Skip to content

Security Overview

Helm-Chart

Scan Results

Chart Object: apache-musicindex/templates/common.yaml

Type Misconfiguration ID Check Severity Explaination Links
Kubernetes Security Check KSV001 Process can elevate its own privileges MEDIUM
Expand... A program inside the container can elevate its own privileges and run as root, which might give the program control over the container and node.


Container 'hostpatch' of Deployment 'RELEASE-NAME-apache-musicindex' should set 'securityContext.allowPrivilegeEscalation' to false
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv001
Kubernetes Security Check KSV003 Default capabilities not dropped LOW
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'RELEASE-NAME-apache-musicindex' of Deployment 'RELEASE-NAME-apache-musicindex' should add 'ALL' to 'securityContext.capabilities.drop'
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
Kubernetes Security Check KSV003 Default capabilities not dropped LOW
Expand... The container should drop all default capabilities and add only those that are needed for its execution.


Container 'hostpatch' of Deployment 'RELEASE-NAME-apache-musicindex' should add 'ALL' to 'securityContext.capabilities.drop'
Expand...https://kubesec.io/basics/containers-securitycontext-capabilities-drop-index-all/
https://avd.aquasec.com/appshield/ksv003
Kubernetes Security Check KSV011 CPU not limited LOW
Expand... Enforcing CPU limits prevents DoS via resource exhaustion.


Container 'hostpatch' of Deployment 'RELEASE-NAME-apache-musicindex' should set 'resources.limits.cpu'
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv011
Kubernetes Security Check KSV012 Runs as root user MEDIUM
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'RELEASE-NAME-apache-musicindex' of Deployment 'RELEASE-NAME-apache-musicindex' should set 'securityContext.runAsNonRoot' to true
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
Kubernetes Security Check KSV012 Runs as root user MEDIUM
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'autopermissions' of Deployment 'RELEASE-NAME-apache-musicindex' should set 'securityContext.runAsNonRoot' to true
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
Kubernetes Security Check KSV012 Runs as root user MEDIUM
Expand... 'runAsNonRoot' forces the running image to run as a non-root user to ensure least privileges.


Container 'hostpatch' of Deployment 'RELEASE-NAME-apache-musicindex' should set 'securityContext.runAsNonRoot' to true
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv012
Kubernetes Security Check KSV014 Root file system is not read-only LOW
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'RELEASE-NAME-apache-musicindex' of Deployment 'RELEASE-NAME-apache-musicindex' should set 'securityContext.readOnlyRootFilesystem' to true
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
Kubernetes Security Check KSV014 Root file system is not read-only LOW
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'autopermissions' of Deployment 'RELEASE-NAME-apache-musicindex' should set 'securityContext.readOnlyRootFilesystem' to true
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
Kubernetes Security Check KSV014 Root file system is not read-only LOW
Expand... An immutable root file system prevents applications from writing to their local disk. This can limit intrusions, as attackers will not be able to tamper with the file system or write foreign executables to disk.


Container 'hostpatch' of Deployment 'RELEASE-NAME-apache-musicindex' should set 'securityContext.readOnlyRootFilesystem' to true
Expand...https://kubesec.io/basics/containers-securitycontext-readonlyrootfilesystem-true/
https://avd.aquasec.com/appshield/ksv014
Kubernetes Security Check KSV015 CPU requests not specified LOW
Expand... When containers have resource requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of Deployment 'RELEASE-NAME-apache-musicindex' should set 'resources.requests.cpu'
Expand...https://cloud.google.com/blog/products/containers-kubernetes/kubernetes-best-practices-resource-requests-and-limits
https://avd.aquasec.com/appshield/ksv015
Kubernetes Security Check KSV016 Memory requests not specified LOW
Expand... When containers have memory requests specified, the scheduler can make better decisions about which nodes to place pods on, and how to deal with resource contention.


Container 'hostpatch' of Deployment 'RELEASE-NAME-apache-musicindex' should set 'resources.requests.memory'
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv016
Kubernetes Security Check KSV017 Privileged container HIGH
Expand... Privileged containers share namespaces with the host system and do not offer any security. They should be used exclusively for system containers that require high privileges.


Container 'hostpatch' of Deployment 'RELEASE-NAME-apache-musicindex' should set 'securityContext.privileged' to false
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv017
Kubernetes Security Check KSV018 Memory not limited LOW
Expand... Enforcing memory limits prevents DoS via resource exhaustion.


Container 'hostpatch' of Deployment 'RELEASE-NAME-apache-musicindex' should set 'resources.limits.memory'
Expand...https://kubesec.io/basics/containers-resources-limits-memory/
https://avd.aquasec.com/appshield/ksv018
Kubernetes Security Check KSV020 Runs with low user ID MEDIUM
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-apache-musicindex' of Deployment 'RELEASE-NAME-apache-musicindex' should set 'securityContext.runAsUser' > 10000
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
Kubernetes Security Check KSV020 Runs with low user ID MEDIUM
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-apache-musicindex' should set 'securityContext.runAsUser' > 10000
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
Kubernetes Security Check KSV020 Runs with low user ID MEDIUM
Expand... Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of Deployment 'RELEASE-NAME-apache-musicindex' should set 'securityContext.runAsUser' > 10000
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv020
Kubernetes Security Check KSV021 Runs with low group ID MEDIUM
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'RELEASE-NAME-apache-musicindex' of Deployment 'RELEASE-NAME-apache-musicindex' should set 'securityContext.runAsGroup' > 10000
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
Kubernetes Security Check KSV021 Runs with low group ID MEDIUM
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'autopermissions' of Deployment 'RELEASE-NAME-apache-musicindex' should set 'securityContext.runAsGroup' > 10000
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
Kubernetes Security Check KSV021 Runs with low group ID MEDIUM
Expand... Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.


Container 'hostpatch' of Deployment 'RELEASE-NAME-apache-musicindex' should set 'securityContext.runAsGroup' > 10000
Expand...https://kubesec.io/basics/containers-securitycontext-runasuser/
https://avd.aquasec.com/appshield/ksv021
Kubernetes Security Check KSV023 hostPath volumes mounted MEDIUM
Expand... HostPath volumes must be forbidden.


Deployment 'RELEASE-NAME-apache-musicindex' should not set 'spec.template.volumes.hostPath'
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
https://avd.aquasec.com/appshield/ksv023
Kubernetes Security Check KSV029 A root primary or supplementary GID set LOW
Expand... Containers should be forbidden from running with a root primary or supplementary GID.


Deployment 'RELEASE-NAME-apache-musicindex' should set 'spec.securityContext.runAsGroup', 'spec.securityContext.supplementalGroups[*]' and 'spec.securityContext.fsGroup' to integer greater than 0
Expand...https://kubernetes.io/docs/concepts/security/pod-security-standards/#restricted
https://avd.aquasec.com/appshield/ksv029

Containers

Detected Containers
      tccr.io/truecharts/alpine:[email protected]:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583
      tccr.io/truecharts/alpine:[email protected]:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583
      tccr.io/truecharts/apache-musicindex:[email protected]:442d1edfbf89b8a2a42c0d649f53f091c39256c65f922078ad38ff60bdbdadf9
Scan Results

Container: tccr.io/truecharts/alpine:[email protected]:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2)

alpine

Package Vulnerability Severity Installed Version Fixed Version Links
busybox CVE-2022-28391 CRITICAL 1.34.1-r4 1.34.1-r5
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
curl CVE-2022-22576 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
curl CVE-2022-27774 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
curl CVE-2022-27776 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
curl CVE-2022-27775 LOW 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
libcurl CVE-2022-22576 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
libcurl CVE-2022-27774 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
libcurl CVE-2022-27776 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
libcurl CVE-2022-27775 LOW 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
ssl_client CVE-2022-28391 CRITICAL 1.34.1-r4 1.34.1-r5
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
zlib CVE-2018-25032 HIGH 1.2.11-r3 1.2.12-r0
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-1642.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/[email protected]/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/[email protected]/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3

Container: tccr.io/truecharts/alpine:[email protected]:29ed3480a0ee43f7af681fed5d4fc215516abf1c41eade6938b26d8c9c2c7583 (alpine 3.15.2)

alpine

Package Vulnerability Severity Installed Version Fixed Version Links
busybox CVE-2022-28391 CRITICAL 1.34.1-r4 1.34.1-r5
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
curl CVE-2022-22576 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
curl CVE-2022-27774 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
curl CVE-2022-27776 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
curl CVE-2022-27775 LOW 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
libcurl CVE-2022-22576 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
libcurl CVE-2022-27774 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
libcurl CVE-2022-27776 MEDIUM 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
libcurl CVE-2022-27775 LOW 7.80.0-r0 7.80.0-r1
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
ssl_client CVE-2022-28391 CRITICAL 1.34.1-r4 1.34.1-r5
Expand...https://access.redhat.com/security/cve/CVE-2022-28391
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28391
https://git.alpinelinux.org/aports/plain/main/busybox/0001-libbb-sockaddr2str-ensure-only-printable-characters-.patch
https://git.alpinelinux.org/aports/plain/main/busybox/0002-nslookup-sanitize-all-printed-strings-with-printable.patch
https://gitlab.alpinelinux.org/alpine/aports/-/issues/13661
https://nvd.nist.gov/vuln/detail/CVE-2022-28391
zlib CVE-2018-25032 HIGH 1.2.11-r3 1.2.12-r0
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/25/2
http://www.openwall.com/lists/oss-security/2022/03/26/1
https://access.redhat.com/security/cve/CVE-2018-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
https://errata.almalinux.org/8/ALSA-2022-1642.html
https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
https://github.com/madler/zlib/issues/605
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://linux.oracle.com/cve/CVE-2018-25032.html
https://linux.oracle.com/errata/ELSA-2022-2213.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
https://lists.fedoraproject.org/archives/list/[email protected]/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
https://lists.fedoraproject.org/archives/list/[email protected]/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
https://nvd.nist.gov/vuln/detail/CVE-2018-25032
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5355-1
https://ubuntu.com/security/notices/USN-5355-2
https://ubuntu.com/security/notices/USN-5359-1
https://www.debian.org/security/2022/dsa-5111
https://www.openwall.com/lists/oss-security/2022/03/24/1
https://www.openwall.com/lists/oss-security/2022/03/28/1
https://www.openwall.com/lists/oss-security/2022/03/28/3

Container: tccr.io/truecharts/apache-musicindex:[email protected]:442d1edfbf89b8a2a42c0d649f53f091c39256c65f922078ad38ff60bdbdadf9 (ubuntu 20.04)

ubuntu

Package Vulnerability Severity Installed Version Fixed Version Links
apache2 CVE-2019-17567 MEDIUM 2.4.41-4ubuntu3.3
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
http://www.openwall.com/lists/oss-security/2021/06/10/2
https://access.redhat.com/security/cve/CVE-2019-17567
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17567
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-17567
https://lists.apache.org/thread.html/[email protected]%3Cdev.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cannounce.httpd.apache.org%3E
https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E
https://lists.fedoraproject.org/archives/list/[email protected]/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
https://lists.fedoraproject.org/archives/list/[email protected]/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
https://nvd.nist.gov/vuln/detail/CVE-2019-17567
https://security.gentoo.org/glsa/202107-38
https://security.netapp.com/advisory/ntap-20210702-0001/
https://www.oracle.com/security-alerts/cpuoct2021.html
apache2 CVE-2021-33193 MEDIUM 2.4.41-4ubuntu3.3 2.4.41-4ubuntu3.5
Expand...https://access.redhat.com/security/cve/CVE-2021-33193
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33193
https://errata.almalinux.org/8/ALSA-2022-1915.html
https://github.com/apache/httpd/commit/ecebcc035ccd8d0e2984fe41420d9e944f456b3c.patch
https://linux.oracle.com/cve/CVE-2021-33193.html
https://linux.oracle.com/errata/ELSA-2022-9276.html
https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E
https://lists.fedoraproject.org/archives/list/[email protected]/message/DSM6UWQICBJ2TU727RENU3HBKEAFLT6T/
https://lists.fedoraproject.org/archives/list/[email protected]/message/EUVJVRJRBW5QVX4OY3NOHZDQ3B3YOTSG/
https://nvd.nist.gov/vuln/detail/CVE-2021-33193
https://portswigger.net/research/http2
https://security.netapp.com/advisory/ntap-20210917-0004/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ
https://ubuntu.com/security/notices/USN-5090-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.tenable.com/security/tns-2021-17
apache2 CVE-2021-34798 MEDIUM 2.4.41-4ubuntu3.3 2.4.41-4ubuntu3.5
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
https://access.redhat.com/security/cve/CVE-2021-34798
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34798
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-34798
https://kc.mcafee.com/corporate/index?page=content&id=SB10379
https://linux.oracle.com/cve/CVE-2021-34798.html
https://linux.oracle.com/errata/ELSA-2022-9005.html
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
https://lists.fedoraproject.org/archives/list/[email protected]/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
https://nvd.nist.gov/vuln/detail/CVE-2021-34798
https://security.netapp.com/advisory/ntap-20211008-0004/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ
https://ubuntu.com/security/notices/USN-5090-1
https://ubuntu.com/security/notices/USN-5090-2
https://www.debian.org/security/2021/dsa-4982
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.tenable.com/security/tns-2021-17
apache2 CVE-2021-36160 MEDIUM 2.4.41-4ubuntu3.3 2.4.41-4ubuntu3.5
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
https://access.redhat.com/security/cve/CVE-2021-36160
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36160
https://errata.almalinux.org/8/ALSA-2022-1915.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-36160
https://linux.oracle.com/cve/CVE-2021-36160.html
https://linux.oracle.com/errata/ELSA-2022-1915.html
https://lists.apache.org/thread.html/[email protected]%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00016.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00016.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
https://lists.fedoraproject.org/archives/list/[email protected]/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
https://nvd.nist.gov/vuln/detail/CVE-2021-36160
https://security.netapp.com/advisory/ntap-20211008-0004/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ
https://ubuntu.com/security/notices/USN-5090-1
https://www.debian.org/security/2021/dsa-4982
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
apache2 CVE-2021-39275 MEDIUM 2.4.41-4ubuntu3.3 2.4.41-4ubuntu3.5
Expand...https://access.redhat.com/security/cve/CVE-2021-39275
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39275
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-39275
https://linux.oracle.com/cve/CVE-2021-39275.html
https://linux.oracle.com/errata/ELSA-2022-9005.html
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
https://lists.fedoraproject.org/archives/list/[email protected]/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
https://nvd.nist.gov/vuln/detail/CVE-2021-39275
https://security.netapp.com/advisory/ntap-20211008-0004/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ
https://ubuntu.com/security/notices/USN-5090-1
https://ubuntu.com/security/notices/USN-5090-2
https://www.debian.org/security/2021/dsa-4982
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
apache2 CVE-2021-40438 MEDIUM 2.4.41-4ubuntu3.3 2.4.41-4ubuntu3.6
Expand...https://access.redhat.com/security/cve/CVE-2021-40438
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40438
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-40438
https://linux.oracle.com/cve/CVE-2021-40438.html
https://linux.oracle.com/errata/ELSA-2021-3856.html
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
https://lists.fedoraproject.org/archives/list/[email protected]/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
https://nvd.nist.gov/vuln/detail/CVE-2021-40438
https://security.netapp.com/advisory/ntap-20211008-0004/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ
https://ubuntu.com/security/notices/USN-5090-1
https://ubuntu.com/security/notices/USN-5090-2
https://ubuntu.com/security/notices/USN-5090-2 (regression update esm)
https://ubuntu.com/security/notices/USN-5090-3 (regression update)
https://www.debian.org/security/2021/dsa-4982
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.tenable.com/security/tns-2021-17
apache2 CVE-2021-44224 MEDIUM 2.4.41-4ubuntu3.3 2.4.41-4ubuntu3.9
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2021/12/20/3
https://access.redhat.com/security/cve/CVE-2021-44224
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44224
https://errata.almalinux.org/8/ALSA-2022-1915.html
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2021-44224.html
https://linux.oracle.com/errata/ELSA-2022-1915.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/
https://lists.fedoraproject.org/archives/list/[email protected]/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://nvd.nist.gov/vuln/detail/CVE-2021-44224
https://security.netapp.com/advisory/ntap-20211224-0001/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5212-1
https://ubuntu.com/security/notices/USN-5212-2
https://www.debian.org/security/2022/dsa-5035
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.tenable.com/security/tns-2022-01
https://www.tenable.com/security/tns-2022-03
apache2 CVE-2021-44790 MEDIUM 2.4.41-4ubuntu3.3 2.4.41-4ubuntu3.9
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2021/12/20/4
https://access.redhat.com/security/cve/CVE-2021-44790
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44790
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2021-44790.html
https://linux.oracle.com/errata/ELSA-2022-0258.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/
https://lists.fedoraproject.org/archives/list/[email protected]/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://nvd.nist.gov/vuln/detail/CVE-2021-44790
https://security.netapp.com/advisory/ntap-20211224-0001/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5212-1
https://ubuntu.com/security/notices/USN-5212-2
https://www.debian.org/security/2022/dsa-5035
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.tenable.com/security/tns-2022-01
https://www.tenable.com/security/tns-2022-03
apache2 CVE-2022-22719 MEDIUM 2.4.41-4ubuntu3.3 2.4.41-4ubuntu3.10
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/14/4
https://access.redhat.com/security/cve/CVE-2022-22719
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22719
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719
https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://nvd.nist.gov/vuln/detail/CVE-2022-22719
https://security.netapp.com/advisory/ntap-20220321-0001/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5333-1
https://ubuntu.com/security/notices/USN-5333-2
https://www.oracle.com/security-alerts/cpuapr2022.html
apache2 CVE-2022-22720 MEDIUM 2.4.41-4ubuntu3.3 2.4.41-4ubuntu3.10
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/14/3
https://access.redhat.com/security/cve/CVE-2022-22720
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22720
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720
https://linux.oracle.com/cve/CVE-2022-22720.html
https://linux.oracle.com/errata/ELSA-2022-9257.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://nvd.nist.gov/vuln/detail/CVE-2022-22720
https://security.netapp.com/advisory/ntap-20220321-0001/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5333-1
https://ubuntu.com/security/notices/USN-5333-2
https://www.oracle.com/security-alerts/cpuapr2022.html
apache2 CVE-2022-23943 MEDIUM 2.4.41-4ubuntu3.3 2.4.41-4ubuntu3.10
Expand...http://www.openwall.com/lists/oss-security/2022/03/14/1
https://access.redhat.com/security/cve/CVE-2022-23943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23943
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943
https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://nvd.nist.gov/vuln/detail/CVE-2022-23943
https://security.netapp.com/advisory/ntap-20220321-0001/
https://ubuntu.com/security/notices/USN-5333-1
https://ubuntu.com/security/notices/USN-5333-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.tenable.com/security/tns-2022-08
https://www.tenable.com/security/tns-2022-09
apache2 CVE-2022-22721 LOW 2.4.41-4ubuntu3.3 2.4.41-4ubuntu3.10
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/14/2
https://access.redhat.com/security/cve/CVE-2022-22721
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22721
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721
https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://nvd.nist.gov/vuln/detail/CVE-2022-22721
https://security.netapp.com/advisory/ntap-20220321-0001/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5333-1
https://ubuntu.com/security/notices/USN-5333-2
https://www.oracle.com/security-alerts/cpuapr2022.html
apache2-bin CVE-2019-17567 MEDIUM 2.4.41-4ubuntu3.3
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
http://www.openwall.com/lists/oss-security/2021/06/10/2
https://access.redhat.com/security/cve/CVE-2019-17567
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17567
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-17567
https://lists.apache.org/thread.html/[email protected]%3Cdev.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cannounce.httpd.apache.org%3E
https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E
https://lists.fedoraproject.org/archives/list/[email protected]/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
https://lists.fedoraproject.org/archives/list/[email protected]/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
https://nvd.nist.gov/vuln/detail/CVE-2019-17567
https://security.gentoo.org/glsa/202107-38
https://security.netapp.com/advisory/ntap-20210702-0001/
https://www.oracle.com/security-alerts/cpuoct2021.html
apache2-bin CVE-2021-33193 MEDIUM 2.4.41-4ubuntu3.3 2.4.41-4ubuntu3.5
Expand...https://access.redhat.com/security/cve/CVE-2021-33193
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33193
https://errata.almalinux.org/8/ALSA-2022-1915.html
https://github.com/apache/httpd/commit/ecebcc035ccd8d0e2984fe41420d9e944f456b3c.patch
https://linux.oracle.com/cve/CVE-2021-33193.html
https://linux.oracle.com/errata/ELSA-2022-9276.html
https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E
https://lists.fedoraproject.org/archives/list/[email protected]/message/DSM6UWQICBJ2TU727RENU3HBKEAFLT6T/
https://lists.fedoraproject.org/archives/list/[email protected]/message/EUVJVRJRBW5QVX4OY3NOHZDQ3B3YOTSG/
https://nvd.nist.gov/vuln/detail/CVE-2021-33193
https://portswigger.net/research/http2
https://security.netapp.com/advisory/ntap-20210917-0004/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ
https://ubuntu.com/security/notices/USN-5090-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.tenable.com/security/tns-2021-17
apache2-bin CVE-2021-34798 MEDIUM 2.4.41-4ubuntu3.3 2.4.41-4ubuntu3.5
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
https://access.redhat.com/security/cve/CVE-2021-34798
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34798
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-34798
https://kc.mcafee.com/corporate/index?page=content&id=SB10379
https://linux.oracle.com/cve/CVE-2021-34798.html
https://linux.oracle.com/errata/ELSA-2022-9005.html
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
https://lists.fedoraproject.org/archives/list/[email protected]/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
https://nvd.nist.gov/vuln/detail/CVE-2021-34798
https://security.netapp.com/advisory/ntap-20211008-0004/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ
https://ubuntu.com/security/notices/USN-5090-1
https://ubuntu.com/security/notices/USN-5090-2
https://www.debian.org/security/2021/dsa-4982
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.tenable.com/security/tns-2021-17
apache2-bin CVE-2021-36160 MEDIUM 2.4.41-4ubuntu3.3 2.4.41-4ubuntu3.5
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
https://access.redhat.com/security/cve/CVE-2021-36160
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36160
https://errata.almalinux.org/8/ALSA-2022-1915.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-36160
https://linux.oracle.com/cve/CVE-2021-36160.html
https://linux.oracle.com/errata/ELSA-2022-1915.html
https://lists.apache.org/thread.html/[email protected]%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00016.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00016.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
https://lists.fedoraproject.org/archives/list/[email protected]/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
https://nvd.nist.gov/vuln/detail/CVE-2021-36160
https://security.netapp.com/advisory/ntap-20211008-0004/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ
https://ubuntu.com/security/notices/USN-5090-1
https://www.debian.org/security/2021/dsa-4982
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
apache2-bin CVE-2021-39275 MEDIUM 2.4.41-4ubuntu3.3 2.4.41-4ubuntu3.5
Expand...https://access.redhat.com/security/cve/CVE-2021-39275
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39275
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-39275
https://linux.oracle.com/cve/CVE-2021-39275.html
https://linux.oracle.com/errata/ELSA-2022-9005.html
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
https://lists.fedoraproject.org/archives/list/[email protected]/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
https://nvd.nist.gov/vuln/detail/CVE-2021-39275
https://security.netapp.com/advisory/ntap-20211008-0004/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ
https://ubuntu.com/security/notices/USN-5090-1
https://ubuntu.com/security/notices/USN-5090-2
https://www.debian.org/security/2021/dsa-4982
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
apache2-bin CVE-2021-40438 MEDIUM 2.4.41-4ubuntu3.3 2.4.41-4ubuntu3.6
Expand...https://access.redhat.com/security/cve/CVE-2021-40438
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40438
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-40438
https://linux.oracle.com/cve/CVE-2021-40438.html
https://linux.oracle.com/errata/ELSA-2021-3856.html
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
https://lists.fedoraproject.org/archives/list/[email protected]/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
https://nvd.nist.gov/vuln/detail/CVE-2021-40438
https://security.netapp.com/advisory/ntap-20211008-0004/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ
https://ubuntu.com/security/notices/USN-5090-1
https://ubuntu.com/security/notices/USN-5090-2
https://ubuntu.com/security/notices/USN-5090-2 (regression update esm)
https://ubuntu.com/security/notices/USN-5090-3 (regression update)
https://www.debian.org/security/2021/dsa-4982
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.tenable.com/security/tns-2021-17
apache2-bin CVE-2021-44224 MEDIUM 2.4.41-4ubuntu3.3 2.4.41-4ubuntu3.9
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2021/12/20/3
https://access.redhat.com/security/cve/CVE-2021-44224
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44224
https://errata.almalinux.org/8/ALSA-2022-1915.html
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2021-44224.html
https://linux.oracle.com/errata/ELSA-2022-1915.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/
https://lists.fedoraproject.org/archives/list/[email protected]/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://nvd.nist.gov/vuln/detail/CVE-2021-44224
https://security.netapp.com/advisory/ntap-20211224-0001/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5212-1
https://ubuntu.com/security/notices/USN-5212-2
https://www.debian.org/security/2022/dsa-5035
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.tenable.com/security/tns-2022-01
https://www.tenable.com/security/tns-2022-03
apache2-bin CVE-2021-44790 MEDIUM 2.4.41-4ubuntu3.3 2.4.41-4ubuntu3.9
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2021/12/20/4
https://access.redhat.com/security/cve/CVE-2021-44790
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44790
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2021-44790.html
https://linux.oracle.com/errata/ELSA-2022-0258.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/
https://lists.fedoraproject.org/archives/list/[email protected]/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://nvd.nist.gov/vuln/detail/CVE-2021-44790
https://security.netapp.com/advisory/ntap-20211224-0001/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5212-1
https://ubuntu.com/security/notices/USN-5212-2
https://www.debian.org/security/2022/dsa-5035
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.tenable.com/security/tns-2022-01
https://www.tenable.com/security/tns-2022-03
apache2-bin CVE-2022-22719 MEDIUM 2.4.41-4ubuntu3.3 2.4.41-4ubuntu3.10
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/14/4
https://access.redhat.com/security/cve/CVE-2022-22719
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22719
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719
https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://nvd.nist.gov/vuln/detail/CVE-2022-22719
https://security.netapp.com/advisory/ntap-20220321-0001/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5333-1
https://ubuntu.com/security/notices/USN-5333-2
https://www.oracle.com/security-alerts/cpuapr2022.html
apache2-bin CVE-2022-22720 MEDIUM 2.4.41-4ubuntu3.3 2.4.41-4ubuntu3.10
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/14/3
https://access.redhat.com/security/cve/CVE-2022-22720
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22720
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720
https://linux.oracle.com/cve/CVE-2022-22720.html
https://linux.oracle.com/errata/ELSA-2022-9257.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://nvd.nist.gov/vuln/detail/CVE-2022-22720
https://security.netapp.com/advisory/ntap-20220321-0001/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5333-1
https://ubuntu.com/security/notices/USN-5333-2
https://www.oracle.com/security-alerts/cpuapr2022.html
apache2-bin CVE-2022-23943 MEDIUM 2.4.41-4ubuntu3.3 2.4.41-4ubuntu3.10
Expand...http://www.openwall.com/lists/oss-security/2022/03/14/1
https://access.redhat.com/security/cve/CVE-2022-23943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23943
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943
https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://nvd.nist.gov/vuln/detail/CVE-2022-23943
https://security.netapp.com/advisory/ntap-20220321-0001/
https://ubuntu.com/security/notices/USN-5333-1
https://ubuntu.com/security/notices/USN-5333-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.tenable.com/security/tns-2022-08
https://www.tenable.com/security/tns-2022-09
apache2-bin CVE-2022-22721 LOW 2.4.41-4ubuntu3.3 2.4.41-4ubuntu3.10
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/14/2
https://access.redhat.com/security/cve/CVE-2022-22721
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22721
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721
