Canonical

Ubuntu Pro 14.04 LTS

4792 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 27.02.2025 02:15:13
  • Zuletzt bearbeitet 12.05.2026 13:16:25

In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: don't allow 1 packet limit The current implementation does not work correctly with a limit of 1. iproute2 actually checks for this and this patch adds the check...

  • EPSS 0.02%
  • Veröffentlicht 27.02.2025 02:15:11
  • Zuletzt bearbeitet 12.05.2026 13:16:25

In the Linux kernel, the following vulnerability has been resolved: pps: Fix a use-after-free On a board running ntpd and gpsd, I'm seeing a consistent use-after-free in sys_exit() from gpsd when rebooting: pps pps1: removed ------------[ ...

  • EPSS 0.02%
  • Veröffentlicht 27.02.2025 02:15:11
  • Zuletzt bearbeitet 03.11.2025 20:16:56

In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix double free in error path If the uvc_status_init() function fails to allocate the int_urb, it will free the dev->status pointer but doesn't reset the pointer t...

  • EPSS 0.02%
  • Veröffentlicht 27.02.2025 02:15:10
  • Zuletzt bearbeitet 03.11.2025 20:16:55

In the Linux kernel, the following vulnerability has been resolved: rdma/cxgb4: Prevent potential integer overflow on 32bit The "gl->tot_len" variable is controlled by the user. It comes from process_responses(). On 32bit systems, the "gl->tot_le...

  • EPSS 0.01%
  • Veröffentlicht 27.02.2025 02:15:10
  • Zuletzt bearbeitet 23.10.2025 18:00:26

In the Linux kernel, the following vulnerability has been resolved: udp: Deal with race between UDP socket address change and rehash If a UDP socket changes its local address while it's receiving datagrams, as a result of connect(), there is a peri...

  • EPSS 0.02%
  • Veröffentlicht 27.02.2025 02:15:10
  • Zuletzt bearbeitet 23.10.2025 17:59:01

In the Linux kernel, the following vulnerability has been resolved: btrfs: do proper folio cleanup when run_delalloc_nocow() failed [BUG] With CONFIG_DEBUG_VM set, test case generic/476 has some chance to crash with the following VM_BUG_ON_FOLIO():...

  • EPSS 0.01%
  • Veröffentlicht 27.02.2025 02:15:10
  • Zuletzt bearbeitet 23.10.2025 17:58:15

In the Linux kernel, the following vulnerability has been resolved: btrfs: do proper folio cleanup when cow_file_range() failed [BUG] When testing with COW fixup marked as BUG_ON() (this is involved with the new pin_user_pages*() change, which shou...

  • EPSS 0.01%
  • Veröffentlicht 27.02.2025 02:15:10
  • Zuletzt bearbeitet 12.05.2026 13:16:24

In the Linux kernel, the following vulnerability has been resolved: memcg: fix soft lockup in the OOM process A soft lockup issue was found in the product with about 56,000 tasks were in the OOM cgroup, it was traversing them when the soft lockup w...

  • EPSS 0.01%
  • Veröffentlicht 26.02.2025 07:01:48
  • Zuletzt bearbeitet 01.10.2025 20:17:08

In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix signed integer overflow in l2tp_ip6_sendmsg When len >= INT_MAX - transhdrlen, ulen = len + transhdrlen will be overflow. To fix, we can follow what udpv6 does and subtra...

  • EPSS 0.01%
  • Veröffentlicht 26.02.2025 07:01:48
  • Zuletzt bearbeitet 03.11.2025 20:15:59

In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix signed integer overflow in __ip6_append_data Resurrect ubsan overflow checks and ubsan report this warning, fix it by change the variable [length] type to size_t. UBSAN:...