[USN-8227-1] curl vulnerabilities
[USN-8228-1] Exim vulnerabilities
[USN-8229-1] sed vulnerability
[USN-8227-1] curl vulnerabilities
==========================================================================
Ubuntu Security Notice USN-8227-1
May 04, 2026
curl vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 26.04 LTS
- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
Summary:
curl could be made to expose sensitive information over the network.
Software Description:
- curl: HTTP, HTTPS, and FTP client and client libraries
Details:
It was discovered that curl incorrectly reused non-TLS connections when
TLS was required in some STARTTLS configurations. A remote attacker could
possibly use this issue to obtain sensitive information. (CVE-2026-4873)
It was discovered that curl incorrectly reused certain HTTP Negotiate
connections. A remote attacker could possibly use this issue to obtain
sensitive information. (CVE-2026-5545)
It was discovered that curl incorrectly reused certain SMB connections. A
remote attacker could possibly use this issue to obtain sensitive
information. (CVE-2026-5773)
It was discovered that curl could leak proxy credentials when handling
redirects in some configurations. A remote attacker could possibly use
this issue to obtain sensitive information. (CVE-2026-6253)
It was discovered that curl could leak cookies because of stale custom
cookie host handling in some requests. A remote attacker could possibly
use this issue to obtain sensitive information. (CVE-2026-6276)
It was discovered that curl could leak .netrc credentials when reusing
proxy connections in some situations. A remote attacker could possibly use
this issue to obtain sensitive information. (CVE-2026-6429)
It was discovered that curl could leak Digest authentication state when
switching proxies in some situations. A remote attacker could possibly use
this issue to obtain sensitive information. (CVE-2026-7168)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 26.04 LTS
curl 8.18.0-1ubuntu2.1
libcurl3t64-gnutls 8.18.0-1ubuntu2.1
libcurl4t64 8.18.0-1ubuntu2.1
Ubuntu 25.10
curl 8.14.1-2ubuntu1.3
libcurl3t64-gnutls 8.14.1-2ubuntu1.3
libcurl4t64 8.14.1-2ubuntu1.3
Ubuntu 24.04 LTS
curl 8.5.0-2ubuntu10.9
libcurl3t64-gnutls 8.5.0-2ubuntu10.9
libcurl4t64 8.5.0-2ubuntu10.9
Ubuntu 22.04 LTS
curl 7.81.0-1ubuntu1.24
libcurl3-gnutls 7.81.0-1ubuntu1.24
libcurl3-nss 7.81.0-1ubuntu1.24
libcurl4 7.81.0-1ubuntu1.24
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-8227-1
CVE-2026-4873, CVE-2026-5545, CVE-2026-5773, CVE-2026-6253,
CVE-2026-6276, CVE-2026-6429, CVE-2026-7168
Package Information:
https://launchpad.net/ubuntu/+source/curl/8.18.0-1ubuntu2.1
https://launchpad.net/ubuntu/+source/curl/8.14.1-2ubuntu1.3
https://launchpad.net/ubuntu/+source/curl/8.5.0-2ubuntu10.9
https://launchpad.net/ubuntu/+source/curl/7.81.0-1ubuntu1.24
[USN-8228-1] Exim vulnerabilities
==========================================================================
Ubuntu Security Notice USN-8228-1
May 04, 2026
exim4 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 26.04 LTS
- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in Exim.
Software Description:
- exim4: Exim is a mail transport agent
Details:
It was discovered that Exim incorrectly handled parsing malformed JSON
in message headers. A remote attacker could possibly use this issue to
execute arbitrary code. (CVE-2026-40685)
It was discovered that Exim incorrectly handled processing of UTF-8
trailing characters. A remote attacker could possibly use this issue to
obtain sensitive information. (CVE-2026-40686)
It was discovered that Exim incorrectly handled SPA authenticator input.
An authenticated user could possibly use this issue to execute arbitrary
code. (CVE-2026-40687)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 26.04 LTS
exim4 4.99.1-1ubuntu1.1
exim4-base 4.99.1-1ubuntu1.1
eximon4 4.99.1-1ubuntu1.1
Ubuntu 25.10
exim4 4.98.2-1ubuntu2.1
exim4-base 4.98.2-1ubuntu2.1
eximon4 4.98.2-1ubuntu2.1
Ubuntu 24.04 LTS
exim4 4.97-4ubuntu4.4
exim4-base 4.97-4ubuntu4.4
eximon4 4.97-4ubuntu4.4
Ubuntu 22.04 LTS
exim4 4.95-4ubuntu2.7
exim4-base 4.95-4ubuntu2.7
eximon4 4.95-4ubuntu2.7
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-8228-1
CVE-2026-40685, CVE-2026-40686, CVE-2026-40687
Package Information:
https://launchpad.net/ubuntu/+source/exim4/4.99.1-1ubuntu1.1
https://launchpad.net/ubuntu/+source/exim4/4.98.2-1ubuntu2.1
https://launchpad.net/ubuntu/+source/exim4/4.97-4ubuntu4.4
https://launchpad.net/ubuntu/+source/exim4/4.95-4ubuntu2.7
[USN-8229-1] sed vulnerability
==========================================================================
Ubuntu Security Notice USN-8229-1
May 04, 2026
sed vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 26.04 LTS
- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
Summary:
sed could be made to overwrite files.
Software Description:
- sed: GNU stream editor for filtering/transforming text
Details:
MichaĆ Majchrowicz and Marcin Wyczechowski discovered that sed incorrectly
handled symbolic links when performing in-place edits. A local attacker
could possibly use this issue to overwrite arbitrary files.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 26.04 LTS
sed 4.9-2ubuntu1
Ubuntu 25.10
sed 4.9-2ubuntu0.25.10.1
Ubuntu 24.04 LTS
sed 4.9-2ubuntu0.24.04.1
Ubuntu 22.04 LTS
sed 4.8-1ubuntu2.1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-8229-1
CVE-2026-5958
Package Information:
https://launchpad.net/ubuntu/+source/sed/4.9-2ubuntu1
https://launchpad.net/ubuntu/+source/sed/4.9-2ubuntu0.25.10.1
https://launchpad.net/ubuntu/+source/sed/4.9-2ubuntu0.24.04.1
https://launchpad.net/ubuntu/+source/sed/4.8-1ubuntu2.1