Canonical

Ubuntu Pro 14.04 LTS

4792 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 27.02.2025 03:15:12
  • Zuletzt bearbeitet 22.10.2025 19:37:21

In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Fix for out-of bound access error Selfgen stats are placed in a buffer using print_array_to_buf_index() function. Array length parameter passed to the function is too...

  • EPSS 0.02%
  • Veröffentlicht 27.02.2025 03:15:12
  • Zuletzt bearbeitet 12.05.2026 13:16:26

In the Linux kernel, the following vulnerability has been resolved: safesetid: check size of policy writes syzbot attempts to write a buffer with a large size to a sysfs entry with writes handled by handle_policy_update(), triggering a warning in k...

  • EPSS 0.02%
  • Veröffentlicht 27.02.2025 03:15:12
  • Zuletzt bearbeitet 12.05.2026 13:16:26

In the Linux kernel, the following vulnerability has been resolved: printk: Fix signed integer overflow when defining LOG_BUF_LEN_MAX Shifting 1 << 31 on a 32-bit int causes signed integer overflow, which leads to undefined behavior. To prevent thi...

  • EPSS 0.01%
  • Veröffentlicht 27.02.2025 03:15:12
  • Zuletzt bearbeitet 22.10.2025 19:36:06

In the Linux kernel, the following vulnerability has been resolved: nvkm: correctly calculate the available space of the GSP cmdq buffer r535_gsp_cmdq_push() waits for the available page in the GSP cmdq buffer when handling a large RPC request. Whe...

  • EPSS 0.01%
  • Veröffentlicht 27.02.2025 03:15:12
  • Zuletzt bearbeitet 28.10.2025 20:41:36

In the Linux kernel, the following vulnerability has been resolved: nvkm/gsp: correctly advance the read pointer of GSP message queue A GSP event message consists three parts: message header, RPC header, message body. GSP calculates the number of p...

  • EPSS 0.02%
  • Veröffentlicht 27.02.2025 03:15:11
  • Zuletzt bearbeitet 03.11.2025 20:16:57

In the Linux kernel, the following vulnerability has been resolved: ocfs2: handle a symlink read error correctly Patch series "Convert ocfs2 to use folios". Mark did a conversion of ocfs2 to use folios and sent it to me as a giant patch for review...

  • EPSS 0.02%
  • Veröffentlicht 27.02.2025 03:15:11
  • Zuletzt bearbeitet 12.05.2026 13:16:25

In the Linux kernel, the following vulnerability has been resolved: tpm: Change to kvalloc() in eventlog/acpi.c The following failure was reported on HPE ProLiant D320: [ 10.693310][ T1] tpm_tis STM0925:00: 2.0 TPM (device-id 0x3, rev-id 0) [...

  • EPSS 0.01%
  • Veröffentlicht 27.02.2025 03:15:10
  • Zuletzt bearbeitet 01.10.2025 20:17:16

In the Linux kernel, the following vulnerability has been resolved: drm/msm/gem: prevent integer overflow in msm_ioctl_gem_submit() The "submit->cmd[i].size" and "submit->cmd[i].offset" variables are u32 values that come from the user via the submi...

  • EPSS 0.06%
  • Veröffentlicht 27.02.2025 03:15:10
  • Zuletzt bearbeitet 23.10.2025 13:05:38

In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Mark inode as bad as soon as error detected in mi_enum_attr() Extended the `mi_enum_attr()` function interface with an additional parameter, `struct ntfs_inode *ni`, to a...

  • EPSS 0.02%
  • Veröffentlicht 27.02.2025 03:15:10
  • Zuletzt bearbeitet 23.10.2025 13:05:11

In the Linux kernel, the following vulnerability has been resolved: NFS: Fix potential buffer overflowin nfs_sysfs_link_rpc_client() name is char[64] where the size of clnt->cl_program->name remains unknown. Invoking strcat() directly will also lea...