Canonical

Ubuntu 22.04 LTS

7957 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 26.02.2025 07:00:44
  • Zuletzt bearbeitet 14.10.2025 20:31:47

In the Linux kernel, the following vulnerability has been resolved: irqchip/gic-v3: Fix GICR_CTLR.RWP polling It turns out that our polling of RWP is totally wrong when checking for it in the redistributors, as we test the *distributor* bit index, ...

  • EPSS 0.01%
  • Veröffentlicht 26.02.2025 07:00:44
  • Zuletzt bearbeitet 23.09.2025 18:32:06

In the Linux kernel, the following vulnerability has been resolved: btrfs: fix qgroup reserve overflow the qgroup limit We use extent_changeset->bytes_changed in qgroup_reserve_data() to record how many bytes we set for EXTENT_QGROUP_RESERVED state...

  • EPSS 0.02%
  • Veröffentlicht 26.02.2025 07:00:44
  • Zuletzt bearbeitet 24.03.2025 17:42:04

In the Linux kernel, the following vulnerability has been resolved: RDMA/hfi1: Fix use-after-free bug for mm struct Under certain conditions, such as MPI_Abort, the hfi1 cleanup code may represent the last reference held on the task mm. hfi1_mmu_rb...

  • EPSS 0.01%
  • Veröffentlicht 26.02.2025 07:00:43
  • Zuletzt bearbeitet 01.10.2025 20:15:44

In the Linux kernel, the following vulnerability has been resolved: cifs: potential buffer overflow in handling symlinks Smatch printed a warning: arch/x86/crypto/poly1305_glue.c:198 poly1305_update_arch() error: __memcpy() 'dctx->buf' too small ...

  • EPSS 0.02%
  • Veröffentlicht 26.02.2025 07:00:43
  • Zuletzt bearbeitet 24.03.2025 17:43:25

In the Linux kernel, the following vulnerability has been resolved: nfc: nci: add flush_workqueue to prevent uaf Our detector found a concurrent use-after-free bug when detaching an NCI device. The main reason for this bug is the unexpected schedul...

  • EPSS 0.01%
  • Veröffentlicht 26.02.2025 07:00:43
  • Zuletzt bearbeitet 01.10.2025 20:15:44

In the Linux kernel, the following vulnerability has been resolved: net/smc: Fix NULL pointer dereference in smc_pnet_find_ib() dev_name() was called with dev.parent as argument but without to NULL-check it before. Solve this by checking the pointe...

  • EPSS 0.01%
  • Veröffentlicht 26.02.2025 07:00:43
  • Zuletzt bearbeitet 01.10.2025 20:15:44

In the Linux kernel, the following vulnerability has been resolved: net: ethernet: stmmac: fix altr_tse_pcs function when using a fixed-link When using a fixed-link, the altr_tse_pcs driver crashes due to null-pointer dereference as no phy_device i...

  • EPSS 0.02%
  • Veröffentlicht 26.02.2025 07:00:43
  • Zuletzt bearbeitet 18.11.2025 15:08:43

In the Linux kernel, the following vulnerability has been resolved: ice: arfs: fix use-after-free when freeing @rx_cpu_rmap The CI testing bots triggered the following splat: [ 718.203054] BUG: KASAN: use-after-free in free_irq_cpu_rmap+0x53/0x80...

  • EPSS 0.01%
  • Veröffentlicht 26.02.2025 07:00:43
  • Zuletzt bearbeitet 01.10.2025 20:15:45

In the Linux kernel, the following vulnerability has been resolved: SUNRPC: Fix the svc_deferred_event trace class Fix a NULL deref crash that occurs when an svc_rqst is deferred while the sunrpc tracing subsystem is enabled. svc_revisit() sets dr-...

  • EPSS 0.01%
  • Veröffentlicht 26.02.2025 07:00:43
  • Zuletzt bearbeitet 14.10.2025 19:01:51

In the Linux kernel, the following vulnerability has been resolved: veth: Ensure eth header is in skb's linear part After feeding a decapsulated packet to a veth device with act_mirred, skb_headlen() may be 0. But veth_xmit() calls __dev_forward_sk...