Search CVE reports


Toggle filters

1 – 10 of 32373 results

Status is adjusted based on your filters.


CVE-2024-56769

Medium priority
Needs evaluation

In the Linux kernel, the following vulnerability has been resolved: media: dvb-frontends: dib3000mb: fix uninit-value in dib3000_write_reg Syzbot reports [1] an uninitialized value issue found by KMSAN in dib3000_read_reg(). Local...

125 affected packages

linux, linux-allwinner-5.19, linux-aws, linux-aws-5.0, linux-aws-5.11...

Package 18.04 LTS
linux Needs evaluation
linux-allwinner-5.19
linux-aws Needs evaluation
linux-aws-5.0 Ignored
linux-aws-5.11
linux-aws-5.13
linux-aws-5.15
linux-aws-5.19
linux-aws-5.3 Ignored
linux-aws-5.4 Needs evaluation
linux-aws-5.8
linux-aws-6.2
linux-aws-6.5
linux-aws-6.8
linux-aws-fips
linux-aws-hwe
linux-azure Ignored
linux-azure-4.15 Needs evaluation
linux-azure-5.11
linux-azure-5.13
linux-azure-5.15
linux-azure-5.19
linux-azure-5.3 Ignored
linux-azure-5.4 Needs evaluation
linux-azure-5.8
linux-azure-6.2
linux-azure-6.5
linux-azure-6.8
linux-azure-edge Ignored
linux-azure-fde
linux-azure-fde-5.15
linux-azure-fde-5.19
linux-azure-fde-6.2
linux-azure-fips
linux-bluefield
linux-fips
linux-gcp Ignored
linux-gcp-4.15 Needs evaluation
linux-gcp-5.11
linux-gcp-5.13
linux-gcp-5.15
linux-gcp-5.19
linux-gcp-5.3 Ignored
linux-gcp-5.4 Needs evaluation
linux-gcp-5.8
linux-gcp-6.2
linux-gcp-6.5
linux-gcp-6.8
linux-gcp-fips
linux-gke
linux-gke-4.15 Ignored
linux-gke-5.15
linux-gke-5.4 Ignored
linux-gkeop
linux-gkeop-5.15
linux-gkeop-5.4 Ignored
linux-hwe Ignored
linux-hwe-5.11
linux-hwe-5.13
linux-hwe-5.15
linux-hwe-5.19
linux-hwe-5.4 Needs evaluation
linux-hwe-5.8
linux-hwe-6.2
linux-hwe-6.5
linux-hwe-6.8
linux-hwe-edge Ignored
linux-ibm
linux-ibm-5.15
linux-ibm-5.4 Needs evaluation
linux-intel-5.13
linux-intel-iot-realtime
linux-intel-iotg
linux-intel-iotg-5.15
linux-iot
linux-kvm Needs evaluation
linux-lowlatency
linux-lowlatency-hwe-5.15
linux-lowlatency-hwe-5.19
linux-lowlatency-hwe-6.2
linux-lowlatency-hwe-6.5
linux-lowlatency-hwe-6.8
linux-lts-xenial
linux-nvidia
linux-nvidia-6.2
linux-nvidia-6.5
linux-nvidia-6.8
linux-nvidia-lowlatency
linux-oem Ignored
linux-oem-5.10
linux-oem-5.13
linux-oem-5.14
linux-oem-5.17
linux-oem-5.6
linux-oem-6.0
linux-oem-6.1
linux-oem-6.11
linux-oem-6.5
linux-oem-6.8
linux-oracle Needs evaluation
linux-oracle-5.0 Ignored
linux-oracle-5.11
linux-oracle-5.13
linux-oracle-5.15
linux-oracle-5.3 Ignored
linux-oracle-5.4 Needs evaluation
linux-oracle-5.8
linux-oracle-6.5
linux-oracle-6.8
linux-raspi
linux-raspi-5.4 Needs evaluation
linux-raspi-realtime
linux-raspi2
linux-realtime
linux-riscv
linux-riscv-5.11
linux-riscv-5.15
linux-riscv-5.19
linux-riscv-5.8
linux-riscv-6.5
linux-riscv-6.8
linux-starfive-5.19
linux-starfive-6.2
linux-starfive-6.5
linux-xilinx-zynqmp
Show all 125 packages Show less packages

CVE-2024-56768

Medium priority
Needs evaluation

In the Linux kernel, the following vulnerability has been resolved: bpf: Fix bpf_get_smp_processor_id() on !CONFIG_SMP On x86-64 calling bpf_get_smp_processor_id() in a kernel with CONFIG_SMP disabled can trigger the following...

125 affected packages

linux, linux-allwinner-5.19, linux-aws, linux-aws-5.0, linux-aws-5.11...

