docker.io/sqlfluff/sqlfluff:latest (debian 11.11)¶ Trivy Image Scan Image: docker.io/sqlfluff/sqlfluff:latest (debian 11.11) Scan date: 2025-11-19 docker.io/sqlfluff/sqlfluff:latest (debian 11.11) (debian)¶ Package Vulnerability ID Severity Installed Version Fixed Version Links apt CVE-2011-3374 LOW 2.2.4 no fix available https://access.redhat.com/security/cve/cve-2011-3374 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480 https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html https://seclists.org/fulldisclosure/2011/Sep/221 https://security-tracker.debian.org/tracker/CVE-2011-3374 https://snyk.io/vuln/SNYK-LINUX-APT-116518 https://ubuntu.com/security/CVE-2011-3374 bash CVE-2022-3715 HIGH 5.1-2+deb11u1 no fix available https://access.redhat.com/errata/RHSA-2023:0340 https://access.redhat.com/security/cve/CVE-2022-3715 https://bugzilla.redhat.com/2126720 https://bugzilla.redhat.com/show_bug.cgi?id=2126720 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3715 https://errata.almalinux.org/9/ALSA-2023-0340.html https://errata.rockylinux.org/RLSA-2023:0340 https://linux.oracle.com/cve/CVE-2022-3715.html https://linux.oracle.com/errata/ELSA-2023-0340.html https://lists.gnu.org/archive/html/bug-bash/2022-08/msg00147.html https://nvd.nist.gov/vuln/detail/CVE-2022-3715 https://security.netapp.com/advisory/ntap-20241108-0002/ https://ubuntu.com/security/notices/USN-6697-1 https://www.cve.org/CVERecord?id=CVE-2022-3715 bash TEMP-0841856-B18BAF LOW 5.1-2+deb11u1 no fix available bsdutils CVE-2022-0563 LOW 1:2.36.1-8+deb11u2 no fix available https://access.redhat.com/security/cve/CVE-2022-0563 https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/ https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u https://nvd.nist.gov/vuln/detail/CVE-2022-0563 https://security.gentoo.org/glsa/202401-08 https://security.netapp.com/advisory/ntap-20220331-0002/ https://www.cve.org/CVERecord?id=CVE-2022-0563 coreutils CVE-2016-2781 LOW 8.32-4+b1 no fix available http://seclists.org/oss-sec/2016/q1/452 http://www.openwall.com/lists/oss-security/2016/02/28/2 http://www.openwall.com/lists/oss-security/2016/02/28/3 https://access.redhat.com/security/cve/CVE-2016-2781 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E https://lore.kernel.org/patchwork/patch/793178/ https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.28/v2.28-ReleaseNotes https://nvd.nist.gov/vuln/detail/CVE-2016-2781 https://www.cve.org/CVERecord?id=CVE-2016-2781 coreutils CVE-2017-18018 LOW 8.32-4+b1 no fix available http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html https://access.redhat.com/security/cve/CVE-2017-18018 https://nvd.nist.gov/vuln/detail/CVE-2017-18018 https://www.cve.org/CVERecord?id=CVE-2017-18018 coreutils CVE-2025-5278 LOW 8.32-4+b1 no fix available http://www.openwall.com/lists/oss-security/2025/05/27/2 http://www.openwall.com/lists/oss-security/2025/05/29/1 http://www.openwall.com/lists/oss-security/2025/05/29/2 https://access.redhat.com/security/cve/CVE-2025-5278 https://bugzilla.redhat.com/show_bug.cgi?id=2368764 https://cgit.git.savannah.gnu.org/cgit/coreutils.git/commit/?id=8c9602e3a145e9596dc1a63c6ed67865814b6633 https://cgit.git.savannah.gnu.org/cgit/coreutils.git/tree/NEWS?id=8c9602e3a145e9596dc1a63c6ed67865814b6633#n14 https://nvd.nist.gov/vuln/detail/CVE-2025-5278 https://security-tracker.debian.org/tracker/CVE-2025-5278 https://www.cve.org/CVERecord?id=CVE-2025-5278 dpkg CVE-2025-6297 LOW 1.20.13 no fix available https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=ed6bbd445dd8800308c67236ba35d08004c98e82 https://ubuntu.com/security/notices/USN-7768-1 https://www.cve.org/CVERecord?id=CVE-2025-6297 gcc-10-base CVE-2023-4039 LOW 10.2.1-6 no fix available https://access.redhat.com/security/cve/CVE-2023-4039 https://developer.arm.com/Arm%20Security%20Center/GCC%20Stack%20Protector%20Vulnerability%20AArch64 https://gcc.gnu.org/git/?p=gcc.git;a=blob_plain;f=SECURITY.txt https://gcc.gnu.org/pipermail/gcc-patches/2023-October/634066.html https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-x7ch-h5rf-w2mf https://inbox.sourceware.org/gcc-patches/46cfa37b-56eb-344d-0745-e0d35393392d@gotplt.org https://linux.oracle.com/cve/CVE-2023-4039.html https://linux.oracle.com/errata/ELSA-2023-28766.html https://nvd.nist.gov/vuln/detail/CVE-2023-4039 https://rtx.meta.security/mitigation/2023/09/12/CVE-2023-4039.html https://ubuntu.com/security/notices/USN-7700-1 https://www.cve.org/CVERecord?id=CVE-2023-4039 gcc-9-base CVE-2023-4039 LOW 9.3.0-22 no fix available https://access.redhat.com/security/cve/CVE-2023-4039 https://developer.arm.com/Arm%20Security%20Center/GCC%20Stack%20Protector%20Vulnerability%20AArch64 https://gcc.gnu.org/git/?p=gcc.git;a=blob_plain;f=SECURITY.txt https://gcc.gnu.org/pipermail/gcc-patches/2023-October/634066.html https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-x7ch-h5rf-w2mf https://inbox.sourceware.org/gcc-patches/46cfa37b-56eb-344d-0745-e0d35393392d@gotplt.org https://linux.oracle.com/cve/CVE-2023-4039.html https://linux.oracle.com/errata/ELSA-2023-28766.html https://nvd.nist.gov/vuln/detail/CVE-2023-4039 https://rtx.meta.security/mitigation/2023/09/12/CVE-2023-4039.html https://ubuntu.com/security/notices/USN-7700-1 https://www.cve.org/CVERecord?id=CVE-2023-4039 gpgv CVE-2025-30258 MEDIUM 2.2.27-2+deb11u2 no fix available https://access.redhat.com/security/cve/CVE-2025-30258 https://dev.gnupg.org/T7527 https://dev.gnupg.org/rG48978ccb4e20866472ef18436a32744350a65158 https://lists.gnupg.org/pipermail/gnupg-announce/2025q1/000491.html https://nvd.nist.gov/vuln/detail/CVE-2025-30258 https://ubuntu.com/security/notices/USN-7412-1 https://www.cve.org/CVERecord?id=CVE-2025-30258 gpgv CVE-2022-3219 LOW 2.2.27-2+deb11u2 no fix available https://access.redhat.com/security/cve/CVE-2022-3219 https://bugzilla.redhat.com/show_bug.cgi?id=2127010 https://dev.gnupg.org/D556 https://dev.gnupg.org/T5993 https://marc.info/?l=oss-security&m=165696590211434&w=4 https://nvd.nist.gov/vuln/detail/CVE-2022-3219 https://security.netapp.com/advisory/ntap-20230324-0001/ https://www.cve.org/CVERecord?id=CVE-2022-3219 libapt-pkg6.0 CVE-2011-3374 LOW 2.2.4 no fix available https://access.redhat.com/security/cve/cve-2011-3374 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=642480 https://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-3374.html https://seclists.org/fulldisclosure/2011/Sep/221 https://security-tracker.debian.org/tracker/CVE-2011-3374 https://snyk.io/vuln/SNYK-LINUX-APT-116518 https://ubuntu.com/security/CVE-2011-3374 libblkid1 CVE-2022-0563 LOW 2.36.1-8+deb11u2 no fix available https://access.redhat.com/security/cve/CVE-2022-0563 https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/ https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u https://nvd.nist.gov/vuln/detail/CVE-2022-0563 https://security.gentoo.org/glsa/202401-08 https://security.netapp.com/advisory/ntap-20220331-0002/ https://www.cve.org/CVERecord?id=CVE-2022-0563 libc-bin CVE-2023-4806 MEDIUM 2.31-13+deb11u13 no fix available http://www.openwall.com/lists/oss-security/2023/10/03/4 http://www.openwall.com/lists/oss-security/2023/10/03/5 http://www.openwall.com/lists/oss-security/2023/10/03/6 http://www.openwall.com/lists/oss-security/2023/10/03/8 https://access.redhat.com/errata/RHBA-2024:2413 https://access.redhat.com/errata/RHSA-2023:5453 https://access.redhat.com/errata/RHSA-2023:5455 https://access.redhat.com/errata/RHSA-2023:7409 https://access.redhat.com/security/cve/CVE-2023-4806 https://bugzilla.redhat.com/2234712 https://bugzilla.redhat.com/2237782 https://bugzilla.redhat.com/2237798 https://bugzilla.redhat.com/2238352 https://bugzilla.redhat.com/show_bug.cgi?id=2234712 https://bugzilla.redhat.com/show_bug.cgi?id=2237782 https://bugzilla.redhat.com/show_bug.cgi?id=2237798 https://bugzilla.redhat.com/show_bug.cgi?id=2238352 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4527 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4806 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4813 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4911 https://errata.almalinux.org/9/ALSA-2023-5453.html https://errata.rockylinux.org/RLSA-2023:5455 https://linux.oracle.com/cve/CVE-2023-4806.html https://linux.oracle.com/errata/ELSA-2023-5455.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DBUQRRPB47TC3NJOUIBVWUGFHBJAFDL/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DFG4P76UHHZEWQ26FWBXG76N2QLKKPZA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAQWHTSVOCOZ5K6KPIWKRT3JX4RTZUR/ https://nvd.nist.gov/vuln/detail/CVE-2023-4806 https://security.gentoo.org/glsa/202310-03 https://security.netapp.com/advisory/ntap-20240125-0008/ https://ubuntu.com/security/notices/USN-6541-1 https://ubuntu.com/security/notices/USN-6541-2 https://www.cve.org/CVERecord?id=CVE-2023-4806 libc-bin CVE-2023-4813 MEDIUM 2.31-13+deb11u13 no fix available http://www.openwall.com/lists/oss-security/2023/10/03/8 https://access.redhat.com/errata/RHBA-2024:2413 https://access.redhat.com/errata/RHSA-2023:5453 https://access.redhat.com/errata/RHSA-2023:5455 https://access.redhat.com/errata/RHSA-2023:7409 https://access.redhat.com/security/cve/CVE-2023-4813 https://bugzilla.redhat.com/2234712 https://bugzilla.redhat.com/2237782 https://bugzilla.redhat.com/2237798 https://bugzilla.redhat.com/2238352 https://bugzilla.redhat.com/show_bug.cgi?id=2234712 https://bugzilla.redhat.com/show_bug.cgi?id=2237782 https://bugzilla.redhat.com/show_bug.cgi?id=2237798 https://bugzilla.redhat.com/show_bug.cgi?id=2238352 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4527 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4806 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4813 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4911 https://errata.almalinux.org/9/ALSA-2023-5453.html https://errata.rockylinux.org/RLSA-2023:5455 https://linux.oracle.com/cve/CVE-2023-4813.html https://linux.oracle.com/errata/ELSA-2023-5455.html https://nvd.nist.gov/vuln/detail/CVE-2023-4813 https://security.netapp.com/advisory/ntap-20231110-0003/ https://ubuntu.com/security/notices/USN-6541-1 https://ubuntu.com/security/notices/USN-6541-2 https://www.cve.org/CVERecord?id=CVE-2023-4813 libc-bin CVE-2025-8058 MEDIUM 2.31-13+deb11u13 no fix available http://www.openwall.com/lists/oss-security/2025/07/23/1 https://access.redhat.com/errata/RHSA-2025:12980 https://access.redhat.com/security/cve/CVE-2025-8058 https://bugzilla.redhat.com/2383146 https://bugzilla.redhat.com/show_bug.cgi?id=2383146 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8058 https://errata.almalinux.org/8/ALSA-2025-12980.html https://errata.rockylinux.org/RLSA-2025:12980 https://linux.oracle.com/cve/CVE-2025-8058.html https://linux.oracle.com/errata/ELSA-2025-20595.html https://nvd.nist.gov/vuln/detail/CVE-2025-8058 https://sourceware.org/bugzilla/show_bug.cgi?id=33185 https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2025-0005 https://sourceware.org/git/?p=glibc.git;a=commit;h=3ff17af18c38727b88d9115e536c069e6b5d601f https://ubuntu.com/security/notices/USN-7760-1 https://www.cve.org/CVERecord?id=CVE-2025-8058 libc-bin CVE-2010-4756 LOW 2.31-13+deb11u13 no fix available http://cxib.net/stuff/glob-0day.c http://securityreason.com/achievement_securityalert/89 http://securityreason.com/exploitalert/9223 https://access.redhat.com/security/cve/CVE-2010-4756 https://bugzilla.redhat.com/show_bug.cgi?id=681681 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756 https://nvd.nist.gov/vuln/detail/CVE-2010-4756 https://security.netapp.com/advisory/ntap-20241108-0002/ https://www.cve.org/CVERecord?id=CVE-2010-4756 libc-bin CVE-2018-20796 LOW 2.31-13+deb11u13 no fix available http://www.securityfocus.com/bid/107160 https://access.redhat.com/security/cve/CVE-2018-20796 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141 https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html https://nvd.nist.gov/vuln/detail/CVE-2018-20796 https://security.netapp.com/advisory/ntap-20190315-0002/ https://support.f5.com/csp/article/K26346590?utm_source=f5support&%3Butm_medium=RSS https://www.cve.org/CVERecord?id=CVE-2018-20796 libc-bin CVE-2019-1010022 LOW 2.31-13+deb11u13 no fix available https://access.redhat.com/security/cve/CVE-2019-1010022 https://nvd.nist.gov/vuln/detail/CVE-2019-1010022 https://security-tracker.debian.org/tracker/CVE-2019-1010022 https://sourceware.org/bugzilla/show_bug.cgi?id=22850 https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3 https://ubuntu.com/security/CVE-2019-1010022 https://www.cve.org/CVERecord?id=CVE-2019-1010022 libc-bin CVE-2019-1010023 LOW 2.31-13+deb11u13 no fix available http://www.securityfocus.com/bid/109167 https://access.redhat.com/security/cve/CVE-2019-1010023 https://nvd.nist.gov/vuln/detail/CVE-2019-1010023 https://security-tracker.debian.org/tracker/CVE-2019-1010023 https://sourceware.org/bugzilla/show_bug.cgi?id=22851 https://support.f5.com/csp/article/K11932200?utm_source=f5support&%3Butm_medium=RSS https://ubuntu.com/security/CVE-2019-1010023 https://www.cve.org/CVERecord?id=CVE-2019-1010023 libc-bin CVE-2019-1010024 LOW 2.31-13+deb11u13 no fix available http://www.securityfocus.com/bid/109162 https://access.redhat.com/security/cve/CVE-2019-1010024 https://nvd.nist.gov/vuln/detail/CVE-2019-1010024 https://security-tracker.debian.org/tracker/CVE-2019-1010024 https://sourceware.org/bugzilla/show_bug.cgi?id=22852 https://support.f5.com/csp/article/K06046097 https://support.f5.com/csp/article/K06046097?utm_source=f5support&%3Butm_medium=RSS https://ubuntu.com/security/CVE-2019-1010024 https://www.cve.org/CVERecord?id=CVE-2019-1010024 libc-bin CVE-2019-1010025 LOW 2.31-13+deb11u13 no fix available https://access.redhat.com/security/cve/CVE-2019-1010025 https://nvd.nist.gov/vuln/detail/CVE-2019-1010025 https://security-tracker.debian.org/tracker/CVE-2019-1010025 https://sourceware.org/bugzilla/show_bug.cgi?id=22853 https://support.f5.com/csp/article/K06046097 https://support.f5.com/csp/article/K06046097?utm_source=f5support&%3Butm_medium=RSS https://ubuntu.com/security/CVE-2019-1010025 https://www.cve.org/CVERecord?id=CVE-2019-1010025 libc-bin CVE-2019-9192 LOW 2.31-13+deb11u13 no fix available https://access.redhat.com/security/cve/CVE-2019-9192 https://nvd.nist.gov/vuln/detail/CVE-2019-9192 https://sourceware.org/bugzilla/show_bug.cgi?id=24269 https://support.f5.com/csp/article/K26346590?utm_source=f5support&%3Butm_medium=RSS https://www.cve.org/CVERecord?id=CVE-2019-9192 libc6 CVE-2023-4806 MEDIUM 2.31-13+deb11u13 no fix available http://www.openwall.com/lists/oss-security/2023/10/03/4 http://www.openwall.com/lists/oss-security/2023/10/03/5 http://www.openwall.com/lists/oss-security/2023/10/03/6 http://www.openwall.com/lists/oss-security/2023/10/03/8 https://access.redhat.com/errata/RHBA-2024:2413 https://access.redhat.com/errata/RHSA-2023:5453 https://access.redhat.com/errata/RHSA-2023:5455 https://access.redhat.com/errata/RHSA-2023:7409 https://access.redhat.com/security/cve/CVE-2023-4806 https://bugzilla.redhat.com/2234712 https://bugzilla.redhat.com/2237782 https://bugzilla.redhat.com/2237798 https://bugzilla.redhat.com/2238352 https://bugzilla.redhat.com/show_bug.cgi?id=2234712 https://bugzilla.redhat.com/show_bug.cgi?id=2237782 https://bugzilla.redhat.com/show_bug.cgi?id=2237798 https://bugzilla.redhat.com/show_bug.cgi?id=2238352 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4527 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4806 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4813 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4911 https://errata.almalinux.org/9/ALSA-2023-5453.html https://errata.rockylinux.org/RLSA-2023:5455 https://linux.oracle.com/cve/CVE-2023-4806.html https://linux.oracle.com/errata/ELSA-2023-5455.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DBUQRRPB47TC3NJOUIBVWUGFHBJAFDL/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DFG4P76UHHZEWQ26FWBXG76N2QLKKPZA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAQWHTSVOCOZ5K6KPIWKRT3JX4RTZUR/ https://nvd.nist.gov/vuln/detail/CVE-2023-4806 https://security.gentoo.org/glsa/202310-03 https://security.netapp.com/advisory/ntap-20240125-0008/ https://ubuntu.com/security/notices/USN-6541-1 https://ubuntu.com/security/notices/USN-6541-2 https://www.cve.org/CVERecord?id=CVE-2023-4806 libc6 CVE-2023-4813 MEDIUM 2.31-13+deb11u13 no fix available http://www.openwall.com/lists/oss-security/2023/10/03/8 https://access.redhat.com/errata/RHBA-2024:2413 https://access.redhat.com/errata/RHSA-2023:5453 https://access.redhat.com/errata/RHSA-2023:5455 https://access.redhat.com/errata/RHSA-2023:7409 https://access.redhat.com/security/cve/CVE-2023-4813 https://bugzilla.redhat.com/2234712 https://bugzilla.redhat.com/2237782 https://bugzilla.redhat.com/2237798 https://bugzilla.redhat.com/2238352 https://bugzilla.redhat.com/show_bug.cgi?id=2234712 https://bugzilla.redhat.com/show_bug.cgi?id=2237782 https://bugzilla.redhat.com/show_bug.cgi?id=2237798 https://bugzilla.redhat.com/show_bug.cgi?id=2238352 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4527 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4806 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4813 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4911 https://errata.almalinux.org/9/ALSA-2023-5453.html https://errata.rockylinux.org/RLSA-2023:5455 https://linux.oracle.com/cve/CVE-2023-4813.html https://linux.oracle.com/errata/ELSA-2023-5455.html https://nvd.nist.gov/vuln/detail/CVE-2023-4813 https://security.netapp.com/advisory/ntap-20231110-0003/ https://ubuntu.com/security/notices/USN-6541-1 https://ubuntu.com/security/notices/USN-6541-2 https://www.cve.org/CVERecord?id=CVE-2023-4813 libc6 CVE-2025-8058 MEDIUM 2.31-13+deb11u13 no fix available http://www.openwall.com/lists/oss-security/2025/07/23/1 https://access.redhat.com/errata/RHSA-2025:12980 https://access.redhat.com/security/cve/CVE-2025-8058 https://bugzilla.redhat.com/2383146 https://bugzilla.redhat.com/show_bug.cgi?id=2383146 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8058 https://errata.almalinux.org/8/ALSA-2025-12980.html https://errata.rockylinux.org/RLSA-2025:12980 https://linux.oracle.com/cve/CVE-2025-8058.html https://linux.oracle.com/errata/ELSA-2025-20595.html https://nvd.nist.gov/vuln/detail/CVE-2025-8058 https://sourceware.org/bugzilla/show_bug.cgi?id=33185 https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2025-0005 https://sourceware.org/git/?p=glibc.git;a=commit;h=3ff17af18c38727b88d9115e536c069e6b5d601f https://ubuntu.com/security/notices/USN-7760-1 https://www.cve.org/CVERecord?id=CVE-2025-8058 libc6 CVE-2010-4756 LOW 2.31-13+deb11u13 no fix available http://cxib.net/stuff/glob-0day.c http://securityreason.com/achievement_securityalert/89 http://securityreason.com/exploitalert/9223 https://access.redhat.com/security/cve/CVE-2010-4756 https://bugzilla.redhat.com/show_bug.cgi?id=681681 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756 https://nvd.nist.gov/vuln/detail/CVE-2010-4756 https://security.netapp.com/advisory/ntap-20241108-0002/ https://www.cve.org/CVERecord?id=CVE-2010-4756 libc6 CVE-2018-20796 LOW 2.31-13+deb11u13 no fix available http://www.securityfocus.com/bid/107160 https://access.redhat.com/security/cve/CVE-2018-20796 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141 https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html https://nvd.nist.gov/vuln/detail/CVE-2018-20796 https://security.netapp.com/advisory/ntap-20190315-0002/ https://support.f5.com/csp/article/K26346590?utm_source=f5support&%3Butm_medium=RSS https://www.cve.org/CVERecord?id=CVE-2018-20796 libc6 CVE-2019-1010022 LOW 2.31-13+deb11u13 no fix available https://access.redhat.com/security/cve/CVE-2019-1010022 https://nvd.nist.gov/vuln/detail/CVE-2019-1010022 https://security-tracker.debian.org/tracker/CVE-2019-1010022 https://sourceware.org/bugzilla/show_bug.cgi?id=22850 https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3 https://ubuntu.com/security/CVE-2019-1010022 https://www.cve.org/CVERecord?id=CVE-2019-1010022 libc6 CVE-2019-1010023 LOW 2.31-13+deb11u13 no fix available http://www.securityfocus.com/bid/109167 https://access.redhat.com/security/cve/CVE-2019-1010023 https://nvd.nist.gov/vuln/detail/CVE-2019-1010023 https://security-tracker.debian.org/tracker/CVE-2019-1010023 https://sourceware.org/bugzilla/show_bug.cgi?id=22851 https://support.f5.com/csp/article/K11932200?utm_source=f5support&%3Butm_medium=RSS