ehz-mom.tencentcloudcr.com/ehzcloud/nginx:stable-perl (debian 11.9) - Trivy Report - 2025-08-01 11:06:46.463045811 +0800 CST m=+0.284513032
debian
Package
Vulnerability ID
Severity
Installed Version
Fixed Version
Links
bash
CVE-2022-3715
HIGH
5.1-2+deb11u1
https://access.redhat.com/errata/RHSA-2023:0340
https://access.redhat.com/security/cve/CVE-2022-3715
https://bugzilla.redhat.com/2126720
https://bugzilla.redhat.com/show_bug.cgi?id=2126720
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3715
https://errata.almalinux.org/9/ALSA-2023-0340.html
https://errata.rockylinux.org/RLSA-2023:0340
https://linux.oracle.com/cve/CVE-2022-3715.html
https://linux.oracle.com/errata/ELSA-2023-0340.html
https://lists.gnu.org/archive/html/bug-bash/2022-08/msg00147.html
https://nvd.nist.gov/vuln/detail/CVE-2022-3715
https://ubuntu.com/security/notices/USN-6697-1
https://www.cve.org/CVERecord?id=CVE-2022-3715
curl
CVE-2023-23914
CRITICAL
7.74.0-1.3+deb11u11
https://access.redhat.com/security/cve/CVE-2023-23914
https://curl.se/docs/CVE-2023-23914.html
https://hackerone.com/reports/1813864
https://nvd.nist.gov/vuln/detail/CVE-2023-23914
https://security.gentoo.org/glsa/202310-12
https://security.netapp.com/advisory/ntap-20230309-0006/
https://ubuntu.com/security/notices/USN-5891-1
https://www.cve.org/CVERecord?id=CVE-2023-23914
curl
CVE-2022-42916
HIGH
7.74.0-1.3+deb11u11
http://seclists.org/fulldisclosure/2023/Jan/19
http://seclists.org/fulldisclosure/2023/Jan/20
http://www.openwall.com/lists/oss-security/2022/12/21/1
https://access.redhat.com/security/cve/CVE-2022-42916
https://curl.se/docs/CVE-2022-42916.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37YEVVC6NAF6H7UHH6YAUY5QEVY6LIH2/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVU3IMZCKR4VE6KJ4GCWRL2ILLC6OV76/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q27V5YYMXUVI6PRZQVECON32XPVWTKDK/
https://nvd.nist.gov/vuln/detail/CVE-2022-42916
https://security.gentoo.org/glsa/202212-01
https://security.netapp.com/advisory/ntap-20221209-0010/
https://support.apple.com/kb/HT213604
https://support.apple.com/kb/HT213605
https://ubuntu.com/security/notices/USN-5702-1
https://www.cve.org/CVERecord?id=CVE-2022-42916
curl
CVE-2022-43551
HIGH
7.74.0-1.3+deb11u11
https://access.redhat.com/security/cve/CVE-2022-43551
https://curl.se/docs/CVE-2022-43551.html
https://hackerone.com/reports/1755083
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVWZW5CNSJ7UYAF2BGSYAWAEXDJYUBHA/
https://nvd.nist.gov/vuln/detail/CVE-2022-43551
https://security.gentoo.org/glsa/202310-12
https://security.netapp.com/advisory/ntap-20230427-0007/
https://ubuntu.com/security/notices/USN-5788-1
https://www.cve.org/CVERecord?id=CVE-2022-43551
curl
CVE-2024-2398
HIGH
7.74.0-1.3+deb11u11
7.74.0-1.3+deb11u12
http://seclists.org/fulldisclosure/2024/Jul/18
http://seclists.org/fulldisclosure/2024/Jul/19
http://seclists.org/fulldisclosure/2024/Jul/20
http://www.openwall.com/lists/oss-security/2024/03/27/3
https://access.redhat.com/errata/RHSA-2024:5529
https://access.redhat.com/security/cve/CVE-2024-2398
https://bugzilla.redhat.com/2270498
https://bugzilla.redhat.com/show_bug.cgi?id=2270498
https://curl.se/docs/CVE-2024-2398.html
https://curl.se/docs/CVE-2024-2398.json
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2398
https://errata.almalinux.org/9/ALSA-2024-5529.html
https://errata.rockylinux.org/RLSA-2024:5654
https://hackerone.com/reports/2402845
https://linux.oracle.com/cve/CVE-2024-2398.html
https://linux.oracle.com/errata/ELSA-2024-5654.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D44YLAUFJU6BZ4XFG2FYV7SBKXB5IZ6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMD6UYKCCRCYETWQZUJ65ZRFULT6SHLI/
https://nvd.nist.gov/vuln/detail/CVE-2024-2398
https://security.netapp.com/advisory/ntap-20240503-0009/
https://support.apple.com/kb/HT214118
https://support.apple.com/kb/HT214119
https://support.apple.com/kb/HT214120
https://ubuntu.com/security/notices/USN-6718-1
https://ubuntu.com/security/notices/USN-6718-2
https://ubuntu.com/security/notices/USN-6718-3
https://www.cve.org/CVERecord?id=CVE-2024-2398
e2fsprogs
CVE-2022-1304
HIGH
1.46.2-2
1.46.2-2+deb11u1
https://access.redhat.com/errata/RHSA-2022:8361
https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/2069726
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://errata.almalinux.org/9/ALSA-2022-8361.html
https://errata.rockylinux.org/RLSA-2022:8361
https://linux.oracle.com/cve/CVE-2022-1304.html
https://linux.oracle.com/errata/ELSA-2024-12731.html
https://lists.debian.org/debian-lts-announce/2024/10/msg00001.html
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://security.netapp.com/advisory/ntap-20241122-0010/
https://ubuntu.com/security/notices/USN-5464-1
https://www.cve.org/CVERecord?id=CVE-2022-1304
libc-bin
CVE-2024-2961
HIGH
2.31-13+deb11u8
2.31-13+deb11u9
http://www.openwall.com/lists/oss-security/2024/04/17/9
http://www.openwall.com/lists/oss-security/2024/04/18/4
http://www.openwall.com/lists/oss-security/2024/04/24/2
http://www.openwall.com/lists/oss-security/2024/05/27/1
http://www.openwall.com/lists/oss-security/2024/05/27/2
http://www.openwall.com/lists/oss-security/2024/05/27/3
http://www.openwall.com/lists/oss-security/2024/05/27/4
http://www.openwall.com/lists/oss-security/2024/05/27/5
http://www.openwall.com/lists/oss-security/2024/05/27/6
http://www.openwall.com/lists/oss-security/2024/07/22/5
https://access.redhat.com/errata/RHSA-2024:3339
https://access.redhat.com/security/cve/CVE-2024-2961
https://bugzilla.redhat.com/2273404
https://bugzilla.redhat.com/2277202
https://bugzilla.redhat.com/2277204
https://bugzilla.redhat.com/2277205
https://bugzilla.redhat.com/2277206
https://bugzilla.redhat.com/show_bug.cgi?id=2273404
https://bugzilla.redhat.com/show_bug.cgi?id=2277202
https://bugzilla.redhat.com/show_bug.cgi?id=2277204
https://bugzilla.redhat.com/show_bug.cgi?id=2277205
https://bugzilla.redhat.com/show_bug.cgi?id=2277206
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2961
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602
https://errata.almalinux.org/9/ALSA-2024-3339.html
https://errata.rockylinux.org/RLSA-2024:3339
https://linux.oracle.com/cve/CVE-2024-2961.html
https://linux.oracle.com/errata/ELSA-2024-3588.html
https://lists.debian.org/debian-lts-announce/2024/05/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z/
https://nvd.nist.gov/vuln/detail/CVE-2024-2961
https://security.netapp.com/advisory/ntap-20240531-0002/
https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0004
https://ubuntu.com/security/notices/USN-6737-1
https://ubuntu.com/security/notices/USN-6737-2
https://ubuntu.com/security/notices/USN-6762-1
https://www.ambionics.io/blog/iconv-cve-2024-2961-p1
https://www.ambionics.io/blog/iconv-cve-2024-2961-p2
https://www.ambionics.io/blog/iconv-cve-2024-2961-p3
https://www.cve.org/CVERecord?id=CVE-2024-2961
https://www.openwall.com/lists/oss-security/2024/04/17/9
libc-bin
CVE-2024-33599
HIGH
2.31-13+deb11u8
2.31-13+deb11u10
http://www.openwall.com/lists/oss-security/2024/07/22/5
https://access.redhat.com/errata/RHSA-2024:3339
https://access.redhat.com/security/cve/CVE-2024-33599
https://bugzilla.redhat.com/2273404
https://bugzilla.redhat.com/2277202
https://bugzilla.redhat.com/2277204
https://bugzilla.redhat.com/2277205
https://bugzilla.redhat.com/2277206
https://bugzilla.redhat.com/show_bug.cgi?id=2273404
https://bugzilla.redhat.com/show_bug.cgi?id=2277202
https://bugzilla.redhat.com/show_bug.cgi?id=2277204
https://bugzilla.redhat.com/show_bug.cgi?id=2277205
https://bugzilla.redhat.com/show_bug.cgi?id=2277206
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2961
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602
https://errata.almalinux.org/9/ALSA-2024-3339.html
https://errata.rockylinux.org/RLSA-2024:3339
https://inbox.sourceware.org/libc-alpha/cover.1713974801.git.fweimer@redhat.com/
https://linux.oracle.com/cve/CVE-2024-33599.html
https://linux.oracle.com/errata/ELSA-2024-3588.html
https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html
https://nvd.nist.gov/vuln/detail/CVE-2024-33599
https://security.netapp.com/advisory/ntap-20240524-0011/
https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0005
https://ubuntu.com/security/notices/USN-6804-1
https://www.cve.org/CVERecord?id=CVE-2024-33599
https://www.openwall.com/lists/oss-security/2024/04/24/2
libc-bin
CVE-2025-4802
HIGH
2.31-13+deb11u8
2.31-13+deb11u13
http://www.openwall.com/lists/oss-security/2025/05/16/7
http://www.openwall.com/lists/oss-security/2025/05/17/2
https://access.redhat.com/errata/RHSA-2025:8655
https://access.redhat.com/security/cve/CVE-2025-4802
https://bugzilla.redhat.com/2367468
https://errata.almalinux.org/9/ALSA-2025-8655.html
https://linux.oracle.com/cve/CVE-2025-4802.html
https://linux.oracle.com/errata/ELSA-2025-8686.html
https://nvd.nist.gov/vuln/detail/CVE-2025-4802
https://sourceware.org/bugzilla/show_bug.cgi?id=32976
https://sourceware.org/cgit/glibc/commit/?id=1e18586c5820e329f741d5c710275e165581380e
https://sourceware.org/cgit/glibc/commit/?id=5451fa962cd0a90a0e2ec1d8910a559ace02bba0
https://ubuntu.com/security/notices/USN-7541-1
https://www.cve.org/CVERecord?id=CVE-2025-4802
https://www.openwall.com/lists/oss-security/2025/05/16/7
https://www.openwall.com/lists/oss-security/2025/05/17/2
libc6
CVE-2024-2961
HIGH
2.31-13+deb11u8
2.31-13+deb11u9
http://www.openwall.com/lists/oss-security/2024/04/17/9
http://www.openwall.com/lists/oss-security/2024/04/18/4
http://www.openwall.com/lists/oss-security/2024/04/24/2
http://www.openwall.com/lists/oss-security/2024/05/27/1
http://www.openwall.com/lists/oss-security/2024/05/27/2
http://www.openwall.com/lists/oss-security/2024/05/27/3
http://www.openwall.com/lists/oss-security/2024/05/27/4
http://www.openwall.com/lists/oss-security/2024/05/27/5
http://www.openwall.com/lists/oss-security/2024/05/27/6
http://www.openwall.com/lists/oss-security/2024/07/22/5
https://access.redhat.com/errata/RHSA-2024:3339
https://access.redhat.com/security/cve/CVE-2024-2961
https://bugzilla.redhat.com/2273404
https://bugzilla.redhat.com/2277202
https://bugzilla.redhat.com/2277204
https://bugzilla.redhat.com/2277205
https://bugzilla.redhat.com/2277206
https://bugzilla.redhat.com/show_bug.cgi?id=2273404
https://bugzilla.redhat.com/show_bug.cgi?id=2277202
https://bugzilla.redhat.com/show_bug.cgi?id=2277204
https://bugzilla.redhat.com/show_bug.cgi?id=2277205
https://bugzilla.redhat.com/show_bug.cgi?id=2277206
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2961
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602
https://errata.almalinux.org/9/ALSA-2024-3339.html
https://errata.rockylinux.org/RLSA-2024:3339
https://linux.oracle.com/cve/CVE-2024-2961.html
https://linux.oracle.com/errata/ELSA-2024-3588.html
https://lists.debian.org/debian-lts-announce/2024/05/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z/
https://nvd.nist.gov/vuln/detail/CVE-2024-2961
https://security.netapp.com/advisory/ntap-20240531-0002/
https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0004
https://ubuntu.com/security/notices/USN-6737-1
https://ubuntu.com/security/notices/USN-6737-2
https://ubuntu.com/security/notices/USN-6762-1
https://www.ambionics.io/blog/iconv-cve-2024-2961-p1
https://www.ambionics.io/blog/iconv-cve-2024-2961-p2
https://www.ambionics.io/blog/iconv-cve-2024-2961-p3
https://www.cve.org/CVERecord?id=CVE-2024-2961
https://www.openwall.com/lists/oss-security/2024/04/17/9
libc6
CVE-2024-33599
HIGH
2.31-13+deb11u8
2.31-13+deb11u10
http://www.openwall.com/lists/oss-security/2024/07/22/5
https://access.redhat.com/errata/RHSA-2024:3339
https://access.redhat.com/security/cve/CVE-2024-33599
https://bugzilla.redhat.com/2273404
https://bugzilla.redhat.com/2277202
https://bugzilla.redhat.com/2277204
https://bugzilla.redhat.com/2277205
https://bugzilla.redhat.com/2277206
https://bugzilla.redhat.com/show_bug.cgi?id=2273404
https://bugzilla.redhat.com/show_bug.cgi?id=2277202
https://bugzilla.redhat.com/show_bug.cgi?id=2277204
https://bugzilla.redhat.com/show_bug.cgi?id=2277205
https://bugzilla.redhat.com/show_bug.cgi?id=2277206
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2961
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602
https://errata.almalinux.org/9/ALSA-2024-3339.html
https://errata.rockylinux.org/RLSA-2024:3339
https://inbox.sourceware.org/libc-alpha/cover.1713974801.git.fweimer@redhat.com/
https://linux.oracle.com/cve/CVE-2024-33599.html
https://linux.oracle.com/errata/ELSA-2024-3588.html
https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html
https://nvd.nist.gov/vuln/detail/CVE-2024-33599
https://security.netapp.com/advisory/ntap-20240524-0011/
https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0005
https://ubuntu.com/security/notices/USN-6804-1
https://www.cve.org/CVERecord?id=CVE-2024-33599
https://www.openwall.com/lists/oss-security/2024/04/24/2
libc6
CVE-2025-4802
HIGH
2.31-13+deb11u8
2.31-13+deb11u13
http://www.openwall.com/lists/oss-security/2025/05/16/7
http://www.openwall.com/lists/oss-security/2025/05/17/2
https://access.redhat.com/errata/RHSA-2025:8655
https://access.redhat.com/security/cve/CVE-2025-4802
https://bugzilla.redhat.com/2367468
https://errata.almalinux.org/9/ALSA-2025-8655.html
https://linux.oracle.com/cve/CVE-2025-4802.html
https://linux.oracle.com/errata/ELSA-2025-8686.html
https://nvd.nist.gov/vuln/detail/CVE-2025-4802
https://sourceware.org/bugzilla/show_bug.cgi?id=32976
https://sourceware.org/cgit/glibc/commit/?id=1e18586c5820e329f741d5c710275e165581380e
https://sourceware.org/cgit/glibc/commit/?id=5451fa962cd0a90a0e2ec1d8910a559ace02bba0
https://ubuntu.com/security/notices/USN-7541-1
https://www.cve.org/CVERecord?id=CVE-2025-4802
https://www.openwall.com/lists/oss-security/2025/05/16/7
https://www.openwall.com/lists/oss-security/2025/05/17/2
libcom-err2
CVE-2022-1304
HIGH
1.46.2-2
1.46.2-2+deb11u1
https://access.redhat.com/errata/RHSA-2022:8361
https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/2069726
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://errata.almalinux.org/9/ALSA-2022-8361.html
https://errata.rockylinux.org/RLSA-2022:8361
https://linux.oracle.com/cve/CVE-2022-1304.html
https://linux.oracle.com/errata/ELSA-2024-12731.html
https://lists.debian.org/debian-lts-announce/2024/10/msg00001.html
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://security.netapp.com/advisory/ntap-20241122-0010/
https://ubuntu.com/security/notices/USN-5464-1
https://www.cve.org/CVERecord?id=CVE-2022-1304
libcurl4
CVE-2023-23914
CRITICAL
7.74.0-1.3+deb11u11
https://access.redhat.com/security/cve/CVE-2023-23914
https://curl.se/docs/CVE-2023-23914.html
https://hackerone.com/reports/1813864
https://nvd.nist.gov/vuln/detail/CVE-2023-23914
https://security.gentoo.org/glsa/202310-12
https://security.netapp.com/advisory/ntap-20230309-0006/
https://ubuntu.com/security/notices/USN-5891-1
https://www.cve.org/CVERecord?id=CVE-2023-23914
libcurl4
CVE-2022-42916
HIGH
7.74.0-1.3+deb11u11
http://seclists.org/fulldisclosure/2023/Jan/19
http://seclists.org/fulldisclosure/2023/Jan/20
http://www.openwall.com/lists/oss-security/2022/12/21/1
https://access.redhat.com/security/cve/CVE-2022-42916
https://curl.se/docs/CVE-2022-42916.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37YEVVC6NAF6H7UHH6YAUY5QEVY6LIH2/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVU3IMZCKR4VE6KJ4GCWRL2ILLC6OV76/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q27V5YYMXUVI6PRZQVECON32XPVWTKDK/
https://nvd.nist.gov/vuln/detail/CVE-2022-42916
https://security.gentoo.org/glsa/202212-01
https://security.netapp.com/advisory/ntap-20221209-0010/
https://support.apple.com/kb/HT213604
https://support.apple.com/kb/HT213605
https://ubuntu.com/security/notices/USN-5702-1
https://www.cve.org/CVERecord?id=CVE-2022-42916
libcurl4
CVE-2022-43551
HIGH
7.74.0-1.3+deb11u11
https://access.redhat.com/security/cve/CVE-2022-43551
https://curl.se/docs/CVE-2022-43551.html
https://hackerone.com/reports/1755083
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVWZW5CNSJ7UYAF2BGSYAWAEXDJYUBHA/
https://nvd.nist.gov/vuln/detail/CVE-2022-43551
https://security.gentoo.org/glsa/202310-12
https://security.netapp.com/advisory/ntap-20230427-0007/
https://ubuntu.com/security/notices/USN-5788-1
https://www.cve.org/CVERecord?id=CVE-2022-43551
libcurl4
CVE-2024-2398
HIGH
7.74.0-1.3+deb11u11
7.74.0-1.3+deb11u12
http://seclists.org/fulldisclosure/2024/Jul/18
http://seclists.org/fulldisclosure/2024/Jul/19
http://seclists.org/fulldisclosure/2024/Jul/20
http://www.openwall.com/lists/oss-security/2024/03/27/3
https://access.redhat.com/errata/RHSA-2024:5529
https://access.redhat.com/security/cve/CVE-2024-2398
https://bugzilla.redhat.com/2270498
https://bugzilla.redhat.com/show_bug.cgi?id=2270498
https://curl.se/docs/CVE-2024-2398.html
https://curl.se/docs/CVE-2024-2398.json
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2398
https://errata.almalinux.org/9/ALSA-2024-5529.html
https://errata.rockylinux.org/RLSA-2024:5654
https://hackerone.com/reports/2402845
https://linux.oracle.com/cve/CVE-2024-2398.html
https://linux.oracle.com/errata/ELSA-2024-5654.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D44YLAUFJU6BZ4XFG2FYV7SBKXB5IZ6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMD6UYKCCRCYETWQZUJ65ZRFULT6SHLI/
https://nvd.nist.gov/vuln/detail/CVE-2024-2398
https://security.netapp.com/advisory/ntap-20240503-0009/
https://support.apple.com/kb/HT214118
https://support.apple.com/kb/HT214119
https://support.apple.com/kb/HT214120
https://ubuntu.com/security/notices/USN-6718-1
https://ubuntu.com/security/notices/USN-6718-2
https://ubuntu.com/security/notices/USN-6718-3
https://www.cve.org/CVERecord?id=CVE-2024-2398
libdb5.3
CVE-2019-8457
CRITICAL
5.3.28+dfsg1-0.8
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html
https://access.redhat.com/security/cve/CVE-2019-8457
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2019-8457.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/
https://nvd.nist.gov/vuln/detail/CVE-2019-8457
https://security.netapp.com/advisory/ntap-20190606-0002/
https://ubuntu.com/security/notices/USN-4004-1
https://ubuntu.com/security/notices/USN-4004-2
https://ubuntu.com/security/notices/USN-4019-1
https://ubuntu.com/security/notices/USN-4019-2
https://usn.ubuntu.com/4004-1/
https://usn.ubuntu.com/4004-2/
https://usn.ubuntu.com/4019-1/
https://usn.ubuntu.com/4019-2/
https://www.cve.org/CVERecord?id=CVE-2019-8457
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.sqlite.org/releaselog/3_28_0.html
https://www.sqlite.org/src/info/90acdbfce9c08858
libexpat1
CVE-2024-45491
CRITICAL
2.2.10-2+deb11u5
2.2.10-2+deb11u6
https://access.redhat.com/errata/RHSA-2024:6754
https://access.redhat.com/security/cve/CVE-2024-45491
https://bugzilla.redhat.com/2308615
https://bugzilla.redhat.com/2308616
https://bugzilla.redhat.com/2308617
https://bugzilla.redhat.com/show_bug.cgi?id=2308615
https://bugzilla.redhat.com/show_bug.cgi?id=2308616
https://bugzilla.redhat.com/show_bug.cgi?id=2308617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45492
https://errata.almalinux.org/9/ALSA-2024-6754.html
https://errata.rockylinux.org/RLSA-2024:6754
https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes
https://github.com/libexpat/libexpat/issues/888
https://github.com/libexpat/libexpat/pull/891
https://linux.oracle.com/cve/CVE-2024-45491.html
https://linux.oracle.com/errata/ELSA-2024-8859.html
https://nvd.nist.gov/vuln/detail/CVE-2024-45491
https://security.netapp.com/advisory/ntap-20241018-0003/
https://ubuntu.com/security/notices/USN-7000-1
https://ubuntu.com/security/notices/USN-7000-2
https://ubuntu.com/security/notices/USN-7001-1
https://ubuntu.com/security/notices/USN-7001-2
https://www.cve.org/CVERecord?id=CVE-2024-45491
libexpat1
CVE-2024-45492
CRITICAL
2.2.10-2+deb11u5
2.2.10-2+deb11u6
https://access.redhat.com/errata/RHSA-2024:6754
https://access.redhat.com/security/cve/CVE-2024-45492
https://bugzilla.redhat.com/2308615
https://bugzilla.redhat.com/2308616
https://bugzilla.redhat.com/2308617
https://bugzilla.redhat.com/show_bug.cgi?id=2308615
https://bugzilla.redhat.com/show_bug.cgi?id=2308616
https://bugzilla.redhat.com/show_bug.cgi?id=2308617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45492
https://errata.almalinux.org/9/ALSA-2024-6754.html
https://errata.rockylinux.org/RLSA-2024:6754
https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes
https://github.com/libexpat/libexpat/issues/889
https://github.com/libexpat/libexpat/pull/892
https://linux.oracle.com/cve/CVE-2024-45492.html
https://linux.oracle.com/errata/ELSA-2024-6989.html
https://nvd.nist.gov/vuln/detail/CVE-2024-45492
https://security.netapp.com/advisory/ntap-20241018-0005/
https://ubuntu.com/security/notices/USN-7000-1
https://ubuntu.com/security/notices/USN-7000-2
https://www.cve.org/CVERecord?id=CVE-2024-45492
libexpat1
CVE-2023-52425
HIGH
2.2.10-2+deb11u5
2.2.10-2+deb11u6
http://www.openwall.com/lists/oss-security/2024/03/20/5
https://access.redhat.com/errata/RHSA-2024:1530
https://access.redhat.com/security/cve/CVE-2023-52425
https://bugzilla.redhat.com/2262877
https://bugzilla.redhat.com/2268766
https://bugzilla.redhat.com/show_bug.cgi?id=2262877
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52425
https://errata.almalinux.org/9/ALSA-2024-1530.html
https://errata.rockylinux.org/RLSA-2024:1615
https://github.com/libexpat/libexpat/pull/789
https://linux.oracle.com/cve/CVE-2023-52425.html
https://linux.oracle.com/errata/ELSA-2024-4259.html
https://lists.debian.org/debian-lts-announce/2024/04/msg00006.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNRIHC7DVVRAIWFRGV23Y6UZXFBXSQDB/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNUBSGZFEZOBHJFTAD42SAN4ATW2VEMV/
https://nvd.nist.gov/vuln/detail/CVE-2023-52425
https://security.netapp.com/advisory/ntap-20240614-0003/
https://ubuntu.com/security/notices/USN-6694-1
https://www.cve.org/CVERecord?id=CVE-2023-52425
libexpat1
CVE-2024-45490
HIGH
2.2.10-2+deb11u5
2.2.10-2+deb11u6
https://access.redhat.com/errata/RHSA-2024:6754
https://access.redhat.com/security/cve/CVE-2024-45490
https://bugzilla.redhat.com/2308615
https://bugzilla.redhat.com/2308616
https://bugzilla.redhat.com/2308617
https://bugzilla.redhat.com/show_bug.cgi?id=2308615
https://bugzilla.redhat.com/show_bug.cgi?id=2308616
https://bugzilla.redhat.com/show_bug.cgi?id=2308617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45492
https://errata.almalinux.org/9/ALSA-2024-6754.html
https://errata.rockylinux.org/RLSA-2024:6754
https://github.com/libexpat/libexpat/blob/R_2_6_3/expat/Changes
https://github.com/libexpat/libexpat/issues/887
https://github.com/libexpat/libexpat/pull/890
https://linux.oracle.com/cve/CVE-2024-45490.html
https://linux.oracle.com/errata/ELSA-2024-6989.html
https://nvd.nist.gov/vuln/detail/CVE-2024-45490
https://security.netapp.com/advisory/ntap-20241018-0004/
https://ubuntu.com/security/notices/USN-7000-1
https://ubuntu.com/security/notices/USN-7000-2
https://ubuntu.com/security/notices/USN-7001-1
https://ubuntu.com/security/notices/USN-7001-2
https://www.cve.org/CVERecord?id=CVE-2024-45490
libexpat1
CVE-2024-8176
HIGH
2.2.10-2+deb11u5
http://www.openwall.com/lists/oss-security/2025/03/15/1
https://access.redhat.com/errata/RHSA-2025:3531
https://access.redhat.com/errata/RHSA-2025:3734
https://access.redhat.com/errata/RHSA-2025:3913
https://access.redhat.com/errata/RHSA-2025:4048
https://access.redhat.com/errata/RHSA-2025:4446
https://access.redhat.com/errata/RHSA-2025:4447
https://access.redhat.com/errata/RHSA-2025:4448
https://access.redhat.com/errata/RHSA-2025:4449
https://access.redhat.com/errata/RHSA-2025:7444
https://access.redhat.com/errata/RHSA-2025:7512
https://access.redhat.com/errata/RHSA-2025:8385
https://access.redhat.com/security/cve/CVE-2024-8176
https://blog.hartwork.org/posts/expat-2-7-0-released/
https://bugzilla.redhat.com/2310137
https://bugzilla.redhat.com/show_bug.cgi?id=2310137
https://bugzilla.suse.com/show_bug.cgi?id=1239618
https://errata.almalinux.org/9/ALSA-2025-7444.html
https://github.com/libexpat/libexpat/blob/R_2_7_0/expat/Changes#L40-L52
https://github.com/libexpat/libexpat/issues/893
https://gitlab.alpinelinux.org/alpine/aports/-/commit/d068c3ff36fc6f4789988a09c69b434db757db53
https://linux.oracle.com/cve/CVE-2024-8176.html
https://linux.oracle.com/errata/ELSA-2025-7512.html
https://nvd.nist.gov/vuln/detail/CVE-2024-8176
https://security-tracker.debian.org/tracker/CVE-2024-8176
https://security.netapp.com/advisory/ntap-20250328-0009/
https://ubuntu.com/security/CVE-2024-8176
https://ubuntu.com/security/notices/USN-7424-1
https://www.cve.org/CVERecord?id=CVE-2024-8176
https://www.kb.cert.org/vuls/id/760160
libext2fs2
CVE-2022-1304
HIGH
1.46.2-2
1.46.2-2+deb11u1
https://access.redhat.com/errata/RHSA-2022:8361
https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/2069726
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://errata.almalinux.org/9/ALSA-2022-8361.html
https://errata.rockylinux.org/RLSA-2022:8361
https://linux.oracle.com/cve/CVE-2022-1304.html
https://linux.oracle.com/errata/ELSA-2024-12731.html
https://lists.debian.org/debian-lts-announce/2024/10/msg00001.html
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://security.netapp.com/advisory/ntap-20241122-0010/
https://ubuntu.com/security/notices/USN-5464-1
https://www.cve.org/CVERecord?id=CVE-2022-1304
libfreetype6
CVE-2025-27363
HIGH
2.10.4+dfsg-1+deb11u1
2.10.4+dfsg-1+deb11u2
http://www.openwall.com/lists/oss-security/2025/03/13/1
http://www.openwall.com/lists/oss-security/2025/03/13/11
http://www.openwall.com/lists/oss-security/2025/03/13/12
http://www.openwall.com/lists/oss-security/2025/03/13/2
http://www.openwall.com/lists/oss-security/2025/03/13/3
http://www.openwall.com/lists/oss-security/2025/03/13/8
http://www.openwall.com/lists/oss-security/2025/03/14/1
http://www.openwall.com/lists/oss-security/2025/03/14/2
http://www.openwall.com/lists/oss-security/2025/03/14/3
http://www.openwall.com/lists/oss-security/2025/03/14/4
http://www.openwall.com/lists/oss-security/2025/05/06/3
https://access.redhat.com/errata/RHSA-2025:8292
https://access.redhat.com/security/cve/CVE-2025-27363
https://bugzilla.redhat.com/2351357
https://bugzilla.redhat.com/2357067
https://bugzilla.redhat.com/2357069
https://bugzilla.redhat.com/2357070
https://bugzilla.redhat.com/2359341
https://bugzilla.redhat.com/2359342
https://bugzilla.redhat.com/2359353
https://bugzilla.redhat.com/2359354
https://bugzilla.redhat.com/2359355
https://bugzilla.redhat.com/2359357
https://errata.almalinux.org/8/ALSA-2025-8292.html
https://linux.oracle.com/cve/CVE-2025-27363.html
https://linux.oracle.com/errata/ELSA-2025-8292.html
https://lists.debian.org/debian-lts-announce/2025/03/msg00030.html
https://nvd.nist.gov/vuln/detail/CVE-2025-27363
https://source.android.com/docs/security/bulletin/2025-05-01
https://ubuntu.com/security/notices/USN-7352-1
https://ubuntu.com/security/notices/USN-7352-2
https://www.cisa.gov/known-exploited-vulnerabilities-catalog
https://www.cve.org/CVERecord?id=CVE-2025-27363
https://www.facebook.com/security/advisories/cve-2025-27363
libgcrypt20
CVE-2021-33560
HIGH
1.8.7-6
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33560.json
https://access.redhat.com/security/cve/CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://errata.almalinux.org/8/ALSA-2021-4409.html
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2022-9263.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://nvd.nist.gov/vuln/detail/CVE-2021-33560
https://security.gentoo.org/glsa/202210-13
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.cve.org/CVERecord?id=CVE-2021-33560
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpujul2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libgnutls30
CVE-2024-0553
HIGH
3.7.1-5+deb11u4
3.7.1-5+deb11u5
http://www.openwall.com/lists/oss-security/2024/01/19/3
https://access.redhat.com/errata/RHSA-2024:0533
https://access.redhat.com/errata/RHSA-2024:0627
https://access.redhat.com/errata/RHSA-2024:0796
https://access.redhat.com/errata/RHSA-2024:1082
https://access.redhat.com/errata/RHSA-2024:1108
https://access.redhat.com/errata/RHSA-2024:1383
https://access.redhat.com/errata/RHSA-2024:2094
https://access.redhat.com/security/cve/CVE-2024-0553
https://bugzilla.redhat.com/2248445
https://bugzilla.redhat.com/2258412
https://bugzilla.redhat.com/2258544
https://bugzilla.redhat.com/show_bug.cgi?id=2258412
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0553
https://errata.almalinux.org/9/ALSA-2024-0533.html
https://errata.rockylinux.org/RLSA-2024:0627
https://gitlab.com/gnutls/gnutls/-/issues/1522
https://gnutls.org/security-new.html#GNUTLS-SA-2024-01-14
https://linux.oracle.com/cve/CVE-2024-0553.html
https://linux.oracle.com/errata/ELSA-2024-12336.html
https://lists.debian.org/debian-lts-announce/2024/02/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZEIOLORQ7N6WRPFXZSYDL2MC4LP7VFV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/
https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html
https://nvd.nist.gov/vuln/detail/CVE-2024-0553
https://security.netapp.com/advisory/ntap-20240202-0011/
https://ubuntu.com/security/notices/USN-6593-1
https://www.cve.org/CVERecord?id=CVE-2024-0553
libgnutls30
CVE-2024-0567
HIGH
3.7.1-5+deb11u4
3.7.1-5+deb11u5
http://www.openwall.com/lists/oss-security/2024/01/19/3
https://access.redhat.com/errata/RHSA-2024:0533
https://access.redhat.com/errata/RHSA-2024:1082
https://access.redhat.com/errata/RHSA-2024:1383
https://access.redhat.com/errata/RHSA-2024:2094
https://access.redhat.com/security/cve/CVE-2024-0567
https://bugzilla.redhat.com/2248445
https://bugzilla.redhat.com/2258412
https://bugzilla.redhat.com/2258544
https://bugzilla.redhat.com/show_bug.cgi?id=2258544
https://errata.almalinux.org/9/ALSA-2024-0533.html
https://gitlab.com/gnutls/gnutls/-/issues/1521
https://gnutls.org/security-new.html#GNUTLS-SA-2024-01-09
https://linux.oracle.com/cve/CVE-2024-0567.html
https://linux.oracle.com/errata/ELSA-2024-12336.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZEIOLORQ7N6WRPFXZSYDL2MC4LP7VFV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/
https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html
https://nvd.nist.gov/vuln/detail/CVE-2024-0567
https://security.netapp.com/advisory/ntap-20240202-0011/
https://ubuntu.com/security/notices/USN-6593-1
https://www.cve.org/CVERecord?id=CVE-2024-0567
libgssapi-krb5-2
CVE-2024-37371
CRITICAL
1.18.3-6+deb11u4
1.18.3-6+deb11u5
https://access.redhat.com/errata/RHSA-2025:1671
https://access.redhat.com/security/cve/CVE-2024-37371
https://bugzilla.redhat.com/2294581
https://bugzilla.redhat.com/2294676
https://bugzilla.redhat.com/2301888
https://bugzilla.redhat.com/2318857
https://bugzilla.redhat.com/2318858
https://bugzilla.redhat.com/2318870
https://bugzilla.redhat.com/2318873
https://bugzilla.redhat.com/2318874
https://bugzilla.redhat.com/2318876
https://bugzilla.redhat.com/2318882
https://bugzilla.redhat.com/2318883
https://bugzilla.redhat.com/2318884
https://bugzilla.redhat.com/2318885
https://bugzilla.redhat.com/2318886
https://bugzilla.redhat.com/2318897
https://bugzilla.redhat.com/2318900
https://bugzilla.redhat.com/2318905
https://bugzilla.redhat.com/2318914
https://bugzilla.redhat.com/2318922
https://bugzilla.redhat.com/2318923
https://bugzilla.redhat.com/2318925
https://bugzilla.redhat.com/2318926
https://bugzilla.redhat.com/2318927
https://bugzilla.redhat.com/2331191
https://bugzilla.redhat.com/2339218
https://bugzilla.redhat.com/2339220
https://bugzilla.redhat.com/2339221
https://bugzilla.redhat.com/2339226
https://bugzilla.redhat.com/2339231
https://bugzilla.redhat.com/2339236
https://bugzilla.redhat.com/2339238
https://bugzilla.redhat.com/2339243
https://bugzilla.redhat.com/2339247
https://bugzilla.redhat.com/2339252
https://bugzilla.redhat.com/2339259
https://bugzilla.redhat.com/2339266
https://bugzilla.redhat.com/2339270
https://bugzilla.redhat.com/2339271
https://bugzilla.redhat.com/2339275
https://bugzilla.redhat.com/2339277
https://bugzilla.redhat.com/2339281
https://bugzilla.redhat.com/2339284
https://bugzilla.redhat.com/2339291
https://bugzilla.redhat.com/2339293
https://bugzilla.redhat.com/2339295
https://bugzilla.redhat.com/2339299
https://bugzilla.redhat.com/2339300
https://bugzilla.redhat.com/2339304
https://bugzilla.redhat.com/2339305
https://bugzilla.redhat.com/show_bug.cgi?id=2294676
https://bugzilla.redhat.com/show_bug.cgi?id=2294677
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37371
https://errata.almalinux.org/9/ALSA-2025-1671.html
https://errata.rockylinux.org/RLSA-2024:5312
https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef
https://linux.oracle.com/cve/CVE-2024-37371.html
https://linux.oracle.com/errata/ELSA-2025-1673.html
https://nvd.nist.gov/vuln/detail/CVE-2024-37371
https://security.netapp.com/advisory/ntap-20241108-0009/
https://ubuntu.com/security/notices/USN-6947-1
https://web.mit.edu/kerberos/www/advisories/
https://web.mit.edu/kerberos/www/krb5-1.21/
https://www.cve.org/CVERecord?id=CVE-2024-37371
https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL
libgssapi-krb5-2
CVE-2024-37370
HIGH
1.18.3-6+deb11u4
1.18.3-6+deb11u5
https://access.redhat.com/errata/RHSA-2024:6166
https://access.redhat.com/security/cve/CVE-2024-37370
https://bugzilla.redhat.com/2294676
https://bugzilla.redhat.com/2294677
https://bugzilla.redhat.com/show_bug.cgi?id=2294676
https://bugzilla.redhat.com/show_bug.cgi?id=2294677
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37371
https://errata.almalinux.org/9/ALSA-2024-6166.html
https://errata.rockylinux.org/RLSA-2024:5312
https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef
https://linux.oracle.com/cve/CVE-2024-37370.html
https://linux.oracle.com/errata/ELSA-2024-6166.html
https://nvd.nist.gov/vuln/detail/CVE-2024-37370
https://security.netapp.com/advisory/ntap-20241108-0007/
https://ubuntu.com/security/notices/USN-6947-1
https://web.mit.edu/kerberos/www/advisories/
https://web.mit.edu/kerberos/www/krb5-1.21/
https://www.cve.org/CVERecord?id=CVE-2024-37370
libicu67
CVE-2025-5222
HIGH
67.1-7
67.1-7+deb11u1
https://access.redhat.com/errata/RHSA-2025:11888
https://access.redhat.com/errata/RHSA-2025:12083
https://access.redhat.com/errata/RHSA-2025:12331
https://access.redhat.com/errata/RHSA-2025:12332
https://access.redhat.com/errata/RHSA-2025:12333
https://access.redhat.com/security/cve/CVE-2025-5222
https://bugzilla.redhat.com/2368600
https://bugzilla.redhat.com/show_bug.cgi?id=2368600
https://errata.almalinux.org/9/ALSA-2025-12083.html
https://linux.oracle.com/cve/CVE-2025-5222.html
https://linux.oracle.com/errata/ELSA-2025-12083.html
https://lists.debian.org/debian-lts-announce/2025/06/msg00015.html
https://nvd.nist.gov/vuln/detail/CVE-2025-5222
https://www.cve.org/CVERecord?id=CVE-2025-5222
libk5crypto3
CVE-2024-37371
CRITICAL
1.18.3-6+deb11u4
1.18.3-6+deb11u5
https://access.redhat.com/errata/RHSA-2025:1671
https://access.redhat.com/security/cve/CVE-2024-37371
https://bugzilla.redhat.com/2294581
https://bugzilla.redhat.com/2294676
https://bugzilla.redhat.com/2301888
https://bugzilla.redhat.com/2318857
https://bugzilla.redhat.com/2318858
https://bugzilla.redhat.com/2318870
https://bugzilla.redhat.com/2318873
https://bugzilla.redhat.com/2318874
https://bugzilla.redhat.com/2318876
https://bugzilla.redhat.com/2318882
https://bugzilla.redhat.com/2318883
https://bugzilla.redhat.com/2318884
https://bugzilla.redhat.com/2318885
https://bugzilla.redhat.com/2318886
https://bugzilla.redhat.com/2318897
https://bugzilla.redhat.com/2318900
https://bugzilla.redhat.com/2318905
https://bugzilla.redhat.com/2318914
https://bugzilla.redhat.com/2318922
https://bugzilla.redhat.com/2318923
https://bugzilla.redhat.com/2318925
https://bugzilla.redhat.com/2318926
https://bugzilla.redhat.com/2318927
https://bugzilla.redhat.com/2331191
https://bugzilla.redhat.com/2339218
https://bugzilla.redhat.com/2339220
https://bugzilla.redhat.com/2339221
https://bugzilla.redhat.com/2339226
https://bugzilla.redhat.com/2339231
https://bugzilla.redhat.com/2339236
https://bugzilla.redhat.com/2339238
https://bugzilla.redhat.com/2339243
https://bugzilla.redhat.com/2339247
https://bugzilla.redhat.com/2339252
https://bugzilla.redhat.com/2339259
https://bugzilla.redhat.com/2339266
https://bugzilla.redhat.com/2339270
https://bugzilla.redhat.com/2339271
https://bugzilla.redhat.com/2339275
https://bugzilla.redhat.com/2339277
https://bugzilla.redhat.com/2339281
https://bugzilla.redhat.com/2339284
https://bugzilla.redhat.com/2339291
https://bugzilla.redhat.com/2339293
https://bugzilla.redhat.com/2339295
https://bugzilla.redhat.com/2339299
https://bugzilla.redhat.com/2339300
https://bugzilla.redhat.com/2339304
https://bugzilla.redhat.com/2339305
https://bugzilla.redhat.com/show_bug.cgi?id=2294676
https://bugzilla.redhat.com/show_bug.cgi?id=2294677
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37371
https://errata.almalinux.org/9/ALSA-2025-1671.html
https://errata.rockylinux.org/RLSA-2024:5312
https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef
https://linux.oracle.com/cve/CVE-2024-37371.html
https://linux.oracle.com/errata/ELSA-2025-1673.html
https://nvd.nist.gov/vuln/detail/CVE-2024-37371
https://security.netapp.com/advisory/ntap-20241108-0009/
https://ubuntu.com/security/notices/USN-6947-1
https://web.mit.edu/kerberos/www/advisories/
https://web.mit.edu/kerberos/www/krb5-1.21/
https://www.cve.org/CVERecord?id=CVE-2024-37371
https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL
libk5crypto3
CVE-2024-37370
HIGH
1.18.3-6+deb11u4
1.18.3-6+deb11u5
https://access.redhat.com/errata/RHSA-2024:6166
https://access.redhat.com/security/cve/CVE-2024-37370
https://bugzilla.redhat.com/2294676
https://bugzilla.redhat.com/2294677
https://bugzilla.redhat.com/show_bug.cgi?id=2294676
https://bugzilla.redhat.com/show_bug.cgi?id=2294677
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37371
https://errata.almalinux.org/9/ALSA-2024-6166.html
https://errata.rockylinux.org/RLSA-2024:5312
https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef
https://linux.oracle.com/cve/CVE-2024-37370.html
https://linux.oracle.com/errata/ELSA-2024-6166.html
https://nvd.nist.gov/vuln/detail/CVE-2024-37370
https://security.netapp.com/advisory/ntap-20241108-0007/
https://ubuntu.com/security/notices/USN-6947-1
https://web.mit.edu/kerberos/www/advisories/
https://web.mit.edu/kerberos/www/krb5-1.21/
https://www.cve.org/CVERecord?id=CVE-2024-37370
libkrb5-3
CVE-2024-37371
CRITICAL
1.18.3-6+deb11u4
1.18.3-6+deb11u5
https://access.redhat.com/errata/RHSA-2025:1671
https://access.redhat.com/security/cve/CVE-2024-37371
https://bugzilla.redhat.com/2294581
https://bugzilla.redhat.com/2294676
https://bugzilla.redhat.com/2301888
https://bugzilla.redhat.com/2318857
https://bugzilla.redhat.com/2318858
https://bugzilla.redhat.com/2318870
https://bugzilla.redhat.com/2318873
https://bugzilla.redhat.com/2318874
https://bugzilla.redhat.com/2318876
https://bugzilla.redhat.com/2318882
https://bugzilla.redhat.com/2318883
https://bugzilla.redhat.com/2318884
https://bugzilla.redhat.com/2318885
https://bugzilla.redhat.com/2318886
https://bugzilla.redhat.com/2318897
https://bugzilla.redhat.com/2318900
https://bugzilla.redhat.com/2318905
https://bugzilla.redhat.com/2318914
https://bugzilla.redhat.com/2318922
https://bugzilla.redhat.com/2318923
https://bugzilla.redhat.com/2318925
https://bugzilla.redhat.com/2318926
https://bugzilla.redhat.com/2318927
https://bugzilla.redhat.com/2331191
https://bugzilla.redhat.com/2339218
https://bugzilla.redhat.com/2339220
https://bugzilla.redhat.com/2339221
https://bugzilla.redhat.com/2339226
https://bugzilla.redhat.com/2339231
https://bugzilla.redhat.com/2339236
https://bugzilla.redhat.com/2339238
https://bugzilla.redhat.com/2339243
https://bugzilla.redhat.com/2339247
https://bugzilla.redhat.com/2339252
https://bugzilla.redhat.com/2339259
https://bugzilla.redhat.com/2339266
https://bugzilla.redhat.com/2339270
https://bugzilla.redhat.com/2339271
https://bugzilla.redhat.com/2339275
https://bugzilla.redhat.com/2339277
https://bugzilla.redhat.com/2339281
https://bugzilla.redhat.com/2339284
https://bugzilla.redhat.com/2339291
https://bugzilla.redhat.com/2339293
https://bugzilla.redhat.com/2339295
https://bugzilla.redhat.com/2339299
https://bugzilla.redhat.com/2339300
https://bugzilla.redhat.com/2339304
https://bugzilla.redhat.com/2339305
https://bugzilla.redhat.com/show_bug.cgi?id=2294676
https://bugzilla.redhat.com/show_bug.cgi?id=2294677
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37371
https://errata.almalinux.org/9/ALSA-2025-1671.html
https://errata.rockylinux.org/RLSA-2024:5312
https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef
https://linux.oracle.com/cve/CVE-2024-37371.html
https://linux.oracle.com/errata/ELSA-2025-1673.html
https://nvd.nist.gov/vuln/detail/CVE-2024-37371
https://security.netapp.com/advisory/ntap-20241108-0009/
https://ubuntu.com/security/notices/USN-6947-1
https://web.mit.edu/kerberos/www/advisories/
https://web.mit.edu/kerberos/www/krb5-1.21/
https://www.cve.org/CVERecord?id=CVE-2024-37371
https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL
libkrb5-3
CVE-2024-37370
HIGH
1.18.3-6+deb11u4
1.18.3-6+deb11u5
https://access.redhat.com/errata/RHSA-2024:6166
https://access.redhat.com/security/cve/CVE-2024-37370
https://bugzilla.redhat.com/2294676
https://bugzilla.redhat.com/2294677
https://bugzilla.redhat.com/show_bug.cgi?id=2294676
https://bugzilla.redhat.com/show_bug.cgi?id=2294677
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37371
https://errata.almalinux.org/9/ALSA-2024-6166.html
https://errata.rockylinux.org/RLSA-2024:5312
https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef
https://linux.oracle.com/cve/CVE-2024-37370.html
https://linux.oracle.com/errata/ELSA-2024-6166.html
https://nvd.nist.gov/vuln/detail/CVE-2024-37370
https://security.netapp.com/advisory/ntap-20241108-0007/
https://ubuntu.com/security/notices/USN-6947-1
https://web.mit.edu/kerberos/www/advisories/
https://web.mit.edu/kerberos/www/krb5-1.21/
https://www.cve.org/CVERecord?id=CVE-2024-37370
libkrb5support0
CVE-2024-37371
CRITICAL
1.18.3-6+deb11u4
1.18.3-6+deb11u5
https://access.redhat.com/errata/RHSA-2025:1671
https://access.redhat.com/security/cve/CVE-2024-37371
https://bugzilla.redhat.com/2294581
https://bugzilla.redhat.com/2294676
https://bugzilla.redhat.com/2301888
https://bugzilla.redhat.com/2318857
https://bugzilla.redhat.com/2318858
https://bugzilla.redhat.com/2318870
https://bugzilla.redhat.com/2318873
https://bugzilla.redhat.com/2318874
https://bugzilla.redhat.com/2318876
https://bugzilla.redhat.com/2318882
https://bugzilla.redhat.com/2318883
https://bugzilla.redhat.com/2318884
https://bugzilla.redhat.com/2318885
https://bugzilla.redhat.com/2318886
https://bugzilla.redhat.com/2318897
https://bugzilla.redhat.com/2318900
https://bugzilla.redhat.com/2318905
https://bugzilla.redhat.com/2318914
https://bugzilla.redhat.com/2318922
https://bugzilla.redhat.com/2318923
https://bugzilla.redhat.com/2318925
https://bugzilla.redhat.com/2318926
https://bugzilla.redhat.com/2318927
https://bugzilla.redhat.com/2331191
https://bugzilla.redhat.com/2339218
https://bugzilla.redhat.com/2339220
https://bugzilla.redhat.com/2339221
https://bugzilla.redhat.com/2339226
https://bugzilla.redhat.com/2339231
https://bugzilla.redhat.com/2339236
https://bugzilla.redhat.com/2339238
https://bugzilla.redhat.com/2339243
https://bugzilla.redhat.com/2339247
https://bugzilla.redhat.com/2339252
https://bugzilla.redhat.com/2339259
https://bugzilla.redhat.com/2339266
https://bugzilla.redhat.com/2339270
https://bugzilla.redhat.com/2339271
https://bugzilla.redhat.com/2339275
https://bugzilla.redhat.com/2339277
https://bugzilla.redhat.com/2339281
https://bugzilla.redhat.com/2339284
https://bugzilla.redhat.com/2339291
https://bugzilla.redhat.com/2339293
https://bugzilla.redhat.com/2339295
https://bugzilla.redhat.com/2339299
https://bugzilla.redhat.com/2339300
https://bugzilla.redhat.com/2339304
https://bugzilla.redhat.com/2339305
https://bugzilla.redhat.com/show_bug.cgi?id=2294676
https://bugzilla.redhat.com/show_bug.cgi?id=2294677
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37371
https://errata.almalinux.org/9/ALSA-2025-1671.html
https://errata.rockylinux.org/RLSA-2024:5312
https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef
https://linux.oracle.com/cve/CVE-2024-37371.html
https://linux.oracle.com/errata/ELSA-2025-1673.html
https://nvd.nist.gov/vuln/detail/CVE-2024-37371
https://security.netapp.com/advisory/ntap-20241108-0009/
https://ubuntu.com/security/notices/USN-6947-1
https://web.mit.edu/kerberos/www/advisories/
https://web.mit.edu/kerberos/www/krb5-1.21/
https://www.cve.org/CVERecord?id=CVE-2024-37371
https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL
libkrb5support0
CVE-2024-37370
HIGH
1.18.3-6+deb11u4
1.18.3-6+deb11u5
https://access.redhat.com/errata/RHSA-2024:6166
https://access.redhat.com/security/cve/CVE-2024-37370
https://bugzilla.redhat.com/2294676
https://bugzilla.redhat.com/2294677
https://bugzilla.redhat.com/show_bug.cgi?id=2294676
https://bugzilla.redhat.com/show_bug.cgi?id=2294677
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37371
https://errata.almalinux.org/9/ALSA-2024-6166.html
