Skip to end of metadata
Go to start of metadata

1.6.1+dfsg.3-2ubuntu1

Blueprints that have vulnerabilities with a CVSS score >= 9.0 and meet the following criteria should submit their information in the chart below to have the vulnerability considered for an exception:

  • Running at least the minimum OS version required by the Akraino Security Sub-Committee
    • Ubuntu
    • CentOS
    • Debian
    • Fedora
    • Suse Enterprise Server

Legend

Ubuntu Priority/Score Descriptions

Not VulnerablePackages which do not exist in the archive, are not affected by the vulnerability or have a fix applied in the archive.
PendingA fix has been applied and updated packages are awaiting arrival into the archive. For example, this might be used when wider testing is requested for the updated package.
UnknownOpen vulnerability where the priority is currently unknown and needs to be triaged.
NegligibleOpen vulnerability that may be a problem but otherwise does not impose a security risk due to various factors. Examples include when the vulnerability is only theoretical in nature, requires a very special situation, has almost no install base or does no real damage. These typically will not receive security updates unless there is an easy fix and some other issue causes an update.
LowOpen vulnerability that is a problem but does very little damage or is otherwise hard to exploit due to small user base or other factors such as requiring specific environment, uncommon configuration, user assistance, etc. These tend to be included in security updates only when higher priority issues require an update or if many low priority issues have built up.
MediumOpen vulnerability that is a real problem and is exploitable for many users of the affected software. Examples include network daemon denial of service, cross-site scripting and gaining user privileges.
HighOpen vulnerability that is a real problem and is exploitable for many users in the default configuration of the affected software. Examples include serious remote denial of service of the system, local root privilege escalations or local data theft.
CriticalOpen vulnerability that is a world-burning problem and is exploitable for most Ubuntu users. Examples include remote root privilege escalations or remote data theft.
CVE #BlueprintBlueprint OS/VerURL Showing OS Patch Not AvailableContact NameContact EmailCommentVendor CVSS ScoreVendor Patch AvailableException Status
CVE-2019-12900Connected Vehicle Blueprint (CVB)Centos 7.8+https://access.redhat.com/security/cve/CVE-2019-12900abhimanyu@parserlabs.comWe need exception request for this CVE as it is not yet fixed for 7.X version4.0NoApproved
CVE-2019-12900IEC Type4-AR/VVR oriented Edge StackCentos 7.8+https://access.redhat.com/security/cve/CVE-2019-12900abhimanyu@parserlabs.comWe need exception request for this CVE as it is not yet fixed for 7.X version4.0NoApproved
CVE-2016-1585KubeEdge Edge Service BlueprintUbuntu 20.04https://ubuntu.com/security/CVE-2016-1585yin.ding@futurewei.com

Medium

NoApproved
CVE-2017-8283KubeEdge Edge Service BlueprintUbuntu 20.04https://ubuntu.com/security/CVE-2017-8283yin.ding@futurewei.com

Negligible

NoApproved
CVE-2018-20839KubeEdge Edge Service BlueprintUbuntu 20.04https://ubuntu.com/security/CVE-2018-20839yin.ding@futurewei.com

Medium

NoApproved
CVE-2019-19814KubeEdge Edge Service BlueprintUbuntu 20.04https://ubuntu.com/security/CVE-2019-19814yin.ding@futurewei.com

Low

NoApproved
CVE-2016-1585ELIOT IOTGatewayUbuntu 16.04https://ubuntu.com/security/CVE-2016-1585srinivasanselvam2014@gmail.com

Medium

NoApproved
CVE-2016-5407ELIOT IOTGatewayUbuntu 16.04https://ubuntu.com/security/CVE-2016-5407Srinivasan Selvamsrinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2016-7944ELIOT IOTGatewayUbuntu 16.04https://ubuntu.com/security/CVE-2016-7944Srinivasan Selvamsrinivasanselvam2014@gmail.com

Low

No

Approved

CVE-2016-7947ELIOT IOTGatewayUbuntu 16.04https://ubuntu.com/security/CVE-2016-7947Srinivasan Selvamsrinivasanselvam2014@gmail.com

