Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Ubuntu_linux
(Canonical)Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2024-01-08 | CVE-2023-1032 | The Linux kernel io_uring IORING_OP_SOCKET operation contained a double free in function __sys_socket_file() in file net/socket.c. This issue was introduced in da214a475f8bd1d3e9e7a19ddfeb4d1617551bab and fixed in 649c15c7691e9b13cbe9bf6c65c365350e056067. | Ubuntu_linux, Linux_kernel | 5.5 | ||
2024-06-04 | CVE-2022-28652 | ~/.config/apport/settings parsing is vulnerable to "billion laughs" attack | Apport, Ubuntu_linux | 5.5 | ||
2024-06-04 | CVE-2022-28654 | is_closing_session() allows users to fill up apport.log | Apport, Ubuntu_linux | 5.5 | ||
2024-06-04 | CVE-2022-28655 | is_closing_session() allows users to create arbitrary tcp dbus connections | Apport, Ubuntu_linux | 7.1 | ||
2024-06-04 | CVE-2022-28656 | is_closing_session() allows users to consume RAM in the Apport process | Apport, Ubuntu_linux | 5.5 | ||
2024-06-04 | CVE-2022-28657 | Apport does not disable python crash handler before entering chroot | Apport, Ubuntu_linux | 7.8 | ||
2024-06-04 | CVE-2022-28658 | Apport argument parsing mishandles filename splitting on older kernels resulting in argument spoofing | Apport, Ubuntu_linux | 5.5 | ||
2024-07-01 | CVE-2024-6387 | A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period. | Linux_2023, Ubuntu_linux, Debian_linux, Freebsd, E\-Series_santricity_os_controller, Ontap_select_deploy_administration_utility, Ontap_tools, Netbsd, Openssh, Enterprise_linux, Enterprise_linux_eus, Enterprise_linux_for_arm_64, Enterprise_linux_for_arm_64_eus, Enterprise_linux_for_ibm_z_systems, Enterprise_linux_for_ibm_z_systems_eus, Enterprise_linux_for_power_little_endian, Enterprise_linux_for_power_little_endian_eus, Enterprise_linux_server_aus, Openshift_container_platform, Linux_enterprise_micro | 8.1 | ||
2016-06-10 | CVE-2016-5118 | The OpenBlob function in blob.c in GraphicsMagick before 1.3.24 and ImageMagick allows remote attackers to execute arbitrary code via a | (pipe) character at the start of a filename. | Ubuntu_linux, Debian_linux, Graphicsmagick, Imagemagick, Leap, Opensuse, Linux, Solaris, Linux_enterprise_debuginfo, Linux_enterprise_desktop, Linux_enterprise_server, Linux_enterprise_software_development_kit, Linux_enterprise_workstation_extension, Studio_onsite | 9.8 | ||
2019-03-27 | CVE-2019-3821 | A flaw was found in the way civetweb frontend was handling requests for ceph RGW server with SSL enabled. An unauthenticated attacker could create multiple connections to ceph RADOS gateway to exhaust file descriptors for ceph-radosgw service resulting in a remote denial of service. | Ubuntu_linux, Civetweb | 7.5 |