Canonical

Ubuntu 16.04 LTS

1003 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.42%
  • Veröffentlicht 30.10.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:55:38

Since Linux kernel version 3.2, the mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain f...

  • EPSS 0.03%
  • Veröffentlicht 29.10.2018 12:29:05
  • Zuletzt bearbeitet 21.11.2024 03:56:25

An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds c...

Exploit
  • EPSS 0.06%
  • Veröffentlicht 26.10.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:56:22

In the Linux kernel before 4.17, a local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 26.10.2018 00:29:00
  • Zuletzt bearbeitet 21.11.2024 03:56:18

The Linux kernel, as used in Ubuntu 18.10 and when booted with UEFI Secure Boot enabled, allows privileged local users to bypass intended Secure Boot restrictions and execute untrusted code by loading arbitrary kernel modules. This occurs because a m...

Exploit
  • EPSS 0.79%
  • Veröffentlicht 22.10.2018 16:29:00
  • Zuletzt bearbeitet 21.11.2024 03:56:09

In the Linux kernel through 4.19, a use-after-free can occur due to a race condition between fanout_add from setsockopt and bind on an AF_PACKET socket. This issue exists because of the 15fe076edea787807a7cdc168df832544b58eba6 incomplete fix for a ra...

  • EPSS 0.04%
  • Veröffentlicht 17.10.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:55:50

drivers/tty/n_tty.c in the Linux kernel before 4.14.11 allows local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ.

  • EPSS 0.09%
  • Veröffentlicht 07.10.2018 06:29:00
  • Zuletzt bearbeitet 21.11.2024 03:55:23

arch/arm64/kvm/guest.c in KVM in the Linux kernel before 4.18.12 on the arm64 platform mishandles the KVM_SET_ON_REG ioctl. This is exploitable by attackers who can create virtual machines. An attacker can arbitrarily redirect the hypervisor flow of ...

  • EPSS 0.06%
  • Veröffentlicht 03.10.2018 22:29:00
  • Zuletzt bearbeitet 21.11.2024 03:55:18

An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwindi...

Warnung Exploit
  • EPSS 24.09%
  • Veröffentlicht 25.09.2018 21:29:00
  • Zuletzt bearbeitet 27.01.2026 15:55:15

An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6...

  • EPSS 7.3%
  • Veröffentlicht 25.09.2018 00:29:00
  • Zuletzt bearbeitet 21.11.2024 03:49:28

A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer over...