https://errata.rockylinux.org/RLSA-2024:5312
https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef
https://linux.oracle.com/cve/CVE-2024-37370.html
https://linux.oracle.com/errata/ELSA-2024-6166.html
https://nvd.nist.gov/vuln/detail/CVE-2024-37370
https://security.netapp.com/advisory/ntap-20241108-0007/
https://ubuntu.com/security/notices/USN-6947-1
https://web.mit.edu/kerberos/www/advisories/
https://web.mit.edu/kerberos/www/krb5-1.21/
https://www.cve.org/CVERecord?id=CVE-2024-37370
libldap-2.4-2
CVE-2023-2953
HIGH
2.4.57+dfsg-3+deb11u1
http://seclists.org/fulldisclosure/2023/Jul/47
http://seclists.org/fulldisclosure/2023/Jul/48
http://seclists.org/fulldisclosure/2023/Jul/52
https://access.redhat.com/errata/RHSA-2024:4264
https://access.redhat.com/security/cve/CVE-2023-2953
https://bugs.openldap.org/show_bug.cgi?id=9904
https://bugzilla.redhat.com/2210651
https://bugzilla.redhat.com/show_bug.cgi?id=2210651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2953
https://errata.almalinux.org/8/ALSA-2024-4264.html
https://errata.rockylinux.org/RLSA-2024:4264
https://linux.oracle.com/cve/CVE-2023-2953.html
https://linux.oracle.com/errata/ELSA-2024-4264.html
https://nvd.nist.gov/vuln/detail/CVE-2023-2953
https://security.netapp.com/advisory/ntap-20230703-0005/
https://support.apple.com/kb/HT213843
https://support.apple.com/kb/HT213844
https://support.apple.com/kb/HT213845
https://ubuntu.com/security/notices/USN-6197-1
https://ubuntu.com/security/notices/USN-6616-1
https://www.cve.org/CVERecord?id=CVE-2023-2953
libpam-modules
CVE-2025-6020
HIGH
1.4.0-9+deb11u1
http://www.openwall.com/lists/oss-security/2025/06/17/1
https://access.redhat.com/errata/RHSA-2025:10024
https://access.redhat.com/errata/RHSA-2025:10027
https://access.redhat.com/errata/RHSA-2025:10180
https://access.redhat.com/errata/RHSA-2025:10354
https://access.redhat.com/errata/RHSA-2025:10357
https://access.redhat.com/errata/RHSA-2025:10358
https://access.redhat.com/errata/RHSA-2025:10359
https://access.redhat.com/errata/RHSA-2025:10361
https://access.redhat.com/errata/RHSA-2025:10362
https://access.redhat.com/errata/RHSA-2025:10735
https://access.redhat.com/errata/RHSA-2025:10823
https://access.redhat.com/errata/RHSA-2025:11386
https://access.redhat.com/errata/RHSA-2025:11487
https://access.redhat.com/errata/RHSA-2025:9526
https://access.redhat.com/security/cve/CVE-2025-6020
https://bugzilla.redhat.com/2372512
https://bugzilla.redhat.com/show_bug.cgi?id=2372512
https://errata.almalinux.org/9/ALSA-2025-9526.html
https://linux.oracle.com/cve/CVE-2025-6020.html
https://linux.oracle.com/errata/ELSA-2025-9526.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6020
https://ubuntu.com/security/notices/USN-7580-1
https://www.cve.org/CVERecord?id=CVE-2025-6020
https://www.openwall.com/lists/oss-security/2025/06/17/1
libpam-modules-bin
CVE-2025-6020
HIGH
1.4.0-9+deb11u1
http://www.openwall.com/lists/oss-security/2025/06/17/1
https://access.redhat.com/errata/RHSA-2025:10024
https://access.redhat.com/errata/RHSA-2025:10027
https://access.redhat.com/errata/RHSA-2025:10180
https://access.redhat.com/errata/RHSA-2025:10354
https://access.redhat.com/errata/RHSA-2025:10357
https://access.redhat.com/errata/RHSA-2025:10358
https://access.redhat.com/errata/RHSA-2025:10359
https://access.redhat.com/errata/RHSA-2025:10361
https://access.redhat.com/errata/RHSA-2025:10362
https://access.redhat.com/errata/RHSA-2025:10735
https://access.redhat.com/errata/RHSA-2025:10823
https://access.redhat.com/errata/RHSA-2025:11386
https://access.redhat.com/errata/RHSA-2025:11487
https://access.redhat.com/errata/RHSA-2025:9526
https://access.redhat.com/security/cve/CVE-2025-6020
https://bugzilla.redhat.com/2372512
https://bugzilla.redhat.com/show_bug.cgi?id=2372512
https://errata.almalinux.org/9/ALSA-2025-9526.html
https://linux.oracle.com/cve/CVE-2025-6020.html
https://linux.oracle.com/errata/ELSA-2025-9526.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6020
https://ubuntu.com/security/notices/USN-7580-1
https://www.cve.org/CVERecord?id=CVE-2025-6020
https://www.openwall.com/lists/oss-security/2025/06/17/1
libpam-runtime
CVE-2025-6020
HIGH
1.4.0-9+deb11u1
http://www.openwall.com/lists/oss-security/2025/06/17/1
https://access.redhat.com/errata/RHSA-2025:10024
https://access.redhat.com/errata/RHSA-2025:10027
https://access.redhat.com/errata/RHSA-2025:10180
https://access.redhat.com/errata/RHSA-2025:10354
https://access.redhat.com/errata/RHSA-2025:10357
https://access.redhat.com/errata/RHSA-2025:10358
https://access.redhat.com/errata/RHSA-2025:10359
https://access.redhat.com/errata/RHSA-2025:10361
https://access.redhat.com/errata/RHSA-2025:10362
https://access.redhat.com/errata/RHSA-2025:10735
https://access.redhat.com/errata/RHSA-2025:10823
https://access.redhat.com/errata/RHSA-2025:11386
https://access.redhat.com/errata/RHSA-2025:11487
https://access.redhat.com/errata/RHSA-2025:9526
https://access.redhat.com/security/cve/CVE-2025-6020
https://bugzilla.redhat.com/2372512
https://bugzilla.redhat.com/show_bug.cgi?id=2372512
https://errata.almalinux.org/9/ALSA-2025-9526.html
https://linux.oracle.com/cve/CVE-2025-6020.html
https://linux.oracle.com/errata/ELSA-2025-9526.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6020
https://ubuntu.com/security/notices/USN-7580-1
https://www.cve.org/CVERecord?id=CVE-2025-6020
https://www.openwall.com/lists/oss-security/2025/06/17/1
libpam0g
CVE-2025-6020
HIGH
1.4.0-9+deb11u1
http://www.openwall.com/lists/oss-security/2025/06/17/1
https://access.redhat.com/errata/RHSA-2025:10024
https://access.redhat.com/errata/RHSA-2025:10027
https://access.redhat.com/errata/RHSA-2025:10180
https://access.redhat.com/errata/RHSA-2025:10354
https://access.redhat.com/errata/RHSA-2025:10357
https://access.redhat.com/errata/RHSA-2025:10358
https://access.redhat.com/errata/RHSA-2025:10359
https://access.redhat.com/errata/RHSA-2025:10361
https://access.redhat.com/errata/RHSA-2025:10362
https://access.redhat.com/errata/RHSA-2025:10735
https://access.redhat.com/errata/RHSA-2025:10823
https://access.redhat.com/errata/RHSA-2025:11386
https://access.redhat.com/errata/RHSA-2025:11487
https://access.redhat.com/errata/RHSA-2025:9526
https://access.redhat.com/security/cve/CVE-2025-6020
https://bugzilla.redhat.com/2372512
https://bugzilla.redhat.com/show_bug.cgi?id=2372512
https://errata.almalinux.org/9/ALSA-2025-9526.html
https://linux.oracle.com/cve/CVE-2025-6020.html
https://linux.oracle.com/errata/ELSA-2025-9526.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6020
https://ubuntu.com/security/notices/USN-7580-1
https://www.cve.org/CVERecord?id=CVE-2025-6020
https://www.openwall.com/lists/oss-security/2025/06/17/1
libperl5.32
CVE-2020-16156
HIGH
5.32.1-4+deb11u3
5.32.1-4+deb11u4
http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/errata/RHSA-2025:8432
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://bugzilla.redhat.com/2035273
https://errata.almalinux.org/8/ALSA-2025-8432.html
https://linux.oracle.com/cve/CVE-2020-16156.html
https://linux.oracle.com/errata/ELSA-2025-8432.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
https://nvd.nist.gov/vuln/detail/CVE-2020-16156
https://ubuntu.com/security/notices/USN-5689-1
https://ubuntu.com/security/notices/USN-5689-2
https://www.cve.org/CVERecord?id=CVE-2020-16156
libperl5.32
CVE-2023-31484
HIGH
5.32.1-4+deb11u3
5.32.1-4+deb11u4
http://www.openwall.com/lists/oss-security/2023/04/29/1
http://www.openwall.com/lists/oss-security/2023/05/03/3
http://www.openwall.com/lists/oss-security/2023/05/03/5
http://www.openwall.com/lists/oss-security/2023/05/07/2
https://access.redhat.com/errata/RHSA-2023:6539
https://access.redhat.com/security/cve/CVE-2023-31484
https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/
https://bugzilla.redhat.com/2218667
https://bugzilla.redhat.com/show_bug.cgi?id=2218667
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31484
https://errata.almalinux.org/9/ALSA-2023-6539.html
https://errata.rockylinux.org/RLSA-2023:6539
https://github.com/andk/cpanpm/commit/9c98370287f4e709924aee7c58ef21c85289a7f0 (2.35-TRIAL)
https://github.com/andk/cpanpm/pull/175
https://linux.oracle.com/cve/CVE-2023-31484.html
https://linux.oracle.com/errata/ELSA-2024-3094.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BM6UW55CNFUTNGD5ZRKGUKKKFDJGMFHL/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LEGCEOKFJVBJ2QQ6S2H4NAEWTUERC7SB/
https://metacpan.org/dist/CPAN/changes
https://nvd.nist.gov/vuln/detail/CVE-2023-31484
https://security.netapp.com/advisory/ntap-20240621-0007/
https://ubuntu.com/security/notices/USN-6112-1
https://ubuntu.com/security/notices/USN-6112-2
https://www.cve.org/CVERecord?id=CVE-2023-31484
https://www.openwall.com/lists/oss-security/2023/04/18/14
libss2
CVE-2022-1304
HIGH
1.46.2-2
1.46.2-2+deb11u1
https://access.redhat.com/errata/RHSA-2022:8361
https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/2069726
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://errata.almalinux.org/9/ALSA-2022-8361.html
https://errata.rockylinux.org/RLSA-2022:8361
https://linux.oracle.com/cve/CVE-2022-1304.html
https://linux.oracle.com/errata/ELSA-2024-12731.html
https://lists.debian.org/debian-lts-announce/2024/10/msg00001.html
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://security.netapp.com/advisory/ntap-20241122-0010/
https://ubuntu.com/security/notices/USN-5464-1
https://www.cve.org/CVERecord?id=CVE-2022-1304
libssh2-1
CVE-2020-22218
HIGH
1.9.0-2
1.9.0-2+deb11u1
https://access.redhat.com/security/cve/CVE-2020-22218
https://github.com/libssh2/libssh2/pull/476
https://linux.oracle.com/cve/CVE-2020-22218.html
https://linux.oracle.com/errata/ELSA-2023-5615.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2020-22218
https://security.netapp.com/advisory/ntap-20231006-0002/
https://ubuntu.com/security/notices/USN-6371-1
https://www.cve.org/CVERecord?id=CVE-2020-22218
libsystemd0
CVE-2023-50387
HIGH
247.3-7+deb11u4
247.3-7+deb11u6
http://www.openwall.com/lists/oss-security/2024/02/16/2
http://www.openwall.com/lists/oss-security/2024/02/16/3
https://access.redhat.com/errata/RHSA-2024:2551
https://access.redhat.com/security/cve/CVE-2023-50387
https://blog.powerdns.com/2024/02/13/powerdns-recursor-4-8-6-4-9-3-5-0-2-released
https://bugzilla.redhat.com/2263896
https://bugzilla.redhat.com/2263897
https://bugzilla.redhat.com/2263909
https://bugzilla.redhat.com/2263911
https://bugzilla.redhat.com/2263914
https://bugzilla.redhat.com/2263917
https://bugzilla.redhat.com/show_bug.cgi?id=2263896
https://bugzilla.redhat.com/show_bug.cgi?id=2263897
https://bugzilla.redhat.com/show_bug.cgi?id=2263909
https://bugzilla.redhat.com/show_bug.cgi?id=2263911
https://bugzilla.redhat.com/show_bug.cgi?id=2263914
https://bugzilla.redhat.com/show_bug.cgi?id=2263917
https://bugzilla.suse.com/show_bug.cgi?id=1219823
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6516
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html
https://errata.almalinux.org/9/ALSA-2024-2551.html
https://errata.rockylinux.org/RLSA-2024:2551
https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1
https://kb.isc.org/docs/cve-2023-50387
https://linux.oracle.com/cve/CVE-2023-50387.html
https://linux.oracle.com/errata/ELSA-2024-3741.html
https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html
https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/
