Canonical

Ubuntu Pro 18.04 LTS

4807 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 04.12.2025 16:16:20
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In the Linux kernel, the following vulnerability has been resolved: be2net: pass wrb_params in case of OS2BMC be_insert_vlan_in_pkt() is called with the wrb_params argument being NULL at be_send_pkt_to_bmc() call site.  This may lead to dereferenci...

  • EPSS 0.03%
  • Veröffentlicht 04.12.2025 16:16:20
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Check the untrusted offset in FF-A memory share Verify the offset to prevent OOB access in the hypervisor FF-A buffer in case an untrusted large enough value [U32_MAX -...

  • EPSS 0.07%
  • Veröffentlicht 04.12.2025 16:16:19
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: remove never-working support for setting nsh fields The validation of the set(nsh(...)) action is completely wrong. It runs through the nsh_key_put_from_nlattr() ...

  • EPSS 0.06%
  • Veröffentlicht 04.12.2025 16:16:19
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In the Linux kernel, the following vulnerability has been resolved: scsi: sg: Do not sleep in atomic context sg_finish_rem_req() calls blk_rq_unmap_user(). The latter function may sleep. Hence, call sg_finish_rem_req() with interrupts enabled inste...

  • EPSS 0.03%
  • Veröffentlicht 04.12.2025 16:16:18
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In the Linux kernel, the following vulnerability has been resolved: drm/msm: Fix pgtable prealloc error path The following splat was reported: Unable to handle kernel NULL pointer dereference at virtual address 0000000000000010 Mem abort i...

  • EPSS 0.06%
  • Veröffentlicht 04.12.2025 16:16:18
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During connect(), acting on a signal/timeout by disconnecting an already established socket leads to several issues...

  • EPSS 0.03%
  • Veröffentlicht 04.12.2025 16:16:18
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Clean up only new IRQ glue on request_irq() failure The mlx5_irq_alloc() function can inadvertently free the entire rmap and end up in a crash[1] when the other threads t...

  • EPSS 0.05%
  • Veröffentlicht 04.12.2025 16:16:18
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In the Linux kernel, the following vulnerability has been resolved: net: qlogic/qede: fix potential out-of-bounds read in qede_tpa_cont() and qede_tpa_end() The loops in 'qede_tpa_cont()' and 'qede_tpa_end()', iterate over 'cqe->len_list[]' using o...

  • EPSS 0.06%
  • Veröffentlicht 04.12.2025 16:16:18
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In the Linux kernel, the following vulnerability has been resolved: s390/ctcm: Fix double-kfree The function 'mpc_rcvd_sweep_req(mpcginfo)' is called conditionally from function 'ctcmpc_unpack_skb'. It frees passed mpcginfo. After that a call to fu...

  • EPSS 0.04%
  • Veröffentlicht 04.12.2025 15:31:34
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In the Linux kernel, the following vulnerability has been resolved: nios2: ensure that memblock.current_limit is set when setting pfn limits On nios2, with CONFIG_FLATMEM set, the kernel relies on memblock_get_current_limit() to determine the limit...