General#
Univention Corporate Server 5.2-5 includes all security updates issued for UCS 5.2-4:
apache2 (CVE-2025-55753, CVE-2025-58098, CVE-2025-59775, CVE-2025-65082, CVE-2025-66200) (Bug #58945)
bind9 (CVE-2025-13878) (Bug #58995)
clamav (CVE-2025-20234) (Bug #58962)
containerd (CVE-2024-25621, CVE-2025-64329) (Bug #58893)
cups-filters (CVE-2025-57812, CVE-2025-64503, CVE-2025-64524) (Bug #58944)
ffmpeg (CVE-2024-36618, CVE-2025-1594, CVE-2025-63757) (Bug #58928)
firefox-esr (CVE-2025-14321, CVE-2025-14322, CVE-2025-14323, CVE-2025-14324, CVE-2025-14325, CVE-2025-14327, CVE-2025-14328, CVE-2025-14329, CVE-2025-14330, CVE-2025-14331, CVE-2025-14333, CVE-2026-0877, CVE-2026-0878, CVE-2026-0879, CVE-2026-0880, CVE-2026-0882, CVE-2026-0883, CVE-2026-0884, CVE-2026-0885, CVE-2026-0886, CVE-2026-0887, CVE-2026-0890, CVE-2026-0891) (Bug #58901, Bug #58983)
gdk-pixbuf (CVE-2025-7345) (Bug #58957)
git (CVE-2025-27613, CVE-2025-46835, CVE-2025-48384, CVE-2025-48385) (Bug #58951)
glib2.0 (CVE-2025-13601, CVE-2025-14087, CVE-2025-14512) (Bug #58952)
gnupg2 (CVE-2025-68973) (Bug #58958)
gnutls28 (CVE-2025-14831, CVE-2025-9820) (Bug #59066)
imagemagick (CVE-2025-57803, CVE-2025-62171, CVE-2025-65955, CVE-2025-66628, CVE-2025-68469, CVE-2025-68618, CVE-2025-68950, CVE-2025-69204, CVE-2026-23874, CVE-2026-23876, CVE-2026-23952) (Bug #58947, Bug #59014)
inetutils (CVE-2026-24061) (Bug #59004)
libpng1.6 (CVE-2025-64505, CVE-2025-64506, CVE-2025-64720, CVE-2025-65018, CVE-2025-66293, CVE-2026-22695, CVE-2026-22801, CVE-2026-25646) (Bug #58902, Bug #59065)
libsodium (CVE-2025-69277) (Bug #58949)
libssh (CVE-2025-4877, CVE-2025-4878, CVE-2025-5318, CVE-2025-5351, CVE-2025-5372, CVE-2025-5987, CVE-2025-8114, CVE-2025-8277) (Bug #58948)
libvpx (CVE-2026-1861, CVE-2026-2447) (Bug #59067)
libxml2 (CVE-2025-7425, CVE-2025-9714) (Bug #58963)
linux (CVE-2023-52658, CVE-2023-53421, CVE-2023-54285, CVE-2024-42079, CVE-2024-46786, CVE-2024-49968, CVE-2025-21946, CVE-2025-22022, CVE-2025-22083, CVE-2025-22090, CVE-2025-22107, CVE-2025-22111, CVE-2025-22121, CVE-2025-37899, CVE-2025-37926, CVE-2025-38022, CVE-2025-38057, CVE-2025-38073, CVE-2025-38104, CVE-2025-38125, CVE-2025-38129, CVE-2025-38232, CVE-2025-38361, CVE-2025-38408, CVE-2025-38591, CVE-2025-38678, CVE-2025-38718, CVE-2025-39721, CVE-2025-39805, CVE-2025-39871, CVE-2025-40039, CVE-2025-40083, CVE-2025-40110, CVE-2025-40149, CVE-2025-40164, CVE-2025-40211, CVE-2025-40214, CVE-2025-40215, CVE-2025-40253, CVE-2025-40254, CVE-2025-40257, CVE-2025-40258, CVE-2025-40259, CVE-2025-40261, CVE-2025-40262, CVE-2025-40263, CVE-2025-40264, CVE-2025-40269, CVE-2025-40271, CVE-2025-40272, CVE-2025-40273, CVE-2025-40275, CVE-2025-40277, CVE-2025-40278, CVE-2025-40279, CVE-2025-40280, CVE-2025-40281, CVE-2025-40282, CVE-2025-40283, CVE-2025-40284, CVE-2025-40285, CVE-2025-40286, CVE-2025-40288, CVE-2025-40292, CVE-2025-40293, CVE-2025-40294, CVE-2025-40297, CVE-2025-40301, CVE-2025-40304, CVE-2025-40306, CVE-2025-40308, CVE-2025-40309, CVE-2025-40312, CVE-2025-40314, CVE-2025-40315, CVE-2025-40317, CVE-2025-40318, CVE-2025-40319, CVE-2025-40321, CVE-2025-40322, CVE-2025-40324, CVE-2025-40331, CVE-2025-40341, CVE-2025-40342, CVE-2025-40343, CVE-2025-68211, CVE-2025-68223, CVE-2025-68254, CVE-2025-68255, CVE-2025-68256, CVE-2025-68257, CVE-2025-68258, CVE-2025-68259, CVE-2025-68261, CVE-2025-68263, CVE-2025-68264, CVE-2025-68266, CVE-2025-68291, CVE-2025-68325, CVE-2025-68332, CVE-2025-68335, CVE-2025-68336, CVE-2025-68337, CVE-2025-68340, CVE-2025-68344, CVE-2025-68345, CVE-2025-68346, CVE-2025-68347, CVE-2025-68349, CVE-2025-68354, CVE-2025-68362, CVE-2025-68363, CVE-2025-68364, CVE-2025-68365, CVE-2025-68366, CVE-2025-68367, CVE-2025-68369, CVE-2025-68371, CVE-2025-68372, CVE-2025-68380, CVE-2025-68724, CVE-2025-68725, CVE-2025-68727, CVE-2025-68728, CVE-2025-68732, CVE-2025-68733, CVE-2025-68740, CVE-2025-68742, CVE-2025-68746, CVE-2025-68753, CVE-2025-68757, CVE-2025-68758, CVE-2025-68759, CVE-2025-68764, CVE-2025-68765, CVE-2025-68766, CVE-2025-68767, CVE-2025-68769, CVE-2025-68771, CVE-2025-68772, CVE-2025-68773, CVE-2025-68774, CVE-2025-68776, CVE-2025-68777, CVE-2025-68778, CVE-2025-68780, CVE-2025-68781, CVE-2025-68782, CVE-2025-68783, CVE-2025-68785, CVE-2025-68786, CVE-2025-68787, CVE-2025-68788, CVE-2025-68789, CVE-2025-68795, CVE-2025-68796, CVE-2025-68797, CVE-2025-68798, CVE-2025-68799, CVE-2025-68800, CVE-2025-68801, CVE-2025-68803, CVE-2025-68804, CVE-2025-68806, CVE-2025-68808, CVE-2025-68813, CVE-2025-68814, CVE-2025-68815, CVE-2025-68816, CVE-2025-68817, CVE-2025-68818, CVE-2025-68819, CVE-2025-68820, CVE-2025-68821, CVE-2025-71064, CVE-2025-71066, CVE-2025-71069, CVE-2025-71071, CVE-2025-71075, CVE-2025-71077, CVE-2025-71078, CVE-2025-71079, CVE-2025-71081, CVE-2025-71082, CVE-2025-71083, CVE-2025-71084, CVE-2025-71085, CVE-2025-71086, CVE-2025-71087, CVE-2025-71088, CVE-2025-71091, CVE-2025-71093, CVE-2025-71094, CVE-2025-71095, CVE-2025-71096, CVE-2025-71097, CVE-2025-71098, CVE-2025-71102, CVE-2025-71104, CVE-2025-71105, CVE-2025-71108, CVE-2025-71111, CVE-2025-71112, CVE-2025-71113, CVE-2025-71114, CVE-2025-71116, CVE-2025-71118, CVE-2025-71119, CVE-2025-71120, CVE-2025-71121, CVE-2025-71123, CVE-2025-71125, CVE-2025-71126, CVE-2025-71127, CVE-2025-71130, CVE-2025-71131, CVE-2025-71132, CVE-2025-71133, CVE-2025-71136, CVE-2025-71137, CVE-2025-71147, CVE-2025-71149, CVE-2025-71150, CVE-2025-71154, CVE-2025-71162, CVE-2025-71163, CVE-2025-71180, CVE-2025-71182, CVE-2025-71183, CVE-2025-71185, CVE-2025-71186, CVE-2025-71189, CVE-2025-71190, CVE-2025-71191, CVE-2025-71192, CVE-2025-71194, CVE-2025-71196, CVE-2025-71197, CVE-2025-71199, CVE-2026-22976, CVE-2026-22977, CVE-2026-22978, CVE-2026-22979, CVE-2026-22980, CVE-2026-22982, CVE-2026-22984, CVE-2026-22990, CVE-2026-22991, CVE-2026-22992, CVE-2026-22994, CVE-2026-22997, CVE-2026-22998, CVE-2026-22999, CVE-2026-23001, CVE-2026-23003, CVE-2026-23005, CVE-2026-23006, CVE-2026-23010, CVE-2026-23011, CVE-2026-23019, CVE-2026-23020, CVE-2026-23021, CVE-2026-23025, CVE-2026-23026, CVE-2026-23030, CVE-2026-23031, CVE-2026-23033, CVE-2026-23037, CVE-2026-23038, CVE-2026-23047, CVE-2026-23049, CVE-2026-23054, CVE-2026-23056, CVE-2026-23058, CVE-2026-23060, CVE-2026-23061, CVE-2026-23063, CVE-2026-23064, CVE-2026-23068, CVE-2026-23069, CVE-2026-23071, CVE-2026-23073, CVE-2026-23074, CVE-2026-23075, CVE-2026-23076, CVE-2026-23078, CVE-2026-23080, CVE-2026-23083, CVE-2026-23084, CVE-2026-23085, CVE-2026-23086, CVE-2026-23087, CVE-2026-23089, CVE-2026-23090, CVE-2026-23091, CVE-2026-23093, CVE-2026-23095, CVE-2026-23096, CVE-2026-23097, CVE-2026-23098, CVE-2026-23099, CVE-2026-23101, CVE-2026-23102, CVE-2026-23103, CVE-2026-23105, CVE-2026-23107, CVE-2026-23108, CVE-2026-23110) (Bug #58964, Bug #59049)
linux-signed-amd64 (CVE-2023-52658, CVE-2023-53421, CVE-2023-54285, CVE-2024-42079, CVE-2024-46786, CVE-2024-49968, CVE-2025-21946, CVE-2025-22022, CVE-2025-22083, CVE-2025-22107, CVE-2025-22111, CVE-2025-37899, CVE-2025-37926, CVE-2025-38022, CVE-2025-38057, CVE-2025-38073, CVE-2025-38104, CVE-2025-38125, CVE-2025-38129, CVE-2025-38232, CVE-2025-38361, CVE-2025-38408, CVE-2025-38591, CVE-2025-38678, CVE-2025-38718, CVE-2025-39721, CVE-2025-39805, CVE-2025-39871, CVE-2025-40039, CVE-2025-40083, CVE-2025-40110, CVE-2025-40211, CVE-2025-40214, CVE-2025-40215, CVE-2025-40253, CVE-2025-40254, CVE-2025-40257, CVE-2025-40258, CVE-2025-40259, CVE-2025-40261, CVE-2025-40262, CVE-2025-40263, CVE-2025-40264, CVE-2025-40269, CVE-2025-40271, CVE-2025-40272, CVE-2025-40273, CVE-2025-40275, CVE-2025-40277, CVE-2025-40278, CVE-2025-40279, CVE-2025-40280, CVE-2025-40281, CVE-2025-40282, CVE-2025-40283, CVE-2025-40284, CVE-2025-40285, CVE-2025-40286, CVE-2025-40288, CVE-2025-40292, CVE-2025-40293, CVE-2025-40294, CVE-2025-40297, CVE-2025-40301, CVE-2025-40304, CVE-2025-40306, CVE-2025-40308, CVE-2025-40309, CVE-2025-40312, CVE-2025-40314, CVE-2025-40315, CVE-2025-40317, CVE-2025-40318, CVE-2025-40319, CVE-2025-40321, CVE-2025-40322, CVE-2025-40324, CVE-2025-40331, CVE-2025-40341, CVE-2025-40342, CVE-2025-40343, CVE-2025-68223, CVE-2025-68254, CVE-2025-68255, CVE-2025-68257, CVE-2025-68258, CVE-2025-68259, CVE-2025-68261, CVE-2025-68263, CVE-2025-68264, CVE-2025-68266, CVE-2025-68325, CVE-2025-68332, CVE-2025-68335, CVE-2025-68336, CVE-2025-68340, CVE-2025-68344, CVE-2025-68345, CVE-2025-68346, CVE-2025-68347, CVE-2025-68349, CVE-2025-68354, CVE-2025-68362, CVE-2025-68363, CVE-2025-68365, CVE-2025-68366, CVE-2025-68367, CVE-2025-68369, CVE-2025-68371, CVE-2025-68372, CVE-2025-68380, CVE-2025-68724, CVE-2025-68725, CVE-2025-68727, CVE-2025-68728, CVE-2025-68732, CVE-2025-68733, CVE-2025-68740, CVE-2025-68742, CVE-2025-68746, CVE-2025-68753, CVE-2025-68757, CVE-2025-68758, CVE-2025-68759, CVE-2025-68764, CVE-2025-68765, CVE-2025-68766, CVE-2025-68767, CVE-2025-68769, CVE-2025-68771, CVE-2025-68772, CVE-2025-68773, CVE-2025-68776, CVE-2025-68777, CVE-2025-68778, CVE-2025-68780, CVE-2025-68781, CVE-2025-68782, CVE-2025-68783, CVE-2025-68786, CVE-2025-68787, CVE-2025-68788, CVE-2025-68795, CVE-2025-68796, CVE-2025-68797, CVE-2025-68798, CVE-2025-68799, CVE-2025-68800, CVE-2025-68801, CVE-2025-68803, CVE-2025-68804, CVE-2025-68806, CVE-2025-68808, CVE-2025-68813, CVE-2025-68814, CVE-2025-68815, CVE-2025-68816, CVE-2025-68817, CVE-2025-68818, CVE-2025-68819, CVE-2025-68820, CVE-2025-68821, CVE-2025-71064, CVE-2025-71066, CVE-2025-71069, CVE-2025-71075, CVE-2025-71077, CVE-2025-71078, CVE-2025-71079, CVE-2025-71081, CVE-2025-71082, CVE-2025-71083, CVE-2025-71084, CVE-2025-71086, CVE-2025-71087, CVE-2025-71088, CVE-2025-71091, CVE-2025-71093, CVE-2025-71094, CVE-2025-71095, CVE-2025-71096, CVE-2025-71097, CVE-2025-71102, CVE-2025-71104, CVE-2025-71105, CVE-2025-71108, CVE-2025-71112, CVE-2025-71113, CVE-2025-71114, CVE-2025-71118, CVE-2025-71119, CVE-2025-71120, CVE-2025-71121, CVE-2025-71123, CVE-2025-71125, CVE-2025-71126, CVE-2025-71127, CVE-2025-71130, CVE-2025-71131, CVE-2025-71132, CVE-2025-71133, CVE-2025-71136, CVE-2025-71162, CVE-2025-71163, CVE-2025-71185, CVE-2025-71186, CVE-2025-71188, CVE-2025-71189, CVE-2025-71190, CVE-2025-71191, CVE-2025-71196, CVE-2025-71197, CVE-2025-71199, CVE-2026-22998, CVE-2026-22999, CVE-2026-23001, CVE-2026-23006, CVE-2026-23010, CVE-2026-23025, CVE-2026-23026, CVE-2026-23030, CVE-2026-23033, CVE-2026-23038, CVE-2026-23049, CVE-2026-23054, CVE-2026-23056, CVE-2026-23063, CVE-2026-23064, CVE-2026-23068, CVE-2026-23069, CVE-2026-23071, CVE-2026-23073, CVE-2026-23074, CVE-2026-23076, CVE-2026-23078, CVE-2026-23083, CVE-2026-23084, CVE-2026-23085, CVE-2026-23086, CVE-2026-23087, CVE-2026-23089, CVE-2026-23090, CVE-2026-23091, CVE-2026-23095, CVE-2026-23096, CVE-2026-23097, CVE-2026-23098, CVE-2026-23099, CVE-2026-23101, CVE-2026-23102, CVE-2026-23103, CVE-2026-23105, CVE-2026-23107, CVE-2026-23110) (Bug #58964, Bug #59049)
net-snmp (CVE-2025-68615) (Bug #58965)
nvidia-graphics-drivers (CVE-2025-23279, CVE-2025-23286) (Bug #58966)
openjdk-17 (CVE-2025-53057, CVE-2025-53066, CVE-2026-21925, CVE-2026-21932, CVE-2026-21933, CVE-2026-21945) (Bug #58994)
openssl (CVE-2025-15467, CVE-2025-68160, CVE-2025-69418, CVE-2025-69419, CVE-2025-69420, CVE-2025-69421, CVE-2026-22795, CVE-2026-22796) (Bug #59016)
postgresql-15 (CVE-2025-12817, CVE-2025-12818, CVE-2026-2003, CVE-2026-2004, CVE-2026-2005, CVE-2026-2006) (Bug #58954, Bug #59052)
