|
|
Log in / Subscribe / Register

Ubuntu alert USN-8089-3 (adsys, juju-core, lxd)

From:  noreply+usn-bot@canonical.com
To:  ubuntu-security-announce@lists.ubuntu.com
Subject:  [USN-8089-3] ADSys, Juju Core, LXD vulnerabilities
Date:  Tue, 07 Apr 2026 21:16:49 +0000
Message-ID:  <E1wADmz-00064A-8W@lists.ubuntu.com>

========================================================================== Ubuntu Security Notice USN-8089-3 April 07, 2026 adsys, juju-core, lxd vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS Summary: Several security issues were fixed in ADSys, Juju Core, LXD Software Description: - adsys: Active Directory Group Policy client - lxd: Container hypervisor based on LXC - juju-core: Application orchestration engine Details: USN-8089-1 fixed vulnerabilities in Go Networking. This update provides the corresponding update to code vendored in LXD, ADSys, and Juju Core. Original advisory details: Bahruz Jabiyev, Tommaso Innocenti, Anthony Gavazzi, Steven Sprecher, and Kaan Onarlioglu discovered that servers using Go Networking could hang during shutdown if preempted by a fatal error. An attacker could possibly use this to cause a denial of service. This issue only affected Ubuntu 22.04 LTS. (CVE-2022-27664) Arpad Ryszka and Jakob Ackermann discovered that a maliciously crafted stream could cause excessive CPU usage in Go Networking's HPACK decoder. An attacker could possibly use this to cause a denial of service. This issue only affected Ubuntu 22.04 LTS. (CVE-2022-41723) Mohammad Thoriq Aziz discovered that Go Networking did not properly sanitize some text nodes. An attacker could possibly use this to execute arbitrary code. This issue only affected Ubuntu 22.04 LTS. (CVE-2023-3978) Sean Ng discovered an error in Go Networking's HTML tag handling. An attacker could possibly use this to cause a denial of service. (CVE-2025-22872) Guido Vranken and Jakub Ciolek discovered that a maliciously crafted HTML document could exhaust system resources on servers using Go Networking. An attacker could possibly use this to cause a denial of service. (CVE-2025-47911) Guido Vranken discovered that a maliciously crafted HTML document could put servers using Go Networking into an infinite loop. An attacker could possibly use this to cause a denial of service. (CVE-2025-58190) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS adsys 0.9.2~20.04.2ubuntu0.1+esm1 Available with Ubuntu Pro adsys-windows 0.9.2~20.04.2ubuntu0.1+esm1 Available with Ubuntu Pro Ubuntu 18.04 LTS lxd 3.0.3-0ubuntu1~18.04.2+esm2 Available with Ubuntu Pro lxd-client 3.0.3-0ubuntu1~18.04.2+esm2 Available with Ubuntu Pro lxd-tools 3.0.3-0ubuntu1~18.04.2+esm2 Available with Ubuntu Pro Ubuntu 16.04 LTS golang-github-lxc-lxd-dev 2.0.11-0ubuntu1~16.04.4+esm2 Available with Ubuntu Pro juju 2.3.7-0ubuntu0.16.04.1+esm2 Available with Ubuntu Pro juju-2.0 2.3.7-0ubuntu0.16.04.1+esm2 Available with Ubuntu Pro lxc2 2.0.11-0ubuntu1~16.04.4+esm2 Available with Ubuntu Pro lxd 2.0.11-0ubuntu1~16.04.4+esm2 Available with Ubuntu Pro lxd-client 2.0.11-0ubuntu1~16.04.4+esm2 Available with Ubuntu Pro lxd-tools 2.0.11-0ubuntu1~16.04.4+esm2 Available with Ubuntu Pro In general, a standard system update will make all the necessary changes. References: https://ubuntu.com/security/notices/USN-8089-3 https://ubuntu.com/security/notices/USN-8089-2 https://ubuntu.com/security/notices/USN-8089-1 CVE-2021-33194, CVE-2022-27664, CVE-2022-41723, CVE-2023-3978, CVE-2025-22872, CVE-2025-47911, CVE-2025-58190


Attachment: signature.asc (type=application/pgp-signature)

-----BEGIN PGP SIGNATURE----- iQIzBAABCgAdFiEE+8neBLO2Hp/ppPlOcpJm3tlzhgEFAmnVWo0ACgkQcpJm3tlz hgGubw/+KTw/yTY1WVu9eL9fuGrXfhwH1Xrt47u58RNDP6XE4fxdb95HvbhCM6Ua 496NHobgzQVSlF17emFIFIb1o/und9p1hmMEdt4BjN4y0aYoWLgVpXb48E8zXW/B lm+8g7Qurk+0gxYMnUO8e5nbACVKJZfFE+ALO7eULxkMjTjziE+e458We5WSrEsa gRmKoAuBny+UFckO1l6ihx96kbFVCnxzoR7+iR15xM36q5wC78LJP+vM43F3gJHQ taW4ssyqav8N9qHhEuRcvg1KhjsKPNxN9Fl4WDkr7pKrHPT/4oXxG+M7liNM7E4Q oTVhwJ2liIUGsokypbjjBcTVTcZXzk/FgdjmMUvCGmeg2M3jUUlTTMHHwS573Baz Ug2YUqjGJdV6OmbRBxL/ZGv3cgoxR2Gaw1TDEPPaoHTtvUTUN3jctH1pdwi5XleH H92VYC/QVnuvPNI7ItkrsuAoP4IXce80b9e9ZcrYxz32Q5QCe2UvR5S7uvAl9PEQ kKCCjRiNxw1xsrneNkx6gNu9aVYLmFs9s3WlDcK7L4+3JvXVPJ/1BtgXNbb1sfdF oeaxPqI1QVMJYPdlm9bWoWJxYJKBOh/YYmn7A+ZODOkTWrJvynrhbL8CINY95dUw oLYkqVSm7U51bm63jufr0GDHGKvRsKIR6SYnSh4UmzKXM1RL7ks= =02Vc -----END PGP SIGNATURE-----


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds