Tuesday, March 31, 2026

Fedora 44 Final Freeze Is Now In Effect

Hi all,

Today, 2026-03-31, is an important day on the Fedora Linux 44 schedule [1], with significant cut-offs.

Today we have the Final Freeze [2] which starts at 14:00 UTC. This means that only packages fixing accepted blocker or freeze exception bugs [3][4][5] will be marked as 'stable' and included in the Final composes. Other builds will remain in updates-testing until the Final release is approved. At that point, the final freeze is lifted and packages can move to the 'updates' repository. Pending updates will be pushed before final release as zero day updates.

Regards,
Patrik Polakovic
Fedora Release Engineering

[1] https://fedorapeople.org/groups/schedule/f-44/f-44-key-tasks.html
[2] https://fedoraproject.org/wiki/Milestone_freezes
[3] https://fedoraproject.org/wiki/QA:SOP_blocker_bug_process
[4] https://fedoraproject.org/wiki/QA:SOP_freeze_exception_bug_process
[5] https://qa.fedoraproject.org/blockerbugs/milestone/f44/final/buglist

[USN-8136-1] Dovecot vulnerabilities

==========================================================================
Ubuntu Security Notice USN-8136-1
March 31, 2026

dovecot vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in Dovecot.

Software Description:
- dovecot: IMAP and POP3 email server

Details:

It was discovered that Dovecot incorrectly handled invalid base64 SASL data.
An attacker could possibly use this issue to cause a denial of service. This
issue only affected Ubuntu 25.10. (CVE-2025-59028)

It was discovered that Dovecot script decode2text.sh incorrectly handled zip
files. An attacker could possibly use this issue to obtain sensitive
information. (CVE-2025-59031)

It was discovered that Dovecot incorrectly handled certain AUTHENTICATE
requests. An attacker could possibly use this issue to cause a denial of
service. (CVE-2025-59032)

It was discovered that Dovecot incorrectly handled certain SQL based
authentication. An attacker could possibly use this issue to bypass
authentication. This issue only affected Ubuntu 25.10. (CVE-2026-24031)

It was discovered that Dovecot incorrectly handled certain LDAP based
authentication. An attacker could possibly use this issue to bypass
restrictions and allow probing of LDAP structure. This issue only affected
Ubuntu 25.10. (CVE-2026-27860)

It was discovered that Dovecot is vulnerable to replay attack under
certain conditions. An attacker could possibly use this issue to bypass
authentication. (CVE-2026-27855)

It was discovered that Dovecot is vulnerable to a timing attack under
certain conditions. An attacker could possibly use this issue to bypass
authentication. (CVE-2026-27856)

It was discovered that Dovecot incorrectly handled certain IMAP login
requests. An attacker could possibly use this issue to cause a denial of
service. (CVE-2026-27857)

It was discovered that Dovecot incorrectly handled certain specially
crafted messages. An attacker could possibly use this issue to cause a
denial of service. (CVE-2026-27858)

It was discovered that Dovecot incorrectly handled certain specially
crafted mail messages. An attacker could possibly use this issue to
cause a denial of service. (CVE-2026-27859)

It was discovered that Dovecot incorrectly handles file paths. A attacker
could possibly use this issue to perform a path traversal and obtain or
modify arbitrary files. This issue only affected Ubuntu 22.04 LTS and
Ubuntu 24.04 LTS. (CVE-2026-0394)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.10
dovecot-core 1:2.4.1+dfsg1-5ubuntu4.1

Ubuntu 24.04 LTS
dovecot-core 1:2.3.21+dfsg1-2ubuntu6.3

Ubuntu 22.04 LTS
dovecot-core 1:2.3.16+dfsg1-3ubuntu2.7

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8136-1
CVE-2025-59028, CVE-2025-59031, CVE-2025-59032, CVE-2026-0394,
CVE-2026-24031, CVE-2026-27855, CVE-2026-27856, CVE-2026-27857,
CVE-2026-27858, CVE-2026-27859, CVE-2026-27860

Package Information:
https://launchpad.net/ubuntu/+source/dovecot/1:2.4.1+dfsg1-5ubuntu4.1
https://launchpad.net/ubuntu/+source/dovecot/1:2.3.21+dfsg1-2ubuntu6.3
https://launchpad.net/ubuntu/+source/dovecot/1:2.3.16+dfsg1-3ubuntu2.7

[USN-8135-1] Pillow vulnerabilities

==========================================================================
Ubuntu Security Notice USN-8135-1
March 31, 2026

pillow vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in Pillow.

Software Description:
- pillow: Python Imaging Library

Details:

It was discovered that Pillow did not correctly handle reading J2K files,
which could lead to an out-of-bounds read vulnerability. If a user or
automated system were tricked into opening a specially crafted file, an
attacker could possibly use this issue to cause a denial of service. This
issue only affected Ubuntu 16.04 LTS. (CVE-2021-25287, CVE-2021-25288)

It was discovered that Pillow did not correctly handle certain integer
arithmetic, which could lead to a buffer overflow. An attacker could
possibly use this issue to cause a denial of service or execute arbitrary
code. This issue only affected Ubuntu 14.04 LTS. (CVE-2021-25290)

It was discovered that Pillow did not correctly perform bounds checking
for certain operations. An attacker could possibly use this issue to
cause a denial of service. This issue only affected Ubuntu 14.04 LTS
and Ubuntu 16.04 LTS. (CVE-2021-28675, CVE-2021-28676, CVE-2021-28677)

It was discovered that Pillow did not correctly handle certain memory
operations. An attacker could possibly use this issue to cause a denial
of service. (CVE-2023-44271)

It was discovered that Pillow did not correctly sanitize certain inputs.
An attacker could possibly use this issue to execute arbitrary code.
(CVE-2023-50447)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS
python-pil 5.1.0-1ubuntu0.8+esm2
Available with Ubuntu Pro
python3-pil 5.1.0-1ubuntu0.8+esm2
Available with Ubuntu Pro

Ubuntu 16.04 LTS
python-pil 3.1.2-0ubuntu1.6+esm3
Available with Ubuntu Pro
python3-pil 3.1.2-0ubuntu1.6+esm3
Available with Ubuntu Pro

Ubuntu 14.04 LTS
python-pil 2.3.0-1ubuntu3.4+esm5
Available with Ubuntu Pro
python3-pil 2.3.0-1ubuntu3.4+esm5
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8135-1
CVE-2021-25287, CVE-2021-25288, CVE-2021-25290, CVE-2021-28675,
CVE-2021-28676, CVE-2021-28677, CVE-2023-44271, CVE-2023-50447

[USN-8134-1] pyasn1 vulnerabilities

==========================================================================
Ubuntu Security Notice USN-8134-1
March 30, 2026

pyasn1 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in pyasn1.

Software Description:
- pyasn1: ASN.1 library for Python

Details:

It was discovered that pyasn1 could exhaust system resources when
attempting to decode a malformed certificate. An attacker could
possibly use this to cause a denial of service. (CVE-2026-23490)

Kevin Tu discovered that pyasn1 could exhaust system resources via
uncontrolled recursion when attempting to decode malicously-crafted
certificates. An attacker could possibly use this to cause a denial of
service. (CVE-2026-30922)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS
pypy-pyasn1 0.4.2-3ubuntu0.20.04.1~esm1
Available with Ubuntu Pro
python-pyasn1 0.4.2-3ubuntu0.20.04.1~esm1
Available with Ubuntu Pro
python3-pyasn1 0.4.2-3ubuntu0.20.04.1~esm1
Available with Ubuntu Pro

Ubuntu 18.04 LTS
pypy-pyasn1 0.4.2-3ubuntu0.18.04.1~esm1
Available with Ubuntu Pro
python-pyasn1 0.4.2-3ubuntu0.18.04.1~esm1
Available with Ubuntu Pro
python3-pyasn1 0.4.2-3ubuntu0.18.04.1~esm1
Available with Ubuntu Pro

Ubuntu 16.04 LTS
pypy-pyasn1 0.1.9-1ubuntu0.1~esm1
Available with Ubuntu Pro
python-pyasn1 0.1.9-1ubuntu0.1~esm1
Available with Ubuntu Pro
python3-pyasn1 0.1.9-1ubuntu0.1~esm1
Available with Ubuntu Pro

Ubuntu 14.04 LTS
python-pyasn1 0.1.7-1ubuntu2.1+esm1
Available with Ubuntu Pro
python3-pyasn1 0.1.7-1ubuntu2.1+esm1
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8134-1
CVE-2026-23490, CVE-2026-30922

[USN-8127-1] ImageMagick vulnerabilities

==========================================================================
Ubuntu Security Notice USN-8127-1
March 30, 2026

imagemagick vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in ImageMagick.

Software Description:
- imagemagick: Image manipulation programs and library

Details:

It was discovered that ImageMagick did not properly process certain tags
prior to an image being loaded. An attacker could possibly use this issue
to cause ImageMagick to crash, resulting in a denial of service.
(CVE-2026-23952)

It was discovered that ImageMagick did not properly handle temporary file
creation failures. An attacker could possibly use this issue to cause
ImageMagick to crash, resulting in a denial of service. (CVE-2026-25795)

It was discovered that ImageMagick did not properly manage memory under
certain conditions. An attacker could possibly use this issue to cause
ImageMagick to consume resources, resulting in a denial of service.
(CVE-2026-25796)

It was discovered that ImageMagick incorrectly handled certain specially
crafted image files. An attacker could possibly use this issue to cause
ImageMagick to crash, resulting in a denial of service. (CVE-2026-25798)

It was discovered that ImageMagick did not properly validate certain YUV
sampling factors. An attacker could possibly use this issue to cause
ImageMagick to crash, resulting in a denial of service. (CVE-2026-25799)

It was discovered that ImageMagick incorrectly handled certain specially
crafted image files. An attacker could possibly use this issue to cause
ImageMagick to crash, resulting in a denial of service. This issue only
affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS,
Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2026-25970)

It was discovered that ImageMagick incorrectly managed memory when handling
certain specially crafted image files. An attacker could possibly use this
issue to cause ImageMagick to consume resources, resulting in a denial of
service. (CVE-2026-25988)

It was discovered that ImageMagick incorrectly handled certain crafted image
profiles. An attacker could possibly use this issue to cause ImageMagick
to consume available resources, resulting in a denial of service.
(CVE-2026-26066)

It was discovered that ImageMagick incorrectly handled large image profiles
when encoding PNG images. An attacker could use this issue to cause
ImageMagick to crash, resulting in a denial of service, or possibly execute
arbitrary code. (CVE-2026-30883)

Kamil Frankowicz discovered that ImageMagick incorrectly handled certain XML
data. An attacker could possibly use this issue to cause ImageMagick to crash,
resulting in a denial of service. (CVE-2026-32636)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
imagemagick-6.q16 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm8
Available with Ubuntu Pro
imagemagick-6.q16hdri 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm8
Available with Ubuntu Pro
libimage-magick-q16-perl 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm8
Available with Ubuntu Pro
libimage-magick-q16hdri-perl 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm8
Available with Ubuntu Pro
libmagick++-6.q16-9t64 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm8
Available with Ubuntu Pro
libmagick++-6.q16hdri-9t64 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm8
Available with Ubuntu Pro
libmagickcore-6-headers 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm8
Available with Ubuntu Pro
libmagickcore-6.q16-7-extra 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm8
Available with Ubuntu Pro
libmagickcore-6.q16-7t64 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm8
Available with Ubuntu Pro
libmagickcore-6.q16hdri-7-extra 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm8
Available with Ubuntu Pro
libmagickcore-6.q16hdri-7t64 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm8
Available with Ubuntu Pro
libmagickwand-6.q16-7t64 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm8
Available with Ubuntu Pro
libmagickwand-6.q16hdri-7t64 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm8
Available with Ubuntu Pro

