Wednesday, April 1, 2026

[USN-8138-1] tar-rs vulnerability

==========================================================================
Ubuntu Security Notice USN-8138-1
April 01, 2026

rust-tar vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

tar-rs could be made to modify permissions on arbitrary directories.

Software Description:
- rust-tar: A tar archive reading/writing library for Rust

Details:

It was discovered that tar-rs incorrectly handled symlinks when unpacking a
tar archive. If a user or automated system were tricked into processing a
specially crafted tar archive, a remote attacker could use this issue to
modify permissions of arbitrary directories outside the extraction root,
and possibly escalate privileges.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.10
librust-tar-dev 0.4.43-4ubuntu0.1

Ubuntu 24.04 LTS
librust-tar-dev 0.4.40-1ubuntu0.1

Ubuntu 22.04 LTS
librust-tar+default-dev 0.4.37-3ubuntu0.1
librust-tar-dev 0.4.37-3ubuntu0.1

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8138-1
CVE-2026-33056

Package Information:
https://launchpad.net/ubuntu/+source/rust-tar/0.4.43-4ubuntu0.1
https://launchpad.net/ubuntu/+source/rust-tar/0.4.40-1ubuntu0.1
https://launchpad.net/ubuntu/+source/rust-tar/0.4.37-3ubuntu0.1

[USN-8139-1] cargo-c vulnerability

==========================================================================
Ubuntu Security Notice USN-8139-1
April 01, 2026

rust-cargo-c vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.10

Summary:

cargo-c could be made to modify permissions on arbitrary directories.

Software Description:
- rust-cargo-c: Helper program to build and install c-like libraries

Details:

It was discovered that tar-rs embedded in cargo-c incorrectly handled
symlinks when unpacking a tar archive. If a user or automated system were
tricked into processing a specially crafted tar archive, a remote attacker
could use this issue to modify permissions of arbitrary directories outside
the extraction root, and possibly escalate privileges.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.10
cargo-c 0.10.11-1ubuntu1.1
librust-cargo-c-dev 0.10.11-1ubuntu1.1

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8139-1
CVE-2026-33056

Package Information:
https://launchpad.net/ubuntu/+source/rust-cargo-c/0.10.11-1ubuntu1.1

[announce] NYC*BUG Tonight: Michael W Lucas

Note: MWL will be remote, so the meeting will be streamed from
https://www.nycbug.org/streaming.html, and some local NYC people will be
watching at the Brass Monkey.

What's Changed Since The Last Time I Came this Way - a talk that was
supposed to be about OpenZFS, Michael W Lucas

2026-04-01 @ 18:45 local (22:45 UTC) - Backroom of Brass Monkey 55
Little West 12th St

Remote participation: Plans are to stream via NYC*BUG website. Q&A will
be via IRC on libera.chat channel #nycbug - please preface your
questions with '[Q]'.

Michael W Lucas and Allan Jude are busy working on a new OpenZFS book,
which means not only documenting everything that's changed in the last
12 years but discovering everything that they got wrong the first time.
The quest for accuracy has taken Lucas deep into mailing list archives,
Usenet, VAX installation manuals, the Kremlin's first Internet
connection, the United Nations' effort to merge the BSD projects, and
the ULTRIX and S51K filesystems, and left MWL more convinced than ever
that filesystems are nothing but a April Fools' prank. This hurriedly
conceived and hastily assembled talk will update you on new OpenZFS
features, but will also try to determine if it's a good prank–or not.


Michael W Lucas' name may ring a bell for some in the BSD community.
He's written several shelves of books. But for anyone who has seen him
speak in public during Ante COVID days, it was clear they are mere
transcriptions of his rambling presentations. For this NYC*BUG meeting,
he is unlikely to edit out any of his expected corny jokes we endure
during his conference presentations.

More likely, you know his name from his grotesque horror fiction. In the
same way his technical books are just transcriptions of his
presentations, his fictionaal horror is just a simple reflection of
someone who lives in a haunted house filled with (pet) rats in Detroit.

Nearest NYC Subway is the 14th Street/Eighth Avenue station L, A, C, E.

