Canonical

Ubuntu 14.04 LTS

821 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.1%
  • Veröffentlicht 16.11.2016 05:59:00
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The __ext4_journal_stop function in fs/ext4/ext4_jbd2.c in the Linux kernel before 4.3.3 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging improper access to a certain error field.

Warnung Exploit
  • EPSS 94.18%
  • Veröffentlicht 10.11.2016 21:59:00
  • Zuletzt bearbeitet 21.04.2026 17:43:46

Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in Oc...

  • EPSS 4.69%
  • Veröffentlicht 16.10.2016 21:59:15
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The IP stack in the Linux kernel before 4.6 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrat...

  • EPSS 0.3%
  • Veröffentlicht 16.10.2016 21:59:13
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.7.5 allows local users to cause a denial of service (system crash) or possibly have unspec...

  • EPSS 0.07%
  • Veröffentlicht 16.10.2016 21:59:12
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow)...

  • EPSS 0.05%
  • Veröffentlicht 16.10.2016 21:59:11
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permission...

  • EPSS 0.1%
  • Veröffentlicht 16.10.2016 21:59:10
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a deni...

Exploit
  • EPSS 0.1%
  • Veröffentlicht 16.10.2016 21:59:08
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-...

  • EPSS 0.04%
  • Veröffentlicht 16.10.2016 21:59:06
  • Zuletzt bearbeitet 06.05.2026 22:30:45

drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux kernel before 4.5.1 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an ABORT_TASK command to abort a device write operation.

  • EPSS 0.04%
  • Veröffentlicht 16.10.2016 21:59:00
  • Zuletzt bearbeitet 06.05.2026 22:30:45

mm/memory.c in the Linux kernel before 4.1.4 mishandles anonymous pages, which allows local users to gain privileges or cause a denial of service (page tainting) via a crafted application that triggers writing to page zero.