Oracle:CVE-2018-2993 Oracle:CVE-2018-2994 Oracle:CVE-2018-2995 Oracle:CVE-2018-2996 Oracle:CVE-2018-2997 Oracle:CVE-2018-2998 Oracle:CVE-2018-2999 Oracle:CVE-2018-3000 Oracle:CVE-2018-3001 Oracle:CVE-2018-3002 Oracle:CVE-2018-3003 Oracle:CVE-2018-3004 Oracle:CVE-2018-3005 Oracle:CVE-2018-3006 Oracle:CVE-2018-3007 Oracle:CVE-2018-3008 Oracle:CVE-2018-3009 Oracle:CVE-2018-3010 Oracle:CVE-2018-3011 Oracle:CVE-2018-3012 Oracle:CVE-2018-3013 Oracle:CVE-2018-3014 Oracle:CVE-2018-3015 Oracle:CVE-2018-3016 Oracle:CVE-2018-3017 Oracle:CVE-2018-3018 Oracle:CVE-2018-3019 Oracle:CVE-2018-3020 Oracle:CVE-2018-3021 Oracle:CVE-2018-3022 Oracle:CVE-2018-3023 Oracle:CVE-2018-3024 Oracle:CVE-2018-3025 Oracle:CVE-2018-3026 Oracle:CVE-2018-3027 Oracle:CVE-2018-3028 Oracle:CVE-2018-3029 Oracle:CVE-2018-3030 Oracle:CVE-2018-3031 Oracle:CVE-2018-3032 Oracle:CVE-2018-3033 Oracle:CVE-2018-3034 Oracle:CVE-2018-3035 Oracle:CVE-2018-3036 Oracle:CVE-2018-3037 Oracle:CVE-2018-3038 Oracle:CVE-2018-3039 Oracle:CVE-2018-3040 Oracle:CVE-2018-3041 Oracle:CVE-2018-3042 Oracle:CVE-2018-3043 Oracle:CVE-2018-3044 Oracle:CVE-2018-3045 Oracle:CVE-2018-3046 Oracle:CVE-2018-3047 Oracle:CVE-2018-3048 Oracle:CVE-2018-3049 Oracle:CVE-2018-3050 Oracle:CVE-2018-3051 Oracle:CVE-2018-3052 Oracle:CVE-2018-3053 Oracle:CVE-2018-3054 Oracle:CVE-2018-3055 Oracle:CVE-2018-3056 Oracle:CVE-2018-3057 Oracle:CVE-2018-3058 Oracle:CVE-2018-3059 Oracle:CVE-2018-3060 Oracle:CVE-2018-3061 Oracle:CVE-2018-3062 Oracle:CVE-2018-3063 Oracle:CVE-2018-3064 Oracle:CVE-2018-3065 Oracle:CVE-2018-3066 Oracle:CVE-2018-3067 Oracle:CVE-2018-3068 Oracle:CVE-2018-3069 Oracle:CVE-2018-3070 Oracle:CVE-2018-3071 Oracle:CVE-2018-3072 Oracle:CVE-2018-3073 Oracle:CVE-2018-3074 Oracle:CVE-2018-3075 Oracle:CVE-2018-3076 Oracle:CVE-2018-3077 Oracle:CVE-2018-3078 Oracle:CVE-2018-3079 Oracle:CVE-2018-3080 Oracle:CVE-2018-3081 Oracle:CVE-2018-3082 Oracle:CVE-2018-3084 Oracle:CVE-2018-3085 Oracle:CVE-2018-3086 Oracle:CVE-2018-3087 Oracle:CVE-2018-3088 Oracle:CVE-2018-3089 Oracle:CVE-2018-3090 Oracle:CVE-2018-3091 Oracle:CVE-2018-3092 Oracle:CVE-2018-3093 Oracle:CVE-2018-3094 Oracle:CVE-2018-3095 Oracle:CVE-2018-3096 Oracle:CVE-2018-3097 Oracle:CVE-2018-3098 Oracle:CVE-2018-3099 Oracle:CVE-2018-3100 Oracle:CVE-2018-3101 Oracle:CVE-2018-3102 Oracle:CVE-2018-3103 Oracle:CVE-2018-3104 Oracle:CVE-2018-3105 Oracle:CVE-2018-3108 Oracle:CVE-2018-3109 Oracle:CVE-2018-3115 Oracle:CVE-2018-3122 Oracle:CVE-2018-3125 Oracle:CVE-2018-3126 Oracle:CVE-2018-3127 Oracle:CVE-2018-3128 Oracle:CVE-2018-3129 Oracle:CVE-2018-3130 Oracle:CVE-2018-3131 Oracle:CVE-2018-3132 Oracle:CVE-2018-3133 Oracle:CVE-2018-3134 Oracle:CVE-2018-3135 Oracle:CVE-2018-3136 Oracle:CVE-2018-3137 Oracle:CVE-2018-3138 Oracle:CVE-2018-3139 Oracle:CVE-2018-3140 Oracle:CVE-2018-3141 Oracle:CVE-2018-3142 Oracle:CVE-2018-3143 Oracle:CVE-2018-3144 Oracle:CVE-2018-3145 Oracle:CVE-2018-3146 Oracle:CVE-2018-3147 Oracle:CVE-2018-3148 Oracle:CVE-2018-3149 Oracle:CVE-2018-3150 Oracle:CVE-2018-3151 Oracle:CVE-2018-3152 Oracle:CVE-2018-3153 Oracle:CVE-2018-3154 Oracle:CVE-2018-3155 Oracle:CVE-2018-3156 Oracle:CVE-2018-3157 Oracle:CVE-2018-3158 Oracle:CVE-2018-3159 Oracle:CVE-2018-3160 Oracle:CVE-2018-3161 Oracle:CVE-2018-3162 Oracle:CVE-2018-3163 Oracle:CVE-2018-3164 Oracle:CVE-2018-3165 Oracle:CVE-2018-3166 Oracle:CVE-2018-3167 Oracle:CVE-2018-3168 Oracle:CVE-2018-3169 Oracle:CVE-2018-3170 Oracle:CVE-2018-3171 Oracle:CVE-2018-3172 Oracle:CVE-2018-3173 Oracle:CVE-2018-3174 Oracle:CVE-2018-3175 Oracle:CVE-2018-3176 Oracle:CVE-2018-3177 Oracle:CVE-2018-3178 Oracle:CVE-2018-3179 Oracle:CVE-2018-3180 Oracle:CVE-2018-3181 Oracle:CVE-2018-3182 Oracle:CVE-2018-3183 Oracle:CVE-2018-3184 Oracle:CVE-2018-3185 Oracle:CVE-2018-3186 Oracle:CVE-2018-3187 Oracle:CVE-2018-3188 Oracle:CVE-2018-3189 Oracle:CVE-2018-3190 Oracle:CVE-2018-3191 Oracle:CVE-2018-3192 Oracle:CVE-2018-3193 Oracle:CVE-2018-3194 Oracle:CVE-2018-3195 Oracle:CVE-2018-3196 Oracle:CVE-2018-3197 Oracle:CVE-2018-3198 Oracle:CVE-2018-3200 Oracle:CVE-2018-3201 Oracle:CVE-2018-3202 Oracle:CVE-2018-3203 Oracle:CVE-2018-3204 Oracle:CVE-2018-3205 Oracle:CVE-2018-3206 Oracle:CVE-2018-3207 Oracle:CVE-2018-3208 Oracle:CVE-2018-3209 Oracle:CVE-2018-3210 Oracle:CVE-2018-3211 Oracle:CVE-2018-3212 Oracle:CVE-2018-3213 Oracle:CVE-2018-3214 Oracle:CVE-2018-3215 Oracle:CVE-2018-3217 Oracle:CVE-2018-3218 Oracle:CVE-2018-3219 Oracle:CVE-2018-3220 Oracle:CVE-2018-3221 Oracle:CVE-2018-3222 Oracle:CVE-2018-3223 Oracle:CVE-2018-3224 Oracle:CVE-2018-3225 Oracle:CVE-2018-3226 Oracle:CVE-2018-3227 Oracle:CVE-2018-3228 Oracle:CVE-2018-3229 Oracle:CVE-2018-3230 Oracle:CVE-2018-3231 Oracle:CVE-2018-3232 Oracle:CVE-2018-3233 Oracle:CVE-2018-3234 Oracle:CVE-2018-3235 Oracle:CVE-2018-3236 Oracle:CVE-2018-3237 Oracle:CVE-2018-3238 Oracle:CVE-2018-3239 Oracle:CVE-2018-3241 Oracle:CVE-2018-3242 Oracle:CVE-2018-3243 Oracle:CVE-2018-3244 Oracle:CVE-2018-3245 Oracle:CVE-2018-3246 Oracle:CVE-2018-3247 Oracle:CVE-2018-3248 Oracle:CVE-2018-3249 Oracle:CVE-2018-3250 Oracle:CVE-2018-3251 Oracle:CVE-2018-3252 Oracle:CVE-2018-3253 Oracle:CVE-2018-3254 Oracle:CVE-2018-3255 Oracle:CVE-2018-3256 Oracle:CVE-2018-3257 Oracle:CVE-2018-3258 Oracle:CVE-2018-3259 Oracle:CVE-2018-3261 Oracle:CVE-2018-3262 Oracle:CVE-2018-3263 Oracle:CVE-2018-3264 Oracle:CVE-2018-3265 Oracle:CVE-2018-3266 Oracle:CVE-2018-3267 Oracle:CVE-2018-3268 Oracle:CVE-2018-3269 Oracle:CVE-2018-3270 Oracle:CVE-2018-3271 Oracle:CVE-2018-3272 Oracle:CVE-2018-3273 Oracle:CVE-2018-3274 Oracle:CVE-2018-3275 Oracle:CVE-2018-3276 Oracle:CVE-2018-3277 Oracle:CVE-2018-3278 Oracle:CVE-2018-3279 Oracle:CVE-2018-3280 Oracle:CVE-2018-3281 Oracle:CVE-2018-3282 Oracle:CVE-2018-3283 Oracle:CVE-2018-3284 Oracle:CVE-2018-3285 Oracle:CVE-2018-3286 Oracle:CVE-2018-3287 Oracle:CVE-2018-3288 Oracle:CVE-2018-3289 Oracle:CVE-2018-3290 Oracle:CVE-2018-3291 Oracle:CVE-2018-3292 Oracle:CVE-2018-3293 Oracle:CVE-2018-3294 Oracle:CVE-2018-3295 Oracle:CVE-2018-3296 Oracle:CVE-2018-3297 Oracle:CVE-2018-3298 Oracle:CVE-2018-3299 Oracle:CVE-2018-3301 Oracle:CVE-2018-3302 Oracle:CVE-2018-3303 Oracle:CVE-2018-3304 Oracle:CVE-2018-3305 Oracle:CVE-2018-3309 Oracle:CVE-2018-3311 Oracle:CVE-2018-3639 Oracle:CVE-2018-3646 Oracle:CVE-2018-5390 Oracle:CVE-2018-7489 Oracle:CVE-2018-8013 Oracle:CVE-2018-8014 Oracle:CVE-2018-8037 Oracle:CVE-2018-8088 Oracle:CVE-2018-9206 Oracle:CVE-2019-10173 Oracle:CVE-2019-1559 Oracle:CVE-2019-2395 Oracle:CVE-2019-2396 Oracle:CVE-2019-2397 Oracle:CVE-2019-2398 Oracle:CVE-2019-2399 Oracle:CVE-2019-2400 Oracle:CVE-2019-2401 Oracle:CVE-2019-2402 Oracle:CVE-2019-2403 Oracle:CVE-2019-2404 Oracle:CVE-2019-2405 Oracle:CVE-2019-2406 Oracle:CVE-2019-2407 Oracle:CVE-2019-2408 Oracle:CVE-2019-2409 Oracle:CVE-2019-2410 Oracle:CVE-2019-2411 Oracle:CVE-2019-2412 Oracle:CVE-2019-2413 Oracle:CVE-2019-2414 Oracle:CVE-2019-2415 Oracle:CVE-2019-2416 Oracle:CVE-2019-2417 Oracle:CVE-2019-2418 Oracle:CVE-2019-2419 Oracle:CVE-2019-2420 Oracle:CVE-2019-2421 Oracle:CVE-2019-2422 Oracle:CVE-2019-2423 Oracle:CVE-2019-2425 Oracle:CVE-2019-2426 Oracle:CVE-2019-2427 Oracle:CVE-2019-2429 Oracle:CVE-2019-2430 Oracle:CVE-2019-2431 Oracle:CVE-2019-2432 Oracle:CVE-2019-2433 Oracle:CVE-2019-2434 Oracle:CVE-2019-2435 Oracle:CVE-2019-2436 Oracle:CVE-2019-2437 Oracle:CVE-2019-2438 Oracle:CVE-2019-2439 Oracle:CVE-2019-2440 Oracle:CVE-2019-2441 Oracle:CVE-2019-2442 Oracle:CVE-2019-2443 Oracle:CVE-2019-2444 Oracle:CVE-2019-2445 Oracle:CVE-2019-2446 Oracle:CVE-2019-2447 Oracle:CVE-2019-2448 Oracle:CVE-2019-2449 Oracle:CVE-2019-2450 Oracle:CVE-2019-2451 Oracle:CVE-2019-2452 Oracle:CVE-2019-2453 Oracle:CVE-2019-2455 Oracle:CVE-2019-2456 Oracle:CVE-2019-2457 Oracle:CVE-2019-2458 Oracle:CVE-2019-2459 Oracle:CVE-2019-2460 Oracle:CVE-2019-2461 Oracle:CVE-2019-2462 Oracle:CVE-2019-2463 Oracle:CVE-2019-2464 Oracle:CVE-2019-2465 Oracle:CVE-2019-2466 Oracle:CVE-2019-2467 Oracle:CVE-2019-2468 Oracle:CVE-2019-2469 Oracle:CVE-2019-2470 Oracle:CVE-2019-2471 Oracle:CVE-2019-2472 Oracle:CVE-2019-2473 Oracle:CVE-2019-2474 Oracle:CVE-2019-2475 Oracle:CVE-2019-2476 Oracle:CVE-2019-2477 Oracle:CVE-2019-2478 Oracle:CVE-2019-2479 Oracle:CVE-2019-2480 Oracle:CVE-2019-2481 Oracle:CVE-2019-2482 Oracle:CVE-2019-2485 Oracle:CVE-2019-2486 Oracle:CVE-2019-2487 Oracle:CVE-2019-2488 Oracle:CVE-2019-2489 Oracle:CVE-2019-2490 Oracle:CVE-2019-2491 Oracle:CVE-2019-2492 Oracle:CVE-2019-2493 Oracle:CVE-2019-2494 Oracle:CVE-2019-2495 Oracle:CVE-2019-2496 Oracle:CVE-2019-2497 Oracle:CVE-2019-2498 Oracle:CVE-2019-2499 Oracle:CVE-2019-2500 Oracle:CVE-2019-2501 Oracle:CVE-2019-2502 Oracle:CVE-2019-2503 Oracle:CVE-2019-2504 Oracle:CVE-2019-2505 Oracle:CVE-2019-2506 Oracle:CVE-2019-2507 Oracle:CVE-2019-2508 Oracle:CVE-2019-2509 Oracle:CVE-2019-2510 Oracle:CVE-2019-2511 Oracle:CVE-2019-2512 Oracle:CVE-2019-2513 Oracle:CVE-2019-2519 Oracle:CVE-2019-2520 Oracle:CVE-2019-2521 Oracle:CVE-2019-2522 Oracle:CVE-2019-2523 Oracle:CVE-2019-2524 Oracle:CVE-2019-2525 Oracle:CVE-2019-2526 Oracle:CVE-2019-2527 Oracle:CVE-2019-2528 Oracle:CVE-2019-2529 Oracle:CVE-2019-2530 Oracle:CVE-2019-2531 Oracle:CVE-2019-2532 Oracle:CVE-2019-2533 Oracle:CVE-2019-2534 Oracle:CVE-2019-2535 Oracle:CVE-2019-2536 Oracle:CVE-2019-2537 Oracle:CVE-2019-2538 Oracle:CVE-2019-2539 Oracle:CVE-2019-2540 Oracle:CVE-2019-2541 Oracle:CVE-2019-2543 Oracle:CVE-2019-2544 Oracle:CVE-2019-2545 Oracle:CVE-2019-2546 Oracle:CVE-2019-2547 Oracle:CVE-2019-2548 Oracle:CVE-2019-2549 Oracle:CVE-2019-2550 Oracle:CVE-2019-2552 Oracle:CVE-2019-2553 Oracle:CVE-2019-2554 Oracle:CVE-2019-2555 Oracle:CVE-2019-2556 Oracle:CVE-2019-2762 Oracle:CVE-2019-2766 Oracle:CVE-2019-2769 Oracle:CVE-2019-2786 Oracle:CVE-2019-2816 Oracle:CVE-2019-7317 Oracle:CVE-2021-4160 RH:CVE-2016-2177 RH:CVE-2016-3739 RH:CVE-2016-8610 RH:CVE-2016-9840 RH:CVE-2016-9841 RH:CVE-2016-9842 RH:CVE-2016-9843 RH:CVE-2017-13077 RH:CVE-2017-13078 RH:CVE-2017-13079 RH:CVE-2017-13080 RH:CVE-2017-13081 RH:CVE-2017-13082 RH:CVE-2017-13084 RH:CVE-2017-13086 RH:CVE-2017-13087 RH:CVE-2017-13088 RH:CVE-2017-3738 RH:CVE-2017-5664 RH:CVE-2017-5715 RH:CVE-2017-5753 RH:CVE-2017-5754 RH:CVE-2018-1000872 RH:CVE-2018-12539 RH:CVE-2018-1517 RH:CVE-2018-1656 RH:CVE-2018-2767 RH:CVE-2018-2938 RH:CVE-2018-2940 RH:CVE-2018-2973 RH:CVE-2018-3136 RH:CVE-2018-3139 RH:CVE-2018-3149 RH:CVE-2018-3169 RH:CVE-2018-3180 RH:CVE-2018-3183 RH:CVE-2018-3209 RH:CVE-2018-3211 RH:CVE-2018-3214 RHBA-2018:0042 RHSA-2014:0216 RHSA-2014:0294 RHSA-2014:0323 RHSA-2014:0371 RHSA-2014:0372 RHSA-2014:0374 RHSA-2014:0389 RHSA-2014:0452 RHSA-2014:0474 RHSA-2014:0497 RHSA-2014:0498 RHSA-2014:0500 RHSA-2014:0511 RHSA-2014:1007 RHSA-2014:1011 RHSA-2014:1039 RHSA-2014:1040 RHSA-2014:1059 RHSA-2014:1298 RHSA-2014:1904 RHSA-2015:0125 RHSA-2015:0234 RHSA-2015:0235 RHSA-2015:0675 RHSA-2015:0720 RHSA-2015:0765 RHSA-2015:1009 RHSA-2015:1176 RHSA-2015:1485 RHSA-2015:1486 RHSA-2015:1488 RHSA-2015:1544 RHSA-2015:1604 RHSA-2015:1888 RHSA-2016:1940 RHSA-2016:2035 RHSA-2016:2036 RHSA-2016:2130 RHSA-2016:2131 RHSA-2016:2595 RHSA-2016:2749 RHSA-2016:2750 RHSA-2016:2927 RHSA-2016:2928 RHSA-2016:2957 RHSA-2017:0184 RHSA-2017:0193 RHSA-2017:0194 RHSA-2017:0272 RHSA-2017:0286 RHSA-2017:0574 RHSA-2017:0868 RHSA-2017:1208 RHSA-2017:1220 RHSA-2017:1221 RHSA-2017:1222 RHSA-2017:1413 RHSA-2017:1414 RHSA-2017:1415 RHSA-2017:1658 RHSA-2017:1659 RHSA-2017:1801 RHSA-2017:1802 RHSA-2017:1809 RHSA-2017:2192 RHSA-2017:2486 RHSA-2017:2493 RHSA-2017:2494 RHSA-2017:2596 RHSA-2017:2633 RHSA-2017:2635 RHSA-2017:2636 RHSA-2017:2637 RHSA-2017:2638 RHSA-2017:2787 RHSA-2017:2886 RHSA-2017:2907 RHSA-2017:2911 RHSA-2017:2999 RHSA-2017:3046 RHSA-2017:3047 RHSA-2017:3080 RHSA-2017:3189 RHSA-2017:3190 RHSA-2017:3453 RHSA-2018:0010 RHSA-2018:0016 RHSA-2018:0017 RHSA-2018:0018 RHSA-2018:0020 RHSA-2018:0021 RHSA-2018:0022 RHSA-2018:0108 RHSA-2018:0109 RHSA-2018:0110 RHSA-2018:0111 RHSA-2018:0112 RHSA-2018:0151 RHSA-2018:0182 RHSA-2018:0279 RHSA-2018:0292 RHSA-2018:0342 RHSA-2018:0464 RHSA-2018:0478 RHSA-2018:0479 RHSA-2018:0480 RHSA-2018:0481 RHSA-2018:0496 RHSA-2018:0501 RHSA-2018:0512 RHSA-2018:0574 RHSA-2018:0576 RHSA-2018:0577 RHSA-2018:0654 RHSA-2018:0998 RHSA-2018:1062 RHSA-2018:1129 RHSA-2018:1130 RHSA-2018:1196 RHSA-2018:1216 RHSA-2018:1252 RHSA-2018:1319 RHSA-2018:1346 RHSA-2018:1374 RHSA-2018:1447 RHSA-2018:1448 RHSA-2018:1449 RHSA-2018:1450 RHSA-2018:1451 RHSA-2018:1967 RHSA-2018:2185 RHSA-2018:2186 RHSA-2018:2187 RHSA-2018:2241 RHSA-2018:2242 RHSA-2018:2253 RHSA-2018:2254 RHSA-2018:2255 RHSA-2018:2256 RHSA-2018:2283 RHSA-2018:2286 RHSA-2018:2439 RHSA-2018:2568 RHSA-2018:2569 RHSA-2018:2575 RHSA-2018:2576 RHSA-2018:2669 RHSA-2018:2712 RHSA-2018:2713 RHSA-2018:2729 RHSA-2018:2927 RHSA-2018:2942 RHSA-2018:2943 RHSA-2018:2948 RHSA-2018:3000 RHSA-2018:3001 RHSA-2018:3002 RHSA-2018:3003 RHSA-2018:3007 RHSA-2018:3008 RHSA-2018:3350 RHSA-2018:3409 RHSA-2018:3521 RHSA-2018:3533 RHSA-2018:3534 RHSA-2018:3671 RHSA-2018:3672 RHSA-2018:3779 RHSA-2018:3852 RHSA-2019:1822 RHSA-2019:1823 RHSA-2019:2995 RHSA-2019:3892 RHSA-2019:4352 RHSA-2020:0445 RHSA-2020:0727 RHSA-2020:0983 RHSA-2021:2299 RHSA-2021:2300 RHSA-2021:2301 RHSA-2021:2302 RHSA-2021:2303 RHSA-2021:2304 RHSA-2021:2305 RHSA-2021:2306 RHSA-2021:2307 RHSA-2021:2308 SECTRACK:1035907 SECTRACK:1036088 SECTRACK:1037084 SECTRACK:1038641 SECTRACK:1039427 SECTRACK:1039570 SECTRACK:1039571 SECTRACK:1039572 SECTRACK:1039573 SECTRACK:1039576 SECTRACK:1039577 SECTRACK:1039578 SECTRACK:1039581 SECTRACK:1039585 SECTRACK:1039596 SECTRACK:1039703 SECTRACK:1039978 SECTRACK:1040071 SECTRACK:1041294 SECTRACK:1041302 SECTRACK:1041432 SECTRACK:1041765 SECTRACK:1041888 SECTRACK:1041889 SLACKWARE:SSA:2016-141-01 SMASH Issue 169178 SMASH Issue 169658 SMASH Issue 173284 SMASH Issue 173285 SMASH Issue 186305 SMASH Issue 191142 SMASH Issue 196332 SMASH Issue 196703 SMASH Issue 196704 SMASH Issue 196705 SMASH Issue 203304 SMASH Issue 211038 SMASH Issue 211039 SMASH Issue 211040 SMASH Issue 212718 SMASH Issue 212926 SMASH Issue 216695 SMASH Issue 216696 SMASH Issue 216697 SMASH Issue 216698 SMASH Issue 216699 SMASH Issue 216700 SMASH Issue 216701 SMASH Issue 216795 SMASH Issue 216797 SMASH Issue 229602 SMASH Issue 232575 SMASH Issue 239691 SMASH Issue 241888 SMASH Issue 332048 SMASH Issue 398218 SMASH Issue 398219 SUSE:SUSE-SU-2016:1277 SUSE:SUSE-SU-2016:2387 SUSE:SUSE-SU-2016:2394 SUSE:SUSE-SU-2016:2458 SUSE:SUSE-SU-2016:2468 SUSE:SUSE-SU-2016:2469 SUSE:SUSE-SU-2017:2699 SUSE:SUSE-SU-2017:2700 SUSE:SUSE-SU-2017:2745 SUSE:SUSE-SU-2017:2752 SUSE:SUSE-SU-2018:0006 SUSE:SUSE-SU-2018:0007 SUSE:SUSE-SU-2018:0008 SUSE:SUSE-SU-2018:0009 SUSE:SUSE-SU-2018:0010 SUSE:SUSE-SU-2018:0011 SUSE:SUSE-SU-2018:0012 SUSE:SUSE-SU-2018:0019 SUSE:SUSE-SU-2018:0020 SUSE:openSUSE-SU-2015:0858 SUSE:openSUSE-SU-2016:1274 SUSE:openSUSE-SU-2016:1373 SUSE:openSUSE-SU-2016:2391 SUSE:openSUSE-SU-2016:2407 SUSE:openSUSE-SU-2016:2537 SUSE:openSUSE-SU-2016:3202 SUSE:openSUSE-SU-2017:0077 SUSE:openSUSE-SU-2017:0080 SUSE:openSUSE-SU-2017:2755 SUSE:openSUSE-SU-2018:0013 SUSE:openSUSE-SU-2018:0022 SUSE:openSUSE-SU-2018:0023 SUSE:openSUSE-SU-2018:0458 UBUNTU:CVE-2015-7559 UBUNTU:CVE-2016-2177 UBUNTU:CVE-2016-3739 UBUNTU:CVE-2016-8610 UBUNTU:CVE-2016-9840 UBUNTU:CVE-2016-9841 UBUNTU:CVE-2016-9842 UBUNTU:CVE-2016-9843 UBUNTU:CVE-2017-13077 UBUNTU:CVE-2017-13078 UBUNTU:CVE-2017-13079 UBUNTU:CVE-2017-13080 UBUNTU:CVE-2017-13081 UBUNTU:CVE-2017-13082 UBUNTU:CVE-2017-13084 UBUNTU:CVE-2017-13086 UBUNTU:CVE-2017-13087 UBUNTU:CVE-2017-13088 UBUNTU:CVE-2017-3738 UBUNTU:CVE-2017-5664 UBUNTU:CVE-2017-5715 UBUNTU:CVE-2017-5753 UBUNTU:CVE-2017-5754 UBUNTU:CVE-2018-1000872 UBUNTU:CVE-2018-1517 UBUNTU:CVE-2018-1656 UBUNTU:CVE-2018-2767 UBUNTU:CVE-2018-2938 UBUNTU:CVE-2018-2940 UBUNTU:CVE-2018-2952 UBUNTU:CVE-2018-2973 UBUNTU:CVE-2018-3136 UBUNTU:CVE-2018-3139 UBUNTU:CVE-2018-3149 UBUNTU:CVE-2018-3169 UBUNTU:CVE-2018-3180 UBUNTU:CVE-2018-3183 UBUNTU:CVE-2018-3209 UBUNTU:CVE-2018-3211 UBUNTU:CVE-2018-3214 UBUNTU:USN-2952-1 UBUNTU:USN-2952-2 UBUNTU:USN-3455-1 UBUNTU:USN-3516-1 UBUNTU:USN-3522-2 UBUNTU:USN-3522-3 UBUNTU:USN-3522-4 UBUNTU:USN-3523-1 UBUNTU:USN-3523-2 UBUNTU:USN-3524-2 UBUNTU:USN-3525-1 UBUNTU:USN-3531-1 UBUNTU:USN-3531-3 UBUNTU:USN-3540-1 UBUNTU:USN-3540-2 UBUNTU:USN-3541-1 UBUNTU:USN-3541-2 UBUNTU:USN-3542-1 UBUNTU:USN-3542-2 UBUNTU:USN-3549-1 UBUNTU:USN-3560-1 UBUNTU:USN-3561-1 UBUNTU:USN-3580-1 UBUNTU:USN-3581-1 UBUNTU:USN-3581-2 UBUNTU:USN-3582-1 UBUNTU:USN-3582-2 UBUNTU:USN-3583-1 UBUNTU:USN-3594-1 UBUNTU:USN-3597-1 UBUNTU:USN-3597-2 UBUNTU:USN-3620-2 UBUNTU:USN-3690-1 UBUNTU:USN-3725-1 UBUNTU:USN-3725-2 UBUNTU:USN-3777-3 UBUNTU:USN-3804-1 UBUNTU:USN-3824-1 USN-3087-1 USN-3087-2 USN-3181-1 USN-4246-1 USN-4292-1 bdo#1033297 bdo#759718 bdo#802312 bdo#802671 bdo#864447 bdo#877890 bdo#880832 bdo#880836 bdo#882136 bdo#883399 bdo#883625 bdo#884806 bdo#885345 bdo#886532 bdo#898444 bdo#898445 bdo#912848 bnc#1003579 bnc#1003580 bnc#1042910 bnc#1056061 bnc#1071906 bnc#1074578 bnc#1088681 bnc#1101644 bnc#1101645 bnc#1101651 bnc#1101653 bnc#1101656 bnc#1101675 bnc#1104668 bnc#1110018 bnc#1112142 bnc#1112143 bnc#1112144 bnc#1112146 bnc#1112147 bnc#1112148 bnc#1112150 bnc#1112151 bnc#1112152 bnc#1120767 bnc#1122292 bnc#1221668 bnc#977614 bnc#982575 bnc#982778 http://www.debian.org/security/2016/dsa-3560 http://www.debian.org/security/2017/dsa-3891 http://www.debian.org/security/2017/dsa-3892 https://curl.se/docs/CVE-2024-2466.json https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=af58be768ebb690f78530f796e92b8ae5c9a4401 https://git.php.net/?p=php-src.git%3Ba=commit%3Bh=95433e8e339dbb6b5d5541473c1661db6ba2c451 https://hackerone.com/reports/2416725 https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/a42c48e37398d76334e17089e43ccab945238b8b7896538478d76066%40%3Cannounce.tomcat.apache.org%3E https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E https://security.netapp.com/advisory/ntap-20240503-0010/ linux.git:commit:05992edc279237d5803d64578e0c72b604970a49 linux.git:commit:0ba2e29c7fc1d58a90fab614d41bf487e28e3840 linux.git:commit:1b72bf5a0777d7cec6c2d857ac15599022b3c123 linux.git:commit:290af86629b25ffd1ed6232c4e9107da031705cb linux.git:commit:2aad9b3e0711f8c67c472920cd5b70199fba8520 linux.git:commit:3214d01f139b7544e870fc0b7fcce8da13c1cb51 linux.git:commit:4bc352ffb39e4eec253e70f8c076f2f48a6c1926 linux.git:commit:5535be3099717646781ce1540cf725965d680e7b linux.git:commit:6167ec5c9145cdf493722dfd80a5d48bafc4a18a linux.git:commit:75f139aaf896d6fdeec2e468ddfa4b2fe469bf40 linux.git:commit:b2157399cc9898260d6031c5bfe45fe137c1fbe7 linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7 linux.git:commit:f9f5dc19509bbef6f5e675346f1a7d7b846bdb12 linux.git:commit:fdf7cb4185b60c68e1a75e61691c4afdc15dea0e openssl.git:commit:5630661aecbea5fe3c4740f5fea744a1f07a6253 rh#1051277 rh#1101303 rh#1103586 rh#1103593 rh#1103598 rh#1103600 rh#1104858 rh#1107544 rh#1107901 rh#1112877 rh#1113899 rh#1116665 rh#1131350 rh#1167537 rh#1183461 rh#1183744 rh#1202366 rh#1202380 rh#1202384 rh#1202395 rh#1202418 rh#1207198 rh#1207202 rh#1287629 rh#1293972 rh#1323114 rh#1335430 rh#1341705 rh#1369383 rh#1378936 rh#1384344 rh#1384743 rh#1386562 rh#1386564 rh#1393454 rh#1397485 rh#1399546 rh#1402345 rh#1402346 rh#1402348 rh#1402351 rh#1414133 rh#1433010 rh#1459158 rh#1491692 rh#1491693 rh#1491694 rh#1491696 rh#1491697 rh#1491698 rh#1500301 rh#1500302 rh#1500303 rh#1500304 rh#1519778 rh#1519780 rh#1519781 rh#1523510 rh#1527393 rh#1553413 rh#1564965 rh#1573699 rh#1575472 rh#1588306 rh#1588313 rh#1588314 rh#1588323 rh#1588327 rh#1588330 rh#1588688 rh#1588695 rh#1588708 rh#1588715 rh#1588721 rh#1591854 rh#1595621 rh#1599161 rh#1600925 rh#1601704 rh#1602141 rh#1602142 rh#1602145 rh#1602146 rh#1607582 rh#1608073 rh#1614973 rh#1618767 rh#1618869 rh#1618871 rh#1619846 rh#1639268 rh#1639293 rh#1639301 rh#1639442 rh#1639484 rh#1639755 rh#1639834 rh#1639904 rh#1639906 rh#1645695 rh#1660375 rh#1660385 rh#1665592 rh#1683804 rh#1686136 rh#1714979 rh#1716448 rh#1716453 rh#1716454 rh#1722971 rh#1731271 rh#1962702 rh#2027239 rh#2044599 rh#2044602 rh#2044863 rh#2048651 rh#2061700 rh#2116175 rh#2119127 rh#2161287 rh#2270497 rh#539529 rh#873317 rh#927622 xf#141681 xf#144882 |
CVE-2024-24857 | kernel-source-rt:Not affected | moderate | 6.4 (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H) | CVE-2024-24857 SMASH Issue 393023 bnc#1219616 https://bugzilla.openanolis.cn/show_bug.cgi?id=8155 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7 rh#2266247 |
CVE-2024-24858 | kernel-source-rt:Not affected | moderate | 5.3 (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-24858 L3:67844 SMASH Issue 393024 bnc#1219609 https://bugzilla.openanolis.cn/show_bug.cgi?id=8154 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html jsc#CAR-3103 linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7 rh#2266249 |
CVE-2024-24859 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-24859 L3:67844 SMASH Issue 393025 bnc#1219612 https://bugzilla.openanolis.cn/show_bug.cgi?id=8153 jsc#CAR-3099 |
CVE-2024-24860 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-24860 SMASH Issue 393026 bnc#1219608 https://bugzilla.openanolis.cn/show_bug.cgi?id=8151 |
CVE-2024-24864 | kernel-source-rt:Won't fix | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-24864 SMASH Issue 393028 bnc#1219624 https://bugzilla.openanolis.cn/show_bug.cgi?id=8178 jsc#CAR-3112 |
CVE-2024-25062 | libxml2:Released | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-25062 L3:67637 MISC:gitlab.gnome.org:CVE-2022-40304 SMASH Issue 392982 bnc#1219575 bnc#1219576 bnc#1219578 bnc#1219579 bnc#1219900 https://gitlab.gnome.org/GNOME/libxml2/-/issues/604 jsc#CAR-3098 rh#2262726 |
CVE-2024-25260 | elfutils:Not affected | low | 4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | CVE-2024-25260 SMASH Issue 394639 bnc#1220199 https://github.com/schsiung/fuzzer_issues/issues/1 https://sourceware.org/bugzilla/show_bug.cgi?id=31058 https://sourceware.org/elfutils/ rh#2265194 |
CVE-2024-25739 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-25739 SMASH Issue 393675 bnc#1219834 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=68a24aba7c593eafa8fd00f2f76407b9b32b47a9 https://groups.google.com/g/syzkaller/c/Xl97YcQA4hg https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html https://www.spinics.net/lists/kernel/msg5074816.html jsc#CAR-3105 rh#2263879 |
CVE-2024-25740 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-25740 SMASH Issue 393676 bnc#1219830 https://lore.kernel.org/lkml/0171b6cc-95ee-3538-913b-65a391a446b3%40huawei.com/T/ rh#2263881 |
CVE-2024-25741 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-25741 SMASH Issue 393677 bnc#1219832 https://www.spinics.net/lists/linux-usb/msg252167.html rh#2263884 |
CVE-2024-25742 | kernel-source-rt:Not affected | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2024-25742 SMASH Issue 398286 SMASH Issue 398288 bnc#1221725 https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.9 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e3ef461af35a8c74f2f4ce6616491ddb355a208f https://github.com/torvalds/linux/commit/e3ef461af35a8c74f2f4ce6616491ddb355a208f https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3008.html rh#2270836 |
CVE-2024-25743 | kernel-source-rt:Not affected | important | 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N) | CVE-2024-25743 SMASH Issue 398287 bnc#1223307 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f35e46631b28a63ca3887d7afef1a65a5544da52 https://github.com/torvalds/linux/commit/f35e46631b28a63ca3887d7afef1a65a5544da52 https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3008.html rh#2270836 |
CVE-2024-25744 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2024-25744 SMASH Issue 387546 SMASH Issue 393678 bnc#1217927 bnc#1220314 https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.7 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b82a8dbd3d2f4563156f7150c6f2ecab6e960b30 rh#2263875 |
CVE-2024-26256 | libarchive:Not affected | important | 7.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H) | CVE-2024-26256 MISC:www.zerodayinitiative.com:OSS:2024/Q2/269 OSS:2024/06/04/2 OSS:2024/06/05/1 OSS:2024/Q2/269 SMASH Issue 400972 bnc#1222911 https://github.com/LeSuisse/nixpkgs/commit/81b82a2934521dffef76f7ca305d8d4e22fe7262 https://github.com/libarchive/libarchive/commit/eb7939b24a681a04648a59cdebd386b1e9dc9237.patch https://github.com/libarchive/libarchive/releases/tag/v3.7.4 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EWANFZ6NEMXFCALXWI2AFKYBOLONAVFC/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TWAMR5TY47UKVYMWQXB34CWSBNTRYMBV/ https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26256 rh#2282521 rh#2290445 |
CVE-2024-26581 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26581 SMASH Issue 394583 bnc#1220144 https://git.kernel.org/stable/c/10e9cb39313627f2eae4cd70c4b742074e998fd8 https://git.kernel.org/stable/c/1296c110c5a0 https://git.kernel.org/stable/c/1296c110c5a0b45a8fcf58e7d18bc5da61a565cb https://git.kernel.org/stable/c/2bab493a5624444ec6e648ad0d55a362bcb4c003 https://git.kernel.org/stable/c/4cee42fcf54fec46b344681e7cc4f234bb22f85a https://git.kernel.org/stable/c/60c0c230c6f0 https://git.kernel.org/stable/c/60c0c230c6f046da536d3df8b39a20b9a9fd6af0 https://git.kernel.org/stable/c/6eb14441f106 https://git.kernel.org/stable/c/6eb14441f10602fa1cf691da9d685718b68b78a9 https://git.kernel.org/stable/c/b734f7a47aeb https://git.kernel.org/stable/c/b734f7a47aeb32a5ba298e4ccc16bb0c52b6dbf7 https://git.kernel.org/stable/c/c60d252949caf9aba537525195edae6bbabc35eb rh#2265185 |
CVE-2024-26582 | kernel-source-rt:Not affected | important | 7.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) | CVE-2024-26582 SMASH Issue 394736 bnc#1220214 bnc#1226329 https://git.kernel.org/stable/c/20b4ed034872b4d024b26e2bc1092c3f80e5db96 https://git.kernel.org/stable/c/32b55c5ff9103b8508c1e04bfa5a08c64e7a925f https://git.kernel.org/stable/c/754c9bab77a1b895b97bd99d754403c505bc79df https://git.kernel.org/stable/c/d684763534b969cca1022e2a28645c7cc91f7fa5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZOU3745CWCDZ7EMKMXB2OEEIB5Q3IWM/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OX4EWCYDZRTOEMC2C6OF7ZACAP23SUB5/ jsc#CAR-3120 rh#2265518 |
CVE-2024-26583 | kernel-source-rt:Not affected | moderate | 5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26583 SMASH Issue 394737 bnc#1220185 https://git.kernel.org/stable/c/6209319b2efdd8524691187ee99c40637558fa33 https://git.kernel.org/stable/c/7a3ca06d04d589deec81f56229a9a9d62352ce01 https://git.kernel.org/stable/c/86dc27ee36f558fe223dbdfbfcb6856247356f4a https://git.kernel.org/stable/c/aec7961916f3f9e88766e2688992da6980f11b8d https://git.kernel.org/stable/c/f17d21ea73918ace8afb9c2d8e734dbf71c2c9d7 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZOU3745CWCDZ7EMKMXB2OEEIB5Q3IWM/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OX4EWCYDZRTOEMC2C6OF7ZACAP23SUB5/ rh#2265520 |
CVE-2024-26587 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26587 SMASH Issue 394909 bnc#1220246 https://git.kernel.org/stable/c/08aca65997fb6f233066883b1f1e653bcb1f26ca https://git.kernel.org/stable/c/c5068e442eed063d2f1658e6b6d3c1c6fcf1e588 https://git.kernel.org/stable/c/ea937f77208323d35ffe2f8d8fc81b00118bfcda rh#2265656 |
CVE-2024-26588 | kernel-source-rt:Not affected | important | () | CVE-2024-26588 SMASH Issue 394910 bnc#1220236 https://git.kernel.org/stable/c/36a87385e31c9343af9a4756598e704741250a67 https://git.kernel.org/stable/c/4631c2dd69d928bca396f9f58baeddf85e14ced5 https://git.kernel.org/stable/c/7924ade13a49c0067da6ea13e398102979c0654a https://git.kernel.org/stable/c/9aeb09f4d85a87bac46c010d75a2ea299d462f28 |
CVE-2024-26590 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26590 SMASH Issue 394912 bnc#1220252 https://git.kernel.org/stable/c/118a8cf504d7dfa519562d000f423ee3ca75d2c4 https://git.kernel.org/stable/c/47467e04816cb297905c0f09bc2d11ef865942d9 https://git.kernel.org/stable/c/823ba1d2106019ddf195287ba53057aee33cf724 https://git.kernel.org/stable/c/eed24b816e50c6cd18cbee0ff0d7218c8fced199 |
CVE-2024-26591 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26591 SMASH Issue 394913 bnc#1220254 https://git.kernel.org/stable/c/50ae82f080cf87e84828f066c31723b781d68f5b https://git.kernel.org/stable/c/6cc9c0af0aa06f781fa515a1734b1a4239dfd2c0 https://git.kernel.org/stable/c/715d82ba636cb3629a6e18a33bb9dbe53f9936ee https://git.kernel.org/stable/c/8c8bcd45e9b10eef12321f08d2e5be33d615509c https://git.kernel.org/stable/c/a7b98aa10f895e2569403896f2d19b73b6c95653 rh#2265648 |
CVE-2024-26592 | kernel-source-rt:Not affected | important | 5.6 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L) | CVE-2023-52440 CVE-2023-52441 CVE-2023-52442 CVE-2024-26592 CVE-2024-26594 MISC:lore.kernel.org:OSS:2024/Q1/233 MISC:www.openwall.com:OSS:2024/Q1/233 MISC:www.zerodayinitiative.com:OSS:2024/Q1/233 OSS:2022/12/22/8 OSS:2023/01/04/1 OSS:2024/03/18/2 OSS:2024/Q1/233 SMASH Issue 394723 SMASH Issue 394724 SMASH Issue 394725 SMASH Issue 394914 SMASH Issue 394965 ZDI-24-194 ZDI-24-195 ZDI-24-227 ZDI-24-228 ZDI-24-229 bnc#1220182 bnc#1220183 bnc#1220184 bnc#1220256 bnc#1220327 https://git.kernel.org/stable/c/017d85c94f02090a87f4a473dbe0d6ee0da72693 https://git.kernel.org/stable/c/24290ba94cd0136e417283b0dbf8fcdabcf62111 https://git.kernel.org/stable/c/30fd6521b2fbd9b767e438e31945e5ea3e3a2fba https://git.kernel.org/stable/c/330d900620dfc9893011d725b3620cd2ee0bc2bc https://git.kernel.org/stable/c/380965e48e9c32ee4263c023e1d830ea7e462ed1 https://git.kernel.org/stable/c/38d20c62903d669693a1869aa68c4dd5674e2544 https://git.kernel.org/stable/c/3df0411e132ee74a87aa13142dfd2b190275332e https://git.kernel.org/stable/c/4b081ce0d830b684fdf967abc3696d1261387254 https://git.kernel.org/stable/c/4c2b350b2e269e3fd17bbfa42de1b42775b777ac https://git.kernel.org/stable/c/536bb492d39bb6c080c92f31e8a55fe9934f452b https://git.kernel.org/stable/c/5c0df9d30c289d6b9d7d44e2a450de2f8e3cf40b https://git.kernel.org/stable/c/5e6dfec95833edc54c48605a98365a7325e5541e https://git.kernel.org/stable/c/69d54650b751532d1e1613a4fb433e591aeef126 https://git.kernel.org/stable/c/6eb8015492bcc84e40646390e50a862b2c0529c9 https://git.kernel.org/stable/c/7f1d6cb0eb6af3a8088dc24b7ddee9a9711538c4 https://git.kernel.org/stable/c/92e470163d96df8db6c4fa0f484e4a229edb903d https://git.kernel.org/stable/c/999daf367b924fdf14e9d83e034ee0f86bc17ec6 https://git.kernel.org/stable/c/a2b21ef1ea4cf632d19b3a7cc4d4245b8e63202a https://git.kernel.org/stable/c/aa669ef229ae8dd779da9caa24e254964545895f https://git.kernel.org/stable/c/bd554ed4fdc3d38404a1c43d428432577573e809 https://git.kernel.org/stable/c/becb5191d1d5fdfca0198a2e37457bbbf4fe266f https://git.kernel.org/stable/c/dd1de9268745f0eac83a430db7afc32cbd62e84b https://git.kernel.org/stable/c/ecd7e1c562cb08e41957fcd4b0e404de5ab38e20 rh#2292407 rh#2292410 |
CVE-2024-26594 | kernel-source-rt:Not affected | important | 9.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L) | CVE-2023-52440 CVE-2023-52441 CVE-2023-52442 CVE-2024-26592 CVE-2024-26594 MISC:lore.kernel.org:OSS:2024/Q1/233 MISC:www.openwall.com:OSS:2024/Q1/233 MISC:www.zerodayinitiative.com:OSS:2024/Q1/233 OSS:2022/12/22/8 OSS:2023/01/04/1 OSS:2024/03/18/2 OSS:2024/Q1/233 SMASH Issue 394723 SMASH Issue 394724 SMASH Issue 394725 SMASH Issue 394914 SMASH Issue 394965 ZDI-24-194 ZDI-24-195 ZDI-24-227 ZDI-24-228 ZDI-24-229 bnc#1220182 bnc#1220183 bnc#1220184 bnc#1220256 bnc#1220327 https://git.kernel.org/stable/c/017d85c94f02090a87f4a473dbe0d6ee0da72693 https://git.kernel.org/stable/c/24290ba94cd0136e417283b0dbf8fcdabcf62111 https://git.kernel.org/stable/c/30fd6521b2fbd9b767e438e31945e5ea3e3a2fba https://git.kernel.org/stable/c/330d900620dfc9893011d725b3620cd2ee0bc2bc https://git.kernel.org/stable/c/380965e48e9c32ee4263c023e1d830ea7e462ed1 https://git.kernel.org/stable/c/38d20c62903d669693a1869aa68c4dd5674e2544 https://git.kernel.org/stable/c/3df0411e132ee74a87aa13142dfd2b190275332e https://git.kernel.org/stable/c/4b081ce0d830b684fdf967abc3696d1261387254 https://git.kernel.org/stable/c/4c2b350b2e269e3fd17bbfa42de1b42775b777ac https://git.kernel.org/stable/c/536bb492d39bb6c080c92f31e8a55fe9934f452b https://git.kernel.org/stable/c/5c0df9d30c289d6b9d7d44e2a450de2f8e3cf40b https://git.kernel.org/stable/c/5e6dfec95833edc54c48605a98365a7325e5541e https://git.kernel.org/stable/c/69d54650b751532d1e1613a4fb433e591aeef126 https://git.kernel.org/stable/c/6eb8015492bcc84e40646390e50a862b2c0529c9 https://git.kernel.org/stable/c/7f1d6cb0eb6af3a8088dc24b7ddee9a9711538c4 https://git.kernel.org/stable/c/92e470163d96df8db6c4fa0f484e4a229edb903d https://git.kernel.org/stable/c/999daf367b924fdf14e9d83e034ee0f86bc17ec6 https://git.kernel.org/stable/c/a2b21ef1ea4cf632d19b3a7cc4d4245b8e63202a https://git.kernel.org/stable/c/aa669ef229ae8dd779da9caa24e254964545895f https://git.kernel.org/stable/c/bd554ed4fdc3d38404a1c43d428432577573e809 https://git.kernel.org/stable/c/becb5191d1d5fdfca0198a2e37457bbbf4fe266f https://git.kernel.org/stable/c/dd1de9268745f0eac83a430db7afc32cbd62e84b https://git.kernel.org/stable/c/ecd7e1c562cb08e41957fcd4b0e404de5ab38e20 rh#2292407 rh#2292410 |
CVE-2024-26596 | kernel-source-rt:Not affected | moderate | 5.1 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H) | CVE-2024-26596 SMASH Issue 394982 bnc#1220355 https://git.kernel.org/stable/c/844f104790bd69c2e4dbb9ee3eba46fde1fcea7b https://git.kernel.org/stable/c/dbd909c20c11f0d29c0054d41e0d1f668a60e8c8 |
CVE-2024-26598 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2024-26598 SMASH Issue 394984 bnc#1220326 bnc#1221129 https://git.kernel.org/stable/c/12c2759ab1343c124ed46ba48f27bd1ef5d2dff4 https://git.kernel.org/stable/c/65b201bf3e9af1b0254243a5881390eda56f72d1 https://git.kernel.org/stable/c/ad362fe07fecf0aba839ff2cc59a3617bd42c33f https://git.kernel.org/stable/c/ba7be666740847d967822bed15500656b26bc703 https://git.kernel.org/stable/c/d04acadb6490aa3314f9c9e087691e55de153b88 https://git.kernel.org/stable/c/dba788e25f05209adf2b0175eb1691dc89fb1ba6 https://git.kernel.org/stable/c/dd3956a1b3dd11f46488c928cb890d6937d1ca80 https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html rh#2265801 |
CVE-2024-26599 | kernel-source-rt:Not affected | moderate | 5.1 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L) | CVE-2024-26599 SMASH Issue 394985 bnc#1220365 https://git.kernel.org/stable/c/7b85554c7c2aee91171e038e4d5442ffa130b282 https://git.kernel.org/stable/c/a297d07b9a1e4fb8cda25a4a2363a507d294b7c9 https://git.kernel.org/stable/c/bae45b7ebb31984b63b13c3519fd724b3ce92123 https://git.kernel.org/stable/c/e5f2b4b62977fb6c2efcbc5779e0c9dce18215f7 rh#2265802 |
CVE-2024-26601 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26601 SMASH Issue 395095 bnc#1220342 https://git.kernel.org/stable/c/6b0d48647935e4b8c7b75d1eccb9043fcd4ee581 https://git.kernel.org/stable/c/78327acd4cdc4a1601af718b781eece577b6b7d4 https://git.kernel.org/stable/c/94ebf71bddbcd4ab1ce43ae32c6cb66396d2d51a https://git.kernel.org/stable/c/c1317822e2de80e78f137d3a2d99febab1b80326 https://git.kernel.org/stable/c/c9b528c35795b711331ed36dc3dbee90d5812d4e https://git.kernel.org/stable/c/ea42d6cffb0dd27a417f410b9d0011e9859328cb rh#2265836 |
CVE-2024-26603 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26603 SMASH Issue 395094 bnc#1220335 https://git.kernel.org/stable/c/627339cccdc9166792ecf96bc3c9f711a60ce996 https://git.kernel.org/stable/c/627e28cbb65564e55008315d9e02fbb90478beda https://git.kernel.org/stable/c/8bd3eee7720c14b59a206bd05b98d7586bccf99a https://git.kernel.org/stable/c/b2479ab426cef7ab79a13005650eff956223ced2 https://git.kernel.org/stable/c/d877550eaf2dc9090d782864c96939397a3c6835 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZOU3745CWCDZ7EMKMXB2OEEIB5Q3IWM/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OX4EWCYDZRTOEMC2C6OF7ZACAP23SUB5/ rh#2265833 |
CVE-2024-26604 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26604 SMASH Issue 395189 bnc#1220449 https://git.kernel.org/stable/c/3ca8fbabcceb8bfe44f7f50640092fd8f1de375c https://git.kernel.org/stable/c/7f414d306320f837cc3df96cf52161cb8290fb1b https://git.kernel.org/stable/c/b746d52ce7bcac325a2fa264216ead85b7fbbfaa https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZOU3745CWCDZ7EMKMXB2OEEIB5Q3IWM/ rh#2266257 |
CVE-2024-26605 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26605 SMASH Issue 395093 bnc#1220336 https://git.kernel.org/stable/c/0f7908a016c092cfdaa16d785fa5099d867bc1a3 https://git.kernel.org/stable/c/1e560864159d002b453da42bd2c13a1805515a20 https://git.kernel.org/stable/c/b0f4478838be1f1d330061201898fef65bf8fd7c https://git.kernel.org/stable/c/ef90508574d7af48420bdc5f7b9a4f1cdd26bc70 rh#2265831 |
CVE-2024-26606 | kernel-source-rt:Not affected | low | 4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | CVE-2024-26606 SMASH Issue 395190 bnc#1220450 https://git.kernel.org/stable/c/42beab162dcee1e691ee4934292d51581c29df61 https://git.kernel.org/stable/c/82722b453dc2f967b172603e389ee7dc1b3137cc https://git.kernel.org/stable/c/90e09c016d72b91e76de25f71c7b93d94cc3c769 https://git.kernel.org/stable/c/93b372c39c40cbf179e56621e6bc48240943af69 https://git.kernel.org/stable/c/97830f3c3088638ff90b20dfba2eb4d487bf14d7 https://git.kernel.org/stable/c/a423042052ec2bdbf1e552e621e6a768922363cc https://git.kernel.org/stable/c/a7ae586f6f6024f490b8546c8c84670f96bb9b68 https://git.kernel.org/stable/c/dd64bb8329ce0ea27bc557e4160c2688835402ac https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZOU3745CWCDZ7EMKMXB2OEEIB5Q3IWM/ rh#2266286 |
CVE-2024-26608 | kernel-source-rt:Not affected | moderate | 6.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26608 SMASH Issue 397147 bnc#1221285 https://git.kernel.org/stable/c/2c939c74ef0b74e99b92e32edc2a59f9b9ca3d5a https://git.kernel.org/stable/c/6993328a4cd62a24df254b587c0796a4a1eecc95 https://git.kernel.org/stable/c/9863a53100f47652755545c2bd43e14a1855104d https://git.kernel.org/stable/c/aaa1f1a2ee80888c12ae2783f3a0be10e14067c5 https://git.kernel.org/stable/c/ebeae8adf89d9a82359f6659b1663d09beec2faa rh#2269206 |
CVE-2024-26609 | kernel-source-rt:Not affected | low | () | CVE-2024-26609 MISC:git.kernel.org:OSS:2024/Q2/86 MISC:jonathanspw.com:OSS:2024/Q2/86 OSS:2024/04/10/22 OSS:2024/04/10/23 OSS:2024/04/14/1 OSS:2024/04/15/2 OSS:2024/04/17/5 OSS:2024/Q2/116 OSS:2024/Q2/86 SMASH Issue 397148 bnc#1221290 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660 https://git.kernel.org/stable/c/4e66422f1b56149761dc76030e6345d1cca6f869 https://git.kernel.org/stable/c/55a60251fa50d4e68175e36666b536a602ce4f6c https://git.kernel.org/stable/c/6653118b176a00915125521c6572ae8e507621db https://git.kernel.org/stable/c/8365e9d92b85fda975a5ece7a3a139cb964018c8 https://git.kernel.org/stable/c/8e34430e33b8a80bc014f3efe29cac76bc30a4b4 https://git.kernel.org/stable/c/960cf4f812530f01f6acc6878ceaa5404c06af7b https://git.kernel.org/stable/c/f05a497e7bc8851eeeb3a58da180ba469efebb05 https://git.kernel.org/stable/c/f342de4e2f33e0e39165d8639387aa6c19dff660 https://github.com/Notselwyn/CVE-2024-1086 rh#2262126 rh#2269217 |
CVE-2024-26610 | kernel-source-rt:Not affected | important | 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H) | CVE-2024-26610 SMASH Issue 397149 bnc#1221299 bnc#1221302 https://git.kernel.org/stable/c/05dd9facfb9a1e056752c0901c6e86416037d15a https://git.kernel.org/stable/c/870171899d75d43e3d14360f3a4850e90a9c289b https://git.kernel.org/stable/c/99a23462fe1a6f709f0fda3ebbe8b6b193ac75bd https://git.kernel.org/stable/c/aa2cc9363926991ba74411e3aa0a0ea82c1ffe32 https://git.kernel.org/stable/c/cf4a0d840ecc72fcf16198d5e9c505ab7d5a5e4d https://git.kernel.org/stable/c/f32a81999d0b8e5ce60afb5f6a3dd7241c17dd67 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2269213 |
CVE-2024-26611 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26611 SMASH Issue 397150 bnc#1221303 https://git.kernel.org/stable/c/5cd781f7216f980207af09c5e0e1bb1eda284540 https://git.kernel.org/stable/c/82ee4781b8200e44669a354140d5c6bd966b8768 https://git.kernel.org/stable/c/c5114710c8ce86b8317e9b448f4fd15c711c2a82 rh#2269203 |
CVE-2024-26612 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26612 SMASH Issue 397151 bnc#1221291 https://git.kernel.org/stable/c/1c45256e599061021e2c848952e50f406457e448 https://git.kernel.org/stable/c/3be0b3ed1d76c6703b9ee482b55f7e01c369cc68 https://git.kernel.org/stable/c/4200ad3e46ce50f410fdda302745489441bc70f0 https://git.kernel.org/stable/c/82a9bc343ba019665d3ddc1d9a180bf0e0390cf3 rh#2269201 |
CVE-2024-26613 | kernel-source-rt:Not affected | low | () | CVE-2024-26613 SMASH Issue 397152 bnc#1221292 https://git.kernel.org/stable/c/00d1ee8e1d02194f7b7b433e904e04bbcd2cc0dc https://git.kernel.org/stable/c/0b787c2dea15e7a2828fa3a74a5447df4ed57711 https://git.kernel.org/stable/c/13e788deb7348cc88df34bed736c3b3b9927ea52 https://git.kernel.org/stable/c/344350bfa3b4b37d7c3d5a00536e6fbf0e953fbf https://git.kernel.org/stable/c/5ae8d50044633306ff160fcf7faa24994175efe1 https://git.kernel.org/stable/c/71024928b3f71ce4529426f8692943205c58d30b https://git.kernel.org/stable/c/7a73190ea557e7f26914b0fe04c1f57a96cb771f https://git.kernel.org/stable/c/a37ae111db5e0f7e3d6b692056c30e3e0f6f79cd rh#2269199 |
CVE-2024-26616 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26616 SMASH Issue 396003 bnc#1220943 https://git.kernel.org/stable/c/34de0f04684ec00c093a0455648be055f0e8e24f https://git.kernel.org/stable/c/642b9c520ef2f104277ad1f902f8526edbe087fb https://git.kernel.org/stable/c/f546c4282673497a06ecb6190b50ae7f6c85b02f rh#2267352 |
CVE-2024-26617 | kernel-source-rt:Not affected | moderate | () | CVE-2024-26617 SMASH Issue 397154 bnc#1221294 https://git.kernel.org/stable/c/05509adf297924f51e1493aa86f9fcde1433ed80 https://git.kernel.org/stable/c/4cccb6221cae6d020270606b9e52b1678fc8b71a rh#2269194 |
CVE-2024-26618 | kernel-source-rt:Not affected | moderate | () | CVE-2024-26618 SMASH Issue 397155 bnc#1221295 https://git.kernel.org/stable/c/569156e4fa347237f8fa2a7e935d860109c55ac4 https://git.kernel.org/stable/c/814af6b4e6000e574e74d92197190edf07cc3680 https://git.kernel.org/stable/c/dc7eb8755797ed41a0d1b5c0c39df3c8f401b3d9 rh#2269192 |
CVE-2024-26619 | kernel-source-rt:Not affected | moderate | () | CVE-2024-26619 SMASH Issue 397156 bnc#1221296 https://git.kernel.org/stable/c/2fa79badf4bfeffda6b5032cf62b828486ec9a99 https://git.kernel.org/stable/c/78996eee79ebdfe8b6f0e54cb6dcc792d5129291 rh#2269197 |
CVE-2024-26620 | kernel-source-rt:Not affected | important | 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) | CVE-2024-26620 SMASH Issue 397157 bnc#1221298 bnc#1224176 https://git.kernel.org/stable/c/850fb7fa8c684a4c6bf0e4b6978f4ddcc5d43d11 https://git.kernel.org/stable/c/c69d821197611678533fb3eb784fc823b921349a https://git.kernel.org/stable/c/cdd134d56138302976685e6c7bc4755450b3880e https://git.kernel.org/stable/c/d6b8d034b576f406af920a7bee81606c027b24c6 rh#2269235 |
CVE-2024-26621 | kernel-source-rt:Not affected | low | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26621 SMASH Issue 391202 SMASH Issue 396109 bnc#1218800 bnc#1220944 https://git.kernel.org/stable/c/4ef9ad19e17676b9ef071309bc62020e2373705d https://git.kernel.org/stable/c/7432376c913381c5f24d373a87ff629bbde94b47 https://git.kernel.org/stable/c/87632bc9ecff5ded93433bc0fca428019bdd1cfe rh#2267505 |
CVE-2024-26622 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2024-26622 L3:68095 L3:68137 SMASH Issue 396176 bnc#1220825 bnc#1220828 https://git.kernel.org/stable/c/2caa605079488da9601099fbda460cfc1702839f https://git.kernel.org/stable/c/2f03fc340cac9ea1dc63cbf8c93dd2eb0f227815 https://git.kernel.org/stable/c/3bfe04c1273d30b866f4c7c238331ed3b08e5824 https://git.kernel.org/stable/c/6edefe1b6c29a9932f558a898968a9fcbeec5711 https://git.kernel.org/stable/c/7d930a4da17958f869ef679ee0e4a8729337affc https://git.kernel.org/stable/c/a23ac1788e2c828c097119e9a3178f0b7e503fee https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IVVYSTEVMPYGF6GDSOD44MUXZXAZHOHB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSXNF4RLEFLH35BFUQGYXRRVHHUIVBAE/ rh#2267721 |
CVE-2024-26623 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26623 SMASH Issue 396465 bnc#1221057 https://git.kernel.org/stable/c/22cd6046eb2148b18990257505834dd45c672a1b https://git.kernel.org/stable/c/5939feb63ea1f011027576c64b68b681cbad31ca https://git.kernel.org/stable/c/7e82a8745b951b1e794cc780d46f3fbee5e93447 rh#2268223 |
CVE-2024-26624 | kernel-source-rt:Ignore | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26624 SMASH Issue 396466 bnc#1221059 https://git.kernel.org/stable/c/4d322dce82a1d44f8c83f0f54f95dd1b8dcf46c9 https://git.kernel.org/stable/c/5e7f3e0381c002cb2abde42f09ad511991a8ebaf https://git.kernel.org/stable/c/875f31aaa67e306098befa5e798a049075910fa7 https://git.kernel.org/stable/c/a2104f43876408b164be5fd58f9b6a3a73b77746 https://git.kernel.org/stable/c/b169ffde733c5adf01788ae091c377f0eca44806 https://git.kernel.org/stable/c/c2d272a9a1e8f22ba584589219f6fe1886a3595f https://git.kernel.org/stable/c/c8f6b3b864cb876e9ee21666a391c9ee290682ac https://git.kernel.org/stable/c/f199018dc762dfa501f6d96a424468a0f3c10d9e jsc#CAR-3212 rh#2268221 |
CVE-2024-26626 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26626 SMASH Issue 396468 bnc#1221089 https://git.kernel.org/stable/c/2e8c9ae40adda2be1ba41c05fd3cd1e61cce3207 https://git.kernel.org/stable/c/d2f1b7fe74afd66298dbb3c7b39e7b62e4df1724 https://git.kernel.org/stable/c/dcaafdba6c6162bb49f1192850bc3bbc3707738c https://git.kernel.org/stable/c/e622502c310f1069fd9f41cd38210553115f610a rh#2268216 |
CVE-2024-26628 | kernel-source-rt:Ignore | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2024-26628 SMASH Issue 396470 bnc#1221128 https://git.kernel.org/stable/c/28d2d623d2fbddcca5c24600474e92f16ebb3a05 https://git.kernel.org/stable/c/47bf0f83fc86df1bf42b385a91aadb910137c5c9 https://git.kernel.org/stable/c/7a70663ba02bd4e19aea8d70c979eb3bd03d839d https://git.kernel.org/stable/c/8b25d397162b0316ceda40afaa63ee0c4a97d28b https://git.kernel.org/stable/c/cb96e492d72d143d57db2d2bc143a1cee8741807 rh#2268212 |
CVE-2024-26629 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2024-26629 OSS:2024/05/29/2 OSS:2024/05/30/1 OSS:2024/05/30/2 OSS:2024/Q2/262 SMASH Issue 397445 bnc#1221379 https://git.kernel.org/stable/c/8f5b860de87039b007e84a28a5eefc888154e098 https://git.kernel.org/stable/c/99fb654d01dc3f08b5905c663ad6c89a9d83302f https://git.kernel.org/stable/c/b7d2eee1f53899b53f069bba3a59a419fc3d331b https://git.kernel.org/stable/c/c6f8b3fcc62725e4129f2c0fd550d022d4a7685a https://git.kernel.org/stable/c/e4cf8941664cae2f89f0189c29fe2ce8c6be0d03 https://git.kernel.org/stable/c/edcf9725150e42beeca42d085149f4c88fa97afd rh#2269434 |
CVE-2024-26630 | kernel-source-rt:Not affected | important | () | CVE-2024-26630 SMASH Issue 397558 bnc#1221380 https://git.kernel.org/stable/c/3a75cb05d53f4a6823a32deb078de1366954a804 https://git.kernel.org/stable/c/ba60fdf75e89ea762bb617be578dc47f27655117 https://git.kernel.org/stable/c/fe7e008e0ce728252e4ec652cceebcc62211657c rh#2269436 |
CVE-2024-26631 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26631 SMASH Issue 398037 bnc#1221630 https://git.kernel.org/stable/c/2e7ef287f07c74985f1bf2858bedc62bd9ebf155 https://git.kernel.org/stable/c/380540bb06bb1d1b12bdc947d1b8f56cda6b5663 https://git.kernel.org/stable/c/3bb5849675ae1d592929798a2b37ea450879c855 https://git.kernel.org/stable/c/3cc283fd16fba72e2cefe3a6f48d7a36b0438900 https://git.kernel.org/stable/c/62b3387beef11738eb6ce667601a28fa089fa02c rh#2270133 |
CVE-2024-26632 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26632 SMASH Issue 398038 bnc#1221635 https://git.kernel.org/stable/c/7bed6f3d08b7af27b7015da8dc3acf2b9c1f21d7 https://git.kernel.org/stable/c/a6bd8182137a12d22d3f2cee463271bdcb491659 https://git.kernel.org/stable/c/c6350b5cb78e9024c49eaee6fdb914ad2903a5fe https://git.kernel.org/stable/c/ca3ede3f5893e2d26d4dbdef1eec28a8487fafde rh#2270131 |
CVE-2024-26634 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26634 SMASH Issue 398040 bnc#1221651 https://git.kernel.org/stable/c/8072699aa9e67d1727692cfb3c347263bb627fb9 https://git.kernel.org/stable/c/a2232f29bf52c24f827865b3c90829c44b6c695b https://git.kernel.org/stable/c/d09486a04f5da0a812c26217213b89a3b1acf836 https://git.kernel.org/stable/c/e855dded4b70d1975ee7b9fed0c700391e3c8ea6 rh#2270116 |
CVE-2024-26637 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26637 SMASH Issue 398043 bnc#1221652 https://git.kernel.org/stable/c/556857aa1d0855aba02b1c63bc52b91ec63fc2cc https://git.kernel.org/stable/c/aa74ce30a8a40d19a4256de4ae5322e71344a274 rh#2270106 |
CVE-2024-26638 | kernel-source-rt:Not affected | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H) | CVE-2024-26638 SMASH Issue 398044 bnc#1221649 https://git.kernel.org/stable/c/1960f2b534da1e6c65fb96f9e98bda773495f406 https://git.kernel.org/stable/c/78fbb92af27d0982634116c7a31065f24d092826 https://git.kernel.org/stable/c/b0028f333420a65a53a63978522db680b37379dd https://git.kernel.org/stable/c/d9c54763e5cdbbd3f81868597fe8aca3c96e6387 rh#2270103 |
CVE-2024-26639 | kernel-source-rt:Not affected | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26639 SMASH Issue 398045 bnc#1221624 https://git.kernel.org/stable/c/5a33420599fa0288792537e6872fd19cc8607ea6 https://git.kernel.org/stable/c/6335c0cdb2ea0ea02c999e04d34fd84f69fb27ff https://git.kernel.org/stable/c/dc904345e3771aa01d0b8358b550802fdc6fe00b https://git.kernel.org/stable/c/f6564fce256a3944aa1bc76cb3c40e792d97c1eb rh#2270102 |
CVE-2024-26643 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26643 SMASH Issue 398536 bnc#1221829 https://git.kernel.org/stable/c/291cca35818bd52a407bc37ab45a15816039e363 https://git.kernel.org/stable/c/406b0241d0eb598a0b330ab20ae325537d8d8163 https://git.kernel.org/stable/c/5224afbc30c3ca9ba23e752f0f138729b2c48dd8 https://git.kernel.org/stable/c/552705a3650bbf46a22b1adedc1b04181490fc36 https://git.kernel.org/stable/c/b2d6f9a5b1cf968f1eaa71085ceeb09c2cb276b1 https://git.kernel.org/stable/c/d75a589bb92af1abf3b779cfcd1977ca11b27033 https://git.kernel.org/stable/c/e2d45f467096e931044f0ab7634499879d851a5c https://git.kernel.org/stable/c/edcf1a3f182ecf8b6b805f0ce90570ea98c5f6bf https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2270879 |
CVE-2024-26644 | kernel-source-rt:Analysis | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26644 SMASH Issue 398968 bnc#1222072 https://git.kernel.org/stable/c/0877497dc97834728e1b528ddf1e1c484292c29c https://git.kernel.org/stable/c/2bdf872bcfe629a6202ffd6641615a8ed00e8464 https://git.kernel.org/stable/c/6e6bca99e8d88d989a7cde4c064abea552d5219b https://git.kernel.org/stable/c/7081929ab2572920e94d70be3d332e5c9f97095a https://git.kernel.org/stable/c/d8680b722f0ff6d7a01ddacc1844e0d52354d6ff https://git.kernel.org/stable/c/ec794a7528199e1be6d47bec03f4755aa75df256 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2271644 |
CVE-2024-26646 | kernel-source-rt:Not affected | moderate | 4.9 (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H) | CVE-2024-26646 SMASH Issue 399012 bnc#1222070 https://git.kernel.org/stable/c/019ccc66d56a696a4dfee3bfa2f04d0a7c3d89ee https://git.kernel.org/stable/c/28f010dc50df0f7987c04112114fcfa7e0803566 https://git.kernel.org/stable/c/97566d09fd02d2ab329774bb89a2cdf2267e86d9 https://git.kernel.org/stable/c/c9d6d63b6c03afaa6f185df249af693a7939577c rh#2271788 |
CVE-2024-26647 | kernel-source-rt:Not affected | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26647 SMASH Issue 399013 bnc#1222066 https://git.kernel.org/stable/c/3bb9b1f958c3d986ed90a3ff009f1e77e9553207 https://git.kernel.org/stable/c/6aa5ede6665122f4c8abce3c6eba06b49e54d25c https://git.kernel.org/stable/c/cf656fc7276e5b3709a81bc9d9639459be2b2647 rh#2271790 |
CVE-2024-26648 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26648 SMASH Issue 399014 bnc#1222067 https://git.kernel.org/stable/c/22ae604aea14756954e1c00ae653e34d2afd2935 https://git.kernel.org/stable/c/7073934f5d73f8b53308963cee36f0d389ea857c https://git.kernel.org/stable/c/c02d257c654191ecda1dc1af6875d527e85310e7 rh#2271797 |
CVE-2024-26649 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26649 SMASH Issue 399015 bnc#1222055 https://git.kernel.org/stable/c/8b5bacce2d13dbe648f0bfd3f738ecce8db4978c https://git.kernel.org/stable/c/bc03c02cc1991a066b23e69bbcc0f66e8f1f7453 https://git.kernel.org/stable/c/d3887448486caeef9687fb5dfebd4ff91e0f25aa rh#2271796 |
CVE-2024-26650 | kernel-source-rt:Ignore | low | 0 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N) | CVE-2024-26650 SMASH Issue 399016 bnc#1222048 https://git.kernel.org/stable/c/2841631a03652f32b595c563695d0461072e0de4 https://git.kernel.org/stable/c/5913320eb0b3ec88158cfcb0fa5e996bf4ef681b https://git.kernel.org/stable/c/847e1eb30e269a094da046c08273abe3f3361cf2 https://git.kernel.org/stable/c/d281ac9a987c553d93211b90fd4fe97d8eca32cd rh#2271795 |
CVE-2024-26652 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2024-26652 SMASH Issue 399254 bnc#1222115 bnc#1222116 https://git.kernel.org/stable/c/995f802abff209514ac2ee03b96224237646cec3 https://git.kernel.org/stable/c/ba18deddd6d502da71fd6b6143c53042271b82bd https://git.kernel.org/stable/c/ffda0e962f270b3ec937660afd15b685263232d3 rh#2271875 |
CVE-2024-26653 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26653 SMASH Issue 399862 bnc#1222297 https://git.kernel.org/stable/c/420babea4f1881a7c4ea22a8e218b8c6895d3f21 https://git.kernel.org/stable/c/7c9631969287a5366bc8e39cd5abff154b35fb80 https://git.kernel.org/stable/c/8a9f653cc852677003c23ee8075e3ed8fb4743c9 rh#2272444 |
CVE-2024-26655 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26655 SMASH Issue 399890 bnc#1222306 https://git.kernel.org/stable/c/0200dd7ed2335469955d7e69cc1a6fa7df1f3847 https://git.kernel.org/stable/c/5b4cdd9c5676559b8a7c944ac5269b914b8c0bb8 https://git.kernel.org/stable/c/a88649b49523e8cbe95254440d803e38c19d2341 rh#2272530 |
CVE-2024-26657 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26657 SMASH Issue 399967 bnc#1222273 https://git.kernel.org/stable/c/54b5b7275dfdec35812ccce70930cd7c4ee612b2 https://git.kernel.org/stable/c/74cd204c7afe498aa9dcc3ebf0ecac53d477a429 https://git.kernel.org/stable/c/f34e8bb7d6c6626933fe993e03ed59ae85e16abb rh#2272687 |
CVE-2024-26658 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26658 SMASH Issue 399968 bnc#1222315 https://git.kernel.org/stable/c/2acc59dd88d27ad69b66ded80df16c042b04eeec https://git.kernel.org/stable/c/5b41d3fd04c6757b9c2a60a0c5b2609cae9999df rh#2272777 |
CVE-2024-26660 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26660 SMASH Issue 399948 bnc#1222266 https://git.kernel.org/stable/c/42442f74314d41ddc68227047036fa3e78940054 https://git.kernel.org/stable/c/58fca355ad37dcb5f785d9095db5f748b79c5dc2 https://git.kernel.org/stable/c/a938eab9586eea31cfd129a507f552efae14d738 https://git.kernel.org/stable/c/cd9bd10c59e3c1446680514fd3097c5b00d3712d https://git.kernel.org/stable/c/efdd665ce1a1634b8c1dad5e7f6baaef3e131d0a rh#2272782 |
CVE-2024-26661 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26661 SMASH Issue 399970 bnc#1222323 https://git.kernel.org/stable/c/39f24c08363af1cd945abad84e3c87fd3e3c845a https://git.kernel.org/stable/c/3f3c237a706580326d3b7a1b97697e5031ca4667 https://git.kernel.org/stable/c/66951d98d9bf45ba25acf37fe0747253fafdf298 rh#2272784 |
CVE-2024-26662 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26662 SMASH Issue 399946 bnc#1222324 https://git.kernel.org/stable/c/0c863cab0e9173f8b6c7bc328bee3b8625f131b5 https://git.kernel.org/stable/c/2e150ccea13129eb048679114808eb9770443e4d https://git.kernel.org/stable/c/e96fddb32931d007db12b1fce9b5e8e4c080401b rh#2272786 |
CVE-2024-26664 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26664 SMASH Issue 399972 bnc#1222355 https://git.kernel.org/stable/c/1eb74c00c9c3b13cb65e508c5d5a2f11afb96b8b https://git.kernel.org/stable/c/3a7753bda55985dc26fae17795cb10d825453ad1 https://git.kernel.org/stable/c/4e440abc894585a34c2904a32cd54af1742311b3 https://git.kernel.org/stable/c/853a6503c586a71abf27e60a7f8c4fb28092976d https://git.kernel.org/stable/c/93f0f4e846fcb682c3ec436e3b2e30e5a3a8ee6a https://git.kernel.org/stable/c/9bce69419271eb8b2b3ab467387cb59c99d80deb https://git.kernel.org/stable/c/a16afec8e83c56b14a4a73d2e3fb8eec3a8a057e https://git.kernel.org/stable/c/f0da068c75c20ffc5ba28243ff577531dc2af1fd https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2272791 |
CVE-2024-26665 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26665 SMASH Issue 399973 bnc#1222328 https://git.kernel.org/stable/c/510c869ffa4068c5f19ff4df51d1e2f3a30aaac1 https://git.kernel.org/stable/c/7dc9feb8b1705cf00de20563b6bc4831f4c99dab https://git.kernel.org/stable/c/d75abeec401f8c86b470e7028a13fcdc87e5dd06 https://git.kernel.org/stable/c/d964dd1bc1452594b4207d9229c157d9386e5d8a https://git.kernel.org/stable/c/e37cde7a5716466ff2a76f7f27f0a29b05b9a732 https://git.kernel.org/stable/c/e77bf828f1ca1c47fcff58bdc26b60a9d3dfbe1d https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2272793 |
CVE-2024-26666 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26666 SMASH Issue 399974 bnc#1222293 https://git.kernel.org/stable/c/9480adfe4e0f0319b9da04b44e4eebd5ad07e0cd https://git.kernel.org/stable/c/c255c3b653c6e8b52ac658c305e2fece2825f7ad https://git.kernel.org/stable/c/fc3432ae8232ff4025e7c55012dd88db0e3d18eb rh#2272773 |
CVE-2024-26667 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26667 SMASH Issue 399975 bnc#1222331 https://git.kernel.org/stable/c/79592a6e7bdc1d05460c95f891f5e5263a107af8 https://git.kernel.org/stable/c/7f3d03c48b1eb6bc45ab20ca98b8b11be25f9f52 https://git.kernel.org/stable/c/eb4f56f3ff5799ca754ae6d811803a63fe25a4a2 https://git.kernel.org/stable/c/fb8bfc6ea3cd8c5ac3d35711d064e2f6646aec17 rh#2272775 |
CVE-2024-26670 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26670 SMASH Issue 399978 bnc#1222356 https://git.kernel.org/stable/c/58eb5c07f41704464b9acc09ab0707b6769db6c0 https://git.kernel.org/stable/c/832dd634bd1b4e3bbe9f10b9c9ba5db6f6f2b97f https://git.kernel.org/stable/c/baa0aaac16432019651e0d60c41cd34a0c3c3477 rh#2272800 |
CVE-2024-26672 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26672 SMASH Issue 399980 bnc#1222358 https://git.kernel.org/stable/c/4f32504a2f85a7b40fe149436881381f48e9c0c0 https://git.kernel.org/stable/c/7b5d58c07024516c0e81b95e98f37710cf402c53 rh#2272814 |
CVE-2024-26674 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26674 SMASH Issue 399981 bnc#1222378 https://git.kernel.org/stable/c/2aed1b6c33afd8599d01c6532bbecb829480a674 https://git.kernel.org/stable/c/2da241c5ed78d0978228a1150735539fe1a60eca https://git.kernel.org/stable/c/8eed4e00a370b37b4e5985ed983dccedd555ea9d rh#2272818 |
CVE-2024-26676 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26676 SMASH Issue 399983 bnc#1222380 https://git.kernel.org/stable/c/1279f9d9dec2d7462823a18c29ad61359e0a007d https://git.kernel.org/stable/c/4fe505c63aa3273135a57597fda761e9aecc7668 https://git.kernel.org/stable/c/82ae47c5c3a6b27fdc0f9e83c1499cb439c56140 https://git.kernel.org/stable/c/b74aa9ce13d02b7fd37c5325b99854f91b9b4276 https://git.kernel.org/stable/c/e0e09186d8821ad59806115d347ea32efa43ca4b rh#2272832 |
CVE-2024-26678 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26678 SMASH Issue 399985 bnc#1222292 https://git.kernel.org/stable/c/0a962f2fbaa976af9eed21d0306370cded485787 https://git.kernel.org/stable/c/1ad55cecf22f05f1c884adf63cc09d3c3e609ebf https://git.kernel.org/stable/c/4adeeff8c12321cd453412a659c3c0eeb9bb2397 https://git.kernel.org/stable/c/d327e961573fc335af0ae8a160302205327e1f4e rh#2272836 |
CVE-2024-26680 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26680 SMASH Issue 399987 bnc#1222427 https://git.kernel.org/stable/c/004fe5b7f59286a926a45e0cafc7870e9cdddd56 https://git.kernel.org/stable/c/2e7d3b67630dfd8f178c41fa2217aa00e79a5887 https://git.kernel.org/stable/c/466ceebe48cbba3f4506f165fca7111f9eb8bb12 https://git.kernel.org/stable/c/e42e334c645575be5432adee224975d4f536fdb1 rh#2272842 |
CVE-2024-26681 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26681 SMASH Issue 399988 bnc#1222431 https://git.kernel.org/stable/c/0193e0660cc6689c794794b471492923cfd7bfbc https://git.kernel.org/stable/c/6eecddd9c3c8d6e3a097531cdc6d500335b35e46 https://git.kernel.org/stable/c/ba5e1272142d051dcc57ca1d3225ad8a089f9858 https://git.kernel.org/stable/c/d91964cdada76740811b7c621239f9c407820dbc rh#2272844 |
CVE-2024-26682 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26682 SMASH Issue 399989 bnc#1222433 https://git.kernel.org/stable/c/35e2385dbe787936c793d70755a5177d267a40aa https://git.kernel.org/stable/c/ea88bde8e3fefbe4268f6991375dd629895a090a rh#2272846 |
CVE-2024-26683 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26683 SMASH Issue 399945 bnc#1222434 https://git.kernel.org/stable/c/177fbbcb4ed6b306c1626a277fac3fb1c495a4c7 https://git.kernel.org/stable/c/ce112c941c2b172afba3e913a90c380647d53975 rh#2272822 |
CVE-2024-26684 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26684 SMASH Issue 399990 bnc#1222445 https://git.kernel.org/stable/c/2fc45a4631ac7837a5c497cb4f7e2115d950fc37 https://git.kernel.org/stable/c/3b48c9e258c8691c2f093ee07b1ea3764caaa1b2 https://git.kernel.org/stable/c/46eba193d04f8bd717e525eb4110f3c46c12aec3 https://git.kernel.org/stable/c/6609e98ed82966a1b3168c142aca30f8284a7b89 https://git.kernel.org/stable/c/7e0ff50131e9d1aa507be8e670d38e9300a5f5bf https://git.kernel.org/stable/c/e42ff0844fe418c7d03a14f9f90e1b91ba119591 https://git.kernel.org/stable/c/e9837c83befb5b852fa76425dde98a87b737df00 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2272824 |
CVE-2024-26685 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26685 SMASH Issue 400157 bnc#1222437 https://git.kernel.org/stable/c/2c3bdba00283a6c7a5b19481a59a730f46063803 https://git.kernel.org/stable/c/5bc09b397cbf1221f8a8aacb1152650c9195b02b https://git.kernel.org/stable/c/626daab3811b772086aef1bf8eed3ffe6f523eff https://git.kernel.org/stable/c/6589f0f72f8edd1fa11adce4eedbd3615f2e78ab https://git.kernel.org/stable/c/8fa90634ec3e9cc50f42dd605eec60f2d146ced8 https://git.kernel.org/stable/c/c4a09fdac625e64abe478dcf88bfa20406616928 https://git.kernel.org/stable/c/d31c8721e816eff5ca6573cc487754f357c093cd https://git.kernel.org/stable/c/f3e4963566f58726d3265a727116a42b591f6596 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2273111 |
CVE-2024-26686 | kernel-source-rt:Analysis | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26686 SMASH Issue 400158 bnc#1222436 https://git.kernel.org/stable/c/27978243f165b44e342f28f449b91327944ea071 https://git.kernel.org/stable/c/7601df8031fd67310af891897ef6cc0df4209305 https://git.kernel.org/stable/c/cf4b8c39b9a0bd81c47afc7ef62914a62dd5ec4d rh#2273109 |
CVE-2024-26690 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26690 SMASH Issue 400163 bnc#1222462 https://git.kernel.org/stable/c/38cc3c6dcc09dc3a1800b5ec22aef643ca11eab8 https://git.kernel.org/stable/c/9680b2ab54ba8d72581100e8c45471306101836e https://git.kernel.org/stable/c/e6af0f082a4b87b99ad033003be2a904a1791b3f rh#2273100 |
CVE-2024-26691 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26691 SMASH Issue 400164 bnc#1222463 https://git.kernel.org/stable/c/10c02aad111df02088d1a81792a709f6a7eca6cc https://git.kernel.org/stable/c/3ab1c40a1e915e350d9181a4603af393141970cc https://git.kernel.org/stable/c/3d16cebf01127f459dcfeb79ed77bd68b124c228 rh#2273098 |
CVE-2024-26692 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26692 SMASH Issue 400165 bnc#1222464 https://git.kernel.org/stable/c/4145ccff546ea868428b3e0fe6818c6261b574a9 https://git.kernel.org/stable/c/4860abb91f3d7fbaf8147d54782149bb1fc45892 https://git.kernel.org/stable/c/63c35afd50e28b49c5b75542045a8c42b696dab9 rh#2273096 |
CVE-2024-26693 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26693 SMASH Issue 400166 bnc#1222451 https://git.kernel.org/stable/c/00f4eb31b8193f6070ce24df636883f9c104ca95 https://git.kernel.org/stable/c/b7198383ef2debe748118996f627452281cf27d7 https://git.kernel.org/stable/c/c12f0f4d4caf23b1bfdc2602b6b70d56bdcd6aa7 rh#2273094 |
CVE-2024-26694 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26694 SMASH Issue 400168 bnc#1222466 https://git.kernel.org/stable/c/353d321f63f7dbfc9ef58498cc732c9fe886a596 https://git.kernel.org/stable/c/ab9d4bb9a1892439b3123fc52b19e32b9cdf80ad https://git.kernel.org/stable/c/d24eb9a27bea8fe5237fa71be274391d9d51eff2 rh#2273092 |
CVE-2024-26695 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26695 SMASH Issue 400169 bnc#1222373 https://git.kernel.org/stable/c/58054faf3bd29cd0b949b77efcb6157f66f401ed https://git.kernel.org/stable/c/7535ec350a5f09b5756a7607f5582913f21200f4 https://git.kernel.org/stable/c/8731fe001a60581794ed9cf65da8cd304846a6fb https://git.kernel.org/stable/c/88aa493f393d2ee38ac140e1f6ac1881346e85d4 https://git.kernel.org/stable/c/b5909f197f3b26aebedca7d8ac7b688fd993a266 https://git.kernel.org/stable/c/ccb88e9549e7cfd8bcd511c538f437e20026e983 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2273123 |
CVE-2024-26696 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26696 SMASH Issue 400170 bnc#1222549 https://git.kernel.org/stable/c/228742b2ddfb99dfd71e5a307e6088ab6836272e https://git.kernel.org/stable/c/38296afe3c6ee07319e01bb249aa4bb47c07b534 https://git.kernel.org/stable/c/7e9b622bd0748cc104d66535b76d9b3535f9dc0f https://git.kernel.org/stable/c/8494ba2c9ea00a54d5b50e69b22c55a8958bce32 https://git.kernel.org/stable/c/862ee4422c38be5c249844a684b00d0dbe9d1e46 https://git.kernel.org/stable/c/98a4026b22ff440c7f47056481bcbbe442f607d6 https://git.kernel.org/stable/c/e38585401d464578d30f5868ff4ca54475c34f7d https://git.kernel.org/stable/c/ea5ddbc11613b55e5128c85f57b08f907abd9b28 rh#2273121 |
CVE-2024-26697 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26697 SMASH Issue 400171 bnc#1222550 https://git.kernel.org/stable/c/120f7fa2008e3bd8b7680b4ab5df942decf60fd5 https://git.kernel.org/stable/c/2000016bab499074e6248ea85aeea7dd762355d9 https://git.kernel.org/stable/c/2e1480538ef60bfee5473dfe02b1ecbaf1a4aa0d https://git.kernel.org/stable/c/364a66be2abdcd4fd426ffa44d9b8f40aafb3caa https://git.kernel.org/stable/c/5278c3eb6bf5896417572b52adb6be9d26e92f65 https://git.kernel.org/stable/c/67b8bcbaed4777871bb0dcc888fb02a614a98ab1 https://git.kernel.org/stable/c/9c9c68d64fd3284f7097ed6ae057c8441f39fcd3 https://git.kernel.org/stable/c/a6efe6dbaaf504f5b3f8a5c3f711fe54e7dda0ba https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2273119 |
CVE-2024-26698 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26698 SMASH Issue 400172 bnc#1222374 https://git.kernel.org/stable/c/0e8875de9dad12805ff66e92cd5edea6a421f1cd https://git.kernel.org/stable/c/22a77c0f5b8233237731df3288d067af51a2fd7b https://git.kernel.org/stable/c/48a8ccccffbae10c91d31fc872db5c31aba07518 https://git.kernel.org/stable/c/7656372ae190e54e8c8cf1039725a5ea59fdf84a https://git.kernel.org/stable/c/9ec807e7b6f5fcf9499f3baa69f254bb239a847f https://git.kernel.org/stable/c/e0526ec5360a48ad3ab2e26e802b0532302a7e11 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2273117 |
CVE-2024-26699 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L) | CVE-2024-26699 SMASH Issue 400173 bnc#1222602 https://git.kernel.org/stable/c/46806e59a87790760870d216f54951a5b4d545bc https://git.kernel.org/stable/c/ca400d8e0c1c9d79c08dfb6b7f966e26c8cae7fb rh#2273115 |
CVE-2024-26700 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26700 SMASH Issue 400154 bnc#1222870 https://git.kernel.org/stable/c/01d992088dce3945f70f49f34b0b911c5213c238 https://git.kernel.org/stable/c/5cd7185d2db76c42a9b7e69adad9591d9fca093f https://git.kernel.org/stable/c/7407c61f43b66e90ad127d0cdd13cbc9d87141a5 https://git.kernel.org/stable/c/e6a7df96facdcf5b1f71eb3ec26f2f9f6ad61e57 rh#2273113 |
CVE-2024-26703 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26703 SMASH Issue 400175 bnc#1222423 https://git.kernel.org/stable/c/1389358bb008e7625942846e9f03554319b7fecc https://git.kernel.org/stable/c/2354d29986ebd138f89c2b73fecf8237e0a4ad6b https://git.kernel.org/stable/c/5f703935fdb559642d85b2088442ee55a557ae6d rh#2273176 |
CVE-2024-26705 | kernel-source-rt:Not affected | moderate | () | CVE-2024-26705 SMASH Issue 400176 bnc#1222485 https://git.kernel.org/stable/c/54944f45470af5965fb9c28cf962ec30f38a8f5b https://git.kernel.org/stable/c/913b9d443a0180cf0de3548f1ab3149378998486 https://git.kernel.org/stable/c/aa52be55276614d33f22fbe7da36c40d6432d10b rh#2273172 |
CVE-2024-26706 | kernel-source-rt:Not affected | moderate | () | CVE-2024-26706 SMASH Issue 400177 bnc#1222486 https://git.kernel.org/stable/c/23027309b099ffc4efca5477009a11dccbdae592 https://git.kernel.org/stable/c/8b1d72395635af45410b66cc4c4ab37a12c4a831 https://git.kernel.org/stable/c/ce31d79aa1f13a2345791f84935281a2c194e003 https://git.kernel.org/stable/c/fa69a8063f8b27f3c7434a0d4f464a76a62f24d2 rh#2273170 |
CVE-2024-26707 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26707 SMASH Issue 400178 bnc#1222421 https://git.kernel.org/stable/c/0d8011a878fdf96123bc0d6a12e2fe7ced5fddfb https://git.kernel.org/stable/c/37e8c97e539015637cb920d3e6f1e404f707a06e https://git.kernel.org/stable/c/547545e50c913861219947ce490c68a1776b9b51 https://git.kernel.org/stable/c/56440799fc4621c279df16176f83a995d056023a https://git.kernel.org/stable/c/923dea2a7ea9e1ef5ac4031fba461c1cc92e32b8 https://git.kernel.org/stable/c/de769423b2f053182a41317c4db5a927e90622a0 rh#2273168 |
CVE-2024-26708 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26708 SMASH Issue 400179 bnc#1222672 https://git.kernel.org/stable/c/337cebbd850f94147cee05252778f8f78b8c337f https://git.kernel.org/stable/c/4bfe217e075d04e63c092df9d40c608e598c2ef2 https://git.kernel.org/stable/c/e158fb9679d15a2317ec13b4f6301bd26265df2f rh#2273166 |
CVE-2024-26709 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26709 SMASH Issue 400180 bnc#1222418 https://git.kernel.org/stable/c/0846dd77c8349ec92ca0079c9c71d130f34cb192 https://git.kernel.org/stable/c/c90fdea9cac9eb419fc266e75d625cb60c8f7f6c rh#2273164 |
CVE-2024-26710 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26710 SMASH Issue 400181 bnc#1222419 https://git.kernel.org/stable/c/4297217bcf1f0948a19c2bacc6b68d92e7778ad9 https://git.kernel.org/stable/c/4cc31fa07445879a13750cb061bb8c2654975fcb https://git.kernel.org/stable/c/b29b16bd836a838b7690f80e37f8376414c74cbe https://git.kernel.org/stable/c/f1acb109505d983779bbb7e20a1ee6244d2b5736 rh#2273162 |
CVE-2024-26711 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26711 SMASH Issue 400182 bnc#1222420 https://git.kernel.org/stable/c/02876e2df02f8b17a593d77a0a7879a8109b27e1 https://git.kernel.org/stable/c/0e0dab37750926d4fb0144edb1c1ea0612fea273 https://git.kernel.org/stable/c/a22b0a2be69a36511cb5b37d948b651ddf7debf3 rh#2273160 |
CVE-2024-26712 | kernel-source-rt:Not affected | moderate | () | CVE-2024-26712 SMASH Issue 400183 bnc#1222439 https://git.kernel.org/stable/c/0516c06b19dc64807c10e01bb99b552bdf2d7dbe https://git.kernel.org/stable/c/0c09912dd8387e228afcc5e34ac5d79b1e3a1058 https://git.kernel.org/stable/c/230e89b5ad0a33f530a2a976b3e5e4385cb27882 https://git.kernel.org/stable/c/2738e0aa2fb24a7ab9c878d912dc2b239738c6c6 https://git.kernel.org/stable/c/4a7aee96200ad281a5cc4cf5c7a2e2a49d2b97b0 https://git.kernel.org/stable/c/70ef2ba1f4286b2b73675aeb424b590c92d57b25 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2273158 |
CVE-2024-26713 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26713 SMASH Issue 400140 bnc#1222872 https://git.kernel.org/stable/c/9978d5b744e0227afe19e3bcb4c5f75442dde753 https://git.kernel.org/stable/c/d4f762d6403f7419de90d7749fa83dd92ffb0e1d https://git.kernel.org/stable/c/ed8b94f6e0acd652ce69bd69d678a0c769172df8 rh#2273156 |
CVE-2024-26714 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26714 SMASH Issue 400184 bnc#1222489 https://git.kernel.org/stable/c/6616d3c4f8284a7b3ef978c916566bd240cea1c7 https://git.kernel.org/stable/c/7a3a70dd08e4b7dffc2f86f2c68fc3812804b9d0 https://git.kernel.org/stable/c/85e985a4f46e462a37f1875cb74ed380e7c0c2e0 https://git.kernel.org/stable/c/d8e36ff40cf9dadb135f3a97341c02c9a7afcc43 rh#2273154 |
CVE-2024-26716 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26716 SMASH Issue 400186 bnc#1222359 https://git.kernel.org/stable/c/12783c0b9e2c7915a50d5ec829630ff2da50472c https://git.kernel.org/stable/c/465b545d1d7ef282192ddd4439b08279bdb13f6f https://git.kernel.org/stable/c/ed85777c640cf9e6920bb1b60ed8cd48e1f4d873 rh#2273150 |
CVE-2024-26717 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26717 SMASH Issue 400187 bnc#1222360 https://git.kernel.org/stable/c/00aab7dcb2267f2aef59447602f34501efe1a07f https://git.kernel.org/stable/c/4cad91344a62536a2949873bad6365fbb6232776 https://git.kernel.org/stable/c/62f5d219edbd174829aa18d4b3d97cd5fefbb783 https://git.kernel.org/stable/c/d7d7a0e3b6f5adc45f23667cbb919e99093a5b5c https://git.kernel.org/stable/c/e28d6b63aeecbda450935fb58db0e682ea8212d3 rh#2273148 |
CVE-2024-26718 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26718 SMASH Issue 400188 bnc#1222416 https://git.kernel.org/stable/c/0a9bab391e336489169b95cb0d4553d921302189 https://git.kernel.org/stable/c/0c45a20cbe68bc4d681734f5c03891124a274257 https://git.kernel.org/stable/c/30884a44e0cedc3dfda8c22432f3ba4078ec2d94 https://git.kernel.org/stable/c/5735a2671ffb70ea29ca83969fe01316ee2ed6fc rh#2273146 |
CVE-2024-26719 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26719 SMASH Issue 400189 bnc#1222566 https://git.kernel.org/stable/c/39126abc5e20611579602f03b66627d7cd1422f0 https://git.kernel.org/stable/c/985d053f7633d8b539ab1531738d538efac678a9 https://git.kernel.org/stable/c/cc0037fa592d56e4abb9c7d1c52c4d2dc25cd906 rh#2273143 |
CVE-2024-26721 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26721 SMASH Issue 400191 bnc#1222365 https://git.kernel.org/stable/c/962ac2dce56bb3aad1f82a4bbe3ada57a020287c https://git.kernel.org/stable/c/ff5999fb03f467e1e7159f0ddb199c787f7512b9 rh#2273139 |
CVE-2024-26723 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26723 SMASH Issue 400193 bnc#1222367 https://git.kernel.org/stable/c/15faa1f67ab405d47789d4702f587ec7df7ef03e https://git.kernel.org/stable/c/2a492f01228b7d091dfe38974ef40dccf8f9f2f1 https://git.kernel.org/stable/c/48fae67d837488c87379f0c9f27df7391718477c https://git.kernel.org/stable/c/b9357489c46c7a43999964628db8b47d3a1f8672 rh#2273135 |
CVE-2024-26724 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26724 SMASH Issue 400141 bnc#1222523 https://git.kernel.org/stable/c/1596126ea50228f0ed96697bae4e9368fda02c56 https://git.kernel.org/stable/c/aa1eec2f546f2afa8c98ec41e5d8ee488165d685 rh#2273133 |
CVE-2024-26725 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26725 SMASH Issue 400194 bnc#1222369 https://git.kernel.org/stable/c/087739cbd0d0b87b6cec2c0799436ac66e24acc8 https://git.kernel.org/stable/c/53c0441dd2c44ee93fddb5473885fd41e4bc2361 rh#2273130 |
CVE-2024-26726 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26726 SMASH Issue 400142 bnc#1222532 https://git.kernel.org/stable/c/02f2b95b00bf57d20320ee168b30fb7f3db8e555 https://git.kernel.org/stable/c/5571e41ec6e56e35f34ae9f5b3a335ef510e0ade https://git.kernel.org/stable/c/7bddf18f474f166c19f91b2baf67bf7c5eda03f7 https://git.kernel.org/stable/c/a4b7741c8302e28073bfc6dd1c2e73598e5e535e rh#2273128 |
CVE-2024-26727 | kernel-source-rt:Ignore | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26727 SMASH Issue 400146 bnc#1222536 https://git.kernel.org/stable/c/3f5d47eb163bceb1b9e613c9003bae5fefc0046f https://git.kernel.org/stable/c/5a172344bfdabb46458e03708735d7b1a918c468 https://git.kernel.org/stable/c/66b317a2fc45b2ef66527ee3f8fa08fb5beab88d https://git.kernel.org/stable/c/833775656d447c545133a744a0ed1e189ce61430 https://git.kernel.org/stable/c/e03ee2fe873eb68c1f9ba5112fee70303ebf9dfb https://git.kernel.org/stable/c/e31546b0f34af21738c4ceac47d662c00ee6382f https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2273126 |
CVE-2024-26728 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26728 SMASH Issue 400221 bnc#1222370 https://git.kernel.org/stable/c/2d392f7268a1a9bfbd98c831f0f4c964e59aa145 https://git.kernel.org/stable/c/9671761792156f2339627918bafcd713a8a6f777 rh#2273258 |
CVE-2024-26729 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26729 SMASH Issue 400222 bnc#1222552 https://git.kernel.org/stable/c/351080ba3414c96afff0f1338b4aeb2983195b80 https://git.kernel.org/stable/c/d2b48f340d9e4a8fbeb1cdc84cd8da6ad143a907 rh#2273256 |
CVE-2024-26730 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26730 SMASH Issue 400223 bnc#1222538 https://git.kernel.org/stable/c/c196387820c9214c5ceaff56d77303c82514b8b1 https://git.kernel.org/stable/c/d56e460e19ea8382f813eb489730248ec8d7eb73 https://git.kernel.org/stable/c/f006c45a3ea424f8f6c8e4b9283bc245ce2a4d0f rh#2273254 |
CVE-2024-26731 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26731 SMASH Issue 400224 bnc#1222371 https://git.kernel.org/stable/c/4588b13abcbd561ec67f5b3c1cb2eff690990a54 https://git.kernel.org/stable/c/4cd12c6065dfcdeba10f49949bffcf383b3952d8 https://git.kernel.org/stable/c/9b099ed46dcaf1403c531ff02c3d7400fa37fa26 https://git.kernel.org/stable/c/d61608a4e394f23e0dca099df9eb8e555453d949 rh#2273252 |
CVE-2024-26732 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26732 SMASH Issue 400225 bnc#1222551 https://git.kernel.org/stable/c/56667da7399eb19af857e30f41bea89aa6fa812c https://git.kernel.org/stable/c/897f75e2cde8a5f9f7529b55249af1fa4248c83b rh#2273250 |
CVE-2024-26734 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26734 SMASH Issue 400227 bnc#1222438 https://git.kernel.org/stable/c/919092bd5482b7070ae66d1daef73b600738f3a2 https://git.kernel.org/stable/c/def689fc26b9a9622d2e2cb0c4933dd3b1c8071c https://git.kernel.org/stable/c/e91d3561e28d7665f4f837880501dc8755f635a9 rh#2273244 |
CVE-2024-26736 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26736 SMASH Issue 400229 bnc#1222586 https://git.kernel.org/stable/c/5c27d85a69fa16a08813ba37ddfb4bbc9a1ed6b5 https://git.kernel.org/stable/c/6e6065dd25b661420fac19c34282b6c626fcd35e https://git.kernel.org/stable/c/6ea38e2aeb72349cad50e38899b0ba6fbcb2af3d https://git.kernel.org/stable/c/d34a5e57632bb5ff825196ddd9a48ca403626dfa https://git.kernel.org/stable/c/d9b5e2b7a8196850383c70d099bfd39e81ab6637 https://git.kernel.org/stable/c/e56662160fc24d28cb75ac095cc6415ae1bda43e https://git.kernel.org/stable/c/e8530b170e464017203e3b8c6c49af6e916aece1 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html jsc#CAR-3292 rh#2273276 |
CVE-2024-26737 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26737 SMASH Issue 400230 bnc#1222557 https://git.kernel.org/stable/c/0281b919e175bb9c3128bd3872ac2903e9436e3f https://git.kernel.org/stable/c/5268bb02107b9eedfdcd51db75b407d10043368c https://git.kernel.org/stable/c/7d80a9e745fa5b47da3bca001f186c02485c7c33 https://git.kernel.org/stable/c/8327ed12e8ebc5436bfaa1786c49988894f9c8a6 https://git.kernel.org/stable/c/addf5e297e6cbf5341f9c07720693ca9ba0057b5 rh#2273274 |
CVE-2024-26738 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26738 SMASH Issue 400231 bnc#1222607 https://git.kernel.org/stable/c/46e36ebd5e00a148b67ed77c1d31675996f77c25 https://git.kernel.org/stable/c/a5c57fd2e9bd1c8ea8613a8f94fd0be5eccbf321 https://git.kernel.org/stable/c/b8315b2e25b4e68e42fcb74630f824b9a5067765 rh#2273272 |
CVE-2024-26741 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26741 SMASH Issue 400234 bnc#1222587 https://git.kernel.org/stable/c/334a8348b2df26526f3298848ad6864285592caf https://git.kernel.org/stable/c/66b60b0c8c4a163b022a9f0ad6769b0fd3dc662f https://git.kernel.org/stable/c/729bc77af438a6e67914c97f6f3d3af8f72c0131 https://git.kernel.org/stable/c/f8c4a6b850882bc47aaa864b720c7a2ee3102f39 rh#2273266 |
CVE-2024-26742 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26742 SMASH Issue 400235 bnc#1222608 https://git.kernel.org/stable/c/3c31b18a8dd8b7bf36af1cd723d455853b8f94fe https://git.kernel.org/stable/c/4f5b15c15e6016efb3e14582d02cc4ddf57227df https://git.kernel.org/stable/c/5761eb9761d2d5fe8248a9b719efc4d8baf1f24a https://git.kernel.org/stable/c/b9433b25cb06c415c9cb24782599649a406c8d6d rh#2273264 |
CVE-2024-26745 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26745 SMASH Issue 400329 bnc#1222678 https://git.kernel.org/stable/c/09a3c1e46142199adcee372a420b024b4fc61051 https://git.kernel.org/stable/c/5da6d306f315344af1ca2eff4bd9b10b130f0c28 https://git.kernel.org/stable/c/7eb95e0af5c9c2e6fad50356eaf32d216d0e7bc3 https://git.kernel.org/stable/c/d4d1e4b1513d975961de7bb4f75e450a92d65ebf rh#2273410 |
CVE-2024-26746 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26746 SMASH Issue 400330 bnc#1222444 https://git.kernel.org/stable/c/5e3022ea42e490a36ec6f2cfa6fc603deb0bace4 https://git.kernel.org/stable/c/bb71e040323175e18c233a9afef32ba14fa64eb7 https://git.kernel.org/stable/c/d3ea125df37dc37972d581b74a5d3785c3f283ab rh#2273408 |
CVE-2024-26748 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26748 SMASH Issue 400239 bnc#1222513 https://git.kernel.org/stable/c/1e204a8e9eb514e22a6567fb340ebb47df3f3a48 https://git.kernel.org/stable/c/3a2a909942b5335b7ea66366d84261b3ed5f89c8 https://git.kernel.org/stable/c/5fd9e45f1ebcd57181358af28506e8a661a260b3 https://git.kernel.org/stable/c/70e8038813f9d3e72df966748ebbc40efe466019 https://git.kernel.org/stable/c/92d20406a3d4ff3e8be667c79209dc9ed31df5b3 https://git.kernel.org/stable/c/9a52b694b066f299d8b9800854a8503457a8b64c https://git.kernel.org/stable/c/aad6132ae6e4809e375431f8defd1521985e44e7 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2273076 |
CVE-2024-26749 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2024-26749 SMASH Issue 400240 bnc#1222680 https://git.kernel.org/stable/c/2134e9906e17b1e5284300fab547869ebacfd7d9 https://git.kernel.org/stable/c/29e42e1578a10c611b3f1a38f3229b2d664b5d16 https://git.kernel.org/stable/c/4e5c73b15d95452c1ba9c771dd013a3fbe052ff3 https://git.kernel.org/stable/c/9a07244f614bc417de527b799da779dcae780b5d https://git.kernel.org/stable/c/b40328eea93c75a5645891408010141a0159f643 https://git.kernel.org/stable/c/cd45f99034b0c8c9cb346dd0d6407a95ca3d36f6 https://git.kernel.org/stable/c/cfa9abb5570c489dabf6f7fb3a066cc576fc8824 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2273074 |
CVE-2024-26750 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26750 SMASH Issue 400331 bnc#1222617 https://git.kernel.org/stable/c/43ba9e331559a30000c862eea313248707afa787 https://git.kernel.org/stable/c/6c480d0f131862645d172ca9e25dc152b1a5c3a6 https://git.kernel.org/stable/c/aa82ac51d63328714645c827775d64dbfd9941f3 https://git.kernel.org/stable/c/c4c795b21dd23d9514ae1c6646c3fb2c78b5be60 https://git.kernel.org/stable/c/e9eac260369d0cf57ea53df95427125725507a0d rh#2273368 |
CVE-2024-26752 | kernel-source-rt:Not affected | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) | CVE-2024-26752 SMASH Issue 400242 bnc#1222667 bnc#1223292 https://git.kernel.org/stable/c/0da15a70395182ee8cb75716baf00dddc0bea38d https://git.kernel.org/stable/c/13cd1daeea848614e585b2c6ecc11ca9c8ab2500 https://git.kernel.org/stable/c/359e54a93ab43d32ee1bff3c2f9f10cb9f6b6e79 https://git.kernel.org/stable/c/4c3ce64bc9d36ca9164dd6c77ff144c121011aae https://git.kernel.org/stable/c/804bd8650a3a2bf3432375f8c97d5049d845ce56 https://git.kernel.org/stable/c/83340c66b498e49353530e41542500fc8a4782d6 https://git.kernel.org/stable/c/c1d3a84a67db910ce28a871273c992c3d7f9efb5 https://git.kernel.org/stable/c/dcb4d14268595065c85dc5528056713928e17243 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2273219 |
CVE-2024-26753 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L) | CVE-2024-26753 SMASH Issue 400243 bnc#1222601 https://git.kernel.org/stable/c/37077ed16c7793e21b005979d33f8a61565b7e86 https://git.kernel.org/stable/c/62f361bfea60c6afc3df09c1ad4152e6507f6f47 https://git.kernel.org/stable/c/b0365460e945e1117b47cf7329d86de752daff63 https://git.kernel.org/stable/c/c0ec2a712daf133d9996a8a1b7ee2d4996080363 https://git.kernel.org/stable/c/ef1e47d50324e232d2da484fe55a54274eeb9bc1 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2273217 |
CVE-2024-26755 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26755 SMASH Issue 400245 bnc#1222529 https://git.kernel.org/stable/c/60d6130d0ac1d883ed93c2a1e10aadb60967fd48 https://git.kernel.org/stable/c/9e46c70e829bddc24e04f963471e9983a11598b7 rh#2273213 |
CVE-2024-26758 | kernel-source-rt:Ignore | moderate | () | CVE-2024-26758 SMASH Issue 400248 https://git.kernel.org/stable/c/1baae052cccd08daf9a9d64c3f959d8cdb689757 https://git.kernel.org/stable/c/a55f0d6179a19c6b982e2dc344d58c98647a3be0 rh#2273206 |
CVE-2024-26760 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26760 SMASH Issue 400250 bnc#1222596 https://git.kernel.org/stable/c/1cfe9489fb563e9a0c9cdc5ca68257a44428c2ec https://git.kernel.org/stable/c/4ebc079f0c7dcda1270843ab0f38ab4edb8f7921 https://git.kernel.org/stable/c/de959094eb2197636f7c803af0943cb9d3b35804 https://git.kernel.org/stable/c/f49b20fd0134da84a6bd8108f9e73c077b7d6231 rh#2273202 |
CVE-2024-26761 | kernel-source-rt:Ignore | moderate | () | CVE-2024-26761 SMASH Issue 400251 https://git.kernel.org/stable/c/031217128990d7f0ab8c46db1afb3cf1e075fd29 https://git.kernel.org/stable/c/0cab687205986491302cd2e440ef1d253031c221 https://git.kernel.org/stable/c/2cc1a530ab31c65b52daf3cb5d0883c8b614ea69 https://git.kernel.org/stable/c/3a3181a71935774bda2398451256d7441426420b rh#2273200 |
CVE-2024-26764 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2024-26764 SMASH Issue 400254 bnc#1222721 https://git.kernel.org/stable/c/18f614369def2a11a52f569fe0f910b199d13487 https://git.kernel.org/stable/c/1dc7d74fe456944a9b1c57bd776280249f441ac6 https://git.kernel.org/stable/c/337b543e274fe7a8f47df3c8293cc6686ffa620f https://git.kernel.org/stable/c/b4eea7a05ee0ab5ab0514421e6ba8c5d249cf942 https://git.kernel.org/stable/c/b820de741ae48ccf50dd95e297889c286ff4f760 https://git.kernel.org/stable/c/d7b6fa97ec894edd02f64b83e5e72e1aa352f353 https://git.kernel.org/stable/c/e7e23fc5d5fe422827c9a43ecb579448f73876c7 https://git.kernel.org/stable/c/ea1cd64d59f22d6d13f367d62ec6e27b9344695f https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2273193 |
CVE-2024-26766 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2024-26766 SMASH Issue 400256 bnc#1222726 bnc#1222882 https://git.kernel.org/stable/c/115b7f3bc1dce590a6851a2dcf23dc1100c49790 https://git.kernel.org/stable/c/3f38d22e645e2e994979426ea5a35186102ff3c2 https://git.kernel.org/stable/c/47ae64df23ed1318e27bd9844e135a5e1c0e6e39 https://git.kernel.org/stable/c/52dc9a7a573dbf778625a0efca0fca55489f084b https://git.kernel.org/stable/c/5833024a9856f454a964a198c63a57e59e07baf5 https://git.kernel.org/stable/c/9034a1bec35e9f725315a3bb6002ef39666114d9 https://git.kernel.org/stable/c/a2fef1d81becf4ff60e1a249477464eae3c3bc2a https://git.kernel.org/stable/c/e6f57c6881916df39db7d95981a8ad2b9c3458d6 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2273187 |
CVE-2024-26768 | kernel-source-rt:Not affected | moderate | () | CVE-2024-26768 SMASH Issue 400258 bnc#1222600 https://git.kernel.org/stable/c/0f6810e39898af2d2cabd9313e4dbc945fb5dfdd https://git.kernel.org/stable/c/4551b30525cf3d2f026b92401ffe241eb04dfebe https://git.kernel.org/stable/c/88e189bd16e5889e44a41b3309558ebab78b9280 rh#2273183 |
CVE-2024-26769 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26769 SMASH Issue 400259 bnc#1222727 https://git.kernel.org/stable/c/1d86f79287206deec36d63b89c741cf542b6cadd https://git.kernel.org/stable/c/5e0bc09a52b6169ce90f7ac6e195791adb16cec4 https://git.kernel.org/stable/c/710c69dbaccdac312e32931abcb8499c1525d397 https://git.kernel.org/stable/c/9e6987f8937a7bd7516aa52f25cb7e12c0c92ee8 https://git.kernel.org/stable/c/eaf0971fdabf2a93c1429dc6bedf3bbe85dffa30 rh#2273180 |
CVE-2024-26772 | kernel-source-rt:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26772 SMASH Issue 400262 bnc#1222613 https://git.kernel.org/stable/c/21dbe20589c7f48e9c5d336ce6402bcebfa6d76a https://git.kernel.org/stable/c/5a6dcc4ad0f7f7fa8e8d127b5526e7c5f2d38a43 https://git.kernel.org/stable/c/6b92b1bc16d691c95b152c6dbf027ad64315668d https://git.kernel.org/stable/c/832698373a25950942c04a512daa652c18a9b513 https://git.kernel.org/stable/c/8de8305a25bfda607fc13475ebe84b978c96d7ff https://git.kernel.org/stable/c/d3bbe77a76bc52e9d4d0a120f1509be36e25c916 https://git.kernel.org/stable/c/d639102f4cbd4cb65d1225dba3b9265596aab586 https://git.kernel.org/stable/c/ffeb72a80a82aba59a6774b0611f792e0ed3b0b7 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html jsc#CAR-3305 rh#2273242 |
CVE-2024-26774 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26774 SMASH Issue 400264 bnc#1222622 https://git.kernel.org/stable/c/687061cfaa2ac3095170e136dd9c29a4974f41d4 https://git.kernel.org/stable/c/8b40eb2e716b503f7a4e1090815a17b1341b2150 https://git.kernel.org/stable/c/8cf9cc602cfb40085967c0d140e32691c8b71cf3 https://git.kernel.org/stable/c/993bf0f4c393b3667830918f9247438a8f6fdb5b https://git.kernel.org/stable/c/f32d2a745b02123258026e105a008f474f896d6a rh#2273234 |
CVE-2024-26776 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26776 SMASH Issue 400266 bnc#1222764 https://git.kernel.org/stable/c/0399d7eba41d9b28f5bdd7757ec21a5b7046858d https://git.kernel.org/stable/c/d637b5118274701e8448f35953877daf04df18b4 https://git.kernel.org/stable/c/de8b6e1c231a95abf95ad097b993d34b31458ec9 https://git.kernel.org/stable/c/e4168ac25b4bd378bd7dda322d589482a136c1fd https://git.kernel.org/stable/c/e94da8aca2e78ef9ecca02eb211869eacd5504e5 https://git.kernel.org/stable/c/f19361d570c67e7e014896fa2dacd7d721bf0aa8 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2273230 |
CVE-2024-26780 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26780 SMASH Issue 400332 bnc#1222588 https://git.kernel.org/stable/c/25236c91b5ab4a26a56ba2e79b8060cf4e047839 https://git.kernel.org/stable/c/2a3d40b4025fcfe51b04924979f1653993b17669 https://git.kernel.org/stable/c/36f7371de977f805750748e80279be7e370df85c https://git.kernel.org/stable/c/69e0f04460f4037e01e29f0d9675544f62aafca3 https://git.kernel.org/stable/c/cb8890318dde26fc89c6ea67d6e9070ab50b6e91 rh#2273474 |
CVE-2024-26781 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26781 SMASH Issue 400333 bnc#1222589 https://git.kernel.org/stable/c/70e5b013538d5e4cb421afed431a5fcd2a5d49ee https://git.kernel.org/stable/c/cc32ba2fdf3f8b136619fff551f166ba51ec856d https://git.kernel.org/stable/c/d487e7ba1bc7444d5f062c4930ef8436c47c7e63 https://git.kernel.org/stable/c/d6a9608af9a75d13243d217f6ce1e30e57d56ffe https://git.kernel.org/stable/c/f27d319df055629480b84b9288a502337b6f2a2e https://git.kernel.org/stable/c/fa8c776f4c323a9fbc8ddf25edcb962083391430 rh#2273470 |
CVE-2024-26782 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26782 SMASH Issue 400334 bnc#1222590 https://git.kernel.org/stable/c/10048689def7e40a4405acda16fdc6477d4ecc5c https://git.kernel.org/stable/c/4a4eeb6912538c2d0b158e8d11b62d96c1dada4e https://git.kernel.org/stable/c/85933e80d077c9ae2227226beb86c22f464059cc https://git.kernel.org/stable/c/ce0809ada38dca8d6d41bb57ab40494855c30582 https://git.kernel.org/stable/c/d93fd40c62397326046902a2c5cb75af50882a85 https://git.kernel.org/stable/c/f74362a004225df935863dea6eb7d82daaa5b16e https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2273468 |
CVE-2024-26783 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26783 SMASH Issue 400335 bnc#1222615 https://git.kernel.org/stable/c/2774f256e7c0219e2b0a0894af1c76bdabc4f974 https://git.kernel.org/stable/c/bdd21eed8b72f9e28d6c279f6db258e090c79080 https://git.kernel.org/stable/c/d6159bd4c00594249e305bfe02304c67c506264e rh#2273466 |
CVE-2024-26784 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26784 SMASH Issue 400336 bnc#1222778 https://git.kernel.org/stable/c/eb5555d422d0fc325e1574a7353d3c616f82d8b5 https://git.kernel.org/stable/c/f6aaf131e4d4a9a26040ecc018eb70ab8b3d355d rh#2273464 |
CVE-2024-26785 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26785 SMASH Issue 400337 bnc#1222779 https://git.kernel.org/stable/c/cf7c2789822db8b5efa34f5ebcf1621bc0008d48 https://git.kernel.org/stable/c/fc719ecbca45c9c046640d72baddba3d83e0bc0b rh#2273461 |
CVE-2024-26786 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26786 SMASH Issue 400338 bnc#1222780 https://git.kernel.org/stable/c/9526a46cc0c378d381560279bea9aa34c84298a0 https://git.kernel.org/stable/c/aeb004c0cd6958e910123a1607634401009c9539 https://git.kernel.org/stable/c/f1fb745ee0a6fe43f1d84ec369c7e6af2310fda9 rh#2273459 |
CVE-2024-26789 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26789 SMASH Issue 400341 bnc#1222626 https://git.kernel.org/stable/c/034e2d70b5c7f578200ad09955aeb2aa65d1164a https://git.kernel.org/stable/c/1291d278b5574819a7266568ce4c28bce9438705 https://git.kernel.org/stable/c/1c0cf6d19690141002889d72622b90fc01562ce4 https://git.kernel.org/stable/c/9e8ecd4908b53941ab6f0f51584ab80c6c6606c4 rh#2273453 |
CVE-2024-26792 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26792 SMASH Issue 400344 bnc#1222430 https://git.kernel.org/stable/c/c34adc20b91a8e55e048b18d63f4f4ae003ecf8f https://git.kernel.org/stable/c/c8ab7521665bd0f8bc4a900244d1d5a7095cc3b9 https://git.kernel.org/stable/c/e2b54eaf28df0c978626c9736b94f003b523b451 https://git.kernel.org/stable/c/eb3441093aad251418921246fc3b224fd1575701 rh#2273446 |
CVE-2024-26794 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26794 SMASH Issue 400346 bnc#1222426 https://git.kernel.org/stable/c/31d07a757c6d3430e03cc22799921569999b9a12 https://git.kernel.org/stable/c/a1a4a9ca77f143c00fce69c1239887ff8b813bec https://git.kernel.org/stable/c/d43f8e58f10a44df8c08e7f7076f3288352cd168 rh#2273442 |