Low

No

Approved


CVE-2016-7948ELIOT IOTGatewayUbuntu 16.04https://ubuntu.com/security/CVE-2016-7948Srinivasan Selvamsrinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2016-7949ELIOT IOTGatewayUbuntu 16.04https://ubuntu.com/security/CVE-2016-7949Srinivasan Selvamsrinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2016-7950ELIOT IOTGatewayUbuntu 16.04https://ubuntu.com/security/CVE-2016-7950Srinivasan Selvamsrinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2016-7951ELIOT IOTGatewayUbuntu 16.04https://ubuntu.com/security/CVE-2016-7951Srinivasan Selvamsrinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2016-8735ELIOT IOTGatewayUbuntu 16.04https://ubuntu.com/security/CVE-2016-8735Srinivasan Selvamsrinivasanselvam2014@gmail.com

Low

Released (6.0.45+dfsg-1ubuntu0.1)

Explanation:

We are using same version of integrated OS package as mentioned as released by ubuntu for Package dfsg.  But still issue thrown.

It is not an issue from our side.  This issue is with Vuls or Ubuntu. 

Proof:

Approved

CVE-2017-10684ELIOT IOTGatewayUbuntu 16.04https://ubuntu.com/security/CVE-2017-10684Srinivasan Selvamsrinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2017-10685ELIOT IOTGatewayUbuntu 16.04https://ubuntu.com/security/CVE-2017-10685Srinivasan Selvamsrinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2017-12424ELIOT IOTGatewayUbuntu 16.04https://ubuntu.com/security/CVE-2017-12424Srinivasan Selvamsrinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2017-12562ELIOT IOTGatewayUbuntu 16.04https://ubuntu.com/security/CVE-2017-12562Srinivasan Selvamsrinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2017-15041ELIOT IOTGatewayUbuntu 16.04https://ubuntu.com/security/CVE-2017-15041Srinivasan Selvamsrinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2017-15088ELIOT IOTGatewayUbuntu 16.04https://ubuntu.com/security/CVE-2017-15088Srinivasan Selvamsrinivasanselvam2014@gmail.com

Negligible

NoApproved
CVE-2017-18342ELIOT IOTGatewayUbuntu 16.04https://ubuntu.com/security/CVE-2017-18342Srinivasan Selvamsrinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2017-7614ELIOT IOTGatewayUbuntu 16.04https://ubuntu.com/security/CVE-2017-7614Srinivasan Selvamsrinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2017-8283ELIOT IOTGatewayUbuntu 16.04https://ubuntu.com/security/CVE-2017-8283Srinivasan Selvamsrinivasanselvam2014@gmail.com

Negligible

NoApproved
CVE-2018-12699ELIOT IOTGatewayUbuntu 16.04https://ubuntu.com/security/CVE-2018-12699Srinivasan Selvamsrinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2018-20839ELIOT IOTGatewayUbuntu 16.04https://ubuntu.com/security/CVE-2018-20839Srinivasan Selvamsrinivasanselvam2014@gmail.com

Medium

NoApproved
CVE-2019-17041ELIOT IOTGatewayUbuntu 16.04https://ubuntu.com/security/CVE-2019-17041Srinivasan Selvamsrinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2019-17042ELIOT IOTGatewayUbuntu 16.04https://ubuntu.com/security/CVE-2019-17042Srinivasan Selvamsrinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2019-17571ELIOT IOTGatewayUbuntu 16.04https://ubuntu.com/security/CVE-2019-17571Srinivasan Selvamsrinivasanselvam2014@gmail.com

Medium

NoApproved
CVE-2020-10683ELIOT IOTGatewayUbuntu 16.04https://ubuntu.com/security/CVE-2020-10683Srinivasan Selvamsrinivasanselvam2014@gmail.com

Medium

Released (1.6.1+dfsg.3-2ubuntu1.1)

Explanation:
This is OS integrated package and we are using 1.6.1+dfsg.3-2ubuntu1 same updated latest release version.  This is an issue with Vuls / Ubuntu not from our side.

