Canonical

Ubuntu 24.04 LTS

5749 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 24.04.2026 14:42:16
  • Zuletzt bearbeitet 28.04.2026 20:42:38

In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Use scratch field in MMIO fragment to hold small write values When exiting to userspace to service an emulated MMIO write, copy the to-be-written value to a scratch field...

  • EPSS 0.01%
  • Veröffentlicht 24.04.2026 14:42:15
  • Zuletzt bearbeitet 28.04.2026 20:44:18

In the Linux kernel, the following vulnerability has been resolved: ASoC: qcom: q6apm: move component registration to unmanaged version q6apm component registers dais dynamically from ASoC toplology, which are allocated using device managed version...

  • EPSS 0.01%
  • Veröffentlicht 24.04.2026 14:42:14
  • Zuletzt bearbeitet 28.04.2026 20:47:22

In the Linux kernel, the following vulnerability has been resolved: media: vidtv: fix nfeeds state corruption on start_streaming failure syzbot reported a memory leak in vidtv_psi_service_desc_init [1]. When vidtv_start_streaming() fails inside vi...

  • EPSS 0.01%
  • Veröffentlicht 24.04.2026 14:42:14
  • Zuletzt bearbeitet 28.04.2026 20:45:58

In the Linux kernel, the following vulnerability has been resolved: mm: blk-cgroup: fix use-after-free in cgwb_release_workfn() cgwb_release_workfn() calls css_put(wb->blkcg_css) and then later accesses wb->blkcg_css again via blkcg_unpin_online()....

  • EPSS 0.01%
  • Veröffentlicht 24.04.2026 14:42:13
  • Zuletzt bearbeitet 27.04.2026 20:20:32

In the Linux kernel, the following vulnerability has been resolved: media: mediatek: vcodec: fix use-after-free in encoder release path The fops_vcodec_release() function frees the context structure (ctx) without first cancelling any pending or run...

  • EPSS 0.01%
  • Veröffentlicht 24.04.2026 14:42:12
  • Zuletzt bearbeitet 27.04.2026 20:26:58

In the Linux kernel, the following vulnerability has been resolved: hwmon: (powerz) Fix use-after-free on USB disconnect After powerz_disconnect() frees the URB and releases the mutex, a subsequent powerz_read() call can acquire the mutex and call ...

  • EPSS 0.01%
  • Veröffentlicht 24.04.2026 14:42:12
  • Zuletzt bearbeitet 27.04.2026 20:26:18

In the Linux kernel, the following vulnerability has been resolved: media: em28xx: fix use-after-free in em28xx_v4l2_open() em28xx_v4l2_open() reads dev->v4l2 without holding dev->lock, creating a race with em28xx_v4l2_init()'s error path and em28x...

  • EPSS 0.01%
  • Veröffentlicht 24.04.2026 14:42:11
  • Zuletzt bearbeitet 27.04.2026 20:28:08

In the Linux kernel, the following vulnerability has been resolved: ALSA: 6fire: fix use-after-free on disconnect In usb6fire_chip_abort(), the chip struct is allocated as the card's private data (via snd_card_new with sizeof(struct sfire_chip)). ...

  • EPSS 0.01%
  • Veröffentlicht 24.04.2026 14:42:10
  • Zuletzt bearbeitet 27.04.2026 20:43:29

In the Linux kernel, the following vulnerability has been resolved: wireguard: device: use exit_rtnl callback instead of manual rtnl_lock in pre_exit wg_netns_pre_exit() manually acquires rtnl_lock() inside the pernet .pre_exit callback. This caus...

  • EPSS 0.01%
  • Veröffentlicht 24.04.2026 14:42:10
  • Zuletzt bearbeitet 27.04.2026 20:29:15

In the Linux kernel, the following vulnerability has been resolved: bcache: fix cached_dev.sb_bio use-after-free and crash In our production environment, we have received multiple crash reports regarding libceph, which have caught our attention: `...