Security
Headlines
HeadlinesLatestCVEs

Headline

Ubuntu Security Notice USN-6016-1

Ubuntu Security Notice 6016-1 - It was discovered that thenify incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to execute arbitrary code.

Packet Storm
#vulnerability#ubuntu

==========================================================================
Ubuntu Security Notice USN-6016-1
April 13, 2023

node-thenify vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 20.04 LTS
  • Ubuntu 18.04 LTS

Summary:

A security issue weas fixed in thenify.

Software Description:

  • node-thenify: Promisify a callback-based function

Details:

It was discovered that thenify incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to execute
arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
node-thenify 3.3.0-1+deb10u1build0.20.04.1

Ubuntu 18.04 LTS:
node-thenify 3.3.0-1+deb10u1build0.18.04.1

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6016-1
CVE-2020-7677

Package Information:

https://launchpad.net/ubuntu/+source/node-thenify/3.3.0-1+deb10u1build0.20.04.1

https://launchpad.net/ubuntu/+source/node-thenify/3.3.0-1+deb10u1build0.18.04.1

Related news

CVE-2020-7677: Snyk Vulnerability Database | Snyk

This affects the package thenify before 3.3.1. The name argument provided to the package can be controlled by users without any sanitization, and this is provided to the eval function without any sanitization.

GHSA-29xr-v42j-r956: thenify before 3.3.1 made use of unsafe calls to `eval`.

Versions of thenify prior to 3.3.1 made use of unsafe calls to `eval`. Untrusted user input could thus lead to arbitrary code execution on the host. The patch in version 3.3.1 removes calls to `eval`.

Packet Storm: Latest News

ABB Cylon Aspect 3.07.02 user.properties Default Credentials