Canonical

Ubuntu 14.04 LTS

821 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 03.10.2018 22:29:00
  • Zuletzt bearbeitet 21.11.2024 03:55:18

An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwindi...

Warnung Exploit
  • EPSS 24.09%
  • Veröffentlicht 25.09.2018 21:29:00
  • Zuletzt bearbeitet 27.01.2026 15:55:15

An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6...

  • EPSS 7.3%
  • Veröffentlicht 25.09.2018 00:29:00
  • Zuletzt bearbeitet 21.11.2024 03:49:28

A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer over...

  • EPSS 0.02%
  • Veröffentlicht 07.09.2018 14:29:03
  • Zuletzt bearbeitet 21.11.2024 03:53:09

An issue was discovered in the Linux kernel before 4.18.6. An information leak in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds...

  • EPSS 4.26%
  • Veröffentlicht 06.09.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 04:08:43

The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments...

  • EPSS 0.05%
  • Veröffentlicht 04.09.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:10:53

Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (memory consumption) by repeatedly binding an AF_IRDA socket.

  • EPSS 0.06%
  • Veröffentlicht 04.09.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:10:53

The irda_setsockopt function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (ias_object use-after-free and system crash) or possibly have unspecifi...

  • EPSS 0.08%
  • Veröffentlicht 31.08.2018 16:29:00
  • Zuletzt bearbeitet 21.11.2024 03:52:26

An issue was discovered in yurex_read in drivers/usb/misc/yurex.c in the Linux kernel before 4.17.7. Local attackers could use user access read/writes with incorrect bounds checking in the yurex USB driver to crash the kernel or potentially escalate ...

  • EPSS 0.04%
  • Veröffentlicht 21.08.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:15

It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmi...

  • EPSS 0.04%
  • Veröffentlicht 20.08.2018 08:29:00
  • Zuletzt bearbeitet 21.11.2024 03:51:08

arch/x86/kernel/paravirt.c in the Linux kernel before 4.18.1 mishandles certain indirect calls, which makes it easier for attackers to conduct Spectre-v2 attacks against paravirtual guests.