Canonical

Ubuntu 16.04 LTS

1003 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 20.12.2017 23:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service ...

  • EPSS 0.01%
  • Veröffentlicht 20.12.2017 23:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The HMAC implementation (crypto/hmac.c) in the Linux kernel before 4.14.8 does not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HAS...

  • EPSS 0.06%
  • Veröffentlicht 20.12.2017 23:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The KEYS subsystem in the Linux kernel before 4.14.6 omitted an access-control check when adding a key to the current task's "default request-key keyring" via the request_key() system call, allowing a local user to use a sequence of crafted system ca...

  • EPSS 0.06%
  • Veröffentlicht 18.12.2017 08:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h.

  • EPSS 0.08%
  • Veröffentlicht 16.12.2017 01:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The raw_sendmsg() function in net/ipv4/raw.c in the Linux kernel through 4.14.6 has a race condition in inet->hdrincl that leads to uninitialized stack pointer usage; this allows a local user to execute code and gain privileges.

  • EPSS 0.07%
  • Veröffentlicht 12.12.2017 15:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The usb_destroy_configuration function in drivers/usb/core/config.c in the USB core subsystem in the Linux kernel through 4.14.5 does not consider the maximum number of configurations and interfaces before attempting to release resources, which allow...

  • EPSS 0.46%
  • Veröffentlicht 11.12.2017 21:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The Linux Kernel 2.6.32 and later are affected by a denial of service, by flooding the diagnostic port 0x80 an exception can be triggered leading to a kernel panic.

  • EPSS 1.92%
  • Veröffentlicht 07.12.2017 19:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The Linux kernel version 3.3-rc1 and later is affected by a vulnerability lies in the processing of incoming L2CAP commands - ConfigRequest, and ConfigResponse messages. This info leak is a result of uninitialized stack variables that may be returned...

  • EPSS 0.07%
  • Veröffentlicht 07.12.2017 02:29:13
  • Zuletzt bearbeitet 13.05.2026 00:24:29

A non-privileged user is able to mount a fuse filesystem on RHEL 6 or 7 and crash a system if an application punches a hole in a file that does not end aligned to a page boundary.

  • EPSS 0.07%
  • Veröffentlicht 07.12.2017 00:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

net/netfilter/nfnetlink_cthelper.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations, which allows local users to bypass intended access restrictions because the nfnl_cthelper_list data ...