Canonical

Ubuntu Pro 20.04 LTS

3682 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 27.12.2024 14:15:30
  • Zuletzt bearbeitet 01.10.2025 20:17:21

In the Linux kernel, the following vulnerability has been resolved: RDMA/mlx5: Move events notifier registration to be after device registration Move pkey change work initialization and cleanup from device resources stage to notifier stage, since t...

  • EPSS 0.01%
  • Veröffentlicht 27.12.2024 14:15:29
  • Zuletzt bearbeitet 24.03.2025 17:33:56

In the Linux kernel, the following vulnerability has been resolved: nfsd: release svc_expkey/svc_export with rcu_work The last reference for `cache_head` can be reduced to zero in `c_show` and `e_show`(using `rcu_read_lock` and `rcu_read_unlock`). ...

  • EPSS 0.01%
  • Veröffentlicht 27.12.2024 14:15:29
  • Zuletzt bearbeitet 24.03.2025 17:33:42

In the Linux kernel, the following vulnerability has been resolved: f2fs: fix race in concurrent f2fs_stop_gc_thread In my test case, concurrent calls to f2fs shutdown report the following stack trace: Oops: general protection fault, probably for...

  • EPSS 0.01%
  • Veröffentlicht 27.12.2024 14:15:29
  • Zuletzt bearbeitet 01.10.2025 20:17:21

In the Linux kernel, the following vulnerability has been resolved: virtiofs: use pages instead of pointer for kernel direct IO When trying to insert a 10MB kernel module kept in a virtio-fs with cache disabled, the following warning was reported: ...

  • EPSS 0.01%
  • Veröffentlicht 27.12.2024 14:15:28
  • Zuletzt bearbeitet 03.11.2025 21:17:42

In the Linux kernel, the following vulnerability has been resolved: s390/iucv: MSG_PEEK causes memory leak in iucv_sock_destruct() Passing MSG_PEEK flag to skb_recv_datagram() increments skb refcount (skb->users) and iucv_sock_recvmsg() does not de...

  • EPSS 0.01%
  • Veröffentlicht 27.12.2024 14:15:27
  • Zuletzt bearbeitet 08.10.2025 14:07:06

In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Get rid of userspace_irqchip_in_use Improper use of userspace_irqchip_in_use led to syzbot hitting the following WARN_ON() in kvm_timer_update_irq(): WARNING: CPU: 0 P...

  • EPSS 0.01%
  • Veröffentlicht 27.12.2024 14:15:26
  • Zuletzt bearbeitet 01.10.2025 20:17:17

In the Linux kernel, the following vulnerability has been resolved: io_uring: check for overflows in io_pin_pages WARNING: CPU: 0 PID: 5834 at io_uring/memmap.c:144 io_pin_pages+0x149/0x180 io_uring/memmap.c:144 CPU: 0 UID: 0 PID: 5834 Comm: syz-ex...

  • EPSS 0.01%
  • Veröffentlicht 27.12.2024 14:15:26
  • Zuletzt bearbeitet 03.11.2025 21:17:39

In the Linux kernel, the following vulnerability has been resolved: wifi: rtlwifi: Drastically reduce the attempts to read efuse in case of failures Syzkaller reported a hung task with uevent_show() on stack trace. That specific issue was addressed...

  • EPSS 0.01%
  • Veröffentlicht 27.12.2024 14:15:25
  • Zuletzt bearbeitet 24.03.2025 17:26:30

In the Linux kernel, the following vulnerability has been resolved: smb: prevent use-after-free due to open_cached_dir error paths If open_cached_dir() encounters an error parsing the lease from the server, the error handling may race with receivin...

  • EPSS 0.01%
  • Veröffentlicht 27.12.2024 14:15:25
  • Zuletzt bearbeitet 01.10.2025 20:17:16

In the Linux kernel, the following vulnerability has been resolved: smb: Don't leak cfid when reconnect races with open_cached_dir open_cached_dir() may either race with the tcon reconnection even before compound_send_recv() or directly trigger a r...