Blueprints that have vulnerabilities with a CVSS score >= 9.0 and meet the following criteria should submit their information in the chart below to have the vulnerability considered for an exception:

  • Running at least the minimum OS version required by the Akraino Security Sub-Committee
    • Ubuntu
    • CentOS
    • Debian
    • Fedora
    • Suse Enterprise Server

Legend

Priority/Score Descriptions

Not VulnerablePackages which do not exist in the archive, are not affected by the vulnerability or have a fix applied in the archive.
PendingA fix has been applied and updated packages are awaiting arrival into the archive. For example, this might be used when wider testing is requested for the updated package.
UnknownOpen vulnerability where the priority is currently unknown and needs to be triaged.
NegligibleOpen vulnerability that may be a problem but otherwise does not impose a security risk due to various factors. Examples include when the vulnerability is only theoretical in nature, requires a very special situation, has almost no install base or does no real damage. These typically will not receive security updates unless there is an easy fix and some other issue causes an update.
LowOpen vulnerability that is a problem but does very little damage or is otherwise hard to exploit due to small user base or other factors such as requiring specific environment, uncommon configuration, user assistance, etc. These tend to be included in security updates only when higher priority issues require an update or if many low priority issues have built up.
MediumOpen vulnerability that is a real problem and is exploitable for many users of the affected software. Examples include network daemon denial of service, cross-site scripting and gaining user privileges.
HighOpen vulnerability that is a real problem and is exploitable for many users in the default configuration of the affected software. Examples include serious remote denial of service of the system, local root privilege escalations or local data theft.
CriticalOpen vulnerability that is a world-burning problem and is exploitable for most Ubuntu users. Examples include remote root privilege escalations or remote data theft.
CVE/KHV #BlueprintBlueprint OS/VerURL Showing OS Patch Not AvailableContact NameContact EmailCommentVendor CVSS ScoreVendor Patch AvailableException Status
CVE-2022-25315

Release 6 Documentation for IEC Type 5: Composable Integrated Edge Cloud (IEC) Server Blueprint Family

ubuntu18.04https://ubuntu.com/security/CVE-2022-25315jin pengjinpeng@socnoc.ai
expat fixed package is available.
Please update the package or remove it if not needed.
9.8
Yes, 2.2.5-3Not Approved
CVE-2022-25236Release 6 Documentation for IEC Type 5: Composable Integrated Edge Cloud (IEC) Server Blueprint Familyubuntu18.04https://ubuntu.com/security/CVE-2022-25236jinpeng@socnoc.aiexpat fixed package is available.
Please update the package or remove it if not needed.
9.8
Yes, 2.2.5-3Not Approved
CVE-2022-25235Release 6 Documentation for IEC Type 5: Composable Integrated Edge Cloud (IEC) Server Blueprint Familyubuntu18.04https://ubuntu.com/security/CVE-2022-25235jinpeng@socnoc.aiexpat fixed package is available.
Please update the package or remove it if not needed.
9.8
Yes, 2.2.5-3Not Approved
CVE-2022-23852Release 6 Documentation for IEC Type 5: Composable Integrated Edge Cloud (IEC) Server Blueprint Familyubuntu18.04https://ubuntu.com/security/CVE-2022-23852jinpeng@socnoc.aiexpat fixed package is available.
Please update the package or remove it if not needed.
9.8
Yes, 2.2.5-3Not Approved
CVE-2022-22824Release 6 Documentation for IEC Type 5: Composable Integrated Edge Cloud (IEC) Server Blueprint Familyubuntu18.04https://ubuntu.com/security/CVE-2022-22824jinpeng@socnoc.aiexpat fixed package is available.
Please update the package or remove it if not needed.
9.8
Yes, 2.2.5-3Not Approved
CVE-2022-22823Release 6 Documentation for IEC Type 5: Composable Integrated Edge Cloud (IEC) Server Blueprint Familyubuntu18.04https://ubuntu.com/security/CVE-2022-22823jinpeng@socnoc.aiexpat fixed package is available.
Please update the package or remove it if not needed.
9.8
Yes, 2.2.5-3Not Approved
CVE-2022-22822Release 6 Documentation for IEC Type 5: Composable Integrated Edge Cloud (IEC) Server Blueprint Familyubuntu18.04https://ubuntu.com/security/CVE-2022-22822jinpeng@socnoc.aiexpat fixed package is available.
Please update the package or remove it if not needed.
9.8
Yes, 2.2.5-3Not Approved
CVE-2015-4042Release 6 Documentation for IEC Type 5: Composable Integrated Edge Cloud (IEC) Server Blueprint Familyubuntu18.04https://ubuntu.com/security/CVE-2015-4042jinpeng@socnoc.ai
9.8
NoApproved
CVE-2014-9939Release 6 Documentation for IEC Type 5: Composable Integrated Edge Cloud (IEC) Server Blueprint Familyubuntu18.04https://ubuntu.com/security/CVE-2014-9939jinpeng@socnoc.ai
9.8 
NoApproved
CVE-2021-43527Release 6 Documentation for IEC Type 5: Composable Integrated Edge Cloud (IEC) Server Blueprint Familyubuntu18.04https://ubuntu.com/security/CVE-2021-43527jinpeng@socnoc.ai
nss fixed packages is available.
Please update the package or remove it if not needed.
10.0
Yes  2:3.35-2Not Approved
CVE-2022-0318Release 6 Documentation for IEC Type 5: Composable Integrated Edge Cloud (IEC) Server Blueprint Familyubuntu20.04https://ubuntu.com/security/CVE-2022-0318jin peng jinpeng@socnoc.ai
9.8NoApproved
CVE-2022-30767Release 6 Documentation for IEC Type 5: Composable Integrated Edge Cloud (IEC) Server Blueprint Familyubuntu20.04https://ubuntu.com/security/CVE-2022-30767jin peng jinpeng@socnoc.ai
9.8NoApproved


  • No labels