Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Ubuntu_linux
(Canonical)Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2023-12-12 | CVE-2023-5536 | A feature in LXD (LP#1829071), affects the default configuration of Ubuntu Server which allows privileged users in the lxd group to escalate their privilege to root without requiring a sudo password. | Ubuntu_linux | 6.4 | ||
2024-01-08 | CVE-2022-2586 | It was discovered that a nft object or expression could reference a nft set on a different nft table, leading to a use-after-free once that table was deleted. | Ubuntu_linux, Linux_kernel | 7.8 | ||
2024-01-08 | CVE-2022-2585 | It was discovered that when exec'ing from a non-leader thread, armed POSIX CPU timers would be left on a list but freed, leading to a use-after-free. | Ubuntu_linux, Linux_kernel | 7.8 | ||
2024-01-08 | CVE-2022-2588 | It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0. | Ubuntu_linux, Linux_kernel | 7.8 | ||
2024-01-08 | CVE-2022-3328 | Race condition in snap-confine's must_mkdir_and_open_with_perms() | Snapd, Ubuntu_linux | 7.0 | ||
2024-01-08 | CVE-2022-2602 | io_uring UAF, Unix SCM garbage collection | Ubuntu_linux, Linux_kernel | 7.0 | ||
2024-01-08 | CVE-2021-3600 | It was discovered that the eBPF implementation in the Linux kernel did not properly track bounds information for 32 bit registers when performing div and mod operations. A local attacker could use this to possibly execute arbitrary code. | Ubuntu_linux, Fedora, Linux_kernel, Enterprise_linux | 7.8 | ||
2024-01-08 | CVE-2023-1032 | The Linux kernel io_uring IORING_OP_SOCKET operation contained a double free in function __sys_socket_file() in file net/socket.c. This issue was introduced in da214a475f8bd1d3e9e7a19ddfeb4d1617551bab and fixed in 649c15c7691e9b13cbe9bf6c65c365350e056067. | Ubuntu_linux, Linux_kernel | 5.5 | ||
2024-06-04 | CVE-2022-28652 | ~/.config/apport/settings parsing is vulnerable to "billion laughs" attack | Apport, Ubuntu_linux | 5.5 | ||
2024-06-04 | CVE-2022-28654 | is_closing_session() allows users to fill up apport.log | Apport, Ubuntu_linux | 5.5 |