----------------------------------------------------------------------------------
@MSGID:
<0f6c9071-714a-0bbf-e520-b4e2cde35c91@canonical.com> 6108fc44
@REPLY:
<CAJ1+boTB-CTDcDh+MJwXrFVr+b-k780MKkt+jV9XOW9d3uUZaQ@mail.gmail.com> 49ce79d2
@REPLYADDR George-Andrei Iosif
<andrei.iosif@canonical.com>
@REPLYTO 2:5075/128 George-Andrei Iosif
@CHRS: CP866 2
@RFC: 1 0
@RFC-Message-ID:
<0f6c9071-714a-0bbf-e520-b4e2cde35c91@canonical.com>
@RFC-References:
<CAJ1+boTB-CTDcDh+MJwXrFVr+b-k780MKkt+jV9XOW9d3uUZaQ@mail.gmail.com>
@RFC-MIME-Version: 1.0
@RFC-Content-Type: multipart/mixed;
boundary="===============2109456456461438957=="
@RFC-Content-Transfer-Encoding: 8bit
@TZUTC: 0200
@TID: FIDOGATE-5.12-ge4e8b94
==========================================================================
Ubuntu Security Notice USN-6037-1
April 28, 2023
Apache Commons Net vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM
Summary:
Apache Commons Net could be made to expose sensitive information
over the network.
Software Description:
- libcommons-net-java: Apache Commons Net - Java client API for basic
Internet protocols
Details:
ZeddYu Lu discovered that the FTP client from Apache Commons Net trusted
the host from PASV responses by default. A remote attacker with a
malicious FTP server could redirect the client to another server, which
could possibly result in leaked information about services running on
the private network of the client.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.10:
libcommons-net-java 3.6-1+deb11u1build0.22.10.1
Ubuntu 22.04 LTS:
libcommons-net-java 3.6-1+deb11u1build0.22.04.1
Ubuntu 20.04 LTS:
libcommons-net-java 3.6-1+deb11u1build0.20.04.1
Ubuntu 18.04 LTS:
libcommons-net-java 3.6-1+deb11u1build0.18.04.1
Ubuntu 16.04 ESM:
libcommons-net-java 3.4-2ubuntu2+esm1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6037-1
<
https://ubuntu.com/security/notices/USN-6037-1>
CVE-2021-37533
Package Information:
https://launchpad.net/ubuntu/+source/libcommons-net-java/3.6-1+deb11u1build0.22.
10.1
.10.1>
https://launchpad.net/ubuntu/+source/libcommons-net-java/3.6-1+deb11u1build0.22.
04.1
.04.1>
https://launchpad.net/ubuntu/+source/libcommons-net-java/3.6-1+deb11u1build0.20.
04.1
.04.1>
https://launchpad.net/ubuntu/+source/libcommons-net-java/3.6-1+deb11u1build0.18.
04.1
.04.1>
--- FIDOGATE 5.12-ge4e8b94
* Origin: Usenet Network (2:5075/128)
SEEN-BY: 221/6 301/1 467/888 5001/100 5005/49
5015/255 5019/40 5020/715 848
SEEN-BY: 5020/1042 4441 12000 5030/49 1081 5075/35
128
@PATH: 5075/128 5020/1042 4441