Canonical

Ubuntu Linux

4106 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 4.22%
  • Published 21.08.2020 21:15:12
  • Last modified 21.11.2024 05:39:08

In BIND 9.14.0 -> 9.16.5, 9.17.0 -> 9.17.3, If a server is configured with both QNAME minimization and 'forward first' then an attacker who can send queries to it may be able to trigger the condition that will cause the server to crash. Servers that ...

  • EPSS 0.6%
  • Published 21.08.2020 21:15:12
  • Last modified 21.11.2024 05:39:08

In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed re...

  • EPSS 5.63%
  • Published 21.08.2020 21:15:12
  • Last modified 21.11.2024 05:39:08

In BIND 9.10.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.10.5-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker that can reach a vulnerable system with a specially crafted query packet can trigger a crash. To ...

  • EPSS 1.95%
  • Published 21.08.2020 21:15:12
  • Last modified 21.11.2024 05:39:08

In BIND 9.9.12 -> 9.9.13, 9.10.7 -> 9.10.8, 9.11.3 -> 9.11.21, 9.12.1 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.12-S1 -> 9.9.13-S1, 9.11.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker who has been granted privileges to ch...

  • EPSS 0.51%
  • Published 20.08.2020 01:17:13
  • Last modified 21.11.2024 05:06:19

Net-SNMP through 5.7.3 allows Escalation of Privileges because of UNIX symbolic link (symlink) following.

  • EPSS 0.06%
  • Published 20.08.2020 01:17:13
  • Last modified 21.11.2024 05:06:19

Net-SNMP through 5.8 has Improper Privilege Management because SNMP WRITE access to the EXTEND MIB provides the ability to run arbitrary commands as root.

Exploit
  • EPSS 0.93%
  • Published 19.08.2020 15:15:12
  • Last modified 21.11.2024 05:03:05

A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.

  • EPSS 0.02%
  • Published 19.08.2020 13:15:10
  • Last modified 21.11.2024 05:14:44

In the Linux kernel before 5.7.8, fs/nfsd/vfs.c (in the NFS server) can set incorrect permissions on new filesystem objects when the filesystem lacks ACL support, aka CID-22cf8419f131. This occurs because the current umask is not considered.

Warning Exploit
  • EPSS 94.43%
  • Published 17.08.2020 19:15:15
  • Last modified 07.03.2025 14:57:32

An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability...

Exploit
  • EPSS 0.47%
  • Published 13.08.2020 03:15:14
  • Last modified 14.03.2025 18:27:22

A buffer overflow vulnerability in image_render_color_thresh() in base/gxicolor.c of Artifex Software GhostScript v9.18 to v9.50 allows a remote attacker to escalate privileges via a crafted eps file. This is fixed in v9.51.