Canonical USN OVAL Generator 1 5.11.1 2026-05-22T09:12:03 Copyright (C) 2026 Canonical LTD. All rights reserved. This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, version 3 of the License. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License version 3 for more details. You should have received a copy of the GNU General Public License version 3 along with this program. If not, see http://www.gnu.org/licenses/. Check that Ubuntu 26.04 LTS (resolute) is installed. USN-8190-2 -- Rack::Session vulnerability Ubuntu 26.04 LTS USN-8190-1 fixed a vulnerability in Rack::Session. This update provides the corresponding update for Ubuntu 26.04 LTS. Original advisory details: SeungMyung Lee discovered that Rack::Session did not properly reject cookies upon decryption failure. A remote attacker could use this issue to manipulate session contents and possibly gain unauthorized access. Update Instructions: Run `sudo pro fix USN-8190-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: ruby-rack-session - 2.1.1-0.1ubuntu0.26.04.1 No subscription required Medium CVE-2026-39324 USN-8192-2 -- NTFS-3G vulnerabilities Ubuntu 26.04 LTS USN-8192-1 fixed vulnerabilities in NTFS-3G. This update provides the corresponding update to Ubuntu 26.04 LTS. Original advisory details: Jeffrey Bencteux discovered that NTFS-3G incorrectly handled certain UTF-8 sequences. An attacker could use this issue to cause NTFS-3G to crash, resulting in a denial of service, or to execute arbitrary code. This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2023-52890) Andrea Bocchetti discovered that NTFS-3G incorrectly handled certain security descriptors. An attacker could use this issue to cause NTFS-3G to crash, resulting in a denial of service, or to execute arbitrary code. (CVE-2026-40706) Update Instructions: Run `sudo pro fix USN-8192-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libntfs-3g89t64 - 1:2022.10.3-5ubuntu1 ntfs-3g - 1:2022.10.3-5ubuntu1 ntfs-3g-dev - 1:2022.10.3-5ubuntu1 No subscription required Medium CVE-2026-40706 USN-8195-2 -- PackageKit vulnerability Ubuntu 26.04 LTS USN-8195-1 fixed a vulnerability in PackageKit. This update provides the corresponding update to Ubuntu 26.04 LTS. Original advisory details: It was discovered that PackageKit incorrectly handled certain transactions. A local attacker could use this issue to install arbitrary packages as root, possibly resulting in privilege escalation. Update Instructions: Run `sudo pro fix USN-8195-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-packagekitglib-1.0 - 1.3.4-3ubuntu1 gstreamer1.0-packagekit - 1.3.4-3ubuntu1 libpackagekit-glib2-18 - 1.3.4-3ubuntu1 libpackagekit-glib2-dev - 1.3.4-3ubuntu1 packagekit - 1.3.4-3ubuntu1 packagekit-command-not-found - 1.3.4-3ubuntu1 packagekit-docs - 1.3.4-3ubuntu1 packagekit-gtk3-module - 1.3.4-3ubuntu1 No subscription required None https://launchpad.net/bugs/2149908 USN-8196-2 -- strongSwan vulnerabilities Ubuntu 26.04 LTS USN-8196-1 fixed vulnerabilities in strongSwan. This update provides the corresponding update to Ubuntu 26.04 LTS. Original advisory details: Haruto Kimura discovered that strongSwan incorrectly handled the supported_versions extension in TLS. A remote attacker could possibly use this issue to cause strongSwan to stop responding, resulting in a denial of service. (CVE-2026-35328) Haruto Kimura discovered that strongSwan incorrectly handled certain encrypted PKCS#7 containers. A remote attacker could possibly use this issue to cause strongSwan to crash, resulting in a denial of service. (CVE-2026-35329) Lukas Johannes Moeller discovered that strongSwan incorrectly handled certain EAP-SIM/AKA attributes. A remote attacker could use this issue to cause strongSwan to stop responding, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2026-35330) Haruto Kimura discovered that strongSwan incorrectly handled processing of X.509 name constraints. A remote attacker could possibly use this issue to bypass excluded name constraints. (CVE-2026-35331) Haruto Kimura discovered that strongSwan incorrectly processed ECDH public values. A remote attacker could possibly use this issue to cause strongSwan to crash, resulting in a denial of service. (CVE-2026-35332) Lukas Johannes Moeller discovered that strongSwan incorrectly handled certain RADIUS attributes. A remote attacker could possibly use this issue to cause strongSwan to crash, resulting in a denial of service. (CVE-2026-35333) Ryo Shimada discovered that strongSwan incorrectly handled RSA decryption. A remote attacker could possibly use this issue to cause strongSwan to crash, resulting in a denial of service. (CVE-2026-35334) Update Instructions: Run `sudo pro fix USN-8196-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: charon-cmd - 6.0.4-1ubuntu3 charon-systemd - 6.0.4-1ubuntu3 libcharon-extauth-plugins - 6.0.4-1ubuntu3 libcharon-extra-plugins - 6.0.4-1ubuntu3 libstrongswan - 6.0.4-1ubuntu3 libstrongswan-extra-plugins - 6.0.4-1ubuntu3 libstrongswan-standard-plugins - 6.0.4-1ubuntu3 strongswan - 6.0.4-1ubuntu3 strongswan-charon - 6.0.4-1ubuntu3 strongswan-libcharon - 6.0.4-1ubuntu3 strongswan-nm - 6.0.4-1ubuntu3 strongswan-pki - 6.0.4-1ubuntu3 strongswan-starter - 6.0.4-1ubuntu3 strongswan-swanctl - 6.0.4-1ubuntu3 No subscription required Medium CVE-2026-35334 CVE-2026-35328 CVE-2026-35333 CVE-2026-35332 CVE-2026-35330 CVE-2026-35329 CVE-2026-35331 USN-8198-2 -- Tornado vulnerabilities Ubuntu 26.04 LTS USN-8198-1 fixed vulnerabilities in Tornado. This update provides the corresponding updates for Ubuntu 26.04 LTS. Original advisory details: It was discovered that Tornado incorrectly handled parsing of large multipart request bodies. An attacker could possibly use this issue to cause a denial of service. (CVE-2026-31958) It was discovered that Tornado did not properly validate characters in cookie values. An attacker could possibly use this issue to inject arbitrary cookie attributes. (CVE-2026-35536) Update Instructions: Run `sudo pro fix USN-8198-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-tornado-doc - 6.5.4-0.1ubuntu0.1 python3-tornado - 6.5.4-0.1ubuntu0.1 No subscription required Medium CVE-2026-31958 CVE-2026-35536 USN-8202-2 -- jq vulnerabilities Ubuntu 26.04 LTS USN-8202-1 fixed vulnerabilities in jq. This update provides the corresponding update to Ubuntu 26.04 LTS. Original advisory details: It was discovered that jq did not correctly handle certain string concatenations. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2026-32316) It was discovered that jq did not correctly handle recursion in certain circumstances. An attacker could possibly use this issue to cause a denial of service. (CVE-2026-33947) It was discovered that jq did not correctly handle improperly terminated strings. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2026-33948) It was discovered that jq did not correctly handle checking certain variable types. An attacker could possibly use this issue to cause a denial of service or leak sensitive information. (CVE-2026-39956) It was discovered that jq did not correctly handle certain string formatting. An attacker could possibly use this issue to leak sensitive information or cause a denial of service. (CVE-2026-39979) It was discovered that jq used a fixed seed for hash table operations. An attacker could possibly use this issue to cause a denial of service. (CVE-2026-40164) Update Instructions: Run `sudo pro fix USN-8202-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: jq - 1.8.1-4ubuntu2 libjq-dev - 1.8.1-4ubuntu2 libjq1 - 1.8.1-4ubuntu2 No subscription required Medium CVE-2026-39979 CVE-2026-40164 CVE-2026-39956 CVE-2026-32316 CVE-2026-33947 CVE-2026-33948 USN-8207-1 -- ClamAV vulnerability Ubuntu 26.04 LTS It was discovered that ClamAV incorrectly handled certain HTML files. A remote attacker could possibly use this issue to cause ClamAV to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-8207-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: clamav - 1.4.4+dfsg-0ubuntu0.26.04.1 clamav-base - 1.4.4+dfsg-0ubuntu0.26.04.1 clamav-daemon - 1.4.4+dfsg-0ubuntu0.26.04.1 clamav-doc - 1.4.4+dfsg-0ubuntu0.26.04.1 clamav-docs - 1.4.4+dfsg-0ubuntu0.26.04.1 clamav-freshclam - 1.4.4+dfsg-0ubuntu0.26.04.1 clamav-milter - 1.4.4+dfsg-0ubuntu0.26.04.1 clamav-testfiles - 1.4.4+dfsg-0ubuntu0.26.04.1 clamdscan - 1.4.4+dfsg-0ubuntu0.26.04.1 libclamav-dev - 1.4.4+dfsg-0ubuntu0.26.04.1 libclamav12 - 1.4.4+dfsg-0ubuntu0.26.04.1 No subscription required Medium CVE-2026-20031 USN-8208-1 -- HAProxy vulnerability Ubuntu 26.04 LTS Martino Spagnuolo discovered that HAProxy did not check received body lengths in the HTTP/3 parser. A remote attacker could possibly use this issue to perform a request smuggling attack and obtain sensitive information. Update Instructions: Run `sudo pro fix USN-8208-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: haproxy - 3.2.9-1ubuntu2.1 haproxy-doc - 3.2.9-1ubuntu2.1 vim-haproxy - 3.2.9-1ubuntu2.1 No subscription required Medium CVE-2026-33555 USN-8209-1 -- Little CMS vulnerability Ubuntu 26.04 LTS It was discovered that Little CMS incorrectly handled certain malformed ICC profiles. An attacker could use this issue to cause Little CMS to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-8209-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: liblcms2-2 - 2.17-1ubuntu0.1 liblcms2-dev - 2.17-1ubuntu0.1 liblcms2-utils - 2.17-1ubuntu0.1 No subscription required Medium CVE-2026-41254 USN-8211-1 -- Pillow vulnerability Ubuntu 26.04 LTS It was discovered that Pillow incorrectly handled certain FITS images. An attacker could possibly use this issue to cause Pillow to consume resources, leading to a denial of service. Update Instructions: Run `sudo pro fix USN-8211-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-pil-doc - 12.1.1-2ubuntu1.1 python3-pil - 12.1.1-2ubuntu1.1 python3-pil.imagetk - 12.1.1-2ubuntu1.1 No subscription required Medium CVE-2026-40192 USN-8212-1 -- authd vulnerability Ubuntu 26.04 LTS It was discovered that authd incorrectly assigned the primary group ID to users under certain conditions. A local attacker could possibly use this issue to achieve privilege escalation, or gain unauthorized access to files belonging to other users. Update Instructions: Run `sudo pro fix USN-8212-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: authd - 0.6.1ubuntu0.1 No subscription required Medium CVE-2026-6970 USN-8214-1 -- NLTK vulnerability Ubuntu 26.04 LTS It was discovered that NLTK incorrectly handled file extraction when opening a maliciously crafted zip file. An attacker could possibly use this issue to create or overwrite files on the system and execute arbitrary code. Update Instructions: Run `sudo pro fix USN-8214-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-nltk - 3.9.2-1ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro High CVE-2025-14009 USN-8216-1 -- .NET vulnerabilities Ubuntu 26.04 LTS Ludvig Pedersen discovered that the System.Security.Cryptography.Xml library in .NET incorrectly handled certain XML inputs. An attacker could possibly use this issue to consume excessive resources, resulting in a denial of service. (CVE-2026-33116, CVE-2026-26171) Ludvig Pedersen and Kevin Jones discovered that the System.Security.Cryptography.Xml library in .NET incorrectly handled certain XML inputs. An attacker could possibly use this issue to cause .NET to crash, resulting in a denial of service. (CVE-2026-32203) Ludvig Pedersen discovered that the System.Net.Mail component in .NET incorrectly handled certain inputs. An attacker could possibly use this issue to perform a network spoofing attack. (CVE-2026-32178) It was discovered that the Microsoft.AspNetCore.DataProtection library in .NET did not properly verify cryptographic signatures under certain conditions. A remote attacker could possibly use this issue to elevate privileges. (CVE-2026-40372) Update Instructions: Run `sudo pro fix USN-8216-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: dotnet-sdk-10.0 - 10.0.107-0ubuntu1~26.04.1 dotnet-sdk-10.0-source-built-artifacts - 10.0.107-0ubuntu1~26.04.1 dotnet-sdk-aot-10.0 - 10.0.107-0ubuntu1~26.04.1 dotnet-sdk-dbg-10.0 - 10.0.107-0ubuntu1~26.04.1 dotnet-templates-10.0 - 10.0.107-0ubuntu1~26.04.1 No subscription required dotnet10 - 10.0.107-10.0.7-0ubuntu1~26.04.1 No subscription required aspnetcore-runtime-10.0 - 10.0.7-0ubuntu1~26.04.1 aspnetcore-runtime-dbg-10.0 - 10.0.7-0ubuntu1~26.04.1 aspnetcore-targeting-pack-10.0 - 10.0.7-0ubuntu1~26.04.1 dotnet-apphost-pack-10.0 - 10.0.7-0ubuntu1~26.04.1 dotnet-host-10.0 - 10.0.7-0ubuntu1~26.04.1 dotnet-hostfxr-10.0 - 10.0.7-0ubuntu1~26.04.1 dotnet-runtime-10.0 - 10.0.7-0ubuntu1~26.04.1 dotnet-runtime-dbg-10.0 - 10.0.7-0ubuntu1~26.04.1 dotnet-targeting-pack-10.0 - 10.0.7-0ubuntu1~26.04.1 No subscription required Medium CVE-2026-26171 CVE-2026-33116 CVE-2026-32178 CVE-2026-32203 CVE-2026-40372 USN-8219-1 -- UltraJSON vulnerabilities Ubuntu 26.04 LTS Cameron Criswell discovered that UltraJSON contained a memory leak that would occur when parsing large integers. An attacker could possibly use this issue to cause UltraJSON to crash, resulting in a denial of service. This issue only affected Ubuntu 24.04 LTS, Ubuntu 25.10, and Ubuntu 26.04 LTS. (CVE-2026-32874) It was discovered that UltraJSON contained integer overflow/underflow issues when calculating how much memory to reserve for indentation in certain instances. An attacker could possibly use this issue to cause UltraJSON to crash, resulting in a denial of service. (CVE-2026-32875) Update Instructions: Run `sudo pro fix USN-8219-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-ujson - 5.11.0-3ubuntu0.1 No subscription required Medium CVE-2026-32875 CVE-2026-32874 USN-8222-1 -- OpenSSH vulnerabilities Ubuntu 26.04 LTS Christos Papakonstantinou discovered that the OpenSSH scp tool incorrectly handled the legacy scp protocol (-O) option. This could result in certain files being installed setuid or setgid, contrary to expectations. (CVE-2026-35385) Florian Kohnhäuser discovered that OpenSSH incorrectly handled shell metacharacters in usernames within a command line. When untrusted usernames and non-default configurations using % in ssh_config are being used, an attacker could possibly use this issue to execute arbitrary code. (CVE-2026-35386) Christos Papakonstantinou discovered that OpenSSH incorrectly handled parsing the PubkeyAcceptedAlgorithms and HostbasedAcceptedAlgorithms options. This could result in unintended ECDSA algorithms being used, contrary to expectations. (CVE-2026-35387) Michalis Vasileiadis discovered that OpenSSH incorrectly handled proxy-mode multiplexing sessions. This could result in no confirmation being asked, contrary to expectations. (CVE-2026-35388) Vladimir Tokarev discovered that OpenSSH incorrectly handled certificates with the principal name containing a comma character when using user-trusted CA keys in authorized_keys and an authorized_keys principals="" option that lists more than one principal. This could result in inappropriate principal matching, contrary to expectations. (CVE-2026-35414) Update Instructions: Run `sudo pro fix USN-8222-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openssh-client - 1:10.2p1-2ubuntu3.2 openssh-client-gssapi - 1:10.2p1-2ubuntu3.2 openssh-server - 1:10.2p1-2ubuntu3.2 openssh-server-gssapi - 1:10.2p1-2ubuntu3.2 openssh-sftp-server - 1:10.2p1-2ubuntu3.2 openssh-tests - 1:10.2p1-2ubuntu3.2 ssh - 1:10.2p1-2ubuntu3.2 ssh-askpass-gnome - 1:10.2p1-2ubuntu3.2 No subscription required Medium CVE-2026-35388 CVE-2026-35385 CVE-2026-35387 CVE-2026-35414 CVE-2026-35386 USN-8225-1 -- Python marshmallow vulnerabilities Ubuntu 26.04 LTS Jared Deckard discovered that Python marshmallow did not correctly handle hiding certain fields. An attacker could possibly use this issue to leak sensitive information. This issue only affected Ubuntu 18.04 LTS. (CVE-2018-17175) It was discovered that Python marshmallow did not efficiently handle merging certain objects. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS and Ubuntu 26.04 LTS. (CVE-2025-68480) Update Instructions: Run `sudo pro fix USN-8225-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-marshmallow - 3.26.1-0.4ubuntu0.1~esm1 python3-marshmallow-doc - 3.26.1-0.4ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2025-68480 CVE-2018-17175 USN-8227-1 -- curl vulnerabilities Ubuntu 26.04 LTS It was discovered that curl incorrectly reused non-TLS connections when TLS was required in some STARTTLS configurations. A remote attacker could possibly use this issue to obtain sensitive information. (CVE-2026-4873) It was discovered that curl incorrectly reused certain HTTP Negotiate connections. A remote attacker could possibly use this issue to obtain sensitive information. (CVE-2026-5545) It was discovered that curl incorrectly reused certain SMB connections. A remote attacker could possibly use this issue to obtain sensitive information. (CVE-2026-5773) It was discovered that curl could leak proxy credentials when handling redirects in some configurations. A remote attacker could possibly use this issue to obtain sensitive information. (CVE-2026-6253) It was discovered that curl could leak cookies because of stale custom cookie host handling in some requests. A remote attacker could possibly use this issue to obtain sensitive information. (CVE-2026-6276) It was discovered that curl could leak .netrc credentials when reusing proxy connections in some situations. A remote attacker could possibly use this issue to obtain sensitive information. (CVE-2026-6429) It was discovered that curl could leak Digest authentication state when switching proxies in some situations. A remote attacker could possibly use this issue to obtain sensitive information. (CVE-2026-7168) Update Instructions: Run `sudo pro fix USN-8227-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: curl - 8.18.0-1ubuntu2.1 libcurl3t64-gnutls - 8.18.0-1ubuntu2.1 libcurl4-doc - 8.18.0-1ubuntu2.1 libcurl4-gnutls-dev - 8.18.0-1ubuntu2.1 libcurl4-openssl-dev - 8.18.0-1ubuntu2.1 libcurl4t64 - 8.18.0-1ubuntu2.1 No subscription required Medium CVE-2026-6276 CVE-2026-5773 CVE-2026-7168 CVE-2026-5545 CVE-2026-6253 CVE-2026-6429 CVE-2026-4873 USN-8228-1 -- Exim vulnerabilities Ubuntu 26.04 LTS It was discovered that Exim incorrectly handled parsing malformed JSON in message headers. A remote attacker could possibly use this issue to execute arbitrary code. (CVE-2026-40685) It was discovered that Exim incorrectly handled processing of UTF-8 trailing characters. A remote attacker could possibly use this issue to obtain sensitive information. (CVE-2026-40686) It was discovered that Exim incorrectly handled SPA authenticator input. An authenticated user could possibly use this issue to execute arbitrary code. (CVE-2026-40687) Update Instructions: Run `sudo pro fix USN-8228-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: exim4 - 4.99.1-1ubuntu1.1 exim4-base - 4.99.1-1ubuntu1.1 exim4-config - 4.99.1-1ubuntu1.1 exim4-daemon-heavy - 4.99.1-1ubuntu1.1 exim4-daemon-light - 4.99.1-1ubuntu1.1 exim4-dev - 4.99.1-1ubuntu1.1 eximon4 - 4.99.1-1ubuntu1.1 No subscription required Medium CVE-2026-40685 CVE-2026-40687 CVE-2026-40686 USN-8229-1 -- sed vulnerability Ubuntu 26.04 LTS Michał Majchrowicz and Marcin Wyczechowski discovered that sed incorrectly handled symbolic links when performing in-place edits. A local attacker could possibly use this issue to overwrite arbitrary files. Update Instructions: Run `sudo pro fix USN-8229-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: sed - 4.9-2ubuntu1 No subscription required Medium CVE-2026-5958 USN-8230-1 -- Docker vulnerabilities Ubuntu 26.04 LTS It was discovered that BuildKit, contained within Docker, incorrectly handled file path validation when processing frontend API messages. An attacker could possibly use this issue to write files outside of the intended state directory. (CVE-2026-33747) It was discovered that BuildKit, contained within Docker, incorrectly validated the subdir component of Git URL fragments. An attacker could possibly use this issue to access files outside of the checked-out repository root. (CVE-2026-33748) Update Instructions: Run `sudo pro fix USN-8230-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: docker-doc - 29.1.3-0ubuntu4.1 docker.io - 29.1.3-0ubuntu4.1 No subscription required Medium CVE-2026-33748 CVE-2026-33747 USN-8231-1 -- Dynaconf vulnerability Ubuntu 26.04 LTS It was discovered that Dynaconf was incorrectly handling template evaluation in its string resolvers. A remote attacker could possibly use this issue to execute arbitrary code. Update Instructions: Run `sudo pro fix USN-8231-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python3-dynaconf - 3.2.12-1ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2026-33154 USN-8232-1 -- Django vulnerabilities Ubuntu 26.04 LTS It was discovered that Django did not vary cached response headers on cookies when sessions were not modified while SESSION_SAVE_EVERY_REQUEST was enabled. A remote attacker could possibly use this issue to steal a user's session. (CVE-2026-35192) Kyle Agronick and Jacob Walls discovered that Django incorrectly handled ASGI requests with missing or understated Content-Length header values. A remote attacker could possibly use this issue to cause Django to use excessive resources, leading to a denial of service. (CVE-2026-5766) Ahmad Sadeddin discovered that Django UpdateCacheMiddleware incorrectly cached requests where the Vary header contained an asterisk. A remote attacker could possibly use this issue to obtain sensitive information. (CVE-2026-6907) Update Instructions: Run `sudo pro fix USN-8232-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-django-doc - 3:5.2.9-0ubuntu4.1 python3-django - 3:5.2.9-0ubuntu4.1 No subscription required Low CVE-2026-6907 CVE-2026-5766 CVE-2026-35192 USN-8233-2 -- nghttp2 vulnerability Ubuntu 26.04 LTS USN-8233-1 fixed a vulnerability in nghttp2. This update provides the corresponding update for Ubuntu 26.04 LTS. Original advisory details: Andrew MacPherson discovered that nghttp2 did not properly validate internal state when the session termination API was called. A remote attacker could possibly use this issue to cause nghttp2 to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-8233-2` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libnghttp2-14 - 1.68.0-2ubuntu0.1 libnghttp2-dev - 1.68.0-2ubuntu0.1 libnghttp2-doc - 1.68.0-2ubuntu0.1 nghttp2 - 1.68.0-2ubuntu0.1 nghttp2-client - 1.68.0-2ubuntu0.1 nghttp2-proxy - 1.68.0-2ubuntu0.1 nghttp2-server - 1.68.0-2ubuntu0.1 No subscription required Medium CVE-2026-27135 USN-8234-1 -- Mako vulnerability Ubuntu 26.04 LTS It was discovered that Mako incorrectly handled URIs with double-slash prefixes in TemplateLookup. A remote attacker could possibly use this issue to obtain sensitive information. Update Instructions: Run `sudo pro fix USN-8234-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: python-mako-doc - 1.3.10-3ubuntu0.1 python3-mako - 1.3.10-3ubuntu0.1 No subscription required Medium CVE-2026-41205 USN-8237-1 -- WebKitGTK vulnerabilities Ubuntu 26.04 LTS Several security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution. Update Instructions: Run `sudo pro fix USN-8237-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gir1.2-javascriptcoregtk-4.1 - 2.52.3-0ubuntu0.26.04.2 gir1.2-javascriptcoregtk-6.0 - 2.52.3-0ubuntu0.26.04.2 gir1.2-webkit-6.0 - 2.52.3-0ubuntu0.26.04.2 gir1.2-webkit2-4.1 - 2.52.3-0ubuntu0.26.04.2 libjavascriptcoregtk-4.1-0 - 2.52.3-0ubuntu0.26.04.2 libjavascriptcoregtk-4.1-dev - 2.52.3-0ubuntu0.26.04.2 libjavascriptcoregtk-6.0-1 - 2.52.3-0ubuntu0.26.04.2 libjavascriptcoregtk-6.0-dev - 2.52.3-0ubuntu0.26.04.2 libjavascriptcoregtk-bin - 2.52.3-0ubuntu0.26.04.2 libwebkit2gtk-4.1-0 - 2.52.3-0ubuntu0.26.04.2 libwebkit2gtk-4.1-dev - 2.52.3-0ubuntu0.26.04.2 libwebkitgtk-6.0-4 - 2.52.3-0ubuntu0.26.04.2 libwebkitgtk-6.0-dev - 2.52.3-0ubuntu0.26.04.2 libwebkitgtk-doc - 2.52.3-0ubuntu0.26.04.2 webkitgtk-webdriver - 2.52.3-0ubuntu0.26.04.2 No subscription required Medium CVE-2026-28871 CVE-2026-20664 CVE-2026-20608 CVE-2026-20691 CVE-2026-20636 CVE-2026-28859 CVE-2026-20665 CVE-2025-46299 CVE-2026-20635 CVE-2025-43213 CVE-2026-20652 CVE-2025-43457 CVE-2026-20643 CVE-2025-43511 CVE-2025-43214 CVE-2026-28857 CVE-2026-20644 CVE-2026-28861 CVE-2026-20676 USN-8238-1 -- EditorConfig vulnerability Ubuntu 26.04 LTS It was discovered that EditorConfig incorrectly handled specially crafted configuration files. A local attacker could possibly use this issue to cause EditorConfig to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-8238-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: editorconfig - 0.12.10+~0.17.1-3ubuntu0.1 editorconfig-doc - 0.12.10+~0.17.1-3ubuntu0.1 libeditorconfig-dev - 0.12.10+~0.17.1-3ubuntu0.1 libeditorconfig0 - 0.12.10+~0.17.1-3ubuntu0.1 No subscription required Medium CVE-2026-40489 USN-8239-1 -- Apache HTTP Server vulnerabilities Ubuntu 26.04 LTS Bartlomiej Dmitruk and Stanislaw Strzalkowski discovered that Apache HTTP Server incorrectly handled certain memory operations when using the HTTP/2 protocol. A remote attacker could use this issue to cause Apache HTTP Server to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 26.04 LTS. (CVE-2026-23918) It was discovered that the Apache HTTP Server mod_rewrite module incorrectly handled certain privileges. A local attacker could possibly use this issue to obtain sensitive information. (CVE-2026-24072) Andrew Lacambra, Elhanan Haenel, Tianshuo Han, and Tristan Madani discovered that the Apache HTTP Server mod_proxy_ajp module incorrectly handled certain AJP server messages. An attacker in control of a backend AJP server could use this issue to cause Apache HTTP Server to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2026-28780) Pavel Kohout discovered that Apache HTTP Server did not properly limit resource allocation in mod_md when processing OCSP response data. A remote attacker could possibly use this issue to cause a denial of service. (CVE-2026-29168) Pavel Kohout discovered that the Apache HTTP Server incorrectly handled certain memory operations in mod_dav_lock. A remote attacker could possibly use this issue to cause Apache HTTP Server to crash, resulting in a denial of service. (CVE-2026-29169) Nitescu Lucian discovered that Apache HTTP Server had a timing attack vulnerability in mod_auth_digest. A remote attacker could possibly use this issue to bypass Digest authentication. (CVE-2026-33006) Pavel Kohout and Arkadi Vainbrand discovered that Apache HTTP Server incorrectly handled certain memory operations in mod_authn_socache. A remote attacker could possibly use this issue to cause Apache HTTP Server to crash, resulting in a denial of service. (CVE-2026-33007) Haruki Oyama, Merih Mengisteab, and Dawit Jeong discovered that Apache HTTP Server had an HTTP response splitting vulnerability in multiple modules when used with untrusted or compromised backend servers. An attacker could possibly use this issue to inject arbitrary HTTP headers. (CVE-2026-33523) Elhanan Haenel discovered that Apache HTTP Server incorrectly handled certain memory operations in mod_proxy_ajp. A remote attacker could possibly use this issue to cause Apache HTTP Server to crash, resulting in a denial of service. (CVE-2026-33857) Tianshuo Han and Jérôme Djouder discovered that Apache HTTP Server incorrectly handled certain string operations in mod_proxy_ajp. A remote attacker could possibly use this issue to obtain sensitive information. (CVE-2026-34032) Elhanan Haenel discovered that Apache HTTP Server incorrectly handled certain memory operations in mod_proxy_ajp. A remote attacker could use this issue to cause Apache HTTP Server to crash, resulting in a denial of service, or possibly obtain sensitive information. (CVE-2026-34059) Update Instructions: Run `sudo pro fix USN-8239-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: apache2 - 2.4.66-2ubuntu2.1 apache2-bin - 2.4.66-2ubuntu2.1 apache2-data - 2.4.66-2ubuntu2.1 apache2-dev - 2.4.66-2ubuntu2.1 apache2-doc - 2.4.66-2ubuntu2.1 apache2-ssl-dev - 2.4.66-2ubuntu2.1 apache2-suexec-custom - 2.4.66-2ubuntu2.1 apache2-suexec-pristine - 2.4.66-2ubuntu2.1 apache2-utils - 2.4.66-2ubuntu2.1 No subscription required High CVE-2026-33007 CVE-2026-34059 CVE-2026-23918 CVE-2026-33523 CVE-2026-24072 CVE-2026-34032 CVE-2026-28780 CVE-2026-29168 CVE-2026-29169 CVE-2026-33006 CVE-2026-33857 USN-8240-1 -- Swish-e vulnerabilities Ubuntu 26.04 LTS It was discovered that Expat, vendored in Swish-e incorrectly handled certain files. An attacker could possibly use this issue to cause a crash or execute arbitrary code. (CVE-2022-25235, CVE-2022-25236) Update Instructions: Run `sudo pro fix USN-8240-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: swish-e - 2.4.7-7.1ubuntu0.1~esm1 swish-e-dev - 2.4.7-7.1ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro High CVE-2022-25236 CVE-2022-25235 USN-8246-1 -- Vim vulnerabilities Ubuntu 26.04 LTS Michał Majchrowicz discovered that Vim’s zip plugin could overwrite arbitrary files. An attacker could possibly use this issue to delete sensitive data or execute arbitrary code. This issue only affected Ubuntu 26.04 LTS. (CVE-2026-35177) It was discovered that Vim’s netbeans interface did not properly sanitize certain strings. An attacker could possibly use this issue to execute arbitrary commands. This issue only affected Ubuntu 26.04 LTS. (CVE-2026-39881) It was discovered that Vim did not properly handle backticks in tag filenames. An attacker could possibly use this issue to execute arbitrary commands. (CVE-2026-41411) Update Instructions: Run `sudo pro fix USN-8246-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: vim - 2:9.1.2141-1ubuntu4.1 vim-common - 2:9.1.2141-1ubuntu4.1 vim-doc - 2:9.1.2141-1ubuntu4.1 vim-gtk3 - 2:9.1.2141-1ubuntu4.1 vim-gui-common - 2:9.1.2141-1ubuntu4.1 vim-motif - 2:9.1.2141-1ubuntu4.1 vim-nox - 2:9.1.2141-1ubuntu4.1 vim-runtime - 2:9.1.2141-1ubuntu4.1 vim-tiny - 2:9.1.2141-1ubuntu4.1 xxd - 2:9.1.2141-1ubuntu4.1 No subscription required Medium CVE-2026-41411 CVE-2026-39881 CVE-2026-35177 USN-8250-1 -- Little CMS vulnerability Ubuntu 26.04 LTS It was discovered that Little CMS incorrectly handled certain malformed ICC profiles. An attacker could possibly use this issue to cause Little CMS to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-8250-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: liblcms2-2 - 2.17-1ubuntu0.2 liblcms2-dev - 2.17-1ubuntu0.2 liblcms2-utils - 2.17-1ubuntu0.2 No subscription required Medium CVE-2026-42798 USN-8252-1 -- OpenJPEG vulnerability Ubuntu 26.04 LTS It was discovered that OpenJPEG did not properly handle memory when encoding image files. An attacker could use this issue to cause OpenJPEG to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-8252-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libopenjp2-7 - 2.5.4-1ubuntu0.1 libopenjp2-7-dev - 2.5.4-1ubuntu0.1 libopenjp2-tools - 2.5.4-1ubuntu0.1 libopenjpip-dec-server - 2.5.4-1ubuntu0.1 libopenjpip-viewer - 2.5.4-1ubuntu0.1 libopenjpip7 - 2.5.4-1ubuntu0.1 openjpeg-doc - 2.5.4-1ubuntu0.1 No subscription required Medium CVE-2026-6192 USN-8253-1 -- Postfix vulnerability Ubuntu 26.04 LTS Kamil Frankowicz discovered that Postfix incorrectly handled certain enhanced status codes. A remote attacker could possibly use this issue to cause Postfix to crash, resulting in a denial of service. Update Instructions: Run `sudo pro fix USN-8253-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: postfix - 3.10.6-4ubuntu2.1 postfix-cdb - 3.10.6-4ubuntu2.1 postfix-doc - 3.10.6-4ubuntu2.1 postfix-ldap - 3.10.6-4ubuntu2.1 postfix-lmdb - 3.10.6-4ubuntu2.1 postfix-mongodb - 3.10.6-4ubuntu2.1 postfix-mysql - 3.10.6-4ubuntu2.1 postfix-pcre - 3.10.6-4ubuntu2.1 postfix-pgsql - 3.10.6-4ubuntu2.1 postfix-sqlite - 3.10.6-4ubuntu2.1 No subscription required Medium CVE-2026-43964 USN-8256-1 -- opam vulnerability Ubuntu 26.04 LTS Andrew Nesbitt discovered that opam did not properly validate file destination paths in package install files. An attacker could use this issue to bypass sandbox protections and write files to arbitrary locations, possibly leading to arbitrary code execution. Update Instructions: Run `sudo pro fix USN-8256-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: opam - 2.5.0-1ubuntu0.1~esm1 opam-doc - 2.5.0-1ubuntu0.1~esm1 opam-installer - 2.5.0-1ubuntu0.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2026-41082 USN-8259-1 -- OpenEXR vulnerabilities Ubuntu 26.04 LTS Quang Luong discovered that OpenEXR incorrectly handled sample count accumulation when processing deep scan line image files. An attacker could possibly use this issue to cause OpenEXR to crash, resulting in a denial of service, or execute arbitrary code. (CVE-2026-27622) It was discovered that OpenEXR had an integer overflow in the PXR24 decoder. An attacker could possibly use this issue to cause OpenEXR to crash, resulting in a denial of service, or execute arbitrary code. This issue only affected Ubuntu 24.04 LTS and Ubuntu 26.04 LTS. (CVE-2026-34380) Quang Luong discovered that OpenEXR had a signed integer overflow in the PIZ decoder. An attacker could possibly use this issue to cause OpenEXR to crash, resulting in a denial of service, or execute arbitrary code. This issue only affected Ubuntu 24.04 LTS and Ubuntu 26.04 LTS. (CVE-2026-34588) Update Instructions: Run `sudo pro fix USN-8259-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libopenexr-3-1-30 - 3.1.13-2ubuntu0.26.04.1~esm1 libopenexr-dev - 3.1.13-2ubuntu0.26.04.1~esm1 libopenexr-doc - 3.1.13-2ubuntu0.26.04.1~esm1 openexr - 3.1.13-2ubuntu0.26.04.1~esm1 Available with Ubuntu Pro: https://ubuntu.com/pro Medium CVE-2026-27622 CVE-2026-34380 CVE-2026-34588 USN-8268-1 -- Dnsmasq vulnerabilities Ubuntu 26.04 LTS Andrew S. Fasano, Royce M, and Hugo Martinez Ray discovered that Dnsmasq did not allocate the necessary space to store domain names in some contexts. An attacker could possibly use this issue to write out-of-bounds, and could cause a denial of service or execute arbitrary code. (CVE-2026-2291) Royce M discovered that Dnsmasq could loop infinitely due to erroneously missing the window header. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, Ubuntu 25.10, and Ubuntu 26.04 LTS. (CVE-2026-4890) Royce M discovered that a maliciously crafted packet could cause Dnsmasq to report a negative length. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, Ubuntu 25.10, and Ubuntu 26.04 LTS. (CVE-2026-4891) Royce M and Asim Viladi Oglu Manizada discovered that certain configurations of Dnsmasq could write over the DHCPv6 CLID buffer within a privileged helper. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2026-4892) Royce M discovered that certain configurations of Dnsmasq could bypass internal bounds checks. An attacker could possibly use this issue to permit malformed packets, and could cause a denial of service. (CVE-2026-4893) Hugo Martinez discovered that Dnsmasq did not check the rdlen element of a record. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, Ubuntu 25.10, and Ubuntu 26.04 LTS. (CVE-2026-5172) Update Instructions: Run `sudo pro fix USN-8268-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: dnsmasq - 2.92-1ubuntu0.2 dnsmasq-base - 2.92-1ubuntu0.2 dnsmasq-base-lua - 2.92-1ubuntu0.2 dnsmasq-utils - 2.92-1ubuntu0.2 No subscription required Medium CVE-2026-4890 CVE-2026-4891 CVE-2026-2291 CVE-2026-4892 CVE-2026-5172 CVE-2026-4893 USN-8269-1 -- Avahi vulnerabilities Ubuntu 26.04 LTS It is discovered that Avahi incorrectly handled crafted input. A remote attacker could possibly use this issue to crash the program, resulting in a denial of service. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2026-24401) Guillaume Meunier discovered that Avahi incorrectly handled crafted input. An attacker could possibly use this issue to crash the program, resulting in a denial of service. (CVE-2026-34933) Update Instructions: Run `sudo pro fix USN-8269-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: avahi-autoipd - 0.8-18ubuntu1.1 avahi-daemon - 0.8-18ubuntu1.1 avahi-discover - 0.8-18ubuntu1.1 avahi-dnsconfd - 0.8-18ubuntu1.1 avahi-ui-utils - 0.8-18ubuntu1.1 avahi-utils - 0.8-18ubuntu1.1 gir1.2-avahi-0.6 - 0.8-18ubuntu1.1 libavahi-client-dev - 0.8-18ubuntu1.1 libavahi-client3 - 0.8-18ubuntu1.1 libavahi-common-data - 0.8-18ubuntu1.1 libavahi-common-dev - 0.8-18ubuntu1.1 libavahi-common3 - 0.8-18ubuntu1.1 libavahi-compat-libdnssd-dev - 0.8-18ubuntu1.1 libavahi-compat-libdnssd1 - 0.8-18ubuntu1.1 libavahi-core-dev - 0.8-18ubuntu1.1 libavahi-core7 - 0.8-18ubuntu1.1 libavahi-glib-dev - 0.8-18ubuntu1.1 libavahi-glib1 - 0.8-18ubuntu1.1 libavahi-gobject-dev - 0.8-18ubuntu1.1 libavahi-gobject0 - 0.8-18ubuntu1.1 libavahi-ui-gtk3-0 - 0.8-18ubuntu1.1 libavahi-ui-gtk3-dev - 0.8-18ubuntu1.1 python3-avahi - 0.8-18ubuntu1.1 No subscription required Medium CVE-2026-24401 CVE-2026-34933 USN-8270-1 -- Exim vulnerability Ubuntu 26.04 LTS It was discovered that Exim incorrectly handled BDAT body parsing. A remote attacker could use this issue to cause Exim to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-8270-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: exim4 - 4.99.1-1ubuntu1.2 exim4-base - 4.99.1-1ubuntu1.2 exim4-config - 4.99.1-1ubuntu1.2 exim4-daemon-heavy - 4.99.1-1ubuntu1.2 exim4-daemon-light - 4.99.1-1ubuntu1.2 exim4-dev - 4.99.1-1ubuntu1.2 eximon4 - 4.99.1-1ubuntu1.2 No subscription required None https://launchpad.net/bugs/2152202 USN-8271-1 -- nginx vulnerability Ubuntu 26.04 LTS It was discovered that the nginx ngx_http_rewrite_module component incorrectly handled certain rewrite directives. A remote attacker could use this issue to cause nginx to crash, resulting in a denial of service, or possibly execute arbitrary code. Update Instructions: Run `sudo pro fix USN-8271-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libnginx-mod-http-geoip - 1.28.3-2ubuntu1.1 libnginx-mod-http-image-filter - 1.28.3-2ubuntu1.1 libnginx-mod-http-perl - 1.28.3-2ubuntu1.1 libnginx-mod-http-xslt-filter - 1.28.3-2ubuntu1.1 libnginx-mod-mail - 1.28.3-2ubuntu1.1 libnginx-mod-stream - 1.28.3-2ubuntu1.1 libnginx-mod-stream-geoip - 1.28.3-2ubuntu1.1 nginx - 1.28.3-2ubuntu1.1 nginx-common - 1.28.3-2ubuntu1.1 nginx-core - 1.28.3-2ubuntu1.1 nginx-dev - 1.28.3-2ubuntu1.1 nginx-doc - 1.28.3-2ubuntu1.1 nginx-extras - 1.28.3-2ubuntu1.1 nginx-full - 1.28.3-2ubuntu1.1 nginx-light - 1.28.3-2ubuntu1.1 No subscription required High CVE-2026-42945 USN-8282-1 -- Unbound vulnerabilities Ubuntu 26.04 LTS Andrew Griffiths discovered that Unbound did not properly handle certain DNSCrypt packets. A remote attacker could possibly use this issue to cause Unbound to crash, resulting in a denial of service. (CVE-2026-32792) Qifan Zhang discovered that Unbound incorrectly handled DNSSEC validation in certain situations. A remote attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 24.04 LTS, Ubuntu 25.10, and Ubuntu 26.04 LTS. (CVE-2026-33278) Qifan Zhang discovered that Unbound incorrectly handled certain ghost domain name records. A remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 24.04 LTS, Ubuntu 25.10, and Ubuntu 26.04 LTS. (CVE-2026-40622) Qifan Zhang discovered that Unbound did not properly limit processing of long EDNS option lists. A remote attacker could possibly use this issue to cause Unbound to use excessive resources, leading to a denial of service. (CVE-2026-41292) Qifan Zhang discovered that Unbound incorrectly handled jostle logic under certain circumstances. A remote attacker could possibly use this issue to cause Unbound to use excessive resources, leading to a denial of service. (CVE-2026-42534) Qifan Zhang discovered that Unbound did not properly bound NSEC3 hash calculations. A remote attacker could possibly use this issue to cause Unbound to use excessive resources, leading to a denial of service. (CVE-2026-42923) Qifan Zhang discovered that Unbound incorrectly handled multiple EDNS options in certain situations. A remote attacker could possibly use this issue to cause Unbound to crash, resulting in a denial of service, or execute arbitrary code. This issue only affected Ubuntu 24.04 LTS, Ubuntu 25.10, and Ubuntu 26.04 LTS. (CVE-2026-42944) Qifan Zhang discovered that Unbound incorrectly handled DNSSEC validation of malicious content. A remote attacker could possibly use this issue to cause Unbound to crash, resulting in a denial of service. (CVE-2026-42959) TaoFei Guo, Yang Luo, and JianJun Chen discovered that Unbound incorrectly handled delegation processing in certain situations. A remote attacker could possibly use this issue to poison the DNS cache and obtain sensitive information. (CVE-2026-42960) Qifan Zhang discovered that Unbound did not properly bound name compression in certain cases. A remote attacker could possibly use this issue to cause Unbound to use excessive resources, leading to a denial of service. (CVE-2026-44390) Qifan Zhang discovered that Unbound had a use-after-free issue in RPZ handling. A remote attacker could possibly use this issue to cause Unbound to crash, resulting in a denial of service, or execute arbitrary code. This issue only affected Ubuntu 24.04 LTS, Ubuntu 25.10, and Ubuntu 26.04 LTS. (CVE-2026-44608) Update Instructions: Run `sudo pro fix USN-8282-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libunbound-dev - 1.24.2-1ubuntu2.1 libunbound8 - 1.24.2-1ubuntu2.1 python3-unbound - 1.24.2-1ubuntu2.1 unbound - 1.24.2-1ubuntu2.1 unbound-anchor - 1.24.2-1ubuntu2.1 unbound-host - 1.24.2-1ubuntu2.1 No subscription required High CVE-2026-40622 CVE-2026-33278 CVE-2026-42923 CVE-2026-44390 CVE-2026-42944 CVE-2026-41292 CVE-2026-42959 CVE-2026-42960 CVE-2026-42534 CVE-2026-32792 CVE-2026-44608 USN-8283-1 -- rsync vulnerabilities Ubuntu 26.04 LTS Calum Hutton discovered that rsync contained a heap-based out-of-bounds read when handling file transfers. A remote attacker with read access to an rsync server could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, and Ubuntu 25.10. (CVE-2025-10158) Batuhan Sancak, Damien Neil, and Michael Stapelberg discovered that rsync daemons configured without chroot protection were exposed to a race condition on parent path components. A local attacker with write access to a module could possibly use this issue to overwrite files, obtain sensitive information, or escalate privileges. (CVE-2026-29518) It was discovered that rsync did not properly validate a length value while sorting extended attributes. An attacker could possibly use this issue to cause a denial of service. (CVE-2026-41035) It was discovered that rsync performed reverse-DNS lookups after chrooting in some daemon configurations. A remote attacker could possibly use this issue to bypass hostname-based access controls and access network services. (CVE-2026-43617) Omar Elsayed discovered that rsync did not properly check for integer overflows while decoding compressed tokens. A remote attacker could possibly use this issue to obtain sensitive information. (CVE-2026-43618) Andrew Tridgell discovered that rsync did not fully fix a symlink race condition in path-based system calls for daemons configured without chroot protection. A local attacker could possibly use this issue to overwrite files, obtain sensitive information, or escalate privileges. (CVE-2026-43619) Pratham Gupta discovered that rsync did not properly validate an index while processing file lists. A remote attacker could possibly use this issue to cause rsync to crash, resulting in a denial of service. (CVE-2026-43620) Michal Ruprich discovered that rsync contained an off-by-one error while handling HTTP proxy responses. An attacker able to intercept network communications or a malicious proxy server could possibly use this issue to cause a denial of service. (CVE-2026-45232) Update Instructions: Run `sudo pro fix USN-8283-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: rsync - 3.4.1+ds1-7ubuntu0.2 No subscription required High CVE-2026-43619 CVE-2026-43617 CVE-2026-43620 CVE-2025-10158 CVE-2026-29518 CVE-2026-43618 CVE-2026-41035 CVE-2026-45232 USN-8284-1 -- GnuTLS vulnerabilities Ubuntu 26.04 LTS Joshua Rogers discovered that GnuTLS did not properly handle malformed DTLS handshake fragments in certain cases. A remote attacker could possibly use this issue to obtain sensitive information, or cause a denial of service. (CVE-2026-33845) Haruto Kimura, Oscar Reparaz, and Zou Dikai discovered that GnuTLS did not properly validate DTLS handshake fragment lengths in certain cases. A remote attacker could possibly use this issue to cause GnuTLS to crash, resulting in a denial of service, or execute arbitrary code. (CVE-2026-33846) Oleh Konko and Joshua Rogers discovered that GnuTLS did not properly validate OCSP responses in certain cases. A remote attacker could possibly use this issue to bypass certificate revocation checks, leading to a machine-in-the-middle attack. (CVE-2026-3832) Oleh Konko and Joshua Rogers discovered that GnuTLS did not properly handle case-insensitive name constraints in certain cases. A remote attacker could possibly use this issue to bypass certificate validation, leading to a machine-in-the-middle attack. (CVE-2026-3833) Joshua Rogers discovered that GnuTLS did not properly order DTLS packets with duplicate sequence numbers in certain cases. A remote attacker could possibly use this issue to cause GnuTLS to crash, resulting in a denial of service. (CVE-2026-42009) Joshua Rogers discovered that GnuTLS did not properly handle usernames containing NUL characters in certain RSA-PSK configurations. A remote attacker could possibly use this issue to bypass authentication and gain unintended access to services. (CVE-2026-42010) Haruto Kimura discovered that GnuTLS did not properly apply permitted name constraints in certain certificate validation paths. A remote attacker could possibly use this issue to bypass certificate validation, leading to a machine-in-the-middle attack. (CVE-2026-42011) Oleh Konko discovered that GnuTLS incorrectly fell back to Common Name checks for certain URI and SRV subject alternative names. A remote attacker could possibly use this issue to bypass certificate validation, leading to a machine-in-the-middle attack. (CVE-2026-42012) Haruto Kimura and Joshua Rogers discovered that GnuTLS incorrectly fell back to Common Name checks when subject alternative names were oversized. A remote attacker could possibly use this issue to bypass certificate validation, leading to a machine-in-the-middle attack. (CVE-2026-42013) Luigino Camastra and Joshua Rogers discovered that GnuTLS had a use-after-free issue when changing PKCS#11 token security officer PINs in certain cases. An attacker could possibly use this issue to cause GnuTLS to crash, resulting in a denial of service, or execute arbitrary code. (CVE-2026-42014) Zou Dikai discovered that GnuTLS did not properly validate PKCS#12 bag sizes in certain cases. An attacker could possibly use this issue to cause GnuTLS to crash, resulting in a denial of service, or execute arbitrary code. (CVE-2026-42015) Joshua Rogers discovered that GnuTLS did not properly handle very short premaster secrets in certain RSA key exchange cases with PKCS#11-backed server keys. A remote attacker could possibly use this issue to obtain sensitive information. (CVE-2026-5260) Doria Tang discovered that GnuTLS did not perform PKCS#7 padding checks in constant time in certain cases. A remote attacker could possibly use this issue to obtain sensitive information. This issue only affected Ubuntu 24.04 LTS, Ubuntu 25.10, and Ubuntu 26.04 LTS. (CVE-2026-5419) Update Instructions: Run `sudo pro fix USN-8284-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: gnutls-bin - 3.8.12-2ubuntu1.1 gnutls-doc - 3.8.12-2ubuntu1.1 libgnutls-dane0t64 - 3.8.12-2ubuntu1.1 libgnutls-openssl27t64 - 3.8.12-2ubuntu1.1 libgnutls28-dev - 3.8.12-2ubuntu1.1 libgnutls30t64 - 3.8.12-2ubuntu1.1 No subscription required Medium CVE-2026-3832 CVE-2026-5260 CVE-2026-33846 CVE-2026-3833 CVE-2026-42012 CVE-2026-42014 CVE-2026-5419 CVE-2026-33845 CVE-2026-42015 CVE-2026-42009 CVE-2026-42010 CVE-2026-42013 CVE-2026-42011 USN-8286-1 -- OpenVPN vulnerabilities Ubuntu 26.04 LTS Guannan Wang, Zhanpeng Liu, Guancheng Li, and Emma Reuter discovered that OpenVPN incorrectly handled suitably malformed packets with valid tls-crypt-v2 keys. An attacker could possibly use this issue to cause OpenVPN to crash, resulting in a denial of service. (CVE-2026-35058) Guannan Wang, Zhanpeng Liu, and Guancheng Li discovered that OpenVPN had a race condition in the TLS handshake process that could leak packet data from a previous handshake under certain circumstances. An attacker could possibly use this issue to obtain sensitive information. (CVE-2026-40215) Update Instructions: Run `sudo pro fix USN-8286-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: openvpn - 2.7.0-1ubuntu1.1 No subscription required Medium CVE-2026-35058 CVE-2026-40215 USN-8288-1 -- Bubblewrap vulnerability Ubuntu 26.04 LTS It was discovered that Bubblewrap incorrectly handled the sandbox setup phase when installed in setuid mode. A local attacker could possibly use this issue to bypass sandbox restrictions. Update Instructions: Run `sudo pro fix USN-8288-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: bubblewrap - 0.11.1-1ubuntu0.1 No subscription required Medium CVE-2026-41163 USN-8292-1 -- libarchive vulnerabilities Ubuntu 26.04 LTS It was discovered that libarchive incorrectly handled certain RAR archives. An attacker could possibly use this issue to cause an out-of-bounds read via a crafted RAR archive, leading to sensitive memory disclosure. (CVE-2026-4424) It was discovered that libarchive incorrectly handled certain ISO files. An attacker could possibly use this issue to cause incorrect memory allocation via a crafted ISO file, leading to a denial of service. (CVE-2026-4426) It was discovered that libarchive incorrectly handled block pointer allocation in zisofs on 32-bit systems. An attacker could possibly use this issue to cause a heap buffer overflow via a crafted ISO9660 image, possibly leading to arbitrary code execution. (CVE-2026-5121) Update Instructions: Run `sudo pro fix USN-8292-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libarchive-dev - 3.8.5-1ubuntu2.1 libarchive-tools - 3.8.5-1ubuntu2.1 libarchive13t64 - 3.8.5-1ubuntu2.1 No subscription required Medium CVE-2026-4424 CVE-2026-4426 CVE-2026-5121 USN-8293-1 -- Bind vulnerabilities Ubuntu 26.04 LTS Vitaly Simonovich discovered that Bind could exhaust memory during GSS-API TKEY negotiation. A remote attacker could possibly use this issue to cause Bind to use excessive resources, leading to a denial of service. (CVE-2026-3039) Shuhan Zhang discovered that Bind incorrectly handled self-pointed glue records. A remote attacker could possibly use this issue to use Bind in denial of service amplification attacks against other systems. (CVE-2026-3592) Naresh Kandula Parmar discovered that Bind incorrectly handled memory in the DNS-over-HTTPS implementation. A remote attacker could possibly use this issue to cause Bind to crash, resulting in a denial of service, or execute arbitrary code. This issue only affected Ubuntu 25.10 and Ubuntu 26.04 LTS. (CVE-2026-3593) It was discovered that Bind incorrectly handled DNS messages whose class was not IN. A remote attacker could possibly use this issue to cause Bind to crash, resulting in a denial of service. (CVE-2026-5946) Naoki Wakamatsu discovered that Bind incorrectly handled SIG(0) validation during a query flood. A remote attacker could possibly use this issue to cause Bind to crash, resulting in a denial of service. This issue only affected Ubuntu 25.10 and Ubuntu 26.04 LTS. (CVE-2026-5947) Billy Baraja discovered that Bind had an unbounded resend loop in the resolver. A remote attacker could possibly use this issue to cause Bind to use excessive resources, leading to a denial of service. (CVE-2026-5950) Update Instructions: Run `sudo pro fix USN-8293-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: bind9 - 1:9.20.18-1ubuntu2.1 bind9-dev - 1:9.20.18-1ubuntu2.1 bind9-dnsutils - 1:9.20.18-1ubuntu2.1 bind9-doc - 1:9.20.18-1ubuntu2.1 bind9-host - 1:9.20.18-1ubuntu2.1 bind9-libs - 1:9.20.18-1ubuntu2.1 bind9-utils - 1:9.20.18-1ubuntu2.1 No subscription required Medium CVE-2026-3592 CVE-2026-5947 CVE-2026-5946 CVE-2026-5950 CVE-2026-3593 CVE-2026-3039 USN-8294-1 -- PostgreSQL vulnerabilities Ubuntu 26.04 LTS It was discovered that PostgreSQL did not correctly enforce authorization for CREATE TYPE. An attacker could possibly use this issue to execute arbitrary SQL functions. (CVE-2026-6472) It was discovered that PostgreSQL incorrectly handled large user input in multiple server features. An attacker could possibly use this issue to cause PostgreSQL to crash, resulting in a denial of service, or execute arbitrary code. (CVE-2026-6473) It was discovered that PostgreSQL incorrectly handled format strings in the timeofday() function. An attacker could possibly use this issue to obtain sensitive information. (CVE-2026-6474) It was discovered that PostgreSQL incorrectly followed symbolic links in pg_basebackup and pg_rewind. An attacker could possibly use this issue to overwrite local files and execute arbitrary code. (CVE-2026-6475) It