Canonical

Ubuntu 16.04 LTS

1003 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 02.05.2016 10:59:06
  • Zuletzt bearbeitet 06.05.2026 22:30:45

fs/namespace.c in the Linux kernel before 4.0.2 processes MNT_DETACH umount2 system calls without verifying that the MNT_LOCKED flag is unset, which allows local users to bypass intended access restrictions and navigate to filesystem locations beneat...

  • EPSS 0.09%
  • Veröffentlicht 02.05.2016 10:59:05
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Integer overflow in fs/aio.c in the Linux kernel before 3.4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large AIO iovec.

  • EPSS 0.03%
  • Veröffentlicht 02.05.2016 10:59:03
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The netlink_sendmsg function in net/netlink/af_netlink.c in the Linux kernel before 3.5.5 does not validate the dst_pid field, which allows local users to have an unspecified impact by spoofing Netlink messages.

  • EPSS 0.03%
  • Veröffentlicht 27.04.2016 17:59:27
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel through 4.5.2 does not properly randomize the legacy base address, which makes it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, a...

  • EPSS 0.03%
  • Veröffentlicht 27.04.2016 17:59:26
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The IPv4 implementation in the Linux kernel before 4.5.2 mishandles destruction of device objects, which allows guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses.

  • EPSS 0.2%
  • Veröffentlicht 27.04.2016 17:59:23
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Integer overflow in the xt_alloc_table_info function in net/netfilter/x_tables.c in the Linux kernel through 4.5.2 on 32-bit platforms allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLA...

  • EPSS 0.04%
  • Veröffentlicht 27.04.2016 17:59:22
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.

  • EPSS 0.19%
  • Veröffentlicht 27.04.2016 17:59:09
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) v...

  • EPSS 0.17%
  • Veröffentlicht 27.04.2016 17:59:08
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The fork implementation in the Linux kernel before 4.5 on s390 platforms mishandles the case of four page-table levels, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted appli...

  • EPSS 0.13%
  • Veröffentlicht 15.04.2016 14:59:14
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Xen and the Linux kernel through 4.5.x do not properly suppress hugetlbfs support in x86 PV guests, which allows local PV guest OS users to cause a denial of service (guest OS crash) by attempting to access a hugetlbfs mapped area.