Your submission was sent successfully! Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

Search CVE reports


Toggle filters

41 – 50 of 37277 results

Status is adjusted based on your filters.


CVE-2024-50613

Medium priority
Needs evaluation

libsndfile through 1.2.2 has a reachable assertion, that may lead to application exit, in mpeg_l3_encode.c mpeg_l3_encoder_close.

1 affected packages

libsndfile

Package 16.04 LTS
libsndfile Needs evaluation
Show less packages

CVE-2024-50612

Medium priority
Needs evaluation

libsndfile through 1.2.2 has an ogg_vorbis.c vorbis_analysis_wrote out-of-bounds read.

1 affected packages

libsndfile

Package 16.04 LTS
libsndfile Needs evaluation
Show less packages

CVE-2024-50610

Medium priority
Needs evaluation

GSL (GNU Scientific Library) through 2.8 has an integer signedness error in gsl_siman_solve_many in siman/siman.c. When params.n_tries is negative, incorrect memory allocation occurs.

1 affected packages

gsl

Package 16.04 LTS
gsl Needs evaluation
Show less packages

CVE-2024-50602

Medium priority
Needs evaluation

An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.

23 affected packages

apache2, apr-util, ayttm, cableswig, cadaver...

Package 16.04 LTS
apache2 Not affected
apr-util Not affected
ayttm Needs evaluation
cableswig Needs evaluation
cadaver Needs evaluation
cmake Not affected
coin3 Needs evaluation
expat Needs evaluation
firefox
gdcm Needs evaluation
ghostscript Not affected
insighttoolkit4 Needs evaluation
libxmltok Needs evaluation
matanza Needs evaluation
smart Needs evaluation
swish-e Needs evaluation
tdom Needs evaluation
texlive-bin Not affected
thunderbird
vnc4 Needs evaluation
vtk Needs evaluation
wbxml2 Needs evaluation
xmlrpc-c Needs evaluation
Show all 23 packages Show less packages

CVE-2024-0126

Medium priority
Ignored

NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability which could allow a privileged attacker to escalate permissions. A successful exploit of this vulnerability might lead to code execution, denial of service,...

34 affected packages

nvidia-graphics-drivers-304, nvidia-graphics-drivers-304-updates, nvidia-graphics-drivers-340, nvidia-graphics-drivers-340-updates, nvidia-graphics-drivers-352...

Package 16.04 LTS
nvidia-graphics-drivers-304 Ignored
nvidia-graphics-drivers-304-updates Not affected
nvidia-graphics-drivers-340 Ignored
nvidia-graphics-drivers-340-updates Not affected
nvidia-graphics-drivers-352 Not affected
nvidia-graphics-drivers-352-updates Not affected
nvidia-graphics-drivers-361 Not affected
nvidia-graphics-drivers-367 Not affected
nvidia-graphics-drivers-375 Not affected
nvidia-graphics-drivers-384 Not affected
nvidia-graphics-drivers-390
nvidia-graphics-drivers-418-server
nvidia-graphics-drivers-430
nvidia-graphics-drivers-435
nvidia-graphics-drivers-440
nvidia-graphics-drivers-440-server
nvidia-graphics-drivers-450
nvidia-graphics-drivers-450-server
nvidia-graphics-drivers-455
nvidia-graphics-drivers-460
nvidia-graphics-drivers-460-server
nvidia-graphics-drivers-470
nvidia-graphics-drivers-470-server
nvidia-graphics-drivers-495
nvidia-graphics-drivers-510
nvidia-graphics-drivers-510-server
nvidia-graphics-drivers-515
nvidia-graphics-drivers-515-server
nvidia-graphics-drivers-520
nvidia-graphics-drivers-525
nvidia-graphics-drivers-525-server
nvidia-graphics-drivers-530
nvidia-graphics-drivers-535
nvidia-graphics-drivers-535-server
Show all 34 packages Show less packages

CVE-2024-49767

Medium priority
Not affected

Werkzeug is a Web Server Gateway Interface web application library. Applications using `werkzeug.formparser.MultiPartParser` corresponding to a version of Werkzeug prior to 3.0.6 to parse `multipart/form-data` requests (e.g. all...

2 affected packages

python-werkzeug, quart

Package 16.04 LTS
python-werkzeug Not affected
quart
Show less packages

CVE-2024-49766

Medium priority
Not affected

Werkzeug is a Web Server Gateway Interface web application library. On Python < 3.11 on Windows, os.path.isabs() does not catch UNC paths like //server/share. Werkzeug's safe_join() relies on this check, and so can produce a path...

1 affected packages

python-werkzeug

Package 16.04 LTS
python-werkzeug Not affected
Show less packages

CVE-2024-48426

Medium priority
Needs evaluation

A segmentation fault (SEGV) was detected in the SortByPTypeProcess::Execute function in the Assimp library during fuzz testing with AddressSanitizer. The crash occurred due to a read access to an invalid memory address (0x1000c9714971).

4 affected packages

assimp, qt6-3d, qt6-quick3d, spring

Package 16.04 LTS
assimp Needs evaluation
qt6-3d
qt6-quick3d
spring Needs evaluation
Show less packages

CVE-2024-48425

Medium priority
Needs evaluation

A segmentation fault (SEGV) was detected in the Assimp::SplitLargeMeshesProcess_Triangle::UpdateNode function within the Assimp library during fuzz testing using AddressSanitizer. The crash occurs due to a read access violation at...

4 affected packages

assimp, qt6-3d, qt6-quick3d, spring

Package 16.04 LTS
assimp Needs evaluation
qt6-3d
qt6-quick3d
spring Needs evaluation
Show less packages

CVE-2024-48424

Medium priority
Needs evaluation

A heap-buffer-overflow vulnerability has been identified in the OpenDDLParser::parseStructure function within the Assimp library, specifically during the processing of OpenGEX files.

4 affected packages

assimp, qt6-3d, qt6-quick3d, spring

Package 16.04 LTS
assimp Needs evaluation
qt6-3d
qt6-quick3d
spring Needs evaluation
Show less packages