Canonical

Ubuntu Linux

4108 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 8.08%
  • Veröffentlicht 05.11.2014 11:55:06
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The donote function in readelf.c in file through 5.20, as used in the Fileinfo component in PHP 5.4.34, does not ensure that sufficient note headers are present, which allows remote attackers to cause a denial of service (out-of-bounds read and appli...

  • EPSS 3.89%
  • Veröffentlicht 04.11.2014 16:55:06
  • Zuletzt bearbeitet 06.05.2026 22:30:45

parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing...

Exploit
  • EPSS 13.81%
  • Veröffentlicht 03.11.2014 16:55:07
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The REXML parser in Ruby 1.9.x before 1.9.3-p550, 2.0.x before 2.0.0-p594, and 2.1.x before 2.1.4 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document, aka an XML Entity Expansion (XEE) attack.

  • EPSS 0.09%
  • Veröffentlicht 01.11.2014 23:55:09
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The VGA emulator in QEMU allows local guest users to read host memory by setting the display to a high resolution.

  • EPSS 1.45%
  • Veröffentlicht 29.10.2014 10:55:04
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The (1) bundled GnuTLS SSL/TLS plugin and the (2) bundled OpenSSL SSL/TLS plugin in libpurple in Pidgin before 2.10.10 do not properly consider the Basic Constraints extension during verification of X.509 certificates from SSL servers, which allows m...

Exploit
  • EPSS 11.44%
  • Veröffentlicht 25.10.2014 22:55:04
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The slapper function in chkrootkit before 0.50 does not properly quote file paths, which allows local users to execute arbitrary code via a Trojan horse executable. NOTE: this is only a vulnerability when /tmp is not mounted with the noexec option.

  • EPSS 3.19%
  • Veröffentlicht 20.10.2014 17:55:05
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors rela...

  • EPSS 4.51%
  • Veröffentlicht 16.10.2014 00:55:05
  • Zuletzt bearbeitet 06.05.2026 22:30:45

wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame.

  • EPSS 0.5%
  • Veröffentlicht 15.10.2014 14:55:05
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Requests (aka python-requests) before 2.3.0 allows remote servers to obtain a netrc password by reading the Authorization header in a redirected request.

  • EPSS 0.07%
  • Veröffentlicht 13.10.2014 10:55:09
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The do_umount function in fs/namespace.c in the Linux kernel through 3.17 does not require the CAP_SYS_ADMIN capability for do_remount_sb calls that change the root filesystem to read-only, which allows local users to cause a denial of service (loss ...