Canonical

Ubuntu Pro 14.04 LTS

4792 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 19.06.2022 22:15:08
  • Zuletzt bearbeitet 07.11.2023 03:42:14

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-33981. Reason: This candidate is a reservation duplicate of CVE-2022-33981. Notes: All CVE users should reference CVE-2022-33981 instead of this candidate. All references and des...

Exploit
  • EPSS 0.02%
  • Veröffentlicht 18.06.2022 16:15:08
  • Zuletzt bearbeitet 05.05.2025 17:18:15

drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.

  • EPSS 0.19%
  • Veröffentlicht 15.06.2022 21:15:09
  • Zuletzt bearbeitet 05.05.2025 17:17:41

Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

  • EPSS 0.45%
  • Veröffentlicht 15.06.2022 20:15:17
  • Zuletzt bearbeitet 05.05.2025 17:17:37

Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

  • EPSS 0.54%
  • Veröffentlicht 15.06.2022 20:15:17
  • Zuletzt bearbeitet 05.05.2025 17:17:37

Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

  • EPSS 0.03%
  • Veröffentlicht 15.06.2022 14:15:11
  • Zuletzt bearbeitet 21.11.2024 06:42:14

In ip_check_mc_rcu of igmp.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege when opening and closing inet sockets with no additional execution privileges needed. User interaction is not n...

  • EPSS 0.02%
  • Veröffentlicht 15.06.2022 14:15:11
  • Zuletzt bearbeitet 21.11.2024 06:42:16

In various methods of kernel base drivers, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitatio...

  • EPSS 0.08%
  • Veröffentlicht 15.06.2022 13:15:08
  • Zuletzt bearbeitet 21.11.2024 06:42:13

In lg_probe and related functions of hid-lg.c and other USB HID files, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure if a malicious USB HID device were plugged in, with no add...

  • EPSS 0.07%
  • Veröffentlicht 05.06.2022 22:15:08
  • Zuletzt bearbeitet 21.11.2024 07:06:07

The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. This occurs because of use of Algorithm 4 ("Double-Hash Port Selection Algorithm") of RFC 6056.

Exploit
  • EPSS 0.05%
  • Veröffentlicht 02.06.2022 14:15:32
  • Zuletzt bearbeitet 21.11.2024 06:40:46

An out-of-bounds read flaw was found in the Linux kernel’s TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc functi...