Canonical

Ubuntu 16.04 LTS

1003 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 13.13%
  • Veröffentlicht 29.08.2017 01:35:13
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The __skb_flow_dissect function in net/core/flow_dissector.c in the Linux kernel before 4.3 does not ensure that n_proto, ip_proto, and thoff are initialized, which allows remote attackers to cause a denial of service (system crash) or possibly execu...

  • EPSS 0.01%
  • Veröffentlicht 25.08.2017 08:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The acpi_ns_evaluate() function in drivers/acpi/acpica/nseval.c in the Linux kernel through 4.12.9 does not flush the operand cache and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass...

  • EPSS 0.34%
  • Veröffentlicht 24.08.2017 14:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The xen_biovec_phys_mergeable function in drivers/xen/biomerge.c in Xen might allow local OS guest users to corrupt block device data streams and consequently obtain sensitive memory information, cause a denial of service, or gain host OS privileges ...

  • EPSS 25.7%
  • Veröffentlicht 19.08.2017 18:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

Race condition in fs/timerfd.c in the Linux kernel before 4.10.15 allows local users to gain privileges or cause a denial of service (list corruption or use-after-free) via simultaneous file-descriptor operations that leverage improper might_cancel q...

  • EPSS 0.05%
  • Veröffentlicht 19.08.2017 18:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The sanity_check_raw_super function in fs/f2fs/super.c in the Linux kernel before 4.11.1 does not validate the segment count, which allows local users to gain privileges via unspecified vectors.

  • EPSS 0.05%
  • Veröffentlicht 19.08.2017 18:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The sanity_check_ckpt function in fs/f2fs/super.c in the Linux kernel before 4.12.4 does not validate the blkoff and segno arrays, which allows local users to gain privileges via unspecified vectors.

  • EPSS 0.05%
  • Veröffentlicht 16.08.2017 15:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

In an ioctl handler in all Qualcomm products with Android for MSM, Firefox OS for MSM, or QRD Android, several sanity checks are missing which can lead to out-of-bounds accesses.

  • EPSS 0.38%
  • Veröffentlicht 09.08.2017 21:29:01
  • Zuletzt bearbeitet 13.05.2026 00:24:29

A elevation of privilege vulnerability in the Upstream Linux file system. Product: Android. Versions: Android kernel. Android ID: A-36817013.

  • EPSS 1.44%
  • Veröffentlicht 09.08.2017 21:29:01
  • Zuletzt bearbeitet 13.05.2026 00:24:29

In /drivers/isdn/i4l/isdn_net.c: A user-controlled buffer is copied into a local buffer of constant size using strcpy without a length check which can cause a buffer overflow. This affects the Linux kernel 4.9-stable tree, 4.12-stable tree, 3.18-stab...

  • EPSS 0.04%
  • Veröffentlicht 07.08.2017 03:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The ia64 subsystem in the Linux kernel before 2.6.26 allows local users to cause a denial of service (stack consumption and system crash) via a crafted application that leverages the mishandling of invalid Register Stack Engine (RSE) state.