Canonical

Ubuntu Pro 16.04 LTS

5033 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 01.10.2025 12:15:55
  • Zuletzt bearbeitet 06.04.2026 13:07:54

In the Linux kernel, the following vulnerability has been resolved: tipc: do not update mtu if msg_max is too small in mtu negotiation When doing link mtu negotiation, a malicious peer may send Activate msg with a very small mtu, e.g. 4 in Shuang's...

  • EPSS 0.02%
  • Veröffentlicht 01.10.2025 12:15:54
  • Zuletzt bearbeitet 23.01.2026 02:04:27

In the Linux kernel, the following vulnerability has been resolved: clk: tegra: tegra124-emc: Fix potential memory leak The tegra and tegra needs to be freed in the error handling path, otherwise it will be leaked.

  • EPSS 0.01%
  • Veröffentlicht 01.10.2025 12:15:54
  • Zuletzt bearbeitet 23.01.2026 02:04:05

In the Linux kernel, the following vulnerability has been resolved: udf: Do not bother merging very long extents When merging very long extents we try to push as much length as possible to the first extent. However this is unnecessarily complicated...

  • EPSS 0.02%
  • Veröffentlicht 01.10.2025 12:15:54
  • Zuletzt bearbeitet 06.04.2026 13:57:11

In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: core: Fix handling of lrbp->cmd ufshcd_queuecommand() may be called two times in a row for a SCSI command before it is completed. Hence make the following changes: - I...

  • EPSS 0.02%
  • Veröffentlicht 01.10.2025 12:15:53
  • Zuletzt bearbeitet 23.01.2026 02:05:46

In the Linux kernel, the following vulnerability has been resolved: xfrm: fix slab-use-after-free in decode_session6 When the xfrm device is set to the qdisc of the sfb type, the cb field of the sent skb may be modified during enqueuing. Then, slab...

  • EPSS 0.03%
  • Veröffentlicht 01.10.2025 12:15:53
  • Zuletzt bearbeitet 06.04.2026 14:45:08

In the Linux kernel, the following vulnerability has been resolved: ext4: allow ext4_get_group_info() to fail Previously, ext4_get_group_info() would treat an invalid group number as BUG(), since in theory it should never happen. However, if a mal...

  • EPSS 0.02%
  • Veröffentlicht 01.10.2025 12:15:52
  • Zuletzt bearbeitet 23.01.2026 02:06:17

In the Linux kernel, the following vulnerability has been resolved: start_kernel: Add __no_stack_protector function attribute Back during the discussion of commit a9a3ed1eff36 ("x86: Fix early boot crash on gcc-10, third try") we discussed the need...

  • EPSS 0.01%
  • Veröffentlicht 01.10.2025 12:15:51
  • Zuletzt bearbeitet 23.01.2026 02:07:43

In the Linux kernel, the following vulnerability has been resolved: ACPI: processor: Check for null return of devm_kzalloc() in fch_misc_setup() devm_kzalloc() may fail, clk_data->name might be NULL and will cause a NULL pointer dereference later. ...

  • EPSS 0.02%
  • Veröffentlicht 01.10.2025 12:15:51
  • Zuletzt bearbeitet 20.01.2026 16:35:24

In the Linux kernel, the following vulnerability has been resolved: lib: cpu_rmap: Avoid use after free on rmap->obj array entries When calling irq_set_affinity_notifier() with NULL at the notify argument, it will cause freeing of the glue pointer ...

  • EPSS 0.01%
  • Veröffentlicht 01.10.2025 12:15:51
  • Zuletzt bearbeitet 23.01.2026 02:06:56

In the Linux kernel, the following vulnerability has been resolved: fs: jfs: Fix UBSAN: array-index-out-of-bounds in dbAllocDmapLev Syzkaller reported the following issue: UBSAN: array-index-out-of-bounds in fs/jfs/jfs_dmap.c:1965:6 index -84 is o...