Canonical

Ubuntu Pro 14.04 LTS

4792 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.26%
  • Veröffentlicht 27.07.2018 04:29:00
  • Zuletzt bearbeitet 21.11.2024 03:49:24

An issue was discovered in the Linux kernel through 4.17.10. There is a use-after-free in try_merge_free_space() when mounting a crafted btrfs image, because of a lack of chunk type flag checks in btrfs_check_chunk_valid in fs/btrfs/volumes.c.

Exploit
  • EPSS 0.09%
  • Veröffentlicht 27.07.2018 04:29:00
  • Zuletzt bearbeitet 21.11.2024 03:49:25

An issue was discovered in the Linux kernel through 4.17.10. There is an invalid pointer dereference in btrfs_root_node() when mounting a crafted btrfs image, because of a lack of chunk block group mapping validation in btrfs_read_block_groups in fs/...

Exploit
  • EPSS 0.1%
  • Veröffentlicht 27.07.2018 04:29:00
  • Zuletzt bearbeitet 21.11.2024 03:49:25

An issue was discovered in the Linux kernel through 4.17.10. There is an invalid pointer dereference in io_ctl_map_page() when mounting and operating a crafted btrfs image, because of a lack of block group item validation in check_leaf_item in fs/btr...

  • EPSS 0.26%
  • Veröffentlicht 27.07.2018 04:29:00
  • Zuletzt bearbeitet 21.11.2024 03:49:25

An issue was discovered in the Linux kernel through 4.17.10. There is an out-of-bounds access in __remove_dirty_segment() in fs/f2fs/segment.c when mounting an f2fs image.

Exploit
  • EPSS 0.16%
  • Veröffentlicht 27.07.2018 04:29:00
  • Zuletzt bearbeitet 21.11.2024 03:49:25

An issue was discovered in the Linux kernel through 4.17.10. There is a NULL pointer dereference in fscrypt_do_page_crypto() in fs/crypto/crypto.c when operating on a file in a corrupted f2fs image.

Exploit
  • EPSS 0.26%
  • Veröffentlicht 27.07.2018 04:29:00
  • Zuletzt bearbeitet 21.11.2024 03:49:25

An issue was discovered in the Linux kernel through 4.17.10. There is a NULL pointer dereference and panic in hfsplus_lookup() in fs/hfsplus/dir.c when opening a file (that is purportedly a hard link) in an hfs+ filesystem that has malformed catalog ...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 26.07.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:11

A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.

Exploit
  • EPSS 0.05%
  • Veröffentlicht 26.07.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:12

A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image.

Exploit
  • EPSS 0.03%
  • Veröffentlicht 26.07.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:12

A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image.

Exploit
  • EPSS 0.95%
  • Veröffentlicht 25.07.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:12

Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service.