Ubuntu 7043 Published by

Three separate security advisories were issued by Ubuntu to fix flaws found in Salt, ADSys, Juju Core, LXD, and Django. Local users on legacy systems like Ubuntu 14.04 LTS face risks from permission handling errors that allow them to retrieve sensitive information through cached data. Multiple older releases like 16.04 and 18.04 require patches for Go Networking issues that might cause servers to hang or run into infinite loops. Newer systems running Django require updates as well because memory copying errors and header verification failures pose significant risks for remote exploitation.

[USN-8153-1] Salt vulnerabilities
[USN-8089-3] ADSys, Juju Core, LXD vulnerabilities
[USN-8154-1] Django vulnerabilities



[USN-8153-1] Salt vulnerabilities


==========================================================================
Ubuntu Security Notice USN-8153-1
April 07, 2026

salt vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in Salt.

Software Description:
- salt: Infrastructure management built on a dynamic communication bus

Details:

Zach Malone discovered that Salt did not properly handle permissions to cache
data. A local attacker could possibly use this issue to obtain sensitive
information. (CVE-2015-8034)
Dylan Frese discovered that Salt incorrectly allowed users to specify PAM
service. An attacker could possibly use this issue to bypass authentication.
(CVE-2016-3176)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS
salt-common 0.17.5+ds-1ubuntu0.1~esm5
Available with Ubuntu Pro
salt-master 0.17.5+ds-1ubuntu0.1~esm5
Available with Ubuntu Pro
salt-minion 0.17.5+ds-1ubuntu0.1~esm5
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8153-1
CVE-2015-8034, CVE-2016-3176



[USN-8089-3] ADSys, Juju Core, LXD vulnerabilities


==========================================================================
Ubuntu Security Notice USN-8089-3
April 07, 2026

adsys, juju-core, lxd vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in ADSys, Juju Core, LXD

Software Description:
- adsys: Active Directory Group Policy client
- lxd: Container hypervisor based on LXC
- juju-core: Application orchestration engine

Details:

USN-8089-1 fixed vulnerabilities in Go Networking. This update provides
the corresponding update to code vendored in LXD, ADSys, and Juju Core.

Original advisory details:

Bahruz Jabiyev, Tommaso Innocenti, Anthony Gavazzi, Steven Sprecher, and
Kaan Onarlioglu discovered that servers using Go Networking could hang
during shutdown if preempted by a fatal error. An attacker could possibly
use this to cause a denial of service. This issue only affected Ubuntu
22.04 LTS. (CVE-2022-27664)

Arpad Ryszka and Jakob Ackermann discovered that a maliciously crafted
stream could cause excessive CPU usage in Go Networking's HPACK decoder. An
attacker could possibly use this to cause a denial of service. This issue
only affected Ubuntu 22.04 LTS. (CVE-2022-41723)

Mohammad Thoriq Aziz discovered that Go Networking did not properly
sanitize some text nodes. An attacker could possibly use this to execute
arbitrary code. This issue only affected Ubuntu 22.04 LTS. (CVE-2023-3978)

Sean Ng discovered an error in Go Networking's HTML tag handling. An
attacker could possibly use this to cause a denial of service.
(CVE-2025-22872)

Guido Vranken and Jakub Ciolek discovered that a maliciously crafted HTML
document could exhaust system resources on servers using Go Networking. An
attacker could possibly use this to cause a denial of service.
(CVE-2025-47911)

Guido Vranken discovered that a maliciously crafted HTML document could put
servers using Go Networking into an infinite loop. An attacker could
possibly use this to cause a denial of service. (CVE-2025-58190)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS
adsys 0.9.2~20.04.2ubuntu0.1+esm1
Available with Ubuntu Pro
adsys-windows 0.9.2~20.04.2ubuntu0.1+esm1
Available with Ubuntu Pro

Ubuntu 18.04 LTS
lxd 3.0.3-0ubuntu1~18.04.2+esm2
Available with Ubuntu Pro
lxd-client 3.0.3-0ubuntu1~18.04.2+esm2
Available with Ubuntu Pro
lxd-tools 3.0.3-0ubuntu1~18.04.2+esm2
Available with Ubuntu Pro

Ubuntu 16.04 LTS
golang-github-lxc-lxd-dev 2.0.11-0ubuntu1~16.04.4+esm2
Available with Ubuntu Pro
juju 2.3.7-0ubuntu0.16.04.1+esm2
Available with Ubuntu Pro
juju-2.0 2.3.7-0ubuntu0.16.04.1+esm2
Available with Ubuntu Pro
lxc2 2.0.11-0ubuntu1~16.04.4+esm2
Available with Ubuntu Pro
lxd 2.0.11-0ubuntu1~16.04.4+esm2
Available with Ubuntu Pro
lxd-client 2.0.11-0ubuntu1~16.04.4+esm2
Available with Ubuntu Pro
lxd-tools 2.0.11-0ubuntu1~16.04.4+esm2
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8089-3
https://ubuntu.com/security/notices/USN-8089-2
https://ubuntu.com/security/notices/USN-8089-1
CVE-2021-33194, CVE-2022-27664, CVE-2022-41723, CVE-2023-3978,
CVE-2025-22872, CVE-2025-47911, CVE-2025-58190



[USN-8154-1] Django vulnerabilities


==========================================================================
Ubuntu Security Notice USN-8154-1
April 07, 2026

python-django vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in Django.

Software Description:
- python-django: High-level Python web development framework

Details:

Seokchan Yoon discovered that Django incorrectly handled copying memory
when parsing multipart uploads with excessive whitespace. A remote attacker
could possibly use this issue to cause Django to use excessive resources,
leading to a denial of service. (CVE-2026-33033)

It was discovered that Django did not enforce an upload memory size limit
in the Content-Length header. A remote attacker could possibly use this
issue to cause Django to use excessive resources, leading to a denial of
service. This issue only affected Ubuntu 24.04 LTS and Ubuntu 25.10.
(CVE-2026-33034)

Tarek Nakkouch discovered that Django incorrectly handled underscores in
the ASGI headers. A remote attacker could possibly use this issue to spoof
HTTP headers. This issue only affected Ubuntu 22.04 LTS, Ubuntu 24.04 LTS,
and Ubuntu 25.10. (CVE-2026-3902)

It was discovered that Django incorrectly handled verification of model
data created with POST requests. A remote attacker could possibly use this
issue to forge new model permissions. (CVE-2026-4277, CVE-2026-4292)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.10
python3-django 3:5.2.4-1ubuntu2.4

Ubuntu 24.04 LTS
python3-django 3:4.2.11-1ubuntu1.15

Ubuntu 22.04 LTS
python3-django 2:3.2.12-2ubuntu1.26

Ubuntu 20.04 LTS
python3-django 2:2.2.12-1ubuntu0.29+esm8
Available with Ubuntu Pro

Ubuntu 18.04 LTS
python-django 1:1.11.11-1ubuntu1.21+esm15
Available with Ubuntu Pro
python3-django 1:1.11.11-1ubuntu1.21+esm15
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8154-1
CVE-2026-33033, CVE-2026-33034, CVE-2026-3902, CVE-2026-4277,
CVE-2026-4292

Package Information:
https://launchpad.net/ubuntu/+source/python-django/3:5.2.4-1ubuntu2.4
https://launchpad.net/ubuntu/+source/python-django/3:4.2.11-1ubuntu1.15
https://launchpad.net/ubuntu/+source/python-django/2:3.2.12-2ubuntu1.26