Canonical

Ubuntu 20.04 LTS

3473 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 27.03.2025 13:38:23
  • Zuletzt bearbeitet 03.11.2025 20:17:24

In the Linux kernel, the following vulnerability has been resolved: tee: optee: Fix supplicant wait loop OP-TEE supplicant is a user-space daemon and it's possible for it be hung or crashed or killed in the middle of processing an OP-TEE RPC call. ...

Medienbericht
  • EPSS 0.05%
  • Veröffentlicht 23.03.2025 15:00:47
  • Zuletzt bearbeitet 08.04.2025 08:15:14

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. Filesystem bugs due to corrupt images are not considered a CVE for any filesystem that is only mountable by CAP_SYS_ADMIN in the initial user namespace. That ...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 14.03.2025 14:25:59
  • Zuletzt bearbeitet 12.05.2026 12:16:16

In the Linux kernel, the following vulnerability has been resolved: netfilter: allow exp not to be removed in nf_ct_find_expectation Currently nf_conntrack_in() calling nf_ct_find_expectation() will remove the exp from the hash table. However, in s...

  • EPSS 0.02%
  • Veröffentlicht 12.03.2025 09:42:22
  • Zuletzt bearbeitet 03.11.2025 20:17:23

In the Linux kernel, the following vulnerability has been resolved: powerpc/code-patching: Fix KASAN hit by not flagging text patching area as VM_ALLOC Erhard reported the following KASAN hit while booting his PowerMac G4 with a KASAN-enabled kerne...

  • EPSS 0.01%
  • Veröffentlicht 12.03.2025 09:42:21
  • Zuletzt bearbeitet 12.05.2026 13:16:39

In the Linux kernel, the following vulnerability has been resolved: gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl(). Brad Spengler reported the list_del() corruption splat in gtp_net_exit_batch_rtnl(). [0] Commit eb28fd76c0a0 ("gt...

  • EPSS 0.02%
  • Veröffentlicht 12.03.2025 09:42:19
  • Zuletzt bearbeitet 12.05.2026 13:16:39

In the Linux kernel, the following vulnerability has been resolved: drop_monitor: fix incorrect initialization order Syzkaller reports the following bug: BUG: spinlock bad magic on CPU#1, syz-executor.0/7995 lock: 0xffff88805303f3e0, .magic: 0000...

  • EPSS 0.01%
  • Veröffentlicht 12.03.2025 09:42:12
  • Zuletzt bearbeitet 12.05.2026 13:16:38

In the Linux kernel, the following vulnerability has been resolved: USB: gadget: f_midi: f_midi_complete to call queue_work When using USB MIDI, a lock is attempted to be acquired twice through a re-entrant call to f_midi_transmit, causing a deadlo...

  • EPSS 0.02%
  • Veröffentlicht 12.03.2025 09:42:11
  • Zuletzt bearbeitet 12.05.2026 13:16:38

In the Linux kernel, the following vulnerability has been resolved: geneve: Fix use-after-free in geneve_find_dev(). syzkaller reported a use-after-free in geneve_find_dev() [0] without repro. geneve_configure() links struct geneve_dev.next to net...

  • EPSS 0.02%
  • Veröffentlicht 12.03.2025 09:42:04
  • Zuletzt bearbeitet 12.05.2026 13:16:38

In the Linux kernel, the following vulnerability has been resolved: nfp: bpf: Add check for nfp_app_ctrl_msg_alloc() Add check for the return value of nfp_app_ctrl_msg_alloc() in nfp_bpf_cmsg_alloc() to prevent null pointer dereference.

  • EPSS 0.02%
  • Veröffentlicht 12.03.2025 09:42:02
  • Zuletzt bearbeitet 12.05.2026 13:16:38

In the Linux kernel, the following vulnerability has been resolved: acct: perform last write from workqueue In [1] it was reported that the acct(2) system call can be used to trigger NULL deref in cases where it is set to write to a file that trigg...