Canonical

Ubuntu Linux

4106 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.12%
  • Veröffentlicht 22.04.2020 22:15:12
  • Zuletzt bearbeitet 21.11.2024 05:39:31

Apport creates a world writable lock file with root ownership in the world writable /var/lock/apport directory. If the apport/ directory does not exist (this is not uncommon as /var/lock is a tmpfs), it will create the directory, otherwise it will si...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 22.04.2020 22:15:12
  • Zuletzt bearbeitet 21.11.2024 05:39:31

Time-of-check Time-of-use Race Condition vulnerability on crash report ownership change in Apport allows for a possible privilege escalation opportunity. If fs.protected_symlinks is disabled, this can be exploited between the os.open and os.chown cal...

Exploit
  • EPSS 0.2%
  • Veröffentlicht 22.04.2020 20:15:11
  • Zuletzt bearbeitet 21.11.2024 05:11:47

A use after free vulnerability in ip_reass() in ip_input.c of libslirp 4.2.0 and prior releases allows crafted packets to cause a denial of service.

  • EPSS 5.73%
  • Veröffentlicht 22.04.2020 17:15:12
  • Zuletzt bearbeitet 21.11.2024 04:59:12

CServer::SendMsg in engine/server/server.cpp in Teeworlds 0.7.x before 0.7.5 allows remote attackers to shut down the server.

  • EPSS 0.28%
  • Veröffentlicht 22.04.2020 13:15:11
  • Zuletzt bearbeitet 21.11.2024 04:59:11

An issue was discovered in Ceph through 13.2.9. A POST request with an invalid tagging XML can crash the RGW process by triggering a NULL pointer exception.

  • EPSS 2.22%
  • Veröffentlicht 21.04.2020 19:15:13
  • Zuletzt bearbeitet 21.11.2024 04:56:34

Affected versions of Git have a vulnerability whereby Git can be tricked into sending private credentials to a host controlled by an attacker. This bug is similar to CVE-2020-5260(GHSA-qm7j-c969-7j4q). The fix for that bug still left the door open fo...

  • EPSS 0.46%
  • Veröffentlicht 21.04.2020 01:15:11
  • Zuletzt bearbeitet 21.11.2024 04:58:59

re2c 1.3 has a heap-based buffer overflow in Scanner::fill in parse/scanner.cc via a long lexeme.

  • EPSS 0.24%
  • Veröffentlicht 17.04.2020 19:15:14
  • Zuletzt bearbeitet 21.11.2024 05:11:18

An out-of-bounds write vulnerability was found in glibc before 2.31 when handling signal trampolines on PowerPC. Specifically, the backtrace function did not properly check the array bounds when storing the frame address, resulting in a denial of ser...

  • EPSS 0.06%
  • Veröffentlicht 17.04.2020 19:15:13
  • Zuletzt bearbeitet 21.11.2024 04:52:50

In f2fs_xattr_generic_list of xattr.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not required for exploitation.Pr...

  • EPSS 0.6%
  • Veröffentlicht 17.04.2020 13:15:12
  • Zuletzt bearbeitet 21.11.2024 04:58:38

A use-after-free issue exists in WebKitGTK before 2.28.1 and WPE WebKit before 2.28.1 via crafted web content that allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash).