Search CVE reports
21 – 30 of 32036 results
CVE-2024-53148
Medium priorityIn the Linux kernel, the following vulnerability has been resolved: comedi: Flush partial mappings in error case If some remap_pfn_range() calls succeeded before one failed, we still have buffer pages mapped into the userspace...
125 affected packages
linux, linux-allwinner-5.19, linux-aws, linux-aws-5.0, linux-aws-5.11...
Package | 18.04 LTS |
---|---|
linux | Needs evaluation |
linux-allwinner-5.19 | — |
linux-aws | Needs evaluation |
linux-aws-5.0 | Ignored |
linux-aws-5.11 | — |
linux-aws-5.13 | — |
linux-aws-5.15 | — |
linux-aws-5.19 | — |
linux-aws-5.3 | Ignored |
linux-aws-5.4 | Needs evaluation |
linux-aws-5.8 | — |
linux-aws-6.2 | — |
linux-aws-6.5 | — |
linux-aws-6.8 | — |
linux-aws-fips | — |
linux-aws-hwe | — |
linux-azure | Ignored |
linux-azure-4.15 | Needs evaluation |
linux-azure-5.11 | — |
linux-azure-5.13 | — |
linux-azure-5.15 | — |
linux-azure-5.19 | — |
linux-azure-5.3 | Ignored |
linux-azure-5.4 | Needs evaluation |
linux-azure-5.8 | — |
linux-azure-6.2 | — |
linux-azure-6.5 | — |
linux-azure-6.8 | — |
linux-azure-edge | Ignored |
linux-azure-fde | — |
linux-azure-fde-5.15 | — |
linux-azure-fde-5.19 | — |
linux-azure-fde-6.2 | — |
linux-azure-fips | — |
linux-bluefield | — |
linux-fips | — |
linux-gcp | Ignored |
linux-gcp-4.15 | Needs evaluation |
linux-gcp-5.11 | — |
linux-gcp-5.13 | — |
linux-gcp-5.15 | — |
linux-gcp-5.19 | — |
linux-gcp-5.3 | Ignored |
linux-gcp-5.4 | Needs evaluation |
linux-gcp-5.8 | — |
linux-gcp-6.2 | — |
linux-gcp-6.5 | — |
linux-gcp-6.8 | — |
linux-gcp-fips | — |
linux-gke | — |
linux-gke-4.15 | Ignored |
linux-gke-5.15 | — |
linux-gke-5.4 | Ignored |
linux-gkeop | — |
linux-gkeop-5.15 | — |
linux-gkeop-5.4 | Ignored |
linux-hwe | Ignored |
linux-hwe-5.11 | — |
linux-hwe-5.13 | — |
linux-hwe-5.15 | — |
linux-hwe-5.19 | — |
linux-hwe-5.4 | Needs evaluation |
linux-hwe-5.8 | — |
linux-hwe-6.2 | — |
linux-hwe-6.5 | — |
linux-hwe-6.8 | — |
linux-hwe-edge | Ignored |
linux-ibm | — |
linux-ibm-5.15 | — |
linux-ibm-5.4 | Needs evaluation |
linux-intel-5.13 | — |
linux-intel-iot-realtime | — |
linux-intel-iotg | — |
linux-intel-iotg-5.15 | — |
linux-iot | — |
linux-kvm | Needs evaluation |
linux-lowlatency | — |
linux-lowlatency-hwe-5.15 | — |
linux-lowlatency-hwe-5.19 | — |
linux-lowlatency-hwe-6.2 | — |
linux-lowlatency-hwe-6.5 | — |
linux-lowlatency-hwe-6.8 | — |
linux-lts-xenial | — |
linux-nvidia | — |
linux-nvidia-6.2 | — |
linux-nvidia-6.5 | — |
linux-nvidia-6.8 | — |
linux-nvidia-lowlatency | — |
linux-oem | Ignored |
linux-oem-5.10 | — |
linux-oem-5.13 | — |
linux-oem-5.14 | — |
linux-oem-5.17 | — |
linux-oem-5.6 | — |
linux-oem-6.0 | — |
linux-oem-6.1 | — |
linux-oem-6.11 | — |
linux-oem-6.5 | — |
linux-oem-6.8 | — |
linux-oracle | Needs evaluation |
linux-oracle-5.0 | Ignored |
linux-oracle-5.11 | — |
linux-oracle-5.13 | — |
linux-oracle-5.15 | — |
linux-oracle-5.3 | Ignored |
linux-oracle-5.4 | Needs evaluation |
linux-oracle-5.8 | — |
linux-oracle-6.5 | — |
linux-oracle-6.8 | — |
linux-raspi | — |
linux-raspi-5.4 | Needs evaluation |
linux-raspi-realtime | — |
linux-raspi2 | — |
linux-realtime | — |
linux-riscv | — |
linux-riscv-5.11 | — |
linux-riscv-5.15 | — |
linux-riscv-5.19 | — |
linux-riscv-5.8 | — |
linux-riscv-6.5 | — |
linux-riscv-6.8 | — |
linux-starfive-5.19 | — |
linux-starfive-6.2 | — |
linux-starfive-6.5 | — |
linux-xilinx-zynqmp | — |
CVE-2024-53147
Medium priorityIn the Linux kernel, the following vulnerability has been resolved: exfat: fix out-of-bounds access of directory entries In the case of the directory size is greater than or equal to the cluster size, if start_clu becomes an EOF...
125 affected packages
linux, linux-allwinner-5.19, linux-aws, linux-aws-5.0, linux-aws-5.11...
Package | 18.04 LTS |
---|---|
linux | Needs evaluation |
linux-allwinner-5.19 | — |
linux-aws | Needs evaluation |
linux-aws-5.0 | Ignored |
linux-aws-5.11 | — |
linux-aws-5.13 | — |
linux-aws-5.15 | — |
linux-aws-5.19 | — |
linux-aws-5.3 | Ignored |
linux-aws-5.4 | Needs evaluation |
linux-aws-5.8 | — |
linux-aws-6.2 | — |
linux-aws-6.5 | — |
linux-aws-6.8 | — |
linux-aws-fips | — |
linux-aws-hwe | — |
linux-azure | Ignored |
linux-azure-4.15 | Needs evaluation |
linux-azure-5.11 | — |
linux-azure-5.13 | — |
linux-azure-5.15 | — |
linux-azure-5.19 | — |
linux-azure-5.3 | Ignored |
linux-azure-5.4 | Needs evaluation |
linux-azure-5.8 | — |
linux-azure-6.2 | — |
linux-azure-6.5 | — |
linux-azure-6.8 | — |
linux-azure-edge | Ignored |
linux-azure-fde | — |
linux-azure-fde-5.15 | — |
linux-azure-fde-5.19 | — |
linux-azure-fde-6.2 | — |
linux-azure-fips | — |
linux-bluefield | — |
linux-fips | — |
linux-gcp | Ignored |
linux-gcp-4.15 | Needs evaluation |
linux-gcp-5.11 | — |
linux-gcp-5.13 | — |
linux-gcp-5.15 | — |
linux-gcp-5.19 | — |
linux-gcp-5.3 | Ignored |
linux-gcp-5.4 | Needs evaluation |
linux-gcp-5.8 | — |
linux-gcp-6.2 | — |
linux-gcp-6.5 | — |
linux-gcp-6.8 | — |
linux-gcp-fips | — |
linux-gke | — |
linux-gke-4.15 | Ignored |
linux-gke-5.15 | — |
linux-gke-5.4 | Ignored |
linux-gkeop | — |
linux-gkeop-5.15 | — |
linux-gkeop-5.4 | Ignored |
linux-hwe | Ignored |
linux-hwe-5.11 | — |
linux-hwe-5.13 | — |
linux-hwe-5.15 | — |
linux-hwe-5.19 | — |
linux-hwe-5.4 | Needs evaluation |
linux-hwe-5.8 | — |
linux-hwe-6.2 | — |
linux-hwe-6.5 | — |
linux-hwe-6.8 | — |
linux-hwe-edge | Ignored |
linux-ibm | — |
linux-ibm-5.15 | — |
linux-ibm-5.4 | Needs evaluation |
linux-intel-5.13 | — |
linux-intel-iot-realtime | — |
linux-intel-iotg | — |
linux-intel-iotg-5.15 | — |
linux-iot | — |
linux-kvm | Needs evaluation |
linux-lowlatency | — |
linux-lowlatency-hwe-5.15 | — |
linux-lowlatency-hwe-5.19 | — |
linux-lowlatency-hwe-6.2 | — |
linux-lowlatency-hwe-6.5 | — |
linux-lowlatency-hwe-6.8 | — |
linux-lts-xenial | — |
linux-nvidia | — |
linux-nvidia-6.2 | — |
linux-nvidia-6.5 | — |
linux-nvidia-6.8 | — |
linux-nvidia-lowlatency | — |
linux-oem | Ignored |
linux-oem-5.10 | — |
linux-oem-5.13 | — |
linux-oem-5.14 | — |
linux-oem-5.17 | — |
linux-oem-5.6 | — |
linux-oem-6.0 | — |
linux-oem-6.1 | — |
linux-oem-6.11 | — |
linux-oem-6.5 | — |
linux-oem-6.8 | — |
linux-oracle | Needs evaluation |
linux-oracle-5.0 | Ignored |
linux-oracle-5.11 | — |
linux-oracle-5.13 | — |
linux-oracle-5.15 | — |
linux-oracle-5.3 | Ignored |
linux-oracle-5.4 | Needs evaluation |
linux-oracle-5.8 | — |
linux-oracle-6.5 | — |
linux-oracle-6.8 | — |
linux-raspi | — |
linux-raspi-5.4 | Needs evaluation |
linux-raspi-realtime | — |
linux-raspi2 | — |
linux-realtime | — |
linux-riscv | — |
linux-riscv-5.11 | — |
linux-riscv-5.15 | — |
linux-riscv-5.19 | — |
linux-riscv-5.8 | — |
linux-riscv-6.5 | — |
linux-riscv-6.8 | — |
linux-starfive-5.19 | — |
linux-starfive-6.2 | — |
linux-starfive-6.5 | — |
linux-xilinx-zynqmp | — |
CVE-2024-53146
Medium priorityIn the Linux kernel, the following vulnerability has been resolved: NFSD: Prevent a potential integer overflow If the tag length is >= U32_MAX - 3 then the "length + 4" addition can result in an integer overflow. Address this by...
125 affected packages
linux, linux-allwinner-5.19, linux-aws, linux-aws-5.0, linux-aws-5.11...
Package | 18.04 LTS |
---|---|
linux | Needs evaluation |
linux-allwinner-5.19 | — |
linux-aws | Needs evaluation |
linux-aws-5.0 | Ignored |
linux-aws-5.11 | — |
linux-aws-5.13 | — |
linux-aws-5.15 | — |
linux-aws-5.19 | — |
linux-aws-5.3 | Ignored |
linux-aws-5.4 | Needs evaluation |
linux-aws-5.8 | — |
linux-aws-6.2 | — |
linux-aws-6.5 | — |
linux-aws-6.8 | — |
linux-aws-fips | — |
linux-aws-hwe | — |
linux-azure | Ignored |
linux-azure-4.15 | Needs evaluation |
linux-azure-5.11 | — |
linux-azure-5.13 | — |
linux-azure-5.15 | — |
linux-azure-5.19 | — |
linux-azure-5.3 | Ignored |
linux-azure-5.4 | Needs evaluation |
linux-azure-5.8 | — |
linux-azure-6.2 | — |
linux-azure-6.5 | — |
linux-azure-6.8 | — |
linux-azure-edge | Ignored |
linux-azure-fde | — |
linux-azure-fde-5.15 | — |
linux-azure-fde-5.19 | — |
linux-azure-fde-6.2 | — |
linux-azure-fips | — |
linux-bluefield | — |
linux-fips | — |
linux-gcp | Ignored |
linux-gcp-4.15 | Needs evaluation |
linux-gcp-5.11 | — |
linux-gcp-5.13 | — |
linux-gcp-5.15 | — |
linux-gcp-5.19 | — |
linux-gcp-5.3 | Ignored |
linux-gcp-5.4 | Needs evaluation |
linux-gcp-5.8 | — |
linux-gcp-6.2 | — |
linux-gcp-6.5 | — |
linux-gcp-6.8 | — |
linux-gcp-fips | — |
linux-gke | — |
linux-gke-4.15 | Ignored |
linux-gke-5.15 | — |
linux-gke-5.4 | Ignored |
linux-gkeop | — |
linux-gkeop-5.15 | — |
linux-gkeop-5.4 | Ignored |
linux-hwe | Ignored |
linux-hwe-5.11 | — |
linux-hwe-5.13 | — |
linux-hwe-5.15 | — |
linux-hwe-5.19 | — |
linux-hwe-5.4 | Needs evaluation |
linux-hwe-5.8 | — |
linux-hwe-6.2 | — |
linux-hwe-6.5 | — |
linux-hwe-6.8 | — |
linux-hwe-edge | Ignored |
linux-ibm | — |
linux-ibm-5.15 | — |
linux-ibm-5.4 | Needs evaluation |
linux-intel-5.13 | — |
linux-intel-iot-realtime | — |
linux-intel-iotg | — |
linux-intel-iotg-5.15 | — |
linux-iot | — |
linux-kvm | Needs evaluation |
linux-lowlatency | — |
linux-lowlatency-hwe-5.15 | — |
linux-lowlatency-hwe-5.19 | — |
linux-lowlatency-hwe-6.2 | — |
linux-lowlatency-hwe-6.5 | — |
linux-lowlatency-hwe-6.8 | — |
linux-lts-xenial | — |
linux-nvidia | — |
linux-nvidia-6.2 | — |
linux-nvidia-6.5 | — |
linux-nvidia-6.8 | — |
linux-nvidia-lowlatency | — |
linux-oem | Ignored |
linux-oem-5.10 | — |
linux-oem-5.13 | — |
linux-oem-5.14 | — |
linux-oem-5.17 | — |
linux-oem-5.6 | — |
linux-oem-6.0 | — |
linux-oem-6.1 | — |
linux-oem-6.11 | — |
linux-oem-6.5 | — |
linux-oem-6.8 | — |
linux-oracle | Needs evaluation |
linux-oracle-5.0 | Ignored |
linux-oracle-5.11 | — |
linux-oracle-5.13 | — |
linux-oracle-5.15 | — |
linux-oracle-5.3 | Ignored |
linux-oracle-5.4 | Needs evaluation |
linux-oracle-5.8 | — |
linux-oracle-6.5 | — |
linux-oracle-6.8 | — |
linux-raspi | — |
linux-raspi-5.4 | Needs evaluation |
linux-raspi-realtime | — |
linux-raspi2 | — |
linux-realtime | — |
linux-riscv | — |
linux-riscv-5.11 | — |
linux-riscv-5.15 | — |
linux-riscv-5.19 | — |
linux-riscv-5.8 | — |
linux-riscv-6.5 | — |
linux-riscv-6.8 | — |
linux-starfive-5.19 | — |
linux-starfive-6.2 | — |
linux-starfive-6.5 | — |
linux-xilinx-zynqmp | — |
CVE-2024-53145
Medium priorityIn the Linux kernel, the following vulnerability has been resolved: um: Fix potential integer overflow during physmem setup This issue happens when the real map size is greater than LONG_MAX, which can be easily triggered on UML/i386.
125 affected packages
linux, linux-allwinner-5.19, linux-aws, linux-aws-5.0, linux-aws-5.11...
Package | 18.04 LTS |
---|---|
linux | Needs evaluation |
linux-allwinner-5.19 | — |
linux-aws | Needs evaluation |
linux-aws-5.0 | Ignored |
linux-aws-5.11 | — |
linux-aws-5.13 | — |
linux-aws-5.15 | — |
linux-aws-5.19 | — |
linux-aws-5.3 | Ignored |
linux-aws-5.4 | Needs evaluation |
linux-aws-5.8 | — |
linux-aws-6.2 | — |
linux-aws-6.5 | — |
linux-aws-6.8 | — |
linux-aws-fips | — |
linux-aws-hwe | — |
linux-azure | Ignored |
linux-azure-4.15 | Needs evaluation |
linux-azure-5.11 | — |
linux-azure-5.13 | — |
linux-azure-5.15 | — |
linux-azure-5.19 | — |
linux-azure-5.3 | Ignored |
linux-azure-5.4 | Needs evaluation |
linux-azure-5.8 | — |
linux-azure-6.2 | — |
linux-azure-6.5 | — |
linux-azure-6.8 | — |
linux-azure-edge | Ignored |
linux-azure-fde | — |
linux-azure-fde-5.15 | — |
linux-azure-fde-5.19 | — |
linux-azure-fde-6.2 | — |
linux-azure-fips | — |
linux-bluefield | — |
linux-fips | — |
linux-gcp | Ignored |
linux-gcp-4.15 | Needs evaluation |
linux-gcp-5.11 | — |
linux-gcp-5.13 | — |
linux-gcp-5.15 | — |
linux-gcp-5.19 | — |
linux-gcp-5.3 | Ignored |
linux-gcp-5.4 | Needs evaluation |
linux-gcp-5.8 | — |
linux-gcp-6.2 | — |
linux-gcp-6.5 | — |
linux-gcp-6.8 | — |
linux-gcp-fips | — |
linux-gke | — |
linux-gke-4.15 | Ignored |
linux-gke-5.15 | — |
linux-gke-5.4 | Ignored |
linux-gkeop | — |
linux-gkeop-5.15 | — |
linux-gkeop-5.4 | Ignored |
linux-hwe | Ignored |
linux-hwe-5.11 | — |
linux-hwe-5.13 | — |
linux-hwe-5.15 | — |
linux-hwe-5.19 | — |
linux-hwe-5.4 | Needs evaluation |
linux-hwe-5.8 | — |
linux-hwe-6.2 | — |
linux-hwe-6.5 | — |
linux-hwe-6.8 | — |
linux-hwe-edge | Ignored |
linux-ibm | — |
linux-ibm-5.15 | — |
linux-ibm-5.4 | Needs evaluation |
linux-intel-5.13 | — |
linux-intel-iot-realtime | — |
linux-intel-iotg | — |
linux-intel-iotg-5.15 | — |
linux-iot | — |
linux-kvm | Needs evaluation |
linux-lowlatency | — |
linux-lowlatency-hwe-5.15 | — |
linux-lowlatency-hwe-5.19 | — |
linux-lowlatency-hwe-6.2 | — |
linux-lowlatency-hwe-6.5 | — |
linux-lowlatency-hwe-6.8 | — |
linux-lts-xenial | — |
linux-nvidia | — |
linux-nvidia-6.2 | — |
linux-nvidia-6.5 | — |
linux-nvidia-6.8 | — |
linux-nvidia-lowlatency | — |
linux-oem | Ignored |
linux-oem-5.10 | — |
linux-oem-5.13 | — |
linux-oem-5.14 | — |
linux-oem-5.17 | — |
linux-oem-5.6 | — |
linux-oem-6.0 | — |
linux-oem-6.1 | — |
linux-oem-6.11 | — |
linux-oem-6.5 | — |
linux-oem-6.8 | — |
linux-oracle | Needs evaluation |
linux-oracle-5.0 | Ignored |
linux-oracle-5.11 | — |
linux-oracle-5.13 | — |
linux-oracle-5.15 | — |
linux-oracle-5.3 | Ignored |
linux-oracle-5.4 | Needs evaluation |
linux-oracle-5.8 | — |
linux-oracle-6.5 | — |
linux-oracle-6.8 | — |
linux-raspi | — |
linux-raspi-5.4 | Needs evaluation |
linux-raspi-realtime | — |
linux-raspi2 | — |
linux-realtime | — |
linux-riscv | — |
linux-riscv-5.11 | — |
linux-riscv-5.15 | — |
linux-riscv-5.19 | — |
linux-riscv-5.8 | — |
linux-riscv-6.5 | — |
linux-riscv-6.8 | — |
linux-starfive-5.19 | — |
linux-starfive-6.2 | — |
linux-starfive-6.5 | — |
linux-xilinx-zynqmp | — |
CVE-2024-40896
Medium priorityIn libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting "checked"). This...
1 affected package
libxml2
Package | 18.04 LTS |
---|---|
libxml2 | Not affected |
CVE-2024-12678
Medium priorityNomad Community and Nomad Enterprise ("Nomad") allocations are vulnerable to privilege escalation within a namespace through unredacted workload identity tokens. This vulnerability, identified as CVE-2024-12678, is fixed in Nomad...
1 affected package
nomad
Package | 18.04 LTS |
---|---|
nomad | Needs evaluation |
CVE-2024-9102
Low priorityphpLDAPadmin since at least version 1.2.0 through the latest version 1.2.6.7 allows users to export elements from the LDAP directory into a Comma-Separated Value (CSV) file, but it does not neutralize special elements that could...
1 affected package
phpldapadmin
Package | 18.04 LTS |
---|---|
phpldapadmin | Needs evaluation |
CVE-2024-9101
Medium priorityA reflected cross-site scripting (XSS) vulnerability in the 'Entry Chooser' of phpLDAPadmin (version 1.2.1 through the latest version, 1.2.6.7) allows attackers to execute arbitrary JavaScript in the user's browser via...
1 affected package
phpldapadmin
Package | 18.04 LTS |
---|---|
phpldapadmin | Needs evaluation |
CVE-2024-47093
Medium priorityImproper neutralization of input in Nagvis before version 1.9.42 which can lead to XSS
1 affected package
nagvis
Package | 18.04 LTS |
---|---|
nagvis | Needs evaluation |
CVE-2024-38864
Medium priorityIncorrect permissions on the Checkmk Windows Agent's data directory in Checkmk < 2.3.0p23, < 2.2.0p38 and <= 2.1.0p49 (EOL) allows a local attacker to read sensitive data.
1 affected package
check-mk
Package | 18.04 LTS |
---|---|
check-mk | Not affected |