Canonical

Ubuntu 22.04 LTS

7962 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 27.03.2025 14:57:08
  • Zuletzt bearbeitet 03.11.2025 20:17:24

In the Linux kernel, the following vulnerability has been resolved: i2c: npcm: disable interrupt enable bit before devm_request_irq The customer reports that there is a soft lockup issue related to the i2c driver. After checking, the i2c module was...

  • EPSS 0.02%
  • Veröffentlicht 27.03.2025 14:57:07
  • Zuletzt bearbeitet 03.11.2025 20:17:24

In the Linux kernel, the following vulnerability has been resolved: usbnet: gl620a: fix endpoint checking in genelink_bind() Syzbot reports [1] a warning in usb_submit_urb() triggered by inconsistencies between expected and actually present endpoin...

  • EPSS 0.02%
  • Veröffentlicht 27.03.2025 14:57:06
  • Zuletzt bearbeitet 03.11.2025 20:17:24

In the Linux kernel, the following vulnerability has been resolved: mptcp: always handle address removal under msk socket lock Syzkaller reported a lockdep splat in the PM control path: WARNING: CPU: 0 PID: 6693 at ./include/net/sock.h:1711 sock...

  • EPSS 0.02%
  • Veröffentlicht 27.03.2025 14:57:04
  • Zuletzt bearbeitet 03.11.2025 20:17:24

In the Linux kernel, the following vulnerability has been resolved: efi: Don't map the entire mokvar table to determine its size Currently, when validating the mokvar table, we (re)map the entire table on each iteration of the loop, adding space as...

  • EPSS 0.02%
  • Veröffentlicht 27.03.2025 14:57:02
  • Zuletzt bearbeitet 03.11.2025 20:17:03

In the Linux kernel, the following vulnerability has been resolved: sched/core: Prevent rescheduling when interrupts are disabled David reported a warning observed while loop testing kexec jump: Interrupts enabled after irqrouter_resume+0x0/0x50...

  • EPSS 0.02%
  • Veröffentlicht 27.03.2025 13:38:23
  • Zuletzt bearbeitet 03.11.2025 20:17:24

In the Linux kernel, the following vulnerability has been resolved: tee: optee: Fix supplicant wait loop OP-TEE supplicant is a user-space daemon and it's possible for it be hung or crashed or killed in the middle of processing an OP-TEE RPC call. ...

  • EPSS 0.02%
  • Veröffentlicht 25.03.2025 18:15:34
  • Zuletzt bearbeitet 15.04.2026 00:35:42

A flaw was found in cifs-utils. When trying to obtain Kerberos credentials, the cifs.upcall program from the cifs-utils package makes an upcall to the wrong namespace in containerized environments. This issue may lead to disclosing sensitive data fro...

Medienbericht
  • EPSS 0.05%
  • Veröffentlicht 23.03.2025 15:00:47
  • Zuletzt bearbeitet 08.04.2025 08:15:14

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. Filesystem bugs due to corrupt images are not considered a CVE for any filesystem that is only mountable by CAP_SYS_ADMIN in the initial user namespace. That ...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 14.03.2025 14:25:59
  • Zuletzt bearbeitet 12.05.2026 12:16:16

In the Linux kernel, the following vulnerability has been resolved: netfilter: allow exp not to be removed in nf_ct_find_expectation Currently nf_conntrack_in() calling nf_ct_find_expectation() will remove the exp from the hash table. However, in s...

  • EPSS 0.02%
  • Veröffentlicht 12.03.2025 09:42:22
  • Zuletzt bearbeitet 03.11.2025 20:17:23

In the Linux kernel, the following vulnerability has been resolved: powerpc/code-patching: Fix KASAN hit by not flagging text patching area as VM_ALLOC Erhard reported the following KASAN hit while booting his PowerMac G4 with a KASAN-enabled kerne...