Canonical

Ubuntu Linux

4106 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.29%
  • Veröffentlicht 26.04.2021 14:15:08
  • Zuletzt bearbeitet 21.11.2024 05:04:45

OpenVPN 2.5.1 and earlier versions allows a remote attackers to bypass authentication and access control channel data on servers configured with deferred authentication, which can be used to potentially trigger further information leaks.

Warnung Exploit
  • EPSS 75.34%
  • Veröffentlicht 17.04.2021 05:15:14
  • Zuletzt bearbeitet 19.02.2025 19:47:40

The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a pat...

  • EPSS 24.83%
  • Veröffentlicht 17.04.2021 05:15:13
  • Zuletzt bearbeitet 21.11.2024 06:21:40

Shiftfs, an out-of-tree stacking file system included in Ubuntu Linux kernels, did not properly handle faults occurring during copy_from_user() correctly. These could lead to either a double-free situation or memory not being freed at all. An attacke...

Exploit
  • EPSS 0.34%
  • Veröffentlicht 07.04.2021 20:15:13
  • Zuletzt bearbeitet 21.11.2024 01:48:49

The unity-firefox-extension package could be tricked into dropping a C callback which was still in use, which Firefox would then free, causing Firefox to crash. This could be achieved by adding an action to the launcher and updating it with new callb...

Exploit
  • EPSS 0.35%
  • Veröffentlicht 07.04.2021 20:15:12
  • Zuletzt bearbeitet 21.11.2024 01:48:49

The unity-firefox-extension package could be tricked into destroying the Unity webapps context, causing Firefox to crash. This could be achieved by spinning the event loop inside the webapps initialization callback. Fixed in 3.0.0+14.04.20140416-0ubu...

  • EPSS 0.09%
  • Veröffentlicht 23.03.2021 18:15:13
  • Zuletzt bearbeitet 21.11.2024 06:21:32

The bpf verifier in the Linux kernel did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel me...

  • EPSS 0.16%
  • Veröffentlicht 20.03.2021 22:15:12
  • Zuletzt bearbeitet 21.11.2024 05:20:48

An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c has an off-by-one error (with a resultant integer underflow) affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spect...

  • EPSS 0.14%
  • Veröffentlicht 20.03.2021 22:15:11
  • Zuletzt bearbeitet 21.11.2024 05:20:48

An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information fr...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 07.03.2021 05:15:13
  • Zuletzt bearbeitet 21.11.2024 05:57:50

An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/scsi_transport_iscsi.c is adversely affected by the ability of an unprivileged user to craft Netlink messages.

  • EPSS 0.03%
  • Veröffentlicht 10.02.2021 20:15:15
  • Zuletzt bearbeitet 21.11.2024 05:06:48

Overlayfs did not properly perform permission checking when copying up files in an overlayfs and could be exploited from within a user namespace, if, for example, unprivileged user namespaces were allowed. It was possible to have a file not readable ...