Canonical

Ubuntu 22.04 LTS

7957 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 06.12.2024 10:15:06
  • Zuletzt bearbeitet 03.11.2025 21:17:30

In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: add missing range check in bitmap_ip_uadt When tb[IPSET_ATTR_IP_TO] is not present but tb[IPSET_ATTR_CIDR] exists, the values of ip and ip_to are slightly swapped...

  • EPSS 0.02%
  • Veröffentlicht 06.12.2024 10:15:06
  • Zuletzt bearbeitet 03.11.2025 21:17:30

In the Linux kernel, the following vulnerability has been resolved: initramfs: avoid filename buffer overrun The initramfs filename field is defined in Documentation/driver-api/early-userspace/buffer-format.rst as: 37 cpio_file := ALGN(4) + cpio_...

  • EPSS 0.01%
  • Veröffentlicht 04.12.2024 15:15:16
  • Zuletzt bearbeitet 03.11.2025 23:17:23

In the Linux kernel, the following vulnerability has been resolved: netlink: terminate outstanding dump on socket close Netlink supports iterative dumping of data. It provides the families the following ops: - start - (optional) kicks off the dump...

  • EPSS 0.02%
  • Veröffentlicht 04.12.2024 15:15:13
  • Zuletzt bearbeitet 03.11.2025 23:17:22

In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint Patch series "nilfs2: fix null-ptr-deref bugs on block tracepoints". This series fixes null pointer dereference bugs th...

  • EPSS 0.02%
  • Veröffentlicht 04.12.2024 15:15:13
  • Zuletzt bearbeitet 01.10.2025 21:16:34

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Handle dml allocation failure to avoid crash [Why] In the case where a dml allocation fails for any reason, the current state's dml contexts would no longer be val...

  • EPSS 0.01%
  • Veröffentlicht 04.12.2024 15:15:13
  • Zuletzt bearbeitet 03.11.2025 23:17:22

In the Linux kernel, the following vulnerability has been resolved: KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN Hide KVM's pt_mode module param behind CONFIG_BROKEN, i.e. disable support for virtualizing Intel PT v...

  • EPSS 0.01%
  • Veröffentlicht 04.12.2024 15:15:13
  • Zuletzt bearbeitet 03.11.2025 23:17:22

In the Linux kernel, the following vulnerability has been resolved: mm: revert "mm: shmem: fix data-race in shmem_getattr()" Revert d949d1d14fa2 ("mm: shmem: fix data-race in shmem_getattr()") as suggested by Chuck [1]. It is causing deadlocks whe...

  • EPSS 0.02%
  • Veröffentlicht 04.12.2024 15:15:13
  • Zuletzt bearbeitet 03.11.2025 23:17:23

In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: kTLS, Fix incorrect page refcounting The kTLS tx handling code is using a mix of get_page() and page_ref_inc() APIs to increment the page reference. But on the release p...

  • EPSS 0.01%
  • Veröffentlicht 04.12.2024 15:15:12
  • Zuletzt bearbeitet 03.11.2025 23:17:22

In the Linux kernel, the following vulnerability has been resolved: Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K" The commit 8396c793ffdf ("mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K") increased the max_req_siz...

  • EPSS 0.02%
  • Veröffentlicht 04.12.2024 15:15:12
  • Zuletzt bearbeitet 03.11.2025 21:17:28

In the Linux kernel, the following vulnerability has been resolved: sched/task_stack: fix object_is_on_stack() for KASAN tagged pointers When CONFIG_KASAN_SW_TAGS and CONFIG_KASAN_STACK are enabled, the object_is_on_stack() function may produce inc...