Search CVE reports


Toggle filters

1 – 10 of 17 results


CVE-2021-43519

Low priority
Needs evaluation

Stack overflow in lua_resume of ldo.c in Lua Interpreter 5.1.0~5.4.4 allows attackers to perform a Denial of Service via a crafted script file.

45 affected packages

enigma, freeciv, freedroidrpg, fs-uae, golly...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
enigma Not affected Not affected Not affected Not affected
freeciv Not affected Not affected Not affected Not affected
freedroidrpg Needs evaluation Needs evaluation Needs evaluation Needs evaluation
fs-uae Needs evaluation Needs evaluation Needs evaluation Needs evaluation
golly Needs evaluation Needs evaluation Needs evaluation Needs evaluation
goxel Needs evaluation Needs evaluation Needs evaluation Needs evaluation
grub2 Not affected Not affected Not affected Not affected
gtk2-engines Not affected Not affected Not affected Not affected
haskell-hslua Not affected Not affected Not affected Not affected
hedgewars Not affected Not affected Not affected Not affected
lua5.1 Not affected Not affected Not affected Not affected
lua5.2 Not affected Not affected Not affected Not affected
lua5.3 Not affected Not affected Not affected Not affected
lua5.4 Not affected Not affected Not in release Not in release
lua50 Not in release Not in release Not affected Not affected
luajit Not affected Not affected Not affected Not affected
mame Not affected Not affected Not affected Not affected
naev Needs evaluation Needs evaluation Needs evaluation
openscenegraph Not affected Not affected Not affected Not affected
redis Not affected Not affected Not affected Not affected
rust-lua52-sys Needs evaluation Needs evaluation Needs evaluation
scite Needs evaluation Needs evaluation Needs evaluation Needs evaluation
scorched3d Needs evaluation Needs evaluation Needs evaluation Needs evaluation
scummvm Not affected Not affected Not affected Not affected
spring Not affected Not affected Not affected Not affected
syslinux Not affected Not affected Not affected Not affected
syslinux-legacy Not in release Not in release Not affected Not affected
tagua Not affected Not affected Not affected Not affected
tarantool Needs evaluation Needs evaluation Needs evaluation
texlive-bin Not affected Not affected Not affected Not affected
tup Needs evaluation Needs evaluation Needs evaluation
ufoai Not affected Not affected Not affected Not affected
vifm Needs evaluation Needs evaluation Needs evaluation Needs evaluation
wcc Needs evaluation Needs evaluation Needs evaluation Needs evaluation
wesnoth
widelands Needs evaluation Needs evaluation Needs evaluation Needs evaluation
xmoto Not affected Not affected Not affected Not affected
zfs-linux Not affected Not affected Not affected Not affected
ardour Not affected Not affected Not affected Not affected
bam Needs evaluation Needs evaluation Needs evaluation Needs evaluation
blobby Needs evaluation Needs evaluation Needs evaluation Needs evaluation
ceph Not affected Not affected Not affected Not affected
darktable Needs evaluation Needs evaluation Needs evaluation Needs evaluation
eja Not in release Needs evaluation Needs evaluation Needs evaluation
emscripten Needs evaluation Needs evaluation Needs evaluation
Show all 45 packages Show less packages

CVE-2019-14664

Medium priority
Needs evaluation

In Enigmail below 2.1, an attacker in possession of PGP encrypted emails can wrap them as sub-parts within a crafted multipart email. The encrypted part(s) can further be hidden using HTML/CSS or ASCII newline characters. This...

1 affected package

enigmail

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
enigmail Not in release Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2019-12269

Low priority
Vulnerable

Enigmail before 2.0.11 allows PGP signature spoofing: for an inline PGP message, an attacker can cause the product to display a “correctly signed” message indication, but display different unauthenticated text.

1 affected package

enigmail

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
enigmail Not in release Not affected Not affected Vulnerable
Show less packages

CVE-2018-15586

Medium priority
Not affected

Enigmail before 2.0.6 is prone to to OpenPGP signatures being spoofed for arbitrary messages using a PGP/INLINE signature wrapped within a specially crafted multipart HTML email.

1 affected package

enigmail

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
enigmail Not affected
Show less packages

CVE-2018-12020

Medium priority

Some fixes available 24 of 41

mainproc.c in GnuPG before 2.2.8 mishandles the original filename during decryption and verification actions, which allows remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the...

5 affected packages

enigmail, gnupg, gnupg1, python-gnupg, gnupg2

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
enigmail Not in release Vulnerable Vulnerable Vulnerable
gnupg Not in release Not in release Not in release Not in release
gnupg1 Not affected Not affected Not affected Vulnerable
python-gnupg Not affected Not affected Not affected Fixed
gnupg2 Fixed Fixed Fixed Fixed
Show less packages

CVE-2018-12019

Medium priority
Vulnerable

The signature verification routine in Enigmail before 2.0.7 interprets user ids as status/control messages and does not correctly keep track of the status of multiple signatures, which allows remote attackers to spoof arbitrary...

1 affected package

enigmail

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
enigmail Not in release Vulnerable Vulnerable Vulnerable
Show less packages

CVE-2017-17848

High priority

Some fixes available 3 of 4

An issue was discovered in Enigmail before 1.9.9. In a variant of CVE-2017-17847, signature spoofing is possible for multipart/related messages because a signed message part can be referenced with a cid: URI but not actually...

1 affected package

enigmail

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
enigmail
Show less packages

CVE-2017-17847

High priority

Some fixes available 3 of 4

An issue was discovered in Enigmail before 1.9.9. Signature spoofing is possible because the UI does not properly distinguish between an attachment signature, and a signature that applies to the entire containing message, aka...

1 affected package

enigmail

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
enigmail
Show less packages

CVE-2017-17846

Low priority

Some fixes available 3 of 4

An issue was discovered in Enigmail before 1.9.9. Regular expressions are exploitable for Denial of Service, because of attempts to match arbitrarily long strings, aka TBE-01-003.

1 affected package

enigmail

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
enigmail
Show less packages

CVE-2017-17845

Low priority

Some fixes available 3 of 4

An issue was discovered in Enigmail before 1.9.9. Improper Random Secret Generation occurs because Math.Random() is used by pretty Easy privacy (pEp), aka TBE-01-001.

1 affected package

enigmail

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
enigmail
Show less packages