https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://nvd.nist.gov/vuln/detail/CVE-2022-22721
https://security.netapp.com/advisory/ntap-20220321-0001/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5333-1
https://ubuntu.com/security/notices/USN-5333-2
https://www.oracle.com/security-alerts/cpuapr2022.html
apache2-data CVE-2019-17567 MEDIUM 2.4.41-4ubuntu3.3
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
http://www.openwall.com/lists/oss-security/2021/06/10/2
https://access.redhat.com/security/cve/CVE-2019-17567
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17567
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-17567
https://lists.apache.org/thread.html/[email protected]%3Cdev.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cannounce.httpd.apache.org%3E
https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E
https://lists.fedoraproject.org/archives/list/[email protected]/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
https://lists.fedoraproject.org/archives/list/[email protected]/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
https://nvd.nist.gov/vuln/detail/CVE-2019-17567
https://security.gentoo.org/glsa/202107-38
https://security.netapp.com/advisory/ntap-20210702-0001/
https://www.oracle.com/security-alerts/cpuoct2021.html
apache2-data CVE-2021-33193 MEDIUM 2.4.41-4ubuntu3.3 2.4.41-4ubuntu3.5
Expand...https://access.redhat.com/security/cve/CVE-2021-33193
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33193
https://errata.almalinux.org/8/ALSA-2022-1915.html
https://github.com/apache/httpd/commit/ecebcc035ccd8d0e2984fe41420d9e944f456b3c.patch
https://linux.oracle.com/cve/CVE-2021-33193.html
https://linux.oracle.com/errata/ELSA-2022-9276.html
https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E
https://lists.fedoraproject.org/archives/list/[email protected]/message/DSM6UWQICBJ2TU727RENU3HBKEAFLT6T/
https://lists.fedoraproject.org/archives/list/[email protected]/message/EUVJVRJRBW5QVX4OY3NOHZDQ3B3YOTSG/
https://nvd.nist.gov/vuln/detail/CVE-2021-33193
https://portswigger.net/research/http2
https://security.netapp.com/advisory/ntap-20210917-0004/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ
https://ubuntu.com/security/notices/USN-5090-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.tenable.com/security/tns-2021-17
apache2-data CVE-2021-34798 MEDIUM 2.4.41-4ubuntu3.3 2.4.41-4ubuntu3.5
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
https://access.redhat.com/security/cve/CVE-2021-34798
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34798
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-34798
https://kc.mcafee.com/corporate/index?page=content&id=SB10379
https://linux.oracle.com/cve/CVE-2021-34798.html
https://linux.oracle.com/errata/ELSA-2022-9005.html
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
https://lists.fedoraproject.org/archives/list/[email protected]/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
https://nvd.nist.gov/vuln/detail/CVE-2021-34798
https://security.netapp.com/advisory/ntap-20211008-0004/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ
https://ubuntu.com/security/notices/USN-5090-1
https://ubuntu.com/security/notices/USN-5090-2
https://www.debian.org/security/2021/dsa-4982
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.tenable.com/security/tns-2021-17
apache2-data CVE-2021-36160 MEDIUM 2.4.41-4ubuntu3.3 2.4.41-4ubuntu3.5
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
https://access.redhat.com/security/cve/CVE-2021-36160
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36160
https://errata.almalinux.org/8/ALSA-2022-1915.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-36160
https://linux.oracle.com/cve/CVE-2021-36160.html
https://linux.oracle.com/errata/ELSA-2022-1915.html
https://lists.apache.org/thread.html/[email protected]%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00016.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00016.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
https://lists.fedoraproject.org/archives/list/[email protected]/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
https://nvd.nist.gov/vuln/detail/CVE-2021-36160
https://security.netapp.com/advisory/ntap-20211008-0004/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ
https://ubuntu.com/security/notices/USN-5090-1
https://www.debian.org/security/2021/dsa-4982
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
apache2-data CVE-2021-39275 MEDIUM 2.4.41-4ubuntu3.3 2.4.41-4ubuntu3.5
Expand...https://access.redhat.com/security/cve/CVE-2021-39275
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39275
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-39275
https://linux.oracle.com/cve/CVE-2021-39275.html
https://linux.oracle.com/errata/ELSA-2022-9005.html
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
https://lists.fedoraproject.org/archives/list/[email protected]/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
https://nvd.nist.gov/vuln/detail/CVE-2021-39275
https://security.netapp.com/advisory/ntap-20211008-0004/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ
https://ubuntu.com/security/notices/USN-5090-1
https://ubuntu.com/security/notices/USN-5090-2
https://www.debian.org/security/2021/dsa-4982
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
apache2-data CVE-2021-40438 MEDIUM 2.4.41-4ubuntu3.3 2.4.41-4ubuntu3.6
Expand...https://access.redhat.com/security/cve/CVE-2021-40438
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40438
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-40438
https://linux.oracle.com/cve/CVE-2021-40438.html
https://linux.oracle.com/errata/ELSA-2021-3856.html
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
https://lists.fedoraproject.org/archives/list/[email protected]/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
https://nvd.nist.gov/vuln/detail/CVE-2021-40438
https://security.netapp.com/advisory/ntap-20211008-0004/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ
https://ubuntu.com/security/notices/USN-5090-1
https://ubuntu.com/security/notices/USN-5090-2
https://ubuntu.com/security/notices/USN-5090-2 (regression update esm)
https://ubuntu.com/security/notices/USN-5090-3 (regression update)
https://www.debian.org/security/2021/dsa-4982
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.tenable.com/security/tns-2021-17
apache2-data CVE-2021-44224 MEDIUM 2.4.41-4ubuntu3.3 2.4.41-4ubuntu3.9
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2021/12/20/3
https://access.redhat.com/security/cve/CVE-2021-44224
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44224
https://errata.almalinux.org/8/ALSA-2022-1915.html
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2021-44224.html
https://linux.oracle.com/errata/ELSA-2022-1915.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/
https://lists.fedoraproject.org/archives/list/[email protected]/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/package-a[email protected]/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://nvd.nist.gov/vuln/detail/CVE-2021-44224
https://security.netapp.com/advisory/ntap-20211224-0001/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5212-1
https://ubuntu.com/security/notices/USN-5212-2
https://www.debian.org/security/2022/dsa-5035
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.tenable.com/security/tns-2022-01
https://www.tenable.com/security/tns-2022-03
apache2-data CVE-2021-44790 MEDIUM 2.4.41-4ubuntu3.3 2.4.41-4ubuntu3.9
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2021/12/20/4
https://access.redhat.com/security/cve/CVE-2021-44790
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44790
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2021-44790.html
https://linux.oracle.com/errata/ELSA-2022-0258.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/
https://lists.fedoraproject.org/archives/list/[email protected]/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://nvd.nist.gov/vuln/detail/CVE-2021-44790
https://security.netapp.com/advisory/ntap-20211224-0001/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5212-1
https://ubuntu.com/security/notices/USN-5212-2
https://www.debian.org/security/2022/dsa-5035
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.tenable.com/security/tns-2022-01
https://www.tenable.com/security/tns-2022-03
apache2-data CVE-2022-22719 MEDIUM 2.4.41-4ubuntu3.3 2.4.41-4ubuntu3.10
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/14/4
https://access.redhat.com/security/cve/CVE-2022-22719
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22719
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719
https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://nvd.nist.gov/vuln/detail/CVE-2022-22719
https://security.netapp.com/advisory/ntap-20220321-0001/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5333-1
https://ubuntu.com/security/notices/USN-5333-2
https://www.oracle.com/security-alerts/cpuapr2022.html
apache2-data CVE-2022-22720 MEDIUM 2.4.41-4ubuntu3.3 2.4.41-4ubuntu3.10
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/14/3
https://access.redhat.com/security/cve/CVE-2022-22720
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22720
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720
https://linux.oracle.com/cve/CVE-2022-22720.html
https://linux.oracle.com/errata/ELSA-2022-9257.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://nvd.nist.gov/vuln/detail/CVE-2022-22720
https://security.netapp.com/advisory/ntap-20220321-0001/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5333-1
https://ubuntu.com/security/notices/USN-5333-2
https://www.oracle.com/security-alerts/cpuapr2022.html
apache2-data CVE-2022-23943 MEDIUM 2.4.41-4ubuntu3.3 2.4.41-4ubuntu3.10
Expand...http://www.openwall.com/lists/oss-security/2022/03/14/1
https://access.redhat.com/security/cve/CVE-2022-23943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23943
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943
https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://nvd.nist.gov/vuln/detail/CVE-2022-23943
https://security.netapp.com/advisory/ntap-20220321-0001/
https://ubuntu.com/security/notices/USN-5333-1
https://ubuntu.com/security/notices/USN-5333-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.tenable.com/security/tns-2022-08
https://www.tenable.com/security/tns-2022-09
apache2-data CVE-2022-22721 LOW 2.4.41-4ubuntu3.3 2.4.41-4ubuntu3.10
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/14/2
https://access.redhat.com/security/cve/CVE-2022-22721
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22721
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721
https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://nvd.nist.gov/vuln/detail/CVE-2022-22721
https://security.netapp.com/advisory/ntap-20220321-0001/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5333-1
https://ubuntu.com/security/notices/USN-5333-2
https://www.oracle.com/security-alerts/cpuapr2022.html
apache2-utils CVE-2019-17567 MEDIUM 2.4.41-4ubuntu3.3
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
http://www.openwall.com/lists/oss-security/2021/06/10/2
https://access.redhat.com/security/cve/CVE-2019-17567
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17567
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-17567
https://lists.apache.org/thread.html/[email protected]%3Cdev.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cannounce.httpd.apache.org%3E
https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E
https://lists.fedoraproject.org/archives/list/[email protected]/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
https://lists.fedoraproject.org/archives/list/[email protected]/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
https://nvd.nist.gov/vuln/detail/CVE-2019-17567
https://security.gentoo.org/glsa/202107-38
https://security.netapp.com/advisory/ntap-20210702-0001/
https://www.oracle.com/security-alerts/cpuoct2021.html
apache2-utils CVE-2021-33193 MEDIUM 2.4.41-4ubuntu3.3 2.4.41-4ubuntu3.5
Expand...https://access.redhat.com/security/cve/CVE-2021-33193
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33193
https://errata.almalinux.org/8/ALSA-2022-1915.html
https://github.com/apache/httpd/commit/ecebcc035ccd8d0e2984fe41420d9e944f456b3c.patch
https://linux.oracle.com/cve/CVE-2021-33193.html
https://linux.oracle.com/errata/ELSA-2022-9276.html
https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E
https://lists.fedoraproject.org/archives/list/[email protected]/message/DSM6UWQICBJ2TU727RENU3HBKEAFLT6T/
https://lists.fedoraproject.org/archives/list/[email protected]/message/EUVJVRJRBW5QVX4OY3NOHZDQ3B3YOTSG/
https://nvd.nist.gov/vuln/detail/CVE-2021-33193
https://portswigger.net/research/http2
https://security.netapp.com/advisory/ntap-20210917-0004/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ
https://ubuntu.com/security/notices/USN-5090-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.tenable.com/security/tns-2021-17
apache2-utils CVE-2021-34798 MEDIUM 2.4.41-4ubuntu3.3 2.4.41-4ubuntu3.5
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
https://access.redhat.com/security/cve/CVE-2021-34798
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34798
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-34798
https://kc.mcafee.com/corporate/index?page=content&id=SB10379
https://linux.oracle.com/cve/CVE-2021-34798.html
https://linux.oracle.com/errata/ELSA-2022-9005.html
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
https://lists.fedoraproject.org/archives/list/[email protected]/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
https://nvd.nist.gov/vuln/detail/CVE-2021-34798
https://security.netapp.com/advisory/ntap-20211008-0004/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ
https://ubuntu.com/security/notices/USN-5090-1
https://ubuntu.com/security/notices/USN-5090-2
https://www.debian.org/security/2021/dsa-4982
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.tenable.com/security/tns-2021-17
apache2-utils CVE-2021-36160 MEDIUM 2.4.41-4ubuntu3.3 2.4.41-4ubuntu3.5
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
https://access.redhat.com/security/cve/CVE-2021-36160
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36160
https://errata.almalinux.org/8/ALSA-2022-1915.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-36160
https://linux.oracle.com/cve/CVE-2021-36160.html
https://linux.oracle.com/errata/ELSA-2022-1915.html
https://lists.apache.org/thread.html/[email protected]%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00016.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00016.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
https://lists.fedoraproject.org/archives/list/[email protected]/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
https://nvd.nist.gov/vuln/detail/CVE-2021-36160
https://security.netapp.com/advisory/ntap-20211008-0004/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ
https://ubuntu.com/security/notices/USN-5090-1
https://www.debian.org/security/2021/dsa-4982
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
apache2-utils CVE-2021-39275 MEDIUM 2.4.41-4ubuntu3.3 2.4.41-4ubuntu3.5
Expand...https://access.redhat.com/security/cve/CVE-2021-39275
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39275
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-39275
https://linux.oracle.com/cve/CVE-2021-39275.html
https://linux.oracle.com/errata/ELSA-2022-9005.html
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
https://lists.fedoraproject.org/archives/list/[email protected]/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
https://nvd.nist.gov/vuln/detail/CVE-2021-39275
https://security.netapp.com/advisory/ntap-20211008-0004/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ
https://ubuntu.com/security/notices/USN-5090-1
https://ubuntu.com/security/notices/USN-5090-2
https://www.debian.org/security/2021/dsa-4982
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
apache2-utils CVE-2021-40438 MEDIUM 2.4.41-4ubuntu3.3 2.4.41-4ubuntu3.6
Expand...https://access.redhat.com/security/cve/CVE-2021-40438
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40438
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-40438
https://linux.oracle.com/cve/CVE-2021-40438.html
https://linux.oracle.com/errata/ELSA-2021-3856.html
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
https://lists.fedoraproject.org/archives/list/[email protected]/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
https://nvd.nist.gov/vuln/detail/CVE-2021-40438
https://security.netapp.com/advisory/ntap-20211008-0004/
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ
https://ubuntu.com/security/notices/USN-5090-1
https://ubuntu.com/security/notices/USN-5090-2
https://ubuntu.com/security/notices/USN-5090-2 (regression update esm)
https://ubuntu.com/security/notices/USN-5090-3 (regression update)
https://www.debian.org/security/2021/dsa-4982
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.tenable.com/security/tns-2021-17
apache2-utils CVE-2021-44224 MEDIUM 2.4.41-4ubuntu3.3 2.4.41-4ubuntu3.9
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2021/12/20/3
https://access.redhat.com/security/cve/CVE-2021-44224
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44224
https://errata.almalinux.org/8/ALSA-2022-1915.html
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2021-44224.html
https://linux.oracle.com/errata/ELSA-2022-1915.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/
https://lists.fedoraproject.org/archives/list/[email protected]/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://nvd.nist.gov/vuln/detail/CVE-2021-44224
https://security.netapp.com/advisory/ntap-20211224-0001/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5212-1
https://ubuntu.com/security/notices/USN-5212-2
https://www.debian.org/security/2022/dsa-5035
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.tenable.com/security/tns-2022-01
https://www.tenable.com/security/tns-2022-03
apache2-utils CVE-2021-44790 MEDIUM 2.4.41-4ubuntu3.3 2.4.41-4ubuntu3.9
Expand...http://httpd.apache.org/security/vulnerabilities_24.html
http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2021/12/20/4
https://access.redhat.com/security/cve/CVE-2021-44790
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44790
https://httpd.apache.org/security/vulnerabilities_24.html
https://linux.oracle.com/cve/CVE-2021-44790.html
https://linux.oracle.com/errata/ELSA-2022-0258.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/
https://lists.fedoraproject.org/archives/list/[email protected]/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://nvd.nist.gov/vuln/detail/CVE-2021-44790
https://security.netapp.com/advisory/ntap-20211224-0001/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5212-1
https://ubuntu.com/security/notices/USN-5212-2
https://www.debian.org/security/2022/dsa-5035
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.tenable.com/security/tns-2022-01
https://www.tenable.com/security/tns-2022-03
apache2-utils CVE-2022-22719 MEDIUM 2.4.41-4ubuntu3.3 2.4.41-4ubuntu3.10
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/14/4
https://access.redhat.com/security/cve/CVE-2022-22719
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22719
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719
https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://nvd.nist.gov/vuln/detail/CVE-2022-22719
https://security.netapp.com/advisory/ntap-20220321-0001/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5333-1
https://ubuntu.com/security/notices/USN-5333-2
https://www.oracle.com/security-alerts/cpuapr2022.html
apache2-utils CVE-2022-22720 MEDIUM 2.4.41-4ubuntu3.3 2.4.41-4ubuntu3.10
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/14/3
https://access.redhat.com/security/cve/CVE-2022-22720
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22720
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720
https://linux.oracle.com/cve/CVE-2022-22720.html
https://linux.oracle.com/errata/ELSA-2022-9257.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://nvd.nist.gov/vuln/detail/CVE-2022-22720
https://security.netapp.com/advisory/ntap-20220321-0001/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5333-1
https://ubuntu.com/security/notices/USN-5333-2
https://www.oracle.com/security-alerts/cpuapr2022.html
apache2-utils CVE-2022-23943 MEDIUM 2.4.41-4ubuntu3.3 2.4.41-4ubuntu3.10
Expand...http://www.openwall.com/lists/oss-security/2022/03/14/1
https://access.redhat.com/security/cve/CVE-2022-23943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23943
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943
https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://nvd.nist.gov/vuln/detail/CVE-2022-23943
https://security.netapp.com/advisory/ntap-20220321-0001/
