UbuntuUpdates.org

Bugs addressed in recent updates

All Launchpad Ubuntu Debian CVE

Origin Bug number Title Packages
Launchpad 2131259 Questing update: v6.17.4 upstream stable release linux linux-hwe-6.17 linux
Launchpad 2128792 Re-enable INTEL_SKL_INT3472 for kernels \u003e= 6.16 for Intel IPU camera linux linux-hwe-6.17 linux
Launchpad 2131136 crash when reading from /sys/kernel/tracing/rv/enabled_monitors linux linux-hwe-6.17 linux
Launchpad 2129770 kernel crash on bootup for some arm64 machines linux linux-hwe-6.17 linux
Launchpad 2132095 The machine didn\u2019t go into suspend and got stuck linux linux-hwe-6.17 linux
CVE CVE-2023-0466 The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. How edk2 edk2 edk2 edk2
CVE CVE-2023-0465 Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain check edk2 edk2 edk2 edk2
CVE CVE-2024-6119 Issue summary: Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory edk2 edk2 edk2 edk2 edk2 edk2 edk2 edk2
CVE CVE-2024-38796 EDK2 contains a vulnerability in the PeCoffLoaderRelocateImage(). An Attacker may cause memory corruption due to an overflow via an adjacent network. edk2 edk2 edk2 edk2 edk2 edk2 edk2 edk2
CVE CVE-2024-1298 EDK2 contains a vulnerability when S3 sleep is activated where an Attacker may cause a Division-By-Zero due to a UNIT32 overflow via local access. A edk2 edk2 edk2 edk2 edk2 edk2 edk2 edk2
CVE CVE-2023-45237 EDK2's Network Package is susceptible to a predictable TCP Initial Sequence Number. This vulnerability can be exploited by an attacker to gain unaut edk2 edk2 edk2 edk2 edk2 edk2 edk2 edk2
CVE CVE-2023-45236 EDK2's Network Package is susceptible to a predictable TCP Initial Sequence Number. This vulnerability can be exploited by an attacker to gain unaut edk2 edk2 edk2 edk2 edk2 edk2 edk2 edk2
CVE CVE-2023-3817 Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_ edk2 edk2 edk2 edk2 edk2 edk2 edk2 edk2
CVE CVE-2023-3446 Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_ edk2 edk2 edk2 edk2 edk2 edk2 edk2 edk2
CVE CVE-2025-3770 EDK2 contains a vulnerability in BIOS where an attacker may cause “Protection Mechanism Failure” by local access. Successful exploitation of this vul edk2 edk2 edk2 edk2 edk2 edk2 edk2 edk2 edk2 edk2 edk2 edk2
CVE CVE-2025-2295 EDK2 contains a vulnerability in BIOS where a user may cause an Integer Overflow or Wraparound by network means. A successful exploitation of this vu edk2 edk2 edk2 edk2 edk2 edk2 edk2 edk2 edk2 edk2 edk2 edk2
CVE CVE-2024-38805 EDK2 contains a vulnerability in BIOS where a user may cause an Integer Overflow or Wraparound by network means. A successful exploitation of this vu edk2 edk2 edk2 edk2 edk2 edk2 edk2 edk2 edk2 edk2 edk2 edk2
CVE CVE-2024-38797 EDK2 contains a vulnerability in the HashPeImageByType(). A user may cause a read out of bounds when a corrupted data pointer and length are sent via edk2 edk2 edk2 edk2 edk2 edk2 edk2 edk2 edk2 edk2 edk2 edk2
CVE CVE-2024-50067 In the Linux kernel, the following vulnerability has been resolved: uprobe: avoid out-of-bounds memory access of fetching args Uprobe needs to fetc linux
CVE CVE-2025-38584 In the Linux kernel, the following vulnerability has been resolved: padata: Fix pd UAF once and for all There is a race condition/UAF in padata_reo linux linux linux



About   -   Send Feedback to @ubuntu_updates