Canonical

Ubuntu Linux

4106 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Warnung Medienbericht Exploit
  • EPSS 61.46%
  • Veröffentlicht 14.12.2010 16:00:04
  • Zuletzt bearbeitet 22.10.2025 01:15:39

Heap-based buffer overflow in the string_vformat function in string.c in Exim before 4.70 allows remote attackers to execute arbitrary code via an SMTP session that includes two MAIL commands in conjunction with a large message containing crafted hea...

Warnung Medienbericht
  • EPSS 4.02%
  • Veröffentlicht 14.12.2010 16:00:04
  • Zuletzt bearbeitet 22.10.2025 01:15:39

Exim 4.72 and earlier allows local users to gain privileges by leveraging the ability of the exim user account to specify an alternate configuration file with a directive that contains arbitrary commands, as demonstrated by the spool_directory direct...

  • EPSS 0.05%
  • Veröffentlicht 10.12.2010 19:00:04
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The ethtool_get_rxnfc function in net/core/ethtool.c in the Linux kernel before 2.6.36 does not initialize a certain block of heap memory, which allows local users to obtain potentially sensitive information via an ETHTOOL_GRXCLSRLALL ethtool command...

  • EPSS 3.85%
  • Veröffentlicht 06.12.2010 21:05:48
  • Zuletzt bearbeitet 11.04.2025 00:51:21

OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the downgrade to an uninte...

Warnung Exploit
  • EPSS 1.44%
  • Veröffentlicht 06.12.2010 20:13:00
  • Zuletzt bearbeitet 22.10.2025 01:15:38

The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel before 2.6.36 does not properly validate addresses obtained from user space, which allows local users to gain privile...

Exploit
  • EPSS 0.14%
  • Veröffentlicht 30.11.2010 21:38:23
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The setup_arg_pages function in fs/exec.c in the Linux kernel before 2.6.36, when CONFIG_STACK_GROWSDOWN is used, does not properly restrict the stack memory consumption of the (1) arguments and (2) environment for a 32-bit application on a 64-bit pl...

  • EPSS 0.1%
  • Veröffentlicht 29.11.2010 16:00:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The copy_shmid_to_user function in ipc/shm.c in the Linux kernel before 2.6.37-rc1 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the shmct...

  • EPSS 1.22%
  • Veröffentlicht 26.11.2010 20:00:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The sctp_auth_asoc_get_hmac function in net/sctp/auth.c in the Linux kernel before 2.6.36 does not properly validate the hmac_ids array of an SCTP peer, which allows remote attackers to cause a denial of service (memory corruption and panic) via a cr...

  • EPSS 0.12%
  • Veröffentlicht 26.11.2010 19:00:06
  • Zuletzt bearbeitet 11.04.2025 00:51:21

drivers/gpu/drm/i915/i915_gem.c in the Graphics Execution Manager (GEM) in the Intel i915 driver in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 2.6.36 does not properly validate pointers to blocks of memory, which allows l...

Exploit
  • EPSS 0.11%
  • Veröffentlicht 26.11.2010 19:00:06
  • Zuletzt bearbeitet 11.04.2025 00:51:21

drivers/media/video/v4l2-compat-ioctl32.c in the Video4Linux (V4L) implementation in the Linux kernel before 2.6.36 on 64-bit platforms does not validate the destination of a memory copy operation, which allows local users to write to arbitrary kerne...