https://ubuntu.com/security/notices/USN-5333-1
https://ubuntu.com/security/notices/USN-5333-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.tenable.com/security/tns-2022-08
https://www.tenable.com/security/tns-2022-09
apache2-utils CVE-2022-22721 LOW 2.4.41-4ubuntu3.3 2.4.41-4ubuntu3.10
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
http://www.openwall.com/lists/oss-security/2022/03/14/2
https://access.redhat.com/security/cve/CVE-2022-22721
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22721
https://httpd.apache.org/security/vulnerabilities_24.html
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721
https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
https://lists.fedoraproject.org/archives/list/[email protected]/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
https://nvd.nist.gov/vuln/detail/CVE-2022-22721
https://security.netapp.com/advisory/ntap-20220321-0001/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5333-1
https://ubuntu.com/security/notices/USN-5333-2
https://www.oracle.com/security-alerts/cpuapr2022.html
bash CVE-2019-18276 LOW 5.0-6ubuntu1.1 5.0-6ubuntu1.2
Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://access.redhat.com/security/cve/CVE-2019-18276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/[email protected]%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-18276
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://ubuntu.com/security/notices/USN-5380-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.youtube.com/watch?v=-wGtxJ8opa8
bsdutils CVE-2021-3995 MEDIUM 2.34-0.1ubuntu9.1 2.34-0.1ubuntu9.3
Expand...https://access.redhat.com/security/cve/CVE-2021-3995
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
bsdutils CVE-2021-3996 MEDIUM 2.34-0.1ubuntu9.1 2.34-0.1ubuntu9.3
Expand...https://access.redhat.com/security/cve/CVE-2021-3996
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
coreutils CVE-2016-2781 LOW 8.30-3ubuntu2
Expand...http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://access.redhat.com/security/cve/CVE-2016-2781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/[email protected]%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
https://nvd.nist.gov/vuln/detail/CVE-2016-2781
curl CVE-2021-22924 MEDIUM 7.68.0-1ubuntu2.5 7.68.0-1ubuntu2.6
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/[email protected]%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
curl CVE-2021-22925 MEDIUM 7.68.0-1ubuntu2.5 7.68.0-1ubuntu2.6
Expand...http://seclists.org/fulldisclosure/2021/Sep/39
http://seclists.org/fulldisclosure/2021/Sep/40
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22925.json
https://access.redhat.com/security/cve/CVE-2021-22925
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22925.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22925
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://hackerone.com/reports/1223882
https://linux.oracle.com/cve/CVE-2021-22925.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22925
https://security.netapp.com/advisory/ntap-20210902-0003/
https://support.apple.com/kb/HT212804
https://support.apple.com/kb/HT212805
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
curl CVE-2021-22946 MEDIUM 7.68.0-1ubuntu2.5 7.68.0-1ubuntu2.7
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/[email protected]/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
curl CVE-2021-22947 MEDIUM 7.68.0-1ubuntu2.5 7.68.0-1ubuntu2.7
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/[email protected]/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
curl CVE-2022-22576 MEDIUM 7.68.0-1ubuntu2.5 7.68.0-1ubuntu2.10
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
curl CVE-2022-27774 MEDIUM 7.68.0-1ubuntu2.5 7.68.0-1ubuntu2.10
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
curl CVE-2022-27782 MEDIUM 7.68.0-1ubuntu2.5 7.68.0-1ubuntu2.11
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://ubuntu.com/security/notices/USN-5412-1
curl CVE-2021-22898 LOW 7.68.0-1ubuntu2.5 7.68.0-1ubuntu2.6
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/[email protected]%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/[email protected]/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
curl CVE-2022-27775 LOW 7.68.0-1ubuntu2.5 7.68.0-1ubuntu2.10
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
curl CVE-2022-27776 LOW 7.68.0-1ubuntu2.5 7.68.0-1ubuntu2.10
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
curl CVE-2022-27781 LOW 7.68.0-1ubuntu2.5 7.68.0-1ubuntu2.11
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://ubuntu.com/security/notices/USN-5412-1
e2fsprogs CVE-2022-1304 MEDIUM 1.45.5-2ubuntu1
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
fdisk CVE-2021-3995 MEDIUM 2.34-0.1ubuntu9.1 2.34-0.1ubuntu9.3
Expand...https://access.redhat.com/security/cve/CVE-2021-3995
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
fdisk CVE-2021-3996 MEDIUM 2.34-0.1ubuntu9.1 2.34-0.1ubuntu9.3
Expand...https://access.redhat.com/security/cve/CVE-2021-3996
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
gzip CVE-2022-1271 MEDIUM 1.10-0ubuntu4 1.10-0ubuntu4.1
Expand...https://access.redhat.com/security/cve/CVE-2022-1271
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271
https://errata.almalinux.org/8/ALSA-2022-1537.html
https://linux.oracle.com/cve/CVE-2022-1271.html
https://linux.oracle.com/errata/ELSA-2022-2191.html
https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html
https://ubuntu.com/security/notices/USN-5378-1
https://ubuntu.com/security/notices/USN-5378-2
https://ubuntu.com/security/notices/USN-5378-3
https://ubuntu.com/security/notices/USN-5378-4
https://www.openwall.com/lists/oss-security/2022/04/07/8
libarchive13 CVE-2021-36976 MEDIUM 3.4.0-2ubuntu1 3.4.0-2ubuntu1.1
Expand...http://seclists.org/fulldisclosure/2022/Mar/27
http://seclists.org/fulldisclosure/2022/Mar/28
http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-36976
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32375
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36976
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libarchive/OSV-2021-557.yaml
https://lists.fedoraproject.org/archives/list/[email protected]/message/SE5NJQNM22ZE5Z55LPAGCUHSBQZBKMKC/
https://nvd.nist.gov/vuln/detail/CVE-2021-36976
https://support.apple.com/kb/HT213182
https://support.apple.com/kb/HT213183
https://support.apple.com/kb/HT213193
https://ubuntu.com/security/notices/USN-5291-1
libarchive13 CVE-2022-26280 MEDIUM 3.4.0-2ubuntu1 3.4.0-2ubuntu1.2
Expand...https://access.redhat.com/security/cve/CVE-2022-26280
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26280
https://github.com/libarchive/libarchive/issues/1672
https://nvd.nist.gov/vuln/detail/CVE-2022-26280
https://ubuntu.com/security/notices/USN-5374-1
libarchive13 CVE-2021-23177 LOW 3.4.0-2ubuntu1 3.4.0-2ubuntu1.1
Expand...https://access.redhat.com/security/cve/CVE-2021-23177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23177
https://errata.almalinux.org/8/ALSA-2022-0892.html
https://linux.oracle.com/cve/CVE-2021-23177.html
https://linux.oracle.com/errata/ELSA-2022-0892.html
https://ubuntu.com/security/notices/USN-5291-1
libarchive13 CVE-2021-31566 LOW 3.4.0-2ubuntu1 3.4.0-2ubuntu1.1
Expand...https://access.redhat.com/security/cve/CVE-2021-31566
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31566
https://errata.almalinux.org/8/ALSA-2022-0892.html
https://linux.oracle.com/cve/CVE-2021-31566.html
https://linux.oracle.com/errata/ELSA-2022-0892.html
https://ubuntu.com/security/notices/USN-5291-1
libasn1-8-heimdal CVE-2021-3671 LOW 7.7.0+dfsg-1ubuntu1
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
libblkid1 CVE-2021-3995 MEDIUM 2.34-0.1ubuntu9.1 2.34-0.1ubuntu9.3
Expand...https://access.redhat.com/security/cve/CVE-2021-3995
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
libblkid1 CVE-2021-3996 MEDIUM 2.34-0.1ubuntu9.1 2.34-0.1ubuntu9.3
Expand...https://access.redhat.com/security/cve/CVE-2021-3996
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
libc-bin CVE-2021-3999 MEDIUM 2.31-0ubuntu9.2 2.31-0ubuntu9.7
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
libc-bin CVE-2016-10228 LOW 2.31-0ubuntu9.2 2.31-0ubuntu9.7
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/[email protected]%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
libc-bin CVE-2019-25013 LOW 2.31-0ubuntu9.2 2.31-0ubuntu9.7
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/[email protected]%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/[email protected]/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/[email protected]/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
libc-bin CVE-2020-27618 LOW 2.31-0ubuntu9.2 2.31-0ubuntu9.7
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
libc-bin CVE-2020-29562 LOW 2.31-0ubuntu9.2 2.31-0ubuntu9.7
Expand...https://access.redhat.com/security/cve/CVE-2020-29562
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562
https://lists.apache.org/thread.html/[email protected]%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/[email protected]/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20210122-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=26923
https://sourceware.org/pipermail/libc-alpha/2020-November/119822.html
https://ubuntu.com/security/notices/USN-5310-1
libc-bin CVE-2020-6096 LOW 2.31-0ubuntu9.2 2.31-0ubuntu9.7
Expand...https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/[email protected]%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/[email protected]/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/[email protected]/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
libc-bin CVE-2021-27645 LOW 2.31-0ubuntu9.2 2.31-0ubuntu9.7
Expand...https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/[email protected]/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
libc-bin CVE-2021-3326 LOW 2.31-0ubuntu9.2 2.31-0ubuntu9.7
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
libc-bin CVE-2021-35942 LOW 2.31-0ubuntu9.2 2.31-0ubuntu9.7
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
libc-bin CVE-2022-23218 LOW 2.31-0ubuntu9.2 2.31-0ubuntu9.7
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9358.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
libc-bin CVE-2022-23219 LOW 2.31-0ubuntu9.2 2.31-0ubuntu9.7
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9358.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
libc6 CVE-2021-3999 MEDIUM 2.31-0ubuntu9.2 2.31-0ubuntu9.7
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.openwall.com/lists/oss-security/2022/01/24/4
libc6 CVE-2016-10228 LOW 2.31-0ubuntu9.2 2.31-0ubuntu9.7
Expand...http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/[email protected]%3Cdev.mina.apache.org%3E
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
libc6 CVE-2019-25013 LOW 2.31-0ubuntu9.2 2.31-0ubuntu9.7
Expand...https://access.redhat.com/security/cve/CVE-2019-25013
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013
https://linux.oracle.com/cve/CVE-2019-25013.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/[email protected]%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/[email protected]/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/[email protected]/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://nvd.nist.gov/vuln/detail/CVE-2019-25013
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210205-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=24973
https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
libc6 CVE-2020-27618 LOW 2.31-0ubuntu9.2 2.31-0ubuntu9.7
Expand...https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
libc6 CVE-2020-29562 LOW 2.31-0ubuntu9.2 2.31-0ubuntu9.7
Expand...https://access.redhat.com/security/cve/CVE-2020-29562
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff04[email protected]%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/[email protected]/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20210122-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=26923
https://sourceware.org/pipermail/libc-alpha/2020-November/119822.html
https://ubuntu.com/security/notices/USN-5310-1
libc6 CVE-2020-6096 LOW 2.31-0ubuntu9.2 2.31-0ubuntu9.7
Expand...https://access.redhat.com/security/cve/CVE-2020-6096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096
https://lists.apache.org/thread.html/[email protected]%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/[email protected]/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/
https://lists.fedoraproject.org/archives/list/[email protected]/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/
https://nvd.nist.gov/vuln/detail/CVE-2020-6096
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/attachment.cgi?id=12334
https://sourceware.org/bugzilla/show_bug.cgi?id=25620
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1019
https://ubuntu.com/security/notices/USN-4954-1
https://ubuntu.com/security/notices/USN-5310-1
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
libc6 CVE-2021-27645 LOW 2.31-0ubuntu9.2 2.31-0ubuntu9.7
Expand...https://access.redhat.com/security/cve/CVE-2021-27645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645
https://linux.oracle.com/cve/CVE-2021-27645.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/
https://lists.fedoraproject.org/archives/list/[email protected]/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/
https://sourceware.org/bugzilla/show_bug.cgi?id=27462
https://ubuntu.com/security/notices/USN-5310-1
libc6 CVE-2021-3326 LOW 2.31-0ubuntu9.2 2.31-0ubuntu9.7
Expand...http://www.openwall.com/lists/oss-security/2021/01/28/2
https://access.redhat.com/security/cve/CVE-2021-3326
https://bugs.chromium.org/p/project-zero/issues/detail?id=2146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326
https://linux.oracle.com/cve/CVE-2021-3326.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3326
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210304-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
https://sourceware.org/git/?p=glibc.git;a=commit;h=7d88c6142c6efc160c0ee5e4f85cde382c072888
https://sourceware.org/pipermail/libc-alpha/2021-January/122058.html
https://ubuntu.com/security/notices/USN-5310-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
libc6 CVE-2021-35942 LOW 2.31-0ubuntu9.2 2.31-0ubuntu9.7
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
libc6 CVE-2022-23218 LOW 2.31-0ubuntu9.2 2.31-0ubuntu9.7
Expand...https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9358.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
libc6 CVE-2022-23219 LOW 2.31-0ubuntu9.2 2.31-0ubuntu9.7
Expand...https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9358.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
libcom-err2 CVE-2022-1304 MEDIUM 1.45.5-2ubuntu1
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
libcurl4 CVE-2021-22924 MEDIUM 7.68.0-1ubuntu2.5 7.68.0-1ubuntu2.6
Expand...https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/[email protected]%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libcurl4 CVE-2021-22925 MEDIUM 7.68.0-1ubuntu2.5 7.68.0-1ubuntu2.6
Expand...http://seclists.org/fulldisclosure/2021/Sep/39
http://seclists.org/fulldisclosure/2021/Sep/40
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22925.json
https://access.redhat.com/security/cve/CVE-2021-22925
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22925.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22925
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://hackerone.com/reports/1223882
https://linux.oracle.com/cve/CVE-2021-22925.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22925
https://security.netapp.com/advisory/ntap-20210902-0003/
https://support.apple.com/kb/HT212804
https://support.apple.com/kb/HT212805
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libcurl4 CVE-2021-22946 MEDIUM 7.68.0-1ubuntu2.5 7.68.0-1ubuntu2.7
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/[email protected]/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libcurl4 CVE-2021-22947 MEDIUM 7.68.0-1ubuntu2.5 7.68.0-1ubuntu2.7
Expand...http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/[email protected]/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libcurl4 CVE-2022-22576 MEDIUM 7.68.0-1ubuntu2.5 7.68.0-1ubuntu2.10
Expand...https://access.redhat.com/security/cve/CVE-2022-22576
https://curl.se/docs/CVE-2022-22576.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
https://ubuntu.com/security/notices/USN-5397-1
libcurl4 CVE-2022-27774 MEDIUM 7.68.0-1ubuntu2.5 7.68.0-1ubuntu2.10
Expand...https://access.redhat.com/security/cve/CVE-2022-27774
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://ubuntu.com/security/notices/USN-5397-1
libcurl4 CVE-2022-27782 MEDIUM 7.68.0-1ubuntu2.5 7.68.0-1ubuntu2.11
Expand...https://access.redhat.com/security/cve/CVE-2022-27782
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://ubuntu.com/security/notices/USN-5412-1
libcurl4 CVE-2021-22898 LOW 7.68.0-1ubuntu2.5 7.68.0-1ubuntu2.6
Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/[email protected]%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/[email protected]/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
libcurl4 CVE-2022-27775 LOW 7.68.0-1ubuntu2.5 7.68.0-1ubuntu2.10
Expand...https://access.redhat.com/security/cve/CVE-2022-27775
https://curl.se/docs/CVE-2022-27775.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
https://ubuntu.com/security/notices/USN-5397-1
libcurl4 CVE-2022-27776 LOW 7.68.0-1ubuntu2.5 7.68.0-1ubuntu2.10
Expand...https://access.redhat.com/security/cve/CVE-2022-27776
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://ubuntu.com/security/notices/USN-5397-1
libcurl4 CVE-2022-27781 LOW 7.68.0-1ubuntu2.5 7.68.0-1ubuntu2.11
Expand...https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://ubuntu.com/security/notices/USN-5412-1
libexpat1 CVE-2022-25235 HIGH 2.2.9-1build1 2.2.9-1ubuntu0.2
Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1
https://access.redhat.com/security/cve/CVE-2022-25235
https://blog.hartwork.org/posts/expat-2-4-5-released/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235
https://github.com/libexpat/libexpat/pull/562
https://github.com/libexpat/libexpat/pull/562/commits/367ae600b48d74261bbc339b17e9318424049791 (fix)
https://github.com/libexpat/libexpat/pull/562/commits/97cfdc3fa7dca759880d81e371901f4620279106 (tests)
https://linux.oracle.com/cve/CVE-2022-25235.html
https://linux.oracle.com/errata/ELSA-2022-9359.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
https://lists.fedoraproject.org/archives/list/[email protected]/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
https://nvd.nist.gov/vuln/detail/CVE-2022-25235
https://security.netapp.com/advisory/ntap-20220303-0008/
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5085
https://www.oracle.com/security-alerts/cpuapr2022.html
libexpat1 CVE-2022-25236 HIGH 2.2.9-1build1 2.2.9-1ubuntu0.2
Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1
https://access.redhat.com/security/cve/CVE-2022-25236
https://blog.hartwork.org/posts/expat-2-4-5-released/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236
https://github.com/libexpat/libexpat/pull/561
https://github.com/libexpat/libexpat/pull/561/commits/2de077423fb22750ebea599677d523b53cb93b1d (test)
https://github.com/libexpat/libexpat/pull/561/commits/a2fe525e660badd64b6c557c2b1ec26ddc07f6e4 (fix)
https://github.com/libexpat/libexpat/pull/577
https://linux.oracle.com/cve/CVE-2022-25236.html
https://linux.oracle.com/errata/ELSA-2022-9359.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
https://lists.fedoraproject.org/archives/list/[email protected]/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
https://nvd.nist.gov/vuln/detail/CVE-2022-25236
https://security.netapp.com/advisory/ntap-20220303-0008/
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5085
https://www.oracle.com/security-alerts/cpuapr2022.html
libexpat1 CVE-2021-46143 MEDIUM 2.2.9-1build1 2.2.9-1ubuntu0.2
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://access.redhat.com/security/cve/CVE-2021-46143
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46143
https://github.com/libexpat/libexpat/issues/532
https://github.com/libexpat/libexpat/pull/538
https://linux.oracle.com/cve/CVE-2021-46143.html
https://linux.oracle.com/errata/ELSA-2022-9227.html
https://nvd.nist.gov/vuln/detail/CVE-2021-46143
https://security.netapp.com/advisory/ntap-20220121-0006/
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
libexpat1 CVE-2022-22822 MEDIUM 2.2.9-1build1 2.2.9-1ubuntu0.2
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://access.redhat.com/security/cve/CVE-2022-22822
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22822
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22822.html
https://linux.oracle.com/errata/ELSA-2022-1069.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22822
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
libexpat1 CVE-2022-22823 MEDIUM 2.2.9-1build1 2.2.9-1ubuntu0.2
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://access.redhat.com/security/cve/CVE-2022-22823
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22823
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22823.html
https://linux.oracle.com/errata/ELSA-2022-1069.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22823
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
libexpat1 CVE-2022-22824 MEDIUM 2.2.9-1build1 2.2.9-1ubuntu0.2
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://access.redhat.com/security/cve/CVE-2022-22824
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22824
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22824.html
https://linux.oracle.com/errata/ELSA-2022-1069.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22824
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
libexpat1 CVE-2022-22825 MEDIUM 2.2.9-1build1 2.2.9-1ubuntu0.2
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://access.redhat.com/security/cve/CVE-2022-22825
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22825
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22825.html
https://linux.oracle.com/errata/ELSA-2022-1069.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22825
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
libexpat1 CVE-2022-22826 MEDIUM 2.2.9-1build1 2.2.9-1ubuntu0.2
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://access.redhat.com/security/cve/CVE-2022-22826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22826
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22826.html
https://linux.oracle.com/errata/ELSA-2022-1069.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22826
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
libexpat1 CVE-2022-22827 MEDIUM 2.2.9-1build1 2.2.9-1ubuntu0.2
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://access.redhat.com/security/cve/CVE-2022-22827
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22827
https://github.com/libexpat/libexpat/pull/539
https://linux.oracle.com/cve/CVE-2022-22827.html
https://linux.oracle.com/errata/ELSA-2022-1069.html
https://nvd.nist.gov/vuln/detail/CVE-2022-22827
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
libexpat1 CVE-2022-23852 MEDIUM 2.2.9-1build1 2.2.9-1ubuntu0.2
Expand...https://access.redhat.com/security/cve/CVE-2022-23852
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852
https://github.com/libexpat/libexpat/pull/550
https://linux.oracle.com/cve/CVE-2022-23852.html
https://linux.oracle.com/errata/ELSA-2022-1069.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23852
https://security.netapp.com/advisory/ntap-20220217-0001/
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.tenable.com/security/tns-2022-05
libexpat1 CVE-2022-23990 MEDIUM 2.2.9-1build1 2.2.9-1ubuntu0.2
Expand...https://access.redhat.com/security/cve/CVE-2022-23990
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990
https://github.com/libexpat/libexpat/pull/551
https://linux.oracle.com/cve/CVE-2022-23990.html
https://linux.oracle.com/errata/ELSA-2022-9232.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/34NXVL2RZC2YZRV74ZQ3RNFB7WCEUP7D/
https://lists.fedoraproject.org/archives/list/[email protected]/message/R7FF2UH7MPXKTADYSJUAHI2Y5UHBSHUH/
https://nvd.nist.gov/vuln/detail/CVE-2022-23990
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.tenable.com/security/tns-2022-05
libexpat1 CVE-2022-25313 MEDIUM 2.2.9-1build1 2.2.9-1ubuntu0.4
Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1
https://access.redhat.com/security/cve/CVE-2022-25313
https://blog.hartwork.org/posts/expat-2-4-5-released/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313
https://github.com/libexpat/libexpat/pull/558
https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
https://lists.fedoraproject.org/archives/list/[email protected]/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
https://nvd.nist.gov/vuln/detail/CVE-2022-25313
https://security.netapp.com/advisory/ntap-20220303-0008/
https://ubuntu.com/security/notices/USN-5320-1
https://www.debian.org/security/2022/dsa-5085
https://www.oracle.com/security-alerts/cpuapr2022.html
libexpat1 CVE-2022-25314 MEDIUM 2.2.9-1build1 2.2.9-1ubuntu0.4
Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1
https://access.redhat.com/security/cve/CVE-2022-25314
https://blog.hartwork.org/posts/expat-2-4-5-released/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25314
https://github.com/libexpat/libexpat/pull/560
https://lists.fedoraproject.org/archives/list/[email protected]/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
https://lists.fedoraproject.org/archives/list/[email protected]/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
https://nvd.nist.gov/vuln/detail/CVE-2022-25314
https://security.netapp.com/advisory/ntap-20220303-0008/
https://ubuntu.com/security/notices/USN-5320-1
https://www.debian.org/security/2022/dsa-5085
https://www.oracle.com/security-alerts/cpuapr2022.html
libexpat1 CVE-2022-25315 MEDIUM 2.2.9-1build1 2.2.9-1ubuntu0.4
Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1
https://access.redhat.com/security/cve/CVE-2022-25315
https://blog.hartwork.org/posts/expat-2-4-5-released/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315
https://github.com/libexpat/libexpat/pull/559
https://linux.oracle.com/cve/CVE-2022-25315.html
https://linux.oracle.com/errata/ELSA-2022-9359.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
https://lists.fedoraproject.org/archives/list/[email protected]/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
https://nvd.nist.gov/vuln/detail/CVE-2022-25315
https://security.netapp.com/advisory/ntap-20220303-0008/
https://ubuntu.com/security/notices/USN-5320-1
https://www.debian.org/security/2022/dsa-5085
https://www.oracle.com/security-alerts/cpuapr2022.html
libexpat1 CVE-2021-45960 LOW 2.2.9-1build1 2.2.9-1ubuntu0.2
Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3
https://access.redhat.com/security/cve/CVE-2021-45960
https://bugzilla.mozilla.org/show_bug.cgi?id=1217609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45960
https://github.com/libexpat/libexpat/issues/531
https://github.com/libexpat/libexpat/pull/534
https://github.com/libexpat/libexpat/pull/534/commits/0adcb34c49bee5b19bd29b16a578c510c23597ea
https://linux.oracle.com/cve/CVE-2021-45960.html
https://linux.oracle.com/errata/ELSA-2022-1069.html
https://nvd.nist.gov/vuln/detail/CVE-2021-45960
https://security.netapp.com/advisory/ntap-20220121-0004/
https://ubuntu.com/security/notices/USN-5288-1
https://www.debian.org/security/2022/dsa-5073
https://www.tenable.com/security/tns-2022-05
libext2fs2 CVE-2022-1304 MEDIUM 1.45.5-2ubuntu1
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
libfdisk1 CVE-2021-3995 MEDIUM 2.34-0.1ubuntu9.1 2.34-0.1ubuntu9.3
Expand...https://access.redhat.com/security/cve/CVE-2021-3995
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
libfdisk1 CVE-2021-3996 MEDIUM 2.34-0.1ubuntu9.1 2.34-0.1ubuntu9.3
Expand...https://access.redhat.com/security/cve/CVE-2021-3996
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
libflac8 CVE-2020-0499 LOW 1.3.3-1build1
Expand...https://access.redhat.com/security/cve/CVE-2020-0499
https://android.googlesource.com/platform/external/flac/+/029048f823ced50f63a92e25073427ec3a9bd909%5E%21/#F0
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0499
https://lists.apache.org/thread.html/[email protected]%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/01/msg00001.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/33W6XZAAEJYRGU3XYHRO7XSYEA7YACUB/
https://lists.fedoraproject.org/archives/list/[email protected]/message/KNZYTAU5UWBVXVJ4VHDWPR66ZVDLQZRE/
https://lists.fedoraproject.org/archives/list/[email protected]/message/VPA5GAEKPXKAHGHHBI4X7AFNI4BMOVG3/
https://source.android.com/security/bulletin/pixel/2020-12-01
libgcrypt20 CVE-2021-40528 MEDIUM 1.8.5-5ubuntu1 1.8.5-5ubuntu1.1
Expand...https://access.redhat.com/security/cve/CVE-2021-40528
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40528
https://dev.gnupg.org/rCb118681ebc4c9ea4b9da79b0f9541405a64f4c13
https://eprint.iacr.org/2021/923
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=3462280f2e23e16adf3ed5176e0f2413d8861320
https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1
https://ibm.github.io/system-security-research-updates/2021/09/06/insecurity-elgamal-pt2
https://nvd.nist.gov/vuln/detail/CVE-2021-40528
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
libgcrypt20 CVE-2021-33560 LOW 1.8.5-5ubuntu1 1.8.5-5ubuntu1.1
Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33560.json
https://access.redhat.com/security/cve/CVE-2021-33560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://errata.almalinux.org/8/ALSA-2021-4409.html
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2022-9263.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/[email protected]/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://nvd.nist.gov/vuln/detail/CVE-2021-33560
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libgmp10 CVE-2021-43618 LOW 2:6.2.0+dfsg-4
Expand...https://access.redhat.com/security/cve/CVE-2021-43618
https://bugs.debian.org/994405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43618
libgnutls30 CVE-2021-20231 LOW 3.6.13-2ubuntu1.3 3.6.13-2ubuntu1.6
Expand...https://access.redhat.com/security/cve/CVE-2021-20231
https://bugzilla.redhat.com/show_bug.cgi?id=1922276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20231
https://linux.oracle.com/cve/CVE-2021-20231.html
https://linux.oracle.com/errata/ELSA-2022-9221.html
https://lists.apache.org/thread.html/[email protected]%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cissues.spark.apache.org%3E
https://lists.fedoraproject.org/archives/list/[email protected]/message/OSLAE6PP33A7VYRYMYMUVB3U6B26GZER/
https://nvd.nist.gov/vuln/detail/CVE-2021-20231
https://security.netapp.com/advisory/ntap-20210416-0005/
https://ubuntu.com/security/notices/USN-5029-1
https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10
libgnutls30 CVE-2021-20232 LOW 3.6.13-2ubuntu1.3 3.6.13-2ubuntu1.6
Expand...https://access.redhat.com/security/cve/CVE-2021-20232
https://bugzilla.redhat.com/show_bug.cgi?id=1922275
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20232
https://linux.oracle.com/cve/CVE-2021-20232.html
https://linux.oracle.com/errata/ELSA-2022-9221.html
https://lists.apache.org/thread.html/[email protected]%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cissues.spark.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cissues.spark.apache.org%3E
https://lists.fedoraproject.org/archives/list/[email protected]/message/OSLAE6PP33A7VYRYMYMUVB3U6B26GZER/
https://nvd.nist.gov/vuln/detail/CVE-2021-20232
https://security.netapp.com/advisory/ntap-20210416-0005/
https://ubuntu.com/security/notices/USN-5029-1
https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10
libgssapi-krb5-2 CVE-2021-36222 MEDIUM 1.17-6ubuntu4.1
Expand...https://access.redhat.com/security/cve/CVE-2021-36222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://nvd.nist.gov/vuln/detail/CVE-2021-36222
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
libgssapi-krb5-2 CVE-2021-37750 MEDIUM 1.17-6ubuntu4.1
Expand...https://access.redhat.com/security/cve/CVE-2021-37750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://nvd.nist.gov/vuln/detail/CVE-2021-37750
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
libgssapi3-heimdal CVE-2021-3671 LOW 7.7.0+dfsg-1ubuntu1
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
libhcrypto4-heimdal CVE-2021-3671 LOW 7.7.0+dfsg-1ubuntu1
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
libheimbase1-heimdal CVE-2021-3671 LOW 7.7.0+dfsg-1ubuntu1
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
libheimntlm0-heimdal CVE-2021-3671 LOW 7.7.0+dfsg-1ubuntu1
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
libhogweed5 CVE-2021-3580 MEDIUM 3.5.1+really3.5.1-2ubuntu0.1 3.5.1+really3.5.1-2ubuntu0.2
Expand...https://access.redhat.com/security/cve/CVE-2021-3580
https://bugzilla.redhat.com/show_bug.cgi?id=1967983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3580
https://linux.oracle.com/cve/CVE-2021-3580.html
https://linux.oracle.com/errata/ELSA-2022-9221.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3580
https://security.netapp.com/advisory/ntap-20211104-0006/
https://ubuntu.com/security/notices/USN-4990-1
libhx509-5-heimdal CVE-2021-3671 LOW 7.7.0+dfsg-1ubuntu1
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
libicu66 CVE-2021-30535 MEDIUM 66.1-2ubuntu2 66.1-2ubuntu2.1
Expand...https://chromereleases.googleblog.com/2021/05/stable-channel-update-for-desktop_25.html
https://crbug.com/1194899
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30535
https://github.com/unicode-org/icu/pull/1698
https://lists.fedoraproject.org/archives/list/[email protected]/message/ETMZL6IHCTCTREEL434BQ4THQ7EOHJ43/
https://lists.fedoraproject.org/archives/list/[email protected]/message/PAT6EOXVQFE6JFMFQF4IKAOUQSHMHL54/
https://ubuntu.com/security/notices/USN-5156-1
libk5crypto3 CVE-2021-36222 MEDIUM 1.17-6ubuntu4.1
Expand...https://access.redhat.com/security/cve/CVE-2021-36222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://nvd.nist.gov/vuln/detail/CVE-2021-36222
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
libk5crypto3 CVE-2021-37750 MEDIUM 1.17-6ubuntu4.1
Expand...https://access.redhat.com/security/cve/CVE-2021-37750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://nvd.nist.gov/vuln/detail/CVE-2021-37750
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
libkrb5-26-heimdal CVE-2021-3671 LOW 7.7.0+dfsg-1ubuntu1
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
libkrb5-3 CVE-2021-36222 MEDIUM 1.17-6ubuntu4.1
Expand...https://access.redhat.com/security/cve/CVE-2021-36222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://nvd.nist.gov/vuln/detail/CVE-2021-36222
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
libkrb5-3 CVE-2021-37750 MEDIUM 1.17-6ubuntu4.1
Expand...https://access.redhat.com/security/cve/CVE-2021-37750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://nvd.nist.gov/vuln/detail/CVE-2021-37750
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
libkrb5support0 CVE-2021-36222 MEDIUM 1.17-6ubuntu4.1
Expand...https://access.redhat.com/security/cve/CVE-2021-36222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://nvd.nist.gov/vuln/detail/CVE-2021-36222
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://web.mit.edu/kerberos/advisories/
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
libkrb5support0 CVE-2021-37750 MEDIUM 1.17-6ubuntu4.1
Expand...https://access.redhat.com/security/cve/CVE-2021-37750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750
https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-37750.html
https://linux.oracle.com/errata/ELSA-2021-4788.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/
https://nvd.nist.gov/vuln/detail/CVE-2021-37750
https://security.netapp.com/advisory/ntap-20210923-0002/
https://web.mit.edu/kerberos/advisories/
libldap-2.4-2 CVE-2022-29155 MEDIUM 2.4.49+dfsg-2ubuntu1.8 2.4.49+dfsg-2ubuntu1.9
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
libldap-common CVE-2022-29155 MEDIUM 2.4.49+dfsg-2ubuntu1.8 2.4.49+dfsg-2ubuntu1.9
Expand...https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://ubuntu.com/security/notices/USN-5424-1
liblzma5 CVE-2022-1271 MEDIUM 5.2.4-1ubuntu1 5.2.4-1ubuntu1.1
Expand...https://access.redhat.com/security/cve/CVE-2022-1271
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271
https://errata.almalinux.org/8/ALSA-2022-1537.html
https://linux.oracle.com/cve/CVE-2022-1271.html
https://linux.oracle.com/errata/ELSA-2022-2191.html
https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html
https://ubuntu.com/security/notices/USN-5378-1
https://ubuntu.com/security/notices/USN-5378-2
https://ubuntu.com/security/notices/USN-5378-3
https://ubuntu.com/security/notices/USN-5378-4
https://www.openwall.com/lists/oss-security/2022/04/07/8
libmount1 CVE-2021-3995 MEDIUM 2.34-0.1ubuntu9.1 2.34-0.1ubuntu9.3
Expand...https://access.redhat.com/security/cve/CVE-2021-3995
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
libmount1 CVE-2021-3996 MEDIUM 2.34-0.1ubuntu9.1 2.34-0.1ubuntu9.3
Expand...https://access.redhat.com/security/cve/CVE-2021-3996
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
libmysqlclient21 CVE-2021-2339 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.26-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2021-2339
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2339
https://errata.almalinux.org/8/ALSA-2021-3590.html
https://linux.oracle.com/cve/CVE-2021-2339.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/[email protected]/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://nvd.nist.gov/vuln/detail/CVE-2021-2339
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
libmysqlclient21 CVE-2021-2340 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.26-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2021-2340
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2340
https://errata.almalinux.org/8/ALSA-2021-3590.html
https://linux.oracle.com/cve/CVE-2021-2340.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/[email protected]/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://nvd.nist.gov/vuln/detail/CVE-2021-2340
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
libmysqlclient21 CVE-2021-2342 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.26-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2021-2342
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2342
https://errata.almalinux.org/8/ALSA-2021-3590.html
https://linux.oracle.com/cve/CVE-2021-2342.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/[email protected]/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://ubuntu.com/security/notices/USN-5022-3
https://www.oracle.com/security-alerts/cpujul2021.html
libmysqlclient21 CVE-2021-2352 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.26-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2021-2352
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2352
https://errata.almalinux.org/8/ALSA-2021-3590.html
https://linux.oracle.com/cve/CVE-2021-2352.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/[email protected]/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://nvd.nist.gov/vuln/detail/CVE-2021-2352
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
libmysqlclient21 CVE-2021-2354 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.26-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2021-2354
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2354
https://errata.almalinux.org/8/ALSA-2021-3590.html
https://linux.oracle.com/cve/CVE-2021-2354.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/[email protected]/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://nvd.nist.gov/vuln/detail/CVE-2021-2354
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
libmysqlclient21 CVE-2021-2356 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.26-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2021-2356
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2356
https://errata.almalinux.org/8/ALSA-2021-3590.html
https://linux.oracle.com/cve/CVE-2021-2356.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/[email protected]/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://nvd.nist.gov/vuln/detail/CVE-2021-2356
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
libmysqlclient21 CVE-2021-2357 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.26-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2021-2357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2357
https://errata.almalinux.org/8/ALSA-2021-3590.html
https://linux.oracle.com/cve/CVE-2021-2357.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/[email protected]/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://nvd.nist.gov/vuln/detail/CVE-2021-2357
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
libmysqlclient21 CVE-2021-2367 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.26-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2021-2367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2367
https://errata.almalinux.org/8/ALSA-2021-3590.html
https://linux.oracle.com/cve/CVE-2021-2367.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/[email protected]/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
libmysqlclient21 CVE-2021-2370 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.26-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2021-2370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2370
https://errata.almalinux.org/8/ALSA-2021-3590.html
https://linux.oracle.com/cve/CVE-2021-2370.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/[email protected]/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
libmysqlclient21 CVE-2021-2372 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.26-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2021-2372
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2372
https://linux.oracle.com/cve/CVE-2021-2372.html
https://linux.oracle.com/errata/ELSA-2022-1557.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
https://lists.fedoraproject.org/archives/list/[email protected]/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/[email protected]/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://lists.fedoraproject.org/archives/list/[email protected]/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://ubuntu.com/security/notices/USN-5022-2
https://ubuntu.com/security/notices/USN-5022-3
https://www.oracle.com/security-alerts/cpujul2021.html
libmysqlclient21 CVE-2021-2374 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.26-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2021-2374
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2374
https://errata.almalinux.org/8/ALSA-2021-3590.html
https://linux.oracle.com/cve/CVE-2021-2374.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/[email protected]/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
libmysqlclient21 CVE-2021-2383 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.26-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2021-2383
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2383
https://errata.almalinux.org/8/ALSA-2021-3590.html
https://linux.oracle.com/cve/CVE-2021-2383.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/[email protected]/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
libmysqlclient21 CVE-2021-2384 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.26-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2021-2384
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2384
https://errata.almalinux.org/8/ALSA-2021-3590.html
https://linux.oracle.com/cve/CVE-2021-2384.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/[email protected]/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
libmysqlclient21 CVE-2021-2385 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.26-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2021-2385
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2385
https://errata.almalinux.org/8/ALSA-2021-3590.html
https://linux.oracle.com/cve/CVE-2021-2385.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/
https://lists.fedoraproject.org/archives/list/[email protected]/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://ubuntu.com/security/notices/USN-5022-3
https://www.oracle.com/security-alerts/cpujul2021.html
libmysqlclient21 CVE-2021-2387 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.26-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2021-2387
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2387
https://errata.almalinux.org/8/ALSA-2021-3590.html
https://linux.oracle.com/cve/CVE-2021-2387.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
libmysqlclient21 CVE-2021-2389 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.26-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2021-2389
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2389
https://linux.oracle.com/cve/CVE-2021-2389.html
https://linux.oracle.com/errata/ELSA-2022-1557.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
https://lists.fedoraproject.org/archives/list/package-an[email protected]/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://ubuntu.com/security/notices/USN-5022-2
https://ubuntu.com/security/notices/USN-5022-3
https://www.oracle.com/security-alerts/cpujul2021.html
https://www.zerodayinitiative.com/advisories/ZDI-21-880/
libmysqlclient21 CVE-2021-2390 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.26-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2021-2390
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2390
https://errata.almalinux.org/8/ALSA-2021-3590.html
https://linux.oracle.com/cve/CVE-2021-2390.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://ubuntu.com/security/notices/USN-5022-3
https://www.oracle.com/security-alerts/cpujul2021.html
https://www.zerodayinitiative.com/advisories/ZDI-21-881/
libmysqlclient21 CVE-2021-2399 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.26-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2021-2399
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2399
https://errata.almalinux.org/8/ALSA-2021-3590.html
https://linux.oracle.com/cve/CVE-2021-2399.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
libmysqlclient21 CVE-2021-2402 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.26-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2021-2402
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2402
https://errata.almalinux.org/8/ALSA-2021-3590.html
https://linux.oracle.com/cve/CVE-2021-2402.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
libmysqlclient21 CVE-2021-2410 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.26-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2021-2410
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2410
https://errata.almalinux.org/8/ALSA-2021-3590.html
https://linux.oracle.com/cve/CVE-2021-2410.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
libmysqlclient21 CVE-2021-2417 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.26-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2021-2417
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2417
https://errata.almalinux.org/8/ALSA-2021-3590.html
https://linux.oracle.com/cve/CVE-2021-2417.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
libmysqlclient21 CVE-2021-2418 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.26-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2021-2418
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2418
https://errata.almalinux.org/8/ALSA-2021-3590.html
https://linux.oracle.com/cve/CVE-2021-2418.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
libmysqlclient21 CVE-2021-2422 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.26-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2021-2422
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2422
https://errata.almalinux.org/8/ALSA-2021-3590.html
https://linux.oracle.com/cve/CVE-2021-2422.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
libmysqlclient21 CVE-2021-2424 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.26-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2021-2424
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2424
https://errata.almalinux.org/8/ALSA-2021-3590.html
https://linux.oracle.com/cve/CVE-2021-2424.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
libmysqlclient21 CVE-2021-2425 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.26-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2021-2425
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2425
https://errata.almalinux.org/8/ALSA-2021-3590.html
https://linux.oracle.com/cve/CVE-2021-2425.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
libmysqlclient21 CVE-2021-2426 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.26-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2021-2426
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2426
https://errata.almalinux.org/8/ALSA-2021-3590.html
https://linux.oracle.com/cve/CVE-2021-2426.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
libmysqlclient21 CVE-2021-2427 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.26-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2021-2427
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2427
https://errata.almalinux.org/8/ALSA-2021-3590.html
https://linux.oracle.com/cve/CVE-2021-2427.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
libmysqlclient21 CVE-2021-2429 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.26-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2021-2429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2429
https://errata.almalinux.org/8/ALSA-2021-3590.html
https://linux.oracle.com/cve/CVE-2021-2429.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
https://www.zerodayinitiative.com/advisories/ZDI-21-889/
libmysqlclient21 CVE-2021-2437 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.26-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2021-2437
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2437
https://errata.almalinux.org/8/ALSA-2021-3590.html
https://linux.oracle.com/cve/CVE-2021-2437.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
libmysqlclient21 CVE-2021-2440 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.26-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2021-2440
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2440
https://errata.almalinux.org/8/ALSA-2021-3590.html
https://linux.oracle.com/cve/CVE-2021-2440.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
libmysqlclient21 CVE-2021-2441 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.26-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2021-2441
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2441
https://errata.almalinux.org/8/ALSA-2021-3590.html
https://linux.oracle.com/cve/CVE-2021-2441.html
https://linux.oracle.com/errata/ELSA-2021-3590.html
https://security.netapp.com/advisory/ntap-20210723-0001/
https://ubuntu.com/security/notices/USN-5022-1
https://www.oracle.com/security-alerts/cpujul2021.html
libmysqlclient21 CVE-2021-2471 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2021-2471
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2471
https://nvd.nist.gov/vuln/detail/CVE-2021-2471
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-2478 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2021-2478
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2478
https://lists.fedoraproject.org/archives/list/[email protected]/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/[email protected]/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/[email protected]/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://nvd.nist.gov/vuln/detail/CVE-2021-2478
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-2479 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2021-2479
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2479
https://lists.fedoraproject.org/archives/list/[email protected]/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/[email protected]/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/[email protected]/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://nvd.nist.gov/vuln/detail/CVE-2021-2479
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-2481 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2021-2481
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2481
https://lists.fedoraproject.org/archives/list/[email protected]/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/[email protected]/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/[email protected]/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://nvd.nist.gov/vuln/detail/CVE-2021-2481
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-35537 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.26-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2021-35537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35537
https://errata.almalinux.org/8/ALSA-2021-3590.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35537
https://security.netapp.com/advisory/ntap-20211022-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-35546 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2021-35546
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35546
https://lists.fedoraproject.org/archives/list/[email protected]/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/[email protected]/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/[email protected]/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://nvd.nist.gov/vuln/detail/CVE-2021-35546
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-35575 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2021-35575
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35575
https://lists.fedoraproject.org/archives/list/[email protected]/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/[email protected]/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/[email protected]/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://nvd.nist.gov/vuln/detail/CVE-2021-35575
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-35577 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2021-35577
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35577
https://lists.fedoraproject.org/archives/list/[email protected]/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/[email protected]/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/[email protected]/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://nvd.nist.gov/vuln/detail/CVE-2021-35577
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-35583 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.26-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2021-35583
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35583
https://security.netapp.com/advisory/ntap-20211022-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-35584 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35584
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-35591 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2021-35591
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35591
https://lists.fedoraproject.org/archives/list/[email protected]/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/[email protected]/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/[email protected]/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://nvd.nist.gov/vuln/detail/CVE-2021-35591
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-35596 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2021-35596
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35596
https://lists.fedoraproject.org/archives/list/[email protected]/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/[email protected]/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/[email protected]/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://nvd.nist.gov/vuln/detail/CVE-2021-35596
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-35597 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2021-35597
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35597
https://lists.fedoraproject.org/archives/list/[email protected]/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/[email protected]/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/[email protected]/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://nvd.nist.gov/vuln/detail/CVE-2021-35597
https://security.netapp.com/advisory/ntap-20211022-0005/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-35602 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2021-35602
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35602
https://lists.fedoraproject.org/archives/list/[email protected]/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/[email protected]/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/[email protected]/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://nvd.nist.gov/vuln/detail/CVE-2021-35602
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-35604 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2021-35604
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604
https://linux.oracle.com/cve/CVE-2021-35604.html
https://linux.oracle.com/errata/ELSA-2022-1557.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/
https://lists.fedoraproject.org/archives/list/[email protected]/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/[email protected]/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/[email protected]/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/
https://lists.fedoraproject.org/archives/list/[email protected]/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://ubuntu.com/security/notices/USN-5123-2
https://ubuntu.com/security/notices/USN-5170-1
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-35607 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2021-35607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35607
https://lists.fedoraproject.org/archives/list/[email protected]/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/[email protected]/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/[email protected]/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://nvd.nist.gov/vuln/detail/CVE-2021-35607
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-35608 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2021-35608
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35608
https://lists.fedoraproject.org/archives/list/[email protected]/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/[email protected]/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/[email protected]/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://nvd.nist.gov/vuln/detail/CVE-2021-35608
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-35610 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2021-35610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35610
https://lists.fedoraproject.org/archives/list/[email protected]/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/
https://lists.fedoraproject.org/archives/list/[email protected]/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/
https://lists.fedoraproject.org/archives/list/[email protected]/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/
https://nvd.nist.gov/vuln/detail/CVE-2021-35610
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-35612 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2021-35612
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35612
https://nvd.nist.gov/vuln/detail/CVE-2021-35612
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-35613 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35613
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-35622 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2021-35622
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35622
https://nvd.nist.gov/vuln/detail/CVE-2021-35622
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-35623 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2021-35623
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35623
https://nvd.nist.gov/vuln/detail/CVE-2021-35623
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-35624 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2021-35624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35624
https://nvd.nist.gov/vuln/detail/CVE-2021-35624
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://ubuntu.com/security/notices/USN-5123-2
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-35625 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2021-35625
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35625
https://nvd.nist.gov/vuln/detail/CVE-2021-35625
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-35626 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2021-35626
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35626
https://nvd.nist.gov/vuln/detail/CVE-2021-35626
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-35627 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2021-35627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35627
https://nvd.nist.gov/vuln/detail/CVE-2021-35627
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-35628 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2021-35628
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35628
https://nvd.nist.gov/vuln/detail/CVE-2021-35628
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-35629 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.26-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2021-35629
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35629
https://errata.almalinux.org/8/ALSA-2021-3590.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35629
https://security.netapp.com/advisory/ntap-20211022-0003/
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-35630 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2021-35630
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35630
https://nvd.nist.gov/vuln/detail/CVE-2021-35630
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-35631 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2021-35631
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35631
https://nvd.nist.gov/vuln/detail/CVE-2021-35631
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-35632 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2021-35632
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35632
https://nvd.nist.gov/vuln/detail/CVE-2021-35632
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-35633 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2021-35633
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35633
https://nvd.nist.gov/vuln/detail/CVE-2021-35633
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-35634 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2021-35634
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35634
https://nvd.nist.gov/vuln/detail/CVE-2021-35634
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-35635 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2021-35635
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35635
https://nvd.nist.gov/vuln/detail/CVE-2021-35635
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-35636 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2021-35636
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35636
https://nvd.nist.gov/vuln/detail/CVE-2021-35636
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-35637 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2021-35637
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35637
https://nvd.nist.gov/vuln/detail/CVE-2021-35637
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-35638 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2021-35638
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35638
https://nvd.nist.gov/vuln/detail/CVE-2021-35638
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-35639 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2021-35639
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35639
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-35640 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2021-35640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35640
https://nvd.nist.gov/vuln/detail/CVE-2021-35640
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-35641 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2021-35641
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35641
https://nvd.nist.gov/vuln/detail/CVE-2021-35641
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-35642 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2021-35642
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35642
https://nvd.nist.gov/vuln/detail/CVE-2021-35642
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-35643 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2021-35643
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35643
https://nvd.nist.gov/vuln/detail/CVE-2021-35643
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-35644 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2021-35644
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35644
https://nvd.nist.gov/vuln/detail/CVE-2021-35644
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-35645 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2021-35645
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35645
https://nvd.nist.gov/vuln/detail/CVE-2021-35645
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-35646 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2021-35646
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35646
https://nvd.nist.gov/vuln/detail/CVE-2021-35646
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-35647 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2021-35647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35647
https://nvd.nist.gov/vuln/detail/CVE-2021-35647
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-35648 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2021-35648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35648
https://nvd.nist.gov/vuln/detail/CVE-2021-35648
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5123-1
https://www.oracle.com/security-alerts/cpuoct2021.html
libmysqlclient21 CVE-2021-46322 MEDIUM 8.0.25-0ubuntu0.20.04.1
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46322
https://github.com/svaarala/duktape/issues/2448
libmysqlclient21 CVE-2022-21245 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.28-0ubuntu0.20.04.3
Expand...https://access.redhat.com/security/cve/CVE-2022-21245
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21245
https://lists.fedoraproject.org/archives/list/[email protected]/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
https://lists.fedoraproject.org/archives/list/[email protected]/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
https://nvd.nist.gov/vuln/detail/CVE-2022-21245
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://ubuntu.com/security/notices/USN-5270-2
https://www.oracle.com/security-alerts/cpujan2022.html
libmysqlclient21 CVE-2022-21249 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.28-0ubuntu0.20.04.3
Expand...https://access.redhat.com/security/cve/CVE-2022-21249
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21249
https://lists.fedoraproject.org/archives/list/[email protected]/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
https://lists.fedoraproject.org/archives/list/[email protected]/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
https://nvd.nist.gov/vuln/detail/CVE-2022-21249
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
libmysqlclient21 CVE-2022-21253 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.28-0ubuntu0.20.04.3
Expand...https://access.redhat.com/security/cve/CVE-2022-21253
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21253
https://lists.fedoraproject.org/archives/list/[email protected]/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
https://lists.fedoraproject.org/archives/list/[email protected]/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
https://nvd.nist.gov/vuln/detail/CVE-2022-21253
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
libmysqlclient21 CVE-2022-21254 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.28-0ubuntu0.20.04.3
Expand...https://access.redhat.com/security/cve/CVE-2022-21254
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21254
https://lists.fedoraproject.org/archives/list/[email protected]/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
https://lists.fedoraproject.org/archives/list/[email protected]/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
https://nvd.nist.gov/vuln/detail/CVE-2022-21254
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
libmysqlclient21 CVE-2022-21256 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.28-0ubuntu0.20.04.3
Expand...https://access.redhat.com/security/cve/CVE-2022-21256
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21256
https://lists.fedoraproject.org/archives/list/[email protected]/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
https://lists.fedoraproject.org/archives/list/[email protected]/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
https://nvd.nist.gov/vuln/detail/CVE-2022-21256
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
libmysqlclient21 CVE-2022-21264 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.28-0ubuntu0.20.04.3
Expand...https://access.redhat.com/security/cve/CVE-2022-21264
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21264
https://lists.fedoraproject.org/archives/list/[email protected]/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
https://lists.fedoraproject.org/archives/list/[email protected]/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
https://nvd.nist.gov/vuln/detail/CVE-2022-21264
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
libmysqlclient21 CVE-2022-21265 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.28-0ubuntu0.20.04.3
Expand...https://access.redhat.com/security/cve/CVE-2022-21265
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21265
https://lists.fedoraproject.org/archives/list/[email protected]/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
https://lists.fedoraproject.org/archives/list/[email protected]/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
https://nvd.nist.gov/vuln/detail/CVE-2022-21265
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
libmysqlclient21 CVE-2022-21270 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.28-0ubuntu0.20.04.3
Expand...https://access.redhat.com/security/cve/CVE-2022-21270
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21270
https://lists.fedoraproject.org/archives/list/[email protected]/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
https://lists.fedoraproject.org/archives/list/[email protected]/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
https://nvd.nist.gov/vuln/detail/CVE-2022-21270
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://ubuntu.com/security/notices/USN-5270-2
https://www.oracle.com/security-alerts/cpujan2022.html
libmysqlclient21 CVE-2022-21278 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2022-21278
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21278
https://nvd.nist.gov/vuln/detail/CVE-2022-21278
https://security.netapp.com/advisory/ntap-20220121-0008/
https://www.oracle.com/security-alerts/cpujan2022.html
libmysqlclient21 CVE-2022-21297 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2022-21297
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21297
https://nvd.nist.gov/vuln/detail/CVE-2022-21297
https://security.netapp.com/advisory/ntap-20220121-0008/
https://www.oracle.com/security-alerts/cpujan2022.html
libmysqlclient21 CVE-2022-21301 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.28-0ubuntu0.20.04.3
Expand...https://access.redhat.com/security/cve/CVE-2022-21301
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21301
https://lists.fedoraproject.org/archives/list/[email protected]/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
https://lists.fedoraproject.org/archives/list/[email protected]/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
https://nvd.nist.gov/vuln/detail/CVE-2022-21301
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
libmysqlclient21 CVE-2022-21302 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.28-0ubuntu0.20.04.3
Expand...https://access.redhat.com/security/cve/CVE-2022-21302
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21302
https://lists.fedoraproject.org/archives/list/[email protected]/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
https://lists.fedoraproject.org/archives/list/[email protected]/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
https://nvd.nist.gov/vuln/detail/CVE-2022-21302
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
libmysqlclient21 CVE-2022-21303 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.28-0ubuntu0.20.04.3
Expand...https://access.redhat.com/security/cve/CVE-2022-21303
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21303
https://lists.fedoraproject.org/archives/list/[email protected]/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
https://lists.fedoraproject.org/archives/list/[email protected]/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
https://nvd.nist.gov/vuln/detail/CVE-2022-21303
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://ubuntu.com/security/notices/USN-5270-2
https://www.oracle.com/security-alerts/cpujan2022.html
libmysqlclient21 CVE-2022-21304 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.28-0ubuntu0.20.04.3
Expand...https://access.redhat.com/security/cve/CVE-2022-21304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21304
https://lists.fedoraproject.org/archives/list/[email protected]/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
https://lists.fedoraproject.org/archives/list/[email protected]/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
https://nvd.nist.gov/vuln/detail/CVE-2022-21304
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://ubuntu.com/security/notices/USN-5270-2
https://www.oracle.com/security-alerts/cpujan2022.html
libmysqlclient21 CVE-2022-21339 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.28-0ubuntu0.20.04.3
Expand...https://access.redhat.com/security/cve/CVE-2022-21339
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21339
https://lists.fedoraproject.org/archives/list/[email protected]/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/
https://lists.fedoraproject.org/archives/list/[email protected]/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/
https://nvd.nist.gov/vuln/detail/CVE-2022-21339
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
libmysqlclient21 CVE-2022-21342 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.28-0ubuntu0.20.04.3
Expand...https://access.redhat.com/security/cve/CVE-2022-21342
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21342
https://nvd.nist.gov/vuln/detail/CVE-2022-21342
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
libmysqlclient21 CVE-2022-21344 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.28-0ubuntu0.20.04.3
Expand...https://access.redhat.com/security/cve/CVE-2022-21344
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21344
https://nvd.nist.gov/vuln/detail/CVE-2022-21344
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://ubuntu.com/security/notices/USN-5270-2
https://www.oracle.com/security-alerts/cpujan2022.html
libmysqlclient21 CVE-2022-21348 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.28-0ubuntu0.20.04.3
Expand...https://access.redhat.com/security/cve/CVE-2022-21348
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21348
https://nvd.nist.gov/vuln/detail/CVE-2022-21348
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
libmysqlclient21 CVE-2022-21351 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.28-0ubuntu0.20.04.3
Expand...https://access.redhat.com/security/cve/CVE-2022-21351
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21351
https://nvd.nist.gov/vuln/detail/CVE-2022-21351
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
libmysqlclient21 CVE-2022-21352 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.27-0ubuntu0.20.04.1
Expand...https://access.redhat.com/security/cve/CVE-2022-21352
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21352
https://nvd.nist.gov/vuln/detail/CVE-2022-21352
https://security.netapp.com/advisory/ntap-20220121-0008/
https://www.oracle.com/security-alerts/cpujan2022.html
libmysqlclient21 CVE-2022-21358 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.28-0ubuntu0.20.04.3
Expand...https://access.redhat.com/security/cve/CVE-2022-21358
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21358
https://nvd.nist.gov/vuln/detail/CVE-2022-21358
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
libmysqlclient21 CVE-2022-21362 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.28-0ubuntu0.20.04.3
Expand...https://access.redhat.com/security/cve/CVE-2022-21362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21362
https://nvd.nist.gov/vuln/detail/CVE-2022-21362
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
libmysqlclient21 CVE-2022-21367 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.28-0ubuntu0.20.04.3
Expand...https://access.redhat.com/security/cve/CVE-2022-21367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21367
https://nvd.nist.gov/vuln/detail/CVE-2022-21367
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://ubuntu.com/security/notices/USN-5270-2
https://www.oracle.com/security-alerts/cpujan2022.html
libmysqlclient21 CVE-2022-21368 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.28-0ubuntu0.20.04.3
Expand...https://access.redhat.com/security/cve/CVE-2022-21368
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21368
https://nvd.nist.gov/vuln/detail/CVE-2022-21368
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
libmysqlclient21 CVE-2022-21370 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.28-0ubuntu0.20.04.3
Expand...https://access.redhat.com/security/cve/CVE-2022-21370
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21370
https://nvd.nist.gov/vuln/detail/CVE-2022-21370
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
libmysqlclient21 CVE-2022-21372 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.28-0ubuntu0.20.04.3
Expand...https://access.redhat.com/security/cve/CVE-2022-21372
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21372
https://nvd.nist.gov/vuln/detail/CVE-2022-21372
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
libmysqlclient21 CVE-2022-21374 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.28-0ubuntu0.20.04.3
Expand...https://access.redhat.com/security/cve/CVE-2022-21374
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21374
https://nvd.nist.gov/vuln/detail/CVE-2022-21374
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
libmysqlclient21 CVE-2022-21378 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.28-0ubuntu0.20.04.3
Expand...https://access.redhat.com/security/cve/CVE-2022-21378
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21378
https://nvd.nist.gov/vuln/detail/CVE-2022-21378
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
libmysqlclient21 CVE-2022-21379 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.28-0ubuntu0.20.04.3
Expand...https://access.redhat.com/security/cve/CVE-2022-21379
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21379
https://security.netapp.com/advisory/ntap-20220121-0008/
https://ubuntu.com/security/notices/USN-5270-1
https://www.oracle.com/security-alerts/cpujan2022.html
libmysqlclient21 CVE-2022-21412 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.29-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2022-21412
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21412
https://nvd.nist.gov/vuln/detail/CVE-2022-21412
https://security.netapp.com/advisory/ntap-20220429-0005/
https://ubuntu.com/security/notices/USN-5400-1
https://www.oracle.com/security-alerts/cpuapr2022.html
libmysqlclient21 CVE-2022-21413 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.29-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2022-21413
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21413
https://security.netapp.com/advisory/ntap-20220429-0005/
https://ubuntu.com/security/notices/USN-5400-1
https://www.oracle.com/security-alerts/cpuapr2022.html
libmysqlclient21 CVE-2022-21414 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.29-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2022-21414
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21414
https://security.netapp.com/advisory/ntap-20220429-0005/
https://ubuntu.com/security/notices/USN-5400-1
https://www.oracle.com/security-alerts/cpuapr2022.html
libmysqlclient21 CVE-2022-21415 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.29-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2022-21415
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21415
https://security.netapp.com/advisory/ntap-20220429-0005/
https://ubuntu.com/security/notices/USN-5400-1
https://www.oracle.com/security-alerts/cpuapr2022.html
libmysqlclient21 CVE-2022-21417 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.29-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2022-21417
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21417
https://nvd.nist.gov/vuln/detail/CVE-2022-21417
https://security.netapp.com/advisory/ntap-20220429-0005/
https://ubuntu.com/security/notices/USN-5400-1
https://ubuntu.com/security/notices/USN-5400-2
https://www.oracle.com/security-alerts/cpuapr2022.html
libmysqlclient21 CVE-2022-21418 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.29-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2022-21418
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21418
https://security.netapp.com/advisory/ntap-20220429-0005/
https://ubuntu.com/security/notices/USN-5400-1
https://www.oracle.com/security-alerts/cpuapr2022.html
libmysqlclient21 CVE-2022-21423 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.29-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2022-21423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21423
https://security.netapp.com/advisory/ntap-20220429-0005/
https://ubuntu.com/security/notices/USN-5400-1
https://www.oracle.com/security-alerts/cpuapr2022.html
libmysqlclient21 CVE-2022-21425 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.29-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2022-21425
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21425
https://nvd.nist.gov/vuln/detail/CVE-2022-21425
https://security.netapp.com/advisory/ntap-20220429-0005/
https://ubuntu.com/security/notices/USN-5400-1
https://www.oracle.com/security-alerts/cpuapr2022.html
libmysqlclient21 CVE-2022-21427 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.29-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2022-21427
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21427
https://nvd.nist.gov/vuln/detail/CVE-2022-21427
https://security.netapp.com/advisory/ntap-20220429-0005/
https://ubuntu.com/security/notices/USN-5400-1
https://ubuntu.com/security/notices/USN-5400-2
https://www.oracle.com/security-alerts/cpuapr2022.html
libmysqlclient21 CVE-2022-21435 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.29-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2022-21435
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21435
https://security.netapp.com/advisory/ntap-20220429-0005/
https://ubuntu.com/security/notices/USN-5400-1
https://www.oracle.com/security-alerts/cpuapr2022.html
libmysqlclient21 CVE-2022-21436 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.29-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2022-21436
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21436
https://security.netapp.com/advisory/ntap-20220429-0005/
https://ubuntu.com/security/notices/USN-5400-1
https://www.oracle.com/security-alerts/cpuapr2022.html
libmysqlclient21 CVE-2022-21437 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.29-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2022-21437
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21437
https://security.netapp.com/advisory/ntap-20220429-0005/
https://ubuntu.com/security/notices/USN-5400-1
https://www.oracle.com/security-alerts/cpuapr2022.html
libmysqlclient21 CVE-2022-21438 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.29-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2022-21438
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21438
https://security.netapp.com/advisory/ntap-20220429-0005/
https://ubuntu.com/security/notices/USN-5400-1
https://www.oracle.com/security-alerts/cpuapr2022.html
libmysqlclient21 CVE-2022-21440 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.29-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2022-21440
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21440
https://security.netapp.com/advisory/ntap-20220429-0005/
https://ubuntu.com/security/notices/USN-5400-1
https://www.oracle.com/security-alerts/cpuapr2022.html
libmysqlclient21 CVE-2022-21444 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.29-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2022-21444
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21444
https://nvd.nist.gov/vuln/detail/CVE-2022-21444
https://security.netapp.com/advisory/ntap-20220429-0005/
https://ubuntu.com/security/notices/USN-5400-1
https://ubuntu.com/security/notices/USN-5400-2
https://www.oracle.com/security-alerts/cpuapr2022.html
libmysqlclient21 CVE-2022-21451 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.29-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2022-21451
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21451
https://nvd.nist.gov/vuln/detail/CVE-2022-21451
https://security.netapp.com/advisory/ntap-20220429-0005/
https://ubuntu.com/security/notices/USN-5400-1
https://ubuntu.com/security/notices/USN-5400-2
https://www.oracle.com/security-alerts/cpuapr2022.html
libmysqlclient21 CVE-2022-21452 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.29-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2022-21452
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21452
https://security.netapp.com/advisory/ntap-20220429-0005/
https://ubuntu.com/security/notices/USN-5400-1
https://www.oracle.com/security-alerts/cpuapr2022.html
libmysqlclient21 CVE-2022-21454 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.29-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2022-21454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21454
https://nvd.nist.gov/vuln/detail/CVE-2022-21454
https://security.netapp.com/advisory/ntap-20220429-0005/
https://ubuntu.com/security/notices/USN-5400-1
https://ubuntu.com/security/notices/USN-5400-2
https://www.oracle.com/security-alerts/cpuapr2022.html
libmysqlclient21 CVE-2022-21457 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.29-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2022-21457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21457
https://security.netapp.com/advisory/ntap-20220429-0005/
https://ubuntu.com/security/notices/USN-5400-1
https://www.oracle.com/security-alerts/cpuapr2022.html
libmysqlclient21 CVE-2022-21459 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.29-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2022-21459
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21459
https://security.netapp.com/advisory/ntap-20220429-0005/
https://ubuntu.com/security/notices/USN-5400-1
https://www.oracle.com/security-alerts/cpuapr2022.html
libmysqlclient21 CVE-2022-21460 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.29-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2022-21460
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21460
https://nvd.nist.gov/vuln/detail/CVE-2022-21460
https://security.netapp.com/advisory/ntap-20220429-0005/
https://ubuntu.com/security/notices/USN-5400-1
https://ubuntu.com/security/notices/USN-5400-2
https://www.oracle.com/security-alerts/cpuapr2022.html
libmysqlclient21 CVE-2022-21462 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.29-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2022-21462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21462
https://security.netapp.com/advisory/ntap-20220429-0005/
https://ubuntu.com/security/notices/USN-5400-1
https://www.oracle.com/security-alerts/cpuapr2022.html
libmysqlclient21 CVE-2022-21478 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.29-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2022-21478
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21478
https://nvd.nist.gov/vuln/detail/CVE-2022-21478
https://security.netapp.com/advisory/ntap-20220429-0005/
https://ubuntu.com/security/notices/USN-5400-1
https://www.oracle.com/security-alerts/cpuapr2022.html
libmysqlclient21 CVE-2022-21479 MEDIUM 8.0.25-0ubuntu0.20.04.1 8.0.29-0ubuntu0.20.04.2
Expand...https://access.redhat.com/security/cve/CVE-2022-21479
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21479
https://nvd.nist.gov/vuln/detail/CVE-2022-21479
https://security.netapp.com/advisory/ntap-20220429-0005/
https://ubuntu.com/security/notices/USN-5400-1
https://www.oracle.com/security-alerts/cpuapr2022.html
libnettle7 CVE-2021-3580 MEDIUM 3.5.1+really3.5.1-2ubuntu0.1 3.5.1+really3.5.1-2ubuntu0.2
Expand...https://access.redhat.com/security/cve/CVE-2021-3580
https://bugzilla.redhat.com/show_bug.cgi?id=1967983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3580
https://linux.oracle.com/cve/CVE-2021-3580.html
https://linux.oracle.com/errata/ELSA-2022-9221.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3580
https://security.netapp.com/advisory/ntap-20211104-0006/
https://ubuntu.com/security/notices/USN-4990-1
libpcre2-8-0 CVE-2022-1586 LOW 10.34-7
Expand...https://access.redhat.com/security/cve/CVE-2022-1586
https://bugzilla.redhat.com/show_bug.cgi?id=2077976,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586
https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a,
https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
https://lists.fedoraproject.org/archives/list/[email protected]/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
libpcre2-8-0 CVE-2022-1587 LOW 10.34-7
Expand...https://access.redhat.com/security/cve/CVE-2022-1587
https://bugzilla.redhat.com/show_bug.cgi?id=2077983,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587
https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
https://lists.fedoraproject.org/archives/list/[email protected]/message/M2GLQQUEY5VFM57CFYXVIFOXN2HUZPDM/
libpcre3 CVE-2017-11164 LOW 2:8.39-12build1
Expand...http://openwall.com/lists/oss-security/2017/07/11/3
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/[email protected]%3Cdev.mina.apache.org%3E
libpcre3 CVE-2019-20838 LOW 2:8.39-12build1 2:8.39-12ubuntu0.1
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://access.redhat.com/security/cve/CVE-2019-20838
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2019-20838.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/[email protected]%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-20838
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.pcre.org/original/changelog.txt
libpcre3 CVE-2020-14155 LOW 2:8.39-12build1 2:8.39-12ubuntu0.1
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://access.redhat.com/security/cve/CVE-2020-14155
https://bugs.gentoo.org/717920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/[email protected]%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-14155
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.pcre.org/original/changelog.txt
libperl5.30 CVE-2020-16156 MEDIUM 5.30.0-9ubuntu0.2
Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/[email protected]/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/[email protected]/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
libroken18-heimdal CVE-2021-3671 LOW 7.7.0+dfsg-1ubuntu1
Expand...https://access.redhat.com/security/cve/CVE-2021-3671
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3671
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://nvd.nist.gov/vuln/detail/CVE-2021-3671
https://ubuntu.com/security/notices/USN-5142-1
https://ubuntu.com/security/notices/USN-5174-1
libsasl2-2 CVE-2022-24407 HIGH 2.1.27+dfsg-2 2.1.27+dfsg-2ubuntu0.1
Expand...http://www.openwall.com/lists/oss-security/2022/02/23/4
https://access.redhat.com/security/cve/CVE-2022-24407
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407
https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst
https://linux.oracle.com/cve/CVE-2022-24407.html
https://linux.oracle.com/errata/ELSA-2022-9239.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00002.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/4FIXU75Q6RBNK6UYM7MQ3TCFGXR7AX4U/
https://lists.fedoraproject.org/archives/list/[email protected]/message/H26R4SMGM3WHXX4XYNNJB4YGFIL5UNF4/
https://lists.fedoraproject.org/archives/list/[email protected]/message/ZZC6BMPI3V3MC2IGNLN377ETUWO7QBIH/
https://nvd.nist.gov/vuln/detail/CVE-2022-24407
https://ubuntu.com/security/notices/USN-5301-1
https://ubuntu.com/security/notices/USN-5301-2
https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28
https://www.debian.org/security/2022/dsa-5087
libsasl2-modules-db CVE-2022-24407 HIGH 2.1.27+dfsg-2 2.1.27+dfsg-2ubuntu0.1
Expand...http://www.openwall.com/lists/oss-security/2022/02/23/4
https://access.redhat.com/security/cve/CVE-2022-24407
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407
https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst
https://linux.oracle.com/cve/CVE-2022-24407.html
https://linux.oracle.com/errata/ELSA-2022-9239.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00002.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/4FIXU75Q6RBNK6UYM7MQ3TCFGXR7AX4U/
https://lists.fedoraproject.org/archives/list/[email protected]/message/H26R4SMGM3WHXX4XYNNJB4YGFIL5UNF4/
https://lists.fedoraproject.org/archives/list/[email protected]/message/ZZC6BMPI3V3MC2IGNLN377ETUWO7QBIH/
https://nvd.nist.gov/vuln/detail/CVE-2022-24407
https://ubuntu.com/security/notices/USN-5301-1
https://ubuntu.com/security/notices/USN-5301-2
https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28
https://www.debian.org/security/2022/dsa-5087
libsepol1 CVE-2021-36084 LOW 3.0-1 3.0-1ubuntu0.1
Expand...https://access.redhat.com/security/cve/CVE-2021-36084
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
libsepol1 CVE-2021-36085 LOW 3.0-1 3.0-1ubuntu0.1
Expand...https://access.redhat.com/security/cve/CVE-2021-36085
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
libsepol1 CVE-2021-36086 LOW 3.0-1 3.0-1ubuntu0.1
Expand...https://access.redhat.com/security/cve/CVE-2021-36086
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://ubuntu.com/security/notices/USN-5391-1
libsepol1 CVE-2021-36087 LOW 3.0-1 3.0-1ubuntu0.1
Expand...https://access.redhat.com/security/cve/CVE-2021-36087
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/[email protected]om/T/
https://ubuntu.com/security/notices/USN-5391-1
libsmartcols1 CVE-2021-3995 MEDIUM 2.34-0.1ubuntu9.1 2.34-0.1ubuntu9.3
Expand...https://access.redhat.com/security/cve/CVE-2021-3995
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
libsmartcols1 CVE-2021-3996 MEDIUM 2.34-0.1ubuntu9.1 2.34-0.1ubuntu9.3
Expand...https://access.redhat.com/security/cve/CVE-2021-3996
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
https://ubuntu.com/security/notices/USN-5279-1
https://www.openwall.com/lists/oss-security/2022/01/24/2
libsqlite3-0 CVE-2020-9794 MEDIUM 3.31.1-4ubuntu0.2
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794
https://lists.apache.org/thread.html/[email protected]%3Cdev.mina.apache.org%3E
https://support.apple.com/HT211168
https://support.apple.com/HT211170
https://support.apple.com/HT211171
https://support.apple.com/HT211175
https://support.apple.com/HT211178
https://support.apple.com/HT211179
https://support.apple.com/HT211181
https://vuldb.com/?id.155768
libsqlite3-0 CVE-2020-9849 LOW 3.31.1-4ubuntu0.2
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9849
https://lists.apache.org/thread.html/[email protected]%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/en-us/HT211935
https://support.apple.com/en-us/HT211952
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9849/
libsqlite3-0 CVE-2020-9991 LOW 3.31.1-4ubuntu0.2
Expand...http://seclists.org/fulldisclosure/2020/Dec/32
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9991
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b0[email protected]%3Cdev.mina.apache.org%3E
https://support.apple.com/en-us/HT211843
https://support.apple.com/en-us/HT211844
https://support.apple.com/en-us/HT211847
https://support.apple.com/en-us/HT211850
https://support.apple.com/en-us/HT211931
https://support.apple.com/kb/HT211846
https://www.rapid7.com/db/vulnerabilities/apple-osx-sqlite-cve-2020-9991/
libsqlite3-0 CVE-2021-36690 LOW 3.31.1-4ubuntu0.2 3.31.1-4ubuntu0.3
Expand...https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36690
https://nvd.nist.gov/vuln/detail/CVE-2021-36690
https://ubuntu.com/security/notices/USN-5403-1
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.sqlite.org/forum/forumpost/718c0a8d17
libss2 CVE-2022-1304 MEDIUM 1.45.5-2ubuntu1
Expand...https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
libssh-4 CVE-2021-3634 MEDIUM 0.9.3-2ubuntu2.1 0.9.3-2ubuntu2.2
Expand...https://access.redhat.com/security/cve/CVE-2021-3634
https://bugzilla.redhat.com/show_bug.cgi?id=1978810
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3634
https://errata.almalinux.org/8/ALSA-2022-2031.html
https://linux.oracle.com/cve/CVE-2021-3634.html
https://linux.oracle.com/errata/ELSA-2022-2031.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/DRK67AJCWYYVAGF5SGAHNZXCX3PN3ZFP/
https://lists.fedoraproject.org/archives/list/[email protected]/message/JKYD3ZRAMDAQX3ZW6THHUF3GXN7FF6B4/
https://lists.fedoraproject.org/archives/list/[email protected]/message/SVWAAB2XMKEUMPMDALINKAA4U2QM4LNG/
https://nvd.nist.gov/vuln/detail/CVE-2021-3634
https://security.netapp.com/advisory/ntap-20211004-0003/
https://ubuntu.com/security/notices/USN-5053-1
https://www.debian.org/security/2021/dsa-4965
https://www.oracle.com/security-alerts/cpujan2022.html
libssl1.1 CVE-2021-3711 HIGH 1.1.1f-1ubuntu2.4 1.1.1f-1ubuntu2.8
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://access.redhat.com/security/cve/CVE-2021-3711
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46
https://lists.apache.org/thread.html/[email protected]%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2021-3711
https://rustsec.org/advisories/RUSTSEC-2021-0097.html
https://security.netapp.com/advisory/ntap-20210827-0010/
https://security.netapp.com/advisory/ntap-20211022-0003/
https://ubuntu.com/security/notices/USN-5051-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
https://www.tenable.com/security/tns-2022-02
libssl1.1 CVE-2022-0778 HIGH 1.1.1f-1ubuntu2.4 1.1.1f-1ubuntu2.12
Expand...http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json
https://access.redhat.com/security/cve/CVE-2022-0778
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
https://errata.almalinux.org/8/ALSA-2022-1065.html
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246
https://linux.oracle.com/cve/CVE-2022-0778.html
https://linux.oracle.com/errata/ELSA-2022-9272.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/
https://lists.fedoraproject.org/archives/list/[email protected]/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/
https://lists.fedoraproject.org/archives/list/[email protected]/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/
https://nvd.nist.gov/vuln/detail/CVE-2022-0778
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
https://rustsec.org/advisories/RUSTSEC-2022-0014.html
https://security.netapp.com/advisory/ntap-20220321-0002/
https://security.netapp.com/advisory/ntap-20220429-0005/
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5328-1
https://ubuntu.com/security/notices/USN-5328-2
https://www.debian.org/security/2022/dsa-5103
https://www.openssl.org/news/secadv/20220315.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.tenable.com/security/tns-2022-06
https://www.tenable.com/security/tns-2022-07
https://www.tenable.com/security/tns-2022-08
https://www.tenable.com/security/tns-2022-09
libssl1.1 CVE-2021-3712 MEDIUM 1.1.1f-1ubuntu2.4 1.1.1f-1ubuntu2.8
Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3712.json
https://access.redhat.com/security/cve/CVE-2021-3712
https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://crates.io/crates/openssl-src
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://linux.oracle.com/cve/CVE-2021-3712.html
https://linux.oracle.com/errata/ELSA-2022-9023.html
https://lists.apache.org/thread.html/[email protected]%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3712
https://rustsec.org/advisories/RUSTSEC-2021-0098.html
https://security.netapp.com/advisory/ntap-20210827-0010/
https://ubuntu.com/security/notices/USN-5051-1
https://ubuntu.com/security/notices/USN-5051-2
https://ubuntu.com/security/notices/USN-5051-3
https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm)
https://ubuntu.com/security/notices/USN-5088-1
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
https://www.tenable.com/security/tns-2022-02
libssl1.1 CVE-2022-1292 MEDIUM 1.1.1f-1ubuntu2.4 1.1.1f-1ubuntu2.13
Expand...https://access.redhat.com/security/cve/CVE-2022-1292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23
https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html
https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1292
https://ubuntu.com/security/notices/USN-5402-1
https://www.openssl.org/news/secadv/20220503.txt
libsystemd0 CVE-2021-33910 HIGH 245.4-4ubuntu3.6 245.4-4ubuntu3.10
Expand...http://packetstormsecurity.com/files/163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html
http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2021-33910
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910
https://github.com/systemd/systemd-stable/commit/4a1c5f34bd3e1daed4490e9d97918e504d19733b
https://github.com/systemd/systemd-stable/commit/764b74113e36ac5219a4b82a05f311b5a92136ce
https://github.com/systemd/systemd-stable/commit/b00674347337b7531c92fdb65590ab253bb57538
https://github.com/systemd/systemd-stable/commit/cfd14c65374027b34dbbc4f0551456c5dc2d1f61
https://github.com/systemd/systemd/commit/b34a4f0e6729de292cb3b0c03c1d48f246ad896b
https://github.com/systemd/systemd/pull/20256/commits/441e0115646d54f080e5c3bb0ba477c892861ab9
https://linux.oracle.com/cve/CVE-2021-33910.html
https://linux.oracle.com/errata/ELSA-2021-2717.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/2LSDMHAKI4LGFOCSPXNVVSEWQFAVFWR7/
https://lists.fedoraproject.org/archives/list/[email protected]/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://nvd.nist.gov/vuln/detail/CVE-2021-33910
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20211104-0008/
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
https://www.debian.org/security/2021/dsa-4942
https://www.openwall.com/lists/oss-security/2021/07/20/2
https://www.qualys.com/2021/07/20/cve-2021-33910/denial-of-service-systemd.txt
libsystemd0 CVE-2021-3997 MEDIUM 245.4-4ubuntu3.6 245.4-4ubuntu3.15
Expand...https://access.redhat.com/security/cve/CVE-2021-3997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://ubuntu.com/security/notices/USN-5226-1
https://www.openwall.com/lists/oss-security/2022/01/10/2
libsystemd0 CVE-2020-13529 LOW 245.4-4ubuntu3.6 245.4-4ubuntu3.10
Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2