Your submission was sent successfully! Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

Search CVE reports


Toggle filters

171 – 180 of 21465 results

Status is adjusted based on your filters.


CVE-2024-50306

Medium priority
Needs evaluation

Unchecked return value can allow Apache Traffic Server to retain privileges on startup. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.5, from 10.0.0 through 10.0.1. Users are recommended to upgrade to version...

1 affected packages

trafficserver

Package 24.04 LTS
trafficserver Needs evaluation
Show less packages

CVE-2024-50305

Medium priority
Needs evaluation

Valid Host header field can cause Apache Traffic Server to crash on some platforms. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.5. Users are recommended to upgrade to version 9.2.6, which fixes the issue, or...

1 affected packages

trafficserver

Package 24.04 LTS
trafficserver Needs evaluation
Show less packages

CVE-2024-38479

Medium priority
Needs evaluation

Improper Input Validation vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.11, from 9.0.0 through 9.2.5. Users are recommended to upgrade to version 9.2.6, which fixes the...

1 affected packages

trafficserver

Package 24.04 LTS
trafficserver Needs evaluation
Show less packages

CVE-2023-34049

Medium priority

Not in release

The Salt-SSH pre-flight option copies the script to the target at a predictable path, which allows an attacker to force Salt-SSH to run their script. If an attacker has access to the target VM and knows the path to the pre-flight...

1 affected packages

salt

Package 24.04 LTS
salt Not in release
Show less packages

CVE-2023-4458

Medium priority
Not affected

A flaw was found within the parsing of extended attributes in the kernel ksmbd module. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An...

125 affected packages

linux, linux-allwinner-5.19, linux-aws, linux-aws-5.0, linux-aws-5.11...

Package 24.04 LTS
linux Not affected
linux-allwinner-5.19 Not in release
linux-aws Not affected
linux-aws-5.0 Not in release
linux-aws-5.11 Not in release
linux-aws-5.13 Not in release
linux-aws-5.15 Not in release
linux-aws-5.19 Not in release
linux-aws-5.3 Not in release
linux-aws-5.4 Not in release
linux-aws-5.8 Not in release
linux-aws-6.2 Not in release
linux-aws-6.5 Not in release
linux-aws-6.8 Not in release
linux-aws-fips Not in release
linux-aws-hwe Not in release
linux-azure Not affected
linux-azure-4.15 Not in release
linux-azure-5.11 Not in release
linux-azure-5.13 Not in release
linux-azure-5.15 Not in release
linux-azure-5.19 Not in release
linux-azure-5.3 Not in release
linux-azure-5.4 Not in release
linux-azure-5.8 Not in release
linux-azure-6.2 Not in release
linux-azure-6.5 Not in release
linux-azure-6.8 Not in release
linux-azure-edge Not in release
linux-azure-fde Not in release
linux-azure-fde-5.15 Not in release
linux-azure-fde-5.19 Not in release
linux-azure-fde-6.2 Not in release
linux-azure-fips Not in release
linux-bluefield Not in release
linux-fips Not in release
linux-gcp Not affected
linux-gcp-4.15 Not in release
linux-gcp-5.11 Not in release
linux-gcp-5.13 Not in release
linux-gcp-5.15 Not in release
linux-gcp-5.19 Not in release
linux-gcp-5.3 Not in release
linux-gcp-5.4 Not in release
linux-gcp-5.8 Not in release
linux-gcp-6.2 Not in release
linux-gcp-6.5 Not in release
linux-gcp-6.8 Not in release
linux-gcp-fips Not in release
linux-gke Not affected
linux-gke-4.15 Not in release
linux-gke-5.15 Not in release
linux-gke-5.4 Not in release
linux-gkeop Not affected
linux-gkeop-5.15 Not in release
linux-gkeop-5.4 Not in release
linux-hwe Not in release
linux-hwe-5.11 Not in release
linux-hwe-5.13 Not in release
linux-hwe-5.15 Not in release
linux-hwe-5.19 Not in release
linux-hwe-5.4 Not in release
linux-hwe-5.8 Not in release
linux-hwe-6.2 Not in release
linux-hwe-6.5 Not in release
linux-hwe-6.8 Not in release
linux-hwe-edge Not in release
linux-ibm Not affected
linux-ibm-5.15 Not in release
linux-ibm-5.4 Not in release
linux-intel Not affected
linux-intel-5.13 Not in release
linux-intel-iot-realtime Not in release
linux-intel-iotg Not in release
linux-intel-iotg-5.15 Not in release
linux-iot Not in release
linux-kvm Not in release
linux-lowlatency Not affected
linux-lowlatency-hwe-5.15 Not in release
linux-lowlatency-hwe-5.19 Not in release
linux-lowlatency-hwe-6.2 Not in release
linux-lowlatency-hwe-6.5 Not in release
linux-lowlatency-hwe-6.8 Not in release
linux-lts-xenial Not in release
linux-nvidia Not affected
linux-nvidia-6.2 Not in release
linux-nvidia-6.5 Not in release
linux-nvidia-6.8 Not in release
linux-nvidia-lowlatency Not affected
linux-oem Not in release
linux-oem-5.10 Not in release
linux-oem-5.13 Not in release
linux-oem-5.14 Not in release
linux-oem-5.17 Not in release
linux-oem-5.6 Not in release
linux-oem-6.0 Not in release
linux-oem-6.1 Not in release
linux-oem-6.5 Not in release
linux-oem-6.8 Not affected
linux-oracle Not affected
linux-oracle-5.0 Not in release
linux-oracle-5.11 Not in release
linux-oracle-5.13 Not in release
linux-oracle-5.15 Not in release
linux-oracle-5.3 Not in release
linux-oracle-5.4 Not in release
linux-oracle-5.8 Not in release
linux-oracle-6.5 Not in release
linux-oracle-6.8 Not in release
linux-raspi Not affected
linux-raspi-5.4 Not in release
linux-raspi-realtime Not in release
linux-raspi2 Not in release
linux-realtime Not in release
linux-riscv Not affected
linux-riscv-5.11 Not in release
linux-riscv-5.15 Not in release
linux-riscv-5.19 Not in release
linux-riscv-5.8 Not in release
linux-riscv-6.5 Not in release
linux-riscv-6.8 Not in release
linux-starfive-5.19 Not in release
linux-starfive-6.2 Not in release
linux-starfive-6.5 Not in release
linux-xilinx-zynqmp Not in release
Show all 125 packages Show less packages

CVE-2024-36275

Medium priority
Needs evaluation

NULL pointer dereference in some Intel(R) Optane(TM) PMem Management software versions before CR_MGMT_02.00.00.4040, CR_MGMT_03.00.00.0499 may allow a authenticated user to potentially enable denial of service via local access.

1 affected packages

ipmctl

Package 24.04 LTS
ipmctl Needs evaluation
Show less packages

CVE-2024-28051

Medium priority
Needs evaluation

Out-of-bounds read in some Intel(R) VPL software before version 24.1.4 may allow an authenticated user to potentially enable information disclosure via local access.

2 affected packages

intel-mediasdk, onevpl-intel-gpu

Package 24.04 LTS
intel-mediasdk Needs evaluation
onevpl-intel-gpu Needs evaluation
Show less packages

CVE-2024-28030

Medium priority
Needs evaluation

NULL pointer dereference in some Intel(R) VPL software before version 24.1.4 may allow an authenticated user to potentially enable denial of service via local access.

2 affected packages

intel-mediasdk, onevpl-intel-gpu

Package 24.04 LTS
intel-mediasdk Needs evaluation
onevpl-intel-gpu Needs evaluation
Show less packages

CVE-2024-23918

Medium priority
Vulnerable

Improper conditions check in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access.

1 affected packages

intel-microcode

Package 24.04 LTS
intel-microcode Vulnerable
Show less packages

CVE-2024-21853

Medium priority
Vulnerable

Improper finite state machines (FSMs) in the hardware logic in some 4th and 5th Generation Intel(R) Xeon(R) Processors may allow an authorized user to potentially enable denial of service via local access.

1 affected packages

intel-microcode

Package 24.04 LTS
intel-microcode Vulnerable
Show less packages