Canonical

Ubuntu Pro 14.04 LTS

4792 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Veröffentlicht 26.02.2025 07:01:32
  • Zuletzt bearbeitet 01.10.2025 20:16:47

In the Linux kernel, the following vulnerability has been resolved: crypto: qat - add param check for DH Reject requests with a source buffer that is bigger than the size of the key. This is to prevent a possible integer underflow that might happen...

  • EPSS 0.01%
  • Veröffentlicht 26.02.2025 07:01:32
  • Zuletzt bearbeitet 23.12.2025 14:16:16

In the Linux kernel, the following vulnerability has been resolved: mm/mempolicy: fix uninit-value in mpol_rebind_policy() mpol_set_nodemask()(mm/mempolicy.c) does not set up nodemask when pol->mode is MPOL_LOCAL. Check pol->mode before access pol...

  • EPSS 0.21%
  • Veröffentlicht 26.02.2025 07:01:32
  • Zuletzt bearbeitet 01.10.2025 20:16:48

In the Linux kernel, the following vulnerability has been resolved: KVM: Don't null dereference ops->destroy A KVM device cleanup happens in either of two callbacks: 1) destroy() which is called when the VM is being destroyed; 2) release() which is...

  • EPSS 0.01%
  • Veröffentlicht 26.02.2025 07:01:32
  • Zuletzt bearbeitet 01.10.2025 20:16:49

In the Linux kernel, the following vulnerability has been resolved: tcp: Fix data-races around sysctl_tcp_slow_start_after_idle. While reading sysctl_tcp_slow_start_after_idle, it can be changed concurrently. Thus, we need to add READ_ONCE() to it...

  • EPSS 0.05%
  • Veröffentlicht 26.02.2025 07:01:32
  • Zuletzt bearbeitet 01.10.2025 20:16:49

In the Linux kernel, the following vulnerability has been resolved: tcp: Fix a data-race around sysctl_tcp_early_retrans. While reading sysctl_tcp_early_retrans, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.

  • EPSS 0.09%
  • Veröffentlicht 26.02.2025 07:01:30
  • Zuletzt bearbeitet 01.10.2025 20:16:38

In the Linux kernel, the following vulnerability has been resolved: cifs: fix potential double free during failed mount RHBZ: https://bugzilla.redhat.com/show_bug.cgi?id=2088799

  • EPSS 0.06%
  • Veröffentlicht 26.02.2025 07:01:30
  • Zuletzt bearbeitet 01.10.2025 20:16:39

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Move cfg_log_verbose check before calling lpfc_dmp_dbg() In an attempt to log message 0126 with LOG_TRACE_EVENT, the following hard lockup call trace hangs the system. ...

  • EPSS 0.09%
  • Veröffentlicht 26.02.2025 07:01:30
  • Zuletzt bearbeitet 22.10.2025 17:15:36

In the Linux kernel, the following vulnerability has been resolved: ath11k: fix the warning of dev_wake in mhi_pm_disable_transition() When test device recovery with below command, it has warning in message as below. echo assert > /sys/kernel/debug...

  • EPSS 0.06%
  • Veröffentlicht 26.02.2025 07:01:30
  • Zuletzt bearbeitet 01.10.2025 20:16:39

In the Linux kernel, the following vulnerability has been resolved: ipw2x00: Fix potential NULL dereference in libipw_xmit() crypt and crypt->ops could be null, so we need to checking null before dereference

  • EPSS 0.02%
  • Veröffentlicht 26.02.2025 07:01:30
  • Zuletzt bearbeitet 22.10.2025 17:15:16

In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Cancel pending work at closing a MIDI substream At closing a USB MIDI output substream, there might be still a pending work, which would eventually access the rawm...