diff --git a/reports/main/data.csv b/reports/main/data.csv index 949a52a..9251c3a 100644 --- a/reports/main/data.csv +++ b/reports/main/data.csv @@ -8,22 +8,22 @@ https://github.com/NixOS/nixpkgs/pull/321916" https://github.com/NixOS/nixpkgs/pull/321916" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2024-24789","https://nvd.nist.gov/vuln/detail/CVE-2024-24789","go","5.5","1.21.0-linux-arm64-bootstrap","1.23rc1","1.22.4","go","2024A0000024789","False","","fix_update_to_version_nixpkgs","https://github.com/NixOS/nixpkgs/pull/319485 https://github.com/NixOS/nixpkgs/pull/321916" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2024-5642","https://nvd.nist.gov/vuln/detail/CVE-2024-5642","python","","2.7.18.8","3.13.0b2","3.12.4","python","2024A0000005642","False","","err_not_vulnerable_based_on_repology","" +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2024-5642","https://nvd.nist.gov/vuln/detail/CVE-2024-5642","python","","2.7.18.8","3.13.0b3","3.12.4","python","2024A0000005642","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2024-5535","https://nvd.nist.gov/vuln/detail/CVE-2024-5535","openssl","","3.0.13","3.2.0","3.2.0","ruby:openssl","2024A0000005535","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2024-4603","https://nvd.nist.gov/vuln/detail/CVE-2024-4603","openssl","","3.0.13","3.2.0","3.2.0","ruby:openssl","2024A0000004603","False","","err_not_vulnerable_based_on_repology","https://github.com/NixOS/nixpkgs/pull/317238 https://github.com/NixOS/nixpkgs/pull/318322" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2024-4032","https://nvd.nist.gov/vuln/detail/CVE-2024-4032","python","","2.7.18.8","3.13.0b2","3.12.4","python","2024A0000004032","False","","err_not_vulnerable_based_on_repology","" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2024-4030","https://nvd.nist.gov/vuln/detail/CVE-2024-4030","python","","2.7.18.8","3.13.0b2","3.12.4","python","2024A0000004030","False","","err_not_vulnerable_based_on_repology","" +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2024-4032","https://nvd.nist.gov/vuln/detail/CVE-2024-4032","python","","2.7.18.8","3.13.0b3","3.12.4","python","2024A0000004032","False","","err_not_vulnerable_based_on_repology","" +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2024-4030","https://nvd.nist.gov/vuln/detail/CVE-2024-4030","python","","2.7.18.8","3.13.0b3","3.12.4","python","2024A0000004030","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2024-2511","https://nvd.nist.gov/vuln/detail/CVE-2024-2511","openssl","","3.0.13","3.2.0","3.2.0","ruby:openssl","2024A0000002511","False","","err_not_vulnerable_based_on_repology","https://github.com/NixOS/nixpkgs/pull/317238 https://github.com/NixOS/nixpkgs/pull/318322" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2024-0953","https://nvd.nist.gov/vuln/detail/CVE-2024-0953","firefox","6.1","127.0","127.0.2","127.0.2","firefox","2024A0000000953","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","OSV-2024-517","https://osv.dev/OSV-2024-517","libaom","","3.9.0","","","","2024A0000000517","False","","err_missing_repology_version","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","OSV-2024-460","https://osv.dev/OSV-2024-460","glslang","","14.2.0","14.2.0","14.3.0","glslang","2024A0000000460","False","","err_not_vulnerable_based_on_repology","" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2024-0450","https://nvd.nist.gov/vuln/detail/CVE-2024-0450","python","6.2","2.7.18.8","3.13.0b2","3.12.4","python","2024A0000000450","False","","err_not_vulnerable_based_on_repology","https://github.com/NixOS/nixpkgs/pull/298006 +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2024-0450","https://nvd.nist.gov/vuln/detail/CVE-2024-0450","python","6.2","2.7.18.8","3.13.0b3","3.12.4","python","2024A0000000450","False","","err_not_vulnerable_based_on_repology","https://github.com/NixOS/nixpkgs/pull/298006 https://github.com/NixOS/nixpkgs/pull/299123 https://github.com/NixOS/nixpkgs/pull/299125" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","OSV-2024-440","https://osv.dev/OSV-2024-440","jq","","1.7.1","1.7.1","1.7.1","jq","2024A0000000440","False","","err_not_vulnerable_based_on_repology","" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2024-0397","https://nvd.nist.gov/vuln/detail/CVE-2024-0397","python","","2.7.18.8","3.13.0b2","3.12.4","python","2024A0000000397","False","","err_not_vulnerable_based_on_repology","" +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2024-0397","https://nvd.nist.gov/vuln/detail/CVE-2024-0397","python","","2.7.18.8","3.13.0b3","3.12.4","python","2024A0000000397","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","OSV-2024-396","https://osv.dev/OSV-2024-396","jq","","1.7.1","1.7.1","1.7.1","jq","2024A0000000396","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","OSV-2024-395","https://osv.dev/OSV-2024-395","libpcap","","1.10.4","1.10.4","1.10.4","libpcap","2024A0000000395","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","OSV-2024-330","https://osv.dev/OSV-2024-330","jq","","1.7.1","1.7.1","1.7.1","jq","2024A0000000330","False","","err_not_vulnerable_based_on_repology","" @@ -45,7 +45,7 @@ https://github.com/NixOS/nixpkgs/pull/298640" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2023-42364","https://nvd.nist.gov/vuln/detail/CVE-2023-42364","busybox","5.5","1.36.1","1.36.1","1.36.1","busybox","2023A0000042364","False","","fix_not_available","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2023-42363","https://nvd.nist.gov/vuln/detail/CVE-2023-42363","busybox","5.5","1.36.1","1.36.1","1.36.1","busybox","2023A0000042363","False","","fix_not_available","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2023-41330","https://nvd.nist.gov/vuln/detail/CVE-2023-41330","snappy","9.8","1.2.0","","","","2023A0000041330","True","Incorrect package: Issue concerns snappy php library: https://github.com/KnpLabs/snappy, whereas, nixpkgs ""snappy"" refers snappy compression library: https://google.github.io/snappy/. Issue gets included to the report due to vulnix's design decision to avoid false negatives with the cost of false positives: https://github.com/nix-community/vulnix/blob/f56f3ac857626171b95e51d98cb6874278f789d3/src/vulnix/vulnerability.py#L90-L96.","err_missing_repology_version","" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2023-40217","https://nvd.nist.gov/vuln/detail/CVE-2023-40217","python","5.3","2.7.18.8","3.13.0b2","3.12.4","python","2023A0000040217","False","","fix_update_to_version_nixpkgs","" +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2023-40217","https://nvd.nist.gov/vuln/detail/CVE-2023-40217","python","5.3","2.7.18.8","3.13.0b3","3.12.4","python","2023A0000040217","False","","fix_update_to_version_nixpkgs","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2023-39325","https://nvd.nist.gov/vuln/detail/CVE-2023-39325","go","7.5","1.21.0-linux-arm64-bootstrap","1.23rc1","1.22.4","go","2023A0000039325","False","","err_not_vulnerable_based_on_repology","https://github.com/NixOS/nixpkgs/pull/262713 https://github.com/NixOS/nixpkgs/pull/300783" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2023-39323","https://nvd.nist.gov/vuln/detail/CVE-2023-39323","go","8.1","1.21.0-linux-arm64-bootstrap","1.23rc1","1.22.4","go","2023A0000039323","False","","err_not_vulnerable_based_on_repology","" @@ -55,7 +55,7 @@ https://github.com/NixOS/nixpkgs/pull/300783" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2023-39319","https://nvd.nist.gov/vuln/detail/CVE-2023-39319","go","6.1","1.21.0-linux-arm64-bootstrap","1.23rc1","1.22.4","go","2023A0000039319","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2023-39318","https://nvd.nist.gov/vuln/detail/CVE-2023-39318","go","6.1","1.21.0-linux-arm64-bootstrap","1.23rc1","1.22.4","go","2023A0000039318","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2023-37769","https://nvd.nist.gov/vuln/detail/CVE-2023-37769","pixman","6.5","0.43.4","0.43.4","0.43.4","pixman","2023A0000037769","False","See: https://gitlab.freedesktop.org/pixman/pixman/-/issues/76: ""This somehow got assigned CVE-2023-37769, not sure why NVD keeps assigning CVEs like this. This is just a test executable"".","err_not_vulnerable_based_on_repology","" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2023-36632","https://nvd.nist.gov/vuln/detail/CVE-2023-36632","python","7.5","2.7.18.8","3.13.0b2","3.12.4","python","2023A0000036632","False","","fix_update_to_version_nixpkgs","" +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2023-36632","https://nvd.nist.gov/vuln/detail/CVE-2023-36632","python","7.5","2.7.18.8","3.13.0b3","3.12.4","python","2023A0000036632","False","","fix_update_to_version_nixpkgs","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2023-31975","https://nvd.nist.gov/vuln/detail/CVE-2023-31975","yasm","3.3","1.3.0","","","","2023A0000031975","True","Memory leak in CLI tool, no security impact.","err_missing_repology_version","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2023-31974","https://nvd.nist.gov/vuln/detail/CVE-2023-31974","yasm","5.5","1.3.0","","","","2023A0000031974","True","Crash in CLI tool, no security impact.","err_missing_repology_version","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2023-31973","https://nvd.nist.gov/vuln/detail/CVE-2023-31973","yasm","5.5","1.3.0","","","","2023A0000031973","True","Crash in CLI tool, no security impact.","err_missing_repology_version","" @@ -69,11 +69,11 @@ https://github.com/NixOS/nixpkgs/pull/232535" https://github.com/NixOS/nixpkgs/pull/232535" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2023-28319","https://nvd.nist.gov/vuln/detail/CVE-2023-28319","curl","7.5","0.4.46","","","","2023A0000028319","False","","err_missing_repology_version","https://github.com/NixOS/nixpkgs/pull/232531" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2023-28115","https://nvd.nist.gov/vuln/detail/CVE-2023-28115","snappy","9.8","1.2.0","","","","2023A0000028115","True","Incorrect package: Issue concerns snappy php library: https://github.com/KnpLabs/snappy, whereas, nixpkgs ""snappy"" refers snappy compression library: https://google.github.io/snappy/. Issue gets included to the report due to vulnix's design decision to avoid false negatives with the cost of false positives: https://github.com/nix-community/vulnix/blob/f56f3ac857626171b95e51d98cb6874278f789d3/src/vulnix/vulnerability.py#L90-L96.","err_missing_repology_version","" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2023-24329","https://nvd.nist.gov/vuln/detail/CVE-2023-24329","python","7.5","2.7.18.8","3.13.0b2","3.12.4","python","2023A0000024329","False","","fix_update_to_version_nixpkgs","https://github.com/NixOS/nixpkgs/pull/236448" +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2023-24329","https://nvd.nist.gov/vuln/detail/CVE-2023-24329","python","7.5","2.7.18.8","3.13.0b3","3.12.4","python","2023A0000024329","False","","fix_update_to_version_nixpkgs","https://github.com/NixOS/nixpkgs/pull/236448" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2023-7216","https://nvd.nist.gov/vuln/detail/CVE-2023-7216","cpio","5.3","2.15","2.15","2.15","cpio","2023A0000007216","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2023-6992","https://nvd.nist.gov/vuln/detail/CVE-2023-6992","zlib","5.5","1.3.1","1.3.1","1.3.1","zlib","2023A0000006992","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2023-6683","https://nvd.nist.gov/vuln/detail/CVE-2023-6683","qemu","6.5","8.2.4","9.0.1","9.0.1","qemu","2023A0000006683","False","","fix_update_to_version_nixpkgs","https://github.com/NixOS/nixpkgs/pull/319250" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2023-6597","https://nvd.nist.gov/vuln/detail/CVE-2023-6597","python","7.8","2.7.18.8","3.13.0b2","3.12.4","python","2023A0000006597","False","","err_not_vulnerable_based_on_repology","https://github.com/NixOS/nixpkgs/pull/298006 +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2023-6597","https://nvd.nist.gov/vuln/detail/CVE-2023-6597","python","7.8","2.7.18.8","3.13.0b3","3.12.4","python","2023A0000006597","False","","err_not_vulnerable_based_on_repology","https://github.com/NixOS/nixpkgs/pull/298006 https://github.com/NixOS/nixpkgs/pull/299123 https://github.com/NixOS/nixpkgs/pull/299125" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2023-6277","https://nvd.nist.gov/vuln/detail/CVE-2023-6277","libtiff","6.5","4.6.0","4.6.0","4.6.0","tiff","2023A0000006277","False","","err_not_vulnerable_based_on_repology","" @@ -97,12 +97,12 @@ https://github.com/NixOS/nixpkgs/pull/264266" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","OSV-2023-298","https://osv.dev/OSV-2023-298","cairo","","1.18.0","1.17.13","1.17.13","ruby:cairo","2023A0000000298","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","OSV-2023-197","https://osv.dev/OSV-2023-197","p11-kit","","0.25.3","0.25.3","0.25.3","p11-kit","2023A0000000197","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","OSV-2023-137","https://osv.dev/OSV-2023-137","harfbuzz","","8.4.0","","","","2023A0000000137","True","Based on https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=56510#c2, the issue is fixed in range https://github.com/harfbuzz/harfbuzz/compare/67e01c1292821e7b6fc2ab13acddb84ab41b2187...60841e26187576bff477c1a09ee2ffe544844abc all of which have been merged in 7.1.0.","err_missing_repology_version","" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2022-48566","https://nvd.nist.gov/vuln/detail/CVE-2022-48566","python","5.9","2.7.18.8","3.13.0b2","3.12.4","python","2022A0000048566","False","","fix_update_to_version_nixpkgs","" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2022-48565","https://nvd.nist.gov/vuln/detail/CVE-2022-48565","python","9.8","2.7.18.8","3.13.0b2","3.12.4","python","2022A0000048565","False","","fix_update_to_version_nixpkgs","" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2022-48564","https://nvd.nist.gov/vuln/detail/CVE-2022-48564","python","6.5","2.7.18.8","3.13.0b2","3.12.4","python","2022A0000048564","False","","fix_update_to_version_nixpkgs","" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2022-48560","https://nvd.nist.gov/vuln/detail/CVE-2022-48560","python","7.5","2.7.18.8","3.13.0b2","3.12.4","python","2022A0000048560","False","","fix_update_to_version_nixpkgs","" +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2022-48566","https://nvd.nist.gov/vuln/detail/CVE-2022-48566","python","5.9","2.7.18.8","3.13.0b3","3.12.4","python","2022A0000048566","False","","fix_update_to_version_nixpkgs","" +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2022-48565","https://nvd.nist.gov/vuln/detail/CVE-2022-48565","python","9.8","2.7.18.8","3.13.0b3","3.12.4","python","2022A0000048565","False","","fix_update_to_version_nixpkgs","" +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2022-48564","https://nvd.nist.gov/vuln/detail/CVE-2022-48564","python","6.5","2.7.18.8","3.13.0b3","3.12.4","python","2022A0000048564","False","","fix_update_to_version_nixpkgs","" +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2022-48560","https://nvd.nist.gov/vuln/detail/CVE-2022-48560","python","7.5","2.7.18.8","3.13.0b3","3.12.4","python","2022A0000048560","False","","fix_update_to_version_nixpkgs","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2022-48468","https://nvd.nist.gov/vuln/detail/CVE-2022-48468","protobuf-c","5.5","unstable-2023-07-08","1.5.0","1.5.0","protobuf-c","2022A0000048468","False","","fix_not_available","" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2022-45061","https://nvd.nist.gov/vuln/detail/CVE-2022-45061","python","7.5","2.7.18.8","3.13.0b2","3.12.4","python","2022A0000045061","False","","fix_update_to_version_nixpkgs","https://github.com/NixOS/nixpkgs/pull/201859 +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2022-45061","https://nvd.nist.gov/vuln/detail/CVE-2022-45061","python","7.5","2.7.18.8","3.13.0b3","3.12.4","python","2022A0000045061","False","","fix_update_to_version_nixpkgs","https://github.com/NixOS/nixpkgs/pull/201859 https://github.com/NixOS/nixpkgs/pull/204893 https://github.com/NixOS/nixpkgs/pull/204900 https://github.com/NixOS/nixpkgs/pull/204902" @@ -119,7 +119,7 @@ https://github.com/NixOS/nixpkgs/pull/253430" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2022-42010","https://nvd.nist.gov/vuln/detail/CVE-2022-42010","dbus","6.5","1","1.14.10","1.14.10","dbus","2022A0000042010","False","","fix_update_to_version_nixpkgs","https://github.com/NixOS/nixpkgs/pull/195264 https://github.com/NixOS/nixpkgs/pull/253430" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2022-40898","https://nvd.nist.gov/vuln/detail/CVE-2022-40898","wheel","7.5","0.37.1-source","0.43.0","0.43.0","python:wheel","2022A0000040898","False","","fix_update_to_version_nixpkgs","https://github.com/NixOS/nixpkgs/pull/210565" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2022-40897","https://nvd.nist.gov/vuln/detail/CVE-2022-40897","setuptools","5.9","44.0.0-source","69.5.1","70.1.1","python:setuptools","2022A0000040897","False","","fix_update_to_version_nixpkgs","" +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2022-40897","https://nvd.nist.gov/vuln/detail/CVE-2022-40897","setuptools","5.9","44.0.0-source","69.5.1","70.2.0","python:setuptools","2022A0000040897","False","","fix_update_to_version_nixpkgs","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2022-38663","https://nvd.nist.gov/vuln/detail/CVE-2022-38663","git","6.5","2.44.1","","","","2022A0000038663","True","Incorrect package: Impacts Jenkins git plugin, not git. Issue gets included to the report due to vulnix's design decision to avoid false negatives with the cost of false positives: https://github.com/nix-community/vulnix/blob/f56f3ac857626171b95e51d98cb6874278f789d3/src/vulnix/vulnerability.py#L90-L96.","err_missing_repology_version","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2022-37416","https://nvd.nist.gov/vuln/detail/CVE-2022-37416","libmpeg2","6.5","0.5.1","","","","2022A0000037416","True","NVD data issue: concerns Android only.","err_missing_repology_version","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2022-36884","https://nvd.nist.gov/vuln/detail/CVE-2022-36884","git","5.3","2.44.1","","","","2022A0000036884","True","Incorrect package: Impacts Jenkins git plugin, not git. Issue gets included to the report due to vulnix's design decision to avoid false negatives with the cost of false positives: https://github.com/nix-community/vulnix/blob/f56f3ac857626171b95e51d98cb6874278f789d3/src/vulnix/vulnerability.py#L90-L96.","err_missing_repology_version","" @@ -139,7 +139,7 @@ https://github.com/NixOS/nixpkgs/pull/180021" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2022-27776","https://nvd.nist.gov/vuln/detail/CVE-2022-27776","curl","6.5","0.4.46","","","","2022A0000027776","False","","err_missing_repology_version","https://github.com/NixOS/nixpkgs/pull/170654 https://github.com/NixOS/nixpkgs/pull/170659" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2022-26691","https://nvd.nist.gov/vuln/detail/CVE-2022-26691","cups","6.7","2.4.7","","","","2022A0000026691","True","Fixed in nixpkgs with PR: https://github.com/NixOS/nixpkgs/pull/174898.","err_missing_repology_version","" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2022-26488","https://nvd.nist.gov/vuln/detail/CVE-2022-26488","python","7.0","2.7.18.8","3.13.0b2","3.12.4","python","2022A0000026488","False","","err_not_vulnerable_based_on_repology","" +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2022-26488","https://nvd.nist.gov/vuln/detail/CVE-2022-26488","python","7.0","2.7.18.8","3.13.0b3","3.12.4","python","2022A0000026488","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","MAL-2022-4301","https://osv.dev/MAL-2022-4301","libidn2","","2.3.7","","","","2022A0000004301","True","Incorrect package: Issue refers npm libidn2, whereas, nixpkgs refers libidn2 https://gitlab.com/libidn/libidn2.","err_missing_repology_version","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2022-4066","https://nvd.nist.gov/vuln/detail/CVE-2022-4066","firefox","8.2","127.0","127.0.2","127.0.2","firefox","2022A0000004066","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2022-3219","https://nvd.nist.gov/vuln/detail/CVE-2022-3219","gnupg","3.3","2.4.5","","","","2022A0000003219","True","Fix patch is not accepted upstream: https://dev.gnupg.org/D556.","err_missing_repology_version","" @@ -152,7 +152,7 @@ https://github.com/NixOS/nixpkgs/pull/170659" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","OSV-2022-530","https://osv.dev/OSV-2022-530","espeak-ng","","1.51.1","1.51.1","1.51.1","espeak-ng","2022A0000000530","False","Unclear if this is still valid.","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","OSV-2022-519","https://osv.dev/OSV-2022-519","espeak-ng","","1.51.1","1.51.1","1.51.1","espeak-ng","2022A0000000519","False","Unclear if this is still valid.","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","OSV-2022-462","https://osv.dev/OSV-2022-462","espeak-ng","","1.51.1","1.51.1","1.51.1","espeak-ng","2022A0000000462","False","Unclear if this is still valid.","err_not_vulnerable_based_on_repology","" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2022-0391","https://nvd.nist.gov/vuln/detail/CVE-2022-0391","python","7.5","2.7.18.8","3.13.0b2","3.12.4","python","2022A0000000391","False","","fix_update_to_version_nixpkgs","https://github.com/NixOS/nixpkgs/pull/203428" +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2022-0391","https://nvd.nist.gov/vuln/detail/CVE-2022-0391","python","7.5","2.7.18.8","3.13.0b3","3.12.4","python","2022A0000000391","False","","fix_update_to_version_nixpkgs","https://github.com/NixOS/nixpkgs/pull/203428" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","OSV-2022-312","https://osv.dev/OSV-2022-312","dnsmasq","","2.90","2.90","2.90","dnsmasq","2022A0000000312","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","OSV-2022-193","https://osv.dev/OSV-2022-193","w3m","","0.5.3+git20230121","0.5.3+git20230121","0.5.3+git20230121","w3m","2022A0000000193","False","Unclear if this is still valid.","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","RUSTSEC-2022-0034","https://osv.dev/RUSTSEC-2022-0034","pkcs11","","35.4.1","","","","2022A0000000034","False","","err_missing_repology_version","" @@ -181,7 +181,7 @@ https://github.com/NixOS/nixpkgs/pull/170659" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2021-33454","https://nvd.nist.gov/vuln/detail/CVE-2021-33454","yasm","5.5","1.3.0","","","","2021A0000033454","True","Issue is not fixed upstream. Other distributions have triaged the issue as minor or 'no security impact'.","err_missing_repology_version","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2021-28794","https://nvd.nist.gov/vuln/detail/CVE-2021-28794","ShellCheck","9.8","0.10.0","0.10.0","0.10.0","shellcheck","2021A0000028794","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2021-26720","https://nvd.nist.gov/vuln/detail/CVE-2021-26720","avahi","7.8","0.8","","","","2021A0000026720","True","False positive: issue refers avahi-daemon-check-dns.sh in the Debian avahi package. As such, the issue is specific to Debian and its derivatives.","err_missing_repology_version","" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2021-23336","https://nvd.nist.gov/vuln/detail/CVE-2021-23336","python","5.9","2.7.18.8","3.13.0b2","3.12.4","python","2021A0000023336","False","","fix_update_to_version_nixpkgs","https://github.com/NixOS/nixpkgs/pull/117037 +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2021-23336","https://nvd.nist.gov/vuln/detail/CVE-2021-23336","python","5.9","2.7.18.8","3.13.0b3","3.12.4","python","2021A0000023336","False","","fix_update_to_version_nixpkgs","https://github.com/NixOS/nixpkgs/pull/117037 https://github.com/NixOS/nixpkgs/pull/117082 https://github.com/NixOS/nixpkgs/pull/118403" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2021-21698","https://nvd.nist.gov/vuln/detail/CVE-2021-21698","subversion","7.5","1.14.3","1.14.3","1.14.3","subversion","2021A0000021698","False","","err_not_vulnerable_based_on_repology","" @@ -194,7 +194,7 @@ https://github.com/NixOS/nixpkgs/pull/150906 https://github.com/NixOS/nixpkgs/pull/152147 https://github.com/NixOS/nixpkgs/pull/152359 https://github.com/NixOS/nixpkgs/pull/168777" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2021-3733","https://nvd.nist.gov/vuln/detail/CVE-2021-3733","python","6.5","2.7.18.8","3.13.0b2","3.12.4","python","2021A0000003733","False","","fix_update_to_version_nixpkgs","https://github.com/NixOS/nixpkgs/pull/203428" +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2021-3733","https://nvd.nist.gov/vuln/detail/CVE-2021-3733","python","6.5","2.7.18.8","3.13.0b3","3.12.4","python","2021A0000003733","False","","fix_update_to_version_nixpkgs","https://github.com/NixOS/nixpkgs/pull/203428" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2021-3572","https://nvd.nist.gov/vuln/detail/CVE-2021-3572","pip","5.7","20.3.4-source","24.0","24.1.1","pip","2021A0000003572","False","","fix_update_to_version_nixpkgs","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","OSV-2021-1157","https://osv.dev/OSV-2021-1157","espeak-ng","","1.51.1","1.51.1","1.51.1","espeak-ng","2021A0000001157","False","Unclear if this is still valid.","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","OSV-2021-1141","https://osv.dev/OSV-2021-1141","espeak-ng","","1.51.1","1.51.1","1.51.1","espeak-ng","2021A0000001141","False","Unclear if this is still valid.","err_not_vulnerable_based_on_repology","" @@ -237,7 +237,7 @@ https://github.com/NixOS/nixpkgs/pull/84664" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2019-14553","https://nvd.nist.gov/vuln/detail/CVE-2019-14553","edk2","4.9","202402","","","","2019A0000014553","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2019-12749","https://nvd.nist.gov/vuln/detail/CVE-2019-12749","dbus","7.1","1","","","","2019A0000012749","True","Fixed with https://github.com/NixOS/nixpkgs/pull/63021 (dbus version '1' in nixpkgs currently refers 1.14.8).","err_missing_repology_version","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2019-12067","https://nvd.nist.gov/vuln/detail/CVE-2019-12067","qemu","6.5","8.2.4","","","","2019A0000012067","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2019-9674","https://nvd.nist.gov/vuln/detail/CVE-2019-9674","python","7.5","2.7.18.8","3.13.0b2","3.12.4","python","2019A0000009674","False","","fix_update_to_version_nixpkgs","" +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2019-9674","https://nvd.nist.gov/vuln/detail/CVE-2019-9674","python","7.5","2.7.18.8","3.13.0b3","3.12.4","python","2019A0000009674","False","","fix_update_to_version_nixpkgs","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2019-6470","https://nvd.nist.gov/vuln/detail/CVE-2019-6470","bind","7.5","9.18.27","","","","2019A0000006470","True","Not valid: https://github.com/NixOS/nixpkgs/issues/73617#issuecomment-569491606.","err_missing_repology_version","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2019-6293","https://nvd.nist.gov/vuln/detail/CVE-2019-6293","flex","5.5","2.6.4","","","","2019A0000006293","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2019-5443","https://nvd.nist.gov/vuln/detail/CVE-2019-5443","curl","7.8","0.4.46","","","","2019A0000005443","False","","err_missing_repology_version","" @@ -247,8 +247,8 @@ https://github.com/NixOS/nixpkgs/pull/84664" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2018-8024","https://nvd.nist.gov/vuln/detail/CVE-2018-8024","firefox","5.4","127.0","127.0.2","127.0.2","firefox","2018A0000008024","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2018-7263","https://nvd.nist.gov/vuln/detail/CVE-2018-7263","libmad","9.8","0.15.1b","","","","2018A0000007263","True","Based on https://github.com/NixOS/nixpkgs/issues/57154, issue is fixed by https://github.com/NixOS/nixpkgs/commit/92edb0610923fab5a9dcc59b94652f1e8a5ea1ed.","err_missing_repology_version","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2018-6553","https://nvd.nist.gov/vuln/detail/CVE-2018-6553","cups","8.8","2.4.7","","","","2018A0000006553","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2017-18207","https://nvd.nist.gov/vuln/detail/CVE-2017-18207","python","6.5","2.7.18.8","3.13.0b2","3.12.4","python","2017A0000018207","False","","fix_update_to_version_nixpkgs","" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2017-17522","https://nvd.nist.gov/vuln/detail/CVE-2017-17522","python","8.8","2.7.18.8","3.13.0b2","3.12.4","python","2017A0000017522","False","","fix_update_to_version_nixpkgs","" +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2017-18207","https://nvd.nist.gov/vuln/detail/CVE-2017-18207","python","6.5","2.7.18.8","3.13.0b3","3.12.4","python","2017A0000018207","False","","fix_update_to_version_nixpkgs","" +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2017-17522","https://nvd.nist.gov/vuln/detail/CVE-2017-17522","python","8.8","2.7.18.8","3.13.0b3","3.12.4","python","2017A0000017522","False","","fix_update_to_version_nixpkgs","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2017-8806","https://nvd.nist.gov/vuln/detail/CVE-2017-8806","postgresql","5.5","15.7","16.3","16.3","postgresql","2017A0000008806","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2017-5628","https://nvd.nist.gov/vuln/detail/CVE-2017-5628","mujs","7.8","1.3.4","","","","2017A0000005628","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2017-5627","https://nvd.nist.gov/vuln/detail/CVE-2017-5627","mujs","7.8","1.3.4","","","","2017A0000005627","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" @@ -269,7 +269,7 @@ https://github.com/NixOS/nixpkgs/pull/84664" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2016-7152","https://nvd.nist.gov/vuln/detail/CVE-2016-7152","firefox","5.3","127.0","127.0.2","127.0.2","firefox","2016A0000007152","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2016-2781","https://nvd.nist.gov/vuln/detail/CVE-2016-2781","coreutils","6.5","9.5","","","","2016A0000002781","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2015-7313","https://nvd.nist.gov/vuln/detail/CVE-2015-7313","libtiff","5.5","4.6.0","","","","2015A0000007313","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2015-5652","https://nvd.nist.gov/vuln/detail/CVE-2015-5652","python","","2.7.18.8","3.13.0b2","3.12.4","python","2015A0000005652","False","","err_not_vulnerable_based_on_repology","" +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2015-5652","https://nvd.nist.gov/vuln/detail/CVE-2015-5652","python","","2.7.18.8","3.13.0b3","3.12.4","python","2015A0000005652","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2014-9157","https://nvd.nist.gov/vuln/detail/CVE-2014-9157","graphviz","","10.0.1","","","","2014A0000009157","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2014-6492","https://nvd.nist.gov/vuln/detail/CVE-2014-6492","firefox","","127.0","127.0.2","127.0.2","firefox","2014A0000006492","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2014-4860","https://nvd.nist.gov/vuln/detail/CVE-2014-4860","edk2","6.8","202402","","","","2014A0000004860","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" @@ -287,7 +287,7 @@ https://github.com/NixOS/nixpkgs/pull/84664" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2009-1597","https://nvd.nist.gov/vuln/detail/CVE-2009-1597","firefox","","127.0","127.0.2","127.0.2","firefox","2009A0000001597","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2007-6715","https://nvd.nist.gov/vuln/detail/CVE-2007-6715","firefox","","127.0","127.0.2","127.0.2","firefox","2007A0000006715","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2007-5967","https://nvd.nist.gov/vuln/detail/CVE-2007-5967","firefox","6.5","127.0","127.0.2","127.0.2","firefox","2007A0000005967","False","","err_not_vulnerable_based_on_repology","" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2007-4559","https://nvd.nist.gov/vuln/detail/CVE-2007-4559","python","","2.7.18.8","3.13.0b2","3.12.4","python","2007A0000004559","False","","fix_update_to_version_nixpkgs","" +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2007-4559","https://nvd.nist.gov/vuln/detail/CVE-2007-4559","python","","2.7.18.8","3.13.0b3","3.12.4","python","2007A0000004559","False","","fix_update_to_version_nixpkgs","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2007-4013","https://nvd.nist.gov/vuln/detail/CVE-2007-4013","firefox","","127.0","127.0.2","127.0.2","firefox","2007A0000004013","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2007-3827","https://nvd.nist.gov/vuln/detail/CVE-2007-3827","firefox","","127.0","127.0.2","127.0.2","firefox","2007A0000003827","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","current","CVE-2007-3670","https://nvd.nist.gov/vuln/detail/CVE-2007-3670","firefox","","127.0","127.0.2","127.0.2","firefox","2007A0000003670","False","","err_not_vulnerable_based_on_repology","" @@ -305,22 +305,22 @@ https://github.com/NixOS/nixpkgs/pull/321916" https://github.com/NixOS/nixpkgs/pull/321916" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2024-24789","https://nvd.nist.gov/vuln/detail/CVE-2024-24789","go","5.5","1.21.0-linux-arm64-bootstrap","1.23rc1","1.22.4","go","2024A0000024789","False","","fix_update_to_version_nixpkgs","https://github.com/NixOS/nixpkgs/pull/319485 https://github.com/NixOS/nixpkgs/pull/321916" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2024-5642","https://nvd.nist.gov/vuln/detail/CVE-2024-5642","python","","2.7.18.8","3.13.0b2","3.12.4","python","2024A0000005642","False","","err_not_vulnerable_based_on_repology","" +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2024-5642","https://nvd.nist.gov/vuln/detail/CVE-2024-5642","python","","2.7.18.8","3.13.0b3","3.12.4","python","2024A0000005642","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2024-5535","https://nvd.nist.gov/vuln/detail/CVE-2024-5535","openssl","","3.0.13","3.2.0","3.2.0","ruby:openssl","2024A0000005535","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2024-4603","https://nvd.nist.gov/vuln/detail/CVE-2024-4603","openssl","","3.0.13","3.2.0","3.2.0","ruby:openssl","2024A0000004603","False","","err_not_vulnerable_based_on_repology","https://github.com/NixOS/nixpkgs/pull/317238 https://github.com/NixOS/nixpkgs/pull/318322" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2024-4032","https://nvd.nist.gov/vuln/detail/CVE-2024-4032","python","","2.7.18.8","3.13.0b2","3.12.4","python","2024A0000004032","False","","err_not_vulnerable_based_on_repology","" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2024-4030","https://nvd.nist.gov/vuln/detail/CVE-2024-4030","python","","2.7.18.8","3.13.0b2","3.12.4","python","2024A0000004030","False","","err_not_vulnerable_based_on_repology","" +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2024-4032","https://nvd.nist.gov/vuln/detail/CVE-2024-4032","python","","2.7.18.8","3.13.0b3","3.12.4","python","2024A0000004032","False","","err_not_vulnerable_based_on_repology","" +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2024-4030","https://nvd.nist.gov/vuln/detail/CVE-2024-4030","python","","2.7.18.8","3.13.0b3","3.12.4","python","2024A0000004030","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2024-2511","https://nvd.nist.gov/vuln/detail/CVE-2024-2511","openssl","","3.0.13","3.2.0","3.2.0","ruby:openssl","2024A0000002511","False","","err_not_vulnerable_based_on_repology","https://github.com/NixOS/nixpkgs/pull/317238 https://github.com/NixOS/nixpkgs/pull/318322" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2024-0953","https://nvd.nist.gov/vuln/detail/CVE-2024-0953","firefox","6.1","127.0","127.0.2","127.0.2","firefox","2024A0000000953","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","OSV-2024-517","https://osv.dev/OSV-2024-517","libaom","","3.9.0","","","","2024A0000000517","False","","err_missing_repology_version","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","OSV-2024-460","https://osv.dev/OSV-2024-460","glslang","","14.2.0","14.2.0","14.3.0","glslang","2024A0000000460","False","","err_not_vulnerable_based_on_repology","" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2024-0450","https://nvd.nist.gov/vuln/detail/CVE-2024-0450","python","6.2","2.7.18.8","3.13.0b2","3.12.4","python","2024A0000000450","False","","err_not_vulnerable_based_on_repology","https://github.com/NixOS/nixpkgs/pull/298006 +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2024-0450","https://nvd.nist.gov/vuln/detail/CVE-2024-0450","python","6.2","2.7.18.8","3.13.0b3","3.12.4","python","2024A0000000450","False","","err_not_vulnerable_based_on_repology","https://github.com/NixOS/nixpkgs/pull/298006 https://github.com/NixOS/nixpkgs/pull/299123 https://github.com/NixOS/nixpkgs/pull/299125" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","OSV-2024-440","https://osv.dev/OSV-2024-440","jq","","1.7.1","1.7.1","1.7.1","jq","2024A0000000440","False","","err_not_vulnerable_based_on_repology","" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2024-0397","https://nvd.nist.gov/vuln/detail/CVE-2024-0397","python","","2.7.18.8","3.13.0b2","3.12.4","python","2024A0000000397","False","","err_not_vulnerable_based_on_repology","" +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2024-0397","https://nvd.nist.gov/vuln/detail/CVE-2024-0397","python","","2.7.18.8","3.13.0b3","3.12.4","python","2024A0000000397","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","OSV-2024-396","https://osv.dev/OSV-2024-396","jq","","1.7.1","1.7.1","1.7.1","jq","2024A0000000396","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","OSV-2024-395","https://osv.dev/OSV-2024-395","libpcap","","1.10.4","1.10.4","1.10.4","libpcap","2024A0000000395","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","OSV-2024-330","https://osv.dev/OSV-2024-330","jq","","1.7.1","1.7.1","1.7.1","jq","2024A0000000330","False","","err_not_vulnerable_based_on_repology","" @@ -342,7 +342,7 @@ https://github.com/NixOS/nixpkgs/pull/298640" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-42364","https://nvd.nist.gov/vuln/detail/CVE-2023-42364","busybox","5.5","1.36.1","1.36.1","1.36.1","busybox","2023A0000042364","False","","fix_not_available","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-42363","https://nvd.nist.gov/vuln/detail/CVE-2023-42363","busybox","5.5","1.36.1","1.36.1","1.36.1","busybox","2023A0000042363","False","","fix_not_available","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-41330","https://nvd.nist.gov/vuln/detail/CVE-2023-41330","snappy","9.8","1.2.0","","","","2023A0000041330","True","Incorrect package: Issue concerns snappy php library: https://github.com/KnpLabs/snappy, whereas, nixpkgs ""snappy"" refers snappy compression library: https://google.github.io/snappy/. Issue gets included to the report due to vulnix's design decision to avoid false negatives with the cost of false positives: https://github.com/nix-community/vulnix/blob/f56f3ac857626171b95e51d98cb6874278f789d3/src/vulnix/vulnerability.py#L90-L96.","err_missing_repology_version","" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-40217","https://nvd.nist.gov/vuln/detail/CVE-2023-40217","python","5.3","2.7.18.8","3.13.0b2","3.12.4","python","2023A0000040217","False","","fix_update_to_version_nixpkgs","" +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-40217","https://nvd.nist.gov/vuln/detail/CVE-2023-40217","python","5.3","2.7.18.8","3.13.0b3","3.12.4","python","2023A0000040217","False","","fix_update_to_version_nixpkgs","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-39325","https://nvd.nist.gov/vuln/detail/CVE-2023-39325","go","7.5","1.21.0-linux-arm64-bootstrap","1.23rc1","1.22.4","go","2023A0000039325","False","","err_not_vulnerable_based_on_repology","https://github.com/NixOS/nixpkgs/pull/262713 https://github.com/NixOS/nixpkgs/pull/300783" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-39323","https://nvd.nist.gov/vuln/detail/CVE-2023-39323","go","8.1","1.21.0-linux-arm64-bootstrap","1.23rc1","1.22.4","go","2023A0000039323","False","","err_not_vulnerable_based_on_repology","" @@ -352,7 +352,7 @@ https://github.com/NixOS/nixpkgs/pull/300783" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-39319","https://nvd.nist.gov/vuln/detail/CVE-2023-39319","go","6.1","1.21.0-linux-arm64-bootstrap","1.23rc1","1.22.4","go","2023A0000039319","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-39318","https://nvd.nist.gov/vuln/detail/CVE-2023-39318","go","6.1","1.21.0-linux-arm64-bootstrap","1.23rc1","1.22.4","go","2023A0000039318","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-37769","https://nvd.nist.gov/vuln/detail/CVE-2023-37769","pixman","6.5","0.43.4","0.43.4","0.43.4","pixman","2023A0000037769","False","See: https://gitlab.freedesktop.org/pixman/pixman/-/issues/76: ""This somehow got assigned CVE-2023-37769, not sure why NVD keeps assigning CVEs like this. This is just a test executable"".","err_not_vulnerable_based_on_repology","" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-36632","https://nvd.nist.gov/vuln/detail/CVE-2023-36632","python","7.5","2.7.18.8","3.13.0b2","3.12.4","python","2023A0000036632","False","","fix_update_to_version_nixpkgs","" +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-36632","https://nvd.nist.gov/vuln/detail/CVE-2023-36632","python","7.5","2.7.18.8","3.13.0b3","3.12.4","python","2023A0000036632","False","","fix_update_to_version_nixpkgs","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-31975","https://nvd.nist.gov/vuln/detail/CVE-2023-31975","yasm","3.3","1.3.0","","","","2023A0000031975","True","Memory leak in CLI tool, no security impact.","err_missing_repology_version","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-31974","https://nvd.nist.gov/vuln/detail/CVE-2023-31974","yasm","5.5","1.3.0","","","","2023A0000031974","True","Crash in CLI tool, no security impact.","err_missing_repology_version","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-31973","https://nvd.nist.gov/vuln/detail/CVE-2023-31973","yasm","5.5","1.3.0","","","","2023A0000031973","True","Crash in CLI tool, no security impact.","err_missing_repology_version","" @@ -366,11 +366,11 @@ https://github.com/NixOS/nixpkgs/pull/232535" https://github.com/NixOS/nixpkgs/pull/232535" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-28319","https://nvd.nist.gov/vuln/detail/CVE-2023-28319","curl","7.5","0.4.46","","","","2023A0000028319","False","","err_missing_repology_version","https://github.com/NixOS/nixpkgs/pull/232531" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-28115","https://nvd.nist.gov/vuln/detail/CVE-2023-28115","snappy","9.8","1.2.0","","","","2023A0000028115","True","Incorrect package: Issue concerns snappy php library: https://github.com/KnpLabs/snappy, whereas, nixpkgs ""snappy"" refers snappy compression library: https://google.github.io/snappy/. Issue gets included to the report due to vulnix's design decision to avoid false negatives with the cost of false positives: https://github.com/nix-community/vulnix/blob/f56f3ac857626171b95e51d98cb6874278f789d3/src/vulnix/vulnerability.py#L90-L96.","err_missing_repology_version","" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-24329","https://nvd.nist.gov/vuln/detail/CVE-2023-24329","python","7.5","2.7.18.8","3.13.0b2","3.12.4","python","2023A0000024329","False","","fix_update_to_version_nixpkgs","https://github.com/NixOS/nixpkgs/pull/236448" +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-24329","https://nvd.nist.gov/vuln/detail/CVE-2023-24329","python","7.5","2.7.18.8","3.13.0b3","3.12.4","python","2023A0000024329","False","","fix_update_to_version_nixpkgs","https://github.com/NixOS/nixpkgs/pull/236448" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-7216","https://nvd.nist.gov/vuln/detail/CVE-2023-7216","cpio","5.3","2.15","2.15","2.15","cpio","2023A0000007216","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-6992","https://nvd.nist.gov/vuln/detail/CVE-2023-6992","zlib","5.5","1.3.1","1.3.1","1.3.1","zlib","2023A0000006992","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-6683","https://nvd.nist.gov/vuln/detail/CVE-2023-6683","qemu","6.5","8.2.4","9.0.1","9.0.1","qemu","2023A0000006683","False","","fix_update_to_version_nixpkgs","https://github.com/NixOS/nixpkgs/pull/319250" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-6597","https://nvd.nist.gov/vuln/detail/CVE-2023-6597","python","7.8","2.7.18.8","3.13.0b2","3.12.4","python","2023A0000006597","False","","err_not_vulnerable_based_on_repology","https://github.com/NixOS/nixpkgs/pull/298006 +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-6597","https://nvd.nist.gov/vuln/detail/CVE-2023-6597","python","7.8","2.7.18.8","3.13.0b3","3.12.4","python","2023A0000006597","False","","err_not_vulnerable_based_on_repology","https://github.com/NixOS/nixpkgs/pull/298006 https://github.com/NixOS/nixpkgs/pull/299123 https://github.com/NixOS/nixpkgs/pull/299125" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-6277","https://nvd.nist.gov/vuln/detail/CVE-2023-6277","libtiff","6.5","4.6.0","4.6.0","4.6.0","tiff","2023A0000006277","False","","err_not_vulnerable_based_on_repology","" @@ -394,12 +394,12 @@ https://github.com/NixOS/nixpkgs/pull/264266" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","OSV-2023-298","https://osv.dev/OSV-2023-298","cairo","","1.18.0","1.17.13","1.17.13","ruby:cairo","2023A0000000298","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","OSV-2023-197","https://osv.dev/OSV-2023-197","p11-kit","","0.25.3","0.25.3","0.25.3","p11-kit","2023A0000000197","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","OSV-2023-137","https://osv.dev/OSV-2023-137","harfbuzz","","8.4.0","","","","2023A0000000137","True","Based on https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=56510#c2, the issue is fixed in range https://github.com/harfbuzz/harfbuzz/compare/67e01c1292821e7b6fc2ab13acddb84ab41b2187...60841e26187576bff477c1a09ee2ffe544844abc all of which have been merged in 7.1.0.","err_missing_repology_version","" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2022-48566","https://nvd.nist.gov/vuln/detail/CVE-2022-48566","python","5.9","2.7.18.8","3.13.0b2","3.12.4","python","2022A0000048566","False","","fix_update_to_version_nixpkgs","" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2022-48565","https://nvd.nist.gov/vuln/detail/CVE-2022-48565","python","9.8","2.7.18.8","3.13.0b2","3.12.4","python","2022A0000048565","False","","fix_update_to_version_nixpkgs","" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2022-48564","https://nvd.nist.gov/vuln/detail/CVE-2022-48564","python","6.5","2.7.18.8","3.13.0b2","3.12.4","python","2022A0000048564","False","","fix_update_to_version_nixpkgs","" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2022-48560","https://nvd.nist.gov/vuln/detail/CVE-2022-48560","python","7.5","2.7.18.8","3.13.0b2","3.12.4","python","2022A0000048560","False","","fix_update_to_version_nixpkgs","" +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2022-48566","https://nvd.nist.gov/vuln/detail/CVE-2022-48566","python","5.9","2.7.18.8","3.13.0b3","3.12.4","python","2022A0000048566","False","","fix_update_to_version_nixpkgs","" +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2022-48565","https://nvd.nist.gov/vuln/detail/CVE-2022-48565","python","9.8","2.7.18.8","3.13.0b3","3.12.4","python","2022A0000048565","False","","fix_update_to_version_nixpkgs","" +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2022-48564","https://nvd.nist.gov/vuln/detail/CVE-2022-48564","python","6.5","2.7.18.8","3.13.0b3","3.12.4","python","2022A0000048564","False","","fix_update_to_version_nixpkgs","" +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2022-48560","https://nvd.nist.gov/vuln/detail/CVE-2022-48560","python","7.5","2.7.18.8","3.13.0b3","3.12.4","python","2022A0000048560","False","","fix_update_to_version_nixpkgs","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2022-48468","https://nvd.nist.gov/vuln/detail/CVE-2022-48468","protobuf-c","5.5","unstable-2023-07-08","1.5.0","1.5.0","protobuf-c","2022A0000048468","False","","fix_not_available","" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2022-45061","https://nvd.nist.gov/vuln/detail/CVE-2022-45061","python","7.5","2.7.18.8","3.13.0b2","3.12.4","python","2022A0000045061","False","","fix_update_to_version_nixpkgs","https://github.com/NixOS/nixpkgs/pull/201859 +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2022-45061","https://nvd.nist.gov/vuln/detail/CVE-2022-45061","python","7.5","2.7.18.8","3.13.0b3","3.12.4","python","2022A0000045061","False","","fix_update_to_version_nixpkgs","https://github.com/NixOS/nixpkgs/pull/201859 https://github.com/NixOS/nixpkgs/pull/204893 https://github.com/NixOS/nixpkgs/pull/204900 https://github.com/NixOS/nixpkgs/pull/204902" @@ -416,7 +416,7 @@ https://github.com/NixOS/nixpkgs/pull/253430" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2022-42010","https://nvd.nist.gov/vuln/detail/CVE-2022-42010","dbus","6.5","1","1.14.10","1.14.10","dbus","2022A0000042010","False","","fix_update_to_version_nixpkgs","https://github.com/NixOS/nixpkgs/pull/195264 https://github.com/NixOS/nixpkgs/pull/253430" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2022-40898","https://nvd.nist.gov/vuln/detail/CVE-2022-40898","wheel","7.5","0.37.1-source","0.43.0","0.43.0","python:wheel","2022A0000040898","False","","fix_update_to_version_nixpkgs","https://github.com/NixOS/nixpkgs/pull/210565" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2022-40897","https://nvd.nist.gov/vuln/detail/CVE-2022-40897","setuptools","5.9","44.0.0-source","69.5.1","70.1.1","python:setuptools","2022A0000040897","False","","fix_update_to_version_nixpkgs","" +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2022-40897","https://nvd.nist.gov/vuln/detail/CVE-2022-40897","setuptools","5.9","44.0.0-source","69.5.1","70.2.0","python:setuptools","2022A0000040897","False","","fix_update_to_version_nixpkgs","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2022-38663","https://nvd.nist.gov/vuln/detail/CVE-2022-38663","git","6.5","2.44.1","","","","2022A0000038663","True","Incorrect package: Impacts Jenkins git plugin, not git. Issue gets included to the report due to vulnix's design decision to avoid false negatives with the cost of false positives: https://github.com/nix-community/vulnix/blob/f56f3ac857626171b95e51d98cb6874278f789d3/src/vulnix/vulnerability.py#L90-L96.","err_missing_repology_version","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2022-37416","https://nvd.nist.gov/vuln/detail/CVE-2022-37416","libmpeg2","6.5","0.5.1","","","","2022A0000037416","True","NVD data issue: concerns Android only.","err_missing_repology_version","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2022-36884","https://nvd.nist.gov/vuln/detail/CVE-2022-36884","git","5.3","2.44.1","","","","2022A0000036884","True","Incorrect package: Impacts Jenkins git plugin, not git. Issue gets included to the report due to vulnix's design decision to avoid false negatives with the cost of false positives: https://github.com/nix-community/vulnix/blob/f56f3ac857626171b95e51d98cb6874278f789d3/src/vulnix/vulnerability.py#L90-L96.","err_missing_repology_version","" @@ -436,7 +436,7 @@ https://github.com/NixOS/nixpkgs/pull/180021" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2022-27776","https://nvd.nist.gov/vuln/detail/CVE-2022-27776","curl","6.5","0.4.46","","","","2022A0000027776","False","","err_missing_repology_version","https://github.com/NixOS/nixpkgs/pull/170654 https://github.com/NixOS/nixpkgs/pull/170659" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2022-26691","https://nvd.nist.gov/vuln/detail/CVE-2022-26691","cups","6.7","2.4.7","","","","2022A0000026691","True","Fixed in nixpkgs with PR: https://github.com/NixOS/nixpkgs/pull/174898.","err_missing_repology_version","" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2022-26488","https://nvd.nist.gov/vuln/detail/CVE-2022-26488","python","7.0","2.7.18.8","3.13.0b2","3.12.4","python","2022A0000026488","False","","err_not_vulnerable_based_on_repology","" +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2022-26488","https://nvd.nist.gov/vuln/detail/CVE-2022-26488","python","7.0","2.7.18.8","3.13.0b3","3.12.4","python","2022A0000026488","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","MAL-2022-4301","https://osv.dev/MAL-2022-4301","libidn2","","2.3.7","","","","2022A0000004301","True","Incorrect package: Issue refers npm libidn2, whereas, nixpkgs refers libidn2 https://gitlab.com/libidn/libidn2.","err_missing_repology_version","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2022-4066","https://nvd.nist.gov/vuln/detail/CVE-2022-4066","firefox","8.2","127.0","127.0.2","127.0.2","firefox","2022A0000004066","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2022-3219","https://nvd.nist.gov/vuln/detail/CVE-2022-3219","gnupg","3.3","2.4.5","","","","2022A0000003219","True","Fix patch is not accepted upstream: https://dev.gnupg.org/D556.","err_missing_repology_version","" @@ -449,7 +449,7 @@ https://github.com/NixOS/nixpkgs/pull/170659" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","OSV-2022-530","https://osv.dev/OSV-2022-530","espeak-ng","","1.51.1","1.51.1","1.51.1","espeak-ng","2022A0000000530","False","Unclear if this is still valid.","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","OSV-2022-519","https://osv.dev/OSV-2022-519","espeak-ng","","1.51.1","1.51.1","1.51.1","espeak-ng","2022A0000000519","False","Unclear if this is still valid.","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","OSV-2022-462","https://osv.dev/OSV-2022-462","espeak-ng","","1.51.1","1.51.1","1.51.1","espeak-ng","2022A0000000462","False","Unclear if this is still valid.","err_not_vulnerable_based_on_repology","" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2022-0391","https://nvd.nist.gov/vuln/detail/CVE-2022-0391","python","7.5","2.7.18.8","3.13.0b2","3.12.4","python","2022A0000000391","False","","fix_update_to_version_nixpkgs","https://github.com/NixOS/nixpkgs/pull/203428" +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2022-0391","https://nvd.nist.gov/vuln/detail/CVE-2022-0391","python","7.5","2.7.18.8","3.13.0b3","3.12.4","python","2022A0000000391","False","","fix_update_to_version_nixpkgs","https://github.com/NixOS/nixpkgs/pull/203428" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","OSV-2022-312","https://osv.dev/OSV-2022-312","dnsmasq","","2.90","2.90","2.90","dnsmasq","2022A0000000312","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","OSV-2022-193","https://osv.dev/OSV-2022-193","w3m","","0.5.3+git20230121","0.5.3+git20230121","0.5.3+git20230121","w3m","2022A0000000193","False","Unclear if this is still valid.","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","RUSTSEC-2022-0034","https://osv.dev/RUSTSEC-2022-0034","pkcs11","","35.4.1","","","","2022A0000000034","False","","err_missing_repology_version","" @@ -478,7 +478,7 @@ https://github.com/NixOS/nixpkgs/pull/170659" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2021-33454","https://nvd.nist.gov/vuln/detail/CVE-2021-33454","yasm","5.5","1.3.0","","","","2021A0000033454","True","Issue is not fixed upstream. Other distributions have triaged the issue as minor or 'no security impact'.","err_missing_repology_version","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2021-28794","https://nvd.nist.gov/vuln/detail/CVE-2021-28794","ShellCheck","9.8","0.10.0","0.10.0","0.10.0","shellcheck","2021A0000028794","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2021-26720","https://nvd.nist.gov/vuln/detail/CVE-2021-26720","avahi","7.8","0.8","","","","2021A0000026720","True","False positive: issue refers avahi-daemon-check-dns.sh in the Debian avahi package. As such, the issue is specific to Debian and its derivatives.","err_missing_repology_version","" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2021-23336","https://nvd.nist.gov/vuln/detail/CVE-2021-23336","python","5.9","2.7.18.8","3.13.0b2","3.12.4","python","2021A0000023336","False","","fix_update_to_version_nixpkgs","https://github.com/NixOS/nixpkgs/pull/117037 +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2021-23336","https://nvd.nist.gov/vuln/detail/CVE-2021-23336","python","5.9","2.7.18.8","3.13.0b3","3.12.4","python","2021A0000023336","False","","fix_update_to_version_nixpkgs","https://github.com/NixOS/nixpkgs/pull/117037 https://github.com/NixOS/nixpkgs/pull/117082 https://github.com/NixOS/nixpkgs/pull/118403" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2021-21698","https://nvd.nist.gov/vuln/detail/CVE-2021-21698","subversion","7.5","1.14.3","1.14.3","1.14.3","subversion","2021A0000021698","False","","err_not_vulnerable_based_on_repology","" @@ -491,7 +491,7 @@ https://github.com/NixOS/nixpkgs/pull/150906 https://github.com/NixOS/nixpkgs/pull/152147 https://github.com/NixOS/nixpkgs/pull/152359 https://github.com/NixOS/nixpkgs/pull/168777" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2021-3733","https://nvd.nist.gov/vuln/detail/CVE-2021-3733","python","6.5","2.7.18.8","3.13.0b2","3.12.4","python","2021A0000003733","False","","fix_update_to_version_nixpkgs","https://github.com/NixOS/nixpkgs/pull/203428" +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2021-3733","https://nvd.nist.gov/vuln/detail/CVE-2021-3733","python","6.5","2.7.18.8","3.13.0b3","3.12.4","python","2021A0000003733","False","","fix_update_to_version_nixpkgs","https://github.com/NixOS/nixpkgs/pull/203428" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2021-3572","https://nvd.nist.gov/vuln/detail/CVE-2021-3572","pip","5.7","20.3.4-source","24.0","24.1.1","pip","2021A0000003572","False","","fix_update_to_version_nixpkgs","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","OSV-2021-1157","https://osv.dev/OSV-2021-1157","espeak-ng","","1.51.1","1.51.1","1.51.1","espeak-ng","2021A0000001157","False","Unclear if this is still valid.","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","OSV-2021-1141","https://osv.dev/OSV-2021-1141","espeak-ng","","1.51.1","1.51.1","1.51.1","espeak-ng","2021A0000001141","False","Unclear if this is still valid.","err_not_vulnerable_based_on_repology","" @@ -534,7 +534,7 @@ https://github.com/NixOS/nixpkgs/pull/84664" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2019-14553","https://nvd.nist.gov/vuln/detail/CVE-2019-14553","edk2","4.9","202402","","","","2019A0000014553","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2019-12749","https://nvd.nist.gov/vuln/detail/CVE-2019-12749","dbus","7.1","1","","","","2019A0000012749","True","Fixed with https://github.com/NixOS/nixpkgs/pull/63021 (dbus version '1' in nixpkgs currently refers 1.14.8).","err_missing_repology_version","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2019-12067","https://nvd.nist.gov/vuln/detail/CVE-2019-12067","qemu","6.5","8.2.4","","","","2019A0000012067","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2019-9674","https://nvd.nist.gov/vuln/detail/CVE-2019-9674","python","7.5","2.7.18.8","3.13.0b2","3.12.4","python","2019A0000009674","False","","fix_update_to_version_nixpkgs","" +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2019-9674","https://nvd.nist.gov/vuln/detail/CVE-2019-9674","python","7.5","2.7.18.8","3.13.0b3","3.12.4","python","2019A0000009674","False","","fix_update_to_version_nixpkgs","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2019-6470","https://nvd.nist.gov/vuln/detail/CVE-2019-6470","bind","7.5","9.18.27","","","","2019A0000006470","True","Not valid: https://github.com/NixOS/nixpkgs/issues/73617#issuecomment-569491606.","err_missing_repology_version","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2019-6293","https://nvd.nist.gov/vuln/detail/CVE-2019-6293","flex","5.5","2.6.4","","","","2019A0000006293","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2019-5443","https://nvd.nist.gov/vuln/detail/CVE-2019-5443","curl","7.8","0.4.46","","","","2019A0000005443","False","","err_missing_repology_version","" @@ -544,8 +544,8 @@ https://github.com/NixOS/nixpkgs/pull/84664" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2018-8024","https://nvd.nist.gov/vuln/detail/CVE-2018-8024","firefox","5.4","127.0","127.0.2","127.0.2","firefox","2018A0000008024","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2018-7263","https://nvd.nist.gov/vuln/detail/CVE-2018-7263","libmad","9.8","0.15.1b","","","","2018A0000007263","True","Based on https://github.com/NixOS/nixpkgs/issues/57154, issue is fixed by https://github.com/NixOS/nixpkgs/commit/92edb0610923fab5a9dcc59b94652f1e8a5ea1ed.","err_missing_repology_version","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2018-6553","https://nvd.nist.gov/vuln/detail/CVE-2018-6553","cups","8.8","2.4.7","","","","2018A0000006553","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2017-18207","https://nvd.nist.gov/vuln/detail/CVE-2017-18207","python","6.5","2.7.18.8","3.13.0b2","3.12.4","python","2017A0000018207","False","","fix_update_to_version_nixpkgs","" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2017-17522","https://nvd.nist.gov/vuln/detail/CVE-2017-17522","python","8.8","2.7.18.8","3.13.0b2","3.12.4","python","2017A0000017522","False","","fix_update_to_version_nixpkgs","" +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2017-18207","https://nvd.nist.gov/vuln/detail/CVE-2017-18207","python","6.5","2.7.18.8","3.13.0b3","3.12.4","python","2017A0000018207","False","","fix_update_to_version_nixpkgs","" +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2017-17522","https://nvd.nist.gov/vuln/detail/CVE-2017-17522","python","8.8","2.7.18.8","3.13.0b3","3.12.4","python","2017A0000017522","False","","fix_update_to_version_nixpkgs","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2017-8806","https://nvd.nist.gov/vuln/detail/CVE-2017-8806","postgresql","5.5","15.7","16.3","16.3","postgresql","2017A0000008806","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2017-5628","https://nvd.nist.gov/vuln/detail/CVE-2017-5628","mujs","7.8","1.3.4","","","","2017A0000005628","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2017-5627","https://nvd.nist.gov/vuln/detail/CVE-2017-5627","mujs","7.8","1.3.4","","","","2017A0000005627","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" @@ -566,7 +566,7 @@ https://github.com/NixOS/nixpkgs/pull/84664" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7152","https://nvd.nist.gov/vuln/detail/CVE-2016-7152","firefox","5.3","127.0","127.0.2","127.0.2","firefox","2016A0000007152","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-2781","https://nvd.nist.gov/vuln/detail/CVE-2016-2781","coreutils","6.5","9.5","","","","2016A0000002781","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2015-7313","https://nvd.nist.gov/vuln/detail/CVE-2015-7313","libtiff","5.5","4.6.0","","","","2015A0000007313","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2015-5652","https://nvd.nist.gov/vuln/detail/CVE-2015-5652","python","","2.7.18.8","3.13.0b2","3.12.4","python","2015A0000005652","False","","err_not_vulnerable_based_on_repology","" +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2015-5652","https://nvd.nist.gov/vuln/detail/CVE-2015-5652","python","","2.7.18.8","3.13.0b3","3.12.4","python","2015A0000005652","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9157","https://nvd.nist.gov/vuln/detail/CVE-2014-9157","graphviz","","10.0.1","","","","2014A0000009157","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-6492","https://nvd.nist.gov/vuln/detail/CVE-2014-6492","firefox","","127.0","127.0.2","127.0.2","firefox","2014A0000006492","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-4860","https://nvd.nist.gov/vuln/detail/CVE-2014-4860","edk2","6.8","202402","","","","2014A0000004860","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" @@ -584,7 +584,7 @@ https://github.com/NixOS/nixpkgs/pull/84664" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2009-1597","https://nvd.nist.gov/vuln/detail/CVE-2009-1597","firefox","","127.0","127.0.2","127.0.2","firefox","2009A0000001597","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2007-6715","https://nvd.nist.gov/vuln/detail/CVE-2007-6715","firefox","","127.0","127.0.2","127.0.2","firefox","2007A0000006715","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2007-5967","https://nvd.nist.gov/vuln/detail/CVE-2007-5967","firefox","6.5","127.0","127.0.2","127.0.2","firefox","2007A0000005967","False","","err_not_vulnerable_based_on_repology","" -"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2007-4559","https://nvd.nist.gov/vuln/detail/CVE-2007-4559","python","","2.7.18.8","3.13.0b2","3.12.4","python","2007A0000004559","False","","fix_update_to_version_nixpkgs","" +"packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2007-4559","https://nvd.nist.gov/vuln/detail/CVE-2007-4559","python","","2.7.18.8","3.13.0b3","3.12.4","python","2007A0000004559","False","","fix_update_to_version_nixpkgs","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2007-4013","https://nvd.nist.gov/vuln/detail/CVE-2007-4013","firefox","","127.0","127.0.2","127.0.2","firefox","2007A0000004013","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2007-3827","https://nvd.nist.gov/vuln/detail/CVE-2007-3827","firefox","","127.0","127.0.2","127.0.2","firefox","2007A0000003827","False","","err_not_vulnerable_based_on_repology","" "packages.aarch64-linux.nvidia-jetson-orin-nx-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2007-3670","https://nvd.nist.gov/vuln/detail/CVE-2007-3670","firefox","","127.0","127.0.2","127.0.2","firefox","2007A0000003670","False","","err_not_vulnerable_based_on_repology","" diff --git a/reports/main/packages.aarch64-linux.nvidia-jetson-orin-nx-release.md b/reports/main/packages.aarch64-linux.nvidia-jetson-orin-nx-release.md index 85f3e0d..768f126 100644 --- a/reports/main/packages.aarch64-linux.nvidia-jetson-orin-nx-release.md +++ b/reports/main/packages.aarch64-linux.nvidia-jetson-orin-nx-release.md @@ -6,7 +6,7 @@ SPDX-License-Identifier: CC-BY-SA-4.0 # Vulnerability Report -This vulnerability report is generated for Ghaf target `github:tiiuae/ghaf?ref=main#packages.aarch64-linux.nvidia-jetson-orin-nx-release` revision https://github.com/tiiuae/ghaf/commit/a7167f494be88a3eb54209525d45e6e7b31ce787. The tables on this page include known vulnerabilities impacting buildtime or runtime dependencies of the given target. +This vulnerability report is generated for Ghaf target `github:tiiuae/ghaf?ref=main#packages.aarch64-linux.nvidia-jetson-orin-nx-release` revision https://github.com/tiiuae/ghaf/commit/4f2291cf0b6afc06ec6aeb52f3d570561a6c337f. The tables on this page include known vulnerabilities impacting buildtime or runtime dependencies of the given target. This report is automatically generated as specified on the [Vulnerability Scan](../../.github/workflows/vulnerability-scan.yml) GitHub action workflow. It uses the tooling from [sbomnix](https://github.com/tiiuae/sbomnix) repository, such as [vulnxscan](https://github.com/tiiuae/sbomnix/tree/main/scripts/vulnxscan), as well as the manual analysis results maintained in the [manual_analysis.csv](../../manual_analysis.csv) file. @@ -62,15 +62,15 @@ Consider [whitelisting](../../manual_analysis.csv) possible false positives base | [CVE-2024-24790](https://nvd.nist.gov/vuln/detail/CVE-2024-24790) | go | 9.8 | 1.22.3 | 1.23rc1 | 1.22.4 | *[[PR](https://github.com/NixOS/nixpkgs/pull/319485), [PR](https://github.com/NixOS/nixpkgs/pull/321916)]* | | [CVE-2024-24790](https://nvd.nist.gov/vuln/detail/CVE-2024-24790) | go | 9.8 | 1.21.0-linux-arm | 1.23rc1 | 1.22.4 | *[[PR](https://github.com/NixOS/nixpkgs/pull/319485), [PR](https://github.com/NixOS/nixpkgs/pull/321916)]* | | [CVE-2023-39320](https://nvd.nist.gov/vuln/detail/CVE-2023-39320) | go | 9.8 | 1.21.0-linux-arm | 1.23rc1 | 1.22.4 | | -| [CVE-2022-48565](https://nvd.nist.gov/vuln/detail/CVE-2022-48565) | python | 9.8 | 2.7.18.8 | 3.13.0b2 | 3.12.4 | | +| [CVE-2022-48565](https://nvd.nist.gov/vuln/detail/CVE-2022-48565) | python | 9.8 | 2.7.18.8 | 3.13.0b3 | 3.12.4 | | | [CVE-2022-32221](https://nvd.nist.gov/vuln/detail/CVE-2022-32221) | curl | 9.8 | 0.4.46 | | | *[[PR](https://github.com/NixOS/nixpkgs/pull/198730)]* | | [CVE-2021-28794](https://nvd.nist.gov/vuln/detail/CVE-2021-28794) | ShellCheck | 9.8 | 0.10.0 | 0.10.0 | 0.10.0 | | | [CVE-2021-4048](https://nvd.nist.gov/vuln/detail/CVE-2021-4048) | lapack | 9.1 | 3 | 3.12.0 | 3.12.0 | *[[PR](https://github.com/NixOS/nixpkgs/pull/150788), [PR](https://github.com/NixOS/nixpkgs/pull/150906), [PR](https://github.com/NixOS/nixpkgs/pull/152147), [PR](https://github.com/NixOS/nixpkgs/pull/152359), [PR](https://github.com/NixOS/nixpkgs/pull/168777)]* | -| [CVE-2017-17522](https://nvd.nist.gov/vuln/detail/CVE-2017-17522) | python | 8.8 | 2.7.18.8 | 3.13.0b2 | 3.12.4 | | +| [CVE-2017-17522](https://nvd.nist.gov/vuln/detail/CVE-2017-17522) | python | 8.8 | 2.7.18.8 | 3.13.0b3 | 3.12.4 | | | [CVE-2023-2680](https://nvd.nist.gov/vuln/detail/CVE-2023-2680) | qemu | 8.2 | 8.2.4 | 9.0.1 | 9.0.1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/305402)]* | | [CVE-2022-4066](https://nvd.nist.gov/vuln/detail/CVE-2022-4066) | firefox | 8.2 | 127.0 | 127.0.2 | 127.0.2 | | | [CVE-2023-39323](https://nvd.nist.gov/vuln/detail/CVE-2023-39323) | go | 8.1 | 1.21.0-linux-arm | 1.23rc1 | 1.22.4 | | -| [CVE-2023-6597](https://nvd.nist.gov/vuln/detail/CVE-2023-6597) | python | 7.8 | 2.7.18.8 | 3.13.0b2 | 3.12.4 | *[[PR](https://github.com/NixOS/nixpkgs/pull/298006), [PR](https://github.com/NixOS/nixpkgs/pull/299123), [PR](https://github.com/NixOS/nixpkgs/pull/299125)]* | +| [CVE-2023-6597](https://nvd.nist.gov/vuln/detail/CVE-2023-6597) | python | 7.8 | 2.7.18.8 | 3.13.0b3 | 3.12.4 | *[[PR](https://github.com/NixOS/nixpkgs/pull/298006), [PR](https://github.com/NixOS/nixpkgs/pull/299123), [PR](https://github.com/NixOS/nixpkgs/pull/299125)]* | | [CVE-2023-1386](https://nvd.nist.gov/vuln/detail/CVE-2023-1386) | qemu | 7.8 | 8.2.4 | 9.0.1 | 9.0.1 | Revisit when fixed upstream: [link](https://github.com/v9fs/linux/issues/29). | | [CVE-2021-43138](https://nvd.nist.gov/vuln/detail/CVE-2021-43138) | async | 7.8 | 2.2.5-r1.cabal | 2.2.5 | 2.2.5 | | | [CVE-2021-43138](https://nvd.nist.gov/vuln/detail/CVE-2021-43138) | async | 7.8 | 2.2.5 | 2.2.5 | 2.2.5 | | @@ -81,25 +81,25 @@ Consider [whitelisting](../../manual_analysis.csv) possible false positives base | [CVE-2023-39325](https://nvd.nist.gov/vuln/detail/CVE-2023-39325) | go | 7.5 | 1.21.0-linux-arm | 1.23rc1 | 1.22.4 | *[[PR](https://github.com/NixOS/nixpkgs/pull/262713), [PR](https://github.com/NixOS/nixpkgs/pull/300783)]* | | [CVE-2023-39322](https://nvd.nist.gov/vuln/detail/CVE-2023-39322) | go | 7.5 | 1.21.0-linux-arm | 1.23rc1 | 1.22.4 | | | [CVE-2023-39321](https://nvd.nist.gov/vuln/detail/CVE-2023-39321) | go | 7.5 | 1.21.0-linux-arm | 1.23rc1 | 1.22.4 | | -| [CVE-2023-36632](https://nvd.nist.gov/vuln/detail/CVE-2023-36632) | python | 7.5 | 2.7.18.8 | 3.13.0b2 | 3.12.4 | | +| [CVE-2023-36632](https://nvd.nist.gov/vuln/detail/CVE-2023-36632) | python | 7.5 | 2.7.18.8 | 3.13.0b3 | 3.12.4 | | | [CVE-2023-28319](https://nvd.nist.gov/vuln/detail/CVE-2023-28319) | curl | 7.5 | 0.4.46 | | | *[[PR](https://github.com/NixOS/nixpkgs/pull/232531)]* | -| [CVE-2023-24329](https://nvd.nist.gov/vuln/detail/CVE-2023-24329) | python | 7.5 | 2.7.18.8 | 3.13.0b2 | 3.12.4 | *[[PR](https://github.com/NixOS/nixpkgs/pull/236448)]* | -| [CVE-2022-48560](https://nvd.nist.gov/vuln/detail/CVE-2022-48560) | python | 7.5 | 2.7.18.8 | 3.13.0b2 | 3.12.4 | | -| [CVE-2022-45061](https://nvd.nist.gov/vuln/detail/CVE-2022-45061) | python | 7.5 | 2.7.18.8 | 3.13.0b2 | 3.12.4 | *[[PR](https://github.com/NixOS/nixpkgs/pull/201859), [PR](https://github.com/NixOS/nixpkgs/pull/204893), [PR](https://github.com/NixOS/nixpkgs/pull/204900), [PR](https://github.com/NixOS/nixpkgs/pull/204902)]* | +| [CVE-2023-24329](https://nvd.nist.gov/vuln/detail/CVE-2023-24329) | python | 7.5 | 2.7.18.8 | 3.13.0b3 | 3.12.4 | *[[PR](https://github.com/NixOS/nixpkgs/pull/236448)]* | +| [CVE-2022-48560](https://nvd.nist.gov/vuln/detail/CVE-2022-48560) | python | 7.5 | 2.7.18.8 | 3.13.0b3 | 3.12.4 | | +| [CVE-2022-45061](https://nvd.nist.gov/vuln/detail/CVE-2022-45061) | python | 7.5 | 2.7.18.8 | 3.13.0b3 | 3.12.4 | *[[PR](https://github.com/NixOS/nixpkgs/pull/201859), [PR](https://github.com/NixOS/nixpkgs/pull/204893), [PR](https://github.com/NixOS/nixpkgs/pull/204900), [PR](https://github.com/NixOS/nixpkgs/pull/204902)]* | | [CVE-2022-43357](https://nvd.nist.gov/vuln/detail/CVE-2022-43357) | sassc | 7.5 | 3.6.2 | 3.6.2 | 3.6.2 | *[[PR](https://github.com/NixOS/nixpkgs/pull/274726), [PR](https://github.com/NixOS/nixpkgs/pull/275599), [PR](https://github.com/NixOS/nixpkgs/pull/275878)]* | | [CVE-2022-40898](https://nvd.nist.gov/vuln/detail/CVE-2022-40898) | wheel | 7.5 | 0.37.1-source | 0.43.0 | 0.43.0 | *[[PR](https://github.com/NixOS/nixpkgs/pull/210565)]* | | [CVE-2022-27782](https://nvd.nist.gov/vuln/detail/CVE-2022-27782) | curl | 7.5 | 0.4.46 | | | | | [CVE-2022-27781](https://nvd.nist.gov/vuln/detail/CVE-2022-27781) | curl | 7.5 | 0.4.46 | | | | -| [CVE-2022-0391](https://nvd.nist.gov/vuln/detail/CVE-2022-0391) | python | 7.5 | 2.7.18.8 | 3.13.0b2 | 3.12.4 | *[[PR](https://github.com/NixOS/nixpkgs/pull/203428)]* | +| [CVE-2022-0391](https://nvd.nist.gov/vuln/detail/CVE-2022-0391) | python | 7.5 | 2.7.18.8 | 3.13.0b3 | 3.12.4 | *[[PR](https://github.com/NixOS/nixpkgs/pull/203428)]* | | [CVE-2021-21698](https://nvd.nist.gov/vuln/detail/CVE-2021-21698) | subversion | 7.5 | 1.14.3 | 1.14.3 | 1.14.3 | | -| [CVE-2019-9674](https://nvd.nist.gov/vuln/detail/CVE-2019-9674) | python | 7.5 | 2.7.18.8 | 3.13.0b2 | 3.12.4 | | +| [CVE-2019-9674](https://nvd.nist.gov/vuln/detail/CVE-2019-9674) | python | 7.5 | 2.7.18.8 | 3.13.0b3 | 3.12.4 | | | [CVE-2018-13162](https://nvd.nist.gov/vuln/detail/CVE-2018-13162) | alex | 7.5 | 3.4.0.1 | 3.4.0.1 | 3.5.1.0 | | -| [CVE-2022-26488](https://nvd.nist.gov/vuln/detail/CVE-2022-26488) | python | 7.0 | 2.7.18.8 | 3.13.0b2 | 3.12.4 | | +| [CVE-2022-26488](https://nvd.nist.gov/vuln/detail/CVE-2022-26488) | python | 7.0 | 2.7.18.8 | 3.13.0b3 | 3.12.4 | | | [CVE-2023-46361](https://nvd.nist.gov/vuln/detail/CVE-2023-46361) | jbig2dec | 6.5 | 0.20 | 0.20 | 0.20 | | | [CVE-2023-37769](https://nvd.nist.gov/vuln/detail/CVE-2023-37769) | pixman | 6.5 | 0.43.4 | 0.43.4 | 0.43.4 | See: [link](https://gitlab.freedesktop.org/pixman/pixman/-/issues/76): "This somehow got assigned CVE-2023-37769, not sure why NVD keeps assigning CVEs like this. This is just a test executable". | | [CVE-2023-6683](https://nvd.nist.gov/vuln/detail/CVE-2023-6683) | qemu | 6.5 | 8.2.4 | 9.0.1 | 9.0.1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/319250)]* | | [CVE-2023-6277](https://nvd.nist.gov/vuln/detail/CVE-2023-6277) | libtiff | 6.5 | 4.6.0 | 4.6.0 | 4.6.0 | | -| [CVE-2022-48564](https://nvd.nist.gov/vuln/detail/CVE-2022-48564) | python | 6.5 | 2.7.18.8 | 3.13.0b2 | 3.12.4 | | +| [CVE-2022-48564](https://nvd.nist.gov/vuln/detail/CVE-2022-48564) | python | 6.5 | 2.7.18.8 | 3.13.0b3 | 3.12.4 | | | [CVE-2022-42012](https://nvd.nist.gov/vuln/detail/CVE-2022-42012) | dbus | 6.5 | 1 | 1.14.10 | 1.14.10 | *[[PR](https://github.com/NixOS/nixpkgs/pull/195264), [PR](https://github.com/NixOS/nixpkgs/pull/253430)]* | | [CVE-2022-42011](https://nvd.nist.gov/vuln/detail/CVE-2022-42011) | dbus | 6.5 | 1 | 1.14.10 | 1.14.10 | *[[PR](https://github.com/NixOS/nixpkgs/pull/195264), [PR](https://github.com/NixOS/nixpkgs/pull/253430)]* | | [CVE-2022-42010](https://nvd.nist.gov/vuln/detail/CVE-2022-42010) | dbus | 6.5 | 1 | 1.14.10 | 1.14.10 | *[[PR](https://github.com/NixOS/nixpkgs/pull/195264), [PR](https://github.com/NixOS/nixpkgs/pull/253430)]* | @@ -107,22 +107,22 @@ Consider [whitelisting](../../manual_analysis.csv) possible false positives base | [CVE-2022-27776](https://nvd.nist.gov/vuln/detail/CVE-2022-27776) | curl | 6.5 | 0.4.46 | | | *[[PR](https://github.com/NixOS/nixpkgs/pull/170654), [PR](https://github.com/NixOS/nixpkgs/pull/170659)]* | | [CVE-2021-46312](https://nvd.nist.gov/vuln/detail/CVE-2021-46312) | djvulibre | 6.5 | 3.5.28 | 3.5.28 | 3.5.28 | | | [CVE-2021-46310](https://nvd.nist.gov/vuln/detail/CVE-2021-46310) | djvulibre | 6.5 | 3.5.28 | 3.5.28 | 3.5.28 | | -| [CVE-2021-3733](https://nvd.nist.gov/vuln/detail/CVE-2021-3733) | python | 6.5 | 2.7.18.8 | 3.13.0b2 | 3.12.4 | *[[PR](https://github.com/NixOS/nixpkgs/pull/203428)]* | +| [CVE-2021-3733](https://nvd.nist.gov/vuln/detail/CVE-2021-3733) | python | 6.5 | 2.7.18.8 | 3.13.0b3 | 3.12.4 | *[[PR](https://github.com/NixOS/nixpkgs/pull/203428)]* | | [CVE-2020-27748](https://nvd.nist.gov/vuln/detail/CVE-2020-27748) | xdg-utils | 6.5 | 1.2.1 | 1.2.1 | 1.2.1 | | | [CVE-2020-2304](https://nvd.nist.gov/vuln/detail/CVE-2020-2304) | subversion | 6.5 | 1.14.3 | 1.14.3 | 1.14.3 | | -| [CVE-2017-18207](https://nvd.nist.gov/vuln/detail/CVE-2017-18207) | python | 6.5 | 2.7.18.8 | 3.13.0b2 | 3.12.4 | | +| [CVE-2017-18207](https://nvd.nist.gov/vuln/detail/CVE-2017-18207) | python | 6.5 | 2.7.18.8 | 3.13.0b3 | 3.12.4 | | | [CVE-2007-5967](https://nvd.nist.gov/vuln/detail/CVE-2007-5967) | firefox | 6.5 | 127.0 | 127.0.2 | 127.0.2 | | -| [CVE-2024-0450](https://nvd.nist.gov/vuln/detail/CVE-2024-0450) | python | 6.2 | 2.7.18.8 | 3.13.0b2 | 3.12.4 | *[[PR](https://github.com/NixOS/nixpkgs/pull/298006), [PR](https://github.com/NixOS/nixpkgs/pull/299123), [PR](https://github.com/NixOS/nixpkgs/pull/299125)]* | +| [CVE-2024-0450](https://nvd.nist.gov/vuln/detail/CVE-2024-0450) | python | 6.2 | 2.7.18.8 | 3.13.0b3 | 3.12.4 | *[[PR](https://github.com/NixOS/nixpkgs/pull/298006), [PR](https://github.com/NixOS/nixpkgs/pull/299123), [PR](https://github.com/NixOS/nixpkgs/pull/299125)]* | | [CVE-2024-0953](https://nvd.nist.gov/vuln/detail/CVE-2024-0953) | firefox | 6.1 | 127.0 | 127.0.2 | 127.0.2 | | | [CVE-2023-39319](https://nvd.nist.gov/vuln/detail/CVE-2023-39319) | go | 6.1 | 1.21.0-linux-arm | 1.23rc1 | 1.22.4 | | | [CVE-2023-39318](https://nvd.nist.gov/vuln/detail/CVE-2023-39318) | go | 6.1 | 1.21.0-linux-arm | 1.23rc1 | 1.22.4 | | | [CVE-2020-35669](https://nvd.nist.gov/vuln/detail/CVE-2020-35669) | http | 6.1 | 0.2.12 | 0.3-0 | 0.4 | | | [CVE-2023-28321](https://nvd.nist.gov/vuln/detail/CVE-2023-28321) | curl | 5.9 | 0.4.46 | | | *[[PR](https://github.com/NixOS/nixpkgs/pull/232531), [PR](https://github.com/NixOS/nixpkgs/pull/232535)]* | | [CVE-2023-28320](https://nvd.nist.gov/vuln/detail/CVE-2023-28320) | curl | 5.9 | 0.4.46 | | | *[[PR](https://github.com/NixOS/nixpkgs/pull/232531), [PR](https://github.com/NixOS/nixpkgs/pull/232535)]* | -| [CVE-2022-48566](https://nvd.nist.gov/vuln/detail/CVE-2022-48566) | python | 5.9 | 2.7.18.8 | 3.13.0b2 | 3.12.4 | | +| [CVE-2022-48566](https://nvd.nist.gov/vuln/detail/CVE-2022-48566) | python | 5.9 | 2.7.18.8 | 3.13.0b3 | 3.12.4 | | | [CVE-2022-43552](https://nvd.nist.gov/vuln/detail/CVE-2022-43552) | curl | 5.9 | 0.4.46 | | | *[[PR](https://github.com/NixOS/nixpkgs/pull/207158), [PR](https://github.com/NixOS/nixpkgs/pull/207162), [PR](https://github.com/NixOS/nixpkgs/pull/207165)]* | -| [CVE-2022-40897](https://nvd.nist.gov/vuln/detail/CVE-2022-40897) | setuptools | 5.9 | 44.0.0-source | 69.5.1 | 70.1.1 | | -| [CVE-2021-23336](https://nvd.nist.gov/vuln/detail/CVE-2021-23336) | python | 5.9 | 2.7.18.8 | 3.13.0b2 | 3.12.4 | *[[PR](https://github.com/NixOS/nixpkgs/pull/117037), [PR](https://github.com/NixOS/nixpkgs/pull/117082), [PR](https://github.com/NixOS/nixpkgs/pull/118403)]* | +| [CVE-2022-40897](https://nvd.nist.gov/vuln/detail/CVE-2022-40897) | setuptools | 5.9 | 44.0.0-source | 69.5.1 | 70.2.0 | | +| [CVE-2021-23336](https://nvd.nist.gov/vuln/detail/CVE-2021-23336) | python | 5.9 | 2.7.18.8 | 3.13.0b3 | 3.12.4 | *[[PR](https://github.com/NixOS/nixpkgs/pull/117037), [PR](https://github.com/NixOS/nixpkgs/pull/117082), [PR](https://github.com/NixOS/nixpkgs/pull/118403)]* | | [CVE-2021-3572](https://nvd.nist.gov/vuln/detail/CVE-2021-3572) | pip | 5.7 | 20.3.4-source | 24.0 | 24.1.1 | | | [CVE-2024-24789](https://nvd.nist.gov/vuln/detail/CVE-2024-24789) | go | 5.5 | 1.22.3 | 1.23rc1 | 1.22.4 | *[[PR](https://github.com/NixOS/nixpkgs/pull/319485), [PR](https://github.com/NixOS/nixpkgs/pull/321916)]* | | [CVE-2024-24789](https://nvd.nist.gov/vuln/detail/CVE-2024-24789) | go | 5.5 | 1.21.0-linux-arm | 1.23rc1 | 1.22.4 | *[[PR](https://github.com/NixOS/nixpkgs/pull/319485), [PR](https://github.com/NixOS/nixpkgs/pull/321916)]* | @@ -141,7 +141,7 @@ Consider [whitelisting](../../manual_analysis.csv) possible false positives base | [CVE-2020-2136](https://nvd.nist.gov/vuln/detail/CVE-2020-2136) | git | 5.4 | 2.44.1 | 2.45.1 | 2.45.2 | *[[PR](https://github.com/NixOS/nixpkgs/pull/82872), [PR](https://github.com/NixOS/nixpkgs/pull/84664)]* | | [CVE-2020-2111](https://nvd.nist.gov/vuln/detail/CVE-2020-2111) | subversion | 5.4 | 1.14.3 | 1.14.3 | 1.14.3 | | | [CVE-2018-8024](https://nvd.nist.gov/vuln/detail/CVE-2018-8024) | firefox | 5.4 | 127.0 | 127.0.2 | 127.0.2 | | -| [CVE-2023-40217](https://nvd.nist.gov/vuln/detail/CVE-2023-40217) | python | 5.3 | 2.7.18.8 | 3.13.0b2 | 3.12.4 | | +| [CVE-2023-40217](https://nvd.nist.gov/vuln/detail/CVE-2023-40217) | python | 5.3 | 2.7.18.8 | 3.13.0b3 | 3.12.4 | | | [CVE-2023-7216](https://nvd.nist.gov/vuln/detail/CVE-2023-7216) | cpio | 5.3 | 2.15 | 2.15 | 2.15 | | | [CVE-2016-7153](https://nvd.nist.gov/vuln/detail/CVE-2016-7153) | firefox | 5.3 | 127.0 | 127.0.2 | 127.0.2 | | | [CVE-2016-7152](https://nvd.nist.gov/vuln/detail/CVE-2016-7152) | firefox | 5.3 | 127.0 | 127.0.2 | 127.0.2 | | @@ -157,16 +157,16 @@ Consider [whitelisting](../../manual_analysis.csv) possible false positives base | [CVE-2023-5752](https://nvd.nist.gov/vuln/detail/CVE-2023-5752) | pip | 3.3 | 20.3.4-source | 24.0 | 24.1.1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/276928)]* | | [CVE-2023-4016](https://nvd.nist.gov/vuln/detail/CVE-2023-4016) | procps | 3.3 | 3.3.17-binlore | | | See: [link](https://gitlab.com/procps-ng/procps/-/issues/297). Notice: repology package name is procps-ng: [link](https://repology.org/project/procps-ng/versions). *[[PR](https://github.com/NixOS/nixpkgs/pull/256065), [PR](https://github.com/NixOS/nixpkgs/pull/256150), [PR](https://github.com/NixOS/nixpkgs/pull/264266)]* | | [GHSA-fwr7-v2mv-hh25](https://osv.dev/GHSA-fwr7-v2mv-hh25) | async | | 2.2.5 | 2.2.5 | 2.2.5 | | -| [CVE-2024-5642](https://nvd.nist.gov/vuln/detail/CVE-2024-5642) | python | | 2.7.18.8 | 3.13.0b2 | 3.12.4 | | +| [CVE-2024-5642](https://nvd.nist.gov/vuln/detail/CVE-2024-5642) | python | | 2.7.18.8 | 3.13.0b3 | 3.12.4 | | | [CVE-2024-5535](https://nvd.nist.gov/vuln/detail/CVE-2024-5535) | openssl | | 3.0.13 | 3.2.0 | 3.2.0 | | | [CVE-2024-4603](https://nvd.nist.gov/vuln/detail/CVE-2024-4603) | openssl | | 3.0.13 | 3.2.0 | 3.2.0 | *[[PR](https://github.com/NixOS/nixpkgs/pull/317238), [PR](https://github.com/NixOS/nixpkgs/pull/318322)]* | -| [CVE-2024-4032](https://nvd.nist.gov/vuln/detail/CVE-2024-4032) | python | | 2.7.18.8 | 3.13.0b2 | 3.12.4 | | -| [CVE-2024-4030](https://nvd.nist.gov/vuln/detail/CVE-2024-4030) | python | | 2.7.18.8 | 3.13.0b2 | 3.12.4 | | +| [CVE-2024-4032](https://nvd.nist.gov/vuln/detail/CVE-2024-4032) | python | | 2.7.18.8 | 3.13.0b3 | 3.12.4 | | +| [CVE-2024-4030](https://nvd.nist.gov/vuln/detail/CVE-2024-4030) | python | | 2.7.18.8 | 3.13.0b3 | 3.12.4 | | | [CVE-2024-2511](https://nvd.nist.gov/vuln/detail/CVE-2024-2511) | openssl | | 3.0.13 | 3.2.0 | 3.2.0 | *[[PR](https://github.com/NixOS/nixpkgs/pull/317238), [PR](https://github.com/NixOS/nixpkgs/pull/318322)]* | | [OSV-2024-517](https://osv.dev/OSV-2024-517) | libaom | | 3.9.0 | | | | | [OSV-2024-460](https://osv.dev/OSV-2024-460) | glslang | | 14.2.0 | 14.2.0 | 14.3.0 | | | [OSV-2024-440](https://osv.dev/OSV-2024-440) | jq | | 1.7.1 | 1.7.1 | 1.7.1 | | -| [CVE-2024-0397](https://nvd.nist.gov/vuln/detail/CVE-2024-0397) | python | | 2.7.18.8 | 3.13.0b2 | 3.12.4 | | +| [CVE-2024-0397](https://nvd.nist.gov/vuln/detail/CVE-2024-0397) | python | | 2.7.18.8 | 3.13.0b3 | 3.12.4 | | | [OSV-2024-396](https://osv.dev/OSV-2024-396) | jq | | 1.7.1 | 1.7.1 | 1.7.1 | | | [OSV-2024-395](https://osv.dev/OSV-2024-395) | libpcap | | 1.10.4 | 1.10.4 | 1.10.4 | | | [OSV-2024-330](https://osv.dev/OSV-2024-330) | jq | | 1.7.1 | 1.7.1 | 1.7.1 | | @@ -205,7 +205,7 @@ Consider [whitelisting](../../manual_analysis.csv) possible false positives base | [OSV-2021-508](https://osv.dev/OSV-2021-508) | libsass | | 3.6.6 | 3.6.6 | 3.6.6 | Unclear if this is still valid. | | [OSV-2020-1420](https://osv.dev/OSV-2020-1420) | libsass | | 3.6.6 | 3.6.6 | 3.6.6 | | | [OSV-2020-862](https://osv.dev/OSV-2020-862) | libsass | | 3.6.6 | 3.6.6 | 3.6.6 | | -| [CVE-2015-5652](https://nvd.nist.gov/vuln/detail/CVE-2015-5652) | python | | 2.7.18.8 | 3.13.0b2 | 3.12.4 | | +| [CVE-2015-5652](https://nvd.nist.gov/vuln/detail/CVE-2015-5652) | python | | 2.7.18.8 | 3.13.0b3 | 3.12.4 | | | [CVE-2014-6492](https://nvd.nist.gov/vuln/detail/CVE-2014-6492) | firefox | | 127.0 | 127.0.2 | 127.0.2 | | | [CVE-2012-4930](https://nvd.nist.gov/vuln/detail/CVE-2012-4930) | firefox | | 127.0 | 127.0.2 | 127.0.2 | | | [CVE-2012-4929](https://nvd.nist.gov/vuln/detail/CVE-2012-4929) | firefox | | 127.0 | 127.0.2 | 127.0.2 | | @@ -218,7 +218,7 @@ Consider [whitelisting](../../manual_analysis.csv) possible false positives base | [CVE-2009-2409](https://nvd.nist.gov/vuln/detail/CVE-2009-2409) | firefox | | 127.0 | 127.0.2 | 127.0.2 | | | [CVE-2009-1597](https://nvd.nist.gov/vuln/detail/CVE-2009-1597) | firefox | | 127.0 | 127.0.2 | 127.0.2 | | | [CVE-2007-6715](https://nvd.nist.gov/vuln/detail/CVE-2007-6715) | firefox | | 127.0 | 127.0.2 | 127.0.2 | | -| [CVE-2007-4559](https://nvd.nist.gov/vuln/detail/CVE-2007-4559) | python | | 2.7.18.8 | 3.13.0b2 | 3.12.4 | | +| [CVE-2007-4559](https://nvd.nist.gov/vuln/detail/CVE-2007-4559) | python | | 2.7.18.8 | 3.13.0b3 | 3.12.4 | | | [CVE-2007-4013](https://nvd.nist.gov/vuln/detail/CVE-2007-4013) | firefox | | 127.0 | 127.0.2 | 127.0.2 | | | [CVE-2007-3827](https://nvd.nist.gov/vuln/detail/CVE-2007-3827) | firefox | | 127.0 | 127.0.2 | 127.0.2 | | | [CVE-2007-3670](https://nvd.nist.gov/vuln/detail/CVE-2007-3670) | firefox | | 127.0 | 127.0.2 | 127.0.2 | |