virli/tutorial/2/mysql-vulns.html

2622 lines
209 KiB
HTML

<!DOCTYPE html>
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<style>
* {
font-family: Arial, Helvetica, sans-serif;
}
h1 {
text-align: center;
}
.group-header th {
font-size: 200%;
}
.sub-header th {
font-size: 150%;
}
table, th, td {
border: 1px solid black;
border-collapse: collapse;
white-space: nowrap;
padding: .3em;
}
table {
margin: 0 auto;
}
.severity {
text-align: center;
font-weight: bold;
color: #fafafa;
}
.severity-LOW .severity { background-color: #5fbb31; }
.severity-MEDIUM .severity { background-color: #e9c600; }
.severity-HIGH .severity { background-color: #ff8800; }
.severity-CRITICAL .severity { background-color: #e40000; }
.severity-UNKNOWN .severity { background-color: #747474; }
.severity-LOW { background-color: #5fbb3160; }
.severity-MEDIUM { background-color: #e9c60060; }
.severity-HIGH { background-color: #ff880060; }
.severity-CRITICAL { background-color: #e4000060; }
.severity-UNKNOWN { background-color: #74747460; }
table tr td:first-of-type {
font-weight: bold;
}
.links a,
.links[data-more-links=on] a {
display: block;
}
.links[data-more-links=off] a:nth-of-type(1n+5) {
display: none;
}
a.toggle-more-links { cursor: pointer; }
</style>
<title>mysql (debian 10.10) - Trivy Report - 2021-09-22T10:42:18.386879865Z</title>
<script>
window.onload = function() {
document.querySelectorAll('td.links').forEach(function(linkCell) {
var links = [].concat.apply([], linkCell.querySelectorAll('a'));
[].sort.apply(links, function(a, b) {
return a.href > b.href ? 1 : -1;
});
links.forEach(function(link, idx) {
if (links.length > 3 && 3 === idx) {
var toggleLink = document.createElement('a');
toggleLink.innerText = "Toggle more links";
toggleLink.href = "#toggleMore";
toggleLink.setAttribute("class", "toggle-more-links");
linkCell.appendChild(toggleLink);
}
linkCell.appendChild(link);
});
});
document.querySelectorAll('a.toggle-more-links').forEach(function(toggleLink) {
toggleLink.onclick = function() {
var expanded = toggleLink.parentElement.getAttribute("data-more-links");
toggleLink.parentElement.setAttribute("data-more-links", "on" === expanded ? "off" : "on");
return false;
};
});
};
</script>
</head>
<body>
<h1>mysql (debian 10.10) - Trivy Report - 2021-09-22T10:42:18.386919104Z</h1>
<table>
<tr class="group-header"><th colspan="6">debian</th></tr>
<tr class="sub-header">
<th>Package</th>
<th>Vulnerability ID</th>
<th>Severity</th>
<th>Installed Version</th>
<th>Fixed Version</th>
<th>Links</th>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">apt</td>
<td>CVE-2011-3374</td>
<td class="severity">LOW</td>
<td class="pkg-version">1.8.2.3</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/cve-2011-3374">https://access.redhat.com/security/cve/cve-2011-3374</a>
<a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480</a>
<a href="https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html">https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html</a>
<a href="https://seclists.org/fulldisclosure/2011/Sep/221">https://seclists.org/fulldisclosure/2011/Sep/221</a>
<a href="https://security-tracker.debian.org/tracker/CVE-2011-3374">https://security-tracker.debian.org/tracker/CVE-2011-3374</a>
<a href="https://snyk.io/vuln/SNYK-LINUX-APT-116518">https://snyk.io/vuln/SNYK-LINUX-APT-116518</a>
<a href="https://ubuntu.com/security/CVE-2011-3374">https://ubuntu.com/security/CVE-2011-3374</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">bash</td>
<td>CVE-2019-18276</td>
<td class="severity">HIGH</td>
<td class="pkg-version">5.0-4</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html">http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276</a>
<a href="https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff">https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff</a>
<a href="https://linux.oracle.com/cve/CVE-2019-18276.html">https://linux.oracle.com/cve/CVE-2019-18276.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2021-1679.html">https://linux.oracle.com/errata/ELSA-2021-1679.html</a>
<a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a>
<a href="https://security.gentoo.org/glsa/202105-34">https://security.gentoo.org/glsa/202105-34</a>
<a href="https://security.netapp.com/advisory/ntap-20200430-0003/">https://security.netapp.com/advisory/ntap-20200430-0003/</a>
<a href="https://www.youtube.com/watch?v=-wGtxJ8opa8">https://www.youtube.com/watch?v=-wGtxJ8opa8</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">bsdutils</td>
<td>CVE-2021-37600</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">2.33.1-0.1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a>
<a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a>
<a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">coreutils</td>
<td>CVE-2016-2781</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">8.30-3</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://seclists.org/oss-sec/2016/q1/452">http://seclists.org/oss-sec/2016/q1/452</a>
<a href="http://www.openwall.com/lists/oss-security/2016/02/28/2">http://www.openwall.com/lists/oss-security/2016/02/28/2</a>
<a href="http://www.openwall.com/lists/oss-security/2016/02/28/3">http://www.openwall.com/lists/oss-security/2016/02/28/3</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781</a>
<a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a>
<a href="https://lore.kernel.org/patchwork/patch/793178/">https://lore.kernel.org/patchwork/patch/793178/</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">coreutils</td>
<td>CVE-2017-18018</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">8.30-3</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html">http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">dirmngr</td>
<td>CVE-2019-14855</td>
<td class="severity">HIGH</td>
<td class="pkg-version">2.2.12-1+deb10u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855</a>
<a href="https://dev.gnupg.org/T4755">https://dev.gnupg.org/T4755</a>
<a href="https://eprint.iacr.org/2020/014.pdf">https://eprint.iacr.org/2020/014.pdf</a>
<a href="https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html">https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html</a>
<a href="https://rwc.iacr.org/2020/slides/Leurent.pdf">https://rwc.iacr.org/2020/slides/Leurent.pdf</a>
<a href="https://ubuntu.com/security/notices/USN-4516-1">https://ubuntu.com/security/notices/USN-4516-1</a>
<a href="https://usn.ubuntu.com/4516-1/">https://usn.ubuntu.com/4516-1/</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">fdisk</td>
<td>CVE-2021-37600</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">2.33.1-0.1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a>
<a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a>
<a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">gcc-8-base</td>
<td>CVE-2018-12886</td>
<td class="severity">HIGH</td>
<td class="pkg-version">8.3.0-6</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup">https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup</a>
<a href="https://www.gnu.org/software/gcc/gcc-8/changes.html">https://www.gnu.org/software/gcc/gcc-8/changes.html</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">gcc-8-base</td>
<td>CVE-2019-15847</td>
<td class="severity">HIGH</td>
<td class="pkg-version">8.3.0-6</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html</a>
<a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html</a>
<a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html</a>
<a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481">https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481</a>
<a href="https://linux.oracle.com/cve/CVE-2019-15847.html">https://linux.oracle.com/cve/CVE-2019-15847.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2020-1864.html">https://linux.oracle.com/errata/ELSA-2020-1864.html</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">gnupg</td>
<td>CVE-2019-14855</td>
<td class="severity">HIGH</td>
<td class="pkg-version">2.2.12-1+deb10u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855</a>
<a href="https://dev.gnupg.org/T4755">https://dev.gnupg.org/T4755</a>
<a href="https://eprint.iacr.org/2020/014.pdf">https://eprint.iacr.org/2020/014.pdf</a>
<a href="https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html">https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html</a>
<a href="https://rwc.iacr.org/2020/slides/Leurent.pdf">https://rwc.iacr.org/2020/slides/Leurent.pdf</a>
<a href="https://ubuntu.com/security/notices/USN-4516-1">https://ubuntu.com/security/notices/USN-4516-1</a>
<a href="https://usn.ubuntu.com/4516-1/">https://usn.ubuntu.com/4516-1/</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">gnupg-l10n</td>
<td>CVE-2019-14855</td>
<td class="severity">HIGH</td>
<td class="pkg-version">2.2.12-1+deb10u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855</a>
<a href="https://dev.gnupg.org/T4755">https://dev.gnupg.org/T4755</a>
<a href="https://eprint.iacr.org/2020/014.pdf">https://eprint.iacr.org/2020/014.pdf</a>
<a href="https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html">https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html</a>
<a href="https://rwc.iacr.org/2020/slides/Leurent.pdf">https://rwc.iacr.org/2020/slides/Leurent.pdf</a>
<a href="https://ubuntu.com/security/notices/USN-4516-1">https://ubuntu.com/security/notices/USN-4516-1</a>
<a href="https://usn.ubuntu.com/4516-1/">https://usn.ubuntu.com/4516-1/</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">gnupg-utils</td>
<td>CVE-2019-14855</td>
<td class="severity">HIGH</td>
<td class="pkg-version">2.2.12-1+deb10u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855</a>
<a href="https://dev.gnupg.org/T4755">https://dev.gnupg.org/T4755</a>
<a href="https://eprint.iacr.org/2020/014.pdf">https://eprint.iacr.org/2020/014.pdf</a>
<a href="https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html">https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html</a>
<a href="https://rwc.iacr.org/2020/slides/Leurent.pdf">https://rwc.iacr.org/2020/slides/Leurent.pdf</a>
<a href="https://ubuntu.com/security/notices/USN-4516-1">https://ubuntu.com/security/notices/USN-4516-1</a>
<a href="https://usn.ubuntu.com/4516-1/">https://usn.ubuntu.com/4516-1/</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">gpg</td>
<td>CVE-2019-14855</td>
<td class="severity">HIGH</td>
<td class="pkg-version">2.2.12-1+deb10u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855</a>
<a href="https://dev.gnupg.org/T4755">https://dev.gnupg.org/T4755</a>
<a href="https://eprint.iacr.org/2020/014.pdf">https://eprint.iacr.org/2020/014.pdf</a>
<a href="https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html">https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html</a>
<a href="https://rwc.iacr.org/2020/slides/Leurent.pdf">https://rwc.iacr.org/2020/slides/Leurent.pdf</a>
<a href="https://ubuntu.com/security/notices/USN-4516-1">https://ubuntu.com/security/notices/USN-4516-1</a>
<a href="https://usn.ubuntu.com/4516-1/">https://usn.ubuntu.com/4516-1/</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">gpg-agent</td>
<td>CVE-2019-14855</td>
<td class="severity">HIGH</td>
<td class="pkg-version">2.2.12-1+deb10u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855</a>
<a href="https://dev.gnupg.org/T4755">https://dev.gnupg.org/T4755</a>
<a href="https://eprint.iacr.org/2020/014.pdf">https://eprint.iacr.org/2020/014.pdf</a>
<a href="https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html">https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html</a>
<a href="https://rwc.iacr.org/2020/slides/Leurent.pdf">https://rwc.iacr.org/2020/slides/Leurent.pdf</a>
<a href="https://ubuntu.com/security/notices/USN-4516-1">https://ubuntu.com/security/notices/USN-4516-1</a>
<a href="https://usn.ubuntu.com/4516-1/">https://usn.ubuntu.com/4516-1/</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">gpg-wks-client</td>
<td>CVE-2019-14855</td>
<td class="severity">HIGH</td>
<td class="pkg-version">2.2.12-1+deb10u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855</a>
<a href="https://dev.gnupg.org/T4755">https://dev.gnupg.org/T4755</a>
<a href="https://eprint.iacr.org/2020/014.pdf">https://eprint.iacr.org/2020/014.pdf</a>
<a href="https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html">https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html</a>
<a href="https://rwc.iacr.org/2020/slides/Leurent.pdf">https://rwc.iacr.org/2020/slides/Leurent.pdf</a>
<a href="https://ubuntu.com/security/notices/USN-4516-1">https://ubuntu.com/security/notices/USN-4516-1</a>
<a href="https://usn.ubuntu.com/4516-1/">https://usn.ubuntu.com/4516-1/</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">gpg-wks-server</td>
<td>CVE-2019-14855</td>
<td class="severity">HIGH</td>
<td class="pkg-version">2.2.12-1+deb10u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855</a>
<a href="https://dev.gnupg.org/T4755">https://dev.gnupg.org/T4755</a>
<a href="https://eprint.iacr.org/2020/014.pdf">https://eprint.iacr.org/2020/014.pdf</a>
<a href="https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html">https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html</a>
<a href="https://rwc.iacr.org/2020/slides/Leurent.pdf">https://rwc.iacr.org/2020/slides/Leurent.pdf</a>
<a href="https://ubuntu.com/security/notices/USN-4516-1">https://ubuntu.com/security/notices/USN-4516-1</a>
<a href="https://usn.ubuntu.com/4516-1/">https://usn.ubuntu.com/4516-1/</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">gpgconf</td>
<td>CVE-2019-14855</td>
<td class="severity">HIGH</td>
<td class="pkg-version">2.2.12-1+deb10u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855</a>
<a href="https://dev.gnupg.org/T4755">https://dev.gnupg.org/T4755</a>
<a href="https://eprint.iacr.org/2020/014.pdf">https://eprint.iacr.org/2020/014.pdf</a>
<a href="https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html">https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html</a>
<a href="https://rwc.iacr.org/2020/slides/Leurent.pdf">https://rwc.iacr.org/2020/slides/Leurent.pdf</a>
<a href="https://ubuntu.com/security/notices/USN-4516-1">https://ubuntu.com/security/notices/USN-4516-1</a>
<a href="https://usn.ubuntu.com/4516-1/">https://usn.ubuntu.com/4516-1/</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">gpgsm</td>
<td>CVE-2019-14855</td>
<td class="severity">HIGH</td>
<td class="pkg-version">2.2.12-1+deb10u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855</a>
<a href="https://dev.gnupg.org/T4755">https://dev.gnupg.org/T4755</a>
<a href="https://eprint.iacr.org/2020/014.pdf">https://eprint.iacr.org/2020/014.pdf</a>
<a href="https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html">https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html</a>
<a href="https://rwc.iacr.org/2020/slides/Leurent.pdf">https://rwc.iacr.org/2020/slides/Leurent.pdf</a>
<a href="https://ubuntu.com/security/notices/USN-4516-1">https://ubuntu.com/security/notices/USN-4516-1</a>
<a href="https://usn.ubuntu.com/4516-1/">https://usn.ubuntu.com/4516-1/</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">gpgv</td>
<td>CVE-2019-14855</td>
<td class="severity">HIGH</td>
<td class="pkg-version">2.2.12-1+deb10u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14855</a>
<a href="https://dev.gnupg.org/T4755">https://dev.gnupg.org/T4755</a>
<a href="https://eprint.iacr.org/2020/014.pdf">https://eprint.iacr.org/2020/014.pdf</a>
<a href="https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html">https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html</a>
<a href="https://rwc.iacr.org/2020/slides/Leurent.pdf">https://rwc.iacr.org/2020/slides/Leurent.pdf</a>
<a href="https://ubuntu.com/security/notices/USN-4516-1">https://ubuntu.com/security/notices/USN-4516-1</a>
<a href="https://usn.ubuntu.com/4516-1/">https://usn.ubuntu.com/4516-1/</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">krb5-locales</td>
<td>CVE-2018-5709</td>
<td class="severity">HIGH</td>
<td class="pkg-version">1.17-3+deb10u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709</a>
<a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a>
<a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">krb5-locales</td>
<td>CVE-2021-37750</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1.17-3+deb10u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49">https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49</a>
<a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/</a>
<a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">krb5-locales</td>
<td>CVE-2004-0971</td>
<td class="severity">LOW</td>
<td class="pkg-version">1.17-3+deb10u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304</a>
<a href="http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml">http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml</a>
<a href="http://www.redhat.com/support/errata/RHSA-2005-012.html">http://www.redhat.com/support/errata/RHSA-2005-012.html</a>
<a href="http://www.securityfocus.com/bid/11289">http://www.securityfocus.com/bid/11289</a>
<a href="http://www.trustix.org/errata/2004/0050">http://www.trustix.org/errata/2004/0050</a>
<a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/17583">https://exchange.xforce.ibmcloud.com/vulnerabilities/17583</a>
<a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a>
<a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libapt-pkg5.0</td>
<td>CVE-2011-3374</td>
<td class="severity">LOW</td>
<td class="pkg-version">1.8.2.3</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/cve-2011-3374">https://access.redhat.com/security/cve/cve-2011-3374</a>
<a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480</a>
<a href="https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html">https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html</a>
<a href="https://seclists.org/fulldisclosure/2011/Sep/221">https://seclists.org/fulldisclosure/2011/Sep/221</a>
<a href="https://security-tracker.debian.org/tracker/CVE-2011-3374">https://security-tracker.debian.org/tracker/CVE-2011-3374</a>
<a href="https://snyk.io/vuln/SNYK-LINUX-APT-116518">https://snyk.io/vuln/SNYK-LINUX-APT-116518</a>
<a href="https://ubuntu.com/security/CVE-2011-3374">https://ubuntu.com/security/CVE-2011-3374</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libblkid1</td>
<td>CVE-2021-37600</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">2.33.1-0.1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a>
<a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a>
<a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a>
</td>
</tr>
<tr class="severity-CRITICAL">
<td class="pkg-name">libc-bin</td>
<td>CVE-2019-1010022</td>
<td class="severity">CRITICAL</td>
<td class="pkg-version">2.28-10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://security-tracker.debian.org/tracker/CVE-2019-1010022">https://security-tracker.debian.org/tracker/CVE-2019-1010022</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22850">https://sourceware.org/bugzilla/show_bug.cgi?id=22850</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3">https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3</a>
<a href="https://ubuntu.com/security/CVE-2019-1010022">https://ubuntu.com/security/CVE-2019-1010022</a>
</td>
</tr>
<tr class="severity-CRITICAL">
<td class="pkg-name">libc-bin</td>
<td>CVE-2021-33574</td>
<td class="severity">CRITICAL</td>
<td class="pkg-version">2.28-10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/</a>
<a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a>
<a href="https://security.netapp.com/advisory/ntap-20210629-0005/">https://security.netapp.com/advisory/ntap-20210629-0005/</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27896">https://sourceware.org/bugzilla/show_bug.cgi?id=27896</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1">https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1</a>
</td>
</tr>
<tr class="severity-CRITICAL">
<td class="pkg-name">libc-bin</td>
<td>CVE-2021-35942</td>
<td class="severity">CRITICAL</td>
<td class="pkg-version">2.28-10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://security.netapp.com/advisory/ntap-20210827-0005/">https://security.netapp.com/advisory/ntap-20210827-0005/</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28011">https://sourceware.org/bugzilla/show_bug.cgi?id=28011</a>
<a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c">https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c</a>
<a href="https://sourceware.org/glibc/wiki/Security%20Exceptions">https://sourceware.org/glibc/wiki/Security%20Exceptions</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libc-bin</td>
<td>CVE-2018-20796</td>
<td class="severity">HIGH</td>
<td class="pkg-version">2.28-10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.securityfocus.com/bid/107160">http://www.securityfocus.com/bid/107160</a>
<a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141</a>
<a href="https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html">https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html</a>
<a href="https://security.netapp.com/advisory/ntap-20190315-0002/">https://security.netapp.com/advisory/ntap-20190315-0002/</a>
<a href="https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libc-bin</td>
<td>CVE-2019-1010023</td>
<td class="severity">HIGH</td>
<td class="pkg-version">2.28-10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.securityfocus.com/bid/109167">http://www.securityfocus.com/bid/109167</a>
<a href="https://security-tracker.debian.org/tracker/CVE-2019-1010023">https://security-tracker.debian.org/tracker/CVE-2019-1010023</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22851">https://sourceware.org/bugzilla/show_bug.cgi?id=22851</a>
<a href="https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;amp;utm_medium=RSS</a>
<a href="https://ubuntu.com/security/CVE-2019-1010023">https://ubuntu.com/security/CVE-2019-1010023</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libc-bin</td>
<td>CVE-2019-9192</td>
<td class="severity">HIGH</td>
<td class="pkg-version">2.28-10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24269">https://sourceware.org/bugzilla/show_bug.cgi?id=24269</a>
<a href="https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libc-bin</td>
<td>CVE-2020-1751</td>
<td class="severity">HIGH</td>
<td class="pkg-version">2.28-10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751</a>
<a href="https://linux.oracle.com/cve/CVE-2020-1751.html">https://linux.oracle.com/cve/CVE-2020-1751.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2020-4444.html">https://linux.oracle.com/errata/ELSA-2020-4444.html</a>
<a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a>
<a href="https://security.netapp.com/advisory/ntap-20200430-0002/">https://security.netapp.com/advisory/ntap-20200430-0002/</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25423">https://sourceware.org/bugzilla/show_bug.cgi?id=25423</a>
<a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a>
<a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libc-bin</td>
<td>CVE-2020-1752</td>
<td class="severity">HIGH</td>
<td class="pkg-version">2.28-10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752</a>
<a href="https://linux.oracle.com/cve/CVE-2020-1752.html">https://linux.oracle.com/cve/CVE-2020-1752.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2020-4444.html">https://linux.oracle.com/errata/ELSA-2020-4444.html</a>
<a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a>
<a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a>
<a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a>
<a href="https://security.netapp.com/advisory/ntap-20200511-0005/">https://security.netapp.com/advisory/ntap-20200511-0005/</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25414">https://sourceware.org/bugzilla/show_bug.cgi?id=25414</a>
<a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c">https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c</a>
<a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a>
<a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libc-bin</td>
<td>CVE-2020-6096</td>
<td class="severity">HIGH</td>
<td class="pkg-version">2.28-10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096</a>
<a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/</a>
<a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a>
<a href="https://sourceware.org/bugzilla/attachment.cgi?id=12334">https://sourceware.org/bugzilla/attachment.cgi?id=12334</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25620">https://sourceware.org/bugzilla/show_bug.cgi?id=25620</a>
<a href="https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019">https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a>
<a href="https://ubuntu.com/security/notices/USN-4954-1">https://ubuntu.com/security/notices/USN-4954-1</a>
<a href="https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019">https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libc-bin</td>
<td>CVE-2021-3326</td>
<td class="severity">HIGH</td>
<td class="pkg-version">2.28-10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.openwall.com/lists/oss-security/2021/01/28/2">http://www.openwall.com/lists/oss-security/2021/01/28/2</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326</a>
<a href="https://linux.oracle.com/cve/CVE-2021-3326.html">https://linux.oracle.com/cve/CVE-2021-3326.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a>
<a href="https://security.netapp.com/advisory/ntap-20210304-0007/">https://security.netapp.com/advisory/ntap-20210304-0007/</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27256">https://sourceware.org/bugzilla/show_bug.cgi?id=27256</a>
<a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888">https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888</a>
<a href="https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html">https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libc-bin</td>
<td>CVE-2010-4051</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">2.28-10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://cxib.net/stuff/proftpd.gnu.c">http://cxib.net/stuff/proftpd.gnu.c</a>
<a href="http://seclists.org/fulldisclosure/2011/Jan/78">http://seclists.org/fulldisclosure/2011/Jan/78</a>
<a href="http://secunia.com/advisories/42547">http://secunia.com/advisories/42547</a>
<a href="http://securityreason.com/achievement_securityalert/93">http://securityreason.com/achievement_securityalert/93</a>
<a href="http://securityreason.com/securityalert/8003">http://securityreason.com/securityalert/8003</a>
<a href="http://securitytracker.com/id?1024832">http://securitytracker.com/id?1024832</a>
<a href="http://www.exploit-db.com/exploits/15935">http://www.exploit-db.com/exploits/15935</a>
<a href="http://www.kb.cert.org/vuls/id/912279">http://www.kb.cert.org/vuls/id/912279</a>
<a href="http://www.securityfocus.com/archive/1/515589/100/0/threaded">http://www.securityfocus.com/archive/1/515589/100/0/threaded</a>
<a href="http://www.securityfocus.com/bid/45233">http://www.securityfocus.com/bid/45233</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=645859">https://bugzilla.redhat.com/show_bug.cgi?id=645859</a>
<a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libc-bin</td>
<td>CVE-2010-4052</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">2.28-10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://cxib.net/stuff/proftpd.gnu.c">http://cxib.net/stuff/proftpd.gnu.c</a>
<a href="http://seclists.org/fulldisclosure/2011/Jan/78">http://seclists.org/fulldisclosure/2011/Jan/78</a>
<a href="http://secunia.com/advisories/42547">http://secunia.com/advisories/42547</a>
<a href="http://securityreason.com/achievement_securityalert/93">http://securityreason.com/achievement_securityalert/93</a>
<a href="http://securityreason.com/securityalert/8003">http://securityreason.com/securityalert/8003</a>
<a href="http://securitytracker.com/id?1024832">http://securitytracker.com/id?1024832</a>
<a href="http://www.exploit-db.com/exploits/15935">http://www.exploit-db.com/exploits/15935</a>
<a href="http://www.kb.cert.org/vuls/id/912279">http://www.kb.cert.org/vuls/id/912279</a>
<a href="http://www.securityfocus.com/archive/1/515589/100/0/threaded">http://www.securityfocus.com/archive/1/515589/100/0/threaded</a>
<a href="http://www.securityfocus.com/bid/45233">http://www.securityfocus.com/bid/45233</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=645859">https://bugzilla.redhat.com/show_bug.cgi?id=645859</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libc-bin</td>
<td>CVE-2010-4756</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">2.28-10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://cxib.net/stuff/glob-0day.c">http://cxib.net/stuff/glob-0day.c</a>
<a href="http://securityreason.com/achievement_securityalert/89">http://securityreason.com/achievement_securityalert/89</a>
<a href="http://securityreason.com/exploitalert/9223">http://securityreason.com/exploitalert/9223</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=681681">https://bugzilla.redhat.com/show_bug.cgi?id=681681</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libc-bin</td>
<td>CVE-2016-10228</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">2.28-10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://openwall.com/lists/oss-security/2017/03/01/10">http://openwall.com/lists/oss-security/2017/03/01/10</a>
<a href="http://www.securityfocus.com/bid/96525">http://www.securityfocus.com/bid/96525</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228</a>
<a href="https://linux.oracle.com/cve/CVE-2016-10228.html">https://linux.oracle.com/cve/CVE-2016-10228.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a>
<a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a>
<a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519">https://sourceware.org/bugzilla/show_bug.cgi?id=19519</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libc-bin</td>
<td>CVE-2019-1010024</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">2.28-10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.securityfocus.com/bid/109162">http://www.securityfocus.com/bid/109162</a>
<a href="https://security-tracker.debian.org/tracker/CVE-2019-1010024">https://security-tracker.debian.org/tracker/CVE-2019-1010024</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22852">https://sourceware.org/bugzilla/show_bug.cgi?id=22852</a>
<a href="https://support.f5.com/csp/article/K06046097">https://support.f5.com/csp/article/K06046097</a>
<a href="https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS</a>
<a href="https://ubuntu.com/security/CVE-2019-1010024">https://ubuntu.com/security/CVE-2019-1010024</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libc-bin</td>
<td>CVE-2019-1010025</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">2.28-10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://security-tracker.debian.org/tracker/CVE-2019-1010025">https://security-tracker.debian.org/tracker/CVE-2019-1010025</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22853">https://sourceware.org/bugzilla/show_bug.cgi?id=22853</a>
<a href="https://support.f5.com/csp/article/K06046097">https://support.f5.com/csp/article/K06046097</a>
<a href="https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS</a>
<a href="https://ubuntu.com/security/CVE-2019-1010025">https://ubuntu.com/security/CVE-2019-1010025</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libc-bin</td>
<td>CVE-2019-25013</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">2.28-10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013</a>
<a href="https://linux.oracle.com/cve/CVE-2019-25013.html">https://linux.oracle.com/cve/CVE-2019-25013.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a>
<a href="https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E</a>
<a href="https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E</a>
<a href="https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E</a>
<a href="https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E</a>
<a href="https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E</a>
<a href="https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E</a>
<a href="https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E</a>
<a href="https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E</a>
<a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/</a>
<a href="https://security.netapp.com/advisory/ntap-20210205-0004/">https://security.netapp.com/advisory/ntap-20210205-0004/</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24973">https://sourceware.org/bugzilla/show_bug.cgi?id=24973</a>
<a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b">https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libc-bin</td>
<td>CVE-2020-10029</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">2.28-10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029</a>
<a href="https://linux.oracle.com/cve/CVE-2020-10029.html">https://linux.oracle.com/cve/CVE-2020-10029.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2021-0348.html">https://linux.oracle.com/errata/ELSA-2021-0348.html</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/</a>
<a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a>
<a href="https://security.netapp.com/advisory/ntap-20200327-0003/">https://security.netapp.com/advisory/ntap-20200327-0003/</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25487">https://sourceware.org/bugzilla/show_bug.cgi?id=25487</a>
<a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f">https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f</a>
<a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a>
<a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libc-bin</td>
<td>CVE-2020-27618</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">2.28-10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618</a>
<a href="https://linux.oracle.com/cve/CVE-2020-27618.html">https://linux.oracle.com/cve/CVE-2020-27618.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a>
<a href="https://security.netapp.com/advisory/ntap-20210401-0006/">https://security.netapp.com/advisory/ntap-20210401-0006/</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libc-bin</td>
<td>CVE-2019-19126</td>
<td class="severity">LOW</td>
<td class="pkg-version">2.28-10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126</a>
<a href="https://linux.oracle.com/cve/CVE-2019-19126.html">https://linux.oracle.com/cve/CVE-2019-19126.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2020-3861.html">https://linux.oracle.com/errata/ELSA-2020-3861.html</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25204">https://sourceware.org/bugzilla/show_bug.cgi?id=25204</a>
<a href="https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html">https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html</a>
<a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a>
<a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libc-bin</td>
<td>CVE-2021-27645</td>
<td class="severity">LOW</td>
<td class="pkg-version">2.28-10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27462">https://sourceware.org/bugzilla/show_bug.cgi?id=27462</a>
</td>
</tr>
<tr class="severity-CRITICAL">
<td class="pkg-name">libc6</td>
<td>CVE-2019-1010022</td>
<td class="severity">CRITICAL</td>
<td class="pkg-version">2.28-10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://security-tracker.debian.org/tracker/CVE-2019-1010022">https://security-tracker.debian.org/tracker/CVE-2019-1010022</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22850">https://sourceware.org/bugzilla/show_bug.cgi?id=22850</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3">https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3</a>
<a href="https://ubuntu.com/security/CVE-2019-1010022">https://ubuntu.com/security/CVE-2019-1010022</a>
</td>
</tr>
<tr class="severity-CRITICAL">
<td class="pkg-name">libc6</td>
<td>CVE-2021-33574</td>
<td class="severity">CRITICAL</td>
<td class="pkg-version">2.28-10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/</a>
<a href="https://security.gentoo.org/glsa/202107-07">https://security.gentoo.org/glsa/202107-07</a>
<a href="https://security.netapp.com/advisory/ntap-20210629-0005/">https://security.netapp.com/advisory/ntap-20210629-0005/</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27896">https://sourceware.org/bugzilla/show_bug.cgi?id=27896</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1">https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1</a>
</td>
</tr>
<tr class="severity-CRITICAL">
<td class="pkg-name">libc6</td>
<td>CVE-2021-35942</td>
<td class="severity">CRITICAL</td>
<td class="pkg-version">2.28-10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://security.netapp.com/advisory/ntap-20210827-0005/">https://security.netapp.com/advisory/ntap-20210827-0005/</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28011">https://sourceware.org/bugzilla/show_bug.cgi?id=28011</a>
<a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c">https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c</a>
<a href="https://sourceware.org/glibc/wiki/Security%20Exceptions">https://sourceware.org/glibc/wiki/Security%20Exceptions</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libc6</td>
<td>CVE-2018-20796</td>
<td class="severity">HIGH</td>
<td class="pkg-version">2.28-10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.securityfocus.com/bid/107160">http://www.securityfocus.com/bid/107160</a>
<a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141</a>
<a href="https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html">https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html</a>
<a href="https://security.netapp.com/advisory/ntap-20190315-0002/">https://security.netapp.com/advisory/ntap-20190315-0002/</a>
<a href="https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libc6</td>
<td>CVE-2019-1010023</td>
<td class="severity">HIGH</td>
<td class="pkg-version">2.28-10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.securityfocus.com/bid/109167">http://www.securityfocus.com/bid/109167</a>
<a href="https://security-tracker.debian.org/tracker/CVE-2019-1010023">https://security-tracker.debian.org/tracker/CVE-2019-1010023</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22851">https://sourceware.org/bugzilla/show_bug.cgi?id=22851</a>
<a href="https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;amp;utm_medium=RSS</a>
<a href="https://ubuntu.com/security/CVE-2019-1010023">https://ubuntu.com/security/CVE-2019-1010023</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libc6</td>
<td>CVE-2019-9192</td>
<td class="severity">HIGH</td>
<td class="pkg-version">2.28-10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24269">https://sourceware.org/bugzilla/show_bug.cgi?id=24269</a>
<a href="https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp;utm_medium=RSS</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libc6</td>
<td>CVE-2020-1751</td>
<td class="severity">HIGH</td>
<td class="pkg-version">2.28-10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751</a>
<a href="https://linux.oracle.com/cve/CVE-2020-1751.html">https://linux.oracle.com/cve/CVE-2020-1751.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2020-4444.html">https://linux.oracle.com/errata/ELSA-2020-4444.html</a>
<a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a>
<a href="https://security.netapp.com/advisory/ntap-20200430-0002/">https://security.netapp.com/advisory/ntap-20200430-0002/</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25423">https://sourceware.org/bugzilla/show_bug.cgi?id=25423</a>
<a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a>
<a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libc6</td>
<td>CVE-2020-1752</td>
<td class="severity">HIGH</td>
<td class="pkg-version">2.28-10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752</a>
<a href="https://linux.oracle.com/cve/CVE-2020-1752.html">https://linux.oracle.com/cve/CVE-2020-1752.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2020-4444.html">https://linux.oracle.com/errata/ELSA-2020-4444.html</a>
<a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a>
<a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a>
<a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a>
<a href="https://security.netapp.com/advisory/ntap-20200511-0005/">https://security.netapp.com/advisory/ntap-20200511-0005/</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25414">https://sourceware.org/bugzilla/show_bug.cgi?id=25414</a>
<a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c">https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c</a>
<a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a>
<a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libc6</td>
<td>CVE-2020-6096</td>
<td class="severity">HIGH</td>
<td class="pkg-version">2.28-10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096</a>
<a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/</a>
<a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a>
<a href="https://sourceware.org/bugzilla/attachment.cgi?id=12334">https://sourceware.org/bugzilla/attachment.cgi?id=12334</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25620">https://sourceware.org/bugzilla/show_bug.cgi?id=25620</a>
<a href="https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019">https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a>
<a href="https://ubuntu.com/security/notices/USN-4954-1">https://ubuntu.com/security/notices/USN-4954-1</a>
<a href="https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019">https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libc6</td>
<td>CVE-2021-3326</td>
<td class="severity">HIGH</td>
<td class="pkg-version">2.28-10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.openwall.com/lists/oss-security/2021/01/28/2">http://www.openwall.com/lists/oss-security/2021/01/28/2</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326</a>
<a href="https://linux.oracle.com/cve/CVE-2021-3326.html">https://linux.oracle.com/cve/CVE-2021-3326.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a>
<a href="https://security.netapp.com/advisory/ntap-20210304-0007/">https://security.netapp.com/advisory/ntap-20210304-0007/</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27256">https://sourceware.org/bugzilla/show_bug.cgi?id=27256</a>
<a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888">https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888</a>
<a href="https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html">https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libc6</td>
<td>CVE-2010-4051</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">2.28-10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://cxib.net/stuff/proftpd.gnu.c">http://cxib.net/stuff/proftpd.gnu.c</a>
<a href="http://seclists.org/fulldisclosure/2011/Jan/78">http://seclists.org/fulldisclosure/2011/Jan/78</a>
<a href="http://secunia.com/advisories/42547">http://secunia.com/advisories/42547</a>
<a href="http://securityreason.com/achievement_securityalert/93">http://securityreason.com/achievement_securityalert/93</a>
<a href="http://securityreason.com/securityalert/8003">http://securityreason.com/securityalert/8003</a>
<a href="http://securitytracker.com/id?1024832">http://securitytracker.com/id?1024832</a>
<a href="http://www.exploit-db.com/exploits/15935">http://www.exploit-db.com/exploits/15935</a>
<a href="http://www.kb.cert.org/vuls/id/912279">http://www.kb.cert.org/vuls/id/912279</a>
<a href="http://www.securityfocus.com/archive/1/515589/100/0/threaded">http://www.securityfocus.com/archive/1/515589/100/0/threaded</a>
<a href="http://www.securityfocus.com/bid/45233">http://www.securityfocus.com/bid/45233</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=645859">https://bugzilla.redhat.com/show_bug.cgi?id=645859</a>
<a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libc6</td>
<td>CVE-2010-4052</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">2.28-10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://cxib.net/stuff/proftpd.gnu.c">http://cxib.net/stuff/proftpd.gnu.c</a>
<a href="http://seclists.org/fulldisclosure/2011/Jan/78">http://seclists.org/fulldisclosure/2011/Jan/78</a>
<a href="http://secunia.com/advisories/42547">http://secunia.com/advisories/42547</a>
<a href="http://securityreason.com/achievement_securityalert/93">http://securityreason.com/achievement_securityalert/93</a>
<a href="http://securityreason.com/securityalert/8003">http://securityreason.com/securityalert/8003</a>
<a href="http://securitytracker.com/id?1024832">http://securitytracker.com/id?1024832</a>
<a href="http://www.exploit-db.com/exploits/15935">http://www.exploit-db.com/exploits/15935</a>
<a href="http://www.kb.cert.org/vuls/id/912279">http://www.kb.cert.org/vuls/id/912279</a>
<a href="http://www.securityfocus.com/archive/1/515589/100/0/threaded">http://www.securityfocus.com/archive/1/515589/100/0/threaded</a>
<a href="http://www.securityfocus.com/bid/45233">http://www.securityfocus.com/bid/45233</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=645859">https://bugzilla.redhat.com/show_bug.cgi?id=645859</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libc6</td>
<td>CVE-2010-4756</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">2.28-10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://cxib.net/stuff/glob-0day.c">http://cxib.net/stuff/glob-0day.c</a>
<a href="http://securityreason.com/achievement_securityalert/89">http://securityreason.com/achievement_securityalert/89</a>
<a href="http://securityreason.com/exploitalert/9223">http://securityreason.com/exploitalert/9223</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=681681">https://bugzilla.redhat.com/show_bug.cgi?id=681681</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libc6</td>
<td>CVE-2016-10228</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">2.28-10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://openwall.com/lists/oss-security/2017/03/01/10">http://openwall.com/lists/oss-security/2017/03/01/10</a>
<a href="http://www.securityfocus.com/bid/96525">http://www.securityfocus.com/bid/96525</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228</a>
<a href="https://linux.oracle.com/cve/CVE-2016-10228.html">https://linux.oracle.com/cve/CVE-2016-10228.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a>
<a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a>
<a href="https://security.gentoo.org/glsa/202101-20">https://security.gentoo.org/glsa/202101-20</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519">https://sourceware.org/bugzilla/show_bug.cgi?id=19519</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libc6</td>
<td>CVE-2019-1010024</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">2.28-10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.securityfocus.com/bid/109162">http://www.securityfocus.com/bid/109162</a>
<a href="https://security-tracker.debian.org/tracker/CVE-2019-1010024">https://security-tracker.debian.org/tracker/CVE-2019-1010024</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22852">https://sourceware.org/bugzilla/show_bug.cgi?id=22852</a>
<a href="https://support.f5.com/csp/article/K06046097">https://support.f5.com/csp/article/K06046097</a>
<a href="https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS</a>
<a href="https://ubuntu.com/security/CVE-2019-1010024">https://ubuntu.com/security/CVE-2019-1010024</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libc6</td>
<td>CVE-2019-1010025</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">2.28-10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://security-tracker.debian.org/tracker/CVE-2019-1010025">https://security-tracker.debian.org/tracker/CVE-2019-1010025</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22853">https://sourceware.org/bugzilla/show_bug.cgi?id=22853</a>
<a href="https://support.f5.com/csp/article/K06046097">https://support.f5.com/csp/article/K06046097</a>
<a href="https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS">https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp;utm_medium=RSS</a>
<a href="https://ubuntu.com/security/CVE-2019-1010025">https://ubuntu.com/security/CVE-2019-1010025</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libc6</td>
<td>CVE-2019-25013</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">2.28-10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013</a>
<a href="https://linux.oracle.com/cve/CVE-2019-25013.html">https://linux.oracle.com/cve/CVE-2019-25013.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a>
