Canonical

Ubuntu Pro 16.04 LTS

5033 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 27.02.2025 03:15:12
  • Zuletzt bearbeitet 28.10.2025 20:41:36

In the Linux kernel, the following vulnerability has been resolved: nvkm/gsp: correctly advance the read pointer of GSP message queue A GSP event message consists three parts: message header, RPC header, message body. GSP calculates the number of p...

  • EPSS 0.02%
  • Veröffentlicht 27.02.2025 03:15:11
  • Zuletzt bearbeitet 03.11.2025 20:16:57

In the Linux kernel, the following vulnerability has been resolved: ocfs2: handle a symlink read error correctly Patch series "Convert ocfs2 to use folios". Mark did a conversion of ocfs2 to use folios and sent it to me as a giant patch for review...

  • EPSS 0.02%
  • Veröffentlicht 27.02.2025 03:15:11
  • Zuletzt bearbeitet 12.05.2026 13:16:25

In the Linux kernel, the following vulnerability has been resolved: tpm: Change to kvalloc() in eventlog/acpi.c The following failure was reported on HPE ProLiant D320: [ 10.693310][ T1] tpm_tis STM0925:00: 2.0 TPM (device-id 0x3, rev-id 0) [...

  • EPSS 0.01%
  • Veröffentlicht 27.02.2025 03:15:10
  • Zuletzt bearbeitet 01.10.2025 20:17:16

In the Linux kernel, the following vulnerability has been resolved: drm/msm/gem: prevent integer overflow in msm_ioctl_gem_submit() The "submit->cmd[i].size" and "submit->cmd[i].offset" variables are u32 values that come from the user via the submi...

  • EPSS 0.06%
  • Veröffentlicht 27.02.2025 03:15:10
  • Zuletzt bearbeitet 23.10.2025 13:05:38

In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Mark inode as bad as soon as error detected in mi_enum_attr() Extended the `mi_enum_attr()` function interface with an additional parameter, `struct ntfs_inode *ni`, to a...

  • EPSS 0.02%
  • Veröffentlicht 27.02.2025 03:15:10
  • Zuletzt bearbeitet 23.10.2025 13:05:11

In the Linux kernel, the following vulnerability has been resolved: NFS: Fix potential buffer overflowin nfs_sysfs_link_rpc_client() name is char[64] where the size of clnt->cl_program->name remains unknown. Invoking strcat() directly will also lea...

  • EPSS 0.01%
  • Veröffentlicht 27.02.2025 03:15:10
  • Zuletzt bearbeitet 03.11.2025 20:16:43

In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: bsg: Set bsg_queue to NULL after removal Currently, this does not cause any issues, but I believe it is necessary to set bsg_queue to NULL after removing it to prevent p...

  • EPSS 0.02%
  • Veröffentlicht 27.02.2025 03:15:10
  • Zuletzt bearbeitet 03.11.2025 20:16:55

In the Linux kernel, the following vulnerability has been resolved: media: vidtv: Fix a null-ptr-deref in vidtv_mux_stop_thread syzbot report a null-ptr-deref in vidtv_mux_stop_thread. [1] If dvb->mux is not initialized successfully by vidtv_mux_i...

  • EPSS 0.01%
  • Veröffentlicht 27.02.2025 03:15:10
  • Zuletzt bearbeitet 23.10.2025 13:04:42

In the Linux kernel, the following vulnerability has been resolved: firmware: qcom: scm: smc: Handle missing SCM device Commit ca61d6836e6f ("firmware: qcom: scm: fix a NULL-pointer dereference") makes it explicit that qcom_scm_get_tzmem_pool() can...

  • EPSS 0.07%
  • Veröffentlicht 27.02.2025 02:15:16
  • Zuletzt bearbeitet 23.10.2025 13:05:24

In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: avoid to init mgnt_entry list twice when WoWLAN failed If WoWLAN failed in resume flow, the rtw89_ops_add_interface() triggered without removing the interface first. T...