[USN-8018-3] Python 2.7 vulnerabilities
[USN-8103-2] Exiv2 regression
[USN-8105-2] FreeRDP regression
[USN-8111-1] OpenStack Glance vulnerability
[USN-8018-3] Python 2.7 vulnerabilities
==========================================================================
Ubuntu Security Notice USN-8018-3
March 19, 2026
python2.7 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in python2.7
Software Description:
- python2.7: An interactive high-level object-oriented language
Details:
USN-8018-1 fixed CVE-2025-12084, CVE-2025-15282, CVE-2026-0672,
CVE-2026-0865 for python3. This update provides the corresponding updates
for python2.7.
Original advisory details:
Denis Ledoux discovered that Python incorrectly parsed email message
headers. An attacker could possibly use this issue to inject arbitrary
headers into email messages. This issue only affected python3.6,
python3.7, python3.8, python3.9, python3.10, python3.11, python3.12,
python3.13, and python3.14 packages. (CVE-2025-11468)
Jacob Walls, Shai Berger, and Natalia Bidart discovered that Python
inefficiently parsed XML input with quadratic complexity. An attacker
could possibly use this issue to cause a denial of service.
(CVE-2025-12084)
It was discovered that Python incorrectly parsed malicious plist files. An
attacker could possibly use this issue to cause Python to use excessive
resources, leading to a denial of service. This issue only affected
python3.5, python3.6, python3.7, python3.8, python3.9, python3.10,
python3.11, python3.12, python3.13, and python3.14 packages.
(CVE-2025-13837)
Omar Hasan discovered that Python incorrectly parsed URL mediatypes. An
attacker could possibly use this issue to inject arbitrary HTTP headers.
(CVE-2025-15282)
Omar Hasan discovered that Python incorrectly parsed malicious IMAP
inputs. An attacker could possibly use this issue to inject arbitrary
IMAP commands. (CVE-2025-15366)
Omar Hasan discovered that Python incorrectly parsed malicious POP3
inputs. An attacker could possibly use this issue to inject arbitrary
POP3 commands. (CVE-2025-15367)
Omar Hasan discovered that Python incorrectly parsed malicious HTTP cookie
headers. An attacker could possibly use this issue to inject arbitrary
HTTP headers. (CVE-2026-0672)
Omar Hasan discovered that Python incorrectly parsed malicious HTTP header
names and values. An attacker could possibly use this issue to inject
arbitrary HTTP headers. (CVE-2026-0865)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS
libpython2.7 2.7.18-13ubuntu1.5+esm8
Available with Ubuntu Pro
python2.7 2.7.18-13ubuntu1.5+esm8
Available with Ubuntu Pro
Ubuntu 20.04 LTS
libpython2.7 2.7.18-1~20.04.7+esm9
Available with Ubuntu Pro
python2.7 2.7.18-1~20.04.7+esm9
Available with Ubuntu Pro
Ubuntu 18.04 LTS
libpython2.7 2.7.17-1~18.04ubuntu1.13+esm14
Available with Ubuntu Pro
python2.7 2.7.17-1~18.04ubuntu1.13+esm14
Available with Ubuntu Pro
Ubuntu 16.04 LTS
libpython2.7 2.7.12-1ubuntu0~16.04.18+esm19
Available with Ubuntu Pro
python2.7 2.7.12-1ubuntu0~16.04.18+esm19
Available with Ubuntu Pro
Ubuntu 14.04 LTS
libpython2.7 2.7.6-8ubuntu0.6+esm29
Available with Ubuntu Pro
python2.7 2.7.6-8ubuntu0.6+esm29
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-8018-3
https://ubuntu.com/security/notices/USN-8018-2
https://ubuntu.com/security/notices/USN-8018-1
CVE-2025-12084, CVE-2025-15282, CVE-2026-0672, CVE-2026-0865
[USN-8103-2] Exiv2 regression
==========================================================================
Ubuntu Security Notice USN-8103-2
March 19, 2026
exiv2 regression
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
Summary:
USN-8103-1 introduced a regression in Exiv2
Software Description:
- exiv2: EXIF/IPTC/XMP metadata manipulation tool
Details:
USN-8103-1 fixed vulnerabilities in Exiv2. The update caused a regression
for Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS and
Ubuntu 25.10. This update fixes the problem.
We apologize for the inconvenience.
Original advisory details:
It was discovered that Exiv2 did not correctly handle reading certain
buffers. An attacker could possibly use this issue to leak sensitive
information. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04
LTS. (CVE-2020-18771)
Wen Cheng discovered that Exiv2 did not correctly handle certain memory
allocation. If a user or system were tricked into opening a specially
crafted file, an attacker could possibly use this issue to cause a denial
of service. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS.
(CVE-2020-18899)
It was discovered that Exiv2 did not correctly handle writing certain
metadata. If a user or system were tricked into opening a specially crafted
file, an attacker could possibly use this issue to cause a denial of
service. (CVE-2025-54080)
It was discovered that Exiv2 did not correctly handle parsing certain
metadata. If a user or system were tricked into opening a specially crafted
file, an attacker could possibly use this issue to cause a denial of
service. This issue only affected Ubuntu 20.04 LTS, Ubuntu 22.04 LTS,
Ubuntu 24.04 LTS and Ubuntu 25.10. (CVE-2025-55304)
It was discovered that Exiv2 did not correctly handle parsing certain
images. If a user or system were tricked into opening a specially crafted
file, an attacker could possibly use this issue to cause a denial of
service. (CVE-2026-25884)
It was discovered that Exiv2 did not correctly handle previewing certain
images. An attacker could possibly use this issue to cause a denial of
service. (CVE-2026-27596)
It was discovered that Exiv2 did not correctly handle certain integer
arithmetic. An attacker could possibly use this issue to cause a denial of
service. (CVE-2026-27631)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 25.10
exiv2 0.28.5+dfsg-1ubuntu0.3
libexiv2-28 0.28.5+dfsg-1ubuntu0.3
libexiv2-dev 0.28.5+dfsg-1ubuntu0.3
Ubuntu 24.04 LTS
exiv2 0.27.6-1ubuntu0.3
libexiv2-27 0.27.6-1ubuntu0.3
libexiv2-dev 0.27.6-1ubuntu0.3
Ubuntu 22.04 LTS
exiv2 0.27.5-3ubuntu1.3
libexiv2-27 0.27.5-3ubuntu1.3
libexiv2-dev 0.27.5-3ubuntu1.3
Ubuntu 20.04 LTS
exiv2 0.27.2-8ubuntu2.7+esm3
Available with Ubuntu Pro
libexiv2-27 0.27.2-8ubuntu2.7+esm3
Available with Ubuntu Pro
libexiv2-dev 0.27.2-8ubuntu2.7+esm3
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-8103-2
https://ubuntu.com/security/notices/USN-8103-1
CVE-2025-55304, https://bugs.launchpad.net/ubuntu/+source/gimp/+bug/2144731
Package Information:
https://launchpad.net/ubuntu/+source/exiv2/0.28.5+dfsg-1ubuntu0.3
https://launchpad.net/ubuntu/+source/exiv2/0.27.6-1ubuntu0.3
https://launchpad.net/ubuntu/+source/exiv2/0.27.5-3ubuntu1.3
[USN-8105-2] FreeRDP regression
==========================================================================
Ubuntu Security Notice USN-8105-2
March 19, 2026
freerdp3 regression
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 25.10
- Ubuntu 24.04 LTS
Summary:
USN-8105-1 introduced a regression in FreeRDP
Software Description:
- freerdp3: RDP client for Windows Terminal Services
Details:
USN-8105-1 fixed vulnerabilities in FreeRDP. The update introduced a
regression which could cause FreeRDP to crash. This update fixes the
problem.
We apologize for the inconvenience.
Original advisory details:
It was discovered that FreeRDP incorrectly handled certain RDP packets. A
remote attacker could use this issue to cause FreeRDP to crash, resulting
in a denial of service, or possibly execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 25.10
libfreerdp3-3 3.16.0+dfsg-2ubuntu0.4
Ubuntu 24.04 LTS
libfreerdp3-3 3.5.1+dfsg1-0ubuntu1.5
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-8105-2
https://ubuntu.com/security/notices/USN-8105-1
https://launchpad.net/bugs/2144889
Package Information:
https://launchpad.net/ubuntu/+source/freerdp3/3.16.0+dfsg-2ubuntu0.4
https://launchpad.net/ubuntu/+source/freerdp3/3.5.1+dfsg1-0ubuntu1.5
[USN-8111-1] OpenStack Glance vulnerability
==========================================================================
Ubuntu Security Notice USN-8111-1
March 19, 2026
glance vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
Summary:
OpenStack Glance could be made to perform server-side request forgery
Software Description:
- glance: OpenStack Image Registry and Delivery Service
Details:
It was discovered that OpenStack Glance was incorrectly validating the IP
addresses and the redirect destination URL when downloading or importing
images from a remote source. An attacker could possibly use this issue to
perform server-side request forgery and obtain sensitive information.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 25.10
glance 2:31.0.0-0ubuntu1.2
glance-api 2:31.0.0-0ubuntu1.2
glance-common 2:31.0.0-0ubuntu1.2
python-glance-doc 2:31.0.0-0ubuntu1.2
python3-glance 2:31.0.0-0ubuntu1.2
Ubuntu 24.04 LTS
glance 2:28.1.0-0ubuntu1.2
glance-api 2:28.1.0-0ubuntu1.2
glance-common 2:28.1.0-0ubuntu1.2
python-glance-doc 2:28.1.0-0ubuntu1.2
python3-glance 2:28.1.0-0ubuntu1.2
Ubuntu 22.04 LTS
glance 2:24.2.1-0ubuntu1.4
glance-api 2:24.2.1-0ubuntu1.4
glance-common 2:24.2.1-0ubuntu1.4
python-glance-doc 2:24.2.1-0ubuntu1.4
python3-glance 2:24.2.1-0ubuntu1.4
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-8111-1
https://bugs.launchpad.net/glance/+bug/2138602
Package Information:
https://launchpad.net/ubuntu/+source/glance/2:31.0.0-0ubuntu1.2
https://launchpad.net/ubuntu/+source/glance/2:28.1.0-0ubuntu1.2
https://launchpad.net/ubuntu/+source/glance/2:24.2.1-0ubuntu1.4