| apt |
CVE-2011-3374 |
LOW |
2.6.1 |
|
https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
|
| bash |
TEMP-0841856-B18BAF |
LOW |
5.2.15-2+b2 |
|
|
| bsdutils |
CVE-2022-0563 |
LOW |
1:2.38.1-5+deb12u1 |
|
https://access.redhat.com/security/cve/CVE-2022-0563
https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u
https://lore.kernel.org/util-linux/[email protected]/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.gentoo.org/glsa/202401-08
https://security.netapp.com/advisory/ntap-20220331-0002/
https://www.cve.org/CVERecord?id=CVE-2022-0563
|
| coreutils |
CVE-2016-2781 |
LOW |
9.1-1 |
|
http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://access.redhat.com/security/cve/CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.28/v2.28-ReleaseNotes
https://nvd.nist.gov/vuln/detail/CVE-2016-2781
https://www.cve.org/CVERecord?id=CVE-2016-2781
|
| coreutils |
CVE-2017-18018 |
LOW |
9.1-1 |
|
http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
https://access.redhat.com/security/cve/CVE-2017-18018
https://nvd.nist.gov/vuln/detail/CVE-2017-18018
https://www.cve.org/CVERecord?id=CVE-2017-18018
|
| coreutils |
CVE-2025-5278 |
LOW |
9.1-1 |
|
http://www.openwall.com/lists/oss-security/2025/05/27/2
http://www.openwall.com/lists/oss-security/2025/05/29/1
http://www.openwall.com/lists/oss-security/2025/05/29/2
https://access.redhat.com/security/cve/CVE-2025-5278
https://bugzilla.redhat.com/show_bug.cgi?id=2368764
https://cgit.git.savannah.gnu.org/cgit/coreutils.git/commit/?id=8c9602e3a145e9596dc1a63c6ed67865814b6633
https://cgit.git.savannah.gnu.org/cgit/coreutils.git/tree/NEWS?id=8c9602e3a145e9596dc1a63c6ed67865814b6633#n14
https://nvd.nist.gov/vuln/detail/CVE-2025-5278
https://security-tracker.debian.org/tracker/CVE-2025-5278
https://www.cve.org/CVERecord?id=CVE-2025-5278
|
| curl |
CVE-2025-10148 |
MEDIUM |
8.8.0-1~bpo12+1 |
|
https://access.redhat.com/security/cve/CVE-2025-10148
https://curl.se/docs/CVE-2025-10148.html
https://curl.se/docs/CVE-2025-10148.json
https://hackerone.com/reports/3330839
https://nvd.nist.gov/vuln/detail/CVE-2025-10148
https://www.cve.org/CVERecord?id=CVE-2025-10148
|
| curl |
CVE-2025-9086 |
MEDIUM |
8.8.0-1~bpo12+1 |
|
https://access.redhat.com/security/cve/CVE-2025-9086
https://curl.se/docs/CVE-2025-9086.html
https://curl.se/docs/CVE-2025-9086.json
https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6
https://hackerone.com/reports/3294999
https://nvd.nist.gov/vuln/detail/CVE-2025-9086
https://www.cve.org/CVERecord?id=CVE-2025-9086
|
| curl |
CVE-2024-2379 |
LOW |
8.8.0-1~bpo12+1 |
|
http://seclists.org/fulldisclosure/2024/Jul/18
http://seclists.org/fulldisclosure/2024/Jul/19
http://seclists.org/fulldisclosure/2024/Jul/20
http://www.openwall.com/lists/oss-security/2024/03/27/2
https://access.redhat.com/security/cve/CVE-2024-2379
https://curl.se/docs/CVE-2024-2379.html
https://curl.se/docs/CVE-2024-2379.json
https://hackerone.com/reports/2410774
https://nvd.nist.gov/vuln/detail/CVE-2024-2379
https://security.netapp.com/advisory/ntap-20240531-0001/
https://support.apple.com/kb/HT214118
https://support.apple.com/kb/HT214119
https://support.apple.com/kb/HT214120
https://www.cve.org/CVERecord?id=CVE-2024-2379
|
| curl |
CVE-2025-0725 |
LOW |
8.8.0-1~bpo12+1 |
|
http://www.openwall.com/lists/oss-security/2025/02/05/3
http://www.openwall.com/lists/oss-security/2025/02/06/2
http://www.openwall.com/lists/oss-security/2025/02/06/4
https://access.redhat.com/security/cve/CVE-2025-0725
https://curl.se/docs/CVE-2025-0725.html
https://curl.se/docs/CVE-2025-0725.json
https://github.com/curl/curl/commit/76f83f0db23846e254d940ec7
https://hackerone.com/reports/2956023
https://nvd.nist.gov/vuln/detail/CVE-2025-0725
https://security.netapp.com/advisory/ntap-20250306-0009/
https://www.cve.org/CVERecord?id=CVE-2025-0725
|
| dirmngr |
CVE-2025-30258 |
MEDIUM |
2.2.40-1.1 |
|
https://access.redhat.com/security/cve/CVE-2025-30258
https://dev.gnupg.org/T7527
https://dev.gnupg.org/rG48978ccb4e20866472ef18436a32744350a65158
https://lists.gnupg.org/pipermail/gnupg-announce/2025q1/000491.html
https://nvd.nist.gov/vuln/detail/CVE-2025-30258
https://ubuntu.com/security/notices/USN-7412-1
https://www.cve.org/CVERecord?id=CVE-2025-30258
|
| dirmngr |
CVE-2022-3219 |
LOW |
2.2.40-1.1 |
|
https://access.redhat.com/security/cve/CVE-2022-3219
https://bugzilla.redhat.com/show_bug.cgi?id=2127010
https://dev.gnupg.org/D556
https://dev.gnupg.org/T5993
https://marc.info/?l=oss-security&m=165696590211434&w=4
https://nvd.nist.gov/vuln/detail/CVE-2022-3219
https://security.netapp.com/advisory/ntap-20230324-0001/
https://www.cve.org/CVERecord?id=CVE-2022-3219
|
| dpkg |
CVE-2025-6297 |
LOW |
1.21.22 |
|
https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=ed6bbd445dd8800308c67236ba35d08004c98e82
https://ubuntu.com/security/notices/USN-7768-1
https://www.cve.org/CVERecord?id=CVE-2025-6297
|
| fonts-opensymbol |
CVE-2012-5639 |
LOW |
4:102.12+LibO24.2.3-1~bpo12+1 |
|
http://www.openwall.com/lists/oss-security/2012/12/14/1
http://www.openwall.com/lists/oss-security/2023/12/28/6
http://www.openwall.com/lists/oss-security/2024/01/03/6
http://www.openwall.com/lists/oss-security/2024/01/03/7
https://access.redhat.com/security/cve/CVE-2012-5639
https://access.redhat.com/security/cve/cve-2012-5639
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5639
https://lists.apache.org/thread.html/r253f92d0e6511d07a79774002e1d9db1d20b24bff27914a5adb14ccb%40%3Cissues.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2012-5639
https://security-tracker.debian.org/tracker/CVE-2012-5639
https://www.cve.org/CVERecord?id=CVE-2012-5639
|
| fonts-opensymbol |
CVE-2018-10583 |
LOW |
4:102.12+LibO24.2.3-1~bpo12+1 |
|
http://seclists.org/fulldisclosure/2020/Oct/26
http://secureyourit.co.uk/wp/2018/05/01/creating-malicious-odt-files/
https://access.redhat.com/errata/RHSA-2018:3054
https://access.redhat.com/security/cve/CVE-2018-10583
https://lists.apache.org/thread.html/0598708912978b27121b2e380b44a225c706aca882cd1da6a955a0af%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/6c65f22306c36c95e75f8d2b7f49cfcbeb0a4614245c20934612a39d%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/c8fd59ac77b42aac90eb5c59b87f3ab59b5e0c3bfb4819aa649a2909%40%3Cdev.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-10583
https://security-tracker.debian.org/tracker/CVE-2018-10583
https://ubuntu.com/security/notices/USN-3883-1
https://usn.ubuntu.com/3883-1/
https://www.cve.org/CVERecord?id=CVE-2018-10583
https://www.exploit-db.com/exploits/44564/
|
| gcc-12-base |
CVE-2022-27943 |
LOW |
12.2.0-14 |
|
https://access.redhat.com/security/cve/CVE-2022-27943
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=1a770b01ef415e114164b6151d1e55acdee09371
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=9234cdca6ee88badfc00297e72f13dac4e540c79
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=fc968115a742d9e4674d9725ce9c2106b91b6ead
https://gcc.gnu.org/pipermail/gcc-patches/2022-March/592244.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
https://nvd.nist.gov/vuln/detail/CVE-2022-27943
https://sourceware.org/bugzilla/show_bug.cgi?id=28995
https://www.cve.org/CVERecord?id=CVE-2022-27943
|
| gcc-12-base |
CVE-2023-4039 |
LOW |
12.2.0-14 |
12.2.0-14+deb12u1 |
https://access.redhat.com/security/cve/CVE-2023-4039
https://developer.arm.com/Arm%20Security%20Center/GCC%20Stack%20Protector%20Vulnerability%20AArch64
https://gcc.gnu.org/git/?p=gcc.git;a=blob_plain;f=SECURITY.txt
https://gcc.gnu.org/pipermail/gcc-patches/2023-October/634066.html
https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-x7ch-h5rf-w2mf
https://inbox.sourceware.org/gcc-patches/[email protected]
https://linux.oracle.com/cve/CVE-2023-4039.html
https://linux.oracle.com/errata/ELSA-2023-28766.html
https://nvd.nist.gov/vuln/detail/CVE-2023-4039
https://rtx.meta.security/mitigation/2023/09/12/CVE-2023-4039.html
https://ubuntu.com/security/notices/USN-7700-1
https://www.cve.org/CVERecord?id=CVE-2023-4039
|
| gnupg |
CVE-2025-30258 |
MEDIUM |
2.2.40-1.1 |
|
https://access.redhat.com/security/cve/CVE-2025-30258
https://dev.gnupg.org/T7527
https://dev.gnupg.org/rG48978ccb4e20866472ef18436a32744350a65158
https://lists.gnupg.org/pipermail/gnupg-announce/2025q1/000491.html
https://nvd.nist.gov/vuln/detail/CVE-2025-30258
https://ubuntu.com/security/notices/USN-7412-1
https://www.cve.org/CVERecord?id=CVE-2025-30258
|
| gnupg |
CVE-2022-3219 |
LOW |
2.2.40-1.1 |
|
https://access.redhat.com/security/cve/CVE-2022-3219
https://bugzilla.redhat.com/show_bug.cgi?id=2127010
https://dev.gnupg.org/D556
https://dev.gnupg.org/T5993
https://marc.info/?l=oss-security&m=165696590211434&w=4
https://nvd.nist.gov/vuln/detail/CVE-2022-3219
https://security.netapp.com/advisory/ntap-20230324-0001/
https://www.cve.org/CVERecord?id=CVE-2022-3219
|
| gnupg-l10n |
CVE-2025-30258 |
MEDIUM |
2.2.40-1.1 |
|
https://access.redhat.com/security/cve/CVE-2025-30258
https://dev.gnupg.org/T7527
https://dev.gnupg.org/rG48978ccb4e20866472ef18436a32744350a65158
https://lists.gnupg.org/pipermail/gnupg-announce/2025q1/000491.html
https://nvd.nist.gov/vuln/detail/CVE-2025-30258
https://ubuntu.com/security/notices/USN-7412-1
https://www.cve.org/CVERecord?id=CVE-2025-30258
|
| gnupg-l10n |
CVE-2022-3219 |
LOW |
2.2.40-1.1 |
|
https://access.redhat.com/security/cve/CVE-2022-3219
https://bugzilla.redhat.com/show_bug.cgi?id=2127010
https://dev.gnupg.org/D556
https://dev.gnupg.org/T5993
https://marc.info/?l=oss-security&m=165696590211434&w=4
https://nvd.nist.gov/vuln/detail/CVE-2022-3219
https://security.netapp.com/advisory/ntap-20230324-0001/
https://www.cve.org/CVERecord?id=CVE-2022-3219
|
| gnupg-utils |
CVE-2025-30258 |
MEDIUM |
2.2.40-1.1 |
|
https://access.redhat.com/security/cve/CVE-2025-30258
https://dev.gnupg.org/T7527
https://dev.gnupg.org/rG48978ccb4e20866472ef18436a32744350a65158
https://lists.gnupg.org/pipermail/gnupg-announce/2025q1/000491.html
https://nvd.nist.gov/vuln/detail/CVE-2025-30258
https://ubuntu.com/security/notices/USN-7412-1
https://www.cve.org/CVERecord?id=CVE-2025-30258
|
| gnupg-utils |
CVE-2022-3219 |
LOW |
2.2.40-1.1 |
|
https://access.redhat.com/security/cve/CVE-2022-3219
https://bugzilla.redhat.com/show_bug.cgi?id=2127010
https://dev.gnupg.org/D556
https://dev.gnupg.org/T5993
https://marc.info/?l=oss-security&m=165696590211434&w=4
https://nvd.nist.gov/vuln/detail/CVE-2022-3219
https://security.netapp.com/advisory/ntap-20230324-0001/
https://www.cve.org/CVERecord?id=CVE-2022-3219
|
| gpg |
CVE-2025-30258 |
MEDIUM |
2.2.40-1.1 |
|
https://access.redhat.com/security/cve/CVE-2025-30258
https://dev.gnupg.org/T7527
https://dev.gnupg.org/rG48978ccb4e20866472ef18436a32744350a65158
https://lists.gnupg.org/pipermail/gnupg-announce/2025q1/000491.html
https://nvd.nist.gov/vuln/detail/CVE-2025-30258
https://ubuntu.com/security/notices/USN-7412-1
https://www.cve.org/CVERecord?id=CVE-2025-30258
|
| gpg |
CVE-2022-3219 |
LOW |
2.2.40-1.1 |
|
https://access.redhat.com/security/cve/CVE-2022-3219
https://bugzilla.redhat.com/show_bug.cgi?id=2127010
https://dev.gnupg.org/D556
https://dev.gnupg.org/T5993
https://marc.info/?l=oss-security&m=165696590211434&w=4
https://nvd.nist.gov/vuln/detail/CVE-2022-3219
https://security.netapp.com/advisory/ntap-20230324-0001/
https://www.cve.org/CVERecord?id=CVE-2022-3219
|
| gpg-agent |
CVE-2025-30258 |
MEDIUM |
2.2.40-1.1 |
|
https://access.redhat.com/security/cve/CVE-2025-30258
https://dev.gnupg.org/T7527
https://dev.gnupg.org/rG48978ccb4e20866472ef18436a32744350a65158
https://lists.gnupg.org/pipermail/gnupg-announce/2025q1/000491.html
https://nvd.nist.gov/vuln/detail/CVE-2025-30258
https://ubuntu.com/security/notices/USN-7412-1
https://www.cve.org/CVERecord?id=CVE-2025-30258
|
| gpg-agent |
CVE-2022-3219 |
LOW |
2.2.40-1.1 |
|
https://access.redhat.com/security/cve/CVE-2022-3219
https://bugzilla.redhat.com/show_bug.cgi?id=2127010
https://dev.gnupg.org/D556
https://dev.gnupg.org/T5993
https://marc.info/?l=oss-security&m=165696590211434&w=4
https://nvd.nist.gov/vuln/detail/CVE-2022-3219
https://security.netapp.com/advisory/ntap-20230324-0001/
https://www.cve.org/CVERecord?id=CVE-2022-3219
|
| gpg-wks-client |
CVE-2025-30258 |
MEDIUM |
2.2.40-1.1 |
|
https://access.redhat.com/security/cve/CVE-2025-30258
https://dev.gnupg.org/T7527
https://dev.gnupg.org/rG48978ccb4e20866472ef18436a32744350a65158
https://lists.gnupg.org/pipermail/gnupg-announce/2025q1/000491.html
https://nvd.nist.gov/vuln/detail/CVE-2025-30258
https://ubuntu.com/security/notices/USN-7412-1
https://www.cve.org/CVERecord?id=CVE-2025-30258
|
| gpg-wks-client |
CVE-2022-3219 |
LOW |
2.2.40-1.1 |
|
https://access.redhat.com/security/cve/CVE-2022-3219
https://bugzilla.redhat.com/show_bug.cgi?id=2127010
https://dev.gnupg.org/D556
https://dev.gnupg.org/T5993
https://marc.info/?l=oss-security&m=165696590211434&w=4
https://nvd.nist.gov/vuln/detail/CVE-2022-3219
https://security.netapp.com/advisory/ntap-20230324-0001/
https://www.cve.org/CVERecord?id=CVE-2022-3219
|
| gpg-wks-server |
CVE-2025-30258 |
MEDIUM |
2.2.40-1.1 |
|
https://access.redhat.com/security/cve/CVE-2025-30258
https://dev.gnupg.org/T7527
https://dev.gnupg.org/rG48978ccb4e20866472ef18436a32744350a65158
https://lists.gnupg.org/pipermail/gnupg-announce/2025q1/000491.html
https://nvd.nist.gov/vuln/detail/CVE-2025-30258
https://ubuntu.com/security/notices/USN-7412-1
https://www.cve.org/CVERecord?id=CVE-2025-30258
|
| gpg-wks-server |
CVE-2022-3219 |
LOW |
2.2.40-1.1 |
|
https://access.redhat.com/security/cve/CVE-2022-3219
https://bugzilla.redhat.com/show_bug.cgi?id=2127010
https://dev.gnupg.org/D556
https://dev.gnupg.org/T5993
https://marc.info/?l=oss-security&m=165696590211434&w=4
https://nvd.nist.gov/vuln/detail/CVE-2022-3219
https://security.netapp.com/advisory/ntap-20230324-0001/
https://www.cve.org/CVERecord?id=CVE-2022-3219
|
| gpgconf |
CVE-2025-30258 |
MEDIUM |
2.2.40-1.1 |
|
https://access.redhat.com/security/cve/CVE-2025-30258
https://dev.gnupg.org/T7527
https://dev.gnupg.org/rG48978ccb4e20866472ef18436a32744350a65158
https://lists.gnupg.org/pipermail/gnupg-announce/2025q1/000491.html
https://nvd.nist.gov/vuln/detail/CVE-2025-30258
https://ubuntu.com/security/notices/USN-7412-1
https://www.cve.org/CVERecord?id=CVE-2025-30258
|
| gpgconf |
CVE-2022-3219 |
LOW |
2.2.40-1.1 |
|
https://access.redhat.com/security/cve/CVE-2022-3219
https://bugzilla.redhat.com/show_bug.cgi?id=2127010
https://dev.gnupg.org/D556
https://dev.gnupg.org/T5993
https://marc.info/?l=oss-security&m=165696590211434&w=4
https://nvd.nist.gov/vuln/detail/CVE-2022-3219
https://security.netapp.com/advisory/ntap-20230324-0001/
https://www.cve.org/CVERecord?id=CVE-2022-3219
|
| gpgsm |
CVE-2025-30258 |
MEDIUM |
2.2.40-1.1 |
|
https://access.redhat.com/security/cve/CVE-2025-30258
https://dev.gnupg.org/T7527
https://dev.gnupg.org/rG48978ccb4e20866472ef18436a32744350a65158
https://lists.gnupg.org/pipermail/gnupg-announce/2025q1/000491.html
https://nvd.nist.gov/vuln/detail/CVE-2025-30258
https://ubuntu.com/security/notices/USN-7412-1
https://www.cve.org/CVERecord?id=CVE-2025-30258
|
| gpgsm |
CVE-2022-3219 |
LOW |
2.2.40-1.1 |
|
https://access.redhat.com/security/cve/CVE-2022-3219
https://bugzilla.redhat.com/show_bug.cgi?id=2127010
https://dev.gnupg.org/D556
https://dev.gnupg.org/T5993
https://marc.info/?l=oss-security&m=165696590211434&w=4
https://nvd.nist.gov/vuln/detail/CVE-2022-3219
https://security.netapp.com/advisory/ntap-20230324-0001/
https://www.cve.org/CVERecord?id=CVE-2022-3219
|
| gpgv |
CVE-2025-30258 |
MEDIUM |
2.2.40-1.1 |
|
https://access.redhat.com/security/cve/CVE-2025-30258
https://dev.gnupg.org/T7527
https://dev.gnupg.org/rG48978ccb4e20866472ef18436a32744350a65158
https://lists.gnupg.org/pipermail/gnupg-announce/2025q1/000491.html
https://nvd.nist.gov/vuln/detail/CVE-2025-30258
https://ubuntu.com/security/notices/USN-7412-1
https://www.cve.org/CVERecord?id=CVE-2025-30258
|
| gpgv |
CVE-2022-3219 |
LOW |
2.2.40-1.1 |
|
https://access.redhat.com/security/cve/CVE-2022-3219
https://bugzilla.redhat.com/show_bug.cgi?id=2127010
https://dev.gnupg.org/D556
https://dev.gnupg.org/T5993
https://marc.info/?l=oss-security&m=165696590211434&w=4
https://nvd.nist.gov/vuln/detail/CVE-2022-3219
https://security.netapp.com/advisory/ntap-20230324-0001/
https://www.cve.org/CVERecord?id=CVE-2022-3219
|
| gtk-update-icon-cache |
CVE-2024-6655 |
HIGH |
3.24.38-2~deb12u1 |
3.24.38-2~deb12u2 |
http://www.openwall.com/lists/oss-security/2024/09/09/1
https://access.redhat.com/errata/RHSA-2024:6963
https://access.redhat.com/errata/RHSA-2024:9184
https://access.redhat.com/security/cve/CVE-2024-6655
https://bugzilla.redhat.com/2297098
https://bugzilla.redhat.com/show_bug.cgi?id=2297098
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6655
https://errata.almalinux.org/8/ALSA-2024-6963.html
https://errata.rockylinux.org/RLSA-2024:6963
https://gitlab.gnome.org/GNOME/gtk/-/merge_requests/7361/diffs?commit_id=3bbf0b6176d42836d23c36a6ac410e807ec0a7a7#diff-content-e3fbe6480add9420b69f82374fb26ccac2c015a0
https://linux.oracle.com/cve/CVE-2024-6655.html
https://linux.oracle.com/errata/ELSA-2024-9184.html
https://nvd.nist.gov/vuln/detail/CVE-2024-6655
https://ubuntu.com/security/notices/USN-6899-1
https://www.cve.org/CVERecord?id=CVE-2024-6655
https://www.openwall.com/lists/oss-security/2024/09/09/1
|
| libabsl20220623 |
CVE-2025-0838 |
CRITICAL |
20220623.1-1 |
20220623.1-1+deb12u1 |
https://access.redhat.com/security/cve/CVE-2025-0838
https://github.com/abseil/abseil-cpp/commit/5a0e2cb5e3958dd90bb8569a2766622cb74d90c1
https://github.com/abseil/abseil-cpp/commit/caa7bb4457bfcafcd55a940204ef78c1bf1f417d
https://lists.debian.org/debian-lts-announce/2025/04/msg00012.html
https://nvd.nist.gov/vuln/detail/CVE-2025-0838
https://ubuntu.com/security/notices/USN-7505-1
https://www.cve.org/CVERecord?id=CVE-2025-0838
|
| libapparmor1 |
CVE-2016-1585 |
LOW |
3.0.8-3 |
|
https://bugs.launchpad.net/apparmor/+bug/1597017
https://gitlab.com/apparmor/apparmor/-/merge_requests/1048
https://gitlab.com/apparmor/apparmor/-/merge_requests/1054
https://gitlab.com/apparmor/apparmor/-/merge_requests/333
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-1585
https://ubuntu.com/security/notices/USN-7035-1
https://www.cve.org/CVERecord?id=CVE-2016-1585
|
| libapt-pkg6.0 |
CVE-2011-3374 |
LOW |
2.6.1 |
|
https://access.redhat.com/security/cve/cve-2011-3374
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480
https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html
https://seclists.org/fulldisclosure/2011/Sep/221
https://security-tracker.debian.org/tracker/CVE-2011-3374
https://snyk.io/vuln/SNYK-LINUX-APT-116518
https://ubuntu.com/security/CVE-2011-3374
|
| libavahi-client3 |
CVE-2023-38469 |
MEDIUM |
0.8-10 |
0.8-10+deb12u1 |
https://access.redhat.com/errata/RHSA-2023:7836
https://access.redhat.com/security/cve/CVE-2023-38469
https://bugzilla.redhat.com/1939614
https://bugzilla.redhat.com/2191687
https://bugzilla.redhat.com/2191690
https://bugzilla.redhat.com/2191691
https://bugzilla.redhat.com/2191692
https://bugzilla.redhat.com/2191694
https://bugzilla.redhat.com/show_bug.cgi?id=1939614
https://bugzilla.redhat.com/show_bug.cgi?id=2191687
https://bugzilla.redhat.com/show_bug.cgi?id=2191690
https://bugzilla.redhat.com/show_bug.cgi?id=2191691
https://bugzilla.redhat.com/show_bug.cgi?id=2191692
https://bugzilla.redhat.com/show_bug.cgi?id=2191694
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38470
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38471
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38473
https://errata.almalinux.org/8/ALSA-2023-7836.html
https://errata.rockylinux.org/RLSA-2023:7836
https://linux.oracle.com/cve/CVE-2023-38469.html
https://linux.oracle.com/errata/ELSA-2024-2433.html
https://nvd.nist.gov/vuln/detail/CVE-2023-38469
https://ubuntu.com/security/notices/USN-6487-1
https://www.cve.org/CVERecord?id=CVE-2023-38469
|
| libavahi-client3 |
CVE-2023-38470 |
MEDIUM |
0.8-10 |
0.8-10+deb12u1 |
https://access.redhat.com/errata/RHSA-2023:7836
https://access.redhat.com/security/cve/CVE-2023-38470
https://bugzilla.redhat.com/1939614
https://bugzilla.redhat.com/2191687
https://bugzilla.redhat.com/2191690
https://bugzilla.redhat.com/2191691
https://bugzilla.redhat.com/2191692
https://bugzilla.redhat.com/2191694
https://bugzilla.redhat.com/show_bug.cgi?id=1939614
https://bugzilla.redhat.com/show_bug.cgi?id=2191687
https://bugzilla.redhat.com/show_bug.cgi?id=2191690
https://bugzilla.redhat.com/show_bug.cgi?id=2191691
https://bugzilla.redhat.com/show_bug.cgi?id=2191692
https://bugzilla.redhat.com/show_bug.cgi?id=2191694
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38470
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38471
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38473
https://errata.almalinux.org/8/ALSA-2023-7836.html
https://errata.rockylinux.org/RLSA-2023:7836
https://linux.oracle.com/cve/CVE-2023-38470.html
https://linux.oracle.com/errata/ELSA-2024-2433.html
https://nvd.nist.gov/vuln/detail/CVE-2023-38470
https://ubuntu.com/security/notices/USN-6487-1
https://www.cve.org/CVERecord?id=CVE-2023-38470
|
| libavahi-client3 |
CVE-2023-38471 |
MEDIUM |
0.8-10 |
0.8-10+deb12u1 |
https://access.redhat.com/errata/RHSA-2023:7836
https://access.redhat.com/security/cve/CVE-2023-38471
https://bugzilla.redhat.com/1939614
https://bugzilla.redhat.com/2191687
https://bugzilla.redhat.com/2191690
https://bugzilla.redhat.com/2191691
https://bugzilla.redhat.com/2191692
https://bugzilla.redhat.com/2191694
https://bugzilla.redhat.com/show_bug.cgi?id=1939614
https://bugzilla.redhat.com/show_bug.cgi?id=2191687
https://bugzilla.redhat.com/show_bug.cgi?id=2191690
https://bugzilla.redhat.com/show_bug.cgi?id=2191691
https://bugzilla.redhat.com/show_bug.cgi?id=2191692
https://bugzilla.redhat.com/show_bug.cgi?id=2191694
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38470
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38471
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38473
https://errata.almalinux.org/8/ALSA-2023-7836.html
https://errata.rockylinux.org/RLSA-2023:7836
https://linux.oracle.com/cve/CVE-2023-38471.html
https://linux.oracle.com/errata/ELSA-2024-2433.html
https://nvd.nist.gov/vuln/detail/CVE-2023-38471
https://ubuntu.com/security/notices/USN-6487-1
https://www.cve.org/CVERecord?id=CVE-2023-38471
|
| libavahi-client3 |
CVE-2023-38472 |
MEDIUM |
0.8-10 |
0.8-10+deb12u1 |
https://access.redhat.com/errata/RHSA-2023:7836
https://access.redhat.com/security/cve/CVE-2023-38472
https://bugzilla.redhat.com/1939614
https://bugzilla.redhat.com/2191687
https://bugzilla.redhat.com/2191690
https://bugzilla.redhat.com/2191691
https://bugzilla.redhat.com/2191692
https://bugzilla.redhat.com/2191694
https://bugzilla.redhat.com/show_bug.cgi?id=1939614
https://bugzilla.redhat.com/show_bug.cgi?id=2191687
https://bugzilla.redhat.com/show_bug.cgi?id=2191690
https://bugzilla.redhat.com/show_bug.cgi?id=2191691
https://bugzilla.redhat.com/show_bug.cgi?id=2191692
https://bugzilla.redhat.com/show_bug.cgi?id=2191694
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38470
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38471
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38473
https://errata.almalinux.org/8/ALSA-2023-7836.html
https://errata.rockylinux.org/RLSA-2023:7836
https://linux.oracle.com/cve/CVE-2023-38472.html
https://linux.oracle.com/errata/ELSA-2024-2433.html
https://nvd.nist.gov/vuln/detail/CVE-2023-38472
https://ubuntu.com/security/notices/USN-6487-1
https://www.cve.org/CVERecord?id=CVE-2023-38472
|
| libavahi-client3 |
CVE-2023-38473 |
MEDIUM |
0.8-10 |
0.8-10+deb12u1 |
https://access.redhat.com/errata/RHSA-2023:7836
https://access.redhat.com/security/cve/CVE-2023-38473
https://bugzilla.redhat.com/1939614
https://bugzilla.redhat.com/2191687
https://bugzilla.redhat.com/2191690
https://bugzilla.redhat.com/2191691
https://bugzilla.redhat.com/2191692
https://bugzilla.redhat.com/2191694
https://bugzilla.redhat.com/show_bug.cgi?id=1939614
https://bugzilla.redhat.com/show_bug.cgi?id=2191687
https://bugzilla.redhat.com/show_bug.cgi?id=2191690
https://bugzilla.redhat.com/show_bug.cgi?id=2191691
https://bugzilla.redhat.com/show_bug.cgi?id=2191692
https://bugzilla.redhat.com/show_bug.cgi?id=2191694
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38470
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38471
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38473
https://errata.almalinux.org/8/ALSA-2023-7836.html
https://errata.rockylinux.org/RLSA-2023:7836
https://linux.oracle.com/cve/CVE-2023-38473.html
https://linux.oracle.com/errata/ELSA-2024-2433.html
https://nvd.nist.gov/vuln/detail/CVE-2023-38473
https://ubuntu.com/security/notices/USN-6487-1
https://www.cve.org/CVERecord?id=CVE-2023-38473
|
| libavahi-client3 |
CVE-2024-52615 |
MEDIUM |
0.8-10 |
|
https://access.redhat.com/errata/RHSA-2025:11402
https://access.redhat.com/errata/RHSA-2025:16441
https://access.redhat.com/security/cve/CVE-2024-52615
https://bugzilla.redhat.com/2326418
https://bugzilla.redhat.com/show_bug.cgi?id=2326418
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52615
https://errata.almalinux.org/10/ALSA-2025-16441.html
https://errata.rockylinux.org/RLSA-2025:16441
https://github.com/avahi/avahi/issues/254#issuecomment-2480519212
https://github.com/avahi/avahi/security/advisories/GHSA-x6vp-f33h-h32g
https://linux.oracle.com/cve/CVE-2024-52615.html
https://linux.oracle.com/errata/ELSA-2025-16441.html
https://nvd.nist.gov/vuln/detail/CVE-2024-52615
https://www.cve.org/CVERecord?id=CVE-2024-52615
|
| libavahi-client3 |
CVE-2024-52616 |
MEDIUM |
0.8-10 |
|
https://access.redhat.com/errata/RHSA-2025:7437
https://access.redhat.com/security/cve/CVE-2024-52616
https://bugzilla.redhat.com/2326429
https://bugzilla.redhat.com/show_bug.cgi?id=2326429
https://errata.almalinux.org/9/ALSA-2025-7437.html
https://github.com/avahi/avahi/issues/254#issuecomment-2480519212
https://github.com/avahi/avahi/security/advisories/GHSA-r9j3-vjjh-p8vm
https://linux.oracle.com/cve/CVE-2024-52616.html
https://linux.oracle.com/errata/ELSA-2025-7437.html
https://nvd.nist.gov/vuln/detail/CVE-2024-52616
https://www.cve.org/CVERecord?id=CVE-2024-52616
|
| libavahi-common-data |
CVE-2023-38469 |
MEDIUM |
0.8-10 |
0.8-10+deb12u1 |
https://access.redhat.com/errata/RHSA-2023:7836
https://access.redhat.com/security/cve/CVE-2023-38469
https://bugzilla.redhat.com/1939614
https://bugzilla.redhat.com/2191687
https://bugzilla.redhat.com/2191690
https://bugzilla.redhat.com/2191691
https://bugzilla.redhat.com/2191692
https://bugzilla.redhat.com/2191694
https://bugzilla.redhat.com/show_bug.cgi?id=1939614
https://bugzilla.redhat.com/show_bug.cgi?id=2191687
https://bugzilla.redhat.com/show_bug.cgi?id=2191690
https://bugzilla.redhat.com/show_bug.cgi?id=2191691
https://bugzilla.redhat.com/show_bug.cgi?id=2191692
https://bugzilla.redhat.com/show_bug.cgi?id=2191694
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38470
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38471
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38473
https://errata.almalinux.org/8/ALSA-2023-7836.html
https://errata.rockylinux.org/RLSA-2023:7836
https://linux.oracle.com/cve/CVE-2023-38469.html
https://linux.oracle.com/errata/ELSA-2024-2433.html
https://nvd.nist.gov/vuln/detail/CVE-2023-38469
https://ubuntu.com/security/notices/USN-6487-1
https://www.cve.org/CVERecord?id=CVE-2023-38469
|
| libavahi-common-data |
CVE-2023-38470 |
MEDIUM |
0.8-10 |
0.8-10+deb12u1 |
https://access.redhat.com/errata/RHSA-2023:7836
https://access.redhat.com/security/cve/CVE-2023-38470
https://bugzilla.redhat.com/1939614
https://bugzilla.redhat.com/2191687
https://bugzilla.redhat.com/2191690
https://bugzilla.redhat.com/2191691
https://bugzilla.redhat.com/2191692
https://bugzilla.redhat.com/2191694
https://bugzilla.redhat.com/show_bug.cgi?id=1939614
https://bugzilla.redhat.com/show_bug.cgi?id=2191687
https://bugzilla.redhat.com/show_bug.cgi?id=2191690
https://bugzilla.redhat.com/show_bug.cgi?id=2191691
https://bugzilla.redhat.com/show_bug.cgi?id=2191692
https://bugzilla.redhat.com/show_bug.cgi?id=2191694
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38470
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38471
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38473
https://errata.almalinux.org/8/ALSA-2023-7836.html
https://errata.rockylinux.org/RLSA-2023:7836
https://linux.oracle.com/cve/CVE-2023-38470.html
https://linux.oracle.com/errata/ELSA-2024-2433.html
https://nvd.nist.gov/vuln/detail/CVE-2023-38470
https://ubuntu.com/security/notices/USN-6487-1
https://www.cve.org/CVERecord?id=CVE-2023-38470
|
| libavahi-common-data |
CVE-2023-38471 |
MEDIUM |
0.8-10 |
0.8-10+deb12u1 |
https://access.redhat.com/errata/RHSA-2023:7836
https://access.redhat.com/security/cve/CVE-2023-38471
https://bugzilla.redhat.com/1939614
https://bugzilla.redhat.com/2191687
https://bugzilla.redhat.com/2191690
https://bugzilla.redhat.com/2191691
https://bugzilla.redhat.com/2191692
https://bugzilla.redhat.com/2191694
https://bugzilla.redhat.com/show_bug.cgi?id=1939614
https://bugzilla.redhat.com/show_bug.cgi?id=2191687
https://bugzilla.redhat.com/show_bug.cgi?id=2191690
https://bugzilla.redhat.com/show_bug.cgi?id=2191691
https://bugzilla.redhat.com/show_bug.cgi?id=2191692
https://bugzilla.redhat.com/show_bug.cgi?id=2191694
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38470
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38471
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38473
https://errata.almalinux.org/8/ALSA-2023-7836.html
https://errata.rockylinux.org/RLSA-2023:7836
https://linux.oracle.com/cve/CVE-2023-38471.html
https://linux.oracle.com/errata/ELSA-2024-2433.html
https://nvd.nist.gov/vuln/detail/CVE-2023-38471
https://ubuntu.com/security/notices/USN-6487-1
https://www.cve.org/CVERecord?id=CVE-2023-38471
|
| libavahi-common-data |
CVE-2023-38472 |
MEDIUM |
0.8-10 |
0.8-10+deb12u1 |
https://access.redhat.com/errata/RHSA-2023:7836
https://access.redhat.com/security/cve/CVE-2023-38472
https://bugzilla.redhat.com/1939614
https://bugzilla.redhat.com/2191687
https://bugzilla.redhat.com/2191690
https://bugzilla.redhat.com/2191691
https://bugzilla.redhat.com/2191692
https://bugzilla.redhat.com/2191694
https://bugzilla.redhat.com/show_bug.cgi?id=1939614
https://bugzilla.redhat.com/show_bug.cgi?id=2191687
https://bugzilla.redhat.com/show_bug.cgi?id=2191690
https://bugzilla.redhat.com/show_bug.cgi?id=2191691
https://bugzilla.redhat.com/show_bug.cgi?id=2191692
https://bugzilla.redhat.com/show_bug.cgi?id=2191694
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38470
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38471
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38473
https://errata.almalinux.org/8/ALSA-2023-7836.html
https://errata.rockylinux.org/RLSA-2023:7836
https://linux.oracle.com/cve/CVE-2023-38472.html
https://linux.oracle.com/errata/ELSA-2024-2433.html
https://nvd.nist.gov/vuln/detail/CVE-2023-38472
https://ubuntu.com/security/notices/USN-6487-1
https://www.cve.org/CVERecord?id=CVE-2023-38472
|
| libavahi-common-data |
CVE-2023-38473 |
MEDIUM |
0.8-10 |
0.8-10+deb12u1 |
https://access.redhat.com/errata/RHSA-2023:7836
https://access.redhat.com/security/cve/CVE-2023-38473
https://bugzilla.redhat.com/1939614
https://bugzilla.redhat.com/2191687
https://bugzilla.redhat.com/2191690
https://bugzilla.redhat.com/2191691
https://bugzilla.redhat.com/2191692
https://bugzilla.redhat.com/2191694
https://bugzilla.redhat.com/show_bug.cgi?id=1939614
https://bugzilla.redhat.com/show_bug.cgi?id=2191687
https://bugzilla.redhat.com/show_bug.cgi?id=2191690
https://bugzilla.redhat.com/show_bug.cgi?id=2191691
https://bugzilla.redhat.com/show_bug.cgi?id=2191692
https://bugzilla.redhat.com/show_bug.cgi?id=2191694
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38470
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38471
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38473
https://errata.almalinux.org/8/ALSA-2023-7836.html
https://errata.rockylinux.org/RLSA-2023:7836
https://linux.oracle.com/cve/CVE-2023-38473.html
https://linux.oracle.com/errata/ELSA-2024-2433.html
https://nvd.nist.gov/vuln/detail/CVE-2023-38473
https://ubuntu.com/security/notices/USN-6487-1
https://www.cve.org/CVERecord?id=CVE-2023-38473
|
| libavahi-common-data |
CVE-2024-52615 |
MEDIUM |
0.8-10 |
|
https://access.redhat.com/errata/RHSA-2025:11402
https://access.redhat.com/errata/RHSA-2025:16441
https://access.redhat.com/security/cve/CVE-2024-52615
https://bugzilla.redhat.com/2326418
https://bugzilla.redhat.com/show_bug.cgi?id=2326418
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52615
https://errata.almalinux.org/10/ALSA-2025-16441.html
https://errata.rockylinux.org/RLSA-2025:16441
https://github.com/avahi/avahi/issues/254#issuecomment-2480519212
https://github.com/avahi/avahi/security/advisories/GHSA-x6vp-f33h-h32g
https://linux.oracle.com/cve/CVE-2024-52615.html
https://linux.oracle.com/errata/ELSA-2025-16441.html
https://nvd.nist.gov/vuln/detail/CVE-2024-52615
https://www.cve.org/CVERecord?id=CVE-2024-52615
|
| libavahi-common-data |
CVE-2024-52616 |
MEDIUM |
0.8-10 |
|
https://access.redhat.com/errata/RHSA-2025:7437
https://access.redhat.com/security/cve/CVE-2024-52616
https://bugzilla.redhat.com/2326429
https://bugzilla.redhat.com/show_bug.cgi?id=2326429
https://errata.almalinux.org/9/ALSA-2025-7437.html
https://github.com/avahi/avahi/issues/254#issuecomment-2480519212
https://github.com/avahi/avahi/security/advisories/GHSA-r9j3-vjjh-p8vm
https://linux.oracle.com/cve/CVE-2024-52616.html
https://linux.oracle.com/errata/ELSA-2025-7437.html
https://nvd.nist.gov/vuln/detail/CVE-2024-52616
https://www.cve.org/CVERecord?id=CVE-2024-52616
|
| libavahi-common3 |
CVE-2023-38469 |
MEDIUM |
0.8-10 |
0.8-10+deb12u1 |
https://access.redhat.com/errata/RHSA-2023:7836
https://access.redhat.com/security/cve/CVE-2023-38469
https://bugzilla.redhat.com/1939614
https://bugzilla.redhat.com/2191687
https://bugzilla.redhat.com/2191690
https://bugzilla.redhat.com/2191691
https://bugzilla.redhat.com/2191692
https://bugzilla.redhat.com/2191694
https://bugzilla.redhat.com/show_bug.cgi?id=1939614
https://bugzilla.redhat.com/show_bug.cgi?id=2191687
https://bugzilla.redhat.com/show_bug.cgi?id=2191690
https://bugzilla.redhat.com/show_bug.cgi?id=2191691
https://bugzilla.redhat.com/show_bug.cgi?id=2191692
https://bugzilla.redhat.com/show_bug.cgi?id=2191694
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38470
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38471
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38473
https://errata.almalinux.org/8/ALSA-2023-7836.html
https://errata.rockylinux.org/RLSA-2023:7836
https://linux.oracle.com/cve/CVE-2023-38469.html
https://linux.oracle.com/errata/ELSA-2024-2433.html
https://nvd.nist.gov/vuln/detail/CVE-2023-38469
https://ubuntu.com/security/notices/USN-6487-1
https://www.cve.org/CVERecord?id=CVE-2023-38469
|
| libavahi-common3 |
CVE-2023-38470 |
MEDIUM |
0.8-10 |
0.8-10+deb12u1 |
https://access.redhat.com/errata/RHSA-2023:7836
https://access.redhat.com/security/cve/CVE-2023-38470
https://bugzilla.redhat.com/1939614
https://bugzilla.redhat.com/2191687
https://bugzilla.redhat.com/2191690
https://bugzilla.redhat.com/2191691
https://bugzilla.redhat.com/2191692
https://bugzilla.redhat.com/2191694
https://bugzilla.redhat.com/show_bug.cgi?id=1939614
https://bugzilla.redhat.com/show_bug.cgi?id=2191687
https://bugzilla.redhat.com/show_bug.cgi?id=2191690
https://bugzilla.redhat.com/show_bug.cgi?id=2191691
https://bugzilla.redhat.com/show_bug.cgi?id=2191692
https://bugzilla.redhat.com/show_bug.cgi?id=2191694
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38470
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38471
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38473
https://errata.almalinux.org/8/ALSA-2023-7836.html
https://errata.rockylinux.org/RLSA-2023:7836
https://linux.oracle.com/cve/CVE-2023-38470.html
https://linux.oracle.com/errata/ELSA-2024-2433.html
https://nvd.nist.gov/vuln/detail/CVE-2023-38470
https://ubuntu.com/security/notices/USN-6487-1
https://www.cve.org/CVERecord?id=CVE-2023-38470
|
| libavahi-common3 |
CVE-2023-38471 |
MEDIUM |
0.8-10 |
0.8-10+deb12u1 |
https://access.redhat.com/errata/RHSA-2023:7836
https://access.redhat.com/security/cve/CVE-2023-38471
https://bugzilla.redhat.com/1939614
https://bugzilla.redhat.com/2191687
https://bugzilla.redhat.com/2191690
https://bugzilla.redhat.com/2191691
https://bugzilla.redhat.com/2191692
https://bugzilla.redhat.com/2191694
https://bugzilla.redhat.com/show_bug.cgi?id=1939614
https://bugzilla.redhat.com/show_bug.cgi?id=2191687
https://bugzilla.redhat.com/show_bug.cgi?id=2191690
https://bugzilla.redhat.com/show_bug.cgi?id=2191691
https://bugzilla.redhat.com/show_bug.cgi?id=2191692
https://bugzilla.redhat.com/show_bug.cgi?id=2191694
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38470
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38471
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38473
https://errata.almalinux.org/8/ALSA-2023-7836.html
https://errata.rockylinux.org/RLSA-2023:7836
https://linux.oracle.com/cve/CVE-2023-38471.html
https://linux.oracle.com/errata/ELSA-2024-2433.html
https://nvd.nist.gov/vuln/detail/CVE-2023-38471
https://ubuntu.com/security/notices/USN-6487-1
https://www.cve.org/CVERecord?id=CVE-2023-38471
|
| libavahi-common3 |
CVE-2023-38472 |
MEDIUM |
0.8-10 |
0.8-10+deb12u1 |
https://access.redhat.com/errata/RHSA-2023:7836
https://access.redhat.com/security/cve/CVE-2023-38472
https://bugzilla.redhat.com/1939614
https://bugzilla.redhat.com/2191687
https://bugzilla.redhat.com/2191690
https://bugzilla.redhat.com/2191691
https://bugzilla.redhat.com/2191692
https://bugzilla.redhat.com/2191694
https://bugzilla.redhat.com/show_bug.cgi?id=1939614
https://bugzilla.redhat.com/show_bug.cgi?id=2191687
https://bugzilla.redhat.com/show_bug.cgi?id=2191690
https://bugzilla.redhat.com/show_bug.cgi?id=2191691
https://bugzilla.redhat.com/show_bug.cgi?id=2191692
https://bugzilla.redhat.com/show_bug.cgi?id=2191694
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38470
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38471
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38473
https://errata.almalinux.org/8/ALSA-2023-7836.html
https://errata.rockylinux.org/RLSA-2023:7836
https://linux.oracle.com/cve/CVE-2023-38472.html
https://linux.oracle.com/errata/ELSA-2024-2433.html
https://nvd.nist.gov/vuln/detail/CVE-2023-38472
https://ubuntu.com/security/notices/USN-6487-1
https://www.cve.org/CVERecord?id=CVE-2023-38472
|
| libavahi-common3 |
CVE-2023-38473 |
MEDIUM |
0.8-10 |
0.8-10+deb12u1 |
https://access.redhat.com/errata/RHSA-2023:7836
https://access.redhat.com/security/cve/CVE-2023-38473
https://bugzilla.redhat.com/1939614
https://bugzilla.redhat.com/2191687
https://bugzilla.redhat.com/2191690
https://bugzilla.redhat.com/2191691
https://bugzilla.redhat.com/2191692
https://bugzilla.redhat.com/2191694
https://bugzilla.redhat.com/show_bug.cgi?id=1939614
https://bugzilla.redhat.com/show_bug.cgi?id=2191687
https://bugzilla.redhat.com/show_bug.cgi?id=2191690
https://bugzilla.redhat.com/show_bug.cgi?id=2191691
https://bugzilla.redhat.com/show_bug.cgi?id=2191692
https://bugzilla.redhat.com/show_bug.cgi?id=2191694
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38470
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38471
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38473
https://errata.almalinux.org/8/ALSA-2023-7836.html
https://errata.rockylinux.org/RLSA-2023:7836
https://linux.oracle.com/cve/CVE-2023-38473.html
https://linux.oracle.com/errata/ELSA-2024-2433.html
https://nvd.nist.gov/vuln/detail/CVE-2023-38473
https://ubuntu.com/security/notices/USN-6487-1
https://www.cve.org/CVERecord?id=CVE-2023-38473
|
| libavahi-common3 |
CVE-2024-52615 |
MEDIUM |
0.8-10 |
|
https://access.redhat.com/errata/RHSA-2025:11402
https://access.redhat.com/errata/RHSA-2025:16441
https://access.redhat.com/security/cve/CVE-2024-52615
https://bugzilla.redhat.com/2326418
https://bugzilla.redhat.com/show_bug.cgi?id=2326418
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52615
https://errata.almalinux.org/10/ALSA-2025-16441.html
https://errata.rockylinux.org/RLSA-2025:16441
https://github.com/avahi/avahi/issues/254#issuecomment-2480519212
https://github.com/avahi/avahi/security/advisories/GHSA-x6vp-f33h-h32g
https://linux.oracle.com/cve/CVE-2024-52615.html
https://linux.oracle.com/errata/ELSA-2025-16441.html
https://nvd.nist.gov/vuln/detail/CVE-2024-52615
https://www.cve.org/CVERecord?id=CVE-2024-52615
|
| libavahi-common3 |
CVE-2024-52616 |
MEDIUM |
0.8-10 |
|
https://access.redhat.com/errata/RHSA-2025:7437
https://access.redhat.com/security/cve/CVE-2024-52616
https://bugzilla.redhat.com/2326429
https://bugzilla.redhat.com/show_bug.cgi?id=2326429
https://errata.almalinux.org/9/ALSA-2025-7437.html
https://github.com/avahi/avahi/issues/254#issuecomment-2480519212
https://github.com/avahi/avahi/security/advisories/GHSA-r9j3-vjjh-p8vm
https://linux.oracle.com/cve/CVE-2024-52616.html
https://linux.oracle.com/errata/ELSA-2025-7437.html
https://nvd.nist.gov/vuln/detail/CVE-2024-52616
https://www.cve.org/CVERecord?id=CVE-2024-52616
|
| libblkid1 |
CVE-2022-0563 |
LOW |
2.38.1-5+deb12u1 |
|
https://access.redhat.com/security/cve/CVE-2022-0563
https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u
https://lore.kernel.org/util-linux/[email protected]/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.gentoo.org/glsa/202401-08
https://security.netapp.com/advisory/ntap-20220331-0002/
https://www.cve.org/CVERecord?id=CVE-2022-0563
|
| libc-bin |
CVE-2025-4802 |
HIGH |
2.36-9+deb12u7 |
2.36-9+deb12u11 |
http://www.openwall.com/lists/oss-security/2025/05/16/7
http://www.openwall.com/lists/oss-security/2025/05/17/2
https://access.redhat.com/errata/RHSA-2025:8686
https://access.redhat.com/security/cve/CVE-2025-4802
https://bugzilla.redhat.com/2367468
https://bugzilla.redhat.com/show_bug.cgi?id=2367468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4802
https://errata.almalinux.org/8/ALSA-2025-8686.html
https://errata.rockylinux.org/RLSA-2025:8686
https://linux.oracle.com/cve/CVE-2025-4802.html
https://linux.oracle.com/errata/ELSA-2025-8686.html
https://nvd.nist.gov/vuln/detail/CVE-2025-4802
https://sourceware.org/bugzilla/show_bug.cgi?id=32976
https://sourceware.org/cgit/glibc/commit/?id=1e18586c5820e329f741d5c710275e165581380e
https://sourceware.org/cgit/glibc/commit/?id=5451fa962cd0a90a0e2ec1d8910a559ace02bba0
https://ubuntu.com/security/notices/USN-7541-1
https://www.cve.org/CVERecord?id=CVE-2025-4802
https://www.openwall.com/lists/oss-security/2025/05/16/7
https://www.openwall.com/lists/oss-security/2025/05/17/2
|
| libc-bin |
CVE-2025-0395 |
MEDIUM |
2.36-9+deb12u7 |
2.36-9+deb12u10 |
http://www.openwall.com/lists/oss-security/2025/01/22/4
http://www.openwall.com/lists/oss-security/2025/01/23/2
http://www.openwall.com/lists/oss-security/2025/04/13/1
http://www.openwall.com/lists/oss-security/2025/04/24/7
https://access.redhat.com/errata/RHSA-2025:3828
https://access.redhat.com/security/cve/CVE-2025-0395
https://bugzilla.redhat.com/2339460
https://bugzilla.redhat.com/show_bug.cgi?id=2339460
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0395
https://errata.almalinux.org/8/ALSA-2025-3828.html
https://errata.rockylinux.org/RLSA-2025:3828
https://linux.oracle.com/cve/CVE-2025-0395.html
https://linux.oracle.com/errata/ELSA-2025-4244.html
https://lists.debian.org/debian-lts-announce/2025/04/msg00039.html
https://nvd.nist.gov/vuln/detail/CVE-2025-0395
https://security.netapp.com/advisory/ntap-20250228-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=32582
https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2025-0001
https://sourceware.org/pipermail/libc-announce/2025/000044.html
https://ubuntu.com/security/notices/USN-7259-1
https://ubuntu.com/security/notices/USN-7259-2
https://ubuntu.com/security/notices/USN-7259-3
https://www.cve.org/CVERecord?id=CVE-2025-0395
https://www.openwall.com/lists/oss-security/2025/01/22/4
|
| libc-bin |
CVE-2025-8058 |
MEDIUM |
2.36-9+deb12u7 |
2.36-9+deb12u13 |
https://access.redhat.com/errata/RHSA-2025:12980
https://access.redhat.com/security/cve/CVE-2025-8058
https://bugzilla.redhat.com/2383146
https://bugzilla.redhat.com/show_bug.cgi?id=2383146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8058
https://errata.almalinux.org/8/ALSA-2025-12980.html
https://errata.rockylinux.org/RLSA-2025:12980
https://linux.oracle.com/cve/CVE-2025-8058.html
https://linux.oracle.com/errata/ELSA-2025-20595.html
https://nvd.nist.gov/vuln/detail/CVE-2025-8058
https://sourceware.org/bugzilla/show_bug.cgi?id=33185
https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2025-0005
https://sourceware.org/git/?p=glibc.git;a=commit;h=3ff17af18c38727b88d9115e536c069e6b5d601f
https://ubuntu.com/security/notices/USN-7760-1
https://www.cve.org/CVERecord?id=CVE-2025-8058
|
| libc-bin |
CVE-2010-4756 |
LOW |
2.36-9+deb12u7 |
|
http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
https://www.cve.org/CVERecord?id=CVE-2010-4756
|
| libc-bin |
CVE-2018-20796 |
LOW |
2.36-9+deb12u7 |
|
http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&%3Butm_medium=RSS
https://www.cve.org/CVERecord?id=CVE-2018-20796
|
| libc-bin |
CVE-2019-1010022 |
LOW |
2.36-9+deb12u7 |
|
https://access.redhat.com/security/cve/CVE-2019-1010022
https://nvd.nist.gov/vuln/detail/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
https://www.cve.org/CVERecord?id=CVE-2019-1010022
|
| libc-bin |
CVE-2019-1010023 |
LOW |
2.36-9+deb12u7 |
|
http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://nvd.nist.gov/vuln/detail/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&%3Butm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
https://www.cve.org/CVERecord?id=CVE-2019-1010023
|
| libc-bin |
CVE-2019-1010024 |
LOW |
2.36-9+deb12u7 |
|
http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://nvd.nist.gov/vuln/detail/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&%3Butm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
https://www.cve.org/CVERecord?id=CVE-2019-1010024
|
| libc-bin |
CVE-2019-1010025 |
LOW |
2.36-9+deb12u7 |
|
https://access.redhat.com/security/cve/CVE-2019-1010025
https://nvd.nist.gov/vuln/detail/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&%3Butm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
https://www.cve.org/CVERecord?id=CVE-2019-1010025
|
| libc-bin |
CVE-2019-9192 |
LOW |
2.36-9+deb12u7 |
|
https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&%3Butm_medium=RSS
https://www.cve.org/CVERecord?id=CVE-2019-9192
|
| libc6 |
CVE-2025-4802 |
HIGH |
2.36-9+deb12u7 |
2.36-9+deb12u11 |
http://www.openwall.com/lists/oss-security/2025/05/16/7
http://www.openwall.com/lists/oss-security/2025/05/17/2
https://access.redhat.com/errata/RHSA-2025:8686
https://access.redhat.com/security/cve/CVE-2025-4802
https://bugzilla.redhat.com/2367468
https://bugzilla.redhat.com/show_bug.cgi?id=2367468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4802
https://errata.almalinux.org/8/ALSA-2025-8686.html
https://errata.rockylinux.org/RLSA-2025:8686
https://linux.oracle.com/cve/CVE-2025-4802.html
https://linux.oracle.com/errata/ELSA-2025-8686.html
https://nvd.nist.gov/vuln/detail/CVE-2025-4802
https://sourceware.org/bugzilla/show_bug.cgi?id=32976
https://sourceware.org/cgit/glibc/commit/?id=1e18586c5820e329f741d5c710275e165581380e
https://sourceware.org/cgit/glibc/commit/?id=5451fa962cd0a90a0e2ec1d8910a559ace02bba0
https://ubuntu.com/security/notices/USN-7541-1
https://www.cve.org/CVERecord?id=CVE-2025-4802
https://www.openwall.com/lists/oss-security/2025/05/16/7
https://www.openwall.com/lists/oss-security/2025/05/17/2
|
| libc6 |
CVE-2025-0395 |
MEDIUM |
2.36-9+deb12u7 |
2.36-9+deb12u10 |
http://www.openwall.com/lists/oss-security/2025/01/22/4
http://www.openwall.com/lists/oss-security/2025/01/23/2
http://www.openwall.com/lists/oss-security/2025/04/13/1
http://www.openwall.com/lists/oss-security/2025/04/24/7
https://access.redhat.com/errata/RHSA-2025:3828
https://access.redhat.com/security/cve/CVE-2025-0395
https://bugzilla.redhat.com/2339460
https://bugzilla.redhat.com/show_bug.cgi?id=2339460
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0395
https://errata.almalinux.org/8/ALSA-2025-3828.html
https://errata.rockylinux.org/RLSA-2025:3828
https://linux.oracle.com/cve/CVE-2025-0395.html
https://linux.oracle.com/errata/ELSA-2025-4244.html
https://lists.debian.org/debian-lts-announce/2025/04/msg00039.html
https://nvd.nist.gov/vuln/detail/CVE-2025-0395
https://security.netapp.com/advisory/ntap-20250228-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=32582
https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2025-0001
https://sourceware.org/pipermail/libc-announce/2025/000044.html
https://ubuntu.com/security/notices/USN-7259-1
https://ubuntu.com/security/notices/USN-7259-2
https://ubuntu.com/security/notices/USN-7259-3
https://www.cve.org/CVERecord?id=CVE-2025-0395
https://www.openwall.com/lists/oss-security/2025/01/22/4
|
| libc6 |
CVE-2025-8058 |
MEDIUM |
2.36-9+deb12u7 |
2.36-9+deb12u13 |
https://access.redhat.com/errata/RHSA-2025:12980
https://access.redhat.com/security/cve/CVE-2025-8058
https://bugzilla.redhat.com/2383146
https://bugzilla.redhat.com/show_bug.cgi?id=2383146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8058
https://errata.almalinux.org/8/ALSA-2025-12980.html
https://errata.rockylinux.org/RLSA-2025:12980
https://linux.oracle.com/cve/CVE-2025-8058.html
https://linux.oracle.com/errata/ELSA-2025-20595.html
https://nvd.nist.gov/vuln/detail/CVE-2025-8058
https://sourceware.org/bugzilla/show_bug.cgi?id=33185
https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2025-0005
https://sourceware.org/git/?p=glibc.git;a=commit;h=3ff17af18c38727b88d9115e536c069e6b5d601f
https://ubuntu.com/security/notices/USN-7760-1
https://www.cve.org/CVERecord?id=CVE-2025-8058
|
| libc6 |
CVE-2010-4756 |
LOW |
2.36-9+deb12u7 |
|
http://cxib.net/stuff/glob-0day.c
http://securityreason.com/achievement_securityalert/89
http://securityreason.com/exploitalert/9223
https://access.redhat.com/security/cve/CVE-2010-4756
https://bugzilla.redhat.com/show_bug.cgi?id=681681
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
https://nvd.nist.gov/vuln/detail/CVE-2010-4756
https://www.cve.org/CVERecord?id=CVE-2010-4756
|
| libc6 |
CVE-2018-20796 |
LOW |
2.36-9+deb12u7 |
|
http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2018-20796
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20796
https://security.netapp.com/advisory/ntap-20190315-0002/
https://support.f5.com/csp/article/K26346590?utm_source=f5support&%3Butm_medium=RSS
https://www.cve.org/CVERecord?id=CVE-2018-20796
|
| libc6 |
CVE-2019-1010022 |
LOW |
2.36-9+deb12u7 |
|
https://access.redhat.com/security/cve/CVE-2019-1010022
https://nvd.nist.gov/vuln/detail/CVE-2019-1010022
https://security-tracker.debian.org/tracker/CVE-2019-1010022
https://sourceware.org/bugzilla/show_bug.cgi?id=22850
https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
https://ubuntu.com/security/CVE-2019-1010022
https://www.cve.org/CVERecord?id=CVE-2019-1010022
|
| libc6 |
CVE-2019-1010023 |
LOW |
2.36-9+deb12u7 |
|
http://www.securityfocus.com/bid/109167
https://access.redhat.com/security/cve/CVE-2019-1010023
https://nvd.nist.gov/vuln/detail/CVE-2019-1010023
https://security-tracker.debian.org/tracker/CVE-2019-1010023
https://sourceware.org/bugzilla/show_bug.cgi?id=22851
https://support.f5.com/csp/article/K11932200?utm_source=f5support&%3Butm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010023
https://www.cve.org/CVERecord?id=CVE-2019-1010023
|
| libc6 |
CVE-2019-1010024 |
LOW |
2.36-9+deb12u7 |
|
http://www.securityfocus.com/bid/109162
https://access.redhat.com/security/cve/CVE-2019-1010024
https://nvd.nist.gov/vuln/detail/CVE-2019-1010024
https://security-tracker.debian.org/tracker/CVE-2019-1010024
https://sourceware.org/bugzilla/show_bug.cgi?id=22852
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&%3Butm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010024
https://www.cve.org/CVERecord?id=CVE-2019-1010024
|
| libc6 |
CVE-2019-1010025 |
LOW |
2.36-9+deb12u7 |
|
https://access.redhat.com/security/cve/CVE-2019-1010025
https://nvd.nist.gov/vuln/detail/CVE-2019-1010025
https://security-tracker.debian.org/tracker/CVE-2019-1010025
https://sourceware.org/bugzilla/show_bug.cgi?id=22853
https://support.f5.com/csp/article/K06046097
https://support.f5.com/csp/article/K06046097?utm_source=f5support&%3Butm_medium=RSS
https://ubuntu.com/security/CVE-2019-1010025
https://www.cve.org/CVERecord?id=CVE-2019-1010025
|
| libc6 |
CVE-2019-9192 |
LOW |
2.36-9+deb12u7 |
|
https://access.redhat.com/security/cve/CVE-2019-9192
https://nvd.nist.gov/vuln/detail/CVE-2019-9192
https://sourceware.org/bugzilla/show_bug.cgi?id=24269
https://support.f5.com/csp/article/K26346590?utm_source=f5support&%3Butm_medium=RSS
https://www.cve.org/CVERecord?id=CVE-2019-9192
|
| libcairo-gobject2 |
CVE-2017-7475 |
LOW |
1.16.0-7 |
|
http://seclists.org/oss-sec/2017/q2/151
https://access.redhat.com/security/cve/CVE-2017-7475
https://bugs.freedesktop.org/show_bug.cgi?id=100763
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475
https://github.com/rcairo/rcairo
https://github.com/rubysec/ruby-advisory-db/blob/master/gems/cairo/CVE-2017-7475.yml
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-7475
https://www.cve.org/CVERecord?id=CVE-2017-7475
|
| libcairo-gobject2 |
CVE-2018-18064 |
LOW |
1.16.0-7 |
|
https://access.redhat.com/security/cve/CVE-2018-18064
https://gitlab.freedesktop.org/cairo/cairo/issues/341
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-18064
https://www.cve.org/CVERecord?id=CVE-2018-18064
|
| libcairo-gobject2 |
CVE-2019-6461 |
LOW |
1.16.0-7 |
|
https://access.redhat.com/security/cve/CVE-2019-6461
https://github.com/TeamSeri0us/pocs/tree/master/gerbv
https://gitlab.freedesktop.org/cairo/cairo/issues/352
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-6461
https://www.cve.org/CVERecord?id=CVE-2019-6461
|
| libcairo-gobject2 |
CVE-2019-6462 |
LOW |
1.16.0-7 |
|
https://access.redhat.com/security/cve/CVE-2019-6462
https://github.com/TeamSeri0us/pocs/tree/master/gerbv
https://gitlab.freedesktop.org/cairo/cairo/issues/353
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-6462
https://ubuntu.com/security/notices/USN-5407-1
https://www.cve.org/CVERecord?id=CVE-2019-6462
|
| libcairo-gobject2 |
CVE-2025-50422 |
LOW |
1.16.0-7 |
|
http://freedesktop.com
http://poppler.com
https://access.redhat.com/security/cve/CVE-2025-50422
https://github.com/Landw-hub/CVE-2025-50422
https://gitlab.freedesktop.org/cairo/cairo/-/merge_requests/621
https://gitlab.freedesktop.org/poppler/poppler/-/issues/1591
https://gitlab.freedesktop.org/poppler/poppler/-/issues/1591#note_3045081
https://nvd.nist.gov/vuln/detail/CVE-2025-50422
https://www.cve.org/CVERecord?id=CVE-2025-50422
|
| libcairo2 |
CVE-2017-7475 |
LOW |
1.16.0-7 |
|
http://seclists.org/oss-sec/2017/q2/151
https://access.redhat.com/security/cve/CVE-2017-7475
https://bugs.freedesktop.org/show_bug.cgi?id=100763
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475
https://github.com/rcairo/rcairo
https://github.com/rubysec/ruby-advisory-db/blob/master/gems/cairo/CVE-2017-7475.yml
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-7475
https://www.cve.org/CVERecord?id=CVE-2017-7475
|
| libcairo2 |
CVE-2018-18064 |
LOW |
1.16.0-7 |
|
https://access.redhat.com/security/cve/CVE-2018-18064
https://gitlab.freedesktop.org/cairo/cairo/issues/341
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-18064
https://www.cve.org/CVERecord?id=CVE-2018-18064
|
| libcairo2 |
CVE-2019-6461 |
LOW |
1.16.0-7 |
|
https://access.redhat.com/security/cve/CVE-2019-6461
https://github.com/TeamSeri0us/pocs/tree/master/gerbv
https://gitlab.freedesktop.org/cairo/cairo/issues/352
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-6461
https://www.cve.org/CVERecord?id=CVE-2019-6461
|
| libcairo2 |
CVE-2019-6462 |
LOW |
1.16.0-7 |
|
https://access.redhat.com/security/cve/CVE-2019-6462
https://github.com/TeamSeri0us/pocs/tree/master/gerbv
https://gitlab.freedesktop.org/cairo/cairo/issues/353
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-6462
https://ubuntu.com/security/notices/USN-5407-1
https://www.cve.org/CVERecord?id=CVE-2019-6462
|
| libcairo2 |
CVE-2025-50422 |
LOW |
1.16.0-7 |
|
http://freedesktop.com
http://poppler.com
https://access.redhat.com/security/cve/CVE-2025-50422
https://github.com/Landw-hub/CVE-2025-50422
https://gitlab.freedesktop.org/cairo/cairo/-/merge_requests/621
https://gitlab.freedesktop.org/poppler/poppler/-/issues/1591
https://gitlab.freedesktop.org/poppler/poppler/-/issues/1591#note_3045081
https://nvd.nist.gov/vuln/detail/CVE-2025-50422
https://www.cve.org/CVERecord?id=CVE-2025-50422
|
| libcap2 |
CVE-2025-1390 |
MEDIUM |
1:2.66-4 |
1:2.66-4+deb12u1 |
https://access.redhat.com/security/cve/CVE-2025-1390
https://bugzilla.openanolis.cn/show_bug.cgi?id=18804
https://nvd.nist.gov/vuln/detail/CVE-2025-1390
https://ubuntu.com/security/notices/USN-7287-1
https://www.cve.org/CVERecord?id=CVE-2025-1390
|
| libcap2-bin |
CVE-2025-1390 |
MEDIUM |
1:2.66-4 |
1:2.66-4+deb12u1 |
https://access.redhat.com/security/cve/CVE-2025-1390
https://bugzilla.openanolis.cn/show_bug.cgi?id=18804
https://nvd.nist.gov/vuln/detail/CVE-2025-1390
https://ubuntu.com/security/notices/USN-7287-1
https://www.cve.org/CVERecord?id=CVE-2025-1390
|
| libcups2 |
CVE-2024-47175 |
CRITICAL |
2.4.2-3+deb12u5 |
2.4.2-3+deb12u8 |
http://www.openwall.com/lists/oss-security/2024/09/27/3
https://access.redhat.com/errata/RHSA-2025:0083
https://access.redhat.com/security/cve/CVE-2024-47175
https://bugzilla.redhat.com/2314256
https://bugzilla.redhat.com/show_bug.cgi?id=2314252
https://bugzilla.redhat.com/show_bug.cgi?id=2314253
https://bugzilla.redhat.com/show_bug.cgi?id=2314256
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47076
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47175
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47176
https://errata.almalinux.org/8/ALSA-2025-0083.html
https://errata.rockylinux.org/RLSA-2024:7346
https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8
https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47
https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5
https://github.com/OpenPrinting/libppd/commit/d681747ebf12602cb426725eb8ce2753211e2477
https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6
https://linux.oracle.com/cve/CVE-2024-47175.html
https://linux.oracle.com/errata/ELSA-2025-0083.html
https://lists.debian.org/debian-lts-announce/2024/09/msg00047.html
https://nvd.nist.gov/vuln/detail/CVE-2024-47175
https://ubuntu.com/blog/cups-remote-code-execution-vulnerability-fix-available
https://ubuntu.com/security/notices/USN-7041-1
https://ubuntu.com/security/notices/USN-7041-2
https://ubuntu.com/security/notices/USN-7041-3
https://ubuntu.com/security/notices/USN-7045-1
https://www.cups.org
https://www.cve.org/CVERecord?id=CVE-2024-47175
https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I
https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/
|
| libcups2 |
CVE-2025-58060 |
HIGH |
2.4.2-3+deb12u5 |
2.4.2-3+deb12u9 |
https://access.redhat.com/errata/RHSA-2025:15702
https://access.redhat.com/security/cve/CVE-2025-58060
https://bugzilla.redhat.com/2392595
https://bugzilla.redhat.com/show_bug.cgi?id=2392595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58060
https://errata.almalinux.org/8/ALSA-2025-15702.html
https://errata.rockylinux.org/RLSA-2025:15702
https://github.com/OpenPrinting/cups/commit/595d691075b1d396d2edfaa0a8fd0873a0a1f221
https://github.com/OpenPrinting/cups/security/advisories/GHSA-4c68-qgrh-rmmq
https://linux.oracle.com/cve/CVE-2025-58060.html
https://linux.oracle.com/errata/ELSA-2025-15702.html
https://nvd.nist.gov/vuln/detail/CVE-2025-58060
https://ubuntu.com/security/notices/USN-7745-1
https://www.cve.org/CVERecord?id=CVE-2025-58060
|
| libcups2 |
CVE-2024-35235 |
MEDIUM |
2.4.2-3+deb12u5 |
2.4.2-3+deb12u6 |
http://www.openwall.com/lists/oss-security/2024/06/11/1
http://www.openwall.com/lists/oss-security/2024/06/12/4
http://www.openwall.com/lists/oss-security/2024/06/12/5
http://www.openwall.com/lists/oss-security/2024/11/08/3
https://access.redhat.com/errata/RHSA-2024:4265
https://access.redhat.com/security/cve/CVE-2024-35235
https://bugzilla.redhat.com/2290318
https://bugzilla.redhat.com/show_bug.cgi?id=2290318
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35235
https://errata.almalinux.org/8/ALSA-2024-4265.html
https://errata.rockylinux.org/RLSA-2024:4265
https://git.launchpad.net/ubuntu/+source/apparmor/tree/profiles/apparmor.d/abstractions/user-tmp#n21
https://github.com/OpenPrinting/cups/blob/aba917003c8de55e5bf85010f0ecf1f1ddd1408e/cups/http-addr.c#L229-L240
https://github.com/OpenPrinting/cups/commit/ff1f8a623e090dee8a8aadf12a6a4b25efac143d
https://github.com/OpenPrinting/cups/security/advisories/GHSA-vvwp-mv6j-hw6f
https://linux.oracle.com/cve/CVE-2024-35235.html
https://linux.oracle.com/errata/ELSA-2024-4776.html
https://lists.debian.org/debian-lts-announce/2024/06/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2024-35235
https://seclists.org/oss-sec/2024/q2/277
https://ubuntu.com/security/notices/USN-6844-1
https://www.cve.org/CVERecord?id=CVE-2024-35235
|
| libcups2 |
CVE-2025-58364 |
MEDIUM |
2.4.2-3+deb12u5 |
2.4.2-3+deb12u9 |
https://access.redhat.com/errata/RHSA-2025:15701
https://access.redhat.com/security/cve/CVE-2025-58364
https://bugzilla.redhat.com/2392595
https://bugzilla.redhat.com/2393078
https://bugzilla.redhat.com/show_bug.cgi?id=2392595
https://bugzilla.redhat.com/show_bug.cgi?id=2393078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58364
https://errata.almalinux.org/10/ALSA-2025-15701.html
https://errata.rockylinux.org/RLSA-2025:15701
https://github.com/OpenPrinting/cups/commit/e58cba9d6fceed4242980e51dbd1302cf638ab1d
https://github.com/OpenPrinting/cups/security/advisories/GHSA-7qx3-r744-6qv4
https://linux.oracle.com/cve/CVE-2025-58364.html
https://linux.oracle.com/errata/ELSA-2025-15701.html
https://nvd.nist.gov/vuln/detail/CVE-2025-58364
https://ubuntu.com/security/notices/USN-7745-1
https://www.cve.org/CVERecord?id=CVE-2025-58364
|
| libcups2 |
CVE-2014-8166 |
LOW |
2.4.2-3+deb12u5 |
|
http://www.openwall.com/lists/oss-security/2015/03/24/15
http://www.openwall.com/lists/oss-security/2015/03/24/2
http://www.securityfocus.com/bid/73300
https://access.redhat.com/security/cve/CVE-2014-8166
https://bugzilla.redhat.com/show_bug.cgi?id=1084577
https://nvd.nist.gov/vuln/detail/CVE-2014-8166
https://www.cve.org/CVERecord?id=CVE-2014-8166
|
| libcurl3-gnutls |
CVE-2025-10148 |
MEDIUM |
8.8.0-1~bpo12+1 |
|
https://access.redhat.com/security/cve/CVE-2025-10148
https://curl.se/docs/CVE-2025-10148.html
https://curl.se/docs/CVE-2025-10148.json
https://hackerone.com/reports/3330839
https://nvd.nist.gov/vuln/detail/CVE-2025-10148
https://www.cve.org/CVERecord?id=CVE-2025-10148
|
| libcurl3-gnutls |
CVE-2025-9086 |
MEDIUM |
8.8.0-1~bpo12+1 |
|
https://access.redhat.com/security/cve/CVE-2025-9086
https://curl.se/docs/CVE-2025-9086.html
https://curl.se/docs/CVE-2025-9086.json
https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6
https://hackerone.com/reports/3294999
https://nvd.nist.gov/vuln/detail/CVE-2025-9086
https://www.cve.org/CVERecord?id=CVE-2025-9086
|
| libcurl3-gnutls |
CVE-2024-2379 |
LOW |
8.8.0-1~bpo12+1 |
|
http://seclists.org/fulldisclosure/2024/Jul/18
http://seclists.org/fulldisclosure/2024/Jul/19
http://seclists.org/fulldisclosure/2024/Jul/20
http://www.openwall.com/lists/oss-security/2024/03/27/2
https://access.redhat.com/security/cve/CVE-2024-2379
https://curl.se/docs/CVE-2024-2379.html
https://curl.se/docs/CVE-2024-2379.json
https://hackerone.com/reports/2410774
https://nvd.nist.gov/vuln/detail/CVE-2024-2379
https://security.netapp.com/advisory/ntap-20240531-0001/
https://support.apple.com/kb/HT214118
https://support.apple.com/kb/HT214119
https://support.apple.com/kb/HT214120
https://www.cve.org/CVERecord?id=CVE-2024-2379
|
| libcurl3-gnutls |
CVE-2025-0725 |
LOW |
8.8.0-1~bpo12+1 |
|
http://www.openwall.com/lists/oss-security/2025/02/05/3
http://www.openwall.com/lists/oss-security/2025/02/06/2
http://www.openwall.com/lists/oss-security/2025/02/06/4
https://access.redhat.com/security/cve/CVE-2025-0725
https://curl.se/docs/CVE-2025-0725.html
https://curl.se/docs/CVE-2025-0725.json
https://github.com/curl/curl/commit/76f83f0db23846e254d940ec7
https://hackerone.com/reports/2956023
https://nvd.nist.gov/vuln/detail/CVE-2025-0725
https://security.netapp.com/advisory/ntap-20250306-0009/
https://www.cve.org/CVERecord?id=CVE-2025-0725
|
| libcurl4 |
CVE-2025-10148 |
MEDIUM |
8.8.0-1~bpo12+1 |
|
https://access.redhat.com/security/cve/CVE-2025-10148
https://curl.se/docs/CVE-2025-10148.html
https://curl.se/docs/CVE-2025-10148.json
https://hackerone.com/reports/3330839
https://nvd.nist.gov/vuln/detail/CVE-2025-10148
https://www.cve.org/CVERecord?id=CVE-2025-10148
|
| libcurl4 |
CVE-2025-9086 |
MEDIUM |
8.8.0-1~bpo12+1 |
|
https://access.redhat.com/security/cve/CVE-2025-9086
https://curl.se/docs/CVE-2025-9086.html
https://curl.se/docs/CVE-2025-9086.json
https://github.com/curl/curl/commit/c6ae07c6a541e0e96d0040afb6
https://hackerone.com/reports/3294999
https://nvd.nist.gov/vuln/detail/CVE-2025-9086
https://www.cve.org/CVERecord?id=CVE-2025-9086
|
| libcurl4 |
CVE-2024-2379 |
LOW |
8.8.0-1~bpo12+1 |
|
http://seclists.org/fulldisclosure/2024/Jul/18
http://seclists.org/fulldisclosure/2024/Jul/19
http://seclists.org/fulldisclosure/2024/Jul/20
http://www.openwall.com/lists/oss-security/2024/03/27/2
https://access.redhat.com/security/cve/CVE-2024-2379
https://curl.se/docs/CVE-2024-2379.html
https://curl.se/docs/CVE-2024-2379.json
https://hackerone.com/reports/2410774
https://nvd.nist.gov/vuln/detail/CVE-2024-2379
https://security.netapp.com/advisory/ntap-20240531-0001/
https://support.apple.com/kb/HT214118
https://support.apple.com/kb/HT214119
https://support.apple.com/kb/HT214120
https://www.cve.org/CVERecord?id=CVE-2024-2379
|
| libcurl4 |
CVE-2025-0725 |
LOW |
8.8.0-1~bpo12+1 |
|
http://www.openwall.com/lists/oss-security/2025/02/05/3
http://www.openwall.com/lists/oss-security/2025/02/06/2
http://www.openwall.com/lists/oss-security/2025/02/06/4
https://access.redhat.com/security/cve/CVE-2025-0725
https://curl.se/docs/CVE-2025-0725.html
https://curl.se/docs/CVE-2025-0725.json
https://github.com/curl/curl/commit/76f83f0db23846e254d940ec7
https://hackerone.com/reports/2956023
https://nvd.nist.gov/vuln/detail/CVE-2025-0725
https://security.netapp.com/advisory/ntap-20250306-0009/
https://www.cve.org/CVERecord?id=CVE-2025-0725
|
| libdw1 |
CVE-2024-25260 |
LOW |
0.188-2.1 |
|
https://access.redhat.com/security/cve/CVE-2024-25260
https://github.com/schsiung/fuzzer_issues/issues/1
https://nvd.nist.gov/vuln/detail/CVE-2024-25260
https://sourceware.org/bugzilla/show_bug.cgi?id=31058
https://sourceware.org/elfutils/
https://ubuntu.com/security/notices/USN-7369-1
https://www.cve.org/CVERecord?id=CVE-2024-25260
|
| libdw1 |
CVE-2025-1352 |
LOW |
0.188-2.1 |
|
https://access.redhat.com/security/cve/CVE-2025-1352
https://nvd.nist.gov/vuln/detail/CVE-2025-1352
https://sourceware.org/bugzilla/attachment.cgi?id=15923
https://sourceware.org/bugzilla/show_bug.cgi?id=32650
https://sourceware.org/bugzilla/show_bug.cgi?id=32650#c2
https://vuldb.com/?ctiid.295960
https://vuldb.com/?id.295960
https://vuldb.com/?submit.495965
https://www.cve.org/CVERecord?id=CVE-2025-1352
https://www.gnu.org/
|
| libdw1 |
CVE-2025-1365 |
LOW |
0.188-2.1 |
|
https://access.redhat.com/security/cve/CVE-2025-1365
https://nvd.nist.gov/vuln/detail/CVE-2025-1365
https://sourceware.org/bugzilla/attachment.cgi?id=15925
https://sourceware.org/bugzilla/show_bug.cgi?id=32654
https://sourceware.org/bugzilla/show_bug.cgi?id=32654#c2
https://ubuntu.com/security/notices/USN-7369-1
https://vuldb.com/?ctiid.295977
https://vuldb.com/?id.295977
https://vuldb.com/?submit.496483
https://www.cve.org/CVERecord?id=CVE-2025-1365
https://www.gnu.org/
|
| libdw1 |
CVE-2025-1371 |
LOW |
0.188-2.1 |
|
https://access.redhat.com/security/cve/CVE-2025-1371
https://nvd.nist.gov/vuln/detail/CVE-2025-1371
https://sourceware.org/bugzilla/attachment.cgi?id=15926
https://sourceware.org/bugzilla/show_bug.cgi?id=32655
https://sourceware.org/bugzilla/show_bug.cgi?id=32655#c2
https://ubuntu.com/security/notices/USN-7369-1
https://vuldb.com/?ctiid.295978
https://vuldb.com/?id.295978
https://vuldb.com/?submit.496484
https://www.cve.org/CVERecord?id=CVE-2025-1371
https://www.gnu.org/
|
| libdw1 |
CVE-2025-1372 |
LOW |
0.188-2.1 |
|
https://access.redhat.com/security/cve/CVE-2025-1372
https://nvd.nist.gov/vuln/detail/CVE-2025-1372
https://sourceware.org/bugzilla/attachment.cgi?id=15927
https://sourceware.org/bugzilla/show_bug.cgi?id=32656
https://sourceware.org/bugzilla/show_bug.cgi?id=32656#c3
https://sourceware.org/bugzilla/show_bug.cgi?id=32657
https://ubuntu.com/security/notices/USN-7369-1
https://vuldb.com/?ctiid.295981
https://vuldb.com/?id.295981
https://vuldb.com/?submit.496485
https://www.cve.org/CVERecord?id=CVE-2025-1372
https://www.gnu.org/
|
| libdw1 |
CVE-2025-1376 |
LOW |
0.188-2.1 |
|
https://access.redhat.com/security/cve/CVE-2025-1376
https://nvd.nist.gov/vuln/detail/CVE-2025-1376
https://sourceware.org/bugzilla/attachment.cgi?id=15940
https://sourceware.org/bugzilla/show_bug.cgi?id=32672
https://sourceware.org/bugzilla/show_bug.cgi?id=32672#c3
https://vuldb.com/?ctiid.295984
https://vuldb.com/?id.295984
https://vuldb.com/?submit.497538
https://www.cve.org/CVERecord?id=CVE-2025-1376
https://www.gnu.org/
|
| libdw1 |
CVE-2025-1377 |
LOW |
0.188-2.1 |
|
https://access.redhat.com/security/cve/CVE-2025-1377
https://nvd.nist.gov/vuln/detail/CVE-2025-1377
https://sourceware.org/bugzilla/attachment.cgi?id=15941
https://sourceware.org/bugzilla/show_bug.cgi?id=32673
https://sourceware.org/bugzilla/show_bug.cgi?id=32673#c2
https://ubuntu.com/security/notices/USN-7369-1
https://vuldb.com/?ctiid.295985
https://vuldb.com/?id.295985
https://vuldb.com/?submit.497539
https://www.cve.org/CVERecord?id=CVE-2025-1377
https://www.gnu.org/
|
| libelf1 |
CVE-2024-25260 |
LOW |
0.188-2.1 |
|
https://access.redhat.com/security/cve/CVE-2024-25260
https://github.com/schsiung/fuzzer_issues/issues/1
https://nvd.nist.gov/vuln/detail/CVE-2024-25260
https://sourceware.org/bugzilla/show_bug.cgi?id=31058
https://sourceware.org/elfutils/
https://ubuntu.com/security/notices/USN-7369-1
https://www.cve.org/CVERecord?id=CVE-2024-25260
|
| libelf1 |
CVE-2025-1352 |
LOW |
0.188-2.1 |
|
https://access.redhat.com/security/cve/CVE-2025-1352
https://nvd.nist.gov/vuln/detail/CVE-2025-1352
https://sourceware.org/bugzilla/attachment.cgi?id=15923
https://sourceware.org/bugzilla/show_bug.cgi?id=32650
https://sourceware.org/bugzilla/show_bug.cgi?id=32650#c2
https://vuldb.com/?ctiid.295960
https://vuldb.com/?id.295960
https://vuldb.com/?submit.495965
https://www.cve.org/CVERecord?id=CVE-2025-1352
https://www.gnu.org/
|
| libelf1 |
CVE-2025-1365 |
LOW |
0.188-2.1 |
|
https://access.redhat.com/security/cve/CVE-2025-1365
https://nvd.nist.gov/vuln/detail/CVE-2025-1365
https://sourceware.org/bugzilla/attachment.cgi?id=15925
https://sourceware.org/bugzilla/show_bug.cgi?id=32654
https://sourceware.org/bugzilla/show_bug.cgi?id=32654#c2
https://ubuntu.com/security/notices/USN-7369-1
https://vuldb.com/?ctiid.295977
https://vuldb.com/?id.295977
https://vuldb.com/?submit.496483
https://www.cve.org/CVERecord?id=CVE-2025-1365
https://www.gnu.org/
|
| libelf1 |
CVE-2025-1371 |
LOW |
0.188-2.1 |
|
https://access.redhat.com/security/cve/CVE-2025-1371
https://nvd.nist.gov/vuln/detail/CVE-2025-1371
https://sourceware.org/bugzilla/attachment.cgi?id=15926
https://sourceware.org/bugzilla/show_bug.cgi?id=32655
https://sourceware.org/bugzilla/show_bug.cgi?id=32655#c2
https://ubuntu.com/security/notices/USN-7369-1
https://vuldb.com/?ctiid.295978
https://vuldb.com/?id.295978
https://vuldb.com/?submit.496484
https://www.cve.org/CVERecord?id=CVE-2025-1371
https://www.gnu.org/
|
| libelf1 |
CVE-2025-1372 |
LOW |
0.188-2.1 |
|
https://access.redhat.com/security/cve/CVE-2025-1372
https://nvd.nist.gov/vuln/detail/CVE-2025-1372
https://sourceware.org/bugzilla/attachment.cgi?id=15927
https://sourceware.org/bugzilla/show_bug.cgi?id=32656
https://sourceware.org/bugzilla/show_bug.cgi?id=32656#c3
https://sourceware.org/bugzilla/show_bug.cgi?id=32657
https://ubuntu.com/security/notices/USN-7369-1
https://vuldb.com/?ctiid.295981
https://vuldb.com/?id.295981
https://vuldb.com/?submit.496485
https://www.cve.org/CVERecord?id=CVE-2025-1372
https://www.gnu.org/
|
| libelf1 |
CVE-2025-1376 |
LOW |
0.188-2.1 |
|
https://access.redhat.com/security/cve/CVE-2025-1376
https://nvd.nist.gov/vuln/detail/CVE-2025-1376
https://sourceware.org/bugzilla/attachment.cgi?id=15940
https://sourceware.org/bugzilla/show_bug.cgi?id=32672
https://sourceware.org/bugzilla/show_bug.cgi?id=32672#c3
https://vuldb.com/?ctiid.295984
https://vuldb.com/?id.295984
https://vuldb.com/?submit.497538
https://www.cve.org/CVERecord?id=CVE-2025-1376
https://www.gnu.org/
|
| libelf1 |
CVE-2025-1377 |
LOW |
0.188-2.1 |
|
https://access.redhat.com/security/cve/CVE-2025-1377
https://nvd.nist.gov/vuln/detail/CVE-2025-1377
https://sourceware.org/bugzilla/attachment.cgi?id=15941
https://sourceware.org/bugzilla/show_bug.cgi?id=32673
https://sourceware.org/bugzilla/show_bug.cgi?id=32673#c2
https://ubuntu.com/security/notices/USN-7369-1
https://vuldb.com/?ctiid.295985
https://vuldb.com/?id.295985
https://vuldb.com/?submit.497539
https://www.cve.org/CVERecord?id=CVE-2025-1377
https://www.gnu.org/
|
| libexpat1 |
CVE-2024-45491 |
CRITICAL |
2.5.0-1 |
2.5.0-1+deb12u1 |
https://access.redhat.com/errata/RHSA-2024:8859
https://access.redhat.com/security/cve/CVE-2024-45491
https://bugzilla.redhat.com/2308616
https://bugzilla.redhat.com/show_bug.cgi?id=2308615
https://bugzilla.redhat.com/show_bug.cgi?id=2308616
https://bugzilla.redhat.com/show_bug.cgi?id=2308617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45492
https://errata.almalinux.org/8/ALSA-2024-8859.html
https://errata.rockylinux.org/RLSA-2024:6754
https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes
https://github.com/libexpat/libexpat/issues/888
https://github.com/libexpat/libexpat/pull/891
https://linux.oracle.com/cve/CVE-2024-45491.html
https://linux.oracle.com/errata/ELSA-2024-8859.html
https://nvd.nist.gov/vuln/detail/CVE-2024-45491
https://security.netapp.com/advisory/ntap-20241018-0003/
https://ubuntu.com/security/notices/USN-7000-1
https://ubuntu.com/security/notices/USN-7000-2
https://ubuntu.com/security/notices/USN-7001-1
https://ubuntu.com/security/notices/USN-7001-2
https://www.cve.org/CVERecord?id=CVE-2024-45491
|
| libexpat1 |
CVE-2024-45492 |
CRITICAL |
2.5.0-1 |
2.5.0-1+deb12u1 |
https://access.redhat.com/errata/RHSA-2024:6989
https://access.redhat.com/security/cve/CVE-2024-45492
https://bugzilla.redhat.com/2308615
https://bugzilla.redhat.com/2308616
https://bugzilla.redhat.com/2308617
https://bugzilla.redhat.com/show_bug.cgi?id=2308615
https://bugzilla.redhat.com/show_bug.cgi?id=2308616
https://bugzilla.redhat.com/show_bug.cgi?id=2308617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45492
https://errata.almalinux.org/8/ALSA-2024-6989.html
https://errata.rockylinux.org/RLSA-2024:6754
https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes
https://github.com/libexpat/libexpat/issues/889
https://github.com/libexpat/libexpat/pull/892
https://linux.oracle.com/cve/CVE-2024-45492.html
https://linux.oracle.com/errata/ELSA-2024-6989.html
https://nvd.nist.gov/vuln/detail/CVE-2024-45492
https://security.netapp.com/advisory/ntap-20241018-0005/
https://ubuntu.com/security/notices/USN-7000-1
https://ubuntu.com/security/notices/USN-7000-2
https://www.cve.org/CVERecord?id=CVE-2024-45492
|
| libexpat1 |
CVE-2023-52425 |
HIGH |
2.5.0-1 |
2.5.0-1+deb12u2 |
http://www.openwall.com/lists/oss-security/2024/03/20/5
https://access.redhat.com/errata/RHSA-2024:4259
https://access.redhat.com/security/cve/CVE-2023-52425
https://bugzilla.redhat.com/2262877
https://bugzilla.redhat.com/show_bug.cgi?id=2262877
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52425
https://errata.almalinux.org/8/ALSA-2024-4259.html
https://errata.rockylinux.org/RLSA-2024:1615
https://github.com/libexpat/libexpat/pull/789
https://linux.oracle.com/cve/CVE-2023-52425.html
https://linux.oracle.com/errata/ELSA-2024-4259.html
https://lists.debian.org/debian-lts-announce/2024/04/msg00006.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNRIHC7DVVRAIWFRGV23Y6UZXFBXSQDB/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNUBSGZFEZOBHJFTAD42SAN4ATW2VEMV/
https://nvd.nist.gov/vuln/detail/CVE-2023-52425
https://security.netapp.com/advisory/ntap-20240614-0003/
https://ubuntu.com/security/notices/USN-6694-1
https://www.cve.org/CVERecord?id=CVE-2023-52425
|
| libexpat1 |
CVE-2024-45490 |
HIGH |
2.5.0-1 |
2.5.0-1+deb12u1 |
https://access.redhat.com/errata/RHSA-2024:6989
https://access.redhat.com/security/cve/CVE-2024-45490
https://bugzilla.redhat.com/2308615
https://bugzilla.redhat.com/2308616
https://bugzilla.redhat.com/2308617
https://bugzilla.redhat.com/show_bug.cgi?id=2308615
https://bugzilla.redhat.com/show_bug.cgi?id=2308616
https://bugzilla.redhat.com/show_bug.cgi?id=2308617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45492
https://errata.almalinux.org/8/ALSA-2024-6989.html
https://errata.rockylinux.org/RLSA-2024:6754
https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes
https://github.com/libexpat/libexpat/issues/887
https://github.com/libexpat/libexpat/pull/890
https://linux.oracle.com/cve/CVE-2024-45490.html
https://linux.oracle.com/errata/ELSA-2024-6989.html
https://nvd.nist.gov/vuln/detail/CVE-2024-45490
https://security.netapp.com/advisory/ntap-20241018-0004/
https://ubuntu.com/security/notices/USN-7000-1
https://ubuntu.com/security/notices/USN-7000-2
https://ubuntu.com/security/notices/USN-7001-1
https://ubuntu.com/security/notices/USN-7001-2
https://www.cve.org/CVERecord?id=CVE-2024-45490
|
| libexpat1 |
CVE-2024-8176 |
HIGH |
2.5.0-1 |
2.5.0-1+deb12u2 |
http://www.openwall.com/lists/oss-security/2025/03/15/1
https://access.redhat.com/errata/RHSA-2025:13681
https://access.redhat.com/errata/RHSA-2025:3531
https://access.redhat.com/errata/RHSA-2025:3734
https://access.redhat.com/errata/RHSA-2025:3913
https://access.redhat.com/errata/RHSA-2025:4048
https://access.redhat.com/errata/RHSA-2025:4446
https://access.redhat.com/errata/RHSA-2025:4447
https://access.redhat.com/errata/RHSA-2025:4448
https://access.redhat.com/errata/RHSA-2025:4449
https://access.redhat.com/errata/RHSA-2025:7444
https://access.redhat.com/errata/RHSA-2025:7512
https://access.redhat.com/errata/RHSA-2025:8385
https://access.redhat.com/security/cve/CVE-2024-8176
https://blog.hartwork.org/posts/expat-2-7-0-released/
https://bugzilla.redhat.com/2310137
https://bugzilla.redhat.com/show_bug.cgi?id=2310137
https://bugzilla.suse.com/show_bug.cgi?id=1239618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8176
https://errata.almalinux.org/8/ALSA-2025-3913.html
https://errata.rockylinux.org/RLSA-2025:4048
https://github.com/libexpat/libexpat/blob/R_2_7_0/expat/Changes#L40-L52
https://github.com/libexpat/libexpat/issues/893
https://gitlab.alpinelinux.org/alpine/aports/-/commit/d068c3ff36fc6f4789988a09c69b434db757db53
https://linux.oracle.com/cve/CVE-2024-8176.html
https://linux.oracle.com/errata/ELSA-2025-7512.html
https://nvd.nist.gov/vuln/detail/CVE-2024-8176
https://security-tracker.debian.org/tracker/CVE-2024-8176
https://security.netapp.com/advisory/ntap-20250328-0009/
https://ubuntu.com/security/CVE-2024-8176
https://ubuntu.com/security/notices/USN-7424-1
https://www.cve.org/CVERecord?id=CVE-2024-8176
https://www.kb.cert.org/vuls/id/760160
|
| libexpat1 |
CVE-2024-50602 |
MEDIUM |
2.5.0-1 |
2.5.0-1+deb12u2 |
https://access.redhat.com/errata/RHSA-2024:9502
https://access.redhat.com/security/cve/CVE-2024-50602
https://bugzilla.redhat.com/2321987
https://bugzilla.redhat.com/show_bug.cgi?id=2321987
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50602
https://errata.almalinux.org/8/ALSA-2024-9502.html
https://errata.rockylinux.org/RLSA-2024:9502
https://github.com/libexpat/libexpat/pull/915
https://linux.oracle.com/cve/CVE-2024-50602.html
https://linux.oracle.com/errata/ELSA-2024-9541.html
https://lists.debian.org/debian-lts-announce/2025/04/msg00040.html
https://nvd.nist.gov/vuln/detail/CVE-2024-50602
https://security.netapp.com/advisory/ntap-20250404-0008/
https://ubuntu.com/security/notices/USN-7145-1
https://www.cve.org/CVERecord?id=CVE-2024-50602
|
| libexpat1 |
CVE-2025-59375 |
MEDIUM |
2.5.0-1 |
|
https://access.redhat.com/security/cve/CVE-2025-59375
https://github.com/libexpat/libexpat/blob/676a4c531ec768732fac215da9730b5f50fbd2bf/expat/Changes#L45-L74
https://github.com/libexpat/libexpat/blob/R_2_7_2/expat/Changes
https://github.com/libexpat/libexpat/issues/1018
https://github.com/libexpat/libexpat/pull/1034
https://issues.oss-fuzz.com/issues/439133977
https://nvd.nist.gov/vuln/detail/CVE-2025-59375
https://www.cve.org/CVERecord?id=CVE-2025-59375
|
| libexpat1 |
CVE-2023-52426 |
LOW |
2.5.0-1 |
|
https://access.redhat.com/security/cve/CVE-2023-52426
https://cwe.mitre.org/data/definitions/776.html
https://github.com/libexpat/libexpat/commit/0f075ec8ecb5e43f8fdca5182f8cca4703da0404
https://github.com/libexpat/libexpat/pull/777
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNRIHC7DVVRAIWFRGV23Y6UZXFBXSQDB/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNUBSGZFEZOBHJFTAD42SAN4ATW2VEMV/
https://nvd.nist.gov/vuln/detail/CVE-2023-52426
https://security.netapp.com/advisory/ntap-20240307-0005/
https://www.cve.org/CVERecord?id=CVE-2023-52426
|
| libexpat1 |
CVE-2024-28757 |
LOW |
2.5.0-1 |
|
http://www.openwall.com/lists/oss-security/2024/03/15/1
https://access.redhat.com/errata/RHSA-2024:1530
https://access.redhat.com/security/cve/CVE-2024-28757
https://bugzilla.redhat.com/2262877
https://bugzilla.redhat.com/2268766
https://errata.almalinux.org/9/ALSA-2024-1530.html
https://github.com/libexpat/libexpat/issues/839
https://github.com/libexpat/libexpat/pull/842
https://linux.oracle.com/cve/CVE-2024-28757.html
