Search CVE reports
1 – 10 of 39430 results
Heap Buffer Overflow in CUPS rastertopclx Filter Leading to Potential Arbitrary Code Execution
2 affected packages
cups-filters, libcupsfilters
| Package | 18.04 LTS |
|---|---|
| cups-filters | Needs evaluation |
| libcupsfilters | — |
SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption.
4 affected packages
lxd, golang-go.crypto, snapd, google-guest-agent
| Package | 18.04 LTS |
|---|---|
| lxd | Needs evaluation |
| golang-go.crypto | Needs evaluation |
| snapd | Needs evaluation |
| google-guest-agent | Needs evaluation |
SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read.
4 affected packages
golang-go.crypto, snapd, lxd, google-guest-agent
| Package | 18.04 LTS |
|---|---|
| golang-go.crypto | Needs evaluation |
| snapd | Needs evaluation |
| lxd | Needs evaluation |
| google-guest-agent | Needs evaluation |
[HMAC verification check: fix incorrect memcmp() call]
1 affected package
openvpn
| Package | 18.04 LTS |
|---|---|
| openvpn | Needs evaluation |
[IPv6 address parsing: fix buffer overread on invalid input]
1 affected package
openvpn
| Package | 18.04 LTS |
|---|---|
| openvpn | Not affected |
A mongoc_bulk_operation_t may read invalid memory if large options are passed.
2 affected packages
mongo-c-driver, php-mongodb
| Package | 18.04 LTS |
|---|---|
| mongo-c-driver | — |
| php-mongodb | Needs evaluation |
A vulnerability in the GRUB2 bootloader has been identified in the normal module. This flaw, a memory Use After Free issue, occurs because the normal_exit command is not properly unregistered when its related module is unloaded....
3 affected packages
grub2, grub2-unsigned, grub2-signed
| Package | 18.04 LTS |
|---|---|
| grub2 | Not affected |
| grub2-unsigned | Needs evaluation |
| grub2-signed | Needs evaluation |
A vulnerability has been identified in the GRUB2 bootloader's normal command that poses an immediate Denial of Service (DoS) risk. This flaw is a Use-after-Free issue, caused because the normal command is not properly unregistered...
3 affected packages
grub2, grub2-unsigned, grub2-signed
| Package | 18.04 LTS |
|---|---|
| grub2 | Not affected |
| grub2-unsigned | Needs evaluation |
| grub2-signed | Needs evaluation |
A Use-After-Free vulnerability has been discovered in GRUB's gettext module. This flaw stems from a programming error where the gettext command remains registered in memory after its module is unloaded. An attacker can exploit...
3 affected packages
grub2, grub2-unsigned, grub2-signed
| Package | 18.04 LTS |
|---|---|
| grub2 | Not affected |
| grub2-unsigned | Needs evaluation |
| grub2-signed | Needs evaluation |
A vulnerability has been identified in the GRUB (Grand Unified Bootloader) component. This flaw occurs because the bootloader mishandles string conversion when reading information from a USB device, allowing an attacker to exploit...
3 affected packages
grub2, grub2-unsigned, grub2-signed
| Package | 18.04 LTS |
|---|---|
| grub2 | Not affected |
| grub2-unsigned | Needs evaluation |
| grub2-signed | Needs evaluation |