Canonical

Ubuntu Pro 16.04 LTS

5033 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 07.03.2025 09:15:16
  • Zuletzt bearbeitet 12.05.2026 13:16:37

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_midi: fix MIDI Streaming descriptor lengths While the MIDI jacks are configured correctly, and the MIDIStreaming endpoint descriptors are filled with the correct inf...

  • EPSS 0.02%
  • Veröffentlicht 07.03.2025 09:15:16
  • Zuletzt bearbeitet 03.11.2025 20:17:21

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: core: flush gadget workqueue after device removal device_del() can lead to new work being scheduled in gadget->work workqueue. This is observed, for example, with the ...

  • EPSS 0.01%
  • Veröffentlicht 06.03.2025 17:15:23
  • Zuletzt bearbeitet 03.11.2025 21:19:13

In the Linux kernel, the following vulnerability has been resolved: block: don't revert iter for -EIOCBQUEUED blkdev_read_iter() has a few odd checks, like gating the position and count adjustment on whether or not the result is bigger-than-or-equa...

  • EPSS 0.03%
  • Veröffentlicht 06.03.2025 17:15:23
  • Zuletzt bearbeitet 02.11.2025 14:15:34

In the Linux kernel, the following vulnerability has been resolved: iommu/vt-d: Avoid use of NULL after WARN_ON_ONCE There is a WARN_ON_ONCE to catch an unlikely situation when domain_remove_dev_pasid can't find the `pasid`. In case it nevertheless...

  • EPSS 0.03%
  • Veröffentlicht 06.03.2025 17:15:21
  • Zuletzt bearbeitet 03.11.2025 20:17:01

In the Linux kernel, the following vulnerability has been resolved: ASoC: soc-pcm: don't use soc_pcm_ret() on .prepare callback commit 1f5664351410 ("ASoC: lower "no backend DAIs enabled for ... Port" log severity") ignores -EINVAL error message on...

  • EPSS 0.03%
  • Veröffentlicht 06.03.2025 17:15:21
  • Zuletzt bearbeitet 12.05.2026 13:16:27

In the Linux kernel, the following vulnerability has been resolved: tomoyo: don't emit warning in tomoyo_write_control() syzbot is reporting too large allocation warning at tomoyo_write_control(), for one can write a very very long line without new...

  • EPSS 0.02%
  • Veröffentlicht 06.03.2025 16:15:53
  • Zuletzt bearbeitet 12.05.2026 13:16:27

In the Linux kernel, the following vulnerability has been resolved: team: prevent adding a device which is already a team device lower Prevent adding a device which is already a team device lower, e.g. adding veth0 if vlan1 was already added and ve...

  • EPSS 0.02%
  • Veröffentlicht 06.03.2025 16:15:53
  • Zuletzt bearbeitet 12.05.2026 13:16:27

In the Linux kernel, the following vulnerability has been resolved: wifi: rtlwifi: remove unused check_buddy_priv Commit 2461c7d60f9f ("rtlwifi: Update header file") introduced a global list of private data structures. Later on, commit 26634c4b186...

  • EPSS 0.03%
  • Veröffentlicht 06.03.2025 16:15:52
  • Zuletzt bearbeitet 12.05.2026 13:16:26

In the Linux kernel, the following vulnerability has been resolved: ubifs: skip dumping tnc tree when zroot is null Clearing slab cache will free all znode in memory and make c->zroot.znode = NULL, then dumping tnc tree will access c->zroot.znode w...

  • EPSS 0.02%
  • Veröffentlicht 06.03.2025 16:15:52
  • Zuletzt bearbeitet 12.05.2026 13:16:27

In the Linux kernel, the following vulnerability has been resolved: wifi: rtlwifi: fix memory leaks and invalid access at probe error path Deinitialize at reverse order when probe fails. When init_sw_vars fails, rtl_deinit_core should not be calle...