Security Advisory – 14 Apr 2026

Security fixes and advisories that landed overnight. Updated: 14 Apr 2026 21:01 GMT

Top items

Ubuntu

USN-8138-2: tar-rs vulnerability

This update provides the corresponding update for Ubuntu 20.04 LTS. It was discovered that tar-rs incorrectly handled symlinks when unpacking a tar archive, and a remote attacker could use a specially crafted tar archive to modify permissions of arbitrary directories outside the extraction root, and possibly escalate privileges.

  • Published: 14 Apr 2026 21:01 GMT
  • CVEs: Not stated in the advisory excerpt
  • Notes: incorrectly handled symlinks when unpacking a tar archive

USN-8168-2: Rust vulnerability

This update provides the corresponding update to Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. It was discovered that tar-rs embedded in rustc incorrectly handled symlinks when unpacking a tar archive, and a remote attacker could use a specially crafted tar archive to modify permissions of arbitrary directories outside the extraction root, and possibly escalate privileges.

  • Published: 14 Apr 2026 19:01 GMT
  • CVEs: Not stated in the advisory excerpt
  • Notes: tar-rs embedded in rustc incorrectly handled symlinks

USN-8174-1: XML::Parser vulnerabilities

It was discovered that XML::Parser incorrectly handled certain multi-byte UTF-8 characters. A remote attacker could use specially crafted XML data to cause XML::Parser to crash, resulting in a denial of service or to possibly execute arbitrary code.

  • Published: 14 Apr 2026 09:13 GMT
  • CVEs: CVE-2006-10002, CVE-2006-10003
  • Notes: incorrectly handled certain multi-byte UTF-8 characters

USN-8173-1: polkit vulnerabilities

It was discovered that polkit incorrectly handled nested elements in XML policy files, and a remote attacker could possibly use this issue to cause polkit to crash, resulting in a denial of service. A local attacker could possibly use long input to cause polkit to crash, resulting in a denial of service.

  • Published: 14 Apr 2026 09:02 GMT
  • CVEs: CVE-2025-7519, CVE-2026-4897
  • Notes: incorrectly handled nested elements in XML policy files

USN-8148-6: Linux kernel (Azure) vulnerabilities

Several security issues were discovered in the Linux kernel and an attacker could possibly use these to compromise the system. This update corrects flaws in the Cryptographic API, Netfilter, and Network traffic control subsystems.

  • Published: 14 Apr 2026 01:07 GMT
  • CVEs: CVE-2026-23060, CVE-2026-23074, CVE-2026-23111
  • Notes: Cryptographic API, Netfilter, Network traffic control

USN-8149-3: Linux kernel (Azure) vulnerabilities

Several security issues were discovered in the Linux kernel and an attacker could possibly use these to compromise the system. This update corrects flaws in the Cryptographic API, Netfilter, and Network traffic control subsystems.

  • Published: 14 Apr 2026 01:06 GMT
  • CVEs: CVE-2026-23060, CVE-2026-23074, CVE-2026-23111
  • Notes: Cryptographic API, Netfilter, Network traffic control

USN-8163-2: Linux kernel (Azure) vulnerabilities

Qualys discovered that several vulnerabilities existed in the AppArmor Linux kernel Security Module (LSM). An unprivileged local attacker could use these issues to load, replace, and remove arbitrary AppArmor profiles causing denial of service, exposure of sensitive information (kernel memory), local privilege escalation, or possibly escape a container.

  • Published: 14 Apr 2026 00:59 GMT
  • CVEs: CVE-2022-49465, CVE-2022-49635, CVE-2023-53041, CVE-2024-36903, CVE-2024-36927, CVE-2024-37354, CVE-2024-41014, CVE-2024-46830, CVE-2024-47666, CVE-2024-49968, CVE-2024-53114, CVE-2024-56538, CVE-2024-58011, CVE-2025-21780, CVE-2025-21861, CVE-2025-22022, CVE-2025-22058, CVE-2025-22111, CVE-2025-22121, CVE-2025-23143, CVE-2025-37849, CVE-2025-38022, CVE-2025-38129, CVE-2025-38236, CVE-2025-38248, CVE-2025-38556, CVE-2025-38584, CVE-2025-39869, CVE-2025-39873, CVE-2025-39876, CVE-2025-39880, CVE-2025-39883, CVE-2025-39885, CVE-2025-39907, CVE-2025-39911, CVE-2025-39913, CVE-2025-39923, CVE-2025-39934, CVE-2025-39937, CVE-2025-39943, CVE-2025-39945, CVE-2025-39949, CVE-2025-39951, CVE-2025-39953, CVE-2025-39955, CVE-2025-39967, CVE-2025-39968, CVE-2025-39969, CVE-2025-39970, CVE-2025-39971, CVE-2025-39972, CVE-2025-39973, CVE-2025-39980, CVE-2025-39985, CVE-2025-39986, CVE-2025-39987, CVE-2025-39988, CVE-2025-39994, CVE-2025-39995, CVE-2025-39996, CVE-2025-39998, CVE-2025-40001, CVE-2025-40006, CVE-2025-40011, CVE-2025-40020, CVE-2025-40021, CVE-2025-40026, CVE-2025-40027, CVE-2025-40029, CVE-2025-40030, CVE-2025-40035, CVE-2025-40040, CVE-2025-40042, CVE-2025-40043, CVE-2025-40044, CVE-2025-40048, CVE-2025-40049, CVE-2025-40053, CVE-2025-40055, CVE-2025-40060, CVE-2025-40068, CVE-2025-40070, CVE-2025-40078, CVE-2025-40081, CVE-2025-40083, CVE-2025-40085, CVE-2025-40087, CVE-2025-40088, CVE-2025-40092, CVE-2025-40094, CVE-2025-40105, CVE-2025-40106, CVE-2025-40109, CVE-2025-40110, CVE-2025-40111, CVE-2025-40112, CVE-2025-40115, CVE-2025-40116, CVE-2025-40118, CVE-2025-40120, CVE-2025-40121, CVE-2025-40124, CVE-2025-40125, CVE-2025-40126, CVE-2025-40127, CVE-2025-40134, CVE-2025-40140, CVE-2025-40153, CVE-2025-40154, CVE-2025-40167, CVE-2025-40171, CVE-2025-40173, CVE-2025-40178, CVE-2025-40179, CVE-2025-40183, CVE-2025-40187, CVE-2025-40188, CVE-2025-40194, CVE-2025-40200, CVE-2025-40204, CVE-2025-40205, CVE-2025-40211, CVE-2025-40215, CVE-2025-40219, CVE-2025-40220, CVE-2025-40223, CVE-2025-40231, CVE-2025-40233, CVE-2025-40240, CVE-2025-40243, CVE-2025-40244, CVE-2025-40245, CVE-2025-40248, CVE-2025-40252, CVE-2025-40253, CVE-2025-40254, CVE-2025-40257, CVE-2025-40258, CVE-2025-40259, CVE-2025-40261, CVE-2025-40262, CVE-2025-40263, CVE-2025-40264, CVE-2025-40269, CVE-2025-40271, CVE-2025-40272, CVE-2025-40273, CVE-2025-40275, CVE-2025-40277, CVE-2025-40278, CVE-2025-40279, CVE-2025-40280, CVE-2025-40281, CVE-2025-40282, CVE-2025-40283, CVE-2025-40304, CVE-2025-40306, CVE-2025-40308, CVE-2025-40309, CVE-2025-40312, CVE-2025-40313, CVE-2025-40314, CVE-2025-40315, CVE-2025-40317, CVE-2025-40319, CVE-2025-40321, CVE-2025-40322, CVE-2025-40324, CVE-2025-40331, CVE-2025-40342, CVE-2025-40343, CVE-2025-40345, CVE-2025-40346, CVE-2025-40349, CVE-2025-40351, CVE-2025-40360, CVE-2025-40363, CVE-2025-68168, CVE-2025-68176, CVE-2025-68177, CVE-2025-68185, CVE-2025-68191, CVE-2025-68192, CVE-2025-68194, CVE-2025-68200, CVE-2025-68204, CVE-2025-68217, CVE-2025-68220, CVE-2025-68227, CVE-2025-68229, CVE-2025-68238, CVE-2025-68241, CVE-2025-68244, CVE-2025-68245, CVE-2025-68249, CVE-2025-68254, CVE-2025-68255, CVE-2025-68257, CVE-2025-68258, CVE-2025-68261, CVE-2025-68264, CVE-2025-68266, CVE-2025-68282, CVE-2025-68284, CVE-2025-68285, CVE-2025-68286, CVE-2025-68287, CVE-2025-68288, CVE-2025-68289, CVE-2025-68290, CVE-2025-68295, CVE-2025-68301, CVE-2025-68302, CVE-2025-68303, CVE-2025-68308, CVE-2025-68312, CVE-2025-68321, CVE-2025-68325, CVE-2025-68327, CVE-2025-68328, CVE-2025-68330, CVE-2025-68331, CVE-2025-68332, CVE-2025-68335, CVE-2025-68336, CVE-2025-68337, CVE-2025-68339, CVE-2025-68344, CVE-2025-68346, CVE-2025-68349, CVE-2025-68354, CVE-2025-68362, CVE-2025-68364, CVE-2025-68366, CVE-2025-68367, CVE-2025-68372, CVE-2025-68724, CVE-2025-68727, CVE-2025-68728, CVE-2025-68732, CVE-2025-68733, CVE-2025-68734, CVE-2025-68740, CVE-2025-68746, CVE-2025-68757, CVE-2025-68758, CVE-2025-68759, CVE-2025-68764, CVE-2025-68765, CVE-2025-68767, CVE-2025-68769, CVE-2025-68771, CVE-2025-68774, CVE-2025-68776, CVE-2025-68777, CVE-2025-68780, CVE-2025-68782, CVE-2025-68783, CVE-2025-68785, CVE-2025-68787, CVE-2025-68788, CVE-2025-68795, CVE-2025-68796, CVE-2025-68797, CVE-2025-68799, CVE-2025-68800, CVE-2025-68801, CVE-2025-68803, CVE-2025-68804, CVE-2025-68808, CVE-2025-68813, CVE-2025-68814, CVE-2025-68815, CVE-2025-68816, CVE-2025-68818, CVE-2025-68819, CVE-2025-68820, CVE-2025-71064, CVE-2025-71066, CVE-2025-71068, CVE-2025-71069, CVE-2025-71075, CVE-2025-71077, CVE-2025-71078, CVE-2025-71079, CVE-2025-71081, CVE-2025-71082, CVE-2025-71083, CVE-2025-71084, CVE-2025-71085, CVE-2025-71086, CVE-2025-71087, CVE-2025-71091, CVE-2025-71093, CVE-2025-71094, CVE-2025-71096, CVE-2025-71097, CVE-2025-71098, CVE-2025-71102, CVE-2025-71104, CVE-2025-71105, CVE-2025-71108, CVE-2025-71111, CVE-2025-71112, CVE-2025-71113, CVE-2025-71114, CVE-2025-71116, CVE-2025-71118, CVE-2025-71120, CVE-2025-71121, CVE-2025-71125, CVE-2025-71127, CVE-2025-71131, CVE-2025-71132, CVE-2025-71133, CVE-2025-71136, CVE-2025-71137, CVE-2025-71147, CVE-2025-71154, CVE-2025-71180, CVE-2025-71182, CVE-2026-22976, CVE-2026-22977, CVE-2026-22978, CVE-2026-22980, CVE-2026-22982, CVE-2026-22984, CVE-2026-22990, CVE-2026-22991, CVE-2026-22992, CVE-2026-23019, CVE-2026-23020, CVE-2026-23021, CVE-2026-23047, CVE-2026-23060, CVE-2026-23074, CVE-2026-23111, CVE-2026-23202, CVE-2026-23207
  • Notes: An unprivileged local attacker could use these issues to load, replace, and remove arbitrary AppArmor profiles

Related posts

rclone | v1.73.5

rclone v1 73 5 released 2026 04 19: patch with fixes and backend updates, see changelog, test in staging, backup configs, pin versions, verify downloads

rclone | v1.73.5

rclone v1 73 5: maintenance release with fixes, backend updates and stability, assets and changelog on GitHub and rclone site, back up configs before upgrade

Security Advisory – 18 Apr 2026

Daily security advisory summary for 18 Apr 2026