Canonical

Ubuntu 22.04 LTS

7962 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 01.04.2025 16:15:25
  • Zuletzt bearbeitet 03.11.2025 20:17:31

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix bug on trap in smb2_lock If lock count is greater than 1, flags could be old value. It should be checked with flags of smb_lock, not flags. It will cause bug-on trap fro...

  • EPSS 0.02%
  • Veröffentlicht 01.04.2025 16:15:25
  • Zuletzt bearbeitet 03.11.2025 20:17:31

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in smb2_lock If smb_lock->zero_len has value, ->llist of smb_lock is not delete and flock is old one. It will cause use-after-free on error handling routi...

  • EPSS 0.11%
  • Veröffentlicht 01.04.2025 16:15:25
  • Zuletzt bearbeitet 11.01.2026 17:15:52

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix out-of-bounds in parse_sec_desc() If osidoffset, gsidoffset and dacloffset could be greater than smb_ntsd struct size. If it is smaller, It could cause slab-out-of-bound...

  • EPSS 0.02%
  • Veröffentlicht 01.04.2025 16:15:25
  • Zuletzt bearbeitet 02.04.2026 09:16:17

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix type confusion via race condition when using ipc_msg_send_request req->handle is allocated using ksmbd_acquire_id(&ipc_ida), based on ida_alloc. req->handle from ksmbd_i...

  • EPSS 0.02%
  • Veröffentlicht 01.04.2025 16:15:25
  • Zuletzt bearbeitet 03.11.2025 20:17:31

In the Linux kernel, the following vulnerability has been resolved: HID: appleir: Fix potential NULL dereference at raw event handle Syzkaller reports a NULL pointer dereference issue in input_event(). BUG: KASAN: null-ptr-deref in instrument_atom...

  • EPSS 0.02%
  • Veröffentlicht 01.04.2025 16:15:24
  • Zuletzt bearbeitet 03.11.2025 20:17:29

In the Linux kernel, the following vulnerability has been resolved: rapidio: fix an API misues when rio_add_net() fails rio_add_net() calls device_register() and fails when device_register() fails. Thus, put_device() should be used rather than kfr...

  • EPSS 0.02%
  • Veröffentlicht 01.04.2025 16:15:24
  • Zuletzt bearbeitet 03.11.2025 20:17:29

In the Linux kernel, the following vulnerability has been resolved: rapidio: add check for rio_add_net() in rio_scan_alloc_net() The return value of rio_add_net() should be checked. If it fails, put_device() should be called to free the memory and...

  • EPSS 0.02%
  • Veröffentlicht 01.04.2025 16:15:24
  • Zuletzt bearbeitet 03.11.2025 20:17:30

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix null check for pipe_ctx->plane_state in resource_build_scaling_params Null pointer dereference issue could occur when pipe_ctx->plane_state is null. The fix ad...

  • EPSS 0.02%
  • Veröffentlicht 01.04.2025 16:15:23
  • Zuletzt bearbeitet 03.11.2025 20:17:28

In the Linux kernel, the following vulnerability has been resolved: net: hns3: make sure ptp clock is unregister and freed if hclge_ptp_get_cycle returns an error During the initialization of ptp, hclge_ptp_get_cycle might return an error and retur...

  • EPSS 0.02%
  • Veröffentlicht 01.04.2025 16:15:23
  • Zuletzt bearbeitet 03.11.2025 20:17:28

In the Linux kernel, the following vulnerability has been resolved: llc: do not use skb_get() before dev_queue_xmit() syzbot is able to crash hosts [1], using llc and devices not supporting IFF_TX_SKB_SHARING. In this case, e1000 driver calls eth_...