Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ubuntu vivid 15.04 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2015-2285
The logrotation script (/etc/cron.daily/upstart) in the Ubuntu Upstart package prior to 1.13.2-0ubuntu9, as used in Ubuntu Vivid 15.04, allows local users to execute arbitrary commands and gain privileges via a crafted file in /run/user/*/upstart/sessions/.
Ubuntu Upstart
Ubuntu Vivid 15.04
1 EDB exploit
7.8
CVSSv3
CVE-2016-1575
The overlayfs implementation in the Linux kernel up to and including 4.5.2 does not properly maintain POSIX ACL xattr data, which allows local users to gain privileges by leveraging a group-writable setgid directory.
Linux Linux Kernel
Canonical Ubuntu Touch 15.04
Canonical Ubuntu Linux 16.10
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Core 15.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 15.10
Canonical Ubuntu Linux 14.04
1 EDB exploit
7.8
CVSSv3
CVE-2016-1576
The overlayfs implementation in the Linux kernel up to and including 4.5.2 does not properly restrict the mount namespace, which allows local users to gain privileges by mounting an overlayfs filesystem on top of a FUSE filesystem, and then executing a crafted setuid program.
Canonical Ubuntu Touch 15.04
Canonical Ubuntu Linux 16.10
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Core 15.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 15.10
Canonical Ubuntu Linux 14.04
Linux Linux Kernel
1 EDB exploit
NA
CVE-2015-5707
Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x up to and including 4.x prior to 4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request.
Linux Linux Kernel
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 15.04
Debian Debian Linux 8.0
Debian Debian Linux 7.0
Suse Suse Linux Enterprise Server 11
Suse Suse Linux Enterprise Desktop 11
6.5
CVSSv3
CVE-2015-7513
arch/x86/kvm/x86.c in the Linux kernel prior to 4.4 does not reset the PIT counter values during state restoration, which allows guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_i...
Linux Linux Kernel 4.4
Linux Linux Kernel
Fedoraproject Fedora 22
Debian Debian Linux 8.0
Debian Debian Linux 7.0
Fedoraproject Fedora 23
Canonical Ubuntu Linux 15.10
Canonical Ubuntu Linux 15.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 12.04
7.8
CVSSv3
CVE-2015-1328
The overlayfs implementation in the linux (aka Linux kernel) package prior to 3.19.0-21.21 in Ubuntu up to and including 15.04 does not properly check permissions for file creation in the upper filesystem directory, which allows local users to obtain root access by leveraging a c...
Canonical Ubuntu Linux
Linux Linux Kernel
3 EDB exploits
13 Github repositories
6.2
CVSSv3
CVE-2015-8785
The fuse_fill_write_pages function in fs/fuse/file.c in the Linux kernel prior to 4.4 allows local users to cause a denial of service (infinite loop) via a writev system call that triggers a zero length for the first segment of an iov.
Linux Linux Kernel 4.4
Linux Linux Kernel
Suse Linux Enterprise Real Time Extension 12
2.3
CVSSv3
CVE-2015-8569
The (1) pptp_bind and (2) pptp_connect functions in drivers/net/ppp/pptp.c in the Linux kernel up to and including 4.3.3 do not verify an address length, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a cr...
Linux Linux Kernel
5.5
CVSSv3
CVE-2015-7550
The keyctl_read_key function in security/keys/keyctl.c in the Linux kernel prior to 4.3.4 does not properly use a semaphore, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted a...
Linux Linux Kernel
4
CVSSv3
CVE-2015-8575
The sco_sock_bind function in net/bluetooth/sco.c in the Linux kernel prior to 4.3.4 does not verify an address length, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application.
Linux Linux Kernel
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »