Search CVE reports
161 – 170 of 41351 results
During the TLS 1.3 handshake if multiple messages are sent in records that span encryption level boundaries (for instance the Client Hello and Encrypted Extensions messages), the subsequent messages may be processed before the...
16 affected packages
golang, golang-1.6, golang-1.8, golang-1.9, golang-1.10...
| Package | 18.04 LTS |
|---|---|
| golang | — |
| golang-1.6 | — |
| golang-1.8 | Needs evaluation |
| golang-1.9 | Needs evaluation |
| golang-1.10 | Needs evaluation |
| golang-1.13 | Needs evaluation |
| golang-1.14 | — |
| golang-1.16 | Needs evaluation |
| golang-1.17 | — |
| golang-1.18 | Needs evaluation |
| golang-1.20 | — |
| golang-1.21 | — |
| golang-1.22 | — |
| golang-1.23 | — |
| golang-1.24 | — |
| golang-1.25 | — |
archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive.
16 affected packages
golang, golang-1.6, golang-1.8, golang-1.9, golang-1.10...
| Package | 18.04 LTS |
|---|---|
| golang | — |
| golang-1.6 | — |
| golang-1.8 | Needs evaluation |
| golang-1.9 | Needs evaluation |
| golang-1.10 | Needs evaluation |
| golang-1.13 | Needs evaluation |
| golang-1.14 | — |
| golang-1.16 | Needs evaluation |
| golang-1.17 | — |
| golang-1.18 | Needs evaluation |
| golang-1.20 | — |
| golang-1.21 | — |
| golang-1.22 | — |
| golang-1.23 | — |
| golang-1.24 | — |
| golang-1.25 | — |
The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the...
16 affected packages
golang, golang-1.6, golang-1.8, golang-1.9, golang-1.10...
| Package | 18.04 LTS |
|---|---|
| golang | — |
| golang-1.6 | — |
| golang-1.8 | Needs evaluation |
| golang-1.9 | Needs evaluation |
| golang-1.10 | Needs evaluation |
| golang-1.13 | Needs evaluation |
| golang-1.14 | — |
| golang-1.16 | Needs evaluation |
| golang-1.17 | — |
| golang-1.18 | Needs evaluation |
| golang-1.20 | — |
| golang-1.21 | — |
| golang-1.22 | — |
| golang-1.23 | — |
| golang-1.24 | — |
| golang-1.25 | — |
NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager, where a malicious guest could cause heap memory access after the memory is freed. A successful exploit of this vulnerability might lead to code execution,...
47 affected packages
nvidia-graphics-drivers-304, nvidia-graphics-drivers-304-updates, nvidia-graphics-drivers-340, nvidia-graphics-drivers-340-updates, nvidia-graphics-drivers-352...
| Package | 18.04 LTS |
|---|---|
| nvidia-graphics-drivers-304 | — |
| nvidia-graphics-drivers-304-updates | — |
| nvidia-graphics-drivers-340 | Ignored |
| nvidia-graphics-drivers-340-updates | Not affected |
| nvidia-graphics-drivers-352 | Not affected |
| nvidia-graphics-drivers-352-updates | Not affected |
| nvidia-graphics-drivers-361 | Not affected |
| nvidia-graphics-drivers-367 | Not affected |
| nvidia-graphics-drivers-375 | Not affected |
| nvidia-graphics-drivers-384 | Not affected |
| nvidia-graphics-drivers-390 | Ignored |
| nvidia-graphics-drivers-418-server | Ignored |
| nvidia-graphics-drivers-430 | Ignored |
| nvidia-graphics-drivers-435 | Ignored |
| nvidia-graphics-drivers-440 | Ignored |
| nvidia-graphics-drivers-440-server | Ignored |
| nvidia-graphics-drivers-450 | Ignored |
| nvidia-graphics-drivers-450-server | Ignored |
| nvidia-graphics-drivers-455 | Ignored |
| nvidia-graphics-drivers-460 | Ignored |
| nvidia-graphics-drivers-460-server | Ignored |
| nvidia-graphics-drivers-470 | Ignored |
| nvidia-graphics-drivers-470-server | Ignored |
| nvidia-graphics-drivers-495 | Not affected |
| nvidia-graphics-drivers-510 | Ignored |
| nvidia-graphics-drivers-510-server | Not affected |
