Files
TP_Docker/TP5/reports/nginx-scan.html

3288 lines
298 KiB
HTML

<!DOCTYPE html>
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<style>
* {
font-family: Arial, Helvetica, sans-serif;
}
h1 {
text-align: center;
}
.group-header th {
font-size: 200%;
}
.sub-header th {
font-size: 150%;
}
table, th, td {
border: 1px solid black;
border-collapse: collapse;
white-space: nowrap;
padding: .3em;
}
table {
margin: 0 auto;
}
.severity {
text-align: center;
font-weight: bold;
color: #fafafa;
}
.severity-LOW .severity { background-color: #5fbb31; }
.severity-MEDIUM .severity { background-color: #e9c600; }
.severity-HIGH .severity { background-color: #ff8800; }
.severity-CRITICAL .severity { background-color: #e40000; }
.severity-UNKNOWN .severity { background-color: #747474; }
.severity-LOW { background-color: #5fbb3160; }
.severity-MEDIUM { background-color: #e9c60060; }
.severity-HIGH { background-color: #ff880060; }
.severity-CRITICAL { background-color: #e4000060; }
.severity-UNKNOWN { background-color: #74747460; }
table tr td:first-of-type {
font-weight: bold;
}
.links a,
.links[data-more-links=on] a {
display: block;
}
.links[data-more-links=off] a:nth-of-type(1n+5) {
display: none;
}
a.toggle-more-links { cursor: pointer; }
</style>
<title>nginx:latest (debian 12.10) - Trivy Report </title>
<script>
window.onload = function() {
document.querySelectorAll('td.links').forEach(function(linkCell) {
var links = [].concat.apply([], linkCell.querySelectorAll('a'));
[].sort.apply(links, function(a, b) {
return a.href > b.href ? 1 : -1;
});
links.forEach(function(link, idx) {
if (links.length > 3 && 3 === idx) {
var toggleLink = document.createElement('a');
toggleLink.innerText = "Toggle more links";
toggleLink.href = "#toggleMore";
toggleLink.setAttribute("class", "toggle-more-links");
linkCell.appendChild(toggleLink);
}
linkCell.appendChild(link);
});
});
document.querySelectorAll('a.toggle-more-links').forEach(function(toggleLink) {
toggleLink.onclick = function() {
var expanded = toggleLink.parentElement.getAttribute("data-more-links");
toggleLink.parentElement.setAttribute("data-more-links", "on" === expanded ? "off" : "on");
return false;
};
});
};
</script>
</head>
<body>
<h1>nginx:latest (debian 12.10) - Trivy Report</h1>
<table>
<tr class="group-header"><th colspan="6">debian</th></tr>
<tr class="sub-header">
<th>Package</th>
<th>Vulnerability ID</th>
<th>Severity</th>
<th>Installed Version</th>
<th>Fixed Version</th>
<th>Links</th>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">apt</td>
<td>CVE-2011-3374</td>
<td class="severity">LOW</td>
<td class="pkg-version">2.6.1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/cve-2011-3374">https://access.redhat.com/security/cve/cve-2011-3374</a>
<a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480</a>
<a href="https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html">https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html</a>
<a href="https://seclists.org/fulldisclosure/2011/Sep/221">https://seclists.org/fulldisclosure/2011/Sep/221</a>
<a href="https://security-tracker.debian.org/tracker/CVE-2011-3374">https://security-tracker.debian.org/tracker/CVE-2011-3374</a>
<a href="https://snyk.io/vuln/SNYK-LINUX-APT-116518">https://snyk.io/vuln/SNYK-LINUX-APT-116518</a>
<a href="https://ubuntu.com/security/CVE-2011-3374">https://ubuntu.com/security/CVE-2011-3374</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">bash</td>
<td>TEMP-0841856-B18BAF</td>
<td class="severity">LOW</td>
<td class="pkg-version">5.2.15-2+b7</td>
<td></td>
<td class="links" data-more-links="off">
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">bsdutils</td>
<td>CVE-2022-0563</td>
<td class="severity">LOW</td>
<td class="pkg-version">1:2.38.1-5+deb12u3</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a>
<a href="https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/">https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/</a>
<a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u</a>
<a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a>
<a href="https://security.gentoo.org/glsa/202401-08">https://security.gentoo.org/glsa/202401-08</a>
<a href="https://security.netapp.com/advisory/ntap-20220331-0002/">https://security.netapp.com/advisory/ntap-20220331-0002/</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2022-0563">https://www.cve.org/CVERecord?id=CVE-2022-0563</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">coreutils</td>
<td>CVE-2016-2781</td>
<td class="severity">LOW</td>
<td class="pkg-version">9.1-1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://seclists.org/oss-sec/2016/q1/452">http://seclists.org/oss-sec/2016/q1/452</a>
<a href="http://www.openwall.com/lists/oss-security/2016/02/28/2">http://www.openwall.com/lists/oss-security/2016/02/28/2</a>
<a href="http://www.openwall.com/lists/oss-security/2016/02/28/3">http://www.openwall.com/lists/oss-security/2016/02/28/3</a>
<a href="https://access.redhat.com/security/cve/CVE-2016-2781">https://access.redhat.com/security/cve/CVE-2016-2781</a>
<a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E</a>
<a href="https://lore.kernel.org/patchwork/patch/793178/">https://lore.kernel.org/patchwork/patch/793178/</a>
<a href="https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.28/v2.28-ReleaseNotes">https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.28/v2.28-ReleaseNotes</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2016-2781">https://nvd.nist.gov/vuln/detail/CVE-2016-2781</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2016-2781">https://www.cve.org/CVERecord?id=CVE-2016-2781</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">coreutils</td>
<td>CVE-2017-18018</td>
<td class="severity">LOW</td>
<td class="pkg-version">9.1-1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html">http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html</a>
<a href="https://access.redhat.com/security/cve/CVE-2017-18018">https://access.redhat.com/security/cve/CVE-2017-18018</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2017-18018">https://nvd.nist.gov/vuln/detail/CVE-2017-18018</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2017-18018">https://www.cve.org/CVERecord?id=CVE-2017-18018</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">curl</td>
<td>CVE-2024-2379</td>
<td class="severity">LOW</td>
<td class="pkg-version">7.88.1-10+deb12u12</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://seclists.org/fulldisclosure/2024/Jul/18">http://seclists.org/fulldisclosure/2024/Jul/18</a>
<a href="http://seclists.org/fulldisclosure/2024/Jul/19">http://seclists.org/fulldisclosure/2024/Jul/19</a>
<a href="http://seclists.org/fulldisclosure/2024/Jul/20">http://seclists.org/fulldisclosure/2024/Jul/20</a>
<a href="http://www.openwall.com/lists/oss-security/2024/03/27/2">http://www.openwall.com/lists/oss-security/2024/03/27/2</a>
<a href="https://access.redhat.com/security/cve/CVE-2024-2379">https://access.redhat.com/security/cve/CVE-2024-2379</a>
<a href="https://curl.se/docs/CVE-2024-2379.html">https://curl.se/docs/CVE-2024-2379.html</a>
<a href="https://curl.se/docs/CVE-2024-2379.json">https://curl.se/docs/CVE-2024-2379.json</a>
<a href="https://hackerone.com/reports/2410774">https://hackerone.com/reports/2410774</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-2379">https://nvd.nist.gov/vuln/detail/CVE-2024-2379</a>
<a href="https://security.netapp.com/advisory/ntap-20240531-0001/">https://security.netapp.com/advisory/ntap-20240531-0001/</a>
<a href="https://support.apple.com/kb/HT214118">https://support.apple.com/kb/HT214118</a>
<a href="https://support.apple.com/kb/HT214119">https://support.apple.com/kb/HT214119</a>
<a href="https://support.apple.com/kb/HT214120">https://support.apple.com/kb/HT214120</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2024-2379">https://www.cve.org/CVERecord?id=CVE-2024-2379</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">curl</td>
<td>CVE-2025-0725</td>
<td class="severity">LOW</td>
<td class="pkg-version">7.88.1-10+deb12u12</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.openwall.com/lists/oss-security/2025/02/05/3">http://www.openwall.com/lists/oss-security/2025/02/05/3</a>
<a href="http://www.openwall.com/lists/oss-security/2025/02/06/2">http://www.openwall.com/lists/oss-security/2025/02/06/2</a>
<a href="http://www.openwall.com/lists/oss-security/2025/02/06/4">http://www.openwall.com/lists/oss-security/2025/02/06/4</a>
<a href="https://access.redhat.com/security/cve/CVE-2025-0725">https://access.redhat.com/security/cve/CVE-2025-0725</a>
<a href="https://curl.se/docs/CVE-2025-0725.html">https://curl.se/docs/CVE-2025-0725.html</a>
<a href="https://curl.se/docs/CVE-2025-0725.json">https://curl.se/docs/CVE-2025-0725.json</a>
<a href="https://hackerone.com/reports/2956023">https://hackerone.com/reports/2956023</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-0725">https://nvd.nist.gov/vuln/detail/CVE-2025-0725</a>
<a href="https://security.netapp.com/advisory/ntap-20250306-0009/">https://security.netapp.com/advisory/ntap-20250306-0009/</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2025-0725">https://www.cve.org/CVERecord?id=CVE-2025-0725</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">gcc-12-base</td>
<td>CVE-2022-27943</td>
<td class="severity">LOW</td>
<td class="pkg-version">12.2.0-14</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2022-27943">https://access.redhat.com/security/cve/CVE-2022-27943</a>
<a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039">https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039</a>
<a href="https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=1a770b01ef415e114164b6151d1e55acdee09371">https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=1a770b01ef415e114164b6151d1e55acdee09371</a>
<a href="https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=9234cdca6ee88badfc00297e72f13dac4e540c79">https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=9234cdca6ee88badfc00297e72f13dac4e540c79</a>
<a href="https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=fc968115a742d9e4674d9725ce9c2106b91b6ead">https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=fc968115a742d9e4674d9725ce9c2106b91b6ead</a>
<a href="https://gcc.gnu.org/pipermail/gcc-patches/2022-March/592244.html">https://gcc.gnu.org/pipermail/gcc-patches/2022-March/592244.html</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27943">https://nvd.nist.gov/vuln/detail/CVE-2022-27943</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28995">https://sourceware.org/bugzilla/show_bug.cgi?id=28995</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2022-27943">https://www.cve.org/CVERecord?id=CVE-2022-27943</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">gcc-12-base</td>
<td>CVE-2023-4039</td>
<td class="severity">LOW</td>
<td class="pkg-version">12.2.0-14</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2023-4039">https://access.redhat.com/security/cve/CVE-2023-4039</a>
<a href="https://developer.arm.com/Arm%20Security%20Center/GCC%20Stack%20Protector%20Vulnerability%20AArch64">https://developer.arm.com/Arm%20Security%20Center/GCC%20Stack%20Protector%20Vulnerability%20AArch64</a>
<a href="https://gcc.gnu.org/git/?p=gcc.git;a=blob_plain;f=SECURITY.txt">https://gcc.gnu.org/git/?p=gcc.git;a=blob_plain;f=SECURITY.txt</a>
<a href="https://gcc.gnu.org/pipermail/gcc-patches/2023-October/634066.html">https://gcc.gnu.org/pipermail/gcc-patches/2023-October/634066.html</a>
<a href="https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-x7ch-h5rf-w2mf">https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-x7ch-h5rf-w2mf</a>
<a href="https://inbox.sourceware.org/gcc-patches/46cfa37b-56eb-344d-0745-e0d35393392d@gotplt.org">https://inbox.sourceware.org/gcc-patches/46cfa37b-56eb-344d-0745-e0d35393392d@gotplt.org</a>
<a href="https://linux.oracle.com/cve/CVE-2023-4039.html">https://linux.oracle.com/cve/CVE-2023-4039.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2023-28766.html">https://linux.oracle.com/errata/ELSA-2023-28766.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4039">https://nvd.nist.gov/vuln/detail/CVE-2023-4039</a>
<a href="https://rtx.meta.security/mitigation/2023/09/12/CVE-2023-4039.html">https://rtx.meta.security/mitigation/2023/09/12/CVE-2023-4039.html</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2023-4039">https://www.cve.org/CVERecord?id=CVE-2023-4039</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">gpgv</td>
<td>CVE-2022-3219</td>
<td class="severity">LOW</td>
<td class="pkg-version">2.2.40-1.1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2022-3219">https://access.redhat.com/security/cve/CVE-2022-3219</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2127010">https://bugzilla.redhat.com/show_bug.cgi?id=2127010</a>
<a href="https://dev.gnupg.org/D556">https://dev.gnupg.org/D556</a>
<a href="https://dev.gnupg.org/T5993">https://dev.gnupg.org/T5993</a>
<a href="https://marc.info/?l=oss-security&amp;m=165696590211434&amp;w=4">https://marc.info/?l=oss-security&amp;m=165696590211434&amp;w=4</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3219">https://nvd.nist.gov/vuln/detail/CVE-2022-3219</a>
<a href="https://security.netapp.com/advisory/ntap-20230324-0001/">https://security.netapp.com/advisory/ntap-20230324-0001/</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2022-3219">https://www.cve.org/CVERecord?id=CVE-2022-3219</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">gpgv</td>
<td>CVE-2025-30258</td>
<td class="severity">LOW</td>
<td class="pkg-version">2.2.40-1.1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2025-30258">https://access.redhat.com/security/cve/CVE-2025-30258</a>
<a href="https://dev.gnupg.org/T7527">https://dev.gnupg.org/T7527</a>
<a href="https://dev.gnupg.org/rG48978ccb4e20866472ef18436a32744350a65158">https://dev.gnupg.org/rG48978ccb4e20866472ef18436a32744350a65158</a>
<a href="https://lists.gnupg.org/pipermail/gnupg-announce/2025q1/000491.html">https://lists.gnupg.org/pipermail/gnupg-announce/2025q1/000491.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-30258">https://nvd.nist.gov/vuln/detail/CVE-2025-30258</a>
<a href="https://ubuntu.com/security/notices/USN-7412-1">https://ubuntu.com/security/notices/USN-7412-1</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2025-30258">https://www.cve.org/CVERecord?id=CVE-2025-30258</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libabsl20220623</td>
<td>CVE-2025-0838</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">20220623.1-1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2025-0838">https://access.redhat.com/security/cve/CVE-2025-0838</a>
<a href="https://github.com/abseil/abseil-cpp/commit/5a0e2cb5e3958dd90bb8569a2766622cb74d90c1">https://github.com/abseil/abseil-cpp/commit/5a0e2cb5e3958dd90bb8569a2766622cb74d90c1</a>
<a href="https://lists.debian.org/debian-lts-announce/2025/04/msg00012.html">https://lists.debian.org/debian-lts-announce/2025/04/msg00012.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-0838">https://nvd.nist.gov/vuln/detail/CVE-2025-0838</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2025-0838">https://www.cve.org/CVERecord?id=CVE-2025-0838</a>
</td>
</tr>
<tr class="severity-CRITICAL">
<td class="pkg-name">libaom3</td>
<td>CVE-2023-6879</td>
<td class="severity">CRITICAL</td>
<td class="pkg-version">3.6.0-1+deb12u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2023-6879">https://access.redhat.com/security/cve/CVE-2023-6879</a>
<a href="https://aomedia.googlesource.com/aom/+/refs/tags/v3.7.1">https://aomedia.googlesource.com/aom/+/refs/tags/v3.7.1</a>
<a href="https://crbug.com/aomedia/3491">https://crbug.com/aomedia/3491</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6879">https://nvd.nist.gov/vuln/detail/CVE-2023-6879</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2023-6879">https://www.cve.org/CVERecord?id=CVE-2023-6879</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libaom3</td>
<td>CVE-2023-39616</td>
<td class="severity">HIGH</td>
<td class="pkg-version">3.6.0-1+deb12u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://bugs.chromium.org/p/aomedia/issues/detail?id=3372#c3">https://bugs.chromium.org/p/aomedia/issues/detail?id=3372#c3</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libapt-pkg6.0</td>
<td>CVE-2011-3374</td>
<td class="severity">LOW</td>
<td class="pkg-version">2.6.1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/cve-2011-3374">https://access.redhat.com/security/cve/cve-2011-3374</a>
<a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480</a>
<a href="https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html">https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html</a>
<a href="https://seclists.org/fulldisclosure/2011/Sep/221">https://seclists.org/fulldisclosure/2011/Sep/221</a>
<a href="https://security-tracker.debian.org/tracker/CVE-2011-3374">https://security-tracker.debian.org/tracker/CVE-2011-3374</a>
<a href="https://snyk.io/vuln/SNYK-LINUX-APT-116518">https://snyk.io/vuln/SNYK-LINUX-APT-116518</a>
<a href="https://ubuntu.com/security/CVE-2011-3374">https://ubuntu.com/security/CVE-2011-3374</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libblkid1</td>
<td>CVE-2022-0563</td>
<td class="severity">LOW</td>
<td class="pkg-version">2.38.1-5+deb12u3</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a>
<a href="https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/">https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/</a>
<a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u</a>
<a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a>
<a href="https://security.gentoo.org/glsa/202401-08">https://security.gentoo.org/glsa/202401-08</a>
<a href="https://security.netapp.com/advisory/ntap-20220331-0002/">https://security.netapp.com/advisory/ntap-20220331-0002/</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2022-0563">https://www.cve.org/CVERecord?id=CVE-2022-0563</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libc-bin</td>
<td>CVE-2010-4756</td>
<td class="severity">LOW</td>
<td class="pkg-version">2.36-9+deb12u10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://cxib.net/stuff/glob-0day.c">http://cxib.net/stuff/glob-0day.c</a>
<a href="http://securityreason.com/achievement_securityalert/89">http://securityreason.com/achievement_securityalert/89</a>
<a href="http://securityreason.com/exploitalert/9223">http://securityreason.com/exploitalert/9223</a>
<a href="https://access.redhat.com/security/cve/CVE-2010-4756">https://access.redhat.com/security/cve/CVE-2010-4756</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=681681">https://bugzilla.redhat.com/show_bug.cgi?id=681681</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2010-4756">https://nvd.nist.gov/vuln/detail/CVE-2010-4756</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2010-4756">https://www.cve.org/CVERecord?id=CVE-2010-4756</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libc-bin</td>
<td>CVE-2018-20796</td>
<td class="severity">LOW</td>
<td class="pkg-version">2.36-9+deb12u10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.securityfocus.com/bid/107160">http://www.securityfocus.com/bid/107160</a>
<a href="https://access.redhat.com/security/cve/CVE-2018-20796">https://access.redhat.com/security/cve/CVE-2018-20796</a>
<a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141</a>
<a href="https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html">https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2018-20796">https://nvd.nist.gov/vuln/detail/CVE-2018-20796</a>
<a href="https://security.netapp.com/advisory/ntap-20190315-0002/">https://security.netapp.com/advisory/ntap-20190315-0002/</a>
<a href="https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp%3Butm_medium=RSS">https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp%3Butm_medium=RSS</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2018-20796">https://www.cve.org/CVERecord?id=CVE-2018-20796</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libc-bin</td>
<td>CVE-2019-1010022</td>
<td class="severity">LOW</td>
<td class="pkg-version">2.36-9+deb12u10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2019-1010022">https://access.redhat.com/security/cve/CVE-2019-1010022</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010022">https://nvd.nist.gov/vuln/detail/CVE-2019-1010022</a>
<a href="https://security-tracker.debian.org/tracker/CVE-2019-1010022">https://security-tracker.debian.org/tracker/CVE-2019-1010022</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22850">https://sourceware.org/bugzilla/show_bug.cgi?id=22850</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3">https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3</a>
<a href="https://ubuntu.com/security/CVE-2019-1010022">https://ubuntu.com/security/CVE-2019-1010022</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2019-1010022">https://www.cve.org/CVERecord?id=CVE-2019-1010022</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libc-bin</td>
<td>CVE-2019-1010023</td>
<td class="severity">LOW</td>
<td class="pkg-version">2.36-9+deb12u10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.securityfocus.com/bid/109167">http://www.securityfocus.com/bid/109167</a>
<a href="https://access.redhat.com/security/cve/CVE-2019-1010023">https://access.redhat.com/security/cve/CVE-2019-1010023</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010023">https://nvd.nist.gov/vuln/detail/CVE-2019-1010023</a>
<a href="https://security-tracker.debian.org/tracker/CVE-2019-1010023">https://security-tracker.debian.org/tracker/CVE-2019-1010023</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22851">https://sourceware.org/bugzilla/show_bug.cgi?id=22851</a>
<a href="https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;amp%3Butm_medium=RSS">https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;amp%3Butm_medium=RSS</a>
<a href="https://ubuntu.com/security/CVE-2019-1010023">https://ubuntu.com/security/CVE-2019-1010023</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2019-1010023">https://www.cve.org/CVERecord?id=CVE-2019-1010023</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libc-bin</td>
<td>CVE-2019-1010024</td>
<td class="severity">LOW</td>
<td class="pkg-version">2.36-9+deb12u10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.securityfocus.com/bid/109162">http://www.securityfocus.com/bid/109162</a>
<a href="https://access.redhat.com/security/cve/CVE-2019-1010024">https://access.redhat.com/security/cve/CVE-2019-1010024</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010024">https://nvd.nist.gov/vuln/detail/CVE-2019-1010024</a>
<a href="https://security-tracker.debian.org/tracker/CVE-2019-1010024">https://security-tracker.debian.org/tracker/CVE-2019-1010024</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22852">https://sourceware.org/bugzilla/show_bug.cgi?id=22852</a>
<a href="https://support.f5.com/csp/article/K06046097">https://support.f5.com/csp/article/K06046097</a>
<a href="https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp%3Butm_medium=RSS">https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp%3Butm_medium=RSS</a>
<a href="https://ubuntu.com/security/CVE-2019-1010024">https://ubuntu.com/security/CVE-2019-1010024</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2019-1010024">https://www.cve.org/CVERecord?id=CVE-2019-1010024</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libc-bin</td>
<td>CVE-2019-1010025</td>
<td class="severity">LOW</td>
<td class="pkg-version">2.36-9+deb12u10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2019-1010025">https://access.redhat.com/security/cve/CVE-2019-1010025</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010025">https://nvd.nist.gov/vuln/detail/CVE-2019-1010025</a>
<a href="https://security-tracker.debian.org/tracker/CVE-2019-1010025">https://security-tracker.debian.org/tracker/CVE-2019-1010025</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22853">https://sourceware.org/bugzilla/show_bug.cgi?id=22853</a>
<a href="https://support.f5.com/csp/article/K06046097">https://support.f5.com/csp/article/K06046097</a>
<a href="https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp%3Butm_medium=RSS">https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp%3Butm_medium=RSS</a>
<a href="https://ubuntu.com/security/CVE-2019-1010025">https://ubuntu.com/security/CVE-2019-1010025</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2019-1010025">https://www.cve.org/CVERecord?id=CVE-2019-1010025</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libc-bin</td>
<td>CVE-2019-9192</td>
<td class="severity">LOW</td>
<td class="pkg-version">2.36-9+deb12u10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2019-9192">https://access.redhat.com/security/cve/CVE-2019-9192</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9192">https://nvd.nist.gov/vuln/detail/CVE-2019-9192</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24269">https://sourceware.org/bugzilla/show_bug.cgi?id=24269</a>
<a href="https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp%3Butm_medium=RSS">https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp%3Butm_medium=RSS</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2019-9192">https://www.cve.org/CVERecord?id=CVE-2019-9192</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libc6</td>
<td>CVE-2010-4756</td>
<td class="severity">LOW</td>
<td class="pkg-version">2.36-9+deb12u10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://cxib.net/stuff/glob-0day.c">http://cxib.net/stuff/glob-0day.c</a>
<a href="http://securityreason.com/achievement_securityalert/89">http://securityreason.com/achievement_securityalert/89</a>
<a href="http://securityreason.com/exploitalert/9223">http://securityreason.com/exploitalert/9223</a>
<a href="https://access.redhat.com/security/cve/CVE-2010-4756">https://access.redhat.com/security/cve/CVE-2010-4756</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=681681">https://bugzilla.redhat.com/show_bug.cgi?id=681681</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2010-4756">https://nvd.nist.gov/vuln/detail/CVE-2010-4756</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2010-4756">https://www.cve.org/CVERecord?id=CVE-2010-4756</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libc6</td>
<td>CVE-2018-20796</td>
<td class="severity">LOW</td>
<td class="pkg-version">2.36-9+deb12u10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.securityfocus.com/bid/107160">http://www.securityfocus.com/bid/107160</a>
<a href="https://access.redhat.com/security/cve/CVE-2018-20796">https://access.redhat.com/security/cve/CVE-2018-20796</a>
<a href="https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141">https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141</a>
<a href="https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html">https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2018-20796">https://nvd.nist.gov/vuln/detail/CVE-2018-20796</a>
<a href="https://security.netapp.com/advisory/ntap-20190315-0002/">https://security.netapp.com/advisory/ntap-20190315-0002/</a>
<a href="https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp%3Butm_medium=RSS">https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp%3Butm_medium=RSS</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2018-20796">https://www.cve.org/CVERecord?id=CVE-2018-20796</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libc6</td>
<td>CVE-2019-1010022</td>
<td class="severity">LOW</td>
<td class="pkg-version">2.36-9+deb12u10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2019-1010022">https://access.redhat.com/security/cve/CVE-2019-1010022</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010022">https://nvd.nist.gov/vuln/detail/CVE-2019-1010022</a>
<a href="https://security-tracker.debian.org/tracker/CVE-2019-1010022">https://security-tracker.debian.org/tracker/CVE-2019-1010022</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22850">https://sourceware.org/bugzilla/show_bug.cgi?id=22850</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3">https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3</a>
<a href="https://ubuntu.com/security/CVE-2019-1010022">https://ubuntu.com/security/CVE-2019-1010022</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2019-1010022">https://www.cve.org/CVERecord?id=CVE-2019-1010022</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libc6</td>
<td>CVE-2019-1010023</td>
<td class="severity">LOW</td>
<td class="pkg-version">2.36-9+deb12u10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.securityfocus.com/bid/109167">http://www.securityfocus.com/bid/109167</a>
<a href="https://access.redhat.com/security/cve/CVE-2019-1010023">https://access.redhat.com/security/cve/CVE-2019-1010023</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010023">https://nvd.nist.gov/vuln/detail/CVE-2019-1010023</a>
<a href="https://security-tracker.debian.org/tracker/CVE-2019-1010023">https://security-tracker.debian.org/tracker/CVE-2019-1010023</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22851">https://sourceware.org/bugzilla/show_bug.cgi?id=22851</a>
<a href="https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;amp%3Butm_medium=RSS">https://support.f5.com/csp/article/K11932200?utm_source=f5support&amp;amp%3Butm_medium=RSS</a>
<a href="https://ubuntu.com/security/CVE-2019-1010023">https://ubuntu.com/security/CVE-2019-1010023</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2019-1010023">https://www.cve.org/CVERecord?id=CVE-2019-1010023</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libc6</td>
<td>CVE-2019-1010024</td>
<td class="severity">LOW</td>
<td class="pkg-version">2.36-9+deb12u10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.securityfocus.com/bid/109162">http://www.securityfocus.com/bid/109162</a>
<a href="https://access.redhat.com/security/cve/CVE-2019-1010024">https://access.redhat.com/security/cve/CVE-2019-1010024</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010024">https://nvd.nist.gov/vuln/detail/CVE-2019-1010024</a>
<a href="https://security-tracker.debian.org/tracker/CVE-2019-1010024">https://security-tracker.debian.org/tracker/CVE-2019-1010024</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22852">https://sourceware.org/bugzilla/show_bug.cgi?id=22852</a>
<a href="https://support.f5.com/csp/article/K06046097">https://support.f5.com/csp/article/K06046097</a>
<a href="https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp%3Butm_medium=RSS">https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp%3Butm_medium=RSS</a>
<a href="https://ubuntu.com/security/CVE-2019-1010024">https://ubuntu.com/security/CVE-2019-1010024</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2019-1010024">https://www.cve.org/CVERecord?id=CVE-2019-1010024</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libc6</td>
<td>CVE-2019-1010025</td>
<td class="severity">LOW</td>
<td class="pkg-version">2.36-9+deb12u10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2019-1010025">https://access.redhat.com/security/cve/CVE-2019-1010025</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010025">https://nvd.nist.gov/vuln/detail/CVE-2019-1010025</a>
<a href="https://security-tracker.debian.org/tracker/CVE-2019-1010025">https://security-tracker.debian.org/tracker/CVE-2019-1010025</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22853">https://sourceware.org/bugzilla/show_bug.cgi?id=22853</a>
<a href="https://support.f5.com/csp/article/K06046097">https://support.f5.com/csp/article/K06046097</a>
<a href="https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp%3Butm_medium=RSS">https://support.f5.com/csp/article/K06046097?utm_source=f5support&amp;amp%3Butm_medium=RSS</a>
<a href="https://ubuntu.com/security/CVE-2019-1010025">https://ubuntu.com/security/CVE-2019-1010025</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2019-1010025">https://www.cve.org/CVERecord?id=CVE-2019-1010025</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libc6</td>
<td>CVE-2019-9192</td>
<td class="severity">LOW</td>
<td class="pkg-version">2.36-9+deb12u10</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2019-9192">https://access.redhat.com/security/cve/CVE-2019-9192</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-9192">https://nvd.nist.gov/vuln/detail/CVE-2019-9192</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=24269">https://sourceware.org/bugzilla/show_bug.cgi?id=24269</a>
<a href="https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp%3Butm_medium=RSS">https://support.f5.com/csp/article/K26346590?utm_source=f5support&amp;amp%3Butm_medium=RSS</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2019-9192">https://www.cve.org/CVERecord?id=CVE-2019-9192</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libcap2</td>
<td>CVE-2025-1390</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1:2.66-4</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2025-1390">https://access.redhat.com/security/cve/CVE-2025-1390</a>
<a href="https://bugzilla.openanolis.cn/show_bug.cgi?id=18804">https://bugzilla.openanolis.cn/show_bug.cgi?id=18804</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-1390">https://nvd.nist.gov/vuln/detail/CVE-2025-1390</a>
<a href="https://ubuntu.com/security/notices/USN-7287-1">https://ubuntu.com/security/notices/USN-7287-1</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2025-1390">https://www.cve.org/CVERecord?id=CVE-2025-1390</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libcurl4</td>
<td>CVE-2024-2379</td>
<td class="severity">LOW</td>
<td class="pkg-version">7.88.1-10+deb12u12</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://seclists.org/fulldisclosure/2024/Jul/18">http://seclists.org/fulldisclosure/2024/Jul/18</a>
<a href="http://seclists.org/fulldisclosure/2024/Jul/19">http://seclists.org/fulldisclosure/2024/Jul/19</a>
<a href="http://seclists.org/fulldisclosure/2024/Jul/20">http://seclists.org/fulldisclosure/2024/Jul/20</a>
<a href="http://www.openwall.com/lists/oss-security/2024/03/27/2">http://www.openwall.com/lists/oss-security/2024/03/27/2</a>
<a href="https://access.redhat.com/security/cve/CVE-2024-2379">https://access.redhat.com/security/cve/CVE-2024-2379</a>
<a href="https://curl.se/docs/CVE-2024-2379.html">https://curl.se/docs/CVE-2024-2379.html</a>
<a href="https://curl.se/docs/CVE-2024-2379.json">https://curl.se/docs/CVE-2024-2379.json</a>
<a href="https://hackerone.com/reports/2410774">https://hackerone.com/reports/2410774</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-2379">https://nvd.nist.gov/vuln/detail/CVE-2024-2379</a>
<a href="https://security.netapp.com/advisory/ntap-20240531-0001/">https://security.netapp.com/advisory/ntap-20240531-0001/</a>
<a href="https://support.apple.com/kb/HT214118">https://support.apple.com/kb/HT214118</a>
<a href="https://support.apple.com/kb/HT214119">https://support.apple.com/kb/HT214119</a>
<a href="https://support.apple.com/kb/HT214120">https://support.apple.com/kb/HT214120</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2024-2379">https://www.cve.org/CVERecord?id=CVE-2024-2379</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libcurl4</td>
<td>CVE-2025-0725</td>
<td class="severity">LOW</td>
<td class="pkg-version">7.88.1-10+deb12u12</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.openwall.com/lists/oss-security/2025/02/05/3">http://www.openwall.com/lists/oss-security/2025/02/05/3</a>
<a href="http://www.openwall.com/lists/oss-security/2025/02/06/2">http://www.openwall.com/lists/oss-security/2025/02/06/2</a>
<a href="http://www.openwall.com/lists/oss-security/2025/02/06/4">http://www.openwall.com/lists/oss-security/2025/02/06/4</a>
<a href="https://access.redhat.com/security/cve/CVE-2025-0725">https://access.redhat.com/security/cve/CVE-2025-0725</a>
<a href="https://curl.se/docs/CVE-2025-0725.html">https://curl.se/docs/CVE-2025-0725.html</a>
<a href="https://curl.se/docs/CVE-2025-0725.json">https://curl.se/docs/CVE-2025-0725.json</a>
<a href="https://hackerone.com/reports/2956023">https://hackerone.com/reports/2956023</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-0725">https://nvd.nist.gov/vuln/detail/CVE-2025-0725</a>
<a href="https://security.netapp.com/advisory/ntap-20250306-0009/">https://security.netapp.com/advisory/ntap-20250306-0009/</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2025-0725">https://www.cve.org/CVERecord?id=CVE-2025-0725</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libdav1d6</td>
<td>CVE-2023-32570</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1.0.0-2+deb12u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://code.videolan.org/videolan/dav1d/-/commit/cf617fdae0b9bfabd27282854c8e81450d955efa">https://code.videolan.org/videolan/dav1d/-/commit/cf617fdae0b9bfabd27282854c8e81450d955efa</a>
<a href="https://code.videolan.org/videolan/dav1d/-/tags/1.2.0">https://code.videolan.org/videolan/dav1d/-/tags/1.2.0</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3WGSO7UMOF4MVLQ5H6KIV7OG6ONS377B/">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3WGSO7UMOF4MVLQ5H6KIV7OG6ONS377B/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LXZ6CUNJFDJLCFOZHY2TIGMCAEITLCRP/">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LXZ6CUNJFDJLCFOZHY2TIGMCAEITLCRP/</a>
<a href="https://security.gentoo.org/glsa/202310-05">https://security.gentoo.org/glsa/202310-05</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libde265-0</td>
<td>CVE-2023-51792</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1.0.11-1+deb12u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://github.com/strukturag/libde265">https://github.com/strukturag/libde265</a>
<a href="https://github.com/strukturag/libde265/issues/427">https://github.com/strukturag/libde265/issues/427</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/</a>
<a href="https://ubuntu.com/security/notices/USN-6764-1">https://ubuntu.com/security/notices/USN-6764-1</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2023-51792">https://www.cve.org/CVERecord?id=CVE-2023-51792</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libde265-0</td>
<td>CVE-2024-38949</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1.0.11-1+deb12u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://github.com/strukturag/libde265/issues/460">https://github.com/strukturag/libde265/issues/460</a>
<a href="https://github.com/zhangteng0526/CVE-information/blob/main/CVE-2024-38949">https://github.com/zhangteng0526/CVE-information/blob/main/CVE-2024-38949</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2024-38949">https://www.cve.org/CVERecord?id=CVE-2024-38949</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libde265-0</td>
<td>CVE-2024-38950</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1.0.11-1+deb12u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://github.com/strukturag/libde265/issues/460">https://github.com/strukturag/libde265/issues/460</a>
<a href="https://github.com/zhangteng0526/CVE-information/blob/main/CVE-2024-38950">https://github.com/zhangteng0526/CVE-information/blob/main/CVE-2024-38950</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2024-38950">https://www.cve.org/CVERecord?id=CVE-2024-38950</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libexpat1</td>
<td>CVE-2023-52425</td>
<td class="severity">HIGH</td>
<td class="pkg-version">2.5.0-1+deb12u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.openwall.com/lists/oss-security/2024/03/20/5">http://www.openwall.com/lists/oss-security/2024/03/20/5</a>
<a href="https://access.redhat.com/errata/RHSA-2024:1530">https://access.redhat.com/errata/RHSA-2024:1530</a>
<a href="https://access.redhat.com/security/cve/CVE-2023-52425">https://access.redhat.com/security/cve/CVE-2023-52425</a>
<a href="https://bugzilla.redhat.com/2262877">https://bugzilla.redhat.com/2262877</a>
<a href="https://bugzilla.redhat.com/2268766">https://bugzilla.redhat.com/2268766</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2262877">https://bugzilla.redhat.com/show_bug.cgi?id=2262877</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52425">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52425</a>
<a href="https://errata.almalinux.org/9/ALSA-2024-1530.html">https://errata.almalinux.org/9/ALSA-2024-1530.html</a>
<a href="https://errata.rockylinux.org/RLSA-2024:1615">https://errata.rockylinux.org/RLSA-2024:1615</a>
<a href="https://github.com/libexpat/libexpat/pull/789">https://github.com/libexpat/libexpat/pull/789</a>
<a href="https://linux.oracle.com/cve/CVE-2023-52425.html">https://linux.oracle.com/cve/CVE-2023-52425.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2024-4259.html">https://linux.oracle.com/errata/ELSA-2024-4259.html</a>
<a href="https://lists.debian.org/debian-lts-announce/2024/04/msg00006.html">https://lists.debian.org/debian-lts-announce/2024/04/msg00006.html</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNRIHC7DVVRAIWFRGV23Y6UZXFBXSQDB/">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNRIHC7DVVRAIWFRGV23Y6UZXFBXSQDB/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNUBSGZFEZOBHJFTAD42SAN4ATW2VEMV/">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNUBSGZFEZOBHJFTAD42SAN4ATW2VEMV/</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52425">https://nvd.nist.gov/vuln/detail/CVE-2023-52425</a>
<a href="https://security.netapp.com/advisory/ntap-20240614-0003/">https://security.netapp.com/advisory/ntap-20240614-0003/</a>
<a href="https://ubuntu.com/security/notices/USN-6694-1">https://ubuntu.com/security/notices/USN-6694-1</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2023-52425">https://www.cve.org/CVERecord?id=CVE-2023-52425</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libexpat1</td>
<td>CVE-2024-8176</td>
<td class="severity">HIGH</td>
<td class="pkg-version">2.5.0-1+deb12u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.openwall.com/lists/oss-security/2025/03/15/1">http://www.openwall.com/lists/oss-security/2025/03/15/1</a>
<a href="https://access.redhat.com/errata/RHSA-2025:3531">https://access.redhat.com/errata/RHSA-2025:3531</a>
<a href="https://access.redhat.com/errata/RHSA-2025:3734">https://access.redhat.com/errata/RHSA-2025:3734</a>
<a href="https://access.redhat.com/errata/RHSA-2025:3913">https://access.redhat.com/errata/RHSA-2025:3913</a>
<a href="https://access.redhat.com/errata/RHSA-2025:4048">https://access.redhat.com/errata/RHSA-2025:4048</a>
<a href="https://access.redhat.com/security/cve/CVE-2024-8176">https://access.redhat.com/security/cve/CVE-2024-8176</a>
<a href="https://blog.hartwork.org/posts/expat-2-7-0-released/">https://blog.hartwork.org/posts/expat-2-7-0-released/</a>
<a href="https://bugzilla.redhat.com/2310137">https://bugzilla.redhat.com/2310137</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2310137">https://bugzilla.redhat.com/show_bug.cgi?id=2310137</a>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239618">https://bugzilla.suse.com/show_bug.cgi?id=1239618</a>
<a href="https://errata.almalinux.org/9/ALSA-2025-3531.html">https://errata.almalinux.org/9/ALSA-2025-3531.html</a>
<a href="https://github.com/libexpat/libexpat/blob/R_2_7_0/expat/Changes#L40-L52">https://github.com/libexpat/libexpat/blob/R_2_7_0/expat/Changes#L40-L52</a>
<a href="https://github.com/libexpat/libexpat/issues/893">https://github.com/libexpat/libexpat/issues/893</a>
<a href="https://gitlab.alpinelinux.org/alpine/aports/-/commit/d068c3ff36fc6f4789988a09c69b434db757db53">https://gitlab.alpinelinux.org/alpine/aports/-/commit/d068c3ff36fc6f4789988a09c69b434db757db53</a>
<a href="https://linux.oracle.com/cve/CVE-2024-8176.html">https://linux.oracle.com/cve/CVE-2024-8176.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2025-4048.html">https://linux.oracle.com/errata/ELSA-2025-4048.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-8176">https://nvd.nist.gov/vuln/detail/CVE-2024-8176</a>
<a href="https://security-tracker.debian.org/tracker/CVE-2024-8176">https://security-tracker.debian.org/tracker/CVE-2024-8176</a>
<a href="https://security.netapp.com/advisory/ntap-20250328-0009/">https://security.netapp.com/advisory/ntap-20250328-0009/</a>
<a href="https://ubuntu.com/security/CVE-2024-8176">https://ubuntu.com/security/CVE-2024-8176</a>
<a href="https://ubuntu.com/security/notices/USN-7424-1">https://ubuntu.com/security/notices/USN-7424-1</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2024-8176">https://www.cve.org/CVERecord?id=CVE-2024-8176</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libexpat1</td>
<td>CVE-2024-50602</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">2.5.0-1+deb12u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/errata/RHSA-2024:9541">https://access.redhat.com/errata/RHSA-2024:9541</a>
<a href="https://access.redhat.com/security/cve/CVE-2024-50602">https://access.redhat.com/security/cve/CVE-2024-50602</a>
<a href="https://bugzilla.redhat.com/2321987">https://bugzilla.redhat.com/2321987</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2321987">https://bugzilla.redhat.com/show_bug.cgi?id=2321987</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50602">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50602</a>
<a href="https://errata.almalinux.org/9/ALSA-2024-9541.html">https://errata.almalinux.org/9/ALSA-2024-9541.html</a>
<a href="https://errata.rockylinux.org/RLSA-2024:9502">https://errata.rockylinux.org/RLSA-2024:9502</a>
<a href="https://github.com/libexpat/libexpat/pull/915">https://github.com/libexpat/libexpat/pull/915</a>
<a href="https://linux.oracle.com/cve/CVE-2024-50602.html">https://linux.oracle.com/cve/CVE-2024-50602.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2024-9541.html">https://linux.oracle.com/errata/ELSA-2024-9541.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-50602">https://nvd.nist.gov/vuln/detail/CVE-2024-50602</a>
<a href="https://security.netapp.com/advisory/ntap-20250404-0008/">https://security.netapp.com/advisory/ntap-20250404-0008/</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2024-50602">https://www.cve.org/CVERecord?id=CVE-2024-50602</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libexpat1</td>
<td>CVE-2023-52426</td>
<td class="severity">LOW</td>
<td class="pkg-version">2.5.0-1+deb12u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2023-52426">https://access.redhat.com/security/cve/CVE-2023-52426</a>
<a href="https://cwe.mitre.org/data/definitions/776.html">https://cwe.mitre.org/data/definitions/776.html</a>
<a href="https://github.com/libexpat/libexpat/commit/0f075ec8ecb5e43f8fdca5182f8cca4703da0404">https://github.com/libexpat/libexpat/commit/0f075ec8ecb5e43f8fdca5182f8cca4703da0404</a>
<a href="https://github.com/libexpat/libexpat/pull/777">https://github.com/libexpat/libexpat/pull/777</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNRIHC7DVVRAIWFRGV23Y6UZXFBXSQDB/">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNRIHC7DVVRAIWFRGV23Y6UZXFBXSQDB/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNUBSGZFEZOBHJFTAD42SAN4ATW2VEMV/">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNUBSGZFEZOBHJFTAD42SAN4ATW2VEMV/</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52426">https://nvd.nist.gov/vuln/detail/CVE-2023-52426</a>
<a href="https://security.netapp.com/advisory/ntap-20240307-0005/">https://security.netapp.com/advisory/ntap-20240307-0005/</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2023-52426">https://www.cve.org/CVERecord?id=CVE-2023-52426</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libexpat1</td>
<td>CVE-2024-28757</td>
<td class="severity">LOW</td>
<td class="pkg-version">2.5.0-1+deb12u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.openwall.com/lists/oss-security/2024/03/15/1">http://www.openwall.com/lists/oss-security/2024/03/15/1</a>
<a href="https://access.redhat.com/errata/RHSA-2024:1530">https://access.redhat.com/errata/RHSA-2024:1530</a>
<a href="https://access.redhat.com/security/cve/CVE-2024-28757">https://access.redhat.com/security/cve/CVE-2024-28757</a>
<a href="https://bugzilla.redhat.com/2262877">https://bugzilla.redhat.com/2262877</a>
<a href="https://bugzilla.redhat.com/2268766">https://bugzilla.redhat.com/2268766</a>
<a href="https://errata.almalinux.org/9/ALSA-2024-1530.html">https://errata.almalinux.org/9/ALSA-2024-1530.html</a>
<a href="https://github.com/libexpat/libexpat/issues/839">https://github.com/libexpat/libexpat/issues/839</a>
<a href="https://github.com/libexpat/libexpat/pull/842">https://github.com/libexpat/libexpat/pull/842</a>
<a href="https://linux.oracle.com/cve/CVE-2024-28757.html">https://linux.oracle.com/cve/CVE-2024-28757.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2024-1530.html">https://linux.oracle.com/errata/ELSA-2024-1530.html</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPLC6WDSRDUYS7F7JWAOVOHFNOUQ43DD/">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPLC6WDSRDUYS7F7JWAOVOHFNOUQ43DD/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKJ7V5F6LJCEQJXDBWGT27J7NAP3E3N7/">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKJ7V5F6LJCEQJXDBWGT27J7NAP3E3N7/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VK2O34GH43NTHBZBN7G5Y6YKJKPUCTBE/">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VK2O34GH43NTHBZBN7G5Y6YKJKPUCTBE/</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-28757">https://nvd.nist.gov/vuln/detail/CVE-2024-28757</a>
<a href="https://security.netapp.com/advisory/ntap-20240322-0001/">https://security.netapp.com/advisory/ntap-20240322-0001/</a>
<a href="https://ubuntu.com/security/notices/USN-6694-1">https://ubuntu.com/security/notices/USN-6694-1</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2024-28757">https://www.cve.org/CVERecord?id=CVE-2024-28757</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libgcc-s1</td>
<td>CVE-2022-27943</td>
<td class="severity">LOW</td>
<td class="pkg-version">12.2.0-14</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2022-27943">https://access.redhat.com/security/cve/CVE-2022-27943</a>
<a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039">https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039</a>
<a href="https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=1a770b01ef415e114164b6151d1e55acdee09371">https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=1a770b01ef415e114164b6151d1e55acdee09371</a>
<a href="https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=9234cdca6ee88badfc00297e72f13dac4e540c79">https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=9234cdca6ee88badfc00297e72f13dac4e540c79</a>
<a href="https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=fc968115a742d9e4674d9725ce9c2106b91b6ead">https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=fc968115a742d9e4674d9725ce9c2106b91b6ead</a>
<a href="https://gcc.gnu.org/pipermail/gcc-patches/2022-March/592244.html">https://gcc.gnu.org/pipermail/gcc-patches/2022-March/592244.html</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27943">https://nvd.nist.gov/vuln/detail/CVE-2022-27943</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28995">https://sourceware.org/bugzilla/show_bug.cgi?id=28995</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2022-27943">https://www.cve.org/CVERecord?id=CVE-2022-27943</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libgcc-s1</td>
<td>CVE-2023-4039</td>
<td class="severity">LOW</td>
<td class="pkg-version">12.2.0-14</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2023-4039">https://access.redhat.com/security/cve/CVE-2023-4039</a>
<a href="https://developer.arm.com/Arm%20Security%20Center/GCC%20Stack%20Protector%20Vulnerability%20AArch64">https://developer.arm.com/Arm%20Security%20Center/GCC%20Stack%20Protector%20Vulnerability%20AArch64</a>
<a href="https://gcc.gnu.org/git/?p=gcc.git;a=blob_plain;f=SECURITY.txt">https://gcc.gnu.org/git/?p=gcc.git;a=blob_plain;f=SECURITY.txt</a>
<a href="https://gcc.gnu.org/pipermail/gcc-patches/2023-October/634066.html">https://gcc.gnu.org/pipermail/gcc-patches/2023-October/634066.html</a>
<a href="https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-x7ch-h5rf-w2mf">https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-x7ch-h5rf-w2mf</a>
<a href="https://inbox.sourceware.org/gcc-patches/46cfa37b-56eb-344d-0745-e0d35393392d@gotplt.org">https://inbox.sourceware.org/gcc-patches/46cfa37b-56eb-344d-0745-e0d35393392d@gotplt.org</a>
<a href="https://linux.oracle.com/cve/CVE-2023-4039.html">https://linux.oracle.com/cve/CVE-2023-4039.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2023-28766.html">https://linux.oracle.com/errata/ELSA-2023-28766.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4039">https://nvd.nist.gov/vuln/detail/CVE-2023-4039</a>
<a href="https://rtx.meta.security/mitigation/2023/09/12/CVE-2023-4039.html">https://rtx.meta.security/mitigation/2023/09/12/CVE-2023-4039.html</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2023-4039">https://www.cve.org/CVERecord?id=CVE-2023-4039</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libgcrypt20</td>
<td>CVE-2018-6829</td>
<td class="severity">LOW</td>
<td class="pkg-version">1.10.1-3</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2018-6829">https://access.redhat.com/security/cve/CVE-2018-6829</a>
<a href="https://github.com/weikengchen/attack-on-libgcrypt-elgamal">https://github.com/weikengchen/attack-on-libgcrypt-elgamal</a>
<a href="https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki">https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki</a>
<a href="https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html">https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2018-6829">https://nvd.nist.gov/vuln/detail/CVE-2018-6829</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2018-6829">https://www.cve.org/CVERecord?id=CVE-2018-6829</a>
<a href="https://www.oracle.com/security-alerts/cpujan2020.html">https://www.oracle.com/security-alerts/cpujan2020.html</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libgcrypt20</td>
<td>CVE-2024-2236</td>
<td class="severity">LOW</td>
<td class="pkg-version">1.10.1-3</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/errata/RHSA-2024:9404">https://access.redhat.com/errata/RHSA-2024:9404</a>
<a href="https://access.redhat.com/errata/RHSA-2025:3530">https://access.redhat.com/errata/RHSA-2025:3530</a>
<a href="https://access.redhat.com/errata/RHSA-2025:3534">https://access.redhat.com/errata/RHSA-2025:3534</a>
<a href="https://access.redhat.com/security/cve/CVE-2024-2236">https://access.redhat.com/security/cve/CVE-2024-2236</a>
<a href="https://bugzilla.redhat.com/2245218">https://bugzilla.redhat.com/2245218</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2245218">https://bugzilla.redhat.com/show_bug.cgi?id=2245218</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2268268">https://bugzilla.redhat.com/show_bug.cgi?id=2268268</a>
<a href="https://dev.gnupg.org/T7136">https://dev.gnupg.org/T7136</a>
<a href="https://errata.almalinux.org/9/ALSA-2024-9404.html">https://errata.almalinux.org/9/ALSA-2024-9404.html</a>
<a href="https://github.com/tomato42/marvin-toolkit/tree/master/example/libgcrypt">https://github.com/tomato42/marvin-toolkit/tree/master/example/libgcrypt</a>
<a href="https://gitlab.com/redhat-crypto/libgcrypt/libgcrypt-mirror/-/merge_requests/17">https://gitlab.com/redhat-crypto/libgcrypt/libgcrypt-mirror/-/merge_requests/17</a>
<a href="https://linux.oracle.com/cve/CVE-2024-2236.html">https://linux.oracle.com/cve/CVE-2024-2236.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2024-9404.html">https://linux.oracle.com/errata/ELSA-2024-9404.html</a>
<a href="https://lists.gnupg.org/pipermail/gcrypt-devel/2024-March/005607.html">https://lists.gnupg.org/pipermail/gcrypt-devel/2024-March/005607.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-2236">https://nvd.nist.gov/vuln/detail/CVE-2024-2236</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2024-2236">https://www.cve.org/CVERecord?id=CVE-2024-2236</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libgnutls30</td>
<td>CVE-2011-3389</td>
<td class="severity">LOW</td>
<td class="pkg-version">3.7.9-2+deb12u4</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/">http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/</a>
<a href="http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/">http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/</a>
<a href="http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx">http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx</a>
<a href="http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx">http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx</a>
<a href="http://curl.haxx.se/docs/adv_20120124B.html">http://curl.haxx.se/docs/adv_20120124B.html</a>
