Gentoo Archives: gentoo-announce

From: Daniel Ahlberg <aliz@g.o>
To: gentoo-announce@g.o
Subject: GLSA: dietlibc (200303-29)
Date: Mon, 31 Mar 2003 12:36:33
Message-Id: 20030331123549.CC5CE33A01@mail1.tamperd.net
1 -----BEGIN PGP SIGNED MESSAGE-----
2 Hash: SHA1
3
4 - - ---------------------------------------------------------------------
5 GENTOO LINUX SECURITY ANNOUNCEMENT 200303-29
6 - - ---------------------------------------------------------------------
7
8 PACKAGE : dietlibc
9 SUMMARY : integer overflow
10 DATE : 2003-03-31 12:35 UTC
11 EXPLOIT : remote
12 VERSIONS AFFECTED : <0.22-r1
13 FIXED VERSION : >=0.22-r1
14 CVE : CAN-2003-0028
15
16 - - ---------------------------------------------------------------------
17
18 - From advisory:
19
20 "The xdrmem_getbytes() function in the XDR library provided by
21 Sun Microsystems contains an integer overflow. Depending on the
22 location and use of the vulnerable xdrmem_getbytes() routine, various
23 conditions may be presented that can permit an attacker to remotely
24 exploit a service using this vulnerable routine."
25
26 Read the full advisory at:
27 http://www.eeye.com/html/Research/Advisories/AD20030318.html
28
29 SOLUTION
30
31 It is recommended that all Gentoo Linux users who are running
32 dev-libs/dietlibc upgrade to dietlibc-0.22-r1 as follows:
33
34 emerge sync
35 emerge dietlibc
36 emerge clean
37
38 - - ---------------------------------------------------------------------
39 aliz@g.o - GnuPG key is available at http://cvs.gentoo.org/~aliz
40 - - ---------------------------------------------------------------------
41 -----BEGIN PGP SIGNATURE-----
42 Version: GnuPG v1.2.1 (GNU/Linux)
43
44 iD8DBQE+iDYjfT7nyhUpoZMRAnM9AKCjWSJBcsWKMWNpDx5fhhRM83zM8QCffwnA
45 3203obwOioSqaykqFmB7lAo=
46 =FJTb
47 -----END PGP SIGNATURE-----