Ubuntu 7095 Published by

Ubuntu released a batch of security notices to address critical flaws across several widely used system packages. These patches cover essential tools such as jq, BIND9, and PostgreSQL alongside the Intel IoT Realtime kernel, closing loopholes that could let attackers run malicious code or crash entire services. Local attackers might also exploit weak sandbox configurations to delete arbitrary files on the host system. System administrators need to run a standard update right away and manually restart PostgreSQL once the installation finishes.

[USN-8202-3] jq regression
[USN-8291-1] Linux kernel (Intel IoTG Real-time) vulnerabilities
[USN-8288-1] Bubblewrap vulnerability
[USN-8287-1] XDG Desktop Portal vulnerability
[USN-8294-1] PostgreSQL vulnerabilities
[USN-8293-1] Bind vulnerabilities
[USN-8292-1] libarchive vulnerabilities




[USN-8202-3] jq regression


==========================================================================
Ubuntu Security Notice USN-8202-3
May 21, 2026

jq regression
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

USN-8202-1 introduced a regression in jq

Software Description:
- jq: lightweight and flexible command-line JSON processor

Details:

USN-8202-1 fixed vulnerabilities in jq. The update caused a regression
for Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

It was discovered that jq did not correctly handle certain string
concatenations. An attacker could possibly use this issue to cause a denial
of service or execute arbitrary code. This issue was addressed in Ubuntu
16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu
24.04 LTS and Ubuntu 25.10. (CVE-2026-32316)

It was discovered that jq did not correctly handle recursion in certain
circumstances. An attacker could possibly use this issue to cause a denial
of service. (CVE-2026-33947)

It was discovered that jq did not correctly handle improperly terminated
strings. An attacker could possibly use this issue to cause a denial of
service or execute arbitrary code. This issue was addressed in Ubuntu 16.04
LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS
and Ubuntu 25.10. (CVE-2026-33948)

It was discovered that jq did not correctly handle checking certain
variable types. An attacker could possibly use this issue to cause a denial
of service or leak sensitive information. This issue was addressed in
Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS,
Ubuntu 24.04 LTS and Ubuntu 25.10. (CVE-2026-39956)

It was discovered that jq did not correctly handle certain string
formatting. An attacker could possibly use this issue to leak sensitive
information or cause a denial of service. (CVE-2026-39979)

It was discovered that jq used a fixed seed for hash table operations. An
attacker could possibly use this issue to cause a denial of service. This
issue was addressed in Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04
LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS and Ubuntu 25.10. (CVE-2026-40164)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS
jq 1.6-1ubuntu0.20.04.1+esm3
Available with Ubuntu Pro
libjq-dev 1.6-1ubuntu0.20.04.1+esm3
Available with Ubuntu Pro
libjq1 1.6-1ubuntu0.20.04.1+esm3
Available with Ubuntu Pro

Ubuntu 18.04 LTS
jq 1.5+dfsg-2ubuntu0.1~esm3
Available with Ubuntu Pro
libjq-dev 1.5+dfsg-2ubuntu0.1~esm3
Available with Ubuntu Pro
libjq1 1.5+dfsg-2ubuntu0.1~esm3
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8202-3
https://ubuntu.com/security/notices/USN-8202-2
https://ubuntu.com/security/notices/USN-8202-1
CVE-2026-40164, https://bugs.launchpad.net/ubuntu/+source/jq/+bug/2152052



[USN-8291-1] Linux kernel (Intel IoTG Real-time) vulnerabilities


==========================================================================
Ubuntu Security Notice USN-8291-1
May 21, 2026

linux-intel-iot-realtime vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-intel-iot-realtime: Linux kernel for Intel IoT Real-time platforms

Details:

Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- SMB network file system;
- Netfilter;
- io_uring subsystem;
(CVE-2024-35862, CVE-2024-50060, CVE-2026-23274, CVE-2026-23351)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS
linux-image-5.15.0-1099-intel-iot-realtime 5.15.0-1099.101
Available with Ubuntu Pro
linux-image-intel-iot-realtime 5.15.0.1099.103
Available with Ubuntu Pro
linux-image-intel-iot-realtime-5.15 5.15.0.1099.103
Available with Ubuntu Pro

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://ubuntu.com/security/notices/USN-8291-1
CVE-2024-35862, CVE-2024-50060, CVE-2026-23274, CVE-2026-23351

Package Information:

https://launchpad.net/ubuntu/+source/linux-intel-iot-realtime/5.15.0-1099.101



[USN-8288-1] Bubblewrap vulnerability


==========================================================================
Ubuntu Security Notice USN-8288-1
May 20, 2026

bubblewrap vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 26.04 LTS
- Ubuntu 25.10

Summary:

Bubblewrap could be made to bypass sandbox restrictions.

Software Description:
- bubblewrap: Low-level unprivileged sandboxing tool used by Flatpak and similar projects

Details:

It was discovered that Bubblewrap incorrectly handled the sandbox
setup phase when installed in setuid mode. A local attacker could
possibly use this issue to bypass sandbox restrictions.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 26.04 LTS
bubblewrap 0.11.1-1ubuntu0.1

Ubuntu 25.10
bubblewrap 0.11.0-2ubuntu0.1

In general, a standard system update will make all the necessary
changes.

References:
https://ubuntu.com/security/notices/USN-8288-1
CVE-2026-41163

Package Information:
https://launchpad.net/ubuntu/+source/bubblewrap/0.11.1-1ubuntu0.1
https://launchpad.net/ubuntu/+source/bubblewrap/0.11.0-2ubuntu0.1



[USN-8287-1] XDG Desktop Portal vulnerability


==========================================================================
Ubuntu Security Notice USN-8287-1
May 20, 2026

xdg-desktop-portal vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.10
- Ubuntu 24.04 LTS

Summary:

XDG Desktop Portal could be made to delete files.

Software Description:
- xdg-desktop-portal: A portal frontend service for Flatpak and other desktop containment frameworks

Details:

It was discovered that XDG Desktop Portal incorrectly handled
trashing files. A local attacker could possibly use this issue to
delete arbitrary files on the host file system via a symlink attack.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.10
xdg-desktop-portal 1.20.3+ds-1ubuntu1.1
xdg-desktop-portal-dev 1.20.3+ds-1ubuntu1.1

Ubuntu 24.04 LTS
xdg-desktop-portal 1.18.4-1ubuntu2.24.04.2
xdg-desktop-portal-dev 1.18.4-1ubuntu2.24.04.2

In general, a standard system update will make all the necessary
changes.

References:
https://ubuntu.com/security/notices/USN-8287-1
CVE-2026-40354

Package Information:
https://launchpad.net/ubuntu/+source/xdg-desktop-portal/1.20.3+ds-1ubuntu1.1
https://launchpad.net/ubuntu/+source/xdg-desktop-portal/1.18.4-1ubuntu2.24.04.2



[USN-8294-1] PostgreSQL vulnerabilities


==========================================================================
Ubuntu Security Notice USN-8294-1
May 21, 2026

postgresql-14, postgresql-16, postgresql-17, postgresql-18 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 26.04 LTS
- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in PostgreSQL.

Software Description:
- postgresql-18: Object-relational SQL database
- postgresql-17: Object-relational SQL database
- postgresql-16: Object-relational SQL database
- postgresql-14: Object-relational SQL database

Details:

It was discovered that PostgreSQL did not correctly enforce authorization
for CREATE TYPE. An attacker could possibly use this issue to execute
arbitrary SQL functions. (CVE-2026-6472)

It was discovered that PostgreSQL incorrectly handled large user input in
multiple server features. An attacker could possibly use this issue to
cause PostgreSQL to crash, resulting in a denial of service, or execute
arbitrary code. (CVE-2026-6473)

It was discovered that PostgreSQL incorrectly handled format strings in
the timeofday() function. An attacker could possibly use this issue to
obtain sensitive information. (CVE-2026-6474)

It was discovered that PostgreSQL incorrectly followed symbolic links in
pg_basebackup and pg_rewind. An attacker could possibly use this issue to
overwrite local files and execute arbitrary code. (CVE-2026-6475)

It was discovered that PostgreSQL had an SQL injection vulnerability in
pg_createsubscriber. An attacker could possibly use this issue to execute
arbitrary SQL as a superuser. This issue only affected Ubuntu 25.10 and
Ubuntu 26.04 LTS. (CVE-2026-6476)

It was discovered that PostgreSQL used an unsafe libpq function in large
object operations. An attacker could possibly use this issue to overwrite
client memory and execute arbitrary code. (CVE-2026-6477)

It was discovered that PostgreSQL did not compare MD5-hashed passwords in
constant time. An attacker could possibly use this issue to obtain
sensitive information. (CVE-2026-6478)

It was discovered that PostgreSQL had uncontrolled recursion during SSL and
GSS negotiation. An attacker could possibly use this issue to cause a
denial of service. (CVE-2026-6479)

It was discovered that PostgreSQL incorrectly handled array length
mismatches in pg_restore_attribute_stats(). An attacker could possibly use
this issue to obtain sensitive information. This issue only affected Ubuntu
26.04 LTS. (CVE-2026-6575)

It was discovered that PostgreSQL had a stack buffer overflow in the refint
module. An attacker could use this issue to cause PostgreSQL to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2026-6637)

It was discovered that PostgreSQL had an SQL injection vulnerability in
logical replication REFRESH PUBLICATION. An attacker could possibly use
this issue to execute arbitrary SQL. This issue only affected Ubuntu 24.04
LTS, Ubuntu 25.10, and Ubuntu 26.04 LTS. (CVE-2026-6638)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 26.04 LTS
postgresql-18 18.4-0ubuntu0.26.04.1

Ubuntu 25.10
postgresql-17 17.10-0ubuntu0.25.10.1

Ubuntu 24.04 LTS
postgresql-16 16.14-0ubuntu0.24.04.1

Ubuntu 22.04 LTS
postgresql-14 14.23-0ubuntu0.22.04.1

This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart PostgreSQL to
make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8294-1
CVE-2026-6472, CVE-2026-6473, CVE-2026-6474, CVE-2026-6475,
CVE-2026-6476, CVE-2026-6477, CVE-2026-6478, CVE-2026-6479,
CVE-2026-6575, CVE-2026-6637, CVE-2026-6638

Package Information:
https://launchpad.net/ubuntu/+source/postgresql-18/18.4-0ubuntu0.26.04.1
https://launchpad.net/ubuntu/+source/postgresql-17/17.10-0ubuntu0.25.10.1
https://launchpad.net/ubuntu/+source/postgresql-16/16.14-0ubuntu0.24.04.1
https://launchpad.net/ubuntu/+source/postgresql-14/14.23-0ubuntu0.22.04.1



[USN-8293-1] Bind vulnerabilities


==========================================================================
Ubuntu Security Notice USN-8293-1
May 21, 2026

bind9 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 26.04 LTS
- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in Bind.

Software Description:
- bind9: Internet Domain Name Server

Details:

Vitaly Simonovich discovered that Bind could exhaust memory during GSS-API
TKEY negotiation. A remote attacker could possibly use this issue to cause
Bind to use excessive resources, leading to a denial of service.
(CVE-2026-3039)

Shuhan Zhang discovered that Bind incorrectly handled self-pointed glue
records. A remote attacker could possibly use this issue to use Bind in
denial of service amplification attacks against other systems.
(CVE-2026-3592)

Naresh Kandula Parmar discovered that Bind incorrectly handled memory in
the DNS-over-HTTPS implementation. A remote attacker could possibly use
this issue to cause Bind to crash, resulting in a denial of service, or
execute arbitrary code. This issue only affected Ubuntu 25.10 and Ubuntu
26.04 LTS. (CVE-2026-3593)

It was discovered that Bind incorrectly handled DNS messages whose class
was not IN. A remote attacker could possibly use this issue to cause Bind
to crash, resulting in a denial of service. (CVE-2026-5946)

Naoki Wakamatsu discovered that Bind incorrectly handled SIG(0) validation
during a query flood. A remote attacker could possibly use this issue to
cause Bind to crash, resulting in a denial of service. This issue only
affected Ubuntu 25.10 and Ubuntu 26.04 LTS. (CVE-2026-5947)

Billy Baraja discovered that Bind had an unbounded resend loop in the
resolver. A remote attacker could possibly use this issue to cause Bind to
use excessive resources, leading to a denial of service. (CVE-2026-5950)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 26.04 LTS
bind9 1:9.20.18-1ubuntu2.1

Ubuntu 25.10
bind9 1:9.20.11-1ubuntu2.4

Ubuntu 24.04 LTS
bind9 1:9.18.39-0ubuntu0.24.04.5

Ubuntu 22.04 LTS
bind9 1:9.18.39-0ubuntu0.22.04.4

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8293-1
CVE-2026-3039, CVE-2026-3592, CVE-2026-3593, CVE-2026-5946,
CVE-2026-5947, CVE-2026-5950

Package Information:
https://launchpad.net/ubuntu/+source/bind9/1:9.20.18-1ubuntu2.1
https://launchpad.net/ubuntu/+source/bind9/1:9.20.11-1ubuntu2.4
https://launchpad.net/ubuntu/+source/bind9/1:9.18.39-0ubuntu0.24.04.5
https://launchpad.net/ubuntu/+source/bind9/1:9.18.39-0ubuntu0.22.04.4



[USN-8292-1] libarchive vulnerabilities


==========================================================================
Ubuntu Security Notice USN-8292-1
May 21, 2026

libarchive vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 26.04 LTS
- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in libarchive.

Software Description:
- libarchive: Library to read/write archive files

Details:

It was discovered that libarchive incorrectly handled certain RAR
archives. An attacker could possibly use this issue to cause an
out-of-bounds read via a crafted RAR archive, leading to sensitive
memory disclosure. (CVE-2026-4424)

It was discovered that libarchive incorrectly handled certain ISO files.
An attacker could possibly use this issue to cause incorrect memory
allocation via a crafted ISO file, leading to a denial of service.
(CVE-2026-4426)

It was discovered that libarchive incorrectly handled block pointer
allocation in zisofs on 32-bit systems. An attacker could possibly use
this issue to cause a heap buffer overflow via a crafted ISO9660 image,
possibly leading to arbitrary code execution. (CVE-2026-5121)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 26.04 LTS
libarchive-dev 3.8.5-1ubuntu2.1
libarchive-tools 3.8.5-1ubuntu2.1
libarchive13t64 3.8.5-1ubuntu2.1

Ubuntu 25.10
libarchive-dev 3.7.7-0ubuntu3.2
libarchive-tools 3.7.7-0ubuntu3.2
libarchive13t64 3.7.7-0ubuntu3.2

Ubuntu 24.04 LTS
libarchive-dev 3.7.2-2ubuntu0.7
libarchive-tools 3.7.2-2ubuntu0.7
libarchive13t64 3.7.2-2ubuntu0.7

Ubuntu 22.04 LTS
libarchive-dev 3.6.0-1ubuntu1.7
libarchive-tools 3.6.0-1ubuntu1.7
libarchive13 3.6.0-1ubuntu1.7

Ubuntu 20.04 LTS
libarchive-dev 3.4.0-2ubuntu1.5+esm2
Available with Ubuntu Pro
libarchive-tools 3.4.0-2ubuntu1.5+esm2
Available with Ubuntu Pro
libarchive13 3.4.0-2ubuntu1.5+esm2
Available with Ubuntu Pro

Ubuntu 18.04 LTS
bsdcpio 3.2.2-3.1ubuntu0.7+esm3
Available with Ubuntu Pro
bsdtar 3.2.2-3.1ubuntu0.7+esm3
Available with Ubuntu Pro
libarchive-dev 3.2.2-3.1ubuntu0.7+esm3
Available with Ubuntu Pro
libarchive-tools 3.2.2-3.1ubuntu0.7+esm3
Available with Ubuntu Pro
libarchive13 3.2.2-3.1ubuntu0.7+esm3
Available with Ubuntu Pro

Ubuntu 16.04 LTS
bsdcpio 3.1.2-11ubuntu0.16.04.8+esm3
Available with Ubuntu Pro
bsdtar 3.1.2-11ubuntu0.16.04.8+esm3
Available with Ubuntu Pro
libarchive-dev 3.1.2-11ubuntu0.16.04.8+esm3
Available with Ubuntu Pro
libarchive13 3.1.2-11ubuntu0.16.04.8+esm3
Available with Ubuntu Pro

Ubuntu 14.04 LTS
bsdcpio 3.1.2-7ubuntu2.8+esm5
Available with Ubuntu Pro
bsdtar 3.1.2-7ubuntu2.8+esm5
Available with Ubuntu Pro
libarchive-dev 3.1.2-7ubuntu2.8+esm5
Available with Ubuntu Pro
libarchive13 3.1.2-7ubuntu2.8+esm5
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8292-1
CVE-2026-4424, CVE-2026-4426, CVE-2026-5121

Package Information:
https://launchpad.net/ubuntu/+source/libarchive/3.8.5-1ubuntu2.1
https://launchpad.net/ubuntu/+source/libarchive/3.7.7-0ubuntu3.2
https://launchpad.net/ubuntu/+source/libarchive/3.7.2-2ubuntu0.7
https://launchpad.net/ubuntu/+source/libarchive/3.6.0-1ubuntu1.7