Tag
#ubuntu
GLPI versions 10.0.0 through 10.0.2 suffer from a remote SQL injection vulnerability that can lead to remote code execution.
GLPI Activity versions prior to 3.1.0 suffer from a local file inclusion vulnerability.
GLPI Glpiinventory versions 1.0.1 and below suffer from a local file inclusion vulnerability.
GLPI Manageentities versions prior to 4.0.2 suffer from a local file inclusion vulnerability.
Roxy WI version 6.1.1.0 suffers from an unauthenticated remote code execution vulnerability.
Roxy WI version 6.1.0.0 suffers from an unauthenticated remote code execution vulnerability.
Roxy WI version 6.1.0.0 suffers from an improper authentication control vulnerability.
sudo versions 1.8.0 through 1.9.12p1 local privilege escalation exploit.
mod_auth_openidc is an authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. In versions 2.0.0 through 2.4.13.1, when `OIDCStripCookies` is set and a crafted cookie supplied, a NULL pointer dereference would occur, resulting in a segmentation fault. This could be used in a Denial-of-Service attack and thus presents an availability risk. Version 2.4.13.2 contains a patch for this issue. As a workaround, avoid using `OIDCStripCookies`.
Ubuntu Security Notice 5991-1 - It was discovered that the System V IPC implementation in the Linux kernel did not properly handle large shared memory counts. A local attacker could use this to cause a denial of service. It was discovered that a use-after-free vulnerability existed in the SGI GRU driver in the Linux kernel. A local attacker could possibly use this to cause a denial of service or possibly execute arbitrary code.