Canonical

Ubuntu Pro 20.04 LTS

3682 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Veröffentlicht 08.05.2025 06:26:08
  • Zuletzt bearbeitet 12.11.2025 21:40:46

In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: gadget: check that event count does not exceed event buffer length The event count is read from register DWC3_GEVNTCOUNT. There is a check for the count being zero, but ...

  • EPSS 0.04%
  • Veröffentlicht 08.05.2025 06:26:06
  • Zuletzt bearbeitet 10.11.2025 17:32:35

In the Linux kernel, the following vulnerability has been resolved: bpf: Fix kmemleak warning for percpu hashmap Vlad Poenaru reported the following kmemleak issue: unreferenced object 0x606fd7c44ac8 (size 32): backtrace (crc 0): pcpu_...

  • EPSS 0.07%
  • Veröffentlicht 08.05.2025 06:26:06
  • Zuletzt bearbeitet 10.11.2025 17:31:43

In the Linux kernel, the following vulnerability has been resolved: crypto: null - Use spin lock instead of mutex As the null algorithm may be freed in softirq context through af_alg, use spin locks instead of mutexes to protect the default null al...

  • EPSS 0.05%
  • Veröffentlicht 08.05.2025 06:26:05
  • Zuletzt bearbeitet 03.11.2025 20:18:36

In the Linux kernel, the following vulnerability has been resolved: sound/virtio: Fix cancel_sync warnings on uninitialized work_structs Betty reported hitting the following warning: [ 8.709131][ T221] WARNING: CPU: 2 PID: 221 at kernel/workqu...

  • EPSS 0.05%
  • Veröffentlicht 08.05.2025 06:26:05
  • Zuletzt bearbeitet 10.11.2025 17:32:50

In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Keep write operations atomic syzbot reported a NULL pointer dereference in __generic_file_write_iter. [1] Before the write operation is completed, the user executes ioct...

  • EPSS 0.02%
  • Veröffentlicht 08.05.2025 06:26:04
  • Zuletzt bearbeitet 20.05.2025 14:15:48

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

  • EPSS 0.05%
  • Veröffentlicht 08.05.2025 06:26:01
  • Zuletzt bearbeitet 05.06.2025 14:32:50

In the Linux kernel, the following vulnerability has been resolved: driver core: fix potential NULL pointer dereference in dev_uevent() If userspace reads "uevent" device attribute at the same time as another threads unbinds the device from its dri...

  • EPSS 0.05%
  • Veröffentlicht 05.05.2025 14:53:33
  • Zuletzt bearbeitet 10.11.2025 17:35:41

In the Linux kernel, the following vulnerability has been resolved: bpf: check changes_pkt_data property for extension programs When processing calls to global sub-programs, verifier decides whether to invalidate all packet pointers in current stat...

  • EPSS 0.05%
  • Veröffentlicht 05.05.2025 14:53:32
  • Zuletzt bearbeitet 10.11.2025 17:35:57

In the Linux kernel, the following vulnerability has been resolved: bpf: track changes_pkt_data property for global functions When processing calls to certain helpers, verifier invalidates all packet pointers in a current state. For example, consid...

  • EPSS 0.07%
  • Veröffentlicht 02.05.2025 21:52:09
  • Zuletzt bearbeitet 10.11.2025 17:37:14

In the Linux kernel, the following vulnerability has been resolved: scsi: target: Fix WRITE_SAME No Data Buffer crash In newer version of the SBC specs, we have a NDOB bit that indicates there is no data buffer that gets written out. If this bit is...