Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#46573 - [bugzilla][CVE-2015-4499] Unauthorized Account Creation
Attached to Project:
Community Packages
Opened by Christian Rebischke (Shibumi) - Monday, 05 October 2015, 22:22 GMT
Last edited by Sergej Pupykin (sergej) - Thursday, 08 October 2015, 10:41 GMT
Opened by Christian Rebischke (Shibumi) - Monday, 05 October 2015, 22:22 GMT
Last edited by Sergej Pupykin (sergej) - Thursday, 08 October 2015, 10:41 GMT
|
DetailsDescription
=========== Login names (usually an email address) longer than 127 characters are silently truncated in MySQL which could cause the domain name of the email address to be corrupted. An attacker could use this vulnerability to create an account with an email address different from the one originally requested. The login name could then be automatically added to groups based on the group's regular expression setting. [1] This vulnerability was classified as CVE-2015-4499. [2] References ========== [1] https://www.bugzilla.org/security/4.2.14/ [2] https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-4499 greetings Christian Rebischke (Archlinux CVE-Monitoring Team) |
This task depends upon
Closed by Sergej Pupykin (sergej)
Thursday, 08 October 2015, 10:41 GMT
Reason for closing: Fixed
Additional comments about closing: updated to 5.0.1
Thursday, 08 October 2015, 10:41 GMT
Reason for closing: Fixed
Additional comments about closing: updated to 5.0.1