Canonical

Ubuntu Pro 14.04 LTS

4792 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.02%
  • Veröffentlicht 18.08.2021 15:15:07
  • Zuletzt bearbeitet 21.11.2024 05:48:57

An information disclosure vulnerability exists in the ARM SIGPAGE functionality of Linux Kernel v5.4.66 and v5.4.54. The latest version (5.11-rc4) seems to still be vulnerable. A userland application can read the contents of the sigpage, which can le...

  • EPSS -
  • Veröffentlicht 18.08.2021 06:15:07
  • Zuletzt bearbeitet 07.11.2023 03:38:07

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-38208. Reason: This candidate is a reservation duplicate of CVE-2021-38208. Notes: All CVE users should reference CVE-2021-38208 instead of this candidate. All references and des...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 13.08.2021 14:15:07
  • Zuletzt bearbeitet 21.11.2024 06:21:52

A use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_bl...

Exploit
  • EPSS 0.08%
  • Veröffentlicht 08.08.2021 20:15:07
  • Zuletzt bearbeitet 21.11.2024 06:16:37

arch/x86/kvm/mmu/paging_tmpl.h in the Linux kernel before 5.12.11 incorrectly computes the access permissions of a shadow page, leading to a missing guest protection page fault.

  • EPSS 0.02%
  • Veröffentlicht 08.08.2021 20:15:07
  • Zuletzt bearbeitet 21.11.2024 06:16:39

drivers/net/ethernet/xilinx/xilinx_emaclite.c in the Linux kernel before 5.13.3 makes it easier for attackers to defeat an ASLR protection mechanism because it prints a kernel pointer (i.e., the real IOMEM pointer).

Exploit
  • EPSS 0.08%
  • Veröffentlicht 08.08.2021 20:15:07
  • Zuletzt bearbeitet 21.11.2024 06:16:40

net/nfc/llcp_sock.c in the Linux kernel before 5.12.10 allows local unprivileged users to cause a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call.

  • EPSS 0.04%
  • Veröffentlicht 07.08.2021 04:15:06
  • Zuletzt bearbeitet 05.05.2025 14:12:40

In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is...

  • EPSS 0.02%
  • Veröffentlicht 05.08.2021 21:15:13
  • Zuletzt bearbeitet 21.11.2024 06:22:05

A vulnerability was found in the Linux kernel in versions prior to v5.14-rc1. Missing size validations on inbound SCTP packets may allow the kernel to read uninitialized memory.

  • EPSS 1.41%
  • Veröffentlicht 05.08.2021 20:15:09
  • Zuletzt bearbeitet 21.11.2024 06:22:08

A lack of CPU resource in the Linux kernel tracing module functionality in versions prior to 5.14-rc3 was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw ...

  • EPSS 0.04%
  • Veröffentlicht 02.08.2021 05:15:07
  • Zuletzt bearbeitet 21.11.2024 06:10:40

In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory l...