Log in
Skip to sidebar
Skip to main content
Linked Applications
Loading…
Spaces
Questions
Hit enter to search
Help
Online Help
Keyboard Shortcuts
Feed Builder
What’s new
Available Gadgets
About Confluence
Log in
Akraino
Pages
Questions
Space shortcuts
Meeting notes
Shared links
File lists
Troubleshooting articles
How-to articles
Page tree
Browse pages
Configure
Space tools
View Page
A
t
tachments (24)
Page History
Page Information
View in Hierarchy
View Source
Export to PDF
Export to Word
Pages
…
-
Technical Steering Committee (TSC)
Subcommittees
Security Sub-committee
Documents
Release 6: Akraino CVE and KHV Vulnerability Exception Request
Page Information
Title:
Release 6: Akraino CVE and KHV Vulnerability Exception Request
Author:
Daniil Egranov
Apr 14, 2022
Last Changed by:
Daniil Egranov
May 31, 2022
Tiny Link:
(useful for email)
https://wiki.akraino.org/x/hi4wAw
Export As:
Word
·
PDF
Incoming Links
Akraino (3)
Page:
Release 6 Planning
Page:
Smart Data Transaction for CPS Test Documentation
Page:
ICN R6 Test Document
Hierarchy
Parent Page
Page:
Documents
Labels
There are no labels assigned to this page.
Recent Changes
Time
Editor
May 31, 2022 02:03
Daniil Egranov
View Changes
May 19, 2022 07:23
khemendra kumar
View Changes
May 19, 2022 07:22
khemendra kumar
View Changes
May 18, 2022 17:26
Daniil Egranov
View Changes
May 18, 2022 02:01
Ysemi
View Page History
Outgoing Links
External Links (75)
https://security-tracker.debian.org/tracker/CVE-2005-2541
https://security-tracker.debian.org/tracker/CVE-2022-23304
https://www.suse.com/c/demystifying-containers-part-iv-cont…
https://security-tracker.debian.org/tracker/CVE-2022-23303
https://ubuntu.com/security/CVE-2021-35942
https://security-tracker.debian.org/tracker/CVE-2021-42377
mailto:colin.peters@fujitsu.com
https://security-tracker.debian.org/tracker/CVE-2019-101002…
https://ubuntu.com/security/CVE-2022-25315
https://ubuntu.com/security/cve-2018-12892
https://ubuntu.com/security/CVE-2022-25236
https://security-tracker.debian.org/tracker/CVE-2021-45956
https://ubuntu.com/security/CVE-2022-23852
https://ubuntu.com/security/CVE-2022-25235
https://ubuntu.com/security/CVE-2018-5126
https://security-tracker.debian.org/tracker/CVE-2021-30473
https://ubuntu.com/security/CVE-2021-45951
https://security-tracker.debian.org/tracker/CVE-2021-30474
https://ubuntu.com/security/CVE-2021-45952
https://ubuntu.com/security/CVE-2021-45953
https://security-tracker.debian.org/tracker/CVE-2021-30475
https://ubuntu.com/security/CVE-2021-39713
https://ubuntu.com/security/CVE-2017-7827
https://ubuntu.com/security/CVE-2018-5090
https://ubuntu.com/security/CVE-2021-31870
https://security-tracker.debian.org/tracker/CVE-2016-1585
https://security-tracker.debian.org/tracker/CVE-2021-29462
https://ubuntu.com/security/CVE-2021-31872
https://security-tracker.debian.org/tracker/CVE-2014-2830
https://ubuntu.com/security/CVE-2021-31873
https://ubuntu.com/security/CVE-2021-33574
https://ubuntu.com/security/CVE-2016-9180
https://security-tracker.debian.org/tracker/CVE-2020-27619
https://imagemagick.org/script/license.php
https://security-tracker.debian.org/tracker/CVE-2018-13410
https://security-tracker.debian.org/tracker/CVE-2021-4048
https://security-tracker.debian.org/tracker/CVE-2017-17479
https://ubuntu.com/security/cve-2019-19949
https://security-tracker.debian.org/tracker/CVE-2017-9117
https://imagemagick.org
mailto:kuralamudhan.ramakrishnan@intel.com
https://ubuntu.com/security/cve-2019-19948
https://ubuntu.com/security/CVE-2016-1585
https://security-tracker.debian.org/tracker/CVE-2019-8341
https://security-tracker.debian.org/tracker/CVE-2021-43400
https://ubuntu.com/security/cve-2017-12194
https://ubuntu.com/security/CVE-2022-23990
https://ubuntu.com/security/CVE-2018-5145
https://security-tracker.debian.org/tracker/CVE-2021-30499
https://projectcalico.docs.tigera.io/security/non-privilege…
https://ubuntu.com/security/CVE-2019-20433
mailto:khemendra.kumar@huawei.com
https://security-tracker.debian.org/tracker/CVE-2021-30498
https://ubuntu.com/security/CVE-2018-5151
https://security-tracker.debian.org/tracker/CVE-2021-29921
https://ubuntu.com/security/CVE-2017-18201
https://ubuntu.com/security/CVE-2021-45954
https://ubuntu.com/security/CVE-2021-20236
https://ubuntu.com/security/CVE-2021-45955
https://ubuntu.com/security/cve-2019-17113
https://ubuntu.com/security/CVE-2021-45956
https://ubuntu.com/security/CVE-2021-45957
https://security-tracker.debian.org/tracker/CVE-2021-45951
https://ubuntu.com/security/CVE-2019-19814
https://security-tracker.debian.org/tracker/CVE-2021-45954
https://security-tracker.debian.org/tracker/CVE-2021-45955
https://ubuntu.com/security/CVE-2022-23219
https://security-tracker.debian.org/tracker/CVE-2021-45952
https://ubuntu.com/security/CVE-2022-23218
mailto:inoue.reo@fujitsu.com
https://security-tracker.debian.org/tracker/CVE-2021-45953
https://ubuntu.com/security/CVE-2019-17042
https://ubuntu.com/security/CVE-2019-17041
mailto:rd-sw@ysemi.cn
https://github.com/projectcalico/calico/issues/2000
Akraino (5)
Page:
Release 6: Akraino CVE and KHV Vulnerability Exception Request
Page:
IEC Type 3: Android cloud native applications on Arm servers in edge for Integrated Edge Cloud (IEC) Blueprint Family
Page:
Release 5 Blueprint Scanning Status
Page:
Smart Data Transaction for CPS
Page:
Robot basic architecture based on SSES
Overview
Content Tools
{"serverDuration": 97, "requestCorrelationId": "6b209678380dc194"}