Canonical

Ubuntu Pro 14.04 LTS

4792 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 17.05.2024 12:15:09
  • Zuletzt bearbeitet 18.09.2025 17:07:34

In the Linux kernel, the following vulnerability has been resolved: Revert "drm/amd/pm: resolve reboot exception for si oland" This reverts commit e490d60a2f76bff636c68ce4fe34c1b6c34bbd86. This causes hangs on SI when DC is enabled and errors on d...

  • EPSS 0.02%
  • Veröffentlicht 17.05.2024 12:15:09
  • Zuletzt bearbeitet 18.09.2025 17:26:45

In the Linux kernel, the following vulnerability has been resolved: phonet/pep: fix racy skb_queue_empty() use The receive queues are protected by their respective spin-lock, not the socket lock. This could lead to skb_peek() unexpectedly returning...

  • EPSS 0.06%
  • Veröffentlicht 16.05.2024 21:16:03
  • Zuletzt bearbeitet 15.04.2026 00:35:42

Hardware logic with insecure de-synchronization in Intel(R) DSA and Intel(R) IAA for some Intel(R) 4th or 5th generation Xeon(R) processors may allow an authorized user to potentially enable escalation of privilege local access

  • EPSS 0.13%
  • Veröffentlicht 15.05.2024 18:15:10
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In the Linux kernel through 6.9, an untrusted hypervisor can inject virtual interrupts 0 and 14 at any point in time and can trigger the SIGFPE signal handler in userspace applications. This affects AMD SEV-SNP and AMD SEV-ES.

  • EPSS 0.01%
  • Veröffentlicht 14.05.2024 15:12:29
  • Zuletzt bearbeitet 22.01.2026 20:39:28

In the Linux kernel, the following vulnerability has been resolved: firewire: nosy: ensure user_length is taken into account when fetching packet contents Ensure that packet_buffer_get respects the user_length provided. If the length of the head pa...

  • EPSS 0.01%
  • Veröffentlicht 14.05.2024 15:12:28
  • Zuletzt bearbeitet 22.01.2026 20:37:12

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout There is a race condition between l2cap_chan_timeout() and l2cap_chan_del(). When we use l2cap_chan_del() to delete the c...

  • EPSS 0.01%
  • Veröffentlicht 14.05.2024 14:23:13
  • Zuletzt bearbeitet 18.09.2025 17:08:40

In the Linux kernel, the following vulnerability has been resolved: usb: aqc111: check packet for fixup for true limit If a device sends a packet that is inbetween 0 and sizeof(u64) the value passed to skb_trim() as length will wrap around ending u...

  • EPSS 0.01%
  • Veröffentlicht 14.05.2024 14:23:13
  • Zuletzt bearbeitet 23.12.2025 18:56:05

In the Linux kernel, the following vulnerability has been resolved: io_uring: drop any code related to SCM_RIGHTS This is dead code after we dropped support for passing io_uring fds over SCM_RIGHTS, get rid of it.

  • EPSS 0.01%
  • Veröffentlicht 07.05.2024 23:15:13
  • Zuletzt bearbeitet 14.08.2025 01:42:25

Linux Kernel Bluetooth CMTP Module Double Free Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel. An attacker must first obtain the ability to execute high-p...

  • EPSS 0.02%
  • Veröffentlicht 03.05.2024 18:15:08
  • Zuletzt bearbeitet 26.12.2024 20:38:14

In the Linux kernel, the following vulnerability has been resolved: scsi: mpt3sas: Fix use-after-free warning Fix the following use-after-free warning which is observed during controller reset: refcount_t: underflow; use-after-free. WARNING: CPU: ...