Gentoo Archives: gentoo-announce

From: Thierry Carrez <koon@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200511-01 ] libgda: Format string vulnerabilities
Date: Wed, 02 Nov 2005 17:10:00
Message-Id: 4368EE52.4030109@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200511-01
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: libgda: Format string vulnerabilities
9 Date: November 02, 2005
10 Bugs: #110467
11 ID: 200511-01
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Two format string vulnerabilities in libgda may lead to the execution
19 of arbitrary code.
20
21 Background
22 ==========
23
24 libgda is the library handling the data abstraction layer in the Gnome
25 data access architecture (GNOME-DB). It can also be used by non-GNOME
26 applications to manage data stored in databases or XML files.
27
28 Affected packages
29 =================
30
31 -------------------------------------------------------------------
32 Package / Vulnerable / Unaffected
33 -------------------------------------------------------------------
34 1 gnome-extra/libgda < 1.2.2-r1 >= 1.2.2-r1
35
36 Description
37 ===========
38
39 Steve Kemp discovered two format string vulnerabilities in the
40 gda_log_error and gda_log_message functions. Some applications may pass
41 untrusted input to those functions and be vulnerable.
42
43 Impact
44 ======
45
46 An attacker could pass malicious input to an application making use of
47 the vulnerable libgda functions, potentially resulting in the execution
48 of arbitrary code with the rights of that application.
49
50 Workaround
51 ==========
52
53 There is no known workaround at this time.
54
55 Resolution
56 ==========
57
58 All libgda users should upgrade to the latest version:
59
60 # emerge --sync
61 # emerge --ask --oneshot --verbose ">=gnome-extra/libgda-1.2.2-r1"
62
63 References
64 ==========
65
66 [ 1 ] CVE-2005-2958
67 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2958
68
69 Availability
70 ============
71
72 This GLSA and any updates to it are available for viewing at
73 the Gentoo Security Website:
74
75 http://security.gentoo.org/glsa/glsa-200511-01.xml
76
77 Concerns?
78 =========
79
80 Security is a primary focus of Gentoo Linux and ensuring the
81 confidentiality and security of our users machines is of utmost
82 importance to us. Any security concerns should be addressed to
83 security@g.o or alternatively, you may file a bug at
84 http://bugs.gentoo.org.
85
86 License
87 =======
88
89 Copyright 2005 Gentoo Foundation, Inc; referenced text
90 belongs to its owner(s).
91
92 The contents of this document are licensed under the
93 Creative Commons - Attribution / Share Alike license.
94
95 http://creativecommons.org/licenses/by-sa/2.0

Attachments

File name MIME type
signature.asc application/pgp-signature