Canonical

Ubuntu 24.04 LTS

5749 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 11.09.2024 16:15:06
  • Zuletzt bearbeitet 12.05.2026 12:17:10

In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails There is a bug in netem_enqueue() introduced by commit 5845f706388a ("net: netem: fix skb length BUG_ON in __skb_to_sgvec") that ...

  • EPSS 0%
  • Veröffentlicht 11.09.2024 16:15:06
  • Zuletzt bearbeitet 13.09.2024 16:36:13

In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Fix IPsec RoCE MPV trace call Prevent the call trace below from happening, by not allowing IPsec creation over a slave, if master device doesn't support IPsec. WARNING: ...

  • EPSS 0.02%
  • Veröffentlicht 11.09.2024 16:15:06
  • Zuletzt bearbeitet 12.05.2026 12:17:10

In the Linux kernel, the following vulnerability has been resolved: netfilter: flowtable: initialise extack before use Fix missing initialisation of extack in flow offload.

  • EPSS 0.02%
  • Veröffentlicht 11.09.2024 16:15:06
  • Zuletzt bearbeitet 03.11.2025 23:15:50

In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Take state lock during tx timeout reporter mlx5e_safe_reopen_channels() requires the state lock taken. The referenced changed in the Fixes tag removed the lock to fix an...

  • EPSS 0.02%
  • Veröffentlicht 04.09.2024 20:15:09
  • Zuletzt bearbeitet 03.11.2025 23:15:48

In the Linux kernel, the following vulnerability has been resolved: char: xillybus: Don't destroy workqueue from work item running on it Triggered by a kref decrement, destroy_workqueue() may be called from within a work item for destroying its own...

  • EPSS 0.02%
  • Veröffentlicht 04.09.2024 20:15:09
  • Zuletzt bearbeitet 03.11.2025 23:15:49

In the Linux kernel, the following vulnerability has been resolved: Input: MT - limit max slots syzbot is reporting too large allocation at input_mt_init_slots(), for num_slots is supplied from userspace using ioctl(UI_DEV_CREATE). Since nobody kn...

  • EPSS 0.02%
  • Veröffentlicht 04.09.2024 20:15:08
  • Zuletzt bearbeitet 12.05.2026 12:17:09

In the Linux kernel, the following vulnerability has been resolved: bonding: fix xfrm real_dev null pointer dereference We shouldn't set real_dev to NULL because packets can be in transit and xfrm might call xdo_dev_offload_ok() in parallel. All ca...

  • EPSS 0.02%
  • Veröffentlicht 04.09.2024 20:15:08
  • Zuletzt bearbeitet 12.05.2026 12:17:10

In the Linux kernel, the following vulnerability has been resolved: bonding: fix null pointer deref in bond_ipsec_offload_ok We must check if there is an active slave before dereferencing the pointer.

  • EPSS 0.06%
  • Veröffentlicht 04.09.2024 20:15:08
  • Zuletzt bearbeitet 03.11.2025 23:15:47

In the Linux kernel, the following vulnerability has been resolved: tcp: prevent concurrent execution of tcp_sk_exit_batch Its possible that two threads call tcp_sk_exit_batch() concurrently, once from the cleanup_net workqueue, once from a task th...

  • EPSS 0.03%
  • Veröffentlicht 04.09.2024 20:15:08
  • Zuletzt bearbeitet 06.09.2024 16:28:49

In the Linux kernel, the following vulnerability has been resolved: drm/v3d: Fix out-of-bounds read in `v3d_csd_job_run()` When enabling UBSAN on Raspberry Pi 5, we get the following warning: [ 387.894977] UBSAN: array-index-out-of-bounds in driv...