<a href="https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E</a>
<a href="https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E">https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E</a>
<a href="https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E</a>
<a href="https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E</a>
<a href="https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E">https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E</a>
<a href="https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E</a>
<a href="https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E</a>
<a href="https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E">https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E</a>
<a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/</a>
<a href="https://security.netapp.com/advisory/ntap-20210205-0004/">https://security.netapp.com/advisory/ntap-20210205-0004/</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24973">https://sourceware.org/bugzilla/show_bug.cgi?id=24973</a>
<a href="https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b">https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libc6</td>
<td>CVE-2020-10029</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">2.28-10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html">http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029</a>
<a href="https://linux.oracle.com/cve/CVE-2020-10029.html">https://linux.oracle.com/cve/CVE-2020-10029.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2021-0348.html">https://linux.oracle.com/errata/ELSA-2021-0348.html</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/</a>
<a href="https://security.gentoo.org/glsa/202006-04">https://security.gentoo.org/glsa/202006-04</a>
<a href="https://security.netapp.com/advisory/ntap-20200327-0003/">https://security.netapp.com/advisory/ntap-20200327-0003/</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25487">https://sourceware.org/bugzilla/show_bug.cgi?id=25487</a>
<a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f">https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f</a>
<a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a>
<a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libc6</td>
<td>CVE-2020-27618</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">2.28-10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618</a>
<a href="https://linux.oracle.com/cve/CVE-2020-27618.html">https://linux.oracle.com/cve/CVE-2020-27618.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2021-9344.html">https://linux.oracle.com/errata/ELSA-2021-9344.html</a>
<a href="https://security.netapp.com/advisory/ntap-20210401-0006/">https://security.netapp.com/advisory/ntap-20210401-0006/</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21">https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=26224">https://sourceware.org/bugzilla/show_bug.cgi?id=26224</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libc6</td>
<td>CVE-2019-19126</td>
<td class="severity">LOW</td>
<td class="pkg-version">2.28-10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126</a>
<a href="https://linux.oracle.com/cve/CVE-2019-19126.html">https://linux.oracle.com/cve/CVE-2019-19126.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2020-3861.html">https://linux.oracle.com/errata/ELSA-2020-3861.html</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=25204">https://sourceware.org/bugzilla/show_bug.cgi?id=25204</a>
<a href="https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html">https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html</a>
<a href="https://ubuntu.com/security/notices/USN-4416-1">https://ubuntu.com/security/notices/USN-4416-1</a>
<a href="https://usn.ubuntu.com/4416-1/">https://usn.ubuntu.com/4416-1/</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libc6</td>
<td>CVE-2021-27645</td>
<td class="severity">LOW</td>
<td class="pkg-version">2.28-10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=27462">https://sourceware.org/bugzilla/show_bug.cgi?id=27462</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libfdisk1</td>
<td>CVE-2021-37600</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">2.33.1-0.1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a>
<a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a>
<a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libgcc1</td>
<td>CVE-2018-12886</td>
<td class="severity">HIGH</td>
<td class="pkg-version">8.3.0-6</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup">https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup</a>
<a href="https://www.gnu.org/software/gcc/gcc-8/changes.html">https://www.gnu.org/software/gcc/gcc-8/changes.html</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libgcc1</td>
<td>CVE-2019-15847</td>
<td class="severity">HIGH</td>
<td class="pkg-version">8.3.0-6</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html</a>
<a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html</a>
<a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html</a>
<a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481">https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481</a>
<a href="https://linux.oracle.com/cve/CVE-2019-15847.html">https://linux.oracle.com/cve/CVE-2019-15847.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2020-1864.html">https://linux.oracle.com/errata/ELSA-2020-1864.html</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libgcrypt20</td>
<td>CVE-2018-6829</td>
<td class="severity">HIGH</td>
<td class="pkg-version">1.8.4-5+deb10u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://github.com/weikengchen/attack-on-libgcrypt-elgamal">https://github.com/weikengchen/attack-on-libgcrypt-elgamal</a>
<a href="https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki">https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki</a>
<a href="https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html">https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html</a>
<a href="https://www.oracle.com/security-alerts/cpujan2020.html">https://www.oracle.com/security-alerts/cpujan2020.html</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libgcrypt20</td>
<td>CVE-2019-13627</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1.8.4-5+deb10u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html</a>
<a href="http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html">http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html</a>
<a href="http://www.openwall.com/lists/oss-security/2019/10/02/2">http://www.openwall.com/lists/oss-security/2019/10/02/2</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627</a>
<a href="https://dev.gnupg.org/T4683">https://dev.gnupg.org/T4683</a>
<a href="https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5">https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5</a>
<a href="https://linux.oracle.com/cve/CVE-2019-13627.html">https://linux.oracle.com/cve/CVE-2019-13627.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2020-4482.html">https://linux.oracle.com/errata/ELSA-2020-4482.html</a>
<a href="https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html">https://lists.debian.org/debian-lts-announce/2019/09/msg00024.html</a>
<a href="https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html">https://lists.debian.org/debian-lts-announce/2020/01/msg00001.html</a>
<a href="https://minerva.crocs.fi.muni.cz/">https://minerva.crocs.fi.muni.cz/</a>
<a href="https://security-tracker.debian.org/tracker/CVE-2019-13627">https://security-tracker.debian.org/tracker/CVE-2019-13627</a>
<a href="https://security.gentoo.org/glsa/202003-32">https://security.gentoo.org/glsa/202003-32</a>
<a href="https://ubuntu.com/security/notices/USN-4236-1">https://ubuntu.com/security/notices/USN-4236-1</a>
<a href="https://ubuntu.com/security/notices/USN-4236-2">https://ubuntu.com/security/notices/USN-4236-2</a>
<a href="https://ubuntu.com/security/notices/USN-4236-3">https://ubuntu.com/security/notices/USN-4236-3</a>
<a href="https://usn.ubuntu.com/4236-1/">https://usn.ubuntu.com/4236-1/</a>
<a href="https://usn.ubuntu.com/4236-2/">https://usn.ubuntu.com/4236-2/</a>
<a href="https://usn.ubuntu.com/4236-3/">https://usn.ubuntu.com/4236-3/</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libgcrypt20</td>
<td>CVE-2021-40528</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1.8.4-5+deb10u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40528">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40528</a>
<a href="https://eprint.iacr.org/2021/923">https://eprint.iacr.org/2021/923</a>
<a href="https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1">https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1</a>
<a href="https://ibm.github.io/system-security-research-updates/2021/09/06/insecurity-elgamal-pt2">https://ibm.github.io/system-security-research-updates/2021/09/06/insecurity-elgamal-pt2</a>
<a href="https://ubuntu.com/security/notices/USN-5080-1">https://ubuntu.com/security/notices/USN-5080-1</a>
<a href="https://ubuntu.com/security/notices/USN-5080-2">https://ubuntu.com/security/notices/USN-5080-2</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libgnutls30</td>
<td>CVE-2011-3389</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">3.6.7-4+deb10u7</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/">http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/</a>
<a href="http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/">http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/</a>
<a href="http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx">http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx</a>
<a href="http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx">http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx</a>
<a href="http://curl.haxx.se/docs/adv_20120124B.html">http://curl.haxx.se/docs/adv_20120124B.html</a>
<a href="http://downloads.asterisk.org/pub/security/AST-2016-001.html">http://downloads.asterisk.org/pub/security/AST-2016-001.html</a>
<a href="http://ekoparty.org/2011/juliano-rizzo.php">http://ekoparty.org/2011/juliano-rizzo.php</a>
<a href="http://eprint.iacr.org/2004/111">http://eprint.iacr.org/2004/111</a>
<a href="http://eprint.iacr.org/2006/136">http://eprint.iacr.org/2006/136</a>
<a href="http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html">http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html</a>
<a href="http://isc.sans.edu/diary/SSL+TLS+part+3+/11635">http://isc.sans.edu/diary/SSL+TLS+part+3+/11635</a>
<a href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html">http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html</a>
<a href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html">http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html</a>
<a href="http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html">http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html</a>
<a href="http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html">http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html</a>
<a href="http://lists.apple.com/archives/security-announce/2012/May/msg00001.html">http://lists.apple.com/archives/security-announce/2012/May/msg00001.html</a>
<a href="http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html">http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html</a>
<a href="http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html">http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html</a>
<a href="http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html">http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html</a>
<a href="http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html">http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html</a>
<a href="http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html">http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html</a>
<a href="http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html</a>
<a href="http://marc.info/?l=bugtraq&amp;m=132750579901589&amp;w=2">http://marc.info/?l=bugtraq&amp;m=132750579901589&amp;w=2</a>
<a href="http://marc.info/?l=bugtraq&amp;m=132872385320240&amp;w=2">http://marc.info/?l=bugtraq&amp;m=132872385320240&amp;w=2</a>
<a href="http://marc.info/?l=bugtraq&amp;m=133365109612558&amp;w=2">http://marc.info/?l=bugtraq&amp;m=133365109612558&amp;w=2</a>
<a href="http://marc.info/?l=bugtraq&amp;m=133728004526190&amp;w=2">http://marc.info/?l=bugtraq&amp;m=133728004526190&amp;w=2</a>
<a href="http://marc.info/?l=bugtraq&amp;m=134254866602253&amp;w=2">http://marc.info/?l=bugtraq&amp;m=134254866602253&amp;w=2</a>
<a href="http://marc.info/?l=bugtraq&amp;m=134254957702612&amp;w=2">http://marc.info/?l=bugtraq&amp;m=134254957702612&amp;w=2</a>
<a href="http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue">http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue</a>
<a href="http://osvdb.org/74829">http://osvdb.org/74829</a>
<a href="http://rhn.redhat.com/errata/RHSA-2012-0508.html">http://rhn.redhat.com/errata/RHSA-2012-0508.html</a>
<a href="http://rhn.redhat.com/errata/RHSA-2013-1455.html">http://rhn.redhat.com/errata/RHSA-2013-1455.html</a>
<a href="http://secunia.com/advisories/45791">http://secunia.com/advisories/45791</a>
<a href="http://secunia.com/advisories/47998">http://secunia.com/advisories/47998</a>
<a href="http://secunia.com/advisories/48256">http://secunia.com/advisories/48256</a>
<a href="http://secunia.com/advisories/48692">http://secunia.com/advisories/48692</a>
<a href="http://secunia.com/advisories/48915">http://secunia.com/advisories/48915</a>
<a href="http://secunia.com/advisories/48948">http://secunia.com/advisories/48948</a>
<a href="http://secunia.com/advisories/49198">http://secunia.com/advisories/49198</a>
<a href="http://secunia.com/advisories/55322">http://secunia.com/advisories/55322</a>
<a href="http://secunia.com/advisories/55350">http://secunia.com/advisories/55350</a>
<a href="http://secunia.com/advisories/55351">http://secunia.com/advisories/55351</a>
<a href="http://security.gentoo.org/glsa/glsa-201203-02.xml">http://security.gentoo.org/glsa/glsa-201203-02.xml</a>
<a href="http://security.gentoo.org/glsa/glsa-201406-32.xml">http://security.gentoo.org/glsa/glsa-201406-32.xml</a>
<a href="http://support.apple.com/kb/HT4999">http://support.apple.com/kb/HT4999</a>
<a href="http://support.apple.com/kb/HT5001">http://support.apple.com/kb/HT5001</a>
<a href="http://support.apple.com/kb/HT5130">http://support.apple.com/kb/HT5130</a>
<a href="http://support.apple.com/kb/HT5281">http://support.apple.com/kb/HT5281</a>
<a href="http://support.apple.com/kb/HT5501">http://support.apple.com/kb/HT5501</a>
<a href="http://support.apple.com/kb/HT6150">http://support.apple.com/kb/HT6150</a>
<a href="http://technet.microsoft.com/security/advisory/2588513">http://technet.microsoft.com/security/advisory/2588513</a>
<a href="http://vnhacker.blogspot.com/2011/09/beast.html">http://vnhacker.blogspot.com/2011/09/beast.html</a>
<a href="http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf">http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf</a>
<a href="http://www.debian.org/security/2012/dsa-2398">http://www.debian.org/security/2012/dsa-2398</a>
<a href="http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html">http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html</a>
<a href="http://www.ibm.com/developerworks/java/jdk/alerts/">http://www.ibm.com/developerworks/java/jdk/alerts/</a>
<a href="http://www.imperialviolet.org/2011/09/23/chromeandbeast.html">http://www.imperialviolet.org/2011/09/23/chromeandbeast.html</a>
<a href="http://www.insecure.cl/Beast-SSL.rar">http://www.insecure.cl/Beast-SSL.rar</a>
<a href="http://www.kb.cert.org/vuls/id/864643">http://www.kb.cert.org/vuls/id/864643</a>
<a href="http://www.mandriva.com/security/advisories?name=MDVSA-2012:058">http://www.mandriva.com/security/advisories?name=MDVSA-2012:058</a>
<a href="http://www.opera.com/docs/changelogs/mac/1151/">http://www.opera.com/docs/changelogs/mac/1151/</a>
<a href="http://www.opera.com/docs/changelogs/mac/1160/">http://www.opera.com/docs/changelogs/mac/1160/</a>
