Canonical

Ubuntu Pro 16.04 LTS

5033 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 03.04.2024 17:15:52
  • Zuletzt bearbeitet 17.03.2025 16:56:57

In the Linux kernel, the following vulnerability has been resolved: md: Don't register sync_thread for reshape directly Currently, if reshape is interrupted, then reassemble the array will register sync_thread directly from pers->run(), in this cas...

  • EPSS 0.01%
  • Veröffentlicht 03.04.2024 17:15:52
  • Zuletzt bearbeitet 04.04.2025 14:30:16

In the Linux kernel, the following vulnerability has been resolved: md: Don't ignore suspended array in md_check_recovery() mddev_suspend() never stop sync_thread, hence it doesn't make sense to ignore suspended array in md_check_recovery(), which ...

  • EPSS 0.01%
  • Veröffentlicht 03.04.2024 17:15:52
  • Zuletzt bearbeitet 16.04.2025 19:15:50

In the Linux kernel, the following vulnerability has been resolved: mm/swap: fix race when skipping swapcache When skipping swapcache for SWP_SYNCHRONOUS_IO, if two or more threads swapin the same entry at the same time, they get different pages (A...

  • EPSS 0.01%
  • Veröffentlicht 03.04.2024 17:15:52
  • Zuletzt bearbeitet 18.03.2025 16:40:18

In the Linux kernel, the following vulnerability has been resolved: dm-crypt: don't modify the data when using authenticated encryption It was said that authenticated encryption could produce invalid tag when the data that is being encrypted is mod...

  • EPSS 0.01%
  • Veröffentlicht 03.04.2024 17:15:52
  • Zuletzt bearbeitet 18.03.2025 16:36:22

In the Linux kernel, the following vulnerability has been resolved: fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio If kiocb_set_cancel_fn() is called for I/O submitted via io_uring, the following kernel warning appears: WARNING...

  • EPSS 0.01%
  • Veröffentlicht 03.04.2024 17:15:52
  • Zuletzt bearbeitet 03.11.2025 20:16:10

In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: fixed integer types and null check locations [why]: issues fixed: - comparison with wider integer type in loop condition which can cause infinite loops - pointer d...

  • EPSS 0.01%
  • Veröffentlicht 03.04.2024 17:15:52
  • Zuletzt bearbeitet 04.04.2025 14:17:18

In the Linux kernel, the following vulnerability has been resolved: nvmet-fc: avoid deadlock on delete association path When deleting an association the shutdown path is deadlocking because we try to flush the nvmet_wq nested. Avoid this by deadloc...

  • EPSS 0.05%
  • Veröffentlicht 03.04.2024 17:15:52
  • Zuletzt bearbeitet 27.01.2025 14:58:19

In the Linux kernel, the following vulnerability has been resolved: HID: nvidia-shield: Add missing null pointer checks to LED initialization devm_kasprintf() returns a pointer to dynamically allocated memory which can be NULL upon failure. Ensure ...

  • EPSS 0.02%
  • Veröffentlicht 03.04.2024 17:15:52
  • Zuletzt bearbeitet 27.01.2025 14:59:26

In the Linux kernel, the following vulnerability has been resolved: dmaengine: ti: edma: Add some null pointer checks to the edma_probe devm_kasprintf() returns a pointer to dynamically allocated memory which can be NULL upon failure. Ensure the al...

  • EPSS 0.01%
  • Veröffentlicht 03.04.2024 17:15:51
  • Zuletzt bearbeitet 17.03.2025 16:02:47

In the Linux kernel, the following vulnerability has been resolved: arp: Prevent overflow in arp_req_get(). syzkaller reported an overflown write in arp_req_get(). [0] When ioctl(SIOCGARP) is issued, arp_req_get() looks up an neighbour entry and c...