was discovered that PostgreSQL had an SQL injection vulnerability in pg_createsubscriber. An attacker could possibly use this issue to execute arbitrary SQL as a superuser. This issue only affected Ubuntu 25.10 and Ubuntu 26.04 LTS. (CVE-2026-6476) It was discovered that PostgreSQL used an unsafe libpq function in large object operations. An attacker could possibly use this issue to overwrite client memory and execute arbitrary code. (CVE-2026-6477) It was discovered that PostgreSQL did not compare MD5-hashed passwords in constant time. An attacker could possibly use this issue to obtain sensitive information. (CVE-2026-6478) It was discovered that PostgreSQL had uncontrolled recursion during SSL and GSS negotiation. An attacker could possibly use this issue to cause a denial of service. (CVE-2026-6479) It was discovered that PostgreSQL incorrectly handled array length mismatches in pg_restore_attribute_stats(). An attacker could possibly use this issue to obtain sensitive information. This issue only affected Ubuntu 26.04 LTS. (CVE-2026-6575) It was discovered that PostgreSQL had a stack buffer overflow in the refint module. An attacker could use this issue to cause PostgreSQL to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2026-6637) It was discovered that PostgreSQL had an SQL injection vulnerability in logical replication REFRESH PUBLICATION. An attacker could possibly use this issue to execute arbitrary SQL. This issue only affected Ubuntu 24.04 LTS, Ubuntu 25.10, and Ubuntu 26.04 LTS. (CVE-2026-6638) Update Instructions: Run `sudo pro fix USN-8294-1` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libecpg-compat3 - 18.4-0ubuntu0.26.04.1 libecpg-dev - 18.4-0ubuntu0.26.04.1 libecpg6 - 18.4-0ubuntu0.26.04.1 libpgtypes3 - 18.4-0ubuntu0.26.04.1 libpq-dev - 18.4-0ubuntu0.26.04.1 libpq-oauth - 18.4-0ubuntu0.26.04.1 libpq5 - 18.4-0ubuntu0.26.04.1 postgresql-18 - 18.4-0ubuntu0.26.04.1 postgresql-18-jit - 18.4-0ubuntu0.26.04.1 postgresql-client-18 - 18.4-0ubuntu0.26.04.1 postgresql-doc-18 - 18.4-0ubuntu0.26.04.1 postgresql-plperl-18 - 18.4-0ubuntu0.26.04.1 postgresql-plpython3-18 - 18.4-0ubuntu0.26.04.1 postgresql-pltcl-18 - 18.4-0ubuntu0.26.04.1 postgresql-server-dev-18 - 18.4-0ubuntu0.26.04.1 No subscription required Medium CVE-2026-6638 CVE-2026-6476 CVE-2026-6477 CVE-2026-6479 CVE-2026-6475 CVE-2026-6474 CVE-2026-6478 CVE-2026-6472 CVE-2026-6473 CVE-2026-6637 CVE-2026-6575 /etc/lsb-release ^[\s\S]*DISTRIB_CODENAME=([a-z]+)$ 1 unix resolute 0:2.1.1-0.1ubuntu0.26.04.1 1:2022.10.3-5ubuntu1 0:1.3.4-3ubuntu1 0:6.0.4-1ubuntu3 0:6.5.4-0.1ubuntu0.1 0:1.8.1-4ubuntu2 0:1.4.4+dfsg-0ubuntu0.26.04.1 0:3.2.9-1ubuntu2.1 0:2.17-1ubuntu0.1 0:12.1.1-2ubuntu1.1 0:0.6.1ubuntu0.1 0:3.9.2-1ubuntu0.1~esm1 0:10.0.107-0ubuntu1~26.04.1 0:10.0.107-10.0.7-0ubuntu1~26.04.1 0:10.0.7-0ubuntu1~26.04.1 0:5.11.0-3ubuntu0.1 1:10.2p1-2ubuntu3.2 0:3.26.1-0.4ubuntu0.1~esm1 0:8.18.0-1ubuntu2.1 0:4.99.1-1ubuntu1.1 0:4.9-2ubuntu1 0:29.1.3-0ubuntu4.1 0:3.2.12-1ubuntu0.1~esm1 3:5.2.9-0ubuntu4.1 0:1.68.0-2ubuntu0.1 0:1.3.10-3ubuntu0.1 0:2.52.3-0ubuntu0.26.04.2 0:0.12.10+~0.17.1-3ubuntu0.1 0:2.4.66-2ubuntu2.1 0:2.4.7-7.1ubuntu0.1~esm1 2:9.1.2141-1ubuntu4.1 0:2.17-1ubuntu0.2 0:2.5.4-1ubuntu0.1 0:3.10.6-4ubuntu2.1 0:2.5.0-1ubuntu0.1~esm1 0:3.1.13-2ubuntu0.26.04.1~esm1 0:2.92-1ubuntu0.2 0:0.8-18ubuntu1.1 0:4.99.1-1ubuntu1.2 0:1.28.3-2ubuntu1.1 0:1.24.2-1ubuntu2.1 0:3.4.1+ds1-7ubuntu0.2 0:3.8.12-2ubuntu1.1 0:2.7.0-1ubuntu1.1 0:0.11.1-1ubuntu0.1 0:3.8.5-1ubuntu2.1 1:9.20.18-1ubuntu2.1 0:18.4-0ubuntu0.26.04.1 ruby-rack-session libntfs-3g89t64 ntfs-3g ntfs-3g-dev gir1.2-packagekitglib-1.0 gstreamer1.0-packagekit libpackagekit-glib2-18 libpackagekit-glib2-dev packagekit packagekit-command-not-found packagekit-docs packagekit-gtk3-module charon-cmd charon-systemd libcharon-extauth-plugins libcharon-extra-plugins libstrongswan libstrongswan-extra-plugins libstrongswan-standard-plugins strongswan strongswan-charon strongswan-libcharon strongswan-nm strongswan-pki strongswan-starter strongswan-swanctl python-tornado-doc python3-tornado jq libjq-dev libjq1 clamav clamav-base clamav-daemon clamav-doc clamav-docs clamav-freshclam clamav-milter clamav-testfiles clamdscan libclamav-dev libclamav12 haproxy haproxy-doc vim-haproxy liblcms2-2 liblcms2-dev liblcms2-utils python-pil-doc python3-pil python3-pil.imagetk authd python3-nltk dotnet-sdk-10.0 dotnet-sdk-10.0-source-built-artifacts dotnet-sdk-aot-10.0 dotnet-sdk-dbg-10.0 dotnet-templates-10.0 dotnet10 aspnetcore-runtime-10.0 aspnetcore-runtime-dbg-10.0 aspnetcore-targeting-pack-10.0 dotnet-apphost-pack-10.0 dotnet-host-10.0 dotnet-hostfxr-10.0 dotnet-runtime-10.0 dotnet-runtime-dbg-10.0 dotnet-targeting-pack-10.0 python3-ujson openssh-client openssh-client-gssapi openssh-server openssh-server-gssapi openssh-sftp-server openssh-tests ssh ssh-askpass-gnome python3-marshmallow python3-marshmallow-doc curl libcurl3t64-gnutls libcurl4-doc libcurl4-gnutls-dev libcurl4-openssl-dev libcurl4t64 exim4 exim4-base exim4-config exim4-daemon-heavy exim4-daemon-light exim4-dev eximon4 sed docker-doc docker.io python3-dynaconf python-django-doc python3-django libnghttp2-14 libnghttp2-dev libnghttp2-doc nghttp2 nghttp2-client nghttp2-proxy nghttp2-server python-mako-doc python3-mako gir1.2-javascriptcoregtk-4.1 gir1.2-javascriptcoregtk-6.0 gir1.2-webkit-6.0 gir1.2-webkit2-4.1 libjavascriptcoregtk-4.1-0 libjavascriptcoregtk-4.1-dev libjavascriptcoregtk-6.0-1 libjavascriptcoregtk-6.0-dev libjavascriptcoregtk-bin libwebkit2gtk-4.1-0 libwebkit2gtk-4.1-dev libwebkitgtk-6.0-4 libwebkitgtk-6.0-dev libwebkitgtk-doc webkitgtk-webdriver editorconfig editorconfig-doc libeditorconfig-dev libeditorconfig0 apache2 apache2-bin apache2-data apache2-dev apache2-doc apache2-ssl-dev apache2-suexec-custom apache2-suexec-pristine apache2-utils swish-e swish-e-dev vim vim-common vim-doc vim-gtk3 vim-gui-common vim-motif vim-nox vim-runtime vim-tiny xxd liblcms2-2 liblcms2-dev liblcms2-utils libopenjp2-7 libopenjp2-7-dev libopenjp2-tools libopenjpip-dec-server libopenjpip-viewer libopenjpip7 openjpeg-doc postfix postfix-cdb postfix-doc postfix-ldap postfix-lmdb postfix-mongodb postfix-mysql postfix-pcre postfix-pgsql postfix-sqlite opam opam-doc opam-installer libopenexr-3-1-30 libopenexr-dev libopenexr-doc openexr dnsmasq dnsmasq-base dnsmasq-base-lua dnsmasq-utils avahi-autoipd avahi-daemon avahi-discover avahi-dnsconfd avahi-ui-utils avahi-utils gir1.2-avahi-0.6 libavahi-client-dev libavahi-client3 libavahi-common-data libavahi-common-dev libavahi-common3 libavahi-compat-libdnssd-dev libavahi-compat-libdnssd1 libavahi-core-dev libavahi-core7 libavahi-glib-dev libavahi-glib1 libavahi-gobject-dev libavahi-gobject0 libavahi-ui-gtk3-0 libavahi-ui-gtk3-dev python3-avahi exim4 exim4-base exim4-config exim4-daemon-heavy exim4-daemon-light exim4-dev eximon4 libnginx-mod-http-geoip libnginx-mod-http-image-filter libnginx-mod-http-perl libnginx-mod-http-xslt-filter libnginx-mod-mail libnginx-mod-stream libnginx-mod-stream-geoip nginx nginx-common nginx-core nginx-dev nginx-doc nginx-extras nginx-full nginx-light libunbound-dev libunbound8 python3-unbound unbound unbound-anchor unbound-host rsync gnutls-bin gnutls-doc libgnutls-dane0t64 libgnutls-openssl27t64 libgnutls28-dev libgnutls30t64 openvpn bubblewrap libarchive-dev libarchive-tools libarchive13t64 bind9 bind9-dev bind9-dnsutils bind9-doc bind9-host bind9-libs bind9-utils libecpg-compat3 libecpg-dev libecpg6 libpgtypes3 libpq-dev libpq-oauth libpq5 postgresql-18 postgresql-18-jit postgresql-client-18 postgresql-doc-18 postgresql-plperl-18 postgresql-plpython3-18 postgresql-pltcl-18 postgresql-server-dev-18