Proof:

Approved
CVE-2020-1938ELIOT IOTGatewayUbuntu 16.04https://ubuntu.com/security/CVE-2020-1938Srinivasan Selvamsrinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2019-19814ELIOT IOTGatewayUbuntu 16.04https://ubuntu.com/security/CVE-2019-19814Srinivasan Selvamsrinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2019-19816ELIOT IOTGatewayUbuntu 16.04https://ubuntu.com/security/CVE-2019-19816Srinivasan Selvamsrinivasanselvam2014@gmail.com

Low

Package:  linux

For ubuntu 16.04, status is Needed.

Package not available for ubuntu 16.04

Approved
CVE-2016-9584ELIOT IOTGatewayUbuntu 16.04https://ubuntu.com/security/CVE-2016-9584Srinivasan Selvamsrinivasanselvam2014@gmail.com

Low

Package:  libical

For Ubuntu 16.04, status is Needed for Libical Package.

Package not available for ubuntu 16.04

Approved
CVE-2017-5209ELIOT IOTGatewayUbuntu 16.04https://ubuntu.com/security/CVE-2017-5209Srinivasan Selvamsrinivasanselvam2014@gmail.com


Negligible

NoApproved
CVE-2017-5545ELIOT IOTGatewayUbuntu 16.04https://ubuntu.com/security/CVE-2017-5545Srinivasan Selvamsrinivasanselvam2014@gmail.com

Negligible

NoApproved
CVE-2017-6969ELIOT IOTGatewayUbuntu 16.04https://ubuntu.com/security/CVE-2017-6969Srinivasan Selvamsrinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2017-7226ELIOT IOTGatewayUbuntu 16.04https://ubuntu.com/security/CVE-2017-7226Srinivasan Selvamsrinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2017-8872ELIOT IOTGatewayUbuntu 16.04https://ubuntu.com/security/CVE-2017-8872Srinivasan Selvamsrinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2019-15505ELIOT uCPECentOS 7.8https://access.redhat.com/security/cve/CVE-2019-15505srinivasanselvam2014@gmail.com

Moderate

8.0

NoApproved
CVE-2014-9939ELIOT uCPECentOS 7.8https://access.redhat.com/security/cve/CVE-2014-9939Srinivasan Selvamsrinivasanselvam2014@gmail.com

Low

1.2

No

Approved
CVE-2017-12652ELIOT uCPECentOS 7.8https://access.redhat.com/security/cve/CVE-2017-12652Srinivasan Selvamsrinivasanselvam2014@gmail.com

Low

3.7


There is no proper documents from CENTOS  for unfixed vulnerabilities.  We cannot compare/refer RHEL 7 docs with CENTOS 7.8 since, RHEL is completely different OS

Fixed in RHEL 7 But not in CentOS 7.8 as of 9/29/2020

Approved
CVE-2018-16428ELIOT uCPECentOS 7.8https://access.redhat.com/security/cve/CVE-2018-16428Srinivasan Selvamsrinivasanselvam2014@gmail.com

Low

5.1

No

There is no proper documents from CENTOS  for unfixed vulnerabilities.  We cannot compare/refer RHEL 7 docs with CENTOS 7.8 since, RHEL is completely different OS

Approved
CVE-2019-11068ELIOT uCPECentOS 7.8https://access.redhat.com/security/cve/CVE-2019-11068Srinivasan Selvamsrinivasanselvam2014@gmail.com

Moderate

6.3

There is no proper documents from CENTOS  for unfixed vulnerabilities.  We cannot compare/refer RHEL 7 docs with CENTOS 7.8 since, RHEL is completely different OS

Fixed in RHEL 7 But not in CentOS 7.8 as of 9/29/2020

Approved
CVE-2019-12450ELIOT uCPECentOS 7.8https://access.redhat.com/security/cve/CVE-2019-12450Srinivasan Selvamsrinivasanselvam2014@gmail.com

Moderate

6.6

There is no proper documents from CENTOS  for unfixed vulnerabilities.  We cannot compare/refer RHEL 7 docs with CENTOS 7.8 since, RHEL is completely different OS

Fixed in RHEL 7 But not in CentOS 7.8 as of 9/29/2020

Approved


CVE-2019-12900ELIOT uCPECentOS 7.8https://access.redhat.com/security/cve/CVE-2019-12900Srinivasan Selvamsrinivasanselvam2014@gmail.com

Low

4.0

No

There is no proper documents from CENTOS  for unfixed vulnerabilities.  We cannot compare/refer RHEL 7 docs with CENTOS 7.8 since, RHEL is completely different OS

Approved
CVE-2019-9169ELIOT uCPECentOS 7.8https://access.redhat.com/security/cve/CVE-2019-9169Srinivasan Selvamsrinivasanselvam2014@gmail.com

Moderate

6.5

No (Will not fix)

There is no proper documents from CENTOS  for unfixed vulnerabilities.  We cannot compare/refer RHEL 7 docs with CENTOS 7.8 since, RHEL is completely different OS

Approved
CVE-2018-20836ELIOT uCPECentOS 7.8https://access.redhat.com/security/cve/CVE-2018-20836Srinivasan Selvamsrinivasanselvam2014@gmail.com

Moderate

7.0

There is no proper documents from CENTOS  for unfixed vulnerabilities.  We cannot compare/refer RHEL 7 docs with CENTOS 7.8 since, RHEL is completely different OS

Fixed in RHEL 7 But not in CentOS 7.8 as of 9/29/2020

Approved
CVE-2019-2201ELIOT uCPECentOS 7.8https://access.redhat.com/security/cve/CVE-2019-2201Srinivasan Selvamsrinivasanselvam2014@gmail.com

Moderate

7.8

No (Will not fix)

There is no proper documents from CENTOS  for unfixed vulnerabilities.  We cannot compare/refer RHEL 7 docs with CENTOS 7.8 since, RHEL is completely different OS

Approved
CVE-2018-18439EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2018-18439srinivasanselvam2014@gmail.com

Negligible

Not vulnerable (2019.07+dfsg-1ubuntu4~18.04.1)

Screenshot:

Approved
CVE-2020-8432EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2020-8432srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2016-1585EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2016-1585srinivasanselvam2014@gmail.com

Medium

NoApproved
CVE-2017-18342EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2017-18342srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2017-8283EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2017-8283srinivasanselvam2014@gmail.com

Negligible

18.04 Not vulnerable

1.18..24ubuntu1


CVE-2018-11236EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2018-11236srinivasanselvam2014@gmail.com

Medium

glibc:  Fix 2.27-3ubuntu1.2

Explanation:

We are using same version of integrated OS package updated as mentioned as released by ubuntu for Package glibc.  But still issue thrown.

It is not an issue from our side.  This issue is with Vuls or Ubuntu.

Proof: 

Approved
CVE-2018-20839EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2018-20839srinivasanselvam2014@gmail.com

Medium

NoApproved
CVE-2019-11059EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2019-11059srinivasanselvam2014@gmail.com

Low

18.04 LTSNot Vulnerable

2019.07+dfsg-1ubuntu4~18.04.1

Screenshots:


CVE-2019-14192EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2019-14192srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2019-14193EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2019-14193srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2019-14194EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2019-14194srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2019-14195EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2019-14195srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2019-14196EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2019-14196srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2019-14198EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2019-14198srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2019-14199EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2019-14199srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2019-14200EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2019-14200srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2019-14201EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2019-14201srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2019-14202EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2019-14202srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2019-14203EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2019-14203srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2019-14204EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2019-14204srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2019-9169EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2019-9169srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2019-10220EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2019-10220srinivasanselvam2014@gmail.com

Medium

linux

Minimum 4.15.0-88.88

Explanation:

We are using the latest patch of linux kernel.  Since we are using updated patch.  Still issues thrown.

This is an issue from Vuls / Ubuntu not from our side

Screenshot:

4.15.0-118-generic installed

Approved
CVE-2019-19814EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2019-19814srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2019-19816EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2019-19816srinivasanselvam2014@gmail.com

Low

linux

4.15.0-88.88 minimum required

Explanation:

We are using the latest patch of linux kernel.  Eventhough we are using updated patch,  Still issues thrown.

