Canonical

Ubuntu 18.04 LTS

1647 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 15.06.2022 14:15:11
  • Zuletzt bearbeitet 21.11.2024 06:42:15

In lock_sock_nested of sock.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersi...

  • EPSS 0.08%
  • Veröffentlicht 15.06.2022 13:15:08
  • Zuletzt bearbeitet 21.11.2024 06:42:13

In lg_probe and related functions of hid-lg.c and other USB HID files, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure if a malicious USB HID device were plugged in, with no add...

  • EPSS 0.04%
  • Veröffentlicht 06.06.2022 18:15:08
  • Zuletzt bearbeitet 07.11.2023 03:42:21

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-32250. Reason: This candidate is a duplicate of CVE-2022-32250. Notes: All CVE users should reference CVE-2022-32250 instead of this candidate. All references and descriptions in...

  • EPSS 0.07%
  • Veröffentlicht 05.06.2022 22:15:08
  • Zuletzt bearbeitet 21.11.2024 07:06:07

The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. This occurs because of use of Algorithm 4 ("Double-Hash Port Selection Algorithm") of RFC 6056.

Exploit
  • EPSS 1.31%
  • Veröffentlicht 02.06.2022 21:15:07
  • Zuletzt bearbeitet 21.11.2024 07:06:01

net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.

  • EPSS 0.07%
  • Veröffentlicht 02.06.2022 14:15:32
  • Zuletzt bearbeitet 21.11.2024 06:40:41

The root cause of this vulnerability is that the ioctl$DRM_IOCTL_MODE_DESTROY_DUMB can decrease refcount of *drm_vgem_gem_object *(created in *vgem_gem_dumb_create*) concurrently, and *vgem_gem_dumb_create *will access the freed drm_vgem_gem_object.

Exploit
  • EPSS 0.05%
  • Veröffentlicht 02.06.2022 14:15:32
  • Zuletzt bearbeitet 21.11.2024 06:40:46

An out-of-bounds read flaw was found in the Linux kernel’s TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc functi...

  • EPSS 0.75%
  • Veröffentlicht 02.06.2022 14:15:32
  • Zuletzt bearbeitet 21.11.2024 06:41:10

Linux Kernel could allow a local attacker to execute arbitrary code on the system, caused by a concurrency use-after-free flaw in the bad_flp_intr function. By executing a specially-crafted program, an attacker could exploit this vulnerability to exe...

Exploit
  • EPSS 0.08%
  • Veröffentlicht 18.05.2022 17:15:08
  • Zuletzt bearbeitet 21.11.2024 06:41:21

A flaw in Linux Kernel found in nfcmrvl_nci_unregister_dev() in drivers/nfc/nfcmrvl/main.c can lead to use after free both read or write when non synchronized between cleanup routine and firmware download routine.

Exploit
  • EPSS 0.19%
  • Veröffentlicht 17.05.2022 17:15:08
  • Zuletzt bearbeitet 21.11.2024 06:59:20

Improper Update of Reference Count vulnerability in net/sched of Linux Kernel allows local attacker to cause privilege escalation to root. This issue affects: Linux Kernel versions prior to 5.18; version 4.14 and later versions.