Canonical

Ubuntu 16.04 LTS

1003 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.36%
  • Veröffentlicht 12.04.2016 16:59:02
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The __switch_to function in arch/x86/kernel/process_64.c in the Linux kernel does not properly context-switch IOPL on 64-bit PV Xen guests, which allows local guest OS users to gain privileges, cause a denial of service (guest OS crash), or obtain se...

  • EPSS 0.06%
  • Veröffentlicht 08.02.2016 03:59:05
  • Zuletzt bearbeitet 06.05.2026 22:30:45

kernel/ptrace.c in the Linux kernel through 4.4.1 mishandles uid and gid mappings, which allows local users to gain privileges by establishing a user namespace, waiting for a root process to enter that namespace with an unsafe uid or gid, and then us...

  • EPSS 0.08%
  • Veröffentlicht 28.12.2015 11:59:01
  • Zuletzt bearbeitet 06.05.2026 22:30:45

fs/ext4/namei.c in the Linux kernel before 3.7 allows physically proximate attackers to cause a denial of service (system crash) via a crafted no-journal filesystem, a related issue to CVE-2013-2015.

Exploit
  • EPSS 0.18%
  • Veröffentlicht 19.10.2015 10:59:10
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The usbvision driver in the Linux kernel package 3.10.0-123.20.1.el7 through 3.10.0-229.14.1.el7 in Red Hat Enterprise Linux (RHEL) 7.1 allows physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in...

  • EPSS 0.05%
  • Veröffentlicht 16.03.2015 10:59:02
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The filesystem implementation in the Linux kernel before 3.13 performs certain operations on lists of files with an inappropriate locking approach, which allows local users to cause a denial of service (soft lockup or system crash) via unspecified us...

  • EPSS 1.48%
  • Veröffentlicht 10.11.2014 11:55:10
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The ieee80211_fragment function in net/mac80211/tx.c in the Linux kernel before 3.13.5 does not properly maintain a certain tail pointer, which allows remote attackers to obtain sensitive cleartext information by reading packets.

  • EPSS 0.09%
  • Veröffentlicht 10.11.2014 11:55:06
  • Zuletzt bearbeitet 06.05.2026 22:30:45

arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.12 does not have an exit handler for the INVEPT instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.

Exploit
  • EPSS 0.12%
  • Veröffentlicht 28.09.2014 10:55:10
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The sock_setsockopt function in net/core/sock.c in the Linux kernel before 3.5.7 does not ensure that a keepalive action is associated with a stream socket, which allows local users to cause a denial of service (system crash) by leveraging the abilit...

Exploit
  • EPSS 0.07%
  • Veröffentlicht 23.06.2014 11:21:17
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The __do_follow_link function in fs/namei.c in the Linux kernel before 2.6.33 does not properly handle the last pathname component during use of certain filesystems, which allows local users to cause a denial of service (incorrect free operations and...

  • EPSS 0.05%
  • Veröffentlicht 26.05.2014 22:55:05
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The futex_wait_requeue_pi function in kernel/futex.c in the Linux kernel before 3.5.1 does not ensure that calls have two different futex addresses, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or ...