CVE-2024-26795 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26795 SMASH Issue 400347 bnc#1222794 https://git.kernel.org/stable/c/2a1728c15ec4f45ed9248ae22f626541c179bfbe https://git.kernel.org/stable/c/5941a90c55d3bfba732b32208d58d997600b44ef https://git.kernel.org/stable/c/8310080799b40fd9f2a8b808c657269678c149af https://git.kernel.org/stable/c/8af1c121b0102041809bc137ec600d1865eaeedd https://git.kernel.org/stable/c/a11dd49dcb9376776193e15641f84fcc1e5980c9 https://git.kernel.org/stable/c/a278d5c60f21aa15d540abb2f2da6e6d795c3e6e https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2273440 |
CVE-2024-26796 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26796 SMASH Issue 400348 bnc#1222795 https://git.kernel.org/stable/c/682dc133f83e0194796e6ea72eb642df1c03dfbe https://git.kernel.org/stable/c/e0d17ee872cf8d0f51cc561329b8e1a0aa792bbb https://git.kernel.org/stable/c/e4f50e85de5a6b21dfdc0d7ca435eba4f62935c3 rh#2273438 |
CVE-2024-26797 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26797 SMASH Issue 400349 bnc#1222425 https://git.kernel.org/stable/c/0f8ca019544a252d1afb468ce840c6dcbac73af4 https://git.kernel.org/stable/c/50a6302cf881f67f1410461a68fe9eabd00ff31d rh#2273436 |
CVE-2024-26798 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26798 SMASH Issue 400350 bnc#1222798 https://git.kernel.org/stable/c/00d6a284fcf3fad1b7e1b5bc3cd87cbfb60ce03f https://git.kernel.org/stable/c/20a4b5214f7bee13c897477168c77bbf79683c3d https://git.kernel.org/stable/c/2f91a96b892fab2f2543b4a55740c5bee36b1a6b https://git.kernel.org/stable/c/73a6bd68a1342f3a44cac9dffad81ad6a003e520 https://git.kernel.org/stable/c/a2c881413dcc5d801bdc9535e51270cc88cb9cd8 rh#2273434 |
CVE-2024-26799 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26799 SMASH Issue 400351 bnc#1222415 https://git.kernel.org/stable/c/1382d8b55129875b2e07c4d2a7ebc790183769ee https://git.kernel.org/stable/c/99adc8b4d2f38bf0d06483ec845bc48f60c3f8cf https://git.kernel.org/stable/c/d5a7726e6ea62d447b79ab5baeb537ea6bdb225b rh#2273432 |
CVE-2024-26800 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26800 SMASH Issue 400352 bnc#1222728 https://git.kernel.org/stable/c/13114dc5543069f7b97991e3b79937b6da05f5b0 https://git.kernel.org/stable/c/1ac9fb84bc7ecd4bc6428118301d9d864d2a58d1 https://git.kernel.org/stable/c/81be85353b0f5a7b660635634b655329b429eefe https://git.kernel.org/stable/c/f2b85a4cc763841843de693bbd7308fe9a2c4c89 rh#2273472 |
CVE-2024-26802 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26802 SMASH Issue 400354 bnc#1222799 https://git.kernel.org/stable/c/17ccd9798fe0beda3db212cfa3ebe373f605cbd6 https://git.kernel.org/stable/c/699b103e48ce32d03fc86c35b37ee8ae4288c7e3 https://git.kernel.org/stable/c/8af411bbba1f457c33734795f024d0ef26d0963f https://git.kernel.org/stable/c/8e99556301172465c8fe33c7f78c39a3d4ce8462 https://git.kernel.org/stable/c/f72cf22dccc94038cbbaa1029cb575bf52e5cbc8 rh#2273427 |
CVE-2024-26803 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26803 SMASH Issue 400355 bnc#1222788 https://git.kernel.org/stable/c/16edf51f33f52dff70ed455bc40a6cc443c04664 https://git.kernel.org/stable/c/7985d73961bbb4e726c1be7b9cd26becc7be8325 https://git.kernel.org/stable/c/8f7a3894e58e6f5d5815533cfde60e3838947941 https://git.kernel.org/stable/c/f011c103e654d83dc85f057a7d1bd0960d02831c https://git.kernel.org/stable/c/fe9f801355f0b47668419f30f1fac1cf4539e736 rh#2273425 |
CVE-2024-26806 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26806 SMASH Issue 400358 bnc#1222800 https://git.kernel.org/stable/c/041562ebc4759c9932b59a06527f8753b86da365 https://git.kernel.org/stable/c/959043afe53ae80633e810416cee6076da6e91c6 rh#2273419 |
CVE-2024-26807 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26807 SMASH Issue 400359 bnc#1222801 https://git.kernel.org/stable/c/03f1573c9587029730ca68503f5062105b122f61 https://git.kernel.org/stable/c/32ce3bb57b6b402de2aec1012511e7ac4e7449dc https://git.kernel.org/stable/c/34e1d5c4407c78de0e3473e1fbf8fb74dbe66d03 rh#2273416 |
CVE-2024-26808 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26808 SMASH Issue 400363 bnc#1222634 https://git.kernel.org/stable/c/01acb2e8666a6529697141a6017edbf206921913 https://git.kernel.org/stable/c/36a0a80f32209238469deb481967d777a3d539ee https://git.kernel.org/stable/c/70f17b48c86622217a58d5099d29242fc9adac58 https://git.kernel.org/stable/c/9489e214ea8f2a90345516016aa51f2db3a8cc2f https://git.kernel.org/stable/c/af149a46890e8285d1618bd68b8d159bdb87fdb3 https://git.kernel.org/stable/c/e5888acbf1a3d8d021990ce6c6061fd5b2bb21b4 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2273405 |
CVE-2024-26809 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26809 SMASH Issue 400364 bnc#1222633 https://git.kernel.org/stable/c/362508506bf545e9ce18c72a2c48dcbfb891ab9c https://git.kernel.org/stable/c/5ad233dc731ab64cdc47b84a5c1f78fff6c024af https://git.kernel.org/stable/c/821e28d5b506e6a73ccc367ff792bd894050d48b https://git.kernel.org/stable/c/9384b4d85c46ce839f51af01374062ce6318b2f2 https://git.kernel.org/stable/c/b0e256f3dd2ba6532f37c5c22e07cb07a36031ee https://git.kernel.org/stable/c/b36b83297ff4910dfc8705402c8abffd4bbf8144 https://git.kernel.org/stable/c/ff90050771412b91e928093ccd8736ae680063c2 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2273402 |
CVE-2024-26811 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26811 SMASH Issue 400708 bnc#1222805 https://git.kernel.org/stable/c/51a6c2af9d20203ddeeaf73314ba8854b38d01bd https://git.kernel.org/stable/c/76af689a45aa44714b46d1a7de4ffdf851ded896 https://git.kernel.org/stable/c/88b7f1143b15b29cccb8392b4f38e75b7bb3e300 https://git.kernel.org/stable/c/a637fabac554270a851033f5ab402ecb90bc479c https://git.kernel.org/stable/c/a677ebd8ca2f2632ccdecbad7b87641274e15aac https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XCNJZBDMGJXRIKLGKM4RRJU4XCHPX62/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG6L4FXO4WNWUM6W7USOH2YTRVWREM3V/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RO3RO34MLQ6WT3A7O6STQUVXW43N6W3K/ rh#2273967 |
CVE-2024-26813 | kernel-source-rt:Ignore | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26813 SMASH Issue 400467 bnc#1222809 https://git.kernel.org/stable/c/07afdfd8a68f9eea8db0ddc4626c874f29d2ac5e https://git.kernel.org/stable/c/09452c8fcbd7817c06e8e3212d99b45917e603a5 https://git.kernel.org/stable/c/0f8d8f9c2173a541812dd750529f4a415117eb29 https://git.kernel.org/stable/c/62d4e43a569b67929eb3319780be5359694c8086 https://git.kernel.org/stable/c/675daf435e9f8e5a5eab140a9864dfad6668b375 https://git.kernel.org/stable/c/7932db06c82c5b2f42a4d1a849d97dba9ce4a362 https://git.kernel.org/stable/c/cc5838f19d39a5fef04c468199699d2a4578be3a https://git.kernel.org/stable/c/d6bedd6acc0bcb1e7e010bc046032e47f08d379f https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2273648 |
CVE-2024-26814 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26814 SMASH Issue 400468 bnc#1222810 https://git.kernel.org/stable/c/083e750c9f5f4c3bf61161330fb84d7c8e8bb417 https://git.kernel.org/stable/c/250219c6a556f8c69c5910fca05a59037e24147d https://git.kernel.org/stable/c/6ec0d88166dac43f29e96801c0927d514f17add9 https://git.kernel.org/stable/c/7447d911af699a15f8d050dfcb7c680a86f87012 https://git.kernel.org/stable/c/a563fc18583ca4f42e2fdd0c70c7c618288e7ede https://git.kernel.org/stable/c/de87511fb0404d23b6da5f4660383b6ed095e28d https://git.kernel.org/stable/c/ee0bd4ad780dfbb60355b99f25063357ab488267 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2273646 |
CVE-2024-26815 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26815 SMASH Issue 401230 bnc#1222635 https://git.kernel.org/stable/c/343041b59b7810f9cdca371f445dd43b35c740b1 https://git.kernel.org/stable/c/6915b1b28fe57e92c78e664366dc61c4f15ff03b https://git.kernel.org/stable/c/860e838fb089d652a446ced52cbdf051285b68e7 https://git.kernel.org/stable/c/9b720bb1a69a9f12a4a5c86b6f89386fe05ed0f2 https://git.kernel.org/stable/c/bd2474a45df7c11412c2587de3d4e43760531418 rh#2274478 |
CVE-2024-26818 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26818 SMASH Issue 402305 bnc#1222962 https://git.kernel.org/stable/c/30369084ac6e27479a347899e74f523e6ca29b89 https://git.kernel.org/stable/c/6bdd43f62ab3bb5a306af7f0ab857af45777f5a8 https://git.kernel.org/stable/c/8a585914c266dc044f53b5c83c170f79b45fcf9a rh#2275622 |
CVE-2024-26819 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26819 SMASH Issue 402307 bnc#1223079 https://git.kernel.org/stable/c/438d19492b7f002334573bae43276297eb234c80 https://git.kernel.org/stable/c/888a0a46b80fa37eacfe81faf47ba0b83876251d https://git.kernel.org/stable/c/a891a0621e725e85529985139cada8cb5a74a116 https://git.kernel.org/stable/c/bd504bcfec41a503b32054da5472904b404341a4 https://git.kernel.org/stable/c/c5d83ac2bf6ca668a39ffb1a576899a66153ba19 https://git.kernel.org/stable/c/cd70175481f63af31901dd463e44386f033c3f4c rh#2260046 rh#2263856 rh#2275620 |
CVE-2024-26820 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26820 SMASH Issue 402308 bnc#1223078 https://git.kernel.org/stable/c/309ef7de5d840e17607e7d65cbf297c0564433ef https://git.kernel.org/stable/c/4d29a58d96a78728cb01ee29ed70dc4bd642f135 https://git.kernel.org/stable/c/5b10a88f64c0315cfdef45de0aaaa4eef57de0b7 https://git.kernel.org/stable/c/9cae43da9867412f8bd09aee5c8a8dc5e8dc3dc2 https://git.kernel.org/stable/c/a71302c8638939c45e4ba5a99ea438185fd3f418 https://git.kernel.org/stable/c/b6d46f306b3964d05055ddaa96b58cd8bd3a472c https://git.kernel.org/stable/c/bcb7164258d0a9a8aa2e73ddccc2d78f67d2519d https://git.kernel.org/stable/c/c7441c77c91e47f653104be8353b44a3366a5366 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2275618 |
CVE-2024-26821 | kernel-source-rt:Not affected | moderate | () | CVE-2024-26821 SMASH Issue 402309 bnc#1223080 https://git.kernel.org/stable/c/2a7a31e1fb9717845d9d5e2a8c6e48848147801e https://git.kernel.org/stable/c/31f71f2d7a081fc6c6bdf06865beedf6db5b0ca4 https://git.kernel.org/stable/c/46f5ab762d048dad224436978315cbc2fa79c630 https://git.kernel.org/stable/c/95de4ad173ca0e61034f3145d66917970961c210 rh#2275616 |
CVE-2024-26822 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26822 SMASH Issue 402310 bnc#1223011 https://git.kernel.org/stable/c/4508ec17357094e2075f334948393ddedbb75157 https://git.kernel.org/stable/c/7590ba9057c6d74c66f3b909a383ec47cd2f27fb https://git.kernel.org/stable/c/c2aa2718cda2d56b4a551cb40043e9abc9684626 rh#2275613 |
CVE-2024-26823 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26823 SMASH Issue 402311 bnc#1223009 https://git.kernel.org/stable/c/4c60c611441f1f1e5de8e00e98ee5a4970778a00 https://git.kernel.org/stable/c/8b02da04ad978827e5ccd675acf170198f747a7a https://git.kernel.org/stable/c/91a80fff3eeed928b6fba21271f6a9719b22a5d8 rh#2275611 |
CVE-2024-26824 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26824 SMASH Issue 402312 bnc#1223081 https://git.kernel.org/stable/c/24c890dd712f6345e382256cae8c97abb0406b70 https://git.kernel.org/stable/c/775f3c1882a493168e08fdb8cde0865c8f3a8a29 https://git.kernel.org/stable/c/9c82920359b7c1eddaf72069bcfe0ffddf088cd0 rh#2275609 |
CVE-2024-26826 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26826 SMASH Issue 402313 bnc#1223010 https://git.kernel.org/stable/c/624902eab7abcb8731b333ec73f206d38d839cd8 https://git.kernel.org/stable/c/6673d9f1c2cd984390550dbdf7d5ae07b20abbf8 https://git.kernel.org/stable/c/6f95120f898b40d13fd441225ef511307853c9c2 https://git.kernel.org/stable/c/b609c783c535493aa3fca22c7e40a120370b1ca5 https://git.kernel.org/stable/c/b6c620dc43ccb4e802894e54b651cf81495e9598 rh#2275604 |
CVE-2024-26827 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26827 SMASH Issue 402314 bnc#1223005 https://git.kernel.org/stable/c/0589dff4fbf4a7b88a909a34ecfa7b5d3daf51f5 https://git.kernel.org/stable/c/083870b029c06da6a9a49340dd78637eec35a1d4 https://git.kernel.org/stable/c/83ef106fa732aea8558253641cd98e8a895604d7 https://git.kernel.org/stable/c/9318483e99f242ec4059e2fa20887e1d28efd5ae rh#2275602 |
CVE-2024-26829 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26829 SMASH Issue 402316 bnc#1223027 https://git.kernel.org/stable/c/207557e393a135c1b6fe1df7cc0741d2c1789fff https://git.kernel.org/stable/c/486a4176bc783df798bce2903824801af8d2c3ae https://git.kernel.org/stable/c/7219a692ffc00089015ada33b85b334d1a4b6e8e https://git.kernel.org/stable/c/b37259448bbc70af1d0e52a9dd5559a9c29c9621 https://git.kernel.org/stable/c/be76ad74a43f90f340f9f479e6b04f02125f6aef https://git.kernel.org/stable/c/dc9ceb90c4b42c6e5c6757df1d6257110433788e rh#2275598 |
CVE-2024-26831 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2024-26831 SMASH Issue 402319 bnc#1223008 https://git.kernel.org/stable/c/4e1d71cabb19ec2586827adfc60d68689c68c194 https://git.kernel.org/stable/c/7f97805b8df6e33850e225e6bd3ebd9e246920af https://git.kernel.org/stable/c/d74226e03df1bf19848f18344401f254345af912 rh#2275593 |
CVE-2024-26832 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26832 SMASH Issue 402320 bnc#1223007 https://git.kernel.org/stable/c/14f1992430ef9e647b02aa8ca12c5bcb9a1dffea https://git.kernel.org/stable/c/6156277d1b26cb3fdb6fcbf0686ab78268571644 https://git.kernel.org/stable/c/e2891c763aa2cff74dd6b5e978411ccf0cf94abe https://git.kernel.org/stable/c/e3b63e966cac0bf78aaa1efede1827a252815a1d rh#2275590 |
CVE-2024-26833 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26833 SMASH Issue 402321 bnc#1223036 https://git.kernel.org/stable/c/10c6b90e975358c17856a578419dc449887899c2 https://git.kernel.org/stable/c/33f649f1b1cea39ed360e6c12bba4fac83118e6e https://git.kernel.org/stable/c/541e79265ea7e339a7c4a462feafe9f8f996e04b https://git.kernel.org/stable/c/58168005337eabef345a872be3f87d0215ff3b30 https://git.kernel.org/stable/c/b49b022f7dfce85eb77d0d987008fde5c01d7857 https://git.kernel.org/stable/c/bae67893578d608e35691dcdfa90c4957debf1d3 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2275588 |
CVE-2024-26834 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2024-26834 SMASH Issue 402322 bnc#1222964 https://git.kernel.org/stable/c/13b57b5cd591d5b22f9bbf047b2922967de411f3 https://git.kernel.org/stable/c/2d17cf10179a7de6d8f0128168b84ad0b4a1863f https://git.kernel.org/stable/c/8762785f459be1cfe6fcf7285c123aad6a3703f0 https://git.kernel.org/stable/c/9256ab9232e35a16af9c30fa4e522e6d1bd3605a https://git.kernel.org/stable/c/a6cafdb49a7bbf4a88367db209703eee6941e023 rh#2275586 |
CVE-2024-26835 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) | CVE-2024-26835 SMASH Issue 402323 bnc#1222967 https://git.kernel.org/stable/c/0c9302a6da262e6ab6a6c1d30f04a6130ed97376 https://git.kernel.org/stable/c/31ea574aeca1aa488e18716459bde057217637af https://git.kernel.org/stable/c/664264a5c55bf97a9c571c557d477b75416199be https://git.kernel.org/stable/c/6f2496366426cec18ba53f1c7f6c3ac307ca6a95 https://git.kernel.org/stable/c/a6411f3c48f991c19aaf9a24fce36865fbba28d7 https://git.kernel.org/stable/c/ae4360cbd385f0d7a8a86d5723e50448cc6318f3 https://git.kernel.org/stable/c/bccebf64701735533c8db37773eeacc6566cc8ec https://git.kernel.org/stable/c/f2135bbf14949687e96cabb13d8a91ae3deb9069 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2275584 |
CVE-2024-26836 | kernel-source-rt:Not affected | moderate | 4.3 (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2024-26836 SMASH Issue 402324 bnc#1222968 https://git.kernel.org/stable/c/2bfbe1e0aed00ba51d58573c79452fada3f62ed4 https://git.kernel.org/stable/c/6f7d0f5fd8e440c3446560100ac4ff9a55eec340 rh#2275582 |
CVE-2024-26837 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N) | CVE-2024-26837 SMASH Issue 402325 bnc#1222973 https://git.kernel.org/stable/c/2d5b4b3376fa146a23917b8577064906d643925f https://git.kernel.org/stable/c/603be95437e7fd85ba694e75918067fb9e7754db https://git.kernel.org/stable/c/dc489f86257cab5056e747344f17a164f63bff4b https://git.kernel.org/stable/c/e0b4c5b1d760008f1dd18c07c35af0442e54f9c8 rh#2275580 |
CVE-2024-26838 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26838 SMASH Issue 402327 bnc#1222974 https://git.kernel.org/stable/c/0ae8ad0013978f7471f22bcf45b027393e87f5dc https://git.kernel.org/stable/c/635d79aa477f9912e602feb5498bdd51fb9cb824 https://git.kernel.org/stable/c/b2e4a5266e3d133b4c7f0e43bf40d13ce14fd1aa https://git.kernel.org/stable/c/bd97cea7b18a0a553773af806dfbfac27a7c4acb https://git.kernel.org/stable/c/c6f1ca235f68b22b3e691b2ea87ac285e5946848 rh#2275578 |
CVE-2024-26841 | kernel-source-rt:Not affected | moderate | () | CVE-2024-26841 SMASH Issue 402329 bnc#1222977 https://git.kernel.org/stable/c/0d862db64d26c2905ba1a6a8561466b215b664c2 https://git.kernel.org/stable/c/752cd08da320a667a833803a8fd6bb266114cce5 https://git.kernel.org/stable/c/b1ec3d6b86fdd057559a5908e6668279bf770e0e rh#2275571 |
CVE-2024-26842 | kernel-source-rt:Analysis | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26842 SMASH Issue 402330 bnc#1223013 https://git.kernel.org/stable/c/7ac9e18f5d66087cd22751c5c5bf0090eb0038fe https://git.kernel.org/stable/c/a992425d18e5f7c48931121993c6c69426f2a8fb https://git.kernel.org/stable/c/b513d30d59bb383a6a5d6b533afcab2cee99a8f8 rh#2275567 |
CVE-2024-26843 | kernel-source-rt:Analysis | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26843 SMASH Issue 402331 bnc#1223014 https://git.kernel.org/stable/c/156cb12ffdcf33883304f0db645e1eadae712fe0 https://git.kernel.org/stable/c/4aa36b62c3eaa869860bf78b1146e9f2b5f782a9 https://git.kernel.org/stable/c/4fff3d735baea104017f2e3c245e27cdc79f2426 https://git.kernel.org/stable/c/700c3f642c32721f246e09d3a9511acf40ae42be https://git.kernel.org/stable/c/cf3d6813601fe496de7f023435e31bfffa74ae70 https://git.kernel.org/stable/c/de1034b38a346ef6be25fe8792f5d1e0684d5ff4 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2275565 |
CVE-2024-26844 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2024-26844 SMASH Issue 402332 bnc#1223015 https://git.kernel.org/stable/c/0f1bae071de9967602807472921829a54b2e5956 https://git.kernel.org/stable/c/13f3956eb5681a4045a8dfdef48df5dc4d9f58a6 https://git.kernel.org/stable/c/8fc80874103a5c20aebdc2401361aa01c817f75b https://git.kernel.org/stable/c/cbaf9be337f7da25742acfce325119e3395b1f1b rh#2275563 |
CVE-2024-26845 | kernel-source-rt:Analysis | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26845 SMASH Issue 402333 bnc#1223018 https://git.kernel.org/stable/c/11f3fe5001ed05721e641f0ecaa7a73b7deb245d https://git.kernel.org/stable/c/168ed59170de1fd7274080fe102216162d6826cf https://git.kernel.org/stable/c/36bc5040c863b44af06094b22f1e50059227b9cb https://git.kernel.org/stable/c/425a571a7e6fc389954cf2564e1edbba3740e171 https://git.kernel.org/stable/c/83ab68168a3d990d5ff39ab030ad5754cbbccb25 https://git.kernel.org/stable/c/a9849b67b4402a12eb35eadc9306c1ef9847d53d https://git.kernel.org/stable/c/bd508f96b5fef96d8a0ce9cbb211d82bcfc2341f https://git.kernel.org/stable/c/e717bd412001495f17400bfc09f606f1b594ef5a https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2275561 |
CVE-2024-26847 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26847 SMASH Issue 402300 bnc#1223026 https://git.kernel.org/stable/c/6b6282d56b14879124416a23837af9bd52ae2dfb https://git.kernel.org/stable/c/dd63817baf334888289877ab1db1d866af2a6479 https://git.kernel.org/stable/c/fad87dbd48156ab940538f052f1820f4b6ed2819 rh#2275758 |
CVE-2024-26848 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2024-26848 SMASH Issue 402353 bnc#1223030 https://git.kernel.org/stable/c/058ed71e0f7aa3b6694ca357e23d084e5d3f2470 https://git.kernel.org/stable/c/106e14ca55a0acb3236ee98813a1d243f8aa2d05 https://git.kernel.org/stable/c/2afdd0cb02329464d77f3ec59468395c791a51a4 https://git.kernel.org/stable/c/5c78be006ed9cb735ac2abf4fd64f3f4ea26da31 https://git.kernel.org/stable/c/5f7a07646655fb4108da527565dcdc80124b14c4 https://git.kernel.org/stable/c/76426abf9b980b46983f97de8e5b25047b4c9863 https://git.kernel.org/stable/c/80b15346492bdba677bbb0adefc611910e505f7b https://git.kernel.org/stable/c/854ebf45a4ddd4cadeffb6644e88d19020634e1a https://git.kernel.org/stable/c/96370ba395c572ef496fd2c7afc4a1ab3dedd3f0 https://git.kernel.org/stable/c/9c41f4935625218a2053a2dce1423c3054169809 https://git.kernel.org/stable/c/a6ffae61ad9ebf2fdcb943135b2f30c85f49cd27 https://git.kernel.org/stable/c/b94f434fe977689da4291dc21717790b9bd1c064 https://git.kernel.org/stable/c/f67898867b6b0f4542cddc7fe57997978b948a7a https://git.kernel.org/stable/c/fe02316e4933befc621fa125efb8f8b4d04cceec https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2275756 |
CVE-2024-26849 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2024-26849 SMASH Issue 402354 bnc#1223053 https://git.kernel.org/stable/c/0ac219c4c3ab253f3981f346903458d20bacab32 https://git.kernel.org/stable/c/7a9d14c63b35f89563c5ecbadf918ad64979712d https://git.kernel.org/stable/c/9a0d18853c280f6a0ee99f91619f2442a17a323a https://git.kernel.org/stable/c/a2ab028151841cd833cb53eb99427e0cc990112d rh#2275754 |
CVE-2024-26850 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26850 SMASH Issue 402355 bnc#1223054 https://git.kernel.org/stable/c/720da1e593b85a550593b415bf1d79a053133451 https://git.kernel.org/stable/c/d2a9510c0e39d06f5544075c13040407bdbf2803 https://git.kernel.org/stable/c/eeeddf85fc58d48c58ad916e4ca12363ebd8ab21 rh#2275752 |
CVE-2024-26853 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26853 SMASH Issue 402358 bnc#1223061 https://git.kernel.org/stable/c/1b3b8231386a572bac8cd5b6fd7e944b84f9bb1f https://git.kernel.org/stable/c/63a3c1f3c9ecc654d851e7906d05334cd0c236e2 https://git.kernel.org/stable/c/8df393af9e7e8dfd62e9c41dbaa4d2ff53bf794a https://git.kernel.org/stable/c/ef27f655b438bed4c83680e4f01e1cde2739854b rh#2275748 |
CVE-2024-26854 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26854 SMASH Issue 402359 bnc#1223039 https://git.kernel.org/stable/c/9224fc86f1776193650a33a275cac628952f80a9 https://git.kernel.org/stable/c/db29ceff3e25c48907016da456a7cbee6310fd83 rh#2275746 |
CVE-2024-26856 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26856 SMASH Issue 402361 bnc#1223052 https://git.kernel.org/stable/c/0de693d68b0a18d5e256556c7c62d92cca35ad52 https://git.kernel.org/stable/c/71809805b95052ff551922f11660008fb3666025 https://git.kernel.org/stable/c/89d72d4125e94aa3c2140fedd97ce07ba9e37674 https://git.kernel.org/stable/c/e46274df1100fb0c06704195bfff5bfbd418bf64 https://git.kernel.org/stable/c/e83bebb718fd1f42549358730e1206164e0861d6 rh#2275740 |
CVE-2024-26858 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26858 SMASH Issue 402363 bnc#1223020 https://git.kernel.org/stable/c/936ef086161ab89a7f38f7a0761d6a3063c3277e https://git.kernel.org/stable/c/b7cf07586c40f926063d4d09f7de28ff82f62b2a https://git.kernel.org/stable/c/d1f71615dbb305f14f3b756cce015d70d8667549 rh#2275735 |
CVE-2024-26860 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26860 SMASH Issue 402365 bnc#1223077 https://git.kernel.org/stable/c/20e21c3c0195d915f33bc7321ee6b362177bf5bf https://git.kernel.org/stable/c/338580a7fb9b0930bb38098007e89cc0fc496bf7 https://git.kernel.org/stable/c/55e565c42dce81a4e49c13262d5bc4eb4c2e588a https://git.kernel.org/stable/c/6d35654f03c35c273240d85ec67e3f2c3596c4e0 https://git.kernel.org/stable/c/74abc2fe09691f3d836d8a54d599ca71f1e4287b rh#2275731 |
CVE-2024-26864 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2024-26864 SMASH Issue 402294 bnc#1223112 https://git.kernel.org/stable/c/04d9d1fc428ac9f581d55118d67e0cb546701feb https://git.kernel.org/stable/c/1b20e61d36f490319d3fbdedd410155232ab5190 https://git.kernel.org/stable/c/856baaa100cd288d3685eedae9a129c996e7e755 https://git.kernel.org/stable/c/86d9b040421bbd26425f5a3edc226f57ecdecbfe https://git.kernel.org/stable/c/ad105cde6b261b8b05ec872fe7d1987417d7fe5a rh#2275723 |
CVE-2024-26865 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2024-26865 L3:68040 SMASH Issue 402370 ZDI-24-297 ZDI-24-298 ZDI-24-299 bnc#1223062 bnc#1223063 bnc#1223557 https://git.kernel.org/stable/c/1e9fd5cf8d7f487332560f7bb312fc7d416817f3 https://git.kernel.org/stable/c/2a750d6a5b365265dbda33330a6188547ddb5c24 https://git.kernel.org/stable/c/9905a157048f441f1412e7bd13372f4a971d75c6 https://git.kernel.org/stable/c/9ceac040506a05a30b104b2aa2e9146810704500 https://git.kernel.org/stable/c/f901ee07853ce97e9f1104c7c898fbbe447f0279 jsc#CAR-3341 rh#2267190 rh#2272041 rh#2275600 rh#2275721 rh#2275928 |
CVE-2024-26867 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26867 SMASH Issue 402371 bnc#1223114 https://git.kernel.org/stable/c/4a825457a45d8debc46ab8cba57d47462411710d https://git.kernel.org/stable/c/cfa9ba1ae0bef0681833a22d326174fe633caab5 rh#2275717 |
CVE-2024-26868 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26868 SMASH Issue 402372 bnc#1223038 https://git.kernel.org/stable/c/31db25e3141b20e2a76a9f219eeca52e3cab126c https://git.kernel.org/stable/c/5ada9016b1217498fad876a3d5b07645cc955608 https://git.kernel.org/stable/c/719fcafe07c12646691bd62d7f8d94d657fa0766 https://git.kernel.org/stable/c/7ca651b4ec4a049f5a46a0e5ff921b86b91c47c5 https://git.kernel.org/stable/c/dac068f164ad05b35e7c0be13f138c3f6adca58f rh#2275715 |
CVE-2024-26869 | kernel-source-rt:Not affected | moderate | 5.9 (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H) | CVE-2024-26869 SMASH Issue 402373 bnc#1223116 https://git.kernel.org/stable/c/04226d8e3c4028dc451e9d8777356ec0f7919253 https://git.kernel.org/stable/c/77bfdb89cc222fc7bfe198eda77bdc427d5ac189 https://git.kernel.org/stable/c/9f0c4a46be1fe9b97dbe66d49204c1371e3ece65 https://git.kernel.org/stable/c/c92f2927df860a60ba815d3ee610a944b92a8694 jsc#CAR-3347 rh#2275713 |
CVE-2024-26870 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26870 SMASH Issue 402374 bnc#1223113 https://git.kernel.org/stable/c/06e828b3f1b206de08ef520fc46a40b22e1869cb https://git.kernel.org/stable/c/23bfecb4d852751d5e403557dd500bb563313baf https://git.kernel.org/stable/c/251a658bbfceafb4d58c76b77682c8bf7bcfad65 https://git.kernel.org/stable/c/4403438eaca6e91f02d272211c4d6b045092396b https://git.kernel.org/stable/c/79cdcc765969d23f4e3d6ea115660c3333498768 https://git.kernel.org/stable/c/80365c9f96015bbf048fdd6c8705d3f8770132bf https://git.kernel.org/stable/c/9d52865ff28245fc2134da9f99baff603a24407a https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2275711 |
CVE-2024-26871 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26871 SMASH Issue 402375 bnc#1223040 https://git.kernel.org/stable/c/4c122a32582b67bdd44ca8d25f894ee2dc54f566 https://git.kernel.org/stable/c/6d102382a11d5e6035f6c98f6e508a38541f7af3 https://git.kernel.org/stable/c/8e2ea8b04cb8d976110c4568509e67d6a39b2889 https://git.kernel.org/stable/c/c2034ef6192a65a986a45c2aa2ed05824fdc0e9f rh#2275709 |
CVE-2024-26873 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26873 SMASH Issue 402297 bnc#1223047 https://git.kernel.org/stable/c/3c4f53b2c341ec6428b98cb51a89a09b025d0953 https://git.kernel.org/stable/c/85c98073ffcfe9e46abfb9c66f3364467119d563 https://git.kernel.org/stable/c/e022dd3b875315a2d2001a512e98d1dc8c991f4a rh#2275705 |
CVE-2024-26877 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2024-26877 SMASH Issue 402380 bnc#1223140 https://git.kernel.org/stable/c/03e6d4e948432a61b35783323b6ab2be071d2619 https://git.kernel.org/stable/c/23bc89fdce71124cd2126fc919c7076e7cb489cf https://git.kernel.org/stable/c/8a01335aedc50a66d04dd39203c89f4bc8042596 https://git.kernel.org/stable/c/9db89b1fb85557892e6681724b367287de5f9f20 https://git.kernel.org/stable/c/a71f66bd5f7b9b35a8aaa49e29565eca66299399 https://git.kernel.org/stable/c/a853450bf4c752e664abab0b2fad395b7ad7701c https://git.kernel.org/stable/c/dbf291d8ffffb70f48286176a15c6c54f0bb0743 rh#2275697 |
CVE-2024-26878 | kernel-source-rt:Analysis | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26878 SMASH Issue 402381 bnc#1223060 https://git.kernel.org/stable/c/1ca72a3de915f87232c9a4cb9bebbd3af8ed3e25 https://git.kernel.org/stable/c/40a673b4b07efd6f74ff3ab60f38b26aa91ee5d5 https://git.kernel.org/stable/c/49669f8e7eb053f91d239df7b1bfb4500255a9d0 https://git.kernel.org/stable/c/61380537aa6dd32d8a723d98b8f1bd1b11d8fee0 https://git.kernel.org/stable/c/6afc9f4434fa8063aa768c2bf5bf98583aee0877 https://git.kernel.org/stable/c/7f9e833fc0f9b47be503af012eb5903086939754 https://git.kernel.org/stable/c/8514899c1a4edf802f03c408db901063aa3f05a1 https://git.kernel.org/stable/c/d0aa72604fbd80c8aabb46eda00535ed35570f1f https://git.kernel.org/stable/c/f2649d98aa9ca8623149b3cb8df00c944f5655c7 rh#2275694 |
CVE-2024-26879 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26879 SMASH Issue 402292 bnc#1223066 https://git.kernel.org/stable/c/0cbefc7b5bdad86b18a263d837450cdc9a56f8d7 https://git.kernel.org/stable/c/7ae1b0dc12ec407f12f80b49d22c6ad2308e2202 https://git.kernel.org/stable/c/9f3e5df38b4528213449e55b80f0316864f2a1c8 https://git.kernel.org/stable/c/a03ed00787b0ce7a83eebabd0fa95ecc4a5cac84 https://git.kernel.org/stable/c/a860aaebacbc908fa06e2642402058f40bfffe10 https://git.kernel.org/stable/c/ba535bce57e71463a86f8b33a0ea88c26e3a6418 rh#2275692 |
CVE-2024-26881 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26881 SMASH Issue 402383 bnc#1223041 https://git.kernel.org/stable/c/0fbcf2366ba9888cf02eda23e35fde7f7fcc07c3 https://git.kernel.org/stable/c/11b998360d96f6c76f04a95f54b49f24d3c858e4 https://git.kernel.org/stable/c/23ec1cec24293f9799c725941677d4e167997265 https://git.kernel.org/stable/c/b2bb19114c079dcfec1ea46e761f510e30505e70 https://git.kernel.org/stable/c/b3cf70472a600bcb2efe24906bc9bc6014d4c6f6 https://git.kernel.org/stable/c/f0b5225a7dfc1bf53c98215db8c2f0b4efd3f108 rh#2275688 |
CVE-2024-26883 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26883 SMASH Issue 402384 bnc#1223035 https://git.kernel.org/stable/c/0971126c8164abe2004b8536b49690a0d6005b0a https://git.kernel.org/stable/c/15641007df0f0d35fa28742b25c2a7db9dcd6895 https://git.kernel.org/stable/c/21e5fa4688e1a4d3db6b72216231b24232f75c1d https://git.kernel.org/stable/c/43f798b9036491fb014b55dd61c4c5c3193267d0 https://git.kernel.org/stable/c/7070b274c7866a4c5036f8d54fcaf315c64ac33a https://git.kernel.org/stable/c/7a4b21250bf79eef26543d35bd390448646c536b https://git.kernel.org/stable/c/ca1f06e72dec41ae4f76e7b1a8a97265447b46ae https://git.kernel.org/stable/c/d0e214acc59145ce25113f617311aa79dda39cb3 https://git.kernel.org/stable/c/f06899582ccee09bd85d0696290e3eaca9aa042d https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2275684 |
CVE-2024-26887 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26887 SMASH Issue 402296 bnc#1223123 https://git.kernel.org/stable/c/620b9e60e4b55fa55540ce852a0f3c9e6091dbbc https://git.kernel.org/stable/c/79f4127a502c5905f04da1f20a7bbe07103fb77c https://git.kernel.org/stable/c/b08bd8f02a24e2b82fece5ac51dc1c3d9aa6c404 https://git.kernel.org/stable/c/b10e6f6b160a60b98fb7476028f5a95405bbd725 rh#2275676 |
CVE-2024-26888 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26888 SMASH Issue 402295 bnc#1223124 https://git.kernel.org/stable/c/5987b9f7d9314c7411136005b3a52f61a8cc0911 https://git.kernel.org/stable/c/5cb93417c93716a5404f762f331f5de3653fd952 https://git.kernel.org/stable/c/98e9920c75e0790bff947a00d192d24bf1c724e0 https://git.kernel.org/stable/c/a6e06258f4c31eba0fcd503e19828b5f8fe7b08b rh#2275674 |
CVE-2024-26889 | kernel-source-rt:Analysis | moderate | () | CVE-2024-26889 SMASH Issue 402387 https://git.kernel.org/stable/c/2e845867b4e279eff0a19ade253390470e07e8a1 https://git.kernel.org/stable/c/2edce8e9a99dd5e4404259d52e754fdc97fb42c2 https://git.kernel.org/stable/c/54a03e4ac1a41edf8a5087bd59f8241b0de96d3d https://git.kernel.org/stable/c/68644bf5ec6baaff40fc39b3529c874bfda709bd https://git.kernel.org/stable/c/6d5a9d4a7bcbb7534ce45a18a52e7bd23e69d8ac https://git.kernel.org/stable/c/81137162bfaa7278785b24c1fd2e9e74f082e8e4 https://git.kernel.org/stable/c/8c28598a2c29201d2ba7fc37539a7d41c264fb10 https://git.kernel.org/stable/c/a41c8efe659caed0e21422876bbb6b73c15b5244 https://git.kernel.org/stable/c/d47e6c1932cee02954ea588c9f09fd5ecefeadfc https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2275672 |
CVE-2024-26890 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2024-26890 SMASH Issue 402388 bnc#1223192 bnc#1223362 https://git.kernel.org/stable/c/0c657e641df1e77d6087688190f632cad9c0439b https://git.kernel.org/stable/c/2f232bc389a4f5943c40733582f9edf77b89e499 https://git.kernel.org/stable/c/dd163fa34c483f1674aa2510accce11a224f649e https://git.kernel.org/stable/c/de4e88ec58c4202efd1f02eebb4939bbf6945358 rh#2275670 |
CVE-2024-26892 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26892 SMASH Issue 402390 bnc#1223195 https://git.kernel.org/stable/c/bfe1adf1606f76c180324e53b130f0e76d5cc6c3 https://git.kernel.org/stable/c/bfeaef901194c5923ce3330272786eff2fac513a https://git.kernel.org/stable/c/c7dd42fbebcfb02bef070fd48f774d6412d0b49d https://git.kernel.org/stable/c/c957280ef6ab6bdf559a91ae693a6b34310697e3 rh#2275666 |
CVE-2024-26893 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26893 SMASH Issue 402367 bnc#1223196 https://git.kernel.org/stable/c/0d276d9f335f41d6524258d58c0c0241ef9a83a4 https://git.kernel.org/stable/c/857f56db8c3a71f9871922b6984ff74ad588cb2c https://git.kernel.org/stable/c/8ffaa17ccb1eb1b65cf85db63225a3581c303773 https://git.kernel.org/stable/c/ead445dd3d681020af333649a27306160eee761d https://git.kernel.org/stable/c/f1d71576d2c9ec8fdb822173fa7f3de79475e9bd rh#2275664 |
CVE-2024-26895 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26895 SMASH Issue 402392 bnc#1223197 https://git.kernel.org/stable/c/24228dcf1d30c2231caa332be7d3090ac59fbfe9 https://git.kernel.org/stable/c/3da9d32b7f4a1a9f7e4bb15bb82f2b2dd6719447 https://git.kernel.org/stable/c/5956f4203b6cdd0755bbdd21b45f3933c7026208 https://git.kernel.org/stable/c/73a2aa0aef86c2c07be5a2f42c9e6047e1a2f7bb https://git.kernel.org/stable/c/a9545af2a533739ffb64d6c9a6fec6f13e2b505f https://git.kernel.org/stable/c/cb5942b77c05d54310a0420cac12935e9b6aa21c https://git.kernel.org/stable/c/fe20e3d56bc911408fc3c27a17c59e9d7885f7d1 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2275659 |
CVE-2024-26896 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26896 SMASH Issue 402393 bnc#1223042 https://git.kernel.org/stable/c/12f00a367b2b62756e0396f14b54c2c15524e1c3 https://git.kernel.org/stable/c/3a71ec74e5e3478d202a1874f085ca3ef40be49b https://git.kernel.org/stable/c/a1f57a0127b89a6b6620514564aa7eaec16d9af3 https://git.kernel.org/stable/c/b8cfb7c819dd39965136a66fe3a7fde688d976fc https://git.kernel.org/stable/c/dadbb5d29d6c5f571a50272fce8c1505a9559487 rh#2275657 |
CVE-2024-26897 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26897 SMASH Issue 402394 bnc#1223323 https://git.kernel.org/stable/c/1bc5461a21c56a36e2a7d81e152b90ce019a3905 https://git.kernel.org/stable/c/24355fcb0d4cbcb6ddda262596558e8cfba70f11 https://git.kernel.org/stable/c/4afa0246656d5680c8a4c3fb37ba6570c4ab819b https://git.kernel.org/stable/c/74d0639261dd795dce958d1b14815bdcbb48a715 https://git.kernel.org/stable/c/a015fbf698c8957aa5fbeefc5c59dd2cf3107298 https://git.kernel.org/stable/c/ac90e22e735bac44f74b5161fb096fbeb0ff8bc2 https://git.kernel.org/stable/c/f8ff4b4df71e87f609be0cc37d92e918107f9b90 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2275655 |
CVE-2024-26898 | kernel-source-rt:Already fixed | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2023-6270 CVE-2024-26898 L3:67569 L3:67606 L3:67695 L3:67706 L3:67756 L3:67844 L3:67846 L3:67866 L3:68017 L3:68142 SMASH Issue 390054 SMASH Issue 402395 bnc#1218562 bnc#1218813 bnc#1219702 bnc#1220853 bnc#1223016 bnc#1223017 bnc#1223335 bnc#1225020 https://access.redhat.com/security/cve/CVE-2023-6270 https://git.kernel.org/stable/c/079cba4f4e307c69878226fdf5228c20aa1c969c https://git.kernel.org/stable/c/1a54aa506b3b2f31496731039e49778f54eee881 https://git.kernel.org/stable/c/74ca3ef68d2f449bc848c0a814cefc487bf755fa https://git.kernel.org/stable/c/7dd09fa80b0765ce68bfae92f4e2f395ccf0fba4 https://git.kernel.org/stable/c/a16fbb80064634b254520a46395e36b87ca4731e https://git.kernel.org/stable/c/ad80c34944d7175fa1f5c7a55066020002921a99 https://git.kernel.org/stable/c/eb48680b0255a9e8a9bdc93d6a55b11c31262e62 https://git.kernel.org/stable/c/f98364e926626c678fb4b9004b75cacf92ff0662 https://git.kernel.org/stable/c/faf0b4c5e00bb680e8e43ac936df24d3f48c8e65 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html jsc#CAR-3065 linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662 rh#2256786 rh#2275652 rh#2277171 rh#2277811 rh#2278445 |
CVE-2024-26899 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26899 SMASH Issue 402317 bnc#1223045 https://git.kernel.org/stable/c/03f12122b20b6e6028e9ed69030a49f9cffcbb75 https://git.kernel.org/stable/c/1e5c5b0abaee7b62a10b9707a62083b71ad21f62 https://git.kernel.org/stable/c/5a87c1f7993bc8ac358a3766bac5dc7126e01e98 rh#2275650 |
CVE-2024-26902 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26902 SMASH Issue 402397 bnc#1223199 https://git.kernel.org/stable/c/34b567868777e9fd39ec5333969728a7f0cf179c https://git.kernel.org/stable/c/3ede8e94de6b834b48b0643385e66363e7a04be9 https://git.kernel.org/stable/c/9f599ba3b9cc4bdb8ec1e3f0feddd41bf9d296d6 rh#2275643 |
CVE-2024-26903 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26903 SMASH Issue 402398 bnc#1223187 https://git.kernel.org/stable/c/2535b848fa0f42ddff3e5255cf5e742c9b77bb26 https://git.kernel.org/stable/c/369f419c097e82407dd429a202cde9a73d3ae29b https://git.kernel.org/stable/c/3ead59bafad05f2967ae2438c0528d53244cfde5 https://git.kernel.org/stable/c/567c0411dc3b424fc7bd1e6109726d7ba32d4f73 https://git.kernel.org/stable/c/5f369efd9d963c1f711a06c9b8baf9f5ce616d85 https://git.kernel.org/stable/c/5f9fe302dd3a9bbc50f4888464c1773f45166bfd https://git.kernel.org/stable/c/81d7d920a22fd58ef9aedb1bd0a68ee32bd23e96 https://git.kernel.org/stable/c/8d1753973f598531baaa2c1033cf7f7b5bb004b0 rh#2275641 |
CVE-2024-26906 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26906 SMASH Issue 402401 bnc#1223202 https://git.kernel.org/stable/c/29bd6f86904682adafe9affbc7f79b14defcaff8 https://git.kernel.org/stable/c/32019c659ecfe1d92e3bf9fcdfbb11a7c70acd58 https://git.kernel.org/stable/c/57f78c46f08198e1be08ffe99c4c1ccc12855bf5 https://git.kernel.org/stable/c/6e4694e65b6db4c3de125115dd4f55848cc48381 https://git.kernel.org/stable/c/e8a67fe34b76a49320b33032228a794f40b0316b https://git.kernel.org/stable/c/f175de546a3eb77614d94d4c02550181c0a8493e https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2275635 |
CVE-2024-26908 | kernel-source-rt:Ignore | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26908 SMASH Issue 402403 bnc#1223201 https://git.kernel.org/stable/c/025a8a96c7ef3ff24a9b4753a7e851ba16f11bfc https://git.kernel.org/stable/c/3693bb4465e6e32a204a5b86d3ec7e6b9f7e67c2 https://git.kernel.org/stable/c/70a33a629090130d731fc1e1ad498bb672eea165 https://git.kernel.org/stable/c/8082bccb7ac480ceab89b09c53d20c78ae54f9fa https://git.kernel.org/stable/c/a9bbb05c0c04b49a1f7f05fd03826321dca2b8d4 https://git.kernel.org/stable/c/d211e8128c0e2122512fa5e859316540349b54af https://git.kernel.org/stable/c/eb279074badac0bbe28749906562d648ca4bc750 https://git.kernel.org/stable/c/f49c513f46dc19bf01ffad2aaaf234d7f37f6799 jsc#CAR-3360 rh#2275744 |
CVE-2024-26909 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26909 SMASH Issue 402404 bnc#1223143 https://git.kernel.org/stable/c/2bbd65c6ca567ed8dbbfc4fb945f57ce64bef342 https://git.kernel.org/stable/c/b979f2d50a099f3402418d7ff5f26c3952fb08bb https://git.kernel.org/stable/c/ef45aa2841e15b649e5417fe3d4de395fe462781 rh#2275630 |
CVE-2024-26910 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26910 SMASH Issue 402448 bnc#1223151 https://git.kernel.org/stable/c/653bc5e6d9995d7d5f497c665b321875a626161c https://git.kernel.org/stable/c/970709a67696b100a57b33af1a3d75fc34b747eb https://git.kernel.org/stable/c/97f7cf1cd80eeed3b7c808b7c12463295c751001 https://git.kernel.org/stable/c/a24d5f2ac8ef702a58e55ec276aad29b4bd97e05 https://git.kernel.org/stable/c/b93a6756a01f4fd2f329a39216f9824c56a66397 https://git.kernel.org/stable/c/c2dc077d8f722a1c73a24e674f925602ee5ece49 https://git.kernel.org/stable/c/c7f2733e5011bfd136f1ca93497394d43aa76225 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2275773 |
CVE-2024-26911 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26911 SMASH Issue 402449 bnc#1223055 https://git.kernel.org/stable/c/4b59c3fada06e5e8010ef7700689c71986e667a2 https://git.kernel.org/stable/c/8746c6c9dfa31d269c65dd52ab42fde0720b7d91 rh#2275798 |
CVE-2024-26912 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26912 SMASH Issue 402450 bnc#1223064 https://git.kernel.org/stable/c/042b5f83841fbf7ce39474412db3b5e4765a7ea7 https://git.kernel.org/stable/c/6190d4c08897d748dd25f0b78267a90aa1694e15 rh#2275796 |
CVE-2024-26913 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26913 SMASH Issue 402451 bnc#1223204 https://git.kernel.org/stable/c/cdbe0be8874c63bca85b8c38e5b1eecbdd18df31 https://git.kernel.org/stable/c/faf51b201bc42adf500945732abb6220c707d6f3 rh#2275794 |
CVE-2024-26914 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26914 SMASH Issue 402452 bnc#1223205 https://git.kernel.org/stable/c/0bd8ef618a42d7e6ea3f701065264e15678025e3 https://git.kernel.org/stable/c/39079fe8e660851abbafa90cd55cbf029210661f rh#2275792 |
CVE-2024-26916 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26916 SMASH Issue 402454 bnc#1223137 https://git.kernel.org/stable/c/65158edb0a3a8df23197d52cd24287e39eaf95d6 https://git.kernel.org/stable/c/916361685319098f696b798ef1560f69ed96e934 https://git.kernel.org/stable/c/caa2565a2e13899be31f7b1e069e6465d3e2adb0 https://git.kernel.org/stable/c/d855ceb6a5fde668c5431156bc60fae0cc52b764 https://git.kernel.org/stable/c/ff70e6ff6fc2413caf33410af7462d1f584d927e rh#2275788 |
CVE-2024-26917 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26917 SMASH Issue 402455 bnc#1223056 https://git.kernel.org/stable/c/2209fc6e3d7727d787dc6ef9baa1e9eae6b1295b https://git.kernel.org/stable/c/25675159040bffc7992d5163f3f33ba7d0142f21 https://git.kernel.org/stable/c/2996c7e97ea7cf4c1838a1b1dbc0885934113783 https://git.kernel.org/stable/c/5b8f473c4de95c056c1c767b1ad48c191544f6a5 https://git.kernel.org/stable/c/6bb22ac1d11d7d20f91e7fd2e657a9e5f6db65e0 https://git.kernel.org/stable/c/7d4e19f7ff644c5b79e8271df8ac2e549b436a5b https://git.kernel.org/stable/c/94a600226b6d0ef065ee84024b450b566c5a87d6 https://git.kernel.org/stable/c/977fe773dcc7098d8eaf4ee6382cb51e13e784cb https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2275784 |
CVE-2024-26918 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2024-26918 SMASH Issue 402456 bnc#1223136 https://git.kernel.org/stable/c/41044d5360685e78a869d40a168491a70cdb7e73 https://git.kernel.org/stable/c/63b1a3d9dd3b3f6d67f524e76270e66767090583 https://git.kernel.org/stable/c/a4f12e5cbac2865c151d1e97e36eb24205afb23b rh#2275782 |
CVE-2024-26919 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26919 SMASH Issue 402457 bnc#1223847 https://git.kernel.org/stable/c/330d22aba17a4d30a56f007d0f51291d7e00862b https://git.kernel.org/stable/c/33713945cc92ea9c4a1a9479d5c1b7acb7fc4df3 https://git.kernel.org/stable/c/3caf2b2ad7334ef35f55b95f3e1b138c6f77b368 https://git.kernel.org/stable/c/d31b886ed6a5095214062ee4fb55037eb930adb6 rh#2275777 |
CVE-2024-26920 | kernel-source-rt:Analysis | moderate | () | CVE-2024-26920 SMASH Issue 402458 https://git.kernel.org/stable/c/0958b33ef5a04ed91f61cef4760ac412080c4e08 https://git.kernel.org/stable/c/2450a69d2ee75d1f0112d509ac82ef98f5ad6b5f https://git.kernel.org/stable/c/26ebeffff238488466fa578be3b35b8a46e69906 https://git.kernel.org/stable/c/2a3073d58382157ab396734ed4e421ba9e969db1 https://git.kernel.org/stable/c/34925d01baf3ee62ab21c21efd9e2c44c24c004a https://git.kernel.org/stable/c/36be97e9eb535fe3008a5cb040b1e56f29f2e398 https://git.kernel.org/stable/c/4b001ef14baab16b553a002cb9979e31b8fc0c6b https://git.kernel.org/stable/c/56cfbe60710772916a5ba092c99542332b48e870 https://git.kernel.org/stable/c/6022c065c9ec465d84cebff8f480db083e4ee06b https://git.kernel.org/stable/c/8ffd5590f4d6ef5460acbeac7fbdff7025f9b419 https://git.kernel.org/stable/c/b5085b5ac1d96ea2a8a6240f869655176ce44197 https://git.kernel.org/stable/c/bcf4a115a5068f3331fafb8c176c1af0da3d8b19 rh#2275775 |
CVE-2024-26924 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26924 SMASH Issue 403112 bnc#1223387 https://git.kernel.org/stable/c/14b001ba221136c15f894577253e8db535b99487 https://git.kernel.org/stable/c/3cfc9ec039af60dbd8965ae085b2c2ccdcfbe1cc https://git.kernel.org/stable/c/41d8fdf3afaff312e17466e4ab732937738d5644 https://git.kernel.org/stable/c/7a1679e2d9bfa3b5f8755c2c7113e54b7d42bd46 https://git.kernel.org/stable/c/e3b887a9c11caf8357a821260e095f2a694a34f2 https://git.kernel.org/stable/c/ebf7c9746f073035ee26209e38c3a1170f7b349a https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/ rh#2277168 |
CVE-2024-26925 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2024-26925 MISC:git.kernel.org:OSS:2024/Q2/220 OSS:2024/05/07/6 OSS:2024/05/08/2 OSS:2024/Q2/220 SMASH Issue 403115 bnc#1223390 bnc#1224175 https://git.kernel.org/stable/c/0d459e2ffb541841714839e8228b845458ed3b27 https://git.kernel.org/stable/c/2cee2ff7f8cce12a63a0a23ffe27f08d99541494 https://git.kernel.org/stable/c/61ac7284346c32f9a8c8ceac56102f7914060428 https://git.kernel.org/stable/c/8038ee3c3e5b59bcd78467686db5270c68544e30 https://git.kernel.org/stable/c/8d3a58af50e46167b6f1db47adadad03c0045dae https://git.kernel.org/stable/c/a34ba4bdeec0c3b629160497594908dc820110f1 https://git.kernel.org/stable/c/eb769ff4e281f751adcaf4f4445cbf30817be139 rh#2277166 |
CVE-2024-26926 | kernel-source-rt:Not affected | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H) | CVE-2024-26926 SMASH Issue 403114 bnc#1223388 https://git.kernel.org/stable/c/1d7f1049035b2060342f11eff957cf567d810bdc https://git.kernel.org/stable/c/48a1f83ca9c68518b1a783c62e6a8223144fa9fc https://git.kernel.org/stable/c/68a28f551e4690db2b27b3db716c7395f6fada12 https://git.kernel.org/stable/c/a2fd6dbc98be1105a1d8e9e31575da8873ef115c https://git.kernel.org/stable/c/a6d2a8b211c874971ee4cf3ddd167408177f6e76 https://git.kernel.org/stable/c/aaef73821a3b0194a01bd23ca77774f704a04d40 https://git.kernel.org/stable/c/f01d6619045704d78613b14e2e0420bfdb7f1c15 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2277173 |
CVE-2024-26927 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26927 SMASH Issue 403386 bnc#1223525 https://git.kernel.org/stable/c/044e220667157fb9d59320341badec59cf45ba48 https://git.kernel.org/stable/c/98f681b0f84cfc3a1d83287b77697679e0398306 https://git.kernel.org/stable/c/9eeb8e1231f6450c574c1db979122e171a1813ab https://git.kernel.org/stable/c/ced7df8b3c5c4751244cad79011e86cf1f809153 https://git.kernel.org/stable/c/d133d67e7e724102d1e53009c4f88afaaf3e167c rh#2277844 |
CVE-2024-26932 | kernel-source-rt:Not affected | moderate | 6.6 (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2024-26932 SMASH Issue 403699 bnc#1223649 https://git.kernel.org/stable/c/242e425ed580b2f4dbcb86c8fc03a410a4084a69 https://git.kernel.org/stable/c/b63f90487bdf93a4223ce7853d14717e9d452856 rh#2278243 |
CVE-2024-26933 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26933 SMASH Issue 403700 bnc#1223670 https://git.kernel.org/stable/c/4facc9421117ba9d8148c73771b213887fec77f7 https://git.kernel.org/stable/c/73d1589b91f2099e5f6534a8497b7c6b527e064e https://git.kernel.org/stable/c/9dac54f08198147f5ec0ec52fcf1bc8ac899ac05 https://git.kernel.org/stable/c/f4d1960764d8a70318b02f15203a1be2b2554ca1 https://git.kernel.org/stable/c/f51849833705dea5b4f9b0c8de714dd87bd6c95c rh#2278240 |
CVE-2024-26935 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2024-26935 SMASH Issue 403703 bnc#1223675 https://git.kernel.org/stable/c/0053f15d50d50c9312d8ab9c11e2e405812dfcac https://git.kernel.org/stable/c/3678cf67ff7136db1dd3bf63c361650db5d92889 https://git.kernel.org/stable/c/5c2386ba80e779a92ec3bb64ccadbedd88f779b1 https://git.kernel.org/stable/c/cea234bb214b17d004dfdccce4491e6ff57c96ee https://git.kernel.org/stable/c/d4c34782b6d7b1e68d18d9549451b19433bd4c6c https://git.kernel.org/stable/c/e293c773c13b830cdc251f155df2254981abc320 https://git.kernel.org/stable/c/f23a4d6e07570826fe95023ca1aa96a011fa9f84 https://git.kernel.org/stable/c/f4ff08fab66eb5c0b97e1a24edac052fb40bf5d7 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2278235 |
CVE-2024-26936 | kernel-source-rt:Not affected | moderate | () | CVE-2024-26936 SMASH Issue 403704 bnc#1223676 https://git.kernel.org/stable/c/17cf0c2794bdb6f39671265aa18aea5c22ee8c4a https://git.kernel.org/stable/c/21ff9d7d223c5c19cb4334009e4c0c83a2f4d674 https://git.kernel.org/stable/c/2c27a64a2bc47d9bfc7c3cf8be14be53b1ee7cb6 https://git.kernel.org/stable/c/5c20b242d4fed73a93591e48bfd9772e2322fb11 https://git.kernel.org/stable/c/8f3d0bf1d0c62b539d54c5b9108a845cff619b99 rh#2278233 |
CVE-2024-26938 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2024-26938 SMASH Issue 403706 bnc#1223678 https://git.kernel.org/stable/c/32e39bab59934bfd3f37097d4dd85ac5eb0fd549 https://git.kernel.org/stable/c/72e4d3fb72e9f0f016946158a7d95304832768e6 https://git.kernel.org/stable/c/94cf2fb6feccd625e5b4e23e1b70f39a206f82ac https://git.kernel.org/stable/c/a891add409e3bc381f4f68c2ce9d953f1865cb1f https://git.kernel.org/stable/c/f4bbac954d8f9ab214ea1d4f385de4fa6bd92dd0 rh#2278229 |
CVE-2024-26939 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2024-26939 SMASH Issue 403707 bnc#1223679 bnc#1223680 https://git.kernel.org/stable/c/0e45882ca829b26b915162e8e86dbb1095768e9e https://git.kernel.org/stable/c/59b2626dd8c8a2e13f18054b3530e0c00073d79f https://git.kernel.org/stable/c/5e3eb862df9f972ab677fb19e0d4b9b1be8db7b5 https://git.kernel.org/stable/c/704edc9252f4988ae1ad7dafa23d0db8d90d7190 rh#2278220 |
CVE-2024-26940 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26940 SMASH Issue 403708 bnc#1223718 https://git.kernel.org/stable/c/016119154981d81c9e8f2ea3f56b9e2b4ea14500 https://git.kernel.org/stable/c/042ef0afc40fa1a22b3608f22915b91ce39d128f https://git.kernel.org/stable/c/25e3ce59c1200f1f0563e39de151f34962ab0fe1 https://git.kernel.org/stable/c/4be9075fec0a639384ed19975634b662bfab938f https://git.kernel.org/stable/c/eb08db0fc5354fa17b7ed66dab3c503332423451 rh#2278218 |
CVE-2024-26941 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26941 SMASH Issue 403709 bnc#1223721 https://git.kernel.org/stable/c/828862071a6ca0c52655e6e62ac7abfef3e5c578 https://git.kernel.org/stable/c/9cbd1dae842737bfafa4b10a87909fa209dde250 rh#2278216 |
CVE-2024-26942 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26942 SMASH Issue 403711 bnc#1223727 https://git.kernel.org/stable/c/6a4aee277740d04ac0fd54cfa17cc28261932ddc https://git.kernel.org/stable/c/a8a296ad9957b845b89bcf48be1cf8c74875ecc3 rh#2278214 |
CVE-2024-26943 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26943 SMASH Issue 403712 https://git.kernel.org/stable/c/16e87fe23d4af6df920406494ced5c0f4354567b https://git.kernel.org/stable/c/2a84744a037b8a511d6a9055f3defddc28ff4a4d https://git.kernel.org/stable/c/3e82f7383e0b82a835e6b6b06a348b2bc4e2c2ee https://git.kernel.org/stable/c/5e81773757a95fc298e96cfd6d4700f07b6192a2 https://git.kernel.org/stable/c/9acfd8b083a0ffbd387566800d89f55058a68af2 rh#2278212 |
CVE-2024-26944 | kernel-source-rt:Analysis | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2024-26944 SMASH Issue 403713 bnc#1223731 https://git.kernel.org/stable/c/1ec17ef59168a1a6f1105f5dc517f783839a5302 https://git.kernel.org/stable/c/34ca809e055eca5cfe63d9c7efbf80b7c21b4e57 rh#2278210 |
CVE-2024-26945 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26945 SMASH Issue 403714 bnc#1223732 https://git.kernel.org/stable/c/5a7e89d3315d1be86aff8a8bf849023cda6547f7 https://git.kernel.org/stable/c/a5ca1be7f9817de4e93085778b3ee2219bdc2664 rh#2278208 |
CVE-2024-26946 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26946 SMASH Issue 403715 bnc#1223669 https://git.kernel.org/stable/c/20fdb21eabaeb8f78f8f701f56d14ea0836ec861 https://git.kernel.org/stable/c/4e51653d5d871f40f1bd5cf95cc7f2d8b33d063b https://git.kernel.org/stable/c/6417684315087904fffe8966d27ca74398c57dd6 https://git.kernel.org/stable/c/b69f577308f1070004cafac106dd1a44099e5483 https://git.kernel.org/stable/c/f13edd1871d4fb4ab829aff629d47914e251bae3 rh#2278206 |
CVE-2024-26947 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26947 SMASH Issue 403716 bnc#1223662 https://git.kernel.org/stable/c/0c027c2bad7f5111c51a358b5d392e1a695dabff https://git.kernel.org/stable/c/0c66c6f4e21cb22220cbd8821c5c73fc157d20dc https://git.kernel.org/stable/c/9f7ddc222cae8254e93d5c169a8ae11a49d912a7 https://git.kernel.org/stable/c/fb3a122a978626b33de3367ee1762da934c0f512 rh#2278167 |
CVE-2024-26948 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26948 SMASH Issue 403717 bnc#1223664 https://git.kernel.org/stable/c/334b56cea5d9df5989be6cf1a5898114fa70ad98 https://git.kernel.org/stable/c/d37a08f840485995e3fb91dad95e441b9d28a269 rh#2278204 |
CVE-2024-26949 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26949 SMASH Issue 403718 bnc#1223665 https://git.kernel.org/stable/c/08ae9ef829b8055c2fdc8cfee37510c1f4721a07 https://git.kernel.org/stable/c/99c2f1563b1400cc8331fc79d19ada1bb95bb388 https://git.kernel.org/stable/c/b8eaa8ef1f1157a9f330e36e66bdd7a693309948 rh#2278202 |
CVE-2024-26951 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26951 SMASH Issue 403720 bnc#1223660 https://git.kernel.org/stable/c/13d107794304306164481d31ce33f8fdb25a9c04 https://git.kernel.org/stable/c/302b2dfc013baca3dea7ceda383930d9297d231d https://git.kernel.org/stable/c/55b6c738673871c9b0edae05d0c97995c1ff08c4 https://git.kernel.org/stable/c/710a177f347282eea162aec8712beb1f42d5ad87 https://git.kernel.org/stable/c/7bedfe4cfa38771840a355970e4437cd52d4046b https://git.kernel.org/stable/c/b7cea3a9af0853fdbb1b16633a458f991dde6aac https://git.kernel.org/stable/c/f52be46e3e6ecefc2539119784324f0cbc09620a https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2278197 |
CVE-2024-26952 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26952 SMASH Issue 403721 bnc#1223658 https://git.kernel.org/stable/c/0c5541b4c980626fa3cab16ba1a451757778bbb5 https://git.kernel.org/stable/c/2dcda336b6e80b72d58d30d40f2fad9724e5fe63 https://git.kernel.org/stable/c/39bdc4197acf2ed13269167ccf093ee28cfa2a4e https://git.kernel.org/stable/c/c6cd2e8d2d9aa7ee35b1fa6a668e32a22a9753da rh#2278195 |
CVE-2024-26953 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26953 SMASH Issue 403722 bnc#1223656 https://git.kernel.org/stable/c/1abb20a5f4b02fb3020f88456fc1e6069b3cdc45 https://git.kernel.org/stable/c/8291b4eac429c480386669444c6377573f5d8664 https://git.kernel.org/stable/c/c3198822c6cb9fb588e446540485669cc81c5d34 https://git.kernel.org/stable/c/f278ff9db67264715d0d50e3e75044f8b78990f4 rh#2278193 |
CVE-2024-26954 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26954 SMASH Issue 403723 bnc#1223659 https://git.kernel.org/stable/c/3b8da67191e938a63d2736dabb4ac5d337e5de57 https://git.kernel.org/stable/c/4f97e6a9d62cb1fce82fbf4baff44b83221bc178 https://git.kernel.org/stable/c/a80a486d72e20bd12c335bcd38b6e6f19356b0aa rh#2278191 |
CVE-2024-26958 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26958 SMASH Issue 403727 bnc#1223653 https://git.kernel.org/stable/c/17f46b803d4f23c66cacce81db35fef3adb8f2af https://git.kernel.org/stable/c/1daf52b5ffb24870fbeda20b4967526d8f9e12ab https://git.kernel.org/stable/c/3abc2d160ed8213948b147295d77d44a22c88fa3 https://git.kernel.org/stable/c/4595d90b5d2ea5fa4d318d13f59055aa4bf3e7f5 https://git.kernel.org/stable/c/80d24b308b7ee7037fc90d8ac99f6f78df0a256f https://git.kernel.org/stable/c/cf54f66e1dd78990ec6b32177bca7e6ea2144a95 https://git.kernel.org/stable/c/e25447c35f8745337ea8bc0c9697fcac14df8605 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2278182 |
CVE-2024-26959 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26959 SMASH Issue 403728 bnc#1223667 https://git.kernel.org/stable/c/586e099c93fe26b7bd40593979532f507ed9f6a4 https://git.kernel.org/stable/c/664130c0b0309b360bc5bdd40a30604a9387bde8 https://git.kernel.org/stable/c/74bcf708775c405f7fb6ed776ccd3e1957f38a52 https://git.kernel.org/stable/c/d4e2365b07f1ae1f811a915b514caef5b2d6581e rh#2278180 |
CVE-2024-26962 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26962 SMASH Issue 403732 bnc#1223654 https://git.kernel.org/stable/c/41425f96d7aa59bc865f60f5dda3d7697b555677 https://git.kernel.org/stable/c/5943a34bf6bab5801e08a55f63e1b8d5bc90dae1 https://git.kernel.org/stable/c/a8d249d770cb357d16a2097b548d2e4c1c137304 rh#2278174 |
CVE-2024-26963 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26963 SMASH Issue 403733 bnc#1223651 https://git.kernel.org/stable/c/3895780fabd120d0fbd54354014e85207b25687c https://git.kernel.org/stable/c/629b534c42d04f0797980f2d1ed105fdb8906975 https://git.kernel.org/stable/c/6661befe41009c210efa2c1bcd16a5cc4cff8a06 https://git.kernel.org/stable/c/6c6a45645a2e6a272dfde14eddbb6706de63c25d https://git.kernel.org/stable/c/7dfed9855397d0df4c6f748d1f66547ab3bad766 rh#2278172 |
CVE-2024-26964 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26964 SMASH Issue 403734 bnc#1223650 https://git.kernel.org/stable/c/4a49d24fdec0a802aa686a567a3989a9fdf4e5dd https://git.kernel.org/stable/c/620b6cf2f1a270f48d38e6b8ce199c1acb3e90f4 https://git.kernel.org/stable/c/7b6cc33593d7ccfc3011b290849cfa899db46757 https://git.kernel.org/stable/c/962300a360d24c5be5a188cda48da58a37e4304d https://git.kernel.org/stable/c/b2c898469dfc388f619c6c972a28466cbb1442ea https://git.kernel.org/stable/c/be95cc6d71dfd0cba66e3621c65413321b398052 rh#2278169 |
CVE-2024-26967 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26967 SMASH Issue 403738 bnc#1223647 https://git.kernel.org/stable/c/6a3d70f7802a98e6c28a74f997a264118b9f50cd https://git.kernel.org/stable/c/93ff48729211dae55df5d216023be4528d29babb rh#2278368 |
CVE-2024-26968 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26968 SMASH Issue 403739 bnc#1223642 https://git.kernel.org/stable/c/0204247cf3669b6021fb745c3b7f37ae392ab19c https://git.kernel.org/stable/c/1723629fea8a4e75333196866e10d395463dca72 https://git.kernel.org/stable/c/604f2d7c46727c5e24fc7faddc980bc1cc0b1011 https://git.kernel.org/stable/c/bd2b6395671d823caa38d8e4d752de2448ae61e1 rh#2278366 |
CVE-2024-26970 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26970 SMASH Issue 403741 bnc#1223644 https://git.kernel.org/stable/c/421b135aceace99789c982f6a77ce9476564fb52 https://git.kernel.org/stable/c/852db52b45ea96dac2720f108e7c7331cd3738bb https://git.kernel.org/stable/c/ae60e3342296f766f88911d39199f77b05f657a6 https://git.kernel.org/stable/c/b4527ee3de365a742215773d20f07db3e2c06f3b https://git.kernel.org/stable/c/cdbc6e2d8108bc47895e5a901cfcaf799b00ca8d https://git.kernel.org/stable/c/db4066e3ab6b3d918ae2b92734a89c04fe82cc1d https://git.kernel.org/stable/c/dcb13b5c9ae8743f99a96f392186527c3df89198 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2278362 |
CVE-2024-26971 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26971 SMASH Issue 403742 bnc#1223639 https://git.kernel.org/stable/c/50c3acd460551cdf9d8ac6fe0c04f2de0e8e0872 https://git.kernel.org/stable/c/90ad946fff70f312b8d23226afc38c13ddd88c4b https://git.kernel.org/stable/c/b0cf3d200e8a72b6d28e6e088c062b4a98cb5eaf https://git.kernel.org/stable/c/c8f4bef0667947b826848db1c45a645f751357c1 rh#2278360 |
CVE-2024-26975 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26975 SMASH Issue 403746 bnc#1223632 https://git.kernel.org/stable/c/0641908b906a133f1494c312a71f9fecbe2b6c78 https://git.kernel.org/stable/c/2d1f5006ff95770da502f8cee2a224a1ff83866e https://git.kernel.org/stable/c/2f73cf2ae5e0f4e629db5be3a4380ff7807148e6 https://git.kernel.org/stable/c/9b254feb249981b66ccdb1dae54e757789a15ba1 rh#2278352 |
CVE-2024-26977 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26977 SMASH Issue 403710 bnc#1223631 https://git.kernel.org/stable/c/5e4b23e7a7b33a1e56bfa3e5598138a2234d55b6 https://git.kernel.org/stable/c/6d21d0356aa44157a62e39c0d1a13d4c69a8d0c8 https://git.kernel.org/stable/c/7626913652cc786c238e2dd7d8740b17d41b2637 https://git.kernel.org/stable/c/af280e137e273935f2e09f4d73169998298792ed https://git.kernel.org/stable/c/b5d40f02e7222da032c2042aebcf2a07de9b342f https://git.kernel.org/stable/c/f3749345a9b7295dd071d0ed589634cb46364f77 rh#2278348 |
CVE-2024-26978 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26978 SMASH Issue 403748 bnc#1223629 https://git.kernel.org/stable/c/0d27056c24efd3d63a03f3edfbcfc4827086b110 https://git.kernel.org/stable/c/12609c76b755dbeb1645c0aacc0f0f4743b2eff3 https://git.kernel.org/stable/c/2160ad6861c4a21d3fa553d7b2aaec6634a37f8a https://git.kernel.org/stable/c/5cd8af02b466e1beeae13e2de3dc58fcc7925e5a https://git.kernel.org/stable/c/7d271b798add90c6196539167c019d0817285cf0 https://git.kernel.org/stable/c/aeca49661fd02fd56fb026768b580ce301b45733 https://git.kernel.org/stable/c/c45e53c27b78afd6c81fc25608003576f27b5735 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2278345 |
CVE-2024-26979 | kernel-source-rt:Ignore | low | 0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N) | CVE-2024-26979 SMASH Issue 403749 bnc#1223628 https://git.kernel.org/stable/c/07c3fe923ff7eccf684fb4f8c953d0a7cc8ded73 https://git.kernel.org/stable/c/517621b7060096e48e42f545fa6646fc00252eac https://git.kernel.org/stable/c/585fec7361e7850bead21fada49a7fcde2f2e791 https://git.kernel.org/stable/c/899e154f9546fcae18065d74064889d08fff62c2 https://git.kernel.org/stable/c/9cb3755b1e3680b720b74dbedfac889e904605c7 https://git.kernel.org/stable/c/c560327d900bab968c2e1b4cd7fa2d46cd429e3d https://git.kernel.org/stable/c/ff41e0d4f3fa10d7cdd7d40f8026bea9fcc8b000 jsc#CAR-3394 rh#2278343 |
CVE-2024-26980 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26980 SMASH Issue 403751 bnc#1223630 https://git.kernel.org/stable/c/0977f89722eceba165700ea384f075143f012085 https://git.kernel.org/stable/c/3160d9734453a40db248487f8204830879c207f1 https://git.kernel.org/stable/c/b80ba648714e6d790d69610cf14656be222d0248 https://git.kernel.org/stable/c/c119f4ede3fa90a9463f50831761c28f989bfb20 https://git.kernel.org/stable/c/da21401372607c49972ea87a6edaafb36a17c325 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/ rh#2278341 |
CVE-2024-26981 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26981 SMASH Issue 403729 bnc#1223668 https://git.kernel.org/stable/c/054f29e9ca05be3906544c5f2a2c7321c30a4243 https://git.kernel.org/stable/c/2382eae66b196c31893984a538908c3eb7506ff9 https://git.kernel.org/stable/c/7061c7efbb9e8f11ce92d6b4646405ea2b0b4de1 https://git.kernel.org/stable/c/897ac5306bbeb83e90c437326f7044c79a17c611 https://git.kernel.org/stable/c/90823f8d9ecca3d5fa6b102c8e464c62f416975f https://git.kernel.org/stable/c/90f43980ea6be4ad903e389be9a27a2a0018f1c8 https://git.kernel.org/stable/c/bdbe483da21f852c93b22557b146bc4d989260f0 https://git.kernel.org/stable/c/c4a7dc9523b59b3e73fd522c73e95e072f876b16 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/ jsc#CAR-3402 rh#2278339 |
CVE-2024-26983 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26983 SMASH Issue 403753 bnc#1223637 https://git.kernel.org/stable/c/1e7feb31a18c197d63a5e606025ed63c762f8918 https://git.kernel.org/stable/c/5a7dfb8fcd3f29fc93161100179b27f24f3d5f35 https://git.kernel.org/stable/c/89f9a1e876b5a7ad884918c03a46831af202c8a0 https://git.kernel.org/stable/c/e46d3be714ad9652480c6db129ab8125e2d20ab7 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/ rh#2278335 |
CVE-2024-26985 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26985 SMASH Issue 403754 bnc#1223636 https://git.kernel.org/stable/c/652ead9b746a63e4e79d7ad66d3edf0a8a5b0c2f https://git.kernel.org/stable/c/7d8ac0942c312abda43b407eff72d31747a7b472 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/ rh#2278331 |
CVE-2024-26986 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26986 SMASH Issue 403756 bnc#1223728 https://git.kernel.org/stable/c/0dcd876411644da98a6b4d5a18d32ca94c15bdb5 https://git.kernel.org/stable/c/18921b205012568b45760753ad3146ddb9e2d4e2 https://git.kernel.org/stable/c/aa02d43367a9adf8c85fb382fea4171fb266c8d0 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/ rh#2278329 |
CVE-2024-26987 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26987 SMASH Issue 403757 bnc#1223672 https://git.kernel.org/stable/c/1983184c22dd84a4d95a71e5c6775c2638557dc7 https://git.kernel.org/stable/c/49955b24002dc16a0ae2e83a57a2a6c863a1845c https://git.kernel.org/stable/c/5ef7ba2799a3b5ed292b8f6407376e2c25ef002e https://git.kernel.org/stable/c/882e1180c83f5b75bae03d0ccc31ccedfe5159de https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/ rh#2278327 |
CVE-2024-26989 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26989 SMASH Issue 403759 bnc#1223748 https://git.kernel.org/stable/c/022b19ebc31cce369c407617041a3db810db23b3 https://git.kernel.org/stable/c/31f815cb436082e72d34ed2e8a182140a73ebdf4 https://git.kernel.org/stable/c/50449ca66cc5a8cbc64749cf4b9f3d3fc5f4b457 https://git.kernel.org/stable/c/813f5213f2c612dc800054859aaa396ec8ad7069 https://git.kernel.org/stable/c/f7e71a7cf399f53ff9fc314ca3836dc913b05bd6 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/ rh#2278322 |
CVE-2024-26990 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N) | CVE-2024-26990 SMASH Issue 403737 bnc#1223749 https://git.kernel.org/stable/c/2673dfb591a359c75080dd5af3da484b89320d22 https://git.kernel.org/stable/c/cdf811a937471af2d1facdf8ae80e5e68096f1ed https://git.kernel.org/stable/c/e20bff0f1b2de9cfe303dd35ff46470104a87404 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/ rh#2278320 |
CVE-2024-26991 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26991 SMASH Issue 403760 bnc#1223695 https://git.kernel.org/stable/c/048cc4a028e635d339687ed968985d2d1669494c https://git.kernel.org/stable/c/992b54bd083c5bee24ff7cc35991388ab08598c4 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/ rh#2278318 |
CVE-2024-26992 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) | CVE-2024-26992 SMASH Issue 403761 bnc#1223692 https://git.kernel.org/stable/c/037e48ceccf163899374b601afb6ae8d0bf1d2ac https://git.kernel.org/stable/c/0fb74c00d140a66128afc0003785dcc57e69d312 https://git.kernel.org/stable/c/7a7650b3ac23e5fc8c990f00e94f787dc84e3175 https://git.kernel.org/stable/c/9e985cbf2942a1bb8fcef9adc2a17d90fd7ca8ee https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/ rh#2278316 |
CVE-2024-26994 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26994 SMASH Issue 403763 bnc#1223750 https://git.kernel.org/stable/c/0d130158db29f5e0b3893154908cf618896450a8 https://git.kernel.org/stable/c/0efb15c14c493263cb3a5f65f5ddfd4603d19a76 https://git.kernel.org/stable/c/6401038acfa24cba9c28cce410b7505efadd0222 https://git.kernel.org/stable/c/756c5cb7c09e537b87b5d3acafcb101b2ccf394f https://git.kernel.org/stable/c/89af25bd4b4bf6a71295f07e07a8ae7dc03c6595 https://git.kernel.org/stable/c/8defb1d22ba0395b81feb963b96e252b097ba76f https://git.kernel.org/stable/c/8f6b62125befe1675446923e4171eac2c012959c https://git.kernel.org/stable/c/c8d2f34ea96ea3bce6ba2535f867f0d4ee3b22e1 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/ rh#2278312 |
CVE-2024-26995 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26995 SMASH Issue 403764 bnc#1223696 https://git.kernel.org/stable/c/c4128304c2169b4664ed6fb6200f228cead2ab70 https://git.kernel.org/stable/c/f3da3192cdd3fefe213390e976eec424a8e270b5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/ rh#2278310 |
CVE-2024-26996 | kernel-source-rt:Analysis | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2024-26996 SMASH Issue 403765 bnc#1223752 https://git.kernel.org/stable/c/0588bbbd718a8130b98c54518f1e0b569ce60a93 https://git.kernel.org/stable/c/6334b8e4553cc69f51e383c9de545082213d785e https://git.kernel.org/stable/c/7250326cbb1f4f90391ac511a126b936cefb5bb7 https://git.kernel.org/stable/c/7f67c2020cb08499c400abf0fc32c65e4d9a09ca https://git.kernel.org/stable/c/f356fd0cbd9c9cbd0854657a80d1608d0d732db3 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/ rh#2278308 |
CVE-2024-26997 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26997 SMASH Issue 403702 bnc#1223741 https://git.kernel.org/stable/c/257d313e37d66c3bcc87197fb5b8549129c45dfe https://git.kernel.org/stable/c/26fde0ea40dda1b08fad3bc0a43f122f6dd8bddf https://git.kernel.org/stable/c/55656b2afd5f1efcec4245f3e7e814c2a9ef53f6 https://git.kernel.org/stable/c/75bf5e78b2a27cb1bca6fa826e3ab685015165e1 https://git.kernel.org/stable/c/8a139fa44870e84ac228b7b76423a49610e5ba9a https://git.kernel.org/stable/c/8aa5c28ac65cb5e7f1b9c0c3238c00b661dd2b8c https://git.kernel.org/stable/c/9de10b59d16880a0a3ae2876c142fe54ce45d816 https://git.kernel.org/stable/c/eed04fa96c48790c1cce73c8a248e9d460b088f8 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2278305 |
CVE-2024-26998 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26998 SMASH Issue 403766 bnc#1223736 https://git.kernel.org/stable/c/7ae7104d54342433a3a73975f6569beefdd86350 https://git.kernel.org/stable/c/9cf7ea2eeb745213dc2a04103e426b960e807940 https://git.kernel.org/stable/c/bb1118905e875c111d7ccef9aee86ac5e4e7f985 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/ rh#2278303 |
CVE-2024-26999 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-26999 SMASH Issue 403767 bnc#1223754 https://git.kernel.org/stable/c/1be3226445362bfbf461c92a5bcdb1723f2e4907 https://git.kernel.org/stable/c/52aaf1ff14622a04148dbb9ccce6d9de5d534ea7 https://git.kernel.org/stable/c/69a02273e288011b521ee7c1f3ab2c23fda633ce https://git.kernel.org/stable/c/7a3bbe41efa55323b6ea3c35fa15941d4dbecdef https://git.kernel.org/stable/c/ab86cf6f8d24e63e9aca23da5108af1aa5483928 https://git.kernel.org/stable/c/bbaafbb4651fede8d3c3881601ecaa4f834f9d3f https://git.kernel.org/stable/c/ca09dfc3cfdf89e6af3ac24e1c6c0be5c575a729 https://git.kernel.org/stable/c/d679c816929d62af51c8e6d7fc0e165c9412d2f3 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/ jsc#CAR-3415 rh#2278301 |
CVE-2024-27001 | kernel-source-rt:Ignore | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27001 SMASH Issue 403769 bnc#1223698 https://git.kernel.org/stable/c/3a63ae0348d990e137cca04eced5b08379969ea9 https://git.kernel.org/stable/c/59f33af9796160f851641d960bd93937f282c696 https://git.kernel.org/stable/c/6ec3514a7d35ad9cfab600187612c29f669069d2 https://git.kernel.org/stable/c/a3b8ae7e9297dd453f2977b011c5bc75eb20e71b https://git.kernel.org/stable/c/ac882d6b21bffecb57bcc4486701239eef5aa67b https://git.kernel.org/stable/c/b0b268eeb087e324ef3ea71f8e6cabd07630517f https://git.kernel.org/stable/c/d1718530e3f640b7d5f0050e725216eab57a85d8 https://git.kernel.org/stable/c/f15370e315976198f338b41611f37ce82af6cf54 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/ jsc#CAR-3405 rh#2278297 |
CVE-2024-27003 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2024-27003 SMASH Issue 403771 bnc#1223761 https://git.kernel.org/stable/c/2c077fdfd09dffb31a890e5095c8ab205138a42e https://git.kernel.org/stable/c/83ada89e4a86e2b28ea2b5113c76d6dc7560a4d0 https://git.kernel.org/stable/c/9d1e795f754db1ac3344528b7af0b17b8146f321 https://git.kernel.org/stable/c/b457105309d388e4081c716cf7b81d517ff74db4 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/ rh#2278293 |
CVE-2024-27005 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27005 SMASH Issue 403773 bnc#1223800 https://git.kernel.org/stable/c/4c65507121ea8e0b47fae6d2049c8688390d46b6 https://git.kernel.org/stable/c/d0d04efa2e367921654b5106cc5c05e3757c2b42 https://git.kernel.org/stable/c/de1bf25b6d771abdb52d43546cf57ad775fb68a1 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/ rh#2278289 |
CVE-2024-27006 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27006 SMASH Issue 403774 bnc#1223801 https://git.kernel.org/stable/c/9c8215d32e730b597c809a9d2090bf8ec1b79fcf https://git.kernel.org/stable/c/b552f63cd43735048bbe9bfbb7a9dcfce166fbdd https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/ rh#2278287 |
CVE-2024-27007 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27007 SMASH Issue 403775 bnc#1223710 https://git.kernel.org/stable/c/c0205eaf3af9f5db14d4b5ee4abacf4a583c3c50 https://git.kernel.org/stable/c/df5f6e683e7f21a15d8be6e7a0c7a46436963ebe https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/ rh#2278285 |
CVE-2024-27009 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27009 SMASH Issue 403777 bnc#1223699 https://git.kernel.org/stable/c/2d8527f2f911fab84aec04df4788c0c23af3df48 https://git.kernel.org/stable/c/2df56f4ea769ff81e51bbb05699989603bde9c49 https://git.kernel.org/stable/c/3076b3c38a704e10df5e143c213653309d532538 https://git.kernel.org/stable/c/559f3a6333397ab6cd4a696edd65a70b6be62c6e https://git.kernel.org/stable/c/a4234decd0fe429832ca81c4637be7248b88b49e https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/ rh#2278281 |
CVE-2024-27012 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27012 SMASH Issue 403750 bnc#1223804 https://git.kernel.org/stable/c/86658fc7414d4b9e25c2699d751034537503d637 https://git.kernel.org/stable/c/e79b47a8615d42c68aaeb68971593333667382ed https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/ rh#2278275 |
CVE-2024-27015 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27015 SMASH Issue 403783 bnc#1223806 https://git.kernel.org/stable/c/4ed82dd368ad883dc4284292937b882f044e625d https://git.kernel.org/stable/c/6db5dc7b351b9569940cd1cf445e237c42cd6d27 https://git.kernel.org/stable/c/e3f078103421642fcd5f05c5e70777feb10f000d https://git.kernel.org/stable/c/e719b52d0c56989b0f3475a03a6d64f182c85b56 https://git.kernel.org/stable/c/f1c3c61701a0b12f4906152c1626a5de580ea3d2 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/ rh#2278266 |
CVE-2024-27016 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27016 SMASH Issue 403784 bnc#1223807 https://git.kernel.org/stable/c/87b3593bed1868b2d9fe096c01bcdf0ea86cbebf https://git.kernel.org/stable/c/8bf7c76a2a207ca2b4cfda0a279192adf27678d7 https://git.kernel.org/stable/c/a2471d271042ea18e8a6babc132a8716bb2f08b9 https://git.kernel.org/stable/c/cf366ee3bc1b7d1c76a882640ba3b3f8f1039163 https://git.kernel.org/stable/c/d06977b9a4109f8738bb276125eb6a0b772bc433 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/ rh#2278264 |
CVE-2024-27017 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27017 SMASH Issue 403782 bnc#1223733 https://git.kernel.org/stable/c/29b359cf6d95fd60730533f7f10464e95bd17c73 https://git.kernel.org/stable/c/721715655c72640567e8742567520c99801148ed https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/ rh#2278262 |
CVE-2024-27018 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27018 SMASH Issue 403785 bnc#1223809 https://git.kernel.org/stable/c/3f59ac29dea0921637053908fe99268d157bbb9d https://git.kernel.org/stable/c/43193174510ea4f3ce09b796e559a2fd9f148615 https://git.kernel.org/stable/c/751de2012eafa4d46d8081056761fa0e9cc8a178 https://git.kernel.org/stable/c/b13db0d16bc7b2a52abcf5cb71334f63faa5dbd6 https://git.kernel.org/stable/c/dceb683ab87ca3666a9bb5c0158528b646faedc4 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/ rh#2278260 |
CVE-2024-27021 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27021 SMASH Issue 403787 bnc#1223730 https://git.kernel.org/stable/c/19fa4f2a85d777a8052e869c1b892a2f7556569d https://git.kernel.org/stable/c/53d986f39acd8ea11c9e460732bfa5add66360d9 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/ rh#2278254 |
CVE-2024-27022 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27022 SMASH Issue 403788 bnc#1223774 https://git.kernel.org/stable/c/04b0c41912349aff11a1bbaef6a722bd7fbb90ac https://git.kernel.org/stable/c/0c42f7e039aba3de6d7dbf92da708e2b2ecba557 https://git.kernel.org/stable/c/35e351780fa9d8240dd6f7e4f245f9ea37e96c19 https://git.kernel.org/stable/c/abdb88dd272bbeb93efe01d8e0b7b17e24af3a34 https://git.kernel.org/stable/c/cec11fa2eb512ebe3a459c185f4aca1d44059bbf https://git.kernel.org/stable/c/dd782da470761077f4d1120e191f1a35787cda6e https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/ rh#2278252 |
CVE-2024-27023 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27023 SMASH Issue 403814 bnc#1223776 https://git.kernel.org/stable/c/02dad157ba11064d073f5499dc33552b227d5d3a https://git.kernel.org/stable/c/11f81438927f84edfaaeb5d5f10856c3a1c1fc82 https://git.kernel.org/stable/c/6b2ff10390b19a2364af622b6666b690443f9f3f https://git.kernel.org/stable/c/855678ed8534518e2b428bcbcec695de9ba248e8 rh#2278488 |
CVE-2024-27026 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27026 SMASH Issue 403817 bnc#1223700 https://git.kernel.org/stable/c/7c8505ecc2d15473d679b8e06335434b84fffe86 https://git.kernel.org/stable/c/91d017d19d5a9ad153e2dc23ed3c0e2e79ef5262 https://git.kernel.org/stable/c/aba8659caf88017507419feea06069f529329ea6 https://git.kernel.org/stable/c/e127ce7699c1e05279ee5ee61f00893e7bfa9671 rh#2278482 |
CVE-2024-27027 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L) | CVE-2024-27027 SMASH Issue 403818 bnc#1223787 https://git.kernel.org/stable/c/769324eb35143462542cdb15483cdaf4877bf661 https://git.kernel.org/stable/c/b27e32e9367dac024cd6f61f22655714f483fd67 https://git.kernel.org/stable/c/b446631f355ece73b13c311dd712c47381a23172 rh#2278479 |
CVE-2024-27028 | kernel-source-rt:Ignore | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27028 SMASH Issue 403819 bnc#1223788 https://git.kernel.org/stable/c/1784053cf10a14c4ebd8a890bad5cfe1bee51713 https://git.kernel.org/stable/c/2342b05ec5342a519e00524a507f7a6ea6791a38 https://git.kernel.org/stable/c/55f8ea6731aa64871ee6aef7dba53ee9f9f3b2f6 https://git.kernel.org/stable/c/62b1f837b15cf3ec2835724bdf8577e47d14c753 https://git.kernel.org/stable/c/766ec94cc57492eab97cbbf1595bd516ab0cb0e4 https://git.kernel.org/stable/c/a20ad45008a7c82f1184dc6dee280096009ece55 https://git.kernel.org/stable/c/bcfcdf19698024565eff427706ebbd8df65abd11 https://git.kernel.org/stable/c/bea82355df9e1c299625405b1947fc9b26b4c6d4 https://git.kernel.org/stable/c/c10fed329c1c104f375a75ed97ea3abef0786d62 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html jsc#CAR-3425 rh#2278477 |
CVE-2024-27029 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2024-27029 SMASH Issue 403820 bnc#1223789 bnc#1226184 https://git.kernel.org/stable/c/1f24b3040f2b6ffcb97151fabb3070328254d923 https://git.kernel.org/stable/c/6540ff6482c1a5a6890ae44b23d0852ba1986d9e https://git.kernel.org/stable/c/e1e076bda4fd6378ae650f2c6ef1a4ff93c5aea5 rh#2278475 |
CVE-2024-27030 | kernel-source-rt:Ignore | moderate | 6.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H) | CVE-2024-27030 SMASH Issue 403821 bnc#1223790 https://git.kernel.org/stable/c/29d2550d79a8cbd31e0fbaa5c0e2a2efdc444e44 https://git.kernel.org/stable/c/4fedae8f9eafa2ac8cdaca58e315f52a7e2a8701 https://git.kernel.org/stable/c/50e60de381c342008c0956fd762e1c26408f372c https://git.kernel.org/stable/c/766c2627acb2d9d1722cce2e24837044d52d888a https://git.kernel.org/stable/c/772f18ded0e240cc1fa2b7020cc640e3e5c32b70 https://git.kernel.org/stable/c/94cb17e5cf3a3c484063abc0ce4b8a2b2e8c1cb2 https://git.kernel.org/stable/c/ad6759e233db6fcc131055f8e23b4eafbe81053c https://git.kernel.org/stable/c/dc29dd00705a62c77de75b6d752259b869aac49d https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html jsc#CAR-3426 rh#2278473 |
CVE-2024-27031 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27031 SMASH Issue 403822 bnc#1223805 https://git.kernel.org/stable/c/8a2e5977cecd3cde6a0e3e86b7b914d00240e5dc https://git.kernel.org/stable/c/8df1678c021ffeb20ef8a203bd9413f3ed9b0e9a https://git.kernel.org/stable/c/ad27382f8495f8ef6d2c66c413d756bfd13c0598 https://git.kernel.org/stable/c/fd5860ab6341506004219b080aea40213b299d2e rh#2278471 |
CVE-2024-27032 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27032 SMASH Issue 403823 bnc#1223701 https://git.kernel.org/stable/c/21ec68234826b1b54ab980a8df6e33c74cfbee58 https://git.kernel.org/stable/c/8844b2f8a3f0c428b74672f9726f9950b1a7764c https://git.kernel.org/stable/c/d034810d02a5af8eb74debe29877dcaf5f00fdd1 https://git.kernel.org/stable/c/f26091a981318b5b7451d61f99bc073a6af8db67 https://git.kernel.org/stable/c/fe4de493572a4263554903bf9c3afc5c196e15f0 rh#2278469 |
CVE-2024-27033 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27033 SMASH Issue 403824 bnc#1223702 https://git.kernel.org/stable/c/0386408036bfc8b50296d9e544ff91c4d52af2db https://git.kernel.org/stable/c/6633cdc8b2ebefcddcfcdacfd063105e60f39a49 https://git.kernel.org/stable/c/abe98a05e7162f64759bf9111108ebcb11322dec https://git.kernel.org/stable/c/b896e302f79678451a94769ddd9e52e954c64fbb rh#2278467 |
CVE-2024-27034 | kernel-source-rt:Analysis | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27034 SMASH Issue 403825 bnc#1223703 https://git.kernel.org/stable/c/2b1b14d9fc94b8feae20808684c8af28ec80f45b https://git.kernel.org/stable/c/52982edfcefd475cc34af663d5c47c0cddaa5739 https://git.kernel.org/stable/c/542c8b3c774a480bfd0804291a12f6f2391b0cd1 https://git.kernel.org/stable/c/75abfd61392b1db391bde6d738a30d685b843286 https://git.kernel.org/stable/c/7d420eaaa18ec8e2bb4eeab8c65c00492ef6f416 https://git.kernel.org/stable/c/fd244524c2cf07b5f4c3fe8abd6a99225c76544b rh#2278465 |
CVE-2024-27035 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27035 SMASH Issue 403826 bnc#1223704 https://git.kernel.org/stable/c/57e8b17d0522c8f4daf0c4d9969b4d7358033532 https://git.kernel.org/stable/c/82704e598d7b33c7e45526e34d3c585426319bed https://git.kernel.org/stable/c/8a430dd49e9cb021372b0ad91e60aeef9c6ced00 https://git.kernel.org/stable/c/c3311694b9bcced233548574d414c91d39214684 https://git.kernel.org/stable/c/e54cce8137258a550b49cae45d09e024821fb28d rh#2278462 |
CVE-2024-27036 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N) | CVE-2024-27036 SMASH Issue 403827 bnc#1223810 https://git.kernel.org/stable/c/65f2ced695982ccd516196d0a9447d85dbe2eed5 https://git.kernel.org/stable/c/844b4e132f57f1333dc79feaa035075a096762e4 https://git.kernel.org/stable/c/e45deec35bf7f1f4f992a707b2d04a8c162f2240 https://git.kernel.org/stable/c/f3dc1bdb6b0b0693562c7c54a6c28bafa608ba3c rh#2278460 |
CVE-2024-27039 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27039 SMASH Issue 403830 bnc#1223821 https://git.kernel.org/stable/c/2cc572e0085ebd4b662b74a0f43222bc00df9a00 https://git.kernel.org/stable/c/3f8445f1c746fda180a7f75372ed06b24e9cefe2 https://git.kernel.org/stable/c/64c6a38136b74a2f18c42199830975edd9fbc379 https://git.kernel.org/stable/c/95d1f1228c1bb54803ae57525b76db60e99b37e4 https://git.kernel.org/stable/c/d575765b1b62e8bdb00af11caa1aabeb01763d9f https://git.kernel.org/stable/c/e0b0d1c46a2ce1e46b79d004a7270fdef872e097 rh#2278454 |
CVE-2024-27040 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27040 SMASH Issue 403831 bnc#1223711 https://git.kernel.org/stable/c/d0e94f4807ff0df66cf447d6b4bbb8ac830e99c3 https://git.kernel.org/stable/c/e7cadd5d3a8ffe334d0229ba9eda4290138d56e7 https://git.kernel.org/stable/c/f610c46771ef1047e46d61807aa7c69cd29e63d8 https://git.kernel.org/stable/c/f6aed043ee5d75b3d1bfc452b1a9584b63c8f76b rh#2278452 |
CVE-2024-27041 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27041 SMASH Issue 403832 bnc#1223714 https://git.kernel.org/stable/c/1c62697e4086de988b31124fb8c79c244ea05f2b https://git.kernel.org/stable/c/2a3cfb9a24a28da9cc13d2c525a76548865e182c https://git.kernel.org/stable/c/ca2eb375db76fd50f31afdd67d6ca4f833254957 https://git.kernel.org/stable/c/e040f1fbe9abae91b12b074cfc3bbb5367b79811 rh#2278450 |
CVE-2024-27042 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N) | CVE-2024-27042 SMASH Issue 403833 bnc#1223823 https://git.kernel.org/stable/c/8db10cee51e3e11a6658742465edc21986cf1e8d https://git.kernel.org/stable/c/8f3e68c6a3fff53c2240762a47a0045d89371775 https://git.kernel.org/stable/c/b33d4af102b9c1f7a83d3f0ad3cab7d2bab8f058 https://git.kernel.org/stable/c/cdb637d339572398821204a1142d8d615668f1e9 rh#2278447 |
CVE-2024-27044 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27044 SMASH Issue 403835 bnc#1223723 https://git.kernel.org/stable/c/14613d52bc7fc180df6d2c65ba65fc921fc1dda7 https://git.kernel.org/stable/c/29fde8895b2fcc33f44aea28c644ce2d9b62f9e0 https://git.kernel.org/stable/c/2d9fe7787af01188dc470a649bdbb842d6511fd7 https://git.kernel.org/stable/c/330caa061af53ea6d287d7c43d0703714e510e08 https://git.kernel.org/stable/c/6ac7c7a3a9ab57aba0fe78ecb922d2b20e16efeb https://git.kernel.org/stable/c/7874ab3105ca4657102fee1cc14b0af70883c484 https://git.kernel.org/stable/c/9ccfe80d022df7c595f1925afb31de2232900656 https://git.kernel.org/stable/c/e019d87e02f1e539ae48b99187f253847744ca7a https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2278442 |
CVE-2024-27045 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N) | CVE-2024-27045 SMASH Issue 403836 bnc#1223826 https://git.kernel.org/stable/c/440f059837418fac1695b65d3ebc6080d33be877 https://git.kernel.org/stable/c/4b09715f1504f1b6e8dff0e9643630610bc05141 https://git.kernel.org/stable/c/ad76fd30557d6a106c481e4606a981221ca525f7 https://git.kernel.org/stable/c/cf114d8d4a8d78df272116a745bb43b48cef65f4 https://git.kernel.org/stable/c/d346b3e5b25c95d504478507eb867cd3818775ab https://git.kernel.org/stable/c/eb9327af3621d26b1d83f767c97a3fe8191a3a65 https://git.kernel.org/stable/c/ff28893c96c5e0927a4da10cd24a3522ca663515 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2278440 |
CVE-2024-27047 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27047 SMASH Issue 403838 bnc#1223828 https://git.kernel.org/stable/c/0307cf443308ecc6be9b2ca312bb31bae5e5a7ad https://git.kernel.org/stable/c/06dd21045a7e8bc8701b0ebedcd9a30a6325878b https://git.kernel.org/stable/c/0e939a002c8a7d66e60bd0ea6b281fb39d713c1a https://git.kernel.org/stable/c/2a2ff709511617de9c6c072eeee82bcbbdfecaf8 https://git.kernel.org/stable/c/4469c0c5b14a0919f5965c7ceac96b523eb57b79 https://git.kernel.org/stable/c/589ec16174dd9378953b8232ae76fad0a96e1563 https://git.kernel.org/stable/c/c0691de7df1d51482a52cac93b7fe82fd9dd296b https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2278433 |
CVE-2024-27048 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27048 SMASH Issue 403839 bnc#1223760 https://git.kernel.org/stable/c/6138a82f3bccfc67ed7ac059493579fc326c02e5 https://git.kernel.org/stable/c/9975908315c13bae2f2ed5ba92870fa935180b0e https://git.kernel.org/stable/c/b4152222e04cb8afeeca239c90e3fcaf4c553b42 https://git.kernel.org/stable/c/df62e22c2e27420e8990a4f09e30d7bf56c2036f rh#2278431 |
CVE-2024-27049 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2024-27049 SMASH Issue 403840 bnc#1223763 https://git.kernel.org/stable/c/6d9930096e1f13cf6d9aabfbf95d0e05fb04144f https://git.kernel.org/stable/c/84470b48af03a818039d587478b415cbcb264ff5 https://git.kernel.org/stable/c/a5a5f4413d91f395cb2d89829d376d7393ad48b9 rh#2278429 |
CVE-2024-27052 | kernel-source-rt:Not affected | moderate | 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2024-27052 SMASH Issue 403843 bnc#1223829 https://git.kernel.org/stable/c/1213acb478a7181cd73eeaf00db430f1e45b1361 https://git.kernel.org/stable/c/156012667b85ca7305cb363790d3ae8519a6f41e https://git.kernel.org/stable/c/3518cea837de4d106efa84ddac18a07b6de1384e https://git.kernel.org/stable/c/58fe3bbddfec10c6b216096d8c0e517cd8463e3a https://git.kernel.org/stable/c/7059cdb69f8e1a2707dd1e2f363348b507ed7707 https://git.kernel.org/stable/c/ac512507ac89c01ed6cd4ca53032f52cdb23ea59 https://git.kernel.org/stable/c/dddedfa3b29a63c2ca4336663806a6128b8545b4 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2278417 |
CVE-2024-27055 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27055 SMASH Issue 403846 bnc#1223811 https://git.kernel.org/stable/c/15930da42f8981dc42c19038042947b475b19f47 https://git.kernel.org/stable/c/38c19c44cc05ec1e84d2e31a9a289b83b6c7ec85 https://git.kernel.org/stable/c/7df62b8cca38aa452b508b477b16544cba615084 https://git.kernel.org/stable/c/9fc557d489f8163c1aabcb89114b8eba960f4097 https://git.kernel.org/stable/c/a75ac2693d734d20724f0e10e039ca85f1fcfc4e https://git.kernel.org/stable/c/adc646d2126988a64234502f579e4bc2b080d7cf rh#2278411 |
CVE-2024-27057 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27057 SMASH Issue 403848 bnc#1223831 https://git.kernel.org/stable/c/3cac6eebea9b4bc5f041e157e45c76e212ad6759 https://git.kernel.org/stable/c/c40aad7c81e5fba34b70123ed7ce3397fa62a4d2 https://git.kernel.org/stable/c/d153e8b154f9746ac969c85a4e6474760453647c rh#2278406 |
CVE-2024-27058 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27058 SMASH Issue 403849 bnc#1223708 https://git.kernel.org/stable/c/0a69b6b3a026543bc215ccc866d0aea5579e6ce2 https://git.kernel.org/stable/c/617d55b90e73c7b4aa2733ca6cc3f9b72d1124bb https://git.kernel.org/stable/c/c7077f43f30d817d10a9f8245e51576ac114b2f0 https://git.kernel.org/stable/c/f82f184874d2761ebaa60dccf577921a0dbb3810 rh#2278404 |
CVE-2024-27060 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27060 SMASH Issue 403851 bnc#1223725 https://git.kernel.org/stable/c/ce64ba1f6ec3439e4b4d880b4db99673f4507228 https://git.kernel.org/stable/c/d3d17e23d1a0d1f959b4fa55b35f1802d9c584fa rh#2278393 |
CVE-2024-27061 | kernel-source-rt:Not affected | moderate | 5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) | CVE-2024-27061 SMASH Issue 403852 bnc#1223833 https://git.kernel.org/stable/c/183420038444547c149a0fc5f58e792c2752860c https://git.kernel.org/stable/c/51a7d338c212e0640b1aca52ba6590d5bea49879 https://git.kernel.org/stable/c/dc60b25540c82fc4baa95d1458ae96ead21859e0 rh#2278391 |
CVE-2024-27063 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27063 SMASH Issue 403854 bnc#1223835 https://git.kernel.org/stable/c/10f2af1af8ab8a7064f193446abd5579d3def7e3 https://git.kernel.org/stable/c/3f360227cb46edb2cd2494128e1e06ed5768a62e https://git.kernel.org/stable/c/415798bc07dd1c1ae3a656aa026580816e0b9fe8 https://git.kernel.org/stable/c/acd025c7a7d151261533016a6ca2d38f2de04e87 rh#2278385 |
CVE-2024-27064 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27064 SMASH Issue 403855 bnc#1223740 https://git.kernel.org/stable/c/4e4623a4f6e133e671f65f9ac493bddaaf63e250 https://git.kernel.org/stable/c/79846fdcc548d617b0b321addc6a3821d3b75b20 https://git.kernel.org/stable/c/7eaf837a4eb5f74561e2486972e7f5184b613f6e https://git.kernel.org/stable/c/e77a6b53a3a547b6dedfc40c37cee4f310701090 rh#2278382 |
CVE-2024-27065 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27065 SMASH Issue 403856 bnc#1223836 https://git.kernel.org/stable/c/2531f907d3e40a6173090f10670ae76d117ab27b https://git.kernel.org/stable/c/3443e57654f90c9a843ab6a6040c10709fd033aa https://git.kernel.org/stable/c/4a0e7f2decbf9bd72461226f1f5f7dcc4b08f139 https://git.kernel.org/stable/c/4d37f12707ee965d338028732575f0b85f6d9e4f https://git.kernel.org/stable/c/640dbf688ba955e83e03de84fbdda8e570b7cce4 https://git.kernel.org/stable/c/845083249d6a392f3a88804e1669bdb936ee129f https://git.kernel.org/stable/c/9683cb6c2c6c0f45537bf0b8868b5d38fcb63fc7 https://git.kernel.org/stable/c/df257c435e51651c43b86326d112ddadda76350e https://git.kernel.org/stable/c/fcf32a5bfcb8a57ac0ce717fcfa4d688c91f1005 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2278380 |
CVE-2024-27066 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27066 SMASH Issue 403857 bnc#1223817 https://git.kernel.org/stable/c/51bacd9d29bf98c3ebc65e4a0477bb86306b4140 https://git.kernel.org/stable/c/75450ff8c6fe8755bf5b139b238eaf9739cfd64e https://git.kernel.org/stable/c/d5c0ed17fea60cca9bc3bf1278b49ba79242bbcd https://git.kernel.org/stable/c/e142169aca5546ae6619c39a575cda8105362100 rh#2278378 |
CVE-2024-27067 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27067 SMASH Issue 403858 bnc#1223739 https://git.kernel.org/stable/c/35485dad6e28f9b17884764d4692b1655cb848d0 https://git.kernel.org/stable/c/51c23bd691c0f1fb95b29731c356c6fd69925d17 https://git.kernel.org/stable/c/99e425032c6ec13584d3cd33846e0c7307501b47 https://git.kernel.org/stable/c/9e2d4b58c1da48a32905802aaeadba7084b46895 rh#2278376 |
CVE-2024-27068 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27068 SMASH Issue 403859 bnc#1223808 https://git.kernel.org/stable/c/2db869da91afd48e5b9ec76814709be49662b07d https://git.kernel.org/stable/c/9b02197596671800dd934609384b1aca7c6ad218 https://git.kernel.org/stable/c/a37f3652bee468f879d35fe2da9ede3f1dcbb7be https://git.kernel.org/stable/c/ca93bf607a44c1f009283dac4af7df0d9ae5e357 rh#2278374 |
CVE-2024-27069 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27069 SMASH Issue 403860 bnc#1223818 https://git.kernel.org/stable/c/77a28aa476873048024ad56daf8f4f17d58ee48e https://git.kernel.org/stable/c/c3c85aefc0da1e5074a06c682542a54ccc99bdca rh#2278513 |
CVE-2024-27070 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27070 SMASH Issue 403861 bnc#1223706 https://git.kernel.org/stable/c/8186e16a766d709a08f188d2f4e84098f364bea1 https://git.kernel.org/stable/c/eb70d5a6c932d9d23f4bb3e7b83782c21ac4b064 rh#2278511 |
CVE-2024-27071 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27071 SMASH Issue 403862 bnc#1223734 https://git.kernel.org/stable/c/67e578c8ff2d7df03bf8ca9a7f5436b1796f6ad1 https://git.kernel.org/stable/c/b1ba8bcb2d1ffce11b308ce166c9cc28d989e3b9 rh#2278509 |
CVE-2024-27076 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27076 SMASH Issue 403867 bnc#1223779 https://git.kernel.org/stable/c/42492b00156c03a79fd4851190aa63045d6a15ce https://git.kernel.org/stable/c/4797a3dd46f220e6d83daf54d70c5b33db6deb01 https://git.kernel.org/stable/c/5d9fe604bf9b5b09d2215225df55f22a4cbbc684 https://git.kernel.org/stable/c/6c92224721a439d6350db5933a1060768dcd565e https://git.kernel.org/stable/c/8c2e4efe1278cd2b230cdbf90a6cefbf00acc282 https://git.kernel.org/stable/c/8df9a3c7044b847e9c4dc7e683fd64c6b873f328 https://git.kernel.org/stable/c/b1d0eebaf87cc9ccd05f779ec4a0589f95d6c18b https://git.kernel.org/stable/c/d164ddc21e986dd9ad614b4b01746e5457aeb24f https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2278498 |
CVE-2024-27079 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27079 SMASH Issue 403870 bnc#1223742 https://git.kernel.org/stable/c/333fe86968482ca701c609af590003bcea450e8f https://git.kernel.org/stable/c/81e921fd321614c2ad8ac333b041aae1da7a1c6d rh#2278492 |
CVE-2024-27080 | kernel-source-rt:Not affected | moderate | 6.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H) | CVE-2024-27080 SMASH Issue 403871 bnc#1223782 https://git.kernel.org/stable/c/49d640d2946c35a17b051d54171a032dd95b0f50 https://git.kernel.org/stable/c/978b63f7464abcfd364a6c95f734282c50f3decf https://git.kernel.org/stable/c/ced63fffd63072c0ca55d5a451010d71bf08c0b3 rh#2278490 |
CVE-2024-27389 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27389 SMASH Issue 403873 bnc#1223705 https://git.kernel.org/stable/c/340682ed1932b8e3bd0bfc6c31a0c6354eb57cc6 https://git.kernel.org/stable/c/4cdf9006fc095af71da80e9b5f48a32e991b9ed3 https://git.kernel.org/stable/c/a43e0fc5e9134a46515de2f2f8d4100b74e50de3 https://git.kernel.org/stable/c/cb9e802e49c24eeb3af35e9e8c04d526f35f112a https://git.kernel.org/stable/c/db6e5e16f1ee9e3b01d2f71c7f0ba945f4bf0f4e rh#2278532 |
CVE-2024-27390 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2024-27390 SMASH Issue 403874 bnc#1223707 https://git.kernel.org/stable/c/17ef8efc00b34918b966388b2af0993811895a8c https://git.kernel.org/stable/c/26d4bac55750d535f1f0b8790dc26daf6089e373 https://git.kernel.org/stable/c/5da9a218340a2bc804dc4327e5804392e24a0b88 https://git.kernel.org/stable/c/7eb06ee5921189812e6b4bfe7b0f1e878be16df7 https://git.kernel.org/stable/c/9d159d6637ccce25f879d662a480541ef4ba3a50 https://git.kernel.org/stable/c/a03ede2282ebbd181bd6f5c38cbfcb5765afcd04 rh#2278530 |
CVE-2024-27391 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27391 SMASH Issue 403875 bnc#1223709 https://git.kernel.org/stable/c/328efda22af81130c2ad981c110518cb29ff2f1d https://git.kernel.org/stable/c/4041c60a9d543b3ad50225385b072ba68e96166e https://git.kernel.org/stable/c/515cc676dfbce40d93c92b1ff3c1070e917f4e52 https://git.kernel.org/stable/c/90ae293d1d255f622318fce6eeea2e18f9fde5c1 https://git.kernel.org/stable/c/9ab0c303ccabfd6bdce14432792d41090070008c rh#2278528 |
CVE-2024-27392 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2024-27392 SMASH Issue 403876 bnc#1223713 https://git.kernel.org/stable/c/534f9dc7fe495b3f9cc84363898ac50c5a25fccb https://git.kernel.org/stable/c/8d0d2447394b13fb22a069f0330f9c49b7fff9d3 rh#2278526 |
CVE-2024-27393 | kernel-source-rt:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27393 OSS:2024/05/08/4 OSS:2024/Q2/226 SMASH Issue 404867 bnc#1224076 http://xenbits.xen.org/xsa/advisory-457.html https://git.kernel.org/stable/c/037965402a010898d34f4e35327d22c0a95cd51f https://git.kernel.org/stable/c/27aa3e4b3088426b7e34584274ad45b5afaf7629 https://git.kernel.org/stable/c/4143b9479caa29bb2380f3620dcbe16ea84eb3b1 https://git.kernel.org/stable/c/7c1250796b6c262b505a46192f4716b8c6a6a8c6 https://git.kernel.org/stable/c/c8b7b2f158d9d4fb89cd2f68244af154f7549bb4 rh#2280745 |
CVE-2024-27394 | kernel-source-rt:Not affected | moderate | () | CVE-2024-27394 SMASH Issue 404883 bnc#1224097 https://git.kernel.org/stable/c/80e679b352c3ce5158f3f778cfb77eb767e586fb https://git.kernel.org/stable/c/ca4fb6c6764b3f75b4f5aa81db1536291897ff7f rh#2280442 |
CVE-2024-27395 | kernel-source-rt:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27395 SMASH Issue 404882 bnc#1224098 https://git.kernel.org/stable/c/2db9a8c0a01fa1c762c1e61a13c212c492752994 https://git.kernel.org/stable/c/35880c3fa6f8fe281a19975d2992644588ca33d3 https://git.kernel.org/stable/c/589523cf0b384164e445dd5db8d5b1bf97982424 https://git.kernel.org/stable/c/5ea7b72d4fac2fdbc0425cd8f2ea33abe95235b2 https://git.kernel.org/stable/c/9048616553c65e750d43846f225843ed745ec0d4 https://git.kernel.org/stable/c/bca6fa2d9a9f560e6b89fd5190b05cc2f5d422c1 https://git.kernel.org/stable/c/eaa5e164a2110d2fb9e16c8a29e4501882235137 https://git.kernel.org/stable/c/edee0758747d7c219e29db9ed1d4eb33e8d32865 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2280440 |
CVE-2024-27396 | kernel-source-rt:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27396 SMASH Issue 404879 bnc#1224096 https://git.kernel.org/stable/c/07b20d0a3dc13fb1adff10b60021a4924498da58 https://git.kernel.org/stable/c/0caff3e6390f840666b8dc1ecebf985c2ef3f1dd https://git.kernel.org/stable/c/25a1c2d4b1fcf938356a9688a96a6456abd44b29 https://git.kernel.org/stable/c/2aacd4de45477582993f8a8abb9505a06426bfb6 https://git.kernel.org/stable/c/2e74b3fd6bf542349758f283676dff3660327c07 https://git.kernel.org/stable/c/718df1bc226c383dd803397d7f5d95557eb81ac7 https://git.kernel.org/stable/c/cd957d1716ec979d8f5bf38fc659aeb9fdaa2474 https://git.kernel.org/stable/c/f2a904107ee2b647bb7794a1a82b67740d7c8a64 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2280437 |
CVE-2024-27397 | kernel-source-rt:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27397 SMASH Issue 404880 bnc#1224095 https://git.kernel.org/stable/c/383182db8d58c4237772ba0764cded4938a235c3 https://git.kernel.org/stable/c/7395dfacfff65e9938ac0889dafa1ab01e987d15 rh#2280434 |
CVE-2024-27400 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27400 SMASH Issue 404987 bnc#1224180 https://git.kernel.org/stable/c/0c7ed3ed35eec9138b88d42217b5a6b9a62bda4d https://git.kernel.org/stable/c/5c25b169f9a0b34ee410891a96bc9d7b9ed6f9be https://git.kernel.org/stable/c/9a4f6e138720b6e9adf7b82a71d0292f3f276480 https://git.kernel.org/stable/c/d3a9331a6591e9df64791e076f6591f440af51c3 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DW2MIOIMOFUSNLHLRYX23AFR36BMKD65/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OTB4HWU2PTVW5NEYHHLOCXDKG3PYA534/ rh#2280460 |
CVE-2024-27401 | kernel-source-rt:Ignore | moderate | 6.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H) | CVE-2024-27401 SMASH Issue 404985 bnc#1224181 https://git.kernel.org/stable/c/1fe60ee709436550f8cfbab01295936b868d5baa https://git.kernel.org/stable/c/38762a0763c10c24a4915feee722d7aa6e73eb98 https://git.kernel.org/stable/c/4ee0941da10e8fdcdb34756b877efd3282594c1f https://git.kernel.org/stable/c/539d51ac48bcfcfa1b3d4a85f8df92fa22c1d41c https://git.kernel.org/stable/c/67f34f093c0f7bf33f5b4ae64d3d695a3b978285 https://git.kernel.org/stable/c/79f988d3ffc1aa778fc5181bdfab312e57956c6b https://git.kernel.org/stable/c/7b8c7bd2296e95b38a6ff346242356a2e7190239 https://git.kernel.org/stable/c/cca330c59c54207567a648357835f59df9a286bb https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DW2MIOIMOFUSNLHLRYX23AFR36BMKD65/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OTB4HWU2PTVW5NEYHHLOCXDKG3PYA534/ jsc#CAR-3454 rh#2280407 |
CVE-2024-27404 | kernel-source-rt:Not affected | moderate | 5.8 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H) | CVE-2024-27404 SMASH Issue 406298 bnc#1224422 https://git.kernel.org/stable/c/2dba5774e8ed326a78ad4339d921a4291281ea6e https://git.kernel.org/stable/c/967d3c27127e71a10ff5c083583a038606431b61 https://git.kernel.org/stable/c/987c3ed7297e5661bc7f448f06fc366e497ac9b2 https://git.kernel.org/stable/c/e64148635509bf13eea851986f5a0b150e5bd066 rh#2281125 |
CVE-2024-27405 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2024-27405 SMASH Issue 406314 bnc#1224423 https://git.kernel.org/stable/c/059285e04ebb273d32323fbad5431c5b94f77e48 https://git.kernel.org/stable/c/2b7ec68869d50ea998908af43b643bca7e54577e https://git.kernel.org/stable/c/2cb66b62a5d64ccf09b0591ab86fb085fa491fc5 https://git.kernel.org/stable/c/35b604a37ec70d68b19dafd10bbacf1db505c9ca https://git.kernel.org/stable/c/57ca0e16f393bb21d69734e536e383a3a4c665fd https://git.kernel.org/stable/c/76c51146820c5dac629f21deafab0a7039bc3ccd https://git.kernel.org/stable/c/a31cf46d108dabce3df80b3e5c07661e24912151 https://git.kernel.org/stable/c/c7f43900bc723203d7554d299a2ce844054fab8e https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html jsc#CAR-3462 rh#2281123 |
CVE-2024-27406 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27406 SMASH Issue 406302 bnc#1224425 https://git.kernel.org/stable/c/1eb1e984379e2da04361763f66eec90dd75cf63e https://git.kernel.org/stable/c/9e6e541b97762d5b1143070067f7c68f39a408f8 https://git.kernel.org/stable/c/e6316749d603fe9c4c91f6ec3694e06e4de632a3 rh#2281121 |
CVE-2024-27407 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27407 SMASH Issue 406299 bnc#1224429 https://git.kernel.org/stable/c/1c0a95d99b1b2b5d842e5abc7ef7eed1193b60d7 https://git.kernel.org/stable/c/652cfeb43d6b9aba5c7c4902bed7a7340df131fb https://git.kernel.org/stable/c/8c77398c72618101d66480b94b34fe9087ee3d08 rh#2281119 |
CVE-2024-27408 | kernel-source-rt:Not affected | low | 2.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N) | CVE-2024-27408 SMASH Issue 406300 bnc#1224430 https://git.kernel.org/stable/c/bbcc1c83f343e580c3aa1f2a8593343bf7b55bba https://git.kernel.org/stable/c/d24fe6d5a1cfdddb7a9ef56736ec501c4d0a5fd3 https://git.kernel.org/stable/c/f396b4df27cfe01a99f4b41f584c49e56477be3a jsc#CAR-3463 rh#2281117 |
CVE-2024-27409 | kernel-source-rt:Not affected | low | 2.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N) | CVE-2024-27409 SMASH Issue 406305 bnc#1224431 https://git.kernel.org/stable/c/17be6f5cb223f22e4733ed8fe8b2247cbb677716 https://git.kernel.org/stable/c/227ef58a9b0c372efba422e8886a8015a1509eba https://git.kernel.org/stable/c/712a92a48158e02155b4b6b21e03a817f78c9b7e rh#2281115 |
CVE-2024-27411 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27411 SMASH Issue 406297 bnc#1224433 https://git.kernel.org/stable/c/be00e15b240ed71fc30c0576af7ab670c8271661 https://git.kernel.org/stable/c/f6ecfdad359a01c7fd8a3bcfde3ef0acdf107e6e rh#2281111 |
CVE-2024-27412 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27412 SMASH Issue 406330 bnc#1224437 https://git.kernel.org/stable/c/083686474e7c97b0f8b66df37fcb64e432e8b771 https://git.kernel.org/stable/c/2df70149e73e79783bcbc7db4fa51ecef0e2022c https://git.kernel.org/stable/c/7394abc8926adee6a817bab10797e0adc898af77 https://git.kernel.org/stable/c/cefe18e9ec84f8fe3e198ccebb815cc996eb9797 https://git.kernel.org/stable/c/d4d813c0a14d6bf52d810a55db06a2e7e3d98eaa https://git.kernel.org/stable/c/d7acc4a569f5f4513120c85ea2b9f04909b7490f https://git.kernel.org/stable/c/e601ae81910ce6a3797876e190a2d8ef6cf828bc https://git.kernel.org/stable/c/fbca8bae1ba79d443a58781b45e92a73a24ac8f8 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2281109 |
CVE-2024-27414 | kernel-source-rt:Not affected | moderate | 6.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H) | CVE-2024-27414 SMASH Issue 406295 bnc#1224439 https://git.kernel.org/stable/c/167d8642daa6a44b51de17f8ff0f584e1e762db7 https://git.kernel.org/stable/c/743ad091fb46e622f1b690385bb15e3cd3daf874 https://git.kernel.org/stable/c/831bc2728fb48a8957a824cba8c264b30dca1425 https://git.kernel.org/stable/c/882a51a10ecf24ce135d573afa0872aef02c5125 https://git.kernel.org/stable/c/a1227b27fcccc99dc44f912b479e01a17e2d7d31 https://git.kernel.org/stable/c/b9fbc44159dfc3e9a7073032752d9e03f5194a6f https://git.kernel.org/stable/c/f2261eb994aa5757c1da046b78e3229a3ece0ad9 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2281103 |
CVE-2024-27416 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27416 SMASH Issue 406303 bnc#1224723 https://git.kernel.org/stable/c/30a5e812f78e3d1cced90e1ed750bf027599205f https://git.kernel.org/stable/c/79820a7e1e057120c49be07cbe10643d0706b259 https://git.kernel.org/stable/c/7e74aa53a68bf60f6019bd5d9a9a1406ec4d4865 https://git.kernel.org/stable/c/8e2758cc25891d2b76717aaf89b40ed215de188c https://git.kernel.org/stable/c/afec8f772296dd8e5a2a6f83bbf99db1b9ca877f https://git.kernel.org/stable/c/c3df637266df29edee85e94cab5fd7041e5753ba https://git.kernel.org/stable/c/df193568d61234c81de7ed4d540c01975de60277 https://git.kernel.org/stable/c/fba268ac36ab19f9763ff90d276cde0ce6cd5f31 rh#2281099 |
CVE-2024-27418 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27418 SMASH Issue 406331 bnc#1224720 https://git.kernel.org/stable/c/3773d65ae5154ed7df404b050fd7387a36ab5ef3 https://git.kernel.org/stable/c/a3c8fa54e904b0ddb52a08cc2d8ac239054f61fd https://git.kernel.org/stable/c/a639441c880ac479495e5ab37e3c29f21ae5771b https://git.kernel.org/stable/c/cbebc55ceacef1fc0651e80e0103cc184552fc68 rh#2281095 |
CVE-2024-27419 | kernel-source-rt:Won't fix | low | 2.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N) | CVE-2024-27419 SMASH Issue 406340 bnc#1224759 https://git.kernel.org/stable/c/0866afaff19d8460308b022345ed116a12b1d0e1 https://git.kernel.org/stable/c/16d71319e29d5825ab53f263b59fdd8dc2d60ad4 https://git.kernel.org/stable/c/34cab94f7473e7b09f5205d4583fb5096cb63b5b https://git.kernel.org/stable/c/43464808669ba9d23996f0b6d875450191687caf https://git.kernel.org/stable/c/bbf950a6e96a91cf8cf0c71117b94ed3fafc9dd3 https://git.kernel.org/stable/c/d380ce70058a4ccddc3e5f5c2063165dc07672c6 https://git.kernel.org/stable/c/d623fd5298d95b65d27ef5a618ebf39541074856 https://git.kernel.org/stable/c/f9055fa2b2931261d5f89948ee5bc315b6a22d4a https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html jsc#CAR-3566 rh#2281093 |
CVE-2024-27420 | kernel-source-rt:Ignore | low | 0 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N) | CVE-2024-27420 SMASH Issue 406341 bnc#1224758 https://git.kernel.org/stable/c/07bbccd1adb56b39eef982b8960d59e3c005c6a1 https://git.kernel.org/stable/c/0b8eb369c182814d817b9449bc9e86bfae4310f9 https://git.kernel.org/stable/c/97a4d8b9f67cc7efe9a0c137e12f6d9e40795bf1 https://git.kernel.org/stable/c/bc76645ebdd01be9b9994dac39685a3d0f6f7985 https://git.kernel.org/stable/c/c558e54f7712b086fbcb611723272a0a4b0d451c https://git.kernel.org/stable/c/cfe0f73fb38a01bce86fe15ef5f750f850f7d3fe https://git.kernel.org/stable/c/cfedde3058bf976f2f292c0a236edd43afcdab57 https://git.kernel.org/stable/c/db364859ce68fb3a52d42cd87a54da3dc42dc1c8 jsc#CAR-3565 rh#2281091 |
CVE-2024-27421 | kernel-source-rt:Ignore | low | 0 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N) | CVE-2024-27421 SMASH Issue 406342 bnc#1224761 https://git.kernel.org/stable/c/4c02b9ccbb11862ee39850b2b285664cd579b039 https://git.kernel.org/stable/c/859175d4bc11af829e2fdd261a7effdaba9b5d8f https://git.kernel.org/stable/c/b5dffcb8f71bdd02a4e5799985b51b12f4eeaf76 https://git.kernel.org/stable/c/b7d33e083f9d5d39445c0a91e7ad4f3e2c47fcb5 https://git.kernel.org/stable/c/c13fbb5902bce848759385986d4833f5b90782c1 https://git.kernel.org/stable/c/c4309e5f8e80584715c814e1d012dbc3eee5a500 https://git.kernel.org/stable/c/d732b83251322ecd3b503e03442247745d6052ce https://git.kernel.org/stable/c/f9c4d42464173b826190fae2283ed1a4bbae0c8b jsc#CAR-3510 rh#2281089 |
CVE-2024-27422 | kernel-source-rt:Ignore | low | 0 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N) | CVE-2024-27422 SMASH Issue 406343 bnc#1224760 https://git.kernel.org/stable/c/01d4e3afe257768cd2a45f15a0e57bacf932b140 https://git.kernel.org/stable/c/2309b369fae2d9cdc3c945cd3eaec84eb1958ca3 https://git.kernel.org/stable/c/498f1d6da11ed6d736d655a2db14ee2d9569eecb https://git.kernel.org/stable/c/4eacb242e22e31385a50a393681d0fe4b55ed1e9 https://git.kernel.org/stable/c/6f254abae02abd4a0aca062c1b3812d7e2d8ea94 https://git.kernel.org/stable/c/73426c32e259c767d40613b956d5b80d0c28a9a9 https://git.kernel.org/stable/c/cbba77abb4a553c1f5afac1ba2a0861aa1f13549 https://git.kernel.org/stable/c/f99b494b40431f0ca416859f2345746199398e2b jsc#CAR-3569 rh#2281087 |
CVE-2024-27423 | kernel-source-rt:Ignore | low | 0 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N) | CVE-2024-27423 SMASH Issue 406344 bnc#1224762 https://git.kernel.org/stable/c/0d43a58900e5a2bfcc9de47e16c6c501c0bef853 https://git.kernel.org/stable/c/46803b776d869b0c36041828a83c4f7da2dfa03b https://git.kernel.org/stable/c/489e05c614dbeb1a1148959f02bdb788891819e6 https://git.kernel.org/stable/c/4f2efa17c3ec5e4be0567b47439b9713c0dc6550 https://git.kernel.org/stable/c/652b0b35819610a42b8a90d21acb12f69943b397 https://git.kernel.org/stable/c/89aa78a34340e9dbc3248095f44d81d0e1c23193 https://git.kernel.org/stable/c/a2e706841488f474c06e9b33f71afc947fb3bf56 https://git.kernel.org/stable/c/db006d7edbf0b4800390ece3727a82f4ae764043 jsc#CAR-3511 rh#2281085 |
CVE-2024-27424 | kernel-source-rt:Ignore | low | 0 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N) | CVE-2024-27424 SMASH Issue 406345 bnc#1224756 https://git.kernel.org/stable/c/0a30016e892bccabea30af218782c4b6ce0970af https://git.kernel.org/stable/c/1f60795dcafc97c45984240d442cdc151f825977 https://git.kernel.org/stable/c/43547d8699439a67b78d6bb39015113f7aa360fd https://git.kernel.org/stable/c/4ccad39009e7bd8a03d60a97c87b0327ae812880 https://git.kernel.org/stable/c/5ac337138272d26d6d3d4f71bc5b1a87adf8b24d https://git.kernel.org/stable/c/7782e5e7047cae6b9255ee727c99fc73d77cf773 https://git.kernel.org/stable/c/85f34d352f4b79afd63dd13634b23dafe6b570f9 https://git.kernel.org/stable/c/f3315a6edaec12b461031eab8c98c78111a41f95 jsc#CAR-3620 rh#2281083 |
CVE-2024-27425 | kernel-source-rt:Ignore | low | 0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N) | CVE-2024-27425 SMASH Issue 406346 bnc#1224755 https://git.kernel.org/stable/c/33081e0f34899d5325e7c45683dd8dc9cb18b583 https://git.kernel.org/stable/c/34c84e0036a60e7e50ae50b42ed194d8daef8cc9 https://git.kernel.org/stable/c/5deaef2bf56456c71b841e0dfde1bee2fd88c4eb https://git.kernel.org/stable/c/6133a71c75dacea12fcc85838b4455c2055b0f14 https://git.kernel.org/stable/c/7d56ffc51ebd2777ded8dca50d631ee19d97db5c https://git.kernel.org/stable/c/80578681ea274e0a6512bb7515718c206a7b74cf https://git.kernel.org/stable/c/806f462ba9029d41aadf8ec93f2f99c5305deada https://git.kernel.org/stable/c/a22f9194f61ad4f2b6405c7c86bee85eac1befa5 rh#2281081 |
CVE-2024-27426 | kernel-source-rt:Ignore | low | 0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N) | CVE-2024-27426 SMASH Issue 406347 bnc#1224753 https://git.kernel.org/stable/c/34a164d2448264b62af82bc0af3d2c83d12d38ac https://git.kernel.org/stable/c/42e71408e2c138be9ccce60920bd6cf094ba1e32 https://git.kernel.org/stable/c/84b8486e9cedc93875f251ba31abcf73bd586a3a https://git.kernel.org/stable/c/d28fa5f0e6c1554e2829f73a6a276c9a49689d04 https://git.kernel.org/stable/c/e799299aafed417cc1f32adccb2a0e5268b3f6d5 https://git.kernel.org/stable/c/f716a68234242f95305dffb5c9426caa64b316b0 https://git.kernel.org/stable/c/f84f7709486d8a578ab4b7d2a556d1b1a59cfc97 https://git.kernel.org/stable/c/fa3f3ab5c399852d32a0c3cbb8c55882f7e2c61f rh#2281079 |
CVE-2024-27427 | kernel-source-rt:Ignore | low | 0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N) | CVE-2024-27427 SMASH Issue 406348 bnc#1224754 https://git.kernel.org/stable/c/291d36d772f5ea5c68a263ee440f2c9eade371c9 https://git.kernel.org/stable/c/500936692ccca8617a955652d1929f079b17a201 https://git.kernel.org/stable/c/5d5c14efc987900509cec465af26608e39ac607c https://git.kernel.org/stable/c/60a7a152abd494ed4f69098cf0f322e6bb140612 https://git.kernel.org/stable/c/7d1e00fc2af3b7c30835d643a3655b7e9ff7cb20 https://git.kernel.org/stable/c/b8006cb0a34aaf85cdd8741f4148fd9c76b351d3 https://git.kernel.org/stable/c/eadec8da4451c2c0897199691184602e4ee497d1 https://git.kernel.org/stable/c/fed835d415766a94fc0246dcebc3af4c03fe9941 rh#2281077 |
CVE-2024-27428 | kernel-source-rt:Ignore | low | 0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N) | CVE-2024-27428 SMASH Issue 406349 bnc#1224752 https://git.kernel.org/stable/c/119cae5ea3f9e35cdada8e572cc067f072fa825a https://git.kernel.org/stable/c/5731369af2de21695fe7c1c91fe134fabe5b33b8 https://git.kernel.org/stable/c/775ed3549819f814a6ecef5726d2b4c23f249b77 https://git.kernel.org/stable/c/a47d68d777b41862757b7e3051f2d46d6e25f87b https://git.kernel.org/stable/c/acc653e8a3aaab1b7103f98645f2cce7be89e3d3 https://git.kernel.org/stable/c/d1261bde59a3a087ab0c81181821e194278d9264 https://git.kernel.org/stable/c/dca1d93fe42fb9c42b66f61714fbdc55c87eb002 https://git.kernel.org/stable/c/eda02a0bed550f07a8283d3e1f25b90a38e151ed rh#2281075 |
CVE-2024-27429 | kernel-source-rt:Ignore | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27429 SMASH Issue 406350 bnc#1224746 https://git.kernel.org/stable/c/18c95d11c347a12e5c31df1325cef6b995d14ecf https://git.kernel.org/stable/c/1e84b108f2a71daa8d04032e4d2096522376debb https://git.kernel.org/stable/c/591192c3a9fc728a0af7b9dd50bf121220062293 https://git.kernel.org/stable/c/7e1e25891f090e24a871451c9403abac63cb45dd https://git.kernel.org/stable/c/b3f0bc3a315cf1af03673a0163c08fe037587acd https://git.kernel.org/stable/c/cfd9f4a740f772298308b2e6070d2c744fb5cf79 https://git.kernel.org/stable/c/e3a3718b1723253d4f068e88e81d880d71f1a1e9 https://git.kernel.org/stable/c/e439607291c082332e1e35baf8faf8552e6bcb4a rh#2281073 |
CVE-2024-27430 | kernel-source-rt:Ignore | low | 0 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N) | CVE-2024-27430 SMASH Issue 406351 bnc#1224750 https://git.kernel.org/stable/c/392eb88416dcbc5f1d61b9a88d79d78dc8b27652 https://git.kernel.org/stable/c/7510b08c5f5ba15983da004b021fc6154eeb4047 https://git.kernel.org/stable/c/7644df766006d4878a556e427e3ecc78c2d5606b https://git.kernel.org/stable/c/7f615232556f3c6e3eeecef96ef2b00d0aa905bb https://git.kernel.org/stable/c/958d6145a6d9ba9e075c921aead8753fb91c9101 https://git.kernel.org/stable/c/bbc21f134b89535d1cf110c5f2b33ac54e5839c4 https://git.kernel.org/stable/c/dec82a8fc45c6ce494c2cb31f001a2aadb132b57 https://git.kernel.org/stable/c/e041df5dc9e68adffcba5499ca28e1252bed6f4b jsc#CAR-3586 rh#2281071 |
CVE-2024-27431 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27431 SMASH Issue 406352 bnc#1224718 https://git.kernel.org/stable/c/2487007aa3b9fafbd2cb14068f49791ce1d7ede5 https://git.kernel.org/stable/c/3420b3ff1ff489c177ea1cb7bd9fbbc4e9a0be95 https://git.kernel.org/stable/c/5f4e51abfbe6eb444fa91906a5cd083044278297 https://git.kernel.org/stable/c/eaa7cb836659ced2d9f814ac32aa3ec193803ed6 https://git.kernel.org/stable/c/f0363af9619c77730764f10360e36c6445c12f7b https://git.kernel.org/stable/c/f562e4c4aab00986dde3093c4be919c3f2b85a4a rh#2281069 |
CVE-2024-27432 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27432 SMASH Issue 406358 bnc#1224716 https://git.kernel.org/stable/c/09a1907433865b7c8ee6777e507f5126bdd38c0f https://git.kernel.org/stable/c/49202a8256fc50517ef06fd5e2084c4febde6369 https://git.kernel.org/stable/c/943c14ece95eb1cf98d477462aebcbfdfd714633 https://git.kernel.org/stable/c/9fcadd125044007351905d40c405fadc2d3bb6d6 https://git.kernel.org/stable/c/ea80e3ed09ab2c2b75724faf5484721753e92c31 https://git.kernel.org/stable/c/f78807362828ad01db2a9ed005bf79501b620f27 rh#2281139 |
CVE-2024-27433 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27433 SMASH Issue 406359 bnc#1224711 https://git.kernel.org/stable/c/a32e88f2b20259f5fe4f8eed598bbc85dc4879ed https://git.kernel.org/stable/c/de3340533bd68a7b3d6be1841b8eb3fa6c762fe6 https://git.kernel.org/stable/c/f3633fed984f1db106ff737a0bb52fadb2d89ac7 https://git.kernel.org/stable/c/fa761ce7a1d15cca1a306b3635f81a22b15fee5b rh#2281137 |
CVE-2024-27434 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27434 SMASH Issue 406360 bnc#1224710 https://git.kernel.org/stable/c/40405cbb20eb6541c603e7b3d54ade0a7be9d715 https://git.kernel.org/stable/c/60f6d5fc84a9fd26528a24d8a267fc6a6698b628 https://git.kernel.org/stable/c/b4f1b0b3b91762edd19bf9d3b2e4c3a0740501f8 https://git.kernel.org/stable/c/e35f316bce9e5733c9826120c1838f4c447b2c4c rh#2281133 |
CVE-2024-27437 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-27437 SMASH Issue 400469 bnc#1222625 https://git.kernel.org/stable/c/139dfcc4d723ab13469881200c7d80f49d776060 https://git.kernel.org/stable/c/26389925d6c2126fb777821a0a983adca7ee6351 https://git.kernel.org/stable/c/2a4a666c45107206605b7b5bc20545f8aabc4fa2 https://git.kernel.org/stable/c/3b3491ad0f80d913e7d255941d4470f4a4d9bfda https://git.kernel.org/stable/c/561d5e1998d58b54ce2bbbb3e843b669aa0b3db5 https://git.kernel.org/stable/c/b7a2f0955ffceffadfe098b40b50307431f45438 https://git.kernel.org/stable/c/bf0bc84a20e6109ab07d5dc072067bd01eb931ec https://git.kernel.org/stable/c/fe9a7082684eb059b925c535682e68c34d487d43 rh#2273657 |
CVE-2024-28757 | expat:Not affected | important | 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-28757 L3:67843 MISC:github.com:OSS:2024/Q1/231 OSS:2024/03/15/1 OSS:2024/Q1/231 SMASH Issue 396787 bnc#1221289 https://github.com/libexpat/libexpat/issues/839 https://github.com/libexpat/libexpat/pull/842 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPLC6WDSRDUYS7F7JWAOVOHFNOUQ43DD/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKJ7V5F6LJCEQJXDBWGT27J7NAP3E3N7/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VK2O34GH43NTHBZBN7G5Y6YKJKPUCTBE/ https://security.netapp.com/advisory/ntap-20240322-0001/ rh#2268766 |
CVE-2024-3094 | xz:Not affected | critical | 10 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) | CVE-2024-3094 MISC:bugs.gentoo.org:OSS:2024/Q1/324 MISC:bugzilla.mindrot.org:OSS:2024/Q2/127 MISC:git.rootprojects.org:OSS:2024/03/30/5 MISC:github.com:OSS:2024/Q1/268 OSS:2024/03/29/10 OSS:2024/03/29/12 OSS:2024/03/29/4 OSS:2024/03/29/5 OSS:2024/03/29/8 OSS:2024/03/30/12 OSS:2024/03/30/27 OSS:2024/03/30/36 OSS:2024/03/30/5 OSS:2024/04/16/5 OSS:2024/Q1/268 OSS:2024/Q1/276 OSS:2024/Q1/309 OSS:2024/Q1/324 OSS:2024/Q2/127 SMASH Issue 399441 SMASH Issue 399690 bdo#1068024 bnc#1222124 https://access.redhat.com/security/cve/CVE-2024-3094 https://ariadne.space/2024/04/02/the-xz-utils-backdoor-is-a-symptom-of-a-larger-problem/ https://arstechnica.com/security/2024/03/backdoor-found-in-widely-used-linux-utility-breaks-encrypted-ssh-connections/ https://aws.amazon.com/security/security-bulletins/AWS-2024-002/ https://blog.netbsd.org/tnf/entry/statement_on_backdoor_in_xz https://boehs.org/node/everything-i-know-about-the-xz-backdoor https://discourse.nixos.org/t/cve-2024-3094-malicious-code-in-xz-5-6-0-and-5-6-1-tarballs/42405 https://gist.github.com/thesamesam/223949d5a074ebc3dce9ee78baad9e27 https://github.com/advisories/GHSA-rxwq-x6h5-x525 https://github.com/amlweems/xzbot https://github.com/karcherm/xz-malware https://gynvael.coldwind.pl/?lang=en&id=782 https://lists.debian.org/debian-security-announce/2024/msg00057.html https://lists.freebsd.org/archives/freebsd-security/2024-March/000248.html https://lwn.net/Articles/967180/ https://news.ycombinator.com/item?id=39865810 https://news.ycombinator.com/item?id=39877267 https://news.ycombinator.com/item?id=39895344 https://openssf.org/blog/2024/03/30/xz-backdoor-cve-2024-3094/ https://research.swtch.com/xz-script https://research.swtch.com/xz-timeline https://security-tracker.debian.org/tracker/CVE-2024-3094 https://security.alpinelinux.org/vuln/CVE-2024-3094 https://security.archlinux.org/CVE-2024-3094 https://security.netapp.com/advisory/ntap-20240402-0001/ https://tukaani.org/xz-backdoor/ https://twitter.com/LetsDefendIO/status/1774804387417751958 https://twitter.com/debian/status/1774219194638409898 https://twitter.com/infosecb/status/1774595540233167206 https://twitter.com/infosecb/status/1774597228864139400 https://ubuntu.com/security/CVE-2024-3094 https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094 https://www.darkreading.com/vulnerabilities-threats/are-you-affected-by-the-backdoor-in-xz-utils https://www.kali.org/blog/about-the-xz-backdoor/ https://www.redhat.com/en/blog/urgent-security-alert-fedora-41-and-rawhide-users https://www.tenable.com/blog/frequently-asked-questions-cve-2024-3094-supply-chain-backdoor-in-xz-utils https://www.theregister.com/2024/03/29/malicious_backdoor_xz/ https://www.vicarius.io/vsociety/vulnerabilities/cve-2024-3094 https://xeiaso.net/notes/2024/xz-vuln/ rh#2272210 |
CVE-2024-31076 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-31076 SMASH Issue 411741 bnc#1226765 https://git.kernel.org/stable/c/59f86a2908380d09cdc726461c0fbb8d8579c99f https://git.kernel.org/stable/c/6752dfcfff3ac3e16625ebd3f0ad9630900e7e76 https://git.kernel.org/stable/c/9eeda3e0071a329af1eba15f4e57dc39576bb420 https://git.kernel.org/stable/c/a40209d355afe4ed6d533507838c9e5cd70a76d8 https://git.kernel.org/stable/c/a6c11c0a5235fb144a65e0cb2ffd360ddc1f6c32 https://git.kernel.org/stable/c/e9c96d01d520498b169ce734a8ad1142bef86a30 https://git.kernel.org/stable/c/ebfb16fc057a016abb46a9720a54abf0d4f6abe1 https://git.kernel.org/stable/c/f5f4675960609d8c5ee95f027fbf6ce380f98372 rh#2293684 |
CVE-2024-32936 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-32936 SMASH Issue 411976 bnc#1226921 https://git.kernel.org/stable/c/80a8b92950f8ee96582dba6187e3c2deca3569ea https://git.kernel.org/stable/c/ad79c9ecea5baa7b4f19677e4b1c881ed89b0c3b rh#2294218 |
CVE-2024-33599 | glibc:Analysis | important | 7.6 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H) | CVE-2024-33599 L3:68141 SMASH Issue 403187 bnc#1223423 bnc#1223530 https://security.netapp.com/advisory/ntap-20240524-0011/ https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0005 rh#2277202 |
CVE-2024-33619 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-33619 SMASH Issue 411742 bnc#1226768 https://git.kernel.org/stable/c/4b2543f7e1e6b91cfc8dd1696e3cdf01c3ac8974 https://git.kernel.org/stable/c/6ca67a5fe1c606d1fbe24c30a9fc0bdc43a18554 https://git.kernel.org/stable/c/9dce01f386c9ce6990c0a83fa14b1c95330b037e https://git.kernel.org/stable/c/b8938d6f570f010a1dcdbfed3e5b5d3258c2a908 rh#2293682 |
CVE-2024-33847 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N) | CVE-2024-33847 SMASH Issue 411978 bnc#1226922 https://git.kernel.org/stable/c/29ed2b5dd521ce7c5d8466cd70bf0cc9d07afeee https://git.kernel.org/stable/c/3ccf5210dc941a7aa0180596ac021568be4d35ec https://git.kernel.org/stable/c/5268241b41b1c5d0acca75e9b97d4fd719251c8c https://git.kernel.org/stable/c/8acae047215024d1ac499b3c8337ef1b952f160b https://git.kernel.org/stable/c/9f9341064a9b5246a32a7fe56b9f80c6f7f3c62d https://git.kernel.org/stable/c/b8962cf98595d1ec62f40f23667de830567ec8bc rh#2294217 |
CVE-2024-34027 | kernel-source-rt:Not affected | moderate | 6.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H) | CVE-2024-34027 SMASH Issue 411971 bnc#1226923 https://git.kernel.org/stable/c/0a4ed2d97cb6d044196cc3e726b6699222b41019 https://git.kernel.org/stable/c/329edb7c9e3b6ca27e6ca67ab1cdda1740fb3a2b https://git.kernel.org/stable/c/5d47d63883735718825ca2efc4fca6915469774f https://git.kernel.org/stable/c/69136304fd144144a4828c7b7b149d0f80321ba4 https://git.kernel.org/stable/c/a6e1f7744e9b84f86a629a76024bba8468aa153b https://git.kernel.org/stable/c/b5bac43875aa27ec032dbbb86173baae6dce6182 rh#2294216 |
CVE-2024-34030 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-34030 SMASH Issue 411977 bnc#1226924 https://git.kernel.org/stable/c/598e4a37a2f8da9144ba1fab04320c32169b6d0d https://git.kernel.org/stable/c/b5f31d1470c4fdfae368feeb389768ba8d24fb34 https://git.kernel.org/stable/c/e6f7d27df5d208b50cae817a91d128fb434bb12c rh#2294215 |
CVE-2024-34777 | kernel-source-rt:Not affected | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H) | CVE-2024-34777 SMASH Issue 411779 bnc#1226796 https://git.kernel.org/stable/c/1ff05e723f7ca30644b8ec3fb093f16312e408ad https://git.kernel.org/stable/c/34a816d8735f3924b74be8e5bf766ade1f3bd10b https://git.kernel.org/stable/c/35d31c8bd4722b107f5a2f5ddddce839de04b936 https://git.kernel.org/stable/c/63e7e05a48a35308aeddd7ecccb68363a5988e87 https://git.kernel.org/stable/c/c57874265a3c5206d7aece3793bb2fc9abcd7570 rh#2293642 |
CVE-2024-3508 | bzip2:Analysis | moderate | 6.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-3508 SMASH Issue 400853 bnc#1223418 https://access.redhat.com/security/cve/CVE-2024-3508 rh#2274109 |
CVE-2024-35784 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35784 SMASH Issue 406363 bnc#1224804 https://git.kernel.org/stable/c/89bca7fe6382d61e88c67a0b0e7bce315986fb8b https://git.kernel.org/stable/c/b0ad381fa7690244802aed119b478b4bdafc31dd https://git.kernel.org/stable/c/ded566b4637f1b6b4c9ba74e7d0b8493e93f19cf rh#2281067 |
CVE-2024-35785 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35785 SMASH Issue 406364 bnc#1224724 https://git.kernel.org/stable/c/4b12ff5edd141926d49c9ace4791adf3a4902fe7 https://git.kernel.org/stable/c/520f79c110ff712b391b3d87fcacf03c74bc56ee https://git.kernel.org/stable/c/95915ba4b987cf2b222b0f251280228a1ff977ac https://git.kernel.org/stable/c/bc40ded92af55760d12bec8222d4108de725dbe4 https://git.kernel.org/stable/c/bfa344afbe472a9be08f78551fa2190c1a07d7d3 https://git.kernel.org/stable/c/e5b5948c769aa1ebf962dddfb972f87d8f166f95 rh#2281065 |
CVE-2024-35786 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35786 SMASH Issue 406365 bnc#1224714 https://git.kernel.org/stable/c/b466416bdd6ecbde15ce987226ea633a0268fbb1 https://git.kernel.org/stable/c/c288a61a48ddb77ec097e11ab81b81027cd4e197 https://git.kernel.org/stable/c/daf8739c3322a762ce84f240f50e0c39181a41ab rh#2281063 |
CVE-2024-35787 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35787 SMASH Issue 406366 bnc#1224715 https://git.kernel.org/stable/c/55e55eb65fd5e09faf5a0e49ffcdd37905aaf4da https://git.kernel.org/stable/c/5a95815b17428ce2f56ec18da5e0d1b2a1a15240 https://git.kernel.org/stable/c/736ad6c577a367834118f57417038d45bb5e0a31 https://git.kernel.org/stable/c/ecbd8ebb51bf7e4939d83b9e6022a55cac44ef06 rh#2281061 |
CVE-2024-35788 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35788 SMASH Issue 406367 bnc#1224709 https://git.kernel.org/stable/c/2f10d4a51bbcd938f1f02f16c304ad1d54717b96 https://git.kernel.org/stable/c/c373f233dab44a13752daec13788e2ad3bf86410 https://git.kernel.org/stable/c/f6e163e9c3d50cd167ab9d411ed01b7718177387 rh#2281059 |
CVE-2024-35791 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35791 SMASH Issue 406370 bnc#1224725 https://git.kernel.org/stable/c/12f8e32a5a389a5d58afc67728c76e61beee1ad4 https://git.kernel.org/stable/c/2d13b79640b147bd77c34a5998533b2021a4122d https://git.kernel.org/stable/c/4868c0ecdb6cfde7c70cf478c46e06bb9c7e5865 https://git.kernel.org/stable/c/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 https://git.kernel.org/stable/c/e126b508ed2e616d679d85fca2fbe77bb48bbdd7 https://git.kernel.org/stable/c/f6d53d8a2617dd58c89171a6b9610c470ebda38a rh#2281052 |
CVE-2024-35792 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35792 SMASH Issue 406371 bnc#1224713 https://git.kernel.org/stable/c/48dd260fdb728eda4a246f635d1325e82f0d3555 https://git.kernel.org/stable/c/c0afb6b88fbbc177fa322a835f874be217bffe45 https://git.kernel.org/stable/c/eb2a41a8ae8c8c4f68aef3bd94665c0cf23e04be rh#2281050 |
CVE-2024-35793 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35793 SMASH Issue 406372 bnc#1224708 https://git.kernel.org/stable/c/3d08cca5fd0aabb62b7015067ab40913b33da906 https://git.kernel.org/stable/c/952c3fce297f12c7ff59380adb66b564e2bc9b64 https://git.kernel.org/stable/c/e88b5ae01901c4a655a53158397746334778a57b rh#2281047 |
CVE-2024-35795 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35795 SMASH Issue 406409 bnc#1224634 https://git.kernel.org/stable/c/197f6d6987c55860f6eea1c93e4f800c59078874 https://git.kernel.org/stable/c/4687e3c6ee877ee25e57b984eca00be53b9a8db5 https://git.kernel.org/stable/c/8678b1060ae2b75feb60b87e5b75e17374e3c1c5 https://git.kernel.org/stable/c/8b03556da6e576c62664b6cd01809e4a09d53b5b rh#2281155 |
CVE-2024-35796 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35796 SMASH Issue 406428 bnc#1224615 https://git.kernel.org/stable/c/3a38a829c8bc27d78552c28e582eb1d885d07d11 https://git.kernel.org/stable/c/46efbdbc95a30951c2579caf97b6df2ee2b3bef3 https://git.kernel.org/stable/c/476eed5f1c22034774902a980aa48dc4662cb39a https://git.kernel.org/stable/c/553d294db94b5f139378022df480a9fb6c3ae39e https://git.kernel.org/stable/c/6d9395ba7f85bdb7af0b93272e537484ecbeff48 https://git.kernel.org/stable/c/7e9edb569fd9f688d887e36db8170f6e22bafbc8 https://git.kernel.org/stable/c/92c0c29f667870f17c0b764544bdf22ce0e886a1 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2281153 |
CVE-2024-35797 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35797 SMASH Issue 406406 bnc#1224635 https://git.kernel.org/stable/c/24a0e73d544439bb9329fbbafac44299e548a677 https://git.kernel.org/stable/c/b79f9e1ff27c994a4c452235ba09e672ec698e23 https://git.kernel.org/stable/c/d5d39c707a4cf0bcc84680178677b97aa2cb2627 https://git.kernel.org/stable/c/d962f6c583458037dc7e529659b2b02b9dd3d94b rh#2281151 |
CVE-2024-35798 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35798 SMASH Issue 406469 bnc#1224503 https://git.kernel.org/stable/c/0427c8ef8bbb7f304de42ef51d69c960e165e052 https://git.kernel.org/stable/c/2885d54af2c2e1d910e20d5c8045bae40e02fbc1 https://git.kernel.org/stable/c/3a25878a3378adce5d846300c9570f15aa7f7a80 https://git.kernel.org/stable/c/ef1e68236b9153c27cb7cf29ead0c532870d4215 rh#2281241 |
CVE-2024-35799 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35799 SMASH Issue 406418 bnc#1224740 https://git.kernel.org/stable/c/2b17133a0a2e0e111803124dad09e803718d4a48 https://git.kernel.org/stable/c/4356a2c3f296503c8b420ae8adece053960a9f06 https://git.kernel.org/stable/c/59772327d439874095516673b4b30c48bd83ca38 https://git.kernel.org/stable/c/72d72e8fddbcd6c98e1b02d32cf6f2b04e10bd1c rh#2281239 |
CVE-2024-35800 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35800 SMASH Issue 406471 bnc#1224507 https://git.kernel.org/stable/c/090d2b4515ade379cd592fbc8931344945978210 https://git.kernel.org/stable/c/62b71cd73d41ddac6b1760402bbe8c4932e23531 https://git.kernel.org/stable/c/7784135f134c13af17d9ffb39a57db8500bc60ff https://git.kernel.org/stable/c/9114ba9987506bcfbb454f6e68558d68cb1abbde https://git.kernel.org/stable/c/b9d103aca85f082a343b222493f3cab1219aaaf4 rh#2281237 |
CVE-2024-35801 | kernel-source-rt:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35801 SMASH Issue 406467 bnc#1224732 https://git.kernel.org/stable/c/10e4b5166df9ff7a2d5316138ca668b42d004422 https://git.kernel.org/stable/c/1acbca933313aa866e39996904c9aca4d435c4cd https://git.kernel.org/stable/c/21c7c00dae55cb0e3810d5f9506b58f68475d41d https://git.kernel.org/stable/c/92b0f04e937665bde5768f3fcc622dcce44413d8 https://git.kernel.org/stable/c/b61e3b7055ac6edee4be071c52f48c26472d2624 rh#2281235 |
CVE-2024-35802 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35802 SMASH Issue 406457 bnc#1224737 https://git.kernel.org/stable/c/0982fd6bf0b822876f2e93ec782c4c28a3f85535 https://git.kernel.org/stable/c/1c811d403afd73f04bde82b83b24c754011bd0e8 https://git.kernel.org/stable/c/66fa3fcb474b2b892fe42d455a6f7ec5aaa98fb9 https://git.kernel.org/stable/c/954a4a87814465ad61cc97c1cd3de1525baaaf07 https://git.kernel.org/stable/c/fe272b61506bb1534922ef07aa165fd3c37a6a90 jsc#CAR-3644 rh#2281232 |
CVE-2024-35803 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2024-35803 SMASH Issue 406437 bnc#1224742 bnc#1225314 https://git.kernel.org/stable/c/2149f8a56e2ed345c7a4d022a79f6b8fc53ae926 https://git.kernel.org/stable/c/725351c036452b7db5771a7bed783564bc4b99cc https://git.kernel.org/stable/c/930775060ca348b8665f60eef14b204172d14f31 https://git.kernel.org/stable/c/cefcd4fe2e3aaf792c14c9e56dab89e3d7a65d02 https://git.kernel.org/stable/c/fba7ee7187581b5bc222003e73e2592b398bb06d rh#2281229 |
CVE-2024-35804 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35804 SMASH Issue 406405 bnc#1224638 https://git.kernel.org/stable/c/225d587a073584946c05c9b7651d637bd45c0c71 https://git.kernel.org/stable/c/726374dde5d608b15b9756bd52b6fc283fda7a06 https://git.kernel.org/stable/c/910c57dfa4d113aae6571c2a8b9ae8c430975902 https://git.kernel.org/stable/c/9d1b22e573a3789ed1f32033ee709106993ba551 https://git.kernel.org/stable/c/a9bd6bb6f02bf7132c1ab192ba62bbfa52df7d66 rh#2281227 |
CVE-2024-35807 | kernel-source-rt:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35807 SMASH Issue 406464 bnc#1224735 https://git.kernel.org/stable/c/239c669edb2bffa1aa2612519b1d438ab35d6be6 https://git.kernel.org/stable/c/37b6a3ba793bbbae057f5b991970ebcc52cb3db5 https://git.kernel.org/stable/c/722d2c01b8b108f8283d1b7222209d5b2a5aa7bd https://git.kernel.org/stable/c/75cc31c2e7193b69f5d25650bda5bb42ed92f8a1 https://git.kernel.org/stable/c/a6b3bfe176e8a5b05ec4447404e412c2a3fc92cc https://git.kernel.org/stable/c/b461910af8ba3bed80f48c2bf852686d05c6fc5c https://git.kernel.org/stable/c/e8e8b197317228b5089ed9e7802dadf3ccaa027a https://git.kernel.org/stable/c/ee4e9c1976147a850f6085a13fca95bcaa00d84c https://git.kernel.org/stable/c/fb1088d51bbaa0faec5a55d4f5818a9ab79e24df rh#2281221 |
CVE-2024-35809 | kernel-source-rt:Ignore | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35809 SMASH Issue 406442 bnc#1224738 https://git.kernel.org/stable/c/47d8aafcfe313511a98f165a54d0adceb34e54b1 https://git.kernel.org/stable/c/6347348c6aba52dda0b33296684cbb627bdc6970 https://git.kernel.org/stable/c/7cc94dd36e48879e76ae7a8daea4ff322b7d9674 https://git.kernel.org/stable/c/900b81caf00c89417172afe0e7e49ac4eb110f4b https://git.kernel.org/stable/c/9a87375bb586515c0af63d5dcdcd58ec4acf20a6 https://git.kernel.org/stable/c/9d5286d4e7f68beab450deddbb6a32edd5ecf4bf https://git.kernel.org/stable/c/bbe068b24409ef740657215605284fc7cdddd491 https://git.kernel.org/stable/c/d534198311c345e4b062c4b88bb609efb8bd91d5 https://git.kernel.org/stable/c/d86ad8c3e152349454b82f37007ff6ba45f26989 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html jsc#CAR-3647 rh#2281217 |
CVE-2024-35810 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35810 SMASH Issue 406414 bnc#1224626 https://git.kernel.org/stable/c/104a5b2772bc7c0715ae7355ccf9d294a472765c https://git.kernel.org/stable/c/86cb706a40b7e6b2221ee49a298a65ad9b46c02d https://git.kernel.org/stable/c/9a9e8a7159ca09af9b1a300a6c8e8b6ff7501c76 https://git.kernel.org/stable/c/ed381800ea6d9a4c7f199235a471c0c48100f0ae rh#2281215 |
CVE-2024-35811 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35811 SMASH Issue 406463 bnc#1224592 https://git.kernel.org/stable/c/0a7591e14a8da794d0b93b5d1c6254ccb23adacb https://git.kernel.org/stable/c/0b812f706fd7090be74812101114a0e165b36744 https://git.kernel.org/stable/c/0f7352557a35ab7888bc7831411ec8a3cbe20d78 https://git.kernel.org/stable/c/190794848e2b9d15de92d502b6ac652806904f5a https://git.kernel.org/stable/c/202c503935042272e2f9e1bb549d5f69a8681169 https://git.kernel.org/stable/c/6678a1e7d896c00030b31491690e8ddc9a90767a https://git.kernel.org/stable/c/8c36205123dc57349b59b4f1a2301eb278cbc731 https://git.kernel.org/stable/c/8e3f03f4ef7c36091f46e7349096efb5a2cdb3a1 https://git.kernel.org/stable/c/bacb8c3ab86dcd760c15903fcee58169bc3026aa https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2248430 rh#2281213 |
CVE-2024-35813 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35813 SMASH Issue 406427 bnc#1224618 https://git.kernel.org/stable/c/064db53f9023a2d5877a2d12de6bc27995f6ca56 https://git.kernel.org/stable/c/2b539c88940e22494da80a93ee1c5a28bbad10f6 https://git.kernel.org/stable/c/4466677dcabe2d70de6aa3d4bd4a4fafa94a71f2 https://git.kernel.org/stable/c/7d0e8a6147550aa058fa6ade8583ad252aa61304 https://git.kernel.org/stable/c/81b8645feca08a54c7c4bf36e7b176f4983b2f28 https://git.kernel.org/stable/c/ad9cc5e9e53ab94aa0c7ac65d43be7eb208dcb55 https://git.kernel.org/stable/c/b9a7339ae403035ffe7fc37cb034b36947910f68 https://git.kernel.org/stable/c/cf55a7acd1ed38afe43bba1c8a0935b51d1dc014 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2281209 |
CVE-2024-35814 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35814 SMASH Issue 406448 bnc#1224602 https://git.kernel.org/stable/c/04867a7a33324c9c562ee7949dbcaab7aaad1fb4 https://git.kernel.org/stable/c/3e7acd6e25ba77dde48c3b721c54c89cd6a10534 https://git.kernel.org/stable/c/777391743771040e12cc40d3d0d178f70c616491 https://git.kernel.org/stable/c/c88668aa6c1da240ea3eb4d128b7906e740d3cb8 rh#2281207 |
CVE-2024-35815 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35815 SMASH Issue 406393 bnc#1224685 https://git.kernel.org/stable/c/10ca82aff58434e122c7c757cf0497c335f993f3 https://git.kernel.org/stable/c/18d5fc3c16cc317bd0e5f5dabe0660df415cadb7 https://git.kernel.org/stable/c/396dbbc18963648e9d1a4edbb55cfe08fa374d50 https://git.kernel.org/stable/c/5c43d0041e3a05c6c41c318b759fff16d2384596 https://git.kernel.org/stable/c/94eb0293703ced580f05dfbe5a57da5931e9aee2 https://git.kernel.org/stable/c/961ebd120565cb60cebe21cb634fbc456022db4a https://git.kernel.org/stable/c/a71cba07783abc76b547568b6452cd1dd9981410 https://git.kernel.org/stable/c/c01ed748847fe8b810d86efc229b9e6c7fafa01e rh#2281206 |
CVE-2024-35816 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35816 SMASH Issue 406431 bnc#1224616 https://git.kernel.org/stable/c/318f6d53dd425c400e35f1a9b7af682c2c6a66d6 https://git.kernel.org/stable/c/43c70cbc2502cf2557105c662eeed6a15d082b88 https://git.kernel.org/stable/c/575801663c7dc38f826212b39e3b91a4a8661c33 rh#2281204 |
CVE-2024-35818 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35818 SMASH Issue 406426 bnc#1224744 https://git.kernel.org/stable/c/0b61a7dc6712b78799b3949997e8a5e94db5c4b0 https://git.kernel.org/stable/c/97cd43ba824aec764f5ea2790d0c0a318f885167 https://git.kernel.org/stable/c/9adec248bba33b1503252caf8e59d81febfc5ceb https://git.kernel.org/stable/c/9c68ece8b2a5c5ff9b2fcaea923dd73efeb174cd https://git.kernel.org/stable/c/d7d7c6cdea875be3b241d7d39873bb431db7154d rh#2281200 |
CVE-2024-35820 | kernel-source-rt:Ignore | low | 0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N) | CVE-2024-35820 SMASH Issue 406387 bnc#1224691 https://git.kernel.org/stable/c/0ecb8919469e6d5c74eea24086b34ce1bda5aef7 https://git.kernel.org/stable/c/1a8ec63b2b6c91caec87d4e132b1f71b5df342be https://git.kernel.org/stable/c/51a490a7f63cae0754120e7c04f4f47920bd48db rh#2281196 |
CVE-2024-35822 | kernel-source-rt:Ignore | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2024-35822 SMASH Issue 406441 bnc#1224739 https://git.kernel.org/stable/c/2a587a035214fa1b5ef598aea0b81848c5b72e5e https://git.kernel.org/stable/c/2b002c308e184feeaeb72987bca3f1b11e5f70b8 https://git.kernel.org/stable/c/30511676eb54d480d014352bf784f02577a10252 https://git.kernel.org/stable/c/36177c2595df12225b95ce74eb1ac77b43d5a58c https://git.kernel.org/stable/c/3e944ddc17c042945d983e006df7860687a8849a https://git.kernel.org/stable/c/68d951880d0c52c7f13dcefb5501b69b8605ce8c https://git.kernel.org/stable/c/99731076722eb7ed26b0c87c879da7bb71d24290 https://git.kernel.org/stable/c/df5cbb908f1687e8ab97e222a16b7890d5501acf https://git.kernel.org/stable/c/f74c5e0b54b02706d9a862ac6cddade30ac86bcf https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html jsc#CAR-3648 rh#2281192 |
CVE-2024-35824 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35824 SMASH Issue 406438 bnc#1224609 https://git.kernel.org/stable/c/4154e767354140db7804207117e7238fb337b0e7 https://git.kernel.org/stable/c/997ca415384612c8df76d99d9a768e0b3f42b325 https://git.kernel.org/stable/c/ac3e0384073b2408d6cb0d972fee9fcc3776053d https://git.kernel.org/stable/c/f6df761182fc953907b18aba5049fc2a044ecb45 rh#2281189 |
CVE-2024-35825 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35825 SMASH Issue 406397 bnc#1224681 https://git.kernel.org/stable/c/6b2c73111a252263807b7598682663dc33aa4b4c https://git.kernel.org/stable/c/7664ee8bd80309b90d53488b619764f0a057f2b7 https://git.kernel.org/stable/c/92b051b87658df7649ffcdef522593f21a2b296b https://git.kernel.org/stable/c/a0f77b5d6067285b8eca0ee3bd1e448a6258026f https://git.kernel.org/stable/c/a766761d206e7c36d7526e0ae749949d17ca582c https://git.kernel.org/stable/c/e2dbfea520e60d58e0c498ba41bde10452257779 https://git.kernel.org/stable/c/ef846cdbd100f7f9dc045e8bcd7fe4b3a3713c03 https://git.kernel.org/stable/c/f90ce1e04cbcc76639d6cba0fdbd820cd80b3c70 rh#2281187 |
