-
Global information
- Generated on Wed Jul 5 07:50:58 2023
- Log file: /home/vchalla/output/postgresql-2023-07-05_035412.log
- Parsed 212,492,437 log entries in 18m54s
- Log start from 2023-07-05 03:54:12 to 2023-07-05 10:48:20
-
Overview
Global Stats
- 63,115 Number of unique normalized queries
- 11,746,420 Number of queries
- 2h34m38s Total query duration
- 2023-07-05 03:54:13 First query
- 2023-07-05 10:48:20 Last query
- 61,993 queries/s at 2023-07-05 09:55:31 Query peak
- 2h34m38s Total query duration
- 209ms Prepare/parse total duration
- 1m56s Bind total duration
- 2h32m41s Execute total duration
- 28 Number of events
- 4 Number of unique normalized events
- 16 Max number of times the same event was reported
- 0 Number of cancellation
- 47 Total number of automatic vacuums
- 39 Total number of automatic analyzes
- 1,674 Number temporary file
- 3.77 MiB Max size of temporary file
- 1.90 MiB Average size of temporary file
- 40 Total number of sessions
- 13 sessions at 2023-07-05 10:10:04 Session peak
- 12h15m12s Total duration of sessions
- 18m22s Average duration of sessions
- 293,660 Average queries per session
- 3m51s Average queries duration per session
- 46 Total number of connections
- 20 connections/s at 2023-07-05 09:54:22 Connection peak
- 2 Total number of databases
SQL Traffic
Key values
- 61,993 queries/s Query Peak
- 2023-07-05 09:55:31 Date
SELECT Traffic
Key values
- 65 queries/s Query Peak
- 2023-07-05 10:02:30 Date
INSERT/UPDATE/DELETE Traffic
Key values
- 61,990 queries/s Query Peak
- 2023-07-05 09:55:31 Date
Queries duration
Key values
- 2h34m38s Total query duration
Prepared queries ratio
Key values
- 0.00 Ratio of bind vs prepare
- 0.00 % Ratio between prepared and "usual" statements
General Activity
Day Hour Count Min duration Max duration Avg duration Latency Percentile(90) Latency Percentile(95) Latency Percentile(99) Jul 05 03 423 0ms 0ms 0ms 1ms 1ms 1ms 04 4,320 0ms 0ms 0ms 1ms 1ms 1ms 05 4,320 0ms 0ms 0ms 1ms 1ms 1ms 06 4,320 0ms 0ms 0ms 1ms 1ms 1ms 07 4,320 0ms 0ms 0ms 1ms 1ms 1ms 08 4,320 0ms 0ms 0ms 1ms 1ms 1ms 09 6,936,752 0ms 12s127ms 0ms 4m17s 13m50s 18m28s 10 4,787,645 0ms 8s456ms 0ms 2m30s 19m12s 21m21s Day Hour SELECT COPY TO Average Duration Latency Percentile(90) Latency Percentile(95) Latency Percentile(99) Jul 05 03 0 0 0ms 0ms 0ms 0ms 04 0 0 0ms 0ms 0ms 0ms 05 0 0 0ms 0ms 0ms 0ms 06 0 0 0ms 0ms 0ms 0ms 07 0 0 0ms 0ms 0ms 0ms 08 0 0 0ms 0ms 0ms 0ms 09 1,174 0 0ms 0ms 2ms 16ms 10 2,667 0 0ms 0ms 0ms 45ms Day Hour INSERT UPDATE DELETE COPY FROM Average Duration Latency Percentile(90) Latency Percentile(95) Latency Percentile(99) Jul 05 03 0 0 0 0 0ms 0ms 0ms 0ms 04 0 0 0 0 0ms 0ms 0ms 0ms 05 0 0 0 0 0ms 0ms 0ms 0ms 06 0 0 0 0 0ms 0ms 0ms 0ms 07 0 0 0 0 0ms 0ms 0ms 0ms 08 0 0 0 0 0ms 0ms 0ms 0ms 09 6,929,279 0 0 0 0ms 0ms 0ms 13m45s 10 4,776,896 0 438 0 0ms 0ms 0ms 20m42s Day Hour Prepare Bind Bind/Prepare Percentage of prepare Jul 05 03 0 0 0.00 0.00% 04 0 0 0.00 0.00% 05 0 0 0.00 0.00% 06 0 0 0.00 0.00% 07 0 0 0.00 0.00% 08 0 0 0.00 0.00% 09 1,059 6,937,805 6,551.28 0.02% 10 1,872 4,781,972 2,554.47 0.04% Day Hour Count Average / Second Jul 05 03 6 0.00/s 04 0 0.00/s 05 0 0.00/s 06 0 0.00/s 07 0 0.00/s 08 0 0.00/s 09 38 0.01/s 10 2 0.00/s Day Hour Count Average Duration Jul 05 03 0 0ms 04 0 0ms 05 0 0ms 06 0 0ms 07 0 0ms 08 0 0ms 09 4 17s79ms 10 36 20m23s -
Connections
Established Connections
Key values
- 20 connections Connection Peak
- 2023-07-05 09:54:22 Date
Connections per database
Key values
- clair Main Database
- 46 connections Total
Connections per user
Key values
- libvuln Main User
- 46 connections Total
-
Sessions
Simultaneous sessions
Key values
- 13 sessions Session Peak
- 2023-07-05 10:10:04 Date
Histogram of session times
Key values
- 16 600000-1800000ms duration
Sessions per database
Key values
- clair Main Database
- 40 sessions Total
Sessions per user
Key values
- clair Main User
- 40 sessions Total
Sessions per host
Key values
- 10.131.1.29 Main Host
- 40 sessions Total
-
Checkpoints / Restartpoints
Checkpoints Buffers
Key values
- 12,743 buffers Checkpoint Peak
- 2023-07-05 10:08:19 Date
- 269.134 seconds Highest write time
- 71.021 seconds Sync time
Checkpoints Wal files
Key values
- 33 files Wal files usage Peak
- 2023-07-05 10:08:26 Date
Checkpoints distance
Key values
- 1,767.06 Mo Distance Peak
- 2023-07-05 10:01:10 Date
Checkpoints Activity
Day Hour Written buffers Write time Sync time Total time Jul 05 03 0 0s 0s 0s 04 3,238 269.134s 0.002s 269.162s 05 0 0s 0s 0s 06 0 0s 0s 0s 07 0 0s 0s 0s 08 0 0s 0s 0s 09 49,010 173.368s 104.193s 302.431s 10 56,686 510.694s 189.225s 711.901s Day Hour Added Removed Recycled Synced files Longest sync Average sync Jul 05 03 0 0 0 0 0s 0s 04 0 5 0 37 0.002s 0.001s 05 0 0 0 0 0s 0s 06 0 0 0 0 0s 0s 07 0 0 0 0 0s 0s 08 0 0 0 0 0s 0s 09 0 180 228 394 12.155s 2.592s 10 0 307 434 505 60.323s 6.718s Day Hour Count Avg time (sec) Jul 05 03 0 0s 04 0 0s 05 0 0s 06 0 0s 07 0 0s 08 0 0s 09 0 0s 10 0 0s Day Hour Mean distance Mean estimate Jul 05 03 0.00 kB 0.00 kB 04 84,713.00 kB 84,713.00 kB 05 0.00 kB 0.00 kB 06 0.00 kB 0.00 kB 07 0.00 kB 0.00 kB 08 0.00 kB 0.00 kB 09 631,374.75 kB 768,423.75 kB 10 616,416.44 kB 781,826.89 kB -
Temporary Files
Size of temporary files
Key values
- 421.33 MiB Temp Files size Peak
- 2023-07-05 10:05:19 Date
Number of temporary files
Key values
- 224 per second Temp Files Peak
- 2023-07-05 10:05:19 Date
Temporary Files Activity
Day Hour Count Total size Average size Jul 05 03 0 0 0 04 0 0 0 05 0 0 0 06 0 0 0 07 0 0 0 08 0 0 0 09 0 0 0 10 1,674 3.11 GiB 1.90 MiB Queries generating the most temporary files (N)
Rank Count Total size Min size Max size Avg size Query 1 1,656 3.11 GiB 17.65 KiB 3.77 MiB 1.92 MiB delete from vuln v1 using vuln v2 left join uo_vuln uvl on v2.id = uvl.vuln where uvl.vuln is null and v2.updater = ? and v1.id = v2.id;-
DELETE FROM vuln v1 USING vuln v2 LEFT JOIN uo_vuln uvl ON v2.id = uvl.vuln WHERE uvl.vuln IS NULL AND v2.updater = $1 AND v1.id = v2.id;
Date: 2023-07-05 10:05:16 Duration: 0ms
2 17 1.07 MiB 19.20 KiB 195.71 KiB 64.62 KiB delete from vuln v1 using vuln v2 left join uo_vuln uvl on v2.id = uvl.vuln where uvl.vuln is null and v2.updater = ? and v1.id = v2.id; ? - 07 - 05 ? : ? : ?.? utc[?] debug: time to inline: ?.? s, opt: ?.? s, emit: ?.? s;-
DELETE FROM vuln v1 USING vuln v2 LEFT JOIN uo_vuln uvl ON v2.id = uvl.vuln WHERE uvl.vuln IS NULL AND v2.updater = $1 AND v1.id = v2.id; 2023 - 07 - 05 10:05:16.776 UTC[1107] DEBUG: time to inline: 0.000s, opt: 0.000s, emit: 0.007s;
Date: 2023-07-05 10:05:16 Duration: 0ms
3 1 19.27 KiB 19.27 KiB 19.27 KiB 19.27 KiB delete from vuln v1 using vuln v2 left join uo_vuln uvl on v2.id = uvl.vuln where uvl.vuln is null and v2.updater = ? and v1.id = v2.id; ? - 07 - 05 ? : ? : ?.? utc[?] debug: autovacuum: processing database "clair";-
DELETE FROM vuln v1 USING vuln v2 LEFT JOIN uo_vuln uvl ON v2.id = uvl.vuln WHERE uvl.vuln IS NULL AND v2.updater = $1 AND v1.id = v2.id; 2023 - 07 - 05 10:05:19.795 UTC[1192] DEBUG: autovacuum: processing database "clair";
Date: 2023-07-05 10:05:19 Duration: 0ms
Queries generating the largest temporary files
Rank Size Query 1 3.77 MiB DELETE FROM vuln v1 USING vuln v2 LEFT JOIN uo_vuln uvl ON v2.id = uvl.vuln WHERE uvl.vuln IS NULL AND v2.updater = $1 AND v1.id = v2.id;[ Date: 2023-07-05 10:05:16 ]
2 3.77 MiB DELETE FROM vuln v1 USING vuln v2 LEFT JOIN uo_vuln uvl ON v2.id = uvl.vuln WHERE uvl.vuln IS NULL AND v2.updater = $1 AND v1.id = v2.id;[ Date: 2023-07-05 10:05:17 ]
3 3.77 MiB DELETE FROM vuln v1 USING vuln v2 LEFT JOIN uo_vuln uvl ON v2.id = uvl.vuln WHERE uvl.vuln IS NULL AND v2.updater = $1 AND v1.id = v2.id;[ Date: 2023-07-05 10:05:17 ]
4 3.77 MiB DELETE FROM vuln v1 USING vuln v2 LEFT JOIN uo_vuln uvl ON v2.id = uvl.vuln WHERE uvl.vuln IS NULL AND v2.updater = $1 AND v1.id = v2.id;[ Date: 2023-07-05 10:05:17 ]
5 3.77 MiB DELETE FROM vuln v1 USING vuln v2 LEFT JOIN uo_vuln uvl ON v2.id = uvl.vuln WHERE uvl.vuln IS NULL AND v2.updater = $1 AND v1.id = v2.id;[ Date: 2023-07-05 10:05:18 ]
6 3.77 MiB DELETE FROM vuln v1 USING vuln v2 LEFT JOIN uo_vuln uvl ON v2.id = uvl.vuln WHERE uvl.vuln IS NULL AND v2.updater = $1 AND v1.id = v2.id;[ Date: 2023-07-05 10:05:18 ]
7 3.77 MiB DELETE FROM vuln v1 USING vuln v2 LEFT JOIN uo_vuln uvl ON v2.id = uvl.vuln WHERE uvl.vuln IS NULL AND v2.updater = $1 AND v1.id = v2.id;[ Date: 2023-07-05 10:05:19 ]
8 3.77 MiB DELETE FROM vuln v1 USING vuln v2 LEFT JOIN uo_vuln uvl ON v2.id = uvl.vuln WHERE uvl.vuln IS NULL AND v2.updater = $1 AND v1.id = v2.id;[ Date: 2023-07-05 10:05:19 ]
9 3.77 MiB DELETE FROM vuln v1 USING vuln v2 LEFT JOIN uo_vuln uvl ON v2.id = uvl.vuln WHERE uvl.vuln IS NULL AND v2.updater = $1 AND v1.id = v2.id;[ Date: 2023-07-05 10:05:19 ]
10 3.77 MiB DELETE FROM vuln v1 USING vuln v2 LEFT JOIN uo_vuln uvl ON v2.id = uvl.vuln WHERE uvl.vuln IS NULL AND v2.updater = $1 AND v1.id = v2.id;[ Date: 2023-07-05 10:05:19 ]
11 3.77 MiB DELETE FROM vuln v1 USING vuln v2 LEFT JOIN uo_vuln uvl ON v2.id = uvl.vuln WHERE uvl.vuln IS NULL AND v2.updater = $1 AND v1.id = v2.id;[ Date: 2023-07-05 10:05:21 ]
12 3.77 MiB DELETE FROM vuln v1 USING vuln v2 LEFT JOIN uo_vuln uvl ON v2.id = uvl.vuln WHERE uvl.vuln IS NULL AND v2.updater = $1 AND v1.id = v2.id;[ Date: 2023-07-05 10:05:21 ]
13 3.77 MiB DELETE FROM vuln v1 USING vuln v2 LEFT JOIN uo_vuln uvl ON v2.id = uvl.vuln WHERE uvl.vuln IS NULL AND v2.updater = $1 AND v1.id = v2.id;[ Date: 2023-07-05 10:05:21 ]
14 3.77 MiB DELETE FROM vuln v1 USING vuln v2 LEFT JOIN uo_vuln uvl ON v2.id = uvl.vuln WHERE uvl.vuln IS NULL AND v2.updater = $1 AND v1.id = v2.id;[ Date: 2023-07-05 10:05:23 ]
15 3.77 MiB DELETE FROM vuln v1 USING vuln v2 LEFT JOIN uo_vuln uvl ON v2.id = uvl.vuln WHERE uvl.vuln IS NULL AND v2.updater = $1 AND v1.id = v2.id;[ Date: 2023-07-05 10:05:23 ]
16 3.77 MiB DELETE FROM vuln v1 USING vuln v2 LEFT JOIN uo_vuln uvl ON v2.id = uvl.vuln WHERE uvl.vuln IS NULL AND v2.updater = $1 AND v1.id = v2.id;[ Date: 2023-07-05 10:05:24 ]
17 3.77 MiB DELETE FROM vuln v1 USING vuln v2 LEFT JOIN uo_vuln uvl ON v2.id = uvl.vuln WHERE uvl.vuln IS NULL AND v2.updater = $1 AND v1.id = v2.id;[ Date: 2023-07-05 10:05:24 ]
18 3.77 MiB DELETE FROM vuln v1 USING vuln v2 LEFT JOIN uo_vuln uvl ON v2.id = uvl.vuln WHERE uvl.vuln IS NULL AND v2.updater = $1 AND v1.id = v2.id;[ Date: 2023-07-05 10:05:25 ]
19 3.77 MiB DELETE FROM vuln v1 USING vuln v2 LEFT JOIN uo_vuln uvl ON v2.id = uvl.vuln WHERE uvl.vuln IS NULL AND v2.updater = $1 AND v1.id = v2.id;[ Date: 2023-07-05 10:05:25 ]
20 3.77 MiB DELETE FROM vuln v1 USING vuln v2 LEFT JOIN uo_vuln uvl ON v2.id = uvl.vuln WHERE uvl.vuln IS NULL AND v2.updater = $1 AND v1.id = v2.id;[ Date: 2023-07-05 10:05:25 ]
-
Vacuums
Vacuums / Analyzes Distribution
Key values
- 0 sec Highest CPU-cost vacuum
Table
Database - Date
- 0 sec Highest CPU-cost analyze
Table
Database - Date
Analyzes per table
Key values
- public.uo_vuln (10) Main table analyzed (database clair)
- 39 analyzes Total
Table Number of analyzes clair.public.uo_vuln 10 clair.public.vuln 7 clair.public.updater_status 5 clair.public.update_operation 4 template1.pg_catalog.pg_init_privs 1 template1.pg_catalog.pg_type 1 template1.pg_catalog.pg_constraint 1 template1.pg_catalog.pg_class 1 template1.pg_catalog.pg_ts_config_map 1 template1.pg_catalog.pg_description 1 clair.public.uo_enrich 1 template1.information_schema.sql_features 1 clair.public.enrichment 1 template1.pg_catalog.pg_attribute 1 template1.pg_catalog.pg_depend 1 template1.pg_catalog.pg_rewrite 1 template1.pg_catalog.pg_collation 1 Total 39 Vacuums per table
Key values
- public.uo_vuln (10) Main table vacuumed on database clair
- 47 vacuums Total
Index Buffer usage Skipped WAL usage Table Vacuums scans hits misses dirtied pins frozen records full page bytes clair.public.uo_vuln 10 2 217,920 0 76,007 0 0 84,861 38,586 189,887,759 clair.pg_toast.pg_toast_2619 7 2 430 0 175 0 0 162 58 112,079 clair.public.vuln 7 3 2,241,392 0 1,894,470 0 0 1,692,289 909,141 3,026,260,917 clair.pg_toast.pg_toast_16889 6 2 420,405 0 288,462 0 0 221,516 42,785 74,932,742 clair.pg_catalog.pg_statistic 6 2 336 0 142 0 0 113 49 183,029 clair.public.updater_status 5 1 204 0 142 0 0 91 33 103,036 clair.public.uo_enrich 2 1 5,377 0 3,859 0 0 4,019 976 3,167,839 template1.pg_catalog.pg_class 1 0 48 0 1 0 0 1 1 3,653 clair.public.enrichment 1 0 373,793 0 9,750 0 0 133,635 2,341 20,887,711 template1.pg_catalog.pg_depend 1 0 52 0 1 0 0 1 1 7,833 template1.pg_catalog.pg_statistic 1 1 84 0 2 0 0 61 3 23,225 Total 47 14 3,260,041 3,457,758 2,273,011 0 0 2,136,749 993,974 3,315,569,823 Tuples removed per table
Key values
- public.vuln (1994778) Main table with removed tuples on database clair
- 4246805 tuples Total removed
Index Tuples Pages Table Vacuums scans removed remain not yet removable removed remain clair.public.vuln 7 3 1,994,778 8,902,234 0 23,865 2,168,201 clair.public.uo_vuln 10 2 1,994,685 11,631,271 0 0 140,308 clair.pg_toast.pg_toast_16889 6 2 176,237 1,630,243 0 3,262 422,930 clair.public.uo_enrich 2 1 79,762 264,872 0 665 2,208 clair.public.updater_status 5 1 842 3,162 1,356 0 118 clair.pg_catalog.pg_statistic 6 2 198 3,651 794 0 248 clair.pg_toast.pg_toast_2619 7 2 194 1,232 815 0 315 template1.pg_catalog.pg_statistic 1 1 109 404 0 0 24 template1.pg_catalog.pg_class 1 0 0 410 0 0 14 clair.public.enrichment 1 0 0 132,436 0 0 8,113 template1.pg_catalog.pg_depend 1 0 0 1,831 0 0 14 Total 47 14 4,246,805 22,571,746 2,965 27,792 2,742,493 Pages removed per table
Key values
- public.vuln (23865) Main table with removed pages on database clair
- 27792 pages Total removed
Table Number of vacuums Index scans Tuples removed Pages removed clair.public.vuln 7 3 1994778 23865 clair.pg_toast.pg_toast_16889 6 2 176237 3262 clair.public.uo_enrich 2 1 79762 665 template1.pg_catalog.pg_class 1 0 0 0 clair.public.enrichment 1 0 0 0 template1.pg_catalog.pg_depend 1 0 0 0 clair.pg_catalog.pg_statistic 6 2 198 0 clair.pg_toast.pg_toast_2619 7 2 194 0 template1.pg_catalog.pg_statistic 1 1 109 0 clair.public.updater_status 5 1 842 0 clair.public.uo_vuln 10 2 1994685 0 Total 47 14 4,246,805 27,792 Autovacuum Activity
Day Hour VACUUMs ANALYZEs Jul 05 03 6 15 04 0 0 05 0 0 06 0 0 07 0 0 08 0 0 09 15 12 10 26 12 - 0 sec Highest CPU-cost vacuum
-
Locks
Locks by types
Key values
- ShareLock Main Lock Type
- 1 locks Total
Most frequent waiting queries (N)
Rank Count Total time Min time Max time Avg duration Query 1 1 12s127ms 12s127ms 12s127ms 12s127ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing;-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ($1, $2, $3, $4, $5, $6, $7, $8, $9, $10, $11, $12, $13, $14, $15, $16, $17, $18, $19, $20, $21, $22, $23, $24, $25, $26, $27, $28, VersionRange ($29, $30)) ON CONFLICT (hash_kind, hash) DO NOTHING;
Date: 2023-07-05 09:58:31
Queries that waited the most
Rank Wait time Query 1 12s127ms INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ($1, $2, $3, $4, $5, $6, $7, $8, $9, $10, $11, $12, $13, $14, $15, $16, $17, $18, $19, $20, $21, $22, $23, $24, $25, $26, $27, $28, VersionRange ($29, $30)) ON CONFLICT (hash_kind, hash) DO NOTHING;[ Date: 2023-07-05 09:58:31 ]
-
Queries
Queries by type
Key values
- 3,841 Total read queries
- 11,712,257 Total write queries
Queries by database
Key values
- unknown Main database
- 11,746,375 Requests
- 2h32m41s (unknown)
- Main time consuming database
Queries by user
Key values
- unknown Main user
- 11,746,375 Requests
User Request type Count Duration clair Total 45 3ms select 3 1ms tcl 33 1ms unknown Total 11,746,375 2h32m41s cte 1 1ms ddl 3 0ms delete 438 55s376ms insert 11,706,175 2h30m23s others 1,285 24ms select 3,838 184ms tcl 5,607 1m22s Duration by user
Key values
- 2h32m41s (unknown) Main time consuming user
User Request type Count Duration clair Total 45 3ms select 3 1ms tcl 33 1ms unknown Total 11,746,375 2h32m41s cte 1 1ms ddl 3 0ms delete 438 55s376ms insert 11,706,175 2h30m23s others 1,285 24ms select 3,838 184ms tcl 5,607 1m22s Queries by host
Key values
- unknown Main host
- 11,746,420 Requests
- 2h32m41s (unknown)
- Main time consuming host
Queries by application
Key values
- unknown Main application
- 11,746,379 Requests
- 2h32m41s (unknown)
- Main time consuming application
Number of cancelled queries
Key values
- 0 per second Cancelled query Peak
- 2023-07-05 09:28:45 Date
Number of cancelled queries (5 minutes period)
NO DATASET
-
Top Queries
Histogram of query times
Key values
- 11,438,813 0-1ms duration
Slowest individual queries
Rank Duration Query 1 12s127ms INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xde2dc19fa9a8a92ceffead8c65a3baef', 'RHEA-2018:3584: new packages: rust-toolset-1.29 (Moderate)', 'RHEL7-devtools', 'Rust Toolset provides the Rust programming language compiler rustc, the cargo build tool and dependency manager, the cargo-vendor plugin, and required libraries. All users who require rust-toolset-1.29 are advised to install these new packages.', '2018-11-13 00:00:00+00', 'https://access.redhat.com/errata/RHEA-2018:3584 https://access.redhat.com/security/cve/CVE-2018-1000622', 'Moderate', 'Medium', 'rust-toolset-1.29', '', '', 'aarch64|ppc64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:devtools:2', 'rhel-cpe-repository', '', '0:1.29.2-1.el7', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; This enhancement update adds the rust - toolset - 1.29 packages to Red Hat Developer Tools. (BZ # 1599904) For details, see Using Rust Toolset linked from the References section.;[ Date: 2023-07-05 09:58:31 - Bind query: yes ]
2 8s456ms INSERT INTO updater_status (updater_name, last_attempt, last_run_succeeded, last_attempt_fingerprint, last_error) VALUES ('RHEL8-rhel-8.4-tus', '2023-07-05 10:01:36.067954+00', 'false', '{"Etag":"\"bb36472636586cfacca5a2308ccc7193\"","Date":"Sat, 01 Jul 2023 10:20:35 GMT"}', 'failed to update: failed to queue vulnerability: failed to flush batch when queueing vulnerability: timeout: context deadline exceeded') ON CONFLICT (updater_name) DO UPDATE SET last_attempt = $2, last_run_succeeded = 'false', last_attempt_fingerprint = $3, last_error = $4 RETURNING updater_name;[ Date: 2023-07-05 10:05:14 - Bind query: yes ]
3 8s115ms INSERT INTO updater_status (updater_name, last_attempt, last_run_succeeded, last_attempt_fingerprint, last_error) VALUES ('RHEL8-rhel-8.8-tus', '2023-07-05 09:58:00.022984+00', 'false', '{"Etag":"\"bec4f014e65cb6ef7a65b64238524d5c\"","Date":"Sat, 01 Jul 2023 10:53:47 GMT"}', 'failed to update: failed to queue vulnerability: failed to flush batch when queueing vulnerability: timeout: context deadline exceeded') ON CONFLICT (updater_name) DO UPDATE SET last_attempt = $2, last_run_succeeded = 'false', last_attempt_fingerprint = $3, last_error = $4 RETURNING updater_name;[ Date: 2023-07-05 10:05:14 - Bind query: yes ]
4 8s78ms INSERT INTO updater_status (updater_name, last_attempt, last_run_succeeded, last_attempt_fingerprint, last_error) VALUES ('RHEL8-rhel-8.4-eus', '2023-07-05 09:57:39.024676+00', 'false', '{"Etag":"\"f44f7778d2ad1d87418deb3788282d91\"","Date":"Sat, 01 Jul 2023 10:20:25 GMT"}', 'failed to update: failed to queue vulnerability: failed to flush batch when queueing vulnerability: timeout: context deadline exceeded') ON CONFLICT (updater_name) DO UPDATE SET last_attempt = $2, last_run_succeeded = 'false', last_attempt_fingerprint = $3, last_error = $4 RETURNING updater_name;[ Date: 2023-07-05 10:05:14 - Bind query: yes ]
5 7s765ms INSERT INTO updater_status (updater_name, last_attempt, last_run_succeeded, last_attempt_fingerprint, last_error) VALUES ('RHEL8-rhel-8.6-e4s', '2023-07-05 09:59:34.336487+00', 'false', '{"Etag":"\"1ce53270e8e140c454eb16f23ec91581\"","Date":"Sat, 01 Jul 2023 10:54:51 GMT"}', 'failed to update: failed to queue vulnerability: failed to flush batch when queueing vulnerability: read tcp 10.129.2.226:44048->172.30.3.208:5432: use of closed network connection') ON CONFLICT (updater_name) DO UPDATE SET last_attempt = $2, last_run_succeeded = 'false', last_attempt_fingerprint = $3, last_error = $4 RETURNING updater_name;[ Date: 2023-07-05 10:05:14 - Bind query: yes ]
6 7s744ms INSERT INTO updater_status (updater_name, last_attempt, last_run_succeeded, last_attempt_fingerprint, last_error) VALUES ('debian/updater/bullseye', '2023-07-05 09:54:22.09519+00', 'false', '"3327caa-5ffb87c3491ad"', 'failed to update: failed to queue vulnerability: failed to flush batch when queueing vulnerability: timeout: context deadline exceeded') ON CONFLICT (updater_name) DO UPDATE SET last_attempt = $2, last_run_succeeded = 'false', last_attempt_fingerprint = $3, last_error = $4 RETURNING updater_name;[ Date: 2023-07-05 10:05:14 - Bind query: yes ]
7 7s706ms INSERT INTO updater_status (updater_name, last_attempt, last_run_succeeded, last_attempt_fingerprint, last_error) VALUES ('RHEL8-advanced-virtualization', '2023-07-05 10:01:20.66607+00', 'false', '{"Etag":"\"a701315d7dade1c00c0d5ffee4f45f46\"","Date":"Sat, 01 Jul 2023 07:32:20 GMT"}', 'failed to update: failed to queue vulnerability: failed to flush batch when queueing vulnerability: timeout: context deadline exceeded') ON CONFLICT (updater_name) DO UPDATE SET last_attempt = $2, last_run_succeeded = 'false', last_attempt_fingerprint = $3, last_error = $4 RETURNING updater_name;[ Date: 2023-07-05 10:05:14 - Bind query: yes ]
8 5s688ms INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xf3d731eb9acec4286692782279b9dd39', 'RHSA-2020:1508: java-1.7.0-openjdk security update (Important)', 'RHEL6-rhel-6', 'The java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Java Software Development Kit. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2020-04-21 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:1508 https://access.redhat.com/security/cve/CVE-2020-2756 https://access.redhat.com/security/cve/CVE-2020-2757 https://access.redhat.com/security/cve/CVE-2020-2773 https://access.redhat.com/security/cve/CVE-2020-2781 https://access.redhat.com/security/cve/CVE-2020-2800 https://access.redhat.com/security/cve/CVE-2020-2803 https://access.redhat.com/security/cve/CVE-2020-2805 https://access.redhat.com/security/cve/CVE-2020-2830', 'Important', 'High', 'java-1.7.0-openjdk-devel', '', '', 'i686|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '6', '', '6', '', 'cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 6', 'cpe:/o:redhat:enterprise_linux:6::workstation', 'rhel-cpe-repository', '', '1:1.7.0.261-2.6.22.1.el6_10', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * OpenJDK: Incorrect bounds checks in NIO Buffers (Libraries, 8234841) (CVE - 2020 - 2803) * OpenJDK: Incorrect type checks in MethodType.readObject () (Libraries, 8235274) (CVE - 2020 - 2805) * OpenJDK: Unexpected exceptions raised by DOMKeyInfoFactory and DOMXMLSignatureFactory ( Security, 8231415) (CVE - 2020 - 2773) * OpenJDK: Re - use of single TLS session for new connections (JSSE, 8234408) (CVE - 2020 - 2781) * OpenJDK: CRLF injection into HTTP headers in HttpServer (Lightweight HTTP Server, 8234825) (CVE - 2020 - 2800) * OpenJDK: Regular expression DoS in Scanner (Concurrency, 8236201) (CVE - 2020 - 2830) * OpenJDK: Incorrect handling of references to uninitialized class descriptors during deserialization (Serialization, 8224541) (CVE - 2020 - 2756) * OpenJDK: Uncaught InstantiationError exception in ObjectStreamClass (Serialization, 8224549) (CVE - 2020 - 2757);[ Date: 2023-07-05 10:04:12 - Bind query: yes ]
9 5s688ms INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x928105772942aafebc92d90337fe1d6f', 'RHSA-2022:1759: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.6 Release Notes linked from the References section.', '2022-05-10 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:1759 https://access.redhat.com/security/cve/CVE-2021-20196 https://access.redhat.com/security/cve/CVE-2021-33285 https://access.redhat.com/security/cve/CVE-2021-33286 https://access.redhat.com/security/cve/CVE-2021-33287 https://access.redhat.com/security/cve/CVE-2021-33289 https://access.redhat.com/security/cve/CVE-2021-35266 https://access.redhat.com/security/cve/CVE-2021-35267 https://access.redhat.com/security/cve/CVE-2021-35268 https://access.redhat.com/security/cve/CVE-2021-35269 https://access.redhat.com/security/cve/CVE-2021-3622 https://access.redhat.com/security/cve/CVE-2021-3716 https://access.redhat.com/security/cve/CVE-2021-3748 https://access.redhat.com/security/cve/CVE-2021-39251 https://access.redhat.com/security/cve/CVE-2021-39252 https://access.redhat.com/security/cve/CVE-2021-39253 https://access.redhat.com/security/cve/CVE-2021-39254 https://access.redhat.com/security/cve/CVE-2021-39255 https://access.redhat.com/security/cve/CVE-2021-39256 https://access.redhat.com/security/cve/CVE-2021-39257 https://access.redhat.com/security/cve/CVE-2021-39258 https://access.redhat.com/security/cve/CVE-2021-39259 https://access.redhat.com/security/cve/CVE-2021-39260 https://access.redhat.com/security/cve/CVE-2021-39261 https://access.redhat.com/security/cve/CVE-2021-39262 https://access.redhat.com/security/cve/CVE-2021-39263 https://access.redhat.com/security/cve/CVE-2021-3975 https://access.redhat.com/security/cve/CVE-2021-4145 https://access.redhat.com/security/cve/CVE-2021-4158 https://access.redhat.com/security/cve/CVE-2022-0485', 'Moderate', 'Medium', 'nbdkit-gzip-filter', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:1.24.0-4.module+el8.6.0+14480+c0a3aa0f', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; The following packages have been upgraded to a later upstream version: qemu - kvm (6.2.0), libvirt (8.0.0), libvirt - python (8.0.0), perl - Sys - Virt (8.0.0), seabios (1.15.0), libtpms (0.9.1).(BZ # 1997410, BZ # 2012802, BZ # 2012806, BZ # 2012813, BZ # 2018392, BZ # 2027716, BZ # 2029355) Security Fix (es) : * QEMU: virtio - net: heap use - after - free in virtio_net_receive_rcu (CVE - 2021 - 3748) * ntfs - 3g: Out - of - bounds heap buffer access in ntfs_get_attribute_value () due to incorrect check of bytes_in_use value in MFT records (CVE - 2021 - 33285) * ntfs - 3g: Heap buffer overflow triggered by a specially crafted Unicode string (CVE - 2021 - 33286) * ntfs - 3g: Heap buffer overflow in ntfs_attr_pread_i () triggered by specially crafted NTFS attributes (CVE - 2021 - 33287) * ntfs - 3g: Heap buffer overflow triggered by a specially crafted MFT section (CVE - 2021 - 33289) * ntfs - 3g: Heap buffer overflow triggered by a specially crafted NTFS inode pathname (CVE - 2021 - 35266) * ntfs - 3g: Stack buffer overflow triggered when correcting differences between MFT and MFTMirror sections (CVE - 2021 - 35267) * ntfs - 3g: Heap buffer overflow in ntfs_inode_real_open () triggered by a specially crafted NTFS inode (CVE - 2021 - 35268) * ntfs - 3g: Heap buffer overflow in ntfs_attr_setup_flag () triggered by a specially crafted NTFS attribute from MFT (CVE - 2021 - 35269) * ntfs - 3g: NULL pointer dereference in ntfs_extent_inode_open () (CVE - 2021 - 39251) * ntfs - 3g: Out - of - bounds read in ntfs_ie_lookup () (CVE - 2021 - 39252) * ntfs - 3g: Out - of - bounds read in ntfs_runlists_merge_i () (CVE - 2021 - 39253) * ntfs - 3g: integer overflow in memmove () leading to heap buffer overflow in ntfs_attr_record_resize () (CVE - 2021 - 39254) * ntfs - 3g: Out - of - bounds read ntfs_attr_find_in_attrdef () triggered by an invalid attribute (CVE - 2021 - 39255) * ntfs - 3g: Heap buffer overflow in ntfs_inode_lookup_by_name () (CVE - 2021 - 39256) * ntfs - 3g: Endless recursion from ntfs_attr_pwrite () triggered by an unallocated bitmap (CVE - 2021 - 39257) * ntfs - 3g: Out - of - bounds reads in ntfs_attr_find () and ntfs_external_attr_find () (CVE - 2021 - 39258) * ntfs - 3g: Out - of - bounds access in ntfs_inode_lookup_by_name () caused by an unsanitized attribute length(CVE - 2021 - 39259) * ntfs - 3g: Out - of - bounds access in ntfs_inode_sync_standard_information () (CVE - 2021 - 39260) * ntfs - 3g: Heap buffer overflow in ntfs_compressed_pwrite () (CVE - 2021 - 39261) * ntfs - 3g: Out - of - bounds access in ntfs_decompress () (CVE - 2021 - 39262) * ntfs - 3g: Heap buffer overflow in ntfs_get_attribute_value () caused by an unsanitized attribute (CVE - 2021 - 39263) * libnbd: nbdcopy: missing error handling may create corrupted destination image ( CVE - 2022 - 0485) * hivex: stack overflow due to recursive call of _get_children () ( CVE - 2021 - 3622) * nbdkit: NBD_OPT_STRUCTURED_REPLY injection on STARTTLS ( CVE - 2021 - 3716) * libvirt: segmentation fault during VM shutdown can lead to vdsm hang ( CVE - 2021 - 3975) * QEMU: NULL pointer dereference in mirror_wait_on_conflicts () in block / mirror.c ( CVE - 2021 - 4145) * QEMU: NULL pointer dereference in pci_write () in hw / acpi / pcihp.c ( CVE - 2021 - 4158) * QEMU: block: fdc: null pointer dereference may lead to guest crash ( CVE - 2021 - 20196) For more details about the security issue ( s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page ( s) listed in the References section. Additional Changes:;[ Date: 2023-07-05 10:04:12 - Bind query: yes ]
10 5s688ms INSERT INTO uo_vuln (uo, vuln) VALUES ('116', ( SELECT id FROM vuln WHERE hash_kind = 'md5' AND hash = '\xd272d49019a19ad51c9d97dcc75e80f9')) ON CONFLICT DO NOTHING;[ Date: 2023-07-05 10:04:12 - Bind query: yes ]
11 5s688ms INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x46936e367bbf4f5b6572331dd31f015e', 'CVE-2019-18680', 'suse-updater-suse.linux.enterprise.server.12', ' ', '0001-01-01 00:00:00+00', 'http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18680', 'Important', 'High', 'kernel-default-kgraft', '', '', '', 'binary', 'sles', 'SLES', '12', '', '12', '', '', 'SUSE Linux Enterprise Server 12', '', '', '', '0:4.4.180-94.113', 'invalid', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; An issue was discovered in the Linux kernel 4.4.x before 4.4.195. There is a NULL pointer dereference in rds_tcp_kill_sock () in net / rds / tcp.c that will cause denial of service, aka CID - 91573ae4aed0.;[ Date: 2023-07-05 10:04:12 - Bind query: yes ]
