Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

Search CVE reports


Toggle filters

81 – 90 of 1467 results


CVE-2017-16996

High priority
Ignored

kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging register truncation mishandling.

32 affected packages

linux, linux-armadaxp, linux-aws, linux-azure, linux-euclid...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux Not affected
linux-armadaxp Not in release
linux-aws Not affected
linux-azure Not affected
linux-euclid Not affected
linux-flo Ignored
linux-gcp Not affected
linux-gke Not affected
linux-goldfish Not affected
linux-grouper Not in release
linux-hwe Not affected
linux-hwe-edge Not affected
linux-kvm Not affected
linux-linaro-omap Not in release
linux-linaro-shared Not in release
linux-linaro-vexpress Not in release
linux-lts-quantal Not in release
linux-lts-raring Not in release
linux-lts-saucy Not in release
linux-lts-trusty Not in release
linux-lts-utopic Not in release
linux-lts-vivid Not in release
linux-lts-wily Not in release
linux-lts-xenial Not in release
linux-maguro Not in release
linux-mako Ignored
linux-manta Not in release
linux-oem Not affected
linux-qcm-msm Not in release
linux-raspi2 Not affected
linux-snapdragon Not affected
linux-ti-omap4 Not in release
Show all 32 packages Show less packages

CVE-2017-17864

Low priority
Ignored

kernel/bpf/verifier.c in the Linux kernel through 4.14.8 mishandles states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type, which allows local users to obtain potentially sensitive address...

32 affected packages

linux, linux-armadaxp, linux-aws, linux-azure, linux-euclid...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux Not affected
linux-armadaxp Not in release
linux-aws Not affected
linux-azure Not affected
linux-euclid Not affected
linux-flo Ignored
linux-gcp Not affected
linux-gke Not affected
linux-goldfish Not affected
linux-grouper Not in release
linux-hwe Not affected
linux-hwe-edge Not affected
linux-kvm Not affected
linux-linaro-omap Not in release
linux-linaro-shared Not in release
linux-linaro-vexpress Not in release
linux-lts-quantal Not in release
linux-lts-raring Not in release
linux-lts-saucy Not in release
linux-lts-trusty Not in release
linux-lts-utopic Not in release
linux-lts-vivid Not in release
linux-lts-wily Not in release
linux-lts-xenial Not in release
linux-maguro Not in release
linux-mako Ignored
linux-manta Not in release
linux-oem Not affected
linux-qcm-msm Not in release
linux-raspi2 Not affected
linux-snapdragon Not affected
linux-ti-omap4 Not in release
Show all 32 packages Show less packages

CVE-2017-17863

High priority
Ignored

kernel/bpf/verifier.c in the Linux kernel 4.9.x through 4.9.71 does not check the relationship between pointer values and the BPF stack, which allows local users to cause a denial of service (integer overflow or invalid memory...

32 affected packages

linux, linux-armadaxp, linux-aws, linux-azure, linux-euclid...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux Not affected
linux-armadaxp Not in release
linux-aws Not affected
linux-azure Not affected
linux-euclid Not affected
linux-flo Ignored
linux-gcp Not affected
linux-gke Not affected
linux-goldfish Not affected
linux-grouper Not in release
linux-hwe Not affected
linux-hwe-edge Not affected
linux-kvm Not affected
linux-linaro-omap Not in release
linux-linaro-shared Not in release
linux-linaro-vexpress Not in release
linux-lts-quantal Not in release
linux-lts-raring Not in release
linux-lts-saucy Not in release
linux-lts-trusty Not in release
linux-lts-utopic Not in release
linux-lts-vivid Not in release
linux-lts-wily Not in release
linux-lts-xenial Not in release
linux-maguro Not in release
linux-mako Ignored
linux-manta Not in release
linux-oem Not affected
linux-qcm-msm Not in release
linux-raspi2 Not affected
linux-snapdragon Not affected
linux-ti-omap4 Not in release
Show all 32 packages Show less packages

CVE-2017-17862

Medium priority

Some fixes available 16 of 23

kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be...

32 affected packages

linux, linux-armadaxp, linux-aws, linux-azure, linux-euclid...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux Not affected Fixed
linux-armadaxp Not in release Not in release
linux-aws Not affected Fixed
linux-azure Not affected Fixed
linux-euclid Not in release Ignored
linux-flo Not in release Ignored
linux-gcp Not affected Fixed
linux-gke Not in release Ignored
linux-goldfish Not in release Not affected
linux-grouper Not in release Not in release
linux-hwe Not affected Fixed
linux-hwe-edge Fixed Fixed
linux-kvm Not affected Fixed
linux-linaro-omap Not in release Not in release
linux-linaro-shared Not in release Not in release
linux-linaro-vexpress Not in release Not in release
linux-lts-quantal Not in release Not in release
linux-lts-raring Not in release Not in release
linux-lts-saucy Not in release Not in release
linux-lts-trusty Not in release Not in release
linux-lts-utopic Not in release Not in release
linux-lts-vivid Not in release Not in release
linux-lts-wily Not in release Not in release
linux-lts-xenial Not in release Not in release
linux-maguro Not in release Not in release
linux-mako Not in release Ignored
linux-manta Not in release Not in release
linux-oem Not affected Fixed
linux-qcm-msm Not in release Not in release
linux-raspi2 Not affected Fixed
linux-snapdragon Not affected Fixed
linux-ti-omap4 Not in release Not in release
Show all 32 packages Show less packages

CVE-2017-16995

High priority

Some fixes available 17 of 24

The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.4 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension.

32 affected packages

linux, linux-armadaxp, linux-aws, linux-azure, linux-euclid...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux Not affected Fixed
linux-armadaxp Not in release Not in release
linux-aws Not affected Fixed
linux-azure Not affected Fixed
linux-euclid Not in release Fixed
linux-flo Not in release Ignored
linux-gcp Not affected Fixed
linux-gke Not in release Not affected
linux-goldfish Not in release Not affected
linux-grouper Not in release Not in release
linux-hwe Not affected Fixed
linux-hwe-edge Fixed Fixed
linux-kvm Not affected Fixed
linux-linaro-omap Not in release Not in release
linux-linaro-shared Not in release Not in release
linux-linaro-vexpress Not in release Not in release
linux-lts-quantal Not in release Not in release
linux-lts-raring Not in release Not in release
linux-lts-saucy Not in release Not in release
linux-lts-trusty Not in release Not in release
linux-lts-utopic Not in release Not in release
linux-lts-vivid Not in release Not in release
linux-lts-wily Not in release Not in release
linux-lts-xenial Not in release Not in release
linux-maguro Not in release Not in release
linux-mako Not in release Ignored
linux-manta Not in release Not in release
linux-oem Not affected Fixed
linux-qcm-msm Not in release Not in release
linux-raspi2 Not affected Fixed
linux-snapdragon Not affected Fixed
linux-ti-omap4 Not in release Not in release
Show all 32 packages Show less packages

CVE-2017-17807

Medium priority

Some fixes available 17 of 26

The KEYS subsystem in the Linux kernel before 4.14.6 omitted an access-control check when adding a key to the current task's "default request-key keyring" via the request_key() system call, allowing a local user to use a sequence...

32 affected packages

linux, linux-armadaxp, linux-aws, linux-azure, linux-euclid...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux Not affected Fixed
linux-armadaxp Not in release Not in release
linux-aws Not affected Fixed
linux-azure Not affected Fixed
linux-euclid Not in release Ignored
linux-flo Not in release Ignored
linux-gcp Not affected Fixed
linux-gke Not in release Ignored
linux-goldfish Not in release Ignored
linux-grouper Not in release Not in release
linux-hwe Not affected Fixed
linux-hwe-edge Fixed Fixed
linux-kvm Not affected Fixed
linux-linaro-omap Not in release Not in release
linux-linaro-shared Not in release Not in release
linux-linaro-vexpress Not in release Not in release
linux-lts-quantal Not in release Not in release
linux-lts-raring Not in release Not in release
linux-lts-saucy Not in release Not in release
linux-lts-trusty Not in release Not in release
linux-lts-utopic Not in release Not in release
linux-lts-vivid Not in release Not in release
linux-lts-wily Not in release Not in release
linux-lts-xenial Not in release Not in release
linux-maguro Not in release Not in release
linux-mako Not in release Ignored
linux-manta Not in release Not in release
linux-oem Not affected Fixed
linux-qcm-msm Not in release Not in release
linux-raspi2 Not affected Fixed
linux-snapdragon Not affected Fixed
linux-ti-omap4 Not in release Not in release
Show all 32 packages Show less packages

CVE-2017-17806

Medium priority

Some fixes available 17 of 26

The HMAC implementation (crypto/hmac.c) in the Linux kernel before 4.14.8 does not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface...

32 affected packages

linux, linux-armadaxp, linux-aws, linux-azure, linux-euclid...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux Not affected Fixed
linux-armadaxp Not in release Not in release
linux-aws Not affected Fixed
linux-azure Not affected Fixed
linux-euclid Not in release Ignored
linux-flo Not in release Ignored
linux-gcp Not affected Fixed
linux-gke Not in release Ignored
linux-goldfish Not in release Ignored
linux-grouper Not in release Not in release
linux-hwe Not affected Fixed
linux-hwe-edge Fixed Fixed
linux-kvm Not affected Fixed
linux-linaro-omap Not in release Not in release
linux-linaro-shared Not in release Not in release
linux-linaro-vexpress Not in release Not in release
linux-lts-quantal Not in release Not in release
linux-lts-raring Not in release Not in release
linux-lts-saucy Not in release Not in release
linux-lts-trusty Not in release Not in release
linux-lts-utopic Not in release Not in release
linux-lts-vivid Not in release Not in release
linux-lts-wily Not in release Not in release
linux-lts-xenial Not in release Not in release
linux-maguro Not in release Not in release
linux-mako Not in release Ignored
linux-manta Not in release Not in release
linux-oem Not affected Fixed
linux-qcm-msm Not in release Not in release
linux-raspi2 Not affected Fixed
linux-snapdragon Not affected Fixed
linux-ti-omap4 Not in release Not in release
Show all 32 packages Show less packages

CVE-2017-17805

Medium priority

Some fixes available 17 of 26

The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause...

