Canonical

Ubuntu Pro 20.04 LTS

3682 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 04.10.2025 07:31:10
  • Zuletzt bearbeitet 25.03.2026 00:36:02

In the Linux kernel, the following vulnerability has been resolved: qed: Don't collect too many protection override GRC elements In the protection override dump path, the firmware can return far too many GRC elements, resulting in attempting to wri...

  • EPSS 0.03%
  • Veröffentlicht 04.10.2025 07:31:07
  • Zuletzt bearbeitet 23.01.2026 20:56:32

In the Linux kernel, the following vulnerability has been resolved: cnic: Fix use-after-free bugs in cnic_delete_task The original code uses cancel_delayed_work() in cnic_cm_stop_bnx2x_hw(), which does not guarantee that the delayed work item 'dele...

  • EPSS 0.01%
  • Veröffentlicht 04.10.2025 07:31:03
  • Zuletzt bearbeitet 23.01.2026 20:35:34

In the Linux kernel, the following vulnerability has been resolved: dm-stripe: fix a possible integer overflow There's a possible integer overflow in stripe_io_hints if we have too large chunk size. Test if the overflow happened, and if it did, don...

  • EPSS 0.03%
  • Veröffentlicht 04.10.2025 07:31:00
  • Zuletzt bearbeitet 25.03.2026 00:46:04

In the Linux kernel, the following vulnerability has been resolved: net: rfkill: gpio: Fix crash due to dereferencering uninitialized pointer Since commit 7d5e9737efda ("net: rfkill: gpio: get the name and type from device property") rfkill_find_ty...

  • EPSS 0.02%
  • Veröffentlicht 04.10.2025 07:30:57
  • Zuletzt bearbeitet 25.03.2026 00:51:25

In the Linux kernel, the following vulnerability has been resolved: smb: client: let recv_done verify data_offset, data_length and remaining_data_length This is inspired by the related server fixes.

  • EPSS 0.01%
  • Veröffentlicht 04.10.2025 07:30:56
  • Zuletzt bearbeitet 25.03.2026 00:49:03

In the Linux kernel, the following vulnerability has been resolved: smb: client: let smbd_destroy() call disable_work_sync(&info->post_send_credits_work) In smbd_destroy() we may destroy the memory so we better wait until post_send_credits_work is ...

  • EPSS 0.02%
  • Veröffentlicht 04.10.2025 07:30:55
  • Zuletzt bearbeitet 12.05.2026 13:17:17

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix smbdirect_recv_io leak in smbd_negotiate() error path During tests of another unrelated patch I was able to trigger this error: Objects remaining on __kmem_cache_s...

  • EPSS 0.02%
  • Veröffentlicht 04.10.2025 07:30:55
  • Zuletzt bearbeitet 12.05.2026 13:17:17

In the Linux kernel, the following vulnerability has been resolved: crypto: af_alg - Set merge to zero early in af_alg_sendmsg If an error causes af_alg_sendmsg to abort, ctx->merge may contain a garbage value from the previous loop. This may then...

  • EPSS 0.02%
  • Veröffentlicht 01.10.2025 12:15:57
  • Zuletzt bearbeitet 23.01.2026 20:06:45

In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: Fix memory leak in rtw88_usb Kmemleak shows the following leak arising from routine in the usb probe routine: unreferenced object 0xffff895cb29bba00 (size 512): com...

  • EPSS 0.02%
  • Veröffentlicht 01.10.2025 12:15:57
  • Zuletzt bearbeitet 25.03.2026 00:50:16

In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Use raw_smp_processor_id() instead of smp_processor_id() The following call trace was observed: localhost kernel: nvme nvme0: NVME-FC{0}: controller connect complet...