Ubuntu 6961 Published by

The following four vulnerabilities have been discovered in various Ubuntu packages. Ubuntu Security Notice USN-7973-1: cJSON has several security issues, including CVE-2023-26819 (denial of service), CVE-2023-53154 (exposing sensitive information or crashing the program), and CVE-2025-57052 (out-of-bounds memory access). Ubuntu Security Notice USN-7977-1: Git LFS has security issues, including CVE-2024-53263 (leaking login credentials) and CVE-2025-26625 (abuse of git lfs checkout and pull commands to write to any file on a user's system). Additionally, Ubuntu Security Notices USN-7976-1 and USN-7978-1 have also reported vulnerabilities in the node-form-data and GNU Screen packages, respectively.

[USN-7973-1] cJSON vulnerabilities
[USN-7977-1] Git LFS vulnerabilities
[USN-7976-1] Form-Data vulnerability
[USN-7978-1] GNU Screen vulnerabilities




[USN-7973-1] cJSON vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7973-1
January 23, 2026

cjson vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in cJSON.

Software Description:
- cjson: Ultralightweight JSON parser in ANSI C

Details:

It was discovered that cJSON incorrectly handled parsing large numbers. An
attacker could possibly use this issue to cause a denial of service.
(CVE-2023-26819)

It was discovered that cJSON may perform out-of-bounds read when processing
specially crafted JSON files using parse_object. An attacker could possibly
use this issue to expose sensitive information or crash the program.
(CVE-2023-53154)

It was discovered that cJSON incorrectly validated array indices in JSON
pointers, which could result in an out-of-bounds memory access. An attacker
could possibly use this issue to cause a denial of service, or execute
arbitrary code. (CVE-2025-57052)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.10
libcjson1 1.7.18-3.1ubuntu0.1

Ubuntu 24.04 LTS
libcjson1 1.7.17-1ubuntu0.1~esm3
Available with Ubuntu Pro

Ubuntu 22.04 LTS
libcjson1 1.7.15-1ubuntu0.1

Ubuntu 20.04 LTS
libcjson1 1.7.10-1.1ubuntu0.1~esm1
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7973-1
CVE-2023-26819, CVE-2023-53154, CVE-2025-57052

Package Information:
https://launchpad.net/ubuntu/+source/cjson/1.7.18-3.1ubuntu0.1
https://launchpad.net/ubuntu/+source/cjson/1.7.15-1ubuntu0.1



[USN-7977-1] Git LFS vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7977-1
January 26, 2026

git-lfs vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in Git LFS.

Software Description:
- git-lfs: Command line extension and spec for managing large files with Git

Details:

Ryota K discovered that Git LFS may leak login credentials in certain
instances due to failing to check for URL-encoded characters. An
attacker could possibly use this issue to learn sensitive information.
(CVE-2024-53263)

It was discovered that Git LFS could have its git lfs checkout and
git lfs pull commands abused to write to any file on a user's
system. An attacker could possibly use this issue to execute arbitrary
code. This issue was only addressed in Ubuntu 24.04 LTS and
Ubuntu 25.10. (CVE-2025-26625)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.10
git-lfs 3.6.1-1ubuntu0.1
golang-github-git-lfs-git-lfs-dev 3.6.1-1ubuntu0.1

Ubuntu 24.04 LTS
git-lfs 3.4.1-1ubuntu0.3+esm2
Available with Ubuntu Pro
golang-github-git-lfs-git-lfs-dev 3.4.1-1ubuntu0.3+esm2
Available with Ubuntu Pro

Ubuntu 22.04 LTS
git-lfs 3.0.2-1ubuntu0.3+esm2
Available with Ubuntu Pro
golang-github-git-lfs-git-lfs-dev 3.0.2-1ubuntu0.3+esm2
Available with Ubuntu Pro

Ubuntu 20.04 LTS
git-lfs 2.9.2-1ubuntu0.1~esm2
Available with Ubuntu Pro

Ubuntu 18.04 LTS
git-lfs 2.3.4-1ubuntu0.1~esm1
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7977-1
CVE-2024-53263, CVE-2025-26625

Package Information:
https://launchpad.net/ubuntu/+source/git-lfs/3.6.1-1ubuntu0.1



[USN-7976-1] Form-Data vulnerability


==========================================================================
Ubuntu Security Notice USN-7976-1
January 26, 2026

node-form-data vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Form-Data could be made to allow unintended access.

Software Description:
- node-form-data: A library to create readable 'multipart/form-data' streams

Details:

Ben Shonaldmann discovered that Form-data incorrectly generated boundary
values for multipart form-encoded data, leading to predictable values. A
remote attacker could possibly use this issue to make arbitrary requests
to internal systems.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
node-form-data 4.0.0-1ubuntu0.1

Ubuntu 22.04 LTS
node-form-data 3.0.1-1ubuntu0.1~esm1
Available with Ubuntu Pro

Ubuntu 20.04 LTS
node-form-data 3.0.0-2ubuntu0.1~esm1
Available with Ubuntu Pro

Ubuntu 18.04 LTS
node-form-data 0.1.0-1ubuntu0.18.04.1~esm1
Available with Ubuntu Pro

Ubuntu 16.04 LTS
node-form-data 0.1.0-1ubuntu0.16.04.1~esm1
Available with Ubuntu Pro

Ubuntu 14.04 LTS
node-form-data 0.1.0-1ubuntu0.14.04.1~esm1
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7976-1
CVE-2025-7783

Package Information:
https://launchpad.net/ubuntu/+source/node-form-data/4.0.0-1ubuntu0.1



[USN-7978-1] GNU Screen vulnerabilities


==========================================================================
Ubuntu Security Notice USN-7978-1
January 26, 2026

screen vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

Several security issues were fixed in GNU Screen.

Software Description:
- screen: terminal multiplexer with VT100/ANSI terminal emulation

Details:

It was discovered that GNU Screen incorrectly handled signals when setuid
or setgid privileges were being used, which is not the default in Ubuntu.
A local attacker could use this issue to send privileged signals, possibly
leading to a denial of service. This issue only affected Ubuntu 22.04 LTS.
(CVE-2023-24626)

It was discovered that GNU Screen incorrectly handled PTY permissions. A
local attacker could possibly use this issue to connect to an unauthorized
screen session. (CVE-2025-46802)

It was discovered that GNU Screen incorrectly handled file access when
setuid privileges were being used, which is not the default in Ubuntu. A
local attacker could use this issue to deduce information about certain
file paths. (CVE-2025-46804)

It was discovered that GNU Screen incorrectly handled signals when setuid
privileges were being used, which is not the default in Ubuntu. A local
attacker could use this issue to send privileged signals, possibly leading
to a denial of service. (CVE-2025-46805)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.04 LTS
screen 4.9.1-1ubuntu1

Ubuntu 22.04 LTS
screen 4.9.0-1ubuntu0.1

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7978-1
CVE-2023-24626, CVE-2025-46802, CVE-2025-46804, CVE-2025-46805

Package Information:
https://launchpad.net/ubuntu/+source/screen/4.9.1-1ubuntu1
https://launchpad.net/ubuntu/+source/screen/4.9.0-1ubuntu0.1