Canonical

Ubuntu Linux

4106 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.29%
  • Veröffentlicht 31.10.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:53:25

Curl versions 7.33.0 through 7.61.1 are vulnerable to a buffer overrun in the SASL authentication code that may lead to denial of service.

  • EPSS 0.28%
  • Veröffentlicht 31.10.2018 18:29:00
  • Zuletzt bearbeitet 17.04.2025 13:05:04

A heap use-after-free flaw was found in curl versions from 7.59.0 through 7.61.1 in the code related to closing an easy handle. When closing and cleaning up an 'easy' handle in the `Curl_close()` function, the library code first frees a struct (witho...

Exploit
  • EPSS 0.45%
  • Veröffentlicht 31.10.2018 16:29:00
  • Zuletzt bearbeitet 21.11.2024 03:56:47

An issue was discovered in JasPer 2.0.14. There is a NULL pointer dereference in the function ras_putdatastd in ras/ras_enc.c.

Exploit
  • EPSS 0.42%
  • Veröffentlicht 30.10.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:55:38

Since Linux kernel version 3.2, the mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain f...

  • EPSS 6.05%
  • Veröffentlicht 30.10.2018 12:29:00
  • Zuletzt bearbeitet 21.11.2024 03:38:50

The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1....

  • EPSS 7.04%
  • Veröffentlicht 29.10.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:38:50

The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in Ope...

Exploit
  • EPSS 0.63%
  • Veröffentlicht 29.10.2018 12:29:09
  • Zuletzt bearbeitet 21.11.2024 03:56:31

An issue was discovered in GNU gettext 0.19.8. There is a double free in default_add_message in read-catalog.c, related to an invalid free in po_gram_parse in po-gram-gen.y, as demonstrated by lt-msgfmt.

  • EPSS 0.04%
  • Veröffentlicht 29.10.2018 12:29:05
  • Zuletzt bearbeitet 21.11.2024 03:56:25

An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds c...

Exploit
  • EPSS 0.06%
  • Veröffentlicht 26.10.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:56:22

In the Linux kernel before 4.17, a local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_...

Exploit
  • EPSS 0.08%
  • Veröffentlicht 26.10.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 04:10:54

The Linux kernel, as used in Ubuntu 18.04 LTS and Ubuntu 18.10, allows local users to obtain names of files in which they would not normally be able to access via an overlayfs mount inside of a user namespace.