| nvidia-graphics-drivers-515 | Ignored |
| nvidia-graphics-drivers-515-server | Ignored |
| nvidia-graphics-drivers-520 | Ignored |
| nvidia-graphics-drivers-525 | Not affected |
| nvidia-graphics-drivers-525-server | Not affected |
| nvidia-graphics-drivers-530 | Ignored |
| nvidia-graphics-drivers-535 | — |
| nvidia-graphics-drivers-535-server | — |
| nvidia-graphics-drivers-545 | — |
| nvidia-graphics-drivers-550 | — |
| nvidia-graphics-drivers-550-server | — |
| nvidia-graphics-drivers-560 | — |
| nvidia-graphics-drivers-565-server | — |
| nvidia-graphics-drivers-570 | — |
| nvidia-graphics-drivers-570-server | — |
| nvidia-graphics-drivers-575 | — |
| nvidia-graphics-drivers-575-server | — |
| nvidia-graphics-drivers-580 | — |
| nvidia-graphics-drivers-580-server | — |
| nvidia-graphics-drivers-590 | — |
| nvidia-graphics-drivers-590-server | — |
NVIDIA Display Driver for Linux contains a vulnerability in the NVIDIA kernel module where an attacker could cause an integer overflow or wraparound. A successful exploit of this vulnerability might lead to code execution,...
47 affected packages
nvidia-graphics-drivers-304, nvidia-graphics-drivers-304-updates, nvidia-graphics-drivers-340, nvidia-graphics-drivers-340-updates, nvidia-graphics-drivers-352...
| Package | 18.04 LTS |
|---|---|
| nvidia-graphics-drivers-304 | — |
| nvidia-graphics-drivers-304-updates | — |
| nvidia-graphics-drivers-340 | Ignored |
| nvidia-graphics-drivers-340-updates | Not affected |
| nvidia-graphics-drivers-352 | Not affected |
| nvidia-graphics-drivers-352-updates | Not affected |
| nvidia-graphics-drivers-361 | Not affected |
| nvidia-graphics-drivers-367 | Not affected |
| nvidia-graphics-drivers-375 | Not affected |
| nvidia-graphics-drivers-384 | Not affected |
| nvidia-graphics-drivers-390 | Ignored |
| nvidia-graphics-drivers-418-server | Ignored |
| nvidia-graphics-drivers-430 | Ignored |
| nvidia-graphics-drivers-435 | Ignored |
| nvidia-graphics-drivers-440 | Ignored |
| nvidia-graphics-drivers-440-server | Ignored |
| nvidia-graphics-drivers-450 | Ignored |
| nvidia-graphics-drivers-450-server | Ignored |
| nvidia-graphics-drivers-455 | Ignored |
| nvidia-graphics-drivers-460 | Ignored |
| nvidia-graphics-drivers-460-server | Ignored |
| nvidia-graphics-drivers-470 | Ignored |
| nvidia-graphics-drivers-470-server | Ignored |
| nvidia-graphics-drivers-495 | Not affected |
| nvidia-graphics-drivers-510 | Ignored |
| nvidia-graphics-drivers-510-server | Not affected |
| nvidia-graphics-drivers-515 | Ignored |
| nvidia-graphics-drivers-515-server | Ignored |
| nvidia-graphics-drivers-520 | Ignored |
| nvidia-graphics-drivers-525 | Not affected |
| nvidia-graphics-drivers-525-server | Not affected |
| nvidia-graphics-drivers-530 | Ignored |
| nvidia-graphics-drivers-535 | — |
| nvidia-graphics-drivers-535-server | — |
| nvidia-graphics-drivers-545 | — |
| nvidia-graphics-drivers-550 | — |
| nvidia-graphics-drivers-550-server | — |
| nvidia-graphics-drivers-560 | — |
| nvidia-graphics-drivers-565-server | — |
| nvidia-graphics-drivers-570 | — |
| nvidia-graphics-drivers-570-server | — |
| nvidia-graphics-drivers-575 | — |
| nvidia-graphics-drivers-575-server | — |
| nvidia-graphics-drivers-580 | — |
| nvidia-graphics-drivers-580-server | — |
| nvidia-graphics-drivers-590 | — |
| nvidia-graphics-drivers-590-server | — |
M/Monit 3.7.4 contains a privilege escalation vulnerability that allows authenticated users to modify user permissions by manipulating the admin parameter. Attackers can send a POST request to the /api/1/admin/users/update...
