Canonical

Ubuntu Pro 16.04 LTS

5033 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 26.08.2024 11:15:05
  • Zuletzt bearbeitet 03.11.2025 22:18:20

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu/pm: Fix the null pointer dereference in apply_state_adjust_rules Check the pointer value to fix potential null pointer dereference

  • EPSS 0.02%
  • Veröffentlicht 26.08.2024 11:15:05
  • Zuletzt bearbeitet 03.11.2025 22:18:21

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fix NULL dereference at band check in starting tx ba session In MLD connection, link_data/link_conf are dynamically allocated. They don't point to vif->bss_conf. So...

  • EPSS 0.03%
  • Veröffentlicht 26.08.2024 11:15:05
  • Zuletzt bearbeitet 03.11.2025 22:18:22

In the Linux kernel, the following vulnerability has been resolved: wifi: nl80211: disallow setting special AP channel widths Setting the AP channel width is meant for use with the normal 20/40/... MHz channel width progression, and switching aroun...

  • EPSS 0.02%
  • Veröffentlicht 26.08.2024 11:15:05
  • Zuletzt bearbeitet 03.11.2025 22:18:22

In the Linux kernel, the following vulnerability has been resolved: md/raid5: avoid BUG_ON() while continue reshape after reassembling Currently, mdadm support --revert-reshape to abort the reshape while reassembling, as the test 07revert-grow. How...

  • EPSS 0.01%
  • Veröffentlicht 26.08.2024 11:15:05
  • Zuletzt bearbeitet 03.11.2025 23:15:42

In the Linux kernel, the following vulnerability has been resolved: gpio: prevent potential speculation leaks in gpio_device_get_desc() Userspace may trigger a speculative read of an address outside the gpio descriptor array. Users can do that by c...

  • EPSS 0.01%
  • Veröffentlicht 26.08.2024 11:15:04
  • Zuletzt bearbeitet 03.11.2025 22:18:17

In the Linux kernel, the following vulnerability has been resolved: memcg: protect concurrent access to mem_cgroup_idr Commit 73f576c04b94 ("mm: memcontrol: fix cgroup creation failure after many small jobs") decoupled the memcg IDs from the CSS ID...

  • EPSS 0.01%
  • Veröffentlicht 26.08.2024 11:15:04
  • Zuletzt bearbeitet 12.05.2026 12:17:08

In the Linux kernel, the following vulnerability has been resolved: serial: core: check uartclk for zero to avoid divide by zero Calling ioctl TIOCSSERIAL with an invalid baud_base can result in uartclk being zero, which will result in a divide by ...

  • EPSS 0.04%
  • Veröffentlicht 26.08.2024 11:15:04
  • Zuletzt bearbeitet 10.09.2024 08:15:02

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

  • EPSS 0.02%
  • Veröffentlicht 26.08.2024 11:15:04
  • Zuletzt bearbeitet 03.11.2025 22:18:19

In the Linux kernel, the following vulnerability has been resolved: media: xc2028: avoid use-after-free in load_firmware_cb() syzkaller reported use-after-free in load_firmware_cb() [1]. The reason is because the module allocated a struct tuner in ...

  • EPSS 0.02%
  • Veröffentlicht 26.08.2024 08:15:03
  • Zuletzt bearbeitet 03.11.2025 22:18:16

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Add error handling to pair_device() hci_conn_params_add() never checks for a NULL value and could lead to a NULL pointer dereference causing a crash. Fixed by add...