Canonical

Ubuntu Linux

4107 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 4.83%
  • Veröffentlicht 04.11.2014 16:55:06
  • Zuletzt bearbeitet 12.04.2025 10:46:40

parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing...

Exploit
  • EPSS 10.78%
  • Veröffentlicht 03.11.2014 16:55:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The REXML parser in Ruby 1.9.x before 1.9.3-p550, 2.0.x before 2.0.0-p594, and 2.1.x before 2.1.4 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document, aka an XML Entity Expansion (XEE) attack.

  • EPSS 0.09%
  • Veröffentlicht 01.11.2014 23:55:09
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The VGA emulator in QEMU allows local guest users to read host memory by setting the display to a high resolution.

  • EPSS 1.27%
  • Veröffentlicht 29.10.2014 10:55:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The (1) bundled GnuTLS SSL/TLS plugin and the (2) bundled OpenSSL SSL/TLS plugin in libpurple in Pidgin before 2.10.10 do not properly consider the Basic Constraints extension during verification of X.509 certificates from SSL servers, which allows m...

Exploit
  • EPSS 11.44%
  • Veröffentlicht 25.10.2014 22:55:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The slapper function in chkrootkit before 0.50 does not properly quote file paths, which allows local users to execute arbitrary code via a Trojan horse executable. NOTE: this is only a vulnerability when /tmp is not mounted with the noexec option.

  • EPSS 2.81%
  • Veröffentlicht 20.10.2014 17:55:05
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors rela...

  • EPSS 4.67%
  • Veröffentlicht 16.10.2014 00:55:05
  • Zuletzt bearbeitet 12.04.2025 10:46:40

wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame.

  • EPSS 0.5%
  • Veröffentlicht 15.10.2014 14:55:05
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Requests (aka python-requests) before 2.3.0 allows remote servers to obtain a netrc password by reading the Authorization header in a redirected request.

  • EPSS 0.07%
  • Veröffentlicht 13.10.2014 10:55:09
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The do_umount function in fs/namespace.c in the Linux kernel through 3.17 does not require the CAP_SYS_ADMIN capability for do_remount_sb calls that change the root filesystem to read-only, which allows local users to cause a denial of service (loss ...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 13.10.2014 10:55:08
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The pivot_root implementation in fs/namespace.c in the Linux kernel through 3.17 does not properly interact with certain locations of a chroot directory, which allows local users to cause a denial of service (mount-tree loop) via . (dot) values in bo...