Canonical

Ubuntu Linux

4106 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 13.58%
  • Veröffentlicht 19.06.2019 00:15:12
  • Zuletzt bearbeitet 21.11.2024 04:21:09

Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial ...

  • EPSS 3.84%
  • Veröffentlicht 14.06.2019 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:18:28

A flaw was found in the Linux kernel. A heap based buffer overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c might lead to memory corruption and possibly other consequences.

  • EPSS 2.27%
  • Veröffentlicht 11.06.2019 22:29:04
  • Zuletzt bearbeitet 21.11.2024 04:16:27

A vulnerability was found in Apache HTTP Server 2.4.34 to 2.4.38. When HTTP/2 was enabled for a http: host or H2Upgrade was enabled for h2 on a https: host, an Upgrade request from http/1.1 to http/2 that was not the first request on a connection cou...

  • EPSS 9.66%
  • Veröffentlicht 11.06.2019 22:29:03
  • Zuletzt bearbeitet 21.11.2024 04:16:27

A vulnerability was found in Apache HTTP Server 2.4.17 to 2.4.38. Using fuzzed network input, the http/2 request handling could be made to access freed memory in string comparison when determining the method of a request and thus process the request ...

  • EPSS 20.57%
  • Veröffentlicht 11.06.2019 21:29:00
  • Zuletzt bearbeitet 21.11.2024 04:16:31

A vulnerability was found in Apache HTTP Server 2.4.0 to 2.4.38. When the path component of a request URL contains multiple consecutive slashes ('/'), directives such as LocationMatch and RewriteRule must account for duplicates in regular expressions...

  • EPSS 0.05%
  • Veröffentlicht 11.06.2019 17:29:00
  • Zuletzt bearbeitet 06.12.2024 14:15:18

dbus before 1.10.28, 1.12.x before 1.12.16, and 1.13.x before 1.13.12, as used in DBusServer in Canonical Upstart in Ubuntu 14.04 (and in some, less common, uses of dbus-daemon), allows cookie spoofing because of symlink mishandling in the reference ...

Exploit
  • EPSS 0.53%
  • Veröffentlicht 10.06.2019 12:29:00
  • Zuletzt bearbeitet 25.11.2024 18:12:24

In Twisted before 19.2.1, twisted.web did not validate or sanitize URIs or HTTP methods, allowing an attacker to inject invalid characters such as CRLF.

  • EPSS 0.11%
  • Veröffentlicht 07.06.2019 20:29:01
  • Zuletzt bearbeitet 21.11.2024 04:40:13

In uvc_parse_standard_control of uvc_driver.c, there is a possible out-of-bound read due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for ...

  • EPSS 1.8%
  • Veröffentlicht 07.06.2019 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:18:32

A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by...

Warnung Exploit
  • EPSS 93.93%
  • Veröffentlicht 05.06.2019 14:29:11
  • Zuletzt bearbeitet 06.11.2025 14:49:48

A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution.