1 |
-----BEGIN PGP SIGNED MESSAGE----- |
2 |
Hash: SHA1 |
3 |
|
4 |
- - -------------------------------------------------------------------- |
5 |
GENTOO LINUX SECURITY ANNOUNCEMENT 200302-03 |
6 |
- - -------------------------------------------------------------------- |
7 |
|
8 |
PACKAGE : qt-dcgui |
9 |
SUMMARY : file leaking |
10 |
DATE : 2003-02-04 15:03 UTC |
11 |
EXPLOIT : remote |
12 |
|
13 |
- - -------------------------------------------------------------------- |
14 |
|
15 |
- From announcment: |
16 |
|
17 |
"All versions < 0.2.2 have a major security vulnerability in the |
18 |
directory parser. This bug allow a remote attacker to download files |
19 |
outside the sharelist. It's recommend that you upgrade the packages |
20 |
immediatly." |
21 |
|
22 |
Read the full announcment at: |
23 |
http://dc.ketelhot.de/pipermail/dc/2003-January/000094.html |
24 |
|
25 |
SOLUTION |
26 |
|
27 |
It is recommended that all Gentoo Linux users who are running |
28 |
net-p2p/qt-dcgui upgrade to qt-dcgui-0.2.4 as follows: |
29 |
|
30 |
emerge sync |
31 |
emerge -u qt-dcgui |
32 |
emerge clean |
33 |
|
34 |
- - -------------------------------------------------------------------- |
35 |
aliz@g.o - GnuPG key is available at www.gentoo.org/~aliz |
36 |
styx@g.o |
37 |
- - -------------------------------------------------------------------- |
38 |
-----BEGIN PGP SIGNATURE----- |
39 |
Version: GnuPG v1.2.1 (GNU/Linux) |
40 |
|
41 |
iD8DBQE+P9ZJfT7nyhUpoZMRAtoYAJ45ZBiV/8y3CFmv+/UiHTHfN+q1rACfd7bf |
42 |
GxwCDv8PO1m17sJJMp33KfA= |
43 |
=2ZdT |
44 |
-----END PGP SIGNATURE----- |