Search CVE reports


Toggle filters

131 – 140 of 38499 results

Status is adjusted based on your filters.


CVE-2026-34477

Medium priority
Needs evaluation

The fix for CVE-2025-68161 https://logging.apache.org/security.html#CVE-2025-68161 was incomplete: it addressed hostname verification only when enabled via...

1 affected package

apache-log4j2

Package 20.04 LTS
apache-log4j2 Needs evaluation
Show less packages

CVE-2026-29043

Medium priority
Needs evaluation

HDF5 is software for managing data. In 1.14.1-2 and earlier, an attacker who can control an h5 file parsed by HDF5 can trigger a write-based heap buffer overflow condition in the H5T__ref_mem_setnull method. This can lead to a...

1 affected package

hdf5

Package 20.04 LTS
hdf5 Needs evaluation
Show less packages

CVE-2026-6069

Medium priority
Needs evaluation

NASM’s disasm() function contains a stack based buffer overflow when formatting disassembly output, allowing an attacker triggered out-of-bounds write when `slen` exceeds the buffer capacity.

1 affected package

nasm

Package 20.04 LTS
nasm Needs evaluation
Show less packages

CVE-2026-6068

Medium priority
Needs evaluation

NASM contains a heap use after free vulnerability in response file (-@) processing where a dangling pointer to freed memory is stored in the global depend_file and later dereferenced, as the response-file buffer is freed before...

1 affected package

nasm

Package 20.04 LTS
nasm Needs evaluation
Show less packages

CVE-2026-6067

Medium priority
Needs evaluation

A heap buffer overflow vulnerability exists in the Netwide Assembler (NASM) due to a lack of bounds checking in the obj_directive() function. This vulnerability can be exploited by a user assembling a malicious .asm...

1 affected package

nasm

Package 20.04 LTS
nasm Needs evaluation
Show less packages

CVE-2026-31412

Medium priority
Vulnerable

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_mass_storage: Fix potential integer overflow in check_command_size_in_blocks() The `check_command_size_in_blocks()` function calculates the data...

157 affected packages

linux, linux-aws, linux-aws-5.0, linux-aws-5.11, linux-aws-5.13...

Package 20.04 LTS
linux Vulnerable
linux-aws Vulnerable
linux-aws-5.0 Not in release
linux-aws-5.11 Ignored
linux-aws-5.13 Ignored
linux-aws-5.15 Vulnerable
linux-aws-5.3 Not in release
linux-aws-5.4 Not in release
linux-aws-5.8 Ignored
linux-aws-6.14 Not in release
linux-aws-6.17 Not in release
linux-aws-6.8 Not in release
linux-aws-fips Vulnerable
linux-aws-hwe Not in release
linux-azure Vulnerable
linux-azure-4.15 Not in release
linux-azure-5.11 Ignored
linux-azure-5.13 Ignored
linux-azure-5.15 Vulnerable
linux-azure-5.3 Not in release
linux-azure-5.4 Not in release
linux-azure-5.8 Ignored
linux-azure-6.14 Not in release
linux-azure-6.17 Not in release
linux-azure-6.8 Not in release
linux-azure-edge Not in release
linux-azure-fde Ignored
linux-azure-fde-5.15 Not affected
linux-azure-fde-6.14 Not in release
linux-azure-fde-6.17 Not in release
linux-azure-fde-6.8 Not in release
linux-azure-fips Vulnerable
linux-azure-nvidia Not in release
linux-azure-nvidia-6.14 Not in release
linux-bluefield Vulnerable
linux-fips Vulnerable
linux-gcp Vulnerable
linux-gcp-4.15 Not in release
linux-gcp-5.11 Ignored
linux-gcp-5.13 Ignored
linux-gcp-5.15 Vulnerable
linux-gcp-5.3 Not in release
linux-gcp-5.4 Not in release
linux-gcp-5.8 Ignored
linux-gcp-6.14 Not in release
linux-gcp-6.17 Not in release
linux-gcp-6.8 Not in release
linux-gcp-fips Vulnerable
linux-gke Ignored
linux-gke-4.15 Not in release
linux-gke-5.4 Not in release
linux-gkeop Ignored
linux-gkeop-5.15 Ignored
linux-gkeop-5.4 Not in release
linux-hwe Not in release
linux-hwe-5.11 Ignored
linux-hwe-5.13 Ignored
linux-hwe-5.15 Vulnerable
linux-hwe-5.4 Not in release
linux-hwe-5.8 Ignored
linux-hwe-6.14 Not in release
linux-hwe-6.17 Not in release
linux-hwe-6.8 Not in release
linux-hwe-edge Not in release
linux-ibm Vulnerable
linux-ibm-5.15 Vulnerable
linux-ibm-5.4 Not in release
linux-ibm-6.8 Not in release
linux-intel-iot-realtime Not in release
linux-intel-iotg Not in release
linux-intel-iotg-5.15 Vulnerable
linux-iot Vulnerable
linux-kvm Vulnerable
linux-lowlatency Not in release
linux-lowlatency-hwe-5.15 Vulnerable
linux-lowlatency-hwe-6.8 Not in release
linux-lts-xenial Not in release
linux-nvidia Not in release
linux-nvidia-6.8 Not in release
linux-nvidia-lowlatency Not in release
linux-nvidia-tegra Not in release
linux-nvidia-tegra-5.15 Vulnerable
linux-nvidia-tegra-igx Not in release
linux-oem Not in release
linux-oem-5.10 Ignored
linux-oem-5.13 Ignored
linux-oem-5.14 Ignored
linux-oem-5.6 Ignored
linux-oem-6.14 Not in release
linux-oem-6.17 Not in release
linux-oracle Vulnerable
linux-oracle-5.0 Not in release
linux-oracle-5.11 Ignored
linux-oracle-5.13 Ignored
linux-oracle-5.15 Vulnerable
linux-oracle-5.3 Not in release
linux-oracle-5.4 Not in release
linux-oracle-5.8 Ignored
linux-oracle-6.14 Not in release
linux-oracle-6.17 Not in release
linux-oracle-6.8 Not in release
linux-raspi Vulnerable
linux-raspi-5.4 Not in release
linux-raspi-realtime Not in release
linux-raspi2 Ignored
linux-realtime Not in release
linux-realtime-6.14 Not in release
linux-realtime-6.17 Not in release
linux-realtime-6.8 Not in release
linux-riscv Ignored
linux-riscv-5.11 Ignored
linux-riscv-5.15 Vulnerable
linux-riscv-5.8 Ignored
linux-riscv-6.17 Not in release
linux-riscv-6.8 Not in release
linux-xilinx Not in release
linux-xilinx-zynqmp Vulnerable
linux-hwe-5.19 Not in release
linux-hwe-6.2 Not in release
linux-hwe-6.5 Not in release
linux-hwe-6.11 Not in release
linux-allwinner-5.19 Not in release
linux-aws-5.19 Not in release
linux-aws-6.2 Not in release
linux-aws-6.5 Not in release
linux-azure-5.19 Not in release
linux-azure-6.2 Not in release
linux-azure-6.5 Not in release
linux-azure-6.11 Not in release
linux-azure-fde-5.19 Not in release
linux-azure-fde-6.2 Not in release
linux-gcp-5.19 Not in release
linux-gcp-6.2 Not in release
linux-gcp-6.5 Not in release
linux-gcp-6.11 Not in release
linux-gke-5.15 Ignored
linux-intel-5.13 Ignored
linux-lowlatency-hwe-5.19 Not in release
linux-lowlatency-hwe-6.2 Not in release
linux-lowlatency-hwe-6.5 Not in release
linux-lowlatency-hwe-6.11 Not in release
linux-nvidia-6.2 Not in release
linux-nvidia-6.5 Not in release
linux-nvidia-6.11 Not in release
linux-oracle-6.5 Not in release
linux-oem-5.17 Not in release
linux-oem-6.0 Not in release
linux-oem-6.1 Not in release
linux-oem-6.5 Not in release
linux-oem-6.8 Not in release
linux-oem-6.11 Not in release
linux-riscv-5.19 Not in release
linux-riscv-6.5 Not in release
linux-riscv-6.14 Not in release
linux-starfive-5.19 Not in release
linux-starfive-6.2 Not in release
linux-starfive-6.5 Not in release
Show all 157 packages Show less packages

CVE-2026-33551

Medium priority
Needs evaluation

An issue was discovered in OpenStack Keystone 14 through 26 before 26.1.1, 27.0.0, 28.0.0, and 29.0.0. Restricted application credentials can create EC2 credentials. By using a restricted application credential to call the EC2...

1 affected package

keystone

Package 20.04 LTS
keystone Needs evaluation
Show less packages

CVE-2026-6042

Medium priority
Needs evaluation

A security flaw has been discovered in musl libc up to 1.2.6. Affected is the function iconv of the file src/locale/iconv.c of the component GB18030 4-byte Decoder. Performing a manipulation results in inefficient algorithmic...

1 affected package

musl

Package 20.04 LTS
musl Needs evaluation
Show less packages

CVE-2026-5501

Medium priority
Needs evaluation

wolfSSL_X509_verify_cert in the OpenSSL compatibility layer accepts a certificate chain in which the leaf's signature is not checked, if the attacker supplies an untrusted intermediate with Basic Constraints `CA:FALSE` that is...

1 affected package

wolfssl

Package 20.04 LTS
wolfssl Needs evaluation
Show less packages

CVE-2026-5500

Medium priority
Needs evaluation

wolfSSL's wc_PKCS7_DecodeAuthEnvelopedData() does not properly sanitize the AES-GCM authentication tag length received and has no lower bounds check. A man-in-the-middle can therefore truncate the mac field from 16 bytes to...

1 affected package

wolfssl

Package 20.04 LTS
wolfssl Needs evaluation
Show less packages