To get to the backroom, you must enter the front door, follow the long
bar on your left, and walk all the way to the back. At the rear of the
BrassMonkey, you will see an alcove for the 3 bathrooms our room is off
to your right.

_______________________________________________
announce mailing list
announce@lists.nycbug.org
https://lists.nycbug.org:8443/mailman/listinfo/announce

[USN-8137-1] Ruby vulnerability

==========================================================================
Ubuntu Security Notice USN-8137-1
March 31, 2026

ruby2.3, ruby2.5, ruby2.7, ruby3.0, ruby3.2, ruby3.3 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

Ruby could be made to expose sensitive information.

Software Description:
- ruby3.3: Object-oriented scripting language
- ruby3.2: Object-oriented scripting language
- ruby3.0: Object-oriented scripting language
- ruby2.7: Object-oriented scripting language
- ruby2.5: Object-oriented scripting language
- ruby2.3: Object-oriented scripting language

Details:

It was discovered that the Ruby URI gem did not properly handle sensitive
information when combining URIs. A remote attacker could possibly use this
issue to leak authentication credentials.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.10
libruby3.3 3.3.8-2ubuntu2.1
ruby3.3 3.3.8-2ubuntu2.1

Ubuntu 24.04 LTS
libruby3.2 3.2.3-1ubuntu0.24.04.7
ruby3.2 3.2.3-1ubuntu0.24.04.7

Ubuntu 22.04 LTS
libruby3.0 3.0.2-7ubuntu2.12
ruby3.0 3.0.2-7ubuntu2.12

Ubuntu 20.04 LTS
libruby2.7 2.7.0-5ubuntu1.18+esm4
Available with Ubuntu Pro
ruby2.7 2.7.0-5ubuntu1.18+esm4
Available with Ubuntu Pro

Ubuntu 18.04 LTS
libruby2.5 2.5.1-1ubuntu1.16+esm7
Available with Ubuntu Pro
ruby2.5 2.5.1-1ubuntu1.16+esm7
Available with Ubuntu Pro

Ubuntu 16.04 LTS
libruby2.3 2.3.1-2~ubuntu16.04.16+esm12
Available with Ubuntu Pro
ruby2.3 2.3.1-2~ubuntu16.04.16+esm12
Available with Ubuntu Pro
ruby2.3-tcltk 2.3.1-2~ubuntu16.04.16+esm12
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8137-1
CVE-2025-61594

Package Information:
https://launchpad.net/ubuntu/+source/ruby3.3/3.3.8-2ubuntu2.1
https://launchpad.net/ubuntu/+source/ruby3.2/3.2.3-1ubuntu0.24.04.7
https://launchpad.net/ubuntu/+source/ruby3.0/3.0.2-7ubuntu2.12

[USN-8089-2] Go Networking vulnerabilities

==========================================================================
Ubuntu Security Notice USN-8089-2
March 31, 2026

golang-golang-x-net-dev vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in Go Networking

Software Description:
- golang-golang-x-net-dev: Supplementary Go networking development files

Details:

USN-8089-1 fixed vulnerabilities in Go Networking. This update provides
the corresponding update to code vendored in golang-golang-x-net-dev.

Original advisory details:

Bahruz Jabiyev, Tommaso Innocenti, Anthony Gavazzi, Steven Sprecher, and
Kaan Onarlioglu discovered that servers using Go Networking could hang
during shutdown if preempted by a fatal error. An attacker could possibly
use this to cause a denial of service. This issue only affected Ubuntu
22.04 LTS. (CVE-2022-27664)

Arpad Ryszka and Jakob Ackermann discovered that a maliciously crafted
stream could cause excessive CPU usage in Go Networking's HPACK decoder. An
attacker could possibly use this to cause a denial of service. This issue
only affected Ubuntu 22.04 LTS. (CVE-2022-41723)

Mohammad Thoriq Aziz discovered that Go Networking did not properly
sanitize some text nodes. An attacker could possibly use this to execute
arbitrary code. This issue only affected Ubuntu 22.04 LTS. (CVE-2023-3978)

Sean Ng discovered an error in Go Networking's HTML tag handling. An
attacker could possibly use this to cause a denial of service.
(CVE-2025-22872)

Guido Vranken and Jakub Ciolek discovered that a maliciously crafted HTML
document could exhaust system resources on servers using Go Networking. An
attacker could possibly use this to cause a denial of service.
(CVE-2025-47911)

Guido Vranken discovered that a maliciously crafted HTML document could put
servers using Go Networking into an infinite loop. An attacker could
possibly use this to cause a denial of service. (CVE-2025-58190)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS
golang-go.net-dev 1:0.0+git20190811.74dc4d7+dfsg-1ubuntu0.1~esm2
Available with Ubuntu Pro
golang-golang-x-net-dev 1:0.0+git20190811.74dc4d7+dfsg-1ubuntu0.1~esm2
Available with Ubuntu Pro

Ubuntu 18.04 LTS
golang-go.net-dev 1:0.0+git20170629.c81e7f2+dfsg-2ubuntu0.1~esm2
Available with Ubuntu Pro
golang-golang-x-net-dev 1:0.0+git20170629.c81e7f2+dfsg-2ubuntu0.1~esm2
Available with Ubuntu Pro

Ubuntu 16.04 LTS
golang-go.net-dev 1:0.0+git20160110.4fd4a9f-1ubuntu0.1~esm2
Available with Ubuntu Pro
golang-golang-x-net-dev 1:0.0+git20160110.4fd4a9f-1ubuntu0.1~esm2
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8089-2
https://ubuntu.com/security/notices/USN-8089-1
CVE-2021-33194, CVE-2022-27664, CVE-2022-41723, CVE-2023-3978,
CVE-2025-22872, CVE-2025-47911, CVE-2025-58190

Tuesday, March 31, 2026

Fedora 44 Final Freeze Is Now In Effect

Hi all,

Today, 2026-03-31, is an important day on the Fedora Linux 44 schedule [1], with significant cut-offs.

Today we have the Final Freeze [2] which starts at 14:00 UTC. This means that only packages fixing accepted blocker or freeze exception bugs [3][4][5] will be marked as 'stable' and included in the Final composes. Other builds will remain in updates-testing until the Final release is approved. At that point, the final freeze is lifted and packages can move to the 'updates' repository. Pending updates will be pushed before final release as zero day updates.

Regards,
Patrik Polakovic
Fedora Release Engineering

[1] https://fedorapeople.org/groups/schedule/f-44/f-44-key-tasks.html
[2] https://fedoraproject.org/wiki/Milestone_freezes
[3] https://fedoraproject.org/wiki/QA:SOP_blocker_bug_process
[4] https://fedoraproject.org/wiki/QA:SOP_freeze_exception_bug_process
[5] https://qa.fedoraproject.org/blockerbugs/milestone/f44/final/buglist

[USN-8136-1] Dovecot vulnerabilities

==========================================================================
Ubuntu Security Notice USN-8136-1
March 31, 2026

dovecot vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in Dovecot.

Software Description:
- dovecot: IMAP and POP3 email server

Details:

It was discovered that Dovecot incorrectly handled invalid base64 SASL data.
An attacker could possibly use this issue to cause a denial of service. This
issue only affected Ubuntu 25.10. (CVE-2025-59028)

It was discovered that Dovecot script decode2text.sh incorrectly handled zip
files. An attacker could possibly use this issue to obtain sensitive
information. (CVE-2025-59031)

It was discovered that Dovecot incorrectly handled certain AUTHENTICATE
requests. An attacker could possibly use this issue to cause a denial of
service. (CVE-2025-59032)

It was discovered that Dovecot incorrectly handled certain SQL based
authentication. An attacker could possibly use this issue to bypass
authentication. This issue only affected Ubuntu 25.10. (CVE-2026-24031)

It was discovered that Dovecot incorrectly handled certain LDAP based
authentication. An attacker could possibly use this issue to bypass
restrictions and allow probing of LDAP structure. This issue only affected
Ubuntu 25.10. (CVE-2026-27860)

It was discovered that Dovecot is vulnerable to replay attack under
certain conditions. An attacker could possibly use this issue to bypass
authentication. (CVE-2026-27855)

