Canonical

Ubuntu 14.04 LTS

821 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 3.61%
  • Veröffentlicht 27.04.2016 17:59:02
  • Zuletzt bearbeitet 06.05.2026 22:30:45

drivers/infiniband/hw/cxgb3/iwch_cm.c in the Linux kernel before 4.5 does not properly identify error conditions, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via crafted packets.

  • EPSS 0.71%
  • Veröffentlicht 27.04.2016 17:59:01
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The aiptek_probe function in drivers/input/tablet/aiptek.c in the Linux kernel before 4.4 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device that lacks endpoints.

  • EPSS 0.13%
  • Veröffentlicht 15.04.2016 14:59:14
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Xen and the Linux kernel through 4.5.x do not properly suppress hugetlbfs support in x86 PV guests, which allows local PV guest OS users to cause a denial of service (guest OS crash) by attempting to access a hugetlbfs mapped area.

  • EPSS 15.96%
  • Veröffentlicht 14.04.2016 14:59:04
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Xen, when used on a system providing PV backends, allows local guest OS administrators to cause a denial of service (host OS crash) or gain privileges by writing to memory shared between the frontend and backend, aka a double fetch vulnerability.

  • EPSS 0.19%
  • Veröffentlicht 13.04.2016 15:59:06
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption)...

  • EPSS 0.07%
  • Veröffentlicht 13.04.2016 15:59:05
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) ...

  • EPSS 0.36%
  • Veröffentlicht 12.04.2016 16:59:02
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The __switch_to function in arch/x86/kernel/process_64.c in the Linux kernel does not properly context-switch IOPL on 64-bit PV Xen guests, which allows local guest OS users to gain privileges, cause a denial of service (guest OS crash), or obtain se...

  • EPSS 0.02%
  • Veröffentlicht 12.03.2016 21:59:08
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel before 3.19.3, as used in Android 6.0.1 before 2016-03-01, allows local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 257...

  • EPSS 0.01%
  • Veröffentlicht 12.03.2016 21:59:05
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The LIST_POISON feature in include/linux/poison.h in the Linux kernel before 4.3, as used in Android 6.0.1 before 2016-03-01, does not properly consider the relationship to the mmap_min_addr value, which makes it easier for attackers to bypass a pois...

  • EPSS 54.65%
  • Veröffentlicht 08.02.2016 03:59:10
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and us...