Search CVE reports
321 – 330 of 390 results
Some fixes available 8 of 101
Use-after-free vulnerability in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary, related to "ktypevec."
11 affected packages
binutils, binutils-h8300-hms, gcc-h8300-hms, nescc, gcc-arm-none-eabi...
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| binutils | Not affected | Not affected | Not affected | Not affected |
| binutils-h8300-hms | Vulnerable | Vulnerable | Vulnerable | Vulnerable |
| gcc-h8300-hms | Vulnerable | Vulnerable | Vulnerable | Vulnerable |
| nescc | Not in release | Vulnerable | Vulnerable | Vulnerable |
| gcc-arm-none-eabi | Not affected | Not affected | Not affected | Not affected |
| gccxml | Not in release | Not in release | Not in release | Not in release |
| gdb | Not affected | Not affected | Not affected | Not affected |
| ht | Not affected | Not affected | Not affected | Not affected |
| libiberty | Not affected | Not affected | Not affected | Not affected |
| sdcc | Not affected | Not affected | Not affected | Vulnerable |
| valgrind | Not affected | Not affected | Not affected | Not affected |
Some fixes available 8 of 101
Use-after-free vulnerability in libiberty allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted binary, related to "btypevec."
11 affected packages
binutils-h8300-hms, binutils, ht, libiberty, valgrind...
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| binutils-h8300-hms | Vulnerable | Vulnerable | Vulnerable | Vulnerable |
| binutils | Not affected | Not affected | Not affected | Not affected |
| ht | Not affected | Not affected | Not affected | Not affected |
| libiberty | Not affected | Not affected | Not affected | Not affected |
| valgrind | Not affected | Not affected | Not affected | Not affected |
| gcc-h8300-hms | Vulnerable | Vulnerable | Vulnerable | Vulnerable |
| nescc | Not in release | Vulnerable | Vulnerable | Vulnerable |
| gcc-arm-none-eabi | Not affected | Not affected | Not affected | Not affected |
| gccxml | Not in release | Not in release | Not in release | Not in release |
| gdb | Not affected | Not affected | Not affected | Not affected |
| sdcc | Not affected | Not affected | Not affected | Vulnerable |
Some fixes available 8 of 101
Integer overflow in the string_appends function in cplus-dem.c in libiberty allows remote attackers to execute arbitrary code via a crafted executable, which triggers a buffer overflow.
11 affected packages
binutils, binutils-h8300-hms, ht, libiberty, valgrind...
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| binutils | Not affected | Not affected | Not affected | Not affected |
| binutils-h8300-hms | Vulnerable | Vulnerable | Vulnerable | Vulnerable |
| ht | Not affected | Not affected | Not affected | Not affected |
| libiberty | Not affected | Not affected | Not affected | Not affected |
| valgrind | Not affected | Not affected | Not affected | Not affected |
| gcc-h8300-hms | Vulnerable | Vulnerable | Vulnerable | Vulnerable |
| gccxml | Not in release | Not in release | Not in release | Not in release |
| gdb | Not affected | Not affected | Not affected | Not affected |
| gcc-arm-none-eabi | Not affected | Not affected | Not affected | Not affected |
| sdcc | Not affected | Not affected | Not affected | Vulnerable |
| nescc | Not in release | Vulnerable | Vulnerable | Vulnerable |
Some fixes available 8 of 86
The demangler in GNU Libiberty allows remote attackers to cause a denial of service (infinite loop, stack overflow, and crash) via a cycle in the references of remembered mangled types.
8 affected packages
binutils, gdb, ht, libiberty, valgrind...
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| binutils | Not affected | Not affected | Not affected | Not affected |
| gdb | Not affected | Not affected | Not affected | Not affected |
| ht | Not affected | Not affected | Not affected | Not affected |
| libiberty | Not affected | Not affected | Not affected | Not affected |
| valgrind | Not affected | Not affected | Not affected | Not affected |
| binutils-h8300-hms | Vulnerable | Vulnerable | Vulnerable | Vulnerable |
| gcc-h8300-hms | Vulnerable | Vulnerable | Vulnerable | Vulnerable |
| nescc | Not in release | Vulnerable | Vulnerable | Vulnerable |
Some fixes available 9 of 10
Multiple heap-based buffer overflows in the read_attribute function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to have unspecified impact via a crafted OpenPGP certificate.
2 affected packages
gnutls26, gnutls28
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| gnutls26 | — | — | — | Not in release |
| gnutls28 | — | — | — | Fixed |
Some fixes available 9 of 10
Stack-based buffer overflow in the cdk_pk_get_keyid function in lib/opencdk/pubkey.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via a crafted OpenPGP certificate.
2 affected packages
gnutls26, gnutls28
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| gnutls26 | — | — | — | Not in release |
| gnutls28 | — | — | — | Fixed |
Some fixes available 9 of 10
The stream reading functions in lib/opencdk/read-packet.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to cause a denial of service (out-of-memory error and crash) via a crafted OpenPGP certificate.
2 affected packages
gnutls26, gnutls28
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| gnutls26 | — | — | — | Not in release |
| gnutls28 | — | — | — | Fixed |
Some fixes available 7 of 8
Double free vulnerability in the gnutls_x509_ext_import_proxy function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via crafted policy language information in an...
2 affected packages
gnutls26, gnutls28
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| gnutls26 | — | — | — | Not in release |
| gnutls28 | — | — | — | Fixed |
Some fixes available 13 of 15
A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw...
4 affected packages
gnutls28, openssl098, gnutls26, openssl
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| gnutls28 | — | — | — | Not affected |
| openssl098 | — | — | — | Not in release |
| gnutls26 | — | — | — | Not in release |
| openssl | — | — | — | Fixed |
The gnutls_ocsp_resp_check_crt function in lib/x509/ocsp.c in GnuTLS before 3.4.15 and 3.5.x before 3.5.4 does not verify the serial length of an OCSP response, which might allow remote attackers to bypass an intended certificate...
2 affected packages
gnutls26, gnutls28
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| gnutls26 | — | — | — | Not in release |
| gnutls28 | — | — | — | Not affected |