https://linux.oracle.com/errata/ELSA-2024-1530.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPLC6WDSRDUYS7F7JWAOVOHFNOUQ43DD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKJ7V5F6LJCEQJXDBWGT27J7NAP3E3N7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VK2O34GH43NTHBZBN7G5Y6YKJKPUCTBE/
https://nvd.nist.gov/vuln/detail/CVE-2024-28757
https://security.netapp.com/advisory/ntap-20240322-0001/
https://ubuntu.com/security/notices/USN-6694-1
https://www.cve.org/CVERecord?id=CVE-2024-28757
|
| libfdisk1 |
CVE-2022-0563 |
LOW |
2.38.1-5+deb12u1 |
|
https://access.redhat.com/security/cve/CVE-2022-0563
https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u
https://lore.kernel.org/util-linux/[email protected]/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.gentoo.org/glsa/202401-08
https://security.netapp.com/advisory/ntap-20220331-0002/
https://www.cve.org/CVERecord?id=CVE-2022-0563
|
| libfreetype6 |
CVE-2025-27363 |
HIGH |
2.12.1+dfsg-5 |
2.12.1+dfsg-5+deb12u4 |
http://www.openwall.com/lists/oss-security/2025/03/13/1
http://www.openwall.com/lists/oss-security/2025/03/13/11
http://www.openwall.com/lists/oss-security/2025/03/13/12
http://www.openwall.com/lists/oss-security/2025/03/13/2
http://www.openwall.com/lists/oss-security/2025/03/13/3
http://www.openwall.com/lists/oss-security/2025/03/13/8
http://www.openwall.com/lists/oss-security/2025/03/14/1
http://www.openwall.com/lists/oss-security/2025/03/14/2
http://www.openwall.com/lists/oss-security/2025/03/14/3
http://www.openwall.com/lists/oss-security/2025/03/14/4
http://www.openwall.com/lists/oss-security/2025/05/06/3
https://access.redhat.com/errata/RHSA-2025:8292
https://access.redhat.com/security/cve/CVE-2025-27363
https://bugzilla.redhat.com/2351357
https://bugzilla.redhat.com/2357067
https://bugzilla.redhat.com/2357069
https://bugzilla.redhat.com/2357070
https://bugzilla.redhat.com/2359341
https://bugzilla.redhat.com/2359342
https://bugzilla.redhat.com/2359353
https://bugzilla.redhat.com/2359354
https://bugzilla.redhat.com/2359355
https://bugzilla.redhat.com/2359357
https://bugzilla.redhat.com/show_bug.cgi?id=2351357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27363
https://errata.almalinux.org/8/ALSA-2025-8292.html
https://errata.rockylinux.org/RLSA-2025:3421
https://linux.oracle.com/cve/CVE-2025-27363.html
https://linux.oracle.com/errata/ELSA-2025-8292.html
https://lists.debian.org/debian-lts-announce/2025/03/msg00030.html
https://nvd.nist.gov/vuln/detail/CVE-2025-27363
https://source.android.com/docs/security/bulletin/2025-05-01
https://ubuntu.com/security/notices/USN-7352-1
https://ubuntu.com/security/notices/USN-7352-2
https://www.cisa.gov/known-exploited-vulnerabilities-catalog
https://www.cve.org/CVERecord?id=CVE-2025-27363
https://www.facebook.com/security/advisories/cve-2025-27363
|
| libgbm1 |
CVE-2023-45913 |
LOW |
22.3.6-1+deb12u1 |
|
http://seclists.org/fulldisclosure/2024/Jan/28
https://gitlab.freedesktop.org/mesa/mesa/-/issues/9856
https://seclists.org/fulldisclosure/2024/Jan/71
|
| libgbm1 |
CVE-2023-45919 |
LOW |
22.3.6-1+deb12u1 |
|
http://seclists.org/fulldisclosure/2024/Jan/47
https://gitlab.freedesktop.org/mesa/mesa/-/issues/9858
|
| libgbm1 |
CVE-2023-45922 |
LOW |
22.3.6-1+deb12u1 |
|
http://seclists.org/fulldisclosure/2024/Jan/50
http://seclists.org/fulldisclosure/2024/Jan/71
https://gitlab.freedesktop.org/mesa/mesa/-/issues/9857
|
| libgbm1 |
CVE-2023-45931 |
LOW |
22.3.6-1+deb12u1 |
|
https://gitlab.freedesktop.org/mesa/mesa/-/issues/9859
https://seclists.org/fulldisclosure/2024/Jan/71
|
| libgcc-s1 |
CVE-2022-27943 |
LOW |
12.2.0-14 |
|
https://access.redhat.com/security/cve/CVE-2022-27943
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=1a770b01ef415e114164b6151d1e55acdee09371
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=9234cdca6ee88badfc00297e72f13dac4e540c79
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=fc968115a742d9e4674d9725ce9c2106b91b6ead
https://gcc.gnu.org/pipermail/gcc-patches/2022-March/592244.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
https://nvd.nist.gov/vuln/detail/CVE-2022-27943
https://sourceware.org/bugzilla/show_bug.cgi?id=28995
https://www.cve.org/CVERecord?id=CVE-2022-27943
|
| libgcc-s1 |
CVE-2023-4039 |
LOW |
12.2.0-14 |
12.2.0-14+deb12u1 |
https://access.redhat.com/security/cve/CVE-2023-4039
https://developer.arm.com/Arm%20Security%20Center/GCC%20Stack%20Protector%20Vulnerability%20AArch64
https://gcc.gnu.org/git/?p=gcc.git;a=blob_plain;f=SECURITY.txt
https://gcc.gnu.org/pipermail/gcc-patches/2023-October/634066.html
https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-x7ch-h5rf-w2mf
https://inbox.sourceware.org/gcc-patches/[email protected]
https://linux.oracle.com/cve/CVE-2023-4039.html
https://linux.oracle.com/errata/ELSA-2023-28766.html
https://nvd.nist.gov/vuln/detail/CVE-2023-4039
https://rtx.meta.security/mitigation/2023/09/12/CVE-2023-4039.html
https://ubuntu.com/security/notices/USN-7700-1
https://www.cve.org/CVERecord?id=CVE-2023-4039
|
| libgcrypt20 |
CVE-2018-6829 |
LOW |
1.10.1-3 |
|
https://access.redhat.com/security/cve/CVE-2018-6829
https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
https://nvd.nist.gov/vuln/detail/CVE-2018-6829
https://www.cve.org/CVERecord?id=CVE-2018-6829
https://www.oracle.com/security-alerts/cpujan2020.html
|
| libgcrypt20 |
CVE-2024-2236 |
LOW |
1.10.1-3 |
|
https://access.redhat.com/errata/RHSA-2024:9404
https://access.redhat.com/errata/RHSA-2025:3530
https://access.redhat.com/errata/RHSA-2025:3534
https://access.redhat.com/security/cve/CVE-2024-2236
https://bugzilla.redhat.com/2245218
https://bugzilla.redhat.com/show_bug.cgi?id=2245218
https://bugzilla.redhat.com/show_bug.cgi?id=2268268
https://dev.gnupg.org/T7136
https://errata.almalinux.org/9/ALSA-2024-9404.html
https://github.com/tomato42/marvin-toolkit/tree/master/example/libgcrypt
https://gitlab.com/redhat-crypto/libgcrypt/libgcrypt-mirror/-/merge_requests/17
https://linux.oracle.com/cve/CVE-2024-2236.html
https://linux.oracle.com/errata/ELSA-2024-9404.html
https://lists.gnupg.org/pipermail/gcrypt-devel/2024-March/005607.html
https://nvd.nist.gov/vuln/detail/CVE-2024-2236
https://www.cve.org/CVERecord?id=CVE-2024-2236
|
| libgdk-pixbuf-2.0-0 |
CVE-2022-48622 |
HIGH |
2.42.10+dfsg-1+b1 |
2.42.10+dfsg-1+deb12u1 |
https://access.redhat.com/errata/RHSA-2024:3341
https://access.redhat.com/security/cve/CVE-2022-48622
https://bugzilla.redhat.com/2260545
https://bugzilla.redhat.com/show_bug.cgi?id=2260545
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48622
https://errata.almalinux.org/8/ALSA-2024-3341.html
https://errata.rockylinux.org/RLSA-2024:3341
https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/202
https://linux.oracle.com/cve/CVE-2022-48622.html
https://linux.oracle.com/errata/ELSA-2024-3834.html
https://nvd.nist.gov/vuln/detail/CVE-2022-48622
https://ubuntu.com/security/notices/USN-6806-1
https://www.cve.org/CVERecord?id=CVE-2022-48622
|
| libgdk-pixbuf-2.0-0 |
CVE-2025-7345 |
HIGH |
2.42.10+dfsg-1+b1 |
|
https://access.redhat.com/errata/RHSA-2025:12841
https://access.redhat.com/errata/RHSA-2025:12862
https://access.redhat.com/errata/RHSA-2025:13315
https://access.redhat.com/errata/RHSA-2025:14574
https://access.redhat.com/errata/RHSA-2025:14575
https://access.redhat.com/errata/RHSA-2025:14576
https://access.redhat.com/errata/RHSA-2025:14585
https://access.redhat.com/errata/RHSA-2025:14618
https://access.redhat.com/errata/RHSA-2025:14646
https://access.redhat.com/errata/RHSA-2025:14647
https://access.redhat.com/errata/RHSA-2025:14683
https://access.redhat.com/security/cve/CVE-2025-7345
https://bugzilla.redhat.com/2377063
https://bugzilla.redhat.com/show_bug.cgi?id=2377063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7345
https://errata.almalinux.org/8/ALSA-2025-13315.html
https://errata.rockylinux.org/RLSA-2025:13315
https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/249
https://linux.oracle.com/cve/CVE-2025-7345.html
https://linux.oracle.com/errata/ELSA-2025-14683.html
https://nvd.nist.gov/vuln/detail/CVE-2025-7345
https://ubuntu.com/security/notices/USN-7662-1
https://www.cve.org/CVERecord?id=CVE-2025-7345
|
| libgdk-pixbuf-2.0-0 |
CVE-2025-6199 |
LOW |
2.42.10+dfsg-1+b1 |
2.42.10+dfsg-1+deb12u2 |
https://access.redhat.com/security/cve/CVE-2025-6199
https://bugzilla.redhat.com/show_bug.cgi?id=2373147
https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/257
https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/merge_requests/191
https://nvd.nist.gov/vuln/detail/CVE-2025-6199
https://ubuntu.com/security/notices/USN-7662-1
https://www.cve.org/CVERecord?id=CVE-2025-6199
|
| libgdk-pixbuf2.0-common |
CVE-2022-48622 |
HIGH |
2.42.10+dfsg-1 |
2.42.10+dfsg-1+deb12u1 |
https://access.redhat.com/errata/RHSA-2024:3341
https://access.redhat.com/security/cve/CVE-2022-48622
https://bugzilla.redhat.com/2260545
https://bugzilla.redhat.com/show_bug.cgi?id=2260545
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48622
https://errata.almalinux.org/8/ALSA-2024-3341.html
https://errata.rockylinux.org/RLSA-2024:3341
https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/202
https://linux.oracle.com/cve/CVE-2022-48622.html
https://linux.oracle.com/errata/ELSA-2024-3834.html
https://nvd.nist.gov/vuln/detail/CVE-2022-48622
https://ubuntu.com/security/notices/USN-6806-1
https://www.cve.org/CVERecord?id=CVE-2022-48622
|
| libgdk-pixbuf2.0-common |
CVE-2025-7345 |
HIGH |
2.42.10+dfsg-1 |
|
https://access.redhat.com/errata/RHSA-2025:12841
https://access.redhat.com/errata/RHSA-2025:12862
https://access.redhat.com/errata/RHSA-2025:13315
https://access.redhat.com/errata/RHSA-2025:14574
https://access.redhat.com/errata/RHSA-2025:14575
https://access.redhat.com/errata/RHSA-2025:14576
https://access.redhat.com/errata/RHSA-2025:14585
https://access.redhat.com/errata/RHSA-2025:14618
https://access.redhat.com/errata/RHSA-2025:14646
https://access.redhat.com/errata/RHSA-2025:14647
https://access.redhat.com/errata/RHSA-2025:14683
https://access.redhat.com/security/cve/CVE-2025-7345
https://bugzilla.redhat.com/2377063
https://bugzilla.redhat.com/show_bug.cgi?id=2377063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7345
https://errata.almalinux.org/8/ALSA-2025-13315.html
https://errata.rockylinux.org/RLSA-2025:13315
https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/249
https://linux.oracle.com/cve/CVE-2025-7345.html
https://linux.oracle.com/errata/ELSA-2025-14683.html
https://nvd.nist.gov/vuln/detail/CVE-2025-7345
https://ubuntu.com/security/notices/USN-7662-1
https://www.cve.org/CVERecord?id=CVE-2025-7345
|
| libgdk-pixbuf2.0-common |
CVE-2025-6199 |
LOW |
2.42.10+dfsg-1 |
2.42.10+dfsg-1+deb12u2 |
https://access.redhat.com/security/cve/CVE-2025-6199
https://bugzilla.redhat.com/show_bug.cgi?id=2373147
https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/257
https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/merge_requests/191
https://nvd.nist.gov/vuln/detail/CVE-2025-6199
https://ubuntu.com/security/notices/USN-7662-1
https://www.cve.org/CVERecord?id=CVE-2025-6199
|
| libgfortran5 |
CVE-2022-27943 |
LOW |
12.2.0-14 |
|
https://access.redhat.com/security/cve/CVE-2022-27943
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=1a770b01ef415e114164b6151d1e55acdee09371
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=9234cdca6ee88badfc00297e72f13dac4e540c79
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=fc968115a742d9e4674d9725ce9c2106b91b6ead
https://gcc.gnu.org/pipermail/gcc-patches/2022-March/592244.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
https://nvd.nist.gov/vuln/detail/CVE-2022-27943
https://sourceware.org/bugzilla/show_bug.cgi?id=28995
https://www.cve.org/CVERecord?id=CVE-2022-27943
|
| libgfortran5 |
CVE-2023-4039 |
LOW |
12.2.0-14 |
12.2.0-14+deb12u1 |
https://access.redhat.com/security/cve/CVE-2023-4039
https://developer.arm.com/Arm%20Security%20Center/GCC%20Stack%20Protector%20Vulnerability%20AArch64
https://gcc.gnu.org/git/?p=gcc.git;a=blob_plain;f=SECURITY.txt
https://gcc.gnu.org/pipermail/gcc-patches/2023-October/634066.html
https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-x7ch-h5rf-w2mf
https://inbox.sourceware.org/gcc-patches/[email protected]
https://linux.oracle.com/cve/CVE-2023-4039.html
https://linux.oracle.com/errata/ELSA-2023-28766.html
https://nvd.nist.gov/vuln/detail/CVE-2023-4039
https://rtx.meta.security/mitigation/2023/09/12/CVE-2023-4039.html
https://ubuntu.com/security/notices/USN-7700-1
https://www.cve.org/CVERecord?id=CVE-2023-4039
|
| libglib2.0-0 |
CVE-2024-52533 |
HIGH |
2.74.6-2+deb12u2 |
2.74.6-2+deb12u5 |
http://www.openwall.com/lists/oss-security/2024/11/12/11
https://access.redhat.com/errata/RHSA-2025:11327
https://access.redhat.com/security/cve/CVE-2024-52533
https://bugzilla.redhat.com/2279632
https://bugzilla.redhat.com/2325340
https://bugzilla.redhat.com/2364265
https://bugzilla.redhat.com/show_bug.cgi?id=2279632
https://bugzilla.redhat.com/show_bug.cgi?id=2325340
https://bugzilla.redhat.com/show_bug.cgi?id=2364265
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34397
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4373
https://errata.almalinux.org/8/ALSA-2025-11327.html
https://errata.rockylinux.org/RLSA-2025:11327
https://gitlab.gnome.org/GNOME/glib/-/issues/3461
https://gitlab.gnome.org/GNOME/glib/-/releases/2.82.1
https://gitlab.gnome.org/Teams/Releng/security/-/wikis/home
https://linux.oracle.com/cve/CVE-2024-52533.html
https://linux.oracle.com/errata/ELSA-2025-11327.html
https://lists.debian.org/debian-lts-announce/2024/11/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2024-52533
https://security.netapp.com/advisory/ntap-20241206-0009/
https://ubuntu.com/security/notices/USN-7114-1
https://www.cve.org/CVERecord?id=CVE-2024-52533
|
| libglib2.0-0 |
CVE-2025-4373 |
MEDIUM |
2.74.6-2+deb12u2 |
2.74.6-2+deb12u7 |
https://access.redhat.com/errata/RHSA-2025:10855
https://access.redhat.com/errata/RHSA-2025:11140
https://access.redhat.com/errata/RHSA-2025:11327
https://access.redhat.com/errata/RHSA-2025:11373
https://access.redhat.com/errata/RHSA-2025:11374
https://access.redhat.com/errata/RHSA-2025:11662
https://access.redhat.com/errata/RHSA-2025:12275
https://access.redhat.com/errata/RHSA-2025:13335
https://access.redhat.com/errata/RHSA-2025:14988
https://access.redhat.com/errata/RHSA-2025:14989
https://access.redhat.com/errata/RHSA-2025:14990
https://access.redhat.com/errata/RHSA-2025:14991
https://access.redhat.com/security/cve/CVE-2025-4373
https://bugzilla.redhat.com/2279632
https://bugzilla.redhat.com/2325340
https://bugzilla.redhat.com/2364265
https://bugzilla.redhat.com/show_bug.cgi?id=2279632
https://bugzilla.redhat.com/show_bug.cgi?id=2325340
https://bugzilla.redhat.com/show_bug.cgi?id=2364265
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34397
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4373
https://errata.almalinux.org/8/ALSA-2025-11327.html
https://errata.rockylinux.org/RLSA-2025:11327
https://gitlab.gnome.org/GNOME/glib/-/issues/3677
https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4588
https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4592
https://linux.oracle.com/cve/CVE-2025-4373.html
https://linux.oracle.com/errata/ELSA-2025-11327.html
https://nvd.nist.gov/vuln/detail/CVE-2025-4373
https://ubuntu.com/security/notices/USN-7532-1
https://www.cve.org/CVERecord?id=CVE-2025-4373
|
| libglib2.0-0 |
CVE-2012-0039 |
LOW |
2.74.6-2+deb12u2 |
|
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655044
http://mail.gnome.org/archives/gtk-devel-list/2003-May/msg00111.html
http://openwall.com/lists/oss-security/2012/01/10/12
https://access.redhat.com/security/cve/CVE-2012-0039
https://bugzilla.redhat.com/show_bug.cgi?id=772720
https://nvd.nist.gov/vuln/detail/CVE-2012-0039
https://www.cve.org/CVERecord?id=CVE-2012-0039
|
| libglib2.0-0 |
CVE-2025-3360 |
LOW |
2.74.6-2+deb12u2 |
2.74.6-2+deb12u6 |
https://access.redhat.com/security/cve/CVE-2025-3360
https://bugzilla.redhat.com/show_bug.cgi?id=2357754
https://lists.debian.org/debian-lts-announce/2025/04/msg00024.html
https://nvd.nist.gov/vuln/detail/CVE-2025-3360
https://www.cve.org/CVERecord?id=CVE-2025-3360
|
| libglib2.0-0 |
CVE-2025-7039 |
LOW |
2.74.6-2+deb12u2 |
2.74.6-2+deb12u7 |
https://access.redhat.com/security/cve/CVE-2025-7039
https://bugzilla.redhat.com/show_bug.cgi?id=2392423
https://nvd.nist.gov/vuln/detail/CVE-2025-7039
https://www.cve.org/CVERecord?id=CVE-2025-7039
|
| libgnutls30 |
CVE-2025-32988 |
HIGH |
3.7.9-2+deb12u2 |
3.7.9-2+deb12u5 |
https://access.redhat.com/errata/RHSA-2025:16115
https://access.redhat.com/errata/RHSA-2025:16116
https://access.redhat.com/errata/RHSA-2025:17348
https://access.redhat.com/errata/RHSA-2025:17361
https://access.redhat.com/errata/RHSA-2025:17415
https://access.redhat.com/security/cve/CVE-2025-32988
https://bugzilla.redhat.com/2359620
https://bugzilla.redhat.com/2359622
https://bugzilla.redhat.com/2376755
https://bugzilla.redhat.com/show_bug.cgi?id=2359620
https://bugzilla.redhat.com/show_bug.cgi?id=2359621
https://bugzilla.redhat.com/show_bug.cgi?id=2359622
https://bugzilla.redhat.com/show_bug.cgi?id=2376755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32988
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32989
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32990
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6395
https://errata.almalinux.org/8/ALSA-2025-17415.html
https://errata.rockylinux.org/RLSA-2025:16115
https://linux.oracle.com/cve/CVE-2025-32988.html
https://linux.oracle.com/errata/ELSA-2025-20606.html
https://lists.gnupg.org/pipermail/gnutls-help/2025-July/004883.html
https://nvd.nist.gov/vuln/detail/CVE-2025-32988
https://ubuntu.com/security/notices/USN-7635-1
https://ubuntu.com/security/notices/USN-7742-1
https://www.cve.org/CVERecord?id=CVE-2025-32988
|
| libgnutls30 |
CVE-2025-32990 |
HIGH |
3.7.9-2+deb12u2 |
3.7.9-2+deb12u5 |
https://access.redhat.com/errata/RHSA-2025:16115
https://access.redhat.com/errata/RHSA-2025:16116
https://access.redhat.com/errata/RHSA-2025:17348
https://access.redhat.com/errata/RHSA-2025:17361
https://access.redhat.com/errata/RHSA-2025:17415
https://access.redhat.com/security/cve/CVE-2025-32990
https://bugzilla.redhat.com/2359620
https://bugzilla.redhat.com/2359622
https://bugzilla.redhat.com/2376755
https://bugzilla.redhat.com/show_bug.cgi?id=2359620
https://bugzilla.redhat.com/show_bug.cgi?id=2359621
https://bugzilla.redhat.com/show_bug.cgi?id=2359622
https://bugzilla.redhat.com/show_bug.cgi?id=2376755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32988
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32989
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32990
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6395
https://errata.almalinux.org/8/ALSA-2025-17415.html
https://errata.rockylinux.org/RLSA-2025:16115
https://linux.oracle.com/cve/CVE-2025-32990.html
https://linux.oracle.com/errata/ELSA-2025-20606.html
https://lists.gnupg.org/pipermail/gnutls-help/2025-July/004883.html
https://nvd.nist.gov/vuln/detail/CVE-2025-32990
https://ubuntu.com/security/notices/USN-7635-1
https://ubuntu.com/security/notices/USN-7742-1
https://www.cve.org/CVERecord?id=CVE-2025-32990
|
| libgnutls30 |
CVE-2024-12243 |
MEDIUM |
3.7.9-2+deb12u2 |
3.7.9-2+deb12u4 |
https://access.redhat.com/errata/RHSA-2025:17361
https://access.redhat.com/errata/RHSA-2025:4051
https://access.redhat.com/errata/RHSA-2025:7076
https://access.redhat.com/errata/RHSA-2025:8020
https://access.redhat.com/errata/RHSA-2025:8385
https://access.redhat.com/security/cve/CVE-2024-12243
https://bugzilla.redhat.com/2344615
https://bugzilla.redhat.com/show_bug.cgi?id=2344615
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12243
https://errata.almalinux.org/8/ALSA-2025-4051.html
https://errata.rockylinux.org/RLSA-2025:4051
https://gitlab.com/gnutls/libtasn1/-/issues/52
https://linux.oracle.com/cve/CVE-2024-12243.html
https://linux.oracle.com/errata/ELSA-2025-7076.html
https://lists.debian.org/debian-lts-announce/2025/02/msg00027.html
https://lists.gnupg.org/pipermail/gnutls-help/2025-February/004875.html
https://nvd.nist.gov/vuln/detail/CVE-2024-12243
https://security.netapp.com/advisory/ntap-20250523-0002/
https://ubuntu.com/security/notices/USN-7281-1
https://www.cve.org/CVERecord?id=CVE-2024-12243
https://www.gnutls.org/security-new.html#GNUTLS-SA-2025-02-07
|
| libgnutls30 |
CVE-2024-28834 |
MEDIUM |
3.7.9-2+deb12u2 |
3.7.9-2+deb12u3 |
http://www.openwall.com/lists/oss-security/2024/03/22/1
http://www.openwall.com/lists/oss-security/2024/03/22/2
https://access.redhat.com/errata/RHSA-2024:1784
https://access.redhat.com/errata/RHSA-2024:1879
https://access.redhat.com/errata/RHSA-2024:1997
https://access.redhat.com/errata/RHSA-2024:2044
https://access.redhat.com/errata/RHSA-2024:2570
https://access.redhat.com/errata/RHSA-2024:2889
https://access.redhat.com/security/cve/CVE-2024-28834
https://bugzilla.redhat.com/2269228
https://bugzilla.redhat.com/show_bug.cgi?id=2269084
https://bugzilla.redhat.com/show_bug.cgi?id=2269228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28834
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28835
https://errata.almalinux.org/8/ALSA-2024-1784.html
https://errata.rockylinux.org/RLSA-2024:2570
https://linux.oracle.com/cve/CVE-2024-28834.html
https://linux.oracle.com/errata/ELSA-2024-2570.html
https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html
https://minerva.crocs.fi.muni.cz/
https://nvd.nist.gov/vuln/detail/CVE-2024-28834
https://people.redhat.com/~hkario/marvin/
https://security.netapp.com/advisory/ntap-20240524-0004/
https://ubuntu.com/security/notices/USN-6733-1
https://ubuntu.com/security/notices/USN-6733-2
https://www.cve.org/CVERecord?id=CVE-2024-28834
https://www.gnutls.org/security-new.html#GNUTLS-SA-2023-12-04
|
| libgnutls30 |
CVE-2024-28835 |
MEDIUM |
3.7.9-2+deb12u2 |
3.7.9-2+deb12u3 |
http://www.openwall.com/lists/oss-security/2024/03/22/1
http://www.openwall.com/lists/oss-security/2024/03/22/2
https://access.redhat.com/errata/RHSA-2024:1879
https://access.redhat.com/errata/RHSA-2024:2570
https://access.redhat.com/errata/RHSA-2024:2889
https://access.redhat.com/security/cve/CVE-2024-28835
https://bugzilla.redhat.com/2269084
https://bugzilla.redhat.com/2269228
https://bugzilla.redhat.com/show_bug.cgi?id=2269084
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28834
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28835
https://errata.almalinux.org/9/ALSA-2024-2570.html
https://errata.rockylinux.org/RLSA-2024:2570
https://linux.oracle.com/cve/CVE-2024-28835.html
https://linux.oracle.com/errata/ELSA-2024-2570.html
https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html
https://nvd.nist.gov/vuln/detail/CVE-2024-28835
https://security.netapp.com/advisory/ntap-20241122-0009/
https://ubuntu.com/security/notices/USN-6733-1
https://ubuntu.com/security/notices/USN-6733-2
https://www.cve.org/CVERecord?id=CVE-2024-28835
https://www.gnutls.org/security-new.html#GNUTLS-SA-2024-01-23
|
| libgnutls30 |
CVE-2025-32989 |
MEDIUM |
3.7.9-2+deb12u2 |
3.7.9-2+deb12u5 |
https://access.redhat.com/errata/RHSA-2025:16115
https://access.redhat.com/errata/RHSA-2025:16116
https://access.redhat.com/errata/RHSA-2025:17348
https://access.redhat.com/errata/RHSA-2025:17361
https://access.redhat.com/security/cve/CVE-2025-32989
https://bugzilla.redhat.com/2359620
https://bugzilla.redhat.com/2359621
https://bugzilla.redhat.com/2359622
https://bugzilla.redhat.com/2376755
https://bugzilla.redhat.com/show_bug.cgi?id=2359620
https://bugzilla.redhat.com/show_bug.cgi?id=2359621
https://bugzilla.redhat.com/show_bug.cgi?id=2359622
https://bugzilla.redhat.com/show_bug.cgi?id=2376755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32988
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32989
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32990
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6395
https://errata.almalinux.org/10/ALSA-2025-16115.html
https://errata.rockylinux.org/RLSA-2025:16115
https://linux.oracle.com/cve/CVE-2025-32989.html
https://linux.oracle.com/errata/ELSA-2025-20606.html
https://lists.gnupg.org/pipermail/gnutls-help/2025-July/004883.html
https://nvd.nist.gov/vuln/detail/CVE-2025-32989
https://ubuntu.com/security/notices/USN-7635-1
https://www.cve.org/CVERecord?id=CVE-2025-32989
|
| libgnutls30 |
CVE-2025-6395 |
MEDIUM |
3.7.9-2+deb12u2 |
3.7.9-2+deb12u5 |
https://access.redhat.com/errata/RHSA-2025:16115
https://access.redhat.com/errata/RHSA-2025:16116
https://access.redhat.com/errata/RHSA-2025:17348
https://access.redhat.com/errata/RHSA-2025:17361
https://access.redhat.com/errata/RHSA-2025:17415
https://access.redhat.com/security/cve/CVE-2025-6395
https://bugzilla.redhat.com/2359620
https://bugzilla.redhat.com/2359622
https://bugzilla.redhat.com/2376755
https://bugzilla.redhat.com/show_bug.cgi?id=2359620
https://bugzilla.redhat.com/show_bug.cgi?id=2359621
https://bugzilla.redhat.com/show_bug.cgi?id=2359622
https://bugzilla.redhat.com/show_bug.cgi?id=2376755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32988
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32989
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32990
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6395
https://errata.almalinux.org/8/ALSA-2025-17415.html
https://errata.rockylinux.org/RLSA-2025:16115
https://linux.oracle.com/cve/CVE-2025-6395.html
https://linux.oracle.com/errata/ELSA-2025-20606.html
https://lists.gnupg.org/pipermail/gnutls-help/2025-July/004883.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6395
https://ubuntu.com/security/notices/USN-7635-1
https://ubuntu.com/security/notices/USN-7742-1
https://www.cve.org/CVERecord?id=CVE-2025-6395
|
| libgnutls30 |
CVE-2011-3389 |
LOW |
3.7.9-2+deb12u2 |
|
http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/
http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/
http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx
http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx
http://curl.haxx.se/docs/adv_20120124B.html
http://downloads.asterisk.org/pub/security/AST-2016-001.html
http://ekoparty.org/2011/juliano-rizzo.php
http://eprint.iacr.org/2004/111
http://eprint.iacr.org/2006/136
http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
http://isc.sans.edu/diary/SSL+TLS+part+3+/11635
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://marc.info/?l=bugtraq&m=132750579901589&w=2
http://marc.info/?l=bugtraq&m=132872385320240&w=2
http://marc.info/?l=bugtraq&m=133365109612558&w=2
http://marc.info/?l=bugtraq&m=133728004526190&w=2
http://marc.info/?l=bugtraq&m=134254866602253&w=2
http://marc.info/?l=bugtraq&m=134254957702612&w=2
http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue
http://osvdb.org/74829
http://rhn.redhat.com/errata/RHSA-2012-0508.html
http://rhn.redhat.com/errata/RHSA-2013-1455.html
http://secunia.com/advisories/45791
http://secunia.com/advisories/47998
http://secunia.com/advisories/48256
http://secunia.com/advisories/48692
http://secunia.com/advisories/48915
http://secunia.com/advisories/48948
http://secunia.com/advisories/49198
http://secunia.com/advisories/55322
http://secunia.com/advisories/55350
http://secunia.com/advisories/55351
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://security.gentoo.org/glsa/glsa-201406-32.xml
http://support.apple.com/kb/HT4999
http://support.apple.com/kb/HT5001
http://support.apple.com/kb/HT5130
http://support.apple.com/kb/HT5281
http://support.apple.com/kb/HT5501
http://support.apple.com/kb/HT6150
http://technet.microsoft.com/security/advisory/2588513
http://vnhacker.blogspot.com/2011/09/beast.html
http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
http://www.debian.org/security/2012/dsa-2398
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.ibm.com/developerworks/java/jdk/alerts/
http://www.imperialviolet.org/2011/09/23/chromeandbeast.html
http://www.insecure.cl/Beast-SSL.rar
http://www.kb.cert.org/vuls/id/864643
http://www.mandriva.com/security/advisories?name=MDVSA-2012:058
http://www.opera.com/docs/changelogs/mac/1151/
http://www.opera.com/docs/changelogs/mac/1160/
http://www.opera.com/docs/changelogs/unix/1151/
http://www.opera.com/docs/changelogs/unix/1160/
http://www.opera.com/docs/changelogs/windows/1151/
http://www.opera.com/docs/changelogs/windows/1160/
http://www.opera.com/support/kb/view/1004/
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html
http://www.redhat.com/support/errata/RHSA-2011-1384.html
http://www.redhat.com/support/errata/RHSA-2012-0006.html
http://www.securityfocus.com/bid/49388
http://www.securityfocus.com/bid/49778
http://www.securitytracker.com/id/1029190
http://www.securitytracker.com/id?1025997
http://www.securitytracker.com/id?1026103
http://www.securitytracker.com/id?1026704
http://www.ubuntu.com/usn/USN-1263-1
http://www.us-cert.gov/cas/techalerts/TA12-010A.html
https://access.redhat.com/security/cve/CVE-2011-3389
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail
https://bugzilla.novell.com/show_bug.cgi?id=719047
https://bugzilla.redhat.com/show_bug.cgi?id=737506
https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862
https://hermes.opensuse.org/messages/13154861
https://hermes.opensuse.org/messages/13155432
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://linux.oracle.com/cve/CVE-2011-3389.html
https://linux.oracle.com/errata/ELSA-2011-1380.html
https://nvd.nist.gov/vuln/detail/CVE-2011-3389
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752
https://ubuntu.com/security/notices/USN-1263-1
https://www.cve.org/CVERecord?id=CVE-2011-3389
|
| libgssapi-krb5-2 |
CVE-2024-37371 |
CRITICAL |
1.20.1-2+deb12u1 |
1.20.1-2+deb12u2 |
https://access.redhat.com/errata/RHSA-2025:1673
https://access.redhat.com/security/cve/CVE-2024-37371
https://bugzilla.redhat.com/2294581
https://bugzilla.redhat.com/2294676
https://bugzilla.redhat.com/2301888
https://bugzilla.redhat.com/2318857
https://bugzilla.redhat.com/2318858
https://bugzilla.redhat.com/2318870
https://bugzilla.redhat.com/2318873
https://bugzilla.redhat.com/2318874
https://bugzilla.redhat.com/2318876
https://bugzilla.redhat.com/2318882
https://bugzilla.redhat.com/2318883
https://bugzilla.redhat.com/2318884
https://bugzilla.redhat.com/2318885
https://bugzilla.redhat.com/2318886
https://bugzilla.redhat.com/2318897
https://bugzilla.redhat.com/2318900
https://bugzilla.redhat.com/2318905
https://bugzilla.redhat.com/2318914
https://bugzilla.redhat.com/2318922
https://bugzilla.redhat.com/2318923
https://bugzilla.redhat.com/2318925
https://bugzilla.redhat.com/2318926
https://bugzilla.redhat.com/2318927
https://bugzilla.redhat.com/2331191
https://bugzilla.redhat.com/2339218
https://bugzilla.redhat.com/2339220
https://bugzilla.redhat.com/2339221
https://bugzilla.redhat.com/2339226
https://bugzilla.redhat.com/2339231
https://bugzilla.redhat.com/2339236
https://bugzilla.redhat.com/2339238
https://bugzilla.redhat.com/2339243
https://bugzilla.redhat.com/2339247
https://bugzilla.redhat.com/2339252
https://bugzilla.redhat.com/2339259
https://bugzilla.redhat.com/2339266
https://bugzilla.redhat.com/2339270
https://bugzilla.redhat.com/2339271
https://bugzilla.redhat.com/2339275
https://bugzilla.redhat.com/2339277
https://bugzilla.redhat.com/2339281
https://bugzilla.redhat.com/2339284
https://bugzilla.redhat.com/2339291
https://bugzilla.redhat.com/2339293
https://bugzilla.redhat.com/2339295
https://bugzilla.redhat.com/2339299
https://bugzilla.redhat.com/2339300
https://bugzilla.redhat.com/2339304
https://bugzilla.redhat.com/2339305
https://bugzilla.redhat.com/show_bug.cgi?id=2294676
https://bugzilla.redhat.com/show_bug.cgi?id=2294677
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37371
https://errata.almalinux.org/8/ALSA-2025-1673.html
https://errata.rockylinux.org/RLSA-2024:5312
https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef
https://linux.oracle.com/cve/CVE-2024-37371.html
https://linux.oracle.com/errata/ELSA-2025-1673.html
https://nvd.nist.gov/vuln/detail/CVE-2024-37371
https://security.netapp.com/advisory/ntap-20241108-0009/
https://ubuntu.com/security/notices/USN-6947-1
https://web.mit.edu/kerberos/www/advisories/
https://web.mit.edu/kerberos/www/krb5-1.21/
https://www.cve.org/CVERecord?id=CVE-2024-37371
https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL
|
| libgssapi-krb5-2 |
CVE-2024-37370 |
HIGH |
1.20.1-2+deb12u1 |
1.20.1-2+deb12u2 |
https://access.redhat.com/errata/RHSA-2024:5312
https://access.redhat.com/security/cve/CVE-2024-37370
https://bugzilla.redhat.com/2294676
https://bugzilla.redhat.com/2294677
https://bugzilla.redhat.com/show_bug.cgi?id=2294676
https://bugzilla.redhat.com/show_bug.cgi?id=2294677
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37371
https://errata.almalinux.org/8/ALSA-2024-5312.html
https://errata.rockylinux.org/RLSA-2024:5312
https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef
https://linux.oracle.com/cve/CVE-2024-37370.html
https://linux.oracle.com/errata/ELSA-2024-6166.html
https://nvd.nist.gov/vuln/detail/CVE-2024-37370
https://security.netapp.com/advisory/ntap-20241108-0007/
https://ubuntu.com/security/notices/USN-6947-1
https://web.mit.edu/kerberos/www/advisories/
https://web.mit.edu/kerberos/www/krb5-1.21/
https://www.cve.org/CVERecord?id=CVE-2024-37370
|
| libgssapi-krb5-2 |
CVE-2024-26462 |
MEDIUM |
1.20.1-2+deb12u1 |
1.20.1-2+deb12u3 |
https://access.redhat.com/errata/RHSA-2024:9331
https://access.redhat.com/security/cve/CVE-2024-26462
https://bugzilla.redhat.com/2266731
https://bugzilla.redhat.com/2266740
https://bugzilla.redhat.com/2266742
https://errata.almalinux.org/9/ALSA-2024-9331.html
https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_3.md
https://linux.oracle.com/cve/CVE-2024-26462.html
https://linux.oracle.com/errata/ELSA-2024-9331.html
https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html
https://nvd.nist.gov/vuln/detail/CVE-2024-26462
https://security.netapp.com/advisory/ntap-20240415-0012/
https://ubuntu.com/security/notices/USN-7314-1
https://www.cve.org/CVERecord?id=CVE-2024-26462
|
| libgssapi-krb5-2 |
CVE-2025-24528 |
MEDIUM |
1.20.1-2+deb12u1 |
1.20.1-2+deb12u3 |
https://access.redhat.com/errata/RHSA-2025:2722
https://access.redhat.com/security/cve/CVE-2025-24528
https://bugzilla.redhat.com/2342796
https://bugzilla.redhat.com/show_bug.cgi?id=2342796
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24528
https://errata.almalinux.org/8/ALSA-2025-2722.html
https://errata.rockylinux.org/RLSA-2025:2722
https://github.com/krb5/krb5/commit/78ceba024b64d49612375be4a12d1c066b0bfbd0
https://linux.oracle.com/cve/CVE-2025-24528.html
https://linux.oracle.com/errata/ELSA-2025-7067.html
https://nvd.nist.gov/vuln/detail/CVE-2025-24528
https://ubuntu.com/security/notices/USN-7314-1
https://www.cve.org/CVERecord?id=CVE-2025-24528
|
| libgssapi-krb5-2 |
CVE-2025-3576 |
MEDIUM |
1.20.1-2+deb12u1 |
1.20.1-2+deb12u4 |
https://access.redhat.com/errata/RHSA-2025:11487
https://access.redhat.com/errata/RHSA-2025:13664
https://access.redhat.com/errata/RHSA-2025:13777
https://access.redhat.com/errata/RHSA-2025:15000
https://access.redhat.com/errata/RHSA-2025:15001
https://access.redhat.com/errata/RHSA-2025:15002
https://access.redhat.com/errata/RHSA-2025:15003
https://access.redhat.com/errata/RHSA-2025:15004
https://access.redhat.com/errata/RHSA-2025:8411
https://access.redhat.com/errata/RHSA-2025:9418
https://access.redhat.com/errata/RHSA-2025:9430
https://access.redhat.com/security/cve/CVE-2025-3576
https://bugzilla.redhat.com/2359465
https://bugzilla.redhat.com/show_bug.cgi?id=2359465
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3576
https://errata.almalinux.org/8/ALSA-2025-8411.html
https://errata.rockylinux.org/RLSA-2025:8411
https://linux.oracle.com/cve/CVE-2025-3576.html
https://linux.oracle.com/errata/ELSA-2025-9430.html
https://lists.debian.org/debian-lts-announce/2025/05/msg00047.html
https://nvd.nist.gov/vuln/detail/CVE-2025-3576
https://ubuntu.com/security/notices/USN-7542-1
https://web.mit.edu/kerberos/krb5-1.22/krb5-1.22.html
https://www.cve.org/CVERecord?id=CVE-2025-3576
|
| libgssapi-krb5-2 |
CVE-2018-5709 |
LOW |
1.20.1-2+deb12u1 |
|
https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-5709
https://www.cve.org/CVERecord?id=CVE-2018-5709
|
| libgssapi-krb5-2 |
CVE-2024-26458 |
LOW |
1.20.1-2+deb12u1 |
|
https://access.redhat.com/errata/RHSA-2024:3268
https://access.redhat.com/security/cve/CVE-2024-26458
https://bugzilla.redhat.com/2266731
https://bugzilla.redhat.com/2266740
https://bugzilla.redhat.com/show_bug.cgi?id=2266731
https://bugzilla.redhat.com/show_bug.cgi?id=2266740
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461
https://errata.almalinux.org/8/ALSA-2024-3268.html
https://errata.rockylinux.org/RLSA-2024:3268
https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_1.md
https://linux.oracle.com/cve/CVE-2024-26458.html
https://linux.oracle.com/errata/ELSA-2024-9331.html
https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html
https://nvd.nist.gov/vuln/detail/CVE-2024-26458
https://security.netapp.com/advisory/ntap-20240415-0010/
https://ubuntu.com/security/notices/USN-7314-1
https://www.cve.org/CVERecord?id=CVE-2024-26458
|
| libgssapi-krb5-2 |
CVE-2024-26461 |
LOW |
1.20.1-2+deb12u1 |
|
https://access.redhat.com/errata/RHSA-2024:3268
https://access.redhat.com/security/cve/CVE-2024-26461
https://bugzilla.redhat.com/2266731
https://bugzilla.redhat.com/2266740
https://bugzilla.redhat.com/show_bug.cgi?id=2266731
https://bugzilla.redhat.com/show_bug.cgi?id=2266740
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461
https://errata.almalinux.org/8/ALSA-2024-3268.html
https://errata.rockylinux.org/RLSA-2024:3268
https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md
https://linux.oracle.com/cve/CVE-2024-26461.html
https://linux.oracle.com/errata/ELSA-2024-9331.html
https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html
https://nvd.nist.gov/vuln/detail/CVE-2024-26461
https://security.netapp.com/advisory/ntap-20240415-0011/
https://ubuntu.com/security/notices/USN-7314-1
https://www.cve.org/CVERecord?id=CVE-2024-26461
|
| libgstreamer-plugins-base1.0-0 |
CVE-2024-47538 |
CRITICAL |
1.22.0-3+deb12u2 |
1.22.0-3+deb12u3 |
https://access.redhat.com/errata/RHSA-2024:11345
https://access.redhat.com/security/cve/CVE-2024-47538
https://bugzilla.redhat.com/2331727
https://bugzilla.redhat.com/2331740
https://bugzilla.redhat.com/2331754
https://bugzilla.redhat.com/show_bug.cgi?id=2331727
https://bugzilla.redhat.com/show_bug.cgi?id=2331740
https://bugzilla.redhat.com/show_bug.cgi?id=2331754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47538
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47615
https://errata.almalinux.org/8/ALSA-2024-11345.html
https://errata.rockylinux.org/RLSA-2024:11345
https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8035.patch
https://gstreamer.freedesktop.org/security/sa-2024-0022.html
https://linux.oracle.com/cve/CVE-2024-47538.html
https://linux.oracle.com/errata/ELSA-2024-11345.html
https://nvd.nist.gov/vuln/detail/CVE-2024-47538
https://securitylab.github.com/advisories/GHSL-2024-115_GHSL-2024-118_Gstreamer/
https://ubuntu.com/security/notices/USN-7175-1
https://ubuntu.com/security/notices/USN-7807-1
https://www.cve.org/CVERecord?id=CVE-2024-47538
|
| libgstreamer-plugins-base1.0-0 |
CVE-2024-47600 |
CRITICAL |
1.22.0-3+deb12u2 |
1.22.0-3+deb12u3 |
https://access.redhat.com/errata/RHSA-2025:7243
https://access.redhat.com/security/cve/CVE-2024-47600
https://bugzilla.redhat.com/2331717
https://bugzilla.redhat.com/2331724
https://bugzilla.redhat.com/2331738
https://bugzilla.redhat.com/2331742
https://errata.almalinux.org/9/ALSA-2025-7243.html
https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8034.patch
https://gstreamer.freedesktop.org/security/sa-2024-0018.html
https://linux.oracle.com/cve/CVE-2024-47600.html
https://linux.oracle.com/errata/ELSA-2025-7243.html
https://nvd.nist.gov/vuln/detail/CVE-2024-47600
https://securitylab.github.com/advisories/GHSL-2024-248_Gstreamer/
https://ubuntu.com/security/notices/USN-7175-1
https://ubuntu.com/security/notices/USN-7807-1
https://www.cve.org/CVERecord?id=CVE-2024-47600
|
| libgstreamer-plugins-base1.0-0 |
CVE-2024-47607 |
CRITICAL |
1.22.0-3+deb12u2 |
1.22.0-3+deb12u3 |
https://access.redhat.com/errata/RHSA-2024:11345
https://access.redhat.com/security/cve/CVE-2024-47607
https://bugzilla.redhat.com/2331727
https://bugzilla.redhat.com/2331740
https://bugzilla.redhat.com/2331754
https://bugzilla.redhat.com/show_bug.cgi?id=2331727
https://bugzilla.redhat.com/show_bug.cgi?id=2331740
https://bugzilla.redhat.com/show_bug.cgi?id=2331754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47538
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47615
https://errata.almalinux.org/8/ALSA-2024-11345.html
https://errata.rockylinux.org/RLSA-2024:11345
https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8037.patch
https://gstreamer.freedesktop.org/security/sa-2024-0024.html
https://linux.oracle.com/cve/CVE-2024-47607.html
https://linux.oracle.com/errata/ELSA-2024-11345.html
https://nvd.nist.gov/vuln/detail/CVE-2024-47607
https://securitylab.github.com/advisories/GHSL-2024-115_GHSL-2024-118_Gstreamer/
https://ubuntu.com/security/notices/USN-7175-1
https://ubuntu.com/security/notices/USN-7807-1
https://www.cve.org/CVERecord?id=CVE-2024-47607
|
| libgstreamer-plugins-base1.0-0 |
CVE-2024-47615 |
CRITICAL |
1.22.0-3+deb12u2 |
1.22.0-3+deb12u3 |
https://access.redhat.com/errata/RHSA-2024:11345
https://access.redhat.com/security/cve/CVE-2024-47615
https://bugzilla.redhat.com/2331727
https://bugzilla.redhat.com/2331740
https://bugzilla.redhat.com/2331754
https://bugzilla.redhat.com/show_bug.cgi?id=2331727
https://bugzilla.redhat.com/show_bug.cgi?id=2331740
https://bugzilla.redhat.com/show_bug.cgi?id=2331754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47538
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47615
https://errata.almalinux.org/8/ALSA-2024-11345.html
https://errata.rockylinux.org/RLSA-2024:11345
https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8038.patch
https://gstreamer.freedesktop.org/security/sa-2024-0026.html
https://linux.oracle.com/cve/CVE-2024-47615.html
https://linux.oracle.com/errata/ELSA-2024-11345.html
https://nvd.nist.gov/vuln/detail/CVE-2024-47615
https://securitylab.github.com/advisories/GHSL-2024-115_GHSL-2024-118_Gstreamer/
https://ubuntu.com/security/notices/USN-7175-1
https://ubuntu.com/security/notices/USN-7807-1
https://www.cve.org/CVERecord?id=CVE-2024-47615
|
| libgstreamer-plugins-base1.0-0 |
CVE-2024-47541 |
HIGH |
1.22.0-3+deb12u2 |
1.22.0-3+deb12u3 |
https://access.redhat.com/errata/RHSA-2025:7243
https://access.redhat.com/security/cve/CVE-2024-47541
https://bugzilla.redhat.com/2331717
https://bugzilla.redhat.com/2331724
https://bugzilla.redhat.com/2331738
https://bugzilla.redhat.com/2331742
https://errata.almalinux.org/9/ALSA-2025-7243.html
https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8036.patch
https://gstreamer.freedesktop.org/security/sa-2024-0023.html
https://linux.oracle.com/cve/CVE-2024-47541.html
https://linux.oracle.com/errata/ELSA-2025-7243.html
https://nvd.nist.gov/vuln/detail/CVE-2024-47541
https://securitylab.github.com/advisories/GHSL-2024-228_GStreamer/
https://ubuntu.com/security/notices/USN-7175-1
https://ubuntu.com/security/notices/USN-7807-1
https://www.cve.org/CVERecord?id=CVE-2024-47541
|
| libgstreamer-plugins-base1.0-0 |
CVE-2024-47542 |
HIGH |
1.22.0-3+deb12u2 |
1.22.0-3+deb12u4 |
https://access.redhat.com/errata/RHSA-2025:7243
https://access.redhat.com/security/cve/CVE-2024-47542
https://bugzilla.redhat.com/2331717
https://bugzilla.redhat.com/2331724
https://bugzilla.redhat.com/2331738
https://bugzilla.redhat.com/2331742
https://errata.almalinux.org/9/ALSA-2025-7243.html
https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8033.patch
https://gstreamer.freedesktop.org/security/sa-2024-0008.html
https://linux.oracle.com/cve/CVE-2024-47542.html
https://linux.oracle.com/errata/ELSA-2025-7243.html
https://nvd.nist.gov/vuln/detail/CVE-2024-47542
https://securitylab.github.com/advisories/GHSL-2024-235_Gstreamer/
https://ubuntu.com/security/notices/USN-7175-1
https://ubuntu.com/security/notices/USN-7807-1
https://www.cve.org/CVERecord?id=CVE-2024-47542
|
| libgstreamer-plugins-base1.0-0 |
CVE-2024-47835 |
HIGH |
1.22.0-3+deb12u2 |
1.22.0-3+deb12u3 |
https://access.redhat.com/errata/RHSA-2025:7243
https://access.redhat.com/security/cve/CVE-2024-47835
https://bugzilla.redhat.com/2331717
https://bugzilla.redhat.com/2331724
https://bugzilla.redhat.com/2331738
https://bugzilla.redhat.com/2331742
https://errata.almalinux.org/9/ALSA-2025-7243.html
https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8039.patch
https://gstreamer.freedesktop.org/security/sa-2024-0029.html
https://linux.oracle.com/cve/CVE-2024-47835.html
https://linux.oracle.com/errata/ELSA-2025-7243.html
https://nvd.nist.gov/vuln/detail/CVE-2024-47835
https://securitylab.github.com/advisories/GHSL-2024-263_Gstreamer/
https://ubuntu.com/security/notices/USN-7175-1
https://ubuntu.com/security/notices/USN-7807-1
https://www.cve.org/CVERecord?id=CVE-2024-47835
|
| libgstreamer-plugins-base1.0-0 |
CVE-2025-47806 |
MEDIUM |
1.22.0-3+deb12u2 |
1.22.0-3+deb12u5 |
https://access.redhat.com/security/cve/CVE-2025-47806
https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md
https://gstreamer.freedesktop.org/security/
https://nvd.nist.gov/vuln/detail/CVE-2025-47806
https://ubuntu.com/security/notices/USN-7716-1
https://www.cve.org/CVERecord?id=CVE-2025-47806
|
| libgstreamer-plugins-base1.0-0 |
CVE-2025-47807 |
MEDIUM |
1.22.0-3+deb12u2 |
1.22.0-3+deb12u5 |
https://access.redhat.com/security/cve/CVE-2025-47807
https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md
https://gstreamer.freedesktop.org/security/
https://nvd.nist.gov/vuln/detail/CVE-2025-47807
https://ubuntu.com/security/notices/USN-7716-1
https://www.cve.org/CVERecord?id=CVE-2025-47807
|
| libgstreamer-plugins-base1.0-0 |
CVE-2025-47808 |
MEDIUM |
1.22.0-3+deb12u2 |
1.22.0-3+deb12u5 |
https://access.redhat.com/security/cve/CVE-2025-47808
https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md
https://gstreamer.freedesktop.org/security/
https://nvd.nist.gov/vuln/detail/CVE-2025-47808
https://ubuntu.com/security/notices/USN-7716-1
https://www.cve.org/CVERecord?id=CVE-2025-47808
|
| libgstreamer1.0-0 |
CVE-2024-47606 |
CRITICAL |
1.22.0-2 |
1.22.0-2+deb12u1 |
https://access.redhat.com/errata/RHSA-2024:11299
https://access.redhat.com/security/cve/CVE-2024-47606
https://bugzilla.redhat.com/2331719
https://bugzilla.redhat.com/2331722
https://bugzilla.redhat.com/2331726
https://bugzilla.redhat.com/2331753
https://bugzilla.redhat.com/2331760
https://bugzilla.redhat.com/show_bug.cgi?id=2331719
https://bugzilla.redhat.com/show_bug.cgi?id=2331722
https://bugzilla.redhat.com/show_bug.cgi?id=2331726
https://bugzilla.redhat.com/show_bug.cgi?id=2331753
https://bugzilla.redhat.com/show_bug.cgi?id=2331760
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47539
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47540
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47606
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47613
https://errata.almalinux.org/8/ALSA-2024-11299.html
https://errata.rockylinux.org/RLSA-2024:11299
https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8032.patch
https://gstreamer.freedesktop.org/security/sa-2024-0014.html
https://linux.oracle.com/cve/CVE-2024-47606.html
https://linux.oracle.com/errata/ELSA-2024-11344.html
https://lists.debian.org/debian-lts-announce/2024/12/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2024-47606
https://security.netapp.com/advisory/ntap-20250418-0003/
https://securitylab.github.com/advisories/GHSL-2024-166_Gstreamer/
https://ubuntu.com/security/notices/USN-7174-1
https://ubuntu.com/security/notices/USN-7176-1
https://www.cve.org/CVERecord?id=CVE-2024-47606
|
| libgtk-3-0 |
CVE-2024-6655 |
HIGH |
3.24.38-2~deb12u1 |
3.24.38-2~deb12u2 |
http://www.openwall.com/lists/oss-security/2024/09/09/1
https://access.redhat.com/errata/RHSA-2024:6963
https://access.redhat.com/errata/RHSA-2024:9184
https://access.redhat.com/security/cve/CVE-2024-6655
https://bugzilla.redhat.com/2297098
https://bugzilla.redhat.com/show_bug.cgi?id=2297098
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6655
https://errata.almalinux.org/8/ALSA-2024-6963.html
https://errata.rockylinux.org/RLSA-2024:6963
https://gitlab.gnome.org/GNOME/gtk/-/merge_requests/7361/diffs?commit_id=3bbf0b6176d42836d23c36a6ac410e807ec0a7a7#diff-content-e3fbe6480add9420b69f82374fb26ccac2c015a0
https://linux.oracle.com/cve/CVE-2024-6655.html
https://linux.oracle.com/errata/ELSA-2024-9184.html
https://nvd.nist.gov/vuln/detail/CVE-2024-6655
https://ubuntu.com/security/notices/USN-6899-1
https://www.cve.org/CVERecord?id=CVE-2024-6655
https://www.openwall.com/lists/oss-security/2024/09/09/1
|
| libgtk-3-common |
CVE-2024-6655 |
HIGH |
3.24.38-2~deb12u1 |
3.24.38-2~deb12u2 |
http://www.openwall.com/lists/oss-security/2024/09/09/1
https://access.redhat.com/errata/RHSA-2024:6963
https://access.redhat.com/errata/RHSA-2024:9184
https://access.redhat.com/security/cve/CVE-2024-6655
https://bugzilla.redhat.com/2297098
https://bugzilla.redhat.com/show_bug.cgi?id=2297098
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6655
https://errata.almalinux.org/8/ALSA-2024-6963.html
https://errata.rockylinux.org/RLSA-2024:6963
https://gitlab.gnome.org/GNOME/gtk/-/merge_requests/7361/diffs?commit_id=3bbf0b6176d42836d23c36a6ac410e807ec0a7a7#diff-content-e3fbe6480add9420b69f82374fb26ccac2c015a0
https://linux.oracle.com/cve/CVE-2024-6655.html
https://linux.oracle.com/errata/ELSA-2024-9184.html
https://nvd.nist.gov/vuln/detail/CVE-2024-6655
https://ubuntu.com/security/notices/USN-6899-1
https://www.cve.org/CVERecord?id=CVE-2024-6655
https://www.openwall.com/lists/oss-security/2024/09/09/1
|
| libharfbuzz-icu0 |
CVE-2023-25193 |
HIGH |
6.0.0+dfsg-3 |
|
https://access.redhat.com/errata/RHSA-2024:2980
https://access.redhat.com/security/cve/CVE-2023-25193
https://bugzilla.redhat.com/2167254
https://bugzilla.redhat.com/show_bug.cgi?id=2167254
https://chromium.googlesource.com/chromium/src/+/e1f324aa681af54101c1f2d173d92adb80e37088/DEPS#361
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25193
https://errata.almalinux.org/8/ALSA-2024-2980.html
https://errata.rockylinux.org/RLSA-2024:2980
https://github.com/harfbuzz/harfbuzz/blob/2822b589bc837fae6f66233e2cf2eef0f6ce8470/src/hb-ot-layout-gsubgpos.hh
https://github.com/harfbuzz/harfbuzz/commit/85be877925ddbf34f74a1229f3ca1716bb6170dc
https://github.com/harfbuzz/harfbuzz/commit/85be877925ddbf34f74a1229f3ca1716bb6170dc (reverted)
https://linux.oracle.com/cve/CVE-2023-25193.html
https://linux.oracle.com/errata/ELSA-2024-2980.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KWCHWSICWVZSAXP2YAXM65JC2GR53547/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZ5M2GSAIHFPLHYJXUPQ2QDJCLWXUGO3/
https://lists.fedoraproject.org/archives/list/[email protected]/message/KWCHWSICWVZSAXP2YAXM65JC2GR53547/
https://nvd.nist.gov/vuln/detail/CVE-2023-25193
https://security.netapp.com/advisory/ntap-20230725-0006/
https://ubuntu.com/security/notices/USN-6263-1
https://ubuntu.com/security/notices/USN-6272-1
https://ubuntu.com/security/notices/USN-7251-1
https://www.cve.org/CVERecord?id=CVE-2023-25193
|
| libharfbuzz0b |
CVE-2023-25193 |
HIGH |
6.0.0+dfsg-3 |
|
https://access.redhat.com/errata/RHSA-2024:2980
https://access.redhat.com/security/cve/CVE-2023-25193
https://bugzilla.redhat.com/2167254
https://bugzilla.redhat.com/show_bug.cgi?id=2167254
https://chromium.googlesource.com/chromium/src/+/e1f324aa681af54101c1f2d173d92adb80e37088/DEPS#361
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25193
https://errata.almalinux.org/8/ALSA-2024-2980.html
https://errata.rockylinux.org/RLSA-2024:2980
https://github.com/harfbuzz/harfbuzz/blob/2822b589bc837fae6f66233e2cf2eef0f6ce8470/src/hb-ot-layout-gsubgpos.hh
https://github.com/harfbuzz/harfbuzz/commit/85be877925ddbf34f74a1229f3ca1716bb6170dc
https://github.com/harfbuzz/harfbuzz/commit/85be877925ddbf34f74a1229f3ca1716bb6170dc (reverted)
https://linux.oracle.com/cve/CVE-2023-25193.html
https://linux.oracle.com/errata/ELSA-2024-2980.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KWCHWSICWVZSAXP2YAXM65JC2GR53547/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZ5M2GSAIHFPLHYJXUPQ2QDJCLWXUGO3/
https://lists.fedoraproject.org/archives/list/[email protected]/message/KWCHWSICWVZSAXP2YAXM65JC2GR53547/
https://nvd.nist.gov/vuln/detail/CVE-2023-25193
https://security.netapp.com/advisory/ntap-20230725-0006/
https://ubuntu.com/security/notices/USN-6263-1
https://ubuntu.com/security/notices/USN-6272-1
https://ubuntu.com/security/notices/USN-7251-1
https://www.cve.org/CVERecord?id=CVE-2023-25193
|
| libicu72 |
CVE-2025-5222 |
HIGH |
72.1-3 |
72.1-3+deb12u1 |
https://access.redhat.com/errata/RHSA-2025:11888
https://access.redhat.com/errata/RHSA-2025:12083
https://access.redhat.com/errata/RHSA-2025:12331
https://access.redhat.com/errata/RHSA-2025:12332
https://access.redhat.com/errata/RHSA-2025:12333
https://access.redhat.com/security/cve/CVE-2025-5222
https://bugzilla.redhat.com/2368600
https://bugzilla.redhat.com/show_bug.cgi?id=2368600
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5222
https://errata.almalinux.org/10/ALSA-2025-11888.html
https://errata.rockylinux.org/RLSA-2025:11888
https://linux.oracle.com/cve/CVE-2025-5222.html
https://linux.oracle.com/errata/ELSA-2025-12083.html
https://lists.debian.org/debian-lts-announce/2025/06/msg00015.html
https://nvd.nist.gov/vuln/detail/CVE-2025-5222
https://www.cve.org/CVERecord?id=CVE-2025-5222
|
| libip4tc2 |
CVE-2012-2663 |
LOW |
1.8.9-2 |
|
http://www.spinics.net/lists/netfilter-devel/msg21248.html
https://access.redhat.com/security/cve/CVE-2012-2663
https://bugzilla.redhat.com/show_bug.cgi?id=826702
https://nvd.nist.gov/vuln/detail/CVE-2012-2663
https://www.cve.org/CVERecord?id=CVE-2012-2663
|
| libjbig0 |
CVE-2017-9937 |
LOW |
2.1-6.1 |
|
http://bugzilla.maptools.org/show_bug.cgi?id=2707
http://www.securityfocus.com/bid/99304
https://access.redhat.com/security/cve/CVE-2017-9937
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-9937
https://ubuntu.com/security/notices/USN-5742-1
https://www.cve.org/CVERecord?id=CVE-2017-9937
|
| libk5crypto3 |
CVE-2024-37371 |
CRITICAL |
1.20.1-2+deb12u1 |
1.20.1-2+deb12u2 |
https://access.redhat.com/errata/RHSA-2025:1673
https://access.redhat.com/security/cve/CVE-2024-37371
https://bugzilla.redhat.com/2294581
https://bugzilla.redhat.com/2294676
https://bugzilla.redhat.com/2301888
https://bugzilla.redhat.com/2318857
https://bugzilla.redhat.com/2318858
https://bugzilla.redhat.com/2318870
https://bugzilla.redhat.com/2318873
https://bugzilla.redhat.com/2318874
https://bugzilla.redhat.com/2318876
https://bugzilla.redhat.com/2318882
https://bugzilla.redhat.com/2318883
https://bugzilla.redhat.com/2318884
https://bugzilla.redhat.com/2318885
https://bugzilla.redhat.com/2318886
https://bugzilla.redhat.com/2318897
https://bugzilla.redhat.com/2318900
https://bugzilla.redhat.com/2318905
https://bugzilla.redhat.com/2318914
https://bugzilla.redhat.com/2318922
https://bugzilla.redhat.com/2318923
https://bugzilla.redhat.com/2318925
https://bugzilla.redhat.com/2318926
https://bugzilla.redhat.com/2318927
https://bugzilla.redhat.com/2331191
https://bugzilla.redhat.com/2339218
https://bugzilla.redhat.com/2339220
https://bugzilla.redhat.com/2339221
https://bugzilla.redhat.com/2339226
https://bugzilla.redhat.com/2339231
https://bugzilla.redhat.com/2339236
https://bugzilla.redhat.com/2339238
https://bugzilla.redhat.com/2339243
https://bugzilla.redhat.com/2339247
https://bugzilla.redhat.com/2339252
https://bugzilla.redhat.com/2339259
https://bugzilla.redhat.com/2339266
https://bugzilla.redhat.com/2339270
https://bugzilla.redhat.com/2339271
https://bugzilla.redhat.com/2339275
https://bugzilla.redhat.com/2339277
https://bugzilla.redhat.com/2339281
https://bugzilla.redhat.com/2339284
https://bugzilla.redhat.com/2339291
https://bugzilla.redhat.com/2339293
https://bugzilla.redhat.com/2339295
https://bugzilla.redhat.com/2339299
https://bugzilla.redhat.com/2339300
https://bugzilla.redhat.com/2339304
https://bugzilla.redhat.com/2339305
https://bugzilla.redhat.com/show_bug.cgi?id=2294676
https://bugzilla.redhat.com/show_bug.cgi?id=2294677
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37371
https://errata.almalinux.org/8/ALSA-2025-1673.html
https://errata.rockylinux.org/RLSA-2024:5312
https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef
https://linux.oracle.com/cve/CVE-2024-37371.html
https://linux.oracle.com/errata/ELSA-2025-1673.html
https://nvd.nist.gov/vuln/detail/CVE-2024-37371
https://security.netapp.com/advisory/ntap-20241108-0009/
https://ubuntu.com/security/notices/USN-6947-1
https://web.mit.edu/kerberos/www/advisories/
https://web.mit.edu/kerberos/www/krb5-1.21/
https://www.cve.org/CVERecord?id=CVE-2024-37371
https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL
|
| libk5crypto3 |
CVE-2024-37370 |
HIGH |
1.20.1-2+deb12u1 |
1.20.1-2+deb12u2 |
https://access.redhat.com/errata/RHSA-2024:5312
https://access.redhat.com/security/cve/CVE-2024-37370
https://bugzilla.redhat.com/2294676
https://bugzilla.redhat.com/2294677
https://bugzilla.redhat.com/show_bug.cgi?id=2294676
https://bugzilla.redhat.com/show_bug.cgi?id=2294677
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37371
https://errata.almalinux.org/8/ALSA-2024-5312.html
https://errata.rockylinux.org/RLSA-2024:5312
https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef
https://linux.oracle.com/cve/CVE-2024-37370.html
https://linux.oracle.com/errata/ELSA-2024-6166.html
https://nvd.nist.gov/vuln/detail/CVE-2024-37370
https://security.netapp.com/advisory/ntap-20241108-0007/
https://ubuntu.com/security/notices/USN-6947-1
https://web.mit.edu/kerberos/www/advisories/
https://web.mit.edu/kerberos/www/krb5-1.21/
https://www.cve.org/CVERecord?id=CVE-2024-37370
|
| libk5crypto3 |
CVE-2024-26462 |
MEDIUM |
1.20.1-2+deb12u1 |
1.20.1-2+deb12u3 |
https://access.redhat.com/errata/RHSA-2024:9331
https://access.redhat.com/security/cve/CVE-2024-26462
https://bugzilla.redhat.com/2266731
https://bugzilla.redhat.com/2266740
https://bugzilla.redhat.com/2266742
https://errata.almalinux.org/9/ALSA-2024-9331.html
https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_3.md
https://linux.oracle.com/cve/CVE-2024-26462.html
https://linux.oracle.com/errata/ELSA-2024-9331.html
https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html
https://nvd.nist.gov/vuln/detail/CVE-2024-26462
https://security.netapp.com/advisory/ntap-20240415-0012/
https://ubuntu.com/security/notices/USN-7314-1
https://www.cve.org/CVERecord?id=CVE-2024-26462
|
| libk5crypto3 |
CVE-2025-24528 |
MEDIUM |
1.20.1-2+deb12u1 |
1.20.1-2+deb12u3 |
https://access.redhat.com/errata/RHSA-2025:2722
https://access.redhat.com/security/cve/CVE-2025-24528
https://bugzilla.redhat.com/2342796
https://bugzilla.redhat.com/show_bug.cgi?id=2342796
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24528
https://errata.almalinux.org/8/ALSA-2025-2722.html
https://errata.rockylinux.org/RLSA-2025:2722
https://github.com/krb5/krb5/commit/78ceba024b64d49612375be4a12d1c066b0bfbd0
https://linux.oracle.com/cve/CVE-2025-24528.html
https://linux.oracle.com/errata/ELSA-2025-7067.html
https://nvd.nist.gov/vuln/detail/CVE-2025-24528
https://ubuntu.com/security/notices/USN-7314-1
https://www.cve.org/CVERecord?id=CVE-2025-24528
|
| libk5crypto3 |
CVE-2025-3576 |
MEDIUM |
1.20.1-2+deb12u1 |
1.20.1-2+deb12u4 |
https://access.redhat.com/errata/RHSA-2025:11487
https://access.redhat.com/errata/RHSA-2025:13664
https://access.redhat.com/errata/RHSA-2025:13777
https://access.redhat.com/errata/RHSA-2025:15000
https://access.redhat.com/errata/RHSA-2025:15001
https://access.redhat.com/errata/RHSA-2025:15002
https://access.redhat.com/errata/RHSA-2025:15003
https://access.redhat.com/errata/RHSA-2025:15004
https://access.redhat.com/errata/RHSA-2025:8411
https://access.redhat.com/errata/RHSA-2025:9418
https://access.redhat.com/errata/RHSA-2025:9430
https://access.redhat.com/security/cve/CVE-2025-3576
https://bugzilla.redhat.com/2359465
https://bugzilla.redhat.com/show_bug.cgi?id=2359465
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3576
https://errata.almalinux.org/8/ALSA-2025-8411.html
https://errata.rockylinux.org/RLSA-2025:8411
https://linux.oracle.com/cve/CVE-2025-3576.html
https://linux.oracle.com/errata/ELSA-2025-9430.html
https://lists.debian.org/debian-lts-announce/2025/05/msg00047.html
https://nvd.nist.gov/vuln/detail/CVE-2025-3576
https://ubuntu.com/security/notices/USN-7542-1
https://web.mit.edu/kerberos/krb5-1.22/krb5-1.22.html
https://www.cve.org/CVERecord?id=CVE-2025-3576
|
| libk5crypto3 |
CVE-2018-5709 |
LOW |
1.20.1-2+deb12u1 |
|
https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-5709
https://www.cve.org/CVERecord?id=CVE-2018-5709
|
| libk5crypto3 |
CVE-2024-26458 |
LOW |
1.20.1-2+deb12u1 |
|
https://access.redhat.com/errata/RHSA-2024:3268
https://access.redhat.com/security/cve/CVE-2024-26458
https://bugzilla.redhat.com/2266731
https://bugzilla.redhat.com/2266740
https://bugzilla.redhat.com/show_bug.cgi?id=2266731
https://bugzilla.redhat.com/show_bug.cgi?id=2266740
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461
https://errata.almalinux.org/8/ALSA-2024-3268.html
https://errata.rockylinux.org/RLSA-2024:3268
https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_1.md
https://linux.oracle.com/cve/CVE-2024-26458.html
https://linux.oracle.com/errata/ELSA-2024-9331.html
https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html
https://nvd.nist.gov/vuln/detail/CVE-2024-26458
https://security.netapp.com/advisory/ntap-20240415-0010/
https://ubuntu.com/security/notices/USN-7314-1
https://www.cve.org/CVERecord?id=CVE-2024-26458
|
| libk5crypto3 |
CVE-2024-26461 |
LOW |
1.20.1-2+deb12u1 |
|
https://access.redhat.com/errata/RHSA-2024:3268
https://access.redhat.com/security/cve/CVE-2024-26461
https://bugzilla.redhat.com/2266731
https://bugzilla.redhat.com/2266740
https://bugzilla.redhat.com/show_bug.cgi?id=2266731
https://bugzilla.redhat.com/show_bug.cgi?id=2266740
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461
https://errata.almalinux.org/8/ALSA-2024-3268.html
https://errata.rockylinux.org/RLSA-2024:3268
https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md
https://linux.oracle.com/cve/CVE-2024-26461.html
https://linux.oracle.com/errata/ELSA-2024-9331.html
https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html
https://nvd.nist.gov/vuln/detail/CVE-2024-26461
https://security.netapp.com/advisory/ntap-20240415-0011/
https://ubuntu.com/security/notices/USN-7314-1
https://www.cve.org/CVERecord?id=CVE-2024-26461
|
| libkrb5-3 |
CVE-2024-37371 |
CRITICAL |
1.20.1-2+deb12u1 |
1.20.1-2+deb12u2 |
https://access.redhat.com/errata/RHSA-2025:1673
https://access.redhat.com/security/cve/CVE-2024-37371
https://bugzilla.redhat.com/2294581
https://bugzilla.redhat.com/2294676
https://bugzilla.redhat.com/2301888
https://bugzilla.redhat.com/2318857
https://bugzilla.redhat.com/2318858
https://bugzilla.redhat.com/2318870
https://bugzilla.redhat.com/2318873
https://bugzilla.redhat.com/2318874
https://bugzilla.redhat.com/2318876
https://bugzilla.redhat.com/2318882
https://bugzilla.redhat.com/2318883
https://bugzilla.redhat.com/2318884
https://bugzilla.redhat.com/2318885
https://bugzilla.redhat.com/2318886
https://bugzilla.redhat.com/2318897
https://bugzilla.redhat.com/2318900
https://bugzilla.redhat.com/2318905
https://bugzilla.redhat.com/2318914
https://bugzilla.redhat.com/2318922
https://bugzilla.redhat.com/2318923
https://bugzilla.redhat.com/2318925
https://bugzilla.redhat.com/2318926
https://bugzilla.redhat.com/2318927
https://bugzilla.redhat.com/2331191
https://bugzilla.redhat.com/2339218
https://bugzilla.redhat.com/2339220
https://bugzilla.redhat.com/2339221
https://bugzilla.redhat.com/2339226
https://bugzilla.redhat.com/2339231
https://bugzilla.redhat.com/2339236
https://bugzilla.redhat.com/2339238
https://bugzilla.redhat.com/2339243
https://bugzilla.redhat.com/2339247
https://bugzilla.redhat.com/2339252
https://bugzilla.redhat.com/2339259
https://bugzilla.redhat.com/2339266
https://bugzilla.redhat.com/2339270
https://bugzilla.redhat.com/2339271
https://bugzilla.redhat.com/2339275
https://bugzilla.redhat.com/2339277
https://bugzilla.redhat.com/2339281
https://bugzilla.redhat.com/2339284
https://bugzilla.redhat.com/2339291
https://bugzilla.redhat.com/2339293
https://bugzilla.redhat.com/2339295
https://bugzilla.redhat.com/2339299
https://bugzilla.redhat.com/2339300
https://bugzilla.redhat.com/2339304
https://bugzilla.redhat.com/2339305
https://bugzilla.redhat.com/show_bug.cgi?id=2294676
https://bugzilla.redhat.com/show_bug.cgi?id=2294677
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37371
https://errata.almalinux.org/8/ALSA-2025-1673.html
https://errata.rockylinux.org/RLSA-2024:5312
https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef
https://linux.oracle.com/cve/CVE-2024-37371.html
https://linux.oracle.com/errata/ELSA-2025-1673.html
https://nvd.nist.gov/vuln/detail/CVE-2024-37371
https://security.netapp.com/advisory/ntap-20241108-0009/
https://ubuntu.com/security/notices/USN-6947-1
https://web.mit.edu/kerberos/www/advisories/
https://web.mit.edu/kerberos/www/krb5-1.21/
https://www.cve.org/CVERecord?id=CVE-2024-37371
https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL
|
| libkrb5-3 |
CVE-2024-37370 |
HIGH |
1.20.1-2+deb12u1 |
1.20.1-2+deb12u2 |
https://access.redhat.com/errata/RHSA-2024:5312
https://access.redhat.com/security/cve/CVE-2024-37370
https://bugzilla.redhat.com/2294676
https://bugzilla.redhat.com/2294677
https://bugzilla.redhat.com/show_bug.cgi?id=2294676
https://bugzilla.redhat.com/show_bug.cgi?id=2294677
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37371
https://errata.almalinux.org/8/ALSA-2024-5312.html
https://errata.rockylinux.org/RLSA-2024:5312
https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef
https://linux.oracle.com/cve/CVE-2024-37370.html
https://linux.oracle.com/errata/ELSA-2024-6166.html
https://nvd.nist.gov/vuln/detail/CVE-2024-37370
https://security.netapp.com/advisory/ntap-20241108-0007/
https://ubuntu.com/security/notices/USN-6947-1
https://web.mit.edu/kerberos/www/advisories/
https://web.mit.edu/kerberos/www/krb5-1.21/
https://www.cve.org/CVERecord?id=CVE-2024-37370
|
| libkrb5-3 |
CVE-2024-26462 |
MEDIUM |
1.20.1-2+deb12u1 |
1.20.1-2+deb12u3 |
https://access.redhat.com/errata/RHSA-2024:9331
https://access.redhat.com/security/cve/CVE-2024-26462
https://bugzilla.redhat.com/2266731
https://bugzilla.redhat.com/2266740
https://bugzilla.redhat.com/2266742
https://errata.almalinux.org/9/ALSA-2024-9331.html
https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_3.md
https://linux.oracle.com/cve/CVE-2024-26462.html
https://linux.oracle.com/errata/ELSA-2024-9331.html
https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html
https://nvd.nist.gov/vuln/detail/CVE-2024-26462
https://security.netapp.com/advisory/ntap-20240415-0012/
https://ubuntu.com/security/notices/USN-7314-1
https://www.cve.org/CVERecord?id=CVE-2024-26462
|
| libkrb5-3 |
CVE-2025-24528 |
MEDIUM |
1.20.1-2+deb12u1 |
1.20.1-2+deb12u3 |
https://access.redhat.com/errata/RHSA-2025:2722
https://access.redhat.com/security/cve/CVE-2025-24528
https://bugzilla.redhat.com/2342796
https://bugzilla.redhat.com/show_bug.cgi?id=2342796
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24528
https://errata.almalinux.org/8/ALSA-2025-2722.html
https://errata.rockylinux.org/RLSA-2025:2722
https://github.com/krb5/krb5/commit/78ceba024b64d49612375be4a12d1c066b0bfbd0
https://linux.oracle.com/cve/CVE-2025-24528.html
https://linux.oracle.com/errata/ELSA-2025-7067.html
https://nvd.nist.gov/vuln/detail/CVE-2025-24528
https://ubuntu.com/security/notices/USN-7314-1
https://www.cve.org/CVERecord?id=CVE-2025-24528
|
| libkrb5-3 |
CVE-2025-3576 |
MEDIUM |
1.20.1-2+deb12u1 |
1.20.1-2+deb12u4 |
https://access.redhat.com/errata/RHSA-2025:11487
https://access.redhat.com/errata/RHSA-2025:13664
https://access.redhat.com/errata/RHSA-2025:13777
https://access.redhat.com/errata/RHSA-2025:15000
https://access.redhat.com/errata/RHSA-2025:15001
https://access.redhat.com/errata/RHSA-2025:15002
https://access.redhat.com/errata/RHSA-2025:15003
https://access.redhat.com/errata/RHSA-2025:15004
https://access.redhat.com/errata/RHSA-2025:8411
https://access.redhat.com/errata/RHSA-2025:9418
https://access.redhat.com/errata/RHSA-2025:9430
https://access.redhat.com/security/cve/CVE-2025-3576
https://bugzilla.redhat.com/2359465
https://bugzilla.redhat.com/show_bug.cgi?id=2359465
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3576
https://errata.almalinux.org/8/ALSA-2025-8411.html
https://errata.rockylinux.org/RLSA-2025:8411
https://linux.oracle.com/cve/CVE-2025-3576.html
https://linux.oracle.com/errata/ELSA-2025-9430.html
https://lists.debian.org/debian-lts-announce/2025/05/msg00047.html
https://nvd.nist.gov/vuln/detail/CVE-2025-3576
https://ubuntu.com/security/notices/USN-7542-1
https://web.mit.edu/kerberos/krb5-1.22/krb5-1.22.html
https://www.cve.org/CVERecord?id=CVE-2025-3576
|
| libkrb5-3 |
CVE-2018-5709 |
LOW |
1.20.1-2+deb12u1 |
|
https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-5709
https://www.cve.org/CVERecord?id=CVE-2018-5709
|
| libkrb5-3 |
CVE-2024-26458 |
LOW |
1.20.1-2+deb12u1 |
|
https://access.redhat.com/errata/RHSA-2024:3268
https://access.redhat.com/security/cve/CVE-2024-26458
https://bugzilla.redhat.com/2266731
https://bugzilla.redhat.com/2266740
https://bugzilla.redhat.com/show_bug.cgi?id=2266731
https://bugzilla.redhat.com/show_bug.cgi?id=2266740
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461
https://errata.almalinux.org/8/ALSA-2024-3268.html
https://errata.rockylinux.org/RLSA-2024:3268
https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_1.md
https://linux.oracle.com/cve/CVE-2024-26458.html
https://linux.oracle.com/errata/ELSA-2024-9331.html
https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html
https://nvd.nist.gov/vuln/detail/CVE-2024-26458
https://security.netapp.com/advisory/ntap-20240415-0010/
https://ubuntu.com/security/notices/USN-7314-1
https://www.cve.org/CVERecord?id=CVE-2024-26458
|
| libkrb5-3 |
CVE-2024-26461 |
LOW |
1.20.1-2+deb12u1 |
|
https://access.redhat.com/errata/RHSA-2024:3268
https://access.redhat.com/security/cve/CVE-2024-26461
https://bugzilla.redhat.com/2266731
https://bugzilla.redhat.com/2266740
https://bugzilla.redhat.com/show_bug.cgi?id=2266731
https://bugzilla.redhat.com/show_bug.cgi?id=2266740
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461
https://errata.almalinux.org/8/ALSA-2024-3268.html
https://errata.rockylinux.org/RLSA-2024:3268
https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md
https://linux.oracle.com/cve/CVE-2024-26461.html
https://linux.oracle.com/errata/ELSA-2024-9331.html
https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html
https://nvd.nist.gov/vuln/detail/CVE-2024-26461
https://security.netapp.com/advisory/ntap-20240415-0011/
https://ubuntu.com/security/notices/USN-7314-1
https://www.cve.org/CVERecord?id=CVE-2024-26461
|
| libkrb5support0 |
CVE-2024-37371 |
CRITICAL |
1.20.1-2+deb12u1 |
1.20.1-2+deb12u2 |
https://access.redhat.com/errata/RHSA-2025:1673
https://access.redhat.com/security/cve/CVE-2024-37371
https://bugzilla.redhat.com/2294581
https://bugzilla.redhat.com/2294676
https://bugzilla.redhat.com/2301888
https://bugzilla.redhat.com/2318857
https://bugzilla.redhat.com/2318858
https://bugzilla.redhat.com/2318870
https://bugzilla.redhat.com/2318873
https://bugzilla.redhat.com/2318874
https://bugzilla.redhat.com/2318876
https://bugzilla.redhat.com/2318882
https://bugzilla.redhat.com/2318883
https://bugzilla.redhat.com/2318884
https://bugzilla.redhat.com/2318885
https://bugzilla.redhat.com/2318886
https://bugzilla.redhat.com/2318897
https://bugzilla.redhat.com/2318900
https://bugzilla.redhat.com/2318905
https://bugzilla.redhat.com/2318914
https://bugzilla.redhat.com/2318922
https://bugzilla.redhat.com/2318923
https://bugzilla.redhat.com/2318925
https://bugzilla.redhat.com/2318926
https://bugzilla.redhat.com/2318927
https://bugzilla.redhat.com/2331191
https://bugzilla.redhat.com/2339218
https://bugzilla.redhat.com/2339220
https://bugzilla.redhat.com/2339221
https://bugzilla.redhat.com/2339226
https://bugzilla.redhat.com/2339231
https://bugzilla.redhat.com/2339236
https://bugzilla.redhat.com/2339238
https://bugzilla.redhat.com/2339243
https://bugzilla.redhat.com/2339247
https://bugzilla.redhat.com/2339252
https://bugzilla.redhat.com/2339259
https://bugzilla.redhat.com/2339266
https://bugzilla.redhat.com/2339270
https://bugzilla.redhat.com/2339271
https://bugzilla.redhat.com/2339275
https://bugzilla.redhat.com/2339277
https://bugzilla.redhat.com/2339281
https://bugzilla.redhat.com/2339284
https://bugzilla.redhat.com/2339291
https://bugzilla.redhat.com/2339293
https://bugzilla.redhat.com/2339295
https://bugzilla.redhat.com/2339299
https://bugzilla.redhat.com/2339300
https://bugzilla.redhat.com/2339304
https://bugzilla.redhat.com/2339305
https://bugzilla.redhat.com/show_bug.cgi?id=2294676
https://bugzilla.redhat.com/show_bug.cgi?id=2294677
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37371
https://errata.almalinux.org/8/ALSA-2025-1673.html
https://errata.rockylinux.org/RLSA-2024:5312
https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef
https://linux.oracle.com/cve/CVE-2024-37371.html
https://linux.oracle.com/errata/ELSA-2025-1673.html
https://nvd.nist.gov/vuln/detail/CVE-2024-37371
https://security.netapp.com/advisory/ntap-20241108-0009/
https://ubuntu.com/security/notices/USN-6947-1
https://web.mit.edu/kerberos/www/advisories/
https://web.mit.edu/kerberos/www/krb5-1.21/
https://www.cve.org/CVERecord?id=CVE-2024-37371
https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL
|
| libkrb5support0 |
CVE-2024-37370 |
HIGH |
1.20.1-2+deb12u1 |
1.20.1-2+deb12u2 |
https://access.redhat.com/errata/RHSA-2024:5312
https://access.redhat.com/security/cve/CVE-2024-37370
https://bugzilla.redhat.com/2294676
https://bugzilla.redhat.com/2294677
https://bugzilla.redhat.com/show_bug.cgi?id=2294676
https://bugzilla.redhat.com/show_bug.cgi?id=2294677
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37371
https://errata.almalinux.org/8/ALSA-2024-5312.html
https://errata.rockylinux.org/RLSA-2024:5312
https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef
https://linux.oracle.com/cve/CVE-2024-37370.html
https://linux.oracle.com/errata/ELSA-2024-6166.html
https://nvd.nist.gov/vuln/detail/CVE-2024-37370
https://security.netapp.com/advisory/ntap-20241108-0007/
https://ubuntu.com/security/notices/USN-6947-1
https://web.mit.edu/kerberos/www/advisories/
https://web.mit.edu/kerberos/www/krb5-1.21/
https://www.cve.org/CVERecord?id=CVE-2024-37370
|
| libkrb5support0 |
CVE-2024-26462 |
MEDIUM |
1.20.1-2+deb12u1 |
1.20.1-2+deb12u3 |
https://access.redhat.com/errata/RHSA-2024:9331
https://access.redhat.com/security/cve/CVE-2024-26462
https://bugzilla.redhat.com/2266731
https://bugzilla.redhat.com/2266740
https://bugzilla.redhat.com/2266742
https://errata.almalinux.org/9/ALSA-2024-9331.html
https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_3.md
https://linux.oracle.com/cve/CVE-2024-26462.html
https://linux.oracle.com/errata/ELSA-2024-9331.html
https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html
https://nvd.nist.gov/vuln/detail/CVE-2024-26462
https://security.netapp.com/advisory/ntap-20240415-0012/
https://ubuntu.com/security/notices/USN-7314-1
https://www.cve.org/CVERecord?id=CVE-2024-26462
|
| libkrb5support0 |
CVE-2025-24528 |
MEDIUM |
1.20.1-2+deb12u1 |
1.20.1-2+deb12u3 |
https://access.redhat.com/errata/RHSA-2025:2722
https://access.redhat.com/security/cve/CVE-2025-24528
https://bugzilla.redhat.com/2342796
https://bugzilla.redhat.com/show_bug.cgi?id=2342796
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24528
https://errata.almalinux.org/8/ALSA-2025-2722.html
https://errata.rockylinux.org/RLSA-2025:2722
https://github.com/krb5/krb5/commit/78ceba024b64d49612375be4a12d1c066b0bfbd0
https://linux.oracle.com/cve/CVE-2025-24528.html
https://linux.oracle.com/errata/ELSA-2025-7067.html
https://nvd.nist.gov/vuln/detail/CVE-2025-24528
https://ubuntu.com/security/notices/USN-7314-1
https://www.cve.org/CVERecord?id=CVE-2025-24528
|
| libkrb5support0 |
CVE-2025-3576 |
MEDIUM |
1.20.1-2+deb12u1 |
1.20.1-2+deb12u4 |
https://access.redhat.com/errata/RHSA-2025:11487
https://access.redhat.com/errata/RHSA-2025:13664
https://access.redhat.com/errata/RHSA-2025:13777
https://access.redhat.com/errata/RHSA-2025:15000
https://access.redhat.com/errata/RHSA-2025:15001
https://access.redhat.com/errata/RHSA-2025:15002
https://access.redhat.com/errata/RHSA-2025:15003
https://access.redhat.com/errata/RHSA-2025:15004
https://access.redhat.com/errata/RHSA-2025:8411
https://access.redhat.com/errata/RHSA-2025:9418
https://access.redhat.com/errata/RHSA-2025:9430
https://access.redhat.com/security/cve/CVE-2025-3576
https://bugzilla.redhat.com/2359465
https://bugzilla.redhat.com/show_bug.cgi?id=2359465
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3576
https://errata.almalinux.org/8/ALSA-2025-8411.html
https://errata.rockylinux.org/RLSA-2025:8411
https://linux.oracle.com/cve/CVE-2025-3576.html
https://linux.oracle.com/errata/ELSA-2025-9430.html
https://lists.debian.org/debian-lts-announce/2025/05/msg00047.html
https://nvd.nist.gov/vuln/detail/CVE-2025-3576
https://ubuntu.com/security/notices/USN-7542-1
https://web.mit.edu/kerberos/krb5-1.22/krb5-1.22.html
https://www.cve.org/CVERecord?id=CVE-2025-3576
|
| libkrb5support0 |
CVE-2018-5709 |
LOW |
1.20.1-2+deb12u1 |
|
https://access.redhat.com/security/cve/CVE-2018-5709
https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-5709
https://www.cve.org/CVERecord?id=CVE-2018-5709
|
| libkrb5support0 |
CVE-2024-26458 |
LOW |
1.20.1-2+deb12u1 |
|
https://access.redhat.com/errata/RHSA-2024:3268
https://access.redhat.com/security/cve/CVE-2024-26458
https://bugzilla.redhat.com/2266731
https://bugzilla.redhat.com/2266740
https://bugzilla.redhat.com/show_bug.cgi?id=2266731
https://bugzilla.redhat.com/show_bug.cgi?id=2266740
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461
https://errata.almalinux.org/8/ALSA-2024-3268.html
https://errata.rockylinux.org/RLSA-2024:3268
https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_1.md
https://linux.oracle.com/cve/CVE-2024-26458.html
https://linux.oracle.com/errata/ELSA-2024-9331.html
https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html
https://nvd.nist.gov/vuln/detail/CVE-2024-26458
https://security.netapp.com/advisory/ntap-20240415-0010/
https://ubuntu.com/security/notices/USN-7314-1
https://www.cve.org/CVERecord?id=CVE-2024-26458
|
| libkrb5support0 |
CVE-2024-26461 |
LOW |
1.20.1-2+deb12u1 |
|
https://access.redhat.com/errata/RHSA-2024:3268
https://access.redhat.com/security/cve/CVE-2024-26461
https://bugzilla.redhat.com/2266731
https://bugzilla.redhat.com/2266740
https://bugzilla.redhat.com/show_bug.cgi?id=2266731
https://bugzilla.redhat.com/show_bug.cgi?id=2266740
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461
https://errata.almalinux.org/8/ALSA-2024-3268.html
https://errata.rockylinux.org/RLSA-2024:3268
https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md
https://linux.oracle.com/cve/CVE-2024-26461.html
https://linux.oracle.com/errata/ELSA-2024-9331.html
https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html
https://nvd.nist.gov/vuln/detail/CVE-2024-26461
https://security.netapp.com/advisory/ntap-20240415-0011/
https://ubuntu.com/security/notices/USN-7314-1
https://www.cve.org/CVERecord?id=CVE-2024-26461
|
| liblcms2-2 |
CVE-2025-29070 |
LOW |
2.14-2 |
|
https://github.com/mm2/Little-CMS/issues/475
https://github.com/mm2/Little-CMS/issues/475#issuecomment-2696785063
|
| libldap-2.5-0 |
CVE-2023-2953 |
HIGH |
2.5.13+dfsg-5 |
|
http://seclists.org/fulldisclosure/2023/Jul/47
http://seclists.org/fulldisclosure/2023/Jul/48
http://seclists.org/fulldisclosure/2023/Jul/52
https://access.redhat.com/errata/RHSA-2024:4264
https://access.redhat.com/security/cve/CVE-2023-2953
https://bugs.openldap.org/show_bug.cgi?id=9904
https://bugzilla.redhat.com/2210651
https://bugzilla.redhat.com/show_bug.cgi?id=2210651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2953
https://errata.almalinux.org/8/ALSA-2024-4264.html
https://errata.rockylinux.org/RLSA-2024:4264
https://linux.oracle.com/cve/CVE-2023-2953.html
https://linux.oracle.com/errata/ELSA-2024-4264.html
https://nvd.nist.gov/vuln/detail/CVE-2023-2953
https://security.netapp.com/advisory/ntap-20230703-0005/
https://support.apple.com/kb/HT213843
https://support.apple.com/kb/HT213844
https://support.apple.com/kb/HT213845
https://ubuntu.com/security/notices/USN-6197-1
https://ubuntu.com/security/notices/USN-6616-1
https://www.cve.org/CVERecord?id=CVE-2023-2953
|
| libldap-2.5-0 |
CVE-2015-3276 |
LOW |
2.5.13+dfsg-5 |
|
http://rhn.redhat.com/errata/RHSA-2015-2131.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
http://www.securitytracker.com/id/1034221
https://access.redhat.com/security/cve/CVE-2015-3276
https://bugzilla.redhat.com/show_bug.cgi?id=1238322
https://linux.oracle.com/cve/CVE-2015-3276.html
https://linux.oracle.com/errata/ELSA-2015-2131.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3276
https://www.cve.org/CVERecord?id=CVE-2015-3276
|
| libldap-2.5-0 |
CVE-2017-14159 |
LOW |
2.5.13+dfsg-5 |
|
http://www.openldap.org/its/index.cgi?findid=8703
https://access.redhat.com/security/cve/CVE-2017-14159
https://nvd.nist.gov/vuln/detail/CVE-2017-14159
https://www.cve.org/CVERecord?id=CVE-2017-14159
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| libldap-2.5-0 |
CVE-2017-17740 |
LOW |
2.5.13+dfsg-5 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://www.openldap.org/its/index.cgi/Incoming?id=8759
https://access.redhat.com/security/cve/CVE-2017-17740
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://nvd.nist.gov/vuln/detail/CVE-2017-17740
https://www.cve.org/CVERecord?id=CVE-2017-17740
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| libldap-2.5-0 |
CVE-2020-15719 |
LOW |
2.5.13+dfsg-5 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://nvd.nist.gov/vuln/detail/CVE-2020-15719
https://www.cve.org/CVERecord?id=CVE-2020-15719
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| liblzma5 |
CVE-2025-31115 |
HIGH |
5.4.1-0.2 |
5.4.1-1 |
