Search CVE reports
21 – 30 of 42185 results
Pidgin 2.13.0 contains a denial of service vulnerability that allows local attackers to crash the application by providing an excessively long username string during account creation. Attackers can input a buffer of 1000...
1 affected package
pidgin
| Package | 18.04 LTS |
|---|---|
| pidgin | Needs evaluation |
Local unprivileged user can trigger an assert in systemd
1 affected package
systemd
| Package | 18.04 LTS |
|---|---|
| systemd | Not affected |
Integer Underflow When Handling EAP-TTLS AVP. A vulnerability in the eap-ttls plugin related to processing EAP-TTLS AVPs was discovered in strongSwan that can result in resource exhaustion or a crash. All versions since 4.5.0 are affected.
1 affected package
strongswan
| Package | 18.04 LTS |
|---|---|
| strongswan | Needs evaluation |
A flaw was found in libarchive. An Undefined Behavior vulnerability exists in the zisofs decompression logic, caused by improper validation of a field (`pz_log2_bs`) read from ISO9660 Rock Ridge extensions. A remote attacker can...
1 affected package
libarchive
| Package | 18.04 LTS |
|---|---|
| libarchive | Needs evaluation |
A flaw was found in libarchive. This heap out-of-bounds read vulnerability exists in the RAR archive processing logic due to improper validation of the LZSS sliding window size after transitions between compression methods. A...
1 affected package
libarchive
| Package | 18.04 LTS |
|---|---|
| libarchive | Needs evaluation |
Heap-based buffer overflow in the KCAPI ECC code path of wc_ecc_import_x963_ex() in wolfSSL wolfcrypt allows a remote attacker to write attacker-controlled data past the bounds of the pubkey_raw buffer via a crafted oversized EC...
1 affected package
wolfssl
| Package | 18.04 LTS |
|---|---|
| wolfssl | Needs evaluation |
1-byte OOB heap read in wc_PKCS7_DecodeEnvelopedData via zero-length encrypted content. A vulnerability existed in wolfSSL 5.8.4 and earlier, where a 1-byte out-of-bounds heap read in wc_PKCS7_DecodeEnvelopedData could be...
1 affected package
wolfssl
| Package | 18.04 LTS |
|---|---|
| wolfssl | Needs evaluation |
Stack Buffer Overflow in wc_HpkeLabeledExtract via Oversized ECH Config. A vulnerability existed in wolfSSL 5.8.4 ECH (Encrypted Client Hello) support, where a maliciously crafted ECH config could cause a stack buffer overflow on...
1 affected package
wolfssl
| Package | 18.04 LTS |
|---|---|
| wolfssl | Needs evaluation |
[Unknown description]
1 affected package
qemu
| Package | 18.04 LTS |
|---|---|
| qemu | Needs evaluation |
In wolfSSL 5.8.4, constant-time masking logic in sp_256_get_entry_256_9 is optimized into conditional branches (bnez) by GCC when targeting RISC-V RV32I with -O3. This transformation breaks the side-channel resistance of ECC...
1 affected package
wolfssl
| Package | 18.04 LTS |
|---|---|
| wolfssl | Needs evaluation |