Canonical

Ubuntu 20.04 LTS

3473 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 18.09.2024 08:15:03
  • Zuletzt bearbeitet 12.05.2026 12:17:11

In the Linux kernel, the following vulnerability has been resolved: of/irq: Prevent device address out-of-bounds read in interrupt map walk When of_irq_parse_raw() is invoked with a device address smaller than the interrupt parent node (from #addre...

  • EPSS 0.01%
  • Veröffentlicht 18.09.2024 08:15:03
  • Zuletzt bearbeitet 12.05.2026 12:17:11

In the Linux kernel, the following vulnerability has been resolved: Squashfs: sanity check symbolic link size Syzkiller reports a "KMSAN: uninit-value in pick_link" bug. This is caused by an uninitialised page, which is ultimately caused by a corr...

  • EPSS 0.01%
  • Veröffentlicht 18.09.2024 08:15:03
  • Zuletzt bearbeitet 12.05.2026 12:17:11

In the Linux kernel, the following vulnerability has been resolved: Input: uinput - reject requests with unreasonable number of slots When exercising uinput interface syzkaller may try setting up device with a really large number of slots, which c...

  • EPSS 0.01%
  • Veröffentlicht 18.09.2024 08:15:03
  • Zuletzt bearbeitet 03.11.2025 23:15:58

In the Linux kernel, the following vulnerability has been resolved: HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup report_fixup for the Cougar 500k Gaming Keyboard was not verifying that the report descriptor size was correct befor...

  • EPSS 0.01%
  • Veröffentlicht 18.09.2024 08:15:03
  • Zuletzt bearbeitet 12.05.2026 12:17:11

In the Linux kernel, the following vulnerability has been resolved: PCI: Add missing bridge lock to pci_bus_lock() One of the true positives that the cfg_access_lock lockdep effort identified is this sequence: WARNING: CPU: 14 PID: 1 at drivers/...

  • EPSS 0.01%
  • Veröffentlicht 18.09.2024 07:15:04
  • Zuletzt bearbeitet 03.11.2025 23:15:57

In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: fix the Out-of-bounds read warning using index i - 1U may beyond element index for mc_data[] when i = 0.

  • EPSS 0.02%
  • Veröffentlicht 18.09.2024 07:15:03
  • Zuletzt bearbeitet 03.11.2025 23:15:55

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Skip wbscl_set_scaler_filter if filter is null Callers can pass null in filter (i.e. from returned from the function wbscl_get_filter_coeffs_16p) and a null check ...

  • EPSS 0.02%
  • Veröffentlicht 18.09.2024 07:15:03
  • Zuletzt bearbeitet 03.11.2025 23:15:55

In the Linux kernel, the following vulnerability has been resolved: usb: typec: ucsi: Fix null pointer dereference in trace ucsi_register_altmode checks IS_ERR for the alt pointer and treats NULL as valid. When CONFIG_TYPEC_DP_ALTMODE is not enable...

  • EPSS 0.04%
  • Veröffentlicht 18.09.2024 07:15:03
  • Zuletzt bearbeitet 05.01.2026 11:17:07

In the Linux kernel, the following vulnerability has been resolved: apparmor: fix possible NULL pointer dereference profile->parent->dents[AAFS_PROF_DIR] could be NULL only if its parent is made from __create_missing_ancestors(..) and 'ent->old' is...

  • EPSS 0.02%
  • Veröffentlicht 18.09.2024 07:15:03
  • Zuletzt bearbeitet 03.11.2025 23:15:56

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix mc_data out-of-bounds read warning Clear warning that read mc_data[i-1] may out-of-bounds.