Search CVE reports
221 – 230 of 48016 results
Protection mechanism failure in wolfCrypt post-quantum implementations (ML-KEM and ML-DSA) in wolfSSL on ARM Cortex-M microcontrollers allows a physical attacker to compromise key material and/or cryptographic outcomes via induced...
1 affected package
wolfssl
| Package | 16.04 LTS |
|---|---|
| wolfssl | Needs evaluation |
Two buffer overflow vulnerabilities existed in the wolfSSL CRL parser when parsing CRL numbers: a heap-based buffer overflow could occur when improperly storing the CRL number as a hexadecimal string, and a stack-based overflow...
1 affected package
wolfssl
| Package | 16.04 LTS |
|---|---|
| wolfssl | Needs evaluation |
In wolfSSL 5.8.2 and earlier, a logic flaw existed in the TLS 1.2 server state machine implementation. The server could incorrectly accept the CertificateVerify message before the ClientKeyExchange message had been received. This...
1 affected package
wolfssl
| Package | 16.04 LTS |
|---|---|
| wolfssl | Needs evaluation |
Integer underflow in wolfSSL packet sniffer <= 5.8.4 allows an attacker to cause a buffer overflow in the AEAD decryption path by injecting a TLS record shorter than the explicit IV plus authentication tag into traffic inspected...
1 affected package
wolfssl
| Package | 16.04 LTS |
|---|---|
| wolfssl | Needs evaluation |
A flaw was found in libarchive. An Undefined Behavior vulnerability exists in the zisofs decompression logic, caused by improper validation of a field (`pz_log2_bs`) read from ISO9660 Rock Ridge extensions. A remote attacker can...
1 affected package
libarchive
| Package | 16.04 LTS |
|---|---|
| libarchive | Needs evaluation |
A flaw was found in libarchive. This heap out-of-bounds read vulnerability exists in the RAR archive processing logic due to improper validation of the LZSS sliding window size after transitions between compression methods. A...
1 affected package
libarchive
| Package | 16.04 LTS |
|---|---|
| libarchive | Needs evaluation |
A flaw was found in libsoup. An integer underflow vulnerability occurs when processing content with a zero-length resource, leading to a buffer overread. This can allow an attacker to potentially access sensitive information or...
2 affected packages
libsoup2.4, libsoup3
| Package | 16.04 LTS |
|---|---|
| libsoup2.4 | Needs evaluation |
| libsoup3 | — |
ncurses v6.5 and v6.4 are vulnerable to Buffer Overflow in progs/infocmp.c, function analyze_string().
1 affected package
ncurses
| Package | 16.04 LTS |
|---|---|
| ncurses | Needs evaluation |
[Unknown description]
1 affected package
gimp
| Package | 16.04 LTS |
|---|---|
| gimp | Needs evaluation |
XML::Parser versions through 2.47 for Perl has an off-by-one heap buffer overflow in st_serial_stack. In the case (stackptr == stacksize - 1), the stack will NOT be expanded. Then the new value will be written at location...
1 affected package
libxml-parser-perl
| Package | 16.04 LTS |
|---|---|
| libxml-parser-perl | Needs evaluation |