Summary
Detail | |||
---|---|---|---|
Vendor | Canonical | First view | 2016-06-10 |
Product | Ubuntu Linux | Last view | 2022-03-29 |
Version | 18.04 | Type | Os |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | lts | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:o:canonical:ubuntu_linux |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.8 | 2022-03-29 | CVE-2022-1055 | A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5 |
8.8 | 2022-03-23 | CVE-2021-3748 | A use-after-free vulnerability was found in the virtio-net device of QEMU. It could occur when the descriptor's address belongs to the non direct access region, due to num_buffers being set after the virtqueue elem has been unmapped. A malicious guest could use this flaw to crash QEMU, resulting in a denial of service condition, or potentially execute code on the host with the privileges of the QEMU process. |
7.5 | 2022-03-04 | CVE-2021-3737 | A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability. |
7.8 | 2022-03-03 | CVE-2022-0492 | A vulnerability was found in the Linux kernel’s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly. |
7 | 2022-03-03 | CVE-2021-3640 | A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system. |
8.8 | 2022-02-21 | CVE-2021-44142 | The Samba vfs_fruit module uses extended file attributes (EA, xattr) to provide "...enhanced compatibility with Apple SMB clients and interoperability with a Netatalk 3 AFP fileserver." Samba versions prior to 4.13.17, 4.14.12 and 4.15.5 with vfs_fruit configured allow out-of-bounds heap read and write via specially crafted extended file attributes. A remote attacker with write access to extended file attributes can execute arbitrary code with the privileges of smbd, typically root. |
8.8 | 2022-02-18 | CVE-2020-25722 | Multiple flaws were found in the way samba AD DC implemented access and conformance checking of stored data. An attacker could use this flaw to cause total domain compromise. |
8.1 | 2022-02-18 | CVE-2020-25717 | A flaw was found in the way Samba maps domain users to local users. An authenticated attacker could use this flaw to cause possible privilege escalation. |
5.9 | 2022-02-18 | CVE-2016-2124 | A flaw was found in the way samba implemented SMB1 authentication. An attacker could use this flaw to retrieve the plaintext password sent over the wire even if Kerberos authentication was required. |
7.8 | 2022-02-17 | CVE-2021-44731 | A race condition existed in the snapd 2.54.2 snap-confine binary when preparing a private mount namespace for a snap. This could allow a local attacker to gain root privileges by bind-mounting their own contents inside the snap's private mount namespace and causing snap-confine to execute arbitrary code and hence gain privilege escalation. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1 |
8.8 | 2022-02-17 | CVE-2021-44730 | snapd 2.54.2 did not properly validate the location of the snap-confine binary. A local attacker who can hardlink this binary to another location to cause snap-confine to execute other arbitrary binaries and hence gain privilege escalation. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1 |
7.8 | 2022-02-17 | CVE-2021-4120 | snapd 2.54.2 fails to perform sufficient validation of snap content interface and layout paths, resulting in the ability for snaps to inject arbitrary AppArmor policy rules via malformed content interface and layout declarations and hence escape strict snap confinement. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1 |
5.5 | 2022-02-17 | CVE-2021-3155 | snapd 2.54.2 and earlier created ~/snap directories in user home directories without specifying owner-only permissions. This could allow a local attacker to read information that should have been private. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1 |
9.1 | 2022-01-31 | CVE-2021-45079 | In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication. |
7.8 | 2022-01-28 | CVE-2021-4034 | A local privilege escalation vulnerability was found on polkit's pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn't handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it'll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine. |
7.8 | 2022-01-20 | CVE-2021-45417 | AIDE before 0.17.4 allows local users to obtain root privileges via crafted file metadata (such as XFS extended attributes or tmpfs ACLs), because of a heap-based buffer overflow. |
5.5 | 2021-06-12 | CVE-2021-32555 | It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the xorg-hwe-18.04 package apport hooks, it could expose private data to other local users. |
5.5 | 2021-06-12 | CVE-2021-32554 | It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the xorg package apport hooks, it could expose private data to other local users. |
5.5 | 2021-06-12 | CVE-2021-32553 | It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-17 package apport hooks, it could expose private data to other local users. |
5.5 | 2021-06-12 | CVE-2021-32552 | It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-16 package apport hooks, it could expose private data to other local users. |
5.5 | 2021-06-12 | CVE-2021-32551 | It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-15 package apport hooks, it could expose private data to other local users. |
5.5 | 2021-06-12 | CVE-2021-32550 | It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-14 package apport hooks, it could expose private data to other local users. |
5.5 | 2021-06-12 | CVE-2021-32549 | It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-13 package apport hooks, it could expose private data to other local users. |
5.5 | 2021-06-12 | CVE-2021-32548 | It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-8 package apport hooks, it could expose private data to other local users. |
5.5 | 2021-06-12 | CVE-2021-32547 | It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-lts package apport hooks, it could expose private data to other local users. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
13% (159) | CWE-787 | Out-of-bounds Write |
12% (141) | CWE-125 | Out-of-bounds Read |
6% (77) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
6% (75) | CWE-476 | NULL Pointer Dereference |
6% (72) | CWE-416 | Use After Free |
5% (62) | CWE-190 | Integer Overflow or Wraparound |
3% (45) | CWE-20 | Improper Input Validation |
3% (43) | CWE-401 | Failure to Release Memory Before Removing Last Reference ('Memory L... |
3% (42) | CWE-772 | Missing Release of Resource after Effective Lifetime |
2% (30) | CWE-200 | Information Exposure |
2% (28) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
1% (22) | CWE-362 | Race Condition |
1% (18) | CWE-59 | Improper Link Resolution Before File Access ('Link Following') |
1% (17) | CWE-770 | Allocation of Resources Without Limits or Throttling |
1% (15) | CWE-287 | Improper Authentication |
1% (12) | CWE-369 | Divide By Zero |
1% (12) | CWE-269 | Improper Privilege Management |
1% (12) | CWE-120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflo... |
1% (12) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
0% (11) | CWE-617 | Reachable Assertion |
0% (11) | CWE-415 | Double Free |
0% (11) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
0% (9) | CWE-522 | Insufficiently Protected Credentials |
0% (9) | CWE-444 | Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggli... |
0% (9) | CWE-203 | Information Exposure Through Discrepancy |
SAINT Exploits
Description | Link |
---|---|
OpenSMTPD MAIL FROM command injection | More info here |
libssh authentication bypass | More info here |
Polkit pkexec privilege elevation | More info here |
Horde Imp Unauthenticated Remote Command Execution | More info here |
Snort® IPS/IDS
Date | Description |
---|---|
2021-01-12 | Apache Server mod_proxy Error Page cross site scripting attempt RuleID : 56563 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-10 | Microsoft Windows malicious Netlogon NetrServerAuthenticate3 request attempt RuleID : 56290 - Type : OS-WINDOWS - Revision : 6 |
2020-10-22 | Microsoft Windows NetrServerReqChallenge RPC transport sign and seal disablin... RuleID : 55802 - Type : OS-WINDOWS - Revision : 1 |
2020-10-20 | Microsoft Windows Netlogon crafted NetrServerAuthenticate elevation of privil... RuleID : 55704 - Type : OS-WINDOWS - Revision : 2 |
2020-10-20 | Microsoft Windows Netlogon crafted NetrServerReqChallenge elevation of privil... RuleID : 55703 - Type : OS-WINDOWS - Revision : 2 |
2020-06-23 | SaltStack wheel directory traversal attempt RuleID : 54033 - Type : SERVER-OTHER - Revision : 3 |
2020-06-23 | SaltStack wheel directory traversal attempt RuleID : 54032 - Type : SERVER-OTHER - Revision : 3 |
2020-06-23 | SaltStack wheel directory traversal attempt RuleID : 54031 - Type : SERVER-OTHER - Revision : 3 |
2020-06-23 | SaltStack wheel directory traversal attempt RuleID : 54030 - Type : SERVER-OTHER - Revision : 3 |
2020-06-23 | SaltStack authentication bypass attempt RuleID : 54023 - Type : SERVER-OTHER - Revision : 3 |
2020-06-23 | SaltStack authentication bypass attempt RuleID : 54022 - Type : SERVER-OTHER - Revision : 3 |
2020-04-21 | Apache Log4j SocketServer insecure deserialization remote code execution attempt RuleID : 53475 - Type : SERVER-OTHER - Revision : 1 |
2020-04-14 | OpenSMTPD smtp_mailaddr command injection attempt RuleID : 53432 - Type : SERVER-MAIL - Revision : 1 |
2020-04-14 | OpenSMTPD smtp_mailaddr command injection attempt RuleID : 53431 - Type : SERVER-MAIL - Revision : 1 |
2020-03-17 | Apple Safari Webkit WebCore memory corruption attempt RuleID : 53101 - Type : BROWSER-WEBKIT - Revision : 1 |
2020-03-17 | Apple Safari Webkit WebCore memory corruption attempt RuleID : 53100 - Type : BROWSER-WEBKIT - Revision : 1 |
2020-12-05 | TRUFFLEHUNTER TALOS-2020-0985 attack attempt RuleID : 53045 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-05 | TRUFFLEHUNTER TALOS-2020-0984 attack attempt RuleID : 53044 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-05 | TRUFFLEHUNTER TALOS-2019-0973 attack attempt RuleID : 52571 - Type : FILE-OTHER - Revision : 1 |
2020-12-05 | TRUFFLEHUNTER TALOS-2019-0973 attack attempt RuleID : 52570 - Type : FILE-OTHER - Revision : 1 |
2020-01-16 | Memcached lru mode NULL dereference attempt RuleID : 52477 - Type : SERVER-OTHER - Revision : 1 |
2020-01-16 | Memcached lru temp_ttl NULL dereference attempt RuleID : 52476 - Type : SERVER-OTHER - Revision : 1 |
2020-01-07 | LibVNCServer file transfer extension heap buffer overflow attempt RuleID : 52397 - Type : SERVER-OTHER - Revision : 1 |
2020-01-07 | LibVNCServer file transfer extension heap buffer overflow attempt RuleID : 52396 - Type : SERVER-OTHER - Revision : 1 |
2020-01-07 | LibVNCServer file transfer extension heap buffer overflow attempt RuleID : 52395 - Type : SERVER-OTHER - Revision : 1 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2019-01-18 | Name: The remote Fedora host is missing a security update. File: fedora_2019-a8ffcff7ee.nasl - Type: ACT_GATHER_INFO |
2019-01-17 | Name: The remote CentOS host is missing one or more security updates. File: centos_RHSA-2019-0059.nasl - Type: ACT_GATHER_INFO |
2019-01-17 | Name: The remote Fedora host is missing one or more security updates. File: fedora_2019-509c133845.nasl - Type: ACT_GATHER_INFO |
2019-01-17 | Name: The remote Fedora host is missing one or more security updates. File: fedora_2019-f812c9fb22.nasl - Type: ACT_GATHER_INFO |
2019-01-17 | Name: The remote database server is affected by multiple vulnerabilities. File: mysql_5_6_43.nasl - Type: ACT_GATHER_INFO |
2019-01-17 | Name: The remote database server is affected by multiple vulnerabilities. File: mysql_5_7_25.nasl - Type: ACT_GATHER_INFO |
2019-01-17 | Name: The remote database server is affected by multiple vulnerabilities. File: mysql_8_0_14.nasl - Type: ACT_GATHER_INFO |
2019-01-16 | Name: The remote CentOS host is missing one or more security updates. File: centos_RHSA-2019-0049.nasl - Type: ACT_GATHER_INFO |
2019-01-16 | Name: A PHP application running on the remote web server is affected by multiple vu... File: drupal_8_6_6.nasl - Type: ACT_GATHER_INFO |
2019-01-16 | Name: The remote Fedora host is missing a security update. File: fedora_2019-348547a32d.nasl - Type: ACT_GATHER_INFO |
2019-01-16 | Name: The remote Fedora host is missing a security update. File: fedora_2019-e6ca5847c7.nasl - Type: ACT_GATHER_INFO |
2019-01-16 | Name: The remote Fedora host is missing a security update. File: fedora_2019-f6ff819834.nasl - Type: ACT_GATHER_INFO |
2019-01-16 | Name: The remote database server is affected by multiple vulnerabilities File: mariadb_10_0_37.nasl - Type: ACT_GATHER_INFO |
2019-01-14 | Name: The remote Slackware host is missing a security update. File: Slackware_SSA_2019-011-01.nasl - Type: ACT_GATHER_INFO |
2019-01-14 | Name: The remote Slackware host is missing a security update. File: Slackware_SSA_2019-013-01.nasl - Type: ACT_GATHER_INFO |
2019-01-14 | Name: The remote Amazon Linux AMI host is missing a security update. File: ala_ALAS-2019-1145.nasl - Type: ACT_GATHER_INFO |
2019-01-14 | Name: The remote Amazon Linux AMI host is missing a security update. File: ala_ALAS-2019-1146.nasl - Type: ACT_GATHER_INFO |
2019-01-14 | Name: The remote Amazon Linux AMI host is missing a security update. File: ala_ALAS-2019-1147.nasl - Type: ACT_GATHER_INFO |
2019-01-14 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4367.nasl - Type: ACT_GATHER_INFO |
2019-01-14 | Name: The remote Fedora host is missing a security update. File: fedora_2019-18b3a10c7f.nasl - Type: ACT_GATHER_INFO |
2019-01-14 | Name: The remote Fedora host is missing a security update. File: fedora_2019-75a8da28f0.nasl - Type: ACT_GATHER_INFO |
2019-01-11 | Name: The remote Virtuozzo host is missing multiple security updates. File: Virtuozzo_VZA-2018-075.nasl - Type: ACT_GATHER_INFO |
2019-01-11 | Name: The remote Fedora host is missing a security update. File: fedora_2019-a7b53ed5a3.nasl - Type: ACT_GATHER_INFO |
2019-01-11 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_d38bbb7914f311e99ce228d244aee256.nasl - Type: ACT_GATHER_INFO |
2019-01-11 | Name: The remote device is missing a vendor-supplied security patch. File: juniper_jsa10919.nasl - Type: ACT_GATHER_INFO |