Canonical

Ubuntu Pro 14.04 LTS

4792 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 27.09.2024 13:15:16
  • Zuletzt bearbeitet 08.10.2024 18:23:52

In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: core: Remove SCSI host only if added If host tries to remove ufshcd driver from a UFS device it would cause a kernel panic if ufshcd_async_scan fails during ufshcd_probe...

  • EPSS 0.01%
  • Veröffentlicht 27.09.2024 13:15:16
  • Zuletzt bearbeitet 03.11.2025 23:16:07

In the Linux kernel, the following vulnerability has been resolved: um: line: always fill *error_out in setup_one_line() The pointer isn't initialized by callers, but I have encountered cases where it's still printed; initialize it in all possible ...

  • EPSS 0.02%
  • Veröffentlicht 27.09.2024 13:15:16
  • Zuletzt bearbeitet 03.11.2025 23:16:07

In the Linux kernel, the following vulnerability has been resolved: perf/x86/intel: Limit the period on Haswell Running the ltp test cve-2015-3290 concurrently reports the following warnings. perfevents: irq loop stuck! WARNING: CPU: 31 PID: 324...

  • EPSS 0.01%
  • Veröffentlicht 27.09.2024 13:15:15
  • Zuletzt bearbeitet 03.11.2025 23:16:05

In the Linux kernel, the following vulnerability has been resolved: ELF: fix kernel.randomize_va_space double read ELF loader uses "randomize_va_space" twice. It is sysctl and can change at any moment, so 2 loads could see 2 different values in the...

  • EPSS 0.01%
  • Veröffentlicht 27.09.2024 13:15:15
  • Zuletzt bearbeitet 03.11.2025 23:16:05

In the Linux kernel, the following vulnerability has been resolved: rtmutex: Drop rt_mutex::wait_lock before scheduling rt_mutex_handle_deadlock() is called with rt_mutex::wait_lock held. In the good case it returns with the lock held and in the d...

  • EPSS 0.01%
  • Veröffentlicht 27.09.2024 13:15:15
  • Zuletzt bearbeitet 03.11.2025 23:16:06

In the Linux kernel, the following vulnerability has been resolved: MIPS: cevt-r4k: Don't call get_c0_compare_int if timer irq is installed This avoids warning: [ 0.118053] BUG: sleeping function called from invalid context at kernel/locking/mu...

  • EPSS 0.02%
  • Veröffentlicht 27.09.2024 13:15:15
  • Zuletzt bearbeitet 09.10.2024 15:54:38

In the Linux kernel, the following vulnerability has been resolved: net: hns3: void array out of bound when loop tnl_num When query reg inf of SSU, it loops tnl_num times. However, tnl_num comes from hardware and the length of array is a fixed valu...

  • EPSS 0.01%
  • Veröffentlicht 27.09.2024 13:15:15
  • Zuletzt bearbeitet 09.10.2024 15:57:03

In the Linux kernel, the following vulnerability has been resolved: ethtool: fail closed if we can't get max channel used in indirection tables Commit 0d1b7d6c9274 ("bnxt: fix crashes when reducing ring count with active RSS contexts") proves that ...

  • EPSS 0.01%
  • Veröffentlicht 27.09.2024 13:15:15
  • Zuletzt bearbeitet 03.11.2025 23:16:06

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix smatch static checker warning adev->gfx.imu.funcs could be NULL

  • EPSS 0.02%
  • Veröffentlicht 27.09.2024 13:15:15
  • Zuletzt bearbeitet 03.11.2025 23:16:07

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: aspeed_udc: validate endpoint index for ast udc We should verify the bound of the array to assure that host may not manipulate the index to point past endpoint array. ...