Canonical

Ubuntu 14.04 LTS

821 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.11%
  • Veröffentlicht 16.10.2017 18:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

Race condition in the ALSA subsystem in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clie...

  • EPSS 0.06%
  • Veröffentlicht 14.10.2017 23:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The KEYS subsystem in the Linux kernel through 4.13.7 mishandles use of add_key for a key that already exists but is uninstantiated, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have un...

  • EPSS 0.11%
  • Veröffentlicht 12.10.2017 00:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The keyctl_read_key function in security/keys/keyctl.c in the Key Management subcomponent in the Linux kernel before 4.13.5 does not properly consider that a key may be possessed but negatively instantiated, which allows local users to cause a denial...

  • EPSS 0.08%
  • Veröffentlicht 12.10.2017 00:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

security/keys/keyctl.c in the Linux kernel before 4.11.5 does not consider the case of a NULL payload in conjunction with a nonzero length value, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted ...

  • EPSS 0.06%
  • Veröffentlicht 05.10.2017 01:29:04
  • Zuletzt bearbeitet 13.05.2026 00:24:29

Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue is analogous to previously disclosed CVE-2016-8655. In both cases, a socket option that changes socket state may race with safety checks in packet_set_ring. Previously with PACKET_...

  • EPSS 82.86%
  • Veröffentlicht 05.10.2017 01:29:04
  • Zuletzt bearbeitet 13.05.2026 00:24:29

Linux kernel: Exploitable memory corruption due to UFO to non-UFO path switch. When building a UFO packet with MSG_MORE __ip_append_data() calls ip_ufo_append_data() to append. However in between two send() calls, the append path can be switched from...

Warnung
  • EPSS 56.99%
  • Veröffentlicht 05.10.2017 01:29:04
  • Zuletzt bearbeitet 21.04.2026 18:00:48

Linux distributions that have not patched their long-term kernels with https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (committed on April 14, 2015). This kernel vulnerability was fixed in April 2015 by commit a87938b2e246b81b4f...

  • EPSS 0.06%
  • Veröffentlicht 04.10.2017 01:29:03
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel before 4.13.4 allows local users to obtain sensitive information from uninitialized kernel heap-memory locations via an SG_GET_REQUEST_TABLE ioctl call for /dev/sg0.

  • EPSS 0.04%
  • Veröffentlicht 26.09.2017 05:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The prepare_vmcs02 function in arch/x86/kvm/vmx.c in the Linux kernel through 4.13.3 does not ensure that the "CR8-load exiting" and "CR8-store exiting" L0 vmcs02 controls exist in cases where L1 omits the "use TPR shadow" vmcs12 control, which allow...

  • EPSS 0.02%
  • Veröffentlicht 21.09.2017 15:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be i...