Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

1.6.1+dfsg.3-2ubuntu1

Blueprints that have vulnerabilities with a CVSS score >= 9.0 and meet the following criteria should submit their information in the chart below to have the vulnerability considered for an exception:

  • Running at least the minimum OS version required by the Akraino Security Sub-Committee
    • Ubuntu
    • CentOS
    • Debian
    • Fedora
    • Suse Enterprise Server

Legend

Ubuntu Priority/Score Descriptions

...

...

Medium

...

...

Low

...

...

Negligible

...

...

Medium

...

...

Low

...

...

Low

...

...

Low

...

...

Medium

...

...

Low

...

...

Negligible

...

...

Medium

...

...

Low

...

...

Low

...

...

Low

...

...

Medium

...

...

Low

...

...

Negligible

...

...

Medium

...

...

Low

...

...

Low

...

...

Low

...

@Kuralamdhan Ramakrishnan

...

Medium

...

Approved

...

Low

...

Negligible

...

18.04 Not vulnerable

1.18..24ubuntu1

Image Removed

Image Removed

...

@Kuralamdhan Ramakrishnan

...

Medium

...

@Kuralamdhan Ramakrishnan

...

Low

...

Low

...

Low

...

...

Medium

...

...

Low

...

...

Negligible

...

...

Medium

...

...

Low

...

...

Low

...

...

Low

...

Salvador Fuentes (Deactivated)

...

Medium

...

...

Low

...

...

Negligible

...

...

Medium

...

...

Low

...

...

Low

...

...

Low

...

...

Yes, however, patch has been installed (see below) however, vuls still reporting CVE.

...

Approved

...

Yes, however, patch has been installed (see below) however, vuls still reporting CVE.

Image Removed

...

Approved

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

CVE-2016-1585

...

inoue.reo@fujitsu.com

...

CVE-2017-18201

...

inoue.reo@fujitsu.com

...

CVE-2017-7827

...

...

inoue.reo@fujitsu.com

...

CVE-2018-5090

...

...

Reported fixed in 58 and later version (installed), but still reported by Vuls

...

CVE-2018-5126

...

...

Reported fixed in 58 and later version (installed), but still reported by Vuls

...

CVE-2018-5145

...

1.6.1+dfsg.3-2ubuntu1

Blueprints that have vulnerabilities with a CVSS score >= 9.0 and meet the following criteria should submit their information in the chart below to have the vulnerability considered for an exception:

  • Running at least the minimum OS version required by the Akraino Security Sub-Committee
    • Ubuntu
    • CentOS
    • Debian
    • Fedora
    • Suse Enterprise Server

Legend

Ubuntu Priority/Score Descriptions

Not VulnerablePackages which do not exist in the archive, are not affected by the vulnerability or have a fix applied in the archive.
PendingA fix has been applied and updated packages are awaiting arrival into the archive. For example, this might be used when wider testing is requested for the updated package.
UnknownOpen vulnerability where the priority is currently unknown and needs to be triaged.
NegligibleOpen vulnerability that may be a problem but otherwise does not impose a security risk due to various factors. Examples include when the vulnerability is only theoretical in nature, requires a very special situation, has almost no install base or does no real damage. These typically will not receive security updates unless there is an easy fix and some other issue causes an update.
LowOpen vulnerability that is a problem but does very little damage or is otherwise hard to exploit due to small user base or other factors such as requiring specific environment, uncommon configuration, user assistance, etc. These tend to be included in security updates only when higher priority issues require an update or if many low priority issues have built up.
MediumOpen vulnerability that is a real problem and is exploitable for many users of the affected software. Examples include network daemon denial of service, cross-site scripting and gaining user privileges.
HighOpen vulnerability that is a real problem and is exploitable for many users in the default configuration of the affected software. Examples include serious remote denial of service of the system, local root privilege escalations or local data theft.
CriticalOpen vulnerability that is a world-burning problem and is exploitable for most Ubuntu users. Examples include remote root privilege escalations or remote data theft.


20185145inoueinouereo@fujitsu.Reported fixed in 1:52.7.0 and later version (installed), but still reported by Vuls20185151Robot basic architecture based on SSES20185151inoue.reo@fujitsuReported fixed in 60 and later version (installed), but still reported by Vuls201917041inoueinouereo@fujitsu.Low201917042inoueinouereo@fujitsu.Low202131870Robot basic architecture based on SSES202131870inoue.reo@fujitsu202131872inoueinouereo@fujitsu.202131873Robot basic architecture based on SSES202131873inoueinouereo@fujitsu.202139713Robot basic architecture based on SSES202139713inoueinouereo@fujitsu.Low202222822Robot basic architecture based on SSES202222822inoue.reo@fujitsuMedium202222823Robot basic architecture based on SSES202222823inoueinouereo@fujitsu.Medium202222824Robot basic architecture based on SSES202222824inoueinouereo@fujitsu.202223852Robot basic architecture based on SSES202223852inoueinouereo@fujitsu.Medium202223990Robot basic architecture based on SSES202223990inoueinouereo@fujitsu.Medium202225235Robot basic architecture based on SSES202225235inoue.reo@fujitsuHigh202225236Robot basic architecture based on SSES202225236inoue.reo@fujitsuHigh202225315Robot basic architecture based on SSES202225315inoue.reo@fujitsuMedium20169180Robot basic architecture based on SSES20169180inoue.reo@fujitsuLow201920433Robot basic architecture based on SSES201920433inoue.reo@fujitsuLow20142830Raspberry Pi OS(Debian 11)security-tracker.debian.org/tracker20142830inoueinouereo@fujitsu.High20161585Raspberry Pi OS(Debian 11)security-tracker.debian.org/tracker20161585inoueinouereo@fujitsu.High201717479Raspberry Pi OS(Debian 11)security-tracker.debian.org/tracker201717479inoueinouereo@fujitsuHigh9117Raspberry Pi OS(Debian 11)security-tracker.debian.org/tracker9117inoueinouereo@fujitsuHigh201813410Raspberry Pi OS(Debian 11)security-tracker.debian.org/tracker201813410inoueinouereo@fujitsuNo20191010022Raspberry Pi OS(Debian 11)security-tracker.debian.org/tracker20191010022inoueinouereo@fujitsuHigh8341Raspberry Pi OS(Debian 11)security-tracker.debian.org/tracker8341inoueinouereo@fujitsuHigh202027619Raspberry Pi OS(Debian 11)security-tracker.debian.org/tracker202027619inoueinouereo@fujitsuHigh202129462Raspberry Pi OS(Debian 11)security-tracker.debian.org/tracker202129462inoueinouereo@fujitsuHigh202129921security-tracker.debian.org/tracker202129921inoue.reo@fujitsuReported fixed in python3.9 (installed), but still reported by Vuls202130473Raspberry Pi OS(Debian 11)security-tracker.debian.org/tracker202130473inoueinouereo@fujitsu.High202130474security-tracker.debian.org/tracker202130474inoueinouereo@fujitsu.High2021-30475security-tracker.debian.org/tracker202130475inoueinouereo@fujitsu.High202130498Raspberry Pi OS(Debian 11)security-tracker.debian.org/tracker202130498inoueinouereo@fujitsu.High202130499Raspberry Pi OS(Debian 11)security-tracker.debian.org/tracker202130499inoueinouereo@fujitsu.High202142377security-tracker.debian.org/tracker202142377inoueinouereo@fujitsu.Medium-2021-45951security-tracker.debian.org/tracker202145951inoue.reo@fujitsuHigh202145952Raspberry Pi OS(Debian 11)security-tracker.debian.org/tracker202145952inoue.reo@fujitsuHighsecurity-tracker.debian.org/tracker202145953inoue.reo@fujitsuHigh202145954Raspberry Pi OS(Debian 11)security-tracker.debian.org/tracker202145954inoue.reo@fujitsuHigh202145955Raspberry Pi OS(Debian 11)security-tracker.debian.org/tracker2021-45955inoue.reo@fujitsuHigh202145956Raspberry Pi OS(Debian 11)security-tracker.debian.org/tracker202145956inoue.reo@fujitsuHigh202223303Raspberry Pi OS(Debian 11)security-tracker.debian.org/tracker202223303inoue.reo@fujitsuMedium202223304Raspberry Pi OS(Debian 11)security-trackerdebianorgtrackerCVE202223304inoueinoue.reo@fujitsuMedium20214048Raspberry Pi OS(Debian 11)security-trackerdebianorgtrackerCVE20214048inoueNo202143400Raspberry Pi OS(Debian 11)security-trackerdebianorgtrackerCVE202143400inoueinouereo@fujitsu.No
CVE #BlueprintBlueprint OS/VerURL Showing OS Patch Not AvailableContact NameContact EmailCommentVendor CVSS ScoreVendor Patch AvailableException Status
CVE-2016-1585EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2016-1585srinivasanselvam2014@gmail.com

Medium

NoApproved
CVE-2017-18342EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2017-18342srinivasanselvam2014@gmail.com

Low

MediumNoApproved
CVE-20192017-17041Robot basic architecture based on SSES8283EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2017-8283srinivasanselvam2014@gmail.com

Negligible

NoApproved
CVE-20192018-17042Robot basic architecture based on SSES20839EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2018-20839srinivasanselvam2014@gmail.com

Medium

NoApproved
CVE-2019-17041EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2019-17041srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-20212019-31872Robot basic architecture based on SSES17042EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2019-17042srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2019-19814EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2019-19814srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2016-1585ELIOT IOT GatewayUbuntu 18.04https://ubuntu.com/security/CVE-2016-1585srinivasanselvam2014@gmail.com

Medium

NoApproved
CVE-2017-18342ELIOT IOT GatewayUbuntu 18.04https://ubuntu.com/security/CVE-2017-18342srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2017-8283ELIOT IOT GatewayUbuntu 18.04https://ubuntu.com/security/CVE-2017-8283srinivasanselvam2014@gmail.com

Negligible

NoApproved
CVE-2018-20839ELIOT IOT GatewayUbuntu 18.04https://ubuntu.com/security/CVE-2018-20839srinivasanselvam2014@gmail.com

Medium

NoApproved
CVE-2019-17041ELIOT IOT GatewayUbuntu 18.04https://ubuntu.com/security/CVE-2019-17041srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2019-17042ELIOT IOT GatewayUbuntu 18.04https://ubuntu.com/security/CVE-2019-17042srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2019-19814ELIOT IOT GatewayUbuntu 18.04https://ubuntu.com/security/CVE-2019-19814srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2016-1585ELIOT SD-WAN/WAN Edge/uCPE Ubuntu 18.04https://ubuntu.com/security/CVE-2016-1585srinivasanselvam2014@gmail.com

Medium

NoApproved
CVE-2017-18342ELIOT SD-WAN/WAN Edge/uCPEUbuntu 18.04https://ubuntu.com/security/CVE-2017-18342srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2017-8283ELIOT SD-WAN/WAN Edge/uCPEUbuntu 18.04https://ubuntu.com/security/CVE-2017-8283srinivasanselvam2014@gmail.com

Negligible

NoApproved
CVE-2018-20839ELIOT SD-WAN/WAN Edge/uCPEUbuntu 18.04https://ubuntu.com/security/CVE-2018-20839srinivasanselvam2014@gmail.com

Medium

NoApproved
CVE-20052019-2541Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)17041ELIOT SD-WAN/WAN Edge/uCPEUbuntu 18.04https://security-tracker.debian.org/trackerubuntu.com/security/CVE-20052019-254117041inoue.reo@fujitsusrinivasanselvam2014@gmail.com
High

Low

NoApproved
CVE-2019-Robot basic architecture based on SSES17042ELIOT SD-WAN/WAN Edge/uCPEUbuntu 18.04https://ubuntu.com/security/CVE-2019-17042srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2019-Robot basic architecture based on SSES19814ELIOT SD-WAN/WAN Edge/uCPEUbuntu 18.04https://ubuntu.com/security/CVE-2019-19814srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2016-Robot basic architecture based on SSES1585ICNUbuntu 18.04https://ubuntu.com/security/CVE-2016-1585

@Kuralamdhan Ramakrishnan

kuralamudhan.ramakrishnan@intel.com

Medium

No

Approved

CVE-2017-Robot basic architecture based on SSES18342ICNUbuntu 18.04https://ubuntu.com/security/CVE-2017-18342@Kuralamdhan Ramakrishnankuralamudhan.ramakrishnan@intel.com

Low

NoApproved
CVE-2017-Robot basic architecture based on SSES8283ICNUbuntu 18.04https://ubuntu.com/security/CVE-2017-8283@Kuralamdhan Ramakrishnankuralamudhan.ramakrishnan@intel.comHigh

Negligible

18.04 Not vulnerable

1.18..24ubuntu1

Image Added

Image Added

Approved
CVE-2018-Robot basic architecture based on SSES20839ICNUbuntu 18.04https://ubuntu.com/security/CVE-2018-20839

@Kuralamdhan Ramakrishnan

kuralamudhan.ramakrishnan@intel.com

Medium

NoApproved
CVE-2019-Robot basic architecture based on SSES19814ICNUbuntu 18.04https://ubuntu.com/security/CVE-2019-19814

@Kuralamdhan Ramakrishnan

kuralamudhan.ramakrishnan@intel.com

Low

NoApproved
CVE-2019-Robot basic architecture based on SSES17041ICNUbuntu 18.04https://ubuntu.com/security/CVE-2019-17041@Kuralamdhan Ramakrishnankuralamudhan.ramakrishnan@intel.com

Low

NoApproved
CVE-2019-Robot basic architecture based on SSES17042ICNUbuntu 18.04https://ubuntu.com/security/CVE-2019-17042@Kuralamdhan Ramakrishnankuralamudhan.ramakrishnan@intel.com

Low

NoApproved
CVE-2016-Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)1585Public Cloud Edge Interface (PCEI)Ubuntu 18.04https://ubuntu.com/security/CVE-2016-1585oberzin@equinix.com

Medium

HighNoApproved
CVE-2017-Robot basic architecture based on SSES18342Public Cloud Edge Interface (PCEI)Ubuntu 18.04https://ubuntu.com/security/CVE-2017-18342oberzin@equinix.com

Low

NoApproved
CVE-2017-Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)8283Public Cloud Edge Interface (PCEI)Ubuntu 18.04https://ubuntu.com/security/CVE-2017-8283oberzin@equinix.com

Negligible

NoApproved
CVE-Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)2018-20839Public Cloud Edge Interface (PCEI)Ubuntu 18.04https://ubuntu.com/security/CVE-2018-20839oberzin@equinix.com

Medium

NoApproved
CVE-2019-Robot basic architecture based on SSES17041Public Cloud Edge Interface (PCEI)Ubuntu 18.04https://ubuntu.com/security/CVE-2019-17041oberzin@equinix.com

Low

NoApproved
CVE-2019-Robot basic architecture based on SSES17042Public Cloud Edge Interface (PCEI)Ubuntu 18.04https://ubuntu.com/security/CVE-2019-17042oberzin@equinix.com

Low

NoApproved
CVE-2019-Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)19814Public Cloud Edge Interface (PCEI)Ubuntu 18.04https://ubuntu.com/security/CVE-2019-19814oberzin@equinix.com

Low

NoApproved
CVERobot basic architecture based on SSESRaspberry Pi OS(Debian 11)-2016-1585ICN - Multi-Tenant Secure Cloud Native Platform Ubuntu 18.04https://ubuntu.com/security/CVE-2016-1585salvador.fuentes@intel.com

Medium

NoApproved
CVE-2017-Robot basic architecture based on SSES18342ICN - Multi-Tenant Secure Cloud Native Platform Ubuntu 18.04https://ubuntu.com/security/CVE-2017-18342salvador.fuentes@intel.com

Low

NoApproved
CVE-20212017-45953Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)8283ICN - Multi-Tenant Secure Cloud Native Platform Ubuntu 18.04https://ubuntu.com/security/CVE-2017-8283salvador.fuentes@intel.com

Negligible

NoApproved
CVE-2018-Robot basic architecture based on SSES20839ICN - Multi-Tenant Secure Cloud Native Platform Ubuntu 18.04https://ubuntu.com/security/CVE-2018-20839salvador.fuentes@intel.com

Medium

NoApproved
CVE-2019-Robot basic architecture based on SSES17041ICN - Multi-Tenant Secure Cloud Native Platform Ubuntu 18.04https://ubuntu.com/security/CVE-2019-17041salvador.fuentes@intel.com

Low

NoApproved
CVE-2019-Robot basic architecture based on SSES17042ICN - Multi-Tenant Secure Cloud Native Platform Ubuntu 18.04https://ubuntu.com/security/CVE-2019-17042salvador.fuentes@intel.com

Low

NoApproved
CVE-2019-Robot basic architecture based on SSES19814ICN - Multi-Tenant Secure Cloud Native Platform Ubuntu 18.04https://ubuntu.com/security/CVE-2019-19814salvador.fuentes@intel.com

Low

NoApproved
CVE-2019-Robot basic architecture based on SSES12900The AI Edge: Federated ML application at edgeCentOS 7.9https://access.redhat.com/security/cve/cve-2019-12900wuzifan0817@gmail.com
LowNoApproved
CVE-2017-Robot basic architecture based on SSES12652AI Edge: School/Education Video SecurityCentOS 7.9https://access.redhat.com/security/cve/cve-2017-12652Yu, Liyainoue.reo@fujitsu.comMediumyulia@baidu.com
Low

Yes, however, patch has been installed (see below) however, vuls still reporting CVE.

Image Added

Approved

CVE-2019-Robot basic architecture based on SSES5482AI Edge: School/Education Video SecurityCentOS 7.9https://access.redhat.com/security/cve/cve-2019-5482Yu, Liyayulia@baidu.com
Medium

Yes, however, patch has been installed (see below) however, vuls still reporting CVE.

Image Added

Approved