Lucene search

K
mageiaGentoo FoundationMGASA-2018-0314
HistoryJul 13, 2018 - 10:01 p.m.

Updated cantata packages fix security vulnerability

2018-07-1322:01:19
Gentoo Foundation
advisories.mageia.org
8

0.002 Low

EPSS

Percentile

60.6%

The mount target path check in mounter.cpp ‘mpOk()’ is insufficient. A regular user can this way mount a CIFS filesystem anywhere, and not just beneath /home by passing relative path components (CVE-2018-12559). Arbitrary unmounts can be performed by regular users the same way (CVE-2018-12560). A regular user can inject additional mount options like file_mode= by manipulating e.g. the domain parameter of the samba URL (CVE-2018-12561). The wrapper script ‘mount.cifs.wrapper’ uses the shell to forward the arguments to the actual mount.cifs binary. The shell evaluates wildcards which can also be injected (CVE-2018-12562). To fix these issues, the vulnerable D-Bus service has been removed.

OSVersionArchitecturePackageVersionFilename
Mageia6noarchcantata< 2.0.1-5.1cantata-2.0.1-5.1.mga6