Canonical

Ubuntu Pro 20.04 LTS

3682 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 21.05.2024 15:15:13
  • Zuletzt bearbeitet 14.11.2025 17:16:18

In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix use-after-free of encap entry in neigh update handler Function mlx5e_rep_neigh_update() wasn't updated to accommodate rtnl lock removal from TC filter update path an...

  • EPSS 0.05%
  • Veröffentlicht 21.05.2024 15:15:12
  • Zuletzt bearbeitet 30.12.2024 19:51:12

In the Linux kernel, the following vulnerability has been resolved: regulator: rt4801: Fix NULL pointer dereference if priv->enable_gpios is NULL devm_gpiod_get_array_optional may return NULL if no GPIO was assigned.

  • EPSS 0.02%
  • Veröffentlicht 21.05.2024 15:15:12
  • Zuletzt bearbeitet 29.04.2025 19:42:29

In the Linux kernel, the following vulnerability has been resolved: phy: phy-mtk-tphy: Fix some resource leaks in mtk_phy_init() Use clk_disable_unprepare() in the error path of mtk_phy_init() to fix some resource leaks.

  • EPSS 0.02%
  • Veröffentlicht 21.05.2024 15:15:11
  • Zuletzt bearbeitet 11.12.2024 16:37:00

In the Linux kernel, the following vulnerability has been resolved: drm/nouveau: avoid a use-after-free when BO init fails nouveau_bo_init() is backed by ttm_bo_init() and ferries its return code back to the caller. On failures, ttm_bo_init() invok...

  • EPSS 0.02%
  • Veröffentlicht 21.05.2024 15:15:11
  • Zuletzt bearbeitet 29.04.2025 19:07:02

In the Linux kernel, the following vulnerability has been resolved: mm/slub: actually fix freelist pointer vs redzoning It turns out that SLUB redzoning ("slub_debug=Z") checks from s->object_size rather than from s->inuse (which is normally bumped...

  • EPSS 0.05%
  • Veröffentlicht 21.05.2024 15:15:11
  • Zuletzt bearbeitet 29.04.2025 19:26:36

In the Linux kernel, the following vulnerability has been resolved: x86/fpu: Invalidate FPU state after a failed XRSTOR from a user buffer Both Intel and AMD consider it to be architecturally valid for XRSTOR to fail with #PF but nonetheless change...

  • EPSS 0.03%
  • Veröffentlicht 20.05.2024 10:15:14
  • Zuletzt bearbeitet 10.01.2025 18:12:11

In the Linux kernel, the following vulnerability has been resolved: smb3: fix lock ordering potential deadlock in cifs_sync_mid_result Coverity spotted that the cifs_sync_mid_result function could deadlock "Thread deadlock (ORDER_REVERSAL) lock_or...

  • EPSS 0.02%
  • Veröffentlicht 20.05.2024 10:15:14
  • Zuletzt bearbeitet 04.04.2025 14:32:31

In the Linux kernel, the following vulnerability has been resolved: smb3: missing lock when picking channel Coverity spotted a place where we should have been holding the channel lock when accessing the ses channel index. Addresses-Coverity: 15820...

  • EPSS 0.02%
  • Veröffentlicht 20.05.2024 10:15:14
  • Zuletzt bearbeitet 23.09.2025 18:47:09

In the Linux kernel, the following vulnerability has been resolved: ax25: Fix netdev refcount issue The dev_tracker is added to ax25_cb in ax25_bind(). When the ax25 device is detaching, the dev_tracker of ax25_cb should be deallocated in ax25_kill...

  • EPSS 0.02%
  • Veröffentlicht 20.05.2024 10:15:13
  • Zuletzt bearbeitet 24.09.2025 18:21:27

In the Linux kernel, the following vulnerability has been resolved: ACPI: CPPC: Use access_width over bit_width for system memory accesses To align with ACPI 6.3+, since bit_width can be any 8-bit value, it cannot be depended on to be always on a c...