12 5s688ms INSERT INTO uo_vuln (uo, vuln) VALUES ('183', ( SELECT id FROM vuln WHERE hash_kind = 'md5' AND hash = '\xb901bd34a5fb6e05fe1d78a5c6a7f7da')) ON CONFLICT DO NOTHING;[ Date: 2023-07-05 10:04:12 - Bind query: yes ]
13 5s688ms INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x1e4b97a76c6fdc276638720872d39b33', 'RHSA-2022:0886: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2022-03-15 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:0886 https://access.redhat.com/security/cve/CVE-2022-0358', 'Moderate', 'Medium', 'ocaml-libguestfs-devel', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::sap_hana', 'rhel-cpe-repository', '', '1:1.40.2-28.module+el8.5.0+10717+67be7ac4', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; systems. Security Fix (es) : * QEMU: virtiofsd: potential privilege escalation via CVE - 2018 - 13405 (CVE - 2022 - 0358);[ Date: 2023-07-05 10:04:12 - Bind query: yes ]
14 5s688ms INSERT INTO uo_vuln (uo, vuln) VALUES ('380', ( SELECT id FROM vuln WHERE hash_kind = 'md5' AND hash = '\xf17d15db9d96a5284af2bc0a1880978b')) ON CONFLICT DO NOTHING;[ Date: 2023-07-05 10:04:12 - Bind query: yes ]
15 5s683ms INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x69b11a2b957666b780dbd9b90eb9298c', 'RHSA-2021:0743: virt:8.2 and virt-devel:8.2 security update (Important)', 'RHEL8-advanced-virtualization', 'The Advanced Virtualization module provides the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-03-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0743 https://access.redhat.com/security/cve/CVE-2020-35517', 'Important', 'High', 'qemu-guest-agent', '', 'virt-devel:8.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:advanced_virtualization:8', 'rhel-cpe-repository', '', '15:4.2.0-29.module+el8.2.1+9917+2543143c.7', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: virtiofsd: potential privileged host device access from guest (CVE - 2020 - 35517);[ Date: 2023-07-05 10:04:12 - Bind query: yes ]
16 5s609ms INSERT INTO uo_vuln (uo, vuln) VALUES ('284', ( SELECT id FROM vuln WHERE hash_kind = 'md5' AND hash = '\xb80c3c40355703392f554c43eabff387')) ON CONFLICT DO NOTHING;[ Date: 2023-07-05 10:04:12 - Bind query: yes ]
17 5s609ms INSERT INTO uo_vuln (uo, vuln) VALUES ('190', ( SELECT id FROM vuln WHERE hash_kind = 'md5' AND hash = '\xeb4a96eccef4703fef99f2d08efe0570')) ON CONFLICT DO NOTHING;[ Date: 2023-07-05 10:04:12 - Bind query: yes ]
18 5s609ms INSERT INTO uo_vuln (uo, vuln) VALUES ('219', ( SELECT id FROM vuln WHERE hash_kind = 'md5' AND hash = '\xe87073c6e1e76313431b65a6df586c03')) ON CONFLICT DO NOTHING;[ Date: 2023-07-05 10:04:12 - Bind query: yes ]
19 5s609ms INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xbcfee516205e72f565bb07b23bfe59bf', 'CVE-2020-27757 imagemagick', 'debian/updater/buster', 'A floating point math calculation in ScaleAnyToQuantum() of /MagickCore/quantum-private.h could lead to undefined behavior in the form of a value outside the range of type unsigned long long. The flaw could be triggered by a crafted input file under certain conditions when it is processed by ImageMagick. Red Hat Product Security marked this as Low because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to 7.0.8-68.', '0001-01-01 00:00:00+00', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757', '', 'Unknown', 'imagemagick-common', '', '', '', 'binary', 'debian', 'Debian GNU/Linux', '10 (buster)', 'buster', '10', '', '', 'Debian GNU/Linux 10 (buster)', '', '', '', '8:6.9.10.23+dfsg-2.1+deb10u2', 'invalid', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING;[ Date: 2023-07-05 10:04:12 - Bind query: yes ]
20 5s609ms INSERT INTO uo_enrich (enrich, updater, uo, date) VALUES (( SELECT id FROM enrichment WHERE hash_kind = 'md5' AND hash = '\x59b94d41f1bdf7e8b4fbaed047bc48c3' AND updater = 'clair.cvss'), $3, '446', transaction_timestamp()) ON CONFLICT DO NOTHING;[ Date: 2023-07-05 10:04:12 - Bind query: yes ]
Time consuming queries
Rank Total duration Times executed Min duration Max duration Avg duration Query 1 1h3m16s 5,639,953 0ms 5s688ms 0ms insert into uo_vuln (uo, vuln) values (?, ( select id from vuln where hash_kind = ? and hash = ?)) on conflict do nothing;Times Reported Time consuming queries #1
Day Hour Count Duration Avg duration Jul 05 05 3,331,843 29m44s 0ms 06 2,308,110 33m31s 0ms -
INSERT INTO uo_vuln (uo, vuln) VALUES ('116', ( SELECT id FROM vuln WHERE hash_kind = 'md5' AND hash = '\xd272d49019a19ad51c9d97dcc75e80f9')) ON CONFLICT DO NOTHING;
Date: 2023-07-05 10:04:12 Duration: 5s688ms Bind query: yes
-
INSERT INTO uo_vuln (uo, vuln) VALUES ('183', ( SELECT id FROM vuln WHERE hash_kind = 'md5' AND hash = '\xb901bd34a5fb6e05fe1d78a5c6a7f7da')) ON CONFLICT DO NOTHING;
Date: 2023-07-05 10:04:12 Duration: 5s688ms Bind query: yes
-
INSERT INTO uo_vuln (uo, vuln) VALUES ('380', ( SELECT id FROM vuln WHERE hash_kind = 'md5' AND hash = '\xf17d15db9d96a5284af2bc0a1880978b')) ON CONFLICT DO NOTHING;
Date: 2023-07-05 10:04:12 Duration: 5s688ms Bind query: yes
2 12m45s 1,327,762 0ms 5s609ms 0ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing;Times Reported Time consuming queries #2
Day Hour Count Duration Avg duration Jul 05 05 1,015,092 8m15s 0ms 06 312,670 4m30s 0ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xbcfee516205e72f565bb07b23bfe59bf', 'CVE-2020-27757 imagemagick', 'debian/updater/buster', 'A floating point math calculation in ScaleAnyToQuantum() of /MagickCore/quantum-private.h could lead to undefined behavior in the form of a value outside the range of type unsigned long long. The flaw could be triggered by a crafted input file under certain conditions when it is processed by ImageMagick. Red Hat Product Security marked this as Low because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to 7.0.8-68.', '0001-01-01 00:00:00+00', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757', '', 'Unknown', 'imagemagick-common', '', '', '', 'binary', 'debian', 'Debian GNU/Linux', '10 (buster)', 'buster', '10', '', '', 'Debian GNU/Linux 10 (buster)', '', '', '', '8:6.9.10.23+dfsg-2.1+deb10u2', 'invalid', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING;
Date: 2023-07-05 10:04:12 Duration: 5s609ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xf226c542787ee5973c683c07cd61d82b', 'CVE-2017-10684 ncurses', 'debian/updater/buster', 'In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.', '0001-01-01 00:00:00+00', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10684', '', 'Unknown', 'ncurses-examples', '', '', '', 'binary', 'debian', 'Debian GNU/Linux', '10 (buster)', 'buster', '10', '', '', 'Debian GNU/Linux 10 (buster)', '', '', '', '0:6.0+20170708-1', 'invalid', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING;
Date: 2023-07-05 09:57:59 Duration: 2s443ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x3069389c9744fabdf56d6377c77ae4ae', 'CVE-2022-34676 on Ubuntu 18.04 LTS (bionic) - medium.', 'ubuntu/updater/bionic', 'NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where an out-of-bounds read may lead to denial of service, information disclosure, or data tampering.', '0001-01-01 00:00:00+00', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34676', '', 'Medium', 'nvidia-driver-440', '', '', '', 'binary', 'ubuntu', 'Ubuntu', '18.04 (Bionic)', 'bionic', '18.04', '', '', 'Ubuntu 18.04', '', '', '', '', 'invalid', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING;
Date: 2023-07-05 09:57:59 Duration: 2s443ms Bind query: yes
3 1m38s 212,191 0ms 5s609ms 0ms insert into uo_enrich (enrich, updater, uo, date) values (( select id from enrichment where hash_kind = ? and hash = ? and updater = ?), ?, ?, transaction_timestamp()) on conflict do nothing;Times Reported Time consuming queries #3
Day Hour Count Duration Avg duration Jul 05 05 132,435 46s749ms 0ms 06 79,756 52s73ms 0ms -
INSERT INTO uo_enrich (enrich, updater, uo, date) VALUES (( SELECT id FROM enrichment WHERE hash_kind = 'md5' AND hash = '\x59b94d41f1bdf7e8b4fbaed047bc48c3' AND updater = 'clair.cvss'), $3, '446', transaction_timestamp()) ON CONFLICT DO NOTHING;
Date: 2023-07-05 10:04:12 Duration: 5s609ms Bind query: yes
-
INSERT INTO uo_enrich (enrich, updater, uo, date) VALUES (( SELECT id FROM enrichment WHERE hash_kind = 'md5' AND hash = '\xf47b2c356fc6cb5166c1389bb79e2468' AND updater = 'clair.cvss'), $3, '132', transaction_timestamp()) ON CONFLICT DO NOTHING;
Date: 2023-07-05 09:57:36 Duration: 1s403ms Bind query: yes
-
INSERT INTO uo_enrich (enrich, updater, uo, date) VALUES (( SELECT id FROM enrichment WHERE hash_kind = 'md5' AND hash = '\xa1a2c1196bb46285b0c6cbef73da2140' AND updater = 'clair.cvss'), $3, '132', transaction_timestamp()) ON CONFLICT DO NOTHING;
Date: 2023-07-05 09:56:19 Duration: 954ms Bind query: yes
4 1m21s 1,575 0ms 2s443ms 51ms commit;Times Reported Time consuming queries #4
Day Hour Count Duration Avg duration Jul 05 05 546 29s663ms 54ms 06 1,029 51s963ms 50ms -
commit;
Date: 2023-07-05 09:57:59 Duration: 2s443ms
-
commit;
Date: 2023-07-05 10:01:26 Duration: 1s93ms
-
commit;
Date: 2023-07-05 10:01:26 Duration: 1s79ms
5 1m 20 0ms 8s456ms 3s42ms insert into updater_status (updater_name, last_attempt, last_run_succeeded, last_attempt_fingerprint, last_error) values (?, ?, ?, ?, ?) on conflict (updater_name) do update set last_attempt = ?, last_run_succeeded = ?, last_attempt_fingerprint = ?, last_error = ? returning updater_name;Times Reported Time consuming queries #5
Day Hour Count Duration Avg duration Jul 05 05 4 0ms 0ms 06 16 1m 3s803ms -
INSERT INTO updater_status (updater_name, last_attempt, last_run_succeeded, last_attempt_fingerprint, last_error) VALUES ('RHEL8-rhel-8.4-tus', '2023-07-05 10:01:36.067954+00', 'false', '{"Etag":"\"bb36472636586cfacca5a2308ccc7193\"","Date":"Sat, 01 Jul 2023 10:20:35 GMT"}', 'failed to update: failed to queue vulnerability: failed to flush batch when queueing vulnerability: timeout: context deadline exceeded') ON CONFLICT (updater_name) DO UPDATE SET last_attempt = $2, last_run_succeeded = 'false', last_attempt_fingerprint = $3, last_error = $4 RETURNING updater_name;
Date: 2023-07-05 10:05:14 Duration: 8s456ms Bind query: yes
-
INSERT INTO updater_status (updater_name, last_attempt, last_run_succeeded, last_attempt_fingerprint, last_error) VALUES ('RHEL8-rhel-8.8-tus', '2023-07-05 09:58:00.022984+00', 'false', '{"Etag":"\"bec4f014e65cb6ef7a65b64238524d5c\"","Date":"Sat, 01 Jul 2023 10:53:47 GMT"}', 'failed to update: failed to queue vulnerability: failed to flush batch when queueing vulnerability: timeout: context deadline exceeded') ON CONFLICT (updater_name) DO UPDATE SET last_attempt = $2, last_run_succeeded = 'false', last_attempt_fingerprint = $3, last_error = $4 RETURNING updater_name;
Date: 2023-07-05 10:05:14 Duration: 8s115ms Bind query: yes
-
INSERT INTO updater_status (updater_name, last_attempt, last_run_succeeded, last_attempt_fingerprint, last_error) VALUES ('RHEL8-rhel-8.4-eus', '2023-07-05 09:57:39.024676+00', 'false', '{"Etag":"\"f44f7778d2ad1d87418deb3788282d91\"","Date":"Sat, 01 Jul 2023 10:20:25 GMT"}', 'failed to update: failed to queue vulnerability: failed to flush batch when queueing vulnerability: timeout: context deadline exceeded') ON CONFLICT (updater_name) DO UPDATE SET last_attempt = $2, last_run_succeeded = 'false', last_attempt_fingerprint = $3, last_error = $4 RETURNING updater_name;
Date: 2023-07-05 10:05:14 Duration: 8s78ms Bind query: yes
6 55s152ms 434 0ms 2s771ms 127ms delete from vuln v1 using vuln v2 left join uo_vuln uvl on v2.id = uvl.vuln where uvl.vuln is null and v2.updater = ? and v1.id = v2.id;Times Reported Time consuming queries #6
Day Hour Count Duration Avg duration Jul 05 06 434 55s152ms 127ms -
DELETE FROM vuln v1 USING vuln v2 LEFT JOIN uo_vuln uvl ON v2.id = uvl.vuln WHERE uvl.vuln IS NULL AND v2.updater = 'RHEL8-rhel-8.6-tus' AND v1.id = v2.id;
Date: 2023-07-05 10:05:17 Duration: 2s771ms Bind query: yes
-
DELETE FROM vuln v1 USING vuln v2 LEFT JOIN uo_vuln uvl ON v2.id = uvl.vuln WHERE uvl.vuln IS NULL AND v2.updater = 'RHEL8-rhel-8.1-e4s' AND v1.id = v2.id;
Date: 2023-07-05 10:05:17 Duration: 2s508ms Bind query: yes
-
DELETE FROM vuln v1 USING vuln v2 LEFT JOIN uo_vuln uvl ON v2.id = uvl.vuln WHERE uvl.vuln IS NULL AND v2.updater = 'ubuntu/updater/xenial' AND v1.id = v2.id;
Date: 2023-07-05 10:05:26 Duration: 1s733ms Bind query: yes
7 48s937ms 212,190 0ms 2s442ms 0ms insert into enrichment (hash_kind, hash, updater, tags, data) values (?, ?, ?, ?, ?) on conflict (hash_kind, hash) do nothing;Times Reported Time consuming queries #7
Day Hour Count Duration Avg duration Jul 05 05 132,432 45s356ms 0ms 06 79,758 3s580ms 0ms -
INSERT INTO enrichment (hash_kind, hash, updater, tags, data) VALUES ('md5', '\xfb63662a2f1d7fa83678151079720119', 'clair.cvss', '{CVE-2023-1473}', '{"scope": "CHANGED", "version": "3.1", "baseScore": 6.1, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "integrityImpact": "LOW", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "LOW"}') ON CONFLICT (hash_kind, hash) DO NOTHING;
Date: 2023-07-05 09:57:59 Duration: 2s442ms Bind query: yes
-
INSERT INTO enrichment (hash_kind, hash, updater, tags, data) VALUES ('md5', '\x720b6d966a38af8ed12fa2d28936094f', 'clair.cvss', '{CVE-2021-37184}', '{"scope": "UNCHANGED", "version": "3.1", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}') ON CONFLICT (hash_kind, hash) DO NOTHING;
Date: 2023-07-05 09:57:04 Duration: 1s842ms Bind query: yes
-
INSERT INTO enrichment (hash_kind, hash, updater, tags, data) VALUES ('md5', '\x64ce6c40cfa70dcfcd4f30a864c52cd5', 'clair.cvss', '{CVE-2017-18905}', '{"scope": "UNCHANGED", "version": "3.1", "baseScore": 5.3, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "integrityImpact": "LOW", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}') ON CONFLICT (hash_kind, hash) DO NOTHING;
Date: 2023-07-05 09:55:36 Duration: 582ms Bind query: yes
8 38s237ms 38,837 0ms 2s443ms 0ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing; security fix (es) : * hw: tsx transaction asynchronous abort (taa) (cve - 2019 - 11135);Times Reported Time consuming queries #8
Day Hour Count Duration Avg duration Jul 05 05 25,892 25s890ms 0ms 06 12,945 12s347ms 0ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x48d59293108970ea766a305eec31632d', 'RHSA-2020:0279: virt:rhel security update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2020-01-29 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:0279 https://access.redhat.com/security/cve/CVE-2019-11135', 'Moderate', 'Medium', 'libvirt-daemon', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::sap_hana', 'rhel-cpe-repository', '', '0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * hw: TSX Transaction Asynchronous Abort (TAA) (CVE - 2019 - 11135);
Date: 2023-07-05 09:57:59 Duration: 2s443ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x9ee761856622187e49c7b19236c4e98b', 'RHSA-2020:0279: virt:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2020-01-29 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:0279 https://access.redhat.com/security/cve/CVE-2019-11135', 'Moderate', 'Medium', 'libvirt-daemon-driver-interface', '', 'virt-devel:rhel', 'i686', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::resilientstorage', 'rhel-cpe-repository', '', '0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730', 'equals', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * hw: TSX Transaction Asynchronous Abort (TAA) (CVE - 2019 - 11135);
Date: 2023-07-05 09:59:11 Duration: 1s168ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xa9a4674d16fb7f661686d48f428051f2', 'RHSA-2020:0279: virt:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2020-01-29 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:0279 https://access.redhat.com/security/cve/CVE-2019-11135', 'Moderate', 'Medium', 'libvirt-daemon-driver-storage-scsi', '', 'virt:rhel', 'i686', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::sap_hana', 'rhel-cpe-repository', '', '0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730', 'equals', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * hw: TSX Transaction Asynchronous Abort (TAA) (CVE - 2019 - 11135);
Date: 2023-07-05 09:59:12 Duration: 686ms Bind query: yes
9 35s566ms 33,555 0ms 1s53ms 1ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing; security fix (es) : * qemu: block: iscsi: oob heap access via an unexpected response of iscsi server (cve - 2020 - 1711) * qemu: slirp: oob buffer access while emulating tcp protocols in tcp_emu () (cve - 2020 - 7039) for more details about the security issue (s), including the impact, a cvss score, acknowledgments, and other related information, refer to the cve page (s) listed in the references section. bug fix (es) :;Times Reported Time consuming queries #9
Day Hour Count Duration Avg duration Jul 05 05 22,495 23s 1ms 06 11,060 12s566ms 1ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x738dc3569d17777506c0bc063df880d7', 'RHSA-2020:1358: virt:rhel security and bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. * libvirtd: error : virCPUx86UpdateLive:3110 : operation failed: guest CPU doesn''t match specification: missing features: fxsr_opt (BZ#1809510)', '2020-04-07 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:1358 https://access.redhat.com/security/cve/CVE-2020-1711 https://access.redhat.com/security/cve/CVE-2020-7039', 'Important', 'High', 'qemu-kvm-block-iscsi', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '15:2.12.0-88.module+el8.1.0+5708+85d8e057.3', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server (CVE - 2020 - 1711) * QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu () (CVE - 2020 - 7039) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Bug Fix (es) :;
Date: 2023-07-05 09:55:13 Duration: 1s53ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x18e3e4b33254bac7a55a4202c7bdf2e9', 'RHSA-2020:1358: virt:rhel security and bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. * libvirtd: error : virCPUx86UpdateLive:3110 : operation failed: guest CPU doesn''t match specification: missing features: fxsr_opt (BZ#1809510)', '2020-04-07 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:1358 https://access.redhat.com/security/cve/CVE-2020-1711 https://access.redhat.com/security/cve/CVE-2020-7039', 'Important', 'High', 'nbdkit-bash-completion', '', 'virt:rhel', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.4.2-5.module+el8.1.0+4066+0f1aadab', 'invalid', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server (CVE - 2020 - 1711) * QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu () (CVE - 2020 - 7039) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Bug Fix (es) :;
Date: 2023-07-05 09:56:19 Duration: 954ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x7260d22dffce660e21b0fdfae436e562', 'RHSA-2020:1358: virt:rhel security and bug fix update (Important)', 'RHEL8-rhel-8.8-tus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. * libvirtd: error : virCPUx86UpdateLive:3110 : operation failed: guest CPU doesn''t match specification: missing features: fxsr_opt (BZ#1809510)', '2020-04-07 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:1358 https://access.redhat.com/security/cve/CVE-2020-1711 https://access.redhat.com/security/cve/CVE-2020-7039', 'Important', 'High', 'hivex', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.3.15-7.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server (CVE - 2020 - 1711) * QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu () (CVE - 2020 - 7039) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Bug Fix (es) :;
Date: 2023-07-05 09:59:14 Duration: 754ms Bind query: yes
10 32s539ms 29,543 0ms 5s683ms 1ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing; security fix (es) : * qemu: virtiofsd: potential privileged host device access from guest (cve - 2020 - 35517);Times Reported Time consuming queries #10
Day Hour Count Duration Avg duration Jul 05 05 5,303 3s813ms 0ms 06 24,240 28s725ms 1ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x69b11a2b957666b780dbd9b90eb9298c', 'RHSA-2021:0743: virt:8.2 and virt-devel:8.2 security update (Important)', 'RHEL8-advanced-virtualization', 'The Advanced Virtualization module provides the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-03-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0743 https://access.redhat.com/security/cve/CVE-2020-35517', 'Important', 'High', 'qemu-guest-agent', '', 'virt-devel:8.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:advanced_virtualization:8', 'rhel-cpe-repository', '', '15:4.2.0-29.module+el8.2.1+9917+2543143c.7', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: virtiofsd: potential privileged host device access from guest (CVE - 2020 - 35517);
Date: 2023-07-05 10:04:12 Duration: 5s683ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x68cc3ef60c6c68c00d3b2388b2f89445', 'RHSA-2021:0711: virt:rhel and virt-devel:rhel security update (Important)', 'RHEL8-rhel-8.8-e4s', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-03-03 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0711 https://access.redhat.com/security/cve/CVE-2020-35517', 'Important', 'High', 'python3-hivex', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:1.3.18-20.module+el8.3.0+6423+e4cb6418', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: virtiofsd: potential privileged host device access from guest (CVE - 2020 - 35517);
Date: 2023-07-05 09:57:34 Duration: 589ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x1074f1e47bc671d17ba8b052f36a9eb1', 'RHSA-2021:0711: virt:rhel and virt-devel:rhel security update (Important)', 'RHEL8-rhel-8.8-tus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-03-03 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0711 https://access.redhat.com/security/cve/CVE-2020-35517', 'Important', 'High', 'libvirt-daemon-driver-storage-iscsi', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '0:6.0.0-28.module+el8.3.0+7827+5e65edd7', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: virtiofsd: potential privileged host device access from guest (CVE - 2020 - 35517);
Date: 2023-07-05 10:01:02 Duration: 527ms Bind query: yes
11 32s97ms 28,556 0ms 658ms 1ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing; security fix (es) : * qemu: usb: out - of - bounds r / w access issue while processing usb packets (cve - 2020 - 14364) * qemu: slirp: networking out - of - bounds read information disclosure vulnerability (cve - 2020 - 10756);Times Reported Time consuming queries #11
Day Hour Count Duration Avg duration Jul 05 05 6,719 5s109ms 0ms 06 21,837 26s987ms 1ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xe2cea3e7b8a1602d8df3657046ddaec5', 'RHSA-2020:4059: virt:rhel security update (Important)', 'RHEL8-rhel-8.2-e4s', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2020-09-29 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:4059 https://access.redhat.com/security/cve/CVE-2020-10756 https://access.redhat.com/security/cve/CVE-2020-14364', 'Important', 'High', 'nbdkit-plugin-xz', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.2', 'rhel-cpe-repository', '', '0:1.4.2-5.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: usb: out - of - bounds r / w access issue while processing usb packets (CVE - 2020 - 14364) * QEMU: slirp: networking out - of - bounds read information disclosure vulnerability (CVE - 2020 - 10756);
Date: 2023-07-05 10:00:57 Duration: 658ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x247f136372e0b5bb10ef967dc9edc9e2', 'RHSA-2020:4059: virt:rhel security update (Important)', 'RHEL8-rhel-8', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2020-09-29 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:4059 https://access.redhat.com/security/cve/CVE-2020-10756 https://access.redhat.com/security/cve/CVE-2020-14364', 'Important', 'High', 'libguestfs-winsupport', '', 'virt-devel:rhel', 'i686', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:enterprise_linux:8::highavailability', 'rhel-cpe-repository', '', '0:8.0-4.module+el8.1.0+4066+0f1aadab', 'equals', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: usb: out - of - bounds r / w access issue while processing usb packets (CVE - 2020 - 14364) * QEMU: slirp: networking out - of - bounds read information disclosure vulnerability (CVE - 2020 - 10756);
Date: 2023-07-05 10:01:17 Duration: 642ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xfcaf3c3daa48cf952606e58e25342543', 'RHSA-2020:4059: virt:rhel security update (Important)', 'RHEL8-rhel-8.6-e4s', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2020-09-29 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:4059 https://access.redhat.com/security/cve/CVE-2020-10756 https://access.redhat.com/security/cve/CVE-2020-14364', 'Important', 'High', 'libvirt-daemon-kvm', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:4.5.0-42.module+el8.2.0+6024+15a2423f', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: usb: out - of - bounds r / w access issue while processing usb packets (CVE - 2020 - 14364) * QEMU: slirp: networking out - of - bounds read information disclosure vulnerability (CVE - 2020 - 10756);
Date: 2023-07-05 10:01:43 Duration: 605ms Bind query: yes
12 31s773ms 26,207 0ms 601ms 1ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing; the following packages have been upgraded to a later upstream version: hivex (?.?.?), libguestfs (?.?.?), libguestfs - winsupport (?.?), libvirt (?.?.?), libvirt - dbus (?.?.?), libvirt - python (?.?.?), nbdkit (?.?.?), perl - sys - virt (?.?.?), qemu - kvm (?.?.?), seabios (?.?.?), slof (?).(bz # ?, bz # ?) security fix (es) : * libvirt: leak of / dev / mapper / control into qemu guests (cve - 2020 - 14339) * qemu: slirp: use - after - free during packet reassembly (cve - 2019 - 15890) * libvirt: potential dos by holding a monitor job while querying qemu guest - agent (cve - 2019 - 20485) * qemu: slirp: use - after - free in ip_reass () function in ip_input.c (cve - 2020 - 1983) * libvirt: potential denial of service via active pool without target path(cve - 2020 - 10703) * libvirt: leak of sensitive cookie information via dumpxml (cve - 2020 - 14301) for more details about the security issue (s), including the impact, a cvss score, acknowledgments, and other related information, refer to the cve page (s) listed in the references section. additional changes:;Times Reported Time consuming queries #12
Day Hour Count Duration Avg duration Jul 05 05 5,304 5s499ms 1ms 06 20,903 26s274ms 1ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x3be5bbcc2cb3a0a8e295830297032ea3', 'RHSA-2020:4676: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.', '2020-11-04 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:4676 https://access.redhat.com/security/cve/CVE-2019-15890 https://access.redhat.com/security/cve/CVE-2019-20485 https://access.redhat.com/security/cve/CVE-2020-10703 https://access.redhat.com/security/cve/CVE-2020-14301 https://access.redhat.com/security/cve/CVE-2020-14339 https://access.redhat.com/security/cve/CVE-2020-1983', 'Moderate', 'Medium', 'virt-v2v', '', 'virt-devel:rhel', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '1:1.40.2-25.module+el8.3.0+7421+642fe24f', 'equals', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; The following packages have been upgraded to a later upstream version: hivex (1.3.18), libguestfs (1.40.2), libguestfs - winsupport (8.2), libvirt (6.0.0), libvirt - dbus (1.3.0), libvirt - python (6.0.0), nbdkit (1.16.2), perl - Sys - Virt (6.0.0), qemu - kvm (4.2.0), seabios (1.13.0), SLOF (20191022).(BZ # 1810193, BZ # 1844296) Security Fix (es) : * libvirt: leak of / dev / mapper / control into QEMU guests (CVE - 2020 - 14339) * QEMU: Slirp: use - after - free during packet reassembly (CVE - 2019 - 15890) * libvirt: Potential DoS by holding a monitor job while querying QEMU guest - agent (CVE - 2019 - 20485) * QEMU: slirp: use - after - free in ip_reass () function in ip_input.c (CVE - 2020 - 1983) * libvirt: Potential denial of service via active pool without target path(CVE - 2020 - 10703) * libvirt: leak of sensitive cookie information via dumpxml (CVE - 2020 - 14301) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 09:57:16 Duration: 601ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x811c6e94b1472c7953ca2b125f4a4506', 'RHSA-2020:4676: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.4-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.', '2020-11-04 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:4676 https://access.redhat.com/security/cve/CVE-2019-15890 https://access.redhat.com/security/cve/CVE-2019-20485 https://access.redhat.com/security/cve/CVE-2020-10703 https://access.redhat.com/security/cve/CVE-2020-14301 https://access.redhat.com/security/cve/CVE-2020-14339 https://access.redhat.com/security/cve/CVE-2020-1983', 'Moderate', 'Medium', 'qemu-img', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.4::baseos', 'rhel-cpe-repository', '', '15:4.2.0-34.module+el8.3.0+7976+077be4ec', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; The following packages have been upgraded to a later upstream version: hivex (1.3.18), libguestfs (1.40.2), libguestfs - winsupport (8.2), libvirt (6.0.0), libvirt - dbus (1.3.0), libvirt - python (6.0.0), nbdkit (1.16.2), perl - Sys - Virt (6.0.0), qemu - kvm (4.2.0), seabios (1.13.0), SLOF (20191022).(BZ # 1810193, BZ # 1844296) Security Fix (es) : * libvirt: leak of / dev / mapper / control into QEMU guests (CVE - 2020 - 14339) * QEMU: Slirp: use - after - free during packet reassembly (CVE - 2019 - 15890) * libvirt: Potential DoS by holding a monitor job while querying QEMU guest - agent (CVE - 2019 - 20485) * QEMU: slirp: use - after - free in ip_reass () function in ip_input.c (CVE - 2020 - 1983) * libvirt: Potential denial of service via active pool without target path(CVE - 2020 - 10703) * libvirt: leak of sensitive cookie information via dumpxml (CVE - 2020 - 14301) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 10:02:01 Duration: 600ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x51941ddac9af20f336e80313d4379e2f', 'RHSA-2020:4676: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.', '2020-11-04 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:4676 https://access.redhat.com/security/cve/CVE-2019-15890 https://access.redhat.com/security/cve/CVE-2019-20485 https://access.redhat.com/security/cve/CVE-2020-10703 https://access.redhat.com/security/cve/CVE-2020-14301 https://access.redhat.com/security/cve/CVE-2020-14339 https://access.redhat.com/security/cve/CVE-2020-1983', 'Moderate', 'Medium', 'ruby-libguestfs', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:enterprise_linux:8::realtime', 'rhel-cpe-repository', '', '1:1.40.2-25.module+el8.3.0+7421+642fe24f', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; The following packages have been upgraded to a later upstream version: hivex (1.3.18), libguestfs (1.40.2), libguestfs - winsupport (8.2), libvirt (6.0.0), libvirt - dbus (1.3.0), libvirt - python (6.0.0), nbdkit (1.16.2), perl - Sys - Virt (6.0.0), qemu - kvm (4.2.0), seabios (1.13.0), SLOF (20191022).(BZ # 1810193, BZ # 1844296) Security Fix (es) : * libvirt: leak of / dev / mapper / control into QEMU guests (CVE - 2020 - 14339) * QEMU: Slirp: use - after - free during packet reassembly (CVE - 2019 - 15890) * libvirt: Potential DoS by holding a monitor job while querying QEMU guest - agent (CVE - 2019 - 20485) * QEMU: slirp: use - after - free in ip_reass () function in ip_input.c (CVE - 2020 - 1983) * libvirt: Potential denial of service via active pool without target path(CVE - 2020 - 10703) * libvirt: leak of sensitive cookie information via dumpxml (CVE - 2020 - 14301) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 10:02:01 Duration: 598ms Bind query: yes
