[USN-3533-1] Transmission vulnerability
Leonidas S. Barbosa
leo.barbosa at canonical.com
Tue Jan 16 21:04:50 UTC 2018
==========================================================================
Ubuntu Security Notice USN-3533-1
January 16, 2018
transmission vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
Transmission could be made to run arbitraty code.
Software Description:
- transmission: lightweight BitTorrent client
Details:
It was discovered that Transmission incorrectly handled certain POST
requests to the RPC server and allowed DNS rebinding attack. An
attacker could possibly use this issue to execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.10:
transmission 2.92-2ubuntu3.1
Ubuntu 16.04 LTS:
transmission 2.84-3ubuntu3.1
Ubuntu 14.04 LTS:
transmission 2.82-1.1ubuntu3.2
In general, a standard system update will make all the necessary
changes.
References:
https://www.ubuntu.com/usn/usn-3533-1
CVE-2018-5702
Package Information:
https://launchpad.net/ubuntu/+source/transmission/2.92-2ubuntu3.1
https://launchpad.net/ubuntu/+source/transmission/2.84-3ubuntu3.1
https://launchpad.net/ubuntu/+source/transmission/2.82-1.1ubuntu3.2
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: This is a digitally signed message part
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20180116/a72aec39/attachment.sig>
More information about the ubuntu-security-announce
mailing list