Ubuntu 22.04 LTS
imagemagick-6.q16 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm9
Available with Ubuntu Pro
imagemagick-6.q16hdri 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm9
Available with Ubuntu Pro
libimage-magick-q16-perl 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm9
Available with Ubuntu Pro
libimage-magick-q16hdri-perl 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm9
Available with Ubuntu Pro
libmagick++-6.q16-8 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm9
Available with Ubuntu Pro
libmagick++-6.q16hdri-8 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm9
Available with Ubuntu Pro
libmagickcore-6.q16-6 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm9
Available with Ubuntu Pro
libmagickcore-6.q16-6-extra 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm9
Available with Ubuntu Pro
libmagickcore-6.q16hdri-6 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm9
Available with Ubuntu Pro
libmagickcore-6.q16hdri-6-extra 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm9
Available with Ubuntu Pro
libmagickwand-6.q16-6 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm9
Available with Ubuntu Pro
libmagickwand-6.q16hdri-6 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm9
Available with Ubuntu Pro

Ubuntu 20.04 LTS
libimage-magick-q16-perl 8:6.9.10.23+dfsg-2.1ubuntu11.11+esm9
Available with Ubuntu Pro
libimage-magick-q16hdri-perl 8:6.9.10.23+dfsg-2.1ubuntu11.11+esm9
Available with Ubuntu Pro
libmagickcore-6.q16-6 8:6.9.10.23+dfsg-2.1ubuntu11.11+esm9
Available with Ubuntu Pro
libmagickcore-6.q16-6-extra 8:6.9.10.23+dfsg-2.1ubuntu11.11+esm9
Available with Ubuntu Pro
libmagickcore-6.q16hdri-6 8:6.9.10.23+dfsg-2.1ubuntu11.11+esm9
Available with Ubuntu Pro
libmagickcore-6.q16hdri-6-extra 8:6.9.10.23+dfsg-2.1ubuntu11.11+esm9
Available with Ubuntu Pro

Ubuntu 18.04 LTS
imagemagick-6.q16 8:6.9.7.4+dfsg-16ubuntu6.15+esm11
Available with Ubuntu Pro
imagemagick-6.q16hdri 8:6.9.7.4+dfsg-16ubuntu6.15+esm11
Available with Ubuntu Pro
libimage-magick-q16-perl 8:6.9.7.4+dfsg-16ubuntu6.15+esm11
Available with Ubuntu Pro
libimage-magick-q16hdri-perl 8:6.9.7.4+dfsg-16ubuntu6.15+esm11
Available with Ubuntu Pro
libmagick++-6.q16-7 8:6.9.7.4+dfsg-16ubuntu6.15+esm11
Available with Ubuntu Pro
libmagick++-6.q16hdri-7 8:6.9.7.4+dfsg-16ubuntu6.15+esm11
Available with Ubuntu Pro
libmagickcore-6.q16-3 8:6.9.7.4+dfsg-16ubuntu6.15+esm11
Available with Ubuntu Pro
libmagickcore-6.q16-3-extra 8:6.9.7.4+dfsg-16ubuntu6.15+esm11
Available with Ubuntu Pro
libmagickcore-6.q16hdri-3 8:6.9.7.4+dfsg-16ubuntu6.15+esm11
Available with Ubuntu Pro
libmagickcore-6.q16hdri-3-extra 8:6.9.7.4+dfsg-16ubuntu6.15+esm11
Available with Ubuntu Pro
libmagickwand-6.q16-3 8:6.9.7.4+dfsg-16ubuntu6.15+esm11
Available with Ubuntu Pro
libmagickwand-6.q16hdri-3 8:6.9.7.4+dfsg-16ubuntu6.15+esm11
Available with Ubuntu Pro

Ubuntu 16.04 LTS
imagemagick-6.q16 8:6.8.9.9-7ubuntu5.16+esm19
Available with Ubuntu Pro
libimage-magick-q16-perl 8:6.8.9.9-7ubuntu5.16+esm19
Available with Ubuntu Pro
libmagick++-6.q16-5v5 8:6.8.9.9-7ubuntu5.16+esm19
Available with Ubuntu Pro
libmagickcore-6.q16-2 8:6.8.9.9-7ubuntu5.16+esm19
Available with Ubuntu Pro
libmagickcore-6.q16-2-extra 8:6.8.9.9-7ubuntu5.16+esm19
Available with Ubuntu Pro
libmagickwand-6-headers 8:6.8.9.9-7ubuntu5.16+esm19
Available with Ubuntu Pro
libmagickwand-6.q16-2 8:6.8.9.9-7ubuntu5.16+esm19
Available with Ubuntu Pro

Ubuntu 14.04 LTS
imagemagick 8:6.7.7.10-6ubuntu3.13+esm20
Available with Ubuntu Pro
imagemagick-common 8:6.7.7.10-6ubuntu3.13+esm20
Available with Ubuntu Pro
libmagick++5 8:6.7.7.10-6ubuntu3.13+esm20
Available with Ubuntu Pro
libmagickcore5 8:6.7.7.10-6ubuntu3.13+esm20
Available with Ubuntu Pro
libmagickcore5-extra 8:6.7.7.10-6ubuntu3.13+esm20
Available with Ubuntu Pro
libmagickwand5 8:6.7.7.10-6ubuntu3.13+esm20
Available with Ubuntu Pro
perlmagick 8:6.7.7.10-6ubuntu3.13+esm20
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8127-1
CVE-2026-23952, CVE-2026-25795, CVE-2026-25796, CVE-2026-25798,
CVE-2026-25799, CVE-2026-25970, CVE-2026-25988, CVE-2026-26066,
CVE-2026-30883, CVE-2026-32636

Monday, March 30, 2026

[announce] Wednesday NYC*BUG Michael W Lucas

What's Changed Since The Last Time I Came this Way - a talk that was
supposed to be about OpenZFS, Michael W Lucas

2026-04-01 @ 18:45 local (22:45 UTC) - Backroom of Brass Monkey 55
Little West 12th St

Remote participation: Plans are to stream via NYC*BUG website. Q&A will
be via IRC on libera.chat channel #nycbug - please preface your
questions with '[Q]'.

Michael W Lucas and Allan Jude are busy working on a new OpenZFS book,
which means not only documenting everything that's changed in the last
12 years but discovering everything that they got wrong the first time.
The quest for accuracy has taken Lucas deep into mailing list archives,
Usenet, VAX installation manuals, the Kremlin's first Internet
connection, the United Nations' effort to merge the BSD projects, and
the ULTRIX and S51K filesystems, and left MWL more convinced than ever
that filesystems are nothing but a April Fools' prank. This hurriedly
conceived and hastily assembled talk will update you on new OpenZFS
features, but will also try to determine if it's a good prank–or not.


Michael W Lucas' name may ring a bell for some in the BSD community.
He's written several shelves of books. But for anyone who has seen him
speak in public during Ante COVID days, it was clear they are mere
transcriptions of his rambling presentations. For this NYC*BUG meeting,
he is unlikely to edit out any of his expected corny jokes we endure
during his conference presentations.

More likely, you know his name from his grotesque horror fiction. In the
same way his technical books are just transcriptions of his
presentations, his fictionaal horror is just a simple reflection of
someone who lives in a haunted house filled with (pet) rats in Detroit.

