Canonical

Ubuntu Pro 16.04 LTS

5033 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 04.12.2024 15:15:13
  • Zuletzt bearbeitet 03.11.2025 23:17:22

In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint Patch series "nilfs2: fix null-ptr-deref bugs on block tracepoints". This series fixes null pointer dereference bugs th...

  • EPSS 0.02%
  • Veröffentlicht 04.12.2024 15:15:13
  • Zuletzt bearbeitet 01.10.2025 21:16:34

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Handle dml allocation failure to avoid crash [Why] In the case where a dml allocation fails for any reason, the current state's dml contexts would no longer be val...

  • EPSS 0.02%
  • Veröffentlicht 04.12.2024 15:15:12
  • Zuletzt bearbeitet 03.11.2025 21:17:28

In the Linux kernel, the following vulnerability has been resolved: sched/task_stack: fix object_is_on_stack() for KASAN tagged pointers When CONFIG_KASAN_SW_TAGS and CONFIG_KASAN_STACK are enabled, the object_is_on_stack() function may produce inc...

  • EPSS 0.01%
  • Veröffentlicht 04.12.2024 15:15:12
  • Zuletzt bearbeitet 03.11.2025 23:17:22

In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint When using the "block:block_dirty_buffer" tracepoint, mark_buffer_dirty() may cause a NULL pointer dereference, or a gen...

  • EPSS 0.01%
  • Veröffentlicht 02.12.2024 14:15:13
  • Zuletzt bearbeitet 12.05.2026 13:16:22

In the Linux kernel, the following vulnerability has been resolved: net: fix data-races around sk->sk_forward_alloc Syzkaller reported this warning: ------------[ cut here ]------------ WARNING: CPU: 0 PID: 16 at net/ipv4/af_inet.c:156 inet_sock_...

  • EPSS 0.01%
  • Veröffentlicht 02.12.2024 14:15:11
  • Zuletzt bearbeitet 03.11.2025 23:17:21

In the Linux kernel, the following vulnerability has been resolved: ocfs2: uncache inode which has failed entering the group Syzbot has reported the following BUG: kernel BUG at fs/ocfs2/uptodate.c:509! ... Call Trace: <TASK> ? __die_body+0x5f/0...

Warnung
  • EPSS 14.4%
  • Veröffentlicht 02.12.2024 08:15:08
  • Zuletzt bearbeitet 04.11.2025 14:36:37

In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format This can lead to out of bounds writes since frames of this type were not taken into account when c...

  • EPSS 0.01%
  • Veröffentlicht 28.11.2024 15:15:17
  • Zuletzt bearbeitet 13.06.2025 20:15:22

In the Linux kernel, the following vulnerability has been resolved: can: bcm: Fix UAF in bcm_proc_show() BUG: KASAN: slab-use-after-free in bcm_proc_show+0x969/0xa80 Read of size 8 at addr ffff888155846230 by task cat/7862 CPU: 1 PID: 7862 Comm: c...

  • EPSS 0.01%
  • Veröffentlicht 25.11.2024 22:15:17
  • Zuletzt bearbeitet 12.05.2026 13:16:21

In the Linux kernel, the following vulnerability has been resolved: fs: Fix uninitialized value issue in from_kuid and from_kgid ocfs2_setattr() uses attr->ia_mode, attr->ia_uid and attr->ia_gid in a trace point even though ATTR_MODE, ATTR_UID and ...

  • EPSS 0.02%
  • Veröffentlicht 25.11.2024 22:15:16
  • Zuletzt bearbeitet 01.10.2025 21:16:30

In the Linux kernel, the following vulnerability has been resolved: drm/xe/ufence: Prefetch ufence addr to catch bogus address access_ok() only checks for addr overflow so also try to read the addr to catch invalid addr sent from userspace. (cherr...