Canonical

Ubuntu Pro 16.04 LTS

5033 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.01%
  • Veröffentlicht 03.03.2022 23:15:08
  • Zuletzt bearbeitet 21.11.2024 06:22:03

A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with...

Exploit
  • EPSS 0.02%
  • Veröffentlicht 03.03.2022 22:15:08
  • Zuletzt bearbeitet 21.11.2024 06:36:42

A memory leak flaw in the Linux kernel's hugetlbfs memory usage was found in the way the user maps some regions of memory twice using shmget() which are aligned to PUD alignment with the fault of some of the memory pages. A local user could use this ...

Exploit
  • EPSS 0.06%
  • Veröffentlicht 03.03.2022 19:15:08
  • Zuletzt bearbeitet 21.11.2024 06:21:58

.A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kerne...

  • EPSS 5.24%
  • Veröffentlicht 03.03.2022 19:15:08
  • Zuletzt bearbeitet 21.11.2024 06:38:46

A vulnerability was found in the Linux kernel’s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the...

  • EPSS 0.16%
  • Veröffentlicht 02.03.2022 23:15:09
  • Zuletzt bearbeitet 21.11.2024 06:22:23

A flaw was found in the Linux SCTP stack. A blind attacker may be able to kill an existing SCTP association through invalid chunks if the attacker knows the IP-addresses and port numbers being used and the attacker can send packets with spoofed IP ad...

  • EPSS 0.04%
  • Veröffentlicht 26.02.2022 04:15:06
  • Zuletzt bearbeitet 21.11.2024 05:29:43

An issue was discovered in the Linux kernel through 5.16.11. The mixed IPID assignment method with the hash-based IPID assignment policy allows an off-path attacker to inject data into a victim's TCP session or terminate that session.

  • EPSS 0.71%
  • Veröffentlicht 20.02.2022 20:15:18
  • Zuletzt bearbeitet 21.11.2024 06:52:06

An issue was discovered in drivers/usb/gadget/function/rndis.c in the Linux kernel before 5.16.10. The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory.

  • EPSS 0.14%
  • Veröffentlicht 18.02.2022 18:15:09
  • Zuletzt bearbeitet 21.11.2024 05:46:22

A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass ...

  • EPSS 0.1%
  • Veröffentlicht 18.02.2022 18:15:08
  • Zuletzt bearbeitet 21.11.2024 05:46:22

A flaw was found in s390 eBPF JIT in bpf_jit_insn in arch/s390/net/bpf_jit_comp.c in the Linux kernel. In this flaw, a local attacker with special user privilege can circumvent the verifier and may lead to a confidentiality problem.

  • EPSS 0.02%
  • Veröffentlicht 18.02.2022 18:15:08
  • Zuletzt bearbeitet 21.11.2024 05:46:22

A race condition accessing file object in the Linux kernel OverlayFS subsystem was found in the way users do rename in specific way with OverlayFS. A local user could use this flaw to crash the system.