Canonical

Ubuntu Pro 18.04 LTS

4807 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 25.07.2025 16:15:29
  • Zuletzt bearbeitet 22.12.2025 21:55:04

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix potential use-after-free in oplock/lease break ack If ksmbd_iov_pin_rsp return error, use-after-free can happen by accessing opinfo->state and opinfo_put and ksmbd_fd_pu...

  • EPSS 0.02%
  • Veröffentlicht 25.07.2025 16:15:29
  • Zuletzt bearbeitet 19.11.2025 18:09:51

In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: Intel: hda: Use devm_kstrdup() to avoid memleak. sof_pdata->tplg_filename can have address allocated by kstrdup() and can be overwritten. Memory leak was detected with k...

  • EPSS 0.01%
  • Veröffentlicht 25.07.2025 16:15:29
  • Zuletzt bearbeitet 19.11.2025 18:09:59

In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix race between DIM disable and net_dim() There's a race between disabling DIM and NAPI callbacks using the dim pointer on the RQ or SQ. If NAPI checks the DIM state b...

  • EPSS 0.02%
  • Veröffentlicht 25.07.2025 15:15:29
  • Zuletzt bearbeitet 18.04.2026 09:16:10

In the Linux kernel, the following vulnerability has been resolved: drm/scheduler: signal scheduled fence when kill job When an entity from application B is killed, drm_sched_entity_kill() removes all jobs belonging to that entity through drm_sched...

  • EPSS 0.03%
  • Veröffentlicht 25.07.2025 15:15:27
  • Zuletzt bearbeitet 23.12.2025 18:41:32

In the Linux kernel, the following vulnerability has been resolved: net: lan743x: Modify the EEPROM and OTP size for PCI1xxxx devices Maximum OTP and EEPROM size for hearthstone PCI1xxxx devices are 8 Kb and 64 Kb respectively. Adjust max size defi...

  • EPSS 0.03%
  • Veröffentlicht 25.07.2025 15:15:27
  • Zuletzt bearbeitet 23.12.2025 18:35:57

In the Linux kernel, the following vulnerability has been resolved: perf: Fix sample vs do_exit() Baisheng Gao reported an ARM64 crash, which Mark decoded as being a synchronous external abort -- most likely due to trying to access MMIO in bad ways...

  • EPSS 0.02%
  • Veröffentlicht 25.07.2025 15:15:27
  • Zuletzt bearbeitet 23.12.2025 18:35:09

In the Linux kernel, the following vulnerability has been resolved: i2c: tegra: check msg length in SMBUS block read For SMBUS block read, do not continue to read if the message length passed from the device is '0' or greater than the maximum allow...

  • EPSS 0.03%
  • Veröffentlicht 25.07.2025 15:15:27
  • Zuletzt bearbeitet 25.03.2026 11:16:11

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Add basic validation for RAS header If RAS header read from EEPROM is corrupted, it could result in trying to allocate huge memory for reading the records. Add some val...

  • EPSS 0.03%
  • Veröffentlicht 25.07.2025 15:15:27
  • Zuletzt bearbeitet 23.12.2025 18:28:26

In the Linux kernel, the following vulnerability has been resolved: Input: ims-pcu - check record size in ims_pcu_flash_firmware() The "len" variable comes from the firmware and we generally do trust firmware, but it's always better to double check...

  • EPSS 0.03%
  • Veröffentlicht 25.07.2025 15:15:27
  • Zuletzt bearbeitet 12.05.2026 13:16:49

In the Linux kernel, the following vulnerability has been resolved: nfsd: nfsd4_spo_must_allow() must check this is a v4 compound request If the request being processed is not a v4 compound request, then examining the cstate can have undefined resu...