Filtered by vendor Gnu
Subscriptions
Total
1075 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2019-6458 | 1 Gnu | 1 Recutils | 2024-11-21 | N/A |
An issue was discovered in GNU Recutils 1.8. There is a memory leak in rec_buf_new in rec-buf.c when called from rec_parse_rset in rec-parser.c in librec.a. | ||||
CVE-2019-6457 | 1 Gnu | 1 Recutils | 2024-11-21 | N/A |
An issue was discovered in GNU Recutils 1.8. There is a memory leak in rec_aggregate_reg_new in rec-aggregate.c in librec.a. | ||||
CVE-2019-6456 | 1 Gnu | 1 Recutils | 2024-11-21 | N/A |
An issue was discovered in GNU Recutils 1.8. There is a NULL pointer dereference in the function rec_fex_size() in the file rec-fex.c of librec.a. | ||||
CVE-2019-6455 | 1 Gnu | 1 Recutils | 2024-11-21 | N/A |
An issue was discovered in GNU Recutils 1.8. There is a double-free problem in the function rec_mset_elem_destroy() in the file rec-mset.c. | ||||
CVE-2019-5953 | 2 Gnu, Redhat | 6 Wget, Enterprise Linux, Rhel Aus and 3 more | 2024-11-21 | N/A |
Buffer overflow in GNU Wget 1.20.1 and earlier allows remote attackers to cause a denial-of-service (DoS) or may execute an arbitrary code via unspecified vectors. | ||||
CVE-2019-3836 | 4 Fedoraproject, Gnu, Opensuse and 1 more | 4 Fedora, Gnutls, Leap and 1 more | 2024-11-21 | N/A |
It was discovered in gnutls before version 3.6.7 upstream that there is an uninitialized pointer access in gnutls versions 3.6.3 or later which can be triggered by certain post-handshake messages. | ||||
CVE-2019-3829 | 3 Fedoraproject, Gnu, Redhat | 3 Fedora, Gnutls, Enterprise Linux | 2024-11-21 | N/A |
A vulnerability was found in gnutls versions from 3.5.8 before 3.6.7. A memory corruption (double free) vulnerability in the certificate verification API. Any client or server application that verifies X.509 certificates with GnuTLS 3.5.8 or later is affected. | ||||
CVE-2019-3697 | 2 Gnu, Opensuse | 2 Gnump3d, Leap | 2024-11-21 | 7.7 High |
UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of gnump3d in openSUSE Leap 15.1 allows local attackers to escalate from user gnump3d to root. This issue affects: openSUSE Leap 15.1 gnump3d version 3.0-lp151.2.1 and prior versions. | ||||
CVE-2019-25051 | 4 Debian, Fedoraproject, Gnu and 1 more | 4 Debian Linux, Fedora, Aspell and 1 more | 2024-11-21 | 7.8 High |
objstack in GNU Aspell 0.60.8 has a heap-based buffer overflow in acommon::ObjStack::dup_top (called from acommon::StringMap::add and acommon::Config::lookup_list). | ||||
CVE-2019-25013 | 6 Broadcom, Debian, Fedoraproject and 3 more | 12 Fabric Operating System, Debian Linux, Fedora and 9 more | 2024-11-21 | 5.9 Medium |
The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read. | ||||
CVE-2019-20915 | 1 Gnu | 1 Libredwg | 2024-11-21 | 8.1 High |
An issue was discovered in GNU LibreDWG through 0.9.3. Crafted input will lead to a heap-based buffer over-read in bit_write_TF in bits.c. | ||||
CVE-2019-20914 | 1 Gnu | 1 Libredwg | 2024-11-21 | 9.8 Critical |
An issue was discovered in GNU LibreDWG through 0.9.3. There is a NULL pointer dereference in the function dwg_encode_common_entity_handle_data in common_entity_handle_data.spec. | ||||
CVE-2019-20913 | 1 Gnu | 1 Libredwg | 2024-11-21 | 8.1 High |
An issue was discovered in GNU LibreDWG through 0.9.3. Crafted input will lead to a heap-based buffer over-read in dwg_encode_entity in common_entity_data.spec. | ||||
CVE-2019-20912 | 1 Gnu | 1 Libredwg | 2024-11-21 | 8.8 High |
An issue was discovered in GNU LibreDWG through 0.9.3. Crafted input will lead to a stack overflow in bits.c, possibly related to bit_read_TF. | ||||
CVE-2019-20911 | 1 Gnu | 1 Libredwg | 2024-11-21 | 6.5 Medium |
An issue was discovered in GNU LibreDWG through 0.9.3. Crafted input will lead to denial of service in bit_calc_CRC in bits.c, related to a for loop. | ||||
CVE-2019-20910 | 1 Gnu | 1 Libredwg | 2024-11-21 | 8.1 High |
An issue was discovered in GNU LibreDWG through 0.9.3. Crafted input will lead to a heap-based buffer over-read in decode_R13_R2000 in decode.c, a different vulnerability than CVE-2019-20011. | ||||
CVE-2019-20909 | 1 Gnu | 1 Libredwg | 2024-11-21 | 7.5 High |
An issue was discovered in GNU LibreDWG through 0.9.3. There is a NULL pointer dereference in the function dwg_encode_LWPOLYLINE in dwg.spec. | ||||
CVE-2019-20633 | 1 Gnu | 1 Patch | 2024-11-21 | 5.5 Medium |
GNU patch through 2.7.6 contains a free(p_line[p_end]) Double Free vulnerability in the function another_hunk in pch.c that can cause a denial of service via a crafted patch file. NOTE: this issue exists because of an incomplete fix for CVE-2018-6952. | ||||
CVE-2019-20433 | 1 Gnu | 1 Aspell | 2024-11-21 | 9.1 Critical |
libaspell.a in GNU Aspell before 0.60.8 has a buffer over-read for a string ending with a single '\0' byte, if the encoding is set to ucs-2 or ucs-4 outside of the application, as demonstrated by the ASPELL_CONF environment variable. | ||||
CVE-2019-20015 | 2 Gnu, Opensuse | 3 Libredwg, Backports Sle, Leap | 2024-11-21 | 6.5 Medium |
An issue was discovered in GNU LibreDWG 0.92. Crafted input will lead to an attempted excessive memory allocation in dwg_decode_LWPOLYLINE_private in dwg.spec. |