First published: Mon Mar 25 2024(Updated: )
It was discovered that debmany in Debian Goodies incorrectly handled certain deb files. An attacker could possibly use this issue to execute arbitrary shell commands.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/debian-goodies | <0.88.1ubuntu1.2 | 0.88.1ubuntu1.2 |
Ubuntu | =23.10 | |
All of | ||
ubuntu/debian-goodies | <0.87ubuntu1.1 | 0.87ubuntu1.1 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/debian-goodies | <0.84ubuntu0.1 | 0.84ubuntu0.1 |
Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-6714-1 is considered to be high due to the potential for arbitrary command execution.
To fix USN-6714-1, upgrade the debian-goodies package to versions 0.88.1ubuntu1.2, 0.87ubuntu1.1, or 0.84ubuntu0.1, depending on your Ubuntu version.
USN-6714-1 affects Ubuntu versions 23.10, 22.04, and 20.04 with specific versions of the debian-goodies package.
The vulnerability USN-6714-1 is caused by the improper handling of certain deb files in the debmany utility of debian-goodies.
Yes, an attacker could potentially exploit USN-6714-1 remotely to execute arbitrary shell commands.