It was discovered that Dovecot is vulnerable to a timing attack under
certain conditions. An attacker could possibly use this issue to bypass
authentication. (CVE-2026-27856)

It was discovered that Dovecot incorrectly handled certain IMAP login
requests. An attacker could possibly use this issue to cause a denial of
service. (CVE-2026-27857)

It was discovered that Dovecot incorrectly handled certain specially
crafted messages. An attacker could possibly use this issue to cause a
denial of service. (CVE-2026-27858)

It was discovered that Dovecot incorrectly handled certain specially
crafted mail messages. An attacker could possibly use this issue to
cause a denial of service. (CVE-2026-27859)

It was discovered that Dovecot incorrectly handles file paths. A attacker
could possibly use this issue to perform a path traversal and obtain or
modify arbitrary files. This issue only affected Ubuntu 22.04 LTS and
Ubuntu 24.04 LTS. (CVE-2026-0394)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.10
dovecot-core 1:2.4.1+dfsg1-5ubuntu4.1

Ubuntu 24.04 LTS
dovecot-core 1:2.3.21+dfsg1-2ubuntu6.3

Ubuntu 22.04 LTS
dovecot-core 1:2.3.16+dfsg1-3ubuntu2.7

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8136-1
CVE-2025-59028, CVE-2025-59031, CVE-2025-59032, CVE-2026-0394,
CVE-2026-24031, CVE-2026-27855, CVE-2026-27856, CVE-2026-27857,
CVE-2026-27858, CVE-2026-27859, CVE-2026-27860

Package Information:
https://launchpad.net/ubuntu/+source/dovecot/1:2.4.1+dfsg1-5ubuntu4.1
https://launchpad.net/ubuntu/+source/dovecot/1:2.3.21+dfsg1-2ubuntu6.3
https://launchpad.net/ubuntu/+source/dovecot/1:2.3.16+dfsg1-3ubuntu2.7

[USN-8135-1] Pillow vulnerabilities

==========================================================================
Ubuntu Security Notice USN-8135-1
March 31, 2026

pillow vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in Pillow.

Software Description:
- pillow: Python Imaging Library

Details:

It was discovered that Pillow did not correctly handle reading J2K files,
which could lead to an out-of-bounds read vulnerability. If a user or
automated system were tricked into opening a specially crafted file, an
attacker could possibly use this issue to cause a denial of service. This
issue only affected Ubuntu 16.04 LTS. (CVE-2021-25287, CVE-2021-25288)

It was discovered that Pillow did not correctly handle certain integer
arithmetic, which could lead to a buffer overflow. An attacker could
possibly use this issue to cause a denial of service or execute arbitrary
code. This issue only affected Ubuntu 14.04 LTS. (CVE-2021-25290)

It was discovered that Pillow did not correctly perform bounds checking
for certain operations. An attacker could possibly use this issue to
cause a denial of service. This issue only affected Ubuntu 14.04 LTS
and Ubuntu 16.04 LTS. (CVE-2021-28675, CVE-2021-28676, CVE-2021-28677)

It was discovered that Pillow did not correctly handle certain memory
operations. An attacker could possibly use this issue to cause a denial
of service. (CVE-2023-44271)

It was discovered that Pillow did not correctly sanitize certain inputs.
An attacker could possibly use this issue to execute arbitrary code.
(CVE-2023-50447)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS
python-pil 5.1.0-1ubuntu0.8+esm2
Available with Ubuntu Pro
python3-pil 5.1.0-1ubuntu0.8+esm2
Available with Ubuntu Pro

Ubuntu 16.04 LTS
python-pil 3.1.2-0ubuntu1.6+esm3
Available with Ubuntu Pro
python3-pil 3.1.2-0ubuntu1.6+esm3
Available with Ubuntu Pro

Ubuntu 14.04 LTS
python-pil 2.3.0-1ubuntu3.4+esm5
Available with Ubuntu Pro
python3-pil 2.3.0-1ubuntu3.4+esm5
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8135-1
CVE-2021-25287, CVE-2021-25288, CVE-2021-25290, CVE-2021-28675,
CVE-2021-28676, CVE-2021-28677, CVE-2023-44271, CVE-2023-50447

[USN-8134-1] pyasn1 vulnerabilities

==========================================================================
Ubuntu Security Notice USN-8134-1
March 30, 2026

pyasn1 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in pyasn1.

Software Description:
- pyasn1: ASN.1 library for Python

Details:

It was discovered that pyasn1 could exhaust system resources when
attempting to decode a malformed certificate. An attacker could
possibly use this to cause a denial of service. (CVE-2026-23490)

Kevin Tu discovered that pyasn1 could exhaust system resources via
uncontrolled recursion when attempting to decode malicously-crafted
certificates. An attacker could possibly use this to cause a denial of
service. (CVE-2026-30922)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS
pypy-pyasn1 0.4.2-3ubuntu0.20.04.1~esm1
Available with Ubuntu Pro
python-pyasn1 0.4.2-3ubuntu0.20.04.1~esm1
Available with Ubuntu Pro
python3-pyasn1 0.4.2-3ubuntu0.20.04.1~esm1
Available with Ubuntu Pro

Ubuntu 18.04 LTS
pypy-pyasn1 0.4.2-3ubuntu0.18.04.1~esm1
Available with Ubuntu Pro
python-pyasn1 0.4.2-3ubuntu0.18.04.1~esm1
Available with Ubuntu Pro
python3-pyasn1 0.4.2-3ubuntu0.18.04.1~esm1
Available with Ubuntu Pro

Ubuntu 16.04 LTS
pypy-pyasn1 0.1.9-1ubuntu0.1~esm1
Available with Ubuntu Pro
python-pyasn1 0.1.9-1ubuntu0.1~esm1
Available with Ubuntu Pro
python3-pyasn1 0.1.9-1ubuntu0.1~esm1
Available with Ubuntu Pro

Ubuntu 14.04 LTS
python-pyasn1 0.1.7-1ubuntu2.1+esm1
Available with Ubuntu Pro
python3-pyasn1 0.1.7-1ubuntu2.1+esm1
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8134-1
CVE-2026-23490, CVE-2026-30922

[USN-8127-1] ImageMagick vulnerabilities

==========================================================================
Ubuntu Security Notice USN-8127-1
March 30, 2026

imagemagick vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in ImageMagick.

Software Description:
- imagemagick: Image manipulation programs and library

Details:

It was discovered that ImageMagick did not properly process certain tags
prior to an image being loaded. An attacker could possibly use this issue
to cause ImageMagick to crash, resulting in a denial of service.
(CVE-2026-23952)

It was discovered that ImageMagick did not properly handle temporary file
creation failures. An attacker could possibly use this issue to cause
ImageMagick to crash, resulting in a denial of service. (CVE-2026-25795)

It was discovered that ImageMagick did not properly manage memory under
certain conditions. An attacker could possibly use this issue to cause
ImageMagick to consume resources, resulting in a denial of service.
(CVE-2026-25796)

It was discovered that ImageMagick incorrectly handled certain specially
crafted image files. An attacker could possibly use this issue to cause
ImageMagick to crash, resulting in a denial of service. (CVE-2026-25798)

It was discovered that ImageMagick did not properly validate certain YUV
sampling factors. An attacker could possibly use this issue to cause
ImageMagick to crash, resulting in a denial of service. (CVE-2026-25799)

It was discovered that ImageMagick incorrectly handled certain specially
crafted image files. An attacker could possibly use this issue to cause
ImageMagick to crash, resulting in a denial of service. This issue only
affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS,
Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2026-25970)

It was discovered that ImageMagick incorrectly managed memory when handling
certain specially crafted image files. An attacker could possibly use this
issue to cause ImageMagick to consume resources, resulting in a denial of
service. (CVE-2026-25988)

It was discovered that ImageMagick incorrectly handled certain crafted image
profiles. An attacker could possibly use this issue to cause ImageMagick
to consume available resources, resulting in a denial of service.
(CVE-2026-26066)

It was discovered that ImageMagick incorrectly handled large image profiles
when encoding PNG images. An attacker could use this issue to cause
ImageMagick to crash, resulting in a denial of service, or possibly execute
arbitrary code. (CVE-2026-30883)

Kamil Frankowicz discovered that ImageMagick incorrectly handled certain XML
data. An attacker could possibly use this issue to cause ImageMagick to crash,
resulting in a denial of service. (CVE-2026-32636)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
imagemagick-6.q16 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm8
Available with Ubuntu Pro
imagemagick-6.q16hdri 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm8
Available with Ubuntu Pro
libimage-magick-q16-perl 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm8
Available with Ubuntu Pro
libimage-magick-q16hdri-perl 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm8
Available with Ubuntu Pro
libmagick++-6.q16-9t64 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm8
Available with Ubuntu Pro
libmagick++-6.q16hdri-9t64 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm8
Available with Ubuntu Pro
libmagickcore-6-headers 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm8
Available with Ubuntu Pro
libmagickcore-6.q16-7-extra 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm8
Available with Ubuntu Pro
libmagickcore-6.q16-7t64 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm8
Available with Ubuntu Pro
libmagickcore-6.q16hdri-7-extra 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm8
Available with Ubuntu Pro
libmagickcore-6.q16hdri-7t64 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm8
Available with Ubuntu Pro
libmagickwand-6.q16-7t64 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm8
Available with Ubuntu Pro
libmagickwand-6.q16hdri-7t64 8:6.9.12.98+dfsg1-5.2ubuntu0.1~esm8
Available with Ubuntu Pro

Ubuntu 22.04 LTS
imagemagick-6.q16 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm9
Available with Ubuntu Pro
imagemagick-6.q16hdri 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm9
Available with Ubuntu Pro
libimage-magick-q16-perl 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm9
Available with Ubuntu Pro
libimage-magick-q16hdri-perl 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm9
Available with Ubuntu Pro
libmagick++-6.q16-8 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm9
Available with Ubuntu Pro
libmagick++-6.q16hdri-8 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm9
Available with Ubuntu Pro
libmagickcore-6.q16-6 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm9
Available with Ubuntu Pro
libmagickcore-6.q16-6-extra 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm9
Available with Ubuntu Pro
libmagickcore-6.q16hdri-6 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm9
Available with Ubuntu Pro
libmagickcore-6.q16hdri-6-extra 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm9
Available with Ubuntu Pro
libmagickwand-6.q16-6 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm9
Available with Ubuntu Pro
libmagickwand-6.q16hdri-6 8:6.9.11.60+dfsg-1.3ubuntu0.22.04.5+esm9
Available with Ubuntu Pro

Ubuntu 20.04 LTS
libimage-magick-q16-perl 8:6.9.10.23+dfsg-2.1ubuntu11.11+esm9
Available with Ubuntu Pro
libimage-magick-q16hdri-perl 8:6.9.10.23+dfsg-2.1ubuntu11.11+esm9
Available with Ubuntu Pro
libmagickcore-6.q16-6 8:6.9.10.23+dfsg-2.1ubuntu11.11+esm9
Available with Ubuntu Pro
libmagickcore-6.q16-6-extra 8:6.9.10.23+dfsg-2.1ubuntu11.11+esm9
Available with Ubuntu Pro
libmagickcore-6.q16hdri-6 8:6.9.10.23+dfsg-2.1ubuntu11.11+esm9
Available with Ubuntu Pro
libmagickcore-6.q16hdri-6-extra 8:6.9.10.23+dfsg-2.1ubuntu11.11+esm9
Available with Ubuntu Pro

Ubuntu 18.04 LTS
imagemagick-6.q16 8:6.9.7.4+dfsg-16ubuntu6.15+esm11
Available with Ubuntu Pro
imagemagick-6.q16hdri 8:6.9.7.4+dfsg-16ubuntu6.15+esm11
Available with Ubuntu Pro
libimage-magick-q16-perl 8:6.9.7.4+dfsg-16ubuntu6.15+esm11
Available with Ubuntu Pro
libimage-magick-q16hdri-perl 8:6.9.7.4+dfsg-16ubuntu6.15+esm11
Available with Ubuntu Pro
libmagick++-6.q16-7 8:6.9.7.4+dfsg-16ubuntu6.15+esm11
Available with Ubuntu Pro
libmagick++-6.q16hdri-7 8:6.9.7.4+dfsg-16ubuntu6.15+esm11
Available with Ubuntu Pro
libmagickcore-6.q16-3 8:6.9.7.4+dfsg-16ubuntu6.15+esm11
Available with Ubuntu Pro
libmagickcore-6.q16-3-extra 8:6.9.7.4+dfsg-16ubuntu6.15+esm11
Available with Ubuntu Pro
libmagickcore-6.q16hdri-3 8:6.9.7.4+dfsg-16ubuntu6.15+esm11
Available with Ubuntu Pro
libmagickcore-6.q16hdri-3-extra 8:6.9.7.4+dfsg-16ubuntu6.15+esm11
Available with Ubuntu Pro
libmagickwand-6.q16-3 8:6.9.7.4+dfsg-16ubuntu6.15+esm11
Available with Ubuntu Pro
libmagickwand-6.q16hdri-3 8:6.9.7.4+dfsg-16ubuntu6.15+esm11
Available with Ubuntu Pro

Ubuntu 16.04 LTS
imagemagick-6.q16 8:6.8.9.9-7ubuntu5.16+esm19
Available with Ubuntu Pro
libimage-magick-q16-perl 8:6.8.9.9-7ubuntu5.16+esm19
Available with Ubuntu Pro
libmagick++-6.q16-5v5 8:6.8.9.9-7ubuntu5.16+esm19
Available with Ubuntu Pro
libmagickcore-6.q16-2 8:6.8.9.9-7ubuntu5.16+esm19
Available with Ubuntu Pro
libmagickcore-6.q16-2-extra 8:6.8.9.9-7ubuntu5.16+esm19
Available with Ubuntu Pro
libmagickwand-6-headers 8:6.8.9.9-7ubuntu5.16+esm19
Available with Ubuntu Pro
libmagickwand-6.q16-2 8:6.8.9.9-7ubuntu5.16+esm19
Available with Ubuntu Pro

Ubuntu 14.04 LTS
imagemagick 8:6.7.7.10-6ubuntu3.13+esm20
Available with Ubuntu Pro
imagemagick-common 8:6.7.7.10-6ubuntu3.13+esm20
Available with Ubuntu Pro
libmagick++5 8:6.7.7.10-6ubuntu3.13+esm20
Available with Ubuntu Pro
libmagickcore5 8:6.7.7.10-6ubuntu3.13+esm20
Available with Ubuntu Pro
libmagickcore5-extra 8:6.7.7.10-6ubuntu3.13+esm20
Available with Ubuntu Pro
libmagickwand5 8:6.7.7.10-6ubuntu3.13+esm20
Available with Ubuntu Pro
perlmagick 8:6.7.7.10-6ubuntu3.13+esm20
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8127-1
CVE-2026-23952, CVE-2026-25795, CVE-2026-25796, CVE-2026-25798,
CVE-2026-25799, CVE-2026-25970, CVE-2026-25988, CVE-2026-26066,
CVE-2026-30883, CVE-2026-32636

Monday, March 30, 2026

[announce] Wednesday NYC*BUG Michael W Lucas

What's Changed Since The Last Time I Came this Way - a talk that was
supposed to be about OpenZFS, Michael W Lucas

2026-04-01 @ 18:45 local (22:45 UTC) - Backroom of Brass Monkey 55
Little West 12th St

Remote participation: Plans are to stream via NYC*BUG website. Q&A will
be via IRC on libera.chat channel #nycbug - please preface your
questions with '[Q]'.

Michael W Lucas and Allan Jude are busy working on a new OpenZFS book,
which means not only documenting everything that's changed in the last
12 years but discovering everything that they got wrong the first time.
The quest for accuracy has taken Lucas deep into mailing list archives,
Usenet, VAX installation manuals, the Kremlin's first Internet
connection, the United Nations' effort to merge the BSD projects, and
the ULTRIX and S51K filesystems, and left MWL more convinced than ever
that filesystems are nothing but a April Fools' prank. This hurriedly
conceived and hastily assembled talk will update you on new OpenZFS
features, but will also try to determine if it's a good prank–or not.


Michael W Lucas' name may ring a bell for some in the BSD community.
He's written several shelves of books. But for anyone who has seen him
speak in public during Ante COVID days, it was clear they are mere
transcriptions of his rambling presentations. For this NYC*BUG meeting,
he is unlikely to edit out any of his expected corny jokes we endure
during his conference presentations.

More likely, you know his name from his grotesque horror fiction. In the
same way his technical books are just transcriptions of his
presentations, his fictionaal horror is just a simple reflection of
someone who lives in a haunted house filled with (pet) rats in Detroit.

Nearest NYC Subway is the 14th Street/Eighth Avenue station L, A, C, E.

To get to the backroom, you must enter the front door, follow the long
bar on your left, and walk all the way to the back. At the rear of the
BrassMonkey, you will see an alcove for the 3 bathrooms our room is off
to your right.
_______________________________________________
announce mailing list
announce@lists.nycbug.org
https://lists.nycbug.org:8443/mailman/listinfo/announce

[USN-8132-1] Roundcube Webmail vulnerabilities

==========================================================================
Ubuntu Security Notice USN-8132-1
March 30, 2026

roundcube vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in Roundcube Webmail.

Software Description:
- roundcube: skinnable AJAX based webmail solution for IMAP servers - metapack

Details:

It was discovered that Roundcube Webmail did not properly sanitize
certain HTML elements within the e-mail body. An attacker could possibly
use this issue to cause a cross-site scripting attack. This issue was only
addressed in Ubuntu 16.04 LTS. (CVE-2016-4068, CVE-2016-4069)

It was discovered that Roundcube Webmail did not properly handle certain
configuration parameters. An attacker could possibly use this issue to
execute arbitrary code. This issue was only addressed in Ubuntu 16.04 LTS.
(CVE-2016-9920)

It was discovered that Roundcube Webmail did not properly sanitize CSS styles
within SVG documents. An attacker could possibly use this issue to cause
a cross-site scripting attack. This issue was only addressed in Ubuntu 16.04 LTS.
(CVE-2017-6820)

It was discovered that Roundcube Webmail did not properly restrict exec call in
certain drivers of the password plugin. An authenticated user could possibly
use this issue to perform arbitrary password resets. This issue was only addressed in
Ubuntu 16.04 LTS. (CVE-2017-8114)

It was discovered that Roundcube Webmail did not properly set file permissions within
the Enigma plugin. An attacker could possibly use this issue to exfiltrate GPG private
keys via network connectivity. (CVE-2018-1000071)

It was discovered that Roundcube Webmail did not properly handle GnuPG MDC
integrity-protection warnings. An attacker could possibly use this issue to obtain
sensitive information from encrypted communications. (CVE-2018-19205)

It was discovered that Roundcube Webmail did not properly sanitize <svg> and <style>
tags within HTML attachments. An attacker could possibly use this issue to cause a
cross-site scripting attack. (CVE-2018-19206)

It was discovered that Roundcube Webmail did not properly handle partially encrypted
multipart messages. An attacker could possibly use this issue to cause
leaking of the plaintext of encrypted messages via an email reply. (CVE-2019-10740)

It was discovered that Roundcube Webmail did not properly sanitize a certain parameter
within the archive plugin. An attacker could possibly use this issue to perform an
IMAP injection attack. This issue was only addressed in Ubuntu 16.04 LTS. (CVE-2018-9846)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS
roundcube-core 1.3.6+dfsg.1-1ubuntu0.1~esm7
Available with Ubuntu Pro
roundcube-plugins 1.3.6+dfsg.1-1ubuntu0.1~esm7
Available with Ubuntu Pro

Ubuntu 16.04 LTS
roundcube-core 1.2~beta+dfsg.1-0ubuntu1+esm7
Available with Ubuntu Pro
roundcube-plugins 1.2~beta+dfsg.1-0ubuntu1+esm7
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8132-1
CVE-2016-4068, CVE-2016-4069, CVE-2016-9920, CVE-2017-6820,
CVE-2017-8114, CVE-2018-1000071, CVE-2018-19205, CVE-2018-19206,
CVE-2018-9846, CVE-2019-10740