CVE-2024-35826 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35826 SMASH Issue 406440 bnc#1224610 https://git.kernel.org/stable/c/242006996d15f5ca62e22f8c7de077d9c4a8f367 https://git.kernel.org/stable/c/38b43539d64b2fa020b3b9a752a986769f87f7a6 https://git.kernel.org/stable/c/7d3765550374f71248c55e6206ea1d6fd4537e65 https://git.kernel.org/stable/c/c9d3d2fbde9b8197bce88abcbe8ee8e713ffe7c2 https://git.kernel.org/stable/c/ecbd9ced84dd655a8f4cd49d2aad0e80dbf6bf35 rh#2281185 |
CVE-2024-35827 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35827 SMASH Issue 406447 bnc#1224606 https://git.kernel.org/stable/c/0c8c74bb59e7d77554016efc34c2d10376985e5e https://git.kernel.org/stable/c/59a534690ecc3af72c6ab121aeac1237a4adae66 https://git.kernel.org/stable/c/868ec868616438df487b9e2baa5a99f8662cc47c https://git.kernel.org/stable/c/8ede3db5061bb1fe28e2c9683329aafa89d2b1b4 https://git.kernel.org/stable/c/b6563ad0d599110bd5cf8f56c47d279c3ed796fe rh#2281183 |
CVE-2024-35829 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35829 SMASH Issue 406378 bnc#1224707 https://git.kernel.org/stable/c/04ae3eb470e52a3c41babe85ff8cee195e4dcbea https://git.kernel.org/stable/c/4ab14eccf5578af1dd5668a5f2d771df27683cab https://git.kernel.org/stable/c/746606d37d662c70ae1379fc658ee9c65f06880f https://git.kernel.org/stable/c/8e25c0ee5665e8a768b8e21445db1f86e9156eb7 https://git.kernel.org/stable/c/ec6bb037e4a35fcbb5cd7bc78242d034ed893fcd https://git.kernel.org/stable/c/f2e80ac9344aebbff576453d5c0290b332e187ed https://git.kernel.org/stable/c/f6d51a91b41704704e395de6839c667b0f810bbf https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2281178 |
CVE-2024-35831 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35831 SMASH Issue 406380 bnc#1224698 https://git.kernel.org/stable/c/0b6f39c175ba5f0ef72bdb3b9d2a06ad78621d62 https://git.kernel.org/stable/c/4d376d7ad62b6a8e8dfff56b559d9d275e5b9b3a https://git.kernel.org/stable/c/67d1189d1095d471ed7fa426c7e384a7140a5dd7 https://git.kernel.org/stable/c/712e2c8415f55a4a4ddaa98a430b87f624109f69 rh#2281173 |
CVE-2024-35832 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35832 SMASH Issue 406408 bnc#1224748 https://git.kernel.org/stable/c/369acf97d6fd5da620d053d0f1878ffe32eff555 https://git.kernel.org/stable/c/56590678791119b9a655202e49898edfb9307271 rh#2281171 |
CVE-2024-35834 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35834 SMASH Issue 406424 bnc#1224620 https://git.kernel.org/stable/c/269009893146c495f41e9572dd9319e787c2eba9 https://git.kernel.org/stable/c/7b4d93d31aade99210d41cd9d4cbd2957c98bc8c https://git.kernel.org/stable/c/cce713664548284daf977739e7ff1cd59e84189c rh#2281167 |
CVE-2024-35836 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35836 SMASH Issue 406407 bnc#1224633 https://git.kernel.org/stable/c/5050a5b9d8b4d3c6f7e376e07670e437db7ccf9c https://git.kernel.org/stable/c/830ead5fb0c5855ce4d70ba2ed4a673b5f1e7d9b rh#2281163 |
CVE-2024-35838 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35838 SMASH Issue 406432 bnc#1224613 https://git.kernel.org/stable/c/49aaeb8c539b1633b3bd7c2df131ec578aa1eae1 https://git.kernel.org/stable/c/587c5892976108674bbe61a8ff659de279318034 https://git.kernel.org/stable/c/b01a74b3ca6fd51b62c67733ba7c3280fa6c5d26 https://git.kernel.org/stable/c/e04bf59bdba0fa45d52160be676114e16be855a9 rh#2281157 |
CVE-2024-35840 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35840 SMASH Issue 406455 bnc#1224597 https://git.kernel.org/stable/c/413b913507326972135d2977975dbff8b7f2c453 https://git.kernel.org/stable/c/51e4cb032d49ce094605f27e45eabebc0408893c https://git.kernel.org/stable/c/76e8de7273a22a00d27e9b8b7d4d043d6433416a https://git.kernel.org/stable/c/ad3e8f5c3d5c53841046ef7a947c04ad45a20721 https://git.kernel.org/stable/c/be1d9d9d38da922bd4beeec5b6dd821ff5a1dfeb rh#2281282 |
CVE-2024-35841 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35841 SMASH Issue 406399 bnc#1224687 https://git.kernel.org/stable/c/02e368eb1444a4af649b73cbe2edd51780511d86 https://git.kernel.org/stable/c/294e7ea85f34748f04e5f3f9dba6f6b911d31aa8 https://git.kernel.org/stable/c/dc9dfc8dc629e42f2234e3327b75324ffc752bc9 rh#2281280 |
CVE-2024-35842 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35842 SMASH Issue 406396 bnc#1224688 https://git.kernel.org/stable/c/b1d3db6740d0997ffc6e5a0d96ef7cbd62b35fdd https://git.kernel.org/stable/c/cad471227a37c0c7c080bfc9ed01b53750e82afe https://git.kernel.org/stable/c/cde6ca5872bf67744dffa875a7cb521ab007b7ef https://git.kernel.org/stable/c/e3b3ec967a7d93b9010a5af9a2394c8b5c8f31ed rh#2281278 |
CVE-2024-35843 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2024-35843 SMASH Issue 406382 bnc#1224751 https://git.kernel.org/stable/c/3d39238991e745c5df85785604f037f35d9d1b15 https://git.kernel.org/stable/c/def054b01a867822254e1dda13d587f5c7a99e2a rh#2281276 |
CVE-2024-35844 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35844 OSS:2024/05/30/1 OSS:2024/05/30/2 OSS:2024/Q2/263 SMASH Issue 406456 bnc#1224594 https://git.kernel.org/stable/c/2f6d721e14b69d6e1251f69fa238b48e8374e25f https://git.kernel.org/stable/c/569c198c9e2093fd29cc071856a4e548fda506bc https://git.kernel.org/stable/c/889846dfc8ee2cf31148a44bfd2faeb2faadc685 https://git.kernel.org/stable/c/f0bf89e84c3afb79d7a3a9e4bc853ad6a3245c0a https://git.kernel.org/stable/c/fa3ac8b1a227d9b470b87972494293348b5839ee https://git.kernel.org/stable/c/fc0aed88afbf6f606205129a7466eebdf528e3f3 rh#2281274 |
CVE-2024-35845 | kernel-source-rt:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35845 SMASH Issue 406468 bnc#1224731 https://git.kernel.org/stable/c/71d4186d470e9cda7cd1a0921b4afda737c6f641 https://git.kernel.org/stable/c/783d413f332a3ebec916664b366c28f58147f82c https://git.kernel.org/stable/c/96aa40761673da045a7774f874487cdb50c6a2f7 https://git.kernel.org/stable/c/c855a1a5b7e3de57e6b1b29563113d5e3bfdb89a https://git.kernel.org/stable/c/ea1d166fae14e05d49ffb0ea9fcd4658f8d3dcea https://git.kernel.org/stable/c/fabe2db7de32a881e437ee69db32e0de785a6209 https://git.kernel.org/stable/c/fec14d1cdd92f340b9ba2bd220abf96f9609f2a9 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2281272 |
CVE-2024-35846 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35846 SMASH Issue 406451 bnc#1224595 https://git.kernel.org/stable/c/682886ec69d22363819a83ddddd5d66cb5c791e1 https://git.kernel.org/stable/c/b0fdabc908a7f81d12382c87ca9e46a9c2e14042 rh#2281270 |
CVE-2024-35850 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35850 SMASH Issue 406453 bnc#1224600 https://git.kernel.org/stable/c/67459f1a707aae6d590454de07956c2752e21ea4 https://git.kernel.org/stable/c/7ddb9de6af0f1c71147785b12fd7c8ec3f06cc86 https://git.kernel.org/stable/c/bec4d4c6fa5c6526409f582e4f31144e20c86c21 rh#2281261 |
CVE-2024-35851 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35851 SMASH Issue 406475 bnc#1224509 https://git.kernel.org/stable/c/52f9041deaca3fc5c40ef3b9cb943993ec7d2489 https://git.kernel.org/stable/c/6b47cdeb786c38e4174319218db3fa6d7b4bba88 https://git.kernel.org/stable/c/73e87c0a49fda31d7b589edccf4c72e924411371 https://git.kernel.org/stable/c/b64092d2f108f0cd1d7fd7e176f5fb2a67a2f189 https://git.kernel.org/stable/c/e60502b907be350c518819297b565007a94c706d rh#2281259 |
CVE-2024-35856 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35856 SMASH Issue 406384 bnc#1224695 https://git.kernel.org/stable/c/18bdb386a1a30e7a3d7732a98e45e69cf6b5710d https://git.kernel.org/stable/c/80dfef128cb9f1b1ef67c0fe8c8deb4ea7ad30c1 https://git.kernel.org/stable/c/e20093c741d8da9f6390dd45d75b779861547035 rh#2281249 |
CVE-2024-35857 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35857 SMASH Issue 406411 bnc#1224619 https://git.kernel.org/stable/c/23b7ee4a8d559bf38eac7ce5bb2f6ebf76f9c401 https://git.kernel.org/stable/c/3e2979bf080c40da4f7c93aff8575ab8bc62b767 https://git.kernel.org/stable/c/599c9ad5e1d43f5c12d869f5fd406ba5d8c55270 https://git.kernel.org/stable/c/c58e88d49097bd12dfcfef4f075b43f5d5830941 https://git.kernel.org/stable/c/d68dc711d84fdcf698e5d45308c3ddeede586350 rh#2281247 |
CVE-2024-35858 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35858 SMASH Issue 406412 bnc#1224625 https://git.kernel.org/stable/c/09040baf8779ad880e0e0d0ea10e57aa929ef3ab https://git.kernel.org/stable/c/2389ad1990163d29cba5480d693b4c2e31cc545c https://git.kernel.org/stable/c/9f898fc2c31fbf0ac5ecd289f528a716464cb005 rh#2281245 |
CVE-2024-35859 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35859 SMASH Issue 406459 bnc#1224593 https://git.kernel.org/stable/c/0e9327c67410b129bf85e5c3a5aaea518328636f https://git.kernel.org/stable/c/9617cd6f24b294552a817f80f5225431ef67b540 rh#2281243 |
CVE-2024-35860 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35860 SMASH Issue 406549 bnc#1224531 https://git.kernel.org/stable/c/1a80dbcb2dbaf6e4c216e62e30fa7d3daa8001ce https://git.kernel.org/stable/c/5d8d447777564b35f67000e7838e7ccb64d525c8 https://git.kernel.org/stable/c/876941f533e7b47fc69977fc4551c02f2d18af97 rh#2281790 |
CVE-2024-35861 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2024-35861 SMASH Issue 406550 bnc#1224766 bnc#1225312 https://git.kernel.org/stable/c/2cfff21732132e363b4cc275d63ea98f1af726c1 https://git.kernel.org/stable/c/7e8360ac8774e19b0b25f44fff84a105bb2417e4 https://git.kernel.org/stable/c/e0e50401cc3921c9eaf1b0e667db174519ea939f https://git.kernel.org/stable/c/f9a96a7ad1e8d25dc6662bc7552e0752de74a20d rh#2281786 |
CVE-2024-35867 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2024-35867 OSS:2024/05/29/2 OSS:2024/05/30/1 OSS:2024/05/30/2 OSS:2024/Q2/262 OSS:2024/Q2/263 SMASH Issue 406556 bnc#1224664 bnc#1225012 https://git.kernel.org/stable/c/0865ffefea197b437ba78b5dd8d8e256253efd65 https://git.kernel.org/stable/c/16b7d785775eb03929766819415055e367398f49 https://git.kernel.org/stable/c/1e12f0d5c66f07c934041621351973a116fa13c7 https://git.kernel.org/stable/c/c3cf8b74c57924c0985e49a1fdf02d3395111f39 rh#2281754 |
CVE-2024-35868 | kernel-source-rt:Analysis | moderate | () | CVE-2024-35868 SMASH Issue 406557 bnc#1224678 https://git.kernel.org/stable/c/5b5475ce69f02ecc1b13ea23106e5b89c690429b https://git.kernel.org/stable/c/8fefd166fcb368c5fcf48238e3f7c8af829e0a72 https://git.kernel.org/stable/c/cf03020c56d3ed28c4942280957a007b5e9544f7 https://git.kernel.org/stable/c/d3da25c5ac84430f89875ca7485a3828150a7e0a rh#2281745 |
CVE-2024-35869 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2024-35869 SMASH Issue 406558 bnc#1224679 bnc#1226328 https://git.kernel.org/stable/c/062a7f0ff46eb57aff526897bd2bebfdb1d3046a https://git.kernel.org/stable/c/645f332c6b63499cc76197f9b6bffcc659ba64cc https://git.kernel.org/stable/c/e1db9ae87b7148c021daee1fcc4bc71b2ac58a79 rh#2281742 |
CVE-2024-35870 | kernel-source-rt:Analysis | moderate | () | CVE-2024-35870 SMASH Issue 406559 bnc#1224672 https://git.kernel.org/stable/c/24a9799aa8efecd0eb55a75e35f9d8e6400063aa https://git.kernel.org/stable/c/45f2beda1f1bc3d962ec07db1ccc3197c25499a5 https://git.kernel.org/stable/c/6202996a1c1887e83d0b3b0fcd86d0e5e6910ea0 rh#2281740 |
CVE-2024-35872 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35872 SMASH Issue 406561 bnc#1224530 https://git.kernel.org/stable/c/201e4aaf405dfd1308da54448654053004c579b5 https://git.kernel.org/stable/c/43fad1d0284de30159661d0badfc3cbaf7e6f8f8 https://git.kernel.org/stable/c/65291dcfcf8936e1b23cfd7718fdfde7cfaf7706 https://git.kernel.org/stable/c/6564b014af92b677c1f07c44d7f5b595d589cf6e https://git.kernel.org/stable/c/9c2b4b657739ecda38e3b383354a29566955ac48 rh#2281736 |
CVE-2024-35873 | kernel-source-rt:Not affected | moderate | () | CVE-2024-35873 SMASH Issue 406562 bnc#1224529 https://git.kernel.org/stable/c/5b16d904e910183181b9d90efa957c787a8ac91b https://git.kernel.org/stable/c/c27fa53b858b4ee6552a719aa599c250cf98a586 rh#2281734 |
CVE-2024-35874 | kernel-source-rt:Not affected | moderate | () | CVE-2024-35874 SMASH Issue 406563 bnc#1224527 https://git.kernel.org/stable/c/9678bcc6234d83759fe091c197f5017a32b468da https://git.kernel.org/stable/c/caeb4b0a11b3393e43f7fa8e0a5a18462acc66bd rh#2281731 |
CVE-2024-35875 | kernel-source-rt:Not affected | moderate | 5.6 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N) | CVE-2024-35875 SMASH Issue 406564 bnc#1224665 https://git.kernel.org/stable/c/08044b08b37528b82f70a87576c692b4e4b7716e https://git.kernel.org/stable/c/22943e4fe4b3a2dcbadc3d38d5bf840bbdbfe374 https://git.kernel.org/stable/c/453b5f2dec276c1bb4ea078bf8c0da57ee4627e5 https://git.kernel.org/stable/c/99485c4c026f024e7cb82da84c7951dbe3deb584 rh#2281727 |
CVE-2024-35876 | kernel-source-rt:Ignore | low | 0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N) | CVE-2024-35876 SMASH Issue 406565 bnc#1224669 https://git.kernel.org/stable/c/20a915154ccb88da08986ab6c9fc4c1cf6259de2 https://git.kernel.org/stable/c/32223b0b60d53f49567fc501f91ca076ae96be6b https://git.kernel.org/stable/c/3ddf944b32f88741c303f0b21459dbb3872b8bc5 https://git.kernel.org/stable/c/5a02df3e92470efd589712925b5c722e730276a0 https://git.kernel.org/stable/c/976b1b2680fb4c01aaf05a0623288d87619a6c93 https://git.kernel.org/stable/c/f5e65b782f3e07324b9a8fa3cdaee422f057c758 https://git.kernel.org/stable/c/f860595512ff5c05a29fa4d64169c3fd1186b8cf rh#2281725 |
CVE-2024-35878 | kernel-source-rt:Ignore | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35878 SMASH Issue 406567 bnc#1224671 https://git.kernel.org/stable/c/544561dc56f7e69a053c25e11e6170f48bb97898 https://git.kernel.org/stable/c/a1aa5390cc912934fee76ce80af5f940452fa987 https://git.kernel.org/stable/c/e4a449368a2ce6d57a775d0ead27fc07f5a86e5b jsc#CAR-3646 rh#2281718 |
CVE-2024-35879 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35879 SMASH Issue 406568 bnc#1224524 https://git.kernel.org/stable/c/3127b2ee50c424a96eb3559fbb7b43cf0b111c7a https://git.kernel.org/stable/c/3ee2424107546d882e1ddd75333ca9c32879908c https://git.kernel.org/stable/c/7b6df050c45a1ea158fd50bc32a8e1447dd1e951 https://git.kernel.org/stable/c/801c8b8ec5bfb3519566dff16a5ecd48302fca82 https://git.kernel.org/stable/c/8917e7385346bd6584890ed362985c219fe6ae84 https://git.kernel.org/stable/c/ae6d76e4f06c37a623e357e79d49b17411db6f5c https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2281716 |
CVE-2024-35880 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35880 SMASH Issue 406569 bnc#1224523 https://git.kernel.org/stable/c/561e4f9451d65fc2f7eef564e0064373e3019793 https://git.kernel.org/stable/c/5fd8e2359498043e0b5329a05f02d10a9eb91eb9 https://git.kernel.org/stable/c/65938e81df2197203bda4b9a0c477e7987218d66 rh#2281713 |
CVE-2024-35881 | kernel-source-rt:Ignore | low | 0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N) | CVE-2024-35881 SMASH Issue 406570 bnc#1224779 https://git.kernel.org/stable/c/0dab75b433ed2480d57ae4f8f725186a46223e42 https://git.kernel.org/stable/c/3a6a32b31a111f6e66526fb2d3cb13a876465076 https://git.kernel.org/stable/c/f341055b10bd8be55c3c995dff5f770b236b8ca9 rh#2281649 rh#2281710 |
CVE-2024-35882 | kernel-source-rt:Not affected | moderate | () | CVE-2024-35882 SMASH Issue 406571 bnc#1224522 https://git.kernel.org/stable/c/05258a0a69b3c5d2c003f818702c0a52b6fea861 https://git.kernel.org/stable/c/1ba1291172f935e6b6fe703161a948f3347400b8 https://git.kernel.org/stable/c/a2ebedf7bcd17a1194a0a18122c885eb578ee882 rh#2281708 |
CVE-2024-35883 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35883 SMASH Issue 406572 bnc#1224521 https://git.kernel.org/stable/c/1f886a7bfb3faf4c1021e73f045538008ce7634e https://git.kernel.org/stable/c/4b31a226097cf8cc3c9de5e855d97757fdb2bf06 https://git.kernel.org/stable/c/95e5d9eb26705a9a76d2ef8bcba9ee2e195d653d rh#2281706 |
CVE-2024-35884 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35884 SMASH Issue 406573 bnc#1224520 https://git.kernel.org/stable/c/3001e7aa43d6691db2a878b0745b854bf12ddd19 https://git.kernel.org/stable/c/3391b157780bbedf8ef9f202cbf10ee90bf6b0f8 https://git.kernel.org/stable/c/35fe0e0b5c00bef7dde74842a2564c43856fbce4 https://git.kernel.org/stable/c/3d010c8031e39f5fa1e8b13ada77e0321091011f https://git.kernel.org/stable/c/d12245080cb259d82b34699f6cd4ec11bdb688bd https://git.kernel.org/stable/c/d49ae15a5767d4e9ef8bbb79e42df1bfebc94670 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2281704 |
CVE-2024-35885 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35885 SMASH Issue 406574 bnc#1224519 https://git.kernel.org/stable/c/09ba28e1cd3cf715daab1fca6e1623e22fd754a6 https://git.kernel.org/stable/c/36a1cb0371aa6f0698910ee70cb4ed3c349f4fa4 https://git.kernel.org/stable/c/63a10b530e22cc923008b5925821c26872f37971 https://git.kernel.org/stable/c/80247e0eca14ff177d565f58ecd3010f6b7910a4 https://git.kernel.org/stable/c/9783b3b0e71d704949214a8f76468f591a31f3f5 rh#2281700 |
CVE-2024-35889 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35889 SMASH Issue 406578 bnc#1224517 https://git.kernel.org/stable/c/b4d28f7fa4dd531cf503a4fe1ca7008960cc5832 https://git.kernel.org/stable/c/dd19e827d63ac60debf117676d1126bff884bdb8 rh#2281691 |
CVE-2024-35890 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35890 SMASH Issue 406579 bnc#1224516 https://git.kernel.org/stable/c/2eeab8c47c3c0276e0746bc382f405c9a236a5ad https://git.kernel.org/stable/c/5b3b67f731296027cceb3efad881ae281213f86f https://git.kernel.org/stable/c/d225b0ac96dc40d7e8ae2bc227eb2c56e130975f https://git.kernel.org/stable/c/ed4cccef64c1d0d5b91e69f7a8a6697c3a865486 https://git.kernel.org/stable/c/fc126c1d51e9552eacd2d717b9ffe9262a8a4cd6 rh#2281689 |
CVE-2024-35891 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35891 SMASH Issue 406580 bnc#1224513 https://git.kernel.org/stable/c/10608161696c2768f53426642f78a42bcaaa53e8 https://git.kernel.org/stable/c/49767b0df276f12e3e7184601e09ee7430e252dc https://git.kernel.org/stable/c/95c1016a2d92c4c28a9d1b6d09859c00b19c0ea4 https://git.kernel.org/stable/c/96c155943a703f0655c0c4cab540f67055960e91 rh#2281687 |
CVE-2024-35892 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35892 SMASH Issue 406581 bnc#1224515 https://git.kernel.org/stable/c/07696415526bee0607e495017369c7303a4792e1 https://git.kernel.org/stable/c/7eb322360b0266481e560d1807ee79e0cef5742b https://git.kernel.org/stable/c/b7d1ce2cc7192e8a037faa3f5d3ba72c25976460 https://git.kernel.org/stable/c/c040b99461a5bfc14c2d0cbb1780fcc3a4706c7e rh#2281684 |
CVE-2024-35894 | kernel-source-rt:Not affected | moderate | () | CVE-2024-35894 SMASH Issue 406583 bnc#1224514 https://git.kernel.org/stable/c/3ffb1ab698376f09cc33101c07c1be229389fe29 https://git.kernel.org/stable/c/fcf4692fa39e86a590c14a4af2de704e1d20a3b5 rh#2281679 |
CVE-2024-35895 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35895 SMASH Issue 406584 bnc#1224511 https://git.kernel.org/stable/c/668b3074aa14829e2ac2759799537a93b60fef86 https://git.kernel.org/stable/c/6af057ccdd8e7619960aca1f0428339f213b31cd https://git.kernel.org/stable/c/a44770fed86515eedb5a7c00b787f847ebb134a5 https://git.kernel.org/stable/c/d1e73fb19a4c872d7a399ad3c66e8ca30e0875ec https://git.kernel.org/stable/c/dd54b48db0c822ae7b520bc80751f0a0a173ef75 https://git.kernel.org/stable/c/f7990498b05ac41f7d6a190dc0418ef1d21bf058 https://git.kernel.org/stable/c/ff91059932401894e6c86341915615c5eb0eca48 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2281677 |
CVE-2024-35896 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35896 SMASH Issue 406585 bnc#1224662 https://git.kernel.org/stable/c/0c83842df40f86e529db6842231154772c20edcc https://git.kernel.org/stable/c/0f038242b77ddfc505bf4163d4904c1abd2e74d6 https://git.kernel.org/stable/c/18aae2cb87e5faa9c5bd865260ceadac60d5a6c5 https://git.kernel.org/stable/c/440e948cf0eff32cfe322dcbca3f2525354b159b https://git.kernel.org/stable/c/58f2bfb789e6bd3bc24a2c9c1580f3c67aec3018 https://git.kernel.org/stable/c/81d51b9b7c95e791ba3c1a2dd77920a9d3b3f525 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2281675 |
CVE-2024-35897 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35897 SMASH Issue 406586 bnc#1224510 https://git.kernel.org/stable/c/1bc83a019bbe268be3526406245ec28c2458a518 https://git.kernel.org/stable/c/2aeb805a1bcd5f27c8c0d1a9d4d653f16d1506f4 https://git.kernel.org/stable/c/6cbbe1ba76ee7e674a86abd43009b083a45838cb https://git.kernel.org/stable/c/7f609f630951b624348373cef99991ce08831927 https://git.kernel.org/stable/c/9627fd0c6ea1c446741a33e67bc5709c59923827 https://git.kernel.org/stable/c/9a3b90904d8a072287480eed4c3ece4b99d64f78 https://git.kernel.org/stable/c/b58d0ac35f6d75ec1db8650a29dfd6f292c11362 https://git.kernel.org/stable/c/e75faf01e22ec7dc671640fa0e0968964fafd2fc https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2281672 |
CVE-2024-35900 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35900 SMASH Issue 406589 bnc#1224497 https://git.kernel.org/stable/c/41bad13c0e8a5a2b47a7472cced922555372daab https://git.kernel.org/stable/c/420132bee3d0136b7fba253a597b098fe15493a7 https://git.kernel.org/stable/c/6d12f21f8bbe23fde25b77c2bf5973c136b8bef8 https://git.kernel.org/stable/c/745cf6a843896cdac8766c74379300ed73c78830 https://git.kernel.org/stable/c/7b6fba6918714afee3e17796113ccab636255c7b https://git.kernel.org/stable/c/8ba81dca416adf82fc5a2a23abc1a8cc02ad32fb https://git.kernel.org/stable/c/994209ddf4f430946f6247616b2e33d179243769 https://git.kernel.org/stable/c/e95bb4cba94c018be24b11f017d1c55dd6cda31a https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2281664 |
CVE-2024-35901 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35901 SMASH Issue 406590 bnc#1224495 https://git.kernel.org/stable/c/05cb7c41fa1a7a7b2c2a6b81bbe7c67f5c11932b https://git.kernel.org/stable/c/c0de6ab920aafb56feab56058e46b688e694a246 https://git.kernel.org/stable/c/ca58927b00385005f488b6a9905ced7a4f719aad rh#2281662 |
CVE-2024-35902 | kernel-source-rt:Not affected | moderate | () | CVE-2024-35902 SMASH Issue 406591 bnc#1224496 https://git.kernel.org/stable/c/62fc3357e079a07a22465b9b6ef71bb6ea75ee4b https://git.kernel.org/stable/c/6794090c742008c53b344b35b021d4a3093dc50a https://git.kernel.org/stable/c/92309bed3c5fbe2ccd4c45056efd42edbd06162d https://git.kernel.org/stable/c/bcd46782e2ec3825d10c1552fcb674d491cc09f9 https://git.kernel.org/stable/c/cbaac2e5488ed54833897264a5ffb2a341a9f196 https://git.kernel.org/stable/c/cfb786b03b03c5ff38882bee38525eb9987e4d14 https://git.kernel.org/stable/c/d275de8ea7be3a453629fddae41d4156762e814c https://git.kernel.org/stable/c/d49fac38479bfdaec52b3ea274d290c47a294029 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2281660 |
CVE-2024-35903 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35903 SMASH Issue 406592 bnc#1224493 https://git.kernel.org/stable/c/3f9d57c771656bfd651e22edcfdb5f60e62542d4 https://git.kernel.org/stable/c/81166178cf0a0062a22b1b3b5368183d39577028 https://git.kernel.org/stable/c/9d98aa088386aee3db1b7b60b800c0fde0654a4a rh#2281658 |
CVE-2024-35905 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2024-35905 SMASH Issue 406594 bnc#1224488 bnc#1226327 https://git.kernel.org/stable/c/203a68151e8eeb331d4a64ab78303f3a15faf103 https://git.kernel.org/stable/c/37dc1718dc0c4392dbfcb9adec22a776e745dd69 https://git.kernel.org/stable/c/3f0784b2f1eb9147973d8c43ba085c5fdf44ff69 https://git.kernel.org/stable/c/98cdac206b112bec63852e94802791e316acc2c1 https://git.kernel.org/stable/c/9970e059af471478455f9534e8c3db82f8c5496d https://git.kernel.org/stable/c/ecc6a2101840177e57c925c102d2d29f260d37c8 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2281651 |
CVE-2024-35906 | kernel-source-rt:Ignore | low | 0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N) | CVE-2024-35906 SMASH Issue 406595 bnc#1224780 https://git.kernel.org/stable/c/0dab75b433ed2480d57ae4f8f725186a46223e42 https://git.kernel.org/stable/c/f341055b10bd8be55c3c995dff5f770b236b8ca9 rh#2281649 |
CVE-2024-35907 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35907 SMASH Issue 406596 bnc#1224492 https://git.kernel.org/stable/c/24444af5ddf729376b90db0f135fa19973cb5dab https://git.kernel.org/stable/c/867a2f598af6a645c865d1101b58c5e070c6dd9e https://git.kernel.org/stable/c/8feb1652afe9c5d019059a55c90f70690dce0f52 https://git.kernel.org/stable/c/a583117668ddb86e98f2e11c7caa3db0e6df52a3 https://git.kernel.org/stable/c/f7442a634ac06b953fc1f7418f307b25acd4cfbc rh#2281647 |
CVE-2024-35908 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35908 SMASH Issue 406597 bnc#1224490 https://git.kernel.org/stable/c/30fabe50a7ace3e9d57cf7f9288f33ea408491c8 https://git.kernel.org/stable/c/417e91e856099e9b8a42a2520e2255e6afe024be https://git.kernel.org/stable/c/b565d294e3d5aa809566a4d819835da11997d8b3 https://git.kernel.org/stable/c/f1b7f14130d782433bc98c1e1e41ce6b4d4c3096 rh#2281645 |
CVE-2024-35909 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35909 SMASH Issue 406598 bnc#1224491 https://git.kernel.org/stable/c/2e22c9cb618716b8e557fe17c3d4958171288082 https://git.kernel.org/stable/c/7d5a7dd5a35876f0ecc286f3602a88887a788217 https://git.kernel.org/stable/c/b4fdb3c197e35f655b2d9b6759ce29440eacdfda https://git.kernel.org/stable/c/beaf0e7996b79e06ccc2bdcb4442fbaeccc31200 rh#2281643 |
CVE-2024-35911 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35911 SMASH Issue 406600 bnc#1224486 https://git.kernel.org/stable/c/11ff8392943e08a35cb0aa19d638b02db745f170 https://git.kernel.org/stable/c/1cb7fdb1dfde1aab66780b4ba44dba6402172111 https://git.kernel.org/stable/c/e40a02f06ceb0e0b0183e0b973ac5dbf8f75edec rh#2281639 |
CVE-2024-35912 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35912 SMASH Issue 406601 bnc#1224487 https://git.kernel.org/stable/c/06a093807eb7b5c5b29b6cff49f8174a4e702341 https://git.kernel.org/stable/c/28db0ae86cb91a4ab0e855cff779daead936b7d5 https://git.kernel.org/stable/c/99a75d75007421d8e08ba139e24f77395cd08f62 https://git.kernel.org/stable/c/c0a40f2f8eba07416f695ffe2011bf3f8b0b6dc8 https://git.kernel.org/stable/c/f7f0e784894dfcb265f0f9fa499103b0ca7eabde rh#2281636 |
CVE-2024-35913 | kernel-source-rt:Not affected | moderate | () | CVE-2024-35913 SMASH Issue 406602 bnc#1224485 https://git.kernel.org/stable/c/222abd95f503e28c0404e596291fe472fe90929c https://git.kernel.org/stable/c/bbe806c294c9c4cd1221140d96e5f367673e393a rh#2281634 |
CVE-2024-35914 | kernel-source-rt:Already fixed | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35914 SMASH Issue 406603 bnc#1224482 https://git.kernel.org/stable/c/331e125e02c08ffaecc1074af78a988a278039bd https://git.kernel.org/stable/c/9fe6e9e7b58944037714442384075c17cfde1c56 rh#2281632 |
CVE-2024-35916 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35916 SMASH Issue 406605 bnc#1224480 https://git.kernel.org/stable/c/0336995512cdab0c65e99e4cdd47c4606debe14e https://git.kernel.org/stable/c/156c226cbbdcf5f3bce7b2408a33b59fab7fae2c https://git.kernel.org/stable/c/2295bd846765c766701e666ed2e4b35396be25e6 https://git.kernel.org/stable/c/eabf131cba1db12005a68378305f13b9090a7a6b rh#2281628 |
CVE-2024-35917 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35917 SMASH Issue 406606 bnc#1224481 https://git.kernel.org/stable/c/7ded842b356d151ece8ac4985940438e6d3998bb https://git.kernel.org/stable/c/c3062bdb859b6e2567e7f5c8cde20c0250bb130f https://git.kernel.org/stable/c/d3d74e45a060d218fe4b0c9174f0a77517509d8e rh#2281625 |
CVE-2024-35918 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35918 SMASH Issue 406608 bnc#1224478 https://git.kernel.org/stable/c/300a2b9c2b28282974ee300bb5d5025cbbb1f64c https://git.kernel.org/stable/c/6be74b1e21f8de4c48af772c2f658b464bfe6145 https://git.kernel.org/stable/c/9c573cd313433f6c1f7236fe64b9b743500c1628 https://git.kernel.org/stable/c/dfb2ce952143de60dd756ed666901236c76cb3fa https://git.kernel.org/stable/c/e80b4980af2688d8ff69c157ffa773dd1f1eb02c rh#2281783 |
CVE-2024-35919 | kernel-source-rt:Not affected | moderate | () | CVE-2024-35919 SMASH Issue 406609 bnc#1224484 https://git.kernel.org/stable/c/41671f0c0182b2bae74ca7e3b0f155559e3e2fc5 https://git.kernel.org/stable/c/51c84a8aac6e3b59af2b0e92ba63cabe2e641a2d https://git.kernel.org/stable/c/afaaf3a0f647a24a7bf6a2145d8ade37baaf75ad rh#2281777 |
CVE-2024-35920 | kernel-source-rt:Not affected | moderate | () | CVE-2024-35920 SMASH Issue 406610 bnc#1224483 https://git.kernel.org/stable/c/0a2dc707aa42214f9c4827bd57e344e29a0841d6 https://git.kernel.org/stable/c/23aaf824121055ba81b55f75444355bd83c8eb38 https://git.kernel.org/stable/c/6467cda18c9f9b5f2f9a0aa1e2861c653e41f382 rh#2281775 |
CVE-2024-35921 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35921 SMASH Issue 406611 bnc#1224477 https://git.kernel.org/stable/c/521ce0ea7418298d754494fe53263c23c4c78a8e https://git.kernel.org/stable/c/97c75ee5de060d271d80109b0c47cb6008439e5b https://git.kernel.org/stable/c/ec25fc3c2c1e8958a51abcfed614f81446d918c4 rh#2281771 |
CVE-2024-35923 | kernel-source-rt:Ignore | low | 0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N) | CVE-2024-35923 SMASH Issue 406613 bnc#1224658 https://git.kernel.org/stable/c/21162ad2de7446438cbd6224b3794a375bcb24df https://git.kernel.org/stable/c/5245a6da27ef79f8dba98dad5542ebe56d311837 https://git.kernel.org/stable/c/cb1cd176e0b431644653a7fa8691a1aaf7be98da https://git.kernel.org/stable/c/e21e1c45e1fe2e31732f40256b49c04e76a17cee rh#2281762 |
CVE-2024-35924 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2024-35924 SMASH Issue 406614 bnc#1224657 https://git.kernel.org/stable/c/0defcaa09d3b21e8387829ee3a652c43fa91e13f https://git.kernel.org/stable/c/266f403ec47573046dee4bcebda82777ce702c40 https://git.kernel.org/stable/c/b3db266fb031fba88c423d4bb8983a73a3db6527 jsc#CAR-3519 rh#2281758 |
CVE-2024-35926 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L) | CVE-2024-35926 SMASH Issue 406616 bnc#1224655 https://git.kernel.org/stable/c/262534ddc88dfea7474ed18adfecf856e4fbe054 https://git.kernel.org/stable/c/d994f7d77aaded05dc05af58a2720fd4f4b72a83 jsc#CAR-3517 rh#2281747 |
CVE-2024-35928 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35928 SMASH Issue 406618 bnc#1224653 https://git.kernel.org/stable/c/14ac934db851642ea8cd1bd4121c788a8899ef69 https://git.kernel.org/stable/c/aa665c3a2aca2ffe31b9645bda278e96dfc3b55c https://git.kernel.org/stable/c/c5f9fe2c1e5023fa096189a8bfba6420aa035587 https://git.kernel.org/stable/c/eb4f139888f636614dab3bcce97ff61cefc4b3a7 rh#2281517 |
CVE-2024-35929 | kernel-source-rt:Not affected | low | 2.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N) | CVE-2024-35929 SMASH Issue 406619 bnc#1224656 https://git.kernel.org/stable/c/4d58c9fb45c70e62c19e8be3f3605889c47601bc https://git.kernel.org/stable/c/927d1f4f77e4784ab3944a9df86ab14d1cd3185a https://git.kernel.org/stable/c/dda98810b552fc6bf650f4270edeebdc2f28bd3f jsc#CAR-3518 rh#2281514 |
CVE-2024-35931 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35931 SMASH Issue 406621 bnc#1224652 https://git.kernel.org/stable/c/395ca1031acf89d8ecb26127c544a71688d96f35 https://git.kernel.org/stable/c/601429cca96b4af3be44172c3b64e4228515dbe1 rh#2281523 |
CVE-2024-35932 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35932 SMASH Issue 406622 bnc#1224650 https://git.kernel.org/stable/c/48bfb4b03c5ff6e1fa1dc73fb915e150b0968c40 https://git.kernel.org/stable/c/5343f724c912c77541029123f47ecd3d2ea63bdd https://git.kernel.org/stable/c/5ee0d47dcf33efd8950b347dcf4d20bab12a3fa9 https://git.kernel.org/stable/c/d6b2fe2db1d0927b2d7df5c763eba55d0e1def3c rh#2281831 |
CVE-2024-35934 | kernel-source-rt:Not affected | low | 2.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2024-35934 SMASH Issue 406624 bnc#1224641 https://git.kernel.org/stable/c/00af2aa93b76b1bade471ad0d0525d4d29ca5cc0 https://git.kernel.org/stable/c/6e920422e7104928f760fc0e12b6d65ab097a2e7 https://git.kernel.org/stable/c/a2e6bffc0388526ed10406040279a693d62b36ec https://git.kernel.org/stable/c/b9117dc783c0ab0a3866812f70e07bf2ea071ac4 https://git.kernel.org/stable/c/bc4d1ebca11b4f194e262326bd45938e857c59d2 https://git.kernel.org/stable/c/d7ee3bf0caf599c14db0bf4af7aacd6206ef8a23 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2281827 |
CVE-2024-35938 | kernel-source-rt:Not affected | low | 2.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2024-35938 SMASH Issue 406628 bnc#1224643 https://git.kernel.org/stable/c/138fdeac75fb7512a7f9f1c3b236cd2e754af793 https://git.kernel.org/stable/c/1cca1bddf9ef080503c15378cecf4877f7510015 https://git.kernel.org/stable/c/6597a6687af54e2cb58371cf8f6ee4dd85c537de https://git.kernel.org/stable/c/805a1cdde82fec00c7471a393f4bb437b2741559 https://git.kernel.org/stable/c/ae5876b3b7b2243d874e2afa099e7926122087a1 jsc#CAR-3512 rh#2281819 |
CVE-2024-35939 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2024-35939 SMASH Issue 406629 bnc#1224535 https://git.kernel.org/stable/c/4031b72ca747a1e6e9ae4fa729e765b43363d66a https://git.kernel.org/stable/c/4e0cfb25d49da2e6261ad582f58ffa5b5dd8c8e9 https://git.kernel.org/stable/c/b57326c96b7bc7638aa8c44e12afa2defe0c934c https://git.kernel.org/stable/c/b9fa16949d18e06bdf728a560f5c8af56d2bdcaf rh#2281817 |
CVE-2024-35940 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2024-35940 SMASH Issue 406630 bnc#1224537 https://git.kernel.org/stable/c/0ff96ec22a84d80a18d7ae8ca7eb111c34ee33bb https://git.kernel.org/stable/c/635594cca59f9d7a8e96187600c34facb8bc0682 https://git.kernel.org/stable/c/6f9f2e498eae7897ba5d3e33908917f68ff4abcc https://git.kernel.org/stable/c/98bc7e26e14fbb26a6abf97603d59532475e97f8 https://git.kernel.org/stable/c/98e2b97acb875d65bdfc75fc408e67975cef3041 https://git.kernel.org/stable/c/ec7256887d072f98c42cdbef4dcc80ddf84c7a70 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2281815 |
CVE-2024-35941 | kernel-source-rt:Ignore | low | 0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N) | CVE-2024-35941 SMASH Issue 406631 bnc#1224642 https://git.kernel.org/stable/c/1b2b26595bb09febf14c5444c873ac4ec90a5a77 https://git.kernel.org/stable/c/219eee9c0d16f1b754a8b85275854ab17df0850a https://git.kernel.org/stable/c/8af60bb2b215f478b886f1d6d302fefa7f0b917d https://git.kernel.org/stable/c/fff05b2b004d9a8a2416d08647f3dc9068e357c8 jsc#CAR-3528 rh#2281813 |
CVE-2024-35942 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2024-35942 SMASH Issue 406632 bnc#1224589 https://git.kernel.org/stable/c/697624ee8ad557ab5417f985d2c804241a7ad30d https://git.kernel.org/stable/c/9d3f959b426635c4da50dfc7b1306afd84d23e7c https://git.kernel.org/stable/c/b13c0d871cd878ff53d25507ca535f59ed1f6a2a rh#2281811 |
CVE-2024-35943 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35943 SMASH Issue 406633 bnc#1224649 https://git.kernel.org/stable/c/04f23510daa40f9010fadf309507564a34ad956f https://git.kernel.org/stable/c/5d7f58ee08434a33340f75ac7ac5071eea9673b3 https://git.kernel.org/stable/c/ce666cecc09c0f92d5f86d89d8068ecfcf723a7e rh#2281809 |
CVE-2024-35946 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35946 SMASH Issue 406636 bnc#1224646 https://git.kernel.org/stable/c/4f11c741908dab7dd48fa5a986b210d4fc74ca8d https://git.kernel.org/stable/c/7e11a2966f51695c0af0b1f976a32d64dee243b2 https://git.kernel.org/stable/c/b34d64e9aa5505e3c84570aed5c757f1839573e8 rh#2281833 |
CVE-2024-35947 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35947 SMASH Issue 406637 bnc#1224647 https://git.kernel.org/stable/c/00e7d3bea2ce7dac7bee1cf501fb071fd0ea8f6c https://git.kernel.org/stable/c/343081c21e56bd6690d342e2f5ae8c00183bf081 https://git.kernel.org/stable/c/3c718bddddca9cbef177ac475b94c5c91147fb38 https://git.kernel.org/stable/c/41d8ac238ab1cab01a8c71798d61903304f4e79b https://git.kernel.org/stable/c/529e1852785599160415e964ca322ee7add7aef0 https://git.kernel.org/stable/c/a66c869b17c4c4dcf81d273b02cb0efe88e127ab https://git.kernel.org/stable/c/a69e1bdd777ce51061111dc419801e8a2fd241cc https://git.kernel.org/stable/c/ba3c118cff7bcb0fe6aa84ae1f9080d50e31c561 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OTB4HWU2PTVW5NEYHHLOCXDKG3PYA534/ rh#2281510 |
CVE-2024-35948 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2024-35948 SMASH Issue 406677 bnc#1224702 https://git.kernel.org/stable/c/fcdbc1d7a4b638e5d5668de461f320386f3002aa rh#2281947 |
CVE-2024-35949 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2024-35949 SMASH Issue 406678 bnc#1224700 https://git.kernel.org/stable/c/e03418abde871314e1a3a550f4c8afb7b89cb273 https://git.kernel.org/stable/c/ef3ba8ce8cf7075b716aa4afcefc3034215878ee https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OTB4HWU2PTVW5NEYHHLOCXDKG3PYA534/ rh#2281945 |
CVE-2024-35951 | kernel-source-rt:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35951 OSS:2024/05/30/1 OSS:2024/05/30/2 OSS:2024/Q2/263 SMASH Issue 406680 bnc#1224701 https://git.kernel.org/stable/c/1fc9af813b25e146d3607669247d0f970f5a87c3 https://git.kernel.org/stable/c/31806711e8a4b75e09b1c43652f2a6420e6e1002 https://git.kernel.org/stable/c/e18070c622c63f0cab170348e320454728c277aa rh#2281940 |
CVE-2024-35952 | kernel-source-rt:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35952 SMASH Issue 406681 bnc#1224705 https://git.kernel.org/stable/c/35768baf0fdfc47ede42d899506bad78450e9294 https://git.kernel.org/stable/c/8a6fea3fcb577a543ef67683ca7105bde49a38fb https://git.kernel.org/stable/c/a81b2acd43e24e419f65df97348c76a5a1496066 https://git.kernel.org/stable/c/bc004f5038220b1891ef4107134ccae44be55109 rh#2281938 |
CVE-2024-35953 | kernel-source-rt:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35953 SMASH Issue 406682 bnc#1224704 https://git.kernel.org/stable/c/d43e11d9c7fcb16f18bd46ab2556c2772ffc5775 https://git.kernel.org/stable/c/e6011411147209bc0cc14628cbc155356837e52a https://git.kernel.org/stable/c/fd7726e75968b27fe98534ccbf47ccd6fef686f3 rh#2281935 |
CVE-2024-35954 | kernel-source-rt:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35954 SMASH Issue 406683 bnc#1224675 https://git.kernel.org/stable/c/27f58c04a8f438078583041468ec60597841284d https://git.kernel.org/stable/c/46af9047523e2517712ae8e71d984286c626e022 https://git.kernel.org/stable/c/b0d1ebcc1a9560e494ea9b3ee808540db26c5086 rh#2281933 |
CVE-2024-35955 | kernel-source-rt:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35955 SMASH Issue 406684 bnc#1224676 https://git.kernel.org/stable/c/2df2dd27066cdba8041e46a64362325626bdfb2e https://git.kernel.org/stable/c/325f3fb551f8cd672dbbfc4cf58b14f9ee3fc9e8 https://git.kernel.org/stable/c/36b57c7d2f8b7de224980f1a284432846ad71ca0 https://git.kernel.org/stable/c/5062d1f4f07facbdade0f402d9a04a788f52e26d https://git.kernel.org/stable/c/62029bc9ff2c17a4e3a2478d83418ec575413808 https://git.kernel.org/stable/c/93eb31e7c3399e326259f2caa17be1e821f5a412 https://git.kernel.org/stable/c/b5808d40093403334d939e2c3c417144d12a6f33 https://git.kernel.org/stable/c/d15023fb407337028a654237d8968fefdcf87c2f https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2281931 |
CVE-2024-35956 | kernel-source-rt:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35956 SMASH Issue 406685 bnc#1224674 https://git.kernel.org/stable/c/14431815a4ae4bcd7c7a68b6a64c66c7712d27c9 https://git.kernel.org/stable/c/6c95336f5d8eb9ab79cd7306d71b6d0477363f8c https://git.kernel.org/stable/c/74e97958121aa1f5854da6effba70143f051b0cd rh#2281929 |
CVE-2024-35957 | kernel-source-rt:Unsupported | moderate | () | CVE-2024-35957 SMASH Issue 406686 bnc#1224673 https://git.kernel.org/stable/c/89436f4f54125b1297aec1f466efd8acb4ec613d https://git.kernel.org/stable/c/fba8ca3e6f608b92e54271fdbd3ce569361939fc rh#2281927 |
CVE-2024-35958 | kernel-source-rt:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35958 SMASH Issue 406687 bnc#1224677 https://git.kernel.org/stable/c/19ff8fed3338898b70b2aad831386c78564912e1 https://git.kernel.org/stable/c/5c7f2240d9835a7823d87f7460d8eae9f4e504c7 https://git.kernel.org/stable/c/b26aa765f7437e1bbe8db4c1641b12bd5dd378f0 https://git.kernel.org/stable/c/bf02d9fe00632d22fa91d34749c7aacf397b6cde https://git.kernel.org/stable/c/c31baa07f01307b7ae05f3ce32b89d8e2ba0cc1d https://git.kernel.org/stable/c/fdfbf54d128ab6ab255db138488f9650485795a2 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2281925 |
CVE-2024-35959 | kernel-source-rt:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35959 SMASH Issue 406688 bnc#1224666 https://git.kernel.org/stable/c/6bd77865fda662913dcb5722a66a773840370aa7 https://git.kernel.org/stable/c/ad26f26abd353113dea4e8d5ebadccdab9b61e76 https://git.kernel.org/stable/c/ecb829459a841198e142f72fadab56424ae96519 https://git.kernel.org/stable/c/f9ac93b6f3de34aa0bb983b9be4f69ca50fc70f3 rh#2281923 |
CVE-2024-35960 | kernel-source-rt:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35960 SMASH Issue 406689 bnc#1224588 https://git.kernel.org/stable/c/1263b0b26077b1183c3c45a0a2479573a351d423 https://git.kernel.org/stable/c/2e8dc5cffc844dacfa79f056dea88002312f253f https://git.kernel.org/stable/c/3d90ca9145f6b97b38d0c2b6b30f6ca6af9c1801 https://git.kernel.org/stable/c/5cf5337ef701830f173b4eec00a4f984adeb57a0 https://git.kernel.org/stable/c/7aaee12b804c5e0374e7b132b6ec2158ff33dd64 https://git.kernel.org/stable/c/7c6782ad4911cbee874e85630226ed389ff2e453 https://git.kernel.org/stable/c/adf67a03af39095f05d82050f15813d6f700159d https://git.kernel.org/stable/c/de0139719cdda82806a47580ca0df06fc85e0bd2 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2281920 |
CVE-2024-35961 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35961 SMASH Issue 406690 bnc#1224585 https://git.kernel.org/stable/c/8c91c60858473731bcdaf04fda99fcbcf84420d4 https://git.kernel.org/stable/c/967caa3d37c078e5b95a32094657e6a4cad145f0 https://git.kernel.org/stable/c/c6e77aa9dd82bc18a89bf49418f8f7e961cfccc8 rh#2281918 |
CVE-2024-35962 | kernel-source-rt:Not affected | moderate | () | CVE-2024-35962 SMASH Issue 406691 bnc#1224583 https://git.kernel.org/stable/c/562b7245131f6e9f1d280c8b5a8750f03edfc05c https://git.kernel.org/stable/c/65acf6e0501ac8880a4f73980d01b5d27648b956 https://git.kernel.org/stable/c/89242d9584c342cb83311b598d9e6b82572eadf8 https://git.kernel.org/stable/c/97dab36e57c64106e1c8ebd66cbf0d2d1e52d6b7 https://git.kernel.org/stable/c/c760089aa98289b4b88a7ff5a62dd92845adf223 https://git.kernel.org/stable/c/cf4bc359b76144a3dd55d7c09464ef4c5f2b2b05 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2281916 |
CVE-2024-35963 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2024-35963 SMASH Issue 406692 bnc#1224582 https://git.kernel.org/stable/c/50173882bb187e70e37bac01385b9b114019bee2 https://git.kernel.org/stable/c/b2186061d6043d6345a97100460363e990af0d46 rh#2281914 |
CVE-2024-35964 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35964 SMASH Issue 406693 bnc#1224581 https://git.kernel.org/stable/c/0c4a89f4690478969729c7ba5f69d53d8516aa12 https://git.kernel.org/stable/c/9e8742cdfc4b0e65266bb4a901a19462bda9285e rh#2281912 |
CVE-2024-35965 | kernel-source-rt:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35965 SMASH Issue 406694 bnc#1224579 https://git.kernel.org/stable/c/4f3951242ace5efc7131932e2e01e6ac6baed846 https://git.kernel.org/stable/c/8ee0c132a61df9723813c40e742dc5321824daa9 https://git.kernel.org/stable/c/9d42f373391211c7c8af66a3a316533a32b8a607 rh#2281909 |
CVE-2024-35966 | kernel-source-rt:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35966 SMASH Issue 406695 bnc#1224576 https://git.kernel.org/stable/c/a97de7bff13b1cc825c1b1344eaed8d6c2d3e695 https://git.kernel.org/stable/c/c3f787a3eafe519c93df9abbb0ca5145861c8d0f rh#2281907 |
CVE-2024-35967 | kernel-source-rt:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35967 SMASH Issue 406696 bnc#1224587 https://git.kernel.org/stable/c/419a0ffca7010216f0fc265b08558d7394fa0ba7 https://git.kernel.org/stable/c/51eda36d33e43201e7a4fd35232e069b2c850b01 https://git.kernel.org/stable/c/72473db90900da970a16ee50ad23c2c38d107d8c https://git.kernel.org/stable/c/7bc65d23ba20dcd7ecc094a12c181e594e5eb315 https://git.kernel.org/stable/c/b0e30c37695b614bee69187f86eaf250e36606ce https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2281905 |
CVE-2024-35968 | kernel-source-rt:Not affected | moderate | () | CVE-2024-35968 SMASH Issue 406697 bnc#1224570 https://git.kernel.org/stable/c/38407914d48273d7f8ab765b9243658afe1c3ab6 https://git.kernel.org/stable/c/81665adf25d28a00a986533f1d3a5df76b79cad9 rh#2281903 |
CVE-2024-35969 | kernel-source-rt:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35969 SMASH Issue 406698 bnc#1224580 https://git.kernel.org/stable/c/01b11a0566670612bd464a932e5ac2eae53d8652 https://git.kernel.org/stable/c/3fb02ec57ead2891a2306af8c51a306bc5945e70 https://git.kernel.org/stable/c/4b19e9507c275de0cfe61c24db69179dc52cf9fb https://git.kernel.org/stable/c/6cdb20c342cd0193d3e956e3d83981d0f438bb83 https://git.kernel.org/stable/c/7633c4da919ad51164acbf1aa322cc1a3ead6129 https://git.kernel.org/stable/c/b4b3b69a19016d4e7fbdbd1dbcc184915eb862e1 https://git.kernel.org/stable/c/cca606e14264098cba65efa82790825dbf69e903 https://git.kernel.org/stable/c/de76ae9ea1a6cf9e77fcec4f2df2904e26c23ceb https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2281900 |
CVE-2024-35970 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35970 SMASH Issue 406699 bnc#1224584 https://git.kernel.org/stable/c/601a89ea24d05089debfa2dc896ea9f5937ac7a6 https://git.kernel.org/stable/c/698a95ade1a00e6494482046902b986dfffd1caf https://git.kernel.org/stable/c/84a352b7eba1142a95441380058985ff19f25ec9 https://git.kernel.org/stable/c/b46f4eaa4f0ec38909fb0072eea3aeddb32f954e https://git.kernel.org/stable/c/b4bc99d04c689b5652665394ae8d3e02fb754153 rh#2281897 |
CVE-2024-35971 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35971 OSS:2024/05/30/1 OSS:2024/05/30/2 OSS:2024/Q2/263 SMASH Issue 406700 bnc#1224578 https://git.kernel.org/stable/c/492337a4fbd1421b42df684ee9b34be2a2722540 https://git.kernel.org/stable/c/49d5d70538b6b8f2a3f8f1ac30c1f921d4a0929b https://git.kernel.org/stable/c/be0384bf599cf1eb8d337517feeb732d71f75a6f https://git.kernel.org/stable/c/cba376eb036c2c20077b41d47b317d8218fe754f rh#2281895 |
CVE-2024-35972 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35972 SMASH Issue 406701 bnc#1224577 https://git.kernel.org/stable/c/10a9d6a7513f93d7faffcb341af0aa42be8218fe https://git.kernel.org/stable/c/7ac10c7d728d75bc9daaa8fade3c7a3273b9a9ff https://git.kernel.org/stable/c/c60ed825530b8c0cc2b524efd39b1d696ec54004 rh#2281893 |
CVE-2024-35973 | kernel-source-rt:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35973 SMASH Issue 406702 bnc#1224586 https://git.kernel.org/stable/c/10204df9beda4978bd1d0c2db0d8375bfb03b915 https://git.kernel.org/stable/c/190d9efa5773f26d6f334b1b8be282c4fa13fd5e https://git.kernel.org/stable/c/357163fff3a6e48fe74745425a32071ec9caf852 https://git.kernel.org/stable/c/3c1ae6de74e3d2d6333d29a2d3e13e6094596c79 https://git.kernel.org/stable/c/43be590456e1f3566054ce78ae2dbb68cbe1a536 https://git.kernel.org/stable/c/4a1b65d1e55d53b397cb27014208be1e04172670 https://git.kernel.org/stable/c/d3adf11d7993518a39bd02b383cfe657ccc0023c https://git.kernel.org/stable/c/d8a6213d70accb403b82924a1c229e733433a5ef https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2281891 |
