Canonical

Ubuntu 18.04 LTS

1647 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.07%
  • Veröffentlicht 12.12.2018 10:29:00
  • Zuletzt bearbeitet 21.11.2024 03:55:52

The userfaultfd implementation in the Linux kernel before 4.19.7 mishandles access control for certain UFFDIO_ ioctl calls, as demonstrated by allowing local users to write data into holes in a tmpfs file (if the user has read-only access to that fil...

  • EPSS 0.07%
  • Veröffentlicht 07.12.2018 23:29:00
  • Zuletzt bearbeitet 21.11.2024 04:15:37

In nfc_llcp_build_sdreq_tlv of llcp_commands.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploi...

  • EPSS 0.05%
  • Veröffentlicht 04.12.2018 16:29:00
  • Zuletzt bearbeitet 21.11.2024 03:58:41

An issue was discovered in the Linux kernel before 4.19.3. crypto_report_one() and related functions in crypto/crypto_user.c (the crypto user configuration API) do not fully initialize structures that are copied to userspace, potentially leaking sens...

  • EPSS 0.06%
  • Veröffentlicht 03.12.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 03:58:37

In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.

  • EPSS 0.04%
  • Veröffentlicht 26.11.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 03:49:29

The Linux kernel before 4.15-rc8 was found to be vulnerable to a NULL pointer dereference bug in the __netlink_ns_capable() function in the net/netlink/af_netlink.c file. A local attacker could exploit this when a net namespace with a netnsid is assi...

  • EPSS 0.03%
  • Veröffentlicht 26.11.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 03:53:28

A security flaw was found in the Linux kernel in a way that the cleancache subsystem clears an inode after the final file truncation (removal). The new file created with the same inode may contain leftover pages from cleancache and the old file data ...

  • EPSS 0.11%
  • Veröffentlicht 21.11.2018 00:29:01
  • Zuletzt bearbeitet 21.11.2024 03:57:51

kvm_pv_send_ipi in arch/x86/kvm/lapic.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where the apic map is uninitialized.

  • EPSS 0.08%
  • Veröffentlicht 21.11.2018 00:29:01
  • Zuletzt bearbeitet 21.11.2024 03:57:51

The vcpu_scan_ioapic function in arch/x86/kvm/x86.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized.

Exploit
  • EPSS 9.57%
  • Veröffentlicht 16.11.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:56:56

In the Linux kernel 4.15.x through 4.19.x before 4.19.2, map_write() in kernel/user_namespace.c allows privilege escalation because it mishandles nested user namespaces with more than 5 UID or GID ranges. A user who has CAP_SYS_ADMIN in an affected u...

  • EPSS 0.06%
  • Veröffentlicht 06.11.2018 17:29:01
  • Zuletzt bearbeitet 21.11.2024 04:15:37

In hid_debug_events_read of drivers/hid/hid-debug.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for e...