Canonical

Ubuntu 18.04 LTS

1647 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 19.06.2024 15:15:55
  • Zuletzt bearbeitet 21.11.2024 06:36:39

In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scpi: Fix string overflow in SCPI genpd driver Without the bound checks for scpi_pd->name, it could result in the buffer overflow when copying the SCPI device name fr...

  • EPSS 0.03%
  • Veröffentlicht 19.06.2024 15:15:55
  • Zuletzt bearbeitet 21.11.2024 06:36:40

In the Linux kernel, the following vulnerability has been resolved: nfc: fix segfault in nfc_genl_dump_devices_done When kmalloc in nfc_genl_dump_devices() fails then nfc_genl_dump_devices_done() segfaults as below KASAN: null-ptr-deref in range [...

  • EPSS 0.02%
  • Veröffentlicht 19.06.2024 15:15:54
  • Zuletzt bearbeitet 21.11.2024 06:36:38

In the Linux kernel, the following vulnerability has been resolved: dm btree remove: fix use after free in rebalance_children() Move dm_tm_unlock() after dm_tm_dec().

  • EPSS 0.02%
  • Veröffentlicht 19.06.2024 15:15:54
  • Zuletzt bearbeitet 21.11.2024 06:36:38

In the Linux kernel, the following vulnerability has been resolved: mac80211: track only QoS data frames for admission control For admission control, obviously all of that only works for QoS data frames, otherwise we cannot even access the QoS fiel...

  • EPSS 0.02%
  • Veröffentlicht 19.06.2024 15:15:54
  • Zuletzt bearbeitet 21.11.2024 06:36:38

In the Linux kernel, the following vulnerability has been resolved: audit: improve robustness of the audit queue handling If the audit daemon were ever to get stuck in a stopped state the kernel's kauditd_thread() could get blocked attempting to se...

  • EPSS 0.01%
  • Veröffentlicht 19.06.2024 15:15:53
  • Zuletzt bearbeitet 21.11.2024 06:36:36

In the Linux kernel, the following vulnerability has been resolved: net: systemport: Add global locking for descriptor lifecycle The descriptor list is a shared resource across all of the transmit queues, and the locking mechanism used today only p...

  • EPSS 0.01%
  • Veröffentlicht 19.06.2024 15:15:53
  • Zuletzt bearbeitet 01.10.2025 13:42:32

In the Linux kernel, the following vulnerability has been resolved: sit: do not call ipip6_dev_free() from sit_init_net() ipip6_dev_free is sit dev->priv_destructor, already called by register_netdevice() if something goes wrong. Alternative would...

  • EPSS 0.01%
  • Veröffentlicht 19.06.2024 15:15:53
  • Zuletzt bearbeitet 21.11.2024 06:36:36

In the Linux kernel, the following vulnerability has been resolved: igbvf: fix double free in `igbvf_probe` In `igbvf_probe`, if register_netdev() fails, the program will go to label err_hw_init, and then to label err_ioremap. In free_netdev() whic...

  • EPSS 0.01%
  • Veröffentlicht 19.06.2024 15:15:52
  • Zuletzt bearbeitet 21.11.2024 06:36:35

In the Linux kernel, the following vulnerability has been resolved: scsi: scsi_debug: Sanity check block descriptor length in resp_mode_select() In resp_mode_select() sanity check the block descriptor len to avoid UAF. BUG: KASAN: use-after-free i...

  • EPSS 0.03%
  • Veröffentlicht 24.05.2024 15:15:22
  • Zuletzt bearbeitet 21.11.2024 06:36:34

In the Linux kernel, the following vulnerability has been resolved: staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect() The free_rtllib() function frees the "dev" pointer so there is use after free on the next line. Re-arrange things...