Canonical

Ubuntu Pro 16.04 LTS

5033 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 27.03.2025 16:43:48
  • Zuletzt bearbeitet 01.10.2025 18:15:36

In the Linux kernel, the following vulnerability has been resolved: net: enetc: avoid deadlock in enetc_tx_onestep_tstamp() This lockdep splat says it better than I could: ================================ WARNING: inconsistent lock state 6.2.0-rc2...

  • EPSS 0.02%
  • Veröffentlicht 27.03.2025 16:43:47
  • Zuletzt bearbeitet 01.10.2025 18:15:36

In the Linux kernel, the following vulnerability has been resolved: l2tp: close all race conditions in l2tp_tunnel_register() The code in l2tp_tunnel_register() is racy in several ways: 1. It modifies the tunnel socket _after_ publishing it. 2. I...

  • EPSS 0.01%
  • Veröffentlicht 27.03.2025 16:43:43
  • Zuletzt bearbeitet 01.10.2025 18:15:35

In the Linux kernel, the following vulnerability has been resolved: HID: betop: check shape of output reports betopff_init() only checks the total sum of the report counts for each report field to be at least 4, but hid_betopff_play() expects 4 rep...

  • EPSS 0.01%
  • Veröffentlicht 27.03.2025 16:43:39
  • Zuletzt bearbeitet 30.10.2025 16:23:48

In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: Add sync after creating vram bo There will be data corruption on vram allocated by svm if the initialization is not complete and application is writting on the memory. ...

  • EPSS 0.01%
  • Veröffentlicht 27.03.2025 16:43:38
  • Zuletzt bearbeitet 01.10.2025 21:15:43

In the Linux kernel, the following vulnerability has been resolved: cifs: fix potential memory leaks in session setup Make sure to free cifs_ses::auth_key.response before allocating it as we might end up leaking memory in reconnect or mounting.

  • EPSS 0.03%
  • Veröffentlicht 27.03.2025 16:43:33
  • Zuletzt bearbeitet 30.10.2025 16:40:17

In the Linux kernel, the following vulnerability has been resolved: netlink: prevent potential spectre v1 gadgets Most netlink attributes are parsed and validated from __nla_validate_parse() or validate_nla() u16 type = nla_type(nla); if ...

  • EPSS 0.02%
  • Veröffentlicht 27.03.2025 16:43:33
  • Zuletzt bearbeitet 15.07.2025 16:15:24

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

  • EPSS 0.02%
  • Veröffentlicht 27.03.2025 16:43:31
  • Zuletzt bearbeitet 30.10.2025 16:40:23

In the Linux kernel, the following vulnerability has been resolved: ipv4: prevent potential spectre v1 gadget in ip_metrics_convert() if (!type) continue; if (type > RTAX_MAX) return -EINVAL; ... metrics[type - 1] = val; @type being used as...

  • EPSS 0.01%
  • Veröffentlicht 27.03.2025 16:43:28
  • Zuletzt bearbeitet 01.10.2025 21:15:42

In the Linux kernel, the following vulnerability has been resolved: x86/i8259: Mark legacy PIC interrupts with IRQ_LEVEL Baoquan reported that after triggering a crash the subsequent crash-kernel fails to boot about half of the time. It triggers a ...

  • EPSS 0.01%
  • Veröffentlicht 27.03.2025 16:43:27
  • Zuletzt bearbeitet 29.10.2025 17:00:21

In the Linux kernel, the following vulnerability has been resolved: bpf: Skip task with pid=1 in send_signal_common() The following kernel panic can be triggered when a task with pid=1 attaches a prog that attempts to send killing signal to itself,...