Search CVE reports
91 – 100 of 27169 results
CVE-2024-53127
Medium priorityIn the Linux kernel, the following vulnerability has been resolved: Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K" The commit 8396c793ffdf ("mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K")...
126 affected packages
linux, linux-allwinner-5.19, linux-aws, linux-aws-5.0, linux-aws-5.11...
Package | 20.04 LTS |
---|---|
linux | Vulnerable |
linux-allwinner-5.19 | Not in release |
linux-aws | Vulnerable |
linux-aws-5.0 | Not in release |
linux-aws-5.11 | Ignored |
linux-aws-5.13 | Ignored |
linux-aws-5.15 | Vulnerable |
linux-aws-5.19 | Not in release |
linux-aws-5.3 | Not in release |
linux-aws-5.4 | Not in release |
linux-aws-5.8 | Ignored |
linux-aws-6.2 | Not in release |
linux-aws-6.5 | Not in release |
linux-aws-6.8 | Not in release |
linux-aws-fips | Not in release |
linux-aws-hwe | Not in release |
linux-azure | Vulnerable |
linux-azure-4.15 | Not in release |
linux-azure-5.11 | Ignored |
linux-azure-5.13 | Ignored |
linux-azure-5.15 | Vulnerable |
linux-azure-5.19 | Not in release |
linux-azure-5.3 | Not in release |
linux-azure-5.4 | Not in release |
linux-azure-5.8 | Ignored |
linux-azure-6.2 | Not in release |
linux-azure-6.5 | Not in release |
linux-azure-6.8 | Not in release |
linux-azure-edge | Not in release |
linux-azure-fde | Ignored |
linux-azure-fde-5.15 | Needs evaluation |
linux-azure-fde-5.19 | Not in release |
linux-azure-fde-6.2 | Not in release |
linux-azure-fips | Not in release |
linux-bluefield | Vulnerable |
linux-fips | Not in release |
linux-gcp | Vulnerable |
linux-gcp-4.15 | Not in release |
linux-gcp-5.11 | Ignored |
linux-gcp-5.13 | Ignored |
linux-gcp-5.15 | Vulnerable |
linux-gcp-5.19 | Not in release |
linux-gcp-5.3 | Not in release |
linux-gcp-5.4 | Not in release |
linux-gcp-5.8 | Ignored |
linux-gcp-6.2 | Not in release |
linux-gcp-6.5 | Not in release |
linux-gcp-6.8 | Not in release |
linux-gcp-fips | Not in release |
linux-gke | Ignored |
linux-gke-4.15 | Not in release |
linux-gke-5.15 | Ignored |
linux-gke-5.4 | Not in release |
linux-gkeop | Ignored |
linux-gkeop-5.15 | Ignored |
linux-gkeop-5.4 | Not in release |
linux-hwe | Not in release |
linux-hwe-5.11 | Ignored |
linux-hwe-5.13 | Ignored |
linux-hwe-5.15 | Vulnerable |
linux-hwe-5.19 | Not in release |
linux-hwe-5.4 | Not in release |
linux-hwe-5.8 | Ignored |
linux-hwe-6.2 | Not in release |
linux-hwe-6.5 | Not in release |
linux-hwe-6.8 | Not in release |
linux-hwe-edge | Not in release |
linux-ibm | Vulnerable |
linux-ibm-5.15 | Vulnerable |
linux-ibm-5.4 | Not in release |
linux-intel | Not in release |
linux-intel-5.13 | Ignored |
linux-intel-iotg | Not in release |
linux-intel-iotg-5.15 | Vulnerable |
linux-intel-iot-realtime | Not in release |
linux-iot | Vulnerable |
linux-kvm | Vulnerable |
linux-lowlatency | Not in release |
linux-lowlatency-hwe-5.15 | Vulnerable |
linux-lowlatency-hwe-5.19 | Not in release |
linux-lowlatency-hwe-6.2 | Not in release |
linux-lowlatency-hwe-6.5 | Not in release |
linux-lowlatency-hwe-6.8 | Not in release |
linux-lts-xenial | Not in release |
linux-nvidia | Not in release |
linux-nvidia-6.2 | Not in release |
linux-nvidia-6.5 | Not in release |
linux-nvidia-6.8 | Not in release |
linux-nvidia-lowlatency | Not in release |
linux-oem | Not in release |
linux-oem-5.10 | Ignored |
linux-oem-5.13 | Ignored |
linux-oem-5.14 | Ignored |
linux-oem-5.17 | Not in release |
linux-oem-5.6 | Ignored |
linux-oem-6.0 | Not in release |
linux-oem-6.1 | Not in release |
linux-oem-6.11 | Not in release |
linux-oem-6.5 | Not in release |
linux-oem-6.8 | Not in release |
linux-oracle | Vulnerable |
linux-oracle-5.0 | Not in release |
linux-oracle-5.11 | Ignored |
linux-oracle-5.13 | Ignored |
linux-oracle-5.15 | Vulnerable |
linux-oracle-5.3 | Not in release |
linux-oracle-5.4 | Not in release |
linux-oracle-5.8 | Ignored |
linux-oracle-6.5 | Not in release |
linux-oracle-6.8 | Not in release |
linux-raspi | Vulnerable |
linux-raspi2 | Ignored |
linux-raspi-5.4 | Not in release |
linux-raspi-realtime | Not in release |
linux-realtime | Not in release |
linux-riscv | Ignored |
linux-riscv-5.11 | Ignored |
linux-riscv-5.15 | Vulnerable |
linux-riscv-5.19 | Not in release |
linux-riscv-5.8 | Ignored |
linux-riscv-6.5 | Not in release |
linux-riscv-6.8 | Not in release |
linux-starfive-5.19 | Not in release |
linux-starfive-6.2 | Not in release |
linux-starfive-6.5 | Not in release |
linux-xilinx-zynqmp | Vulnerable |
CVE-2024-53126
Medium priorityIn the Linux kernel, the following vulnerability has been resolved: vdpa: solidrun: Fix UB bug with devres In psnet_open_pf_bar() and snet_open_vf_bar() a string later passed to pcim_iomap_regions() is placed on the stack....
126 affected packages
linux, linux-allwinner-5.19, linux-aws, linux-aws-5.0, linux-aws-5.11...
Package | 20.04 LTS |
---|---|
linux | Not affected |
linux-allwinner-5.19 | Not in release |
linux-aws | Not affected |
linux-aws-5.0 | Not in release |
linux-aws-5.11 | Ignored |
linux-aws-5.13 | Ignored |
linux-aws-5.15 | Not affected |
linux-aws-5.19 | Not in release |
linux-aws-5.3 | Not in release |
linux-aws-5.4 | Not in release |
linux-aws-5.8 | Ignored |
linux-aws-6.2 | Not in release |
linux-aws-6.5 | Not in release |
linux-aws-6.8 | Not in release |
linux-aws-fips | Not in release |
linux-aws-hwe | Not in release |
linux-azure | Not affected |
linux-azure-4.15 | Not in release |
linux-azure-5.11 | Ignored |
linux-azure-5.13 | Ignored |
linux-azure-5.15 | Not affected |
linux-azure-5.19 | Not in release |
linux-azure-5.3 | Not in release |
linux-azure-5.4 | Not in release |
linux-azure-5.8 | Ignored |
linux-azure-6.2 | Not in release |
linux-azure-6.5 | Not in release |
linux-azure-6.8 | Not in release |
linux-azure-edge | Not in release |
linux-azure-fde | Ignored |
linux-azure-fde-5.15 | Needs evaluation |
linux-azure-fde-5.19 | Not in release |
linux-azure-fde-6.2 | Not in release |
linux-azure-fips | Not in release |
linux-bluefield | Not affected |
linux-fips | Not in release |
linux-gcp | Not affected |
linux-gcp-4.15 | Not in release |
linux-gcp-5.11 | Ignored |
linux-gcp-5.13 | Ignored |
linux-gcp-5.15 | Not affected |
linux-gcp-5.19 | Not in release |
linux-gcp-5.3 | Not in release |
linux-gcp-5.4 | Not in release |
linux-gcp-5.8 | Ignored |
linux-gcp-6.2 | Not in release |
linux-gcp-6.5 | Not in release |
linux-gcp-6.8 | Not in release |
linux-gcp-fips | Not in release |
linux-gke | Ignored |
linux-gke-4.15 | Not in release |
linux-gke-5.15 | Ignored |
linux-gke-5.4 | Not in release |
linux-gkeop | Ignored |
linux-gkeop-5.15 | Ignored |
linux-gkeop-5.4 | Not in release |
linux-hwe | Not in release |
linux-hwe-5.11 | Ignored |
linux-hwe-5.13 | Ignored |
linux-hwe-5.15 | Not affected |
linux-hwe-5.19 | Not in release |
linux-hwe-5.4 | Not in release |
linux-hwe-5.8 | Ignored |
linux-hwe-6.2 | Not in release |
linux-hwe-6.5 | Not in release |
linux-hwe-6.8 | Not in release |
linux-hwe-edge | Not in release |
linux-ibm | Not affected |
linux-ibm-5.15 | Not affected |
linux-ibm-5.4 | Not in release |
linux-intel | Not in release |
linux-intel-5.13 | Ignored |
linux-intel-iotg | Not in release |
linux-intel-iotg-5.15 | Not affected |
linux-intel-iot-realtime | Not in release |
linux-iot | Not affected |
linux-kvm | Not affected |
linux-lowlatency | Not in release |
linux-lowlatency-hwe-5.15 | Not affected |
linux-lowlatency-hwe-5.19 | Not in release |
linux-lowlatency-hwe-6.2 | Not in release |
linux-lowlatency-hwe-6.5 | Not in release |
linux-lowlatency-hwe-6.8 | Not in release |
linux-lts-xenial | Not in release |
linux-nvidia | Not in release |
linux-nvidia-6.2 | Not in release |
linux-nvidia-6.5 | Not in release |
linux-nvidia-6.8 | Not in release |
linux-nvidia-lowlatency | Not in release |
linux-oem | Not in release |
linux-oem-5.10 | Ignored |
linux-oem-5.13 | Ignored |
linux-oem-5.14 | Ignored |
linux-oem-5.17 | Not in release |
linux-oem-5.6 | Ignored |
linux-oem-6.0 | Not in release |
linux-oem-6.1 | Not in release |
linux-oem-6.11 | Not in release |
linux-oem-6.5 | Not in release |
linux-oem-6.8 | Not in release |
linux-oracle | Not affected |
linux-oracle-5.0 | Not in release |
linux-oracle-5.11 | Ignored |
linux-oracle-5.13 | Ignored |
linux-oracle-5.15 | Not affected |
linux-oracle-5.3 | Not in release |
linux-oracle-5.4 | Not in release |
linux-oracle-5.8 | Ignored |
linux-oracle-6.5 | Not in release |
linux-oracle-6.8 | Not in release |
linux-raspi | Not affected |
linux-raspi2 | Ignored |
linux-raspi-5.4 | Not in release |
linux-raspi-realtime | Not in release |
linux-realtime | Not in release |
linux-riscv | Ignored |
linux-riscv-5.11 | Ignored |
linux-riscv-5.15 | Not affected |
linux-riscv-5.19 | Not in release |
linux-riscv-5.8 | Ignored |
linux-riscv-6.5 | Not in release |
linux-riscv-6.8 | Not in release |
linux-starfive-5.19 | Not in release |
linux-starfive-6.2 | Not in release |
linux-starfive-6.5 | Not in release |
linux-xilinx-zynqmp | Not affected |
CVE-2024-53908
Medium priorityAn issue was discovered in Django 5.1 before 5.1.4, 5.0 before 5.0.10, and 4.2 before 4.2.17. Direct usage of the django.db.models.fields.json.HasKey lookup, when an Oracle database is used, is subject to SQL injection...
