Canonical

Ubuntu 20.04 LTS

3473 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 05.08.2021 21:15:13
  • Zuletzt bearbeitet 21.11.2024 06:22:05

A vulnerability was found in the Linux kernel in versions prior to v5.14-rc1. Missing size validations on inbound SCTP packets may allow the kernel to read uninitialized memory.

  • EPSS 1.41%
  • Veröffentlicht 05.08.2021 20:15:09
  • Zuletzt bearbeitet 21.11.2024 06:22:08

A lack of CPU resource in the Linux kernel tracing module functionality in versions prior to 5.14-rc3 was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw ...

  • EPSS 0.04%
  • Veröffentlicht 02.08.2021 05:15:07
  • Zuletzt bearbeitet 21.11.2024 06:10:40

In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory l...

  • EPSS 0.02%
  • Veröffentlicht 02.08.2021 04:15:07
  • Zuletzt bearbeitet 21.11.2024 06:12:21

In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation does not necessarily occur before a st...

Exploit
  • EPSS 0.02%
  • Veröffentlicht 26.07.2021 22:15:08
  • Zuletzt bearbeitet 21.11.2024 06:15:27

arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.

  • EPSS 0.03%
  • Veröffentlicht 21.07.2021 15:16:20
  • Zuletzt bearbeitet 21.11.2024 06:14:45

hso_free_net_device in drivers/net/usb/hso.c in the Linux kernel through 5.13.4 calls unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free.

Exploit
  • EPSS 1.78%
  • Veröffentlicht 20.07.2021 19:15:09
  • Zuletzt bearbeitet 21.11.2024 06:09:45

fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.

  • EPSS 0.09%
  • Veröffentlicht 09.07.2021 11:15:09
  • Zuletzt bearbeitet 21.11.2024 06:21:58

An out-of-bounds memory write flaw was found in the Linux kernel's joystick devices subsystem in versions before 5.9-rc1, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privi...

Warnung Exploit
  • EPSS 86.31%
  • Veröffentlicht 07.07.2021 12:15:08
  • Zuletzt bearbeitet 27.10.2025 17:06:32

A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space

Exploit
  • EPSS 0.09%
  • Veröffentlicht 24.06.2021 12:15:07
  • Zuletzt bearbeitet 21.11.2024 05:22:21

The vgacon subsystem in the Linux kernel before 5.8.10 mishandles software scrollback. There is a vgacon_scrolldelta out-of-bounds read, aka CID-973c096f6a85.