Search CVE reports
61 – 70 of 33152 results
In the Linux kernel, the following vulnerability has been resolved: x86/vmscape: Add conditional IBPB mitigation VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace...
144 affected packages
linux, linux-hwe, linux-hwe-5.4, linux-hwe-5.8, linux-hwe-5.11...
Package | 20.04 LTS |
---|---|
linux | Vulnerable |
linux-hwe | Not in release |
linux-hwe-5.4 | Not in release |
linux-hwe-5.8 | Ignored |
linux-hwe-5.11 | Ignored |
linux-hwe-5.13 | Ignored |
linux-hwe-5.15 | Vulnerable |
linux-hwe-5.19 | Not in release |
linux-hwe-6.2 | Not in release |
linux-hwe-6.5 | Not in release |
linux-hwe-6.8 | Not in release |
linux-hwe-6.11 | Not in release |
linux-hwe-6.14 | Not in release |
linux-hwe-edge | Not in release |
linux-lts-xenial | Not in release |
linux-kvm | Vulnerable |
linux-allwinner-5.19 | Not in release |
linux-aws | Vulnerable |
linux-aws-5.0 | Not in release |
linux-aws-5.3 | Not in release |
linux-aws-5.4 | Not in release |
linux-aws-5.8 | Ignored |
linux-aws-5.11 | Ignored |
linux-aws-5.13 | Ignored |
linux-aws-5.15 | Vulnerable |
linux-aws-5.19 | Not in release |
linux-aws-6.2 | Not in release |
linux-aws-6.5 | Not in release |
linux-aws-6.8 | Not in release |
linux-aws-6.14 | Not in release |
linux-aws-hwe | Not in release |
linux-azure | Vulnerable |
linux-azure-4.15 | Not in release |
linux-azure-5.3 | Not in release |
linux-azure-5.4 | Not in release |
linux-azure-5.8 | Ignored |
linux-azure-5.11 | Ignored |
linux-azure-5.13 | Ignored |
linux-azure-5.15 | Vulnerable |
linux-azure-5.19 | Not in release |
linux-azure-6.2 | Not in release |
linux-azure-6.5 | Not in release |
linux-azure-6.8 | Not in release |
linux-azure-6.11 | Not in release |
linux-azure-fde | Ignored |
linux-azure-fde-5.15 | Vulnerable |
linux-azure-fde-5.19 | Not in release |
linux-azure-fde-6.2 | Not in release |
linux-azure-nvidia | Not in release |
linux-bluefield | Vulnerable |
linux-azure-edge | Not in release |
linux-fips | Vulnerable |
linux-aws-fips | Vulnerable |
linux-azure-fips | Vulnerable |
linux-gcp-fips | Vulnerable |
linux-gcp | Vulnerable |
linux-gcp-4.15 | Not in release |
linux-gcp-5.3 | Not in release |
linux-gcp-5.4 | Not in release |
linux-gcp-5.8 | Ignored |
linux-gcp-5.11 | Ignored |
linux-gcp-5.13 | Ignored |
linux-gcp-5.15 | Vulnerable |
linux-gcp-5.19 | Not in release |
linux-gcp-6.2 | Not in release |
linux-gcp-6.5 | Not in release |
linux-gcp-6.8 | Not in release |
linux-gcp-6.11 | Not in release |
linux-gcp-6.14 | Not in release |
linux-gke | Ignored |
linux-gke-4.15 | Not in release |
linux-gke-5.4 | Not in release |
linux-gke-5.15 | Ignored |
linux-gkeop | Ignored |
linux-gkeop-5.4 | Not in release |
linux-gkeop-5.15 | Ignored |
linux-ibm | Vulnerable |
linux-ibm-5.4 | Not in release |
linux-ibm-5.15 | Vulnerable |
linux-ibm-6.8 | Not in release |
linux-intel-5.13 | Ignored |
linux-intel-iotg | Not in release |
linux-intel-iotg-5.15 | Vulnerable |
linux-iot | Vulnerable |
linux-intel-iot-realtime | Not in release |
linux-lowlatency | Not in release |
linux-lowlatency-hwe-5.15 | Vulnerable |
linux-lowlatency-hwe-5.19 | Not in release |
linux-lowlatency-hwe-6.2 | Not in release |
