Canonical

Ubuntu Pro 16.04 LTS

5033 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 06.05.2026 07:40:42
  • Zuletzt bearbeitet 08.05.2026 17:30:34

In the Linux kernel, the following vulnerability has been resolved: btrfs: fix zero size inode with non-zero size after log replay When logging that an inode exists, as part of logging a new name or logging new dir entries for a directory, we alway...

  • EPSS 0.01%
  • Veröffentlicht 06.05.2026 07:40:41
  • Zuletzt bearbeitet 08.05.2026 17:49:36

In the Linux kernel, the following vulnerability has been resolved: netfilter: ctnetlink: ensure safe access to master conntrack Holding reference on the expectation is not sufficient, the master conntrack object can just go away, making exp->maste...

  • EPSS 0.06%
  • Veröffentlicht 06.05.2026 07:40:41
  • Zuletzt bearbeitet 08.05.2026 17:43:39

In the Linux kernel, the following vulnerability has been resolved: btrfs: tracepoints: get correct superblock from dentry in event btrfs_sync_file() If overlay is used on top of btrfs, dentry->d_sb translates to overlay's super block and fsid assi...

  • EPSS 0.01%
  • Veröffentlicht 06.05.2026 07:40:40
  • Zuletzt bearbeitet 08.05.2026 17:51:44

In the Linux kernel, the following vulnerability has been resolved: srcu: Use irq_work to start GP in tiny SRCU Tiny SRCU's srcu_gp_start_if_needed() directly calls schedule_work(), which acquires the workqueue pool->lock. This causes a lockdep sp...

  • EPSS 0.02%
  • Veröffentlicht 06.05.2026 07:40:39
  • Zuletzt bearbeitet 08.05.2026 17:58:54

In the Linux kernel, the following vulnerability has been resolved: wifi: wl1251: validate packet IDs before indexing tx_frames wl1251_tx_packet_cb() uses the firmware completion ID directly to index the fixed 16-entry wl->tx_frames[] array. The ID...

  • EPSS 0.06%
  • Veröffentlicht 06.05.2026 07:40:39
  • Zuletzt bearbeitet 08.05.2026 17:54:04

In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo_avx2: don't return non-matching entry on expiry New test case fails unexpectedly when avx2 matching functions are used. The test first loads a ranomly ge...

  • EPSS 0.04%
  • Veröffentlicht 06.05.2026 07:40:38
  • Zuletzt bearbeitet 08.05.2026 19:43:23

In the Linux kernel, the following vulnerability has been resolved: fs/smb/client: fix out-of-bounds read in cifs_sanitize_prepath When cifs_sanitize_prepath is called with an empty string or a string containing only delimiters (e.g., "/"), the cur...

  • EPSS 0.02%
  • Veröffentlicht 06.05.2026 07:40:37
  • Zuletzt bearbeitet 08.05.2026 20:14:50

In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: validate bsscfg indices in IF events brcmf_fweh_handle_if_event() validates the firmware-provided interface index before it touches drvr->iflist[], but it still use...

  • EPSS 0.01%
  • Veröffentlicht 06.05.2026 07:40:37
  • Zuletzt bearbeitet 08.05.2026 19:45:15

In the Linux kernel, the following vulnerability has been resolved: HID: roccat: fix use-after-free in roccat_report_event roccat_report_event() iterates over the device->readers list without holding the readers_lock. This allows a concurrent rocca...

  • EPSS 0.01%
  • Veröffentlicht 06.05.2026 07:40:36
  • Zuletzt bearbeitet 14.05.2026 15:16:47

In the Linux kernel, the following vulnerability has been resolved: x86: shadow stacks: proper error handling for mmap lock 김영민 reports that shstk_pop_sigframe() doesn't check for errors from mmap_read_lock_killable(), which is a silly oversight, a...