Canonical

Ubuntu 20.04 LTS

3473 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 27.03.2025 16:43:36
  • Zuletzt bearbeitet 01.10.2025 21:15:42

In the Linux kernel, the following vulnerability has been resolved: trace_events_hist: add check for return value of 'create_hist_field' Function 'create_hist_field' is called recursively at trace_events_hist.c:1954 and can return NULL-value that's...

  • EPSS 0.27%
  • Veröffentlicht 27.03.2025 16:43:35
  • Zuletzt bearbeitet 01.04.2025 15:39:21

In the Linux kernel, the following vulnerability has been resolved: EDAC/qcom: Do not pass llcc_driv_data as edac_device_ctl_info's pvt_info The memory for llcc_driv_data is allocated by the LLCC driver. But when it is passed as the private driver ...

  • EPSS 0.02%
  • Veröffentlicht 27.03.2025 16:43:33
  • Zuletzt bearbeitet 30.10.2025 16:40:17

In the Linux kernel, the following vulnerability has been resolved: netlink: prevent potential spectre v1 gadgets Most netlink attributes are parsed and validated from __nla_validate_parse() or validate_nla() u16 type = nla_type(nla); if ...

  • EPSS 0.01%
  • Veröffentlicht 27.03.2025 16:43:32
  • Zuletzt bearbeitet 01.04.2025 15:39:31

In the Linux kernel, the following vulnerability has been resolved: net: fix UaF in netns ops registration error path If net_assign_generic() fails, the current error path in ops_init() tries to clear the gen pointer slot. Anyway, in such error pat...

  • EPSS 0.02%
  • Veröffentlicht 27.03.2025 16:43:31
  • Zuletzt bearbeitet 30.10.2025 16:40:23

In the Linux kernel, the following vulnerability has been resolved: ipv4: prevent potential spectre v1 gadget in ip_metrics_convert() if (!type) continue; if (type > RTAX_MAX) return -EINVAL; ... metrics[type - 1] = val; @type being used as...

  • EPSS 0.04%
  • Veröffentlicht 27.03.2025 16:43:30
  • Zuletzt bearbeitet 30.10.2025 16:40:28

In the Linux kernel, the following vulnerability has been resolved: ipv4: prevent potential spectre v1 gadget in fib_metrics_match() if (!type) continue; if (type > RTAX_MAX) return false; ... fi_val = fi->fib_metrics->m...

  • EPSS 0.01%
  • Veröffentlicht 27.03.2025 16:43:28
  • Zuletzt bearbeitet 01.10.2025 21:15:42

In the Linux kernel, the following vulnerability has been resolved: x86/i8259: Mark legacy PIC interrupts with IRQ_LEVEL Baoquan reported that after triggering a crash the subsequent crash-kernel fails to boot about half of the time. It triggers a ...

  • EPSS 0.03%
  • Veröffentlicht 27.03.2025 16:43:27
  • Zuletzt bearbeitet 29.10.2025 17:00:21

In the Linux kernel, the following vulnerability has been resolved: bpf: Skip task with pid=1 in send_signal_common() The following kernel panic can be triggered when a task with pid=1 attaches a prog that attempts to send killing signal to itself,...

  • EPSS 0.01%
  • Veröffentlicht 27.03.2025 16:43:25
  • Zuletzt bearbeitet 01.10.2025 18:15:35

In the Linux kernel, the following vulnerability has been resolved: ALSA: hda/via: Avoid potential array out-of-bound in add_secret_dac_path() snd_hda_get_connections() can return a negative error code. It may lead to accessing 'conn' array at a ne...

  • EPSS 0.01%
  • Veröffentlicht 27.03.2025 16:43:25
  • Zuletzt bearbeitet 01.10.2025 21:15:42

In the Linux kernel, the following vulnerability has been resolved: firewire: fix memory leak for payload of request subaction to IEC 61883-1 FCP region This patch is fix for Linux kernel v2.6.33 or later. For request subaction to IEC 61883-1 FCP ...