Headline
Ubuntu Security Notice USN-6478-1
Ubuntu Security Notice 6478-1 - It was discovered that Traceroute did not properly parse command line arguments. An attacker could possibly use this issue to execute arbitrary commands.
==========================================================================
Ubuntu Security Notice USN-6478-1
November 14, 2023
traceroute vulnerability
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS (Available with Ubuntu Pro)
- Ubuntu 20.04 LTS (Available with Ubuntu Pro)
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)
- Ubuntu 14.04 LTS (Available with Ubuntu Pro)
Summary:
Traceroute could be made to execute arbitrary commands.
Software Description:
- traceroute: Traces the route taken by packets over an IPv4/IPv6 network
Details:
It was discovered that Traceroute did not properly parse command
line arguments. An attacker could possibly use this issue to
execute arbitrary commands.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS (Available with Ubuntu Pro):
traceroute 1:2.1.0-2ubuntu0.22.04.1~esm1
Ubuntu 20.04 LTS (Available with Ubuntu Pro):
traceroute 1:2.1.0-2ubuntu0.20.04.1~esm1
Ubuntu 18.04 LTS (Available with Ubuntu Pro):
traceroute 1:2.1.0-2ubuntu0.18.04.1~esm1
Ubuntu 16.04 LTS (Available with Ubuntu Pro):
traceroute 1:2.0.21-1ubuntu0.1~esm1
Ubuntu 14.04 LTS (Available with Ubuntu Pro):
traceroute 1:2.0.20-0ubuntu0.1+esm1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6478-1
CVE-2023-46316
Related news
Red Hat Security Advisory 2024-2483-03 - An update for traceroute is now available for Red Hat Enterprise Linux 9.
In buc Traceroute 2.0.12 through 2.1.2 before 2.1.3, the wrapper scripts do not properly parse command lines.