Canonical

Ubuntu Pro 16.04 LTS

5033 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 21.05.2024 16:15:17
  • Zuletzt bearbeitet 25.09.2025 16:40:04

In the Linux kernel, the following vulnerability has been resolved: usb: config: fix iteration issue in 'usb_get_bos_descriptor()' The BOS descriptor defines a root descriptor and is the base descriptor for accessing a family of related descriptors...

  • EPSS 0.01%
  • Veröffentlicht 21.05.2024 16:15:17
  • Zuletzt bearbeitet 25.09.2025 16:35:19

In the Linux kernel, the following vulnerability has been resolved: bonding: stop the device in bond_setup_by_slave() Commit 9eed321cde22 ("net: lapbether: only support ethernet devices") has been able to keep syzbot away from net/lapb, until today...

  • EPSS 0.01%
  • Veröffentlicht 21.05.2024 16:15:17
  • Zuletzt bearbeitet 15.01.2025 17:57:15

In the Linux kernel, the following vulnerability has been resolved: tty: vcc: Add check for kstrdup() in vcc_probe() Add check for the return value of kstrdup() and return the error, if it fails in order to avoid NULL pointer dereference.

  • EPSS 0.01%
  • Veröffentlicht 21.05.2024 16:15:16
  • Zuletzt bearbeitet 23.09.2025 20:00:36

In the Linux kernel, the following vulnerability has been resolved: s390/dasd: protect device queue against concurrent access In dasd_profile_start() the amount of requests on the device queue are counted. The access to the device queue is unprotec...

  • EPSS 0.68%
  • Veröffentlicht 21.05.2024 16:15:15
  • Zuletzt bearbeitet 02.04.2025 14:50:19

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix slab out of bounds write in smb_inherit_dacl() slab out-of-bounds write is caused by that offsets is bigger than pntsd allocation size. This patch add the check to valid...

  • EPSS 0.04%
  • Veröffentlicht 21.05.2024 16:15:15
  • Zuletzt bearbeitet 08.06.2024 12:15:09

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

  • EPSS 0.04%
  • Veröffentlicht 21.05.2024 16:15:15
  • Zuletzt bearbeitet 19.12.2024 11:15:30

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

  • EPSS 0.02%
  • Veröffentlicht 21.05.2024 16:15:15
  • Zuletzt bearbeitet 03.11.2025 22:16:31

In the Linux kernel, the following vulnerability has been resolved: gfs2: Fix slab-use-after-free in gfs2_qd_dealloc In gfs2_put_super(), whether withdrawn or not, the quota should be cleaned up by gfs2_quota_cleanup(). Otherwise, struct gfs2_sbd ...

  • EPSS 0.12%
  • Veröffentlicht 21.05.2024 16:15:15
  • Zuletzt bearbeitet 23.09.2025 19:28:31

In the Linux kernel, the following vulnerability has been resolved: riscv: VMAP_STACK overflow detection thread-safe commit 31da94c25aea ("riscv: add VMAP_STACK overflow detection") added support for CONFIG_VMAP_STACK. If overflow is detected, CPU ...

  • EPSS 0.01%
  • Veröffentlicht 21.05.2024 16:15:15
  • Zuletzt bearbeitet 23.09.2025 19:36:21

In the Linux kernel, the following vulnerability has been resolved: virtio-blk: fix implicit overflow on virtio_max_dma_size The following codes have an implicit conversion from size_t to u32: (u32)max_size = (size_t)virtio_max_dma_size(vdev); Thi...