CVE-2018-14436 – ImageMagick: memory leak in ReadMIFFImage in coders/miff.c
https://notcve.org/view.php?id=CVE-2018-14436
ImageMagick 7.0.8-4 has a memory leak in ReadMIFFImage in coders/miff.c. ImageMagick 7.0.8-4 tiene una fuga de memoria en ReadMIFFImage en coders/miff.c. • https://github.com/ImageMagick/ImageMagick/issues/1191 https://usn.ubuntu.com/3785-1 https://access.redhat.com/security/cve/CVE-2018-14436 https://bugzilla.redhat.com/show_bug.cgi?id=1609939 • CWE-400: Uncontrolled Resource Consumption CWE-772: Missing Release of Resource after Effective Lifetime •
CVE-2018-14437 – ImageMagick: memory leak in parse8BIM in coders/meta.c
https://notcve.org/view.php?id=CVE-2018-14437
ImageMagick 7.0.8-4 has a memory leak in parse8BIM in coders/meta.c. ImageMagick 7.0.8-4 tiene una fuga de memoria en parse8BIM en coders/meta.c. • https://github.com/ImageMagick/ImageMagick/issues/1190 https://usn.ubuntu.com/3785-1 https://access.redhat.com/security/cve/CVE-2018-14437 https://bugzilla.redhat.com/show_bug.cgi?id=1609942 • CWE-400: Uncontrolled Resource Consumption CWE-772: Missing Release of Resource after Effective Lifetime •
CVE-2018-14404 – libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c
https://notcve.org/view.php?id=CVE-2018-14404
A NULL pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 through 2.9.8 when parsing an invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR case. Applications processing untrusted XSL format inputs with the use of the libxml2 library may be vulnerable to a denial of service attack due to a crash of the application. Existe una vulnerabilidad de desreferencia de puntero NULL en la función xpath.c:xmlXPathCompOpEval() de libxml2 hasta la versión 2.9.8 al analizar una expresión XPath inválida en los casos XPATH_OP_AND o XPATH_OP_OR. Las aplicaciones que procesan entradas de formato XLS no fiables mediante la biblioteca libxml2 podrían ser vulnerables a un ataque de denegación de servicio (DoS) debido al cierre inesperado de la aplicación. A null pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 when parsing invalid XPath expression. • https://access.redhat.com/errata/RHSA-2019:1543 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901817 https://bugzilla.redhat.com/show_bug.cgi?id=1595985 https://gitlab.gnome.org/GNOME/libxml2/issues/10 https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html https://security.netapp.com/advisory/ntap-20190719-0002 https://usn.ubuntu.com/3739-1 https://usn.ubuntu.com/3739-2 https://acc • CWE-476: NULL Pointer Dereference •
CVE-2018-10877 – kernel: out-of-bound access in ext4_ext_drop_refs function with a crafted ext4 image
https://notcve.org/view.php?id=CVE-2018-10877
Linux kernel ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image. El sistema de archivos ext4 del kernel de Linux es vulnerable a un acceso fuera de límites en la función ext4_ext_drop_refs() al operar en una imagen manipulada del sistema de archivos ext4. A flaw was found in the Linux kernel ext4 filesystem. An out-of-bound access is possible in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image. • http://www.securityfocus.com/bid/104878 http://www.securityfocus.com/bid/106503 https://access.redhat.com/errata/RHSA-2018:2948 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10877 https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html https://usn.ubuntu.com/3753-1 https://usn.ubuntu.com/3753-2 https://usn.ubuntu.com/3754-1 https://usn.ubuntu.com/3871-1 https://usn.ubuntu.com/3871-3 https://usn.ubuntu.com/3871-4 https://usn • CWE-125: Out-of-bounds Read •
CVE-2018-3063 – mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2018)
https://notcve.org/view.php?id=CVE-2018-3063
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.5.60 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). • http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/104786 http://www.securitytracker.com/id/1041294 https://access.redhat.com/errata/RHSA-2019:1258 https://access.redhat.com/errata/RHSA-2019:2327 https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html https://security.netapp.com/advisory/ntap-20180726-0002 https://usn.ubuntu.com/3725-1 https:/ •