Canonical

Ubuntu Pro 16.04 LTS

5033 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 06.05.2026 11:28:20
  • Zuletzt bearbeitet 14.05.2026 15:16:47

In the Linux kernel, the following vulnerability has been resolved: iommu/amd: serialize sequence allocation under concurrent TLB invalidations With concurrent TLB invalidations, completion wait randomly gets timed out because cmd_sem_val was incre...

  • EPSS 0.01%
  • Veröffentlicht 06.05.2026 11:28:19
  • Zuletzt bearbeitet 11.05.2026 19:27:37

In the Linux kernel, the following vulnerability has been resolved: media: i2c/tw9903: Fix potential memory leak in tw9903_probe() In one of the error paths in tw9903_probe(), the memory allocated in v4l2_ctrl_handler_init() and v4l2_ctrl_new_std()...

  • EPSS 0.01%
  • Veröffentlicht 06.05.2026 11:28:18
  • Zuletzt bearbeitet 11.05.2026 19:28:01

In the Linux kernel, the following vulnerability has been resolved: net: Drop the lock in skb_may_tx_timestamp() skb_may_tx_timestamp() may acquire sock::sk_callback_lock. The lock must not be taken in IRQ context, only softirq is okay. A few drive...

  • EPSS 0.04%
  • Veröffentlicht 06.05.2026 11:28:17
  • Zuletzt bearbeitet 11.05.2026 19:44:10

In the Linux kernel, the following vulnerability has been resolved: cifs: Fix locking usage for tcon fields We used to use the cifs_tcp_ses_lock to protect a lot of objects that are not just the server, ses or tcon lists. We later introduced srv_lo...

  • EPSS 0.01%
  • Veröffentlicht 06.05.2026 11:28:15
  • Zuletzt bearbeitet 11.05.2026 19:57:52

In the Linux kernel, the following vulnerability has been resolved: LoongArch: Make cpumask_of_node() robust against NUMA_NO_NODE The arch definition of cpumask_of_node() cannot handle NUMA_NO_NODE - which is a valid index - so add a check for this...

  • EPSS 0.02%
  • Veröffentlicht 06.05.2026 11:28:15
  • Zuletzt bearbeitet 11.05.2026 19:55:22

In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: pci: validate sequence number of TX release report Hardware rarely reports abnormal sequence number in TX release report, which will access out-of-bounds of wd_ring->p...

  • EPSS 0.01%
  • Veröffentlicht 06.05.2026 11:28:12
  • Zuletzt bearbeitet 11.05.2026 20:04:07

In the Linux kernel, the following vulnerability has been resolved: minix: Add required sanity checking to minix_check_superblock() The fs/minix implementation of the minix filesystem does not currently support any other value for s_log_zone_size t...

  • EPSS 0.01%
  • Veröffentlicht 06.05.2026 11:28:10
  • Zuletzt bearbeitet 11.05.2026 20:05:16

In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: Fix out-of-bounds write in kfd_event_page_set() The kfd_event_page_set() function writes KFD_SIGNAL_EVENT_LIMIT * 8 bytes via memset without checking the buffer size pa...

  • EPSS 0.01%
  • Veröffentlicht 06.05.2026 11:28:09
  • Zuletzt bearbeitet 11.05.2026 20:06:22

In the Linux kernel, the following vulnerability has been resolved: ASoC: qcom: q6asm: drop DSP responses for closed data streams 'Commit a354f030dbce ("ASoC: qcom: q6asm: handle the responses after closing")' attempted to ignore DSP responses arri...

  • EPSS 0.01%
  • Veröffentlicht 06.05.2026 11:28:08
  • Zuletzt bearbeitet 11.05.2026 20:10:35

In the Linux kernel, the following vulnerability has been resolved: fbdev: vt8500lcdfb: fix missing dma_free_coherent() fbi->fb.screen_buffer is allocated with dma_alloc_coherent() but is not freed if the error path is reached.