Canonical

Ubuntu Pro 16.04 LTS

5033 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Veröffentlicht 26.02.2025 07:01:36
  • Zuletzt bearbeitet 23.10.2025 12:08:23

In the Linux kernel, the following vulnerability has been resolved: KVM: VMX: Prevent RSB underflow before vmenter On VMX, there are some balanced returns between the time the guest's SPEC_CTRL value is written, and the vmenter. Balanced returns (...

  • EPSS 0.01%
  • Veröffentlicht 26.02.2025 07:01:36
  • Zuletzt bearbeitet 23.10.2025 12:08:28

In the Linux kernel, the following vulnerability has been resolved: x86/speculation: Fill RSB on vmexit for IBRS Prevent RSB underflow/poisoning attacks with RSB. While at it, add a bunch of comments to attempt to document the current state of tri...

  • EPSS 0.04%
  • Veröffentlicht 26.02.2025 07:01:36
  • Zuletzt bearbeitet 06.03.2025 16:15:39

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

  • EPSS 0.13%
  • Veröffentlicht 26.02.2025 07:01:36
  • Zuletzt bearbeitet 01.10.2025 20:16:56

In the Linux kernel, the following vulnerability has been resolved: ASoC: rt711-sdca: fix kernel NULL pointer dereference when IO error The initial settings will be written before the codec probe function. But, the rt711->component doesn't be assig...

  • EPSS 0.01%
  • Veröffentlicht 26.02.2025 07:01:35
  • Zuletzt bearbeitet 01.10.2025 20:16:53

In the Linux kernel, the following vulnerability has been resolved: tcp: Fix a data-race around sysctl_tcp_probe_threshold. While reading sysctl_tcp_probe_threshold, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.

  • EPSS 0.06%
  • Veröffentlicht 26.02.2025 07:01:35
  • Zuletzt bearbeitet 01.10.2025 20:16:53

In the Linux kernel, the following vulnerability has been resolved: tcp: Fix data-races around sysctl_tcp_min_snd_mss. While reading sysctl_tcp_min_snd_mss, it can be changed concurrently. Thus, we need to add READ_ONCE() to its readers.

  • EPSS 0.07%
  • Veröffentlicht 26.02.2025 07:01:35
  • Zuletzt bearbeitet 01.10.2025 20:16:54

In the Linux kernel, the following vulnerability has been resolved: tcp: Fix data-races around sysctl_tcp_base_mss. While reading sysctl_tcp_base_mss, it can be changed concurrently. Thus, we need to add READ_ONCE() to its readers.

  • EPSS 0.04%
  • Veröffentlicht 26.02.2025 07:01:35
  • Zuletzt bearbeitet 01.10.2025 20:16:54

In the Linux kernel, the following vulnerability has been resolved: tcp: Fix data-races around sysctl_tcp_mtu_probing. While reading sysctl_tcp_mtu_probing, it can be changed concurrently. Thus, we need to add READ_ONCE() to its readers.

  • EPSS 0.03%
  • Veröffentlicht 26.02.2025 07:01:35
  • Zuletzt bearbeitet 01.10.2025 20:16:54

In the Linux kernel, the following vulnerability has been resolved: tcp/dccp: Fix a data-race around sysctl_tcp_fwmark_accept. While reading sysctl_tcp_fwmark_accept, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.

  • EPSS 0.03%
  • Veröffentlicht 26.02.2025 07:01:35
  • Zuletzt bearbeitet 01.10.2025 20:16:55

In the Linux kernel, the following vulnerability has been resolved: ip: Fix a data-race around sysctl_fwmark_reflect. While reading sysctl_fwmark_reflect, it can be changed concurrently. Thus, we need to add READ_ONCE() to its reader.