http://www.openwall.com/lists/oss-security/2025/04/03/1
http://www.openwall.com/lists/oss-security/2025/04/03/2
http://www.openwall.com/lists/oss-security/2025/04/03/3
https://access.redhat.com/errata/RHSA-2025:7524
https://access.redhat.com/security/cve/CVE-2025-31115
https://bugzilla.redhat.com/2357249
https://bugzilla.redhat.com/show_bug.cgi?id=2357249
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31115
https://errata.almalinux.org/10/ALSA-2025-7524.html
https://errata.rockylinux.org/RLSA-2025:7524
https://github.com/tukaani-project/xz/commit/d5a2ffe41bb77b918a8c96084885d4dbe4bf6480
https://github.com/tukaani-project/xz/security/advisories/GHSA-6cc8-p5mm-29w2
https://linux.oracle.com/cve/CVE-2025-31115.html
https://linux.oracle.com/errata/ELSA-2025-7524.html
https://nvd.nist.gov/vuln/detail/CVE-2025-31115
https://tukaani.org/xz/xz-cve-2025-31115.patch
https://ubuntu.com/security/notices/USN-7414-1
https://www.cve.org/CVERecord?id=CVE-2025-31115
|
| libmount1 |
CVE-2022-0563 |
LOW |
2.38.1-5+deb12u1 |
|
https://access.redhat.com/security/cve/CVE-2022-0563
https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u
https://lore.kernel.org/util-linux/[email protected]/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.gentoo.org/glsa/202401-08
https://security.netapp.com/advisory/ntap-20220331-0002/
https://www.cve.org/CVERecord?id=CVE-2022-0563
|
| libncursesw6 |
CVE-2023-50495 |
MEDIUM |
6.4-4 |
|
https://access.redhat.com/security/cve/CVE-2023-50495
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/
https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00020.html
https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00029.html
https://nvd.nist.gov/vuln/detail/CVE-2023-50495
https://security.netapp.com/advisory/ntap-20240119-0008/
https://ubuntu.com/security/notices/USN-6684-1
https://www.cve.org/CVERecord?id=CVE-2023-50495
|
| libncursesw6 |
CVE-2025-6141 |
LOW |
6.4-4 |
|
https://access.redhat.com/security/cve/CVE-2025-6141
https://invisible-island.net/ncurses/NEWS.html#index-t20250329
https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00107.html
https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00109.html
https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00114.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6141
https://vuldb.com/?ctiid.312610
https://vuldb.com/?id.312610
https://vuldb.com/?submit.593000
https://www.cve.org/CVERecord?id=CVE-2025-6141
https://www.gnu.org/
|
| libnghttp2-14 |
CVE-2024-28182 |
MEDIUM |
1.52.0-1+deb12u1 |
1.52.0-1+deb12u2 |
http://www.openwall.com/lists/oss-security/2024/04/03/16
https://access.redhat.com/errata/RHSA-2024:4252
https://access.redhat.com/security/cve/CVE-2024-28182
https://bugzilla.redhat.com/2268639
https://bugzilla.redhat.com/show_bug.cgi?id=2268639
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28182
https://errata.almalinux.org/8/ALSA-2024-4252.html
https://errata.rockylinux.org/RLSA-2024:3501
https://github.com/nghttp2/nghttp2/commit/00201ecd8f982da3b67d4f6868af72a1b03b14e0
https://github.com/nghttp2/nghttp2/commit/d71a4668c6bead55805d18810d633fbb98315af9
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q
https://linux.oracle.com/cve/CVE-2024-28182.html
https://linux.oracle.com/errata/ELSA-2024-4252.html
https://lists.debian.org/debian-lts-announce/2024/04/msg00026.html
https://lists.debian.org/debian-lts-announce/2024/09/msg00041.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/AGOME6ZXJG7664IPQNVE3DL67E3YP3HY/
https://lists.fedoraproject.org/archives/list/[email protected]/message/J6ZMXUGB66VAXDW5J6QSTHM5ET25FGSA/
https://lists.fedoraproject.org/archives/list/[email protected]/message/PXJO2EASHM2OQQLGVDY5ZSO7UVDVHTDK/
https://nowotarski.info/http2-continuation-flood/
https://nvd.nist.gov/vuln/detail/CVE-2024-28182
https://ubuntu.com/security/notices/USN-6754-1
https://ubuntu.com/security/notices/USN-6754-2
https://www.cve.org/CVERecord?id=CVE-2024-28182
https://www.kb.cert.org/vuls/id/421644
|
| libnss3 |
CVE-2024-0743 |
HIGH |
2:3.87.1-1 |
2:3.87.1-1+deb12u1 |
https://access.redhat.com/errata/RHSA-2024:1494
https://access.redhat.com/security/cve/CVE-2024-0743
https://bugzilla.mozilla.org/show_bug.cgi?id=1867408
https://bugzilla.redhat.com/2243644
https://bugzilla.redhat.com/2260012
https://bugzilla.redhat.com/2268171
https://bugzilla.redhat.com/2270660
https://bugzilla.redhat.com/2270661
https://bugzilla.redhat.com/2270663
https://bugzilla.redhat.com/2270664
https://bugzilla.redhat.com/2270665
https://bugzilla.redhat.com/2270666
https://bugzilla.redhat.com/show_bug.cgi?id=2243644
https://bugzilla.redhat.com/show_bug.cgi?id=2260012
https://bugzilla.redhat.com/show_bug.cgi?id=2268171
https://bugzilla.redhat.com/show_bug.cgi?id=2270660
https://bugzilla.redhat.com/show_bug.cgi?id=2270661
https://bugzilla.redhat.com/show_bug.cgi?id=2270663
https://bugzilla.redhat.com/show_bug.cgi?id=2270664
https://bugzilla.redhat.com/show_bug.cgi?id=2270665
https://bugzilla.redhat.com/show_bug.cgi?id=2270666
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614
https://errata.almalinux.org/8/ALSA-2024-1494.html
https://errata.rockylinux.org/RLSA-2024:1494
https://linux.oracle.com/cve/CVE-2024-0743.html
https://linux.oracle.com/errata/ELSA-2024-1498.html
https://lists.debian.org/debian-lts-announce/2024/03/msg00010.html
https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
https://nvd.nist.gov/vuln/detail/CVE-2024-0743
https://ubuntu.com/security/notices/USN-6610-1
https://ubuntu.com/security/notices/USN-6717-1
https://www.cve.org/CVERecord?id=CVE-2024-0743
https://www.mozilla.org/en-US/security/advisories/mfsa2024-01/#CVE-2024-0743
https://www.mozilla.org/en-US/security/advisories/mfsa2024-13/#CVE-2024-0743
https://www.mozilla.org/en-US/security/advisories/mfsa2024-14/#CVE-2024-0743
https://www.mozilla.org/security/advisories/mfsa2024-01/
https://www.mozilla.org/security/advisories/mfsa2024-13/
https://www.mozilla.org/security/advisories/mfsa2024-14/
|
| libnss3 |
CVE-2024-6609 |
HIGH |
2:3.87.1-1 |
2:3.87.1-1+deb12u1 |
https://bugzilla.mozilla.org/show_bug.cgi?id=1839258
https://ubuntu.com/security/notices/USN-6890-1
https://www.cve.org/CVERecord?id=CVE-2024-6609
https://www.mozilla.org/en-US/security/advisories/mfsa2024-29/#CVE-2024-6609
https://www.mozilla.org/security/advisories/mfsa2024-29/
https://www.mozilla.org/security/advisories/mfsa2024-32/
|
| libnss3 |
CVE-2023-5388 |
MEDIUM |
2:3.87.1-1 |
|
https://access.redhat.com/errata/RHSA-2024:1494
https://access.redhat.com/security/cve/CVE-2023-5388
https://bugzilla.mozilla.org/show_bug.cgi?id=1780432
https://bugzilla.redhat.com/2243644
https://bugzilla.redhat.com/2260012
https://bugzilla.redhat.com/2268171
https://bugzilla.redhat.com/2270660
https://bugzilla.redhat.com/2270661
https://bugzilla.redhat.com/2270663
https://bugzilla.redhat.com/2270664
https://bugzilla.redhat.com/2270665
https://bugzilla.redhat.com/2270666
https://bugzilla.redhat.com/show_bug.cgi?id=2243644
https://bugzilla.redhat.com/show_bug.cgi?id=2260012
https://bugzilla.redhat.com/show_bug.cgi?id=2268171
https://bugzilla.redhat.com/show_bug.cgi?id=2270660
https://bugzilla.redhat.com/show_bug.cgi?id=2270661
https://bugzilla.redhat.com/show_bug.cgi?id=2270663
https://bugzilla.redhat.com/show_bug.cgi?id=2270664
https://bugzilla.redhat.com/show_bug.cgi?id=2270665
https://bugzilla.redhat.com/show_bug.cgi?id=2270666
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614
https://errata.almalinux.org/8/ALSA-2024-1494.html
https://errata.rockylinux.org/RLSA-2024:1494
https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_90_2.html
https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_98.html
https://linux.oracle.com/cve/CVE-2023-5388.html
https://linux.oracle.com/errata/ELSA-2024-1498.html
https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html
https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html
https://nvd.nist.gov/vuln/detail/CVE-2023-5388
https://people.redhat.com/~hkario/marvin/
https://ubuntu.com/security/notices/USN-6703-1
https://ubuntu.com/security/notices/USN-6717-1
https://ubuntu.com/security/notices/USN-6727-1
https://www.cve.org/CVERecord?id=CVE-2023-5388
https://www.mozilla.org/en-US/security/advisories/mfsa2024-13/#CVE-2023-5388
https://www.mozilla.org/en-US/security/advisories/mfsa2024-14/#CVE-2023-5388
https://www.mozilla.org/security/advisories/mfsa2024-12/
https://www.mozilla.org/security/advisories/mfsa2024-13/
https://www.mozilla.org/security/advisories/mfsa2024-14/
|
| libnss3 |
CVE-2023-6135 |
MEDIUM |
2:3.87.1-1 |
|
https://access.redhat.com/errata/RHSA-2024:0786
https://access.redhat.com/security/cve/CVE-2023-6135
https://bugzilla.mozilla.org/show_bug.cgi?id=1853908
https://bugzilla.redhat.com/2249906
https://bugzilla.redhat.com/show_bug.cgi?id=2249906
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6135
https://errata.almalinux.org/8/ALSA-2024-0786.html
https://errata.rockylinux.org/RLSA-2024:0786
https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_95.html
https://linux.oracle.com/cve/CVE-2023-6135.html
https://linux.oracle.com/errata/ELSA-2024-12337.html
https://minerva.crocs.fi.muni.cz/
https://nvd.nist.gov/vuln/detail/CVE-2023-6135
https://people.redhat.com/~hkario/marvin/
https://security.gentoo.org/glsa/202401-10
https://ubuntu.com/security/notices/USN-6562-1
https://ubuntu.com/security/notices/USN-6727-1
https://www.cve.org/CVERecord?id=CVE-2023-6135
https://www.mozilla.org/en-US/security/advisories/mfsa2023-56/#CVE-2023-6135
https://www.mozilla.org/security/advisories/mfsa2023-56/
|
| libnss3 |
CVE-2024-6602 |
MEDIUM |
2:3.87.1-1 |
2:3.87.1-1+deb12u1 |
https://access.redhat.com/security/cve/CVE-2024-6602
https://bugzilla.mozilla.org/show_bug.cgi?id=1895032
https://nvd.nist.gov/vuln/detail/CVE-2024-6602
https://ubuntu.com/security/notices/USN-6890-1
https://ubuntu.com/security/notices/USN-6903-1
https://www.cve.org/CVERecord?id=CVE-2024-6602
https://www.mozilla.org/en-US/security/advisories/mfsa2024-29/#CVE-2024-6602
https://www.mozilla.org/en-US/security/advisories/mfsa2024-30/#CVE-2024-6602
https://www.mozilla.org/en-US/security/advisories/mfsa2024-31/#CVE-2024-6602
https://www.mozilla.org/security/advisories/mfsa2024-29/
https://www.mozilla.org/security/advisories/mfsa2024-30/
https://www.mozilla.org/security/advisories/mfsa2024-31/
https://www.mozilla.org/security/advisories/mfsa2024-32/
|
| libnss3 |
CVE-2024-7531 |
MEDIUM |
2:3.87.1-1 |
|
https://access.redhat.com/security/cve/CVE-2024-7531
https://bugzilla.mozilla.org/show_bug.cgi?id=1905691
https://nvd.nist.gov/vuln/detail/CVE-2024-7531
https://ubuntu.com/security/notices/USN-6966-1
https://www.cve.org/CVERecord?id=CVE-2024-7531
https://www.mozilla.org/en-US/security/advisories/mfsa2024-33/#CVE-2024-7531
https://www.mozilla.org/en-US/security/advisories/mfsa2024-34/#CVE-2024-7531
https://www.mozilla.org/security/advisories/mfsa2024-33/
https://www.mozilla.org/security/advisories/mfsa2024-34/
https://www.mozilla.org/security/advisories/mfsa2024-35/
|
| libnss3 |
CVE-2017-11695 |
LOW |
2:3.87.1-1 |
|
http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html
http://seclists.org/fulldisclosure/2017/Aug/17
http://www.geeknik.net/9brdqk6xu
http://www.securityfocus.com/bid/100345
http://www.securitytracker.com/id/1039153
https://access.redhat.com/security/cve/CVE-2017-11695
https://nvd.nist.gov/vuln/detail/CVE-2017-11695
https://security.gentoo.org/glsa/202003-37
https://www.cve.org/CVERecord?id=CVE-2017-11695
|
| libnss3 |
CVE-2017-11696 |
LOW |
2:3.87.1-1 |
|
http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html
http://seclists.org/fulldisclosure/2017/Aug/17
http://www.geeknik.net/9brdqk6xu
http://www.securityfocus.com/bid/100345
http://www.securitytracker.com/id/1039153
https://access.redhat.com/security/cve/CVE-2017-11696
https://nvd.nist.gov/vuln/detail/CVE-2017-11696
https://security.gentoo.org/glsa/202003-37
https://www.cve.org/CVERecord?id=CVE-2017-11696
|
| libnss3 |
CVE-2017-11697 |
LOW |
2:3.87.1-1 |
|
http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html
http://seclists.org/fulldisclosure/2017/Aug/17
http://www.geeknik.net/9brdqk6xu
http://www.securityfocus.com/bid/100345
http://www.securitytracker.com/id/1039153
https://access.redhat.com/security/cve/CVE-2017-11697
https://nvd.nist.gov/vuln/detail/CVE-2017-11697
https://security.gentoo.org/glsa/202003-37
https://www.cve.org/CVERecord?id=CVE-2017-11697
|
| libnss3 |
CVE-2017-11698 |
LOW |
2:3.87.1-1 |
|
http://packetstormsecurity.com/files/143735/NSS-Buffer-Overflows-Floating-Point-Exception.html
http://seclists.org/fulldisclosure/2017/Aug/17
http://www.geeknik.net/9brdqk6xu
http://www.securityfocus.com/bid/100345
http://www.securitytracker.com/id/1039153
https://access.redhat.com/security/cve/CVE-2017-11698
https://nvd.nist.gov/vuln/detail/CVE-2017-11698
https://security.gentoo.org/glsa/202003-37
https://www.cve.org/CVERecord?id=CVE-2017-11698
|
| libopenjp2-7 |
CVE-2021-3575 |
HIGH |
2.5.0-2 |
2.5.0-2+deb12u1 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20845.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20847.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5727.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5785.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12973.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15389.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27814.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27823.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27824.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27842.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27843.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27845.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29338.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3575.json
https://access.redhat.com/security/cve/CVE-2021-3575
https://bugzilla.redhat.com/show_bug.cgi?id=1957616
https://errata.almalinux.org/8/ALSA-2021-4251.html
https://github.com/uclouvain/openjpeg/issues/1347
https://linux.oracle.com/cve/CVE-2021-3575.html
https://linux.oracle.com/errata/ELSA-2021-4251.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-3575
https://ubuntu.com/security/CVE-2021-3575
https://ubuntu.com/security/notices/USN-7083-1
https://www.cve.org/CVERecord?id=CVE-2021-3575
|
| libopenjp2-7 |
CVE-2023-39327 |
MEDIUM |
2.5.0-2 |
|
https://access.redhat.com/security/cve/CVE-2023-39327
https://bugzilla.redhat.com/show_bug.cgi?id=2295812
https://nvd.nist.gov/vuln/detail/CVE-2023-39327
https://ubuntu.com/security/notices/USN-7037-1
https://ubuntu.com/security/notices/USN-7623-1
https://www.cve.org/CVERecord?id=CVE-2023-39327
|
| libopenjp2-7 |
CVE-2023-39328 |
MEDIUM |
2.5.0-2 |
|
https://access.redhat.com/security/cve/CVE-2023-39328
https://bugzilla.redhat.com/show_bug.cgi?id=2219236
https://github.com/uclouvain/openjpeg/pull/1470
https://nvd.nist.gov/vuln/detail/CVE-2023-39328
https://www.cve.org/CVERecord?id=CVE-2023-39328
|
| libopenjp2-7 |
CVE-2023-39329 |
MEDIUM |
2.5.0-2 |
|
https://access.redhat.com/security/cve/CVE-2023-39329
https://bugzilla.redhat.com/show_bug.cgi?id=2295816
https://nvd.nist.gov/vuln/detail/CVE-2023-39329
https://www.cve.org/CVERecord?id=CVE-2023-39329
|
| libopenjp2-7 |
CVE-2024-56826 |
MEDIUM |
2.5.0-2 |
2.5.0-2+deb12u1 |
https://access.redhat.com/errata/RHSA-2025:7309
https://access.redhat.com/security/cve/CVE-2024-56826
https://bugzilla.redhat.com/2335172
https://bugzilla.redhat.com/2335174
https://bugzilla.redhat.com/show_bug.cgi?id=2335172
https://errata.almalinux.org/9/ALSA-2025-7309.html
https://github.com/uclouvain/openjpeg/commit/e492644fbded4c820ca55b5e50e598d346e850e8
https://github.com/uclouvain/openjpeg/issues/1563
https://linux.oracle.com/cve/CVE-2024-56826.html
https://linux.oracle.com/errata/ELSA-2025-7309.html
https://nvd.nist.gov/vuln/detail/CVE-2024-56826
https://ubuntu.com/security/notices/USN-7223-1
https://ubuntu.com/security/notices/USN-7623-1
https://www.cve.org/CVERecord?id=CVE-2024-56826
|
| libopenjp2-7 |
CVE-2024-56827 |
MEDIUM |
2.5.0-2 |
2.5.0-2+deb12u1 |
https://access.redhat.com/errata/RHSA-2025:7309
https://access.redhat.com/security/cve/CVE-2024-56827
https://bugzilla.redhat.com/2335172
https://bugzilla.redhat.com/2335174
https://bugzilla.redhat.com/show_bug.cgi?id=2335174
https://errata.almalinux.org/9/ALSA-2025-7309.html
https://github.com/uclouvain/openjpeg/commit/e492644fbded4c820ca55b5e50e598d346e850e8
https://github.com/uclouvain/openjpeg/issues/1564
https://linux.oracle.com/cve/CVE-2024-56827.html
https://linux.oracle.com/errata/ELSA-2025-7309.html
https://nvd.nist.gov/vuln/detail/CVE-2024-56827
https://ubuntu.com/security/notices/USN-7223-1
https://ubuntu.com/security/notices/USN-7623-1
https://www.cve.org/CVERecord?id=CVE-2024-56827
|
| libopenjp2-7 |
CVE-2025-50952 |
MEDIUM |
2.5.0-2 |
2.5.0-2+deb12u2 |
https://access.redhat.com/security/cve/CVE-2025-50952
https://github.com/sophmi/openjpeg/commit/329c3c321e7a90b9126a62d1031bde07d78f53e0
https://github.com/uclouvain/openjpeg/issues/1505
https://nvd.nist.gov/vuln/detail/CVE-2025-50952
https://ubuntu.com/security/notices/USN-7757-1
https://www.cve.org/CVERecord?id=CVE-2025-50952
|
| libopenjp2-7 |
CVE-2016-10505 |
LOW |
2.5.0-2 |
|
https://access.redhat.com/security/cve/CVE-2016-10505
https://github.com/uclouvain/openjpeg/issues/776
https://github.com/uclouvain/openjpeg/issues/784
https://github.com/uclouvain/openjpeg/issues/785
https://github.com/uclouvain/openjpeg/issues/792
https://nvd.nist.gov/vuln/detail/CVE-2016-10505
https://security.gentoo.org/glsa/201710-26
https://www.cve.org/CVERecord?id=CVE-2016-10505
|
| libopenjp2-7 |
CVE-2016-9113 |
LOW |
2.5.0-2 |
|
http://www.securityfocus.com/bid/93980
https://access.redhat.com/security/cve/CVE-2016-9113
https://github.com/Young-X/pocs/tree/master/OpenJPEG_POC
https://github.com/uclouvain/openjpeg/issues/856
https://nvd.nist.gov/vuln/detail/CVE-2016-9113
https://security.gentoo.org/glsa/201710-26
https://www.cve.org/CVERecord?id=CVE-2016-9113
|
| libopenjp2-7 |
CVE-2016-9114 |
LOW |
2.5.0-2 |
|
http://www.securityfocus.com/bid/93979
https://access.redhat.com/security/cve/CVE-2016-9114
https://github.com/Young-X/pocs/tree/master/OpenJPEG_POC
https://github.com/uclouvain/openjpeg/issues/857
https://nvd.nist.gov/vuln/detail/CVE-2016-9114
https://security.gentoo.org/glsa/201710-26
https://www.cve.org/CVERecord?id=CVE-2016-9114
|
| libopenjp2-7 |
CVE-2016-9115 |
LOW |
2.5.0-2 |
|
http://www.securityfocus.com/bid/93977
https://access.redhat.com/security/cve/CVE-2016-9115
https://bugs.gentoo.org/628418
https://github.com/Young-X/pocs/tree/master/OpenJPEG_POC
https://github.com/uclouvain/openjpeg/issues/858
https://nvd.nist.gov/vuln/detail/CVE-2016-9115
https://security.gentoo.org/glsa/201710-26
https://www.cve.org/CVERecord?id=CVE-2016-9115
|
| libopenjp2-7 |
CVE-2016-9116 |
LOW |
2.5.0-2 |
|
http://www.securityfocus.com/bid/93975
https://access.redhat.com/security/cve/CVE-2016-9116
https://github.com/Young-X/pocs/tree/master/OpenJPEG_POC
https://github.com/uclouvain/openjpeg/issues/859
https://nvd.nist.gov/vuln/detail/CVE-2016-9116
https://security.gentoo.org/glsa/201710-26
https://www.cve.org/CVERecord?id=CVE-2016-9116
|
| libopenjp2-7 |
CVE-2016-9117 |
LOW |
2.5.0-2 |
|
http://www.securityfocus.com/bid/93783
https://access.redhat.com/security/cve/CVE-2016-9117
https://github.com/Young-X/pocs/tree/master/OpenJPEG_POC
https://github.com/uclouvain/openjpeg/issues/860
https://nvd.nist.gov/vuln/detail/CVE-2016-9117
https://security.gentoo.org/glsa/201710-26
https://www.cve.org/CVERecord?id=CVE-2016-9117
|
| libopenjp2-7 |
CVE-2016-9580 |
LOW |
2.5.0-2 |
|
http://www.securityfocus.com/bid/94822
https://access.redhat.com/security/cve/CVE-2016-9580
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9580
https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255
https://github.com/uclouvain/openjpeg/issues/871
https://nvd.nist.gov/vuln/detail/CVE-2016-9580
https://security.gentoo.org/glsa/201710-26
https://www.cve.org/CVERecord?id=CVE-2016-9580
|
| libopenjp2-7 |
CVE-2016-9581 |
LOW |
2.5.0-2 |
|
http://www.securityfocus.com/bid/94822
https://access.redhat.com/security/cve/CVE-2016-9581
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9581
https://github.com/szukw000/openjpeg/commit/cadff5fb6e73398de26a92e96d3d7cac893af255
https://github.com/uclouvain/openjpeg/issues/872
https://nvd.nist.gov/vuln/detail/CVE-2016-9581
https://security.gentoo.org/glsa/201710-26
https://www.cve.org/CVERecord?id=CVE-2016-9581
|
| libopenjp2-7 |
CVE-2018-16376 |
LOW |
2.5.0-2 |
|
http://www.securityfocus.com/bid/105262
https://access.redhat.com/security/cve/CVE-2018-16376
https://github.com/uclouvain/openjpeg/issues/1127
https://nvd.nist.gov/vuln/detail/CVE-2018-16376
https://www.cve.org/CVERecord?id=CVE-2018-16376
|
| libopenjp2-7 |
CVE-2019-6988 |
LOW |
2.5.0-2 |
|
http://www.securityfocus.com/bid/106785
https://access.redhat.com/security/cve/CVE-2019-6988
https://github.com/uclouvain/openjpeg/issues/1178
https://github.com/uclouvain/openjpeg/issues/1178#issuecomment-1789970548
https://nvd.nist.gov/vuln/detail/CVE-2019-6988
https://www.cve.org/CVERecord?id=CVE-2019-6988
|
| liborc-0.4-0 |
CVE-2024-40897 |
MEDIUM |
1:0.4.33-2 |
|
http://www.openwall.com/lists/oss-security/2024/07/26/1
https://access.redhat.com/errata/RHSA-2024:5306
https://access.redhat.com/security/cve/CVE-2024-40897
https://bugzilla.redhat.com/2300010
https://bugzilla.redhat.com/show_bug.cgi?id=2300010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40897
https://errata.almalinux.org/8/ALSA-2024-5306.html
https://errata.rockylinux.org/RLSA-2024:5306
https://github.com/GStreamer/orc
https://gstreamer.freedesktop.org/modules/orc.html
https://gstreamer.freedesktop.org/security/sa-2024-0003.html
https://jvn.jp/en/jp/JVN02030803/
https://linux.oracle.com/cve/CVE-2024-40897.html
https://linux.oracle.com/errata/ELSA-2024-6184.html
https://nvd.nist.gov/vuln/detail/CVE-2024-40897
https://ubuntu.com/security/notices/USN-6964-1
https://ubuntu.com/security/notices/USN-6964-2
https://www.cve.org/CVERecord?id=CVE-2024-40897
|
| libpam-modules |
CVE-2025-6020 |
HIGH |
1.5.2-6+deb12u1 |
|
http://www.openwall.com/lists/oss-security/2025/06/17/1
https://access.redhat.com/errata/RHSA-2025:10024
https://access.redhat.com/errata/RHSA-2025:10027
https://access.redhat.com/errata/RHSA-2025:10180
https://access.redhat.com/errata/RHSA-2025:10354
https://access.redhat.com/errata/RHSA-2025:10357
https://access.redhat.com/errata/RHSA-2025:10358
https://access.redhat.com/errata/RHSA-2025:10359
https://access.redhat.com/errata/RHSA-2025:10361
https://access.redhat.com/errata/RHSA-2025:10362
https://access.redhat.com/errata/RHSA-2025:10735
https://access.redhat.com/errata/RHSA-2025:10823
https://access.redhat.com/errata/RHSA-2025:11386
https://access.redhat.com/errata/RHSA-2025:11487
https://access.redhat.com/errata/RHSA-2025:14557
https://access.redhat.com/errata/RHSA-2025:15099
https://access.redhat.com/errata/RHSA-2025:15709
https://access.redhat.com/errata/RHSA-2025:15827
https://access.redhat.com/errata/RHSA-2025:15828
https://access.redhat.com/errata/RHSA-2025:16524
https://access.redhat.com/errata/RHSA-2025:9526
https://access.redhat.com/security/cve/CVE-2025-6020
https://bugzilla.redhat.com/2372512
https://bugzilla.redhat.com/show_bug.cgi?id=2372512
https://bugzilla.redhat.com/show_bug.cgi?id=2388220
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8941
https://errata.almalinux.org/8/ALSA-2025-14557.html
https://errata.rockylinux.org/RLSA-2025:14557
https://linux.oracle.com/cve/CVE-2025-6020.html
https://linux.oracle.com/errata/ELSA-2025-9526.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6020
https://ubuntu.com/security/notices/USN-7580-1
https://www.cve.org/CVERecord?id=CVE-2025-6020
https://www.openwall.com/lists/oss-security/2025/06/17/1
|
| libpam-modules |
CVE-2024-10041 |
MEDIUM |
1.5.2-6+deb12u1 |
|
https://access.redhat.com/errata/RHSA-2024:10379
https://access.redhat.com/errata/RHSA-2024:11250
https://access.redhat.com/errata/RHSA-2024:9941
https://access.redhat.com/security/cve/CVE-2024-10041
https://bugzilla.redhat.com/2319212
https://bugzilla.redhat.com/2324291
https://bugzilla.redhat.com/show_bug.cgi?id=2319212
https://bugzilla.redhat.com/show_bug.cgi?id=2324291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10041
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10963
https://errata.almalinux.org/8/ALSA-2024-10379.html
https://errata.rockylinux.org/RLSA-2024:10379
https://linux.oracle.com/cve/CVE-2024-10041.html
https://linux.oracle.com/errata/ELSA-2024-11250.html
https://nvd.nist.gov/vuln/detail/CVE-2024-10041
https://www.cve.org/CVERecord?id=CVE-2024-10041
|
| libpam-modules |
CVE-2024-22365 |
MEDIUM |
1.5.2-6+deb12u1 |
|
http://www.openwall.com/lists/oss-security/2024/01/18/3
https://access.redhat.com/errata/RHSA-2024:3163
https://access.redhat.com/security/cve/CVE-2024-22365
https://bugzilla.redhat.com/2257722
https://bugzilla.redhat.com/show_bug.cgi?id=2257722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22365
https://errata.almalinux.org/8/ALSA-2024-3163.html
https://errata.rockylinux.org/RLSA-2024:3163
https://github.com/linux-pam/linux-pam
https://github.com/linux-pam/linux-pam/commit/031bb5a5d0d950253b68138b498dc93be69a64cb
https://github.com/linux-pam/linux-pam/releases/tag/v1.6.0
https://linux.oracle.com/cve/CVE-2024-22365.html
https://linux.oracle.com/errata/ELSA-2024-3163.html
https://nvd.nist.gov/vuln/detail/CVE-2024-22365
https://ubuntu.com/security/notices/USN-6588-1
https://ubuntu.com/security/notices/USN-6588-2
https://www.cve.org/CVERecord?id=CVE-2024-22365
https://www.openwall.com/lists/oss-security/2024/01/18/3
|
| libpam-modules-bin |
CVE-2025-6020 |
HIGH |
1.5.2-6+deb12u1 |
|
http://www.openwall.com/lists/oss-security/2025/06/17/1
https://access.redhat.com/errata/RHSA-2025:10024
https://access.redhat.com/errata/RHSA-2025:10027
https://access.redhat.com/errata/RHSA-2025:10180
https://access.redhat.com/errata/RHSA-2025:10354
https://access.redhat.com/errata/RHSA-2025:10357
https://access.redhat.com/errata/RHSA-2025:10358
https://access.redhat.com/errata/RHSA-2025:10359
https://access.redhat.com/errata/RHSA-2025:10361
https://access.redhat.com/errata/RHSA-2025:10362
https://access.redhat.com/errata/RHSA-2025:10735
https://access.redhat.com/errata/RHSA-2025:10823
https://access.redhat.com/errata/RHSA-2025:11386
https://access.redhat.com/errata/RHSA-2025:11487
https://access.redhat.com/errata/RHSA-2025:14557
https://access.redhat.com/errata/RHSA-2025:15099
https://access.redhat.com/errata/RHSA-2025:15709
https://access.redhat.com/errata/RHSA-2025:15827
https://access.redhat.com/errata/RHSA-2025:15828
https://access.redhat.com/errata/RHSA-2025:16524
https://access.redhat.com/errata/RHSA-2025:9526
https://access.redhat.com/security/cve/CVE-2025-6020
https://bugzilla.redhat.com/2372512
https://bugzilla.redhat.com/show_bug.cgi?id=2372512
https://bugzilla.redhat.com/show_bug.cgi?id=2388220
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8941
https://errata.almalinux.org/8/ALSA-2025-14557.html
https://errata.rockylinux.org/RLSA-2025:14557
https://linux.oracle.com/cve/CVE-2025-6020.html
https://linux.oracle.com/errata/ELSA-2025-9526.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6020
https://ubuntu.com/security/notices/USN-7580-1
https://www.cve.org/CVERecord?id=CVE-2025-6020
https://www.openwall.com/lists/oss-security/2025/06/17/1
|
| libpam-modules-bin |
CVE-2024-10041 |
MEDIUM |
1.5.2-6+deb12u1 |
|
https://access.redhat.com/errata/RHSA-2024:10379
https://access.redhat.com/errata/RHSA-2024:11250
https://access.redhat.com/errata/RHSA-2024:9941
https://access.redhat.com/security/cve/CVE-2024-10041
https://bugzilla.redhat.com/2319212
https://bugzilla.redhat.com/2324291
https://bugzilla.redhat.com/show_bug.cgi?id=2319212
https://bugzilla.redhat.com/show_bug.cgi?id=2324291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10041
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10963
https://errata.almalinux.org/8/ALSA-2024-10379.html
https://errata.rockylinux.org/RLSA-2024:10379
https://linux.oracle.com/cve/CVE-2024-10041.html
https://linux.oracle.com/errata/ELSA-2024-11250.html
https://nvd.nist.gov/vuln/detail/CVE-2024-10041
https://www.cve.org/CVERecord?id=CVE-2024-10041
|
| libpam-modules-bin |
CVE-2024-22365 |
MEDIUM |
1.5.2-6+deb12u1 |
|
http://www.openwall.com/lists/oss-security/2024/01/18/3
https://access.redhat.com/errata/RHSA-2024:3163
https://access.redhat.com/security/cve/CVE-2024-22365
https://bugzilla.redhat.com/2257722
https://bugzilla.redhat.com/show_bug.cgi?id=2257722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22365
https://errata.almalinux.org/8/ALSA-2024-3163.html
https://errata.rockylinux.org/RLSA-2024:3163
https://github.com/linux-pam/linux-pam
https://github.com/linux-pam/linux-pam/commit/031bb5a5d0d950253b68138b498dc93be69a64cb
https://github.com/linux-pam/linux-pam/releases/tag/v1.6.0
https://linux.oracle.com/cve/CVE-2024-22365.html
https://linux.oracle.com/errata/ELSA-2024-3163.html
https://nvd.nist.gov/vuln/detail/CVE-2024-22365
https://ubuntu.com/security/notices/USN-6588-1
https://ubuntu.com/security/notices/USN-6588-2
https://www.cve.org/CVERecord?id=CVE-2024-22365
https://www.openwall.com/lists/oss-security/2024/01/18/3
|
| libpam-runtime |
CVE-2025-6020 |
HIGH |
1.5.2-6+deb12u1 |
|
http://www.openwall.com/lists/oss-security/2025/06/17/1
https://access.redhat.com/errata/RHSA-2025:10024
https://access.redhat.com/errata/RHSA-2025:10027
https://access.redhat.com/errata/RHSA-2025:10180
https://access.redhat.com/errata/RHSA-2025:10354
https://access.redhat.com/errata/RHSA-2025:10357
https://access.redhat.com/errata/RHSA-2025:10358
https://access.redhat.com/errata/RHSA-2025:10359
https://access.redhat.com/errata/RHSA-2025:10361
https://access.redhat.com/errata/RHSA-2025:10362
https://access.redhat.com/errata/RHSA-2025:10735
https://access.redhat.com/errata/RHSA-2025:10823
https://access.redhat.com/errata/RHSA-2025:11386
https://access.redhat.com/errata/RHSA-2025:11487
https://access.redhat.com/errata/RHSA-2025:14557
https://access.redhat.com/errata/RHSA-2025:15099
https://access.redhat.com/errata/RHSA-2025:15709
https://access.redhat.com/errata/RHSA-2025:15827
https://access.redhat.com/errata/RHSA-2025:15828
https://access.redhat.com/errata/RHSA-2025:16524
https://access.redhat.com/errata/RHSA-2025:9526
https://access.redhat.com/security/cve/CVE-2025-6020
https://bugzilla.redhat.com/2372512
https://bugzilla.redhat.com/show_bug.cgi?id=2372512
https://bugzilla.redhat.com/show_bug.cgi?id=2388220
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8941
https://errata.almalinux.org/8/ALSA-2025-14557.html
https://errata.rockylinux.org/RLSA-2025:14557
https://linux.oracle.com/cve/CVE-2025-6020.html
https://linux.oracle.com/errata/ELSA-2025-9526.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6020
https://ubuntu.com/security/notices/USN-7580-1
https://www.cve.org/CVERecord?id=CVE-2025-6020
https://www.openwall.com/lists/oss-security/2025/06/17/1
|
| libpam-runtime |
CVE-2024-10041 |
MEDIUM |
1.5.2-6+deb12u1 |
|
https://access.redhat.com/errata/RHSA-2024:10379
https://access.redhat.com/errata/RHSA-2024:11250
https://access.redhat.com/errata/RHSA-2024:9941
https://access.redhat.com/security/cve/CVE-2024-10041
https://bugzilla.redhat.com/2319212
https://bugzilla.redhat.com/2324291
https://bugzilla.redhat.com/show_bug.cgi?id=2319212
https://bugzilla.redhat.com/show_bug.cgi?id=2324291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10041
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10963
https://errata.almalinux.org/8/ALSA-2024-10379.html
https://errata.rockylinux.org/RLSA-2024:10379
https://linux.oracle.com/cve/CVE-2024-10041.html
https://linux.oracle.com/errata/ELSA-2024-11250.html
https://nvd.nist.gov/vuln/detail/CVE-2024-10041
https://www.cve.org/CVERecord?id=CVE-2024-10041
|
| libpam-runtime |
CVE-2024-22365 |
MEDIUM |
1.5.2-6+deb12u1 |
|
http://www.openwall.com/lists/oss-security/2024/01/18/3
https://access.redhat.com/errata/RHSA-2024:3163
https://access.redhat.com/security/cve/CVE-2024-22365
https://bugzilla.redhat.com/2257722
https://bugzilla.redhat.com/show_bug.cgi?id=2257722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22365
https://errata.almalinux.org/8/ALSA-2024-3163.html
https://errata.rockylinux.org/RLSA-2024:3163
https://github.com/linux-pam/linux-pam
https://github.com/linux-pam/linux-pam/commit/031bb5a5d0d950253b68138b498dc93be69a64cb
https://github.com/linux-pam/linux-pam/releases/tag/v1.6.0
https://linux.oracle.com/cve/CVE-2024-22365.html
https://linux.oracle.com/errata/ELSA-2024-3163.html
https://nvd.nist.gov/vuln/detail/CVE-2024-22365
https://ubuntu.com/security/notices/USN-6588-1
https://ubuntu.com/security/notices/USN-6588-2
https://www.cve.org/CVERecord?id=CVE-2024-22365
https://www.openwall.com/lists/oss-security/2024/01/18/3
|
| libpam-systemd |
CVE-2023-50387 |
HIGH |
252.22-1~deb12u1 |
252.23-1~deb12u1 |
http://www.openwall.com/lists/oss-security/2024/02/16/2
http://www.openwall.com/lists/oss-security/2024/02/16/3
https://access.redhat.com/errata/RHSA-2024:3271
https://access.redhat.com/security/cve/CVE-2023-50387
https://blog.powerdns.com/2024/02/13/powerdns-recursor-4-8-6-4-9-3-5-0-2-released
https://bugzilla.redhat.com/2263896
https://bugzilla.redhat.com/2263914
https://bugzilla.redhat.com/2263917
https://bugzilla.redhat.com/show_bug.cgi?id=2263896
https://bugzilla.redhat.com/show_bug.cgi?id=2263897
https://bugzilla.redhat.com/show_bug.cgi?id=2263909
https://bugzilla.redhat.com/show_bug.cgi?id=2263911
https://bugzilla.redhat.com/show_bug.cgi?id=2263914
https://bugzilla.redhat.com/show_bug.cgi?id=2263917
https://bugzilla.suse.com/show_bug.cgi?id=1219823
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6516
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html
https://errata.almalinux.org/8/ALSA-2024-3271.html
https://errata.rockylinux.org/RLSA-2024:2551
https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1
https://kb.isc.org/docs/cve-2023-50387
https://linux.oracle.com/cve/CVE-2023-50387.html
https://linux.oracle.com/errata/ELSA-2024-3741.html
https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html
https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/
https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-50387
https://news.ycombinator.com/item?id=39367411
https://news.ycombinator.com/item?id=39372384
https://nlnetlabs.nl/downloads/unbound/CVE-2023-50387_CVE-2023-50868.txt
https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/
https://nvd.nist.gov/vuln/detail/CVE-2023-50387
https://security.netapp.com/advisory/ntap-20240307-0007/
https://ubuntu.com/security/notices/USN-6633-1
https://ubuntu.com/security/notices/USN-6642-1
https://ubuntu.com/security/notices/USN-6657-1
https://ubuntu.com/security/notices/USN-6657-2
https://ubuntu.com/security/notices/USN-6665-1
https://ubuntu.com/security/notices/USN-6723-1
https://www.athene-center.de/aktuelles/key-trap
https://www.athene-center.de/fileadmin/content/PDF/Technical_Report_KeyTrap.pdf
https://www.cve.org/CVERecord?id=CVE-2023-50387
https://www.isc.org/blogs/2024-bind-security-release/
https://www.knot-resolver.cz/2024-02-13-knot-resolver-5.7.1.html
https://www.securityweek.com/keytrap-dns-attack-could-disable-large-parts-of-internet-researchers/
https://www.theregister.com/2024/02/13/dnssec_vulnerability_internet/
|
| libpam-systemd |
CVE-2023-50868 |
HIGH |
252.22-1~deb12u1 |
252.23-1~deb12u1 |
http://www.openwall.com/lists/oss-security/2024/02/16/2
http://www.openwall.com/lists/oss-security/2024/02/16/3
https://access.redhat.com/errata/RHSA-2024:3271
https://access.redhat.com/security/cve/CVE-2023-50868
https://blog.powerdns.com/2024/02/13/powerdns-recursor-4-8-6-4-9-3-5-0-2-released
https://bugzilla.redhat.com/2263896
https://bugzilla.redhat.com/2263914
https://bugzilla.redhat.com/2263917
https://bugzilla.redhat.com/show_bug.cgi?id=2263896
https://bugzilla.redhat.com/show_bug.cgi?id=2263897
https://bugzilla.redhat.com/show_bug.cgi?id=2263909
https://bugzilla.redhat.com/show_bug.cgi?id=2263911
https://bugzilla.redhat.com/show_bug.cgi?id=2263914
https://bugzilla.redhat.com/show_bug.cgi?id=2263917
https://bugzilla.suse.com/show_bug.cgi?id=1219826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6516
https://datatracker.ietf.org/doc/html/rfc5155
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html
https://errata.almalinux.org/8/ALSA-2024-3271.html
https://errata.rockylinux.org/RLSA-2024:2551
https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1
https://kb.isc.org/docs/cve-2023-50868
https://linux.oracle.com/cve/CVE-2023-50868.html
https://linux.oracle.com/errata/ELSA-2024-3741.html
https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html
https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/
https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html
https://nlnetlabs.nl/downloads/unbound/CVE-2023-50387_CVE-2023-50868.txt
https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/
https://nvd.nist.gov/vuln/detail/CVE-2023-50868
https://security.netapp.com/advisory/ntap-20240307-0008/
https://ubuntu.com/security/notices/USN-6633-1
https://ubuntu.com/security/notices/USN-6642-1
https://ubuntu.com/security/notices/USN-6657-1
https://ubuntu.com/security/notices/USN-6657-2
https://ubuntu.com/security/notices/USN-6665-1
https://ubuntu.com/security/notices/USN-6723-1
https://www.cve.org/CVERecord?id=CVE-2023-50868
https://www.isc.org/blogs/2024-bind-security-release/
https://www.knot-resolver.cz/2024-02-13-knot-resolver-5.7.1.html
|
| libpam-systemd |
CVE-2025-4598 |
MEDIUM |
252.22-1~deb12u1 |
252.38-1~deb12u1 |
http://www.openwall.com/lists/oss-security/2025/06/05/1
http://www.openwall.com/lists/oss-security/2025/06/05/3
https://access.redhat.com/security/cve/CVE-2025-4598
https://blogs.oracle.com/linux/post/analysis-of-cve-2025-4598
https://bugzilla.redhat.com/show_bug.cgi?id=2369242
https://ciq.com/blog/the-real-danger-of-systemd-coredump-cve-2025-4598/
https://git.kernel.org/linus/b5325b2a270fcaf7b2a9a0f23d422ca8a5a8bdea
https://github.com/systemd/systemd/commit/0c49e0049b7665bb7769a13ef346fef92e1ad4d6 (main)
https://github.com/systemd/systemd/commit/13902e025321242b1d95c6d8b4e482b37f58cdef (main)
https://github.com/systemd/systemd/commit/49f1f2d4a7612bbed5211a73d11d6a94fbe3bb69 (main)
https://github.com/systemd/systemd/commit/76e0ab49c47965877c19772a2b3bf55f6417ca39 (main)
https://github.com/systemd/systemd/commit/868d95577ec9f862580ad365726515459be582fc (main)
https://github.com/systemd/systemd/commit/8fc7b2a211eb13ef1a94250b28e1c79cab8bdcb9 (main)
https://github.com/systemd/systemd/commit/9ce8e3e449def92c75ada41b7d10c5bc3946be77 (main)
https://github.com/systemd/systemd/commit/e6a8687b939ab21854f12f59a3cce703e32768cf (main)
https://linux.oracle.com/cve/CVE-2025-4598.html
https://linux.oracle.com/errata/ELSA-2025-20344.html
https://nvd.nist.gov/vuln/detail/CVE-2025-4598
https://ubuntu.com/security/notices/USN-7559-1
https://www.cve.org/CVERecord?id=CVE-2025-4598
https://www.openwall.com/lists/oss-security/2025/05/29/3
https://www.openwall.com/lists/oss-security/2025/08/18/3
https://www.qualys.com/2025/05/29/apport-coredump/apport-coredump.txt
|
| libpam-systemd |
CVE-2013-4392 |
LOW |
252.22-1~deb12u1 |
|
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
https://nvd.nist.gov/vuln/detail/CVE-2013-4392
https://www.cve.org/CVERecord?id=CVE-2013-4392
|
| libpam-systemd |
CVE-2023-31437 |
LOW |
252.22-1~deb12u1 |
|
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/releases
|
| libpam-systemd |
CVE-2023-31438 |
LOW |
252.22-1~deb12u1 |
|
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/pull/28886
https://github.com/systemd/systemd/releases
|
| libpam-systemd |
CVE-2023-31439 |
LOW |
252.22-1~deb12u1 |
|
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/pull/28885
https://github.com/systemd/systemd/releases
|
| libpam0g |
CVE-2025-6020 |
HIGH |
1.5.2-6+deb12u1 |
|
http://www.openwall.com/lists/oss-security/2025/06/17/1
https://access.redhat.com/errata/RHSA-2025:10024
https://access.redhat.com/errata/RHSA-2025:10027
https://access.redhat.com/errata/RHSA-2025:10180
https://access.redhat.com/errata/RHSA-2025:10354
https://access.redhat.com/errata/RHSA-2025:10357
https://access.redhat.com/errata/RHSA-2025:10358
https://access.redhat.com/errata/RHSA-2025:10359
https://access.redhat.com/errata/RHSA-2025:10361
https://access.redhat.com/errata/RHSA-2025:10362
https://access.redhat.com/errata/RHSA-2025:10735
https://access.redhat.com/errata/RHSA-2025:10823
https://access.redhat.com/errata/RHSA-2025:11386
https://access.redhat.com/errata/RHSA-2025:11487
https://access.redhat.com/errata/RHSA-2025:14557
https://access.redhat.com/errata/RHSA-2025:15099
https://access.redhat.com/errata/RHSA-2025:15709
https://access.redhat.com/errata/RHSA-2025:15827
https://access.redhat.com/errata/RHSA-2025:15828
https://access.redhat.com/errata/RHSA-2025:16524
https://access.redhat.com/errata/RHSA-2025:9526
https://access.redhat.com/security/cve/CVE-2025-6020
https://bugzilla.redhat.com/2372512
https://bugzilla.redhat.com/show_bug.cgi?id=2372512
https://bugzilla.redhat.com/show_bug.cgi?id=2388220
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6020
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8941
https://errata.almalinux.org/8/ALSA-2025-14557.html
https://errata.rockylinux.org/RLSA-2025:14557
https://linux.oracle.com/cve/CVE-2025-6020.html
https://linux.oracle.com/errata/ELSA-2025-9526.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6020
https://ubuntu.com/security/notices/USN-7580-1
https://www.cve.org/CVERecord?id=CVE-2025-6020
https://www.openwall.com/lists/oss-security/2025/06/17/1
|
| libpam0g |
CVE-2024-10041 |
MEDIUM |
1.5.2-6+deb12u1 |
|
https://access.redhat.com/errata/RHSA-2024:10379
https://access.redhat.com/errata/RHSA-2024:11250
https://access.redhat.com/errata/RHSA-2024:9941
https://access.redhat.com/security/cve/CVE-2024-10041
https://bugzilla.redhat.com/2319212
https://bugzilla.redhat.com/2324291
https://bugzilla.redhat.com/show_bug.cgi?id=2319212
https://bugzilla.redhat.com/show_bug.cgi?id=2324291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10041
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10963
https://errata.almalinux.org/8/ALSA-2024-10379.html
https://errata.rockylinux.org/RLSA-2024:10379
https://linux.oracle.com/cve/CVE-2024-10041.html
https://linux.oracle.com/errata/ELSA-2024-11250.html
https://nvd.nist.gov/vuln/detail/CVE-2024-10041
https://www.cve.org/CVERecord?id=CVE-2024-10041
|
| libpam0g |
CVE-2024-22365 |
MEDIUM |
1.5.2-6+deb12u1 |
|
http://www.openwall.com/lists/oss-security/2024/01/18/3
https://access.redhat.com/errata/RHSA-2024:3163
https://access.redhat.com/security/cve/CVE-2024-22365
https://bugzilla.redhat.com/2257722
https://bugzilla.redhat.com/show_bug.cgi?id=2257722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22365
https://errata.almalinux.org/8/ALSA-2024-3163.html
https://errata.rockylinux.org/RLSA-2024:3163
https://github.com/linux-pam/linux-pam
https://github.com/linux-pam/linux-pam/commit/031bb5a5d0d950253b68138b498dc93be69a64cb
https://github.com/linux-pam/linux-pam/releases/tag/v1.6.0
https://linux.oracle.com/cve/CVE-2024-22365.html
https://linux.oracle.com/errata/ELSA-2024-3163.html
https://nvd.nist.gov/vuln/detail/CVE-2024-22365
https://ubuntu.com/security/notices/USN-6588-1
https://ubuntu.com/security/notices/USN-6588-2
https://www.cve.org/CVERecord?id=CVE-2024-22365
https://www.openwall.com/lists/oss-security/2024/01/18/3
|
| libperl5.36 |
CVE-2023-31484 |
HIGH |
5.36.0-7+deb12u1 |
5.36.0-7+deb12u3 |
http://www.openwall.com/lists/oss-security/2023/04/29/1
http://www.openwall.com/lists/oss-security/2023/05/03/3
http://www.openwall.com/lists/oss-security/2023/05/03/5
http://www.openwall.com/lists/oss-security/2023/05/07/2
https://access.redhat.com/errata/RHSA-2024:3094
https://access.redhat.com/security/cve/CVE-2023-31484
https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/
https://bugzilla.redhat.com/2218667
https://bugzilla.redhat.com/show_bug.cgi?id=2218667
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31484
https://errata.almalinux.org/8/ALSA-2024-3094.html
https://errata.rockylinux.org/RLSA-2023:6539
https://github.com/andk/cpanpm/commit/9c98370287f4e709924aee7c58ef21c85289a7f0 (2.35-TRIAL)
https://github.com/andk/cpanpm/pull/175
https://linux.oracle.com/cve/CVE-2023-31484.html
https://linux.oracle.com/errata/ELSA-2024-3094.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BM6UW55CNFUTNGD5ZRKGUKKKFDJGMFHL/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LEGCEOKFJVBJ2QQ6S2H4NAEWTUERC7SB/
https://metacpan.org/dist/CPAN/changes
https://nvd.nist.gov/vuln/detail/CVE-2023-31484
https://security.netapp.com/advisory/ntap-20240621-0007/
https://ubuntu.com/security/notices/USN-6112-1
https://ubuntu.com/security/notices/USN-6112-2
https://www.cve.org/CVERecord?id=CVE-2023-31484
https://www.openwall.com/lists/oss-security/2023/04/18/14
|
| libperl5.36 |
CVE-2024-56406 |
HIGH |
5.36.0-7+deb12u1 |
5.36.0-7+deb12u2 |
http://www.openwall.com/lists/oss-security/2025/04/13/3
http://www.openwall.com/lists/oss-security/2025/04/13/4
http://www.openwall.com/lists/oss-security/2025/04/13/5
https://access.redhat.com/errata/RHSA-2025:7500
https://access.redhat.com/security/cve/CVE-2024-56406
https://bugzilla.redhat.com/2359290
https://bugzilla.redhat.com/show_bug.cgi?id=2359290
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56406
https://errata.almalinux.org/10/ALSA-2025-7500.html
https://errata.rockylinux.org/RLSA-2025:7500
https://github.com/Perl/perl5/commit/87f42aa0e0096e9a346c9672aa3a0bd3bef8c1dd.patch
https://linux.oracle.com/cve/CVE-2024-56406.html
https://linux.oracle.com/errata/ELSA-2025-7500.html
https://metacpan.org/release/SHAY/perl-5.38.4/changes
https://metacpan.org/release/SHAY/perl-5.40.2/changes
https://nvd.nist.gov/vuln/detail/CVE-2024-56406
https://ubuntu.com/security/notices/USN-7434-1
https://ubuntu.com/security/notices/USN-7434-2
https://www.cve.org/CVERecord?id=CVE-2024-56406
|
| libperl5.36 |
CVE-2025-40909 |
MEDIUM |
5.36.0-7+deb12u1 |
5.36.0-7+deb12u3 |
http://www.openwall.com/lists/oss-security/2025/05/23/1
http://www.openwall.com/lists/oss-security/2025/05/30/4
http://www.openwall.com/lists/oss-security/2025/06/02/2
http://www.openwall.com/lists/oss-security/2025/06/02/5
http://www.openwall.com/lists/oss-security/2025/06/02/6
http://www.openwall.com/lists/oss-security/2025/06/02/7
http://www.openwall.com/lists/oss-security/2025/06/03/1
https://access.redhat.com/errata/RHSA-2025:11805
https://access.redhat.com/security/cve/CVE-2025-40909
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226
https://bugzilla.redhat.com/2369407
https://bugzilla.redhat.com/show_bug.cgi?id=2369407
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40909
https://errata.almalinux.org/8/ALSA-2025-11805.html
https://errata.rockylinux.org/RLSA-2025:11805
https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e
https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch
https://github.com/Perl/perl5/issues/10387
https://github.com/Perl/perl5/issues/23010
https://linux.oracle.com/cve/CVE-2025-40909.html
https://linux.oracle.com/errata/ELSA-2025-12056.html
https://lists.security.metacpan.org/cve-announce/msg/30017499/
https://nvd.nist.gov/vuln/detail/CVE-2025-40909
https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads
https://ubuntu.com/security/notices/USN-7678-1
https://www.cve.org/CVERecord?id=CVE-2025-40909
https://www.openwall.com/lists/oss-security/2025/05/22/2
|
| libperl5.36 |
CVE-2011-4116 |
LOW |
5.36.0-7+deb12u1 |
|
http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://access.redhat.com/security/cve/CVE-2011-4116
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://nvd.nist.gov/vuln/detail/CVE-2011-4116
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
https://www.cve.org/CVERecord?id=CVE-2011-4116
|
| libperl5.36 |
CVE-2023-31486 |
LOW |
5.36.0-7+deb12u1 |
|
http://www.openwall.com/lists/oss-security/2023/04/29/1
http://www.openwall.com/lists/oss-security/2023/05/03/3
http://www.openwall.com/lists/oss-security/2023/05/03/5
http://www.openwall.com/lists/oss-security/2023/05/07/2
https://access.redhat.com/errata/RHSA-2023:7174
https://access.redhat.com/security/cve/CVE-2023-31486
https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/
https://bugzilla.redhat.com/2228392
https://errata.almalinux.org/8/ALSA-2023-7174.html
https://github.com/chansen/p5-http-tiny/pull/153
https://hackeriet.github.io/cpan-http-tiny-overview/
https://linux.oracle.com/cve/CVE-2023-31486.html
https://linux.oracle.com/errata/ELSA-2023-7174.html
https://nvd.nist.gov/vuln/detail/CVE-2023-31486
https://security.netapp.com/advisory/ntap-20241129-0011/
https://www.cve.org/CVERecord?id=CVE-2023-31486
https://www.openwall.com/lists/oss-security/2023/04/18/14
https://www.openwall.com/lists/oss-security/2023/05/03/4
https://www.reddit.com/r/perl/comments/111tadi/psa_httptiny_disabled_ssl_verification_by_default/
|
| libpixman-1-0 |
CVE-2023-37769 |
LOW |
0.42.2-1 |
|
https://gitlab.freedesktop.org/pixman/pixman/-/issues/76
https://www.cve.org/CVERecord?id=CVE-2023-37769
|
| libpng16-16 |
CVE-2021-4214 |
LOW |
1.6.39-2 |
|
https://access.redhat.com/security/cve/CVE-2021-4214
https://bugzilla.redhat.com/show_bug.cgi?id=2043393
https://github.com/glennrp/libpng/issues/302
https://nvd.nist.gov/vuln/detail/CVE-2021-4214
https://security-tracker.debian.org/tracker/CVE-2021-4214
https://security.netapp.com/advisory/ntap-20221020-0001/
https://www.cve.org/CVERecord?id=CVE-2021-4214
|
| libpoppler126 |
CVE-2025-32365 |
HIGH |
22.12.0-2+b1 |
22.12.0-2+deb12u1 |
https://access.redhat.com/security/cve/CVE-2025-32365
https://gitlab.freedesktop.org/poppler/poppler/-/issues/1577
https://gitlab.freedesktop.org/poppler/poppler/-/merge_requests/1792
https://nvd.nist.gov/vuln/detail/CVE-2025-32365
https://ubuntu.com/security/notices/USN-7426-1
https://www.cve.org/CVERecord?id=CVE-2025-32365
|
| libpoppler126 |
CVE-2023-34872 |
MEDIUM |
22.12.0-2+b1 |
22.12.0-2+deb12u1 |
https://access.redhat.com/security/cve/CVE-2023-34872
https://gitlab.freedesktop.org/poppler/poppler/-/commit/591235c8b6c65a2eee88991b9ae73490fd9afdfe
https://gitlab.freedesktop.org/poppler/poppler/-/issues/1399
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3XXL3L6RJOTLGCN7GLH2OLLNF4FJ4T7I/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JQ3NYJ43U2MA7COKGMJDARZUAAOP45D4/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SFBT75QHBWNMSDAHSXZQ2I3PBJWID36K/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3H3GOWFE3C7543GMEN7LY4GWMWJ7D2G/
https://nvd.nist.gov/vuln/detail/CVE-2023-34872
https://ubuntu.com/security/notices/USN-6273-1
https://www.cve.org/CVERecord?id=CVE-2023-34872
|
| libpoppler126 |
CVE-2024-56378 |
MEDIUM |
22.12.0-2+b1 |
22.12.0-2+deb12u1 |
https://access.redhat.com/security/cve/CVE-2024-56378
https://gitlab.freedesktop.org/poppler/poppler/-/blob/30eada0d2bceb42c2d2a87361339063e0b9bea50/CMakeLists.txt#L621
https://gitlab.freedesktop.org/poppler/poppler/-/commit/ade9b5ebed44b0c15522c27669ef6cdf93eff84e
https://gitlab.freedesktop.org/poppler/poppler/-/issues/1553
https://nvd.nist.gov/vuln/detail/CVE-2024-56378
https://ubuntu.com/security/notices/USN-7213-1
https://www.cve.org/CVERecord?id=CVE-2024-56378
|
| libpoppler126 |
CVE-2025-32364 |
MEDIUM |
22.12.0-2+b1 |
22.12.0-2+deb12u1 |
https://access.redhat.com/security/cve/CVE-2025-32364
https://gitlab.freedesktop.org/poppler/poppler/-/commit/d87bc726c7cc98f8c26b60ece5f20236e9de1bc3
https://gitlab.freedesktop.org/poppler/poppler/-/issues/1574
https://nvd.nist.gov/vuln/detail/CVE-2025-32364
https://ubuntu.com/security/notices/USN-7426-1
https://www.cve.org/CVERecord?id=CVE-2025-32364
|
| libpoppler126 |
CVE-2025-43718 |
MEDIUM |
22.12.0-2+b1 |
|
https://access.redhat.com/security/cve/CVE-2025-43718
https://github.com/ShadowByte1/CVE-Reports/blob/main/CVE-2025-43718.md
https://gitlab.freedesktop.org/poppler/poppler/-/commit/f54b815672117c250420787c8c006de98e8c7408
https://nvd.nist.gov/vuln/detail/CVE-2025-43718
https://ubuntu.com/security/notices/USN-7803-1
https://www.cve.org/CVERecord?id=CVE-2025-43718
|
| libpoppler126 |
CVE-2025-50420 |
MEDIUM |
22.12.0-2+b1 |
|
http://freedesktop.com
http://poppler.com
https://github.com/Landw-hub/CVE-2025-50420
https://ubuntu.com/security/notices/USN-7708-1
https://www.cve.org/CVERecord?id=CVE-2025-50420
|
| libpoppler126 |
CVE-2025-52885 |
MEDIUM |
22.12.0-2+b1 |
|
https://access.redhat.com/security/cve/CVE-2025-52885
https://gitlab.freedesktop.org/poppler/poppler/-/merge_requests/1884
https://gitlab.freedesktop.org/poppler/poppler/-/merge_requests/1884#note_3114334
https://nvd.nist.gov/vuln/detail/CVE-2025-52885
https://securitylab.github.com/advisories/GHSL-2025-042_poppler/
https://www.cve.org/CVERecord?id=CVE-2025-52885
|
| libpoppler126 |
CVE-2025-52886 |
MEDIUM |
22.12.0-2+b1 |
|
https://access.redhat.com/security/cve/CVE-2025-52886
https://gitlab.freedesktop.org/poppler/poppler/-/commit/04bd91684ed41d67ae0f10cde0660e4ed74ac203
https://gitlab.freedesktop.org/poppler/poppler/-/commit/ac36affcc8486de38e8905a8d6547a3464ff46e5
https://gitlab.freedesktop.org/poppler/poppler/-/issues/1581
https://gitlab.freedesktop.org/poppler/poppler/-/merge_requests/1828
https://nvd.nist.gov/vuln/detail/CVE-2025-52886
https://securitylab.github.com/advisories/GHSL-2025-054_poppler/
https://ubuntu.com/security/notices/USN-7675-1
https://ubuntu.com/security/notices/USN-7687-1
https://www.cve.org/CVERecord?id=CVE-2025-52886
|
| libpoppler126 |
CVE-2013-4472 |
LOW |
22.12.0-2+b1 |
|
http://osvdb.org/99064
http://poppler.freedesktop.org/releases.html
http://seclists.org/oss-sec/2013/q4/181
http://seclists.org/oss-sec/2013/q4/183
https://access.redhat.com/security/cve/CVE-2013-4472
https://nvd.nist.gov/vuln/detail/CVE-2013-4472
https://www.cve.org/CVERecord?id=CVE-2013-4472
|
| libpoppler126 |
CVE-2017-2814 |
LOW |
22.12.0-2+b1 |
|
http://www.securityfocus.com/bid/99497
https://access.redhat.com/security/cve/CVE-2017-2814
https://nvd.nist.gov/vuln/detail/CVE-2017-2814
https://talosintelligence.com/vulnerability_reports/TALOS-2017-0311
https://www.cve.org/CVERecord?id=CVE-2017-2814
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0311
|
| libpoppler126 |
CVE-2017-2818 |
LOW |
22.12.0-2+b1 |
|
http://www.securityfocus.com/bid/99497
https://access.redhat.com/security/cve/CVE-2017-2818
https://nvd.nist.gov/vuln/detail/CVE-2017-2818
https://talosintelligence.com/vulnerability_reports/TALOS-2017-0319
https://www.cve.org/CVERecord?id=CVE-2017-2818
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0319
|
| libpoppler126 |
CVE-2017-2820 |
LOW |
22.12.0-2+b1 |
|
http://www.securityfocus.com/bid/99497
https://access.redhat.com/security/cve/CVE-2017-2820
https://nvd.nist.gov/vuln/detail/CVE-2017-2820
https://talosintelligence.com/vulnerability_reports/TALOS-2017-0321
https://ubuntu.com/security/notices/USN-3350-1
https://www.cve.org/CVERecord?id=CVE-2017-2820
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0321
|
| libpoppler126 |
CVE-2017-9083 |
LOW |
22.12.0-2+b1 |
|
https://access.redhat.com/security/cve/CVE-2017-9083
https://bugs.freedesktop.org/show_bug.cgi?id=101084
https://lists.freedesktop.org/archives/poppler/2017-May/012230.html
https://nvd.nist.gov/vuln/detail/CVE-2017-9083
https://security.gentoo.org/glsa/201801-17
https://ubuntu.com/security/notices/USN-3350-1
https://www.cve.org/CVERecord?id=CVE-2017-9083
|
| libpoppler126 |
CVE-2019-9543 |
LOW |
22.12.0-2+b1 |
|
http://www.securityfocus.com/bid/107238
https://access.redhat.com/security/cve/CVE-2019-9543
https://gitlab.freedesktop.org/poppler/poppler/issues/730
https://nvd.nist.gov/vuln/detail/CVE-2019-9543
https://research.loginsoft.com/bugs/recursive-function-call-in-function-jbig2streamreadgenericbitmap-poppler-0-74-0/
https://www.cve.org/CVERecord?id=CVE-2019-9543
|
| libpoppler126 |
CVE-2019-9545 |
LOW |
22.12.0-2+b1 |
|
https://access.redhat.com/security/cve/CVE-2019-9545
https://gitlab.freedesktop.org/poppler/poppler/issues/731
https://nvd.nist.gov/vuln/detail/CVE-2019-9545
https://research.loginsoft.com/bugs/recursive-function-call-in-function-jbig2streamreadtextregion-poppler-0-74-0/
https://www.cve.org/CVERecord?id=CVE-2019-9545
|
| libpoppler126 |
CVE-2022-24106 |
LOW |
22.12.0-2+b1 |
|
http://www.xpdfreader.com/security-fixes.html
https://dl.xpdfreader.com/xpdf-4.04.tar.gz
|
| libpoppler126 |
CVE-2024-6239 |
LOW |
22.12.0-2+b1 |
|
https://access.redhat.com/errata/RHSA-2024:5305
https://access.redhat.com/errata/RHSA-2024:9167
https://access.redhat.com/security/cve/CVE-2024-6239
https://bugzilla.redhat.com/2293594
https://bugzilla.redhat.com/show_bug.cgi?id=2293594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6239
https://errata.almalinux.org/8/ALSA-2024-5305.html
https://errata.rockylinux.org/RLSA-2024:5305
https://linux.oracle.com/cve/CVE-2024-6239.html
https://linux.oracle.com/errata/ELSA-2024-9167.html
https://nvd.nist.gov/vuln/detail/CVE-2024-6239
https://ubuntu.com/security/notices/USN-6915-1
https://www.cve.org/CVERecord?id=CVE-2024-6239
|
| libpoppler126 |
CVE-2025-43903 |
LOW |
22.12.0-2+b1 |
|
https://access.redhat.com/security/cve/CVE-2025-43903
https://gitlab.freedesktop.org/poppler/poppler/-/commit/f1b9c830f145a0042e853d6462b2f9ca4016c669
https://nvd.nist.gov/vuln/detail/CVE-2025-43903
https://ubuntu.com/security/notices/USN-7471-1
https://www.cve.org/CVERecord?id=CVE-2025-43903
|
| libproc2-0 |
CVE-2023-4016 |
LOW |
2:4.0.2-3 |
|
https://access.redhat.com/errata/RHSA-2023:7187
https://access.redhat.com/security/cve/CVE-2023-4016
https://bugzilla.redhat.com/2228494
https://bugzilla.redhat.com/show_bug.cgi?id=2228494
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4016
https://errata.almalinux.org/8/ALSA-2023-7187.html
https://errata.rockylinux.org/RLSA-2023:7187
https://gitlab.com/procps-ng/procps
https://gitlab.com/procps-ng/procps/-/commit/2c933ecba3bb1d3041a5a7a53a7b4078a6003413
https://gitlab.com/procps-ng/procps/-/issues/297
https://linux.oracle.com/cve/CVE-2023-4016.html
https://linux.oracle.com/errata/ELSA-2023-7187.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/SUETRRT24OFGPYK6ACPM5VUGHNKH5CQ5/
https://nvd.nist.gov/vuln/detail/CVE-2023-4016
https://ubuntu.com/security/notices/USN-6477-1
https://www.cve.org/CVERecord?id=CVE-2023-4016
https://www.freelists.org/post/procps/ps-buffer-overflow-CVE-20234016
|
| libpython3.11 |
CVE-2023-24329 |
HIGH |
3.11.2-6 |
3.11.2-6+deb12u2 |
https://access.redhat.com/errata/RHSA-2023:3811
https://access.redhat.com/security/cve/CVE-2023-24329
https://bugzilla.redhat.com/2173917
https://bugzilla.redhat.com/show_bug.cgi?id=2173917
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24329
https://errata.almalinux.org/8/ALSA-2023-3811.html
https://errata.rockylinux.org/RLSA-2023:3595
https://github.com/python/cpython/issues/102153
https://github.com/python/cpython/pull/99421
https://github.com/python/cpython/pull/99446 (backport for 3.11 branch)
https://linux.oracle.com/cve/CVE-2023-24329.html
https://linux.oracle.com/errata/ELSA-2023-3811.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6PEVICI7YNGGMSL3UCMWGE66QFLATH72/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DSL6NSOAXWBJJ67XPLSSC74MNKZF3BBO/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EM2XLZSTXG44TMFXF4E6VTGKR2MQCW3G/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F2NY75GFDZ5T6YPN44D3VMFT5SUVTOTG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GR5US3BYILYJ4SKBV6YBNPRUBAL5P2CN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H23OSKC6UG6IWOQAUPW74YUHWRWVXJP7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZTLGV2HYFF4AMYJL25VDIGAIHCU7UPA/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LWC4WGXER5P6Q75RFGL7QUTPP3N5JR7T/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZEHSXSCMA4WWQKXT6QV7AAR6SWNZ2VP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O5SP4RT3RRS434ZS2HQKQJ3VZW7YPKYR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OHHJHJRLEF3TDT2K3676CAUVRDD4CCMR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEUN6T22UJFXR7J5F6UUHCXXPKJ2DVHI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PURM5CFDABEWAIWZFD2MQ7ZJGCPYSQ44/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q3J5N24ECS4B6MJDRO6UAYU6GPLYBDCL/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QRQHN7RWJQJHYP6E5EKESOYP5VDSHZG4/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RA2MBEEES6L46OD64OBSVUUMGKNGMOWW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4IDB5OAR5Y4UK3HLMZBW4WEL2B7YFMJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TZH26JGNZ5XYPZ5SAU3NKSBSPRE5OHTG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U2MZOJYGFCB5PPT6AKMAU72N7QOYWLBP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UONZWLB4QVLQIY5CPDLEUEKH6WX4VQMC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WTOAUJNDWZDRWVSXJ354AYZYKRMT56HU/
https://nvd.nist.gov/vuln/detail/CVE-2023-24329
https://pointernull.com/security/python-url-parse-problem.html
https://security.netapp.com/advisory/ntap-20230324-0004/
https://ubuntu.com/security/notices/USN-5888-1
https://ubuntu.com/security/notices/USN-5960-1
https://ubuntu.com/security/notices/USN-6139-1
https://ubuntu.com/security/notices/USN-6891-1
https://ubuntu.com/security/notices/USN-7180-1
https://www.cve.org/CVERecord?id=CVE-2023-24329
https://www.kb.cert.org/vuls/id/127587
|
| libpython3.11 |
CVE-2023-41105 |
HIGH |
3.11.2-6 |
3.11.2-6+deb12u2 |
https://access.redhat.com/errata/RHSA-2023:7024
https://access.redhat.com/security/cve/CVE-2023-41105
https://bugzilla.redhat.com/2235795
https://bugzilla.redhat.com/263261
https://errata.almalinux.org/8/ALSA-2023-7024.html
https://github.com/python/cpython/issues/106242
https://github.com/python/cpython/pull/107981
https://github.com/python/cpython/pull/107982
https://github.com/python/cpython/pull/107983
https://linux.oracle.com/cve/CVE-2023-41105.html
https://linux.oracle.com/errata/ELSA-2023-7024.html
https://mail.python.org/archives/list/security-announce%40python.org/thread/D6CDW3ZZC5D444YGL3VQUY6D4ECMCQLD/
https://mail.python.org/archives/list/[email protected]/thread/D6CDW3ZZC5D444YGL3VQUY6D4ECMCQLD/
https://nvd.nist.gov/vuln/detail/CVE-2023-41105
https://security.netapp.com/advisory/ntap-20231006-0015/
https://ubuntu.com/security/notices/USN-6547-1
https://ubuntu.com/security/notices/USN-6891-1
https://www.cve.org/CVERecord?id=CVE-2023-41105
|
| libpython3.11 |
CVE-2023-6597 |
HIGH |
3.11.2-6 |
3.11.2-6+deb12u2 |
http://www.openwall.com/lists/oss-security/2024/03/20/5
https://access.redhat.com/errata/RHSA-2024:4058
https://access.redhat.com/security/cve/CVE-2023-6597
https://bugzilla.redhat.com/2276518
https://bugzilla.redhat.com/2276525
https://bugzilla.redhat.com/show_bug.cgi?id=2276518
https://bugzilla.redhat.com/show_bug.cgi?id=2276525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6597
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0450
https://discuss.python.org/t/python-3-10-14-3-9-19-and-3-8-19-is-now-available/48993
https://errata.almalinux.org/8/ALSA-2024-4058.html
https://errata.rockylinux.org/RLSA-2024:4078
https://github.com/advisories/GHSA-797f-63wg-8chv
https://github.com/python/cpython/commit/02a9259c717738dfe6b463c44d7e17f2b6d2cb3a
https://github.com/python/cpython/commit/5585334d772b253a01a6730e8202ffb1607c3d25
https://github.com/python/cpython/commit/6ceb8aeda504b079fef7a57b8d81472f15cdd9a5
https://github.com/python/cpython/commit/81c16cd94ec38d61aa478b9a452436dc3b1b524d
https://github.com/python/cpython/commit/8eaeefe49d179ca4908d052745e3bb8b6f238f82
https://github.com/python/cpython/commit/d54e22a669ae6e987199bb5d2c69bb5a46b0083b
https://github.com/python/cpython/issues/91133
https://linux.oracle.com/cve/CVE-2023-6597.html
https://linux.oracle.com/errata/ELSA-2024-4078.html
https://lists.debian.org/debian-lts-announce/2024/03/msg00025.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/T3IGRX54M7RNCQOXVQO5KQKTGWCOABIM/
https://lists.fedoraproject.org/archives/list/[email protected]/message/U5VHWS52HGD743C47UMCSAK2A773M2YE/
https://mail.python.org/archives/list/[email protected]/thread/Q5C6ATFC67K53XFV4KE45325S7NS62LD/
https://nvd.nist.gov/vuln/detail/CVE-2023-6597
https://seclists.org/oss-sec/2024/q1/240
https://ubuntu.com/security/notices/USN-6891-1
https://www.cve.org/CVERecord?id=CVE-2023-6597
|
| libpython3.11 |
CVE-2024-6232 |
HIGH |
3.11.2-6 |
3.11.2-6+deb12u4 |
http://www.openwall.com/lists/oss-security/2024/09/03/5
https://access.redhat.com/errata/RHSA-2024:8838
https://access.redhat.com/security/cve/CVE-2024-6232
https://bugzilla.redhat.com/2309426
https://bugzilla.redhat.com/show_bug.cgi?id=2309426
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6232
https://errata.almalinux.org/8/ALSA-2024-8838.html
https://errata.rockylinux.org/RLSA-2024:8446
https://github.com/python/cpython/commit/34ddb64d088dd7ccc321f6103d23153256caa5d4
https://github.com/python/cpython/commit/4eaf4891c12589e3c7bdad5f5b076e4c8392dd06
https://github.com/python/cpython/commit/743acbe872485dc18df4d8ab2dc7895187f062c4
https://github.com/python/cpython/commit/7d1f50cd92ff7e10a1c15a8f591dde8a6843a64d
https://github.com/python/cpython/commit/b4225ca91547aa97ed3aca391614afbb255bc877
https://github.com/python/cpython/commit/d449caf8a179e3b954268b3a88eb9170be3c8fbf
https://github.com/python/cpython/commit/ed3a49ea734ada357ff4442996fd4ae71d253373
https://github.com/python/cpython/issues/121285
https://github.com/python/cpython/pull/121286
https://linux.oracle.com/cve/CVE-2024-6232.html
https://linux.oracle.com/errata/ELSA-2025-1750.html
https://mail.python.org/archives/list/[email protected]/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/
https://nvd.nist.gov/vuln/detail/CVE-2024-6232
https://security.netapp.com/advisory/ntap-20241018-0007/
https://ubuntu.com/security/notices/USN-7015-1
https://ubuntu.com/security/notices/USN-7015-2
https://ubuntu.com/security/notices/USN-7015-5
https://ubuntu.com/security/notices/USN-7488-1
https://www.cve.org/CVERecord?id=CVE-2024-6232
|
| libpython3.11 |
CVE-2024-7592 |
HIGH |
3.11.2-6 |
3.11.2-6+deb12u5 |
https://access.redhat.com/errata/RHSA-2025:3634
https://access.redhat.com/security/cve/CVE-2024-7592
https://errata.almalinux.org/9/ALSA-2025-3634.html
https://github.com/python/cpython/commit/391e5626e3ee5af267b97e37abc7475732e67621
https://github.com/python/cpython/commit/44e458357fca05ca0ae2658d62c8c595b048b5ef
https://github.com/python/cpython/commit/a77ab24427a18bff817025adb03ca920dc3f1a06
https://github.com/python/cpython/commit/b2f11ca7667e4d57c71c1c88b255115f16042d9a
https://github.com/python/cpython/commit/d4ac921a4b081f7f996a5d2b101684b67ba0ed7f
https://github.com/python/cpython/commit/d662e2db2605515a767f88ad48096b8ac623c774
https://github.com/python/cpython/commit/dcc3eaef98cd94d6cb6cb0f44bd1c903d04f33b1
https://github.com/python/cpython/issues/123067
https://github.com/python/cpython/pull/123075
https://linux.oracle.com/cve/CVE-2024-7592.html
https://linux.oracle.com/errata/ELSA-2025-3634.html
https://mail.python.org/archives/list/[email protected]/thread/HXJAAAALNUNGCQUS2W7WR6GFIZIHFOOK/
https://nvd.nist.gov/vuln/detail/CVE-2024-7592
https://security.netapp.com/advisory/ntap-20241018-0006/
https://ubuntu.com/security/notices/USN-7015-1
https://ubuntu.com/security/notices/USN-7015-2
https://www.cve.org/CVERecord?id=CVE-2024-7592
|
| libpython3.11 |
CVE-2024-9287 |
HIGH |
3.11.2-6 |
3.11.2-6+deb12u5 |
https://access.redhat.com/errata/RHSA-2024:10980
https://access.redhat.com/security/cve/CVE-2024-9287
https://bugzilla.redhat.com/2321440
https://bugzilla.redhat.com/2330804
https://bugzilla.redhat.com/show_bug.cgi?id=2321440
https://bugzilla.redhat.com/show_bug.cgi?id=2325776
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11168
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9287
https://errata.almalinux.org/8/ALSA-2024-10980.html
https://errata.rockylinux.org/RLSA-2024:10779
https://github.com/python/cpython/commit/633555735a023d3e4d92ba31da35b1205f9ecbd7
https://github.com/python/cpython/commit/8450b2482586857d689b6658f08de9c8179af7db
https://github.com/python/cpython/commit/9286ab3a107ea41bd3f3c3682ce2512692bdded8
https://github.com/python/cpython/commit/ae961ae94bf19c8f8c7fbea3d1c25cc55ce8ae97
https://github.com/python/cpython/commit/d48cc82ed25e26b02eb97c6263d95dcaa1e9111b
https://github.com/python/cpython/commit/e52095a0c1005a87eed2276af7a1f2f66e2b6483
https://github.com/python/cpython/issues/124651
https://github.com/python/cpython/pull/124712
https://github.com/python/cpython/pull/124712/commits/b6a3bbd155c558cdcda482629073e492437db3d0
https://linux.oracle.com/cve/CVE-2024-9287.html
https://linux.oracle.com/errata/ELSA-2024-11111.html
https://mail.python.org/archives/list/[email protected]/thread/RSPJ2B5JL22FG3TKUJ7D7DQ4N5JRRBZL/
https://nvd.nist.gov/vuln/detail/CVE-2024-9287
https://security.netapp.com/advisory/ntap-20250425-0006/
https://ubuntu.com/security/notices/USN-7116-1
https://ubuntu.com/security/notices/USN-7348-1
https://ubuntu.com/security/notices/USN-7488-1
https://www.cve.org/CVERecord?id=CVE-2024-9287
|
| libpython3.11 |
CVE-2025-8194 |
HIGH |
3.11.2-6 |
|
https://access.redhat.com/errata/RHSA-2025:14900
https://access.redhat.com/security/cve/CVE-2025-8194
https://bugzilla.redhat.com/2366982
https://bugzilla.redhat.com/2384043
https://bugzilla.redhat.com/show_bug.cgi?id=2384043
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8194
https://errata.almalinux.org/8/ALSA-2025-14900.html
https://errata.rockylinux.org/RLSA-2025:14841
https://gist.github.com/sethmlarson/1716ac5b82b73dbcbf23ad2eff8b33e1
https://github.com/python/cpython/commit/57f5981d6260ed21266e0c26951b8564cc252bc2
https://github.com/python/cpython/commit/7040aa54f14676938970e10c5f74ea93cd56aa38
https://github.com/python/cpython/commit/73f03e4808206f71eb6b92c579505a220942ef19
https://github.com/python/cpython/commit/b4ec17488eedec36d3c05fec127df71c0071f6cb
https://github.com/python/cpython/commit/c9d9f78feb1467e73fd29356c040bde1c104f29f
https://github.com/python/cpython/commit/cdae923ffe187d6ef916c0f665a31249619193fe
https://github.com/python/cpython/commit/fbc2a0ca9ac8aff6887f8ddf79b87b4510277227
https://github.com/python/cpython/issues/130577
https://github.com/python/cpython/pull/137027
https://linux.oracle.com/cve/CVE-2025-8194.html
https://linux.oracle.com/errata/ELSA-2025-16117.html
https://mail.python.org/archives/list/[email protected]/thread/ZULLF3IZ726XP5EY7XJ7YIN3K5MDYR2D/
https://nvd.nist.gov/vuln/detail/CVE-2025-8194
https://ubuntu.com/security/notices/USN-7710-1
https://ubuntu.com/security/notices/USN-7710-2
https://www.cve.org/CVERecord?id=CVE-2025-8194
|
| libpython3.11 |
CVE-2023-27043 |
MEDIUM |
3.11.2-6 |
3.11.2-6+deb12u5 |
http://python.org
https://access.redhat.com/articles/7051467
https://access.redhat.com/errata/RHSA-2024:3062
https://access.redhat.com/security/cve/CVE-2023-27043
https://bugzilla.redhat.com/2196183
https://bugzilla.redhat.com/show_bug.cgi?id=2196183
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27043
https://errata.almalinux.org/8/ALSA-2024-3062.html
https://errata.rockylinux.org/RLSA-2024:0256
https://github.com/python/cpython/issues/102988
https://github.com/python/cpython/pull/102990
https://github.com/python/cpython/pull/105127
https://linux.oracle.com/cve/CVE-2023-27043.html
https://linux.oracle.com/errata/ELSA-2024-3062.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZAEFSFZDNBNJPNOUTLG5COISGQDLMGV/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/75DTHSTNOFFNAWHXKMDXS7EJWC6W2FUC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ARI7VDSNTQVXRQFM6IK5GSSLEIYV4VZH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BQAKLUJMHFGVBRDPEY57BJGNCE5UUPHW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HXYVPEZUA3465AEFX5JVFVP7KIFZMF3N/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6M5I6OQHJABNEYY555HUMMKX3Y4P25Z/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NEUNZSZ3CVSM2QWVYH3N2XGOCDWNYUA3/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORLXS5YTKN65E2Q2NWKXMFS5FWQHRNZW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2MAICLFDDO3QVNHTZ2OCERZQ34R2PIC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2W2BZQIHMCKRI5FNBJERFYMS5PK6TAH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PHVGRKQAGANCSGFI3QMYOCIMS4IFOZA5/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU6Y2S5CBN5BWCBDAJFTGIBZLK3S2G3J/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QDRDDPDN3VFIYXJIYEABY6USX5EU66AG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDDC2VOX7OQC6OHMYTVD4HLFZIV6PYBC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SINP4OVYNB2AGDYI2GS37EMW3H3F7XPZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SOX7BCN6YL7B3RFPEEXPIU5CMTEHJOKR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZXC32CJ7TWDPJO6GY2XIQRO7JZX5FLP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWMBD4LNHWEXRI6YVFWJMTJQUL5WOFTS/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YQVY5C5REXWJIORJIL2FIL3ALOEJEF72/
https://lists.fedoraproject.org/archives/list/[email protected]/message/4ZAEFSFZDNBNJPNOUTLG5COISGQDLMGV/
https://lists.fedoraproject.org/archives/list/[email protected]/message/75DTHSTNOFFNAWHXKMDXS7EJWC6W2FUC/
https://lists.fedoraproject.org/archives/list/[email protected]/message/ARI7VDSNTQVXRQFM6IK5GSSLEIYV4VZH/
https://lists.fedoraproject.org/archives/list/[email protected]/message/BQAKLUJMHFGVBRDPEY57BJGNCE5UUPHW/
https://lists.fedoraproject.org/archives/list/[email protected]/message/HXYVPEZUA3465AEFX5JVFVP7KIFZMF3N/
https://lists.fedoraproject.org/archives/list/[email protected]/message/N6M5I6OQHJABNEYY555HUMMKX3Y4P25Z/
https://lists.fedoraproject.org/archives/list/[email protected]/message/NEUNZSZ3CVSM2QWVYH3N2XGOCDWNYUA3/
https://lists.fedoraproject.org/archives/list/[email protected]/message/ORLXS5YTKN65E2Q2NWKXMFS5FWQHRNZW/
https://lists.fedoraproject.org/archives/list/[email protected]/message/P2MAICLFDDO3QVNHTZ2OCERZQ34R2PIC/
https://lists.fedoraproject.org/archives/list/[email protected]/message/P2W2BZQIHMCKRI5FNBJERFYMS5PK6TAH/
https://lists.fedoraproject.org/archives/list/[email protected]/message/PHVGRKQAGANCSGFI3QMYOCIMS4IFOZA5/
https://lists.fedoraproject.org/archives/list/[email protected]/message/PU6Y2S5CBN5BWCBDAJFTGIBZLK3S2G3J/
https://lists.fedoraproject.org/archives/list/[email protected]/message/QDRDDPDN3VFIYXJIYEABY6USX5EU66AG/
https://lists.fedoraproject.org/archives/list/[email protected]/message/RDDC2VOX7OQC6OHMYTVD4HLFZIV6PYBC/
https://lists.fedoraproject.org/archives/list/[email protected]/message/SINP4OVYNB2AGDYI2GS37EMW3H3F7XPZ/
https://lists.fedoraproject.org/archives/list/[email protected]/message/VZXC32CJ7TWDPJO6GY2XIQRO7JZX5FLP/
https://lists.fedoraproject.org/archives/list/[email protected]/message/XWMBD4LNHWEXRI6YVFWJMTJQUL5WOFTS/
https://lists.fedoraproject.org/archives/list/[email protected]/message/YQVY5C5REXWJIORJIL2FIL3ALOEJEF72/
https://nvd.nist.gov/vuln/detail/CVE-2023-27043
https://python-security.readthedocs.io/vuln/email-parseaddr-realname.html
https://security.netapp.com/advisory/ntap-20230601-0003/
https://ubuntu.com/security/notices/USN-7015-1
https://ubuntu.com/security/notices/USN-7015-3
https://ubuntu.com/security/notices/USN-7015-4
https://ubuntu.com/security/notices/USN-7015-7
https://www.cve.org/CVERecord?id=CVE-2023-27043
|
| libpython3.11 |
CVE-2023-40217 |
MEDIUM |
3.11.2-6 |
3.11.2-6+deb12u2 |
https://access.redhat.com/errata/RHSA-2023:5998
https://access.redhat.com/security/cve/CVE-2023-40217
https://bugzilla.redhat.com/2235789
https://bugzilla.redhat.com/show_bug.cgi?id=2235789
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40217
https://errata.almalinux.org/8/ALSA-2023-5998.html
https://errata.rockylinux.org/RLSA-2023:5997
https://github.com/python/cpython/commit/0cb0c238d520a8718e313b52cffc356a5a7561bf (main)
https://github.com/python/cpython/commit/256586ab8776e4526ca594b4866b9a3492e628f1 (3.12)
https://github.com/python/cpython/commit/264b1dacc67346efa0933d1e63f622676e0ed96b (3.9)
https://github.com/python/cpython/commit/37d7180cb647f0bed0c1caab0037f3bc82e2af96 (3.10)
https://github.com/python/cpython/commit/75a875e0df0530b75b1470d797942f90f4a718d3 (3.11)
https://github.com/python/cpython/issues/108310
https://github.com/python/cpython/pull/108315
https://linux.oracle.com/cve/CVE-2023-40217.html
https://linux.oracle.com/errata/ELSA-2023-6885.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html
https://mail.python.org/archives/list/security-announce%40python.org/thread/PEPLII27KYHLF4AK3ZQGKYNCRERG4YXY/
https://mail.python.org/archives/list/[email protected]/thread/PEPLII27KYHLF4AK3ZQGKYNCRERG4YXY/
https://nvd.nist.gov/vuln/detail/CVE-2023-40217
https://security.netapp.com/advisory/ntap-20231006-0014/
https://ubuntu.com/security/notices/USN-6513-1
https://ubuntu.com/security/notices/USN-6513-2
https://ubuntu.com/security/notices/USN-6891-1
https://ubuntu.com/security/notices/USN-7180-1
https://www.cve.org/CVERecord?id=CVE-2023-40217
https://www.python.org/dev/security/
|
| libpython3.11 |
CVE-2024-0397 |
MEDIUM |
3.11.2-6 |
3.11.2-6+deb12u3 |
http://www.openwall.com/lists/oss-security/2024/06/17/2
https://access.redhat.com/security/cve/CVE-2024-0397
https://github.com/python/cpython/commit/01c37f1d0714f5822d34063ca7180b595abf589d
https://github.com/python/cpython/commit/29c97287d205bf2f410f4895ebce3f43b5160524
https://github.com/python/cpython/commit/37324b421b72b7bc9934e27aba85d48d4773002e
https://github.com/python/cpython/commit/542f3272f56f31ed04e74c40635a913fbc12d286
https://github.com/python/cpython/commit/b228655c227b2ca298a8ffac44d14ce3d22f6faa
https://github.com/python/cpython/commit/bce693111bff906ccf9281c22371331aaff766ab
https://github.com/python/cpython/commit/bce693111bff906ccf9281c22371331aaff766ab (3.13)
https://github.com/python/cpython/issues/114572
https://github.com/python/cpython/pull/114573
https://mail.python.org/archives/list/[email protected]/thread/BMAK5BCGKYWNJOACVUSLUF6SFGBIM4VP/
https://nvd.nist.gov/vuln/detail/CVE-2024-0397
https://security.netapp.com/advisory/ntap-20250411-0006/
https://ubuntu.com/security/notices/USN-6928-1
https://www.cve.org/CVERecord?id=CVE-2024-0397
|
| libpython3.11 |
CVE-2024-0450 |
MEDIUM |
3.11.2-6 |
3.11.2-6+deb12u2 |
http://www.openwall.com/lists/oss-security/2024/03/20/5
https://access.redhat.com/errata/RHSA-2024:4243
https://access.redhat.com/security/cve/CVE-2024-0450
https://bugzilla.redhat.com/2276525
https://bugzilla.redhat.com/show_bug.cgi?id=2276518
https://bugzilla.redhat.com/show_bug.cgi?id=2276525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6597
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0450
https://discuss.python.org/t/python-3-10-14-3-9-19-and-3-8-19-is-now-available/48993
https://errata.almalinux.org/8/ALSA-2024-4243.html
https://errata.rockylinux.org/RLSA-2024:4078
https://github.com/python/cpython/commit/30fe5d853b56138dbec62432d370a1f99409fc85
https://github.com/python/cpython/commit/66363b9a7b9fe7c99eba3a185b74c5fdbf842eba
https://github.com/python/cpython/commit/70497218351ba44bffc8b571201ecb5652d84675
https://github.com/python/cpython/commit/a2c59992e9e8d35baba9695eb186ad6c6ff85c51
https://github.com/python/cpython/commit/a956e510f6336d5ae111ba429a61c3ade30a7549
https://github.com/python/cpython/commit/d05bac0b74153beb541b88b4fca33bf053990183
https://github.com/python/cpython/commit/fa181fcf2156f703347b03a3b1966ce47be8ab3b
https://github.com/python/cpython/issues/109858
https://linux.oracle.com/cve/CVE-2024-0450.html
https://linux.oracle.com/errata/ELSA-2024-9192.html
https://lists.debian.org/debian-lts-announce/2024/03/msg00024.html
https://lists.debian.org/debian-lts-announce/2024/03/msg00025.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/T3IGRX54M7RNCQOXVQO5KQKTGWCOABIM/
https://lists.fedoraproject.org/archives/list/[email protected]/message/U5VHWS52HGD743C47UMCSAK2A773M2YE/
https://mail.python.org/archives/list/[email protected]/thread/XELNUX2L3IOHBTFU7RQHCY6OUVEWZ2FG/
https://nvd.nist.gov/vuln/detail/CVE-2024-0450
https://seclists.org/oss-sec/2024/q1/240
https://security.netapp.com/advisory/ntap-20250411-0005/
https://ubuntu.com/security/notices/USN-6891-1
https://ubuntu.com/security/notices/USN-7212-1
https://www.bamsoftware.com/hacks/zipbomb/
https://www.cve.org/CVERecord?id=CVE-2024-0450
|
| libpython3.11 |
CVE-2024-6923 |
MEDIUM |
3.11.2-6 |
3.11.2-6+deb12u5 |
http://www.openwall.com/lists/oss-security/2024/08/01/3
http://www.openwall.com/lists/oss-security/2024/08/02/2
https://access.redhat.com/errata/RHSA-2024:6975
https://access.redhat.com/security/cve/CVE-2024-6923
https://bugzilla.redhat.com/2292921
https://bugzilla.redhat.com/2302255
https://bugzilla.redhat.com/2309426
https://bugzilla.redhat.com/show_bug.cgi?id=2302255
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6923
https://errata.almalinux.org/8/ALSA-2024-6975.html
https://errata.rockylinux.org/RLSA-2024:6146
https://github.com/python/cpython/commit/06f28dc236708f72871c64d4bc4b4ea144c50147
https://github.com/python/cpython/commit/097633981879b3c9de9a1dd120d3aa585ecc2384
https://github.com/python/cpython/commit/4766d1200fdf8b6728137aa2927a297e224d5fa7
https://github.com/python/cpython/commit/4aaa4259b5a6e664b7316a4d60bdec7ee0f124d0
https://github.com/python/cpython/commit/b158a76ce094897c870fb6b3de62887b7ccc33f1
https://github.com/python/cpython/commit/f7be505d137a22528cb0fc004422c0081d5d90e6
https://github.com/python/cpython/commit/f7c0f09e69e950cf3c5ada9dbde93898eb975533
https://github.com/python/cpython/issues/121650
https://github.com/python/cpython/pull/122233
https://linux.oracle.com/cve/CVE-2024-6923.html
https://linux.oracle.com/errata/ELSA-2024-6975.html
https://lists.debian.org/debian-lts-announce/2025/01/msg00005.html
https://mail.python.org/archives/list/[email protected]/thread/QH3BUOE2DYQBWP7NAQ7UNHPPOELKISRW/
https://nvd.nist.gov/vuln/detail/CVE-2024-6923
https://security.netapp.com/advisory/ntap-20240926-0003/
https://ubuntu.com/security/notices/USN-7015-1
https://ubuntu.com/security/notices/USN-7015-5
https://www.cve.org/CVERecord?id=CVE-2024-6923
|
| libpython3.11 |
CVE-2024-8088 |
MEDIUM |
3.11.2-6 |
3.11.2-6+deb12u3 |
http://www.openwall.com/lists/oss-security/2024/08/22/1
http://www.openwall.com/lists/oss-security/2024/08/22/4
http://www.openwall.com/lists/oss-security/2024/08/23/1
http://www.openwall.com/lists/oss-security/2024/08/23/2
https://access.redhat.com/errata/RHSA-2024:6962
https://access.redhat.com/security/cve/CVE-2024-8088
https://bugzilla.redhat.com/2292921
https://bugzilla.redhat.com/2302255
https://bugzilla.redhat.com/2307370
https://bugzilla.redhat.com/show_bug.cgi?id=2292921
https://bugzilla.redhat.com/show_bug.cgi?id=2302255
https://bugzilla.redhat.com/show_bug.cgi?id=2307370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6923
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8088
https://errata.almalinux.org/8/ALSA-2024-6962.html
https://errata.rockylinux.org/RLSA-2024:6962
https://github.com/python/cpython/commit/0aa1ee22ab6e204e9d3d0e9dd63ea648ed691ef1
https://github.com/python/cpython/commit/2231286d78d328c2f575e0b05b16fe447d1656d6
https://github.com/python/cpython/commit/795f2597a4be988e2bb19b69ff9958e981cb894e
https://github.com/python/cpython/commit/7bc367e464ce50b956dd232c1dfa1cad4e7fb814
https://github.com/python/cpython/commit/7e8883a3f04d308302361aeffc73e0e9837f19d4
https://github.com/python/cpython/commit/8c7348939d8a3ecd79d630075f6be1b0c5b41f64
https://github.com/python/cpython/commit/95b073bddefa6243effa08e131e297c0383e7f6a
https://github.com/python/cpython/commit/962055268ed4f2ca1d717bfc8b6385de50a23ab7
https://github.com/python/cpython/commit/9cd03263100ddb1657826cc4a71470786cab3932
https://github.com/python/cpython/commit/dcc5182f27c1500006a1ef78e10613bb45788dea
https://github.com/python/cpython/commit/e0264a61119d551658d9445af38323ba94fc16db
https://github.com/python/cpython/commit/fc0b8259e693caa8400fa8b6ac1e494e47ea7798
https://github.com/python/cpython/issues/122905
https://github.com/python/cpython/issues/123270
https://github.com/python/cpython/pull/122906
https://linux.oracle.com/cve/CVE-2024-8088.html
https://linux.oracle.com/errata/ELSA-2024-9371.html
https://mail.python.org/archives/list/[email protected]/thread/GNFCKVI4TCATKQLALJ5SN4L4CSPSMILU/
https://nvd.nist.gov/vuln/detail/CVE-2024-8088
https://security.netapp.com/advisory/ntap-20241011-0010/
https://ubuntu.com/security/notices/USN-7015-1
https://www.cve.org/CVERecord?id=CVE-2024-8088
|
| libpython3.11 |
CVE-2025-0938 |
MEDIUM |
3.11.2-6 |
3.11.2-6+deb12u6 |
https://access.redhat.com/errata/RHSA-2025:7109
https://access.redhat.com/security/cve/CVE-2025-0938
https://bugzilla.redhat.com/2343237
https://errata.almalinux.org/9/ALSA-2025-7109.html
https://github.com/python/cpython/commit/526617ed68cde460236c973e5d0a8bad4de896ba
https://github.com/python/cpython/commit/90e526ae67b172ed7c6c56e7edad36263b0f9403
https://github.com/python/cpython/commit/a7084f6075c9595ba60119ce8c62f1496f50c568
https://github.com/python/cpython/commit/b8b4b713c5f8ec0958c7ef8d29d6711889bc94ab
https://github.com/python/cpython/commit/d89a5f6a6e65511a5f6e0618c4c30a7aa5aba56a
https://github.com/python/cpython/commit/ff4e5c25666f63544071a6b075ae8b25c98b7a32
https://github.com/python/cpython/issues/105704
https://github.com/python/cpython/pull/129418
https://linux.oracle.com/cve/CVE-2025-0938.html
https://linux.oracle.com/errata/ELSA-2025-7109.html
https://mail.python.org/archives/list/[email protected]/thread/K4EUG6EKV6JYFIC24BASYOZS4M5XOQIB/
https://nvd.nist.gov/vuln/detail/CVE-2025-0938
https://security.netapp.com/advisory/ntap-20250314-0002/
https://ubuntu.com/security/notices/USN-7280-1
https://ubuntu.com/security/notices/USN-7280-2
https://ubuntu.com/security/notices/USN-7280-3
https://ubuntu.com/security/notices/USN-7348-1
https://ubuntu.com/security/notices/USN-7348-2
https://www.cve.org/CVERecord?id=CVE-2025-0938
|
| libpython3.11 |
CVE-2025-4516 |
MEDIUM |
3.11.2-6 |
|
http://www.openwall.com/lists/oss-security/2025/05/16/4
http://www.openwall.com/lists/oss-security/2025/05/19/1
https://access.redhat.com/security/cve/CVE-2025-4516
https://github.com/python/cpython/commit/4398b788ffc1f954a2c552da285477d42a571292
https://github.com/python/cpython/commit/5646648678295a44aa82636c6e92826651baf33a
https://github.com/python/cpython/commit/6279eb8c076d89d3739a6edb393e43c7929b429d
https://github.com/python/cpython/commit/69b4387f78f413e8c47572a85b3478c47eba8142
https://github.com/python/cpython/commit/73b3040f592436385007918887b7e2132aa8431f
https://github.com/python/cpython/commit/8d35fd1b34935221aff23a1ab69a429dd156be77
https://github.com/python/cpython/commit/9f69a58623bd01349a18ba0c7a9cb1dad6a51e8e
https://github.com/python/cpython/commit/9f69a58623bd01349a18ba0c7a9cb1dad6a51e8e (main)
https://github.com/python/cpython/commit/ab9893c40609935e0d40a6d2a7307ea51aec598b
https://github.com/python/cpython/issues/133767
https://github.com/python/cpython/pull/129648
https://mail.python.org/archives/list/[email protected]/thread/L75IPBBTSCYEF56I2M4KIW353BB3AY74/
https://nvd.nist.gov/vuln/detail/CVE-2025-4516
https://ubuntu.com/security/notices/USN-7570-1
https://www.cve.org/CVERecord?id=CVE-2025-4516
|
| libpython3.11 |
CVE-2025-6069 |
MEDIUM |
3.11.2-6 |
|
https://access.redhat.com/security/cve/CVE-2025-6069
https://github.com/python/cpython/commit/4455cbabf991e202185a25a631af206f60bbc949
https://github.com/python/cpython/commit/6eb6c5dbfb528bd07d77b60fd71fd05d81d45c41
https://github.com/python/cpython/commit/6eb6c5dbfb528bd07d77b60fd71fd05d81d45c41 (main)
https://github.com/python/cpython/commit/8d1b3dfa09135affbbf27fb8babcf3c11415df49
https://github.com/python/cpython/commit/ab0893fd5c579d9cea30841680e6d35fc478afb5
https://github.com/python/cpython/commit/d851f8e258c7328814943e923a7df81bca15df4b
https://github.com/python/cpython/commit/f3c6f882cddc8dc30320d2e73edf019e201394fc
https://github.com/python/cpython/commit/fdc9d214c01cb4588f540cfa03726bbf2a33fc15
https://github.com/python/cpython/issues/135462
https://github.com/python/cpython/pull/135464
https://mail.python.org/archives/list/[email protected]/thread/K5PIYLR6EP3WR7ZOKKYQUWEDNQVUXOYM/
https://nvd.nist.gov/vuln/detail/CVE-2025-6069
https://ubuntu.com/security/notices/USN-7710-1
https://www.cve.org/CVERecord?id=CVE-2025-6069
|
| libpython3.11 |
CVE-2025-8291 |
MEDIUM |
3.11.2-6 |
|
https://access.redhat.com/security/cve/CVE-2025-8291
https://github.com/python/cpython/commit/162997bb70e067668c039700141770687bc8f267
https://github.com/python/cpython/commit/1d29afb0d6218aa8fb5e1e4a6133a4778d89bb46
https://github.com/python/cpython/commit/333d4a6f4967d3ace91492a39ededbcf3faa76a6
https://github.com/python/cpython/commit/76437ac248ad8ca44e9bf697b02b1e2241df2196
https://github.com/python/cpython/commit/8392b2f0d35678407d9ce7d95655a5b77de161b4
https://github.com/python/cpython/commit/bca11ae7d575d87ed93f5dd6a313be6246e3e388
https://github.com/python/cpython/commit/d11e69d6203080e3ec450446bfed0516727b85c3
https://github.com/python/cpython/issues/139700
https://github.com/python/cpython/pull/139702
https://mail.python.org/archives/list/[email protected]/thread/QECOPWMTH4VPPJAXAH2BGTA4XADOP62G/
https://nvd.nist.gov/vuln/detail/CVE-2025-8291
https://www.cve.org/CVERecord?id=CVE-2025-8291
|
| libpython3.11 |
CVE-2024-11168 |
LOW |
3.11.2-6 |
3.11.2-6+deb12u5 |
https://access.redhat.com/errata/RHSA-2024:10779
https://access.redhat.com/security/cve/CVE-2024-11168
https://bugzilla.redhat.com/2321440
https://bugzilla.redhat.com/2325776
https://bugzilla.redhat.com/show_bug.cgi?id=2321440
https://bugzilla.redhat.com/show_bug.cgi?id=2325776
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11168
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9287
https://errata.almalinux.org/8/ALSA-2024-10779.html
https://errata.rockylinux.org/RLSA-2024:10779
https://github.com/python/cpython/commit/29f348e232e82938ba2165843c448c2b291504c5
https://github.com/python/cpython/commit/634ded45545ce8cbd6fd5d49785613dd7fa9b89e
https://github.com/python/cpython/commit/b2171a2fd41416cf68afd67460578631d755a550
https://github.com/python/cpython/commit/ddca2953191c67a12b1f19d6bca41016c6ae7132
https://github.com/python/cpython/issues/103848
https://github.com/python/cpython/pull/103849
https://linux.oracle.com/cve/CVE-2024-11168.html
https://linux.oracle.com/errata/ELSA-2024-10983.html
https://mail.python.org/archives/list/[email protected]/thread/XPWB6XVZ5G5KGEI63M4AWLIEUF5BPH4T/
https://nvd.nist.gov/vuln/detail/CVE-2024-11168
https://security.netapp.com/advisory/ntap-20250411-0004/
https://ubuntu.com/security/notices/USN-7218-1
https://ubuntu.com/security/notices/USN-7280-3
https://ubuntu.com/security/notices/USN-7348-1
https://ubuntu.com/security/notices/USN-7488-1
https://www.cve.org/CVERecord?id=CVE-2024-11168
|
| libpython3.11 |
CVE-2024-4032 |
LOW |
3.11.2-6 |
3.11.2-6+deb12u3 |
http://www.openwall.com/lists/oss-security/2024/06/17/3
https://access.redhat.com/errata/RHSA-2024:6975
https://access.redhat.com/security/cve/CVE-2024-4032
https://bugzilla.redhat.com/2292921
https://bugzilla.redhat.com/2302255
https://bugzilla.redhat.com/2309426
https://bugzilla.redhat.com/show_bug.cgi?id=2292921
https://bugzilla.redhat.com/show_bug.cgi?id=2302255
https://bugzilla.redhat.com/show_bug.cgi?id=2309426
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6923
https://errata.almalinux.org/8/ALSA-2024-6975.html
https://errata.rockylinux.org/RLSA-2024:6975
https://github.com/advisories/GHSA-mh6q-v4mp-2cc7
https://github.com/python/cpython/commit/22adf29da8d99933ffed8647d3e0726edd16f7f8
https://github.com/python/cpython/commit/40d75c2b7f5c67e254d0a025e0f2e2c7ada7f69f
https://github.com/python/cpython/commit/40d75c2b7f5c67e254d0a025e0f2e2c7ada7f69f (3.13)
https://github.com/python/cpython/commit/895f7e2ac23eff4743143beef0f0c5ac71ea27d3
https://github.com/python/cpython/commit/ba431579efdcbaed7a96f2ac4ea0775879a332fb
https://github.com/python/cpython/commit/c62c9e518b784fe44432a3f4fc265fb95b651906
https://github.com/python/cpython/commit/f86b17ac511e68192ba71f27e752321a3252cee3
https://github.com/python/cpython/issues/113171
https://github.com/python/cpython/pull/113179
https://linux.oracle.com/cve/CVE-2024-4032.html
https://linux.oracle.com/errata/ELSA-2024-9190.html
https://mail.python.org/archives/list/[email protected]/thread/NRUHDUS2IV2USIZM2CVMSFL6SCKU3RZA/
https://nvd.nist.gov/vuln/detail/CVE-2024-4032
https://security.netapp.com/advisory/ntap-20240726-0004/
https://ubuntu.com/security/notices/USN-6928-1
https://ubuntu.com/security/notices/USN-6941-1
https://ubuntu.com/security/notices/USN-7348-1
https://www.cve.org/CVERecord?id=CVE-2024-4032
https://www.iana.org/assignments/iana-ipv4-special-registry/iana-ipv4-special-registry.xhtml
https://www.iana.org/assignments/iana-ipv6-special-registry/iana-ipv6-special-registry.xhtml
|
| libpython3.11 |
CVE-2025-1795 |
LOW |
3.11.2-6 |
3.11.2-6+deb12u6 |
https://access.redhat.com/security/cve/CVE-2025-1795
https://github.com/python/cpython/commit/09fab93c3d857496c0bd162797fab816c311ee48
https://github.com/python/cpython/commit/70754d21c288535e86070ca7a6e90dcb670b8593
https://github.com/python/cpython/commit/9148b77e0af91cdacaa7fe3dfac09635c3fe9a74
https://github.com/python/cpython/issues/100884
https://github.com/python/cpython/pull/100885
https://github.com/python/cpython/pull/119099
https://mail.python.org/archives/list/[email protected]/thread/MB62IZMEC3UM6SGHP5LET5JX2Y7H4ZUR/
https://nvd.nist.gov/vuln/detail/CVE-2025-1795
https://ubuntu.com/security/notices/USN-7570-1
https://www.cve.org/CVERecord?id=CVE-2025-1795
|
| libpython3.11-minimal |
CVE-2023-24329 |
HIGH |
3.11.2-6 |
3.11.2-6+deb12u2 |
https://access.redhat.com/errata/RHSA-2023:3811
https://access.redhat.com/security/cve/CVE-2023-24329
https://bugzilla.redhat.com/2173917
https://bugzilla.redhat.com/show_bug.cgi?id=2173917
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24329
https://errata.almalinux.org/8/ALSA-2023-3811.html
https://errata.rockylinux.org/RLSA-2023:3595
https://github.com/python/cpython/issues/102153
https://github.com/python/cpython/pull/99421
https://github.com/python/cpython/pull/99446 (backport for 3.11 branch)
https://linux.oracle.com/cve/CVE-2023-24329.html
https://linux.oracle.com/errata/ELSA-2023-3811.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6PEVICI7YNGGMSL3UCMWGE66QFLATH72/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DSL6NSOAXWBJJ67XPLSSC74MNKZF3BBO/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EM2XLZSTXG44TMFXF4E6VTGKR2MQCW3G/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F2NY75GFDZ5T6YPN44D3VMFT5SUVTOTG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GR5US3BYILYJ4SKBV6YBNPRUBAL5P2CN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H23OSKC6UG6IWOQAUPW74YUHWRWVXJP7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZTLGV2HYFF4AMYJL25VDIGAIHCU7UPA/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LWC4WGXER5P6Q75RFGL7QUTPP3N5JR7T/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZEHSXSCMA4WWQKXT6QV7AAR6SWNZ2VP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O5SP4RT3RRS434ZS2HQKQJ3VZW7YPKYR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OHHJHJRLEF3TDT2K3676CAUVRDD4CCMR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEUN6T22UJFXR7J5F6UUHCXXPKJ2DVHI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PURM5CFDABEWAIWZFD2MQ7ZJGCPYSQ44/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q3J5N24ECS4B6MJDRO6UAYU6GPLYBDCL/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QRQHN7RWJQJHYP6E5EKESOYP5VDSHZG4/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RA2MBEEES6L46OD64OBSVUUMGKNGMOWW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4IDB5OAR5Y4UK3HLMZBW4WEL2B7YFMJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TZH26JGNZ5XYPZ5SAU3NKSBSPRE5OHTG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U2MZOJYGFCB5PPT6AKMAU72N7QOYWLBP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UONZWLB4QVLQIY5CPDLEUEKH6WX4VQMC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WTOAUJNDWZDRWVSXJ354AYZYKRMT56HU/
https://nvd.nist.gov/vuln/detail/CVE-2023-24329
https://pointernull.com/security/python-url-parse-problem.html
https://security.netapp.com/advisory/ntap-20230324-0004/
https://ubuntu.com/security/notices/USN-5888-1
https://ubuntu.com/security/notices/USN-5960-1
https://ubuntu.com/security/notices/USN-6139-1
https://ubuntu.com/security/notices/USN-6891-1
https://ubuntu.com/security/notices/USN-7180-1
https://www.cve.org/CVERecord?id=CVE-2023-24329
https://www.kb.cert.org/vuls/id/127587
|
| libpython3.11-minimal |
CVE-2023-41105 |
HIGH |
3.11.2-6 |
3.11.2-6+deb12u2 |
https://access.redhat.com/errata/RHSA-2023:7024
https://access.redhat.com/security/cve/CVE-2023-41105
https://bugzilla.redhat.com/2235795
https://bugzilla.redhat.com/263261
https://errata.almalinux.org/8/ALSA-2023-7024.html
https://github.com/python/cpython/issues/106242
https://github.com/python/cpython/pull/107981
https://github.com/python/cpython/pull/107982
https://github.com/python/cpython/pull/107983
https://linux.oracle.com/cve/CVE-2023-41105.html
https://linux.oracle.com/errata/ELSA-2023-7024.html
https://mail.python.org/archives/list/security-announce%40python.org/thread/D6CDW3ZZC5D444YGL3VQUY6D4ECMCQLD/
https://mail.python.org/archives/list/[email protected]/thread/D6CDW3ZZC5D444YGL3VQUY6D4ECMCQLD/
https://nvd.nist.gov/vuln/detail/CVE-2023-41105
https://security.netapp.com/advisory/ntap-20231006-0015/
https://ubuntu.com/security/notices/USN-6547-1
https://ubuntu.com/security/notices/USN-6891-1
https://www.cve.org/CVERecord?id=CVE-2023-41105
|
| libpython3.11-minimal |
CVE-2023-6597 |
HIGH |
3.11.2-6 |
3.11.2-6+deb12u2 |
http://www.openwall.com/lists/oss-security/2024/03/20/5
https://access.redhat.com/errata/RHSA-2024:4058
https://access.redhat.com/security/cve/CVE-2023-6597
https://bugzilla.redhat.com/2276518
https://bugzilla.redhat.com/2276525
https://bugzilla.redhat.com/show_bug.cgi?id=2276518
https://bugzilla.redhat.com/show_bug.cgi?id=2276525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6597
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0450
https://discuss.python.org/t/python-3-10-14-3-9-19-and-3-8-19-is-now-available/48993
https://errata.almalinux.org/8/ALSA-2024-4058.html
https://errata.rockylinux.org/RLSA-2024:4078
https://github.com/advisories/GHSA-797f-63wg-8chv
https://github.com/python/cpython/commit/02a9259c717738dfe6b463c44d7e17f2b6d2cb3a
https://github.com/python/cpython/commit/5585334d772b253a01a6730e8202ffb1607c3d25
https://github.com/python/cpython/commit/6ceb8aeda504b079fef7a57b8d81472f15cdd9a5
https://github.com/python/cpython/commit/81c16cd94ec38d61aa478b9a452436dc3b1b524d
https://github.com/python/cpython/commit/8eaeefe49d179ca4908d052745e3bb8b6f238f82
https://github.com/python/cpython/commit/d54e22a669ae6e987199bb5d2c69bb5a46b0083b
https://github.com/python/cpython/issues/91133
https://linux.oracle.com/cve/CVE-2023-6597.html
https://linux.oracle.com/errata/ELSA-2024-4078.html
https://lists.debian.org/debian-lts-announce/2024/03/msg00025.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/T3IGRX54M7RNCQOXVQO5KQKTGWCOABIM/
https://lists.fedoraproject.org/archives/list/[email protected]/message/U5VHWS52HGD743C47UMCSAK2A773M2YE/
https://mail.python.org/archives/list/[email protected]/thread/Q5C6ATFC67K53XFV4KE45325S7NS62LD/
https://nvd.nist.gov/vuln/detail/CVE-2023-6597
https://seclists.org/oss-sec/2024/q1/240
https://ubuntu.com/security/notices/USN-6891-1
https://www.cve.org/CVERecord?id=CVE-2023-6597
|
| libpython3.11-minimal |
CVE-2024-6232 |
HIGH |
3.11.2-6 |
3.11.2-6+deb12u4 |
http://www.openwall.com/lists/oss-security/2024/09/03/5
https://access.redhat.com/errata/RHSA-2024:8838
https://access.redhat.com/security/cve/CVE-2024-6232
https://bugzilla.redhat.com/2309426
https://bugzilla.redhat.com/show_bug.cgi?id=2309426
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6232
https://errata.almalinux.org/8/ALSA-2024-8838.html
https://errata.rockylinux.org/RLSA-2024:8446
https://github.com/python/cpython/commit/34ddb64d088dd7ccc321f6103d23153256caa5d4
https://github.com/python/cpython/commit/4eaf4891c12589e3c7bdad5f5b076e4c8392dd06
https://github.com/python/cpython/commit/743acbe872485dc18df4d8ab2dc7895187f062c4
https://github.com/python/cpython/commit/7d1f50cd92ff7e10a1c15a8f591dde8a6843a64d
https://github.com/python/cpython/commit/b4225ca91547aa97ed3aca391614afbb255bc877
https://github.com/python/cpython/commit/d449caf8a179e3b954268b3a88eb9170be3c8fbf
https://github.com/python/cpython/commit/ed3a49ea734ada357ff4442996fd4ae71d253373
https://github.com/python/cpython/issues/121285
https://github.com/python/cpython/pull/121286
https://linux.oracle.com/cve/CVE-2024-6232.html
https://linux.oracle.com/errata/ELSA-2025-1750.html
https://mail.python.org/archives/list/[email protected]/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/
https://nvd.nist.gov/vuln/detail/CVE-2024-6232
https://security.netapp.com/advisory/ntap-20241018-0007/
https://ubuntu.com/security/notices/USN-7015-1
https://ubuntu.com/security/notices/USN-7015-2
https://ubuntu.com/security/notices/USN-7015-5
https://ubuntu.com/security/notices/USN-7488-1
https://www.cve.org/CVERecord?id=CVE-2024-6232
|
| libpython3.11-minimal |
CVE-2024-7592 |
HIGH |
3.11.2-6 |
3.11.2-6+deb12u5 |
https://access.redhat.com/errata/RHSA-2025:3634
https://access.redhat.com/security/cve/CVE-2024-7592
https://errata.almalinux.org/9/ALSA-2025-3634.html
https://github.com/python/cpython/commit/391e5626e3ee5af267b97e37abc7475732e67621
https://github.com/python/cpython/commit/44e458357fca05ca0ae2658d62c8c595b048b5ef
https://github.com/python/cpython/commit/a77ab24427a18bff817025adb03ca920dc3f1a06
https://github.com/python/cpython/commit/b2f11ca7667e4d57c71c1c88b255115f16042d9a
https://github.com/python/cpython/commit/d4ac921a4b081f7f996a5d2b101684b67ba0ed7f
https://github.com/python/cpython/commit/d662e2db2605515a767f88ad48096b8ac623c774
https://github.com/python/cpython/commit/dcc3eaef98cd94d6cb6cb0f44bd1c903d04f33b1
https://github.com/python/cpython/issues/123067
https://github.com/python/cpython/pull/123075
https://linux.oracle.com/cve/CVE-2024-7592.html
https://linux.oracle.com/errata/ELSA-2025-3634.html
https://mail.python.org/archives/list/[email protected]/thread/HXJAAAALNUNGCQUS2W7WR6GFIZIHFOOK/
https://nvd.nist.gov/vuln/detail/CVE-2024-7592
https://security.netapp.com/advisory/ntap-20241018-0006/
https://ubuntu.com/security/notices/USN-7015-1
https://ubuntu.com/security/notices/USN-7015-2
https://www.cve.org/CVERecord?id=CVE-2024-7592
|
| libpython3.11-minimal |
CVE-2024-9287 |
HIGH |
3.11.2-6 |
3.11.2-6+deb12u5 |
https://access.redhat.com/errata/RHSA-2024:10980
https://access.redhat.com/security/cve/CVE-2024-9287
https://bugzilla.redhat.com/2321440
https://bugzilla.redhat.com/2330804
https://bugzilla.redhat.com/show_bug.cgi?id=2321440
https://bugzilla.redhat.com/show_bug.cgi?id=2325776
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11168
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9287
https://errata.almalinux.org/8/ALSA-2024-10980.html
https://errata.rockylinux.org/RLSA-2024:10779
https://github.com/python/cpython/commit/633555735a023d3e4d92ba31da35b1205f9ecbd7
https://github.com/python/cpython/commit/8450b2482586857d689b6658f08de9c8179af7db
https://github.com/python/cpython/commit/9286ab3a107ea41bd3f3c3682ce2512692bdded8
https://github.com/python/cpython/commit/ae961ae94bf19c8f8c7fbea3d1c25cc55ce8ae97
https://github.com/python/cpython/commit/d48cc82ed25e26b02eb97c6263d95dcaa1e9111b
https://github.com/python/cpython/commit/e52095a0c1005a87eed2276af7a1f2f66e2b6483
https://github.com/python/cpython/issues/124651
https://github.com/python/cpython/pull/124712
https://github.com/python/cpython/pull/124712/commits/b6a3bbd155c558cdcda482629073e492437db3d0
https://linux.oracle.com/cve/CVE-2024-9287.html
https://linux.oracle.com/errata/ELSA-2024-11111.html
https://mail.python.org/archives/list/[email protected]/thread/RSPJ2B5JL22FG3TKUJ7D7DQ4N5JRRBZL/
https://nvd.nist.gov/vuln/detail/CVE-2024-9287
https://security.netapp.com/advisory/ntap-20250425-0006/
https://ubuntu.com/security/notices/USN-7116-1
https://ubuntu.com/security/notices/USN-7348-1
https://ubuntu.com/security/notices/USN-7488-1
https://www.cve.org/CVERecord?id=CVE-2024-9287
|
| libpython3.11-minimal |
CVE-2025-8194 |
HIGH |
3.11.2-6 |
|
https://access.redhat.com/errata/RHSA-2025:14900
https://access.redhat.com/security/cve/CVE-2025-8194
https://bugzilla.redhat.com/2366982
https://bugzilla.redhat.com/2384043
https://bugzilla.redhat.com/show_bug.cgi?id=2384043
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8194
https://errata.almalinux.org/8/ALSA-2025-14900.html
https://errata.rockylinux.org/RLSA-2025:14841
https://gist.github.com/sethmlarson/1716ac5b82b73dbcbf23ad2eff8b33e1
https://github.com/python/cpython/commit/57f5981d6260ed21266e0c26951b8564cc252bc2
https://github.com/python/cpython/commit/7040aa54f14676938970e10c5f74ea93cd56aa38
https://github.com/python/cpython/commit/73f03e4808206f71eb6b92c579505a220942ef19
https://github.com/python/cpython/commit/b4ec17488eedec36d3c05fec127df71c0071f6cb
https://github.com/python/cpython/commit/c9d9f78feb1467e73fd29356c040bde1c104f29f
https://github.com/python/cpython/commit/cdae923ffe187d6ef916c0f665a31249619193fe
https://github.com/python/cpython/commit/fbc2a0ca9ac8aff6887f8ddf79b87b4510277227
https://github.com/python/cpython/issues/130577
https://github.com/python/cpython/pull/137027
https://linux.oracle.com/cve/CVE-2025-8194.html
https://linux.oracle.com/errata/ELSA-2025-16117.html
https://mail.python.org/archives/list/[email protected]/thread/ZULLF3IZ726XP5EY7XJ7YIN3K5MDYR2D/
https://nvd.nist.gov/vuln/detail/CVE-2025-8194
https://ubuntu.com/security/notices/USN-7710-1
https://ubuntu.com/security/notices/USN-7710-2
https://www.cve.org/CVERecord?id=CVE-2025-8194
|
| libpython3.11-minimal |
CVE-2023-27043 |
MEDIUM |
3.11.2-6 |
3.11.2-6+deb12u5 |
http://python.org
https://access.redhat.com/articles/7051467
https://access.redhat.com/errata/RHSA-2024:3062
https://access.redhat.com/security/cve/CVE-2023-27043
https://bugzilla.redhat.com/2196183
https://bugzilla.redhat.com/show_bug.cgi?id=2196183
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27043
https://errata.almalinux.org/8/ALSA-2024-3062.html
https://errata.rockylinux.org/RLSA-2024:0256
https://github.com/python/cpython/issues/102988
https://github.com/python/cpython/pull/102990
https://github.com/python/cpython/pull/105127
https://linux.oracle.com/cve/CVE-2023-27043.html
https://linux.oracle.com/errata/ELSA-2024-3062.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZAEFSFZDNBNJPNOUTLG5COISGQDLMGV/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/75DTHSTNOFFNAWHXKMDXS7EJWC6W2FUC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ARI7VDSNTQVXRQFM6IK5GSSLEIYV4VZH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BQAKLUJMHFGVBRDPEY57BJGNCE5UUPHW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HXYVPEZUA3465AEFX5JVFVP7KIFZMF3N/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6M5I6OQHJABNEYY555HUMMKX3Y4P25Z/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NEUNZSZ3CVSM2QWVYH3N2XGOCDWNYUA3/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORLXS5YTKN65E2Q2NWKXMFS5FWQHRNZW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2MAICLFDDO3QVNHTZ2OCERZQ34R2PIC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2W2BZQIHMCKRI5FNBJERFYMS5PK6TAH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PHVGRKQAGANCSGFI3QMYOCIMS4IFOZA5/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU6Y2S5CBN5BWCBDAJFTGIBZLK3S2G3J/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QDRDDPDN3VFIYXJIYEABY6USX5EU66AG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDDC2VOX7OQC6OHMYTVD4HLFZIV6PYBC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SINP4OVYNB2AGDYI2GS37EMW3H3F7XPZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SOX7BCN6YL7B3RFPEEXPIU5CMTEHJOKR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZXC32CJ7TWDPJO6GY2XIQRO7JZX5FLP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWMBD4LNHWEXRI6YVFWJMTJQUL5WOFTS/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YQVY5C5REXWJIORJIL2FIL3ALOEJEF72/
https://lists.fedoraproject.org/archives/list/[email protected]/message/4ZAEFSFZDNBNJPNOUTLG5COISGQDLMGV/
https://lists.fedoraproject.org/archives/list/[email protected]/message/75DTHSTNOFFNAWHXKMDXS7EJWC6W2FUC/
https://lists.fedoraproject.org/archives/list/[email protected]/message/ARI7VDSNTQVXRQFM6IK5GSSLEIYV4VZH/
https://lists.fedoraproject.org/archives/list/[email protected]/message/BQAKLUJMHFGVBRDPEY57BJGNCE5UUPHW/
https://lists.fedoraproject.org/archives/list/[email protected]/message/HXYVPEZUA3465AEFX5JVFVP7KIFZMF3N/
https://lists.fedoraproject.org/archives/list/[email protected]/message/N6M5I6OQHJABNEYY555HUMMKX3Y4P25Z/
https://lists.fedoraproject.org/archives/list/[email protected]/message/NEUNZSZ3CVSM2QWVYH3N2XGOCDWNYUA3/
https://lists.fedoraproject.org/archives/list/[email protected]/message/ORLXS5YTKN65E2Q2NWKXMFS5FWQHRNZW/
https://lists.fedoraproject.org/archives/list/[email protected]/message/P2MAICLFDDO3QVNHTZ2OCERZQ34R2PIC/
https://lists.fedoraproject.org/archives/list/[email protected]/message/P2W2BZQIHMCKRI5FNBJERFYMS5PK6TAH/
https://lists.fedoraproject.org/archives/list/[email protected]/message/PHVGRKQAGANCSGFI3QMYOCIMS4IFOZA5/
https://lists.fedoraproject.org/archives/list/[email protected]/message/PU6Y2S5CBN5BWCBDAJFTGIBZLK3S2G3J/
https://lists.fedoraproject.org/archives/list/[email protected]/message/QDRDDPDN3VFIYXJIYEABY6USX5EU66AG/
https://lists.fedoraproject.org/archives/list/[email protected]/message/RDDC2VOX7OQC6OHMYTVD4HLFZIV6PYBC/
https://lists.fedoraproject.org/archives/list/[email protected]/message/SINP4OVYNB2AGDYI2GS37EMW3H3F7XPZ/
https://lists.fedoraproject.org/archives/list/[email protected]/message/VZXC32CJ7TWDPJO6GY2XIQRO7JZX5FLP/
https://lists.fedoraproject.org/archives/list/[email protected]/message/XWMBD4LNHWEXRI6YVFWJMTJQUL5WOFTS/
https://lists.fedoraproject.org/archives/list/[email protected]/message/YQVY5C5REXWJIORJIL2FIL3ALOEJEF72/
https://nvd.nist.gov/vuln/detail/CVE-2023-27043
https://python-security.readthedocs.io/vuln/email-parseaddr-realname.html
https://security.netapp.com/advisory/ntap-20230601-0003/
https://ubuntu.com/security/notices/USN-7015-1
https://ubuntu.com/security/notices/USN-7015-3
https://ubuntu.com/security/notices/USN-7015-4
https://ubuntu.com/security/notices/USN-7015-7
https://www.cve.org/CVERecord?id=CVE-2023-27043
|
| libpython3.11-minimal |
CVE-2023-40217 |
MEDIUM |
3.11.2-6 |
3.11.2-6+deb12u2 |
https://access.redhat.com/errata/RHSA-2023:5998
https://access.redhat.com/security/cve/CVE-2023-40217
https://bugzilla.redhat.com/2235789
https://bugzilla.redhat.com/show_bug.cgi?id=2235789
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40217
https://errata.almalinux.org/8/ALSA-2023-5998.html
https://errata.rockylinux.org/RLSA-2023:5997
https://github.com/python/cpython/commit/0cb0c238d520a8718e313b52cffc356a5a7561bf (main)
https://github.com/python/cpython/commit/256586ab8776e4526ca594b4866b9a3492e628f1 (3.12)
https://github.com/python/cpython/commit/264b1dacc67346efa0933d1e63f622676e0ed96b (3.9)
https://github.com/python/cpython/commit/37d7180cb647f0bed0c1caab0037f3bc82e2af96 (3.10)
https://github.com/python/cpython/commit/75a875e0df0530b75b1470d797942f90f4a718d3 (3.11)
https://github.com/python/cpython/issues/108310
https://github.com/python/cpython/pull/108315
https://linux.oracle.com/cve/CVE-2023-40217.html
https://linux.oracle.com/errata/ELSA-2023-6885.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html
https://mail.python.org/archives/list/security-announce%40python.org/thread/PEPLII27KYHLF4AK3ZQGKYNCRERG4YXY/
https://mail.python.org/archives/list/[email protected]/thread/PEPLII27KYHLF4AK3ZQGKYNCRERG4YXY/
https://nvd.nist.gov/vuln/detail/CVE-2023-40217
https://security.netapp.com/advisory/ntap-20231006-0014/
https://ubuntu.com/security/notices/USN-6513-1
https://ubuntu.com/security/notices/USN-6513-2
https://ubuntu.com/security/notices/USN-6891-1
https://ubuntu.com/security/notices/USN-7180-1
https://www.cve.org/CVERecord?id=CVE-2023-40217
https://www.python.org/dev/security/
|
| libpython3.11-minimal |
CVE-2024-0397 |
MEDIUM |
3.11.2-6 |
3.11.2-6+deb12u3 |
http://www.openwall.com/lists/oss-security/2024/06/17/2
https://access.redhat.com/security/cve/CVE-2024-0397
https://github.com/python/cpython/commit/01c37f1d0714f5822d34063ca7180b595abf589d
https://github.com/python/cpython/commit/29c97287d205bf2f410f4895ebce3f43b5160524
https://github.com/python/cpython/commit/37324b421b72b7bc9934e27aba85d48d4773002e
https://github.com/python/cpython/commit/542f3272f56f31ed04e74c40635a913fbc12d286
https://github.com/python/cpython/commit/b228655c227b2ca298a8ffac44d14ce3d22f6faa
https://github.com/python/cpython/commit/bce693111bff906ccf9281c22371331aaff766ab
https://github.com/python/cpython/commit/bce693111bff906ccf9281c22371331aaff766ab (3.13)
https://github.com/python/cpython/issues/114572
https://github.com/python/cpython/pull/114573
https://mail.python.org/archives/list/[email protected]/thread/BMAK5BCGKYWNJOACVUSLUF6SFGBIM4VP/
https://nvd.nist.gov/vuln/detail/CVE-2024-0397
https://security.netapp.com/advisory/ntap-20250411-0006/
https://ubuntu.com/security/notices/USN-6928-1
https://www.cve.org/CVERecord?id=CVE-2024-0397
|
| libpython3.11-minimal |
CVE-2024-0450 |
MEDIUM |
3.11.2-6 |
3.11.2-6+deb12u2 |
http://www.openwall.com/lists/oss-security/2024/03/20/5
https://access.redhat.com/errata/RHSA-2024:4243
https://access.redhat.com/security/cve/CVE-2024-0450
https://bugzilla.redhat.com/2276525
https://bugzilla.redhat.com/show_bug.cgi?id=2276518
https://bugzilla.redhat.com/show_bug.cgi?id=2276525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6597
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0450
https://discuss.python.org/t/python-3-10-14-3-9-19-and-3-8-19-is-now-available/48993
https://errata.almalinux.org/8/ALSA-2024-4243.html
https://errata.rockylinux.org/RLSA-2024:4078
https://github.com/python/cpython/commit/30fe5d853b56138dbec62432d370a1f99409fc85
https://github.com/python/cpython/commit/66363b9a7b9fe7c99eba3a185b74c5fdbf842eba
https://github.com/python/cpython/commit/70497218351ba44bffc8b571201ecb5652d84675
https://github.com/python/cpython/commit/a2c59992e9e8d35baba9695eb186ad6c6ff85c51
https://github.com/python/cpython/commit/a956e510f6336d5ae111ba429a61c3ade30a7549
https://github.com/python/cpython/commit/d05bac0b74153beb541b88b4fca33bf053990183
https://github.com/python/cpython/commit/fa181fcf2156f703347b03a3b1966ce47be8ab3b
https://github.com/python/cpython/issues/109858
https://linux.oracle.com/cve/CVE-2024-0450.html
https://linux.oracle.com/errata/ELSA-2024-9192.html
https://lists.debian.org/debian-lts-announce/2024/03/msg00024.html
https://lists.debian.org/debian-lts-announce/2024/03/msg00025.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/T3IGRX54M7RNCQOXVQO5KQKTGWCOABIM/
https://lists.fedoraproject.org/archives/list/[email protected]/message/U5VHWS52HGD743C47UMCSAK2A773M2YE/
https://mail.python.org/archives/list/[email protected]/thread/XELNUX2L3IOHBTFU7RQHCY6OUVEWZ2FG/
https://nvd.nist.gov/vuln/detail/CVE-2024-0450
https://seclists.org/oss-sec/2024/q1/240
https://security.netapp.com/advisory/ntap-20250411-0005/
https://ubuntu.com/security/notices/USN-6891-1
https://ubuntu.com/security/notices/USN-7212-1
https://www.bamsoftware.com/hacks/zipbomb/
https://www.cve.org/CVERecord?id=CVE-2024-0450
|
| libpython3.11-minimal |
CVE-2024-6923 |
MEDIUM |
3.11.2-6 |
3.11.2-6+deb12u5 |
http://www.openwall.com/lists/oss-security/2024/08/01/3
http://www.openwall.com/lists/oss-security/2024/08/02/2
https://access.redhat.com/errata/RHSA-2024:6975
https://access.redhat.com/security/cve/CVE-2024-6923
https://bugzilla.redhat.com/2292921
https://bugzilla.redhat.com/2302255
https://bugzilla.redhat.com/2309426
https://bugzilla.redhat.com/show_bug.cgi?id=2302255
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6923
https://errata.almalinux.org/8/ALSA-2024-6975.html
https://errata.rockylinux.org/RLSA-2024:6146
https://github.com/python/cpython/commit/06f28dc236708f72871c64d4bc4b4ea144c50147
https://github.com/python/cpython/commit/097633981879b3c9de9a1dd120d3aa585ecc2384
https://github.com/python/cpython/commit/4766d1200fdf8b6728137aa2927a297e224d5fa7
https://github.com/python/cpython/commit/4aaa4259b5a6e664b7316a4d60bdec7ee0f124d0
https://github.com/python/cpython/commit/b158a76ce094897c870fb6b3de62887b7ccc33f1
https://github.com/python/cpython/commit/f7be505d137a22528cb0fc004422c0081d5d90e6
https://github.com/python/cpython/commit/f7c0f09e69e950cf3c5ada9dbde93898eb975533
https://github.com/python/cpython/issues/121650
https://github.com/python/cpython/pull/122233
https://linux.oracle.com/cve/CVE-2024-6923.html
https://linux.oracle.com/errata/ELSA-2024-6975.html
https://lists.debian.org/debian-lts-announce/2025/01/msg00005.html
https://mail.python.org/archives/list/[email protected]/thread/QH3BUOE2DYQBWP7NAQ7UNHPPOELKISRW/
https://nvd.nist.gov/vuln/detail/CVE-2024-6923
https://security.netapp.com/advisory/ntap-20240926-0003/
https://ubuntu.com/security/notices/USN-7015-1
https://ubuntu.com/security/notices/USN-7015-5
https://www.cve.org/CVERecord?id=CVE-2024-6923
|
| libpython3.11-minimal |
CVE-2024-8088 |
MEDIUM |
3.11.2-6 |
3.11.2-6+deb12u3 |
http://www.openwall.com/lists/oss-security/2024/08/22/1
http://www.openwall.com/lists/oss-security/2024/08/22/4
http://www.openwall.com/lists/oss-security/2024/08/23/1
http://www.openwall.com/lists/oss-security/2024/08/23/2
https://access.redhat.com/errata/RHSA-2024:6962
https://access.redhat.com/security/cve/CVE-2024-8088
https://bugzilla.redhat.com/2292921
https://bugzilla.redhat.com/2302255
https://bugzilla.redhat.com/2307370
https://bugzilla.redhat.com/show_bug.cgi?id=2292921
https://bugzilla.redhat.com/show_bug.cgi?id=2302255
https://bugzilla.redhat.com/show_bug.cgi?id=2307370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6923
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8088
https://errata.almalinux.org/8/ALSA-2024-6962.html
https://errata.rockylinux.org/RLSA-2024:6962
https://github.com/python/cpython/commit/0aa1ee22ab6e204e9d3d0e9dd63ea648ed691ef1
https://github.com/python/cpython/commit/2231286d78d328c2f575e0b05b16fe447d1656d6
https://github.com/python/cpython/commit/795f2597a4be988e2bb19b69ff9958e981cb894e
https://github.com/python/cpython/commit/7bc367e464ce50b956dd232c1dfa1cad4e7fb814
https://github.com/python/cpython/commit/7e8883a3f04d308302361aeffc73e0e9837f19d4
https://github.com/python/cpython/commit/8c7348939d8a3ecd79d630075f6be1b0c5b41f64
https://github.com/python/cpython/commit/95b073bddefa6243effa08e131e297c0383e7f6a
https://github.com/python/cpython/commit/962055268ed4f2ca1d717bfc8b6385de50a23ab7
https://github.com/python/cpython/commit/9cd03263100ddb1657826cc4a71470786cab3932
https://github.com/python/cpython/commit/dcc5182f27c1500006a1ef78e10613bb45788dea
https://github.com/python/cpython/commit/e0264a61119d551658d9445af38323ba94fc16db
https://github.com/python/cpython/commit/fc0b8259e693caa8400fa8b6ac1e494e47ea7798
https://github.com/python/cpython/issues/122905
https://github.com/python/cpython/issues/123270
https://github.com/python/cpython/pull/122906
https://linux.oracle.com/cve/CVE-2024-8088.html
https://linux.oracle.com/errata/ELSA-2024-9371.html
https://mail.python.org/archives/list/[email protected]/thread/GNFCKVI4TCATKQLALJ5SN4L4CSPSMILU/
https://nvd.nist.gov/vuln/detail/CVE-2024-8088
https://security.netapp.com/advisory/ntap-20241011-0010/
https://ubuntu.com/security/notices/USN-7015-1
https://www.cve.org/CVERecord?id=CVE-2024-8088
|
| libpython3.11-minimal |
CVE-2025-0938 |
MEDIUM |
3.11.2-6 |
3.11.2-6+deb12u6 |
https://access.redhat.com/errata/RHSA-2025:7109
https://access.redhat.com/security/cve/CVE-2025-0938
https://bugzilla.redhat.com/2343237
https://errata.almalinux.org/9/ALSA-2025-7109.html
https://github.com/python/cpython/commit/526617ed68cde460236c973e5d0a8bad4de896ba
https://github.com/python/cpython/commit/90e526ae67b172ed7c6c56e7edad36263b0f9403
https://github.com/python/cpython/commit/a7084f6075c9595ba60119ce8c62f1496f50c568
https://github.com/python/cpython/commit/b8b4b713c5f8ec0958c7ef8d29d6711889bc94ab
https://github.com/python/cpython/commit/d89a5f6a6e65511a5f6e0618c4c30a7aa5aba56a
https://github.com/python/cpython/commit/ff4e5c25666f63544071a6b075ae8b25c98b7a32
https://github.com/python/cpython/issues/105704
https://github.com/python/cpython/pull/129418
https://linux.oracle.com/cve/CVE-2025-0938.html
https://linux.oracle.com/errata/ELSA-2025-7109.html
https://mail.python.org/archives/list/[email protected]/thread/K4EUG6EKV6JYFIC24BASYOZS4M5XOQIB/
https://nvd.nist.gov/vuln/detail/CVE-2025-0938
https://security.netapp.com/advisory/ntap-20250314-0002/
https://ubuntu.com/security/notices/USN-7280-1
https://ubuntu.com/security/notices/USN-7280-2
https://ubuntu.com/security/notices/USN-7280-3
https://ubuntu.com/security/notices/USN-7348-1
https://ubuntu.com/security/notices/USN-7348-2
https://www.cve.org/CVERecord?id=CVE-2025-0938
|
| libpython3.11-minimal |
CVE-2025-4516 |
MEDIUM |
3.11.2-6 |
|
http://www.openwall.com/lists/oss-security/2025/05/16/4
http://www.openwall.com/lists/oss-security/2025/05/19/1
https://access.redhat.com/security/cve/CVE-2025-4516
https://github.com/python/cpython/commit/4398b788ffc1f954a2c552da285477d42a571292
https://github.com/python/cpython/commit/5646648678295a44aa82636c6e92826651baf33a
https://github.com/python/cpython/commit/6279eb8c076d89d3739a6edb393e43c7929b429d
https://github.com/python/cpython/commit/69b4387f78f413e8c47572a85b3478c47eba8142
https://github.com/python/cpython/commit/73b3040f592436385007918887b7e2132aa8431f
https://github.com/python/cpython/commit/8d35fd1b34935221aff23a1ab69a429dd156be77
https://github.com/python/cpython/commit/9f69a58623bd01349a18ba0c7a9cb1dad6a51e8e
https://github.com/python/cpython/commit/9f69a58623bd01349a18ba0c7a9cb1dad6a51e8e (main)
https://github.com/python/cpython/commit/ab9893c40609935e0d40a6d2a7307ea51aec598b
https://github.com/python/cpython/issues/133767
https://github.com/python/cpython/pull/129648
https://mail.python.org/archives/list/[email protected]/thread/L75IPBBTSCYEF56I2M4KIW353BB3AY74/
https://nvd.nist.gov/vuln/detail/CVE-2025-4516
https://ubuntu.com/security/notices/USN-7570-1
https://www.cve.org/CVERecord?id=CVE-2025-4516
|
| libpython3.11-minimal |
CVE-2025-6069 |
MEDIUM |
3.11.2-6 |
|
https://access.redhat.com/security/cve/CVE-2025-6069
https://github.com/python/cpython/commit/4455cbabf991e202185a25a631af206f60bbc949
https://github.com/python/cpython/commit/6eb6c5dbfb528bd07d77b60fd71fd05d81d45c41
https://github.com/python/cpython/commit/6eb6c5dbfb528bd07d77b60fd71fd05d81d45c41 (main)
https://github.com/python/cpython/commit/8d1b3dfa09135affbbf27fb8babcf3c11415df49
https://github.com/python/cpython/commit/ab0893fd5c579d9cea30841680e6d35fc478afb5
https://github.com/python/cpython/commit/d851f8e258c7328814943e923a7df81bca15df4b
https://github.com/python/cpython/commit/f3c6f882cddc8dc30320d2e73edf019e201394fc
https://github.com/python/cpython/commit/fdc9d214c01cb4588f540cfa03726bbf2a33fc15
https://github.com/python/cpython/issues/135462
https://github.com/python/cpython/pull/135464
https://mail.python.org/archives/list/[email protected]/thread/K5PIYLR6EP3WR7ZOKKYQUWEDNQVUXOYM/
https://nvd.nist.gov/vuln/detail/CVE-2025-6069
https://ubuntu.com/security/notices/USN-7710-1
https://www.cve.org/CVERecord?id=CVE-2025-6069
|
| libpython3.11-minimal |
CVE-2025-8291 |
MEDIUM |
3.11.2-6 |
|
https://access.redhat.com/security/cve/CVE-2025-8291
https://github.com/python/cpython/commit/162997bb70e067668c039700141770687bc8f267
https://github.com/python/cpython/commit/1d29afb0d6218aa8fb5e1e4a6133a4778d89bb46
https://github.com/python/cpython/commit/333d4a6f4967d3ace91492a39ededbcf3faa76a6
https://github.com/python/cpython/commit/76437ac248ad8ca44e9bf697b02b1e2241df2196
https://github.com/python/cpython/commit/8392b2f0d35678407d9ce7d95655a5b77de161b4
https://github.com/python/cpython/commit/bca11ae7d575d87ed93f5dd6a313be6246e3e388
https://github.com/python/cpython/commit/d11e69d6203080e3ec450446bfed0516727b85c3
https://github.com/python/cpython/issues/139700
https://github.com/python/cpython/pull/139702
https://mail.python.org/archives/list/[email protected]/thread/QECOPWMTH4VPPJAXAH2BGTA4XADOP62G/
https://nvd.nist.gov/vuln/detail/CVE-2025-8291
https://www.cve.org/CVERecord?id=CVE-2025-8291
|
| libpython3.11-minimal |
CVE-2024-11168 |
LOW |
3.11.2-6 |
3.11.2-6+deb12u5 |
https://access.redhat.com/errata/RHSA-2024:10779
https://access.redhat.com/security/cve/CVE-2024-11168
https://bugzilla.redhat.com/2321440
https://bugzilla.redhat.com/2325776
https://bugzilla.redhat.com/show_bug.cgi?id=2321440
https://bugzilla.redhat.com/show_bug.cgi?id=2325776
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11168
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9287
https://errata.almalinux.org/8/ALSA-2024-10779.html
https://errata.rockylinux.org/RLSA-2024:10779
https://github.com/python/cpython/commit/29f348e232e82938ba2165843c448c2b291504c5
https://github.com/python/cpython/commit/634ded45545ce8cbd6fd5d49785613dd7fa9b89e
https://github.com/python/cpython/commit/b2171a2fd41416cf68afd67460578631d755a550
https://github.com/python/cpython/commit/ddca2953191c67a12b1f19d6bca41016c6ae7132
https://github.com/python/cpython/issues/103848
https://github.com/python/cpython/pull/103849
https://linux.oracle.com/cve/CVE-2024-11168.html
https://linux.oracle.com/errata/ELSA-2024-10983.html
https://mail.python.org/archives/list/[email protected]/thread/XPWB6XVZ5G5KGEI63M4AWLIEUF5BPH4T/
https://nvd.nist.gov/vuln/detail/CVE-2024-11168
https://security.netapp.com/advisory/ntap-20250411-0004/
https://ubuntu.com/security/notices/USN-7218-1
https://ubuntu.com/security/notices/USN-7280-3
https://ubuntu.com/security/notices/USN-7348-1
https://ubuntu.com/security/notices/USN-7488-1
https://www.cve.org/CVERecord?id=CVE-2024-11168
|
| libpython3.11-minimal |
CVE-2024-4032 |
LOW |
3.11.2-6 |
3.11.2-6+deb12u3 |
http://www.openwall.com/lists/oss-security/2024/06/17/3
https://access.redhat.com/errata/RHSA-2024:6975
https://access.redhat.com/security/cve/CVE-2024-4032
https://bugzilla.redhat.com/2292921
https://bugzilla.redhat.com/2302255
https://bugzilla.redhat.com/2309426
https://bugzilla.redhat.com/show_bug.cgi?id=2292921
https://bugzilla.redhat.com/show_bug.cgi?id=2302255
https://bugzilla.redhat.com/show_bug.cgi?id=2309426
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6923
https://errata.almalinux.org/8/ALSA-2024-6975.html
https://errata.rockylinux.org/RLSA-2024:6975
https://github.com/advisories/GHSA-mh6q-v4mp-2cc7
https://github.com/python/cpython/commit/22adf29da8d99933ffed8647d3e0726edd16f7f8
https://github.com/python/cpython/commit/40d75c2b7f5c67e254d0a025e0f2e2c7ada7f69f
https://github.com/python/cpython/commit/40d75c2b7f5c67e254d0a025e0f2e2c7ada7f69f (3.13)
https://github.com/python/cpython/commit/895f7e2ac23eff4743143beef0f0c5ac71ea27d3
https://github.com/python/cpython/commit/ba431579efdcbaed7a96f2ac4ea0775879a332fb
https://github.com/python/cpython/commit/c62c9e518b784fe44432a3f4fc265fb95b651906
https://github.com/python/cpython/commit/f86b17ac511e68192ba71f27e752321a3252cee3
https://github.com/python/cpython/issues/113171
https://github.com/python/cpython/pull/113179
https://linux.oracle.com/cve/CVE-2024-4032.html
https://linux.oracle.com/errata/ELSA-2024-9190.html
https://mail.python.org/archives/list/[email protected]/thread/NRUHDUS2IV2USIZM2CVMSFL6SCKU3RZA/
https://nvd.nist.gov/vuln/detail/CVE-2024-4032
https://security.netapp.com/advisory/ntap-20240726-0004/
https://ubuntu.com/security/notices/USN-6928-1
https://ubuntu.com/security/notices/USN-6941-1
https://ubuntu.com/security/notices/USN-7348-1
https://www.cve.org/CVERecord?id=CVE-2024-4032
https://www.iana.org/assignments/iana-ipv4-special-registry/iana-ipv4-special-registry.xhtml
https://www.iana.org/assignments/iana-ipv6-special-registry/iana-ipv6-special-registry.xhtml
|
| libpython3.11-minimal |
CVE-2025-1795 |
LOW |
3.11.2-6 |
3.11.2-6+deb12u6 |
https://access.redhat.com/security/cve/CVE-2025-1795
https://github.com/python/cpython/commit/09fab93c3d857496c0bd162797fab816c311ee48
https://github.com/python/cpython/commit/70754d21c288535e86070ca7a6e90dcb670b8593
https://github.com/python/cpython/commit/9148b77e0af91cdacaa7fe3dfac09635c3fe9a74
https://github.com/python/cpython/issues/100884
https://github.com/python/cpython/pull/100885
https://github.com/python/cpython/pull/119099
https://mail.python.org/archives/list/[email protected]/thread/MB62IZMEC3UM6SGHP5LET5JX2Y7H4ZUR/
https://nvd.nist.gov/vuln/detail/CVE-2025-1795
https://ubuntu.com/security/notices/USN-7570-1
https://www.cve.org/CVERecord?id=CVE-2025-1795
|
| libpython3.11-stdlib |
CVE-2023-24329 |
HIGH |
3.11.2-6 |
3.11.2-6+deb12u2 |
https://access.redhat.com/errata/RHSA-2023:3811
https://access.redhat.com/security/cve/CVE-2023-24329
https://bugzilla.redhat.com/2173917
https://bugzilla.redhat.com/show_bug.cgi?id=2173917
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24329
https://errata.almalinux.org/8/ALSA-2023-3811.html
https://errata.rockylinux.org/RLSA-2023:3595
https://github.com/python/cpython/issues/102153
https://github.com/python/cpython/pull/99421
https://github.com/python/cpython/pull/99446 (backport for 3.11 branch)
https://linux.oracle.com/cve/CVE-2023-24329.html
https://linux.oracle.com/errata/ELSA-2023-3811.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6PEVICI7YNGGMSL3UCMWGE66QFLATH72/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DSL6NSOAXWBJJ67XPLSSC74MNKZF3BBO/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EM2XLZSTXG44TMFXF4E6VTGKR2MQCW3G/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F2NY75GFDZ5T6YPN44D3VMFT5SUVTOTG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GR5US3BYILYJ4SKBV6YBNPRUBAL5P2CN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H23OSKC6UG6IWOQAUPW74YUHWRWVXJP7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZTLGV2HYFF4AMYJL25VDIGAIHCU7UPA/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LWC4WGXER5P6Q75RFGL7QUTPP3N5JR7T/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZEHSXSCMA4WWQKXT6QV7AAR6SWNZ2VP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O5SP4RT3RRS434ZS2HQKQJ3VZW7YPKYR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OHHJHJRLEF3TDT2K3676CAUVRDD4CCMR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEUN6T22UJFXR7J5F6UUHCXXPKJ2DVHI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PURM5CFDABEWAIWZFD2MQ7ZJGCPYSQ44/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q3J5N24ECS4B6MJDRO6UAYU6GPLYBDCL/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QRQHN7RWJQJHYP6E5EKESOYP5VDSHZG4/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RA2MBEEES6L46OD64OBSVUUMGKNGMOWW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4IDB5OAR5Y4UK3HLMZBW4WEL2B7YFMJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TZH26JGNZ5XYPZ5SAU3NKSBSPRE5OHTG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U2MZOJYGFCB5PPT6AKMAU72N7QOYWLBP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UONZWLB4QVLQIY5CPDLEUEKH6WX4VQMC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WTOAUJNDWZDRWVSXJ354AYZYKRMT56HU/
https://nvd.nist.gov/vuln/detail/CVE-2023-24329
https://pointernull.com/security/python-url-parse-problem.html
https://security.netapp.com/advisory/ntap-20230324-0004/
https://ubuntu.com/security/notices/USN-5888-1
https://ubuntu.com/security/notices/USN-5960-1
https://ubuntu.com/security/notices/USN-6139-1
https://ubuntu.com/security/notices/USN-6891-1
https://ubuntu.com/security/notices/USN-7180-1
https://www.cve.org/CVERecord?id=CVE-2023-24329
https://www.kb.cert.org/vuls/id/127587
|
| libpython3.11-stdlib |
CVE-2023-41105 |
HIGH |
3.11.2-6 |
3.11.2-6+deb12u2 |
https://access.redhat.com/errata/RHSA-2023:7024
https://access.redhat.com/security/cve/CVE-2023-41105
https://bugzilla.redhat.com/2235795
https://bugzilla.redhat.com/263261
https://errata.almalinux.org/8/ALSA-2023-7024.html
https://github.com/python/cpython/issues/106242
https://github.com/python/cpython/pull/107981
https://github.com/python/cpython/pull/107982
https://github.com/python/cpython/pull/107983
https://linux.oracle.com/cve/CVE-2023-41105.html
https://linux.oracle.com/errata/ELSA-2023-7024.html
https://mail.python.org/archives/list/security-announce%40python.org/thread/D6CDW3ZZC5D444YGL3VQUY6D4ECMCQLD/
https://mail.python.org/archives/list/[email protected]/thread/D6CDW3ZZC5D444YGL3VQUY6D4ECMCQLD/
https://nvd.nist.gov/vuln/detail/CVE-2023-41105
https://security.netapp.com/advisory/ntap-20231006-0015/
https://ubuntu.com/security/notices/USN-6547-1
https://ubuntu.com/security/notices/USN-6891-1
https://www.cve.org/CVERecord?id=CVE-2023-41105
|
| libpython3.11-stdlib |
CVE-2023-6597 |
HIGH |
3.11.2-6 |
3.11.2-6+deb12u2 |
http://www.openwall.com/lists/oss-security/2024/03/20/5
https://access.redhat.com/errata/RHSA-2024:4058
https://access.redhat.com/security/cve/CVE-2023-6597
https://bugzilla.redhat.com/2276518
https://bugzilla.redhat.com/2276525
https://bugzilla.redhat.com/show_bug.cgi?id=2276518
https://bugzilla.redhat.com/show_bug.cgi?id=2276525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6597
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0450
https://discuss.python.org/t/python-3-10-14-3-9-19-and-3-8-19-is-now-available/48993
https://errata.almalinux.org/8/ALSA-2024-4058.html
https://errata.rockylinux.org/RLSA-2024:4078
https://github.com/advisories/GHSA-797f-63wg-8chv
https://github.com/python/cpython/commit/02a9259c717738dfe6b463c44d7e17f2b6d2cb3a
https://github.com/python/cpython/commit/5585334d772b253a01a6730e8202ffb1607c3d25
https://github.com/python/cpython/commit/6ceb8aeda504b079fef7a57b8d81472f15cdd9a5
https://github.com/python/cpython/commit/81c16cd94ec38d61aa478b9a452436dc3b1b524d
https://github.com/python/cpython/commit/8eaeefe49d179ca4908d052745e3bb8b6f238f82
https://github.com/python/cpython/commit/d54e22a669ae6e987199bb5d2c69bb5a46b0083b
https://github.com/python/cpython/issues/91133
https://linux.oracle.com/cve/CVE-2023-6597.html
https://linux.oracle.com/errata/ELSA-2024-4078.html
https://lists.debian.org/debian-lts-announce/2024/03/msg00025.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/T3IGRX54M7RNCQOXVQO5KQKTGWCOABIM/
https://lists.fedoraproject.org/archives/list/[email protected]/message/U5VHWS52HGD743C47UMCSAK2A773M2YE/
https://mail.python.org/archives/list/[email protected]/thread/Q5C6ATFC67K53XFV4KE45325S7NS62LD/
https://nvd.nist.gov/vuln/detail/CVE-2023-6597
https://seclists.org/oss-sec/2024/q1/240
https://ubuntu.com/security/notices/USN-6891-1
https://www.cve.org/CVERecord?id=CVE-2023-6597
|
| libpython3.11-stdlib |
CVE-2024-6232 |
HIGH |
3.11.2-6 |
3.11.2-6+deb12u4 |
http://www.openwall.com/lists/oss-security/2024/09/03/5
https://access.redhat.com/errata/RHSA-2024:8838
https://access.redhat.com/security/cve/CVE-2024-6232
https://bugzilla.redhat.com/2309426
https://bugzilla.redhat.com/show_bug.cgi?id=2309426
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6232
https://errata.almalinux.org/8/ALSA-2024-8838.html
https://errata.rockylinux.org/RLSA-2024:8446
https://github.com/python/cpython/commit/34ddb64d088dd7ccc321f6103d23153256caa5d4
https://github.com/python/cpython/commit/4eaf4891c12589e3c7bdad5f5b076e4c8392dd06
https://github.com/python/cpython/commit/743acbe872485dc18df4d8ab2dc7895187f062c4
https://github.com/python/cpython/commit/7d1f50cd92ff7e10a1c15a8f591dde8a6843a64d
https://github.com/python/cpython/commit/b4225ca91547aa97ed3aca391614afbb255bc877
https://github.com/python/cpython/commit/d449caf8a179e3b954268b3a88eb9170be3c8fbf
https://github.com/python/cpython/commit/ed3a49ea734ada357ff4442996fd4ae71d253373
https://github.com/python/cpython/issues/121285
https://github.com/python/cpython/pull/121286
https://linux.oracle.com/cve/CVE-2024-6232.html
https://linux.oracle.com/errata/ELSA-2025-1750.html
https://mail.python.org/archives/list/[email protected]/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/
https://nvd.nist.gov/vuln/detail/CVE-2024-6232
https://security.netapp.com/advisory/ntap-20241018-0007/
https://ubuntu.com/security/notices/USN-7015-1
https://ubuntu.com/security/notices/USN-7015-2
https://ubuntu.com/security/notices/USN-7015-5
https://ubuntu.com/security/notices/USN-7488-1
https://www.cve.org/CVERecord?id=CVE-2024-6232
|
| libpython3.11-stdlib |
CVE-2024-7592 |
HIGH |
3.11.2-6 |
3.11.2-6+deb12u5 |
https://access.redhat.com/errata/RHSA-2025:3634
https://access.redhat.com/security/cve/CVE-2024-7592
https://errata.almalinux.org/9/ALSA-2025-3634.html
https://github.com/python/cpython/commit/391e5626e3ee5af267b97e37abc7475732e67621
https://github.com/python/cpython/commit/44e458357fca05ca0ae2658d62c8c595b048b5ef
https://github.com/python/cpython/commit/a77ab24427a18bff817025adb03ca920dc3f1a06
https://github.com/python/cpython/commit/b2f11ca7667e4d57c71c1c88b255115f16042d9a
https://github.com/python/cpython/commit/d4ac921a4b081f7f996a5d2b101684b67ba0ed7f
https://github.com/python/cpython/commit/d662e2db2605515a767f88ad48096b8ac623c774
https://github.com/python/cpython/commit/dcc3eaef98cd94d6cb6cb0f44bd1c903d04f33b1
https://github.com/python/cpython/issues/123067
https://github.com/python/cpython/pull/123075
https://linux.oracle.com/cve/CVE-2024-7592.html
https://linux.oracle.com/errata/ELSA-2025-3634.html
https://mail.python.org/archives/list/[email protected]/thread/HXJAAAALNUNGCQUS2W7WR6GFIZIHFOOK/
https://nvd.nist.gov/vuln/detail/CVE-2024-7592
https://security.netapp.com/advisory/ntap-20241018-0006/
https://ubuntu.com/security/notices/USN-7015-1
https://ubuntu.com/security/notices/USN-7015-2
https://www.cve.org/CVERecord?id=CVE-2024-7592
|
| libpython3.11-stdlib |
CVE-2024-9287 |
HIGH |
3.11.2-6 |
3.11.2-6+deb12u5 |
https://access.redhat.com/errata/RHSA-2024:10980
https://access.redhat.com/security/cve/CVE-2024-9287
https://bugzilla.redhat.com/2321440
https://bugzilla.redhat.com/2330804
https://bugzilla.redhat.com/show_bug.cgi?id=2321440
https://bugzilla.redhat.com/show_bug.cgi?id=2325776
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11168
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9287
https://errata.almalinux.org/8/ALSA-2024-10980.html
https://errata.rockylinux.org/RLSA-2024:10779
https://github.com/python/cpython/commit/633555735a023d3e4d92ba31da35b1205f9ecbd7
https://github.com/python/cpython/commit/8450b2482586857d689b6658f08de9c8179af7db
https://github.com/python/cpython/commit/9286ab3a107ea41bd3f3c3682ce2512692bdded8
https://github.com/python/cpython/commit/ae961ae94bf19c8f8c7fbea3d1c25cc55ce8ae97
https://github.com/python/cpython/commit/d48cc82ed25e26b02eb97c6263d95dcaa1e9111b
https://github.com/python/cpython/commit/e52095a0c1005a87eed2276af7a1f2f66e2b6483
https://github.com/python/cpython/issues/124651
https://github.com/python/cpython/pull/124712
https://github.com/python/cpython/pull/124712/commits/b6a3bbd155c558cdcda482629073e492437db3d0
https://linux.oracle.com/cve/CVE-2024-9287.html
https://linux.oracle.com/errata/ELSA-2024-11111.html
https://mail.python.org/archives/list/[email protected]/thread/RSPJ2B5JL22FG3TKUJ7D7DQ4N5JRRBZL/
https://nvd.nist.gov/vuln/detail/CVE-2024-9287
https://security.netapp.com/advisory/ntap-20250425-0006/
https://ubuntu.com/security/notices/USN-7116-1
https://ubuntu.com/security/notices/USN-7348-1
https://ubuntu.com/security/notices/USN-7488-1
https://www.cve.org/CVERecord?id=CVE-2024-9287
|
| libpython3.11-stdlib |
CVE-2025-8194 |
HIGH |
3.11.2-6 |
|
https://access.redhat.com/errata/RHSA-2025:14900
https://access.redhat.com/security/cve/CVE-2025-8194
https://bugzilla.redhat.com/2366982
https://bugzilla.redhat.com/2384043
https://bugzilla.redhat.com/show_bug.cgi?id=2384043
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8194
https://errata.almalinux.org/8/ALSA-2025-14900.html
https://errata.rockylinux.org/RLSA-2025:14841
https://gist.github.com/sethmlarson/1716ac5b82b73dbcbf23ad2eff8b33e1
https://github.com/python/cpython/commit/57f5981d6260ed21266e0c26951b8564cc252bc2
https://github.com/python/cpython/commit/7040aa54f14676938970e10c5f74ea93cd56aa38
https://github.com/python/cpython/commit/73f03e4808206f71eb6b92c579505a220942ef19
https://github.com/python/cpython/commit/b4ec17488eedec36d3c05fec127df71c0071f6cb
https://github.com/python/cpython/commit/c9d9f78feb1467e73fd29356c040bde1c104f29f
https://github.com/python/cpython/commit/cdae923ffe187d6ef916c0f665a31249619193fe
https://github.com/python/cpython/commit/fbc2a0ca9ac8aff6887f8ddf79b87b4510277227
https://github.com/python/cpython/issues/130577
https://github.com/python/cpython/pull/137027
https://linux.oracle.com/cve/CVE-2025-8194.html
https://linux.oracle.com/errata/ELSA-2025-16117.html
https://mail.python.org/archives/list/[email protected]/thread/ZULLF3IZ726XP5EY7XJ7YIN3K5MDYR2D/
https://nvd.nist.gov/vuln/detail/CVE-2025-8194
https://ubuntu.com/security/notices/USN-7710-1
https://ubuntu.com/security/notices/USN-7710-2
https://www.cve.org/CVERecord?id=CVE-2025-8194
|
| libpython3.11-stdlib |
CVE-2023-27043 |
MEDIUM |
3.11.2-6 |
3.11.2-6+deb12u5 |
http://python.org
https://access.redhat.com/articles/7051467
https://access.redhat.com/errata/RHSA-2024:3062
https://access.redhat.com/security/cve/CVE-2023-27043
https://bugzilla.redhat.com/2196183
https://bugzilla.redhat.com/show_bug.cgi?id=2196183
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27043
https://errata.almalinux.org/8/ALSA-2024-3062.html
https://errata.rockylinux.org/RLSA-2024:0256
https://github.com/python/cpython/issues/102988
https://github.com/python/cpython/pull/102990
https://github.com/python/cpython/pull/105127
https://linux.oracle.com/cve/CVE-2023-27043.html
https://linux.oracle.com/errata/ELSA-2024-3062.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZAEFSFZDNBNJPNOUTLG5COISGQDLMGV/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/75DTHSTNOFFNAWHXKMDXS7EJWC6W2FUC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ARI7VDSNTQVXRQFM6IK5GSSLEIYV4VZH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BQAKLUJMHFGVBRDPEY57BJGNCE5UUPHW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HXYVPEZUA3465AEFX5JVFVP7KIFZMF3N/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6M5I6OQHJABNEYY555HUMMKX3Y4P25Z/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NEUNZSZ3CVSM2QWVYH3N2XGOCDWNYUA3/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORLXS5YTKN65E2Q2NWKXMFS5FWQHRNZW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2MAICLFDDO3QVNHTZ2OCERZQ34R2PIC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2W2BZQIHMCKRI5FNBJERFYMS5PK6TAH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PHVGRKQAGANCSGFI3QMYOCIMS4IFOZA5/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU6Y2S5CBN5BWCBDAJFTGIBZLK3S2G3J/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QDRDDPDN3VFIYXJIYEABY6USX5EU66AG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDDC2VOX7OQC6OHMYTVD4HLFZIV6PYBC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SINP4OVYNB2AGDYI2GS37EMW3H3F7XPZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SOX7BCN6YL7B3RFPEEXPIU5CMTEHJOKR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZXC32CJ7TWDPJO6GY2XIQRO7JZX5FLP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWMBD4LNHWEXRI6YVFWJMTJQUL5WOFTS/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YQVY5C5REXWJIORJIL2FIL3ALOEJEF72/
https://lists.fedoraproject.org/archives/list/[email protected]/message/4ZAEFSFZDNBNJPNOUTLG5COISGQDLMGV/
https://lists.fedoraproject.org/archives/list/[email protected]/message/75DTHSTNOFFNAWHXKMDXS7EJWC6W2FUC/
https://lists.fedoraproject.org/archives/list/[email protected]/message/ARI7VDSNTQVXRQFM6IK5GSSLEIYV4VZH/
https://lists.fedoraproject.org/archives/list/[email protected]/message/BQAKLUJMHFGVBRDPEY57BJGNCE5UUPHW/
https://lists.fedoraproject.org/archives/list/[email protected]/message/HXYVPEZUA3465AEFX5JVFVP7KIFZMF3N/
https://lists.fedoraproject.org/archives/list/[email protected]/message/N6M5I6OQHJABNEYY555HUMMKX3Y4P25Z/
https://lists.fedoraproject.org/archives/list/[email protected]/message/NEUNZSZ3CVSM2QWVYH3N2XGOCDWNYUA3/
https://lists.fedoraproject.org/archives/list/[email protected]/message/ORLXS5YTKN65E2Q2NWKXMFS5FWQHRNZW/
https://lists.fedoraproject.org/archives/list/[email protected]/message/P2MAICLFDDO3QVNHTZ2OCERZQ34R2PIC/
https://lists.fedoraproject.org/archives/list/[email protected]/message/P2W2BZQIHMCKRI5FNBJERFYMS5PK6TAH/
https://lists.fedoraproject.org/archives/list/[email protected]/message/PHVGRKQAGANCSGFI3QMYOCIMS4IFOZA5/
https://lists.fedoraproject.org/archives/list/[email protected]/message/PU6Y2S5CBN5BWCBDAJFTGIBZLK3S2G3J/
https://lists.fedoraproject.org/archives/list/[email protected]/message/QDRDDPDN3VFIYXJIYEABY6USX5EU66AG/
https://lists.fedoraproject.org/archives/list/[email protected]/message/RDDC2VOX7OQC6OHMYTVD4HLFZIV6PYBC/
https://lists.fedoraproject.org/archives/list/[email protected]/message/SINP4OVYNB2AGDYI2GS37EMW3H3F7XPZ/
https://lists.fedoraproject.org/archives/list/[email protected]/message/VZXC32CJ7TWDPJO6GY2XIQRO7JZX5FLP/
https://lists.fedoraproject.org/archives/list/[email protected]/message/XWMBD4LNHWEXRI6YVFWJMTJQUL5WOFTS/
https://lists.fedoraproject.org/archives/list/[email protected]/message/YQVY5C5REXWJIORJIL2FIL3ALOEJEF72/
https://nvd.nist.gov/vuln/detail/CVE-2023-27043
https://python-security.readthedocs.io/vuln/email-parseaddr-realname.html
https://security.netapp.com/advisory/ntap-20230601-0003/
https://ubuntu.com/security/notices/USN-7015-1
https://ubuntu.com/security/notices/USN-7015-3
https://ubuntu.com/security/notices/USN-7015-4
https://ubuntu.com/security/notices/USN-7015-7
https://www.cve.org/CVERecord?id=CVE-2023-27043
|
| libpython3.11-stdlib |
CVE-2023-40217 |
MEDIUM |
3.11.2-6 |
3.11.2-6+deb12u2 |
https://access.redhat.com/errata/RHSA-2023:5998
https://access.redhat.com/security/cve/CVE-2023-40217
https://bugzilla.redhat.com/2235789
https://bugzilla.redhat.com/show_bug.cgi?id=2235789
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40217
https://errata.almalinux.org/8/ALSA-2023-5998.html
https://errata.rockylinux.org/RLSA-2023:5997
https://github.com/python/cpython/commit/0cb0c238d520a8718e313b52cffc356a5a7561bf (main)
https://github.com/python/cpython/commit/256586ab8776e4526ca594b4866b9a3492e628f1 (3.12)
https://github.com/python/cpython/commit/264b1dacc67346efa0933d1e63f622676e0ed96b (3.9)
https://github.com/python/cpython/commit/37d7180cb647f0bed0c1caab0037f3bc82e2af96 (3.10)
https://github.com/python/cpython/commit/75a875e0df0530b75b1470d797942f90f4a718d3 (3.11)
https://github.com/python/cpython/issues/108310
https://github.com/python/cpython/pull/108315
https://linux.oracle.com/cve/CVE-2023-40217.html
https://linux.oracle.com/errata/ELSA-2023-6885.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html
https://mail.python.org/archives/list/security-announce%40python.org/thread/PEPLII27KYHLF4AK3ZQGKYNCRERG4YXY/
https://mail.python.org/archives/list/[email protected]/thread/PEPLII27KYHLF4AK3ZQGKYNCRERG4YXY/
https://nvd.nist.gov/vuln/detail/CVE-2023-40217
https://security.netapp.com/advisory/ntap-20231006-0014/
https://ubuntu.com/security/notices/USN-6513-1
https://ubuntu.com/security/notices/USN-6513-2
https://ubuntu.com/security/notices/USN-6891-1
https://ubuntu.com/security/notices/USN-7180-1
https://www.cve.org/CVERecord?id=CVE-2023-40217
https://www.python.org/dev/security/
|
| libpython3.11-stdlib |
CVE-2024-0397 |
MEDIUM |
3.11.2-6 |
3.11.2-6+deb12u3 |
http://www.openwall.com/lists/oss-security/2024/06/17/2
https://access.redhat.com/security/cve/CVE-2024-0397
https://github.com/python/cpython/commit/01c37f1d0714f5822d34063ca7180b595abf589d
https://github.com/python/cpython/commit/29c97287d205bf2f410f4895ebce3f43b5160524
https://github.com/python/cpython/commit/37324b421b72b7bc9934e27aba85d48d4773002e
https://github.com/python/cpython/commit/542f3272f56f31ed04e74c40635a913fbc12d286
https://github.com/python/cpython/commit/b228655c227b2ca298a8ffac44d14ce3d22f6faa
https://github.com/python/cpython/commit/bce693111bff906ccf9281c22371331aaff766ab
https://github.com/python/cpython/commit/bce693111bff906ccf9281c22371331aaff766ab (3.13)
https://github.com/python/cpython/issues/114572
https://github.com/python/cpython/pull/114573
https://mail.python.org/archives/list/[email protected]/thread/BMAK5BCGKYWNJOACVUSLUF6SFGBIM4VP/
https://nvd.nist.gov/vuln/detail/CVE-2024-0397
https://security.netapp.com/advisory/ntap-20250411-0006/
https://ubuntu.com/security/notices/USN-6928-1
https://www.cve.org/CVERecord?id=CVE-2024-0397
|
| libpython3.11-stdlib |
CVE-2024-0450 |
MEDIUM |
3.11.2-6 |
3.11.2-6+deb12u2 |
http://www.openwall.com/lists/oss-security/2024/03/20/5
https://access.redhat.com/errata/RHSA-2024:4243
https://access.redhat.com/security/cve/CVE-2024-0450
https://bugzilla.redhat.com/2276525
https://bugzilla.redhat.com/show_bug.cgi?id=2276518
https://bugzilla.redhat.com/show_bug.cgi?id=2276525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6597
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0450
https://discuss.python.org/t/python-3-10-14-3-9-19-and-3-8-19-is-now-available/48993
https://errata.almalinux.org/8/ALSA-2024-4243.html
https://errata.rockylinux.org/RLSA-2024:4078
https://github.com/python/cpython/commit/30fe5d853b56138dbec62432d370a1f99409fc85
https://github.com/python/cpython/commit/66363b9a7b9fe7c99eba3a185b74c5fdbf842eba
https://github.com/python/cpython/commit/70497218351ba44bffc8b571201ecb5652d84675
https://github.com/python/cpython/commit/a2c59992e9e8d35baba9695eb186ad6c6ff85c51
https://github.com/python/cpython/commit/a956e510f6336d5ae111ba429a61c3ade30a7549
https://github.com/python/cpython/commit/d05bac0b74153beb541b88b4fca33bf053990183
https://github.com/python/cpython/commit/fa181fcf2156f703347b03a3b1966ce47be8ab3b
https://github.com/python/cpython/issues/109858
https://linux.oracle.com/cve/CVE-2024-0450.html
https://linux.oracle.com/errata/ELSA-2024-9192.html
https://lists.debian.org/debian-lts-announce/2024/03/msg00024.html
https://lists.debian.org/debian-lts-announce/2024/03/msg00025.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/T3IGRX54M7RNCQOXVQO5KQKTGWCOABIM/
https://lists.fedoraproject.org/archives/list/[email protected]/message/U5VHWS52HGD743C47UMCSAK2A773M2YE/
https://mail.python.org/archives/list/[email protected]/thread/XELNUX2L3IOHBTFU7RQHCY6OUVEWZ2FG/
https://nvd.nist.gov/vuln/detail/CVE-2024-0450
https://seclists.org/oss-sec/2024/q1/240
https://security.netapp.com/advisory/ntap-20250411-0005/
https://ubuntu.com/security/notices/USN-6891-1
https://ubuntu.com/security/notices/USN-7212-1
https://www.bamsoftware.com/hacks/zipbomb/
https://www.cve.org/CVERecord?id=CVE-2024-0450
|
| libpython3.11-stdlib |
CVE-2024-6923 |
MEDIUM |
3.11.2-6 |
3.11.2-6+deb12u5 |
http://www.openwall.com/lists/oss-security/2024/08/01/3
http://www.openwall.com/lists/oss-security/2024/08/02/2
https://access.redhat.com/errata/RHSA-2024:6975
https://access.redhat.com/security/cve/CVE-2024-6923
https://bugzilla.redhat.com/2292921
https://bugzilla.redhat.com/2302255
https://bugzilla.redhat.com/2309426
https://bugzilla.redhat.com/show_bug.cgi?id=2302255
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6923
https://errata.almalinux.org/8/ALSA-2024-6975.html
https://errata.rockylinux.org/RLSA-2024:6146
https://github.com/python/cpython/commit/06f28dc236708f72871c64d4bc4b4ea144c50147
https://github.com/python/cpython/commit/097633981879b3c9de9a1dd120d3aa585ecc2384
https://github.com/python/cpython/commit/4766d1200fdf8b6728137aa2927a297e224d5fa7
https://github.com/python/cpython/commit/4aaa4259b5a6e664b7316a4d60bdec7ee0f124d0
https://github.com/python/cpython/commit/b158a76ce094897c870fb6b3de62887b7ccc33f1
https://github.com/python/cpython/commit/f7be505d137a22528cb0fc004422c0081d5d90e6
https://github.com/python/cpython/commit/f7c0f09e69e950cf3c5ada9dbde93898eb975533
https://github.com/python/cpython/issues/121650
https://github.com/python/cpython/pull/122233
https://linux.oracle.com/cve/CVE-2024-6923.html
https://linux.oracle.com/errata/ELSA-2024-6975.html
https://lists.debian.org/debian-lts-announce/2025/01/msg00005.html
https://mail.python.org/archives/list/[email protected]/thread/QH3BUOE2DYQBWP7NAQ7UNHPPOELKISRW/
https://nvd.nist.gov/vuln/detail/CVE-2024-6923
https://security.netapp.com/advisory/ntap-20240926-0003/
https://ubuntu.com/security/notices/USN-7015-1
https://ubuntu.com/security/notices/USN-7015-5
https://www.cve.org/CVERecord?id=CVE-2024-6923
|
| libpython3.11-stdlib |
CVE-2024-8088 |
MEDIUM |
3.11.2-6 |
3.11.2-6+deb12u3 |
http://www.openwall.com/lists/oss-security/2024/08/22/1
http://www.openwall.com/lists/oss-security/2024/08/22/4
http://www.openwall.com/lists/oss-security/2024/08/23/1
http://www.openwall.com/lists/oss-security/2024/08/23/2
https://access.redhat.com/errata/RHSA-2024:6962
https://access.redhat.com/security/cve/CVE-2024-8088
https://bugzilla.redhat.com/2292921
https://bugzilla.redhat.com/2302255
https://bugzilla.redhat.com/2307370
https://bugzilla.redhat.com/show_bug.cgi?id=2292921
https://bugzilla.redhat.com/show_bug.cgi?id=2302255
https://bugzilla.redhat.com/show_bug.cgi?id=2307370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6923
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8088
https://errata.almalinux.org/8/ALSA-2024-6962.html
https://errata.rockylinux.org/RLSA-2024:6962
https://github.com/python/cpython/commit/0aa1ee22ab6e204e9d3d0e9dd63ea648ed691ef1
https://github.com/python/cpython/commit/2231286d78d328c2f575e0b05b16fe447d1656d6
https://github.com/python/cpython/commit/795f2597a4be988e2bb19b69ff9958e981cb894e
https://github.com/python/cpython/commit/7bc367e464ce50b956dd232c1dfa1cad4e7fb814
https://github.com/python/cpython/commit/7e8883a3f04d308302361aeffc73e0e9837f19d4
https://github.com/python/cpython/commit/8c7348939d8a3ecd79d630075f6be1b0c5b41f64
https://github.com/python/cpython/commit/95b073bddefa6243effa08e131e297c0383e7f6a
https://github.com/python/cpython/commit/962055268ed4f2ca1d717bfc8b6385de50a23ab7
https://github.com/python/cpython/commit/9cd03263100ddb1657826cc4a71470786cab3932
https://github.com/python/cpython/commit/dcc5182f27c1500006a1ef78e10613bb45788dea
https://github.com/python/cpython/commit/e0264a61119d551658d9445af38323ba94fc16db
https://github.com/python/cpython/commit/fc0b8259e693caa8400fa8b6ac1e494e47ea7798
https://github.com/python/cpython/issues/122905
https://github.com/python/cpython/issues/123270
https://github.com/python/cpython/pull/122906
https://linux.oracle.com/cve/CVE-2024-8088.html
https://linux.oracle.com/errata/ELSA-2024-9371.html
https://mail.python.org/archives/list/[email protected]/thread/GNFCKVI4TCATKQLALJ5SN4L4CSPSMILU/
https://nvd.nist.gov/vuln/detail/CVE-2024-8088
https://security.netapp.com/advisory/ntap-20241011-0010/
https://ubuntu.com/security/notices/USN-7015-1
https://www.cve.org/CVERecord?id=CVE-2024-8088
|
| libpython3.11-stdlib |
CVE-2025-0938 |
MEDIUM |
3.11.2-6 |
3.11.2-6+deb12u6 |
https://access.redhat.com/errata/RHSA-2025:7109
https://access.redhat.com/security/cve/CVE-2025-0938
https://bugzilla.redhat.com/2343237
https://errata.almalinux.org/9/ALSA-2025-7109.html
https://github.com/python/cpython/commit/526617ed68cde460236c973e5d0a8bad4de896ba
https://github.com/python/cpython/commit/90e526ae67b172ed7c6c56e7edad36263b0f9403
https://github.com/python/cpython/commit/a7084f6075c9595ba60119ce8c62f1496f50c568
https://github.com/python/cpython/commit/b8b4b713c5f8ec0958c7ef8d29d6711889bc94ab
https://github.com/python/cpython/commit/d89a5f6a6e65511a5f6e0618c4c30a7aa5aba56a
https://github.com/python/cpython/commit/ff4e5c25666f63544071a6b075ae8b25c98b7a32
https://github.com/python/cpython/issues/105704
https://github.com/python/cpython/pull/129418
https://linux.oracle.com/cve/CVE-2025-0938.html
https://linux.oracle.com/errata/ELSA-2025-7109.html
https://mail.python.org/archives/list/[email protected]/thread/K4EUG6EKV6JYFIC24BASYOZS4M5XOQIB/
https://nvd.nist.gov/vuln/detail/CVE-2025-0938
https://security.netapp.com/advisory/ntap-20250314-0002/
https://ubuntu.com/security/notices/USN-7280-1
https://ubuntu.com/security/notices/USN-7280-2
https://ubuntu.com/security/notices/USN-7280-3
https://ubuntu.com/security/notices/USN-7348-1
https://ubuntu.com/security/notices/USN-7348-2
https://www.cve.org/CVERecord?id=CVE-2025-0938
|
| libpython3.11-stdlib |
CVE-2025-4516 |
MEDIUM |
3.11.2-6 |
|
http://www.openwall.com/lists/oss-security/2025/05/16/4
http://www.openwall.com/lists/oss-security/2025/05/19/1
https://access.redhat.com/security/cve/CVE-2025-4516
https://github.com/python/cpython/commit/4398b788ffc1f954a2c552da285477d42a571292
https://github.com/python/cpython/commit/5646648678295a44aa82636c6e92826651baf33a
https://github.com/python/cpython/commit/6279eb8c076d89d3739a6edb393e43c7929b429d
https://github.com/python/cpython/commit/69b4387f78f413e8c47572a85b3478c47eba8142
https://github.com/python/cpython/commit/73b3040f592436385007918887b7e2132aa8431f
https://github.com/python/cpython/commit/8d35fd1b34935221aff23a1ab69a429dd156be77
https://github.com/python/cpython/commit/9f69a58623bd01349a18ba0c7a9cb1dad6a51e8e
https://github.com/python/cpython/commit/9f69a58623bd01349a18ba0c7a9cb1dad6a51e8e (main)
https://github.com/python/cpython/commit/ab9893c40609935e0d40a6d2a7307ea51aec598b
https://github.com/python/cpython/issues/133767
https://github.com/python/cpython/pull/129648
https://mail.python.org/archives/list/[email protected]/thread/L75IPBBTSCYEF56I2M4KIW353BB3AY74/
https://nvd.nist.gov/vuln/detail/CVE-2025-4516
https://ubuntu.com/security/notices/USN-7570-1
https://www.cve.org/CVERecord?id=CVE-2025-4516
|
| libpython3.11-stdlib |
CVE-2025-6069 |
MEDIUM |
3.11.2-6 |
|
https://access.redhat.com/security/cve/CVE-2025-6069
https://github.com/python/cpython/commit/4455cbabf991e202185a25a631af206f60bbc949
https://github.com/python/cpython/commit/6eb6c5dbfb528bd07d77b60fd71fd05d81d45c41
https://github.com/python/cpython/commit/6eb6c5dbfb528bd07d77b60fd71fd05d81d45c41 (main)
https://github.com/python/cpython/commit/8d1b3dfa09135affbbf27fb8babcf3c11415df49
https://github.com/python/cpython/commit/ab0893fd5c579d9cea30841680e6d35fc478afb5
https://github.com/python/cpython/commit/d851f8e258c7328814943e923a7df81bca15df4b
https://github.com/python/cpython/commit/f3c6f882cddc8dc30320d2e73edf019e201394fc
https://github.com/python/cpython/commit/fdc9d214c01cb4588f540cfa03726bbf2a33fc15
https://github.com/python/cpython/issues/135462
https://github.com/python/cpython/pull/135464
https://mail.python.org/archives/list/[email protected]/thread/K5PIYLR6EP3WR7ZOKKYQUWEDNQVUXOYM/
https://nvd.nist.gov/vuln/detail/CVE-2025-6069
https://ubuntu.com/security/notices/USN-7710-1
https://www.cve.org/CVERecord?id=CVE-2025-6069
|
| libpython3.11-stdlib |
CVE-2025-8291 |
MEDIUM |
3.11.2-6 |
|
https://access.redhat.com/security/cve/CVE-2025-8291
https://github.com/python/cpython/commit/162997bb70e067668c039700141770687bc8f267
https://github.com/python/cpython/commit/1d29afb0d6218aa8fb5e1e4a6133a4778d89bb46
https://github.com/python/cpython/commit/333d4a6f4967d3ace91492a39ededbcf3faa76a6
https://github.com/python/cpython/commit/76437ac248ad8ca44e9bf697b02b1e2241df2196
https://github.com/python/cpython/commit/8392b2f0d35678407d9ce7d95655a5b77de161b4
https://github.com/python/cpython/commit/bca11ae7d575d87ed93f5dd6a313be6246e3e388
https://github.com/python/cpython/commit/d11e69d6203080e3ec450446bfed0516727b85c3
https://github.com/python/cpython/issues/139700
https://github.com/python/cpython/pull/139702
https://mail.python.org/archives/list/[email protected]/thread/QECOPWMTH4VPPJAXAH2BGTA4XADOP62G/
https://nvd.nist.gov/vuln/detail/CVE-2025-8291
https://www.cve.org/CVERecord?id=CVE-2025-8291
|
| libpython3.11-stdlib |
CVE-2024-11168 |
LOW |
3.11.2-6 |
3.11.2-6+deb12u5 |
https://access.redhat.com/errata/RHSA-2024:10779
https://access.redhat.com/security/cve/CVE-2024-11168
https://bugzilla.redhat.com/2321440
https://bugzilla.redhat.com/2325776
https://bugzilla.redhat.com/show_bug.cgi?id=2321440
https://bugzilla.redhat.com/show_bug.cgi?id=2325776
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11168
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9287
https://errata.almalinux.org/8/ALSA-2024-10779.html
https://errata.rockylinux.org/RLSA-2024:10779
https://github.com/python/cpython/commit/29f348e232e82938ba2165843c448c2b291504c5
https://github.com/python/cpython/commit/634ded45545ce8cbd6fd5d49785613dd7fa9b89e
https://github.com/python/cpython/commit/b2171a2fd41416cf68afd67460578631d755a550
https://github.com/python/cpython/commit/ddca2953191c67a12b1f19d6bca41016c6ae7132
https://github.com/python/cpython/issues/103848
https://github.com/python/cpython/pull/103849
https://linux.oracle.com/cve/CVE-2024-11168.html
https://linux.oracle.com/errata/ELSA-2024-10983.html
https://mail.python.org/archives/list/[email protected]/thread/XPWB6XVZ5G5KGEI63M4AWLIEUF5BPH4T/
https://nvd.nist.gov/vuln/detail/CVE-2024-11168
https://security.netapp.com/advisory/ntap-20250411-0004/
https://ubuntu.com/security/notices/USN-7218-1
https://ubuntu.com/security/notices/USN-7280-3
https://ubuntu.com/security/notices/USN-7348-1
https://ubuntu.com/security/notices/USN-7488-1
https://www.cve.org/CVERecord?id=CVE-2024-11168
|
| libpython3.11-stdlib |
CVE-2024-4032 |
LOW |
3.11.2-6 |
3.11.2-6+deb12u3 |
http://www.openwall.com/lists/oss-security/2024/06/17/3
https://access.redhat.com/errata/RHSA-2024:6975
https://access.redhat.com/security/cve/CVE-2024-4032
https://bugzilla.redhat.com/2292921
https://bugzilla.redhat.com/2302255
https://bugzilla.redhat.com/2309426
https://bugzilla.redhat.com/show_bug.cgi?id=2292921
https://bugzilla.redhat.com/show_bug.cgi?id=2302255
https://bugzilla.redhat.com/show_bug.cgi?id=2309426
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6923
https://errata.almalinux.org/8/ALSA-2024-6975.html
https://errata.rockylinux.org/RLSA-2024:6975
https://github.com/advisories/GHSA-mh6q-v4mp-2cc7
https://github.com/python/cpython/commit/22adf29da8d99933ffed8647d3e0726edd16f7f8
https://github.com/python/cpython/commit/40d75c2b7f5c67e254d0a025e0f2e2c7ada7f69f
https://github.com/python/cpython/commit/40d75c2b7f5c67e254d0a025e0f2e2c7ada7f69f (3.13)
https://github.com/python/cpython/commit/895f7e2ac23eff4743143beef0f0c5ac71ea27d3
https://github.com/python/cpython/commit/ba431579efdcbaed7a96f2ac4ea0775879a332fb
https://github.com/python/cpython/commit/c62c9e518b784fe44432a3f4fc265fb95b651906
https://github.com/python/cpython/commit/f86b17ac511e68192ba71f27e752321a3252cee3
https://github.com/python/cpython/issues/113171
https://github.com/python/cpython/pull/113179
https://linux.oracle.com/cve/CVE-2024-4032.html
https://linux.oracle.com/errata/ELSA-2024-9190.html
https://mail.python.org/archives/list/[email protected]/thread/NRUHDUS2IV2USIZM2CVMSFL6SCKU3RZA/
https://nvd.nist.gov/vuln/detail/CVE-2024-4032
https://security.netapp.com/advisory/ntap-20240726-0004/
https://ubuntu.com/security/notices/USN-6928-1
https://ubuntu.com/security/notices/USN-6941-1
https://ubuntu.com/security/notices/USN-7348-1
https://www.cve.org/CVERecord?id=CVE-2024-4032
https://www.iana.org/assignments/iana-ipv4-special-registry/iana-ipv4-special-registry.xhtml
https://www.iana.org/assignments/iana-ipv6-special-registry/iana-ipv6-special-registry.xhtml
|
| libpython3.11-stdlib |
CVE-2025-1795 |
LOW |
3.11.2-6 |
3.11.2-6+deb12u6 |
https://access.redhat.com/security/cve/CVE-2025-1795
https://github.com/python/cpython/commit/09fab93c3d857496c0bd162797fab816c311ee48
https://github.com/python/cpython/commit/70754d21c288535e86070ca7a6e90dcb670b8593
https://github.com/python/cpython/commit/9148b77e0af91cdacaa7fe3dfac09635c3fe9a74
https://github.com/python/cpython/issues/100884
https://github.com/python/cpython/pull/100885
https://github.com/python/cpython/pull/119099
https://mail.python.org/archives/list/[email protected]/thread/MB62IZMEC3UM6SGHP5LET5JX2Y7H4ZUR/
https://nvd.nist.gov/vuln/detail/CVE-2025-1795
https://ubuntu.com/security/notices/USN-7570-1
https://www.cve.org/CVERecord?id=CVE-2025-1795
|
| libqpdf29 |
CVE-2024-24246 |
MEDIUM |
11.3.0-1+deb12u1 |
|
https://access.redhat.com/security/cve/CVE-2024-24246
https://github.com/qpdf/qpdf/issues/1123
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4WLK6ICPJUMOJNHZQWXAA5MPXG5JHZZL/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FX3D3YCNS6CQL3774OFUROLP3EM25ILC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U3N6TULMEYVCLXO47Y5W4VWCJMSB72CB/
https://nvd.nist.gov/vuln/detail/CVE-2024-24246
https://ubuntu.com/security/notices/USN-6713-1
https://www.cve.org/CVERecord?id=CVE-2024-24246
|
| libquadmath0 |
CVE-2022-27943 |
LOW |
12.2.0-14 |
|
https://access.redhat.com/security/cve/CVE-2022-27943
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=1a770b01ef415e114164b6151d1e55acdee09371
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=9234cdca6ee88badfc00297e72f13dac4e540c79
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=fc968115a742d9e4674d9725ce9c2106b91b6ead
https://gcc.gnu.org/pipermail/gcc-patches/2022-March/592244.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
https://nvd.nist.gov/vuln/detail/CVE-2022-27943
https://sourceware.org/bugzilla/show_bug.cgi?id=28995
https://www.cve.org/CVERecord?id=CVE-2022-27943
|
| libquadmath0 |
CVE-2023-4039 |
LOW |
12.2.0-14 |
12.2.0-14+deb12u1 |
https://access.redhat.com/security/cve/CVE-2023-4039
https://developer.arm.com/Arm%20Security%20Center/GCC%20Stack%20Protector%20Vulnerability%20AArch64
https://gcc.gnu.org/git/?p=gcc.git;a=blob_plain;f=SECURITY.txt
https://gcc.gnu.org/pipermail/gcc-patches/2023-October/634066.html
https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-x7ch-h5rf-w2mf
https://inbox.sourceware.org/gcc-patches/[email protected]
https://linux.oracle.com/cve/CVE-2023-4039.html
https://linux.oracle.com/errata/ELSA-2023-28766.html
https://nvd.nist.gov/vuln/detail/CVE-2023-4039
https://rtx.meta.security/mitigation/2023/09/12/CVE-2023-4039.html
https://ubuntu.com/security/notices/USN-7700-1
https://www.cve.org/CVERecord?id=CVE-2023-4039
|
| libraptor2-0 |
CVE-2024-57822 |
MEDIUM |
2.0.15-4 |
2.0.15-4+deb12u1 |
https://access.redhat.com/security/cve/CVE-2024-57822
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067896
https://github.com/dajobe/raptor/issues/70
https://github.com/pedrib/PoC/blob/master/fuzzing/raptor-fuzz.md
https://nvd.nist.gov/vuln/detail/CVE-2024-57822
https://ubuntu.com/security/notices/USN-7316-1
https://www.cve.org/CVERecord?id=CVE-2024-57822
|
| libraptor2-0 |
CVE-2024-57823 |
MEDIUM |
2.0.15-4 |
2.0.15-4+deb12u1 |
https://access.redhat.com/errata/RHSA-2025:0314
https://access.redhat.com/security/cve/CVE-2024-57823
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067896
https://bugzilla.redhat.com/2336921
https://bugzilla.redhat.com/show_bug.cgi?id=2336921
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57823
https://errata.almalinux.org/8/ALSA-2025-0314.html
https://errata.rockylinux.org/RLSA-2025:0314
https://github.com/dajobe/raptor/issues/70
https://github.com/pedrib/PoC/blob/master/fuzzing/raptor-fuzz.md
https://linux.oracle.com/cve/CVE-2024-57823.html
https://linux.oracle.com/errata/ELSA-2025-0319.html
https://nvd.nist.gov/vuln/detail/CVE-2024-57823
https://ubuntu.com/security/notices/USN-7316-1
https://www.cve.org/CVERecord?id=CVE-2024-57823
|
| libreoffice |
CVE-2012-5639 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://www.openwall.com/lists/oss-security/2012/12/14/1
http://www.openwall.com/lists/oss-security/2023/12/28/6
http://www.openwall.com/lists/oss-security/2024/01/03/6
http://www.openwall.com/lists/oss-security/2024/01/03/7
https://access.redhat.com/security/cve/CVE-2012-5639
https://access.redhat.com/security/cve/cve-2012-5639
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5639
https://lists.apache.org/thread.html/r253f92d0e6511d07a79774002e1d9db1d20b24bff27914a5adb14ccb%40%3Cissues.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2012-5639
https://security-tracker.debian.org/tracker/CVE-2012-5639
https://www.cve.org/CVERecord?id=CVE-2012-5639
|
| libreoffice |
CVE-2018-10583 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://seclists.org/fulldisclosure/2020/Oct/26
http://secureyourit.co.uk/wp/2018/05/01/creating-malicious-odt-files/
https://access.redhat.com/errata/RHSA-2018:3054
https://access.redhat.com/security/cve/CVE-2018-10583
https://lists.apache.org/thread.html/0598708912978b27121b2e380b44a225c706aca882cd1da6a955a0af%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/6c65f22306c36c95e75f8d2b7f49cfcbeb0a4614245c20934612a39d%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/c8fd59ac77b42aac90eb5c59b87f3ab59b5e0c3bfb4819aa649a2909%40%3Cdev.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-10583
https://security-tracker.debian.org/tracker/CVE-2018-10583
https://ubuntu.com/security/notices/USN-3883-1
https://usn.ubuntu.com/3883-1/
https://www.cve.org/CVERecord?id=CVE-2018-10583
https://www.exploit-db.com/exploits/44564/
|
| libreoffice-base |
CVE-2012-5639 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://www.openwall.com/lists/oss-security/2012/12/14/1
http://www.openwall.com/lists/oss-security/2023/12/28/6
http://www.openwall.com/lists/oss-security/2024/01/03/6
http://www.openwall.com/lists/oss-security/2024/01/03/7
https://access.redhat.com/security/cve/CVE-2012-5639
https://access.redhat.com/security/cve/cve-2012-5639
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5639
https://lists.apache.org/thread.html/r253f92d0e6511d07a79774002e1d9db1d20b24bff27914a5adb14ccb%40%3Cissues.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2012-5639
https://security-tracker.debian.org/tracker/CVE-2012-5639
https://www.cve.org/CVERecord?id=CVE-2012-5639
|
| libreoffice-base |
CVE-2018-10583 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://seclists.org/fulldisclosure/2020/Oct/26
http://secureyourit.co.uk/wp/2018/05/01/creating-malicious-odt-files/
https://access.redhat.com/errata/RHSA-2018:3054
https://access.redhat.com/security/cve/CVE-2018-10583
https://lists.apache.org/thread.html/0598708912978b27121b2e380b44a225c706aca882cd1da6a955a0af%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/6c65f22306c36c95e75f8d2b7f49cfcbeb0a4614245c20934612a39d%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/c8fd59ac77b42aac90eb5c59b87f3ab59b5e0c3bfb4819aa649a2909%40%3Cdev.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-10583
https://security-tracker.debian.org/tracker/CVE-2018-10583
https://ubuntu.com/security/notices/USN-3883-1
https://usn.ubuntu.com/3883-1/
https://www.cve.org/CVERecord?id=CVE-2018-10583
https://www.exploit-db.com/exploits/44564/
|
| libreoffice-base-core |
CVE-2012-5639 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://www.openwall.com/lists/oss-security/2012/12/14/1
http://www.openwall.com/lists/oss-security/2023/12/28/6
http://www.openwall.com/lists/oss-security/2024/01/03/6
http://www.openwall.com/lists/oss-security/2024/01/03/7
https://access.redhat.com/security/cve/CVE-2012-5639
https://access.redhat.com/security/cve/cve-2012-5639
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5639
https://lists.apache.org/thread.html/r253f92d0e6511d07a79774002e1d9db1d20b24bff27914a5adb14ccb%40%3Cissues.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2012-5639
https://security-tracker.debian.org/tracker/CVE-2012-5639
https://www.cve.org/CVERecord?id=CVE-2012-5639
|
| libreoffice-base-core |
CVE-2018-10583 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://seclists.org/fulldisclosure/2020/Oct/26
http://secureyourit.co.uk/wp/2018/05/01/creating-malicious-odt-files/
https://access.redhat.com/errata/RHSA-2018:3054
https://access.redhat.com/security/cve/CVE-2018-10583
https://lists.apache.org/thread.html/0598708912978b27121b2e380b44a225c706aca882cd1da6a955a0af%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/6c65f22306c36c95e75f8d2b7f49cfcbeb0a4614245c20934612a39d%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/c8fd59ac77b42aac90eb5c59b87f3ab59b5e0c3bfb4819aa649a2909%40%3Cdev.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-10583
https://security-tracker.debian.org/tracker/CVE-2018-10583
https://ubuntu.com/security/notices/USN-3883-1
https://usn.ubuntu.com/3883-1/
https://www.cve.org/CVERecord?id=CVE-2018-10583
https://www.exploit-db.com/exploits/44564/
|
| libreoffice-base-drivers |
CVE-2012-5639 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://www.openwall.com/lists/oss-security/2012/12/14/1
http://www.openwall.com/lists/oss-security/2023/12/28/6
http://www.openwall.com/lists/oss-security/2024/01/03/6
http://www.openwall.com/lists/oss-security/2024/01/03/7
https://access.redhat.com/security/cve/CVE-2012-5639
https://access.redhat.com/security/cve/cve-2012-5639
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5639
https://lists.apache.org/thread.html/r253f92d0e6511d07a79774002e1d9db1d20b24bff27914a5adb14ccb%40%3Cissues.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2012-5639
https://security-tracker.debian.org/tracker/CVE-2012-5639
https://www.cve.org/CVERecord?id=CVE-2012-5639
|
| libreoffice-base-drivers |
CVE-2018-10583 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://seclists.org/fulldisclosure/2020/Oct/26
http://secureyourit.co.uk/wp/2018/05/01/creating-malicious-odt-files/
https://access.redhat.com/errata/RHSA-2018:3054
https://access.redhat.com/security/cve/CVE-2018-10583
https://lists.apache.org/thread.html/0598708912978b27121b2e380b44a225c706aca882cd1da6a955a0af%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/6c65f22306c36c95e75f8d2b7f49cfcbeb0a4614245c20934612a39d%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/c8fd59ac77b42aac90eb5c59b87f3ab59b5e0c3bfb4819aa649a2909%40%3Cdev.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-10583
https://security-tracker.debian.org/tracker/CVE-2018-10583
https://ubuntu.com/security/notices/USN-3883-1
https://usn.ubuntu.com/3883-1/
https://www.cve.org/CVERecord?id=CVE-2018-10583
https://www.exploit-db.com/exploits/44564/
|
| libreoffice-calc |
CVE-2012-5639 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://www.openwall.com/lists/oss-security/2012/12/14/1
http://www.openwall.com/lists/oss-security/2023/12/28/6
http://www.openwall.com/lists/oss-security/2024/01/03/6
http://www.openwall.com/lists/oss-security/2024/01/03/7
https://access.redhat.com/security/cve/CVE-2012-5639
https://access.redhat.com/security/cve/cve-2012-5639
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5639
https://lists.apache.org/thread.html/r253f92d0e6511d07a79774002e1d9db1d20b24bff27914a5adb14ccb%40%3Cissues.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2012-5639
https://security-tracker.debian.org/tracker/CVE-2012-5639
https://www.cve.org/CVERecord?id=CVE-2012-5639
|
| libreoffice-calc |
CVE-2018-10583 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://seclists.org/fulldisclosure/2020/Oct/26
http://secureyourit.co.uk/wp/2018/05/01/creating-malicious-odt-files/
https://access.redhat.com/errata/RHSA-2018:3054
https://access.redhat.com/security/cve/CVE-2018-10583
https://lists.apache.org/thread.html/0598708912978b27121b2e380b44a225c706aca882cd1da6a955a0af%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/6c65f22306c36c95e75f8d2b7f49cfcbeb0a4614245c20934612a39d%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/c8fd59ac77b42aac90eb5c59b87f3ab59b5e0c3bfb4819aa649a2909%40%3Cdev.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-10583
https://security-tracker.debian.org/tracker/CVE-2018-10583
https://ubuntu.com/security/notices/USN-3883-1
https://usn.ubuntu.com/3883-1/
https://www.cve.org/CVERecord?id=CVE-2018-10583
https://www.exploit-db.com/exploits/44564/
|
| libreoffice-common |
CVE-2012-5639 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://www.openwall.com/lists/oss-security/2012/12/14/1
http://www.openwall.com/lists/oss-security/2023/12/28/6
http://www.openwall.com/lists/oss-security/2024/01/03/6
http://www.openwall.com/lists/oss-security/2024/01/03/7
https://access.redhat.com/security/cve/CVE-2012-5639
https://access.redhat.com/security/cve/cve-2012-5639
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5639
https://lists.apache.org/thread.html/r253f92d0e6511d07a79774002e1d9db1d20b24bff27914a5adb14ccb%40%3Cissues.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2012-5639
https://security-tracker.debian.org/tracker/CVE-2012-5639
https://www.cve.org/CVERecord?id=CVE-2012-5639
|
| libreoffice-common |
CVE-2018-10583 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://seclists.org/fulldisclosure/2020/Oct/26
http://secureyourit.co.uk/wp/2018/05/01/creating-malicious-odt-files/
https://access.redhat.com/errata/RHSA-2018:3054
https://access.redhat.com/security/cve/CVE-2018-10583
https://lists.apache.org/thread.html/0598708912978b27121b2e380b44a225c706aca882cd1da6a955a0af%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/6c65f22306c36c95e75f8d2b7f49cfcbeb0a4614245c20934612a39d%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/c8fd59ac77b42aac90eb5c59b87f3ab59b5e0c3bfb4819aa649a2909%40%3Cdev.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-10583
https://security-tracker.debian.org/tracker/CVE-2018-10583
https://ubuntu.com/security/notices/USN-3883-1
https://usn.ubuntu.com/3883-1/
https://www.cve.org/CVERecord?id=CVE-2018-10583
https://www.exploit-db.com/exploits/44564/
|
| libreoffice-core |
CVE-2012-5639 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://www.openwall.com/lists/oss-security/2012/12/14/1
http://www.openwall.com/lists/oss-security/2023/12/28/6
http://www.openwall.com/lists/oss-security/2024/01/03/6
http://www.openwall.com/lists/oss-security/2024/01/03/7
https://access.redhat.com/security/cve/CVE-2012-5639
https://access.redhat.com/security/cve/cve-2012-5639
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5639
https://lists.apache.org/thread.html/r253f92d0e6511d07a79774002e1d9db1d20b24bff27914a5adb14ccb%40%3Cissues.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2012-5639
https://security-tracker.debian.org/tracker/CVE-2012-5639
https://www.cve.org/CVERecord?id=CVE-2012-5639
|
| libreoffice-core |
CVE-2018-10583 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://seclists.org/fulldisclosure/2020/Oct/26
http://secureyourit.co.uk/wp/2018/05/01/creating-malicious-odt-files/
https://access.redhat.com/errata/RHSA-2018:3054
https://access.redhat.com/security/cve/CVE-2018-10583
https://lists.apache.org/thread.html/0598708912978b27121b2e380b44a225c706aca882cd1da6a955a0af%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/6c65f22306c36c95e75f8d2b7f49cfcbeb0a4614245c20934612a39d%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/c8fd59ac77b42aac90eb5c59b87f3ab59b5e0c3bfb4819aa649a2909%40%3Cdev.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-10583
https://security-tracker.debian.org/tracker/CVE-2018-10583
https://ubuntu.com/security/notices/USN-3883-1
https://usn.ubuntu.com/3883-1/
https://www.cve.org/CVERecord?id=CVE-2018-10583
https://www.exploit-db.com/exploits/44564/
|
| libreoffice-draw |
CVE-2012-5639 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://www.openwall.com/lists/oss-security/2012/12/14/1
http://www.openwall.com/lists/oss-security/2023/12/28/6
http://www.openwall.com/lists/oss-security/2024/01/03/6
http://www.openwall.com/lists/oss-security/2024/01/03/7
https://access.redhat.com/security/cve/CVE-2012-5639
https://access.redhat.com/security/cve/cve-2012-5639
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5639
https://lists.apache.org/thread.html/r253f92d0e6511d07a79774002e1d9db1d20b24bff27914a5adb14ccb%40%3Cissues.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2012-5639
https://security-tracker.debian.org/tracker/CVE-2012-5639
https://www.cve.org/CVERecord?id=CVE-2012-5639
|
| libreoffice-draw |
CVE-2018-10583 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://seclists.org/fulldisclosure/2020/Oct/26
http://secureyourit.co.uk/wp/2018/05/01/creating-malicious-odt-files/
https://access.redhat.com/errata/RHSA-2018:3054
https://access.redhat.com/security/cve/CVE-2018-10583
https://lists.apache.org/thread.html/0598708912978b27121b2e380b44a225c706aca882cd1da6a955a0af%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/6c65f22306c36c95e75f8d2b7f49cfcbeb0a4614245c20934612a39d%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/c8fd59ac77b42aac90eb5c59b87f3ab59b5e0c3bfb4819aa649a2909%40%3Cdev.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-10583
https://security-tracker.debian.org/tracker/CVE-2018-10583
https://ubuntu.com/security/notices/USN-3883-1
https://usn.ubuntu.com/3883-1/
https://www.cve.org/CVERecord?id=CVE-2018-10583
https://www.exploit-db.com/exploits/44564/
|
| libreoffice-impress |
CVE-2012-5639 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://www.openwall.com/lists/oss-security/2012/12/14/1
http://www.openwall.com/lists/oss-security/2023/12/28/6
http://www.openwall.com/lists/oss-security/2024/01/03/6
http://www.openwall.com/lists/oss-security/2024/01/03/7
https://access.redhat.com/security/cve/CVE-2012-5639
https://access.redhat.com/security/cve/cve-2012-5639
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5639
https://lists.apache.org/thread.html/r253f92d0e6511d07a79774002e1d9db1d20b24bff27914a5adb14ccb%40%3Cissues.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2012-5639
https://security-tracker.debian.org/tracker/CVE-2012-5639
https://www.cve.org/CVERecord?id=CVE-2012-5639
|
| libreoffice-impress |
CVE-2018-10583 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://seclists.org/fulldisclosure/2020/Oct/26
http://secureyourit.co.uk/wp/2018/05/01/creating-malicious-odt-files/
https://access.redhat.com/errata/RHSA-2018:3054
https://access.redhat.com/security/cve/CVE-2018-10583
https://lists.apache.org/thread.html/0598708912978b27121b2e380b44a225c706aca882cd1da6a955a0af%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/6c65f22306c36c95e75f8d2b7f49cfcbeb0a4614245c20934612a39d%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/c8fd59ac77b42aac90eb5c59b87f3ab59b5e0c3bfb4819aa649a2909%40%3Cdev.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-10583
https://security-tracker.debian.org/tracker/CVE-2018-10583
https://ubuntu.com/security/notices/USN-3883-1
https://usn.ubuntu.com/3883-1/
https://www.cve.org/CVERecord?id=CVE-2018-10583
https://www.exploit-db.com/exploits/44564/
|
| libreoffice-math |
CVE-2012-5639 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://www.openwall.com/lists/oss-security/2012/12/14/1
http://www.openwall.com/lists/oss-security/2023/12/28/6
http://www.openwall.com/lists/oss-security/2024/01/03/6
http://www.openwall.com/lists/oss-security/2024/01/03/7
https://access.redhat.com/security/cve/CVE-2012-5639
https://access.redhat.com/security/cve/cve-2012-5639
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5639
https://lists.apache.org/thread.html/r253f92d0e6511d07a79774002e1d9db1d20b24bff27914a5adb14ccb%40%3Cissues.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2012-5639
https://security-tracker.debian.org/tracker/CVE-2012-5639
https://www.cve.org/CVERecord?id=CVE-2012-5639
|
| libreoffice-math |
CVE-2018-10583 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://seclists.org/fulldisclosure/2020/Oct/26
http://secureyourit.co.uk/wp/2018/05/01/creating-malicious-odt-files/
https://access.redhat.com/errata/RHSA-2018:3054
https://access.redhat.com/security/cve/CVE-2018-10583
https://lists.apache.org/thread.html/0598708912978b27121b2e380b44a225c706aca882cd1da6a955a0af%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/6c65f22306c36c95e75f8d2b7f49cfcbeb0a4614245c20934612a39d%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/c8fd59ac77b42aac90eb5c59b87f3ab59b5e0c3bfb4819aa649a2909%40%3Cdev.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-10583
https://security-tracker.debian.org/tracker/CVE-2018-10583
https://ubuntu.com/security/notices/USN-3883-1
https://usn.ubuntu.com/3883-1/
https://www.cve.org/CVERecord?id=CVE-2018-10583
https://www.exploit-db.com/exploits/44564/
|
| libreoffice-report-builder-bin |
CVE-2012-5639 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://www.openwall.com/lists/oss-security/2012/12/14/1
http://www.openwall.com/lists/oss-security/2023/12/28/6
http://www.openwall.com/lists/oss-security/2024/01/03/6
http://www.openwall.com/lists/oss-security/2024/01/03/7
https://access.redhat.com/security/cve/CVE-2012-5639
https://access.redhat.com/security/cve/cve-2012-5639
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5639
https://lists.apache.org/thread.html/r253f92d0e6511d07a79774002e1d9db1d20b24bff27914a5adb14ccb%40%3Cissues.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2012-5639
https://security-tracker.debian.org/tracker/CVE-2012-5639
https://www.cve.org/CVERecord?id=CVE-2012-5639
|
| libreoffice-report-builder-bin |
CVE-2018-10583 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://seclists.org/fulldisclosure/2020/Oct/26
http://secureyourit.co.uk/wp/2018/05/01/creating-malicious-odt-files/
https://access.redhat.com/errata/RHSA-2018:3054
https://access.redhat.com/security/cve/CVE-2018-10583
https://lists.apache.org/thread.html/0598708912978b27121b2e380b44a225c706aca882cd1da6a955a0af%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/6c65f22306c36c95e75f8d2b7f49cfcbeb0a4614245c20934612a39d%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/c8fd59ac77b42aac90eb5c59b87f3ab59b5e0c3bfb4819aa649a2909%40%3Cdev.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-10583
https://security-tracker.debian.org/tracker/CVE-2018-10583
https://ubuntu.com/security/notices/USN-3883-1
https://usn.ubuntu.com/3883-1/
https://www.cve.org/CVERecord?id=CVE-2018-10583
https://www.exploit-db.com/exploits/44564/
|
| libreoffice-style-colibre |
CVE-2012-5639 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://www.openwall.com/lists/oss-security/2012/12/14/1
http://www.openwall.com/lists/oss-security/2023/12/28/6
http://www.openwall.com/lists/oss-security/2024/01/03/6
http://www.openwall.com/lists/oss-security/2024/01/03/7
https://access.redhat.com/security/cve/CVE-2012-5639
https://access.redhat.com/security/cve/cve-2012-5639
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5639
https://lists.apache.org/thread.html/r253f92d0e6511d07a79774002e1d9db1d20b24bff27914a5adb14ccb%40%3Cissues.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2012-5639
https://security-tracker.debian.org/tracker/CVE-2012-5639
https://www.cve.org/CVERecord?id=CVE-2012-5639
|
| libreoffice-style-colibre |
CVE-2018-10583 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://seclists.org/fulldisclosure/2020/Oct/26
http://secureyourit.co.uk/wp/2018/05/01/creating-malicious-odt-files/
https://access.redhat.com/errata/RHSA-2018:3054
https://access.redhat.com/security/cve/CVE-2018-10583
https://lists.apache.org/thread.html/0598708912978b27121b2e380b44a225c706aca882cd1da6a955a0af%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/6c65f22306c36c95e75f8d2b7f49cfcbeb0a4614245c20934612a39d%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/c8fd59ac77b42aac90eb5c59b87f3ab59b5e0c3bfb4819aa649a2909%40%3Cdev.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-10583
https://security-tracker.debian.org/tracker/CVE-2018-10583
https://ubuntu.com/security/notices/USN-3883-1
https://usn.ubuntu.com/3883-1/
https://www.cve.org/CVERecord?id=CVE-2018-10583
https://www.exploit-db.com/exploits/44564/
|
| libreoffice-uiconfig-base |
CVE-2012-5639 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://www.openwall.com/lists/oss-security/2012/12/14/1
http://www.openwall.com/lists/oss-security/2023/12/28/6
http://www.openwall.com/lists/oss-security/2024/01/03/6
http://www.openwall.com/lists/oss-security/2024/01/03/7
https://access.redhat.com/security/cve/CVE-2012-5639
https://access.redhat.com/security/cve/cve-2012-5639
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5639
https://lists.apache.org/thread.html/r253f92d0e6511d07a79774002e1d9db1d20b24bff27914a5adb14ccb%40%3Cissues.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2012-5639
https://security-tracker.debian.org/tracker/CVE-2012-5639
https://www.cve.org/CVERecord?id=CVE-2012-5639
|
| libreoffice-uiconfig-base |
CVE-2018-10583 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://seclists.org/fulldisclosure/2020/Oct/26
http://secureyourit.co.uk/wp/2018/05/01/creating-malicious-odt-files/
https://access.redhat.com/errata/RHSA-2018:3054
https://access.redhat.com/security/cve/CVE-2018-10583
https://lists.apache.org/thread.html/0598708912978b27121b2e380b44a225c706aca882cd1da6a955a0af%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/6c65f22306c36c95e75f8d2b7f49cfcbeb0a4614245c20934612a39d%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/c8fd59ac77b42aac90eb5c59b87f3ab59b5e0c3bfb4819aa649a2909%40%3Cdev.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-10583
https://security-tracker.debian.org/tracker/CVE-2018-10583
https://ubuntu.com/security/notices/USN-3883-1
https://usn.ubuntu.com/3883-1/
https://www.cve.org/CVERecord?id=CVE-2018-10583
https://www.exploit-db.com/exploits/44564/
|
| libreoffice-uiconfig-calc |
CVE-2012-5639 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://www.openwall.com/lists/oss-security/2012/12/14/1
http://www.openwall.com/lists/oss-security/2023/12/28/6
http://www.openwall.com/lists/oss-security/2024/01/03/6
http://www.openwall.com/lists/oss-security/2024/01/03/7
https://access.redhat.com/security/cve/CVE-2012-5639
https://access.redhat.com/security/cve/cve-2012-5639
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5639
https://lists.apache.org/thread.html/r253f92d0e6511d07a79774002e1d9db1d20b24bff27914a5adb14ccb%40%3Cissues.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2012-5639
https://security-tracker.debian.org/tracker/CVE-2012-5639
https://www.cve.org/CVERecord?id=CVE-2012-5639
|
| libreoffice-uiconfig-calc |
CVE-2018-10583 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://seclists.org/fulldisclosure/2020/Oct/26
http://secureyourit.co.uk/wp/2018/05/01/creating-malicious-odt-files/
https://access.redhat.com/errata/RHSA-2018:3054
https://access.redhat.com/security/cve/CVE-2018-10583
https://lists.apache.org/thread.html/0598708912978b27121b2e380b44a225c706aca882cd1da6a955a0af%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/6c65f22306c36c95e75f8d2b7f49cfcbeb0a4614245c20934612a39d%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/c8fd59ac77b42aac90eb5c59b87f3ab59b5e0c3bfb4819aa649a2909%40%3Cdev.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-10583
https://security-tracker.debian.org/tracker/CVE-2018-10583
https://ubuntu.com/security/notices/USN-3883-1
https://usn.ubuntu.com/3883-1/
https://www.cve.org/CVERecord?id=CVE-2018-10583
https://www.exploit-db.com/exploits/44564/
|
| libreoffice-uiconfig-common |
CVE-2012-5639 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://www.openwall.com/lists/oss-security/2012/12/14/1
http://www.openwall.com/lists/oss-security/2023/12/28/6
http://www.openwall.com/lists/oss-security/2024/01/03/6
http://www.openwall.com/lists/oss-security/2024/01/03/7
https://access.redhat.com/security/cve/CVE-2012-5639
https://access.redhat.com/security/cve/cve-2012-5639
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5639
https://lists.apache.org/thread.html/r253f92d0e6511d07a79774002e1d9db1d20b24bff27914a5adb14ccb%40%3Cissues.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2012-5639
https://security-tracker.debian.org/tracker/CVE-2012-5639
https://www.cve.org/CVERecord?id=CVE-2012-5639
|
| libreoffice-uiconfig-common |
CVE-2018-10583 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://seclists.org/fulldisclosure/2020/Oct/26
http://secureyourit.co.uk/wp/2018/05/01/creating-malicious-odt-files/
https://access.redhat.com/errata/RHSA-2018:3054
https://access.redhat.com/security/cve/CVE-2018-10583
https://lists.apache.org/thread.html/0598708912978b27121b2e380b44a225c706aca882cd1da6a955a0af%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/6c65f22306c36c95e75f8d2b7f49cfcbeb0a4614245c20934612a39d%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/c8fd59ac77b42aac90eb5c59b87f3ab59b5e0c3bfb4819aa649a2909%40%3Cdev.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-10583
https://security-tracker.debian.org/tracker/CVE-2018-10583
https://ubuntu.com/security/notices/USN-3883-1
https://usn.ubuntu.com/3883-1/
https://www.cve.org/CVERecord?id=CVE-2018-10583
https://www.exploit-db.com/exploits/44564/
|
| libreoffice-uiconfig-draw |
CVE-2012-5639 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://www.openwall.com/lists/oss-security/2012/12/14/1
http://www.openwall.com/lists/oss-security/2023/12/28/6
http://www.openwall.com/lists/oss-security/2024/01/03/6
http://www.openwall.com/lists/oss-security/2024/01/03/7
https://access.redhat.com/security/cve/CVE-2012-5639
https://access.redhat.com/security/cve/cve-2012-5639
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5639
https://lists.apache.org/thread.html/r253f92d0e6511d07a79774002e1d9db1d20b24bff27914a5adb14ccb%40%3Cissues.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2012-5639
https://security-tracker.debian.org/tracker/CVE-2012-5639
https://www.cve.org/CVERecord?id=CVE-2012-5639
|
| libreoffice-uiconfig-draw |
CVE-2018-10583 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://seclists.org/fulldisclosure/2020/Oct/26
http://secureyourit.co.uk/wp/2018/05/01/creating-malicious-odt-files/
https://access.redhat.com/errata/RHSA-2018:3054
https://access.redhat.com/security/cve/CVE-2018-10583
https://lists.apache.org/thread.html/0598708912978b27121b2e380b44a225c706aca882cd1da6a955a0af%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/6c65f22306c36c95e75f8d2b7f49cfcbeb0a4614245c20934612a39d%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/c8fd59ac77b42aac90eb5c59b87f3ab59b5e0c3bfb4819aa649a2909%40%3Cdev.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-10583
https://security-tracker.debian.org/tracker/CVE-2018-10583
https://ubuntu.com/security/notices/USN-3883-1
https://usn.ubuntu.com/3883-1/
https://www.cve.org/CVERecord?id=CVE-2018-10583
https://www.exploit-db.com/exploits/44564/
|
| libreoffice-uiconfig-impress |
CVE-2012-5639 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://www.openwall.com/lists/oss-security/2012/12/14/1
http://www.openwall.com/lists/oss-security/2023/12/28/6
http://www.openwall.com/lists/oss-security/2024/01/03/6
http://www.openwall.com/lists/oss-security/2024/01/03/7
https://access.redhat.com/security/cve/CVE-2012-5639
https://access.redhat.com/security/cve/cve-2012-5639
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5639
https://lists.apache.org/thread.html/r253f92d0e6511d07a79774002e1d9db1d20b24bff27914a5adb14ccb%40%3Cissues.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2012-5639
https://security-tracker.debian.org/tracker/CVE-2012-5639
https://www.cve.org/CVERecord?id=CVE-2012-5639
|
| libreoffice-uiconfig-impress |
CVE-2018-10583 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://seclists.org/fulldisclosure/2020/Oct/26
http://secureyourit.co.uk/wp/2018/05/01/creating-malicious-odt-files/
https://access.redhat.com/errata/RHSA-2018:3054
https://access.redhat.com/security/cve/CVE-2018-10583
https://lists.apache.org/thread.html/0598708912978b27121b2e380b44a225c706aca882cd1da6a955a0af%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/6c65f22306c36c95e75f8d2b7f49cfcbeb0a4614245c20934612a39d%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/c8fd59ac77b42aac90eb5c59b87f3ab59b5e0c3bfb4819aa649a2909%40%3Cdev.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-10583
https://security-tracker.debian.org/tracker/CVE-2018-10583
https://ubuntu.com/security/notices/USN-3883-1
https://usn.ubuntu.com/3883-1/
https://www.cve.org/CVERecord?id=CVE-2018-10583
https://www.exploit-db.com/exploits/44564/
|
| libreoffice-uiconfig-math |
CVE-2012-5639 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://www.openwall.com/lists/oss-security/2012/12/14/1
http://www.openwall.com/lists/oss-security/2023/12/28/6
http://www.openwall.com/lists/oss-security/2024/01/03/6
http://www.openwall.com/lists/oss-security/2024/01/03/7
https://access.redhat.com/security/cve/CVE-2012-5639
https://access.redhat.com/security/cve/cve-2012-5639
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5639
https://lists.apache.org/thread.html/r253f92d0e6511d07a79774002e1d9db1d20b24bff27914a5adb14ccb%40%3Cissues.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2012-5639
https://security-tracker.debian.org/tracker/CVE-2012-5639
https://www.cve.org/CVERecord?id=CVE-2012-5639
|
| libreoffice-uiconfig-math |
CVE-2018-10583 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://seclists.org/fulldisclosure/2020/Oct/26
http://secureyourit.co.uk/wp/2018/05/01/creating-malicious-odt-files/
https://access.redhat.com/errata/RHSA-2018:3054
https://access.redhat.com/security/cve/CVE-2018-10583
https://lists.apache.org/thread.html/0598708912978b27121b2e380b44a225c706aca882cd1da6a955a0af%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/6c65f22306c36c95e75f8d2b7f49cfcbeb0a4614245c20934612a39d%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/c8fd59ac77b42aac90eb5c59b87f3ab59b5e0c3bfb4819aa649a2909%40%3Cdev.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-10583
https://security-tracker.debian.org/tracker/CVE-2018-10583
https://ubuntu.com/security/notices/USN-3883-1
https://usn.ubuntu.com/3883-1/
https://www.cve.org/CVERecord?id=CVE-2018-10583
https://www.exploit-db.com/exploits/44564/
|
| libreoffice-uiconfig-writer |
CVE-2012-5639 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://www.openwall.com/lists/oss-security/2012/12/14/1
http://www.openwall.com/lists/oss-security/2023/12/28/6
http://www.openwall.com/lists/oss-security/2024/01/03/6
http://www.openwall.com/lists/oss-security/2024/01/03/7
https://access.redhat.com/security/cve/CVE-2012-5639
https://access.redhat.com/security/cve/cve-2012-5639
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5639
https://lists.apache.org/thread.html/r253f92d0e6511d07a79774002e1d9db1d20b24bff27914a5adb14ccb%40%3Cissues.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2012-5639
https://security-tracker.debian.org/tracker/CVE-2012-5639
https://www.cve.org/CVERecord?id=CVE-2012-5639
|
| libreoffice-uiconfig-writer |
CVE-2018-10583 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://seclists.org/fulldisclosure/2020/Oct/26
http://secureyourit.co.uk/wp/2018/05/01/creating-malicious-odt-files/
https://access.redhat.com/errata/RHSA-2018:3054
https://access.redhat.com/security/cve/CVE-2018-10583
https://lists.apache.org/thread.html/0598708912978b27121b2e380b44a225c706aca882cd1da6a955a0af%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/6c65f22306c36c95e75f8d2b7f49cfcbeb0a4614245c20934612a39d%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/c8fd59ac77b42aac90eb5c59b87f3ab59b5e0c3bfb4819aa649a2909%40%3Cdev.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-10583
https://security-tracker.debian.org/tracker/CVE-2018-10583
https://ubuntu.com/security/notices/USN-3883-1
https://usn.ubuntu.com/3883-1/
https://www.cve.org/CVERecord?id=CVE-2018-10583
https://www.exploit-db.com/exploits/44564/
|
| libreoffice-writer |
CVE-2012-5639 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://www.openwall.com/lists/oss-security/2012/12/14/1
http://www.openwall.com/lists/oss-security/2023/12/28/6
http://www.openwall.com/lists/oss-security/2024/01/03/6
http://www.openwall.com/lists/oss-security/2024/01/03/7
https://access.redhat.com/security/cve/CVE-2012-5639
https://access.redhat.com/security/cve/cve-2012-5639
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5639
https://lists.apache.org/thread.html/r253f92d0e6511d07a79774002e1d9db1d20b24bff27914a5adb14ccb%40%3Cissues.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2012-5639
https://security-tracker.debian.org/tracker/CVE-2012-5639
https://www.cve.org/CVERecord?id=CVE-2012-5639
|
| libreoffice-writer |
CVE-2018-10583 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://seclists.org/fulldisclosure/2020/Oct/26
http://secureyourit.co.uk/wp/2018/05/01/creating-malicious-odt-files/
https://access.redhat.com/errata/RHSA-2018:3054
https://access.redhat.com/security/cve/CVE-2018-10583
https://lists.apache.org/thread.html/0598708912978b27121b2e380b44a225c706aca882cd1da6a955a0af%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/6c65f22306c36c95e75f8d2b7f49cfcbeb0a4614245c20934612a39d%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/c8fd59ac77b42aac90eb5c59b87f3ab59b5e0c3bfb4819aa649a2909%40%3Cdev.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-10583
https://security-tracker.debian.org/tracker/CVE-2018-10583
https://ubuntu.com/security/notices/USN-3883-1
https://usn.ubuntu.com/3883-1/
https://www.cve.org/CVERecord?id=CVE-2018-10583
https://www.exploit-db.com/exploits/44564/
|
| libsmartcols1 |
CVE-2022-0563 |
LOW |
2.38.1-5+deb12u1 |
|
https://access.redhat.com/security/cve/CVE-2022-0563
https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u
https://lore.kernel.org/util-linux/[email protected]/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.gentoo.org/glsa/202401-08
https://security.netapp.com/advisory/ntap-20220331-0002/
https://www.cve.org/CVERecord?id=CVE-2022-0563
|
| libsqlite3-0 |
CVE-2025-6965 |
CRITICAL |
3.40.1-2 |
3.40.1-2+deb12u2 |
https://access.redhat.com/errata/RHSA-2025:14101
https://access.redhat.com/security/cve/CVE-2025-6965
https://bugzilla.redhat.com/2380149
https://bugzilla.redhat.com/show_bug.cgi?id=2380149
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6965
https://errata.almalinux.org/8/ALSA-2025-14101.html
https://errata.rockylinux.org/RLSA-2025:12010
https://linux.oracle.com/cve/CVE-2025-6965.html
https://linux.oracle.com/errata/ELSA-2025-14101.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6965
https://ubuntu.com/security/notices/USN-7676-1
https://ubuntu.com/security/notices/USN-7679-1
https://www.cve.org/CVERecord?id=CVE-2025-6965
https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8
|
| libsqlite3-0 |
CVE-2025-7458 |
CRITICAL |
3.40.1-2 |
|
https://access.redhat.com/security/cve/CVE-2025-7458
https://nvd.nist.gov/vuln/detail/CVE-2025-7458
https://sqlite.org/forum/forumpost/16ce2bb7a639e29b
https://sqlite.org/src/info/12ad822d9b827777
https://www.cve.org/CVERecord?id=CVE-2025-7458
|
| libsqlite3-0 |
CVE-2023-7104 |
HIGH |
3.40.1-2 |
3.40.1-2+deb12u1 |
https://access.redhat.com/errata/RHSA-2024:0253
https://access.redhat.com/security/cve/CVE-2023-7104
https://bugzilla.redhat.com/2256194
https://bugzilla.redhat.com/show_bug.cgi?id=2256194
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7104
https://errata.almalinux.org/8/ALSA-2024-0253.html
https://errata.rockylinux.org/RLSA-2024:0253
https://linux.oracle.com/cve/CVE-2023-7104.html
https://linux.oracle.com/errata/ELSA-2024-0465.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/
https://lists.fedoraproject.org/archives/list/[email protected]/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/
https://nvd.nist.gov/vuln/detail/CVE-2023-7104
https://security.netapp.com/advisory/ntap-20240112-0008/
https://sqlite.org/forum/forumpost/5bcbf4571c
https://sqlite.org/src/info/0e4e7a05c4204b47
https://ubuntu.com/security/notices/USN-6566-1
https://ubuntu.com/security/notices/USN-6566-2
https://vuldb.com/?ctiid.248999
https://vuldb.com/?id.248999
https://www.cve.org/CVERecord?id=CVE-2023-7104
|
| libsqlite3-0 |
CVE-2025-29088 |
MEDIUM |
3.40.1-2 |
|
https://access.redhat.com/security/cve/CVE-2025-29088
https://gist.github.com/ylwango613/d3883fb9f6ba8a78086356779ce88248
https://github.com/sqlite/sqlite/commit/56d2fd008b108109f489339f5fd55212bb50afd4
https://nvd.nist.gov/vuln/detail/CVE-2025-29088
https://sqlite.org/forum/forumpost/48f365daec
https://sqlite.org/releaselog/3_49_1.html
https://ubuntu.com/security/notices/USN-7528-1
https://ubuntu.com/security/notices/USN-7679-1
https://www.cve.org/CVERecord?id=CVE-2025-29088
https://www.sqlite.org/cves.html
|
| libsqlite3-0 |
CVE-2025-7709 |
MEDIUM |
3.40.1-2 |
|
https://github.com/google/security-research/security/advisories/GHSA-v2c8-vqqp-hv3g
https://ubuntu.com/security/notices/USN-7751-1
https://www.cve.org/CVERecord?id=CVE-2025-7709
|
| libsqlite3-0 |
CVE-2021-45346 |
LOW |
3.40.1-2 |
|
https://access.redhat.com/security/cve/CVE-2021-45346
https://github.com/guyinatuxedo/sqlite3_record_leaking
https://nvd.nist.gov/vuln/detail/CVE-2021-45346
https://security.netapp.com/advisory/ntap-20220303-0001/
https://sqlite.org/forum/forumpost/056d557c2f8c452ed5
https://sqlite.org/forum/forumpost/53de8864ba114bf6
https://www.cve.org/CVERecord?id=CVE-2021-45346
https://www.sqlite.org/cves.html#status_of_recent_sqlite_cves
|
| libssl3 |
CVE-2024-6119 |
HIGH |
3.0.11-1~deb12u2 |
3.0.14-1~deb12u2 |
http://www.openwall.com/lists/oss-security/2024/09/03/4
https://access.redhat.com/errata/RHSA-2024:8935
https://access.redhat.com/security/cve/CVE-2024-6119
https://bugzilla.redhat.com/2306158
https://bugzilla.redhat.com/show_bug.cgi?id=2306158
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6119
https://errata.almalinux.org/9/ALSA-2024-8935.html
https://errata.rockylinux.org/RLSA-2024:6783
https://github.com/openssl/openssl/commit/05f360d9e849a1b277db628f1f13083a7f8dd04f
https://github.com/openssl/openssl/commit/06d1dc3fa96a2ba5a3e22735a033012aadc9f0d6
https://github.com/openssl/openssl/commit/621f3729831b05ee828a3203eddb621d014ff2b2
https://github.com/openssl/openssl/commit/7dfcee2cd2a63b2c64b9b4b0850be64cb695b0a0
https://github.com/openssl/openssl/security/advisories/GHSA-5qrj-vq78-58fj
https://linux.oracle.com/cve/CVE-2024-6119.html
https://linux.oracle.com/errata/ELSA-2024-8935.html
https://lists.freebsd.org/archives/freebsd-security/2024-September/000303.html
https://nvd.nist.gov/vuln/detail/CVE-2024-6119
https://openssl-library.org/news/secadv/20240903.txt
https://security.netapp.com/advisory/ntap-20240912-0001/
https://ubuntu.com/security/notices/USN-6986-1
https://www.cve.org/CVERecord?id=CVE-2024-6119
|
| libssl3 |
CVE-2023-5678 |
MEDIUM |
3.0.11-1~deb12u2 |
3.0.13-1~deb12u1 |
http://www.openwall.com/lists/oss-security/2024/03/11/1
https://access.redhat.com/errata/RHSA-2023:7877
https://access.redhat.com/security/cve/CVE-2023-5678
https://bugzilla.redhat.com/2224962
https://bugzilla.redhat.com/2227852
https://bugzilla.redhat.com/2248616
https://errata.almalinux.org/8/ALSA-2023-7877.html
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=34efaef6c103d636ab507a0cc34dca4d3aecc055
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=710fee740904b6290fef0dd5536fbcedbc38ff0c
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=db925ae2e65d0d925adef429afc37f75bd1c2017
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ddeb4b6c6d527e54ce9a99cba785c0f7776e54b6
https://linux.oracle.com/cve/CVE-2023-5678.html
https://linux.oracle.com/errata/ELSA-2024-2447.html
https://nvd.nist.gov/vuln/detail/CVE-2023-5678
https://security.netapp.com/advisory/ntap-20231130-0010/
https://ubuntu.com/security/notices/USN-6622-1
https://ubuntu.com/security/notices/USN-6632-1
https://ubuntu.com/security/notices/USN-6709-1
https://www.cve.org/CVERecord?id=CVE-2023-5678
https://www.openssl.org/news/secadv/20231106.txt
|
| libssl3 |
CVE-2023-6129 |
MEDIUM |
3.0.11-1~deb12u2 |
3.0.13-1~deb12u1 |
http://www.openwall.com/lists/oss-security/2024/03/11/1
https://access.redhat.com/errata/RHSA-2024:9088
https://access.redhat.com/security/cve/CVE-2023-6129
https://bugzilla.redhat.com/2257571
https://bugzilla.redhat.com/2258502
https://bugzilla.redhat.com/2259944
https://bugzilla.redhat.com/2284243
https://errata.almalinux.org/9/ALSA-2024-9088.html
https://github.com/openssl/openssl/commit/050d26383d4e264966fb83428e72d5d48f402d35
https://github.com/openssl/openssl/commit/5b139f95c9a47a55a0c54100f3837b1eee942b04
https://github.com/openssl/openssl/commit/f3fc5808fe9ff74042d639839610d03b8fdcc015
https://linux.oracle.com/cve/CVE-2023-6129.html
https://linux.oracle.com/errata/ELSA-2024-9088.html
https://nvd.nist.gov/vuln/detail/CVE-2023-6129
https://security.netapp.com/advisory/ntap-20240216-0009/
https://security.netapp.com/advisory/ntap-20240426-0008/
https://security.netapp.com/advisory/ntap-20240426-0013/
https://security.netapp.com/advisory/ntap-20240503-0011/
https://ubuntu.com/security/notices/USN-6622-1
https://www.cve.org/CVERecord?id=CVE-2023-6129
https://www.openssl.org/news/secadv/20240109.txt
https://www.openwall.com/lists/oss-security/2024/01/09/1
|
| libssl3 |
CVE-2023-6237 |
MEDIUM |
3.0.11-1~deb12u2 |
3.0.13-1~deb12u1 |
http://www.openwall.com/lists/oss-security/2024/03/11/1
https://access.redhat.com/errata/RHSA-2024:9088
https://access.redhat.com/security/cve/CVE-2023-6237
https://bugzilla.redhat.com/2257571
https://bugzilla.redhat.com/2258502
https://bugzilla.redhat.com/2259944
https://bugzilla.redhat.com/2284243
https://errata.almalinux.org/9/ALSA-2024-9088.html
https://github.com/openssl/openssl/commit/0b0f7abfb37350794a4b8960fafc292cd5d1b84d
https://github.com/openssl/openssl/commit/18c02492138d1eb8b6548cb26e7b625fb2414a2a
https://github.com/openssl/openssl/commit/a830f551557d3d66a84bbb18a5b889c640c36294
https://linux.oracle.com/cve/CVE-2023-6237.html
https://linux.oracle.com/errata/ELSA-2024-9088.html
https://nvd.nist.gov/vuln/detail/CVE-2023-6237
https://security.netapp.com/advisory/ntap-20240531-0007/
https://ubuntu.com/security/notices/USN-6622-1
https://www.cve.org/CVERecord?id=CVE-2023-6237
https://www.openssl.org/news/secadv/20240115.txt
https://www.openwall.com/lists/oss-security/2024/01/15/2
|
| libssl3 |
CVE-2024-0727 |
MEDIUM |
3.0.11-1~deb12u2 |
3.0.13-1~deb12u1 |
http://www.openwall.com/lists/oss-security/2024/03/11/1
https://access.redhat.com/errata/RHSA-2024:9088
https://access.redhat.com/security/cve/CVE-2024-0727
https://bugzilla.redhat.com/2257571
https://bugzilla.redhat.com/2258502
https://bugzilla.redhat.com/2259944
https://bugzilla.redhat.com/2284243
https://errata.almalinux.org/9/ALSA-2024-9088.html
https://github.com/alexcrichton/openssl-src-rs/commit/add20f73b6b42be7451af2e1044d4e0e778992b2
https://github.com/github/advisory-database/pull/3472
https://github.com/openssl/openssl/commit/09df4395b5071217b76dc7d3d2e630eb8c5a79c2
https://github.com/openssl/openssl/commit/775acfdbd0c6af9ac855f34969cdab0c0c90844a
https://github.com/openssl/openssl/commit/d135eeab8a5dbf72b3da5240bab9ddb7678dbd2c
https://github.com/openssl/openssl/pull/23362
https://github.com/pyca/cryptography/commit/3519591d255d4506fbcd0d04037d45271903c64d
https://github.openssl.org/openssl/extended-releases/commit/03b3941d60c4bce58fab69a0c22377ab439bc0e8
https://github.openssl.org/openssl/extended-releases/commit/aebaa5883e31122b404e450732dc833dc9dee539
https://linux.oracle.com/cve/CVE-2024-0727.html
https://linux.oracle.com/errata/ELSA-2024-9088.html
https://nvd.nist.gov/vuln/detail/CVE-2024-0727
https://security.netapp.com/advisory/ntap-20240208-0006
https://security.netapp.com/advisory/ntap-20240208-0006/
https://ubuntu.com/security/notices/USN-6622-1
https://ubuntu.com/security/notices/USN-6632-1
https://ubuntu.com/security/notices/USN-6709-1
https://ubuntu.com/security/notices/USN-7018-1
https://www.cve.org/CVERecord?id=CVE-2024-0727
https://www.openssl.org/news/secadv/20240125.txt
|
| libssl3 |
CVE-2024-13176 |
MEDIUM |
3.0.11-1~deb12u2 |
3.0.16-1~deb12u1 |
http://www.openwall.com/lists/oss-security/2025/01/20/2
https://access.redhat.com/errata/RHSA-2025:15699
https://access.redhat.com/security/cve/CVE-2024-13176
https://bugzilla.redhat.com/2359885
https://bugzilla.redhat.com/2359888
https://bugzilla.redhat.com/2359892
https://bugzilla.redhat.com/2359894
https://bugzilla.redhat.com/2359895
https://bugzilla.redhat.com/2359899
https://bugzilla.redhat.com/2359900
https://bugzilla.redhat.com/2359902
https://bugzilla.redhat.com/2359903
https://bugzilla.redhat.com/2359911
https://bugzilla.redhat.com/2359918
https://bugzilla.redhat.com/2359920
https://bugzilla.redhat.com/2359924
https://bugzilla.redhat.com/2359928
https://bugzilla.redhat.com/2359930
https://bugzilla.redhat.com/2359932
https://bugzilla.redhat.com/2359934
https://bugzilla.redhat.com/2359938
https://bugzilla.redhat.com/2359940
https://bugzilla.redhat.com/2359943
https://bugzilla.redhat.com/2359944
https://bugzilla.redhat.com/2359945
https://bugzilla.redhat.com/2359947
https://bugzilla.redhat.com/2359950
https://bugzilla.redhat.com/2359963
https://bugzilla.redhat.com/2359964
https://bugzilla.redhat.com/2359972
https://bugzilla.redhat.com/2370920
https://bugzilla.redhat.com/2380264
https://bugzilla.redhat.com/2380273
https://bugzilla.redhat.com/2380274
https://bugzilla.redhat.com/2380278
https://bugzilla.redhat.com/2380280
https://bugzilla.redhat.com/2380283
https://bugzilla.redhat.com/2380284
https://bugzilla.redhat.com/2380290
https://bugzilla.redhat.com/2380291
https://bugzilla.redhat.com/2380295
https://bugzilla.redhat.com/2380298
https://bugzilla.redhat.com/2380306
https://bugzilla.redhat.com/2380308
https://bugzilla.redhat.com/2380309
https://bugzilla.redhat.com/2380310
https://bugzilla.redhat.com/2380312
https://bugzilla.redhat.com/2380313
https://bugzilla.redhat.com/2380320
https://bugzilla.redhat.com/2380321
https://bugzilla.redhat.com/2380322
https://bugzilla.redhat.com/2380326
https://bugzilla.redhat.com/2380327
https://bugzilla.redhat.com/2380334
https://bugzilla.redhat.com/2380335
https://bugzilla.redhat.com/show_bug.cgi?id=2338999
https://bugzilla.redhat.com/show_bug.cgi?id=2359885
https://bugzilla.redhat.com/show_bug.cgi?id=2359888
https://bugzilla.redhat.com/show_bug.cgi?id=2359892
https://bugzilla.redhat.com/show_bug.cgi?id=2359894
https://bugzilla.redhat.com/show_bug.cgi?id=2359895
https://bugzilla.redhat.com/show_bug.cgi?id=2359899
https://bugzilla.redhat.com/show_bug.cgi?id=2359900
https://bugzilla.redhat.com/show_bug.cgi?id=2359902
https://bugzilla.redhat.com/show_bug.cgi?id=2359903
https://bugzilla.redhat.com/show_bug.cgi?id=2359911
https://bugzilla.redhat.com/show_bug.cgi?id=2359918
https://bugzilla.redhat.com/show_bug.cgi?id=2359920
https://bugzilla.redhat.com/show_bug.cgi?id=2359924
https://bugzilla.redhat.com/show_bug.cgi?id=2359928
https://bugzilla.redhat.com/show_bug.cgi?id=2359930
https://bugzilla.redhat.com/show_bug.cgi?id=2359932
https://bugzilla.redhat.com/show_bug.cgi?id=2359934
https://bugzilla.redhat.com/show_bug.cgi?id=2359938
https://bugzilla.redhat.com/show_bug.cgi?id=2359940
https://bugzilla.redhat.com/show_bug.cgi?id=2359943
https://bugzilla.redhat.com/show_bug.cgi?id=2359944
https://bugzilla.redhat.com/show_bug.cgi?id=2359945
https://bugzilla.redhat.com/show_bug.cgi?id=2359947
https://bugzilla.redhat.com/show_bug.cgi?id=2359950
https://bugzilla.redhat.com/show_bug.cgi?id=2359963
https://bugzilla.redhat.com/show_bug.cgi?id=2359964
https://bugzilla.redhat.com/show_bug.cgi?id=2359972
https://bugzilla.redhat.com/show_bug.cgi?id=2370920
https://bugzilla.redhat.com/show_bug.cgi?id=2380264
https://bugzilla.redhat.com/show_bug.cgi?id=2380273
https://bugzilla.redhat.com/show_bug.cgi?id=2380274
https://bugzilla.redhat.com/show_bug.cgi?id=2380278
https://bugzilla.redhat.com/show_bug.cgi?id=2380280
https://bugzilla.redhat.com/show_bug.cgi?id=2380283
https://bugzilla.redhat.com/show_bug.cgi?id=2380284
https://bugzilla.redhat.com/show_bug.cgi?id=2380290
https://bugzilla.redhat.com/show_bug.cgi?id=2380291
https://bugzilla.redhat.com/show_bug.cgi?id=2380295
https://bugzilla.redhat.com/show_bug.cgi?id=2380298
https://bugzilla.redhat.com/show_bug.cgi?id=2380306
https://bugzilla.redhat.com/show_bug.cgi?id=2380308
https://bugzilla.redhat.com/show_bug.cgi?id=2380309
https://bugzilla.redhat.com/show_bug.cgi?id=2380310
https://bugzilla.redhat.com/show_bug.cgi?id=2380312
https://bugzilla.redhat.com/show_bug.cgi?id=2380313
https://bugzilla.redhat.com/show_bug.cgi?id=2380320
https://bugzilla.redhat.com/show_bug.cgi?id=2380321
https://bugzilla.redhat.com/show_bug.cgi?id=2380322
https://bugzilla.redhat.com/show_bug.cgi?id=2380326
https://bugzilla.redhat.com/show_bug.cgi?id=2380327
https://bugzilla.redhat.com/show_bug.cgi?id=2380334
https://bugzilla.redhat.com/show_bug.cgi?id=2380335
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-13176
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21574
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21577
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21580
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21584
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21585
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21588
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30681
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30682
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30683
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30684
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30685
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30687
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30688
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30693
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30695
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30696
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30699
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30703
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30704
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30705
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30715
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30721
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50077
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50079
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50080
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50083
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50084
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50085
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50086
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50087
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50088
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50091
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50092
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50097
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50098
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50100
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50104
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5399
https://errata.almalinux.org/10/ALSA-2025-15699.html
https://errata.rockylinux.org/RLSA-2025:15699
https://github.com/openssl/openssl/commit/07272b05b04836a762b4baa874958af51d513844
https://github.com/openssl/openssl/commit/2af62e74fb59bc469506bc37eb2990ea408d9467
https://github.com/openssl/openssl/commit/392dcb336405a0c94486aa6655057f59fd3a0902
https://github.com/openssl/openssl/commit/4b1cb94a734a7d4ec363ac0a215a25c181e11f65
https://github.com/openssl/openssl/commit/77c608f4c8857e63e98e66444e2e761c9627916f
https://github.openssl.org/openssl/extended-releases/commit/0d5fd1ab987f7571e2c955d8d8b638fc0fb54ded
https://github.openssl.org/openssl/extended-releases/commit/a2639000db19878d5d89586ae7b725080592ae86
https://linux.oracle.com/cve/CVE-2024-13176.html
https://linux.oracle.com/errata/ELSA-2025-16046.html
https://lists.debian.org/debian-lts-announce/2025/05/msg00028.html
https://nvd.nist.gov/vuln/detail/CVE-2024-13176
https://openssl-library.org/news/secadv/20250120.txt
https://security.netapp.com/advisory/ntap-20250124-0005/
https://security.netapp.com/advisory/ntap-20250418-0010/
https://ubuntu.com/security/notices/USN-7264-1
https://ubuntu.com/security/notices/USN-7278-1
https://www.cve.org/CVERecord?id=CVE-2024-13176
https://www.oracle.com/security-alerts/cpuapr2025.html#AppendixMSQL
|
| libssl3 |
CVE-2024-4603 |
MEDIUM |
3.0.11-1~deb12u2 |
3.0.14-1~deb12u1 |
http://www.openwall.com/lists/oss-security/2024/05/16/2
https://access.redhat.com/errata/RHSA-2024:9333
https://access.redhat.com/security/cve/CVE-2024-4603
https://bugzilla.redhat.com/2274020
https://bugzilla.redhat.com/2281029
https://bugzilla.redhat.com/2283757
https://bugzilla.redhat.com/2294581
https://errata.almalinux.org/9/ALSA-2024-9333.html
https://github.com/openssl/openssl/commit/3559e868e58005d15c6013a0c1fd832e51c73397
https://github.com/openssl/openssl/commit/53ea06486d296b890d565fb971b2764fcd826e7e
https://github.com/openssl/openssl/commit/9c39b3858091c152f52513c066ff2c5a47969f0d
https://github.com/openssl/openssl/commit/da343d0605c826ef197aceedc67e8e04f065f740
https://linux.oracle.com/cve/CVE-2024-4603.html
https://linux.oracle.com/errata/ELSA-2024-9333.html
https://nvd.nist.gov/vuln/detail/CVE-2024-4603
https://security.netapp.com/advisory/ntap-20240621-0001/
https://ubuntu.com/security/notices/USN-6937-1
https://www.cve.org/CVERecord?id=CVE-2024-4603
https://www.openssl.org/news/secadv/20240516.txt
|
| libssl3 |
CVE-2024-4741 |
MEDIUM |
3.0.11-1~deb12u2 |
3.0.14-1~deb12u1 |
https://access.redhat.com/errata/RHSA-2024:9333
https://access.redhat.com/security/cve/CVE-2024-4741
https://bugzilla.redhat.com/2274020
https://bugzilla.redhat.com/2281029
https://bugzilla.redhat.com/2283757
https://bugzilla.redhat.com/2294581
https://errata.almalinux.org/9/ALSA-2024-9333.html
https://github.com/openssl/openssl/commit/704f725b96aa373ee45ecfb23f6abfe8be8d9177
https://github.com/openssl/openssl/commit/b3f0eb0a295f58f16ba43ba99dad70d4ee5c437d
https://github.com/openssl/openssl/commit/c88c3de51020c37e8706bf7a682a162593053aac
https://github.com/openssl/openssl/commit/e5093133c35ca82874ad83697af76f4b0f7e3bd8
https://github.openssl.org/openssl/extended-releases/commit/f7a045f3143fc6da2ee66bf52d8df04829590dd4
https://linux.oracle.com/cve/CVE-2024-4741.html
https://linux.oracle.com/errata/ELSA-2024-9333.html
https://nvd.nist.gov/vuln/detail/CVE-2024-4741
https://ubuntu.com/security/notices/USN-6937-1
https://www.cve.org/CVERecord?id=CVE-2024-4741
https://www.openssl.org/news/secadv/20240528.txt
|
| libssl3 |
CVE-2024-5535 |
MEDIUM |
3.0.11-1~deb12u2 |
3.0.15-1~deb12u1 |
http://www.openwall.com/lists/oss-security/2024/06/27/1
http://www.openwall.com/lists/oss-security/2024/06/28/4
http://www.openwall.com/lists/oss-security/2024/08/15/1
https://access.redhat.com/errata/RHSA-2025:1673
https://access.redhat.com/security/cve/CVE-2024-5535
https://bugzilla.redhat.com/2294581
https://bugzilla.redhat.com/2294676
https://bugzilla.redhat.com/2301888
https://bugzilla.redhat.com/2318857
https://bugzilla.redhat.com/2318858
https://bugzilla.redhat.com/2318870
https://bugzilla.redhat.com/2318873
https://bugzilla.redhat.com/2318874
https://bugzilla.redhat.com/2318876
https://bugzilla.redhat.com/2318882
https://bugzilla.redhat.com/2318883
https://bugzilla.redhat.com/2318884
https://bugzilla.redhat.com/2318885
https://bugzilla.redhat.com/2318886
https://bugzilla.redhat.com/2318897
https://bugzilla.redhat.com/2318900
https://bugzilla.redhat.com/2318905
https://bugzilla.redhat.com/2318914
https://bugzilla.redhat.com/2318922
https://bugzilla.redhat.com/2318923
https://bugzilla.redhat.com/2318925
https://bugzilla.redhat.com/2318926
https://bugzilla.redhat.com/2318927
https://bugzilla.redhat.com/2331191
https://bugzilla.redhat.com/2339218
https://bugzilla.redhat.com/2339220
https://bugzilla.redhat.com/2339221
https://bugzilla.redhat.com/2339226
https://bugzilla.redhat.com/2339231
https://bugzilla.redhat.com/2339236
https://bugzilla.redhat.com/2339238
https://bugzilla.redhat.com/2339243
https://bugzilla.redhat.com/2339247
https://bugzilla.redhat.com/2339252
https://bugzilla.redhat.com/2339259
https://bugzilla.redhat.com/2339266
https://bugzilla.redhat.com/2339270
https://bugzilla.redhat.com/2339271
https://bugzilla.redhat.com/2339275
https://bugzilla.redhat.com/2339277
https://bugzilla.redhat.com/2339281
https://bugzilla.redhat.com/2339284
https://bugzilla.redhat.com/2339291
https://bugzilla.redhat.com/2339293
https://bugzilla.redhat.com/2339295
https://bugzilla.redhat.com/2339299
https://bugzilla.redhat.com/2339300
https://bugzilla.redhat.com/2339304
https://bugzilla.redhat.com/2339305
https://bugzilla.redhat.com/show_bug.cgi?id=2294581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5535
https://errata.almalinux.org/8/ALSA-2025-1673.html
https://errata.rockylinux.org/RLSA-2024:7848
https://github.com/openssl/openssl/commit/4ada436a1946cbb24db5ab4ca082b69c1bc10f37
https://github.com/openssl/openssl/commit/99fb785a5f85315b95288921a321a935ea29a51e
https://github.com/openssl/openssl/commit/cf6f91f6121f4db167405db2f0de410a456f260c
https://github.com/openssl/openssl/commit/e86ac436f0bd54d4517745483e2315650fae7b2c
https://github.openssl.org/openssl/extended-releases/commit/9947251413065a05189a63c9b7a6c1d4e224c21c
https://github.openssl.org/openssl/extended-releases/commit/b78ec0824da857223486660177d3b1f255c65d87
https://linux.oracle.com/cve/CVE-2024-5535.html
https://linux.oracle.com/errata/ELSA-2025-1673.html
https://nvd.nist.gov/vuln/detail/CVE-2024-5535
https://openssl.org/news/secadv/20240627.txt
https://security.netapp.com/advisory/ntap-20240712-0005/
https://ubuntu.com/security/notices/USN-6937-1
https://www.cve.org/CVERecord?id=CVE-2024-5535
https://www.openssl.org/news/secadv/20240627.txt
https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL
|
| libssl3 |
CVE-2025-9230 |
MEDIUM |
3.0.11-1~deb12u2 |
3.0.17-1~deb12u3 |
https://access.redhat.com/security/cve/CVE-2025-9230
https://github.com/openssl/openssl/commit/5965ea5dd6960f36d8b7f74f8eac67a8eb8f2b45
https://github.com/openssl/openssl/commit/9e91358f365dee6c446dcdcdb01c04d2743fd280
https://github.com/openssl/openssl/commit/a79c4ce559c6a3a8fd4109e9f33c1185d5bf2def
https://github.com/openssl/openssl/commit/b5282d677551afda7d20e9c00e09561b547b2dfd
https://github.com/openssl/openssl/commit/bae259a211ada6315dc50900686daaaaaa55f482
https://github.openssl.org/openssl/extended-releases/commit/c2b96348bfa662f25f4fabf81958ae822063dae3
https://github.openssl.org/openssl/extended-releases/commit/dfbaf161d8dafc1132dd88cd48ad990ed9b4c8ba
https://nvd.nist.gov/vuln/detail/CVE-2025-9230
https://openssl-library.org/news/secadv/20250930.txt
https://ubuntu.com/security/notices/USN-7786-1
https://www.cve.org/CVERecord?id=CVE-2025-9230
|
| libssl3 |
CVE-2024-2511 |
LOW |
3.0.11-1~deb12u2 |
3.0.14-1~deb12u1 |
http://www.openwall.com/lists/oss-security/2024/04/08/5
https://access.redhat.com/errata/RHSA-2024:9333
https://access.redhat.com/security/cve/CVE-2024-2511
https://bugzilla.redhat.com/2274020
https://bugzilla.redhat.com/2281029
https://bugzilla.redhat.com/2283757
https://bugzilla.redhat.com/2294581
https://errata.almalinux.org/9/ALSA-2024-9333.html
https://github.com/openssl/openssl/commit/7e4d731b1c07201ad9374c1cd9ac5263bdf35bce
https://github.com/openssl/openssl/commit/b52867a9f618bb955bed2a3ce3db4d4f97ed8e5d
https://github.com/openssl/openssl/commit/e9d7083e241670332e0443da0f0d4ffb52829f08
https://github.openssl.org/openssl/extended-releases/commit/5f8d25770ae6437db119dfc951e207271a326640
https://linux.oracle.com/cve/CVE-2024-2511.html
https://linux.oracle.com/errata/ELSA-2024-9333.html
https://nvd.nist.gov/vuln/detail/CVE-2024-2511
https://security.netapp.com/advisory/ntap-20240503-0013/
https://ubuntu.com/security/notices/USN-6937-1
https://www.cve.org/CVERecord?id=CVE-2024-2511
https://www.openssl.org/news/secadv/20240408.txt
https://www.openssl.org/news/vulnerabilities.html
|
| libssl3 |
CVE-2024-9143 |
LOW |
3.0.11-1~deb12u2 |
3.0.15-1~deb12u1 |
http://www.openwall.com/lists/oss-security/2024/10/16/1
http://www.openwall.com/lists/oss-security/2024/10/23/1
http://www.openwall.com/lists/oss-security/2024/10/24/1
https://access.redhat.com/security/cve/CVE-2024-9143
https://github.com/openssl/openssl/commit/72ae83ad214d2eef262461365a1975707f862712
https://github.com/openssl/openssl/commit/bc7e04d7c8d509fb78fc0e285aa948fb0da04700
https://github.com/openssl/openssl/commit/c0d3e4d32d2805f49bec30547f225bc4d092e1f4
https://github.com/openssl/openssl/commit/fdf6723362ca51bd883295efe206cb5b1cfa5154
https://github.openssl.org/openssl/extended-releases/commit/8efc0cbaa8ebba8e116f7b81a876a4123594d86a
https://github.openssl.org/openssl/extended-releases/commit/9d576994cec2b7aa37a91740ea7e680810957e41
https://nvd.nist.gov/vuln/detail/CVE-2024-9143
https://openssl-library.org/news/secadv/20241016.txt
https://security.netapp.com/advisory/ntap-20241101-0001/
https://ubuntu.com/security/notices/USN-7264-1
https://ubuntu.com/security/notices/USN-7278-1
https://www.cve.org/CVERecord?id=CVE-2024-9143
|
| libssl3 |
CVE-2025-27587 |
LOW |
3.0.11-1~deb12u2 |
|
https://github.com/openssl/openssl/issues/24253
https://minerva.crocs.fi.muni.cz
https://www.cve.org/CVERecord?id=CVE-2025-27587
|
| libssl3 |
CVE-2025-9232 |
LOW |
3.0.11-1~deb12u2 |
3.0.17-1~deb12u3 |
https://access.redhat.com/security/cve/CVE-2025-9232
https://github.com/openssl/openssl/commit/2b4ec20e47959170422922eaff25346d362dcb35
https://github.com/openssl/openssl/commit/654dc11d23468a74fc8ea4672b702dd3feb7be4b
https://github.com/openssl/openssl/commit/7cf21a30513c9e43c4bc3836c237cf086e194af3
https://github.com/openssl/openssl/commit/89e790ac431125a4849992858490bed6b225eadf
https://github.com/openssl/openssl/commit/bbf38c034cdabd0a13330abcc4855c866f53d2e0
https://nvd.nist.gov/vuln/detail/CVE-2025-9232
https://openssl-library.org/news/secadv/20250930.txt
https://ubuntu.com/security/notices/USN-7786-1
https://www.cve.org/CVERecord?id=CVE-2025-9232
|
| libstdc++6 |
CVE-2022-27943 |
LOW |
12.2.0-14 |
|
https://access.redhat.com/security/cve/CVE-2022-27943
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=1a770b01ef415e114164b6151d1e55acdee09371
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=9234cdca6ee88badfc00297e72f13dac4e540c79
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=fc968115a742d9e4674d9725ce9c2106b91b6ead
https://gcc.gnu.org/pipermail/gcc-patches/2022-March/592244.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
https://nvd.nist.gov/vuln/detail/CVE-2022-27943
https://sourceware.org/bugzilla/show_bug.cgi?id=28995
https://www.cve.org/CVERecord?id=CVE-2022-27943
|
| libstdc++6 |
CVE-2023-4039 |
LOW |
12.2.0-14 |
12.2.0-14+deb12u1 |
https://access.redhat.com/security/cve/CVE-2023-4039
https://developer.arm.com/Arm%20Security%20Center/GCC%20Stack%20Protector%20Vulnerability%20AArch64
https://gcc.gnu.org/git/?p=gcc.git;a=blob_plain;f=SECURITY.txt
https://gcc.gnu.org/pipermail/gcc-patches/2023-October/634066.html
https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-x7ch-h5rf-w2mf
https://inbox.sourceware.org/gcc-patches/[email protected]
https://linux.oracle.com/cve/CVE-2023-4039.html
https://linux.oracle.com/errata/ELSA-2023-28766.html
https://nvd.nist.gov/vuln/detail/CVE-2023-4039
https://rtx.meta.security/mitigation/2023/09/12/CVE-2023-4039.html
https://ubuntu.com/security/notices/USN-7700-1
https://www.cve.org/CVERecord?id=CVE-2023-4039
|
| libsystemd-shared |
CVE-2023-50387 |
HIGH |
252.22-1~deb12u1 |
252.23-1~deb12u1 |
http://www.openwall.com/lists/oss-security/2024/02/16/2
http://www.openwall.com/lists/oss-security/2024/02/16/3
https://access.redhat.com/errata/RHSA-2024:3271
https://access.redhat.com/security/cve/CVE-2023-50387
https://blog.powerdns.com/2024/02/13/powerdns-recursor-4-8-6-4-9-3-5-0-2-released
https://bugzilla.redhat.com/2263896
https://bugzilla.redhat.com/2263914
https://bugzilla.redhat.com/2263917
https://bugzilla.redhat.com/show_bug.cgi?id=2263896
https://bugzilla.redhat.com/show_bug.cgi?id=2263897
https://bugzilla.redhat.com/show_bug.cgi?id=2263909
https://bugzilla.redhat.com/show_bug.cgi?id=2263911
https://bugzilla.redhat.com/show_bug.cgi?id=2263914
https://bugzilla.redhat.com/show_bug.cgi?id=2263917
https://bugzilla.suse.com/show_bug.cgi?id=1219823
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6516
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html
https://errata.almalinux.org/8/ALSA-2024-3271.html
https://errata.rockylinux.org/RLSA-2024:2551
https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1
https://kb.isc.org/docs/cve-2023-50387
https://linux.oracle.com/cve/CVE-2023-50387.html
https://linux.oracle.com/errata/ELSA-2024-3741.html
https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html
https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/
https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-50387
https://news.ycombinator.com/item?id=39367411
https://news.ycombinator.com/item?id=39372384
https://nlnetlabs.nl/downloads/unbound/CVE-2023-50387_CVE-2023-50868.txt
https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/
https://nvd.nist.gov/vuln/detail/CVE-2023-50387
https://security.netapp.com/advisory/ntap-20240307-0007/
https://ubuntu.com/security/notices/USN-6633-1
https://ubuntu.com/security/notices/USN-6642-1
https://ubuntu.com/security/notices/USN-6657-1
https://ubuntu.com/security/notices/USN-6657-2
https://ubuntu.com/security/notices/USN-6665-1
https://ubuntu.com/security/notices/USN-6723-1
https://www.athene-center.de/aktuelles/key-trap
https://www.athene-center.de/fileadmin/content/PDF/Technical_Report_KeyTrap.pdf
https://www.cve.org/CVERecord?id=CVE-2023-50387
https://www.isc.org/blogs/2024-bind-security-release/
https://www.knot-resolver.cz/2024-02-13-knot-resolver-5.7.1.html
https://www.securityweek.com/keytrap-dns-attack-could-disable-large-parts-of-internet-researchers/
https://www.theregister.com/2024/02/13/dnssec_vulnerability_internet/
|
| libsystemd-shared |
CVE-2023-50868 |
HIGH |
252.22-1~deb12u1 |
252.23-1~deb12u1 |
http://www.openwall.com/lists/oss-security/2024/02/16/2
http://www.openwall.com/lists/oss-security/2024/02/16/3
https://access.redhat.com/errata/RHSA-2024:3271
https://access.redhat.com/security/cve/CVE-2023-50868
https://blog.powerdns.com/2024/02/13/powerdns-recursor-4-8-6-4-9-3-5-0-2-released
https://bugzilla.redhat.com/2263896
https://bugzilla.redhat.com/2263914
https://bugzilla.redhat.com/2263917
https://bugzilla.redhat.com/show_bug.cgi?id=2263896
https://bugzilla.redhat.com/show_bug.cgi?id=2263897
https://bugzilla.redhat.com/show_bug.cgi?id=2263909
https://bugzilla.redhat.com/show_bug.cgi?id=2263911
https://bugzilla.redhat.com/show_bug.cgi?id=2263914
https://bugzilla.redhat.com/show_bug.cgi?id=2263917
https://bugzilla.suse.com/show_bug.cgi?id=1219826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6516
https://datatracker.ietf.org/doc/html/rfc5155
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html
https://errata.almalinux.org/8/ALSA-2024-3271.html
https://errata.rockylinux.org/RLSA-2024:2551
https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1
https://kb.isc.org/docs/cve-2023-50868
https://linux.oracle.com/cve/CVE-2023-50868.html
https://linux.oracle.com/errata/ELSA-2024-3741.html
https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html
https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/
https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html
https://nlnetlabs.nl/downloads/unbound/CVE-2023-50387_CVE-2023-50868.txt
https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/
https://nvd.nist.gov/vuln/detail/CVE-2023-50868
https://security.netapp.com/advisory/ntap-20240307-0008/
https://ubuntu.com/security/notices/USN-6633-1
https://ubuntu.com/security/notices/USN-6642-1
https://ubuntu.com/security/notices/USN-6657-1
https://ubuntu.com/security/notices/USN-6657-2
https://ubuntu.com/security/notices/USN-6665-1
https://ubuntu.com/security/notices/USN-6723-1
https://www.cve.org/CVERecord?id=CVE-2023-50868
https://www.isc.org/blogs/2024-bind-security-release/
https://www.knot-resolver.cz/2024-02-13-knot-resolver-5.7.1.html
|
| libsystemd-shared |
CVE-2025-4598 |
MEDIUM |
252.22-1~deb12u1 |
252.38-1~deb12u1 |
http://www.openwall.com/lists/oss-security/2025/06/05/1
http://www.openwall.com/lists/oss-security/2025/06/05/3
https://access.redhat.com/security/cve/CVE-2025-4598
https://blogs.oracle.com/linux/post/analysis-of-cve-2025-4598
https://bugzilla.redhat.com/show_bug.cgi?id=2369242
https://ciq.com/blog/the-real-danger-of-systemd-coredump-cve-2025-4598/
https://git.kernel.org/linus/b5325b2a270fcaf7b2a9a0f23d422ca8a5a8bdea
https://github.com/systemd/systemd/commit/0c49e0049b7665bb7769a13ef346fef92e1ad4d6 (main)
https://github.com/systemd/systemd/commit/13902e025321242b1d95c6d8b4e482b37f58cdef (main)
https://github.com/systemd/systemd/commit/49f1f2d4a7612bbed5211a73d11d6a94fbe3bb69 (main)
https://github.com/systemd/systemd/commit/76e0ab49c47965877c19772a2b3bf55f6417ca39 (main)
https://github.com/systemd/systemd/commit/868d95577ec9f862580ad365726515459be582fc (main)
https://github.com/systemd/systemd/commit/8fc7b2a211eb13ef1a94250b28e1c79cab8bdcb9 (main)
https://github.com/systemd/systemd/commit/9ce8e3e449def92c75ada41b7d10c5bc3946be77 (main)
https://github.com/systemd/systemd/commit/e6a8687b939ab21854f12f59a3cce703e32768cf (main)
https://linux.oracle.com/cve/CVE-2025-4598.html
https://linux.oracle.com/errata/ELSA-2025-20344.html
https://nvd.nist.gov/vuln/detail/CVE-2025-4598
https://ubuntu.com/security/notices/USN-7559-1
https://www.cve.org/CVERecord?id=CVE-2025-4598
https://www.openwall.com/lists/oss-security/2025/05/29/3
https://www.openwall.com/lists/oss-security/2025/08/18/3
https://www.qualys.com/2025/05/29/apport-coredump/apport-coredump.txt
|
| libsystemd-shared |
CVE-2013-4392 |
LOW |
252.22-1~deb12u1 |
|
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
https://nvd.nist.gov/vuln/detail/CVE-2013-4392
https://www.cve.org/CVERecord?id=CVE-2013-4392
|
| libsystemd-shared |
CVE-2023-31437 |
LOW |
252.22-1~deb12u1 |
|
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/releases
|
| libsystemd-shared |
CVE-2023-31438 |
LOW |
252.22-1~deb12u1 |
|
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/pull/28886
https://github.com/systemd/systemd/releases
|
| libsystemd-shared |
CVE-2023-31439 |
LOW |
252.22-1~deb12u1 |
|
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/pull/28885
https://github.com/systemd/systemd/releases
|
| libsystemd0 |
CVE-2023-50387 |
HIGH |
252.22-1~deb12u1 |
252.23-1~deb12u1 |
http://www.openwall.com/lists/oss-security/2024/02/16/2
http://www.openwall.com/lists/oss-security/2024/02/16/3
https://access.redhat.com/errata/RHSA-2024:3271
https://access.redhat.com/security/cve/CVE-2023-50387
https://blog.powerdns.com/2024/02/13/powerdns-recursor-4-8-6-4-9-3-5-0-2-released
https://bugzilla.redhat.com/2263896
https://bugzilla.redhat.com/2263914
https://bugzilla.redhat.com/2263917
https://bugzilla.redhat.com/show_bug.cgi?id=2263896
https://bugzilla.redhat.com/show_bug.cgi?id=2263897
https://bugzilla.redhat.com/show_bug.cgi?id=2263909
https://bugzilla.redhat.com/show_bug.cgi?id=2263911
https://bugzilla.redhat.com/show_bug.cgi?id=2263914
https://bugzilla.redhat.com/show_bug.cgi?id=2263917
https://bugzilla.suse.com/show_bug.cgi?id=1219823
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6516
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html
https://errata.almalinux.org/8/ALSA-2024-3271.html
https://errata.rockylinux.org/RLSA-2024:2551
https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1
https://kb.isc.org/docs/cve-2023-50387
https://linux.oracle.com/cve/CVE-2023-50387.html
https://linux.oracle.com/errata/ELSA-2024-3741.html
https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html
https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/
https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-50387
https://news.ycombinator.com/item?id=39367411
https://news.ycombinator.com/item?id=39372384
https://nlnetlabs.nl/downloads/unbound/CVE-2023-50387_CVE-2023-50868.txt
https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/
https://nvd.nist.gov/vuln/detail/CVE-2023-50387
https://security.netapp.com/advisory/ntap-20240307-0007/
https://ubuntu.com/security/notices/USN-6633-1
https://ubuntu.com/security/notices/USN-6642-1
https://ubuntu.com/security/notices/USN-6657-1
https://ubuntu.com/security/notices/USN-6657-2
https://ubuntu.com/security/notices/USN-6665-1
https://ubuntu.com/security/notices/USN-6723-1
https://www.athene-center.de/aktuelles/key-trap
https://www.athene-center.de/fileadmin/content/PDF/Technical_Report_KeyTrap.pdf
https://www.cve.org/CVERecord?id=CVE-2023-50387
https://www.isc.org/blogs/2024-bind-security-release/
https://www.knot-resolver.cz/2024-02-13-knot-resolver-5.7.1.html
https://www.securityweek.com/keytrap-dns-attack-could-disable-large-parts-of-internet-researchers/
https://www.theregister.com/2024/02/13/dnssec_vulnerability_internet/
|
| libsystemd0 |
CVE-2023-50868 |
HIGH |
252.22-1~deb12u1 |
252.23-1~deb12u1 |
http://www.openwall.com/lists/oss-security/2024/02/16/2
http://www.openwall.com/lists/oss-security/2024/02/16/3
https://access.redhat.com/errata/RHSA-2024:3271
https://access.redhat.com/security/cve/CVE-2023-50868
https://blog.powerdns.com/2024/02/13/powerdns-recursor-4-8-6-4-9-3-5-0-2-released
https://bugzilla.redhat.com/2263896
https://bugzilla.redhat.com/2263914
https://bugzilla.redhat.com/2263917
https://bugzilla.redhat.com/show_bug.cgi?id=2263896
https://bugzilla.redhat.com/show_bug.cgi?id=2263897
https://bugzilla.redhat.com/show_bug.cgi?id=2263909
https://bugzilla.redhat.com/show_bug.cgi?id=2263911
https://bugzilla.redhat.com/show_bug.cgi?id=2263914
https://bugzilla.redhat.com/show_bug.cgi?id=2263917
https://bugzilla.suse.com/show_bug.cgi?id=1219826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6516
https://datatracker.ietf.org/doc/html/rfc5155
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html
https://errata.almalinux.org/8/ALSA-2024-3271.html
https://errata.rockylinux.org/RLSA-2024:2551
https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1
https://kb.isc.org/docs/cve-2023-50868
https://linux.oracle.com/cve/CVE-2023-50868.html
https://linux.oracle.com/errata/ELSA-2024-3741.html
https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html
https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/
https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html
https://nlnetlabs.nl/downloads/unbound/CVE-2023-50387_CVE-2023-50868.txt
https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/
https://nvd.nist.gov/vuln/detail/CVE-2023-50868
https://security.netapp.com/advisory/ntap-20240307-0008/
https://ubuntu.com/security/notices/USN-6633-1
https://ubuntu.com/security/notices/USN-6642-1
https://ubuntu.com/security/notices/USN-6657-1
https://ubuntu.com/security/notices/USN-6657-2
https://ubuntu.com/security/notices/USN-6665-1
https://ubuntu.com/security/notices/USN-6723-1
https://www.cve.org/CVERecord?id=CVE-2023-50868
https://www.isc.org/blogs/2024-bind-security-release/
https://www.knot-resolver.cz/2024-02-13-knot-resolver-5.7.1.html
|
| libsystemd0 |
CVE-2025-4598 |
MEDIUM |
252.22-1~deb12u1 |
252.38-1~deb12u1 |
http://www.openwall.com/lists/oss-security/2025/06/05/1
http://www.openwall.com/lists/oss-security/2025/06/05/3
https://access.redhat.com/security/cve/CVE-2025-4598
https://blogs.oracle.com/linux/post/analysis-of-cve-2025-4598
https://bugzilla.redhat.com/show_bug.cgi?id=2369242
https://ciq.com/blog/the-real-danger-of-systemd-coredump-cve-2025-4598/
https://git.kernel.org/linus/b5325b2a270fcaf7b2a9a0f23d422ca8a5a8bdea
https://github.com/systemd/systemd/commit/0c49e0049b7665bb7769a13ef346fef92e1ad4d6 (main)
https://github.com/systemd/systemd/commit/13902e025321242b1d95c6d8b4e482b37f58cdef (main)
https://github.com/systemd/systemd/commit/49f1f2d4a7612bbed5211a73d11d6a94fbe3bb69 (main)
https://github.com/systemd/systemd/commit/76e0ab49c47965877c19772a2b3bf55f6417ca39 (main)
https://github.com/systemd/systemd/commit/868d95577ec9f862580ad365726515459be582fc (main)
https://github.com/systemd/systemd/commit/8fc7b2a211eb13ef1a94250b28e1c79cab8bdcb9 (main)
https://github.com/systemd/systemd/commit/9ce8e3e449def92c75ada41b7d10c5bc3946be77 (main)
https://github.com/systemd/systemd/commit/e6a8687b939ab21854f12f59a3cce703e32768cf (main)
https://linux.oracle.com/cve/CVE-2025-4598.html
https://linux.oracle.com/errata/ELSA-2025-20344.html
https://nvd.nist.gov/vuln/detail/CVE-2025-4598
https://ubuntu.com/security/notices/USN-7559-1
https://www.cve.org/CVERecord?id=CVE-2025-4598
https://www.openwall.com/lists/oss-security/2025/05/29/3
https://www.openwall.com/lists/oss-security/2025/08/18/3
https://www.qualys.com/2025/05/29/apport-coredump/apport-coredump.txt
|
| libsystemd0 |
CVE-2013-4392 |
LOW |
252.22-1~deb12u1 |
|
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
https://nvd.nist.gov/vuln/detail/CVE-2013-4392
https://www.cve.org/CVERecord?id=CVE-2013-4392
|
| libsystemd0 |
CVE-2023-31437 |
LOW |
252.22-1~deb12u1 |
|
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/releases
|
| libsystemd0 |
CVE-2023-31438 |
LOW |
252.22-1~deb12u1 |
|
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/pull/28886
https://github.com/systemd/systemd/releases
|
| libsystemd0 |
CVE-2023-31439 |
LOW |
252.22-1~deb12u1 |
|
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/pull/28885
https://github.com/systemd/systemd/releases
|
| libtasn1-6 |
CVE-2024-12133 |
MEDIUM |
4.19.0-2 |
4.19.0-2+deb12u1 |
http://www.openwall.com/lists/oss-security/2025/02/06/6
https://access.redhat.com/errata/RHSA-2025:17347
https://access.redhat.com/errata/RHSA-2025:4049
https://access.redhat.com/errata/RHSA-2025:7077
https://access.redhat.com/errata/RHSA-2025:8021
https://access.redhat.com/errata/RHSA-2025:8385
https://access.redhat.com/security/cve/CVE-2024-12133
https://bugzilla.redhat.com/2344611
https://bugzilla.redhat.com/show_bug.cgi?id=2344611
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12133
https://errata.almalinux.org/9/ALSA-2025-7077.html
https://errata.rockylinux.org/RLSA-2025:4049
https://gitlab.com/gnutls/libtasn1/-/blob/master/doc/security/CVE-2024-12133.md?ref_type=heads
https://gitlab.com/gnutls/libtasn1/-/issues/52
https://linux.oracle.com/cve/CVE-2024-12133.html
https://linux.oracle.com/errata/ELSA-2025-7077.html
https://lists.debian.org/debian-lts-announce/2025/02/msg00025.html
https://nvd.nist.gov/vuln/detail/CVE-2024-12133
https://security.netapp.com/advisory/ntap-20250523-0003/
https://ubuntu.com/security/notices/USN-7275-1
https://ubuntu.com/security/notices/USN-7275-2
https://www.cve.org/CVERecord?id=CVE-2024-12133
|
| libtiff6 |
CVE-2023-52355 |
HIGH |
4.5.0-6+deb12u1 |
|
https://access.redhat.com/security/cve/CVE-2023-52355
https://bugzilla.redhat.com/show_bug.cgi?id=2251326
https://gitlab.com/libtiff/libtiff/-/issues/621
https://nvd.nist.gov/vuln/detail/CVE-2023-52355
https://www.cve.org/CVERecord?id=CVE-2023-52355
|
| libtiff6 |
CVE-2023-52356 |
HIGH |
4.5.0-6+deb12u1 |
4.5.0-6+deb12u2 |
http://seclists.org/fulldisclosure/2024/Jul/16
http://seclists.org/fulldisclosure/2024/Jul/17
http://seclists.org/fulldisclosure/2024/Jul/18
http://seclists.org/fulldisclosure/2024/Jul/19
http://seclists.org/fulldisclosure/2024/Jul/20
http://seclists.org/fulldisclosure/2024/Jul/21
http://seclists.org/fulldisclosure/2024/Jul/22
http://seclists.org/fulldisclosure/2024/Jul/23
https://access.redhat.com/errata/RHSA-2024:5079
https://access.redhat.com/security/cve/CVE-2023-52356
https://bugzilla.redhat.com/1614051
https://bugzilla.redhat.com/2218744
https://bugzilla.redhat.com/2240995
https://bugzilla.redhat.com/2251344
https://bugzilla.redhat.com/show_bug.cgi?id=1614051
https://bugzilla.redhat.com/show_bug.cgi?id=2218744
https://bugzilla.redhat.com/show_bug.cgi?id=2240995
https://bugzilla.redhat.com/show_bug.cgi?id=2251344
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15209
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25433
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52356
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6228
https://errata.almalinux.org/8/ALSA-2024-5079.html
https://errata.rockylinux.org/RLSA-2024:5079
https://gitlab.com/libtiff/libtiff/-/issues/622
https://gitlab.com/libtiff/libtiff/-/merge_requests/546
https://linux.oracle.com/cve/CVE-2023-52356.html
https://linux.oracle.com/errata/ELSA-2024-5079.html
https://lists.debian.org/debian-lts-announce/2024/03/msg00011.html
https://nvd.nist.gov/vuln/detail/CVE-2023-52356
https://support.apple.com/kb/HT214116
https://support.apple.com/kb/HT214117
https://support.apple.com/kb/HT214118
https://support.apple.com/kb/HT214119
https://support.apple.com/kb/HT214120
https://support.apple.com/kb/HT214122
https://support.apple.com/kb/HT214123
https://support.apple.com/kb/HT214124
https://ubuntu.com/security/notices/USN-6644-1
https://ubuntu.com/security/notices/USN-6644-2
https://www.cve.org/CVERecord?id=CVE-2023-52356
|
| libtiff6 |
CVE-2024-7006 |
HIGH |
4.5.0-6+deb12u1 |
4.5.0-6+deb12u2 |
https://access.redhat.com/errata/RHSA-2024:6360
https://access.redhat.com/errata/RHSA-2024:8833
https://access.redhat.com/errata/RHSA-2024:8914
https://access.redhat.com/security/cve/CVE-2024-7006
https://bugzilla.redhat.com/2302996
https://bugzilla.redhat.com/show_bug.cgi?id=2302996
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7006
https://errata.almalinux.org/8/ALSA-2024-8833.html
https://errata.rockylinux.org/RLSA-2024:8914
https://gitlab.com/libtiff/libtiff/-/merge_requests/559
https://linux.oracle.com/cve/CVE-2024-7006.html
https://linux.oracle.com/errata/ELSA-2024-8914.html
https://nvd.nist.gov/vuln/detail/CVE-2024-7006
https://security.netapp.com/advisory/ntap-20240920-0001/
https://ubuntu.com/security/notices/USN-6997-1
https://ubuntu.com/security/notices/USN-6997-2
https://www.cve.org/CVERecord?id=CVE-2024-7006
|
| libtiff6 |
CVE-2025-9900 |
HIGH |
4.5.0-6+deb12u1 |
4.5.0-6+deb12u3 |
https://access.redhat.com/errata/RHSA-2025:17651
https://access.redhat.com/errata/RHSA-2025:17675
https://access.redhat.com/errata/RHSA-2025:17710
https://access.redhat.com/errata/RHSA-2025:17738
https://access.redhat.com/errata/RHSA-2025:17739
https://access.redhat.com/errata/RHSA-2025:17740
https://access.redhat.com/security/cve/CVE-2025-9900
https://bugzilla.redhat.com/2392784
https://bugzilla.redhat.com/show_bug.cgi?id=2392784
https://errata.almalinux.org/8/ALSA-2025-17675.html
https://github.com/SexyShoelessGodofWar/LibTiff-4.7.0-Write-What-Where?tab=readme-ov-file
https://gitlab.com/libtiff/libtiff/-/commit/3e0dcf0ec651638b2bd849b2e6f3124b36890d99 (v4.7.1rc1)
https://gitlab.com/libtiff/libtiff/-/issues/704
https://gitlab.com/libtiff/libtiff/-/merge_requests/732
https://linux.oracle.com/cve/CVE-2025-9900.html
https://linux.oracle.com/errata/ELSA-2025-17675.html
https://nvd.nist.gov/vuln/detail/CVE-2025-9900
https://ubuntu.com/security/notices/USN-7783-1
https://www.cve.org/CVERecord?id=CVE-2025-9900
|
| libtiff6 |
CVE-2023-25433 |
MEDIUM |
4.5.0-6+deb12u1 |
4.5.0-6+deb12u2 |
https://access.redhat.com/errata/RHSA-2024:5079
https://access.redhat.com/security/cve/CVE-2023-25433
https://bugzilla.redhat.com/1614051
https://bugzilla.redhat.com/2218744
https://bugzilla.redhat.com/2240995
https://bugzilla.redhat.com/2251344
https://bugzilla.redhat.com/show_bug.cgi?id=1614051
https://bugzilla.redhat.com/show_bug.cgi?id=2218744
https://bugzilla.redhat.com/show_bug.cgi?id=2240995
https://bugzilla.redhat.com/show_bug.cgi?id=2251344
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15209
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25433
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52356
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6228
https://errata.almalinux.org/8/ALSA-2024-5079.html
https://errata.rockylinux.org/RLSA-2024:5079
https://gitlab.com/libtiff/libtiff/-/issues/520
https://gitlab.com/libtiff/libtiff/-/merge_requests/467
https://linux.oracle.com/cve/CVE-2023-25433.html
https://linux.oracle.com/errata/ELSA-2024-5079.html
https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
https://nvd.nist.gov/vuln/detail/CVE-2023-25433
https://ubuntu.com/security/notices/USN-6229-1
https://ubuntu.com/security/notices/USN-6290-1
https://www.cve.org/CVERecord?id=CVE-2023-25433
|
| libtiff6 |
CVE-2023-26965 |
MEDIUM |
4.5.0-6+deb12u1 |
4.5.0-6+deb12u2 |
https://access.redhat.com/errata/RHSA-2023:6575
https://access.redhat.com/security/cve/CVE-2023-26965
https://bugzilla.redhat.com/2207635
https://bugzilla.redhat.com/2215206
https://bugzilla.redhat.com/2216080
https://bugzilla.redhat.com/2218749
https://bugzilla.redhat.com/2219340
https://errata.almalinux.org/9/ALSA-2023-6575.html
https://gitlab.com/libtiff/libtiff/-/merge_requests/472
https://linux.oracle.com/cve/CVE-2023-26965.html
https://linux.oracle.com/errata/ELSA-2023-6575.html
https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
https://nvd.nist.gov/vuln/detail/CVE-2023-26965
https://security.netapp.com/advisory/ntap-20230706-0009/
https://ubuntu.com/security/notices/USN-6229-1
https://ubuntu.com/security/notices/USN-6290-1
https://www.cve.org/CVERecord?id=CVE-2023-26965
|
| libtiff6 |
CVE-2023-26966 |
MEDIUM |
4.5.0-6+deb12u1 |
4.5.0-6+deb12u2 |
https://access.redhat.com/errata/RHSA-2023:6575
https://access.redhat.com/security/cve/CVE-2023-26966
https://bugzilla.redhat.com/2207635
https://bugzilla.redhat.com/2215206
https://bugzilla.redhat.com/2216080
https://bugzilla.redhat.com/2218749
https://bugzilla.redhat.com/2219340
https://errata.almalinux.org/9/ALSA-2023-6575.html
https://gitlab.com/libtiff/libtiff/-/commit/b0e1c25dd1d065200c8d8f59ad0afe014861a1b9 (v4.5.1rc1)
https://gitlab.com/libtiff/libtiff/-/issues/530
https://gitlab.com/libtiff/libtiff/-/merge_requests/473
https://linux.oracle.com/cve/CVE-2023-26966.html
https://linux.oracle.com/errata/ELSA-2023-6575.html
https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
https://nvd.nist.gov/vuln/detail/CVE-2023-26966
https://ubuntu.com/security/notices/USN-6229-1
https://ubuntu.com/security/notices/USN-6290-1
https://www.cve.org/CVERecord?id=CVE-2023-26966
|
| libtiff6 |
CVE-2023-2908 |
MEDIUM |
4.5.0-6+deb12u1 |
4.5.0-6+deb12u2 |
https://access.redhat.com/security/cve/CVE-2023-2908
https://bugzilla.redhat.com/show_bug.cgi?id=2218830
https://gitlab.com/libtiff/libtiff/-/commit/9bd48f0dbd64fb94dc2b5b05238fde0bfdd4ff3f
https://gitlab.com/libtiff/libtiff/-/merge_requests/479
https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
https://nvd.nist.gov/vuln/detail/CVE-2023-2908
https://security.netapp.com/advisory/ntap-20230731-0004/
https://ubuntu.com/security/notices/USN-6290-1
https://www.cve.org/CVERecord?id=CVE-2023-2908
|
| libtiff6 |
CVE-2023-3618 |
MEDIUM |
4.5.0-6+deb12u1 |
4.5.0-6+deb12u2 |
https://access.redhat.com/errata/RHSA-2024:2289
https://access.redhat.com/security/cve/CVE-2023-3618
https://bugzilla.redhat.com/2215865
https://bugzilla.redhat.com/2234970
https://bugzilla.redhat.com/2235264
https://bugzilla.redhat.com/2235265
https://bugzilla.redhat.com/2240995
https://bugzilla.redhat.com/show_bug.cgi?id=2215865
https://errata.almalinux.org/9/ALSA-2024-2289.html
https://gitlab.com/libtiff/libtiff/-/commit/8a4f6b587be4fa7bb39fe17f5f9dec52182ab26e
https://gitlab.com/libtiff/libtiff/-/issues/529
https://linux.oracle.com/cve/CVE-2023-3618.html
https://linux.oracle.com/errata/ELSA-2024-2289.html
https://lists.debian.org/debian-lts-announce/2023/07/msg00034.html
https://nvd.nist.gov/vuln/detail/CVE-2023-3618
https://security.netapp.com/advisory/ntap-20230824-0012/
https://support.apple.com/kb/HT214036
https://support.apple.com/kb/HT214037
https://support.apple.com/kb/HT214038
https://ubuntu.com/security/notices/USN-6290-1
https://www.cve.org/CVERecord?id=CVE-2023-3618
|
| libtiff6 |
CVE-2023-6277 |
MEDIUM |
4.5.0-6+deb12u1 |
|
http://seclists.org/fulldisclosure/2024/Jul/16
http://seclists.org/fulldisclosure/2024/Jul/17
http://seclists.org/fulldisclosure/2024/Jul/18
http://seclists.org/fulldisclosure/2024/Jul/19
http://seclists.org/fulldisclosure/2024/Jul/20
http://seclists.org/fulldisclosure/2024/Jul/21
http://seclists.org/fulldisclosure/2024/Jul/22
http://seclists.org/fulldisclosure/2024/Jul/23
https://access.redhat.com/security/cve/CVE-2023-6277
https://bugzilla.redhat.com/show_bug.cgi?id=2251311
https://gitlab.com/libtiff/libtiff/-/issues/614
https://gitlab.com/libtiff/libtiff/-/merge_requests/545
https://lists.fedoraproject.org/archives/list/[email protected]/message/WJIN6DTSL3VODZUGWEUXLEL5DR53EZMV/
https://lists.fedoraproject.org/archives/list/[email protected]/message/Y7ZGN2MZXJ6E57W3L4YBM3ZPAU3T7T5C/
https://nvd.nist.gov/vuln/detail/CVE-2023-6277
https://security.netapp.com/advisory/ntap-20240119-0002/
https://support.apple.com/kb/HT214116
https://support.apple.com/kb/HT214117
https://support.apple.com/kb/HT214118
https://support.apple.com/kb/HT214119
https://support.apple.com/kb/HT214120
https://support.apple.com/kb/HT214122
https://support.apple.com/kb/HT214123
https://support.apple.com/kb/HT214124
https://ubuntu.com/security/notices/USN-6644-1
https://ubuntu.com/security/notices/USN-6644-2
https://www.cve.org/CVERecord?id=CVE-2023-6277
|
| libtiff6 |
CVE-2017-16232 |
LOW |
4.5.0-6+deb12u1 |
|
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html
http://packetstormsecurity.com/files/150896/LibTIFF-4.0.8-Memory-Leak.html
http://seclists.org/fulldisclosure/2018/Dec/32
http://seclists.org/fulldisclosure/2018/Dec/47
http://www.openwall.com/lists/oss-security/2017/11/01/11
http://www.openwall.com/lists/oss-security/2017/11/01/3
http://www.openwall.com/lists/oss-security/2017/11/01/7
http://www.openwall.com/lists/oss-security/2017/11/01/8
http://www.securityfocus.com/bid/101696
https://access.redhat.com/security/cve/CVE-2017-16232
https://nvd.nist.gov/vuln/detail/CVE-2017-16232
https://www.cve.org/CVERecord?id=CVE-2017-16232
|
| libtiff6 |
CVE-2018-10126 |
LOW |
4.5.0-6+deb12u1 |
|
http://bugzilla.maptools.org/show_bug.cgi?id=2786
https://access.redhat.com/security/cve/CVE-2018-10126
https://gitlab.com/libtiff/libtiff/-/issues/128
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-10126
https://www.cve.org/CVERecord?id=CVE-2018-10126
|
| libtiff6 |
CVE-2022-1210 |
LOW |
4.5.0-6+deb12u1 |
|
https://access.redhat.com/security/cve/CVE-2022-1210
https://gitlab.com/libtiff/libtiff/-/issues/402
https://gitlab.com/libtiff/libtiff/uploads/c3da94e53cf1e1e8e6d4d3780dc8c42f/example.tiff
https://nvd.nist.gov/vuln/detail/CVE-2022-1210
https://security.gentoo.org/glsa/202210-10
https://security.netapp.com/advisory/ntap-20220513-0005/
https://vuldb.com/?id.196363
https://www.cve.org/CVERecord?id=CVE-2022-1210
|
| libtiff6 |
CVE-2023-1916 |
LOW |
4.5.0-6+deb12u1 |
|
https://access.redhat.com/security/cve/CVE-2023-1916
https://gitlab.com/libtiff/libtiff/-/issues/536
https://gitlab.com/libtiff/libtiff/-/issues/536%2C
https://gitlab.com/libtiff/libtiff/-/issues/536,
https://gitlab.com/libtiff/libtiff/-/issues/537
https://nvd.nist.gov/vuln/detail/CVE-2023-1916
https://support.apple.com/kb/HT213844
https://ubuntu.com/security/notices/USN-6428-1
https://www.cve.org/CVERecord?id=CVE-2023-1916
|
| libtiff6 |
CVE-2023-3164 |
LOW |
4.5.0-6+deb12u1 |
|
https://access.redhat.com/security/cve/CVE-2023-3164
https://bugzilla.redhat.com/show_bug.cgi?id=2213531
https://gitlab.com/libtiff/libtiff/-/issues/542
https://gitlab.com/libtiff/libtiff/-/merge_requests/595
https://nvd.nist.gov/vuln/detail/CVE-2023-3164
https://ubuntu.com/security/notices/USN-6827-1
https://www.cve.org/CVERecord?id=CVE-2023-3164
|
| libtiff6 |
CVE-2023-6228 |
LOW |
4.5.0-6+deb12u1 |
|
https://access.redhat.com/errata/RHSA-2024:2289
https://access.redhat.com/errata/RHSA-2024:5079
https://access.redhat.com/security/cve/CVE-2023-6228
https://bugzilla.redhat.com/1614051
https://bugzilla.redhat.com/2218744
https://bugzilla.redhat.com/2240995
https://bugzilla.redhat.com/2251344
https://bugzilla.redhat.com/show_bug.cgi?id=1614051
https://bugzilla.redhat.com/show_bug.cgi?id=2218744
https://bugzilla.redhat.com/show_bug.cgi?id=2240995
https://bugzilla.redhat.com/show_bug.cgi?id=2251344
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15209
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25433
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52356
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6228
https://errata.almalinux.org/8/ALSA-2024-5079.html
https://errata.rockylinux.org/RLSA-2024:5079
https://linux.oracle.com/cve/CVE-2023-6228.html
https://linux.oracle.com/errata/ELSA-2024-5079.html
https://nvd.nist.gov/vuln/detail/CVE-2023-6228
https://ubuntu.com/security/notices/USN-6644-1
https://ubuntu.com/security/notices/USN-6644-2
https://www.cve.org/CVERecord?id=CVE-2023-6228
|
| libtiff6 |
CVE-2024-13978 |
LOW |
4.5.0-6+deb12u1 |
|
http://www.libtiff.org/
https://access.redhat.com/security/cve/CVE-2024-13978
https://gitlab.com/libtiff/libtiff/-/commit/2ebfffb0e8836bfb1cd7d85c059cd285c59761a4
https://gitlab.com/libtiff/libtiff/-/issues/649
https://gitlab.com/libtiff/libtiff/-/merge_requests/667
https://nvd.nist.gov/vuln/detail/CVE-2024-13978
https://vuldb.com/?ctiid.318355
https://vuldb.com/?id.318355
https://vuldb.com/?submit.624562
https://www.cve.org/CVERecord?id=CVE-2024-13978
|
| libtiff6 |
CVE-2025-8176 |
LOW |
4.5.0-6+deb12u1 |
|
http://www.libtiff.org/
https://access.redhat.com/security/cve/CVE-2025-8176
https://gitlab.com/libtiff/libtiff/-/commit/fe10872e53efba9cc36c66ac4ab3b41a839d5172
https://gitlab.com/libtiff/libtiff/-/issues/707
https://gitlab.com/libtiff/libtiff/-/merge_requests/727
https://nvd.nist.gov/vuln/detail/CVE-2025-8176
https://ubuntu.com/security/notices/USN-7707-1
https://vuldb.com/?ctiid.317590
https://vuldb.com/?id.317590
https://vuldb.com/?submit.621796
https://www.cve.org/CVERecord?id=CVE-2025-8176
|
| libtiff6 |
CVE-2025-8177 |
LOW |
4.5.0-6+deb12u1 |
|
http://www.libtiff.org/
https://access.redhat.com/security/cve/CVE-2025-8177
https://gitlab.com/libtiff/libtiff/-/commit/e8c9d6c616b19438695fd829e58ae4fde5bfbc22
https://gitlab.com/libtiff/libtiff/-/issues/715
https://gitlab.com/libtiff/libtiff/-/merge_requests/737
https://nvd.nist.gov/vuln/detail/CVE-2025-8177
https://ubuntu.com/security/notices/USN-7707-1
https://vuldb.com/?ctiid.317591
https://vuldb.com/?id.317591
https://vuldb.com/?submit.621797
https://www.cve.org/CVERecord?id=CVE-2025-8177
|
| libtiff6 |
CVE-2025-8534 |
LOW |
4.5.0-6+deb12u1 |
|
http://www.libtiff.org/
https://access.redhat.com/security/cve/CVE-2025-8534
https://drive.google.com/file/d/15JPA3kLYiYD-nRNJ8y8HmnYjhv9NE7k6/view?usp=drive_link
https://gitlab.com/libtiff/libtiff/-/commit/6ba36f159fd396ad11bf6b7874554197736ecc8b
https://gitlab.com/libtiff/libtiff/-/issues/718
https://gitlab.com/libtiff/libtiff/-/merge_requests/746
https://nvd.nist.gov/vuln/detail/CVE-2025-8534
https://ubuntu.com/security/notices/USN-7707-1
https://vuldb.com/?ctiid.318664
https://vuldb.com/?id.318664
https://vuldb.com/?submit.617831
https://www.cve.org/CVERecord?id=CVE-2025-8534
|
| libtiff6 |
CVE-2025-8851 |
LOW |
4.5.0-6+deb12u1 |
|
http://www.libtiff.org/
https://access.redhat.com/security/cve/CVE-2025-8851
https://gitlab.com/libtiff/libtiff/-/commit/8a7a48d7a645992ca83062b3a1873c951661e2b3
https://gitlab.com/libtiff/libtiff/-/commit/8a7a48d7a645992ca83062b3a1873c951661e2b3 (v4.7.0rc1)
https://nvd.nist.gov/vuln/detail/CVE-2025-8851
https://ubuntu.com/security/notices/USN-7707-1
https://vuldb.com/?ctiid.319382
https://vuldb.com/?id.319382
https://vuldb.com/?submit.624604
https://www.cve.org/CVERecord?id=CVE-2025-8851
|
| libtiff6 |
CVE-2025-8961 |
LOW |
4.5.0-6+deb12u1 |
|
http://www.libtiff.org/
https://access.redhat.com/security/cve/CVE-2025-8961
https://drive.google.com/file/d/15L4q2eD8GX3Aj3z6SWC3_FbqaM1ChUx2/view?usp=sharing
https://gitlab.com/libtiff/libtiff/-/issues/721
https://gitlab.com/libtiff/libtiff/-/issues/721#note_2670686960
https://nvd.nist.gov/vuln/detail/CVE-2025-8961
https://ubuntu.com/security/notices/USN-7783-1
https://vuldb.com/?ctiid.319955
https://vuldb.com/?id.319955
https://vuldb.com/?submit.627957
https://www.cve.org/CVERecord?id=CVE-2025-8961
|
| libtiff6 |
CVE-2025-9165 |
LOW |
4.5.0-6+deb12u1 |
|
http://www.libtiff.org/
https://access.redhat.com/security/cve/CVE-2025-9165
https://drive.google.com/file/d/1FWhmkzksH8-qU0ZM6seBzGNB3aPnX3G8/view?usp=sharing
https://gitlab.com/libtiff/libtiff/-/commit/ed141286a37f6e5ddafb5069347ff5d587e7a4e0
https://gitlab.com/libtiff/libtiff/-/issues/728
https://gitlab.com/libtiff/libtiff/-/issues/728#note_2709263214
https://gitlab.com/libtiff/libtiff/-/merge_requests/747
https://nvd.nist.gov/vuln/detail/CVE-2025-9165
https://ubuntu.com/security/notices/USN-7783-1
https://vuldb.com/?ctiid.320543
https://vuldb.com/?id.320543
https://vuldb.com/?submit.630506
https://vuldb.com/?submit.630507
https://www.cve.org/CVERecord?id=CVE-2025-9165
|
| libtinfo6 |
CVE-2023-50495 |
MEDIUM |
6.4-4 |
|
https://access.redhat.com/security/cve/CVE-2023-50495
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/
https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00020.html
https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00029.html
https://nvd.nist.gov/vuln/detail/CVE-2023-50495
https://security.netapp.com/advisory/ntap-20240119-0008/
https://ubuntu.com/security/notices/USN-6684-1
https://www.cve.org/CVERecord?id=CVE-2023-50495
|
| libtinfo6 |
CVE-2025-6141 |
LOW |
6.4-4 |
|
https://access.redhat.com/security/cve/CVE-2025-6141
https://invisible-island.net/ncurses/NEWS.html#index-t20250329
https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00107.html
https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00109.html
https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00114.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6141
https://vuldb.com/?ctiid.312610
https://vuldb.com/?id.312610
https://vuldb.com/?submit.593000
https://www.cve.org/CVERecord?id=CVE-2025-6141
https://www.gnu.org/
|
| libudev1 |
CVE-2023-50387 |
HIGH |
252.22-1~deb12u1 |
252.23-1~deb12u1 |
http://www.openwall.com/lists/oss-security/2024/02/16/2
http://www.openwall.com/lists/oss-security/2024/02/16/3
https://access.redhat.com/errata/RHSA-2024:3271
https://access.redhat.com/security/cve/CVE-2023-50387
https://blog.powerdns.com/2024/02/13/powerdns-recursor-4-8-6-4-9-3-5-0-2-released
https://bugzilla.redhat.com/2263896
https://bugzilla.redhat.com/2263914
https://bugzilla.redhat.com/2263917
https://bugzilla.redhat.com/show_bug.cgi?id=2263896
https://bugzilla.redhat.com/show_bug.cgi?id=2263897
https://bugzilla.redhat.com/show_bug.cgi?id=2263909
https://bugzilla.redhat.com/show_bug.cgi?id=2263911
https://bugzilla.redhat.com/show_bug.cgi?id=2263914
https://bugzilla.redhat.com/show_bug.cgi?id=2263917
https://bugzilla.suse.com/show_bug.cgi?id=1219823
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6516
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html
https://errata.almalinux.org/8/ALSA-2024-3271.html
https://errata.rockylinux.org/RLSA-2024:2551
https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1
https://kb.isc.org/docs/cve-2023-50387
https://linux.oracle.com/cve/CVE-2023-50387.html
https://linux.oracle.com/errata/ELSA-2024-3741.html
https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html
https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/
https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-50387
https://news.ycombinator.com/item?id=39367411
https://news.ycombinator.com/item?id=39372384
https://nlnetlabs.nl/downloads/unbound/CVE-2023-50387_CVE-2023-50868.txt
https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/
https://nvd.nist.gov/vuln/detail/CVE-2023-50387
https://security.netapp.com/advisory/ntap-20240307-0007/
https://ubuntu.com/security/notices/USN-6633-1
https://ubuntu.com/security/notices/USN-6642-1
https://ubuntu.com/security/notices/USN-6657-1
https://ubuntu.com/security/notices/USN-6657-2
https://ubuntu.com/security/notices/USN-6665-1
https://ubuntu.com/security/notices/USN-6723-1
https://www.athene-center.de/aktuelles/key-trap
https://www.athene-center.de/fileadmin/content/PDF/Technical_Report_KeyTrap.pdf
https://www.cve.org/CVERecord?id=CVE-2023-50387
https://www.isc.org/blogs/2024-bind-security-release/
https://www.knot-resolver.cz/2024-02-13-knot-resolver-5.7.1.html
https://www.securityweek.com/keytrap-dns-attack-could-disable-large-parts-of-internet-researchers/
https://www.theregister.com/2024/02/13/dnssec_vulnerability_internet/
|
| libudev1 |
CVE-2023-50868 |
HIGH |
252.22-1~deb12u1 |
252.23-1~deb12u1 |
http://www.openwall.com/lists/oss-security/2024/02/16/2
http://www.openwall.com/lists/oss-security/2024/02/16/3
https://access.redhat.com/errata/RHSA-2024:3271
https://access.redhat.com/security/cve/CVE-2023-50868
https://blog.powerdns.com/2024/02/13/powerdns-recursor-4-8-6-4-9-3-5-0-2-released
https://bugzilla.redhat.com/2263896
https://bugzilla.redhat.com/2263914
https://bugzilla.redhat.com/2263917
https://bugzilla.redhat.com/show_bug.cgi?id=2263896
https://bugzilla.redhat.com/show_bug.cgi?id=2263897
https://bugzilla.redhat.com/show_bug.cgi?id=2263909
https://bugzilla.redhat.com/show_bug.cgi?id=2263911
https://bugzilla.redhat.com/show_bug.cgi?id=2263914
https://bugzilla.redhat.com/show_bug.cgi?id=2263917
https://bugzilla.suse.com/show_bug.cgi?id=1219826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6516
https://datatracker.ietf.org/doc/html/rfc5155
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html
https://errata.almalinux.org/8/ALSA-2024-3271.html
https://errata.rockylinux.org/RLSA-2024:2551
https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1
https://kb.isc.org/docs/cve-2023-50868
https://linux.oracle.com/cve/CVE-2023-50868.html
https://linux.oracle.com/errata/ELSA-2024-3741.html
https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html
https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/
https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html
https://nlnetlabs.nl/downloads/unbound/CVE-2023-50387_CVE-2023-50868.txt
https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/
https://nvd.nist.gov/vuln/detail/CVE-2023-50868
https://security.netapp.com/advisory/ntap-20240307-0008/
https://ubuntu.com/security/notices/USN-6633-1
https://ubuntu.com/security/notices/USN-6642-1
https://ubuntu.com/security/notices/USN-6657-1
https://ubuntu.com/security/notices/USN-6657-2
https://ubuntu.com/security/notices/USN-6665-1
https://ubuntu.com/security/notices/USN-6723-1
https://www.cve.org/CVERecord?id=CVE-2023-50868
https://www.isc.org/blogs/2024-bind-security-release/
https://www.knot-resolver.cz/2024-02-13-knot-resolver-5.7.1.html
|
| libudev1 |
CVE-2025-4598 |
MEDIUM |
252.22-1~deb12u1 |
252.38-1~deb12u1 |
http://www.openwall.com/lists/oss-security/2025/06/05/1
http://www.openwall.com/lists/oss-security/2025/06/05/3
https://access.redhat.com/security/cve/CVE-2025-4598
https://blogs.oracle.com/linux/post/analysis-of-cve-2025-4598
https://bugzilla.redhat.com/show_bug.cgi?id=2369242
https://ciq.com/blog/the-real-danger-of-systemd-coredump-cve-2025-4598/
https://git.kernel.org/linus/b5325b2a270fcaf7b2a9a0f23d422ca8a5a8bdea
https://github.com/systemd/systemd/commit/0c49e0049b7665bb7769a13ef346fef92e1ad4d6 (main)
https://github.com/systemd/systemd/commit/13902e025321242b1d95c6d8b4e482b37f58cdef (main)
https://github.com/systemd/systemd/commit/49f1f2d4a7612bbed5211a73d11d6a94fbe3bb69 (main)
https://github.com/systemd/systemd/commit/76e0ab49c47965877c19772a2b3bf55f6417ca39 (main)
https://github.com/systemd/systemd/commit/868d95577ec9f862580ad365726515459be582fc (main)
https://github.com/systemd/systemd/commit/8fc7b2a211eb13ef1a94250b28e1c79cab8bdcb9 (main)
https://github.com/systemd/systemd/commit/9ce8e3e449def92c75ada41b7d10c5bc3946be77 (main)
https://github.com/systemd/systemd/commit/e6a8687b939ab21854f12f59a3cce703e32768cf (main)
https://linux.oracle.com/cve/CVE-2025-4598.html
https://linux.oracle.com/errata/ELSA-2025-20344.html
https://nvd.nist.gov/vuln/detail/CVE-2025-4598
https://ubuntu.com/security/notices/USN-7559-1
https://www.cve.org/CVERecord?id=CVE-2025-4598
https://www.openwall.com/lists/oss-security/2025/05/29/3
https://www.openwall.com/lists/oss-security/2025/08/18/3
https://www.qualys.com/2025/05/29/apport-coredump/apport-coredump.txt
|
| libudev1 |
CVE-2013-4392 |
LOW |
252.22-1~deb12u1 |
|
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
https://nvd.nist.gov/vuln/detail/CVE-2013-4392
https://www.cve.org/CVERecord?id=CVE-2013-4392
|
| libudev1 |
CVE-2023-31437 |
LOW |
252.22-1~deb12u1 |
|
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/releases
|
| libudev1 |
CVE-2023-31438 |
LOW |
252.22-1~deb12u1 |
|
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/pull/28886
https://github.com/systemd/systemd/releases
|
| libudev1 |
CVE-2023-31439 |
LOW |
252.22-1~deb12u1 |
|
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/pull/28885
https://github.com/systemd/systemd/releases
|
| libuno-cppu3 |
CVE-2012-5639 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://www.openwall.com/lists/oss-security/2012/12/14/1
http://www.openwall.com/lists/oss-security/2023/12/28/6
http://www.openwall.com/lists/oss-security/2024/01/03/6
http://www.openwall.com/lists/oss-security/2024/01/03/7
https://access.redhat.com/security/cve/CVE-2012-5639
https://access.redhat.com/security/cve/cve-2012-5639
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5639
https://lists.apache.org/thread.html/r253f92d0e6511d07a79774002e1d9db1d20b24bff27914a5adb14ccb%40%3Cissues.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2012-5639
https://security-tracker.debian.org/tracker/CVE-2012-5639
https://www.cve.org/CVERecord?id=CVE-2012-5639
|
| libuno-cppu3 |
CVE-2018-10583 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://seclists.org/fulldisclosure/2020/Oct/26
http://secureyourit.co.uk/wp/2018/05/01/creating-malicious-odt-files/
https://access.redhat.com/errata/RHSA-2018:3054
https://access.redhat.com/security/cve/CVE-2018-10583
https://lists.apache.org/thread.html/0598708912978b27121b2e380b44a225c706aca882cd1da6a955a0af%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/6c65f22306c36c95e75f8d2b7f49cfcbeb0a4614245c20934612a39d%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/c8fd59ac77b42aac90eb5c59b87f3ab59b5e0c3bfb4819aa649a2909%40%3Cdev.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-10583
https://security-tracker.debian.org/tracker/CVE-2018-10583
https://ubuntu.com/security/notices/USN-3883-1
https://usn.ubuntu.com/3883-1/
https://www.cve.org/CVERecord?id=CVE-2018-10583
https://www.exploit-db.com/exploits/44564/
|
| libuno-cppuhelpergcc3-3 |
CVE-2012-5639 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://www.openwall.com/lists/oss-security/2012/12/14/1
http://www.openwall.com/lists/oss-security/2023/12/28/6
http://www.openwall.com/lists/oss-security/2024/01/03/6
http://www.openwall.com/lists/oss-security/2024/01/03/7
https://access.redhat.com/security/cve/CVE-2012-5639
https://access.redhat.com/security/cve/cve-2012-5639
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5639
https://lists.apache.org/thread.html/r253f92d0e6511d07a79774002e1d9db1d20b24bff27914a5adb14ccb%40%3Cissues.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2012-5639
https://security-tracker.debian.org/tracker/CVE-2012-5639
https://www.cve.org/CVERecord?id=CVE-2012-5639
|
| libuno-cppuhelpergcc3-3 |
CVE-2018-10583 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://seclists.org/fulldisclosure/2020/Oct/26
http://secureyourit.co.uk/wp/2018/05/01/creating-malicious-odt-files/
https://access.redhat.com/errata/RHSA-2018:3054
https://access.redhat.com/security/cve/CVE-2018-10583
https://lists.apache.org/thread.html/0598708912978b27121b2e380b44a225c706aca882cd1da6a955a0af%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/6c65f22306c36c95e75f8d2b7f49cfcbeb0a4614245c20934612a39d%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/c8fd59ac77b42aac90eb5c59b87f3ab59b5e0c3bfb4819aa649a2909%40%3Cdev.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-10583
https://security-tracker.debian.org/tracker/CVE-2018-10583
https://ubuntu.com/security/notices/USN-3883-1
https://usn.ubuntu.com/3883-1/
https://www.cve.org/CVERecord?id=CVE-2018-10583
https://www.exploit-db.com/exploits/44564/
|
| libuno-purpenvhelpergcc3-3 |
CVE-2012-5639 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://www.openwall.com/lists/oss-security/2012/12/14/1
http://www.openwall.com/lists/oss-security/2023/12/28/6
http://www.openwall.com/lists/oss-security/2024/01/03/6
http://www.openwall.com/lists/oss-security/2024/01/03/7
https://access.redhat.com/security/cve/CVE-2012-5639
https://access.redhat.com/security/cve/cve-2012-5639
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5639
https://lists.apache.org/thread.html/r253f92d0e6511d07a79774002e1d9db1d20b24bff27914a5adb14ccb%40%3Cissues.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2012-5639
https://security-tracker.debian.org/tracker/CVE-2012-5639
https://www.cve.org/CVERecord?id=CVE-2012-5639
|
| libuno-purpenvhelpergcc3-3 |
CVE-2018-10583 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://seclists.org/fulldisclosure/2020/Oct/26
http://secureyourit.co.uk/wp/2018/05/01/creating-malicious-odt-files/
https://access.redhat.com/errata/RHSA-2018:3054
https://access.redhat.com/security/cve/CVE-2018-10583
https://lists.apache.org/thread.html/0598708912978b27121b2e380b44a225c706aca882cd1da6a955a0af%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/6c65f22306c36c95e75f8d2b7f49cfcbeb0a4614245c20934612a39d%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/c8fd59ac77b42aac90eb5c59b87f3ab59b5e0c3bfb4819aa649a2909%40%3Cdev.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-10583
https://security-tracker.debian.org/tracker/CVE-2018-10583
https://ubuntu.com/security/notices/USN-3883-1
https://usn.ubuntu.com/3883-1/
https://www.cve.org/CVERecord?id=CVE-2018-10583
https://www.exploit-db.com/exploits/44564/
|
| libuno-sal3 |
CVE-2012-5639 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://www.openwall.com/lists/oss-security/2012/12/14/1
http://www.openwall.com/lists/oss-security/2023/12/28/6
http://www.openwall.com/lists/oss-security/2024/01/03/6
http://www.openwall.com/lists/oss-security/2024/01/03/7
https://access.redhat.com/security/cve/CVE-2012-5639
https://access.redhat.com/security/cve/cve-2012-5639
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5639
https://lists.apache.org/thread.html/r253f92d0e6511d07a79774002e1d9db1d20b24bff27914a5adb14ccb%40%3Cissues.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2012-5639
https://security-tracker.debian.org/tracker/CVE-2012-5639
https://www.cve.org/CVERecord?id=CVE-2012-5639
|
| libuno-sal3 |
CVE-2018-10583 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://seclists.org/fulldisclosure/2020/Oct/26
http://secureyourit.co.uk/wp/2018/05/01/creating-malicious-odt-files/
https://access.redhat.com/errata/RHSA-2018:3054
https://access.redhat.com/security/cve/CVE-2018-10583
https://lists.apache.org/thread.html/0598708912978b27121b2e380b44a225c706aca882cd1da6a955a0af%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/6c65f22306c36c95e75f8d2b7f49cfcbeb0a4614245c20934612a39d%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/c8fd59ac77b42aac90eb5c59b87f3ab59b5e0c3bfb4819aa649a2909%40%3Cdev.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-10583
https://security-tracker.debian.org/tracker/CVE-2018-10583
https://ubuntu.com/security/notices/USN-3883-1
https://usn.ubuntu.com/3883-1/
https://www.cve.org/CVERecord?id=CVE-2018-10583
https://www.exploit-db.com/exploits/44564/
|
| libuno-salhelpergcc3-3 |
CVE-2012-5639 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://www.openwall.com/lists/oss-security/2012/12/14/1
http://www.openwall.com/lists/oss-security/2023/12/28/6
http://www.openwall.com/lists/oss-security/2024/01/03/6
http://www.openwall.com/lists/oss-security/2024/01/03/7
https://access.redhat.com/security/cve/CVE-2012-5639
https://access.redhat.com/security/cve/cve-2012-5639
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5639
https://lists.apache.org/thread.html/r253f92d0e6511d07a79774002e1d9db1d20b24bff27914a5adb14ccb%40%3Cissues.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2012-5639
https://security-tracker.debian.org/tracker/CVE-2012-5639
https://www.cve.org/CVERecord?id=CVE-2012-5639
|
| libuno-salhelpergcc3-3 |
CVE-2018-10583 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://seclists.org/fulldisclosure/2020/Oct/26
http://secureyourit.co.uk/wp/2018/05/01/creating-malicious-odt-files/
https://access.redhat.com/errata/RHSA-2018:3054
https://access.redhat.com/security/cve/CVE-2018-10583
https://lists.apache.org/thread.html/0598708912978b27121b2e380b44a225c706aca882cd1da6a955a0af%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/6c65f22306c36c95e75f8d2b7f49cfcbeb0a4614245c20934612a39d%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/c8fd59ac77b42aac90eb5c59b87f3ab59b5e0c3bfb4819aa649a2909%40%3Cdev.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-10583
https://security-tracker.debian.org/tracker/CVE-2018-10583
https://ubuntu.com/security/notices/USN-3883-1
https://usn.ubuntu.com/3883-1/
https://www.cve.org/CVERecord?id=CVE-2018-10583
https://www.exploit-db.com/exploits/44564/
|
| libuuid1 |
CVE-2022-0563 |
LOW |
2.38.1-5+deb12u1 |
|
https://access.redhat.com/security/cve/CVE-2022-0563
https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u
https://lore.kernel.org/util-linux/[email protected]/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.gentoo.org/glsa/202401-08
https://security.netapp.com/advisory/ntap-20220331-0002/
https://www.cve.org/CVERecord?id=CVE-2022-0563
|
| libxml2 |
CVE-2025-49794 |
CRITICAL |
2.9.14+dfsg-1.3~deb12u1 |
2.9.14+dfsg-1.3~deb12u3 |
https://access.redhat.com/errata/RHSA-2025:10630
https://access.redhat.com/errata/RHSA-2025:10698
https://access.redhat.com/errata/RHSA-2025:10699
https://access.redhat.com/errata/RHSA-2025:11580
https://access.redhat.com/errata/RHSA-2025:12098
https://access.redhat.com/errata/RHSA-2025:12099
https://access.redhat.com/errata/RHSA-2025:12199
https://access.redhat.com/errata/RHSA-2025:12237
https://access.redhat.com/errata/RHSA-2025:12239
https://access.redhat.com/errata/RHSA-2025:12240
https://access.redhat.com/errata/RHSA-2025:12241
https://access.redhat.com/errata/RHSA-2025:13335
https://access.redhat.com/errata/RHSA-2025:15827
https://access.redhat.com/errata/RHSA-2025:15828
https://access.redhat.com/security/cve/CVE-2025-49794
https://bugzilla.redhat.com/2372373
https://bugzilla.redhat.com/2372385
https://bugzilla.redhat.com/2372406
https://bugzilla.redhat.com/show_bug.cgi?id=2372373
https://bugzilla.redhat.com/show_bug.cgi?id=2372385
https://bugzilla.redhat.com/show_bug.cgi?id=2372406
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49794
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49796
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6021
https://errata.almalinux.org/8/ALSA-2025-10698.html
https://errata.rockylinux.org/RLSA-2025:10698
https://gitlab.gnome.org/GNOME/libxml2/-/issues/931
https://linux.oracle.com/cve/CVE-2025-49794.html
https://linux.oracle.com/errata/ELSA-2025-12240.html
https://nvd.nist.gov/vuln/detail/CVE-2025-49794
https://ubuntu.com/security/notices/USN-7694-1
https://www.cve.org/CVERecord?id=CVE-2025-49794
|
| libxml2 |
CVE-2025-49796 |
CRITICAL |
2.9.14+dfsg-1.3~deb12u1 |
2.9.14+dfsg-1.3~deb12u3 |
https://access.redhat.com/errata/RHSA-2025:10630
https://access.redhat.com/errata/RHSA-2025:10698
https://access.redhat.com/errata/RHSA-2025:10699
https://access.redhat.com/errata/RHSA-2025:11580
https://access.redhat.com/errata/RHSA-2025:12098
https://access.redhat.com/errata/RHSA-2025:12099
https://access.redhat.com/errata/RHSA-2025:12199
https://access.redhat.com/errata/RHSA-2025:12237
https://access.redhat.com/errata/RHSA-2025:12239
https://access.redhat.com/errata/RHSA-2025:12240
https://access.redhat.com/errata/RHSA-2025:12241
https://access.redhat.com/errata/RHSA-2025:13267
https://access.redhat.com/errata/RHSA-2025:13335
https://access.redhat.com/errata/RHSA-2025:15827
https://access.redhat.com/errata/RHSA-2025:15828
https://access.redhat.com/security/cve/CVE-2025-49796
https://bugzilla.redhat.com/2372373
https://bugzilla.redhat.com/2372385
https://bugzilla.redhat.com/2372406
https://bugzilla.redhat.com/show_bug.cgi?id=2372373
https://bugzilla.redhat.com/show_bug.cgi?id=2372385
https://bugzilla.redhat.com/show_bug.cgi?id=2372406
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49794
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49796
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6021
https://errata.almalinux.org/8/ALSA-2025-10698.html
https://errata.rockylinux.org/RLSA-2025:10698
https://gitlab.gnome.org/GNOME/libxml2/-/issues/933
https://linux.oracle.com/cve/CVE-2025-49796.html
https://linux.oracle.com/errata/ELSA-2025-12240.html
https://nvd.nist.gov/vuln/detail/CVE-2025-49796
https://ubuntu.com/security/notices/USN-7694-1
https://www.cve.org/CVERecord?id=CVE-2025-49796
|
| libxml2 |
CVE-2022-49043 |
HIGH |
2.9.14+dfsg-1.3~deb12u1 |
2.9.14+dfsg-1.3~deb12u2 |
https://access.redhat.com/errata/RHSA-2025:1517
https://access.redhat.com/security/cve/CVE-2022-49043
https://bugzilla.redhat.com/2342118
https://bugzilla.redhat.com/show_bug.cgi?id=2342118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49043
https://errata.almalinux.org/8/ALSA-2025-1517.html
https://errata.rockylinux.org/RLSA-2025:1517
https://github.com/php/php-src/issues/17467
https://gitlab.gnome.org/GNOME/libxml2/-/commit/5a19e21605398cef6a8b1452477a8705cb41562b
https://linux.oracle.com/cve/CVE-2022-49043.html
https://linux.oracle.com/errata/ELSA-2025-1517.html
https://nvd.nist.gov/vuln/detail/CVE-2022-49043
https://ubuntu.com/security/notices/USN-7240-1
https://ubuntu.com/security/notices/USN-7302-1
https://www.cve.org/CVERecord?id=CVE-2022-49043
|
| libxml2 |
CVE-2024-25062 |
HIGH |
2.9.14+dfsg-1.3~deb12u1 |
2.9.14+dfsg-1.3~deb12u2 |
https://access.redhat.com/errata/RHSA-2024:3626
https://access.redhat.com/security/cve/CVE-2024-25062
https://bugzilla.redhat.com/2262726
https://bugzilla.redhat.com/show_bug.cgi?id=2262726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25062
https://errata.almalinux.org/8/ALSA-2024-3626.html
https://errata.rockylinux.org/RLSA-2024:2679
https://gitlab.gnome.org/GNOME/libxml2/-/issues/604
https://gitlab.gnome.org/GNOME/libxml2/-/tags
https://linux.oracle.com/cve/CVE-2024-25062.html
https://linux.oracle.com/errata/ELSA-2024-3626.html
https://nvd.nist.gov/vuln/detail/CVE-2024-25062
https://ubuntu.com/security/notices/USN-6658-1
https://ubuntu.com/security/notices/USN-6658-2
https://www.cve.org/CVERecord?id=CVE-2024-25062
|
| libxml2 |
CVE-2024-56171 |
HIGH |
2.9.14+dfsg-1.3~deb12u1 |
2.9.14+dfsg-1.3~deb12u2 |
https://access.redhat.com/errata/RHSA-2025:2686
https://access.redhat.com/security/cve/CVE-2024-56171
https://bugzilla.redhat.com/2346416
https://bugzilla.redhat.com/2346421
https://bugzilla.redhat.com/show_bug.cgi?id=2346416
https://bugzilla.redhat.com/show_bug.cgi?id=2346421
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56171
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24928
https://errata.almalinux.org/8/ALSA-2025-2686.html
https://errata.rockylinux.org/RLSA-2025:2686
https://gitlab.gnome.org/GNOME/libxml2/-/issues/828
https://linux.oracle.com/cve/CVE-2024-56171.html
https://linux.oracle.com/errata/ELSA-2025-2686.html
https://nvd.nist.gov/vuln/detail/CVE-2024-56171
https://security.netapp.com/advisory/ntap-20250328-0010/
https://ubuntu.com/security/notices/USN-7302-1
https://www.cve.org/CVERecord?id=CVE-2024-56171
https://www.openwall.com/lists/oss-security/2025/02/18/2
|
| libxml2 |
CVE-2025-24928 |
HIGH |
2.9.14+dfsg-1.3~deb12u1 |
2.9.14+dfsg-1.3~deb12u2 |
https://access.redhat.com/errata/RHSA-2025:2686
https://access.redhat.com/security/cve/CVE-2025-24928
https://bugzilla.redhat.com/2346416
https://bugzilla.redhat.com/2346421
https://bugzilla.redhat.com/show_bug.cgi?id=2346416
https://bugzilla.redhat.com/show_bug.cgi?id=2346421
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56171
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24928
https://errata.almalinux.org/8/ALSA-2025-2686.html
https://errata.rockylinux.org/RLSA-2025:2686
https://gitlab.gnome.org/GNOME/libxml2/-/issues/847
https://issues.oss-fuzz.com/issues/392687022
https://linux.oracle.com/cve/CVE-2025-24928.html
https://linux.oracle.com/errata/ELSA-2025-2686.html
https://nvd.nist.gov/vuln/detail/CVE-2025-24928
https://security.netapp.com/advisory/ntap-20250321-0006/
https://ubuntu.com/security/notices/USN-7302-1
https://www.cve.org/CVERecord?id=CVE-2025-24928
https://www.openwall.com/lists/oss-security/2025/02/18/2
|
| libxml2 |
CVE-2025-27113 |
HIGH |
2.9.14+dfsg-1.3~deb12u1 |
2.9.14+dfsg-1.3~deb12u2 |
https://access.redhat.com/security/cve/CVE-2025-27113
https://gitlab.gnome.org/GNOME/libxml2/-/issues/861
https://nvd.nist.gov/vuln/detail/CVE-2025-27113
https://security.netapp.com/advisory/ntap-20250306-0004/
https://ubuntu.com/security/notices/USN-7302-1
https://www.cve.org/CVERecord?id=CVE-2025-27113
https://www.openwall.com/lists/oss-security/2025/02/18/2
|
| libxml2 |
CVE-2025-32414 |
HIGH |
2.9.14+dfsg-1.3~deb12u1 |
2.9.14+dfsg-1.3~deb12u2 |
https://access.redhat.com/errata/RHSA-2025:8958
https://access.redhat.com/security/cve/CVE-2025-32414
https://bugzilla.redhat.com/2358121
https://bugzilla.redhat.com/show_bug.cgi?id=2358121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32414
https://errata.almalinux.org/8/ALSA-2025-8958.html
https://errata.rockylinux.org/RLSA-2025:8958
https://gitlab.gnome.org/GNOME/libxml2/-/issues/889
https://linux.oracle.com/cve/CVE-2025-32414.html
https://linux.oracle.com/errata/ELSA-2025-8958.html
https://nvd.nist.gov/vuln/detail/CVE-2025-32414
https://ubuntu.com/security/notices/USN-7467-1
https://ubuntu.com/security/notices/USN-7467-2
https://www.cve.org/CVERecord?id=CVE-2025-32414
|
| libxml2 |
CVE-2025-32415 |
HIGH |
2.9.14+dfsg-1.3~deb12u1 |
2.9.14+dfsg-1.3~deb12u2 |
https://access.redhat.com/errata/RHSA-2025:13203
https://access.redhat.com/security/cve/CVE-2025-32415
https://bugzilla.redhat.com/2360768
https://bugzilla.redhat.com/show_bug.cgi?id=2360768
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32415
https://errata.almalinux.org/8/ALSA-2025-13203.html
https://errata.rockylinux.org/RLSA-2025:13203
https://gitlab.gnome.org/GNOME/libxml2/-/issues/890
https://linux.oracle.com/cve/CVE-2025-32415.html
https://linux.oracle.com/errata/ELSA-2025-13789.html
https://nvd.nist.gov/vuln/detail/CVE-2025-32415
https://ubuntu.com/security/notices/USN-7467-1
https://ubuntu.com/security/notices/USN-7467-2
https://www.cve.org/CVERecord?id=CVE-2025-32415
|
| libxml2 |
CVE-2025-6021 |
HIGH |
2.9.14+dfsg-1.3~deb12u1 |
2.9.14+dfsg-1.3~deb12u3 |
https://access.redhat.com/errata/RHSA-2025:10630
https://access.redhat.com/errata/RHSA-2025:10698
https://access.redhat.com/errata/RHSA-2025:10699
https://access.redhat.com/errata/RHSA-2025:11580
https://access.redhat.com/errata/RHSA-2025:12098
https://access.redhat.com/errata/RHSA-2025:12099
https://access.redhat.com/errata/RHSA-2025:12199
https://access.redhat.com/errata/RHSA-2025:12237
https://access.redhat.com/errata/RHSA-2025:12239
https://access.redhat.com/errata/RHSA-2025:12240
https://access.redhat.com/errata/RHSA-2025:12241
https://access.redhat.com/errata/RHSA-2025:13267
https://access.redhat.com/errata/RHSA-2025:13289
https://access.redhat.com/errata/RHSA-2025:13325
https://access.redhat.com/errata/RHSA-2025:13335
https://access.redhat.com/errata/RHSA-2025:13336
https://access.redhat.com/errata/RHSA-2025:14059
https://access.redhat.com/errata/RHSA-2025:14396
https://access.redhat.com/errata/RHSA-2025:15308
https://access.redhat.com/errata/RHSA-2025:15672
https://access.redhat.com/security/cve/CVE-2025-6021
https://bugzilla.redhat.com/2372373
https://bugzilla.redhat.com/2372385
https://bugzilla.redhat.com/2372406
https://bugzilla.redhat.com/show_bug.cgi?id=2372373
https://bugzilla.redhat.com/show_bug.cgi?id=2372385
https://bugzilla.redhat.com/show_bug.cgi?id=2372406
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49794
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49796
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6021
https://errata.almalinux.org/8/ALSA-2025-10698.html
https://errata.rockylinux.org/RLSA-2025:10698
https://gitlab.gnome.org/GNOME/libxml2/-/issues/926
https://linux.oracle.com/cve/CVE-2025-6021.html
https://linux.oracle.com/errata/ELSA-2025-12240.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6021
https://ubuntu.com/security/notices/USN-7694-1
https://www.cve.org/CVERecord?id=CVE-2025-6021
|
| libxml2 |
CVE-2023-39615 |
MEDIUM |
2.9.14+dfsg-1.3~deb12u1 |
2.9.14+dfsg-1.3~deb12u2 |
https://access.redhat.com/errata/RHSA-2024:0119
https://access.redhat.com/security/cve/CVE-2023-39615
https://bugzilla.redhat.com/2235864
https://bugzilla.redhat.com/show_bug.cgi?id=2235864
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39615
https://errata.almalinux.org/8/ALSA-2024-0119.html
https://errata.rockylinux.org/RLSA-2024:0119
https://gitlab.gnome.org/GNOME/libxml2/-/issues/535
https://linux.oracle.com/cve/CVE-2023-39615.html
https://linux.oracle.com/errata/ELSA-2024-0119.html
https://nvd.nist.gov/vuln/detail/CVE-2023-39615
https://www.cve.org/CVERecord?id=CVE-2023-39615
|
| libxml2 |
CVE-2023-45322 |
MEDIUM |
2.9.14+dfsg-1.3~deb12u1 |
2.9.14+dfsg-1.3~deb12u2 |
http://www.openwall.com/lists/oss-security/2023/10/06/5
https://access.redhat.com/security/cve/CVE-2023-45322
https://gitlab.gnome.org/GNOME/libxml2/-/issues/344
https://gitlab.gnome.org/GNOME/libxml2/-/issues/583
https://nvd.nist.gov/vuln/detail/CVE-2023-45322
https://www.cve.org/CVERecord?id=CVE-2023-45322
|
| libxml2 |
CVE-2024-34459 |
MEDIUM |
2.9.14+dfsg-1.3~deb12u1 |
2.9.14+dfsg-1.3~deb12u2 |
https://access.redhat.com/security/cve/CVE-2024-34459
https://gitlab.gnome.org/GNOME/libxml2/-/issues/720
https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.11.8
https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.7
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5HVUXKYTBWT3G5DEEQX62STJQBY367NL/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/INKSSLW5VMZIXHRPZBAW4TJUX5SQKARG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VRDJCNQP32LV56KESUQ5SNZKAJWSZZRI/
https://nvd.nist.gov/vuln/detail/CVE-2024-34459
https://ubuntu.com/security/notices/USN-7240-1
https://ubuntu.com/security/notices/USN-7302-1
https://www.cve.org/CVERecord?id=CVE-2024-34459
|
| libxml2 |
CVE-2025-9714 |
MEDIUM |
2.9.14+dfsg-1.3~deb12u1 |
|
https://access.redhat.com/security/cve/CVE-2025-9714
https://bugzilla.redhat.com/show_bug.cgi?id=2392605
https://gitlab.gnome.org/GNOME/libxml2/-/commit/677a42645ef22b5a50741bad5facf9d8a8bc6d21
https://gitlab.gnome.org/GNOME/libxslt/-/issues/148
https://nvd.nist.gov/vuln/detail/CVE-2025-9714
https://ubuntu.com/security/notices/USN-7743-1
https://www.cve.org/CVERecord?id=CVE-2025-9714
|
| libxml2 |
CVE-2025-6170 |
LOW |
2.9.14+dfsg-1.3~deb12u1 |
2.9.14+dfsg-1.3~deb12u3 |
https://access.redhat.com/security/cve/CVE-2025-6170
https://bugzilla.redhat.com/show_bug.cgi?id=2372952
https://gitlab.gnome.org/GNOME/libxml2/-/issues/941
https://nvd.nist.gov/vuln/detail/CVE-2025-6170
https://ubuntu.com/security/notices/USN-7694-1
https://www.cve.org/CVERecord?id=CVE-2025-6170
|
| libxml2 |
CVE-2025-8732 |
LOW |
2.9.14+dfsg-1.3~deb12u1 |
|
https://access.redhat.com/security/cve/CVE-2025-8732
https://drive.google.com/file/d/1woIeYVcSQB_NwfEhaVnX6MedpWJ_nqWl/view?usp=drive_link
https://gitlab.gnome.org/GNOME/libxml2/-/issues/958
https://gitlab.gnome.org/GNOME/libxml2/-/issues/958#note_2505853
https://nvd.nist.gov/vuln/detail/CVE-2025-8732
https://vuldb.com/?ctiid.319228
https://vuldb.com/?id.319228
https://vuldb.com/?submit.622285
https://www.cve.org/CVERecord?id=CVE-2025-8732
|
| libxml2 |
DSA-5990-1 |
UNKNOWN |
2.9.14+dfsg-1.3~deb12u1 |
2.9.14+dfsg-1.3~deb12u4 |
|
| libxslt1.1 |
CVE-2024-55549 |
HIGH |
1.1.35-1 |
1.1.35-1+deb12u1 |
https://access.redhat.com/errata/RHSA-2025:3615
https://access.redhat.com/security/cve/CVE-2024-55549
https://bugzilla.redhat.com/2352483
https://bugzilla.redhat.com/2352484
https://bugzilla.redhat.com/show_bug.cgi?id=2352483
https://bugzilla.redhat.com/show_bug.cgi?id=2352484
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-55549
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24855
https://errata.almalinux.org/8/ALSA-2025-3615.html
https://errata.rockylinux.org/RLSA-2025:3615
https://gitlab.gnome.org/GNOME/libxslt/-/issues/127
https://linux.oracle.com/cve/CVE-2024-55549.html
https://linux.oracle.com/errata/ELSA-2025-7496.html
https://nvd.nist.gov/vuln/detail/CVE-2024-55549
https://ubuntu.com/security/notices/USN-7357-1
https://ubuntu.com/security/notices/USN-7787-1
https://www.cve.org/CVERecord?id=CVE-2024-55549
|
| libxslt1.1 |
CVE-2025-24855 |
HIGH |
1.1.35-1 |
1.1.35-1+deb12u1 |
https://access.redhat.com/errata/RHSA-2025:3615
https://access.redhat.com/security/cve/CVE-2025-24855
https://bugzilla.redhat.com/2352483
https://bugzilla.redhat.com/2352484
https://bugzilla.redhat.com/show_bug.cgi?id=2352483
https://bugzilla.redhat.com/show_bug.cgi?id=2352484
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-55549
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24855
https://errata.almalinux.org/8/ALSA-2025-3615.html
https://errata.rockylinux.org/RLSA-2025:3615
https://gitlab.gnome.org/GNOME/libxslt/-/issues/128
https://linux.oracle.com/cve/CVE-2025-24855.html
https://linux.oracle.com/errata/ELSA-2025-7496.html
https://nvd.nist.gov/vuln/detail/CVE-2025-24855
https://ubuntu.com/security/notices/USN-7361-1
https://ubuntu.com/security/notices/USN-7787-1
https://www.cve.org/CVERecord?id=CVE-2025-24855
|
| libxslt1.1 |
CVE-2025-7424 |
HIGH |
1.1.35-1 |
1.1.35-1+deb12u2 |
https://access.redhat.com/security/cve/CVE-2025-7424
https://bugzilla.redhat.com/show_bug.cgi?id=2379228
https://nvd.nist.gov/vuln/detail/CVE-2025-7424
https://www.cve.org/CVERecord?id=CVE-2025-7424
|
| libxslt1.1 |
CVE-2025-7425 |
HIGH |
1.1.35-1 |
|
https://access.redhat.com/errata/RHSA-2025:12447
https://access.redhat.com/errata/RHSA-2025:12450
https://access.redhat.com/errata/RHSA-2025:13267
https://access.redhat.com/errata/RHSA-2025:13308
https://access.redhat.com/errata/RHSA-2025:13309
https://access.redhat.com/errata/RHSA-2025:13310
https://access.redhat.com/errata/RHSA-2025:13311
https://access.redhat.com/errata/RHSA-2025:13312
https://access.redhat.com/errata/RHSA-2025:13313
https://access.redhat.com/errata/RHSA-2025:13314
https://access.redhat.com/errata/RHSA-2025:13335
https://access.redhat.com/errata/RHSA-2025:13464
https://access.redhat.com/errata/RHSA-2025:13622
https://access.redhat.com/errata/RHSA-2025:14059
https://access.redhat.com/errata/RHSA-2025:14396
https://access.redhat.com/errata/RHSA-2025:14818
https://access.redhat.com/errata/RHSA-2025:14819
https://access.redhat.com/errata/RHSA-2025:14853
https://access.redhat.com/errata/RHSA-2025:14858
https://access.redhat.com/errata/RHSA-2025:15308
https://access.redhat.com/errata/RHSA-2025:15672
https://access.redhat.com/errata/RHSA-2025:15827
https://access.redhat.com/errata/RHSA-2025:15828
https://access.redhat.com/security/cve/CVE-2025-7425
https://bugzilla.redhat.com/2379274
https://bugzilla.redhat.com/show_bug.cgi?id=2379274
https://errata.almalinux.org/8/ALSA-2025-12450.html
https://gitlab.gnome.org/GNOME/libxslt/-/issues/140
https://linux.oracle.com/cve/CVE-2025-7425.html
https://linux.oracle.com/errata/ELSA-2025-13464.html
https://nvd.nist.gov/vuln/detail/CVE-2025-7425
https://www.cve.org/CVERecord?id=CVE-2025-7425
|
| libxslt1.1 |
CVE-2023-40403 |
MEDIUM |
1.1.35-1 |
1.1.35-1+deb12u2 |
http://seclists.org/fulldisclosure/2023/Oct/10
http://seclists.org/fulldisclosure/2023/Oct/3
http://seclists.org/fulldisclosure/2023/Oct/4
http://seclists.org/fulldisclosure/2023/Oct/5
http://seclists.org/fulldisclosure/2023/Oct/6
http://seclists.org/fulldisclosure/2023/Oct/8
http://seclists.org/fulldisclosure/2023/Oct/9
https://access.redhat.com/errata/RHSA-2025:8676
https://access.redhat.com/security/cve/CVE-2023-40403
https://bugs.chromium.org/p/chromium/issues/detail?id=1356211
https://bugzilla.gnome.org/show_bug.cgi?id=751621
https://bugzilla.redhat.com/2349766
https://bugzilla.redhat.com/show_bug.cgi?id=2349766
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40403
https://errata.almalinux.org/8/ALSA-2025-8676.html
https://errata.rockylinux.org/RLSA-2025:8676
https://gitlab.gnome.org/GNOME/libxslt/-/issues/94
https://linux.oracle.com/cve/CVE-2023-40403.html
https://linux.oracle.com/errata/ELSA-2025-8676.html
https://nvd.nist.gov/vuln/detail/CVE-2023-40403
https://support.apple.com/en-us/HT213927
https://support.apple.com/en-us/HT213931
https://support.apple.com/en-us/HT213932
https://support.apple.com/en-us/HT213936
https://support.apple.com/en-us/HT213937
https://support.apple.com/en-us/HT213938
https://support.apple.com/en-us/HT213940
https://ubuntu.com/security/notices/USN-7600-1
https://www.cve.org/CVERecord?id=CVE-2023-40403
|
| libxslt1.1 |
CVE-2025-10911 |
MEDIUM |
1.1.35-1 |
|
https://access.redhat.com/security/cve/CVE-2025-10911
https://bugzilla.redhat.com/show_bug.cgi?id=2397838
https://gitlab.gnome.org/GNOME/libxslt/-/issues/144
https://gitlab.gnome.org/GNOME/libxslt/-/merge_requests/77
https://nvd.nist.gov/vuln/detail/CVE-2025-10911
https://www.cve.org/CVERecord?id=CVE-2025-10911
|
| libxslt1.1 |
CVE-2015-9019 |
LOW |
1.1.35-1 |
|
https://access.redhat.com/security/cve/CVE-2015-9019
https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://nvd.nist.gov/vuln/detail/CVE-2015-9019
https://www.cve.org/CVERecord?id=CVE-2015-9019
|
| libxslt1.1 |
CVE-2025-11731 |
UNKNOWN |
1.1.35-1 |
|
https://access.redhat.com/security/cve/CVE-2025-11731
https://bugzilla.redhat.com/show_bug.cgi?id=2403688
|
| libxslt1.1 |
DSA-5979-2 |
UNKNOWN |
1.1.35-1 |
1.1.35-1+deb12u3 |
|
| login |
CVE-2023-4641 |
MEDIUM |
1:4.13+dfsg1-1+b1 |
1:4.13+dfsg1-1+deb12u1 |
https://access.redhat.com/errata/RHSA-2023:6632
https://access.redhat.com/errata/RHSA-2023:7112
https://access.redhat.com/errata/RHSA-2024:0417
https://access.redhat.com/errata/RHSA-2024:2577
https://access.redhat.com/security/cve/CVE-2023-4641
https://bugzilla.redhat.com/2215945
https://bugzilla.redhat.com/show_bug.cgi?id=2215945
https://errata.almalinux.org/8/ALSA-2023-7112.html
https://linux.oracle.com/cve/CVE-2023-4641.html
https://linux.oracle.com/errata/ELSA-2023-7112.html
https://nvd.nist.gov/vuln/detail/CVE-2023-4641
https://ubuntu.com/security/notices/USN-6640-1
https://www.cve.org/CVERecord?id=CVE-2023-4641
|
| login |
CVE-2007-5686 |
LOW |
1:4.13+dfsg1-1+b1 |
|
http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
|
| login |
CVE-2023-29383 |
LOW |
1:4.13+dfsg1-1+b1 |
1:4.13+dfsg1-1+deb12u1 |
https://access.redhat.com/security/cve/CVE-2023-29383
https://github.com/shadow-maint/shadow/commit/e5905c4b84d4fb90aefcd96ee618411ebfac663d
https://github.com/shadow-maint/shadow/pull/687
https://nvd.nist.gov/vuln/detail/CVE-2023-29383
https://www.cve.org/CVERecord?id=CVE-2023-29383
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2023-29383-abusing-linux-chfn-to-misrepresent-etc-passwd/
https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=31797
|
| login |
CVE-2024-56433 |
LOW |
1:4.13+dfsg1-1+b1 |
|
https://access.redhat.com/security/cve/CVE-2024-56433
https://github.com/shadow-maint/shadow/blob/e2512d5741d4a44bdd81a8c2d0029b6222728cf0/etc/login.defs#L238-L241
https://github.com/shadow-maint/shadow/issues/1157
https://github.com/shadow-maint/shadow/releases/tag/4.4
https://nvd.nist.gov/vuln/detail/CVE-2024-56433
https://www.cve.org/CVERecord?id=CVE-2024-56433
|
| login |
TEMP-0628843-DBAD28 |
LOW |
1:4.13+dfsg1-1+b1 |
|
|
| mount |
CVE-2022-0563 |
LOW |
2.38.1-5+deb12u1 |
|
https://access.redhat.com/security/cve/CVE-2022-0563
https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u
https://lore.kernel.org/util-linux/[email protected]/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.gentoo.org/glsa/202401-08
https://security.netapp.com/advisory/ntap-20220331-0002/
https://www.cve.org/CVERecord?id=CVE-2022-0563
|
| ncurses-base |
CVE-2023-50495 |
MEDIUM |
6.4-4 |
|
https://access.redhat.com/security/cve/CVE-2023-50495
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/
https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00020.html
https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00029.html
https://nvd.nist.gov/vuln/detail/CVE-2023-50495
https://security.netapp.com/advisory/ntap-20240119-0008/
https://ubuntu.com/security/notices/USN-6684-1
https://www.cve.org/CVERecord?id=CVE-2023-50495
|
| ncurses-base |
CVE-2025-6141 |
LOW |
6.4-4 |
|
https://access.redhat.com/security/cve/CVE-2025-6141
https://invisible-island.net/ncurses/NEWS.html#index-t20250329
https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00107.html
https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00109.html
https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00114.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6141
https://vuldb.com/?ctiid.312610
https://vuldb.com/?id.312610
https://vuldb.com/?submit.593000
https://www.cve.org/CVERecord?id=CVE-2025-6141
https://www.gnu.org/
|
| ncurses-bin |
CVE-2023-50495 |
MEDIUM |
6.4-4 |
|
https://access.redhat.com/security/cve/CVE-2023-50495
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/
https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00020.html
https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00029.html
https://nvd.nist.gov/vuln/detail/CVE-2023-50495
https://security.netapp.com/advisory/ntap-20240119-0008/
https://ubuntu.com/security/notices/USN-6684-1
https://www.cve.org/CVERecord?id=CVE-2023-50495
|
| ncurses-bin |
CVE-2025-6141 |
LOW |
6.4-4 |
|
https://access.redhat.com/security/cve/CVE-2025-6141
https://invisible-island.net/ncurses/NEWS.html#index-t20250329
https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00107.html
https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00109.html
https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00114.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6141
https://vuldb.com/?ctiid.312610
https://vuldb.com/?id.312610
https://vuldb.com/?submit.593000
https://www.cve.org/CVERecord?id=CVE-2025-6141
https://www.gnu.org/
|
| openjdk-17-jre-headless |
CVE-2024-21147 |
HIGH |
17.0.11+9-1~deb12u1 |
17.0.12+7-2~deb12u1 |
https://access.redhat.com/errata/RHSA-2024:4573
https://access.redhat.com/security/cve/CVE-2024-21147
https://bugzilla.redhat.com/2297961
https://bugzilla.redhat.com/2297962
https://bugzilla.redhat.com/2297963
https://bugzilla.redhat.com/2297976
https://bugzilla.redhat.com/2297977
https://bugzilla.redhat.com/show_bug.cgi?id=2297961
https://bugzilla.redhat.com/show_bug.cgi?id=2297962
https://bugzilla.redhat.com/show_bug.cgi?id=2297963
https://bugzilla.redhat.com/show_bug.cgi?id=2297976
https://bugzilla.redhat.com/show_bug.cgi?id=2297977
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
https://errata.almalinux.org/8/ALSA-2024-4573.html
https://errata.rockylinux.org/RLSA-2024:4573
https://linux.oracle.com/cve/CVE-2024-21147.html
https://linux.oracle.com/errata/ELSA-2024-4573.html
https://nvd.nist.gov/vuln/detail/CVE-2024-21147
https://security.netapp.com/advisory/ntap-20240719-0008/
https://ubuntu.com/security/notices/USN-6929-1
https://ubuntu.com/security/notices/USN-6930-1
https://ubuntu.com/security/notices/USN-6931-1
https://ubuntu.com/security/notices/USN-6932-1
https://ubuntu.com/security/notices/USN-7096-1
https://ubuntu.com/security/notices/USN-7097-1
https://ubuntu.com/security/notices/USN-7098-1
https://www.cve.org/CVERecord?id=CVE-2024-21147
https://www.oracle.com/security-alerts/cpujul2024.html
|
| openjdk-17-jre-headless |
CVE-2025-21587 |
HIGH |
17.0.11+9-1~deb12u1 |
17.0.15+6-1~deb12u1 |
https://access.redhat.com/errata/RHSA-2025:3855
https://access.redhat.com/security/cve/CVE-2025-21587
https://bugzilla.redhat.com/show_bug.cgi?id=2359693
https://bugzilla.redhat.com/show_bug.cgi?id=2359694
https://bugzilla.redhat.com/show_bug.cgi?id=2359695
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21587
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30691
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30698
https://errata.almalinux.org/8/ALSA-2025-3855.html
https://errata.rockylinux.org/RLSA-2025:3855
https://github.com/openjdk/jdk11u/commit/2adb01e8c5fbcc3dfa9f82df3deccb3a1705bf13 (jdk-11.0.27-ga)
https://github.com/openjdk/jdk17u/commit/73aa304234f2ec17abbb640b7f2d0503cf1bfc91 (jdk-17.0.15-ga)
https://github.com/openjdk/jdk21u/commit/d5c94adf69ba20f5652453729620c4f1c8e4860e (jdk-21.0.7-ga)
https://github.com/openjdk/jdk8u/commit/3cdd3081565d890801a27a1f9ac8bc53e5711ce6 (jdk8u452-b08)
https://linux.oracle.com/cve/CVE-2025-21587.html
https://linux.oracle.com/errata/ELSA-2025-7508.html
https://nvd.nist.gov/vuln/detail/CVE-2025-21587
https://openjdk.org/groups/vulnerability/advisories/2025-04-15
https://ubuntu.com/security/notices/USN-7480-1
https://ubuntu.com/security/notices/USN-7481-1
https://ubuntu.com/security/notices/USN-7482-1
https://ubuntu.com/security/notices/USN-7483-1
https://ubuntu.com/security/notices/USN-7484-1
https://ubuntu.com/security/notices/USN-7531-1
https://ubuntu.com/security/notices/USN-7533-1
https://www.cve.org/CVERecord?id=CVE-2025-21587
https://www.oracle.com/security-alerts/cpuapr2025.html
|
| openjdk-17-jre-headless |
CVE-2025-30749 |
HIGH |
17.0.11+9-1~deb12u1 |
17.0.16+8-1~deb12u1 |
https://access.redhat.com/errata/RHSA-2025:10873
https://access.redhat.com/security/cve/CVE-2025-30749
https://bugzilla.redhat.com/show_bug.cgi?id=2376783
https://bugzilla.redhat.com/show_bug.cgi?id=2376784
https://bugzilla.redhat.com/show_bug.cgi?id=2376785
https://bugzilla.redhat.com/show_bug.cgi?id=2379031
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30749
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50106
https://errata.almalinux.org/8/ALSA-2025-10873.html
https://errata.rockylinux.org/RLSA-2025:10867
https://linux.oracle.com/cve/CVE-2025-30749.html
https://linux.oracle.com/errata/ELSA-2025-10873.html
https://nvd.nist.gov/vuln/detail/CVE-2025-30749
https://ubuntu.com/security/notices/USN-7667-1
https://ubuntu.com/security/notices/USN-7668-1
https://ubuntu.com/security/notices/USN-7669-1
https://ubuntu.com/security/notices/USN-7672-1
https://ubuntu.com/security/notices/USN-7673-1
https://ubuntu.com/security/notices/USN-7674-1
https://ubuntu.com/security/notices/USN-7690-1
https://www.cve.org/CVERecord?id=CVE-2025-30749
https://www.oracle.com/security-alerts/cpujul2025.html
https://www.oracle.com/security-alerts/cpujul2025.html#AppendixJAVA
|
| openjdk-17-jre-headless |
CVE-2025-50059 |
HIGH |
17.0.11+9-1~deb12u1 |
17.0.16+8-1~deb12u1 |
https://access.redhat.com/errata/RHSA-2025:10873
https://access.redhat.com/security/cve/CVE-2025-50059
https://bugzilla.redhat.com/show_bug.cgi?id=2376783
https://bugzilla.redhat.com/show_bug.cgi?id=2376784
https://bugzilla.redhat.com/show_bug.cgi?id=2376785
https://bugzilla.redhat.com/show_bug.cgi?id=2379031
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30749
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50106
https://errata.almalinux.org/8/ALSA-2025-10873.html
https://errata.rockylinux.org/RLSA-2025:10867
https://linux.oracle.com/cve/CVE-2025-50059.html
https://linux.oracle.com/errata/ELSA-2025-10873.html
https://nvd.nist.gov/vuln/detail/CVE-2025-50059
https://ubuntu.com/security/notices/USN-7668-1
https://ubuntu.com/security/notices/USN-7669-1
https://ubuntu.com/security/notices/USN-7672-1
https://ubuntu.com/security/notices/USN-7673-1
https://ubuntu.com/security/notices/USN-7674-1
https://ubuntu.com/security/notices/USN-7690-1
https://www.cve.org/CVERecord?id=CVE-2025-50059
https://www.oracle.com/security-alerts/cpujul2025.html
https://www.oracle.com/security-alerts/cpujul2025.html#AppendixJAVA
|
| openjdk-17-jre-headless |
CVE-2025-50106 |
HIGH |
17.0.11+9-1~deb12u1 |
17.0.16+8-1~deb12u1 |
https://access.redhat.com/errata/RHSA-2025:10873
https://access.redhat.com/security/cve/CVE-2025-50106
https://bugzilla.redhat.com/show_bug.cgi?id=2376783
https://bugzilla.redhat.com/show_bug.cgi?id=2376784
https://bugzilla.redhat.com/show_bug.cgi?id=2376785
https://bugzilla.redhat.com/show_bug.cgi?id=2379031
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30749
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50106
https://errata.almalinux.org/8/ALSA-2025-10873.html
https://errata.rockylinux.org/RLSA-2025:10867
https://linux.oracle.com/cve/CVE-2025-50106.html
https://linux.oracle.com/errata/ELSA-2025-10873.html
https://nvd.nist.gov/vuln/detail/CVE-2025-50106
https://ubuntu.com/security/notices/USN-7667-1
https://ubuntu.com/security/notices/USN-7668-1
https://ubuntu.com/security/notices/USN-7669-1
https://ubuntu.com/security/notices/USN-7672-1
https://ubuntu.com/security/notices/USN-7673-1
https://ubuntu.com/security/notices/USN-7674-1
https://ubuntu.com/security/notices/USN-7690-1
https://www.cve.org/CVERecord?id=CVE-2025-50106
https://www.oracle.com/security-alerts/cpujul2025.html
https://www.oracle.com/security-alerts/cpujul2025.html#AppendixJAVA
|
| openjdk-17-jre-headless |
CVE-2024-21140 |
MEDIUM |
17.0.11+9-1~deb12u1 |
17.0.12+7-2~deb12u1 |
https://access.redhat.com/errata/RHSA-2024:4573
https://access.redhat.com/security/cve/CVE-2024-21140
https://bugzilla.redhat.com/2297961
https://bugzilla.redhat.com/2297962
https://bugzilla.redhat.com/2297963
https://bugzilla.redhat.com/2297976
https://bugzilla.redhat.com/2297977
https://bugzilla.redhat.com/show_bug.cgi?id=2297961
https://bugzilla.redhat.com/show_bug.cgi?id=2297962
https://bugzilla.redhat.com/show_bug.cgi?id=2297963
https://bugzilla.redhat.com/show_bug.cgi?id=2297976
https://bugzilla.redhat.com/show_bug.cgi?id=2297977
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
https://errata.almalinux.org/8/ALSA-2024-4573.html
https://errata.rockylinux.org/RLSA-2024:4573
https://linux.oracle.com/cve/CVE-2024-21140.html
https://linux.oracle.com/errata/ELSA-2024-4573.html
https://nvd.nist.gov/vuln/detail/CVE-2024-21140
https://security.netapp.com/advisory/ntap-20240719-0008/
https://ubuntu.com/security/notices/USN-6929-1
https://ubuntu.com/security/notices/USN-6930-1
https://ubuntu.com/security/notices/USN-6931-1
https://ubuntu.com/security/notices/USN-6932-1
https://ubuntu.com/security/notices/USN-7096-1
https://ubuntu.com/security/notices/USN-7097-1
https://ubuntu.com/security/notices/USN-7098-1
https://www.cve.org/CVERecord?id=CVE-2024-21140
https://www.oracle.com/security-alerts/cpujul2024.html
|
| openjdk-17-jre-headless |
CVE-2024-21145 |
MEDIUM |
17.0.11+9-1~deb12u1 |
17.0.12+7-2~deb12u1 |
https://access.redhat.com/errata/RHSA-2024:4573
https://access.redhat.com/security/cve/CVE-2024-21145
https://bugzilla.redhat.com/2297961
https://bugzilla.redhat.com/2297962
https://bugzilla.redhat.com/2297963
https://bugzilla.redhat.com/2297976
https://bugzilla.redhat.com/2297977
https://bugzilla.redhat.com/show_bug.cgi?id=2297961
https://bugzilla.redhat.com/show_bug.cgi?id=2297962
https://bugzilla.redhat.com/show_bug.cgi?id=2297963
https://bugzilla.redhat.com/show_bug.cgi?id=2297976
https://bugzilla.redhat.com/show_bug.cgi?id=2297977
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
https://errata.almalinux.org/8/ALSA-2024-4573.html
https://errata.rockylinux.org/RLSA-2024:4573
https://linux.oracle.com/cve/CVE-2024-21145.html
https://linux.oracle.com/errata/ELSA-2024-4573.html
https://nvd.nist.gov/vuln/detail/CVE-2024-21145
https://security.netapp.com/advisory/ntap-20240719-0008/
https://ubuntu.com/security/notices/USN-6929-1
https://ubuntu.com/security/notices/USN-6930-1
https://ubuntu.com/security/notices/USN-6931-1
https://ubuntu.com/security/notices/USN-6932-1
https://ubuntu.com/security/notices/USN-7096-1
https://ubuntu.com/security/notices/USN-7097-1
https://ubuntu.com/security/notices/USN-7098-1
https://www.cve.org/CVERecord?id=CVE-2024-21145
https://www.oracle.com/security-alerts/cpujul2024.html
|
| openjdk-17-jre-headless |
CVE-2024-21235 |
MEDIUM |
17.0.11+9-1~deb12u1 |
17.0.13+11-2~deb12u1 |
https://access.redhat.com/errata/RHSA-2024:8127
https://access.redhat.com/security/cve/CVE-2024-21235
https://bugzilla.redhat.com/2251025
https://bugzilla.redhat.com/2318524
https://bugzilla.redhat.com/2318526
https://bugzilla.redhat.com/2318530
https://bugzilla.redhat.com/2318534
https://bugzilla.redhat.com/show_bug.cgi?id=2251025
https://bugzilla.redhat.com/show_bug.cgi?id=2318524
https://bugzilla.redhat.com/show_bug.cgi?id=2318526
https://bugzilla.redhat.com/show_bug.cgi?id=2318530
https://bugzilla.redhat.com/show_bug.cgi?id=2318534
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48161
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21210
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21235
https://errata.almalinux.org/8/ALSA-2024-8127.html
https://errata.rockylinux.org/RLSA-2024:8127
https://linux.oracle.com/cve/CVE-2024-21235.html
https://linux.oracle.com/errata/ELSA-2024-8127.html
https://nvd.nist.gov/vuln/detail/CVE-2024-21235
https://ubuntu.com/security/notices/USN-7096-1
https://ubuntu.com/security/notices/USN-7097-1
https://ubuntu.com/security/notices/USN-7098-1
https://ubuntu.com/security/notices/USN-7099-1
https://ubuntu.com/security/notices/USN-7124-1
https://ubuntu.com/security/notices/USN-7338-1
https://ubuntu.com/security/notices/USN-7339-1
https://www.cve.org/CVERecord?id=CVE-2024-21235
https://www.oracle.com/security-alerts/cpuoct2024.html
|
| openjdk-17-jre-headless |
CVE-2025-21502 |
MEDIUM |
17.0.11+9-1~deb12u1 |
17.0.14+7-1~deb12u1 |
http://www.openwall.com/lists/oss-security/2025/01/25/6
https://access.redhat.com/errata/RHSA-2025:0426
https://access.redhat.com/security/cve/CVE-2025-21502
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21502
https://errata.almalinux.org/8/ALSA-2025-0426.html
https://errata.rockylinux.org/RLSA-2025:0426
https://linux.oracle.com/cve/CVE-2025-21502.html
https://linux.oracle.com/errata/ELSA-2025-0426.html
https://lists.debian.org/debian-lts-announce/2025/01/msg00031.html
https://lists.debian.org/debian-lts-announce/2025/02/msg00004.html
https://nvd.nist.gov/vuln/detail/CVE-2025-21502
https://security.netapp.com/advisory/ntap-20250124-0009/
https://ubuntu.com/security/notices/USN-7252-1
https://ubuntu.com/security/notices/USN-7253-1
https://ubuntu.com/security/notices/USN-7254-1
https://ubuntu.com/security/notices/USN-7255-1
https://ubuntu.com/security/notices/USN-7338-1
https://ubuntu.com/security/notices/USN-7339-1
https://www.cve.org/CVERecord?id=CVE-2025-21502
https://www.oracle.com/security-alerts/cpujan2025.html
https://www.oracle.com/security-alerts/cpujan2025.html#AppendixJAVA
|
| openjdk-17-jre-headless |
CVE-2025-30691 |
MEDIUM |
17.0.11+9-1~deb12u1 |
17.0.15+6-1~deb12u1 |
https://access.redhat.com/errata/RHSA-2025:3855
https://access.redhat.com/security/cve/CVE-2025-30691
https://bugzilla.redhat.com/show_bug.cgi?id=2359693
https://bugzilla.redhat.com/show_bug.cgi?id=2359694
https://bugzilla.redhat.com/show_bug.cgi?id=2359695
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21587
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30691
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30698
https://errata.almalinux.org/8/ALSA-2025-3855.html
https://errata.rockylinux.org/RLSA-2025:3855
https://github.com/openjdk/jdk11u/commit/2b70822671cf5f9b37956949421e7c77da082c8e (jdk-11.0.27-ga)
https://github.com/openjdk/jdk17u/commit/5b0a5f436fb9817d679f64302b37543bf160d43d (jdk-17.0.15-ga)
https://github.com/openjdk/jdk21u/commit/11067d7e975ce71bedbfdd314519ec9ff689a7e7 (jdk-21.0.7-ga)
https://github.com/openjdk/jdk8u/commit/949c6ffc54efaa92d6559a3e7897432b95e99253 (jdk8u452-b08)
https://linux.oracle.com/cve/CVE-2025-30691.html
https://linux.oracle.com/errata/ELSA-2025-7508.html
https://nvd.nist.gov/vuln/detail/CVE-2025-30691
https://openjdk.org/groups/vulnerability/advisories/2025-04-15
https://security.netapp.com/advisory/ntap-20250418-0004/
https://ubuntu.com/security/notices/USN-7480-1
https://ubuntu.com/security/notices/USN-7481-1
https://ubuntu.com/security/notices/USN-7482-1
https://ubuntu.com/security/notices/USN-7483-1
https://ubuntu.com/security/notices/USN-7484-1
https://ubuntu.com/security/notices/USN-7531-1
https://ubuntu.com/security/notices/USN-7533-1
https://www.cve.org/CVERecord?id=CVE-2025-30691
https://www.oracle.com/security-alerts/cpuapr2025.html
|
| openjdk-17-jre-headless |
CVE-2025-30698 |
MEDIUM |
17.0.11+9-1~deb12u1 |
17.0.15+6-1~deb12u1 |
https://access.redhat.com/errata/RHSA-2025:3855
https://access.redhat.com/security/cve/CVE-2025-30698
https://bugzilla.redhat.com/show_bug.cgi?id=2359693
https://bugzilla.redhat.com/show_bug.cgi?id=2359694
https://bugzilla.redhat.com/show_bug.cgi?id=2359695
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21587
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30691
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30698
https://errata.almalinux.org/8/ALSA-2025-3855.html
https://errata.rockylinux.org/RLSA-2025:3855
https://github.com/openjdk/jdk11u/commit/ea1389c971827876134a6d1d3ab2934681e9f3d6 (jdk-11.0.27-ga)
https://github.com/openjdk/jdk17u/commit/0a89eb2588334226531e8e25ac340eabbc00bd6d (jdk-17.0.15-ga)
https://github.com/openjdk/jdk21u/commit/3048e287d8ea7d5e0d19d9188eb4212801ebf2a2 (jdk-21.0.7-ga)
https://github.com/openjdk/jdk8u/commit/68d10daabaf9c939a5d2e665994c6d348f38cfd5 (jdk8u452-b08)
https://linux.oracle.com/cve/CVE-2025-30698.html
https://linux.oracle.com/errata/ELSA-2025-7508.html
https://nvd.nist.gov/vuln/detail/CVE-2025-30698
https://openjdk.org/groups/vulnerability/advisories/2025-04-15
https://ubuntu.com/security/notices/USN-7480-1
https://ubuntu.com/security/notices/USN-7481-1
https://ubuntu.com/security/notices/USN-7482-1
https://ubuntu.com/security/notices/USN-7483-1
https://ubuntu.com/security/notices/USN-7484-1
https://ubuntu.com/security/notices/USN-7531-1
https://ubuntu.com/security/notices/USN-7533-1
https://www.cve.org/CVERecord?id=CVE-2025-30698
https://www.oracle.com/security-alerts/cpuapr2025.html
|
| openjdk-17-jre-headless |
CVE-2025-30754 |
MEDIUM |
17.0.11+9-1~deb12u1 |
17.0.16+8-1~deb12u1 |
https://access.redhat.com/errata/RHSA-2025:10873
https://access.redhat.com/security/cve/CVE-2025-30754
https://bugzilla.redhat.com/show_bug.cgi?id=2376783
https://bugzilla.redhat.com/show_bug.cgi?id=2376784
https://bugzilla.redhat.com/show_bug.cgi?id=2376785
https://bugzilla.redhat.com/show_bug.cgi?id=2379031
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30749
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50106
https://errata.almalinux.org/8/ALSA-2025-10873.html
https://errata.rockylinux.org/RLSA-2025:10867
https://linux.oracle.com/cve/CVE-2025-30754.html
https://linux.oracle.com/errata/ELSA-2025-10873.html
https://nvd.nist.gov/vuln/detail/CVE-2025-30754
https://ubuntu.com/security/notices/USN-7667-1
https://ubuntu.com/security/notices/USN-7668-1
https://ubuntu.com/security/notices/USN-7669-1
https://ubuntu.com/security/notices/USN-7672-1
https://ubuntu.com/security/notices/USN-7673-1
https://ubuntu.com/security/notices/USN-7674-1
https://ubuntu.com/security/notices/USN-7690-1
https://www.cve.org/CVERecord?id=CVE-2025-30754
https://www.oracle.com/security-alerts/cpujul2025.html
https://www.oracle.com/security-alerts/cpujul2025.html#AppendixJAVA
|
| openjdk-17-jre-headless |
CVE-2024-21131 |
LOW |
17.0.11+9-1~deb12u1 |
17.0.12+7-2~deb12u1 |
https://access.redhat.com/errata/RHSA-2024:4573
https://access.redhat.com/security/cve/CVE-2024-21131
https://bugzilla.redhat.com/2297961
https://bugzilla.redhat.com/2297962
https://bugzilla.redhat.com/2297963
https://bugzilla.redhat.com/2297976
https://bugzilla.redhat.com/2297977
https://bugzilla.redhat.com/show_bug.cgi?id=2297961
https://bugzilla.redhat.com/show_bug.cgi?id=2297962
https://bugzilla.redhat.com/show_bug.cgi?id=2297963
https://bugzilla.redhat.com/show_bug.cgi?id=2297976
https://bugzilla.redhat.com/show_bug.cgi?id=2297977
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
https://errata.almalinux.org/8/ALSA-2024-4573.html
https://errata.rockylinux.org/RLSA-2024:4573
https://linux.oracle.com/cve/CVE-2024-21131.html
https://linux.oracle.com/errata/ELSA-2024-4573.html
https://nvd.nist.gov/vuln/detail/CVE-2024-21131
https://security.netapp.com/advisory/ntap-20240719-0008/
https://ubuntu.com/security/notices/USN-6929-1
https://ubuntu.com/security/notices/USN-6930-1
https://ubuntu.com/security/notices/USN-6931-1
https://ubuntu.com/security/notices/USN-6932-1
https://ubuntu.com/security/notices/USN-7096-1
https://ubuntu.com/security/notices/USN-7097-1
https://ubuntu.com/security/notices/USN-7098-1
https://www.cve.org/CVERecord?id=CVE-2024-21131
https://www.oracle.com/security-alerts/cpujul2024.html
|
| openjdk-17-jre-headless |
CVE-2024-21138 |
LOW |
17.0.11+9-1~deb12u1 |
17.0.12+7-2~deb12u1 |
https://access.redhat.com/errata/RHSA-2024:4573
https://access.redhat.com/security/cve/CVE-2024-21138
https://bugzilla.redhat.com/2297961
https://bugzilla.redhat.com/2297962
https://bugzilla.redhat.com/2297963
https://bugzilla.redhat.com/2297976
https://bugzilla.redhat.com/2297977
https://bugzilla.redhat.com/show_bug.cgi?id=2297961
https://bugzilla.redhat.com/show_bug.cgi?id=2297962
https://bugzilla.redhat.com/show_bug.cgi?id=2297963
https://bugzilla.redhat.com/show_bug.cgi?id=2297976
https://bugzilla.redhat.com/show_bug.cgi?id=2297977
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147
https://errata.almalinux.org/8/ALSA-2024-4573.html
https://errata.rockylinux.org/RLSA-2024:4573
https://linux.oracle.com/cve/CVE-2024-21138.html
https://linux.oracle.com/errata/ELSA-2024-4573.html
https://nvd.nist.gov/vuln/detail/CVE-2024-21138
https://security.netapp.com/advisory/ntap-20240719-0008/
https://ubuntu.com/security/notices/USN-6929-1
https://ubuntu.com/security/notices/USN-6930-1
https://ubuntu.com/security/notices/USN-6931-1
https://ubuntu.com/security/notices/USN-6932-1
https://ubuntu.com/security/notices/USN-7096-1
https://ubuntu.com/security/notices/USN-7097-1
https://ubuntu.com/security/notices/USN-7098-1
https://www.cve.org/CVERecord?id=CVE-2024-21138
https://www.oracle.com/security-alerts/cpujul2024.html
|
| openjdk-17-jre-headless |
CVE-2024-21208 |
LOW |
17.0.11+9-1~deb12u1 |
17.0.13+11-2~deb12u1 |
https://access.redhat.com/errata/RHSA-2024:8127
https://access.redhat.com/security/cve/CVE-2024-21208
https://bugzilla.redhat.com/2251025
https://bugzilla.redhat.com/2318524
https://bugzilla.redhat.com/2318526
https://bugzilla.redhat.com/2318530
https://bugzilla.redhat.com/2318534
https://bugzilla.redhat.com/show_bug.cgi?id=2251025
https://bugzilla.redhat.com/show_bug.cgi?id=2318524
https://bugzilla.redhat.com/show_bug.cgi?id=2318526
https://bugzilla.redhat.com/show_bug.cgi?id=2318530
https://bugzilla.redhat.com/show_bug.cgi?id=2318534
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48161
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21210
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21235
https://errata.almalinux.org/8/ALSA-2024-8127.html
https://errata.rockylinux.org/RLSA-2024:8127
https://linux.oracle.com/cve/CVE-2024-21208.html
https://linux.oracle.com/errata/ELSA-2024-8127.html
https://nvd.nist.gov/vuln/detail/CVE-2024-21208
https://ubuntu.com/security/notices/USN-7096-1
https://ubuntu.com/security/notices/USN-7097-1
https://ubuntu.com/security/notices/USN-7098-1
https://ubuntu.com/security/notices/USN-7099-1
https://ubuntu.com/security/notices/USN-7124-1
https://ubuntu.com/security/notices/USN-7338-1
https://ubuntu.com/security/notices/USN-7339-1
https://www.cve.org/CVERecord?id=CVE-2024-21208
https://www.oracle.com/security-alerts/cpuoct2024.html
|
| openjdk-17-jre-headless |
CVE-2024-21210 |
LOW |
17.0.11+9-1~deb12u1 |
17.0.13+11-2~deb12u1 |
https://access.redhat.com/errata/RHSA-2024:8127
https://access.redhat.com/security/cve/CVE-2024-21210
https://bugzilla.redhat.com/2251025
https://bugzilla.redhat.com/2318524
https://bugzilla.redhat.com/2318526
https://bugzilla.redhat.com/2318530
https://bugzilla.redhat.com/2318534
https://bugzilla.redhat.com/show_bug.cgi?id=2251025
https://bugzilla.redhat.com/show_bug.cgi?id=2318524
https://bugzilla.redhat.com/show_bug.cgi?id=2318526
https://bugzilla.redhat.com/show_bug.cgi?id=2318530
https://bugzilla.redhat.com/show_bug.cgi?id=2318534
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48161
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21210
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21235
https://errata.almalinux.org/8/ALSA-2024-8127.html
https://errata.rockylinux.org/RLSA-2024:8127
https://linux.oracle.com/cve/CVE-2024-21210.html
https://linux.oracle.com/errata/ELSA-2024-8127.html
https://nvd.nist.gov/vuln/detail/CVE-2024-21210
https://ubuntu.com/security/notices/USN-7096-1
https://ubuntu.com/security/notices/USN-7097-1
https://ubuntu.com/security/notices/USN-7098-1
https://ubuntu.com/security/notices/USN-7099-1
https://ubuntu.com/security/notices/USN-7124-1
https://ubuntu.com/security/notices/USN-7338-1
https://ubuntu.com/security/notices/USN-7339-1
https://www.cve.org/CVERecord?id=CVE-2024-21210
https://www.oracle.com/security-alerts/cpuoct2024.html
|
| openjdk-17-jre-headless |
CVE-2024-21217 |
LOW |
17.0.11+9-1~deb12u1 |
17.0.13+11-2~deb12u1 |
https://access.redhat.com/errata/RHSA-2024:8127
https://access.redhat.com/security/cve/CVE-2024-21217
https://bugzilla.redhat.com/2251025
https://bugzilla.redhat.com/2318524
https://bugzilla.redhat.com/2318526
https://bugzilla.redhat.com/2318530
https://bugzilla.redhat.com/2318534
https://bugzilla.redhat.com/show_bug.cgi?id=2251025
https://bugzilla.redhat.com/show_bug.cgi?id=2318524
https://bugzilla.redhat.com/show_bug.cgi?id=2318526
https://bugzilla.redhat.com/show_bug.cgi?id=2318530
https://bugzilla.redhat.com/show_bug.cgi?id=2318534
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48161
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21210
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21235
https://errata.almalinux.org/8/ALSA-2024-8127.html
https://errata.rockylinux.org/RLSA-2024:8127
https://linux.oracle.com/cve/CVE-2024-21217.html
https://linux.oracle.com/errata/ELSA-2024-8127.html
https://nvd.nist.gov/vuln/detail/CVE-2024-21217
https://ubuntu.com/security/notices/USN-7096-1
https://ubuntu.com/security/notices/USN-7097-1
https://ubuntu.com/security/notices/USN-7098-1
https://ubuntu.com/security/notices/USN-7099-1
