[USN-7973-1] cJSON vulnerabilities
[USN-7977-1] Git LFS vulnerabilities
[USN-7976-1] Form-Data vulnerability
[USN-7978-1] GNU Screen vulnerabilities
[USN-7973-1] cJSON vulnerabilities
==========================================================================
Ubuntu Security Notice USN-7973-1
January 23, 2026
cjson vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
Summary:
Several security issues were fixed in cJSON.
Software Description:
- cjson: Ultralightweight JSON parser in ANSI C
Details:
It was discovered that cJSON incorrectly handled parsing large numbers. An
attacker could possibly use this issue to cause a denial of service.
(CVE-2023-26819)
It was discovered that cJSON may perform out-of-bounds read when processing
specially crafted JSON files using parse_object. An attacker could possibly
use this issue to expose sensitive information or crash the program.
(CVE-2023-53154)
It was discovered that cJSON incorrectly validated array indices in JSON
pointers, which could result in an out-of-bounds memory access. An attacker
could possibly use this issue to cause a denial of service, or execute
arbitrary code. (CVE-2025-57052)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 25.10
libcjson1 1.7.18-3.1ubuntu0.1
Ubuntu 24.04 LTS
libcjson1 1.7.17-1ubuntu0.1~esm3
Available with Ubuntu Pro
Ubuntu 22.04 LTS
libcjson1 1.7.15-1ubuntu0.1
Ubuntu 20.04 LTS
libcjson1 1.7.10-1.1ubuntu0.1~esm1
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7973-1
CVE-2023-26819, CVE-2023-53154, CVE-2025-57052
Package Information:
https://launchpad.net/ubuntu/+source/cjson/1.7.18-3.1ubuntu0.1
https://launchpad.net/ubuntu/+source/cjson/1.7.15-1ubuntu0.1
[USN-7977-1] Git LFS vulnerabilities
==========================================================================
Ubuntu Security Notice USN-7977-1
January 26, 2026
git-lfs vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
Summary:
Several security issues were fixed in Git LFS.
Software Description:
- git-lfs: Command line extension and spec for managing large files with Git
Details:
Ryota K discovered that Git LFS may leak login credentials in certain
instances due to failing to check for URL-encoded characters. An
attacker could possibly use this issue to learn sensitive information.
(CVE-2024-53263)
It was discovered that Git LFS could have its git lfs checkout and
git lfs pull commands abused to write to any file on a user's
system. An attacker could possibly use this issue to execute arbitrary
code. This issue was only addressed in Ubuntu 24.04 LTS and
Ubuntu 25.10. (CVE-2025-26625)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 25.10
git-lfs 3.6.1-1ubuntu0.1
golang-github-git-lfs-git-lfs-dev 3.6.1-1ubuntu0.1
Ubuntu 24.04 LTS
git-lfs 3.4.1-1ubuntu0.3+esm2
Available with Ubuntu Pro
golang-github-git-lfs-git-lfs-dev 3.4.1-1ubuntu0.3+esm2
Available with Ubuntu Pro
Ubuntu 22.04 LTS
git-lfs 3.0.2-1ubuntu0.3+esm2
Available with Ubuntu Pro
golang-github-git-lfs-git-lfs-dev 3.0.2-1ubuntu0.3+esm2
Available with Ubuntu Pro
Ubuntu 20.04 LTS
git-lfs 2.9.2-1ubuntu0.1~esm2
Available with Ubuntu Pro
Ubuntu 18.04 LTS
git-lfs 2.3.4-1ubuntu0.1~esm1
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7977-1
CVE-2024-53263, CVE-2025-26625
Package Information:
https://launchpad.net/ubuntu/+source/git-lfs/3.6.1-1ubuntu0.1
[USN-7976-1] Form-Data vulnerability
==========================================================================
Ubuntu Security Notice USN-7976-1
January 26, 2026
node-form-data vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
Form-Data could be made to allow unintended access.
Software Description:
- node-form-data: A library to create readable 'multipart/form-data' streams
Details:
Ben Shonaldmann discovered that Form-data incorrectly generated boundary
values for multipart form-encoded data, leading to predictable values. A
remote attacker could possibly use this issue to make arbitrary requests
to internal systems.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
node-form-data 4.0.0-1ubuntu0.1
Ubuntu 22.04 LTS
node-form-data 3.0.1-1ubuntu0.1~esm1
Available with Ubuntu Pro
Ubuntu 20.04 LTS
node-form-data 3.0.0-2ubuntu0.1~esm1
Available with Ubuntu Pro
Ubuntu 18.04 LTS
node-form-data 0.1.0-1ubuntu0.18.04.1~esm1
Available with Ubuntu Pro
Ubuntu 16.04 LTS
node-form-data 0.1.0-1ubuntu0.16.04.1~esm1
Available with Ubuntu Pro
Ubuntu 14.04 LTS
node-form-data 0.1.0-1ubuntu0.14.04.1~esm1
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7976-1
CVE-2025-7783
Package Information:
https://launchpad.net/ubuntu/+source/node-form-data/4.0.0-1ubuntu0.1
[USN-7978-1] GNU Screen vulnerabilities
==========================================================================
Ubuntu Security Notice USN-7978-1
January 26, 2026
screen vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in GNU Screen.
Software Description:
- screen: terminal multiplexer with VT100/ANSI terminal emulation
Details:
It was discovered that GNU Screen incorrectly handled signals when setuid
or setgid privileges were being used, which is not the default in Ubuntu.
A local attacker could use this issue to send privileged signals, possibly
leading to a denial of service. This issue only affected Ubuntu 22.04 LTS.
(CVE-2023-24626)
It was discovered that GNU Screen incorrectly handled PTY permissions. A
local attacker could possibly use this issue to connect to an unauthorized
screen session. (CVE-2025-46802)
It was discovered that GNU Screen incorrectly handled file access when
setuid privileges were being used, which is not the default in Ubuntu. A
local attacker could use this issue to deduce information about certain
file paths. (CVE-2025-46804)
It was discovered that GNU Screen incorrectly handled signals when setuid
privileges were being used, which is not the default in Ubuntu. A local
attacker could use this issue to send privileged signals, possibly leading
to a denial of service. (CVE-2025-46805)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
screen 4.9.1-1ubuntu1
Ubuntu 22.04 LTS
screen 4.9.0-1ubuntu0.1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7978-1
CVE-2023-24626, CVE-2025-46802, CVE-2025-46804, CVE-2025-46805
Package Information:
https://launchpad.net/ubuntu/+source/screen/4.9.1-1ubuntu1
https://launchpad.net/ubuntu/+source/screen/4.9.0-1ubuntu0.1