Search CVE reports
1 – 10 of 392 results
CVE-2024-12797
High priorityIssue summary: Clients using RFC7250 Raw Public Keys (RPKs) to authenticate a server may fail to notice that the server was not authenticated, because handshakes don't abort as expected when the SSL_VERIFY_PEER...
4 affected packages
edk2, nodejs, openssl, openssl1.0
Package | 22.04 LTS |
---|---|
edk2 | Not affected |
nodejs | Not affected |
openssl | Not affected |
openssl1.0 | Not in release |
CVE-2025-24032
High priorityPAM-PKCS#11 is a Linux-PAM login module that allows a X.509 certificate based user login. Prior to version 0.6.13, if cert_policy is set to none (the default value), then pam_pkcs11 will only check if the user is capable of...
1 affected package
pam-pkcs11
Package | 22.04 LTS |
---|---|
pam-pkcs11 | Needs evaluation |
CVE-2025-24531
High priority[Possible Authentication Bypass in Error Situations]
1 affected package
pam-pkcs11
Package | 22.04 LTS |
---|---|
pam-pkcs11 | Needs evaluation |
CVE-2025-0411
High priority7-Zip Mark-of-the-Web Bypass Vulnerability. This vulnerability allows remote attackers to bypass the Mark-of-the-Web protection mechanism on affected installations of 7-Zip. User interaction is required to exploit this...
2 affected packages
7zip, p7zip
Package | 22.04 LTS |
---|---|
7zip | Not affected |
p7zip | Not affected |
CVE-2024-12084
High priorityA heap-based buffer overflow flaw was found in the rsync daemon. This issue is due to improper handling of attacker-controlled checksum lengths (s2length) in the code. When MAX_DIGEST_LEN exceeds the fixed SUM_LENGTH (16 bytes),...
1 affected package
rsync
Package | 22.04 LTS |
---|---|
rsync | Fixed |
CVE-2024-56672
High priorityIn the Linux kernel, the following vulnerability has been resolved: blk-cgroup: Fix UAF in blkcg_unpin_online() blkcg_unpin_online() walks up the blkcg hierarchy putting the online pin. To walk up, it uses blkcg_parent(blkcg) but...
126 affected packages
linux, linux-allwinner-5.19, linux-aws, linux-aws-5.0, linux-aws-5.11...
Package | 22.04 LTS |
---|---|
linux | Vulnerable |
linux-allwinner-5.19 | Ignored |
linux-aws | Vulnerable |
linux-aws-5.0 | Not in release |
linux-aws-5.11 | Not in release |
linux-aws-5.13 | Not in release |
linux-aws-5.15 | Not in release |
linux-aws-5.19 | Ignored |
linux-aws-5.3 | Not in release |
linux-aws-5.4 | Not in release |
linux-aws-5.8 | Not in release |
linux-aws-6.2 | Ignored |
linux-aws-6.5 | Ignored |
linux-aws-6.8 | Vulnerable |
linux-aws-fips | Vulnerable |
linux-aws-hwe | Not in release |
linux-azure | Vulnerable |
linux-azure-4.15 | Not in release |
linux-azure-5.11 | Not in release |
linux-azure-5.13 | Not in release |
linux-azure-5.15 | Not in release |
linux-azure-5.19 | Ignored |
linux-azure-5.3 | Not in release |
linux-azure-5.4 | Not in release |
linux-azure-5.8 | Not in release |
linux-azure-6.2 | Ignored |
linux-azure-6.5 | Ignored |
linux-azure-6.8 | Vulnerable |
linux-azure-edge | Not in release |
linux-azure-fde | Vulnerable |
linux-azure-fde-5.15 | Not in release |
linux-azure-fde-5.19 | Ignored |
linux-azure-fde-6.2 | Ignored |
linux-azure-fips | Vulnerable |
linux-bluefield | Not in release |
linux-fips | Vulnerable |
linux-gcp | Vulnerable |
linux-gcp-4.15 | Not in release |
linux-gcp-5.11 | Not in release |
linux-gcp-5.13 | Not in release |
linux-gcp-5.15 | Not in release |
linux-gcp-5.19 | Ignored |
linux-gcp-5.3 | Not in release |
linux-gcp-5.4 | Not in release |
linux-gcp-5.8 | Not in release |
linux-gcp-6.2 | Ignored |
linux-gcp-6.5 | Ignored |
linux-gcp-6.8 | Vulnerable |
linux-gcp-fips | Vulnerable |
linux-gke | Vulnerable |
linux-gke-4.15 | Not in release |
linux-gke-5.15 | Not in release |
linux-gke-5.4 | Not in release |
linux-gkeop | Vulnerable |
linux-gkeop-5.15 | Not in release |
linux-gkeop-5.4 | Not in release |
linux-hwe | Not in release |
linux-hwe-5.11 | Not in release |
linux-hwe-5.13 | Not in release |
linux-hwe-5.15 | Not in release |
linux-hwe-5.19 | Ignored |
linux-hwe-5.4 | Not in release |
linux-hwe-5.8 | Not in release |
linux-hwe-6.2 | Ignored |
linux-hwe-6.5 | Ignored |
linux-hwe-6.8 | Vulnerable |
linux-hwe-edge | Not in release |
linux-ibm | Vulnerable |
linux-ibm-5.15 | Not in release |
linux-ibm-5.4 | Not in release |
linux-intel | Not in release |
linux-intel-5.13 | Not in release |
linux-intel-iot-realtime | Vulnerable |
linux-intel-iotg | Vulnerable |
linux-intel-iotg-5.15 | Not in release |
linux-iot | Not in release |
linux-kvm | Vulnerable |
linux-lowlatency | Vulnerable |
linux-lowlatency-hwe-5.15 | Not in release |
linux-lowlatency-hwe-5.19 | Ignored |
linux-lowlatency-hwe-6.2 | Ignored |
linux-lowlatency-hwe-6.5 | Ignored |
linux-lowlatency-hwe-6.8 | Vulnerable |
linux-lts-xenial | Not in release |
linux-nvidia | Vulnerable |
linux-nvidia-6.2 | Ignored |
linux-nvidia-6.5 | Ignored |
linux-nvidia-6.8 | Vulnerable |
linux-nvidia-lowlatency | Not in release |
linux-oem | Not in release |
linux-oem-5.10 | Not in release |
linux-oem-5.13 | Not in release |
linux-oem-5.14 | Not in release |
linux-oem-5.17 | Ignored |
linux-oem-5.6 | Not in release |
linux-oem-6.0 | Ignored |
linux-oem-6.1 | Ignored |
linux-oem-6.11 | Not in release |
linux-oem-6.5 | Ignored |
linux-oem-6.8 | Not in release |
linux-oracle | Vulnerable |
linux-oracle-5.0 | Not in release |
linux-oracle-5.11 | Not in release |
linux-oracle-5.13 | Not in release |
linux-oracle-5.15 | Not in release |
linux-oracle-5.3 | Not in release |
linux-oracle-5.4 | Not in release |
linux-oracle-5.8 | Not in release |
linux-oracle-6.5 | Ignored |
linux-oracle-6.8 | Vulnerable |
linux-raspi | Vulnerable |
linux-raspi-5.4 | Not in release |
linux-raspi-realtime | Not in release |
linux-raspi2 | Not in release |
linux-realtime | Vulnerable |
linux-riscv | Ignored |
linux-riscv-5.11 | Not in release |
linux-riscv-5.15 | Not in release |
linux-riscv-5.19 | Ignored |
linux-riscv-5.8 | Not in release |
linux-riscv-6.5 | Ignored |
linux-riscv-6.8 | Vulnerable |
linux-starfive-5.19 | Ignored |
linux-starfive-6.2 | Ignored |
linux-starfive-6.5 | Ignored |
linux-xilinx-zynqmp | Vulnerable |
CVE-2024-56658
High priorityIn the Linux kernel, the following vulnerability has been resolved: net: defer final 'struct net' free in netns dismantle Ilya reported a slab-use-after-free in dst_destroy [1] Issue is in xfrm6_net_init() and xfrm4_net_init()...
126 affected packages
linux, linux-allwinner-5.19, linux-aws, linux-aws-5.0, linux-aws-5.11...
