1 |
-----BEGIN PGP SIGNED MESSAGE----- |
2 |
Hash: SHA1 |
3 |
|
4 |
- - -------------------------------------------------------------------- |
5 |
GENTOO LINUX SECURITY ANNOUNCEMENT 200301-9 |
6 |
- - -------------------------------------------------------------------- |
7 |
|
8 |
PACKAGE : fnord |
9 |
SUMMARY : buffer overrun |
10 |
DATE : 2003-01-17 10:01 UTC |
11 |
EXPLOIT : remote |
12 |
|
13 |
- - -------------------------------------------------------------------- |
14 |
|
15 |
- From http://www.fefe.de/fnord/ : |
16 |
|
17 |
"fnord 1.6 contained a buffer overrun in the CGI code. However, since |
18 |
the function does not return, this does not appear to be exploitable." |
19 |
|
20 |
SOLUTION |
21 |
|
22 |
It is recommended that all Gentoo Linux users who are running |
23 |
net-www/fnord upgrade to fnord-1.7 as follows: |
24 |
|
25 |
emerge sync |
26 |
emerge -u fnord |
27 |
emerge clean |
28 |
|
29 |
- - -------------------------------------------------------------------- |
30 |
aliz@g.o - GnuPG key is available at www.gentoo.org/~aliz |
31 |
- - -------------------------------------------------------------------- |
32 |
-----BEGIN PGP SIGNATURE----- |
33 |
Version: GnuPG v1.2.1 (GNU/Linux) |
34 |
|
35 |
iD8DBQE+J965fT7nyhUpoZMRAuCeAKCL+Gx3KLkHUsiVAfu2yznNl06faQCfVZYw |
36 |
Qh1zgDuavVCzhV/OQcKXzks= |
37 |
=DqUE |
38 |
-----END PGP SIGNATURE----- |