Canonical

Ubuntu Linux

4108 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.19%
  • Veröffentlicht 13.04.2016 15:59:06
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption)...

  • EPSS 31.25%
  • Veröffentlicht 13.04.2016 15:59:01
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The (1) git-remote-ext and (2) unspecified other remote helper programs in Git before 2.3.10, 2.4.x before 2.4.10, 2.5.x before 2.5.4, and 2.6.x before 2.6.1 do not properly restrict the allowed protocols, which might allow remote attackers to execut...

  • EPSS 9.33%
  • Veröffentlicht 13.04.2016 14:59:09
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Memory leak in the jas_iccprof_createfrombuf function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (memory consumption) via a crafted ICC color profile in a JPEG 2000 image file.

  • EPSS 9.81%
  • Veröffentlicht 13.04.2016 14:59:08
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Double free vulnerability in the jas_iccattrval_destroy function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted ICC color profile in a JPEG 2000 image file, ...

  • EPSS 10.74%
  • Veröffentlicht 13.04.2016 14:59:01
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Integer overflow in the create_bits function in pixman-bits-image.c in Pixman before 0.32.6 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via large height and stride values.

  • EPSS 78.52%
  • Veröffentlicht 12.04.2016 23:59:37
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The MS-SAMR and MS-LSAD protocol implementations in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 mishandle DCERPC connections, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersona...

  • EPSS 0.36%
  • Veröffentlicht 12.04.2016 16:59:02
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The __switch_to function in arch/x86/kernel/process_64.c in the Linux kernel does not properly context-switch IOPL on 64-bit PV Xen guests, which allows local guest OS users to gain privileges, cause a denial of service (guest OS crash), or obtain se...

  • EPSS 0.06%
  • Veröffentlicht 12.04.2016 02:00:07
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The net_checksum_calculate function in net/checksum.c in QEMU allows local guest OS users to cause a denial of service (out-of-bounds heap read and crash) via the payload length in a crafted packet.

  • EPSS 27.44%
  • Veröffentlicht 08.04.2016 15:59:05
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp.

Exploit
  • EPSS 39.22%
  • Veröffentlicht 07.04.2016 20:59:05
  • Zuletzt bearbeitet 06.05.2026 22:30:45

BeanShell (bsh) before 2.0b6, when included on the classpath by an application that uses Java serialization or XStream, allows remote attackers to execute arbitrary code via crafted serialized data, related to XThis.Handler.