Canonical

Ubuntu 20.04 LTS

3473 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 19.01.2025 12:15:24
  • Zuletzt bearbeitet 03.11.2025 21:18:41

In the Linux kernel, the following vulnerability has been resolved: iio: adc: ti-ads8688: fix information leak in triggered buffer The 'buffer' local array is used to push data to user space from a triggered buffer, but it does not set values for i...

  • EPSS 0.02%
  • Veröffentlicht 19.01.2025 12:15:24
  • Zuletzt bearbeitet 03.11.2025 21:18:42

In the Linux kernel, the following vulnerability has been resolved: iio: imu: kmx61: fix information leak in triggered buffer The 'buffer' local array is used to push data to user space from a triggered buffer, but it does not set values for inacti...

  • EPSS 0.01%
  • Veröffentlicht 19.01.2025 12:15:23
  • Zuletzt bearbeitet 03.11.2025 21:18:41

In the Linux kernel, the following vulnerability has been resolved: iio: adc: at91: call input_free_device() on allocated iio_dev Current implementation of at91_ts_register() calls input_free_deivce() on st->ts_input, however, the err label can be ...

  • EPSS 0.02%
  • Veröffentlicht 19.01.2025 11:15:10
  • Zuletzt bearbeitet 12.05.2026 13:16:30

In the Linux kernel, the following vulnerability has been resolved: sched: sch_cake: add bounds checks to host bulk flow fairness counts Even though we fixed a logic error in the commit cited below, syzbot still managed to trigger an underflow of t...

  • EPSS 0.03%
  • Veröffentlicht 19.01.2025 11:15:10
  • Zuletzt bearbeitet 12.05.2026 13:16:30

In the Linux kernel, the following vulnerability has been resolved: net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute syzbot found that TCA_FLOW_RSHIFT attribute was not validated. Right shitfing a 32bit integer is undefined for large shift v...

  • EPSS 0.03%
  • Veröffentlicht 19.01.2025 11:15:09
  • Zuletzt bearbeitet 12.05.2026 13:16:29

In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: auth_enable: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different r...

  • EPSS 0.03%
  • Veröffentlicht 19.01.2025 11:15:09
  • Zuletzt bearbeitet 12.05.2026 13:16:30

In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: rto_min/max: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different r...

  • EPSS 0.03%
  • Veröffentlicht 19.01.2025 11:15:09
  • Zuletzt bearbeitet 12.05.2026 13:16:30

In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for differe...

  • EPSS 0.02%
  • Veröffentlicht 15.01.2025 13:15:14
  • Zuletzt bearbeitet 03.11.2025 21:18:40

In the Linux kernel, the following vulnerability has been resolved: ila: serialize calls to nf_register_net_hooks() syzbot found a race in ila_add_mapping() [1] commit 031ae72825ce ("ila: call nf_unregister_net_hooks() sooner") attempted to fix a ...

  • EPSS 0.01%
  • Veröffentlicht 15.01.2025 13:15:14
  • Zuletzt bearbeitet 12.05.2026 13:16:23

In the Linux kernel, the following vulnerability has been resolved: af_packet: fix vlan_get_protocol_dgram() vs MSG_PEEK Blamed commit forgot MSG_PEEK case, allowing a crash [1] as found by syzbot. Rework vlan_get_protocol_dgram() to not touch skb...