Canonical

Ubuntu Pro 14.04 LTS

4792 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 04.10.2025 15:17:15
  • Zuletzt bearbeitet 23.03.2026 18:41:22

In the Linux kernel, the following vulnerability has been resolved: null_blk: Always check queue mode setting from configfs Make sure to check device queue mode in the null_validate_conf() and return error for NULL_Q_RQ as we don't allow legacy I/O...

  • EPSS 0.02%
  • Veröffentlicht 04.10.2025 15:17:14
  • Zuletzt bearbeitet 21.03.2026 01:07:02

In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: delete timer and free skb queue when unloading Fix possible crash and memory leak on driver unload by deleting TX purge timer and freeing C2H queue in 'rtw_core_deinit...

  • EPSS 0.01%
  • Veröffentlicht 04.10.2025 15:17:10
  • Zuletzt bearbeitet 21.03.2026 01:02:40

In the Linux kernel, the following vulnerability has been resolved: ext2: Check block size validity during mount Check that log of block size stored in the superblock has sensible value. Otherwise the shift computing the block size can overflow lea...

  • EPSS 0.02%
  • Veröffentlicht 04.10.2025 15:17:07
  • Zuletzt bearbeitet 21.03.2026 00:39:51

In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix defrag path triggering jbd2 ASSERT code path: ocfs2_ioctl_move_extents ocfs2_move_extents ocfs2_defrag_extent __ocfs2_move_extent + ocfs2_journal_access_di ...

  • EPSS 0.01%
  • Veröffentlicht 04.10.2025 15:17:02
  • Zuletzt bearbeitet 21.03.2026 01:00:18

In the Linux kernel, the following vulnerability has been resolved: rcu-tasks: Avoid pr_info() with spin lock in cblist_init_generic() pr_info() is called with rtp->cbs_gbl_lock spin lock locked. Because pr_info() calls printk() that might sleep, ...

  • EPSS 0.02%
  • Veröffentlicht 04.10.2025 15:17:01
  • Zuletzt bearbeitet 21.03.2026 00:59:57

In the Linux kernel, the following vulnerability has been resolved: iavf: Fix use-after-free in free_netdev We do netif_napi_add() for all allocated q_vectors[], but potentially do netif_napi_del() for part of them, then kfree q_vectors and leave i...

  • EPSS 0.01%
  • Veröffentlicht 04.10.2025 15:16:55
  • Zuletzt bearbeitet 21.03.2026 00:31:51

In the Linux kernel, the following vulnerability has been resolved: net: usbnet: Fix WARNING in usbnet_start_xmit/usb_submit_urb The syzbot fuzzer identified a problem in the usbnet driver: usb 1-1: BOGUS urb xfer, pipe 3 != type 1 WARNING: CPU: 0...

  • EPSS 0.01%
  • Veröffentlicht 04.10.2025 15:16:54
  • Zuletzt bearbeitet 21.03.2026 00:32:30

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix sdma v4 sw fini error Fix sdma v4 sw fini error for sdma 4.2.2 to solve the following general protection fault [ +0.108196] general protection fault, probably for...

  • EPSS 0.02%
  • Veröffentlicht 04.10.2025 15:16:53
  • Zuletzt bearbeitet 25.03.2026 11:16:06

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: unmap and remove csa_va properly Root PD BO should be reserved before unmap and remove a bo_va from VM otherwise lockdep will complain. v2: check fpriv->csa_va is not ...

  • EPSS 0.02%
  • Veröffentlicht 04.10.2025 15:16:52
  • Zuletzt bearbeitet 21.03.2026 00:29:58

In the Linux kernel, the following vulnerability has been resolved: cpufreq: davinci: Fix clk use after free The remove function first frees the clks and only then calls cpufreq_unregister_driver(). If one of the cpufreq callbacks is called just be...