Search CVE reports


Toggle filters

1 – 3 of 3 results


CVE-2021-43519

Low priority
Needs evaluation

Stack overflow in lua_resume of ldo.c in Lua Interpreter 5.1.0~5.4.4 allows attackers to perform a Denial of Service via a crafted script file.

45 affected packages

enigma, freeciv, freedroidrpg, fs-uae, golly...

Package 26.04 LTS 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
enigma Not affected Not affected Not affected Not affected Not affected
freeciv Not affected Not affected Not affected Not affected Not affected
freedroidrpg Needs evaluation Needs evaluation Needs evaluation Ignored Ignored
fs-uae Needs evaluation Needs evaluation Needs evaluation Ignored Ignored
golly Needs evaluation Needs evaluation Needs evaluation Ignored Ignored
goxel Needs evaluation Needs evaluation Needs evaluation Ignored Ignored
grub2 Not affected Not affected Not affected Not affected Not affected
gtk2-engines Not affected Not affected Not affected Not affected Not affected
haskell-hslua Not affected Not affected Not affected Not affected Not affected
hedgewars Not affected Not affected Not affected Not affected Not affected
lua5.1 Not affected Not affected Not affected Not affected Not affected
lua5.2 Not affected Not affected Not affected Not affected Not affected
lua5.3 Not affected Not affected Not affected Not affected Not affected
lua5.4 Not affected Not affected Not affected Not in release Not in release
lua50 Not in release Not in release Not in release Not affected Not affected
luajit Not affected Not affected Not affected Not affected Not affected
mame Not affected Not affected Not affected Not affected Not affected
naev Needs evaluation Needs evaluation Needs evaluation Ignored
openscenegraph Not affected Not affected Not affected Not affected Not affected
redis Not affected Not affected Not affected Not affected Not affected
rust-lua52-sys Needs evaluation Needs evaluation Needs evaluation Ignored
scite Needs evaluation Needs evaluation Needs evaluation Ignored Ignored
scorched3d Needs evaluation Needs evaluation Needs evaluation Ignored Ignored
scummvm Not affected Not affected Not affected Not affected Not affected
spring Not affected Not affected Not affected Not affected Not affected
syslinux Not affected Not affected Not affected Not affected Not affected
syslinux-legacy Not in release Not in release Not in release Not affected Not affected
tagua Not in release Not affected Not affected Not affected Not affected
tarantool Not in release Needs evaluation Needs evaluation Ignored
texlive-bin Not affected Not affected Not affected Not affected Not affected
tup Needs evaluation Needs evaluation Needs evaluation Ignored
ufoai Not affected Not affected Not affected Not affected Not affected
vifm Needs evaluation Needs evaluation Needs evaluation Ignored Ignored
wcc Needs evaluation Needs evaluation Needs evaluation Ignored Ignored
wesnoth
widelands Needs evaluation Needs evaluation Needs evaluation Ignored Ignored
xmoto Not affected Not affected Not affected Not affected Not affected
zfs-linux Not affected Not affected Not affected Not affected Not affected
ardour Not affected Not affected Not affected Not affected Not affected
blobby Needs evaluation Needs evaluation Needs evaluation Ignored Ignored
ceph Not affected Not affected Not affected Not affected Not affected
darktable Needs evaluation Needs evaluation Needs evaluation Ignored Ignored
eja Not in release Not in release Needs evaluation Ignored Ignored
emscripten Needs evaluation Needs evaluation Needs evaluation Ignored
bam Needs evaluation Needs evaluation Needs evaluation Ignored Ignored
Show all 45 packages Show less packages

CVE-2020-22617

Medium priority

Some fixes available 2 of 3

Ardour v5.12 contains a use-after-free vulnerability in the component ardour/libs/pbd/xml++.cc when using xmlFreeDoc and xmlXPathFreeContext.

1 affected package

ardour

Package 26.04 LTS 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
ardour Not affected Not affected Not affected Fixed Fixed
Show less packages

CVE-2010-3349

Low priority
Ignored

Ardour 2.8.11 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.

1 affected package

ardour

Package 26.04 LTS 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
ardour
Show less packages