Canonical

Ubuntu Linux

4107 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.13%
  • Veröffentlicht 31.10.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 03:53:25

Curl versions 7.14.1 through 7.61.1 are vulnerable to a heap-based buffer over-read in the tool_msgs.c:voutf() function that may result in information exposure and denial of service.

  • EPSS 0.29%
  • Veröffentlicht 31.10.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:53:25

Curl versions 7.33.0 through 7.61.1 are vulnerable to a buffer overrun in the SASL authentication code that may lead to denial of service.

  • EPSS 0.23%
  • Veröffentlicht 31.10.2018 18:29:00
  • Zuletzt bearbeitet 17.04.2025 13:05:04

A heap use-after-free flaw was found in curl versions from 7.59.0 through 7.61.1 in the code related to closing an easy handle. When closing and cleaning up an 'easy' handle in the `Curl_close()` function, the library code first frees a struct (witho...

Exploit
  • EPSS 0.45%
  • Veröffentlicht 31.10.2018 16:29:00
  • Zuletzt bearbeitet 21.11.2024 03:56:47

An issue was discovered in JasPer 2.0.14. There is a NULL pointer dereference in the function ras_putdatastd in ras/ras_enc.c.

Exploit
  • EPSS 0.42%
  • Veröffentlicht 30.10.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:55:38

Since Linux kernel version 3.2, the mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain f...

  • EPSS 6.05%
  • Veröffentlicht 30.10.2018 12:29:00
  • Zuletzt bearbeitet 21.11.2024 03:38:50

The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1....

  • EPSS 7.04%
  • Veröffentlicht 29.10.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:38:50

The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in Ope...

Exploit
  • EPSS 0.6%
  • Veröffentlicht 29.10.2018 12:29:09
  • Zuletzt bearbeitet 21.11.2024 03:56:31

An issue was discovered in GNU gettext 0.19.8. There is a double free in default_add_message in read-catalog.c, related to an invalid free in po_gram_parse in po-gram-gen.y, as demonstrated by lt-msgfmt.

  • EPSS 0.03%
  • Veröffentlicht 29.10.2018 12:29:05
  • Zuletzt bearbeitet 21.11.2024 03:56:25

An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds c...

Exploit
  • EPSS 0.06%
  • Veröffentlicht 26.10.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:56:22

In the Linux kernel before 4.17, a local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_...