Canonical

Ubuntu 22.04 LTS

7957 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 21.06.2024 11:15:11
  • Zuletzt bearbeitet 03.10.2025 16:08:44

In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Use 64 bit variable to avoid 32 bit overflow For example, in the expression: vbo = 2 * vbo + skip

  • EPSS 0.03%
  • Veröffentlicht 21.06.2024 11:15:11
  • Zuletzt bearbeitet 07.01.2025 16:09:49

In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Check 'folio' pointer for NULL It can be NULL if bmap is called.

  • EPSS 0.02%
  • Veröffentlicht 21.06.2024 11:15:11
  • Zuletzt bearbeitet 04.11.2025 18:16:29

In the Linux kernel, the following vulnerability has been resolved: stm class: Fix a double free in stm_register_device() The put_device(&stm->dev) call will trigger stm_device_release() which frees "stm" so the vfree(stm) on the next line is a dou...

  • EPSS 0.03%
  • Veröffentlicht 21.06.2024 11:15:11
  • Zuletzt bearbeitet 24.03.2025 18:09:37

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: u_audio: Fix race condition use of controls after free during gadget unbind. Hang on to the control IDs instead of pointers since those are correctly handled with lock...

  • EPSS 0.03%
  • Veröffentlicht 21.06.2024 11:15:11
  • Zuletzt bearbeitet 21.11.2024 09:26:31

In the Linux kernel, the following vulnerability has been resolved: watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger When the cpu5wdt module is removing, the origin code uses del_timer() to de-activate the timer. If the timer h...

  • EPSS 0.01%
  • Veröffentlicht 21.06.2024 11:15:11
  • Zuletzt bearbeitet 03.11.2025 22:17:02

In the Linux kernel, the following vulnerability has been resolved: vfio/pci: fix potential memory leak in vfio_intx_enable() If vfio_irq_ctx_alloc() failed will lead to 'name' memory leak.

  • EPSS 0.02%
  • Veröffentlicht 21.06.2024 11:15:10
  • Zuletzt bearbeitet 12.05.2026 12:16:47

In the Linux kernel, the following vulnerability has been resolved: netfilter: tproxy: bail out if IP has been disabled on the device syzbot reports: general protection fault, probably for non-canonical address 0xdffffc0000000003: 0000 [#1] PREEMPT...

  • EPSS 0.02%
  • Veröffentlicht 21.06.2024 11:15:10
  • Zuletzt bearbeitet 12.05.2026 12:16:48

In the Linux kernel, the following vulnerability has been resolved: netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu() syzbot reported that nf_reinject() could be called without rcu_read_lock() : WARNING: suspicious RCU ...

  • EPSS 0.01%
  • Veröffentlicht 21.06.2024 11:15:10
  • Zuletzt bearbeitet 03.11.2025 22:16:58

In the Linux kernel, the following vulnerability has been resolved: null_blk: fix null-ptr-dereference while configuring 'power' and 'submit_queues' Writing 'power' and 'submit_queues' concurrently will trigger kernel panic: Test script: modprobe...

  • EPSS 0.01%
  • Veröffentlicht 21.06.2024 11:15:10
  • Zuletzt bearbeitet 12.05.2026 12:16:48

In the Linux kernel, the following vulnerability has been resolved: net: relax socket state check at accept time. Christoph reported the following splat: WARNING: CPU: 1 PID: 772 at net/ipv4/af_inet.c:761 __inet_accept+0x1f4/0x4a0 Modules linked i...