Canonical

Ubuntu 24.04 LTS

5749 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 14.01.2026 15:16:01
  • Zuletzt bearbeitet 25.03.2026 19:00:59

In the Linux kernel, the following vulnerability has been resolved: via_wdt: fix critical boot hang due to unnamed resource allocation The VIA watchdog driver uses allocate_resource() to reserve a MMIO region for the watchdog control register. Howe...

  • EPSS 0.03%
  • Veröffentlicht 14.01.2026 15:16:01
  • Zuletzt bearbeitet 25.03.2026 19:00:38

In the Linux kernel, the following vulnerability has been resolved: um: init cpu_tasks[] earlier This is currently done in uml_finishsetup(), but e.g. with KCOV enabled we'll crash because some init code can call into e.g. memparse(), which has cov...

  • EPSS 0.02%
  • Veröffentlicht 14.01.2026 15:16:01
  • Zuletzt bearbeitet 25.03.2026 18:59:53

In the Linux kernel, the following vulnerability has been resolved: libceph: make decode_pool() more resilient against corrupted osdmaps If the osdmap is (maliciously) corrupted such that the encoded length of ceph_pg_pool envelope is less than wha...

  • EPSS 0.03%
  • Veröffentlicht 14.01.2026 15:16:01
  • Zuletzt bearbeitet 25.03.2026 18:55:17

In the Linux kernel, the following vulnerability has been resolved: ACPICA: Avoid walking the Namespace if start_node is NULL Although commit 0c9992315e73 ("ACPICA: Avoid walking the ACPI Namespace if it is not there") fixed the situation when both...

  • EPSS 0.03%
  • Veröffentlicht 14.01.2026 15:16:01
  • Zuletzt bearbeitet 25.03.2026 18:46:03

In the Linux kernel, the following vulnerability has been resolved: powerpc/kexec: Enable SMT before waking offline CPUs If SMT is disabled or a partial SMT state is enabled, when a new kernel image is loaded for kexec, on reboot the following warn...

  • EPSS 0.03%
  • Veröffentlicht 14.01.2026 15:16:01
  • Zuletzt bearbeitet 25.03.2026 18:45:33

In the Linux kernel, the following vulnerability has been resolved: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf A zero length gss_token results in pages == 0 and in_token->pages[0] is NULL. The code uncondi...

  • EPSS 0.04%
  • Veröffentlicht 14.01.2026 15:16:01
  • Zuletzt bearbeitet 25.03.2026 18:37:36

In the Linux kernel, the following vulnerability has been resolved: parisc: Do not reprogram affinitiy on ASP chip The ASP chip is a very old variant of the GSP chip and is used e.g. in HP 730 workstations. When trying to reprogram the affinity it ...

  • EPSS 0.02%
  • Veröffentlicht 14.01.2026 15:16:01
  • Zuletzt bearbeitet 25.03.2026 18:36:07

In the Linux kernel, the following vulnerability has been resolved: iommufd/selftest: Check for overflow in IOMMU_TEST_OP_ADD_RESERVED syzkaller found it could overflow math in the test infrastructure and cause a WARN_ON by corrupting the reserved ...

  • EPSS 0.02%
  • Veröffentlicht 14.01.2026 15:16:00
  • Zuletzt bearbeitet 25.03.2026 19:27:20

In the Linux kernel, the following vulnerability has been resolved: hwmon: (w83791d) Convert macros to functions to avoid TOCTOU The macro FAN_FROM_REG evaluates its arguments multiple times. When used in lockless contexts involving shared driver d...

  • EPSS 0.02%
  • Veröffentlicht 14.01.2026 15:16:00
  • Zuletzt bearbeitet 25.03.2026 19:59:29

In the Linux kernel, the following vulnerability has been resolved: net: hns3: add VLAN id validation before using Currently, the VLAN id may be used without validation when receive a VLAN configuration mailbox from VF. The length of vlan_del_fail_...