Canonical

Ubuntu Pro 16.04 LTS

5033 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 21.10.2024 20:15:12
  • Zuletzt bearbeitet 04.11.2024 13:16:22

In the Linux kernel, the following vulnerability has been resolved: tracing: Free buffers when a used dynamic event is removed After 65536 dynamic events have been added and removed, the "type" field of the event then uses the first type number tha...

  • EPSS 0.01%
  • Veröffentlicht 21.10.2024 20:15:12
  • Zuletzt bearbeitet 25.10.2024 14:35:25

In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix NULL pointer dereference in nilfs_palloc_commit_free_entry() Syzbot reported a null-ptr-deref bug: NILFS (loop0): segctord starting. Construction interval = 5 seconds...

  • EPSS 0.01%
  • Veröffentlicht 21.10.2024 20:15:12
  • Zuletzt bearbeitet 24.10.2024 19:03:50

In the Linux kernel, the following vulnerability has been resolved: hwmon: (coretemp) Check for null before removing sysfs attrs If coretemp_add_core() gets an error then pdata->core_data[indx] is already NULL and has been kfreed. Don't pass that t...

  • EPSS 0.01%
  • Veröffentlicht 21.10.2024 20:15:12
  • Zuletzt bearbeitet 24.10.2024 19:01:47

In the Linux kernel, the following vulnerability has been resolved: hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new() As comment of pci_get_domain_bus_and_slot() says, it returns a pci device with refcount increment, when finish usin...

  • EPSS 0.01%
  • Veröffentlicht 21.10.2024 20:15:12
  • Zuletzt bearbeitet 24.10.2024 18:31:54

In the Linux kernel, the following vulnerability has been resolved: net: hsr: Fix potential use-after-free The skb is delivered to netif_rx() which may free it, after calling this, dereferencing skb may trigger use-after-free.

  • EPSS 0.01%
  • Veröffentlicht 21.10.2024 20:15:11
  • Zuletzt bearbeitet 25.10.2024 15:51:38

In the Linux kernel, the following vulnerability has been resolved: ASoC: soc-pcm: Add NULL check in BE reparenting Add NULL check in dpcm_be_reparent API, to handle kernel NULL pointer dereference error. The issue occurred in fuzzing test.

  • EPSS 0.04%
  • Veröffentlicht 21.10.2024 20:15:11
  • Zuletzt bearbeitet 23.10.2024 09:15:02

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

  • EPSS 0.01%
  • Veröffentlicht 21.10.2024 20:15:11
  • Zuletzt bearbeitet 07.11.2024 13:52:43

In the Linux kernel, the following vulnerability has been resolved: ALSA: seq: Fix function prototype mismatch in snd_seq_expand_var_event With clang's kernel control flow integrity (kCFI, CONFIG_CFI_CLANG), indirect call targets are validated agai...

  • EPSS 0.01%
  • Veröffentlicht 21.10.2024 20:15:11
  • Zuletzt bearbeitet 25.10.2024 14:24:12

In the Linux kernel, the following vulnerability has been resolved: iommu/vt-d: Fix PCI device refcount leak in dmar_dev_scope_init() for_each_pci_dev() is implemented by pci_get_device(). The comment of pci_get_device() says that it will increase ...

  • EPSS 0.01%
  • Veröffentlicht 21.10.2024 20:15:10
  • Zuletzt bearbeitet 08.09.2025 16:15:34

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Fix crash when replugging CSR fake controllers It seems fake CSR 5.0 clones can cause the suspend notifier to be registered twice causing the following kernel panic: [ ...