Search CVE reports


Toggle filters

51 – 60 of 467 results


CVE-2023-48795

Medium priority

Some fixes available 42 of 93

The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation...

13 affected packages

dropbear, golang-go.crypto, snapd, lxd, libssh...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
dropbear Needs evaluation Fixed Fixed Fixed
golang-go.crypto Needs evaluation Needs evaluation Needs evaluation Needs evaluation
snapd Not affected Not affected Not affected Not affected
lxd Not in release Not in release Not affected Fixed
libssh Not affected Fixed Fixed Not affected
openssh-ssh1 Ignored Ignored Ignored Ignored
libssh2 Not affected Not affected Not affected Not affected
openssh Fixed Fixed Fixed Fixed
paramiko Fixed Fixed Fixed Needs evaluation
putty Needs evaluation Needs evaluation Needs evaluation Needs evaluation
proftpd-dfsg Not affected Not affected Fixed Needs evaluation
python-asyncssh Fixed Fixed Fixed Ignored
filezilla Fixed Fixed Fixed Not affected
Show all 13 packages Show less packages

CVE-2023-4421

Medium priority

Some fixes available 1 of 4

The NSS code used for checking PKCS#1 v1.5 was leaking information useful in mounting Bleichenbacher-like attacks. Both the overall correctness of the padding as well as the length of the encrypted message was leaking through...

1 affected package

nss

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
nss Not affected Not affected Fixed Vulnerable
Show less packages

CVE-2023-5678

Low priority

Some fixes available 12 of 20

Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key...

4 affected packages

openssl1.0, nodejs, edk2, openssl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl1.0 Not in release Not in release Not in release Fixed
nodejs Not affected Vulnerable Not affected Not affected
edk2 Fixed Fixed Vulnerable Needs evaluation
openssl Fixed Fixed Fixed Fixed
Show less packages

CVE-2023-5363

Medium priority

Some fixes available 7 of 8

Issue summary: A bug has been identified in the processing of key and initialisation vector (IV) lengths. This can lead to potential truncation or overruns during the initialisation of some symmetric ciphers. Impact summary: A...

4 affected packages

openssl, openssl1.0, nodejs, edk2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl Fixed Fixed Not affected Not affected
openssl1.0 Not in release Not in release Not in release Not affected
nodejs Not affected Vulnerable Not affected Not affected
edk2 Not affected Not affected Not affected Not affected
Show less packages

CVE-2023-5388

Medium priority

Some fixes available 7 of 20

NSS was susceptible to a timing side-channel attack when performing RSA decryption. This attack could potentially allow an attacker to recover the private data. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and...

9 affected packages

nss, firefox, thunderbird, mozjs38, mozjs52...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
nss Not affected Fixed Fixed Vulnerable
firefox Not affected Not affected Fixed
thunderbird Not affected Fixed Fixed
mozjs38 Not in release Not in release Not in release Ignored
mozjs52 Not in release Not in release Ignored Ignored
mozjs68 Not in release Not in release Ignored
mozjs78 Not in release Ignored Not in release
mozjs91 Not in release Ignored Not in release
mozjs102 Ignored Ignored Not in release
Show all 9 packages Show less packages

CVE-2023-4807

Medium priority
Not affected

Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications on the Windows 64 platform when running on newer X86_64 processors supporting...

4 affected packages

openssl, openssl1.0, nodejs, edk2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl Not affected Not affected Not affected Not affected
openssl1.0 Not in release Not in release Not in release Not affected
nodejs Not affected Not affected Not affected Not affected
edk2 Not affected Not affected Not affected Not affected
Show less packages

CVE-2023-3817

Low priority

Some fixes available 8 of 15

Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may...

4 affected packages

openssl1.0, nodejs, edk2, openssl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl1.0 Not in release Not in release Not in release Fixed
nodejs Not affected Vulnerable Not affected Not affected
edk2 Fixed Fixed Vulnerable Needs evaluation
openssl Not affected Fixed Fixed Fixed
Show less packages

CVE-2023-38408

Medium priority

Some fixes available 11 of 22

The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not...

2 affected packages

openssh, openssh-ssh1

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssh Fixed Fixed Fixed Fixed
openssh-ssh1 Ignored Ignored Ignored Ignored
Show less packages

CVE-2023-3446

Low priority

Some fixes available 9 of 18

Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may...

4 affected packages

openssl1.0, nodejs, edk2, openssl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl1.0 Not in release Not in release Not in release Fixed
nodejs Not affected Vulnerable Not affected Not affected
edk2 Fixed Fixed Vulnerable Needs evaluation
openssl Not affected Fixed Fixed Fixed
Show less packages

CVE-2023-2975

Low priority

Some fixes available 2 of 4

Issue summary: The AES-SIV cipher implementation contains a bug that causes it to ignore empty associated data entries which are unauthenticated as a consequence. Impact summary: Applications that use the AES-SIV algorithm and...

4 affected packages

openssl, openssl1.0, nodejs, edk2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl Not affected Fixed Not affected Not affected
openssl1.0 Not in release Not in release Not in release Not affected
nodejs Not affected Vulnerable Not affected Not affected
edk2 Not affected Not affected Not affected Not affected
Show less packages