Canonical

Ubuntu 16.04 LTS

1003 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Veröffentlicht 06.02.2017 06:59:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.9.8 does not properly validate meta block groups, which allows physically proximate attackers to cause a denial of service (out-of-bounds read and system crash) via a craft...

  • EPSS 0.08%
  • Veröffentlicht 06.02.2017 06:59:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The load_segment_descriptor implementation in arch/x86/kvm/emulate.c in the Linux kernel before 4.9.5 improperly emulates a "MOV SS, NULL selector" instruction, which allows guest OS users to cause a denial of service (guest OS crash) or gain guest O...

  • EPSS 0.05%
  • Veröffentlicht 06.02.2017 06:59:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The nested_vmx_check_vmptr function in arch/x86/kvm/vmx.c in the Linux kernel through 4.9.8 improperly emulates the VMXON instruction, which allows KVM L1 guest OS users to cause a denial of service (host OS memory consumption) by leveraging the mish...

  • EPSS 0.08%
  • Veröffentlicht 06.02.2017 06:59:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The klsi_105_get_line_state function in drivers/usb/serial/kl5kusb105.c in the Linux kernel before 4.9.5 places uninitialized heap-memory contents into a log entry upon a failure to read the line status, which allows local users to obtain sensitive i...

  • EPSS 0.06%
  • Veröffentlicht 06.02.2017 06:59:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The simple_set_acl function in fs/posix_acl.c in the Linux kernel before 4.9.6 preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allows local users to gain group privileges by leveraging the existence of a setgid pro...

  • EPSS 0.07%
  • Veröffentlicht 18.01.2017 21:59:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

crypto/mcryptd.c in the Linux kernel before 4.8.15 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an AF_ALG socket with an incompatible algorithm, as demonstrated by mcryptd(md5).

  • EPSS 0.09%
  • Veröffentlicht 15.01.2017 02:59:02
  • Zuletzt bearbeitet 13.05.2026 00:24:29

arch/x86/kvm/emulate.c in the Linux kernel through 4.9.3 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) via a crafted application that leverages instruction emulation for fxrstor, f...

  • EPSS 0.25%
  • Veröffentlicht 12.01.2017 15:59:01
  • Zuletzt bearbeitet 06.05.2026 22:30:45

An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a...

  • EPSS 0.34%
  • Veröffentlicht 12.01.2017 15:59:01
  • Zuletzt bearbeitet 06.05.2026 22:30:45

An information disclosure vulnerability in kernel components including the ION subsystem, Binder, USB driver and networking subsystem could enable a local malicious application to access data outside of its permission levels. This issue is rated as M...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 05.01.2017 11:59:00
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The ring_buffer_resize function in kernel/trace/ring_buffer.c in the profiling subsystem in the Linux kernel before 4.6.1 mishandles certain integer calculations, which allows local users to gain privileges by writing to the /sys/kernel/debug/tracing...