CVE/KHV # | Blueprint | Blueprint OS/Ver | URL Showing OS Patch Not Available | Contact Name | Contact Email | Comment | Vendor CVSS Score | Vendor Patch Available | Exception Status |
---|
CVE-2016-1585 | Robot basic architecture based on SSES | Raspberry Pi OS(Debian 11) | https://security-tracker.debian.org/tracker/CVE-2016-1585 | | inoue.reo@fujitsu.com |
|
| No | Approved |
CVE-2017-18201 | Robot basic architecture based on SSES | Raspberry Pi OS(Debian 11) | https://security-tracker.debian.org/tracker/CVE-2017-17479 | | inoue.reo@fujitsu.com |
|
| No | Approved |
CVE-2019-17041 | Robot basic architecture based on SSES | Raspberry Pi OS(Debian 11) | https://security-tracker.debian.org/tracker/CVE-2019-17041 | inoue | inoue.reo@fujitsu.com | Please add to the "Vendor Patch Available" column output from the following commands: lsb_release -a dpkg -l | grep <package name associated with CVE> |
| I installed a later version of the software than the version that has been fixed for CVE.
$ lsb_release -a No LSB modules are available. Distributor ID: Debian Description: Debian GNU/Linux 11 (bullseye) Release: 11 Codename: bullseye $ dpkg -l |grep rsyslog ii rsyslog 8.2102.0-2+deb11u1 arm64 reliable system and kernel logging daemon | PendingApproved |
CVE-2019-17042 | Robot basic architecture based on SSES | Raspberry Pi OS(Debian 11) | https://security-tracker.debian.org/tracker/CVE-2019-17042 | inoue | inoue.reo@fujitsu.com | Please add to the "Vendor Patch Available" column output from the following commands: lsb_release -a dpkg -l | grep <package name associated with CVE> |
| I installed a later version of the software than the version that has been fixed for CVE.
$ lsb_release -a No LSB modules are available. Distributor ID: Debian Description: Debian GNU/Linux 11 (bullseye) Release: 11 Codename: bullseye $ dpkg -l |grep rsyslog ii rsyslog 8.2102.0-2+deb11u1 arm64 reliable system and kernel logging daemon | PendingApproved |
CVE-2022-3649 | Robot basic architecture based on SSES | Raspberry Pi OS(Debian 11) | https://security-tracker.debian.org/tracker/CVE-2022-3649 | inoue | inoue.reo@fujitsu.com |
|
| No | Approved |
CVE-2019-20433 | Robot basic architecture based on SSES | Raspberry Pi OS(Debian 11) | https://security-tracker.debian.org/tracker/CVE-2019-20433 | inoue | inoue.reo@fujitsu.com |
|
| No | Approved |
CVE-2022-24303 | Robot basic architecture based on SSES | Raspberry Pi OS(Debian 11) | https://security-tracker.debian.org/tracker/CVE-2022-24303 | inoue | inoue.reo@fujitsu.com |
|
| No | Approved |
CVE-2022-39319 | Robot basic architecture based on SSES | Raspberry Pi OS(Debian 11) | https://security-tracker.debian.org/tracker/CVE-2022-39319 | | inoue.reo@fujitsu.com |
|
| No |
|
CVE-2022-41877 | Robot basic architecture based on SSES | Raspberry Pi OS(Debian 11) | https://security-tracker.debian.org/tracker/CVE-2022-41877 | inoue | inoue.reo@fujitsu.com |
|
| No | Approved |
CVE-2016-1585 | Robot basic architecture based on SSES | Ubuntu 18.04 | https://ubuntu.com/security/CVE-2016-1585 | | inoue.reo@fujitsu.com |
| Medium | No | Approved |
CVE-2017-18201 | Robot basic architecture based on SSES | Ubuntu 18.04 | https://ubuntu.com/security/CVE-2017-18201 | | inoue.reo@fujitsu.com |
| Low | No | Approved |
CVE-2017-7827 | Robot basic architecture based on SSES | Ubuntu 18.04 | https://ubuntu.com/security/CVE-2017-7827 | | inoue.reo@fujitsu.com |
| Medium | No | Approved |
CVE-2018-5090 | Robot basic architecture based on SSES | Ubuntu 18.04 | https://ubuntu.com/security/CVE-2018-5090 | | inoue.reo@fujitsu.com |
| Medium | No | Approved |
CVE-2018-5126 | Robot basic architecture based on SSES | Ubuntu 18.04 | https://ubuntu.com/security/CVE-2018-5126 | | inoue.reo@fujitsu.com |
| Medium | No | Approved |
CVE-2018-5145 | Robot basic architecture based on SSES | Ubuntu 18.04 | https://ubuntu.com/security/CVE-2018-5145 | | inoue.reo@fujitsu.com |
