Canonical

Ubuntu 20.04 LTS

3473 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 27.12.2024 15:15:19
  • Zuletzt bearbeitet 03.11.2025 21:18:04

In the Linux kernel, the following vulnerability has been resolved: net: inet6: do not leave a dangling sk pointer in inet6_create() sock_init_data() attaches the allocated sk pointer to the provided sock object. If inet6_create() fails later, the ...

  • EPSS 0.01%
  • Veröffentlicht 27.12.2024 15:15:19
  • Zuletzt bearbeitet 03.11.2025 21:18:05

In the Linux kernel, the following vulnerability has been resolved: net: inet: do not leave a dangling sk pointer in inet_create() sock_init_data() attaches the allocated sk object to the provided sock object. If inet_create() fails later, the sk o...

  • EPSS 0.01%
  • Veröffentlicht 27.12.2024 15:15:19
  • Zuletzt bearbeitet 03.11.2025 21:18:05

In the Linux kernel, the following vulnerability has been resolved: net: ieee802154: do not leave a dangling sk pointer in ieee802154_create() sock_init_data() attaches the allocated sk object to the provided sock object. If ieee802154_create() fai...

  • EPSS 0.01%
  • Veröffentlicht 27.12.2024 15:15:19
  • Zuletzt bearbeitet 03.11.2025 21:18:06

In the Linux kernel, the following vulnerability has been resolved: net: af_can: do not leave a dangling sk pointer in can_create() On error can_create() frees the allocated sk object, but sock_init_data() has already attached it to the provided so...

  • EPSS 0.01%
  • Veröffentlicht 27.12.2024 15:15:19
  • Zuletzt bearbeitet 03.11.2025 21:18:06

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() bt_sock_alloc() allocates the sk object and attaches it to the provided sock object. On error l2c...

  • EPSS 0.01%
  • Veröffentlicht 27.12.2024 15:15:18
  • Zuletzt bearbeitet 03.11.2025 21:18:01

In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: Fix oops due to NULL pointer dereference in brcmf_sdiod_sglist_rw() This patch fixes a NULL pointer dereference bug in brcmfmac that occurs when a high 'sd_sgentry_...

  • EPSS 0.01%
  • Veröffentlicht 27.12.2024 15:15:18
  • Zuletzt bearbeitet 03.11.2025 21:18:02

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: set the right AMDGPU sg segment limitation The driver needs to set the correct max_segment_size; otherwise debug_dma_map_sg() will complain about the over-mapping of th...

  • EPSS 0.01%
  • Veröffentlicht 27.12.2024 15:15:18
  • Zuletzt bearbeitet 03.11.2025 21:18:02

In the Linux kernel, the following vulnerability has been resolved: jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree When the value of lp is 0 at the beginning of the for loop, it will become negative in the next assignment and we...

  • EPSS 0.01%
  • Veröffentlicht 27.12.2024 15:15:18
  • Zuletzt bearbeitet 03.11.2025 21:18:02

In the Linux kernel, the following vulnerability has been resolved: jfs: fix array-index-out-of-bounds in jfs_readdir The stbl might contain some invalid values. Added a check to return error code in that case.

  • EPSS 0.01%
  • Veröffentlicht 27.12.2024 15:15:17
  • Zuletzt bearbeitet 03.11.2025 21:17:59

In the Linux kernel, the following vulnerability has been resolved: btrfs: ref-verify: fix use-after-free after invalid ref action At btrfs_ref_tree_mod() after we successfully inserted the new ref entry (local variable 'ref') into the respective b...