[USN-7970-1] iperf3 vulnerabilities
[USN-7972-1] OpenCC vulnerability
[USN-7971-1] GLib vulnerability
[USN-7970-1] iperf3 vulnerabilities
==========================================================================
Ubuntu Security Notice USN-7970-1
January 21, 2026
iperf3 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
Summary:
Several security issues were fixed in iperf3.
Software Description:
- iperf3: A TCP, UDP, and SCTP network bandwidth measurement tool
Details:
Jorge Sancho Larraz discovered that iperf3 did not properly manage certain
inputs, which could cause the server process to stop responding, waiting
for input on the control connection. A remote attacker could possibly use
this issue to cause a denial of service. This issue was only addressed in
Ubuntu 22.04 LTS. (CVE-2023-7250)
It was discovered that iperf3 had a timing side-channel when performing RSA
decryption. An attacker could possibly use this issue to recover sensitive
information. This issue was only addressed in Ubuntu 20.04 LTS and Ubuntu
22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-26306)
It was discovered that iperf3 incorrectly handled certain inputs. An
attacker could possibly use this issue to cause a denial of service. This
issue was only addressed in Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu
24.04 LTS. (CVE-2024-53580)
Han Lee discovered that iperf3 had an off-by-one heap overflow. An attacker
could possibly use this issue to crash the program or execute arbitrary
code. This issue was only addressed in Ubuntu 20.04 LTS, Ubuntu 22.04 LTS,
Ubuntu 24.04 LTS and Ubuntu 25.10. (CVE-2025-54349)
Han Lee discovered that iperf3 did not properly manage certain inputs. An
attacker could possibly use this issue to cause a denial of service.
(CVE-2025-54350)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 25.10
iperf3 3.18-2ubuntu0.1
libiperf0 3.18-2ubuntu0.1
Ubuntu 24.04 LTS
iperf3 3.16-1ubuntu0.1~esm1
Available with Ubuntu Pro
libiperf0 3.16-1ubuntu0.1~esm1
Available with Ubuntu Pro
Ubuntu 22.04 LTS
iperf3 3.9-1+deb11u1ubuntu0.1
libiperf0 3.9-1+deb11u1ubuntu0.1
Ubuntu 20.04 LTS
iperf3 3.7-3ubuntu0.1~esm2
Available with Ubuntu Pro
libiperf0 3.7-3ubuntu0.1~esm2
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7970-1
CVE-2023-7250, CVE-2024-26306, CVE-2024-53580, CVE-2025-54349,
CVE-2025-54350
Package Information:
https://launchpad.net/ubuntu/+source/iperf3/3.18-2ubuntu0.1
https://launchpad.net/ubuntu/+source/iperf3/3.9-1+deb11u1ubuntu0.1
[USN-7972-1] OpenCC vulnerability
==========================================================================
Ubuntu Security Notice USN-7972-1
January 21, 2026
opencc vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
Summary:
OpenCC could be made to crash if it received specially crafted input.
Software Description:
- opencc: simplified-traditional Chinese conversion library
Details:
It was discovered that OpenCC incorrectly handled truncated UTF-8 input.
An attacker could possibly use this issue to cause OpenCC to crash,
resulting in a denial of service.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 25.10
libopencc1.1 1.1.9+ds1-2ubuntu0.1
opencc 1.1.9+ds1-2ubuntu0.1
Ubuntu 24.04 LTS
libopencc1.1 1.1.7+ds1-1ubuntu0.1
opencc 1.1.7+ds1-1ubuntu0.1
Ubuntu 22.04 LTS
libopencc1.1 1.1.3+ds1-3ubuntu3.1
opencc 1.1.3+ds1-3ubuntu3.1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7972-1
CVE-2025-15536
Package Information:
https://launchpad.net/ubuntu/+source/opencc/1.1.9+ds1-2ubuntu0.1
https://launchpad.net/ubuntu/+source/opencc/1.1.7+ds1-1ubuntu0.1
https://launchpad.net/ubuntu/+source/opencc/1.1.3+ds1-3ubuntu3.1
[USN-7971-1] GLib vulnerability
==========================================================================
Ubuntu Security Notice USN-7971-1
January 21, 2026
glib2.0 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
Summary:
GLib could be made to crash or run programs if it received specially
crafted input.
Software Description:
- glib2.0: GLib library of C routines
Details:
It was discovered that GLib incorrectly handled the buffered input stream
API. An attacker could use this issue to cause GLib to crash, resulting in
a denial of service, or possibly execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 25.10
libglib2.0-0t64 2.86.0-2ubuntu0.2
libglib2.0-bin 2.86.0-2ubuntu0.2
Ubuntu 24.04 LTS
libglib2.0-0t64 2.80.0-6ubuntu3.7
libglib2.0-bin 2.80.0-6ubuntu3.7
Ubuntu 22.04 LTS
libglib2.0-0 2.72.4-0ubuntu2.8
libglib2.0-bin 2.72.4-0ubuntu2.8
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7971-1
CVE-2026-0988
Package Information:
https://launchpad.net/ubuntu/+source/glib2.0/2.86.0-2ubuntu0.2
https://launchpad.net/ubuntu/+source/glib2.0/2.80.0-6ubuntu3.7
https://launchpad.net/ubuntu/+source/glib2.0/2.72.4-0ubuntu2.8