Canonical

Ubuntu Pro 16.04 LTS

5033 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 21.05.2024 15:15:14
  • Zuletzt bearbeitet 30.04.2025 15:12:52

In the Linux kernel, the following vulnerability has been resolved: batman-adv: Avoid WARN_ON timing related checks The soft/batadv interface for a queued OGM can be changed during the time the OGM was queued for transmission and when the OGM is ac...

  • EPSS 0.02%
  • Veröffentlicht 21.05.2024 15:15:14
  • Zuletzt bearbeitet 30.12.2024 18:59:10

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix potential memory leak in DMUB hw_init [Why] On resume we perform DMUB hw_init which allocates memory: dm_resume->dm_dmub_hw_init->dc_dmub_srv_create->kzalloc T...

  • EPSS 0.02%
  • Veröffentlicht 21.05.2024 15:15:14
  • Zuletzt bearbeitet 17.03.2026 17:28:18

In the Linux kernel, the following vulnerability has been resolved: gfs2: Fix use-after-free in gfs2_glock_shrink_scan The GLF_LRU flag is checked under lru_lock in gfs2_glock_remove_from_lru() to remove the glock from the lru list in __gfs2_glock_...

  • EPSS 0.02%
  • Veröffentlicht 21.05.2024 15:15:14
  • Zuletzt bearbeitet 30.04.2025 15:05:57

In the Linux kernel, the following vulnerability has been resolved: mm/memory-failure: make sure wait for page writeback in memory_failure Our syzkaller trigger the "BUG_ON(!list_empty(&inode->i_wb_list))" in clear_inode: kernel BUG at fs/inode....

  • EPSS 0.01%
  • Veröffentlicht 21.05.2024 15:15:14
  • Zuletzt bearbeitet 04.04.2025 14:30:16

In the Linux kernel, the following vulnerability has been resolved: net: ieee802154: fix null deref in parse dev addr Fix a logic error that could result in a null deref if the user sets the mode incorrectly for the given addr type.

  • EPSS 0.01%
  • Veröffentlicht 21.05.2024 15:15:14
  • Zuletzt bearbeitet 30.04.2025 15:05:14

In the Linux kernel, the following vulnerability has been resolved: scsi: core: Fix error handling of scsi_host_alloc() After device is initialized via device_initialize(), or its name is set via dev_set_name(), the device has to be freed via put_d...

  • EPSS 0.01%
  • Veröffentlicht 21.05.2024 15:15:14
  • Zuletzt bearbeitet 24.12.2024 16:35:01

In the Linux kernel, the following vulnerability has been resolved: NFS: Fix a potential NULL dereference in nfs_get_client() None of the callers are expecting NULL returns from nfs_get_client() so this code will lead to an Oops. It's better to re...

  • EPSS 0.01%
  • Veröffentlicht 21.05.2024 15:15:13
  • Zuletzt bearbeitet 30.12.2024 19:03:58

In the Linux kernel, the following vulnerability has been resolved: netfilter: synproxy: Fix out of bounds when parsing TCP options The TCP option parser in synproxy (synproxy_parse_options) could read one byte out of bounds. When the length is 1, ...

  • EPSS 0.01%
  • Veröffentlicht 21.05.2024 15:15:13
  • Zuletzt bearbeitet 30.12.2024 19:01:43

In the Linux kernel, the following vulnerability has been resolved: net: rds: fix memory leak in rds_recvmsg Syzbot reported memory leak in rds. The problem was in unputted refcount in case of error. int rds_recvmsg(struct socket *sock, struct msg...

  • EPSS 0.01%
  • Veröffentlicht 21.05.2024 15:15:13
  • Zuletzt bearbeitet 30.12.2024 19:00:27

In the Linux kernel, the following vulnerability has been resolved: net: ipv4: fix memory leak in netlbl_cipsov4_add_std Reported by syzkaller: BUG: memory leak unreferenced object 0xffff888105df7000 (size 64): comm "syz-executor842", pid 360, jiff...