CVE-2024-35974 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35974 SMASH Issue 406703 bnc#1224573 https://git.kernel.org/stable/c/740ffad95ca8033bd6e080ed337655b13b4d38ac https://git.kernel.org/stable/c/858c489d81d659af17a4d11cfaad2afb42e47a76 https://git.kernel.org/stable/c/8b8ace080319a866f5dfe9da8e665ae51d971c54 rh#2281889 |
CVE-2024-35975 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35975 SMASH Issue 406704 bnc#1224569 https://git.kernel.org/stable/c/7af5582ea67209a23e44be9a9612ba7897be1f47 https://git.kernel.org/stable/c/b34fe77a1b18654233e4e54b334fcaeddf487100 https://git.kernel.org/stable/c/bccb798e07f8bb8b91212fe8ed1e421685449076 rh#2281887 |
CVE-2024-35976 | kernel-source-rt:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35976 SMASH Issue 406705 bnc#1224575 https://git.kernel.org/stable/c/0b45c25d60e38f5c2cb6823f886773a34323306d https://git.kernel.org/stable/c/237f3cf13b20db183d3706d997eedc3c49eacd44 https://git.kernel.org/stable/c/2a523f14a3f53b46ff0e1fafd215b0bc5f6783aa https://git.kernel.org/stable/c/2eb979fbb2479bcd7e049f2f9978b6590dd8a0e6 https://git.kernel.org/stable/c/a82984b3c6a7e8c7937dba6e857ddf829d149417 https://git.kernel.org/stable/c/b143e19dc28c3211f050f7848d87d9b0a170e10c https://git.kernel.org/stable/c/f0a068de65d5b7358e9aff792716afa9333f3922 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2281884 |
CVE-2024-35977 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35977 SMASH Issue 406706 bnc#1224568 https://git.kernel.org/stable/c/5e700b384ec13f5bcac9855cb28fcc674f1d3593 https://git.kernel.org/stable/c/9e9bb74a93b7daa32313ccaefd0edc529d40daf8 https://git.kernel.org/stable/c/cfd758041d8b79aa8c3f811b6bd6105379f2f702 rh#2281882 |
CVE-2024-35978 | kernel-source-rt:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35978 SMASH Issue 406707 bnc#1224571 https://git.kernel.org/stable/c/45d355a926ab40f3ae7bc0b0a00cb0e3e8a5a810 https://git.kernel.org/stable/c/4beab84fbb50df3be1d8f8a976e6fe882ca65cb2 https://git.kernel.org/stable/c/66fab1e120b39f8f47a94186ddee36006fc02ca8 https://git.kernel.org/stable/c/75193678cce993aa959e7764b6df2f599886dd06 https://git.kernel.org/stable/c/8478394f76c748862ef179a16f651f752bdafaf0 https://git.kernel.org/stable/c/89a32741f4217856066c198a4a7267bcdd1edd67 https://git.kernel.org/stable/c/9ab5e44b9bac946bd49fd63264a08cd1ea494e76 https://git.kernel.org/stable/c/e4cb8382fff6706436b66eafd9c0ee857ff0a9f5 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2281879 |
CVE-2024-35979 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35979 SMASH Issue 406708 bnc#1224572 https://git.kernel.org/stable/c/3f28d49a328fe20926995d5fbdc92da665596268 https://git.kernel.org/stable/c/f423f41b7679c09abb26d2bd54be5cbef23c9446 https://git.kernel.org/stable/c/fcf3f7e2fc8a53a6140beee46ec782a4c88e4744 rh#2281872 |
CVE-2024-35980 | kernel-source-rt:Not affected | moderate | () | CVE-2024-35980 SMASH Issue 406709 bnc#1224574 https://git.kernel.org/stable/c/944db7b536baaf49d7e576af36a94f4719552b07 https://git.kernel.org/stable/c/ac4ad513de4fba18b4ac0ace132777d0910e8cfa https://git.kernel.org/stable/c/e3ba51ab24fddef79fc212f9840de54db8fd1685 rh#2281870 |
CVE-2024-35981 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35981 SMASH Issue 406710 bnc#1224565 https://git.kernel.org/stable/c/059a49aa2e25c58f90b50151f109dd3c4cdb3a47 https://git.kernel.org/stable/c/28e9a64638cd16bc1ecac9ff74ffeacb9fb652de https://git.kernel.org/stable/c/43a71c1b4b3a6d4db857b1435d271540279fc7de https://git.kernel.org/stable/c/539a2b995a4ed93125cb0efae0f793b00ab2158b rh#2281868 |
CVE-2024-35982 | kernel-source-rt:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35982 SMASH Issue 406711 bnc#1224566 https://git.kernel.org/stable/c/04720ea2e6c64459a90ca28570ea78335eccd924 https://git.kernel.org/stable/c/3fe79b2c83461edbbf86ed8a6f3924820ff89259 https://git.kernel.org/stable/c/4ca2a5fb54ea2cc43edea614207fcede562d91c2 https://git.kernel.org/stable/c/70a8be9dc2fb65d67f8c1e0c88c587e08e2e575d https://git.kernel.org/stable/c/87b6af1a7683e021710c08fc0551fc078346032f https://git.kernel.org/stable/c/b1f532a3b1e6d2e5559c7ace49322922637a28aa https://git.kernel.org/stable/c/b3ddf6904073990492454b1dd1c10a24be8c74c6 https://git.kernel.org/stable/c/ca54e2671548616ad34885f90d4f26f7adb088f0 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2281866 |
CVE-2024-35983 | kernel-source-rt:Not affected | moderate | () | CVE-2024-35983 SMASH Issue 406712 bnc#1224564 https://git.kernel.org/stable/c/15aa09d6d84629eb5296de30ac0aa19a33512f16 https://git.kernel.org/stable/c/5af385f5f4cddf908f663974847a4083b2ff2c79 https://git.kernel.org/stable/c/66297b2ceda841f809637731d287bda3a93b49d8 https://git.kernel.org/stable/c/93ba36238db6a74a82feb3dc476e25ea424ad630 https://git.kernel.org/stable/c/9b7c5004d7c5ae062134052a85290869a015814c https://git.kernel.org/stable/c/d34a516f2635090d36a306f84573e8de3d7374ce https://git.kernel.org/stable/c/ebfe41889b762f1933c6762f6624b9724a25bee0 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2281863 |
CVE-2024-35984 | kernel-source-rt:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35984 SMASH Issue 406713 bnc#1224567 https://git.kernel.org/stable/c/357c64ef1ef39b1e7cd91ab6bdd304d043702c83 https://git.kernel.org/stable/c/40f1d79f07b49c8a64a861706e5163f2db4bd95d https://git.kernel.org/stable/c/4e75e222d397c6752b229ed72fc4644c8c36ecde https://git.kernel.org/stable/c/5a09eae9a7db597fe0c1fc91636205b4a25d2620 https://git.kernel.org/stable/c/5fd72404587d7db4acb2d241fd8c387afb0a7aec https://git.kernel.org/stable/c/91811a31b68d3765b3065f4bb6d7d6d84a7cfc9f https://git.kernel.org/stable/c/ad3c3ac7a03be3697114f781193dd3e9d97e6e23 https://git.kernel.org/stable/c/e3425674ff68dc521c57c6eabad0cbd20a027d85 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2281861 |
CVE-2024-35985 | kernel-source-rt:Not affected | moderate | () | CVE-2024-35985 SMASH Issue 406714 bnc#1224561 https://git.kernel.org/stable/c/06f27e6d7bf0abf54488259ef36bbf0e1fccb35c https://git.kernel.org/stable/c/1560d1f6eb6b398bddd80c16676776c0325fe5fe https://git.kernel.org/stable/c/470d347b14b0ecffa9b39cf8f644fa2351db3efb rh#2281857 |
CVE-2024-35986 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35986 SMASH Issue 406715 bnc#1224562 https://git.kernel.org/stable/c/25b3498485ac281e5851700e33b97f12c9533fd8 https://git.kernel.org/stable/c/73224a5d2180066c7fe05b4656647601ba08d588 https://git.kernel.org/stable/c/9827caa5105fb16d1fae2e75c8d0e4662014b3ca https://git.kernel.org/stable/c/bf6e4ee5c43690e4c5a8a057bbcd4ff986bed052 rh#2281855 |
CVE-2024-35987 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35987 SMASH Issue 406716 bnc#1224563 https://git.kernel.org/stable/c/aea702dde7e9876fb00571a2602f25130847bf0f https://git.kernel.org/stable/c/b008e327fa570aca210f98c817757649bae56694 https://git.kernel.org/stable/c/ea6628e4e2353978af7e3b4ad4fdaab6149acf3d rh#2281852 |
CVE-2024-35988 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35988 SMASH Issue 406717 bnc#1224554 https://git.kernel.org/stable/c/04bf2e5f95c1a52e28a7567a507f926efe31c3b6 https://git.kernel.org/stable/c/4201b8c8f2c32af321fb50867e68ac6c1cbed4be https://git.kernel.org/stable/c/52e8a42b11078d2aad4b9ba96503d77c7299168b https://git.kernel.org/stable/c/6065e736f82c817c9a597a31ee67f0ce4628e948 https://git.kernel.org/stable/c/a0f0dbbb1bc49fa0de18e92c36492ff6d804cdaa https://git.kernel.org/stable/c/efdcfa554b6eb228943ef1dd4d023c606be647d2 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2281850 |
CVE-2024-35989 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35989 SMASH Issue 406718 bnc#1224558 https://git.kernel.org/stable/c/023b6390a15a98f9c3aa5e7da78d485d5384a08e https://git.kernel.org/stable/c/47533176fdcef17b114a6f688bc872901c1ec6bb https://git.kernel.org/stable/c/9edd3aa34d50f27b97be30b2ba4a6af0945ff56b https://git.kernel.org/stable/c/f221033f5c24659dc6ad7e5cf18fb1b075f4a8be https://git.kernel.org/stable/c/f976eca36cdf94e32fa4f865db0e7c427c9aa33c rh#2281847 |
CVE-2024-35990 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35990 SMASH Issue 406719 bnc#1224559 https://git.kernel.org/stable/c/0ccac964520a6f19e355652c8ca38af2a7f27076 https://git.kernel.org/stable/c/244296cc3a155199a8b080d19e645d7d49081a38 https://git.kernel.org/stable/c/8bf574183282d219cfa991f7df37aad491d74c11 https://git.kernel.org/stable/c/8e3c94767cad5150198e4337c8b91f3bb068e14b https://git.kernel.org/stable/c/c660be571609e03e7d5972343536a736fcb31557 https://git.kernel.org/stable/c/fcdd5bb4a8c81c64c1334d7e0aba41a8829a24de https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2281845 |
CVE-2024-35991 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35991 SMASH Issue 406720 bnc#1224553 https://git.kernel.org/stable/c/758071a35d9f3ffd84ff12169d081412a2f5f098 https://git.kernel.org/stable/c/c9b732a9f73eadc638abdcf0a6d39bc7a0c1af5f https://git.kernel.org/stable/c/d5638de827cff0fce77007e426ec0ffdedf68a44 rh#2281843 |
CVE-2024-35992 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35992 SMASH Issue 406721 bnc#1224555 https://git.kernel.org/stable/c/40406dfbc060503d2e0a9e637e98493c54997b3d https://git.kernel.org/stable/c/610f175d2e16fb2436ba7974b990563002c20d07 https://git.kernel.org/stable/c/976df695f579bbb2914114b4e9974fe4ed1eb813 https://git.kernel.org/stable/c/e4308bc22b9d46cf33165c9dfaeebcf29cd56f04 rh#2281841 |
CVE-2024-35993 | kernel-source-rt:Not affected | moderate | () | CVE-2024-35993 SMASH Issue 406722 bnc#1224560 https://git.kernel.org/stable/c/2431b5f2650dfc47ce782d1ca7b02d6b3916976f https://git.kernel.org/stable/c/9fdcc5b6359dfdaa52a55033bf50e2cedd66eb32 https://git.kernel.org/stable/c/d99e3140a4d33e26066183ff727d8f02f56bec64 rh#2281838 |
CVE-2024-35994 | kernel-source-rt:Not affected | moderate | () | CVE-2024-35994 SMASH Issue 406723 bnc#1224556 https://git.kernel.org/stable/c/dd22b34fb53cb04b13b2f5eee5c9200bb091fc88 https://git.kernel.org/stable/c/ed09f81eeaa8f9265e1787282cb283f10285c259 rh#2281836 |
CVE-2024-35996 | kernel-source-rt:Not affected | moderate | () | CVE-2024-35996 SMASH Issue 406725 bnc#1224551 https://git.kernel.org/stable/c/36b32816fbab267611f073223f1b0b816ec5920f https://git.kernel.org/stable/c/38f17d1fbb5bfb56ca1419e2d06376d57a9396f9 https://git.kernel.org/stable/c/8292f4f8dd1b005d0688d726261004f816ef730a https://git.kernel.org/stable/c/af6d6a923b40bf6471e44067ac61cc5814b48e7f https://git.kernel.org/stable/c/fd8547ebc187037cc69441a15c1441aeaab80f49 https://git.kernel.org/stable/c/fe42754b94a42d08cf9501790afc25c4f6a5f631 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2281979 |
CVE-2024-35997 | kernel-source-rt:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35997 SMASH Issue 406726 bnc#1224552 https://git.kernel.org/stable/c/0561b65fbd53d3e788c5b0222d9112ca016fd6a1 https://git.kernel.org/stable/c/21bfca822cfc1e71796124e93b46e0d9fa584401 https://git.kernel.org/stable/c/29e94f295bad5be59cf4271a93e22cdcf5536722 https://git.kernel.org/stable/c/418c5575d56410c6e186ab727bf32ae32447d497 https://git.kernel.org/stable/c/5095b93021b899f54c9355bebf36d78854c33a22 https://git.kernel.org/stable/c/9c0f59e47a90c54d0153f8ddc0f80d7a36207d0e https://git.kernel.org/stable/c/b65fb50e04a95eec34a9d1bc138454a98a5578d8 https://git.kernel.org/stable/c/c448a9fd50f77e8fb9156ff64848aa4295eb3003 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2281977 |
CVE-2024-35998 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-35998 SMASH Issue 406727 bnc#1224549 https://git.kernel.org/stable/c/699f8958dece132709c0bff6a9700999a2a63b75 https://git.kernel.org/stable/c/8248224ab5b8ca7559b671917c224296a4d671fc https://git.kernel.org/stable/c/8861fd5180476f45f9e8853db154600469a0284f https://git.kernel.org/stable/c/c7a4bca289e50bb4b2650f845c41bb3e453f4c66 jsc#CAR-3514 rh#2281975 |
CVE-2024-35999 | kernel-source-rt:Ignore | moderate | 5.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L) | CVE-2024-35999 SMASH Issue 406728 bnc#1224550 https://git.kernel.org/stable/c/0fcf7e219448e937681216353c9a58abae6d3c2e https://git.kernel.org/stable/c/60ab245292280905603bc0d3654f4cf8fceccb00 https://git.kernel.org/stable/c/8094a600245e9b28eb36a13036f202ad67c1f887 https://git.kernel.org/stable/c/98c7ed29cd754ae7475dc7cb3f33399fda902729 jsc#CAR-3515 rh#2281972 |
CVE-2024-36000 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36000 SMASH Issue 406729 bnc#1224548 https://git.kernel.org/stable/c/4c806333efea1000a2a9620926f560ad2e1ca7cc https://git.kernel.org/stable/c/538faabf31e9c53d8c870d114846fda958a0de10 https://git.kernel.org/stable/c/b76b46902c2d0395488c8412e1116c2486cdfcb2 https://git.kernel.org/stable/c/f6c5d21db16a0910152ec8aa9d5a7aed72694505 rh#2281968 |
CVE-2024-36001 | kernel-source-rt:Not affected | moderate | () | CVE-2024-36001 SMASH Issue 406730 bnc#1224547 https://git.kernel.org/stable/c/5eaf23b2e81349f6614f88396dc468fda89fc0b9 https://git.kernel.org/stable/c/c97f59e276d4e93480f29a70accbd0d7273cf3f5 rh#2281964 |
CVE-2024-36002 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36002 SMASH Issue 406731 bnc#1224546 https://git.kernel.org/stable/c/38d7b94e81d068b8d8c8392f421cfd2c3bbfd1a6 https://git.kernel.org/stable/c/f3e1cf62d18220a3aa97e084e7a3552debece9fc rh#2281961 |
CVE-2024-36003 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36003 SMASH Issue 406732 bnc#1224544 https://git.kernel.org/stable/c/740717774dc37338404d10726967d582414f638c https://git.kernel.org/stable/c/96fdd1f6b4ed72a741fb0eb705c0e13049b8721f https://git.kernel.org/stable/c/de8631d8c9df08440268630200e64b623a5f69e6 rh#2281958 |
CVE-2024-36004 | kernel-source-rt:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36004 SMASH Issue 406733 bnc#1224545 https://git.kernel.org/stable/c/09b54d29f05129b092f7c793a70b689ffb3c7b2c https://git.kernel.org/stable/c/152ed360cf2d273f88fc99a518b7eb868aae2939 https://git.kernel.org/stable/c/1594dac8b1ed78f9e75c263327e198a2e5e25b0e https://git.kernel.org/stable/c/2cc7d150550cc981aceedf008f5459193282425c https://git.kernel.org/stable/c/546d0fe9d76e8229a67369f9cb61e961d99038bd https://git.kernel.org/stable/c/8d6105f637883c8c09825e962308c06e977de4f0 https://git.kernel.org/stable/c/fbbb2404340dd6178e281bd427c271f7d5ec1d22 https://git.kernel.org/stable/c/ff7431f898dd00892a545b7d0ce7adf5b926944f https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2281953 |
CVE-2024-36005 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36005 SMASH Issue 406734 bnc#1224539 https://git.kernel.org/stable/c/13ba94f6cc820fdea15efeaa17d4c722874eebf9 https://git.kernel.org/stable/c/5c45feb3c288cf44a529e2657b36c259d86497d2 https://git.kernel.org/stable/c/8260c980aee7d8d8a3db39faf19c391d2f898816 https://git.kernel.org/stable/c/8e30abc9ace4f0add4cd761dfdbfaebae5632dd2 https://git.kernel.org/stable/c/ca34c40d1c22c555fa7f4a21a1c807fea7290a0a https://git.kernel.org/stable/c/e4bb6da24de336a7899033a65490ed2d892efa5b https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2281949 |
CVE-2024-36006 | kernel-source-rt:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36006 SMASH Issue 406735 bnc#1224541 https://git.kernel.org/stable/c/09846c2309b150b8ce4e0ce96f058197598fc530 https://git.kernel.org/stable/c/0b2c13b670b168e324e1cf109e67056a20fd610a https://git.kernel.org/stable/c/4526a56e02da3725db979358964df9cd9c567154 https://git.kernel.org/stable/c/64435b64e43d8ee60faa46c0cd04e323e8b2a7b0 https://git.kernel.org/stable/c/ab4ecfb627338e440ae11def004c524a00d93e40 https://git.kernel.org/stable/c/af8b593c3dd9df82cb199be65863af004b09fd97 https://git.kernel.org/stable/c/b377add0f0117409c418ddd6504bd682ebe0bf79 rh#2281989 |
CVE-2024-36007 | kernel-source-rt:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36007 SMASH Issue 406736 bnc#1224543 https://git.kernel.org/stable/c/039992b6d2df097c65f480dcf269de3d2656f573 https://git.kernel.org/stable/c/0b88631855026b55cad901ac28d081e0f358e596 https://git.kernel.org/stable/c/17e9e0bbae652b9b2049e51699e93dfa60b2988d https://git.kernel.org/stable/c/1d76bd2a0034d0d08045c1c6adf2235d88982952 https://git.kernel.org/stable/c/743edc8547a92b6192aa1f1b6bb78233fa21dc9b https://git.kernel.org/stable/c/751d352858108314efd33dddd5a9a2b6bf7d6916 https://git.kernel.org/stable/c/e890456051fe8c57944b911defb3e6de91315861 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2281986 |
CVE-2024-36008 | kernel-source-rt:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36008 SMASH Issue 406737 bnc#1224540 https://git.kernel.org/stable/c/03b5a9b2b526862b21bcc31976e393a6e63785d1 https://git.kernel.org/stable/c/58a4c9b1e5a3e53c9148e80b90e1e43897ce77d1 https://git.kernel.org/stable/c/7a25bfd12733a8f38f8ca47c581f876c3d481ac0 https://git.kernel.org/stable/c/7da0f91681c4902bc5c210356fdd963b04d5d1d4 https://git.kernel.org/stable/c/8240c7308c941db4d9a0a91b54eca843c616a655 https://git.kernel.org/stable/c/c71ea3534ec0936fc57e6fb271c7cc6a2f68c295 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2281983 |
CVE-2024-36009 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36009 OSS:2024/05/30/1 OSS:2024/05/30/2 OSS:2024/Q2/263 SMASH Issue 406738 bnc#1224542 https://git.kernel.org/stable/c/0d14f104027e30720582448706c7d6b43065c851 https://git.kernel.org/stable/c/467324bcfe1a31ec65d0cf4aa59421d6b7a7d52b https://git.kernel.org/stable/c/4fee8fa86a15d7790268eea458b1aec69c695530 https://git.kernel.org/stable/c/c42b073d9af4a5329b25b17390c63ab3847f30e8 rh#2281981 |
CVE-2024-36010 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36010 SMASH Issue 407385 bnc#1225594 https://git.kernel.org/stable/c/c56d055893cbe97848611855d1c97d0ab171eccc rh#2282950 |
CVE-2024-36011 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36011 SMASH Issue 407500 bnc#1225579 https://git.kernel.org/stable/c/1f7ebb69c1d65732bcac2fda9d15421f76f01e81 https://git.kernel.org/stable/c/9f3be61f55d4eedc20eedc56c0f04a5ce2b4a55a https://git.kernel.org/stable/c/d2706004a1b8b526592e823d7e52551b518a7941 rh#2282959 |
CVE-2024-36012 | kernel-source-rt:Not affected | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2024-36012 SMASH Issue 407496 bnc#1225502 https://git.kernel.org/stable/c/10f9f426ac6e752c8d87bf4346930ba347aaabac https://git.kernel.org/stable/c/4f1de02de07748da80a8178879bc7a1df37fdf56 https://git.kernel.org/stable/c/a85a60e62355e3bf4802dead7938966824b23940 https://git.kernel.org/stable/c/e3880b531b68f98d3941d83f2f6dd11cf4fd6b76 rh#2282955 |
CVE-2024-36013 | kernel-source-rt:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36013 OSS:2024/05/30/1 OSS:2024/05/30/2 OSS:2024/Q2/263 SMASH Issue 407495 bnc#1225578 https://git.kernel.org/stable/c/4d7b41c0e43995b0e992b9f8903109275744b658 https://git.kernel.org/stable/c/826af9d2f69567c646ff46d10393d47e30ad23c6 https://git.kernel.org/stable/c/cfe560c7050bfb37b0d2491bbe7cd8b59e77fdc5 rh#2282952 |
CVE-2024-36014 | kernel-source-rt:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36014 SMASH Issue 408045 bnc#1225593 https://git.kernel.org/stable/c/335cc45ef2b81b68be63c698b4f867a530bdf7a5 https://git.kernel.org/stable/c/3e54d4e95120641216dfe91a6c49f116a9f68490 https://git.kernel.org/stable/c/565d9ad7e5a18eb69ed8b66a9e9bb3f45346520c https://git.kernel.org/stable/c/93f76ec1eddce60dbb5885cbc0d7df54adee4639 https://git.kernel.org/stable/c/a1f95aede6285dba6dd036d907196f35ae3a11ea https://git.kernel.org/stable/c/a5fa5b40a278a3ca978fed64707bd27614adb1eb https://git.kernel.org/stable/c/b6cc5dd06336ed8bb3a7a1fc5aaf7d5e88bc0818 https://git.kernel.org/stable/c/b77620730f614059db2470e8ebab3e725280fc6d https://git.kernel.org/stable/c/e4b52d49383306ef73fd1bd9102538beebb0fe07 rh#2283785 |
CVE-2024-36015 | kernel-source-rt:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36015 SMASH Issue 408046 bnc#1225640 https://git.kernel.org/stable/c/5d5b24edad1107a2ffa99058f20f6aeeafeb5d39 https://git.kernel.org/stable/c/65cd017d43f4319a56747d38308b0a24cf57299e https://git.kernel.org/stable/c/b65d0410b879af0295d22438a4a32012786d152a https://git.kernel.org/stable/c/b8c6b83cc3adff3ddf403c8c7063fe6d08b2b9d9 https://git.kernel.org/stable/c/d32caf51379a4d71db03d3d4d7c22d27cdf7f68b https://git.kernel.org/stable/c/df9329247dbbf00f6057e002139ab3fa529ad828 https://git.kernel.org/stable/c/ec3468221efec6660ff656e9ebe51ced3520fc57 https://git.kernel.org/stable/c/fbf740aeb86a4fe82ad158d26d711f2f3be79b3e rh#2283786 |
CVE-2024-36018 | kernel-source-rt:Not affected | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H) | CVE-2024-36018 SMASH Issue 408146 bnc#1225694 https://git.kernel.org/stable/c/0c16020d2b69a602c8ae6a1dd2aac9a3023249d6 https://git.kernel.org/stable/c/692a51bebf4552bdf0a79ccd68d291182a26a569 https://git.kernel.org/stable/c/be141849ec00ef39935bf169c0f194ac70bf85ce rh#2284404 |
CVE-2024-36019 | kernel-source-rt:Not affected | moderate | 6.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L) | CVE-2024-36019 SMASH Issue 408147 bnc#1225695 https://git.kernel.org/stable/c/00bb549d7d63a21532e76e4a334d7807a54d9f31 https://git.kernel.org/stable/c/3af6c5ac72dc5b721058132a0a1d7779e443175e https://git.kernel.org/stable/c/51c4440b9d3fd7c8234e6de9170a487c03506e53 rh#2284402 |
CVE-2024-36020 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36020 SMASH Issue 408148 bnc#1225698 https://git.kernel.org/stable/c/06df7618f591b2dc43c59967e294d7b9fc8675b6 https://git.kernel.org/stable/c/0dcf573f997732702917af1563aa2493dc772fc0 https://git.kernel.org/stable/c/3e89846283f3cf7c7a8e28b342576fd7c561d2ba https://git.kernel.org/stable/c/951d2748a2a8242853abc3d0c153ce4bf8faad31 https://git.kernel.org/stable/c/9dcf0fcb80f6aeb01469e3c957f8d4c97365450a https://git.kernel.org/stable/c/b8e82128b44fa40bf99a50b919488ef361e1683c https://git.kernel.org/stable/c/cc9cd02dd9e8b7764ea9effb24f4f1dd73d1b23d https://git.kernel.org/stable/c/f37c4eac99c258111d414d31b740437e1925b8e8 https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html rh#2284400 |
CVE-2024-36021 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36021 SMASH Issue 408150 bnc#1225699 https://git.kernel.org/stable/c/1b550dae55901c2cc9075d6a7155a71b4f516e86 https://git.kernel.org/stable/c/50b69054f455dcdb34bd6b22764c7579b270eef3 https://git.kernel.org/stable/c/7ca0f73e5e2da3c129935b97f3a0877cce8ebdf5 https://git.kernel.org/stable/c/93305b77ffcb042f1538ecc383505e87d95aa05a rh#2284310 |
CVE-2024-36022 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36022 SMASH Issue 408151 bnc#1225700 https://git.kernel.org/stable/c/4f8154f775197d0021b690c2945d6a4d8094c8f6 https://git.kernel.org/stable/c/f679fd6057fbf5ab34aaee28d58b7f81af0cbf48 rh#2284427 |
CVE-2024-36023 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36023 SMASH Issue 408152 bnc#1225701 https://git.kernel.org/stable/c/214a6c4a28c11d67044e6cf3a0ab415050d9f03a https://git.kernel.org/stable/c/2e2177f94c0e0bc41323d7b6975a5f4820ed347e https://git.kernel.org/stable/c/9bf93dcfc453fae192fe5d7874b89699e8f800ac https://git.kernel.org/stable/c/b972e8ac3f44f693127a2806031962d100dfc4d1 rh#2284425 |
CVE-2024-36024 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36024 SMASH Issue 408153 bnc#1225702 https://git.kernel.org/stable/c/2aac387445610d6dfd681f5214388e86f5677ef7 https://git.kernel.org/stable/c/6226a5aa77370329e01ee8abe50a95e60618ce97 rh#2284423 |
CVE-2024-36026 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36026 SMASH Issue 408141 bnc#1225705 https://git.kernel.org/stable/c/1e3b8874d55c0c28378beb9007494a7a9269a5f5 https://git.kernel.org/stable/c/31729e8c21ecfd671458e02b6511eb68c2225113 https://git.kernel.org/stable/c/7521329e54931ede9e042bbf5f4f812b5bc4a01d https://git.kernel.org/stable/c/bd9b94055c3deb2398ee4490c1dfdf03f53efb8f rh#2284419 |
CVE-2024-36027 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N) | CVE-2024-36027 SMASH Issue 408188 bnc#1225706 https://git.kernel.org/stable/c/68879386180c0efd5a11e800b0525a01068c9457 https://git.kernel.org/stable/c/f4b994fccbb6f294c4b31a6ca0114b09f7245043 rh#2284415 |
CVE-2024-36028 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36028 SMASH Issue 408179 bnc#1225707 https://git.kernel.org/stable/c/2effe407f7563add41750fd7e03da4ea44b98099 https://git.kernel.org/stable/c/52ccdde16b6540abe43b6f8d8e1e1ec90b0983af https://git.kernel.org/stable/c/7e0a322877416e8c648819a8e441cf8c790b2cce https://git.kernel.org/stable/c/9c9b32d46afab2d911897914181c488954012300 rh#2284413 |
CVE-2024-36030 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2024-36030 SMASH Issue 408218 bnc#1225712 bnc#1226326 https://git.kernel.org/stable/c/6e965eba43e9724f3e603d7b7cc83e53b23d155e https://git.kernel.org/stable/c/f5aa87a2c0a72132ffc793fb0a5375b2a65d520a rh#2284295 |
CVE-2024-36031 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N) | CVE-2024-36031 SMASH Issue 408212 bnc#1225713 https://git.kernel.org/stable/c/25777f3f4e1f371d16a594925f31e37ce07b6ec7 https://git.kernel.org/stable/c/939a08bcd4334bad4b201e60bd0ae1f278d71d41 https://git.kernel.org/stable/c/9da27fb65a14c18efd4473e2e82b76b53ba60252 https://git.kernel.org/stable/c/ad2011ea787928b2accb5134f1e423b11fe80a8a https://git.kernel.org/stable/c/cc219cb8afbc40ec100c0de941047bb29373126a https://git.kernel.org/stable/c/e4519a016650e952ad9eb27937f8c447d5a4e06d https://git.kernel.org/stable/c/ed79b93f725cd0da39a265dc23d77add1527b9be rh#2284410 |
CVE-2024-36032 | kernel-source-rt:Not affected | low | 2.3 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N) | CVE-2024-36032 SMASH Issue 408173 bnc#1225720 https://git.kernel.org/stable/c/57062aa13e87b1a78a4a8f6cb5fab6ba24f5f488 https://git.kernel.org/stable/c/6b63e0ef4d3ce0080395e5091fba2023f246c45a https://git.kernel.org/stable/c/a571044cc0a0c944e7c12237b6768aeedd7480e1 https://git.kernel.org/stable/c/cda0d6a198e2a7ec6f176c36173a57bdd8af7af2 rh#2284408 |
CVE-2024-36033 | kernel-source-rt:Not affected | low | 2.3 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N) | CVE-2024-36033 SMASH Issue 408216 bnc#1225721 https://git.kernel.org/stable/c/0adcf6be1445ed50bfd4a451a7a782568f270197 https://git.kernel.org/stable/c/ba307abed5e09759845c735ba036f8c12f55b209 https://git.kernel.org/stable/c/bcccdc947d2ca5972b1e92d0dea10803ddc08ceb https://git.kernel.org/stable/c/f30c37cb4549baf8377434892d520fe7769bdba7 rh#2284406 |
CVE-2024-36281 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36281 SMASH Issue 411746 bnc#1226799 https://git.kernel.org/stable/c/16d66a4fa81da07bc4ed19f4e53b87263c2f8d38 https://git.kernel.org/stable/c/b0a15cde37a8388e57573686f650a17208ae1212 https://git.kernel.org/stable/c/cc9ac559f2e21894c21ac5b0c85fb24a5cab266c rh#2293712 |
CVE-2024-36288 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36288 SMASH Issue 411778 bnc#1226834 https://git.kernel.org/stable/c/0a1cb0c6102bb4fd310243588d39461da49497ad https://git.kernel.org/stable/c/4a77c3dead97339478c7422eb07bf4bf63577008 https://git.kernel.org/stable/c/4cefcd0af7458bdeff56a9d8dfc6868ce23d128a https://git.kernel.org/stable/c/57ff6c0a175930856213b2aa39f8c845a53e5b1c https://git.kernel.org/stable/c/6ed45d20d30005bed94c8c527ce51d5ad8121018 https://git.kernel.org/stable/c/af628d43a822b78ad8d4a58d8259f8bf8bc71115 https://git.kernel.org/stable/c/b4878ea99f2b40ef1925720b1b4ca7f4af1ba785 https://git.kernel.org/stable/c/f9977e4e0cd98a5f06f2492b4f3547db58deabf5 rh#2293645 |
CVE-2024-36477 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N) | CVE-2024-36477 SMASH Issue 411781 bnc#1226840 https://git.kernel.org/stable/c/1547183852dcdfcc25878db7dd3620509217b0cd https://git.kernel.org/stable/c/195aba96b854dd664768f382cd1db375d8181f88 https://git.kernel.org/stable/c/de13c56f99477b56980c7e00b09c776d16b7563d rh#2293639 |
CVE-2024-36478 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36478 SMASH Issue 411748 bnc#1226841 https://git.kernel.org/stable/c/5d0495473ee4c1d041b5a917f10446a22c047f47 https://git.kernel.org/stable/c/a2db328b0839312c169eb42746ec46fc1ab53ed2 rh#2293710 |
CVE-2024-36481 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36481 SMASH Issue 411782 bnc#1226870 https://git.kernel.org/stable/c/4ed468edfeb54c7202e559eba74c25fac6a0dad0 https://git.kernel.org/stable/c/ad4b202da2c498fefb69e5d87f67b946e7fe1e6a https://git.kernel.org/stable/c/e569eb34970281438e2b48a3ef11c87459fcfbcb rh#2293640 |
CVE-2024-36484 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2024-36484 SMASH Issue 411749 bnc#1226872 https://git.kernel.org/stable/c/26afda78cda3da974fd4c287962c169e9462c495 https://git.kernel.org/stable/c/5f9a04a94fd1894d7009055ab8e5832a0242dba3 https://git.kernel.org/stable/c/87bdc9f6f58b4417362d6932b49b828e319f97dc https://git.kernel.org/stable/c/c09ddc605893df542c6cf8dde6a57a93f7cf0adb rh#2293690 |
CVE-2024-36489 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36489 SMASH Issue 411750 bnc#1226874 https://git.kernel.org/stable/c/2c260a24cf1c4d30ea3646124f766ee46169280b https://git.kernel.org/stable/c/335c8f1566d8e44c384d16b450a18554896d4e8b https://git.kernel.org/stable/c/91e61dd7a0af660408e87372d8330ceb218be302 https://git.kernel.org/stable/c/ab67c2fd3d070a21914d0c31319d3858ab4e199c https://git.kernel.org/stable/c/d72e126e9a36d3d33889829df8fc90100bb0e071 https://git.kernel.org/stable/c/ef21007a7b581c7fe64d5a10c320880a033c837b rh#2293687 |
CVE-2024-36881 | kernel-source-rt:Not affected | low | 0 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N) | CVE-2024-36881 SMASH Issue 408208 bnc#1225718 https://git.kernel.org/stable/c/377f3a9a3d032a52325a5b110379a25dd1ab1931 https://git.kernel.org/stable/c/8d8b68a5b0c9fb23d37df06bb273ead38fd5a29d https://git.kernel.org/stable/c/c88033efe9a391e72ba6b5df4b01d6e628f4e734 rh#2284277 |
CVE-2024-36882 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36882 SMASH Issue 408168 bnc#1225723 https://git.kernel.org/stable/c/30153e4466647a17eebfced13eede5cbe4290e69 https://git.kernel.org/stable/c/468971c3f4b8187f25334503b68050a0e1370147 https://git.kernel.org/stable/c/7629ef6dda1564098aadeef38e5fbd11ee8627c4 https://git.kernel.org/stable/c/cf6a1d16c6df3c30b03f0c6a92a2ba7f86dffb45 rh#2284273 |
CVE-2024-36884 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36884 SMASH Issue 408222 bnc#1225727 https://git.kernel.org/stable/c/65ade5653f5ab5a21635e51d0c65e95f490f5b6f https://git.kernel.org/stable/c/e83de8f05b998e227b48cdeea54cba4c9d66d3aa rh#2284269 |
CVE-2024-36885 | kernel-source-rt:Not affected | low | 2.3 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L) | CVE-2024-36885 SMASH Issue 408185 bnc#1225728 https://git.kernel.org/stable/c/1a88c18da464db0ba8ea25196d0a06490f65322e https://git.kernel.org/stable/c/52a6947bf576b97ff8e14bb0a31c5eaf2d0d96e2 https://git.kernel.org/stable/c/e05af009302893f39b072811a68fa4a196284c75 rh#2284265 |
CVE-2024-36887 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36887 SMASH Issue 408144 bnc#1225731 https://git.kernel.org/stable/c/387f295cb2150ed164905b648d76dfcbd3621778 https://git.kernel.org/stable/c/950d5226cd6bb83ba720961a8d4d5cf79e6afd57 https://git.kernel.org/stable/c/f8a139656c95db893a543159873c57a470d7376d rh#2284576 |
CVE-2024-36888 | kernel-source-rt:Not affected | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36888 SMASH Issue 408220 bnc#1225738 https://git.kernel.org/stable/c/57a01eafdcf78f6da34fad9ff075ed5dfdd9f420 https://git.kernel.org/stable/c/6d559e70b3eb6623935cbe7f94c1912c1099777b https://git.kernel.org/stable/c/c57824d4fe07c2131f8c48687cbd5ee2be60c767 rh#2284573 |
CVE-2024-36889 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N) | CVE-2024-36889 SMASH Issue 408232 bnc#1225746 https://git.kernel.org/stable/c/39ca83ed73db9edcc6d70c0dc7a73085a4725012 https://git.kernel.org/stable/c/592f69b41766d366dbb8ff4ef5a67c4396527bbe https://git.kernel.org/stable/c/99951b62bf20cec9247f633a3bea898338b9e5b4 https://git.kernel.org/stable/c/aa0c07c1f20e05b30019bff083ec43665536f06f https://git.kernel.org/stable/c/dc941fec0719d0471a5902424d6b2a17df233193 https://git.kernel.org/stable/c/fb7a0d334894206ae35f023a82cad5a290fd7386 rh#2284571 |
CVE-2024-36890 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36890 SMASH Issue 408158 bnc#1225714 https://git.kernel.org/stable/c/79cbe0be6c0317b215ddd8bd3e32f0afdac48543 https://git.kernel.org/stable/c/9f6eb0ab4f95240589ee85fd9886a944cd3645b2 https://git.kernel.org/stable/c/ac6cf3ce9b7d12acb7b528248df5f87caa25fcdc https://git.kernel.org/stable/c/cd7eb8f83fcf258f71e293f7fc52a70be8ed0128 rh#2284569 |
CVE-2024-36891 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36891 SMASH Issue 408239 bnc#1225710 https://git.kernel.org/stable/c/6c9c7c1e63b198a8b979ad963eb21410f10ccb00 https://git.kernel.org/stable/c/883e5d542bbdddbddeba60250cb482baf3ae2415 https://git.kernel.org/stable/c/955a923d2809803980ff574270f81510112be9cf https://git.kernel.org/stable/c/f3956791cf526540addd3295e4c1e0f0442486cc rh#2284567 |
CVE-2024-36892 | kernel-source-rt:Not affected | moderate | 5.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L) | CVE-2024-36892 SMASH Issue 408167 bnc#1225716 https://git.kernel.org/stable/c/56900355485f6e82114b18c812edd57fd7970dcb https://git.kernel.org/stable/c/8f828aa48812ced28aa39cb3cfe55ef2444d03dd rh#2284565 |
CVE-2024-36893 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36893 SMASH Issue 408175 bnc#1225748 https://git.kernel.org/stable/c/789326cafbd1f67f424436b6bc8bdb887a364637 https://git.kernel.org/stable/c/ae11f04b452b5205536e1c02d31f8045eba249dd https://git.kernel.org/stable/c/d56d2ca03cc22123fd7626967d096d8661324e57 https://git.kernel.org/stable/c/fc2b655cb6dd2b381f1f284989721002e39b6b77 rh#2284563 |
CVE-2024-36895 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2024-36895 SMASH Issue 408229 bnc#1225750 https://git.kernel.org/stable/c/650ae71c80749fc7cb8858c8049f532eaec64410 https://git.kernel.org/stable/c/7a54e5052bde582fd0e7677334fe7a5be92e242c https://git.kernel.org/stable/c/a422089ce42ced73713e5032aad29a9a7cbe9528 rh#2284558 |
CVE-2024-36896 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36896 SMASH Issue 408230 bnc#1225734 https://git.kernel.org/stable/c/5f1d68ef5ddac27c6b997adccd1c339cef1e6848 https://git.kernel.org/stable/c/6119ef6517ce501fc548154691abdaf1f954a277 https://git.kernel.org/stable/c/63533549ff53d24daf47c443dbd43c308afc3434 https://git.kernel.org/stable/c/a4b46d450c49f32e9d4247b421e58083fde304ce rh#2284556 |
CVE-2024-36897 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36897 SMASH Issue 408174 bnc#1225735 https://git.kernel.org/stable/c/02f5300f6827206f6e48a77f51e6264993695e5c https://git.kernel.org/stable/c/3c7013a87124bab54216d9b99f77e8b6de6fbc1a https://git.kernel.org/stable/c/7e3030774431eb093165a31baff040d35446fb8b https://git.kernel.org/stable/c/9a35d205f466501dcfe5625ca313d944d0ac2d60 https://git.kernel.org/stable/c/c2797ec16d9072327e7578d09ee05bcab52fffd0 rh#2284553 |
CVE-2024-36898 | kernel-source-rt:Not affected | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L) | CVE-2024-36898 SMASH Issue 408181 bnc#1225736 https://git.kernel.org/stable/c/1a51e24404d77bb3307c1e39eee0d8e86febb1a5 https://git.kernel.org/stable/c/883e4bbf06eb5fb7482679e4edb201093e9f55a2 https://git.kernel.org/stable/c/bd7139a70ee8d8ea872b223e043730cf6f5e2b0e https://git.kernel.org/stable/c/ee0166b637a5e376118e9659e5b4148080f1d27e rh#2284551 |
CVE-2024-36899 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2024-36899 SMASH Issue 408191 bnc#1225737 bnc#1225739 https://git.kernel.org/stable/c/02f6b0e1ec7e0e7d059dddc893645816552039da https://git.kernel.org/stable/c/95ca7c90eaf5ea8a8460536535101e3e81160e2a https://git.kernel.org/stable/c/ca710b5f40b8b16fdcad50bebd47f50e4c62d239 rh#2284549 |
CVE-2024-36900 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36900 SMASH Issue 408226 bnc#1225726 https://git.kernel.org/stable/c/35d92abfbad88cf947c010baf34b075e40566095 https://git.kernel.org/stable/c/5c623fe0534806b627054da09b6f51b7b2f7b9cd https://git.kernel.org/stable/c/72ede790f5a03c3957487400a1b72ebce293a2e7 https://git.kernel.org/stable/c/c98bc78ce0909ccc92005e2cb6609ec6c7942f69 rh#2284547 |
CVE-2024-36903 | kernel-source-rt:Not affected | moderate | 5.6 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L) | CVE-2024-36903 SMASH Issue 408201 bnc#1225741 https://git.kernel.org/stable/c/2367bf254f3a27ecc6e229afd7a8b0a1395f7be3 https://git.kernel.org/stable/c/4e13d3a9c25b7080f8a619f961e943fe08c2672c https://git.kernel.org/stable/c/68c8ba16ab712eb709c6bab80ff151079d11d97a rh#2284543 |
CVE-2024-36906 | kernel-source-rt:Not affected | low | 0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N) | CVE-2024-36906 SMASH Issue 408189 bnc#1225715 https://git.kernel.org/stable/c/20ac71bee028ffbae4fc14ed679b23b4d3e95726 https://git.kernel.org/stable/c/ad702338fe423cb1e79745787090317256a98dab https://git.kernel.org/stable/c/b26f353786d365e658cebc9a9ace88e04fc2325e https://git.kernel.org/stable/c/c4238686f9093b98bd6245a348bcf059cdce23af https://git.kernel.org/stable/c/ee0ce7573e5083031960faf602c9db693ab5b477 rh#2284537 |
CVE-2024-36907 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36907 SMASH Issue 408140 bnc#1225751 https://git.kernel.org/stable/c/024f7744bd09cb2a47a0a96b9c8ad08109de99cc https://git.kernel.org/stable/c/8e088a20dbe33919695a8082c0b32deb62d23b4a https://git.kernel.org/stable/c/9b332c72299f2ac284ab3d7c0301969b933e4ca1 rh#2284536 |
CVE-2024-36908 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36908 SMASH Issue 408224 bnc#1225743 https://git.kernel.org/stable/c/01bc4fda9ea0a6b52f12326486f07a4910666cf6 https://git.kernel.org/stable/c/14b3275f93d4a0d8ddc02195bc4e9869b7a3700e https://git.kernel.org/stable/c/1c172ac7afe4442964f4153b2c78fe4e005d9d67 rh#2284632 |
CVE-2024-36912 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2024-36912 SMASH Issue 408209 bnc#1225752 https://git.kernel.org/stable/c/1999644d95194d4a58d3e80ad04ce19220a01a81 https://git.kernel.org/stable/c/211f514ebf1ef5de37b1cf6df9d28a56cfd242ca https://git.kernel.org/stable/c/8e62341f5c45b27519b7d193bcc32ada416ad9d8 https://git.kernel.org/stable/c/bfae56be077ba14311509e70706a13458f87ea99 rh#2284529 |
CVE-2024-36913 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | CVE-2024-36913 SMASH Issue 408202 bnc#1225753 https://git.kernel.org/stable/c/03f5a999adba062456c8c818a683beb1b498983a https://git.kernel.org/stable/c/6123a4e8e25bd40cf44db14694abac00e6b664e6 https://git.kernel.org/stable/c/e813a0fc2e597146e9cebea61ced9c796d4e308f rh#2284527 |
CVE-2024-36915 | kernel-source-rt:Not affected | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H) | CVE-2024-36915 SMASH Issue 408165 bnc#1225758 https://git.kernel.org/stable/c/29dc0ea979d433dd3c26abc8fa971550bdc05107 https://git.kernel.org/stable/c/7a87441c9651ba37842f4809224aca13a554a26f rh#2284523 |
CVE-2024-36916 | kernel-source-rt:Not affected | moderate | 6.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H) | CVE-2024-36916 SMASH Issue 408217 bnc#1225759 https://git.kernel.org/stable/c/488dc6808cb8369685f18cee81e88e7052ac153b https://git.kernel.org/stable/c/62accf6c1d7b433752cb3591bba8967b7a801ad5 https://git.kernel.org/stable/c/844fc023e9f14a4fb1de5ae1eaefafd6d69c5fa1 https://git.kernel.org/stable/c/beaa51b36012fad5a4d3c18b88a617aea7a9b96d https://git.kernel.org/stable/c/ce0e99cae00e3131872936713b7f55eefd53ab86 https://git.kernel.org/stable/c/f6add0a6f78dc6360b822ca4b6f9f2f14174c8ca rh#2284521 |
CVE-2024-36918 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36918 SMASH Issue 408193 bnc#1225766 https://git.kernel.org/stable/c/608e13706c8b6c658a0646f09ebced74ec367f7c https://git.kernel.org/stable/c/a8d89feba7e54e691ca7c4efc2a6264fa83f3687 https://git.kernel.org/stable/c/c418afb9bf23e2f2b76cb819601e4a5d9dbab42d https://git.kernel.org/stable/c/fa6995eeb62e74b5a1480c73fb7b420c270784d3 rh#2284517 |
CVE-2024-36920 | kernel-source-rt:Not affected | low | 0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N) | CVE-2024-36920 SMASH Issue 408238 bnc#1225768 https://git.kernel.org/stable/c/429846b4b6ce9853e0d803a2357bb2e55083adf0 https://git.kernel.org/stable/c/4d2772324f43cf5674ac3dbe3f74a7e656396716 https://git.kernel.org/stable/c/5f0266044dc611563539705bff0b3e1545fbb6aa https://git.kernel.org/stable/c/f09318244c6cafd10aca741b9c01e0a2c362d43a rh#2284515 |
CVE-2024-36921 | kernel-source-rt:Not affected | important | 8 (CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) | CVE-2024-36921 SMASH Issue 408215 bnc#1225769 bnc#1225850 https://git.kernel.org/stable/c/17f64517bf5c26af56b6c3566273aad6646c3c4f https://git.kernel.org/stable/c/94f80a8ec15e238b78521f20f8afaed60521a294 https://git.kernel.org/stable/c/fab21d220017daa5fd8a3d788ff25ccfecfaae2f rh#2284513 |
CVE-2024-36922 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36922 SMASH Issue 408221 bnc#1225805 https://git.kernel.org/stable/c/43d07103df670484cdd26f9588eabef80f69db89 https://git.kernel.org/stable/c/b83db8e756dec68a950ed2f056248b1704b3deaa https://git.kernel.org/stable/c/c2ace6300600c634553657785dfe5ea0ed688ac2 rh#2284511 |
CVE-2024-36925 | kernel-source-rt:Not affected | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36925 SMASH Issue 408241 bnc#1225816 https://git.kernel.org/stable/c/75961ffb5cb3e5196f19cae7683f35cc88b50800 https://git.kernel.org/stable/c/f2a6b3ed20f2dea4cb645abc6a73c4595662adca https://git.kernel.org/stable/c/f62e0fefcdfe2c05ccb1aa80521a69524eea9c84 rh#2284504 |
CVE-2024-36926 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36926 SMASH Issue 408169 bnc#1225829 https://git.kernel.org/stable/c/2bed905a72485a2b79a001bd7e66c750942d2155 https://git.kernel.org/stable/c/49a940dbdc3107fecd5e6d3063dc07128177e058 https://git.kernel.org/stable/c/7fb5793c53f8c024e3eae9f0d44eb659aed833c4 https://git.kernel.org/stable/c/802b13b79ab1fef66c6852fc745cf197dca0cb15 rh#2284502 |
CVE-2024-36927 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36927 SMASH Issue 408240 bnc#1225813 https://git.kernel.org/stable/c/5db08343ddb1b239320612036c398e4e1bb52818 https://git.kernel.org/stable/c/f5c603ad4e6fcf42f84053e882ebe20184bb309e https://git.kernel.org/stable/c/fc1092f51567277509563800a3c56732070b6aa4 rh#2284500 |
CVE-2024-36928 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36928 SMASH Issue 408195 bnc#1225775 https://git.kernel.org/stable/c/10cb803aff3b11fe0bd5f274fc1c231a43e88df6 https://git.kernel.org/stable/c/8792b557eb50b986f2496156d486d0c7c85a1524 https://git.kernel.org/stable/c/8a2e4d37afb8500b276e5ee903dee06f50ab0494 https://git.kernel.org/stable/c/e28dd1e1bf3ebb52cdb877fb359e8978a51576e3 https://git.kernel.org/stable/c/eae0aec245712c52a3ce9c05575b541a9eef5282 rh#2284498 |
CVE-2024-36929 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36929 SMASH Issue 408177 bnc#1225814 https://git.kernel.org/stable/c/989bf6fd1e1d058e73a364dce1a0c53d33373f62 https://git.kernel.org/stable/c/aea5e2669c2863fdd8679c40ee310b3bcaa85aec https://git.kernel.org/stable/c/c7af99cc21923a9650533c9d77265c8dd683a533 https://git.kernel.org/stable/c/cfe34d86ef9765c388f145039006bb79b6c81ac6 https://git.kernel.org/stable/c/d091e579b864fa790dd6a0cd537a22c383126681 https://git.kernel.org/stable/c/faa83a7797f06cefed86731ba4baa3b4dfdc06c1 rh#2284496 |
CVE-2024-36930 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36930 SMASH Issue 408213 bnc#1225830 https://git.kernel.org/stable/c/2070d008cc08bff50a58f0f4d30f12d3ebf94c00 https://git.kernel.org/stable/c/4756fa529b2f12b7cb8f21fe229b0f6f47190829 https://git.kernel.org/stable/c/a30659f1576d2c8e62e7426232bb18b885fd951a https://git.kernel.org/stable/c/e005d6754e3e440257006795b687c4ad8733b493 rh#2284494 |
CVE-2024-36931 | kernel-source-rt:Not affected | moderate | 5.1 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L) | CVE-2024-36931 SMASH Issue 408211 bnc#1225747 https://git.kernel.org/stable/c/06759ebaf75c19c87b2453a5e130e9e61e9b5d65 https://git.kernel.org/stable/c/10452edd175fcc4fd0f5ac782ed2a002e3e5d65c https://git.kernel.org/stable/c/84b38f48836662c4bfae646c014f4e981e16a2b2 https://git.kernel.org/stable/c/c9d48ce163305595ae20aee27774192476d5e6a5 https://git.kernel.org/stable/c/da7c622cddd4fe36be69ca61e8c42e43cde94784 rh#2284492 |
CVE-2024-36932 | kernel-source-rt:Not affected | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2024-36932 SMASH Issue 408236 bnc#1225831 https://git.kernel.org/stable/c/c1279dee33369e2525f532364bb87207d23b9481 https://git.kernel.org/stable/c/d351eb0ab04c3e8109895fc33250cebbce9c11da rh#2284490 |
CVE-2024-36935 | kernel-source-rt:Not affected | moderate | 5.1 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L) | CVE-2024-36935 SMASH Issue 408178 bnc#1225763 https://git.kernel.org/stable/c/5ff4de981983ed84f29b5d92b6550ec054e12a92 https://git.kernel.org/stable/c/666854ea9cad844f75a068f32812a2d78004914a rh#2284484 |
CVE-2024-36936 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2024-36936 SMASH Issue 408187 bnc#1225773 https://git.kernel.org/stable/c/1c5a1627f48105cbab81d25ec2f72232bfaa8185 https://git.kernel.org/stable/c/781e34b736014188ba9e46a71535237313dcda81 |
CVE-2024-36937 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36937 SMASH Issue 408196 bnc#1225834 https://git.kernel.org/stable/c/12481f30128fbebc2eeb55eb2d56390fdfa30c5e https://git.kernel.org/stable/c/272bfb019f3cc018f654b992115774e77b4f3ffc https://git.kernel.org/stable/c/5bcf0dcbf9066348058b88a510c57f70f384c92c https://git.kernel.org/stable/c/6fd81f9d333e7b3532036577b1beb74ba1323553 https://git.kernel.org/stable/c/e22e25820fa04ea5eaac4ef7ee200e9923f466a4 rh#2284481 |
CVE-2024-36939 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36939 SMASH Issue 408197 bnc#1225838 https://git.kernel.org/stable/c/24457f1be29f1e7042e50a7749f5c2dde8c433c8 https://git.kernel.org/stable/c/8a1f89c98dcc542dd6d287e573523714702e0f9c https://git.kernel.org/stable/c/8ae63bd858691bee0e2a92571f2fbb36a4d86d65 https://git.kernel.org/stable/c/9909dde2e53a19585212c32fe3eda482b5faaaa3 https://git.kernel.org/stable/c/b33ca18c3a1190208dfd569c4fa8a2f93084709f https://git.kernel.org/stable/c/d4891d817350c67392d4731536945f3809a2a0ba https://git.kernel.org/stable/c/ea6ce93327bd2c8a0c6cf6f2f0e800f3b778f021 rh#2284628 |
CVE-2024-36942 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L) | CVE-2024-36942 SMASH Issue 408203 bnc#1225843 https://git.kernel.org/stable/c/064688d70c33bb5b49dde6e972b9379a8b045d8a https://git.kernel.org/stable/c/40d442f969fb1e871da6fca73d3f8aef1f888558 https://git.kernel.org/stable/c/580bcd6bf24f9975f97d81d5ef1b64cca9240df9 https://git.kernel.org/stable/c/7bcba557d5c37cd09ecd5abbe7d50deb86c36d3f https://git.kernel.org/stable/c/d1f768214320852766a60a815a0be8f14fba0cc3 rh#2284472 |
CVE-2024-36943 | kernel-source-rt:Not affected | moderate | 5.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H) | CVE-2024-36943 SMASH Issue 408166 bnc#1225844 https://git.kernel.org/stable/c/74b3d66f91d9f539f99faad74d796fa9a389a015 https://git.kernel.org/stable/c/c70dce4982ce1718bf978a35f8e26160b82081f4 rh#2284470 |
