Canonical

Ubuntu Pro 14.04 LTS

4792 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 19.01.2025 11:15:09
  • Zuletzt bearbeitet 12.05.2026 13:16:29

In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: auth_enable: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different r...

  • EPSS 0.03%
  • Veröffentlicht 19.01.2025 11:15:09
  • Zuletzt bearbeitet 12.05.2026 13:16:30

In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: rto_min/max: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different r...

  • EPSS 0.03%
  • Veröffentlicht 19.01.2025 11:15:09
  • Zuletzt bearbeitet 12.05.2026 13:16:30

In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for differe...

  • EPSS -
  • Veröffentlicht 17.01.2025 23:15:12
  • Zuletzt bearbeitet 17.01.2025 23:15:12

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

  • EPSS 0.03%
  • Veröffentlicht 15.01.2025 13:15:14
  • Zuletzt bearbeitet 06.04.2026 14:01:29

In the Linux kernel, the following vulnerability has been resolved: ksmbd: set ATTR_CTIME flags when setting mtime David reported that the new warning from setattr_copy_mgtime is coming like the following. [ 113.215316] ------------[ cut here ]--...

  • EPSS 0.01%
  • Veröffentlicht 15.01.2025 13:15:14
  • Zuletzt bearbeitet 03.11.2025 21:18:39

In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: Correct the migration DMA map direction The SVM DMA device map direction should be set the same as the DMA unmap setting, otherwise the DMA core will report the followi...

  • EPSS 0.03%
  • Veröffentlicht 15.01.2025 13:15:14
  • Zuletzt bearbeitet 17.10.2025 16:11:24

In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: clear link ID from bitmap during link delete after clean up Currently, during link deletion, the link ID is first removed from the valid_links bitmap before perform...

  • EPSS 0.03%
  • Veröffentlicht 15.01.2025 13:15:14
  • Zuletzt bearbeitet 17.10.2025 16:09:44

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fix mbss changed flags corruption on 32 bit systems On 32-bit systems, the size of an unsigned long is 4 bytes, while a u64 is 8 bytes. Therefore, when using or_eac...

  • EPSS 0.01%
  • Veröffentlicht 15.01.2025 13:15:14
  • Zuletzt bearbeitet 12.05.2026 13:16:23

In the Linux kernel, the following vulnerability has been resolved: af_packet: fix vlan_get_protocol_dgram() vs MSG_PEEK Blamed commit forgot MSG_PEEK case, allowing a crash [1] as found by syzbot. Rework vlan_get_protocol_dgram() to not touch skb...

  • EPSS 0.01%
  • Veröffentlicht 15.01.2025 13:15:14
  • Zuletzt bearbeitet 12.05.2026 13:16:23

In the Linux kernel, the following vulnerability has been resolved: af_packet: fix vlan_get_tci() vs MSG_PEEK Blamed commit forgot MSG_PEEK case, allowing a crash [1] as found by syzbot. Rework vlan_get_tci() to not touch skb at all, so that it ca...