Canonical

Ubuntu 22.04 LTS

7957 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 21.05.2024 16:15:24
  • Zuletzt bearbeitet 06.01.2025 20:30:18

In the Linux kernel, the following vulnerability has been resolved: clk: mediatek: clk-mt6779: Add check for mtk_alloc_clk_data Add the check for the return value of mtk_alloc_clk_data() in order to avoid NULL pointer dereference.

  • EPSS 0.02%
  • Veröffentlicht 21.05.2024 16:15:24
  • Zuletzt bearbeitet 06.01.2025 20:31:11

In the Linux kernel, the following vulnerability has been resolved: clk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data Add the check for the return value of mtk_alloc_clk_data() in order to avoid NULL pointer dereference.

  • EPSS 0.05%
  • Veröffentlicht 21.05.2024 16:15:24
  • Zuletzt bearbeitet 06.01.2025 20:31:44

In the Linux kernel, the following vulnerability has been resolved: clk: mediatek: clk-mt7629-eth: Add check for mtk_alloc_clk_data Add the check for the return value of mtk_alloc_clk_data() in order to avoid NULL pointer dereference.

  • EPSS 0.02%
  • Veröffentlicht 21.05.2024 16:15:24
  • Zuletzt bearbeitet 06.01.2025 20:32:18

In the Linux kernel, the following vulnerability has been resolved: usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm() It is possible that typec_register_partner() returns ERR_PTR on failure. When port->partner is an error, a NULL poi...

  • EPSS 0.02%
  • Veröffentlicht 21.05.2024 16:15:24
  • Zuletzt bearbeitet 21.11.2024 08:40:46

In the Linux kernel, the following vulnerability has been resolved: can: dev: can_put_echo_skb(): don't crash kernel if can_priv::echo_skb is accessed out of bounds If the "struct can_priv::echoo_skb" is accessed out of bounds, this would cause a k...

  • EPSS 0.02%
  • Veröffentlicht 21.05.2024 16:15:24
  • Zuletzt bearbeitet 03.02.2025 15:46:08

In the Linux kernel, the following vulnerability has been resolved: tracing: Have trace_event_file have ref counters The following can crash the kernel: # cd /sys/kernel/tracing # echo 'p:sched schedule' > kprobe_events # exec 5>>events/kprobes...

  • EPSS 0.01%
  • Veröffentlicht 21.05.2024 16:15:23
  • Zuletzt bearbeitet 14.01.2025 16:31:00

In the Linux kernel, the following vulnerability has been resolved: hwmon: (axi-fan-control) Fix possible NULL pointer dereference axi_fan_control_irq_handler(), dependent on the private axi_fan_control_data structure, might be called before the hw...

  • EPSS 0.01%
  • Veröffentlicht 21.05.2024 16:15:23
  • Zuletzt bearbeitet 24.09.2025 00:15:36

In the Linux kernel, the following vulnerability has been resolved: platform/x86: wmi: Fix opening of char device Since commit fa1f68db6ca7 ("drivers: misc: pass miscdevice pointer via file private data"), the miscdevice stores a pointer to itself ...

  • EPSS 0.01%
  • Veröffentlicht 21.05.2024 16:15:23
  • Zuletzt bearbeitet 14.01.2025 16:29:50

In the Linux kernel, the following vulnerability has been resolved: clk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data Add the check for the return value of mtk_alloc_clk_data() in order to avoid NULL pointer dereference.

  • EPSS 0.03%
  • Veröffentlicht 21.05.2024 16:15:23
  • Zuletzt bearbeitet 24.09.2025 00:47:20

In the Linux kernel, the following vulnerability has been resolved: drm/radeon: possible buffer overflow Buffer 'afmt_status' of size 6 could overflow, since index 'afmt_idx' is checked after access.