Canonical

Ubuntu Pro 14.04 LTS

4792 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 01.05.2026 14:14:23
  • Zuletzt bearbeitet 06.05.2026 20:56:34

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_hid: move list and spinlock inits from bind to alloc There was an issue when you did the following: - setup and bind an hid gadget - open /dev/hidg0 - use the result...

  • EPSS 0.01%
  • Veröffentlicht 01.05.2026 14:14:22
  • Zuletzt bearbeitet 06.05.2026 20:58:09

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_uac1_legacy: validate control request size f_audio_complete() copies req->length bytes into a 4-byte stack variable: u32 data = 0; memcpy(&data, req->buf, req->...

  • EPSS 0.01%
  • Veröffentlicht 30.04.2026 12:16:24
  • Zuletzt bearbeitet 07.05.2026 12:49:05

In the Linux kernel, the following vulnerability has been resolved: cifs: some missing initializations on replay In several places in the code, we have a label to signify the start of the code where a request can be replayed if necessary. However, ...

  • EPSS 0.01%
  • Veröffentlicht 30.04.2026 11:16:21
  • Zuletzt bearbeitet 06.05.2026 19:38:53

In the Linux kernel, the following vulnerability has been resolved: xen/privcmd: fix double free via VMA splitting privcmd_vm_ops defines .close (privcmd_close), but neither .may_split nor .open. When userspace does a partial munmap() on a privcmd ...

  • EPSS 0.01%
  • Veröffentlicht 30.04.2026 11:16:20
  • Zuletzt bearbeitet 06.05.2026 20:05:55

In the Linux kernel, the following vulnerability has been resolved: rtnetlink: add missing netlink_ns_capable() check for peer netns rtnl_newlink() lacks a CAP_NET_ADMIN capability check on the peer network namespace when creating paired devices (v...

  • EPSS 0.01%
  • Veröffentlicht 30.04.2026 11:16:20
  • Zuletzt bearbeitet 06.05.2026 19:44:30

In the Linux kernel, the following vulnerability has been resolved: Buffer overflow in drivers/xen/sys-hypervisor.c The build id returned by HYPERVISOR_xen_version(XENVER_build_id) is neither NUL terminated nor a string. The first causes a buffer ...

  • EPSS 0.01%
  • Veröffentlicht 27.04.2026 17:32:37
  • Zuletzt bearbeitet 06.05.2026 19:05:57

In the Linux kernel, the following vulnerability has been resolved: gpio: omap: do not register driver in probe() Commit 11a78b794496 ("ARM: OMAP: MPUIO wake updates") registers the omap_mpuio_driver from omap_mpuio_init(), which is called from oma...

  • EPSS 0.02%
  • Veröffentlicht 27.04.2026 17:32:37
  • Zuletzt bearbeitet 06.05.2026 18:36:57

In the Linux kernel, the following vulnerability has been resolved: driver core: enforce device_lock for driver_match_device() Currently, driver_match_device() is called from three sites. One site (__device_attach_driver) holds device_lock(dev), bu...

  • EPSS 0.01%
  • Veröffentlicht 27.04.2026 17:30:53
  • Zuletzt bearbeitet 06.05.2026 21:04:14

In the Linux kernel, the following vulnerability has been resolved: mm/kasan: fix double free for kasan pXds kasan_free_pxd() assumes the page table is always struct page aligned. But that's not always the case for all architectures. E.g. In cas...

  • EPSS 0.01%
  • Veröffentlicht 27.04.2026 15:16:04
  • Zuletzt bearbeitet 29.04.2026 04:16:38

A transient execution vulnerability within AMD CPUs may allow a local user-privileged attacker to leak data via the floating point divisor unit, potentially resulting in loss of confidentiality.