Canonical

Ubuntu Linux

4106 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 2.34%
  • Veröffentlicht 30.08.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:49:26

A null-pointer dereference vulnerability was found in libtirpc before version 0.3.3-rc3. The return value of makefd_xprt() was not checked in all instances, which could lead to a crash when the server exhausted the maximum number of available file de...

  • EPSS 0.32%
  • Veröffentlicht 30.08.2018 01:29:00
  • Zuletzt bearbeitet 21.11.2024 03:52:08

A buffer underwrite vulnerability in get_line() (read.c) in fig2dev 3.2.7a allows an attacker to write prior to the beginning of the buffer via a crafted .fig file.

  • EPSS 0.09%
  • Veröffentlicht 29.08.2018 03:29:00
  • Zuletzt bearbeitet 21.11.2024 03:52:01

dwarf_getaranges in dwarf_getaranges.c in libdw in elfutils before 2018-08-18 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted file.

  • EPSS 3.85%
  • Veröffentlicht 28.08.2018 19:29:11
  • Zuletzt bearbeitet 21.11.2024 03:14:40

Integer overflow in international date handling in International Components for Unicode (ICU) for C/C++ before 60.1, as used in V8 in Google Chrome prior to 63.0.3239.84 and other products, allowed a remote attacker to perform an out of bounds memory...

  • EPSS 2.7%
  • Veröffentlicht 28.08.2018 04:29:00
  • Zuletzt bearbeitet 21.11.2024 03:51:42

In Artifex Ghostscript 9.23 before 2018-08-24, attackers able to supply crafted PostScript could use uninitialized memory access in the aesdecode operator to crash the interpreter or potentially execute code.

  • EPSS 0.23%
  • Veröffentlicht 27.08.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 03:51:41

In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files.

  • EPSS 2.27%
  • Veröffentlicht 27.08.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 03:51:41

In Artifex Ghostscript 9.23 before 2018-08-24, a type confusion using the .shfill operator could be used by attackers able to supply crafted PostScript files to crash the interpreter or potentially execute code.

  • EPSS 4.83%
  • Veröffentlicht 27.08.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 03:51:42

In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the LockDistillerParams parameter to crash the interpreter or execute code.

  • EPSS 4.37%
  • Veröffentlicht 27.08.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:21

A flaw was found in the Linux kernel present since v4.0-rc1 and through v4.13-rc4. A crafted network packet sent remotely by an attacker may force the kernel to enter an infinite loop in the cipso_v4_optptr() function in net/ipv4/cipso_ipv4.c leading...

  • EPSS 3.63%
  • Veröffentlicht 26.08.2018 16:29:00
  • Zuletzt bearbeitet 21.11.2024 01:28:55

mod_perl 2.0 through 2.0.10 allows attackers to execute arbitrary Perl code by placing it in a user-owned .htaccess file, because (contrary to the documentation) there is no configuration option that permits Perl code for the administrator's control ...