Login
Newsletter
Werbung

Sicherheit: Pufferüberlauf in man
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf in man
ID: 200306-06
Distribution: Gentoo
Plattformen: Keine Angabe
Datum: So, 15. Juni 2003, 13:00
Referenzen: Keine Angabe
Applikationen: man

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

--------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200306-06
--------------------------------------------------------------------

          PACKAGE : man
          SUMMARY : format string exploit
             DATE : 2003-06-14 16:40 UTC
          EXPLOIT : local
VERSIONS AFFECTED : <man-1.5l-r5
    FIXED VERSION : >=man-1.5l-r5
              CVE :

--------------------------------------------------------------------

from advisory:
"man v1.5l, and below, contain a format string vulnerability.
the vulnerability occurs when man uses an optional catalog file, supplied
by the NLSPATH/LANG environmental variables."

Read the full advisory at
http://marc.theaimsgroup.com/?l=bugtraq&m=105474717920585&w=2

SOLUTION

It is recommended that all Gentoo Linux users who are running
sys-apps/man upgrade to man-1.5l-r5 as follows

emerge sync
emerge man
emerge clean

--------------------------------------------------------------------
aliz@gentoo.org - GnuPG key is available at http://cvs.gentoo.org/~aliz
--------------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)

iD4DBQE+61ARfT7nyhUpoZMRAnW+AJUYWqVOLTPK6/sIllvzJRVETlRpAJ9x9DTH
l9z03YHvmLoi4+E05lSstQ==
=e66C
-----END PGP SIGNATURE-----
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung