Bugs addressed in recent updates
| Origin | Bug number | Title | Packages |
|---|---|---|---|
| Launchpad | 2127186 | [SRU] bluetooth is not working with x13s with Questing | bluez bluez |
| Launchpad | 2130619 | Mutter may crash during output/VT changes | mutter mutter mutter mutter |
| Launchpad | 2129202 | Update ubuntu-docs to 25.10 | ubuntu-docs gnome-user-docs |
| Launchpad | 2127093 | cloud-init 25.1.4-0ubuntu0~24.04.1 in noble expects a version of python3 only available in updates | python3-defaults python3-defaults python3-defaults python3-defaults |
| Launchpad | 2130550 | mkinitramfs incorrectly attempts to use incompatible compression format pigz with 3cpio | initramfs-tools |
| Launchpad | 2125448 | Burst parameter of tc police only allows 4GB while the kernel can support much more | iproute2 |
| CVE | CVE-2025-32086 | Improperly implemented security check for standard in the DDRIO configuration for some Intel(R) Xeon(R) 6 Processors when using Intel(R) SGX or Intel | intel-microcode intel-microcode intel-microcode intel-microcode intel-microcode intel-microcode intel-microcode intel-microcode |
| CVE | CVE-2025-26403 | Out-of-bounds write in the memory subsystem for some Intel(R) Xeon(R) 6 processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged use | intel-microcode intel-microcode intel-microcode intel-microcode intel-microcode intel-microcode intel-microcode intel-microcode |
| CVE | CVE-2025-24305 | Insufficient control flow management in the Alias Checking Trusted Module (ACTM) firmware for some Intel(R) Xeon(R) processors may allow a privileged | intel-microcode intel-microcode intel-microcode intel-microcode intel-microcode intel-microcode intel-microcode intel-microcode |
| CVE | CVE-2025-20053 | Improper buffer restrictions for some Intel(R) Xeon(R) Processor firmware with SGX enabled may allow a privileged user to potentially enable escalati | intel-microcode intel-microcode intel-microcode intel-microcode intel-microcode intel-microcode intel-microcode intel-microcode |
| CVE | CVE-2025-21090 | Missing reference to active allocated resource for some Intel(R) Xeon(R) processors may allow an authenticated user to potentially enable denial of s | intel-microcode intel-microcode intel-microcode intel-microcode intel-microcode intel-microcode intel-microcode intel-microcode |
| CVE | CVE-2025-22889 | Improper handling of overlap between protected memory ranges for some Intel(R) Xeon(R) 6 processor with Intel(R) TDX may allow a privileged user to p | intel-microcode intel-microcode intel-microcode intel-microcode intel-microcode intel-microcode intel-microcode intel-microcode |
| CVE | CVE-2025-22839 | Insufficient granularity of access control in the OOB-MSM for some Intel(R) Xeon(R) 6 Scalable processors may allow a privileged user to potentially | intel-microcode intel-microcode intel-microcode intel-microcode intel-microcode intel-microcode intel-microcode intel-microcode |
| CVE | CVE-2025-22840 | Sequence of processor instructions leads to unexpected behavior for some Intel(R) Xeon(R) 6 Scalable processors may allow an authenticated user to po | intel-microcode intel-microcode intel-microcode intel-microcode intel-microcode intel-microcode intel-microcode intel-microcode |
| CVE | CVE-2025-20109 | Improper Isolation or Compartmentalization in the stream cache mechanism for some Intel(R) Processors may allow an authenticated user to potentially | intel-microcode intel-microcode intel-microcode intel-microcode intel-microcode intel-microcode intel-microcode intel-microcode |
| Launchpad | 2130623 | Update to address two moderate vulnerabilities | rust-sudo-rs rust-sudo-rs |
| Launchpad | 2121375 | FTBFS with GCC 15.2 | jpeg-xl |
| Launchpad | 2130763 | ksystemlog on Kubuntu 25.10 fails to launch | ksystemlog ksystemlog ksystemlog |
| Launchpad | 2129767 | Kubuntu 25.10: Driver Manager does not start | kubuntu-settings kubuntu-settings kubuntu-settings |
| Launchpad | 2119581 | tracker-extract-3 is crashing on battery charge state change | glib2.0 glib2.0 |
About
-
Send Feedback to @ubuntu_updates