From 93a0ab9b705d1f777eb4faf4ab551801dfff2c66 Mon Sep 17 00:00:00 2001 From: henrirosten Date: Mon, 19 Feb 2024 04:12:07 +0000 Subject: [PATCH] Automatic vulnerability report update --- reports/ghaf-23.09/data.csv | 6 +- ...ges.x86_64-linux.generic-x86_64-release.md | 4 +- reports/ghaf-23.12/data.csv | 182 +++++++-------- ...ges.x86_64-linux.generic-x86_64-release.md | 12 +- reports/main/data.csv | 208 ++++++++---------- ...cv64-linux.microchip-icicle-kit-release.md | 11 +- ...ges.x86_64-linux.generic-x86_64-release.md | 12 +- 7 files changed, 206 insertions(+), 229 deletions(-) diff --git a/reports/ghaf-23.09/data.csv b/reports/ghaf-23.09/data.csv index 8f8bfa7..41d7e3e 100644 --- a/reports/ghaf-23.09/data.csv +++ b/reports/ghaf-23.09/data.csv @@ -265,11 +265,11 @@ https://github.com/NixOS/nixpkgs/pull/284984" https://github.com/NixOS/nixpkgs/pull/265619" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.09","current","CVE-2023-5344","https://nvd.nist.gov/vuln/detail/CVE-2023-5344","vim","7.5","9.0.1441","9.1.0004","9.1.0113","vim","2023A0000005344","False","","fix_update_to_version_nixpkgs","https://github.com/NixOS/nixpkgs/pull/276595 https://github.com/NixOS/nixpkgs/pull/284984" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.09","current","CVE-2023-5217","https://nvd.nist.gov/vuln/detail/CVE-2023-5217","libvpx","8.8","1.13.0","1.14.0","1.14.0","libvpx","2023A0000005217","False","","err_not_vulnerable_based_on_repology","https://github.com/NixOS/nixpkgs/pull/257886 -https://github.com/NixOS/nixpkgs/pull/259881 +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.09","current","CVE-2023-5217","https://nvd.nist.gov/vuln/detail/CVE-2023-5217","libvpx","8.8","1.13.0","1.14.0","1.14.0","libvpx","2023A0000005217","False","","err_not_vulnerable_based_on_repology","https://github.com/NixOS/nixpkgs/pull/259881 https://github.com/NixOS/nixpkgs/pull/260189 https://github.com/NixOS/nixpkgs/pull/261404 -https://github.com/NixOS/nixpkgs/pull/262808" +https://github.com/NixOS/nixpkgs/pull/262808 +https://github.com/NixOS/nixpkgs/pull/268612" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.09","current","CVE-2023-5156","https://nvd.nist.gov/vuln/detail/CVE-2023-5156","glibc","7.5","2.37-8","2.38-44","2.39","glibc","2023A0000005156","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/287594" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.09","current","CVE-2023-5088","https://nvd.nist.gov/vuln/detail/CVE-2023-5088","qemu","7.0","8.0.4","8.2.1","8.2.1","qemu","2023A0000005088","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.09","current","CVE-2023-4863","https://nvd.nist.gov/vuln/detail/CVE-2023-4863","libwebp","8.8","1.3.1","1.3.2","1.3.2","libwebp","2023A0000004863","False","","fix_update_to_version_nixpkgs","https://github.com/NixOS/nixpkgs/pull/255786 diff --git a/reports/ghaf-23.09/packages.x86_64-linux.generic-x86_64-release.md b/reports/ghaf-23.09/packages.x86_64-linux.generic-x86_64-release.md index a192b98..92cba74 100644 --- a/reports/ghaf-23.09/packages.x86_64-linux.generic-x86_64-release.md +++ b/reports/ghaf-23.09/packages.x86_64-linux.generic-x86_64-release.md @@ -31,7 +31,7 @@ Update the target Ghaf [flake.lock](https://github.com/tiiuae/ghaf/blob/main/fla | vuln_id | package | severity | version_local | nix_unstable | upstream | comment | |-------------------------------------------------------------------|-----------|------------|------------------|----------------|------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | [CVE-2023-40359](https://nvd.nist.gov/vuln/detail/CVE-2023-40359) | xterm | 9.8 | 379 | 388 | 389 | Backport to 23.05 ongoing in PR: [link](https://github.com/NixOS/nixpkgs/pull/254541). *[[PR](https://github.com/NixOS/nixpkgs/pull/244141), [PR](https://github.com/NixOS/nixpkgs/pull/254541), [PR](https://github.com/NixOS/nixpkgs/pull/258619), [PR](https://github.com/NixOS/nixpkgs/pull/278267)]* | -| [CVE-2023-5217](https://nvd.nist.gov/vuln/detail/CVE-2023-5217) | libvpx | 8.8 | 1.13.0 | 1.14.0 | 1.14.0 | *[[PR](https://github.com/NixOS/nixpkgs/pull/257886), [PR](https://github.com/NixOS/nixpkgs/pull/259881), [PR](https://github.com/NixOS/nixpkgs/pull/260189), [PR](https://github.com/NixOS/nixpkgs/pull/261404), [PR](https://github.com/NixOS/nixpkgs/pull/262808)]* | +| [CVE-2023-5217](https://nvd.nist.gov/vuln/detail/CVE-2023-5217) | libvpx | 8.8 | 1.13.0 | 1.14.0 | 1.14.0 | *[[PR](https://github.com/NixOS/nixpkgs/pull/259881), [PR](https://github.com/NixOS/nixpkgs/pull/260189), [PR](https://github.com/NixOS/nixpkgs/pull/261404), [PR](https://github.com/NixOS/nixpkgs/pull/262808), [PR](https://github.com/NixOS/nixpkgs/pull/268612)]* | | [CVE-2023-4863](https://nvd.nist.gov/vuln/detail/CVE-2023-4863) | libwebp | 8.8 | 1.3.1 | 1.3.2 | 1.3.2 | *[[PR](https://github.com/NixOS/nixpkgs/pull/255786), [PR](https://github.com/NixOS/nixpkgs/pull/255959), [PR](https://github.com/NixOS/nixpkgs/pull/258217), [PR](https://github.com/NixOS/nixpkgs/pull/258430), [PR](https://github.com/NixOS/nixpkgs/pull/261876)]* | | [CVE-2023-43887](https://nvd.nist.gov/vuln/detail/CVE-2023-43887) | libde265 | 8.1 | 1.0.12 | 1.0.15 | 1.0.15 | *[[PR](https://github.com/NixOS/nixpkgs/pull/268884), [PR](https://github.com/NixOS/nixpkgs/pull/271642), [PR](https://github.com/NixOS/nixpkgs/pull/271643), [PR](https://github.com/NixOS/nixpkgs/pull/275720), [PR](https://github.com/NixOS/nixpkgs/pull/276799)]* | | [CVE-2023-43787](https://nvd.nist.gov/vuln/detail/CVE-2023-43787) | libX11 | 7.8 | 1.8.6 | 1.8.7 | 1.8.7 | *[[PR](https://github.com/NixOS/nixpkgs/pull/258841), [PR](https://github.com/NixOS/nixpkgs/pull/258996)]* | @@ -116,7 +116,7 @@ Consider [whitelisting](../../manual_analysis.csv) possible false positives base | [CVE-2023-45234](https://nvd.nist.gov/vuln/detail/CVE-2023-45234) | edk2 | 8.8 | 202211 | 202311 | 202311 | *[[PR](https://github.com/NixOS/nixpkgs/pull/281405)]* | | [CVE-2023-45230](https://nvd.nist.gov/vuln/detail/CVE-2023-45230) | edk2 | 8.8 | 202211 | 202311 | 202311 | *[[PR](https://github.com/NixOS/nixpkgs/pull/281405)]* | | [CVE-2023-7216](https://nvd.nist.gov/vuln/detail/CVE-2023-7216) | cpio | 8.8 | 2.14 | 2.15 | 2.15 | | -| [CVE-2023-5217](https://nvd.nist.gov/vuln/detail/CVE-2023-5217) | libvpx | 8.8 | 1.13.0 | 1.14.0 | 1.14.0 | *[[PR](https://github.com/NixOS/nixpkgs/pull/257886), [PR](https://github.com/NixOS/nixpkgs/pull/259881), [PR](https://github.com/NixOS/nixpkgs/pull/260189), [PR](https://github.com/NixOS/nixpkgs/pull/261404), [PR](https://github.com/NixOS/nixpkgs/pull/262808)]* | +| [CVE-2023-5217](https://nvd.nist.gov/vuln/detail/CVE-2023-5217) | libvpx | 8.8 | 1.13.0 | 1.14.0 | 1.14.0 | *[[PR](https://github.com/NixOS/nixpkgs/pull/259881), [PR](https://github.com/NixOS/nixpkgs/pull/260189), [PR](https://github.com/NixOS/nixpkgs/pull/261404), [PR](https://github.com/NixOS/nixpkgs/pull/262808), [PR](https://github.com/NixOS/nixpkgs/pull/268612)]* | | [CVE-2023-4863](https://nvd.nist.gov/vuln/detail/CVE-2023-4863) | libwebp | 8.8 | 1.3.1 | 1.3.2 | 1.3.2 | *[[PR](https://github.com/NixOS/nixpkgs/pull/255786), [PR](https://github.com/NixOS/nixpkgs/pull/255959), [PR](https://github.com/NixOS/nixpkgs/pull/258217), [PR](https://github.com/NixOS/nixpkgs/pull/258430), [PR](https://github.com/NixOS/nixpkgs/pull/261876)]* | | [CVE-2023-2680](https://nvd.nist.gov/vuln/detail/CVE-2023-2680) | qemu | 8.2 | 8.0.4 | 8.2.1 | 8.2.1 | | | [CVE-2023-43887](https://nvd.nist.gov/vuln/detail/CVE-2023-43887) | libde265 | 8.1 | 1.0.12 | 1.0.15 | 1.0.15 | *[[PR](https://github.com/NixOS/nixpkgs/pull/268884), [PR](https://github.com/NixOS/nixpkgs/pull/271642), [PR](https://github.com/NixOS/nixpkgs/pull/271643), [PR](https://github.com/NixOS/nixpkgs/pull/275720), [PR](https://github.com/NixOS/nixpkgs/pull/276799)]* | diff --git a/reports/ghaf-23.12/data.csv b/reports/ghaf-23.12/data.csv index c91f4b1..2e4506e 100644 --- a/reports/ghaf-23.12/data.csv +++ b/reports/ghaf-23.12/data.csv @@ -575,8 +575,7 @@ https://github.com/NixOS/nixpkgs/pull/82958" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","current","CVE-2003-1492","https://nvd.nist.gov/vuln/detail/CVE-2003-1492","firefox","","120.0.1","122.0.1","122.0.1","firefox","2003A0000001492","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","GHSA-w596-4wvx-j9j6","https://osv.dev/GHSA-w596-4wvx-j9j6","py","","1.11.0","1.11.0","1.11.0","python:py","2024A1708041600","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","GHSA-fwr7-v2mv-hh25","https://osv.dev/GHSA-fwr7-v2mv-hh25","async","","2.2.4","2.2.5","2.2.5","haskell:async","2024A1707782400","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2024-25062","https://nvd.nist.gov/vuln/detail/CVE-2024-25062","libxml2","7.5","2.11.5","2.12.4","2.12.5","libxml2","2024A0000025062","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/286300" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2024-24806","https://nvd.nist.gov/vuln/detail/CVE-2024-24806","libuv","9.8","1.46.0","1.47.0","1.48.0","libuv","2024A0000024806","False","","fix_not_available","https://github.com/NixOS/nixpkgs/pull/287226" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2024-24806","https://nvd.nist.gov/vuln/detail/CVE-2024-24806","libuv","9.8","1.48.0","1.47.0","1.48.0","libuv","2024A0000024806","False","","fix_not_available","https://github.com/NixOS/nixpkgs/pull/287226" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2024-24577","https://nvd.nist.gov/vuln/detail/CVE-2024-24577","libgit2","9.8","1.7.1","1.7.1","1.7.2","libgit2","2024A0000024577","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/286911 https://github.com/NixOS/nixpkgs/pull/287829 https://github.com/NixOS/nixpkgs/pull/287841" @@ -592,11 +591,7 @@ https://github.com/NixOS/nixpkgs/pull/287841" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2024-22667","https://nvd.nist.gov/vuln/detail/CVE-2024-22667","vim","7.8","9.0.2116","9.1.0004","9.1.0113","vim","2024A0000022667","False","","fix_update_to_version_nixpkgs","https://github.com/NixOS/nixpkgs/pull/276595 https://github.com/NixOS/nixpkgs/pull/284984" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2024-22365","https://nvd.nist.gov/vuln/detail/CVE-2024-22365","linux-pam","5.5","1.5.2","","","","2024A0000022365","False","","err_missing_repology_version","https://github.com/NixOS/nixpkgs/pull/282136" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2024-0985","https://nvd.nist.gov/vuln/detail/CVE-2024-0985","postgresql","8.0","15.5","16.1","16.2","postgresql","2024A0000000985","False","","fix_update_to_version_nixpkgs","https://github.com/NixOS/nixpkgs/pull/266642 -https://github.com/NixOS/nixpkgs/pull/287353" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2024-0953","https://nvd.nist.gov/vuln/detail/CVE-2024-0953","firefox","6.1","122.0.1","122.0.1","122.0.1","firefox","2024A0000000953","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2024-0727","https://nvd.nist.gov/vuln/detail/CVE-2024-0727","openssl","5.5","3.0.12","3.2.0","3.2.0","ruby:openssl","2024A0000000727","False","","err_not_vulnerable_based_on_repology","https://github.com/NixOS/nixpkgs/pull/285019 -https://github.com/NixOS/nixpkgs/pull/285027" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2024-0684","https://nvd.nist.gov/vuln/detail/CVE-2024-0684","coreutils","5.5","9.3","9.4","9.4","coreutils","2024A0000000684","False","","fix_not_available","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","GHSA-6898-wx94-8jq8","https://osv.dev/GHSA-6898-wx94-8jq8","libnotify","","0.8.3","","","","2023A1694131200","True","Incorrect package: Issue refers node-libnotify https://github.com/mytrile/node-libnotify, whereas nixpkgs refers gnome-libnotify https://gitlab.gnome.org/GNOME/libnotify.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","GHSA-gmwp-3pwc-3j3g","https://osv.dev/GHSA-gmwp-3pwc-3j3g","mockery","","0.3.5","0.3.5","0.3.5","haskell:mockery","2023A1690502400","False","","err_not_vulnerable_based_on_repology","" @@ -623,9 +618,6 @@ https://github.com/NixOS/nixpkgs/pull/288071" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2023-45853","https://nvd.nist.gov/vuln/detail/CVE-2023-45853","zlib","9.8","1.3","1.3.1","1.3.1","zlib","2023A0000045853","False","","fix_update_to_version_nixpkgs","https://github.com/NixOS/nixpkgs/pull/262722 https://github.com/NixOS/nixpkgs/pull/263083 https://github.com/NixOS/nixpkgs/pull/283179" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2023-45322","https://nvd.nist.gov/vuln/detail/CVE-2023-45322","libxml2","6.5","2.11.5","2.12.4","2.12.5","libxml2","2023A0000045322","False","","fix_update_to_version_nixpkgs","https://github.com/NixOS/nixpkgs/pull/282347 -https://github.com/NixOS/nixpkgs/pull/283888 -https://github.com/NixOS/nixpkgs/pull/286300" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2023-45237","https://nvd.nist.gov/vuln/detail/CVE-2023-45237","edk2","7.5","202311","202311","202311","edk2","2023A0000045237","False","","fix_not_available","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2023-45236","https://nvd.nist.gov/vuln/detail/CVE-2023-45236","edk2","7.5","202311","202311","202311","edk2","2023A0000045236","False","","fix_not_available","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2023-45235","https://nvd.nist.gov/vuln/detail/CVE-2023-45235","edk2","8.8","202311","202311","202311","edk2","2023A0000045235","False","","fix_not_available","https://github.com/NixOS/nixpkgs/pull/281405" @@ -682,44 +674,40 @@ https://github.com/NixOS/nixpkgs/pull/232535" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2023-25584","https://nvd.nist.gov/vuln/detail/CVE-2023-25584","binutils","7.1","2.40","2.40","2.42","binutils","2023A0000025584","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2023-7216","https://nvd.nist.gov/vuln/detail/CVE-2023-7216","cpio","8.8","2.14","2.15","2.15","cpio","2023A0000007216","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2023-6992","https://nvd.nist.gov/vuln/detail/CVE-2023-6992","zlib","5.5","1.3","1.3.1","1.3.1","zlib","2023A0000006992","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2023-6780","https://nvd.nist.gov/vuln/detail/CVE-2023-6780","glibc","5.3","2.38-27-source-unsecvars","2.38-44","2.39","glibc","2023A0000006780","False","","fix_not_available","https://github.com/NixOS/nixpkgs/pull/285050 +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2023-6780","https://nvd.nist.gov/vuln/detail/CVE-2023-6780","glibc","5.3","2.38-44-source-unsecvars","2.38-44","2.39","glibc","2023A0000006780","False","","fix_not_available","https://github.com/NixOS/nixpkgs/pull/285050 https://github.com/NixOS/nixpkgs/pull/285329" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2023-6780","https://nvd.nist.gov/vuln/detail/CVE-2023-6780","glibc","5.3","2.38-27","2.38-44","2.39","glibc","2023A0000006780","False","","fix_not_available","https://github.com/NixOS/nixpkgs/pull/285050 +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2023-6780","https://nvd.nist.gov/vuln/detail/CVE-2023-6780","glibc","5.3","2.38-44","2.38-44","2.39","glibc","2023A0000006780","False","","fix_not_available","https://github.com/NixOS/nixpkgs/pull/285050 https://github.com/NixOS/nixpkgs/pull/285329" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2023-6779","https://nvd.nist.gov/vuln/detail/CVE-2023-6779","glibc","7.5","2.38-27-source-unsecvars","2.38-44","2.39","glibc","2023A0000006779","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/285050 +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2023-6779","https://nvd.nist.gov/vuln/detail/CVE-2023-6779","glibc","7.5","2.38-44-source-unsecvars","2.38-44","2.39","glibc","2023A0000006779","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/285050 https://github.com/NixOS/nixpkgs/pull/285329 https://github.com/NixOS/nixpkgs/pull/287594" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2023-6779","https://nvd.nist.gov/vuln/detail/CVE-2023-6779","glibc","7.5","2.38-27","2.38-44","2.39","glibc","2023A0000006779","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/285050 +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2023-6779","https://nvd.nist.gov/vuln/detail/CVE-2023-6779","glibc","7.5","2.38-44","2.38-44","2.39","glibc","2023A0000006779","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/285050 https://github.com/NixOS/nixpkgs/pull/285329 https://github.com/NixOS/nixpkgs/pull/287594" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2023-6693","https://nvd.nist.gov/vuln/detail/CVE-2023-6693","qemu","5.3","8.1.5","8.2.1","8.2.1","qemu","2023A0000006693","False","","err_not_vulnerable_based_on_repology","https://github.com/NixOS/nixpkgs/pull/284249 https://github.com/NixOS/nixpkgs/pull/284489" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2023-6683","https://nvd.nist.gov/vuln/detail/CVE-2023-6683","qemu","6.5","8.1.5","8.2.1","8.2.1","qemu","2023A0000006683","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2023-6277","https://nvd.nist.gov/vuln/detail/CVE-2023-6277","libtiff","6.5","4.6.0","4.6.0","4.6.0","tiff","2023A0000006277","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2023-6246","https://nvd.nist.gov/vuln/detail/CVE-2023-6246","glibc","7.8","2.38-27-source-unsecvars","2.38-44","2.39","glibc","2023A0000006246","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/285050 +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2023-6246","https://nvd.nist.gov/vuln/detail/CVE-2023-6246","glibc","7.8","2.38-44-source-unsecvars","2.38-44","2.39","glibc","2023A0000006246","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/285050 https://github.com/NixOS/nixpkgs/pull/285329 https://github.com/NixOS/nixpkgs/pull/285587 https://github.com/NixOS/nixpkgs/pull/285588 https://github.com/NixOS/nixpkgs/pull/287594" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2023-6246","https://nvd.nist.gov/vuln/detail/CVE-2023-6246","glibc","7.8","2.38-27","2.38-44","2.39","glibc","2023A0000006246","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/285050 +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2023-6246","https://nvd.nist.gov/vuln/detail/CVE-2023-6246","glibc","7.8","2.38-44","2.38-44","2.39","glibc","2023A0000006246","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/285050 https://github.com/NixOS/nixpkgs/pull/285329 https://github.com/NixOS/nixpkgs/pull/285587 https://github.com/NixOS/nixpkgs/pull/285588 https://github.com/NixOS/nixpkgs/pull/287594" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2023-6228","https://nvd.nist.gov/vuln/detail/CVE-2023-6228","libtiff","5.5","4.6.0","4.6.0","4.6.0","tiff","2023A0000006228","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2023-6129","https://nvd.nist.gov/vuln/detail/CVE-2023-6129","openssl","6.5","3.0.12","3.2.0","3.2.0","ruby:openssl","2023A0000006129","False","","err_not_vulnerable_based_on_repology","https://github.com/NixOS/nixpkgs/pull/285019 -https://github.com/NixOS/nixpkgs/pull/285027" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2023-5841","https://nvd.nist.gov/vuln/detail/CVE-2023-5841","openexr","9.1","3.2.1","3.2.1","3.2.126","openexr","2023A0000005841","False","","fix_update_to_version_upstream","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2023-5841","https://nvd.nist.gov/vuln/detail/CVE-2023-5841","openexr","9.1","2.5.8","3.2.1","3.2.126","openexr","2023A0000005841","False","","fix_update_to_version_upstream","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2023-5678","https://nvd.nist.gov/vuln/detail/CVE-2023-5678","openssl","5.3","3.0.12","3.2.0","3.2.0","ruby:openssl","2023A0000005678","False","","err_not_vulnerable_based_on_repology","https://github.com/NixOS/nixpkgs/pull/285019 -https://github.com/NixOS/nixpkgs/pull/285027" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2023-5341","https://nvd.nist.gov/vuln/detail/CVE-2023-5341","imagemagick","5.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2023A0000005341","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2023-5156","https://nvd.nist.gov/vuln/detail/CVE-2023-5156","glibc","7.5","2.38-27-source-unsecvars","2.38-44","2.39","glibc","2023A0000005156","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/287594" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2023-5156","https://nvd.nist.gov/vuln/detail/CVE-2023-5156","glibc","7.5","2.38-27","2.38-44","2.39","glibc","2023A0000005156","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/287594" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2023-5341","https://nvd.nist.gov/vuln/detail/CVE-2023-5341","imagemagick","5.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2023A0000005341","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2023-5156","https://nvd.nist.gov/vuln/detail/CVE-2023-5156","glibc","7.5","2.38-44-source-unsecvars","2.38-44","2.39","glibc","2023A0000005156","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/287594" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2023-5156","https://nvd.nist.gov/vuln/detail/CVE-2023-5156","glibc","7.5","2.38-44","2.38-44","2.39","glibc","2023A0000005156","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/287594" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2023-5088","https://nvd.nist.gov/vuln/detail/CVE-2023-5088","qemu","7","8.1.5","8.2.1","8.2.1","qemu","2023A0000005088","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2023-4527","https://nvd.nist.gov/vuln/detail/CVE-2023-4527","glibc","6.5","2.38-27-source-unsecvars","2.38-44","2.39","glibc","2023A0000004527","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/256887 +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2023-4527","https://nvd.nist.gov/vuln/detail/CVE-2023-4527","glibc","6.5","2.38-44-source-unsecvars","2.38-44","2.39","glibc","2023A0000004527","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/256887 https://github.com/NixOS/nixpkgs/pull/287594" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2023-4527","https://nvd.nist.gov/vuln/detail/CVE-2023-4527","glibc","6.5","2.38-27","2.38-44","2.39","glibc","2023A0000004527","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/256887 +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2023-4527","https://nvd.nist.gov/vuln/detail/CVE-2023-4527","glibc","6.5","2.38-44","2.38-44","2.39","glibc","2023A0000004527","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/256887 https://github.com/NixOS/nixpkgs/pull/287594" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2023-4039","https://nvd.nist.gov/vuln/detail/CVE-2023-4039","gcc","4.8","12.3.0","13.2.0","13.2.0","gcc","2023A0000004039","False","","fix_not_available","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2023-3603","https://nvd.nist.gov/vuln/detail/CVE-2023-3603","libssh","6.5","0.10.6","","","","2023A0000003603","True","Based on https://security-tracker.debian.org/tracker/CVE-2023-3603 and https://bugzilla.redhat.com/show_bug.cgi?id=2221791, vulnerable code is not present in 0.10.5 or any currently released version.","err_missing_repology_version","" @@ -778,7 +766,7 @@ https://github.com/NixOS/nixpkgs/pull/170659" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","MAL-2022-4301","https://osv.dev/MAL-2022-4301","libidn2","","2.3.4","","","","2022A0000004301","True","Incorrect package: Issue refers npm libidn2, whereas, nixpkgs refers libidn2 https://gitlab.com/libidn/libidn2.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2022-4066","https://nvd.nist.gov/vuln/detail/CVE-2022-4066","firefox","8.2","122.0.1","122.0.1","122.0.1","firefox","2022A0000004066","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2022-3341","https://nvd.nist.gov/vuln/detail/CVE-2022-3341","ffmpeg","5.3","4.4.4","","","","2022A0000003341","True","Scanners get confused by LTS release versions (non-linear version numbers). Upstream fix patch for 4.4.x is merged in 4.4.4 https://github.com/FFmpeg/FFmpeg/commit/c513bd48039a718dabf6d7a829efb6732693c04b.","err_missing_repology_version","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2022-3219","https://nvd.nist.gov/vuln/detail/CVE-2022-3219","gnupg","3.3","2.4.1","","","","2022A0000003219","True","Fix patch is not accepted upstream: https://dev.gnupg.org/D556.","err_missing_repology_version","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2022-3219","https://nvd.nist.gov/vuln/detail/CVE-2022-3219","gnupg","3.3","2.4.4","","","","2022A0000003219","True","Fix patch is not accepted upstream: https://dev.gnupg.org/D556.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2022-3109","https://nvd.nist.gov/vuln/detail/CVE-2022-3109","ffmpeg","7.5","4.4.4","","","","2022A0000003109","True","Scanners get confused by LTS release versions (non-linear version numbers). Upstream fix patch for 4.4.x is merged in 4.4.4 https://github.com/FFmpeg/FFmpeg/commit/4d82b7bac42c9d35d4f9f145a85e6cbc1fe914f2.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","OSV-2022-908","https://osv.dev/OSV-2022-908","bluez","","5.70","5.72","5.72","bluez","2022A0000000908","False","Unclear if this is still valid.","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","OSV-2022-896","https://osv.dev/OSV-2022-896","libsass","","3.6.5","3.6.5","3.6.6","libsass","2022A0000000896","False","Unclear if this is still valid.","err_not_vulnerable_based_on_repology","" @@ -838,7 +826,7 @@ https://github.com/NixOS/nixpkgs/pull/170659" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","OSV-2021-820","https://osv.dev/OSV-2021-820","qemu","","8.1.5","","","","2021A0000000820","True","Fixed based on https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=34831#c2.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","OSV-2021-802","https://osv.dev/OSV-2021-802","espeak-ng","","1.51.1","1.51.1","1.51.1","espeak-ng","2021A0000000802","False","Unclear if this is still valid.","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","OSV-2021-787","https://osv.dev/OSV-2021-787","espeak-ng","","1.51.1","1.51.1","1.51.1","espeak-ng","2021A0000000787","False","Unclear if this is still valid.","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","OSV-2021-777","https://osv.dev/OSV-2021-777","libxml2","","2.11.5","","","","2021A0000000777","True","Fixed by https://gitlab.gnome.org/GNOME/libxml2/-/commit/8f5ccada05ddd4a1ff8e399ad39fc7cd4bd33325, which went to 2.9.13. Therefore, this issue is fixed in 2.10.4.","err_missing_repology_version","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","OSV-2021-777","https://osv.dev/OSV-2021-777","libxml2","","2.11.7","","","","2021A0000000777","True","Fixed by https://gitlab.gnome.org/GNOME/libxml2/-/commit/8f5ccada05ddd4a1ff8e399ad39fc7cd4bd33325, which went to 2.9.13. Therefore, this issue is fixed in 2.10.4.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","OSV-2021-765","https://osv.dev/OSV-2021-765","espeak-ng","","1.51.1","1.51.1","1.51.1","espeak-ng","2021A0000000765","False","Unclear if this is still valid.","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","OSV-2021-594","https://osv.dev/OSV-2021-594","libheif","","1.15.2","1.15.2","1.17.6","libheif","2021A0000000594","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","OSV-2021-508","https://osv.dev/OSV-2021-508","libsass","","3.6.5","3.6.5","3.6.6","libsass","2021A0000000508","False","Unclear if this is still valid.","err_not_vulnerable_based_on_repology","" @@ -868,7 +856,7 @@ https://github.com/NixOS/nixpkgs/pull/82958" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2019-14860","https://nvd.nist.gov/vuln/detail/CVE-2019-14860","fuse","6.5","2.9.9-closefrom-glibc-2-34.patch?id=8a970396fca7aca2d5a761b8e7a8242f1eef14c9","","","","2019A0000014860","True","Incorrect package: Issue concerns redhat fuse (https://developers.redhat.com/products/fuse/overview) not libfuse https://github.com/libfuse/libfuse/ which is what 'fuse' package in nixpkgs refers. Issue gets included to the report due to vulnix's design decision to avoid false negatives with the cost of false positives.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2019-14860","https://nvd.nist.gov/vuln/detail/CVE-2019-14860","fuse","6.5","2.9.9","","","","2019A0000014860","True","Incorrect package: Issue concerns redhat fuse (https://developers.redhat.com/products/fuse/overview) not libfuse https://github.com/libfuse/libfuse/ which is what 'fuse' package in nixpkgs refers. Issue gets included to the report due to vulnix's design decision to avoid false negatives with the cost of false positives.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2019-14587","https://nvd.nist.gov/vuln/detail/CVE-2019-14587","edk2","6.5","202311","","","","2019A0000014587","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2019-14586","https://nvd.nist.gov/vuln/detail/CVE-2019-14586","edk2","8.0","202311","","","","2019A0000014586","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2019-14586","https://nvd.nist.gov/vuln/detail/CVE-2019-14586","edk2","8","202311","","","","2019A0000014586","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2019-14575","https://nvd.nist.gov/vuln/detail/CVE-2019-14575","edk2","7.8","202311","","","","2019A0000014575","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2019-14563","https://nvd.nist.gov/vuln/detail/CVE-2019-14563","edk2","7.8","202311","","","","2019A0000014563","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2019-14562","https://nvd.nist.gov/vuln/detail/CVE-2019-14562","edk2","5.5","202311","","","","2019A0000014562","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" @@ -885,21 +873,21 @@ https://github.com/NixOS/nixpkgs/pull/82958" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2018-8024","https://nvd.nist.gov/vuln/detail/CVE-2018-8024","firefox","5.4","122.0.1","122.0.1","122.0.1","firefox","2018A0000008024","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2018-7263","https://nvd.nist.gov/vuln/detail/CVE-2018-7263","libmad","9.8","0.15.1b","","","","2018A0000007263","True","Based on https://github.com/NixOS/nixpkgs/issues/57154, issue is fixed by https://github.com/NixOS/nixpkgs/commit/92edb0610923fab5a9dcc59b94652f1e8a5ea1ed.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2018-6553","https://nvd.nist.gov/vuln/detail/CVE-2018-6553","cups","8.8","2.4.7","","","","2018A0000006553","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2017-8806","https://nvd.nist.gov/vuln/detail/CVE-2017-8806","postgresql","5.5","15.5","16.1","16.2","postgresql","2017A0000008806","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2017-8806","https://nvd.nist.gov/vuln/detail/CVE-2017-8806","postgresql","5.5","15.6","16.1","16.2","postgresql","2017A0000008806","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2017-5628","https://nvd.nist.gov/vuln/detail/CVE-2017-5628","mujs","7.8","1.3.3","","","","2017A0000005628","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2017-5627","https://nvd.nist.gov/vuln/detail/CVE-2017-5627","mujs","7.8","1.3.3","","","","2017A0000005627","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2017-5511","https://nvd.nist.gov/vuln/detail/CVE-2017-5511","imagemagick","9.8","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2017A0000005511","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2017-5510","https://nvd.nist.gov/vuln/detail/CVE-2017-5510","imagemagick","7.8","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2017A0000005510","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2017-5509","https://nvd.nist.gov/vuln/detail/CVE-2017-5509","imagemagick","7.8","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2017A0000005509","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2017-5506","https://nvd.nist.gov/vuln/detail/CVE-2017-5506","imagemagick","7.8","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2017A0000005506","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2017-5511","https://nvd.nist.gov/vuln/detail/CVE-2017-5511","imagemagick","9.8","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2017A0000005511","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2017-5510","https://nvd.nist.gov/vuln/detail/CVE-2017-5510","imagemagick","7.8","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2017A0000005510","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2017-5509","https://nvd.nist.gov/vuln/detail/CVE-2017-5509","imagemagick","7.8","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2017A0000005509","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2017-5506","https://nvd.nist.gov/vuln/detail/CVE-2017-5506","imagemagick","7.8","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2017A0000005506","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2017-5436","https://nvd.nist.gov/vuln/detail/CVE-2017-5436","graphite2","8.8","1.3.14","","","","2017A0000005436","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-10146","https://nvd.nist.gov/vuln/detail/CVE-2016-10146","imagemagick","7.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000010146","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-10145","https://nvd.nist.gov/vuln/detail/CVE-2016-10145","imagemagick","9.8","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000010145","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-10144","https://nvd.nist.gov/vuln/detail/CVE-2016-10144","imagemagick","9.8","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000010144","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-10146","https://nvd.nist.gov/vuln/detail/CVE-2016-10146","imagemagick","7.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000010146","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-10145","https://nvd.nist.gov/vuln/detail/CVE-2016-10145","imagemagick","9.8","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000010145","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-10144","https://nvd.nist.gov/vuln/detail/CVE-2016-10144","imagemagick","9.8","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000010144","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-10141","https://nvd.nist.gov/vuln/detail/CVE-2016-10141","mujs","9.8","1.3.3","","","","2016A0000010141","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-10133","https://nvd.nist.gov/vuln/detail/CVE-2016-10133","mujs","9.8","1.3.3","","","","2016A0000010133","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-10132","https://nvd.nist.gov/vuln/detail/CVE-2016-10132","mujs","7.5","1.3.3","","","","2016A0000010132","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-10062","https://nvd.nist.gov/vuln/detail/CVE-2016-10062","imagemagick","5.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000010062","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-10062","https://nvd.nist.gov/vuln/detail/CVE-2016-10062","imagemagick","5.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000010062","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-9294","https://nvd.nist.gov/vuln/detail/CVE-2016-9294","mujs","7.5","1.3.3","","","","2016A0000009294","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-9136","https://nvd.nist.gov/vuln/detail/CVE-2016-9136","mujs","7.5","1.3.3","","","","2016A0000009136","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-9109","https://nvd.nist.gov/vuln/detail/CVE-2016-9109","mujs","7.5","1.3.3","","","","2016A0000009109","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" @@ -907,38 +895,38 @@ https://github.com/NixOS/nixpkgs/pull/82958" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-9017","https://nvd.nist.gov/vuln/detail/CVE-2016-9017","mujs","7.5","1.3.3","","","","2016A0000009017","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7564","https://nvd.nist.gov/vuln/detail/CVE-2016-7564","mujs","7.5","1.3.3","","","","2016A0000007564","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7563","https://nvd.nist.gov/vuln/detail/CVE-2016-7563","mujs","7.5","1.3.3","","","","2016A0000007563","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7538","https://nvd.nist.gov/vuln/detail/CVE-2016-7538","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007538","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7537","https://nvd.nist.gov/vuln/detail/CVE-2016-7537","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007537","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7536","https://nvd.nist.gov/vuln/detail/CVE-2016-7536","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007536","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7535","https://nvd.nist.gov/vuln/detail/CVE-2016-7535","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007535","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7534","https://nvd.nist.gov/vuln/detail/CVE-2016-7534","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007534","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7533","https://nvd.nist.gov/vuln/detail/CVE-2016-7533","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007533","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7532","https://nvd.nist.gov/vuln/detail/CVE-2016-7532","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007532","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7531","https://nvd.nist.gov/vuln/detail/CVE-2016-7531","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007531","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7530","https://nvd.nist.gov/vuln/detail/CVE-2016-7530","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007530","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7529","https://nvd.nist.gov/vuln/detail/CVE-2016-7529","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007529","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7528","https://nvd.nist.gov/vuln/detail/CVE-2016-7528","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007528","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7527","https://nvd.nist.gov/vuln/detail/CVE-2016-7527","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007527","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7526","https://nvd.nist.gov/vuln/detail/CVE-2016-7526","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007526","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7525","https://nvd.nist.gov/vuln/detail/CVE-2016-7525","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007525","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7524","https://nvd.nist.gov/vuln/detail/CVE-2016-7524","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007524","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7523","https://nvd.nist.gov/vuln/detail/CVE-2016-7523","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007523","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7522","https://nvd.nist.gov/vuln/detail/CVE-2016-7522","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007522","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7521","https://nvd.nist.gov/vuln/detail/CVE-2016-7521","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007521","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7520","https://nvd.nist.gov/vuln/detail/CVE-2016-7520","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007520","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7519","https://nvd.nist.gov/vuln/detail/CVE-2016-7519","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007519","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7518","https://nvd.nist.gov/vuln/detail/CVE-2016-7518","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007518","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7517","https://nvd.nist.gov/vuln/detail/CVE-2016-7517","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007517","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7516","https://nvd.nist.gov/vuln/detail/CVE-2016-7516","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007516","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7515","https://nvd.nist.gov/vuln/detail/CVE-2016-7515","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007515","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7514","https://nvd.nist.gov/vuln/detail/CVE-2016-7514","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007514","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7513","https://nvd.nist.gov/vuln/detail/CVE-2016-7513","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007513","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7538","https://nvd.nist.gov/vuln/detail/CVE-2016-7538","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007538","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7537","https://nvd.nist.gov/vuln/detail/CVE-2016-7537","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007537","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7536","https://nvd.nist.gov/vuln/detail/CVE-2016-7536","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007536","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7535","https://nvd.nist.gov/vuln/detail/CVE-2016-7535","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007535","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7534","https://nvd.nist.gov/vuln/detail/CVE-2016-7534","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007534","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7533","https://nvd.nist.gov/vuln/detail/CVE-2016-7533","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007533","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7532","https://nvd.nist.gov/vuln/detail/CVE-2016-7532","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007532","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7531","https://nvd.nist.gov/vuln/detail/CVE-2016-7531","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007531","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7530","https://nvd.nist.gov/vuln/detail/CVE-2016-7530","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007530","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7529","https://nvd.nist.gov/vuln/detail/CVE-2016-7529","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007529","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7528","https://nvd.nist.gov/vuln/detail/CVE-2016-7528","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007528","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7527","https://nvd.nist.gov/vuln/detail/CVE-2016-7527","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007527","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7526","https://nvd.nist.gov/vuln/detail/CVE-2016-7526","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007526","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7525","https://nvd.nist.gov/vuln/detail/CVE-2016-7525","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007525","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7524","https://nvd.nist.gov/vuln/detail/CVE-2016-7524","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007524","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7523","https://nvd.nist.gov/vuln/detail/CVE-2016-7523","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007523","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7522","https://nvd.nist.gov/vuln/detail/CVE-2016-7522","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007522","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7521","https://nvd.nist.gov/vuln/detail/CVE-2016-7521","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007521","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7520","https://nvd.nist.gov/vuln/detail/CVE-2016-7520","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007520","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7519","https://nvd.nist.gov/vuln/detail/CVE-2016-7519","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007519","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7518","https://nvd.nist.gov/vuln/detail/CVE-2016-7518","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007518","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7517","https://nvd.nist.gov/vuln/detail/CVE-2016-7517","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007517","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7516","https://nvd.nist.gov/vuln/detail/CVE-2016-7516","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007516","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7515","https://nvd.nist.gov/vuln/detail/CVE-2016-7515","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007515","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7514","https://nvd.nist.gov/vuln/detail/CVE-2016-7514","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007514","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7513","https://nvd.nist.gov/vuln/detail/CVE-2016-7513","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007513","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7506","https://nvd.nist.gov/vuln/detail/CVE-2016-7506","mujs","7.5","1.3.3","","","","2016A0000007506","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7504","https://nvd.nist.gov/vuln/detail/CVE-2016-7504","mujs","9.8","1.3.3","","","","2016A0000007504","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7153","https://nvd.nist.gov/vuln/detail/CVE-2016-7153","firefox","5.3","122.0.1","122.0.1","122.0.1","firefox","2016A0000007153","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-7152","https://nvd.nist.gov/vuln/detail/CVE-2016-7152","firefox","5.3","122.0.1","122.0.1","122.0.1","firefox","2016A0000007152","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-6131","https://nvd.nist.gov/vuln/detail/CVE-2016-6131","libiberty","7.5","12.3.0","","","","2016A0000006131","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-5118","https://nvd.nist.gov/vuln/detail/CVE-2016-5118","imagemagick","9.8","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000005118","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-5118","https://nvd.nist.gov/vuln/detail/CVE-2016-5118","imagemagick","9.8","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000005118","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-4493","https://nvd.nist.gov/vuln/detail/CVE-2016-4493","libiberty","5.5","12.3.0","","","","2016A0000004493","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-4492","https://nvd.nist.gov/vuln/detail/CVE-2016-4492","libiberty","4.4","12.3.0","","","","2016A0000004492","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-4491","https://nvd.nist.gov/vuln/detail/CVE-2016-4491","libiberty","5.5","12.3.0","","","","2016A0000004491","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" @@ -949,39 +937,39 @@ https://github.com/NixOS/nixpkgs/pull/82958" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-2781","https://nvd.nist.gov/vuln/detail/CVE-2016-2781","coreutils","6.5","9.3","","","","2016A0000002781","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2016-2226","https://nvd.nist.gov/vuln/detail/CVE-2016-2226","libiberty","7.8","12.3.0","","","","2016A0000002226","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2015-7313","https://nvd.nist.gov/vuln/detail/CVE-2015-7313","libtiff","5.5","4.6.0","","","","2015A0000007313","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9907","https://nvd.nist.gov/vuln/detail/CVE-2014-9907","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009907","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9854","https://nvd.nist.gov/vuln/detail/CVE-2014-9854","imagemagick","7.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009854","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9853","https://nvd.nist.gov/vuln/detail/CVE-2014-9853","imagemagick","5.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009853","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9852","https://nvd.nist.gov/vuln/detail/CVE-2014-9852","imagemagick","9.8","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009852","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9848","https://nvd.nist.gov/vuln/detail/CVE-2014-9848","imagemagick","7.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009848","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9831","https://nvd.nist.gov/vuln/detail/CVE-2014-9831","imagemagick","8.8","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009831","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9830","https://nvd.nist.gov/vuln/detail/CVE-2014-9830","imagemagick","8.8","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009830","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9829","https://nvd.nist.gov/vuln/detail/CVE-2014-9829","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009829","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9828","https://nvd.nist.gov/vuln/detail/CVE-2014-9828","imagemagick","8.8","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009828","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9827","https://nvd.nist.gov/vuln/detail/CVE-2014-9827","imagemagick","8.8","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009827","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9826","https://nvd.nist.gov/vuln/detail/CVE-2014-9826","imagemagick","9.8","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009826","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9825","https://nvd.nist.gov/vuln/detail/CVE-2014-9825","imagemagick","7.8","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009825","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9824","https://nvd.nist.gov/vuln/detail/CVE-2014-9824","imagemagick","7.8","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009824","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9823","https://nvd.nist.gov/vuln/detail/CVE-2014-9823","imagemagick","7.8","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009823","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9822","https://nvd.nist.gov/vuln/detail/CVE-2014-9822","imagemagick","7.8","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009822","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9821","https://nvd.nist.gov/vuln/detail/CVE-2014-9821","imagemagick","7.8","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009821","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9820","https://nvd.nist.gov/vuln/detail/CVE-2014-9820","imagemagick","7.8","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009820","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9819","https://nvd.nist.gov/vuln/detail/CVE-2014-9819","imagemagick","7.8","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009819","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9818","https://nvd.nist.gov/vuln/detail/CVE-2014-9818","imagemagick","5.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009818","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9817","https://nvd.nist.gov/vuln/detail/CVE-2014-9817","imagemagick","7.8","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009817","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9816","https://nvd.nist.gov/vuln/detail/CVE-2014-9816","imagemagick","5.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009816","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9815","https://nvd.nist.gov/vuln/detail/CVE-2014-9815","imagemagick","5.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009815","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9814","https://nvd.nist.gov/vuln/detail/CVE-2014-9814","imagemagick","5.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009814","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9813","https://nvd.nist.gov/vuln/detail/CVE-2014-9813","imagemagick","5.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009813","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9812","https://nvd.nist.gov/vuln/detail/CVE-2014-9812","imagemagick","5.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009812","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9811","https://nvd.nist.gov/vuln/detail/CVE-2014-9811","imagemagick","5.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009811","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9810","https://nvd.nist.gov/vuln/detail/CVE-2014-9810","imagemagick","5.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009810","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9809","https://nvd.nist.gov/vuln/detail/CVE-2014-9809","imagemagick","5.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009809","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9808","https://nvd.nist.gov/vuln/detail/CVE-2014-9808","imagemagick","5.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009808","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9807","https://nvd.nist.gov/vuln/detail/CVE-2014-9807","imagemagick","5.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009807","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9806","https://nvd.nist.gov/vuln/detail/CVE-2014-9806","imagemagick","5.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009806","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9805","https://nvd.nist.gov/vuln/detail/CVE-2014-9805","imagemagick","5.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009805","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9804","https://nvd.nist.gov/vuln/detail/CVE-2014-9804","imagemagick","7.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009804","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9907","https://nvd.nist.gov/vuln/detail/CVE-2014-9907","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009907","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9854","https://nvd.nist.gov/vuln/detail/CVE-2014-9854","imagemagick","7.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009854","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9853","https://nvd.nist.gov/vuln/detail/CVE-2014-9853","imagemagick","5.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009853","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9852","https://nvd.nist.gov/vuln/detail/CVE-2014-9852","imagemagick","9.8","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009852","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9848","https://nvd.nist.gov/vuln/detail/CVE-2014-9848","imagemagick","7.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009848","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9831","https://nvd.nist.gov/vuln/detail/CVE-2014-9831","imagemagick","8.8","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009831","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9830","https://nvd.nist.gov/vuln/detail/CVE-2014-9830","imagemagick","8.8","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009830","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9829","https://nvd.nist.gov/vuln/detail/CVE-2014-9829","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009829","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9828","https://nvd.nist.gov/vuln/detail/CVE-2014-9828","imagemagick","8.8","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009828","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9827","https://nvd.nist.gov/vuln/detail/CVE-2014-9827","imagemagick","8.8","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009827","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9826","https://nvd.nist.gov/vuln/detail/CVE-2014-9826","imagemagick","9.8","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009826","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9825","https://nvd.nist.gov/vuln/detail/CVE-2014-9825","imagemagick","7.8","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009825","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9824","https://nvd.nist.gov/vuln/detail/CVE-2014-9824","imagemagick","7.8","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009824","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9823","https://nvd.nist.gov/vuln/detail/CVE-2014-9823","imagemagick","7.8","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009823","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9822","https://nvd.nist.gov/vuln/detail/CVE-2014-9822","imagemagick","7.8","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009822","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9821","https://nvd.nist.gov/vuln/detail/CVE-2014-9821","imagemagick","7.8","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009821","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9820","https://nvd.nist.gov/vuln/detail/CVE-2014-9820","imagemagick","7.8","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009820","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9819","https://nvd.nist.gov/vuln/detail/CVE-2014-9819","imagemagick","7.8","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009819","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9818","https://nvd.nist.gov/vuln/detail/CVE-2014-9818","imagemagick","5.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009818","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9817","https://nvd.nist.gov/vuln/detail/CVE-2014-9817","imagemagick","7.8","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009817","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9816","https://nvd.nist.gov/vuln/detail/CVE-2014-9816","imagemagick","5.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009816","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9815","https://nvd.nist.gov/vuln/detail/CVE-2014-9815","imagemagick","5.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009815","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9814","https://nvd.nist.gov/vuln/detail/CVE-2014-9814","imagemagick","5.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009814","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9813","https://nvd.nist.gov/vuln/detail/CVE-2014-9813","imagemagick","5.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009813","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9812","https://nvd.nist.gov/vuln/detail/CVE-2014-9812","imagemagick","5.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009812","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9811","https://nvd.nist.gov/vuln/detail/CVE-2014-9811","imagemagick","5.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009811","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9810","https://nvd.nist.gov/vuln/detail/CVE-2014-9810","imagemagick","5.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009810","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9809","https://nvd.nist.gov/vuln/detail/CVE-2014-9809","imagemagick","5.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009809","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9808","https://nvd.nist.gov/vuln/detail/CVE-2014-9808","imagemagick","5.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009808","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9807","https://nvd.nist.gov/vuln/detail/CVE-2014-9807","imagemagick","5.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009807","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9806","https://nvd.nist.gov/vuln/detail/CVE-2014-9806","imagemagick","5.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009806","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9805","https://nvd.nist.gov/vuln/detail/CVE-2014-9805","imagemagick","5.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009805","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9804","https://nvd.nist.gov/vuln/detail/CVE-2014-9804","imagemagick","7.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009804","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-9157","https://nvd.nist.gov/vuln/detail/CVE-2014-9157","graphviz","","9.0.0","","","","2014A0000009157","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-6492","https://nvd.nist.gov/vuln/detail/CVE-2014-6492","firefox","","122.0.1","122.0.1","122.0.1","firefox","2014A0000006492","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2014-4860","https://nvd.nist.gov/vuln/detail/CVE-2014-4860","edk2","6.8","202311","","","","2014A0000004860","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" @@ -1005,7 +993,7 @@ https://github.com/NixOS/nixpkgs/pull/82958" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2007-3670","https://nvd.nist.gov/vuln/detail/CVE-2007-3670","firefox","","122.0.1","122.0.1","122.0.1","firefox","2007A0000003670","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2007-2176","https://nvd.nist.gov/vuln/detail/CVE-2007-2176","firefox","","122.0.1","122.0.1","122.0.1","firefox","2007A0000002176","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2007-1970","https://nvd.nist.gov/vuln/detail/CVE-2007-1970","firefox","","122.0.1","122.0.1","122.0.1","firefox","2007A0000001970","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2007-1667","https://nvd.nist.gov/vuln/detail/CVE-2007-1667","imagemagick","","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2007A0000001667","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2007-1667","https://nvd.nist.gov/vuln/detail/CVE-2007-1667","imagemagick","","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2007A0000001667","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2007-0896","https://nvd.nist.gov/vuln/detail/CVE-2007-0896","firefox","","122.0.1","122.0.1","122.0.1","firefox","2007A0000000896","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","lock_updated","CVE-2003-1492","https://nvd.nist.gov/vuln/detail/CVE-2003-1492","firefox","","122.0.1","122.0.1","122.0.1","firefox","2003A0000001492","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=ghaf-23.12","nix_unstable","GHSA-w596-4wvx-j9j6","https://osv.dev/GHSA-w596-4wvx-j9j6","py","","1.11.0","1.11.0","1.11.0","python:py","2024A1708041600","False","","err_not_vulnerable_based_on_repology","" diff --git a/reports/ghaf-23.12/packages.x86_64-linux.generic-x86_64-release.md b/reports/ghaf-23.12/packages.x86_64-linux.generic-x86_64-release.md index acda0c9..56977d1 100644 --- a/reports/ghaf-23.12/packages.x86_64-linux.generic-x86_64-release.md +++ b/reports/ghaf-23.12/packages.x86_64-linux.generic-x86_64-release.md @@ -46,7 +46,9 @@ Update the target Ghaf [flake.lock](https://github.com/tiiuae/ghaf/blob/main/fla | [CVE-2023-6858](https://nvd.nist.gov/vuln/detail/CVE-2023-6858) | firefox | 8.8 | 120.0.1 | 122.0.1 | 122.0.1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/286601), [PR](https://github.com/NixOS/nixpkgs/pull/286735)]* | | [CVE-2023-6856](https://nvd.nist.gov/vuln/detail/CVE-2023-6856) | firefox | 8.8 | 120.0.1 | 122.0.1 | 122.0.1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/286601), [PR](https://github.com/NixOS/nixpkgs/pull/286735)]* | | [CVE-2023-43887](https://nvd.nist.gov/vuln/detail/CVE-2023-43887) | libde265 | 8.1 | 1.0.12 | 1.0.15 | 1.0.15 | *[[PR](https://github.com/NixOS/nixpkgs/pull/268884), [PR](https://github.com/NixOS/nixpkgs/pull/271642), [PR](https://github.com/NixOS/nixpkgs/pull/271643), [PR](https://github.com/NixOS/nixpkgs/pull/275720), [PR](https://github.com/NixOS/nixpkgs/pull/276799)]* | +| [CVE-2024-0985](https://nvd.nist.gov/vuln/detail/CVE-2024-0985) | postgresql | 8 | 15.5 | 16.1 | 16.2 | *[[PR](https://github.com/NixOS/nixpkgs/pull/266642), [PR](https://github.com/NixOS/nixpkgs/pull/287353)]* | | [CVE-2024-0409](https://nvd.nist.gov/vuln/detail/CVE-2024-0409) | xorg-server | 7.8 | 21.1.9 | 21.1.11 | 21.1.11 | | +| [CVE-2024-25062](https://nvd.nist.gov/vuln/detail/CVE-2024-25062) | libxml2 | 7.5 | 2.11.5 | 2.12.4 | 2.12.5 | *[[PR](https://github.com/NixOS/nixpkgs/pull/286300)]* | | [CVE-2024-0744](https://nvd.nist.gov/vuln/detail/CVE-2024-0744) | firefox | 7.5 | 120.0.1 | 122.0.1 | 122.0.1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/286601), [PR](https://github.com/NixOS/nixpkgs/pull/286735)]* | | [CVE-2024-0743](https://nvd.nist.gov/vuln/detail/CVE-2024-0743) | firefox | 7.5 | 120.0.1 | 122.0.1 | 122.0.1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/286601), [PR](https://github.com/NixOS/nixpkgs/pull/286735), [PR](https://github.com/NixOS/nixpkgs/pull/288044)]* | | [CVE-2024-0567](https://nvd.nist.gov/vuln/detail/CVE-2024-0567) | gnutls | 7.5 | 3.8.2 | 3.8.3 | 3.8.3 | *[[PR](https://github.com/NixOS/nixpkgs/pull/281471), [PR](https://github.com/NixOS/nixpkgs/pull/281775)]* | @@ -61,14 +63,17 @@ Update the target Ghaf [flake.lock](https://github.com/tiiuae/ghaf/blob/main/fla | [CVE-2024-0741](https://nvd.nist.gov/vuln/detail/CVE-2024-0741) | firefox | 6.5 | 120.0.1 | 122.0.1 | 122.0.1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/286601), [PR](https://github.com/NixOS/nixpkgs/pull/286735), [PR](https://github.com/NixOS/nixpkgs/pull/288044)]* | | [CVE-2023-51385](https://nvd.nist.gov/vuln/detail/CVE-2023-51385) | openssh | 6.5 | 9.5p1 | 9.6p1 | 9.6p1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/275249), [PR](https://github.com/NixOS/nixpkgs/pull/275399), [PR](https://github.com/NixOS/nixpkgs/pull/275587)]* | | [CVE-2023-47471](https://nvd.nist.gov/vuln/detail/CVE-2023-47471) | libde265 | 6.5 | 1.0.12 | 1.0.15 | 1.0.15 | *[[PR](https://github.com/NixOS/nixpkgs/pull/275720), [PR](https://github.com/NixOS/nixpkgs/pull/276798), [PR](https://github.com/NixOS/nixpkgs/pull/276799)]* | +| [CVE-2023-45322](https://nvd.nist.gov/vuln/detail/CVE-2023-45322) | libxml2 | 6.5 | 2.11.5 | 2.12.4 | 2.12.5 | *[[PR](https://github.com/NixOS/nixpkgs/pull/282347), [PR](https://github.com/NixOS/nixpkgs/pull/283888), [PR](https://github.com/NixOS/nixpkgs/pull/286300)]* | | [CVE-2023-6872](https://nvd.nist.gov/vuln/detail/CVE-2023-6872) | firefox | 6.5 | 120.0.1 | 122.0.1 | 122.0.1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/286601), [PR](https://github.com/NixOS/nixpkgs/pull/286735)]* | | [CVE-2023-6869](https://nvd.nist.gov/vuln/detail/CVE-2023-6869) | firefox | 6.5 | 120.0.1 | 122.0.1 | 122.0.1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/286601), [PR](https://github.com/NixOS/nixpkgs/pull/286735)]* | | [CVE-2023-6865](https://nvd.nist.gov/vuln/detail/CVE-2023-6865) | firefox | 6.5 | 120.0.1 | 122.0.1 | 122.0.1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/286601), [PR](https://github.com/NixOS/nixpkgs/pull/286735)]* | | [CVE-2023-6860](https://nvd.nist.gov/vuln/detail/CVE-2023-6860) | firefox | 6.5 | 120.0.1 | 122.0.1 | 122.0.1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/286601), [PR](https://github.com/NixOS/nixpkgs/pull/286735)]* | +| [CVE-2023-6129](https://nvd.nist.gov/vuln/detail/CVE-2023-6129) | openssl | 6.5 | 3.0.12 | 3.2.0 | 3.2.0 | *[[PR](https://github.com/NixOS/nixpkgs/pull/285019), [PR](https://github.com/NixOS/nixpkgs/pull/285027)]* | | [CVE-2023-6867](https://nvd.nist.gov/vuln/detail/CVE-2023-6867) | firefox | 6.1 | 120.0.1 | 122.0.1 | 122.0.1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/286601), [PR](https://github.com/NixOS/nixpkgs/pull/286735)]* | | [CVE-2023-48795](https://nvd.nist.gov/vuln/detail/CVE-2023-48795) | openssh | 5.9 | 9.5p1 | 9.6p1 | 9.6p1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/275250), [PR](https://github.com/NixOS/nixpkgs/pull/275641), [PR](https://github.com/NixOS/nixpkgs/pull/276242), [PR](https://github.com/NixOS/nixpkgs/pull/276504), [PR](https://github.com/NixOS/nixpkgs/pull/276505)]* | | [CVE-2023-48795](https://nvd.nist.gov/vuln/detail/CVE-2023-48795) | libssh2 | 5.9 | 1.11.0 | 1.11.0 | 1.11.0 | *[[PR](https://github.com/NixOS/nixpkgs/pull/275250), [PR](https://github.com/NixOS/nixpkgs/pull/275641), [PR](https://github.com/NixOS/nixpkgs/pull/276242), [PR](https://github.com/NixOS/nixpkgs/pull/276504), [PR](https://github.com/NixOS/nixpkgs/pull/276505)]* | | [CVE-2023-48795](https://nvd.nist.gov/vuln/detail/CVE-2023-48795) | libssh | 5.9 | 0.10.5 | 0.10.6 | 0.10.6 | *[[PR](https://github.com/NixOS/nixpkgs/pull/275250), [PR](https://github.com/NixOS/nixpkgs/pull/275641), [PR](https://github.com/NixOS/nixpkgs/pull/276242), [PR](https://github.com/NixOS/nixpkgs/pull/276504), [PR](https://github.com/NixOS/nixpkgs/pull/276505)]* | +| [CVE-2024-0727](https://nvd.nist.gov/vuln/detail/CVE-2024-0727) | openssl | 5.5 | 3.0.12 | 3.2.0 | 3.2.0 | *[[PR](https://github.com/NixOS/nixpkgs/pull/285019), [PR](https://github.com/NixOS/nixpkgs/pull/285027)]* | | [CVE-2024-0408](https://nvd.nist.gov/vuln/detail/CVE-2024-0408) | xorg-server | 5.5 | 21.1.9 | 21.1.11 | 21.1.11 | | | [CVE-2023-51384](https://nvd.nist.gov/vuln/detail/CVE-2023-51384) | openssh | 5.5 | 9.5p1 | 9.6p1 | 9.6p1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/275249), [PR](https://github.com/NixOS/nixpkgs/pull/275399), [PR](https://github.com/NixOS/nixpkgs/pull/275587)]* | | [CVE-2023-50268](https://nvd.nist.gov/vuln/detail/CVE-2023-50268) | jq | 5.5 | 1.7 | 1.7.1 | 1.7.1 | | @@ -77,6 +82,7 @@ Update the target Ghaf [flake.lock](https://github.com/tiiuae/ghaf/blob/main/fla | [CVE-2023-39326](https://nvd.nist.gov/vuln/detail/CVE-2023-39326) | go | 5.3 | 1.21.4 | 1.22.0 | 1.22.0 | *[[PR](https://github.com/NixOS/nixpkgs/pull/286849)]* | | [CVE-2023-6918](https://nvd.nist.gov/vuln/detail/CVE-2023-6918) | libssh | 5.3 | 0.10.5 | 0.10.6 | 0.10.6 | *[[PR](https://github.com/NixOS/nixpkgs/pull/275250), [PR](https://github.com/NixOS/nixpkgs/pull/275603), [PR](https://github.com/NixOS/nixpkgs/pull/275604)]* | | [CVE-2023-6857](https://nvd.nist.gov/vuln/detail/CVE-2023-6857) | firefox | 5.3 | 120.0.1 | 122.0.1 | 122.0.1 | | +| [CVE-2023-5678](https://nvd.nist.gov/vuln/detail/CVE-2023-5678) | openssl | 5.3 | 3.0.12 | 3.2.0 | 3.2.0 | *[[PR](https://github.com/NixOS/nixpkgs/pull/285019), [PR](https://github.com/NixOS/nixpkgs/pull/285027)]* | | [CVE-2023-6004](https://nvd.nist.gov/vuln/detail/CVE-2023-6004) | libssh | 4.8 | 0.10.5 | 0.10.6 | 0.10.6 | *[[PR](https://github.com/NixOS/nixpkgs/pull/275250), [PR](https://github.com/NixOS/nixpkgs/pull/275603), [PR](https://github.com/NixOS/nixpkgs/pull/275604)]* | | [CVE-2024-0749](https://nvd.nist.gov/vuln/detail/CVE-2024-0749) | firefox | 4.3 | 120.0.1 | 122.0.1 | 122.0.1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/286601), [PR](https://github.com/NixOS/nixpkgs/pull/286735)]* | | [CVE-2024-0748](https://nvd.nist.gov/vuln/detail/CVE-2024-0748) | firefox | 4.3 | 120.0.1 | 122.0.1 | 122.0.1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/286601), [PR](https://github.com/NixOS/nixpkgs/pull/286735)]* | @@ -118,11 +124,8 @@ Consider [whitelisting](../../manual_analysis.csv) possible false positives base | [CVE-2024-22861](https://nvd.nist.gov/vuln/detail/CVE-2024-22861) | ffmpeg | 7.5 | 6.0 | 6.1 | 6.1.1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/271905)]* | | [CVE-2024-22861](https://nvd.nist.gov/vuln/detail/CVE-2024-22861) | ffmpeg | 7.5 | 4.4.4 | 6.1 | 6.1.1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/271905)]* | | [CVE-2023-46218](https://nvd.nist.gov/vuln/detail/CVE-2023-46218) | curl | 6.5 | 8.4.0 | 8.6.0 | 8.6.0 | *[[PR](https://github.com/NixOS/nixpkgs/pull/285295), [PR](https://github.com/NixOS/nixpkgs/pull/288071)]* | -| [CVE-2023-45322](https://nvd.nist.gov/vuln/detail/CVE-2023-45322) | libxml2 | 6.5 | 2.11.5 | 2.12.4 | 2.12.5 | *[[PR](https://github.com/NixOS/nixpkgs/pull/282347), [PR](https://github.com/NixOS/nixpkgs/pull/283888), [PR](https://github.com/NixOS/nixpkgs/pull/286300)]* | | [CVE-2023-38858](https://nvd.nist.gov/vuln/detail/CVE-2023-38858) | faad2 | 6.5 | 2.10.1 | 2.11.1 | 2.11.1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/267515)]* | -| [CVE-2023-6129](https://nvd.nist.gov/vuln/detail/CVE-2023-6129) | openssl | 6.5 | 3.0.12 | 3.2.0 | 3.2.0 | *[[PR](https://github.com/NixOS/nixpkgs/pull/285019), [PR](https://github.com/NixOS/nixpkgs/pull/285027)]* | | [CVE-2024-22365](https://nvd.nist.gov/vuln/detail/CVE-2024-22365) | linux-pam | 5.5 | 1.5.2 | | | *[[PR](https://github.com/NixOS/nixpkgs/pull/282136)]* | -| [CVE-2024-0727](https://nvd.nist.gov/vuln/detail/CVE-2024-0727) | openssl | 5.5 | 3.0.12 | 3.2.0 | 3.2.0 | *[[PR](https://github.com/NixOS/nixpkgs/pull/285019), [PR](https://github.com/NixOS/nixpkgs/pull/285027)]* | | [CVE-2023-46407](https://nvd.nist.gov/vuln/detail/CVE-2023-46407) | ffmpeg | 5.5 | 6.0 | 6.1 | 6.1.1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/271905)]* | | [CVE-2023-46407](https://nvd.nist.gov/vuln/detail/CVE-2023-46407) | ffmpeg | 5.5 | 4.4.4 | 6.1 | 6.1.1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/271905)]* | | [CVE-2023-38857](https://nvd.nist.gov/vuln/detail/CVE-2023-38857) | faad2 | 5.5 | 2.10.1 | 2.11.1 | 2.11.1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/267515)]* | @@ -133,7 +136,6 @@ Consider [whitelisting](../../manual_analysis.csv) possible false positives base | [CVE-2023-38469](https://nvd.nist.gov/vuln/detail/CVE-2023-38469) | avahi | 5.5 | 0.8 | 0.8 | 0.8 | *[[PR](https://github.com/NixOS/nixpkgs/pull/269599)]* | | [CVE-2023-52071](https://nvd.nist.gov/vuln/detail/CVE-2023-52071) | curl | 5.3 | 8.4.0 | 8.6.0 | 8.6.0 | *[[PR](https://github.com/NixOS/nixpkgs/pull/285295), [PR](https://github.com/NixOS/nixpkgs/pull/288071)]* | | [CVE-2023-46219](https://nvd.nist.gov/vuln/detail/CVE-2023-46219) | curl | 5.3 | 8.4.0 | 8.6.0 | 8.6.0 | *[[PR](https://github.com/NixOS/nixpkgs/pull/285295), [PR](https://github.com/NixOS/nixpkgs/pull/288071)]* | -| [CVE-2023-5678](https://nvd.nist.gov/vuln/detail/CVE-2023-5678) | openssl | 5.3 | 3.0.12 | 3.2.0 | 3.2.0 | *[[PR](https://github.com/NixOS/nixpkgs/pull/285019), [PR](https://github.com/NixOS/nixpkgs/pull/285027)]* | | [CVE-2023-48706](https://nvd.nist.gov/vuln/detail/CVE-2023-48706) | vim | 4.7 | 9.0.2116 | 9.1.0004 | 9.1.0113 | *[[PR](https://github.com/NixOS/nixpkgs/pull/276595), [PR](https://github.com/NixOS/nixpkgs/pull/284984)]* | | [OSV-2023-1295](https://osv.dev/OSV-2023-1295) | libraw | | 0.21.1 | 0.21.2 | 0.21.2 | | | [OSV-2023-184](https://osv.dev/OSV-2023-184) | libraw | | 0.21.1 | 0.21.2 | 0.21.2 | | @@ -525,6 +527,7 @@ Following table lists vulnerabilities that would otherwise have been included to | [CVE-2017-5436](https://nvd.nist.gov/vuln/detail/CVE-2017-5436) | graphite2 | 8.8 | 1.3.14 | NVD data issue: CPE entry does not correctly state the version numbers. | | [CVE-2022-48434](https://nvd.nist.gov/vuln/detail/CVE-2022-48434) | ffmpeg | 8.1 | 4.4.4 | Scanners get confused by LTS release versions (non-linear version numbers). Upstream fix patch for 4.4.x is merged in 4.4.3 [link](https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/d4b7b3c03ee2baf0166ce49dff17ec9beff684db). | | [CVE-2019-14586](https://nvd.nist.gov/vuln/detail/CVE-2019-14586) | edk2 | 8.0 | 202311 | NVD data issue: CPE entry does not correctly state the version numbers. | +| [CVE-2019-14586](https://nvd.nist.gov/vuln/detail/CVE-2019-14586) | edk2 | 8 | 202311 | NVD data issue: CPE entry does not correctly state the version numbers. | | [CVE-2021-26720](https://nvd.nist.gov/vuln/detail/CVE-2021-26720) | avahi | 7.8 | 0.8 | False positive: issue refers avahi-daemon-check-dns.sh in the Debian avahi package. As such, the issue is specific to Debian and its derivatives. | | [CVE-2019-14575](https://nvd.nist.gov/vuln/detail/CVE-2019-14575) | edk2 | 7.8 | 202311 | NVD data issue: CPE entry does not correctly state the version numbers. | | [CVE-2019-14563](https://nvd.nist.gov/vuln/detail/CVE-2019-14563) | edk2 | 7.8 | 202311 | NVD data issue: CPE entry does not correctly state the version numbers. | @@ -668,6 +671,7 @@ Following table lists vulnerabilities that would otherwise have been included to | [OSV-2021-820](https://osv.dev/OSV-2021-820) | qemu | | 8.1.5 | Fixed based on [link](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=34831#c2). | | [OSV-2021-820](https://osv.dev/OSV-2021-820) | qemu | | 8.1.3 | Fixed based on [link](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=34831#c2). | | [OSV-2021-777](https://osv.dev/OSV-2021-777) | libxml2 | | 2.12.4 | Fixed by [link](https://gitlab.gnome.org/GNOME/libxml2/-/commit/8f5ccada05ddd4a1ff8e399ad39fc7cd4bd33325), which went to 2.9.13. Therefore, this issue is fixed in 2.10.4. | +| [OSV-2021-777](https://osv.dev/OSV-2021-777) | libxml2 | | 2.11.7 | Fixed by [link](https://gitlab.gnome.org/GNOME/libxml2/-/commit/8f5ccada05ddd4a1ff8e399ad39fc7cd4bd33325), which went to 2.9.13. Therefore, this issue is fixed in 2.10.4. | | [OSV-2021-777](https://osv.dev/OSV-2021-777) | libxml2 | | 2.11.5 | Fixed by [link](https://gitlab.gnome.org/GNOME/libxml2/-/commit/8f5ccada05ddd4a1ff8e399ad39fc7cd4bd33325), which went to 2.9.13. Therefore, this issue is fixed in 2.10.4. | | [CVE-2014-9157](https://nvd.nist.gov/vuln/detail/CVE-2014-9157) | graphviz | | 9.0.0 | NVD data issue: CPE entry does not correctly state the version numbers. | | [CVE-2012-3509](https://nvd.nist.gov/vuln/detail/CVE-2012-3509) | libiberty | | 13.2.0 | NVD data issue: CPE entry does not correctly state the version numbers. | diff --git a/reports/main/data.csv b/reports/main/data.csv index f2627ea..ba75e15 100644 --- a/reports/main/data.csv +++ b/reports/main/data.csv @@ -575,8 +575,7 @@ https://github.com/NixOS/nixpkgs/pull/82958" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","current","CVE-2003-1492","https://nvd.nist.gov/vuln/detail/CVE-2003-1492","firefox","","120.0.1","122.0.1","122.0.1","firefox","2003A0000001492","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","GHSA-w596-4wvx-j9j6","https://osv.dev/GHSA-w596-4wvx-j9j6","py","","1.11.0","1.11.0","1.11.0","python:py","2024A1708041600","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","GHSA-fwr7-v2mv-hh25","https://osv.dev/GHSA-fwr7-v2mv-hh25","async","","2.2.4","2.2.5","2.2.5","haskell:async","2024A1707782400","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2024-25062","https://nvd.nist.gov/vuln/detail/CVE-2024-25062","libxml2","7.5","2.11.5","2.12.4","2.12.5","libxml2","2024A0000025062","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/286300" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2024-24806","https://nvd.nist.gov/vuln/detail/CVE-2024-24806","libuv","9.8","1.46.0","1.47.0","1.48.0","libuv","2024A0000024806","False","","fix_not_available","https://github.com/NixOS/nixpkgs/pull/287226" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2024-24806","https://nvd.nist.gov/vuln/detail/CVE-2024-24806","libuv","9.8","1.48.0","1.47.0","1.48.0","libuv","2024A0000024806","False","","fix_not_available","https://github.com/NixOS/nixpkgs/pull/287226" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2024-24577","https://nvd.nist.gov/vuln/detail/CVE-2024-24577","libgit2","9.8","1.7.1","1.7.1","1.7.2","libgit2","2024A0000024577","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/286911 https://github.com/NixOS/nixpkgs/pull/287829 https://github.com/NixOS/nixpkgs/pull/287841" @@ -592,11 +591,7 @@ https://github.com/NixOS/nixpkgs/pull/287841" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2024-22667","https://nvd.nist.gov/vuln/detail/CVE-2024-22667","vim","7.8","9.0.2116","9.1.0004","9.1.0113","vim","2024A0000022667","False","","fix_update_to_version_nixpkgs","https://github.com/NixOS/nixpkgs/pull/276595 https://github.com/NixOS/nixpkgs/pull/284984" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2024-22365","https://nvd.nist.gov/vuln/detail/CVE-2024-22365","linux-pam","5.5","1.5.2","","","","2024A0000022365","False","","err_missing_repology_version","https://github.com/NixOS/nixpkgs/pull/282136" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2024-0985","https://nvd.nist.gov/vuln/detail/CVE-2024-0985","postgresql","8.0","15.5","16.1","16.2","postgresql","2024A0000000985","False","","fix_update_to_version_nixpkgs","https://github.com/NixOS/nixpkgs/pull/266642 -https://github.com/NixOS/nixpkgs/pull/287353" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2024-0953","https://nvd.nist.gov/vuln/detail/CVE-2024-0953","firefox","6.1","122.0.1","122.0.1","122.0.1","firefox","2024A0000000953","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2024-0727","https://nvd.nist.gov/vuln/detail/CVE-2024-0727","openssl","5.5","3.0.12","3.2.0","3.2.0","ruby:openssl","2024A0000000727","False","","err_not_vulnerable_based_on_repology","https://github.com/NixOS/nixpkgs/pull/285019 -https://github.com/NixOS/nixpkgs/pull/285027" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2024-0684","https://nvd.nist.gov/vuln/detail/CVE-2024-0684","coreutils","5.5","9.3","9.4","9.4","coreutils","2024A0000000684","False","","fix_not_available","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","GHSA-6898-wx94-8jq8","https://osv.dev/GHSA-6898-wx94-8jq8","libnotify","","0.8.3","","","","2023A1694131200","True","Incorrect package: Issue refers node-libnotify https://github.com/mytrile/node-libnotify, whereas nixpkgs refers gnome-libnotify https://gitlab.gnome.org/GNOME/libnotify.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","GHSA-gmwp-3pwc-3j3g","https://osv.dev/GHSA-gmwp-3pwc-3j3g","mockery","","0.3.5","0.3.5","0.3.5","haskell:mockery","2023A1690502400","False","","err_not_vulnerable_based_on_repology","" @@ -623,9 +618,6 @@ https://github.com/NixOS/nixpkgs/pull/288071" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-45853","https://nvd.nist.gov/vuln/detail/CVE-2023-45853","zlib","9.8","1.3","1.3.1","1.3.1","zlib","2023A0000045853","False","","fix_update_to_version_nixpkgs","https://github.com/NixOS/nixpkgs/pull/262722 https://github.com/NixOS/nixpkgs/pull/263083 https://github.com/NixOS/nixpkgs/pull/283179" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-45322","https://nvd.nist.gov/vuln/detail/CVE-2023-45322","libxml2","6.5","2.11.5","2.12.4","2.12.5","libxml2","2023A0000045322","False","","fix_update_to_version_nixpkgs","https://github.com/NixOS/nixpkgs/pull/282347 -https://github.com/NixOS/nixpkgs/pull/283888 -https://github.com/NixOS/nixpkgs/pull/286300" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-45237","https://nvd.nist.gov/vuln/detail/CVE-2023-45237","edk2","7.5","202311","202311","202311","edk2","2023A0000045237","False","","fix_not_available","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-45236","https://nvd.nist.gov/vuln/detail/CVE-2023-45236","edk2","7.5","202311","202311","202311","edk2","2023A0000045236","False","","fix_not_available","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-45235","https://nvd.nist.gov/vuln/detail/CVE-2023-45235","edk2","8.8","202311","202311","202311","edk2","2023A0000045235","False","","fix_not_available","https://github.com/NixOS/nixpkgs/pull/281405" @@ -682,44 +674,40 @@ https://github.com/NixOS/nixpkgs/pull/232535" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-25584","https://nvd.nist.gov/vuln/detail/CVE-2023-25584","binutils","7.1","2.40","2.40","2.42","binutils","2023A0000025584","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-7216","https://nvd.nist.gov/vuln/detail/CVE-2023-7216","cpio","8.8","2.14","2.15","2.15","cpio","2023A0000007216","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-6992","https://nvd.nist.gov/vuln/detail/CVE-2023-6992","zlib","5.5","1.3","1.3.1","1.3.1","zlib","2023A0000006992","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-6780","https://nvd.nist.gov/vuln/detail/CVE-2023-6780","glibc","5.3","2.38-27-source-unsecvars","2.38-44","2.39","glibc","2023A0000006780","False","","fix_not_available","https://github.com/NixOS/nixpkgs/pull/285050 +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-6780","https://nvd.nist.gov/vuln/detail/CVE-2023-6780","glibc","5.3","2.38-44-source-unsecvars","2.38-44","2.39","glibc","2023A0000006780","False","","fix_not_available","https://github.com/NixOS/nixpkgs/pull/285050 https://github.com/NixOS/nixpkgs/pull/285329" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-6780","https://nvd.nist.gov/vuln/detail/CVE-2023-6780","glibc","5.3","2.38-27","2.38-44","2.39","glibc","2023A0000006780","False","","fix_not_available","https://github.com/NixOS/nixpkgs/pull/285050 +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-6780","https://nvd.nist.gov/vuln/detail/CVE-2023-6780","glibc","5.3","2.38-44","2.38-44","2.39","glibc","2023A0000006780","False","","fix_not_available","https://github.com/NixOS/nixpkgs/pull/285050 https://github.com/NixOS/nixpkgs/pull/285329" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-6779","https://nvd.nist.gov/vuln/detail/CVE-2023-6779","glibc","7.5","2.38-27-source-unsecvars","2.38-44","2.39","glibc","2023A0000006779","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/285050 +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-6779","https://nvd.nist.gov/vuln/detail/CVE-2023-6779","glibc","7.5","2.38-44-source-unsecvars","2.38-44","2.39","glibc","2023A0000006779","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/285050 https://github.com/NixOS/nixpkgs/pull/285329 https://github.com/NixOS/nixpkgs/pull/287594" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-6779","https://nvd.nist.gov/vuln/detail/CVE-2023-6779","glibc","7.5","2.38-27","2.38-44","2.39","glibc","2023A0000006779","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/285050 +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-6779","https://nvd.nist.gov/vuln/detail/CVE-2023-6779","glibc","7.5","2.38-44","2.38-44","2.39","glibc","2023A0000006779","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/285050 https://github.com/NixOS/nixpkgs/pull/285329 https://github.com/NixOS/nixpkgs/pull/287594" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-6693","https://nvd.nist.gov/vuln/detail/CVE-2023-6693","qemu","5.3","8.1.5","8.2.1","8.2.1","qemu","2023A0000006693","False","","err_not_vulnerable_based_on_repology","https://github.com/NixOS/nixpkgs/pull/284249 https://github.com/NixOS/nixpkgs/pull/284489" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-6683","https://nvd.nist.gov/vuln/detail/CVE-2023-6683","qemu","6.5","8.1.5","8.2.1","8.2.1","qemu","2023A0000006683","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-6277","https://nvd.nist.gov/vuln/detail/CVE-2023-6277","libtiff","6.5","4.6.0","4.6.0","4.6.0","tiff","2023A0000006277","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-6246","https://nvd.nist.gov/vuln/detail/CVE-2023-6246","glibc","7.8","2.38-27-source-unsecvars","2.38-44","2.39","glibc","2023A0000006246","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/285050 +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-6246","https://nvd.nist.gov/vuln/detail/CVE-2023-6246","glibc","7.8","2.38-44-source-unsecvars","2.38-44","2.39","glibc","2023A0000006246","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/285050 https://github.com/NixOS/nixpkgs/pull/285329 https://github.com/NixOS/nixpkgs/pull/285587 https://github.com/NixOS/nixpkgs/pull/285588 https://github.com/NixOS/nixpkgs/pull/287594" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-6246","https://nvd.nist.gov/vuln/detail/CVE-2023-6246","glibc","7.8","2.38-27","2.38-44","2.39","glibc","2023A0000006246","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/285050 +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-6246","https://nvd.nist.gov/vuln/detail/CVE-2023-6246","glibc","7.8","2.38-44","2.38-44","2.39","glibc","2023A0000006246","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/285050 https://github.com/NixOS/nixpkgs/pull/285329 https://github.com/NixOS/nixpkgs/pull/285587 https://github.com/NixOS/nixpkgs/pull/285588 https://github.com/NixOS/nixpkgs/pull/287594" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-6228","https://nvd.nist.gov/vuln/detail/CVE-2023-6228","libtiff","5.5","4.6.0","4.6.0","4.6.0","tiff","2023A0000006228","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-6129","https://nvd.nist.gov/vuln/detail/CVE-2023-6129","openssl","6.5","3.0.12","3.2.0","3.2.0","ruby:openssl","2023A0000006129","False","","err_not_vulnerable_based_on_repology","https://github.com/NixOS/nixpkgs/pull/285019 -https://github.com/NixOS/nixpkgs/pull/285027" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-5841","https://nvd.nist.gov/vuln/detail/CVE-2023-5841","openexr","9.1","3.2.1","3.2.1","3.2.126","openexr","2023A0000005841","False","","fix_update_to_version_upstream","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-5841","https://nvd.nist.gov/vuln/detail/CVE-2023-5841","openexr","9.1","2.5.8","3.2.1","3.2.126","openexr","2023A0000005841","False","","fix_update_to_version_upstream","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-5678","https://nvd.nist.gov/vuln/detail/CVE-2023-5678","openssl","5.3","3.0.12","3.2.0","3.2.0","ruby:openssl","2023A0000005678","False","","err_not_vulnerable_based_on_repology","https://github.com/NixOS/nixpkgs/pull/285019 -https://github.com/NixOS/nixpkgs/pull/285027" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-5341","https://nvd.nist.gov/vuln/detail/CVE-2023-5341","imagemagick","5.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2023A0000005341","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-5156","https://nvd.nist.gov/vuln/detail/CVE-2023-5156","glibc","7.5","2.38-27-source-unsecvars","2.38-44","2.39","glibc","2023A0000005156","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/287594" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-5156","https://nvd.nist.gov/vuln/detail/CVE-2023-5156","glibc","7.5","2.38-27","2.38-44","2.39","glibc","2023A0000005156","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/287594" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-5341","https://nvd.nist.gov/vuln/detail/CVE-2023-5341","imagemagick","5.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2023A0000005341","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-5156","https://nvd.nist.gov/vuln/detail/CVE-2023-5156","glibc","7.5","2.38-44-source-unsecvars","2.38-44","2.39","glibc","2023A0000005156","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/287594" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-5156","https://nvd.nist.gov/vuln/detail/CVE-2023-5156","glibc","7.5","2.38-44","2.38-44","2.39","glibc","2023A0000005156","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/287594" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-5088","https://nvd.nist.gov/vuln/detail/CVE-2023-5088","qemu","7","8.1.5","8.2.1","8.2.1","qemu","2023A0000005088","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-4527","https://nvd.nist.gov/vuln/detail/CVE-2023-4527","glibc","6.5","2.38-27-source-unsecvars","2.38-44","2.39","glibc","2023A0000004527","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/256887 +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-4527","https://nvd.nist.gov/vuln/detail/CVE-2023-4527","glibc","6.5","2.38-44-source-unsecvars","2.38-44","2.39","glibc","2023A0000004527","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/256887 https://github.com/NixOS/nixpkgs/pull/287594" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-4527","https://nvd.nist.gov/vuln/detail/CVE-2023-4527","glibc","6.5","2.38-27","2.38-44","2.39","glibc","2023A0000004527","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/256887 +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-4527","https://nvd.nist.gov/vuln/detail/CVE-2023-4527","glibc","6.5","2.38-44","2.38-44","2.39","glibc","2023A0000004527","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/256887 https://github.com/NixOS/nixpkgs/pull/287594" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-4039","https://nvd.nist.gov/vuln/detail/CVE-2023-4039","gcc","4.8","12.3.0","13.2.0","13.2.0","gcc","2023A0000004039","False","","fix_not_available","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-3603","https://nvd.nist.gov/vuln/detail/CVE-2023-3603","libssh","6.5","0.10.6","","","","2023A0000003603","True","Based on https://security-tracker.debian.org/tracker/CVE-2023-3603 and https://bugzilla.redhat.com/show_bug.cgi?id=2221791, vulnerable code is not present in 0.10.5 or any currently released version.","err_missing_repology_version","" @@ -778,7 +766,7 @@ https://github.com/NixOS/nixpkgs/pull/170659" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","MAL-2022-4301","https://osv.dev/MAL-2022-4301","libidn2","","2.3.4","","","","2022A0000004301","True","Incorrect package: Issue refers npm libidn2, whereas, nixpkgs refers libidn2 https://gitlab.com/libidn/libidn2.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2022-4066","https://nvd.nist.gov/vuln/detail/CVE-2022-4066","firefox","8.2","122.0.1","122.0.1","122.0.1","firefox","2022A0000004066","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2022-3341","https://nvd.nist.gov/vuln/detail/CVE-2022-3341","ffmpeg","5.3","4.4.4","","","","2022A0000003341","True","Scanners get confused by LTS release versions (non-linear version numbers). Upstream fix patch for 4.4.x is merged in 4.4.4 https://github.com/FFmpeg/FFmpeg/commit/c513bd48039a718dabf6d7a829efb6732693c04b.","err_missing_repology_version","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2022-3219","https://nvd.nist.gov/vuln/detail/CVE-2022-3219","gnupg","3.3","2.4.1","","","","2022A0000003219","True","Fix patch is not accepted upstream: https://dev.gnupg.org/D556.","err_missing_repology_version","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2022-3219","https://nvd.nist.gov/vuln/detail/CVE-2022-3219","gnupg","3.3","2.4.4","","","","2022A0000003219","True","Fix patch is not accepted upstream: https://dev.gnupg.org/D556.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2022-3109","https://nvd.nist.gov/vuln/detail/CVE-2022-3109","ffmpeg","7.5","4.4.4","","","","2022A0000003109","True","Scanners get confused by LTS release versions (non-linear version numbers). Upstream fix patch for 4.4.x is merged in 4.4.4 https://github.com/FFmpeg/FFmpeg/commit/4d82b7bac42c9d35d4f9f145a85e6cbc1fe914f2.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","OSV-2022-908","https://osv.dev/OSV-2022-908","bluez","","5.70","5.72","5.72","bluez","2022A0000000908","False","Unclear if this is still valid.","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","OSV-2022-896","https://osv.dev/OSV-2022-896","libsass","","3.6.5","3.6.5","3.6.6","libsass","2022A0000000896","False","Unclear if this is still valid.","err_not_vulnerable_based_on_repology","" @@ -838,7 +826,7 @@ https://github.com/NixOS/nixpkgs/pull/170659" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","OSV-2021-820","https://osv.dev/OSV-2021-820","qemu","","8.1.5","","","","2021A0000000820","True","Fixed based on https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=34831#c2.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","OSV-2021-802","https://osv.dev/OSV-2021-802","espeak-ng","","1.51.1","1.51.1","1.51.1","espeak-ng","2021A0000000802","False","Unclear if this is still valid.","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","OSV-2021-787","https://osv.dev/OSV-2021-787","espeak-ng","","1.51.1","1.51.1","1.51.1","espeak-ng","2021A0000000787","False","Unclear if this is still valid.","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","OSV-2021-777","https://osv.dev/OSV-2021-777","libxml2","","2.11.5","","","","2021A0000000777","True","Fixed by https://gitlab.gnome.org/GNOME/libxml2/-/commit/8f5ccada05ddd4a1ff8e399ad39fc7cd4bd33325, which went to 2.9.13. Therefore, this issue is fixed in 2.10.4.","err_missing_repology_version","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","OSV-2021-777","https://osv.dev/OSV-2021-777","libxml2","","2.11.7","","","","2021A0000000777","True","Fixed by https://gitlab.gnome.org/GNOME/libxml2/-/commit/8f5ccada05ddd4a1ff8e399ad39fc7cd4bd33325, which went to 2.9.13. Therefore, this issue is fixed in 2.10.4.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","OSV-2021-765","https://osv.dev/OSV-2021-765","espeak-ng","","1.51.1","1.51.1","1.51.1","espeak-ng","2021A0000000765","False","Unclear if this is still valid.","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","OSV-2021-594","https://osv.dev/OSV-2021-594","libheif","","1.15.2","1.15.2","1.17.6","libheif","2021A0000000594","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","OSV-2021-508","https://osv.dev/OSV-2021-508","libsass","","3.6.5","3.6.5","3.6.6","libsass","2021A0000000508","False","Unclear if this is still valid.","err_not_vulnerable_based_on_repology","" @@ -868,7 +856,7 @@ https://github.com/NixOS/nixpkgs/pull/82958" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2019-14860","https://nvd.nist.gov/vuln/detail/CVE-2019-14860","fuse","6.5","2.9.9-closefrom-glibc-2-34.patch?id=8a970396fca7aca2d5a761b8e7a8242f1eef14c9","","","","2019A0000014860","True","Incorrect package: Issue concerns redhat fuse (https://developers.redhat.com/products/fuse/overview) not libfuse https://github.com/libfuse/libfuse/ which is what 'fuse' package in nixpkgs refers. Issue gets included to the report due to vulnix's design decision to avoid false negatives with the cost of false positives.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2019-14860","https://nvd.nist.gov/vuln/detail/CVE-2019-14860","fuse","6.5","2.9.9","","","","2019A0000014860","True","Incorrect package: Issue concerns redhat fuse (https://developers.redhat.com/products/fuse/overview) not libfuse https://github.com/libfuse/libfuse/ which is what 'fuse' package in nixpkgs refers. Issue gets included to the report due to vulnix's design decision to avoid false negatives with the cost of false positives.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2019-14587","https://nvd.nist.gov/vuln/detail/CVE-2019-14587","edk2","6.5","202311","","","","2019A0000014587","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2019-14586","https://nvd.nist.gov/vuln/detail/CVE-2019-14586","edk2","8.0","202311","","","","2019A0000014586","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2019-14586","https://nvd.nist.gov/vuln/detail/CVE-2019-14586","edk2","8","202311","","","","2019A0000014586","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2019-14575","https://nvd.nist.gov/vuln/detail/CVE-2019-14575","edk2","7.8","202311","","","","2019A0000014575","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2019-14563","https://nvd.nist.gov/vuln/detail/CVE-2019-14563","edk2","7.8","202311","","","","2019A0000014563","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2019-14562","https://nvd.nist.gov/vuln/detail/CVE-2019-14562","edk2","5.5","202311","","","","2019A0000014562","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" @@ -885,21 +873,21 @@ https://github.com/NixOS/nixpkgs/pull/82958" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2018-8024","https://nvd.nist.gov/vuln/detail/CVE-2018-8024","firefox","5.4","122.0.1","122.0.1","122.0.1","firefox","2018A0000008024","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2018-7263","https://nvd.nist.gov/vuln/detail/CVE-2018-7263","libmad","9.8","0.15.1b","","","","2018A0000007263","True","Based on https://github.com/NixOS/nixpkgs/issues/57154, issue is fixed by https://github.com/NixOS/nixpkgs/commit/92edb0610923fab5a9dcc59b94652f1e8a5ea1ed.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2018-6553","https://nvd.nist.gov/vuln/detail/CVE-2018-6553","cups","8.8","2.4.7","","","","2018A0000006553","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2017-8806","https://nvd.nist.gov/vuln/detail/CVE-2017-8806","postgresql","5.5","15.5","16.1","16.2","postgresql","2017A0000008806","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2017-8806","https://nvd.nist.gov/vuln/detail/CVE-2017-8806","postgresql","5.5","15.6","16.1","16.2","postgresql","2017A0000008806","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2017-5628","https://nvd.nist.gov/vuln/detail/CVE-2017-5628","mujs","7.8","1.3.3","","","","2017A0000005628","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2017-5627","https://nvd.nist.gov/vuln/detail/CVE-2017-5627","mujs","7.8","1.3.3","","","","2017A0000005627","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2017-5511","https://nvd.nist.gov/vuln/detail/CVE-2017-5511","imagemagick","9.8","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2017A0000005511","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2017-5510","https://nvd.nist.gov/vuln/detail/CVE-2017-5510","imagemagick","7.8","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2017A0000005510","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2017-5509","https://nvd.nist.gov/vuln/detail/CVE-2017-5509","imagemagick","7.8","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2017A0000005509","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2017-5506","https://nvd.nist.gov/vuln/detail/CVE-2017-5506","imagemagick","7.8","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2017A0000005506","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2017-5511","https://nvd.nist.gov/vuln/detail/CVE-2017-5511","imagemagick","9.8","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2017A0000005511","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2017-5510","https://nvd.nist.gov/vuln/detail/CVE-2017-5510","imagemagick","7.8","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2017A0000005510","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2017-5509","https://nvd.nist.gov/vuln/detail/CVE-2017-5509","imagemagick","7.8","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2017A0000005509","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2017-5506","https://nvd.nist.gov/vuln/detail/CVE-2017-5506","imagemagick","7.8","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2017A0000005506","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2017-5436","https://nvd.nist.gov/vuln/detail/CVE-2017-5436","graphite2","8.8","1.3.14","","","","2017A0000005436","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-10146","https://nvd.nist.gov/vuln/detail/CVE-2016-10146","imagemagick","7.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000010146","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-10145","https://nvd.nist.gov/vuln/detail/CVE-2016-10145","imagemagick","9.8","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000010145","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-10144","https://nvd.nist.gov/vuln/detail/CVE-2016-10144","imagemagick","9.8","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000010144","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-10146","https://nvd.nist.gov/vuln/detail/CVE-2016-10146","imagemagick","7.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000010146","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-10145","https://nvd.nist.gov/vuln/detail/CVE-2016-10145","imagemagick","9.8","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000010145","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-10144","https://nvd.nist.gov/vuln/detail/CVE-2016-10144","imagemagick","9.8","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000010144","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-10141","https://nvd.nist.gov/vuln/detail/CVE-2016-10141","mujs","9.8","1.3.3","","","","2016A0000010141","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-10133","https://nvd.nist.gov/vuln/detail/CVE-2016-10133","mujs","9.8","1.3.3","","","","2016A0000010133","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-10132","https://nvd.nist.gov/vuln/detail/CVE-2016-10132","mujs","7.5","1.3.3","","","","2016A0000010132","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-10062","https://nvd.nist.gov/vuln/detail/CVE-2016-10062","imagemagick","5.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000010062","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-10062","https://nvd.nist.gov/vuln/detail/CVE-2016-10062","imagemagick","5.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000010062","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-9294","https://nvd.nist.gov/vuln/detail/CVE-2016-9294","mujs","7.5","1.3.3","","","","2016A0000009294","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-9136","https://nvd.nist.gov/vuln/detail/CVE-2016-9136","mujs","7.5","1.3.3","","","","2016A0000009136","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-9109","https://nvd.nist.gov/vuln/detail/CVE-2016-9109","mujs","7.5","1.3.3","","","","2016A0000009109","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" @@ -907,38 +895,38 @@ https://github.com/NixOS/nixpkgs/pull/82958" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-9017","https://nvd.nist.gov/vuln/detail/CVE-2016-9017","mujs","7.5","1.3.3","","","","2016A0000009017","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7564","https://nvd.nist.gov/vuln/detail/CVE-2016-7564","mujs","7.5","1.3.3","","","","2016A0000007564","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7563","https://nvd.nist.gov/vuln/detail/CVE-2016-7563","mujs","7.5","1.3.3","","","","2016A0000007563","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7538","https://nvd.nist.gov/vuln/detail/CVE-2016-7538","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007538","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7537","https://nvd.nist.gov/vuln/detail/CVE-2016-7537","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007537","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7536","https://nvd.nist.gov/vuln/detail/CVE-2016-7536","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007536","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7535","https://nvd.nist.gov/vuln/detail/CVE-2016-7535","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007535","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7534","https://nvd.nist.gov/vuln/detail/CVE-2016-7534","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007534","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7533","https://nvd.nist.gov/vuln/detail/CVE-2016-7533","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007533","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7532","https://nvd.nist.gov/vuln/detail/CVE-2016-7532","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007532","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7531","https://nvd.nist.gov/vuln/detail/CVE-2016-7531","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007531","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7530","https://nvd.nist.gov/vuln/detail/CVE-2016-7530","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007530","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7529","https://nvd.nist.gov/vuln/detail/CVE-2016-7529","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007529","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7528","https://nvd.nist.gov/vuln/detail/CVE-2016-7528","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007528","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7527","https://nvd.nist.gov/vuln/detail/CVE-2016-7527","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007527","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7526","https://nvd.nist.gov/vuln/detail/CVE-2016-7526","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007526","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7525","https://nvd.nist.gov/vuln/detail/CVE-2016-7525","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007525","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7524","https://nvd.nist.gov/vuln/detail/CVE-2016-7524","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007524","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7523","https://nvd.nist.gov/vuln/detail/CVE-2016-7523","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007523","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7522","https://nvd.nist.gov/vuln/detail/CVE-2016-7522","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007522","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7521","https://nvd.nist.gov/vuln/detail/CVE-2016-7521","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007521","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7520","https://