Search CVE reports
21 – 30 of 30778 results
CVE-2025-23165
Medium priority[Corrupted pointer in node::fs::ReadFileUtf8(const FunctionCallbackInfo<Value>& args) when args[0] is a string]
1 affected package
nodejs
Package | 20.04 LTS |
---|---|
nodejs | Needs evaluation |
CVE-2023-53146
Medium priorityIn the Linux kernel, the following vulnerability has been resolved: media: dw2102: Fix null-ptr-deref in dw2102_i2c_transfer() In dw2102_i2c_transfer, msg is controlled by user. When msg[i].buf is null and msg[i].len is zero,...
132 affected packages
linux, linux-allwinner-5.19, linux-aws, linux-aws-5.0, linux-aws-5.11...
Package | 20.04 LTS |
---|---|
linux | Needs evaluation |
linux-allwinner-5.19 | Not in release |
linux-aws | Needs evaluation |
linux-aws-5.0 | Not in release |
linux-aws-5.11 | Ignored |
linux-aws-5.13 | Ignored |
linux-aws-5.15 | Needs evaluation |
linux-aws-5.19 | Not in release |
linux-aws-5.3 | Not in release |
linux-aws-5.4 | Not in release |
linux-aws-5.8 | Ignored |
linux-aws-6.2 | Not in release |
linux-aws-6.5 | Not in release |
linux-aws-6.8 | Not in release |
linux-aws-fips | Needs evaluation |
linux-aws-hwe | Not in release |
linux-azure | Needs evaluation |
linux-azure-4.15 | Not in release |
linux-azure-5.11 | Ignored |
linux-azure-5.13 | Ignored |
linux-azure-5.15 | Needs evaluation |
linux-azure-5.19 | Not in release |
linux-azure-5.3 | Not in release |
linux-azure-5.4 | Not in release |
linux-azure-5.8 | Ignored |
linux-azure-6.11 | Not in release |
linux-azure-6.2 | Not in release |
linux-azure-6.5 | Not in release |
linux-azure-6.8 | Not in release |
linux-azure-edge | Not in release |
linux-azure-fde | Ignored |
linux-azure-fde-5.15 | Needs evaluation |
linux-azure-fde-5.19 | Not in release |
linux-azure-fde-6.2 | Not in release |
linux-azure-fips | Needs evaluation |
linux-azure-nvidia | Not in release |
linux-bluefield | Needs evaluation |
linux-fips | Needs evaluation |
linux-gcp | Needs evaluation |
linux-gcp-4.15 | Not in release |
linux-gcp-5.11 | Ignored |
linux-gcp-5.13 | Ignored |
linux-gcp-5.15 | Needs evaluation |
linux-gcp-5.19 | Not in release |
linux-gcp-5.3 | Not in release |
linux-gcp-5.4 | Not in release |
linux-gcp-5.8 | Ignored |
linux-gcp-6.11 | Not in release |
linux-gcp-6.2 | Not in release |
linux-gcp-6.5 | Not in release |
linux-gcp-6.8 | Not in release |
linux-gcp-fips | Needs evaluation |
linux-gke | Ignored |
linux-gke-4.15 | Not in release |
linux-gke-5.15 | Ignored |
linux-gke-5.4 | Not in release |
linux-gkeop | Ignored |
linux-gkeop-5.15 | Ignored |
linux-gkeop-5.4 | Not in release |
linux-hwe | Not in release |
linux-hwe-5.11 | Ignored |
linux-hwe-5.13 | Ignored |
linux-hwe-5.15 | Needs evaluation |
linux-hwe-5.19 | Not in release |
linux-hwe-5.4 | Not in release |
linux-hwe-5.8 | Ignored |
linux-hwe-6.11 | Not in release |
linux-hwe-6.2 | Not in release |
linux-hwe-6.5 | Not in release |
linux-hwe-6.8 | Not in release |
linux-hwe-edge | Not in release |
linux-ibm | Needs evaluation |
linux-ibm-5.15 | Needs evaluation |
linux-ibm-5.4 | Not in release |
linux-intel-5.13 | Ignored |
linux-intel-iot-realtime | Not in release |
linux-intel-iotg | Not in release |
linux-intel-iotg-5.15 | Needs evaluation |
linux-iot | Needs evaluation |
linux-kvm | Needs evaluation |
linux-lowlatency | Not in release |
linux-lowlatency-hwe-5.15 | Needs evaluation |
linux-lowlatency-hwe-5.19 | Not in release |
linux-lowlatency-hwe-6.11 | Not in release |
linux-lowlatency-hwe-6.2 | Not in release |
linux-lowlatency-hwe-6.5 | Not in release |
linux-lowlatency-hwe-6.8 | Not in release |
linux-lts-xenial | Not in release |
linux-nvidia | Not in release |
linux-nvidia-6.2 | Not in release |
linux-nvidia-6.5 | Not in release |
linux-nvidia-6.8 | Not in release |
linux-nvidia-lowlatency | Not in release |
linux-nvidia-tegra | Not in release |
linux-nvidia-tegra-igx | Not in release |
linux-oem | Not in release |
linux-oem-5.10 | Ignored |
linux-oem-5.13 | Ignored |
linux-oem-5.14 | Ignored |
linux-oem-5.17 | Not in release |
linux-oem-5.6 | Ignored |
linux-oem-6.0 | Not in release |
linux-oem-6.1 | Not in release |
linux-oem-6.11 | Not in release |
linux-oem-6.5 | Not in release |
linux-oem-6.8 | Not in release |
linux-oracle | Needs evaluation |
linux-oracle-5.0 | Not in release |
linux-oracle-5.11 | Ignored |
linux-oracle-5.13 | Ignored |
linux-oracle-5.15 | Needs evaluation |
linux-oracle-5.3 | Not in release |
linux-oracle-5.4 | Not in release |
linux-oracle-5.8 | Ignored |
linux-oracle-6.5 | Not in release |
linux-oracle-6.8 | Not in release |
linux-raspi | Needs evaluation |
linux-raspi-5.4 | Not in release |
linux-raspi-realtime | Not in release |
linux-raspi2 | Ignored |
linux-realtime | Not in release |
linux-riscv | Ignored |
linux-riscv-5.11 | Ignored |
linux-riscv-5.15 | Needs evaluation |
linux-riscv-5.19 | Not in release |
linux-riscv-5.8 | Ignored |
linux-riscv-6.5 | Not in release |
linux-riscv-6.8 | Not in release |
linux-starfive-5.19 | Not in release |
linux-starfive-6.2 | Not in release |
linux-starfive-6.5 | Not in release |
linux-xilinx-zynqmp | Needs evaluation |
CVE-2025-47905
Medium priorityVarnish Cache before 7.6.3 and 7.7 before 7.7.1, and Varnish Enterprise before 6.0.13r14, allow client-side desync via HTTP/1 requests, because the product incorrectly permits CRLF to be skipped to delimit chunk boundaries.
1 affected package
varnish
Package | 20.04 LTS |
---|---|
varnish | Needs evaluation |
CVE-2025-4574
Medium priorityIn crossbeam-channel rust crate, the internal `Channel` type's `Drop` method has a race condition which could, in some circumstances, lead to a double-free that could result in memory corruption.
1 affected package
rust-crossbeam-channel
Package | 20.04 LTS |
---|---|
rust-crossbeam-channel | Needs evaluation |
CVE-2025-20623
Medium priorityExposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution for some Intel(R) Core⢠processors (10th Generation) may allow an authenticated user to potentially enable...
1 affected package
intel-microcode
Package | 20.04 LTS |
---|---|
intel-microcode | Needs evaluation |
CVE-2025-20103
Medium priorityInsufficient resource pool in the core management mechanism for some Intel(R) Processors may allow an authenticated user to potentially enable denial of service via local access.
1 affected package
intel-microcode
Package | 20.04 LTS |
---|---|
intel-microcode | Needs evaluation |
CVE-2025-20054
Medium priorityUncaught exception in the core management mechanism for some Intel(R) Processors may allow an authenticated user to potentially enable denial of service via local access.
1 affected package
intel-microcode
Package | 20.04 LTS |
---|---|
intel-microcode | Needs evaluation |
CVE-2024-45332
Medium priorityExposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution in the indirect branch predictors for some Intel(R) Processors may allow an authenticated user...
1 affected package
intel-microcode
Package | 20.04 LTS |
---|---|
intel-microcode | Needs evaluation |
CVE-2024-43420
Medium priorityExposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution for some Intel Atom(R) processors may allow an authenticated user to potentially enable information...
1 affected package
intel-microcode
Package | 20.04 LTS |
---|---|
intel-microcode | Needs evaluation |
CVE-2025-4658
Medium priorityNot in release
Versions of OpenPubkey library prior to 0.10.0 contained a vulnerability that would allow a specially crafted JWS to bypass signature verification. As OPKSSH depends on the OpenPubkey library for authentication,...
1 affected package
opkssh
Package | 20.04 LTS |
---|---|
opkssh | Not in release |