Canonical

Ubuntu Linux

4106 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.82%
  • Veröffentlicht 11.02.2020 13:15:11
  • Zuletzt bearbeitet 21.11.2024 03:49:18

gdImageClone in gd.c in libgd 2.1.0-rc2 through 2.2.5 has a NULL pointer dereference allowing attackers to crash an application via a specific function call sequence. Only affects PHP when linked with an external libgd (not bundled).

  • EPSS 2.09%
  • Veröffentlicht 11.02.2020 12:15:21
  • Zuletzt bearbeitet 21.11.2024 05:34:13

HtmlUnit prior to 2.37.0 contains code execution vulnerabilities. HtmlUnit initializes Rhino engine improperly, hence a malicious JavScript code can execute arbitrary Java code on the application. Moreover, when embedded in Android application, Andro...

  • EPSS 0.09%
  • Veröffentlicht 08.02.2020 05:15:13
  • Zuletzt bearbeitet 21.11.2024 04:21:10

Sander Bos discovered a time of check to time of use (TOCTTOU) vulnerability in apport that allowed a user to cause core files to be written in arbitrary directories.

  • EPSS 0.07%
  • Veröffentlicht 08.02.2020 05:15:13
  • Zuletzt bearbeitet 03.11.2025 20:15:42

Sander Bos discovered Apport mishandled crash dumps originating from containers. This could be used by a local attacker to generate a crash report for a privileged process that is readable by an unprivileged user.

  • EPSS 0.1%
  • Veröffentlicht 08.02.2020 05:15:13
  • Zuletzt bearbeitet 21.11.2024 04:21:10

Kevin Backhouse discovered an integer overflow in bson_ensure_space, as used in whoopsie.

  • EPSS 0.09%
  • Veröffentlicht 08.02.2020 05:15:13
  • Zuletzt bearbeitet 21.11.2024 04:21:10

Sander Bos discovered Apport's lock file was in a world-writable directory which allowed all users to prevent crash handling.

  • EPSS 0.13%
  • Veröffentlicht 08.02.2020 05:15:12
  • Zuletzt bearbeitet 21.11.2024 04:21:10

Kevin Backhouse discovered that apport would read a user-supplied configuration file with elevated privileges. By replacing the file with a symbolic link, a user could get apport to read any file on the system as root, with unknown consequences.

  • EPSS 0.33%
  • Veröffentlicht 07.02.2020 21:15:10
  • Zuletzt bearbeitet 21.11.2024 05:11:11

A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making multiple disconnect attempts resulting in a permanent leak of a socket connection by radosgw. This flaw c...

  • EPSS 1.14%
  • Veröffentlicht 06.02.2020 15:15:10
  • Zuletzt bearbeitet 21.11.2024 02:05:21

Buffer overflow in the DecodePSDPixels function in coders/psd.c in ImageMagick before 6.8.8-5 might allow remote attackers to execute arbitrary code via a crafted PSD image, involving the L%06ld string, a different vulnerability than CVE-2014-2030.

  • EPSS 18.79%
  • Veröffentlicht 06.02.2020 15:15:10
  • Zuletzt bearbeitet 21.11.2024 02:05:29

Stack-based buffer overflow in the WritePSDImage function in coders/psd.c in ImageMagick, possibly 6.8.8-5, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PSD image, involving the L%06ld...