First published: Wed Sep 16 2020(Updated: )
It was discovered that StoreBackup did not properly manage lock files. A local attacker could use this issue to cause a denial of service or escalate privileges and run arbitrary code. (CVE-2020-7040)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/storebackup | <3.2.1-1+deb8u1build0.20.04.1 | 3.2.1-1+deb8u1build0.20.04.1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/storebackup | <3.2.1-1+deb8u1build0.18.04.1 | 3.2.1-1+deb8u1build0.18.04.1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/storebackup | <3.2.1-1+deb8u1build0.16.04.1 | 3.2.1-1+deb8u1build0.16.04.1 |
Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-4508-1 is considered a critical vulnerability due to the potential for local attack leading to denial of service or privilege escalation.
To fix USN-4508-1, upgrade the StoreBackup package to the latest version available for your Ubuntu distribution.
StoreBackup versions prior to 3.2.1-1+deb8u1build0.20.04.1, 3.2.1-1+deb8u1build0.18.04.1, and 3.2.1-1+deb8u1build0.16.04.1 on Ubuntu 20.04, 18.04, and 16.04 respectively are affected by USN-4508-1.
No, USN-4508-1 requires local access to the affected system to exploit.
USN-4508-1 can allow a local attacker to execute arbitrary code, thereby compromising system security.