Canonical

Ubuntu Pro 16.04 LTS

5033 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 04.10.2025 15:17:15
  • Zuletzt bearbeitet 23.03.2026 18:41:22

In the Linux kernel, the following vulnerability has been resolved: null_blk: Always check queue mode setting from configfs Make sure to check device queue mode in the null_validate_conf() and return error for NULL_Q_RQ as we don't allow legacy I/O...

  • EPSS 0.02%
  • Veröffentlicht 04.10.2025 15:17:14
  • Zuletzt bearbeitet 21.03.2026 01:07:02

In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: delete timer and free skb queue when unloading Fix possible crash and memory leak on driver unload by deleting TX purge timer and freeing C2H queue in 'rtw_core_deinit...

  • EPSS 0.01%
  • Veröffentlicht 04.10.2025 15:17:10
  • Zuletzt bearbeitet 21.03.2026 01:02:40

In the Linux kernel, the following vulnerability has been resolved: ext2: Check block size validity during mount Check that log of block size stored in the superblock has sensible value. Otherwise the shift computing the block size can overflow lea...

  • EPSS 0.02%
  • Veröffentlicht 04.10.2025 15:17:09
  • Zuletzt bearbeitet 21.03.2026 00:42:36

In the Linux kernel, the following vulnerability has been resolved: spi: qup: Don't skip cleanup in remove's error path Returning early in a platform driver's remove callback is wrong. In this case the dma resources are not released in the error pa...

  • EPSS 0.02%
  • Veröffentlicht 04.10.2025 15:17:07
  • Zuletzt bearbeitet 21.03.2026 00:39:51

In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix defrag path triggering jbd2 ASSERT code path: ocfs2_ioctl_move_extents ocfs2_move_extents ocfs2_defrag_extent __ocfs2_move_extent + ocfs2_journal_access_di ...

  • EPSS 0.02%
  • Veröffentlicht 04.10.2025 15:17:03
  • Zuletzt bearbeitet 21.03.2026 01:01:22

In the Linux kernel, the following vulnerability has been resolved: ip_vti: fix potential slab-use-after-free in decode_session6 When ip_vti device is set to the qdisc of the sfb type, the cb field of the sent skb may be modified during enqueuing. ...

  • EPSS 0.01%
  • Veröffentlicht 04.10.2025 15:17:02
  • Zuletzt bearbeitet 21.03.2026 01:00:18

In the Linux kernel, the following vulnerability has been resolved: rcu-tasks: Avoid pr_info() with spin lock in cblist_init_generic() pr_info() is called with rtp->cbs_gbl_lock spin lock locked. Because pr_info() calls printk() that might sleep, ...

  • EPSS 0.02%
  • Veröffentlicht 04.10.2025 15:17:01
  • Zuletzt bearbeitet 21.03.2026 00:59:57

In the Linux kernel, the following vulnerability has been resolved: iavf: Fix use-after-free in free_netdev We do netif_napi_add() for all allocated q_vectors[], but potentially do netif_napi_del() for part of them, then kfree q_vectors and leave i...

  • EPSS 0.01%
  • Veröffentlicht 04.10.2025 15:16:55
  • Zuletzt bearbeitet 21.03.2026 00:31:51

In the Linux kernel, the following vulnerability has been resolved: net: usbnet: Fix WARNING in usbnet_start_xmit/usb_submit_urb The syzbot fuzzer identified a problem in the usbnet driver: usb 1-1: BOGUS urb xfer, pipe 3 != type 1 WARNING: CPU: 0...

  • EPSS 0.01%
  • Veröffentlicht 04.10.2025 15:16:54
  • Zuletzt bearbeitet 21.03.2026 00:32:30

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix sdma v4 sw fini error Fix sdma v4 sw fini error for sdma 4.2.2 to solve the following general protection fault [ +0.108196] general protection fault, probably for...