Mageia 2018-0402: mgetty security update
Summary
Updated mgetty packages fix security vulnerabilities:
The function do_activate() did not properly sanitize shell metacharactersto prevent command injection (CVE-2018-16741).
Stack-based buffer overflow that could have been triggered via a
command-line parameter (CVE-2018-16742).
The command-line parameter username wsa passed unsanitized to strcpy(),
which could have caused a stack-based buffer overflow (CVE-2018-16743).
The mail_to parameter was not sanitized, leading to command injection if
untrusted input reached reach it (CVE-2018-16744).
The mail_to parameter was not sanitized, leading to a buffer overflow if
long untrusted input reached it (CVE-2018-16745).
References
- https://bugs.mageia.org/show_bug.cgi?id=23567
- - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16741
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16742
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16743
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16744
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16745
Resolution
MGASA-2018-0402 - Updated mgetty packages fix security vulnerabilities
SRPMS
- 6/core/mgetty-1.1.37-1.1.mga6