From mboxrd@z Thu Jan  1 00:00:00 1970
Return-Path: <gentoo-announce+bounces-2331-garchives=archives.gentoo.org@lists.gentoo.org>
Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80])
	(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by finch.gentoo.org (Postfix) with ESMTPS id 999C61382C5
	for <garchives@archives.gentoo.org>; Sun,  8 Apr 2018 23:37:33 +0000 (UTC)
Received: from pigeon.gentoo.org (localhost [127.0.0.1])
	by pigeon.gentoo.org (Postfix) with SMTP id E6212E0AF2;
	Sun,  8 Apr 2018 23:36:49 +0000 (UTC)
Received: from smtp.gentoo.org (smtp.gentoo.org [IPv6:2001:470:ea4a:1:5054:ff:fec7:86e4])
	(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
	(No client certificate requested)
	by pigeon.gentoo.org (Postfix) with ESMTPS id 41BB5E095C
	for <gentoo-announce@lists.gentoo.org>; Sun,  8 Apr 2018 23:27:40 +0000 (UTC)
Received: from localhost (pool-71-163-21-11.washdc.fios.verizon.net [71.163.21.11])
	(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
	(No client certificate requested)
	(Authenticated sender: bman)
	by smtp.gentoo.org (Postfix) with ESMTPSA id 7A4B8335C09
	for <gentoo-announce@lists.gentoo.org>; Sun,  8 Apr 2018 23:27:38 +0000 (UTC)
Date: Sun, 8 Apr 2018 19:27:35 -0400
From: Aaron Bauman <bman@gentoo.org>
To: gentoo-announce@lists.gentoo.org
Subject: [gentoo-announce] [ GLSA 201804-06 ] mailx: Multiple vulnerabilities
Message-ID: <20180408232735.GI24250@monkey>
Reply-To: security@gentoo.org
Precedence: bulk
List-Post: <mailto:gentoo-announce@lists.gentoo.org>
List-Help: <mailto:gentoo-announce+help@lists.gentoo.org>
List-Unsubscribe: <mailto:gentoo-announce+unsubscribe@lists.gentoo.org>
List-Subscribe: <mailto:gentoo-announce+subscribe@lists.gentoo.org>
List-Id: Gentoo Linux mail <gentoo-announce.gentoo.org>
X-BeenThere: gentoo-announce@lists.gentoo.org
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha256;
	protocol="application/pgp-signature"; boundary="boAH8PqvUi1v1f55"
Content-Disposition: inline
User-Agent: Mutt/1.9.4 (2018-02-28)
X-Archives-Salt: 468d22d0-d516-4cac-b119-be7e1afdc176
X-Archives-Hash: d2d75900e9e82d6a3bd119b3689e85fd


--boAH8PqvUi1v1f55
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 201804-06
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                           https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
    Title: mailx: Multiple vulnerabilities
     Date: April 08, 2018
     Bugs: #533208
       ID: 201804-06

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
=3D=3D=3D=3D=3D=3D=3D=3D

Multiple vulnerabilities were discovered in mailx, the worst of which
may allow a remote attacker to execute arbitrary commands.

Background
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

A utility program for sending and receiving mail, also known as a Mail
User Agent program.

Affected packages
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

    -------------------------------------------------------------------
     Package              /     Vulnerable     /            Unaffected
    -------------------------------------------------------------------
  1  mail-client/mailx        < 8.1.2.20160123      >=3D 8.1.2.20160123=20

Description
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

Multiple vulnerabilities have been discovered in mailx. Please review
the CVE identifiers referenced below for details.

Impact
=3D=3D=3D=3D=3D=3D

A remote attacker could execute arbitrary commands.

Workaround
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

There is no known workaround at this time.

Resolution
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

All mailx users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot -v ">=3Dmail-client/mailx-8.1.2.20160123"

References
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

[ 1 ] CVE-2004-2771
      https://nvd.nist.gov/vuln/detail/CVE-2004-2771
[ 2 ] CVE-2014-7844
      https://nvd.nist.gov/vuln/detail/CVE-2014-7844

Availability
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201804-06

Concerns?
=3D=3D=3D=3D=3D=3D=3D=3D=3D

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=3D=3D=3D=3D=3D=3D=3D

Copyright 2018 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5

--boAH8PqvUi1v1f55
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature

-----BEGIN PGP SIGNATURE-----

iQEzBAEBCAAdFiEEiDRK3jyVBE/RkymqpRQw84X1dt0FAlrKpWcACgkQpRQw84X1
dt2ZeAgAgE9nPa44h7dYMuu0Vj8ikLyUyHMgsIQvnXRcarZysFmPknC8+oIsuR7O
v+Y6kM7hDBfKkz0EekB3e2N4vZHQaeaKcq94I+CKB52dU8LGHSR+2l9uqwwbEAsW
VEydbuPsPRaUxKORp854nsh24bn75UuUB8w8ftrE5VJHB4V2V89jDyxpH2wTYUHF
XYmLmCMixUy88r401XJnU1dqkRI9d1p+muaMSqPHknN9HMtSD1xwidGDxyXub4ZV
rDhO1TqmiUK2iWG2LQ7/DMQwguMsxgtUmcJgWYnxzROwJm1Zs9Lm+/VgZfPjcuCb
XPLtk05BQiX5N2/rGUtePzVfX3sgTA==
=8aH0
-----END PGP SIGNATURE-----

--boAH8PqvUi1v1f55--