USN-3310-1

Source
https://ubuntu.com/security/notices/USN-3310-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3310-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-3310-1
Related
Published
2017-06-06T15:22:20.950170Z
Modified
2017-06-06T15:22:20.950170Z
Summary
lintian vulnerability
Details

Jakub Wilk discovered that lintian incorrectly handled deserializing certain YAML files. If a user or automated system were tricked into running lintian on a specially crafted package, a remote attacker could possibly use this issue to execute arbitrary code.

References

Affected packages

Ubuntu:16.04:LTS / lintian

Package

Name
lintian
Purl
pkg:deb/ubuntu/lintian@2.5.43ubuntu0.1?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.5.43ubuntu0.1

Affected versions

2.*

2.5.36.1ubuntu2
2.5.38.1ubuntu1
2.5.43~ubuntu1
2.5.43

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.5.43ubuntu0.1",
            "binary_name": "lintian"
        }
    ],
    "availability": "No subscription required"
}