Canonical

Ubuntu Linux

4106 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 4.22%
  • Veröffentlicht 21.08.2020 21:15:12
  • Zuletzt bearbeitet 21.11.2024 05:39:08

In BIND 9.14.0 -> 9.16.5, 9.17.0 -> 9.17.3, If a server is configured with both QNAME minimization and 'forward first' then an attacker who can send queries to it may be able to trigger the condition that will cause the server to crash. Servers that ...

  • EPSS 0.6%
  • Veröffentlicht 21.08.2020 21:15:12
  • Zuletzt bearbeitet 21.11.2024 05:39:08

In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed re...

  • EPSS 5.63%
  • Veröffentlicht 21.08.2020 21:15:12
  • Zuletzt bearbeitet 21.11.2024 05:39:08

In BIND 9.10.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.10.5-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker that can reach a vulnerable system with a specially crafted query packet can trigger a crash. To ...

  • EPSS 1.95%
  • Veröffentlicht 21.08.2020 21:15:12
  • Zuletzt bearbeitet 21.11.2024 05:39:08

In BIND 9.9.12 -> 9.9.13, 9.10.7 -> 9.10.8, 9.11.3 -> 9.11.21, 9.12.1 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.12-S1 -> 9.9.13-S1, 9.11.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker who has been granted privileges to ch...

  • EPSS 0.51%
  • Veröffentlicht 20.08.2020 01:17:13
  • Zuletzt bearbeitet 21.11.2024 05:06:19

Net-SNMP through 5.7.3 allows Escalation of Privileges because of UNIX symbolic link (symlink) following.

  • EPSS 0.06%
  • Veröffentlicht 20.08.2020 01:17:13
  • Zuletzt bearbeitet 21.11.2024 05:06:19

Net-SNMP through 5.8 has Improper Privilege Management because SNMP WRITE access to the EXTEND MIB provides the ability to run arbitrary commands as root.

Exploit
  • EPSS 0.93%
  • Veröffentlicht 19.08.2020 15:15:12
  • Zuletzt bearbeitet 21.11.2024 05:03:05

A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.

  • EPSS 0.02%
  • Veröffentlicht 19.08.2020 13:15:10
  • Zuletzt bearbeitet 21.11.2024 05:14:44

In the Linux kernel before 5.7.8, fs/nfsd/vfs.c (in the NFS server) can set incorrect permissions on new filesystem objects when the filesystem lacks ACL support, aka CID-22cf8419f131. This occurs because the current umask is not considered.

Warnung Exploit
  • EPSS 94.43%
  • Veröffentlicht 17.08.2020 19:15:15
  • Zuletzt bearbeitet 07.03.2025 14:57:32

An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability...

Exploit
  • EPSS 0.47%
  • Veröffentlicht 13.08.2020 03:15:14
  • Zuletzt bearbeitet 14.03.2025 18:27:22

A buffer overflow vulnerability in image_render_color_thresh() in base/gxicolor.c of Artifex Software GhostScript v9.18 to v9.50 allows a remote attacker to escalate privileges via a crafted eps file. This is fixed in v9.51.