Canonical

Ubuntu Pro 20.04 LTS

3682 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 13.04.2026 13:40:29
  • Zuletzt bearbeitet 27.04.2026 14:16:37

In the Linux kernel, the following vulnerability has been resolved: ACPI: EC: clean up handlers on probe failure in acpi_ec_setup() When ec_install_handlers() returns -EPROBE_DEFER on reduced-hardware platforms, it has already started the EC and in...

  • EPSS 0.04%
  • Veröffentlicht 13.04.2026 13:40:28
  • Zuletzt bearbeitet 18.04.2026 09:16:32

In the Linux kernel, the following vulnerability has been resolved: rds: ib: reject FRMR registration before IB connection is established rds_ib_get_mr() extracts the rds_ib_connection from conn->c_transport_data and passes it to rds_ib_reg_frmr() ...

  • EPSS 0.04%
  • Veröffentlicht 13.04.2026 13:40:27
  • Zuletzt bearbeitet 18.04.2026 09:16:32

In the Linux kernel, the following vulnerability has been resolved: netfilter: x_tables: restrict xt_check_match/xt_check_target extensions for NFPROTO_ARP Weiming Shi says: xt_match and xt_target structs registered with NFPROTO_UNSPEC can be load...

  • EPSS 0.04%
  • Veröffentlicht 13.04.2026 13:40:26
  • Zuletzt bearbeitet 18.04.2026 09:16:32

In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_hfsc: fix divide-by-zero in rtsc_min() m2sm() converts a u32 slope to a u64 scaled value. For large inputs (e.g. m1=4000000000), the result can reach 2^32. rtsc_mi...

  • EPSS 0.04%
  • Veröffentlicht 13.04.2026 13:40:25
  • Zuletzt bearbeitet 18.04.2026 09:16:31

In the Linux kernel, the following vulnerability has been resolved: net/sched: cls_fw: fix NULL pointer dereference on shared blocks The old-method path in fw_classify() calls tcf_block_q() and dereferences q->handle. Shared blocks leave block->q ...

  • EPSS 0.04%
  • Veröffentlicht 13.04.2026 13:40:25
  • Zuletzt bearbeitet 18.04.2026 09:16:32

In the Linux kernel, the following vulnerability has been resolved: net/sched: cls_flow: fix NULL pointer dereference on shared blocks flow_change() calls tcf_block_q() and dereferences q->handle to derive a default baseclass. Shared blocks leave ...

  • EPSS 0.04%
  • Veröffentlicht 13.04.2026 13:21:05
  • Zuletzt bearbeitet 18.04.2026 09:16:31

In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: drop logically empty buckets in mtype_del mtype_del() counts empty slots below n->pos in k, but it only drops the bucket when both n->pos and k are zero. This mis...

  • EPSS 0.07%
  • Veröffentlicht 13.04.2026 13:21:04
  • Zuletzt bearbeitet 27.04.2026 14:16:37

In the Linux kernel, the following vulnerability has been resolved: net/x25: Fix overflow when accumulating packets Add a check to ensure that `x25_sock.fraglen` does not overflow. The `fraglen` also needs to be resetted when purging `fragment_que...

  • EPSS 0.04%
  • Veröffentlicht 13.04.2026 13:21:03
  • Zuletzt bearbeitet 18.04.2026 09:16:31

In the Linux kernel, the following vulnerability has been resolved: ipv6: avoid overflows in ip6_datagram_send_ctl() Yiming Qian reported : <quote> I believe I found a locally triggerable kernel bug in the IPv6 sendmsg ancillary-data path that ca...

  • EPSS 0.04%
  • Veröffentlicht 13.04.2026 13:21:03
  • Zuletzt bearbeitet 18.04.2026 09:16:31

In the Linux kernel, the following vulnerability has been resolved: netfilter: nfnetlink_log: account for netlink header size This is a followup to an old bug fix: NLMSG_DONE needs to account for the netlink header size, not just the attribute size...