Gentoo: setiathome buffer overflow vulnerability
Summary
- - --------------------------------------------------------------------- GENTOO LINUX SECURITY ANNOUNCEMENT 200304-03 - - ---------------------------------------------------------------------
- - ---------------------------------------------------------------------
- From advisory:
"There is a buffer overflow in the server responds handler. Sending an overly large string followed by a newline ('\n') character to the client will trigger this overflow. This has been tested with various versions of the client. All versions are presumed to have this flaw in some form."
Read the full advisory at:
SOLUTION
It is recommended that all Gentoo Linux users who are running app-sci/setiathome upgrade to setiathome-3.08 as follows:
emerge sync emerge setiathome emerge clean
- - --------------------------------------------------------------------- aliz@gentoo.org - GnuPG key is available at - - ---------------------------------------------------------------------
3.08
Resolution
References
Availability
Concerns
Background