First published: Wed Feb 28 2024(Updated: )
It was discovered that libuv incorrectly truncated certain hostnames. A remote attacker could possibly use this issue with specially crafted hostnames to bypass certain checks.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libuv1 | <1.44.2-1ubuntu0.1 | 1.44.2-1ubuntu0.1 |
Ubuntu Linux | =23.10 | |
All of | ||
ubuntu/libuv1 | <1.43.0-1ubuntu0.1 | 1.43.0-1ubuntu0.1 |
Ubuntu Linux | =22.04 | |
All of | ||
ubuntu/libuv1 | <1.34.2-1ubuntu1.5 | 1.34.2-1ubuntu1.5 |
Ubuntu Linux | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-6666-1 is classified as high due to the potential for remote attackers to bypass security checks.
To fix USN-6666-1, upgrade the libuv1 package to version 1.44.2-1ubuntu0.1 or higher for Ubuntu 23.10, version 1.43.0-1ubuntu0.1 for Ubuntu 22.04, or version 1.34.2-1ubuntu1.5 for Ubuntu 20.04.
USN-6666-1 affects the libuv1 package on various Ubuntu versions, including 23.10, 22.04, and 20.04.
USN-6666-1 is not a remote code execution vulnerability but allows attackers to bypass certain security checks.
You can determine your vulnerability to USN-6666-1 by checking if you are using an affected version of the libuv1 package on your Ubuntu system.