Canonical

Ubuntu 20.04 LTS

3473 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 10.05.2025 14:19:14
  • Zuletzt bearbeitet 12.11.2025 20:42:21

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btsdio: fix use after free bug in btsdio_remove due to race condition In btsdio_probe, the data->work is bound with btsdio_work. It will be started in btsdio_send_frame....

  • EPSS 0.06%
  • Veröffentlicht 02.05.2025 15:56:13
  • Zuletzt bearbeitet 10.11.2025 17:37:57

In the Linux kernel, the following vulnerability has been resolved: ext4: fix another off-by-one fsmap error on 1k block filesystems Apparently syzbot figured out that issuing this FSMAP call: struct fsmap_head cmd = { .fmh_count = ...; .fmh_key...

  • EPSS 0.06%
  • Veröffentlicht 02.05.2025 15:56:12
  • Zuletzt bearbeitet 10.11.2025 17:38:24

In the Linux kernel, the following vulnerability has been resolved: ila: do not generate empty messages in ila_xlat_nl_cmd_get_mapping() ila_xlat_nl_cmd_get_mapping() generates an empty skb, triggerring a recent sanity check [1]. Instead, return a...

  • EPSS 0.06%
  • Veröffentlicht 02.05.2025 15:56:11
  • Zuletzt bearbeitet 10.11.2025 17:38:51

In the Linux kernel, the following vulnerability has been resolved: nfc: fdp: add null check of devm_kmalloc_array in fdp_nci_i2c_read_device_properties devm_kmalloc_array may fails, *fw_vsc_cfg might be null and cause out-of-bounds write in device...

  • EPSS 0.09%
  • Veröffentlicht 02.05.2025 15:56:11
  • Zuletzt bearbeitet 10.11.2025 17:38:38

In the Linux kernel, the following vulnerability has been resolved: scsi: core: Remove the /proc/scsi/${proc_name} directory earlier Remove the /proc/scsi/${proc_name} directory earlier to fix a race condition between unloading and reloading kernel...

  • EPSS 0.06%
  • Veröffentlicht 02.05.2025 15:56:10
  • Zuletzt bearbeitet 10.11.2025 17:39:03

In the Linux kernel, the following vulnerability has been resolved: net: caif: Fix use-after-free in cfusbl_device_notify() syzbot reported use-after-free in cfusbl_device_notify() [1]. This causes a stack trace like below: BUG: KASAN: use-after-...

  • EPSS 0.05%
  • Veröffentlicht 02.05.2025 15:56:09
  • Zuletzt bearbeitet 05.09.2025 20:15:32

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

  • EPSS 0.06%
  • Veröffentlicht 02.05.2025 15:56:08
  • Zuletzt bearbeitet 10.11.2025 17:39:31

In the Linux kernel, the following vulnerability has been resolved: riscv: Use READ_ONCE_NOCHECK in imprecise unwinding stack mode When CONFIG_FRAME_POINTER is unset, the stack unwinding function walk_stackframe randomly reads the stack and then, w...

  • EPSS 0.06%
  • Veröffentlicht 02.05.2025 15:56:07
  • Zuletzt bearbeitet 10.11.2025 17:39:47

In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Avoid order-5 memory allocation for TPA data The driver needs to keep track of all the possible concurrent TPA (GRO/LRO) completions on the aggregation ring. On P5 chips,...

  • EPSS 0.06%
  • Veröffentlicht 02.05.2025 15:56:01
  • Zuletzt bearbeitet 10.11.2025 17:46:06

In the Linux kernel, the following vulnerability has been resolved: net: usb: smsc75xx: Limit packet length to skb->len Packet length retrieved from skb data may be larger than the actual socket buffer length (up to 9026 bytes). In such case the cl...