linux-lowlatency-hwe-6.5 | Not in release |
linux-lowlatency-hwe-6.8 | Not in release |
linux-lowlatency-hwe-6.11 | Not in release |
linux-nvidia | Not in release |
linux-nvidia-6.2 | Not in release |
linux-nvidia-6.5 | Not in release |
linux-nvidia-6.8 | Not in release |
linux-nvidia-6.11 | Not in release |
linux-nvidia-lowlatency | Not in release |
linux-nvidia-tegra | Not in release |
linux-nvidia-tegra-5.15 | Vulnerable |
linux-nvidia-tegra-igx | Not in release |
linux-oracle | Vulnerable |
linux-oracle-5.0 | Not in release |
linux-oracle-5.3 | Not in release |
linux-oracle-5.4 | Not in release |
linux-oracle-5.8 | Ignored |
linux-oracle-5.11 | Ignored |
linux-oem-6.0 | Not in release |
linux-oracle-5.13 | Ignored |
linux-oracle-5.15 | Vulnerable |
linux-oracle-6.5 | Not in release |
linux-oracle-6.8 | Not in release |
linux-oracle-6.14 | Not in release |
linux-oem | Not in release |
linux-oem-5.6 | Ignored |
linux-oem-5.10 | Ignored |
linux-oem-5.13 | Ignored |
linux-oem-5.14 | Ignored |
linux-oem-5.17 | Not in release |
linux-oem-6.1 | Not in release |
linux-oem-6.5 | Not in release |
linux-oem-6.8 | Not in release |
linux-oem-6.11 | Not in release |
linux-oem-6.14 | Not in release |
linux-raspi | Vulnerable |
linux-raspi2 | Ignored |
linux-raspi-5.4 | Not in release |
linux-raspi-realtime | Not in release |
linux-realtime | Not in release |
linux-realtime-6.8 | Not in release |
linux-realtime-6.14 | Not in release |
linux-riscv | Ignored |
linux-riscv-5.8 | Ignored |
linux-riscv-5.11 | Ignored |
linux-riscv-5.15 | Vulnerable |
linux-riscv-5.19 | Not in release |
linux-riscv-6.5 | Not in release |
linux-riscv-6.8 | Not in release |
linux-riscv-6.14 | Not in release |
linux-starfive-5.19 | Not in release |
linux-starfive-6.2 | Not in release |
linux-starfive-6.5 | Not in release |
linux-xilinx-zynqmp | Vulnerable |
linux-intel | Not in release |
An SQL injection vulnerability has been identified in the "ID" attribute of the SAML response when the replay cache of the Shibboleth Service Provider (SP) is configured to use an SQL database as storage service....
1 affected package
shibboleth-sp
Package | 20.04 LTS |
---|---|
shibboleth-sp | Needs evaluation |
Out-of-bounds read when dealing with cookies
1 affected package
curl
Package | 20.04 LTS |
---|---|
curl | Vulnerable |
[Unknown description]
1 affected package
xen
Package | 20.04 LTS |
---|---|
xen | Needs evaluation |
[Unknown description]
1 affected package
xen
Package | 20.04 LTS |
---|---|
xen | Needs evaluation |
[Unknown description]
1 affected package
xen
Package | 20.04 LTS |
---|---|
xen | Needs evaluation |
[Unknown description]
1 affected package
xen
Package | 20.04 LTS |
---|---|
xen | Needs evaluation |
[Unknown description]
1 affected package
xen
Package | 20.04 LTS |
---|---|
xen | Needs evaluation |
predictable WebSocket mask
1 affected package
curl
Package | 20.04 LTS |
---|---|
curl | Not affected |
A heap-buffer-overflow write exists in jpeg2000dec FFmpeg which allows an attacker to potentially gain remote code execution or cause denial of service via the channel definition cdef atom of JPEG2000.
2 affected packages
ffmpeg, libav
Package | 20.04 LTS |
---|---|
ffmpeg | Needs evaluation |
libav | — |