Canonical

Ubuntu Pro 16.04 LTS

5033 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 01.05.2026 14:15:05
  • Zuletzt bearbeitet 07.05.2026 02:27:02

In the Linux kernel, the following vulnerability has been resolved: ALSA: ctxfi: Check the error for index mapping The ctxfi driver blindly assumed a proper value returned from daio_device_index(), but it's not always true. Add a proper error chec...

  • EPSS 0.01%
  • Veröffentlicht 01.05.2026 14:15:05
  • Zuletzt bearbeitet 11.05.2026 18:05:22

In the Linux kernel, the following vulnerability has been resolved: ALSA: caiaq: fix stack out-of-bounds read in init_card The loop creates a whitespace-stripped copy of the card shortname where `len < sizeof(card->id)` is used for the bounds check...

  • EPSS 0.02%
  • Veröffentlicht 01.05.2026 14:15:04
  • Zuletzt bearbeitet 07.05.2026 02:27:43

In the Linux kernel, the following vulnerability has been resolved: ALSA: ctxfi: Fix missing SPDIFI1 index handling SPDIF1 DAIO type isn't properly handled in daio_device_index() for hw20k2, and it returned -EINVAL, which ended up with the out-of-b...

  • EPSS 0.01%
  • Veröffentlicht 01.05.2026 14:15:03
  • Zuletzt bearbeitet 07.05.2026 02:28:36

In the Linux kernel, the following vulnerability has been resolved: ALSA: ctxfi: Don't enumerate SPDIF1 at DAIO initialization The recent refactoring of xfi driver changed the assignment of atc->daios[] at atc_get_resources(); now it loops over all...

  • EPSS 0.01%
  • Veröffentlicht 01.05.2026 14:15:02
  • Zuletzt bearbeitet 07.05.2026 02:29:19

In the Linux kernel, the following vulnerability has been resolved: io_uring/net: fix slab-out-of-bounds read in io_bundle_nbufs() sqe->len is __u32 but gets stored into sr->len which is int. When userspace passes sqe->len values exceeding INT_MAX ...

  • EPSS 0.04%
  • Veröffentlicht 01.05.2026 14:15:01
  • Zuletzt bearbeitet 11.05.2026 20:38:06

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: SMP: derive legacy responder STK authentication from MITM state The legacy responder path in smp_random() currently labels the stored STK as authenticated whenever pendi...

  • EPSS 0.01%
  • Veröffentlicht 01.05.2026 14:15:00
  • Zuletzt bearbeitet 11.05.2026 20:42:32

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_sync: fix stack buffer overflow in hci_le_big_create_sync hci_le_big_create_sync() uses DEFINE_FLEX to allocate a struct hci_cp_le_big_create_sync on the stack with ...

  • EPSS 0.01%
  • Veröffentlicht 01.05.2026 14:14:59
  • Zuletzt bearbeitet 11.05.2026 17:58:07

In the Linux kernel, the following vulnerability has been resolved: hwmon: (occ) Fix division by zero in occ_show_power_1() In occ_show_power_1() case 1, the accumulator is divided by update_tag without checking for zero. If no samples have been co...

  • EPSS 0.03%
  • Veröffentlicht 01.05.2026 14:14:59
  • Zuletzt bearbeitet 11.05.2026 18:00:00

In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: move wake reason storage into validated event handlers hci_store_wake_reason() is called from hci_event_packet() immediately after stripping the HCI event hea...

  • EPSS 0.01%
  • Veröffentlicht 01.05.2026 14:14:58
  • Zuletzt bearbeitet 11.05.2026 17:56:52

In the Linux kernel, the following vulnerability has been resolved: gpib: fix use-after-free in IO ioctl handlers The IBRD, IBWRT, IBCMD, and IBWAIT ioctl handlers use a gpib_descriptor pointer after board->big_gpib_mutex has been released. A conc...