Canonical

Ubuntu Pro 14.04 LTS

4792 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 04.03.2026 14:36:38
  • Zuletzt bearbeitet 17.03.2026 21:21:25

In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid UAF in f2fs_write_end_io() As syzbot reported an use-after-free issue in f2fs_write_end_io(). It is caused by below race condition: loop device umount - wor...

  • EPSS 0.01%
  • Veröffentlicht 04.03.2026 14:36:36
  • Zuletzt bearbeitet 17.03.2026 21:21:58

In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix bsg_done() causing double free Kernel panic observed on system, [5353358.825191] BUG: unable to handle page fault for address: ff5f5e897b024000 [5353358.825194]...

  • EPSS 0.01%
  • Veröffentlicht 18.02.2026 20:29:15
  • Zuletzt bearbeitet 15.04.2026 00:35:42

The Linux Kernel lockdown mode for kernel versions starting on 6.12 and above for Fedora Linux has the lockdown mode disabled without any warning. This may allow an attacker to gain access to sensitive information such kernel memory mappings, I/O por...

  • EPSS 0.01%
  • Veröffentlicht 18.02.2026 14:53:30
  • Zuletzt bearbeitet 18.04.2026 09:16:14

In the Linux kernel, the following vulnerability has been resolved: drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free Exynos Virtual Display driver performs memory alloc/free operations wit...

Medienbericht
  • EPSS 0.02%
  • Veröffentlicht 18.02.2026 14:53:29
  • Zuletzt bearbeitet 02.04.2026 15:16:23

In the Linux kernel, the following vulnerability has been resolved: ksmbd: add chann_lock to protect ksmbd_chann_list xarray ksmbd_chann_list xarray lacks synchronization, allowing use-after-free in multi-channel sessions (between lookup_chann_list...

  • EPSS 0.03%
  • Veröffentlicht 18.02.2026 14:53:23
  • Zuletzt bearbeitet 18.04.2026 09:16:14

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix infinite loop caused by next_smb2_rcv_hdr_off reset in error paths The problem occurs when a signed request fails smb2 signature verification check. In __process_request...

  • EPSS 0.02%
  • Veröffentlicht 18.02.2026 14:53:13
  • Zuletzt bearbeitet 18.03.2026 17:27:35

In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: Fix alignment fault in rtw_core_enable_beacon() rtw_core_enable_beacon() reads 4 bytes from an address that is not a multiple of 4. This results in a crash on some sys...

  • EPSS 0.02%
  • Veröffentlicht 18.02.2026 14:21:54
  • Zuletzt bearbeitet 18.03.2026 17:36:43

In the Linux kernel, the following vulnerability has been resolved: riscv: trace: fix snapshot deadlock with sbi ecall If sbi_ecall.c's functions are traceable, echo "__sbi_ecall:snapshot" > /sys/kernel/tracing/set_ftrace_filter may get the kerne...

  • EPSS 0.02%
  • Veröffentlicht 18.02.2026 14:21:53
  • Zuletzt bearbeitet 18.03.2026 20:28:20

In the Linux kernel, the following vulnerability has been resolved: scsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count() In iscsit_dec_conn_usage_count(), the function calls complete() while holding the conn->conn_usage_lock. As...

  • EPSS 0.02%
  • Veröffentlicht 18.02.2026 14:21:52
  • Zuletzt bearbeitet 18.03.2026 20:30:20

In the Linux kernel, the following vulnerability has been resolved: x86/vmware: Fix hypercall clobbers Fedora QA reported the following panic: BUG: unable to handle page fault for address: 0000000040003e54 #PF: supervisor write access in kerne...