Canonical

Ubuntu 16.04 LTS

1003 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.11%
  • Veröffentlicht 12.10.2017 00:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The keyctl_read_key function in security/keys/keyctl.c in the Key Management subcomponent in the Linux kernel before 4.13.5 does not properly consider that a key may be possessed but negatively instantiated, which allows local users to cause a denial...

  • EPSS 0.08%
  • Veröffentlicht 12.10.2017 00:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

security/keys/keyctl.c in the Linux kernel before 4.11.5 does not consider the case of a NULL payload in conjunction with a nonzero length value, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted ...

  • EPSS 0.06%
  • Veröffentlicht 05.10.2017 01:29:04
  • Zuletzt bearbeitet 13.05.2026 00:24:29

Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue is analogous to previously disclosed CVE-2016-8655. In both cases, a socket option that changes socket state may race with safety checks in packet_set_ring. Previously with PACKET_...

  • EPSS 82.86%
  • Veröffentlicht 05.10.2017 01:29:04
  • Zuletzt bearbeitet 13.05.2026 00:24:29

Linux kernel: Exploitable memory corruption due to UFO to non-UFO path switch. When building a UFO packet with MSG_MORE __ip_append_data() calls ip_ufo_append_data() to append. However in between two send() calls, the append path can be switched from...

  • EPSS 0.06%
  • Veröffentlicht 04.10.2017 01:29:03
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel before 4.13.4 allows local users to obtain sensitive information from uninitialized kernel heap-memory locations via an SG_GET_REQUEST_TABLE ioctl call for /dev/sg0.

  • EPSS 0.08%
  • Veröffentlicht 26.09.2017 05:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The KVM subsystem in the Linux kernel through 4.13.3 allows guest OS users to cause a denial of service (assertion failure, and hypervisor hang or crash) via an out-of bounds guest_irq value, related to arch/x86/kvm/vmx.c and virt/kvm/eventfd.c.

  • EPSS 0.04%
  • Veröffentlicht 26.09.2017 05:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The prepare_vmcs02 function in arch/x86/kvm/vmx.c in the Linux kernel through 4.13.3 does not ensure that the "CR8-load exiting" and "CR8-store exiting" L0 vmcs02 controls exist in cases where L1 omits the "use TPR shadow" vmcs12 control, which allow...

  • EPSS 0.21%
  • Veröffentlicht 25.09.2017 21:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

Out-of-bounds memory read in the x509_decode_time function in x509_cert_parser.c in Linux kernels 4.3-rc1 and after.

  • EPSS 0.02%
  • Veröffentlicht 21.09.2017 15:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be i...

  • EPSS 0.07%
  • Veröffentlicht 19.09.2017 16:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The Linux kernel, as used in Red Hat Enterprise Linux 7, kernel-rt, and Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended securelevel/secureboot restrictions by leveraging improper handling of secur...