Canonical

Ubuntu Pro 18.04 LTS

4807 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 26.02.2025 07:01:09
  • Zuletzt bearbeitet 25.03.2025 14:50:40

In the Linux kernel, the following vulnerability has been resolved: mt76: fix use-after-free by removing a non-RCU wcid pointer Fixes an issue caught by KASAN about use-after-free in mt76_txq_schedule by protecting mtxq->wcid with rcu_lock between ...

  • EPSS 0.03%
  • Veröffentlicht 26.02.2025 07:01:08
  • Zuletzt bearbeitet 01.10.2025 20:16:06

In the Linux kernel, the following vulnerability has been resolved: NFSv4: Don't hold the layoutget locks across multiple RPC calls When doing layoutget as part of the open() compound, we have to be careful to release the layout locks before we can...

  • EPSS 0.03%
  • Veröffentlicht 26.02.2025 07:01:08
  • Zuletzt bearbeitet 01.10.2025 20:16:06

In the Linux kernel, the following vulnerability has been resolved: f2fs: avoid infinite loop to flush node pages xfstests/generic/475 can give EIO all the time which give an infinite loop to flush node page like below. Let's avoid it. [16418.5185...

  • EPSS 0.09%
  • Veröffentlicht 26.02.2025 07:01:08
  • Zuletzt bearbeitet 01.10.2025 20:16:07

In the Linux kernel, the following vulnerability has been resolved: f2fs: remove WARN_ON in f2fs_is_valid_blkaddr Syzbot triggers two WARNs in f2fs_is_valid_blkaddr and __is_bitmap_valid. For example, in f2fs_is_valid_blkaddr, if type is DATA_GENER...

  • EPSS 0.1%
  • Veröffentlicht 26.02.2025 07:01:08
  • Zuletzt bearbeitet 01.10.2025 20:16:07

In the Linux kernel, the following vulnerability has been resolved: iommu/arm-smmu-v3: check return value after calling platform_get_resource() It will cause null-ptr-deref if platform_get_resource() returns NULL, we need check the return value.

  • EPSS 0.06%
  • Veröffentlicht 26.02.2025 07:01:08
  • Zuletzt bearbeitet 22.09.2025 20:46:23

In the Linux kernel, the following vulnerability has been resolved: dmaengine: zynqmp_dma: In struct zynqmp_dma_chan fix desc_size data type In zynqmp_dma_alloc/free_chan_resources functions there is a potential overflow in the below expressions. ...

  • EPSS 0.07%
  • Veröffentlicht 26.02.2025 07:01:07
  • Zuletzt bearbeitet 01.10.2025 20:16:03

In the Linux kernel, the following vulnerability has been resolved: drivers: staging: rtl8192eu: Fix deadlock in rtw_joinbss_event_prehandle There is a deadlock in rtw_joinbss_event_prehandle(), which is shown below: (Thread 1) |...

  • EPSS 0.03%
  • Veröffentlicht 26.02.2025 07:01:07
  • Zuletzt bearbeitet 01.10.2025 20:16:03

In the Linux kernel, the following vulnerability has been resolved: drivers: staging: rtl8192u: Fix deadlock in ieee80211_beacons_stop() There is a deadlock in ieee80211_beacons_stop(), which is shown below: (Thread 1) | (Thre...

  • EPSS 0.07%
  • Veröffentlicht 26.02.2025 07:01:07
  • Zuletzt bearbeitet 21.10.2025 11:45:22

In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: host: Stop setting the ACPI companion It is no longer needed. The sysdev pointer is now used when assigning the ACPI companions to the xHCI ports and USB devices. Assig...

  • EPSS 0.04%
  • Veröffentlicht 26.02.2025 07:01:07
  • Zuletzt bearbeitet 03.11.2025 20:15:58

In the Linux kernel, the following vulnerability has been resolved: drivers: staging: rtl8723bs: Fix deadlock in rtw_surveydone_event_callback() There is a deadlock in rtw_surveydone_event_callback(), which is shown below: (Thread 1) ...