Canonical

Ubuntu 14.04 LTS

821 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 23.06.2014 11:21:20
  • Zuletzt bearbeitet 06.05.2026 22:30:45

arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscal...

  • EPSS 0.09%
  • Veröffentlicht 23.06.2014 11:21:18
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The rd_build_device_space function in drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from ramdisk_mcp memory by leveragin...

Exploit
  • EPSS 0.07%
  • Veröffentlicht 23.06.2014 11:21:17
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The __do_follow_link function in fs/namei.c in the Linux kernel before 2.6.33 does not properly handle the last pathname component during use of certain filesystems, which allows local users to cause a denial of service (incorrect free operations and...

  • EPSS 0.1%
  • Veröffentlicht 23.06.2014 11:21:17
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The media_device_enum_entities function in drivers/media/media-device.c in the Linux kernel before 3.14.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory by leveraging /dev/med...

  • EPSS 2.12%
  • Veröffentlicht 23.06.2014 11:21:17
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The capabilities implementation in the Linux kernel before 3.14.8 does not properly consider that namespaces are inapplicable to inodes, which allows local users to bypass intended chmod restrictions by first creating a user namespace, as demonstrate...

Warnung Exploit
  • EPSS 68.89%
  • Veröffentlicht 07.06.2014 14:55:27
  • Zuletzt bearbeitet 21.04.2026 17:47:00

The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe wai...

  • EPSS 0.09%
  • Veröffentlicht 05.06.2014 17:55:07
  • Zuletzt bearbeitet 06.05.2026 22:30:45

kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a lar...

  • EPSS 0.04%
  • Veröffentlicht 05.06.2014 17:55:07
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The Linux kernel through 3.14.5 does not properly consider the presence of hugetlb entries, which allows local users to cause a denial of service (memory corruption or system crash) by accessing certain memory locations, as demonstrated by triggering...

  • EPSS 0.05%
  • Veröffentlicht 26.05.2014 22:55:05
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The futex_wait_requeue_pi function in kernel/futex.c in the Linux kernel before 3.5.1 does not ensure that calls have two different futex addresses, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or ...

  • EPSS 0.09%
  • Veröffentlicht 11.05.2014 21:55:06
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The try_to_unmap_cluster function in mm/rmap.c in the Linux kernel before 3.14.3 does not properly consider which pages must be locked, which allows local users to cause a denial of service (system crash) by triggering a memory-usage pattern that req...