Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 15 Current »

1.6.1+dfsg.3-2ubuntu1

Blueprints that have vulnerabilities with a CVSS score >= 9.0 and meet the following criteria should submit their information in the chart below to have the vulnerability considered for an exception:

  • Running at least the minimum OS version required by the Akraino Security Sub-Committee
    • Ubuntu
    • CentOS
    • Debian
    • Fedora
    • Suse Enterprise Server

Legend

Ubuntu Priority/Score Descriptions

Not VulnerablePackages which do not exist in the archive, are not affected by the vulnerability or have a fix applied in the archive.
PendingA fix has been applied and updated packages are awaiting arrival into the archive. For example, this might be used when wider testing is requested for the updated package.
UnknownOpen vulnerability where the priority is currently unknown and needs to be triaged.
NegligibleOpen vulnerability that may be a problem but otherwise does not impose a security risk due to various factors. Examples include when the vulnerability is only theoretical in nature, requires a very special situation, has almost no install base or does no real damage. These typically will not receive security updates unless there is an easy fix and some other issue causes an update.
LowOpen vulnerability that is a problem but does very little damage or is otherwise hard to exploit due to small user base or other factors such as requiring specific environment, uncommon configuration, user assistance, etc. These tend to be included in security updates only when higher priority issues require an update or if many low priority issues have built up.
MediumOpen vulnerability that is a real problem and is exploitable for many users of the affected software. Examples include network daemon denial of service, cross-site scripting and gaining user privileges.
HighOpen vulnerability that is a real problem and is exploitable for many users in the default configuration of the affected software. Examples include serious remote denial of service of the system, local root privilege escalations or local data theft.
CriticalOpen vulnerability that is a world-burning problem and is exploitable for most Ubuntu users. Examples include remote root privilege escalations or remote data theft.
CVE #BlueprintBlueprint OS/VerURL Showing OS Patch Not AvailableContact NameContact EmailCommentVendor CVSS ScoreVendor Patch AvailableException Status
CVE-2016-1585EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2016-1585srinivasanselvam2014@gmail.com

Medium

NoApproved
CVE-2017-18342EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2017-18342srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2017-8283EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2017-8283srinivasanselvam2014@gmail.com

Negligible

NoApproved
CVE-2018-20839EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2018-20839srinivasanselvam2014@gmail.com

Medium

NoApproved
CVE-2019-17041EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2019-17041srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2019-17042EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2019-17042srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2019-19814EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2019-19814srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2016-1585ELIOT IOT GatewayUbuntu 18.04https://ubuntu.com/security/CVE-2016-1585srinivasanselvam2014@gmail.com

Medium

NoApproved
CVE-2017-18342ELIOT IOT GatewayUbuntu 18.04https://ubuntu.com/security/CVE-2017-18342srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2017-8283ELIOT IOT GatewayUbuntu 18.04https://ubuntu.com/security/CVE-2017-8283srinivasanselvam2014@gmail.com

Negligible

NoApproved
CVE-2018-20839ELIOT IOT GatewayUbuntu 18.04https://ubuntu.com/security/CVE-2018-20839srinivasanselvam2014@gmail.com

Medium

NoApproved
CVE-2019-17041ELIOT IOT GatewayUbuntu 18.04https://ubuntu.com/security/CVE-2019-17041srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2019-17042ELIOT IOT GatewayUbuntu 18.04https://ubuntu.com/security/CVE-2019-17042srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2019-19814ELIOT IOT GatewayUbuntu 18.04https://ubuntu.com/security/CVE-2019-19814srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2016-1585ELIOT SD-WAN/WAN Edge/uCPE Ubuntu 18.04https://ubuntu.com/security/CVE-2016-1585srinivasanselvam2014@gmail.com

Medium

NoApproved
CVE-2017-18342ELIOT SD-WAN/WAN Edge/uCPEUbuntu 18.04https://ubuntu.com/security/CVE-2017-18342srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2017-8283ELIOT SD-WAN/WAN Edge/uCPEUbuntu 18.04https://ubuntu.com/security/CVE-2017-8283srinivasanselvam2014@gmail.com

Negligible

NoApproved
CVE-2018-20839ELIOT SD-WAN/WAN Edge/uCPEUbuntu 18.04https://ubuntu.com/security/CVE-2018-20839srinivasanselvam2014@gmail.com

Medium

NoApproved
CVE-2019-17041ELIOT SD-WAN/WAN Edge/uCPEUbuntu 18.04https://ubuntu.com/security/CVE-2019-17041srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2019-17042ELIOT SD-WAN/WAN Edge/uCPEUbuntu 18.04https://ubuntu.com/security/CVE-2019-17042srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2019-19814ELIOT SD-WAN/WAN Edge/uCPEUbuntu 18.04https://ubuntu.com/security/CVE-2019-19814srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2016-1585ICNUbuntu 18.04https://ubuntu.com/security/CVE-2016-1585

@Kuralamdhan Ramakrishnan

kuralamudhan.ramakrishnan@intel.com

Medium

No

Approved

CVE-2017-18342ICNUbuntu 18.04https://ubuntu.com/security/CVE-2017-18342@Kuralamdhan Ramakrishnankuralamudhan.ramakrishnan@intel.com

Low

NoApproved
CVE-2017-8283ICNUbuntu 18.04https://ubuntu.com/security/CVE-2017-8283@Kuralamdhan Ramakrishnankuralamudhan.ramakrishnan@intel.com

Negligible

18.04 Not vulnerable

1.18..24ubuntu1

Approved
CVE-2018-20839ICNUbuntu 18.04https://ubuntu.com/security/CVE-2018-20839

@Kuralamdhan Ramakrishnan

kuralamudhan.ramakrishnan@intel.com

Medium

NoApproved
CVE-2019-19814ICNUbuntu 18.04https://ubuntu.com/security/CVE-2019-19814

@Kuralamdhan Ramakrishnan

kuralamudhan.ramakrishnan@intel.com

Low

NoApproved
CVE-2019-17041ICNUbuntu 18.04https://ubuntu.com/security/CVE-2019-17041@Kuralamdhan Ramakrishnankuralamudhan.ramakrishnan@intel.com

Low

NoApproved
CVE-2019-17042ICNUbuntu 18.04https://ubuntu.com/security/CVE-2019-17042@Kuralamdhan Ramakrishnankuralamudhan.ramakrishnan@intel.com

Low

NoApproved
CVE-2016-1585Public Cloud Edge Interface (PCEI)Ubuntu 18.04https://ubuntu.com/security/CVE-2016-1585oberzin@equinix.com

Medium

NoApproved
CVE-2017-18342Public Cloud Edge Interface (PCEI)Ubuntu 18.04https://ubuntu.com/security/CVE-2017-18342oberzin@equinix.com

Low

NoApproved
CVE-2017-8283Public Cloud Edge Interface (PCEI)Ubuntu 18.04https://ubuntu.com/security/CVE-2017-8283oberzin@equinix.com

Negligible

NoApproved
CVE-2018-20839Public Cloud Edge Interface (PCEI)Ubuntu 18.04https://ubuntu.com/security/CVE-2018-20839oberzin@equinix.com

Medium

NoApproved
CVE-2019-17041Public Cloud Edge Interface (PCEI)Ubuntu 18.04https://ubuntu.com/security/CVE-2019-17041oberzin@equinix.com

Low

NoApproved
CVE-2019-17042Public Cloud Edge Interface (PCEI)Ubuntu 18.04https://ubuntu.com/security/CVE-2019-17042oberzin@equinix.com

Low

NoApproved
CVE-2019-19814Public Cloud Edge Interface (PCEI)Ubuntu 18.04https://ubuntu.com/security/CVE-2019-19814oberzin@equinix.com

Low

NoApproved
CVE-2016-1585ICN - Multi-Tenant Secure Cloud Native Platform Ubuntu 18.04https://ubuntu.com/security/CVE-2016-1585salvador.fuentes@intel.com

Medium

NoApproved
CVE-2017-18342ICN - Multi-Tenant Secure Cloud Native Platform Ubuntu 18.04https://ubuntu.com/security/CVE-2017-18342salvador.fuentes@intel.com

Low

NoApproved
CVE-2017-8283ICN - Multi-Tenant Secure Cloud Native Platform Ubuntu 18.04https://ubuntu.com/security/CVE-2017-8283salvador.fuentes@intel.com

Negligible

NoApproved
CVE-2018-20839ICN - Multi-Tenant Secure Cloud Native Platform Ubuntu 18.04https://ubuntu.com/security/CVE-2018-20839salvador.fuentes@intel.com

Medium

NoApproved
CVE-2019-17041ICN - Multi-Tenant Secure Cloud Native Platform Ubuntu 18.04https://ubuntu.com/security/CVE-2019-17041salvador.fuentes@intel.com

Low

NoApproved
CVE-2019-17042ICN - Multi-Tenant Secure Cloud Native Platform Ubuntu 18.04https://ubuntu.com/security/CVE-2019-17042salvador.fuentes@intel.com

Low

NoApproved
CVE-2019-19814ICN - Multi-Tenant Secure Cloud Native Platform Ubuntu 18.04https://ubuntu.com/security/CVE-2019-19814salvador.fuentes@intel.com

Low

NoApproved
CVE-2019-12900The AI Edge: Federated ML application at edgeCentOS 7.9https://access.redhat.com/security/cve/cve-2019-12900wuzifan0817@gmail.com
LowNoApproved
CVE-2017-12652AI Edge: School/Education Video SecurityCentOS 7.9https://access.redhat.com/security/cve/cve-2017-12652Yu, Liyayulia@baidu.com
Low

Yes, however, patch has been installed (see below) however, vuls still reporting CVE.

