Full Disclosure mailing list archives
GLSA: fnord
From: Daniel Ahlberg <aliz () gentoo org>
Date: Fri, 17 Jan 2003 11:45:25 +0100
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - -------------------------------------------------------------------- GENTOO LINUX SECURITY ANNOUNCEMENT 200301-9 - - -------------------------------------------------------------------- PACKAGE : fnord SUMMARY : buffer overrun DATE : 2003-01-17 10:01 UTC EXPLOIT : remote - - -------------------------------------------------------------------- - From http://www.fefe.de/fnord/ : "fnord 1.6 contained a buffer overrun in the CGI code. However, since the function does not return, this does not appear to be exploitable." SOLUTION It is recommended that all Gentoo Linux users who are running net-www/fnord upgrade to fnord-1.7 as follows: emerge sync emerge -u fnord emerge clean - - -------------------------------------------------------------------- aliz () gentoo org - GnuPG key is available at www.gentoo.org/~aliz - - -------------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQE+J965fT7nyhUpoZMRAuCeAKCL+Gx3KLkHUsiVAfu2yznNl06faQCfVZYw Qh1zgDuavVCzhV/OQcKXzks= =DqUE -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- GLSA: fnord Daniel Ahlberg (Jan 17)