Bugs addressed in recent updates
| Origin | Bug number | Title | Packages |
|---|---|---|---|
| Launchpad | 2065084 | [SRU] BDM with device_type=lun fails | nova nova |
| CVE | CVE-2025-15224 | When doing SSH-based transfers using either SCP or SFTP, and asked to do public key authentication, curl would wrongly still ask and authenticate usi | curl curl curl curl |
| CVE | CVE-2025-15079 | When doing SSH-based transfers using either SCP or SFTP, and setting the known_hosts file, libcurl could still mistakenly accept connecting to hosts | curl curl curl curl |
| CVE | CVE-2025-14819 | When doing TLS related transfers with reused easy or multi handles and altering the `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally | curl curl curl curl |
| CVE | CVE-2025-14524 | When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a second URL that uses an IMAP, | curl curl curl curl curl curl |
| CVE | CVE-2025-14017 | When doing multi-threaded LDAPS transfers (LDAP over TLS) with libcurl, changing TLS options in one thread would inadvertently change them globally a | curl curl curl curl curl curl |
| CVE | CVE-2025-13034 | When using `CURLOPT_PINNEDPUBLICKEY` option with libcurl or `--pinnedpubkey` with the curl tool,curl should check the public key of the server certif | curl curl |
| CVE | CVE-2025-10148 | curl's websocket code did not update the 32 bit mask pattern for each new outgoing frame as the specification says. Instead it used a fixed mask tha | curl curl curl curl |
| CVE | CVE-2025-9086 | 1. A cookie is set using the `secure` keyword for `https://target` 2. curl is redirected to or otherwise made to speak with `http://target` (same | curl curl |
| CVE | CVE-2024-47866 | Ceph is a distributed object, block, and file storage platform. In versions up to and including 19.2.3, using the argument `x-amz-copy-source` to put | ceph ceph ceph ceph ceph ceph ceph ceph ceph ceph ceph ceph |
| Launchpad | 2140498 | aptly fails to create new mirrors or decode previous mirror data | aptly aptly |
| CVE | CVE-2024-57259 | sqfs_search_dir in Das U-Boot before 2025.01-rc1 exhibits an off-by-one error and resultant heap memory corruption for squashfs directory listing bec | u-boot u-boot u-boot u-boot |
| CVE | CVE-2024-57258 | Integer overflows in memory allocation in Das U-Boot before 2025.01-rc1 occur for a crafted squashfs filesystem via sbrk, via request2size, or becaus | u-boot u-boot u-boot u-boot |
| CVE | CVE-2024-57257 | A stack consumption issue in sqfs_size in Das U-Boot before 2025.01-rc1 occurs via a crafted squashfs filesystem with deep symlink nesting. | u-boot u-boot u-boot u-boot |
| CVE | CVE-2024-57256 | An integer overflow in ext4fs_read_symlink in Das U-Boot before 2025.01-rc1 occurs for zalloc (adding one to an le32 variable) via a crafted ext4 fil | u-boot u-boot u-boot u-boot |
| CVE | CVE-2024-57255 | An integer overflow in sqfs_resolve_symlink in Das U-Boot before 2025.01-rc1 occurs via a crafted squashfs filesystem with an inode size of 0xfffffff | u-boot u-boot u-boot u-boot |
| CVE | CVE-2024-57254 | An integer overflow in sqfs_inode_size in Das U-Boot before 2025.01-rc1 occurs in the symlink size calculation via a crafted squashfs filesystem. | u-boot u-boot u-boot u-boot |
| CVE | CVE-2021-46312 | An issue was discovered IW44EncodeCodec.cpp in djvulibre 3.5.28 in allows attackers to cause a denial of service via divide by zero. | djvulibre djvulibre djvulibre djvulibre djvulibre djvulibre djvulibre djvulibre |
| Launchpad | 2141393 | Missing apport links for HWE kernels | linux-base |
| Launchpad | 2130569 | php-fpm scoreboard: failed to lock | php8.3 php8.3 |
About
-
Send Feedback to @ubuntu_updates