[USN-8153-1] Salt vulnerabilities
[USN-8089-3] ADSys, Juju Core, LXD vulnerabilities
[USN-8154-1] Django vulnerabilities
[USN-8153-1] Salt vulnerabilities
==========================================================================
Ubuntu Security Notice USN-8153-1
April 07, 2026
salt vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in Salt.
Software Description:
- salt: Infrastructure management built on a dynamic communication bus
Details:
Zach Malone discovered that Salt did not properly handle permissions to cache
data. A local attacker could possibly use this issue to obtain sensitive
information. (CVE-2015-8034)
Dylan Frese discovered that Salt incorrectly allowed users to specify PAM
service. An attacker could possibly use this issue to bypass authentication.
(CVE-2016-3176)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS
salt-common 0.17.5+ds-1ubuntu0.1~esm5
Available with Ubuntu Pro
salt-master 0.17.5+ds-1ubuntu0.1~esm5
Available with Ubuntu Pro
salt-minion 0.17.5+ds-1ubuntu0.1~esm5
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-8153-1
CVE-2015-8034, CVE-2016-3176
[USN-8089-3] ADSys, Juju Core, LXD vulnerabilities
==========================================================================
Ubuntu Security Notice USN-8089-3
April 07, 2026
adsys, juju-core, lxd vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in ADSys, Juju Core, LXD
Software Description:
- adsys: Active Directory Group Policy client
- lxd: Container hypervisor based on LXC
- juju-core: Application orchestration engine
Details:
USN-8089-1 fixed vulnerabilities in Go Networking. This update provides
the corresponding update to code vendored in LXD, ADSys, and Juju Core.
Original advisory details:
Bahruz Jabiyev, Tommaso Innocenti, Anthony Gavazzi, Steven Sprecher, and
Kaan Onarlioglu discovered that servers using Go Networking could hang
during shutdown if preempted by a fatal error. An attacker could possibly
use this to cause a denial of service. This issue only affected Ubuntu
22.04 LTS. (CVE-2022-27664)
Arpad Ryszka and Jakob Ackermann discovered that a maliciously crafted
stream could cause excessive CPU usage in Go Networking's HPACK decoder. An
attacker could possibly use this to cause a denial of service. This issue
only affected Ubuntu 22.04 LTS. (CVE-2022-41723)
Mohammad Thoriq Aziz discovered that Go Networking did not properly
sanitize some text nodes. An attacker could possibly use this to execute
arbitrary code. This issue only affected Ubuntu 22.04 LTS. (CVE-2023-3978)
Sean Ng discovered an error in Go Networking's HTML tag handling. An
attacker could possibly use this to cause a denial of service.
(CVE-2025-22872)
Guido Vranken and Jakub Ciolek discovered that a maliciously crafted HTML
document could exhaust system resources on servers using Go Networking. An
attacker could possibly use this to cause a denial of service.
(CVE-2025-47911)
Guido Vranken discovered that a maliciously crafted HTML document could put
servers using Go Networking into an infinite loop. An attacker could
possibly use this to cause a denial of service. (CVE-2025-58190)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.04 LTS
adsys 0.9.2~20.04.2ubuntu0.1+esm1
Available with Ubuntu Pro
adsys-windows 0.9.2~20.04.2ubuntu0.1+esm1
Available with Ubuntu Pro
Ubuntu 18.04 LTS
lxd 3.0.3-0ubuntu1~18.04.2+esm2
Available with Ubuntu Pro
lxd-client 3.0.3-0ubuntu1~18.04.2+esm2
Available with Ubuntu Pro
lxd-tools 3.0.3-0ubuntu1~18.04.2+esm2
Available with Ubuntu Pro
Ubuntu 16.04 LTS
golang-github-lxc-lxd-dev 2.0.11-0ubuntu1~16.04.4+esm2
Available with Ubuntu Pro
juju 2.3.7-0ubuntu0.16.04.1+esm2
Available with Ubuntu Pro
juju-2.0 2.3.7-0ubuntu0.16.04.1+esm2
Available with Ubuntu Pro
lxc2 2.0.11-0ubuntu1~16.04.4+esm2
Available with Ubuntu Pro
lxd 2.0.11-0ubuntu1~16.04.4+esm2
Available with Ubuntu Pro
lxd-client 2.0.11-0ubuntu1~16.04.4+esm2
Available with Ubuntu Pro
lxd-tools 2.0.11-0ubuntu1~16.04.4+esm2
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-8089-3
https://ubuntu.com/security/notices/USN-8089-2
https://ubuntu.com/security/notices/USN-8089-1
CVE-2021-33194, CVE-2022-27664, CVE-2022-41723, CVE-2023-3978,
CVE-2025-22872, CVE-2025-47911, CVE-2025-58190
[USN-8154-1] Django vulnerabilities
==========================================================================
Ubuntu Security Notice USN-8154-1
April 07, 2026
python-django vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
Summary:
Several security issues were fixed in Django.
Software Description:
- python-django: High-level Python web development framework
Details:
Seokchan Yoon discovered that Django incorrectly handled copying memory
when parsing multipart uploads with excessive whitespace. A remote attacker
could possibly use this issue to cause Django to use excessive resources,
leading to a denial of service. (CVE-2026-33033)
It was discovered that Django did not enforce an upload memory size limit
in the Content-Length header. A remote attacker could possibly use this
issue to cause Django to use excessive resources, leading to a denial of
service. This issue only affected Ubuntu 24.04 LTS and Ubuntu 25.10.
(CVE-2026-33034)
Tarek Nakkouch discovered that Django incorrectly handled underscores in
the ASGI headers. A remote attacker could possibly use this issue to spoof
HTTP headers. This issue only affected Ubuntu 22.04 LTS, Ubuntu 24.04 LTS,
and Ubuntu 25.10. (CVE-2026-3902)
It was discovered that Django incorrectly handled verification of model
data created with POST requests. A remote attacker could possibly use this
issue to forge new model permissions. (CVE-2026-4277, CVE-2026-4292)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 25.10
python3-django 3:5.2.4-1ubuntu2.4
Ubuntu 24.04 LTS
python3-django 3:4.2.11-1ubuntu1.15
Ubuntu 22.04 LTS
python3-django 2:3.2.12-2ubuntu1.26
Ubuntu 20.04 LTS
python3-django 2:2.2.12-1ubuntu0.29+esm8
Available with Ubuntu Pro
Ubuntu 18.04 LTS
python-django 1:1.11.11-1ubuntu1.21+esm15
Available with Ubuntu Pro
python3-django 1:1.11.11-1ubuntu1.21+esm15
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-8154-1
CVE-2026-33033, CVE-2026-33034, CVE-2026-3902, CVE-2026-4277,
CVE-2026-4292
Package Information:
https://launchpad.net/ubuntu/+source/python-django/3:5.2.4-1ubuntu2.4
https://launchpad.net/ubuntu/+source/python-django/3:4.2.11-1ubuntu1.15
https://launchpad.net/ubuntu/+source/python-django/2:3.2.12-2ubuntu1.26