Canonical

Ubuntu Linux

4106 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 06.08.2020 23:15:11
  • Zuletzt bearbeitet 03.11.2025 20:15:44

TOCTOU Race Condition vulnerability in apport allows a local attacker to escalate privileges and execute arbitrary code. An attacker may exit the crashed process and exploit PID recycling to spawn a root process with the same PID as the crashed proce...

  • EPSS 0.16%
  • Veröffentlicht 05.08.2020 14:15:12
  • Zuletzt bearbeitet 21.11.2024 05:03:03

An integer overflow leading to a heap-buffer overflow was found in The X Input Method (XIM) client was implemented in libX11 before version 1.6.10. As per upstream this is security relevant when setuid programs call XIM client functions while running...

  • EPSS 0.05%
  • Veröffentlicht 05.08.2020 14:15:12
  • Zuletzt bearbeitet 29.08.2025 13:42:30

A flaw was found in the way xserver memory was not properly initialized. This could leak parts of server memory to the X client. In cases where Xorg server runs with elevated privileges, this could result in possible ASLR bypass. Xorg-server before v...

  • EPSS 0.86%
  • Veröffentlicht 03.08.2020 20:15:13
  • Zuletzt bearbeitet 21.11.2024 05:06:47

In kerfuffle/jobs.cpp in KDE Ark before 20.08.0, a crafted archive can install files outside the extraction directory via ../ directory traversal.

  • EPSS 0.05%
  • Veröffentlicht 31.07.2020 22:15:11
  • Zuletzt bearbeitet 21.11.2024 05:02:58

There is an issue on grub2 before version 2.06 at function read_section_as_string(). It expects a font name to be at max UINT32_MAX - 1 length in bytes but it doesn't verify it before proceed with buffer allocation to read the value from the font val...

  • EPSS 0.03%
  • Veröffentlicht 31.07.2020 22:15:11
  • Zuletzt bearbeitet 21.11.2024 05:02:58

There is an issue with grub2 before version 2.06 while handling symlink on ext filesystems. A filesystem containing a symbolic link with an inode size of UINT32_MAX causes an arithmetic overflow leading to a zero-sized memory allocation with subseque...

  • EPSS 1.68%
  • Veröffentlicht 30.07.2020 21:15:11
  • Zuletzt bearbeitet 21.11.2024 05:06:53

The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c...

Exploit
  • EPSS 1.41%
  • Veröffentlicht 29.07.2020 21:15:13
  • Zuletzt bearbeitet 21.11.2024 05:06:49

libssh 0.9.4 has a NULL pointer dereference in tftpserver.c if ssh_buffer_new returns NULL.

  • EPSS 0.03%
  • Veröffentlicht 29.07.2020 18:15:14
  • Zuletzt bearbeitet 21.11.2024 05:06:03

GRUB2 fails to validate kernel signature when booted directly without shim, allowing secure boot to be bypassed. This only affects systems where the kernel signing certificate has been imported directly into the secure boot database and the GRUB imag...

  • EPSS 0.06%
  • Veröffentlicht 29.07.2020 18:15:14
  • Zuletzt bearbeitet 21.11.2024 05:06:03

GRUB2 contains a race condition in grub_script_function_create() leading to a use-after-free vulnerability which can be triggered by redefining a function whilst the same function is already executing, leading to arbitrary code execution and secure b...