Canonical

Ubuntu 20.04 LTS

3473 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.01%
  • Veröffentlicht 05.10.2023 19:15:11
  • Zuletzt bearbeitet 21.11.2024 08:23:06

A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue...

Exploit
  • EPSS 0.01%
  • Veröffentlicht 05.10.2023 19:15:11
  • Zuletzt bearbeitet 21.11.2024 08:23:06

A flaw was found in the IPv4 Resource Reservation Protocol (RSVP) classifier in the Linux kernel. The xprt pointer may go beyond the linear part of the skb, leading to an out-of-bounds read in the `rsvp_classify` function. This issue may allow a loca...

Exploit
  • EPSS 0%
  • Veröffentlicht 28.09.2023 14:15:21
  • Zuletzt bearbeitet 21.11.2024 08:23:06

A flaw was found in the Netfilter subsystem of the Linux kernel. A race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP can lead to a kernel panic due to the invocation of `__ip_set_put` on a wrong `set`. This issue may allow a local user to crash...

Exploit
  • EPSS 0.01%
  • Veröffentlicht 25.09.2023 21:15:15
  • Zuletzt bearbeitet 21.11.2024 08:23:06

An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h->nets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory...

  • EPSS 0.01%
  • Veröffentlicht 22.09.2023 14:15:45
  • Zuletzt bearbeitet 04.11.2025 20:16:29

The fix for XSA-423 added logic to Linux'es netback driver to deal with a frontend splitting a packet in a way such that not all of the headers would come in one piece. Unfortunately the logic introduced there didn't account for the extreme case of ...

  • EPSS 0.2%
  • Veröffentlicht 20.09.2023 06:15:10
  • Zuletzt bearbeitet 21.11.2024 07:58:03

Incorrect verifier pruning in BPF in Linux Kernel >=5.4 leads to unsafe code paths being incorrectly marked as safe, resulting in arbitrary read/write in kernel memory, lateral privilege escalation, and container escape.

  • EPSS 0.01%
  • Veröffentlicht 18.09.2023 09:15:07
  • Zuletzt bearbeitet 21.11.2024 05:30:15

An issue was discovered in the Linux kernel before 5.8.6. drivers/media/cec/core/cec-api.c leaks one byte of kernel memory on specific hardware to unprivileged users, because of directly assigning log_addrs with a hole in the struct.

Exploit
  • EPSS 0.01%
  • Veröffentlicht 12.09.2023 20:15:10
  • Zuletzt bearbeitet 13.02.2025 18:15:48

A use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation. When the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq...

  • EPSS 0.04%
  • Veröffentlicht 11.09.2023 17:15:07
  • Zuletzt bearbeitet 07.11.2023 04:23:08

Rejected reason: CVE-2023-4881 was wrongly assigned to a bug that was deemed to be a non-security issue by the Linux kernel security team.

  • EPSS 0.04%
  • Veröffentlicht 06.09.2023 14:15:12
  • Zuletzt bearbeitet 13.02.2025 18:15:46

A use-after-free vulnerability in the Linux kernel's af_unix component can be exploited to achieve local privilege escalation. The unix_stream_sendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. ...