Canonical

Ubuntu Pro 18.04 LTS

4807 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 17.08.2024 09:15:09
  • Zuletzt bearbeitet 03.11.2025 22:17:54

In the Linux kernel, the following vulnerability has been resolved: tipc: Return non-zero value from tipc_udp_addr2str() on error tipc_udp_addr2str() should return non-zero value if the UDP media address is invalid. Otherwise, a buffer overflow acc...

  • EPSS 0.01%
  • Veröffentlicht 17.08.2024 09:15:09
  • Zuletzt bearbeitet 03.11.2025 22:17:55

In the Linux kernel, the following vulnerability has been resolved: RDMA/iwcm: Fix a use-after-free related to destroying CM IDs iw_conn_req_handler() associates a new struct rdma_id_private (conn_id) with an existing struct iw_cm_id (cm_id) as fol...

  • EPSS 0.01%
  • Veröffentlicht 17.08.2024 09:15:09
  • Zuletzt bearbeitet 03.11.2025 22:17:56

In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: During vport delete send async logout explicitly During vport delete, it is observed that during unload we hit a crash because of stale entries in outstanding comman...

  • EPSS 0.01%
  • Veröffentlicht 17.08.2024 09:15:09
  • Zuletzt bearbeitet 12.05.2026 12:17:05

In the Linux kernel, the following vulnerability has been resolved: kobject_uevent: Fix OOB access within zap_modalias_env() zap_modalias_env() wrongly calculates size of memory block to move, so will cause OOB memory access issue if variable MODAL...

  • EPSS 0.01%
  • Veröffentlicht 17.08.2024 09:15:08
  • Zuletzt bearbeitet 03.11.2025 22:17:51

In the Linux kernel, the following vulnerability has been resolved: riscv/mm: Add handling for VM_FAULT_SIGSEGV in mm_fault_error() Handle VM_FAULT_SIGSEGV in the page fault path so that we correctly kill the process and we don't BUG() the kernel.

  • EPSS 0.02%
  • Veröffentlicht 17.08.2024 09:15:08
  • Zuletzt bearbeitet 03.11.2025 22:17:52

In the Linux kernel, the following vulnerability has been resolved: net/iucv: fix use after free in iucv_sock_close() iucv_sever_path() is called from process context and from bh context. iucv->path is used as indicator whether somebody else is tak...

  • EPSS 0.01%
  • Veröffentlicht 17.08.2024 09:15:08
  • Zuletzt bearbeitet 03.11.2025 22:17:54

In the Linux kernel, the following vulnerability has been resolved: mISDN: Fix a use after free in hfcmulti_tx() Don't dereference *sp after calling dev_kfree_skb(*sp).

  • EPSS 0.01%
  • Veröffentlicht 17.08.2024 09:15:07
  • Zuletzt bearbeitet 12.05.2026 12:17:05

In the Linux kernel, the following vulnerability has been resolved: protect the fetch of ->fd[fd] in do_dup2() from mispredictions both callers have verified that fd is not greater than ->max_fds; however, misprediction might end up with to...

  • EPSS 0.02%
  • Veröffentlicht 14.08.2024 15:15:31
  • Zuletzt bearbeitet 12.05.2026 12:17:04

In the Linux kernel, the following vulnerability has been resolved: drm/i915/gem: Fix Virtual Memory mapping boundaries calculation Calculating the size of the mapped area as the lesser value between the requested size and the actual size does not ...

  • EPSS 0.01%
  • Veröffentlicht 08.08.2024 09:15:08
  • Zuletzt bearbeitet 03.11.2025 21:16:17

In the Linux kernel, the following vulnerability has been resolved: closures: Change BUG_ON() to WARN_ON() If a BUG_ON() can be hit in the wild, it shouldn't be a BUG_ON() For reference, this has popped up once in the CI, and we'll need more info ...