Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

Search CVE reports


Toggle filters

81 – 90 of 1218 results


CVE-2017-17862

Medium priority

Some fixes available 16 of 23

kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be...

32 affected packages

linux, linux-armadaxp, linux-aws, linux-azure, linux-euclid...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux Not affected Fixed
linux-armadaxp Not in release Not in release
linux-aws Not affected Fixed
linux-azure Not affected Fixed
linux-euclid Not in release Ignored
linux-flo Not in release Ignored
linux-gcp Not affected Fixed
linux-gke Not in release Ignored
linux-goldfish Not in release Not affected
linux-grouper Not in release Not in release
linux-hwe Not affected Fixed
linux-hwe-edge Fixed Fixed
linux-kvm Not affected Fixed
linux-linaro-omap Not in release Not in release
linux-linaro-shared Not in release Not in release
linux-linaro-vexpress Not in release Not in release
linux-lts-quantal Not in release Not in release
linux-lts-raring Not in release Not in release
linux-lts-saucy Not in release Not in release
linux-lts-trusty Not in release Not in release
linux-lts-utopic Not in release Not in release
linux-lts-vivid Not in release Not in release
linux-lts-wily Not in release Not in release
linux-lts-xenial Not in release Not in release
linux-maguro Not in release Not in release
linux-mako Not in release Ignored
linux-manta Not in release Not in release
linux-oem Not affected Fixed
linux-qcm-msm Not in release Not in release
linux-raspi2 Not affected Fixed
linux-snapdragon Not affected Fixed
linux-ti-omap4 Not in release Not in release
Show all 32 packages Show less packages

CVE-2017-16995

High priority

Some fixes available 17 of 24

The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.4 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension.

32 affected packages

linux, linux-armadaxp, linux-aws, linux-azure, linux-euclid...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux Not affected Fixed
linux-armadaxp Not in release Not in release
linux-aws Not affected Fixed
linux-azure Not affected Fixed
linux-euclid Not in release Fixed
linux-flo Not in release Ignored
linux-gcp Not affected Fixed
linux-gke Not in release Not affected
linux-goldfish Not in release Not affected
linux-grouper Not in release Not in release
linux-hwe Not affected Fixed
linux-hwe-edge Fixed Fixed
linux-kvm Not affected Fixed
linux-linaro-omap Not in release Not in release
linux-linaro-shared Not in release Not in release
linux-linaro-vexpress Not in release Not in release
linux-lts-quantal Not in release Not in release
linux-lts-raring Not in release Not in release
linux-lts-saucy Not in release Not in release
linux-lts-trusty Not in release Not in release
linux-lts-utopic Not in release Not in release
linux-lts-vivid Not in release Not in release
linux-lts-wily Not in release Not in release
linux-lts-xenial Not in release Not in release
linux-maguro Not in release Not in release
linux-mako Not in release Ignored
linux-manta Not in release Not in release
linux-oem Not affected Fixed
linux-qcm-msm Not in release Not in release
linux-raspi2 Not affected Fixed
linux-snapdragon Not affected Fixed
linux-ti-omap4 Not in release Not in release
Show all 32 packages Show less packages

CVE-2017-17807

Medium priority

Some fixes available 17 of 26

The KEYS subsystem in the Linux kernel before 4.14.6 omitted an access-control check when adding a key to the current task's "default request-key keyring" via the request_key() system call, allowing a local user to use a sequence...

32 affected packages

linux, linux-armadaxp, linux-aws, linux-azure, linux-euclid...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux Not affected Fixed
linux-armadaxp Not in release Not in release
linux-aws Not affected Fixed
linux-azure Not affected Fixed
linux-euclid Not in release Ignored
linux-flo Not in release Ignored
linux-gcp Not affected Fixed
linux-gke Not in release Ignored
linux-goldfish Not in release Ignored
linux-grouper Not in release Not in release
linux-hwe Not affected Fixed
linux-hwe-edge Fixed Fixed
linux-kvm Not affected Fixed
linux-linaro-omap Not in release Not in release
linux-linaro-shared Not in release Not in release
linux-linaro-vexpress Not in release Not in release
linux-lts-quantal Not in release Not in release
linux-lts-raring Not in release Not in release
linux-lts-saucy Not in release Not in release
linux-lts-trusty Not in release Not in release
linux-lts-utopic Not in release Not in release
linux-lts-vivid Not in release Not in release
linux-lts-wily Not in release Not in release
linux-lts-xenial Not in release Not in release
linux-maguro Not in release Not in release
linux-mako Not in release Ignored
linux-manta Not in release Not in release
linux-oem Not affected Fixed
linux-qcm-msm Not in release Not in release
linux-raspi2 Not affected Fixed
linux-snapdragon Not affected Fixed
linux-ti-omap4 Not in release Not in release
Show all 32 packages Show less packages

CVE-2017-17806

Medium priority

Some fixes available 17 of 26

The HMAC implementation (crypto/hmac.c) in the Linux kernel before 4.14.8 does not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface...

32 affected packages

linux, linux-armadaxp, linux-aws, linux-azure, linux-euclid...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux Not affected Fixed
linux-armadaxp Not in release Not in release
linux-aws Not affected Fixed
linux-azure Not affected Fixed
linux-euclid Not in release Ignored
linux-flo Not in release Ignored
linux-gcp Not affected Fixed
linux-gke Not in release Ignored
linux-goldfish Not in release Ignored
linux-grouper Not in release Not in release
linux-hwe Not affected Fixed
linux-hwe-edge Fixed Fixed
linux-kvm Not affected Fixed
linux-linaro-omap Not in release Not in release
linux-linaro-shared Not in release Not in release
linux-linaro-vexpress Not in release Not in release
linux-lts-quantal Not in release Not in release
linux-lts-raring Not in release Not in release
linux-lts-saucy Not in release Not in release
linux-lts-trusty Not in release Not in release
linux-lts-utopic Not in release Not in release
linux-lts-vivid Not in release Not in release
linux-lts-wily Not in release Not in release
linux-lts-xenial Not in release Not in release
linux-maguro Not in release Not in release
linux-mako Not in release Ignored
linux-manta Not in release Not in release
linux-oem Not affected Fixed
linux-qcm-msm Not in release Not in release
linux-raspi2 Not affected Fixed
linux-snapdragon Not affected Fixed
linux-ti-omap4 Not in release Not in release
Show all 32 packages Show less packages

CVE-2017-17805

Medium priority

Some fixes available 17 of 26

The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause...

32 affected packages

linux, linux-armadaxp, linux-aws, linux-azure, linux-euclid...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux Not affected Fixed
linux-armadaxp Not in release Not in release
linux-aws Not affected Fixed
linux-azure Not affected Fixed
linux-euclid Not in release Ignored
linux-flo Not in release Ignored
linux-gcp Not affected Fixed
linux-gke Not in release Ignored
linux-goldfish Not in release Ignored
linux-grouper Not in release Not in release
linux-hwe Not affected Fixed
linux-hwe-edge Fixed Fixed
linux-kvm Not affected Fixed
linux-linaro-omap Not in release Not in release
linux-linaro-shared Not in release Not in release
linux-linaro-vexpress Not in release Not in release
linux-lts-quantal Not in release Not in release
linux-lts-raring Not in release Not in release
linux-lts-saucy Not in release Not in release
linux-lts-trusty Not in release Not in release
linux-lts-utopic Not in release Not in release
linux-lts-vivid Not in release Not in release
linux-lts-wily Not in release Not in release
linux-lts-xenial Not in release Not in release
linux-maguro Not in release Not in release
linux-mako Not in release Ignored
linux-manta Not in release Not in release
linux-oem Not affected Fixed
linux-qcm-msm Not in release Not in release
linux-raspi2 Not affected Fixed
linux-snapdragon Not affected Fixed
linux-ti-omap4 Not in release Not in release
Show all 32 packages Show less packages

CVE-2017-17741

Medium priority

Some fixes available 17 of 26

The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and...

32 affected packages

linux, linux-armadaxp, linux-aws, linux-azure, linux-euclid...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux Not affected Fixed
linux-armadaxp Not in release Not in release
linux-aws Not affected Fixed
linux-azure Not affected Fixed
linux-euclid Not in release Ignored
linux-flo Not in release Ignored
linux-gcp Not affected Fixed
linux-gke Not in release Ignored
linux-goldfish Not in release Ignored
linux-grouper Not in release Not in release
linux-hwe Not affected Fixed
linux-hwe-edge Fixed Fixed
linux-kvm Not affected Fixed
linux-linaro-omap Not in release Not in release
linux-linaro-shared Not in release Not in release
linux-linaro-vexpress Not in release Not in release
linux-lts-quantal Not in release Not in release
linux-lts-raring Not in release Not in release
linux-lts-saucy Not in release Not in release
linux-lts-trusty Not in release Not in release
linux-lts-utopic Not in release Not in release
linux-lts-vivid Not in release Not in release
linux-lts-wily Not in release Not in release
linux-lts-xenial Not in release Not in release
linux-maguro Not in release Not in release
linux-mako Not in release Ignored
linux-manta Not in release Not in release
linux-oem Not affected Fixed
linux-qcm-msm Not in release Not in release
linux-raspi2 Not affected Fixed
linux-snapdragon Not affected Fixed
linux-ti-omap4 Not in release Not in release
Show all 32 packages Show less packages

CVE-2017-17712

High priority

Some fixes available 17 of 23

The raw_sendmsg() function in net/ipv4/raw.c in the Linux kernel through 4.14.6 has a race condition in inet->hdrincl that leads to uninitialized stack pointer usage; this allows a local user to execute code and gain privileges.

32 affected packages

linux, linux-armadaxp, linux-aws, linux-azure, linux-euclid...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux Not affected Fixed
linux-armadaxp Not in release Not in release
linux-aws Not affected Fixed
linux-azure Not affected Fixed
linux-euclid Not in release Fixed
linux-flo Not in release Ignored
linux-gcp Not affected Fixed
linux-gke Not in release Ignored
linux-goldfish Not in release Not affected
linux-grouper Not in release Not in release
linux-hwe Not affected Fixed
linux-hwe-edge Fixed Fixed
linux-kvm Not affected Fixed
linux-linaro-omap Not in release Not in release
linux-linaro-shared Not in release Not in release
linux-linaro-vexpress Not in release Not in release
linux-lts-quantal Not in release Not in release
linux-lts-raring Not in release Not in release
linux-lts-saucy Not in release Not in release
linux-lts-trusty Not in release Not in release
linux-lts-utopic Not in release Not in release
linux-lts-vivid Not in release Not in release
linux-lts-wily Not in release Not in release
linux-lts-xenial Not in release Not in release
linux-maguro Not in release Not in release
linux-mako Not in release Ignored
linux-manta Not in release Not in release
linux-oem Not affected Fixed
linux-qcm-msm Not in release Not in release
linux-raspi2 Not affected Fixed
linux-snapdragon Not affected Fixed
linux-ti-omap4 Not in release Not in release
Show all 32 packages Show less packages

CVE-2017-17558

Low priority

Some fixes available 13 of 24

The usb_destroy_configuration function in drivers/usb/core/config.c in the USB core subsystem in the Linux kernel through 4.14.5 does not consider the maximum number of configurations and interfaces before attempting to release...

33 affected packages

linux, linux-armadaxp, linux-aws, linux-azure, linux-azure-edge...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux Not affected Fixed
linux-armadaxp Not in release Not in release
linux-aws Not affected Fixed
linux-azure Not affected Fixed
linux-azure-edge Not affected Not affected
linux-euclid Not in release Ignored
linux-flo Not in release Ignored
linux-gcp Not affected Fixed
linux-gke Not in release Ignored
linux-goldfish Not in release Ignored
linux-grouper Not in release Not in release
linux-hwe Not affected Fixed
linux-hwe-edge Not affected Fixed
linux-kvm Not affected Fixed
linux-linaro-omap Not in release Not in release
linux-linaro-shared Not in release Not in release
linux-linaro-vexpress Not in release Not in release
linux-lts-quantal Not in release Not in release
linux-lts-raring Not in release Not in release
linux-lts-saucy Not in release Not in release
linux-lts-trusty Not in release Not in release
linux-lts-utopic Not in release Not in release
linux-lts-vivid Not in release Not in release
linux-lts-wily Not in release Not in release
linux-lts-xenial Not in release Not in release
linux-maguro Not in release Not in release
linux-mako Not in release Ignored
linux-manta Not in release Not in release
linux-oem Not affected Ignored
linux-qcm-msm Not in release Not in release
linux-raspi2 Not affected Fixed
linux-snapdragon Not affected Fixed
linux-ti-omap4 Not in release Not in release
Show all 33 packages Show less packages

CVE-2017-1000407

Medium priority

Some fixes available 17 of 26

The Linux Kernel 2.6.32 and later are affected by a denial of service, by flooding the diagnostic port 0x80 an exception can be triggered leading to a kernel panic.

32 affected packages

linux, linux-armadaxp, linux-aws, linux-azure, linux-euclid...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux Not affected Fixed
linux-armadaxp Not in release Not in release
linux-aws Not affected Fixed
linux-azure Not affected Fixed
linux-euclid Not in release Ignored
linux-flo Not in release Ignored
linux-gcp Not affected Fixed
linux-gke Not in release Ignored
linux-goldfish Not in release Ignored
linux-grouper Not in release Not in release
linux-hwe Not affected Fixed
linux-hwe-edge Fixed Fixed
linux-kvm Not affected Fixed
linux-linaro-omap Not in release Not in release
linux-linaro-shared Not in release Not in release
linux-linaro-vexpress Not in release Not in release
linux-lts-quantal Not in release Not in release
linux-lts-raring Not in release Not in release
linux-lts-saucy Not in release Not in release
linux-lts-trusty Not in release Not in release
linux-lts-utopic Not in release Not in release
linux-lts-vivid Not in release Not in release
linux-lts-wily Not in release Not in release
linux-lts-xenial Not in release Not in release
linux-maguro Not in release Not in release
linux-mako Not in release Ignored
linux-manta Not in release Not in release
linux-oem Not affected Fixed
linux-qcm-msm Not in release Not in release
linux-raspi2 Not affected Fixed
linux-snapdragon Not affected Fixed
linux-ti-omap4 Not in release Not in release
Show all 32 packages Show less packages

CVE-2017-15121

Medium priority

Some fixes available 1 of 7

A non-privileged user is able to mount a fuse filesystem on RHEL 6 or 7 and crash a system if an application punches a hole in a file that does not end aligned to a page boundary.

32 affected packages

linux, linux-armadaxp, linux-aws, linux-azure, linux-euclid...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux Not affected Not affected
linux-armadaxp Not in release Not in release
linux-aws Not affected Not affected
linux-azure Not affected Not affected
linux-euclid Not in release Ignored
linux-flo Not in release Ignored
linux-gcp Not affected Not affected
linux-gke Not in release Not affected
linux-goldfish Not in release Ignored
linux-grouper Not in release Not in release
linux-hwe Not affected Not affected
linux-hwe-edge Fixed Not affected
linux-kvm Not affected Not affected
linux-linaro-omap Not in release Not in release
linux-linaro-shared Not in release Not in release
linux-linaro-vexpress Not in release Not in release
linux-lts-quantal Not in release Not in release
linux-lts-raring Not in release Not in release
linux-lts-saucy Not in release Not in release
linux-lts-trusty Not in release Not in release
linux-lts-utopic Not in release Not in release
linux-lts-vivid Not in release Not in release
linux-lts-wily Not in release Not in release
linux-lts-xenial Not in release Not in release
linux-maguro Not in release Not in release
linux-mako Not in release Ignored
linux-manta Not in release Not in release
linux-oem Not affected Not affected
linux-qcm-msm Not in release Not in release
linux-raspi2 Not affected Not affected
linux-snapdragon Not affected Not affected
linux-ti-omap4 Not in release Not in release
Show all 32 packages Show less packages