Canonical

Ubuntu 24.04 LTS

5749 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.18%
  • Veröffentlicht 16.04.2025 14:11:57
  • Zuletzt bearbeitet 06.04.2026 14:29:37

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix session use-after-free in multichannel connection There is a race condition between session setup and ksmbd_sessions_deregister. The session can be freed before the conn...

  • EPSS 0.05%
  • Veröffentlicht 16.04.2025 14:11:56
  • Zuletzt bearbeitet 03.11.2025 20:17:38

In the Linux kernel, the following vulnerability has been resolved: ksmbd: validate zero num_subauth before sub_auth is accessed Access psid->sub_auth[psid->num_subauth - 1] without checking if num_subauth is non-zero leads to an out-of-bounds read...

  • EPSS 0.04%
  • Veröffentlicht 16.04.2025 14:11:56
  • Zuletzt bearbeitet 14.11.2025 16:51:45

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix overflow in dacloffset bounds check The dacloffset field was originally typed as int and used in an unchecked addition, which could overflow and bypass the existing boun...

  • EPSS 0.14%
  • Veröffentlicht 16.04.2025 14:11:55
  • Zuletzt bearbeitet 19.09.2025 15:15:48

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix null pointer dereference in alloc_preauth_hash() The Client send malformed smb2 negotiate request. ksmbd return error response. Subsequently, the client can send smb2 se...

  • EPSS 0.05%
  • Veröffentlicht 16.04.2025 14:11:54
  • Zuletzt bearbeitet 01.10.2025 17:15:43

In the Linux kernel, the following vulnerability has been resolved: exfat: fix random stack corruption after get_block When get_block is called with a buffer_head allocated on the stack, such as do_mpage_readpage, stack corruption due to buffer_hea...

  • EPSS 0.07%
  • Veröffentlicht 16.04.2025 14:11:53
  • Zuletzt bearbeitet 03.11.2025 20:17:38

In the Linux kernel, the following vulnerability has been resolved: tracing: Fix use-after-free in print_graph_function_flags during tracer switching Kairui reported a UAF issue in print_graph_function_flags() during ftrace stress testing [1]. This...

  • EPSS 0.09%
  • Veröffentlicht 16.04.2025 14:11:52
  • Zuletzt bearbeitet 03.11.2025 20:17:38

In the Linux kernel, the following vulnerability has been resolved: arm64: Don't call NULL in do_compat_alignment_fixup() do_alignment_t32_to_handler() only fixes up alignment faults for specific instructions; it returns NULL otherwise (e.g. LDREX)...

  • EPSS 0.08%
  • Veröffentlicht 16.04.2025 14:11:48
  • Zuletzt bearbeitet 03.11.2025 20:17:38

In the Linux kernel, the following vulnerability has been resolved: media: streamzap: fix race between device disconnection and urb callback Syzkaller has reported a general protection fault at function ir_raw_event_store_with_filter(). This crash ...

  • EPSS 0.06%
  • Veröffentlicht 16.04.2025 14:11:48
  • Zuletzt bearbeitet 28.10.2025 19:05:26

In the Linux kernel, the following vulnerability has been resolved: media: vimc: skip .s_stream() for stopped entities Syzbot reported [1] a warning prompted by a check in call_s_stream() that checks whether .s_stream() operation is warranted for u...

  • EPSS 0.08%
  • Veröffentlicht 16.04.2025 14:11:47
  • Zuletzt bearbeitet 06.04.2026 13:40:05

In the Linux kernel, the following vulnerability has been resolved: nfsd: don't ignore the return code of svc_proc_register() Currently, nfsd_proc_stat_init() ignores the return value of svc_proc_register(). If the procfile creation fails, then the...