32 affected packages

linux, linux-armadaxp, linux-aws, linux-azure, linux-euclid...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux Not affected Fixed
linux-armadaxp Not in release Not in release
linux-aws Not affected Fixed
linux-azure Not affected Fixed
linux-euclid Not in release Ignored
linux-flo Not in release Ignored
linux-gcp Not affected Fixed
linux-gke Not in release Ignored
linux-goldfish Not in release Ignored
linux-grouper Not in release Not in release
linux-hwe Not affected Fixed
linux-hwe-edge Fixed Fixed
linux-kvm Not affected Fixed
linux-linaro-omap Not in release Not in release
linux-linaro-shared Not in release Not in release
linux-linaro-vexpress Not in release Not in release
linux-lts-quantal Not in release Not in release
linux-lts-raring Not in release Not in release
linux-lts-saucy Not in release Not in release
linux-lts-trusty Not in release Not in release
linux-lts-utopic Not in release Not in release
linux-lts-vivid Not in release Not in release
linux-lts-wily Not in release Not in release
linux-lts-xenial Not in release Not in release
linux-maguro Not in release Not in release
linux-mako Not in release Ignored
linux-manta Not in release Not in release
linux-oem Not affected Fixed
linux-qcm-msm Not in release Not in release
linux-raspi2 Not affected Fixed
linux-snapdragon Not affected Fixed
linux-ti-omap4 Not in release Not in release
Show all 32 packages Show less packages

CVE-2017-17741

Medium priority

Some fixes available 17 of 26

The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and...

32 affected packages

linux, linux-armadaxp, linux-aws, linux-azure, linux-euclid...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux Not affected Fixed
linux-armadaxp Not in release Not in release
linux-aws Not affected Fixed
linux-azure Not affected Fixed
linux-euclid Not in release Ignored
linux-flo Not in release Ignored
linux-gcp Not affected Fixed
linux-gke Not in release Ignored
linux-goldfish Not in release Ignored
linux-grouper Not in release Not in release
linux-hwe Not affected Fixed
linux-hwe-edge Fixed Fixed
linux-kvm Not affected Fixed
linux-linaro-omap Not in release Not in release
linux-linaro-shared Not in release Not in release
linux-linaro-vexpress Not in release Not in release
linux-lts-quantal Not in release Not in release
linux-lts-raring Not in release Not in release
linux-lts-saucy Not in release Not in release
linux-lts-trusty Not in release Not in release
linux-lts-utopic Not in release Not in release
linux-lts-vivid Not in release Not in release
linux-lts-wily Not in release Not in release
linux-lts-xenial Not in release Not in release
linux-maguro Not in release Not in release
linux-mako Not in release Ignored
linux-manta Not in release Not in release
linux-oem Not affected Fixed
linux-qcm-msm Not in release Not in release
linux-raspi2 Not affected Fixed
linux-snapdragon Not affected Fixed
linux-ti-omap4 Not in release Not in release
Show all 32 packages Show less packages

CVE-2017-17712

High priority

Some fixes available 17 of 23

The raw_sendmsg() function in net/ipv4/raw.c in the Linux kernel through 4.14.6 has a race condition in inet->hdrincl that leads to uninitialized stack pointer usage; this allows a local user to execute code and gain privileges.

32 affected packages

linux, linux-armadaxp, linux-aws, linux-azure, linux-euclid...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux Not affected Fixed
linux-armadaxp Not in release Not in release
linux-aws Not affected Fixed
linux-azure Not affected Fixed
linux-euclid Not in release Fixed
linux-flo Not in release Ignored
linux-gcp Not affected Fixed
linux-gke Not in release Ignored
linux-goldfish Not in release Not affected
linux-grouper Not in release Not in release
linux-hwe Not affected Fixed
linux-hwe-edge Fixed Fixed
linux-kvm Not affected Fixed
linux-linaro-omap Not in release Not in release
linux-linaro-shared Not in release Not in release
linux-linaro-vexpress Not in release Not in release
linux-lts-quantal Not in release Not in release
linux-lts-raring Not in release Not in release
linux-lts-saucy Not in release Not in release
linux-lts-trusty Not in release Not in release
linux-lts-utopic Not in release Not in release
linux-lts-vivid Not in release Not in release
linux-lts-wily Not in release Not in release
linux-lts-xenial Not in release Not in release
linux-maguro Not in release Not in release
linux-mako Not in release Ignored
linux-manta Not in release Not in release
linux-oem Not affected Fixed
linux-qcm-msm Not in release Not in release
linux-raspi2 Not affected Fixed
linux-snapdragon Not affected Fixed
linux-ti-omap4 Not in release Not in release
Show all 32 packages Show less packages