Canonical

Ubuntu Linux

4106 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.02%
  • Published 21.02.2022 22:15:07
  • Last modified 21.11.2024 06:36:55

There is a flaw in polkit which can allow an unprivileged user to cause polkit to crash, due to process file descriptor exhaustion. The highest threat from this vulnerability is to availability. NOTE: Polkit process outage duration is tied to the fai...

  • EPSS 28.45%
  • Published 21.02.2022 15:15:07
  • Last modified 23.04.2025 19:15:51

The Samba vfs_fruit module uses extended file attributes (EA, xattr) to provide "...enhanced compatibility with Apple SMB clients and interoperability with a Netatalk 3 AFP fileserver." Samba versions prior to 4.13.17, 4.14.12 and 4.15.5 with vfs_fru...

Exploit
  • EPSS 0.09%
  • Published 18.02.2022 18:15:10
  • Last modified 21.11.2024 06:36:53

A flaw was found in the KVM's AMD code for supporting the Secure Encrypted Virtualization-Encrypted State (SEV-ES). A KVM guest using SEV-ES can trigger out-of-bounds reads and writes in the host kernel via a malicious VMGEXIT for a string I/O instru...

  • EPSS 0.79%
  • Published 18.02.2022 18:15:08
  • Last modified 21.11.2024 02:47:52

A flaw was found in the way samba implemented SMB1 authentication. An attacker could use this flaw to retrieve the plaintext password sent over the wire even if Kerberos authentication was required.

  • EPSS 0.2%
  • Published 18.02.2022 18:15:08
  • Last modified 21.11.2024 05:18:33

A flaw was found in the way Samba maps domain users to local users. An authenticated attacker could use this flaw to cause possible privilege escalation.

  • EPSS 0.28%
  • Published 18.02.2022 18:15:08
  • Last modified 21.11.2024 05:18:34

A flaw was found in the way Samba, as an Active Directory Domain Controller, implemented Kerberos name-based authentication. The Samba AD DC, could become confused about the user a ticket represents if it did not strictly require a Kerberos PAC and a...

  • EPSS 0.38%
  • Published 18.02.2022 18:15:08
  • Last modified 21.11.2024 05:18:34

Multiple flaws were found in the way samba AD DC implemented access and conformance checking of stored data. An attacker could use this flaw to cause total domain compromise.

  • EPSS 0.03%
  • Published 17.02.2022 23:15:07
  • Last modified 21.11.2024 06:21:00

snapd 2.54.2 and earlier created ~/snap directories in user home directories without specifying owner-only permissions. This could allow a local attacker to read information that should have been private. Fixed in snapd versions 2.54.3+18.04, 2.54.3+...

  • EPSS 0.14%
  • Published 17.02.2022 23:15:07
  • Last modified 21.11.2024 06:31:28

snapd 2.54.2 did not properly validate the location of the snap-confine binary. A local attacker who can hardlink this binary to another location to cause snap-confine to execute other arbitrary binaries and hence gain privilege escalation. Fixed in ...

Exploit
  • EPSS 2.26%
  • Published 17.02.2022 23:15:07
  • Last modified 21.11.2024 06:31:28

A race condition existed in the snapd 2.54.2 snap-confine binary when preparing a private mount namespace for a snap. This could allow a local attacker to gain root privileges by bind-mounting their own contents inside the snap's private mount namesp...