Canonical

Ubuntu Pro 20.04 LTS

3682 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 13.09.2024 07:15:05
  • Zuletzt bearbeitet 19.09.2024 13:30:44

In the Linux kernel, the following vulnerability has been resolved: drm/xe: reset mmio mappings with devm Set our various mmio mappings to NULL. This should make it easier to catch something rogue trying to mess with mmio after device removal. For ...

  • EPSS 0.02%
  • Veröffentlicht 13.09.2024 07:15:05
  • Zuletzt bearbeitet 03.11.2025 23:15:54

In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Make ICC_*SGI*_EL1 undef in the absence of a vGICv3 On a system with a GICv3, if a guest hasn't been configured with GICv3 and that the host is not capable of GICv2 emu...

  • EPSS 0%
  • Veröffentlicht 13.09.2024 06:15:14
  • Zuletzt bearbeitet 03.11.2025 23:15:54

In the Linux kernel, the following vulnerability has been resolved: selinux,smack: don't bypass permissions check in inode_setsecctx hook Marek Gresko reports that the root user on an NFS client is able to change the security labels on files on an ...

  • EPSS 0.01%
  • Veröffentlicht 13.09.2024 06:15:12
  • Zuletzt bearbeitet 19.09.2024 18:10:49

In the Linux kernel, the following vulnerability has been resolved: pktgen: use cpus_read_lock() in pg_net_init() I have seen the WARN_ON(smp_processor_id() != cpu) firing in pktgen_thread_worker() during tests. We must use cpus_read_lock()/cpus_r...

  • EPSS 0.02%
  • Veröffentlicht 11.09.2024 16:15:06
  • Zuletzt bearbeitet 13.09.2024 16:35:58

In the Linux kernel, the following vulnerability has been resolved: drm/msm/dpu: move dpu_encoder's connector assignment to atomic_enable() For cases where the crtc's connectors_changed was set without enable/active getting toggled , there is an at...

  • EPSS 0.02%
  • Veröffentlicht 06.09.2024 09:15:03
  • Zuletzt bearbeitet 03.11.2025 21:16:03

In the Linux kernel, the following vulnerability has been resolved: media: aspeed: Fix memory overwrite if timing is 1600x900 When capturing 1600x900, system could crash when system memory usage is tight. The way to reproduce this issue: 1. Use 16...

  • EPSS 0.02%
  • Veröffentlicht 04.09.2024 20:15:09
  • Zuletzt bearbeitet 03.11.2025 23:15:48

In the Linux kernel, the following vulnerability has been resolved: char: xillybus: Don't destroy workqueue from work item running on it Triggered by a kref decrement, destroy_workqueue() may be called from within a work item for destroying its own...

  • EPSS 0.01%
  • Veröffentlicht 04.09.2024 20:15:07
  • Zuletzt bearbeitet 03.11.2025 23:15:45

In the Linux kernel, the following vulnerability has been resolved: drm/msm/dpu: cleanup FB if dpu_format_populate_layout fails If the dpu_format_populate_layout() fails, then FB is prepared, but not cleaned up. This ends up leaking the pin_count o...

  • EPSS 0.02%
  • Veröffentlicht 04.09.2024 20:15:07
  • Zuletzt bearbeitet 09.04.2026 17:42:15

In the Linux kernel, the following vulnerability has been resolved: ipv6: fix possible UAF in ip6_finish_output2() If skb_expand_head() returns NULL, skb has been freed and associated dst/idev could also have been freed. We need to hold rcu_read_l...

  • EPSS 0.02%
  • Veröffentlicht 04.09.2024 19:15:31
  • Zuletzt bearbeitet 03.11.2025 23:15:45

In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink When all the strides in a WQE have been consumed, the WQE is unlinked from the WQ linked list (mlx5_wq_ll_pop()). For SHAMPO, i...