Canonical

Ubuntu 20.04 LTS

3473 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 21.05.2024 15:15:26
  • Zuletzt bearbeitet 03.02.2025 16:11:50

In the Linux kernel, the following vulnerability has been resolved: HID: usbhid: free raw_report buffers in usbhid_stop Free the unsent raw_report buffers when the device is removed. Fixes a memory leak reported by syzbot at: https://syzkaller.app...

  • EPSS 0.01%
  • Veröffentlicht 21.05.2024 15:15:26
  • Zuletzt bearbeitet 30.12.2024 20:00:41

In the Linux kernel, the following vulnerability has been resolved: usb: dwc2: check return value after calling platform_get_resource() It will cause null-ptr-deref if platform_get_resource() returns NULL, we need check the return value.

  • EPSS 0.01%
  • Veröffentlicht 21.05.2024 15:15:25
  • Zuletzt bearbeitet 24.12.2024 16:06:56

In the Linux kernel, the following vulnerability has been resolved: sctp: break out if skb_header_pointer returns NULL in sctp_rcv_ootb We should always check if skb_header_pointer's return is NULL before using it, otherwise it may cause null-ptr-d...

  • EPSS 0.02%
  • Veröffentlicht 21.05.2024 15:15:25
  • Zuletzt bearbeitet 25.09.2025 15:35:04

In the Linux kernel, the following vulnerability has been resolved: net: hns3: do not allow call hns3_nic_net_open repeatedly hns3_nic_net_open() is not allowed to called repeatly, but there is no checking for this. When doing device reset and setu...

  • EPSS 0.01%
  • Veröffentlicht 21.05.2024 15:15:25
  • Zuletzt bearbeitet 26.09.2025 19:03:45

In the Linux kernel, the following vulnerability has been resolved: ipack: ipoctal: fix stack information leak The tty driver name is used also after registering the driver and must specifically not be allocated on the stack to avoid leaking inform...

  • EPSS 0.01%
  • Veröffentlicht 21.05.2024 15:15:25
  • Zuletzt bearbeitet 14.01.2025 17:29:04

In the Linux kernel, the following vulnerability has been resolved: net: sched: flower: protect fl_walk() with rcu Patch that refactored fl_walk() to use idr_for_each_entry_continue_ul() also removed rcu protection of individual filters which cause...

  • EPSS 0.01%
  • Veröffentlicht 21.05.2024 15:15:25
  • Zuletzt bearbeitet 02.04.2025 14:52:09

In the Linux kernel, the following vulnerability has been resolved: ipack: ipoctal: fix module reference leak A reference to the carrier module was taken on every open but was only released once when the final reference to the tty struct was droppe...

  • EPSS 0.01%
  • Veröffentlicht 21.05.2024 15:15:25
  • Zuletzt bearbeitet 24.12.2024 16:05:42

In the Linux kernel, the following vulnerability has been resolved: HID: betop: fix slab-out-of-bounds Write in betop_probe Syzbot reported slab-out-of-bounds Write bug in hid-betopff driver. The problem is the driver assumes the device must have a...

  • EPSS 0.01%
  • Veröffentlicht 21.05.2024 15:15:24
  • Zuletzt bearbeitet 23.12.2024 21:01:31

In the Linux kernel, the following vulnerability has been resolved: hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field If driver read val value sufficient for (val & 0x08) && (!(val & 0x80)) && ((val & 0x7) == ((v...

  • EPSS 0.01%
  • Veröffentlicht 21.05.2024 15:15:24
  • Zuletzt bearbeitet 02.04.2025 14:52:22

In the Linux kernel, the following vulnerability has been resolved: hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field If driver read val value sufficient for (val & 0x08) && (!(val & 0x80)) && ((val & 0x7) == ((v...