<a href="http://www.opera.com/docs/changelogs/unix/1151/">http://www.opera.com/docs/changelogs/unix/1151/</a>
<a href="http://www.opera.com/docs/changelogs/unix/1160/">http://www.opera.com/docs/changelogs/unix/1160/</a>
<a href="http://www.opera.com/docs/changelogs/windows/1151/">http://www.opera.com/docs/changelogs/windows/1151/</a>
<a href="http://www.opera.com/docs/changelogs/windows/1160/">http://www.opera.com/docs/changelogs/windows/1160/</a>
<a href="http://www.opera.com/support/kb/view/1004/">http://www.opera.com/support/kb/view/1004/</a>
<a href="http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html">http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html</a>
<a href="http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html">http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html</a>
<a href="http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html">http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html</a>
<a href="http://www.redhat.com/support/errata/RHSA-2011-1384.html">http://www.redhat.com/support/errata/RHSA-2011-1384.html</a>
<a href="http://www.redhat.com/support/errata/RHSA-2012-0006.html">http://www.redhat.com/support/errata/RHSA-2012-0006.html</a>
<a href="http://www.securityfocus.com/bid/49388">http://www.securityfocus.com/bid/49388</a>
<a href="http://www.securityfocus.com/bid/49778">http://www.securityfocus.com/bid/49778</a>
<a href="http://www.securitytracker.com/id/1029190">http://www.securitytracker.com/id/1029190</a>
<a href="http://www.securitytracker.com/id?1025997">http://www.securitytracker.com/id?1025997</a>
<a href="http://www.securitytracker.com/id?1026103">http://www.securitytracker.com/id?1026103</a>
<a href="http://www.securitytracker.com/id?1026704">http://www.securitytracker.com/id?1026704</a>
<a href="http://www.ubuntu.com/usn/USN-1263-1">http://www.ubuntu.com/usn/USN-1263-1</a>
<a href="http://www.us-cert.gov/cas/techalerts/TA12-010A.html">http://www.us-cert.gov/cas/techalerts/TA12-010A.html</a>
<a href="https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail">https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail</a>
<a href="https://bugzilla.novell.com/show_bug.cgi?id=719047">https://bugzilla.novell.com/show_bug.cgi?id=719047</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=737506">https://bugzilla.redhat.com/show_bug.cgi?id=737506</a>
<a href="https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389</a>
<a href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006">https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006</a>
<a href="https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862">https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862</a>
<a href="https://hermes.opensuse.org/messages/13154861">https://hermes.opensuse.org/messages/13154861</a>
<a href="https://hermes.opensuse.org/messages/13155432">https://hermes.opensuse.org/messages/13155432</a>
<a href="https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02">https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02</a>
<a href="https://linux.oracle.com/cve/CVE-2011-3389.html">https://linux.oracle.com/cve/CVE-2011-3389.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2011-1380.html">https://linux.oracle.com/errata/ELSA-2011-1380.html</a>
<a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752</a>
<a href="https://ubuntu.com/security/notices/USN-1263-1">https://ubuntu.com/security/notices/USN-1263-1</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libgssapi-krb5-2</td>
<td>CVE-2018-5709</td>
<td class="severity">HIGH</td>
<td class="pkg-version">1.17-3+deb10u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709</a>
<a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a>
<a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libgssapi-krb5-2</td>
<td>CVE-2021-37750</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1.17-3+deb10u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49">https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49</a>
<a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/</a>
<a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libgssapi-krb5-2</td>
<td>CVE-2004-0971</td>
<td class="severity">LOW</td>
<td class="pkg-version">1.17-3+deb10u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304</a>
<a href="http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml">http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml</a>
<a href="http://www.redhat.com/support/errata/RHSA-2005-012.html">http://www.redhat.com/support/errata/RHSA-2005-012.html</a>
<a href="http://www.securityfocus.com/bid/11289">http://www.securityfocus.com/bid/11289</a>
<a href="http://www.trustix.org/errata/2004/0050">http://www.trustix.org/errata/2004/0050</a>
<a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/17583">https://exchange.xforce.ibmcloud.com/vulnerabilities/17583</a>
<a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a>
<a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libidn2-0</td>
<td>CVE-2019-12290</td>
<td class="severity">HIGH</td>
<td class="pkg-version">2.0.5-1+deb10u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html">http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00008.html</a>
<a href="http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html">http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00009.html</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290</a>
<a href="https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5">https://gitlab.com/libidn/libidn2/commit/241e8f486134793cb0f4a5b0e5817a97883401f5</a>
<a href="https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de">https://gitlab.com/libidn/libidn2/commit/614117ef6e4c60e1950d742e3edf0a0ef8d389de</a>
<a href="https://gitlab.com/libidn/libidn2/merge_requests/71">https://gitlab.com/libidn/libidn2/merge_requests/71</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFT76Y7OSGPZV3EBEHD6ISVUM3DLARM/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXDKYWFV6N2HHVSE67FFDM7G3FEL2ZNE/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONG3GJRRJO35COPGVJXXSZLU4J5Y42AT/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSI4TI2JTQWQ3YEUX5X36GTVGKO4QKZ5/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6ZXL2RDNQRAHCMKWPOMJFKYJ344X4HL/</a>
<a href="https://security.gentoo.org/glsa/202003-63">https://security.gentoo.org/glsa/202003-63</a>
<a href="https://ubuntu.com/security/notices/USN-4168-1">https://ubuntu.com/security/notices/USN-4168-1</a>
<a href="https://usn.ubuntu.com/4168-1/">https://usn.ubuntu.com/4168-1/</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libk5crypto3</td>
<td>CVE-2018-5709</td>
<td class="severity">HIGH</td>
<td class="pkg-version">1.17-3+deb10u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709</a>
<a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a>
<a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libk5crypto3</td>
<td>CVE-2021-37750</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1.17-3+deb10u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49">https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49</a>
<a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/</a>
<a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libk5crypto3</td>
<td>CVE-2004-0971</td>
<td class="severity">LOW</td>
<td class="pkg-version">1.17-3+deb10u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304</a>
<a href="http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml">http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml</a>
<a href="http://www.redhat.com/support/errata/RHSA-2005-012.html">http://www.redhat.com/support/errata/RHSA-2005-012.html</a>
<a href="http://www.securityfocus.com/bid/11289">http://www.securityfocus.com/bid/11289</a>
<a href="http://www.trustix.org/errata/2004/0050">http://www.trustix.org/errata/2004/0050</a>
<a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/17583">https://exchange.xforce.ibmcloud.com/vulnerabilities/17583</a>
<a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a>
<a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libkrb5-3</td>
<td>CVE-2018-5709</td>
<td class="severity">HIGH</td>
<td class="pkg-version">1.17-3+deb10u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709</a>
<a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a>
<a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libkrb5-3</td>
<td>CVE-2021-37750</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1.17-3+deb10u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49">https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49</a>
<a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/</a>
<a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libkrb5-3</td>
<td>CVE-2004-0971</td>
<td class="severity">LOW</td>
<td class="pkg-version">1.17-3+deb10u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304</a>
<a href="http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml">http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml</a>
<a href="http://www.redhat.com/support/errata/RHSA-2005-012.html">http://www.redhat.com/support/errata/RHSA-2005-012.html</a>
<a href="http://www.securityfocus.com/bid/11289">http://www.securityfocus.com/bid/11289</a>
<a href="http://www.trustix.org/errata/2004/0050">http://www.trustix.org/errata/2004/0050</a>
<a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/17583">https://exchange.xforce.ibmcloud.com/vulnerabilities/17583</a>
<a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a>
<a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libkrb5support0</td>
<td>CVE-2018-5709</td>
<td class="severity">HIGH</td>
<td class="pkg-version">1.17-3+deb10u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709</a>
<a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a>
<a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libkrb5support0</td>
<td>CVE-2021-37750</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1.17-3+deb10u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49">https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49</a>
<a href="https://github.com/krb5/krb5/releases">https://github.com/krb5/krb5/releases</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/</a>
<a href="https://web.mit.edu/kerberos/advisories/">https://web.mit.edu/kerberos/advisories/</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libkrb5support0</td>
<td>CVE-2004-0971</td>
<td class="severity">LOW</td>
<td class="pkg-version">1.17-3+deb10u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136304</a>
<a href="http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml">http://www.gentoo.org/security/en/glsa/glsa-200410-24.xml</a>
<a href="http://www.redhat.com/support/errata/RHSA-2005-012.html">http://www.redhat.com/support/errata/RHSA-2005-012.html</a>
<a href="http://www.securityfocus.com/bid/11289">http://www.securityfocus.com/bid/11289</a>
<a href="http://www.trustix.org/errata/2004/0050">http://www.trustix.org/errata/2004/0050</a>
<a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/17583">https://exchange.xforce.ibmcloud.com/vulnerabilities/17583</a>
<a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a>
<a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10497</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libldap-2.4-2</td>
<td>CVE-2017-17740</td>
<td class="severity">HIGH</td>
<td class="pkg-version">2.4.47+dfsg-3+deb10u6</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html</a>
<a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html</a>
<a href="http://www.openldap.org/its/index.cgi/Incoming?id=8759">http://www.openldap.org/its/index.cgi/Incoming?id=8759</a>
<a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libldap-2.4-2</td>
<td>CVE-2015-3276</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">2.4.47+dfsg-3+deb10u6</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://rhn.redhat.com/errata/RHSA-2015-2131.html">http://rhn.redhat.com/errata/RHSA-2015-2131.html</a>
<a href="http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html">http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html</a>
<a href="http://www.securitytracker.com/id/1034221">http://www.securitytracker.com/id/1034221</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=1238322">https://bugzilla.redhat.com/show_bug.cgi?id=1238322</a>
<a href="https://linux.oracle.com/cve/CVE-2015-3276.html">https://linux.oracle.com/cve/CVE-2015-3276.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2015-2131.html">https://linux.oracle.com/errata/ELSA-2015-2131.html</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libldap-2.4-2</td>
<td>CVE-2017-14159</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">2.4.47+dfsg-3+deb10u6</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.openldap.org/its/index.cgi?findid=8703">http://www.openldap.org/its/index.cgi?findid=8703</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libldap-2.4-2</td>
<td>CVE-2020-15719</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">2.4.47+dfsg-3+deb10u6</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html">http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html</a>
<a href="http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html">http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html</a>
<a href="https://access.redhat.com/errata/RHBA-2019:3674">https://access.redhat.com/errata/RHBA-2019:3674</a>
<a href="https://bugs.openldap.org/show_bug.cgi?id=9266">https://bugs.openldap.org/show_bug.cgi?id=9266</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=1740070">https://bugzilla.redhat.com/show_bug.cgi?id=1740070</a>
<a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libldap-common</td>
<td>CVE-2017-17740</td>
<td class="severity">HIGH</td>
<td class="pkg-version">2.4.47+dfsg-3+deb10u6</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html</a>
<a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html</a>
<a href="http://www.openldap.org/its/index.cgi/Incoming?id=8759">http://www.openldap.org/its/index.cgi/Incoming?id=8759</a>
<a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libldap-common</td>
<td>CVE-2015-3276</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">2.4.47+dfsg-3+deb10u6</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://rhn.redhat.com/errata/RHSA-2015-2131.html">http://rhn.redhat.com/errata/RHSA-2015-2131.html</a>
<a href="http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html">http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html</a>
<a href="http://www.securitytracker.com/id/1034221">http://www.securitytracker.com/id/1034221</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=1238322">https://bugzilla.redhat.com/show_bug.cgi?id=1238322</a>
<a href="https://linux.oracle.com/cve/CVE-2015-3276.html">https://linux.oracle.com/cve/CVE-2015-3276.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2015-2131.html">https://linux.oracle.com/errata/ELSA-2015-2131.html</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libldap-common</td>
<td>CVE-2017-14159</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">2.4.47+dfsg-3+deb10u6</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.openldap.org/its/index.cgi?findid=8703">http://www.openldap.org/its/index.cgi?findid=8703</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libldap-common</td>
<td>CVE-2020-15719</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">2.4.47+dfsg-3+deb10u6</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html">http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html</a>
<a href="http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html">http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html</a>
<a href="https://access.redhat.com/errata/RHBA-2019:3674">https://access.redhat.com/errata/RHBA-2019:3674</a>
<a href="https://bugs.openldap.org/show_bug.cgi?id=9266">https://bugs.openldap.org/show_bug.cgi?id=9266</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=1740070">https://bugzilla.redhat.com/show_bug.cgi?id=1740070</a>
<a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">liblz4-1</td>
<td>CVE-2019-17543</td>
<td class="severity">HIGH</td>
<td class="pkg-version">1.8.3-1+deb10u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html</a>
<a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html</a>
<a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941</a>
<a href="https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2">https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2</a>
<a href="https://github.com/lz4/lz4/issues/801">https://github.com/lz4/lz4/issues/801</a>
<a href="https://github.com/lz4/lz4/pull/756">https://github.com/lz4/lz4/pull/756</a>
<a href="https://github.com/lz4/lz4/pull/760">https://github.com/lz4/lz4/pull/760</a>
<a href="https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E">https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E</a>
<a href="https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E">https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E</a>
<a href="https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E">https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E</a>
<a href="https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E">https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E</a>
<a href="https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E">https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E</a>
<a href="https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E">https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E</a>
<a href="https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E">https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E</a>
<a href="https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E">https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E</a>
<a href="https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E">https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E</a>
<a href="https://www.oracle.com//security-alerts/cpujul2021.html">https://www.oracle.com//security-alerts/cpujul2021.html</a>
<a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libmount1</td>
<td>CVE-2021-37600</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">2.33.1-0.1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a>
<a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a>
<a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a>
</td>
</tr>
<tr class="severity-UNKNOWN">
<td class="pkg-name">libncurses6</td>
<td>CVE-2021-39537</td>
<td class="severity">UNKNOWN</td>
<td class="pkg-version">6.1+20181013-2+deb10u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a>
</td>
</tr>
<tr class="severity-UNKNOWN">
<td class="pkg-name">libncursesw6</td>
<td>CVE-2021-39537</td>
<td class="severity">UNKNOWN</td>
<td class="pkg-version">6.1+20181013-2+deb10u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libpcre3</td>
<td>CVE-2017-11164</td>
<td class="severity">HIGH</td>
<td class="pkg-version">2:8.39-12</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://openwall.com/lists/oss-security/2017/07/11/3">http://openwall.com/lists/oss-security/2017/07/11/3</a>
<a href="http://www.securityfocus.com/bid/99575">http://www.securityfocus.com/bid/99575</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164</a>
<a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libpcre3</td>
<td>CVE-2017-7245</td>
<td class="severity">HIGH</td>
<td class="pkg-version">2:8.39-12</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.securityfocus.com/bid/97067">http://www.securityfocus.com/bid/97067</a>
<a href="https://access.redhat.com/errata/RHSA-2018:2486">https://access.redhat.com/errata/RHSA-2018:2486</a>
<a href="https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/">https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/</a>
<a href="https://security.gentoo.org/glsa/201710-25">https://security.gentoo.org/glsa/201710-25</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libpcre3</td>
<td>CVE-2017-7246</td>
<td class="severity">HIGH</td>
<td class="pkg-version">2:8.39-12</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.securityfocus.com/bid/97067">http://www.securityfocus.com/bid/97067</a>
<a href="https://access.redhat.com/errata/RHSA-2018:2486">https://access.redhat.com/errata/RHSA-2018:2486</a>
<a href="https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/">https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/</a>
<a href="https://security.gentoo.org/glsa/201710-25">https://security.gentoo.org/glsa/201710-25</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libpcre3</td>
<td>CVE-2019-20838</td>
<td class="severity">HIGH</td>
<td class="pkg-version">2:8.39-12</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://seclists.org/fulldisclosure/2020/Dec/32">http://seclists.org/fulldisclosure/2020/Dec/32</a>
<a href="http://seclists.org/fulldisclosure/2021/Feb/14">http://seclists.org/fulldisclosure/2021/Feb/14</a>
<a href="https://bugs.gentoo.org/717920">https://bugs.gentoo.org/717920</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838</a>
<a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a>
<a href="https://support.apple.com/kb/HT211931">https://support.apple.com/kb/HT211931</a>
<a href="https://support.apple.com/kb/HT212147">https://support.apple.com/kb/HT212147</a>
<a href="https://www.pcre.org/original/changelog.txt">https://www.pcre.org/original/changelog.txt</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libpcre3</td>
<td>CVE-2017-16231</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">2:8.39-12</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html">http://packetstormsecurity.com/files/150897/PCRE-8.41-Buffer-Overflow.html</a>
<a href="http://seclists.org/fulldisclosure/2018/Dec/33">http://seclists.org/fulldisclosure/2018/Dec/33</a>
<a href="http://www.openwall.com/lists/oss-security/2017/11/01/11">http://www.openwall.com/lists/oss-security/2017/11/01/11</a>
<a href="http://www.openwall.com/lists/oss-security/2017/11/01/3">http://www.openwall.com/lists/oss-security/2017/11/01/3</a>
<a href="http://www.openwall.com/lists/oss-security/2017/11/01/7">http://www.openwall.com/lists/oss-security/2017/11/01/7</a>
<a href="http://www.openwall.com/lists/oss-security/2017/11/01/8">http://www.openwall.com/lists/oss-security/2017/11/01/8</a>
<a href="http://www.securityfocus.com/bid/101688">http://www.securityfocus.com/bid/101688</a>
<a href="https://bugs.exim.org/show_bug.cgi?id=2047">https://bugs.exim.org/show_bug.cgi?id=2047</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libpcre3</td>
<td>CVE-2020-14155</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">2:8.39-12</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://seclists.org/fulldisclosure/2020/Dec/32">http://seclists.org/fulldisclosure/2020/Dec/32</a>
<a href="http://seclists.org/fulldisclosure/2021/Feb/14">http://seclists.org/fulldisclosure/2021/Feb/14</a>
<a href="https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/">https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/</a>
<a href="https://bugs.gentoo.org/717920">https://bugs.gentoo.org/717920</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155</a>
<a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a>
<a href="https://support.apple.com/kb/HT211931">https://support.apple.com/kb/HT211931</a>
<a href="https://support.apple.com/kb/HT212147">https://support.apple.com/kb/HT212147</a>
<a href="https://www.pcre.org/original/changelog.txt">https://www.pcre.org/original/changelog.txt</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libperl5.28</td>
<td>CVE-2011-4116</td>
<td class="severity">HIGH</td>
<td class="pkg-version">5.28.1-6+deb10u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.openwall.com/lists/oss-security/2011/11/04/2">http://www.openwall.com/lists/oss-security/2011/11/04/2</a>
<a href="http://www.openwall.com/lists/oss-security/2011/11/04/4">http://www.openwall.com/lists/oss-security/2011/11/04/4</a>
<a href="https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14">https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14</a>
<a href="https://rt.cpan.org/Public/Bug/Display.html?id=69106">https://rt.cpan.org/Public/Bug/Display.html?id=69106</a>
<a href="https://seclists.org/oss-sec/2011/q4/238">https://seclists.org/oss-sec/2011/q4/238</a>
</td>
</tr>
<tr class="severity-CRITICAL">
<td class="pkg-name">libseccomp2</td>
<td>CVE-2019-9893</td>
<td class="severity">CRITICAL</td>
<td class="pkg-version">2.3.3-4</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html</a>
<a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html</a>
<a href="http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html">http://www.paul-moore.com/blog/d/2019/03/libseccomp_v240.html</a>
<a href="https://access.redhat.com/errata/RHSA-2019:3624">https://access.redhat.com/errata/RHSA-2019:3624</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893</a>
<a href="https://github.com/seccomp/libseccomp/issues/139">https://github.com/seccomp/libseccomp/issues/139</a>
<a href="https://linux.oracle.com/cve/CVE-2019-9893.html">https://linux.oracle.com/cve/CVE-2019-9893.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2019-3624.html">https://linux.oracle.com/errata/ELSA-2019-3624.html</a>
<a href="https://seclists.org/oss-sec/2019/q1/179">https://seclists.org/oss-sec/2019/q1/179</a>
<a href="https://security.gentoo.org/glsa/201904-18">https://security.gentoo.org/glsa/201904-18</a>
<a href="https://ubuntu.com/security/notices/USN-4001-1">https://ubuntu.com/security/notices/USN-4001-1</a>
<a href="https://ubuntu.com/security/notices/USN-4001-2">https://ubuntu.com/security/notices/USN-4001-2</a>
<a href="https://usn.ubuntu.com/4001-1/">https://usn.ubuntu.com/4001-1/</a>
<a href="https://usn.ubuntu.com/4001-2/">https://usn.ubuntu.com/4001-2/</a>
<a href="https://www.openwall.com/lists/oss-security/2019/03/15/1">https://www.openwall.com/lists/oss-security/2019/03/15/1</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libsepol1</td>
<td>CVE-2021-36084</td>
<td class="severity">LOW</td>
<td class="pkg-version">2.8-1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065</a>
<a href="https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3">https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3</a>
<a href="https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml">https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libsepol1</td>
<td>CVE-2021-36085</td>
<td class="severity">LOW</td>
<td class="pkg-version">2.8-1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124</a>
<a href="https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba">https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba</a>
<a href="https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml">https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libsepol1</td>
<td>CVE-2021-36086</td>
<td class="severity">LOW</td>
<td class="pkg-version">2.8-1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177</a>
<a href="https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8">https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8</a>
<a href="https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml">https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libsepol1</td>
<td>CVE-2021-36087</td>
<td class="severity">LOW</td>
<td class="pkg-version">2.8-1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675</a>
<a href="https://github.com/SELinuxProject/selinux/commit/bad0a746e9f4cf260dedba5828d9645d50176aac">https://github.com/SELinuxProject/selinux/commit/bad0a746e9f4cf260dedba5828d9645d50176aac</a>
<a href="https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml">https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libsmartcols1</td>
<td>CVE-2021-37600</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">2.33.1-0.1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a>
<a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a>
<a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a>
</td>
</tr>
<tr class="severity-CRITICAL">
<td class="pkg-name">libsqlite3-0</td>
<td>CVE-2020-11656</td>
<td class="severity">CRITICAL</td>
<td class="pkg-version">3.27.2-3+deb10u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc">https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc</a>
<a href="https://security.gentoo.org/glsa/202007-26">https://security.gentoo.org/glsa/202007-26</a>
<a href="https://security.netapp.com/advisory/ntap-20200416-0001/">https://security.netapp.com/advisory/ntap-20200416-0001/</a>
<a href="https://www.oracle.com/security-alerts/cpuApr2021.html">https://www.oracle.com/security-alerts/cpuApr2021.html</a>
<a href="https://www.oracle.com/security-alerts/cpujan2021.html">https://www.oracle.com/security-alerts/cpujan2021.html</a>
<a href="https://www.oracle.com/security-alerts/cpujul2020.html">https://www.oracle.com/security-alerts/cpujul2020.html</a>
<a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a>
<a href="https://www.sqlite.org/src/info/d09f8c3621d5f7f8">https://www.sqlite.org/src/info/d09f8c3621d5f7f8</a>
<a href="https://www3.sqlite.org/cgi/src/info/b64674919f673602">https://www3.sqlite.org/cgi/src/info/b64674919f673602</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libsqlite3-0</td>
<td>CVE-2019-19244</td>
<td class="severity">HIGH</td>
<td class="pkg-version">3.27.2-3+deb10u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244</a>
<a href="https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348">https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348</a>
<a href="https://ubuntu.com/security/notices/USN-4205-1">https://ubuntu.com/security/notices/USN-4205-1</a>
<a href="https://usn.ubuntu.com/4205-1/">https://usn.ubuntu.com/4205-1/</a>
<a href="https://www.oracle.com/security-alerts/cpuapr2020.html">https://www.oracle.com/security-alerts/cpuapr2020.html</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libsqlite3-0</td>
<td>CVE-2019-19603</td>
<td class="severity">HIGH</td>
<td class="pkg-version">3.27.2-3+deb10u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603</a>
<a href="https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13">https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13</a>
<a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a>
<a href="https://security.netapp.com/advisory/ntap-20191223-0001/">https://security.netapp.com/advisory/ntap-20191223-0001/</a>
<a href="https://ubuntu.com/security/notices/USN-4394-1">https://ubuntu.com/security/notices/USN-4394-1</a>
<a href="https://usn.ubuntu.com/4394-1/">https://usn.ubuntu.com/4394-1/</a>
<a href="https://www.oracle.com/security-alerts/cpuapr2020.html">https://www.oracle.com/security-alerts/cpuapr2020.html</a>
<a href="https://www.sqlite.org/">https://www.sqlite.org/</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libsqlite3-0</td>
<td>CVE-2021-36690</td>
<td class="severity">HIGH</td>
<td class="pkg-version">3.27.2-3+deb10u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://www.sqlite.org/forum/forumpost/718c0a8d17">https://www.sqlite.org/forum/forumpost/718c0a8d17</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libsqlite3-0</td>
<td>CVE-2019-19645</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">3.27.2-3+deb10u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645</a>
<a href="https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06">https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06</a>
<a href="https://security.netapp.com/advisory/ntap-20191223-0001/">https://security.netapp.com/advisory/ntap-20191223-0001/</a>
<a href="https://ubuntu.com/security/notices/USN-4394-1">https://ubuntu.com/security/notices/USN-4394-1</a>
<a href="https://usn.ubuntu.com/4394-1/">https://usn.ubuntu.com/4394-1/</a>
<a href="https://www.oracle.com/security-alerts/cpuapr2020.html">https://www.oracle.com/security-alerts/cpuapr2020.html</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libsqlite3-0</td>
<td>CVE-2019-19924</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">3.27.2-3+deb10u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924</a>
<a href="https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3">https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3</a>
<a href="https://linux.oracle.com/cve/CVE-2019-19924.html">https://linux.oracle.com/cve/CVE-2019-19924.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2020-1810.html">https://linux.oracle.com/errata/ELSA-2020-1810.html</a>
<a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a>
<a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a>
<a href="https://security.netapp.com/advisory/ntap-20200114-0003/">https://security.netapp.com/advisory/ntap-20200114-0003/</a>
<a href="https://ubuntu.com/security/notices/USN-4298-1">https://ubuntu.com/security/notices/USN-4298-1</a>
<a href="https://usn.ubuntu.com/4298-1/">https://usn.ubuntu.com/4298-1/</a>
<a href="https://www.oracle.com/security-alerts/cpuapr2020.html">https://www.oracle.com/security-alerts/cpuapr2020.html</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libsqlite3-0</td>
<td>CVE-2020-13631</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">3.27.2-3+deb10u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://seclists.org/fulldisclosure/2020/Dec/32">http://seclists.org/fulldisclosure/2020/Dec/32</a>
<a href="http://seclists.org/fulldisclosure/2020/Nov/19">http://seclists.org/fulldisclosure/2020/Nov/19</a>
<a href="http://seclists.org/fulldisclosure/2020/Nov/20">http://seclists.org/fulldisclosure/2020/Nov/20</a>
<a href="http://seclists.org/fulldisclosure/2020/Nov/22">http://seclists.org/fulldisclosure/2020/Nov/22</a>
<a href="https://bugs.chromium.org/p/chromium/issues/detail?id=1080459">https://bugs.chromium.org/p/chromium/issues/detail?id=1080459</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631</a>
<a href="https://linux.oracle.com/cve/CVE-2020-13631.html">https://linux.oracle.com/cve/CVE-2020-13631.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2020-4442.html">https://linux.oracle.com/errata/ELSA-2020-4442.html</a>
<a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/</a>
<a href="https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc">https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc</a>
<a href="https://security.gentoo.org/glsa/202007-26">https://security.gentoo.org/glsa/202007-26</a>
<a href="https://security.netapp.com/advisory/ntap-20200608-0002/">https://security.netapp.com/advisory/ntap-20200608-0002/</a>
<a href="https://sqlite.org/src/info/eca0ba2cf4c0fdf7">https://sqlite.org/src/info/eca0ba2cf4c0fdf7</a>
<a href="https://support.apple.com/kb/HT211843">https://support.apple.com/kb/HT211843</a>
<a href="https://support.apple.com/kb/HT211844">https://support.apple.com/kb/HT211844</a>
<a href="https://support.apple.com/kb/HT211850">https://support.apple.com/kb/HT211850</a>
<a href="https://support.apple.com/kb/HT211931">https://support.apple.com/kb/HT211931</a>
<a href="https://support.apple.com/kb/HT211935">https://support.apple.com/kb/HT211935</a>
<a href="https://support.apple.com/kb/HT211952">https://support.apple.com/kb/HT211952</a>
<a href="https://ubuntu.com/security/notices/USN-4394-1">https://ubuntu.com/security/notices/USN-4394-1</a>
<a href="https://usn.ubuntu.com/4394-1/">https://usn.ubuntu.com/4394-1/</a>
<a href="https://www.oracle.com/security-alerts/cpujul2020.html">https://www.oracle.com/security-alerts/cpujul2020.html</a>
<a href="https://www.oracle.com/security-alerts/cpuoct2020.html">https://www.oracle.com/security-alerts/cpuoct2020.html</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libssl1.1</td>
<td>CVE-2007-6755</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1.1.1d-0+deb10u7</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/">http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/</a>
<a href="http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html">http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html</a>
<a href="http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html">http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html</a>
<a href="http://rump2007.cr.yp.to/15-shumow.pdf">http://rump2007.cr.yp.to/15-shumow.pdf</a>
<a href="http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/">http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/</a>
<a href="http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect">http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect</a>
<a href="http://www.securityfocus.com/bid/63657">http://www.securityfocus.com/bid/63657</a>
<a href="https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html">https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libssl1.1</td>
<td>CVE-2010-0928</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1.1.1d-0+deb10u7</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/">http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/</a>
<a href="http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf">http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf</a>
<a href="http://www.networkworld.com/news/2010/030410-rsa-security-attack.html">http://www.networkworld.com/news/2010/030410-rsa-security-attack.html</a>
<a href="http://www.osvdb.org/62808">http://www.osvdb.org/62808</a>
<a href="http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/">http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/</a>
<a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/56750">https://exchange.xforce.ibmcloud.com/vulnerabilities/56750</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libstdc++6</td>
<td>CVE-2018-12886</td>
<td class="severity">HIGH</td>
<td class="pkg-version">8.3.0-6</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup">https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&amp;view=markup</a>
<a href="https://www.gnu.org/software/gcc/gcc-8/changes.html">https://www.gnu.org/software/gcc/gcc-8/changes.html</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libstdc++6</td>
<td>CVE-2019-15847</td>
<td class="severity">HIGH</td>
<td class="pkg-version">8.3.0-6</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html</a>
<a href="http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html">http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html</a>
<a href="http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html">http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html</a>
<a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481">https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91481</a>
<a href="https://linux.oracle.com/cve/CVE-2019-15847.html">https://linux.oracle.com/cve/CVE-2019-15847.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2020-1864.html">https://linux.oracle.com/errata/ELSA-2020-1864.html</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libsystemd0</td>
<td>CVE-2019-3843</td>
<td class="severity">HIGH</td>
<td class="pkg-version">241-7~deb10u8</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.securityfocus.com/bid/108116">http://www.securityfocus.com/bid/108116</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843</a>
<a href="https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)">https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)</a>
<a href="https://linux.oracle.com/cve/CVE-2019-3843.html">https://linux.oracle.com/cve/CVE-2019-3843.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2020-1794.html">https://linux.oracle.com/errata/ELSA-2020-1794.html</a>
<a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a>
<a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/</a>
<a href="https://security.netapp.com/advisory/ntap-20190619-0002/">https://security.netapp.com/advisory/ntap-20190619-0002/</a>
<a href="https://ubuntu.com/security/notices/USN-4269-1">https://ubuntu.com/security/notices/USN-4269-1</a>
<a href="https://usn.ubuntu.com/4269-1/">https://usn.ubuntu.com/4269-1/</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libsystemd0</td>
<td>CVE-2019-3844</td>
<td class="severity">HIGH</td>
<td class="pkg-version">241-7~deb10u8</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.securityfocus.com/bid/108096">http://www.securityfocus.com/bid/108096</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844</a>
<a href="https://linux.oracle.com/cve/CVE-2019-3844.html">https://linux.oracle.com/cve/CVE-2019-3844.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2020-1794.html">https://linux.oracle.com/errata/ELSA-2020-1794.html</a>
<a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a>
<a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a>
<a href="https://security.netapp.com/advisory/ntap-20190619-0002/">https://security.netapp.com/advisory/ntap-20190619-0002/</a>
<a href="https://ubuntu.com/security/notices/USN-4269-1">https://ubuntu.com/security/notices/USN-4269-1</a>
<a href="https://usn.ubuntu.com/4269-1/">https://usn.ubuntu.com/4269-1/</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libsystemd0</td>
<td>CVE-2020-13529</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">241-7~deb10u8</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.openwall.com/lists/oss-security/2021/08/04/2">http://www.openwall.com/lists/oss-security/2021/08/04/2</a>
<a href="http://www.openwall.com/lists/oss-security/2021/08/17/3">http://www.openwall.com/lists/oss-security/2021/08/17/3</a>
<a href="http://www.openwall.com/lists/oss-security/2021/09/07/3">http://www.openwall.com/lists/oss-security/2021/09/07/3</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/</a>
<a href="https://security.gentoo.org/glsa/202107-48">https://security.gentoo.org/glsa/202107-48</a>
<a href="https://security.netapp.com/advisory/ntap-20210625-0005/">https://security.netapp.com/advisory/ntap-20210625-0005/</a>
<a href="https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142">https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142</a>
<a href="https://ubuntu.com/security/notices/USN-5013-1">https://ubuntu.com/security/notices/USN-5013-1</a>
<a href="https://ubuntu.com/security/notices/USN-5013-2">https://ubuntu.com/security/notices/USN-5013-2</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libsystemd0</td>
<td>CVE-2020-13776</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">241-7~deb10u8</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://github.com/systemd/systemd/issues/15985">https://github.com/systemd/systemd/issues/15985</a>
<a href="https://linux.oracle.com/cve/CVE-2020-13776.html">https://linux.oracle.com/cve/CVE-2020-13776.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2021-1611.html">https://linux.oracle.com/errata/ELSA-2021-1611.html</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/</a>
<a href="https://security.netapp.com/advisory/ntap-20200611-0003/">https://security.netapp.com/advisory/ntap-20200611-0003/</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libsystemd0</td>
<td>CVE-2013-4392</td>
<td class="severity">LOW</td>
<td class="pkg-version">241-7~deb10u8</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357</a>
<a href="http://www.openwall.com/lists/oss-security/2013/10/01/9">http://www.openwall.com/lists/oss-security/2013/10/01/9</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=859060">https://bugzilla.redhat.com/show_bug.cgi?id=859060</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libsystemd0</td>
<td>CVE-2019-20386</td>
<td class="severity">LOW</td>
<td class="pkg-version">241-7~deb10u8</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html">http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386</a>
<a href="https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad">https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad</a>
<a href="https://linux.oracle.com/cve/CVE-2019-20386.html">https://linux.oracle.com/cve/CVE-2019-20386.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2020-4553.html">https://linux.oracle.com/errata/ELSA-2020-4553.html</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/</a>
<a href="https://security.netapp.com/advisory/ntap-20200210-0002/">https://security.netapp.com/advisory/ntap-20200210-0002/</a>
<a href="https://ubuntu.com/security/notices/USN-4269-1">https://ubuntu.com/security/notices/USN-4269-1</a>
<a href="https://usn.ubuntu.com/4269-1/">https://usn.ubuntu.com/4269-1/</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libtasn1-6</td>
<td>CVE-2018-1000654</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">4.13-3</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html">http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html</a>
<a href="http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html">http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html</a>
<a href="http://www.securityfocus.com/bid/105151">http://www.securityfocus.com/bid/105151</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654</a>
<a href="https://gitlab.com/gnutls/libtasn1/issues/4">https://gitlab.com/gnutls/libtasn1/issues/4</a>
<a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a>
</td>
</tr>
<tr class="severity-UNKNOWN">
<td class="pkg-name">libtinfo6</td>
<td>CVE-2021-39537</td>
<td class="severity">UNKNOWN</td>
<td class="pkg-version">6.1+20181013-2+deb10u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libudev1</td>
<td>CVE-2019-3843</td>
<td class="severity">HIGH</td>
<td class="pkg-version">241-7~deb10u8</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.securityfocus.com/bid/108116">http://www.securityfocus.com/bid/108116</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3843</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843</a>
<a href="https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)">https://github.com/systemd/systemd-stable/pull/54 (backport for v241-stable)</a>
<a href="https://linux.oracle.com/cve/CVE-2019-3843.html">https://linux.oracle.com/cve/CVE-2019-3843.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2020-1794.html">https://linux.oracle.com/errata/ELSA-2020-1794.html</a>
<a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a>
<a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5JXQAKSTMABZ46EVCRMW62DHWYHTTFES/</a>
<a href="https://security.netapp.com/advisory/ntap-20190619-0002/">https://security.netapp.com/advisory/ntap-20190619-0002/</a>
<a href="https://ubuntu.com/security/notices/USN-4269-1">https://ubuntu.com/security/notices/USN-4269-1</a>
<a href="https://usn.ubuntu.com/4269-1/">https://usn.ubuntu.com/4269-1/</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libudev1</td>
<td>CVE-2019-3844</td>
<td class="severity">HIGH</td>
<td class="pkg-version">241-7~deb10u8</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.securityfocus.com/bid/108096">http://www.securityfocus.com/bid/108096</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3844</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844</a>
<a href="https://linux.oracle.com/cve/CVE-2019-3844.html">https://linux.oracle.com/cve/CVE-2019-3844.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2020-1794.html">https://linux.oracle.com/errata/ELSA-2020-1794.html</a>
<a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a>
<a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a>
<a href="https://security.netapp.com/advisory/ntap-20190619-0002/">https://security.netapp.com/advisory/ntap-20190619-0002/</a>
<a href="https://ubuntu.com/security/notices/USN-4269-1">https://ubuntu.com/security/notices/USN-4269-1</a>
<a href="https://usn.ubuntu.com/4269-1/">https://usn.ubuntu.com/4269-1/</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libudev1</td>
<td>CVE-2020-13529</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">241-7~deb10u8</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.openwall.com/lists/oss-security/2021/08/04/2">http://www.openwall.com/lists/oss-security/2021/08/04/2</a>
<a href="http://www.openwall.com/lists/oss-security/2021/08/17/3">http://www.openwall.com/lists/oss-security/2021/08/17/3</a>
<a href="http://www.openwall.com/lists/oss-security/2021/09/07/3">http://www.openwall.com/lists/oss-security/2021/09/07/3</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/</a>
<a href="https://security.gentoo.org/glsa/202107-48">https://security.gentoo.org/glsa/202107-48</a>
<a href="https://security.netapp.com/advisory/ntap-20210625-0005/">https://security.netapp.com/advisory/ntap-20210625-0005/</a>
<a href="https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142">https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142</a>
<a href="https://ubuntu.com/security/notices/USN-5013-1">https://ubuntu.com/security/notices/USN-5013-1</a>
<a href="https://ubuntu.com/security/notices/USN-5013-2">https://ubuntu.com/security/notices/USN-5013-2</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libudev1</td>
<td>CVE-2020-13776</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">241-7~deb10u8</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://github.com/systemd/systemd/issues/15985">https://github.com/systemd/systemd/issues/15985</a>
<a href="https://linux.oracle.com/cve/CVE-2020-13776.html">https://linux.oracle.com/cve/CVE-2020-13776.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2021-1611.html">https://linux.oracle.com/errata/ELSA-2021-1611.html</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/</a>
<a href="https://security.netapp.com/advisory/ntap-20200611-0003/">https://security.netapp.com/advisory/ntap-20200611-0003/</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libudev1</td>
<td>CVE-2013-4392</td>
<td class="severity">LOW</td>
<td class="pkg-version">241-7~deb10u8</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357</a>
<a href="http://www.openwall.com/lists/oss-security/2013/10/01/9">http://www.openwall.com/lists/oss-security/2013/10/01/9</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=859060">https://bugzilla.redhat.com/show_bug.cgi?id=859060</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libudev1</td>
<td>CVE-2019-20386</td>
<td class="severity">LOW</td>
<td class="pkg-version">241-7~deb10u8</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html">http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386</a>
<a href="https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad">https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad</a>
<a href="https://linux.oracle.com/cve/CVE-2019-20386.html">https://linux.oracle.com/cve/CVE-2019-20386.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2020-4553.html">https://linux.oracle.com/errata/ELSA-2020-4553.html</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/</a>
<a href="https://security.netapp.com/advisory/ntap-20200210-0002/">https://security.netapp.com/advisory/ntap-20200210-0002/</a>
<a href="https://ubuntu.com/security/notices/USN-4269-1">https://ubuntu.com/security/notices/USN-4269-1</a>
<a href="https://usn.ubuntu.com/4269-1/">https://usn.ubuntu.com/4269-1/</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libuuid1</td>
<td>CVE-2021-37600</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">2.33.1-0.1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a>
<a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a>
<a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">login</td>
<td>CVE-2019-19882</td>
<td class="severity">HIGH</td>
<td class="pkg-version">1:4.5-1.1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://bugs.archlinux.org/task/64836">https://bugs.archlinux.org/task/64836</a>
<a href="https://bugs.gentoo.org/702252">https://bugs.gentoo.org/702252</a>
<a href="https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75">https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75</a>
<a href="https://github.com/shadow-maint/shadow/pull/199">https://github.com/shadow-maint/shadow/pull/199</a>
<a href="https://github.com/void-linux/void-packages/pull/17580">https://github.com/void-linux/void-packages/pull/17580</a>
<a href="https://security.gentoo.org/glsa/202008-09">https://security.gentoo.org/glsa/202008-09</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">login</td>
<td>CVE-2007-5686</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1:4.5-1.1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://secunia.com/advisories/27215">http://secunia.com/advisories/27215</a>
<a href="http://www.securityfocus.com/archive/1/482129/100/100/threaded">http://www.securityfocus.com/archive/1/482129/100/100/threaded</a>
<a href="http://www.securityfocus.com/archive/1/482857/100/0/threaded">http://www.securityfocus.com/archive/1/482857/100/0/threaded</a>
<a href="http://www.securityfocus.com/bid/26048">http://www.securityfocus.com/bid/26048</a>
<a href="http://www.vupen.com/english/advisories/2007/3474">http://www.vupen.com/english/advisories/2007/3474</a>
<a href="https://issues.rpath.com/browse/RPL-1825">https://issues.rpath.com/browse/RPL-1825</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">login</td>
<td>CVE-2013-4235</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1:4.5-1.1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/cve-2013-4235">https://access.redhat.com/security/cve/cve-2013-4235</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235</a>
<a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a>
<a href="https://security-tracker.debian.org/tracker/CVE-2013-4235">https://security-tracker.debian.org/tracker/CVE-2013-4235</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">login</td>
<td>CVE-2018-7169</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1:4.5-1.1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357">https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169</a>
<a href="https://github.com/shadow-maint/shadow/pull/97">https://github.com/shadow-maint/shadow/pull/97</a>
<a href="https://security.gentoo.org/glsa/201805-09">https://security.gentoo.org/glsa/201805-09</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">mount</td>
<td>CVE-2021-37600</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">2.33.1-0.1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a>
<a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a>
<a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a>
</td>
</tr>
<tr class="severity-UNKNOWN">
<td class="pkg-name">ncurses-base</td>
<td>CVE-2021-39537</td>
<td class="severity">UNKNOWN</td>
<td class="pkg-version">6.1+20181013-2+deb10u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a>
</td>
</tr>
<tr class="severity-UNKNOWN">
<td class="pkg-name">ncurses-bin</td>
<td>CVE-2021-39537</td>
<td class="severity">UNKNOWN</td>
<td class="pkg-version">6.1+20181013-2+deb10u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html">https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">openssl</td>
<td>CVE-2007-6755</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1.1.1d-0+deb10u7</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/">http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/</a>
<a href="http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html">http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html</a>
<a href="http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html">http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html</a>
<a href="http://rump2007.cr.yp.to/15-shumow.pdf">http://rump2007.cr.yp.to/15-shumow.pdf</a>
<a href="http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/">http://stream.wsj.com/story/latest-headlines/SS-2-63399/SS-2-332655/</a>
<a href="http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect">http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect</a>
<a href="http://www.securityfocus.com/bid/63657">http://www.securityfocus.com/bid/63657</a>
<a href="https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html">https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">openssl</td>
<td>CVE-2010-0928</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1.1.1d-0+deb10u7</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/">http://rdist.root.org/2010/03/08/attacking-rsa-exponentiation-with-fault-injection/</a>
<a href="http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf">http://www.eecs.umich.edu/%7Evaleria/research/publications/DATE10RSA.pdf</a>
<a href="http://www.networkworld.com/news/2010/030410-rsa-security-attack.html">http://www.networkworld.com/news/2010/030410-rsa-security-attack.html</a>
<a href="http://www.osvdb.org/62808">http://www.osvdb.org/62808</a>
<a href="http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/">http://www.theregister.co.uk/2010/03/04/severe_openssl_vulnerability/</a>
<a href="https://exchange.xforce.ibmcloud.com/vulnerabilities/56750">https://exchange.xforce.ibmcloud.com/vulnerabilities/56750</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">passwd</td>
<td>CVE-2019-19882</td>
<td class="severity">HIGH</td>
<td class="pkg-version">1:4.5-1.1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://bugs.archlinux.org/task/64836">https://bugs.archlinux.org/task/64836</a>
<a href="https://bugs.gentoo.org/702252">https://bugs.gentoo.org/702252</a>
<a href="https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75">https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75</a>
<a href="https://github.com/shadow-maint/shadow/pull/199">https://github.com/shadow-maint/shadow/pull/199</a>
<a href="https://github.com/void-linux/void-packages/pull/17580">https://github.com/void-linux/void-packages/pull/17580</a>
<a href="https://security.gentoo.org/glsa/202008-09">https://security.gentoo.org/glsa/202008-09</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">passwd</td>
<td>CVE-2007-5686</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1:4.5-1.1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://secunia.com/advisories/27215">http://secunia.com/advisories/27215</a>
<a href="http://www.securityfocus.com/archive/1/482129/100/100/threaded">http://www.securityfocus.com/archive/1/482129/100/100/threaded</a>
<a href="http://www.securityfocus.com/archive/1/482857/100/0/threaded">http://www.securityfocus.com/archive/1/482857/100/0/threaded</a>
<a href="http://www.securityfocus.com/bid/26048">http://www.securityfocus.com/bid/26048</a>
<a href="http://www.vupen.com/english/advisories/2007/3474">http://www.vupen.com/english/advisories/2007/3474</a>
<a href="https://issues.rpath.com/browse/RPL-1825">https://issues.rpath.com/browse/RPL-1825</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">passwd</td>
<td>CVE-2013-4235</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1:4.5-1.1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/cve-2013-4235">https://access.redhat.com/security/cve/cve-2013-4235</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235</a>
<a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E</a>
<a href="https://security-tracker.debian.org/tracker/CVE-2013-4235">https://security-tracker.debian.org/tracker/CVE-2013-4235</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">passwd</td>
<td>CVE-2018-7169</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1:4.5-1.1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357">https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1729357</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169</a>
<a href="https://github.com/shadow-maint/shadow/pull/97">https://github.com/shadow-maint/shadow/pull/97</a>
<a href="https://security.gentoo.org/glsa/201805-09">https://security.gentoo.org/glsa/201805-09</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">perl</td>
<td>CVE-2011-4116</td>
<td class="severity">HIGH</td>
<td class="pkg-version">5.28.1-6+deb10u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.openwall.com/lists/oss-security/2011/11/04/2">http://www.openwall.com/lists/oss-security/2011/11/04/2</a>
<a href="http://www.openwall.com/lists/oss-security/2011/11/04/4">http://www.openwall.com/lists/oss-security/2011/11/04/4</a>
<a href="https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14">https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14</a>
<a href="https://rt.cpan.org/Public/Bug/Display.html?id=69106">https://rt.cpan.org/Public/Bug/Display.html?id=69106</a>
<a href="https://seclists.org/oss-sec/2011/q4/238">https://seclists.org/oss-sec/2011/q4/238</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">perl-base</td>
<td>CVE-2011-4116</td>
<td class="severity">HIGH</td>
<td class="pkg-version">5.28.1-6+deb10u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.openwall.com/lists/oss-security/2011/11/04/2">http://www.openwall.com/lists/oss-security/2011/11/04/2</a>
<a href="http://www.openwall.com/lists/oss-security/2011/11/04/4">http://www.openwall.com/lists/oss-security/2011/11/04/4</a>
<a href="https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14">https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14</a>
<a href="https://rt.cpan.org/Public/Bug/Display.html?id=69106">https://rt.cpan.org/Public/Bug/Display.html?id=69106</a>
<a href="https://seclists.org/oss-sec/2011/q4/238">https://seclists.org/oss-sec/2011/q4/238</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">perl-modules-5.28</td>
<td>CVE-2011-4116</td>
<td class="severity">HIGH</td>
<td class="pkg-version">5.28.1-6+deb10u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.openwall.com/lists/oss-security/2011/11/04/2">http://www.openwall.com/lists/oss-security/2011/11/04/2</a>
<a href="http://www.openwall.com/lists/oss-security/2011/11/04/4">http://www.openwall.com/lists/oss-security/2011/11/04/4</a>
<a href="https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14">https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14</a>
<a href="https://rt.cpan.org/Public/Bug/Display.html?id=69106">https://rt.cpan.org/Public/Bug/Display.html?id=69106</a>
<a href="https://seclists.org/oss-sec/2011/q4/238">https://seclists.org/oss-sec/2011/q4/238</a>
</td>
</tr>
<tr class="severity-CRITICAL">
<td class="pkg-name">pwgen</td>
<td>CVE-2013-4441</td>
<td class="severity">CRITICAL</td>
<td class="pkg-version">2.08-1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.openwall.com/lists/oss-security/2013/06/06/1">http://www.openwall.com/lists/oss-security/2013/06/06/1</a>
<a href="http://www.openwall.com/lists/oss-security/2013/10/16/15">http://www.openwall.com/lists/oss-security/2013/10/16/15</a>
<a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=726578">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=726578</a>
<a href="https://www.openwall.com/lists/oss-security/2012/01/22/6">https://www.openwall.com/lists/oss-security/2012/01/22/6</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">tar</td>
<td>CVE-2005-2541</td>
<td class="severity">HIGH</td>
<td class="pkg-version">1.30+dfsg-6</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://marc.info/?l=bugtraq&amp;m=112327628230258&amp;w=2">http://marc.info/?l=bugtraq&amp;m=112327628230258&amp;w=2</a>
<a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">tar</td>
<td>CVE-2019-9923</td>
<td class="severity">HIGH</td>
<td class="pkg-version">1.30+dfsg-6</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120">http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120</a>
<a href="http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html">http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html</a>
<a href="http://savannah.gnu.org/bugs/?55369">http://savannah.gnu.org/bugs/?55369</a>
<a href="https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241">https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923</a>
<a href="https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E</a>
<a href="https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E">https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E</a>
<a href="https://ubuntu.com/security/notices/USN-4692-1">https://ubuntu.com/security/notices/USN-4692-1</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">tar</td>
<td>CVE-2021-20193</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1.30+dfsg-6</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=1917565">https://bugzilla.redhat.com/show_bug.cgi?id=1917565</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193</a>
<a href="https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777">https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777</a>
<a href="https://savannah.gnu.org/bugs/?59897">https://savannah.gnu.org/bugs/?59897</a>
<a href="https://security.gentoo.org/glsa/202105-29">https://security.gentoo.org/glsa/202105-29</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">util-linux</td>
<td>CVE-2021-37600</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">2.33.1-0.1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c">https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c</a>
<a href="https://github.com/karelzak/util-linux/issues/1395">https://github.com/karelzak/util-linux/issues/1395</a>
<a href="https://security.netapp.com/advisory/ntap-20210902-0002/">https://security.netapp.com/advisory/ntap-20210902-0002/</a>
</td>
</tr>
</table>
</body>
</html>