Canonical

Ubuntu Pro 18.04 LTS

4807 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Veröffentlicht 16.04.2025 14:11:56
  • Zuletzt bearbeitet 03.11.2025 20:17:38

In the Linux kernel, the following vulnerability has been resolved: ksmbd: validate zero num_subauth before sub_auth is accessed Access psid->sub_auth[psid->num_subauth - 1] without checking if num_subauth is non-zero leads to an out-of-bounds read...

  • EPSS 0.04%
  • Veröffentlicht 16.04.2025 14:11:56
  • Zuletzt bearbeitet 14.11.2025 16:51:45

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix overflow in dacloffset bounds check The dacloffset field was originally typed as int and used in an unchecked addition, which could overflow and bypass the existing boun...

  • EPSS 0.14%
  • Veröffentlicht 16.04.2025 14:11:55
  • Zuletzt bearbeitet 19.09.2025 15:15:48

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix null pointer dereference in alloc_preauth_hash() The Client send malformed smb2 negotiate request. ksmbd return error response. Subsequently, the client can send smb2 se...

  • EPSS 0.02%
  • Veröffentlicht 16.04.2025 14:11:49
  • Zuletzt bearbeitet 01.05.2025 15:16:19

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

  • EPSS 0.08%
  • Veröffentlicht 16.04.2025 14:11:48
  • Zuletzt bearbeitet 03.11.2025 20:17:38

In the Linux kernel, the following vulnerability has been resolved: media: streamzap: fix race between device disconnection and urb callback Syzkaller has reported a general protection fault at function ir_raw_event_store_with_filter(). This crash ...

  • EPSS 0.06%
  • Veröffentlicht 16.04.2025 14:11:48
  • Zuletzt bearbeitet 28.10.2025 19:05:26

In the Linux kernel, the following vulnerability has been resolved: media: vimc: skip .s_stream() for stopped entities Syzbot reported [1] a warning prompted by a check in call_s_stream() that checks whether .s_stream() operation is warranted for u...

  • EPSS 0.08%
  • Veröffentlicht 16.04.2025 14:11:47
  • Zuletzt bearbeitet 06.04.2026 13:40:05

In the Linux kernel, the following vulnerability has been resolved: nfsd: don't ignore the return code of svc_proc_register() Currently, nfsd_proc_stat_init() ignores the return value of svc_proc_register(). If the procfile creation fails, then the...

  • EPSS 0.09%
  • Veröffentlicht 16.04.2025 14:11:46
  • Zuletzt bearbeitet 03.11.2025 20:17:38

In the Linux kernel, the following vulnerability has been resolved: nfsd: put dl_stid if fail to queue dl_recall Before calling nfsd4_run_cb to queue dl_recall to the callback_wq, we increment the reference count of dl_stid. We expect that after th...

  • EPSS 0.14%
  • Veröffentlicht 16.04.2025 14:11:43
  • Zuletzt bearbeitet 28.10.2025 18:54:50

In the Linux kernel, the following vulnerability has been resolved: jfs: add check read-only before truncation in jfs_truncate_nolock() Added a check for "read-only" mode in the `jfs_truncate_nolock` function to avoid errors related to writing to a...

  • EPSS 0.09%
  • Veröffentlicht 16.04.2025 14:11:43
  • Zuletzt bearbeitet 28.10.2025 18:55:30

In the Linux kernel, the following vulnerability has been resolved: jfs: add check read-only before txBeginAnon() call Added a read-only check before calling `txBeginAnon` in `extAlloc` and `extRecord`. This prevents modification attempts on a read...