1 affected package
python-django
Package | 20.04 LTS |
---|---|
python-django | Not affected |
CVE-2024-53907
Medium priorityAn issue was discovered in Django 5.1 before 5.1.4, 5.0 before 5.0.10, and 4.2 before 4.2.17. The strip_tags() method and striptags template filter are subject to a potential denial-of-service attack via certain inputs containing...
1 affected package
python-django
Package | 20.04 LTS |
---|---|
python-django | Fixed |
CVE-2024-53125
Medium priorityIn the Linux kernel, the following vulnerability has been resolved: bpf: sync_linked_regs() must preserve subreg_def Range propagation must not affect subreg_def marks, otherwise the following example is rewritten by verifier...
126 affected packages
linux, linux-allwinner-5.19, linux-aws, linux-aws-5.0, linux-aws-5.11...
Package | 20.04 LTS |
---|---|
linux | Not affected |
linux-allwinner-5.19 | Not in release |
linux-aws | Not affected |
linux-aws-5.0 | Not in release |
linux-aws-5.11 | Ignored |
linux-aws-5.13 | Ignored |
linux-aws-5.15 | Vulnerable |
linux-aws-5.19 | Not in release |
linux-aws-5.3 | Not in release |
linux-aws-5.4 | Not in release |
linux-aws-5.8 | Ignored |
linux-aws-6.2 | Not in release |
linux-aws-6.5 | Not in release |
linux-aws-6.8 | Not in release |
linux-aws-fips | Not in release |
linux-aws-hwe | Not in release |
linux-azure | Not affected |
linux-azure-4.15 | Not in release |
linux-azure-5.11 | Ignored |
linux-azure-5.13 | Ignored |
linux-azure-5.15 | Vulnerable |
linux-azure-5.19 | Not in release |
linux-azure-5.3 | Not in release |
linux-azure-5.4 | Not in release |
linux-azure-5.8 | Ignored |
linux-azure-6.2 | Not in release |
linux-azure-6.5 | Not in release |
linux-azure-6.8 | Not in release |
linux-azure-edge | Not in release |
linux-azure-fde | Ignored |
linux-azure-fde-5.15 | Needs evaluation |
linux-azure-fde-5.19 | Not in release |
linux-azure-fde-6.2 | Not in release |
linux-azure-fips | Not in release |
linux-bluefield | Not affected |
linux-fips | Not in release |
linux-gcp | Not affected |
linux-gcp-4.15 | Not in release |
linux-gcp-5.11 | Ignored |
linux-gcp-5.13 | Ignored |
linux-gcp-5.15 | Vulnerable |
linux-gcp-5.19 | Not in release |
linux-gcp-5.3 | Not in release |
linux-gcp-5.4 | Not in release |
linux-gcp-5.8 | Ignored |
linux-gcp-6.2 | Not in release |
linux-gcp-6.5 | Not in release |
linux-gcp-6.8 | Not in release |
linux-gcp-fips | Not in release |
linux-gke | Ignored |
linux-gke-4.15 | Not in release |
linux-gke-5.15 | Ignored |
linux-gke-5.4 | Not in release |
linux-gkeop | Ignored |
linux-gkeop-5.15 | Ignored |
linux-gkeop-5.4 | Not in release |
linux-hwe | Not in release |
linux-hwe-5.11 | Ignored |
linux-hwe-5.13 | Ignored |
linux-hwe-5.15 | Vulnerable |
linux-hwe-5.19 | Not in release |
linux-hwe-5.4 | Not in release |
linux-hwe-5.8 | Ignored |
linux-hwe-6.2 | Not in release |
linux-hwe-6.5 | Not in release |
linux-hwe-6.8 | Not in release |
linux-hwe-edge | Not in release |
linux-ibm | Not affected |
linux-ibm-5.15 | Vulnerable |
linux-ibm-5.4 | Not in release |
linux-intel | Not in release |
linux-intel-5.13 | Ignored |
linux-intel-iotg | Not in release |
linux-intel-iotg-5.15 | Vulnerable |
linux-intel-iot-realtime | Not in release |
linux-iot | Not affected |
linux-kvm | Not affected |
linux-lowlatency | Not in release |
linux-lowlatency-hwe-5.15 | Vulnerable |
linux-lowlatency-hwe-5.19 | Not in release |
linux-lowlatency-hwe-6.2 | Not in release |
linux-lowlatency-hwe-6.5 | Not in release |
linux-lowlatency-hwe-6.8 | Not in release |
linux-lts-xenial | Not in release |
linux-nvidia | Not in release |
linux-nvidia-6.2 | Not in release |
linux-nvidia-6.5 | Not in release |
linux-nvidia-6.8 | Not in release |
linux-nvidia-lowlatency | Not in release |
linux-oem | Not in release |
linux-oem-5.10 | Ignored |
linux-oem-5.13 | Ignored |
linux-oem-5.14 | Ignored |
linux-oem-5.17 | Not in release |
linux-oem-5.6 | Ignored |
linux-oem-6.0 | Not in release |
linux-oem-6.1 | Not in release |
linux-oem-6.11 | Not in release |
linux-oem-6.5 | Not in release |
linux-oem-6.8 | Not in release |
linux-oracle | Not affected |
linux-oracle-5.0 | Not in release |
linux-oracle-5.11 | Ignored |
linux-oracle-5.13 | Ignored |
linux-oracle-5.15 | Vulnerable |
linux-oracle-5.3 | Not in release |
linux-oracle-5.4 | Not in release |
linux-oracle-5.8 | Ignored |
linux-oracle-6.5 | Not in release |
linux-oracle-6.8 | Not in release |
linux-raspi | Not affected |
linux-raspi2 | Ignored |
linux-raspi-5.4 | Not in release |
linux-raspi-realtime | Not in release |
linux-realtime | Not in release |
linux-riscv | Ignored |
linux-riscv-5.11 | Ignored |
linux-riscv-5.15 | Vulnerable |
linux-riscv-5.19 | Not in release |
linux-riscv-5.8 | Ignored |
linux-riscv-6.5 | Not in release |
linux-riscv-6.8 | Not in release |
linux-starfive-5.19 | Not in release |
linux-starfive-6.2 | Not in release |
linux-starfive-6.5 | Not in release |
linux-xilinx-zynqmp | Not affected |
CVE-2024-54661
Low priorityreadline.sh in socat through 1.8.0.1 relies on the /tmp/$USER/stderr2 file.
1 affected package
socat
Package | 20.04 LTS |
---|---|
socat | Needs evaluation |
CVE-2024-12053
Medium priorityType Confusion in V8 in Google Chrome prior to 131.0.6778.108 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)
1 affected package
chromium-browser
Package | 20.04 LTS |
---|---|
chromium-browser | Not affected |
CVE-2024-53867
Medium prioritySynapse is an open-source Matrix homeserver. The Sliding Sync feature on Synapse versions between 1.113.0rc1 and 1.120.0 can leak partial room state changes to users no longer in a room. Non-state events, like messages,...
1 affected package
matrix-synapse
Package | 20.04 LTS |
---|---|
matrix-synapse | Needs evaluation |
CVE-2024-53863
Medium prioritySynapse is an open-source Matrix homeserver. In Synapse versions before 1.120.1, enabling the dynamic_thumbnails option or processing a specially crafted request could trigger the decoding and thumbnail generation of uncommon...
1 affected package
matrix-synapse
Package | 20.04 LTS |
---|---|
matrix-synapse | Needs evaluation |
CVE-2024-52815
Medium prioritySynapse is an open-source Matrix homeserver. Synapse versions before 1.120.1 fail to properly validate invites received over federation. This vulnerability allows a malicious server to send a specially crafted invite that disrupts...
1 affected package
matrix-synapse
Package | 20.04 LTS |
---|---|
matrix-synapse | Needs evaluation |