https://ubuntu.com/security/CVE-2019-1010023 https://www.cve.org/CVERecord?id=CVE-2019-1010023 libc6 CVE-2019-1010024 LOW 2.31-13+deb11u13 no fix available http://www.securityfocus.com/bid/109162 https://access.redhat.com/security/cve/CVE-2019-1010024 https://nvd.nist.gov/vuln/detail/CVE-2019-1010024 https://security-tracker.debian.org/tracker/CVE-2019-1010024 https://sourceware.org/bugzilla/show_bug.cgi?id=22852 https://support.f5.com/csp/article/K06046097 https://support.f5.com/csp/article/K06046097?utm_source=f5support&%3Butm_medium=RSS https://ubuntu.com/security/CVE-2019-1010024 https://www.cve.org/CVERecord?id=CVE-2019-1010024 libc6 CVE-2019-1010025 LOW 2.31-13+deb11u13 no fix available https://access.redhat.com/security/cve/CVE-2019-1010025 https://nvd.nist.gov/vuln/detail/CVE-2019-1010025 https://security-tracker.debian.org/tracker/CVE-2019-1010025 https://sourceware.org/bugzilla/show_bug.cgi?id=22853 https://support.f5.com/csp/article/K06046097 https://support.f5.com/csp/article/K06046097?utm_source=f5support&%3Butm_medium=RSS https://ubuntu.com/security/CVE-2019-1010025 https://www.cve.org/CVERecord?id=CVE-2019-1010025 libc6 CVE-2019-9192 LOW 2.31-13+deb11u13 no fix available https://access.redhat.com/security/cve/CVE-2019-9192 https://nvd.nist.gov/vuln/detail/CVE-2019-9192 https://sourceware.org/bugzilla/show_bug.cgi?id=24269 https://support.f5.com/csp/article/K26346590?utm_source=f5support&%3Butm_medium=RSS https://www.cve.org/CVERecord?id=CVE-2019-9192 libdb5.3 CVE-2019-8457 CRITICAL 5.3.28+dfsg1-0.8 no fix available http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html https://access.redhat.com/security/cve/CVE-2019-8457 https://kc.mcafee.com/corporate/index?page=content&id=SB10365 https://linux.oracle.com/cve/CVE-2019-8457.html https://linux.oracle.com/errata/ELSA-2020-1810.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/ https://nvd.nist.gov/vuln/detail/CVE-2019-8457 https://security.netapp.com/advisory/ntap-20190606-0002/ https://ubuntu.com/security/notices/USN-4004-1 https://ubuntu.com/security/notices/USN-4004-2 https://ubuntu.com/security/notices/USN-4019-1 https://ubuntu.com/security/notices/USN-4019-2 https://usn.ubuntu.com/4004-1/ https://usn.ubuntu.com/4004-2/ https://usn.ubuntu.com/4019-1/ https://usn.ubuntu.com/4019-2/ https://www.cve.org/CVERecord?id=CVE-2019-8457 https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujan2020.html https://www.oracle.com/security-alerts/cpujul2020.html https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html https://www.sqlite.org/releaselog/3_28_0.html https://www.sqlite.org/src/info/90acdbfce9c08858 libgcc-s1 CVE-2023-4039 LOW 10.2.1-6 no fix available https://access.redhat.com/security/cve/CVE-2023-4039 https://developer.arm.com/Arm%20Security%20Center/GCC%20Stack%20Protector%20Vulnerability%20AArch64 https://gcc.gnu.org/git/?p=gcc.git;a=blob_plain;f=SECURITY.txt https://gcc.gnu.org/pipermail/gcc-patches/2023-October/634066.html https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-x7ch-h5rf-w2mf https://inbox.sourceware.org/gcc-patches/46cfa37b-56eb-344d-0745-e0d35393392d@gotplt.org https://linux.oracle.com/cve/CVE-2023-4039.html https://linux.oracle.com/errata/ELSA-2023-28766.html https://nvd.nist.gov/vuln/detail/CVE-2023-4039 https://rtx.meta.security/mitigation/2023/09/12/CVE-2023-4039.html https://ubuntu.com/security/notices/USN-7700-1 https://www.cve.org/CVERecord?id=CVE-2023-4039 libgcrypt20 CVE-2021-33560 HIGH 1.8.7-6 no fix available https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33560.json https://access.redhat.com/security/cve/CVE-2021-33560 https://dev.gnupg.org/T5305 https://dev.gnupg.org/T5328 https://dev.gnupg.org/T5466 https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61 https://eprint.iacr.org/2021/923 https://errata.almalinux.org/8/ALSA-2021-4409.html https://linux.oracle.com/cve/CVE-2021-33560.html https://linux.oracle.com/errata/ELSA-2022-9263.html https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/ https://nvd.nist.gov/vuln/detail/CVE-2021-33560 https://security.gentoo.org/glsa/202210-13 https://ubuntu.com/security/notices/USN-5080-1 https://ubuntu.com/security/notices/USN-5080-2 https://www.cve.org/CVERecord?id=CVE-2021-33560 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpujul2022.html https://www.oracle.com/security-alerts/cpuoct2021.html libgcrypt20 CVE-2018-6829 LOW 1.8.7-6 no fix available https://access.redhat.com/security/cve/CVE-2018-6829 https://github.com/weikengchen/attack-on-libgcrypt-elgamal https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html https://nvd.nist.gov/vuln/detail/CVE-2018-6829 https://www.cve.org/CVERecord?id=CVE-2018-6829 https://www.oracle.com/security-alerts/cpujan2020.html libgcrypt20 CVE-2024-2236 LOW 1.8.7-6 no fix available https://access.redhat.com/errata/RHSA-2024:9404 https://access.redhat.com/errata/RHSA-2025:3530 https://access.redhat.com/errata/RHSA-2025:3534 https://access.redhat.com/security/cve/CVE-2024-2236 https://bugzilla.redhat.com/2245218 https://bugzilla.redhat.com/show_bug.cgi?id=2245218 https://bugzilla.redhat.com/show_bug.cgi?id=2268268 https://dev.gnupg.org/T7136 https://errata.almalinux.org/9/ALSA-2024-9404.html https://github.com/tomato42/marvin-toolkit/tree/master/example/libgcrypt https://gitlab.com/redhat-crypto/libgcrypt/libgcrypt-mirror/-/merge_requests/17 https://linux.oracle.com/cve/CVE-2024-2236.html https://linux.oracle.com/errata/ELSA-2024-9404.html https://lists.gnupg.org/pipermail/gcrypt-devel/2024-March/005607.html https://nvd.nist.gov/vuln/detail/CVE-2024-2236 https://www.cve.org/CVERecord?id=CVE-2024-2236 libgnutls30 CVE-2025-32988 HIGH 3.7.1-5+deb11u7 3.7.1-5+deb11u8 http://www.openwall.com/lists/oss-security/2025/07/11/3 https://access.redhat.com/errata/RHSA-2025:16115 https://access.redhat.com/errata/RHSA-2025:16116 https://access.redhat.com/errata/RHSA-2025:17181 https://access.redhat.com/errata/RHSA-2025:17348 https://access.redhat.com/errata/RHSA-2025:17361 https://access.redhat.com/errata/RHSA-2025:17415 https://access.redhat.com/errata/RHSA-2025:19088 https://access.redhat.com/security/cve/CVE-2025-32988 https://bugzilla.redhat.com/2359620 https://bugzilla.redhat.com/2359621 https://bugzilla.redhat.com/2359622 https://bugzilla.redhat.com/2376755 https://bugzilla.redhat.com/show_bug.cgi?id=2359620 https://bugzilla.redhat.com/show_bug.cgi?id=2359622 https://bugzilla.redhat.com/show_bug.cgi?id=2376755 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32988 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32990 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6395 https://errata.almalinux.org/9/ALSA-2025-16116.html https://errata.rockylinux.org/RLSA-2025:17415 https://linux.oracle.com/cve/CVE-2025-32988.html https://linux.oracle.com/errata/ELSA-2025-20606.html https://lists.debian.org/debian-lts-announce/2025/08/msg00005.html https://lists.gnupg.org/pipermail/gnutls-help/2025-July/004883.html https://nvd.nist.gov/vuln/detail/CVE-2025-32988 https://ubuntu.com/security/notices/USN-7635-1 https://ubuntu.com/security/notices/USN-7742-1 https://www.cve.org/CVERecord?id=CVE-2025-32988 libgnutls30 CVE-2025-32990 HIGH 3.7.1-5+deb11u7 3.7.1-5+deb11u8 http://www.openwall.com/lists/oss-security/2025/07/11/3 https://access.redhat.com/errata/RHSA-2025:16115 https://access.redhat.com/errata/RHSA-2025:16116 https://access.redhat.com/errata/RHSA-2025:17181 https://access.redhat.com/errata/RHSA-2025:17348 https://access.redhat.com/errata/RHSA-2025:17361 https://access.redhat.com/errata/RHSA-2025:17415 https://access.redhat.com/errata/RHSA-2025:19088 https://access.redhat.com/security/cve/CVE-2025-32990 https://bugzilla.redhat.com/2359620 https://bugzilla.redhat.com/2359621 https://bugzilla.redhat.com/2359622 https://bugzilla.redhat.com/2376755 https://bugzilla.redhat.com/show_bug.cgi?id=2359620 https://bugzilla.redhat.com/show_bug.cgi?id=2359622 https://bugzilla.redhat.com/show_bug.cgi?id=2376755 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32988 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32990 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6395 https://errata.almalinux.org/9/ALSA-2025-16116.html https://errata.rockylinux.org/RLSA-2025:17415 https://linux.oracle.com/cve/CVE-2025-32990.html https://linux.oracle.com/errata/ELSA-2025-20606.html https://lists.debian.org/debian-lts-announce/2025/08/msg00005.html https://lists.gnupg.org/pipermail/gnutls-help/2025-July/004883.html https://nvd.nist.gov/vuln/detail/CVE-2025-32990 https://ubuntu.com/security/notices/USN-7635-1 https://ubuntu.com/security/notices/USN-7742-1 https://www.cve.org/CVERecord?id=CVE-2025-32990 libgnutls30 CVE-2025-6395 MEDIUM 3.7.1-5+deb11u7 3.7.1-5+deb11u8 http://www.openwall.com/lists/oss-security/2025/07/11/3 https://access.redhat.com/errata/RHSA-2025:16115 https://access.redhat.com/errata/RHSA-2025:16116 https://access.redhat.com/errata/RHSA-2025:17181 https://access.redhat.com/errata/RHSA-2025:17348 https://access.redhat.com/errata/RHSA-2025:17361 https://access.redhat.com/errata/RHSA-2025:17415 https://access.redhat.com/errata/RHSA-2025:19088 https://access.redhat.com/security/cve/CVE-2025-6395 https://bugzilla.redhat.com/2359620 https://bugzilla.redhat.com/2359621 https://bugzilla.redhat.com/2359622 https://bugzilla.redhat.com/2376755 https://bugzilla.redhat.com/show_bug.cgi?id=2359620 https://bugzilla.redhat.com/show_bug.cgi?id=2359622 https://bugzilla.redhat.com/show_bug.cgi?id=2376755 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32988 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32990 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6395 https://errata.almalinux.org/9/ALSA-2025-16116.html https://errata.rockylinux.org/RLSA-2025:17415 https://linux.oracle.com/cve/CVE-2025-6395.html https://linux.oracle.com/errata/ELSA-2025-20606.html https://lists.debian.org/debian-lts-announce/2025/08/msg00005.html https://lists.gnupg.org/pipermail/gnutls-help/2025-July/004883.html https://nvd.nist.gov/vuln/detail/CVE-2025-6395 https://ubuntu.com/security/notices/USN-7635-1 https://ubuntu.com/security/notices/USN-7742-1 https://www.cve.org/CVERecord?id=CVE-2025-6395 libgnutls30 CVE-2011-3389 LOW 3.7.1-5+deb11u7 no fix available http://arcticdog.wordpress.com/2012/08/29/beast-openssl-and-apache/ http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/ http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx http://curl.haxx.se/docs/adv_20120124B.html http://downloads.asterisk.org/pub/security/AST-2016-001.html http://ekoparty.org/2011/juliano-rizzo.php http://eprint.iacr.org/2004/111 http://eprint.iacr.org/2006/136 http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html http://isc.sans.edu/diary/SSL+TLS+part+3+/11635 http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html http://lists.apple.com/archives/Security-announce/2011//Oct/msg00002.html http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html http://lists.apple.com/archives/security-announce/2012/Jul/msg00001.html http://lists.apple.com/archives/security-announce/2012/May/msg00001.html http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://marc.info/?l=bugtraq&m=132750579901589&w=2 http://marc.info/?l=bugtraq&m=132872385320240&w=2 http://marc.info/?l=bugtraq&m=133365109612558&w=2 http://marc.info/?l=bugtraq&m=133728004526190&w=2 http://marc.info/?l=bugtraq&m=134254866602253&w=2 http://marc.info/?l=bugtraq&m=134254957702612&w=2 http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue http://osvdb.org/74829 http://rhn.redhat.com/errata/RHSA-2012-0508.html http://rhn.redhat.com/errata/RHSA-2013-1455.html http://secunia.com/advisories/45791 http://secunia.com/advisories/47998 http://secunia.com/advisories/48256 http://secunia.com/advisories/48692 http://secunia.com/advisories/48915 http://secunia.com/advisories/48948 http://secunia.com/advisories/49198 http://secunia.com/advisories/55322 http://secunia.com/advisories/55350 http://secunia.com/advisories/55351 http://security.gentoo.org/glsa/glsa-201203-02.xml http://security.gentoo.org/glsa/glsa-201406-32.xml http://support.apple.com/kb/HT4999 http://support.apple.com/kb/HT5001 http://support.apple.com/kb/HT5130 http://support.apple.com/kb/HT5281 http://support.apple.com/kb/HT5501 http://support.apple.com/kb/HT6150 http://technet.microsoft.com/security/advisory/2588513 http://vnhacker.blogspot.com/2011/09/beast.html http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf http://www.debian.org/security/2012/dsa-2398 http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html http://www.ibm.com/developerworks/java/jdk/alerts/ http://www.imperialviolet.org/2011/09/23/chromeandbeast.html http://www.insecure.cl/Beast-SSL.rar http://www.kb.cert.org/vuls/id/864643 http://www.mandriva.com/security/advisories?name=MDVSA-2012:058 http://www.opera.com/docs/changelogs/mac/1151/ http://www.opera.com/docs/changelogs/mac/1160/ http://www.opera.com/docs/changelogs/unix/1151/ http://www.opera.com/docs/changelogs/unix/1160/ http://www.opera.com/docs/changelogs/windows/1151/ http://www.opera.com/docs/changelogs/windows/1160/ http://www.opera.com/support/kb/view/1004/ http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html http://www.redhat.com/support/errata/RHSA-2011-1384.html http://www.redhat.com/support/errata/RHSA-2012-0006.html http://www.securityfocus.com/bid/49388 http://www.securityfocus.com/bid/49778 http://www.securitytracker.com/id/1029190 http://www.securitytracker.com/id?1025997 http://www.securitytracker.com/id?1026103 http://www.securitytracker.com/id?1026704 http://www.ubuntu.com/usn/USN-1263-1 http://www.us-cert.gov/cas/techalerts/TA12-010A.html https://access.redhat.com/security/cve/CVE-2011-3389 https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail https://bugzilla.novell.com/show_bug.cgi?id=719047 https://bugzilla.redhat.com/show_bug.cgi?id=737506 https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006 https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862 https://hermes.opensuse.org/messages/13154861 https://hermes.opensuse.org/messages/13155432 https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02 https://linux.oracle.com/cve/CVE-2011-3389.html https://linux.oracle.com/errata/ELSA-2011-1380.html https://nvd.nist.gov/vuln/detail/CVE-2011-3389 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14752 https://ubuntu.com/security/notices/USN-1263-1 https://www.cve.org/CVERecord?id=CVE-2011-3389 libgssapi-krb5-2 CVE-2018-5709 LOW 1.18.3-6+deb11u7 no fix available https://access.redhat.com/security/cve/CVE-2018-5709 https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2018-5709 https://www.cve.org/CVERecord?id=CVE-2018-5709 libgssapi-krb5-2 CVE-2024-26458 LOW 1.18.3-6+deb11u7 no fix available https://access.redhat.com/errata/RHSA-2024:9331 https://access.redhat.com/security/cve/CVE-2024-26458 https://bugzilla.redhat.com/2266731 https://bugzilla.redhat.com/2266740 https://bugzilla.redhat.com/2266742 https://bugzilla.redhat.com/show_bug.cgi?id=2266731 https://bugzilla.redhat.com/show_bug.cgi?id=2266740 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461 https://errata.almalinux.org/9/ALSA-2024-9331.html https://errata.rockylinux.org/RLSA-2024:3268 https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_1.md https://linux.oracle.com/cve/CVE-2024-26458.html https://linux.oracle.com/errata/ELSA-2024-9331.html https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html https://nvd.nist.gov/vuln/detail/CVE-2024-26458 https://security.netapp.com/advisory/ntap-20240415-0010/ https://ubuntu.com/security/notices/USN-7314-1 https://www.cve.org/CVERecord?id=CVE-2024-26458 libgssapi-krb5-2 CVE-2024-26461 LOW 1.18.3-6+deb11u7 no fix available https://access.redhat.com/errata/RHSA-2024:9331 https://access.redhat.com/security/cve/CVE-2024-26461 https://bugzilla.redhat.com/2266731 https://bugzilla.redhat.com/2266740 https://bugzilla.redhat.com/2266742 https://bugzilla.redhat.com/show_bug.cgi?id=2266731 https://bugzilla.redhat.com/show_bug.cgi?id=2266740 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461 https://errata.almalinux.org/9/ALSA-2024-9331.html https://errata.rockylinux.org/RLSA-2024:3268 https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md https://linux.oracle.com/cve/CVE-2024-26461.html https://linux.oracle.com/errata/ELSA-2024-9331.html https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html https://nvd.nist.gov/vuln/detail/CVE-2024-26461 https://security.netapp.com/advisory/ntap-20240415-0011/ https://ubuntu.com/security/notices/USN-7314-1 https://www.cve.org/CVERecord?id=CVE-2024-26461 libk5crypto3 CVE-2018-5709 LOW 1.18.3-6+deb11u7 no fix available https://access.redhat.com/security/cve/CVE-2018-5709 https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2018-5709 https://www.cve.org/CVERecord?id=CVE-2018-5709 libk5crypto3 CVE-2024-26458 LOW 1.18.3-6+deb11u7 no fix available https://access.redhat.com/errata/RHSA-2024:9331 https://access.redhat.com/security/cve/CVE-2024-26458 https://bugzilla.redhat.com/2266731 https://bugzilla.redhat.com/2266740 https://bugzilla.redhat.com/2266742 https://bugzilla.redhat.com/show_bug.cgi?id=2266731 https://bugzilla.redhat.com/show_bug.cgi?id=2266740 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461 https://errata.almalinux.org/9/ALSA-2024-9331.html https://errata.rockylinux.org/RLSA-2024:3268 https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_1.md https://linux.oracle.com/cve/CVE-2024-26458.html https://linux.oracle.com/errata/ELSA-2024-9331.html https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html https://nvd.nist.gov/vuln/detail/CVE-2024-26458 https://security.netapp.com/advisory/ntap-20240415-0010/ https://ubuntu.com/security/notices/USN-7314-1 https://www.cve.org/CVERecord?id=CVE-2024-26458 libk5crypto3 CVE-2024-26461 LOW 1.18.3-6+deb11u7 no fix available https://access.redhat.com/errata/RHSA-2024:9331 https://access.redhat.com/security/cve/CVE-2024-26461 https://bugzilla.redhat.com/2266731 https://bugzilla.redhat.com/2266740 https://bugzilla.redhat.com/2266742 https://bugzilla.redhat.com/show_bug.cgi?id=2266731 https://bugzilla.redhat.com/show_bug.cgi?id=2266740 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461 https://errata.almalinux.org/9/ALSA-2024-9331.html https://errata.rockylinux.org/RLSA-2024:3268 https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md https://linux.oracle.com/cve/CVE-2024-26461.html https://linux.oracle.com/errata/ELSA-2024-9331.html https://mailman.mit.edu/pipermail/kerberos/2024-March/023095.html https://nvd.nist.gov/vuln/detail/CVE-2024-26461 https://security.netapp.com/advisory/ntap-20240415-0011/ https://ubuntu.com/security/notices/USN-7314-1 https://www.cve.org/CVERecord?id=CVE-2024-26461 libkrb5-3 CVE-2018-5709 LOW 1.18.3-6+deb11u7 no fix available https://access.redhat.com/security/cve/CVE-2018-5709 https://github.com/poojamnit/Kerberos-V5-1.16-Vulnerabilities/tree/master/Integer%20Overflow https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2018-5709 https://www.cve.org/CVERecord?id=CVE-2018-5709 74 other vulnerabilities found... No Misconfigurations found Python (python-pkg)¶ Package Vulnerability ID Severity Installed Version Fixed Version Links pip CVE-2025-8869 MEDIUM 25.0.1 25.3 https://access.redhat.com/security/cve/CVE-2025-8869 https://github.com/pypa/pip https://github.com/pypa/pip/commit/f2b92314da012b9fffa36b3f3e67748a37ef464a https://github.com/pypa/pip/pull/13550 https://lists.debian.org/debian-lts-announce/2025/10/msg00028.html https://mail.python.org/archives/list/security-announce@python.org/thread/IF5A3GCJY3VH7BVHJKOWOJFKTW7VFQEN https://mail.python.org/archives/list/security-announce@python.org/thread/IF5A3GCJY3VH7BVHJKOWOJFKTW7VFQEN/ https://nvd.nist.gov/vuln/detail/CVE-2025-8869 https://pip.pypa.io/en/stable/news/#v25-2 https://www.cve.org/CVERecord?id=CVE-2025-8869 pip CVE-2025-8869 MEDIUM 25.2 25.3 https://access.redhat.com/security/cve/CVE-2025-8869 https://github.com/pypa/pip https://github.com/pypa/pip/commit/f2b92314da012b9fffa36b3f3e67748a37ef464a https://github.com/pypa/pip/pull/13550 https://lists.debian.org/debian-lts-announce/2025/10/msg00028.html https://mail.python.org/archives/list/security-announce@python.org/thread/IF5A3GCJY3VH7BVHJKOWOJFKTW7VFQEN https://mail.python.org/archives/list/security-announce@python.org/thread/IF5A3GCJY3VH7BVHJKOWOJFKTW7VFQEN/ https://nvd.nist.gov/vuln/detail/CVE-2025-8869 https://pip.pypa.io/en/stable/news/#v25-2 https://www.cve.org/CVERecord?id=CVE-2025-8869 No Misconfigurations found