Search CVE reports
91 – 100 of 25687 results
In the Linux kernel, the following vulnerability has been resolved: Revert “mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K” The commit 8396c793ffdf (“mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K”)...
126 affected packages
linux, linux-allwinner-5.19, linux-aws, linux-aws-5.0, linux-aws-5.11...
Package | 22.04 LTS |
---|---|
linux | Vulnerable |
linux-allwinner-5.19 | Ignored |
linux-aws | Vulnerable |
linux-aws-5.0 | Not in release |
linux-aws-5.11 | Not in release |
linux-aws-5.13 | Not in release |
linux-aws-5.15 | Not in release |
linux-aws-5.19 | Ignored |
linux-aws-5.3 | Not in release |
linux-aws-5.4 | Not in release |
linux-aws-5.8 | Not in release |
linux-aws-6.2 | Ignored |
linux-aws-6.5 | Ignored |
linux-aws-6.8 | Vulnerable |
linux-aws-fips | Not in release |
linux-aws-hwe | Not in release |
linux-azure | Vulnerable |
linux-azure-4.15 | Not in release |
linux-azure-5.11 | Not in release |
linux-azure-5.13 | Not in release |
linux-azure-5.15 | Not in release |
linux-azure-5.19 | Ignored |
linux-azure-5.3 | Not in release |
linux-azure-5.4 | Not in release |
linux-azure-5.8 | Not in release |
linux-azure-6.2 | Ignored |
linux-azure-6.5 | Ignored |
linux-azure-6.8 | Vulnerable |
linux-azure-edge | Not in release |
linux-azure-fde | Needs evaluation |
linux-azure-fde-5.15 | Not in release |
linux-azure-fde-5.19 | Ignored |
linux-azure-fde-6.2 | Ignored |
linux-azure-fips | Not in release |
linux-bluefield | Not in release |
linux-fips | Not in release |
linux-gcp | Vulnerable |
linux-gcp-4.15 | Not in release |
linux-gcp-5.11 | Not in release |
linux-gcp-5.13 | Not in release |
linux-gcp-5.15 | Not in release |
linux-gcp-5.19 | Ignored |
linux-gcp-5.3 | Not in release |
linux-gcp-5.4 | Not in release |
linux-gcp-5.8 | Not in release |
linux-gcp-6.2 | Ignored |
linux-gcp-6.5 | Ignored |
linux-gcp-6.8 | Vulnerable |
linux-gcp-fips | Not in release |
linux-gke | Vulnerable |
linux-gke-4.15 | Not in release |
linux-gke-5.15 | Not in release |
linux-gke-5.4 | Not in release |
linux-gkeop | Vulnerable |
linux-gkeop-5.15 | Not in release |
linux-gkeop-5.4 | Not in release |
linux-hwe | Not in release |
linux-hwe-5.11 | Not in release |
linux-hwe-5.13 | Not in release |
linux-hwe-5.15 | Not in release |
linux-hwe-5.19 | Ignored |
linux-hwe-5.4 | Not in release |
linux-hwe-5.8 | Not in release |
linux-hwe-6.2 | Ignored |
linux-hwe-6.5 | Ignored |
linux-hwe-6.8 | Vulnerable |
linux-hwe-edge | Not in release |
linux-ibm | Vulnerable |
linux-ibm-5.15 | Not in release |
linux-ibm-5.4 | Not in release |
linux-intel | Not in release |
linux-intel-5.13 | Not in release |
linux-intel-iotg | Vulnerable |
linux-intel-iotg-5.15 | Not in release |
linux-intel-iot-realtime | Not in release |
linux-iot | Not in release |
linux-kvm | Vulnerable |
linux-lowlatency | Vulnerable |
linux-lowlatency-hwe-5.15 | Not in release |
linux-lowlatency-hwe-5.19 | Ignored |
linux-lowlatency-hwe-6.2 | Ignored |
linux-lowlatency-hwe-6.5 | Ignored |
linux-lowlatency-hwe-6.8 | Vulnerable |
linux-lts-xenial | Not in release |
linux-nvidia | Vulnerable |
linux-nvidia-6.2 | Ignored |
linux-nvidia-6.5 | Ignored |
linux-nvidia-6.8 | Vulnerable |
linux-nvidia-lowlatency | Not in release |
linux-oem | Not in release |
linux-oem-5.10 | Not in release |
linux-oem-5.13 | Not in release |
linux-oem-5.14 | Not in release |
linux-oem-5.17 | Ignored |
linux-oem-5.6 | Not in release |
linux-oem-6.0 | Ignored |
linux-oem-6.1 | Ignored |
linux-oem-6.11 | Not in release |
linux-oem-6.5 | Ignored |
linux-oem-6.8 | Not in release |
linux-oracle | Vulnerable |
linux-oracle-5.0 | Not in release |
linux-oracle-5.11 | Not in release |
linux-oracle-5.13 | Not in release |
linux-oracle-5.15 | Not in release |
linux-oracle-5.3 | Not in release |
linux-oracle-5.4 | Not in release |
linux-oracle-5.8 | Not in release |
linux-oracle-6.5 | Ignored |
linux-oracle-6.8 | Vulnerable |
linux-raspi | Vulnerable |
linux-raspi2 | Not in release |
linux-raspi-5.4 | Not in release |
linux-raspi-realtime | Not in release |
linux-realtime | Ignored |
linux-riscv | Ignored |
linux-riscv-5.11 | Not in release |
linux-riscv-5.15 | Not in release |
linux-riscv-5.19 | Ignored |
linux-riscv-5.8 | Not in release |
linux-riscv-6.5 | Ignored |
linux-riscv-6.8 | Not affected |
linux-starfive-5.19 | Ignored |
linux-starfive-6.2 | Ignored |
linux-starfive-6.5 | Ignored |
linux-xilinx-zynqmp | Vulnerable |
In the Linux kernel, the following vulnerability has been resolved: vdpa: solidrun: Fix UB bug with devres In psnet_open_pf_bar() and snet_open_vf_bar() a string later passed to pcim_iomap_regions() is placed on the stack....
126 affected packages
linux, linux-allwinner-5.19, linux-aws, linux-aws-5.0, linux-aws-5.11...
Package | 22.04 LTS |
---|---|
linux | Not affected |
linux-allwinner-5.19 | Ignored |
linux-aws | Not affected |
linux-aws-5.0 | Not in release |
linux-aws-5.11 | Not in release |
linux-aws-5.13 | Not in release |
linux-aws-5.15 | Not in release |
linux-aws-5.19 | Ignored |
linux-aws-5.3 | Not in release |
linux-aws-5.4 | Not in release |
linux-aws-5.8 | Not in release |
linux-aws-6.2 | Ignored |
linux-aws-6.5 | Ignored |
linux-aws-6.8 | Vulnerable |
linux-aws-fips | Not in release |
linux-aws-hwe | Not in release |
linux-azure | Not affected |
linux-azure-4.15 | Not in release |
linux-azure-5.11 | Not in release |
linux-azure-5.13 | Not in release |
linux-azure-5.15 | Not in release |
linux-azure-5.19 | Ignored |
linux-azure-5.3 | Not in release |
linux-azure-5.4 | Not in release |
linux-azure-5.8 | Not in release |
linux-azure-6.2 | Ignored |
linux-azure-6.5 | Ignored |
linux-azure-6.8 | Vulnerable |
linux-azure-edge | Not in release |
linux-azure-fde | Needs evaluation |
linux-azure-fde-5.15 | Not in release |
linux-azure-fde-5.19 | Ignored |
linux-azure-fde-6.2 | Ignored |
linux-azure-fips | Not in release |
linux-bluefield | Not in release |
linux-fips | Not in release |
linux-gcp | Not affected |
linux-gcp-4.15 | Not in release |
linux-gcp-5.11 | Not in release |
linux-gcp-5.13 | Not in release |
linux-gcp-5.15 | Not in release |
linux-gcp-5.19 | Ignored |
linux-gcp-5.3 | Not in release |
linux-gcp-5.4 | Not in release |
linux-gcp-5.8 | Not in release |
linux-gcp-6.2 | Ignored |
linux-gcp-6.5 | Ignored |
linux-gcp-6.8 | Vulnerable |
linux-gcp-fips | Not in release |
linux-gke | Not affected |
linux-gke-4.15 | Not in release |
linux-gke-5.15 | Not in release |
linux-gke-5.4 | Not in release |
linux-gkeop | Not affected |
linux-gkeop-5.15 | Not in release |
linux-gkeop-5.4 | Not in release |
linux-hwe | Not in release |
linux-hwe-5.11 | Not in release |
linux-hwe-5.13 | Not in release |
linux-hwe-5.15 | Not in release |
linux-hwe-5.19 | Ignored |
linux-hwe-5.4 | Not in release |
linux-hwe-5.8 | Not in release |
linux-hwe-6.2 | Ignored |
linux-hwe-6.5 | Ignored |
linux-hwe-6.8 | Vulnerable |
linux-hwe-edge | Not in release |
linux-ibm | Not affected |
linux-ibm-5.15 | Not in release |
linux-ibm-5.4 | Not in release |
linux-intel | Not in release |
linux-intel-5.13 | Not in release |
linux-intel-iotg | Not affected |
linux-intel-iotg-5.15 | Not in release |
linux-intel-iot-realtime | Not in release |
linux-iot | Not in release |
linux-kvm | Not affected |
linux-lowlatency | Not affected |
linux-lowlatency-hwe-5.15 | Not in release |
linux-lowlatency-hwe-5.19 | Ignored |
linux-lowlatency-hwe-6.2 | Ignored |
linux-lowlatency-hwe-6.5 | Ignored |
linux-lowlatency-hwe-6.8 | Vulnerable |
linux-lts-xenial | Not in release |
linux-nvidia | Not affected |
linux-nvidia-6.2 | Ignored |
linux-nvidia-6.5 | Ignored |
linux-nvidia-6.8 | Vulnerable |
linux-nvidia-lowlatency | Not in release |
linux-oem | Not in release |
linux-oem-5.10 | Not in release |
linux-oem-5.13 | Not in release |
linux-oem-5.14 | Not in release |
linux-oem-5.17 | Ignored |
linux-oem-5.6 | Not in release |
linux-oem-6.0 | Ignored |
linux-oem-6.1 | Ignored |
linux-oem-6.11 | Not in release |
linux-oem-6.5 | Ignored |
linux-oem-6.8 | Not in release |
linux-oracle | Not affected |
linux-oracle-5.0 | Not in release |
linux-oracle-5.11 | Not in release |
linux-oracle-5.13 | Not in release |
linux-oracle-5.15 | Not in release |
linux-oracle-5.3 | Not in release |
linux-oracle-5.4 | Not in release |
linux-oracle-5.8 | Not in release |
linux-oracle-6.5 | Ignored |
linux-oracle-6.8 | Vulnerable |
linux-raspi | Not affected |
linux-raspi2 | Not in release |
linux-raspi-5.4 | Not in release |
linux-raspi-realtime | Not in release |
linux-realtime | Ignored |
linux-riscv | Ignored |
linux-riscv-5.11 | Not in release |
linux-riscv-5.15 | Not in release |
linux-riscv-5.19 | Ignored |
linux-riscv-5.8 | Not in release |
linux-riscv-6.5 | Ignored |
linux-riscv-6.8 | Vulnerable |
linux-starfive-5.19 | Ignored |
linux-starfive-6.2 | Ignored |
linux-starfive-6.5 | Ignored |
linux-xilinx-zynqmp | Not affected |
An issue was discovered in Django 5.1 before 5.1.4, 5.0 before 5.0.10, and 4.2 before 4.2.17. Direct usage of the django.db.models.fields.json.HasKey lookup, when an Oracle database is used, is subject to SQL injection...
