Canonical

Ubuntu 22.04 LTS

7962 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 27.03.2025 16:43:05
  • Zuletzt bearbeitet 01.10.2025 18:15:33

In the Linux kernel, the following vulnerability has been resolved: reset: uniphier-glue: Fix possible null-ptr-deref It will cause null-ptr-deref when resource_size(res) invoked, if platform_get_resource() returns NULL.

  • EPSS 0.03%
  • Veröffentlicht 27.03.2025 16:43:04
  • Zuletzt bearbeitet 01.10.2025 18:15:32

In the Linux kernel, the following vulnerability has been resolved: EDAC/highbank: Fix memory leak in highbank_mc_probe() When devres_open_group() fails, it returns -ENOMEM without freeing memory allocated by edac_mc_alloc(). Call edac_mc_free() o...

  • EPSS 0.03%
  • Veröffentlicht 27.03.2025 16:43:02
  • Zuletzt bearbeitet 01.04.2025 15:40:57

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_fs: Prevent race during ffs_ep0_queue_wait While performing fast composition switch, there is a possibility that the process of ffs_ep0_write/ffs_ep0_read get into a...

  • EPSS 0.01%
  • Veröffentlicht 27.03.2025 16:43:01
  • Zuletzt bearbeitet 01.04.2025 15:41:09

In the Linux kernel, the following vulnerability has been resolved: dmaengine: Fix double increment of client_count in dma_chan_get() The first time dma_chan_get() is called for a channel the channel client_count is incorrectly incremented twice fo...

  • EPSS 0.08%
  • Veröffentlicht 27.03.2025 16:43:00
  • Zuletzt bearbeitet 18.04.2026 09:16:07

In the Linux kernel, the following vulnerability has been resolved: device property: fix of node refcount leak in fwnode_graph_get_next_endpoint() The 'parent' returned by fwnode_graph_get_port_parent() with refcount incremented when 'prev' is not ...

  • EPSS 0.01%
  • Veröffentlicht 27.03.2025 16:42:59
  • Zuletzt bearbeitet 01.10.2025 18:15:32

In the Linux kernel, the following vulnerability has been resolved: cpufreq: CPPC: Add u64 casts to avoid overflowing The fields of the _CPC object are unsigned 32-bits values. To avoid overflows while using _CPC's values, add 'u64' casts.

  • EPSS 0.01%
  • Veröffentlicht 27.03.2025 16:42:59
  • Zuletzt bearbeitet 01.10.2025 20:17:09

In the Linux kernel, the following vulnerability has been resolved: w1: fix WARNING after calling w1_process() I got the following WARNING message while removing driver(ds2482): ------------[ cut here ]------------ do not call blocking ops when !T...

  • EPSS 0.01%
  • Veröffentlicht 27.03.2025 16:42:58
  • Zuletzt bearbeitet 01.10.2025 18:15:32

In the Linux kernel, the following vulnerability has been resolved: i2c: designware: use casting of u64 in clock multiplication to avoid overflow In functions i2c_dw_scl_lcnt() and i2c_dw_scl_hcnt() may have overflow by depending on the values of t...

  • EPSS 0.03%
  • Veröffentlicht 27.03.2025 16:42:57
  • Zuletzt bearbeitet 29.10.2025 17:18:00

In the Linux kernel, the following vulnerability has been resolved: erofs/zmap.c: Fix incorrect offset calculation Effective offset to add to length was being incorrectly calculated, which resulted in iomap->length being set to 0, triggering a WARN...

  • EPSS 0.01%
  • Veröffentlicht 27.03.2025 16:42:57
  • Zuletzt bearbeitet 01.10.2025 18:15:32

In the Linux kernel, the following vulnerability has been resolved: perf/x86/amd: fix potential integer overflow on shift of a int The left shift of int 32 bit integer constant 1 is evaluated using 32 bit arithmetic and then passed as a 64 bit func...