FS#71292 - [libesmtp] CVE-2019-19977
Attached to Project:
Community Packages
Opened by loqs (loqs) - Friday, 18 June 2021, 22:46 GMT
Last edited by Antonio Rojas (arojas) - Saturday, 19 June 2021, 07:13 GMT
Opened by loqs (loqs) - Friday, 18 June 2021, 22:46 GMT
Last edited by Antonio Rojas (arojas) - Saturday, 19 June 2021, 07:13 GMT
|
Details
Description:
libESMTP through 1.0.6 mishandles domain copying into a fixed-size buffer in ntlm_build_type_2 in ntlm/ntlmstruct.c, as demonstrated by a stack-based buffer over-read. Fixed by [2]. Assuming [3] is the same project as was [4]. Then updating to the 1.1 release [5] resolves the issue. This would also fix The new release switched from the custom libesmtp-config utility to pkgconfig support which requires changes in syslog-ng to support [6][7]. [8] Applies the required patch from the PR, also removes libtool overlinking. Additional info: * libesmtp 1.0.6-7 [1] https://nvd.nist.gov/vuln/detail/CVE-2019-19977 [2] https://github.com/libesmtp/libESMTP/commit/8c85278d28ff4da32106714a1420371fe37ef349 [3] https://github.com/libesmtp/libESMTP [4] http://www.stafford.uklinux.net/libesmtp/ [5] PKGBUILD.diff.libesmtp [6] https://github.com/syslog-ng/syslog-ng/pull/3669 [7] https://github.com/syslog-ng/syslog-ng/pull/3669/commits/b8284f8ecac588f6a321c779cce06cbe182611a5 [8] PKGBUILD.diff.libesmtp |
This task depends upon