https://ubuntu.com/security/notices/USN-7124-1
https://ubuntu.com/security/notices/USN-7338-1
https://ubuntu.com/security/notices/USN-7339-1
https://www.cve.org/CVERecord?id=CVE-2024-21217
https://www.oracle.com/security-alerts/cpuoct2024.html
|
| openssl |
CVE-2024-6119 |
HIGH |
3.0.11-1~deb12u2 |
3.0.14-1~deb12u2 |
http://www.openwall.com/lists/oss-security/2024/09/03/4
https://access.redhat.com/errata/RHSA-2024:8935
https://access.redhat.com/security/cve/CVE-2024-6119
https://bugzilla.redhat.com/2306158
https://bugzilla.redhat.com/show_bug.cgi?id=2306158
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6119
https://errata.almalinux.org/9/ALSA-2024-8935.html
https://errata.rockylinux.org/RLSA-2024:6783
https://github.com/openssl/openssl/commit/05f360d9e849a1b277db628f1f13083a7f8dd04f
https://github.com/openssl/openssl/commit/06d1dc3fa96a2ba5a3e22735a033012aadc9f0d6
https://github.com/openssl/openssl/commit/621f3729831b05ee828a3203eddb621d014ff2b2
https://github.com/openssl/openssl/commit/7dfcee2cd2a63b2c64b9b4b0850be64cb695b0a0
https://github.com/openssl/openssl/security/advisories/GHSA-5qrj-vq78-58fj
https://linux.oracle.com/cve/CVE-2024-6119.html
https://linux.oracle.com/errata/ELSA-2024-8935.html
https://lists.freebsd.org/archives/freebsd-security/2024-September/000303.html
https://nvd.nist.gov/vuln/detail/CVE-2024-6119
https://openssl-library.org/news/secadv/20240903.txt
https://security.netapp.com/advisory/ntap-20240912-0001/
https://ubuntu.com/security/notices/USN-6986-1
https://www.cve.org/CVERecord?id=CVE-2024-6119
|
| openssl |
CVE-2023-5678 |
MEDIUM |
3.0.11-1~deb12u2 |
3.0.13-1~deb12u1 |
http://www.openwall.com/lists/oss-security/2024/03/11/1
https://access.redhat.com/errata/RHSA-2023:7877
https://access.redhat.com/security/cve/CVE-2023-5678
https://bugzilla.redhat.com/2224962
https://bugzilla.redhat.com/2227852
https://bugzilla.redhat.com/2248616
https://errata.almalinux.org/8/ALSA-2023-7877.html
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=34efaef6c103d636ab507a0cc34dca4d3aecc055
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=710fee740904b6290fef0dd5536fbcedbc38ff0c
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=db925ae2e65d0d925adef429afc37f75bd1c2017
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ddeb4b6c6d527e54ce9a99cba785c0f7776e54b6
https://linux.oracle.com/cve/CVE-2023-5678.html
https://linux.oracle.com/errata/ELSA-2024-2447.html
https://nvd.nist.gov/vuln/detail/CVE-2023-5678
https://security.netapp.com/advisory/ntap-20231130-0010/
https://ubuntu.com/security/notices/USN-6622-1
https://ubuntu.com/security/notices/USN-6632-1
https://ubuntu.com/security/notices/USN-6709-1
https://www.cve.org/CVERecord?id=CVE-2023-5678
https://www.openssl.org/news/secadv/20231106.txt
|
| openssl |
CVE-2023-6129 |
MEDIUM |
3.0.11-1~deb12u2 |
3.0.13-1~deb12u1 |
http://www.openwall.com/lists/oss-security/2024/03/11/1
https://access.redhat.com/errata/RHSA-2024:9088
https://access.redhat.com/security/cve/CVE-2023-6129
https://bugzilla.redhat.com/2257571
https://bugzilla.redhat.com/2258502
https://bugzilla.redhat.com/2259944
https://bugzilla.redhat.com/2284243
https://errata.almalinux.org/9/ALSA-2024-9088.html
https://github.com/openssl/openssl/commit/050d26383d4e264966fb83428e72d5d48f402d35
https://github.com/openssl/openssl/commit/5b139f95c9a47a55a0c54100f3837b1eee942b04
https://github.com/openssl/openssl/commit/f3fc5808fe9ff74042d639839610d03b8fdcc015
https://linux.oracle.com/cve/CVE-2023-6129.html
https://linux.oracle.com/errata/ELSA-2024-9088.html
https://nvd.nist.gov/vuln/detail/CVE-2023-6129
https://security.netapp.com/advisory/ntap-20240216-0009/
https://security.netapp.com/advisory/ntap-20240426-0008/
https://security.netapp.com/advisory/ntap-20240426-0013/
https://security.netapp.com/advisory/ntap-20240503-0011/
https://ubuntu.com/security/notices/USN-6622-1
https://www.cve.org/CVERecord?id=CVE-2023-6129
https://www.openssl.org/news/secadv/20240109.txt
https://www.openwall.com/lists/oss-security/2024/01/09/1
|
| openssl |
CVE-2023-6237 |
MEDIUM |
3.0.11-1~deb12u2 |
3.0.13-1~deb12u1 |
http://www.openwall.com/lists/oss-security/2024/03/11/1
https://access.redhat.com/errata/RHSA-2024:9088
https://access.redhat.com/security/cve/CVE-2023-6237
https://bugzilla.redhat.com/2257571
https://bugzilla.redhat.com/2258502
https://bugzilla.redhat.com/2259944
https://bugzilla.redhat.com/2284243
https://errata.almalinux.org/9/ALSA-2024-9088.html
https://github.com/openssl/openssl/commit/0b0f7abfb37350794a4b8960fafc292cd5d1b84d
https://github.com/openssl/openssl/commit/18c02492138d1eb8b6548cb26e7b625fb2414a2a
https://github.com/openssl/openssl/commit/a830f551557d3d66a84bbb18a5b889c640c36294
https://linux.oracle.com/cve/CVE-2023-6237.html
https://linux.oracle.com/errata/ELSA-2024-9088.html
https://nvd.nist.gov/vuln/detail/CVE-2023-6237
https://security.netapp.com/advisory/ntap-20240531-0007/
https://ubuntu.com/security/notices/USN-6622-1
https://www.cve.org/CVERecord?id=CVE-2023-6237
https://www.openssl.org/news/secadv/20240115.txt
https://www.openwall.com/lists/oss-security/2024/01/15/2
|
| openssl |
CVE-2024-0727 |
MEDIUM |
3.0.11-1~deb12u2 |
3.0.13-1~deb12u1 |
http://www.openwall.com/lists/oss-security/2024/03/11/1
https://access.redhat.com/errata/RHSA-2024:9088
https://access.redhat.com/security/cve/CVE-2024-0727
https://bugzilla.redhat.com/2257571
https://bugzilla.redhat.com/2258502
https://bugzilla.redhat.com/2259944
https://bugzilla.redhat.com/2284243
https://errata.almalinux.org/9/ALSA-2024-9088.html
https://github.com/alexcrichton/openssl-src-rs/commit/add20f73b6b42be7451af2e1044d4e0e778992b2
https://github.com/github/advisory-database/pull/3472
https://github.com/openssl/openssl/commit/09df4395b5071217b76dc7d3d2e630eb8c5a79c2
https://github.com/openssl/openssl/commit/775acfdbd0c6af9ac855f34969cdab0c0c90844a
https://github.com/openssl/openssl/commit/d135eeab8a5dbf72b3da5240bab9ddb7678dbd2c
https://github.com/openssl/openssl/pull/23362
https://github.com/pyca/cryptography/commit/3519591d255d4506fbcd0d04037d45271903c64d
https://github.openssl.org/openssl/extended-releases/commit/03b3941d60c4bce58fab69a0c22377ab439bc0e8
https://github.openssl.org/openssl/extended-releases/commit/aebaa5883e31122b404e450732dc833dc9dee539
https://linux.oracle.com/cve/CVE-2024-0727.html
https://linux.oracle.com/errata/ELSA-2024-9088.html
https://nvd.nist.gov/vuln/detail/CVE-2024-0727
https://security.netapp.com/advisory/ntap-20240208-0006
https://security.netapp.com/advisory/ntap-20240208-0006/
https://ubuntu.com/security/notices/USN-6622-1
https://ubuntu.com/security/notices/USN-6632-1
https://ubuntu.com/security/notices/USN-6709-1
https://ubuntu.com/security/notices/USN-7018-1
https://www.cve.org/CVERecord?id=CVE-2024-0727
https://www.openssl.org/news/secadv/20240125.txt
|
| openssl |
CVE-2024-13176 |
MEDIUM |
3.0.11-1~deb12u2 |
3.0.16-1~deb12u1 |
http://www.openwall.com/lists/oss-security/2025/01/20/2
https://access.redhat.com/errata/RHSA-2025:15699
https://access.redhat.com/security/cve/CVE-2024-13176
https://bugzilla.redhat.com/2359885
https://bugzilla.redhat.com/2359888
https://bugzilla.redhat.com/2359892
https://bugzilla.redhat.com/2359894
https://bugzilla.redhat.com/2359895
https://bugzilla.redhat.com/2359899
https://bugzilla.redhat.com/2359900
https://bugzilla.redhat.com/2359902
https://bugzilla.redhat.com/2359903
https://bugzilla.redhat.com/2359911
https://bugzilla.redhat.com/2359918
https://bugzilla.redhat.com/2359920
https://bugzilla.redhat.com/2359924
https://bugzilla.redhat.com/2359928
https://bugzilla.redhat.com/2359930
https://bugzilla.redhat.com/2359932
https://bugzilla.redhat.com/2359934
https://bugzilla.redhat.com/2359938
https://bugzilla.redhat.com/2359940
https://bugzilla.redhat.com/2359943
https://bugzilla.redhat.com/2359944
https://bugzilla.redhat.com/2359945
https://bugzilla.redhat.com/2359947
https://bugzilla.redhat.com/2359950
https://bugzilla.redhat.com/2359963
https://bugzilla.redhat.com/2359964
https://bugzilla.redhat.com/2359972
https://bugzilla.redhat.com/2370920
https://bugzilla.redhat.com/2380264
https://bugzilla.redhat.com/2380273
https://bugzilla.redhat.com/2380274
https://bugzilla.redhat.com/2380278
https://bugzilla.redhat.com/2380280
https://bugzilla.redhat.com/2380283
https://bugzilla.redhat.com/2380284
https://bugzilla.redhat.com/2380290
https://bugzilla.redhat.com/2380291
https://bugzilla.redhat.com/2380295
https://bugzilla.redhat.com/2380298
https://bugzilla.redhat.com/2380306
https://bugzilla.redhat.com/2380308
https://bugzilla.redhat.com/2380309
https://bugzilla.redhat.com/2380310
https://bugzilla.redhat.com/2380312
https://bugzilla.redhat.com/2380313
https://bugzilla.redhat.com/2380320
https://bugzilla.redhat.com/2380321
https://bugzilla.redhat.com/2380322
https://bugzilla.redhat.com/2380326
https://bugzilla.redhat.com/2380327
https://bugzilla.redhat.com/2380334
https://bugzilla.redhat.com/2380335
https://bugzilla.redhat.com/show_bug.cgi?id=2338999
https://bugzilla.redhat.com/show_bug.cgi?id=2359885
https://bugzilla.redhat.com/show_bug.cgi?id=2359888
https://bugzilla.redhat.com/show_bug.cgi?id=2359892
https://bugzilla.redhat.com/show_bug.cgi?id=2359894
https://bugzilla.redhat.com/show_bug.cgi?id=2359895
https://bugzilla.redhat.com/show_bug.cgi?id=2359899
https://bugzilla.redhat.com/show_bug.cgi?id=2359900
https://bugzilla.redhat.com/show_bug.cgi?id=2359902
https://bugzilla.redhat.com/show_bug.cgi?id=2359903
https://bugzilla.redhat.com/show_bug.cgi?id=2359911
https://bugzilla.redhat.com/show_bug.cgi?id=2359918
https://bugzilla.redhat.com/show_bug.cgi?id=2359920
https://bugzilla.redhat.com/show_bug.cgi?id=2359924
https://bugzilla.redhat.com/show_bug.cgi?id=2359928
https://bugzilla.redhat.com/show_bug.cgi?id=2359930
https://bugzilla.redhat.com/show_bug.cgi?id=2359932
https://bugzilla.redhat.com/show_bug.cgi?id=2359934
https://bugzilla.redhat.com/show_bug.cgi?id=2359938
https://bugzilla.redhat.com/show_bug.cgi?id=2359940
https://bugzilla.redhat.com/show_bug.cgi?id=2359943
https://bugzilla.redhat.com/show_bug.cgi?id=2359944
https://bugzilla.redhat.com/show_bug.cgi?id=2359945
https://bugzilla.redhat.com/show_bug.cgi?id=2359947
https://bugzilla.redhat.com/show_bug.cgi?id=2359950
https://bugzilla.redhat.com/show_bug.cgi?id=2359963
https://bugzilla.redhat.com/show_bug.cgi?id=2359964
https://bugzilla.redhat.com/show_bug.cgi?id=2359972
https://bugzilla.redhat.com/show_bug.cgi?id=2370920
https://bugzilla.redhat.com/show_bug.cgi?id=2380264
https://bugzilla.redhat.com/show_bug.cgi?id=2380273
https://bugzilla.redhat.com/show_bug.cgi?id=2380274
https://bugzilla.redhat.com/show_bug.cgi?id=2380278
https://bugzilla.redhat.com/show_bug.cgi?id=2380280
https://bugzilla.redhat.com/show_bug.cgi?id=2380283
https://bugzilla.redhat.com/show_bug.cgi?id=2380284
https://bugzilla.redhat.com/show_bug.cgi?id=2380290
https://bugzilla.redhat.com/show_bug.cgi?id=2380291
https://bugzilla.redhat.com/show_bug.cgi?id=2380295
https://bugzilla.redhat.com/show_bug.cgi?id=2380298
https://bugzilla.redhat.com/show_bug.cgi?id=2380306
https://bugzilla.redhat.com/show_bug.cgi?id=2380308
https://bugzilla.redhat.com/show_bug.cgi?id=2380309
https://bugzilla.redhat.com/show_bug.cgi?id=2380310
https://bugzilla.redhat.com/show_bug.cgi?id=2380312
https://bugzilla.redhat.com/show_bug.cgi?id=2380313
https://bugzilla.redhat.com/show_bug.cgi?id=2380320
https://bugzilla.redhat.com/show_bug.cgi?id=2380321
https://bugzilla.redhat.com/show_bug.cgi?id=2380322
https://bugzilla.redhat.com/show_bug.cgi?id=2380326
https://bugzilla.redhat.com/show_bug.cgi?id=2380327
https://bugzilla.redhat.com/show_bug.cgi?id=2380334
https://bugzilla.redhat.com/show_bug.cgi?id=2380335
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-13176
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21574
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21577
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21580
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21584
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21585
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21588
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30681
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30682
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30683
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30684
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30685
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30687
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30688
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30693
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30695
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30696
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30699
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30703
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30704
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30705
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30715
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30721
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50077
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50079
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50080
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50083
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50084
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50085
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50086
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50087
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50088
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50091
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50092
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50094
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50097
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50098
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50100
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50104
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5399
https://errata.almalinux.org/10/ALSA-2025-15699.html
https://errata.rockylinux.org/RLSA-2025:15699
https://github.com/openssl/openssl/commit/07272b05b04836a762b4baa874958af51d513844
https://github.com/openssl/openssl/commit/2af62e74fb59bc469506bc37eb2990ea408d9467
https://github.com/openssl/openssl/commit/392dcb336405a0c94486aa6655057f59fd3a0902
https://github.com/openssl/openssl/commit/4b1cb94a734a7d4ec363ac0a215a25c181e11f65
https://github.com/openssl/openssl/commit/77c608f4c8857e63e98e66444e2e761c9627916f
https://github.openssl.org/openssl/extended-releases/commit/0d5fd1ab987f7571e2c955d8d8b638fc0fb54ded
https://github.openssl.org/openssl/extended-releases/commit/a2639000db19878d5d89586ae7b725080592ae86
https://linux.oracle.com/cve/CVE-2024-13176.html
https://linux.oracle.com/errata/ELSA-2025-16046.html
https://lists.debian.org/debian-lts-announce/2025/05/msg00028.html
https://nvd.nist.gov/vuln/detail/CVE-2024-13176
https://openssl-library.org/news/secadv/20250120.txt
https://security.netapp.com/advisory/ntap-20250124-0005/
https://security.netapp.com/advisory/ntap-20250418-0010/
https://ubuntu.com/security/notices/USN-7264-1
https://ubuntu.com/security/notices/USN-7278-1
https://www.cve.org/CVERecord?id=CVE-2024-13176
https://www.oracle.com/security-alerts/cpuapr2025.html#AppendixMSQL
|
| openssl |
CVE-2024-4603 |
MEDIUM |
3.0.11-1~deb12u2 |
3.0.14-1~deb12u1 |
http://www.openwall.com/lists/oss-security/2024/05/16/2
https://access.redhat.com/errata/RHSA-2024:9333
https://access.redhat.com/security/cve/CVE-2024-4603
https://bugzilla.redhat.com/2274020
https://bugzilla.redhat.com/2281029
https://bugzilla.redhat.com/2283757
https://bugzilla.redhat.com/2294581
https://errata.almalinux.org/9/ALSA-2024-9333.html
https://github.com/openssl/openssl/commit/3559e868e58005d15c6013a0c1fd832e51c73397
https://github.com/openssl/openssl/commit/53ea06486d296b890d565fb971b2764fcd826e7e
https://github.com/openssl/openssl/commit/9c39b3858091c152f52513c066ff2c5a47969f0d
https://github.com/openssl/openssl/commit/da343d0605c826ef197aceedc67e8e04f065f740
https://linux.oracle.com/cve/CVE-2024-4603.html
https://linux.oracle.com/errata/ELSA-2024-9333.html
https://nvd.nist.gov/vuln/detail/CVE-2024-4603
https://security.netapp.com/advisory/ntap-20240621-0001/
https://ubuntu.com/security/notices/USN-6937-1
https://www.cve.org/CVERecord?id=CVE-2024-4603
https://www.openssl.org/news/secadv/20240516.txt
|
| openssl |
CVE-2024-4741 |
MEDIUM |
3.0.11-1~deb12u2 |
3.0.14-1~deb12u1 |
https://access.redhat.com/errata/RHSA-2024:9333
https://access.redhat.com/security/cve/CVE-2024-4741
https://bugzilla.redhat.com/2274020
https://bugzilla.redhat.com/2281029
https://bugzilla.redhat.com/2283757
https://bugzilla.redhat.com/2294581
https://errata.almalinux.org/9/ALSA-2024-9333.html
https://github.com/openssl/openssl/commit/704f725b96aa373ee45ecfb23f6abfe8be8d9177
https://github.com/openssl/openssl/commit/b3f0eb0a295f58f16ba43ba99dad70d4ee5c437d
https://github.com/openssl/openssl/commit/c88c3de51020c37e8706bf7a682a162593053aac
https://github.com/openssl/openssl/commit/e5093133c35ca82874ad83697af76f4b0f7e3bd8
https://github.openssl.org/openssl/extended-releases/commit/f7a045f3143fc6da2ee66bf52d8df04829590dd4
https://linux.oracle.com/cve/CVE-2024-4741.html
https://linux.oracle.com/errata/ELSA-2024-9333.html
https://nvd.nist.gov/vuln/detail/CVE-2024-4741
https://ubuntu.com/security/notices/USN-6937-1
https://www.cve.org/CVERecord?id=CVE-2024-4741
https://www.openssl.org/news/secadv/20240528.txt
|
| openssl |
CVE-2024-5535 |
MEDIUM |
3.0.11-1~deb12u2 |
3.0.15-1~deb12u1 |
http://www.openwall.com/lists/oss-security/2024/06/27/1
http://www.openwall.com/lists/oss-security/2024/06/28/4
http://www.openwall.com/lists/oss-security/2024/08/15/1
https://access.redhat.com/errata/RHSA-2025:1673
https://access.redhat.com/security/cve/CVE-2024-5535
https://bugzilla.redhat.com/2294581
https://bugzilla.redhat.com/2294676
https://bugzilla.redhat.com/2301888
https://bugzilla.redhat.com/2318857
https://bugzilla.redhat.com/2318858
https://bugzilla.redhat.com/2318870
https://bugzilla.redhat.com/2318873
https://bugzilla.redhat.com/2318874
https://bugzilla.redhat.com/2318876
https://bugzilla.redhat.com/2318882
https://bugzilla.redhat.com/2318883
https://bugzilla.redhat.com/2318884
https://bugzilla.redhat.com/2318885
https://bugzilla.redhat.com/2318886
https://bugzilla.redhat.com/2318897
https://bugzilla.redhat.com/2318900
https://bugzilla.redhat.com/2318905
https://bugzilla.redhat.com/2318914
https://bugzilla.redhat.com/2318922
https://bugzilla.redhat.com/2318923
https://bugzilla.redhat.com/2318925
https://bugzilla.redhat.com/2318926
https://bugzilla.redhat.com/2318927
https://bugzilla.redhat.com/2331191
https://bugzilla.redhat.com/2339218
https://bugzilla.redhat.com/2339220
https://bugzilla.redhat.com/2339221
https://bugzilla.redhat.com/2339226
https://bugzilla.redhat.com/2339231
https://bugzilla.redhat.com/2339236
https://bugzilla.redhat.com/2339238
https://bugzilla.redhat.com/2339243
https://bugzilla.redhat.com/2339247
https://bugzilla.redhat.com/2339252
https://bugzilla.redhat.com/2339259
https://bugzilla.redhat.com/2339266
https://bugzilla.redhat.com/2339270
https://bugzilla.redhat.com/2339271
https://bugzilla.redhat.com/2339275
https://bugzilla.redhat.com/2339277
https://bugzilla.redhat.com/2339281
https://bugzilla.redhat.com/2339284
https://bugzilla.redhat.com/2339291
https://bugzilla.redhat.com/2339293
https://bugzilla.redhat.com/2339295
https://bugzilla.redhat.com/2339299
https://bugzilla.redhat.com/2339300
https://bugzilla.redhat.com/2339304
https://bugzilla.redhat.com/2339305
https://bugzilla.redhat.com/show_bug.cgi?id=2294581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5535
https://errata.almalinux.org/8/ALSA-2025-1673.html
https://errata.rockylinux.org/RLSA-2024:7848
https://github.com/openssl/openssl/commit/4ada436a1946cbb24db5ab4ca082b69c1bc10f37
https://github.com/openssl/openssl/commit/99fb785a5f85315b95288921a321a935ea29a51e
https://github.com/openssl/openssl/commit/cf6f91f6121f4db167405db2f0de410a456f260c
https://github.com/openssl/openssl/commit/e86ac436f0bd54d4517745483e2315650fae7b2c
https://github.openssl.org/openssl/extended-releases/commit/9947251413065a05189a63c9b7a6c1d4e224c21c
https://github.openssl.org/openssl/extended-releases/commit/b78ec0824da857223486660177d3b1f255c65d87
https://linux.oracle.com/cve/CVE-2024-5535.html
https://linux.oracle.com/errata/ELSA-2025-1673.html
https://nvd.nist.gov/vuln/detail/CVE-2024-5535
https://openssl.org/news/secadv/20240627.txt
https://security.netapp.com/advisory/ntap-20240712-0005/
https://ubuntu.com/security/notices/USN-6937-1
https://www.cve.org/CVERecord?id=CVE-2024-5535
https://www.openssl.org/news/secadv/20240627.txt
https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL
|
| openssl |
CVE-2025-9230 |
MEDIUM |
3.0.11-1~deb12u2 |
3.0.17-1~deb12u3 |
https://access.redhat.com/security/cve/CVE-2025-9230
https://github.com/openssl/openssl/commit/5965ea5dd6960f36d8b7f74f8eac67a8eb8f2b45
https://github.com/openssl/openssl/commit/9e91358f365dee6c446dcdcdb01c04d2743fd280
https://github.com/openssl/openssl/commit/a79c4ce559c6a3a8fd4109e9f33c1185d5bf2def
https://github.com/openssl/openssl/commit/b5282d677551afda7d20e9c00e09561b547b2dfd
https://github.com/openssl/openssl/commit/bae259a211ada6315dc50900686daaaaaa55f482
https://github.openssl.org/openssl/extended-releases/commit/c2b96348bfa662f25f4fabf81958ae822063dae3
https://github.openssl.org/openssl/extended-releases/commit/dfbaf161d8dafc1132dd88cd48ad990ed9b4c8ba
https://nvd.nist.gov/vuln/detail/CVE-2025-9230
https://openssl-library.org/news/secadv/20250930.txt
https://ubuntu.com/security/notices/USN-7786-1
https://www.cve.org/CVERecord?id=CVE-2025-9230
|
| openssl |
CVE-2024-2511 |
LOW |
3.0.11-1~deb12u2 |
3.0.14-1~deb12u1 |
http://www.openwall.com/lists/oss-security/2024/04/08/5
https://access.redhat.com/errata/RHSA-2024:9333
https://access.redhat.com/security/cve/CVE-2024-2511
https://bugzilla.redhat.com/2274020
https://bugzilla.redhat.com/2281029
https://bugzilla.redhat.com/2283757
https://bugzilla.redhat.com/2294581
https://errata.almalinux.org/9/ALSA-2024-9333.html
https://github.com/openssl/openssl/commit/7e4d731b1c07201ad9374c1cd9ac5263bdf35bce
https://github.com/openssl/openssl/commit/b52867a9f618bb955bed2a3ce3db4d4f97ed8e5d
https://github.com/openssl/openssl/commit/e9d7083e241670332e0443da0f0d4ffb52829f08
https://github.openssl.org/openssl/extended-releases/commit/5f8d25770ae6437db119dfc951e207271a326640
https://linux.oracle.com/cve/CVE-2024-2511.html
https://linux.oracle.com/errata/ELSA-2024-9333.html
https://nvd.nist.gov/vuln/detail/CVE-2024-2511
https://security.netapp.com/advisory/ntap-20240503-0013/
https://ubuntu.com/security/notices/USN-6937-1
https://www.cve.org/CVERecord?id=CVE-2024-2511
https://www.openssl.org/news/secadv/20240408.txt
https://www.openssl.org/news/vulnerabilities.html
|
| openssl |
CVE-2024-9143 |
LOW |
3.0.11-1~deb12u2 |
3.0.15-1~deb12u1 |
http://www.openwall.com/lists/oss-security/2024/10/16/1
http://www.openwall.com/lists/oss-security/2024/10/23/1
http://www.openwall.com/lists/oss-security/2024/10/24/1
https://access.redhat.com/security/cve/CVE-2024-9143
https://github.com/openssl/openssl/commit/72ae83ad214d2eef262461365a1975707f862712
https://github.com/openssl/openssl/commit/bc7e04d7c8d509fb78fc0e285aa948fb0da04700
https://github.com/openssl/openssl/commit/c0d3e4d32d2805f49bec30547f225bc4d092e1f4
https://github.com/openssl/openssl/commit/fdf6723362ca51bd883295efe206cb5b1cfa5154
https://github.openssl.org/openssl/extended-releases/commit/8efc0cbaa8ebba8e116f7b81a876a4123594d86a
https://github.openssl.org/openssl/extended-releases/commit/9d576994cec2b7aa37a91740ea7e680810957e41
https://nvd.nist.gov/vuln/detail/CVE-2024-9143
https://openssl-library.org/news/secadv/20241016.txt
https://security.netapp.com/advisory/ntap-20241101-0001/
https://ubuntu.com/security/notices/USN-7264-1
https://ubuntu.com/security/notices/USN-7278-1
https://www.cve.org/CVERecord?id=CVE-2024-9143
|
| openssl |
CVE-2025-27587 |
LOW |
3.0.11-1~deb12u2 |
|
https://github.com/openssl/openssl/issues/24253
https://minerva.crocs.fi.muni.cz
https://www.cve.org/CVERecord?id=CVE-2025-27587
|
| openssl |
CVE-2025-9232 |
LOW |
3.0.11-1~deb12u2 |
3.0.17-1~deb12u3 |
https://access.redhat.com/security/cve/CVE-2025-9232
https://github.com/openssl/openssl/commit/2b4ec20e47959170422922eaff25346d362dcb35
https://github.com/openssl/openssl/commit/654dc11d23468a74fc8ea4672b702dd3feb7be4b
https://github.com/openssl/openssl/commit/7cf21a30513c9e43c4bc3836c237cf086e194af3
https://github.com/openssl/openssl/commit/89e790ac431125a4849992858490bed6b225eadf
https://github.com/openssl/openssl/commit/bbf38c034cdabd0a13330abcc4855c866f53d2e0
https://nvd.nist.gov/vuln/detail/CVE-2025-9232
https://openssl-library.org/news/secadv/20250930.txt
https://ubuntu.com/security/notices/USN-7786-1
https://www.cve.org/CVERecord?id=CVE-2025-9232
|
| passwd |
CVE-2023-4641 |
MEDIUM |
1:4.13+dfsg1-1+b1 |
1:4.13+dfsg1-1+deb12u1 |
https://access.redhat.com/errata/RHSA-2023:6632
https://access.redhat.com/errata/RHSA-2023:7112
https://access.redhat.com/errata/RHSA-2024:0417
https://access.redhat.com/errata/RHSA-2024:2577
https://access.redhat.com/security/cve/CVE-2023-4641
https://bugzilla.redhat.com/2215945
https://bugzilla.redhat.com/show_bug.cgi?id=2215945
https://errata.almalinux.org/8/ALSA-2023-7112.html
https://linux.oracle.com/cve/CVE-2023-4641.html
https://linux.oracle.com/errata/ELSA-2023-7112.html
https://nvd.nist.gov/vuln/detail/CVE-2023-4641
https://ubuntu.com/security/notices/USN-6640-1
https://www.cve.org/CVERecord?id=CVE-2023-4641
|
| passwd |
CVE-2007-5686 |
LOW |
1:4.13+dfsg1-1+b1 |
|
http://secunia.com/advisories/27215
http://www.securityfocus.com/archive/1/482129/100/100/threaded
http://www.securityfocus.com/archive/1/482857/100/0/threaded
http://www.securityfocus.com/bid/26048
http://www.vupen.com/english/advisories/2007/3474
https://issues.rpath.com/browse/RPL-1825
|
| passwd |
CVE-2023-29383 |
LOW |
1:4.13+dfsg1-1+b1 |
1:4.13+dfsg1-1+deb12u1 |
https://access.redhat.com/security/cve/CVE-2023-29383
https://github.com/shadow-maint/shadow/commit/e5905c4b84d4fb90aefcd96ee618411ebfac663d
https://github.com/shadow-maint/shadow/pull/687
https://nvd.nist.gov/vuln/detail/CVE-2023-29383
https://www.cve.org/CVERecord?id=CVE-2023-29383
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2023-29383-abusing-linux-chfn-to-misrepresent-etc-passwd/
https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=31797
|
| passwd |
CVE-2024-56433 |
LOW |
1:4.13+dfsg1-1+b1 |
|
https://access.redhat.com/security/cve/CVE-2024-56433
https://github.com/shadow-maint/shadow/blob/e2512d5741d4a44bdd81a8c2d0029b6222728cf0/etc/login.defs#L238-L241
https://github.com/shadow-maint/shadow/issues/1157
https://github.com/shadow-maint/shadow/releases/tag/4.4
https://nvd.nist.gov/vuln/detail/CVE-2024-56433
https://www.cve.org/CVERecord?id=CVE-2024-56433
|
| passwd |
TEMP-0628843-DBAD28 |
LOW |
1:4.13+dfsg1-1+b1 |
|
|
| perl |
CVE-2023-31484 |
HIGH |
5.36.0-7+deb12u1 |
5.36.0-7+deb12u3 |
http://www.openwall.com/lists/oss-security/2023/04/29/1
http://www.openwall.com/lists/oss-security/2023/05/03/3
http://www.openwall.com/lists/oss-security/2023/05/03/5
http://www.openwall.com/lists/oss-security/2023/05/07/2
https://access.redhat.com/errata/RHSA-2024:3094
https://access.redhat.com/security/cve/CVE-2023-31484
https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/
https://bugzilla.redhat.com/2218667
https://bugzilla.redhat.com/show_bug.cgi?id=2218667
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31484
https://errata.almalinux.org/8/ALSA-2024-3094.html
https://errata.rockylinux.org/RLSA-2023:6539
https://github.com/andk/cpanpm/commit/9c98370287f4e709924aee7c58ef21c85289a7f0 (2.35-TRIAL)
https://github.com/andk/cpanpm/pull/175
https://linux.oracle.com/cve/CVE-2023-31484.html
https://linux.oracle.com/errata/ELSA-2024-3094.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BM6UW55CNFUTNGD5ZRKGUKKKFDJGMFHL/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LEGCEOKFJVBJ2QQ6S2H4NAEWTUERC7SB/
https://metacpan.org/dist/CPAN/changes
https://nvd.nist.gov/vuln/detail/CVE-2023-31484
https://security.netapp.com/advisory/ntap-20240621-0007/
https://ubuntu.com/security/notices/USN-6112-1
https://ubuntu.com/security/notices/USN-6112-2
https://www.cve.org/CVERecord?id=CVE-2023-31484
https://www.openwall.com/lists/oss-security/2023/04/18/14
|
| perl |
CVE-2024-56406 |
HIGH |
5.36.0-7+deb12u1 |
5.36.0-7+deb12u2 |
http://www.openwall.com/lists/oss-security/2025/04/13/3
http://www.openwall.com/lists/oss-security/2025/04/13/4
http://www.openwall.com/lists/oss-security/2025/04/13/5
https://access.redhat.com/errata/RHSA-2025:7500
https://access.redhat.com/security/cve/CVE-2024-56406
https://bugzilla.redhat.com/2359290
https://bugzilla.redhat.com/show_bug.cgi?id=2359290
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56406
https://errata.almalinux.org/10/ALSA-2025-7500.html
https://errata.rockylinux.org/RLSA-2025:7500
https://github.com/Perl/perl5/commit/87f42aa0e0096e9a346c9672aa3a0bd3bef8c1dd.patch
https://linux.oracle.com/cve/CVE-2024-56406.html
https://linux.oracle.com/errata/ELSA-2025-7500.html
https://metacpan.org/release/SHAY/perl-5.38.4/changes
https://metacpan.org/release/SHAY/perl-5.40.2/changes
https://nvd.nist.gov/vuln/detail/CVE-2024-56406
https://ubuntu.com/security/notices/USN-7434-1
https://ubuntu.com/security/notices/USN-7434-2
https://www.cve.org/CVERecord?id=CVE-2024-56406
|
| perl |
CVE-2025-40909 |
MEDIUM |
5.36.0-7+deb12u1 |
5.36.0-7+deb12u3 |
http://www.openwall.com/lists/oss-security/2025/05/23/1
http://www.openwall.com/lists/oss-security/2025/05/30/4
http://www.openwall.com/lists/oss-security/2025/06/02/2
http://www.openwall.com/lists/oss-security/2025/06/02/5
http://www.openwall.com/lists/oss-security/2025/06/02/6
http://www.openwall.com/lists/oss-security/2025/06/02/7
http://www.openwall.com/lists/oss-security/2025/06/03/1
https://access.redhat.com/errata/RHSA-2025:11805
https://access.redhat.com/security/cve/CVE-2025-40909
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226
https://bugzilla.redhat.com/2369407
https://bugzilla.redhat.com/show_bug.cgi?id=2369407
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40909
https://errata.almalinux.org/8/ALSA-2025-11805.html
https://errata.rockylinux.org/RLSA-2025:11805
https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e
https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch
https://github.com/Perl/perl5/issues/10387
https://github.com/Perl/perl5/issues/23010
https://linux.oracle.com/cve/CVE-2025-40909.html
https://linux.oracle.com/errata/ELSA-2025-12056.html
https://lists.security.metacpan.org/cve-announce/msg/30017499/
https://nvd.nist.gov/vuln/detail/CVE-2025-40909
https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads
https://ubuntu.com/security/notices/USN-7678-1
https://www.cve.org/CVERecord?id=CVE-2025-40909
https://www.openwall.com/lists/oss-security/2025/05/22/2
|
| perl |
CVE-2011-4116 |
LOW |
5.36.0-7+deb12u1 |
|
http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://access.redhat.com/security/cve/CVE-2011-4116
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://nvd.nist.gov/vuln/detail/CVE-2011-4116
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
https://www.cve.org/CVERecord?id=CVE-2011-4116
|
| perl |
CVE-2023-31486 |
LOW |
5.36.0-7+deb12u1 |
|
http://www.openwall.com/lists/oss-security/2023/04/29/1
http://www.openwall.com/lists/oss-security/2023/05/03/3
http://www.openwall.com/lists/oss-security/2023/05/03/5
http://www.openwall.com/lists/oss-security/2023/05/07/2
https://access.redhat.com/errata/RHSA-2023:7174
https://access.redhat.com/security/cve/CVE-2023-31486
https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/
https://bugzilla.redhat.com/2228392
https://errata.almalinux.org/8/ALSA-2023-7174.html
https://github.com/chansen/p5-http-tiny/pull/153
https://hackeriet.github.io/cpan-http-tiny-overview/
https://linux.oracle.com/cve/CVE-2023-31486.html
https://linux.oracle.com/errata/ELSA-2023-7174.html
https://nvd.nist.gov/vuln/detail/CVE-2023-31486
https://security.netapp.com/advisory/ntap-20241129-0011/
https://www.cve.org/CVERecord?id=CVE-2023-31486
https://www.openwall.com/lists/oss-security/2023/04/18/14
https://www.openwall.com/lists/oss-security/2023/05/03/4
https://www.reddit.com/r/perl/comments/111tadi/psa_httptiny_disabled_ssl_verification_by_default/
|
| perl-base |
CVE-2023-31484 |
HIGH |
5.36.0-7+deb12u1 |
5.36.0-7+deb12u3 |
http://www.openwall.com/lists/oss-security/2023/04/29/1
http://www.openwall.com/lists/oss-security/2023/05/03/3
http://www.openwall.com/lists/oss-security/2023/05/03/5
http://www.openwall.com/lists/oss-security/2023/05/07/2
https://access.redhat.com/errata/RHSA-2024:3094
https://access.redhat.com/security/cve/CVE-2023-31484
https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/
https://bugzilla.redhat.com/2218667
https://bugzilla.redhat.com/show_bug.cgi?id=2218667
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31484
https://errata.almalinux.org/8/ALSA-2024-3094.html
https://errata.rockylinux.org/RLSA-2023:6539
https://github.com/andk/cpanpm/commit/9c98370287f4e709924aee7c58ef21c85289a7f0 (2.35-TRIAL)
https://github.com/andk/cpanpm/pull/175
https://linux.oracle.com/cve/CVE-2023-31484.html
https://linux.oracle.com/errata/ELSA-2024-3094.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BM6UW55CNFUTNGD5ZRKGUKKKFDJGMFHL/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LEGCEOKFJVBJ2QQ6S2H4NAEWTUERC7SB/
https://metacpan.org/dist/CPAN/changes
https://nvd.nist.gov/vuln/detail/CVE-2023-31484
https://security.netapp.com/advisory/ntap-20240621-0007/
https://ubuntu.com/security/notices/USN-6112-1
https://ubuntu.com/security/notices/USN-6112-2
https://www.cve.org/CVERecord?id=CVE-2023-31484
https://www.openwall.com/lists/oss-security/2023/04/18/14
|
| perl-base |
CVE-2024-56406 |
HIGH |
5.36.0-7+deb12u1 |
5.36.0-7+deb12u2 |
http://www.openwall.com/lists/oss-security/2025/04/13/3
http://www.openwall.com/lists/oss-security/2025/04/13/4
http://www.openwall.com/lists/oss-security/2025/04/13/5
https://access.redhat.com/errata/RHSA-2025:7500
https://access.redhat.com/security/cve/CVE-2024-56406
https://bugzilla.redhat.com/2359290
https://bugzilla.redhat.com/show_bug.cgi?id=2359290
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56406
https://errata.almalinux.org/10/ALSA-2025-7500.html
https://errata.rockylinux.org/RLSA-2025:7500
https://github.com/Perl/perl5/commit/87f42aa0e0096e9a346c9672aa3a0bd3bef8c1dd.patch
https://linux.oracle.com/cve/CVE-2024-56406.html
https://linux.oracle.com/errata/ELSA-2025-7500.html
https://metacpan.org/release/SHAY/perl-5.38.4/changes
https://metacpan.org/release/SHAY/perl-5.40.2/changes
https://nvd.nist.gov/vuln/detail/CVE-2024-56406
https://ubuntu.com/security/notices/USN-7434-1
https://ubuntu.com/security/notices/USN-7434-2
https://www.cve.org/CVERecord?id=CVE-2024-56406
|
| perl-base |
CVE-2025-40909 |
MEDIUM |
5.36.0-7+deb12u1 |
5.36.0-7+deb12u3 |
http://www.openwall.com/lists/oss-security/2025/05/23/1
http://www.openwall.com/lists/oss-security/2025/05/30/4
http://www.openwall.com/lists/oss-security/2025/06/02/2
http://www.openwall.com/lists/oss-security/2025/06/02/5
http://www.openwall.com/lists/oss-security/2025/06/02/6
http://www.openwall.com/lists/oss-security/2025/06/02/7
http://www.openwall.com/lists/oss-security/2025/06/03/1
https://access.redhat.com/errata/RHSA-2025:11805
https://access.redhat.com/security/cve/CVE-2025-40909
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226
https://bugzilla.redhat.com/2369407
https://bugzilla.redhat.com/show_bug.cgi?id=2369407
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40909
https://errata.almalinux.org/8/ALSA-2025-11805.html
https://errata.rockylinux.org/RLSA-2025:11805
https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e
https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch
https://github.com/Perl/perl5/issues/10387
https://github.com/Perl/perl5/issues/23010
https://linux.oracle.com/cve/CVE-2025-40909.html
https://linux.oracle.com/errata/ELSA-2025-12056.html
https://lists.security.metacpan.org/cve-announce/msg/30017499/
https://nvd.nist.gov/vuln/detail/CVE-2025-40909
https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads
https://ubuntu.com/security/notices/USN-7678-1
https://www.cve.org/CVERecord?id=CVE-2025-40909
https://www.openwall.com/lists/oss-security/2025/05/22/2
|
| perl-base |
CVE-2011-4116 |
LOW |
5.36.0-7+deb12u1 |
|
http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://access.redhat.com/security/cve/CVE-2011-4116
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://nvd.nist.gov/vuln/detail/CVE-2011-4116
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
https://www.cve.org/CVERecord?id=CVE-2011-4116
|
| perl-base |
CVE-2023-31486 |
LOW |
5.36.0-7+deb12u1 |
|
http://www.openwall.com/lists/oss-security/2023/04/29/1
http://www.openwall.com/lists/oss-security/2023/05/03/3
http://www.openwall.com/lists/oss-security/2023/05/03/5
http://www.openwall.com/lists/oss-security/2023/05/07/2
https://access.redhat.com/errata/RHSA-2023:7174
https://access.redhat.com/security/cve/CVE-2023-31486
https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/
https://bugzilla.redhat.com/2228392
https://errata.almalinux.org/8/ALSA-2023-7174.html
https://github.com/chansen/p5-http-tiny/pull/153
https://hackeriet.github.io/cpan-http-tiny-overview/
https://linux.oracle.com/cve/CVE-2023-31486.html
https://linux.oracle.com/errata/ELSA-2023-7174.html
https://nvd.nist.gov/vuln/detail/CVE-2023-31486
https://security.netapp.com/advisory/ntap-20241129-0011/
https://www.cve.org/CVERecord?id=CVE-2023-31486
https://www.openwall.com/lists/oss-security/2023/04/18/14
https://www.openwall.com/lists/oss-security/2023/05/03/4
https://www.reddit.com/r/perl/comments/111tadi/psa_httptiny_disabled_ssl_verification_by_default/
|
| perl-modules-5.36 |
CVE-2023-31484 |
HIGH |
5.36.0-7+deb12u1 |
5.36.0-7+deb12u3 |
http://www.openwall.com/lists/oss-security/2023/04/29/1
http://www.openwall.com/lists/oss-security/2023/05/03/3
http://www.openwall.com/lists/oss-security/2023/05/03/5
http://www.openwall.com/lists/oss-security/2023/05/07/2
https://access.redhat.com/errata/RHSA-2024:3094
https://access.redhat.com/security/cve/CVE-2023-31484
https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/
https://bugzilla.redhat.com/2218667
https://bugzilla.redhat.com/show_bug.cgi?id=2218667
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31484
https://errata.almalinux.org/8/ALSA-2024-3094.html
https://errata.rockylinux.org/RLSA-2023:6539
https://github.com/andk/cpanpm/commit/9c98370287f4e709924aee7c58ef21c85289a7f0 (2.35-TRIAL)
https://github.com/andk/cpanpm/pull/175
https://linux.oracle.com/cve/CVE-2023-31484.html
https://linux.oracle.com/errata/ELSA-2024-3094.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BM6UW55CNFUTNGD5ZRKGUKKKFDJGMFHL/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LEGCEOKFJVBJ2QQ6S2H4NAEWTUERC7SB/
https://metacpan.org/dist/CPAN/changes
https://nvd.nist.gov/vuln/detail/CVE-2023-31484
https://security.netapp.com/advisory/ntap-20240621-0007/
https://ubuntu.com/security/notices/USN-6112-1
https://ubuntu.com/security/notices/USN-6112-2
https://www.cve.org/CVERecord?id=CVE-2023-31484
https://www.openwall.com/lists/oss-security/2023/04/18/14
|
| perl-modules-5.36 |
CVE-2024-56406 |
HIGH |
5.36.0-7+deb12u1 |
5.36.0-7+deb12u2 |
http://www.openwall.com/lists/oss-security/2025/04/13/3
http://www.openwall.com/lists/oss-security/2025/04/13/4
http://www.openwall.com/lists/oss-security/2025/04/13/5
https://access.redhat.com/errata/RHSA-2025:7500
https://access.redhat.com/security/cve/CVE-2024-56406
https://bugzilla.redhat.com/2359290
https://bugzilla.redhat.com/show_bug.cgi?id=2359290
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56406
https://errata.almalinux.org/10/ALSA-2025-7500.html
https://errata.rockylinux.org/RLSA-2025:7500
https://github.com/Perl/perl5/commit/87f42aa0e0096e9a346c9672aa3a0bd3bef8c1dd.patch
https://linux.oracle.com/cve/CVE-2024-56406.html
https://linux.oracle.com/errata/ELSA-2025-7500.html
https://metacpan.org/release/SHAY/perl-5.38.4/changes
https://metacpan.org/release/SHAY/perl-5.40.2/changes
https://nvd.nist.gov/vuln/detail/CVE-2024-56406
https://ubuntu.com/security/notices/USN-7434-1
https://ubuntu.com/security/notices/USN-7434-2
https://www.cve.org/CVERecord?id=CVE-2024-56406
|
| perl-modules-5.36 |
CVE-2025-40909 |
MEDIUM |
5.36.0-7+deb12u1 |
5.36.0-7+deb12u3 |
http://www.openwall.com/lists/oss-security/2025/05/23/1
http://www.openwall.com/lists/oss-security/2025/05/30/4
http://www.openwall.com/lists/oss-security/2025/06/02/2
http://www.openwall.com/lists/oss-security/2025/06/02/5
http://www.openwall.com/lists/oss-security/2025/06/02/6
http://www.openwall.com/lists/oss-security/2025/06/02/7
http://www.openwall.com/lists/oss-security/2025/06/03/1
https://access.redhat.com/errata/RHSA-2025:11805
https://access.redhat.com/security/cve/CVE-2025-40909
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226
https://bugzilla.redhat.com/2369407
https://bugzilla.redhat.com/show_bug.cgi?id=2369407
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40909
https://errata.almalinux.org/8/ALSA-2025-11805.html
https://errata.rockylinux.org/RLSA-2025:11805
https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e
https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch
https://github.com/Perl/perl5/issues/10387
https://github.com/Perl/perl5/issues/23010
https://linux.oracle.com/cve/CVE-2025-40909.html
https://linux.oracle.com/errata/ELSA-2025-12056.html
https://lists.security.metacpan.org/cve-announce/msg/30017499/
https://nvd.nist.gov/vuln/detail/CVE-2025-40909
https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads
https://ubuntu.com/security/notices/USN-7678-1
https://www.cve.org/CVERecord?id=CVE-2025-40909
https://www.openwall.com/lists/oss-security/2025/05/22/2
|
| perl-modules-5.36 |
CVE-2011-4116 |
LOW |
5.36.0-7+deb12u1 |
|
http://www.openwall.com/lists/oss-security/2011/11/04/2
http://www.openwall.com/lists/oss-security/2011/11/04/4
https://access.redhat.com/security/cve/CVE-2011-4116
https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14
https://nvd.nist.gov/vuln/detail/CVE-2011-4116
https://rt.cpan.org/Public/Bug/Display.html?id=69106
https://seclists.org/oss-sec/2011/q4/238
https://www.cve.org/CVERecord?id=CVE-2011-4116
|
| perl-modules-5.36 |
CVE-2023-31486 |
LOW |
5.36.0-7+deb12u1 |
|
http://www.openwall.com/lists/oss-security/2023/04/29/1
http://www.openwall.com/lists/oss-security/2023/05/03/3
http://www.openwall.com/lists/oss-security/2023/05/03/5
http://www.openwall.com/lists/oss-security/2023/05/07/2
https://access.redhat.com/errata/RHSA-2023:7174
https://access.redhat.com/security/cve/CVE-2023-31486
https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/
https://bugzilla.redhat.com/2228392
https://errata.almalinux.org/8/ALSA-2023-7174.html
https://github.com/chansen/p5-http-tiny/pull/153
https://hackeriet.github.io/cpan-http-tiny-overview/
https://linux.oracle.com/cve/CVE-2023-31486.html
https://linux.oracle.com/errata/ELSA-2023-7174.html
https://nvd.nist.gov/vuln/detail/CVE-2023-31486
https://security.netapp.com/advisory/ntap-20241129-0011/
https://www.cve.org/CVERecord?id=CVE-2023-31486
https://www.openwall.com/lists/oss-security/2023/04/18/14
https://www.openwall.com/lists/oss-security/2023/05/03/4
https://www.reddit.com/r/perl/comments/111tadi/psa_httptiny_disabled_ssl_verification_by_default/
|
| procps |
CVE-2023-4016 |
LOW |
2:4.0.2-3 |
|
https://access.redhat.com/errata/RHSA-2023:7187
https://access.redhat.com/security/cve/CVE-2023-4016
https://bugzilla.redhat.com/2228494
https://bugzilla.redhat.com/show_bug.cgi?id=2228494
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4016
https://errata.almalinux.org/8/ALSA-2023-7187.html
https://errata.rockylinux.org/RLSA-2023:7187
https://gitlab.com/procps-ng/procps
https://gitlab.com/procps-ng/procps/-/commit/2c933ecba3bb1d3041a5a7a53a7b4078a6003413
https://gitlab.com/procps-ng/procps/-/issues/297
https://linux.oracle.com/cve/CVE-2023-4016.html
https://linux.oracle.com/errata/ELSA-2023-7187.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/SUETRRT24OFGPYK6ACPM5VUGHNKH5CQ5/
https://nvd.nist.gov/vuln/detail/CVE-2023-4016
https://ubuntu.com/security/notices/USN-6477-1
https://www.cve.org/CVERecord?id=CVE-2023-4016
https://www.freelists.org/post/procps/ps-buffer-overflow-CVE-20234016
|
| python3-uno |
CVE-2012-5639 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://www.openwall.com/lists/oss-security/2012/12/14/1
http://www.openwall.com/lists/oss-security/2023/12/28/6
http://www.openwall.com/lists/oss-security/2024/01/03/6
http://www.openwall.com/lists/oss-security/2024/01/03/7
https://access.redhat.com/security/cve/CVE-2012-5639
https://access.redhat.com/security/cve/cve-2012-5639
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5639
https://lists.apache.org/thread.html/r253f92d0e6511d07a79774002e1d9db1d20b24bff27914a5adb14ccb%40%3Cissues.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2012-5639
https://security-tracker.debian.org/tracker/CVE-2012-5639
https://www.cve.org/CVERecord?id=CVE-2012-5639
|
| python3-uno |
CVE-2018-10583 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://seclists.org/fulldisclosure/2020/Oct/26
http://secureyourit.co.uk/wp/2018/05/01/creating-malicious-odt-files/
https://access.redhat.com/errata/RHSA-2018:3054
https://access.redhat.com/security/cve/CVE-2018-10583
https://lists.apache.org/thread.html/0598708912978b27121b2e380b44a225c706aca882cd1da6a955a0af%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/6c65f22306c36c95e75f8d2b7f49cfcbeb0a4614245c20934612a39d%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/c8fd59ac77b42aac90eb5c59b87f3ab59b5e0c3bfb4819aa649a2909%40%3Cdev.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-10583
https://security-tracker.debian.org/tracker/CVE-2018-10583
https://ubuntu.com/security/notices/USN-3883-1
https://usn.ubuntu.com/3883-1/
https://www.cve.org/CVERecord?id=CVE-2018-10583
https://www.exploit-db.com/exploits/44564/
|
| python3.11 |
CVE-2023-24329 |
HIGH |
3.11.2-6 |
3.11.2-6+deb12u2 |
https://access.redhat.com/errata/RHSA-2023:3811
https://access.redhat.com/security/cve/CVE-2023-24329
https://bugzilla.redhat.com/2173917
https://bugzilla.redhat.com/show_bug.cgi?id=2173917
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24329
https://errata.almalinux.org/8/ALSA-2023-3811.html
https://errata.rockylinux.org/RLSA-2023:3595
https://github.com/python/cpython/issues/102153
https://github.com/python/cpython/pull/99421
https://github.com/python/cpython/pull/99446 (backport for 3.11 branch)
https://linux.oracle.com/cve/CVE-2023-24329.html
https://linux.oracle.com/errata/ELSA-2023-3811.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6PEVICI7YNGGMSL3UCMWGE66QFLATH72/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DSL6NSOAXWBJJ67XPLSSC74MNKZF3BBO/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EM2XLZSTXG44TMFXF4E6VTGKR2MQCW3G/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F2NY75GFDZ5T6YPN44D3VMFT5SUVTOTG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GR5US3BYILYJ4SKBV6YBNPRUBAL5P2CN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H23OSKC6UG6IWOQAUPW74YUHWRWVXJP7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZTLGV2HYFF4AMYJL25VDIGAIHCU7UPA/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LWC4WGXER5P6Q75RFGL7QUTPP3N5JR7T/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZEHSXSCMA4WWQKXT6QV7AAR6SWNZ2VP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O5SP4RT3RRS434ZS2HQKQJ3VZW7YPKYR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OHHJHJRLEF3TDT2K3676CAUVRDD4CCMR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEUN6T22UJFXR7J5F6UUHCXXPKJ2DVHI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PURM5CFDABEWAIWZFD2MQ7ZJGCPYSQ44/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q3J5N24ECS4B6MJDRO6UAYU6GPLYBDCL/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QRQHN7RWJQJHYP6E5EKESOYP5VDSHZG4/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RA2MBEEES6L46OD64OBSVUUMGKNGMOWW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4IDB5OAR5Y4UK3HLMZBW4WEL2B7YFMJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TZH26JGNZ5XYPZ5SAU3NKSBSPRE5OHTG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U2MZOJYGFCB5PPT6AKMAU72N7QOYWLBP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UONZWLB4QVLQIY5CPDLEUEKH6WX4VQMC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WTOAUJNDWZDRWVSXJ354AYZYKRMT56HU/
https://nvd.nist.gov/vuln/detail/CVE-2023-24329
https://pointernull.com/security/python-url-parse-problem.html
https://security.netapp.com/advisory/ntap-20230324-0004/
https://ubuntu.com/security/notices/USN-5888-1
https://ubuntu.com/security/notices/USN-5960-1
https://ubuntu.com/security/notices/USN-6139-1
https://ubuntu.com/security/notices/USN-6891-1
https://ubuntu.com/security/notices/USN-7180-1
https://www.cve.org/CVERecord?id=CVE-2023-24329
https://www.kb.cert.org/vuls/id/127587
|
| python3.11 |
CVE-2023-41105 |
HIGH |
3.11.2-6 |
3.11.2-6+deb12u2 |
https://access.redhat.com/errata/RHSA-2023:7024
https://access.redhat.com/security/cve/CVE-2023-41105
https://bugzilla.redhat.com/2235795
https://bugzilla.redhat.com/263261
https://errata.almalinux.org/8/ALSA-2023-7024.html
https://github.com/python/cpython/issues/106242
https://github.com/python/cpython/pull/107981
https://github.com/python/cpython/pull/107982
https://github.com/python/cpython/pull/107983
https://linux.oracle.com/cve/CVE-2023-41105.html
https://linux.oracle.com/errata/ELSA-2023-7024.html
https://mail.python.org/archives/list/security-announce%40python.org/thread/D6CDW3ZZC5D444YGL3VQUY6D4ECMCQLD/
https://mail.python.org/archives/list/[email protected]/thread/D6CDW3ZZC5D444YGL3VQUY6D4ECMCQLD/
https://nvd.nist.gov/vuln/detail/CVE-2023-41105
https://security.netapp.com/advisory/ntap-20231006-0015/
https://ubuntu.com/security/notices/USN-6547-1
https://ubuntu.com/security/notices/USN-6891-1
https://www.cve.org/CVERecord?id=CVE-2023-41105
|
| python3.11 |
CVE-2023-6597 |
HIGH |
3.11.2-6 |
3.11.2-6+deb12u2 |
http://www.openwall.com/lists/oss-security/2024/03/20/5
https://access.redhat.com/errata/RHSA-2024:4058
https://access.redhat.com/security/cve/CVE-2023-6597
https://bugzilla.redhat.com/2276518
https://bugzilla.redhat.com/2276525
https://bugzilla.redhat.com/show_bug.cgi?id=2276518
https://bugzilla.redhat.com/show_bug.cgi?id=2276525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6597
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0450
https://discuss.python.org/t/python-3-10-14-3-9-19-and-3-8-19-is-now-available/48993
https://errata.almalinux.org/8/ALSA-2024-4058.html
https://errata.rockylinux.org/RLSA-2024:4078
https://github.com/advisories/GHSA-797f-63wg-8chv
https://github.com/python/cpython/commit/02a9259c717738dfe6b463c44d7e17f2b6d2cb3a
https://github.com/python/cpython/commit/5585334d772b253a01a6730e8202ffb1607c3d25
https://github.com/python/cpython/commit/6ceb8aeda504b079fef7a57b8d81472f15cdd9a5
https://github.com/python/cpython/commit/81c16cd94ec38d61aa478b9a452436dc3b1b524d
https://github.com/python/cpython/commit/8eaeefe49d179ca4908d052745e3bb8b6f238f82
https://github.com/python/cpython/commit/d54e22a669ae6e987199bb5d2c69bb5a46b0083b
https://github.com/python/cpython/issues/91133
https://linux.oracle.com/cve/CVE-2023-6597.html
https://linux.oracle.com/errata/ELSA-2024-4078.html
https://lists.debian.org/debian-lts-announce/2024/03/msg00025.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/T3IGRX54M7RNCQOXVQO5KQKTGWCOABIM/
https://lists.fedoraproject.org/archives/list/[email protected]/message/U5VHWS52HGD743C47UMCSAK2A773M2YE/
https://mail.python.org/archives/list/[email protected]/thread/Q5C6ATFC67K53XFV4KE45325S7NS62LD/
https://nvd.nist.gov/vuln/detail/CVE-2023-6597
https://seclists.org/oss-sec/2024/q1/240
https://ubuntu.com/security/notices/USN-6891-1
https://www.cve.org/CVERecord?id=CVE-2023-6597
|
| python3.11 |
CVE-2024-6232 |
HIGH |
3.11.2-6 |
3.11.2-6+deb12u4 |
http://www.openwall.com/lists/oss-security/2024/09/03/5
https://access.redhat.com/errata/RHSA-2024:8838
https://access.redhat.com/security/cve/CVE-2024-6232
https://bugzilla.redhat.com/2309426
https://bugzilla.redhat.com/show_bug.cgi?id=2309426
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6232
https://errata.almalinux.org/8/ALSA-2024-8838.html
https://errata.rockylinux.org/RLSA-2024:8446
https://github.com/python/cpython/commit/34ddb64d088dd7ccc321f6103d23153256caa5d4
https://github.com/python/cpython/commit/4eaf4891c12589e3c7bdad5f5b076e4c8392dd06
https://github.com/python/cpython/commit/743acbe872485dc18df4d8ab2dc7895187f062c4
https://github.com/python/cpython/commit/7d1f50cd92ff7e10a1c15a8f591dde8a6843a64d
https://github.com/python/cpython/commit/b4225ca91547aa97ed3aca391614afbb255bc877
https://github.com/python/cpython/commit/d449caf8a179e3b954268b3a88eb9170be3c8fbf
https://github.com/python/cpython/commit/ed3a49ea734ada357ff4442996fd4ae71d253373
https://github.com/python/cpython/issues/121285
https://github.com/python/cpython/pull/121286
https://linux.oracle.com/cve/CVE-2024-6232.html
https://linux.oracle.com/errata/ELSA-2025-1750.html
https://mail.python.org/archives/list/[email protected]/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/
https://nvd.nist.gov/vuln/detail/CVE-2024-6232
https://security.netapp.com/advisory/ntap-20241018-0007/
https://ubuntu.com/security/notices/USN-7015-1
https://ubuntu.com/security/notices/USN-7015-2
https://ubuntu.com/security/notices/USN-7015-5
https://ubuntu.com/security/notices/USN-7488-1
https://www.cve.org/CVERecord?id=CVE-2024-6232
|
| python3.11 |
CVE-2024-7592 |
HIGH |
3.11.2-6 |
3.11.2-6+deb12u5 |
https://access.redhat.com/errata/RHSA-2025:3634
https://access.redhat.com/security/cve/CVE-2024-7592
https://errata.almalinux.org/9/ALSA-2025-3634.html
https://github.com/python/cpython/commit/391e5626e3ee5af267b97e37abc7475732e67621
https://github.com/python/cpython/commit/44e458357fca05ca0ae2658d62c8c595b048b5ef
https://github.com/python/cpython/commit/a77ab24427a18bff817025adb03ca920dc3f1a06
https://github.com/python/cpython/commit/b2f11ca7667e4d57c71c1c88b255115f16042d9a
https://github.com/python/cpython/commit/d4ac921a4b081f7f996a5d2b101684b67ba0ed7f
https://github.com/python/cpython/commit/d662e2db2605515a767f88ad48096b8ac623c774
https://github.com/python/cpython/commit/dcc3eaef98cd94d6cb6cb0f44bd1c903d04f33b1
https://github.com/python/cpython/issues/123067
https://github.com/python/cpython/pull/123075
https://linux.oracle.com/cve/CVE-2024-7592.html
https://linux.oracle.com/errata/ELSA-2025-3634.html
https://mail.python.org/archives/list/[email protected]/thread/HXJAAAALNUNGCQUS2W7WR6GFIZIHFOOK/
https://nvd.nist.gov/vuln/detail/CVE-2024-7592
https://security.netapp.com/advisory/ntap-20241018-0006/
https://ubuntu.com/security/notices/USN-7015-1
https://ubuntu.com/security/notices/USN-7015-2
https://www.cve.org/CVERecord?id=CVE-2024-7592
|
| python3.11 |
CVE-2024-9287 |
HIGH |
3.11.2-6 |
3.11.2-6+deb12u5 |
https://access.redhat.com/errata/RHSA-2024:10980
https://access.redhat.com/security/cve/CVE-2024-9287
https://bugzilla.redhat.com/2321440
https://bugzilla.redhat.com/2330804
https://bugzilla.redhat.com/show_bug.cgi?id=2321440
https://bugzilla.redhat.com/show_bug.cgi?id=2325776
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11168
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9287
https://errata.almalinux.org/8/ALSA-2024-10980.html
https://errata.rockylinux.org/RLSA-2024:10779
https://github.com/python/cpython/commit/633555735a023d3e4d92ba31da35b1205f9ecbd7
https://github.com/python/cpython/commit/8450b2482586857d689b6658f08de9c8179af7db
https://github.com/python/cpython/commit/9286ab3a107ea41bd3f3c3682ce2512692bdded8
https://github.com/python/cpython/commit/ae961ae94bf19c8f8c7fbea3d1c25cc55ce8ae97
https://github.com/python/cpython/commit/d48cc82ed25e26b02eb97c6263d95dcaa1e9111b
https://github.com/python/cpython/commit/e52095a0c1005a87eed2276af7a1f2f66e2b6483
https://github.com/python/cpython/issues/124651
https://github.com/python/cpython/pull/124712
https://github.com/python/cpython/pull/124712/commits/b6a3bbd155c558cdcda482629073e492437db3d0
https://linux.oracle.com/cve/CVE-2024-9287.html
https://linux.oracle.com/errata/ELSA-2024-11111.html
https://mail.python.org/archives/list/[email protected]/thread/RSPJ2B5JL22FG3TKUJ7D7DQ4N5JRRBZL/
https://nvd.nist.gov/vuln/detail/CVE-2024-9287
https://security.netapp.com/advisory/ntap-20250425-0006/
https://ubuntu.com/security/notices/USN-7116-1
https://ubuntu.com/security/notices/USN-7348-1
https://ubuntu.com/security/notices/USN-7488-1
https://www.cve.org/CVERecord?id=CVE-2024-9287
|
| python3.11 |
CVE-2025-8194 |
HIGH |
3.11.2-6 |
|
https://access.redhat.com/errata/RHSA-2025:14900
https://access.redhat.com/security/cve/CVE-2025-8194
https://bugzilla.redhat.com/2366982
https://bugzilla.redhat.com/2384043
https://bugzilla.redhat.com/show_bug.cgi?id=2384043
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8194
https://errata.almalinux.org/8/ALSA-2025-14900.html
https://errata.rockylinux.org/RLSA-2025:14841
https://gist.github.com/sethmlarson/1716ac5b82b73dbcbf23ad2eff8b33e1
https://github.com/python/cpython/commit/57f5981d6260ed21266e0c26951b8564cc252bc2
https://github.com/python/cpython/commit/7040aa54f14676938970e10c5f74ea93cd56aa38
https://github.com/python/cpython/commit/73f03e4808206f71eb6b92c579505a220942ef19
https://github.com/python/cpython/commit/b4ec17488eedec36d3c05fec127df71c0071f6cb
https://github.com/python/cpython/commit/c9d9f78feb1467e73fd29356c040bde1c104f29f
https://github.com/python/cpython/commit/cdae923ffe187d6ef916c0f665a31249619193fe
https://github.com/python/cpython/commit/fbc2a0ca9ac8aff6887f8ddf79b87b4510277227
https://github.com/python/cpython/issues/130577
https://github.com/python/cpython/pull/137027
https://linux.oracle.com/cve/CVE-2025-8194.html
https://linux.oracle.com/errata/ELSA-2025-16117.html
https://mail.python.org/archives/list/[email protected]/thread/ZULLF3IZ726XP5EY7XJ7YIN3K5MDYR2D/
https://nvd.nist.gov/vuln/detail/CVE-2025-8194
https://ubuntu.com/security/notices/USN-7710-1
https://ubuntu.com/security/notices/USN-7710-2
https://www.cve.org/CVERecord?id=CVE-2025-8194
|
| python3.11 |
CVE-2023-27043 |
MEDIUM |
3.11.2-6 |
3.11.2-6+deb12u5 |
http://python.org
https://access.redhat.com/articles/7051467
https://access.redhat.com/errata/RHSA-2024:3062
https://access.redhat.com/security/cve/CVE-2023-27043
https://bugzilla.redhat.com/2196183
https://bugzilla.redhat.com/show_bug.cgi?id=2196183
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27043
https://errata.almalinux.org/8/ALSA-2024-3062.html
https://errata.rockylinux.org/RLSA-2024:0256
https://github.com/python/cpython/issues/102988
https://github.com/python/cpython/pull/102990
https://github.com/python/cpython/pull/105127
https://linux.oracle.com/cve/CVE-2023-27043.html
https://linux.oracle.com/errata/ELSA-2024-3062.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZAEFSFZDNBNJPNOUTLG5COISGQDLMGV/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/75DTHSTNOFFNAWHXKMDXS7EJWC6W2FUC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ARI7VDSNTQVXRQFM6IK5GSSLEIYV4VZH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BQAKLUJMHFGVBRDPEY57BJGNCE5UUPHW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HXYVPEZUA3465AEFX5JVFVP7KIFZMF3N/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6M5I6OQHJABNEYY555HUMMKX3Y4P25Z/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NEUNZSZ3CVSM2QWVYH3N2XGOCDWNYUA3/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORLXS5YTKN65E2Q2NWKXMFS5FWQHRNZW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2MAICLFDDO3QVNHTZ2OCERZQ34R2PIC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2W2BZQIHMCKRI5FNBJERFYMS5PK6TAH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PHVGRKQAGANCSGFI3QMYOCIMS4IFOZA5/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU6Y2S5CBN5BWCBDAJFTGIBZLK3S2G3J/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QDRDDPDN3VFIYXJIYEABY6USX5EU66AG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDDC2VOX7OQC6OHMYTVD4HLFZIV6PYBC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SINP4OVYNB2AGDYI2GS37EMW3H3F7XPZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SOX7BCN6YL7B3RFPEEXPIU5CMTEHJOKR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZXC32CJ7TWDPJO6GY2XIQRO7JZX5FLP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWMBD4LNHWEXRI6YVFWJMTJQUL5WOFTS/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YQVY5C5REXWJIORJIL2FIL3ALOEJEF72/
https://lists.fedoraproject.org/archives/list/[email protected]/message/4ZAEFSFZDNBNJPNOUTLG5COISGQDLMGV/
https://lists.fedoraproject.org/archives/list/[email protected]/message/75DTHSTNOFFNAWHXKMDXS7EJWC6W2FUC/
https://lists.fedoraproject.org/archives/list/[email protected]/message/ARI7VDSNTQVXRQFM6IK5GSSLEIYV4VZH/
https://lists.fedoraproject.org/archives/list/[email protected]/message/BQAKLUJMHFGVBRDPEY57BJGNCE5UUPHW/
https://lists.fedoraproject.org/archives/list/[email protected]/message/HXYVPEZUA3465AEFX5JVFVP7KIFZMF3N/
https://lists.fedoraproject.org/archives/list/[email protected]/message/N6M5I6OQHJABNEYY555HUMMKX3Y4P25Z/
https://lists.fedoraproject.org/archives/list/[email protected]/message/NEUNZSZ3CVSM2QWVYH3N2XGOCDWNYUA3/
https://lists.fedoraproject.org/archives/list/[email protected]/message/ORLXS5YTKN65E2Q2NWKXMFS5FWQHRNZW/
https://lists.fedoraproject.org/archives/list/[email protected]/message/P2MAICLFDDO3QVNHTZ2OCERZQ34R2PIC/
https://lists.fedoraproject.org/archives/list/[email protected]/message/P2W2BZQIHMCKRI5FNBJERFYMS5PK6TAH/
https://lists.fedoraproject.org/archives/list/[email protected]/message/PHVGRKQAGANCSGFI3QMYOCIMS4IFOZA5/
https://lists.fedoraproject.org/archives/list/[email protected]/message/PU6Y2S5CBN5BWCBDAJFTGIBZLK3S2G3J/
https://lists.fedoraproject.org/archives/list/[email protected]/message/QDRDDPDN3VFIYXJIYEABY6USX5EU66AG/
https://lists.fedoraproject.org/archives/list/[email protected]/message/RDDC2VOX7OQC6OHMYTVD4HLFZIV6PYBC/
https://lists.fedoraproject.org/archives/list/[email protected]/message/SINP4OVYNB2AGDYI2GS37EMW3H3F7XPZ/
https://lists.fedoraproject.org/archives/list/[email protected]/message/VZXC32CJ7TWDPJO6GY2XIQRO7JZX5FLP/
https://lists.fedoraproject.org/archives/list/[email protected]/message/XWMBD4LNHWEXRI6YVFWJMTJQUL5WOFTS/
https://lists.fedoraproject.org/archives/list/[email protected]/message/YQVY5C5REXWJIORJIL2FIL3ALOEJEF72/
https://nvd.nist.gov/vuln/detail/CVE-2023-27043
https://python-security.readthedocs.io/vuln/email-parseaddr-realname.html
https://security.netapp.com/advisory/ntap-20230601-0003/
https://ubuntu.com/security/notices/USN-7015-1
https://ubuntu.com/security/notices/USN-7015-3
https://ubuntu.com/security/notices/USN-7015-4
https://ubuntu.com/security/notices/USN-7015-7
https://www.cve.org/CVERecord?id=CVE-2023-27043
|
| python3.11 |
CVE-2023-40217 |
MEDIUM |
3.11.2-6 |
3.11.2-6+deb12u2 |
https://access.redhat.com/errata/RHSA-2023:5998
https://access.redhat.com/security/cve/CVE-2023-40217
https://bugzilla.redhat.com/2235789
https://bugzilla.redhat.com/show_bug.cgi?id=2235789
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40217
https://errata.almalinux.org/8/ALSA-2023-5998.html
https://errata.rockylinux.org/RLSA-2023:5997
https://github.com/python/cpython/commit/0cb0c238d520a8718e313b52cffc356a5a7561bf (main)
https://github.com/python/cpython/commit/256586ab8776e4526ca594b4866b9a3492e628f1 (3.12)
https://github.com/python/cpython/commit/264b1dacc67346efa0933d1e63f622676e0ed96b (3.9)
https://github.com/python/cpython/commit/37d7180cb647f0bed0c1caab0037f3bc82e2af96 (3.10)
https://github.com/python/cpython/commit/75a875e0df0530b75b1470d797942f90f4a718d3 (3.11)
https://github.com/python/cpython/issues/108310
https://github.com/python/cpython/pull/108315
https://linux.oracle.com/cve/CVE-2023-40217.html
https://linux.oracle.com/errata/ELSA-2023-6885.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html
https://mail.python.org/archives/list/security-announce%40python.org/thread/PEPLII27KYHLF4AK3ZQGKYNCRERG4YXY/
https://mail.python.org/archives/list/[email protected]/thread/PEPLII27KYHLF4AK3ZQGKYNCRERG4YXY/
https://nvd.nist.gov/vuln/detail/CVE-2023-40217
https://security.netapp.com/advisory/ntap-20231006-0014/
https://ubuntu.com/security/notices/USN-6513-1
https://ubuntu.com/security/notices/USN-6513-2
https://ubuntu.com/security/notices/USN-6891-1
https://ubuntu.com/security/notices/USN-7180-1
https://www.cve.org/CVERecord?id=CVE-2023-40217
https://www.python.org/dev/security/
|
| python3.11 |
CVE-2024-0397 |
MEDIUM |
3.11.2-6 |
3.11.2-6+deb12u3 |
http://www.openwall.com/lists/oss-security/2024/06/17/2
https://access.redhat.com/security/cve/CVE-2024-0397
https://github.com/python/cpython/commit/01c37f1d0714f5822d34063ca7180b595abf589d
https://github.com/python/cpython/commit/29c97287d205bf2f410f4895ebce3f43b5160524
https://github.com/python/cpython/commit/37324b421b72b7bc9934e27aba85d48d4773002e
https://github.com/python/cpython/commit/542f3272f56f31ed04e74c40635a913fbc12d286
https://github.com/python/cpython/commit/b228655c227b2ca298a8ffac44d14ce3d22f6faa
https://github.com/python/cpython/commit/bce693111bff906ccf9281c22371331aaff766ab
https://github.com/python/cpython/commit/bce693111bff906ccf9281c22371331aaff766ab (3.13)
https://github.com/python/cpython/issues/114572
https://github.com/python/cpython/pull/114573
https://mail.python.org/archives/list/[email protected]/thread/BMAK5BCGKYWNJOACVUSLUF6SFGBIM4VP/
https://nvd.nist.gov/vuln/detail/CVE-2024-0397
https://security.netapp.com/advisory/ntap-20250411-0006/
https://ubuntu.com/security/notices/USN-6928-1
https://www.cve.org/CVERecord?id=CVE-2024-0397
|
| python3.11 |
CVE-2024-0450 |
MEDIUM |
3.11.2-6 |
3.11.2-6+deb12u2 |
http://www.openwall.com/lists/oss-security/2024/03/20/5
https://access.redhat.com/errata/RHSA-2024:4243
https://access.redhat.com/security/cve/CVE-2024-0450
https://bugzilla.redhat.com/2276525
https://bugzilla.redhat.com/show_bug.cgi?id=2276518
https://bugzilla.redhat.com/show_bug.cgi?id=2276525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6597
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0450
https://discuss.python.org/t/python-3-10-14-3-9-19-and-3-8-19-is-now-available/48993
https://errata.almalinux.org/8/ALSA-2024-4243.html
https://errata.rockylinux.org/RLSA-2024:4078
https://github.com/python/cpython/commit/30fe5d853b56138dbec62432d370a1f99409fc85
https://github.com/python/cpython/commit/66363b9a7b9fe7c99eba3a185b74c5fdbf842eba
https://github.com/python/cpython/commit/70497218351ba44bffc8b571201ecb5652d84675
https://github.com/python/cpython/commit/a2c59992e9e8d35baba9695eb186ad6c6ff85c51
https://github.com/python/cpython/commit/a956e510f6336d5ae111ba429a61c3ade30a7549
https://github.com/python/cpython/commit/d05bac0b74153beb541b88b4fca33bf053990183
https://github.com/python/cpython/commit/fa181fcf2156f703347b03a3b1966ce47be8ab3b
https://github.com/python/cpython/issues/109858
https://linux.oracle.com/cve/CVE-2024-0450.html
https://linux.oracle.com/errata/ELSA-2024-9192.html
https://lists.debian.org/debian-lts-announce/2024/03/msg00024.html
https://lists.debian.org/debian-lts-announce/2024/03/msg00025.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/T3IGRX54M7RNCQOXVQO5KQKTGWCOABIM/
https://lists.fedoraproject.org/archives/list/[email protected]/message/U5VHWS52HGD743C47UMCSAK2A773M2YE/
https://mail.python.org/archives/list/[email protected]/thread/XELNUX2L3IOHBTFU7RQHCY6OUVEWZ2FG/
https://nvd.nist.gov/vuln/detail/CVE-2024-0450
https://seclists.org/oss-sec/2024/q1/240
https://security.netapp.com/advisory/ntap-20250411-0005/
https://ubuntu.com/security/notices/USN-6891-1
https://ubuntu.com/security/notices/USN-7212-1
https://www.bamsoftware.com/hacks/zipbomb/
https://www.cve.org/CVERecord?id=CVE-2024-0450
|
| python3.11 |
CVE-2024-6923 |
MEDIUM |
3.11.2-6 |
3.11.2-6+deb12u5 |
http://www.openwall.com/lists/oss-security/2024/08/01/3
http://www.openwall.com/lists/oss-security/2024/08/02/2
https://access.redhat.com/errata/RHSA-2024:6975
https://access.redhat.com/security/cve/CVE-2024-6923
https://bugzilla.redhat.com/2292921
https://bugzilla.redhat.com/2302255
https://bugzilla.redhat.com/2309426
https://bugzilla.redhat.com/show_bug.cgi?id=2302255
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6923
https://errata.almalinux.org/8/ALSA-2024-6975.html
https://errata.rockylinux.org/RLSA-2024:6146
https://github.com/python/cpython/commit/06f28dc236708f72871c64d4bc4b4ea144c50147
https://github.com/python/cpython/commit/097633981879b3c9de9a1dd120d3aa585ecc2384
https://github.com/python/cpython/commit/4766d1200fdf8b6728137aa2927a297e224d5fa7
https://github.com/python/cpython/commit/4aaa4259b5a6e664b7316a4d60bdec7ee0f124d0
https://github.com/python/cpython/commit/b158a76ce094897c870fb6b3de62887b7ccc33f1
https://github.com/python/cpython/commit/f7be505d137a22528cb0fc004422c0081d5d90e6
https://github.com/python/cpython/commit/f7c0f09e69e950cf3c5ada9dbde93898eb975533
https://github.com/python/cpython/issues/121650
https://github.com/python/cpython/pull/122233
https://linux.oracle.com/cve/CVE-2024-6923.html
https://linux.oracle.com/errata/ELSA-2024-6975.html
https://lists.debian.org/debian-lts-announce/2025/01/msg00005.html
https://mail.python.org/archives/list/[email protected]/thread/QH3BUOE2DYQBWP7NAQ7UNHPPOELKISRW/
https://nvd.nist.gov/vuln/detail/CVE-2024-6923
https://security.netapp.com/advisory/ntap-20240926-0003/
https://ubuntu.com/security/notices/USN-7015-1
https://ubuntu.com/security/notices/USN-7015-5
https://www.cve.org/CVERecord?id=CVE-2024-6923
|
| python3.11 |
CVE-2024-8088 |
MEDIUM |
3.11.2-6 |
3.11.2-6+deb12u3 |
http://www.openwall.com/lists/oss-security/2024/08/22/1
http://www.openwall.com/lists/oss-security/2024/08/22/4
http://www.openwall.com/lists/oss-security/2024/08/23/1
http://www.openwall.com/lists/oss-security/2024/08/23/2
https://access.redhat.com/errata/RHSA-2024:6962
https://access.redhat.com/security/cve/CVE-2024-8088
https://bugzilla.redhat.com/2292921
https://bugzilla.redhat.com/2302255
https://bugzilla.redhat.com/2307370
https://bugzilla.redhat.com/show_bug.cgi?id=2292921
https://bugzilla.redhat.com/show_bug.cgi?id=2302255
https://bugzilla.redhat.com/show_bug.cgi?id=2307370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6923
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8088
https://errata.almalinux.org/8/ALSA-2024-6962.html
https://errata.rockylinux.org/RLSA-2024:6962
https://github.com/python/cpython/commit/0aa1ee22ab6e204e9d3d0e9dd63ea648ed691ef1
https://github.com/python/cpython/commit/2231286d78d328c2f575e0b05b16fe447d1656d6
https://github.com/python/cpython/commit/795f2597a4be988e2bb19b69ff9958e981cb894e
https://github.com/python/cpython/commit/7bc367e464ce50b956dd232c1dfa1cad4e7fb814
https://github.com/python/cpython/commit/7e8883a3f04d308302361aeffc73e0e9837f19d4
https://github.com/python/cpython/commit/8c7348939d8a3ecd79d630075f6be1b0c5b41f64
https://github.com/python/cpython/commit/95b073bddefa6243effa08e131e297c0383e7f6a
https://github.com/python/cpython/commit/962055268ed4f2ca1d717bfc8b6385de50a23ab7
https://github.com/python/cpython/commit/9cd03263100ddb1657826cc4a71470786cab3932
https://github.com/python/cpython/commit/dcc5182f27c1500006a1ef78e10613bb45788dea
https://github.com/python/cpython/commit/e0264a61119d551658d9445af38323ba94fc16db
https://github.com/python/cpython/commit/fc0b8259e693caa8400fa8b6ac1e494e47ea7798
https://github.com/python/cpython/issues/122905
https://github.com/python/cpython/issues/123270
https://github.com/python/cpython/pull/122906
https://linux.oracle.com/cve/CVE-2024-8088.html
https://linux.oracle.com/errata/ELSA-2024-9371.html
https://mail.python.org/archives/list/[email protected]/thread/GNFCKVI4TCATKQLALJ5SN4L4CSPSMILU/
https://nvd.nist.gov/vuln/detail/CVE-2024-8088
https://security.netapp.com/advisory/ntap-20241011-0010/
https://ubuntu.com/security/notices/USN-7015-1
https://www.cve.org/CVERecord?id=CVE-2024-8088
|
| python3.11 |
CVE-2025-0938 |
MEDIUM |
3.11.2-6 |
3.11.2-6+deb12u6 |
https://access.redhat.com/errata/RHSA-2025:7109
https://access.redhat.com/security/cve/CVE-2025-0938
https://bugzilla.redhat.com/2343237
https://errata.almalinux.org/9/ALSA-2025-7109.html
https://github.com/python/cpython/commit/526617ed68cde460236c973e5d0a8bad4de896ba
https://github.com/python/cpython/commit/90e526ae67b172ed7c6c56e7edad36263b0f9403
https://github.com/python/cpython/commit/a7084f6075c9595ba60119ce8c62f1496f50c568
https://github.com/python/cpython/commit/b8b4b713c5f8ec0958c7ef8d29d6711889bc94ab
https://github.com/python/cpython/commit/d89a5f6a6e65511a5f6e0618c4c30a7aa5aba56a
https://github.com/python/cpython/commit/ff4e5c25666f63544071a6b075ae8b25c98b7a32
https://github.com/python/cpython/issues/105704
https://github.com/python/cpython/pull/129418
https://linux.oracle.com/cve/CVE-2025-0938.html
https://linux.oracle.com/errata/ELSA-2025-7109.html
https://mail.python.org/archives/list/[email protected]/thread/K4EUG6EKV6JYFIC24BASYOZS4M5XOQIB/
https://nvd.nist.gov/vuln/detail/CVE-2025-0938
https://security.netapp.com/advisory/ntap-20250314-0002/
https://ubuntu.com/security/notices/USN-7280-1
https://ubuntu.com/security/notices/USN-7280-2
https://ubuntu.com/security/notices/USN-7280-3
https://ubuntu.com/security/notices/USN-7348-1
https://ubuntu.com/security/notices/USN-7348-2
https://www.cve.org/CVERecord?id=CVE-2025-0938
|
| python3.11 |
CVE-2025-4516 |
MEDIUM |
3.11.2-6 |
|
http://www.openwall.com/lists/oss-security/2025/05/16/4
http://www.openwall.com/lists/oss-security/2025/05/19/1
https://access.redhat.com/security/cve/CVE-2025-4516
https://github.com/python/cpython/commit/4398b788ffc1f954a2c552da285477d42a571292
https://github.com/python/cpython/commit/5646648678295a44aa82636c6e92826651baf33a
https://github.com/python/cpython/commit/6279eb8c076d89d3739a6edb393e43c7929b429d
https://github.com/python/cpython/commit/69b4387f78f413e8c47572a85b3478c47eba8142
https://github.com/python/cpython/commit/73b3040f592436385007918887b7e2132aa8431f
https://github.com/python/cpython/commit/8d35fd1b34935221aff23a1ab69a429dd156be77
https://github.com/python/cpython/commit/9f69a58623bd01349a18ba0c7a9cb1dad6a51e8e
https://github.com/python/cpython/commit/9f69a58623bd01349a18ba0c7a9cb1dad6a51e8e (main)
https://github.com/python/cpython/commit/ab9893c40609935e0d40a6d2a7307ea51aec598b
https://github.com/python/cpython/issues/133767
https://github.com/python/cpython/pull/129648
https://mail.python.org/archives/list/[email protected]/thread/L75IPBBTSCYEF56I2M4KIW353BB3AY74/
https://nvd.nist.gov/vuln/detail/CVE-2025-4516
https://ubuntu.com/security/notices/USN-7570-1
https://www.cve.org/CVERecord?id=CVE-2025-4516
|
| python3.11 |
CVE-2025-6069 |
MEDIUM |
3.11.2-6 |
|
https://access.redhat.com/security/cve/CVE-2025-6069
https://github.com/python/cpython/commit/4455cbabf991e202185a25a631af206f60bbc949
https://github.com/python/cpython/commit/6eb6c5dbfb528bd07d77b60fd71fd05d81d45c41
https://github.com/python/cpython/commit/6eb6c5dbfb528bd07d77b60fd71fd05d81d45c41 (main)
https://github.com/python/cpython/commit/8d1b3dfa09135affbbf27fb8babcf3c11415df49
https://github.com/python/cpython/commit/ab0893fd5c579d9cea30841680e6d35fc478afb5
https://github.com/python/cpython/commit/d851f8e258c7328814943e923a7df81bca15df4b
https://github.com/python/cpython/commit/f3c6f882cddc8dc30320d2e73edf019e201394fc
https://github.com/python/cpython/commit/fdc9d214c01cb4588f540cfa03726bbf2a33fc15
https://github.com/python/cpython/issues/135462
https://github.com/python/cpython/pull/135464
https://mail.python.org/archives/list/[email protected]/thread/K5PIYLR6EP3WR7ZOKKYQUWEDNQVUXOYM/
https://nvd.nist.gov/vuln/detail/CVE-2025-6069
https://ubuntu.com/security/notices/USN-7710-1
https://www.cve.org/CVERecord?id=CVE-2025-6069
|
| python3.11 |
CVE-2025-8291 |
MEDIUM |
3.11.2-6 |
|
https://access.redhat.com/security/cve/CVE-2025-8291
https://github.com/python/cpython/commit/162997bb70e067668c039700141770687bc8f267
https://github.com/python/cpython/commit/1d29afb0d6218aa8fb5e1e4a6133a4778d89bb46
https://github.com/python/cpython/commit/333d4a6f4967d3ace91492a39ededbcf3faa76a6
https://github.com/python/cpython/commit/76437ac248ad8ca44e9bf697b02b1e2241df2196
https://github.com/python/cpython/commit/8392b2f0d35678407d9ce7d95655a5b77de161b4
https://github.com/python/cpython/commit/bca11ae7d575d87ed93f5dd6a313be6246e3e388
https://github.com/python/cpython/commit/d11e69d6203080e3ec450446bfed0516727b85c3
https://github.com/python/cpython/issues/139700
https://github.com/python/cpython/pull/139702
https://mail.python.org/archives/list/[email protected]/thread/QECOPWMTH4VPPJAXAH2BGTA4XADOP62G/
https://nvd.nist.gov/vuln/detail/CVE-2025-8291
https://www.cve.org/CVERecord?id=CVE-2025-8291
|
| python3.11 |
CVE-2024-11168 |
LOW |
3.11.2-6 |
3.11.2-6+deb12u5 |
https://access.redhat.com/errata/RHSA-2024:10779
https://access.redhat.com/security/cve/CVE-2024-11168
https://bugzilla.redhat.com/2321440
https://bugzilla.redhat.com/2325776
https://bugzilla.redhat.com/show_bug.cgi?id=2321440
https://bugzilla.redhat.com/show_bug.cgi?id=2325776
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11168
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9287
https://errata.almalinux.org/8/ALSA-2024-10779.html
https://errata.rockylinux.org/RLSA-2024:10779
https://github.com/python/cpython/commit/29f348e232e82938ba2165843c448c2b291504c5
https://github.com/python/cpython/commit/634ded45545ce8cbd6fd5d49785613dd7fa9b89e
https://github.com/python/cpython/commit/b2171a2fd41416cf68afd67460578631d755a550
https://github.com/python/cpython/commit/ddca2953191c67a12b1f19d6bca41016c6ae7132
https://github.com/python/cpython/issues/103848
https://github.com/python/cpython/pull/103849
https://linux.oracle.com/cve/CVE-2024-11168.html
https://linux.oracle.com/errata/ELSA-2024-10983.html
https://mail.python.org/archives/list/[email protected]/thread/XPWB6XVZ5G5KGEI63M4AWLIEUF5BPH4T/
https://nvd.nist.gov/vuln/detail/CVE-2024-11168
https://security.netapp.com/advisory/ntap-20250411-0004/
https://ubuntu.com/security/notices/USN-7218-1
https://ubuntu.com/security/notices/USN-7280-3
https://ubuntu.com/security/notices/USN-7348-1
https://ubuntu.com/security/notices/USN-7488-1
https://www.cve.org/CVERecord?id=CVE-2024-11168
|
| python3.11 |
CVE-2024-4032 |
LOW |
3.11.2-6 |
3.11.2-6+deb12u3 |
http://www.openwall.com/lists/oss-security/2024/06/17/3
https://access.redhat.com/errata/RHSA-2024:6975
https://access.redhat.com/security/cve/CVE-2024-4032
https://bugzilla.redhat.com/2292921
https://bugzilla.redhat.com/2302255
https://bugzilla.redhat.com/2309426
https://bugzilla.redhat.com/show_bug.cgi?id=2292921
https://bugzilla.redhat.com/show_bug.cgi?id=2302255
https://bugzilla.redhat.com/show_bug.cgi?id=2309426
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6923
https://errata.almalinux.org/8/ALSA-2024-6975.html
https://errata.rockylinux.org/RLSA-2024:6975
https://github.com/advisories/GHSA-mh6q-v4mp-2cc7
https://github.com/python/cpython/commit/22adf29da8d99933ffed8647d3e0726edd16f7f8
https://github.com/python/cpython/commit/40d75c2b7f5c67e254d0a025e0f2e2c7ada7f69f
https://github.com/python/cpython/commit/40d75c2b7f5c67e254d0a025e0f2e2c7ada7f69f (3.13)
https://github.com/python/cpython/commit/895f7e2ac23eff4743143beef0f0c5ac71ea27d3
https://github.com/python/cpython/commit/ba431579efdcbaed7a96f2ac4ea0775879a332fb
https://github.com/python/cpython/commit/c62c9e518b784fe44432a3f4fc265fb95b651906
https://github.com/python/cpython/commit/f86b17ac511e68192ba71f27e752321a3252cee3
https://github.com/python/cpython/issues/113171
https://github.com/python/cpython/pull/113179
https://linux.oracle.com/cve/CVE-2024-4032.html
https://linux.oracle.com/errata/ELSA-2024-9190.html
https://mail.python.org/archives/list/[email protected]/thread/NRUHDUS2IV2USIZM2CVMSFL6SCKU3RZA/
https://nvd.nist.gov/vuln/detail/CVE-2024-4032
https://security.netapp.com/advisory/ntap-20240726-0004/
https://ubuntu.com/security/notices/USN-6928-1
https://ubuntu.com/security/notices/USN-6941-1
https://ubuntu.com/security/notices/USN-7348-1
https://www.cve.org/CVERecord?id=CVE-2024-4032
https://www.iana.org/assignments/iana-ipv4-special-registry/iana-ipv4-special-registry.xhtml
https://www.iana.org/assignments/iana-ipv6-special-registry/iana-ipv6-special-registry.xhtml
|
| python3.11 |
CVE-2025-1795 |
LOW |
3.11.2-6 |
3.11.2-6+deb12u6 |
https://access.redhat.com/security/cve/CVE-2025-1795
https://github.com/python/cpython/commit/09fab93c3d857496c0bd162797fab816c311ee48
https://github.com/python/cpython/commit/70754d21c288535e86070ca7a6e90dcb670b8593
https://github.com/python/cpython/commit/9148b77e0af91cdacaa7fe3dfac09635c3fe9a74
https://github.com/python/cpython/issues/100884
https://github.com/python/cpython/pull/100885
https://github.com/python/cpython/pull/119099
https://mail.python.org/archives/list/[email protected]/thread/MB62IZMEC3UM6SGHP5LET5JX2Y7H4ZUR/
https://nvd.nist.gov/vuln/detail/CVE-2025-1795
https://ubuntu.com/security/notices/USN-7570-1
https://www.cve.org/CVERecord?id=CVE-2025-1795
|
| python3.11-minimal |
CVE-2023-24329 |
HIGH |
3.11.2-6 |
3.11.2-6+deb12u2 |
https://access.redhat.com/errata/RHSA-2023:3811
https://access.redhat.com/security/cve/CVE-2023-24329
https://bugzilla.redhat.com/2173917
https://bugzilla.redhat.com/show_bug.cgi?id=2173917
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24329
https://errata.almalinux.org/8/ALSA-2023-3811.html
https://errata.rockylinux.org/RLSA-2023:3595
https://github.com/python/cpython/issues/102153
https://github.com/python/cpython/pull/99421
https://github.com/python/cpython/pull/99446 (backport for 3.11 branch)
https://linux.oracle.com/cve/CVE-2023-24329.html
