Canonical

Ubuntu Pro 20.04 LTS

3682 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Veröffentlicht 10.07.2025 08:15:05
  • Zuletzt bearbeitet 18.11.2025 12:53:08

In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to bail out in get_new_segment() ------------[ cut here ]------------ WARNING: CPU: 3 PID: 579 at fs/f2fs/segment.c:2832 new_curseg+0x5e8/0x6dc pc : new_curseg+0x5e8/0x6d...

  • EPSS 0.07%
  • Veröffentlicht 10.07.2025 08:15:04
  • Zuletzt bearbeitet 19.12.2025 16:56:03

In the Linux kernel, the following vulnerability has been resolved: net: ethernet: cortina: Use TOE/TSO on all TCP It is desireable to push the hardware accelerator to also process non-segmented TCP frames: we pass the skb->len to the "TOE/TSO" off...

  • EPSS 0.08%
  • Veröffentlicht 10.07.2025 08:15:03
  • Zuletzt bearbeitet 18.11.2025 12:53:20

In the Linux kernel, the following vulnerability has been resolved: firmware: cs_dsp: Fix OOB memory read access in KUnit test (ctl cache) KASAN reported out of bounds access - cs_dsp_ctl_cache_init_multiple_offsets(). The code uses mock_coeff_temp...

  • EPSS 0.06%
  • Veröffentlicht 10.07.2025 08:15:02
  • Zuletzt bearbeitet 16.12.2025 17:56:47

In the Linux kernel, the following vulnerability has been resolved: jffs2: check jffs2_prealloc_raw_node_refs() result in few other places Fuzzing hit another invalid pointer dereference due to the lack of checking whether jffs2_prealloc_raw_node_r...

  • EPSS 0.08%
  • Veröffentlicht 10.07.2025 08:15:02
  • Zuletzt bearbeitet 18.11.2025 12:53:30

In the Linux kernel, the following vulnerability has been resolved: firmware: cs_dsp: Fix OOB memory read access in KUnit test (wmfw info) KASAN reported out of bounds access - cs_dsp_mock_wmfw_add_info(), because the source string length was round...

  • EPSS 0.07%
  • Veröffentlicht 10.07.2025 08:15:00
  • Zuletzt bearbeitet 19.12.2025 16:55:45

In the Linux kernel, the following vulnerability has been resolved: aoe: clean device rq_list in aoedev_downdev() An aoe device's rq_list contains accepted block requests that are waiting to be transmitted to the aoe target. This queue was added as...

  • EPSS 0.05%
  • Veröffentlicht 10.07.2025 08:14:58
  • Zuletzt bearbeitet 19.12.2025 16:49:58

In the Linux kernel, the following vulnerability has been resolved: net: atm: add lec_mutex syzbot found its way in net/atm/lec.c, and found an error path in lecd_attach() could leave a dangling pointer in dev_lec[]. Add a mutex to protect dev_lec...

  • EPSS 0.07%
  • Veröffentlicht 10.07.2025 08:14:58
  • Zuletzt bearbeitet 19.12.2025 16:55:13

In the Linux kernel, the following vulnerability has been resolved: mpls: Use rcu_dereference_rtnl() in mpls_route_input_rcu(). As syzbot reported [0], mpls_route_input_rcu() can be called from mpls_getroute(), where is under RTNL. net->mpls.platf...

  • EPSS 0.05%
  • Veröffentlicht 10.07.2025 08:14:57
  • Zuletzt bearbeitet 18.11.2025 12:53:57

In the Linux kernel, the following vulnerability has been resolved: smb: Log an error when close_all_cached_dirs fails Under low-memory conditions, close_all_cached_dirs() can't move the dentries to a separate list to dput() them once the locks are...

  • EPSS 0.07%
  • Veröffentlicht 10.07.2025 08:14:56
  • Zuletzt bearbeitet 19.12.2025 16:44:34

In the Linux kernel, the following vulnerability has been resolved: arm64/ptrace: Fix stack-out-of-bounds read in regs_get_kernel_stack_nth() KASAN reports a stack-out-of-bounds read in regs_get_kernel_stack_nth(). Call Trace: [ 97.283505] BUG: ...