Search CVE reports
71 – 80 of 357 results
A vulnerability found in gnutls. This security flaw happens because of a double free error occurs during verification of pkcs7 signatures in gnutls_pkcs7_verify function.
1 affected package
gnutls28
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls28 | — | Fixed | Fixed | Fixed |
Heap-based Buffer Overflow in function bfd_getl32 in Binutils objdump 3.37.
1 affected package
binutils
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
binutils | — | Not affected | Fixed | Fixed |
Some fixes available 2 of 6
stab_xcoff_builtin_type in stabs.c in GNU Binutils through 2.37 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write. NOTE:...
1 affected package
binutils
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
binutils | Not affected | Not affected | Fixed | Vulnerable |
Some fixes available 3 of 5
A NULL pointer dereference flaw was found in GnuTLS. As Nettle's hash update functions internally call memcpy, providing zero-length input may cause undefined behavior. This flaw leads to a denial of service after authentication...
2 affected packages
gnutls26, gnutls28
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls26 | Not in release | Not in release | Not in release | Not in release |
gnutls28 | Not affected | Not affected | Fixed | Fixed |
Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.
51 affected packages
gcc-3.3, gcc-4.4, gcc-4.6, gcc-4.7, gcc-4.8...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gcc-3.3 | Not affected | Not affected | Not affected | Not affected |
gcc-4.4 | Not in release | Not in release | Not in release | Not in release |
gcc-4.6 | Not in release | Not in release | Not in release | Not in release |
gcc-4.7 | Not in release | Not in release | Not in release | Not in release |
gcc-4.8 | Not in release | Not in release | Not in release | Not affected |
gcc-4.9 | Not in release | Not in release | Not in release | Not in release |
gcc-5 | Not in release | Not in release | Not in release | Not affected |
gcc-6 | Not in release | Not in release | Not in release | Not affected |
gcc-7 | Not in release | Not in release | Not affected | Not affected |
gcc-8 | Not in release | Not in release | Not affected | Not affected |
gcc-9 | Not affected | Not affected | Not affected | Not in release |
gcc-10 | Not affected | Not affected | Not affected | Not in release |
gcc-11 | Vulnerable | Vulnerable | Not in release | Not in release |
gcc-5-cross | Not in release | Not in release | Not in release | Not affected |
gcc-6-cross | Not in release | Not in release | Not in release | Not affected |
gcc-6-cross-ports | Not in release | Not in release | Not in release | Not affected |
gcc-7-cross | Not in release | Not in release | Not in release | Not affected |
gcc-7-cross-ports | Not in release | Not in release | Not in release | Not affected |
gcc-8-cross | Not in release | Not in release | Not affected | Not affected |
gcc-8-cross-ports | Not in release | Not in release | Not affected | Not affected |
gcc-9-cross | Not affected | Not affected | Not affected | Not in release |
gcc-9-cross-ports | Not affected | Not affected | Not affected | Not in release |
gcc-snapshot | Not affected | Not affected | Not affected | Not affected |
gcc-i686-linux-android | Not in release | Not in release | Not in release | Not in release |
gcc-4.7-armel-cross | Not in release | Not in release | Not in release | Not in release |
gcc-4.7-armhf-cross | Not in release | Not in release | Not in release | Not in release |
gcc-4.8-arm64-cross | Not in release | Not in release | Not in release | Not in release |
gcc-4.8-armhf-cross | Not in release | Not in release | Not in release | Not in release |
gcc-4.8-powerpc-cross | Not in release | Not in release | Not in release | Not in release |
gcc-4.8-ppc64el-cross | Not in release | Not in release | Not in release | Not in release |
gcc-arm-linux-androideabi | Not in release | Not in release | Not in release | Not in release |
gcc-arm-none-eabi | Not affected | Not affected | Not affected | Not affected |
gcc-avr | Not affected | Not affected | Not affected | Not affected |
gcc-defaults | Not affected | Not affected | Not affected | Not affected |
gcc-defaults-arm64-cross | Not in release | Not in release | Not in release | Not in release |
gcc-defaults-armel-cross | Not in release | Not in release | Not in release | Not in release |
gcc-defaults-armhf-cross | Not in release | Not in release | Not in release | Not in release |
gcc-defaults-powerpc-cross | Not in release | Not in release | Not in release | Not in release |
gcc-defaults-ppc64el-cross | Not in release | Not in release | Not in release | Not in release |
gcc-h8300-hms | Not affected | Not affected | Not affected | Not affected |
gcc-m68hc1x | Not in release | Not affected | Not affected | Not affected |
gcc-mingw-w64 | Not affected | Not affected | Not affected | Not affected |
gcc-msp430 | Not in release | Not affected | Not affected | Not affected |
gcc-opt | Not affected | Not affected | Not affected | Not affected |
gccgo-4.9 | Not in release | Not in release | Not in release | Not in release |
gccgo-6 | Not in release | Not in release | Not in release | Not in release |
gcc-12 | Not affected | Not affected | Not in release | Ignored |
gcc-13 | Not affected | Not in release | Not in release | Ignored |
libiberty | Not affected | Vulnerable | Not affected | Not affected |
gdb | Not affected | Not affected | Not affected | Needs evaluation |
binutils | Not affected | Not affected | Not affected | Not affected |
Some fixes available 1 of 3
GCC c++filt v2.26 was discovered to contain a use-after-free vulnerability via the component cplus-dem.c.
1 affected package
binutils
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
binutils | Not affected | Not affected | Not affected | Not affected |
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-3530. Reason: This candidate is a reservation duplicate of CVE-2021-3530. Notes: All CVE users should reference CVE-2021-3530 instead of this candidate. All...
1 affected package
binutils
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
binutils | — | — | Not affected | Not affected |
Some fixes available 2 of 3
An out of bounds flaw was found in GNU binutils objdump utility version 2.36. An attacker could use this flaw and pass a large section to avr_elf32_load_records_from_section() probably resulting in a crash or in some cases memory...
1 affected package
binutils
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
binutils | — | Fixed | Not affected | Not affected |
Some fixes available 1 of 6
A flaw was discovered in GNU libiberty within demangle_path() in rust-demangle.c, as distributed in GNU Binutils version 2.36. A crafted symbol can cause stack memory to be exhausted leading to a crash.
3 affected packages
libiberty, binutils, gdb
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libiberty | Not affected | Vulnerable | Not affected | Not affected |
binutils | Not affected | Not affected | Not affected | Not affected |
gdb | Not affected | Fixed | Not affected | Not affected |
Some fixes available 3 of 4
Rejected reason: Non Security Issue. See the binutils security policy for more details, https://sourceware.org/cgit/binutils-gdb/tree/binutils/SECURITY.txt
1 affected package
binutils
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
binutils | — | Not affected | Fixed | Fixed |