Canonical

Ubuntu Linux

4106 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 2.92%
  • Veröffentlicht 28.02.2019 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:45:08

By rewriting the Host: request headers using the webRequest API, a WebExtension can bypass domain restrictions through domain fronting. This would allow access to domains that share a host that are otherwise restricted. This vulnerability affects Fir...

  • EPSS 1.14%
  • Veröffentlicht 28.02.2019 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:45:08

A vulnerability where a WebExtension can run content scripts in disallowed contexts following navigation or other events. This allows for potential privilege escalation by the WebExtension on sites where content scripts should not be run. This vulner...

  • EPSS 0.07%
  • Veröffentlicht 28.02.2019 18:29:00
  • Zuletzt bearbeitet 25.11.2025 17:50:16

A WebExtension can request access to local files without the warning prompt stating that the extension will "Access your data for all websites" being displayed to the user. This allows extensions to run content scripts in local pages without permissi...

  • EPSS 0.34%
  • Veröffentlicht 28.02.2019 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:45:08

By using the reflected URL in some special resource URIs, such as chrome:, it is possible to inject stylesheets and bypass Content Security Policy (CSP). This vulnerability affects Firefox < 63.

Exploit
  • EPSS 0.47%
  • Veröffentlicht 28.02.2019 17:29:00
  • Zuletzt bearbeitet 21.11.2024 04:37:51

In binder_alloc_free_page of binder_alloc.c, there is a possible double free due to improper locking. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for ex...

Exploit
  • EPSS 0.52%
  • Veröffentlicht 28.02.2019 04:29:00
  • Zuletzt bearbeitet 21.11.2024 04:51:12

In Wireshark 2.4.0 to 2.4.12 and 2.6.0 to 2.6.6, the ASN.1 BER and related dissectors could crash. This was addressed in epan/dissectors/packet-ber.c by preventing a buffer overflow associated with excessive digits in time values.

  • EPSS 4.96%
  • Veröffentlicht 27.02.2019 23:29:00
  • Zuletzt bearbeitet 21.11.2024 04:36:48

If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid...

Exploit
  • EPSS 0.43%
  • Veröffentlicht 27.02.2019 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:51:12

In AdvanceCOMP 2.1, png_compress in pngex.cc in advpng has an integer overflow upon encountering an invalid PNG size, which results in an attempted memcpy to write into a buffer that is too small. (There is also a heap-based buffer over-read.)

Exploit
  • EPSS 5.3%
  • Veröffentlicht 26.02.2019 23:29:00
  • Zuletzt bearbeitet 21.11.2024 04:51:11

A heap-based buffer underwrite exists in ImageStream::getLine() located at Stream.cc in Poppler 0.74.0 that can (for example) be triggered by sending a crafted PDF file to the pdfimages binary. It allows an attacker to cause Denial of Service (Segmen...

Exploit
  • EPSS 13.73%
  • Veröffentlicht 26.02.2019 02:29:00
  • Zuletzt bearbeitet 21.11.2024 04:51:07

In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match.