Canonical

Ubuntu Linux

4108 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 2.96%
  • Veröffentlicht 28.09.2014 10:55:10
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Buffer overflow in net/ceph/auth_x.c in Ceph, as used in the Linux kernel before 3.16.3, allows remote attackers to cause a denial of service (memory corruption and panic) or possibly have unspecified other impact via a long unencrypted auth ticket.

Exploit
  • EPSS 4.48%
  • Veröffentlicht 28.09.2014 10:55:10
  • Zuletzt bearbeitet 06.05.2026 22:30:45

net/ceph/auth_x.c in Ceph, as used in the Linux kernel before 3.16.3, does not properly validate auth replies, which allows remote attackers to cause a denial of service (system crash) or possibly have unspecified other impact via crafted data from t...

  • EPSS 1.21%
  • Veröffentlicht 28.09.2014 10:55:10
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The SMB2_tcon function in fs/cifs/smb2pdu.c in the Linux kernel before 3.16.3 allows remote CIFS servers to cause a denial of service (NULL pointer dereference and client system crash) or possibly have unspecified other impact by deleting the IPC$ sh...

Warnung Exploit
  • EPSS 89.06%
  • Veröffentlicht 25.09.2014 01:55:04
  • Zuletzt bearbeitet 22.04.2026 14:32:42

GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted enviro...

Warnung Exploit
  • EPSS 94.22%
  • Veröffentlicht 24.09.2014 18:48:04
  • Zuletzt bearbeitet 22.04.2026 16:07:22

GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceComman...

Exploit
  • EPSS 9.82%
  • Veröffentlicht 08.09.2014 14:55:02
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Heap-based buffer overflow in formisc.c in formail in procmail 3.22 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted email header, related to "unbalanced quotes."

Exploit
  • EPSS 10.63%
  • Veröffentlicht 04.09.2014 17:55:07
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Buffer overflow in the vararg functions in ldo.c in Lua 5.1 through 5.2.x before 5.2.3 allows context-dependent attackers to cause a denial of service (crash) via a small number of arguments to a function with a large number of fixed arguments.

Exploit
  • EPSS 0.29%
  • Veröffentlicht 01.09.2014 01:55:18
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel through 3.16.1 miscalculates the number of pages during the handling of a mapping failure, which allows guest OS users to (1) cause a denial of service (host OS memory corruptio...

  • EPSS 0.31%
  • Veröffentlicht 25.08.2014 14:55:07
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The MySQL token driver in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 stores timestamps with the incorrect precision, which causes the expiration comparison for tokens to fail and allows remote authenticated users ...

  • EPSS 0.29%
  • Veröffentlicht 25.08.2014 14:55:07
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The V3 API in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 updates the issued_at value for UUID v2 tokens, which allows remote authenticated users to bypass the token expiration and retain access via a verification ...