| Medium | No | Approved |
CVE-2018-5151 | Robot basic architecture based on SSES | Ubuntu 18.04 | https://ubuntu.com/security/CVE-2018-5151 | | inoue.reo@fujitsu.com |
| Medium | No | Approved |
CVE-2019-17041 | Robot basic architecture based on SSES | Ubuntu 18.04 | https://ubuntu.com/security/CVE-2019-17041 | | inoue.reo@fujitsu.com |
| Low | No | Approved |
CVE-2019-17042 | Robot basic architecture based on SSES | Ubuntu 18.04 | https://ubuntu.com/security/CVE-2019-17042 | | inoue.reo@fujitsu.com |
| Low | No | Approved |
CVE-2022-0318 | Robot basic architecture based on SSES | Ubuntu 18.04 | https://ubuntu.com/security/CVE-2022-0318 | | inoue.reo@fujitsu.com |
| Medium | No | Approved |
CVE-2022-3649 | Robot basic architecture based on SSES | Ubuntu 18.04 | https://ubuntu.com/security/CVE-2022-3649 | | inoue.reo@fujitsu.com |
| Medium | No | Approved |
CVE-2022-3890 | Robot basic architecture based on SSES | Ubuntu 18.04 | https://ubuntu.com/security/CVE-2022-3890 | | inoue.reo@fujitsu.com |
| Medium | No | Approved |
CVE-2022-4135 | Robot basic architecture based on SSES | Ubuntu 18.04 | https://ubuntu.com/security/CVE-2022-4135 | | inoue.reo@fujitsu.com |
| Medium | No | Approved |
CVE-2016-9180 | Robot basic architecture based on SSES | Ubuntu 18.04 | https://ubuntu.com/security/CVE-2016-9180 | | inoue.reo@fujitsu.com |
| Low | No | Approved |
CVE-2019-20433 | Robot basic architecture based on SSES | Ubuntu 18.04 | https://ubuntu.com/security/CVE-2019-20433 | | inoue.reo@fujitsu.com |
| Low | No | Approved |
CVE-2022-24303 | Robot basic architecture based on SSES | Ubuntu 18.04 | https://ubuntu.com/security/CVE-2022-24303 | | inoue.reo@fujitsu.com |
| Low | No | Approved |
CVE-2016-1585 | Robot basic architecture based on SSES | Ubuntu 22.04 | https://ubuntu.com/security/CVE-2016-1585 | | inoue.reo@fujitsu.com |
| Medium | No | Approved |
CVE-2022-3649 | Robot basic architecture based on SSES | Ubuntu 22.04 | https://ubuntu.com/security/CVE-2022-3649 | | inoue.reo@fujitsu.com |
| Medium | No | Approved |
CVE-2016-1585 | Smart Data Transaction for CPS | Ubuntu 20.04 | https://ubuntu.com/security/CVE-2016-1585 | | colin.peters@fujitsu.com |
| Medium | No | Approved |
CVE-2022-0318 | Smart Data Transaction for CPS | Ubuntu 20.04 | https://ubuntu.com/security/CVE-2022-0318 | | colin.peters@fujitsu.com |
| Medium | No | Approved |
CVE-2022-19273643 | Smart Data Transaction for CPS | Ubuntu 20.04 | https://ubuntu.com/security/CVE-2022-19273643 | | colin.peters@fujitsu.com |
| Medium | No | Approved |
CVE-2022-203853649 | Smart Data Transaction for CPS | Ubuntu 20.04 | https://ubuntu.com/security/CVE-2022-203853649 | | colin.peters@fujitsu.com |
| Medium | No | Approved |
CVE-2022-37434Smart Data Transaction for CPS44640 | IEC Type 5: SmartNIC for Integrated Edge Cloud (IEC) Blueprint Family | Ubuntu 20.04 | https://ubuntu.com/security/CVE-2022-44640 | jin peng | jinpeng@socnoc.ai |
| Medium | No | Approved |
CVE-2022-37434 | | colin.peters@fujitsu.com | Medium | No | CFN (Computing Force Network) Ubiquitous Computing Force Scheduling - Akraino - Akraino Confluence | CentoOS 7.6 | CVE-2022-37434- Red Hat Customer Portal | | dinghanyu@chinamobile.com 13366022056@163.com |
| 9.8 | Not fixed in centos 7.x | Approved |
CVE-2015-4042 | CFN (Computing Force Network) Ubiquitous Computing Force Scheduling - Akraino - Akraino Confluence | CentoOS 7.6 | CVE-2015-4042- Red Hat Customer Portal | hanyu ding | dinghanyu@chinamobile.com 13366022056@163.com |
| 9.8 | Not fixed yet in centos 7.x | Approved |
CVE-2014-9939 | CFN (Computing Force Network) Ubiquitous Computing Force Scheduling - Akraino - Akraino Confluence | CentoOS 7.6 | CVE-2014-9939- Red Hat Customer Portal | hanyu ding | dinghanyu@chinamobile.com 13366022056@163.com |
| 9.8 | Not fixed yet in centos 7.x | Approved |