Canonical

Ubuntu Pro 18.04 LTS

4807 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 10.04.2024 19:15:47
  • Zuletzt bearbeitet 21.03.2025 11:54:05

In the Linux kernel, the following vulnerability has been resolved: scsi: core: Fix scsi_mode_sense() buffer length handling Several problems exist with scsi_mode_sense() buffer length handling: 1) The allocation length field of the MODE SENSE(10...

  • EPSS 0.01%
  • Veröffentlicht 10.04.2024 19:15:47
  • Zuletzt bearbeitet 03.11.2025 18:15:38

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix link down processing to address NULL pointer dereference If an FC link down transition while PLOGIs are outstanding to fabric well known addresses, outstanding ABTS...

  • EPSS 0.02%
  • Veröffentlicht 10.04.2024 19:15:47
  • Zuletzt bearbeitet 21.03.2025 11:57:12

In the Linux kernel, the following vulnerability has been resolved: arm64: dts: qcom: msm8998: Fix CPU/L2 idle state latency and residency The entry/exit latency and minimum residency in state for the idle states of MSM8998 were ..bad: first of all...

  • EPSS 0.01%
  • Veröffentlicht 10.04.2024 19:15:47
  • Zuletzt bearbeitet 03.03.2025 17:47:59

In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: core: Improve SCSI abort handling The following has been observed on a test setup: WARNING: CPU: 4 PID: 250 at drivers/scsi/ufs/ufshcd.c:2737 ufshcd_queuecommand+0x468/...

  • EPSS 0.01%
  • Veröffentlicht 10.04.2024 19:15:47
  • Zuletzt bearbeitet 14.01.2025 16:40:59

In the Linux kernel, the following vulnerability has been resolved: scsi: scsi_debug: Fix out-of-bound read in resp_readcap16() The following warning was observed running syzkaller: [ 3813.830724] sg_write: data in/out 65466/242 bytes for SCSI com...

  • EPSS 0.02%
  • Veröffentlicht 10.04.2024 14:15:07
  • Zuletzt bearbeitet 12.05.2026 12:16:20

In the Linux kernel, the following vulnerability has been resolved: x86, relocs: Ignore relocations in .notes section When building with CONFIG_XEN_PV=y, .text symbols are emitted into the .notes section so that Xen can find the "startup_xen" entry...

  • EPSS 0.01%
  • Veröffentlicht 05.04.2024 09:15:09
  • Zuletzt bearbeitet 12.05.2026 12:16:19

In the Linux kernel, the following vulnerability has been resolved: vfio/pci: Lock external INTx masking ops Mask operations through config space changes to DisINTx may race INTx configuration changes via ioctl. Create wrappers that add locking fo...

  • EPSS 0.01%
  • Veröffentlicht 05.04.2024 09:15:09
  • Zuletzt bearbeitet 12.05.2026 12:16:20

In the Linux kernel, the following vulnerability has been resolved: vfio/pci: Create persistent INTx handler A vulnerability exists where the eventfd for INTx signaling can be deconfigured, which unregisters the IRQ handler but still allows eventfd...

  • EPSS 0.02%
  • Veröffentlicht 05.04.2024 09:15:09
  • Zuletzt bearbeitet 20.12.2024 14:30:24

In the Linux kernel, the following vulnerability has been resolved: vfio/platform: Create persistent IRQ handlers The vfio-platform SET_IRQS ioctl currently allows loopback triggering of an interrupt before a signaling eventfd has been configured b...

  • EPSS 0.02%
  • Veröffentlicht 05.04.2024 09:15:09
  • Zuletzt bearbeitet 12.05.2026 12:16:33

In the Linux kernel, the following vulnerability has been resolved: vfio/pci: Disable auto-enable of exclusive INTx IRQ Currently for devices requiring masking at the irqchip for INTx, ie. devices without DisINTx support, the IRQ is enabled in requ...