Canonical

Ubuntu 24.04 LTS

5749 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 18.04.2025 14:20:55
  • Zuletzt bearbeitet 03.11.2025 20:18:37

In the Linux kernel, the following vulnerability has been resolved: HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol Driver Due to Race Condition In the ssi_protocol_probe() function, &ssi->work is bound with ssip_xmit_work(), In...

  • EPSS 0.07%
  • Veröffentlicht 18.04.2025 13:50:24
  • Zuletzt bearbeitet 17.11.2025 14:06:37

In the Linux kernel, the following vulnerability has been resolved: io_uring: fix io_req_prep_async with provided buffers io_req_prep_async() can import provided buffers, commit the ring state by giving up on that before, it'll be reimported later ...

  • EPSS 0.09%
  • Veröffentlicht 18.04.2025 07:01:41
  • Zuletzt bearbeitet 08.01.2026 10:15:49

In the Linux kernel, the following vulnerability has been resolved: md/raid10: wait barrier before returning discard request with REQ_NOWAIT raid10_handle_discard should wait barrier before returning a discard bio which has REQ_NOWAIT. And there is...

  • EPSS 0.08%
  • Veröffentlicht 18.04.2025 07:01:40
  • Zuletzt bearbeitet 30.10.2025 16:02:32

In the Linux kernel, the following vulnerability has been resolved: objtool, spi: amd: Fix out-of-bounds stack access in amd_set_spi_freq() If speed_hz < AMD_SPI_MIN_HZ, amd_set_spi_freq() iterates over the entire amd_spi_freq array without breakin...

  • EPSS 0.07%
  • Veröffentlicht 18.04.2025 07:01:40
  • Zuletzt bearbeitet 01.10.2025 15:15:44

In the Linux kernel, the following vulnerability has been resolved: iio: light: Add check for array bounds in veml6075_read_int_time_ms The array contains only 5 elements, but the index calculated by veml6075_read_int_time_index can range from 0 to...

  • EPSS 0.06%
  • Veröffentlicht 18.04.2025 07:01:39
  • Zuletzt bearbeitet 06.11.2025 21:33:09

In the Linux kernel, the following vulnerability has been resolved: x86/mce: use is_copy_from_user() to determine copy-from-user context Patch series "mm/hwpoison: Fix regressions in memory failure handling", v4. ## 1. What am I trying to do: Thi...

  • EPSS 0.07%
  • Veröffentlicht 18.04.2025 07:01:36
  • Zuletzt bearbeitet 03.11.2025 20:18:47

In the Linux kernel, the following vulnerability has been resolved: jfs: fix slab-out-of-bounds read in ea_get() During the "size_check" label in ea_get(), the code checks if the extended attribute list (xattr) size matches ea_size. If not, it logs...

  • EPSS 0.11%
  • Veröffentlicht 18.04.2025 07:01:35
  • Zuletzt bearbeitet 03.11.2025 20:18:47

In the Linux kernel, the following vulnerability has been resolved: clk: samsung: Fix UBSAN panic in samsung_clk_init() With UBSAN_ARRAY_BOUNDS=y, I'm hitting the below panic due to dereferencing `ctx->clk_data.hws` before setting `ctx->clk_data.nu...

  • EPSS 0.1%
  • Veröffentlicht 18.04.2025 07:01:34
  • Zuletzt bearbeitet 06.11.2025 21:35:04

In the Linux kernel, the following vulnerability has been resolved: net_sched: skbprio: Remove overly strict queue assertions In the current implementation, skbprio enqueue/dequeue contains an assertion that fails under certain conditions when SKBP...

  • EPSS 0.13%
  • Veröffentlicht 18.04.2025 07:01:33
  • Zuletzt bearbeitet 17.03.2026 14:31:53

In the Linux kernel, the following vulnerability has been resolved: ksmbd: use aead_request_free to match aead_request_alloc Use aead_request_free() instead of kfree() to properly free memory allocated by aead_request_alloc(). This ensures sensitiv...