Canonical

Ubuntu 16.04 LTS

1003 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 25.01.2019 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:42:36

A flaw was found in the Linux kernel in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user ("root") can cause a system lock up...

  • EPSS 0.03%
  • Veröffentlicht 11.01.2019 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:46:00

In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendin...

  • EPSS 0.44%
  • Veröffentlicht 07.01.2019 17:29:00
  • Zuletzt bearbeitet 21.11.2024 04:45:02

The mincore() implementation in mm/mincore.c in the Linux kernel through 4.19.13 allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this af...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 03.01.2019 16:29:00
  • Zuletzt bearbeitet 21.11.2024 04:42:21

An issue was discovered in can_can_gw_rcv in net/can/gw.c in the Linux kernel through 4.19.13. The CAN frame modification rules allow bitwise logical operations that can be also applied to the can_dlc field. The privileged user "root" with CAP_NET_AD...

  • EPSS 0.07%
  • Veröffentlicht 27.12.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:01:38

An issue was discovered in the Linux kernel before 4.18.11. The ipddp_ioctl function in drivers/net/appletalk/ipddp.c allows local users to obtain sensitive kernel address information by leveraging CAP_NET_ADMIN to read the ipddp_route dev and next f...

  • EPSS 0.05%
  • Veröffentlicht 18.12.2018 22:29:04
  • Zuletzt bearbeitet 21.11.2024 03:53:31

A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container ...

  • EPSS 0.12%
  • Veröffentlicht 17.12.2018 07:29:00
  • Zuletzt bearbeitet 21.11.2024 04:01:00

An issue was discovered in the Linux kernel before 4.19.9. The USB subsystem mishandles size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c.

  • EPSS 0.04%
  • Veröffentlicht 07.12.2018 23:29:00
  • Zuletzt bearbeitet 21.11.2024 04:15:37

In pppol2tp_connect, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: A...

  • EPSS 0.07%
  • Veröffentlicht 07.12.2018 23:29:00
  • Zuletzt bearbeitet 21.11.2024 04:15:37

In nfc_llcp_build_sdreq_tlv of llcp_commands.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploi...

  • EPSS 0.46%
  • Veröffentlicht 06.12.2018 14:29:01
  • Zuletzt bearbeitet 21.11.2024 04:15:43

In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Androi...