Canonical

Ubuntu Pro 16.04 LTS

5033 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 21.05.2024 15:15:23
  • Zuletzt bearbeitet 26.12.2024 17:57:10

In the Linux kernel, the following vulnerability has been resolved: net: macb: fix use after free on rmmod plat_dev->dev->platform_data is released by platform_device_unregister(), use of pclk and hclk is a use-after-free. Since device unregister w...

  • EPSS 0.01%
  • Veröffentlicht 21.05.2024 15:15:23
  • Zuletzt bearbeitet 12.05.2025 19:52:58

In the Linux kernel, the following vulnerability has been resolved: dma-debug: prevent an error message from causing runtime problems For some drivers, that use the DMA API. This error message can be reached several millions of times per second, ca...

  • EPSS 0.01%
  • Veröffentlicht 21.05.2024 15:15:23
  • Zuletzt bearbeitet 02.04.2025 14:53:06

In the Linux kernel, the following vulnerability has been resolved: blktrace: Fix uaf in blk_trace access after removing by sysfs There is an use-after-free problem triggered by following process: P1(sda) P2(sdb) echo 0 > /sys/block/sd...

  • EPSS 0.01%
  • Veröffentlicht 21.05.2024 15:15:23
  • Zuletzt bearbeitet 25.09.2025 15:50:04

In the Linux kernel, the following vulnerability has been resolved: bpf: Add oversize check before call kvcalloc() Commit 7661809d493b ("mm: don't allow oversized kvmalloc() calls") add the oversize check. When the allocation is larger than what km...

  • EPSS 0.04%
  • Veröffentlicht 21.05.2024 15:15:23
  • Zuletzt bearbeitet 28.05.2024 19:15:08

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

  • EPSS 0.09%
  • Veröffentlicht 21.05.2024 15:15:23
  • Zuletzt bearbeitet 02.04.2025 14:52:37

In the Linux kernel, the following vulnerability has been resolved: nvme-rdma: destroy cm id before destroy qp to avoid use after free We should always destroy cm_id before destroy qp to avoid to get cma event after qp was destroyed, which may lead...

  • EPSS 0.01%
  • Veröffentlicht 21.05.2024 15:15:23
  • Zuletzt bearbeitet 10.12.2025 08:15:56

In the Linux kernel, the following vulnerability has been resolved: tty: Fix out-of-bound vmalloc access in imageblit This issue happens when a userspace program does an ioctl FBIOPUT_VSCREENINFO passing the fb_var_screeninfo struct containing only...

  • EPSS 0.04%
  • Veröffentlicht 21.05.2024 15:15:23
  • Zuletzt bearbeitet 02.04.2025 14:52:28

In the Linux kernel, the following vulnerability has been resolved: hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field If driver read tmp value sufficient for (tmp & 0x08) && (!(tmp & 0x80)) && ((tmp & 0x7) == ((tm...

  • EPSS 0.02%
  • Veröffentlicht 21.05.2024 15:15:22
  • Zuletzt bearbeitet 26.12.2024 19:30:01

In the Linux kernel, the following vulnerability has been resolved: atm: iphase: fix possible use-after-free in ia_module_exit() This module's remove path calls del_timer(). However, that function does not wait until the timer handler finishes. Thi...

  • EPSS 0.02%
  • Veröffentlicht 21.05.2024 15:15:22
  • Zuletzt bearbeitet 26.12.2024 18:47:14

In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: Update intermediate power state for SI Update the current state as boot state during dpm initialization. During the subsequent initialization, set_power_state gets call...