MGASA-2018-0402 - Updated mgetty packages fix security vulnerabilities Publication date: 19 Oct 2018 URL: https://advisories.mageia.org/MGASA-2018-0402.html Type: security Affected Mageia releases: 6 CVE: CVE-2018-16741, CVE-2018-16742, CVE-2018-16743, CVE-2018-16744, CVE-2018-16745 Updated mgetty packages fix security vulnerabilities: The function do_activate() did not properly sanitize shell metacharactersto prevent command injection (CVE-2018-16741). Stack-based buffer overflow that could have been triggered via a command-line parameter (CVE-2018-16742). The command-line parameter username wsa passed unsanitized to strcpy(), which could have caused a stack-based buffer overflow (CVE-2018-16743). The mail_to parameter was not sanitized, leading to command injection if untrusted input reached reach it (CVE-2018-16744). The mail_to parameter was not sanitized, leading to a buffer overflow if long untrusted input reached it (CVE-2018-16745). References: - https://bugs.mageia.org/show_bug.cgi?id=23567 - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16741 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16742 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16743 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16744 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16745 SRPMS: - 6/core/mgetty-1.1.37-1.1.mga6