GLSA: ggv

From: Daniel Ahlberg (alizat_private)
Date: Thu Oct 17 2002 - 01:30:09 PDT

  • Next message: Martin Schulze: "[SECURITY] [DSA 177-1] New PAM packages fix serious security violation in Debian/unstable"

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - - --------------------------------------------------------------------
    GENTOO LINUX SECURITY ANNOUNCEMENT 200210-003
    - - --------------------------------------------------------------------
    
    PACKAGE : ggv
    SUMMARY : buffer overflow
    EXPLOIT : local
    DATE    : 2002-10-17 08:30 UTC
    
    - - --------------------------------------------------------------------
    
    ggv shares the same buffer overflow problem that gv did.
    
    Read the full advisory at
    http://www.idefense.com/advisory/09.26.02.txt
    
    SOLUTION
    
    It is recommended that all Gentoo Linux users who are running
    app-text/ggv-1.99.90 and earlier update their systems
    as follows:
    
    emerge rsync
    emerge ggv
    emerge clean
    
    - - --------------------------------------------------------------------
    alizat_private - GnuPG key is available at www.gentoo.org/~aliz
    - - --------------------------------------------------------------------
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.0.7 (GNU/Linux)
    
    iD8DBQE9rnUQfT7nyhUpoZMRAr6jAKCNU3Ko5pluB0bZ3yIlw4paUyrh1ACgqQbf
    CvBJCihfTpuMWwci2+Rhn78=
    =mnVF
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Thu Oct 17 2002 - 12:30:42 PDT