Package 18.04 LTS
linux Needs evaluation
linux-allwinner-5.19
linux-aws Needs evaluation
linux-aws-5.0 Ignored
linux-aws-5.11
linux-aws-5.13
linux-aws-5.15
linux-aws-5.19
linux-aws-5.3 Ignored
linux-aws-5.4 Needs evaluation
linux-aws-5.8
linux-aws-6.2
linux-aws-6.5
linux-aws-6.8
linux-aws-fips
linux-aws-hwe
linux-azure Ignored
linux-azure-4.15 Needs evaluation
linux-azure-5.11
linux-azure-5.13
linux-azure-5.15
linux-azure-5.19
linux-azure-5.3 Ignored
linux-azure-5.4 Needs evaluation
linux-azure-5.8
linux-azure-6.2
linux-azure-6.5
linux-azure-6.8
linux-azure-edge Ignored
linux-azure-fde
linux-azure-fde-5.15
linux-azure-fde-5.19
linux-azure-fde-6.2
linux-azure-fips
linux-bluefield
linux-fips
linux-gcp Ignored
linux-gcp-4.15 Needs evaluation
linux-gcp-5.11
linux-gcp-5.13
linux-gcp-5.15
linux-gcp-5.19
linux-gcp-5.3 Ignored
linux-gcp-5.4 Needs evaluation
linux-gcp-5.8
linux-gcp-6.2
linux-gcp-6.5
linux-gcp-6.8
linux-gcp-fips
linux-gke
linux-gke-4.15 Ignored
linux-gke-5.15
linux-gke-5.4 Ignored
linux-gkeop
linux-gkeop-5.15
linux-gkeop-5.4 Ignored
linux-hwe Ignored
linux-hwe-5.11
linux-hwe-5.13
linux-hwe-5.15
linux-hwe-5.19
linux-hwe-5.4 Needs evaluation
linux-hwe-5.8
linux-hwe-6.2
linux-hwe-6.5
linux-hwe-6.8
linux-hwe-edge Ignored
linux-ibm
linux-ibm-5.15
linux-ibm-5.4 Needs evaluation
linux-intel-5.13
linux-intel-iot-realtime
linux-intel-iotg
linux-intel-iotg-5.15
linux-iot
linux-kvm Needs evaluation
linux-lowlatency
linux-lowlatency-hwe-5.15
linux-lowlatency-hwe-5.19
linux-lowlatency-hwe-6.2
linux-lowlatency-hwe-6.5
linux-lowlatency-hwe-6.8
linux-lts-xenial
linux-nvidia
linux-nvidia-6.2
linux-nvidia-6.5
linux-nvidia-6.8
linux-nvidia-lowlatency
linux-oem Ignored
linux-oem-5.10
linux-oem-5.13
linux-oem-5.14
linux-oem-5.17
linux-oem-5.6
linux-oem-6.0
linux-oem-6.1
linux-oem-6.11
linux-oem-6.5
linux-oem-6.8
linux-oracle Needs evaluation
linux-oracle-5.0 Ignored
linux-oracle-5.11
linux-oracle-5.13
linux-oracle-5.15
linux-oracle-5.3 Ignored
linux-oracle-5.4 Needs evaluation
linux-oracle-5.8
linux-oracle-6.5
linux-oracle-6.8
linux-raspi
linux-raspi-5.4 Needs evaluation
linux-raspi-realtime
linux-raspi2
linux-realtime
linux-riscv
linux-riscv-5.11
linux-riscv-5.15
linux-riscv-5.19
linux-riscv-5.8
linux-riscv-6.5
linux-riscv-6.8
linux-starfive-5.19
linux-starfive-6.2
linux-starfive-6.5
linux-xilinx-zynqmp
Show all 125 packages Show less packages

CVE-2024-56767

Medium priority
Needs evaluation

In the Linux kernel, the following vulnerability has been resolved: dmaengine: at_xdmac: avoid null_prt_deref in at_xdmac_prep_dma_memset The at_xdmac_memset_create_desc may return NULL, which will lead to a null pointer...

125 affected packages

linux, linux-allwinner-5.19, linux-aws, linux-aws-5.0, linux-aws-5.11...

