Canonical

Ubuntu Linux

4106 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Published 29.08.2022 15:15:10
  • Last modified 21.11.2024 06:40:12

A use-after-free flaw was found in fs/ext4/namei.c:dx_insert_block() in the Linux kernel’s filesystem sub-component. This flaw allows a local attacker with a user privilege to cause a denial of service.

  • EPSS 0.26%
  • Published 23.08.2022 20:15:08
  • Last modified 21.11.2024 06:23:17

A use-after-free flaw was found in libvirt. The qemuMonitorUnregister() function in qemuProcessHandleMonitorEOF is called using multiple threads without being adequately protected by a monitor lock. This flaw could be triggered by the virConnectGetAl...

Exploit
  • EPSS 0.14%
  • Published 23.08.2022 16:15:10
  • Last modified 21.11.2024 06:22:44

A memory leak was found in Open vSwitch (OVS) during userspace IP fragmentation processing. An attacker could use this flaw to potentially exhaust available memory by keeping sending packet fragments.

Exploit
  • EPSS 34.58%
  • Published 04.07.2022 21:15:07
  • Last modified 21.11.2024 07:10:26

An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacke...

Exploit
  • EPSS 0.25%
  • Published 17.05.2022 17:15:08
  • Last modified 21.11.2024 06:59:20

Improper Update of Reference Count vulnerability in net/sched of Linux Kernel allows local attacker to cause privilege escalation to root. This issue affects: Linux Kernel versions prior to 5.18; version 4.14 and later versions.

Exploit
  • EPSS 0.02%
  • Published 29.03.2022 15:15:08
  • Last modified 21.11.2024 06:39:56

A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4...

  • EPSS 0.02%
  • Published 23.03.2022 20:15:09
  • Last modified 21.11.2024 06:22:19

A use-after-free vulnerability was found in the virtio-net device of QEMU. It could occur when the descriptor's address belongs to the non direct access region, due to num_buffers being set after the virtqueue elem has been unmapped. A malicious gues...

Exploit
  • EPSS 0.21%
  • Published 04.03.2022 19:15:08
  • Last modified 21.11.2024 06:22:17

A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from...

Exploit
  • EPSS 0%
  • Published 03.03.2022 23:15:08
  • Last modified 21.11.2024 06:22:03

A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with...

  • EPSS 6.99%
  • Published 03.03.2022 19:15:08
  • Last modified 21.11.2024 06:38:46

A vulnerability was found in the Linux kernel’s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the...