GLSA: dietlibc (200303-29)

From: Daniel Ahlberg (alizat_private)
Date: Mon Mar 31 2003 - 04:35:56 PST

  • Next message: Grégory: "[SCSA-014] Remote Denial of Service Vulnerability in EZ Server"

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - - ---------------------------------------------------------------------
    GENTOO LINUX SECURITY ANNOUNCEMENT 200303-29
    - - ---------------------------------------------------------------------
    
              PACKAGE : dietlibc
              SUMMARY : integer overflow
                 DATE : 2003-03-31 12:35 UTC
              EXPLOIT : remote
    VERSIONS AFFECTED : <0.22-r1
        FIXED VERSION : >=0.22-r1
                  CVE : CAN-2003-0028
    
    - - ---------------------------------------------------------------------
    
    - From advisory:
    
    "The xdrmem_getbytes() function in the XDR library provided by
    Sun Microsystems contains an integer overflow. Depending on the
    location and use of the vulnerable xdrmem_getbytes() routine, various
    conditions may be presented that can permit an attacker to remotely
    exploit a service using this vulnerable routine."
    
    Read the full advisory at:
    http://www.eeye.com/html/Research/Advisories/AD20030318.html
    
    SOLUTION
    
    It is recommended that all Gentoo Linux users who are running
    dev-libs/dietlibc upgrade to dietlibc-0.22-r1 as follows:
    
    emerge sync
    emerge dietlibc
    emerge clean
    
    - - ---------------------------------------------------------------------
    alizat_private - GnuPG key is available at http://cvs.gentoo.org/~aliz
    - - ---------------------------------------------------------------------
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.2.1 (GNU/Linux)
    
    iD8DBQE+iDYjfT7nyhUpoZMRAnM9AKCjWSJBcsWKMWNpDx5fhhRM83zM8QCffwnA
    3203obwOioSqaykqFmB7lAo=
    =FJTb
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Mon Mar 31 2003 - 15:07:59 PST