Canonical

Ubuntu Pro 20.04 LTS

3682 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 15.10.2025 07:56:07
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In the Linux kernel, the following vulnerability has been resolved: bpf: Check the helper function is valid in get_helper_proto kernel test robot reported verifier bug [1] where the helper func pointer could be NULL due to disabled config option. ...

  • EPSS 0.08%
  • Veröffentlicht 15.10.2025 07:56:05
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In the Linux kernel, the following vulnerability has been resolved: can: sun4i_can: populate ndo_change_mtu() to prevent buffer overflow Sending an PF_PACKET allows to bypass the CAN framework logic and to directly reach the xmit() function of a CA...

  • EPSS 0.08%
  • Veröffentlicht 15.10.2025 07:56:05
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In the Linux kernel, the following vulnerability has been resolved: can: hi311x: populate ndo_change_mtu() to prevent buffer overflow Sending an PF_PACKET allows to bypass the CAN framework logic and to directly reach the xmit() function of a CAN d...

  • EPSS 0.08%
  • Veröffentlicht 15.10.2025 07:56:04
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In the Linux kernel, the following vulnerability has been resolved: can: mcba_usb: populate ndo_change_mtu() to prevent buffer overflow Sending an PF_PACKET allows to bypass the CAN framework logic and to directly reach the xmit() function of a CAN...

  • EPSS 0.07%
  • Veröffentlicht 15.10.2025 07:55:55
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In the Linux kernel, the following vulnerability has been resolved: i40e: add validation for ring_len param The `ring_len` parameter provided by the virtual function (VF) is assigned directly to the hardware memory context (HMC) without any validat...

  • EPSS 0.07%
  • Veröffentlicht 15.10.2025 07:55:54
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In the Linux kernel, the following vulnerability has been resolved: i40e: fix idx validation in config queues msg Ensure idx is within range of active/initialized TCs when iterating over vf->ch[idx] in i40e_vc_config_queues_msg().

  • EPSS 0.07%
  • Veröffentlicht 15.10.2025 07:55:54
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In the Linux kernel, the following vulnerability has been resolved: i40e: fix idx validation in i40e_validate_queue_map Ensure idx is within range of active/initialized TCs when iterating over vf->ch[idx] in i40e_validate_queue_map().

  • EPSS 0.07%
  • Veröffentlicht 15.10.2025 07:55:53
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In the Linux kernel, the following vulnerability has been resolved: i40e: fix input validation logic for action_meta Fix condition to check 'greater or equal' to prevent OOB dereference.

  • EPSS 0.07%
  • Veröffentlicht 15.10.2025 07:55:52
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In the Linux kernel, the following vulnerability has been resolved: i40e: add max boundary check for VF filters There is no check for max filters that VF can request. Add it.

  • EPSS 0.07%
  • Veröffentlicht 15.10.2025 07:55:52
  • Zuletzt bearbeitet 15.04.2026 00:35:42

In the Linux kernel, the following vulnerability has been resolved: i40e: fix validation of VF state in get resources VF state I40E_VF_STATE_ACTIVE is not the only state in which VF is actually active so it should not be used to determine if a VF i...