Canonical

Ubuntu 20.04 LTS

3473 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 8.63%
  • Veröffentlicht 01.11.2023 17:15:11
  • Zuletzt bearbeitet 24.03.2026 12:16:08

A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe/TCP subsystem in the Linux kernel. This issue may allow a malicious user to cause a use-after-free and double-free prob...

  • EPSS 0.25%
  • Veröffentlicht 25.10.2023 18:17:43
  • Zuletzt bearbeitet 13.02.2025 18:15:59

A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation. If perf_read_group() is called while an event's sibling_list is smaller than its ...

  • EPSS 0.03%
  • Veröffentlicht 15.10.2023 01:15:09
  • Zuletzt bearbeitet 05.05.2025 14:12:06

An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.

  • EPSS 0.02%
  • Veröffentlicht 14.10.2023 21:15:45
  • Zuletzt bearbeitet 21.11.2024 08:27:30

An issue was discovered in drivers/usb/storage/ene_ub6250.c for the ENE UB6250 reader driver in the Linux kernel before 6.2.5. An object could potentially extend beyond the end of an allocation.

  • EPSS 0.01%
  • Veröffentlicht 14.10.2023 21:15:45
  • Zuletzt bearbeitet 21.11.2024 08:27:30

An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.

  • EPSS 0.01%
  • Veröffentlicht 13.10.2023 02:15:09
  • Zuletzt bearbeitet 21.11.2024 08:23:05

An integer overflow flaw was found in the Linux kernel. This issue leads to the kernel allocating `skb_shared_info` in the userspace, which is exploitable in systems without SMAP protection since `skb_shared_info` contains references to function poin...

  • EPSS 0.01%
  • Veröffentlicht 09.10.2023 18:15:10
  • Zuletzt bearbeitet 21.11.2024 08:14:52

A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read...

  • EPSS 0.01%
  • Veröffentlicht 09.10.2023 18:15:10
  • Zuletzt bearbeitet 21.11.2024 08:14:53

A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a va...

  • EPSS 0.01%
  • Veröffentlicht 09.10.2023 18:15:10
  • Zuletzt bearbeitet 21.11.2024 08:14:53

A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information...

  • EPSS 0.01%
  • Veröffentlicht 09.10.2023 18:15:10
  • Zuletzt bearbeitet 21.11.2024 08:14:53

A flaw was found in the XFRM subsystem in the Linux kernel. The specific flaw exists within the processing of state filters, which can result in a read past the end of an allocated buffer. This flaw allows a local privileged (CAP_NET_ADMIN) attacker ...