Your submission was sent successfully! Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

Search CVE reports


Toggle filters

171 – 180 of 26941 results

Status is adjusted based on your filters.


CVE-2024-3447

Medium priority
Needs evaluation

A heap-based buffer overflow was found in the SDHCI device emulation of QEMU. The bug is triggered when both `s->data_count` and the size of `s->fifo_buffer` are set to 0x200, leading to an out-of-bound access. A malicious guest...

1 affected packages

qemu

Package 20.04 LTS
qemu Needs evaluation
Show less packages

CVE-2024-50306

Medium priority
Needs evaluation

Unchecked return value can allow Apache Traffic Server to retain privileges on startup. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.5, from 10.0.0 through 10.0.1. Users are recommended to upgrade to version...

1 affected packages

trafficserver

Package 20.04 LTS
trafficserver Needs evaluation
Show less packages

CVE-2024-50305

Medium priority
Needs evaluation

Valid Host header field can cause Apache Traffic Server to crash on some platforms. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.5. Users are recommended to upgrade to version 9.2.6, which fixes the issue, or...

1 affected packages

trafficserver

Package 20.04 LTS
trafficserver Needs evaluation
Show less packages

CVE-2024-38479

Medium priority
Needs evaluation

Improper Input Validation vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.11, from 9.0.0 through 9.2.5. Users are recommended to upgrade to version 9.2.6, which fixes the...

1 affected packages

trafficserver

Package 20.04 LTS
trafficserver Needs evaluation
Show less packages

CVE-2023-34049

Medium priority

Not in release

The Salt-SSH pre-flight option copies the script to the target at a predictable path, which allows an attacker to force Salt-SSH to run their script. If an attacker has access to the target VM and knows the path to the pre-flight...

1 affected packages

salt

Package 20.04 LTS
salt Not in release
Show less packages

CVE-2023-4458

Medium priority

Some fixes available 1 of 26

A flaw was found within the parsing of extended attributes in the kernel ksmbd module. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An...

125 affected packages

linux, linux-allwinner-5.19, linux-aws, linux-aws-5.0, linux-aws-5.11...

Package 20.04 LTS
linux Vulnerable
linux-allwinner-5.19 Not in release
linux-aws Vulnerable
linux-aws-5.0 Not in release
linux-aws-5.11 Ignored
linux-aws-5.13 Ignored
linux-aws-5.15 Vulnerable
linux-aws-5.19 Not in release
linux-aws-5.3 Not in release
linux-aws-5.4 Not in release
linux-aws-5.8 Ignored
linux-aws-6.2 Not in release
linux-aws-6.5 Not in release
linux-aws-6.8 Not in release
linux-aws-fips Not in release
linux-aws-hwe Not in release
linux-azure Vulnerable
linux-azure-4.15 Not in release
linux-azure-5.11 Ignored
linux-azure-5.13 Ignored
linux-azure-5.15 Vulnerable
linux-azure-5.19 Not in release
linux-azure-5.3 Not in release
linux-azure-5.4 Not in release
linux-azure-5.8 Ignored
linux-azure-6.2 Not in release
linux-azure-6.5 Not in release
linux-azure-6.8 Not in release
linux-azure-edge Not in release
linux-azure-fde Ignored
linux-azure-fde-5.15 Fixed
linux-azure-fde-5.19 Not in release
linux-azure-fde-6.2 Not in release
linux-azure-fips Not in release
linux-bluefield Vulnerable
linux-fips Not in release
linux-gcp Vulnerable
linux-gcp-4.15 Not in release
linux-gcp-5.11 Ignored
linux-gcp-5.13 Ignored
linux-gcp-5.15 Vulnerable
linux-gcp-5.19 Not in release
linux-gcp-5.3 Not in release
linux-gcp-5.4 Not in release
linux-gcp-5.8 Ignored
linux-gcp-6.2 Not in release
linux-gcp-6.5 Not in release
linux-gcp-6.8 Not in release
linux-gcp-fips Not in release
linux-gke Ignored
linux-gke-4.15 Not in release
linux-gke-5.15 Ignored
linux-gke-5.4 Not in release
linux-gkeop Ignored
linux-gkeop-5.15 Vulnerable
linux-gkeop-5.4 Not in release
linux-hwe Not in release
linux-hwe-5.11 Ignored
linux-hwe-5.13 Ignored
linux-hwe-5.15 Vulnerable
linux-hwe-5.19 Not in release
linux-hwe-5.4 Not in release
linux-hwe-5.8 Ignored
linux-hwe-6.2 Not in release
linux-hwe-6.5 Not in release
linux-hwe-6.8 Not in release
linux-hwe-edge Not in release
linux-ibm Vulnerable
linux-ibm-5.15 Vulnerable
linux-ibm-5.4 Not in release
linux-intel Not in release
linux-intel-5.13 Ignored
linux-intel-iot-realtime Not in release
linux-intel-iotg Not in release
linux-intel-iotg-5.15 Vulnerable
linux-iot Vulnerable
linux-kvm Vulnerable
linux-lowlatency Not in release
linux-lowlatency-hwe-5.15 Vulnerable
linux-lowlatency-hwe-5.19 Not in release
linux-lowlatency-hwe-6.2 Not in release
linux-lowlatency-hwe-6.5 Not in release
linux-lowlatency-hwe-6.8 Not in release
linux-lts-xenial Not in release
linux-nvidia Not in release
linux-nvidia-6.2 Not in release
linux-nvidia-6.5 Not in release
linux-nvidia-6.8 Not in release
linux-nvidia-lowlatency Not in release
linux-oem Not in release
linux-oem-5.10 Ignored
linux-oem-5.13 Ignored
linux-oem-5.14 Ignored
linux-oem-5.17 Not in release
linux-oem-5.6 Ignored
linux-oem-6.0 Not in release
linux-oem-6.1 Not in release
linux-oem-6.5 Not in release
linux-oem-6.8 Not in release
linux-oracle Vulnerable
linux-oracle-5.0 Not in release
linux-oracle-5.11 Ignored
linux-oracle-5.13 Ignored
linux-oracle-5.15 Vulnerable
linux-oracle-5.3 Not in release
linux-oracle-5.4 Not in release
linux-oracle-5.8 Ignored
linux-oracle-6.5 Not in release
linux-oracle-6.8 Not in release
linux-raspi Vulnerable
linux-raspi-5.4 Not in release
linux-raspi-realtime Not in release
linux-raspi2 Ignored
linux-realtime Not in release
linux-riscv Ignored
linux-riscv-5.11 Ignored
linux-riscv-5.15 Vulnerable
linux-riscv-5.19 Not in release
linux-riscv-5.8 Ignored
linux-riscv-6.5 Not in release
linux-riscv-6.8 Not in release
linux-starfive-5.19 Not in release
linux-starfive-6.2 Not in release
linux-starfive-6.5 Not in release
linux-xilinx-zynqmp Vulnerable
Show all 125 packages Show less packages

CVE-2024-36275

Medium priority
Needs evaluation

NULL pointer dereference in some Intel(R) Optane(TM) PMem Management software versions before CR_MGMT_02.00.00.4040, CR_MGMT_03.00.00.0499 may allow a authenticated user to potentially enable denial of service via local access.

1 affected packages

ipmctl

Package 20.04 LTS
ipmctl Needs evaluation
Show less packages

CVE-2024-28051

Medium priority
Needs evaluation

Out-of-bounds read in some Intel(R) VPL software before version 24.1.4 may allow an authenticated user to potentially enable information disclosure via local access.

2 affected packages

intel-mediasdk, onevpl-intel-gpu

Package 20.04 LTS
intel-mediasdk Needs evaluation
onevpl-intel-gpu Not in release
Show less packages

CVE-2024-28030

Medium priority
Needs evaluation

NULL pointer dereference in some Intel(R) VPL software before version 24.1.4 may allow an authenticated user to potentially enable denial of service via local access.

2 affected packages

intel-mediasdk, onevpl-intel-gpu

Package 20.04 LTS
intel-mediasdk Needs evaluation
onevpl-intel-gpu Not in release
Show less packages

CVE-2024-23918

Medium priority
Vulnerable

Improper conditions check in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access.

1 affected packages

intel-microcode

Package 20.04 LTS
intel-microcode Vulnerable
Show less packages