13 30s857ms 28,560 0ms 616ms 1ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing; security fix (es) : * qemu: slirp: potential oob access due to unsafe snprintf () usages (cve - 2020 - 8608) * qemu: vnc: memory leakage upon disconnect (cve - 2019 - 20382);Times Reported Time consuming queries #13
Day Hour Count Duration Avg duration Jul 05 05 9,800 6s664ms 0ms 06 18,760 24s192ms 1ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x1045fc7d624a02f9e90975372839776c', 'RHSA-2020:2774: virt:rhel security update (Important)', 'RHEL8-rhel-8.6-tus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2020-06-30 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2774 https://access.redhat.com/security/cve/CVE-2019-20382 https://access.redhat.com/security/cve/CVE-2020-8608', 'Important', 'High', 'qemu-kvm-block-ssh', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.6::realtime', 'rhel-cpe-repository', '', '15:2.12.0-99.module+el8.2.0+6870+55b789b4.2', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: Slirp: potential OOB access due to unsafe snprintf () usages (CVE - 2020 - 8608) * QEMU: vnc: memory leakage upon disconnect (CVE - 2019 - 20382);
Date: 2023-07-05 09:54:49 Duration: 616ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xb915c8fa31f78099d7bd0fd9eba7ab97', 'RHSA-2020:2774: virt:rhel security update (Important)', 'RHEL8-rhel-8', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2020-06-30 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2774 https://access.redhat.com/security/cve/CVE-2019-20382 https://access.redhat.com/security/cve/CVE-2020-8608', 'Important', 'High', 'libvirt-daemon-driver-interface', '', 'virt:rhel', 'i686', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:enterprise_linux:8::supplementary', 'rhel-cpe-repository', '', '0:4.5.0-42.module+el8.2.0+6024+15a2423f', 'equals', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: Slirp: potential OOB access due to unsafe snprintf () usages (CVE - 2020 - 8608) * QEMU: vnc: memory leakage upon disconnect (CVE - 2019 - 20382);
Date: 2023-07-05 10:00:50 Duration: 563ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xd08ea45f9621cb9a7634e60b9215e23d', 'RHSA-2020:2774: virt:rhel security update (Important)', 'RHEL8-rhel-8.8-e4s', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2020-06-30 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2774 https://access.redhat.com/security/cve/CVE-2019-20382 https://access.redhat.com/security/cve/CVE-2020-8608', 'Important', 'High', 'libvirt-daemon-driver-storage', '', 'virt:rhel', 'i686', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:4.5.0-42.module+el8.2.0+6024+15a2423f', 'equals', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: Slirp: potential OOB access due to unsafe snprintf () usages (CVE - 2020 - 8608) * QEMU: vnc: memory leakage upon disconnect (CVE - 2019 - 20382);
Date: 2023-07-05 09:56:42 Duration: 548ms Bind query: yes
14 29s432ms 25,615 0ms 553ms 1ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing; security fix (es) : * libvirt: double free in qemuagentgetinterfaces () in qemu_agent.c (cve - 2020 - 25637) * qemu: heap buffer overflow in msix_table_mmio_write () in hw / pci / msix.c (cve - 2020 - 27821) * qemu: ide: atapi: oob access while processing read commands (cve - 2020 - 29443) * qemu: heap buffer overflow in iscsi_aio_ioctl_cb () in block / iscsi.c may lead to information disclosure (cve - 2020 - 11947) * qemu: reachable assertion failure in net_tx_pkt_add_raw_fragment () in hw / net / net_tx_pkt.c (cve - 2020 - 16092) * qemu: infinite loop in e1000e_write_packet_to_guest () in hw / net / e1000e_core.c (cve - 2020 - 25707) * qemu: assertion failure through usb_packet_unmap () in hw / usb / hcd - ehci.c (cve - 2020 - 25723) * qemu: e1000e: infinite loop scenario in case of null packet descriptor (cve - 2020 - 28916) * qemu: slirp: out - of - bounds access while processing arp / ncsi packets (cve - 2020 - 29129, cve - 2020 - 29130) for more details about the security issue (s), including the impact, a cvss score, acknowledgments, and other related information, refer to the cve page (s) listed in the references section. additional changes:;Times Reported Time consuming queries #14
Day Hour Count Duration Avg duration Jul 05 05 5,304 5s695ms 1ms 06 20,311 23s736ms 1ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x19840aefc11d1663741c709cbe9eacca', 'RHSA-2021:1762: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section.', '2021-05-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1762 https://access.redhat.com/security/cve/CVE-2020-11947 https://access.redhat.com/security/cve/CVE-2020-16092 https://access.redhat.com/security/cve/CVE-2020-25637 https://access.redhat.com/security/cve/CVE-2020-25707 https://access.redhat.com/security/cve/CVE-2020-25723 https://access.redhat.com/security/cve/CVE-2020-27821 https://access.redhat.com/security/cve/CVE-2020-28916 https://access.redhat.com/security/cve/CVE-2020-29129 https://access.redhat.com/security/cve/CVE-2020-29130 https://access.redhat.com/security/cve/CVE-2020-29443', 'Moderate', 'Medium', 'libvirt-daemon-config-network', '', 'virt:rhel', 'i686', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:6.0.0-35.module+el8.4.0+10230+7a9b21e4', 'equals', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * libvirt: double free in qemuAgentGetInterfaces () in qemu_agent.c (CVE - 2020 - 25637) * QEMU: heap buffer overflow in msix_table_mmio_write () in hw / pci / msix.c (CVE - 2020 - 27821) * QEMU: ide: atapi: OOB access while processing read commands (CVE - 2020 - 29443) * QEMU: heap buffer overflow in iscsi_aio_ioctl_cb () in block / iscsi.c may lead to information disclosure (CVE - 2020 - 11947) * QEMU: reachable assertion failure in net_tx_pkt_add_raw_fragment () in hw / net / net_tx_pkt.c (CVE - 2020 - 16092) * QEMU: infinite loop in e1000e_write_packet_to_guest () in hw / net / e1000e_core.c (CVE - 2020 - 25707) * QEMU: assertion failure through usb_packet_unmap () in hw / usb / hcd - ehci.c (CVE - 2020 - 25723) * QEMU: e1000e: infinite loop scenario in case of null packet descriptor (CVE - 2020 - 28916) * QEMU: slirp: out - of - bounds access while processing ARP / NCSI packets (CVE - 2020 - 29129, CVE - 2020 - 29130) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 10:02:57 Duration: 553ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xac7a7c25c2757746dd435246ab1ca992', 'RHSA-2021:1762: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section.', '2021-05-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1762 https://access.redhat.com/security/cve/CVE-2020-11947 https://access.redhat.com/security/cve/CVE-2020-16092 https://access.redhat.com/security/cve/CVE-2020-25637 https://access.redhat.com/security/cve/CVE-2020-25707 https://access.redhat.com/security/cve/CVE-2020-25723 https://access.redhat.com/security/cve/CVE-2020-27821 https://access.redhat.com/security/cve/CVE-2020-28916 https://access.redhat.com/security/cve/CVE-2020-29129 https://access.redhat.com/security/cve/CVE-2020-29130 https://access.redhat.com/security/cve/CVE-2020-29443', 'Moderate', 'Medium', 'nbdkit-basic-filters', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:1.16.2-4.module+el8.3.0+6922+fd575af8', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * libvirt: double free in qemuAgentGetInterfaces () in qemu_agent.c (CVE - 2020 - 25637) * QEMU: heap buffer overflow in msix_table_mmio_write () in hw / pci / msix.c (CVE - 2020 - 27821) * QEMU: ide: atapi: OOB access while processing read commands (CVE - 2020 - 29443) * QEMU: heap buffer overflow in iscsi_aio_ioctl_cb () in block / iscsi.c may lead to information disclosure (CVE - 2020 - 11947) * QEMU: reachable assertion failure in net_tx_pkt_add_raw_fragment () in hw / net / net_tx_pkt.c (CVE - 2020 - 16092) * QEMU: infinite loop in e1000e_write_packet_to_guest () in hw / net / e1000e_core.c (CVE - 2020 - 25707) * QEMU: assertion failure through usb_packet_unmap () in hw / usb / hcd - ehci.c (CVE - 2020 - 25723) * QEMU: e1000e: infinite loop scenario in case of null packet descriptor (CVE - 2020 - 28916) * QEMU: slirp: out - of - bounds access while processing ARP / NCSI packets (CVE - 2020 - 29129, CVE - 2020 - 29130) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 09:59:35 Duration: 551ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x4a0792490d56f12e52b2119a8bb34c7d', 'RHSA-2021:1762: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section.', '2021-05-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1762 https://access.redhat.com/security/cve/CVE-2020-11947 https://access.redhat.com/security/cve/CVE-2020-16092 https://access.redhat.com/security/cve/CVE-2020-25637 https://access.redhat.com/security/cve/CVE-2020-25707 https://access.redhat.com/security/cve/CVE-2020-25723 https://access.redhat.com/security/cve/CVE-2020-27821 https://access.redhat.com/security/cve/CVE-2020-28916 https://access.redhat.com/security/cve/CVE-2020-29129 https://access.redhat.com/security/cve/CVE-2020-29130 https://access.redhat.com/security/cve/CVE-2020-29443', 'Moderate', 'Medium', 'libiscsi', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '0:1.18.0-8.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * libvirt: double free in qemuAgentGetInterfaces () in qemu_agent.c (CVE - 2020 - 25637) * QEMU: heap buffer overflow in msix_table_mmio_write () in hw / pci / msix.c (CVE - 2020 - 27821) * QEMU: ide: atapi: OOB access while processing read commands (CVE - 2020 - 29443) * QEMU: heap buffer overflow in iscsi_aio_ioctl_cb () in block / iscsi.c may lead to information disclosure (CVE - 2020 - 11947) * QEMU: reachable assertion failure in net_tx_pkt_add_raw_fragment () in hw / net / net_tx_pkt.c (CVE - 2020 - 16092) * QEMU: infinite loop in e1000e_write_packet_to_guest () in hw / net / e1000e_core.c (CVE - 2020 - 25707) * QEMU: assertion failure through usb_packet_unmap () in hw / usb / hcd - ehci.c (CVE - 2020 - 25723) * QEMU: e1000e: infinite loop scenario in case of null packet descriptor (CVE - 2020 - 28916) * QEMU: slirp: out - of - bounds access while processing ARP / NCSI packets (CVE - 2020 - 29129, CVE - 2020 - 29130) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 10:01:31 Duration: 545ms Bind query: yes
15 27s630ms 25,388 0ms 1s404ms 1ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing; security fix (es) : * glibc: getaddrinfo should reject ip addresses with trailing characters ( cve - 2016 - 10739) for more details about the security issue (s), including the impact, a cvss score, acknowledgments, and other related information, refer to the cve page (s) listed in the references section. additional changes:;Times Reported Time consuming queries #15
Day Hour Count Duration Avg duration Jul 05 05 19,743 20s966ms 1ms 06 5,645 6s664ms 1ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x2d161b50368d909c0a18b66e752c6695', 'RHSA-2019:3513: glibc security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3513 https://access.redhat.com/security/cve/CVE-2016-10739', 'Moderate', 'Medium', 'glibc-langpack-the', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::highavailability', 'rhel-cpe-repository', '', '0:2.28-72.el8', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * glibc: getaddrinfo should reject IP addresses with trailing characters ( CVE - 2016 - 10739) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 09:57:36 Duration: 1s404ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x11a47b9276ff912aa748ad465e4cf810', 'RHSA-2019:3513: glibc security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.4-aus', 'The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3513 https://access.redhat.com/security/cve/CVE-2016-10739', 'Moderate', 'Medium', 'glibc-langpack-el', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.4', 'rhel-cpe-repository', '', '0:2.28-72.el8', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * glibc: getaddrinfo should reject IP addresses with trailing characters ( CVE - 2016 - 10739) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 09:59:19 Duration: 706ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xf49f55e56f55e3b88cca5c83f5599d74', 'RHSA-2019:3513: glibc security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3513 https://access.redhat.com/security/cve/CVE-2016-10739', 'Moderate', 'Medium', 'glibc-langpack-nhn', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::supplementary', 'rhel-cpe-repository', '', '0:2.28-72.el8', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * glibc: getaddrinfo should reject IP addresses with trailing characters ( CVE - 2016 - 10739) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 09:57:34 Duration: 589ms Bind query: yes
16 27s321ms 26,208 0ms 598ms 1ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing; security fix (es) : * qemu: regression of cve - 2020 - 10756 fix in virt:rhel / qemu - kvm in red hat enterprise linux ?.? (cve - 2021 - 20295);Times Reported Time consuming queries #16
Day Hour Count Duration Avg duration Jul 05 05 5,304 3s947ms 0ms 06 20,904 23s374ms 1ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x81e76d4e1470215277c655e85f408a75', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'libvirt-daemon-kvm', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::sap_hana', 'rhel-cpe-repository', '', '0:6.0.0-28.1.module+el8.3.0+10448+0c705bc6', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: Regression of CVE - 2020 - 10756 fix in virt:rhel / qemu - kvm in Red Hat Enterprise Linux 8.3 (CVE - 2021 - 20295);
Date: 2023-07-05 10:02:01 Duration: 598ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x30b5c86ac55786758904b45ff783bba0', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.4-e4s', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'python3-libnbd', '', 'virt-devel:rhel', 'i686', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.4', 'rhel-cpe-repository', '', '0:1.2.2-1.module+el8.3.0+7353+9de0a3cc', 'equals', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: Regression of CVE - 2020 - 10756 fix in virt:rhel / qemu - kvm in Red Hat Enterprise Linux 8.3 (CVE - 2021 - 20295);
Date: 2023-07-05 10:02:57 Duration: 540ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x754a8d4019e6f0cd25c1659d6a4f8ea8', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'libvirt-daemon-driver-storage-mpath', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:6.0.0-28.1.module+el8.3.0+10448+0c705bc6', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: Regression of CVE - 2020 - 10756 fix in virt:rhel / qemu - kvm in Red Hat Enterprise Linux 8.3 (CVE - 2021 - 20295);
Date: 2023-07-05 10:01:08 Duration: 531ms Bind query: yes
17 26s626ms 34,565 0ms 643ms 0ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing; security fix (es) : * texlive: arbitrary code execution allows document complied with older version( cve - 2023 - 32700);Times Reported Time consuming queries #17
Day Hour Count Duration Avg duration Jul 05 05 11,526 8s147ms 0ms 06 23,039 18s479ms 0ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xc67be2ef909848071d545a94f9ece08c', 'RHSA-2023:3661: texlive security update (Important)', 'RHEL8-rhel-8.1-e4s', 'The texlive packages contain TeXLive, an implementation of TeX for Linux or UNIX systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-06-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:3661 https://access.redhat.com/security/cve/CVE-2023-32700', 'Important', 'High', 'texlive-changebar', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.1::highavailability', 'rhel-cpe-repository', '', '7:20180414-15.el8_1', 'invalid', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * texlive: arbitrary code execution allows document complied with older version( CVE - 2023 - 32700);
Date: 2023-07-05 10:01:17 Duration: 643ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xeaeaf38af76d730665313a507440f451', 'RHSA-2023:3661: texlive security update (Important)', 'RHEL9-rhel-9.0-eus', 'The texlive packages contain TeXLive, an implementation of TeX for Linux or UNIX systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-06-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:3661 https://access.redhat.com/security/cve/CVE-2023-32700', 'Important', 'High', 'texlive-collection-latex', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_eus:9.0::sap_hana', 'rhel-cpe-repository', '', '9:20200406-26.el9_0', 'invalid', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * texlive: arbitrary code execution allows document complied with older version( CVE - 2023 - 32700);
Date: 2023-07-05 10:02:21 Duration: 567ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xaad9269f34d2d5b561e3fbba4be0241d', 'RHSA-2023:3661: texlive security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The texlive packages contain TeXLive, an implementation of TeX for Linux or UNIX systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-06-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:3661 https://access.redhat.com/security/cve/CVE-2023-32700', 'Important', 'High', 'texlive-ntgclass', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '7:20180414-29.el8_8', 'invalid', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * texlive: arbitrary code execution allows document complied with older version( CVE - 2023 - 32700);
Date: 2023-07-05 10:02:21 Duration: 567ms Bind query: yes
18 25s511ms 33,558 0ms 754ms 0ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing; security fix (es) : * ntfs - 3g: heap - based buffer overflow leads to local root privilege escalation (cve - 2019 - 9755) * qemu: slirp: information leakage in tcp_emu () due to uninitialized stack variables (cve - 2019 - 9824) * qemu: qxl: null pointer dereference while releasing spice resources (cve - 2019 - 12155) for more details about the security issue (s), including the impact, a cvss score, acknowledgments, and other related information, refer to the cve page (s) listed in the references section. additional changes:;Times Reported Time consuming queries #18
Day Hour Count Duration Avg duration Jul 05 05 26,226 17s328ms 0ms 06 7,332 8s183ms 1ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x9290fccdd66356e8f6014a591086b79e', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.4-aus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libvirt-daemon-config-network', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.4::appstream', 'rhel-cpe-repository', '', '0:4.5.0-35.module+el8.1.0+4227+b2722cb3', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * ntfs - 3g: heap - based buffer overflow leads to local root privilege escalation (CVE - 2019 - 9755) * QEMU: slirp: information leakage in tcp_emu () due to uninitialized stack variables (CVE - 2019 - 9824) * QEMU: qxl: null pointer dereference while releasing spice resources (CVE - 2019 - 12155) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 09:59:14 Duration: 754ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x49b42d8ae3963d9948160455fd0b5112', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.4-aus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'hivex-devel', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.4::baseos', 'rhel-cpe-repository', '', '0:1.3.15-7.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * ntfs - 3g: heap - based buffer overflow leads to local root privilege escalation (CVE - 2019 - 9755) * QEMU: slirp: information leakage in tcp_emu () due to uninitialized stack variables (CVE - 2019 - 9824) * QEMU: qxl: null pointer dereference while releasing spice resources (CVE - 2019 - 12155) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 09:59:12 Duration: 686ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x26df034c43f63073ce880a4509119ff2', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.2-tus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libvirt-daemon-driver-nwfilter', '', 'virt-devel:rhel', 'i686', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:4.5.0-35.module+el8.1.0+4227+b2722cb3', 'equals', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * ntfs - 3g: heap - based buffer overflow leads to local root privilege escalation (CVE - 2019 - 9755) * QEMU: slirp: information leakage in tcp_emu () due to uninitialized stack variables (CVE - 2019 - 9824) * QEMU: qxl: null pointer dereference while releasing spice resources (CVE - 2019 - 12155) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 09:54:53 Duration: 586ms Bind query: yes
19 23s117ms 24,021 0ms 617ms 0ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing; security fix (es) : * qemu: msix: oob access during mmio operations may lead to dos (cve - 2020 - 13754) * hivex: buffer overflow when provided invalid node key length(cve - 2021 - 3504) * qemu: net: an assert failure via eth_get_gso_type (cve - 2020 - 27617) * qemu: net: infinite loop in loopback mode may lead to stack overflow (cve - 2021 - 3416) * qemu: out - of - bound heap buffer access via an interrupt id field (cve - 2021 - 20221) for more details about the security issue (s), including the impact, a cvss score, acknowledgments, and other related information, refer to the cve page (s) listed in the references section. bug fix (es) : * cannot restart default network and firewalld: iptables: no chain / target / match by that name. (bz # ?);Times Reported Time consuming queries #19
Day Hour Count Duration Avg duration Jul 05 05 5,304 4s661ms 0ms 06 18,717 18s456ms 0ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x78b9db9d5221d3f982235e235d749146', 'RHSA-2021:3061: virt:rhel and virt-devel:rhel security and bug fix update (Moderate)', 'RHEL8-rhel-8.6-tus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. * RHEL8.4 Nightly[0322] - KVM guest fails to find zipl boot menu index (qemu-kvm) (BZ#1975679)', '2021-08-10 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:3061 https://access.redhat.com/security/cve/CVE-2020-13754 https://access.redhat.com/security/cve/CVE-2020-27617 https://access.redhat.com/security/cve/CVE-2021-20221 https://access.redhat.com/security/cve/CVE-2021-3416 https://access.redhat.com/security/cve/CVE-2021-3504', 'Moderate', 'Medium', 'nbdkit-basic-filters', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.6::highavailability', 'rhel-cpe-repository', '', '0:1.16.2-4.module+el8.3.0+6922+fd575af8', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: msix: OOB access during mmio operations may lead to DoS (CVE - 2020 - 13754) * hivex: Buffer overflow when provided invalid node key length(CVE - 2021 - 3504) * QEMU: net: an assert failure via eth_get_gso_type (CVE - 2020 - 27617) * QEMU: net: infinite loop in loopback mode may lead to stack overflow (CVE - 2021 - 3416) * qemu: out - of - bound heap buffer access via an interrupt ID field (CVE - 2021 - 20221) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Bug Fix (es) : * cannot restart default network and firewalld: iptables: No chain / target / match by that name. (BZ # 1958301);
Date: 2023-07-05 09:55:50 Duration: 617ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xc4504485b989a71506621c6008052b68', 'RHSA-2021:3061: virt:rhel and virt-devel:rhel security and bug fix update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. * RHEL8.4 Nightly[0322] - KVM guest fails to find zipl boot menu index (qemu-kvm) (BZ#1975679)', '2021-08-10 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:3061 https://access.redhat.com/security/cve/CVE-2020-13754 https://access.redhat.com/security/cve/CVE-2020-27617 https://access.redhat.com/security/cve/CVE-2021-20221 https://access.redhat.com/security/cve/CVE-2021-3416 https://access.redhat.com/security/cve/CVE-2021-3504', 'Moderate', 'Medium', 'libguestfs-tools-c', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '1:1.40.2-27.module+el8.4.0+9282+0bdec052', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: msix: OOB access during mmio operations may lead to DoS (CVE - 2020 - 13754) * hivex: Buffer overflow when provided invalid node key length(CVE - 2021 - 3504) * QEMU: net: an assert failure via eth_get_gso_type (CVE - 2020 - 27617) * QEMU: net: infinite loop in loopback mode may lead to stack overflow (CVE - 2021 - 3416) * qemu: out - of - bound heap buffer access via an interrupt ID field (CVE - 2021 - 20221) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Bug Fix (es) : * cannot restart default network and firewalld: iptables: No chain / target / match by that name. (BZ # 1958301);
Date: 2023-07-05 10:02:01 Duration: 599ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xa649ebaf024befa33e00064ad64d3e75', 'RHSA-2021:3061: virt:rhel and virt-devel:rhel security and bug fix update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. * RHEL8.4 Nightly[0322] - KVM guest fails to find zipl boot menu index (qemu-kvm) (BZ#1975679)', '2021-08-10 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:3061 https://access.redhat.com/security/cve/CVE-2020-13754 https://access.redhat.com/security/cve/CVE-2020-27617 https://access.redhat.com/security/cve/CVE-2021-20221 https://access.redhat.com/security/cve/CVE-2021-3416 https://access.redhat.com/security/cve/CVE-2021-3504', 'Moderate', 'Medium', 'libvirt-devel', '', 'virt-devel:rhel', 'i686', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '0:6.0.0-35.1.module+el8.4.0+11273+64eb94ef', 'equals', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: msix: OOB access during mmio operations may lead to DoS (CVE - 2020 - 13754) * hivex: Buffer overflow when provided invalid node key length(CVE - 2021 - 3504) * QEMU: net: an assert failure via eth_get_gso_type (CVE - 2020 - 27617) * QEMU: net: infinite loop in loopback mode may lead to stack overflow (CVE - 2021 - 3416) * qemu: out - of - bound heap buffer access via an interrupt ID field (CVE - 2021 - 20221) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Bug Fix (es) : * cannot restart default network and firewalld: iptables: No chain / target / match by that name. (BZ # 1958301);
Date: 2023-07-05 10:02:06 Duration: 545ms Bind query: yes
20 22s381ms 1,214 0ms 681ms 18ms insert into updater_status (updater_name, last_attempt, last_success, last_run_succeeded, last_attempt_fingerprint) values (?, ?, ?, ?, ?) on conflict (updater_name) do update set last_attempt = ?, last_success = ?, last_run_succeeded = ?, last_attempt_fingerprint = ? returning updater_name;Times Reported Time consuming queries #20
Day Hour Count Duration Avg duration Jul 05 05 344 3s91ms 8ms 06 870 19s289ms 22ms -
INSERT INTO updater_status (updater_name, last_attempt, last_success, last_run_succeeded, last_attempt_fingerprint) VALUES ('RHEL6-satellite-tools-6.5', '2023-07-05 09:57:36.481558+00', $2, 'true', '{"Etag":"\"107e5a13cc5ee94592961e7c3e7681b6\"","Date":"Sat, 01 Jul 2023 07:33:35 GMT"}') ON CONFLICT (updater_name) DO UPDATE SET last_attempt = $2, last_success = $2, last_run_succeeded = 'true', last_attempt_fingerprint = $3 RETURNING updater_name;
Date: 2023-07-05 09:57:37 Duration: 681ms Bind query: yes
-
INSERT INTO updater_status (updater_name, last_attempt, last_success, last_run_succeeded, last_attempt_fingerprint) VALUES ('RHEL5-satellite-tools-6.4', '2023-07-05 09:57:35.757363+00', $2, 'true', '{"Etag":"\"17ec50ac81a29140a2a8f7d0eae668bb\"","Date":"Sat, 01 Jul 2023 07:35:43 GMT"}') ON CONFLICT (updater_name) DO UPDATE SET last_attempt = $2, last_success = $2, last_run_succeeded = 'true', last_attempt_fingerprint = $3 RETURNING updater_name;
Date: 2023-07-05 09:57:36 Duration: 584ms Bind query: yes
-
INSERT INTO updater_status (updater_name, last_attempt, last_success, last_run_succeeded, last_attempt_fingerprint) VALUES ('RHEL7-storage-ceph-3', '2023-07-05 10:01:43.062895+00', $2, 'true', '{"Etag":"\"56f608f0f7a03aa81be4716c81b1eeba\"","Date":"Sat, 01 Jul 2023 10:19:19 GMT"}') ON CONFLICT (updater_name) DO UPDATE SET last_attempt = $2, last_success = $2, last_run_succeeded = 'true', last_attempt_fingerprint = $3 RETURNING updater_name;
Date: 2023-07-05 10:01:43 Duration: 574ms Bind query: yes
Most frequent queries (N)
