Search CVE reports
1401 – 1410 of 42867 results
A race condition vulnerability exists in MedusaJS Medusa v2.12.2 and earlier in the registerUsage() function of the promotion module. The function performs a non-atomic read-check-update operation when enforcing promotion usage...
1 affected package
medusa
| Package | 18.04 LTS |
|---|---|
| medusa | Needs evaluation |
A specially-crafted file can cause libjxl's decoder to read pixel data from uninitialized (but allocated) memory. This can be done by causing the decoder to reference an outside-image-bound area in a subsequent patches. An...
1 affected package
graphicsmagick
| Package | 18.04 LTS |
|---|---|
| graphicsmagick | Needs evaluation |
cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. Prior to 46.0.5, the public_key_from_numbers (or...
1 affected package
python-cryptography
| Package | 18.04 LTS |
|---|---|
| python-cryptography | Needs evaluation |
Improper isolation of shared resources on a system on a chip by a malicious local attacker with high privileges could potentially lead to a partial loss of integrity.
1 affected package
amd64-microcode
| Package | 18.04 LTS |
|---|---|
| amd64-microcode | Needs evaluation |
Improper Prevention of Lock Bit Modification in SEV firmware could allow a privileged attacker to downgrade firmware potentially resulting in a loss of integrity.
1 affected package
amd64-microcode
| Package | 18.04 LTS |
|---|---|
| amd64-microcode | Not affected |
Improper bound check within AMD CPU microcode can allow a malicious guest to write to host memory, potentially resulting in loss of integrity.
1 affected package
amd64-microcode
| Package | 18.04 LTS |
|---|---|
| amd64-microcode | Needs evaluation |
Insufficient Granularity of Access Control in SEV firmware could allow a privileged user with a malicious hypervisor to create a SEV-ES guest with an ASID in the range meant for SEV-SNP guests potentially resulting in a partial...
1 affected package
amd64-microcode
| Package | 18.04 LTS |
|---|---|
| amd64-microcode | Not affected |
Insufficient Granularity of Access Control in SEV firmware can allow a privileged attacker to create a SEV-ES Guest to attack SNP guest, potentially resulting in a loss of confidentiality.
1 affected package
amd64-microcode
| Package | 18.04 LTS |
|---|---|
| amd64-microcode | Needs evaluation |
Missing Checks in certain functions related to RMP initialization can allow a local admin privileged attacker to cause misidentification of I/O memory, potentially resulting in a loss of guest memory integrity
1 affected package
amd64-microcode
| Package | 18.04 LTS |
|---|---|
| amd64-microcode | Not affected |
Improper Initialization within the AMD Secure Encrypted Virtualization (SEV) firmware can allow an admin privileged attacker to corrupt RMP covered memory, potentially resulting in loss of guest memory integrity
1 affected package
amd64-microcode
| Package | 18.04 LTS |
|---|---|
| amd64-microcode | Not affected |