Canonical

Ubuntu Pro 16.04 LTS

5033 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 25.04.2026 08:46:56
  • Zuletzt bearbeitet 06.05.2026 21:23:31

In the Linux kernel, the following vulnerability has been resolved: net: ipv6: flowlabel: defer exclusive option free until RCU teardown `ip6fl_seq_show()` walks the global flowlabel hash under the seq-file RCU read-side lock and prints `fl->opt->o...

  • EPSS 0.01%
  • Veröffentlicht 25.04.2026 08:46:54
  • Zuletzt bearbeitet 06.05.2026 21:28:02

In the Linux kernel, the following vulnerability has been resolved: openvswitch: defer tunnel netdev_put to RCU release ovs_netdev_tunnel_destroy() may run after NETDEV_UNREGISTER already detached the device. Dropping the netdev reference in destro...

  • EPSS 0.06%
  • Veröffentlicht 25.04.2026 08:46:52
  • Zuletzt bearbeitet 06.05.2026 21:31:48

In the Linux kernel, the following vulnerability has been resolved: rxrpc: only handle RESPONSE during service challenge Only process RESPONSE packets while the service connection is still in RXRPC_CONN_SERVICE_CHALLENGING. Check that state under s...

  • EPSS 0.01%
  • Veröffentlicht 25.04.2026 08:46:51
  • Zuletzt bearbeitet 06.05.2026 21:33:21

In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_netem: fix out-of-bounds access in packet corruption In netem_enqueue(), the packet corruption logic uses get_random_u32_below(skb_headlen(skb)) to select an index f...

  • EPSS 0.01%
  • Veröffentlicht 25.04.2026 08:46:50
  • Zuletzt bearbeitet 06.05.2026 21:34:51

In the Linux kernel, the following vulnerability has been resolved: netfilter: ip6t_rt: reject oversized addrnr in rt_mt6_check() Reject rt match rules whose addrnr exceeds IP6T_RT_HOPS. rt_mt6() expects addrnr to stay within the bounds of rtinfo-...

  • EPSS 0.01%
  • Veröffentlicht 25.04.2026 08:46:49
  • Zuletzt bearbeitet 06.05.2026 21:36:13

In the Linux kernel, the following vulnerability has been resolved: af_unix: read UNIX_DIAG_VFS data under unix_state_lock Exact UNIX diag lookups hold a reference to the socket, but not to u->path. Meanwhile, unix_release_sock() clears u->path und...

  • EPSS 0.02%
  • Veröffentlicht 24.04.2026 14:45:18
  • Zuletzt bearbeitet 27.04.2026 20:11:39

In the Linux kernel, the following vulnerability has been resolved: xfrm_user: fix info leak in build_report() struct xfrm_user_report is a __u8 proto field followed by a struct xfrm_selector which means there is three "empty" bytes of padding, but...

  • EPSS 0.01%
  • Veröffentlicht 24.04.2026 14:45:17
  • Zuletzt bearbeitet 27.04.2026 20:10:26

In the Linux kernel, the following vulnerability has been resolved: net: rfkill: prevent unlimited numbers of rfkill events from being created Userspace can create an unlimited number of rfkill events if the system is so configured, while not consu...

  • EPSS 0.01%
  • Veröffentlicht 24.04.2026 14:45:15
  • Zuletzt bearbeitet 27.04.2026 20:00:40

In the Linux kernel, the following vulnerability has been resolved: Input: uinput - fix circular locking dependency with ff-core A lockdep circular locking dependency warning can be triggered reproducibly when using a force-feedback gamepad with ui...

  • EPSS 0.02%
  • Veröffentlicht 24.04.2026 14:45:13
  • Zuletzt bearbeitet 27.04.2026 19:59:44

In the Linux kernel, the following vulnerability has been resolved: xfrm: clear trailing padding in build_polexpire() build_expire() clears the trailing padding bytes of struct xfrm_user_expire after setting the hard field via memset_after(), but t...