[USN-8160-1] MongoDB vulnerability
[USN-8161-1] QEMU vulnerabilities
[USN-8160-1] MongoDB vulnerability
==========================================================================
Ubuntu Security Notice USN-8160-1
April 09, 2026
mongodb vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
Summary:
MongoDB could be made to expose sensitive information over the
network.
Software Description:
- mongodb: object/document-oriented database
Details:
It was discovered that MongoDB incorrectly handled length parameters
in zlib-compressed network messages prior to authentication. An
unauthenticated remote attacker could possibly use this issue to
cause MongoDB to allocate an oversized memory buffer, resulting
in the exposure of sensitive information.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.04 LTS
mongodb 1:3.6.9+really3.6.8+90~g8e540c0b6d-0ubuntu5.3+esm1
Available with Ubuntu Pro
mongodb-clients 1:3.6.9+really3.6.8+90~g8e540c0b6d-0ubuntu5.3+esm1
Available with Ubuntu Pro
mongodb-server 1:3.6.9+really3.6.8+90~g8e540c0b6d-0ubuntu5.3+esm1
Available with Ubuntu Pro
mongodb-server-core 1:3.6.9+really3.6.8+90~g8e540c0b6d-0ubuntu5.3+esm1
Available with Ubuntu Pro
Ubuntu 18.04 LTS
mongodb 1:3.6.3-0ubuntu1.4+esm2
Available with Ubuntu Pro
mongodb-clients 1:3.6.3-0ubuntu1.4+esm2
Available with Ubuntu Pro
mongodb-server 1:3.6.3-0ubuntu1.4+esm2
Available with Ubuntu Pro
mongodb-server-core 1:3.6.3-0ubuntu1.4+esm2
Available with Ubuntu Pro
After a standard system update you need to restart the mongodb
service to make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-8160-1
CVE-2025-14847
[USN-8161-1] QEMU vulnerabilities
==========================================================================
Ubuntu Security Notice USN-8161-1
April 09, 2026
qemu vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in QEMU.
Software Description:
- qemu: Machine emulator and virtualizer
Details:
It was discovered that the LSI53C895A SCSI Host Bus Adapter implementation
of QEMU incorrectly handled memory. An attacker inside the guest could
possibly use this issue to cause QEMU to crash, resulting in a denial of
service, or possibly execute arbitrary code. (CVE-2024-6519)
It was discovered that QEMU could be made to read out of bounds when
reading VMDK images. If a user or an automated system were tricked into
opening a specially crafted VMDK image, an attacker could possibly use
this issue to leak sensitive informaton or cause QEMU to crash, resulting
in a denial of service. (CVE-2026-2243)
It was discovered that the virtio-snd device implementation of QEMU could
be made to write out of bounds. An attacker inside the guest could
possibly use this issue to cause QEMU to crash, resulting in a denial of
service, or possibly execute arbitrary code. This issue only affected
Ubuntu 24.04 LTS and Ubuntu 25.10. (CVE-2026-3195)
It was discovered that the virtio-snd device implementation of QEMU
contained an arithmetic overflow. An attacker inside the guest could
possibly use this issue to cause QEMU to crash, resulting in a denial of
service, or possibly execute arbitrary code. This issue only affected
Ubuntu 24.04 LTS and Ubuntu 25.10. (CVE-2026-3196)
It was discovered that the Hyper-V Synthetic Debugging device
implementation of QEMU could me made to write out of bounds. An attacker
inside the guest could possibly use this issue to cause QEMU to crash,
resulting in a denial of service, or possibly execute arbitrary code. This
issue only affected Ubuntu 24.04 LTS and Ubuntu 25.10. (CVE-2026-3842)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 25.10
qemu-system 1:10.1.0+ds-5ubuntu2.6
qemu-system-arm 1:10.1.0+ds-5ubuntu2.6
qemu-system-common 1:10.1.0+ds-5ubuntu2.6
qemu-system-data 1:10.1.0+ds-5ubuntu2.6
qemu-system-gui 1:10.1.0+ds-5ubuntu2.6
qemu-system-mips 1:10.1.0+ds-5ubuntu2.6
qemu-system-misc 1:10.1.0+ds-5ubuntu2.6
qemu-system-modules-opengl 1:10.1.0+ds-5ubuntu2.6
qemu-system-modules-spice 1:10.1.0+ds-5ubuntu2.6
qemu-system-ppc 1:10.1.0+ds-5ubuntu2.6
qemu-system-riscv 1:10.1.0+ds-5ubuntu2.6
qemu-system-s390x 1:10.1.0+ds-5ubuntu2.6
qemu-system-sparc 1:10.1.0+ds-5ubuntu2.6
qemu-system-x86 1:10.1.0+ds-5ubuntu2.6
qemu-system-x86-xen 1:10.1.0+ds-5ubuntu2.6
qemu-system-xen 1:10.1.0+ds-5ubuntu2.6
Ubuntu 24.04 LTS
qemu-system 1:8.2.2+ds-0ubuntu1.16
qemu-system-arm 1:8.2.2+ds-0ubuntu1.16
qemu-system-common 1:8.2.2+ds-0ubuntu1.16
qemu-system-data 1:8.2.2+ds-0ubuntu1.16
qemu-system-gui 1:8.2.2+ds-0ubuntu1.16
qemu-system-mips 1:8.2.2+ds-0ubuntu1.16
qemu-system-misc 1:8.2.2+ds-0ubuntu1.16
qemu-system-modules-opengl 1:8.2.2+ds-0ubuntu1.16
qemu-system-modules-spice 1:8.2.2+ds-0ubuntu1.16
qemu-system-ppc 1:8.2.2+ds-0ubuntu1.16
qemu-system-s390x 1:8.2.2+ds-0ubuntu1.16
qemu-system-sparc 1:8.2.2+ds-0ubuntu1.16
qemu-system-x86 1:8.2.2+ds-0ubuntu1.16
qemu-system-x86-xen 1:8.2.2+ds-0ubuntu1.16
qemu-system-xen 1:8.2.2+ds-0ubuntu1.16
Ubuntu 22.04 LTS
qemu 1:6.2+dfsg-2ubuntu6.30
qemu-system 1:6.2+dfsg-2ubuntu6.30
qemu-system-arm 1:6.2+dfsg-2ubuntu6.30
qemu-system-common 1:6.2+dfsg-2ubuntu6.30
qemu-system-data 1:6.2+dfsg-2ubuntu6.30
qemu-system-gui 1:6.2+dfsg-2ubuntu6.30
qemu-system-mips 1:6.2+dfsg-2ubuntu6.30
qemu-system-misc 1:6.2+dfsg-2ubuntu6.30
qemu-system-ppc 1:6.2+dfsg-2ubuntu6.30
qemu-system-s390x 1:6.2+dfsg-2ubuntu6.30
qemu-system-sparc 1:6.2+dfsg-2ubuntu6.30
qemu-system-x86 1:6.2+dfsg-2ubuntu6.30
qemu-system-x86-microvm 1:6.2+dfsg-2ubuntu6.30
qemu-system-x86-xen 1:6.2+dfsg-2ubuntu6.30
After a standard system update you need to restart all QEMU virtual
machines to make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-8161-1
CVE-2024-6519, CVE-2026-2243, CVE-2026-3195, CVE-2026-3196,
CVE-2026-3842
Package Information:
https://launchpad.net/ubuntu/+source/qemu/1:10.1.0+ds-5ubuntu2.6
https://launchpad.net/ubuntu/+source/qemu/1:8.2.2+ds-0ubuntu1.16
https://launchpad.net/ubuntu/+source/qemu/1:6.2+dfsg-2ubuntu6.30