<a href="http://downloads.asterisk.org/pub/security/AST-2016-001.html">http://downloads.asterisk.org/pub/security/AST-2016-001.html</a>
<a href="http://ekoparty.org/2011/juliano-rizzo.php">http://ekoparty.org/2011/juliano-rizzo.php</a>
<a href="http://eprint.iacr.org/2004/111">http://eprint.iacr.org/2004/111</a>
<a href="http://eprint.iacr.org/2006/136">http://eprint.iacr.org/2006/136</a>
<a href="http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html">http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html</a>
<a href="http://isc.sans.edu/diary/SSL+TLS+part+3+/11635">http://isc.sans.edu/diary/SSL+TLS+part+3+/11635</a>
<a href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html">http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html</a>
<a href="http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html">http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html</a>
<a href="http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html">http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html</a>
<a href="http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html">http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html</a>
<a href="http://lists.apple.com/archives/security-announce/2012/May/msg00001.html">http://lists.apple.com/archives/security-announce/2012/May/msg00001.html</a>
<a href="http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html">http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html</a>
<a href="http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html">http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html</a>
<a href="http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html">http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html</a>
<a href="http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html">http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html</a>
<a href="http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html">http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html</a>
<a href="http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html">http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html</a>
<a href="http://marc.info/?l=bugtraq&amp;m=132750579901589&amp;w=2">http://marc.info/?l=bugtraq&amp;m=132750579901589&amp;w=2</a>
<a href="http://marc.info/?l=bugtraq&amp;m=132872385320240&amp;w=2">http://marc.info/?l=bugtraq&amp;m=132872385320240&amp;w=2</a>
<a href="http://marc.info/?l=bugtraq&amp;m=133365109612558&amp;w=2">http://marc.info/?l=bugtraq&amp;m=133365109612558&amp;w=2</a>
<a href="http://marc.info/?l=bugtraq&amp;m=133728004526190&amp;w=2">http://marc.info/?l=bugtraq&amp;m=133728004526190&amp;w=2</a>
<a href="http://marc.info/?l=bugtraq&amp;m=134254866602253&amp;w=2">http://marc.info/?l=bugtraq&amp;m=134254866602253&amp;w=2</a>
<a href="http://marc.info/?l=bugtraq&amp;m=134254957702612&amp;w=2">http://marc.info/?l=bugtraq&amp;m=134254957702612&amp;w=2</a>
<a href="http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue">http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue</a>
<a href="http://osvdb.org/74829">http://osvdb.org/74829</a>
<a href="http://rhn.redhat.com/errata/RHSA-2012-0508.html">http://rhn.redhat.com/errata/RHSA-2012-0508.html</a>
<a href="http://rhn.redhat.com/errata/RHSA-2013-1455.html">http://rhn.redhat.com/errata/RHSA-2013-1455.html</a>
<a href="http://secunia.com/advisories/45791">http://secunia.com/advisories/45791</a>
<a href="http://secunia.com/advisories/47998">http://secunia.com/advisories/47998</a>
<a href="http://secunia.com/advisories/48256">http://secunia.com/advisories/48256</a>
<a href="http://secunia.com/advisories/48692">http://secunia.com/advisories/48692</a>
<a href="http://secunia.com/advisories/48915">http://secunia.com/advisories/48915</a>
<a href="http://secunia.com/advisories/48948">http://secunia.com/advisories/48948</a>
<a href="http://secunia.com/advisories/49198">http://secunia.com/advisories/49198</a>
<a href="http://secunia.com/advisories/55322">http://secunia.com/advisories/55322</a>
<a href="http://secunia.com/advisories/55350">http://secunia.com/advisories/55350</a>
<a href="http://secunia.com/advisories/55351">http://secunia.com/advisories/55351</a>
<a href="http://security.gentoo.org/glsa/glsa-201203-02.xml">http://security.gentoo.org/glsa/glsa-201203-02.xml</a>
<a href="http://security.gentoo.org/glsa/glsa-201406-32.xml">http://security.gentoo.org/glsa/glsa-201406-32.xml</a>
<a href="http://support.apple.com/kb/HT4999">http://support.apple.com/kb/HT4999</a>
<a href="http://support.apple.com/kb/HT5001">http://support.apple.com/kb/HT5001</a>
<a href="http://support.apple.com/kb/HT5130">http://support.apple.com/kb/HT5130</a>
<a href="http://support.apple.com/kb/HT5281">http://support.apple.com/kb/HT5281</a>
<a href="http://support.apple.com/kb/HT5501">http://support.apple.com/kb/HT5501</a>
<a href="http://support.apple.com/kb/HT6150">http://support.apple.com/kb/HT6150</a>
<a href="http://technet.microsoft.com/security/advisory/2588513">http://technet.microsoft.com/security/advisory/2588513</a>
<a href="http://vnhacker.blogspot.com/2011/09/beast.html">http://vnhacker.blogspot.com/2011/09/beast.html</a>
<a href="http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf">http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf</a>
<a href="http://www.debian.org/security/2012/dsa-2398">http://www.debian.org/security/2012/dsa-2398</a>
<a href="http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html">http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html</a>
<a href="http://www.ibm.com/developerworks/java/jdk/alerts/">http://www.ibm.com/developerworks/java/jdk/alerts/</a>
<a href="http://www.imperialviolet.org/2011/09/23/chromeandbeast.html">http://www.imperialviolet.org/2011/09/23/chromeandbeast.html</a>
<a href="http://www.insecure.cl/Beast-SSL.rar">http://www.insecure.cl/Beast-SSL.rar</a>
<a href="http://www.kb.cert.org/vuls/id/864643">http://www.kb.cert.org/vuls/id/864643</a>
<a href="http://www.mandriva.com/security/advisories?name=MDVSA-2012:058">http://www.mandriva.com/security/advisories?name=MDVSA-2012:058</a>
<a href="http://www.opera.com/docs/changelogs/mac/1151/">http://www.opera.com/docs/changelogs/mac/1151/</a>
<a href="http://www.opera.com/docs/changelogs/mac/1160/">http://www.opera.com/docs/changelogs/mac/1160/</a>
<a href="http://www.opera.com/docs/changelogs/unix/1151/">http://www.opera.com/docs/changelogs/unix/1151/</a>
<a href="http://www.opera.com/docs/changelogs/unix/1160/">http://www.opera.com/docs/changelogs/unix/1160/</a>
<a href="http://www.opera.com/docs/changelogs/windows/1151/">http://www.opera.com/docs/changelogs/windows/1151/</a>
<a href="http://www.opera.com/docs/changelogs/windows/1160/">http://www.opera.com/docs/changelogs/windows/1160/</a>
<a href="http://www.opera.com/support/kb/view/1004/">http://www.opera.com/support/kb/view/1004/</a>
<a href="http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html">http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html</a>
<a href="http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html">http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html</a>
<a href="http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html">http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html</a>
<a href="http://www.redhat.com/support/errata/RHSA-2011-1384.html">http://www.redhat.com/support/errata/RHSA-2011-1384.html</a>
<a href="http://www.redhat.com/support/errata/RHSA-2012-0006.html">http://www.redhat.com/support/errata/RHSA-2012-0006.html</a>
<a href="http://www.securityfocus.com/bid/49388">http://www.securityfocus.com/bid/49388</a>
<a href="http://www.securityfocus.com/bid/49778">http://www.securityfocus.com/bid/49778</a>
<a href="http://www.securitytracker.com/id/1029190">http://www.securitytracker.com/id/1029190</a>
<a href="http://www.securitytracker.com/id?1025997">http://www.securitytracker.com/id?1025997</a>
<a href="http://www.securitytracker.com/id?1026103">http://www.securitytracker.com/id?1026103</a>
<a href="http://www.securitytracker.com/id?1026704">http://www.securitytracker.com/id?1026704</a>
<a href="http://www.ubuntu.com/usn/USN-1263-1">http://www.ubuntu.com/usn/USN-1263-1</a>
<a href="http://www.us-cert.gov/cas/techalerts/TA12-010A.html">http://www.us-cert.gov/cas/techalerts/TA12-010A.html</a>
<a href="https://access.redhat.com/security/cve/CVE-2011-3389">https://access.redhat.com/security/cve/CVE-2011-3389</a>
<a href="https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail">https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail</a>
<a href="https://bugzilla.novell.com/show_bug.cgi?id=719047">https://bugzilla.novell.com/show_bug.cgi?id=719047</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=737506">https://bugzilla.redhat.com/show_bug.cgi?id=737506</a>
<a href="https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf">https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf</a>
<a href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006">https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006</a>
<a href="https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862">https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862</a>
<a href="https://hermes.opensuse.org/messages/13154861">https://hermes.opensuse.org/messages/13154861</a>
<a href="https://hermes.opensuse.org/messages/13155432">https://hermes.opensuse.org/messages/13155432</a>
<a href="https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02">https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02</a>
<a href="https://linux.oracle.com/cve/CVE-2011-3389.html">https://linux.oracle.com/cve/CVE-2011-3389.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2011-1380.html">https://linux.oracle.com/errata/ELSA-2011-1380.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2011-3389">https://nvd.nist.gov/vuln/detail/CVE-2011-3389</a>
<a href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752">https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752</a>
<a href="https://ubuntu.com/security/notices/USN-1263-1">https://ubuntu.com/security/notices/USN-1263-1</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2011-3389">https://www.cve.org/CVERecord?id=CVE-2011-3389</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libgssapi-krb5-2</td>
<td>CVE-2024-26462</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1.20.1-2+deb12u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/errata/RHSA-2024:9331">https://access.redhat.com/errata/RHSA-2024:9331</a>
<a href="https://access.redhat.com/security/cve/CVE-2024-26462">https://access.redhat.com/security/cve/CVE-2024-26462</a>
<a href="https://bugzilla.redhat.com/2266731">https://bugzilla.redhat.com/2266731</a>
<a href="https://bugzilla.redhat.com/2266740">https://bugzilla.redhat.com/2266740</a>
<a href="https://bugzilla.redhat.com/2266742">https://bugzilla.redhat.com/2266742</a>
<a href="https://errata.almalinux.org/9/ALSA-2024-9331.html">https://errata.almalinux.org/9/ALSA-2024-9331.html</a>
<a href="https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_3.md">https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_3.md</a>
<a href="https://linux.oracle.com/cve/CVE-2024-26462.html">https://linux.oracle.com/cve/CVE-2024-26462.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2024-9331.html">https://linux.oracle.com/errata/ELSA-2024-9331.html</a>
<a href="https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html">https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26462">https://nvd.nist.gov/vuln/detail/CVE-2024-26462</a>
<a href="https://security.netapp.com/advisory/ntap-20240415-0012/">https://security.netapp.com/advisory/ntap-20240415-0012/</a>
<a href="https://ubuntu.com/security/notices/USN-7314-1">https://ubuntu.com/security/notices/USN-7314-1</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2024-26462">https://www.cve.org/CVERecord?id=CVE-2024-26462</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libgssapi-krb5-2</td>
<td>CVE-2025-24528</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1.20.1-2+deb12u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/errata/RHSA-2025:2722">https://access.redhat.com/errata/RHSA-2025:2722</a>
<a href="https://access.redhat.com/security/cve/CVE-2025-24528">https://access.redhat.com/security/cve/CVE-2025-24528</a>
<a href="https://bugzilla.redhat.com/2342796">https://bugzilla.redhat.com/2342796</a>
<a href="https://errata.almalinux.org/8/ALSA-2025-2722.html">https://errata.almalinux.org/8/ALSA-2025-2722.html</a>
<a href="https://github.com/krb5/krb5/commit/78ceba024b64d49612375be4a12d1c066b0bfbd0">https://github.com/krb5/krb5/commit/78ceba024b64d49612375be4a12d1c066b0bfbd0</a>
<a href="https://linux.oracle.com/cve/CVE-2025-24528.html">https://linux.oracle.com/cve/CVE-2025-24528.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2025-2722.html">https://linux.oracle.com/errata/ELSA-2025-2722.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-24528">https://nvd.nist.gov/vuln/detail/CVE-2025-24528</a>
<a href="https://ubuntu.com/security/notices/USN-7314-1">https://ubuntu.com/security/notices/USN-7314-1</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2025-24528">https://www.cve.org/CVERecord?id=CVE-2025-24528</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libgssapi-krb5-2</td>
<td>CVE-2025-3576</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1.20.1-2+deb12u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2025-3576">https://access.redhat.com/security/cve/CVE-2025-3576</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2359465">https://bugzilla.redhat.com/show_bug.cgi?id=2359465</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-3576">https://nvd.nist.gov/vuln/detail/CVE-2025-3576</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2025-3576">https://www.cve.org/CVERecord?id=CVE-2025-3576</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libgssapi-krb5-2</td>
<td>CVE-2018-5709</td>
<td class="severity">LOW</td>
<td class="pkg-version">1.20.1-2+deb12u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2018-5709">https://access.redhat.com/security/cve/CVE-2018-5709</a>
<a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a>
<a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2018-5709">https://nvd.nist.gov/vuln/detail/CVE-2018-5709</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2018-5709">https://www.cve.org/CVERecord?id=CVE-2018-5709</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libgssapi-krb5-2</td>
<td>CVE-2024-26458</td>
<td class="severity">LOW</td>
<td class="pkg-version">1.20.1-2+deb12u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/errata/RHSA-2024:9331">https://access.redhat.com/errata/RHSA-2024:9331</a>
<a href="https://access.redhat.com/security/cve/CVE-2024-26458">https://access.redhat.com/security/cve/CVE-2024-26458</a>
<a href="https://bugzilla.redhat.com/2266731">https://bugzilla.redhat.com/2266731</a>
<a href="https://bugzilla.redhat.com/2266740">https://bugzilla.redhat.com/2266740</a>
<a href="https://bugzilla.redhat.com/2266742">https://bugzilla.redhat.com/2266742</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2266731">https://bugzilla.redhat.com/show_bug.cgi?id=2266731</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2266740">https://bugzilla.redhat.com/show_bug.cgi?id=2266740</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461</a>
<a href="https://errata.almalinux.org/9/ALSA-2024-9331.html">https://errata.almalinux.org/9/ALSA-2024-9331.html</a>
<a href="https://errata.rockylinux.org/RLSA-2024:3268">https://errata.rockylinux.org/RLSA-2024:3268</a>
<a href="https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_1.md">https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_1.md</a>
<a href="https://linux.oracle.com/cve/CVE-2024-26458.html">https://linux.oracle.com/cve/CVE-2024-26458.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2024-9331.html">https://linux.oracle.com/errata/ELSA-2024-9331.html</a>
<a href="https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html">https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26458">https://nvd.nist.gov/vuln/detail/CVE-2024-26458</a>
<a href="https://security.netapp.com/advisory/ntap-20240415-0010/">https://security.netapp.com/advisory/ntap-20240415-0010/</a>
<a href="https://ubuntu.com/security/notices/USN-7314-1">https://ubuntu.com/security/notices/USN-7314-1</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2024-26458">https://www.cve.org/CVERecord?id=CVE-2024-26458</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libgssapi-krb5-2</td>
<td>CVE-2024-26461</td>
<td class="severity">LOW</td>
<td class="pkg-version">1.20.1-2+deb12u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/errata/RHSA-2024:9331">https://access.redhat.com/errata/RHSA-2024:9331</a>
<a href="https://access.redhat.com/security/cve/CVE-2024-26461">https://access.redhat.com/security/cve/CVE-2024-26461</a>
<a href="https://bugzilla.redhat.com/2266731">https://bugzilla.redhat.com/2266731</a>
<a href="https://bugzilla.redhat.com/2266740">https://bugzilla.redhat.com/2266740</a>
<a href="https://bugzilla.redhat.com/2266742">https://bugzilla.redhat.com/2266742</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2266731">https://bugzilla.redhat.com/show_bug.cgi?id=2266731</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2266740">https://bugzilla.redhat.com/show_bug.cgi?id=2266740</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461</a>
<a href="https://errata.almalinux.org/9/ALSA-2024-9331.html">https://errata.almalinux.org/9/ALSA-2024-9331.html</a>
<a href="https://errata.rockylinux.org/RLSA-2024:3268">https://errata.rockylinux.org/RLSA-2024:3268</a>
<a href="https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md">https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md</a>
<a href="https://linux.oracle.com/cve/CVE-2024-26461.html">https://linux.oracle.com/cve/CVE-2024-26461.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2024-9331.html">https://linux.oracle.com/errata/ELSA-2024-9331.html</a>
<a href="https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html">https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26461">https://nvd.nist.gov/vuln/detail/CVE-2024-26461</a>
<a href="https://security.netapp.com/advisory/ntap-20240415-0011/">https://security.netapp.com/advisory/ntap-20240415-0011/</a>
<a href="https://ubuntu.com/security/notices/USN-7314-1">https://ubuntu.com/security/notices/USN-7314-1</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2024-26461">https://www.cve.org/CVERecord?id=CVE-2024-26461</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libheif1</td>
<td>CVE-2023-49463</td>
<td class="severity">LOW</td>
<td class="pkg-version">1.15.1-1+deb12u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://github.com/strukturag/libheif">https://github.com/strukturag/libheif</a>
<a href="https://github.com/strukturag/libheif/issues/1042">https://github.com/strukturag/libheif/issues/1042</a>
<a href="https://ubuntu.com/security/notices/USN-6847-1">https://ubuntu.com/security/notices/USN-6847-1</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2023-49463">https://www.cve.org/CVERecord?id=CVE-2023-49463</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libheif1</td>
<td>CVE-2024-25269</td>
<td class="severity">LOW</td>
<td class="pkg-version">1.15.1-1+deb12u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://github.com/strukturag/libheif/issues/1073">https://github.com/strukturag/libheif/issues/1073</a>
</td>
</tr>
<tr class="severity-UNKNOWN">
<td class="pkg-name">libheif1</td>
<td>CVE-2025-43966</td>
<td class="severity">UNKNOWN</td>
<td class="pkg-version">1.15.1-1+deb12u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://github.com/strukturag/libheif/commit/b38555387e4b5dcf036fe45b0c440aca19b7b69c">https://github.com/strukturag/libheif/commit/b38555387e4b5dcf036fe45b0c440aca19b7b69c</a>
<a href="https://github.com/strukturag/libheif/compare/v1.19.5...v1.19.6">https://github.com/strukturag/libheif/compare/v1.19.5...v1.19.6</a>
</td>
</tr>
<tr class="severity-UNKNOWN">
<td class="pkg-name">libheif1</td>
<td>CVE-2025-43967</td>
<td class="severity">UNKNOWN</td>
<td class="pkg-version">1.15.1-1+deb12u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://github.com/strukturag/libheif/commit/6e35af7b0ff9fb6cc952a1539590d160db32f671">https://github.com/strukturag/libheif/commit/6e35af7b0ff9fb6cc952a1539590d160db32f671</a>
<a href="https://github.com/strukturag/libheif/compare/v1.19.5...v1.19.6">https://github.com/strukturag/libheif/compare/v1.19.5...v1.19.6</a>
<a href="https://github.com/strukturag/libheif/issues/1455">https://github.com/strukturag/libheif/issues/1455</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libjbig0</td>
<td>CVE-2017-9937</td>
<td class="severity">LOW</td>
<td class="pkg-version">2.1-6.1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://bugzilla.maptools.org/show_bug.cgi?id=2707">http://bugzilla.maptools.org/show_bug.cgi?id=2707</a>
<a href="http://www.securityfocus.com/bid/99304">http://www.securityfocus.com/bid/99304</a>
<a href="https://access.redhat.com/security/cve/CVE-2017-9937">https://access.redhat.com/security/cve/CVE-2017-9937</a>
<a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2017-9937">https://nvd.nist.gov/vuln/detail/CVE-2017-9937</a>
<a href="https://ubuntu.com/security/notices/USN-5742-1">https://ubuntu.com/security/notices/USN-5742-1</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2017-9937">https://www.cve.org/CVERecord?id=CVE-2017-9937</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libk5crypto3</td>
<td>CVE-2024-26462</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1.20.1-2+deb12u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/errata/RHSA-2024:9331">https://access.redhat.com/errata/RHSA-2024:9331</a>
<a href="https://access.redhat.com/security/cve/CVE-2024-26462">https://access.redhat.com/security/cve/CVE-2024-26462</a>
<a href="https://bugzilla.redhat.com/2266731">https://bugzilla.redhat.com/2266731</a>
<a href="https://bugzilla.redhat.com/2266740">https://bugzilla.redhat.com/2266740</a>
<a href="https://bugzilla.redhat.com/2266742">https://bugzilla.redhat.com/2266742</a>
<a href="https://errata.almalinux.org/9/ALSA-2024-9331.html">https://errata.almalinux.org/9/ALSA-2024-9331.html</a>
<a href="https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_3.md">https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_3.md</a>
<a href="https://linux.oracle.com/cve/CVE-2024-26462.html">https://linux.oracle.com/cve/CVE-2024-26462.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2024-9331.html">https://linux.oracle.com/errata/ELSA-2024-9331.html</a>
<a href="https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html">https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26462">https://nvd.nist.gov/vuln/detail/CVE-2024-26462</a>
<a href="https://security.netapp.com/advisory/ntap-20240415-0012/">https://security.netapp.com/advisory/ntap-20240415-0012/</a>
<a href="https://ubuntu.com/security/notices/USN-7314-1">https://ubuntu.com/security/notices/USN-7314-1</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2024-26462">https://www.cve.org/CVERecord?id=CVE-2024-26462</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libk5crypto3</td>
<td>CVE-2025-24528</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1.20.1-2+deb12u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/errata/RHSA-2025:2722">https://access.redhat.com/errata/RHSA-2025:2722</a>
<a href="https://access.redhat.com/security/cve/CVE-2025-24528">https://access.redhat.com/security/cve/CVE-2025-24528</a>
<a href="https://bugzilla.redhat.com/2342796">https://bugzilla.redhat.com/2342796</a>
<a href="https://errata.almalinux.org/8/ALSA-2025-2722.html">https://errata.almalinux.org/8/ALSA-2025-2722.html</a>
<a href="https://github.com/krb5/krb5/commit/78ceba024b64d49612375be4a12d1c066b0bfbd0">https://github.com/krb5/krb5/commit/78ceba024b64d49612375be4a12d1c066b0bfbd0</a>
<a href="https://linux.oracle.com/cve/CVE-2025-24528.html">https://linux.oracle.com/cve/CVE-2025-24528.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2025-2722.html">https://linux.oracle.com/errata/ELSA-2025-2722.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-24528">https://nvd.nist.gov/vuln/detail/CVE-2025-24528</a>
<a href="https://ubuntu.com/security/notices/USN-7314-1">https://ubuntu.com/security/notices/USN-7314-1</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2025-24528">https://www.cve.org/CVERecord?id=CVE-2025-24528</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libk5crypto3</td>
<td>CVE-2025-3576</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1.20.1-2+deb12u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2025-3576">https://access.redhat.com/security/cve/CVE-2025-3576</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2359465">https://bugzilla.redhat.com/show_bug.cgi?id=2359465</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-3576">https://nvd.nist.gov/vuln/detail/CVE-2025-3576</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2025-3576">https://www.cve.org/CVERecord?id=CVE-2025-3576</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libk5crypto3</td>
<td>CVE-2018-5709</td>
<td class="severity">LOW</td>
<td class="pkg-version">1.20.1-2+deb12u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2018-5709">https://access.redhat.com/security/cve/CVE-2018-5709</a>
<a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a>
<a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2018-5709">https://nvd.nist.gov/vuln/detail/CVE-2018-5709</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2018-5709">https://www.cve.org/CVERecord?id=CVE-2018-5709</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libk5crypto3</td>
<td>CVE-2024-26458</td>
<td class="severity">LOW</td>
<td class="pkg-version">1.20.1-2+deb12u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/errata/RHSA-2024:9331">https://access.redhat.com/errata/RHSA-2024:9331</a>
<a href="https://access.redhat.com/security/cve/CVE-2024-26458">https://access.redhat.com/security/cve/CVE-2024-26458</a>
<a href="https://bugzilla.redhat.com/2266731">https://bugzilla.redhat.com/2266731</a>
<a href="https://bugzilla.redhat.com/2266740">https://bugzilla.redhat.com/2266740</a>
<a href="https://bugzilla.redhat.com/2266742">https://bugzilla.redhat.com/2266742</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2266731">https://bugzilla.redhat.com/show_bug.cgi?id=2266731</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2266740">https://bugzilla.redhat.com/show_bug.cgi?id=2266740</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461</a>
<a href="https://errata.almalinux.org/9/ALSA-2024-9331.html">https://errata.almalinux.org/9/ALSA-2024-9331.html</a>
<a href="https://errata.rockylinux.org/RLSA-2024:3268">https://errata.rockylinux.org/RLSA-2024:3268</a>
<a href="https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_1.md">https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_1.md</a>
<a href="https://linux.oracle.com/cve/CVE-2024-26458.html">https://linux.oracle.com/cve/CVE-2024-26458.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2024-9331.html">https://linux.oracle.com/errata/ELSA-2024-9331.html</a>
<a href="https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html">https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26458">https://nvd.nist.gov/vuln/detail/CVE-2024-26458</a>
<a href="https://security.netapp.com/advisory/ntap-20240415-0010/">https://security.netapp.com/advisory/ntap-20240415-0010/</a>
<a href="https://ubuntu.com/security/notices/USN-7314-1">https://ubuntu.com/security/notices/USN-7314-1</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2024-26458">https://www.cve.org/CVERecord?id=CVE-2024-26458</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libk5crypto3</td>
<td>CVE-2024-26461</td>
<td class="severity">LOW</td>
<td class="pkg-version">1.20.1-2+deb12u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/errata/RHSA-2024:9331">https://access.redhat.com/errata/RHSA-2024:9331</a>
<a href="https://access.redhat.com/security/cve/CVE-2024-26461">https://access.redhat.com/security/cve/CVE-2024-26461</a>
<a href="https://bugzilla.redhat.com/2266731">https://bugzilla.redhat.com/2266731</a>
