|
|
Subscribe / Log in / New account

Mageia alert MGASA-2018-0136 (apache-commons-email)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2018-0136: Updated apache-commons-email packages fix security vulnerability
Date:  Sun, 25 Feb 2018 00:26:05 +0100
Message-ID:  <20180224232605.9A8569FD12@duvel.mageia.org>

MGASA-2018-0136 - Updated apache-commons-email packages fix security vulnerability Publication date: 24 Feb 2018 URL: https://advisories.mageia.org/MGASA-2018-0136.html Type: security Affected Mageia releases: 6 CVE: CVE-2018-1294 Description: Apache Commons-Email, from version 1.0 to 1.4 inclusive, does not properly validate bounce addresses. If a user of Commons-Email (typically an application programmer) passes unvalidated input as the so-called "Bounce Address", and that input contains line-breaks, then the email details (recipients, contents, etc.) might be manipulated (CVE-2018-1294). References: - https://bugs.mageia.org/show_bug.cgi?id=22473 - https://lists.fedoraproject.org/archives/list/package-ann... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1294 SRPMS: - 6/core/apache-commons-email-1.5-1.mga6


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds