Gentoo Archives: gentoo-ppc-dev

From: Seemant Kulleen <seemant@g.o>
To: gentoo-announce@g.o, lwn@×××.net, gentoo-user@g.o, gentoo-dev@g.o, gentoo-desktop@g.o, gentoo-newbies@g.o, gentoo-security@g.o, gentoo-sparc@g.o, gentoo-user@g.o, gentoo-user-es@g.o, gentooppc-dev@g.o, gentooppc-user@g.o
Subject: [gentooppc-dev] GLSA: glibc
Date: Sat, 13 Jul 2002 16:46:04
Message-Id: 20020713144555.20a0e4c7.seemant@gentoo.org
- -----------------------------------------------------------------------
GLSA: GENTOO LINUX SECURITY ANNOUNCEMENT
- -----------------------------------------------------------------------
PACKAGE         : glibc
SUMMARY         : buffer overflow vulnerability in glibc
DATE            : Sat Jul 13 21:36:11 UTC 2002
- -----------------------------------------------------------------------

OVERVIEW

The DNS resolver code in glibc may allow a remote attacker to send
malicious dns responses to execute arbitrary code or cause a denial of
service attack on affected systems.

DETAIL

Any code run by the attacker would run with the same privileges as the
process which calls the resolver library.  Additionally, the attacker may
cause one of the services on the victim machine to make DNS requests to a
server under the attacker's control and execute more arbitrary code.

http://www.cert.org/advisories/CA-2002-19.html
http://bugs.gentoo.org/show_bug.cgi?id=4923


SOLUTION

It is recommended that all Gentoo Linux users update their systems as
follows.

emerge --clean rsync
emerge glibc
emerge clean

- ------------------------------------------------------------------------
MichaelThompson@××××××.com
azarah@g.o
seemant@g.o
drobbins@g.o
- ------------------------------------------------------------------------