First published: Tue Jan 16 2024(Updated: )
It was discovered that ZooKeeper incorrectly handled authorization for the getACL() command. A remote attacker could possibly use this issue to obtain sensitive information. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2019-0201) Damien Diederen discovered that ZooKeeper incorrectly handled authorization if SASL Quorum Peer authentication is enabled. An attacker could possibly use this issue to bypass ZooKeeper's authorization system. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 23.04 and Ubuntu 23.10. (CVE-2023-44981)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libzookeeper-java | <3.8.0-11ubuntu0.1 | 3.8.0-11ubuntu0.1 |
Ubuntu | =23.10 | |
All of | ||
ubuntu/libzookeeper-java | <3.8.0-10ubuntu0.1 | 3.8.0-10ubuntu0.1 |
Ubuntu | =23.04 | |
All of | ||
ubuntu/libzookeeper-java | <3.4.13-6ubuntu4.1 | 3.4.13-6ubuntu4.1 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/libzookeeper-java | <3.4.13-5ubuntu0.1 | 3.4.13-5ubuntu0.1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/libzookeeper-java | <3.4.13-3ubuntu0.1~esm1 | 3.4.13-3ubuntu0.1~esm1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/libzookeeper-java | <3.4.8-1ubuntu0.1~esm2 | 3.4.8-1ubuntu0.1~esm2 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/libzookeeper-java | <3.4.5+dfsg-1ubuntu0.1~esm3 | 3.4.5+dfsg-1ubuntu0.1~esm3 |
Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-6559-1 is considered to be potentially high due to the risk of sensitive information disclosure.
To fix USN-6559-1, upgrade the libzookeeper-java package to the recommended version based on your Ubuntu release.
USN-6559-1 affects users of Ubuntu 14.04 LTS, 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, 23.04, and 23.10 using the vulnerable version of libzookeeper-java.
CVE-2019-0201 is the identifier for the vulnerability addressed in USN-6559-1 related to improper handling of authorization in ZooKeeper.
Yes, a remote attacker could exploit USN-6559-1 to obtain sensitive information through the affected getACL() command.