nvd.nist.gov/vuln/detail/CVE-2016-7520","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007520","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7519","https://nvd.nist.gov/vuln/detail/CVE-2016-7519","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007519","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7518","https://nvd.nist.gov/vuln/detail/CVE-2016-7518","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007518","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7517","https://nvd.nist.gov/vuln/detail/CVE-2016-7517","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007517","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7516","https://nvd.nist.gov/vuln/detail/CVE-2016-7516","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007516","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7515","https://nvd.nist.gov/vuln/detail/CVE-2016-7515","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007515","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7514","https://nvd.nist.gov/vuln/detail/CVE-2016-7514","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007514","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7513","https://nvd.nist.gov/vuln/detail/CVE-2016-7513","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000007513","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7538","https://nvd.nist.gov/vuln/detail/CVE-2016-7538","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007538","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7537","https://nvd.nist.gov/vuln/detail/CVE-2016-7537","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007537","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7536","https://nvd.nist.gov/vuln/detail/CVE-2016-7536","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007536","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7535","https://nvd.nist.gov/vuln/detail/CVE-2016-7535","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007535","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7534","https://nvd.nist.gov/vuln/detail/CVE-2016-7534","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007534","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7533","https://nvd.nist.gov/vuln/detail/CVE-2016-7533","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007533","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7532","https://nvd.nist.gov/vuln/detail/CVE-2016-7532","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007532","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7531","https://nvd.nist.gov/vuln/detail/CVE-2016-7531","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007531","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7530","https://nvd.nist.gov/vuln/detail/CVE-2016-7530","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007530","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7529","https://nvd.nist.gov/vuln/detail/CVE-2016-7529","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007529","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7528","https://nvd.nist.gov/vuln/detail/CVE-2016-7528","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007528","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7527","https://nvd.nist.gov/vuln/detail/CVE-2016-7527","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007527","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7526","https://nvd.nist.gov/vuln/detail/CVE-2016-7526","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007526","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7525","https://nvd.nist.gov/vuln/detail/CVE-2016-7525","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007525","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7524","https://nvd.nist.gov/vuln/detail/CVE-2016-7524","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007524","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7523","https://nvd.nist.gov/vuln/detail/CVE-2016-7523","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007523","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7522","https://nvd.nist.gov/vuln/detail/CVE-2016-7522","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007522","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7521","https://nvd.nist.gov/vuln/detail/CVE-2016-7521","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007521","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7520","https://nvd.nist.gov/vuln/detail/CVE-2016-7520","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007520","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7519","https://nvd.nist.gov/vuln/detail/CVE-2016-7519","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007519","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7518","https://nvd.nist.gov/vuln/detail/CVE-2016-7518","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007518","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7517","https://nvd.nist.gov/vuln/detail/CVE-2016-7517","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007517","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7516","https://nvd.nist.gov/vuln/detail/CVE-2016-7516","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007516","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7515","https://nvd.nist.gov/vuln/detail/CVE-2016-7515","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007515","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7514","https://nvd.nist.gov/vuln/detail/CVE-2016-7514","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007514","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7513","https://nvd.nist.gov/vuln/detail/CVE-2016-7513","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000007513","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7506","https://nvd.nist.gov/vuln/detail/CVE-2016-7506","mujs","7.5","1.3.3","","","","2016A0000007506","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7504","https://nvd.nist.gov/vuln/detail/CVE-2016-7504","mujs","9.8","1.3.3","","","","2016A0000007504","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7153","https://nvd.nist.gov/vuln/detail/CVE-2016-7153","firefox","5.3","122.0.1","122.0.1","122.0.1","firefox","2016A0000007153","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-7152","https://nvd.nist.gov/vuln/detail/CVE-2016-7152","firefox","5.3","122.0.1","122.0.1","122.0.1","firefox","2016A0000007152","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-6131","https://nvd.nist.gov/vuln/detail/CVE-2016-6131","libiberty","7.5","12.3.0","","","","2016A0000006131","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-5118","https://nvd.nist.gov/vuln/detail/CVE-2016-5118","imagemagick","9.8","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2016A0000005118","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-5118","https://nvd.nist.gov/vuln/detail/CVE-2016-5118","imagemagick","9.8","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2016A0000005118","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-4493","https://nvd.nist.gov/vuln/detail/CVE-2016-4493","libiberty","5.5","12.3.0","","","","2016A0000004493","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-4492","https://nvd.nist.gov/vuln/detail/CVE-2016-4492","libiberty","4.4","12.3.0","","","","2016A0000004492","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-4491","https://nvd.nist.gov/vuln/detail/CVE-2016-4491","libiberty","5.5","12.3.0","","","","2016A0000004491","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" @@ -949,39 +937,39 @@ https://github.com/NixOS/nixpkgs/pull/82958" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-2781","https://nvd.nist.gov/vuln/detail/CVE-2016-2781","coreutils","6.5","9.3","","","","2016A0000002781","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2016-2226","https://nvd.nist.gov/vuln/detail/CVE-2016-2226","libiberty","7.8","12.3.0","","","","2016A0000002226","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2015-7313","https://nvd.nist.gov/vuln/detail/CVE-2015-7313","libtiff","5.5","4.6.0","","","","2015A0000007313","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9907","https://nvd.nist.gov/vuln/detail/CVE-2014-9907","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009907","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9854","https://nvd.nist.gov/vuln/detail/CVE-2014-9854","imagemagick","7.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009854","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9853","https://nvd.nist.gov/vuln/detail/CVE-2014-9853","imagemagick","5.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009853","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9852","https://nvd.nist.gov/vuln/detail/CVE-2014-9852","imagemagick","9.8","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009852","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9848","https://nvd.nist.gov/vuln/detail/CVE-2014-9848","imagemagick","7.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009848","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9831","https://nvd.nist.gov/vuln/detail/CVE-2014-9831","imagemagick","8.8","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009831","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9830","https://nvd.nist.gov/vuln/detail/CVE-2014-9830","imagemagick","8.8","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009830","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9829","https://nvd.nist.gov/vuln/detail/CVE-2014-9829","imagemagick","6.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009829","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9828","https://nvd.nist.gov/vuln/detail/CVE-2014-9828","imagemagick","8.8","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009828","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9827","https://nvd.nist.gov/vuln/detail/CVE-2014-9827","imagemagick","8.8","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009827","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9826","https://nvd.nist.gov/vuln/detail/CVE-2014-9826","imagemagick","9.8","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009826","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9825","https://nvd.nist.gov/vuln/detail/CVE-2014-9825","imagemagick","7.8","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009825","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9824","https://nvd.nist.gov/vuln/detail/CVE-2014-9824","imagemagick","7.8","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009824","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9823","https://nvd.nist.gov/vuln/detail/CVE-2014-9823","imagemagick","7.8","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009823","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9822","https://nvd.nist.gov/vuln/detail/CVE-2014-9822","imagemagick","7.8","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009822","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9821","https://nvd.nist.gov/vuln/detail/CVE-2014-9821","imagemagick","7.8","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009821","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9820","https://nvd.nist.gov/vuln/detail/CVE-2014-9820","imagemagick","7.8","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009820","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9819","https://nvd.nist.gov/vuln/detail/CVE-2014-9819","imagemagick","7.8","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009819","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9818","https://nvd.nist.gov/vuln/detail/CVE-2014-9818","imagemagick","5.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009818","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9817","https://nvd.nist.gov/vuln/detail/CVE-2014-9817","imagemagick","7.8","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009817","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9816","https://nvd.nist.gov/vuln/detail/CVE-2014-9816","imagemagick","5.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009816","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9815","https://nvd.nist.gov/vuln/detail/CVE-2014-9815","imagemagick","5.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009815","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9814","https://nvd.nist.gov/vuln/detail/CVE-2014-9814","imagemagick","5.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009814","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9813","https://nvd.nist.gov/vuln/detail/CVE-2014-9813","imagemagick","5.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009813","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9812","https://nvd.nist.gov/vuln/detail/CVE-2014-9812","imagemagick","5.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009812","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9811","https://nvd.nist.gov/vuln/detail/CVE-2014-9811","imagemagick","5.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009811","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9810","https://nvd.nist.gov/vuln/detail/CVE-2014-9810","imagemagick","5.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009810","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9809","https://nvd.nist.gov/vuln/detail/CVE-2014-9809","imagemagick","5.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009809","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9808","https://nvd.nist.gov/vuln/detail/CVE-2014-9808","imagemagick","5.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009808","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9807","https://nvd.nist.gov/vuln/detail/CVE-2014-9807","imagemagick","5.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009807","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9806","https://nvd.nist.gov/vuln/detail/CVE-2014-9806","imagemagick","5.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009806","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9805","https://nvd.nist.gov/vuln/detail/CVE-2014-9805","imagemagick","5.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009805","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9804","https://nvd.nist.gov/vuln/detail/CVE-2014-9804","imagemagick","7.5","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2014A0000009804","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9907","https://nvd.nist.gov/vuln/detail/CVE-2014-9907","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009907","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9854","https://nvd.nist.gov/vuln/detail/CVE-2014-9854","imagemagick","7.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009854","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9853","https://nvd.nist.gov/vuln/detail/CVE-2014-9853","imagemagick","5.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009853","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9852","https://nvd.nist.gov/vuln/detail/CVE-2014-9852","imagemagick","9.8","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009852","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9848","https://nvd.nist.gov/vuln/detail/CVE-2014-9848","imagemagick","7.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009848","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9831","https://nvd.nist.gov/vuln/detail/CVE-2014-9831","imagemagick","8.8","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009831","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9830","https://nvd.nist.gov/vuln/detail/CVE-2014-9830","imagemagick","8.8","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009830","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9829","https://nvd.nist.gov/vuln/detail/CVE-2014-9829","imagemagick","6.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009829","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9828","https://nvd.nist.gov/vuln/detail/CVE-2014-9828","imagemagick","8.8","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009828","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9827","https://nvd.nist.gov/vuln/detail/CVE-2014-9827","imagemagick","8.8","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009827","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9826","https://nvd.nist.gov/vuln/detail/CVE-2014-9826","imagemagick","9.8","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009826","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9825","https://nvd.nist.gov/vuln/detail/CVE-2014-9825","imagemagick","7.8","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009825","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9824","https://nvd.nist.gov/vuln/detail/CVE-2014-9824","imagemagick","7.8","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009824","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9823","https://nvd.nist.gov/vuln/detail/CVE-2014-9823","imagemagick","7.8","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009823","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9822","https://nvd.nist.gov/vuln/detail/CVE-2014-9822","imagemagick","7.8","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009822","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9821","https://nvd.nist.gov/vuln/detail/CVE-2014-9821","imagemagick","7.8","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009821","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9820","https://nvd.nist.gov/vuln/detail/CVE-2014-9820","imagemagick","7.8","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009820","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9819","https://nvd.nist.gov/vuln/detail/CVE-2014-9819","imagemagick","7.8","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009819","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9818","https://nvd.nist.gov/vuln/detail/CVE-2014-9818","imagemagick","5.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009818","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9817","https://nvd.nist.gov/vuln/detail/CVE-2014-9817","imagemagick","7.8","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009817","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9816","https://nvd.nist.gov/vuln/detail/CVE-2014-9816","imagemagick","5.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009816","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9815","https://nvd.nist.gov/vuln/detail/CVE-2014-9815","imagemagick","5.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009815","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9814","https://nvd.nist.gov/vuln/detail/CVE-2014-9814","imagemagick","5.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009814","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9813","https://nvd.nist.gov/vuln/detail/CVE-2014-9813","imagemagick","5.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009813","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9812","https://nvd.nist.gov/vuln/detail/CVE-2014-9812","imagemagick","5.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009812","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9811","https://nvd.nist.gov/vuln/detail/CVE-2014-9811","imagemagick","5.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009811","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9810","https://nvd.nist.gov/vuln/detail/CVE-2014-9810","imagemagick","5.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009810","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9809","https://nvd.nist.gov/vuln/detail/CVE-2014-9809","imagemagick","5.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009809","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9808","https://nvd.nist.gov/vuln/detail/CVE-2014-9808","imagemagick","5.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009808","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9807","https://nvd.nist.gov/vuln/detail/CVE-2014-9807","imagemagick","5.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009807","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9806","https://nvd.nist.gov/vuln/detail/CVE-2014-9806","imagemagick","5.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009806","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9805","https://nvd.nist.gov/vuln/detail/CVE-2014-9805","imagemagick","5.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009805","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9804","https://nvd.nist.gov/vuln/detail/CVE-2014-9804","imagemagick","7.5","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2014A0000009804","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-9157","https://nvd.nist.gov/vuln/detail/CVE-2014-9157","graphviz","","9.0.0","","","","2014A0000009157","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-6492","https://nvd.nist.gov/vuln/detail/CVE-2014-6492","firefox","","122.0.1","122.0.1","122.0.1","firefox","2014A0000006492","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2014-4860","https://nvd.nist.gov/vuln/detail/CVE-2014-4860","edk2","6.8","202311","","","","2014A0000004860","True","NVD data issue: CPE entry does not correctly state the version numbers.","err_missing_repology_version","" @@ -1005,7 +993,7 @@ https://github.com/NixOS/nixpkgs/pull/82958" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2007-3670","https://nvd.nist.gov/vuln/detail/CVE-2007-3670","firefox","","122.0.1","122.0.1","122.0.1","firefox","2007A0000003670","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2007-2176","https://nvd.nist.gov/vuln/detail/CVE-2007-2176","firefox","","122.0.1","122.0.1","122.0.1","firefox","2007A0000002176","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2007-1970","https://nvd.nist.gov/vuln/detail/CVE-2007-1970","firefox","","122.0.1","122.0.1","122.0.1","firefox","2007A0000001970","False","","err_not_vulnerable_based_on_repology","" -"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2007-1667","https://nvd.nist.gov/vuln/detail/CVE-2007-1667","imagemagick","","7.1.1-26","7.1.1-28","7.1.1.28","imagemagick","2007A0000001667","False","","err_not_vulnerable_based_on_repology","" +"packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2007-1667","https://nvd.nist.gov/vuln/detail/CVE-2007-1667","imagemagick","","7.1.1-27","7.1.1-28","7.1.1.28","imagemagick","2007A0000001667","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2007-0896","https://nvd.nist.gov/vuln/detail/CVE-2007-0896","firefox","","122.0.1","122.0.1","122.0.1","firefox","2007A0000000896","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2003-1492","https://nvd.nist.gov/vuln/detail/CVE-2003-1492","firefox","","122.0.1","122.0.1","122.0.1","firefox","2003A0000001492","False","","err_not_vulnerable_based_on_repology","" "packages.x86_64-linux.generic-x86_64-release","github:tiiuae/ghaf?ref=main","nix_unstable","GHSA-w596-4wvx-j9j6","https://osv.dev/GHSA-w596-4wvx-j9j6","py","","1.11.0","1.11.0","1.11.0","python:py","2024A1708041600","False","","err_not_vulnerable_based_on_repology","" @@ -1659,13 +1647,10 @@ https://github.com/NixOS/nixpkgs/pull/84664" "packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","current","CVE-2010-4226","https://nvd.nist.gov/vuln/detail/CVE-2010-4226","cpio","","2.14","","","","2010A0000004226","True","NVD data issue: concerns OpenSuSE, not cpio.","err_missing_repology_version","" "packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","GHSA-w596-4wvx-j9j6","https://osv.dev/GHSA-w596-4wvx-j9j6","py","","1.11.0","1.11.0","1.11.0","python:py","2024A1708041600","False","","err_not_vulnerable_based_on_repology","" "packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","GHSA-fwr7-v2mv-hh25","https://osv.dev/GHSA-fwr7-v2mv-hh25","async","","2.2.4","2.2.5","2.2.5","haskell:async","2024A1707782400","False","","err_not_vulnerable_based_on_repology","" -"packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2024-25062","https://nvd.nist.gov/vuln/detail/CVE-2024-25062","libxml2","7.5","2.11.5","2.12.4","2.12.5","libxml2","2024A0000025062","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/286300" -"packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2024-24806","https://nvd.nist.gov/vuln/detail/CVE-2024-24806","libuv","9.8","1.46.0","1.47.0","1.48.0","libuv","2024A0000024806","False","","fix_not_available","https://github.com/NixOS/nixpkgs/pull/287226" +"packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2024-24806","https://nvd.nist.gov/vuln/detail/CVE-2024-24806","libuv","9.8","1.48.0","1.47.0","1.48.0","libuv","2024A0000024806","False","","fix_not_available","https://github.com/NixOS/nixpkgs/pull/287226" "packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2024-22667","https://nvd.nist.gov/vuln/detail/CVE-2024-22667","vim","7.8","9.0.2116","9.1.0004","9.1.0113","vim","2024A0000022667","False","","fix_update_to_version_nixpkgs","https://github.com/NixOS/nixpkgs/pull/276595 https://github.com/NixOS/nixpkgs/pull/284984" "packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2024-22365","https://nvd.nist.gov/vuln/detail/CVE-2024-22365","linux-pam","5.5","1.5.2","","","","2024A0000022365","False","","err_missing_repology_version","https://github.com/NixOS/nixpkgs/pull/282136" -"packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2024-0727","https://nvd.nist.gov/vuln/detail/CVE-2024-0727","openssl","5.5","3.0.12","3.2.0","3.2.0","ruby:openssl","2024A0000000727","False","","err_not_vulnerable_based_on_repology","https://github.com/NixOS/nixpkgs/pull/285019 -https://github.com/NixOS/nixpkgs/pull/285027" "packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2024-0684","https://nvd.nist.gov/vuln/detail/CVE-2024-0684","coreutils","5.5","9.3","9.4","9.4","coreutils","2024A0000000684","False","","fix_not_available","" "packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","GHSA-gmwp-3pwc-3j3g","https://osv.dev/GHSA-gmwp-3pwc-3j3g","mockery","","0.3.5","0.3.5","0.3.5","haskell:mockery","2023A1690502400","False","","err_not_vulnerable_based_on_repology","" "packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-52356","https://nvd.nist.gov/vuln/detail/CVE-2023-52356","libtiff","7.5","4.6.0","4.6.0","4.6.0","tiff","2023A0000052356","False","","err_not_vulnerable_based_on_repology","" @@ -1684,9 +1669,6 @@ https://github.com/NixOS/nixpkgs/pull/288071" "packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-45853","https://nvd.nist.gov/vuln/detail/CVE-2023-45853","zlib","9.8","1.3","1.3.1","1.3.1","zlib","2023A0000045853","False","","fix_update_to_version_nixpkgs","https://github.com/NixOS/nixpkgs/pull/262722 https://github.com/NixOS/nixpkgs/pull/263083 https://github.com/NixOS/nixpkgs/pull/283179" -"packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-45322","https://nvd.nist.gov/vuln/detail/CVE-2023-45322","libxml2","6.5","2.11.5","2.12.4","2.12.5","libxml2","2023A0000045322","False","","fix_update_to_version_nixpkgs","https://github.com/NixOS/nixpkgs/pull/282347 -https://github.com/NixOS/nixpkgs/pull/283888 -https://github.com/NixOS/nixpkgs/pull/286300" "packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-42366","https://nvd.nist.gov/vuln/detail/CVE-2023-42366","busybox","5.5","1.36.1","1.36.1","1.36.1","busybox","2023A0000042366","False","","fix_not_available","" "packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-42365","https://nvd.nist.gov/vuln/detail/CVE-2023-42365","busybox","5.5","1.36.1","1.36.1","1.36.1","busybox","2023A0000042365","False","","fix_not_available","" "packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-42364","https://nvd.nist.gov/vuln/detail/CVE-2023-42364","busybox","5.5","1.36.1","1.36.1","1.36.1","busybox","2023A0000042364","False","","fix_not_available","" @@ -1706,29 +1688,25 @@ https://github.com/NixOS/nixpkgs/pull/286300" "packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-25584","https://nvd.nist.gov/vuln/detail/CVE-2023-25584","binutils","7.1","2.40","2.40","2.42","binutils","2023A0000025584","False","","err_not_vulnerable_based_on_repology","" "packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-7216","https://nvd.nist.gov/vuln/detail/CVE-2023-7216","cpio","8.8","2.14","2.15","2.15","cpio","2023A0000007216","False","","err_not_vulnerable_based_on_repology","" "packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-6992","https://nvd.nist.gov/vuln/detail/CVE-2023-6992","zlib","5.5","1.3","1.3.1","1.3.1","zlib","2023A0000006992","False","","err_not_vulnerable_based_on_repology","" -"packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-6780","https://nvd.nist.gov/vuln/detail/CVE-2023-6780","glibc","5.3","2.38-27","2.38-44","2.39","glibc","2023A0000006780","False","","fix_not_available","https://github.com/NixOS/nixpkgs/pull/285050 +"packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-6780","https://nvd.nist.gov/vuln/detail/CVE-2023-6780","glibc","5.3","2.38-44","2.38-44","2.39","glibc","2023A0000006780","False","","fix_not_available","https://github.com/NixOS/nixpkgs/pull/285050 https://github.com/NixOS/nixpkgs/pull/285329" -"packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-6779","https://nvd.nist.gov/vuln/detail/CVE-2023-6779","glibc","7.5","2.38-27","2.38-44","2.39","glibc","2023A0000006779","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/285050 +"packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-6779","https://nvd.nist.gov/vuln/detail/CVE-2023-6779","glibc","7.5","2.38-44","2.38-44","2.39","glibc","2023A0000006779","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/285050 https://github.com/NixOS/nixpkgs/pull/285329 https://github.com/NixOS/nixpkgs/pull/287594" "packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-6693","https://nvd.nist.gov/vuln/detail/CVE-2023-6693","qemu","5.3","8.1.5","8.2.1","8.2.1","qemu","2023A0000006693","False","","err_not_vulnerable_based_on_repology","https://github.com/NixOS/nixpkgs/pull/284249 https://github.com/NixOS/nixpkgs/pull/284489" "packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-6683","https://nvd.nist.gov/vuln/detail/CVE-2023-6683","qemu","6.5","8.1.5","8.2.1","8.2.1","qemu","2023A0000006683","False","","err_not_vulnerable_based_on_repology","" "packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-6277","https://nvd.nist.gov/vuln/detail/CVE-2023-6277","libtiff","6.5","4.6.0","4.6.0","4.6.0","tiff","2023A0000006277","False","","err_not_vulnerable_based_on_repology","" -"packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-6246","https://nvd.nist.gov/vuln/detail/CVE-2023-6246","glibc","7.8","2.38-27","2.38-44","2.39","glibc","2023A0000006246","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/285050 +"packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-6246","https://nvd.nist.gov/vuln/detail/CVE-2023-6246","glibc","7.8","2.38-44","2.38-44","2.39","glibc","2023A0000006246","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/285050 https://github.com/NixOS/nixpkgs/pull/285329 https://github.com/NixOS/nixpkgs/pull/285587 https://github.com/NixOS/nixpkgs/pull/285588 https://github.com/NixOS/nixpkgs/pull/287594" "packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-6228","https://nvd.nist.gov/vuln/detail/CVE-2023-6228","libtiff","5.5","4.6.0","4.6.0","4.6.0","tiff","2023A0000006228","False","","err_not_vulnerable_based_on_repology","" -"packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-6129","https://nvd.nist.gov/vuln/detail/CVE-2023-6129","openssl","6.5","3.0.12","3.2.0","3.2.0","ruby:openssl","2023A0000006129","False","","err_not_vulnerable_based_on_repology","https://github.com/NixOS/nixpkgs/pull/285019 -https://github.com/NixOS/nixpkgs/pull/285027" "packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-5841","https://nvd.nist.gov/vuln/detail/CVE-2023-5841","openexr","9.1","2.5.8","3.2.1","3.2.126","openexr","2023A0000005841","False","","fix_update_to_version_upstream","" -"packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-5678","https://nvd.nist.gov/vuln/detail/CVE-2023-5678","openssl","5.3","3.0.12","3.2.0","3.2.0","ruby:openssl","2023A0000005678","False","","err_not_vulnerable_based_on_repology","https://github.com/NixOS/nixpkgs/pull/285019 -https://github.com/NixOS/nixpkgs/pull/285027" -"packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-5156","https://nvd.nist.gov/vuln/detail/CVE-2023-5156","glibc","7.5","2.38-27","2.38-44","2.39","glibc","2023A0000005156","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/287594" +"packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-5156","https://nvd.nist.gov/vuln/detail/CVE-2023-5156","glibc","7.5","2.38-44","2.38-44","2.39","glibc","2023A0000005156","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/287594" "packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-5088","https://nvd.nist.gov/vuln/detail/CVE-2023-5088","qemu","7","8.1.5","8.2.1","8.2.1","qemu","2023A0000005088","False","","err_not_vulnerable_based_on_repology","" -"packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-4527","https://nvd.nist.gov/vuln/detail/CVE-2023-4527","glibc","6.5","2.38-27","2.38-44","2.39","glibc","2023A0000004527","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/256887 +"packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-4527","https://nvd.nist.gov/vuln/detail/CVE-2023-4527","glibc","6.5","2.38-44","2.38-44","2.39","glibc","2023A0000004527","False","","fix_update_to_version_upstream","https://github.com/NixOS/nixpkgs/pull/256887 https://github.com/NixOS/nixpkgs/pull/287594" "packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-4039","https://nvd.nist.gov/vuln/detail/CVE-2023-4039","gcc","4.8","12.3.0","13.2.0","13.2.0","gcc","2023A0000004039","False","","fix_not_available","" "packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2023-3164","https://nvd.nist.gov/vuln/detail/CVE-2023-3164","libtiff","5.5","4.6.0","4.6.0","4.6.0","tiff","2023A0000003164","False","","err_not_vulnerable_based_on_repology","" @@ -1759,7 +1737,7 @@ https://github.com/NixOS/nixpkgs/pull/253430" "packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2022-30947","https://nvd.nist.gov/vuln/detail/CVE-2022-30947","git","7.5","2.42.0","","","","2022A0000030947","True","Incorrect package: Impacts Jenkins git plugin, not git. Issue gets included to the report due to vulnix's design decision to avoid false negatives with the cost of false positives: https://github.com/nix-community/vulnix/blob/f56f3ac857626171b95e51d98cb6874278f789d3/src/vulnix/vulnerability.py#L90-L96.","err_missing_repology_version","" "packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2022-28321","https://nvd.nist.gov/vuln/detail/CVE-2022-28321","linux-pam","9.8","1.5.2","","","","2022A0000028321","True","Only impacts SUSE-specific patch version. Notice: repology package name is pam: https://repology.org/project/pam/versions.","err_missing_repology_version","" "packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","MAL-2022-4301","https://osv.dev/MAL-2022-4301","libidn2","","2.3.4","","","","2022A0000004301","True","Incorrect package: Issue refers npm libidn2, whereas, nixpkgs refers libidn2 https://gitlab.com/libidn/libidn2.","err_missing_repology_version","" -"packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2022-3219","https://nvd.nist.gov/vuln/detail/CVE-2022-3219","gnupg","3.3","2.4.1","","","","2022A0000003219","True","Fix patch is not accepted upstream: https://dev.gnupg.org/D556.","err_missing_repology_version","" +"packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2022-3219","https://nvd.nist.gov/vuln/detail/CVE-2022-3219","gnupg","3.3","2.4.4","","","","2022A0000003219","True","Fix patch is not accepted upstream: https://dev.gnupg.org/D556.","err_missing_repology_version","" "packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","OSV-2022-725","https://osv.dev/OSV-2022-725","libjxl","","0.8.2","0.9.1","0.9.2","libjxl","2022A0000000725","False","Unclear if this is still valid.","err_not_vulnerable_based_on_repology","" "packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","OSV-2022-608","https://osv.dev/OSV-2022-608","libjxl","","0.8.2","0.9.1","0.9.2","libjxl","2022A0000000608","False","Unclear if this is still valid.","err_not_vulnerable_based_on_repology","" "packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","OSV-2022-581","https://osv.dev/OSV-2022-581","qemu","","8.1.5","8.2.1","8.2.1","qemu","2022A0000000581","False","Unclear if this is still valid.","err_not_vulnerable_based_on_repology","" @@ -1795,7 +1773,7 @@ https://github.com/NixOS/nixpkgs/pull/253430" "packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2021-3605","https://nvd.nist.gov/vuln/detail/CVE-2021-3605","openexr","5.5","2.5.8","","","","2021A0000003605","True","False positive to the NVD data issue. Fixed in openexr 2.5.8. Upstream fix PR https://github.com/AcademySoftwareFoundation/openexr/pull/1040 which went to 2.5.7.","err_missing_repology_version","" "packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2021-3598","https://nvd.nist.gov/vuln/detail/CVE-2021-3598","openexr","5.5","2.5.8","","","","2021A0000003598","True","False positive to the NVD data issue. Fixed in openexr 2.5.8. Upstream fix PR https://github.com/AcademySoftwareFoundation/openexr/pull/1040 which went to 2.5.7.","err_missing_repology_version","" "packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","OSV-2021-820","https://osv.dev/OSV-2021-820","qemu","","8.1.5","","","","2021A0000000820","True","Fixed based on https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=34831#c2.","err_missing_repology_version","" -"packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","OSV-2021-777","https://osv.dev/OSV-2021-777","libxml2","","2.11.5","","","","2021A0000000777","True","Fixed by https://gitlab.gnome.org/GNOME/libxml2/-/commit/8f5ccada05ddd4a1ff8e399ad39fc7cd4bd33325, which went to 2.9.13. Therefore, this issue is fixed in 2.10.4.","err_missing_repology_version","" +"packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","OSV-2021-777","https://osv.dev/OSV-2021-777","libxml2","","2.11.7","","","","2021A0000000777","True","Fixed by https://gitlab.gnome.org/GNOME/libxml2/-/commit/8f5ccada05ddd4a1ff8e399ad39fc7cd4bd33325, which went to 2.9.13. Therefore, this issue is fixed in 2.10.4.","err_missing_repology_version","" "packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2020-16194","https://nvd.nist.gov/vuln/detail/CVE-2020-16194","quote","5.3","1.0.33","","","","2020A0000016194","True","Incorrect package: Issue concerns prestashop product: https://prestashop.com/, whereas, nixpkgs ""quote"" refers rust package 'quote': https://docs.rs/quote/latest/quote/.","err_missing_repology_version","" "packages.riscv64-linux.microchip-icicle-kit-release","github:tiiuae/ghaf?ref=main","lock_updated","CVE-2020-2136","https://nvd.nist.gov/vuln/detail/CVE-2020-2136","git","5.4","2.42.0","2.43.0","2.43.2","git","2020A0000002136","False","","err_not_vulnerable_based_on_repology","https://github.com/NixOS/nixpkgs/pull/82872 https://github.com/NixOS/nixpkgs/pull/84664" diff --git a/reports/main/packages.riscv64-linux.microchip-icicle-kit-release.md b/reports/main/packages.riscv64-linux.microchip-icicle-kit-release.md index 9986271..01519a5 100644 --- a/reports/main/packages.riscv64-linux.microchip-icicle-kit-release.md +++ b/reports/main/packages.riscv64-linux.microchip-icicle-kit-release.md @@ -31,16 +31,21 @@ Update the target Ghaf [flake.lock](https://github.com/tiiuae/ghaf/blob/main/fla | vuln_id | package | severity | version_local | nix_unstable | upstream | comment | |-------------------------------------------------------------------|-----------|------------|-----------------|----------------|------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | [CVE-2023-47100](https://nvd.nist.gov/vuln/detail/CVE-2023-47100) | perl | 9.8 | 5.38.0 | 5.38.2 | 5.38.2 | *[[PR](https://github.com/NixOS/nixpkgs/pull/269996), [PR](https://github.com/NixOS/nixpkgs/pull/271223)]* | +| [CVE-2024-25062](https://nvd.nist.gov/vuln/detail/CVE-2024-25062) | libxml2 | 7.5 | 2.11.5 | 2.12.4 | 2.12.5 | *[[PR](https://github.com/NixOS/nixpkgs/pull/286300)]* | | [CVE-2024-0567](https://nvd.nist.gov/vuln/detail/CVE-2024-0567) | gnutls | 7.5 | 3.8.2 | 3.8.3 | 3.8.3 | *[[PR](https://github.com/NixOS/nixpkgs/pull/281471), [PR](https://github.com/NixOS/nixpkgs/pull/281775)]* | | [CVE-2024-0553](https://nvd.nist.gov/vuln/detail/CVE-2024-0553) | gnutls | 7.5 | 3.8.2 | 3.8.3 | 3.8.3 | *[[PR](https://github.com/NixOS/nixpkgs/pull/281471), [PR](https://github.com/NixOS/nixpkgs/pull/281775)]* | | [CVE-2023-51767](https://nvd.nist.gov/vuln/detail/CVE-2023-51767) | openssh | 7 | 9.5p1 | 9.6p1 | 9.6p1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/275249), [PR](https://github.com/NixOS/nixpkgs/pull/275399), [PR](https://github.com/NixOS/nixpkgs/pull/275587)]* | | [CVE-2023-51385](https://nvd.nist.gov/vuln/detail/CVE-2023-51385) | openssh | 6.5 | 9.5p1 | 9.6p1 | 9.6p1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/275249), [PR](https://github.com/NixOS/nixpkgs/pull/275399), [PR](https://github.com/NixOS/nixpkgs/pull/275587)]* | +| [CVE-2023-45322](https://nvd.nist.gov/vuln/detail/CVE-2023-45322) | libxml2 | 6.5 | 2.11.5 | 2.12.4 | 2.12.5 | *[[PR](https://github.com/NixOS/nixpkgs/pull/282347), [PR](https://github.com/NixOS/nixpkgs/pull/283888), [PR](https://github.com/NixOS/nixpkgs/pull/286300)]* | +| [CVE-2023-6129](https://nvd.nist.gov/vuln/detail/CVE-2023-6129) | openssl | 6.5 | 3.0.12 | 3.2.0 | 3.2.0 | *[[PR](https://github.com/NixOS/nixpkgs/pull/285019), [PR](https://github.com/NixOS/nixpkgs/pull/285027)]* | | [CVE-2023-48795](https://nvd.nist.gov/vuln/detail/CVE-2023-48795) | openssh | 5.9 | 9.5p1 | 9.6p1 | 9.6p1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/275250), [PR](https://github.com/NixOS/nixpkgs/pull/275641), [PR](https://github.com/NixOS/nixpkgs/pull/276242), [PR](https://github.com/NixOS/nixpkgs/pull/276504), [PR](https://github.com/NixOS/nixpkgs/pull/276505)]* | | [CVE-2023-48795](https://nvd.nist.gov/vuln/detail/CVE-2023-48795) | libssh2 | 5.9 | 1.11.0 | 1.11.0 | 1.11.0 | *[[PR](https://github.com/NixOS/nixpkgs/pull/275250), [PR](https://github.com/NixOS/nixpkgs/pull/275641), [PR](https://github.com/NixOS/nixpkgs/pull/276242), [PR](https://github.com/NixOS/nixpkgs/pull/276504), [PR](https://github.com/NixOS/nixpkgs/pull/276505)]* | +| [CVE-2024-0727](https://nvd.nist.gov/vuln/detail/CVE-2024-0727) | openssl | 5.5 | 3.0.12 | 3.2.0 | 3.2.0 | *[[PR](https://github.com/NixOS/nixpkgs/pull/285019), [PR](https://github.com/NixOS/nixpkgs/pull/285027)]* | | [CVE-2023-51384](https://nvd.nist.gov/vuln/detail/CVE-2023-51384) | openssh | 5.5 | 9.5p1 | 9.6p1 | 9.6p1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/275249), [PR](https://github.com/NixOS/nixpkgs/pull/275399), [PR](https://github.com/NixOS/nixpkgs/pull/275587)]* | | [CVE-2023-50268](https://nvd.nist.gov/vuln/detail/CVE-2023-50268) | jq | 5.5 | 1.7 | 1.7.1 | 1.7.1 | | | [CVE-2023-50246](https://nvd.nist.gov/vuln/detail/CVE-2023-50246) | jq | 5.5 | 1.7 | 1.7.1 | 1.7.1 | | | [CVE-2023-46246](https://nvd.nist.gov/vuln/detail/CVE-2023-46246) | vim | 5.5 | 9.0.2048 | 9.1.0004 | 9.1.0113 | *[[PR](https://github.com/NixOS/nixpkgs/pull/276595), [PR](https://github.com/NixOS/nixpkgs/pull/284984)]* | +| [CVE-2023-5678](https://nvd.nist.gov/vuln/detail/CVE-2023-5678) | openssl | 5.3 | 3.0.12 | 3.2.0 | 3.2.0 | *[[PR](https://github.com/NixOS/nixpkgs/pull/285019), [PR](https://github.com/NixOS/nixpkgs/pull/285027)]* | | [CVE-2023-48237](https://nvd.nist.gov/vuln/detail/CVE-2023-48237) | vim | 4.3 | 9.0.2048 | 9.1.0004 | 9.1.0113 | *[[PR](https://github.com/NixOS/nixpkgs/pull/276595), [PR](https://github.com/NixOS/nixpkgs/pull/284984)]* | | [CVE-2023-48236](https://nvd.nist.gov/vuln/detail/CVE-2023-48236) | vim | 4.3 | 9.0.2048 | 9.1.0004 | 9.1.0113 | *[[PR](https://github.com/NixOS/nixpkgs/pull/276595), [PR](https://github.com/NixOS/nixpkgs/pull/284984)]* | | [CVE-2023-48235](https://nvd.nist.gov/vuln/detail/CVE-2023-48235) | vim | 4.3 | 9.0.2048 | 9.1.0004 | 9.1.0113 | *[[PR](https://github.com/NixOS/nixpkgs/pull/276595), [PR](https://github.com/NixOS/nixpkgs/pull/284984)]* | @@ -67,13 +72,9 @@ Consider [whitelisting](../../manual_analysis.csv) possible false positives base | [CVE-2021-43138](https://nvd.nist.gov/vuln/detail/CVE-2021-43138) | async | 7.8 | 2.2.4-r4.cabal | 2.2.5 | 2.2.5 | | | [CVE-2021-43138](https://nvd.nist.gov/vuln/detail/CVE-2021-43138) | async | 7.8 | 2.2.4 | 2.2.5 | 2.2.5 | | | [CVE-2023-46218](https://nvd.nist.gov/vuln/detail/CVE-2023-46218) | curl | 6.5 | 8.4.0 | 8.6.0 | 8.6.0 | *[[PR](https://github.com/NixOS/nixpkgs/pull/285295), [PR](https://github.com/NixOS/nixpkgs/pull/288071)]* | -| [CVE-2023-45322](https://nvd.nist.gov/vuln/detail/CVE-2023-45322) | libxml2 | 6.5 | 2.11.5 | 2.12.4 | 2.12.5 | *[[PR](https://github.com/NixOS/nixpkgs/pull/282347), [PR](https://github.com/NixOS/nixpkgs/pull/283888), [PR](https://github.com/NixOS/nixpkgs/pull/286300)]* | -| [CVE-2023-6129](https://nvd.nist.gov/vuln/detail/CVE-2023-6129) | openssl | 6.5 | 3.0.12 | 3.2.0 | 3.2.0 | *[[PR](https://github.com/NixOS/nixpkgs/pull/285019), [PR](https://github.com/NixOS/nixpkgs/pull/285027)]* | | [CVE-2024-22365](https://nvd.nist.gov/vuln/detail/CVE-2024-22365) | linux-pam | 5.5 | 1.5.2 | | | *[[PR](https://github.com/NixOS/nixpkgs/pull/282136)]* | -| [CVE-2024-0727](https://nvd.nist.gov/vuln/detail/CVE-2024-0727) | openssl | 5.5 | 3.0.12 | 3.2.0 | 3.2.0 | *[[PR](https://github.com/NixOS/nixpkgs/pull/285019), [PR](https://github.com/NixOS/nixpkgs/pull/285027)]* | | [CVE-2023-52071](https://nvd.nist.gov/vuln/detail/CVE-2023-52071) | curl | 5.3 | 8.4.0 | 8.6.0 | 8.6.0 | *[[PR](https://github.com/NixOS/nixpkgs/pull/285295), [PR](https://github.com/NixOS/nixpkgs/pull/288071)]* | | [CVE-2023-46219](https://nvd.nist.gov/vuln/detail/CVE-2023-46219) | curl | 5.3 | 8.4.0 | 8.6.0 | 8.6.0 | *[[PR](https://github.com/NixOS/nixpkgs/pull/285295), [PR](https://github.com/NixOS/nixpkgs/pull/288071)]* | -| [CVE-2023-5678](https://nvd.nist.gov/vuln/detail/CVE-2023-5678) | openssl | 5.3 | 3.0.12 | 3.2.0 | 3.2.0 | *[[PR](https://github.com/NixOS/nixpkgs/pull/285019), [PR](https://github.com/NixOS/nixpkgs/pull/285027)]* | | [CVE-2023-48706](https://nvd.nist.gov/vuln/detail/CVE-2023-48706) | vim | 4.7 | 9.0.2116 | 9.1.0004 | 9.1.0113 | *[[PR](https://github.com/NixOS/nixpkgs/pull/276595), [PR](https://github.com/NixOS/nixpkgs/pull/284984)]* | | [GHSA-w596-4wvx-j9j6](https://osv.dev/GHSA-w596-4wvx-j9j6) | py | | 1.11.0 | 1.11.0 | 1.11.0 | | | [OSV-2022-725](https://osv.dev/OSV-2022-725) | libjxl | | 0.8.2 | 0.9.1 | 0.9.2 | Unclear if this is still valid. | @@ -226,6 +227,7 @@ Following table lists vulnerabilities that would otherwise have been included to | [CVE-2017-5436](https://nvd.nist.gov/vuln/detail/CVE-2017-5436) | graphite2 | 8.8 | 1.3.14 | NVD data issue: CPE entry does not correctly state the version numbers. | | [CVE-2022-48434](https://nvd.nist.gov/vuln/detail/CVE-2022-48434) | ffmpeg | 8.1 | 4.4.4 | Scanners get confused by LTS release versions (non-linear version numbers). Upstream fix patch for 4.4.x is merged in 4.4.3 [link](https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/d4b7b3c03ee2baf0166ce49dff17ec9beff684db). | | [CVE-2019-14586](https://nvd.nist.gov/vuln/detail/CVE-2019-14586) | edk2 | 8.0 | 202311 | NVD data issue: CPE entry does not correctly state the version numbers. | +| [CVE-2019-14586](https://nvd.nist.gov/vuln/detail/CVE-2019-14586) | edk2 | 8 | 202311 | NVD data issue: CPE entry does not correctly state the version numbers. | | [CVE-2021-26720](https://nvd.nist.gov/vuln/detail/CVE-2021-26720) | avahi | 7.8 | 0.8 | False positive: issue refers avahi-daemon-check-dns.sh in the Debian avahi package. As such, the issue is specific to Debian and its derivatives. | | [CVE-2019-14575](https://nvd.nist.gov/vuln/detail/CVE-2019-14575) | edk2 | 7.8 | 202311 | NVD data issue: CPE entry does not correctly state the version numbers. | | [CVE-2019-14563](https://nvd.nist.gov/vuln/detail/CVE-2019-14563) | edk2 | 7.8 | 202311 | NVD data issue: CPE entry does not correctly state the version numbers. | @@ -369,6 +371,7 @@ Following table lists vulnerabilities that would otherwise have been included to | [OSV-2021-820](https://osv.dev/OSV-2021-820) | qemu | | 8.1.5 | Fixed based on [link](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=34831#c2). | | [OSV-2021-820](https://osv.dev/OSV-2021-820) | qemu | | 8.1.3 | Fixed based on [link](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=34831#c2). | | [OSV-2021-777](https://osv.dev/OSV-2021-777) | libxml2 | | 2.12.4 | Fixed by [link](https://gitlab.gnome.org/GNOME/libxml2/-/commit/8f5ccada05ddd4a1ff8e399ad39fc7cd4bd33325), which went to 2.9.13. Therefore, this issue is fixed in 2.10.4. | +| [OSV-2021-777](https://osv.dev/OSV-2021-777) | libxml2 | | 2.11.7 | Fixed by [link](https://gitlab.gnome.org/GNOME/libxml2/-/commit/8f5ccada05ddd4a1ff8e399ad39fc7cd4bd33325), which went to 2.9.13. Therefore, this issue is fixed in 2.10.4. | | [OSV-2021-777](https://osv.dev/OSV-2021-777) | libxml2 | | 2.11.5 | Fixed by [link](https://gitlab.gnome.org/GNOME/libxml2/-/commit/8f5ccada05ddd4a1ff8e399ad39fc7cd4bd33325), which went to 2.9.13. Therefore, this issue is fixed in 2.10.4. | | [CVE-2014-9157](https://nvd.nist.gov/vuln/detail/CVE-2014-9157) | graphviz | | 9.0.0 | NVD data issue: CPE entry does not correctly state the version numbers. | | [CVE-2012-3509](https://nvd.nist.gov/vuln/detail/CVE-2012-3509) | libiberty | | 13.2.0 | NVD data issue: CPE entry does not correctly state the version numbers. | diff --git a/reports/main/packages.x86_64-linux.generic-x86_64-release.md b/reports/main/packages.x86_64-linux.generic-x86_64-release.md index b83d736..fe13b2e 100644 --- a/reports/main/packages.x86_64-linux.generic-x86_64-release.md +++ b/reports/main/packages.x86_64-linux.generic-x86_64-release.md @@ -46,7 +46,9 @@ Update the target Ghaf [flake.lock](https://github.com/tiiuae/ghaf/blob/main/fla | [CVE-2023-6858](https://nvd.nist.gov/vuln/detail/CVE-2023-6858) | firefox | 8.8 | 120.0.1 | 122.0.1 | 122.0.1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/286601), [PR](https://github.com/NixOS/nixpkgs/pull/286735)]* | | [CVE-2023-6856](https://nvd.nist.gov/vuln/detail/CVE-2023-6856) | firefox | 8.8 | 120.0.1 | 122.0.1 | 122.0.1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/286601), [PR](https://github.com/NixOS/nixpkgs/pull/286735)]* | | [CVE-2023-43887](https://nvd.nist.gov/vuln/detail/CVE-2023-43887) | libde265 | 8.1 | 1.0.12 | 1.0.15 | 1.0.15 | *[[PR](https://github.com/NixOS/nixpkgs/pull/268884), [PR](https://github.com/NixOS/nixpkgs/pull/271642), [PR](https://github.com/NixOS/nixpkgs/pull/271643), [PR](https://github.com/NixOS/nixpkgs/pull/275720), [PR](https://github.com/NixOS/nixpkgs/pull/276799)]* | +| [CVE-2024-0985](https://nvd.nist.gov/vuln/detail/CVE-2024-0985) | postgresql | 8 | 15.5 | 16.1 | 16.2 | *[[PR](https://github.com/NixOS/nixpkgs/pull/266642), [PR](https://github.com/NixOS/nixpkgs/pull/287353)]* | | [CVE-2024-0409](https://nvd.nist.gov/vuln/detail/CVE-2024-0409) | xorg-server | 7.8 | 21.1.9 | 21.1.11 | 21.1.11 | | +| [CVE-2024-25062](https://nvd.nist.gov/vuln/detail/CVE-2024-25062) | libxml2 | 7.5 | 2.11.5 | 2.12.4 | 2.12.5 | *[[PR](https://github.com/NixOS/nixpkgs/pull/286300)]* | | [CVE-2024-0744](https://nvd.nist.gov/vuln/detail/CVE-2024-0744) | firefox | 7.5 | 120.0.1 | 122.0.1 | 122.0.1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/286601), [PR](https://github.com/NixOS/nixpkgs/pull/286735)]* | | [CVE-2024-0743](https://nvd.nist.gov/vuln/detail/CVE-2024-0743) | firefox | 7.5 | 120.0.1 | 122.0.1 | 122.0.1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/286601), [PR](https://github.com/NixOS/nixpkgs/pull/286735), [PR](https://github.com/NixOS/nixpkgs/pull/288044)]* | | [CVE-2024-0567](https://nvd.nist.gov/vuln/detail/CVE-2024-0567) | gnutls | 7.5 | 3.8.2 | 3.8.3 | 3.8.3 | *[[PR](https://github.com/NixOS/nixpkgs/pull/281471), [PR](https://github.com/NixOS/nixpkgs/pull/281775)]* | @@ -61,14 +63,17 @@ Update the target Ghaf [flake.lock](https://github.com/tiiuae/ghaf/blob/main/fla | [CVE-2024-0741](https://nvd.nist.gov/vuln/detail/CVE-2024-0741) | firefox | 6.5 | 120.0.1 | 122.0.1 | 122.0.1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/286601), [PR](https://github.com/NixOS/nixpkgs/pull/286735), [PR](https://github.com/NixOS/nixpkgs/pull/288044)]* | | [CVE-2023-51385](https://nvd.nist.gov/vuln/detail/CVE-2023-51385) | openssh | 6.5 | 9.5p1 | 9.6p1 | 9.6p1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/275249), [PR](https://github.com/NixOS/nixpkgs/pull/275399), [PR](https://github.com/NixOS/nixpkgs/pull/275587)]* | | [CVE-2023-47471](https://nvd.nist.gov/vuln/detail/CVE-2023-47471) | libde265 | 6.5 | 1.0.12 | 1.0.15 | 1.0.15 | *[[PR](https://github.com/NixOS/nixpkgs/pull/275720), [PR](https://github.com/NixOS/nixpkgs/pull/276798), [PR](https://github.com/NixOS/nixpkgs/pull/276799)]* | +| [CVE-2023-45322](https://nvd.nist.gov/vuln/detail/CVE-2023-45322) | libxml2 | 6.5 | 2.11.5 | 2.12.4 | 2.12.5 | *[[PR](https://github.com/NixOS/nixpkgs/pull/282347), [PR](https://github.com/NixOS/nixpkgs/pull/283888), [PR](https://github.com/NixOS/nixpkgs/pull/286300)]* | | [CVE-2023-6872](https://nvd.nist.gov/vuln/detail/CVE-2023-6872) | firefox | 6.5 | 120.0.1 | 122.0.1 | 122.0.1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/286601), [PR](https://github.com/NixOS/nixpkgs/pull/286735)]* | | [CVE-2023-6869](https://nvd.nist.gov/vuln/detail/CVE-2023-6869) | firefox | 6.5 | 120.0.1 | 122.0.1 | 122.0.1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/286601), [PR](https://github.com/NixOS/nixpkgs/pull/286735)]* | | [CVE-2023-6865](https://nvd.nist.gov/vuln/detail/CVE-2023-6865) | firefox | 6.5 | 120.0.1 | 122.0.1 | 122.0.1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/286601), [PR](https://github.com/NixOS/nixpkgs/pull/286735)]* | | [CVE-2023-6860](https://nvd.nist.gov/vuln/detail/CVE-2023-6860) | firefox | 6.5 | 120.0.1 | 122.0.1 | 122.0.1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/286601), [PR](https://github.com/NixOS/nixpkgs/pull/286735)]* | +| [CVE-2023-6129](https://nvd.nist.gov/vuln/detail/CVE-2023-6129) | openssl | 6.5 | 3.0.12 | 3.2.0 | 3.2.0 | *[[PR](https://github.com/NixOS/nixpkgs/pull/285019), [PR](https://github.com/NixOS/nixpkgs/pull/285027)]* | | [CVE-2023-6867](https://nvd.nist.gov/vuln/detail/CVE-2023-6867) | firefox | 6.1 | 120.0.1 | 122.0.1 | 122.0.1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/286601), [PR](https://github.com/NixOS/nixpkgs/pull/286735)]* | | [CVE-2023-48795](https://nvd.nist.gov/vuln/detail/CVE-2023-48795) | openssh | 5.9 | 9.5p1 | 9.6p1 | 9.6p1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/275250), [PR](https://github.com/NixOS/nixpkgs/pull/275641), [PR](https://github.com/NixOS/nixpkgs/pull/276242), [PR](https://github.com/NixOS/nixpkgs/pull/276504), [PR](https://github.com/NixOS/nixpkgs/pull/276505)]* | | [CVE-2023-48795](https://nvd.nist.gov/vuln/detail/CVE-2023-48795) | libssh2 | 5.9 | 1.11.0 | 1.11.0 | 1.11.0 | *[[PR](https://github.com/NixOS/nixpkgs/pull/275250), [PR](https://github.com/NixOS/nixpkgs/pull/275641), [PR](https://github.com/NixOS/nixpkgs/pull/276242), [PR](https://github.com/NixOS/nixpkgs/pull/276504), [PR](https://github.com/NixOS/nixpkgs/pull/276505)]* | | [CVE-2023-48795](https://nvd.nist.gov/vuln/detail/CVE-2023-48795) | libssh | 5.9 | 0.10.5 | 0.10.6 | 0.10.6 | *[[PR](https://github.com/NixOS/nixpkgs/pull/275250), [PR](https://github.com/NixOS/nixpkgs/pull/275641), [PR](https://github.com/NixOS/nixpkgs/pull/276242), [PR](https://github.com/NixOS/nixpkgs/pull/276504), [PR](https://github.com/NixOS/nixpkgs/pull/276505)]* | +| [CVE-2024-0727](https://nvd.nist.gov/vuln/detail/CVE-2024-0727) | openssl | 5.5 | 3.0.12 | 3.2.0 | 3.2.0 | *[[PR](https://github.com/NixOS/nixpkgs/pull/285019), [PR](https://github.com/NixOS/nixpkgs/pull/285027)]* | | [CVE-2024-0408](https://nvd.nist.gov/vuln/detail/CVE-2024-0408) | xorg-server | 5.5 | 21.1.9 | 21.1.11 | 21.1.11 | | | [CVE-2023-51384](https://nvd.nist.gov/vuln/detail/CVE-2023-51384) | openssh | 5.5 | 9.5p1 | 9.6p1 | 9.6p1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/275249), [PR](https://github.com/NixOS/nixpkgs/pull/275399), [PR](https://github.com/NixOS/nixpkgs/pull/275587)]* | | [CVE-2023-50268](https://nvd.nist.gov/vuln/detail/CVE-2023-50268) | jq | 5.5 | 1.7 | 1.7.1 | 1.7.1 | | @@ -77,6 +82,7 @@ Update the target Ghaf [flake.lock](https://github.com/tiiuae/ghaf/blob/main/fla | [CVE-2023-39326](https://nvd.nist.gov/vuln/detail/CVE-2023-39326) | go | 5.3 | 1.21.4 | 1.22.0 | 1.22.0 | *[[PR](https://github.com/NixOS/nixpkgs/pull/286849)]* | | [CVE-2023-6918](https://nvd.nist.gov/vuln/detail/CVE-2023-6918) | libssh | 5.3 | 0.10.5 | 0.10.6 | 0.10.6 | *[[PR](https://github.com/NixOS/nixpkgs/pull/275250), [PR](https://github.com/NixOS/nixpkgs/pull/275603), [PR](https://github.com/NixOS/nixpkgs/pull/275604)]* | | [CVE-2023-6857](https://nvd.nist.gov/vuln/detail/CVE-2023-6857) | firefox | 5.3 | 120.0.1 | 122.0.1 | 122.0.1 | | +| [CVE-2023-5678](https://nvd.nist.gov/vuln/detail/CVE-2023-5678) | openssl | 5.3 | 3.0.12 | 3.2.0 | 3.2.0 | *[[PR](https://github.com/NixOS/nixpkgs/pull/285019), [PR](https://github.com/NixOS/nixpkgs/pull/285027)]* | | [CVE-2023-6004](https://nvd.nist.gov/vuln/detail/CVE-2023-6004) | libssh | 4.8 | 0.10.5 | 0.10.6 | 0.10.6 | *[[PR](https://github.com/NixOS/nixpkgs/pull/275250), [PR](https://github.com/NixOS/nixpkgs/pull/275603), [PR](https://github.com/NixOS/nixpkgs/pull/275604)]* | | [CVE-2024-0749](https://nvd.nist.gov/vuln/detail/CVE-2024-0749) | firefox | 4.3 | 120.0.1 | 122.0.1 | 122.0.1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/286601), [PR](https://github.com/NixOS/nixpkgs/pull/286735)]* | | [CVE-2024-0748](https://nvd.nist.gov/vuln/detail/CVE-2024-0748) | firefox | 4.3 | 120.0.1 | 122.0.1 | 122.0.1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/286601), [PR](https://github.com/NixOS/nixpkgs/pull/286735)]* | @@ -118,11 +124,8 @@ Consider [whitelisting](../../manual_analysis.csv) possible false positives base | [CVE-2024-22861](https://nvd.nist.gov/vuln/detail/CVE-2024-22861) | ffmpeg | 7.5 | 6.0 | 6.1 | 6.1.1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/271905)]* | | [CVE-2024-22861](https://nvd.nist.gov/vuln/detail/CVE-2024-22861) | ffmpeg | 7.5 | 4.4.4 | 6.1 | 6.1.1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/271905)]* | | [CVE-2023-46218](https://nvd.nist.gov/vuln/detail/CVE-2023-46218) | curl | 6.5 | 8.4.0 | 8.6.0 | 8.6.0 | *[[PR](https://github.com/NixOS/nixpkgs/pull/285295), [PR](https://github.com/NixOS/nixpkgs/pull/288071)]* | -| [CVE-2023-45322](https://nvd.nist.gov/vuln/detail/CVE-2023-45322) | libxml2 | 6.5 | 2.11.5 | 2.12.4 | 2.12.5 | *[[PR](https://github.com/NixOS/nixpkgs/pull/282347), [PR](https://github.com/NixOS/nixpkgs/pull/283888), [PR](https://github.com/NixOS/nixpkgs/pull/286300)]* | | [CVE-2023-38858](https://nvd.nist.gov/vuln/detail/CVE-2023-38858) | faad2 | 6.5 | 2.10.1 | 2.11.1 | 2.11.1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/267515)]* | -| [CVE-2023-6129](https://nvd.nist.gov/vuln/detail/CVE-2023-6129) | openssl | 6.5 | 3.0.12 | 3.2.0 | 3.2.0 | *[[PR](https://github.com/NixOS/nixpkgs/pull/285019), [PR](https://github.com/NixOS/nixpkgs/pull/285027)]* | | [CVE-2024-22365](https://nvd.nist.gov/vuln/detail/CVE-2024-22365) | linux-pam | 5.5 | 1.5.2 | | | *[[PR](https://github.com/NixOS/nixpkgs/pull/282136)]* | -| [CVE-2024-0727](https://nvd.nist.gov/vuln/detail/CVE-2024-0727) | openssl | 5.5 | 3.0.12 | 3.2.0 | 3.2.0 | *[[PR](https://github.com/NixOS/nixpkgs/pull/285019), [PR](https://github.com/NixOS/nixpkgs/pull/285027)]* | | [CVE-2023-46407](https://nvd.nist.gov/vuln/detail/CVE-2023-46407) | ffmpeg | 5.5 | 6.0 | 6.1 | 6.1.1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/271905)]* | | [CVE-2023-46407](https://nvd.nist.gov/vuln/detail/CVE-2023-46407) | ffmpeg | 5.5 | 4.4.4 | 6.1 | 6.1.1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/271905)]* | | [CVE-2023-38857](https://nvd.nist.gov/vuln/detail/CVE-2023-38857) | faad2 | 5.5 | 2.10.1 | 2.11.1 | 2.11.1 | *[[PR](https://github.com/NixOS/nixpkgs/pull/267515)]* | @@ -133,7 +136,6 @@ Consider [whitelisting](../../manual_analysis.csv) possible false positives base | [CVE-2023-38469](https://nvd.nist.gov/vuln/detail/CVE-2023-38469) | avahi | 5.5 | 0.8 | 0.8 | 0.8 | *[[PR](https://github.com/NixOS/nixpkgs/pull/269599)]* | | [CVE-2023-52071](https://nvd.nist.gov/vuln/detail/CVE-2023-52071) | curl | 5.3 | 8.4.0 | 8.6.0 | 8.6.0 | *[[PR](https://github.com/NixOS/nixpkgs/pull/285295), [PR](https://github.com/NixOS/nixpkgs/pull/288071)]* | | [CVE-2023-46219](https://nvd.nist.gov/vuln/detail/CVE-2023-46219) | curl | 5.3 | 8.4.0 | 8.6.0 | 8.6.0 | *[[PR](https://github.com/NixOS/nixpkgs/pull/285295), [PR](https://github.com/NixOS/nixpkgs/pull/288071)]* | -| [CVE-2023-5678](https://nvd.nist.gov/vuln/detail/CVE-2023-5678) | openssl | 5.3 | 3.0.12 | 3.2.0 | 3.2.0 | *[[PR](https://github.com/NixOS/nixpkgs/pull/285019), [PR](https://github.com/NixOS/nixpkgs/pull/285027)]* | | [CVE-2023-48706](https://nvd.nist.gov/vuln/detail/CVE-2023-48706) | vim | 4.7 | 9.0.2116 | 9.1.0004 | 9.1.0113 | *[[PR](https://github.com/NixOS/nixpkgs/pull/276595), [PR](https://github.com/NixOS/nixpkgs/pull/284984)]* | | [OSV-2023-1295](https://osv.dev/OSV-2023-1295) | libraw | | 0.21.1 | 0.21.2 | 0.21.2 | | | [OSV-2023-184](https://osv.dev/OSV-2023-184) | libraw | | 0.21.1 | 0.21.2 | 0.21.2 | | @@ -525,6 +527,7 @@ Following table lists vulnerabilities that would otherwise have been included to | [CVE-2017-5436](https://nvd.nist.gov/vuln/detail/CVE-2017-5436) | graphite2 | 8.8 | 1.3.14 | NVD data issue: CPE entry does not correctly state the version numbers. | | [CVE-2022-48434](https://nvd.nist.gov/vuln/detail/CVE-2022-48434) | ffmpeg | 8.1 | 4.4.4 | Scanners get confused by LTS release versions (non-linear version numbers). Upstream fix patch for 4.4.x is merged in 4.4.3 [link](https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/d4b7b3c03ee2baf0166ce49dff17ec9beff684db). | | [CVE-2019-14586](https://nvd.nist.gov/vuln/detail/CVE-2019-14586) | edk2 | 8.0 | 202311 | NVD data issue: CPE entry does not correctly state the version numbers. | +| [CVE-2019-14586](https://nvd.nist.gov/vuln/detail/CVE-2019-14586) | edk2 | 8 | 202311 | NVD data issue: CPE entry does not correctly state the version numbers. | | [CVE-2021-26720](https://nvd.nist.gov/vuln/detail/CVE-2021-26720) | avahi | 7.8 | 0.8 | False positive: issue refers avahi-daemon-check-dns.sh in the Debian avahi package. As such, the issue is specific to Debian and its derivatives. | | [CVE-2019-14575](https://nvd.nist.gov/vuln/detail/CVE-2019-14575) | edk2 | 7.8 | 202311 | NVD data issue: CPE entry does not correctly state the version numbers. | | [CVE-2019-14563](https://nvd.nist.gov/vuln/detail/CVE-2019-14563) | edk2 | 7.8 | 202311 | NVD data issue: CPE entry does not correctly state the version numbers. | @@ -668,6 +671,7 @@ Following table lists vulnerabilities that would otherwise have been included to | [OSV-2021-820](https://osv.dev/OSV-2021-820) | qemu | | 8.1.5 | Fixed based on [link](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=34831#c2). | | [OSV-2021-820](https://osv.dev/OSV-2021-820) | qemu | | 8.1.3 | Fixed based on [link](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=34831#c2). | | [OSV-2021-777](https://osv.dev/OSV-2021-777) | libxml2 | | 2.12.4 | Fixed by [link](https://gitlab.gnome.org/GNOME/libxml2/-/commit/8f5ccada05ddd4a1ff8e399ad39fc7cd4bd33325), which went to 2.9.13. Therefore, this issue is fixed in 2.10.4. | +| [OSV-2021-777](https://osv.dev/OSV-2021-777) | libxml2 | | 2.11.7 | Fixed by [link](https://gitlab.gnome.org/GNOME/libxml2/-/commit/8f5ccada05ddd4a1ff8e399ad39fc7cd4bd33325), which went to 2.9.13. Therefore, this issue is fixed in 2.10.4. | | [OSV-2021-777](https://osv.dev/OSV-2021-777) | libxml2 | | 2.11.5 | Fixed by [link](https://gitlab.gnome.org/GNOME/libxml2/-/commit/8f5ccada05ddd4a1ff8e399ad39fc7cd4bd33325), which went to 2.9.13. Therefore, this issue is fixed in 2.10.4. | | [CVE-2014-9157](https://nvd.nist.gov/vuln/detail/CVE-2014-9157) | graphviz | | 9.0.0 | NVD data issue: CPE entry does not correctly state the version numbers. | | [CVE-2012-3509](https://nvd.nist.gov/vuln/detail/CVE-2012-3509) | libiberty | | 13.2.0 | NVD data issue: CPE entry does not correctly state the version numbers. |