Canonical

Ubuntu Pro 18.04 LTS

4807 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 04.04.2024 09:15:09
  • Zuletzt bearbeitet 20.12.2024 15:52:36

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Avoid potential use-after-free in hci_error_reset While handling the HCI_EV_HARDWARE_ERROR event, if the underlying BT controller is not responding, the GPIO reset mecha...

  • EPSS 0.35%
  • Veröffentlicht 04.04.2024 09:15:09
  • Zuletzt bearbeitet 21.03.2025 14:58:15

In the Linux kernel, the following vulnerability has been resolved: net: ip_tunnel: prevent perpetual headroom growth syzkaller triggered following kasan splat: BUG: KASAN: use-after-free in __skb_flow_dissect+0x19d1/0x7a50 net/core/flow_dissector....

  • EPSS 0.01%
  • Veröffentlicht 04.04.2024 09:15:09
  • Zuletzt bearbeitet 27.02.2025 14:35:09

In the Linux kernel, the following vulnerability has been resolved: netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter syzbot reported the following uninit-value access issue [1]: netlink_to_full_skb() creates a new `skb` and puts the ...

  • EPSS 0.01%
  • Veröffentlicht 04.04.2024 09:15:08
  • Zuletzt bearbeitet 20.12.2024 14:35:01

In the Linux kernel, the following vulnerability has been resolved: btrfs: dev-replace: properly validate device names There's a syzbot report that device name buffers passed to device replace are not properly checked for string termination which c...

  • EPSS 0.02%
  • Veröffentlicht 04.04.2024 09:15:08
  • Zuletzt bearbeitet 20.12.2024 15:56:00

In the Linux kernel, the following vulnerability has been resolved: gtp: fix use-after-free and null-ptr-deref in gtp_newlink() The gtp_link_ops operations structure for the subsystem must be registered after registering the gtp_net_ops pernet oper...

  • EPSS 0.01%
  • Veröffentlicht 03.04.2024 17:15:53
  • Zuletzt bearbeitet 04.04.2025 14:16:47

In the Linux kernel, the following vulnerability has been resolved: ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() Places the logic for checking if the group's block bitmap is corrupt under the protection of the group ...

  • EPSS 0.01%
  • Veröffentlicht 03.04.2024 17:15:53
  • Zuletzt bearbeitet 18.03.2025 16:47:14

In the Linux kernel, the following vulnerability has been resolved: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() Determine if the group block bitmap is corrupted before using ac_b_ex in ext4_mb_try_best_found() to ...

  • EPSS 0.02%
  • Veröffentlicht 03.04.2024 17:15:53
  • Zuletzt bearbeitet 19.06.2025 13:15:31

In the Linux kernel, the following vulnerability has been resolved: ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt Determine if bb_fragments is 0 instead of determining bb_free to eliminate the risk of dividing...

  • EPSS 0.01%
  • Veröffentlicht 03.04.2024 17:15:53
  • Zuletzt bearbeitet 17.07.2025 17:15:35

In the Linux kernel, the following vulnerability has been resolved: aoe: avoid potential deadlock at set_capacity Move set_capacity() outside of the section procected by (&d->lock). To avoid possible interrupt unsafe locking scenario: CPU0...

  • EPSS 0.01%
  • Veröffentlicht 03.04.2024 17:15:53
  • Zuletzt bearbeitet 27.02.2025 14:34:43

In the Linux kernel, the following vulnerability has been resolved: spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected Return IRQ_NONE from the interrupt handler when no interrupt was detected. Because an empty interrupt will cause ...