registry.hub.docker.com/library/php:latest (debian 12.8)¶ Trivy Image Scan Image: registry.hub.docker.com/library/php:latest (debian 12.8) Scan date: 2024-12-04 registry.hub.docker.com/library/php:latest (debian 12.8) (debian)¶ Package Vulnerability ID Severity Installed Version Fixed Version Links apt CVE-2011-3374 LOW 2.6.1 no fix available https://access.redhat.com/security/cve/cve-2011-3374 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480 https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html https://seclists.org/fulldisclosure/2011/Sep/221 https://security-tracker.debian.org/tracker/CVE-2011-3374 https://snyk.io/vuln/SNYK-LINUX-APT-116518 https://ubuntu.com/security/CVE-2011-3374 bash TEMP-0841856-B18BAF LOW 5.2.15-2+b7 no fix available binutils CVE-2017-13716 LOW 2.40-2 no fix available https://access.redhat.com/security/cve/CVE-2017-13716 https://nvd.nist.gov/vuln/detail/CVE-2017-13716 https://sourceware.org/bugzilla/show_bug.cgi?id=22009 https://www.cve.org/CVERecord?id=CVE-2017-13716 binutils CVE-2018-20673 LOW 2.40-2 no fix available http://www.securityfocus.com/bid/106454 https://access.redhat.com/security/cve/CVE-2018-20673 https://linux.oracle.com/cve/CVE-2018-20673.html https://linux.oracle.com/errata/ELSA-2021-4386.html https://nvd.nist.gov/vuln/detail/CVE-2018-20673 https://sourceware.org/bugzilla/show_bug.cgi?id=24039 https://www.cve.org/CVERecord?id=CVE-2018-20673 binutils CVE-2018-20712 LOW 2.40-2 no fix available http://www.securityfocus.com/bid/106563 https://access.redhat.com/security/cve/CVE-2018-20712 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629 https://nvd.nist.gov/vuln/detail/CVE-2018-20712 https://sourceware.org/bugzilla/show_bug.cgi?id=24043 https://support.f5.com/csp/article/K38336243 https://www.cve.org/CVERecord?id=CVE-2018-20712 binutils CVE-2018-9996 LOW 2.40-2 no fix available http://www.securityfocus.com/bid/103733 https://access.redhat.com/security/cve/CVE-2018-9996 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304 https://nvd.nist.gov/vuln/detail/CVE-2018-9996 https://www.cve.org/CVERecord?id=CVE-2018-9996 binutils CVE-2021-32256 LOW 2.40-2 no fix available https://access.redhat.com/security/cve/CVE-2021-32256 https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1927070 https://nvd.nist.gov/vuln/detail/CVE-2021-32256 https://security.netapp.com/advisory/ntap-20230824-0013/ https://www.cve.org/CVERecord?id=CVE-2021-32256 binutils CVE-2023-1972 LOW 2.40-2 no fix available https://access.redhat.com/security/cve/CVE-2023-1972 https://bugzilla.redhat.com/show_bug.cgi?id=2185646 https://nvd.nist.gov/vuln/detail/CVE-2023-1972 https://security.gentoo.org/glsa/202309-15 https://sourceware.org/bugzilla/show_bug.cgi?id=30285 https://sourceware.org/git/?p=binutils-gdb.git;a=blobdiff;f=bfd/elf.c;h=185028cbd97ae0901c4276c8a4787b12bb75875a;hp=027d01437352555bc4ac0717cb0486c751a7775d;hb=c22d38baefc5a7a1e1f5cdc9dbb556b1f0ec5c57;hpb=f2f9bde5cde7ff34ed0a4c4682a211d402aa1086 https://ubuntu.com/security/notices/USN-6101-1 https://ubuntu.com/security/notices/USN-6842-1 https://www.cve.org/CVERecord?id=CVE-2023-1972 binutils-common CVE-2017-13716 LOW 2.40-2 no fix available https://access.redhat.com/security/cve/CVE-2017-13716 https://nvd.nist.gov/vuln/detail/CVE-2017-13716 https://sourceware.org/bugzilla/show_bug.cgi?id=22009 https://www.cve.org/CVERecord?id=CVE-2017-13716 binutils-common CVE-2018-20673 LOW 2.40-2 no fix available http://www.securityfocus.com/bid/106454 https://access.redhat.com/security/cve/CVE-2018-20673 