https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-50387
https://news.ycombinator.com/item?id=39367411
https://news.ycombinator.com/item?id=39372384
https://nlnetlabs.nl/downloads/unbound/CVE-2023-50387_CVE-2023-50868.txt
https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/
https://nvd.nist.gov/vuln/detail/CVE-2023-50387
https://security.netapp.com/advisory/ntap-20240307-0007/
https://ubuntu.com/security/notices/USN-6633-1
https://ubuntu.com/security/notices/USN-6642-1
https://ubuntu.com/security/notices/USN-6657-1
https://ubuntu.com/security/notices/USN-6657-2
https://ubuntu.com/security/notices/USN-6665-1
https://ubuntu.com/security/notices/USN-6723-1
https://www.athene-center.de/aktuelles/key-trap
https://www.athene-center.de/fileadmin/content/PDF/Technical_Report_KeyTrap.pdf
https://www.cve.org/CVERecord?id=CVE-2023-50387
https://www.isc.org/blogs/2024-bind-security-release/
https://www.knot-resolver.cz/2024-02-13-knot-resolver-5.7.1.html
https://www.securityweek.com/keytrap-dns-attack-could-disable-large-parts-of-internet-researchers/
https://www.theregister.com/2024/02/13/dnssec_vulnerability_internet/
libsystemd0
CVE-2023-50868
HIGH
247.3-7+deb11u4
247.3-7+deb11u6
http://www.openwall.com/lists/oss-security/2024/02/16/2
http://www.openwall.com/lists/oss-security/2024/02/16/3
https://access.redhat.com/errata/RHSA-2024:2551
https://access.redhat.com/security/cve/CVE-2023-50868
https://blog.powerdns.com/2024/02/13/powerdns-recursor-4-8-6-4-9-3-5-0-2-released
https://bugzilla.redhat.com/2263896
https://bugzilla.redhat.com/2263897
https://bugzilla.redhat.com/2263909
https://bugzilla.redhat.com/2263911
https://bugzilla.redhat.com/2263914
https://bugzilla.redhat.com/2263917
https://bugzilla.redhat.com/show_bug.cgi?id=2263896
https://bugzilla.redhat.com/show_bug.cgi?id=2263897
https://bugzilla.redhat.com/show_bug.cgi?id=2263909
https://bugzilla.redhat.com/show_bug.cgi?id=2263911
https://bugzilla.redhat.com/show_bug.cgi?id=2263914
https://bugzilla.redhat.com/show_bug.cgi?id=2263917
https://bugzilla.suse.com/show_bug.cgi?id=1219826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6516
https://datatracker.ietf.org/doc/html/rfc5155
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html
https://errata.almalinux.org/9/ALSA-2024-2551.html
https://errata.rockylinux.org/RLSA-2024:2551
https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1
https://kb.isc.org/docs/cve-2023-50868
https://linux.oracle.com/cve/CVE-2023-50868.html
https://linux.oracle.com/errata/ELSA-2024-3741.html
https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html
https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/
https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html
https://nlnetlabs.nl/downloads/unbound/CVE-2023-50387_CVE-2023-50868.txt
https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/
https://nvd.nist.gov/vuln/detail/CVE-2023-50868
https://security.netapp.com/advisory/ntap-20240307-0008/
https://ubuntu.com/security/notices/USN-6633-1
https://ubuntu.com/security/notices/USN-6642-1
https://ubuntu.com/security/notices/USN-6657-1
https://ubuntu.com/security/notices/USN-6657-2
https://ubuntu.com/security/notices/USN-6665-1
https://ubuntu.com/security/notices/USN-6723-1
https://www.cve.org/CVERecord?id=CVE-2023-50868
https://www.isc.org/blogs/2024-bind-security-release/
https://www.knot-resolver.cz/2024-02-13-knot-resolver-5.7.1.html
libtiff5
CVE-2023-52355
HIGH
4.2.0-1+deb11u5
https://access.redhat.com/security/cve/CVE-2023-52355
https://bugzilla.redhat.com/show_bug.cgi?id=2251326
https://gitlab.com/libtiff/libtiff/-/issues/621
https://nvd.nist.gov/vuln/detail/CVE-2023-52355
https://www.cve.org/CVERecord?id=CVE-2023-52355
libtiff5
CVE-2023-52356
HIGH
4.2.0-1+deb11u5
4.2.0-1+deb11u6
http://seclists.org/fulldisclosure/2024/Jul/16
http://seclists.org/fulldisclosure/2024/Jul/17
http://seclists.org/fulldisclosure/2024/Jul/18
http://seclists.org/fulldisclosure/2024/Jul/19
http://seclists.org/fulldisclosure/2024/Jul/20
http://seclists.org/fulldisclosure/2024/Jul/21
http://seclists.org/fulldisclosure/2024/Jul/22
http://seclists.org/fulldisclosure/2024/Jul/23
https://access.redhat.com/errata/RHSA-2024:5079
https://access.redhat.com/security/cve/CVE-2023-52356
https://bugzilla.redhat.com/1614051
https://bugzilla.redhat.com/2218744
https://bugzilla.redhat.com/2240995
https://bugzilla.redhat.com/2251344
https://bugzilla.redhat.com/show_bug.cgi?id=1614051
https://bugzilla.redhat.com/show_bug.cgi?id=2218744
https://bugzilla.redhat.com/show_bug.cgi?id=2240995
https://bugzilla.redhat.com/show_bug.cgi?id=2251344
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15209
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25433
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52356
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6228
https://errata.almalinux.org/8/ALSA-2024-5079.html
https://errata.rockylinux.org/RLSA-2024:5079
https://gitlab.com/libtiff/libtiff/-/issues/622
https://gitlab.com/libtiff/libtiff/-/merge_requests/546
https://linux.oracle.com/cve/CVE-2023-52356.html
https://linux.oracle.com/errata/ELSA-2024-5079.html
https://lists.debian.org/debian-lts-announce/2024/03/msg00011.html
https://nvd.nist.gov/vuln/detail/CVE-2023-52356
https://support.apple.com/kb/HT214116
https://support.apple.com/kb/HT214117
https://support.apple.com/kb/HT214118
https://support.apple.com/kb/HT214119
https://support.apple.com/kb/HT214120
https://support.apple.com/kb/HT214122
https://support.apple.com/kb/HT214123
https://support.apple.com/kb/HT214124
https://ubuntu.com/security/notices/USN-6644-1
https://ubuntu.com/security/notices/USN-6644-2
https://www.cve.org/CVERecord?id=CVE-2023-52356
libtiff5
CVE-2024-7006
HIGH
4.2.0-1+deb11u5
4.2.0-1+deb11u6
https://access.redhat.com/errata/RHSA-2024:6360
https://access.redhat.com/errata/RHSA-2024:8833
https://access.redhat.com/errata/RHSA-2024:8914
https://access.redhat.com/security/cve/CVE-2024-7006
https://bugzilla.redhat.com/2302996
https://bugzilla.redhat.com/show_bug.cgi?id=2302996
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7006
https://errata.almalinux.org/9/ALSA-2024-8914.html
https://errata.rockylinux.org/RLSA-2024:8914
https://gitlab.com/libtiff/libtiff/-/merge_requests/559
https://linux.oracle.com/cve/CVE-2024-7006.html
https://linux.oracle.com/errata/ELSA-2024-8914.html
https://nvd.nist.gov/vuln/detail/CVE-2024-7006
https://security.netapp.com/advisory/ntap-20240920-0001/
https://ubuntu.com/security/notices/USN-6997-1
https://ubuntu.com/security/notices/USN-6997-2
https://www.cve.org/CVERecord?id=CVE-2024-7006
libudev1
CVE-2023-50387
HIGH
247.3-7+deb11u4
247.3-7+deb11u6
http://www.openwall.com/lists/oss-security/2024/02/16/2
http://www.openwall.com/lists/oss-security/2024/02/16/3
https://access.redhat.com/errata/RHSA-2024:2551
https://access.redhat.com/security/cve/CVE-2023-50387
https://blog.powerdns.com/2024/02/13/powerdns-recursor-4-8-6-4-9-3-5-0-2-released
https://bugzilla.redhat.com/2263896
https://bugzilla.redhat.com/2263897
https://bugzilla.redhat.com/2263909
https://bugzilla.redhat.com/2263911
https://bugzilla.redhat.com/2263914
https://bugzilla.redhat.com/2263917
https://bugzilla.redhat.com/show_bug.cgi?id=2263896
https://bugzilla.redhat.com/show_bug.cgi?id=2263897
https://bugzilla.redhat.com/show_bug.cgi?id=2263909
https://bugzilla.redhat.com/show_bug.cgi?id=2263911
https://bugzilla.redhat.com/show_bug.cgi?id=2263914
https://bugzilla.redhat.com/show_bug.cgi?id=2263917
https://bugzilla.suse.com/show_bug.cgi?id=1219823
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6516
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html
https://errata.almalinux.org/9/ALSA-2024-2551.html
https://errata.rockylinux.org/RLSA-2024:2551
https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1
https://kb.isc.org/docs/cve-2023-50387
https://linux.oracle.com/cve/CVE-2023-50387.html
https://linux.oracle.com/errata/ELSA-2024-3741.html
https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html
https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/
https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-50387
https://news.ycombinator.com/item?id=39367411
https://news.ycombinator.com/item?id=39372384
https://nlnetlabs.nl/downloads/unbound/CVE-2023-50387_CVE-2023-50868.txt
https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/
https://nvd.nist.gov/vuln/detail/CVE-2023-50387
https://security.netapp.com/advisory/ntap-20240307-0007/
https://ubuntu.com/security/notices/USN-6633-1
https://ubuntu.com/security/notices/USN-6642-1
https://ubuntu.com/security/notices/USN-6657-1
https://ubuntu.com/security/notices/USN-6657-2
https://ubuntu.com/security/notices/USN-6665-1
https://ubuntu.com/security/notices/USN-6723-1
https://www.athene-center.de/aktuelles/key-trap
https://www.athene-center.de/fileadmin/content/PDF/Technical_Report_KeyTrap.pdf
https://www.cve.org/CVERecord?id=CVE-2023-50387
https://www.isc.org/blogs/2024-bind-security-release/
https://www.knot-resolver.cz/2024-02-13-knot-resolver-5.7.1.html
https://www.securityweek.com/keytrap-dns-attack-could-disable-large-parts-of-internet-researchers/
https://www.theregister.com/2024/02/13/dnssec_vulnerability_internet/
libudev1
CVE-2023-50868
HIGH
247.3-7+deb11u4
247.3-7+deb11u6
http://www.openwall.com/lists/oss-security/2024/02/16/2
http://www.openwall.com/lists/oss-security/2024/02/16/3
https://access.redhat.com/errata/RHSA-2024:2551
https://access.redhat.com/security/cve/CVE-2023-50868
https://blog.powerdns.com/2024/02/13/powerdns-recursor-4-8-6-4-9-3-5-0-2-released
https://bugzilla.redhat.com/2263896
https://bugzilla.redhat.com/2263897
https://bugzilla.redhat.com/2263909
https://bugzilla.redhat.com/2263911
https://bugzilla.redhat.com/2263914
https://bugzilla.redhat.com/2263917
https://bugzilla.redhat.com/show_bug.cgi?id=2263896
https://bugzilla.redhat.com/show_bug.cgi?id=2263897
https://bugzilla.redhat.com/show_bug.cgi?id=2263909
https://bugzilla.redhat.com/show_bug.cgi?id=2263911
https://bugzilla.redhat.com/show_bug.cgi?id=2263914
https://bugzilla.redhat.com/show_bug.cgi?id=2263917
https://bugzilla.suse.com/show_bug.cgi?id=1219826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6516
https://datatracker.ietf.org/doc/html/rfc5155
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html
https://errata.almalinux.org/9/ALSA-2024-2551.html
https://errata.rockylinux.org/RLSA-2024:2551
https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1
https://kb.isc.org/docs/cve-2023-50868
https://linux.oracle.com/cve/CVE-2023-50868.html
https://linux.oracle.com/errata/ELSA-2024-3741.html
https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html
https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/
https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html
https://nlnetlabs.nl/downloads/unbound/CVE-2023-50387_CVE-2023-50868.txt
https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/
https://nvd.nist.gov/vuln/detail/CVE-2023-50868
https://security.netapp.com/advisory/ntap-20240307-0008/
https://ubuntu.com/security/notices/USN-6633-1
https://ubuntu.com/security/notices/USN-6642-1
https://ubuntu.com/security/notices/USN-6657-1
https://ubuntu.com/security/notices/USN-6657-2
https://ubuntu.com/security/notices/USN-6665-1
https://ubuntu.com/security/notices/USN-6723-1
https://www.cve.org/CVERecord?id=CVE-2023-50868
https://www.isc.org/blogs/2024-bind-security-release/
https://www.knot-resolver.cz/2024-02-13-knot-resolver-5.7.1.html
libxml2
CVE-2025-49794
CRITICAL
2.9.10+dfsg-6.7+deb11u4
2.9.10+dfsg-6.7+deb11u8
https://access.redhat.com/errata/RHSA-2025:10630
https://access.redhat.com/errata/RHSA-2025:10698
https://access.redhat.com/errata/RHSA-2025:10699
https://access.redhat.com/errata/RHSA-2025:11580
https://access.redhat.com/errata/RHSA-2025:12098
https://access.redhat.com/errata/RHSA-2025:12099
https://access.redhat.com/errata/RHSA-2025:12199
https://access.redhat.com/errata/RHSA-2025:12237
https://access.redhat.com/errata/RHSA-2025:12239
https://access.redhat.com/errata/RHSA-2025:12240
https://access.redhat.com/errata/RHSA-2025:12241
https://access.redhat.com/security/cve/CVE-2025-49794
https://bugzilla.redhat.com/2372373
https://bugzilla.redhat.com/2372385
https://bugzilla.redhat.com/2372406
https://bugzilla.redhat.com/show_bug.cgi?id=2372373
https://errata.almalinux.org/9/ALSA-2025-10699.html
https://linux.oracle.com/cve/CVE-2025-49794.html
https://linux.oracle.com/errata/ELSA-2025-10699.html
https://nvd.nist.gov/vuln/detail/CVE-2025-49794
https://www.cve.org/CVERecord?id=CVE-2025-49794
libxml2
CVE-2025-49796
CRITICAL
2.9.10+dfsg-6.7+deb11u4
2.9.10+dfsg-6.7+deb11u8
https://access.redhat.com/errata/RHSA-2025:10630
https://access.redhat.com/errata/RHSA-2025:10698
https://access.redhat.com/errata/RHSA-2025:10699
https://access.redhat.com/errata/RHSA-2025:11580
https://access.redhat.com/errata/RHSA-2025:12098
https://access.redhat.com/errata/RHSA-2025:12099
https://access.redhat.com/errata/RHSA-2025:12199
https://access.redhat.com/errata/RHSA-2025:12237
https://access.redhat.com/errata/RHSA-2025:12239
https://access.redhat.com/errata/RHSA-2025:12240
https://access.redhat.com/errata/RHSA-2025:12241
https://access.redhat.com/security/cve/CVE-2025-49796
https://bugzilla.redhat.com/2372373
https://bugzilla.redhat.com/2372385
https://bugzilla.redhat.com/2372406
https://bugzilla.redhat.com/show_bug.cgi?id=2372385
https://errata.almalinux.org/9/ALSA-2025-10699.html
https://linux.oracle.com/cve/CVE-2025-49796.html
https://linux.oracle.com/errata/ELSA-2025-10699.html
https://nvd.nist.gov/vuln/detail/CVE-2025-49796
https://www.cve.org/CVERecord?id=CVE-2025-49796
libxml2
CVE-2022-2309
HIGH
2.9.10+dfsg-6.7+deb11u4
2.9.10+dfsg-6.7+deb11u5
https://access.redhat.com/errata/RHSA-2022:8226
https://access.redhat.com/security/cve/CVE-2022-2309
https://bugzilla.redhat.com/2107571
https://bugzilla.redhat.com/show_bug.cgi?id=2107571
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2309
https://errata.almalinux.org/9/ALSA-2022-8226.html
https://errata.rockylinux.org/RLSA-2022:8226
https://github.com/advisories/GHSA-wrxv-2j5q-m38w
https://github.com/lxml/lxml
https://github.com/lxml/lxml/blob/master/CHANGES.txt
https://github.com/lxml/lxml/commit/86368e9cf70a0ad23cccd5ee32de847149af0c6f
https://github.com/lxml/lxml/commit/86368e9cf70a0ad23cccd5ee32de847149af0c6f (lxml-4.9.1)
https://github.com/pypa/advisory-database/tree/main/vulns/lxml/PYSEC-2022-230.yaml
https://gitlab.gnome.org/GNOME/libxml2/-/issues/378
https://huntr.dev/bounties/8264e74f-edda-4c40-9956-49de635105ba
https://huntr.dev/bounties/8264e74f-edda-4c40-9956-49de635105ba/
https://linux.oracle.com/cve/CVE-2022-2309.html
https://linux.oracle.com/errata/ELSA-2022-8226.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HGYC6L7ENH5VEGN3YWFBYMGKX6WNS7HZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/URHHSIBTPTALXMECRLAC2EVDNAFSR5NO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HGYC6L7ENH5VEGN3YWFBYMGKX6WNS7HZ
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URHHSIBTPTALXMECRLAC2EVDNAFSR5NO
https://nvd.nist.gov/vuln/detail/CVE-2022-2309
https://security.gentoo.org/glsa/202208-06
https://security.netapp.com/advisory/ntap-20220915-0006
https://security.netapp.com/advisory/ntap-20220915-0006/
https://ubuntu.com/security/notices/USN-5760-1
https://ubuntu.com/security/notices/USN-6028-2
https://www.cve.org/CVERecord?id=CVE-2022-2309
libxml2
CVE-2024-25062
HIGH
2.9.10+dfsg-6.7+deb11u4
2.9.10+dfsg-6.7+deb11u6
https://access.redhat.com/errata/RHSA-2024:2679
https://access.redhat.com/security/cve/CVE-2024-25062
https://bugzilla.redhat.com/2262726
https://bugzilla.redhat.com/show_bug.cgi?id=2262726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25062
https://errata.almalinux.org/9/ALSA-2024-2679.html
https://errata.rockylinux.org/RLSA-2024:2679
https://gitlab.gnome.org/GNOME/libxml2/-/issues/604
https://gitlab.gnome.org/GNOME/libxml2/-/tags
https://linux.oracle.com/cve/CVE-2024-25062.html
https://linux.oracle.com/errata/ELSA-2024-3626.html
https://nvd.nist.gov/vuln/detail/CVE-2024-25062
https://ubuntu.com/security/notices/USN-6658-1
https://ubuntu.com/security/notices/USN-6658-2
https://www.cve.org/CVERecord?id=CVE-2024-25062
libxml2
CVE-2024-56171
HIGH
2.9.10+dfsg-6.7+deb11u4
2.9.10+dfsg-6.7+deb11u6
https://access.redhat.com/errata/RHSA-2025:2679
https://access.redhat.com/security/cve/CVE-2024-56171
https://bugzilla.redhat.com/2346416
https://bugzilla.redhat.com/2346421
https://bugzilla.redhat.com/show_bug.cgi?id=2346416
https://bugzilla.redhat.com/show_bug.cgi?id=2346421
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56171
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24928
https://errata.almalinux.org/9/ALSA-2025-2679.html
https://errata.rockylinux.org/RLSA-2025:2686
https://gitlab.gnome.org/GNOME/libxml2/-/issues/828
https://linux.oracle.com/cve/CVE-2024-56171.html
https://linux.oracle.com/errata/ELSA-2025-2686.html
https://nvd.nist.gov/vuln/detail/CVE-2024-56171
https://security.netapp.com/advisory/ntap-20250328-0010/
https://ubuntu.com/security/notices/USN-7302-1
https://www.cve.org/CVERecord?id=CVE-2024-56171
https://www.openwall.com/lists/oss-security/2025/02/18/2
libxml2
CVE-2025-24928
HIGH
2.9.10+dfsg-6.7+deb11u4
2.9.10+dfsg-6.7+deb11u6
https://access.redhat.com/errata/RHSA-2025:2679
https://access.redhat.com/security/cve/CVE-2025-24928
https://bugzilla.redhat.com/2346416
https://bugzilla.redhat.com/2346421
https://bugzilla.redhat.com/show_bug.cgi?id=2346416
https://bugzilla.redhat.com/show_bug.cgi?id=2346421
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56171
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24928
https://errata.almalinux.org/9/ALSA-2025-2679.html
https://errata.rockylinux.org/RLSA-2025:2686
https://gitlab.gnome.org/GNOME/libxml2/-/issues/847
https://issues.oss-fuzz.com/issues/392687022
https://linux.oracle.com/cve/CVE-2025-24928.html
https://linux.oracle.com/errata/ELSA-2025-2686.html
https://nvd.nist.gov/vuln/detail/CVE-2025-24928
https://security.netapp.com/advisory/ntap-20250321-0006/
https://ubuntu.com/security/notices/USN-7302-1
https://www.cve.org/CVERecord?id=CVE-2025-24928
https://www.openwall.com/lists/oss-security/2025/02/18/2
libxml2
CVE-2025-27113
HIGH
2.9.10+dfsg-6.7+deb11u4
2.9.10+dfsg-6.7+deb11u6
https://access.redhat.com/security/cve/CVE-2025-27113
https://gitlab.gnome.org/GNOME/libxml2/-/issues/861
https://nvd.nist.gov/vuln/detail/CVE-2025-27113
https://security.netapp.com/advisory/ntap-20250306-0004/
https://ubuntu.com/security/notices/USN-7302-1
https://www.cve.org/CVERecord?id=CVE-2025-27113
https://www.openwall.com/lists/oss-security/2025/02/18/2
libxml2
CVE-2025-32414
HIGH
2.9.10+dfsg-6.7+deb11u4
2.9.10+dfsg-6.7+deb11u7
https://access.redhat.com/errata/RHSA-2025:8958
https://access.redhat.com/security/cve/CVE-2025-32414
https://bugzilla.redhat.com/2358121
https://errata.almalinux.org/8/ALSA-2025-8958.html
https://gitlab.gnome.org/GNOME/libxml2/-/issues/889
https://linux.oracle.com/cve/CVE-2025-32414.html
https://linux.oracle.com/errata/ELSA-2025-8958.html
https://nvd.nist.gov/vuln/detail/CVE-2025-32414
https://ubuntu.com/security/notices/USN-7467-1
https://ubuntu.com/security/notices/USN-7467-2
https://www.cve.org/CVERecord?id=CVE-2025-32414
libxml2
CVE-2025-32415
HIGH
2.9.10+dfsg-6.7+deb11u4
2.9.10+dfsg-6.7+deb11u7
https://access.redhat.com/security/cve/CVE-2025-32415
https://gitlab.gnome.org/GNOME/libxml2/-/issues/890
https://nvd.nist.gov/vuln/detail/CVE-2025-32415
https://ubuntu.com/security/notices/USN-7467-1
https://ubuntu.com/security/notices/USN-7467-2
https://www.cve.org/CVERecord?id=CVE-2025-32415
libxml2
CVE-2025-6021
HIGH
2.9.10+dfsg-6.7+deb11u4
2.9.10+dfsg-6.7+deb11u8
https://access.redhat.com/errata/RHSA-2025:10630
https://access.redhat.com/errata/RHSA-2025:10698
https://access.redhat.com/errata/RHSA-2025:10699
https://access.redhat.com/errata/RHSA-2025:11580
https://access.redhat.com/errata/RHSA-2025:12098
https://access.redhat.com/errata/RHSA-2025:12099
https://access.redhat.com/errata/RHSA-2025:12199
https://access.redhat.com/errata/RHSA-2025:12237
https://access.redhat.com/errata/RHSA-2025:12239
https://access.redhat.com/errata/RHSA-2025:12240
https://access.redhat.com/errata/RHSA-2025:12241
https://access.redhat.com/security/cve/CVE-2025-6021
https://bugzilla.redhat.com/2372373
https://bugzilla.redhat.com/2372385
https://bugzilla.redhat.com/2372406
https://bugzilla.redhat.com/show_bug.cgi?id=2372406
https://errata.almalinux.org/9/ALSA-2025-10699.html
https://linux.oracle.com/cve/CVE-2025-6021.html
https://linux.oracle.com/errata/ELSA-2025-10699.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6021
https://www.cve.org/CVERecord?id=CVE-2025-6021
libxslt1.1
CVE-2024-55549
HIGH
1.1.34-4+deb11u1
1.1.34-4+deb11u2
https://access.redhat.com/errata/RHSA-2025:7410
https://access.redhat.com/security/cve/CVE-2024-55549
https://bugzilla.redhat.com/2352484
https://errata.almalinux.org/9/ALSA-2025-7410.html
https://gitlab.gnome.org/GNOME/libxslt/-/issues/127
https://linux.oracle.com/cve/CVE-2024-55549.html
https://linux.oracle.com/errata/ELSA-2025-7496.html
https://nvd.nist.gov/vuln/detail/CVE-2024-55549
https://ubuntu.com/security/notices/USN-7357-1
https://www.cve.org/CVERecord?id=CVE-2024-55549
libxslt1.1
CVE-2025-24855
HIGH
1.1.34-4+deb11u1
1.1.34-4+deb11u2
https://access.redhat.com/errata/RHSA-2025:3107
https://access.redhat.com/security/cve/CVE-2025-24855
https://bugzilla.redhat.com/2352483
https://errata.almalinux.org/9/ALSA-2025-3107.html
https://gitlab.gnome.org/GNOME/libxslt/-/issues/128
https://linux.oracle.com/cve/CVE-2025-24855.html
https://linux.oracle.com/errata/ELSA-2025-7496.html
https://nvd.nist.gov/vuln/detail/CVE-2025-24855
https://ubuntu.com/security/notices/USN-7361-1
https://www.cve.org/CVERecord?id=CVE-2025-24855
libxslt1.1
CVE-2025-7424
HIGH
1.1.34-4+deb11u1
https://access.redhat.com/security/cve/CVE-2025-7424
https://bugzilla.redhat.com/show_bug.cgi?id=2379228
https://nvd.nist.gov/vuln/detail/CVE-2025-7424
https://www.cve.org/CVERecord?id=CVE-2025-7424
libxslt1.1
CVE-2025-7425
HIGH
1.1.34-4+deb11u1
https://access.redhat.com/security/cve/CVE-2025-7425
https://bugzilla.redhat.com/show_bug.cgi?id=2379274
https://gitlab.gnome.org/GNOME/libxslt/-/issues/140
https://nvd.nist.gov/vuln/detail/CVE-2025-7425
https://www.cve.org/CVERecord?id=CVE-2025-7425
libzstd1
CVE-2022-4899
HIGH
1.4.8+dfsg-2.1
https://access.redhat.com/errata/RHSA-2024:1141
https://access.redhat.com/security/cve/CVE-2022-4899
https://bugzilla.redhat.com/2179864
https://bugzilla.redhat.com/2188109
https://bugzilla.redhat.com/2188113
https://bugzilla.redhat.com/2188115
