Search CVE reports
51 – 60 of 31401 results
CVE-2024-50624
Medium priorityispdbservice.cpp in KDE Kmail before 6.2.0 allows man-in-the-middle attackers to trigger use of an attacker-controlled mail server because cleartext HTTP is used for a URL such as http://autoconfig.example.com...
1 affected packages
kmail
Package | 18.04 LTS |
---|---|
kmail | Needs evaluation |
CVE-2024-50067
Medium priorityIn the Linux kernel, the following vulnerability has been resolved: uprobe: avoid out-of-bounds memory access of fetching args Uprobe needs to fetch args into a percpu buffer, and then copy to ring buffer to avoid non-atomic...
124 affected packages
linux, linux-allwinner-5.19, linux-aws, linux-aws-5.0, linux-aws-5.11...
Package | 18.04 LTS |
---|---|
linux | Ignored |
linux-allwinner-5.19 | — |
linux-aws | Ignored |
linux-aws-5.0 | Ignored |
linux-aws-5.11 | — |
linux-aws-5.13 | — |
linux-aws-5.15 | — |
linux-aws-5.19 | — |
linux-aws-5.3 | Ignored |
linux-aws-5.4 | Ignored |
linux-aws-5.8 | — |
linux-aws-6.2 | — |
linux-aws-6.5 | — |
linux-aws-6.8 | — |
linux-aws-fips | — |
linux-aws-hwe | — |
linux-azure | Ignored |
linux-azure-4.15 | Ignored |
linux-azure-5.11 | — |
linux-azure-5.13 | — |
linux-azure-5.15 | — |
linux-azure-5.19 | — |
linux-azure-5.3 | Ignored |
linux-azure-5.4 | Ignored |
linux-azure-5.8 | — |
linux-azure-6.2 | — |
linux-azure-6.5 | — |
linux-azure-6.8 | — |
linux-azure-edge | Ignored |
linux-azure-fde | — |
linux-azure-fde-5.15 | — |
linux-azure-fde-5.19 | — |
linux-azure-fde-6.2 | — |
linux-azure-fips | — |
linux-bluefield | — |
linux-fips | — |
linux-gcp | Ignored |
linux-gcp-4.15 | Ignored |
linux-gcp-5.11 | — |
linux-gcp-5.13 | — |
linux-gcp-5.15 | — |
linux-gcp-5.19 | — |
linux-gcp-5.3 | Ignored |
linux-gcp-5.4 | Ignored |
linux-gcp-5.8 | — |
linux-gcp-6.2 | — |
linux-gcp-6.5 | — |
linux-gcp-6.8 | — |
linux-gcp-fips | — |
linux-gke | — |
linux-gke-4.15 | Ignored |
linux-gke-5.15 | — |
linux-gke-5.4 | Ignored |
linux-gkeop | — |
linux-gkeop-5.15 | — |
linux-gkeop-5.4 | Ignored |
linux-hwe | Ignored |
linux-hwe-5.11 | — |
linux-hwe-5.13 | — |
linux-hwe-5.15 | — |
linux-hwe-5.19 | — |
linux-hwe-5.4 | Ignored |
linux-hwe-5.8 | — |
linux-hwe-6.2 | — |
linux-hwe-6.5 | — |
linux-hwe-6.8 | — |
linux-hwe-edge | Ignored |
linux-ibm | — |
linux-ibm-5.15 | — |
linux-ibm-5.4 | Ignored |
linux-intel-5.13 | — |
linux-intel-iot-realtime | — |
linux-intel-iotg | — |
linux-intel-iotg-5.15 | — |
linux-iot | — |
linux-kvm | Ignored |
linux-lowlatency | — |
linux-lowlatency-hwe-5.15 | — |
linux-lowlatency-hwe-5.19 | — |
linux-lowlatency-hwe-6.2 | — |
linux-lowlatency-hwe-6.5 | — |
linux-lowlatency-hwe-6.8 | — |
linux-lts-xenial | — |
linux-nvidia | — |
linux-nvidia-6.2 | — |
linux-nvidia-6.5 | — |
linux-nvidia-6.8 | — |
linux-nvidia-lowlatency | — |
linux-oem | Ignored |
linux-oem-5.10 | — |
linux-oem-5.13 | — |
linux-oem-5.14 | — |
linux-oem-5.17 | — |
linux-oem-5.6 | — |
linux-oem-6.0 | — |
linux-oem-6.1 | — |
linux-oem-6.5 | — |
linux-oem-6.8 | — |
linux-oracle | Ignored |
linux-oracle-5.0 | Ignored |
linux-oracle-5.11 | — |
linux-oracle-5.13 | — |
linux-oracle-5.15 | — |
linux-oracle-5.3 | Ignored |
linux-oracle-5.4 | Ignored |
linux-oracle-5.8 | — |
linux-oracle-6.5 | — |
linux-oracle-6.8 | — |
linux-raspi | — |
linux-raspi-5.4 | Ignored |
linux-raspi-realtime | — |
linux-raspi2 | — |
linux-realtime | — |
linux-riscv | — |
linux-riscv-5.11 | — |
linux-riscv-5.15 | — |
linux-riscv-5.19 | — |
linux-riscv-5.8 | — |
linux-riscv-6.5 | — |
linux-riscv-6.8 | — |
linux-starfive-5.19 | — |
linux-starfive-6.2 | — |
linux-starfive-6.5 | — |
linux-xilinx-zynqmp | — |
CVE-2024-46613
Medium priority[Integer Overflow to Buffer Overflow vulnerability in "string_free_split" functions]
1 affected packages
weechat
Package | 18.04 LTS |
---|---|
weechat | Needs evaluation |
CVE-2024-50615
Medium priorityTinyXML2 through 10.0.0 has a reachable assertion for UINT_MAX/digit, that may lead to application exit, in tinyxml2.cpp XMLUtil::GetCharacterRef.
1 affected packages
tinyxml2
Package | 18.04 LTS |
---|---|
tinyxml2 | Needs evaluation |
CVE-2024-50614
Medium priorityTinyXML2 through 10.0.0 has a reachable assertion for UINT_MAX/16, that may lead to application exit, in tinyxml2.cpp XMLUtil::GetCharacterRef.
1 affected packages
tinyxml2
Package | 18.04 LTS |
---|---|
tinyxml2 | Needs evaluation |
CVE-2024-50613
Medium prioritylibsndfile through 1.2.2 has a reachable assertion, that may lead to application exit, in mpeg_l3_encode.c mpeg_l3_encoder_close.
1 affected packages
libsndfile
Package | 18.04 LTS |
---|---|
libsndfile | Needs evaluation |
CVE-2024-50612
Medium prioritylibsndfile through 1.2.2 has an ogg_vorbis.c vorbis_analysis_wrote out-of-bounds read.
1 affected packages
libsndfile
Package | 18.04 LTS |
---|---|
libsndfile | Needs evaluation |
CVE-2024-50610
Medium priorityGSL (GNU Scientific Library) through 2.8 has an integer signedness error in gsl_siman_solve_many in siman/siman.c. When params.n_tries is negative, incorrect memory allocation occurs.
1 affected packages
gsl
Package | 18.04 LTS |
---|---|
gsl | Needs evaluation |
CVE-2024-50602
Medium priorityAn issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.
23 affected packages
apache2, apr-util, ayttm, cableswig, cadaver...
Package | 18.04 LTS |
---|---|
apache2 | Not affected |
apr-util | Not affected |
ayttm | — |
cableswig | — |
cadaver | Needs evaluation |
cmake | Not affected |
coin3 | Needs evaluation |
expat | Needs evaluation |
firefox | — |
gdcm | Needs evaluation |
ghostscript | Not affected |
insighttoolkit4 | Needs evaluation |
libxmltok | Needs evaluation |
matanza | Needs evaluation |
smart | Needs evaluation |
swish-e | Needs evaluation |
tdom | Needs evaluation |
texlive-bin | Not affected |
thunderbird | — |
vnc4 | Needs evaluation |
vtk | — |
wbxml2 | Needs evaluation |
xmlrpc-c | Needs evaluation |
CVE-2024-0126
Medium priorityNVIDIA GPU Display Driver for Windows and Linux contains a vulnerability which could allow a privileged attacker to escalate permissions. A successful exploit of this vulnerability might lead to code execution, denial of service,...
34 affected packages
nvidia-graphics-drivers-304, nvidia-graphics-drivers-304-updates, nvidia-graphics-drivers-340, nvidia-graphics-drivers-340-updates, nvidia-graphics-drivers-352...
Package | 18.04 LTS |
---|---|
nvidia-graphics-drivers-304 | — |
nvidia-graphics-drivers-304-updates | — |
nvidia-graphics-drivers-340 | Ignored |
nvidia-graphics-drivers-340-updates | Not affected |
nvidia-graphics-drivers-352 | Not affected |
nvidia-graphics-drivers-352-updates | Not affected |
nvidia-graphics-drivers-361 | Not affected |
nvidia-graphics-drivers-367 | Not affected |
nvidia-graphics-drivers-375 | Not affected |
nvidia-graphics-drivers-384 | Not affected |
nvidia-graphics-drivers-390 | Ignored |
nvidia-graphics-drivers-418-server | Ignored |
nvidia-graphics-drivers-430 | Ignored |
nvidia-graphics-drivers-435 | Ignored |
nvidia-graphics-drivers-440 | Ignored |
nvidia-graphics-drivers-440-server | Ignored |
nvidia-graphics-drivers-450 | Ignored |
nvidia-graphics-drivers-450-server | Ignored |
nvidia-graphics-drivers-455 | Ignored |
nvidia-graphics-drivers-460 | Ignored |
nvidia-graphics-drivers-460-server | Ignored |
nvidia-graphics-drivers-470 | Needs evaluation |
nvidia-graphics-drivers-470-server | Needs evaluation |
nvidia-graphics-drivers-495 | Not affected |
nvidia-graphics-drivers-510 | Ignored |
nvidia-graphics-drivers-510-server | Not affected |
nvidia-graphics-drivers-515 | Ignored |
nvidia-graphics-drivers-515-server | Ignored |
nvidia-graphics-drivers-520 | Ignored |
nvidia-graphics-drivers-525 | Not affected |
nvidia-graphics-drivers-525-server | Not affected |
nvidia-graphics-drivers-530 | Ignored |
nvidia-graphics-drivers-535 | — |
nvidia-graphics-drivers-535-server | — |