Canonical

Ubuntu Pro 18.04 LTS

4807 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 04.09.2025 15:33:01
  • Zuletzt bearbeitet 12.05.2026 13:17:01

In the Linux kernel, the following vulnerability has been resolved: smb/server: avoid deadlock when linking with ReplaceIfExists If smb2_create_link() is called with ReplaceIfExists set and the name does exist then a deadlock will happen. ksmbd_vf...

  • EPSS 0.01%
  • Veröffentlicht 04.09.2025 15:33:00
  • Zuletzt bearbeitet 11.04.2026 13:16:35

In the Linux kernel, the following vulnerability has been resolved: gfs2: Validate i_depth for exhash directories A fuzzer test introduced corruption that ends up with a depth of 0 in dir_e_read(), causing an undefined shift by 32 at: index = ha...

  • EPSS 0.02%
  • Veröffentlicht 04.09.2025 15:32:59
  • Zuletzt bearbeitet 12.05.2026 13:17:01

In the Linux kernel, the following vulnerability has been resolved: drbd: add missing kref_get in handle_write_conflicts With `two-primaries` enabled, DRBD tries to detect "concurrent" writes and handle write conflicts, so that even if you write to...

  • EPSS 0.03%
  • Veröffentlicht 04.09.2025 15:32:59
  • Zuletzt bearbeitet 03.12.2025 20:00:20

In the Linux kernel, the following vulnerability has been resolved: loop: Avoid updating block size under exclusive owner Syzbot came up with a reproducer where a loop device block size is changed underneath a mounted filesystem. This causes a mism...

  • EPSS 0.02%
  • Veröffentlicht 04.09.2025 15:32:58
  • Zuletzt bearbeitet 12.05.2026 13:17:00

In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Add sanity check for file name The length of the file name should be smaller than the directory entry size.

  • EPSS 0.02%
  • Veröffentlicht 04.09.2025 15:32:57
  • Zuletzt bearbeitet 12.05.2026 13:17:00

In the Linux kernel, the following vulnerability has been resolved: ASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime() snd_soc_remove_pcm_runtime() might be called with rtd == NULL which will leads to null pointer dereference. This w...

  • EPSS 0.01%
  • Veröffentlicht 04.09.2025 15:32:56
  • Zuletzt bearbeitet 24.11.2025 19:43:18

In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: fix null pointer access Writing a string without delimiters (' ', '\n', '\0') to the under gpu_od/fan_ctrl sysfs or pp_power_profile_mode for the CUSTOM profile will re...

  • EPSS 0.01%
  • Veröffentlicht 04.09.2025 15:32:55
  • Zuletzt bearbeitet 25.03.2026 11:16:11

In the Linux kernel, the following vulnerability has been resolved: rcu/nocb: Fix possible invalid rdp's->nocb_cb_kthread pointer access In the preparation stage of CPU online, if the corresponding the rdp's->nocb_cb_kthread does not exist, will be...

  • EPSS 0.02%
  • Veröffentlicht 04.09.2025 15:32:54
  • Zuletzt bearbeitet 24.11.2025 19:45:00

In the Linux kernel, the following vulnerability has been resolved: drm/xe: Make dma-fences compliant with the safe access rules Xe can free some of the data pointed to by the dma-fences it exports. Most notably the timeline name can get freed if u...

  • EPSS 0.01%
  • Veröffentlicht 04.09.2025 15:32:53
  • Zuletzt bearbeitet 12.05.2026 13:16:59

In the Linux kernel, the following vulnerability has been resolved: ext4: do not BUG when INLINE_DATA_FL lacks system.data xattr A syzbot fuzzed image triggered a BUG_ON in ext4_update_inline_data() when an inode had the INLINE_DATA_FL flag set but...