Canonical

Ubuntu Pro 16.04 LTS

5033 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 25.11.2024 22:15:16
  • Zuletzt bearbeitet 03.11.2025 21:17:25

In the Linux kernel, the following vulnerability has been resolved: bpf: Check validity of link->type in bpf_link_show_fdinfo() If a newly-added link type doesn't invoke BPF_LINK_TYPE(), accessing bpf_link_type_strs[link->type] may result in an out...

  • EPSS 2.59%
  • Veröffentlicht 22.11.2024 21:15:18
  • Zuletzt bearbeitet 03.11.2025 23:17:32

BlueZ HID over GATT Profile Improper Access Control Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of BlueZ. Authentication is not required to exploit this...

  • EPSS 0.01%
  • Veröffentlicht 21.11.2024 19:15:12
  • Zuletzt bearbeitet 24.03.2025 17:21:57

In the Linux kernel, the following vulnerability has been resolved: smb: client: Fix use-after-free of network namespace. Recently, we got a customer report that CIFS triggers oops while reconnecting to a server. [0] The workload runs on Kubernet...

  • EPSS 0.02%
  • Veröffentlicht 19.11.2024 18:15:26
  • Zuletzt bearbeitet 03.11.2025 23:17:17

In the Linux kernel, the following vulnerability has been resolved: media: dvbdev: prevent the risk of out of memory access The dvbdev contains a static variable used to store dvb minors. The behavior of it depends if CONFIG_DVB_DYNAMIC_MINORS is ...

  • EPSS 0.02%
  • Veröffentlicht 19.11.2024 18:15:26
  • Zuletzt bearbeitet 03.11.2025 23:17:17

In the Linux kernel, the following vulnerability has been resolved: nfs: Fix KMSAN warning in decode_getfattr_attrs() Fix the following KMSAN warning: CPU: 1 UID: 0 PID: 7651 Comm: cp Tainted: G B Tainted: [B]=BAD_PAGE Hardware name: QEMU Stand...

  • EPSS 0.01%
  • Veröffentlicht 19.11.2024 18:15:25
  • Zuletzt bearbeitet 12.05.2026 13:16:21

In the Linux kernel, the following vulnerability has been resolved: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT In qdisc_tree_reduce_backlog, Qdiscs with major handle ffff: are assumed to be either root or ingress. This assumption is bog...

  • EPSS 0.02%
  • Veröffentlicht 19.11.2024 18:15:25
  • Zuletzt bearbeitet 03.11.2025 23:17:17

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported acpi_evaluate_object() may return AE_NOT_FOUND (failure), which would result in dereferencing buffer.pointer (...

  • EPSS 0.01%
  • Veröffentlicht 19.11.2024 18:15:25
  • Zuletzt bearbeitet 03.11.2025 23:17:17

In the Linux kernel, the following vulnerability has been resolved: media: s5p-jpeg: prevent buffer overflows The current logic allows word to be less than 2. If this happens, there will be buffer overflows, as reported by smatch. Add extra checks ...

  • EPSS 0.02%
  • Veröffentlicht 19.11.2024 18:15:22
  • Zuletzt bearbeitet 03.11.2025 21:17:19

In the Linux kernel, the following vulnerability has been resolved: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find() The per-netns IP tunnel hash table is protected by the RTNL mutex and ip_tunnel_find() is only called from the...

  • EPSS 0.02%
  • Veröffentlicht 19.11.2024 02:16:32
  • Zuletzt bearbeitet 12.05.2026 13:16:20

In the Linux kernel, the following vulnerability has been resolved: sctp: properly validate chunk size in sctp_sf_ootb() A size validation fix similar to that in Commit 50619dbf8db7 ("sctp: add size validation when walking chunks") is also required...