CVE-2024-36945 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36945 SMASH Issue 408237 bnc#1225823 https://git.kernel.org/stable/c/2ddc0dd7fec86ee53b8928a5cca5fbddd4fc7c06 https://git.kernel.org/stable/c/5df93c029a907b0ff5a4eeadd77ba06ff0a277d2 https://git.kernel.org/stable/c/d5a466ab6e78d6f2e0f64435f1e17246c8e941ff https://git.kernel.org/stable/c/da91e447d06dc649fcf46e59122e7bf8f0b2e0db rh#2284465 |
CVE-2024-36947 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) | CVE-2024-36947 SMASH Issue 408219 bnc#1225856 https://git.kernel.org/stable/c/02ee394a5d899d9bd2f0759382e9481cab6166f8 https://git.kernel.org/stable/c/24dd9b08df718f20ccf2dd1519909fefd8c233ee https://git.kernel.org/stable/c/aa23317d0268b309bb3f0801ddd0d61813ff5afb https://git.kernel.org/stable/c/bd8f78c71defbcb7a9ed331e7f287507df972b00 https://git.kernel.org/stable/c/db71ca93259dd1078bcfea3afafde2143cfc2da7 rh#2284461 |
CVE-2024-36948 | kernel-source-rt:Not affected | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L) | CVE-2024-36948 SMASH Issue 408225 bnc#1225845 https://git.kernel.org/stable/c/9cb46b31f3d08ed3fce86349e8c12f96d7c88717 https://git.kernel.org/stable/c/e23a904dfeb5a9e3d4ec527a365e962478cccf05 rh#2284458 |
CVE-2024-36954 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36954 SMASH Issue 408149 bnc#1225764 https://git.kernel.org/stable/c/01cd1b7b685751ee422d00d050292a3d277652d6 https://git.kernel.org/stable/c/2f87fd9476cf9725d774e6dcb7d17859c6a6d1ae https://git.kernel.org/stable/c/3210d34fda4caff212cb53729e6bd46de604d565 https://git.kernel.org/stable/c/42c8471b0566c7539e7dd584b4d0ebd3cec8cb2c https://git.kernel.org/stable/c/614c5a5ae45a921595952117b2e2bd4d4bf9b574 https://git.kernel.org/stable/c/97bf6f81b29a8efaf5d0983251a7450e5794370d https://git.kernel.org/stable/c/adbce6d20da6254c86425a8d4359b221b5ccbccd https://git.kernel.org/stable/c/d03a82f4f8144befdc10518e732e2a60b34c870e rh#2284590 |
CVE-2024-36955 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2024-36955 SMASH Issue 408163 bnc#1225810 https://git.kernel.org/stable/c/722d33c442e66e4aabd3e778958d696ff3a2777e https://git.kernel.org/stable/c/7db626d2730d3d80fd31638169054b1e507f07bf https://git.kernel.org/stable/c/7ef6ecf98ce309b1f4e5a25cddd5965d01feea07 https://git.kernel.org/stable/c/bd2d9641a39e6b5244230c4b41c4aca83b54b377 https://git.kernel.org/stable/c/c158cf914713efc3bcdc25680c7156c48c12ef6a rh#2284586 |
CVE-2024-36956 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2024-36956 SMASH Issue 408170 bnc#1225874 https://git.kernel.org/stable/c/72c1afffa4c645fe0e0f1c03e5f34395ed65b5f4 https://git.kernel.org/stable/c/f51564e4b3992b53df79460ed5781a5330b5b1d5 rh#2284583 |
CVE-2024-36957 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2024-36957 SMASH Issue 408183 bnc#1225762 https://git.kernel.org/stable/c/0a0285cee11c7dcc2657bcd456e469958a5009e7 https://git.kernel.org/stable/c/8f11fe3ea3fc261640cfc8a5addd838000407c67 https://git.kernel.org/stable/c/bcdac70adceb44373da204c3c297f2a98e13216e https://git.kernel.org/stable/c/ec697fbd38cbe2eef0948b58673b146caa95402f https://git.kernel.org/stable/c/f299ee709fb45036454ca11e90cb2810fe771878 https://git.kernel.org/stable/c/fc3e0076c1f82fe981d321e3a7bad4cbee542c19 rh#2284581 |
CVE-2024-36958 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36958 SMASH Issue 408194 bnc#1225873 https://git.kernel.org/stable/c/18180a4550d08be4eb0387fe83f02f703f92d4e7 https://git.kernel.org/stable/c/6a7b07689af6e4e023404bf69b1230f43b2a15bc rh#2284579 |
CVE-2024-36959 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36959 SMASH Issue 408234 bnc#1225839 https://git.kernel.org/stable/c/026e24cf31733dbd97f41cc9bc5273ace428eeec https://git.kernel.org/stable/c/06780473cb8a858d1d6cab2673e021b072a852d1 https://git.kernel.org/stable/c/35ab679e8bb5a81a4f922d3efbd43e32bce69274 https://git.kernel.org/stable/c/47d253c485491caaf70d8cd8c0248ae26e42581f https://git.kernel.org/stable/c/518d5ddafeb084d6d9b1773ed85164300037d0e6 https://git.kernel.org/stable/c/76aa2440deb9a35507590f2c981a69a57ecd305d https://git.kernel.org/stable/c/a0cedbcc8852d6c77b00634b81e41f17f29d9404 https://git.kernel.org/stable/c/c7e02ccc9fdc496fe51e440e3e66ac36509ca049 rh#2284636 |
CVE-2024-36961 | kernel-source-rt:Not affected | moderate | 5.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H) | CVE-2024-36961 SMASH Issue 408457 bnc#1225857 https://git.kernel.org/stable/c/6c57bdd0505422d5ccd2df541d993aec978c842e https://git.kernel.org/stable/c/c7f7c37271787a7f77d7eedc132b0b419a76b4c8 rh#2290407 |
CVE-2024-36962 | kernel-source-rt:Not affected | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36962 SMASH Issue 408456 bnc#1225827 https://git.kernel.org/stable/c/7e2901a2a9195da76111f351584bf77552a038f0 https://git.kernel.org/stable/c/8a3ff43dcbab7c96f9e8cf2bd1049ab8d6e59545 https://git.kernel.org/stable/c/ae87f661f3c1a3134a7ed86ab69bf9f12af88993 https://git.kernel.org/stable/c/e0863634bf9f7cf36291ebb5bfa2d16632f79c49 rh#2290406 |
CVE-2024-36963 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) | CVE-2024-36963 SMASH Issue 408448 bnc#1225836 https://git.kernel.org/stable/c/414fb08628143203d29ccd0264b5a83fb9523c03 https://git.kernel.org/stable/c/5f91fc82794d4a6e41cdcd02d00baa377d94ca78 https://git.kernel.org/stable/c/baa23a8d4360d981a49913841a726edede5cdd54 rh#2290405 |
CVE-2024-36965 | kernel-source-rt:Not affected | moderate | 5.6 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H) | CVE-2024-36965 SMASH Issue 409720 bnc#1226149 https://git.kernel.org/stable/c/00548ac6b14428719c970ef90adae2b3b48c0cdf https://git.kernel.org/stable/c/1d9e2de24533daca36cbf09e8d8596bf72b526b2 https://git.kernel.org/stable/c/26c6d7dc8c6a9fde9d362ab2eef6390efeff145e https://git.kernel.org/stable/c/331f91d86f71d0bb89a44217cc0b2a22810bbd42 https://git.kernel.org/stable/c/36c79eb4845551e9f6d28c663b38ce0ab03b84a9 https://git.kernel.org/stable/c/838b49e211d59fa827ff9df062d4020917cffbdf rh#2292325 |
CVE-2024-36966 | kernel-source-rt:Not affected | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H) | CVE-2024-36966 SMASH Issue 409721 bnc#1226154 https://git.kernel.org/stable/c/7af2ae1b1531feab5d38ec9c8f472dc6cceb4606 https://git.kernel.org/stable/c/dcdd49701e429c55b3644fd70fc58d85745f8cfe https://git.kernel.org/stable/c/f9b877a7ee312ec8ce17598a7ef85cb820d7c371 rh#2292330 |
CVE-2024-36967 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36967 SMASH Issue 409722 bnc#1226131 https://git.kernel.org/stable/c/189c768932d435045b1fae12bf63e53866f06a28 https://git.kernel.org/stable/c/1e6914fa8e7798bcf3ce4a5b96ea4ac1d5571cdf https://git.kernel.org/stable/c/5d91238b590bd883c86ba7707c5c9096469c08b7 https://git.kernel.org/stable/c/cf26a92f560eed5d6ddc3d441cc645950cbabc56 https://git.kernel.org/stable/c/e62835264d0352be6086975f18fdfed2b5520b13 https://git.kernel.org/stable/c/ffcaa2172cc1a85ddb8b783de96d38ca8855e248 rh#2292329 |
CVE-2024-36969 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36969 SMASH Issue 409724 bnc#1226155 https://git.kernel.org/stable/c/130afc8a886183a94cf6eab7d24f300014ff87ba https://git.kernel.org/stable/c/308de6be0c9c7ba36915c0d398e771725c0ea911 https://git.kernel.org/stable/c/7e4f50dfc98c49b3dc6875a35c3112522fb25639 https://git.kernel.org/stable/c/91402e0e5de9124a3108db7a14163fcf9a6d322f https://git.kernel.org/stable/c/a32c8f951c8a456c1c251e1dcdf21787f8066445 https://git.kernel.org/stable/c/f187fcbbb8f8bf10c6687f0beae22509369f7563 rh#2292328 |
CVE-2024-36970 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36970 SMASH Issue 409725 bnc#1226127 https://git.kernel.org/stable/c/3d913719df14c28c4d3819e7e6d150760222bda4 https://git.kernel.org/stable/c/d20013259539e2fde2deeac85354851097afdf9e rh#2292326 |
CVE-2024-36972 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36972 SMASH Issue 409921 bnc#1226163 https://git.kernel.org/stable/c/4708f49add84a57ce0ccc7bf9a6269845c631cc3 https://git.kernel.org/stable/c/4bf6964451c3cb411fbaa1ae8b214b3d97a59bf1 https://git.kernel.org/stable/c/518a994aa0b87d96f1bc6678a7035df5d1fcd7a1 https://git.kernel.org/stable/c/9841991a446c87f90f66f4b9fee6fe934c1336a2 https://git.kernel.org/stable/c/d59ae9314b97e01c76a4171472441e55721ba636 rh#2291269 |
CVE-2024-36973 | kernel-source-rt:Not affected | moderate | 6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36973 SMASH Issue 411127 bnc#1226457 https://git.kernel.org/stable/c/086c6cbcc563c81d55257f9b27e14faf1d0963d3 https://git.kernel.org/stable/c/1efe551982297924d05a367aa2b6ec3d275d5742 https://git.kernel.org/stable/c/34ae447b138680b5ed3660f7d935ff3faf88ba1a https://git.kernel.org/stable/c/86c9713602f786f441630c4ee02891987f8618b9 rh#2292858 |
CVE-2024-36975 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36975 SMASH Issue 411235 bnc#1226520 https://git.kernel.org/stable/c/050bf3c793a07f96bd1e2fd62e1447f731ed733b https://git.kernel.org/stable/c/1c652e1e10676f942149052d9329b8bf2703529a https://git.kernel.org/stable/c/681935009fec3fc22af97ee312d4a24ccf3cf087 https://git.kernel.org/stable/c/96f650995c70237b061b497c66755e32908f8972 https://git.kernel.org/stable/c/d32c6e09f7c4bec3ebc4941323f0aa6366bc1487 https://git.kernel.org/stable/c/ff91cc12faf798f573dab2abc976c1d5b1862fea rh#2293002 |
CVE-2024-36976 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36976 SMASH Issue 411238 bnc#1226511 https://git.kernel.org/stable/c/2e0ce54a9c5c7013b1257be044d99cbe7305e9f1 https://git.kernel.org/stable/c/eba63df7eb1f95df6bfb67722a35372b6994928d rh#2293005 |
CVE-2024-36977 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-36977 SMASH Issue 411237 bnc#1226513 https://git.kernel.org/stable/c/1ba145f05b5c8f0b1a947a0633b5edff5dd1f1c5 https://git.kernel.org/stable/c/1d26ba0944d398f88aaf997bda3544646cf21945 https://git.kernel.org/stable/c/341eb08dbca9eae05308c442fbfab1813a44c97a https://git.kernel.org/stable/c/4a387e032909c6dc2b479452c5bbe9a252057925 https://git.kernel.org/stable/c/ec96bcf5f96a7a5c556b0e881ac3e5c3924d542c rh#2293000 |
CVE-2024-36979 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2024-36979 SMASH Issue 411399 bnc#1226604 https://git.kernel.org/stable/c/3a7c1661ae1383364cd6092d851f5e5da64d476b https://git.kernel.org/stable/c/4488617e5e995a09abe4d81add5fb165674edb59 https://git.kernel.org/stable/c/8ca9a750fc711911ef616ceb627d07357b04545e https://git.kernel.org/stable/c/a2b01e65d9ba8af2bb086d3b7288ca53a07249ac https://git.kernel.org/stable/c/e43dd2b1ec746e105b7db5f9ad6ef14685a615a4 rh#2293194 rh#2293276 |
CVE-2024-37026 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-37026 SMASH Issue 411980 bnc#1226951 https://git.kernel.org/stable/c/92deed4a9bfd9ef187764225bba530116c49e15c https://git.kernel.org/stable/c/c8ea2c31f5ea437199b239d76ad5db27343edb0c rh#2294210 |
CVE-2024-38381 | kernel-source-rt:Not affected | moderate | 5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) | CVE-2024-38381 SMASH Issue 411753 bnc#1226878 https://git.kernel.org/stable/c/017ff397624930fd7ac7f1761f3c9d6a7100f68c https://git.kernel.org/stable/c/406cfac9debd4a6d3dc5d9258ee086372a8c08b6 https://git.kernel.org/stable/c/485ded868ed62ceb2acb3a459d7843fd71472619 https://git.kernel.org/stable/c/ad4d196d2008c7f413167f0a693feb4f0439d7fe https://git.kernel.org/stable/c/e4a87abf588536d1cdfb128595e6e680af5cf3ed https://git.kernel.org/stable/c/e53a7f8afcbd2886f2a94c5d56757328109730ea https://git.kernel.org/stable/c/e8c8e0d0d214c877fbad555df5b3ed558cd9b0c3 https://git.kernel.org/stable/c/f80b786ab0550d0020191a59077b2c7e069db2d1 rh#2293683 |
CVE-2024-38384 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38384 SMASH Issue 411979 bnc#1226938 https://git.kernel.org/stable/c/714e59b5456e4d6e4295a9968c564abe193f461c https://git.kernel.org/stable/c/785298ab6b802afa75089239266b6bbea590809c https://git.kernel.org/stable/c/d0aac2363549e12cc79b8e285f13d5a9f42fd08e rh#2294220 |
CVE-2024-38388 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2024-38388 SMASH Issue 411754 bnc#1226890 https://git.kernel.org/stable/c/172811e3a557d8681a5e2d0f871dc04a2d17eb13 https://git.kernel.org/stable/c/191dc1b2ff0fb35e7aff15a53224837637df8bff https://git.kernel.org/stable/c/3291486af5636540980ea55bae985f3eaa5b0740 https://git.kernel.org/stable/c/6e359be4975006ff72818e79dad8fe48293f2eb2 rh#2293656 |
CVE-2024-38390 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38390 SMASH Issue 411755 bnc#1226891 https://git.kernel.org/stable/c/247849eeb3fd88f8990ed73e33af70d5c10f9aec https://git.kernel.org/stable/c/46d4efcccc688cbacdd70a238bedca510acaa8e4 https://git.kernel.org/stable/c/617e3d1680504a3f9d88e1582892c68be155498f https://git.kernel.org/stable/c/a1955a6df91355fef72a3a254700acd3cc1fec0d rh#2293689 |
CVE-2024-38391 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2024-38391 SMASH Issue 411756 bnc#1226894 https://git.kernel.org/stable/c/1c987cf22d6b65ade46145c03eef13f0e3e81d83 https://git.kernel.org/stable/c/24b9362c9fa57f9291b380a3cc77b8b5c9fa27da https://git.kernel.org/stable/c/eef8d414b07a1e85c1367324fb6c6a46b79269bd rh#2293688 |
CVE-2024-38539 | kernel-source-rt:Not affected | low | 2.3 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L) | CVE-2024-38539 SMASH Issue 411402 bnc#1226608 https://git.kernel.org/stable/c/3eb127dc408bf7959a4920d04d16ce10e863686a https://git.kernel.org/stable/c/6564fc1818404254d1c9f7d75b403b4941516d26 https://git.kernel.org/stable/c/9c0731832d3b7420cbadba6a7f334363bc8dfb15 https://git.kernel.org/stable/c/b3a7fb93afd888793ef226e9665fbda98a95c48e rh#2293460 |
CVE-2024-38540 | kernel-source-rt:Ignore | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38540 SMASH Issue 411403 bnc#1226582 https://git.kernel.org/stable/c/627493443f3a8458cb55cdae1da254a7001123bc https://git.kernel.org/stable/c/78cfd17142ef70599d6409cbd709d94b3da58659 https://git.kernel.org/stable/c/8b799c00cea6fcfe5b501bbaeb228c8821acb753 https://git.kernel.org/stable/c/a658f011d89dd20cf2c7cb4760ffd79201700b98 rh#2293459 |
CVE-2024-38542 | kernel-source-rt:Not affected | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H) | CVE-2024-38542 SMASH Issue 411379 bnc#1226591 https://git.kernel.org/stable/c/168f6fbde0eabd71d1f4133df7d001a950b96977 https://git.kernel.org/stable/c/f12afddfb142587d786df9e3cc4862190d3e2ec8 https://git.kernel.org/stable/c/f79edef79b6a2161f4124112f9b0c46891bb0b74 rh#2293457 |
CVE-2024-38543 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38543 SMASH Issue 411438 bnc#1226594 https://git.kernel.org/stable/c/1a21fdeea502658e315bd939409b755974f4fb64 https://git.kernel.org/stable/c/3b20d18f475bd17309db640dbe7d7c7ebb5bc2bc https://git.kernel.org/stable/c/65e528a69cb3ed4a286c45b4afba57461c8b5b33 https://git.kernel.org/stable/c/c2af060d1c18beaec56351cf9c9bcbbc5af341a3 https://git.kernel.org/stable/c/ce47e8ead9a72834cc68431d53f8092ce69bebb7 rh#2293456 |
CVE-2024-38550 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38550 SMASH Issue 411340 bnc#1226633 https://git.kernel.org/stable/c/1a7254525ca7a6f3e37d7882d7f7ad97f6235f7c https://git.kernel.org/stable/c/5bf5154739cd676b6d0958079070557c8d96afb6 https://git.kernel.org/stable/c/802b49e39da669b54bd9b77dc3c649999a446bf6 https://git.kernel.org/stable/c/d48d0c5fd733bd6d8d3ddb2ed553777ab4724169 https://git.kernel.org/stable/c/de9987cec6fde1dd41dfcb971433e05945852489 https://git.kernel.org/stable/c/ea60ab95723f5738e7737b56dda95e6feefa5b50 rh#2293449 |
CVE-2024-38551 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38551 SMASH Issue 411436 bnc#1226761 https://git.kernel.org/stable/c/0c052b1c11d8119f3048b1f7b3c39a90500cacf9 https://git.kernel.org/stable/c/5f39231888c63f0a7708abc86b51b847476379d8 https://git.kernel.org/stable/c/87b8dca6e06f9b1681bc52bf7bfa85c663a11158 https://git.kernel.org/stable/c/cbbcabc7f0979f6542372cf88d7a9da7143a4226 rh#2293448 |
CVE-2024-38554 | kernel-source-rt:Not affected | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38554 SMASH Issue 411348 bnc#1226742 https://git.kernel.org/stable/c/36e56b1b002bb26440403053f19f9e1a8bc075b2 https://git.kernel.org/stable/c/3ec437f9bbae68e9b38115c4c91de995f73f6bad https://git.kernel.org/stable/c/8bad3a20a27be8d935f2aae08d3c6e743754944a https://git.kernel.org/stable/c/965d940fb7414b310a22666503d2af69459c981b https://git.kernel.org/stable/c/eef95df9b752699bddecefa851f64858247246e9 rh#2293445 |
CVE-2024-38555 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38555 SMASH Issue 411460 bnc#1226607 https://git.kernel.org/stable/c/1337ec94bc5a9eed250e33f5f5c89a28a6bfabdb https://git.kernel.org/stable/c/1d5dce5e92a70274de67a59e1e674c3267f94cd7 https://git.kernel.org/stable/c/3cb92b0ad73d3f1734e812054e698d655e9581b0 https://git.kernel.org/stable/c/7ac4c69c34240c6de820492c0a28a0bd1494265a https://git.kernel.org/stable/c/bf8aaf0ae01c27ae3c06aa8610caf91e50393396 https://git.kernel.org/stable/c/db9b31aa9bc56ff0d15b78f7e827d61c4a096e40 https://git.kernel.org/stable/c/f6fbb8535e990f844371086ab2c1221f71f993d3 rh#2293444 |
CVE-2024-38556 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38556 SMASH Issue 411390 bnc#1226774 https://git.kernel.org/stable/c/2d0962d05c93de391ce85f6e764df895f47c8918 https://git.kernel.org/stable/c/485d65e1357123a697c591a5aeb773994b247ad7 https://git.kernel.org/stable/c/4baae687a20ef2b82fde12de3c04461e6f2521d6 https://git.kernel.org/stable/c/94024332a129c6e4275569d85c0c1bfb2ae2d71b https://git.kernel.org/stable/c/f9caccdd42e999b74303c9b0643300073ed5d319 rh#2293443 |
CVE-2024-38557 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38557 SMASH Issue 411420 bnc#1226781 https://git.kernel.org/stable/c/0f06228d4a2dcc1fca5b3ddb0eefa09c05b102c4 https://git.kernel.org/stable/c/0f320f28f54b1b269a755be2e3fb3695e0b80b07 https://git.kernel.org/stable/c/e93fc8d959e56092e2eca1e5511c2d2f0ad6807a https://git.kernel.org/stable/c/f03c714a0fdd1f93101a929d0e727c28a66383fc rh#2293442 |
CVE-2024-38561 | kernel-source-rt:Not affected | low | 0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N) | CVE-2024-38561 SMASH Issue 411408 bnc#1226736 https://git.kernel.org/stable/c/1ec7ccb4cd4b6f72c2998b07880fa7aaf8dfe1d4 https://git.kernel.org/stable/c/1f2ebd3758e1cef6a1f998a1f7ea73310dcb1699 https://git.kernel.org/stable/c/8f5c841a559ccb700c8d27a3ca645b7a5f59b4f5 https://git.kernel.org/stable/c/b0b755cb5a5e0d7168c3ab1b3814b0d3cad9f017 https://git.kernel.org/stable/c/f8aa1b98ce40184521ed95ec26cc115a255183b2 rh#2293432 |
CVE-2024-38562 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38562 SMASH Issue 411451 bnc#1226788 https://git.kernel.org/stable/c/4e2a5566462b53db7d4c4722da86eedf0b8f546c https://git.kernel.org/stable/c/838c7b8f1f278404d9d684c34a8cb26dc41aaaa1 https://git.kernel.org/stable/c/8fa4d56564ee7cc2ee348258d88efe191d70dd7f https://git.kernel.org/stable/c/ed74398642fcb19f6ff385c35a7d512c6663e17b rh#2293431 |
CVE-2024-38563 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38563 SMASH Issue 411394 bnc#1226743 https://git.kernel.org/stable/c/474b9412f33be87076b40a49756662594598a85e https://git.kernel.org/stable/c/84e81f9b4818b8efe89beb12a246d5d510631939 https://git.kernel.org/stable/c/ef46dbb93fc9279fb7de883aac22abffe214e6b5 rh#2293430 |
CVE-2024-38564 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38564 SMASH Issue 411464 bnc#1226789 https://git.kernel.org/stable/c/543576ec15b17c0c93301ac8297333c7b6e84ac7 https://git.kernel.org/stable/c/6675c541f540a29487a802d3135280b69b9f568d https://git.kernel.org/stable/c/67929e973f5a347f05fef064fea4ae79e7cdb5fd https://git.kernel.org/stable/c/b34bbc76651065a5eafad8ddff1eb8d1f8473172 rh#2293429 |
CVE-2024-38566 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38566 SMASH Issue 411368 bnc#1226790 https://git.kernel.org/stable/c/0db63c0b86e981a1e97d2596d64ceceba1a5470e https://git.kernel.org/stable/c/39f8a29330f433000e716eefc4b9abda05b71a82 https://git.kernel.org/stable/c/6f5ae91172a93abac9720ba94edf3ec8f4d7f24f https://git.kernel.org/stable/c/c58ccdd2483a1d990748cdaf94206b5d5986a001 rh#2293427 |
CVE-2024-38567 | kernel-source-rt:Unsupported | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38567 SMASH Issue 411446 bnc#1226769 https://git.kernel.org/stable/c/03ddc74bdfd71b84a55c9f2185d8787f258422cd https://git.kernel.org/stable/c/0fa08a55201ab9be72bacb8ea93cf752d338184f https://git.kernel.org/stable/c/265c3cda471c26e0f25d0c755da94e1eb15d7a0c https://git.kernel.org/stable/c/62eb07923f3693d55b0c2d9a5a4f1ad72cb6b8fd https://git.kernel.org/stable/c/6a9892bf24c906b4d6b587f8759ca38bff672582 https://git.kernel.org/stable/c/8650725bb0a48b206d5a8ddad3a7488f9a5985b7 https://git.kernel.org/stable/c/ac3ed46a8741d464bc70ebdf7433c1d786cf329d https://git.kernel.org/stable/c/b6dd09b3dac89b45d1ea3e3bd035a3859c0369a0 https://git.kernel.org/stable/c/eb0f2fc3ff5806cc572cd9055ce7c52a01e97645 jsc#CAR-3845 rh#2293426 |
CVE-2024-38568 | kernel-source-rt:Not affected | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L) | CVE-2024-38568 SMASH Issue 411398 bnc#1226771 https://git.kernel.org/stable/c/3669baf308308385a2ab391324abdde5682af5aa https://git.kernel.org/stable/c/81bdd60a3d1d3b05e6cc6674845afb1694dd3a0e https://git.kernel.org/stable/c/aa2d3d678895c8eedd003f1473f87d3f06fe6ec7 https://git.kernel.org/stable/c/b5120d322763c15c978bc47beb3b6dff45624304 https://git.kernel.org/stable/c/be1fa711e59c874d049f592aef1d4685bdd22bdf rh#2293425 |
CVE-2024-38569 | kernel-source-rt:Not affected | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L) | CVE-2024-38569 SMASH Issue 411423 bnc#1226772 https://git.kernel.org/stable/c/3d1face00ebb7996842aee4214d7d0fb0c77b1e9 https://git.kernel.org/stable/c/567d34626c22b36579ec0abfdf5eda2949044220 https://git.kernel.org/stable/c/77fce82678ea5fd51442e62febec2004f79e041b https://git.kernel.org/stable/c/8e9aab2492178f25372f1820bfd9289fbd74efd0 https://git.kernel.org/stable/c/ff48247144d13a3a0817127703724256008efa78 rh#2293424 |
CVE-2024-38571 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38571 SMASH Issue 411405 bnc#1226737 https://git.kernel.org/stable/c/06d17744b77bc6cb29a6c785f4fad8c4163ee653 https://git.kernel.org/stable/c/11c731386ed82053c2759b6fea1a82ae946e5e0f https://git.kernel.org/stable/c/27600e0c5272a262b0903e35ae1df37d33c5c1ad https://git.kernel.org/stable/c/2d5ca6e4a2872e92a32fdfd87e04dd7d3ced7278 https://git.kernel.org/stable/c/d998ddc86a27c92140b9f7984ff41e3d1d07a48f https://git.kernel.org/stable/c/fcf5f1b5f308f2eb422f6aca55d295b25890906b rh#2293422 |
CVE-2024-38572 | kernel-source-rt:Not affected | moderate | 5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) | CVE-2024-38572 SMASH Issue 411343 bnc#1226776 https://git.kernel.org/stable/c/95575de7dede7b1ed3b9718dab9dda97914ea775 https://git.kernel.org/stable/c/a1abdb63628b04855a929850772de97435ed1555 https://git.kernel.org/stable/c/b48d40f5840c505b7af700594aa8379eec28e925 https://git.kernel.org/stable/c/e1bdff48a1bb4a4ac660c19c55a820968c48b3f2 rh#2293421 |
CVE-2024-38573 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38573 SMASH Issue 411449 bnc#1226739 https://git.kernel.org/stable/c/769c4f355b7962895205b86ad35617873feef9a5 https://git.kernel.org/stable/c/9a185cc5a79ba408e1c73375706630662304f618 https://git.kernel.org/stable/c/b18daa4ec727c0266de5bfc78e818d168cc4aedf https://git.kernel.org/stable/c/cf7de25878a1f4508c69dc9f6819c21ba177dbfe https://git.kernel.org/stable/c/dfec15222529d22b15e5b0d63572a9e39570cab4 https://git.kernel.org/stable/c/f84b9b25d045e67a7eee5e73f21278c8ab06713c rh#2293420 |
CVE-2024-38574 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38574 SMASH Issue 411440 bnc#1226655 https://git.kernel.org/stable/c/1fd91360a75833b7110af9834ae26c977e1273e0 https://git.kernel.org/stable/c/9bf48fa19a4b1d186e08b20bf7e5de26a15644fb https://git.kernel.org/stable/c/ef80b59acfa4dee4b5eaccb15572b69248831104 rh#2293419 |
CVE-2024-38575 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38575 SMASH Issue 411400 bnc#1226612 https://git.kernel.org/stable/c/0eb2c0528e232b3c32cde9d5e1c9f80ba2996e49 https://git.kernel.org/stable/c/316f790ebcf94bdf59f794b7cdea4068dc676d4c https://git.kernel.org/stable/c/3729ca9e48d19a03ae049e2bde510e161c2f3720 https://git.kernel.org/stable/c/7c15eb344b0d4d3468c9b2a7591ad2b859b29b88 https://git.kernel.org/stable/c/c37466406f075476c2702ecc01917928af871f3b rh#2293418 |
CVE-2024-38576 | kernel-source-rt:Not affected | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2024-38576 SMASH Issue 411425 bnc#1226623 https://git.kernel.org/stable/c/3758f7d9917bd7ef0482c4184c0ad673b4c4e069 https://git.kernel.org/stable/c/4c3e2ef4d8ddd313c8ce3ac30505940bea8d6257 https://git.kernel.org/stable/c/9351e1338539cb7f319ffc1210fa9b2aa27384b5 https://git.kernel.org/stable/c/afb39909bfb5c08111f99e21bf5be7505f59ff1c https://git.kernel.org/stable/c/e2228ed3fe7aa838fba87c79a76fb1ad9ea47138 rh#2293417 |
CVE-2024-38577 | kernel-source-rt:Not affected | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2024-38577 SMASH Issue 411384 bnc#1226631 https://git.kernel.org/stable/c/08186d0c5fb64a1cc4b43e009314ee6b173ed222 https://git.kernel.org/stable/c/1a240e138071b25944ded0f5b3e357aa99fabcb7 https://git.kernel.org/stable/c/32d988f48ed287e676a29a15ac30701c35849aec https://git.kernel.org/stable/c/6593d857ce5b5b802fb73d8091ac9c84b92c1697 https://git.kernel.org/stable/c/cc5645fddb0ce28492b15520306d092730dffa48 rh#2293416 |
CVE-2024-38581 | kernel-source-rt:Not affected | moderate | 6.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H) | CVE-2024-38581 SMASH Issue 411426 bnc#1226657 https://git.kernel.org/stable/c/0f98c144c15c8fc0f3176c994bd4e727ef718a5c https://git.kernel.org/stable/c/39cfce75168c11421d70b8c0c65f6133edccb82a https://git.kernel.org/stable/c/70b1bf6d9edc8692d241f59a65f073aec6d501de https://git.kernel.org/stable/c/948255282074d9367e01908b3f5dcf8c10fc9c3d rh#2293408 |
CVE-2024-38582 | kernel-source-rt:Ignore | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38582 SMASH Issue 411452 bnc#1226658 https://git.kernel.org/stable/c/06afce714d87c7cd1dcfccbcd800c5c5d2cf1cfd https://git.kernel.org/stable/c/1c3844c5f4eac043954ebf6403fa9fd1f0e9c1c0 https://git.kernel.org/stable/c/6e5c8e8e024e147b834f56f2115aad241433679b https://git.kernel.org/stable/c/911d38be151921a5d152bb55e81fd752384c6830 https://git.kernel.org/stable/c/a8799662fed1f8747edae87a1937549288baca6a https://git.kernel.org/stable/c/bc9cee50a4a4ca23bdc49f75ea8242d8a2193b3b https://git.kernel.org/stable/c/c516db6ab9eabbedbc430b4f93b0d8728e9b427f https://git.kernel.org/stable/c/eb85dace897c5986bc2f36b3c783c6abb8a4292e https://git.kernel.org/stable/c/eff7cdf890b02596b8d73e910bdbdd489175dbdb jsc#CAR-3814 rh#2293407 |
CVE-2024-38583 | kernel-source-rt:Not affected | moderate | 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2024-38583 SMASH Issue 411429 bnc#1226777 https://git.kernel.org/stable/c/2f12b2c03c5dae1a0de0a9e5853177e3d6eee3c6 https://git.kernel.org/stable/c/67fa90d4a2ccd9ebb0e1e168c7d0b5d0cf3c7148 https://git.kernel.org/stable/c/68e738be5c518fc3c4e9146b66f67c8fee0135fb https://git.kernel.org/stable/c/822ae5a8eac30478578a75f7e064f0584931bf2d https://git.kernel.org/stable/c/82933c84f188dcfe89eb26b0b48ab5d1ca99d164 https://git.kernel.org/stable/c/86a30d6302deddb9fb97ba6fc4b04d0e870b582a https://git.kernel.org/stable/c/e65ccf3a4de4f0c763d94789615b83e11f204438 https://git.kernel.org/stable/c/f5d4e04634c9cf68bdf23de08ada0bb92e8befe7 https://git.kernel.org/stable/c/f9186bba4ea282b07293c1c892441df3a5441cb0 jsc#CAR-3847 rh#2293406 |
CVE-2024-38584 | kernel-source-rt:Not affected | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38584 SMASH Issue 411437 bnc#1226627 https://git.kernel.org/stable/c/1e1d5bd7f4682e6925dd960aba2a1aa1d93da53a https://git.kernel.org/stable/c/5cd17f0e74cb99d209945b9f1f06d411aa667eb1 https://git.kernel.org/stable/c/b0a82ebabbdc4c307f781bb0e5cd617949a3900d https://git.kernel.org/stable/c/b31c7e78086127a7fcaa761e8d336ee855a920c6 rh#2293405 |
CVE-2024-38585 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N) | CVE-2024-38585 SMASH Issue 411434 bnc#1226778 https://git.kernel.org/stable/c/4e6f225aefeb712cdb870176b6621f02cf235b8c https://git.kernel.org/stable/c/5996b2b2dac739f2a27da13de8eee5b85b2550b3 https://git.kernel.org/stable/c/791f4641142e2aced85de082e5783b4fb0b977c2 https://git.kernel.org/stable/c/8019d3dd921f39a237a9fab6d2ce716bfac0f983 https://git.kernel.org/stable/c/f678c3c336559cf3255a32153e9a17c1be4e7c15 rh#2293404 |
CVE-2024-38586 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38586 SMASH Issue 411450 bnc#1226750 https://git.kernel.org/stable/c/078d5b7500d70af2de6b38e226b03f0b932026a6 https://git.kernel.org/stable/c/0c48185a95309556725f818b82120bb74e9c627d https://git.kernel.org/stable/c/54e7a0d111240c92c0f02ceba6eb8f26bf6d6479 https://git.kernel.org/stable/c/68222d7b4b72aa321135cd453dac37f00ec41fd1 https://git.kernel.org/stable/c/b6d21cf40de103d63ae78551098a7c06af8c98dd https://git.kernel.org/stable/c/c71e3a5cffd5309d7f84444df03d5b72600cc417 rh#2293402 |
CVE-2024-38587 | kernel-source-rt:Not affected | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L) | CVE-2024-38587 SMASH Issue 411351 bnc#1226780 https://git.kernel.org/stable/c/008ab3c53bc4f0b2f20013c8f6c204a3203d0b8b https://git.kernel.org/stable/c/07ef95cc7a579731198c93beed281e3a79a0e586 https://git.kernel.org/stable/c/3726f75a1ccc16cd335c0ccfad1d92ee08ecba5e https://git.kernel.org/stable/c/42f0a3f67158ed6b2908d2b9ffbf7e96d23fd358 https://git.kernel.org/stable/c/504178fb7d9f6cdb0496d5491efb05f45597e535 https://git.kernel.org/stable/c/c6e1650cf5df1bd6638eeee231a683ef30c7d4eb https://git.kernel.org/stable/c/cd7f3978c2ec741aedd1d860b2adb227314cf996 https://git.kernel.org/stable/c/d52c04474feac8e305814a5228e622afe481b2ef https://git.kernel.org/stable/c/eb1ea64328d4cc7d7a912c563f8523d5259716ef rh#2293401 |
CVE-2024-38590 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38590 SMASH Issue 411416 bnc#1226839 https://git.kernel.org/stable/c/06cf121346bbd3d83a5eea05bb87666c6b279990 https://git.kernel.org/stable/c/17f3741c65c4a042ae8ba094068b07a4b77e213c https://git.kernel.org/stable/c/349e859952285ab9689779fb46de163f13f18f43 https://git.kernel.org/stable/c/45b31be4dd22827903df15c548b97b416790139b https://git.kernel.org/stable/c/6f541a89ced8305da459e3ab0006e7528cf7da7b https://git.kernel.org/stable/c/817a10a6df9354e67561922d2b7fce48dfbebc55 https://git.kernel.org/stable/c/cc699b7eb2bc963c12ffcd37f80f45330d2924bd rh#2293388 |
CVE-2024-38592 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38592 SMASH Issue 411371 bnc#1226844 https://git.kernel.org/stable/c/01a2c5123e27b3c4685bf2fc4c2e879f6e0c7b33 https://git.kernel.org/stable/c/9fe2cc3fa44f7ad7ba5f29c1a68b2b924c17b9b1 https://git.kernel.org/stable/c/cf69d0af7db917b82aceaa44b7b1b9376609da22 rh#2293385 |
CVE-2024-38593 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38593 SMASH Issue 411376 bnc#1226726 https://git.kernel.org/stable/c/3ddf170e4a604f5d4d9459a36993f5e92b53e8b0 https://git.kernel.org/stable/c/3fd4282d5f25c3c97fef3ef0b89b82ef4e2bc975 https://git.kernel.org/stable/c/64a47cf634ae44e92be24ebc982410841093bd7b https://git.kernel.org/stable/c/aea27a92a41dae14843f92c79e9e42d8f570105c rh#2293380 |
CVE-2024-38594 | kernel-source-rt:Not affected | moderate | 6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H) | CVE-2024-38594 SMASH Issue 411355 bnc#1226734 https://git.kernel.org/stable/c/36ac9e7f2e5786bd37c5cd91132e1f39c29b8197 https://git.kernel.org/stable/c/487f9030b1ef34bab123f2df2a4ccbe01ba84416 https://git.kernel.org/stable/c/6f476aff2d8da1a189621c4c16a76a6c534e4312 rh#2293376 |
CVE-2024-38595 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2024-38595 SMASH Issue 411415 bnc#1226741 https://git.kernel.org/stable/c/05d9d7b66836d87c914f8fdd4b062b78e373458d https://git.kernel.org/stable/c/3c453e8cc672de1f9c662948dba43176bc68d7f0 https://git.kernel.org/stable/c/a0501201751034ebe7a22bd9483ed28fea1cd213 rh#2293374 |
CVE-2024-38598 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38598 SMASH Issue 411413 bnc#1226757 https://git.kernel.org/stable/c/3f5b73ef8fd6268cbc968b308d8eafe56fda97f3 https://git.kernel.org/stable/c/43771597feba89a839c5f893716df88ae5c237ce https://git.kernel.org/stable/c/5817f43ae1a118855676f57ef7ab50e37eac7482 https://git.kernel.org/stable/c/69296914bfd508c85935bf5f711cad9b0fe78492 https://git.kernel.org/stable/c/71e8e4f288e74a896b6d9cd194f3bab12bd7a10f https://git.kernel.org/stable/c/8bbc71315e0ae4bb7e37f8d43b915e1cb01a481b https://git.kernel.org/stable/c/c9566b812c8f66160466cc1e29df6d3646add0b1 https://git.kernel.org/stable/c/d4b9c764d48fa41caa24cfb4275f3aa9fb4bd798 https://git.kernel.org/stable/c/f0e729af2eb6bee9eb58c4df1087f14ebaefe26b rh#2293367 |
CVE-2024-38602 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38602 SMASH Issue 411401 bnc#1226613 https://git.kernel.org/stable/c/1ea02699c7557eeb35ccff2bd822de1b3e09d868 https://git.kernel.org/stable/c/38eb01edfdaa1562fa00429be2e33f45383b1b3a https://git.kernel.org/stable/c/81d8240b0a243b3ddd8fa8aa172f1acc2f7cc8f3 https://git.kernel.org/stable/c/ae467750a3765dd1092eb29f58247950a2f9b60c https://git.kernel.org/stable/c/b505e0319852b08a3a716b64620168eab21f4ced rh#2293363 |
CVE-2024-38603 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38603 SMASH Issue 411404 bnc#1226842 https://git.kernel.org/stable/c/1491a01ef5a98149048b12e208f6ed8e86ad10b9 https://git.kernel.org/stable/c/2fcffaaf529d5fe3fdc6c0ee65a6f266b74de782 https://git.kernel.org/stable/c/582c1aeee0a9e73010cf1c4cef338709860deeb0 https://git.kernel.org/stable/c/a7678a16c25b6ece1667ac681e3e783ff3de7a6f https://git.kernel.org/stable/c/b1e86f1ef8fa796f8935be392457639f3a907d91 rh#2293362 |
CVE-2024-38604 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38604 SMASH Issue 411433 bnc#1226866 https://git.kernel.org/stable/c/0c12028aec837f5a002009bbf68d179d506510e8 https://git.kernel.org/stable/c/10b723bcba8986537a484aa94dbfc9093fd776a1 https://git.kernel.org/stable/c/72c54e063c32aeb38d43a2bd897821e6e5a1757d https://git.kernel.org/stable/c/910717920c8c3f9386277a44c44d448058a18084 rh#2293361 |
CVE-2024-38605 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38605 SMASH Issue 411350 bnc#1226740 https://git.kernel.org/stable/c/39381fe7394e5eafac76e7e9367e7351138a29c1 https://git.kernel.org/stable/c/6b8374ee2cabcf034faa34e69a855dc496a9ec12 https://git.kernel.org/stable/c/c935e72139e6d523defd60fe875c01eb1f9ea5c5 https://git.kernel.org/stable/c/d7ff29a429b56f04783152ad7bbd7233b740e434 https://git.kernel.org/stable/c/e007476725730c1a68387b54b7629486d8a8301e https://git.kernel.org/stable/c/e644036a3e2b2c9b3eee3c61b5d31c2ca8b5ba92 https://git.kernel.org/stable/c/e7e0ca200772bdb2fdc6d43d32d341e87a36f811 rh#2293359 |
CVE-2024-38606 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38606 SMASH Issue 411362 bnc#1226871 https://git.kernel.org/stable/c/483fd65ce29317044d1d00757e3fd23503b6b04c https://git.kernel.org/stable/c/9b284b915e2a5e63ca133353f8c456eff4446f82 https://git.kernel.org/stable/c/e57ed345e2e6043629fc74aa5be051415dcc4f77 rh#2293358 |
CVE-2024-38609 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38609 SMASH Issue 411456 bnc#1226751 https://git.kernel.org/stable/c/cb47c7be0e93dd5acda078163799401ac3a78e10 https://git.kernel.org/stable/c/e469218765b2781fb968778bd13595acec181a0e rh#2293355 |
CVE-2024-38610 | kernel-source-rt:Not affected | important | 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) | CVE-2024-38610 SMASH Issue 411448 bnc#1226758 https://git.kernel.org/stable/c/2c8d6e24930b8ef7d4a81787627c559ae0e0d3bb https://git.kernel.org/stable/c/3d6586008f7b638f91f3332602592caa8b00b559 https://git.kernel.org/stable/c/4c4ba3cf3a15ccfbaf787d0296fa42cdb00da9b4 https://git.kernel.org/stable/c/5c6705aa47b5b78d7ad36fea832bb69caa5bf49a https://git.kernel.org/stable/c/afeb0e69627695f759fc73c39c1640dbf8649b32 https://git.kernel.org/stable/c/e873f36ec890bece26ecce850e969917bceebbb6 rh#2293354 |
CVE-2024-38613 | kernel-source-rt:Not affected | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38613 SMASH Issue 411388 bnc#1226753 https://git.kernel.org/stable/c/0d9ae1253535f6e85a016e09c25ecbe6f7f59ef0 https://git.kernel.org/stable/c/2a8d1d95302c7d52c6ac8fa5cb4a6948ae0d3a14 https://git.kernel.org/stable/c/4eeffecc8e3cce25bb559502c2fd94a948bcde82 https://git.kernel.org/stable/c/5213cc01d0464c011fdc09f318705603ed3a746b https://git.kernel.org/stable/c/77b2b67a0f8bce260c53907e5749d61466d90c87 https://git.kernel.org/stable/c/95f00caf767b5968c2c51083957b38be4748a78a https://git.kernel.org/stable/c/da89ce46f02470ef08f0f580755d14d547da59ed https://git.kernel.org/stable/c/f1d4274a84c069be0f6098ab10c3443fc1f7134c https://git.kernel.org/stable/c/f3baf0f4f92af32943ebf27b960e0552c6c082fd jsc#CAR-3840 rh#2293350 |
CVE-2024-38614 | kernel-source-rt:Not affected | moderate | 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38614 SMASH Issue 411369 bnc#1226755 https://git.kernel.org/stable/c/075c0405b0d7d9fc490609e988a3af0069596538 https://git.kernel.org/stable/c/c0ed9a711e3392d73e857faa031d8d349c0d70db https://git.kernel.org/stable/c/c88cfb5cea5f8f9868ef02cc9ce9183a26dcf20f https://git.kernel.org/stable/c/cea9d0015c140af39477dd5eeb9b20233a45daa9 rh#2293349 |
CVE-2024-38616 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38616 SMASH Issue 411364 bnc#1226852 https://git.kernel.org/stable/c/042a39bb8e0812466327a5102606e88a5a4f8c02 https://git.kernel.org/stable/c/066afafc10c9476ee36c47c9062527a17e763901 https://git.kernel.org/stable/c/0c38c9c460bb8ce8d6f6cf316e0d71a70983ec83 https://git.kernel.org/stable/c/13857683126e8a6492af73c74d702835f7a2175b https://git.kernel.org/stable/c/87586467098281f04fa93e59fe3a516b954bddc4 rh#2293347 |
CVE-2024-38617 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38617 SMASH Issue 411366 bnc#1226859 https://git.kernel.org/stable/c/03758d5a0932016b6d5f5bfbca580177e6bc937a https://git.kernel.org/stable/c/42d21c9727028fe7ee392223ba127484b1b8677e https://git.kernel.org/stable/c/7880dbf4eafe22a6a41a42e774f1122c814ed02d https://git.kernel.org/stable/c/998b18072ceb0613629c256b409f4d299829c7ec rh#2293197 rh#2293198 |
CVE-2024-38622 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38622 SMASH Issue 411758 bnc#1226856 https://git.kernel.org/stable/c/530f272053a5e72243a9cb07bb1296af6c346002 https://git.kernel.org/stable/c/873f67699114452c2a996c4e10faac8ff860c241 https://git.kernel.org/stable/c/9078630ed7f8f25d65d11823e7f2b11a8e2f4f0f rh#2293705 |
CVE-2024-38623 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38623 SMASH Issue 411760 bnc#1226851 https://git.kernel.org/stable/c/1997cdc3e727526aa5d84b32f7cbb3f56459b7ef https://git.kernel.org/stable/c/1fe1c9dc21ee52920629d2d9b9bd84358931a8d1 https://git.kernel.org/stable/c/3839a9b19a4b70eff6b6ad70446f639f7fd5a3d7 https://git.kernel.org/stable/c/a2de301d90b782ac5d7a5fe32995caaee9ab3a0f https://git.kernel.org/stable/c/cceef44b34819c24bb6ed70dce5b524bd3e368d1 rh#2293704 |
CVE-2024-38624 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38624 SMASH Issue 411761 bnc#1226858 https://git.kernel.org/stable/c/109d85a98345ee52d47c650405dc51bdd2bc7d40 https://git.kernel.org/stable/c/2d1ad595d15f36a925480199bf1d9ad72614210b https://git.kernel.org/stable/c/847db4049f6189427ddaefcfc967d4d235b73c57 https://git.kernel.org/stable/c/98db3155b54d3684ef0ab5bfa0b856d13f65843d https://git.kernel.org/stable/c/e931f6b630ffb22d66caab202a52aa8cbb10c649 rh#2293703 |
CVE-2024-38625 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38625 SMASH Issue 411762 bnc#1226854 https://git.kernel.org/stable/c/1cd6c96219c429ebcfa8e79a865277376c563803 https://git.kernel.org/stable/c/6c8054d590668629bb2eb6fb4cbf22455d08ada8 https://git.kernel.org/stable/c/ff1068929459347f9e47f8d14c409dcf938c2641 rh#2293702 |
CVE-2024-38626 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38626 SMASH Issue 411763 bnc#1226853 https://git.kernel.org/stable/c/246014876d782bbf2e652267482cd2e799fb5fcd https://git.kernel.org/stable/c/533070db659a9589310a743e9de14cf9d651ffaf rh#2293701 |
CVE-2024-38628 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38628 SMASH Issue 411765 bnc#1226911 https://git.kernel.org/stable/c/1b739388aa3f8dfb63a9fca777e6dfa6912d0464 https://git.kernel.org/stable/c/453d3fa9266e53f85377b911c19b9a4563fa88c0 https://git.kernel.org/stable/c/89e66809684485590ea0b32c3178e42cba36ac09 https://git.kernel.org/stable/c/bea73b58ab67fe581037ad9cdb93c2557590c068 rh#2293699 |
CVE-2024-38629 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38629 SMASH Issue 411766 bnc#1226905 https://git.kernel.org/stable/c/15edb906211bf53e7b5574f7326ab734d6bff4f9 https://git.kernel.org/stable/c/76e43fa6a456787bad31b8d0daeabda27351a480 https://git.kernel.org/stable/c/9eb15f24a0b9b017b39cde8b8c07243676b63687 rh#2293698 |
CVE-2024-38631 | kernel-source-rt:Not affected | moderate | () | CVE-2024-38631 SMASH Issue 411768 bnc#1226862 https://git.kernel.org/stable/c/51fafb3cd7fcf4f4682693b4d2883e2a5bfffe33 https://git.kernel.org/stable/c/8dbcb3a8cfdf8ff5afce62dad50790278ff0d3b7 rh#2293937 |
CVE-2024-38632 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38632 SMASH Issue 411769 bnc#1226860 https://git.kernel.org/stable/c/0bd22a4966d55f1d2c127a53300d5c2b50152376 https://git.kernel.org/stable/c/35fef97c33f3d3ca0455f9a8e2a3f2c1f8cc9140 https://git.kernel.org/stable/c/82b951e6fbd31d85ae7f4feb5f00ddd4c5d256e2 rh#2293696 |
CVE-2024-38636 | kernel-source-rt:Not affected | low | 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) | CVE-2024-38636 SMASH Issue 411773 bnc#1226879 https://git.kernel.org/stable/c/1a9225fdd0ec95fcf32936bcea9ceef0cf1512dc https://git.kernel.org/stable/c/2b2611a42462c6c685d40b5f3aedcd8d21c27065 https://git.kernel.org/stable/c/33e62cd7b4c281cd737c62e5d8c4f0e602a8c5c5 https://git.kernel.org/stable/c/e8b485e39b4d17afa9a2821fc778d5a67abfc03a rh#2293692 |
CVE-2024-38661 | kernel-source-rt:Analysis | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38661 SMASH Issue 412087 bnc#1226996 https://git.kernel.org/stable/c/2062e3f1f2374102f8014d7ca286b9aa527bd558 https://git.kernel.org/stable/c/4c0bfb4e867c1ec6616a5049bd3618021e127056 https://git.kernel.org/stable/c/67011123453b91ec03671d40712fa213e94a01b9 https://git.kernel.org/stable/c/7360cef95aa1ea2b5efb7b5e2ed32e941664e1f0 https://git.kernel.org/stable/c/7c72af16abf2ec7520407098360bbba312289e05 https://git.kernel.org/stable/c/7dabe54a016defe11bb2a278cd9f1ff6db3feba6 https://git.kernel.org/stable/c/8c5f5911c1b13170d3404eb992c6a0deaa8d81ad https://git.kernel.org/stable/c/d4f9d5a99a3fd1b1c691b7a1a6f8f3f25f4116c9 rh#2294277 |
CVE-2024-38663 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38663 SMASH Issue 411965 bnc#1226939 https://git.kernel.org/stable/c/6da6680632792709cecf2b006f2fe3ca7857e791 https://git.kernel.org/stable/c/89bb36c72e1951843f9e04dc84412e31fcc849a9 https://git.kernel.org/stable/c/d4a60298ac34f027a09f8f893fdbd9e06279bb24 rh#2294225 |
CVE-2024-38664 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-38664 SMASH Issue 411970 bnc#1226941 https://git.kernel.org/stable/c/603661357056b5e5ba6d86f505fbc936eff396ba https://git.kernel.org/stable/c/6ead3eccf67bc8318b1ce95ed879b2cc05b4fce9 https://git.kernel.org/stable/c/be3f3042391d061cfca2bd22630e0d101acea5fc rh#2294224 |
CVE-2024-38667 | kernel-source-rt:Not affected | moderate | 6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) | CVE-2024-38667 SMASH Issue 411972 bnc#1226952 https://git.kernel.org/stable/c/0c1f28c32a194303da630fca89481334b9547b80 https://git.kernel.org/stable/c/3090c06d50eaa91317f84bf3eac4c265e6cb8d44 https://git.kernel.org/stable/c/a638b0461b58aa3205cd9d5f14d6f703d795b4af https://git.kernel.org/stable/c/ea22d4195cca13d5fdbc4d6555a2dfb8a7867a9e rh#2294219 |
CVE-2024-39277 | kernel-source-rt:Not affected | moderate | 6.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H) | CVE-2024-39277 SMASH Issue 411777 bnc#1226909 https://git.kernel.org/stable/c/50ee21bfc005e69f183d6b4b454e33f0c2571e1f https://git.kernel.org/stable/c/5a91116b003175302f2e6ad94b76fb9b5a141a41 https://git.kernel.org/stable/c/8e1ba9df9a35e8dc64f657a64e523c79ba01e464 https://git.kernel.org/stable/c/b41b0018e8ca06e985e87220a618ec633988fd13 https://git.kernel.org/stable/c/e64746e74f717961250a155e14c156616fcd981f rh#2293647 |
CVE-2024-39291 | kernel-source-rt:Not affected | moderate | 4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-39291 SMASH Issue 411974 bnc#1226934 https://git.kernel.org/stable/c/19bd9537b6bc1c882df25206c15917214d8e9460 https://git.kernel.org/stable/c/acce6479e30f73ab0872e93a75aed1fb791d04ec https://git.kernel.org/stable/c/f1b6a016dfa45cedc080d36fa5d6f22237d80e8b rh#2294223 |
CVE-2024-39296 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-39296 SMASH Issue 412090 bnc#1226989 https://git.kernel.org/stable/c/a45835a0bb6ef7d5ddbc0714dd760de979cb6ece https://git.kernel.org/stable/c/cf48aee81103ca06d09d73d33fb72f1191069aa6 https://git.kernel.org/stable/c/f07224c16678a8af54ddc059b3d2d51885d7f35e rh#2294270 |
CVE-2024-39371 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-39371 SMASH Issue 412094 bnc#1226990 https://git.kernel.org/stable/c/43cfac7b88adedfb26c27834386992650f1642f3 https://git.kernel.org/stable/c/5fc16fa5f13b3c06fdb959ef262050bd810416a2 https://git.kernel.org/stable/c/65561b4c1c9e01443cb76387eb36a9109e7048ee https://git.kernel.org/stable/c/c2844d5e58576c55d8e8d4a9f74902d3f7be8044 rh#2294243 |
CVE-2024-39467 | kernel-source-rt:Not affected | moderate | 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-39467 SMASH Issue 412089 bnc#1226991 https://git.kernel.org/stable/c/1640dcf383cdba52be8b28d2a1a2aa7ef7a30c98 https://git.kernel.org/stable/c/20faaf30e55522bba2b56d9c46689233205d7717 https://git.kernel.org/stable/c/68e3cd4ecb8603936cccdc338929130045df2e57 https://git.kernel.org/stable/c/75c87e2ac6149abf44bdde0dd6d541763ddb0dff https://git.kernel.org/stable/c/8c8aa473fe6eb46a4bf99f3ea2dbe52bf0c1a1f0 https://git.kernel.org/stable/c/be0155202e431f3007778568a72432c68f8946ba https://git.kernel.org/stable/c/c559a8d840562fbfce9f318448dda2f7d3e6d8e8 rh#2294305 |
CVE-2024-39470 | kernel-source-rt:Not affected | moderate | 4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) | CVE-2024-39470 SMASH Issue 412101 bnc#1226988 https://git.kernel.org/stable/c/5ade5fbdbbb1f023bb70730ba4d74146c8bc7eb9 https://git.kernel.org/stable/c/7a1b2d138189375ed1dcd7d0851118230221bd1d https://git.kernel.org/stable/c/d4e9a968738bf66d3bb852dd5588d4c7afd6d7f4 rh#2294311 |
CVE-2024-4603 | openssl:Not affected, openssl-1_1:Not affected | moderate | 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) | CVE-2024-4603 OSS:2024/05/16/2 OSS:2024/Q2/244 SMASH Issue 406062 bnc#1224388 https://github.com/openssl/openssl/commit/3559e868e58005d15c6013a0c1fd832e51c73397 https://github.com/openssl/openssl/commit/53ea06486d296b890d565fb971b2764fcd826e7e https://github.com/openssl/openssl/commit/9c39b3858091c152f52513c066ff2c5a47969f0d https://github.com/openssl/openssl/commit/da343d0605c826ef197aceedc67e8e04f065f740 https://security.netapp.com/advisory/ntap-20240621-0001/ https://www.openssl.org/news/secadv/20240516.txt openssl.git:commit:85ccbab216da245cf9a6503dd327072f21950d9b rh#2281029 |