Product:

Ubuntu_linux

(Canonical)
Repositories https://github.com/torvalds/linux
https://github.com/ImageMagick/ImageMagick
https://github.com/LibRaw/LibRaw
https://github.com/neomutt/neomutt
https://github.com/xkbcommon/libxkbcommon
https://github.com/kyz/libmspack
https://github.com/FreeRDP/FreeRDP
https://github.com/gpac/gpac
https://github.com/curl/curl
https://github.com/dbry/WavPack
https://github.com/file/file
https://github.com/audreyt/module-signature
https://github.com/apache/httpd
https://github.com/newsoft/libvncserver
https://github.com/LibVNC/libvncserver
https://github.com/openvswitch/ovs
https://github.com/Perl/perl5
https://github.com/rubygems/rubygems
https://github.com/libarchive/libarchive
https://github.com/tats/w3m
https://github.com/ntp-project/ntp
https://github.com/erikd/libsndfile
https://github.com/libgd/libgd
https://github.com/memcached/memcached
https://github.com/dosfstools/dosfstools
https://github.com/php/php-src
https://github.com/WebKit/webkit
https://github.com/lxc/lxcfs
https://github.com/bagder/curl
https://github.com/vrtadmin/clamav-devel
https://github.com/simsong/tcpflow
https://github.com/lxml/lxml
https://github.com/opencontainers/runc
https://github.com/beanshell/beanshell
https://github.com/ImageMagick/ImageMagick6
https://github.com/glennrp/libpng
https://github.com/openssh/openssh-portable
https://github.com/git/git
https://github.com/mm2/Little-CMS
https://github.com/openbsd/src
https://github.com/libjpeg-turbo/libjpeg-turbo
• git://git.openssl.org/openssl.git
https://github.com/mysql/mysql-server
https://github.com/GNOME/pango
https://github.com/dovecot/core
https://git.kernel.org/pub/scm/git/git.git
https://github.com/openstack/nova-lxd
https://github.com/apple/cups
https://github.com/derickr/timelib
https://git.savannah.gnu.org/git/patch.git
https://github.com/requests/requests
https://github.com/puppetlabs/puppet
https://github.com/lxc/lxc
https://github.com/flori/json
https://github.com/qpdf/qpdf
https://github.com/TeX-Live/texlive-source
https://github.com/liblouis/liblouis
https://github.com/lavv17/lftp
https://github.com/Cisco-Talos/clamav-devel
https://github.com/moinwiki/moin-1.9
https://github.com/pyca/cryptography
https://github.com/libimobiledevice/libimobiledevice
https://github.com/jpirko/libndp
https://github.com/wikimedia/mediawiki
https://github.com/kohler/t1utils
https://github.com/kennethreitz/requests
https://github.com/khaledhosny/ots
https://github.com/jmacd/xdelta-devel
https://github.com/quassel/quassel
https://github.com/hexchat/hexchat
https://github.com/mongodb/mongo-python-driver
https://github.com/openstack/glance
https://github.com/openstack/nova
#Vulnerabilities 2798
Date Id Summary Products Score Patch Annotated
2020-11-19 CVE-2020-15710 Potential double free in Bluez 5 module of PulseAudio could allow a local attacker to leak memory or crash the program. The modargs variable may be freed twice in the fail condition in src/modules/bluetooth/module-bluez5-device.c and src/modules/bluetooth/module-bluez5-device.c. Fixed in 1:8.0-0ubuntu3.14. Ubuntu_linux, Pulseaudio 6.1
2020-06-15 CVE-2020-0543 Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. Ubuntu_linux, Fedora, Celeron_1000m, Celeron_1005m, Celeron_1007u, Celeron_1017u, Celeron_1019y, Celeron_1020e, Celeron_1020m, Celeron_1037u, Celeron_1047ue, Celeron_2955u, Celeron_2957u, Celeron_2970m, Celeron_2980u, Celeron_2981u, Celeron_3755u, Celeron_3765u, Celeron_3855u, Celeron_3865u, Celeron_3955u, Celeron_3965u, Celeron_3965y, Celeron_5305u, Celeron_725c, Celeron_927ue, Celeron_g1610, Celeron_g1610t, Celeron_g1620, Celeron_g1620t, Celeron_g1630, Celeron_g1820, Celeron_g1820t, Celeron_g1830, Celeron_g1840, Celeron_g1840t, Celeron_g1850, Celeron_g3900, Celeron_g3900t, Celeron_g3900te, Celeron_g3902e, Celeron_g3920, Celeron_g3920t, Celeron_g3930e, Celeron_g3930te, Celeron_g3940, Celeron_g4900, Celeron_g4900t, Celeron_g4920, Celeron_g4930, Celeron_g4950, Core_4205u, Core_4410y, Core_4415y, Core_5405u, Core_8269u, Core_9300h, Core_9750hf, Core_i3\-2115c, Core_i3\-3110m, Core_i3\-3115c, Core_i3\-3120m, Core_i3\-3120me, Core_i3\-3130m, Core_i3\-3210, Core_i3\-3217u, Core_i3\-3217ue, Core_i3\-3220, Core_i3\-3220t, Core_i3\-3225, Core_i3\-3227u, Core_i3\-3229y, Core_i3\-3240, Core_i3\-3240t, Core_i3\-3245, Core_i3\-3250, Core_i3\-3250t, Core_i3\-4005u, Core_i3\-4010u, Core_i3\-4010y, Core_i3\-4012y, Core_i3\-4020y, Core_i3\-4025u, Core_i3\-4030u, Core_i3\-4030y, Core_i3\-4100m, Core_i3\-4100u, Core_i3\-4110m, Core_i3\-4120u, Core_i3\-4130, Core_i3\-4130t, Core_i3\-4150, Core_i3\-4150t, Core_i3\-4158u, Core_i3\-4160, Core_i3\-4160t, Core_i3\-4170, Core_i3\-4170t, Core_i3\-4330, Core_i3\-4330t, Core_i3\-4340, Core_i3\-4350, Core_i3\-4350t, Core_i3\-4360, Core_i3\-4360t, Core_i3\-4370, Core_i3\-4370t, Core_i3\-5005u, Core_i3\-5006u, Core_i3\-5010u, Core_i3\-5015u, Core_i3\-5020u, Core_i3\-5157u, Core_i3\-6100, Core_i3\-6100e, Core_i3\-6100h, Core_i3\-6100t, Core_i3\-6100te, Core_i3\-6100u, Core_i3\-6102e, Core_i3\-6110u, Core_i3\-6120, Core_i3\-6120t, Core_i3\-6167u, Core_i3\-6300, Core_i3\-6300t, Core_i3\-6320, Core_i3\-6320t, Core_i3\-7007u, Core_i3\-7020u, Core_i3\-7100e, Core_i3\-7100h, Core_i3\-7100u, Core_i3\-7101e, Core_i3\-7101te, Core_i3\-7102e, Core_i3\-7110u, Core_i3\-7120, Core_i3\-7120t, Core_i3\-7130u, Core_i3\-7167u, Core_i3\-7320t, Core_i3\-7340, Core_i3\-8000, Core_i3\-8000t, Core_i3\-8020, Core_i3\-8100, Core_i3\-8100h, Core_i3\-8100t, Core_i3\-8109u, Core_i3\-8120, Core_i3\-8130u, Core_i3\-8145u, Core_i3\-8300, Core_i3\-8300t, Core_i3\-8350k, Core_i3\-I3\-8100h, Core_i5\-10110y, Core_i5\-10210u, Core_i5\-10210y, Core_i5\-10310y, Core_i5\-3210m, Core_i5\-3230m, Core_i5\-3317u, Core_i5\-3320m, Core_i5\-3330, Core_i5\-3330s, Core_i5\-3337u, Core_i5\-3339y, Core_i5\-3340, Core_i5\-3340m, Core_i5\-3340s, Core_i5\-3350p, Core_i5\-3360m, Core_i5\-3380m, Core_i5\-3427u, Core_i5\-3437u, Core_i5\-3439y, Core_i5\-3450, Core_i5\-3450s, Core_i5\-3470, Core_i5\-3470s, Core_i5\-3470t, Core_i5\-3475s, Core_i5\-3550, Core_i5\-3550s, Core_i5\-3570, Core_i5\-3570k, Core_i5\-3570s, Core_i5\-3570t, Core_i5\-3610me, Core_i5\-4200u, Core_i5\-4200y, Core_i5\-4202y, Core_i5\-4210h, Core_i5\-4210u, Core_i5\-4210y, Core_i5\-4220y, Core_i5\-4250u, Core_i5\-4258u, Core_i5\-4260u, Core_i5\-4278u, Core_i5\-4288u, Core_i5\-4300u, Core_i5\-4300y, Core_i5\-4302y, Core_i5\-4308u, Core_i5\-4350u, Core_i5\-4402ec, Core_i5\-4430, Core_i5\-4430s, Core_i5\-4440, Core_i5\-4440s, Core_i5\-4460, Core_i5\-4460s, Core_i5\-4460t, Core_i5\-4570, Core_i5\-4570r, Core_i5\-4570s, Core_i5\-4570t, Core_i5\-4590, Core_i5\-4590s, Core_i5\-4590t, Core_i5\-4670, Core_i5\-4670k, Core_i5\-4670r, Core_i5\-4670s, Core_i5\-4670t, Core_i5\-4690, Core_i5\-4690s, Core_i5\-4690t, Core_i5\-5200u, Core_i5\-5250u, Core_i5\-5257u, Core_i5\-5287u, Core_i5\-5350, Core_i5\-5350u, Core_i5\-5575r, Core_i5\-5675c, Core_i5\-5675r, Core_i5\-6200u, Core_i5\-6210u, Core_i5\-6260u, Core_i5\-6267u, Core_i5\-6287u, Core_i5\-6300hq, Core_i5\-6300u, Core_i5\-6310u, Core_i5\-6350hq, Core_i5\-6360u, Core_i5\-6400, Core_i5\-6400t, Core_i5\-6440eq, Core_i5\-6440hq, Core_i5\-6442eq, Core_i5\-6500, Core_i5\-6500t, Core_i5\-6500te, Core_i5\-6600, Core_i5\-6600k, Core_i5\-6600t, Core_i5\-7200u, Core_i5\-7210u, Core_i5\-7260u, Core_i5\-7267u, Core_i5\-7287u, Core_i5\-7300hq, Core_i5\-7300u, Core_i5\-7360u, Core_i5\-7400, Core_i5\-7400t, Core_i5\-7440eq, Core_i5\-7440hq, Core_i5\-7442eq, Core_i5\-7500, Core_i5\-7500t, Core_i5\-7500u, Core_i5\-7600, Core_i5\-7600k, Core_i5\-7600t, Core_i5\-7640x, Core_i5\-7y54, Core_i5\-7y57_, Core_i5\-8200y, Core_i5\-8210y, Core_i5\-8250u, Core_i5\-8259u, Core_i5\-8265u, Core_i5\-8300h, Core_i5\-8305g, Core_i5\-8310y, Core_i5\-8350u, Core_i5\-8365u, Core_i5\-8400, Core_i5\-8400b, Core