Canonical

Ubuntu Pro 20.04 LTS

3682 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 27.02.2025 02:15:11
  • Zuletzt bearbeitet 11.01.2026 17:15:51

In the Linux kernel, the following vulnerability has been resolved: xfrm: state: fix out-of-bounds read during lookup lookup and resize can run in parallel. The xfrm_state_hash_generation seqlock ensures a retry, but the hash functions can observe...

  • EPSS 0.01%
  • Veröffentlicht 27.02.2025 02:15:10
  • Zuletzt bearbeitet 23.10.2025 18:00:26

In the Linux kernel, the following vulnerability has been resolved: udp: Deal with race between UDP socket address change and rehash If a UDP socket changes its local address while it's receiving datagrams, as a result of connect(), there is a peri...

  • EPSS 0.02%
  • Veröffentlicht 27.02.2025 02:15:10
  • Zuletzt bearbeitet 23.10.2025 17:59:01

In the Linux kernel, the following vulnerability has been resolved: btrfs: do proper folio cleanup when run_delalloc_nocow() failed [BUG] With CONFIG_DEBUG_VM set, test case generic/476 has some chance to crash with the following VM_BUG_ON_FOLIO():...

  • EPSS 0.01%
  • Veröffentlicht 27.02.2025 02:15:10
  • Zuletzt bearbeitet 23.10.2025 17:58:15

In the Linux kernel, the following vulnerability has been resolved: btrfs: do proper folio cleanup when cow_file_range() failed [BUG] When testing with COW fixup marked as BUG_ON() (this is involved with the new pin_user_pages*() change, which shou...

  • EPSS 0.01%
  • Veröffentlicht 26.02.2025 07:01:48
  • Zuletzt bearbeitet 03.11.2025 20:15:59

In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix signed integer overflow in __ip6_append_data Resurrect ubsan overflow checks and ubsan report this warning, fix it by change the variable [length] type to size_t. UBSAN:...

  • EPSS 0.02%
  • Veröffentlicht 26.02.2025 07:01:47
  • Zuletzt bearbeitet 01.10.2025 20:17:08

In the Linux kernel, the following vulnerability has been resolved: block: Fix handling of offline queues in blk_mq_alloc_request_hctx() This patch prevents that test nvme/004 triggers the following: UBSAN: array-index-out-of-bounds in block/blk-m...

  • EPSS 0.07%
  • Veröffentlicht 26.02.2025 07:01:47
  • Zuletzt bearbeitet 24.10.2025 19:02:26

In the Linux kernel, the following vulnerability has been resolved: drm/i915/reset: Fix error_state_read ptr + offset use Fix our pointer offset usage in error_state_read when there is no i915_gpu_coredump but buf offset is non-zero. This fixes a ...

  • EPSS 0.02%
  • Veröffentlicht 26.02.2025 07:01:46
  • Zuletzt bearbeitet 21.01.2026 16:07:47

In the Linux kernel, the following vulnerability has been resolved: bus: fsl-mc-bus: fix KASAN use-after-free in fsl_mc_bus_remove() In fsl_mc_bus_remove(), mc->root_mc_bus_dev->mc_io is passed to fsl_destroy_mc_io(). However, mc->root_mc_bus_dev i...

  • EPSS 0.12%
  • Veröffentlicht 26.02.2025 07:01:44
  • Zuletzt bearbeitet 25.03.2025 13:39:35

In the Linux kernel, the following vulnerability has been resolved: tipc: fix use-after-free Read in tipc_named_reinit syzbot found the following issue on: ================================================================== BUG: KASAN: use-after-fre...

  • EPSS 0.12%
  • Veröffentlicht 26.02.2025 07:01:44
  • Zuletzt bearbeitet 24.10.2025 19:11:00

In the Linux kernel, the following vulnerability has been resolved: netfilter: use get_random_u32 instead of prandom bh might occur while updating per-cpu rnd_state from user context, ie. local_out path. BUG: using smp_processor_id() in preemptibl...