| Summary: | mail-filter/procmail: unsafe handling of TZ environment variable | ||
|---|---|---|---|
| Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
| Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
| Status: | RESOLVED INVALID | ||
| Severity: | minor | CC: | net-mail+disabled |
| Priority: | Normal | ||
| Version: | unspecified | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | https://bugzilla.redhat.com/show_bug.cgi?id=1192237 | ||
| Whiteboard: | B3 [upstream] | ||
| Package list: | Runtime testing required: | --- | |
From $URL: Adam Mariš said: CVE-2014-9681 has been rejected. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Closing as invalid because CVE was withdrawn by its CNA and further investigation showed that it was not a security issue. |
From ${URL} : It is reported that procmail has a similar flaw to sudo's CVE-2014-9680 in that procmail whitelists TZ values incorrectly. External references: http://openwall.com/lists/oss-security/2014/10/15/24 https://sources.debian.net/src/procmail/3.22-20%2Bdeb7u1/config.h/?hl=22#L13 http://seclists.org/oss-sec/2015/q1/533 @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.