Rank Times executed Total duration Min duration Max duration Avg duration Query 1 5,639,953 1h3m16s 0ms 5s688ms 0ms insert into uo_vuln (uo, vuln) values (?, ( select id from vuln where hash_kind = ? and hash = ?)) on conflict do nothing;Times Reported Time consuming queries #1
Day Hour Count Duration Avg duration Jul 05 05 3,331,843 29m44s 0ms 06 2,308,110 33m31s 0ms -
INSERT INTO uo_vuln (uo, vuln) VALUES ('116', ( SELECT id FROM vuln WHERE hash_kind = 'md5' AND hash = '\xd272d49019a19ad51c9d97dcc75e80f9')) ON CONFLICT DO NOTHING;
Date: 2023-07-05 10:04:12 Duration: 5s688ms Bind query: yes
-
INSERT INTO uo_vuln (uo, vuln) VALUES ('183', ( SELECT id FROM vuln WHERE hash_kind = 'md5' AND hash = '\xb901bd34a5fb6e05fe1d78a5c6a7f7da')) ON CONFLICT DO NOTHING;
Date: 2023-07-05 10:04:12 Duration: 5s688ms Bind query: yes
-
INSERT INTO uo_vuln (uo, vuln) VALUES ('380', ( SELECT id FROM vuln WHERE hash_kind = 'md5' AND hash = '\xf17d15db9d96a5284af2bc0a1880978b')) ON CONFLICT DO NOTHING;
Date: 2023-07-05 10:04:12 Duration: 5s688ms Bind query: yes
2 1,327,762 12m45s 0ms 5s609ms 0ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing;Times Reported Time consuming queries #2
Day Hour Count Duration Avg duration Jul 05 05 1,015,092 8m15s 0ms 06 312,670 4m30s 0ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xbcfee516205e72f565bb07b23bfe59bf', 'CVE-2020-27757 imagemagick', 'debian/updater/buster', 'A floating point math calculation in ScaleAnyToQuantum() of /MagickCore/quantum-private.h could lead to undefined behavior in the form of a value outside the range of type unsigned long long. The flaw could be triggered by a crafted input file under certain conditions when it is processed by ImageMagick. Red Hat Product Security marked this as Low because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to 7.0.8-68.', '0001-01-01 00:00:00+00', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757', '', 'Unknown', 'imagemagick-common', '', '', '', 'binary', 'debian', 'Debian GNU/Linux', '10 (buster)', 'buster', '10', '', '', 'Debian GNU/Linux 10 (buster)', '', '', '', '8:6.9.10.23+dfsg-2.1+deb10u2', 'invalid', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING;
Date: 2023-07-05 10:04:12 Duration: 5s609ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xf226c542787ee5973c683c07cd61d82b', 'CVE-2017-10684 ncurses', 'debian/updater/buster', 'In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.', '0001-01-01 00:00:00+00', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10684', '', 'Unknown', 'ncurses-examples', '', '', '', 'binary', 'debian', 'Debian GNU/Linux', '10 (buster)', 'buster', '10', '', '', 'Debian GNU/Linux 10 (buster)', '', '', '', '0:6.0+20170708-1', 'invalid', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING;
Date: 2023-07-05 09:57:59 Duration: 2s443ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x3069389c9744fabdf56d6377c77ae4ae', 'CVE-2022-34676 on Ubuntu 18.04 LTS (bionic) - medium.', 'ubuntu/updater/bionic', 'NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer handler, where an out-of-bounds read may lead to denial of service, information disclosure, or data tampering.', '0001-01-01 00:00:00+00', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34676', '', 'Medium', 'nvidia-driver-440', '', '', '', 'binary', 'ubuntu', 'Ubuntu', '18.04 (Bionic)', 'bionic', '18.04', '', '', 'Ubuntu 18.04', '', '', '', '', 'invalid', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING;
Date: 2023-07-05 09:57:59 Duration: 2s443ms Bind query: yes
3 212,191 1m38s 0ms 5s609ms 0ms insert into uo_enrich (enrich, updater, uo, date) values (( select id from enrichment where hash_kind = ? and hash = ? and updater = ?), ?, ?, transaction_timestamp()) on conflict do nothing;Times Reported Time consuming queries #3
Day Hour Count Duration Avg duration Jul 05 05 132,435 46s749ms 0ms 06 79,756 52s73ms 0ms -
INSERT INTO uo_enrich (enrich, updater, uo, date) VALUES (( SELECT id FROM enrichment WHERE hash_kind = 'md5' AND hash = '\x59b94d41f1bdf7e8b4fbaed047bc48c3' AND updater = 'clair.cvss'), $3, '446', transaction_timestamp()) ON CONFLICT DO NOTHING;
Date: 2023-07-05 10:04:12 Duration: 5s609ms Bind query: yes
-
INSERT INTO uo_enrich (enrich, updater, uo, date) VALUES (( SELECT id FROM enrichment WHERE hash_kind = 'md5' AND hash = '\xf47b2c356fc6cb5166c1389bb79e2468' AND updater = 'clair.cvss'), $3, '132', transaction_timestamp()) ON CONFLICT DO NOTHING;
Date: 2023-07-05 09:57:36 Duration: 1s403ms Bind query: yes
-
INSERT INTO uo_enrich (enrich, updater, uo, date) VALUES (( SELECT id FROM enrichment WHERE hash_kind = 'md5' AND hash = '\xa1a2c1196bb46285b0c6cbef73da2140' AND updater = 'clair.cvss'), $3, '132', transaction_timestamp()) ON CONFLICT DO NOTHING;
Date: 2023-07-05 09:56:19 Duration: 954ms Bind query: yes
4 212,190 48s937ms 0ms 2s442ms 0ms insert into enrichment (hash_kind, hash, updater, tags, data) values (?, ?, ?, ?, ?) on conflict (hash_kind, hash) do nothing;Times Reported Time consuming queries #4
Day Hour Count Duration Avg duration Jul 05 05 132,432 45s356ms 0ms 06 79,758 3s580ms 0ms -
INSERT INTO enrichment (hash_kind, hash, updater, tags, data) VALUES ('md5', '\xfb63662a2f1d7fa83678151079720119', 'clair.cvss', '{CVE-2023-1473}', '{"scope": "CHANGED", "version": "3.1", "baseScore": 6.1, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "integrityImpact": "LOW", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "LOW"}') ON CONFLICT (hash_kind, hash) DO NOTHING;
Date: 2023-07-05 09:57:59 Duration: 2s442ms Bind query: yes
-
INSERT INTO enrichment (hash_kind, hash, updater, tags, data) VALUES ('md5', '\x720b6d966a38af8ed12fa2d28936094f', 'clair.cvss', '{CVE-2021-37184}', '{"scope": "UNCHANGED", "version": "3.1", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}') ON CONFLICT (hash_kind, hash) DO NOTHING;
Date: 2023-07-05 09:57:04 Duration: 1s842ms Bind query: yes
-
INSERT INTO enrichment (hash_kind, hash, updater, tags, data) VALUES ('md5', '\x64ce6c40cfa70dcfcd4f30a864c52cd5', 'clair.cvss', '{CVE-2017-18905}', '{"scope": "UNCHANGED", "version": "3.1", "baseScore": 5.3, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "integrityImpact": "LOW", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}') ON CONFLICT (hash_kind, hash) DO NOTHING;
Date: 2023-07-05 09:55:36 Duration: 582ms Bind query: yes
5 38,837 38s237ms 0ms 2s443ms 0ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing; security fix (es) : * hw: tsx transaction asynchronous abort (taa) (cve - 2019 - 11135);Times Reported Time consuming queries #5
Day Hour Count Duration Avg duration Jul 05 05 25,892 25s890ms 0ms 06 12,945 12s347ms 0ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x48d59293108970ea766a305eec31632d', 'RHSA-2020:0279: virt:rhel security update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2020-01-29 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:0279 https://access.redhat.com/security/cve/CVE-2019-11135', 'Moderate', 'Medium', 'libvirt-daemon', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::sap_hana', 'rhel-cpe-repository', '', '0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * hw: TSX Transaction Asynchronous Abort (TAA) (CVE - 2019 - 11135);
Date: 2023-07-05 09:57:59 Duration: 2s443ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x9ee761856622187e49c7b19236c4e98b', 'RHSA-2020:0279: virt:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2020-01-29 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:0279 https://access.redhat.com/security/cve/CVE-2019-11135', 'Moderate', 'Medium', 'libvirt-daemon-driver-interface', '', 'virt-devel:rhel', 'i686', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::resilientstorage', 'rhel-cpe-repository', '', '0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730', 'equals', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * hw: TSX Transaction Asynchronous Abort (TAA) (CVE - 2019 - 11135);
Date: 2023-07-05 09:59:11 Duration: 1s168ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xa9a4674d16fb7f661686d48f428051f2', 'RHSA-2020:0279: virt:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2020-01-29 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:0279 https://access.redhat.com/security/cve/CVE-2019-11135', 'Moderate', 'Medium', 'libvirt-daemon-driver-storage-scsi', '', 'virt:rhel', 'i686', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::sap_hana', 'rhel-cpe-repository', '', '0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730', 'equals', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * hw: TSX Transaction Asynchronous Abort (TAA) (CVE - 2019 - 11135);
Date: 2023-07-05 09:59:12 Duration: 686ms Bind query: yes
6 34,565 26s626ms 0ms 643ms 0ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing; security fix (es) : * texlive: arbitrary code execution allows document complied with older version( cve - 2023 - 32700);Times Reported Time consuming queries #6
Day Hour Count Duration Avg duration Jul 05 05 11,526 8s147ms 0ms 06 23,039 18s479ms 0ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xc67be2ef909848071d545a94f9ece08c', 'RHSA-2023:3661: texlive security update (Important)', 'RHEL8-rhel-8.1-e4s', 'The texlive packages contain TeXLive, an implementation of TeX for Linux or UNIX systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-06-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:3661 https://access.redhat.com/security/cve/CVE-2023-32700', 'Important', 'High', 'texlive-changebar', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.1::highavailability', 'rhel-cpe-repository', '', '7:20180414-15.el8_1', 'invalid', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * texlive: arbitrary code execution allows document complied with older version( CVE - 2023 - 32700);
Date: 2023-07-05 10:01:17 Duration: 643ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xeaeaf38af76d730665313a507440f451', 'RHSA-2023:3661: texlive security update (Important)', 'RHEL9-rhel-9.0-eus', 'The texlive packages contain TeXLive, an implementation of TeX for Linux or UNIX systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-06-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:3661 https://access.redhat.com/security/cve/CVE-2023-32700', 'Important', 'High', 'texlive-collection-latex', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_eus:9.0::sap_hana', 'rhel-cpe-repository', '', '9:20200406-26.el9_0', 'invalid', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * texlive: arbitrary code execution allows document complied with older version( CVE - 2023 - 32700);
Date: 2023-07-05 10:02:21 Duration: 567ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xaad9269f34d2d5b561e3fbba4be0241d', 'RHSA-2023:3661: texlive security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The texlive packages contain TeXLive, an implementation of TeX for Linux or UNIX systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-06-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:3661 https://access.redhat.com/security/cve/CVE-2023-32700', 'Important', 'High', 'texlive-ntgclass', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '7:20180414-29.el8_8', 'invalid', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * texlive: arbitrary code execution allows document complied with older version( CVE - 2023 - 32700);
Date: 2023-07-05 10:02:21 Duration: 567ms Bind query: yes
7 33,558 25s511ms 0ms 754ms 0ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing; security fix (es) : * ntfs - 3g: heap - based buffer overflow leads to local root privilege escalation (cve - 2019 - 9755) * qemu: slirp: information leakage in tcp_emu () due to uninitialized stack variables (cve - 2019 - 9824) * qemu: qxl: null pointer dereference while releasing spice resources (cve - 2019 - 12155) for more details about the security issue (s), including the impact, a cvss score, acknowledgments, and other related information, refer to the cve page (s) listed in the references section. additional changes:;Times Reported Time consuming queries #7
Day Hour Count Duration Avg duration Jul 05 05 26,226 17s328ms 0ms 06 7,332 8s183ms 1ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x9290fccdd66356e8f6014a591086b79e', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.4-aus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libvirt-daemon-config-network', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.4::appstream', 'rhel-cpe-repository', '', '0:4.5.0-35.module+el8.1.0+4227+b2722cb3', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * ntfs - 3g: heap - based buffer overflow leads to local root privilege escalation (CVE - 2019 - 9755) * QEMU: slirp: information leakage in tcp_emu () due to uninitialized stack variables (CVE - 2019 - 9824) * QEMU: qxl: null pointer dereference while releasing spice resources (CVE - 2019 - 12155) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 09:59:14 Duration: 754ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x49b42d8ae3963d9948160455fd0b5112', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.4-aus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'hivex-devel', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.4::baseos', 'rhel-cpe-repository', '', '0:1.3.15-7.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * ntfs - 3g: heap - based buffer overflow leads to local root privilege escalation (CVE - 2019 - 9755) * QEMU: slirp: information leakage in tcp_emu () due to uninitialized stack variables (CVE - 2019 - 9824) * QEMU: qxl: null pointer dereference while releasing spice resources (CVE - 2019 - 12155) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 09:59:12 Duration: 686ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x26df034c43f63073ce880a4509119ff2', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.2-tus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libvirt-daemon-driver-nwfilter', '', 'virt-devel:rhel', 'i686', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:4.5.0-35.module+el8.1.0+4227+b2722cb3', 'equals', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * ntfs - 3g: heap - based buffer overflow leads to local root privilege escalation (CVE - 2019 - 9755) * QEMU: slirp: information leakage in tcp_emu () due to uninitialized stack variables (CVE - 2019 - 9824) * QEMU: qxl: null pointer dereference while releasing spice resources (CVE - 2019 - 12155) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 09:54:53 Duration: 586ms Bind query: yes
8 33,555 35s566ms 0ms 1s53ms 1ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing; security fix (es) : * qemu: block: iscsi: oob heap access via an unexpected response of iscsi server (cve - 2020 - 1711) * qemu: slirp: oob buffer access while emulating tcp protocols in tcp_emu () (cve - 2020 - 7039) for more details about the security issue (s), including the impact, a cvss score, acknowledgments, and other related information, refer to the cve page (s) listed in the references section. bug fix (es) :;Times Reported Time consuming queries #8
Day Hour Count Duration Avg duration Jul 05 05 22,495 23s 1ms 06 11,060 12s566ms 1ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x738dc3569d17777506c0bc063df880d7', 'RHSA-2020:1358: virt:rhel security and bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. * libvirtd: error : virCPUx86UpdateLive:3110 : operation failed: guest CPU doesn''t match specification: missing features: fxsr_opt (BZ#1809510)', '2020-04-07 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:1358 https://access.redhat.com/security/cve/CVE-2020-1711 https://access.redhat.com/security/cve/CVE-2020-7039', 'Important', 'High', 'qemu-kvm-block-iscsi', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '15:2.12.0-88.module+el8.1.0+5708+85d8e057.3', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server (CVE - 2020 - 1711) * QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu () (CVE - 2020 - 7039) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Bug Fix (es) :;
Date: 2023-07-05 09:55:13 Duration: 1s53ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x18e3e4b33254bac7a55a4202c7bdf2e9', 'RHSA-2020:1358: virt:rhel security and bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. * libvirtd: error : virCPUx86UpdateLive:3110 : operation failed: guest CPU doesn''t match specification: missing features: fxsr_opt (BZ#1809510)', '2020-04-07 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:1358 https://access.redhat.com/security/cve/CVE-2020-1711 https://access.redhat.com/security/cve/CVE-2020-7039', 'Important', 'High', 'nbdkit-bash-completion', '', 'virt:rhel', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.4.2-5.module+el8.1.0+4066+0f1aadab', 'invalid', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server (CVE - 2020 - 1711) * QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu () (CVE - 2020 - 7039) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Bug Fix (es) :;
Date: 2023-07-05 09:56:19 Duration: 954ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x7260d22dffce660e21b0fdfae436e562', 'RHSA-2020:1358: virt:rhel security and bug fix update (Important)', 'RHEL8-rhel-8.8-tus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. * libvirtd: error : virCPUx86UpdateLive:3110 : operation failed: guest CPU doesn''t match specification: missing features: fxsr_opt (BZ#1809510)', '2020-04-07 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:1358 https://access.redhat.com/security/cve/CVE-2020-1711 https://access.redhat.com/security/cve/CVE-2020-7039', 'Important', 'High', 'hivex', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.3.15-7.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server (CVE - 2020 - 1711) * QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu () (CVE - 2020 - 7039) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Bug Fix (es) :;
Date: 2023-07-05 09:59:14 Duration: 754ms Bind query: yes
9 29,543 32s539ms 0ms 5s683ms 1ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing; security fix (es) : * qemu: virtiofsd: potential privileged host device access from guest (cve - 2020 - 35517);Times Reported Time consuming queries #9
Day Hour Count Duration Avg duration Jul 05 05 5,303 3s813ms 0ms 06 24,240 28s725ms 1ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x69b11a2b957666b780dbd9b90eb9298c', 'RHSA-2021:0743: virt:8.2 and virt-devel:8.2 security update (Important)', 'RHEL8-advanced-virtualization', 'The Advanced Virtualization module provides the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-03-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0743 https://access.redhat.com/security/cve/CVE-2020-35517', 'Important', 'High', 'qemu-guest-agent', '', 'virt-devel:8.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:advanced_virtualization:8', 'rhel-cpe-repository', '', '15:4.2.0-29.module+el8.2.1+9917+2543143c.7', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: virtiofsd: potential privileged host device access from guest (CVE - 2020 - 35517);
Date: 2023-07-05 10:04:12 Duration: 5s683ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x68cc3ef60c6c68c00d3b2388b2f89445', 'RHSA-2021:0711: virt:rhel and virt-devel:rhel security update (Important)', 'RHEL8-rhel-8.8-e4s', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-03-03 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0711 https://access.redhat.com/security/cve/CVE-2020-35517', 'Important', 'High', 'python3-hivex', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:1.3.18-20.module+el8.3.0+6423+e4cb6418', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: virtiofsd: potential privileged host device access from guest (CVE - 2020 - 35517);
Date: 2023-07-05 09:57:34 Duration: 589ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x1074f1e47bc671d17ba8b052f36a9eb1', 'RHSA-2021:0711: virt:rhel and virt-devel:rhel security update (Important)', 'RHEL8-rhel-8.8-tus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-03-03 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0711 https://access.redhat.com/security/cve/CVE-2020-35517', 'Important', 'High', 'libvirt-daemon-driver-storage-iscsi', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '0:6.0.0-28.module+el8.3.0+7827+5e65edd7', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: virtiofsd: potential privileged host device access from guest (CVE - 2020 - 35517);
Date: 2023-07-05 10:01:02 Duration: 527ms Bind query: yes
10 29,532 4s52ms 0ms 328ms 0ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing;Times Reported Time consuming queries #10
Day Hour Count Duration Avg duration Jul 05 05 14,766 1s912ms 0ms 06 14,766 2s140ms 0ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x59e5f3b7f165037809227e041e9006e9', 'RHSA-2022:0561', 'rhel-container-updater', 'A flaw was found in golang. Extraneous zero characters at the beginning of an IP address octet are not properly considered which could allow an attacker to bypass IP-based access controls. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.', '2022-02-23 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:0561 https://access.redhat.com/security/cve/CVE-2021-29923', 'Low', 'Low', 'openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8', '', '', '', 'binary', '', '', '', '', '', '', '', '', 'Red Hat Container Catalog', '', 'https://catalog.redhat.com/software/containers/explore', 'v4.9.0-202202120107.p0.g9f56afd.assembly.stream', 'invalid', 'rhctag', VersionRange ('{0,0,0,0,0,0,0,0,0,0}', '{4,9,2147483647,0,0,0,0,0,0,0}')) ON CONFLICT (hash_kind, hash) DO NOTHING;
Date: 2023-07-05 10:02:45 Duration: 328ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x3a690ea470735bf9f090af266eb746bb', 'RHSA-2023:3410', 'rhel-container-updater', 'A flaw was found in golang, where not all valid JavaScript white-space characters were considered white space. Due to this issue, templates containing white-space characters outside of the character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that also contain actions may not be properly sanitized during execution.', '2023-06-07 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:3410 https://access.redhat.com/security/cve/CVE-2023-24540', 'Important', 'High', 'openshift4/ose-docker-registry', '', '', '', 'binary', '', '', '', '', '', '', '', '', 'Red Hat Container Catalog', '', 'https://catalog.redhat.com/software/containers/explore', 'v4.12.0-202305270029.p0.g95e39bf.assembly.stream', 'invalid', 'rhctag', VersionRange ('{0,0,0,0,0,0,0,0,0,0}', '{4,12,2147483647,0,0,0,0,0,0,0}')) ON CONFLICT (hash_kind, hash) DO NOTHING;
Date: 2023-07-05 10:03:05 Duration: 79ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xdf1dfef162b43d328f0a7dc2df93b76e', 'RHSA-2022:7399', 'rhel-container-updater', 'A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After the fix, the reverse proxy sanitizes the query parameters in the forwarded query when the outbound request''s form field is set after the reverse proxy. The director function returns, indicating that the proxy has parsed the query parameters. Proxies that do not parse query parameters continue to forward the original query parameters unchanged.', '2023-01-17 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2022:7399 https://access.redhat.com/security/cve/CVE-2022-2880', 'Moderate', 'Medium', 'openshift4/ose-machine-api-provider-azure-rhel8', '', '', '', 'binary', '', '', '', '', '', '', '', '', 'Red Hat Container Catalog', '', 'https://catalog.redhat.com/software/containers/explore', 'v4.12.0-202301042354.p0.gcfb76ac.assembly.stream', 'invalid', 'rhctag', VersionRange ('{4,12,0,0,0,0,0,0,0,0}', '{4,12,2147483647,0,0,0,0,0,0,0}')) ON CONFLICT (hash_kind, hash) DO NOTHING;
Date: 2023-07-05 10:02:52 Duration: 65ms Bind query: yes
11 28,560 30s857ms 0ms 616ms 1ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing; security fix (es) : * qemu: slirp: potential oob access due to unsafe snprintf () usages (cve - 2020 - 8608) * qemu: vnc: memory leakage upon disconnect (cve - 2019 - 20382);Times Reported Time consuming queries #11
Day Hour Count Duration Avg duration Jul 05 05 9,800 6s664ms 0ms 06 18,760 24s192ms 1ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x1045fc7d624a02f9e90975372839776c', 'RHSA-2020:2774: virt:rhel security update (Important)', 'RHEL8-rhel-8.6-tus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2020-06-30 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2774 https://access.redhat.com/security/cve/CVE-2019-20382 https://access.redhat.com/security/cve/CVE-2020-8608', 'Important', 'High', 'qemu-kvm-block-ssh', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.6::realtime', 'rhel-cpe-repository', '', '15:2.12.0-99.module+el8.2.0+6870+55b789b4.2', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: Slirp: potential OOB access due to unsafe snprintf () usages (CVE - 2020 - 8608) * QEMU: vnc: memory leakage upon disconnect (CVE - 2019 - 20382);
Date: 2023-07-05 09:54:49 Duration: 616ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xb915c8fa31f78099d7bd0fd9eba7ab97', 'RHSA-2020:2774: virt:rhel security update (Important)', 'RHEL8-rhel-8', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2020-06-30 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2774 https://access.redhat.com/security/cve/CVE-2019-20382 https://access.redhat.com/security/cve/CVE-2020-8608', 'Important', 'High', 'libvirt-daemon-driver-interface', '', 'virt:rhel', 'i686', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:enterprise_linux:8::supplementary', 'rhel-cpe-repository', '', '0:4.5.0-42.module+el8.2.0+6024+15a2423f', 'equals', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: Slirp: potential OOB access due to unsafe snprintf () usages (CVE - 2020 - 8608) * QEMU: vnc: memory leakage upon disconnect (CVE - 2019 - 20382);
Date: 2023-07-05 10:00:50 Duration: 563ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xd08ea45f9621cb9a7634e60b9215e23d', 'RHSA-2020:2774: virt:rhel security update (Important)', 'RHEL8-rhel-8.8-e4s', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2020-06-30 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2774 https://access.redhat.com/security/cve/CVE-2019-20382 https://access.redhat.com/security/cve/CVE-2020-8608', 'Important', 'High', 'libvirt-daemon-driver-storage', '', 'virt:rhel', 'i686', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:4.5.0-42.module+el8.2.0+6024+15a2423f', 'equals', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: Slirp: potential OOB access due to unsafe snprintf () usages (CVE - 2020 - 8608) * QEMU: vnc: memory leakage upon disconnect (CVE - 2019 - 20382);
Date: 2023-07-05 09:56:42 Duration: 548ms Bind query: yes
12 28,556 32s97ms 0ms 658ms 1ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing; security fix (es) : * qemu: usb: out - of - bounds r / w access issue while processing usb packets (cve - 2020 - 14364) * qemu: slirp: networking out - of - bounds read information disclosure vulnerability (cve - 2020 - 10756);Times Reported Time consuming queries #12
Day Hour Count Duration Avg duration Jul 05 05 6,719 5s109ms 0ms 06 21,837 26s987ms 1ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xe2cea3e7b8a1602d8df3657046ddaec5', 'RHSA-2020:4059: virt:rhel security update (Important)', 'RHEL8-rhel-8.2-e4s', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2020-09-29 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:4059 https://access.redhat.com/security/cve/CVE-2020-10756 https://access.redhat.com/security/cve/CVE-2020-14364', 'Important', 'High', 'nbdkit-plugin-xz', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.2', 'rhel-cpe-repository', '', '0:1.4.2-5.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: usb: out - of - bounds r / w access issue while processing usb packets (CVE - 2020 - 14364) * QEMU: slirp: networking out - of - bounds read information disclosure vulnerability (CVE - 2020 - 10756);
Date: 2023-07-05 10:00:57 Duration: 658ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x247f136372e0b5bb10ef967dc9edc9e2', 'RHSA-2020:4059: virt:rhel security update (Important)', 'RHEL8-rhel-8', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2020-09-29 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:4059 https://access.redhat.com/security/cve/CVE-2020-10756 https://access.redhat.com/security/cve/CVE-2020-14364', 'Important', 'High', 'libguestfs-winsupport', '', 'virt-devel:rhel', 'i686', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:enterprise_linux:8::highavailability', 'rhel-cpe-repository', '', '0:8.0-4.module+el8.1.0+4066+0f1aadab', 'equals', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: usb: out - of - bounds r / w access issue while processing usb packets (CVE - 2020 - 14364) * QEMU: slirp: networking out - of - bounds read information disclosure vulnerability (CVE - 2020 - 10756);
Date: 2023-07-05 10:01:17 Duration: 642ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xfcaf3c3daa48cf952606e58e25342543', 'RHSA-2020:4059: virt:rhel security update (Important)', 'RHEL8-rhel-8.6-e4s', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2020-09-29 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:4059 https://access.redhat.com/security/cve/CVE-2020-10756 https://access.redhat.com/security/cve/CVE-2020-14364', 'Important', 'High', 'libvirt-daemon-kvm', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:4.5.0-42.module+el8.2.0+6024+15a2423f', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: usb: out - of - bounds r / w access issue while processing usb packets (CVE - 2020 - 14364) * QEMU: slirp: networking out - of - bounds read information disclosure vulnerability (CVE - 2020 - 10756);
Date: 2023-07-05 10:01:43 Duration: 605ms Bind query: yes
13 26,208 27s321ms 0ms 598ms 1ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing; security fix (es) : * qemu: regression of cve - 2020 - 10756 fix in virt:rhel / qemu - kvm in red hat enterprise linux ?.? (cve - 2021 - 20295);Times Reported Time consuming queries #13
