Canonical

Ubuntu 20.04 LTS

3473 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 21.10.2024 20:15:12
  • Zuletzt bearbeitet 24.10.2024 18:29:23

In the Linux kernel, the following vulnerability has been resolved: net: tun: Fix use-after-free in tun_detach() syzbot reported use-after-free in tun_detach() [1]. This causes call trace like below: ==============================================...

  • EPSS 0.01%
  • Veröffentlicht 21.10.2024 20:15:12
  • Zuletzt bearbeitet 24.10.2024 18:31:54

In the Linux kernel, the following vulnerability has been resolved: net: hsr: Fix potential use-after-free The skb is delivered to netif_rx() which may free it, after calling this, dereferencing skb may trigger use-after-free.

  • EPSS 0.01%
  • Veröffentlicht 21.10.2024 20:15:11
  • Zuletzt bearbeitet 07.11.2024 19:36:33

In the Linux kernel, the following vulnerability has been resolved: mm/khugepaged: invoke MMU notifiers in shmem/file collapse paths Any codepath that zaps page table entries must invoke MMU notifiers to ensure that secondary MMUs (like KVM) don't ...

  • EPSS 0.01%
  • Veröffentlicht 21.10.2024 20:15:11
  • Zuletzt bearbeitet 25.10.2024 15:51:38

In the Linux kernel, the following vulnerability has been resolved: ASoC: soc-pcm: Add NULL check in BE reparenting Add NULL check in dpcm_be_reparent API, to handle kernel NULL pointer dereference error. The issue occurred in fuzzing test.

  • EPSS 0.04%
  • Veröffentlicht 21.10.2024 20:15:11
  • Zuletzt bearbeitet 23.10.2024 09:15:02

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

  • EPSS 0.01%
  • Veröffentlicht 21.10.2024 20:15:11
  • Zuletzt bearbeitet 07.11.2024 13:52:43

In the Linux kernel, the following vulnerability has been resolved: ALSA: seq: Fix function prototype mismatch in snd_seq_expand_var_event With clang's kernel control flow integrity (kCFI, CONFIG_CFI_CLANG), indirect call targets are validated agai...

  • EPSS 0.02%
  • Veröffentlicht 21.10.2024 20:15:11
  • Zuletzt bearbeitet 07.11.2024 17:07:08

In the Linux kernel, the following vulnerability has been resolved: char: tpm: Protect tpm_pm_suspend with locks Currently tpm transactions are executed unconditionally in tpm_pm_suspend() function, which may lead to races with other tpm accessors ...

  • EPSS 0.02%
  • Veröffentlicht 21.10.2024 20:15:11
  • Zuletzt bearbeitet 31.10.2024 14:44:10

In the Linux kernel, the following vulnerability has been resolved: ipv4: Handle attempt to delete multipath route when fib_info contains an nh reference Gwangun Jung reported a slab-out-of-bounds access in fib_nh_match: fib_nh_match+0xf98/0x11...

  • EPSS 0.01%
  • Veröffentlicht 21.10.2024 20:15:11
  • Zuletzt bearbeitet 25.10.2024 14:24:12

In the Linux kernel, the following vulnerability has been resolved: iommu/vt-d: Fix PCI device refcount leak in dmar_dev_scope_init() for_each_pci_dev() is implemented by pci_get_device(). The comment of pci_get_device() says that it will increase ...

  • EPSS 0.02%
  • Veröffentlicht 21.10.2024 20:15:10
  • Zuletzt bearbeitet 25.10.2024 18:33:18

In the Linux kernel, the following vulnerability has been resolved: drm/shmem-helper: Remove errant put in error path drm_gem_shmem_mmap() doesn't own this reference, resulting in the GEM object getting prematurely freed leading to a later use-afte...