Canonical

Ubuntu Linux

4106 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 19.10.2015 10:59:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was ...

  • EPSS 0.09%
  • Veröffentlicht 19.10.2015 10:59:05
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write reque...

Exploit
  • EPSS 0.33%
  • Veröffentlicht 09.10.2015 14:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Simple Streams (simplestreams) does not properly verify the GPG signatures of disk image files, which allows remote mirror servers to spoof disk images and have unspecified other impact via a 403 (aka Forbidden) response.

  • EPSS 7.68%
  • Veröffentlicht 01.10.2015 20:59:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Use-after-free vulnerability in xprt_set_caller in rpcb_svc_com.c in rpcbind 0.2.1 and earlier allows remote attackers to cause a denial of service (daemon crash) via crafted packets, involving a PMAP_CALLIT code.

Exploit
  • EPSS 0.38%
  • Veröffentlicht 01.10.2015 20:59:02
  • Zuletzt bearbeitet 12.04.2025 10:46:40

kernel_crashdump in Apport before 2.19 allows local users to cause a denial of service (disk consumption) or possibly gain privileges via a (1) symlink or (2) hard link attack on /var/crash/vmcore.log.

  • EPSS 0.11%
  • Veröffentlicht 01.10.2015 20:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

lxc-start in lxc before 1.0.8 and 1.1.x before 1.1.4 allows local container administrators to escape AppArmor confinement via a symlink attack on a (1) mount target or (2) bind mount source.

  • EPSS 7.3%
  • Veröffentlicht 28.09.2015 20:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Buffer overflow in the gethostbyname_r and other unspecified NSS functions in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS respo...

  • EPSS 0.06%
  • Veröffentlicht 17.09.2015 16:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The Unity Settings Daemon before 14.04.0+14.04.20150825-0ubuntu2 and 15.04.x before 15.04.1+15.04.20150408-0ubuntu1.2 does not properly detect if the screen is locked, which allows physically proximate attackers to mount removable media while the scr...

  • EPSS 2.36%
  • Veröffentlicht 14.09.2015 20:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The parse_encoding function in type1/t1load.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (infinite loop) via a "broken number-with-base" in a Postscript stream, as demonstrated by 8#garbage.

  • EPSS 0.09%
  • Veröffentlicht 08.09.2015 15:59:06
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The trace functionality in libvdpau before 1.1.1, when used in a setuid or setgid application, allows local users to write to arbitrary files via unspecified vectors.