This is an issue from Vuls / Ubuntu not from our side

Screenshot:

4.15.0-118-generic installed

Approved
CVE-2019-14197EALT-EdgeUbuntu 18.04https://ubuntu.com/security/CVE-2019-14197srinivasanselvam2014@gmail.com

Low

NoApproved
CVE-2017-12652The AI Edge: Federated ML application at edgeCentos7.8https://nvd.nist.gov/vuln/detail/CVE-2017-12652wuzifan0817@gmail.comWe need exception request for this CVE as it is not yet fixed for 7.X version

Low

3.7

Fixed in RHEL 7 But not in CentOS 7.8 as of 9/29/2020Approved
CVE-2019-11068The AI Edge: Federated ML application at the edgeCentos7.8https://nvd.nist.gov/vuln/detail/CVE-2019-11068wuzifan0817@gmail.comWe need exception request for this CVE as it is not yet fixed for 7.X version

Low

6.3

Fixed in RHEL 7 But not in CentOS 7.8 as of 9/29/2020Approved
CVE-2019-12450The AI Edge: Federated ML application at edgeCentos7.8https://nvd.nist.gov/vuln/detail/CVE-2019-12450wuzifan0817@gmail.comWe need exception request for this CVE as it is not yet fixed for 7.X version

Moderate

6.6

Fixed in RHEL 7 But not in CentOS 7.8 as of 9/29/2020Approved
CVE-2019-12900The AI Edge: Federated ML application at edgeCentos7.8https://nvd.nist.gov/vuln/detail/CVE-2019-12900wuzifan0817@gmail.comWe need exception request for this CVE as it is not yet fixed for 7.X version

LOW

4.0

NoApproved
CVE-2018-20836The AI Edge: Federated ML application at edgeCentos7.8https://nvd.nist.gov/vuln/detail/CVE-2018-20836wuzifan0817@gmail.comWe need exception request for this CVE as it is not yet fixed for 7.X version

Moderate

7.0

Fixed in RHEL 7 But not in CentOS 7.8 as of 9/29/2020Approved
CVE-2019-8506The AI Edge: Federated ML application at edgeCentos7.8https://nvd.nist.gov/vuln/detail/CVE-2019-8506wuzifan0817@gmail.comThis is a bug for the host machine, not for the runtime environment for the Blueprint.

Moderate

6.3

webkitgtk4 - Fixed in RHEL 7 But not in CentOS 7.8 as of 9/29/2020

webkitgtk3 - Will not fix


CVE-2019-8535The AI Edge: Federated ML application at edgeCentos7.8https://nvd.nist.gov/vuln/detail/CVE-2019-8535wuzifan0817@gmail.comThis is a bug for the host machine, not for the runtime environment for the Blueprint.

Moderate

6.3

webkitgtk4 - Fixed in RHEL 7 But not in CentOS 7.8 as of 9/29/2020

webkitgtk3 - Will not fix


CVE-2019-8536The AI Edge: Federated ML application at edgeCentos7.8https://nvd.nist.gov/vuln/detail/CVE-2019-8536wuzifan0817@gmail.comThis is a bug for the host machine, not for the runtime environment for the Blueprint.

Moderate

6.3

webkitgtk4 - Fixed in RHEL 7 But not in CentOS 7.8 as of 9/29/2020

webkitgtk3 - Will not fix


CVE-2019-8544The AI Edge: Federated ML application at edgeCentos7.8https://nvd.nist.gov/vuln/detail/CVE-2019-8544wuzifan0817@gmail.comThis is a bug for the host machine, not for the runtime environment for the Blueprint.

Moderate

6.3

webkitgtk4 - Fixed in RHEL 7 But not in CentOS 7.8 as of 9/29/2020

webkitgtk3 - Will not fix


CVE-2019-8669The AI Edge: Federated ML application at edgeCentos7.8https://nvd.nist.gov/vuln/detail/CVE-2019-8669wuzifan0817@gmail.comThis is a bug for the host machine, not for the runtime environment for the Blueprint.

Moderate

8.8

webkitgtk4 - Fixed in RHEL 7 But not in CentOS 7.8 as of 9/29/2020

webkitgtk3 - Will not fix


CVE-2019-8672The AI Edge: Federated ML application at edgeCentos7.8https://nvd.nist.gov/vuln/detail/CVE-2019-8672wuzifan0817@gmail.comThis is a bug for the host machine, not for the runtime environment for the Blueprint.

Moderate

8.8

webkitgtk4 - Fixed in RHEL 7 But not in CentOS 7.8 as of 9/29/2020

webkitgtk3 - Will not fix


CVE-2019-8676The AI Edge: Federated ML application at edgeCentos7.8https://nvd.nist.gov/vuln/detail/CVE-2019-8676wuzifan0817@gmail.comThis is a bug for the host machine, not for the runtime environment for the Blueprint.

Moderate

8.8

webkitgtk4 - Fixed in RHEL 7 But not in CentOS 7.8 as of 9/29/2020

webkitgtk3 - Will not fix


CVE-2019-8684The AI Edge: Federated ML application at edgeCentos7.8https://nvd.nist.gov/vuln/detail/CVE-2019-8684wuzifan0817@gmail.comThis is a bug for the host machine, not for the runtime environment for the Blueprint.

Moderate

8.8

webkitgtk4 - Fixed in RHEL 7 But not in CentOS 7.8 as of 9/29/2020

webkitgtk3 - Will not fix


CVE-2019-8688The AI Edge: Federated ML application at edgeCentos7.8https://nvd.nist.gov/vuln/detail/CVE-2019-8688wuzifan0817@gmail.comThis is a bug for the host machine, not for the runtime environment for the Blueprint.

Moderate

8.8

webkitgtk4 - Fixed in RHEL 7 But not in CentOS 7.8 as of 9/29/2020

webkitgtk3 - Will not fix


CVE-2019-8689The AI Edge: Federated ML application at edgeCentos7.8https://nvd.nist.gov/vuln/detail/CVE-2019-8689wuzifan0817@gmail.comThis is a bug for the host machine, not for the runtime environment for the Blueprint.

Moderate

8.8

webkitgtk4 - Fixed in RHEL 7 But not in CentOS 7.8 as of 9/29/2020

webkitgtk3 - Will not fix


CVE-2019-8814The AI Edge: Federated ML application at edgeCentos7.8https://nvd.nist.gov/vuln/detail/CVE-2019-8814wuzifan0817@gmail.comThis is a bug for the host machine, not for the runtime environment for the Blueprint.

Moderate

8.8

webkitgtk4 - Fixed in RHEL 7 But not in CentOS 7.8 as of 9/29/2020

webkitgtk3 - Will not fix


CVE-2019-8815The AI Edge: Federated ML application at edgeCentos7.8https://nvd.nist.gov/vuln/detail/CVE-2019-8815wuzifan0817@gmail.comThis is a bug for the host machine, not for the runtime environment for the Blueprint.

Moderate

8.8

webkitgtk4 - Fixed in RHEL 7 But not in CentOS 7.8 as of 9/29/2020

webkitgtk3 - Will not fix


CVE-2019-8816The AI Edge: Federated ML application at edgeCentos7.8https://nvd.nist.gov/vuln/detail/CVE-2019-8816wuzifan0817@gmail.comThis is a bug for the host machine, not for the runtime environment for the Blueprint.

Moderate

8.8

webkitgtk4 - Fixed in RHEL 7 But not in CentOS 7.8 as of 9/29/2020

webkitgtk3 - Will not fix


CVE-2020-3868The AI Edge: Federated ML application at edgeCentos7.8https://nvd.nist.gov/vuln/detail/CVE-2020-3868wuzifan0817@gmail.comThis is a bug for the host machine, not for the runtime environment for the Blueprint.

Moderate

8.8

webkitgtk4 - Fixed in RHEL 7 But not in CentOS 7.8 as of 9/29/2020

webkitgtk3 - Will not fix


CVE-2020-3895The AI Edge: Federated ML application at edgeCentos7.8https://nvd.nist.gov/vuln/detail/CVE-2020-3895wuzifan0817@gmail.comThis is a bug for the host machine, not for the runtime environment for the Blueprint.

Moderate

8.8

webkitgtk4 - Fixed in RHEL 7 But not in CentOS 7.8 as of 9/29/2020

webkitgtk3 - Will not fix


CVE-2020-3897The AI Edge: Federated ML application at edgeCentos7.8https://nvd.nist.gov/vuln/detail/CVE-2020-3897wuzifan0817@gmail.comThis is a bug for the host machine, not for the runtime environment for the Blueprint.Moderate 8.8

webkitgtk4 - Fixed in RHEL 7 But not in CentOS 7.8 as of 9/29/2020

webkitgtk3 - Will not fix


CVE-2020-3899The AI Edge: Federated ML application at edgeCentos7.8https://nvd.nist.gov/vuln/detail/CVE-2020-3899wuzifan0817@gmail.comThis is a bug for the host machine, not for the runtime environment for the Blueprint.Moderate 8.8

webkitgtk4 - Fixed in RHEL 7 But not in CentOS 7.8 as of 9/29/2020

webkitgtk3 - Will not fix


CVE-2019-2201

The AI Edge: School/Education Video Security Monitoring

Centos8https://access.redhat.com/security/cve/CVE-2019-2201@Hechun Zhangzhanghechun@baidu.comThis is a bug for the host machine, not for the runtime environment for the Blueprint.Moderate 7.8NoApproved
CVE-2019-12900The AI Edge: School/Education Video Security MonitoringCentos8https://access.redhat.com/security/cve/CVE-2019-12900@Hechun Zhangzhanghechun@baidu.comThis is a bug for the host machine, not for the runtime environment for the Blueprint.

Low

4.0

NoApproved
CVE-2019-18218The AI Edge: School/Education Video Security MonitoringCentos8https://access.redhat.com/security/cve/CVE-2019-18218@Hechun Zhangzhanghechun@baidu.comThis is a bug for the host machine, not for the runtime environment for the Blueprint.

Moderate

9.8

NoApproved
CVE-2016-1585ICNUbuntu 18.04https://ubuntu.com/security/CVE-2016-1585

@Kuralamdhan Ramakrishnan

kuralamudhan.ramakrishnan@intel.com

Medium

No
CVE-2017-18342ICNUbuntu 18.04https://ubuntu.com/security/CVE-2017-18342@Kuralamdhan Ramakrishnankuralamudhan.ramakrishnan@intel.com

Low

No
CVE-2017-8283ICNUbuntu 18.04https://ubuntu.com/security/CVE-2017-8283@Kuralamdhan Ramakrishnankuralamudhan.ramakrishnan@intel.com

Negligible

18.04 Not vulnerable

1.18..24ubuntu1


CVE-2018-20839ICNUbuntu 18.04https://ubuntu.com/security/CVE-2018-20839

@Kuralamdhan Ramakrishnan

kuralamudhan.ramakrishnan@intel.com

Medium

No
CVE-2019-19814ICNUbuntu 18.04https://ubuntu.com/security/CVE-2019-19814

@Kuralamdhan Ramakrishnan

kuralamudhan.ramakrishnan@intel.com

Low

No
CVE-2019-17041ICNUbuntu 18.04https://ubuntu.com/security/CVE-2019-17041@Kuralamdhan Ramakrishnankuralamudhan.ramakrishnan@intel.com

Low

No
CVE-2019-17042ICNUbuntu 18.04https://ubuntu.com/security/CVE-2019-17042@Kuralamdhan Ramakrishnankuralamudhan.ramakrishnan@intel.com

Low

No
CVE-2017-12652RECCentOS 7.8https://access.redhat.com/security/cve/CVE-2017-12652pcarver@att.com

Low

3.7

Fixed in RHEL 7 But not in CentOS 7.8 as of 9/29/2020Approved
CVE-2019-11068RECCentOS 7.8https://access.redhat.com/security/cve/CVE-2019-11068pcarver@att.com

Moderate

6.8

Fixed in RHEL 7 But not in CentOS 7.8 as of 9/29/2020Approved
CVE-2019-12450RECCentOS 7.8https://access.redhat.com/security/cve/CVE-2019-12450pcarver@att.com

Moderate

6.6

Fixed in RHEL 7 But not in CentOS 7.8 as of 9/29/2020Approved
CVE-2019-17006RECCentOS 7.8https://access.redhat.com/security/cve/CVE-2019-12450pcarver@att.com

Moderate

8.1

Fixed in RHEL 7 But not in CentOS 7.8 as of 9/29/2020Approved
CVE-2019-5482RECCentOS 7.8https://access.redhat.com/security/cve/CVE-2019-12450pcarver@att.com

Moderate

6.3

Fixed in RHEL 7 But not in CentOS 7.8 as of 9/29/2020Approved
  • No labels