Canonical

Ubuntu Pro 18.04 LTS

4807 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 03.04.2024 17:15:53
  • Zuletzt bearbeitet 27.02.2025 14:34:43

In the Linux kernel, the following vulnerability has been resolved: fbdev: sis: Error out if pixclock equals zero The userspace program could pass any values to the driver through ioctl() interface. If the driver doesn't check the value of pixclock...

  • EPSS 0.01%
  • Veröffentlicht 03.04.2024 17:15:53
  • Zuletzt bearbeitet 27.02.2025 14:34:43

In the Linux kernel, the following vulnerability has been resolved: fbdev: savage: Error out if pixclock equals zero The userspace program could pass any values to the driver through ioctl() interface. If the driver doesn't check the value of pixcl...

  • EPSS 0.01%
  • Veröffentlicht 03.04.2024 17:15:53
  • Zuletzt bearbeitet 04.04.2025 14:15:05

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fix race condition on enabling fast-xmit fast-xmit must only be enabled after the sta has been uploaded to the driver, otherwise it could end up passing the not-yet...

  • EPSS 0.02%
  • Veröffentlicht 03.04.2024 17:15:52
  • Zuletzt bearbeitet 07.01.2025 21:13:04

In the Linux kernel, the following vulnerability has been resolved: gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() The gtp_net_ops pernet operations structure for the subsystem must be registered before registering the generic ne...

  • EPSS 0.02%
  • Veröffentlicht 03.04.2024 17:15:52
  • Zuletzt bearbeitet 17.03.2025 16:56:57

In the Linux kernel, the following vulnerability has been resolved: md: Don't register sync_thread for reshape directly Currently, if reshape is interrupted, then reassemble the array will register sync_thread directly from pers->run(), in this cas...

  • EPSS 0.01%
  • Veröffentlicht 03.04.2024 17:15:52
  • Zuletzt bearbeitet 04.04.2025 14:30:42

In the Linux kernel, the following vulnerability has been resolved: md: Don't ignore read-only array in md_check_recovery() Usually if the array is not read-write, md_check_recovery() won't register new sync_thread in the first place. And if the ar...

  • EPSS 0.01%
  • Veröffentlicht 03.04.2024 17:15:52
  • Zuletzt bearbeitet 04.04.2025 14:30:16

In the Linux kernel, the following vulnerability has been resolved: md: Don't ignore suspended array in md_check_recovery() mddev_suspend() never stop sync_thread, hence it doesn't make sense to ignore suspended array in md_check_recovery(), which ...

  • EPSS 0.01%
  • Veröffentlicht 03.04.2024 17:15:52
  • Zuletzt bearbeitet 16.04.2025 19:15:50

In the Linux kernel, the following vulnerability has been resolved: mm/swap: fix race when skipping swapcache When skipping swapcache for SWP_SYNCHRONOUS_IO, if two or more threads swapin the same entry at the same time, they get different pages (A...

  • EPSS 0.01%
  • Veröffentlicht 03.04.2024 17:15:52
  • Zuletzt bearbeitet 18.03.2025 16:40:18

In the Linux kernel, the following vulnerability has been resolved: dm-crypt: don't modify the data when using authenticated encryption It was said that authenticated encryption could produce invalid tag when the data that is being encrypted is mod...

  • EPSS 0.01%
  • Veröffentlicht 03.04.2024 17:15:52
  • Zuletzt bearbeitet 18.03.2025 16:36:22

In the Linux kernel, the following vulnerability has been resolved: fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio If kiocb_set_cancel_fn() is called for I/O submitted via io_uring, the following kernel warning appears: WARNING...