|
|
Subscribe / Log in / New account

Ubuntu alert USN-4707-1 (tcmu)

From:  Paulo Flabiano Smorigo <pfsmorigo@canonical.com>
To:  ubuntu-security-announce@lists.ubuntu.com
Subject:  [USN-4707-1] TCMU vulnerability
Date:  Thu, 28 Jan 2021 11:02:49 -0300
Message-ID:  <20210128140249.olc2bwm2qizasni3@morty>

========================================================================== Ubuntu Security Notice USN-4707-1 January 28, 2021 tcmu vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.10 - Ubuntu 20.04 LTS Summary: tcmu could be made to crash if it received specially crafted input. Software Description: - tcmu: TCM-Userspace backend Details: It was discovered that TCMU lacked a check for transport-layer restrictions, allowing remote attackers to read or write files via directory traversal in an XCOPY request. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.10: libtcmu2 1.5.2-5ubuntu0.20.10.1 tcmu-runner 1.5.2-5ubuntu0.20.10.1 Ubuntu 20.04 LTS: libtcmu2 1.5.2-5ubuntu0.20.04.1 tcmu-runner 1.5.2-5ubuntu0.20.04.1 In general, a standard system update will make all the necessary changes. References: https://usn.ubuntu.com/4707-1 CVE-2021-3139 Package Information: https://launchpad.net/ubuntu/+source/tcmu/1.5.2-5ubuntu0.... https://launchpad.net/ubuntu/+source/tcmu/1.5.2-5ubuntu0.... -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security...


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds