lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
From: aliz at gentoo.org (Daniel Ahlberg) Subject: GLSA: slocate -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - -------------------------------------------------------------------- GENTOO LINUX SECURITY ANNOUNCEMENT 200302-02 - - -------------------------------------------------------------------- PACKAGE : slocate SUMMARY : buffer overflow DATE : 2003-02-02 13:36 UTC EXPLOIT : local - - -------------------------------------------------------------------- - From advisory: "The overflow appears when the slocate is runned with two parameters: - -c and -r, using as arguments a 1024 (or 10240, as Knight420 has informed us earlier) bytes string." Read the full advisory at http://www.usg.org.uk/advisories/2003.001.txt SOLUTION It is recommended that all Gentoo Linux users who are running sys-apps/slocate upgrade to slocate-2.7 as follows: emerge sync emerge -u slocate emerge clean - - -------------------------------------------------------------------- aliz@...too.org - GnuPG key is available at www.gentoo.org/~aliz - - -------------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQE+PR7NfT7nyhUpoZMRApEYAJ4uD5qRerI0di1uC0UOIrmMsFaIngCgk2JI XW5zgRH8d560fe7weHDCPrw= =H1YI -----END PGP SIGNATURE-----
Powered by blists - more mailing lists