Day Hour Count Duration Avg duration Jul 05 05 5,304 3s947ms 0ms 06 20,904 23s374ms 1ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x81e76d4e1470215277c655e85f408a75', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'libvirt-daemon-kvm', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::sap_hana', 'rhel-cpe-repository', '', '0:6.0.0-28.1.module+el8.3.0+10448+0c705bc6', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: Regression of CVE - 2020 - 10756 fix in virt:rhel / qemu - kvm in Red Hat Enterprise Linux 8.3 (CVE - 2021 - 20295);
Date: 2023-07-05 10:02:01 Duration: 598ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x30b5c86ac55786758904b45ff783bba0', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.4-e4s', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'python3-libnbd', '', 'virt-devel:rhel', 'i686', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.4', 'rhel-cpe-repository', '', '0:1.2.2-1.module+el8.3.0+7353+9de0a3cc', 'equals', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: Regression of CVE - 2020 - 10756 fix in virt:rhel / qemu - kvm in Red Hat Enterprise Linux 8.3 (CVE - 2021 - 20295);
Date: 2023-07-05 10:02:57 Duration: 540ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x754a8d4019e6f0cd25c1659d6a4f8ea8', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'libvirt-daemon-driver-storage-mpath', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:6.0.0-28.1.module+el8.3.0+10448+0c705bc6', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: Regression of CVE - 2020 - 10756 fix in virt:rhel / qemu - kvm in Red Hat Enterprise Linux 8.3 (CVE - 2021 - 20295);
Date: 2023-07-05 10:01:08 Duration: 531ms Bind query: yes
14 26,207 31s773ms 0ms 601ms 1ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing; the following packages have been upgraded to a later upstream version: hivex (?.?.?), libguestfs (?.?.?), libguestfs - winsupport (?.?), libvirt (?.?.?), libvirt - dbus (?.?.?), libvirt - python (?.?.?), nbdkit (?.?.?), perl - sys - virt (?.?.?), qemu - kvm (?.?.?), seabios (?.?.?), slof (?).(bz # ?, bz # ?) security fix (es) : * libvirt: leak of / dev / mapper / control into qemu guests (cve - 2020 - 14339) * qemu: slirp: use - after - free during packet reassembly (cve - 2019 - 15890) * libvirt: potential dos by holding a monitor job while querying qemu guest - agent (cve - 2019 - 20485) * qemu: slirp: use - after - free in ip_reass () function in ip_input.c (cve - 2020 - 1983) * libvirt: potential denial of service via active pool without target path(cve - 2020 - 10703) * libvirt: leak of sensitive cookie information via dumpxml (cve - 2020 - 14301) for more details about the security issue (s), including the impact, a cvss score, acknowledgments, and other related information, refer to the cve page (s) listed in the references section. additional changes:;Times Reported Time consuming queries #14
Day Hour Count Duration Avg duration Jul 05 05 5,304 5s499ms 1ms 06 20,903 26s274ms 1ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x3be5bbcc2cb3a0a8e295830297032ea3', 'RHSA-2020:4676: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.', '2020-11-04 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:4676 https://access.redhat.com/security/cve/CVE-2019-15890 https://access.redhat.com/security/cve/CVE-2019-20485 https://access.redhat.com/security/cve/CVE-2020-10703 https://access.redhat.com/security/cve/CVE-2020-14301 https://access.redhat.com/security/cve/CVE-2020-14339 https://access.redhat.com/security/cve/CVE-2020-1983', 'Moderate', 'Medium', 'virt-v2v', '', 'virt-devel:rhel', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '1:1.40.2-25.module+el8.3.0+7421+642fe24f', 'equals', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; The following packages have been upgraded to a later upstream version: hivex (1.3.18), libguestfs (1.40.2), libguestfs - winsupport (8.2), libvirt (6.0.0), libvirt - dbus (1.3.0), libvirt - python (6.0.0), nbdkit (1.16.2), perl - Sys - Virt (6.0.0), qemu - kvm (4.2.0), seabios (1.13.0), SLOF (20191022).(BZ # 1810193, BZ # 1844296) Security Fix (es) : * libvirt: leak of / dev / mapper / control into QEMU guests (CVE - 2020 - 14339) * QEMU: Slirp: use - after - free during packet reassembly (CVE - 2019 - 15890) * libvirt: Potential DoS by holding a monitor job while querying QEMU guest - agent (CVE - 2019 - 20485) * QEMU: slirp: use - after - free in ip_reass () function in ip_input.c (CVE - 2020 - 1983) * libvirt: Potential denial of service via active pool without target path(CVE - 2020 - 10703) * libvirt: leak of sensitive cookie information via dumpxml (CVE - 2020 - 14301) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 09:57:16 Duration: 601ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x811c6e94b1472c7953ca2b125f4a4506', 'RHSA-2020:4676: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.4-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.', '2020-11-04 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:4676 https://access.redhat.com/security/cve/CVE-2019-15890 https://access.redhat.com/security/cve/CVE-2019-20485 https://access.redhat.com/security/cve/CVE-2020-10703 https://access.redhat.com/security/cve/CVE-2020-14301 https://access.redhat.com/security/cve/CVE-2020-14339 https://access.redhat.com/security/cve/CVE-2020-1983', 'Moderate', 'Medium', 'qemu-img', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.4::baseos', 'rhel-cpe-repository', '', '15:4.2.0-34.module+el8.3.0+7976+077be4ec', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; The following packages have been upgraded to a later upstream version: hivex (1.3.18), libguestfs (1.40.2), libguestfs - winsupport (8.2), libvirt (6.0.0), libvirt - dbus (1.3.0), libvirt - python (6.0.0), nbdkit (1.16.2), perl - Sys - Virt (6.0.0), qemu - kvm (4.2.0), seabios (1.13.0), SLOF (20191022).(BZ # 1810193, BZ # 1844296) Security Fix (es) : * libvirt: leak of / dev / mapper / control into QEMU guests (CVE - 2020 - 14339) * QEMU: Slirp: use - after - free during packet reassembly (CVE - 2019 - 15890) * libvirt: Potential DoS by holding a monitor job while querying QEMU guest - agent (CVE - 2019 - 20485) * QEMU: slirp: use - after - free in ip_reass () function in ip_input.c (CVE - 2020 - 1983) * libvirt: Potential denial of service via active pool without target path(CVE - 2020 - 10703) * libvirt: leak of sensitive cookie information via dumpxml (CVE - 2020 - 14301) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 10:02:01 Duration: 600ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x51941ddac9af20f336e80313d4379e2f', 'RHSA-2020:4676: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.', '2020-11-04 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:4676 https://access.redhat.com/security/cve/CVE-2019-15890 https://access.redhat.com/security/cve/CVE-2019-20485 https://access.redhat.com/security/cve/CVE-2020-10703 https://access.redhat.com/security/cve/CVE-2020-14301 https://access.redhat.com/security/cve/CVE-2020-14339 https://access.redhat.com/security/cve/CVE-2020-1983', 'Moderate', 'Medium', 'ruby-libguestfs', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:enterprise_linux:8::realtime', 'rhel-cpe-repository', '', '1:1.40.2-25.module+el8.3.0+7421+642fe24f', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; The following packages have been upgraded to a later upstream version: hivex (1.3.18), libguestfs (1.40.2), libguestfs - winsupport (8.2), libvirt (6.0.0), libvirt - dbus (1.3.0), libvirt - python (6.0.0), nbdkit (1.16.2), perl - Sys - Virt (6.0.0), qemu - kvm (4.2.0), seabios (1.13.0), SLOF (20191022).(BZ # 1810193, BZ # 1844296) Security Fix (es) : * libvirt: leak of / dev / mapper / control into QEMU guests (CVE - 2020 - 14339) * QEMU: Slirp: use - after - free during packet reassembly (CVE - 2019 - 15890) * libvirt: Potential DoS by holding a monitor job while querying QEMU guest - agent (CVE - 2019 - 20485) * QEMU: slirp: use - after - free in ip_reass () function in ip_input.c (CVE - 2020 - 1983) * libvirt: Potential denial of service via active pool without target path(CVE - 2020 - 10703) * libvirt: leak of sensitive cookie information via dumpxml (CVE - 2020 - 14301) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 10:02:01 Duration: 598ms Bind query: yes
15 25,615 29s432ms 0ms 553ms 1ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing; security fix (es) : * libvirt: double free in qemuagentgetinterfaces () in qemu_agent.c (cve - 2020 - 25637) * qemu: heap buffer overflow in msix_table_mmio_write () in hw / pci / msix.c (cve - 2020 - 27821) * qemu: ide: atapi: oob access while processing read commands (cve - 2020 - 29443) * qemu: heap buffer overflow in iscsi_aio_ioctl_cb () in block / iscsi.c may lead to information disclosure (cve - 2020 - 11947) * qemu: reachable assertion failure in net_tx_pkt_add_raw_fragment () in hw / net / net_tx_pkt.c (cve - 2020 - 16092) * qemu: infinite loop in e1000e_write_packet_to_guest () in hw / net / e1000e_core.c (cve - 2020 - 25707) * qemu: assertion failure through usb_packet_unmap () in hw / usb / hcd - ehci.c (cve - 2020 - 25723) * qemu: e1000e: infinite loop scenario in case of null packet descriptor (cve - 2020 - 28916) * qemu: slirp: out - of - bounds access while processing arp / ncsi packets (cve - 2020 - 29129, cve - 2020 - 29130) for more details about the security issue (s), including the impact, a cvss score, acknowledgments, and other related information, refer to the cve page (s) listed in the references section. additional changes:;Times Reported Time consuming queries #15
Day Hour Count Duration Avg duration Jul 05 05 5,304 5s695ms 1ms 06 20,311 23s736ms 1ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x19840aefc11d1663741c709cbe9eacca', 'RHSA-2021:1762: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section.', '2021-05-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1762 https://access.redhat.com/security/cve/CVE-2020-11947 https://access.redhat.com/security/cve/CVE-2020-16092 https://access.redhat.com/security/cve/CVE-2020-25637 https://access.redhat.com/security/cve/CVE-2020-25707 https://access.redhat.com/security/cve/CVE-2020-25723 https://access.redhat.com/security/cve/CVE-2020-27821 https://access.redhat.com/security/cve/CVE-2020-28916 https://access.redhat.com/security/cve/CVE-2020-29129 https://access.redhat.com/security/cve/CVE-2020-29130 https://access.redhat.com/security/cve/CVE-2020-29443', 'Moderate', 'Medium', 'libvirt-daemon-config-network', '', 'virt:rhel', 'i686', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:6.0.0-35.module+el8.4.0+10230+7a9b21e4', 'equals', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * libvirt: double free in qemuAgentGetInterfaces () in qemu_agent.c (CVE - 2020 - 25637) * QEMU: heap buffer overflow in msix_table_mmio_write () in hw / pci / msix.c (CVE - 2020 - 27821) * QEMU: ide: atapi: OOB access while processing read commands (CVE - 2020 - 29443) * QEMU: heap buffer overflow in iscsi_aio_ioctl_cb () in block / iscsi.c may lead to information disclosure (CVE - 2020 - 11947) * QEMU: reachable assertion failure in net_tx_pkt_add_raw_fragment () in hw / net / net_tx_pkt.c (CVE - 2020 - 16092) * QEMU: infinite loop in e1000e_write_packet_to_guest () in hw / net / e1000e_core.c (CVE - 2020 - 25707) * QEMU: assertion failure through usb_packet_unmap () in hw / usb / hcd - ehci.c (CVE - 2020 - 25723) * QEMU: e1000e: infinite loop scenario in case of null packet descriptor (CVE - 2020 - 28916) * QEMU: slirp: out - of - bounds access while processing ARP / NCSI packets (CVE - 2020 - 29129, CVE - 2020 - 29130) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 10:02:57 Duration: 553ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xac7a7c25c2757746dd435246ab1ca992', 'RHSA-2021:1762: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section.', '2021-05-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1762 https://access.redhat.com/security/cve/CVE-2020-11947 https://access.redhat.com/security/cve/CVE-2020-16092 https://access.redhat.com/security/cve/CVE-2020-25637 https://access.redhat.com/security/cve/CVE-2020-25707 https://access.redhat.com/security/cve/CVE-2020-25723 https://access.redhat.com/security/cve/CVE-2020-27821 https://access.redhat.com/security/cve/CVE-2020-28916 https://access.redhat.com/security/cve/CVE-2020-29129 https://access.redhat.com/security/cve/CVE-2020-29130 https://access.redhat.com/security/cve/CVE-2020-29443', 'Moderate', 'Medium', 'nbdkit-basic-filters', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:1.16.2-4.module+el8.3.0+6922+fd575af8', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * libvirt: double free in qemuAgentGetInterfaces () in qemu_agent.c (CVE - 2020 - 25637) * QEMU: heap buffer overflow in msix_table_mmio_write () in hw / pci / msix.c (CVE - 2020 - 27821) * QEMU: ide: atapi: OOB access while processing read commands (CVE - 2020 - 29443) * QEMU: heap buffer overflow in iscsi_aio_ioctl_cb () in block / iscsi.c may lead to information disclosure (CVE - 2020 - 11947) * QEMU: reachable assertion failure in net_tx_pkt_add_raw_fragment () in hw / net / net_tx_pkt.c (CVE - 2020 - 16092) * QEMU: infinite loop in e1000e_write_packet_to_guest () in hw / net / e1000e_core.c (CVE - 2020 - 25707) * QEMU: assertion failure through usb_packet_unmap () in hw / usb / hcd - ehci.c (CVE - 2020 - 25723) * QEMU: e1000e: infinite loop scenario in case of null packet descriptor (CVE - 2020 - 28916) * QEMU: slirp: out - of - bounds access while processing ARP / NCSI packets (CVE - 2020 - 29129, CVE - 2020 - 29130) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 09:59:35 Duration: 551ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x4a0792490d56f12e52b2119a8bb34c7d', 'RHSA-2021:1762: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section.', '2021-05-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1762 https://access.redhat.com/security/cve/CVE-2020-11947 https://access.redhat.com/security/cve/CVE-2020-16092 https://access.redhat.com/security/cve/CVE-2020-25637 https://access.redhat.com/security/cve/CVE-2020-25707 https://access.redhat.com/security/cve/CVE-2020-25723 https://access.redhat.com/security/cve/CVE-2020-27821 https://access.redhat.com/security/cve/CVE-2020-28916 https://access.redhat.com/security/cve/CVE-2020-29129 https://access.redhat.com/security/cve/CVE-2020-29130 https://access.redhat.com/security/cve/CVE-2020-29443', 'Moderate', 'Medium', 'libiscsi', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '0:1.18.0-8.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * libvirt: double free in qemuAgentGetInterfaces () in qemu_agent.c (CVE - 2020 - 25637) * QEMU: heap buffer overflow in msix_table_mmio_write () in hw / pci / msix.c (CVE - 2020 - 27821) * QEMU: ide: atapi: OOB access while processing read commands (CVE - 2020 - 29443) * QEMU: heap buffer overflow in iscsi_aio_ioctl_cb () in block / iscsi.c may lead to information disclosure (CVE - 2020 - 11947) * QEMU: reachable assertion failure in net_tx_pkt_add_raw_fragment () in hw / net / net_tx_pkt.c (CVE - 2020 - 16092) * QEMU: infinite loop in e1000e_write_packet_to_guest () in hw / net / e1000e_core.c (CVE - 2020 - 25707) * QEMU: assertion failure through usb_packet_unmap () in hw / usb / hcd - ehci.c (CVE - 2020 - 25723) * QEMU: e1000e: infinite loop scenario in case of null packet descriptor (CVE - 2020 - 28916) * QEMU: slirp: out - of - bounds access while processing ARP / NCSI packets (CVE - 2020 - 29129, CVE - 2020 - 29130) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 10:01:31 Duration: 545ms Bind query: yes
16 25,388 27s630ms 0ms 1s404ms 1ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing; security fix (es) : * glibc: getaddrinfo should reject ip addresses with trailing characters ( cve - 2016 - 10739) for more details about the security issue (s), including the impact, a cvss score, acknowledgments, and other related information, refer to the cve page (s) listed in the references section. additional changes:;Times Reported Time consuming queries #16
Day Hour Count Duration Avg duration Jul 05 05 19,743 20s966ms 1ms 06 5,645 6s664ms 1ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x2d161b50368d909c0a18b66e752c6695', 'RHSA-2019:3513: glibc security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3513 https://access.redhat.com/security/cve/CVE-2016-10739', 'Moderate', 'Medium', 'glibc-langpack-the', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::highavailability', 'rhel-cpe-repository', '', '0:2.28-72.el8', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * glibc: getaddrinfo should reject IP addresses with trailing characters ( CVE - 2016 - 10739) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 09:57:36 Duration: 1s404ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x11a47b9276ff912aa748ad465e4cf810', 'RHSA-2019:3513: glibc security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.4-aus', 'The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3513 https://access.redhat.com/security/cve/CVE-2016-10739', 'Moderate', 'Medium', 'glibc-langpack-el', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.4', 'rhel-cpe-repository', '', '0:2.28-72.el8', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * glibc: getaddrinfo should reject IP addresses with trailing characters ( CVE - 2016 - 10739) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 09:59:19 Duration: 706ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xf49f55e56f55e3b88cca5c83f5599d74', 'RHSA-2019:3513: glibc security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3513 https://access.redhat.com/security/cve/CVE-2016-10739', 'Moderate', 'Medium', 'glibc-langpack-nhn', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::supplementary', 'rhel-cpe-repository', '', '0:2.28-72.el8', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * glibc: getaddrinfo should reject IP addresses with trailing characters ( CVE - 2016 - 10739) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 09:57:34 Duration: 589ms Bind query: yes
17 24,021 23s117ms 0ms 617ms 0ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing; security fix (es) : * qemu: msix: oob access during mmio operations may lead to dos (cve - 2020 - 13754) * hivex: buffer overflow when provided invalid node key length(cve - 2021 - 3504) * qemu: net: an assert failure via eth_get_gso_type (cve - 2020 - 27617) * qemu: net: infinite loop in loopback mode may lead to stack overflow (cve - 2021 - 3416) * qemu: out - of - bound heap buffer access via an interrupt id field (cve - 2021 - 20221) for more details about the security issue (s), including the impact, a cvss score, acknowledgments, and other related information, refer to the cve page (s) listed in the references section. bug fix (es) : * cannot restart default network and firewalld: iptables: no chain / target / match by that name. (bz # ?);Times Reported Time consuming queries #17
Day Hour Count Duration Avg duration Jul 05 05 5,304 4s661ms 0ms 06 18,717 18s456ms 0ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x78b9db9d5221d3f982235e235d749146', 'RHSA-2021:3061: virt:rhel and virt-devel:rhel security and bug fix update (Moderate)', 'RHEL8-rhel-8.6-tus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. * RHEL8.4 Nightly[0322] - KVM guest fails to find zipl boot menu index (qemu-kvm) (BZ#1975679)', '2021-08-10 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:3061 https://access.redhat.com/security/cve/CVE-2020-13754 https://access.redhat.com/security/cve/CVE-2020-27617 https://access.redhat.com/security/cve/CVE-2021-20221 https://access.redhat.com/security/cve/CVE-2021-3416 https://access.redhat.com/security/cve/CVE-2021-3504', 'Moderate', 'Medium', 'nbdkit-basic-filters', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.6::highavailability', 'rhel-cpe-repository', '', '0:1.16.2-4.module+el8.3.0+6922+fd575af8', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: msix: OOB access during mmio operations may lead to DoS (CVE - 2020 - 13754) * hivex: Buffer overflow when provided invalid node key length(CVE - 2021 - 3504) * QEMU: net: an assert failure via eth_get_gso_type (CVE - 2020 - 27617) * QEMU: net: infinite loop in loopback mode may lead to stack overflow (CVE - 2021 - 3416) * qemu: out - of - bound heap buffer access via an interrupt ID field (CVE - 2021 - 20221) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Bug Fix (es) : * cannot restart default network and firewalld: iptables: No chain / target / match by that name. (BZ # 1958301);
Date: 2023-07-05 09:55:50 Duration: 617ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xc4504485b989a71506621c6008052b68', 'RHSA-2021:3061: virt:rhel and virt-devel:rhel security and bug fix update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. * RHEL8.4 Nightly[0322] - KVM guest fails to find zipl boot menu index (qemu-kvm) (BZ#1975679)', '2021-08-10 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:3061 https://access.redhat.com/security/cve/CVE-2020-13754 https://access.redhat.com/security/cve/CVE-2020-27617 https://access.redhat.com/security/cve/CVE-2021-20221 https://access.redhat.com/security/cve/CVE-2021-3416 https://access.redhat.com/security/cve/CVE-2021-3504', 'Moderate', 'Medium', 'libguestfs-tools-c', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '1:1.40.2-27.module+el8.4.0+9282+0bdec052', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: msix: OOB access during mmio operations may lead to DoS (CVE - 2020 - 13754) * hivex: Buffer overflow when provided invalid node key length(CVE - 2021 - 3504) * QEMU: net: an assert failure via eth_get_gso_type (CVE - 2020 - 27617) * QEMU: net: infinite loop in loopback mode may lead to stack overflow (CVE - 2021 - 3416) * qemu: out - of - bound heap buffer access via an interrupt ID field (CVE - 2021 - 20221) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Bug Fix (es) : * cannot restart default network and firewalld: iptables: No chain / target / match by that name. (BZ # 1958301);
Date: 2023-07-05 10:02:01 Duration: 599ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xa649ebaf024befa33e00064ad64d3e75', 'RHSA-2021:3061: virt:rhel and virt-devel:rhel security and bug fix update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. * RHEL8.4 Nightly[0322] - KVM guest fails to find zipl boot menu index (qemu-kvm) (BZ#1975679)', '2021-08-10 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:3061 https://access.redhat.com/security/cve/CVE-2020-13754 https://access.redhat.com/security/cve/CVE-2020-27617 https://access.redhat.com/security/cve/CVE-2021-20221 https://access.redhat.com/security/cve/CVE-2021-3416 https://access.redhat.com/security/cve/CVE-2021-3504', 'Moderate', 'Medium', 'libvirt-devel', '', 'virt-devel:rhel', 'i686', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '0:6.0.0-35.1.module+el8.4.0+11273+64eb94ef', 'equals', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: msix: OOB access during mmio operations may lead to DoS (CVE - 2020 - 13754) * hivex: Buffer overflow when provided invalid node key length(CVE - 2021 - 3504) * QEMU: net: an assert failure via eth_get_gso_type (CVE - 2020 - 27617) * QEMU: net: infinite loop in loopback mode may lead to stack overflow (CVE - 2021 - 3416) * qemu: out - of - bound heap buffer access via an interrupt ID field (CVE - 2021 - 20221) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Bug Fix (es) : * cannot restart default network and firewalld: iptables: No chain / target / match by that name. (BZ # 1958301);
Date: 2023-07-05 10:02:06 Duration: 545ms Bind query: yes
18 23,399 16s981ms 0ms 625ms 0ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing; security fix (es) :;Times Reported Time consuming queries #18
Day Hour Count Duration Avg duration Jul 05 05 11,397 8s255ms 0ms 06 12,002 8s725ms 0ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xf925813f727603ee16c86fa73e162ac3', 'RHSA-2018:0242: erlang security update (Low)', 'RHEL7-openstack-12-including-unpatched', 'Erlang is a general-purpose programming language and runtime environment. Erlang has built-in support for concurrency, distribution and fault tolerance. * An erlang TLS server configured with cipher suites using RSA key exchange, may be vulnerable to an Adaptive Chosen Ciphertext attack (AKA Bleichenbacher attack) against RSA. This may result in plain-text recovery of encrypted messages and/or a man-in-the-middle (MiTM) attack, despite the attacker not having gained access to the server’s private key itself. (CVE-2017-1000385)', '2018-01-30 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:0242 https://access.redhat.com/security/cve/CVE-2017-1000385', 'Low', 'Low', 'erlang-ssh', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:openstack:12::el7', 'rhel-cpe-repository', '', '0:18.3.4.7-1.el7ost', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) :;
Date: 2023-07-05 10:01:51 Duration: 625ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x985679a218dd1a05db587c58659d590d', 'RHSA-2016:1025: pcre security update (Important)', 'RHEL7-rhel-7.7-tus', 'PCRE is a Perl-compatible regular expression library. * Multiple flaws were found in the way PCRE handled malformed regular expressions. An attacker able to make an application using PCRE process a specially crafted regular expression could use these flaws to cause the application to crash or, possibly, execute arbitrary code. (CVE-2015-8385, CVE-2016-3191, CVE-2015-2328, CVE-2015-3217, CVE-2015-5073, CVE-2015-8388, CVE-2015-8391, CVE-2015-8386)', '2016-05-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2016:1025 https://access.redhat.com/security/cve/CVE-2015-2328 https://access.redhat.com/security/cve/CVE-2015-3217 https://access.redhat.com/security/cve/CVE-2015-5073 https://access.redhat.com/security/cve/CVE-2015-8385 https://access.redhat.com/security/cve/CVE-2015-8386 https://access.redhat.com/security/cve/CVE-2015-8388 https://access.redhat.com/security/cve/CVE-2015-8391 https://access.redhat.com/security/cve/CVE-2016-3191', 'Important', 'High', 'pcre-devel', '', '', 'i686|ppc|ppc64|ppc64le|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.7', 'rhel-cpe-repository', '', '0:8.32-15.el7_2.1', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) :;
Date: 2023-07-05 09:59:08 Duration: 576ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x1d1d7016d43bc20a911bc72da44d8778', 'RHSA-2018:0260: systemd security update (Moderate)', 'RHEL7-rhel-7.4-e4s', 'The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. * A race condition was found in systemd. This could result in automount requests not being serviced and processes using them could hang, causing denial of service. (CVE-2018-1049)', '2018-01-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:0260 https://access.redhat.com/security/cve/CVE-2018-1049', 'Moderate', 'Medium', 'systemd-networkd', '', '', 'aarch64|ppc64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.4', 'rhel-cpe-repository', '', '0:219-42.el7_4.7', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) :;
Date: 2023-07-05 10:01:25 Duration: 552ms Bind query: yes
19 21,694 21s455ms 0ms 1s449ms 0ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing; security fix (es) : * glibc: ld_prefer_map_32bit_exec not ignored in setuid binaries (cve - 2019 - 19126) for more details about the security issue (s), including the impact, a cvss score, acknowledgments, and other related information, refer to the cve page (s) listed in the references section. additional changes:;Times Reported Time consuming queries #19
Day Hour Count Duration Avg duration Jul 05 05 9,210 4s574ms 0ms 06 12,484 16s881ms 1ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x5a2621d233b52a9694cf50ebd17cf002', 'RHSA-2020:1828: glibc security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.4-eus', 'The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:1828 https://access.redhat.com/security/cve/CVE-2019-19126', 'Low', 'Low', 'glibc-langpack-mfe', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.4::highavailability', 'rhel-cpe-repository', '', '0:2.28-101.el8', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * glibc: LD_PREFER_MAP_32BIT_EXEC not ignored in setuid binaries (CVE - 2019 - 19126) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 10:00:26 Duration: 1s449ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x67a00abec8689167bb1c2dded05701cc', 'RHSA-2020:1828: glibc security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.8-tus', 'The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:1828 https://access.redhat.com/security/cve/CVE-2019-19126', 'Low', 'Low', 'glibc-langpack-sa', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '0:2.28-101.el8', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * glibc: LD_PREFER_MAP_32BIT_EXEC not ignored in setuid binaries (CVE - 2019 - 19126) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 09:59:44 Duration: 613ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xeae5bac567ac31de9bf9b2cd01397811', 'RHSA-2020:1828: glibc security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.4-e4s', 'The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:1828 https://access.redhat.com/security/cve/CVE-2019-19126', 'Low', 'Low', 'glibc-langpack-raj', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.4::sap', 'rhel-cpe-repository', '', '0:2.28-101.el8', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * glibc: LD_PREFER_MAP_32BIT_EXEC not ignored in setuid binaries (CVE - 2019 - 19126) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 10:01:25 Duration: 552ms Bind query: yes
20 17,807 19s36ms 0ms 618ms 1ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing; security fix (es) : * glibc: array overflow in backtrace functions for powerpc (cve - 2020 - 1751) * glibc: use - after - free in glob () function when expanding ~ user (cve - 2020 - 1752) * glibc: stack corruption from crafted input in cosl, sinl, sincosl, and tanl functions (cve - 2020 - 10029) for more details about the security issue (s), including the impact, a cvss score, acknowledgments, and other related information, refer to the cve page (s) listed in the references section. additional changes:;Times Reported Time consuming queries #20
