Canonical

Ubuntu Linux

4107 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Veröffentlicht 10.02.2021 20:15:15
  • Zuletzt bearbeitet 21.11.2024 05:06:48

Overlayfs did not properly perform permission checking when copying up files in an overlayfs and could be exploited from within a user namespace, if, for example, unprivileged user namespaces were allowed. It was possible to have a file not readable ...

  • EPSS 0.08%
  • Veröffentlicht 14.01.2021 01:15:13
  • Zuletzt bearbeitet 21.11.2024 05:06:47

Use-after-free vulnerability in the Linux kernel exploitable by a local attacker due to reuse of a DCCP socket with an attached dccps_hc_tx_ccid object as a listener after being released. Fixed in Ubuntu Linux kernel 5.4.0-51.56, 5.3.0-68.63, 4.15.0-...

  • EPSS 0.63%
  • Veröffentlicht 26.12.2020 02:15:12
  • Zuletzt bearbeitet 29.04.2025 13:13:41

GNOME gdk-pixbuf (aka GdkPixbuf) before 2.42.2 allows a denial of service (infinite loop) in lzw.c in the function write_indexes. if c->self_code equals 10, self->code_table[10].extends will assign the value 11 to c. The next execution in the loop wi...

  • EPSS 0.04%
  • Veröffentlicht 09.12.2020 04:15:11
  • Zuletzt bearbeitet 21.11.2024 05:06:49

The aptdaemon DBus interface disclosed file existence disclosure by setting Terminal/DebconfSocket properties, aka GHSL-2020-192 and GHSL-2020-196. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubun...

  • EPSS 0.04%
  • Veröffentlicht 09.12.2020 04:15:11
  • Zuletzt bearbeitet 21.11.2024 05:21:02

Aptdaemon performed policykit checks after interacting with potentially untrusted files with elevated privileges. This affected versions prior to 1.1.1+bzr982-0ubuntu34.1, 1.1.1+bzr982-0ubuntu32.3, 1.1.1+bzr982-0ubuntu19.5, 1.1.1+bzr982-0ubuntu14.5.

Exploit
  • EPSS 0.07%
  • Veröffentlicht 04.12.2020 03:15:12
  • Zuletzt bearbeitet 21.11.2024 05:21:02

In some conditions, a snap package built by snapcraft includes the current directory in LD_LIBRARY_PATH, allowing a malicious snap to gain code execution within the context of another snap if both plug the home interface or similar. This issue affect...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 04.12.2020 00:15:11
  • Zuletzt bearbeitet 21.11.2024 05:06:48

An Ubuntu-specific patch in PulseAudio created a race condition where the snap policy module would fail to identify a client connection from a snap as coming from a snap if SCM_CREDENTIALS were missing, allowing the snap to connect to PulseAudio with...

Exploit
  • EPSS 0.06%
  • Veröffentlicht 28.11.2020 07:15:11
  • Zuletzt bearbeitet 21.11.2024 05:23:56

An issue was discovered in do_madvise in mm/madvise.c in the Linux kernel before 5.6.8. There is a race condition between coredump operations and the IORING_OP_MADVISE implementation, aka CID-bc0c4d1e176e.

  • EPSS 0.33%
  • Veröffentlicht 23.11.2020 17:15:12
  • Zuletzt bearbeitet 21.11.2024 04:53:46

Out of bounds write in Intel(R) PROSet/Wireless WiFi products on Windows 10 may allow an authenticated user to potentially enable denial of service via local access.

Exploit
  • EPSS 0.1%
  • Veröffentlicht 07.11.2020 04:15:12
  • Zuletzt bearbeitet 21.11.2024 05:06:48

PackageKit provided detailed error messages to unprivileged callers that exposed information about file presence and mimetype of files that the user would be unable to determine on its own.