Canonical

Ubuntu Pro 16.04 LTS

5033 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.09%
  • Veröffentlicht 02.05.2025 15:56:11
  • Zuletzt bearbeitet 10.11.2025 17:38:38

In the Linux kernel, the following vulnerability has been resolved: scsi: core: Remove the /proc/scsi/${proc_name} directory earlier Remove the /proc/scsi/${proc_name} directory earlier to fix a race condition between unloading and reloading kernel...

  • EPSS 0.06%
  • Veröffentlicht 02.05.2025 15:56:10
  • Zuletzt bearbeitet 10.11.2025 17:39:03

In the Linux kernel, the following vulnerability has been resolved: net: caif: Fix use-after-free in cfusbl_device_notify() syzbot reported use-after-free in cfusbl_device_notify() [1]. This causes a stack trace like below: BUG: KASAN: use-after-...

  • EPSS 0.05%
  • Veröffentlicht 02.05.2025 15:56:09
  • Zuletzt bearbeitet 05.09.2025 20:15:32

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

  • EPSS 0.06%
  • Veröffentlicht 02.05.2025 15:56:01
  • Zuletzt bearbeitet 10.11.2025 17:46:06

In the Linux kernel, the following vulnerability has been resolved: net: usb: smsc75xx: Limit packet length to skb->len Packet length retrieved from skb data may be larger than the actual socket buffer length (up to 9026 bytes). In such case the cl...

  • EPSS 0.06%
  • Veröffentlicht 02.05.2025 15:56:00
  • Zuletzt bearbeitet 10.11.2025 17:49:51

In the Linux kernel, the following vulnerability has been resolved: scsi: mpt3sas: Fix NULL pointer access in mpt3sas_transport_port_add() Port is allocated by sas_port_alloc_num() and rphy is allocated by either sas_end_device_alloc() or sas_expan...

  • EPSS 0.06%
  • Veröffentlicht 02.05.2025 15:55:58
  • Zuletzt bearbeitet 10.11.2025 17:50:22

In the Linux kernel, the following vulnerability has been resolved: tcp: tcp_make_synack() can be called from process context tcp_rtx_synack() now could be called in process context as explained in 0a375c822497 ("tcp: tcp_rtx_synack() can be called...

  • EPSS 0.02%
  • Veröffentlicht 02.05.2025 15:55:58
  • Zuletzt bearbeitet 08.05.2025 11:15:52

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

  • EPSS 0.06%
  • Veröffentlicht 02.05.2025 15:55:55
  • Zuletzt bearbeitet 10.11.2025 17:51:59

In the Linux kernel, the following vulnerability has been resolved: fs: prevent out-of-bounds array speculation when closing a file descriptor Google-Bug-Id: 114199369

  • EPSS 0.07%
  • Veröffentlicht 02.05.2025 15:55:51
  • Zuletzt bearbeitet 10.11.2025 17:53:35

In the Linux kernel, the following vulnerability has been resolved: loop: Fix use-after-free issues do_req_filebacked() calls blk_mq_complete_request() synchronously or asynchronously when using asynchronous I/O unless memory allocation fails. Henc...

  • EPSS 0.05%
  • Veröffentlicht 02.05.2025 15:55:48
  • Zuletzt bearbeitet 10.11.2025 17:54:19

In the Linux kernel, the following vulnerability has been resolved: net/iucv: Fix size of interrupt data iucv_irq_data needs to be 4 bytes larger. These bytes are not used by the iucv module, but written by the z/VM hypervisor in case a CPU is deco...