Bug | buster | bookworm | trixie | sid | Description |
---|
CVE-2019-16396 | vulnerable (no DSA, ignored) | fixed | fixed | fixed | GnuCOBOL 2.2 has a use-after-free in the end_scope_of_program_name() f ... |
CVE-2019-16395 | vulnerable (no DSA, ignored) | fixed | fixed | fixed | GnuCOBOL 2.2 has a stack-based buffer overflow in the cb_name() functi ... |
CVE-2019-14541 | vulnerable (no DSA, ignored) | fixed | fixed | fixed | GnuCOBOL 2.2 has a stack-based buffer overflow in cb_encode_program_id ... |
CVE-2019-14528 | vulnerable (no DSA, ignored) | fixed | fixed | fixed | GnuCOBOL 2.2 has a heap-based buffer overflow in read_literal in cobc/ ... |
CVE-2019-14486 | vulnerable (no DSA, ignored) | fixed | fixed | fixed | GnuCOBOL 2.2 has a buffer overflow in cb_evaluate_expr in cobc/field.c ... |
CVE-2019-14468 | vulnerable (no DSA, ignored) | fixed | fixed | fixed | GnuCOBOL 2.2 has a buffer overflow in cb_push_op in cobc/field.c via c ... |