_i5\-8400h, Core_i5\-8400t, Core_i5\-8420, Core_i5\-8420t, Core_i5\-8500, Core_i5\-8500b, Core_i5\-8500t, Core_i5\-8550, Core_i5\-8600, Core_i5\-8600k, Core_i5\-8600t, Core_i5\-8650, Core_i5\-8650k, Core_i5\-9400, Core_i5\-9400f, Core_i5\-9400h, Core_i5\-9600k, Core_i5\-9600kf, Core_i7\-10510u, Core_i7\-10510y, Core_i7\-3517u, Core_i7\-3517ue, Core_i7\-3520m, Core_i7\-3537u, Core_i7\-3540m, Core_i7\-3555le, Core_i7\-3610qe, Core_i7\-3610qm, Core_i7\-3612qe, Core_i7\-3612qm, Core_i7\-3615qe, Core_i7\-3615qm, Core_i7\-3630qm, Core_i7\-3632qm, Core_i7\-3635qm, Core_i7\-3667u, Core_i7\-3687u, Core_i7\-3689y, Core_i7\-3720qm, Core_i7\-3740qm, Core_i7\-3770, Core_i7\-3770k, Core_i7\-3770s, Core_i7\-3770t, Core_i7\-3820qm, Core_i7\-3840qm_, Core_i7\-3920xm, Core_i7\-3940xm, Core_i7\-4500u, Core_i7\-4510u, Core_i7\-4550u, Core_i7\-4558u, Core_i7\-4578u, Core_i7\-4600u, Core_i7\-4610y, Core_i7\-4650u, Core_i7\-4700ec, Core_i7\-4700eq, Core_i7\-4700hq, Core_i7\-4700mq, Core_i7\-4702ec, Core_i7\-4702hq, Core_i7\-4702mq, Core_i7\-4710hq, Core_i7\-4710mq, Core_i7\-4712hq, Core_i7\-4712mq, Core_i7\-4720hq, Core_i7\-4722hq, Core_i7\-4750hq, Core_i7\-4760hq, Core_i7\-4765t, Core_i7\-4770, Core_i7\-4770hq, Core_i7\-4770k, Core_i7\-4770r, Core_i7\-4770s, Core_i7\-4770t, Core_i7\-4771, Core_i7\-4785t, Core_i7\-4790, Core_i7\-4790s, Core_i7\-4790t, Core_i7\-4800mq, Core_i7\-4810mq, Core_i7\-4850hq, Core_i7\-4860hq, Core_i7\-4870hq, Core_i7\-4900mq, Core_i7\-4910mq, Core_i7\-4950hq, Core_i7\-4960hq, Core_i7\-4980hq, Core_i7\-5500u, Core_i7\-5550u, Core_i7\-5557u, Core_i7\-5600u, Core_i7\-5650u, Core_i7\-5700eq, Core_i7\-5700hq, Core_i7\-5750hq, Core_i7\-5775c, Core_i7\-5775r, Core_i7\-5850eq, Core_i7\-5850hq, Core_i7\-5950hq, Core_i7\-6500u, Core_i7\-6510u, Core_i7\-6560u, Core_i7\-6567u, Core_i7\-6600u, Core_i7\-6650u, Core_i7\-6660u, Core_i7\-6700, Core_i7\-6700hq, Core_i7\-6700k, Core_i7\-6700t, Core_i7\-6700te, Core_i7\-6770hq, Core_i7\-6820eq, Core_i7\-6820hk, Core_i7\-6820hq, Core_i7\-6822eq, Core_i7\-6870hq, Core_i7\-6920hq, Core_i7\-6970hq, Core_i7\-7500u, Core_i7\-7510u, Core_i7\-7560u, Core_i7\-7567u, Core_i7\-7600u, Core_i7\-7660u, Core_i7\-7700, Core_i7\-7700hq, Core_i7\-7700k, Core_i7\-7700t, Core_i7\-7740x, Core_i7\-7820eq, Core_i7\-7820hk, Core_i7\-7820hq, Core_i7\-7920hq, Core_i7\-7y75, Core_i7\-8500y, Core_i7\-8510y, Core_i7\-8550u, Core_i7\-8557u, Core_i7\-8559u, Core_i7\-8560u, Core_i7\-8565u, Core_i7\-8569u, Core_i7\-8650u, Core_i7\-8665u, Core_i7\-8670, Core_i7\-8670t, Core_i7\-8700, Core_i7\-8700b, Core_i7\-8700k, Core_i7\-8700t, Core_i7\-8705g, Core_i7\-8706g, Core_i7\-8709g, Core_i7\-8750h, Core_i7\-8809g, Core_i7\-8850h, Core_i7\-9700k, Core_i7\-9700kf, Core_i7\-9850h, Core_i9\-8950hk, Core_i9\-9880h, Core_i9\-9900k, Core_i9\-9900kf, Core_i9\-9980hk, Core_m3\-6y30, Core_m3\-7y30, Core_m3\-8100y, Core_m5\-6y54, Core_m5\-6y57, Core_m7\-6y75, Core_m\-5y10, Core_m\-5y10a, Core_m\-5y10c, Core_m\-5y3, Core_m\-5y51, Core_m\-5y70, Core_m\-5y71, Pentium_1405_v2, Pentium_2020m_v2, Pentium_2030m_v2, Pentium_2117u_v2, Pentium_2127u_v2, Pentium_2129y_v2, Pentium_3205u, Pentium_3215u, Pentium_3556u, Pentium_3558u, Pentium_3560m, Pentium_3560y, Pentium_3561y, Pentium_3665u, Pentium_3765u, Pentium_3805u, Pentium_3825u, Pentium_4405u, Pentium_4405y, Pentium_4415u, Pentium_a1018_v2, Pentium_b915c, Pentium_b925c, Pentium_g2010_v2, Pentium_g2020_v2, Pentium_g2020t_v2, Pentium_g2030_v2, Pentium_g2030t_v2, Pentium_g2100t_v2, Pentium_g2120_v2, Pentium_g2120t_v2, Pentium_g2130_v2, Pentium_g2140_v2, Pentium_g3220, Pentium_g3220t, Pentium_g3240, Pentium_g3240t, Pentium_g3250, Pentium_g3250t, Pentium_g3258, Pentium_g3260, Pentium_g3260t, Pentium_g3420, Pentium_g3420t, Pentium_g3430, Pentium_g3440, Pentium_g3440t, Pentium_g3450, Pentium_g3450t, Pentium_g3460, Pentium_g3460t, Pentium_g3470, Pentium_g4400, Pentium_g4400t, Pentium_g4400te, Pentium_g4420, Pentium_g4420t, Pentium_g4500, Pentium_g4500t, Pentium_g4520, Pentium_g4520t, Pentium_g4540, Pentium_g5400, Pentium_g5400t, Pentium_g5420, Pentium_g5420t, Pentium_g5500, Pentium_g5500t, Pentium_g5600, Pentium_gold_6405u, Xeon_e3\-1105c, Xeon_e3\-1105c_v2, Xeon_e3\-1125c, Xeon_e3\-1125c_v2, Xeon_e3\-1220_v2, Xeon_e3\-1220_v3, Xeon_e3\-1220_v5, Xeon_e3\-1220_v6, Xeon_e3\-1220l_v2, Xeon_e3\-1220l_v3, Xeon_e3\-1221_v3, Xeon_e3\-1225_v2, Xeon_e3\-1225_v3, Xeon_e3\-1225_v5, Xeon_e3\-1225_v6, Xeon_e3\-1226_v3, Xeon_e3\-1230_v2, Xeon_e3\-1230_v3, Xeon_e3\-1230_v5, Xeon_e3\-1230_v6, Xeon_e3\-1230l_v3, Xeon_e3\-1231_v3, Xeon_e3\-1235_v2, Xeon_e3\-1235l_v5, Xeon_e3\-1240_v2, Xeon_e3\-1240_v3, Xeon_e3\-1240_v5, Xeon_e3\-1240_v6, Xeon_e3\-1240l_v3, Xeon_e3\-1240l_v5, Xeon_e3\-1241_v3, Xeon_e3\-1245_v2, Xeon_e3\-1245_v3, Xeon_e3\-1245_v5, Xeon_e3\-1245_v6, Xeon_e3\-1246_v3, Xeon_e3\-1258l_v4, Xeon_e3\-1260l_v5, Xeon_e3\-1265l, Xeon_e3\-1265l_v2, Xeon_e3\-1265l_v4, Xeon_e3\-1268l_v3, Xeon_e3\-1268l_v5, Xeon_e3\-1270, Xeon_e3\-1270_v2, Xeon_e3\-1270_v5, Xeon_e3\-1270_v6, Xeon_e3\-1271_v3, Xeon_e3\-1275_v2, Xeon_e3\-1275_v3, Xeon_e3\-1275_v5, Xeon_e3\-1275_v6, Xeon_e3\-1275l_v3, Xeon_e3\-1276_v3, Xeon_e3\-1278l_v4, Xeon_e3\-1280_v2, Xeon_e3\-1280_v3, Xeon_e3\-1280_v5, Xeon_e3\-1280_v6, Xeon_e3\-1281_v3, Xeon_e3\-1285_v3, Xeon_e3\-1285_v4, Xeon_e3\-1285_v6, Xeon_e3\-1285l_v3, Xeon_e3\-1286_v3, Xeon_e3\-1286l_v3, Xeon_e3\-1290_v2, Xeon_e3\-1501l_v6, Xeon_e3\-1501m_v6, Xeon_e3\-1505l_v5, Xeon_e3\-1505l_v6, Xeon_e3\-1505m_v5, Xeon_e3\-1505m_v6, Xeon_e3\-1515m_v5, Xeon_e3\-1535m_v5, Xeon_e3\-1535m_v6, Xeon_e3\-1545m_v5, Xeon_e3\-1558l_v5, Xeon_e3\-1565l_v5, Xeon_e3\-1575m_v5, Xeon_e3\-1578l_v5, Xeon_e3\-1585_v5, Xeon_e3\-1585l_v5, Xeon_e\-2124, Xeon_e\-2124g, Xeon_e\-2126g, Xeon_e\-2134, Xeon_e\-2136, Xeon_e\-2144g, Xeon_e\-2146g, Xeon_e\-2174g, Xeon_e\-2176g, Xeon_e\-2176m, Xeon_e\-2184g, Xeon_e\-2186g, Xeon_e\-2186m, Xeon_e\-2224, Xeon_e\-2224g, Xeon_e\-2226g, Xeon_e\-2226ge, Xeon_e\-2234, Xeon_e\-2236, Xeon_e\-2244g, Xeon_e\-2246g, Xeon_e\-2254me, Xeon_e\-2254ml, Xeon_e\-2274g, Xeon_e\-2276g, Xeon_e\-2276m, Xeon_e\-2276me, Xeon_e\-2276ml, Xeon_e\-2278g, Xeon_e\-2278ge, Xeon_e\-2278gel, Xeon_e\-2284g, Xeon_e\-2286m, Xeon_e\-2288g, Leap 5.5
2018-08-05 CVE-2018-14938 An issue was discovered in wifipcap/wifipcap.cpp in TCPFLOW through 1.5.0-alpha. There is an integer overflow in the function handle_prism during caplen processing. If the caplen is less than 144, one can cause an integer overflow in the function handle_80211, which will result in an out-of-bounds read and may allow access to sensitive memory (or a denial of service). Ubuntu_linux, Tcpflow 9.1
2018-12-02 CVE-2018-19787 An issue was discovered in lxml before 4.2.5. lxml/html/clean.py in the lxml.html.clean module does not remove javascript: URLs that use escaping, allowing a remote attacker to conduct XSS attacks, as demonstrated by "j a v a s c r i p t:" in Internet Explorer. This is a similar issue to CVE-2014-3146. Ubuntu_linux, Debian_linux, Lxml 6.1
2020-05-14 CVE-2020-1945 Apache Ant 1.1 to 1.9.14 and 1.10.0 to 1.10.7 uses the default temporary directory identified by the Java system property java.io.tmpdir for several tasks and may thus leak sensitive information. The fixcrlf and replaceregexp tasks also copy files from the temporary directory back into the build tree allowing an attacker to inject modified source files into the build process. Ant, Ubuntu_linux, Fedora 6.3
2020-11-07 CVE-2020-16122 PackageKit's apt backend mistakenly treated all local debs as trusted. The apt security model is based on repository trust and not on the contents of individual files. On sites with configured PolicyKit rules this may allow users to install malicious packages. Ubuntu_linux, Packagekit 7.8