https://linux.oracle.com/cve/CVE-2018-20673.html https://linux.oracle.com/errata/ELSA-2021-4386.html https://nvd.nist.gov/vuln/detail/CVE-2018-20673 https://sourceware.org/bugzilla/show_bug.cgi?id=24039 https://www.cve.org/CVERecord?id=CVE-2018-20673 binutils-common CVE-2018-20712 LOW 2.40-2 no fix available http://www.securityfocus.com/bid/106563 https://access.redhat.com/security/cve/CVE-2018-20712 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629 https://nvd.nist.gov/vuln/detail/CVE-2018-20712 https://sourceware.org/bugzilla/show_bug.cgi?id=24043 https://support.f5.com/csp/article/K38336243 https://www.cve.org/CVERecord?id=CVE-2018-20712 binutils-common CVE-2018-9996 LOW 2.40-2 no fix available http://www.securityfocus.com/bid/103733 https://access.redhat.com/security/cve/CVE-2018-9996 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304 https://nvd.nist.gov/vuln/detail/CVE-2018-9996 https://www.cve.org/CVERecord?id=CVE-2018-9996 binutils-common CVE-2021-32256 LOW 2.40-2 no fix available https://access.redhat.com/security/cve/CVE-2021-32256 https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1927070 https://nvd.nist.gov/vuln/detail/CVE-2021-32256 https://security.netapp.com/advisory/ntap-20230824-0013/ https://www.cve.org/CVERecord?id=CVE-2021-32256 binutils-common CVE-2023-1972 LOW 2.40-2 no fix available https://access.redhat.com/security/cve/CVE-2023-1972 https://bugzilla.redhat.com/show_bug.cgi?id=2185646 https://nvd.nist.gov/vuln/detail/CVE-2023-1972 https://security.gentoo.org/glsa/202309-15 https://sourceware.org/bugzilla/show_bug.cgi?id=30285 https://sourceware.org/git/?p=binutils-gdb.git;a=blobdiff;f=bfd/elf.c;h=185028cbd97ae0901c4276c8a4787b12bb75875a;hp=027d01437352555bc4ac0717cb0486c751a7775d;hb=c22d38baefc5a7a1e1f5cdc9dbb556b1f0ec5c57;hpb=f2f9bde5cde7ff34ed0a4c4682a211d402aa1086 https://ubuntu.com/security/notices/USN-6101-1 https://ubuntu.com/security/notices/USN-6842-1 https://www.cve.org/CVERecord?id=CVE-2023-1972 binutils-x86-64-linux-gnu CVE-2017-13716 LOW 2.40-2 no fix available https://access.redhat.com/security/cve/CVE-2017-13716 https://nvd.nist.gov/vuln/detail/CVE-2017-13716 https://sourceware.org/bugzilla/show_bug.cgi?id=22009 https://www.cve.org/CVERecord?id=CVE-2017-13716 binutils-x86-64-linux-gnu CVE-2018-20673 LOW 2.40-2 no fix available http://www.securityfocus.com/bid/106454 https://access.redhat.com/security/cve/CVE-2018-20673 https://linux.oracle.com/cve/CVE-2018-20673.html https://linux.oracle.com/errata/ELSA-2021-4386.html https://nvd.nist.gov/vuln/detail/CVE-2018-20673 https://sourceware.org/bugzilla/show_bug.cgi?id=24039 https://www.cve.org/CVERecord?id=CVE-2018-20673 binutils-x86-64-linux-gnu CVE-2018-20712 LOW 2.40-2 no fix available http://www.securityfocus.com/bid/106563 https://access.redhat.com/security/cve/CVE-2018-20712 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629 https://nvd.nist.gov/vuln/detail/CVE-2018-20712 https://sourceware.org/bugzilla/show_bug.cgi?id=24043 https://support.f5.com/csp/article/K38336243 https://www.cve.org/CVERecord?id=CVE-2018-20712 binutils-x86-64-linux-gnu CVE-2018-9996 LOW 2.40-2 no fix available http://www.securityfocus.com/bid/103733 https://access.redhat.com/security/cve/CVE-2018-9996 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304 https://nvd.nist.gov/vuln/detail/CVE-2018-9996 https://www.cve.org/CVERecord?id=CVE-2018-9996 binutils-x86-64-linux-gnu CVE-2021-32256 LOW 2.40-2 no fix available https://access.redhat.com/security/cve/CVE-2021-32256 https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1927070 