Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

Search CVE reports


Toggle filters

1 – 10 of 22 results


CVE-2022-44940

Medium priority

Some fixes available 2 of 8

Patchelf v0.9 was discovered to contain an out-of-bounds read via the function modifyRPath at src/patchelf.cc.

1 affected packages

patchelf

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
patchelf Needs evaluation Fixed Needs evaluation Vulnerable Vulnerable
Show less packages

CVE-2022-29800

High priority
Fixed

A time-of-check-time-of-use (TOCTOU) race condition vulnerability was found in networkd-dispatcher. This flaw exists because there is a certain time between the scripts being discovered and them being run. An attacker can abuse...

1 affected packages

networkd-dispatcher

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
networkd-dispatcher Fixed Fixed Fixed
Show less packages

CVE-2022-29799

High priority
Fixed

A vulnerability was found in networkd-dispatcher. This flaw exists because no functions are sanitized by the OperationalState or the AdministrativeState of networkd-dispatcher. This attack leads to a directory traversal to escape...

1 affected packages

networkd-dispatcher

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
networkd-dispatcher Fixed Fixed Fixed
Show less packages

CVE-2021-45261

Negligible priority
Vulnerable

An Invalid Pointer vulnerability exists in GNU patch 2.7 via the another_hunk function, which causes a Denial of Service.

1 affected packages

patch

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
patch Vulnerable Vulnerable Vulnerable Vulnerable Vulnerable
Show less packages

CVE-2019-20633

Negligible priority
Needs evaluation

GNU patch through 2.7.6 contains a free(p_line[p_end]) Double Free vulnerability in the function another_hunk in pch.c that can cause a denial of service via a crafted patch file. NOTE: this issue exists because of an incomplete...

1 affected packages

patch

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
patch Needs evaluation Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2018-20969

Medium priority
Fixed

do_ed_script in pch.c in GNU patch through 2.7.6 does not block strings beginning with a ! character. NOTE: this is the same commit as for CVE-2019-13638, but the ! syntax is specific to ed, and is unrelated to a shell metacharacter.

1 affected packages

patch

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
patch Fixed Fixed
Show less packages

CVE-2019-13638

Medium priority
Fixed

GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present...

1 affected packages

patch

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
patch Fixed Fixed
Show less packages

CVE-2019-13636

Medium priority
Fixed

In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c.

1 affected packages

patch

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
patch Fixed Fixed
Show less packages

CVE-2018-14632

Medium priority
Needs evaluation

An out of bound write can occur when patching an Openshift object using the 'oc patch' functionality in OpenShift Container Platform before 3.7. An attacker can use this flaw to cause a denial of service attack on the Openshift...

1 affected packages

golang-github-evanphx-json-patch

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
golang-github-evanphx-json-patch Needs evaluation Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2018-1000156

Medium priority
Fixed

GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch...

1 affected packages

patch

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
patch Fixed
Show less packages