2020-08-17 CVE-2020-1472 An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC), aka 'Netlogon Elevation of Privilege Vulnerability'. Ubuntu_linux, Fedora, Windows_server_2008, Windows_server_2012, Windows_server_2016, Windows_server_2019, Leap, Samba, Directory_server 10.0
2020-07-06 CVE-2020-10760 A use-after-free flaw was found in all samba LDAP server versions before 4.10.17, before 4.11.11, before 4.12.4 used in a AC DC configuration. A Samba LDAP user could use this flaw to crash samba. Ubuntu_linux, Fedora, Leap, Samba 6.5
2015-04-01 CVE-2015-2808 The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue. Ubuntu_linux, Debian_linux, Sparc_enterprise_m3000_firmware, Sparc_enterprise_m4000_firmware, Sparc_enterprise_m5000_firmware, Sparc_enterprise_m8000_firmware, Sparc_enterprise_m9000_firmware, 9700_firmware, E6000_firmware, E9000_firmware, Oceanstor_18500_firmware, Oceanstor_18800_firmware, Oceanstor_18800f_firmware, Oceanstor_9000_firmware, Oceanstor_cse_firmware, Oceanstor_hvs85t_firmware, Oceanstor_replicationdirector, Oceanstor_s2600t_firmware, Oceanstor_s5500t_firmware, Oceanstor_s5600t_firmware, Oceanstor_s5800t_firmware, Oceanstor_s6800t_firmware, Oceanstor_vis6600t_firmware, Policy_center, Quidway_s9300_firmware, S12700_firmware, S2700_firmware, S2750_firmware, S3700_firmware, S5700ei_firmware, S5700hi_firmware, S5700li_firmware, S5700s\-Li_firmware, S5700si_firmware, S5710ei_firmware, S5710hi_firmware, S5720ei_firmware, S5720hi_firmware, S6700_firmware, S7700_firmware, Smc2\.0, Te60_firmware, Ultravr, Cognos_metrics_manager, Opensuse, Communications_application_session_controller, Communications_policy_management, Http_server, Integrated_lights_out_manager_firmware, Enterprise_linux_desktop, Enterprise_linux_eus, Enterprise_linux_server, Enterprise_linux_server_aus, Enterprise_linux_server_tus, Enterprise_linux_workstation, Satellite, Linux_enterprise_debuginfo, Linux_enterprise_desktop, Linux_enterprise_server, Linux_enterprise_software_development_kit, Manager N/A
2013-03-15 CVE-2013-2566 The RC4 algorithm, as used in the TLS protocol and SSL protocol, has many single-byte biases, which makes it easier for remote attackers to conduct plaintext-recovery attacks via statistical analysis of ciphertext in a large number of sessions that use the same plaintext. Ubuntu_linux, M10\-1_firmware, M10\-4_firmware, M10\-4s_firmware, Sparc_enterprise_m3000_firmware, Sparc_enterprise_m4000_firmware, Sparc_enterprise_m5000_firmware, Sparc_enterprise_m8000_firmware, Sparc_enterprise_m9000_firmware, Firefox, Firefox_esr, Seamonkey, Thunderbird, Thunderbird_esr, Communications_application_session_controller, Http_server, Integrated_lights_out_manager_firmware 5.9