Search CVE reports
21 – 30 of 120 results
Some fixes available 5 of 10
Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications running on PowerPC CPU based platforms if the CPU provides vector...
4 affected packages
openssl, openssl1.0, nodejs, edk2
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
openssl | Fixed | Fixed | Not affected | Not affected |
openssl1.0 | Not in release | Not in release | Not in release | Not affected |
nodejs | Not affected | Vulnerable | Not affected | Not affected |
edk2 | Vulnerable | Not affected | Not affected | Not affected |
Some fixes available 9 of 20
Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key...
4 affected packages
openssl1.0, nodejs, edk2, openssl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
openssl1.0 | Not in release | Not in release | Not in release | Fixed |
nodejs | Not affected | Vulnerable | Not affected | Not affected |
edk2 | Vulnerable | Vulnerable | Vulnerable | Needs evaluation |
openssl | Fixed | Fixed | Fixed | Fixed |
Some fixes available 6 of 7
Issue summary: A bug has been identified in the processing of key and initialisation vector (IV) lengths. This can lead to potential truncation or overruns during the initialisation of some symmetric ciphers. Impact summary: A...
4 affected packages
openssl, openssl1.0, nodejs, edk2
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
openssl | Fixed | Fixed | Not affected | Not affected |
openssl1.0 | Not in release | Not in release | Not in release | Not affected |
nodejs | Not affected | Vulnerable | Not affected | Not affected |
edk2 | Not affected | Not affected | Not affected | Not affected |
Some fixes available 6 of 9
An insecure default to allow UEFI Shell in EDK2 was left enabled in Ubuntu's EDK2. This allows an OS-resident attacker to bypass Secure Boot.
1 affected package
edk2
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
edk2 | Fixed | Fixed | Fixed | Needs evaluation |
Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications on the Windows 64 platform when running on newer X86_64 processors supporting...
4 affected packages
openssl, openssl1.0, nodejs, edk2
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
openssl | Not affected | Not affected | Not affected | Not affected |
openssl1.0 | Not in release | Not in release | Not in release | Not affected |
nodejs | Not affected | Not affected | Not affected | Not affected |
edk2 | Not affected | Not affected | Not affected | Not affected |
EDK2's Network Package is susceptible to a predictable TCP Initial Sequence Number. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality.
1 affected package
edk2
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
edk2 | Vulnerable | Vulnerable | Vulnerable | Vulnerable |
EDK2's Network Package is susceptible to a predictable TCP Initial Sequence Number. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality.
1 affected package
edk2
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
edk2 | Vulnerable | Vulnerable | Vulnerable | Vulnerable |
Some fixes available 3 of 6
EDK2's Network Package is susceptible to a buffer overflow vulnerability when handling Server ID option from a DHCPv6 proxy Advertise message. This vulnerability can be exploited by an attacker to gain unauthorized access and...
1 affected package
edk2
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
edk2 | Not affected | Fixed | Fixed | Needs evaluation |
Some fixes available 3 of 6
EDK2's Network Package is susceptible to a buffer overflow vulnerability when processing DNS Servers option from a DHCPv6 Advertise message. This vulnerability can be exploited by an attacker to gain unauthorized access and...
1 affected package
edk2
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
edk2 | Not affected | Fixed | Fixed | Needs evaluation |
Some fixes available 3 of 6
EDK2's Network Package is susceptible to an infinite lop vulnerability when parsing a PadN option in the Destination Options header of IPv6. This vulnerability can be exploited by an attacker to gain unauthorized access and...
1 affected package
edk2
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
edk2 | Not affected | Fixed | Fixed | Needs evaluation |