1 |
- ----------------------------------------------------------------------- |
2 |
GLSA: GENTOO LINUX SECURITY ANNOUNCEMENT |
3 |
- ----------------------------------------------------------------------- |
4 |
PACKAGE : app-admin/syslog-ng |
5 |
VERSION : 1.5.20 and below |
6 |
SUMMARY : buffer overflow vulnerability |
7 |
DATE : Sat Oct 12 10:31:38 UTC 2002 |
8 |
- ----------------------------------------------------------------------- |
9 |
|
10 |
OVERVIEW |
11 |
|
12 |
Macros can be used to identify message destinations and also to specify |
13 |
contents of destination files. Macros are expanded in a fixed length |
14 |
buffer with no bounds-checking. This is not a problem with the default |
15 |
configuration. |
16 |
|
17 |
DETAIL |
18 |
|
19 |
The full advisory may be found here: |
20 |
|
21 |
http://www.balabit.hu/static/zsa/ZSA-2002-014-en.txt |
22 |
|
23 |
SOLUTION |
24 |
|
25 |
It is recommended that all Gentoo Linux users who are running |
26 |
app-admin/syslog-ng-1.5.20* and earlier update their |
27 |
systems as follows. |
28 |
|
29 |
|
30 |
emerge rsync |
31 |
emerge syslog-ng |
32 |
emerge clean |
33 |
|
34 |
- ------------------------------------------------------------------------ |
35 |
blocke@g.o |
36 |
seemant@g.o |
37 |
drobbins@g.o |
38 |
- ------------------------------------------------------------------------ |
39 |
|
40 |
|
41 |
|
42 |
-- |
43 |
Seemant Kulleen |
44 |
Developer and Project Co-ordinator, |
45 |
Gentoo Linux http://www.gentoo.org/~seemant |