Package 18.04 LTS
linux Needs evaluation
linux-allwinner-5.19
linux-aws Needs evaluation
linux-aws-5.0 Ignored
linux-aws-5.11
linux-aws-5.13
linux-aws-5.15
linux-aws-5.19
linux-aws-5.3 Ignored
linux-aws-5.4 Needs evaluation
linux-aws-5.8
linux-aws-6.2
linux-aws-6.5
linux-aws-6.8
linux-aws-fips
linux-aws-hwe
linux-azure Ignored
linux-azure-4.15 Needs evaluation
linux-azure-5.11
linux-azure-5.13
linux-azure-5.15
linux-azure-5.19
linux-azure-5.3 Ignored
linux-azure-5.4 Needs evaluation
linux-azure-5.8
linux-azure-6.2
linux-azure-6.5
linux-azure-6.8
linux-azure-edge Ignored
linux-azure-fde
linux-azure-fde-5.15
linux-azure-fde-5.19
linux-azure-fde-6.2
linux-azure-fips
linux-bluefield
linux-fips
linux-gcp Ignored
linux-gcp-4.15 Needs evaluation
linux-gcp-5.11
linux-gcp-5.13
linux-gcp-5.15
linux-gcp-5.19
linux-gcp-5.3 Ignored
linux-gcp-5.4 Needs evaluation
linux-gcp-5.8
linux-gcp-6.2
linux-gcp-6.5
linux-gcp-6.8
linux-gcp-fips
linux-gke
linux-gke-4.15 Ignored
linux-gke-5.15
linux-gke-5.4 Ignored
linux-gkeop
linux-gkeop-5.15
linux-gkeop-5.4 Ignored
linux-hwe Ignored
linux-hwe-5.11
linux-hwe-5.13
linux-hwe-5.15
linux-hwe-5.19
linux-hwe-5.4 Needs evaluation
linux-hwe-5.8
linux-hwe-6.2
linux-hwe-6.5
linux-hwe-6.8
linux-hwe-edge Ignored
linux-ibm
linux-ibm-5.15
linux-ibm-5.4 Needs evaluation
linux-intel-5.13
linux-intel-iot-realtime
linux-intel-iotg
linux-intel-iotg-5.15
linux-iot
linux-kvm Needs evaluation
linux-lowlatency
linux-lowlatency-hwe-5.15
linux-lowlatency-hwe-5.19
linux-lowlatency-hwe-6.2
linux-lowlatency-hwe-6.5
linux-lowlatency-hwe-6.8
linux-lts-xenial
linux-nvidia
linux-nvidia-6.2
linux-nvidia-6.5
linux-nvidia-6.8
linux-nvidia-lowlatency
linux-oem Ignored
linux-oem-5.10
linux-oem-5.13
linux-oem-5.14
linux-oem-5.17
linux-oem-5.6
linux-oem-6.0
linux-oem-6.1
linux-oem-6.11
linux-oem-6.5
linux-oem-6.8
linux-oracle Needs evaluation
linux-oracle-5.0 Ignored
linux-oracle-5.11
linux-oracle-5.13
linux-oracle-5.15
linux-oracle-5.3 Ignored
linux-oracle-5.4 Needs evaluation
linux-oracle-5.8
linux-oracle-6.5
linux-oracle-6.8
linux-raspi
linux-raspi-5.4 Needs evaluation
linux-raspi-realtime
linux-raspi2
linux-realtime
linux-riscv
linux-riscv-5.11
linux-riscv-5.15
linux-riscv-5.19
linux-riscv-5.8
linux-riscv-6.5
linux-riscv-6.8
linux-starfive-5.19
linux-starfive-6.2
linux-starfive-6.5
linux-xilinx-zynqmp
Show all 125 packages Show less packages

CVE-2024-55629

Medium priority
Needs evaluation

Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.8, TCP streams with TCP urgent data (out of band data) can lead to Suricata analyzing...

1 affected package

suricata

Package 18.04 LTS
suricata Needs evaluation
Show less packages

CVE-2024-55628

Medium priority
Needs evaluation

Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to version 7.0.8, DNS resource name compression can lead to small DNS messages containing very large...

1 affected package

suricata

Package 18.04 LTS
suricata Needs evaluation
Show less packages

CVE-2024-55627

Medium priority
Needs evaluation

Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.8, a specially crafted TCP stream can lead to a very large buffer overflow while being zero-filled...

1 affected package

suricata

Package 18.04 LTS
suricata Needs evaluation
Show less packages

CVE-2024-55626

Medium priority
Needs evaluation

Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.8, a large BPF filter file provided to Suricata at startup can lead to a buffer overflow at...

1 affected package

suricata

Package 18.04 LTS
suricata Needs evaluation
Show less packages

CVE-2024-55605

Medium priority
Needs evaluation

Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.8, a large input buffer to the to_lowercase, to_uppercase, strip_whitespace, compress_whitespace,...

1 affected package

suricata

Package 18.04 LTS
suricata Needs evaluation
Show less packages

CVE-2024-55553

Medium priority
Needs evaluation

In FRRouting (FRR) before 10.3, it is possible for an attacker to trigger repeated RIB revalidation by sending approximately 500 RPKI updates, potentially leading to prolonged revalidation times and a Denial of Service (DoS) scenario.

2 affected packages

frr, quagga

Package 18.04 LTS
frr
quagga Needs evaluation
Show less packages

CVE-2024-51741

Medium priority
Needs evaluation

Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The...

3 affected packages

redict, redis, valkey

Package 18.04 LTS
redict
redis Needs evaluation
valkey
Show less packages