Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

1.6.1+dfsg.3-2ubuntu1

Blueprints that have vulnerabilities with a CVSS score >= 9.0 and meet the following criteria should submit their information in the chart below to have the vulnerability considered for an exception:

  • Running at least the minimum OS version required by the Akraino Security Sub-Committee
    • Ubuntu
    • CentOS
    • Debian
    • Fedora
    • Suse Enterprise Server

Legend

Ubuntu Priority/Score Descriptions

...

...

Medium

...

...

Low

...

...

Negligible

...

...

Medium

...

...

Low

...

...

Low

...

...

Low

...

...

Medium

...

...

Low

...

...

Negligible

...

...

Medium

...

...

Low

...

...

Low

...

...

Low

...

...

Medium

...

...

Low

...

...

Negligible

...

...

Medium

...

...

Low

...

...

Low

...

...

Low

...

@Kuralamdhan Ramakrishnan

...

Medium

...

Approved

...

Low

...

Negligible

...

18.04 Not vulnerable

1.18..24ubuntu1

Image Removed

Image Removed

...

@Kuralamdhan Ramakrishnan

...

Medium

...

@Kuralamdhan Ramakrishnan

...

Low

...

Low

...

Low

...

...

Medium

...

...

Low

...

...

Negligible

...

...

Medium

...

...

Low

...

...

Low

...

...

Low

...

Salvador Fuentes (Deactivated)

...

Medium

...

...

Low

...

...

Negligible

...

...

Medium

...

...

Low

...

...

Low

...

...

Low

...

...

Yes, however, patch has been installed (see below) however, vuls still reporting CVE.

...

Approved

...

Yes, however, patch has been installed (see below) however, vuls still reporting CVE.

Image Removed

...

Approved

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

CVE-2016-1585

...

inoue.reo@fujitsu.com

...

CVE-2017-18201

...

inoue.reo@fujitsu.com

...

CVE-2017-7827

...

...

inoue.reo@fujitsu.com

...

CVE-2018-5090

...

...

Reported fixed in 58 and later version (installed), but still reported by Vuls

...

CVE-2018-5126

...

...

Reported fixed in 58 and later version (installed), but still reported by Vuls

...

CVE-2018-5145

...

1.6.1+dfsg.3-2ubuntu1

Blueprints that have vulnerabilities with a CVSS score >= 9.0 and meet the following criteria should submit their information in the chart below to have the vulnerability considered for an exception:

  • Running at least the minimum OS version required by the Akraino Security Sub-Committee
    • Ubuntu
    • CentOS
    • Debian
    • Fedora
    • Suse Enterprise Server

Legend

Ubuntu Priority/Score Descriptions

Not VulnerablePackages which do not exist in the archive, are not affected by the vulnerability or have a fix applied in the archive.
PendingA fix has been applied and updated packages are awaiting arrival into the archive. For example, this might be used when wider testing is requested for the updated package.
UnknownOpen vulnerability where the priority is currently unknown and needs to be triaged.
NegligibleOpen vulnerability that may be a problem but otherwise does not impose a security risk due to various factors. Examples include when the vulnerability is only theoretical in nature, requires a very special situation, has almost no install base or does no real damage. These typically will not receive security updates unless there is an easy fix and some other issue causes an update.
LowOpen vulnerability that is a problem but does very little damage or is otherwise hard to exploit due to small user base or other factors such as requiring specific environment, uncommon configuration, user assistance, etc. These tend to be included in security updates only when higher priority issues require an update or if many low priority issues have built up.
MediumOpen vulnerability that is a real problem and is exploitable for many users of the affected software. Examples include network daemon denial of service, cross-site scripting and gaining user privileges.
HighOpen vulnerability that is a real problem and is exploitable for many users in the default configuration of the affected software. Examples include serious remote denial of service of the system, local root privilege escalations or local data theft.
CriticalOpen vulnerability that is a world-burning problem and is exploitable for most Ubuntu users. Examples include remote root privilege escalations or remote data theft.


20185145Robot basic architecture based on SSES20185151inoueinouereo@fujitsu.Reported fixed in 60 and later version (installed), but still reported by Vuls201917041inoueinouereo@fujitsu.Low201917042inoue.reo@fujitsuLow202131870Robot basic architecture based on SSES202131870inoueinouereo@fujitsu.202131872inoue.reo@fujitsu202131873Robot basic architecture based on SSES202131873inoueinouereo@fujitsu.202139713Robot basic architecture based on SSES202139713inoueinouereo@fujitsu.Low202222822Robot basic architecture based on SSES202222822inoue.reo@fujitsuMedium202222823Robot basic architecture based on SSES202222823inoue.reo@fujitsuMedium202222824Robot basic architecture based on SSES202222824inoue.reo@fujitsu202223852Robot basic architecture based on SSES202223852inoueinouereo@fujitsu.Medium202223990Robot basic architecture based on SSES202223990inoueinouereo@fujitsu.Medium202225235Robot basic architecture based on SSES202225235inoue.reo@fujitsuHigh202225236Robot basic architecture based on SSES202225236inoue.reo@fujitsuHigh202225315Robot basic architecture based on SSES202225315inoueinouereo@fujitsu.Medium20169180Robot basic architecture based on SSES20169180inoueinouereo@fujitsu.Low201920433Robot basic architecture based on SSES201920433inoueinouereo@fujitsu.Low20142830Raspberry Pi OS(Debian 11)security-tracker.debian.org/tracker20142830inoueinouereo@fujitsu.High20161585Raspberry Pi OS(Debian 11)security-tracker.debian.org/tracker20161585inoue.reo@fujitsuHigh201717479Raspberry Pi OS(Debian 11)security-tracker.debian.org/tracker201717479inoueinouereo@fujitsuHigh9117Raspberry Pi OS(Debian 11)security-tracker.debian.org/tracker9117inoueinouereo@fujitsuHigh201813410Raspberry Pi OS(Debian 11)security-tracker.debian.org/tracker-2018-13410Raspberry Pi OS(Debian 11)security-tracker.debian.org/tracker20191010022inoueinouereo@fujitsuHigh8341Raspberry Pi OS(Debian 11)security-tracker.debian.org/tracker8341inoueinouereo@fujitsuHigh202027619Raspberry Pi OS(Debian 11)security-tracker.debian.org/tracker202027619inoueinouereo@fujitsuHigh202129462Raspberry Pi OS(Debian 11)security-tracker.debian.org/tracker2021-29462inoue.reo@fujitsuHigh202129921security-tracker.debian.org/tracker202129921inoueinouereo@fujitsu.Reported fixed in python3.9 (installed), but still reported by Vuls202130473security-tracker.debian.org/tracker202130473inoueinouereo@fujitsu.High2021-30474security-tracker.debian.org/tracker202130474inoueinouereo@fujitsu.High202130475Raspberry Pi OS(Debian 11)security-tracker.debian.org/tracker202130475inoueinouereo@fujitsu.High202130498Raspberry Pi OS(Debian 11)security-tracker.debian.org/tracker202130498inoueinouereo@fujitsu.High202130499security-tracker.debian.org/tracker202130499inoueinouereo@fujitsu.Highsecurity-tracker.debian.org/tracker202142377inoue.reo@fujitsuMedium202145951Raspberry Pi OS(Debian 11)security-tracker.debian.org/tracker202145951inoue.reo@fujitsuHigh202145952Raspberry Pi OS(Debian 11)security-tracker.debian.org/tracker202145952inoue.reo@fujitsuHighsecurity-tracker.debian.org/tracker202145953inoue.reo@fujitsuHigh202145954Raspberry Pi OS(Debian 11)security-tracker.debian.org/tracker202145954inoue.reo@fujitsuHigh202145955Raspberry Pi OS(Debian 11)security-tracker.debian.org/tracker202145955inoue.reo@fujitsuHigh-2021-45956security-tracker.debian.org/tracker202145956inoue.reo@fujitsuHigh202223303Raspberry Pi OS(Debian 11)security-tracker.debian.org/tracker202223303inoue.reo@fujitsuMedium202223304Raspberry Pi OS(Debian 11)security-trackerdebianorgtrackerCVE202223304inoueinoue.reo@fujitsuMedium20214048Raspberry Pi OS(Debian 11)security-tracker.debian.org/tracker/CVE-2021-4048Raspberry Pi OS(Debian 11)security-trackerdebianorgtrackerCVE202143400inoue.reo@fujitsu
CVE #BlueprintBlueprint OS/VerURL Showing OS Patch Not AvailableContact NameContact EmailCommentVendor CVSS ScoreVendor Patch AvailableException Status
CVE-2016-1585EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2016-1585inoue.reo@fujitsu.comMedium

Reported fixed in 1:52.7.0 and later version (installed), but still reported by Vuls

CVE-2018-5151

srinivasanselvam2014@gmail.com

Medium

NoApproved
CVE-2017-18342EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2017-18342srinivasanselvam2014@gmail.com

Low

MediumNoApproved
CVE-2019-17041Robot basic architecture based on SSES2017-8283EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2017-8283srinivasanselvam2014@gmail.com

Negligible

NoApproved
CVE-20192018-17042Robot basic architecture based on SSES20839EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2018-20839srinivasanselvam2014@gmail.com

Medium

NoApproved
CVE-2019-17041EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2019-17041srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-20212019-31872Robot basic architecture based on SSES17042EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2019-17042srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2019-19814EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2019-19814srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2016-1585ELIOT IOT GatewayUbuntu 18.04https://ubuntu.com/security/CVE-2016-1585srinivasanselvam2014@gmail.com

Medium

NoApproved
CVE-2017-18342ELIOT IOT GatewayUbuntu 18.04https://ubuntu.com/security/CVE-2017-18342srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2017-8283ELIOT IOT GatewayUbuntu 18.04https://ubuntu.com/security/CVE-2017-8283srinivasanselvam2014@gmail.com

Negligible

NoApproved
CVE-2018-20839ELIOT IOT GatewayUbuntu 18.04https://ubuntu.com/security/CVE-2018-20839srinivasanselvam2014@gmail.com

Medium

NoApproved
CVE-2019-17041ELIOT IOT GatewayUbuntu 18.04https://ubuntu.com/security/CVE-2019-17041srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2019-17042ELIOT IOT GatewayUbuntu 18.04https://ubuntu.com/security/CVE-2019-17042srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2019-19814ELIOT IOT GatewayUbuntu 18.04https://ubuntu.com/security/CVE-2019-19814srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2016-1585ELIOT SD-WAN/WAN Edge/uCPE Ubuntu 18.04https://ubuntu.com/security/CVE-2016-1585srinivasanselvam2014@gmail.com

Medium

NoApproved
CVE-2017-18342ELIOT SD-WAN/WAN Edge/uCPEUbuntu 18.04https://ubuntu.com/security/CVE-2017-18342srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2017-8283ELIOT SD-WAN/WAN Edge/uCPEUbuntu 18.04https://ubuntu.com/security/CVE-2017-8283srinivasanselvam2014@gmail.com

Negligible

NoApproved
CVE-2018-20839ELIOT SD-WAN/WAN Edge/uCPEUbuntu 18.04https://ubuntu.com/security/CVE-2018-20839srinivasanselvam2014@gmail.com

Medium

NoApproved
CVE-20052019-2541Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)17041ELIOT SD-WAN/WAN Edge/uCPEUbuntu 18.04https://security-tracker.debian.org/trackerubuntu.com/security/CVE-20052019-254117041inoue.reo@fujitsusrinivasanselvam2014@gmail.com
High

Low

NoApproved
CVE-2019-Robot basic architecture based on SSES17042ELIOT SD-WAN/WAN Edge/uCPEUbuntu 18.04https://ubuntu.com/security/CVE-2019-17042srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2019-Robot basic architecture based on SSES19814ELIOT SD-WAN/WAN Edge/uCPEUbuntu 18.04https://ubuntu.com/security/CVE-2019-19814srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2016-Robot basic architecture based on SSES1585ICNUbuntu 18.04https://ubuntu.com/security/CVE-2016-1585

@Kuralamdhan Ramakrishnan

kuralamudhan.ramakrishnan@intel.com

Medium

No

Approved

CVE-2017-Robot basic architecture based on SSES18342ICNUbuntu 18.04https://ubuntu.com/security/CVE-2017-18342@Kuralamdhan Ramakrishnankuralamudhan.ramakrishnan@intel.com

Low

NoApproved
CVE-2017-Robot basic architecture based on SSES8283ICNUbuntu 18.04https://ubuntu.com/security/CVEinoue.reo@fujitsu.comHighNo

CVE-2019-1010022

Robot basic architecture based on SSES-2017-8283@Kuralamdhan Ramakrishnankuralamudhan.ramakrishnan@intel.com

Negligible

18.04 Not vulnerable

1.18..24ubuntu1

Image Added

Image Added

Approved
CVE-2018-20839ICNUbuntu 18.04https://ubuntu.com/security/CVE-2018-20839

@Kuralamdhan Ramakrishnan

kuralamudhan.ramakrishnan@intel.com

Medium

NoApproved
CVE-2019-Robot basic architecture based on SSES19814ICNUbuntu 18.04https://ubuntu.com/security/CVE-2019-19814

@Kuralamdhan Ramakrishnan

kuralamudhan.ramakrishnan@intel.com

Low

NoApproved
CVE-2019-Robot basic architecture based on SSES17041ICNUbuntu 18.04https://ubuntu.com/security/CVE-2019-17041@Kuralamdhan Ramakrishnankuralamudhan.ramakrishnan@intel.com

Low

NoApproved
CVE-2019-Robot basic architecture based on SSES17042ICNUbuntu 18.04https://ubuntu.com/security/CVE-2019-17042@Kuralamdhan Ramakrishnankuralamudhan.ramakrishnan@intel.com

Low

NoApproved
CVE-2016-Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)1585Public Cloud Edge Interface (PCEI)Ubuntu 18.04https://ubuntu.com/security/CVE-2016-1585oberzin@equinix.comHigh

Medium

NoApproved
CVE-2017-Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)18342Public Cloud Edge Interface (PCEI)Ubuntu 18.04https://ubuntu.com/security/CVE-2017-18342oberzin@equinix.com

Low

NoApproved
CVE-Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)2017-8283Public Cloud Edge Interface (PCEI)Ubuntu 18.04https://ubuntu.com/security/CVE-2017-8283oberzin@equinix.com

Negligible

NoApproved
CVE-2018-Robot basic architecture based on SSES20839Public Cloud Edge Interface (PCEI)Ubuntu 18.04https://ubuntu.com/security/CVE-2018-20839oberzin@equinix.com

Medium

NoApproved
CVE-2019-Robot basic architecture based on SSES17041Public Cloud Edge Interface (PCEI)Ubuntu 18.04https://ubuntu.com/security/CVE-2019-17041oberzin@equinix.com

Low

NoApproved
CVE-2019-Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)17042Public Cloud Edge Interface (PCEI)Ubuntu 18.04https://ubuntu.com/security/CVE-2019-17042oberzin@equinix.com

Low

No

CVE-2021-42377

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)Approved
CVE-2019-19814Public Cloud Edge Interface (PCEI)Ubuntu 18.04https://ubuntu.com/security/CVE-2019-19814oberzin@equinix.com

Low

NoApproved
CVE-2016-Robot basic architecture based on SSES1585ICN - Multi-Tenant Secure Cloud Native Platform Ubuntu 18.04https://ubuntu.com/security/CVE-2016-1585salvador.fuentes@intel.com

Medium

NoApproved
CVE-2017-Robot basic architecture based on SSES18342ICN - Multi-Tenant Secure Cloud Native Platform Ubuntu 18.04https://ubuntu.com/security/CVE-2017-18342salvador.fuentes@intel.com

Low

NoApproved
CVE-20212017-45953Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)8283ICN - Multi-Tenant Secure Cloud Native Platform Ubuntu 18.04https://ubuntu.com/security/CVE-2017-8283salvador.fuentes@intel.com

Negligible

NoApproved
CVE-2018-Robot basic architecture based on SSES20839ICN - Multi-Tenant Secure Cloud Native Platform Ubuntu 18.04https://ubuntu.com/security/CVE-2018-20839salvador.fuentes@intel.com

Medium

NoApproved
CVE-2019-Robot basic architecture based on SSES17041ICN - Multi-Tenant Secure Cloud Native Platform Ubuntu 18.04https://ubuntu.com/security/CVE-2019-17041salvador.fuentes@intel.com

Low

NoApproved
CVERobot basic architecture based on SSESRaspberry Pi OS(Debian 11)-2019-17042ICN - Multi-Tenant Secure Cloud Native Platform Ubuntu 18.04https://ubuntu.com/security/CVE-2019-17042salvador.fuentes@intel.com

Low

NoApproved
CVE-2019-Robot basic architecture based on SSES19814ICN - Multi-Tenant Secure Cloud Native Platform Ubuntu 18.04https://ubuntu.com/security/CVE-2019-19814salvador.fuentes@intel.com

Low

NoApproved
CVE-2019-Robot basic architecture based on SSES12900The AI Edge: Federated ML application at edgeCentOS 7.9https://access.redhat.com/security/cve/cve-2019-12900wuzifan0817@gmail.com
LowNoApproved
CVE-2017-Robot basic architecture based on SSES12652AI Edge: School/Education Video SecurityCentOS 7.9https://inoue.reo@fujitsu.comMediumNo

CVE-2021-43400

Robot basic architecture based on SSESaccess.redhat.com/security/cve/cve-2017-12652Yu, Liyayulia@baidu.com
Low

Yes, however, patch has been installed (see below) however, vuls still reporting CVE.

Image Added

Approved

CVE-2019-5482AI Edge: School/Education Video SecurityCentOS 7.9https://access.redhat.com/security/cve/cve-2019-5482Yu, Liyayulia@baidu.com
MediumNo

...

Yes, however, patch has been installed (see below) however, vuls still reporting CVE.

Image Added

Approved