Canonical

Ubuntu 24.04 LTS

5749 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 21.06.2024 12:15:11
  • Zuletzt bearbeitet 23.05.2025 20:48:04

In the Linux kernel, the following vulnerability has been resolved: tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer The TPM SPI transfer mechanism uses MAX_SPI_FRAMESIZE for computing the maximum transfer length and the size...

  • EPSS 0.03%
  • Veröffentlicht 21.06.2024 12:15:11
  • Zuletzt bearbeitet 21.11.2024 09:22:16

In the Linux kernel, the following vulnerability has been resolved: tracing/probes: fix error check in parse_btf_field() btf_find_struct_member() might return NULL or an error via the ERR_PTR() macro. However, its caller in parse_btf_field() only c...

  • EPSS 0.04%
  • Veröffentlicht 21.06.2024 12:15:11
  • Zuletzt bearbeitet 12.05.2026 12:16:56

In the Linux kernel, the following vulnerability has been resolved: bpf: Allow delete from sockmap/sockhash only if update is allowed We have seen an influx of syzkaller reports where a BPF program attached to a tracepoint triggers a locking rule v...

  • EPSS 0.02%
  • Veröffentlicht 21.06.2024 12:15:11
  • Zuletzt bearbeitet 12.05.2026 12:16:56

In the Linux kernel, the following vulnerability has been resolved: dma-buf/sw-sync: don't enable IRQ from sync_print_obj() Since commit a6aa8fca4d79 ("dma-buf/sw-sync: Reduce irqsave/irqrestore from known context") by error replaced spin_unlock_ir...

  • EPSS 0.08%
  • Veröffentlicht 21.06.2024 12:15:11
  • Zuletzt bearbeitet 30.05.2025 19:30:44

In the Linux kernel, the following vulnerability has been resolved: dma-mapping: benchmark: handle NUMA_NO_NODE correctly cpumask_of_node() can be called for NUMA_NO_NODE inside do_map_benchmark() resulting in the following sanitizer report: UBSAN...

  • EPSS 0.08%
  • Veröffentlicht 21.06.2024 12:15:10
  • Zuletzt bearbeitet 17.09.2025 17:00:58

In the Linux kernel, the following vulnerability has been resolved: dma-mapping: benchmark: fix node id validation While validating node ids in map_benchmark_ioctl(), node_possible() may be provided with invalid argument outside of [0,MAX_NUMNODES-...

  • EPSS 0.01%
  • Veröffentlicht 21.06.2024 12:15:10
  • Zuletzt bearbeitet 12.05.2026 12:16:48

In the Linux kernel, the following vulnerability has been resolved: SUNRPC: Fix loop termination condition in gss_free_in_token_pages() The in_token->pages[] array is not NULL terminated. This results in the following KASAN splat: KASAN: maybe w...

  • EPSS 0.03%
  • Veröffentlicht 21.06.2024 11:15:12
  • Zuletzt bearbeitet 04.11.2025 18:16:29

In the Linux kernel, the following vulnerability has been resolved: serial: max3100: Update uart_driver_registered on driver removal The removal of the last MAX3100 device triggers the removal of the driver. However, code doesn't update the respect...

  • EPSS 0.02%
  • Veröffentlicht 21.06.2024 11:15:12
  • Zuletzt bearbeitet 04.11.2025 18:16:29

In the Linux kernel, the following vulnerability has been resolved: serial: max3100: Lock port->lock when calling uart_handle_cts_change() uart_handle_cts_change() has to be called with port lock taken, Since we run it in a separate work, the lock ...

  • EPSS 0.02%
  • Veröffentlicht 21.06.2024 11:15:12
  • Zuletzt bearbeitet 12.05.2026 12:16:55

In the Linux kernel, the following vulnerability has been resolved: soundwire: cadence: fix invalid PDI offset For some reason, we add an offset to the PDI, presumably to skip the PDI0 and PDI1 which are reserved for BPT. This code is however comp...