Gentoo: slocate buffer overflow vulnerability
Summary
- -------------------------------------------------------------------- GENTOO LINUX SECURITY ANNOUNCEMENT 200302-02 - -------------------------------------------------------------------- DATE : 2003-02-02 13:36 UTC
- --------------------------------------------------------------------
From advisory:
"The overflow appears when the slocate is runned with two parameters: -c and -r, using as arguments a 1024 (or 10240, as Knight420 has informed us earlier) bytes string."
Read the full advisory at
SOLUTION
It is recommended that all Gentoo Linux users who are running sys-apps/slocate upgrade to slocate-2.7 as follows:
emerge sync emerge -u slocate emerge clean
- -------------------------------------------------------------------- aliz@gentoo.org - GnuPG key is available at - --------------------------------------------------------------------