Canonical

Ubuntu Pro 18.04 LTS

4807 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 14.02.2026 15:16:08
  • Zuletzt bearbeitet 18.03.2026 14:46:26

In the Linux kernel, the following vulnerability has been resolved: arm64: Set __nocfi on swsusp_arch_resume() A DABT is reported[1] on an android based system when resume from hiberate. This happens because swsusp_arch_suspend_exit() is marked wit...

  • EPSS 0.02%
  • Veröffentlicht 14.02.2026 15:16:07
  • Zuletzt bearbeitet 18.03.2026 13:39:35

In the Linux kernel, the following vulnerability has been resolved: l2tp: avoid one data-race in l2tp_tunnel_del_work() We should read sk->sk_socket only when dealing with kernel sockets. syzbot reported the following data-race: BUG: KCSAN: data-...

  • EPSS 0.02%
  • Veröffentlicht 14.02.2026 15:16:07
  • Zuletzt bearbeitet 18.03.2026 13:39:23

In the Linux kernel, the following vulnerability has been resolved: mISDN: annotate data-race around dev->work dev->work can re read locklessly in mISDN_read() and mISDN_poll(). Add READ_ONCE()/WRITE_ONCE() annotations. BUG: KCSAN: data-race in mI...

  • EPSS 0.02%
  • Veröffentlicht 14.02.2026 15:16:07
  • Zuletzt bearbeitet 18.03.2026 14:50:20

In the Linux kernel, the following vulnerability has been resolved: sctp: move SCTP_CMD_ASSOC_SHKEY right after SCTP_CMD_PEER_INIT A null-ptr-deref was reported in the SCTP transmit path when SCTP-AUTH key initialization fails: =================...

  • EPSS 0.02%
  • Veröffentlicht 14.02.2026 15:16:06
  • Zuletzt bearbeitet 18.04.2026 09:16:14

In the Linux kernel, the following vulnerability has been resolved: io_uring/io-wq: check IO_WQ_BIT_EXIT inside work run loop Currently this is checked before running the pending work. Normally this is quite fine, as work items either end up blocki...

  • EPSS 0.02%
  • Veröffentlicht 04.02.2026 16:08:28
  • Zuletzt bearbeitet 18.03.2026 17:12:48

In the Linux kernel, the following vulnerability has been resolved: can: usb_8dev: usb_8dev_read_bulk_callback(): fix URB memory leak Fix similar memory leak as in commit 7352e1d5932a ("can: gs_usb: gs_usb_receive_bulk_callback(): fix URB memory le...

  • EPSS 0.02%
  • Veröffentlicht 04.02.2026 16:08:26
  • Zuletzt bearbeitet 03.04.2026 14:16:23

In the Linux kernel, the following vulnerability has been resolved: net/sched: qfq: Use cl_is_active to determine whether class is active in qfq_rm_from_ag This is more of a preventive patch to make the code more consistent and to prevent possible ...

  • EPSS 0.01%
  • Veröffentlicht 04.02.2026 16:08:24
  • Zuletzt bearbeitet 03.04.2026 14:16:23

In the Linux kernel, the following vulnerability has been resolved: ipvlan: Make the addrs_lock be per port Make the addrs_lock be per port, not per ipvlan dev. Initial code seems to be written in the assumption, that any address change must occur...

  • EPSS 0.02%
  • Veröffentlicht 04.02.2026 16:08:23
  • Zuletzt bearbeitet 19.03.2026 19:33:02

In the Linux kernel, the following vulnerability has been resolved: leds: led-class: Only Add LED to leds_list when it is fully ready Before this change the LED was added to leds_list before led_init_core() gets called adding it the list before led...

  • EPSS 0.02%
  • Veröffentlicht 04.02.2026 16:08:21
  • Zuletzt bearbeitet 18.03.2026 20:09:32

In the Linux kernel, the following vulnerability has been resolved: bonding: limit BOND_MODE_8023AD to Ethernet devices BOND_MODE_8023AD makes sense for ARPHRD_ETHER only. syzbot reported: BUG: KASAN: global-out-of-bounds in __hw_addr_create net...