CVE-2021-32256
https://notcve.org/view.php?id=CVE-2021-32256
An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.36. It is a stack-overflow issue in demangle_type in rust-demangle.c. • https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1927070 https://security.netapp.com/advisory/ntap-20230824-0013 • CWE-787: Out-of-bounds Write •
CVE-2015-20109
https://notcve.org/view.php?id=CVE-2015-20109
end_pattern (called from internal_fnmatch) in the GNU C Library (aka glibc or libc6) before 2.22 might allow context-dependent attackers to cause a denial of service (application crash), as demonstrated by use of the fnmatch library function with the **(!() pattern. NOTE: this is not the same as CVE-2015-8984; also, some Linux distributions have fixed CVE-2015-8984 but have not fixed this additional fnmatch issue. • https://security.netapp.com/advisory/ntap-20230731-0009 https://sourceware.org/bugzilla/show_bug.cgi?id=18036 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2023-36272
https://notcve.org/view.php?id=CVE-2023-36272
LibreDWG v0.12.5 was discovered to contain a heap buffer overflow via the function bit_utf8_to_TU at bits.c. • https://github.com/LibreDWG/libredwg/issues/681#BUG1 • CWE-787: Out-of-bounds Write •
CVE-2023-36274
https://notcve.org/view.php?id=CVE-2023-36274
LibreDWG v0.12.5 was discovered to contain a heap buffer overflow via the function bit_write_TF at bits.c. • https://github.com/LibreDWG/libredwg/issues/677#BUG2 • CWE-787: Out-of-bounds Write •
CVE-2023-36271
https://notcve.org/view.php?id=CVE-2023-36271
LibreDWG v0.12.5 was discovered to contain a heap buffer overflow via the function bit_wcs2nlen at bits.c. • https://github.com/LibreDWG/libredwg/issues/681#BUG2 • CWE-787: Out-of-bounds Write •