UbuntuUpdates.org

Bugs addressed in recent updates

All Launchpad Ubuntu Debian CVE

Origin Bug number Title Packages
Launchpad 1995134 WiFi captive portals stopped working after Kinetic upgrade gnome-shell gnome-shell
Launchpad 1997481 Update gnome-shell to 43.1 gnome-shell gnome-shell
Launchpad 1996678 containerd sporadic timeouts linux-ibm-5.4 linux-hwe-5.4 linux-aws-5.4 linux linux-oracle-5.4 linux linux-ibm-5.4 linux-oracle-5.4 linux-hwe-5.4 linux-aws-5.4
Launchpad 1998321 tzdata 2022g release tzdata tzdata tzdata tzdata
Launchpad 1995469 Version 0.6.7-3 is broken for \ pyroute2 pyroute2
Launchpad 1996740 5.15.0-53-generic no longer boots linux-aws linux-riscv linux linux-riscv-5.15 linux-lowlatency-hwe-5.15 linux-hwe-5.15 linux-oracle-5.15 linux-aws-5.15 linux-riscv linux linux-riscv-5.15 linux-lowlatency-hwe-5.15 linux-hwe-5.15 linux-oracle-5.15 linux-aws-5.15
Debian 910959 grub-cloud-amd64: missing Conflicts: grub-coreboot, grub-efi-ia32, grub-ieee1275, grub-xen grub2 grub2 grub2 grub2
Launchpad 1995751 update to 2.04-1ubuntu47.4 drops zz-update-grub grub2 grub2 grub2 grub2
Launchpad 1993934 Windows 11 22H2 and Samba-AD login issue samba samba samba samba
Launchpad 1997559 AttributeError: 'NoneType' object has no attribute 'partition' cloud-init cloud-init cloud-init cloud-init
Launchpad 1985964 UnicodeDecodeError: 'utf-8' codec can't decode byte 0x8b in position 1: invalid start byte ubuntu-release-upgrader ubuntu-release-upgrader
Launchpad 1964036 Firefox icon missing from panel following Kubuntu upgrade 20.04-\u003e22.04 ubuntu-release-upgrader ubuntu-release-upgrader
CVE CVE-2022-33743 network backend may cause Linux netfront to use freed SKBs While adding logic to support XDP (eXpress Data Path), a code label was moved in a way all linux-oem-5.14 linux-starfive-5.17 linux-allwinner-5.17 linux-starfive-5.17 linux-allwinner-5.17
CVE CVE-2022-26365 Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond linux-oem-5.14 linux-starfive-5.17 linux-allwinner-5.17 linux-starfive-5.17 linux-allwinner-5.17
Launchpad 1998169 useradd command does not copy all of /etc/skel shadow shadow shadow shadow shadow shadow
CVE CVE-2022-39377 sysstat is a set of system performance tools for the Linux operating system. On 32 bit systems, in versions 9.1.16 and newer but prior to 12.7.1, all sysstat sysstat sysstat sysstat sysstat sysstat sysstat sysstat sysstat sysstat sysstat sysstat sysstat sysstat sysstat sysstat
Launchpad 1996117 [Azure][Arm64] Unable to detect all VF nics / Failing provisioning linux-azure
Launchpad 1995408 [Azure] [NVMe] cpu soft lockup issue when run fio against nvme disks linux-azure
CVE CVE-2022-43945 The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by e linux-aws linux-azure linux-oem-5.14 linux-aws linux-starfive linux-riscv linux linux-starfive-5.17 linux-riscv linux linux-allwinner-5.17 linux-riscv-5.15 linux-lowlatency-hwe-5.15 linux-hwe-5.15 linux-oracle-5.15 linux-aws-5.15 linux-starfive-5.17 linux-riscv linux linux-allwinner-5.17 linux-riscv-5.15 linux-lowlatency-hwe-5.15 linux-hwe-5.15 linux-oracle-5.15 linux-aws-5.15
CVE CVE-2022-3524 A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function ipv6_renew_options of linux-aws linux-azure linux-oem-5.14 linux-aws linux-ibm-5.4 linux-dell300x linux-hwe-5.4 linux linux-aws linux-aws-5.4 linux-starfive linux-riscv linux linux-starfive-5.17 linux-riscv linux linux-allwinner-5.17 linux-riscv-5.15 linux linux-lowlatency-hwe-5.15 linux-hwe-5.15 linux-oracle-5.15 linux-aws-5.15 linux-oracle linux-oracle-5.4 linux-kvm linux-starfive-5.17 linux-riscv linux linux-allwinner-5.17 linux-riscv-5.15 linux linux-lowlatency-hwe-5.15 linux-hwe-5.15 linux-oracle-5.15 linux-aws-5.15 linux-ibm-5.4 linux-dell300x linux-oracle linux-oracle-5.4 linux-kvm linux-hwe-5.4 linux linux-aws linux-aws-5.4



About   -   Send Feedback to @ubuntu_updates