Canonical

Ubuntu 16.04 LTS

1003 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.09%
  • Veröffentlicht 18.06.2020 11:15:09
  • Zuletzt bearbeitet 21.11.2024 05:03:13

In the Linux kernel before 5.4.16, a race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c.

  • EPSS 0.04%
  • Veröffentlicht 12.06.2020 14:15:11
  • Zuletzt bearbeitet 21.11.2024 04:55:57

A flaw was found in the Linux kernel's implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.

Exploit
  • EPSS 0.09%
  • Veröffentlicht 09.06.2020 05:15:10
  • Zuletzt bearbeitet 21.11.2024 05:02:16

An issue was discovered in the Linux kernel 4.4 through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does no...

  • EPSS 0.03%
  • Veröffentlicht 03.06.2020 03:15:10
  • Zuletzt bearbeitet 21.11.2024 04:39:25

An issue was discovered in the Linux kernel before 5.0.6. In rx_queue_add_kobject() and netdev_queue_add_kobject() in net/core/net-sysfs.c, a reference count is mishandled, aka CID-a3e23f719f5c.

  • EPSS 0.05%
  • Veröffentlicht 03.06.2020 03:15:10
  • Zuletzt bearbeitet 21.11.2024 04:39:25

An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43...

  • EPSS 0.07%
  • Veröffentlicht 03.06.2020 00:15:10
  • Zuletzt bearbeitet 21.11.2024 04:39:25

go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.

  • EPSS 0.08%
  • Veröffentlicht 26.05.2020 15:15:10
  • Zuletzt bearbeitet 21.11.2024 04:55:59

A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the ...

  • EPSS 5.44%
  • Veröffentlicht 22.05.2020 15:15:11
  • Zuletzt bearbeitet 21.11.2024 04:55:54

A NULL pointer dereference flaw was found in the Linux kernel's SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the...

Exploit
  • EPSS 20.2%
  • Veröffentlicht 19.05.2020 16:15:11
  • Zuletzt bearbeitet 21.11.2024 04:54:53

Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adj...

  • EPSS 2.98%
  • Veröffentlicht 18.05.2020 18:15:11
  • Zuletzt bearbeitet 21.11.2024 05:00:44

gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel 3.16 through 5.6.13 relies on kstrdup without considering the possibility of an internal '\0' value, which allows attackers to trigger an out-of-bounds read, aka CID-15753...