Search CVE reports


Toggle filters

71 – 80 of 357 results


CVE-2022-2509

Medium priority
Fixed

A vulnerability found in gnutls. This security flaw happens because of a double free error occurs during verification of pkcs7 signatures in gnutls_pkcs7_verify function.

1 affected package

gnutls28

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
gnutls28 Fixed Fixed Fixed
Show less packages

CVE-2021-46174

Medium priority
Fixed

Heap-based Buffer Overflow in function bfd_getl32 in Binutils objdump 3.37.

1 affected package

binutils

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
binutils Not affected Fixed Fixed
Show less packages

CVE-2021-45078

Low priority

Some fixes available 2 of 6

stab_xcoff_builtin_type in stabs.c in GNU Binutils through 2.37 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write. NOTE:...

1 affected package

binutils

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
binutils Not affected Not affected Fixed Vulnerable
Show less packages

CVE-2021-4209

Low priority

Some fixes available 3 of 5

A NULL pointer dereference flaw was found in GnuTLS. As Nettle's hash update functions internally call memcpy, providing zero-length input may cause undefined behavior. This flaw leads to a denial of service after authentication...

2 affected packages

gnutls26, gnutls28

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
gnutls26 Not in release Not in release Not in release Not in release
gnutls28 Not affected Not affected Fixed Fixed
Show less packages

CVE-2021-3826

Low priority
Vulnerable

Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.

51 affected packages

gcc-3.3, gcc-4.4, gcc-4.6, gcc-4.7, gcc-4.8...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
gcc-3.3 Not affected Not affected Not affected Not affected
gcc-4.4 Not in release Not in release Not in release Not in release
gcc-4.6 Not in release Not in release Not in release Not in release
gcc-4.7 Not in release Not in release Not in release Not in release
gcc-4.8 Not in release Not in release Not in release Not affected
gcc-4.9 Not in release Not in release Not in release Not in release
gcc-5 Not in release Not in release Not in release Not affected
gcc-6 Not in release Not in release Not in release Not affected
gcc-7 Not in release Not in release Not affected Not affected
gcc-8 Not in release Not in release Not affected Not affected
gcc-9 Not affected Not affected Not affected Not in release
gcc-10 Not affected Not affected Not affected Not in release
gcc-11 Vulnerable Vulnerable Not in release Not in release
gcc-5-cross Not in release Not in release Not in release Not affected
gcc-6-cross Not in release Not in release Not in release Not affected
gcc-6-cross-ports Not in release Not in release Not in release Not affected
gcc-7-cross Not in release Not in release Not in release Not affected
gcc-7-cross-ports Not in release Not in release Not in release Not affected
gcc-8-cross Not in release Not in release Not affected Not affected
gcc-8-cross-ports Not in release Not in release Not affected Not affected
gcc-9-cross Not affected Not affected Not affected Not in release
gcc-9-cross-ports Not affected Not affected Not affected Not in release
gcc-snapshot Not affected Not affected Not affected Not affected
gcc-i686-linux-android Not in release Not in release Not in release Not in release
gcc-4.7-armel-cross Not in release Not in release Not in release Not in release
gcc-4.7-armhf-cross Not in release Not in release Not in release Not in release
gcc-4.8-arm64-cross Not in release Not in release Not in release Not in release
gcc-4.8-armhf-cross Not in release Not in release Not in release Not in release
gcc-4.8-powerpc-cross Not in release Not in release Not in release Not in release
gcc-4.8-ppc64el-cross Not in release Not in release Not in release Not in release
gcc-arm-linux-androideabi Not in release Not in release Not in release Not in release
gcc-arm-none-eabi Not affected Not affected Not affected Not affected
gcc-avr Not affected Not affected Not affected Not affected
gcc-defaults Not affected Not affected Not affected Not affected
gcc-defaults-arm64-cross Not in release Not in release Not in release Not in release
gcc-defaults-armel-cross Not in release Not in release Not in release Not in release
gcc-defaults-armhf-cross Not in release Not in release Not in release Not in release
gcc-defaults-powerpc-cross Not in release Not in release Not in release Not in release
gcc-defaults-ppc64el-cross Not in release Not in release Not in release Not in release
gcc-h8300-hms Not affected Not affected Not affected Not affected
gcc-m68hc1x Not in release Not affected Not affected Not affected
gcc-mingw-w64 Not affected Not affected Not affected Not affected
gcc-msp430 Not in release Not affected Not affected Not affected
gcc-opt Not affected Not affected Not affected Not affected
gccgo-4.9 Not in release Not in release Not in release Not in release
gccgo-6 Not in release Not in release Not in release Not in release
gcc-12 Not affected Not affected Not in release Ignored
gcc-13 Not affected Not in release Not in release Ignored
libiberty Not affected Vulnerable Not affected Not affected
gdb Not affected Not affected Not affected Needs evaluation
binutils Not affected Not affected Not affected Not affected
Show all 51 packages Show less packages

CVE-2021-37322

Negligible priority

Some fixes available 1 of 3

GCC c++filt v2.26 was discovered to contain a use-after-free vulnerability via the component cplus-dem.c.

1 affected package

binutils

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
binutils Not affected Not affected Not affected Not affected
Show less packages

CVE-2021-3648

Low priority
Ignored

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-3530. Reason: This candidate is a reservation duplicate of CVE-2021-3530. Notes: All CVE users should reference CVE-2021-3530 instead of this candidate. All...

1 affected package

binutils

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
binutils Not affected Not affected
Show less packages

CVE-2021-3549

Low priority

Some fixes available 2 of 3

An out of bounds flaw was found in GNU binutils objdump utility version 2.36. An attacker could use this flaw and pass a large section to avr_elf32_load_records_from_section() probably resulting in a crash or in some cases memory...

1 affected package

binutils

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
binutils Fixed Not affected Not affected
Show less packages

CVE-2021-3530

Low priority

Some fixes available 1 of 6

A flaw was discovered in GNU libiberty within demangle_path() in rust-demangle.c, as distributed in GNU Binutils version 2.36. A crafted symbol can cause stack memory to be exhausted leading to a crash.

3 affected packages

libiberty, binutils, gdb

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libiberty Not affected Vulnerable Not affected Not affected
binutils Not affected Not affected Not affected Not affected
gdb Not affected Fixed Not affected Not affected
Show less packages

CVE-2021-3487

Low priority

Some fixes available 3 of 4

Rejected reason: Non Security Issue. See the binutils security policy for more details, https://sourceware.org/cgit/binutils-gdb/tree/binutils/SECURITY.txt

1 affected package

binutils

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
binutils Not affected Fixed Fixed
Show less packages