https://nvd.nist.gov/vuln/detail/CVE-2021-32256 https://security.netapp.com/advisory/ntap-20230824-0013/ https://www.cve.org/CVERecord?id=CVE-2021-32256 binutils-x86-64-linux-gnu CVE-2023-1972 LOW 2.40-2 no fix available https://access.redhat.com/security/cve/CVE-2023-1972 https://bugzilla.redhat.com/show_bug.cgi?id=2185646 https://nvd.nist.gov/vuln/detail/CVE-2023-1972 https://security.gentoo.org/glsa/202309-15 https://sourceware.org/bugzilla/show_bug.cgi?id=30285 https://sourceware.org/git/?p=binutils-gdb.git;a=blobdiff;f=bfd/elf.c;h=185028cbd97ae0901c4276c8a4787b12bb75875a;hp=027d01437352555bc4ac0717cb0486c751a7775d;hb=c22d38baefc5a7a1e1f5cdc9dbb556b1f0ec5c57;hpb=f2f9bde5cde7ff34ed0a4c4682a211d402aa1086 https://ubuntu.com/security/notices/USN-6101-1 https://ubuntu.com/security/notices/USN-6842-1 https://www.cve.org/CVERecord?id=CVE-2023-1972 bsdutils CVE-2022-0563 LOW 1:2.38.1-5+deb12u2 no fix available https://access.redhat.com/security/cve/CVE-2022-0563 https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/ https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u https://nvd.nist.gov/vuln/detail/CVE-2022-0563 https://security.gentoo.org/glsa/202401-08 https://security.netapp.com/advisory/ntap-20220331-0002/ https://www.cve.org/CVERecord?id=CVE-2022-0563 coreutils CVE-2016-2781 LOW 9.1-1 no fix available http://seclists.org/oss-sec/2016/q1/452 http://www.openwall.com/lists/oss-security/2016/02/28/2 http://www.openwall.com/lists/oss-security/2016/02/28/3 https://access.redhat.com/security/cve/CVE-2016-2781 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E https://lore.kernel.org/patchwork/patch/793178/ https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.28/v2.28-ReleaseNotes https://nvd.nist.gov/vuln/detail/CVE-2016-2781 https://www.cve.org/CVERecord?id=CVE-2016-2781 coreutils CVE-2017-18018 LOW 9.1-1 no fix available http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html https://access.redhat.com/security/cve/CVE-2017-18018 https://nvd.nist.gov/vuln/detail/CVE-2017-18018 https://www.cve.org/CVERecord?id=CVE-2017-18018 cpp-12 CVE-2022-27943 LOW 12.2.0-14 no fix available https://access.redhat.com/security/cve/CVE-2022-27943 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039 https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=1a770b01ef415e114164b6151d1e55acdee09371 https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=9234cdca6ee88badfc00297e72f13dac4e540c79 https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=fc968115a742d9e4674d9725ce9c2106b91b6ead https://gcc.gnu.org/pipermail/gcc-patches/2022-March/592244.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/ https://nvd.nist.gov/vuln/detail/CVE-2022-27943 https://sourceware.org/bugzilla/show_bug.cgi?id=28995 https://www.cve.org/CVERecord?id=CVE-2022-27943 cpp-12 CVE-2023-4039 LOW 12.2.0-14 no fix available https://access.redhat.com/security/cve/CVE-2023-4039 https://developer.arm.com/Arm%20Security%20Center/GCC%20Stack%20Protector%20Vulnerability%20AArch64 https://gcc.gnu.org/git/?p=gcc.git;a=blob_plain;f=SECURITY.txt https://gcc.gnu.org/pipermail/gcc-patches/2023-October/634066.html https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-x7ch-h5rf-w2mf https://inbox.sourceware.org/gcc-patches/46cfa37b-56eb-344d-0745-e0d35393392d@gotplt.org https://linux.oracle.com/cve/CVE-2023-4039.html https://linux.oracle.com/errata/ELSA-2023-28766.html https://nvd.nist.gov/vuln/detail/CVE-2023-4039 https://rtx.meta.security/mitigation/2023/09/12/CVE-2023-4039.html https://www.cve.org/CVERecord?id=CVE-2023-4039 curl CVE-2024-9681 MEDIUM 7.88.1-10+deb12u8 no fix available http://www.openwall.com/lists/oss-security/2024/11/06/2 https://access.redhat.com/security/cve/CVE-2024-9681 https://curl.se/docs/CVE-2024-9681.html https://curl.se/docs/CVE-2024-9681.json https://hackerone.com/reports/2764830 https://nvd.nist.gov/vuln/detail/CVE-2024-9681 https://ubuntu.com/security/notices/USN-7104-1 https://www.cve.org/CVERecord?id=CVE-2024-9681 curl CVE-2024-2379 LOW 7.88.1-10+deb12u8 no fix available http://seclists.org/fulldisclosure/2024/Jul/18 http://seclists.org/fulldisclosure/2024/Jul/19 http://seclists.org/fulldisclosure/2024/Jul/20 http://www.openwall.com/lists/oss-security/2024/03/27/2 https://access.redhat.com/security/cve/CVE-2024-2379 https://curl.se/docs/CVE-2024-2379.html https://curl.se/docs/CVE-2024-2379.json https://hackerone.com/reports/2410774 https://nvd.nist.gov/vuln/detail/CVE-2024-2379 https://security.netapp.com/advisory/ntap-20240531-0001/ https://support.apple.com/kb/HT214118 https://support.apple.com/kb/HT214119 https://support.apple.com/kb/HT214120 https://www.cve.org/CVERecord?id=CVE-2024-2379 g++-12 CVE-2022-27943 LOW 12.2.0-14 no fix available https://access.redhat.com/security/cve/CVE-2022-27943 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039 https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=1a770b01ef415e114164b6151d1e55acdee09371 https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=9234cdca6ee88badfc00297e72f13dac4e540c79 https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=fc968115a742d9e4674d9725ce9c2106b91b6ead https://gcc.gnu.org/pipermail/gcc-patches/2022-March/592244.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/ https://nvd.nist.gov/vuln/detail/CVE-2022-27943 https://sourceware.org/bugzilla/show_bug.cgi?id=28995 https://www.cve.org/CVERecord?id=CVE-2022-27943 g++-12 CVE-2023-4039 LOW 12.2.0-14 no fix available https://access.redhat.com/security/cve/CVE-2023-4039 https://developer.arm.com/Arm%20Security%20Center/GCC%20Stack%20Protector%20Vulnerability%20AArch64 https://gcc.gnu.org/git/?p=gcc.git;a=blob_plain;f=SECURITY.txt https://gcc.gnu.org/pipermail/gcc-patches/2023-October/634066.html https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-x7ch-h5rf-w2mf https://inbox.sourceware.org/gcc-patches/46cfa37b-56eb-344d-0745-e0d35393392d@gotplt.org https://linux.oracle.com/cve/CVE-2023-4039.html https://linux.oracle.com/errata/ELSA-2023-28766.html https://nvd.nist.gov/vuln/detail/CVE-2023-4039 https://rtx.meta.security/mitigation/2023/09/12/CVE-2023-4039.html https://www.cve.org/CVERecord?id=CVE-2023-4039 gcc-12 CVE-2022-27943 LOW 12.2.0-14 no fix available https://access.redhat.com/security/cve/CVE-2022-27943 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039 https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=1a770b01ef415e114164b6151d1e55acdee09371 https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=9234cdca6ee88badfc00297e72f13dac4e540c79 https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=fc968115a742d9e4674d9725ce9c2106b91b6ead https://gcc.gnu.org/pipermail/gcc-patches/2022-March/592244.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/ https://nvd.nist.gov/vuln/detail/CVE-2022-27943 https://sourceware.org/bugzilla/show_bug.cgi?id=28995 https://www.cve.org/CVERecord?id=CVE-2022-27943 gcc-12 CVE-2023-4039 LOW 12.2.0-14 no fix available https://access.redhat.com/security/cve/CVE-2023-4039 https://developer.arm.com/Arm%20Security%20Center/GCC%20Stack%20Protector%20Vulnerability%20AArch64 https://gcc.gnu.org/git/?p=gcc.git;a=blob_plain;f=SECURITY.txt https://gcc.gnu.org/pipermail/gcc-patches/2023-October/634066.html https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-x7ch-h5rf-w2mf https://inbox.sourceware.org/gcc-patches/46cfa37b-56eb-344d-0745-e0d35393392d@gotplt.org https://linux.oracle.com/cve/CVE-2023-4039.html https://linux.oracle.com/errata/ELSA-2023-28766.html https://nvd.nist.gov/vuln/detail/CVE-2023-4039 https://rtx.meta.security/mitigation/2023/09/12/CVE-2023-4039.html https://www.cve.org/CVERecord?id=CVE-2023-4039 gcc-12-base CVE-2022-27943 LOW 12.2.0-14 no fix available https://access.redhat.com/security/cve/CVE-2022-27943 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039 https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=1a770b01ef415e114164b6151d1e55acdee09371 https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=9234cdca6ee88badfc00297e72f13dac4e540c79 https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=fc968115a742d9e4674d9725ce9c2106b91b6ead https://gcc.gnu.org/pipermail/gcc-patches/2022-March/592244.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/ https://nvd.nist.gov/vuln/detail/CVE-2022-27943 https://sourceware.org/bugzilla/show_bug.cgi?id=28995 https://www.cve.org/CVERecord?id=CVE-2022-27943 gcc-12-base CVE-2023-4039 LOW 12.2.0-14 no fix available https://access.redhat.com/security/cve/CVE-2023-4039 https://developer.arm.com/Arm%20Security%20Center/GCC%20Stack%20Protector%20Vulnerability%20AArch64 https://gcc.gnu.org/git/?p=gcc.git;a=blob_plain;f=SECURITY.txt https://gcc.gnu.org/pipermail/gcc-patches/2023-October/634066.html https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-x7ch-h5rf-w2mf https://inbox.sourceware.org/gcc-patches/46cfa37b-56eb-344d-0745-e0d35393392d@gotplt.org https://linux.oracle.com/cve/CVE-2023-4039.html https://linux.oracle.com/errata/ELSA-2023-28766.html https://nvd.nist.gov/vuln/detail/CVE-2023-4039 https://rtx.meta.security/mitigation/2023/09/12/CVE-2023-4039.html https://www.cve.org/CVERecord?id=CVE-2023-4039 gpgv CVE-2022-3219 LOW 2.2.40-1.1 no fix available https://access.redhat.com/security/cve/CVE-2022-3219 https://bugzilla.redhat.com/show_bug.cgi?id=2127010 https://dev.gnupg.org/D556 https://dev.gnupg.org/T5993 https://marc.info/?l=oss-security&m=165696590211434&w=4 https://nvd.nist.gov/vuln/detail/CVE-2022-3219 https://security.netapp.com/advisory/ntap-20230324-0001/ https://www.cve.org/CVERecord?id=CVE-2022-3219 libapt-pkg6.0 CVE-2011-3374 LOW 2.6.1 no fix available https://access.redhat.com/security/cve/cve-2011-3374 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480 https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html https://seclists.org/fulldisclosure/2011/Sep/221 https://security-tracker.debian.org/tracker/CVE-2011-3374 https://snyk.io/vuln/SNYK-LINUX-APT-116518 https://ubuntu.com/security/CVE-2011-3374 libasan8 CVE-2022-27943 LOW 12.2.0-14 no fix available https://access.redhat.com/security/cve/CVE-2022-27943 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039 https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=1a770b01ef415e114164b6151d1e55acdee09371 https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=9234cdca6ee88badfc00297e72f13dac4e540c79 https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=fc968115a742d9e4674d9725ce9c2106b91b6ead https://gcc.gnu.org/pipermail/gcc-patches/2022-March/592244.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/ https://nvd.nist.gov/vuln/detail/CVE-2022-27943 https://sourceware.org/bugzilla/show_bug.cgi?id=28995 https://www.cve.org/CVERecord?id=CVE-2022-27943 libasan8 CVE-2023-4039 LOW 12.2.0-14 no fix available https://access.redhat.com/security/cve/CVE-2023-4039 https://developer.arm.com/Arm%20Security%20Center/GCC%20Stack%20Protector%20Vulnerability%20AArch64 https://gcc.gnu.org/git/?p=gcc.git;a=blob_plain;f=SECURITY.txt https://gcc.gnu.org/pipermail/gcc-patches/2023-October/634066.html https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-x7ch-h5rf-w2mf https://inbox.sourceware.org/gcc-patches/46cfa37b-56eb-344d-0745-e0d35393392d@gotplt.org https://linux.oracle.com/cve/CVE-2023-4039.html https://linux.oracle.com/errata/ELSA-2023-28766.html https://nvd.nist.gov/vuln/detail/CVE-2023-4039 https://rtx.meta.security/mitigation/2023/09/12/CVE-2023-4039.html https://www.cve.org/CVERecord?id=CVE-2023-4039 libatomic1 CVE-2022-27943 LOW 12.2.0-14 no fix available https://access.redhat.com/security/cve/CVE-2022-27943 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039 https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=1a770b01ef415e114164b6151d1e55acdee09371 https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=9234cdca6ee88badfc00297e72f13dac4e540c79 https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=fc968115a742d9e4674d9725ce9c2106b91b6ead https://gcc.gnu.org/pipermail/gcc-patches/2022-March/592244.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/ https://nvd.nist.gov/vuln/detail/CVE-2022-27943 https://sourceware.org/bugzilla/show_bug.cgi?id=28995 https://www.cve.org/CVERecord?id=CVE-2022-27943 libatomic1 CVE-2023-4039 LOW 12.2.0-14 no fix available https://access.redhat.com/security/cve/CVE-2023-4039 https://developer.arm.com/Arm%20Security%20Center/GCC%20Stack%20Protector%20Vulnerability%20AArch64 https://gcc.gnu.org/git/?p=gcc.git;a=blob_plain;f=SECURITY.txt https://gcc.gnu.org/pipermail/gcc-patches/2023-October/634066.html https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-x7ch-h5rf-w2mf https://inbox.sourceware.org/gcc-patches/46cfa37b-56eb-344d-0745-e0d35393392d@gotplt.org https://linux.oracle.com/cve/CVE-2023-4039.html https://linux.oracle.com/errata/ELSA-2023-28766.html https://nvd.nist.gov/vuln/detail/CVE-2023-4039 https://rtx.meta.security/mitigation/2023/09/12/CVE-2023-4039.html https://www.cve.org/CVERecord?id=CVE-2023-4039 libbinutils CVE-2017-13716 LOW 2.40-2 no fix available https://access.redhat.com/security/cve/CVE-2017-13716 https://nvd.nist.gov/vuln/detail/CVE-2017-13716 https://sourceware.org/bugzilla/show_bug.cgi?id=22009 https://www.cve.org/CVERecord?id=CVE-2017-13716 libbinutils CVE-2018-20673 LOW 2.40-2 no fix available http://www.securityfocus.com/bid/106454 https://access.redhat.com/security/cve/CVE-2018-20673 https://linux.oracle.com/cve/CVE-2018-20673.html https://linux.oracle.com/errata/ELSA-2021-4386.html https://nvd.nist.gov/vuln/detail/CVE-2018-20673 https://sourceware.org/bugzilla/show_bug.cgi?id=24039 https://www.cve.org/CVERecord?id=CVE-2018-20673 libbinutils CVE-2018-20712 LOW 2.40-2 no fix available http://www.securityfocus.com/bid/106563 https://access.redhat.com/security/cve/CVE-2018-20712 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88629 https://nvd.nist.gov/vuln/detail/CVE-2018-20712 https://sourceware.org/bugzilla/show_bug.cgi?id=24043 https://support.f5.com/csp/article/K38336243 https://www.cve.org/CVERecord?id=CVE-2018-20712 libbinutils CVE-2018-9996 LOW 2.40-2 no fix available http://www.securityfocus.com/bid/103733 https://access.redhat.com/security/cve/CVE-2018-9996 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85304 https://nvd.nist.gov/vuln/detail/CVE-2018-9996 https://www.cve.org/CVERecord?id=CVE-2018-9996 libbinutils CVE-2021-32256 LOW 2.40-2 no fix available https://access.redhat.com/security/cve/CVE-2021-32256 https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1927070 https://nvd.nist.gov/vuln/detail/CVE-2021-32256 https://security.netapp.com/advisory/ntap-20230824-0013/ https://www.cve.org/CVERecord?id=CVE-2021-32256 libbinutils CVE-2023-1972 LOW 2.40-2 no fix available https://access.redhat.com/security/cve/CVE-2023-1972 https://bugzilla.redhat.com/show_bug.cgi?id=2185646 https://nvd.nist.gov/vuln/detail/CVE-2023-1972 https://security.gentoo.org/glsa/202309-15 https://sourceware.org/bugzilla/show_bug.cgi?id=30285 https://sourceware.org/git/?p=binutils-gdb.git;a=blobdiff;f=bfd/elf.c;h=185028cbd97ae0901c4276c8a4787b12bb75875a;hp=027d01437352555bc4ac0717cb0486c751a7775d;hb=c22d38baefc5a7a1e1f5cdc9dbb556b1f0ec5c57;hpb=f2f9bde5cde7ff34ed0a4c4682a211d402aa1086 https://ubuntu.com/security/notices/USN-6101-1 https://ubuntu.com/security/notices/USN-6842-1 https://www.cve.org/CVERecord?id=CVE-2023-1972 libblkid1 CVE-2022-0563 LOW 2.38.1-5+deb12u2 no fix available https://access.redhat.com/security/cve/CVE-2022-0563 https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/ https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u https://nvd.nist.gov/vuln/detail/CVE-2022-0563 https://security.gentoo.org/glsa/202401-08 https://security.netapp.com/advisory/ntap-20220331-0002/ https://www.cve.org/CVERecord?id=CVE-2022-0563 libc-bin CVE-2010-4756 LOW 2.36-9+deb12u9 no fix available http://cxib.net/stuff/glob-0day.c http://securityreason.com/achievement_securityalert/89 http://securityreason.com/exploitalert/9223 https://access.redhat.com/security/cve/CVE-2010-4756 https://bugzilla.redhat.com/show_bug.cgi?id=681681 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756 https://nvd.nist.gov/vuln/detail/CVE-2010-4756 https://www.cve.org/CVERecord?id=CVE-2010-4756 libc-bin CVE-2018-20796 LOW 2.36-9+deb12u9 no fix available http://www.securityfocus.com/bid/107160 https://access.redhat.com/security/cve/CVE-2018-20796 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141 https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html https://nvd.nist.gov/vuln/detail/CVE-2018-20796 https://security.netapp.com/advisory/ntap-20190315-0002/ https://support.f5.com/csp/article/K26346590?utm_source=f5support&%3Butm_medium=RSS https://www.cve.org/CVERecord?id=CVE-2018-20796 libc-bin CVE-2019-1010022 LOW 2.36-9+deb12u9 no fix available https://access.redhat.com/security/cve/CVE-2019-1010022 https://nvd.nist.gov/vuln/detail/CVE-2019-1010022 https://security-tracker.debian.org/tracker/CVE-2019-1010022 https://sourceware.org/bugzilla/show_bug.cgi?id=22850 https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3 https://ubuntu.com/security/CVE-2019-1010022 https://www.cve.org/CVERecord?id=CVE-2019-1010022 libc-bin CVE-2019-1010023 LOW 2.36-9+deb12u9 no fix available http://www.securityfocus.com/bid/109167 https://access.redhat.com/security/cve/CVE-2019-1010023 https://nvd.nist.gov/vuln/detail/CVE-2019-1010023 https://security-tracker.debian.org/tracker/CVE-2019-1010023 https://sourceware.org/bugzilla/show_bug.cgi?id=22851 https://support.f5.com/csp/article/K11932200?utm_source=f5support&%3Butm_medium=RSS https://ubuntu.com/security/CVE-2019-1010023 https://www.cve.org/CVERecord?id=CVE-2019-1010023 633 other vulnerabilities found... No Misconfigurations found