Day Hour Count Duration Avg duration Jul 05 05 3,604 2s535ms 0ms 06 14,203 16s501ms 1ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x849494cddbceecf9cf8085f2e99daa1d', 'RHSA-2020:4444: glibc security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.', '2020-11-04 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:4444 https://access.redhat.com/security/cve/CVE-2020-10029 https://access.redhat.com/security/cve/CVE-2020-1751 https://access.redhat.com/security/cve/CVE-2020-1752', 'Moderate', 'Medium', 'glibc-langpack-bg', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:2.28-127.el8', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * glibc: array overflow in backtrace functions for powerpc (CVE - 2020 - 1751) * glibc: use - after - free in glob () function when expanding ~ user (CVE - 2020 - 1752) * glibc: stack corruption from crafted input in cosl, sinl, sincosl, and tanl functions (CVE - 2020 - 10029) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 10:01:51 Duration: 618ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x7f58a571ab75cd1a7f64ce988b8d7ce0', 'RHSA-2020:4444: glibc security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.8-eus', 'The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.', '2020-11-04 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:4444 https://access.redhat.com/security/cve/CVE-2020-10029 https://access.redhat.com/security/cve/CVE-2020-1751 https://access.redhat.com/security/cve/CVE-2020-1752', 'Moderate', 'Medium', 'glibc-langpack-ln', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::highavailability', 'rhel-cpe-repository', '', '0:2.28-127.el8', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * glibc: array overflow in backtrace functions for powerpc (CVE - 2020 - 1751) * glibc: use - after - free in glob () function when expanding ~ user (CVE - 2020 - 1752) * glibc: stack corruption from crafted input in cosl, sinl, sincosl, and tanl functions (CVE - 2020 - 10029) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 10:00:50 Duration: 562ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x9f06f5723b0fb61cd680e7d5ce22759e', 'RHSA-2020:4444: glibc security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.4-eus', 'The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.', '2020-11-04 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:4444 https://access.redhat.com/security/cve/CVE-2020-10029 https://access.redhat.com/security/cve/CVE-2020-1751 https://access.redhat.com/security/cve/CVE-2020-1752', 'Moderate', 'Medium', 'glibc-langpack-kk', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.4', 'rhel-cpe-repository', '', '0:2.28-127.el8', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * glibc: array overflow in backtrace functions for powerpc (CVE - 2020 - 1751) * glibc: use - after - free in glob () function when expanding ~ user (CVE - 2020 - 1752) * glibc: stack corruption from crafted input in cosl, sinl, sincosl, and tanl functions (CVE - 2020 - 10029) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 10:01:31 Duration: 546ms Bind query: yes
Normalized slowest queries (N)
Rank Min duration Max duration Avg duration Times executed Total duration Query 1 0ms 8s456ms 3s42ms 20 1m insert into updater_status (updater_name, last_attempt, last_run_succeeded, last_attempt_fingerprint, last_error) values (?, ?, ?, ?, ?) on conflict (updater_name) do update set last_attempt = ?, last_run_succeeded = ?, last_attempt_fingerprint = ?, last_error = ? returning updater_name;Times Reported Time consuming queries #1
Day Hour Count Duration Avg duration Jul 05 05 4 0ms 0ms 06 16 1m 3s803ms -
INSERT INTO updater_status (updater_name, last_attempt, last_run_succeeded, last_attempt_fingerprint, last_error) VALUES ('RHEL8-rhel-8.4-tus', '2023-07-05 10:01:36.067954+00', 'false', '{"Etag":"\"bb36472636586cfacca5a2308ccc7193\"","Date":"Sat, 01 Jul 2023 10:20:35 GMT"}', 'failed to update: failed to queue vulnerability: failed to flush batch when queueing vulnerability: timeout: context deadline exceeded') ON CONFLICT (updater_name) DO UPDATE SET last_attempt = $2, last_run_succeeded = 'false', last_attempt_fingerprint = $3, last_error = $4 RETURNING updater_name;
Date: 2023-07-05 10:05:14 Duration: 8s456ms Bind query: yes
-
INSERT INTO updater_status (updater_name, last_attempt, last_run_succeeded, last_attempt_fingerprint, last_error) VALUES ('RHEL8-rhel-8.8-tus', '2023-07-05 09:58:00.022984+00', 'false', '{"Etag":"\"bec4f014e65cb6ef7a65b64238524d5c\"","Date":"Sat, 01 Jul 2023 10:53:47 GMT"}', 'failed to update: failed to queue vulnerability: failed to flush batch when queueing vulnerability: timeout: context deadline exceeded') ON CONFLICT (updater_name) DO UPDATE SET last_attempt = $2, last_run_succeeded = 'false', last_attempt_fingerprint = $3, last_error = $4 RETURNING updater_name;
Date: 2023-07-05 10:05:14 Duration: 8s115ms Bind query: yes
-
INSERT INTO updater_status (updater_name, last_attempt, last_run_succeeded, last_attempt_fingerprint, last_error) VALUES ('RHEL8-rhel-8.4-eus', '2023-07-05 09:57:39.024676+00', 'false', '{"Etag":"\"f44f7778d2ad1d87418deb3788282d91\"","Date":"Sat, 01 Jul 2023 10:20:25 GMT"}', 'failed to update: failed to queue vulnerability: failed to flush batch when queueing vulnerability: timeout: context deadline exceeded') ON CONFLICT (updater_name) DO UPDATE SET last_attempt = $2, last_run_succeeded = 'false', last_attempt_fingerprint = $3, last_error = $4 RETURNING updater_name;
Date: 2023-07-05 10:05:14 Duration: 8s78ms Bind query: yes
2 0ms 2s771ms 127ms 434 55s152ms delete from vuln v1 using vuln v2 left join uo_vuln uvl on v2.id = uvl.vuln where uvl.vuln is null and v2.updater = ? and v1.id = v2.id;Times Reported Time consuming queries #2
Day Hour Count Duration Avg duration Jul 05 06 434 55s152ms 127ms -
DELETE FROM vuln v1 USING vuln v2 LEFT JOIN uo_vuln uvl ON v2.id = uvl.vuln WHERE uvl.vuln IS NULL AND v2.updater = 'RHEL8-rhel-8.6-tus' AND v1.id = v2.id;
Date: 2023-07-05 10:05:17 Duration: 2s771ms Bind query: yes
-
DELETE FROM vuln v1 USING vuln v2 LEFT JOIN uo_vuln uvl ON v2.id = uvl.vuln WHERE uvl.vuln IS NULL AND v2.updater = 'RHEL8-rhel-8.1-e4s' AND v1.id = v2.id;
Date: 2023-07-05 10:05:17 Duration: 2s508ms Bind query: yes
-
DELETE FROM vuln v1 USING vuln v2 LEFT JOIN uo_vuln uvl ON v2.id = uvl.vuln WHERE uvl.vuln IS NULL AND v2.updater = 'ubuntu/updater/xenial' AND v1.id = v2.id;
Date: 2023-07-05 10:05:26 Duration: 1s733ms Bind query: yes
3 0ms 2s443ms 51ms 1,575 1m21s commit;Times Reported Time consuming queries #3
Day Hour Count Duration Avg duration Jul 05 05 546 29s663ms 54ms 06 1,029 51s963ms 50ms -
commit;
Date: 2023-07-05 09:57:59 Duration: 2s443ms
-
commit;
Date: 2023-07-05 10:01:26 Duration: 1s93ms
-
commit;
Date: 2023-07-05 10:01:26 Duration: 1s79ms
4 0ms 681ms 18ms 1,214 22s381ms insert into updater_status (updater_name, last_attempt, last_success, last_run_succeeded, last_attempt_fingerprint) values (?, ?, ?, ?, ?) on conflict (updater_name) do update set last_attempt = ?, last_success = ?, last_run_succeeded = ?, last_attempt_fingerprint = ? returning updater_name;Times Reported Time consuming queries #4
Day Hour Count Duration Avg duration Jul 05 05 344 3s91ms 8ms 06 870 19s289ms 22ms -
INSERT INTO updater_status (updater_name, last_attempt, last_success, last_run_succeeded, last_attempt_fingerprint) VALUES ('RHEL6-satellite-tools-6.5', '2023-07-05 09:57:36.481558+00', $2, 'true', '{"Etag":"\"107e5a13cc5ee94592961e7c3e7681b6\"","Date":"Sat, 01 Jul 2023 07:33:35 GMT"}') ON CONFLICT (updater_name) DO UPDATE SET last_attempt = $2, last_success = $2, last_run_succeeded = 'true', last_attempt_fingerprint = $3 RETURNING updater_name;
Date: 2023-07-05 09:57:37 Duration: 681ms Bind query: yes
-
INSERT INTO updater_status (updater_name, last_attempt, last_success, last_run_succeeded, last_attempt_fingerprint) VALUES ('RHEL5-satellite-tools-6.4', '2023-07-05 09:57:35.757363+00', $2, 'true', '{"Etag":"\"17ec50ac81a29140a2a8f7d0eae668bb\"","Date":"Sat, 01 Jul 2023 07:35:43 GMT"}') ON CONFLICT (updater_name) DO UPDATE SET last_attempt = $2, last_success = $2, last_run_succeeded = 'true', last_attempt_fingerprint = $3 RETURNING updater_name;
Date: 2023-07-05 09:57:36 Duration: 584ms Bind query: yes
-
INSERT INTO updater_status (updater_name, last_attempt, last_success, last_run_succeeded, last_attempt_fingerprint) VALUES ('RHEL7-storage-ceph-3', '2023-07-05 10:01:43.062895+00', $2, 'true', '{"Etag":"\"56f608f0f7a03aa81be4716c81b1eeba\"","Date":"Sat, 01 Jul 2023 10:19:19 GMT"}') ON CONFLICT (updater_name) DO UPDATE SET last_attempt = $2, last_success = $2, last_run_succeeded = 'true', last_attempt_fingerprint = $3 RETURNING updater_name;
Date: 2023-07-05 10:01:43 Duration: 574ms Bind query: yes
5 0ms 601ms 1ms 26,207 31s773ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing; the following packages have been upgraded to a later upstream version: hivex (?.?.?), libguestfs (?.?.?), libguestfs - winsupport (?.?), libvirt (?.?.?), libvirt - dbus (?.?.?), libvirt - python (?.?.?), nbdkit (?.?.?), perl - sys - virt (?.?.?), qemu - kvm (?.?.?), seabios (?.?.?), slof (?).(bz # ?, bz # ?) security fix (es) : * libvirt: leak of / dev / mapper / control into qemu guests (cve - 2020 - 14339) * qemu: slirp: use - after - free during packet reassembly (cve - 2019 - 15890) * libvirt: potential dos by holding a monitor job while querying qemu guest - agent (cve - 2019 - 20485) * qemu: slirp: use - after - free in ip_reass () function in ip_input.c (cve - 2020 - 1983) * libvirt: potential denial of service via active pool without target path(cve - 2020 - 10703) * libvirt: leak of sensitive cookie information via dumpxml (cve - 2020 - 14301) for more details about the security issue (s), including the impact, a cvss score, acknowledgments, and other related information, refer to the cve page (s) listed in the references section. additional changes:;Times Reported Time consuming queries #5
Day Hour Count Duration Avg duration Jul 05 05 5,304 5s499ms 1ms 06 20,903 26s274ms 1ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x3be5bbcc2cb3a0a8e295830297032ea3', 'RHSA-2020:4676: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.8-e4s', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.', '2020-11-04 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:4676 https://access.redhat.com/security/cve/CVE-2019-15890 https://access.redhat.com/security/cve/CVE-2019-20485 https://access.redhat.com/security/cve/CVE-2020-10703 https://access.redhat.com/security/cve/CVE-2020-14301 https://access.redhat.com/security/cve/CVE-2020-14339 https://access.redhat.com/security/cve/CVE-2020-1983', 'Moderate', 'Medium', 'virt-v2v', '', 'virt-devel:rhel', 'x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::highavailability', 'rhel-cpe-repository', '', '1:1.40.2-25.module+el8.3.0+7421+642fe24f', 'equals', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; The following packages have been upgraded to a later upstream version: hivex (1.3.18), libguestfs (1.40.2), libguestfs - winsupport (8.2), libvirt (6.0.0), libvirt - dbus (1.3.0), libvirt - python (6.0.0), nbdkit (1.16.2), perl - Sys - Virt (6.0.0), qemu - kvm (4.2.0), seabios (1.13.0), SLOF (20191022).(BZ # 1810193, BZ # 1844296) Security Fix (es) : * libvirt: leak of / dev / mapper / control into QEMU guests (CVE - 2020 - 14339) * QEMU: Slirp: use - after - free during packet reassembly (CVE - 2019 - 15890) * libvirt: Potential DoS by holding a monitor job while querying QEMU guest - agent (CVE - 2019 - 20485) * QEMU: slirp: use - after - free in ip_reass () function in ip_input.c (CVE - 2020 - 1983) * libvirt: Potential denial of service via active pool without target path(CVE - 2020 - 10703) * libvirt: leak of sensitive cookie information via dumpxml (CVE - 2020 - 14301) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 09:57:16 Duration: 601ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x811c6e94b1472c7953ca2b125f4a4506', 'RHSA-2020:4676: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.4-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.', '2020-11-04 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:4676 https://access.redhat.com/security/cve/CVE-2019-15890 https://access.redhat.com/security/cve/CVE-2019-20485 https://access.redhat.com/security/cve/CVE-2020-10703 https://access.redhat.com/security/cve/CVE-2020-14301 https://access.redhat.com/security/cve/CVE-2020-14339 https://access.redhat.com/security/cve/CVE-2020-1983', 'Moderate', 'Medium', 'qemu-img', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.4::baseos', 'rhel-cpe-repository', '', '15:4.2.0-34.module+el8.3.0+7976+077be4ec', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; The following packages have been upgraded to a later upstream version: hivex (1.3.18), libguestfs (1.40.2), libguestfs - winsupport (8.2), libvirt (6.0.0), libvirt - dbus (1.3.0), libvirt - python (6.0.0), nbdkit (1.16.2), perl - Sys - Virt (6.0.0), qemu - kvm (4.2.0), seabios (1.13.0), SLOF (20191022).(BZ # 1810193, BZ # 1844296) Security Fix (es) : * libvirt: leak of / dev / mapper / control into QEMU guests (CVE - 2020 - 14339) * QEMU: Slirp: use - after - free during packet reassembly (CVE - 2019 - 15890) * libvirt: Potential DoS by holding a monitor job while querying QEMU guest - agent (CVE - 2019 - 20485) * QEMU: slirp: use - after - free in ip_reass () function in ip_input.c (CVE - 2020 - 1983) * libvirt: Potential denial of service via active pool without target path(CVE - 2020 - 10703) * libvirt: leak of sensitive cookie information via dumpxml (CVE - 2020 - 14301) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 10:02:01 Duration: 600ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x51941ddac9af20f336e80313d4379e2f', 'RHSA-2020:4676: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.', '2020-11-04 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:4676 https://access.redhat.com/security/cve/CVE-2019-15890 https://access.redhat.com/security/cve/CVE-2019-20485 https://access.redhat.com/security/cve/CVE-2020-10703 https://access.redhat.com/security/cve/CVE-2020-14301 https://access.redhat.com/security/cve/CVE-2020-14339 https://access.redhat.com/security/cve/CVE-2020-1983', 'Moderate', 'Medium', 'ruby-libguestfs', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:enterprise_linux:8::realtime', 'rhel-cpe-repository', '', '1:1.40.2-25.module+el8.3.0+7421+642fe24f', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; The following packages have been upgraded to a later upstream version: hivex (1.3.18), libguestfs (1.40.2), libguestfs - winsupport (8.2), libvirt (6.0.0), libvirt - dbus (1.3.0), libvirt - python (6.0.0), nbdkit (1.16.2), perl - Sys - Virt (6.0.0), qemu - kvm (4.2.0), seabios (1.13.0), SLOF (20191022).(BZ # 1810193, BZ # 1844296) Security Fix (es) : * libvirt: leak of / dev / mapper / control into QEMU guests (CVE - 2020 - 14339) * QEMU: Slirp: use - after - free during packet reassembly (CVE - 2019 - 15890) * libvirt: Potential DoS by holding a monitor job while querying QEMU guest - agent (CVE - 2019 - 20485) * QEMU: slirp: use - after - free in ip_reass () function in ip_input.c (CVE - 2020 - 1983) * libvirt: Potential denial of service via active pool without target path(CVE - 2020 - 10703) * libvirt: leak of sensitive cookie information via dumpxml (CVE - 2020 - 14301) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 10:02:01 Duration: 598ms Bind query: yes
6 0ms 553ms 1ms 25,615 29s432ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing; security fix (es) : * libvirt: double free in qemuagentgetinterfaces () in qemu_agent.c (cve - 2020 - 25637) * qemu: heap buffer overflow in msix_table_mmio_write () in hw / pci / msix.c (cve - 2020 - 27821) * qemu: ide: atapi: oob access while processing read commands (cve - 2020 - 29443) * qemu: heap buffer overflow in iscsi_aio_ioctl_cb () in block / iscsi.c may lead to information disclosure (cve - 2020 - 11947) * qemu: reachable assertion failure in net_tx_pkt_add_raw_fragment () in hw / net / net_tx_pkt.c (cve - 2020 - 16092) * qemu: infinite loop in e1000e_write_packet_to_guest () in hw / net / e1000e_core.c (cve - 2020 - 25707) * qemu: assertion failure through usb_packet_unmap () in hw / usb / hcd - ehci.c (cve - 2020 - 25723) * qemu: e1000e: infinite loop scenario in case of null packet descriptor (cve - 2020 - 28916) * qemu: slirp: out - of - bounds access while processing arp / ncsi packets (cve - 2020 - 29129, cve - 2020 - 29130) for more details about the security issue (s), including the impact, a cvss score, acknowledgments, and other related information, refer to the cve page (s) listed in the references section. additional changes:;Times Reported Time consuming queries #6
Day Hour Count Duration Avg duration Jul 05 05 5,304 5s695ms 1ms 06 20,311 23s736ms 1ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x19840aefc11d1663741c709cbe9eacca', 'RHSA-2021:1762: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section.', '2021-05-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1762 https://access.redhat.com/security/cve/CVE-2020-11947 https://access.redhat.com/security/cve/CVE-2020-16092 https://access.redhat.com/security/cve/CVE-2020-25637 https://access.redhat.com/security/cve/CVE-2020-25707 https://access.redhat.com/security/cve/CVE-2020-25723 https://access.redhat.com/security/cve/CVE-2020-27821 https://access.redhat.com/security/cve/CVE-2020-28916 https://access.redhat.com/security/cve/CVE-2020-29129 https://access.redhat.com/security/cve/CVE-2020-29130 https://access.redhat.com/security/cve/CVE-2020-29443', 'Moderate', 'Medium', 'libvirt-daemon-config-network', '', 'virt:rhel', 'i686', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:6.0.0-35.module+el8.4.0+10230+7a9b21e4', 'equals', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * libvirt: double free in qemuAgentGetInterfaces () in qemu_agent.c (CVE - 2020 - 25637) * QEMU: heap buffer overflow in msix_table_mmio_write () in hw / pci / msix.c (CVE - 2020 - 27821) * QEMU: ide: atapi: OOB access while processing read commands (CVE - 2020 - 29443) * QEMU: heap buffer overflow in iscsi_aio_ioctl_cb () in block / iscsi.c may lead to information disclosure (CVE - 2020 - 11947) * QEMU: reachable assertion failure in net_tx_pkt_add_raw_fragment () in hw / net / net_tx_pkt.c (CVE - 2020 - 16092) * QEMU: infinite loop in e1000e_write_packet_to_guest () in hw / net / e1000e_core.c (CVE - 2020 - 25707) * QEMU: assertion failure through usb_packet_unmap () in hw / usb / hcd - ehci.c (CVE - 2020 - 25723) * QEMU: e1000e: infinite loop scenario in case of null packet descriptor (CVE - 2020 - 28916) * QEMU: slirp: out - of - bounds access while processing ARP / NCSI packets (CVE - 2020 - 29129, CVE - 2020 - 29130) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 10:02:57 Duration: 553ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xac7a7c25c2757746dd435246ab1ca992', 'RHSA-2021:1762: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.6-aus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section.', '2021-05-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1762 https://access.redhat.com/security/cve/CVE-2020-11947 https://access.redhat.com/security/cve/CVE-2020-16092 https://access.redhat.com/security/cve/CVE-2020-25637 https://access.redhat.com/security/cve/CVE-2020-25707 https://access.redhat.com/security/cve/CVE-2020-25723 https://access.redhat.com/security/cve/CVE-2020-27821 https://access.redhat.com/security/cve/CVE-2020-28916 https://access.redhat.com/security/cve/CVE-2020-29129 https://access.redhat.com/security/cve/CVE-2020-29130 https://access.redhat.com/security/cve/CVE-2020-29443', 'Moderate', 'Medium', 'nbdkit-basic-filters', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.6', 'rhel-cpe-repository', '', '0:1.16.2-4.module+el8.3.0+6922+fd575af8', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * libvirt: double free in qemuAgentGetInterfaces () in qemu_agent.c (CVE - 2020 - 25637) * QEMU: heap buffer overflow in msix_table_mmio_write () in hw / pci / msix.c (CVE - 2020 - 27821) * QEMU: ide: atapi: OOB access while processing read commands (CVE - 2020 - 29443) * QEMU: heap buffer overflow in iscsi_aio_ioctl_cb () in block / iscsi.c may lead to information disclosure (CVE - 2020 - 11947) * QEMU: reachable assertion failure in net_tx_pkt_add_raw_fragment () in hw / net / net_tx_pkt.c (CVE - 2020 - 16092) * QEMU: infinite loop in e1000e_write_packet_to_guest () in hw / net / e1000e_core.c (CVE - 2020 - 25707) * QEMU: assertion failure through usb_packet_unmap () in hw / usb / hcd - ehci.c (CVE - 2020 - 25723) * QEMU: e1000e: infinite loop scenario in case of null packet descriptor (CVE - 2020 - 28916) * QEMU: slirp: out - of - bounds access while processing ARP / NCSI packets (CVE - 2020 - 29129, CVE - 2020 - 29130) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 09:59:35 Duration: 551ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x4a0792490d56f12e52b2119a8bb34c7d', 'RHSA-2021:1762: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section.', '2021-05-18 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1762 https://access.redhat.com/security/cve/CVE-2020-11947 https://access.redhat.com/security/cve/CVE-2020-16092 https://access.redhat.com/security/cve/CVE-2020-25637 https://access.redhat.com/security/cve/CVE-2020-25707 https://access.redhat.com/security/cve/CVE-2020-25723 https://access.redhat.com/security/cve/CVE-2020-27821 https://access.redhat.com/security/cve/CVE-2020-28916 https://access.redhat.com/security/cve/CVE-2020-29129 https://access.redhat.com/security/cve/CVE-2020-29130 https://access.redhat.com/security/cve/CVE-2020-29443', 'Moderate', 'Medium', 'libiscsi', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::appstream', 'rhel-cpe-repository', '', '0:1.18.0-8.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * libvirt: double free in qemuAgentGetInterfaces () in qemu_agent.c (CVE - 2020 - 25637) * QEMU: heap buffer overflow in msix_table_mmio_write () in hw / pci / msix.c (CVE - 2020 - 27821) * QEMU: ide: atapi: OOB access while processing read commands (CVE - 2020 - 29443) * QEMU: heap buffer overflow in iscsi_aio_ioctl_cb () in block / iscsi.c may lead to information disclosure (CVE - 2020 - 11947) * QEMU: reachable assertion failure in net_tx_pkt_add_raw_fragment () in hw / net / net_tx_pkt.c (CVE - 2020 - 16092) * QEMU: infinite loop in e1000e_write_packet_to_guest () in hw / net / e1000e_core.c (CVE - 2020 - 25707) * QEMU: assertion failure through usb_packet_unmap () in hw / usb / hcd - ehci.c (CVE - 2020 - 25723) * QEMU: e1000e: infinite loop scenario in case of null packet descriptor (CVE - 2020 - 28916) * QEMU: slirp: out - of - bounds access while processing ARP / NCSI packets (CVE - 2020 - 29129, CVE - 2020 - 29130) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 10:01:31 Duration: 545ms Bind query: yes
7 0ms 658ms 1ms 28,556 32s97ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing; security fix (es) : * qemu: usb: out - of - bounds r / w access issue while processing usb packets (cve - 2020 - 14364) * qemu: slirp: networking out - of - bounds read information disclosure vulnerability (cve - 2020 - 10756);Times Reported Time consuming queries #7
Day Hour Count Duration Avg duration Jul 05 05 6,719 5s109ms 0ms 06 21,837 26s987ms 1ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xe2cea3e7b8a1602d8df3657046ddaec5', 'RHSA-2020:4059: virt:rhel security update (Important)', 'RHEL8-rhel-8.2-e4s', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2020-09-29 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:4059 https://access.redhat.com/security/cve/CVE-2020-10756 https://access.redhat.com/security/cve/CVE-2020-14364', 'Important', 'High', 'nbdkit-plugin-xz', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.2', 'rhel-cpe-repository', '', '0:1.4.2-5.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: usb: out - of - bounds r / w access issue while processing usb packets (CVE - 2020 - 14364) * QEMU: slirp: networking out - of - bounds read information disclosure vulnerability (CVE - 2020 - 10756);
Date: 2023-07-05 10:00:57 Duration: 658ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x247f136372e0b5bb10ef967dc9edc9e2', 'RHSA-2020:4059: virt:rhel security update (Important)', 'RHEL8-rhel-8', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2020-09-29 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:4059 https://access.redhat.com/security/cve/CVE-2020-10756 https://access.redhat.com/security/cve/CVE-2020-14364', 'Important', 'High', 'libguestfs-winsupport', '', 'virt-devel:rhel', 'i686', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:enterprise_linux:8::highavailability', 'rhel-cpe-repository', '', '0:8.0-4.module+el8.1.0+4066+0f1aadab', 'equals', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: usb: out - of - bounds r / w access issue while processing usb packets (CVE - 2020 - 14364) * QEMU: slirp: networking out - of - bounds read information disclosure vulnerability (CVE - 2020 - 10756);
Date: 2023-07-05 10:01:17 Duration: 642ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xfcaf3c3daa48cf952606e58e25342543', 'RHSA-2020:4059: virt:rhel security update (Important)', 'RHEL8-rhel-8.6-e4s', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2020-09-29 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:4059 https://access.redhat.com/security/cve/CVE-2020-10756 https://access.redhat.com/security/cve/CVE-2020-14364', 'Important', 'High', 'libvirt-daemon-kvm', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::sap_hana', 'rhel-cpe-repository', '', '0:4.5.0-42.module+el8.2.0+6024+15a2423f', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: usb: out - of - bounds r / w access issue while processing usb packets (CVE - 2020 - 14364) * QEMU: slirp: networking out - of - bounds read information disclosure vulnerability (CVE - 2020 - 10756);
Date: 2023-07-05 10:01:43 Duration: 605ms Bind query: yes
8 0ms 5s683ms 1ms 29,543 32s539ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing; security fix (es) : * qemu: virtiofsd: potential privileged host device access from guest (cve - 2020 - 35517);Times Reported Time consuming queries #8
Day Hour Count Duration Avg duration Jul 05 05 5,303 3s813ms 0ms 06 24,240 28s725ms 1ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x69b11a2b957666b780dbd9b90eb9298c', 'RHSA-2021:0743: virt:8.2 and virt-devel:8.2 security update (Important)', 'RHEL8-advanced-virtualization', 'The Advanced Virtualization module provides the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-03-08 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0743 https://access.redhat.com/security/cve/CVE-2020-35517', 'Important', 'High', 'qemu-guest-agent', '', 'virt-devel:8.2', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:advanced_virtualization:8', 'rhel-cpe-repository', '', '15:4.2.0-29.module+el8.2.1+9917+2543143c.7', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: virtiofsd: potential privileged host device access from guest (CVE - 2020 - 35517);
Date: 2023-07-05 10:04:12 Duration: 5s683ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x68cc3ef60c6c68c00d3b2388b2f89445', 'RHSA-2021:0711: virt:rhel and virt-devel:rhel security update (Important)', 'RHEL8-rhel-8.8-e4s', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-03-03 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0711 https://access.redhat.com/security/cve/CVE-2020-35517', 'Important', 'High', 'python3-hivex', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '0:1.3.18-20.module+el8.3.0+6423+e4cb6418', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: virtiofsd: potential privileged host device access from guest (CVE - 2020 - 35517);
Date: 2023-07-05 09:57:34 Duration: 589ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x1074f1e47bc671d17ba8b052f36a9eb1', 'RHSA-2021:0711: virt:rhel and virt-devel:rhel security update (Important)', 'RHEL8-rhel-8.8-tus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-03-03 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:0711 https://access.redhat.com/security/cve/CVE-2020-35517', 'Important', 'High', 'libvirt-daemon-driver-storage-iscsi', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::realtime', 'rhel-cpe-repository', '', '0:6.0.0-28.module+el8.3.0+7827+5e65edd7', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: virtiofsd: potential privileged host device access from guest (CVE - 2020 - 35517);
Date: 2023-07-05 10:01:02 Duration: 527ms Bind query: yes
9 0ms 1s404ms 1ms 25,388 27s630ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing; security fix (es) : * glibc: getaddrinfo should reject ip addresses with trailing characters ( cve - 2016 - 10739) for more details about the security issue (s), including the impact, a cvss score, acknowledgments, and other related information, refer to the cve page (s) listed in the references section. additional changes:;Times Reported Time consuming queries #9
Day Hour Count Duration Avg duration Jul 05 05 19,743 20s966ms 1ms 06 5,645 6s664ms 1ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x2d161b50368d909c0a18b66e752c6695', 'RHSA-2019:3513: glibc security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3513 https://access.redhat.com/security/cve/CVE-2016-10739', 'Moderate', 'Medium', 'glibc-langpack-the', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::highavailability', 'rhel-cpe-repository', '', '0:2.28-72.el8', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * glibc: getaddrinfo should reject IP addresses with trailing characters ( CVE - 2016 - 10739) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 09:57:36 Duration: 1s404ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x11a47b9276ff912aa748ad465e4cf810', 'RHSA-2019:3513: glibc security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.4-aus', 'The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3513 https://access.redhat.com/security/cve/CVE-2016-10739', 'Moderate', 'Medium', 'glibc-langpack-el', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.4', 'rhel-cpe-repository', '', '0:2.28-72.el8', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * glibc: getaddrinfo should reject IP addresses with trailing characters ( CVE - 2016 - 10739) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 09:59:19 Duration: 706ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xf49f55e56f55e3b88cca5c83f5599d74', 'RHSA-2019:3513: glibc security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.1-eus', 'The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3513 https://access.redhat.com/security/cve/CVE-2016-10739', 'Moderate', 'Medium', 'glibc-langpack-nhn', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::supplementary', 'rhel-cpe-repository', '', '0:2.28-72.el8', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * glibc: getaddrinfo should reject IP addresses with trailing characters ( CVE - 2016 - 10739) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 09:57:34 Duration: 589ms Bind query: yes
10 0ms 616ms 1ms 28,560 30s857ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing; security fix (es) : * qemu: slirp: potential oob access due to unsafe snprintf () usages (cve - 2020 - 8608) * qemu: vnc: memory leakage upon disconnect (cve - 2019 - 20382);Times Reported Time consuming queries #10
Day Hour Count Duration Avg duration Jul 05 05 9,800 6s664ms 0ms 06 18,760 24s192ms 1ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x1045fc7d624a02f9e90975372839776c', 'RHSA-2020:2774: virt:rhel security update (Important)', 'RHEL8-rhel-8.6-tus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2020-06-30 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2774 https://access.redhat.com/security/cve/CVE-2019-20382 https://access.redhat.com/security/cve/CVE-2020-8608', 'Important', 'High', 'qemu-kvm-block-ssh', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.6::realtime', 'rhel-cpe-repository', '', '15:2.12.0-99.module+el8.2.0+6870+55b789b4.2', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: Slirp: potential OOB access due to unsafe snprintf () usages (CVE - 2020 - 8608) * QEMU: vnc: memory leakage upon disconnect (CVE - 2019 - 20382);
Date: 2023-07-05 09:54:49 Duration: 616ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xb915c8fa31f78099d7bd0fd9eba7ab97', 'RHSA-2020:2774: virt:rhel security update (Important)', 'RHEL8-rhel-8', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2020-06-30 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2774 https://access.redhat.com/security/cve/CVE-2019-20382 https://access.redhat.com/security/cve/CVE-2020-8608', 'Important', 'High', 'libvirt-daemon-driver-interface', '', 'virt:rhel', 'i686', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:enterprise_linux:8::supplementary', 'rhel-cpe-repository', '', '0:4.5.0-42.module+el8.2.0+6024+15a2423f', 'equals', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: Slirp: potential OOB access due to unsafe snprintf () usages (CVE - 2020 - 8608) * QEMU: vnc: memory leakage upon disconnect (CVE - 2019 - 20382);
Date: 2023-07-05 10:00:50 Duration: 563ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xd08ea45f9621cb9a7634e60b9215e23d', 'RHSA-2020:2774: virt:rhel security update (Important)', 'RHEL8-rhel-8.8-e4s', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2020-06-30 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:2774 https://access.redhat.com/security/cve/CVE-2019-20382 https://access.redhat.com/security/cve/CVE-2020-8608', 'Important', 'High', 'libvirt-daemon-driver-storage', '', 'virt:rhel', 'i686', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.8::sap_hana', 'rhel-cpe-repository', '', '0:4.5.0-42.module+el8.2.0+6024+15a2423f', 'equals', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: Slirp: potential OOB access due to unsafe snprintf () usages (CVE - 2020 - 8608) * QEMU: vnc: memory leakage upon disconnect (CVE - 2019 - 20382);
Date: 2023-07-05 09:56:42 Duration: 548ms Bind query: yes
11 0ms 618ms 1ms 17,807 19s36ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing; security fix (es) : * glibc: array overflow in backtrace functions for powerpc (cve - 2020 - 1751) * glibc: use - after - free in glob () function when expanding ~ user (cve - 2020 - 1752) * glibc: stack corruption from crafted input in cosl, sinl, sincosl, and tanl functions (cve - 2020 - 10029) for more details about the security issue (s), including the impact, a cvss score, acknowledgments, and other related information, refer to the cve page (s) listed in the references section. additional changes:;Times Reported Time consuming queries #11
Day Hour Count Duration Avg duration Jul 05 05 3,604 2s535ms 0ms 06 14,203 16s501ms 1ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x849494cddbceecf9cf8085f2e99daa1d', 'RHSA-2020:4444: glibc security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.6-e4s', 'The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.', '2020-11-04 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:4444 https://access.redhat.com/security/cve/CVE-2020-10029 https://access.redhat.com/security/cve/CVE-2020-1751 https://access.redhat.com/security/cve/CVE-2020-1752', 'Moderate', 'Medium', 'glibc-langpack-bg', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.6::highavailability', 'rhel-cpe-repository', '', '0:2.28-127.el8', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * glibc: array overflow in backtrace functions for powerpc (CVE - 2020 - 1751) * glibc: use - after - free in glob () function when expanding ~ user (CVE - 2020 - 1752) * glibc: stack corruption from crafted input in cosl, sinl, sincosl, and tanl functions (CVE - 2020 - 10029) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 10:01:51 Duration: 618ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x7f58a571ab75cd1a7f64ce988b8d7ce0', 'RHSA-2020:4444: glibc security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.8-eus', 'The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.', '2020-11-04 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:4444 https://access.redhat.com/security/cve/CVE-2020-10029 https://access.redhat.com/security/cve/CVE-2020-1751 https://access.redhat.com/security/cve/CVE-2020-1752', 'Moderate', 'Medium', 'glibc-langpack-ln', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::highavailability', 'rhel-cpe-repository', '', '0:2.28-127.el8', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * glibc: array overflow in backtrace functions for powerpc (CVE - 2020 - 1751) * glibc: use - after - free in glob () function when expanding ~ user (CVE - 2020 - 1752) * glibc: stack corruption from crafted input in cosl, sinl, sincosl, and tanl functions (CVE - 2020 - 10029) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 10:00:50 Duration: 562ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x9f06f5723b0fb61cd680e7d5ce22759e', 'RHSA-2020:4444: glibc security, bug fix, and enhancement update (Moderate)', 'RHEL8-rhel-8.4-eus', 'The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.', '2020-11-04 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:4444 https://access.redhat.com/security/cve/CVE-2020-10029 https://access.redhat.com/security/cve/CVE-2020-1751 https://access.redhat.com/security/cve/CVE-2020-1752', 'Moderate', 'Medium', 'glibc-langpack-kk', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_eus:8.4', 'rhel-cpe-repository', '', '0:2.28-127.el8', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * glibc: array overflow in backtrace functions for powerpc (CVE - 2020 - 1751) * glibc: use - after - free in glob () function when expanding ~ user (CVE - 2020 - 1752) * glibc: stack corruption from crafted input in cosl, sinl, sincosl, and tanl functions (CVE - 2020 - 10029) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 10:01:31 Duration: 546ms Bind query: yes
12 0ms 1s53ms 1ms 33,555 35s566ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing; security fix (es) : * qemu: block: iscsi: oob heap access via an unexpected response of iscsi server (cve - 2020 - 1711) * qemu: slirp: oob buffer access while emulating tcp protocols in tcp_emu () (cve - 2020 - 7039) for more details about the security issue (s), including the impact, a cvss score, acknowledgments, and other related information, refer to the cve page (s) listed in the references section. bug fix (es) :;Times Reported Time consuming queries #12
Day Hour Count Duration Avg duration Jul 05 05 22,495 23s 1ms 06 11,060 12s566ms 1ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x738dc3569d17777506c0bc063df880d7', 'RHSA-2020:1358: virt:rhel security and bug fix update (Important)', 'RHEL8-rhel-8.2-tus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. * libvirtd: error : virCPUx86UpdateLive:3110 : operation failed: guest CPU doesn''t match specification: missing features: fxsr_opt (BZ#1809510)', '2020-04-07 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:1358 https://access.redhat.com/security/cve/CVE-2020-1711 https://access.redhat.com/security/cve/CVE-2020-7039', 'Important', 'High', 'qemu-kvm-block-iscsi', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::highavailability', 'rhel-cpe-repository', '', '15:2.12.0-88.module+el8.1.0+5708+85d8e057.3', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server (CVE - 2020 - 1711) * QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu () (CVE - 2020 - 7039) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Bug Fix (es) :;
Date: 2023-07-05 09:55:13 Duration: 1s53ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x18e3e4b33254bac7a55a4202c7bdf2e9', 'RHSA-2020:1358: virt:rhel security and bug fix update (Important)', 'RHEL8-rhel-8.8-e4s', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. * libvirtd: error : virCPUx86UpdateLive:3110 : operation failed: guest CPU doesn''t match specification: missing features: fxsr_opt (BZ#1809510)', '2020-04-07 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:1358 https://access.redhat.com/security/cve/CVE-2020-1711 https://access.redhat.com/security/cve/CVE-2020-7039', 'Important', 'High', 'nbdkit-bash-completion', '', 'virt:rhel', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8', 'rhel-cpe-repository', '', '0:1.4.2-5.module+el8.1.0+4066+0f1aadab', 'invalid', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server (CVE - 2020 - 1711) * QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu () (CVE - 2020 - 7039) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Bug Fix (es) :;
Date: 2023-07-05 09:56:19 Duration: 954ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x7260d22dffce660e21b0fdfae436e562', 'RHSA-2020:1358: virt:rhel security and bug fix update (Important)', 'RHEL8-rhel-8.8-tus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. * libvirtd: error : virCPUx86UpdateLive:3110 : operation failed: guest CPU doesn''t match specification: missing features: fxsr_opt (BZ#1809510)', '2020-04-07 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:1358 https://access.redhat.com/security/cve/CVE-2020-1711 https://access.redhat.com/security/cve/CVE-2020-7039', 'Important', 'High', 'hivex', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:1.3.15-7.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: block: iscsi: OOB heap access via an unexpected response of iSCSI Server (CVE - 2020 - 1711) * QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu () (CVE - 2020 - 7039) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Bug Fix (es) :;
Date: 2023-07-05 09:59:14 Duration: 754ms Bind query: yes
13 0ms 598ms 1ms 26,208 27s321ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing; security fix (es) : * qemu: regression of cve - 2020 - 10756 fix in virt:rhel / qemu - kvm in red hat enterprise linux ?.? (cve - 2021 - 20295);Times Reported Time consuming queries #13
Day Hour Count Duration Avg duration Jul 05 05 5,304 3s947ms 0ms 06 20,904 23s374ms 1ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x81e76d4e1470215277c655e85f408a75', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'libvirt-daemon-kvm', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::sap_hana', 'rhel-cpe-repository', '', '0:6.0.0-28.1.module+el8.3.0+10448+0c705bc6', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: Regression of CVE - 2020 - 10756 fix in virt:rhel / qemu - kvm in Red Hat Enterprise Linux 8.3 (CVE - 2021 - 20295);
Date: 2023-07-05 10:02:01 Duration: 598ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x30b5c86ac55786758904b45ff783bba0', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.4-e4s', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'python3-libnbd', '', 'virt-devel:rhel', 'i686', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.4', 'rhel-cpe-repository', '', '0:1.2.2-1.module+el8.3.0+7353+9de0a3cc', 'equals', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: Regression of CVE - 2020 - 10756 fix in virt:rhel / qemu - kvm in Red Hat Enterprise Linux 8.3 (CVE - 2021 - 20295);
Date: 2023-07-05 10:02:57 Duration: 540ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x754a8d4019e6f0cd25c1659d6a4f8ea8', 'RHSA-2021:1064: virt:rhel and virt-devel:rhel security update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2021-04-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:1064 https://access.redhat.com/security/cve/CVE-2021-20295', 'Moderate', 'Medium', 'libvirt-daemon-driver-storage-mpath', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8', 'rhel-cpe-repository', '', '0:6.0.0-28.1.module+el8.3.0+10448+0c705bc6', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: Regression of CVE - 2020 - 10756 fix in virt:rhel / qemu - kvm in Red Hat Enterprise Linux 8.3 (CVE - 2021 - 20295);
Date: 2023-07-05 10:01:08 Duration: 531ms Bind query: yes
14 0ms 1s449ms 0ms 21,694 21s455ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing; security fix (es) : * glibc: ld_prefer_map_32bit_exec not ignored in setuid binaries (cve - 2019 - 19126) for more details about the security issue (s), including the impact, a cvss score, acknowledgments, and other related information, refer to the cve page (s) listed in the references section. additional changes:;Times Reported Time consuming queries #14
Day Hour Count Duration Avg duration Jul 05 05 9,210 4s574ms 0ms 06 12,484 16s881ms 1ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x5a2621d233b52a9694cf50ebd17cf002', 'RHSA-2020:1828: glibc security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.4-eus', 'The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:1828 https://access.redhat.com/security/cve/CVE-2019-19126', 'Low', 'Low', 'glibc-langpack-mfe', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.4::highavailability', 'rhel-cpe-repository', '', '0:2.28-101.el8', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * glibc: LD_PREFER_MAP_32BIT_EXEC not ignored in setuid binaries (CVE - 2019 - 19126) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 10:00:26 Duration: 1s449ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x67a00abec8689167bb1c2dded05701cc', 'RHSA-2020:1828: glibc security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.8-tus', 'The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:1828 https://access.redhat.com/security/cve/CVE-2019-19126', 'Low', 'Low', 'glibc-langpack-sa', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::nfv', 'rhel-cpe-repository', '', '0:2.28-101.el8', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * glibc: LD_PREFER_MAP_32BIT_EXEC not ignored in setuid binaries (CVE - 2019 - 19126) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 09:59:44 Duration: 613ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xeae5bac567ac31de9bf9b2cd01397811', 'RHSA-2020:1828: glibc security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.4-e4s', 'The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.2 Release Notes linked from the References section.', '2020-04-28 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:1828 https://access.redhat.com/security/cve/CVE-2019-19126', 'Low', 'Low', 'glibc-langpack-raj', '', '', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.4::sap', 'rhel-cpe-repository', '', '0:2.28-101.el8', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * glibc: LD_PREFER_MAP_32BIT_EXEC not ignored in setuid binaries (CVE - 2019 - 19126) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 10:01:25 Duration: 552ms Bind query: yes
15 0ms 2s443ms 0ms 38,837 38s237ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing; security fix (es) : * hw: tsx transaction asynchronous abort (taa) (cve - 2019 - 11135);Times Reported Time consuming queries #15
Day Hour Count Duration Avg duration Jul 05 05 25,892 25s890ms 0ms 06 12,945 12s347ms 0ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x48d59293108970ea766a305eec31632d', 'RHSA-2020:0279: virt:rhel security update (Moderate)', 'RHEL8-rhel-8.1-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2020-01-29 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:0279 https://access.redhat.com/security/cve/CVE-2019-11135', 'Moderate', 'Medium', 'libvirt-daemon', '', 'virt:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.1::sap_hana', 'rhel-cpe-repository', '', '0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * hw: TSX Transaction Asynchronous Abort (TAA) (CVE - 2019 - 11135);
Date: 2023-07-05 09:57:59 Duration: 2s443ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x9ee761856622187e49c7b19236c4e98b', 'RHSA-2020:0279: virt:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2020-01-29 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:0279 https://access.redhat.com/security/cve/CVE-2019-11135', 'Moderate', 'Medium', 'libvirt-daemon-driver-interface', '', 'virt-devel:rhel', 'i686', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::resilientstorage', 'rhel-cpe-repository', '', '0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730', 'equals', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * hw: TSX Transaction Asynchronous Abort (TAA) (CVE - 2019 - 11135);
Date: 2023-07-05 09:59:11 Duration: 1s168ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xa9a4674d16fb7f661686d48f428051f2', 'RHSA-2020:0279: virt:rhel security update (Moderate)', 'RHEL8-rhel-8.8-eus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2020-01-29 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2020:0279 https://access.redhat.com/security/cve/CVE-2019-11135', 'Moderate', 'Medium', 'libvirt-daemon-driver-storage-scsi', '', 'virt:rhel', 'i686', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_eus:8.8::sap_hana', 'rhel-cpe-repository', '', '0:4.5.0-35.2.module+el8.1.0+5256+4b9ab730', 'equals', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * hw: TSX Transaction Asynchronous Abort (TAA) (CVE - 2019 - 11135);
Date: 2023-07-05 09:59:12 Duration: 686ms Bind query: yes
16 0ms 617ms 0ms 24,021 23s117ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing; security fix (es) : * qemu: msix: oob access during mmio operations may lead to dos (cve - 2020 - 13754) * hivex: buffer overflow when provided invalid node key length(cve - 2021 - 3504) * qemu: net: an assert failure via eth_get_gso_type (cve - 2020 - 27617) * qemu: net: infinite loop in loopback mode may lead to stack overflow (cve - 2021 - 3416) * qemu: out - of - bound heap buffer access via an interrupt id field (cve - 2021 - 20221) for more details about the security issue (s), including the impact, a cvss score, acknowledgments, and other related information, refer to the cve page (s) listed in the references section. bug fix (es) : * cannot restart default network and firewalld: iptables: no chain / target / match by that name. (bz # ?);Times Reported Time consuming queries #16
Day Hour Count Duration Avg duration Jul 05 05 5,304 4s661ms 0ms 06 18,717 18s456ms 0ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x78b9db9d5221d3f982235e235d749146', 'RHSA-2021:3061: virt:rhel and virt-devel:rhel security and bug fix update (Moderate)', 'RHEL8-rhel-8.6-tus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. * RHEL8.4 Nightly[0322] - KVM guest fails to find zipl boot menu index (qemu-kvm) (BZ#1975679)', '2021-08-10 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:3061 https://access.redhat.com/security/cve/CVE-2020-13754 https://access.redhat.com/security/cve/CVE-2020-27617 https://access.redhat.com/security/cve/CVE-2021-20221 https://access.redhat.com/security/cve/CVE-2021-3416 https://access.redhat.com/security/cve/CVE-2021-3504', 'Moderate', 'Medium', 'nbdkit-basic-filters', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.6::highavailability', 'rhel-cpe-repository', '', '0:1.16.2-4.module+el8.3.0+6922+fd575af8', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: msix: OOB access during mmio operations may lead to DoS (CVE - 2020 - 13754) * hivex: Buffer overflow when provided invalid node key length(CVE - 2021 - 3504) * QEMU: net: an assert failure via eth_get_gso_type (CVE - 2020 - 27617) * QEMU: net: infinite loop in loopback mode may lead to stack overflow (CVE - 2021 - 3416) * qemu: out - of - bound heap buffer access via an interrupt ID field (CVE - 2021 - 20221) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Bug Fix (es) : * cannot restart default network and firewalld: iptables: No chain / target / match by that name. (BZ # 1958301);
Date: 2023-07-05 09:55:50 Duration: 617ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xc4504485b989a71506621c6008052b68', 'RHSA-2021:3061: virt:rhel and virt-devel:rhel security and bug fix update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. * RHEL8.4 Nightly[0322] - KVM guest fails to find zipl boot menu index (qemu-kvm) (BZ#1975679)', '2021-08-10 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:3061 https://access.redhat.com/security/cve/CVE-2020-13754 https://access.redhat.com/security/cve/CVE-2020-27617 https://access.redhat.com/security/cve/CVE-2021-20221 https://access.redhat.com/security/cve/CVE-2021-3416 https://access.redhat.com/security/cve/CVE-2021-3504', 'Moderate', 'Medium', 'libguestfs-tools-c', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_tus:8.8::baseos', 'rhel-cpe-repository', '', '1:1.40.2-27.module+el8.4.0+9282+0bdec052', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: msix: OOB access during mmio operations may lead to DoS (CVE - 2020 - 13754) * hivex: Buffer overflow when provided invalid node key length(CVE - 2021 - 3504) * QEMU: net: an assert failure via eth_get_gso_type (CVE - 2020 - 27617) * QEMU: net: infinite loop in loopback mode may lead to stack overflow (CVE - 2021 - 3416) * qemu: out - of - bound heap buffer access via an interrupt ID field (CVE - 2021 - 20221) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Bug Fix (es) : * cannot restart default network and firewalld: iptables: No chain / target / match by that name. (BZ # 1958301);
Date: 2023-07-05 10:02:01 Duration: 599ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xa649ebaf024befa33e00064ad64d3e75', 'RHSA-2021:3061: virt:rhel and virt-devel:rhel security and bug fix update (Moderate)', 'RHEL8-rhel-8.8-tus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. * RHEL8.4 Nightly[0322] - KVM guest fails to find zipl boot menu index (qemu-kvm) (BZ#1975679)', '2021-08-10 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2021:3061 https://access.redhat.com/security/cve/CVE-2020-13754 https://access.redhat.com/security/cve/CVE-2020-27617 https://access.redhat.com/security/cve/CVE-2021-20221 https://access.redhat.com/security/cve/CVE-2021-3416 https://access.redhat.com/security/cve/CVE-2021-3504', 'Moderate', 'Medium', 'libvirt-devel', '', 'virt-devel:rhel', 'i686', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.8::highavailability', 'rhel-cpe-repository', '', '0:6.0.0-35.1.module+el8.4.0+11273+64eb94ef', 'equals', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * QEMU: msix: OOB access during mmio operations may lead to DoS (CVE - 2020 - 13754) * hivex: Buffer overflow when provided invalid node key length(CVE - 2021 - 3504) * QEMU: net: an assert failure via eth_get_gso_type (CVE - 2020 - 27617) * QEMU: net: infinite loop in loopback mode may lead to stack overflow (CVE - 2021 - 3416) * qemu: out - of - bound heap buffer access via an interrupt ID field (CVE - 2021 - 20221) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Bug Fix (es) : * cannot restart default network and firewalld: iptables: No chain / target / match by that name. (BZ # 1958301);
Date: 2023-07-05 10:02:06 Duration: 545ms Bind query: yes
17 0ms 643ms 0ms 34,565 26s626ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing; security fix (es) : * texlive: arbitrary code execution allows document complied with older version( cve - 2023 - 32700);Times Reported Time consuming queries #17
Day Hour Count Duration Avg duration Jul 05 05 11,526 8s147ms 0ms 06 23,039 18s479ms 0ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xc67be2ef909848071d545a94f9ece08c', 'RHSA-2023:3661: texlive security update (Important)', 'RHEL8-rhel-8.1-e4s', 'The texlive packages contain TeXLive, an implementation of TeX for Linux or UNIX systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-06-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:3661 https://access.redhat.com/security/cve/CVE-2023-32700', 'Important', 'High', 'texlive-changebar', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_e4s:8.1::highavailability', 'rhel-cpe-repository', '', '7:20180414-15.el8_1', 'invalid', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * texlive: arbitrary code execution allows document complied with older version( CVE - 2023 - 32700);
Date: 2023-07-05 10:01:17 Duration: 643ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xeaeaf38af76d730665313a507440f451', 'RHSA-2023:3661: texlive security update (Important)', 'RHEL9-rhel-9.0-eus', 'The texlive packages contain TeXLive, an implementation of TeX for Linux or UNIX systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-06-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:3661 https://access.redhat.com/security/cve/CVE-2023-32700', 'Important', 'High', 'texlive-collection-latex', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '9', '', '9', '', 'cpe:2.3:o:redhat:enterprise_linux:9:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 9', 'cpe:/a:redhat:rhel_eus:9.0::sap_hana', 'rhel-cpe-repository', '', '9:20200406-26.el9_0', 'invalid', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * texlive: arbitrary code execution allows document complied with older version( CVE - 2023 - 32700);
Date: 2023-07-05 10:02:21 Duration: 567ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xaad9269f34d2d5b561e3fbba4be0241d', 'RHSA-2023:3661: texlive security update (Important)', 'RHEL8-rhel-8.8-e4s', 'The texlive packages contain TeXLive, an implementation of TeX for Linux or UNIX systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', '2023-06-19 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2023:3661 https://access.redhat.com/security/cve/CVE-2023-32700', 'Important', 'High', 'texlive-ntgclass', '', '', '', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_e4s:8.8::baseos', 'rhel-cpe-repository', '', '7:20180414-29.el8_8', 'invalid', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * texlive: arbitrary code execution allows document complied with older version( CVE - 2023 - 32700);
Date: 2023-07-05 10:02:21 Duration: 567ms Bind query: yes
18 0ms 754ms 0ms 33,558 25s511ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing; security fix (es) : * ntfs - 3g: heap - based buffer overflow leads to local root privilege escalation (cve - 2019 - 9755) * qemu: slirp: information leakage in tcp_emu () due to uninitialized stack variables (cve - 2019 - 9824) * qemu: qxl: null pointer dereference while releasing spice resources (cve - 2019 - 12155) for more details about the security issue (s), including the impact, a cvss score, acknowledgments, and other related information, refer to the cve page (s) listed in the references section. additional changes:;Times Reported Time consuming queries #18
Day Hour Count Duration Avg duration Jul 05 05 26,226 17s328ms 0ms 06 7,332 8s183ms 1ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x9290fccdd66356e8f6014a591086b79e', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.4-aus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libvirt-daemon-config-network', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_aus:8.4::appstream', 'rhel-cpe-repository', '', '0:4.5.0-35.module+el8.1.0+4227+b2722cb3', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * ntfs - 3g: heap - based buffer overflow leads to local root privilege escalation (CVE - 2019 - 9755) * QEMU: slirp: information leakage in tcp_emu () due to uninitialized stack variables (CVE - 2019 - 9824) * QEMU: qxl: null pointer dereference while releasing spice resources (CVE - 2019 - 12155) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 09:59:14 Duration: 754ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x49b42d8ae3963d9948160455fd0b5112', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.4-aus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'hivex-devel', '', 'virt-devel:rhel', 'aarch64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/o:redhat:rhel_aus:8.4::baseos', 'rhel-cpe-repository', '', '0:1.3.15-7.module+el8.1.0+4066+0f1aadab', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * ntfs - 3g: heap - based buffer overflow leads to local root privilege escalation (CVE - 2019 - 9755) * QEMU: slirp: information leakage in tcp_emu () due to uninitialized stack variables (CVE - 2019 - 9824) * QEMU: qxl: null pointer dereference while releasing spice resources (CVE - 2019 - 12155) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 09:59:12 Duration: 686ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x26df034c43f63073ce880a4509119ff2', 'RHSA-2019:3345: virt:rhel security, bug fix, and enhancement update (Low)', 'RHEL8-rhel-8.2-tus', 'Kernel-based Virtual Machine (KVM) offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.', '2019-11-05 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2019:3345 https://access.redhat.com/security/cve/CVE-2019-12155 https://access.redhat.com/security/cve/CVE-2019-9755 https://access.redhat.com/security/cve/CVE-2019-9824', 'Low', 'Low', 'libvirt-daemon-driver-nwfilter', '', 'virt-devel:rhel', 'i686', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '8', '', '8', '', 'cpe:2.3:o:redhat:enterprise_linux:8:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 8', 'cpe:/a:redhat:rhel_tus:8.2::nfv', 'rhel-cpe-repository', '', '0:4.5.0-35.module+el8.1.0+4227+b2722cb3', 'equals', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) : * ntfs - 3g: heap - based buffer overflow leads to local root privilege escalation (CVE - 2019 - 9755) * QEMU: slirp: information leakage in tcp_emu () due to uninitialized stack variables (CVE - 2019 - 9824) * QEMU: qxl: null pointer dereference while releasing spice resources (CVE - 2019 - 12155) For more details about the security issue (s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page (s) listed in the References section. Additional Changes:;
Date: 2023-07-05 09:54:53 Duration: 586ms Bind query: yes
19 0ms 625ms 0ms 23,399 16s981ms insert into vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) values (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, null, versionrange (?, ?)) on conflict (hash_kind, hash) do nothing; security fix (es) :;Times Reported Time consuming queries #19
Day Hour Count Duration Avg duration Jul 05 05 11,397 8s255ms 0ms 06 12,002 8s725ms 0ms -
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\xf925813f727603ee16c86fa73e162ac3', 'RHSA-2018:0242: erlang security update (Low)', 'RHEL7-openstack-12-including-unpatched', 'Erlang is a general-purpose programming language and runtime environment. Erlang has built-in support for concurrency, distribution and fault tolerance. * An erlang TLS server configured with cipher suites using RSA key exchange, may be vulnerable to an Adaptive Chosen Ciphertext attack (AKA Bleichenbacher attack) against RSA. This may result in plain-text recovery of encrypted messages and/or a man-in-the-middle (MiTM) attack, despite the attacker not having gained access to the server’s private key itself. (CVE-2017-1000385)', '2018-01-30 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:0242 https://access.redhat.com/security/cve/CVE-2017-1000385', 'Low', 'Low', 'erlang-ssh', '', '', 'ppc64le|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:openstack:12::el7', 'rhel-cpe-repository', '', '0:18.3.4.7-1.el7ost', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) :;
Date: 2023-07-05 10:01:51 Duration: 625ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x985679a218dd1a05db587c58659d590d', 'RHSA-2016:1025: pcre security update (Important)', 'RHEL7-rhel-7.7-tus', 'PCRE is a Perl-compatible regular expression library. * Multiple flaws were found in the way PCRE handled malformed regular expressions. An attacker able to make an application using PCRE process a specially crafted regular expression could use these flaws to cause the application to crash or, possibly, execute arbitrary code. (CVE-2015-8385, CVE-2016-3191, CVE-2015-2328, CVE-2015-3217, CVE-2015-5073, CVE-2015-8388, CVE-2015-8391, CVE-2015-8386)', '2016-05-11 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2016:1025 https://access.redhat.com/security/cve/CVE-2015-2328 https://access.redhat.com/security/cve/CVE-2015-3217 https://access.redhat.com/security/cve/CVE-2015-5073 https://access.redhat.com/security/cve/CVE-2015-8385 https://access.redhat.com/security/cve/CVE-2015-8386 https://access.redhat.com/security/cve/CVE-2015-8388 https://access.redhat.com/security/cve/CVE-2015-8391 https://access.redhat.com/security/cve/CVE-2016-3191', 'Important', 'High', 'pcre-devel', '', '', 'i686|ppc|ppc64|ppc64le|s390|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/o:redhat:rhel_tus:7.7', 'rhel-cpe-repository', '', '0:8.32-15.el7_2.1', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) :;
Date: 2023-07-05 09:59:08 Duration: 576ms Bind query: yes
-
INSERT INTO vuln (hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range) VALUES ('md5', '\x1d1d7016d43bc20a911bc72da44d8778', 'RHSA-2018:0260: systemd security update (Moderate)', 'RHEL7-rhel-7.4-e4s', 'The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. * A race condition was found in systemd. This could result in automount requests not being serviced and processes using them could hang, causing denial of service. (CVE-2018-1049)', '2018-01-31 00:00:00+00', 'https://access.redhat.com/errata/RHSA-2018:0260 https://access.redhat.com/security/cve/CVE-2018-1049', 'Moderate', 'Medium', 'systemd-networkd', '', '', 'aarch64|ppc64|ppc64le|s390x|x86_64', 'binary', 'rhel', 'Red Hat Enterprise Linux Server', '7', '', '7', '', 'cpe:2.3:o:redhat:enterprise_linux:7:*:*:*:*:*:*:*', 'Red Hat Enterprise Linux Server 7', 'cpe:/a:redhat:rhel_extras_sap_e4s:7.4', 'rhel-cpe-repository', '', '0:219-42.el7_4.7', 'pattern match', NULL, VersionRange ('{}', '{}')) ON CONFLICT (hash_kind, hash) DO NOTHING; Security Fix (es) :;
Date: 2023-07-05 10:01:25 Duration: 552ms Bind query: yes
20 0ms 5s688ms 0ms 5,639,953 1h3m16s insert into uo_vuln (uo, vuln) values (?, ( select id from vuln where hash_kind = ? and hash = ?)) on conflict do nothing;Times Reported Time consuming queries #20
Day Hour Count Duration Avg duration Jul 05 05 3,331,843 29m44s 0ms 06 2,308,110 33m31s 0ms -
INSERT INTO uo_vuln (uo, vuln) VALUES ('116', ( SELECT id FROM vuln WHERE hash_kind = 'md5' AND hash = '\xd272d49019a19ad51c9d97dcc75e80f9')) ON CONFLICT DO NOTHING;
Date: 2023-07-05 10:04:12 Duration: 5s688ms Bind query: yes
-
INSERT INTO uo_vuln (uo, vuln) VALUES ('183', ( SELECT id FROM vuln WHERE hash_kind = 'md5' AND hash = '\xb901bd34a5fb6e05fe1d78a5c6a7f7da')) ON CONFLICT DO NOTHING;
Date: 2023-07-05 10:04:12 Duration: 5s688ms Bind query: yes
-
INSERT INTO uo_vuln (uo, vuln) VALUES ('380', ( SELECT id FROM vuln WHERE hash_kind = 'md5' AND hash = '\xf17d15db9d96a5284af2bc0a1880978b')) ON CONFLICT DO NOTHING;
Date: 2023-07-05 10:04:12 Duration: 5s688ms Bind query: yes
Time consuming prepare
Rank Total duration Times executed Min duration Max duration Avg duration Query 1 86ms 1,235 0ms 0ms 0ms SELECT lock FROM pg_advisory_unlock($1) lock WHERE lock = true;Times Reported Time consuming prepare #1
Day Hour Count Duration Avg duration Jul 05 05 348 25ms 0ms 06 887 61ms 0ms -
SELECT lock FROM pg_advisory_unlock($1) lock WHERE lock = true;
Date: 2023-07-05 09:54:23 Duration: 0ms Database: postgres
-
SELECT lock FROM pg_advisory_unlock($1) lock WHERE lock = true;
Date: 2023-07-05 09:57:36 Duration: 0ms Database: postgres
-
SELECT lock FROM pg_advisory_unlock($1) lock WHERE lock = true;
Date: 2023-07-05 09:54:23 Duration: 0ms Database: postgres
2 64ms 1,329 0ms 0ms 0ms SELECT lock FROM pg_try_advisory_lock($1) lock WHERE lock = true;Times Reported Time consuming prepare #2
Day Hour Count Duration Avg duration 04 406 20ms 0ms 05 923 44ms 0ms -
SELECT lock FROM pg_try_advisory_lock($1) lock WHERE lock = true;
Date: 2023-07-05 09:57:35 Duration: 0ms Database: postgres
-
SELECT lock FROM pg_try_advisory_lock($1) lock WHERE lock = true;
Date: 2023-07-05 09:54:22 Duration: 0ms Database: postgres
-
SELECT lock FROM pg_try_advisory_lock($1) lock WHERE lock = true;
Date: 2023-07-05 09:54:23 Duration: 0ms Database: postgres
3 18ms 33 0ms 0ms 0ms SELECT ref, updater, fingerprint, date FROM update_operation WHERE updater = ANY ($1) AND kind = 'vulnerability' ORDER BY id DESC;Times Reported Time consuming prepare #3
Day Hour Count Duration Avg duration 04 31 17ms 0ms 05 2 1ms 0ms -
SELECT ref, updater, fingerprint, date FROM update_operation WHERE updater = ANY ($1) AND kind = 'vulnerability' ORDER BY id DESC;
Date: 2023-07-05 10:01:30 Duration: 0ms Database: postgres
-
SELECT ref, updater, fingerprint, date FROM update_operation WHERE updater = ANY ($1) AND kind = 'vulnerability' ORDER BY id DESC;
Date: 2023-07-05 09:57:35 Duration: 0ms Database: postgres
-
SELECT ref, updater, fingerprint, date FROM update_operation WHERE updater = ANY ($1) AND kind = 'vulnerability' ORDER BY id DESC;
Date: 2023-07-05 10:02:31 Duration: 0ms Database: postgres
4 12ms 44 0ms 2ms 0ms INSERT INTO updater_status (;Times Reported Time consuming prepare #4
Day Hour Count Duration Avg duration 04 24 7ms 0ms 05 20 4ms 0ms -
INSERT INTO updater_status (;
Date: 2023-07-05 09:55:55 Duration: 2ms Database: postgres
-
INSERT INTO updater_status (;
Date: 2023-07-05 09:58:43 Duration: 0ms Database: postgres
-
INSERT INTO updater_status (;
Date: 2023-07-05 10:02:31 Duration: 0ms Database: postgres
5 9ms 43 0ms 0ms 0ms ;Times Reported Time consuming prepare #5
Day Hour Count Duration Avg duration 04 33 7ms 0ms 05 10 1ms 0ms -
;
Date: 2023-07-05 09:54:44 Duration: 0ms Database: postgres
-
;
Date: 2023-07-05 09:57:19 Duration: 0ms Database: postgres
-
;
Date: 2023-07-05 10:05:14 Duration: 0ms Database: postgres
6 2ms 33 0ms 0ms 0ms INSERT INTO update_operation (updater, fingerprint, kind) VALUES ($1, $2, 'vulnerability') RETURNING id, ref;Times Reported Time consuming prepare #6
Day Hour Count Duration Avg duration 04 31 2ms 0ms 05 2 0ms 0ms -
INSERT INTO update_operation (updater, fingerprint, kind) VALUES ($1, $2, 'vulnerability') RETURNING id, ref;
Date: 2023-07-05 09:54:30 Duration: 0ms Database: postgres
-
INSERT INTO update_operation (updater, fingerprint, kind) VALUES ($1, $2, 'vulnerability') RETURNING id, ref;
Date: 2023-07-05 09:55:01 Duration: 0ms Database: postgres
-
INSERT INTO update_operation (updater, fingerprint, kind) VALUES ($1, $2, 'vulnerability') RETURNING id, ref;
Date: 2023-07-05 09:54:29 Duration: 0ms Database: postgres
7 0ms 1 0ms 0ms 0ms SELECT version FROM libvuln_migrations WHERE version = 1;Times Reported Time consuming prepare #7
Day Hour Count Duration Avg duration 04 1 0ms 0ms -
SELECT version FROM libvuln_migrations WHERE version = 1;
Date: 2023-07-05 09:57:19 Duration: 0ms Database: postgres
8 0ms 1 0ms 0ms 0ms SELECT version FROM notifier_migrations WHERE version = 1;Times Reported Time consuming prepare #8
Day Hour Count Duration Avg duration 04 1 0ms 0ms -
SELECT version FROM notifier_migrations WHERE version = 1;
Date: 2023-07-05 09:57:20 Duration: 0ms Database: postgres
9 0ms 1 0ms 0ms 0ms SELECT version FROM libindex_migrations WHERE version = 1;Times Reported Time consuming prepare #9
Day Hour Count Duration Avg duration 04 1 0ms 0ms -
SELECT version FROM libindex_migrations WHERE version = 1;
Date: 2023-07-05 09:57:19 Duration: 0ms Database: postgres
10 0ms 3 0ms 0ms 0ms SELECT ref, updater, fingerprint, date FROM update_operation WHERE updater = ANY ($1) AND kind = 'enrichment' ORDER BY id DESC;Times Reported Time consuming prepare #10
Day Hour Count Duration Avg duration 04 2 0ms 0ms 05 1 0ms 0ms -
SELECT ref, updater, fingerprint, date FROM update_operation WHERE updater = ANY ($1) AND kind = 'enrichment' ORDER BY id DESC;
Date: 2023-07-05 09:54:48 Duration: 0ms Database: postgres
-
SELECT ref, updater, fingerprint, date FROM update_operation WHERE updater = ANY ($1) AND kind = 'enrichment' ORDER BY id DESC;
Date: 2023-07-05 10:02:30 Duration: 0ms Database: postgres
-
SELECT ref, updater, fingerprint, date FROM update_operation WHERE updater = ANY ($1) AND kind = 'enrichment' ORDER BY id DESC;
Date: 2023-07-05 09:54:26 Duration: 0ms Database: postgres
11 0ms 1 0ms 0ms 0ms SELECT version FROM notifier_migrations WHERE version = 3;Times Reported Time consuming prepare #11
Day Hour Count Duration Avg duration 04 1 0ms 0ms -
SELECT version FROM notifier_migrations WHERE version = 3;
Date: 2023-07-05 09:57:20 Duration: 0ms Database: postgres
12 0ms 1 0ms 0ms 0ms SELECT version FROM notifier_migrations WHERE version = 2;Times Reported Time consuming prepare #12
Day Hour Count Duration Avg duration 04 1 0ms 0ms -
SELECT version FROM notifier_migrations WHERE version = 2;
Date: 2023-07-05 09:57:20 Duration: 0ms Database: postgres
13 0ms 1 0ms 0ms 0ms SELECT version FROM libvuln_migrations WHERE version = 2;Times Reported Time consuming prepare #13
Day Hour Count Duration Avg duration 04 1 0ms 0ms -
SELECT version FROM libvuln_migrations WHERE version = 2;
Date: 2023-07-05 09:57:19 Duration: 0ms Database: postgres
14 0ms 1 0ms 0ms 0ms SELECT version FROM libindex_migrations WHERE version = 2;Times Reported Time consuming prepare #14
Day Hour Count Duration Avg duration 04 1 0ms 0ms -
SELECT version FROM libindex_migrations WHERE version = 2;
Date: 2023-07-05 09:57:19 Duration: 0ms Database: postgres
15 0ms 1 0ms 0ms 0ms SELECT version FROM libindex_migrations WHERE version = 3;Times Reported Time consuming prepare #15
Day Hour Count Duration Avg duration 04 1 0ms 0ms -
SELECT version FROM libindex_migrations WHERE version = 3;
Date: 2023-07-05 09:57:19 Duration: 0ms Database: postgres
16 0ms 1 0ms 0ms 0ms SELECT version FROM libvuln_migrations WHERE version = 3;Times Reported Time consuming prepare #16
Day Hour Count Duration Avg duration 04 1 0ms 0ms -
SELECT version FROM libvuln_migrations WHERE version = 3;
Date: 2023-07-05 09:57:19 Duration: 0ms Database: postgres
17 0ms 1 0ms 0ms 0ms SELECT version FROM libvuln_migrations WHERE version = 4;Times Reported Time consuming prepare #17
Day Hour Count Duration Avg duration 04 1 0ms 0ms -
SELECT version FROM libvuln_migrations WHERE version = 4;
Date: 2023-07-05 09:57:19 Duration: 0ms Database: postgres
18 0ms 1 0ms 0ms 0ms SELECT version FROM libvuln_migrations WHERE version = 8;Times Reported Time consuming prepare #18
Day Hour Count Duration Avg duration 04 1 0ms 0ms -
SELECT version FROM libvuln_migrations WHERE version = 8;
Date: 2023-07-05 09:57:19 Duration: 0ms Database: postgres
19 0ms 1 0ms 0ms 0ms SELECT version FROM libindex_migrations WHERE version = 5;Times Reported Time consuming prepare #19
Day Hour Count Duration Avg duration 04 1 0ms 0ms -
SELECT version FROM libindex_migrations WHERE version = 5;
Date: 2023-07-05 09:57:19 Duration: 0ms Database: postgres
20 0ms 1 0ms 0ms 0ms SELECT version FROM libvuln_migrations WHERE version = 6;Times Reported Time consuming prepare #20
Day Hour Count Duration Avg duration 04 1 0ms 0ms -
SELECT version FROM libvuln_migrations WHERE version = 6;
Date: 2023-07-05 09:57:19 Duration: 0ms Database: postgres
Time consuming bind
Rank Total duration Times executed Min duration Max duration Avg duration Query 1 1m55s 11,704,775 0ms 48ms 0ms ;Times Reported Time consuming bind #1
Day Hour Count Duration Avg duration Jul 05 05 6,928,583 1m7s 0ms 06 4,776,192 48s782ms 0ms -
;
Date: 2023-07-05 10:05:15 Duration: 48ms Database: postgres parameters: $1 = 'RHEL7-satellite-6-including-unpatched'
-
;
Date: 2023-07-05 09:54:40 Duration: 24ms Database: postgres parameters: $1 = 'md5', $2 = '\x2b2db87fc69014c01dcbb64eba55a8bb', $3 = '116'
-
;
Date: 2023-07-05 10:05:18 Duration: 16ms Database: postgres parameters: $1 = 'RHEL7-openstack-7-including-unpatched'
2 216ms 1,231 0ms 3ms 0ms SELECT ref, updater, fingerprint, date FROM update_operation WHERE updater = ANY ($1) AND kind = 'vulnerability' ORDER BY id DESC;Times Reported Time consuming bind #2
Day Hour Count Duration Avg duration 04 376 75ms 0ms 05 855 140ms 0ms -
SELECT ref, updater, fingerprint, date FROM update_operation WHERE updater = ANY ($1) AND kind = 'vulnerability' ORDER BY id DESC;
Date: 2023-07-05 10:01:53 Duration: 3ms Database: postgres parameters: $1 = '{RHEL7-satellite-6.9}'
-
SELECT ref, updater, fingerprint, date FROM update_operation WHERE updater = ANY ($1) AND kind = 'vulnerability' ORDER BY id DESC;
Date: 2023-07-05 10:02:31 Duration: 1ms Database: postgres parameters: $1 = '{oracle-2019-updater}'
-
SELECT ref, updater, fingerprint, date FROM update_operation WHERE updater = ANY ($1) AND kind = 'vulnerability' ORDER BY id DESC;
Date: 2023-07-05 10:01:30 Duration: 1ms Database: postgres parameters: $1 = '{RHEL8-openshift-4.2}'
3 118ms 1,234 0ms 68ms 0ms INSERT INTO updater_status (;Times Reported Time consuming bind #3
Day Hour Count Duration Avg duration 04 348 81ms 0ms 05 886 36ms 0ms -
INSERT INTO updater_status (;
Date: 2023-07-05 09:55:55 Duration: 68ms Database: postgres parameters: $1 = 'debian/updater/stretch', $2 = '2023-07-05 09:54:22.097759+00', $3 = '"eaa065-5ffb875cad64e"'
-
INSERT INTO updater_status (;
Date: 2023-07-05 10:00:40 Duration: 10ms Database: postgres parameters: $1 = 'RHEL7-rhel-7.4-aus', $2 = '2023-07-05 09:59:54.651022+00', $3 = '{"Etag":"\"feb70ea9e1d812d8fd9a56c77ca091ba\"","Date":"Sat, 01 Jul 2023 10:19:25 GMT"}'
-
INSERT INTO updater_status (;
Date: 2023-07-05 10:01:53 Duration: 1ms Database: postgres parameters: $1 = 'RHEL8-rhel-8.4-aus', $2 = '2023-07-05 09:58:49.295215+00', $3 = '{"Etag":"\"e0ef7ac951d2213b4b338226882a57fe\"","Date":"Sat, 01 Jul 2023 10:20:35 GMT"}'
4 57ms 1,235 0ms 0ms 0ms SELECT lock FROM pg_advisory_unlock($1) lock WHERE lock = true;Times Reported Time consuming bind #4
Day Hour Count Duration Avg duration 04 348 17ms 0ms 05 887 40ms 0ms -
SELECT lock FROM pg_advisory_unlock($1) lock WHERE lock = true;
Date: 2023-07-05 09:54:23 Duration: 0ms Database: postgres parameters: $1 = '8878972083883425619'
-
SELECT lock FROM pg_advisory_unlock($1) lock WHERE lock = true;
Date: 2023-07-05 09:54:23 Duration: 0ms Database: postgres parameters: $1 = '-8337560708911360680'
-
SELECT lock FROM pg_advisory_unlock($1) lock WHERE lock = true;
Date: 2023-07-05 09:54:23 Duration: 0ms Database: postgres parameters: $1 = '5003301632533805246'
5 41ms 1,329 0ms 0ms 0ms SELECT lock FROM pg_try_advisory_lock($1) lock WHERE lock = true;Times Reported Time consuming bind #5
Day Hour Count Duration Avg duration 04 406 12ms 0ms 05 923 28ms 0ms -
SELECT lock FROM pg_try_advisory_lock($1) lock WHERE lock = true;
Date: 2023-07-05 09:54:23 Duration: 0ms Database: postgres parameters: $1 = '-6989712919943091481'
-
SELECT lock FROM pg_try_advisory_lock($1) lock WHERE lock = true;
Date: 2023-07-05 09:54:23 Duration: 0ms Database: postgres parameters: $1 = '-6771131361613414373'
-
SELECT lock FROM pg_try_advisory_lock($1) lock WHERE lock = true;
Date: 2023-07-05 09:54:23 Duration: 0ms Database: postgres parameters: $1 = '-1562801300025099319'
6 17ms 342 0ms 0ms 0ms INSERT INTO update_operation (updater, fingerprint, kind) VALUES ($1, $2, 'vulnerability') RETURNING id, ref;Times Reported Time consuming bind #6
Day Hour Count Duration Avg duration 04 212 11ms 0ms 05 130 6ms 0ms -
INSERT INTO update_operation (updater, fingerprint, kind) VALUES ($1, $2, 'vulnerability') RETURNING id, ref;
Date: 2023-07-05 09:57:43 Duration: 0ms Database: postgres parameters: $1 = 'RHEL8-rhel-8-including-unpatched', $2 = '{"Etag":"\"a599ee58275ef8b576f946bc4eeb013e\"","Date":"Wed, 05 Jul 2023 09:34:01 GMT"}'
-
INSERT INTO update_operation (updater, fingerprint, kind) VALUES ($1, $2, 'vulnerability') RETURNING id, ref;
Date: 2023-07-05 10:02:32 Duration: 0ms Database: postgres parameters: $1 = 'oracle-2019-updater', $2 = '{"Etag":"\"5d89c-59d19db819880\"","Date":"Mon, 27 Jan 2020 07:14:26 GMT"}'
-
INSERT INTO update_operation (updater, fingerprint, kind) VALUES ($1, $2, 'vulnerability') RETURNING id, ref;
Date: 2023-07-05 09:55:01 Duration: 0ms Database: postgres parameters: $1 = 'suse-updater-suse.linux.enterprise.server.12', $2 = '{"Etag":"\"5df3cfe-5a852dd4aba40\"","Date":"Thu, 18 Jun 2020 02:52:17 GMT"}'
7 0ms 1 0ms 0ms 0ms SELECT version FROM notifier_migrations WHERE version = 1;Times Reported Time consuming bind #7
Day Hour Count Duration Avg duration 04 1 0ms 0ms -
SELECT version FROM notifier_migrations WHERE version = 1;
Date: 2023-07-05 09:57:20 Duration: 0ms Database: postgres
8 0ms 1 0ms 0ms 0ms SELECT version FROM libindex_migrations WHERE version = 1;Times Reported Time consuming bind #8
Day Hour Count Duration Avg duration 04 1 0ms 0ms -
SELECT version FROM libindex_migrations WHERE version = 1;
Date: 2023-07-05 09:57:19 Duration: 0ms Database: postgres
9 0ms 1 0ms 0ms 0ms SELECT version FROM libvuln_migrations WHERE version = 1;Times Reported Time consuming bind #9
Day Hour Count Duration Avg duration 04 1 0ms 0ms -
SELECT version FROM libvuln_migrations WHERE version = 1;
Date: 2023-07-05 09:57:19 Duration: 0ms Database: postgres
10 0ms 3 0ms 0ms 0ms SELECT ref, updater, fingerprint, date FROM update_operation WHERE updater = ANY ($1) AND kind = 'enrichment' ORDER BY id DESC;Times Reported Time consuming bind #10
Day Hour Count Duration Avg duration 04 2 0ms 0ms 05 1 0ms 0ms -
SELECT ref, updater, fingerprint, date FROM update_operation WHERE updater = ANY ($1) AND kind = 'enrichment' ORDER BY id DESC;
Date: 2023-07-05 09:54:48 Duration: 0ms Database: postgres parameters: $1 = '{clair.cvss}'
-
SELECT ref, updater, fingerprint, date FROM update_operation WHERE updater = ANY ($1) AND kind = 'enrichment' ORDER BY id DESC;
Date: 2023-07-05 09:54:26 Duration: 0ms Database: postgres parameters: $1 = '{clair.cvss}'
-
SELECT ref, updater, fingerprint, date FROM update_operation WHERE updater = ANY ($1) AND kind = 'enrichment' ORDER BY id DESC;
Date: 2023-07-05 10:02:30 Duration: 0ms Database: postgres parameters: $1 = '{clair.cvss}'
11 0ms 1 0ms 0ms 0ms SELECT version FROM notifier_migrations WHERE version = 2;Times Reported Time consuming bind #11
Day Hour Count Duration Avg duration 04 1 0ms 0ms -
SELECT version FROM notifier_migrations WHERE version = 2;
Date: 2023-07-05 09:57:20 Duration: 0ms Database: postgres
12 0ms 1 0ms 0ms 0ms SELECT version FROM notifier_migrations WHERE version = 3;Times Reported Time consuming bind #12
Day Hour Count Duration Avg duration 04 1 0ms 0ms -
SELECT version FROM notifier_migrations WHERE version = 3;
Date: 2023-07-05 09:57:20 Duration: 0ms Database: postgres
13 0ms 1 0ms 0ms 0ms SELECT version FROM libvuln_migrations WHERE version = 5;Times Reported Time consuming bind #13
Day Hour Count Duration Avg duration 04 1 0ms 0ms -
SELECT version FROM libvuln_migrations WHERE version = 5;
Date: 2023-07-05 09:57:19 Duration: 0ms Database: postgres
14 0ms 1 0ms 0ms 0ms SELECT version FROM libvuln_migrations WHERE version = 7;Times Reported Time consuming bind #14
Day Hour Count Duration Avg duration 04 1 0ms 0ms -
SELECT version FROM libvuln_migrations WHERE version = 7;
Date: 2023-07-05 09:57:19 Duration: 0ms Database: postgres
15 0ms 1 0ms 0ms 0ms SELECT version FROM libindex_migrations WHERE version = 3;Times Reported Time consuming bind #15
Day Hour Count Duration Avg duration 04 1 0ms 0ms -
SELECT version FROM libindex_migrations WHERE version = 3;
Date: 2023-07-05 09:57:19 Duration: 0ms Database: postgres
16 0ms 1 0ms 0ms 0ms SELECT version FROM libvuln_migrations WHERE version = 2;Times Reported Time consuming bind #16
Day Hour Count Duration Avg duration 04 1 0ms 0ms -
SELECT version FROM libvuln_migrations WHERE version = 2;
Date: 2023-07-05 09:57:19 Duration: 0ms Database: postgres
17 0ms 1 0ms 0ms 0ms SELECT version FROM libindex_migrations WHERE version = 2;Times Reported Time consuming bind #17
Day Hour Count Duration Avg duration 04 1 0ms 0ms -
SELECT version FROM libindex_migrations WHERE version = 2;
Date: 2023-07-05 09:57:19 Duration: 0ms Database: postgres
18 0ms 1 0ms 0ms 0ms SELECT version FROM libvuln_migrations WHERE version = 8;Times Reported Time consuming bind #18
Day Hour Count Duration Avg duration 04 1 0ms 0ms -
SELECT version FROM libvuln_migrations WHERE version = 8;
Date: 2023-07-05 09:57:19 Duration: 0ms Database: postgres
19 0ms 1 0ms 0ms 0ms SELECT version FROM libindex_migrations WHERE version = 5;Times Reported Time consuming bind #19
Day Hour Count Duration Avg duration 04 1 0ms 0ms -
SELECT version FROM libindex_migrations WHERE version = 5;
Date: 2023-07-05 09:57:19 Duration: 0ms Database: postgres
20 0ms 1 0ms 0ms 0ms SELECT version FROM libvuln_migrations WHERE version = 4;Times Reported Time consuming bind #20
Day Hour Count Duration Avg duration 04 1 0ms 0ms -
SELECT version FROM libvuln_migrations WHERE version = 4;
Date: 2023-07-05 09:57:19 Duration: 0ms Database: postgres
-
Events
Log levels
Key values
- 46,884,650 Log entries
Events distribution
Key values
- 0 PANIC entries
- 5 FATAL entries
- 23 ERROR entries
- 0 WARNING entries
Most Frequent Errors/Events
Key values
- 16 Max number of times the same event was reported
- 28 Total events found
Rank Times reported Error 1 16 ERROR: canceling statement due to user request
Times Reported Most Frequent Error / Event #1
Day Hour Count Jul 05 05 1 06 15 - ERROR: canceling statement due to user request
Context: while inserting index tuple (222634,1) in relation "vuln"
Statement: INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ( $1, $2, $3, $4, $5, $6, $7, $8, $9, $10, $11, $12, $13, $14, $15, $16, $17, $18, $19, $20, $21, $22, $23, $24, $25, $26, $27, $28, VersionRange($29, $30) ) ON CONFLICT (hash_kind, hash) DO NOTHING;Date: 2023-07-05 09:58:43
2 6 LOG: process ... still waiting for ShareLock on transaction ... after ... ms
Times Reported Most Frequent Error / Event #2
Day Hour Count Jul 05 05 4 06 2 - LOG: process 1140 still waiting for ShareLock on transaction 1367 after 1000.495 ms
- LOG: process 1140 still waiting for ShareLock on transaction 1367 after 9978.306 ms
- LOG: process 1112 still waiting for ShareLock on transaction 1492 after 1000.530 ms
Detail: Process holding the lock: 1145. Wait queue: 1140.
Context: while inserting index tuple (222634,1) in relation "vuln"
Statement: INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ( $1, $2, $3, $4, $5, $6, $7, $8, $9, $10, $11, $12, $13, $14, $15, $16, $17, $18, $19, $20, $21, $22, $23, $24, $25, $26, $27, $28, VersionRange($29, $30) ) ON CONFLICT (hash_kind, hash) DO NOTHING;Date: 2023-07-05 09:57:44
Detail: Process holding the lock: 1145. Wait queue: 1140.
Context: while inserting index tuple (222634,1) in relation "vuln"
Statement: INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ( $1, $2, $3, $4, $5, $6, $7, $8, $9, $10, $11, $12, $13, $14, $15, $16, $17, $18, $19, $20, $21, $22, $23, $24, $25, $26, $27, $28, VersionRange($29, $30) ) ON CONFLICT (hash_kind, hash) DO NOTHING;Date: 2023-07-05 09:57:53
Detail: Process holding the lock: 1123. Wait queue: 1112.
Context: while inserting index tuple (264725,6) in relation "vuln"
Statement: INSERT INTO vuln ( hash_kind, hash, name, updater, description, issued, links, severity, normalized_severity, package_name, package_version, package_module, package_arch, package_kind, dist_id, dist_name, dist_version, dist_version_code_name, dist_version_id, dist_arch, dist_cpe, dist_pretty_name, repo_name, repo_key, repo_uri, fixed_in_version, arch_operation, version_kind, vulnerable_range ) VALUES ( $1, $2, $3, $4, $5, $6, $7, $8, $9, $10, $11, $12, $13, $14, $15, $16, $17, $18, $19, $20, $21, $22, $23, $24, $25, $26, $27, $28, VersionRange($29, $30) ) ON CONFLICT (hash_kind, hash) DO NOTHING;Date: 2023-07-05 09:58:20
3 5 FATAL: connection to client lost
Times Reported Most Frequent Error / Event #3
Day Hour Count Jul 05 06 5 - FATAL: connection to client lost
Date: 2023-07-05 10:05:14
4 1 LOG: database system was shut down at ... 2023-07-05 03:54:12.892 UTC ... DEBUG: checkpoint record is at 0/2D7CC130 2023-07-05 03:54:12.892 UTC ... DEBUG: redo record is at 0/2D7CC130; shutdown true 2023-07-05 03:54:12.892 UTC ... DEBUG: next transaction ID: 1048; next OID: 58854 2023-07-05 03:54:12.892 UTC ... DEBUG: next MultiXactId: 1; next MultiXactOffset: 0 2023-07-05 03:54:12.892 UTC ... DEBUG: oldest unfrozen transaction ID: 717, in database ... 2023-07-05 03:54:12.892 UTC ... DEBUG: oldest MultiXactId: 1, in database ... 2023-07-05 03:54:12.892 UTC ... DEBUG: commit timestamp Xid oldest/newest: 0/0 2023-07-05 03:54:12.892 UTC ... DEBUG: transaction ID wrap limit is 2147484364, limited by database with OID 1 2023-07-05 03:54:12.892 UTC ... DEBUG: MultiXactId wrap limit is 2147483648, limited by database with OID 1 2023-07-05 03:54:12.892 UTC ... DEBUG: starting up replication slots 2023-07-05 03:54:12.892 UTC ... DEBUG: xmin required by slots: data 0, catalog 0 2023-07-05 03:54:12.893 UTC ... DEBUG: MultiXactId wrap limit is 2147483648, limited by database with OID 1 2023-07-05 03:54:12.893 UTC ... DEBUG: MultiXact member stop limit is now 4294914944 based on MultiXact 1 2023-07-05 03:54:12.897 UTC ... DEBUG: starting background worker process "..."
Times Reported Most Frequent Error / Event #4
Day Hour Count Jul 05 23 1 - LOG: database system was shut down at 2023-07-05 03:54:12 UTC 2023-07-05 03:54:12.892 UTC [17] DEBUG: checkpoint record is at 0/2D7CC130 2023-07-05 03:54:12.892 UTC [17] DEBUG: redo record is at 0/2D7CC130; shutdown true 2023-07-05 03:54:12.892 UTC [17] DEBUG: next transaction ID: 1048; next OID: 58854 2023-07-05 03:54:12.892 UTC [17] DEBUG: next MultiXactId: 1; next MultiXactOffset: 0 2023-07-05 03:54:12.892 UTC [17] DEBUG: oldest unfrozen transaction ID: 717, in database 1 2023-07-05 03:54:12.892 UTC [17] DEBUG: oldest MultiXactId: 1, in database 1 2023-07-05 03:54:12.892 UTC [17] DEBUG: commit timestamp Xid oldest/newest: 0/0 2023-07-05 03:54:12.892 UTC [17] DEBUG: transaction ID wrap limit is 2147484364, limited by database with OID 1 2023-07-05 03:54:12.892 UTC [17] DEBUG: MultiXactId wrap limit is 2147483648, limited by database with OID 1 2023-07-05 03:54:12.892 UTC [17] DEBUG: starting up replication slots 2023-07-05 03:54:12.892 UTC [17] DEBUG: xmin required by slots: data 0, catalog 0 2023-07-05 03:54:12.893 UTC [17] DEBUG: MultiXactId wrap limit is 2147483648, limited by database with OID 1 2023-07-05 03:54:12.893 UTC [17] DEBUG: MultiXact member stop limit is now 4294914944 based on MultiXact 1 2023-07-05 03:54:12.897 UTC [1] DEBUG: starting background worker process "logical replication launcher"
Date: 2023-07-05 03:54:12