Search CVE reports
1851 – 1860 of 38499 results
In GnuPG before 2.5.17, a stack-based buffer overflow exists in tpm2daemon during handling of the PKDECRYPT command for TPM-backed RSA and ECC keys.
1 affected package
gnupg2
| Package | 20.04 LTS |
|---|---|
| gnupg2 | Not affected |
In GnuPG before 2.5.17, a crafted CMS (S/MIME) EnvelopedData message carrying an oversized wrapped session key can cause a stack-based buffer overflow in gpg-agent during PKDECRYPT--kem=CMS handling. This can easily be leveraged...
1 affected package
gnupg2
| Package | 20.04 LTS |
|---|---|
| gnupg2 | Not affected |
User-controlled chunkSize metadata from MongoDB lacks appropriate validation allowing malformed GridFS metadata to overflow the bounding container.
1 affected package
mongodb
| Package | 20.04 LTS |
|---|---|
| mongodb | Not affected |
xrdp is an open source RDP server. xrdp before v0.10.5 contains an unauthenticated stack-based buffer overflow vulnerability. The issue stems from improper bounds checking when processing user domain information during the...
1 affected package
xrdp
| Package | 20.04 LTS |
|---|---|
| xrdp | Needs evaluation |
Buffer Overflow vulnerability in libpng 1.6.43-1.6.46 allows a local attacker to cause a denial of service via png_create_read_struct() function.
5 affected packages
libpng, firefox, thunderbird, chromium-browser, libpng1.6
| Package | 20.04 LTS |
|---|---|
| libpng | — |
| firefox | — |
| thunderbird | — |
| chromium-browser | — |
| libpng1.6 | Not affected |
Buffer Overflow vulnerability in libpng 1.6.43-1.6.46 allows a local attacker to cause a denial of service via the pngimage with AddressSanitizer (ASan), the program leaks memory in various locations, eventually leading to high...
5 affected packages
libpng, firefox, thunderbird, chromium-browser, libpng1.6
| Package | 20.04 LTS |
|---|---|
| libpng | — |
| firefox | — |
| thunderbird | — |
| chromium-browser | — |
| libpng1.6 | Not affected |
A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker...
1 affected package
glib2.0
| Package | 20.04 LTS |
|---|---|
| glib2.0 | Vulnerable |
A flaw was found in Glib's content type parsing logic. This buffer underflow vulnerability occurs because the length of a header line is stored in a signed integer, which can lead to integer wraparound for very large inputs. This...
1 affected package
glib2.0
| Package | 20.04 LTS |
|---|---|
| glib2.0 | Vulnerable |
A flaw was found in the GLib Base64 encoding routine when processing very large input data. Due to incorrect use of integer types during length calculation, the library may miscalculate buffer boundaries. This can cause memory...
1 affected package
glib2.0
| Package | 20.04 LTS |
|---|---|
| glib2.0 | Vulnerable |
A flaw was found in libsoup, an HTTP client library. This vulnerability, known as CRLF (Carriage Return Line Feed) Injection, occurs when an HTTP proxy is configured and the library improperly handles URL-decoded input used to...
2 affected packages
libsoup3, libsoup2.4
| Package | 20.04 LTS |
|---|---|
| libsoup3 | — |
| libsoup2.4 | Vulnerable |