First published: Mon May 21 2018(Updated: )
It was discovered that xdg-utils incorrectly handled certain inputs. An attacker could possibly use this to execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/xdg-utils | <1.1.2-1ubuntu2.2 | 1.1.2-1ubuntu2.2 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/xdg-utils | <1.1.1-1ubuntu3.2 | 1.1.1-1ubuntu3.2 |
Ubuntu Ubuntu | =17.10 | |
All of | ||
ubuntu/xdg-utils | <1.1.1-1ubuntu1.16.04.3 | 1.1.1-1ubuntu1.16.04.3 |
Ubuntu Ubuntu | =16.04 | |
All of | ||
ubuntu/xdg-utils | <1.1.0~rc1-2ubuntu7.2 | 1.1.0~rc1-2ubuntu7.2 |
Ubuntu Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-3650-1 is high.
The xdg-utils vulnerability (USN-3650-1) allows an attacker to execute arbitrary code by exploiting certain inputs.
Versions 1.1.2-1ubuntu2.2, 1.1.1-1ubuntu3.2, 1.1.1-1ubuntu1.16.04.3, and 1.1.0~rc1-2ubuntu7.2 of xdg-utils are affected by USN-3650-1.
To fix the xdg-utils vulnerability (USN-3650-1), update xdg-utils to the corresponding fixed version provided by Ubuntu.
You can find more information about the xdg-utils vulnerability (USN-3650-1) on the Ubuntu Security Advisory page and the Launchpad pages for the respective xdg-utils versions.