Canonical

Ubuntu Pro 16.04 LTS

5033 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 13.09.2024 06:15:12
  • Zuletzt bearbeitet 03.11.2025 23:15:52

In the Linux kernel, the following vulnerability has been resolved: nfc: pn533: Add poll mod list filling check In case of im_protocols value is 1 and tm_protocols value is 0 this combination successfully passes the check 'if (!im_protocols && !tm_...

  • EPSS 0.01%
  • Veröffentlicht 13.09.2024 06:15:12
  • Zuletzt bearbeitet 12.05.2026 12:17:11

In the Linux kernel, the following vulnerability has been resolved: ethtool: check device is present when getting link settings A sysfs reader can race with a device reset or removal, attempting to read device state when the device is not actually ...

  • EPSS 0.01%
  • Veröffentlicht 13.09.2024 06:15:12
  • Zuletzt bearbeitet 19.09.2024 18:10:49

In the Linux kernel, the following vulnerability has been resolved: pktgen: use cpus_read_lock() in pg_net_init() I have seen the WARN_ON(smp_processor_id() != cpu) firing in pktgen_thread_worker() during tests. We must use cpus_read_lock()/cpus_r...

  • EPSS 0.01%
  • Veröffentlicht 13.09.2024 06:15:11
  • Zuletzt bearbeitet 03.11.2025 23:15:52

In the Linux kernel, the following vulnerability has been resolved: scsi: aacraid: Fix double-free on probe failure aac_probe_one() calls hardware-specific init functions through the aac_driver_ident::init pointer, all of which eventually call down...

  • EPSS 0.02%
  • Veröffentlicht 11.09.2024 16:15:07
  • Zuletzt bearbeitet 03.11.2025 23:15:50

In the Linux kernel, the following vulnerability has been resolved: memcg_write_event_control(): fix a user-triggerable oops we are *not* guaranteed that anything past the terminating NUL is mapped (let alone initialized with anything sane).

  • EPSS 0.02%
  • Veröffentlicht 11.09.2024 16:15:07
  • Zuletzt bearbeitet 03.11.2025 23:15:50

In the Linux kernel, the following vulnerability has been resolved: fix bitmap corruption on close_range() with CLOSE_RANGE_UNSHARE copy_fd_bitmaps(new, old, count) is expected to copy the first count/BITS_PER_LONG bits from old->full_fds_bits[] an...

  • EPSS 0.02%
  • Veröffentlicht 06.09.2024 09:15:03
  • Zuletzt bearbeitet 03.11.2025 21:16:03

In the Linux kernel, the following vulnerability has been resolved: media: aspeed: Fix memory overwrite if timing is 1600x900 When capturing 1600x900, system could crash when system memory usage is tight. The way to reproduce this issue: 1. Use 16...

  • EPSS 0.01%
  • Veröffentlicht 06.09.2024 09:15:02
  • Zuletzt bearbeitet 10.09.2024 17:12:41

In the Linux kernel, the following vulnerability has been resolved: media: dvb-usb-v2: af9035: Fix null-ptr-deref in af9035_i2c_master_xfer In af9035_i2c_master_xfer, msg is controlled by user. When msg[i].buf is null and msg[i].len is zero, former...

  • EPSS 0.02%
  • Veröffentlicht 04.09.2024 20:15:09
  • Zuletzt bearbeitet 03.11.2025 23:15:48

In the Linux kernel, the following vulnerability has been resolved: char: xillybus: Don't destroy workqueue from work item running on it Triggered by a kref decrement, destroy_workqueue() may be called from within a work item for destroying its own...

  • EPSS 0.02%
  • Veröffentlicht 04.09.2024 20:15:09
  • Zuletzt bearbeitet 03.11.2025 23:15:49

In the Linux kernel, the following vulnerability has been resolved: Input: MT - limit max slots syzbot is reporting too large allocation at input_mt_init_slots(), for num_slots is supplied from userspace using ioctl(UI_DEV_CREATE). Since nobody kn...