Canonical

Ubuntu Linux

4106 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 26.29%
  • Veröffentlicht 08.03.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 04:11:44

Buffer overflow in the decodearr function in ntpq in ntp 4.2.8p6 through 4.2.8p10 allows remote attackers to execute arbitrary code by leveraging an ntpq query and sending a response with a crafted array.

Exploit
  • EPSS 0.01%
  • Veröffentlicht 08.03.2018 07:29:01
  • Zuletzt bearbeitet 21.11.2024 04:12:40

An issue was discovered in the fd_locked_ioctl function in drivers/block/floppy.c in the Linux kernel through 4.15.7. The floppy driver will copy a kernel pointer to user memory in response to the FDGETPRM ioctl. An attacker can send the FDGETPRM ioc...

  • EPSS 0.18%
  • Veröffentlicht 07.03.2018 23:29:00
  • Zuletzt bearbeitet 21.11.2024 04:12:39

GPAC through 0.7.1 has a Buffer Overflow in the gf_media_avc_read_sps function in media_tools/av_parsers.c, a different vulnerability than CVE-2018-1000100.

Exploit
  • EPSS 0.09%
  • Veröffentlicht 07.03.2018 08:29:00
  • Zuletzt bearbeitet 21.11.2024 04:12:38

The resv_map_release function in mm/hugetlb.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (BUG) via a crafted application that makes mmap system calls and has a large pgoff argument to the remap_file_pages syste...

Exploit
  • EPSS 14.26%
  • Veröffentlicht 06.03.2018 20:29:01
  • Zuletzt bearbeitet 21.11.2024 04:11:44

The ctl_getitem method in ntpd in ntp-4.2.8p6 before 4.2.8p11 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted mode 6 packet with a ntpd instance from 4.2.8p6 through 4.2.8p10.

  • EPSS 13.13%
  • Veröffentlicht 06.03.2018 20:29:01
  • Zuletzt bearbeitet 14.01.2025 19:29:55

ntpd in ntp 4.2.8p4 before 4.2.8p11 drops bad packets before updating the "received" timestamp, which allows remote attackers to cause a denial of service (disruption) by sending a packet with a zero-origin timestamp causing the association to reset ...

  • EPSS 2.92%
  • Veröffentlicht 06.03.2018 20:29:01
  • Zuletzt bearbeitet 14.01.2025 19:29:55

The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the "other side" of an interleaved association ...

Exploit
  • EPSS 0.5%
  • Veröffentlicht 06.03.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:12:37

An issue was discovered in Exempi through 2.4.4. XMPFiles/source/FileHandlers/TIFF_Handler.cpp mishandles a case of a zero length, leading to a heap-based buffer over-read in the MD5Update() function in third-party/zuid/interfaces/MD5.cpp.

Exploit
  • EPSS 0.34%
  • Veröffentlicht 06.03.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:12:37

An issue was discovered in Exempi through 2.4.4. There is a stack-based buffer over-read in the PostScript_MetaHandler::ParsePSFile() function in XMPFiles/source/FileHandlers/PostScript_Handler.cpp.

Exploit
  • EPSS 0.1%
  • Veröffentlicht 06.03.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:12:37

An issue was discovered in Exempi through 2.4.4. A certain case of a 0xffffffff length is mishandled in XMPFiles/source/FormatSupport/PSIR_FileWriter.cpp, leading to a heap-based buffer over-read in the PSD_MetaHandler::CacheFileData() function.