Canonical

Ubuntu Pro 14.04 LTS

4792 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 12.07.2024 13:15:13
  • Zuletzt bearbeitet 03.11.2025 22:17:11

In the Linux kernel, the following vulnerability has been resolved: jfs: xattr: fix buffer overflow for invalid xattr When an xattr size is not what is expected, it is printed out to the kernel log in hex format as a form of debugging. But when th...

  • EPSS 0.01%
  • Veröffentlicht 12.07.2024 13:15:13
  • Zuletzt bearbeitet 03.11.2025 22:17:12

In the Linux kernel, the following vulnerability has been resolved: USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages The syzbot fuzzer found that the interrupt-URB completion callback in the cdc-wdm driver was taking too long, a...

  • EPSS 0.01%
  • Veröffentlicht 12.07.2024 13:15:12
  • Zuletzt bearbeitet 03.11.2025 22:17:05

In the Linux kernel, the following vulnerability has been resolved: vmci: prevent speculation leaks by sanitizing event in event_deliver() Coverity spotted that event_msg is controlled by user-space, event_msg->event_data.event is passed to event_d...

  • EPSS 0%
  • Veröffentlicht 12.07.2024 13:15:12
  • Zuletzt bearbeitet 03.11.2025 22:17:05

In the Linux kernel, the following vulnerability has been resolved: sock_map: avoid race between sock_map_close and sk_psock_put sk_psock_get will return NULL if the refcount of psock has gone to 0, which will happen when the last call of sk_psock_...

  • EPSS 0.2%
  • Veröffentlicht 12.07.2024 13:15:12
  • Zuletzt bearbeitet 10.05.2025 15:15:58

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

  • EPSS 0.01%
  • Veröffentlicht 09.07.2024 10:15:04
  • Zuletzt bearbeitet 03.11.2025 22:17:04

In the Linux kernel, the following vulnerability has been resolved: bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set() In function bond_option_arp_ip_targets_set(), if newval->string is an empty string, newval->string+1 will point ...

  • EPSS 0.02%
  • Veröffentlicht 05.07.2024 07:15:10
  • Zuletzt bearbeitet 21.11.2024 09:27:46

In the Linux kernel, the following vulnerability has been resolved: kdb: Fix buffer overflow during tab-complete Currently, when the user attempts symbol completion with the Tab key, kdb will use strncpy() to insert the completed symbol into the co...

  • EPSS 0.03%
  • Veröffentlicht 05.07.2024 07:15:10
  • Zuletzt bearbeitet 03.11.2025 22:17:04

In the Linux kernel, the following vulnerability has been resolved: mmc: davinci: Don't strip remove function when driver is builtin Using __exit for the remove function results in the remove callback being discarded with CONFIG_MMC_DAVINCI=y. When...

Medienbericht
  • EPSS 0.08%
  • Veröffentlicht 05.07.2024 02:15:09
  • Zuletzt bearbeitet 04.11.2025 18:15:49

The IPv6 implementation in the Linux kernel before 6.3 has a net/ipv6/route.c max_size threshold that can be consumed easily, e.g., leading to a denial of service (network is unreachable errors) when IPv6 packets are sent in a loop via a raw socket.

  • EPSS 0.11%
  • Veröffentlicht 27.06.2024 23:15:50
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In the Linux kernel before 4.8, usb_parse_endpoint in drivers/usb/core/config.c does not validate the wMaxPacketSize field of an endpoint descriptor. NOTE: This vulnerability only affects products that are no longer supported by the supplier.