Gentoo Archives: gentoo-announce

From: Daniel Ahlberg <aliz@g.o>
To: gentoo-announce@g.o
Subject: GLSA: file (200303-8)
Date: Tue, 11 Mar 2003 08:30:30
Message-Id: 20030308220624.4ABBE5770@mail2.tamperd.net
1 -----BEGIN PGP SIGNED MESSAGE-----
2 Hash: SHA1
3
4 - - ---------------------------------------------------------------------
5 GENTOO LINUX SECURITY ANNOUNCEMENT 200303-8
6 - - ---------------------------------------------------------------------
7
8 PACKAGE : file
9 SUMMARY : buffer overflow
10 DATE : 2003-03-08 22:11 UTC
11 EXPLOIT : local
12 VERSIONS AFFECTED : <3.41
13 FIXED VERSION : =>3.41
14 CVE : CAN-2003-0102
15
16 - - ---------------------------------------------------------------------
17
18 - From advisory:
19 "The file(1) command contains a buffer overflow vulnerability that can
20 be leveraged by an attacker to execute arbitrary code under the
21 privileges of another user."
22
23 Read the full advisory at:
24 http://www.idefense.com/advisory/03.04.03.txt
25
26 SOLUTION
27
28 It is recommended that all Gentoo Linux users who are running
29 sys-apps/file upgrade to file-3.41 as follows:
30
31 emerge sync
32 emerge file
33 emerge clean
34
35 - - ---------------------------------------------------------------------
36 aliz@g.o - GnuPG key is available at http://cvs.gentoo.org/~aliz
37 - - ---------------------------------------------------------------------
38 -----BEGIN PGP SIGNATURE-----
39 Version: GnuPG v1.2.1 (GNU/Linux)
40
41 iD8DBQE+amqRfT7nyhUpoZMRAiWVAJ0VrqZHZF9RP4/FRci2xuUKIYd6cgCbBSJd
42 qnnpZ9nyfLHEZ+4VxOmyBbk=
43 =sCx7
44 -----END PGP SIGNATURE-----