Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

Search CVE reports


Toggle filters

311 – 320 of 30617 results

Status is adjusted based on your filters.


CVE-2024-44943

Medium priority
Ignored

In the Linux kernel, the following vulnerability has been resolved: mm: gup: stop abusing try_grab_folio A kernel warning was reported when pinning folio in CMA memory when launching SEV virtual machine. The splat looks like: [ ...

121 affected packages

linux, linux-allwinner-5.19, linux-aws, linux-aws-5.0, linux-aws-5.11...

Package 18.04 LTS
linux Not affected
linux-allwinner-5.19
linux-aws Not affected
linux-aws-5.0 Ignored
linux-aws-5.11
linux-aws-5.13
linux-aws-5.15
linux-aws-5.19
linux-aws-5.3 Ignored
linux-aws-5.4 Not affected
linux-aws-5.8
linux-aws-6.2
linux-aws-6.5
linux-aws-fips
linux-aws-hwe
linux-azure Ignored
linux-azure-4.15 Not affected
linux-azure-5.11
linux-azure-5.13
linux-azure-5.15
linux-azure-5.19
linux-azure-5.3 Ignored
linux-azure-5.4 Not affected
linux-azure-5.8
linux-azure-6.2
linux-azure-6.5
linux-azure-edge Ignored
linux-azure-fde
linux-azure-fde-5.15
linux-azure-fde-5.19
linux-azure-fde-6.2
linux-azure-fips
linux-bluefield
linux-fips
linux-gcp Ignored
linux-gcp-4.15 Not affected
linux-gcp-5.11
linux-gcp-5.13
linux-gcp-5.15
linux-gcp-5.19
linux-gcp-5.3 Ignored
linux-gcp-5.4 Not affected
linux-gcp-5.8
linux-gcp-6.2
linux-gcp-6.5
linux-gcp-fips
linux-gke
linux-gke-4.15 Ignored
linux-gke-5.15
linux-gke-5.4 Ignored
linux-gkeop
linux-gkeop-5.15
linux-gkeop-5.4 Ignored
linux-hwe Ignored
linux-hwe-5.11
linux-hwe-5.13
linux-hwe-5.15
linux-hwe-5.19
linux-hwe-5.4 Not affected
linux-hwe-5.8
linux-hwe-6.2
linux-hwe-6.5
linux-hwe-6.8
linux-hwe-edge Ignored
linux-ibm
linux-ibm-5.15
linux-ibm-5.4 Not affected
linux-intel Not in release
linux-intel-5.13
linux-intel-iot-realtime Not in release
linux-intel-iotg
linux-intel-iotg-5.15
linux-iot
linux-kvm Not affected
linux-lowlatency
linux-lowlatency-hwe-5.15
linux-lowlatency-hwe-5.19
linux-lowlatency-hwe-6.2
linux-lowlatency-hwe-6.5
linux-lowlatency-hwe-6.8
linux-lts-xenial
linux-nvidia
linux-nvidia-6.2
linux-nvidia-6.5
linux-nvidia-6.8
linux-nvidia-lowlatency
linux-oem Ignored
linux-oem-5.10
linux-oem-5.13
linux-oem-5.14
linux-oem-5.17
linux-oem-5.6
linux-oem-6.0
linux-oem-6.1
linux-oem-6.5
linux-oem-6.8
linux-oracle Not affected
linux-oracle-5.0 Ignored
linux-oracle-5.11
linux-oracle-5.13
linux-oracle-5.15
linux-oracle-5.3 Ignored
linux-oracle-5.4 Not affected
linux-oracle-5.8
linux-oracle-6.5
linux-raspi
linux-raspi-5.4 Not affected
linux-raspi-realtime Not in release
linux-raspi2
linux-realtime Not in release
linux-riscv
linux-riscv-5.11
linux-riscv-5.15
linux-riscv-5.19
linux-riscv-5.8
linux-riscv-6.5
linux-riscv-6.8
linux-starfive-5.19
linux-starfive-6.2
linux-starfive-6.5
linux-xilinx-zynqmp
Show all 121 packages Show less packages

CVE-2023-45896

Medium priority
Ignored

ntfs3 in the Linux kernel through 6.8.0 allows a physically proximate attacker to read kernel memory by mounting a filesystem (e.g., if a Linux distribution is configured to allow unprivileged mounts of removable media) and then...

121 affected packages

linux, linux-allwinner-5.19, linux-aws, linux-aws-5.0, linux-aws-5.11...

Package 18.04 LTS
linux Ignored
linux-allwinner-5.19
linux-aws Ignored
linux-aws-5.0 Ignored
linux-aws-5.11
linux-aws-5.13
linux-aws-5.15
linux-aws-5.19
linux-aws-5.3 Ignored
linux-aws-5.4 Ignored
linux-aws-5.8
linux-aws-6.2
linux-aws-6.5
linux-aws-fips
linux-aws-hwe
linux-azure Ignored
linux-azure-4.15 Ignored
linux-azure-5.11
linux-azure-5.13
linux-azure-5.15
linux-azure-5.19
linux-azure-5.3 Ignored
linux-azure-5.4 Ignored
linux-azure-5.8
linux-azure-6.2
linux-azure-6.5
linux-azure-edge Ignored
linux-azure-fde
linux-azure-fde-5.15
linux-azure-fde-5.19
linux-azure-fde-6.2
linux-azure-fips
linux-bluefield
linux-fips
linux-gcp Ignored
linux-gcp-4.15 Ignored
linux-gcp-5.11
linux-gcp-5.13
linux-gcp-5.15
linux-gcp-5.19
linux-gcp-5.3 Ignored
linux-gcp-5.4 Ignored
linux-gcp-5.8
linux-gcp-6.2
linux-gcp-6.5
linux-gcp-fips
linux-gke
linux-gke-4.15 Ignored
linux-gke-5.15
linux-gke-5.4 Ignored
linux-gkeop
linux-gkeop-5.15
linux-gkeop-5.4 Ignored
linux-hwe Ignored
linux-hwe-5.11
linux-hwe-5.13
linux-hwe-5.15
linux-hwe-5.19
linux-hwe-5.4 Ignored
linux-hwe-5.8
linux-hwe-6.2
linux-hwe-6.5
linux-hwe-6.8
linux-hwe-edge Ignored
linux-ibm
linux-ibm-5.15
linux-ibm-5.4 Ignored
linux-intel Not in release
linux-intel-5.13
linux-intel-iot-realtime Not in release
linux-intel-iotg
linux-intel-iotg-5.15
linux-iot
linux-kvm Ignored
linux-lowlatency
linux-lowlatency-hwe-5.15
linux-lowlatency-hwe-5.19
linux-lowlatency-hwe-6.2
linux-lowlatency-hwe-6.5
linux-lowlatency-hwe-6.8
linux-lts-xenial
linux-nvidia
linux-nvidia-6.2
linux-nvidia-6.5
linux-nvidia-6.8
linux-nvidia-lowlatency
linux-oem Ignored
linux-oem-5.10
linux-oem-5.13
linux-oem-5.14
linux-oem-5.17
linux-oem-5.6
linux-oem-6.0
linux-oem-6.1
linux-oem-6.5
linux-oem-6.8
linux-oracle Ignored
linux-oracle-5.0 Ignored
linux-oracle-5.11
linux-oracle-5.13
linux-oracle-5.15
linux-oracle-5.3 Ignored
linux-oracle-5.4 Ignored
linux-oracle-5.8
linux-oracle-6.5
linux-raspi
linux-raspi-5.4 Ignored
linux-raspi-realtime Not in release
linux-raspi2
linux-realtime Not in release
linux-riscv
linux-riscv-5.11
linux-riscv-5.15
linux-riscv-5.19
linux-riscv-5.8
linux-riscv-6.5
linux-riscv-6.8
linux-starfive-5.19
linux-starfive-6.2
linux-starfive-6.5
linux-xilinx-zynqmp
Show all 121 packages Show less packages

CVE-2024-5991

Medium priority
Needs evaluation

In function MatchDomainName(), input param str is treated as a NULL terminated string despite being user provided and unchecked. Specifically, the function X509_check_host() takes in a pointer and length to check against, with no...

1 affected packages

wolfssl

Package 18.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2024-5814

Medium priority
Needs evaluation

A malicious TLS1.2 server can force a TLS1.3 client with downgrade capability to use a ciphersuite that it did not agree to and achieve a successful connection. This is because, aside from the extensions, the client was skipping...

1 affected packages

wolfssl

Package 18.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2024-5288

Medium priority
Needs evaluation

An issue was discovered in wolfSSL before 5.7.0. A safe-error attack via Rowhammer, namely FAULT+PROBE, leads to ECDSA key disclosure. When WOLFSSL_CHECK_SIG_FAULTS is used in signing operations with private ECC keys, such as in...

1 affected packages

wolfssl

Package 18.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2024-1544

Medium priority
Needs evaluation

Generating the ECDSA nonce k samples a random number r and then truncates this randomness with a modular reduction mod n where n is the order of the elliptic curve. Meaning k = r mod n. The division used during the reduction...

1 affected packages

wolfssl

Package 18.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2024-42851

Medium priority
Needs evaluation

Buffer Overflow vulnerability in open source exiftags v.1.01 allows a local attacker to execute arbitrary code via the paresetag function.

1 affected packages

exiftags

Package 18.04 LTS
exiftags Needs evaluation
Show less packages

CVE-2024-43788

Medium priority
Needs evaluation

Webpack is a module bundler. Its main purpose is to bundle JavaScript files for usage in a browser, yet it is also capable of transforming, bundling, or packaging just about any resource or asset. The webpack developers...

1 affected packages

node-webpack

Package 18.04 LTS
node-webpack Needs evaluation
Show less packages

CVE-2024-8207

Medium priority
Needs evaluation

In certain highly specific configurations of the host system and MongoDB server binary installation on Linux Operating Systems, it may be possible for a unintended actor with host-level access to cause the MongoDB Server binary to...

1 affected packages

mongodb

Package 18.04 LTS
mongodb Needs evaluation
Show less packages

CVE-2024-45321

Medium priority
Needs evaluation

The App::cpanminus package through 1.7047 for Perl downloads code via insecure HTTP, enabling code execution for network attackers.

1 affected packages

cpanminus

Package 18.04 LTS
cpanminus Needs evaluation
Show less packages