Canonical

Ubuntu 26.04

523 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 24.04.2026 14:42:39
  • Zuletzt bearbeitet 28.04.2026 14:14:07

In the Linux kernel, the following vulnerability has been resolved: NFC: digital: Bounds check NFC-A cascade depth in SDD response handler The NFC-A anti-collision cascade in digital_in_recv_sdd_res() appends 3 or 4 bytes to target->nfcid1 on each ...

  • EPSS 0.03%
  • Veröffentlicht 24.04.2026 14:42:38
  • Zuletzt bearbeitet 28.04.2026 14:11:42

In the Linux kernel, the following vulnerability has been resolved: ALSA: usx2y: us144mkii: fix NULL deref on missing interface 0 A malicious USB device with the TASCAM US-144MKII device id can have a configuration containing bInterfaceNumber=1 but...

  • EPSS 0.02%
  • Veröffentlicht 24.04.2026 14:42:37
  • Zuletzt bearbeitet 28.04.2026 14:07:04

In the Linux kernel, the following vulnerability has been resolved: fbdev: tdfxfb: avoid divide-by-zero on FBIOPUT_VSCREENINFO Much like commit 19f953e74356 ("fbdev: fb_pm2fb: Avoid potential divide by zero error"), we also need to prevent that sam...

  • EPSS 0.01%
  • Veröffentlicht 24.04.2026 14:42:37
  • Zuletzt bearbeitet 28.04.2026 14:09:16

In the Linux kernel, the following vulnerability has been resolved: ALSA: fireworks: bound device-supplied status before string array lookup The status field in an EFW response is a 32-bit value supplied by the firewire device. efr_status_names[] ...

  • EPSS 0.01%
  • Veröffentlicht 24.04.2026 14:42:36
  • Zuletzt bearbeitet 28.04.2026 17:27:20

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_ncm: validate minimum block_len in ncm_unwrap_ntb() The block_len read from the host-supplied NTB header is checked against ntb_max but has no lower bound. When bloc...

  • EPSS 0.01%
  • Veröffentlicht 24.04.2026 14:42:35
  • Zuletzt bearbeitet 28.04.2026 17:21:15

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_phonet: fix skb frags[] overflow in pn_rx_complete() A broken/bored/mean USB host can overflow the skb_shared_info->frags[] array on a Linux gadget exposing a Phonet...

  • EPSS 0.01%
  • Veröffentlicht 24.04.2026 14:42:34
  • Zuletzt bearbeitet 29.04.2026 18:03:40

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix off-by-8 bounds check in check_wsl_eas() The bounds check uses (u8 *)ea + nlen + 1 + vlen as the end of the EA name and value, but ea_data sits at offset sizeof(st...

  • EPSS 0.02%
  • Veröffentlicht 24.04.2026 14:42:34
  • Zuletzt bearbeitet 28.04.2026 17:29:26

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: renesas_usb3: validate endpoint index in standard request handlers The GET_STATUS and SET/CLEAR_FEATURE handlers extract the endpoint number from the host-supplied wIn...

  • EPSS 0.05%
  • Veröffentlicht 24.04.2026 14:42:33
  • Zuletzt bearbeitet 28.04.2026 15:13:18

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix OOB reads parsing symlink error response When a CREATE returns STATUS_STOPPED_ON_SYMLINK, smb2_check_message() returns success without any length validation, leavi...

  • EPSS 0.07%
  • Veröffentlicht 24.04.2026 14:42:32
  • Zuletzt bearbeitet 29.04.2026 16:56:48

In the Linux kernel, the following vulnerability has been resolved: ksmbd: require 3 sub-authorities before reading sub_auth[2] parse_dacl() compares each ACE SID against sid_unix_NFS_mode and on match reads sid.sub_auth[2] as the file mode. If si...