Package | 22.04 LTS |
---|---|
linux | Vulnerable |
linux-allwinner-5.19 | Ignored |
linux-aws | Vulnerable |
linux-aws-5.0 | Not in release |
linux-aws-5.11 | Not in release |
linux-aws-5.13 | Not in release |
linux-aws-5.15 | Not in release |
linux-aws-5.19 | Ignored |
linux-aws-5.3 | Not in release |
linux-aws-5.4 | Not in release |
linux-aws-5.8 | Not in release |
linux-aws-6.2 | Ignored |
linux-aws-6.5 | Ignored |
linux-aws-6.8 | Vulnerable |
linux-aws-fips | Vulnerable |
linux-aws-hwe | Not in release |
linux-azure | Vulnerable |
linux-azure-4.15 | Not in release |
linux-azure-5.11 | Not in release |
linux-azure-5.13 | Not in release |
linux-azure-5.15 | Not in release |
linux-azure-5.19 | Ignored |
linux-azure-5.3 | Not in release |
linux-azure-5.4 | Not in release |
linux-azure-5.8 | Not in release |
linux-azure-6.2 | Ignored |
linux-azure-6.5 | Ignored |
linux-azure-6.8 | Vulnerable |
linux-azure-edge | Not in release |
linux-azure-fde | Vulnerable |
linux-azure-fde-5.15 | Not in release |
linux-azure-fde-5.19 | Ignored |
linux-azure-fde-6.2 | Ignored |
linux-azure-fips | Vulnerable |
linux-bluefield | Not in release |
linux-fips | Vulnerable |
linux-gcp | Vulnerable |
linux-gcp-4.15 | Not in release |
linux-gcp-5.11 | Not in release |
linux-gcp-5.13 | Not in release |
linux-gcp-5.15 | Not in release |
linux-gcp-5.19 | Ignored |
linux-gcp-5.3 | Not in release |
linux-gcp-5.4 | Not in release |
linux-gcp-5.8 | Not in release |
linux-gcp-6.2 | Ignored |
linux-gcp-6.5 | Ignored |
linux-gcp-6.8 | Vulnerable |
linux-gcp-fips | Vulnerable |
linux-gke | Vulnerable |
linux-gke-4.15 | Not in release |
linux-gke-5.15 | Not in release |
linux-gke-5.4 | Not in release |
linux-gkeop | Vulnerable |
linux-gkeop-5.15 | Not in release |
linux-gkeop-5.4 | Not in release |
linux-hwe | Not in release |
linux-hwe-5.11 | Not in release |
linux-hwe-5.13 | Not in release |
linux-hwe-5.15 | Not in release |
linux-hwe-5.19 | Ignored |
linux-hwe-5.4 | Not in release |
linux-hwe-5.8 | Not in release |
linux-hwe-6.2 | Ignored |
linux-hwe-6.5 | Ignored |
linux-hwe-6.8 | Vulnerable |
linux-hwe-edge | Not in release |
linux-ibm | Vulnerable |
linux-ibm-5.15 | Not in release |
linux-ibm-5.4 | Not in release |
linux-intel | Not in release |
linux-intel-5.13 | Not in release |
linux-intel-iot-realtime | Vulnerable |
linux-intel-iotg | Vulnerable |
linux-intel-iotg-5.15 | Not in release |
linux-iot | Not in release |
linux-kvm | Vulnerable |
linux-lowlatency | Vulnerable |
linux-lowlatency-hwe-5.15 | Not in release |
linux-lowlatency-hwe-5.19 | Ignored |
linux-lowlatency-hwe-6.2 | Ignored |
linux-lowlatency-hwe-6.5 | Ignored |
linux-lowlatency-hwe-6.8 | Vulnerable |
linux-lts-xenial | Not in release |
linux-nvidia | Vulnerable |
linux-nvidia-6.2 | Ignored |
linux-nvidia-6.5 | Ignored |
linux-nvidia-6.8 | Vulnerable |
linux-nvidia-lowlatency | Not in release |
linux-oem | Not in release |
linux-oem-5.10 | Not in release |
linux-oem-5.13 | Not in release |
linux-oem-5.14 | Not in release |
linux-oem-5.17 | Ignored |
linux-oem-5.6 | Not in release |
linux-oem-6.0 | Ignored |
linux-oem-6.1 | Ignored |
linux-oem-6.11 | Not in release |
linux-oem-6.5 | Ignored |
linux-oem-6.8 | Not in release |
linux-oracle | Vulnerable |
linux-oracle-5.0 | Not in release |
linux-oracle-5.11 | Not in release |
linux-oracle-5.13 | Not in release |
linux-oracle-5.15 | Not in release |
linux-oracle-5.3 | Not in release |
linux-oracle-5.4 | Not in release |
linux-oracle-5.8 | Not in release |
linux-oracle-6.5 | Ignored |
linux-oracle-6.8 | Vulnerable |
linux-raspi | Vulnerable |
linux-raspi-5.4 | Not in release |
linux-raspi-realtime | Not in release |
linux-raspi2 | Not in release |
linux-realtime | Vulnerable |
linux-riscv | Ignored |
linux-riscv-5.11 | Not in release |
linux-riscv-5.15 | Not in release |
linux-riscv-5.19 | Ignored |
linux-riscv-5.8 | Not in release |
linux-riscv-6.5 | Ignored |
linux-riscv-6.8 | Vulnerable |
linux-starfive-5.19 | Ignored |
linux-starfive-6.2 | Ignored |
linux-starfive-6.5 | Ignored |
linux-xilinx-zynqmp | Vulnerable |
CVE-2024-53104
High priorityIn the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format This can lead to out of bounds writes since frames of this type were not taken...
126 affected packages
linux, linux-allwinner-5.19, linux-aws, linux-aws-5.0, linux-aws-5.11...
Package | 22.04 LTS |
---|---|
linux | Vulnerable |
linux-allwinner-5.19 | Ignored |
linux-aws | Vulnerable |
linux-aws-5.0 | Not in release |
linux-aws-5.11 | Not in release |
linux-aws-5.13 | Not in release |
linux-aws-5.15 | Not in release |
linux-aws-5.19 | Ignored |
linux-aws-5.3 | Not in release |
linux-aws-5.4 | Not in release |
linux-aws-5.8 | Not in release |
linux-aws-6.2 | Ignored |
linux-aws-6.5 | Ignored |
linux-aws-6.8 | Vulnerable |
linux-aws-fips | Vulnerable |
linux-aws-hwe | Not in release |
linux-azure | Vulnerable |
linux-azure-4.15 | Not in release |
linux-azure-5.11 | Not in release |
linux-azure-5.13 | Not in release |
linux-azure-5.15 | Not in release |
linux-azure-5.19 | Ignored |
linux-azure-5.3 | Not in release |
linux-azure-5.4 | Not in release |
linux-azure-5.8 | Not in release |
linux-azure-6.2 | Ignored |
linux-azure-6.5 | Ignored |
linux-azure-6.8 | Vulnerable |
linux-azure-edge | Not in release |
linux-azure-fde | Needs evaluation |
linux-azure-fde-5.15 | Not in release |
linux-azure-fde-5.19 | Ignored |
linux-azure-fde-6.2 | Ignored |
linux-azure-fips | Vulnerable |
linux-bluefield | Not in release |
linux-fips | Vulnerable |
linux-gcp | Vulnerable |
linux-gcp-4.15 | Not in release |
linux-gcp-5.11 | Not in release |
linux-gcp-5.13 | Not in release |
linux-gcp-5.15 | Not in release |
linux-gcp-5.19 | Ignored |
linux-gcp-5.3 | Not in release |
linux-gcp-5.4 | Not in release |
linux-gcp-5.8 | Not in release |
linux-gcp-6.2 | Ignored |
linux-gcp-6.5 | Ignored |
linux-gcp-6.8 | Vulnerable |
linux-gcp-fips | Vulnerable |
linux-gke | Vulnerable |
linux-gke-4.15 | Not in release |
linux-gke-5.15 | Not in release |
linux-gke-5.4 | Not in release |
linux-gkeop | Vulnerable |
linux-gkeop-5.15 | Not in release |
linux-gkeop-5.4 | Not in release |
linux-hwe | Not in release |
linux-hwe-5.11 | Not in release |
linux-hwe-5.13 | Not in release |
linux-hwe-5.15 | Not in release |
linux-hwe-5.19 | Ignored |
linux-hwe-5.4 | Not in release |
linux-hwe-5.8 | Not in release |
linux-hwe-6.2 | Ignored |
linux-hwe-6.5 | Ignored |
linux-hwe-6.8 | Vulnerable |
linux-hwe-edge | Not in release |
linux-ibm | Vulnerable |
linux-ibm-5.15 | Not in release |
linux-ibm-5.4 | Not in release |
linux-intel | Not in release |
linux-intel-5.13 | Not in release |
linux-intel-iot-realtime | Vulnerable |
linux-intel-iotg | Vulnerable |
linux-intel-iotg-5.15 | Not in release |
linux-iot | Not in release |
linux-kvm | Vulnerable |
linux-lowlatency | Vulnerable |
linux-lowlatency-hwe-5.15 | Not in release |
linux-lowlatency-hwe-5.19 | Ignored |
linux-lowlatency-hwe-6.2 | Ignored |
linux-lowlatency-hwe-6.5 | Ignored |
linux-lowlatency-hwe-6.8 | Vulnerable |
linux-lts-xenial | Not in release |
linux-nvidia | Vulnerable |
linux-nvidia-6.2 | Ignored |
linux-nvidia-6.5 | Ignored |
linux-nvidia-6.8 | Vulnerable |
linux-nvidia-lowlatency | Not in release |
linux-oem | Not in release |
linux-oem-5.10 | Not in release |
linux-oem-5.13 | Not in release |
linux-oem-5.14 | Not in release |
linux-oem-5.17 | Ignored |
linux-oem-5.6 | Not in release |
linux-oem-6.0 | Ignored |
linux-oem-6.1 | Ignored |
linux-oem-6.11 | Not in release |
linux-oem-6.5 | Ignored |
linux-oem-6.8 | Not in release |
linux-oracle | Vulnerable |
linux-oracle-5.0 | Not in release |
linux-oracle-5.11 | Not in release |
linux-oracle-5.13 | Not in release |
linux-oracle-5.15 | Not in release |
linux-oracle-5.3 | Not in release |
linux-oracle-5.4 | Not in release |
linux-oracle-5.8 | Not in release |
linux-oracle-6.5 | Ignored |
linux-oracle-6.8 | Vulnerable |
linux-raspi | Vulnerable |
linux-raspi-5.4 | Not in release |
linux-raspi-realtime | Not in release |
linux-raspi2 | Not in release |
linux-realtime | Vulnerable |
linux-riscv | Ignored |
linux-riscv-5.11 | Not in release |
linux-riscv-5.15 | Not in release |
linux-riscv-5.19 | Ignored |
linux-riscv-5.8 | Not in release |
linux-riscv-6.5 | Ignored |
linux-riscv-6.8 | Vulnerable |
linux-starfive-5.19 | Ignored |
linux-starfive-6.2 | Ignored |
linux-starfive-6.5 | Ignored |
linux-xilinx-zynqmp | Vulnerable |
CVE-2024-53103
High prioritySome fixes available 24 of 34
In the Linux kernel, the following vulnerability has been resolved: hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer When hvs is released, there is a possibility that vsk->trans may not be initialized to...
126 affected packages
linux, linux-allwinner-5.19, linux-aws, linux-aws-5.0, linux-aws-5.11...
Package | 22.04 LTS |
---|---|
linux | Fixed |
linux-allwinner-5.19 | Ignored |
linux-aws | Vulnerable |
linux-aws-5.0 | Not in release |
linux-aws-5.11 | Not in release |
linux-aws-5.13 | Not in release |
linux-aws-5.15 | Not in release |
linux-aws-5.19 | Ignored |
linux-aws-5.3 | Not in release |
linux-aws-5.4 | Not in release |
linux-aws-5.8 | Not in release |
linux-aws-6.2 | Ignored |
linux-aws-6.5 | Ignored |
linux-aws-6.8 | Vulnerable |
linux-aws-fips | Fixed |
linux-aws-hwe | Not in release |
linux-azure | Fixed |
linux-azure-4.15 | Not in release |
linux-azure-5.11 | Not in release |
linux-azure-5.13 | Not in release |
linux-azure-5.15 | Not in release |
linux-azure-5.19 | Ignored |
linux-azure-5.3 | Not in release |
linux-azure-5.4 | Not in release |
linux-azure-5.8 | Not in release |
linux-azure-6.2 | Ignored |
linux-azure-6.5 | Ignored |
linux-azure-6.8 | Fixed |
linux-azure-edge | Not in release |
linux-azure-fde | Needs evaluation |
linux-azure-fde-5.15 | Not in release |
linux-azure-fde-5.19 | Ignored |
linux-azure-fde-6.2 | Ignored |
linux-azure-fips | Fixed |
linux-bluefield | Not in release |
linux-fips | Fixed |
linux-gcp | Fixed |
linux-gcp-4.15 | Not in release |
linux-gcp-5.11 | Not in release |
linux-gcp-5.13 | Not in release |
linux-gcp-5.15 | Not in release |
linux-gcp-5.19 | Ignored |
linux-gcp-5.3 | Not in release |
linux-gcp-5.4 | Not in release |
linux-gcp-5.8 | Not in release |
linux-gcp-6.2 | Ignored |
linux-gcp-6.5 | Ignored |
linux-gcp-6.8 | Fixed |
linux-gcp-fips | Fixed |
linux-gke | Fixed |
linux-gke-4.15 | Not in release |
linux-gke-5.15 | Not in release |
linux-gke-5.4 | Not in release |
linux-gkeop | Fixed |
linux-gkeop-5.15 | Not in release |
linux-gkeop-5.4 | Not in release |
linux-hwe | Not in release |
linux-hwe-5.11 | Not in release |
linux-hwe-5.13 | Not in release |
linux-hwe-5.15 | Not in release |
linux-hwe-5.19 | Ignored |
linux-hwe-5.4 | Not in release |
linux-hwe-5.8 | Not in release |
linux-hwe-6.2 | Ignored |
linux-hwe-6.5 | Ignored |
linux-hwe-6.8 | Fixed |
linux-hwe-edge | Not in release |
linux-ibm | Fixed |
linux-ibm-5.15 | Not in release |
linux-ibm-5.4 | Not in release |
linux-intel | Not in release |
linux-intel-5.13 | Not in release |
linux-intel-iot-realtime | Vulnerable |
linux-intel-iotg | Fixed |
linux-intel-iotg-5.15 | Not in release |
linux-iot | Not in release |
linux-kvm | Fixed |
linux-lowlatency | Fixed |
linux-lowlatency-hwe-5.15 | Not in release |
linux-lowlatency-hwe-5.19 | Ignored |
linux-lowlatency-hwe-6.2 | Ignored |
linux-lowlatency-hwe-6.5 | Ignored |
linux-lowlatency-hwe-6.8 | Fixed |
linux-lts-xenial | Not in release |
linux-nvidia | Fixed |
linux-nvidia-6.2 | Ignored |
linux-nvidia-6.5 | Ignored |
linux-nvidia-6.8 | Fixed |
linux-nvidia-lowlatency | Not in release |
linux-oem | Not in release |
linux-oem-5.10 | Not in release |
linux-oem-5.13 | Not in release |
linux-oem-5.14 | Not in release |
linux-oem-5.17 | Ignored |
linux-oem-5.6 | Not in release |
linux-oem-6.0 | Ignored |
linux-oem-6.1 | Ignored |
linux-oem-6.11 | Not in release |
linux-oem-6.5 | Ignored |
linux-oem-6.8 | Not in release |
linux-oracle | Fixed |
linux-oracle-5.0 | Not in release |
linux-oracle-5.11 | Not in release |
linux-oracle-5.13 | Not in release |
linux-oracle-5.15 | Not in release |
linux-oracle-5.3 | Not in release |
linux-oracle-5.4 | Not in release |
linux-oracle-5.8 | Not in release |
linux-oracle-6.5 | Ignored |
linux-oracle-6.8 | Fixed |
linux-raspi | Fixed |
linux-raspi-5.4 | Not in release |
linux-raspi-realtime | Not in release |
linux-raspi2 | Not in release |
linux-realtime | Fixed |
linux-riscv | Ignored |
linux-riscv-5.11 | Not in release |
linux-riscv-5.15 | Not in release |
linux-riscv-5.19 | Ignored |
linux-riscv-5.8 | Not in release |
linux-riscv-6.5 | Ignored |
linux-riscv-6.8 | Fixed |
linux-starfive-5.19 | Ignored |
linux-starfive-6.2 | Ignored |
linux-starfive-6.5 | Ignored |
linux-xilinx-zynqmp | Vulnerable |
CVE-2024-44309
High prioritySome fixes available 1 of 3
A cookie management issue was addressed with improved state management. This issue is fixed in Safari 18.1.1, iOS 17.7.2 and iPadOS 17.7.2, macOS Sequoia 15.1.1, iOS 18.1.1 and iPadOS 18.1.1, visionOS 2.1.1. Processing maliciously...
5 affected packages
qtwebkit-opensource-src, qtwebkit-source, webkit2gtk, webkitgtk, wpewebkit
Package | 22.04 LTS |
---|---|
qtwebkit-opensource-src | Ignored |
qtwebkit-source | Not in release |
webkit2gtk | Fixed |
webkitgtk | Not in release |
wpewebkit | Ignored |