Canonical

Ubuntu Pro 14.04 LTS

4792 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 02.05.2025 15:56:01
  • Zuletzt bearbeitet 10.11.2025 17:46:06

In the Linux kernel, the following vulnerability has been resolved: net: usb: smsc75xx: Limit packet length to skb->len Packet length retrieved from skb data may be larger than the actual socket buffer length (up to 9026 bytes). In such case the cl...

  • EPSS 0.06%
  • Veröffentlicht 02.05.2025 15:56:00
  • Zuletzt bearbeitet 10.11.2025 17:49:51

In the Linux kernel, the following vulnerability has been resolved: scsi: mpt3sas: Fix NULL pointer access in mpt3sas_transport_port_add() Port is allocated by sas_port_alloc_num() and rphy is allocated by either sas_end_device_alloc() or sas_expan...

  • EPSS 0.06%
  • Veröffentlicht 02.05.2025 15:55:58
  • Zuletzt bearbeitet 10.11.2025 17:50:22

In the Linux kernel, the following vulnerability has been resolved: tcp: tcp_make_synack() can be called from process context tcp_rtx_synack() now could be called in process context as explained in 0a375c822497 ("tcp: tcp_rtx_synack() can be called...

  • EPSS 0.02%
  • Veröffentlicht 02.05.2025 15:55:58
  • Zuletzt bearbeitet 08.05.2025 11:15:52

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

  • EPSS 0.06%
  • Veröffentlicht 02.05.2025 15:55:55
  • Zuletzt bearbeitet 10.11.2025 17:51:59

In the Linux kernel, the following vulnerability has been resolved: fs: prevent out-of-bounds array speculation when closing a file descriptor Google-Bug-Id: 114199369

  • EPSS 0.05%
  • Veröffentlicht 02.05.2025 15:55:48
  • Zuletzt bearbeitet 10.11.2025 17:54:19

In the Linux kernel, the following vulnerability has been resolved: net/iucv: Fix size of interrupt data iucv_irq_data needs to be 4 bytes larger. These bytes are not used by the iucv module, but written by the z/VM hypervisor in case a CPU is deco...

  • EPSS 0.07%
  • Veröffentlicht 02.05.2025 15:55:45
  • Zuletzt bearbeitet 10.11.2025 17:56:07

In the Linux kernel, the following vulnerability has been resolved: bonding: restore bond's IFF_SLAVE flag if a non-eth dev enslave fails syzbot reported a warning[1] where the bond device itself is a slave and we try to enslave a non-ethernet devi...

  • EPSS 0.07%
  • Veröffentlicht 02.05.2025 15:55:43
  • Zuletzt bearbeitet 10.11.2025 17:56:45

In the Linux kernel, the following vulnerability has been resolved: ext4: fix WARNING in ext4_update_inline_data Syzbot found the following issue: EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode:...

  • EPSS 0.07%
  • Veröffentlicht 02.05.2025 15:55:43
  • Zuletzt bearbeitet 10.11.2025 17:56:32

In the Linux kernel, the following vulnerability has been resolved: ext4: zero i_disksize when initializing the bootloader inode If the boot loader inode has never been used before, the EXT4_IOC_SWAP_BOOT inode will initialize it, including setting...

  • EPSS 0.1%
  • Veröffentlicht 02.05.2025 15:55:41
  • Zuletzt bearbeitet 12.11.2025 21:00:04

In the Linux kernel, the following vulnerability has been resolved: media: rc: gpio-ir-recv: add remove function In case runtime PM is enabled, do runtime PM clean up to remove cpu latency qos request, otherwise driver removal may have below kernel...