<a href="https://bugzilla.redhat.com/2266740">https://bugzilla.redhat.com/2266740</a>
<a href="https://bugzilla.redhat.com/2266742">https://bugzilla.redhat.com/2266742</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2266731">https://bugzilla.redhat.com/show_bug.cgi?id=2266731</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2266740">https://bugzilla.redhat.com/show_bug.cgi?id=2266740</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461</a>
<a href="https://errata.almalinux.org/9/ALSA-2024-9331.html">https://errata.almalinux.org/9/ALSA-2024-9331.html</a>
<a href="https://errata.rockylinux.org/RLSA-2024:3268">https://errata.rockylinux.org/RLSA-2024:3268</a>
<a href="https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md">https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md</a>
<a href="https://linux.oracle.com/cve/CVE-2024-26461.html">https://linux.oracle.com/cve/CVE-2024-26461.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2024-9331.html">https://linux.oracle.com/errata/ELSA-2024-9331.html</a>
<a href="https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html">https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26461">https://nvd.nist.gov/vuln/detail/CVE-2024-26461</a>
<a href="https://security.netapp.com/advisory/ntap-20240415-0011/">https://security.netapp.com/advisory/ntap-20240415-0011/</a>
<a href="https://ubuntu.com/security/notices/USN-7314-1">https://ubuntu.com/security/notices/USN-7314-1</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2024-26461">https://www.cve.org/CVERecord?id=CVE-2024-26461</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libkrb5-3</td>
<td>CVE-2024-26462</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1.20.1-2+deb12u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/errata/RHSA-2024:9331">https://access.redhat.com/errata/RHSA-2024:9331</a>
<a href="https://access.redhat.com/security/cve/CVE-2024-26462">https://access.redhat.com/security/cve/CVE-2024-26462</a>
<a href="https://bugzilla.redhat.com/2266731">https://bugzilla.redhat.com/2266731</a>
<a href="https://bugzilla.redhat.com/2266740">https://bugzilla.redhat.com/2266740</a>
<a href="https://bugzilla.redhat.com/2266742">https://bugzilla.redhat.com/2266742</a>
<a href="https://errata.almalinux.org/9/ALSA-2024-9331.html">https://errata.almalinux.org/9/ALSA-2024-9331.html</a>
<a href="https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_3.md">https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_3.md</a>
<a href="https://linux.oracle.com/cve/CVE-2024-26462.html">https://linux.oracle.com/cve/CVE-2024-26462.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2024-9331.html">https://linux.oracle.com/errata/ELSA-2024-9331.html</a>
<a href="https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html">https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26462">https://nvd.nist.gov/vuln/detail/CVE-2024-26462</a>
<a href="https://security.netapp.com/advisory/ntap-20240415-0012/">https://security.netapp.com/advisory/ntap-20240415-0012/</a>
<a href="https://ubuntu.com/security/notices/USN-7314-1">https://ubuntu.com/security/notices/USN-7314-1</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2024-26462">https://www.cve.org/CVERecord?id=CVE-2024-26462</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libkrb5-3</td>
<td>CVE-2025-24528</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1.20.1-2+deb12u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/errata/RHSA-2025:2722">https://access.redhat.com/errata/RHSA-2025:2722</a>
<a href="https://access.redhat.com/security/cve/CVE-2025-24528">https://access.redhat.com/security/cve/CVE-2025-24528</a>
<a href="https://bugzilla.redhat.com/2342796">https://bugzilla.redhat.com/2342796</a>
<a href="https://errata.almalinux.org/8/ALSA-2025-2722.html">https://errata.almalinux.org/8/ALSA-2025-2722.html</a>
<a href="https://github.com/krb5/krb5/commit/78ceba024b64d49612375be4a12d1c066b0bfbd0">https://github.com/krb5/krb5/commit/78ceba024b64d49612375be4a12d1c066b0bfbd0</a>
<a href="https://linux.oracle.com/cve/CVE-2025-24528.html">https://linux.oracle.com/cve/CVE-2025-24528.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2025-2722.html">https://linux.oracle.com/errata/ELSA-2025-2722.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-24528">https://nvd.nist.gov/vuln/detail/CVE-2025-24528</a>
<a href="https://ubuntu.com/security/notices/USN-7314-1">https://ubuntu.com/security/notices/USN-7314-1</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2025-24528">https://www.cve.org/CVERecord?id=CVE-2025-24528</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libkrb5-3</td>
<td>CVE-2025-3576</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1.20.1-2+deb12u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2025-3576">https://access.redhat.com/security/cve/CVE-2025-3576</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2359465">https://bugzilla.redhat.com/show_bug.cgi?id=2359465</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-3576">https://nvd.nist.gov/vuln/detail/CVE-2025-3576</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2025-3576">https://www.cve.org/CVERecord?id=CVE-2025-3576</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libkrb5-3</td>
<td>CVE-2018-5709</td>
<td class="severity">LOW</td>
<td class="pkg-version">1.20.1-2+deb12u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2018-5709">https://access.redhat.com/security/cve/CVE-2018-5709</a>
<a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a>
<a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2018-5709">https://nvd.nist.gov/vuln/detail/CVE-2018-5709</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2018-5709">https://www.cve.org/CVERecord?id=CVE-2018-5709</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libkrb5-3</td>
<td>CVE-2024-26458</td>
<td class="severity">LOW</td>
<td class="pkg-version">1.20.1-2+deb12u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/errata/RHSA-2024:9331">https://access.redhat.com/errata/RHSA-2024:9331</a>
<a href="https://access.redhat.com/security/cve/CVE-2024-26458">https://access.redhat.com/security/cve/CVE-2024-26458</a>
<a href="https://bugzilla.redhat.com/2266731">https://bugzilla.redhat.com/2266731</a>
<a href="https://bugzilla.redhat.com/2266740">https://bugzilla.redhat.com/2266740</a>
<a href="https://bugzilla.redhat.com/2266742">https://bugzilla.redhat.com/2266742</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2266731">https://bugzilla.redhat.com/show_bug.cgi?id=2266731</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2266740">https://bugzilla.redhat.com/show_bug.cgi?id=2266740</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461</a>
<a href="https://errata.almalinux.org/9/ALSA-2024-9331.html">https://errata.almalinux.org/9/ALSA-2024-9331.html</a>
<a href="https://errata.rockylinux.org/RLSA-2024:3268">https://errata.rockylinux.org/RLSA-2024:3268</a>
<a href="https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_1.md">https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_1.md</a>
<a href="https://linux.oracle.com/cve/CVE-2024-26458.html">https://linux.oracle.com/cve/CVE-2024-26458.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2024-9331.html">https://linux.oracle.com/errata/ELSA-2024-9331.html</a>
<a href="https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html">https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26458">https://nvd.nist.gov/vuln/detail/CVE-2024-26458</a>
<a href="https://security.netapp.com/advisory/ntap-20240415-0010/">https://security.netapp.com/advisory/ntap-20240415-0010/</a>
<a href="https://ubuntu.com/security/notices/USN-7314-1">https://ubuntu.com/security/notices/USN-7314-1</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2024-26458">https://www.cve.org/CVERecord?id=CVE-2024-26458</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libkrb5-3</td>
<td>CVE-2024-26461</td>
<td class="severity">LOW</td>
<td class="pkg-version">1.20.1-2+deb12u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/errata/RHSA-2024:9331">https://access.redhat.com/errata/RHSA-2024:9331</a>
<a href="https://access.redhat.com/security/cve/CVE-2024-26461">https://access.redhat.com/security/cve/CVE-2024-26461</a>
<a href="https://bugzilla.redhat.com/2266731">https://bugzilla.redhat.com/2266731</a>
<a href="https://bugzilla.redhat.com/2266740">https://bugzilla.redhat.com/2266740</a>
<a href="https://bugzilla.redhat.com/2266742">https://bugzilla.redhat.com/2266742</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2266731">https://bugzilla.redhat.com/show_bug.cgi?id=2266731</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2266740">https://bugzilla.redhat.com/show_bug.cgi?id=2266740</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461</a>
<a href="https://errata.almalinux.org/9/ALSA-2024-9331.html">https://errata.almalinux.org/9/ALSA-2024-9331.html</a>
<a href="https://errata.rockylinux.org/RLSA-2024:3268">https://errata.rockylinux.org/RLSA-2024:3268</a>
<a href="https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md">https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md</a>
<a href="https://linux.oracle.com/cve/CVE-2024-26461.html">https://linux.oracle.com/cve/CVE-2024-26461.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2024-9331.html">https://linux.oracle.com/errata/ELSA-2024-9331.html</a>
<a href="https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html">https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26461">https://nvd.nist.gov/vuln/detail/CVE-2024-26461</a>
<a href="https://security.netapp.com/advisory/ntap-20240415-0011/">https://security.netapp.com/advisory/ntap-20240415-0011/</a>
<a href="https://ubuntu.com/security/notices/USN-7314-1">https://ubuntu.com/security/notices/USN-7314-1</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2024-26461">https://www.cve.org/CVERecord?id=CVE-2024-26461</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libkrb5support0</td>
<td>CVE-2024-26462</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1.20.1-2+deb12u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/errata/RHSA-2024:9331">https://access.redhat.com/errata/RHSA-2024:9331</a>
<a href="https://access.redhat.com/security/cve/CVE-2024-26462">https://access.redhat.com/security/cve/CVE-2024-26462</a>
<a href="https://bugzilla.redhat.com/2266731">https://bugzilla.redhat.com/2266731</a>
<a href="https://bugzilla.redhat.com/2266740">https://bugzilla.redhat.com/2266740</a>
<a href="https://bugzilla.redhat.com/2266742">https://bugzilla.redhat.com/2266742</a>
<a href="https://errata.almalinux.org/9/ALSA-2024-9331.html">https://errata.almalinux.org/9/ALSA-2024-9331.html</a>
<a href="https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_3.md">https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_3.md</a>
<a href="https://linux.oracle.com/cve/CVE-2024-26462.html">https://linux.oracle.com/cve/CVE-2024-26462.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2024-9331.html">https://linux.oracle.com/errata/ELSA-2024-9331.html</a>
<a href="https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html">https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26462">https://nvd.nist.gov/vuln/detail/CVE-2024-26462</a>
<a href="https://security.netapp.com/advisory/ntap-20240415-0012/">https://security.netapp.com/advisory/ntap-20240415-0012/</a>
<a href="https://ubuntu.com/security/notices/USN-7314-1">https://ubuntu.com/security/notices/USN-7314-1</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2024-26462">https://www.cve.org/CVERecord?id=CVE-2024-26462</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libkrb5support0</td>
<td>CVE-2025-24528</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1.20.1-2+deb12u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/errata/RHSA-2025:2722">https://access.redhat.com/errata/RHSA-2025:2722</a>
<a href="https://access.redhat.com/security/cve/CVE-2025-24528">https://access.redhat.com/security/cve/CVE-2025-24528</a>
<a href="https://bugzilla.redhat.com/2342796">https://bugzilla.redhat.com/2342796</a>
<a href="https://errata.almalinux.org/8/ALSA-2025-2722.html">https://errata.almalinux.org/8/ALSA-2025-2722.html</a>
<a href="https://github.com/krb5/krb5/commit/78ceba024b64d49612375be4a12d1c066b0bfbd0">https://github.com/krb5/krb5/commit/78ceba024b64d49612375be4a12d1c066b0bfbd0</a>
<a href="https://linux.oracle.com/cve/CVE-2025-24528.html">https://linux.oracle.com/cve/CVE-2025-24528.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2025-2722.html">https://linux.oracle.com/errata/ELSA-2025-2722.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-24528">https://nvd.nist.gov/vuln/detail/CVE-2025-24528</a>
<a href="https://ubuntu.com/security/notices/USN-7314-1">https://ubuntu.com/security/notices/USN-7314-1</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2025-24528">https://www.cve.org/CVERecord?id=CVE-2025-24528</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libkrb5support0</td>
<td>CVE-2025-3576</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1.20.1-2+deb12u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2025-3576">https://access.redhat.com/security/cve/CVE-2025-3576</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2359465">https://bugzilla.redhat.com/show_bug.cgi?id=2359465</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-3576">https://nvd.nist.gov/vuln/detail/CVE-2025-3576</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2025-3576">https://www.cve.org/CVERecord?id=CVE-2025-3576</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libkrb5support0</td>
<td>CVE-2018-5709</td>
<td class="severity">LOW</td>
<td class="pkg-version">1.20.1-2+deb12u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2018-5709">https://access.redhat.com/security/cve/CVE-2018-5709</a>
<a href="https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow">https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow</a>
<a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2018-5709">https://nvd.nist.gov/vuln/detail/CVE-2018-5709</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2018-5709">https://www.cve.org/CVERecord?id=CVE-2018-5709</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libkrb5support0</td>
<td>CVE-2024-26458</td>
<td class="severity">LOW</td>
<td class="pkg-version">1.20.1-2+deb12u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/errata/RHSA-2024:9331">https://access.redhat.com/errata/RHSA-2024:9331</a>
<a href="https://access.redhat.com/security/cve/CVE-2024-26458">https://access.redhat.com/security/cve/CVE-2024-26458</a>
<a href="https://bugzilla.redhat.com/2266731">https://bugzilla.redhat.com/2266731</a>
<a href="https://bugzilla.redhat.com/2266740">https://bugzilla.redhat.com/2266740</a>
<a href="https://bugzilla.redhat.com/2266742">https://bugzilla.redhat.com/2266742</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2266731">https://bugzilla.redhat.com/show_bug.cgi?id=2266731</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2266740">https://bugzilla.redhat.com/show_bug.cgi?id=2266740</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461</a>
<a href="https://errata.almalinux.org/9/ALSA-2024-9331.html">https://errata.almalinux.org/9/ALSA-2024-9331.html</a>
<a href="https://errata.rockylinux.org/RLSA-2024:3268">https://errata.rockylinux.org/RLSA-2024:3268</a>
<a href="https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_1.md">https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_1.md</a>
<a href="https://linux.oracle.com/cve/CVE-2024-26458.html">https://linux.oracle.com/cve/CVE-2024-26458.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2024-9331.html">https://linux.oracle.com/errata/ELSA-2024-9331.html</a>
<a href="https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html">https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26458">https://nvd.nist.gov/vuln/detail/CVE-2024-26458</a>
<a href="https://security.netapp.com/advisory/ntap-20240415-0010/">https://security.netapp.com/advisory/ntap-20240415-0010/</a>
<a href="https://ubuntu.com/security/notices/USN-7314-1">https://ubuntu.com/security/notices/USN-7314-1</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2024-26458">https://www.cve.org/CVERecord?id=CVE-2024-26458</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libkrb5support0</td>
<td>CVE-2024-26461</td>
<td class="severity">LOW</td>
<td class="pkg-version">1.20.1-2+deb12u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/errata/RHSA-2024:9331">https://access.redhat.com/errata/RHSA-2024:9331</a>
<a href="https://access.redhat.com/security/cve/CVE-2024-26461">https://access.redhat.com/security/cve/CVE-2024-26461</a>
<a href="https://bugzilla.redhat.com/2266731">https://bugzilla.redhat.com/2266731</a>
<a href="https://bugzilla.redhat.com/2266740">https://bugzilla.redhat.com/2266740</a>
<a href="https://bugzilla.redhat.com/2266742">https://bugzilla.redhat.com/2266742</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2266731">https://bugzilla.redhat.com/show_bug.cgi?id=2266731</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2266740">https://bugzilla.redhat.com/show_bug.cgi?id=2266740</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461</a>
<a href="https://errata.almalinux.org/9/ALSA-2024-9331.html">https://errata.almalinux.org/9/ALSA-2024-9331.html</a>
<a href="https://errata.rockylinux.org/RLSA-2024:3268">https://errata.rockylinux.org/RLSA-2024:3268</a>
<a href="https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md">https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md</a>
<a href="https://linux.oracle.com/cve/CVE-2024-26461.html">https://linux.oracle.com/cve/CVE-2024-26461.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2024-9331.html">https://linux.oracle.com/errata/ELSA-2024-9331.html</a>
<a href="https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html">https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-26461">https://nvd.nist.gov/vuln/detail/CVE-2024-26461</a>
<a href="https://security.netapp.com/advisory/ntap-20240415-0011/">https://security.netapp.com/advisory/ntap-20240415-0011/</a>
<a href="https://ubuntu.com/security/notices/USN-7314-1">https://ubuntu.com/security/notices/USN-7314-1</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2024-26461">https://www.cve.org/CVERecord?id=CVE-2024-26461</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libldap-2.5-0</td>
<td>CVE-2023-2953</td>
<td class="severity">HIGH</td>
<td class="pkg-version">2.5.13+dfsg-5</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://seclists.org/fulldisclosure/2023/Jul/47">http://seclists.org/fulldisclosure/2023/Jul/47</a>
<a href="http://seclists.org/fulldisclosure/2023/Jul/48">http://seclists.org/fulldisclosure/2023/Jul/48</a>
<a href="http://seclists.org/fulldisclosure/2023/Jul/52">http://seclists.org/fulldisclosure/2023/Jul/52</a>
<a href="https://access.redhat.com/errata/RHSA-2024:4264">https://access.redhat.com/errata/RHSA-2024:4264</a>
<a href="https://access.redhat.com/security/cve/CVE-2023-2953">https://access.redhat.com/security/cve/CVE-2023-2953</a>
<a href="https://bugs.openldap.org/show_bug.cgi?id=9904">https://bugs.openldap.org/show_bug.cgi?id=9904</a>
<a href="https://bugzilla.redhat.com/2210651">https://bugzilla.redhat.com/2210651</a>
<a href="https://errata.almalinux.org/8/ALSA-2024-4264.html">https://errata.almalinux.org/8/ALSA-2024-4264.html</a>
<a href="https://linux.oracle.com/cve/CVE-2023-2953.html">https://linux.oracle.com/cve/CVE-2023-2953.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2024-4264.html">https://linux.oracle.com/errata/ELSA-2024-4264.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2953">https://nvd.nist.gov/vuln/detail/CVE-2023-2953</a>
<a href="https://security.netapp.com/advisory/ntap-20230703-0005/">https://security.netapp.com/advisory/ntap-20230703-0005/</a>
<a href="https://support.apple.com/kb/HT213843">https://support.apple.com/kb/HT213843</a>
<a href="https://support.apple.com/kb/HT213844">https://support.apple.com/kb/HT213844</a>
<a href="https://support.apple.com/kb/HT213845">https://support.apple.com/kb/HT213845</a>
<a href="https://ubuntu.com/security/notices/USN-6197-1">https://ubuntu.com/security/notices/USN-6197-1</a>
<a href="https://ubuntu.com/security/notices/USN-6616-1">https://ubuntu.com/security/notices/USN-6616-1</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2023-2953">https://www.cve.org/CVERecord?id=CVE-2023-2953</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libldap-2.5-0</td>
<td>CVE-2015-3276</td>
<td class="severity">LOW</td>
<td class="pkg-version">2.5.13+dfsg-5</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://rhn.redhat.com/errata/RHSA-2015-2131.html">http://rhn.redhat.com/errata/RHSA-2015-2131.html</a>
<a href="http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html">http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html</a>
<a href="http://www.securitytracker.com/id/1034221">http://www.securitytracker.com/id/1034221</a>
<a href="https://access.redhat.com/security/cve/CVE-2015-3276">https://access.redhat.com/security/cve/CVE-2015-3276</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=1238322">https://bugzilla.redhat.com/show_bug.cgi?id=1238322</a>
<a href="https://linux.oracle.com/cve/CVE-2015-3276.html">https://linux.oracle.com/cve/CVE-2015-3276.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2015-2131.html">https://linux.oracle.com/errata/ELSA-2015-2131.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2015-3276">https://nvd.nist.gov/vuln/detail/CVE-2015-3276</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2015-3276">https://www.cve.org/CVERecord?id=CVE-2015-3276</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libldap-2.5-0</td>
<td>CVE-2017-14159</td>
<td class="severity">LOW</td>
<td class="pkg-version">2.5.13+dfsg-5</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.openldap.org/its/index.cgi?findid=8703">http://www.openldap.org/its/index.cgi?findid=8703</a>
<a href="https://access.redhat.com/security/cve/CVE-2017-14159">https://access.redhat.com/security/cve/CVE-2017-14159</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2017-14159">https://nvd.nist.gov/vuln/detail/CVE-2017-14159</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2017-14159">https://www.cve.org/CVERecord?id=CVE-2017-14159</a>
<a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libldap-2.5-0</td>
<td>CVE-2017-17740</td>
<td class="severity">LOW</td>
<td class="pkg-version">2.5.13+dfsg-5</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html</a>
<a href="http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html">http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html</a>
<a href="http://www.openldap.org/its/index.cgi/Incoming?id=8759">http://www.openldap.org/its/index.cgi/Incoming?id=8759</a>
<a href="https://access.redhat.com/security/cve/CVE-2017-17740">https://access.redhat.com/security/cve/CVE-2017-17740</a>
<a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2017-17740">https://nvd.nist.gov/vuln/detail/CVE-2017-17740</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2017-17740">https://www.cve.org/CVERecord?id=CVE-2017-17740</a>
<a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libldap-2.5-0</td>
<td>CVE-2020-15719</td>
<td class="severity">LOW</td>
<td class="pkg-version">2.5.13+dfsg-5</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html">http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html</a>
<a href="http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html">http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html</a>
<a href="https://access.redhat.com/errata/RHBA-2019:3674">https://access.redhat.com/errata/RHBA-2019:3674</a>
<a href="https://access.redhat.com/security/cve/CVE-2020-15719">https://access.redhat.com/security/cve/CVE-2020-15719</a>
<a href="https://bugs.openldap.org/show_bug.cgi?id=9266">https://bugs.openldap.org/show_bug.cgi?id=9266</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=1740070">https://bugzilla.redhat.com/show_bug.cgi?id=1740070</a>
<a href="https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365">https://kc.mcafee.com/corporate/index?page=content&amp;id=SB10365</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-15719">https://nvd.nist.gov/vuln/detail/CVE-2020-15719</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2020-15719">https://www.cve.org/CVERecord?id=CVE-2020-15719</a>
<a href="https://www.oracle.com/security-alerts/cpuapr2022.html">https://www.oracle.com/security-alerts/cpuapr2022.html</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libmount1</td>
<td>CVE-2022-0563</td>
<td class="severity">LOW</td>
<td class="pkg-version">2.38.1-5+deb12u3</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a>
<a href="https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/">https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/</a>
<a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u</a>
<a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a>
<a href="https://security.gentoo.org/glsa/202401-08">https://security.gentoo.org/glsa/202401-08</a>
<a href="https://security.netapp.com/advisory/ntap-20220331-0002/">https://security.netapp.com/advisory/ntap-20220331-0002/</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2022-0563">https://www.cve.org/CVERecord?id=CVE-2022-0563</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libpam-modules</td>
<td>CVE-2024-10041</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1.5.2-6+deb12u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/errata/RHSA-2024:10379">https://access.redhat.com/errata/RHSA-2024:10379</a>
<a href="https://access.redhat.com/errata/RHSA-2024:11250">https://access.redhat.com/errata/RHSA-2024:11250</a>
<a href="https://access.redhat.com/errata/RHSA-2024:9941">https://access.redhat.com/errata/RHSA-2024:9941</a>
<a href="https://access.redhat.com/security/cve/CVE-2024-10041">https://access.redhat.com/security/cve/CVE-2024-10041</a>
<a href="https://bugzilla.redhat.com/2319212">https://bugzilla.redhat.com/2319212</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2319212">https://bugzilla.redhat.com/show_bug.cgi?id=2319212</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2324291">https://bugzilla.redhat.com/show_bug.cgi?id=2324291</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10041">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10041</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10963">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10963</a>
<a href="https://errata.almalinux.org/9/ALSA-2024-11250.html">https://errata.almalinux.org/9/ALSA-2024-11250.html</a>
<a href="https://errata.rockylinux.org/RLSA-2024:10379">https://errata.rockylinux.org/RLSA-2024:10379</a>
<a href="https://linux.oracle.com/cve/CVE-2024-10041.html">https://linux.oracle.com/cve/CVE-2024-10041.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2024-11250.html">https://linux.oracle.com/errata/ELSA-2024-11250.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-10041">https://nvd.nist.gov/vuln/detail/CVE-2024-10041</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2024-10041">https://www.cve.org/CVERecord?id=CVE-2024-10041</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libpam-modules</td>
<td>CVE-2024-22365</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1.5.2-6+deb12u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.openwall.com/lists/oss-security/2024/01/18/3">http://www.openwall.com/lists/oss-security/2024/01/18/3</a>
<a href="https://access.redhat.com/errata/RHSA-2024:2438">https://access.redhat.com/errata/RHSA-2024:2438</a>
<a href="https://access.redhat.com/security/cve/CVE-2024-22365">https://access.redhat.com/security/cve/CVE-2024-22365</a>
<a href="https://bugzilla.redhat.com/2257722">https://bugzilla.redhat.com/2257722</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2257722">https://bugzilla.redhat.com/show_bug.cgi?id=2257722</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22365">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22365</a>
<a href="https://errata.almalinux.org/9/ALSA-2024-2438.html">https://errata.almalinux.org/9/ALSA-2024-2438.html</a>
<a href="https://errata.rockylinux.org/RLSA-2024:3163">https://errata.rockylinux.org/RLSA-2024:3163</a>
<a href="https://github.com/linux-pam/linux-pam">https://github.com/linux-pam/linux-pam</a>
<a href="https://github.com/linux-pam/linux-pam/commit/031bb5a5d0d950253b68138b498dc93be69a64cb">https://github.com/linux-pam/linux-pam/commit/031bb5a5d0d950253b68138b498dc93be69a64cb</a>
<a href="https://github.com/linux-pam/linux-pam/releases/tag/v1.6.0">https://github.com/linux-pam/linux-pam/releases/tag/v1.6.0</a>
<a href="https://linux.oracle.com/cve/CVE-2024-22365.html">https://linux.oracle.com/cve/CVE-2024-22365.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2024-3163.html">https://linux.oracle.com/errata/ELSA-2024-3163.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-22365">https://nvd.nist.gov/vuln/detail/CVE-2024-22365</a>
<a href="https://ubuntu.com/security/notices/USN-6588-1">https://ubuntu.com/security/notices/USN-6588-1</a>
<a href="https://ubuntu.com/security/notices/USN-6588-2">https://ubuntu.com/security/notices/USN-6588-2</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2024-22365">https://www.cve.org/CVERecord?id=CVE-2024-22365</a>
<a href="https://www.openwall.com/lists/oss-security/2024/01/18/3">https://www.openwall.com/lists/oss-security/2024/01/18/3</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libpam-modules-bin</td>
<td>CVE-2024-10041</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1.5.2-6+deb12u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/errata/RHSA-2024:10379">https://access.redhat.com/errata/RHSA-2024:10379</a>
<a href="https://access.redhat.com/errata/RHSA-2024:11250">https://access.redhat.com/errata/RHSA-2024:11250</a>
<a href="https://access.redhat.com/errata/RHSA-2024:9941">https://access.redhat.com/errata/RHSA-2024:9941</a>
<a href="https://access.redhat.com/security/cve/CVE-2024-10041">https://access.redhat.com/security/cve/CVE-2024-10041</a>
<a href="https://bugzilla.redhat.com/2319212">https://bugzilla.redhat.com/2319212</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2319212">https://bugzilla.redhat.com/show_bug.cgi?id=2319212</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2324291">https://bugzilla.redhat.com/show_bug.cgi?id=2324291</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10041">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10041</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10963">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10963</a>
<a href="https://errata.almalinux.org/9/ALSA-2024-11250.html">https://errata.almalinux.org/9/ALSA-2024-11250.html</a>
<a href="https://errata.rockylinux.org/RLSA-2024:10379">https://errata.rockylinux.org/RLSA-2024:10379</a>
<a href="https://linux.oracle.com/cve/CVE-2024-10041.html">https://linux.oracle.com/cve/CVE-2024-10041.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2024-11250.html">https://linux.oracle.com/errata/ELSA-2024-11250.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-10041">https://nvd.nist.gov/vuln/detail/CVE-2024-10041</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2024-10041">https://www.cve.org/CVERecord?id=CVE-2024-10041</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libpam-modules-bin</td>
<td>CVE-2024-22365</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1.5.2-6+deb12u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.openwall.com/lists/oss-security/2024/01/18/3">http://www.openwall.com/lists/oss-security/2024/01/18/3</a>
<a href="https://access.redhat.com/errata/RHSA-2024:2438">https://access.redhat.com/errata/RHSA-2024:2438</a>
<a href="https://access.redhat.com/security/cve/CVE-2024-22365">https://access.redhat.com/security/cve/CVE-2024-22365</a>
<a href="https://bugzilla.redhat.com/2257722">https://bugzilla.redhat.com/2257722</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2257722">https://bugzilla.redhat.com/show_bug.cgi?id=2257722</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22365">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22365</a>
<a href="https://errata.almalinux.org/9/ALSA-2024-2438.html">https://errata.almalinux.org/9/ALSA-2024-2438.html</a>
<a href="https://errata.rockylinux.org/RLSA-2024:3163">https://errata.rockylinux.org/RLSA-2024:3163</a>
<a href="https://github.com/linux-pam/linux-pam">https://github.com/linux-pam/linux-pam</a>
<a href="https://github.com/linux-pam/linux-pam/commit/031bb5a5d0d950253b68138b498dc93be69a64cb">https://github.com/linux-pam/linux-pam/commit/031bb5a5d0d950253b68138b498dc93be69a64cb</a>
<a href="https://github.com/linux-pam/linux-pam/releases/tag/v1.6.0">https://github.com/linux-pam/linux-pam/releases/tag/v1.6.0</a>
<a href="https://linux.oracle.com/cve/CVE-2024-22365.html">https://linux.oracle.com/cve/CVE-2024-22365.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2024-3163.html">https://linux.oracle.com/errata/ELSA-2024-3163.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-22365">https://nvd.nist.gov/vuln/detail/CVE-2024-22365</a>
<a href="https://ubuntu.com/security/notices/USN-6588-1">https://ubuntu.com/security/notices/USN-6588-1</a>
<a href="https://ubuntu.com/security/notices/USN-6588-2">https://ubuntu.com/security/notices/USN-6588-2</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2024-22365">https://www.cve.org/CVERecord?id=CVE-2024-22365</a>
<a href="https://www.openwall.com/lists/oss-security/2024/01/18/3">https://www.openwall.com/lists/oss-security/2024/01/18/3</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libpam-runtime</td>
<td>CVE-2024-10041</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1.5.2-6+deb12u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/errata/RHSA-2024:10379">https://access.redhat.com/errata/RHSA-2024:10379</a>
<a href="https://access.redhat.com/errata/RHSA-2024:11250">https://access.redhat.com/errata/RHSA-2024:11250</a>
<a href="https://access.redhat.com/errata/RHSA-2024:9941">https://access.redhat.com/errata/RHSA-2024:9941</a>
<a href="https://access.redhat.com/security/cve/CVE-2024-10041">https://access.redhat.com/security/cve/CVE-2024-10041</a>
<a href="https://bugzilla.redhat.com/2319212">https://bugzilla.redhat.com/2319212</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2319212">https://bugzilla.redhat.com/show_bug.cgi?id=2319212</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2324291">https://bugzilla.redhat.com/show_bug.cgi?id=2324291</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10041">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10041</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10963">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10963</a>
<a href="https://errata.almalinux.org/9/ALSA-2024-11250.html">https://errata.almalinux.org/9/ALSA-2024-11250.html</a>
<a href="https://errata.rockylinux.org/RLSA-2024:10379">https://errata.rockylinux.org/RLSA-2024:10379</a>
<a href="https://linux.oracle.com/cve/CVE-2024-10041.html">https://linux.oracle.com/cve/CVE-2024-10041.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2024-11250.html">https://linux.oracle.com/errata/ELSA-2024-11250.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-10041">https://nvd.nist.gov/vuln/detail/CVE-2024-10041</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2024-10041">https://www.cve.org/CVERecord?id=CVE-2024-10041</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libpam-runtime</td>
<td>CVE-2024-22365</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1.5.2-6+deb12u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.openwall.com/lists/oss-security/2024/01/18/3">http://www.openwall.com/lists/oss-security/2024/01/18/3</a>
<a href="https://access.redhat.com/errata/RHSA-2024:2438">https://access.redhat.com/errata/RHSA-2024:2438</a>
<a href="https://access.redhat.com/security/cve/CVE-2024-22365">https://access.redhat.com/security/cve/CVE-2024-22365</a>
<a href="https://bugzilla.redhat.com/2257722">https://bugzilla.redhat.com/2257722</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2257722">https://bugzilla.redhat.com/show_bug.cgi?id=2257722</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22365">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22365</a>
<a href="https://errata.almalinux.org/9/ALSA-2024-2438.html">https://errata.almalinux.org/9/ALSA-2024-2438.html</a>
<a href="https://errata.rockylinux.org/RLSA-2024:3163">https://errata.rockylinux.org/RLSA-2024:3163</a>
<a href="https://github.com/linux-pam/linux-pam">https://github.com/linux-pam/linux-pam</a>
<a href="https://github.com/linux-pam/linux-pam/commit/031bb5a5d0d950253b68138b498dc93be69a64cb">https://github.com/linux-pam/linux-pam/commit/031bb5a5d0d950253b68138b498dc93be69a64cb</a>
<a href="https://github.com/linux-pam/linux-pam/releases/tag/v1.6.0">https://github.com/linux-pam/linux-pam/releases/tag/v1.6.0</a>
<a href="https://linux.oracle.com/cve/CVE-2024-22365.html">https://linux.oracle.com/cve/CVE-2024-22365.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2024-3163.html">https://linux.oracle.com/errata/ELSA-2024-3163.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-22365">https://nvd.nist.gov/vuln/detail/CVE-2024-22365</a>
<a href="https://ubuntu.com/security/notices/USN-6588-1">https://ubuntu.com/security/notices/USN-6588-1</a>
<a href="https://ubuntu.com/security/notices/USN-6588-2">https://ubuntu.com/security/notices/USN-6588-2</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2024-22365">https://www.cve.org/CVERecord?id=CVE-2024-22365</a>
<a href="https://www.openwall.com/lists/oss-security/2024/01/18/3">https://www.openwall.com/lists/oss-security/2024/01/18/3</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libpam0g</td>
<td>CVE-2024-10041</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1.5.2-6+deb12u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/errata/RHSA-2024:10379">https://access.redhat.com/errata/RHSA-2024:10379</a>
<a href="https://access.redhat.com/errata/RHSA-2024:11250">https://access.redhat.com/errata/RHSA-2024:11250</a>
<a href="https://access.redhat.com/errata/RHSA-2024:9941">https://access.redhat.com/errata/RHSA-2024:9941</a>
<a href="https://access.redhat.com/security/cve/CVE-2024-10041">https://access.redhat.com/security/cve/CVE-2024-10041</a>
<a href="https://bugzilla.redhat.com/2319212">https://bugzilla.redhat.com/2319212</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2319212">https://bugzilla.redhat.com/show_bug.cgi?id=2319212</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2324291">https://bugzilla.redhat.com/show_bug.cgi?id=2324291</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10041">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10041</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10963">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10963</a>
<a href="https://errata.almalinux.org/9/ALSA-2024-11250.html">https://errata.almalinux.org/9/ALSA-2024-11250.html</a>
<a href="https://errata.rockylinux.org/RLSA-2024:10379">https://errata.rockylinux.org/RLSA-2024:10379</a>
<a href="https://linux.oracle.com/cve/CVE-2024-10041.html">https://linux.oracle.com/cve/CVE-2024-10041.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2024-11250.html">https://linux.oracle.com/errata/ELSA-2024-11250.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-10041">https://nvd.nist.gov/vuln/detail/CVE-2024-10041</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2024-10041">https://www.cve.org/CVERecord?id=CVE-2024-10041</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libpam0g</td>
<td>CVE-2024-22365</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1.5.2-6+deb12u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.openwall.com/lists/oss-security/2024/01/18/3">http://www.openwall.com/lists/oss-security/2024/01/18/3</a>
<a href="https://access.redhat.com/errata/RHSA-2024:2438">https://access.redhat.com/errata/RHSA-2024:2438</a>
<a href="https://access.redhat.com/security/cve/CVE-2024-22365">https://access.redhat.com/security/cve/CVE-2024-22365</a>
<a href="https://bugzilla.redhat.com/2257722">https://bugzilla.redhat.com/2257722</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2257722">https://bugzilla.redhat.com/show_bug.cgi?id=2257722</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22365">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22365</a>
<a href="https://errata.almalinux.org/9/ALSA-2024-2438.html">https://errata.almalinux.org/9/ALSA-2024-2438.html</a>
<a href="https://errata.rockylinux.org/RLSA-2024:3163">https://errata.rockylinux.org/RLSA-2024:3163</a>
<a href="https://github.com/linux-pam/linux-pam">https://github.com/linux-pam/linux-pam</a>
<a href="https://github.com/linux-pam/linux-pam/commit/031bb5a5d0d950253b68138b498dc93be69a64cb">https://github.com/linux-pam/linux-pam/commit/031bb5a5d0d950253b68138b498dc93be69a64cb</a>
<a href="https://github.com/linux-pam/linux-pam/releases/tag/v1.6.0">https://github.com/linux-pam/linux-pam/releases/tag/v1.6.0</a>
<a href="https://linux.oracle.com/cve/CVE-2024-22365.html">https://linux.oracle.com/cve/CVE-2024-22365.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2024-3163.html">https://linux.oracle.com/errata/ELSA-2024-3163.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-22365">https://nvd.nist.gov/vuln/detail/CVE-2024-22365</a>
<a href="https://ubuntu.com/security/notices/USN-6588-1">https://ubuntu.com/security/notices/USN-6588-1</a>
<a href="https://ubuntu.com/security/notices/USN-6588-2">https://ubuntu.com/security/notices/USN-6588-2</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2024-22365">https://www.cve.org/CVERecord?id=CVE-2024-22365</a>
<a href="https://www.openwall.com/lists/oss-security/2024/01/18/3">https://www.openwall.com/lists/oss-security/2024/01/18/3</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libpng16-16</td>
<td>CVE-2021-4214</td>
<td class="severity">LOW</td>
<td class="pkg-version">1.6.39-2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2021-4214">https://access.redhat.com/security/cve/CVE-2021-4214</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2043393">https://bugzilla.redhat.com/show_bug.cgi?id=2043393</a>
<a href="https://github.com/glennrp/libpng/issues/302">https://github.com/glennrp/libpng/issues/302</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-4214">https://nvd.nist.gov/vuln/detail/CVE-2021-4214</a>
<a href="https://security-tracker.debian.org/tracker/CVE-2021-4214">https://security-tracker.debian.org/tracker/CVE-2021-4214</a>
<a href="https://security.netapp.com/advisory/ntap-20221020-0001/">https://security.netapp.com/advisory/ntap-20221020-0001/</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2021-4214">https://www.cve.org/CVERecord?id=CVE-2021-4214</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libsmartcols1</td>
<td>CVE-2022-0563</td>
<td class="severity">LOW</td>
<td class="pkg-version">2.38.1-5+deb12u3</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a>
<a href="https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/">https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/</a>
<a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u</a>
<a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a>
<a href="https://security.gentoo.org/glsa/202401-08">https://security.gentoo.org/glsa/202401-08</a>
<a href="https://security.netapp.com/advisory/ntap-20220331-0002/">https://security.netapp.com/advisory/ntap-20220331-0002/</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2022-0563">https://www.cve.org/CVERecord?id=CVE-2022-0563</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libssl3</td>
<td>CVE-2024-13176</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">3.0.15-1~deb12u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.openwall.com/lists/oss-security/2025/01/20/2">http://www.openwall.com/lists/oss-security/2025/01/20/2</a>
<a href="https://access.redhat.com/security/cve/CVE-2024-13176">https://access.redhat.com/security/cve/CVE-2024-13176</a>
<a href="https://github.com/openssl/openssl/commit/07272b05b04836a762b4baa874958af51d513844">https://github.com/openssl/openssl/commit/07272b05b04836a762b4baa874958af51d513844</a>
<a href="https://github.com/openssl/openssl/commit/2af62e74fb59bc469506bc37eb2990ea408d9467">https://github.com/openssl/openssl/commit/2af62e74fb59bc469506bc37eb2990ea408d9467</a>
<a href="https://github.com/openssl/openssl/commit/392dcb336405a0c94486aa6655057f59fd3a0902">https://github.com/openssl/openssl/commit/392dcb336405a0c94486aa6655057f59fd3a0902</a>
<a href="https://github.com/openssl/openssl/commit/4b1cb94a734a7d4ec363ac0a215a25c181e11f65">https://github.com/openssl/openssl/commit/4b1cb94a734a7d4ec363ac0a215a25c181e11f65</a>
<a href="https://github.com/openssl/openssl/commit/77c608f4c8857e63e98e66444e2e761c9627916f">https://github.com/openssl/openssl/commit/77c608f4c8857e63e98e66444e2e761c9627916f</a>
<a href="https://github.openssl.org/openssl/extended-releases/commit/0d5fd1ab987f7571e2c955d8d8b638fc0fb54ded">https://github.openssl.org/openssl/extended-releases/commit/0d5fd1ab987f7571e2c955d8d8b638fc0fb54ded</a>
<a href="https://github.openssl.org/openssl/extended-releases/commit/a2639000db19878d5d89586ae7b725080592ae86">https://github.openssl.org/openssl/extended-releases/commit/a2639000db19878d5d89586ae7b725080592ae86</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-13176">https://nvd.nist.gov/vuln/detail/CVE-2024-13176</a>
<a href="https://openssl-library.org/news/secadv/20250120.txt">https://openssl-library.org/news/secadv/20250120.txt</a>
<a href="https://security.netapp.com/advisory/ntap-20250124-0005/">https://security.netapp.com/advisory/ntap-20250124-0005/</a>
<a href="https://security.netapp.com/advisory/ntap-20250418-0010/">https://security.netapp.com/advisory/ntap-20250418-0010/</a>
<a href="https://ubuntu.com/security/notices/USN-7264-1">https://ubuntu.com/security/notices/USN-7264-1</a>
<a href="https://ubuntu.com/security/notices/USN-7278-1">https://ubuntu.com/security/notices/USN-7278-1</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2024-13176">https://www.cve.org/CVERecord?id=CVE-2024-13176</a>
<a href="https://www.oracle.com/security-alerts/cpuapr2025.html#AppendixMSQL">https://www.oracle.com/security-alerts/cpuapr2025.html#AppendixMSQL</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libstdc++6</td>
<td>CVE-2022-27943</td>
<td class="severity">LOW</td>
<td class="pkg-version">12.2.0-14</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2022-27943">https://access.redhat.com/security/cve/CVE-2022-27943</a>
<a href="https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039">https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039</a>
<a href="https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=1a770b01ef415e114164b6151d1e55acdee09371">https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=1a770b01ef415e114164b6151d1e55acdee09371</a>
<a href="https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=9234cdca6ee88badfc00297e72f13dac4e540c79">https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=9234cdca6ee88badfc00297e72f13dac4e540c79</a>
<a href="https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=fc968115a742d9e4674d9725ce9c2106b91b6ead">https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=fc968115a742d9e4674d9725ce9c2106b91b6ead</a>
<a href="https://gcc.gnu.org/pipermail/gcc-patches/2022-March/592244.html">https://gcc.gnu.org/pipermail/gcc-patches/2022-March/592244.html</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27943">https://nvd.nist.gov/vuln/detail/CVE-2022-27943</a>
<a href="https://sourceware.org/bugzilla/show_bug.cgi?id=28995">https://sourceware.org/bugzilla/show_bug.cgi?id=28995</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2022-27943">https://www.cve.org/CVERecord?id=CVE-2022-27943</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libstdc++6</td>
<td>CVE-2023-4039</td>
<td class="severity">LOW</td>
<td class="pkg-version">12.2.0-14</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2023-4039">https://access.redhat.com/security/cve/CVE-2023-4039</a>
<a href="https://developer.arm.com/Arm%20Security%20Center/GCC%20Stack%20Protector%20Vulnerability%20AArch64">https://developer.arm.com/Arm%20Security%20Center/GCC%20Stack%20Protector%20Vulnerability%20AArch64</a>
<a href="https://gcc.gnu.org/git/?p=gcc.git;a=blob_plain;f=SECURITY.txt">https://gcc.gnu.org/git/?p=gcc.git;a=blob_plain;f=SECURITY.txt</a>
<a href="https://gcc.gnu.org/pipermail/gcc-patches/2023-October/634066.html">https://gcc.gnu.org/pipermail/gcc-patches/2023-October/634066.html</a>
<a href="https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-x7ch-h5rf-w2mf">https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-x7ch-h5rf-w2mf</a>
<a href="https://inbox.sourceware.org/gcc-patches/46cfa37b-56eb-344d-0745-e0d35393392d@gotplt.org">https://inbox.sourceware.org/gcc-patches/46cfa37b-56eb-344d-0745-e0d35393392d@gotplt.org</a>
<a href="https://linux.oracle.com/cve/CVE-2023-4039.html">https://linux.oracle.com/cve/CVE-2023-4039.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2023-28766.html">https://linux.oracle.com/errata/ELSA-2023-28766.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4039">https://nvd.nist.gov/vuln/detail/CVE-2023-4039</a>
<a href="https://rtx.meta.security/mitigation/2023/09/12/CVE-2023-4039.html">https://rtx.meta.security/mitigation/2023/09/12/CVE-2023-4039.html</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2023-4039">https://www.cve.org/CVERecord?id=CVE-2023-4039</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libsystemd0</td>
<td>CVE-2013-4392</td>
<td class="severity">LOW</td>
<td class="pkg-version">252.36-1~deb12u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357</a>
<a href="http://www.openwall.com/lists/oss-security/2013/10/01/9">http://www.openwall.com/lists/oss-security/2013/10/01/9</a>
<a href="https://access.redhat.com/security/cve/CVE-2013-4392">https://access.redhat.com/security/cve/CVE-2013-4392</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=859060">https://bugzilla.redhat.com/show_bug.cgi?id=859060</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2013-4392">https://nvd.nist.gov/vuln/detail/CVE-2013-4392</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2013-4392">https://www.cve.org/CVERecord?id=CVE-2013-4392</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libsystemd0</td>
<td>CVE-2023-31437</td>
<td class="severity">LOW</td>
<td class="pkg-version">252.36-1~deb12u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://github.com/kastel-security/Journald">https://github.com/kastel-security/Journald</a>
<a href="https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf">https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf</a>
<a href="https://github.com/systemd/systemd/releases">https://github.com/systemd/systemd/releases</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libsystemd0</td>
<td>CVE-2023-31438</td>
<td class="severity">LOW</td>
<td class="pkg-version">252.36-1~deb12u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://github.com/kastel-security/Journald">https://github.com/kastel-security/Journald</a>
<a href="https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf">https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf</a>
<a href="https://github.com/systemd/systemd/pull/28886">https://github.com/systemd/systemd/pull/28886</a>
<a href="https://github.com/systemd/systemd/releases">https://github.com/systemd/systemd/releases</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libsystemd0</td>
<td>CVE-2023-31439</td>
<td class="severity">LOW</td>
<td class="pkg-version">252.36-1~deb12u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://github.com/kastel-security/Journald">https://github.com/kastel-security/Journald</a>
<a href="https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf">https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf</a>
<a href="https://github.com/systemd/systemd/pull/28885">https://github.com/systemd/systemd/pull/28885</a>
<a href="https://github.com/systemd/systemd/releases">https://github.com/systemd/systemd/releases</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libtiff6</td>
<td>CVE-2023-52355</td>
<td class="severity">HIGH</td>
<td class="pkg-version">4.5.0-6+deb12u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2023-52355">https://access.redhat.com/security/cve/CVE-2023-52355</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2251326">https://bugzilla.redhat.com/show_bug.cgi?id=2251326</a>
<a href="https://gitlab.com/libtiff/libtiff/-/issues/621">https://gitlab.com/libtiff/libtiff/-/issues/621</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-52355">https://nvd.nist.gov/vuln/detail/CVE-2023-52355</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2023-52355">https://www.cve.org/CVERecord?id=CVE-2023-52355</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libtiff6</td>
<td>CVE-2023-6277</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">4.5.0-6+deb12u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://seclists.org/fulldisclosure/2024/Jul/16">http://seclists.org/fulldisclosure/2024/Jul/16</a>
<a href="http://seclists.org/fulldisclosure/2024/Jul/17">http://seclists.org/fulldisclosure/2024/Jul/17</a>
<a href="http://seclists.org/fulldisclosure/2024/Jul/18">http://seclists.org/fulldisclosure/2024/Jul/18</a>
<a href="http://seclists.org/fulldisclosure/2024/Jul/19">http://seclists.org/fulldisclosure/2024/Jul/19</a>
<a href="http://seclists.org/fulldisclosure/2024/Jul/20">http://seclists.org/fulldisclosure/2024/Jul/20</a>
<a href="http://seclists.org/fulldisclosure/2024/Jul/21">http://seclists.org/fulldisclosure/2024/Jul/21</a>
<a href="http://seclists.org/fulldisclosure/2024/Jul/22">http://seclists.org/fulldisclosure/2024/Jul/22</a>
<a href="http://seclists.org/fulldisclosure/2024/Jul/23">http://seclists.org/fulldisclosure/2024/Jul/23</a>
<a href="https://access.redhat.com/security/cve/CVE-2023-6277">https://access.redhat.com/security/cve/CVE-2023-6277</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2251311">https://bugzilla.redhat.com/show_bug.cgi?id=2251311</a>
<a href="https://gitlab.com/libtiff/libtiff/-/issues/614">https://gitlab.com/libtiff/libtiff/-/issues/614</a>
<a href="https://gitlab.com/libtiff/libtiff/-/merge_requests/545">https://gitlab.com/libtiff/libtiff/-/merge_requests/545</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJIN6DTSL3VODZUGWEUXLEL5DR53EZMV/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJIN6DTSL3VODZUGWEUXLEL5DR53EZMV/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y7ZGN2MZXJ6E57W3L4YBM3ZPAU3T7T5C/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y7ZGN2MZXJ6E57W3L4YBM3ZPAU3T7T5C/</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6277">https://nvd.nist.gov/vuln/detail/CVE-2023-6277</a>
<a href="https://security.netapp.com/advisory/ntap-20240119-0002/">https://security.netapp.com/advisory/ntap-20240119-0002/</a>
<a href="https://support.apple.com/kb/HT214116">https://support.apple.com/kb/HT214116</a>
<a href="https://support.apple.com/kb/HT214117">https://support.apple.com/kb/HT214117</a>
<a href="https://support.apple.com/kb/HT214118">https://support.apple.com/kb/HT214118</a>
<a href="https://support.apple.com/kb/HT214119">https://support.apple.com/kb/HT214119</a>
<a href="https://support.apple.com/kb/HT214120">https://support.apple.com/kb/HT214120</a>
<a href="https://support.apple.com/kb/HT214122">https://support.apple.com/kb/HT214122</a>
<a href="https://support.apple.com/kb/HT214123">https://support.apple.com/kb/HT214123</a>
<a href="https://support.apple.com/kb/HT214124">https://support.apple.com/kb/HT214124</a>
<a href="https://ubuntu.com/security/notices/USN-6644-1">https://ubuntu.com/security/notices/USN-6644-1</a>
<a href="https://ubuntu.com/security/notices/USN-6644-2">https://ubuntu.com/security/notices/USN-6644-2</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2023-6277">https://www.cve.org/CVERecord?id=CVE-2023-6277</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libtiff6</td>
<td>CVE-2017-16232</td>
<td class="severity">LOW</td>
<td class="pkg-version">4.5.0-6+deb12u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html">http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html</a>
<a href="http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html">http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html</a>
<a href="http://packetstormsecurity.com/files/150896/LibTIFF-4.0.8-Memory-Leak.html">http://packetstormsecurity.com/files/150896/LibTIFF-4.0.8-Memory-Leak.html</a>
<a href="http://seclists.org/fulldisclosure/2018/Dec/32">http://seclists.org/fulldisclosure/2018/Dec/32</a>
<a href="http://seclists.org/fulldisclosure/2018/Dec/47">http://seclists.org/fulldisclosure/2018/Dec/47</a>
<a href="http://www.openwall.com/lists/oss-security/2017/11/01/11">http://www.openwall.com/lists/oss-security/2017/11/01/11</a>
<a href="http://www.openwall.com/lists/oss-security/2017/11/01/3">http://www.openwall.com/lists/oss-security/2017/11/01/3</a>
<a href="http://www.openwall.com/lists/oss-security/2017/11/01/7">http://www.openwall.com/lists/oss-security/2017/11/01/7</a>
<a href="http://www.openwall.com/lists/oss-security/2017/11/01/8">http://www.openwall.com/lists/oss-security/2017/11/01/8</a>
<a href="http://www.securityfocus.com/bid/101696">http://www.securityfocus.com/bid/101696</a>
<a href="https://access.redhat.com/security/cve/CVE-2017-16232">https://access.redhat.com/security/cve/CVE-2017-16232</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2017-16232">https://nvd.nist.gov/vuln/detail/CVE-2017-16232</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2017-16232">https://www.cve.org/CVERecord?id=CVE-2017-16232</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libtiff6</td>
<td>CVE-2017-17973</td>
<td class="severity">LOW</td>
<td class="pkg-version">4.5.0-6+deb12u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://bugzilla.maptools.org/show_bug.cgi?id=2769">http://bugzilla.maptools.org/show_bug.cgi?id=2769</a>
<a href="http://www.securityfocus.com/bid/102331">http://www.securityfocus.com/bid/102331</a>
<a href="https://access.redhat.com/security/cve/CVE-2017-17973">https://access.redhat.com/security/cve/CVE-2017-17973</a>
<a href="https://bugzilla.novell.com/show_bug.cgi?id=1074318">https://bugzilla.novell.com/show_bug.cgi?id=1074318</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=1530912">https://bugzilla.redhat.com/show_bug.cgi?id=1530912</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2017-17973">https://nvd.nist.gov/vuln/detail/CVE-2017-17973</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2017-17973">https://www.cve.org/CVERecord?id=CVE-2017-17973</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libtiff6</td>
<td>CVE-2017-5563</td>
<td class="severity">LOW</td>
<td class="pkg-version">4.5.0-6+deb12u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://bugzilla.maptools.org/show_bug.cgi?id=2664">http://bugzilla.maptools.org/show_bug.cgi?id=2664</a>
<a href="http://www.securityfocus.com/bid/95705">http://www.securityfocus.com/bid/95705</a>
<a href="https://access.redhat.com/security/cve/CVE-2017-5563">https://access.redhat.com/security/cve/CVE-2017-5563</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2017-5563">https://nvd.nist.gov/vuln/detail/CVE-2017-5563</a>
<a href="https://security.gentoo.org/glsa/201709-27">https://security.gentoo.org/glsa/201709-27</a>
<a href="https://ubuntu.com/security/notices/USN-3606-1">https://ubuntu.com/security/notices/USN-3606-1</a>
<a href="https://usn.ubuntu.com/3606-1/">https://usn.ubuntu.com/3606-1/</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2017-5563">https://www.cve.org/CVERecord?id=CVE-2017-5563</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libtiff6</td>
<td>CVE-2017-9117</td>
<td class="severity">LOW</td>
<td class="pkg-version">4.5.0-6+deb12u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://bugzilla.maptools.org/show_bug.cgi?id=2690">http://bugzilla.maptools.org/show_bug.cgi?id=2690</a>
<a href="http://www.securityfocus.com/bid/98581">http://www.securityfocus.com/bid/98581</a>
<a href="https://access.redhat.com/security/cve/CVE-2017-9117">https://access.redhat.com/security/cve/CVE-2017-9117</a>
<a href="https://gitlab.com/libtiff/libtiff/-/issues/89">https://gitlab.com/libtiff/libtiff/-/issues/89</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2017-9117">https://nvd.nist.gov/vuln/detail/CVE-2017-9117</a>
<a href="https://ubuntu.com/security/notices/USN-3606-1">https://ubuntu.com/security/notices/USN-3606-1</a>
<a href="https://usn.ubuntu.com/3606-1/">https://usn.ubuntu.com/3606-1/</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2017-9117">https://www.cve.org/CVERecord?id=CVE-2017-9117</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libtiff6</td>
<td>CVE-2018-10126</td>
<td class="severity">LOW</td>
<td class="pkg-version">4.5.0-6+deb12u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://bugzilla.maptools.org/show_bug.cgi?id=2786">http://bugzilla.maptools.org/show_bug.cgi?id=2786</a>
<a href="https://access.redhat.com/security/cve/CVE-2018-10126">https://access.redhat.com/security/cve/CVE-2018-10126</a>
<a href="https://gitlab.com/libtiff/libtiff/-/issues/128">https://gitlab.com/libtiff/libtiff/-/issues/128</a>
<a href="https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E">https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2018-10126">https://nvd.nist.gov/vuln/detail/CVE-2018-10126</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2018-10126">https://www.cve.org/CVERecord?id=CVE-2018-10126</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libtiff6</td>
<td>CVE-2022-1210</td>
<td class="severity">LOW</td>
<td class="pkg-version">4.5.0-6+deb12u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2022-1210">https://access.redhat.com/security/cve/CVE-2022-1210</a>
<a href="https://gitlab.com/libtiff/libtiff/-/issues/402">https://gitlab.com/libtiff/libtiff/-/issues/402</a>
<a href="https://gitlab.com/libtiff/libtiff/uploads/c3da94e53cf1e1e8e6d4d3780dc8c42f/example.tiff">https://gitlab.com/libtiff/libtiff/uploads/c3da94e53cf1e1e8e6d4d3780dc8c42f/example.tiff</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1210">https://nvd.nist.gov/vuln/detail/CVE-2022-1210</a>
<a href="https://security.gentoo.org/glsa/202210-10">https://security.gentoo.org/glsa/202210-10</a>
<a href="https://security.netapp.com/advisory/ntap-20220513-0005/">https://security.netapp.com/advisory/ntap-20220513-0005/</a>
<a href="https://vuldb.com/?id.196363">https://vuldb.com/?id.196363</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2022-1210">https://www.cve.org/CVERecord?id=CVE-2022-1210</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libtiff6</td>
<td>CVE-2023-1916</td>
<td class="severity">LOW</td>
<td class="pkg-version">4.5.0-6+deb12u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2023-1916">https://access.redhat.com/security/cve/CVE-2023-1916</a>
<a href="https://gitlab.com/libtiff/libtiff/-/issues/536">https://gitlab.com/libtiff/libtiff/-/issues/536</a>
<a href="https://gitlab.com/libtiff/libtiff/-/issues/536%2C">https://gitlab.com/libtiff/libtiff/-/issues/536%2C</a>
<a href="https://gitlab.com/libtiff/libtiff/-/issues/536,">https://gitlab.com/libtiff/libtiff/-/issues/536,</a>
<a href="https://gitlab.com/libtiff/libtiff/-/issues/537">https://gitlab.com/libtiff/libtiff/-/issues/537</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1916">https://nvd.nist.gov/vuln/detail/CVE-2023-1916</a>
<a href="https://support.apple.com/kb/HT213844">https://support.apple.com/kb/HT213844</a>
<a href="https://ubuntu.com/security/notices/USN-6428-1">https://ubuntu.com/security/notices/USN-6428-1</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2023-1916">https://www.cve.org/CVERecord?id=CVE-2023-1916</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libtiff6</td>
<td>CVE-2023-3164</td>
<td class="severity">LOW</td>
<td class="pkg-version">4.5.0-6+deb12u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2023-3164">https://access.redhat.com/security/cve/CVE-2023-3164</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2213531">https://bugzilla.redhat.com/show_bug.cgi?id=2213531</a>
<a href="https://gitlab.com/libtiff/libtiff/-/issues/542">https://gitlab.com/libtiff/libtiff/-/issues/542</a>
<a href="https://gitlab.com/libtiff/libtiff/-/merge_requests/595">https://gitlab.com/libtiff/libtiff/-/merge_requests/595</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3164">https://nvd.nist.gov/vuln/detail/CVE-2023-3164</a>
<a href="https://ubuntu.com/security/notices/USN-6827-1">https://ubuntu.com/security/notices/USN-6827-1</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2023-3164">https://www.cve.org/CVERecord?id=CVE-2023-3164</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libtiff6</td>
<td>CVE-2023-6228</td>
<td class="severity">LOW</td>
<td class="pkg-version">4.5.0-6+deb12u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/errata/RHSA-2024:2289">https://access.redhat.com/errata/RHSA-2024:2289</a>
<a href="https://access.redhat.com/errata/RHSA-2024:5079">https://access.redhat.com/errata/RHSA-2024:5079</a>
<a href="https://access.redhat.com/security/cve/CVE-2023-6228">https://access.redhat.com/security/cve/CVE-2023-6228</a>
<a href="https://bugzilla.redhat.com/2215865">https://bugzilla.redhat.com/2215865</a>
<a href="https://bugzilla.redhat.com/2234970">https://bugzilla.redhat.com/2234970</a>
<a href="https://bugzilla.redhat.com/2235264">https://bugzilla.redhat.com/2235264</a>
<a href="https://bugzilla.redhat.com/2235265">https://bugzilla.redhat.com/2235265</a>
<a href="https://bugzilla.redhat.com/2240995">https://bugzilla.redhat.com/2240995</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=1614051">https://bugzilla.redhat.com/show_bug.cgi?id=1614051</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2218744">https://bugzilla.redhat.com/show_bug.cgi?id=2218744</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2240995">https://bugzilla.redhat.com/show_bug.cgi?id=2240995</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2251344">https://bugzilla.redhat.com/show_bug.cgi?id=2251344</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15209">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15209</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25433">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25433</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52356">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52356</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6228">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6228</a>
<a href="https://errata.almalinux.org/9/ALSA-2024-2289.html">https://errata.almalinux.org/9/ALSA-2024-2289.html</a>
<a href="https://errata.rockylinux.org/RLSA-2024:5079">https://errata.rockylinux.org/RLSA-2024:5079</a>
<a href="https://linux.oracle.com/cve/CVE-2023-6228.html">https://linux.oracle.com/cve/CVE-2023-6228.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2024-5079.html">https://linux.oracle.com/errata/ELSA-2024-5079.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-6228">https://nvd.nist.gov/vuln/detail/CVE-2023-6228</a>
<a href="https://ubuntu.com/security/notices/USN-6644-1">https://ubuntu.com/security/notices/USN-6644-1</a>
<a href="https://ubuntu.com/security/notices/USN-6644-2">https://ubuntu.com/security/notices/USN-6644-2</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2023-6228">https://www.cve.org/CVERecord?id=CVE-2023-6228</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libtinfo6</td>
<td>CVE-2023-50495</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">6.4-4</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2023-50495">https://access.redhat.com/security/cve/CVE-2023-50495</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/</a>
<a href="https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00020.html">https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00020.html</a>
<a href="https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00029.html">https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00029.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-50495">https://nvd.nist.gov/vuln/detail/CVE-2023-50495</a>
<a href="https://security.netapp.com/advisory/ntap-20240119-0008/">https://security.netapp.com/advisory/ntap-20240119-0008/</a>
<a href="https://ubuntu.com/security/notices/USN-6684-1">https://ubuntu.com/security/notices/USN-6684-1</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2023-50495">https://www.cve.org/CVERecord?id=CVE-2023-50495</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libudev1</td>
<td>CVE-2013-4392</td>
<td class="severity">LOW</td>
<td class="pkg-version">252.36-1~deb12u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357</a>
<a href="http://www.openwall.com/lists/oss-security/2013/10/01/9">http://www.openwall.com/lists/oss-security/2013/10/01/9</a>
<a href="https://access.redhat.com/security/cve/CVE-2013-4392">https://access.redhat.com/security/cve/CVE-2013-4392</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=859060">https://bugzilla.redhat.com/show_bug.cgi?id=859060</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2013-4392">https://nvd.nist.gov/vuln/detail/CVE-2013-4392</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2013-4392">https://www.cve.org/CVERecord?id=CVE-2013-4392</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libudev1</td>
<td>CVE-2023-31437</td>
<td class="severity">LOW</td>
<td class="pkg-version">252.36-1~deb12u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://github.com/kastel-security/Journald">https://github.com/kastel-security/Journald</a>
<a href="https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf">https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf</a>
<a href="https://github.com/systemd/systemd/releases">https://github.com/systemd/systemd/releases</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libudev1</td>
<td>CVE-2023-31438</td>
<td class="severity">LOW</td>
<td class="pkg-version">252.36-1~deb12u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://github.com/kastel-security/Journald">https://github.com/kastel-security/Journald</a>
<a href="https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf">https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf</a>
<a href="https://github.com/systemd/systemd/pull/28886">https://github.com/systemd/systemd/pull/28886</a>
<a href="https://github.com/systemd/systemd/releases">https://github.com/systemd/systemd/releases</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libudev1</td>
<td>CVE-2023-31439</td>
<td class="severity">LOW</td>
<td class="pkg-version">252.36-1~deb12u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://github.com/kastel-security/Journald">https://github.com/kastel-security/Journald</a>
<a href="https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf">https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf</a>
<a href="https://github.com/systemd/systemd/pull/28885">https://github.com/systemd/systemd/pull/28885</a>
<a href="https://github.com/systemd/systemd/releases">https://github.com/systemd/systemd/releases</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libuuid1</td>
<td>CVE-2022-0563</td>
<td class="severity">LOW</td>
<td class="pkg-version">2.38.1-5+deb12u3</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a>
<a href="https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/">https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/</a>
<a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u</a>
<a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a>
<a href="https://security.gentoo.org/glsa/202401-08">https://security.gentoo.org/glsa/202401-08</a>
<a href="https://security.netapp.com/advisory/ntap-20220331-0002/">https://security.netapp.com/advisory/ntap-20220331-0002/</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2022-0563">https://www.cve.org/CVERecord?id=CVE-2022-0563</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libxml2</td>
<td>CVE-2024-25062</td>
<td class="severity">HIGH</td>
<td class="pkg-version">2.9.14+dfsg-1.3~deb12u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/errata/RHSA-2024:2679">https://access.redhat.com/errata/RHSA-2024:2679</a>
<a href="https://access.redhat.com/security/cve/CVE-2024-25062">https://access.redhat.com/security/cve/CVE-2024-25062</a>
<a href="https://bugzilla.redhat.com/2262726">https://bugzilla.redhat.com/2262726</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2262726">https://bugzilla.redhat.com/show_bug.cgi?id=2262726</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25062">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25062</a>
<a href="https://errata.almalinux.org/9/ALSA-2024-2679.html">https://errata.almalinux.org/9/ALSA-2024-2679.html</a>
<a href="https://errata.rockylinux.org/RLSA-2024:2679">https://errata.rockylinux.org/RLSA-2024:2679</a>
<a href="https://gitlab.gnome.org/GNOME/libxml2/-/issues/604">https://gitlab.gnome.org/GNOME/libxml2/-/issues/604</a>
<a href="https://gitlab.gnome.org/GNOME/libxml2/-/tags">https://gitlab.gnome.org/GNOME/libxml2/-/tags</a>
<a href="https://linux.oracle.com/cve/CVE-2024-25062.html">https://linux.oracle.com/cve/CVE-2024-25062.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2024-3626.html">https://linux.oracle.com/errata/ELSA-2024-3626.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-25062">https://nvd.nist.gov/vuln/detail/CVE-2024-25062</a>
<a href="https://ubuntu.com/security/notices/USN-6658-1">https://ubuntu.com/security/notices/USN-6658-1</a>
<a href="https://ubuntu.com/security/notices/USN-6658-2">https://ubuntu.com/security/notices/USN-6658-2</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2024-25062">https://www.cve.org/CVERecord?id=CVE-2024-25062</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libxml2</td>
<td>CVE-2024-56171</td>
<td class="severity">HIGH</td>
<td class="pkg-version">2.9.14+dfsg-1.3~deb12u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/errata/RHSA-2025:2679">https://access.redhat.com/errata/RHSA-2025:2679</a>
<a href="https://access.redhat.com/security/cve/CVE-2024-56171">https://access.redhat.com/security/cve/CVE-2024-56171</a>
<a href="https://bugzilla.redhat.com/2346416">https://bugzilla.redhat.com/2346416</a>
<a href="https://bugzilla.redhat.com/2346421">https://bugzilla.redhat.com/2346421</a>
<a href="https://errata.almalinux.org/9/ALSA-2025-2679.html">https://errata.almalinux.org/9/ALSA-2025-2679.html</a>
<a href="https://gitlab.gnome.org/GNOME/libxml2/-/issues/828">https://gitlab.gnome.org/GNOME/libxml2/-/issues/828</a>
<a href="https://linux.oracle.com/cve/CVE-2024-56171.html">https://linux.oracle.com/cve/CVE-2024-56171.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2025-2686.html">https://linux.oracle.com/errata/ELSA-2025-2686.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56171">https://nvd.nist.gov/vuln/detail/CVE-2024-56171</a>
<a href="https://security.netapp.com/advisory/ntap-20250328-0010/">https://security.netapp.com/advisory/ntap-20250328-0010/</a>
<a href="https://ubuntu.com/security/notices/USN-7302-1">https://ubuntu.com/security/notices/USN-7302-1</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2024-56171">https://www.cve.org/CVERecord?id=CVE-2024-56171</a>
<a href="https://www.openwall.com/lists/oss-security/2025/02/18/2">https://www.openwall.com/lists/oss-security/2025/02/18/2</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libxml2</td>
<td>CVE-2025-24928</td>
<td class="severity">HIGH</td>
<td class="pkg-version">2.9.14+dfsg-1.3~deb12u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/errata/RHSA-2025:2679">https://access.redhat.com/errata/RHSA-2025:2679</a>
<a href="https://access.redhat.com/security/cve/CVE-2025-24928">https://access.redhat.com/security/cve/CVE-2025-24928</a>
<a href="https://bugzilla.redhat.com/2346416">https://bugzilla.redhat.com/2346416</a>
<a href="https://bugzilla.redhat.com/2346421">https://bugzilla.redhat.com/2346421</a>
<a href="https://errata.almalinux.org/9/ALSA-2025-2679.html">https://errata.almalinux.org/9/ALSA-2025-2679.html</a>
<a href="https://gitlab.gnome.org/GNOME/libxml2/-/issues/847">https://gitlab.gnome.org/GNOME/libxml2/-/issues/847</a>
<a href="https://issues.oss-fuzz.com/issues/392687022">https://issues.oss-fuzz.com/issues/392687022</a>
<a href="https://linux.oracle.com/cve/CVE-2025-24928.html">https://linux.oracle.com/cve/CVE-2025-24928.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2025-2686.html">https://linux.oracle.com/errata/ELSA-2025-2686.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-24928">https://nvd.nist.gov/vuln/detail/CVE-2025-24928</a>
<a href="https://security.netapp.com/advisory/ntap-20250321-0006/">https://security.netapp.com/advisory/ntap-20250321-0006/</a>
<a href="https://ubuntu.com/security/notices/USN-7302-1">https://ubuntu.com/security/notices/USN-7302-1</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2025-24928">https://www.cve.org/CVERecord?id=CVE-2025-24928</a>
<a href="https://www.openwall.com/lists/oss-security/2025/02/18/2">https://www.openwall.com/lists/oss-security/2025/02/18/2</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libxml2</td>
<td>CVE-2025-27113</td>
<td class="severity">HIGH</td>
<td class="pkg-version">2.9.14+dfsg-1.3~deb12u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2025-27113">https://access.redhat.com/security/cve/CVE-2025-27113</a>
<a href="https://gitlab.gnome.org/GNOME/libxml2/-/issues/861">https://gitlab.gnome.org/GNOME/libxml2/-/issues/861</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-27113">https://nvd.nist.gov/vuln/detail/CVE-2025-27113</a>
<a href="https://security.netapp.com/advisory/ntap-20250306-0004/">https://security.netapp.com/advisory/ntap-20250306-0004/</a>
<a href="https://ubuntu.com/security/notices/USN-7302-1">https://ubuntu.com/security/notices/USN-7302-1</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2025-27113">https://www.cve.org/CVERecord?id=CVE-2025-27113</a>
<a href="https://www.openwall.com/lists/oss-security/2025/02/18/2">https://www.openwall.com/lists/oss-security/2025/02/18/2</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libxml2</td>
<td>CVE-2025-32414</td>
<td class="severity">HIGH</td>
<td class="pkg-version">2.9.14+dfsg-1.3~deb12u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2025-32414">https://access.redhat.com/security/cve/CVE-2025-32414</a>
<a href="https://gitlab.gnome.org/GNOME/libxml2/-/issues/889">https://gitlab.gnome.org/GNOME/libxml2/-/issues/889</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-32414">https://nvd.nist.gov/vuln/detail/CVE-2025-32414</a>
<a href="https://ubuntu.com/security/notices/USN-7467-1">https://ubuntu.com/security/notices/USN-7467-1</a>
<a href="https://ubuntu.com/security/notices/USN-7467-2">https://ubuntu.com/security/notices/USN-7467-2</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2025-32414">https://www.cve.org/CVERecord?id=CVE-2025-32414</a>
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">libxml2</td>
<td>CVE-2025-32415</td>
<td class="severity">HIGH</td>
<td class="pkg-version">2.9.14+dfsg-1.3~deb12u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2025-32415">https://access.redhat.com/security/cve/CVE-2025-32415</a>
<a href="https://gitlab.gnome.org/GNOME/libxml2/-/issues/890">https://gitlab.gnome.org/GNOME/libxml2/-/issues/890</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-32415">https://nvd.nist.gov/vuln/detail/CVE-2025-32415</a>
<a href="https://ubuntu.com/security/notices/USN-7467-1">https://ubuntu.com/security/notices/USN-7467-1</a>
<a href="https://ubuntu.com/security/notices/USN-7467-2">https://ubuntu.com/security/notices/USN-7467-2</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2025-32415">https://www.cve.org/CVERecord?id=CVE-2025-32415</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libxml2</td>
<td>CVE-2022-49043</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">2.9.14+dfsg-1.3~deb12u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/errata/RHSA-2025:1350">https://access.redhat.com/errata/RHSA-2025:1350</a>
<a href="https://access.redhat.com/security/cve/CVE-2022-49043">https://access.redhat.com/security/cve/CVE-2022-49043</a>
<a href="https://bugzilla.redhat.com/2342118">https://bugzilla.redhat.com/2342118</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2342118">https://bugzilla.redhat.com/show_bug.cgi?id=2342118</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49043">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49043</a>
<a href="https://errata.almalinux.org/9/ALSA-2025-1350.html">https://errata.almalinux.org/9/ALSA-2025-1350.html</a>
<a href="https://errata.rockylinux.org/RLSA-2025:1517">https://errata.rockylinux.org/RLSA-2025:1517</a>
<a href="https://github.com/php/php-src/issues/17467">https://github.com/php/php-src/issues/17467</a>
<a href="https://gitlab.gnome.org/GNOME/libxml2/-/commit/5a19e21605398cef6a8b1452477a8705cb41562b">https://gitlab.gnome.org/GNOME/libxml2/-/commit/5a19e21605398cef6a8b1452477a8705cb41562b</a>
<a href="https://linux.oracle.com/cve/CVE-2022-49043.html">https://linux.oracle.com/cve/CVE-2022-49043.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2025-1517.html">https://linux.oracle.com/errata/ELSA-2025-1517.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-49043">https://nvd.nist.gov/vuln/detail/CVE-2022-49043</a>
<a href="https://ubuntu.com/security/notices/USN-7240-1">https://ubuntu.com/security/notices/USN-7240-1</a>
<a href="https://ubuntu.com/security/notices/USN-7302-1">https://ubuntu.com/security/notices/USN-7302-1</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2022-49043">https://www.cve.org/CVERecord?id=CVE-2022-49043</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libxml2</td>
<td>CVE-2023-39615</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">2.9.14+dfsg-1.3~deb12u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/errata/RHSA-2023:7747">https://access.redhat.com/errata/RHSA-2023:7747</a>
<a href="https://access.redhat.com/security/cve/CVE-2023-39615">https://access.redhat.com/security/cve/CVE-2023-39615</a>
<a href="https://bugzilla.redhat.com/2235864">https://bugzilla.redhat.com/2235864</a>
<a href="https://errata.almalinux.org/9/ALSA-2023-7747.html">https://errata.almalinux.org/9/ALSA-2023-7747.html</a>
<a href="https://gitlab.gnome.org/GNOME/libxml2/-/issues/535">https://gitlab.gnome.org/GNOME/libxml2/-/issues/535</a>
<a href="https://linux.oracle.com/cve/CVE-2023-39615.html">https://linux.oracle.com/cve/CVE-2023-39615.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2024-0119.html">https://linux.oracle.com/errata/ELSA-2024-0119.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-39615">https://nvd.nist.gov/vuln/detail/CVE-2023-39615</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2023-39615">https://www.cve.org/CVERecord?id=CVE-2023-39615</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">libxml2</td>
<td>CVE-2023-45322</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">2.9.14+dfsg-1.3~deb12u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.openwall.com/lists/oss-security/2023/10/06/5">http://www.openwall.com/lists/oss-security/2023/10/06/5</a>
<a href="https://access.redhat.com/security/cve/CVE-2023-45322">https://access.redhat.com/security/cve/CVE-2023-45322</a>
<a href="https://gitlab.gnome.org/GNOME/libxml2/-/issues/344">https://gitlab.gnome.org/GNOME/libxml2/-/issues/344</a>
<a href="https://gitlab.gnome.org/GNOME/libxml2/-/issues/583">https://gitlab.gnome.org/GNOME/libxml2/-/issues/583</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45322">https://nvd.nist.gov/vuln/detail/CVE-2023-45322</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2023-45322">https://www.cve.org/CVERecord?id=CVE-2023-45322</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libxml2</td>
<td>CVE-2024-34459</td>
<td class="severity">LOW</td>
<td class="pkg-version">2.9.14+dfsg-1.3~deb12u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2024-34459">https://access.redhat.com/security/cve/CVE-2024-34459</a>
<a href="https://gitlab.gnome.org/GNOME/libxml2/-/issues/720">https://gitlab.gnome.org/GNOME/libxml2/-/issues/720</a>
<a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.11.8">https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.11.8</a>
<a href="https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.7">https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.7</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5HVUXKYTBWT3G5DEEQX62STJQBY367NL/">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5HVUXKYTBWT3G5DEEQX62STJQBY367NL/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/INKSSLW5VMZIXHRPZBAW4TJUX5SQKARG/">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/INKSSLW5VMZIXHRPZBAW4TJUX5SQKARG/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VRDJCNQP32LV56KESUQ5SNZKAJWSZZRI/">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VRDJCNQP32LV56KESUQ5SNZKAJWSZZRI/</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-34459">https://nvd.nist.gov/vuln/detail/CVE-2024-34459</a>
<a href="https://ubuntu.com/security/notices/USN-7240-1">https://ubuntu.com/security/notices/USN-7240-1</a>
<a href="https://ubuntu.com/security/notices/USN-7302-1">https://ubuntu.com/security/notices/USN-7302-1</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2024-34459">https://www.cve.org/CVERecord?id=CVE-2024-34459</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">libxslt1.1</td>
<td>CVE-2015-9019</td>
<td class="severity">LOW</td>
<td class="pkg-version">1.1.35-1+deb12u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2015-9019">https://access.redhat.com/security/cve/CVE-2015-9019</a>
<a href="https://bugzilla.gnome.org/show_bug.cgi?id=758400">https://bugzilla.gnome.org/show_bug.cgi?id=758400</a>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=934119">https://bugzilla.suse.com/show_bug.cgi?id=934119</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2015-9019">https://nvd.nist.gov/vuln/detail/CVE-2015-9019</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2015-9019">https://www.cve.org/CVERecord?id=CVE-2015-9019</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">login</td>
<td>CVE-2023-4641</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1:4.13+dfsg1-1+b1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/errata/RHSA-2023:6632">https://access.redhat.com/errata/RHSA-2023:6632</a>
<a href="https://access.redhat.com/errata/RHSA-2023:7112">https://access.redhat.com/errata/RHSA-2023:7112</a>
<a href="https://access.redhat.com/errata/RHSA-2024:0417">https://access.redhat.com/errata/RHSA-2024:0417</a>
<a href="https://access.redhat.com/errata/RHSA-2024:2577">https://access.redhat.com/errata/RHSA-2024:2577</a>
<a href="https://access.redhat.com/security/cve/CVE-2023-4641">https://access.redhat.com/security/cve/CVE-2023-4641</a>
<a href="https://bugzilla.redhat.com/2215945">https://bugzilla.redhat.com/2215945</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2215945">https://bugzilla.redhat.com/show_bug.cgi?id=2215945</a>
<a href="https://errata.almalinux.org/9/ALSA-2023-6632.html">https://errata.almalinux.org/9/ALSA-2023-6632.html</a>
<a href="https://linux.oracle.com/cve/CVE-2023-4641.html">https://linux.oracle.com/cve/CVE-2023-4641.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2023-7112.html">https://linux.oracle.com/errata/ELSA-2023-7112.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4641">https://nvd.nist.gov/vuln/detail/CVE-2023-4641</a>
<a href="https://ubuntu.com/security/notices/USN-6640-1">https://ubuntu.com/security/notices/USN-6640-1</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2023-4641">https://www.cve.org/CVERecord?id=CVE-2023-4641</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">login</td>
<td>CVE-2007-5686</td>
<td class="severity">LOW</td>
<td class="pkg-version">1:4.13+dfsg1-1+b1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://secunia.com/advisories/27215">http://secunia.com/advisories/27215</a>
<a href="http://www.securityfocus.com/archive/1/482129/100/100/threaded">http://www.securityfocus.com/archive/1/482129/100/100/threaded</a>
<a href="http://www.securityfocus.com/archive/1/482857/100/0/threaded">http://www.securityfocus.com/archive/1/482857/100/0/threaded</a>
<a href="http://www.securityfocus.com/bid/26048">http://www.securityfocus.com/bid/26048</a>
<a href="http://www.vupen.com/english/advisories/2007/3474">http://www.vupen.com/english/advisories/2007/3474</a>
<a href="https://issues.rpath.com/browse/RPL-1825">https://issues.rpath.com/browse/RPL-1825</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">login</td>
<td>CVE-2023-29383</td>
<td class="severity">LOW</td>
<td class="pkg-version">1:4.13+dfsg1-1+b1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2023-29383">https://access.redhat.com/security/cve/CVE-2023-29383</a>
<a href="https://github.com/shadow-maint/shadow/commit/e5905c4b84d4fb90aefcd96ee618411ebfac663d">https://github.com/shadow-maint/shadow/commit/e5905c4b84d4fb90aefcd96ee618411ebfac663d</a>
<a href="https://github.com/shadow-maint/shadow/pull/687">https://github.com/shadow-maint/shadow/pull/687</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29383">https://nvd.nist.gov/vuln/detail/CVE-2023-29383</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2023-29383">https://www.cve.org/CVERecord?id=CVE-2023-29383</a>
<a href="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2023-29383-abusing-linux-chfn-to-misrepresent-etc-passwd/">https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2023-29383-abusing-linux-chfn-to-misrepresent-etc-passwd/</a>
<a href="https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=31797">https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=31797</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">login</td>
<td>CVE-2024-56433</td>
<td class="severity">LOW</td>
<td class="pkg-version">1:4.13+dfsg1-1+b1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2024-56433">https://access.redhat.com/security/cve/CVE-2024-56433</a>
<a href="https://github.com/shadow-maint/shadow/blob/e2512d5741d4a44bdd81a8c2d0029b6222728cf0/etc/login.defs#L238-L241">https://github.com/shadow-maint/shadow/blob/e2512d5741d4a44bdd81a8c2d0029b6222728cf0/etc/login.defs#L238-L241</a>
<a href="https://github.com/shadow-maint/shadow/issues/1157">https://github.com/shadow-maint/shadow/issues/1157</a>
<a href="https://github.com/shadow-maint/shadow/releases/tag/4.4">https://github.com/shadow-maint/shadow/releases/tag/4.4</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56433">https://nvd.nist.gov/vuln/detail/CVE-2024-56433</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2024-56433">https://www.cve.org/CVERecord?id=CVE-2024-56433</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">login</td>
<td>TEMP-0628843-DBAD28</td>
<td class="severity">LOW</td>
<td class="pkg-version">1:4.13+dfsg1-1+b1</td>
<td></td>
<td class="links" data-more-links="off">
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">mount</td>
<td>CVE-2022-0563</td>
<td class="severity">LOW</td>
<td class="pkg-version">2.38.1-5+deb12u3</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a>
<a href="https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/">https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/</a>
<a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u</a>
<a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a>
<a href="https://security.gentoo.org/glsa/202401-08">https://security.gentoo.org/glsa/202401-08</a>
<a href="https://security.netapp.com/advisory/ntap-20220331-0002/">https://security.netapp.com/advisory/ntap-20220331-0002/</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2022-0563">https://www.cve.org/CVERecord?id=CVE-2022-0563</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">ncurses-base</td>
<td>CVE-2023-50495</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">6.4-4</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2023-50495">https://access.redhat.com/security/cve/CVE-2023-50495</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/</a>
<a href="https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00020.html">https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00020.html</a>
<a href="https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00029.html">https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00029.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-50495">https://nvd.nist.gov/vuln/detail/CVE-2023-50495</a>
<a href="https://security.netapp.com/advisory/ntap-20240119-0008/">https://security.netapp.com/advisory/ntap-20240119-0008/</a>
<a href="https://ubuntu.com/security/notices/USN-6684-1">https://ubuntu.com/security/notices/USN-6684-1</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2023-50495">https://www.cve.org/CVERecord?id=CVE-2023-50495</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">ncurses-bin</td>
<td>CVE-2023-50495</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">6.4-4</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2023-50495">https://access.redhat.com/security/cve/CVE-2023-50495</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/</a>
<a href="https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00020.html">https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00020.html</a>
<a href="https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00029.html">https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00029.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-50495">https://nvd.nist.gov/vuln/detail/CVE-2023-50495</a>
<a href="https://security.netapp.com/advisory/ntap-20240119-0008/">https://security.netapp.com/advisory/ntap-20240119-0008/</a>
<a href="https://ubuntu.com/security/notices/USN-6684-1">https://ubuntu.com/security/notices/USN-6684-1</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2023-50495">https://www.cve.org/CVERecord?id=CVE-2023-50495</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">nginx</td>
<td>CVE-2024-7347</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1.27.5-1~bookworm</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.openwall.com/lists/oss-security/2024/08/14/4">http://www.openwall.com/lists/oss-security/2024/08/14/4</a>
<a href="https://access.redhat.com/errata/RHSA-2025:3261">https://access.redhat.com/errata/RHSA-2025:3261</a>
<a href="https://access.redhat.com/security/cve/CVE-2024-7347">https://access.redhat.com/security/cve/CVE-2024-7347</a>
<a href="https://errata.almalinux.org/9/ALSA-2025-3261.html">https://errata.almalinux.org/9/ALSA-2025-3261.html</a>
<a href="https://forum.nginx.org/read.php?27,300027">https://forum.nginx.org/read.php?27,300027</a>
<a href="https://linux.oracle.com/cve/CVE-2024-7347.html">https://linux.oracle.com/cve/CVE-2024-7347.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2025-3262.html">https://linux.oracle.com/errata/ELSA-2025-3262.html</a>
<a href="https://my.f5.com/manage/s/article/K000140529">https://my.f5.com/manage/s/article/K000140529</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-7347">https://nvd.nist.gov/vuln/detail/CVE-2024-7347</a>
<a href="https://ubuntu.com/security/notices/USN-7014-1">https://ubuntu.com/security/notices/USN-7014-1</a>
<a href="https://ubuntu.com/security/notices/USN-7014-2">https://ubuntu.com/security/notices/USN-7014-2</a>
<a href="https://ubuntu.com/security/notices/USN-7014-3">https://ubuntu.com/security/notices/USN-7014-3</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2024-7347">https://www.cve.org/CVERecord?id=CVE-2024-7347</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">nginx</td>
<td>CVE-2009-4487</td>
<td class="severity">LOW</td>
<td class="pkg-version">1.27.5-1~bookworm</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.securityfocus.com/archive/1/508830/100/0/threaded">http://www.securityfocus.com/archive/1/508830/100/0/threaded</a>
<a href="http://www.securityfocus.com/bid/37711">http://www.securityfocus.com/bid/37711</a>
<a href="http://www.ush.it/team/ush/hack_httpd_escape/adv.txt">http://www.ush.it/team/ush/hack_httpd_escape/adv.txt</a>
<a href="https://access.redhat.com/security/cve/CVE-2009-4487">https://access.redhat.com/security/cve/CVE-2009-4487</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2009-4487">https://nvd.nist.gov/vuln/detail/CVE-2009-4487</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2009-4487">https://www.cve.org/CVERecord?id=CVE-2009-4487</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">nginx</td>
<td>CVE-2013-0337</td>
<td class="severity">LOW</td>
<td class="pkg-version">1.27.5-1~bookworm</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://secunia.com/advisories/55181">http://secunia.com/advisories/55181</a>
<a href="http://security.gentoo.org/glsa/glsa-201310-04.xml">http://security.gentoo.org/glsa/glsa-201310-04.xml</a>
<a href="http://www.openwall.com/lists/oss-security/2013/02/21/15">http://www.openwall.com/lists/oss-security/2013/02/21/15</a>
<a href="http://www.openwall.com/lists/oss-security/2013/02/22/1">http://www.openwall.com/lists/oss-security/2013/02/22/1</a>
<a href="http://www.openwall.com/lists/oss-security/2013/02/24/1">http://www.openwall.com/lists/oss-security/2013/02/24/1</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">nginx</td>
<td>CVE-2023-44487</td>
<td class="severity">LOW</td>
<td class="pkg-version">1.27.5-1~bookworm</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.openwall.com/lists/oss-security/2023/10/10/6">http://www.openwall.com/lists/oss-security/2023/10/10/6</a>
<a href="http://www.openwall.com/lists/oss-security/2023/10/10/7">http://www.openwall.com/lists/oss-security/2023/10/10/7</a>
<a href="http://www.openwall.com/lists/oss-security/2023/10/13/4">http://www.openwall.com/lists/oss-security/2023/10/13/4</a>
<a href="http://www.openwall.com/lists/oss-security/2023/10/13/9">http://www.openwall.com/lists/oss-security/2023/10/13/9</a>
<a href="http://www.openwall.com/lists/oss-security/2023/10/18/4">http://www.openwall.com/lists/oss-security/2023/10/18/4</a>
<a href="http://www.openwall.com/lists/oss-security/2023/10/18/8">http://www.openwall.com/lists/oss-security/2023/10/18/8</a>
<a href="http://www.openwall.com/lists/oss-security/2023/10/19/6">http://www.openwall.com/lists/oss-security/2023/10/19/6</a>
<a href="http://www.openwall.com/lists/oss-security/2023/10/20/8">http://www.openwall.com/lists/oss-security/2023/10/20/8</a>
<a href="https://access.redhat.com/errata/RHSA-2023:6746">https://access.redhat.com/errata/RHSA-2023:6746</a>
<a href="https://access.redhat.com/security/cve/CVE-2023-44487">https://access.redhat.com/security/cve/CVE-2023-44487</a>
<a href="https://access.redhat.com/security/cve/cve-2023-44487">https://access.redhat.com/security/cve/cve-2023-44487</a>
<a href="https://akka.io/security/akka-http-cve-2023-44487.html">https://akka.io/security/akka-http-cve-2023-44487.html</a>
<a href="https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size">https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size</a>
<a href="https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/">https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/</a>
<a href="https://aws.amazon.com/security/security-bulletins/AWS-2023-011">https://aws.amazon.com/security/security-bulletins/AWS-2023-011</a>
<a href="https://aws.amazon.com/security/security-bulletins/AWS-2023-011/">https://aws.amazon.com/security/security-bulletins/AWS-2023-011/</a>
<a href="https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack">https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack</a>
<a href="https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/">https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/</a>
<a href="https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack">https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack</a>
<a href="https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/">https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/</a>
<a href="https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty">https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty</a>
<a href="https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/">https://blog.litespeedtech.com/2023/10/11/rapid-reset-http-2-vulnerablilty/</a>
<a href="https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack">https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack</a>
<a href="https://blog.vespa.ai/cve-2023-44487">https://blog.vespa.ai/cve-2023-44487</a>
<a href="https://blog.vespa.ai/cve-2023-44487/">https://blog.vespa.ai/cve-2023-44487/</a>
<a href="https://bugzilla.proxmox.com/show_bug.cgi?id=4988">https://bugzilla.proxmox.com/show_bug.cgi?id=4988</a>
<a href="https://bugzilla.redhat.com/2242803">https://bugzilla.redhat.com/2242803</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2242803">https://bugzilla.redhat.com/show_bug.cgi?id=2242803</a>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216123">https://bugzilla.suse.com/show_bug.cgi?id=1216123</a>
<a href="https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9">https://cgit.freebsd.org/ports/commit/?id=c64c329c2c1752f46b73e3e6ce9f4329be6629f9</a>
<a href="https://chaos.social/@icing/111210915918780532">https://chaos.social/@icing/111210915918780532</a>
<a href="https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps">https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps</a>
<a href="https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/">https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/</a>
<a href="https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack">https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack</a>
<a href="https://community.traefik.io/t/is-traefik-vulnerable-to-cve-2023-44487/20125">https://community.traefik.io/t/is-traefik-vulnerable-to-cve-2023-44487/20125</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487</a>
<a href="https://devblogs.microsoft.com/dotnet/october-2023-updates/">https://devblogs.microsoft.com/dotnet/october-2023-updates/</a>
<a href="https://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715">https://discuss.hashicorp.com/t/hcsec-2023-32-vault-consul-and-boundary-affected-by-http-2-rapid-reset-denial-of-service-vulnerability-cve-2023-44487/59715</a>
<a href="https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cve">https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cve</a>
<a href="https://errata.almalinux.org/9/ALSA-2023-6746.html">https://errata.almalinux.org/9/ALSA-2023-6746.html</a>
<a href="https://errata.rockylinux.org/RLSA-2023:5838">https://errata.rockylinux.org/RLSA-2023:5838</a>
<a href="https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764">https://forums.swift.org/t/swift-nio-http2-security-update-cve-2023-44487-http-2-dos/67764</a>
<a href="https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088">https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088</a>
<a href="https://github.com/Azure/AKS/issues/3947">https://github.com/Azure/AKS/issues/3947</a>
<a href="https://github.com/Kong/kong/discussions/11741">https://github.com/Kong/kong/discussions/11741</a>
<a href="https://github.com/advisories/GHSA-qppj-fm5r-hxr3">https://github.com/advisories/GHSA-qppj-fm5r-hxr3</a>
<a href="https://github.com/advisories/GHSA-vx74-f528-fxqg">https://github.com/advisories/GHSA-vx74-f528-fxqg</a>
<a href="https://github.com/advisories/GHSA-xpw8-rcwv-8f8p">https://github.com/advisories/GHSA-xpw8-rcwv-8f8p</a>
<a href="https://github.com/akka/akka-http/issues/4323">https://github.com/akka/akka-http/issues/4323</a>
<a href="https://github.com/akka/akka-http/pull/4324">https://github.com/akka/akka-http/pull/4324</a>
<a href="https://github.com/akka/akka-http/pull/4325">https://github.com/akka/akka-http/pull/4325</a>
<a href="https://github.com/alibaba/tengine/issues/1872">https://github.com/alibaba/tengine/issues/1872</a>
<a href="https://github.com/apache/apisix/issues/10320">https://github.com/apache/apisix/issues/10320</a>
<a href="https://github.com/apache/httpd-site/pull/10">https://github.com/apache/httpd-site/pull/10</a>
<a href="https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113">https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113</a>
<a href="https://github.com/apache/tomcat/commit/944332bb15bd2f3bf76ec2caeb1ff0a58a3bc628">https://github.com/apache/tomcat/commit/944332bb15bd2f3bf76ec2caeb1ff0a58a3bc628</a>
<a href="https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2">https://github.com/apache/tomcat/tree/main/java/org/apache/coyote/http2</a>
<a href="https://github.com/apache/trafficserver/pull/10564">https://github.com/apache/trafficserver/pull/10564</a>
<a href="https://github.com/apple/swift-nio-http2">https://github.com/apple/swift-nio-http2</a>
<a href="https://github.com/apple/swift-nio-http2/security/advisories/GHSA-qppj-fm5r-hxr3">https://github.com/apple/swift-nio-http2/security/advisories/GHSA-qppj-fm5r-hxr3</a>
<a href="https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487">https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487</a>
<a href="https://github.com/bcdannyboy/CVE-2023-44487">https://github.com/bcdannyboy/CVE-2023-44487</a>
<a href="https://github.com/caddyserver/caddy/issues/5877">https://github.com/caddyserver/caddy/issues/5877</a>
<a href="https://github.com/caddyserver/caddy/releases/tag/v2.7.5">https://github.com/caddyserver/caddy/releases/tag/v2.7.5</a>
<a href="https://github.com/dotnet/announcements/issues/277">https://github.com/dotnet/announcements/issues/277</a>
<a href="https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73">https://github.com/dotnet/core/blob/e4613450ea0da7fd2fc6b61dfb2c1c1dec1ce9ec/release-notes/6.0/6.0.23/6.0.23.md?plain=1#L73</a>
<a href="https://github.com/eclipse/jetty.project/issues/10679">https://github.com/eclipse/jetty.project/issues/10679</a>
<a href="https://github.com/envoyproxy/envoy/pull/30055">https://github.com/envoyproxy/envoy/pull/30055</a>
<a href="https://github.com/etcd-io/etcd/issues/16740">https://github.com/etcd-io/etcd/issues/16740</a>
<a href="https://github.com/facebook/proxygen/pull/466">https://github.com/facebook/proxygen/pull/466</a>
<a href="https://github.com/golang/go/issues/63417">https://github.com/golang/go/issues/63417</a>
<a href="https://github.com/grpc/grpc-go/pull/6703">https://github.com/grpc/grpc-go/pull/6703</a>
<a href="https://github.com/grpc/grpc-go/releases">https://github.com/grpc/grpc-go/releases</a>
<a href="https://github.com/grpc/grpc/releases/tag/v1.59.2">https://github.com/grpc/grpc/releases/tag/v1.59.2</a>
<a href="https://github.com/h2o/h2o/pull/3291">https://github.com/h2o/h2o/pull/3291</a>
<a href="https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqf">https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqf</a>
<a href="https://github.com/haproxy/haproxy/issues/2312">https://github.com/haproxy/haproxy/issues/2312</a>
<a href="https://github.com/hyperium/hyper/issues/3337">https://github.com/hyperium/hyper/issues/3337</a>
<a href="https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244">https://github.com/icing/mod_h2/blob/0a864782af0a942aa2ad4ed960a6b32cd35bcf0a/mod_http2/README.md?plain=1#L239-L244</a>
<a href="https://github.com/junkurihara/rust-rpxy/issues/97">https://github.com/junkurihara/rust-rpxy/issues/97</a>
<a href="https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1">https://github.com/kazu-yamamoto/http2/commit/f61d41a502bd0f60eb24e1ce14edc7b6df6722a1</a>
<a href="https://github.com/kazu-yamamoto/http2/issues/93">https://github.com/kazu-yamamoto/http2/issues/93</a>
<a href="https://github.com/kubernetes/kubernetes/pull/121120">https://github.com/kubernetes/kubernetes/pull/121120</a>
<a href="https://github.com/line/armeria/pull/5232">https://github.com/line/armeria/pull/5232</a>
<a href="https://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632">https://github.com/linkerd/website/pull/1695/commits/4b9c6836471bc8270ab48aae6fd2181bc73fd632</a>
<a href="https://github.com/micrictor/http2-rst-stream">https://github.com/micrictor/http2-rst-stream</a>
<a href="https://github.com/microsoft/CBL-Mariner/pull/6381">https://github.com/microsoft/CBL-Mariner/pull/6381</a>
<a href="https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61">https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61</a>
<a href="https://github.com/nghttp2/nghttp2/pull/1961">https://github.com/nghttp2/nghttp2/pull/1961</a>
<a href="https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0">https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0</a>
<a href="https://github.com/ninenines/cowboy/issues/1615">https://github.com/ninenines/cowboy/issues/1615</a>
<a href="https://github.com/nodejs/node/pull/50121">https://github.com/nodejs/node/pull/50121</a>
<a href="https://github.com/openresty/openresty/issues/930">https://github.com/openresty/openresty/issues/930</a>
<a href="https://github.com/opensearch-project/data-prepper/issues/3474">https://github.com/opensearch-project/data-prepper/issues/3474</a>
<a href="https://github.com/oqtane/oqtane.framework/discussions/3367">https://github.com/oqtane/oqtane.framework/discussions/3367</a>
<a href="https://github.com/projectcontour/contour/pull/5826">https://github.com/projectcontour/contour/pull/5826</a>
<a href="https://github.com/tempesta-tech/tempesta/issues/1986">https://github.com/tempesta-tech/tempesta/issues/1986</a>
<a href="https://github.com/varnishcache/varnish-cache/issues/3996">https://github.com/varnishcache/varnish-cache/issues/3996</a>
<a href="https://go.dev/cl/534215">https://go.dev/cl/534215</a>
<a href="https://go.dev/cl/534235">https://go.dev/cl/534235</a>
<a href="https://go.dev/issue/63417">https://go.dev/issue/63417</a>
<a href="https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo">https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo</a>
<a href="https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo/m/UDd7VKQuAAAJ">https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo/m/UDd7VKQuAAAJ</a>
<a href="https://istio.io/latest/news/security/istio-security-2023-004">https://istio.io/latest/news/security/istio-security-2023-004</a>
<a href="https://istio.io/latest/news/security/istio-security-2023-004/">https://istio.io/latest/news/security/istio-security-2023-004/</a>
<a href="https://linkerd.io/2023/10/12/linkerd-cve-2023-44487">https://linkerd.io/2023/10/12/linkerd-cve-2023-44487</a>
<a href="https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/">https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/</a>
<a href="https://linux.oracle.com/cve/CVE-2023-44487.html">https://linux.oracle.com/cve/CVE-2023-44487.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2024-1444.html">https://linux.oracle.com/errata/ELSA-2024-1444.html</a>
<a href="https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q">https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q</a>
<a href="https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html">https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html</a>
<a href="https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html">https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html</a>
<a href="https://lists.debian.org/debian-lts-announce/2023/10/msg00024.html">https://lists.debian.org/debian-lts-announce/2023/10/msg00024.html</a>
<a href="https://lists.debian.org/debian-lts-announce/2023/10/msg00045.html">https://lists.debian.org/debian-lts-announce/2023/10/msg00045.html</a>
<a href="https://lists.debian.org/debian-lts-announce/2023/10/msg00047.html">https://lists.debian.org/debian-lts-announce/2023/10/msg00047.html</a>
<a href="https://lists.debian.org/debian-lts-announce/2023/11/msg00001.html">https://lists.debian.org/debian-lts-announce/2023/11/msg00001.html</a>
<a href="https://lists.debian.org/debian-lts-announce/2023/11/msg00012.html">https://lists.debian.org/debian-lts-announce/2023/11/msg00012.html</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CLB4TW7KALB3EEQWNWCN7OUIWWVWWCG2/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSEGD2IWKNUO3DWY4KQGUQM5BISRWHQE/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNMZJCDHGLJJLXO4OXWJMTVQRNWOC7UL/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHUHTSXLXGXS7JYKBXTA3VINUPHTNGVU/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VSRDIV77HNKUSM7SJC5BKE5JSHLHU2NK/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLPRQ5TWUQQXYWBJM7ECYDAIL2YVKIUH/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFOIBB4YFICHDM7IBOP7PWXW3FX4HLL2/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB43REMKRQR62NJEI7I5NQ4FSXNLBKRT/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLU6U2R2IC2K64NDPNMV55AUAO65MAF4/</a>
<a href="https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html">https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html</a>
<a href="https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html">https://mailman.nginx.org/pipermail/nginx-devel/2023-October/S36Q5HBXR7CAIMPLLPRSSSYR4PCMWILK.html</a>
<a href="https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.html">https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.html</a>
<a href="https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2">https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2</a>
<a href="https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/">https://msrc.microsoft.com/blog/2023/10/microsoft-response-to-distributed-denial-of-service-ddos-attacks-against-http/2/</a>
<a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487</a>
<a href="https://my.f5.com/manage/s/article/K000137106">https://my.f5.com/manage/s/article/K000137106</a>
<a href="https://netty.io/news/2023/10/10/4-1-100-Final.html">https://netty.io/news/2023/10/10/4-1-100-Final.html</a>
<a href="https://news.ycombinator.com/item?id=37830987">https://news.ycombinator.com/item?id=37830987</a>
<a href="https://news.ycombinator.com/item?id=37830998">https://news.ycombinator.com/item?id=37830998</a>
<a href="https://news.ycombinator.com/item?id=37831062">https://news.ycombinator.com/item?id=37831062</a>
<a href="https://news.ycombinator.com/item?id=37837043">https://news.ycombinator.com/item?id=37837043</a>
<a href="https://nodejs.org/en/blog/vulnerability/october-2023-security-releases">https://nodejs.org/en/blog/vulnerability/october-2023-security-releases</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">https://nvd.nist.gov/vuln/detail/CVE-2023-44487</a>
<a href="https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response">https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response</a>
<a href="https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response/">https://openssf.org/blog/2023/10/10/http-2-rapid-reset-vulnerability-highlights-need-for-rapid-response/</a>
<a href="https://pkg.go.dev/vuln/GO-2023-2102">https://pkg.go.dev/vuln/GO-2023-2102</a>
<a href="https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected">https://seanmonstar.com/post/730794151136935936/hyper-http2-rapid-reset-unaffected</a>
<a href="https://security.gentoo.org/glsa/202311-09">https://security.gentoo.org/glsa/202311-09</a>
<a href="https://security.netapp.com/advisory/ntap-20231016-0001">https://security.netapp.com/advisory/ntap-20231016-0001</a>
<a href="https://security.netapp.com/advisory/ntap-20231016-0001/">https://security.netapp.com/advisory/ntap-20231016-0001/</a>
<a href="https://security.netapp.com/advisory/ntap-20240426-0007">https://security.netapp.com/advisory/ntap-20240426-0007</a>
<a href="https://security.netapp.com/advisory/ntap-20240426-0007/">https://security.netapp.com/advisory/ntap-20240426-0007/</a>
<a href="https://security.netapp.com/advisory/ntap-20240621-0006">https://security.netapp.com/advisory/ntap-20240621-0006</a>
<a href="https://security.netapp.com/advisory/ntap-20240621-0006/">https://security.netapp.com/advisory/ntap-20240621-0006/</a>
<a href="https://security.netapp.com/advisory/ntap-20240621-0007">https://security.netapp.com/advisory/ntap-20240621-0007</a>
<a href="https://security.netapp.com/advisory/ntap-20240621-0007/">https://security.netapp.com/advisory/ntap-20240621-0007/</a>
<a href="https://security.paloaltonetworks.com/CVE-2023-44487">https://security.paloaltonetworks.com/CVE-2023-44487</a>
<a href="https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14">https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.14</a>
<a href="https://tomcat.apache.org/security-11.html#Fixed_in_Apache_Tomcat_11.0.0-M12">https://tomcat.apache.org/security-11.html#Fixed_in_Apache_Tomcat_11.0.0-M12</a>
<a href="https://tomcat.apache.org/security-8.html">https://tomcat.apache.org/security-8.html</a>
<a href="https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.94">https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.94</a>
<a href="https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.81">https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.81</a>
<a href="https://ubuntu.com/security/CVE-2023-44487">https://ubuntu.com/security/CVE-2023-44487</a>
<a href="https://ubuntu.com/security/notices/USN-6427-1">https://ubuntu.com/security/notices/USN-6427-1</a>
<a href="https://ubuntu.com/security/notices/USN-6427-2">https://ubuntu.com/security/notices/USN-6427-2</a>
<a href="https://ubuntu.com/security/notices/USN-6438-1">https://ubuntu.com/security/notices/USN-6438-1</a>
<a href="https://ubuntu.com/security/notices/USN-6505-1">https://ubuntu.com/security/notices/USN-6505-1</a>
<a href="https://ubuntu.com/security/notices/USN-6574-1">https://ubuntu.com/security/notices/USN-6574-1</a>
<a href="https://ubuntu.com/security/notices/USN-6754-1">https://ubuntu.com/security/notices/USN-6754-1</a>
<a href="https://ubuntu.com/security/notices/USN-6994-1">https://ubuntu.com/security/notices/USN-6994-1</a>
<a href="https://ubuntu.com/security/notices/USN-7067-1">https://ubuntu.com/security/notices/USN-7067-1</a>
<a href="https://ubuntu.com/security/notices/USN-7410-1">https://ubuntu.com/security/notices/USN-7410-1</a>
<a href="https://ubuntu.com/security/notices/USN-7469-1">https://ubuntu.com/security/notices/USN-7469-1</a>
<a href="https://ubuntu.com/security/notices/USN-7469-2">https://ubuntu.com/security/notices/USN-7469-2</a>
<a href="https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records">https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records</a>
<a href="https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/">https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/</a>
<a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog">https://www.cisa.gov/known-exploited-vulnerabilities-catalog</a>
<a href="https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487">https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2023-44487">https://www.cve.org/CVERecord?id=CVE-2023-44487</a>
<a href="https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event">https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event</a>
<a href="https://www.debian.org/security/2023/dsa-5521">https://www.debian.org/security/2023/dsa-5521</a>
<a href="https://www.debian.org/security/2023/dsa-5522">https://www.debian.org/security/2023/dsa-5522</a>
<a href="https://www.debian.org/security/2023/dsa-5540">https://www.debian.org/security/2023/dsa-5540</a>
<a href="https://www.debian.org/security/2023/dsa-5549">https://www.debian.org/security/2023/dsa-5549</a>
<a href="https://www.debian.org/security/2023/dsa-5558">https://www.debian.org/security/2023/dsa-5558</a>
<a href="https://www.debian.org/security/2023/dsa-5570">https://www.debian.org/security/2023/dsa-5570</a>
<a href="https://www.eclipse.org/lists/jetty-announce/msg00181.html">https://www.eclipse.org/lists/jetty-announce/msg00181.html</a>
<a href="https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487">https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487</a>
<a href="https://www.mail-archive.com/haproxy@formilux.org/msg44134.html">https://www.mail-archive.com/haproxy@formilux.org/msg44134.html</a>
<a href="https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487">https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487</a>
<a href="https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487/">https://www.netlify.com/blog/netlify-successfully-mitigates-cve-2023-44487/</a>
<a href="https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products">https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products</a>
<a href="https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/">https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/</a>
<a href="https://www.openwall.com/lists/oss-security/2023/10/10/6">https://www.openwall.com/lists/oss-security/2023/10/10/6</a>
<a href="https://www.phoronix.com/news/HTTP2-Rapid-Reset-Attack">https://www.phoronix.com/news/HTTP2-Rapid-Reset-Attack</a>
<a href="https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday">https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday</a>
<a href="https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/">https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/</a>
<a href="https://www.vicarius.io/vsociety/posts/rapid-reset-cve-2023-44487-dos-in-http2-understanding-the-root-cause">https://www.vicarius.io/vsociety/posts/rapid-reset-cve-2023-44487-dos-in-http2-understanding-the-root-cause</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">openssl</td>
<td>CVE-2024-13176</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">3.0.15-1~deb12u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.openwall.com/lists/oss-security/2025/01/20/2">http://www.openwall.com/lists/oss-security/2025/01/20/2</a>
<a href="https://access.redhat.com/security/cve/CVE-2024-13176">https://access.redhat.com/security/cve/CVE-2024-13176</a>
<a href="https://github.com/openssl/openssl/commit/07272b05b04836a762b4baa874958af51d513844">https://github.com/openssl/openssl/commit/07272b05b04836a762b4baa874958af51d513844</a>
<a href="https://github.com/openssl/openssl/commit/2af62e74fb59bc469506bc37eb2990ea408d9467">https://github.com/openssl/openssl/commit/2af62e74fb59bc469506bc37eb2990ea408d9467</a>
<a href="https://github.com/openssl/openssl/commit/392dcb336405a0c94486aa6655057f59fd3a0902">https://github.com/openssl/openssl/commit/392dcb336405a0c94486aa6655057f59fd3a0902</a>
<a href="https://github.com/openssl/openssl/commit/4b1cb94a734a7d4ec363ac0a215a25c181e11f65">https://github.com/openssl/openssl/commit/4b1cb94a734a7d4ec363ac0a215a25c181e11f65</a>
<a href="https://github.com/openssl/openssl/commit/77c608f4c8857e63e98e66444e2e761c9627916f">https://github.com/openssl/openssl/commit/77c608f4c8857e63e98e66444e2e761c9627916f</a>
<a href="https://github.openssl.org/openssl/extended-releases/commit/0d5fd1ab987f7571e2c955d8d8b638fc0fb54ded">https://github.openssl.org/openssl/extended-releases/commit/0d5fd1ab987f7571e2c955d8d8b638fc0fb54ded</a>
<a href="https://github.openssl.org/openssl/extended-releases/commit/a2639000db19878d5d89586ae7b725080592ae86">https://github.openssl.org/openssl/extended-releases/commit/a2639000db19878d5d89586ae7b725080592ae86</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-13176">https://nvd.nist.gov/vuln/detail/CVE-2024-13176</a>
<a href="https://openssl-library.org/news/secadv/20250120.txt">https://openssl-library.org/news/secadv/20250120.txt</a>
<a href="https://security.netapp.com/advisory/ntap-20250124-0005/">https://security.netapp.com/advisory/ntap-20250124-0005/</a>
<a href="https://security.netapp.com/advisory/ntap-20250418-0010/">https://security.netapp.com/advisory/ntap-20250418-0010/</a>
<a href="https://ubuntu.com/security/notices/USN-7264-1">https://ubuntu.com/security/notices/USN-7264-1</a>
<a href="https://ubuntu.com/security/notices/USN-7278-1">https://ubuntu.com/security/notices/USN-7278-1</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2024-13176">https://www.cve.org/CVERecord?id=CVE-2024-13176</a>
<a href="https://www.oracle.com/security-alerts/cpuapr2025.html#AppendixMSQL">https://www.oracle.com/security-alerts/cpuapr2025.html#AppendixMSQL</a>
</td>
</tr>
<tr class="severity-MEDIUM">
<td class="pkg-name">passwd</td>
<td>CVE-2023-4641</td>
<td class="severity">MEDIUM</td>
<td class="pkg-version">1:4.13+dfsg1-1+b1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/errata/RHSA-2023:6632">https://access.redhat.com/errata/RHSA-2023:6632</a>
<a href="https://access.redhat.com/errata/RHSA-2023:7112">https://access.redhat.com/errata/RHSA-2023:7112</a>
<a href="https://access.redhat.com/errata/RHSA-2024:0417">https://access.redhat.com/errata/RHSA-2024:0417</a>
<a href="https://access.redhat.com/errata/RHSA-2024:2577">https://access.redhat.com/errata/RHSA-2024:2577</a>
<a href="https://access.redhat.com/security/cve/CVE-2023-4641">https://access.redhat.com/security/cve/CVE-2023-4641</a>
<a href="https://bugzilla.redhat.com/2215945">https://bugzilla.redhat.com/2215945</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2215945">https://bugzilla.redhat.com/show_bug.cgi?id=2215945</a>
<a href="https://errata.almalinux.org/9/ALSA-2023-6632.html">https://errata.almalinux.org/9/ALSA-2023-6632.html</a>
<a href="https://linux.oracle.com/cve/CVE-2023-4641.html">https://linux.oracle.com/cve/CVE-2023-4641.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2023-7112.html">https://linux.oracle.com/errata/ELSA-2023-7112.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4641">https://nvd.nist.gov/vuln/detail/CVE-2023-4641</a>
<a href="https://ubuntu.com/security/notices/USN-6640-1">https://ubuntu.com/security/notices/USN-6640-1</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2023-4641">https://www.cve.org/CVERecord?id=CVE-2023-4641</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">passwd</td>
<td>CVE-2007-5686</td>
<td class="severity">LOW</td>
<td class="pkg-version">1:4.13+dfsg1-1+b1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://secunia.com/advisories/27215">http://secunia.com/advisories/27215</a>
<a href="http://www.securityfocus.com/archive/1/482129/100/100/threaded">http://www.securityfocus.com/archive/1/482129/100/100/threaded</a>
<a href="http://www.securityfocus.com/archive/1/482857/100/0/threaded">http://www.securityfocus.com/archive/1/482857/100/0/threaded</a>
<a href="http://www.securityfocus.com/bid/26048">http://www.securityfocus.com/bid/26048</a>
<a href="http://www.vupen.com/english/advisories/2007/3474">http://www.vupen.com/english/advisories/2007/3474</a>
<a href="https://issues.rpath.com/browse/RPL-1825">https://issues.rpath.com/browse/RPL-1825</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">passwd</td>
<td>CVE-2023-29383</td>
<td class="severity">LOW</td>
<td class="pkg-version">1:4.13+dfsg1-1+b1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2023-29383">https://access.redhat.com/security/cve/CVE-2023-29383</a>
<a href="https://github.com/shadow-maint/shadow/commit/e5905c4b84d4fb90aefcd96ee618411ebfac663d">https://github.com/shadow-maint/shadow/commit/e5905c4b84d4fb90aefcd96ee618411ebfac663d</a>
<a href="https://github.com/shadow-maint/shadow/pull/687">https://github.com/shadow-maint/shadow/pull/687</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29383">https://nvd.nist.gov/vuln/detail/CVE-2023-29383</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2023-29383">https://www.cve.org/CVERecord?id=CVE-2023-29383</a>
<a href="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2023-29383-abusing-linux-chfn-to-misrepresent-etc-passwd/">https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2023-29383-abusing-linux-chfn-to-misrepresent-etc-passwd/</a>
<a href="https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=31797">https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=31797</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">passwd</td>
<td>CVE-2024-56433</td>
<td class="severity">LOW</td>
<td class="pkg-version">1:4.13+dfsg1-1+b1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2024-56433">https://access.redhat.com/security/cve/CVE-2024-56433</a>
<a href="https://github.com/shadow-maint/shadow/blob/e2512d5741d4a44bdd81a8c2d0029b6222728cf0/etc/login.defs#L238-L241">https://github.com/shadow-maint/shadow/blob/e2512d5741d4a44bdd81a8c2d0029b6222728cf0/etc/login.defs#L238-L241</a>
<a href="https://github.com/shadow-maint/shadow/issues/1157">https://github.com/shadow-maint/shadow/issues/1157</a>
<a href="https://github.com/shadow-maint/shadow/releases/tag/4.4">https://github.com/shadow-maint/shadow/releases/tag/4.4</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2024-56433">https://nvd.nist.gov/vuln/detail/CVE-2024-56433</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2024-56433">https://www.cve.org/CVERecord?id=CVE-2024-56433</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">passwd</td>
<td>TEMP-0628843-DBAD28</td>
<td class="severity">LOW</td>
<td class="pkg-version">1:4.13+dfsg1-1+b1</td>
<td></td>
<td class="links" data-more-links="off">
</td>
</tr>
<tr class="severity-HIGH">
<td class="pkg-name">perl-base</td>
<td>CVE-2023-31484</td>
<td class="severity">HIGH</td>
<td class="pkg-version">5.36.0-7+deb12u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.openwall.com/lists/oss-security/2023/04/29/1">http://www.openwall.com/lists/oss-security/2023/04/29/1</a>
<a href="http://www.openwall.com/lists/oss-security/2023/05/03/3">http://www.openwall.com/lists/oss-security/2023/05/03/3</a>
<a href="http://www.openwall.com/lists/oss-security/2023/05/03/5">http://www.openwall.com/lists/oss-security/2023/05/03/5</a>
<a href="http://www.openwall.com/lists/oss-security/2023/05/07/2">http://www.openwall.com/lists/oss-security/2023/05/07/2</a>
<a href="https://access.redhat.com/errata/RHSA-2023:6539">https://access.redhat.com/errata/RHSA-2023:6539</a>
<a href="https://access.redhat.com/security/cve/CVE-2023-31484">https://access.redhat.com/security/cve/CVE-2023-31484</a>
<a href="https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/">https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/</a>
<a href="https://bugzilla.redhat.com/2218667">https://bugzilla.redhat.com/2218667</a>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=2218667">https://bugzilla.redhat.com/show_bug.cgi?id=2218667</a>
<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31484">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31484</a>
<a href="https://errata.almalinux.org/9/ALSA-2023-6539.html">https://errata.almalinux.org/9/ALSA-2023-6539.html</a>
<a href="https://errata.rockylinux.org/RLSA-2023:6539">https://errata.rockylinux.org/RLSA-2023:6539</a>
<a href="https://github.com/andk/cpanpm/commit/9c98370287f4e709924aee7c58ef21c85289a7f0 (2.35-TRIAL)">https://github.com/andk/cpanpm/commit/9c98370287f4e709924aee7c58ef21c85289a7f0 (2.35-TRIAL)</a>
<a href="https://github.com/andk/cpanpm/pull/175">https://github.com/andk/cpanpm/pull/175</a>
<a href="https://linux.oracle.com/cve/CVE-2023-31484.html">https://linux.oracle.com/cve/CVE-2023-31484.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2024-3094.html">https://linux.oracle.com/errata/ELSA-2024-3094.html</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BM6UW55CNFUTNGD5ZRKGUKKKFDJGMFHL/">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BM6UW55CNFUTNGD5ZRKGUKKKFDJGMFHL/</a>
<a href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LEGCEOKFJVBJ2QQ6S2H4NAEWTUERC7SB/">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LEGCEOKFJVBJ2QQ6S2H4NAEWTUERC7SB/</a>
<a href="https://metacpan.org/dist/CPAN/changes">https://metacpan.org/dist/CPAN/changes</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31484">https://nvd.nist.gov/vuln/detail/CVE-2023-31484</a>
<a href="https://security.netapp.com/advisory/ntap-20240621-0007/">https://security.netapp.com/advisory/ntap-20240621-0007/</a>
<a href="https://ubuntu.com/security/notices/USN-6112-1">https://ubuntu.com/security/notices/USN-6112-1</a>
<a href="https://ubuntu.com/security/notices/USN-6112-2">https://ubuntu.com/security/notices/USN-6112-2</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2023-31484">https://www.cve.org/CVERecord?id=CVE-2023-31484</a>
<a href="https://www.openwall.com/lists/oss-security/2023/04/18/14">https://www.openwall.com/lists/oss-security/2023/04/18/14</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">perl-base</td>
<td>CVE-2011-4116</td>
<td class="severity">LOW</td>
<td class="pkg-version">5.36.0-7+deb12u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.openwall.com/lists/oss-security/2011/11/04/2">http://www.openwall.com/lists/oss-security/2011/11/04/2</a>
<a href="http://www.openwall.com/lists/oss-security/2011/11/04/4">http://www.openwall.com/lists/oss-security/2011/11/04/4</a>
<a href="https://access.redhat.com/security/cve/CVE-2011-4116">https://access.redhat.com/security/cve/CVE-2011-4116</a>
<a href="https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14">https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2011-4116">https://nvd.nist.gov/vuln/detail/CVE-2011-4116</a>
<a href="https://rt.cpan.org/Public/Bug/Display.html?id=69106">https://rt.cpan.org/Public/Bug/Display.html?id=69106</a>
<a href="https://seclists.org/oss-sec/2011/q4/238">https://seclists.org/oss-sec/2011/q4/238</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2011-4116">https://www.cve.org/CVERecord?id=CVE-2011-4116</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">perl-base</td>
<td>CVE-2023-31486</td>
<td class="severity">LOW</td>
<td class="pkg-version">5.36.0-7+deb12u2</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.openwall.com/lists/oss-security/2023/04/29/1">http://www.openwall.com/lists/oss-security/2023/04/29/1</a>
<a href="http://www.openwall.com/lists/oss-security/2023/05/03/3">http://www.openwall.com/lists/oss-security/2023/05/03/3</a>
<a href="http://www.openwall.com/lists/oss-security/2023/05/03/5">http://www.openwall.com/lists/oss-security/2023/05/03/5</a>
<a href="http://www.openwall.com/lists/oss-security/2023/05/07/2">http://www.openwall.com/lists/oss-security/2023/05/07/2</a>
<a href="https://access.redhat.com/errata/RHSA-2023:6542">https://access.redhat.com/errata/RHSA-2023:6542</a>
<a href="https://access.redhat.com/security/cve/CVE-2023-31486">https://access.redhat.com/security/cve/CVE-2023-31486</a>
<a href="https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/">https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/</a>
<a href="https://bugzilla.redhat.com/2228392">https://bugzilla.redhat.com/2228392</a>
<a href="https://errata.almalinux.org/9/ALSA-2023-6542.html">https://errata.almalinux.org/9/ALSA-2023-6542.html</a>
<a href="https://github.com/chansen/p5-http-tiny/pull/153">https://github.com/chansen/p5-http-tiny/pull/153</a>
<a href="https://hackeriet.github.io/cpan-http-tiny-overview/">https://hackeriet.github.io/cpan-http-tiny-overview/</a>
<a href="https://linux.oracle.com/cve/CVE-2023-31486.html">https://linux.oracle.com/cve/CVE-2023-31486.html</a>
<a href="https://linux.oracle.com/errata/ELSA-2023-7174.html">https://linux.oracle.com/errata/ELSA-2023-7174.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-31486">https://nvd.nist.gov/vuln/detail/CVE-2023-31486</a>
<a href="https://security.netapp.com/advisory/ntap-20241129-0011/">https://security.netapp.com/advisory/ntap-20241129-0011/</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2023-31486">https://www.cve.org/CVERecord?id=CVE-2023-31486</a>
<a href="https://www.openwall.com/lists/oss-security/2023/04/18/14">https://www.openwall.com/lists/oss-security/2023/04/18/14</a>
<a href="https://www.openwall.com/lists/oss-security/2023/05/03/4">https://www.openwall.com/lists/oss-security/2023/05/03/4</a>
<a href="https://www.reddit.com/r/perl/comments/111tadi/psa_httptiny_disabled_ssl_verification_by_default/">https://www.reddit.com/r/perl/comments/111tadi/psa_httptiny_disabled_ssl_verification_by_default/</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">sysvinit-utils</td>
<td>TEMP-0517018-A83CE6</td>
<td class="severity">LOW</td>
<td class="pkg-version">3.06-4</td>
<td></td>
<td class="links" data-more-links="off">
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">tar</td>
<td>CVE-2005-2541</td>
<td class="severity">LOW</td>
<td class="pkg-version">1.34+dfsg-1.2+deb12u1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://marc.info/?l=bugtraq&amp;m=112327628230258&amp;w=2">http://marc.info/?l=bugtraq&amp;m=112327628230258&amp;w=2</a>
<a href="https://access.redhat.com/security/cve/CVE-2005-2541">https://access.redhat.com/security/cve/CVE-2005-2541</a>
<a href="https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E">https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2005-2541">https://nvd.nist.gov/vuln/detail/CVE-2005-2541</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2005-2541">https://www.cve.org/CVERecord?id=CVE-2005-2541</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">tar</td>
<td>TEMP-0290435-0B57B5</td>
<td class="severity">LOW</td>
<td class="pkg-version">1.34+dfsg-1.2+deb12u1</td>
<td></td>
<td class="links" data-more-links="off">
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">util-linux</td>
<td>CVE-2022-0563</td>
<td class="severity">LOW</td>
<td class="pkg-version">2.38.1-5+deb12u3</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a>
<a href="https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/">https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/</a>
<a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u</a>
<a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a>
<a href="https://security.gentoo.org/glsa/202401-08">https://security.gentoo.org/glsa/202401-08</a>
<a href="https://security.netapp.com/advisory/ntap-20220331-0002/">https://security.netapp.com/advisory/ntap-20220331-0002/</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2022-0563">https://www.cve.org/CVERecord?id=CVE-2022-0563</a>
</td>
</tr>
<tr class="severity-LOW">
<td class="pkg-name">util-linux-extra</td>
<td>CVE-2022-0563</td>
<td class="severity">LOW</td>
<td class="pkg-version">2.38.1-5+deb12u3</td>
<td></td>
<td class="links" data-more-links="off">
<a href="https://access.redhat.com/security/cve/CVE-2022-0563">https://access.redhat.com/security/cve/CVE-2022-0563</a>
<a href="https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/">https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/</a>
<a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u</a>
<a href="https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u">https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">https://nvd.nist.gov/vuln/detail/CVE-2022-0563</a>
<a href="https://security.gentoo.org/glsa/202401-08">https://security.gentoo.org/glsa/202401-08</a>
<a href="https://security.netapp.com/advisory/ntap-20220331-0002/">https://security.netapp.com/advisory/ntap-20220331-0002/</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2022-0563">https://www.cve.org/CVERecord?id=CVE-2022-0563</a>
</td>
</tr>
<tr class="severity-CRITICAL">
<td class="pkg-name">zlib1g</td>
<td>CVE-2023-45853</td>
<td class="severity">CRITICAL</td>
<td class="pkg-version">1:1.2.13.dfsg-1</td>
<td></td>
<td class="links" data-more-links="off">
<a href="http://www.openwall.com/lists/oss-security/2023/10/20/9">http://www.openwall.com/lists/oss-security/2023/10/20/9</a>
<a href="http://www.openwall.com/lists/oss-security/2024/01/24/10">http://www.openwall.com/lists/oss-security/2024/01/24/10</a>
<a href="https://access.redhat.com/security/cve/CVE-2023-45853">https://access.redhat.com/security/cve/CVE-2023-45853</a>
<a href="https://chromium.googlesource.com/chromium/src/+/d709fb23806858847131027da95ef4c548813356">https://chromium.googlesource.com/chromium/src/+/d709fb23806858847131027da95ef4c548813356</a>
<a href="https://chromium.googlesource.com/chromium/src/+/de29dd6c7151d3cd37cb4cf0036800ddfb1d8b61">https://chromium.googlesource.com/chromium/src/+/de29dd6c7151d3cd37cb4cf0036800ddfb1d8b61</a>
<a href="https://github.com/madler/zlib/blob/ac8f12c97d1afd9bafa9c710f827d40a407d3266/contrib/README.contrib#L1-L4">https://github.com/madler/zlib/blob/ac8f12c97d1afd9bafa9c710f827d40a407d3266/contrib/README.contrib#L1-L4</a>
<a href="https://github.com/madler/zlib/commit/73331a6a0481067628f065ffe87bb1d8f787d10c">https://github.com/madler/zlib/commit/73331a6a0481067628f065ffe87bb1d8f787d10c</a>
<a href="https://github.com/madler/zlib/pull/843">https://github.com/madler/zlib/pull/843</a>
<a href="https://github.com/smihica/pyminizip">https://github.com/smihica/pyminizip</a>
<a href="https://github.com/smihica/pyminizip/blob/master/zlib-1.2.11/contrib/minizip/zip.c">https://github.com/smihica/pyminizip/blob/master/zlib-1.2.11/contrib/minizip/zip.c</a>
<a href="https://lists.debian.org/debian-lts-announce/2023/11/msg00026.html">https://lists.debian.org/debian-lts-announce/2023/11/msg00026.html</a>
<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-45853">https://nvd.nist.gov/vuln/detail/CVE-2023-45853</a>
<a href="https://pypi.org/project/pyminizip/#history">https://pypi.org/project/pyminizip/#history</a>
<a href="https://security.gentoo.org/glsa/202401-18">https://security.gentoo.org/glsa/202401-18</a>
<a href="https://security.netapp.com/advisory/ntap-20231130-0009">https://security.netapp.com/advisory/ntap-20231130-0009</a>
<a href="https://security.netapp.com/advisory/ntap-20231130-0009/">https://security.netapp.com/advisory/ntap-20231130-0009/</a>
<a href="https://ubuntu.com/security/notices/USN-7107-1">https://ubuntu.com/security/notices/USN-7107-1</a>
<a href="https://www.cve.org/CVERecord?id=CVE-2023-45853">https://www.cve.org/CVERecord?id=CVE-2023-45853</a>
<a href="https://www.winimage.com/zLibDll/minizip.html">https://www.winimage.com/zLibDll/minizip.html</a>
</td>
</tr>
<tr><th colspan="6">No Misconfigurations found</th></tr>
</table>
</body>
</html>