Nearest NYC Subway is the 14th Street/Eighth Avenue station L, A, C, E.

To get to the backroom, you must enter the front door, follow the long
bar on your left, and walk all the way to the back. At the rear of the
BrassMonkey, you will see an alcove for the 3 bathrooms our room is off
to your right.
_______________________________________________
announce mailing list
announce@lists.nycbug.org
https://lists.nycbug.org:8443/mailman/listinfo/announce

[USN-8132-1] Roundcube Webmail vulnerabilities

==========================================================================
Ubuntu Security Notice USN-8132-1
March 30, 2026

roundcube vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in Roundcube Webmail.

Software Description:
- roundcube: skinnable AJAX based webmail solution for IMAP servers - metapack

Details:

It was discovered that Roundcube Webmail did not properly sanitize
certain HTML elements within the e-mail body. An attacker could possibly
use this issue to cause a cross-site scripting attack. This issue was only
addressed in Ubuntu 16.04 LTS. (CVE-2016-4068, CVE-2016-4069)

It was discovered that Roundcube Webmail did not properly handle certain
configuration parameters. An attacker could possibly use this issue to
execute arbitrary code. This issue was only addressed in Ubuntu 16.04 LTS.
(CVE-2016-9920)

It was discovered that Roundcube Webmail did not properly sanitize CSS styles
within SVG documents. An attacker could possibly use this issue to cause
a cross-site scripting attack. This issue was only addressed in Ubuntu 16.04 LTS.
(CVE-2017-6820)

It was discovered that Roundcube Webmail did not properly restrict exec call in
certain drivers of the password plugin. An authenticated user could possibly
use this issue to perform arbitrary password resets. This issue was only addressed in
Ubuntu 16.04 LTS. (CVE-2017-8114)

It was discovered that Roundcube Webmail did not properly set file permissions within
the Enigma plugin. An attacker could possibly use this issue to exfiltrate GPG private
keys via network connectivity. (CVE-2018-1000071)

It was discovered that Roundcube Webmail did not properly handle GnuPG MDC
integrity-protection warnings. An attacker could possibly use this issue to obtain
sensitive information from encrypted communications. (CVE-2018-19205)

It was discovered that Roundcube Webmail did not properly sanitize <svg> and <style>
tags within HTML attachments. An attacker could possibly use this issue to cause a
cross-site scripting attack. (CVE-2018-19206)

It was discovered that Roundcube Webmail did not properly handle partially encrypted
multipart messages. An attacker could possibly use this issue to cause
leaking of the plaintext of encrypted messages via an email reply. (CVE-2019-10740)

It was discovered that Roundcube Webmail did not properly sanitize a certain parameter
within the archive plugin. An attacker could possibly use this issue to perform an
IMAP injection attack. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2018-9846)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS
roundcube-core 1.3.6+dfsg.1-1ubuntu0.1~esm7
Available with Ubuntu Pro
roundcube-plugins 1.3.6+dfsg.1-1ubuntu0.1~esm7
Available with Ubuntu Pro

Ubuntu 16.04 LTS
roundcube-core 1.2~beta+dfsg.1-0ubuntu1+esm7
Available with Ubuntu Pro
roundcube-plugins 1.2~beta+dfsg.1-0ubuntu1+esm7
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8132-1
CVE-2016-4068, CVE-2016-4069, CVE-2016-9920, CVE-2017-6820,
CVE-2017-8114, CVE-2018-1000071, CVE-2018-19205, CVE-2018-19206,
CVE-2018-9846, CVE-2019-10740

[USN-8133-1] PyJWT vulnerability

==========================================================================
Ubuntu Security Notice USN-8133-1
March 30, 2026

pyjwt vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

PyJWT could allow unintended access to network services.

