Gentoo: file Buffer overflow vulnerability
Summary
- --------------------------------------------------------------------- GENTOO LINUX SECURITY ANNOUNCEMENT 200303-8 - ---------------------------------------------------------------------
- ---------------------------------------------------------------------
>From advisory: "The file(1) command contains a buffer overflow vulnerability that can be leveraged by an attacker to execute arbitrary code under the privileges of another user."
Read the full advisory at: /us-en
SOLUTION
It is recommended that all Gentoo Linux users who are running sys-apps/file upgrade to file-3.41 as follows:
emerge sync emerge file emerge clean
- --------------------------------------------------------------------- aliz@gentoo.org - GnuPG key is available at - ---------------------------------------------------------------------
3.41
Resolution
References
Availability
Concerns
Background