pyasn1 (CVE-2026-23490) (Bug #59015)
python-urllib3 (CVE-2025-50181, CVE-2025-66418, CVE-2026-21441) (Bug #58984)
qemu (CVE-2025-11234) (Bug #58953)
rsync (CVE-2025-10158) (Bug #58961)
squid (CVE-2023-46728, CVE-2024-45802, CVE-2025-59362) (Bug #58959)
unbound (CVE-2023-50387, CVE-2023-50868, CVE-2024-33655, CVE-2025-11411) (Bug #58943)
univention-dojo (CVE-2021-23450, CVE-2024-48910) (Bug #58843)
univention-web (CVE-2021-23450, CVE-2024-48910) (Bug #58843)
xen (CVE-2024-28956, CVE-2024-36350, CVE-2024-36357, CVE-2025-1713, CVE-2025-27465, CVE-2025-27466, CVE-2025-58142, CVE-2025-58143, CVE-2025-58144, CVE-2025-58145, CVE-2025-58147, CVE-2025-58148, CVE-2025-58149) (Bug #58892)
Univention Corporate Server 5.2-5 includes the following updated packages from Debian 12.13:
base-files bash btrfs-progs busybox distro-info-data intel-microcode libcap2 python-urllib3 shadow sudo allow-html-temp angular.js c-icap-modules calibre cdebootstrap chkrootkit chromium composer cyrus-imapd dar debian-installer debian-installer-netboot-images debian-security-support docker.io dpdk e2guardian emacs-libvterm freerdp2 gegl ghdl gimp golang-github-containerd-stargz-snapshotter golang-github-containers-buildah golang-github-openshift-imagebuilder lemonldap-ng libclamunrar libcommons-lang-java libcommons-lang3-java libhtp libnginx-mod-http-lua libphp-adodb libpod libreoffice libyaml-syck-perl log4cxx luksmeta lxd mediawiki modsecurity-apache modsecurity-crs mongo-c-driver munge mydumper nginx nova nvidia-open-gpu-kernel-modules onetbb open-vm-tools openrefine openvpn pg-snakeoil pgbouncer python-django python-django-storages qpwgraph r-cran-gh rails rear rlottie roundcube ruby-sinatra rust-cbindgen-web sash shaarli skeema snapd sogo supermin symfony syslog-ng thunderbird tomcat10 tripwire u-boot ublock-origin usbmuxd user-mode-linux vlc vtk9 webkit2gtk wordpress xrdp zsh
Domain services#
LDAP Directory Manager#
The Recycle Bin listener module is now deactivated by default and can be activated through setting the Univention Configuration Registry Variable
listener/module/recyclebin/deactivatetofalse. Recycle Bin policies can now deactivate the creation of Recycle Bin objects for a whole subtree. All occurrences of Recyclebin in user-facing places have been renamed to Recycle Bin (Bug #58887).Allow dash in
uidandgidsyntaxes also as last character (Bug #58898).The performance of group membership updates for user and computer objects has been improved (Bug #58899).
The DN of objects in the Recycle Bin has been shortened to just
OriginalUniventionObjectIdentifier=$ID,cn=recyclebin,cn=internal(Bug #58931).Fix
UnboundLocalErrorin logging insyntax.py(Bug #58982).Fixed: Errata 282 introduced a change to univention-directory-manager-modules requiring a restart of dependent services. A UCS@school service was missing from the restart list (Bug #58992).
UDM now shows a default for
univentionObjectIdentifierif not set in OpenLDAP (Bug #58987).When deleting a container, the group membership of the objects within that container is now correctly removed (Bug #56986).
All occurrences of Recyclebin in user-facing places have been renamed to Recycle Bin (Bug #58887).
A new endpoint
/udm/-/reloadhas been added to reload UDM extensions, automatically called whenever such an extension is registered (Bug #50253).Improved error handling in listener handler for reloading UDM REST service (Bug #58970).
Load extended UDM attributes in
unmap-ldap-attributesendpoint (Bug #58970).Allow configuration of the
root_pathto reduce the complexity on the reverse proxy (Bug #59032).
Univention Management Console#
Univention Management Console server#
Allow configuration of the
root_pathto reduce the complexity on the reverse proxy (Bug #59033).
System diagnostic module#
Improved error message in
univentionObjectIdentifiertest (Bug #58987).Improve the handling of SSL certificate checks when external certificates are configured. The diagnostic tool now provides actionable guidance when detecting hostname mismatches instead of failing with a traceback (Bug #55576).
LDAP directory browser#
All occurrences of Recyclebin in user-facing places have been renamed to Recycle Bin (Bug #58887).
A new endpoint
/udm/-/reloadhas been added to reload UDM extensions, automatically called whenever such an extension is registered (Bug #50253).
Univention base libraries#
All occurrences of Recyclebin in user-facing places have been renamed to Recycle Bin (Bug #58887).
Add functionality to the UMC Client to allow skipping SSL hostname verification for local connections (Bug #55576).
System services#
SAML#
The UID User Federation mapper is now created with the “Always Read Value From LDAP” setting enabled by default. This establishes LDAP as the single source of truth for UIDs, bypassing Keycloak’s local database cache on every request (Bug #59040).
The univention-keycloak script introduced a flag to enable the “Always Read Value From LDAP” setting for new User Federation Mappers (Bug #59040).
Mail services#
A defect in the Fetchmail listener module has been resolved. The issue prevented the Fetchmail service from restarting correctly after user configuration changes, which prevented emails from being sent or received (Bug #59036).
IMAP services#
The logrotate configuration for reloading rsyslog has been fixed (Bug #58551).
Services for Windows#
Samba#
Since kernel 4.19, the sysvol-sync could fail after reboots with the message
cannot create /var/lock/sysvol-sync-dir: Permission denied. This update fixes this issue (Bug #58784).
Univention S4 Connector#
The Univention S4 connector now supports restoring objects from the UDM Recycle Bin also in Samba/AD (Bug #58844).
Univention Active Directory Connection#
univention-adsearch only supported LDAPS against port 636, but not StartTLS against port 389. Now it also supports the latter (Bug #57747).
Only consider permitted enctypes when synchronizing Kerberos keys from AD
supplementalCredentials. This avoids a compatibility issue with the newsha256andsha384hash types generated by Windows Server 2025 until we apply the fix for the issue in OpenLDAP (Bug #57747).Renaming a user object with umlauts in AD led to a connector reject. The update fixes this issue (Bug #58793).
In the modify operation also move object in UCS if position has changed in AD (Bug #58793).
Ignore order of multi-value attributes when checking for changed attributes (Bug #58793).
Avoid unnecessary object mapping before checking for changed attributes (Bug #58793).
Avoid
ldap.ALREADY_EXISTSif move target exists in UCS (Bug #58793).During DN mapping, look up
samaccountnameforolddnfromadcache(Bug #58793).Skip resync of reject for
uSNCreatedif lower thanuSNChanged(Bug #58793).Add AD reject reason to reject database. The reason will be shown in the univention-adconnector-list-rejected tool (Bug #58793).
The Univention AD connector now supports restoring objects from the UDM Recycle Bin also in Active Directory (Bug #58844).
Other changes#
When setting up a new printer in CUPS via IPP Everywhere, the printer model name is now correctly queried from the printer via IPP (Bug #58874).
The package univention-provisioning-service has been added. It ships a listener module that pushes new transactions into the Provisioning Service App. This package will be installed automatically when installing the new Provisioning Service UCS App (Bug #58973).
The listener module
nubus-provisioning.pyis now capable of reconnecting toNATSwithout a restart of the listener being necessary (Bug #58991).