Canonical

Ubuntu Pro 14.04 LTS

4792 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Warnung
  • EPSS 14.4%
  • Veröffentlicht 02.12.2024 08:15:08
  • Zuletzt bearbeitet 04.11.2025 14:36:37

In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format This can lead to out of bounds writes since frames of this type were not taken into account when c...

  • EPSS 0.01%
  • Veröffentlicht 28.11.2024 15:15:17
  • Zuletzt bearbeitet 13.06.2025 20:15:22

In the Linux kernel, the following vulnerability has been resolved: can: bcm: Fix UAF in bcm_proc_show() BUG: KASAN: slab-use-after-free in bcm_proc_show+0x969/0xa80 Read of size 8 at addr ffff888155846230 by task cat/7862 CPU: 1 PID: 7862 Comm: c...

  • EPSS 0.01%
  • Veröffentlicht 25.11.2024 22:15:17
  • Zuletzt bearbeitet 12.05.2026 13:16:21

In the Linux kernel, the following vulnerability has been resolved: fs: Fix uninitialized value issue in from_kuid and from_kgid ocfs2_setattr() uses attr->ia_mode, attr->ia_uid and attr->ia_gid in a trace point even though ATTR_MODE, ATTR_UID and ...

  • EPSS 0.02%
  • Veröffentlicht 25.11.2024 22:15:16
  • Zuletzt bearbeitet 01.10.2025 21:16:30

In the Linux kernel, the following vulnerability has been resolved: drm/xe/ufence: Prefetch ufence addr to catch bogus address access_ok() only checks for addr overflow so also try to read the addr to catch invalid addr sent from userspace. (cherr...

  • EPSS 0.01%
  • Veröffentlicht 25.11.2024 22:15:16
  • Zuletzt bearbeitet 03.11.2025 21:17:25

In the Linux kernel, the following vulnerability has been resolved: bpf: Check validity of link->type in bpf_link_show_fdinfo() If a newly-added link type doesn't invoke BPF_LINK_TYPE(), accessing bpf_link_type_strs[link->type] may result in an out...

  • EPSS 2.59%
  • Veröffentlicht 22.11.2024 21:15:18
  • Zuletzt bearbeitet 03.11.2025 23:17:32

BlueZ HID over GATT Profile Improper Access Control Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of BlueZ. Authentication is not required to exploit this...

  • EPSS 0.02%
  • Veröffentlicht 19.11.2024 18:15:26
  • Zuletzt bearbeitet 03.11.2025 23:17:17

In the Linux kernel, the following vulnerability has been resolved: media: dvbdev: prevent the risk of out of memory access The dvbdev contains a static variable used to store dvb minors. The behavior of it depends if CONFIG_DVB_DYNAMIC_MINORS is ...

  • EPSS 0.02%
  • Veröffentlicht 19.11.2024 18:15:26
  • Zuletzt bearbeitet 03.11.2025 23:17:17

In the Linux kernel, the following vulnerability has been resolved: nfs: Fix KMSAN warning in decode_getfattr_attrs() Fix the following KMSAN warning: CPU: 1 UID: 0 PID: 7651 Comm: cp Tainted: G B Tainted: [B]=BAD_PAGE Hardware name: QEMU Stand...

  • EPSS 0.01%
  • Veröffentlicht 19.11.2024 18:15:25
  • Zuletzt bearbeitet 12.05.2026 13:16:21

In the Linux kernel, the following vulnerability has been resolved: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT In qdisc_tree_reduce_backlog, Qdiscs with major handle ffff: are assumed to be either root or ingress. This assumption is bog...

  • EPSS 0.02%
  • Veröffentlicht 19.11.2024 18:15:22
  • Zuletzt bearbeitet 03.11.2025 21:17:19

In the Linux kernel, the following vulnerability has been resolved: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find() The per-netns IP tunnel hash table is protected by the RTNL mutex and ip_tunnel_find() is only called from the...