Hello,

Athos Ribeiro wrote:
  The first step is to assess if other supported Ubuntu versions are indeed affected.

As mentioned in an update to https://bugs.launchpad.net/ubuntu/+source/mapserver/+bug/2069291 :

 * mapserver for Noble (mapserver 8.0.1-4ubuntu2) is affected by
   CVE-2025-59431 and CVE-2026-33721, since the package was generated
   2024-03-31.
 * mapserver for Questing (Ubuntu 25.10) is affected by CVE-2026-33721,
   since the package was generated 2025 2025-05-23.
 * mapserver for Resolute (Ubuntu 26) is affected by CVE-2026-33721,
   since the package was generated 2026-01-26, and the CVE was
   published later in 2026.

They can probably all be fixed by (back-)porting patches or packages from Debian, but I'm wary about stepping in to help, because I would not have a system for them to be be used for real work, so the kind of testing I'd do would be very narrow.

And frankly, I'm disheartened by the amount of paperwork which seems to be involved with trying to help out. For example: Is the SRU process really needed for a package update which is not a new version (which only adds patches to an existing version?

--
Regards,
Troels Arvin

--
Ubuntu-motu mailing list
[email protected]
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-motu

Reply via email to