1 affected package
monit
| Package | 18.04 LTS |
|---|---|
| monit | Needs evaluation |
M/Monit 3.7.4 contains an authentication vulnerability that allows authenticated attackers to retrieve user password hashes through an administrative API endpoint. Attackers can send requests to the /api/1/admin/users/list and...
1 affected package
monit
| Package | 18.04 LTS |
|---|---|
| monit | Needs evaluation |
A flaw was found in the libsoup HTTP library that can cause proxy authentication credentials to be sent to unintended destinations. When handling HTTP redirects, libsoup removes the Authorization header but does not remove the...
2 affected packages
libsoup2.4, libsoup3
| Package | 18.04 LTS |
|---|---|
| libsoup2.4 | Needs evaluation |
| libsoup3 | — |
A flaw was found in libsoup. An attacker who can control the input for the Content-Disposition header can inject CRLF (Carriage Return Line Feed) sequences into the header value. These sequences are then interpreted verbatim when...
2 affected packages
libsoup2.4, libsoup3
| Package | 18.04 LTS |
|---|---|
| libsoup2.4 | Needs evaluation |
| libsoup3 | — |
In the Linux kernel, the following vulnerability has been resolved: perf: Ensure swevent hrtimer is properly destroyed With the change to hrtimer_try_to_cancel() in perf_swevent_cancel_hrtimer() it appears possible for the hrtimer...
149 affected packages
linux-hwe, linux-hwe-5.4, linux-hwe-5.8, linux, linux-hwe-5.11...
| Package | 18.04 LTS |
|---|---|
| linux-hwe | Ignored |
| linux-hwe-5.4 | Not affected |
| linux-hwe-5.8 | Not in release |
| linux | Not affected |
| linux-hwe-5.11 | Not in release |
| linux-hwe-5.13 | Not in release |
| linux-hwe-5.15 | Not in release |
| linux-hwe-5.19 | Not in release |
| linux-hwe-6.2 | Not in release |
| linux-hwe-6.5 | Not in release |
| linux-hwe-6.8 | Not in release |
| linux-hwe-6.11 | Not in release |
| linux-hwe-6.14 | Not in release |
| linux-hwe-edge | Ignored |
| linux-lts-xenial | Not in release |
| linux-kvm | Not affected |
| linux-allwinner-5.19 | Not in release |
| linux-aws-5.0 | Ignored |
| linux-aws-5.3 | Ignored |
| linux-aws-5.4 | Not affected |
| linux-aws-5.8 | Not in release |
| linux-aws-5.11 | Not in release |
| linux-aws | Not affected |
| linux-aws-5.13 | Not in release |
| linux-aws-5.15 | Not in release |
| linux-aws-5.19 | Not in release |
| linux-aws-6.2 | Not in release |
| linux-aws-6.5 | Not in release |
| linux-aws-6.8 | Not in release |
| linux-aws-6.14 | Not in release |
| linux-aws-hwe | Not in release |
| linux-azure | Ignored |
| linux-azure-4.15 | Not affected |
| linux-azure-5.3 | Ignored |
| linux-azure-5.4 | Not affected |
| linux-azure-5.8 | Not in release |
| linux-azure-5.11 | Not in release |
| linux-azure-5.13 | Not in release |
| linux-azure-5.15 | Not in release |
| linux-azure-5.19 | Not in release |
| linux-azure-6.2 | Not in release |
| linux-azure-6.5 | Not in release |
| linux-azure-6.8 | Not in release |
| linux-azure-6.11 | Not in release |
| linux-azure-6.14 | Not in release |
| linux-azure-fde | Not in release |
| linux-azure-fde-5.15 | Not in release |
| linux-azure-fde-5.19 | Not in release |
| linux-azure-fde-6.2 | Not in release |
| linux-azure-fde-6.8 | Not in release |
| linux-azure-fde-6.14 | Not in release |
| linux-azure-nvidia | Not in release |
| linux-azure-nvidia-6.14 | Not in release |
| linux-bluefield | Not in release |
| linux-azure-edge | Ignored |
| linux-fips | Not affected |
| linux-aws-fips | Not affected |
| linux-azure-fips | Not affected |
| linux-gcp-fips | Not affected |
| linux-gcp | Ignored |
| linux-gcp-4.15 | Not affected |
| linux-gcp-5.3 | Ignored |
| linux-gcp-5.4 | Not affected |
| linux-gcp-5.8 | Not in release |
| linux-gcp-5.11 | Not in release |
| linux-gcp-5.13 | Not in release |
| linux-gcp-5.15 | Not in release |
| linux-gcp-5.19 | Not in release |
| linux-gcp-6.2 | Not in release |
| linux-gcp-6.5 | Not in release |
| linux-gcp-6.8 | Not in release |
| linux-gcp-6.11 | Not in release |
| linux-gcp-6.14 | Not in release |
| linux-gke | Not in release |
| linux-gke-4.15 | Ignored |
| linux-gke-5.4 | Ignored |
| linux-gke-5.15 | Not in release |
| linux-gkeop | Not in release |
| linux-gkeop-5.4 | Ignored |
| linux-gkeop-5.15 | Not in release |
| linux-ibm | Not in release |
| linux-ibm-5.4 | Not affected |
| linux-ibm-5.15 | Not in release |
| linux-ibm-6.8 | Not in release |
| linux-intel-5.13 | Not in release |
| linux-intel-iotg | Not in release |
| linux-intel-iotg-5.15 | Not in release |
| linux-iot | Not in release |
| linux-intel-iot-realtime | Not in release |
| linux-lowlatency | Not in release |
| linux-lowlatency-hwe-5.15 | Not in release |
| linux-lowlatency-hwe-5.19 | Not in release |
| linux-lowlatency-hwe-6.2 | Not in release |
| linux-lowlatency-hwe-6.5 | Not in release |
| linux-lowlatency-hwe-6.8 | Not in release |
| linux-lowlatency-hwe-6.11 | Not in release |
| linux-nvidia | Not in release |
| linux-nvidia-6.2 | Not in release |
| linux-nvidia-6.5 | Not in release |
| linux-nvidia-6.8 | Not in release |
| linux-nvidia-6.11 | Not in release |
| linux-nvidia-lowlatency | Not in release |
| linux-nvidia-tegra | Not in release |
| linux-nvidia-tegra-5.15 | Not in release |
| linux-nvidia-tegra-igx | Not in release |
| linux-oracle-5.0 | Ignored |
| linux-oracle-5.3 | Ignored |
| linux-oracle-5.4 | Not affected |
| linux-oracle-5.8 | Not in release |
| linux-oracle-5.11 | Not in release |
| linux-oracle-5.13 | Not in release |
| linux-oracle-5.15 | Not in release |
| linux-oracle-6.5 | Not in release |
| linux-oracle-6.8 | Not in release |
| linux-oracle-6.14 | Not in release |
| linux-oem | Ignored |
| linux-oem-5.6 | Not in release |
| linux-oem-5.10 | Not in release |
| linux-oem-5.13 | Not in release |
| linux-oem-5.14 | Not in release |
| linux-oem-5.17 | Not in release |
| linux-oem-6.0 | Not in release |
| linux-oem-6.1 | Not in release |
| linux-oem-6.5 | Not in release |
| linux-oem-6.8 | Not in release |
| linux-oem-6.11 | Not in release |
| linux-oem-6.14 | Not in release |
| linux-oem-6.17 | Not in release |
| linux-raspi2 | Ignored |
| linux-raspi-5.4 | Not affected |
| linux-raspi-realtime | Not in release |
| linux-realtime-6.8 | Not in release |
| linux-realtime-6.14 | Not in release |
| linux-riscv | Not in release |
| linux-riscv-5.8 | Not in release |
| linux-riscv-5.11 | Not in release |
| linux-riscv-5.15 | Not in release |
| linux-riscv-5.19 | Not in release |
| linux-riscv-6.5 | Not in release |
| linux-riscv-6.8 | Not in release |
| linux-riscv-6.14 | Not in release |
| linux-starfive-5.19 | Not in release |
| linux-starfive-6.2 | Not in release |
| linux-starfive-6.5 | Not in release |
| linux-xilinx | Not in release |
| linux-xilinx-zynqmp | Not in release |
| linux-oracle | Not affected |
| linux-raspi | Not in release |
| linux-realtime | Not in release |