Canonical

Ubuntu Pro 14.04 LTS

4792 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.13%
  • Veröffentlicht 26.05.2021 12:15:15
  • Zuletzt bearbeitet 21.11.2024 05:18:24

A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.

Exploit
  • EPSS 0.06%
  • Veröffentlicht 26.05.2021 12:15:15
  • Zuletzt bearbeitet 21.11.2024 05:18:24

A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_rei...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 26.05.2021 11:15:08
  • Zuletzt bearbeitet 21.11.2024 05:18:25

A vulnerability was found in Linux Kernel where refcount leak in llcp_sock_bind() causing use-after-free which might lead to privilege escalations.

Exploit
  • EPSS 0.13%
  • Veröffentlicht 26.05.2021 11:15:08
  • Zuletzt bearbeitet 21.11.2024 05:18:25

A vulnerability was found in Linux Kernel, where a refcount leak in llcp_sock_connect() causing use-after-free which might lead to privilege escalations.

Exploit
  • EPSS 0.13%
  • Veröffentlicht 26.05.2021 11:15:08
  • Zuletzt bearbeitet 21.11.2024 05:18:25

A vulnerability was found in Linux kernel where non-blocking socket in llcp_sock_connect() leads to leak and eventually hanging-up the system.

  • EPSS 2.01%
  • Veröffentlicht 25.05.2021 20:15:07
  • Zuletzt bearbeitet 21.11.2024 05:18:25

A memory leak vulnerability was found in Linux kernel in llcp_sock_connect

  • EPSS 0.22%
  • Veröffentlicht 24.05.2021 18:15:07
  • Zuletzt bearbeitet 04.11.2025 20:15:57

Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B through 5.2 may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN.

  • EPSS 0.9%
  • Veröffentlicht 24.05.2021 18:15:07
  • Zuletzt bearbeitet 21.11.2024 05:20:04

Mesh Provisioning in the Bluetooth Mesh profile 1.0 and 1.0.1 may permit a nearby device, able to conduct a successful brute-force attack on an insufficiently random AuthValue before the provisioning procedure times out, to complete authentication by...

  • EPSS 0.95%
  • Veröffentlicht 24.05.2021 18:15:07
  • Zuletzt bearbeitet 04.11.2025 20:15:57

Mesh Provisioning in the Bluetooth Mesh profile 1.0 and 1.0.1 may permit a nearby device (without possession of the AuthValue used in the provisioning protocol) to determine the AuthValue via a brute-force attack (unless the AuthValue is sufficiently...

  • EPSS 0.02%
  • Veröffentlicht 24.05.2021 18:15:07
  • Zuletzt bearbeitet 04.11.2025 20:15:58

Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public ke...