Canonical

Ubuntu Pro 18.04 LTS

4807 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Veröffentlicht 30.12.2025 12:11:09
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In the Linux kernel, the following vulnerability has been resolved: tracing: Fix warning in trace_buffered_event_disable() Warning happened in trace_buffered_event_disable() at WARN_ON_ONCE(!trace_buffered_event_ref) Call Trace: ? __warn+0x...

  • EPSS 0.03%
  • Veröffentlicht 30.12.2025 12:11:06
  • Zuletzt bearbeitet 26.02.2026 18:44:31

In the Linux kernel, the following vulnerability has been resolved: HID: uclogic: Correct devm device reference for hidinput input_dev name Reference the HID device rather than the input device for the devm allocation of the input_dev name. Referen...

  • EPSS 0.03%
  • Veröffentlicht 30.12.2025 12:11:01
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix type of second parameter in odn_edit_dpm_table() callback With clang's kernel control flow integrity (kCFI, CONFIG_CFI_CLANG), indirect call targets are validated a...

  • EPSS 0.04%
  • Veröffentlicht 30.12.2025 12:11:00
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In the Linux kernel, the following vulnerability has been resolved: drm/virtio: Check whether transferred 2D BO is shmem Transferred 2D BO always must be a shmem BO. Add check for that to prevent NULL dereference if userspace passes a VRAM BO.

  • EPSS 0.04%
  • Veröffentlicht 30.12.2025 12:10:59
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Add overflow check for attribute size The offset addition could overflow and pass the used size check given an attribute with very large size (e.g., 0xffffff7f) while par...

  • EPSS 0.04%
  • Veröffentlicht 30.12.2025 12:10:58
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In the Linux kernel, the following vulnerability has been resolved: jbd2: fix potential buffer head reference count leak As in 'jbd2_fc_wait_bufs' if buffer isn't uptodate, will return -EIO without update 'journal->j_fc_off'. But 'jbd2_fc_release_b...

  • EPSS 0.04%
  • Veröffentlicht 30.12.2025 12:10:55
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In the Linux kernel, the following vulnerability has been resolved: jbd2: add miss release buffer head in fc_do_one_pass() In fc_do_one_pass() miss release buffer head after use which will lead to reference count leak.

  • EPSS 0.05%
  • Veröffentlicht 30.12.2025 12:10:53
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In the Linux kernel, the following vulnerability has been resolved: wifi: wilc1000: fix potential memory leak in wilc_mac_xmit() The wilc_mac_xmit() returns NETDEV_TX_OK without freeing skb, add dev_kfree_skb() to fix it. Compile tested only.

  • EPSS 0.05%
  • Veröffentlicht 30.12.2025 12:10:50
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In the Linux kernel, the following vulnerability has been resolved: clk: zynqmp: Fix stack-out-of-bounds in strncpy` "BUG: KASAN: stack-out-of-bounds in strncpy+0x30/0x68" Linux-ATF interface is using 16 bytes of SMC payload. In case clock name is...

  • EPSS 0.03%
  • Veröffentlicht 30.12.2025 12:09:06
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In the Linux kernel, the following vulnerability has been resolved: drm/i915: fix race condition UAF in i915_perf_add_config_ioctl Userspace can guess the id value and try to race oa_config object creation with config remove, resulting in a use-aft...