https://linux.oracle.com/errata/ELSA-2023-3811.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6PEVICI7YNGGMSL3UCMWGE66QFLATH72/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DSL6NSOAXWBJJ67XPLSSC74MNKZF3BBO/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EM2XLZSTXG44TMFXF4E6VTGKR2MQCW3G/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F2NY75GFDZ5T6YPN44D3VMFT5SUVTOTG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GR5US3BYILYJ4SKBV6YBNPRUBAL5P2CN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H23OSKC6UG6IWOQAUPW74YUHWRWVXJP7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZTLGV2HYFF4AMYJL25VDIGAIHCU7UPA/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LWC4WGXER5P6Q75RFGL7QUTPP3N5JR7T/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZEHSXSCMA4WWQKXT6QV7AAR6SWNZ2VP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O5SP4RT3RRS434ZS2HQKQJ3VZW7YPKYR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OHHJHJRLEF3TDT2K3676CAUVRDD4CCMR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEUN6T22UJFXR7J5F6UUHCXXPKJ2DVHI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PURM5CFDABEWAIWZFD2MQ7ZJGCPYSQ44/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q3J5N24ECS4B6MJDRO6UAYU6GPLYBDCL/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QRQHN7RWJQJHYP6E5EKESOYP5VDSHZG4/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RA2MBEEES6L46OD64OBSVUUMGKNGMOWW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4IDB5OAR5Y4UK3HLMZBW4WEL2B7YFMJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TZH26JGNZ5XYPZ5SAU3NKSBSPRE5OHTG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U2MZOJYGFCB5PPT6AKMAU72N7QOYWLBP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UONZWLB4QVLQIY5CPDLEUEKH6WX4VQMC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WTOAUJNDWZDRWVSXJ354AYZYKRMT56HU/
https://nvd.nist.gov/vuln/detail/CVE-2023-24329
https://pointernull.com/security/python-url-parse-problem.html
https://security.netapp.com/advisory/ntap-20230324-0004/
https://ubuntu.com/security/notices/USN-5888-1
https://ubuntu.com/security/notices/USN-5960-1
https://ubuntu.com/security/notices/USN-6139-1
https://ubuntu.com/security/notices/USN-6891-1
https://ubuntu.com/security/notices/USN-7180-1
https://www.cve.org/CVERecord?id=CVE-2023-24329
https://www.kb.cert.org/vuls/id/127587
|
| python3.11-minimal |
CVE-2023-41105 |
HIGH |
3.11.2-6 |
3.11.2-6+deb12u2 |
https://access.redhat.com/errata/RHSA-2023:7024
https://access.redhat.com/security/cve/CVE-2023-41105
https://bugzilla.redhat.com/2235795
https://bugzilla.redhat.com/263261
https://errata.almalinux.org/8/ALSA-2023-7024.html
https://github.com/python/cpython/issues/106242
https://github.com/python/cpython/pull/107981
https://github.com/python/cpython/pull/107982
https://github.com/python/cpython/pull/107983
https://linux.oracle.com/cve/CVE-2023-41105.html
https://linux.oracle.com/errata/ELSA-2023-7024.html
https://mail.python.org/archives/list/security-announce%40python.org/thread/D6CDW3ZZC5D444YGL3VQUY6D4ECMCQLD/
https://mail.python.org/archives/list/[email protected]/thread/D6CDW3ZZC5D444YGL3VQUY6D4ECMCQLD/
https://nvd.nist.gov/vuln/detail/CVE-2023-41105
https://security.netapp.com/advisory/ntap-20231006-0015/
https://ubuntu.com/security/notices/USN-6547-1
https://ubuntu.com/security/notices/USN-6891-1
https://www.cve.org/CVERecord?id=CVE-2023-41105
|
| python3.11-minimal |
CVE-2023-6597 |
HIGH |
3.11.2-6 |
3.11.2-6+deb12u2 |
http://www.openwall.com/lists/oss-security/2024/03/20/5
https://access.redhat.com/errata/RHSA-2024:4058
https://access.redhat.com/security/cve/CVE-2023-6597
https://bugzilla.redhat.com/2276518
https://bugzilla.redhat.com/2276525
https://bugzilla.redhat.com/show_bug.cgi?id=2276518
https://bugzilla.redhat.com/show_bug.cgi?id=2276525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6597
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0450
https://discuss.python.org/t/python-3-10-14-3-9-19-and-3-8-19-is-now-available/48993
https://errata.almalinux.org/8/ALSA-2024-4058.html
https://errata.rockylinux.org/RLSA-2024:4078
https://github.com/advisories/GHSA-797f-63wg-8chv
https://github.com/python/cpython/commit/02a9259c717738dfe6b463c44d7e17f2b6d2cb3a
https://github.com/python/cpython/commit/5585334d772b253a01a6730e8202ffb1607c3d25
https://github.com/python/cpython/commit/6ceb8aeda504b079fef7a57b8d81472f15cdd9a5
https://github.com/python/cpython/commit/81c16cd94ec38d61aa478b9a452436dc3b1b524d
https://github.com/python/cpython/commit/8eaeefe49d179ca4908d052745e3bb8b6f238f82
https://github.com/python/cpython/commit/d54e22a669ae6e987199bb5d2c69bb5a46b0083b
https://github.com/python/cpython/issues/91133
https://linux.oracle.com/cve/CVE-2023-6597.html
https://linux.oracle.com/errata/ELSA-2024-4078.html
https://lists.debian.org/debian-lts-announce/2024/03/msg00025.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/T3IGRX54M7RNCQOXVQO5KQKTGWCOABIM/
https://lists.fedoraproject.org/archives/list/[email protected]/message/U5VHWS52HGD743C47UMCSAK2A773M2YE/
https://mail.python.org/archives/list/[email protected]/thread/Q5C6ATFC67K53XFV4KE45325S7NS62LD/
https://nvd.nist.gov/vuln/detail/CVE-2023-6597
https://seclists.org/oss-sec/2024/q1/240
https://ubuntu.com/security/notices/USN-6891-1
https://www.cve.org/CVERecord?id=CVE-2023-6597
|
| python3.11-minimal |
CVE-2024-6232 |
HIGH |
3.11.2-6 |
3.11.2-6+deb12u4 |
http://www.openwall.com/lists/oss-security/2024/09/03/5
https://access.redhat.com/errata/RHSA-2024:8838
https://access.redhat.com/security/cve/CVE-2024-6232
https://bugzilla.redhat.com/2309426
https://bugzilla.redhat.com/show_bug.cgi?id=2309426
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6232
https://errata.almalinux.org/8/ALSA-2024-8838.html
https://errata.rockylinux.org/RLSA-2024:8446
https://github.com/python/cpython/commit/34ddb64d088dd7ccc321f6103d23153256caa5d4
https://github.com/python/cpython/commit/4eaf4891c12589e3c7bdad5f5b076e4c8392dd06
https://github.com/python/cpython/commit/743acbe872485dc18df4d8ab2dc7895187f062c4
https://github.com/python/cpython/commit/7d1f50cd92ff7e10a1c15a8f591dde8a6843a64d
https://github.com/python/cpython/commit/b4225ca91547aa97ed3aca391614afbb255bc877
https://github.com/python/cpython/commit/d449caf8a179e3b954268b3a88eb9170be3c8fbf
https://github.com/python/cpython/commit/ed3a49ea734ada357ff4442996fd4ae71d253373
https://github.com/python/cpython/issues/121285
https://github.com/python/cpython/pull/121286
https://linux.oracle.com/cve/CVE-2024-6232.html
https://linux.oracle.com/errata/ELSA-2025-1750.html
https://mail.python.org/archives/list/[email protected]/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/
https://nvd.nist.gov/vuln/detail/CVE-2024-6232
https://security.netapp.com/advisory/ntap-20241018-0007/
https://ubuntu.com/security/notices/USN-7015-1
https://ubuntu.com/security/notices/USN-7015-2
https://ubuntu.com/security/notices/USN-7015-5
https://ubuntu.com/security/notices/USN-7488-1
https://www.cve.org/CVERecord?id=CVE-2024-6232
|
| python3.11-minimal |
CVE-2024-7592 |
HIGH |
3.11.2-6 |
3.11.2-6+deb12u5 |
https://access.redhat.com/errata/RHSA-2025:3634
https://access.redhat.com/security/cve/CVE-2024-7592
https://errata.almalinux.org/9/ALSA-2025-3634.html
https://github.com/python/cpython/commit/391e5626e3ee5af267b97e37abc7475732e67621
https://github.com/python/cpython/commit/44e458357fca05ca0ae2658d62c8c595b048b5ef
https://github.com/python/cpython/commit/a77ab24427a18bff817025adb03ca920dc3f1a06
https://github.com/python/cpython/commit/b2f11ca7667e4d57c71c1c88b255115f16042d9a
https://github.com/python/cpython/commit/d4ac921a4b081f7f996a5d2b101684b67ba0ed7f
https://github.com/python/cpython/commit/d662e2db2605515a767f88ad48096b8ac623c774
https://github.com/python/cpython/commit/dcc3eaef98cd94d6cb6cb0f44bd1c903d04f33b1
https://github.com/python/cpython/issues/123067
https://github.com/python/cpython/pull/123075
https://linux.oracle.com/cve/CVE-2024-7592.html
https://linux.oracle.com/errata/ELSA-2025-3634.html
https://mail.python.org/archives/list/[email protected]/thread/HXJAAAALNUNGCQUS2W7WR6GFIZIHFOOK/
https://nvd.nist.gov/vuln/detail/CVE-2024-7592
https://security.netapp.com/advisory/ntap-20241018-0006/
https://ubuntu.com/security/notices/USN-7015-1
https://ubuntu.com/security/notices/USN-7015-2
https://www.cve.org/CVERecord?id=CVE-2024-7592
|
| python3.11-minimal |
CVE-2024-9287 |
HIGH |
3.11.2-6 |
3.11.2-6+deb12u5 |
https://access.redhat.com/errata/RHSA-2024:10980
https://access.redhat.com/security/cve/CVE-2024-9287
https://bugzilla.redhat.com/2321440
https://bugzilla.redhat.com/2330804
https://bugzilla.redhat.com/show_bug.cgi?id=2321440
https://bugzilla.redhat.com/show_bug.cgi?id=2325776
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11168
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9287
https://errata.almalinux.org/8/ALSA-2024-10980.html
https://errata.rockylinux.org/RLSA-2024:10779
https://github.com/python/cpython/commit/633555735a023d3e4d92ba31da35b1205f9ecbd7
https://github.com/python/cpython/commit/8450b2482586857d689b6658f08de9c8179af7db
https://github.com/python/cpython/commit/9286ab3a107ea41bd3f3c3682ce2512692bdded8
https://github.com/python/cpython/commit/ae961ae94bf19c8f8c7fbea3d1c25cc55ce8ae97
https://github.com/python/cpython/commit/d48cc82ed25e26b02eb97c6263d95dcaa1e9111b
https://github.com/python/cpython/commit/e52095a0c1005a87eed2276af7a1f2f66e2b6483
https://github.com/python/cpython/issues/124651
https://github.com/python/cpython/pull/124712
https://github.com/python/cpython/pull/124712/commits/b6a3bbd155c558cdcda482629073e492437db3d0
https://linux.oracle.com/cve/CVE-2024-9287.html
https://linux.oracle.com/errata/ELSA-2024-11111.html
https://mail.python.org/archives/list/[email protected]/thread/RSPJ2B5JL22FG3TKUJ7D7DQ4N5JRRBZL/
https://nvd.nist.gov/vuln/detail/CVE-2024-9287
https://security.netapp.com/advisory/ntap-20250425-0006/
https://ubuntu.com/security/notices/USN-7116-1
https://ubuntu.com/security/notices/USN-7348-1
https://ubuntu.com/security/notices/USN-7488-1
https://www.cve.org/CVERecord?id=CVE-2024-9287
|
| python3.11-minimal |
CVE-2025-8194 |
HIGH |
3.11.2-6 |
|
https://access.redhat.com/errata/RHSA-2025:14900
https://access.redhat.com/security/cve/CVE-2025-8194
https://bugzilla.redhat.com/2366982
https://bugzilla.redhat.com/2384043
https://bugzilla.redhat.com/show_bug.cgi?id=2384043
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8194
https://errata.almalinux.org/8/ALSA-2025-14900.html
https://errata.rockylinux.org/RLSA-2025:14841
https://gist.github.com/sethmlarson/1716ac5b82b73dbcbf23ad2eff8b33e1
https://github.com/python/cpython/commit/57f5981d6260ed21266e0c26951b8564cc252bc2
https://github.com/python/cpython/commit/7040aa54f14676938970e10c5f74ea93cd56aa38
https://github.com/python/cpython/commit/73f03e4808206f71eb6b92c579505a220942ef19
https://github.com/python/cpython/commit/b4ec17488eedec36d3c05fec127df71c0071f6cb
https://github.com/python/cpython/commit/c9d9f78feb1467e73fd29356c040bde1c104f29f
https://github.com/python/cpython/commit/cdae923ffe187d6ef916c0f665a31249619193fe
https://github.com/python/cpython/commit/fbc2a0ca9ac8aff6887f8ddf79b87b4510277227
https://github.com/python/cpython/issues/130577
https://github.com/python/cpython/pull/137027
https://linux.oracle.com/cve/CVE-2025-8194.html
https://linux.oracle.com/errata/ELSA-2025-16117.html
https://mail.python.org/archives/list/[email protected]/thread/ZULLF3IZ726XP5EY7XJ7YIN3K5MDYR2D/
https://nvd.nist.gov/vuln/detail/CVE-2025-8194
https://ubuntu.com/security/notices/USN-7710-1
https://ubuntu.com/security/notices/USN-7710-2
https://www.cve.org/CVERecord?id=CVE-2025-8194
|
| python3.11-minimal |
CVE-2023-27043 |
MEDIUM |
3.11.2-6 |
3.11.2-6+deb12u5 |
http://python.org
https://access.redhat.com/articles/7051467
https://access.redhat.com/errata/RHSA-2024:3062
https://access.redhat.com/security/cve/CVE-2023-27043
https://bugzilla.redhat.com/2196183
https://bugzilla.redhat.com/show_bug.cgi?id=2196183
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27043
https://errata.almalinux.org/8/ALSA-2024-3062.html
https://errata.rockylinux.org/RLSA-2024:0256
https://github.com/python/cpython/issues/102988
https://github.com/python/cpython/pull/102990
https://github.com/python/cpython/pull/105127
https://linux.oracle.com/cve/CVE-2023-27043.html
https://linux.oracle.com/errata/ELSA-2024-3062.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZAEFSFZDNBNJPNOUTLG5COISGQDLMGV/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/75DTHSTNOFFNAWHXKMDXS7EJWC6W2FUC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ARI7VDSNTQVXRQFM6IK5GSSLEIYV4VZH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BQAKLUJMHFGVBRDPEY57BJGNCE5UUPHW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HXYVPEZUA3465AEFX5JVFVP7KIFZMF3N/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6M5I6OQHJABNEYY555HUMMKX3Y4P25Z/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NEUNZSZ3CVSM2QWVYH3N2XGOCDWNYUA3/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORLXS5YTKN65E2Q2NWKXMFS5FWQHRNZW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2MAICLFDDO3QVNHTZ2OCERZQ34R2PIC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2W2BZQIHMCKRI5FNBJERFYMS5PK6TAH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PHVGRKQAGANCSGFI3QMYOCIMS4IFOZA5/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU6Y2S5CBN5BWCBDAJFTGIBZLK3S2G3J/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QDRDDPDN3VFIYXJIYEABY6USX5EU66AG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDDC2VOX7OQC6OHMYTVD4HLFZIV6PYBC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SINP4OVYNB2AGDYI2GS37EMW3H3F7XPZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SOX7BCN6YL7B3RFPEEXPIU5CMTEHJOKR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZXC32CJ7TWDPJO6GY2XIQRO7JZX5FLP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWMBD4LNHWEXRI6YVFWJMTJQUL5WOFTS/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YQVY5C5REXWJIORJIL2FIL3ALOEJEF72/
https://lists.fedoraproject.org/archives/list/[email protected]/message/4ZAEFSFZDNBNJPNOUTLG5COISGQDLMGV/
https://lists.fedoraproject.org/archives/list/[email protected]/message/75DTHSTNOFFNAWHXKMDXS7EJWC6W2FUC/
https://lists.fedoraproject.org/archives/list/[email protected]/message/ARI7VDSNTQVXRQFM6IK5GSSLEIYV4VZH/
https://lists.fedoraproject.org/archives/list/[email protected]/message/BQAKLUJMHFGVBRDPEY57BJGNCE5UUPHW/
https://lists.fedoraproject.org/archives/list/[email protected]/message/HXYVPEZUA3465AEFX5JVFVP7KIFZMF3N/
https://lists.fedoraproject.org/archives/list/[email protected]/message/N6M5I6OQHJABNEYY555HUMMKX3Y4P25Z/
https://lists.fedoraproject.org/archives/list/[email protected]/message/NEUNZSZ3CVSM2QWVYH3N2XGOCDWNYUA3/
https://lists.fedoraproject.org/archives/list/[email protected]/message/ORLXS5YTKN65E2Q2NWKXMFS5FWQHRNZW/
https://lists.fedoraproject.org/archives/list/[email protected]/message/P2MAICLFDDO3QVNHTZ2OCERZQ34R2PIC/
https://lists.fedoraproject.org/archives/list/[email protected]/message/P2W2BZQIHMCKRI5FNBJERFYMS5PK6TAH/
https://lists.fedoraproject.org/archives/list/[email protected]/message/PHVGRKQAGANCSGFI3QMYOCIMS4IFOZA5/
https://lists.fedoraproject.org/archives/list/[email protected]/message/PU6Y2S5CBN5BWCBDAJFTGIBZLK3S2G3J/
https://lists.fedoraproject.org/archives/list/[email protected]/message/QDRDDPDN3VFIYXJIYEABY6USX5EU66AG/
https://lists.fedoraproject.org/archives/list/[email protected]/message/RDDC2VOX7OQC6OHMYTVD4HLFZIV6PYBC/
https://lists.fedoraproject.org/archives/list/[email protected]/message/SINP4OVYNB2AGDYI2GS37EMW3H3F7XPZ/
https://lists.fedoraproject.org/archives/list/[email protected]/message/VZXC32CJ7TWDPJO6GY2XIQRO7JZX5FLP/
https://lists.fedoraproject.org/archives/list/[email protected]/message/XWMBD4LNHWEXRI6YVFWJMTJQUL5WOFTS/
https://lists.fedoraproject.org/archives/list/[email protected]/message/YQVY5C5REXWJIORJIL2FIL3ALOEJEF72/
https://nvd.nist.gov/vuln/detail/CVE-2023-27043
https://python-security.readthedocs.io/vuln/email-parseaddr-realname.html
https://security.netapp.com/advisory/ntap-20230601-0003/
https://ubuntu.com/security/notices/USN-7015-1
https://ubuntu.com/security/notices/USN-7015-3
https://ubuntu.com/security/notices/USN-7015-4
https://ubuntu.com/security/notices/USN-7015-7
https://www.cve.org/CVERecord?id=CVE-2023-27043
|
| python3.11-minimal |
CVE-2023-40217 |
MEDIUM |
3.11.2-6 |
3.11.2-6+deb12u2 |
https://access.redhat.com/errata/RHSA-2023:5998
https://access.redhat.com/security/cve/CVE-2023-40217
https://bugzilla.redhat.com/2235789
https://bugzilla.redhat.com/show_bug.cgi?id=2235789
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40217
https://errata.almalinux.org/8/ALSA-2023-5998.html
https://errata.rockylinux.org/RLSA-2023:5997
https://github.com/python/cpython/commit/0cb0c238d520a8718e313b52cffc356a5a7561bf (main)
https://github.com/python/cpython/commit/256586ab8776e4526ca594b4866b9a3492e628f1 (3.12)
https://github.com/python/cpython/commit/264b1dacc67346efa0933d1e63f622676e0ed96b (3.9)
https://github.com/python/cpython/commit/37d7180cb647f0bed0c1caab0037f3bc82e2af96 (3.10)
https://github.com/python/cpython/commit/75a875e0df0530b75b1470d797942f90f4a718d3 (3.11)
https://github.com/python/cpython/issues/108310
https://github.com/python/cpython/pull/108315
https://linux.oracle.com/cve/CVE-2023-40217.html
https://linux.oracle.com/errata/ELSA-2023-6885.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html
https://mail.python.org/archives/list/security-announce%40python.org/thread/PEPLII27KYHLF4AK3ZQGKYNCRERG4YXY/
https://mail.python.org/archives/list/[email protected]/thread/PEPLII27KYHLF4AK3ZQGKYNCRERG4YXY/
https://nvd.nist.gov/vuln/detail/CVE-2023-40217
https://security.netapp.com/advisory/ntap-20231006-0014/
https://ubuntu.com/security/notices/USN-6513-1
https://ubuntu.com/security/notices/USN-6513-2
https://ubuntu.com/security/notices/USN-6891-1
https://ubuntu.com/security/notices/USN-7180-1
https://www.cve.org/CVERecord?id=CVE-2023-40217
https://www.python.org/dev/security/
|
| python3.11-minimal |
CVE-2024-0397 |
MEDIUM |
3.11.2-6 |
3.11.2-6+deb12u3 |
http://www.openwall.com/lists/oss-security/2024/06/17/2
https://access.redhat.com/security/cve/CVE-2024-0397
https://github.com/python/cpython/commit/01c37f1d0714f5822d34063ca7180b595abf589d
https://github.com/python/cpython/commit/29c97287d205bf2f410f4895ebce3f43b5160524
https://github.com/python/cpython/commit/37324b421b72b7bc9934e27aba85d48d4773002e
https://github.com/python/cpython/commit/542f3272f56f31ed04e74c40635a913fbc12d286
https://github.com/python/cpython/commit/b228655c227b2ca298a8ffac44d14ce3d22f6faa
https://github.com/python/cpython/commit/bce693111bff906ccf9281c22371331aaff766ab
https://github.com/python/cpython/commit/bce693111bff906ccf9281c22371331aaff766ab (3.13)
https://github.com/python/cpython/issues/114572
https://github.com/python/cpython/pull/114573
https://mail.python.org/archives/list/[email protected]/thread/BMAK5BCGKYWNJOACVUSLUF6SFGBIM4VP/
https://nvd.nist.gov/vuln/detail/CVE-2024-0397
https://security.netapp.com/advisory/ntap-20250411-0006/
https://ubuntu.com/security/notices/USN-6928-1
https://www.cve.org/CVERecord?id=CVE-2024-0397
|
| python3.11-minimal |
CVE-2024-0450 |
MEDIUM |
3.11.2-6 |
3.11.2-6+deb12u2 |
http://www.openwall.com/lists/oss-security/2024/03/20/5
https://access.redhat.com/errata/RHSA-2024:4243
https://access.redhat.com/security/cve/CVE-2024-0450
https://bugzilla.redhat.com/2276525
https://bugzilla.redhat.com/show_bug.cgi?id=2276518
https://bugzilla.redhat.com/show_bug.cgi?id=2276525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6597
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0450
https://discuss.python.org/t/python-3-10-14-3-9-19-and-3-8-19-is-now-available/48993
https://errata.almalinux.org/8/ALSA-2024-4243.html
https://errata.rockylinux.org/RLSA-2024:4078
https://github.com/python/cpython/commit/30fe5d853b56138dbec62432d370a1f99409fc85
https://github.com/python/cpython/commit/66363b9a7b9fe7c99eba3a185b74c5fdbf842eba
https://github.com/python/cpython/commit/70497218351ba44bffc8b571201ecb5652d84675
https://github.com/python/cpython/commit/a2c59992e9e8d35baba9695eb186ad6c6ff85c51
https://github.com/python/cpython/commit/a956e510f6336d5ae111ba429a61c3ade30a7549
https://github.com/python/cpython/commit/d05bac0b74153beb541b88b4fca33bf053990183
https://github.com/python/cpython/commit/fa181fcf2156f703347b03a3b1966ce47be8ab3b
https://github.com/python/cpython/issues/109858
https://linux.oracle.com/cve/CVE-2024-0450.html
https://linux.oracle.com/errata/ELSA-2024-9192.html
https://lists.debian.org/debian-lts-announce/2024/03/msg00024.html
https://lists.debian.org/debian-lts-announce/2024/03/msg00025.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/T3IGRX54M7RNCQOXVQO5KQKTGWCOABIM/
https://lists.fedoraproject.org/archives/list/[email protected]/message/U5VHWS52HGD743C47UMCSAK2A773M2YE/
https://mail.python.org/archives/list/[email protected]/thread/XELNUX2L3IOHBTFU7RQHCY6OUVEWZ2FG/
https://nvd.nist.gov/vuln/detail/CVE-2024-0450
https://seclists.org/oss-sec/2024/q1/240
https://security.netapp.com/advisory/ntap-20250411-0005/
https://ubuntu.com/security/notices/USN-6891-1
https://ubuntu.com/security/notices/USN-7212-1
https://www.bamsoftware.com/hacks/zipbomb/
https://www.cve.org/CVERecord?id=CVE-2024-0450
|
| python3.11-minimal |
CVE-2024-6923 |
MEDIUM |
3.11.2-6 |
3.11.2-6+deb12u5 |
http://www.openwall.com/lists/oss-security/2024/08/01/3
http://www.openwall.com/lists/oss-security/2024/08/02/2
https://access.redhat.com/errata/RHSA-2024:6975
https://access.redhat.com/security/cve/CVE-2024-6923
https://bugzilla.redhat.com/2292921
https://bugzilla.redhat.com/2302255
https://bugzilla.redhat.com/2309426
https://bugzilla.redhat.com/show_bug.cgi?id=2302255
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6923
https://errata.almalinux.org/8/ALSA-2024-6975.html
https://errata.rockylinux.org/RLSA-2024:6146
https://github.com/python/cpython/commit/06f28dc236708f72871c64d4bc4b4ea144c50147
https://github.com/python/cpython/commit/097633981879b3c9de9a1dd120d3aa585ecc2384
https://github.com/python/cpython/commit/4766d1200fdf8b6728137aa2927a297e224d5fa7
https://github.com/python/cpython/commit/4aaa4259b5a6e664b7316a4d60bdec7ee0f124d0
https://github.com/python/cpython/commit/b158a76ce094897c870fb6b3de62887b7ccc33f1
https://github.com/python/cpython/commit/f7be505d137a22528cb0fc004422c0081d5d90e6
https://github.com/python/cpython/commit/f7c0f09e69e950cf3c5ada9dbde93898eb975533
https://github.com/python/cpython/issues/121650
https://github.com/python/cpython/pull/122233
https://linux.oracle.com/cve/CVE-2024-6923.html
https://linux.oracle.com/errata/ELSA-2024-6975.html
https://lists.debian.org/debian-lts-announce/2025/01/msg00005.html
https://mail.python.org/archives/list/[email protected]/thread/QH3BUOE2DYQBWP7NAQ7UNHPPOELKISRW/
https://nvd.nist.gov/vuln/detail/CVE-2024-6923
https://security.netapp.com/advisory/ntap-20240926-0003/
https://ubuntu.com/security/notices/USN-7015-1
https://ubuntu.com/security/notices/USN-7015-5
https://www.cve.org/CVERecord?id=CVE-2024-6923
|
| python3.11-minimal |
CVE-2024-8088 |
MEDIUM |
3.11.2-6 |
3.11.2-6+deb12u3 |
http://www.openwall.com/lists/oss-security/2024/08/22/1
http://www.openwall.com/lists/oss-security/2024/08/22/4
http://www.openwall.com/lists/oss-security/2024/08/23/1
http://www.openwall.com/lists/oss-security/2024/08/23/2
https://access.redhat.com/errata/RHSA-2024:6962
https://access.redhat.com/security/cve/CVE-2024-8088
https://bugzilla.redhat.com/2292921
https://bugzilla.redhat.com/2302255
https://bugzilla.redhat.com/2307370
https://bugzilla.redhat.com/show_bug.cgi?id=2292921
https://bugzilla.redhat.com/show_bug.cgi?id=2302255
https://bugzilla.redhat.com/show_bug.cgi?id=2307370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6923
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8088
https://errata.almalinux.org/8/ALSA-2024-6962.html
https://errata.rockylinux.org/RLSA-2024:6962
https://github.com/python/cpython/commit/0aa1ee22ab6e204e9d3d0e9dd63ea648ed691ef1
https://github.com/python/cpython/commit/2231286d78d328c2f575e0b05b16fe447d1656d6
https://github.com/python/cpython/commit/795f2597a4be988e2bb19b69ff9958e981cb894e
https://github.com/python/cpython/commit/7bc367e464ce50b956dd232c1dfa1cad4e7fb814
https://github.com/python/cpython/commit/7e8883a3f04d308302361aeffc73e0e9837f19d4
https://github.com/python/cpython/commit/8c7348939d8a3ecd79d630075f6be1b0c5b41f64
https://github.com/python/cpython/commit/95b073bddefa6243effa08e131e297c0383e7f6a
https://github.com/python/cpython/commit/962055268ed4f2ca1d717bfc8b6385de50a23ab7
https://github.com/python/cpython/commit/9cd03263100ddb1657826cc4a71470786cab3932
https://github.com/python/cpython/commit/dcc5182f27c1500006a1ef78e10613bb45788dea
https://github.com/python/cpython/commit/e0264a61119d551658d9445af38323ba94fc16db
https://github.com/python/cpython/commit/fc0b8259e693caa8400fa8b6ac1e494e47ea7798
https://github.com/python/cpython/issues/122905
https://github.com/python/cpython/issues/123270
https://github.com/python/cpython/pull/122906
https://linux.oracle.com/cve/CVE-2024-8088.html
https://linux.oracle.com/errata/ELSA-2024-9371.html
https://mail.python.org/archives/list/[email protected]/thread/GNFCKVI4TCATKQLALJ5SN4L4CSPSMILU/
https://nvd.nist.gov/vuln/detail/CVE-2024-8088
https://security.netapp.com/advisory/ntap-20241011-0010/
https://ubuntu.com/security/notices/USN-7015-1
https://www.cve.org/CVERecord?id=CVE-2024-8088
|
| python3.11-minimal |
CVE-2025-0938 |
MEDIUM |
3.11.2-6 |
3.11.2-6+deb12u6 |
https://access.redhat.com/errata/RHSA-2025:7109
https://access.redhat.com/security/cve/CVE-2025-0938
https://bugzilla.redhat.com/2343237
https://errata.almalinux.org/9/ALSA-2025-7109.html
https://github.com/python/cpython/commit/526617ed68cde460236c973e5d0a8bad4de896ba
https://github.com/python/cpython/commit/90e526ae67b172ed7c6c56e7edad36263b0f9403
https://github.com/python/cpython/commit/a7084f6075c9595ba60119ce8c62f1496f50c568
https://github.com/python/cpython/commit/b8b4b713c5f8ec0958c7ef8d29d6711889bc94ab
https://github.com/python/cpython/commit/d89a5f6a6e65511a5f6e0618c4c30a7aa5aba56a
https://github.com/python/cpython/commit/ff4e5c25666f63544071a6b075ae8b25c98b7a32
https://github.com/python/cpython/issues/105704
https://github.com/python/cpython/pull/129418
https://linux.oracle.com/cve/CVE-2025-0938.html
https://linux.oracle.com/errata/ELSA-2025-7109.html
https://mail.python.org/archives/list/[email protected]/thread/K4EUG6EKV6JYFIC24BASYOZS4M5XOQIB/
https://nvd.nist.gov/vuln/detail/CVE-2025-0938
https://security.netapp.com/advisory/ntap-20250314-0002/
https://ubuntu.com/security/notices/USN-7280-1
https://ubuntu.com/security/notices/USN-7280-2
https://ubuntu.com/security/notices/USN-7280-3
https://ubuntu.com/security/notices/USN-7348-1
https://ubuntu.com/security/notices/USN-7348-2
https://www.cve.org/CVERecord?id=CVE-2025-0938
|
| python3.11-minimal |
CVE-2025-4516 |
MEDIUM |
3.11.2-6 |
|
http://www.openwall.com/lists/oss-security/2025/05/16/4
http://www.openwall.com/lists/oss-security/2025/05/19/1
https://access.redhat.com/security/cve/CVE-2025-4516
https://github.com/python/cpython/commit/4398b788ffc1f954a2c552da285477d42a571292
https://github.com/python/cpython/commit/5646648678295a44aa82636c6e92826651baf33a
https://github.com/python/cpython/commit/6279eb8c076d89d3739a6edb393e43c7929b429d
https://github.com/python/cpython/commit/69b4387f78f413e8c47572a85b3478c47eba8142
https://github.com/python/cpython/commit/73b3040f592436385007918887b7e2132aa8431f
https://github.com/python/cpython/commit/8d35fd1b34935221aff23a1ab69a429dd156be77
https://github.com/python/cpython/commit/9f69a58623bd01349a18ba0c7a9cb1dad6a51e8e
https://github.com/python/cpython/commit/9f69a58623bd01349a18ba0c7a9cb1dad6a51e8e (main)
https://github.com/python/cpython/commit/ab9893c40609935e0d40a6d2a7307ea51aec598b
https://github.com/python/cpython/issues/133767
https://github.com/python/cpython/pull/129648
https://mail.python.org/archives/list/[email protected]/thread/L75IPBBTSCYEF56I2M4KIW353BB3AY74/
https://nvd.nist.gov/vuln/detail/CVE-2025-4516
https://ubuntu.com/security/notices/USN-7570-1
https://www.cve.org/CVERecord?id=CVE-2025-4516
|
| python3.11-minimal |
CVE-2025-6069 |
MEDIUM |
3.11.2-6 |
|
https://access.redhat.com/security/cve/CVE-2025-6069
https://github.com/python/cpython/commit/4455cbabf991e202185a25a631af206f60bbc949
https://github.com/python/cpython/commit/6eb6c5dbfb528bd07d77b60fd71fd05d81d45c41
https://github.com/python/cpython/commit/6eb6c5dbfb528bd07d77b60fd71fd05d81d45c41 (main)
https://github.com/python/cpython/commit/8d1b3dfa09135affbbf27fb8babcf3c11415df49
https://github.com/python/cpython/commit/ab0893fd5c579d9cea30841680e6d35fc478afb5
https://github.com/python/cpython/commit/d851f8e258c7328814943e923a7df81bca15df4b
https://github.com/python/cpython/commit/f3c6f882cddc8dc30320d2e73edf019e201394fc
https://github.com/python/cpython/commit/fdc9d214c01cb4588f540cfa03726bbf2a33fc15
https://github.com/python/cpython/issues/135462
https://github.com/python/cpython/pull/135464
https://mail.python.org/archives/list/[email protected]/thread/K5PIYLR6EP3WR7ZOKKYQUWEDNQVUXOYM/
https://nvd.nist.gov/vuln/detail/CVE-2025-6069
https://ubuntu.com/security/notices/USN-7710-1
https://www.cve.org/CVERecord?id=CVE-2025-6069
|
| python3.11-minimal |
CVE-2025-8291 |
MEDIUM |
3.11.2-6 |
|
https://access.redhat.com/security/cve/CVE-2025-8291
https://github.com/python/cpython/commit/162997bb70e067668c039700141770687bc8f267
https://github.com/python/cpython/commit/1d29afb0d6218aa8fb5e1e4a6133a4778d89bb46
https://github.com/python/cpython/commit/333d4a6f4967d3ace91492a39ededbcf3faa76a6
https://github.com/python/cpython/commit/76437ac248ad8ca44e9bf697b02b1e2241df2196
https://github.com/python/cpython/commit/8392b2f0d35678407d9ce7d95655a5b77de161b4
https://github.com/python/cpython/commit/bca11ae7d575d87ed93f5dd6a313be6246e3e388
https://github.com/python/cpython/commit/d11e69d6203080e3ec450446bfed0516727b85c3
https://github.com/python/cpython/issues/139700
https://github.com/python/cpython/pull/139702
https://mail.python.org/archives/list/[email protected]/thread/QECOPWMTH4VPPJAXAH2BGTA4XADOP62G/
https://nvd.nist.gov/vuln/detail/CVE-2025-8291
https://www.cve.org/CVERecord?id=CVE-2025-8291
|
| python3.11-minimal |
CVE-2024-11168 |
LOW |
3.11.2-6 |
3.11.2-6+deb12u5 |
https://access.redhat.com/errata/RHSA-2024:10779
https://access.redhat.com/security/cve/CVE-2024-11168
https://bugzilla.redhat.com/2321440
https://bugzilla.redhat.com/2325776
https://bugzilla.redhat.com/show_bug.cgi?id=2321440
https://bugzilla.redhat.com/show_bug.cgi?id=2325776
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11168
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9287
https://errata.almalinux.org/8/ALSA-2024-10779.html
https://errata.rockylinux.org/RLSA-2024:10779
https://github.com/python/cpython/commit/29f348e232e82938ba2165843c448c2b291504c5
https://github.com/python/cpython/commit/634ded45545ce8cbd6fd5d49785613dd7fa9b89e
https://github.com/python/cpython/commit/b2171a2fd41416cf68afd67460578631d755a550
https://github.com/python/cpython/commit/ddca2953191c67a12b1f19d6bca41016c6ae7132
https://github.com/python/cpython/issues/103848
https://github.com/python/cpython/pull/103849
https://linux.oracle.com/cve/CVE-2024-11168.html
https://linux.oracle.com/errata/ELSA-2024-10983.html
https://mail.python.org/archives/list/[email protected]/thread/XPWB6XVZ5G5KGEI63M4AWLIEUF5BPH4T/
https://nvd.nist.gov/vuln/detail/CVE-2024-11168
https://security.netapp.com/advisory/ntap-20250411-0004/
https://ubuntu.com/security/notices/USN-7218-1
https://ubuntu.com/security/notices/USN-7280-3
https://ubuntu.com/security/notices/USN-7348-1
https://ubuntu.com/security/notices/USN-7488-1
https://www.cve.org/CVERecord?id=CVE-2024-11168
|
| python3.11-minimal |
CVE-2024-4032 |
LOW |
3.11.2-6 |
3.11.2-6+deb12u3 |
http://www.openwall.com/lists/oss-security/2024/06/17/3
https://access.redhat.com/errata/RHSA-2024:6975
https://access.redhat.com/security/cve/CVE-2024-4032
https://bugzilla.redhat.com/2292921
https://bugzilla.redhat.com/2302255
https://bugzilla.redhat.com/2309426
https://bugzilla.redhat.com/show_bug.cgi?id=2292921
https://bugzilla.redhat.com/show_bug.cgi?id=2302255
https://bugzilla.redhat.com/show_bug.cgi?id=2309426
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6923
https://errata.almalinux.org/8/ALSA-2024-6975.html
https://errata.rockylinux.org/RLSA-2024:6975
https://github.com/advisories/GHSA-mh6q-v4mp-2cc7
https://github.com/python/cpython/commit/22adf29da8d99933ffed8647d3e0726edd16f7f8
https://github.com/python/cpython/commit/40d75c2b7f5c67e254d0a025e0f2e2c7ada7f69f
https://github.com/python/cpython/commit/40d75c2b7f5c67e254d0a025e0f2e2c7ada7f69f (3.13)
https://github.com/python/cpython/commit/895f7e2ac23eff4743143beef0f0c5ac71ea27d3
https://github.com/python/cpython/commit/ba431579efdcbaed7a96f2ac4ea0775879a332fb
https://github.com/python/cpython/commit/c62c9e518b784fe44432a3f4fc265fb95b651906
https://github.com/python/cpython/commit/f86b17ac511e68192ba71f27e752321a3252cee3
https://github.com/python/cpython/issues/113171
https://github.com/python/cpython/pull/113179
https://linux.oracle.com/cve/CVE-2024-4032.html
https://linux.oracle.com/errata/ELSA-2024-9190.html
https://mail.python.org/archives/list/[email protected]/thread/NRUHDUS2IV2USIZM2CVMSFL6SCKU3RZA/
https://nvd.nist.gov/vuln/detail/CVE-2024-4032
https://security.netapp.com/advisory/ntap-20240726-0004/
https://ubuntu.com/security/notices/USN-6928-1
https://ubuntu.com/security/notices/USN-6941-1
https://ubuntu.com/security/notices/USN-7348-1
https://www.cve.org/CVERecord?id=CVE-2024-4032
https://www.iana.org/assignments/iana-ipv4-special-registry/iana-ipv4-special-registry.xhtml
https://www.iana.org/assignments/iana-ipv6-special-registry/iana-ipv6-special-registry.xhtml
|
| python3.11-minimal |
CVE-2025-1795 |
LOW |
3.11.2-6 |
3.11.2-6+deb12u6 |
https://access.redhat.com/security/cve/CVE-2025-1795
https://github.com/python/cpython/commit/09fab93c3d857496c0bd162797fab816c311ee48
https://github.com/python/cpython/commit/70754d21c288535e86070ca7a6e90dcb670b8593
https://github.com/python/cpython/commit/9148b77e0af91cdacaa7fe3dfac09635c3fe9a74
https://github.com/python/cpython/issues/100884
https://github.com/python/cpython/pull/100885
https://github.com/python/cpython/pull/119099
https://mail.python.org/archives/list/[email protected]/thread/MB62IZMEC3UM6SGHP5LET5JX2Y7H4ZUR/
https://nvd.nist.gov/vuln/detail/CVE-2025-1795
https://ubuntu.com/security/notices/USN-7570-1
https://www.cve.org/CVERecord?id=CVE-2025-1795
|
| qpdf |
CVE-2024-24246 |
MEDIUM |
11.3.0-1+deb12u1 |
|
https://access.redhat.com/security/cve/CVE-2024-24246
https://github.com/qpdf/qpdf/issues/1123
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4WLK6ICPJUMOJNHZQWXAA5MPXG5JHZZL/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FX3D3YCNS6CQL3774OFUROLP3EM25ILC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U3N6TULMEYVCLXO47Y5W4VWCJMSB72CB/
https://nvd.nist.gov/vuln/detail/CVE-2024-24246
https://ubuntu.com/security/notices/USN-6713-1
https://www.cve.org/CVERecord?id=CVE-2024-24246
|
| systemd |
CVE-2023-50387 |
HIGH |
252.22-1~deb12u1 |
252.23-1~deb12u1 |
http://www.openwall.com/lists/oss-security/2024/02/16/2
http://www.openwall.com/lists/oss-security/2024/02/16/3
https://access.redhat.com/errata/RHSA-2024:3271
https://access.redhat.com/security/cve/CVE-2023-50387
https://blog.powerdns.com/2024/02/13/powerdns-recursor-4-8-6-4-9-3-5-0-2-released
https://bugzilla.redhat.com/2263896
https://bugzilla.redhat.com/2263914
https://bugzilla.redhat.com/2263917
https://bugzilla.redhat.com/show_bug.cgi?id=2263896
https://bugzilla.redhat.com/show_bug.cgi?id=2263897
https://bugzilla.redhat.com/show_bug.cgi?id=2263909
https://bugzilla.redhat.com/show_bug.cgi?id=2263911
https://bugzilla.redhat.com/show_bug.cgi?id=2263914
https://bugzilla.redhat.com/show_bug.cgi?id=2263917
https://bugzilla.suse.com/show_bug.cgi?id=1219823
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6516
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html
https://errata.almalinux.org/8/ALSA-2024-3271.html
https://errata.rockylinux.org/RLSA-2024:2551
https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1
https://kb.isc.org/docs/cve-2023-50387
https://linux.oracle.com/cve/CVE-2023-50387.html
https://linux.oracle.com/errata/ELSA-2024-3741.html
https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html
https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/
https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-50387
https://news.ycombinator.com/item?id=39367411
https://news.ycombinator.com/item?id=39372384
https://nlnetlabs.nl/downloads/unbound/CVE-2023-50387_CVE-2023-50868.txt
https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/
https://nvd.nist.gov/vuln/detail/CVE-2023-50387
https://security.netapp.com/advisory/ntap-20240307-0007/
https://ubuntu.com/security/notices/USN-6633-1
https://ubuntu.com/security/notices/USN-6642-1
https://ubuntu.com/security/notices/USN-6657-1
https://ubuntu.com/security/notices/USN-6657-2
https://ubuntu.com/security/notices/USN-6665-1
https://ubuntu.com/security/notices/USN-6723-1
https://www.athene-center.de/aktuelles/key-trap
https://www.athene-center.de/fileadmin/content/PDF/Technical_Report_KeyTrap.pdf
https://www.cve.org/CVERecord?id=CVE-2023-50387
https://www.isc.org/blogs/2024-bind-security-release/
https://www.knot-resolver.cz/2024-02-13-knot-resolver-5.7.1.html
https://www.securityweek.com/keytrap-dns-attack-could-disable-large-parts-of-internet-researchers/
https://www.theregister.com/2024/02/13/dnssec_vulnerability_internet/
|
| systemd |
CVE-2023-50868 |
HIGH |
252.22-1~deb12u1 |
252.23-1~deb12u1 |
http://www.openwall.com/lists/oss-security/2024/02/16/2
http://www.openwall.com/lists/oss-security/2024/02/16/3
https://access.redhat.com/errata/RHSA-2024:3271
https://access.redhat.com/security/cve/CVE-2023-50868
https://blog.powerdns.com/2024/02/13/powerdns-recursor-4-8-6-4-9-3-5-0-2-released
https://bugzilla.redhat.com/2263896
https://bugzilla.redhat.com/2263914
https://bugzilla.redhat.com/2263917
https://bugzilla.redhat.com/show_bug.cgi?id=2263896
https://bugzilla.redhat.com/show_bug.cgi?id=2263897
https://bugzilla.redhat.com/show_bug.cgi?id=2263909
https://bugzilla.redhat.com/show_bug.cgi?id=2263911
https://bugzilla.redhat.com/show_bug.cgi?id=2263914
https://bugzilla.redhat.com/show_bug.cgi?id=2263917
https://bugzilla.suse.com/show_bug.cgi?id=1219826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6516
https://datatracker.ietf.org/doc/html/rfc5155
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html
https://errata.almalinux.org/8/ALSA-2024-3271.html
https://errata.rockylinux.org/RLSA-2024:2551
https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1
https://kb.isc.org/docs/cve-2023-50868
https://linux.oracle.com/cve/CVE-2023-50868.html
https://linux.oracle.com/errata/ELSA-2024-3741.html
https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html
https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/
https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html
https://nlnetlabs.nl/downloads/unbound/CVE-2023-50387_CVE-2023-50868.txt
https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/
https://nvd.nist.gov/vuln/detail/CVE-2023-50868
https://security.netapp.com/advisory/ntap-20240307-0008/
https://ubuntu.com/security/notices/USN-6633-1
https://ubuntu.com/security/notices/USN-6642-1
https://ubuntu.com/security/notices/USN-6657-1
https://ubuntu.com/security/notices/USN-6657-2
https://ubuntu.com/security/notices/USN-6665-1
https://ubuntu.com/security/notices/USN-6723-1
https://www.cve.org/CVERecord?id=CVE-2023-50868
https://www.isc.org/blogs/2024-bind-security-release/
https://www.knot-resolver.cz/2024-02-13-knot-resolver-5.7.1.html
|
| systemd |
CVE-2025-4598 |
MEDIUM |
252.22-1~deb12u1 |
252.38-1~deb12u1 |
http://www.openwall.com/lists/oss-security/2025/06/05/1
http://www.openwall.com/lists/oss-security/2025/06/05/3
https://access.redhat.com/security/cve/CVE-2025-4598
https://blogs.oracle.com/linux/post/analysis-of-cve-2025-4598
https://bugzilla.redhat.com/show_bug.cgi?id=2369242
https://ciq.com/blog/the-real-danger-of-systemd-coredump-cve-2025-4598/
https://git.kernel.org/linus/b5325b2a270fcaf7b2a9a0f23d422ca8a5a8bdea
https://github.com/systemd/systemd/commit/0c49e0049b7665bb7769a13ef346fef92e1ad4d6 (main)
https://github.com/systemd/systemd/commit/13902e025321242b1d95c6d8b4e482b37f58cdef (main)
https://github.com/systemd/systemd/commit/49f1f2d4a7612bbed5211a73d11d6a94fbe3bb69 (main)
https://github.com/systemd/systemd/commit/76e0ab49c47965877c19772a2b3bf55f6417ca39 (main)
https://github.com/systemd/systemd/commit/868d95577ec9f862580ad365726515459be582fc (main)
https://github.com/systemd/systemd/commit/8fc7b2a211eb13ef1a94250b28e1c79cab8bdcb9 (main)
https://github.com/systemd/systemd/commit/9ce8e3e449def92c75ada41b7d10c5bc3946be77 (main)
https://github.com/systemd/systemd/commit/e6a8687b939ab21854f12f59a3cce703e32768cf (main)
https://linux.oracle.com/cve/CVE-2025-4598.html
https://linux.oracle.com/errata/ELSA-2025-20344.html
https://nvd.nist.gov/vuln/detail/CVE-2025-4598
https://ubuntu.com/security/notices/USN-7559-1
https://www.cve.org/CVERecord?id=CVE-2025-4598
https://www.openwall.com/lists/oss-security/2025/05/29/3
https://www.openwall.com/lists/oss-security/2025/08/18/3
https://www.qualys.com/2025/05/29/apport-coredump/apport-coredump.txt
|
| systemd |
CVE-2013-4392 |
LOW |
252.22-1~deb12u1 |
|
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
https://nvd.nist.gov/vuln/detail/CVE-2013-4392
https://www.cve.org/CVERecord?id=CVE-2013-4392
|
| systemd |
CVE-2023-31437 |
LOW |
252.22-1~deb12u1 |
|
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/releases
|
| systemd |
CVE-2023-31438 |
LOW |
252.22-1~deb12u1 |
|
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/pull/28886
https://github.com/systemd/systemd/releases
|
| systemd |
CVE-2023-31439 |
LOW |
252.22-1~deb12u1 |
|
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/pull/28885
https://github.com/systemd/systemd/releases
|
| systemd-sysv |
CVE-2023-50387 |
HIGH |
252.22-1~deb12u1 |
252.23-1~deb12u1 |
http://www.openwall.com/lists/oss-security/2024/02/16/2
http://www.openwall.com/lists/oss-security/2024/02/16/3
https://access.redhat.com/errata/RHSA-2024:3271
https://access.redhat.com/security/cve/CVE-2023-50387
https://blog.powerdns.com/2024/02/13/powerdns-recursor-4-8-6-4-9-3-5-0-2-released
https://bugzilla.redhat.com/2263896
https://bugzilla.redhat.com/2263914
https://bugzilla.redhat.com/2263917
https://bugzilla.redhat.com/show_bug.cgi?id=2263896
https://bugzilla.redhat.com/show_bug.cgi?id=2263897
https://bugzilla.redhat.com/show_bug.cgi?id=2263909
https://bugzilla.redhat.com/show_bug.cgi?id=2263911
https://bugzilla.redhat.com/show_bug.cgi?id=2263914
https://bugzilla.redhat.com/show_bug.cgi?id=2263917
https://bugzilla.suse.com/show_bug.cgi?id=1219823
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6516
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html
https://errata.almalinux.org/8/ALSA-2024-3271.html
https://errata.rockylinux.org/RLSA-2024:2551
https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1
https://kb.isc.org/docs/cve-2023-50387
https://linux.oracle.com/cve/CVE-2023-50387.html
https://linux.oracle.com/errata/ELSA-2024-3741.html
https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html
https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/
https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-50387
https://news.ycombinator.com/item?id=39367411
https://news.ycombinator.com/item?id=39372384
https://nlnetlabs.nl/downloads/unbound/CVE-2023-50387_CVE-2023-50868.txt
https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/
https://nvd.nist.gov/vuln/detail/CVE-2023-50387
https://security.netapp.com/advisory/ntap-20240307-0007/
https://ubuntu.com/security/notices/USN-6633-1
https://ubuntu.com/security/notices/USN-6642-1
https://ubuntu.com/security/notices/USN-6657-1
https://ubuntu.com/security/notices/USN-6657-2
https://ubuntu.com/security/notices/USN-6665-1
https://ubuntu.com/security/notices/USN-6723-1
https://www.athene-center.de/aktuelles/key-trap
https://www.athene-center.de/fileadmin/content/PDF/Technical_Report_KeyTrap.pdf
https://www.cve.org/CVERecord?id=CVE-2023-50387
https://www.isc.org/blogs/2024-bind-security-release/
https://www.knot-resolver.cz/2024-02-13-knot-resolver-5.7.1.html
https://www.securityweek.com/keytrap-dns-attack-could-disable-large-parts-of-internet-researchers/
https://www.theregister.com/2024/02/13/dnssec_vulnerability_internet/
|
| systemd-sysv |
CVE-2023-50868 |
HIGH |
252.22-1~deb12u1 |
252.23-1~deb12u1 |
http://www.openwall.com/lists/oss-security/2024/02/16/2
http://www.openwall.com/lists/oss-security/2024/02/16/3
https://access.redhat.com/errata/RHSA-2024:3271
https://access.redhat.com/security/cve/CVE-2023-50868
https://blog.powerdns.com/2024/02/13/powerdns-recursor-4-8-6-4-9-3-5-0-2-released
https://bugzilla.redhat.com/2263896
https://bugzilla.redhat.com/2263914
https://bugzilla.redhat.com/2263917
https://bugzilla.redhat.com/show_bug.cgi?id=2263896
https://bugzilla.redhat.com/show_bug.cgi?id=2263897
https://bugzilla.redhat.com/show_bug.cgi?id=2263909
https://bugzilla.redhat.com/show_bug.cgi?id=2263911
https://bugzilla.redhat.com/show_bug.cgi?id=2263914
https://bugzilla.redhat.com/show_bug.cgi?id=2263917
https://bugzilla.suse.com/show_bug.cgi?id=1219826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6516
https://datatracker.ietf.org/doc/html/rfc5155
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html
https://errata.almalinux.org/8/ALSA-2024-3271.html
https://errata.rockylinux.org/RLSA-2024:2551
https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1
https://kb.isc.org/docs/cve-2023-50868
https://linux.oracle.com/cve/CVE-2023-50868.html
https://linux.oracle.com/errata/ELSA-2024-3741.html
https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html
https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/
https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html
https://nlnetlabs.nl/downloads/unbound/CVE-2023-50387_CVE-2023-50868.txt
https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/
https://nvd.nist.gov/vuln/detail/CVE-2023-50868
https://security.netapp.com/advisory/ntap-20240307-0008/
https://ubuntu.com/security/notices/USN-6633-1
https://ubuntu.com/security/notices/USN-6642-1
https://ubuntu.com/security/notices/USN-6657-1
https://ubuntu.com/security/notices/USN-6657-2
https://ubuntu.com/security/notices/USN-6665-1
https://ubuntu.com/security/notices/USN-6723-1
https://www.cve.org/CVERecord?id=CVE-2023-50868
https://www.isc.org/blogs/2024-bind-security-release/
https://www.knot-resolver.cz/2024-02-13-knot-resolver-5.7.1.html
|
| systemd-sysv |
CVE-2025-4598 |
MEDIUM |
252.22-1~deb12u1 |
252.38-1~deb12u1 |
http://www.openwall.com/lists/oss-security/2025/06/05/1
http://www.openwall.com/lists/oss-security/2025/06/05/3
https://access.redhat.com/security/cve/CVE-2025-4598
https://blogs.oracle.com/linux/post/analysis-of-cve-2025-4598
https://bugzilla.redhat.com/show_bug.cgi?id=2369242
https://ciq.com/blog/the-real-danger-of-systemd-coredump-cve-2025-4598/
https://git.kernel.org/linus/b5325b2a270fcaf7b2a9a0f23d422ca8a5a8bdea
https://github.com/systemd/systemd/commit/0c49e0049b7665bb7769a13ef346fef92e1ad4d6 (main)
https://github.com/systemd/systemd/commit/13902e025321242b1d95c6d8b4e482b37f58cdef (main)
https://github.com/systemd/systemd/commit/49f1f2d4a7612bbed5211a73d11d6a94fbe3bb69 (main)
https://github.com/systemd/systemd/commit/76e0ab49c47965877c19772a2b3bf55f6417ca39 (main)
https://github.com/systemd/systemd/commit/868d95577ec9f862580ad365726515459be582fc (main)
https://github.com/systemd/systemd/commit/8fc7b2a211eb13ef1a94250b28e1c79cab8bdcb9 (main)
https://github.com/systemd/systemd/commit/9ce8e3e449def92c75ada41b7d10c5bc3946be77 (main)
https://github.com/systemd/systemd/commit/e6a8687b939ab21854f12f59a3cce703e32768cf (main)
https://linux.oracle.com/cve/CVE-2025-4598.html
https://linux.oracle.com/errata/ELSA-2025-20344.html
https://nvd.nist.gov/vuln/detail/CVE-2025-4598
https://ubuntu.com/security/notices/USN-7559-1
https://www.cve.org/CVERecord?id=CVE-2025-4598
https://www.openwall.com/lists/oss-security/2025/05/29/3
https://www.openwall.com/lists/oss-security/2025/08/18/3
https://www.qualys.com/2025/05/29/apport-coredump/apport-coredump.txt
|
| systemd-sysv |
CVE-2013-4392 |
LOW |
252.22-1~deb12u1 |
|
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
https://nvd.nist.gov/vuln/detail/CVE-2013-4392
https://www.cve.org/CVERecord?id=CVE-2013-4392
|
| systemd-sysv |
CVE-2023-31437 |
LOW |
252.22-1~deb12u1 |
|
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/releases
|
| systemd-sysv |
CVE-2023-31438 |
LOW |
252.22-1~deb12u1 |
|
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/pull/28886
https://github.com/systemd/systemd/releases
|
| systemd-sysv |
CVE-2023-31439 |
LOW |
252.22-1~deb12u1 |
|
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/pull/28885
https://github.com/systemd/systemd/releases
|
| sysvinit-utils |
TEMP-0517018-A83CE6 |
LOW |
3.06-4 |
|
|
| tar |
CVE-2005-2541 |
LOW |
1.34+dfsg-1.2+deb12u1 |
|
http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://access.redhat.com/security/cve/CVE-2005-2541
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2005-2541
https://www.cve.org/CVERecord?id=CVE-2005-2541
|
| tar |
TEMP-0290435-0B57B5 |
LOW |
1.34+dfsg-1.2+deb12u1 |
|
|
| udev |
CVE-2023-50387 |
HIGH |
252.22-1~deb12u1 |
252.23-1~deb12u1 |
http://www.openwall.com/lists/oss-security/2024/02/16/2
http://www.openwall.com/lists/oss-security/2024/02/16/3
https://access.redhat.com/errata/RHSA-2024:3271
https://access.redhat.com/security/cve/CVE-2023-50387
https://blog.powerdns.com/2024/02/13/powerdns-recursor-4-8-6-4-9-3-5-0-2-released
https://bugzilla.redhat.com/2263896
https://bugzilla.redhat.com/2263914
https://bugzilla.redhat.com/2263917
https://bugzilla.redhat.com/show_bug.cgi?id=2263896
https://bugzilla.redhat.com/show_bug.cgi?id=2263897
https://bugzilla.redhat.com/show_bug.cgi?id=2263909
https://bugzilla.redhat.com/show_bug.cgi?id=2263911
https://bugzilla.redhat.com/show_bug.cgi?id=2263914
https://bugzilla.redhat.com/show_bug.cgi?id=2263917
https://bugzilla.suse.com/show_bug.cgi?id=1219823
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6516
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html
https://errata.almalinux.org/8/ALSA-2024-3271.html
https://errata.rockylinux.org/RLSA-2024:2551
https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1
https://kb.isc.org/docs/cve-2023-50387
https://linux.oracle.com/cve/CVE-2023-50387.html
https://linux.oracle.com/errata/ELSA-2024-3741.html
https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html
https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/
https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-50387
https://news.ycombinator.com/item?id=39367411
https://news.ycombinator.com/item?id=39372384
https://nlnetlabs.nl/downloads/unbound/CVE-2023-50387_CVE-2023-50868.txt
https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/
https://nvd.nist.gov/vuln/detail/CVE-2023-50387
https://security.netapp.com/advisory/ntap-20240307-0007/
https://ubuntu.com/security/notices/USN-6633-1
https://ubuntu.com/security/notices/USN-6642-1
https://ubuntu.com/security/notices/USN-6657-1
https://ubuntu.com/security/notices/USN-6657-2
https://ubuntu.com/security/notices/USN-6665-1
https://ubuntu.com/security/notices/USN-6723-1
https://www.athene-center.de/aktuelles/key-trap
https://www.athene-center.de/fileadmin/content/PDF/Technical_Report_KeyTrap.pdf
https://www.cve.org/CVERecord?id=CVE-2023-50387
https://www.isc.org/blogs/2024-bind-security-release/
https://www.knot-resolver.cz/2024-02-13-knot-resolver-5.7.1.html
https://www.securityweek.com/keytrap-dns-attack-could-disable-large-parts-of-internet-researchers/
https://www.theregister.com/2024/02/13/dnssec_vulnerability_internet/
|
| udev |
CVE-2023-50868 |
HIGH |
252.22-1~deb12u1 |
252.23-1~deb12u1 |
http://www.openwall.com/lists/oss-security/2024/02/16/2
http://www.openwall.com/lists/oss-security/2024/02/16/3
https://access.redhat.com/errata/RHSA-2024:3271
https://access.redhat.com/security/cve/CVE-2023-50868
https://blog.powerdns.com/2024/02/13/powerdns-recursor-4-8-6-4-9-3-5-0-2-released
https://bugzilla.redhat.com/2263896
https://bugzilla.redhat.com/2263914
https://bugzilla.redhat.com/2263917
https://bugzilla.redhat.com/show_bug.cgi?id=2263896
https://bugzilla.redhat.com/show_bug.cgi?id=2263897
https://bugzilla.redhat.com/show_bug.cgi?id=2263909
https://bugzilla.redhat.com/show_bug.cgi?id=2263911
https://bugzilla.redhat.com/show_bug.cgi?id=2263914
https://bugzilla.redhat.com/show_bug.cgi?id=2263917
https://bugzilla.suse.com/show_bug.cgi?id=1219826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6516
https://datatracker.ietf.org/doc/html/rfc5155
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html
https://errata.almalinux.org/8/ALSA-2024-3271.html
https://errata.rockylinux.org/RLSA-2024:2551
https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1
https://kb.isc.org/docs/cve-2023-50868
https://linux.oracle.com/cve/CVE-2023-50868.html
https://linux.oracle.com/errata/ELSA-2024-3741.html
https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html
https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/
https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html
https://nlnetlabs.nl/downloads/unbound/CVE-2023-50387_CVE-2023-50868.txt
https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/
https://nvd.nist.gov/vuln/detail/CVE-2023-50868
https://security.netapp.com/advisory/ntap-20240307-0008/
https://ubuntu.com/security/notices/USN-6633-1
https://ubuntu.com/security/notices/USN-6642-1
https://ubuntu.com/security/notices/USN-6657-1
https://ubuntu.com/security/notices/USN-6657-2
https://ubuntu.com/security/notices/USN-6665-1
https://ubuntu.com/security/notices/USN-6723-1
https://www.cve.org/CVERecord?id=CVE-2023-50868
https://www.isc.org/blogs/2024-bind-security-release/
https://www.knot-resolver.cz/2024-02-13-knot-resolver-5.7.1.html
|
| udev |
CVE-2025-4598 |
MEDIUM |
252.22-1~deb12u1 |
252.38-1~deb12u1 |
http://www.openwall.com/lists/oss-security/2025/06/05/1
http://www.openwall.com/lists/oss-security/2025/06/05/3
https://access.redhat.com/security/cve/CVE-2025-4598
https://blogs.oracle.com/linux/post/analysis-of-cve-2025-4598
https://bugzilla.redhat.com/show_bug.cgi?id=2369242
https://ciq.com/blog/the-real-danger-of-systemd-coredump-cve-2025-4598/
https://git.kernel.org/linus/b5325b2a270fcaf7b2a9a0f23d422ca8a5a8bdea
https://github.com/systemd/systemd/commit/0c49e0049b7665bb7769a13ef346fef92e1ad4d6 (main)
https://github.com/systemd/systemd/commit/13902e025321242b1d95c6d8b4e482b37f58cdef (main)
https://github.com/systemd/systemd/commit/49f1f2d4a7612bbed5211a73d11d6a94fbe3bb69 (main)
https://github.com/systemd/systemd/commit/76e0ab49c47965877c19772a2b3bf55f6417ca39 (main)
https://github.com/systemd/systemd/commit/868d95577ec9f862580ad365726515459be582fc (main)
https://github.com/systemd/systemd/commit/8fc7b2a211eb13ef1a94250b28e1c79cab8bdcb9 (main)
https://github.com/systemd/systemd/commit/9ce8e3e449def92c75ada41b7d10c5bc3946be77 (main)
https://github.com/systemd/systemd/commit/e6a8687b939ab21854f12f59a3cce703e32768cf (main)
https://linux.oracle.com/cve/CVE-2025-4598.html
https://linux.oracle.com/errata/ELSA-2025-20344.html
https://nvd.nist.gov/vuln/detail/CVE-2025-4598
https://ubuntu.com/security/notices/USN-7559-1
https://www.cve.org/CVERecord?id=CVE-2025-4598
https://www.openwall.com/lists/oss-security/2025/05/29/3
https://www.openwall.com/lists/oss-security/2025/08/18/3
https://www.qualys.com/2025/05/29/apport-coredump/apport-coredump.txt
|
| udev |
CVE-2013-4392 |
LOW |
252.22-1~deb12u1 |
|
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
https://nvd.nist.gov/vuln/detail/CVE-2013-4392
https://www.cve.org/CVERecord?id=CVE-2013-4392
|
| udev |
CVE-2023-31437 |
LOW |
252.22-1~deb12u1 |
|
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/releases
|
| udev |
CVE-2023-31438 |
LOW |
252.22-1~deb12u1 |
|
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/pull/28886
https://github.com/systemd/systemd/releases
|
| udev |
CVE-2023-31439 |
LOW |
252.22-1~deb12u1 |
|
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/pull/28885
https://github.com/systemd/systemd/releases
|
| uno-libs-private |
CVE-2012-5639 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://www.openwall.com/lists/oss-security/2012/12/14/1
http://www.openwall.com/lists/oss-security/2023/12/28/6
http://www.openwall.com/lists/oss-security/2024/01/03/6
http://www.openwall.com/lists/oss-security/2024/01/03/7
https://access.redhat.com/security/cve/CVE-2012-5639
https://access.redhat.com/security/cve/cve-2012-5639
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5639
https://lists.apache.org/thread.html/r253f92d0e6511d07a79774002e1d9db1d20b24bff27914a5adb14ccb%40%3Cissues.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2012-5639
https://security-tracker.debian.org/tracker/CVE-2012-5639
https://www.cve.org/CVERecord?id=CVE-2012-5639
|
| uno-libs-private |
CVE-2018-10583 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://seclists.org/fulldisclosure/2020/Oct/26
http://secureyourit.co.uk/wp/2018/05/01/creating-malicious-odt-files/
https://access.redhat.com/errata/RHSA-2018:3054
https://access.redhat.com/security/cve/CVE-2018-10583
https://lists.apache.org/thread.html/0598708912978b27121b2e380b44a225c706aca882cd1da6a955a0af%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/6c65f22306c36c95e75f8d2b7f49cfcbeb0a4614245c20934612a39d%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/c8fd59ac77b42aac90eb5c59b87f3ab59b5e0c3bfb4819aa649a2909%40%3Cdev.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-10583
https://security-tracker.debian.org/tracker/CVE-2018-10583
https://ubuntu.com/security/notices/USN-3883-1
https://usn.ubuntu.com/3883-1/
https://www.cve.org/CVERecord?id=CVE-2018-10583
https://www.exploit-db.com/exploits/44564/
|
| ure |
CVE-2012-5639 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://www.openwall.com/lists/oss-security/2012/12/14/1
http://www.openwall.com/lists/oss-security/2023/12/28/6
http://www.openwall.com/lists/oss-security/2024/01/03/6
http://www.openwall.com/lists/oss-security/2024/01/03/7
https://access.redhat.com/security/cve/CVE-2012-5639
https://access.redhat.com/security/cve/cve-2012-5639
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5639
https://lists.apache.org/thread.html/r253f92d0e6511d07a79774002e1d9db1d20b24bff27914a5adb14ccb%40%3Cissues.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2012-5639
https://security-tracker.debian.org/tracker/CVE-2012-5639
https://www.cve.org/CVERecord?id=CVE-2012-5639
|
| ure |
CVE-2018-10583 |
LOW |
4:24.2.3-1~bpo12+1 |
|
http://seclists.org/fulldisclosure/2020/Oct/26
http://secureyourit.co.uk/wp/2018/05/01/creating-malicious-odt-files/
https://access.redhat.com/errata/RHSA-2018:3054
https://access.redhat.com/security/cve/CVE-2018-10583
https://lists.apache.org/thread.html/0598708912978b27121b2e380b44a225c706aca882cd1da6a955a0af%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/6c65f22306c36c95e75f8d2b7f49cfcbeb0a4614245c20934612a39d%40%3Cdev.openoffice.apache.org%3E
https://lists.apache.org/thread.html/c8fd59ac77b42aac90eb5c59b87f3ab59b5e0c3bfb4819aa649a2909%40%3Cdev.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-10583
https://security-tracker.debian.org/tracker/CVE-2018-10583
https://ubuntu.com/security/notices/USN-3883-1
https://usn.ubuntu.com/3883-1/
https://www.cve.org/CVERecord?id=CVE-2018-10583
https://www.exploit-db.com/exploits/44564/
|
| util-linux |
CVE-2022-0563 |
LOW |
2.38.1-5+deb12u1 |
|
https://access.redhat.com/security/cve/CVE-2022-0563
https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u
https://lore.kernel.org/util-linux/[email protected]/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.gentoo.org/glsa/202401-08
https://security.netapp.com/advisory/ntap-20220331-0002/
https://www.cve.org/CVERecord?id=CVE-2022-0563
|
| util-linux-extra |
CVE-2022-0563 |
LOW |
2.38.1-5+deb12u1 |
|
https://access.redhat.com/security/cve/CVE-2022-0563
https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u
https://lore.kernel.org/util-linux/[email protected]/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.gentoo.org/glsa/202401-08
https://security.netapp.com/advisory/ntap-20220331-0002/
https://www.cve.org/CVERecord?id=CVE-2022-0563
|
| wget |
CVE-2024-38428 |
CRITICAL |
1.21.3-1+b2 |
1.21.3-1+deb12u1 |
https://access.redhat.com/errata/RHSA-2024:5299
https://access.redhat.com/security/cve/CVE-2024-38428
https://bugzilla.redhat.com/2292836
https://bugzilla.redhat.com/show_bug.cgi?id=2292836
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38428
https://errata.almalinux.org/8/ALSA-2024-5299.html
https://errata.rockylinux.org/RLSA-2024:5299
https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ed0c7c7e0e8f7298352646b2fd6e06a11e242ace
https://linux.oracle.com/cve/CVE-2024-38428.html
https://linux.oracle.com/errata/ELSA-2024-6192.html
https://lists.debian.org/debian-lts-announce/2025/04/msg00029.html
https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2024-38428
https://security.netapp.com/advisory/ntap-20241115-0005/
https://ubuntu.com/security/notices/USN-6852-1
https://ubuntu.com/security/notices/USN-6852-2
https://www.cve.org/CVERecord?id=CVE-2024-38428
|
| wget |
CVE-2021-31879 |
MEDIUM |
1.21.3-1+b2 |
|
https://access.redhat.com/security/cve/CVE-2021-31879
https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html
https://nvd.nist.gov/vuln/detail/CVE-2021-31879
https://savannah.gnu.org/bugs/?56909
https://security.netapp.com/advisory/ntap-20210618-0002/
https://www.cve.org/CVERecord?id=CVE-2021-31879
|
| wget |
CVE-2024-10524 |
MEDIUM |
1.21.3-1+b2 |
|
http://www.openwall.com/lists/oss-security/2024/11/18/6
https://access.redhat.com/security/cve/CVE-2024-10524
https://git.savannah.gnu.org/cgit/wget.git/commit/?id=c419542d956a2607bbce5df64b9d378a8588d778
https://jfrog.com/blog/cve-2024-10524-wget-zero-day-vulnerability/
https://nvd.nist.gov/vuln/detail/CVE-2024-10524
https://seclists.org/oss-sec/2024/q4/107
https://security.netapp.com/advisory/ntap-20250321-0007/
https://www.cve.org/CVERecord?id=CVE-2024-10524
|
| xdg-utils |
CVE-2022-4055 |
HIGH |
1.1.3-4.1 |
|
https://access.redhat.com/errata/RHSA-2025:7672
https://access.redhat.com/security/cve/CVE-2022-4055
https://bugzilla.redhat.com/2143792
https://errata.almalinux.org/9/ALSA-2025-7672.html
https://gitlab.freedesktop.org/xdg/xdg-utils/-/issues/205
https://gitlab.freedesktop.org/xdg/xdg-utils/-/issues/205#note_1494267
https://linux.oracle.com/cve/CVE-2022-4055.html
https://linux.oracle.com/errata/ELSA-2025-7672.html
https://nvd.nist.gov/vuln/detail/CVE-2022-4055
https://www.cve.org/CVERecord?id=CVE-2022-4055
|
| xdg-utils |
CVE-2020-27748 |
MEDIUM |
1.1.3-4.1 |
|
https://access.redhat.com/security/cve/CVE-2020-27748
https://bugzilla.redhat.com/show_bug.cgi?id=1899769
https://gitlab.freedesktop.org/xdg/xdg-utils/-/issues/177
https://nvd.nist.gov/vuln/detail/CVE-2020-27748
https://www.cve.org/CVERecord?id=CVE-2020-27748
|
| xdg-utils |
CVE-2025-52968 |
LOW |
1.1.3-4.1 |
|
https://access.redhat.com/security/cve/CVE-2025-52968
https://cgit.freedesktop.org/xdg/xdg-utils/tag/?h=v1.2.1
https://nvd.nist.gov/vuln/detail/CVE-2025-52968
https://www.cve.org/CVERecord?id=CVE-2025-52968
https://www.openwall.com/lists/oss-security/2025/06/23/1
|
| zlib1g |
CVE-2023-45853 |
CRITICAL |
1:1.2.13.dfsg-1 |
|
http://www.openwall.com/lists/oss-security/2023/10/20/9
http://www.openwall.com/lists/oss-security/2024/01/24/10
https://access.redhat.com/security/cve/CVE-2023-45853
https://chromium.googlesource.com/chromium/src/+/d709fb23806858847131027da95ef4c548813356
https://chromium.googlesource.com/chromium/src/+/de29dd6c7151d3cd37cb4cf0036800ddfb1d8b61
https://github.com/madler/zlib/blob/ac8f12c97d1afd9bafa9c710f827d40a407d3266/contrib/README.contrib#L1-L4
https://github.com/madler/zlib/commit/73331a6a0481067628f065ffe87bb1d8f787d10c
https://github.com/madler/zlib/pull/843
https://github.com/smihica/pyminizip
https://github.com/smihica/pyminizip/blob/master/zlib-1.2.11/contrib/minizip/zip.c
https://lists.debian.org/debian-lts-announce/2023/11/msg00026.html
https://nvd.nist.gov/vuln/detail/CVE-2023-45853
https://pypi.org/project/pyminizip/#history
https://security.gentoo.org/glsa/202401-18
https://security.netapp.com/advisory/ntap-20231130-0009
https://security.netapp.com/advisory/ntap-20231130-0009/
https://ubuntu.com/security/notices/USN-7107-1
https://www.cve.org/CVERecord?id=CVE-2023-45853
https://www.winimage.com/zLibDll/minizip.html
|
| No Misconfigurations found |
| org.apache.commons:commons-lang3 |
CVE-2025-48924 |
MEDIUM |
3.12.0 |
3.18.0 |
https://access.redhat.com/security/cve/CVE-2025-48924
https://github.com/apache/commons-lang
https://github.com/apache/commons-lang/commit/b424803abdb2bec818e4fbcb251ce031c22aca53
https://lists.apache.org/thread/bgv0lpswokgol11tloxnjfzdl7yrc1g1
https://nvd.nist.gov/vuln/detail/CVE-2025-48924
https://www.cve.org/CVERecord?id=CVE-2025-48924
|
| No Misconfigurations found |
| github.com/golang-jwt/jwt |
CVE-2025-30204 |
HIGH |
v3.2.2+incompatible |
|
https://access.redhat.com/errata/RHSA-2025:7967
https://access.redhat.com/security/cve/CVE-2025-30204
https://bugzilla.redhat.com/2354195
https://bugzilla.redhat.com/show_bug.cgi?id=2347423
https://bugzilla.redhat.com/show_bug.cgi?id=2348366
https://bugzilla.redhat.com/show_bug.cgi?id=2352914
https://bugzilla.redhat.com/show_bug.cgi?id=2354195
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27144
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-29786
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30204
https://errata.almalinux.org/8/ALSA-2025-7967.html
https://errata.rockylinux.org/RLSA-2025:7479
https://github.com/golang-jwt/jwt
https://github.com/golang-jwt/jwt/commit/0951d184286dece21f73c85673fd308786ffe9c3
https://github.com/golang-jwt/jwt/commit/bf316c48137a1212f8d0af9288cc9ce8e59f1afb
https://github.com/golang-jwt/jwt/security/advisories/GHSA-mh63-6h87-95cp
https://linux.oracle.com/cve/CVE-2025-30204.html
https://linux.oracle.com/errata/ELSA-2025-7967.html
https://nvd.nist.gov/vuln/detail/CVE-2025-30204
https://pkg.go.dev/vuln/GO-2025-3553
https://security.netapp.com/advisory/ntap-20250404-0002
https://security.netapp.com/advisory/ntap-20250404-0002/
https://www.cve.org/CVERecord?id=CVE-2025-30204
|
| github.com/mholt/archiver/v3 |
CVE-2025-3445 |
HIGH |
v3.5.1 |
|
https://access.redhat.com/security/cve/CVE-2025-3445
https://github.com/mholt/archiver
https://github.com/mholt/archiver/
https://github.com/mholt/archiver/commit/fea250ac6eacd56f90a82fbe2481cfdbb9a1bbd1
https://github.com/mholt/archiver/issues/267
https://nvd.nist.gov/vuln/detail/CVE-2025-3445
https://www.cve.org/CVERecord?id=CVE-2025-3445
|
| github.com/mholt/archiver/v3 |
CVE-2024-0406 |
MEDIUM |
v3.5.1 |
|
https://access.redhat.com/errata/RHSA-2025:2449
https://access.redhat.com/security/cve/CVE-2024-0406
https://bugzilla.redhat.com/show_bug.cgi?id=2257749
https://github.com/mholt/archiver
https://nvd.nist.gov/vuln/detail/CVE-2024-0406
https://pkg.go.dev/vuln/GO-2024-2698
https://www.cve.org/CVERecord?id=CVE-2024-0406
|
| github.com/ulikunitz/xz |
CVE-2025-58058 |
MEDIUM |
v0.5.12 |
0.5.15 |
https://access.redhat.com/security/cve/CVE-2025-58058
https://github.com/ulikunitz/xz
https://github.com/ulikunitz/xz/commit/88ddf1d0d98d688db65de034f48960b2760d2ae2
https://github.com/ulikunitz/xz/security/advisories/GHSA-jc7w-c686-c4v9
https://nvd.nist.gov/vuln/detail/CVE-2025-58058
https://www.cve.org/CVERecord?id=CVE-2025-58058
|
| golang.org/x/crypto |
CVE-2024-45337 |
CRITICAL |
v0.24.0 |
0.31.0 |
http://www.openwall.com/lists/oss-security/2024/12/11/2
https://access.redhat.com/security/cve/CVE-2024-45337
https://github.com/golang/crypto
https://github.com/golang/crypto/commit/b4f1988a35dee11ec3e05d6bf3e90b695fbd8909
https://go.dev/cl/635315
https://go.dev/issue/70779
https://groups.google.com/g/golang-announce/c/-nPEi39gI4Q/m/cGVPJCqdAQAJ
https://nvd.nist.gov/vuln/detail/CVE-2024-45337
https://pkg.go.dev/vuln/GO-2024-3321
https://security.netapp.com/advisory/ntap-20250131-0007
https://security.netapp.com/advisory/ntap-20250131-0007/
https://www.cve.org/CVERecord?id=CVE-2024-45337
|
| golang.org/x/crypto |
CVE-2025-22869 |
HIGH |
v0.24.0 |
0.35.0 |
https://access.redhat.com/errata/RHSA-2025:7484
https://access.redhat.com/security/cve/CVE-2025-22869
https://bugzilla.redhat.com/2348367
https://bugzilla.redhat.com/show_bug.cgi?id=2348367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22869
https://errata.almalinux.org/10/ALSA-2025-7484.html
https://errata.rockylinux.org/RLSA-2025:7484
https://github.com/golang/crypto
https://github.com/golang/crypto/commit/7292932d45d55c7199324ab0027cc86e8198aa22
https://go-review.googlesource.com/c/crypto/+/652135
https://go.dev/cl/652135
https://go.dev/issue/71931
https://linux.oracle.com/cve/CVE-2025-22869.html
https://linux.oracle.com/errata/ELSA-2025-7484.html
https://nvd.nist.gov/vuln/detail/CVE-2025-22869
https://pkg.go.dev/vuln/GO-2025-3487
https://security.netapp.com/advisory/ntap-20250411-0010
https://security.netapp.com/advisory/ntap-20250411-0010/
https://www.cve.org/CVERecord?id=CVE-2025-22869
|
| golang.org/x/image |
CVE-2024-24792 |
HIGH |
v0.17.0 |
0.18.0 |
https://cs.opensource.google/go/x/image
https://go.dev/cl/588115
https://go.dev/issue/67624
https://nvd.nist.gov/vuln/detail/CVE-2024-24792
https://pkg.go.dev/vuln/GO-2024-2937
|
| golang.org/x/net |
CVE-2025-22870 |
MEDIUM |
v0.26.0 |
0.36.0 |
http://www.openwall.com/lists/oss-security/2025/03/07/2
https://access.redhat.com/security/cve/CVE-2025-22870
https://github.com/golang/go/issues/71984
https://go-review.googlesource.com/q/project:net
https://go.dev/cl/654697
https://go.dev/issue/71984
https://groups.google.com/g/golang-announce/c/4t3lzH3I0eI/m/b42ImqrBAQAJ
https://nvd.nist.gov/vuln/detail/CVE-2025-22870
https://pkg.go.dev/vuln/GO-2025-3503
https://security.netapp.com/advisory/ntap-20250509-0007
https://security.netapp.com/advisory/ntap-20250509-0007/
https://ubuntu.com/security/notices/USN-7574-1
https://www.cve.org/CVERecord?id=CVE-2025-22870
|
| golang.org/x/net |
CVE-2025-22872 |
MEDIUM |
v0.26.0 |
0.38.0 |
https://access.redhat.com/security/cve/CVE-2025-22872
https://github.com/advisories/GHSA-vvgc-356p-c3xw
https://go.dev/cl/662715
https://go.dev/issue/73070
https://groups.google.com/g/golang-announce/c/ezSKR9vqbqA
https://nvd.nist.gov/vuln/detail/CVE-2025-22872
https://pkg.go.dev/vuln/GO-2025-3595
https://security.netapp.com/advisory/ntap-20250516-0007
https://security.netapp.com/advisory/ntap-20250516-0007/
https://www.cve.org/CVERecord?id=CVE-2025-22872
|
| stdlib |
CVE-2024-34156 |
HIGH |
v1.22.4 |
1.22.7, 1.23.1 |
https://access.redhat.com/errata/RHSA-2024:8038
https://access.redhat.com/security/cve/CVE-2024-34156
https://bugzilla.redhat.com/2268017
https://bugzilla.redhat.com/2310527
https://bugzilla.redhat.com/2310528
https://bugzilla.redhat.com/2310529
https://bugzilla.redhat.com/show_bug.cgi?id=2310528
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34156
https://errata.almalinux.org/8/ALSA-2024-8038.html
https://errata.rockylinux.org/RLSA-2024:8111
https://github.com/golang/go/commit/2092294f2b097c5828f4eace6c98a322c1510b01 (go1.22.7)
https://github.com/golang/go/commit/fa8ff1a46deb6c816304441ec6740ec112e19012 (go1.23.1)
https://go.dev/cl/611239
https://go.dev/issue/69139
https://groups.google.com/g/golang-announce/c/K-cEzDeCtpc
https://groups.google.com/g/golang-dev/c/S9POB9NCTdk
https://linux.oracle.com/cve/CVE-2024-34156.html
https://linux.oracle.com/errata/ELSA-2025-3773.html
https://nvd.nist.gov/vuln/detail/CVE-2024-34156
https://pkg.go.dev/vuln/GO-2024-3106
https://security.netapp.com/advisory/ntap-20240926-0004/
https://ubuntu.com/security/notices/USN-7081-1
https://ubuntu.com/security/notices/USN-7109-1
https://ubuntu.com/security/notices/USN-7111-1
https://www.cve.org/CVERecord?id=CVE-2024-34156
|
| stdlib |
CVE-2025-47907 |
HIGH |
v1.22.4 |
1.23.12, 1.24.6 |
https://access.redhat.com/security/cve/CVE-2025-47907
https://go.dev/cl/693735
https://go.dev/issue/74831
https://groups.google.com/g/golang-announce/c/x5MKroML2yM
https://nvd.nist.gov/vuln/detail/CVE-2025-47907
https://pkg.go.dev/vuln/GO-2025-3849
https://www.cve.org/CVERecord?id=CVE-2025-47907
|
| stdlib |
CVE-2024-24791 |
MEDIUM |
v1.22.4 |
1.21.12, 1.22.5 |
https://access.redhat.com/errata/RHSA-2024:7349
https://access.redhat.com/security/cve/CVE-2024-24791
https://bugzilla.redhat.com/2295310
https://bugzilla.redhat.com/show_bug.cgi?id=2295310
https://bugzilla.redhat.com/show_bug.cgi?id=2310527
https://bugzilla.redhat.com/show_bug.cgi?id=2310528
https://bugzilla.redhat.com/show_bug.cgi?id=2310529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24791
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34156
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34158
https://errata.almalinux.org/8/ALSA-2024-7349.html
https://errata.rockylinux.org/RLSA-2024:6913
https://go.dev/cl/591255
https://go.dev/issue/67555
https://groups.google.com/g/golang-dev/c/t0rK-qHBqzY/m/6MMoAZkMAgAJ
https://linux.oracle.com/cve/CVE-2024-24791.html
https://linux.oracle.com/errata/ELSA-2025-7256.html
https://nvd.nist.gov/vuln/detail/CVE-2024-24791
https://pkg.go.dev/vuln/GO-2024-2963
https://security.netapp.com/advisory/ntap-20241004-0004/
https://ubuntu.com/security/notices/USN-7081-1
https://ubuntu.com/security/notices/USN-7109-1
https://ubuntu.com/security/notices/USN-7111-1
https://www.cve.org/CVERecord?id=CVE-2024-24791
|
| stdlib |
CVE-2024-34155 |
MEDIUM |
v1.22.4 |
1.22.7, 1.23.1 |
https://access.redhat.com/errata/RHSA-2024:8038
https://access.redhat.com/security/cve/CVE-2024-34155
https://bugzilla.redhat.com/2268017
https://bugzilla.redhat.com/2310527
https://bugzilla.redhat.com/2310528
https://bugzilla.redhat.com/2310529
https://bugzilla.redhat.com/show_bug.cgi?id=2310527
https://bugzilla.redhat.com/show_bug.cgi?id=2310528
https://bugzilla.redhat.com/show_bug.cgi?id=2310529
https://bugzilla.redhat.com/show_bug.cgi?id=2315691
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34156
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34158
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9341
https://errata.almalinux.org/8/ALSA-2024-8038.html
https://errata.rockylinux.org/RLSA-2024:8039
https://github.com/golang/go/commit/53487e5477151ed75da50e50a0ba8f1ca64c00a3 (go1.23.1)
https://github.com/golang/go/commit/b232596139dbe96a62edbe3a2a203e856bf556eb (go1.22.7)
https://go.dev/cl/611238
https://go.dev/issue/69138
https://groups.google.com/g/golang-announce/c/K-cEzDeCtpc
https://groups.google.com/g/golang-dev/c/S9POB9NCTdk
https://linux.oracle.com/cve/CVE-2024-34155.html
https://linux.oracle.com/errata/ELSA-2024-9459.html
https://nvd.nist.gov/vuln/detail/CVE-2024-34155
https://pkg.go.dev/vuln/GO-2024-3105
https://security.netapp.com/advisory/ntap-20240926-0005/
https://ubuntu.com/security/notices/USN-7081-1
https://ubuntu.com/security/notices/USN-7109-1
https://ubuntu.com/security/notices/USN-7111-1
https://www.cve.org/CVERecord?id=CVE-2024-34155
|
| stdlib |
CVE-2024-34158 |
MEDIUM |
v1.22.4 |
1.22.7, 1.23.1 |
https://access.redhat.com/errata/RHSA-2024:8038
https://access.redhat.com/security/cve/CVE-2024-34158
https://bugzilla.redhat.com/2268017
https://bugzilla.redhat.com/2310527
https://bugzilla.redhat.com/2310528
https://bugzilla.redhat.com/2310529
https://bugzilla.redhat.com/show_bug.cgi?id=2310527
https://bugzilla.redhat.com/show_bug.cgi?id=2310528
https://bugzilla.redhat.com/show_bug.cgi?id=2310529
https://bugzilla.redhat.com/show_bug.cgi?id=2315691
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34156
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34158
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9341
https://errata.almalinux.org/8/ALSA-2024-8038.html
https://errata.rockylinux.org/RLSA-2024:8039
https://github.com/golang/go/commit/032ac075c20c01c6c35a672d1542d3e98eab84ea (go1.23.1)
https://github.com/golang/go/commit/d4c53812e6ce2ac368173d7fcd31d0ecfcffb002 (go1.22.7)
https://go.dev/cl/611240
https://go.dev/issue/69141
https://groups.google.com/g/golang-announce/c/K-cEzDeCtpc
https://groups.google.com/g/golang-dev/c/S9POB9NCTdk
https://linux.oracle.com/cve/CVE-2024-34158.html
https://linux.oracle.com/errata/ELSA-2025-7118.html
https://nvd.nist.gov/vuln/detail/CVE-2024-34158
https://pkg.go.dev/vuln/GO-2024-3107
https://security.netapp.com/advisory/ntap-20241004-0003/
https://ubuntu.com/security/notices/USN-7081-1
https://ubuntu.com/security/notices/USN-7109-1
https://ubuntu.com/security/notices/USN-7111-1
https://www.cve.org/CVERecord?id=CVE-2024-34158
|
| stdlib |
CVE-2024-45336 |
MEDIUM |
v1.22.4 |
1.22.11, 1.23.5, 1.24.0-rc.2 |
https://access.redhat.com/errata/RHSA-2025:3772
https://access.redhat.com/security/cve/CVE-2024-45336
https://bugzilla.redhat.com/2341750
https://bugzilla.redhat.com/2341751
https://bugzilla.redhat.com/show_bug.cgi?id=2341751
https://bugzilla.redhat.com/show_bug.cgi?id=2362345
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45336
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3931
https://errata.almalinux.org/8/ALSA-2025-3772.html
https://errata.rockylinux.org/RLSA-2025:7592
https://go.dev/cl/643100
https://go.dev/issue/70530
https://groups.google.com/g/golang-announce/c/sSaUhLA-2SI
https://groups.google.com/g/golang-dev/c/CAWXhan3Jww/m/bk9LAa-lCgAJ
https://groups.google.com/g/golang-dev/c/bG8cv1muIBM/m/G461hA6lCgAJ
https://linux.oracle.com/cve/CVE-2024-45336.html
https://linux.oracle.com/errata/ELSA-2025-7592.html
https://nvd.nist.gov/vuln/detail/CVE-2024-45336
https://pkg.go.dev/vuln/GO-2025-3420
https://security.netapp.com/advisory/ntap-20250221-0003/
https://ubuntu.com/security/notices/USN-7574-1
https://www.cve.org/CVERecord?id=CVE-2024-45336
|
| stdlib |
CVE-2024-45341 |
MEDIUM |
v1.22.4 |
1.22.11, 1.23.5, 1.24.0-rc.2 |
https://access.redhat.com/errata/RHSA-2025:3772
https://access.redhat.com/security/cve/CVE-2024-45341
https://bugzilla.redhat.com/2341750
https://bugzilla.redhat.com/2341751
https://bugzilla.redhat.com/show_bug.cgi?id=2341750
https://bugzilla.redhat.com/show_bug.cgi?id=2341751
https://bugzilla.redhat.com/show_bug.cgi?id=2344219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45336
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45341
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22866
https://errata.almalinux.org/8/ALSA-2025-3772.html
https://errata.rockylinux.org/RLSA-2025:7466
https://go.dev/cl/643099
https://go.dev/issue/71156
https://groups.google.com/g/golang-announce/c/sSaUhLA-2SI
https://groups.google.com/g/golang-dev/c/CAWXhan3Jww/m/bk9LAa-lCgAJ
https://groups.google.com/g/golang-dev/c/bG8cv1muIBM/m/G461hA6lCgAJ
https://linux.oracle.com/cve/CVE-2024-45341.html
https://linux.oracle.com/errata/ELSA-2025-7466.html
https://nvd.nist.gov/vuln/detail/CVE-2024-45341
https://pkg.go.dev/vuln/GO-2025-3373
https://security.netapp.com/advisory/ntap-20250221-0004/
https://ubuntu.com/security/notices/USN-7574-1
https://www.cve.org/CVERecord?id=CVE-2024-45341
|
| stdlib |
CVE-2025-0913 |
MEDIUM |
v1.22.4 |
1.23.10, 1.24.4 |
https://go.dev/cl/672396
https://go.dev/issue/73702
https://groups.google.com/g/golang-announce/c/ufZ8WpEsA3A
https://nvd.nist.gov/vuln/detail/CVE-2025-0913
https://pkg.go.dev/vuln/GO-2025-3750
|
| stdlib |
CVE-2025-22866 |
MEDIUM |
v1.22.4 |
1.22.12, 1.23.6, 1.24.0-rc.3 |
https://access.redhat.com/errata/RHSA-2025:7466
https://access.redhat.com/security/cve/CVE-2025-22866
https://bugzilla.redhat.com/2341750
https://bugzilla.redhat.com/2341751
https://bugzilla.redhat.com/2344219
https://bugzilla.redhat.com/show_bug.cgi?id=2341750
https://bugzilla.redhat.com/show_bug.cgi?id=2341751
https://bugzilla.redhat.com/show_bug.cgi?id=2344219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45336
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45341
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22866
https://errata.almalinux.org/10/ALSA-2025-7466.html
https://errata.rockylinux.org/RLSA-2025:7466
https://github.com/golang/go/commit/0cc45e7ca668b103c1055ae84402ad3f3425dd56 (go1.22.12)
https://github.com/golang/go/commit/6644ed63b1e6ccc129647ef6b0d4647fdbe14056 (go1.23.6)
https://github.com/golang/go/commit/6fc23a3cff5e38ff72923fee50f51254dcdc6e93 (go1.24rc3)
https://github.com/golang/go/issues/71383
https://go.dev/cl/643735
https://go.dev/issue/71383
https://groups.google.com/g/golang-announce/c/xU1ZCHUZw3k
https://linux.oracle.com/cve/CVE-2025-22866.html
https://linux.oracle.com/errata/ELSA-2025-7466.html
https://nvd.nist.gov/vuln/detail/CVE-2025-22866
https://pkg.go.dev/vuln/GO-2025-3447
https://security.netapp.com/advisory/ntap-20250221-0002/
https://ubuntu.com/security/notices/USN-7574-1
https://www.cve.org/CVERecord?id=CVE-2025-22866
|
| stdlib |
CVE-2025-22871 |
MEDIUM |
v1.22.4 |
1.23.8, 1.24.2 |
http://www.openwall.com/lists/oss-security/2025/04/04/4
https://access.redhat.com/errata/RHSA-2025:9845
https://access.redhat.com/security/cve/CVE-2025-22871
https://bugzilla.redhat.com/2358493
https://bugzilla.redhat.com/show_bug.cgi?id=2358493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22871
https://errata.almalinux.org/8/ALSA-2025-9845.html
https://errata.rockylinux.org/RLSA-2025:9845
https://go.dev/cl/652998
https://go.dev/issue/71988
https://groups.google.com/g/golang-announce/c/Y2uBTVKjBQk
https://linux.oracle.com/cve/CVE-2025-22871.html
https://linux.oracle.com/errata/ELSA-2025-9845.html
https://nvd.nist.gov/vuln/detail/CVE-2025-22871
https://pkg.go.dev/vuln/GO-2025-3563
https://www.cve.org/CVERecord?id=CVE-2025-22871
|
| stdlib |
CVE-2025-4673 |
MEDIUM |
v1.22.4 |
1.23.10, 1.24.4 |
https://access.redhat.com/errata/RHSA-2025:10672
https://access.redhat.com/security/cve/CVE-2025-4673
https://bugzilla.redhat.com/2373305
https://bugzilla.redhat.com/show_bug.cgi?id=2373305
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4673
https://errata.almalinux.org/8/ALSA-2025-10672.html
https://errata.rockylinux.org/RLSA-2025:16432
https://go.dev/cl/679257
https://go.dev/issue/73816
https://groups.google.com/g/golang-announce/c/ufZ8WpEsA3A
https://linux.oracle.com/cve/CVE-2025-4673.html
https://linux.oracle.com/errata/ELSA-2025-10677.html
https://nvd.nist.gov/vuln/detail/CVE-2025-4673
https://pkg.go.dev/vuln/GO-2025-3751
https://ubuntu.com/security/notices/USN-7574-1
https://www.cve.org/CVERecord?id=CVE-2025-4673
|
| stdlib |
CVE-2025-47906 |
MEDIUM |
v1.22.4 |
1.23.12, 1.24.6 |
https://access.redhat.com/security/cve/CVE-2025-47906
https://go.dev/cl/691775
https://go.dev/issue/74466
https://groups.google.com/g/golang-announce/c/x5MKroML2yM
https://nvd.nist.gov/vuln/detail/CVE-2025-47906
https://pkg.go.dev/vuln/GO-2025-3956
https://www.cve.org/CVERecord?id=CVE-2025-47906
|
| No Misconfigurations found |