Canonical

Ubuntu 24.04 LTS

5749 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 02.12.2024 14:15:11
  • Zuletzt bearbeitet 03.11.2025 23:17:21

In the Linux kernel, the following vulnerability has been resolved: ocfs2: uncache inode which has failed entering the group Syzbot has reported the following BUG: kernel BUG at fs/ocfs2/uptodate.c:509! ... Call Trace: <TASK> ? __die_body+0x5f/0...

  • EPSS 0.02%
  • Veröffentlicht 02.12.2024 08:15:08
  • Zuletzt bearbeitet 03.11.2025 23:17:20

In the Linux kernel, the following vulnerability has been resolved: hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer When hvs is released, there is a possibility that vsk->trans may not be initialized to NULL, which could lead...

Warnung
  • EPSS 14.4%
  • Veröffentlicht 02.12.2024 08:15:08
  • Zuletzt bearbeitet 04.11.2025 14:36:37

In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format This can lead to out of bounds writes since frames of this type were not taken into account when c...

  • EPSS 0.01%
  • Veröffentlicht 25.11.2024 22:15:17
  • Zuletzt bearbeitet 12.05.2026 13:16:21

In the Linux kernel, the following vulnerability has been resolved: fs: Fix uninitialized value issue in from_kuid and from_kgid ocfs2_setattr() uses attr->ia_mode, attr->ia_uid and attr->ia_gid in a trace point even though ATTR_MODE, ATTR_UID and ...

  • EPSS 0.02%
  • Veröffentlicht 25.11.2024 22:15:16
  • Zuletzt bearbeitet 01.10.2025 21:16:30

In the Linux kernel, the following vulnerability has been resolved: drm/xe/ufence: Prefetch ufence addr to catch bogus address access_ok() only checks for addr overflow so also try to read the addr to catch invalid addr sent from userspace. (cherr...

  • EPSS 0.01%
  • Veröffentlicht 25.11.2024 22:15:16
  • Zuletzt bearbeitet 03.11.2025 21:17:25

In the Linux kernel, the following vulnerability has been resolved: bpf: Check validity of link->type in bpf_link_show_fdinfo() If a newly-added link type doesn't invoke BPF_LINK_TYPE(), accessing bpf_link_type_strs[link->type] may result in an out...

  • EPSS 0.01%
  • Veröffentlicht 25.11.2024 22:15:16
  • Zuletzt bearbeitet 03.11.2025 23:17:19

In the Linux kernel, the following vulnerability has been resolved: nvme: tcp: avoid race between queue_lock lock and destroy Commit 76d54bf20cdc ("nvme-tcp: don't access released socket during error recovery") added a mutex_lock() call for the que...

Exploit
  • EPSS 0.01%
  • Veröffentlicht 25.11.2024 22:15:15
  • Zuletzt bearbeitet 03.11.2025 23:17:19

In the Linux kernel, the following vulnerability has been resolved: mm: resolve faulty mmap_region() error path behaviour The mmap_region() function is somewhat terrifying, with spaghetti-like control flow and numerous means by which issues can ari...

  • EPSS 2.59%
  • Veröffentlicht 22.11.2024 21:15:18
  • Zuletzt bearbeitet 03.11.2025 23:17:32

BlueZ HID over GATT Profile Improper Access Control Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of BlueZ. Authentication is not required to exploit this...

  • EPSS 0%
  • Veröffentlicht 21.11.2024 19:15:12
  • Zuletzt bearbeitet 01.10.2025 21:16:28

In the Linux kernel, the following vulnerability has been resolved: afs: Fix lock recursion afs_wake_up_async_call() can incur lock recursion. The problem is that it is called from AF_RXRPC whilst holding the ->notify_lock, but it tries to take a ...