1 affected package
python-django
Package | 22.04 LTS |
---|---|
python-django | Not affected |
An issue was discovered in Django 5.1 before 5.1.4, 5.0 before 5.0.10, and 4.2 before 4.2.17. The strip_tags() method and striptags template filter are subject to a potential denial-of-service attack via certain inputs containing...
1 affected package
python-django
Package | 22.04 LTS |
---|---|
python-django | Fixed |
In the Linux kernel, the following vulnerability has been resolved: bpf: sync_linked_regs() must preserve subreg_def Range propagation must not affect subreg_def marks, otherwise the following example is rewritten by verifier...
126 affected packages
linux, linux-allwinner-5.19, linux-aws, linux-aws-5.0, linux-aws-5.11...
Package | 22.04 LTS |
---|---|
linux | Vulnerable |
linux-allwinner-5.19 | Ignored |
linux-aws | Vulnerable |
linux-aws-5.0 | Not in release |
linux-aws-5.11 | Not in release |
linux-aws-5.13 | Not in release |
linux-aws-5.15 | Not in release |
linux-aws-5.19 | Ignored |
linux-aws-5.3 | Not in release |
linux-aws-5.4 | Not in release |
linux-aws-5.8 | Not in release |
linux-aws-6.2 | Ignored |
linux-aws-6.5 | Ignored |
linux-aws-6.8 | Vulnerable |
linux-aws-fips | Not in release |
linux-aws-hwe | Not in release |
linux-azure | Vulnerable |
linux-azure-4.15 | Not in release |
linux-azure-5.11 | Not in release |
linux-azure-5.13 | Not in release |
linux-azure-5.15 | Not in release |
linux-azure-5.19 | Ignored |
linux-azure-5.3 | Not in release |
linux-azure-5.4 | Not in release |
linux-azure-5.8 | Not in release |
linux-azure-6.2 | Ignored |
linux-azure-6.5 | Ignored |
linux-azure-6.8 | Vulnerable |
linux-azure-edge | Not in release |
linux-azure-fde | Needs evaluation |
linux-azure-fde-5.15 | Not in release |
linux-azure-fde-5.19 | Ignored |
linux-azure-fde-6.2 | Ignored |
linux-azure-fips | Not in release |
linux-bluefield | Not in release |
linux-fips | Not in release |
linux-gcp | Vulnerable |
linux-gcp-4.15 | Not in release |
linux-gcp-5.11 | Not in release |
linux-gcp-5.13 | Not in release |
linux-gcp-5.15 | Not in release |
linux-gcp-5.19 | Ignored |
linux-gcp-5.3 | Not in release |
linux-gcp-5.4 | Not in release |
linux-gcp-5.8 | Not in release |
linux-gcp-6.2 | Ignored |
linux-gcp-6.5 | Ignored |
linux-gcp-6.8 | Vulnerable |
linux-gcp-fips | Not in release |
linux-gke | Vulnerable |
linux-gke-4.15 | Not in release |
linux-gke-5.15 | Not in release |
linux-gke-5.4 | Not in release |
linux-gkeop | Vulnerable |
linux-gkeop-5.15 | Not in release |
linux-gkeop-5.4 | Not in release |
linux-hwe | Not in release |
linux-hwe-5.11 | Not in release |
linux-hwe-5.13 | Not in release |
linux-hwe-5.15 | Not in release |
linux-hwe-5.19 | Ignored |
linux-hwe-5.4 | Not in release |
linux-hwe-5.8 | Not in release |
linux-hwe-6.2 | Ignored |
linux-hwe-6.5 | Ignored |
linux-hwe-6.8 | Vulnerable |
linux-hwe-edge | Not in release |
linux-ibm | Vulnerable |
linux-ibm-5.15 | Not in release |
linux-ibm-5.4 | Not in release |
linux-intel | Not in release |
linux-intel-5.13 | Not in release |
linux-intel-iotg | Vulnerable |
