Search CVE reports
331 – 340 of 25258 results
CVE-2024-6119
Medium priorityIssue summary: Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process. Impact...
4 affected packages
edk2, nodejs, openssl, openssl1.0
Package | 20.04 LTS |
---|---|
edk2 | Needs evaluation |
nodejs | Not affected |
openssl | Not affected |
openssl1.0 | Not in release |
CVE-2024-45231
Low priorityDue to unhandled email sending failures, the django.contrib.auth.forms.PasswordResetForm class allowed remote attackers to enumerate user emails by issuing password reset requests and observing the outcomes. To mitigate this risk,...
1 affected packages
python-django
Package | 20.04 LTS |
---|---|
python-django | Fixed |
CVE-2024-45230
Medium priorityThe urlize() and urlizetrunc() template filters were subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.
1 affected packages
python-django
Package | 20.04 LTS |
---|---|
python-django | Fixed |
CVE-2024-45306
Medium priorityVim is an open source, command line text editor. Patch v9.1.0038 optimized how the cursor position is calculated and removed a loop, that verified that the cursor position always points inside a line and does not become invalid by...
1 affected packages
vim
Package | 20.04 LTS |
---|---|
vim | Needs evaluation |
CVE-2024-44947
Medium priorityIn the Linux kernel, the following vulnerability has been resolved: fuse: Initialize beyond-EOF page contents before setting uptodate fuse_notify_store(), unlike fuse_do_readpage(), does not enable page zeroing (because it can be...
121 affected packages
linux, linux-allwinner-5.19, linux-aws, linux-aws-5.0, linux-aws-5.11...
Package | 20.04 LTS |
---|---|
linux | Vulnerable |
linux-allwinner-5.19 | Not in release |
linux-aws | Vulnerable |
linux-aws-5.0 | Not in release |
linux-aws-5.11 | Ignored |
linux-aws-5.13 | Ignored |
linux-aws-5.15 | Vulnerable |
linux-aws-5.19 | Not in release |
linux-aws-5.3 | Not in release |
linux-aws-5.4 | Not in release |
linux-aws-5.8 | Ignored |
linux-aws-6.2 | Not in release |
linux-aws-6.5 | Not in release |
linux-aws-fips | Not in release |
linux-aws-hwe | Not in release |
linux-azure | Vulnerable |
linux-azure-4.15 | Not in release |
linux-azure-5.11 | Ignored |
linux-azure-5.13 | Ignored |
linux-azure-5.15 | Vulnerable |
linux-azure-5.19 | Not in release |
linux-azure-5.3 | Not in release |
linux-azure-5.4 | Not in release |
linux-azure-5.8 | Ignored |
linux-azure-6.2 | Not in release |
linux-azure-6.5 | Not in release |
linux-azure-edge | Not in release |
linux-azure-fde | Ignored |
linux-azure-fde-5.15 | Vulnerable |
linux-azure-fde-5.19 | Not in release |
linux-azure-fde-6.2 | Not in release |
linux-azure-fips | Not in release |
linux-bluefield | Vulnerable |
linux-fips | Not in release |
linux-gcp | Vulnerable |
linux-gcp-4.15 | Not in release |
linux-gcp-5.11 | Ignored |
linux-gcp-5.13 | Ignored |
linux-gcp-5.15 | Vulnerable |
linux-gcp-5.19 | Not in release |
linux-gcp-5.3 | Not in release |
linux-gcp-5.4 | Not in release |
linux-gcp-5.8 | Ignored |
linux-gcp-6.2 | Not in release |
linux-gcp-6.5 | Not in release |
linux-gcp-fips | Not in release |
linux-gke | Ignored |
linux-gke-4.15 | Not in release |
linux-gke-5.15 | Ignored |
linux-gke-5.4 | Not in release |
linux-gkeop | Vulnerable |
linux-gkeop-5.15 | Vulnerable |
linux-gkeop-5.4 | Not in release |
linux-hwe | Not in release |
linux-hwe-5.11 | Ignored |
linux-hwe-5.13 | Ignored |
linux-hwe-5.15 | Vulnerable |
linux-hwe-5.19 | Not in release |
linux-hwe-5.4 | Not in release |
linux-hwe-5.8 | Ignored |
linux-hwe-6.2 | Not in release |
linux-hwe-6.5 | Not in release |
linux-hwe-6.8 | Not in release |
linux-hwe-edge | Not in release |
linux-ibm | Vulnerable |
linux-ibm-5.15 | Vulnerable |
linux-ibm-5.4 | Not in release |
linux-intel | Not in release |
linux-intel-5.13 | Ignored |
linux-intel-iot-realtime | Not in release |
linux-intel-iotg | Not in release |
linux-intel-iotg-5.15 | Vulnerable |
linux-iot | Vulnerable |
linux-kvm | Vulnerable |
linux-lowlatency | Not in release |
linux-lowlatency-hwe-5.15 | Vulnerable |
linux-lowlatency-hwe-5.19 | Not in release |
linux-lowlatency-hwe-6.2 | Not in release |
linux-lowlatency-hwe-6.5 | Not in release |
linux-lowlatency-hwe-6.8 | Not in release |
linux-lts-xenial | Not in release |
linux-nvidia | Not in release |
linux-nvidia-6.2 | Not in release |
linux-nvidia-6.5 | Not in release |
linux-nvidia-6.8 | Not in release |
linux-nvidia-lowlatency | Not in release |
linux-oem | Not in release |
linux-oem-5.10 | Ignored |
linux-oem-5.13 | Ignored |
linux-oem-5.14 | Ignored |
linux-oem-5.17 | Not in release |
linux-oem-5.6 | Ignored |
linux-oem-6.0 | Not in release |
linux-oem-6.1 | Not in release |
linux-oem-6.5 | Not in release |
linux-oem-6.8 | Not in release |
linux-oracle | Vulnerable |
linux-oracle-5.0 | Not in release |
linux-oracle-5.11 | Ignored |
linux-oracle-5.13 | Ignored |
linux-oracle-5.15 | Vulnerable |
linux-oracle-5.3 | Not in release |
linux-oracle-5.4 | Not in release |
linux-oracle-5.8 | Ignored |
linux-oracle-6.5 | Not in release |
linux-raspi | Vulnerable |
linux-raspi-5.4 | Not in release |
linux-raspi-realtime | Not in release |
linux-raspi2 | Ignored |
linux-realtime | Not in release |
linux-riscv | Ignored |
linux-riscv-5.11 | Ignored |
linux-riscv-5.15 | Vulnerable |
linux-riscv-5.19 | Not in release |
linux-riscv-5.8 | Ignored |
linux-riscv-6.5 | Not in release |
linux-riscv-6.8 | Not in release |
linux-starfive-5.19 | Not in release |
linux-starfive-6.2 | Not in release |
linux-starfive-6.5 | Not in release |
linux-xilinx-zynqmp | Vulnerable |
CVE-2024-45508
Medium priorityHTMLDOC before 1.9.19 has an out-of-bounds write in parse_paragraph in ps-pdf.cxx because of an attempt to strip leading whitespace from a whitespace-only node.
1 affected packages
htmldoc
Package | 20.04 LTS |
---|---|
htmldoc | Needs evaluation |
CVE-2024-44946
Medium priorityIn the Linux kernel, the following vulnerability has been resolved: kcm: Serialise kcm_sendmsg() for the same socket. syzkaller reported UAF in kcm_release(). [0] The scenario is 1. Thread A builds a skb with MSG_MORE and sets...
121 affected packages
linux, linux-allwinner-5.19, linux-aws, linux-aws-5.0, linux-aws-5.11...
Package | 20.04 LTS |
---|---|
linux | Vulnerable |
linux-allwinner-5.19 | Not in release |
linux-aws | Vulnerable |
linux-aws-5.0 | Not in release |
linux-aws-5.11 | Ignored |
linux-aws-5.13 | Ignored |
linux-aws-5.15 | Vulnerable |
linux-aws-5.19 | Not in release |
linux-aws-5.3 | Not in release |
linux-aws-5.4 | Not in release |
linux-aws-5.8 | Ignored |
linux-aws-6.2 | Not in release |
linux-aws-6.5 | Not in release |
linux-aws-fips | Not in release |
linux-aws-hwe | Not in release |
linux-azure | Vulnerable |
linux-azure-4.15 | Not in release |
linux-azure-5.11 | Ignored |
linux-azure-5.13 | Ignored |
linux-azure-5.15 | Vulnerable |
linux-azure-5.19 | Not in release |
linux-azure-5.3 | Not in release |
linux-azure-5.4 | Not in release |
linux-azure-5.8 | Ignored |
linux-azure-6.2 | Not in release |
linux-azure-6.5 | Not in release |
linux-azure-edge | Not in release |
linux-azure-fde | Ignored |
linux-azure-fde-5.15 | Vulnerable |
linux-azure-fde-5.19 | Not in release |
linux-azure-fde-6.2 | Not in release |
linux-azure-fips | Not in release |
linux-bluefield | Vulnerable |
linux-fips | Not in release |
linux-gcp | Vulnerable |
linux-gcp-4.15 | Not in release |
linux-gcp-5.11 | Ignored |
linux-gcp-5.13 | Ignored |
linux-gcp-5.15 | Vulnerable |
linux-gcp-5.19 | Not in release |
linux-gcp-5.3 | Not in release |
linux-gcp-5.4 | Not in release |
linux-gcp-5.8 | Ignored |
linux-gcp-6.2 | Not in release |
linux-gcp-6.5 | Not in release |
linux-gcp-fips | Not in release |
linux-gke | Ignored |
linux-gke-4.15 | Not in release |
linux-gke-5.15 | Ignored |
linux-gke-5.4 | Not in release |
linux-gkeop | Vulnerable |
linux-gkeop-5.15 | Vulnerable |
linux-gkeop-5.4 | Not in release |
linux-hwe | Not in release |
linux-hwe-5.11 | Ignored |
linux-hwe-5.13 | Ignored |
linux-hwe-5.15 | Vulnerable |
linux-hwe-5.19 | Not in release |
linux-hwe-5.4 | Not in release |
linux-hwe-5.8 | Ignored |
linux-hwe-6.2 | Not in release |
linux-hwe-6.5 | Not in release |
linux-hwe-6.8 | Not in release |
linux-hwe-edge | Not in release |
linux-ibm | Vulnerable |
linux-ibm-5.15 | Vulnerable |
linux-ibm-5.4 | Not in release |
linux-intel | Not in release |
linux-intel-5.13 | Ignored |
linux-intel-iot-realtime | Not in release |
linux-intel-iotg | Not in release |
linux-intel-iotg-5.15 | Vulnerable |
linux-iot | Vulnerable |
linux-kvm | Vulnerable |
linux-lowlatency | Not in release |
linux-lowlatency-hwe-5.15 | Vulnerable |
linux-lowlatency-hwe-5.19 | Not in release |
linux-lowlatency-hwe-6.2 | Not in release |
linux-lowlatency-hwe-6.5 | Not in release |
linux-lowlatency-hwe-6.8 | Not in release |
linux-lts-xenial | Not in release |
linux-nvidia | Not in release |
linux-nvidia-6.2 | Not in release |
linux-nvidia-6.5 | Not in release |
linux-nvidia-6.8 | Not in release |
linux-nvidia-lowlatency | Not in release |
linux-oem | Not in release |
linux-oem-5.10 | Ignored |
linux-oem-5.13 | Ignored |
linux-oem-5.14 | Ignored |
linux-oem-5.17 | Not in release |
linux-oem-5.6 | Ignored |
linux-oem-6.0 | Not in release |
linux-oem-6.1 | Not in release |
linux-oem-6.5 | Not in release |
linux-oem-6.8 | Not in release |
linux-oracle | Vulnerable |
linux-oracle-5.0 | Not in release |
linux-oracle-5.11 | Ignored |
linux-oracle-5.13 | Ignored |
linux-oracle-5.15 | Vulnerable |
linux-oracle-5.3 | Not in release |
linux-oracle-5.4 | Not in release |
linux-oracle-5.8 | Ignored |
linux-oracle-6.5 | Not in release |
linux-raspi | Vulnerable |
linux-raspi-5.4 | Not in release |
linux-raspi-realtime | Not in release |
linux-raspi2 | Ignored |
linux-realtime | Not in release |
linux-riscv | Ignored |
linux-riscv-5.11 | Ignored |
linux-riscv-5.15 | Vulnerable |
linux-riscv-5.19 | Not in release |
linux-riscv-5.8 | Ignored |
linux-riscv-6.5 | Not in release |
linux-riscv-6.8 | Not in release |
linux-starfive-5.19 | Not in release |
linux-starfive-6.2 | Not in release |
linux-starfive-6.5 | Not in release |
linux-xilinx-zynqmp | Vulnerable |
CVE-2024-0111
Medium priorityNVIDIA CUDA Toolkit contains a vulnerability in command 'cuobjdump' where a user may cause a crash or produce incorrect output by passing a malformed ELF file. A successful exploit of this vulnerability may lead to a...
1 affected packages
nvidia-cuda-toolkit
Package | 20.04 LTS |
---|---|
nvidia-cuda-toolkit | Needs evaluation |
CVE-2024-0110
Medium priorityNVIDIA CUDA Toolkit contains a vulnerability in command `cuobjdump` where a user may cause an out-of-bound write by passing in a malformed ELF file. A successful exploit of this vulnerability may lead to code execution or denial...
1 affected packages
nvidia-cuda-toolkit
Package | 20.04 LTS |
---|---|
nvidia-cuda-toolkit | Needs evaluation |
CVE-2024-0109
Medium priorityNVIDIA CUDA Toolkit contains a vulnerability in command `cuobjdump` where a user may cause a crash by passing in a malformed ELF file. A successful exploit of this vulnerability may cause an out of bounds read in the unprivileged...
1 affected packages
nvidia-cuda-toolkit
Package | 20.04 LTS |
---|---|
nvidia-cuda-toolkit | Needs evaluation |