Mangelnde Rechteprüfung in TCMU
ID: | USN-4707-1 |
Distribution: | Ubuntu |
Plattformen: | Ubuntu 20.04 LTS, Ubuntu 20.10 |
Datum: | Do, 28. Januar 2021, 16:10 |
Referenzen: | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3139 |
Applikationen: | Open-iSCSI |
Originalnachricht |
|
--===============1198208018282061600== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="ugsitta2klznh67s" Content-Disposition: inline --ugsitta2klznh67s Content-Type: text/plain; charset=us-ascii Content-Disposition: inline ========================================================================== Ubuntu Security Notice USN-4707-1 January 28, 2021 tcmu vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.10 - Ubuntu 20.04 LTS Summary: tcmu could be made to crash if it received specially crafted input. Software Description: - tcmu: TCM-Userspace backend Details: It was discovered that TCMU lacked a check for transport-layer restrictions, allowing remote attackers to read or write files via directory traversal in an XCOPY request. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.10: libtcmu2 1.5.2-5ubuntu0.20.10.1 tcmu-runner 1.5.2-5ubuntu0.20.10.1 Ubuntu 20.04 LTS: libtcmu2 1.5.2-5ubuntu0.20.04.1 tcmu-runner 1.5.2-5ubuntu0.20.04.1 In general, a standard system update will make all the necessary changes. References: https://usn.ubuntu.com/4707-1 CVE-2021-3139 Package Information: https://launchpad.net/ubuntu/+source/tcmu/1.5.2-5ubuntu0.20.10.1 https://launchpad.net/ubuntu/+source/tcmu/1.5.2-5ubuntu0.20.04.1 --ugsitta2klznh67s Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAABCgAdFiEEkCdEQ5T6DutSveCybUp5kL3izGYFAmASxAkACgkQbUp5kL3i zGZ9/g//QzmgmGjIrNDVFQ/8My/GKvq/hFDAkR6aRVd3Sw2I7HzxSntPxvCKHt3E JavvvX8bKgTJygJWN/uIEgW9ZmCy8rnrdFF1PwgY97+jGIICayR9KnP8nDYyTn5y ni5cIcpYwIA2TR6HYEQckuH8TNrT1SHF62oAhRyKTreUeguJCXXe5CUkHE8AdYrl UvQQmhk6CqiJ4DvbW+fEcxt4kf0oh2F5HxVHG+5CPpYnJFm3q4wYk3OGoyrHq99H LUyRHjd9/JtC0pFjwyvEGxA+7c8jBbnindcIquKAkiSIXGpRNhsrCv6x85CPduRm GvJ1Drl+gayUCi2JXtjTGMv/KGINJqe5YsMu29OunJ7EIJ9z297uPTdGVzkD6xJN DdgAq9Qs3+M6cGXCKDZcAPanmqzQ3ejHvR5M9SmgZbcn05abCUt6rcef8Kt7VWd5 YscjQB7KUM0zaVl/91TbpRypMMmu4kkkg5bGXRs6qvq1Ut23KzWcC4AtCSJqjuta fmw91ZQn6EY2DrUjAjAiwcffgJhZtk0POMTBJgmPe82P8Q9QzJybJawABctMOHIz HE5cHtadRg9mwMgSDmYjLuVz9j+eM1NeQkABqBro/c2TLDFBDkP9eKujrCk89ipZ 4f3ih5t7agm6DNQEZygT3gZW4xVZr3+QismGFZIvg4u2bqIn2fo= =dnOf -----END PGP SIGNATURE----- --ugsitta2klznh67s-- --===============1198208018282061600== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce |