Ubuntu 6956 Published by

Ubuntu has released security notices for several vulnerabilities affecting various packages. The affected packages include iperf3, which had multiple vulnerabilities that could lead to denial of service or information disclosure in Ubuntu 25.10, 24.04 LTS, 22.04 LTS, and 20.04 LTS. Additionally, OpenCC, a simplified-traditional Chinese conversion library, was found to have a vulnerability that could cause the program to crash if it received specially crafted input in Ubuntu 25.10, 24.04 LTS, and 22.04 LTS. GLib, a C library of routines, also had a vulnerability that could cause it to crash or run programs if it received specially crafted input in Ubuntu 25.10, 24.04 LTS, and 22.04 LTS.

[USN-7970-1] iperf3 vulnerabilities
[USN-7972-1] OpenCC vulnerability
[USN-7971-1] GLib vulnerability




[USN-7970-1] iperf3 vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7970-1
January 21, 2026

iperf3 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in iperf3.

Software Description:
- iperf3: A TCP, UDP, and SCTP network bandwidth measurement tool

Details:

Jorge Sancho Larraz discovered that iperf3 did not properly manage certain
inputs, which could cause the server process to stop responding, waiting
for input on the control connection. A remote attacker could possibly use
this issue to cause a denial of service. This issue was only addressed in
Ubuntu 22.04 LTS. (CVE-2023-7250)

It was discovered that iperf3 had a timing side-channel when performing RSA
decryption. An attacker could possibly use this issue to recover sensitive
information. This issue was only addressed in Ubuntu 20.04 LTS and Ubuntu
22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-26306)

It was discovered that iperf3 incorrectly handled certain inputs. An
attacker could possibly use this issue to cause a denial of service. This
issue was only addressed in Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu
24.04 LTS. (CVE-2024-53580)

Han Lee discovered that iperf3 had an off-by-one heap overflow. An attacker
could possibly use this issue to crash the program or execute arbitrary
code. This issue was only addressed in Ubuntu 20.04 LTS, Ubuntu 22.04 LTS,
Ubuntu 24.04 LTS and Ubuntu 25.10. (CVE-2025-54349)

Han Lee discovered that iperf3 did not properly manage certain inputs. An
attacker could possibly use this issue to cause a denial of service.
(CVE-2025-54350)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.10
iperf3 3.18-2ubuntu0.1
libiperf0 3.18-2ubuntu0.1

Ubuntu 24.04 LTS
iperf3 3.16-1ubuntu0.1~esm1
Available with Ubuntu Pro
libiperf0 3.16-1ubuntu0.1~esm1
Available with Ubuntu Pro

Ubuntu 22.04 LTS
iperf3 3.9-1+deb11u1ubuntu0.1
libiperf0 3.9-1+deb11u1ubuntu0.1

Ubuntu 20.04 LTS
iperf3 3.7-3ubuntu0.1~esm2
Available with Ubuntu Pro
libiperf0 3.7-3ubuntu0.1~esm2
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7970-1
CVE-2023-7250, CVE-2024-26306, CVE-2024-53580, CVE-2025-54349,
CVE-2025-54350

Package Information:
https://launchpad.net/ubuntu/+source/iperf3/3.18-2ubuntu0.1
https://launchpad.net/ubuntu/+source/iperf3/3.9-1+deb11u1ubuntu0.1



[USN-7972-1] OpenCC vulnerability


==========================================================================
Ubuntu Security Notice USN-7972-1
January 21, 2026

opencc vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

OpenCC could be made to crash if it received specially crafted input.

Software Description:
- opencc: simplified-traditional Chinese conversion library

Details:

It was discovered that OpenCC incorrectly handled truncated UTF-8 input.
An attacker could possibly use this issue to cause OpenCC to crash,
resulting in a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.10
libopencc1.1 1.1.9+ds1-2ubuntu0.1
opencc 1.1.9+ds1-2ubuntu0.1

Ubuntu 24.04 LTS
libopencc1.1 1.1.7+ds1-1ubuntu0.1
opencc 1.1.7+ds1-1ubuntu0.1

Ubuntu 22.04 LTS
libopencc1.1 1.1.3+ds1-3ubuntu3.1
opencc 1.1.3+ds1-3ubuntu3.1

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7972-1
CVE-2025-15536

Package Information:
https://launchpad.net/ubuntu/+source/opencc/1.1.9+ds1-2ubuntu0.1
https://launchpad.net/ubuntu/+source/opencc/1.1.7+ds1-1ubuntu0.1
https://launchpad.net/ubuntu/+source/opencc/1.1.3+ds1-3ubuntu3.1



[USN-7971-1] GLib vulnerability


==========================================================================
Ubuntu Security Notice USN-7971-1
January 21, 2026

glib2.0 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

GLib could be made to crash or run programs if it received specially
crafted input.

Software Description:
- glib2.0: GLib library of C routines

Details:

It was discovered that GLib incorrectly handled the buffered input stream
API. An attacker could use this issue to cause GLib to crash, resulting in
a denial of service, or possibly execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.10
libglib2.0-0t64 2.86.0-2ubuntu0.2
libglib2.0-bin 2.86.0-2ubuntu0.2

Ubuntu 24.04 LTS
libglib2.0-0t64 2.80.0-6ubuntu3.7
libglib2.0-bin 2.80.0-6ubuntu3.7

Ubuntu 22.04 LTS
libglib2.0-0 2.72.4-0ubuntu2.8
libglib2.0-bin 2.72.4-0ubuntu2.8

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7971-1
CVE-2026-0988

Package Information:
https://launchpad.net/ubuntu/+source/glib2.0/2.86.0-2ubuntu0.2
https://launchpad.net/ubuntu/+source/glib2.0/2.80.0-6ubuntu3.7
https://launchpad.net/ubuntu/+source/glib2.0/2.72.4-0ubuntu2.8