Canonical

Ubuntu Linux

4106 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.21%
  • Veröffentlicht 28.09.2014 10:55:10
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The SMB2_tcon function in fs/cifs/smb2pdu.c in the Linux kernel before 3.16.3 allows remote CIFS servers to cause a denial of service (NULL pointer dereference and client system crash) or possibly have unspecified other impact by deleting the IPC$ sh...

Warnung Exploit
  • EPSS 89.61%
  • Veröffentlicht 25.09.2014 01:55:04
  • Zuletzt bearbeitet 22.10.2025 01:16:04

GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted enviro...

Warnung Exploit
  • EPSS 94.22%
  • Veröffentlicht 24.09.2014 18:48:04
  • Zuletzt bearbeitet 22.10.2025 01:15:57

GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceComman...

Exploit
  • EPSS 9.82%
  • Veröffentlicht 08.09.2014 14:55:02
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Heap-based buffer overflow in formisc.c in formail in procmail 3.22 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted email header, related to "unbalanced quotes."

Exploit
  • EPSS 21.59%
  • Veröffentlicht 04.09.2014 17:55:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Buffer overflow in the vararg functions in ldo.c in Lua 5.1 through 5.2.x before 5.2.3 allows context-dependent attackers to cause a denial of service (crash) via a small number of arguments to a function with a large number of fixed arguments.

Exploit
  • EPSS 0.37%
  • Veröffentlicht 01.09.2014 01:55:18
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel through 3.16.1 miscalculates the number of pages during the handling of a mapping failure, which allows guest OS users to (1) cause a denial of service (host OS memory corruptio...

  • EPSS 0.31%
  • Veröffentlicht 25.08.2014 14:55:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The MySQL token driver in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 stores timestamps with the incorrect precision, which causes the expiration comparison for tokens to fail and allows remote authenticated users ...

  • EPSS 0.29%
  • Veröffentlicht 25.08.2014 14:55:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The V3 API in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 updates the issued_at value for UUID v2 tokens, which allows remote authenticated users to bypass the token expiration and retain access via a verification ...

  • EPSS 0.31%
  • Veröffentlicht 25.08.2014 14:55:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 does not properly revoke tokens when a domain is invalidated, which allows remote authenticated users to retain access via a domain-scoped token for that domain.

  • EPSS 0.8%
  • Veröffentlicht 25.08.2014 14:55:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

OpenStack Image Registry and Delivery Service (Glance) before 2013.2.4, 2014.x before 2014.1.3, and Juno before Juno-3, when using the V2 API, does not properly enforce the image_size_cap configuration option, which allows remote authenticated users ...