Canonical

Ubuntu 25.10

2230 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 22.04.2026 14:16:48
  • Zuletzt bearbeitet 28.04.2026 13:50:58

In the Linux kernel, the following vulnerability has been resolved: net: ti: icssg-prueth: fix use-after-free of CPPI descriptor in RX path cppi5_hdesc_get_psdata() returns a pointer into the CPPI descriptor. In both emac_rx_packet() and emac_rx_pa...

  • EPSS 0.01%
  • Veröffentlicht 22.04.2026 14:16:48
  • Zuletzt bearbeitet 28.04.2026 14:47:01

In the Linux kernel, the following vulnerability has been resolved: team: fix header_ops type confusion with non-Ethernet ports Similar to commit 950803f72547 ("bonding: fix type confusion in bond_setup_by_slave()") team has the same class of heade...

  • EPSS 0.01%
  • Veröffentlicht 22.04.2026 14:16:48
  • Zuletzt bearbeitet 28.04.2026 15:07:47

In the Linux kernel, the following vulnerability has been resolved: udp: Fix wildcard bind conflict check when using hash2 When binding a udp_sock to a local address and port, UDP uses two hashes (udptable->hash and udptable->hash2) for collision d...

  • EPSS 0.01%
  • Veröffentlicht 22.04.2026 14:16:47
  • Zuletzt bearbeitet 28.04.2026 12:46:35

In the Linux kernel, the following vulnerability has been resolved: RDMA/irdma: Initialize free_qp completion before using it In irdma_create_qp, if ib_copy_to_udata fails, it will call irdma_destroy_qp to clean up which will attempt to wait on the...

  • EPSS 0.01%
  • Veröffentlicht 22.04.2026 14:16:47
  • Zuletzt bearbeitet 28.04.2026 14:45:56

In the Linux kernel, the following vulnerability has been resolved: RDMA/efa: Fix use of completion ctx after free On admin queue completion handling, if the admin command completed with error we print data from the completion context. The issue is...

  • EPSS 0.02%
  • Veröffentlicht 22.04.2026 14:16:47
  • Zuletzt bearbeitet 28.04.2026 14:44:57

In the Linux kernel, the following vulnerability has been resolved: net: macb: use the current queue number for stats There's a potential mismatch between the memory reserved for statistics and the amount of memory written. gem_get_sset_count() co...

  • EPSS 0.02%
  • Veröffentlicht 22.04.2026 14:16:47
  • Zuletzt bearbeitet 28.04.2026 14:44:15

In the Linux kernel, the following vulnerability has been resolved: netfilter: ctnetlink: use netlink policy range checks Replace manual range and mask validations with netlink policy annotations in ctnetlink code paths, so that the netlink core re...

  • EPSS 0.01%
  • Veröffentlicht 22.04.2026 14:16:47
  • Zuletzt bearbeitet 28.04.2026 14:43:22

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conntrack_expect: skip expectations in other netns via proc Skip expectations that do not reside in this netns. Similar to e77e6ff502ea ("netfilter: conntrack: do no...

  • EPSS 0.01%
  • Veröffentlicht 22.04.2026 14:16:47
  • Zuletzt bearbeitet 28.04.2026 14:42:28

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btusb: clamp SCO altsetting table indices btusb_work() maps the number of active SCO links to USB alternate settings through a three-entry lookup table when CVSD traffic...

  • EPSS 0.01%
  • Veröffentlicht 22.04.2026 14:16:46
  • Zuletzt bearbeitet 28.04.2026 13:06:48

In the Linux kernel, the following vulnerability has been resolved: hwmon: (pmbus/core) Protect regulator operations with mutex The regulator operations pmbus_regulator_get_voltage(), pmbus_regulator_set_voltage(), and pmbus_regulator_list_voltage(...