Canonical

Ubuntu 24.04 LTS

5749 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 21.06.2024 11:15:12
  • Zuletzt bearbeitet 03.10.2025 14:55:23

In the Linux kernel, the following vulnerability has been resolved: f2fs: multidev: fix to recognize valid zero block address As reported by Yi Zhang in mailing list [1], kernel warning was catched during zbd/010 test as below: ./check zbd/010 zbd...

  • EPSS 0.03%
  • Veröffentlicht 21.06.2024 11:15:12
  • Zuletzt bearbeitet 04.11.2025 18:16:29

In the Linux kernel, the following vulnerability has been resolved: greybus: lights: check return of get_channel_from_mode If channel for the given node is not found we return null from get_channel_from_mode. Make sure we validate the return pointe...

  • EPSS 0.02%
  • Veröffentlicht 21.06.2024 11:15:12
  • Zuletzt bearbeitet 12.05.2026 12:16:55

In the Linux kernel, the following vulnerability has been resolved: enic: Validate length of nl attributes in enic_set_vf_port enic_set_vf_port assumes that the nl attribute IFLA_PORT_PROFILE is of length PORT_PROFILE_MAX and that the nl attributes...

  • EPSS 0.04%
  • Veröffentlicht 21.06.2024 11:15:11
  • Zuletzt bearbeitet 02.07.2024 20:15:05

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

  • EPSS 0.01%
  • Veröffentlicht 21.06.2024 11:15:11
  • Zuletzt bearbeitet 04.11.2025 18:16:29

In the Linux kernel, the following vulnerability has been resolved: media: stk1160: fix bounds checking in stk1160_copy_video() The subtract in this condition is reversed. The ->length is the length of the buffer. The ->bytesused is how many byte...

  • EPSS 0.03%
  • Veröffentlicht 21.06.2024 11:15:11
  • Zuletzt bearbeitet 17.09.2025 16:59:41

In the Linux kernel, the following vulnerability has been resolved: drm/msm/dpu: Add callback function pointer check before its call In dpu_core_irq_callback_handler() callback function pointer is compared to NULL, but then callback function is unc...

  • EPSS 0.25%
  • Veröffentlicht 21.06.2024 11:15:11
  • Zuletzt bearbeitet 24.03.2025 18:10:02

In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Use variable length array instead of fixed size Should fix smatch warning: ntfs_set_label() error: __builtin_memcpy() 'uni->name' too small (20 vs 256)

  • EPSS 0.03%
  • Veröffentlicht 21.06.2024 11:15:11
  • Zuletzt bearbeitet 03.10.2025 16:08:44

In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Use 64 bit variable to avoid 32 bit overflow For example, in the expression: vbo = 2 * vbo + skip

  • EPSS 0.03%
  • Veröffentlicht 21.06.2024 11:15:11
  • Zuletzt bearbeitet 07.01.2025 16:09:49

In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Check 'folio' pointer for NULL It can be NULL if bmap is called.

  • EPSS 0.02%
  • Veröffentlicht 21.06.2024 11:15:11
  • Zuletzt bearbeitet 04.11.2025 18:16:29

In the Linux kernel, the following vulnerability has been resolved: stm class: Fix a double free in stm_register_device() The put_device(&stm->dev) call will trigger stm_device_release() which frees "stm" so the vfree(stm) on the next line is a dou...