Bugs addressed in recent updates
Origin | Bug number | Title | Packages |
---|---|---|---|
Launchpad | 2115197 | [SRU] Backport azure-proxy-agent 1.0.30-0ubuntu3 | azure-proxy-agent |
Launchpad | 2115418 | systemd-networkd-wait-online service times out in IPv6-only environments | systemd systemd |
Launchpad | 2110585 | [SRU] Stop using 'actual_brightness' in systemd | systemd systemd |
Launchpad | 2111107 | systemd user scope fails to connect | systemd systemd |
CVE | CVE-2025-54409 | AIDE is an advanced intrusion detection environment. From versions 0.1 ... | aide aide aide aide aide aide aide aide aide aide aide aide |
CVE | CVE-2025-54389 | AIDE is an advanced intrusion detection environment. Prior to version ... | aide aide aide aide aide aide aide aide aide aide aide aide |
Launchpad | 2119741 | Bluetooth device does not reconnect after being paired | bluez bluez bluez bluez |
Launchpad | 2119395 | CVE-2024-38474-regression.patch add an extra call to do_expand() | apache2 apache2 apache2 apache2 apache2 apache2 apache2 apache2 |
CVE | CVE-2025-31501 | Best Practical RT (Request Tracker) 5.0 through 5.0.7 allows XSS via JavaScript injection in an RT permalink. | request-tracker5 request-tracker5 |
CVE | CVE-2025-31500 | Best Practical RT (Request Tracker) 5.0 through 5.0.7 allows XSS via JavaScript injection in an Asset name. | request-tracker5 request-tracker5 |
CVE | CVE-2025-30087 | Best Practical RT (Request Tracker) 4.4 through 4.4.7 and 5.0 through 5.0.7 allows XSS via injection of crafted parameters in a search URL. | request-tracker5 request-tracker5 |
CVE | CVE-2025-2545 | Vulnerability in Best Practical Solutions, LLC's Request Tracker prior to v5.0.8, where the Triple DES (3DES) cryptographic algorithm is used to prot | request-tracker5 request-tracker5 |
CVE | CVE-2025-38073 | In the Linux kernel, the following vulnerability has been resolved: block: fix race between set_blocksize and read paths With the new large sector | linux |
CVE | CVE-2025-38047 | In the Linux kernel, the following vulnerability has been resolved: x86/fred: Fix system hang during S4 resume with FRED enabled Upon a wakeup from | linux |
CVE | CVE-2025-38081 | In the Linux kernel, the following vulnerability has been resolved: spi-rockchip: Fix register out of bounds access Do not write native chip select | linux |
CVE | CVE-2025-38071 | In the Linux kernel, the following vulnerability has been resolved: x86/mm: Check return value from memblock_phys_alloc_range() At least with CONFI | linux |
CVE | CVE-2025-38070 | In the Linux kernel, the following vulnerability has been resolved: ASoC: sma1307: Add NULL check in sma1307_setting_loaded() All varibale allocate | linux |
CVE | CVE-2025-38045 | In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: fix debug actions order The order of actions taken for debug was | linux |
CVE | CVE-2025-38069 | In the Linux kernel, the following vulnerability has been resolved: PCI: endpoint: pci-epf-test: Fix double free that causes kernel to oops Fix a k | linux |
CVE | CVE-2025-38042 | In the Linux kernel, the following vulnerability has been resolved: dmaengine: ti: k3-udma-glue: Drop skip_fdq argument from k3_udma_glue_reset_rx_c | linux |
About
-
Send Feedback to @ubuntu_updates