Canonical

Ubuntu Pro 14.04 LTS

4792 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 25.04.2026 08:47:02
  • Zuletzt bearbeitet 06.05.2026 21:08:10

In the Linux kernel, the following vulnerability has been resolved: netfilter: ip6t_eui64: reject invalid MAC header for all packets `eui64_mt6()` derives a modified EUI-64 from the Ethernet source address and compares it with the low 64 bits of th...

  • EPSS 0.01%
  • Veröffentlicht 25.04.2026 08:47:00
  • Zuletzt bearbeitet 06.05.2026 21:14:05

In the Linux kernel, the following vulnerability has been resolved: batman-adv: avoid OGM aggregation when skb tailroom is insufficient When OGM aggregation state is toggled at runtime, an existing forwarded packet may have been allocated with only...

  • EPSS 0.01%
  • Veröffentlicht 25.04.2026 08:46:57
  • Zuletzt bearbeitet 06.05.2026 21:21:50

In the Linux kernel, the following vulnerability has been resolved: netfilter: xt_multiport: validate range encoding in checkentry ports_match_v1() treats any non-zero pflags entry as the start of a port range and unconditionally consumes the next ...

  • EPSS 0.01%
  • Veröffentlicht 25.04.2026 08:46:56
  • Zuletzt bearbeitet 06.05.2026 21:23:31

In the Linux kernel, the following vulnerability has been resolved: net: ipv6: flowlabel: defer exclusive option free until RCU teardown `ip6fl_seq_show()` walks the global flowlabel hash under the seq-file RCU read-side lock and prints `fl->opt->o...

  • EPSS 0.06%
  • Veröffentlicht 25.04.2026 08:46:52
  • Zuletzt bearbeitet 06.05.2026 21:31:48

In the Linux kernel, the following vulnerability has been resolved: rxrpc: only handle RESPONSE during service challenge Only process RESPONSE packets while the service connection is still in RXRPC_CONN_SERVICE_CHALLENGING. Check that state under s...

  • EPSS 0.01%
  • Veröffentlicht 25.04.2026 08:46:51
  • Zuletzt bearbeitet 06.05.2026 21:33:21

In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_netem: fix out-of-bounds access in packet corruption In netem_enqueue(), the packet corruption logic uses get_random_u32_below(skb_headlen(skb)) to select an index f...

  • EPSS 0.01%
  • Veröffentlicht 25.04.2026 08:46:50
  • Zuletzt bearbeitet 06.05.2026 21:34:51

In the Linux kernel, the following vulnerability has been resolved: netfilter: ip6t_rt: reject oversized addrnr in rt_mt6_check() Reject rt match rules whose addrnr exceeds IP6T_RT_HOPS. rt_mt6() expects addrnr to stay within the bounds of rtinfo-...

  • EPSS 0.01%
  • Veröffentlicht 25.04.2026 08:46:49
  • Zuletzt bearbeitet 06.05.2026 21:36:13

In the Linux kernel, the following vulnerability has been resolved: af_unix: read UNIX_DIAG_VFS data under unix_state_lock Exact UNIX diag lookups hold a reference to the socket, but not to u->path. Meanwhile, unix_release_sock() clears u->path und...

  • EPSS 0.02%
  • Veröffentlicht 24.04.2026 14:45:18
  • Zuletzt bearbeitet 27.04.2026 20:11:39

In the Linux kernel, the following vulnerability has been resolved: xfrm_user: fix info leak in build_report() struct xfrm_user_report is a __u8 proto field followed by a struct xfrm_selector which means there is three "empty" bytes of padding, but...

  • EPSS 0.01%
  • Veröffentlicht 24.04.2026 14:45:17
  • Zuletzt bearbeitet 27.04.2026 20:10:26

In the Linux kernel, the following vulnerability has been resolved: net: rfkill: prevent unlimited numbers of rfkill events from being created Userspace can create an unlimited number of rfkill events if the system is so configured, while not consu...