Canonical

Ubuntu 22.04 LTS

7957 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 12.07.2024 13:15:18
  • Zuletzt bearbeitet 03.11.2025 22:17:19

In the Linux kernel, the following vulnerability has been resolved: ext4: do not create EA inode under buffer lock ext4_xattr_set_entry() creates new EA inodes while holding buffer lock on the external xattr block. This is problematic as it nests a...

  • EPSS 0.02%
  • Veröffentlicht 12.07.2024 13:15:18
  • Zuletzt bearbeitet 03.11.2025 20:16:27

In the Linux kernel, the following vulnerability has been resolved: media: mtk-vcodec: potential null pointer deference in SCP The return value of devm_kzalloc() needs to be checked to avoid NULL pointer deference. This is similar to CVE-2022-3113.

  • EPSS 0.01%
  • Veröffentlicht 12.07.2024 13:15:18
  • Zuletzt bearbeitet 03.11.2025 22:17:19

In the Linux kernel, the following vulnerability has been resolved: powerpc/pseries: Enforce hcall result buffer validity and size plpar_hcall(), plpar_hcall9(), and related functions expect callers to provide valid result buffers of certain minimu...

  • EPSS 0.01%
  • Veröffentlicht 12.07.2024 13:15:17
  • Zuletzt bearbeitet 03.11.2025 22:17:17

In the Linux kernel, the following vulnerability has been resolved: KVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin() Use {READ,WRITE}_ONCE() to access kvm->last_boosted_vcpu to ensure the loads and stores are atomic. In the extremel...

  • EPSS 0.01%
  • Veröffentlicht 12.07.2024 13:15:17
  • Zuletzt bearbeitet 03.11.2025 22:17:17

In the Linux kernel, the following vulnerability has been resolved: net: do not leave a dangling sk pointer, when socket creation fails It is possible to trigger a use-after-free by: * attaching an fentry probe to __sock_release() and the probe c...

  • EPSS 0.01%
  • Veröffentlicht 12.07.2024 13:15:17
  • Zuletzt bearbeitet 03.11.2025 22:17:17

In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list Use list_for_each_entry_safe() to allow iterating through the list and deleting the entry in the iteration pro...

  • EPSS 0.01%
  • Veröffentlicht 12.07.2024 13:15:17
  • Zuletzt bearbeitet 03.11.2025 22:17:17

In the Linux kernel, the following vulnerability has been resolved: seg6: fix parameter passing when calling NF_HOOK() in End.DX4 and End.DX6 behaviors input_action_end_dx4() and input_action_end_dx6() are called NF_HOOK() for PREROUTING hook, in P...

  • EPSS 0.01%
  • Veröffentlicht 12.07.2024 13:15:17
  • Zuletzt bearbeitet 12.05.2026 12:17:00

In the Linux kernel, the following vulnerability has been resolved: netns: Make get_net_ns() handle zero refcount net Syzkaller hit a warning: refcount_t: addition on 0; use-after-free. WARNING: CPU: 3 PID: 7890 at lib/refcount.c:25 refcount_warn_s...

  • EPSS 0.01%
  • Veröffentlicht 12.07.2024 13:15:17
  • Zuletzt bearbeitet 12.05.2026 12:17:00

In the Linux kernel, the following vulnerability has been resolved: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() ip6_dst_idev() can return NULL, xfrm6_get_saddr() must act accordingly. syzbot reported: Oops: general protection fa...

  • EPSS 0.01%
  • Veröffentlicht 12.07.2024 13:15:16
  • Zuletzt bearbeitet 03.11.2025 22:17:15

In the Linux kernel, the following vulnerability has been resolved: gve: Clear napi->skb before dev_kfree_skb_any() gve_rx_free_skb incorrectly leaves napi->skb referencing an skb after it is freed with dev_kfree_skb_any(). This can result in a sub...