Canonical

Ubuntu Pro 14.04 LTS

4792 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 22.04.2026 14:16:43
  • Zuletzt bearbeitet 07.05.2026 18:18:57

In the Linux kernel, the following vulnerability has been resolved: virtio_net: Fix UAF on dst_ops when IFF_XMIT_DST_RELEASE is cleared and napi_tx is false A UAF issue occurs when the virtio_net driver is configured with napi_tx=N and the device's...

  • EPSS 0.03%
  • Veröffentlicht 22.04.2026 14:16:42
  • Zuletzt bearbeitet 07.05.2026 18:28:45

In the Linux kernel, the following vulnerability has been resolved: scsi: ibmvfc: Fix OOB access in ibmvfc_discover_targets_done() A malicious or compromised VIO server can return a num_written value in the discover targets MAD response that exceed...

  • EPSS 0.06%
  • Veröffentlicht 22.04.2026 14:16:42
  • Zuletzt bearbeitet 07.05.2026 18:21:40

In the Linux kernel, the following vulnerability has been resolved: erofs: add GFP_NOIO in the bio completion if needed The bio completion path in the process context (e.g. dm-verity) will directly call into decompression rather than trigger anothe...

  • EPSS 0.01%
  • Veröffentlicht 22.04.2026 14:16:41
  • Zuletzt bearbeitet 07.05.2026 18:34:46

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix drm_edid leak in amdgpu_dm [WHAT] When a sink is connected, aconnector->drm_edid was overwritten without freeing the previous allocation, causing a memory leak...

  • EPSS 0.01%
  • Veröffentlicht 22.04.2026 14:16:41
  • Zuletzt bearbeitet 07.05.2026 18:32:30

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: prevent immediate PASID reuse case PASID resue could cause interrupt issue when process immediately runs into hw state left by previous process exited with the same PAS...

  • EPSS 0.06%
  • Veröffentlicht 22.04.2026 14:16:39
  • Zuletzt bearbeitet 06.05.2026 19:53:42

In the Linux kernel, the following vulnerability has been resolved: ext4: publish jinode after initialization ext4_inode_attach_jinode() publishes ei->jinode to concurrent users. It used to set ei->jinode before jbd2_journal_init_jbd_inode(), allow...

  • EPSS 0.01%
  • Veröffentlicht 22.04.2026 14:16:39
  • Zuletzt bearbeitet 06.05.2026 19:55:13

In the Linux kernel, the following vulnerability has been resolved: ext4: replace BUG_ON with proper error handling in ext4_read_inline_folio Replace BUG_ON() with proper error handling when inline data size exceeds PAGE_SIZE. This prevents kernel ...

  • EPSS 0.01%
  • Veröffentlicht 22.04.2026 14:16:39
  • Zuletzt bearbeitet 06.05.2026 20:12:35

In the Linux kernel, the following vulnerability has been resolved: ext4: convert inline data to extents when truncate exceeds inline size Add a check in ext4_setattr() to convert files from inline data storage to extent-based storage when truncate...

  • EPSS 0.01%
  • Veröffentlicht 22.04.2026 14:16:38
  • Zuletzt bearbeitet 07.05.2026 19:18:42

In the Linux kernel, the following vulnerability has been resolved: ext4: reject mount if bigalloc with s_first_data_block != 0 bigalloc with s_first_data_block != 0 is not supported, reject mounting it.

  • EPSS 0.07%
  • Veröffentlicht 22.04.2026 14:16:38
  • Zuletzt bearbeitet 07.05.2026 18:43:29

In the Linux kernel, the following vulnerability has been resolved: ext4: avoid infinite loops caused by residual data On the mkdir/mknod path, when mapping logical blocks to physical blocks, if inserting a new extent into the extent tree fails (in...