{"id":"MGASA-2020-0376","summary":"Updated cifs-utils packages fix security vulnerability","details":"The mount.cifs utility has a shell injection issue where one can embed shell\ncommands via the username mount option. Those commands will be run via popen()\nin the context of the user calling mount (CVE-2020-14342).\n","modified":"2026-04-16T00:09:04.846127877Z","published":"2020-09-27T20:06:37Z","upstream":["CVE-2020-14342"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2020-0376.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=27315"},{"type":"WEB","url":"https://lists.samba.org/archive/samba-technical/2020-September/135747.html"},{"type":"WEB","url":"https://lists.suse.com/pipermail/sle-security-updates/2020-September/007471.html"}],"affected":[{"package":{"name":"cifs-utils","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/cifs-utils?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.9-6.1.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2020-0376.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}