Software Description:
- pyjwt: Python 3 implementation of JSON Web Token

Details:

It was discovered that PyJWT did not validate the critical header
parameter, contrary to the RFC specification expectations. A remote
attacker could possibly use this issue to bypass certain authentication
checks and restrictions.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.10
python3-jwt 2.10.1-2ubuntu0.1

Ubuntu 24.04 LTS
python3-jwt 2.7.0-1ubuntu0.1

Ubuntu 22.04 LTS
python3-jwt 2.3.0-1ubuntu0.3

Ubuntu 20.04 LTS
python3-jwt 1.7.1-2ubuntu2.1+esm1
Available with Ubuntu Pro

Ubuntu 18.04 LTS
python-jwt 1.5.3+ds1-1ubuntu0.1+esm1
Available with Ubuntu Pro
python3-jwt 1.5.3+ds1-1ubuntu0.1+esm1
Available with Ubuntu Pro

Ubuntu 16.04 LTS
python-jwt 1.3.0-1ubuntu0.1+esm1
Available with Ubuntu Pro
python3-jwt 1.3.0-1ubuntu0.1+esm1
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8133-1
CVE-2026-32597

Package Information:
https://launchpad.net/ubuntu/+source/pyjwt/2.10.1-2ubuntu0.1
https://launchpad.net/ubuntu/+source/pyjwt/2.7.0-1ubuntu0.1
https://launchpad.net/ubuntu/+source/pyjwt/2.3.0-1ubuntu0.3

[USN-8130-1] GStreamer Base Plugins vulnerability

==========================================================================
Ubuntu Security Notice USN-8130-1
March 30, 2026

gst-plugins-base1.0 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

GStreamer Base Plugins could be made to crash or run programs if it opened
a specially crafted file.

Software Description:
- gst-plugins-base1.0: GStreamer plugins

Details:

It was discovered that GStreamer Base Plugins incorrectly handled certain
AVI media files. A remote attacker could use this issue to cause GStreamer
Base Plugins to crash, resulting in a denial of service, or possibly
execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.10
gstreamer1.0-plugins-base 1.26.6-1ubuntu0.1
gstreamer1.0-plugins-base-apps 1.26.6-1ubuntu0.1
libgstreamer-plugins-base1.0-0 1.26.6-1ubuntu0.1

Ubuntu 24.04 LTS
gstreamer1.0-plugins-base 1.24.2-1ubuntu0.4
gstreamer1.0-plugins-base-apps 1.24.2-1ubuntu0.4
libgstreamer-plugins-base1.0-0 1.24.2-1ubuntu0.4

Ubuntu 22.04 LTS
gstreamer1.0-plugins-base 1.20.1-1ubuntu0.6
gstreamer1.0-plugins-base-apps 1.20.1-1ubuntu0.6
libgstreamer-plugins-base1.0-0 1.20.1-1ubuntu0.6

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8130-1
CVE-2026-2921

Package Information:
https://launchpad.net/ubuntu/+source/gst-plugins-base1.0/1.26.6-1ubuntu0.1
https://launchpad.net/ubuntu/+source/gst-plugins-base1.0/1.24.2-1ubuntu0.4
https://launchpad.net/ubuntu/+source/gst-plugins-base1.0/1.20.1-1ubuntu0.6

[USN-8129-1] pyasn1 vulnerability

==========================================================================
Ubuntu Security Notice USN-8129-1
March 30, 2026

pyasn1 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

pyasn1 could be made to consume resources and crash if it received
specially crafted input.

Software Description:
- pyasn1: ASN.1 library for Python

Details:

It was discovered that pyasn1 incorrectly handled recursion when decoding
ASN.1 data. An attacker could use this issue to cause pyasn1 to consume
resources, leading to a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.10
python3-pyasn1 0.6.1-1ubuntu0.2

Ubuntu 24.04 LTS
python3-pyasn1 0.4.8-4ubuntu0.2

Ubuntu 22.04 LTS
python3-pyasn1 0.4.8-1ubuntu0.2

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8129-1
CVE-2026-30922

Package Information:
https://launchpad.net/ubuntu/+source/pyasn1/0.6.1-1ubuntu0.2
https://launchpad.net/ubuntu/+source/pyasn1/0.4.8-4ubuntu0.2
https://launchpad.net/ubuntu/+source/pyasn1/0.4.8-1ubuntu0.2

[USN-8131-1] GStreamer Good Plugins vulnerabilities

==========================================================================
Ubuntu Security Notice USN-8131-1
March 30, 2026

gst-plugins-good1.0 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in GStreamer Good Plugins.

Software Description:
- gst-plugins-good1.0: GStreamer plugins

Details:

It was discovered that GStreamer Good Plugins incorrectly handled certain
X-QDM RTP payloads. A remote attacker could use this issue to cause
GStreamer Good Plugins to crash, resulting in a denial of service, or
possibly execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.10
gstreamer1.0-plugins-good 1.26.5-1ubuntu2.1
libgstreamer-plugins-good1.0-0 1.26.5-1ubuntu2.1

Ubuntu 24.04 LTS
gstreamer1.0-plugins-good 1.24.2-1ubuntu1.3
libgstreamer-plugins-good1.0-0 1.24.2-1ubuntu1.3

Ubuntu 22.04 LTS
gstreamer1.0-plugins-good 1.20.3-0ubuntu1.5
libgstreamer-plugins-good1.0-0 1.20.3-0ubuntu1.5

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8131-1
CVE-2026-3083, CVE-2026-3085

Package Information:
https://launchpad.net/ubuntu/+source/gst-plugins-good1.0/1.26.5-1ubuntu2.1
https://launchpad.net/ubuntu/+source/gst-plugins-good1.0/1.24.2-1ubuntu1.3
https://launchpad.net/ubuntu/+source/gst-plugins-good1.0/1.20.3-0ubuntu1.5

Friday, March 27, 2026

[USN-8098-9] Linux kernel (IBM) vulnerabilities

==========================================================================
Ubuntu Security Notice USN-8098-9
March 27, 2026

linux-ibm-5.4 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-ibm-5.4: Linux kernel for IBM cloud systems

Details:

Qualys discovered that several vulnerabilities existed in the AppArmor
Linux kernel Security Module (LSM). An unprivileged local attacker could
use these issues to load, replace, and remove arbitrary AppArmor profiles
causing denial of service, exposure of sensitive information (kernel
memory), local privilege escalation, or possibly escape a container.
(LP: #2143853)

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- x86 architecture;
- GPIO subsystem;
- GPU drivers;
- BTRFS file system;
- XFRM subsystem;
- IPv4 networking;
- IPv6 networking;
- MAC80211 subsystem;
- SMC sockets;
(CVE-2021-47599, CVE-2022-48875, CVE-2022-49072, CVE-2024-49927,
CVE-2024-56640, CVE-2025-21780, CVE-2025-40215)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS
linux-image-5.4.0-1102-ibm 5.4.0-1102.107~18.04.1
Available with Ubuntu Pro
linux-image-ibm 5.4.0.1102.107~18.04.1
Available with Ubuntu Pro
linux-image-ibm-5.4 5.4.0.1102.107~18.04.1
Available with Ubuntu Pro

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-8098-9
https://ubuntu.com/security/notices/USN-8098-8
https://ubuntu.com/security/notices/USN-8098-7
https://ubuntu.com/security/notices/USN-8098-6
https://ubuntu.com/security/notices/USN-8098-5
https://ubuntu.com/security/notices/USN-8098-4
https://ubuntu.com/security/notices/USN-8098-3
https://ubuntu.com/security/notices/USN-8098-2
https://ubuntu.com/security/notices/USN-8098-1
https://launchpad.net/bugs/2143853
CVE-2021-47599, CVE-2022-48875, CVE-2022-49072, CVE-2022-49267,
CVE-2024-49927, CVE-2024-56640, CVE-2025-21780, CVE-2025-40215,