Canonical

Ubuntu Pro 18.04 LTS

4807 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 24.04.2026 14:42:37
  • Zuletzt bearbeitet 28.04.2026 14:09:16

In the Linux kernel, the following vulnerability has been resolved: ALSA: fireworks: bound device-supplied status before string array lookup The status field in an EFW response is a 32-bit value supplied by the firewire device. efr_status_names[] ...

  • EPSS 0.01%
  • Veröffentlicht 24.04.2026 14:42:36
  • Zuletzt bearbeitet 28.04.2026 17:27:20

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_ncm: validate minimum block_len in ncm_unwrap_ntb() The block_len read from the host-supplied NTB header is checked against ntb_max but has no lower bound. When bloc...

  • EPSS 0.01%
  • Veröffentlicht 24.04.2026 14:42:35
  • Zuletzt bearbeitet 28.04.2026 17:21:15

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_phonet: fix skb frags[] overflow in pn_rx_complete() A broken/bored/mean USB host can overflow the skb_shared_info->frags[] array on a Linux gadget exposing a Phonet...

  • EPSS 0.01%
  • Veröffentlicht 24.04.2026 14:42:34
  • Zuletzt bearbeitet 29.04.2026 18:03:40

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix off-by-8 bounds check in check_wsl_eas() The bounds check uses (u8 *)ea + nlen + 1 + vlen as the end of the EA name and value, but ea_data sits at offset sizeof(st...

  • EPSS 0.02%
  • Veröffentlicht 24.04.2026 14:42:34
  • Zuletzt bearbeitet 28.04.2026 17:29:26

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: renesas_usb3: validate endpoint index in standard request handlers The GET_STATUS and SET/CLEAR_FEATURE handlers extract the endpoint number from the host-supplied wIn...

  • EPSS 0.05%
  • Veröffentlicht 24.04.2026 14:42:33
  • Zuletzt bearbeitet 28.04.2026 15:13:18

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix OOB reads parsing symlink error response When a CREATE returns STATUS_STOPPED_ON_SYMLINK, smb2_check_message() returns success without any length validation, leavi...

  • EPSS 0.07%
  • Veröffentlicht 24.04.2026 14:42:32
  • Zuletzt bearbeitet 29.04.2026 16:56:48

In the Linux kernel, the following vulnerability has been resolved: ksmbd: require 3 sub-authorities before reading sub_auth[2] parse_dacl() compares each ACE SID against sid_unix_NFS_mode and on match reads sid.sub_auth[2] as the file mode. If si...

  • EPSS 0.05%
  • Veröffentlicht 24.04.2026 14:42:32
  • Zuletzt bearbeitet 29.04.2026 17:00:28

In the Linux kernel, the following vulnerability has been resolved: ksmbd: validate EaNameLength in smb2_get_ea() smb2_get_ea() reads ea_req->EaNameLength from the client request and passes it directly to strncmp() as the comparison length without ...

  • EPSS 0.02%
  • Veröffentlicht 24.04.2026 14:42:31
  • Zuletzt bearbeitet 29.04.2026 16:51:02

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix mechToken leak when SPNEGO decode fails after token alloc The kernel ASN.1 BER decoder calls action callbacks incrementally as it walks the input. When ksmbd_decode_neg...

  • EPSS 0.07%
  • Veröffentlicht 24.04.2026 14:42:29
  • Zuletzt bearbeitet 28.04.2026 15:11:28

In the Linux kernel, the following vulnerability has been resolved: usbip: validate number_of_packets in usbip_pack_ret_submit() When a USB/IP client receives a RET_SUBMIT response, usbip_pack_ret_submit() unconditionally overwrites urb->number_of_...