drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Ausführen beliebiger Kommandos in Underscore
Name: |
Ausführen beliebiger Kommandos in Underscore |
|
ID: |
USN-4913-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 14.04 ESM, Ubuntu 20.04 LTS, Ubuntu 20.10 |
|
Datum: |
Mi, 14. April 2021, 23:28 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23358 |
|
Applikationen: |
Underscore |
|
Originalnachricht |
--===============2791705301525357510== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="vtzGhvizbBRQ85DL" Content-Disposition: inline
--vtzGhvizbBRQ85DL Content-Type: text/plain; charset=us-ascii Content-Disposition: inline
========================================================================== Ubuntu Security Notice USN-4913-1 April 14, 2021
underscore vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.10 - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS - Ubuntu 14.04 ESM
Summary:
Underscore could be made to inject arbitrary code if it received a specially crafted input.
Software Description: - underscore: None
Details:
It was discovered that Underscore incorrectly handled certain inputs. An attacker could possibly use this issue to inject arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 20.10: libjs-underscore 1.9.1~dfsg-1ubuntu0.20.10.1 node-underscore 1.9.1~dfsg-1ubuntu0.20.10.1
Ubuntu 20.04 LTS: libjs-underscore 1.9.1~dfsg-1ubuntu0.20.04.1 node-underscore 1.9.1~dfsg-1ubuntu0.20.04.1
Ubuntu 18.04 LTS: libjs-underscore 1.8.3~dfsg-1ubuntu0.1 node-underscore 1.8.3~dfsg-1ubuntu0.1
Ubuntu 16.04 LTS: libjs-underscore 1.7.0~dfsg-1ubuntu1.1 node-underscore 1.7.0~dfsg-1ubuntu1.1
Ubuntu 14.04 ESM: libjs-underscore 1.4.4-2ubuntu1+esm1 node-underscore 1.4.4-2ubuntu1+esm1
In general, a standard system update will make all the necessary changes.
References: https://ubuntu.com/security/notices/USN-4913-1 CVE-2021-23358
Package Information: https://launchpad.net/ubuntu/+source/underscore/1.9.1~dfsg-1ubuntu0.20.10.1 https://launchpad.net/ubuntu/+source/underscore/1.9.1~dfsg-1ubuntu0.20.04.1 https://launchpad.net/ubuntu/+source/underscore/1.8.3~dfsg-1ubuntu0.1 https://launchpad.net/ubuntu/+source/underscore/1.7.0~dfsg-1ubuntu1.1
--vtzGhvizbBRQ85DL Content-Type: application/pgp-signature; name="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQIzBAABCgAdFiEEf+ebRFcoyOoAQoOeRbznW4QLH2kFAmB3OBoACgkQRbznW4QL H2m39Q//fwhSR3qqjKQpQwtcN2rtvwOVAHQmTbEza4KQQ8LO3xgIP0TEBAv/3dgg zanH/6b5s10OEwN3yT/F7i+6+uXpWqdWOtYgLCxSkZr2K3BQulcxdQt1sY+OrHXC ONeRA1gCHyRmrugVQu6nSEM2PHdUIu0/hJzLUZ6o/d62yrDFPdWE40Wq7DSi3Pj/ VeFluA77blUB+dl9coGs0+tstPJMFaBGH5FYoEERyTpTIULUgVxgRpmGSnqc6ZWm hvbuVVbUHn3JzDLlzVf+C9729rxm6DzxJuln0yd/GhJ+Uz2XHjrx6YGdJxCFnIO7 fes+TsJF5F8jTFm6snnvjQ/+vN6MNtTMLzFbLUctU2Wmjdue2Jyi4KpS6CeAknIk 3ci5tNCkHF7FR6Y70KkmXueQcrfpdxAaU4MXC+E5PQmbrLkND8khmtwHmvPJp/A7 ZOEPuSFRyQ196NTEwB1zQs+Ki4f0UAYECmD4rtBM+3xTFylmhw1YidTj6h2IPU8v PlUSDGdcd8qz3+BLFIBjF6/MwFfB/wLpnOUPCNxR/U6IdGymvLwYcs6zNL7/xWY1 q9uzLR6xiHsOzU/wy4Xf6fLFqC4nqKLtz6FBbSMwj2lSNCWgun++/R91oi+4v0A0 lYvhPmhB9vIbVImY6pzv+Ey9wkWd3BbsI0B1ugpF1zleCRQgmhA= =hkaN -----END PGP SIGNATURE-----
--vtzGhvizbBRQ85DL--
--===============2791705301525357510== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
|
|
|
|