Canonical

Ubuntu 16.04 LTS

1003 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.16%
  • Veröffentlicht 27.07.2018 04:29:00
  • Zuletzt bearbeitet 21.11.2024 03:49:25

An issue was discovered in the Linux kernel through 4.17.10. There is a NULL pointer dereference in fscrypt_do_page_crypto() in fs/crypto/crypto.c when operating on a file in a corrupted f2fs image.

Exploit
  • EPSS 0.26%
  • Veröffentlicht 27.07.2018 04:29:00
  • Zuletzt bearbeitet 21.11.2024 03:49:25

An issue was discovered in the Linux kernel through 4.17.10. There is a NULL pointer dereference and panic in hfsplus_lookup() in fs/hfsplus/dir.c when opening a file (that is purportedly a hard link) in an hfs+ filesystem that has malformed catalog ...

Exploit
  • EPSS 12.86%
  • Veröffentlicht 26.07.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 03:19:53

The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel before 4.14.8 doesn't properly validate the sigevent->sigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 26.07.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:11

A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.

Exploit
  • EPSS 0.05%
  • Veröffentlicht 26.07.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:12

A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image.

Exploit
  • EPSS 0.03%
  • Veröffentlicht 26.07.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:12

A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image.

Exploit
  • EPSS 0.05%
  • Veröffentlicht 26.07.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:12

A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.

Exploit
  • EPSS 0.95%
  • Veröffentlicht 25.07.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:12

Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service.

  • EPSS 0.24%
  • Veröffentlicht 18.07.2018 15:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:12

Linux kernel ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image.

  • EPSS 0.02%
  • Veröffentlicht 11.07.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:01:29

It was discovered in the Linux kernel before 4.11-rc8 that root can gain direct access to an internal keyring, such as '.dns_resolver' in RHEL-7 or '.builtin_trusted_keys' upstream, by joining it as its session keyring. This allows root to bypass mod...