----------------------------------------------------------------------------------
@MSGID:
<7c6d7ad9-da6a-a505-a30a-ca5524c91c8c@canonical.com> 2f37ddf0
@REPLYADDR Camila Camargo de Matos
<camila.camargodematos@canonical.com>
@REPLYTO 2:5075/128 Camila Camargo de Matos
@CHRS: CP866 2
@RFC: 1 0
@RFC-Message-ID:
<7c6d7ad9-da6a-a505-a30a-ca5524c91c8c@canonical.com>
@RFC-MIME-Version: 1.0
@RFC-Content-Type: multipart/mixed;
boundary="===============2024939196067117714=="
@RFC-Content-Transfer-Encoding: 8bit
@TZUTC: -0300
@TID: FIDOGATE-5.12-ge4e8b94
==========================================================================
Ubuntu Security Notice USN-5983-1
March 29, 2023
php-nette vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM
Summary:
Nette could be made to run programs if it received specially crafted
network traffic.
Software Description:
- php-nette: Nette Framework
Details:
Cyku Hong discovered that Nette was not properly handling and validating
data used for code generation. A remote attacker could possibly use this
issue to execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS:
php-nette 2.4-20160731-1ubuntu0.1
Ubuntu 16.04 ESM:
php-nette 2.3.8-1ubuntu1+esm1
After a standard system update you need to restart any applications using
Nette to make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-5983-1
CVE-2020-15227
Package Information:
https://launchpad.net/ubuntu/+source/php-nette/2.4-20160731-1ubuntu0.1
--- FIDOGATE 5.12-ge4e8b94
* Origin: Usenet Network (2:5075/128)
SEEN-BY: 221/6 301/1 467/888 5001/100 5005/49
5015/255 5019/40 5020/715 848
SEEN-BY: 5020/1042 4441 12000 5030/49 1081 5075/35
128
@PATH: 5075/128 5020/1042 4441