Canonical

Ubuntu 24.04 LTS

5749 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.2%
  • Veröffentlicht 13.04.2024 12:15:11
  • Zuletzt bearbeitet 04.11.2025 19:17:03

In the Linux kernel, the following vulnerability has been resolved: amdkfd: use calloc instead of kzalloc to avoid integer overflow This uses calloc instead of doing the multiplication which might overflow.

  • EPSS 0.02%
  • Veröffentlicht 10.04.2024 14:15:07
  • Zuletzt bearbeitet 12.05.2026 12:16:20

In the Linux kernel, the following vulnerability has been resolved: x86, relocs: Ignore relocations in .notes section When building with CONFIG_XEN_PV=y, .text symbols are emitted into the .notes section so that Xen can find the "startup_xen" entry...

  • EPSS 0.02%
  • Veröffentlicht 10.04.2024 11:15:49
  • Zuletzt bearbeitet 27.03.2025 21:09:57

In the Linux kernel, the following vulnerability has been resolved: net/sched: taprio: proper TCA_TAPRIO_TC_ENTRY_INDEX check taprio_parse_tc_entry() is not correctly checking TCA_TAPRIO_TC_ENTRY_INDEX attribute: int tc; // Signed value tc = nl...

  • EPSS 0.01%
  • Veröffentlicht 08.04.2024 10:15:08
  • Zuletzt bearbeitet 04.11.2025 22:15:59

In the Linux kernel, the following vulnerability has been resolved: ksmbd: validate payload size in ipc response If installing malicious ksmbd-tools, ksmbd.mountd can return invalid ipc response to ksmbd kernel server. ksmbd should validate payload...

  • EPSS 0.01%
  • Veröffentlicht 05.04.2024 09:15:09
  • Zuletzt bearbeitet 12.05.2026 12:16:19

In the Linux kernel, the following vulnerability has been resolved: vfio/pci: Lock external INTx masking ops Mask operations through config space changes to DisINTx may race INTx configuration changes via ioctl. Create wrappers that add locking fo...

  • EPSS 0.01%
  • Veröffentlicht 05.04.2024 09:15:09
  • Zuletzt bearbeitet 12.05.2026 12:16:20

In the Linux kernel, the following vulnerability has been resolved: vfio/pci: Create persistent INTx handler A vulnerability exists where the eventfd for INTx signaling can be deconfigured, which unregisters the IRQ handler but still allows eventfd...

  • EPSS 0.02%
  • Veröffentlicht 05.04.2024 09:15:09
  • Zuletzt bearbeitet 20.12.2024 14:30:24

In the Linux kernel, the following vulnerability has been resolved: vfio/platform: Create persistent IRQ handlers The vfio-platform SET_IRQS ioctl currently allows loopback triggering of an interrupt before a signaling eventfd has been configured b...

  • EPSS 0.02%
  • Veröffentlicht 05.04.2024 09:15:09
  • Zuletzt bearbeitet 27.03.2025 21:36:57

In the Linux kernel, the following vulnerability has been resolved: vfio/fsl-mc: Block calling interrupt handler without trigger The eventfd_ctx trigger pointer of the vfio_fsl_mc_irq object is initially NULL and may become NULL if the user sets th...

  • EPSS 0.02%
  • Veröffentlicht 05.04.2024 09:15:09
  • Zuletzt bearbeitet 12.05.2026 12:16:33

In the Linux kernel, the following vulnerability has been resolved: vfio/pci: Disable auto-enable of exclusive INTx IRQ Currently for devices requiring masking at the irqchip for INTx, ie. devices without DisINTx support, the IRQ is enabled in requ...

  • EPSS 0.02%
  • Veröffentlicht 04.04.2024 10:15:09
  • Zuletzt bearbeitet 19.03.2025 16:19:56

In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: release elements in clone only from destroy path Clone already always provides a current view of the lookup table, use it to destroy the set, otherwise i...