Approved

CVE-2019-5482AI Edge: School/Education Video SecurityCentOS 7.9https://access.redhat.com/security/cve/cve-2019-5482Yu, Liyayulia@baidu.com
Medium

Yes, however, patch has been installed (see below) however, vuls still reporting CVE.

Approved

CVE-2016-1585Smart Data Transaction for CPSUbuntu 20.04https://ubuntu.com/security/CVE-2016-1585Colin Peterscolin.peters@fujitsu.com
MediumNo
CVE-2021-20236Smart Data Transaction for CPSUbuntu 20.04https://ubuntu.com/security/CVE-2021-20236colin.peters@fujitsu.com
MediumNo
CVE-2021-31870Smart Data Transaction for CPSUbuntu 20.04https://ubuntu.com/security/CVE-2021-31870colin.peters@fujitsu.com
LowNo
CVE-2021-31872Smart Data Transaction for CPSUbuntu 20.04https://ubuntu.com/security/CVE-2021-31872colin.peters@fujitsu.com
LowNo
CVE-2021-31873Smart Data Transaction for CPSUbuntu 20.04https://ubuntu.com/security/CVE-2021-31873colin.peters@fujitsu.com
LowNo
CVE-2021-33574Smart Data Transaction for CPSUbuntu 20.04https://ubuntu.com/security/CVE-2021-33574colin.peters@fujitsu.com
LowNo
CVE-2021-45951Smart Data Transaction for CPSUbuntu 20.04https://ubuntu.com/security/CVE-2021-45951colin.peters@fujitsu.com
MediumNo
CVE-2021-45952Smart Data Transaction for CPSUbuntu 20.04https://ubuntu.com/security/CVE-2021-45952colin.peters@fujitsu.com
MediumNo
CVE-2021-45953Smart Data Transaction for CPSUbuntu 20.04https://ubuntu.com/security/CVE-2021-45953colin.peters@fujitsu.com
MediumNo
CVE-2021-45954Smart Data Transaction for CPSUbuntu 20.04https://ubuntu.com/security/CVE-2021-45954colin.peters@fujitsu.com
MediumNo
CVE-2021-45955Smart Data Transaction for CPSUbuntu 20.04https://ubuntu.com/security/CVE-2021-45955colin.peters@fujitsu.com
MediumNo
CVE-2021-45956Smart Data Transaction for CPSUbuntu 20.04https://ubuntu.com/security/CVE-2021-45956colin.peters@fujitsu.com
MediumNo
CVE-2021-45957Smart Data Transaction for CPSUbuntu 20.04https://ubuntu.com/security/CVE-2021-45957colin.peters@fujitsu.com
MediumNo
CVE-2022-23218Smart Data Transaction for CPSUbuntu 20.04https://ubuntu.com/security/CVE-2022-23218colin.peters@fujitsu.com
LowReported fixed in 2.31-0ubuntu9.7 (installed), but still reported by Vuls.
CVE-2022-23219Smart Data Transaction for CPSUbuntu 20.04https://ubuntu.com/security/CVE-2022-23219colin.peters@fujitsu.com
LowReported fixed in 2.31-0ubuntu9.7 (installed), but still reported by Vuls.
CVE-2016-9180Smart Data Transaction for CPSUbuntu 20.04https://ubuntu.com/security/CVE-2016-9180colin.peters@fujitsu.com
LowNo
CVE-2021-35942Smart Data Transaction for CPSUbuntu 20.04https://ubuntu.com/security/CVE-2021-35942colin.peters@fujitsu.com
LowReported fixed in 2.31-0ubuntu9.7 (installed), but still reported by Vuls.

CVE-2016-1585

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2016-1585

inoue.reo@fujitsu.com



MediumNo

CVE-2017-18201

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2017-18201

inoue.reo@fujitsu.com



LowNo

CVE-2017-7827

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2017-7827

inoue.reo@fujitsu.com


MediumNo

CVE-2018-5090

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2018-5090inoue.reo@fujitsu.com
Medium

Reported fixed in 58 and later version (installed), but still reported by Vuls


CVE-2018-5126

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2018-5126inoue.reo@fujitsu.com
Medium

Reported fixed in 58 and later version (installed), but still reported by Vuls


CVE-2018-5145

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2018-5145inoue.reo@fujitsu.com
Medium

Reported fixed in 1:52.7.0 and later version (installed), but still reported by Vuls


CVE-2018-5151

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2018-5151inoue.reo@fujitsu.com
Medium

Reported fixed in 60 and later version (installed), but still reported by Vuls


CVE-2019-17041

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2019-17041inoue.reo@fujitsu.com
LowNo

CVE-2019-17042

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2019-17042inoue.reo@fujitsu.com
LowNo

CVE-2021-31870

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2021-31870inoue.reo@fujitsu.com
LowNo

CVE-2021-31872

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2021-31872inoue.reo@fujitsu.com
LowNo

CVE-2021-31873

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2021-31873inoue.reo@fujitsu.com
LowNo

CVE-2021-39713

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2021-39713inoue.reo@fujitsu.com
LowNo

CVE-2022-22822

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2022-22822inoue.reo@fujitsu.com
MediumNo

CVE-2022-22823

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2022-22823inoue.reo@fujitsu.com
MediumNo

CVE-2022-22824

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2022-22824inoue.reo@fujitsu.com
MediumNo

CVE-2022-23852

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2022-23852inoue.reo@fujitsu.com
MediumNo

CVE-2022-23990

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2022-23990inoue.reo@fujitsu.com
MediumNo

CVE-2022-25235

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2022-25235inoue.reo@fujitsu.com
HighNo

CVE-2022-25236

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2022-25236inoue.reo@fujitsu.com
HighNo

CVE-2022-25315

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2022-25315inoue.reo@fujitsu.com
MediumNo

CVE-2016-9180

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2016-9180inoue.reo@fujitsu.com
LowNo

CVE-2019-20433

Robot basic architecture based on SSESUbuntu 18.04https://ubuntu.com/security/CVE-2019-20433inoue.reo@fujitsu.com
LowNo

CVE-2005-2541

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2005-2541inoue.reo@fujitsu.com
HighNo

CVE-2014-2830

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2014-2830inoue.reo@fujitsu.com
HighNo

CVE-2016-1585

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2016-1585inoue.reo@fujitsu.com
HighNo

CVE-2017-17479

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2017-17479inoue.reo@fujitsu.com
HighNo

CVE-2017-9117

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2017-9117inoue.reo@fujitsu.com
HighNo

CVE-2018-13410

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2018-13410inoue.reo@fujitsu.com
HighNo

CVE-2019-1010022

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2019-1010022inoue.reo@fujitsu.com
HighNo

CVE-2019-8341

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2019-8341inoue.reo@fujitsu.com
HighNo

CVE-2020-27619

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2020-27619inoue.reo@fujitsu.com
High

CVE-2021-29462

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2021-29462inoue.reo@fujitsu.com
HighNo

CVE-2021-29921

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2021-29921inoue.reo@fujitsu.com
HighReported fixed in python3.9 (installed), but still reported by Vuls

CVE-2021-30473

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2021-30473inoue.reo@fujitsu.com
HighNo

CVE-2021-30474

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2021-30474inoue.reo@fujitsu.com
HighNo

CVE-2021-30475

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2021-30475inoue.reo@fujitsu.com
HighNo

CVE-2021-30498

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2021-30498inoue.reo@fujitsu.com
HighNo

CVE-2021-30499

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2021-30499inoue.reo@fujitsu.com
HighNo

CVE-2021-42377

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2021-42377inoue.reo@fujitsu.com
MediumNo

CVE-2021-45951

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2021-45951inoue.reo@fujitsu.com
HighNo

CVE-2021-45952

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2021-45952inoue.reo@fujitsu.com
HighNo

CVE-2021-45953

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2021-45953inoue.reo@fujitsu.com
HighNo

CVE-2021-45954

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2021-45954inoue.reo@fujitsu.com
HighNo

CVE-2021-45955

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2021-45955inoue.reo@fujitsu.com
HighNo

CVE-2021-45956

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2021-45956inoue.reo@fujitsu.com
HighNo

CVE-2022-23303

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2022-23303inoue.reo@fujitsu.com
MediumNo

CVE-2022-23304

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2022-23304inoue.reo@fujitsu.com
MediumNo

CVE-2021-4048

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2021-4048inoue.reo@fujitsu.com
MediumNo

CVE-2021-43400

Robot basic architecture based on SSESRaspberry Pi OS(Debian 11)https://security-tracker.debian.org/tracker/CVE-2021-43400inoue.reo@fujitsu.com
MediumNo











  • No labels