https://bugzilla.redhat.com/2188116
https://bugzilla.redhat.com/2188117
https://bugzilla.redhat.com/2188118
https://bugzilla.redhat.com/2188119
https://bugzilla.redhat.com/2188120
https://bugzilla.redhat.com/2188121
https://bugzilla.redhat.com/2188122
https://bugzilla.redhat.com/2188123
https://bugzilla.redhat.com/2188124
https://bugzilla.redhat.com/2188125
https://bugzilla.redhat.com/2188127
https://bugzilla.redhat.com/2188128
https://bugzilla.redhat.com/2188129
https://bugzilla.redhat.com/2188130
https://bugzilla.redhat.com/2188131
https://bugzilla.redhat.com/2188132
https://bugzilla.redhat.com/2224211
https://bugzilla.redhat.com/2224212
https://bugzilla.redhat.com/2224213
https://bugzilla.redhat.com/2224214
https://bugzilla.redhat.com/2224215
https://bugzilla.redhat.com/2224216
https://bugzilla.redhat.com/2224217
https://bugzilla.redhat.com/2224218
https://bugzilla.redhat.com/2224219
https://bugzilla.redhat.com/2224220
https://bugzilla.redhat.com/2224221
https://bugzilla.redhat.com/2224222
https://bugzilla.redhat.com/2245014
https://bugzilla.redhat.com/2245015
https://bugzilla.redhat.com/2245016
https://bugzilla.redhat.com/2245017
https://bugzilla.redhat.com/2245018
https://bugzilla.redhat.com/2245019
https://bugzilla.redhat.com/2245020
https://bugzilla.redhat.com/2245021
https://bugzilla.redhat.com/2245022
https://bugzilla.redhat.com/2245023
https://bugzilla.redhat.com/2245024
https://bugzilla.redhat.com/2245026
https://bugzilla.redhat.com/2245027
https://bugzilla.redhat.com/2245028
https://bugzilla.redhat.com/2245029
https://bugzilla.redhat.com/2245030
https://bugzilla.redhat.com/2245031
https://bugzilla.redhat.com/2245032
https://bugzilla.redhat.com/2245033
https://bugzilla.redhat.com/2245034
https://bugzilla.redhat.com/2258771
https://bugzilla.redhat.com/2258772
https://bugzilla.redhat.com/2258773
https://bugzilla.redhat.com/2258774
https://bugzilla.redhat.com/2258775
https://bugzilla.redhat.com/2258776
https://bugzilla.redhat.com/2258777
https://bugzilla.redhat.com/2258778
https://bugzilla.redhat.com/2258779
https://bugzilla.redhat.com/2258780
https://bugzilla.redhat.com/2258781
https://bugzilla.redhat.com/2258782
https://bugzilla.redhat.com/2258783
https://bugzilla.redhat.com/2258784
https://bugzilla.redhat.com/2258785
https://bugzilla.redhat.com/2258787
https://bugzilla.redhat.com/2258788
https://bugzilla.redhat.com/2258789
https://bugzilla.redhat.com/2258790
https://bugzilla.redhat.com/2258791
https://bugzilla.redhat.com/2258792
https://bugzilla.redhat.com/2258793
https://bugzilla.redhat.com/2258794
https://errata.almalinux.org/9/ALSA-2024-1141.html
https://github.com/facebook/zstd
https://github.com/facebook/zstd/issues/3200
https://github.com/facebook/zstd/pull/3220
https://github.com/pypa/advisory-database/tree/main/vulns/zstd/PYSEC-2023-121.yaml
https://github.com/sergey-dryabzhinsky/python-zstd/commit/c8a619aebdbd6b838fbfef6e19325a70f631a4c6
https://linux.oracle.com/cve/CVE-2022-4899.html
https://linux.oracle.com/errata/ELSA-2024-1141.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN
https://nvd.nist.gov/vuln/detail/CVE-2022-4899
https://security.netapp.com/advisory/ntap-20230725-0005
https://security.netapp.com/advisory/ntap-20230725-0005/
https://www.cve.org/CVERecord?id=CVE-2022-4899
logsave
CVE-2022-1304
HIGH
1.46.2-2
1.46.2-2+deb11u1
https://access.redhat.com/errata/RHSA-2022:8361
https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/2069726
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://errata.almalinux.org/9/ALSA-2022-8361.html
https://errata.rockylinux.org/RLSA-2022:8361
https://linux.oracle.com/cve/CVE-2022-1304.html
https://linux.oracle.com/errata/ELSA-2024-12731.html
https://lists.debian.org/debian-lts-announce/2024/10/msg00001.html
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://security.netapp.com/advisory/ntap-20241122-0010/
https://ubuntu.com/security/notices/USN-5464-1
https://www.cve.org/CVERecord?id=CVE-2022-1304
perl
CVE-2020-16156
HIGH
5.32.1-4+deb11u3
5.32.1-4+deb11u4
http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/errata/RHSA-2025:8432
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://bugzilla.redhat.com/2035273
https://errata.almalinux.org/8/ALSA-2025-8432.html
https://linux.oracle.com/cve/CVE-2020-16156.html
https://linux.oracle.com/errata/ELSA-2025-8432.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
https://nvd.nist.gov/vuln/detail/CVE-2020-16156
https://ubuntu.com/security/notices/USN-5689-1
https://ubuntu.com/security/notices/USN-5689-2
https://www.cve.org/CVERecord?id=CVE-2020-16156
perl
CVE-2023-31484
HIGH
5.32.1-4+deb11u3
5.32.1-4+deb11u4
http://www.openwall.com/lists/oss-security/2023/04/29/1
http://www.openwall.com/lists/oss-security/2023/05/03/3
http://www.openwall.com/lists/oss-security/2023/05/03/5
http://www.openwall.com/lists/oss-security/2023/05/07/2
https://access.redhat.com/errata/RHSA-2023:6539
https://access.redhat.com/security/cve/CVE-2023-31484
https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/
https://bugzilla.redhat.com/2218667
https://bugzilla.redhat.com/show_bug.cgi?id=2218667
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31484
https://errata.almalinux.org/9/ALSA-2023-6539.html
https://errata.rockylinux.org/RLSA-2023:6539
https://github.com/andk/cpanpm/commit/9c98370287f4e709924aee7c58ef21c85289a7f0 (2.35-TRIAL)
https://github.com/andk/cpanpm/pull/175
https://linux.oracle.com/cve/CVE-2023-31484.html
https://linux.oracle.com/errata/ELSA-2024-3094.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BM6UW55CNFUTNGD5ZRKGUKKKFDJGMFHL/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LEGCEOKFJVBJ2QQ6S2H4NAEWTUERC7SB/
https://metacpan.org/dist/CPAN/changes
https://nvd.nist.gov/vuln/detail/CVE-2023-31484
https://security.netapp.com/advisory/ntap-20240621-0007/
https://ubuntu.com/security/notices/USN-6112-1
https://ubuntu.com/security/notices/USN-6112-2
https://www.cve.org/CVERecord?id=CVE-2023-31484
https://www.openwall.com/lists/oss-security/2023/04/18/14
perl-base
CVE-2020-16156
HIGH
5.32.1-4+deb11u3
5.32.1-4+deb11u4
http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/errata/RHSA-2025:8432
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://bugzilla.redhat.com/2035273
https://errata.almalinux.org/8/ALSA-2025-8432.html
https://linux.oracle.com/cve/CVE-2020-16156.html
https://linux.oracle.com/errata/ELSA-2025-8432.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
https://nvd.nist.gov/vuln/detail/CVE-2020-16156
https://ubuntu.com/security/notices/USN-5689-1
https://ubuntu.com/security/notices/USN-5689-2
https://www.cve.org/CVERecord?id=CVE-2020-16156
perl-base
CVE-2023-31484
HIGH
5.32.1-4+deb11u3
5.32.1-4+deb11u4
http://www.openwall.com/lists/oss-security/2023/04/29/1
http://www.openwall.com/lists/oss-security/2023/05/03/3
http://www.openwall.com/lists/oss-security/2023/05/03/5
http://www.openwall.com/lists/oss-security/2023/05/07/2
https://access.redhat.com/errata/RHSA-2023:6539
https://access.redhat.com/security/cve/CVE-2023-31484
https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/
https://bugzilla.redhat.com/2218667
https://bugzilla.redhat.com/show_bug.cgi?id=2218667
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31484
https://errata.almalinux.org/9/ALSA-2023-6539.html
https://errata.rockylinux.org/RLSA-2023:6539
https://github.com/andk/cpanpm/commit/9c98370287f4e709924aee7c58ef21c85289a7f0 (2.35-TRIAL)
https://github.com/andk/cpanpm/pull/175
https://linux.oracle.com/cve/CVE-2023-31484.html
https://linux.oracle.com/errata/ELSA-2024-3094.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BM6UW55CNFUTNGD5ZRKGUKKKFDJGMFHL/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LEGCEOKFJVBJ2QQ6S2H4NAEWTUERC7SB/
https://metacpan.org/dist/CPAN/changes
https://nvd.nist.gov/vuln/detail/CVE-2023-31484
https://security.netapp.com/advisory/ntap-20240621-0007/
https://ubuntu.com/security/notices/USN-6112-1
https://ubuntu.com/security/notices/USN-6112-2
https://www.cve.org/CVERecord?id=CVE-2023-31484
https://www.openwall.com/lists/oss-security/2023/04/18/14
perl-modules-5.32
CVE-2020-16156
HIGH
5.32.1-4+deb11u3
5.32.1-4+deb11u4
http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/errata/RHSA-2025:8432
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://bugzilla.redhat.com/2035273
https://errata.almalinux.org/8/ALSA-2025-8432.html
https://linux.oracle.com/cve/CVE-2020-16156.html
https://linux.oracle.com/errata/ELSA-2025-8432.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
https://nvd.nist.gov/vuln/detail/CVE-2020-16156
https://ubuntu.com/security/notices/USN-5689-1
https://ubuntu.com/security/notices/USN-5689-2
https://www.cve.org/CVERecord?id=CVE-2020-16156
perl-modules-5.32
CVE-2023-31484
HIGH
5.32.1-4+deb11u3
5.32.1-4+deb11u4
http://www.openwall.com/lists/oss-security/2023/04/29/1
http://www.openwall.com/lists/oss-security/2023/05/03/3
http://www.openwall.com/lists/oss-security/2023/05/03/5
http://www.openwall.com/lists/oss-security/2023/05/07/2
https://access.redhat.com/errata/RHSA-2023:6539
https://access.redhat.com/security/cve/CVE-2023-31484
https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/
https://bugzilla.redhat.com/2218667
https://bugzilla.redhat.com/show_bug.cgi?id=2218667
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31484
https://errata.almalinux.org/9/ALSA-2023-6539.html
https://errata.rockylinux.org/RLSA-2023:6539
https://github.com/andk/cpanpm/commit/9c98370287f4e709924aee7c58ef21c85289a7f0 (2.35-TRIAL)
https://github.com/andk/cpanpm/pull/175
https://linux.oracle.com/cve/CVE-2023-31484.html
https://linux.oracle.com/errata/ELSA-2024-3094.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BM6UW55CNFUTNGD5ZRKGUKKKFDJGMFHL/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LEGCEOKFJVBJ2QQ6S2H4NAEWTUERC7SB/
https://metacpan.org/dist/CPAN/changes
https://nvd.nist.gov/vuln/detail/CVE-2023-31484
https://security.netapp.com/advisory/ntap-20240621-0007/
https://ubuntu.com/security/notices/USN-6112-1
https://ubuntu.com/security/notices/USN-6112-2
https://www.cve.org/CVERecord?id=CVE-2023-31484
https://www.openwall.com/lists/oss-security/2023/04/18/14
zlib1g
CVE-2023-45853
CRITICAL
1:1.2.11.dfsg-2+deb11u2
http://www.openwall.com/lists/oss-security/2023/10/20/9
http://www.openwall.com/lists/oss-security/2024/01/24/10
https://access.redhat.com/security/cve/CVE-2023-45853
https://chromium.googlesource.com/chromium/src/+/d709fb23806858847131027da95ef4c548813356
https://chromium.googlesource.com/chromium/src/+/de29dd6c7151d3cd37cb4cf0036800ddfb1d8b61
https://github.com/madler/zlib/blob/ac8f12c97d1afd9bafa9c710f827d40a407d3266/contrib/README.contrib#L1-L4
https://github.com/madler/zlib/commit/73331a6a0481067628f065ffe87bb1d8f787d10c
https://github.com/madler/zlib/pull/843
https://github.com/smihica/pyminizip
https://github.com/smihica/pyminizip/blob/master/zlib-1.2.11/contrib/minizip/zip.c
https://lists.debian.org/debian-lts-announce/2023/11/msg00026.html
https://nvd.nist.gov/vuln/detail/CVE-2023-45853
https://pypi.org/project/pyminizip/#history
https://security.gentoo.org/glsa/202401-18
https://security.netapp.com/advisory/ntap-20231130-0009
https://security.netapp.com/advisory/ntap-20231130-0009/
https://ubuntu.com/security/notices/USN-7107-1
https://www.cve.org/CVERecord?id=CVE-2023-45853
https://www.winimage.com/zLibDll/minizip.html
No Misconfigurations found