-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-4291-1 security@debian.org https://www.debian.org/security/ Yves-Alexis Perez September 11, 2018 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : mgetty CVE ID : CVE-2018-16741 Two input sanitization failures have been found in the faxrunq and faxq binaries in mgetty, a smart modem getty replacement. An attacker could leverage them to insert commands via shell metacharacters in jobs id and have them executed with the privilege of the faxrunq/faxq user. For the stable distribution (stretch), this problem has been fixed in version 1.1.36-3+deb9u1. We recommend that you upgrade your mgetty packages. For the detailed security status of mgetty please refer to its security tracker page at: https://security-tracker.debian.org/tracker/mgetty Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQEzBAEBCgAdFiEE8vi34Qgfo83x35gF3rYcyPpXRFsFAluYHA0ACgkQ3rYcyPpX RFsyTQf/Q45bXa/UwHC3bEaDlSEdEqkK2IlT0LUFnbd6wNllIf+Ja9pEsJRYK1u2 fUiBr1qalQUSC77Ayzb6cAIH8aAzSumkwdoeBzIAJhSjMTHIyaO6q27QSd/VBXmO Ul5zZbzS03BIGQdj5uyG7/OWjXerfqzdXM5peFfOeofkRCVxMrCgWtXiVz/NtA9p 9+dMVuZmCl/DN76Fl658RU3Dnp2Bzv7Via3pARAzbX+NORkolvSYmaRRlwOihzmL 7I2yU6y6vOmPK0uzas12HXDccajt06gMH/6pMdcNLtDmZN1cPLzvUzvkKoMbS/FR +vB8dEZEQJE6MHLigBNaeS+Pwk6fxw== =ZMxH -----END PGP SIGNATURE-----