linux-intel-iotg-5.15 | Not in release |
linux-intel-iot-realtime | Not in release |
linux-iot | Not in release |
linux-kvm | Vulnerable |
linux-lowlatency | Vulnerable |
linux-lowlatency-hwe-5.15 | Not in release |
linux-lowlatency-hwe-5.19 | Ignored |
linux-lowlatency-hwe-6.2 | Ignored |
linux-lowlatency-hwe-6.5 | Ignored |
linux-lowlatency-hwe-6.8 | Vulnerable |
linux-lts-xenial | Not in release |
linux-nvidia | Vulnerable |
linux-nvidia-6.2 | Ignored |
linux-nvidia-6.5 | Ignored |
linux-nvidia-6.8 | Vulnerable |
linux-nvidia-lowlatency | Not in release |
linux-oem | Not in release |
linux-oem-5.10 | Not in release |
linux-oem-5.13 | Not in release |
linux-oem-5.14 | Not in release |
linux-oem-5.17 | Ignored |
linux-oem-5.6 | Not in release |
linux-oem-6.0 | Ignored |
linux-oem-6.1 | Ignored |
linux-oem-6.11 | Not in release |
linux-oem-6.5 | Ignored |
linux-oem-6.8 | Not in release |
linux-oracle | Vulnerable |
linux-oracle-5.0 | Not in release |
linux-oracle-5.11 | Not in release |
linux-oracle-5.13 | Not in release |
linux-oracle-5.15 | Not in release |
linux-oracle-5.3 | Not in release |
linux-oracle-5.4 | Not in release |
linux-oracle-5.8 | Not in release |
linux-oracle-6.5 | Ignored |
linux-oracle-6.8 | Vulnerable |
linux-raspi | Vulnerable |
linux-raspi2 | Not in release |
linux-raspi-5.4 | Not in release |
linux-raspi-realtime | Not in release |
linux-realtime | Ignored |
linux-riscv | Ignored |
linux-riscv-5.11 | Not in release |
linux-riscv-5.15 | Not in release |
linux-riscv-5.19 | Ignored |
linux-riscv-5.8 | Not in release |
linux-riscv-6.5 | Ignored |
linux-riscv-6.8 | Vulnerable |
linux-starfive-5.19 | Ignored |
linux-starfive-6.2 | Ignored |
linux-starfive-6.5 | Ignored |
linux-xilinx-zynqmp | Vulnerable |
readline.sh in socat through 1.8.0.1 relies on the /tmp/$USER/stderr2 file.
1 affected package
socat
Package | 22.04 LTS |
---|---|
socat | Needs evaluation |
Type Confusion in V8 in Google Chrome prior to 131.0.6778.108 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)
1 affected package
chromium-browser
Package | 22.04 LTS |
---|---|
chromium-browser | Not affected |
Synapse is an open-source Matrix homeserver. The Sliding Sync feature on Synapse versions between 1.113.0rc1 and 1.120.0 can leak partial room state changes to users no longer in a room. Non-state events, like messages,...
1 affected package
matrix-synapse
Package | 22.04 LTS |
---|---|
matrix-synapse | Needs evaluation |
Synapse is an open-source Matrix homeserver. In Synapse versions before 1.120.1, enabling the dynamic_thumbnails option or processing a specially crafted request could trigger the decoding and thumbnail generation of uncommon...
1 affected package
matrix-synapse
Package | 22.04 LTS |
---|---|
matrix-synapse | Needs evaluation |
Synapse is an open-source Matrix homeserver. Synapse versions before 1.120.1 fail to properly validate invites received over federation. This vulnerability allows a malicious server to send a specially crafted invite that disrupts...
1 affected package
matrix-synapse
Package | 22.04 LTS |
---|---|
matrix-synapse | Needs evaluation |