Headline
Ubuntu Security Notice USN-6016-1
Ubuntu Security Notice 6016-1 - It was discovered that thenify incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to execute arbitrary code.
==========================================================================
Ubuntu Security Notice USN-6016-1
April 13, 2023
node-thenify vulnerability
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
Summary:
A security issue weas fixed in thenify.
Software Description:
- node-thenify: Promisify a callback-based function
Details:
It was discovered that thenify incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to execute
arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.04 LTS:
node-thenify 3.3.0-1+deb10u1build0.20.04.1
Ubuntu 18.04 LTS:
node-thenify 3.3.0-1+deb10u1build0.18.04.1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6016-1
CVE-2020-7677
Package Information:
https://launchpad.net/ubuntu/+source/node-thenify/3.3.0-1+deb10u1build0.20.04.1
https://launchpad.net/ubuntu/+source/node-thenify/3.3.0-1+deb10u1build0.18.04.1
Related news
This affects the package thenify before 3.3.1. The name argument provided to the package can be controlled by users without any sanitization, and this is provided to the eval function without any sanitization.
Versions of thenify prior to 3.3.1 made use of unsafe calls to `eval`. Untrusted user input could thus lead to arbitrary code execution on the host. The patch in version 3.3.1 removes calls to `eval`.