Mageia alert MGASA-2018-0402 (mgetty)
| From: | Mageia Updates <buildsystem-daemon@mageia.org> | |
| To: | updates-announce@ml.mageia.org | |
| Subject: | [updates-announce] MGASA-2018-0402: Updated mgetty packages fix security vulnerabilities | |
| Date: | Fri, 19 Oct 2018 20:01:35 +0200 | |
| Message-ID: | <20181019180135.0DAA4A0017@duvel.mageia.org> |
MGASA-2018-0402 - Updated mgetty packages fix security vulnerabilities Publication date: 19 Oct 2018 URL: https://advisories.mageia.org/MGASA-2018-0402.html Type: security Affected Mageia releases: 6 CVE: CVE-2018-16741, CVE-2018-16742, CVE-2018-16743, CVE-2018-16744, CVE-2018-16745 Description: Updated mgetty packages fix security vulnerabilities: The function do_activate() did not properly sanitize shell metacharacters to prevent command injection (CVE-2018-16741). Stack-based buffer overflow that could have been triggered via a command-line parameter (CVE-2018-16742). The command-line parameter username wsa passed unsanitized to strcpy(), which could have caused a stack-based buffer overflow (CVE-2018-16743). The mail_to parameter was not sanitized, leading to command injection if untrusted input reached reach it (CVE-2018-16744). The mail_to parameter was not sanitized, leading to a buffer overflow if long untrusted input reached it (CVE-2018-16745). References: - https://bugs.mageia.org/show_bug.cgi?id=23567 - https://lists.opensuse.org/opensuse-updates/2018-09/msg00... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1... SRPMS: - 6/core/mgetty-1.1.37-1.1.mga6
