Search CVE reports


Toggle filters

231 – 240 of 846 results


CVE-2018-5810

Medium priority

Some fixes available 3 of 75

An error within the "rollei_load_raw()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause a heap-based buffer overflow and subsequently cause a crash.

8 affected packages

darktable, dcraw, exactimage, kodi, rawtherapee...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
darktable Needs evaluation Needs evaluation Ignored Ignored
dcraw Needs evaluation Needs evaluation Ignored Ignored
exactimage Needs evaluation Needs evaluation Ignored Ignored
kodi Needs evaluation Needs evaluation Ignored Ignored
rawtherapee Needs evaluation Needs evaluation Ignored Ignored
libraw Not affected Not affected Not affected Fixed
ufraw Not in release Not in release Not in release Ignored
xbmc Not in release Not in release Not in release Not in release
Show all 8 packages Show less packages

CVE-2018-5807

Low priority

Some fixes available 3 of 75

An error within the "samsung_load_raw()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause an out-of-bounds read memory access and subsequently cause a crash.

8 affected packages

libraw, ufraw, xbmc, darktable, dcraw...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libraw Not affected Not affected Not affected Fixed
ufraw Not in release Not in release Not in release Ignored
xbmc Not in release Not in release Not in release Not in release
darktable Needs evaluation Needs evaluation Ignored Ignored
dcraw Needs evaluation Needs evaluation Ignored Ignored
exactimage Needs evaluation Needs evaluation Ignored Ignored
kodi Needs evaluation Needs evaluation Ignored Ignored
rawtherapee Needs evaluation Needs evaluation Ignored Ignored
Show all 8 packages Show less packages

CVE-2018-5816

Medium priority

Some fixes available 2 of 74

An integer overflow error within the "identify()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.12 can be exploited to trigger a division by zero via specially crafted NOKIARAW file (Note: This...

8 affected packages

kodi, xbmc, darktable, dcraw, exactimage...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
kodi Needs evaluation Needs evaluation Ignored Ignored
xbmc Not in release Not in release Not in release Not in release
darktable Needs evaluation Needs evaluation Ignored Ignored
dcraw Needs evaluation Needs evaluation Ignored Ignored
exactimage Needs evaluation Needs evaluation Ignored Ignored
rawtherapee Needs evaluation Needs evaluation Ignored Ignored
libraw Not affected Not affected Not affected Fixed
ufraw Not in release Not in release Not in release Ignored
Show all 8 packages Show less packages

CVE-2018-5815

Medium priority

Some fixes available 2 of 74

An integer overflow error within the "parse_qt()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.12 can be exploited to trigger an infinite loop via a specially crafted Apple QuickTime file.

8 affected packages

darktable, dcraw, libraw, ufraw, exactimage...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
darktable Needs evaluation Needs evaluation Ignored Ignored
dcraw Needs evaluation Needs evaluation Ignored Ignored
libraw Not affected Not affected Not affected Fixed
ufraw Not in release Not in release Not in release Ignored
exactimage Needs evaluation Needs evaluation Ignored Ignored
kodi Needs evaluation Needs evaluation Ignored Ignored
rawtherapee Needs evaluation Needs evaluation Ignored Ignored
xbmc Not in release Not in release Not in release Not in release
Show all 8 packages Show less packages

CVE-2018-5813

Medium priority

Some fixes available 3 of 75

An error within the "parse_minolta()" function (dcraw/dcraw.c) in LibRaw versions prior to 0.18.11 can be exploited to trigger an infinite loop via a specially crafted file.

8 affected packages

libraw, ufraw, xbmc, darktable, dcraw...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libraw Not affected Not affected Not affected Fixed
ufraw Not in release Not in release Not in release Ignored
xbmc Not in release Not in release Not in release Not in release
darktable Needs evaluation Needs evaluation Ignored Ignored
dcraw Needs evaluation Needs evaluation Ignored Ignored
exactimage Needs evaluation Needs evaluation Ignored Ignored
kodi Needs evaluation Needs evaluation Ignored Ignored
rawtherapee Needs evaluation Needs evaluation Ignored Ignored
Show all 8 packages Show less packages

CVE-2018-14438

Medium priority

Some fixes available 3 of 4

In Wireshark through 2.6.2, the create_app_running_mutex function in wsutil/file_util.c calls SetSecurityDescriptorDacl to set a NULL DACL, which allows attackers to modify the access control arbitrarily.

1 affected package

wireshark

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
wireshark Fixed
Show less packages

CVE-2018-14370

Medium priority

Some fixes available 3 of 4

In Wireshark 2.6.0 to 2.6.1 and 2.4.0 to 2.4.7, the IEEE 802.11 protocol dissector could crash. This was addressed in epan/crypt/airpdcap.c via bounds checking that prevents a buffer over-read.

1 affected package

wireshark

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
wireshark Fixed
Show less packages

CVE-2018-14369

Medium priority

Some fixes available 3 of 4

In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the HTTP2 dissector could crash. This was addressed in epan/dissectors/packet-http2.c by verifying that header data was found before proceeding to header decompression.

1 affected package

wireshark

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
wireshark Fixed
Show less packages

CVE-2018-14368

Medium priority

Some fixes available 3 of 4

In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the Bazaar protocol dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-bzr.c by properly handling items that are too long.

1 affected package

wireshark

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
wireshark Fixed
Show less packages

CVE-2018-14367

Medium priority

Some fixes available 3 of 4

In Wireshark 2.6.0 to 2.6.1 and 2.4.0 to 2.4.7, the CoAP protocol dissector could crash. This was addressed in epan/dissectors/packet-coap.c by properly checking for a NULL condition.

1 affected package

wireshark

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
wireshark Fixed
Show less packages