USN-4569-1: Yaws vulnerabilities
Publication date
5 October 2020
Overview
Several security issues were fixed in Yaws.
Releases
Packages
- yaws - High performance HTTP 1.1 webserver written in Erlang
Details
It was discovered that Yaws did not properly sanitize XML input. A remote
attacker could use this vulnerability to execute an XML External Entity
(XXE) injection attack. (CVE-2020-24379)
It was discovered that Yaws mishandled certain input when running CGI
scripts. A remote attacker could use this vulnerability to execute
arbitrary commands. (CVE-2020-24916)
It was discovered that Yaws did not properly sanitize XML input. A remote
attacker could use this vulnerability to execute an XML External Entity
(XXE) injection attack. (CVE-2020-24379)
It was discovered that Yaws mishandled certain input when running CGI
scripts. A remote attacker could use this vulnerability to execute
arbitrary commands. (CVE-2020-24916)
Update instructions
In general, a standard system update will make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
18.04 bionic | erlang-yapp – 2.0.4+dfsg-2ubuntu0.1 | ||
erlang-yaws – 2.0.4+dfsg-2ubuntu0.1 | |||
yaws – 2.0.4+dfsg-2ubuntu0.1 | |||
yaws-mail – 2.0.4+dfsg-2ubuntu0.1 |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.