[SECURITY] [DSA-315-1] New gnocatan packages fix buffer overflows, denial of service From: Matt Zimmerman <mdz@debian.org> To: debian-security-announce@lists.debian.org Date: Thursday 01.36.26 Message was signed with unknown key 0x43E25D1E. The validity of the signature cannot be verified. -------------------------------------------------------------------------- Debian Security Advisory DSA 315-1 security@debian.org http://www.debian.org/security/ Matt Zimmerman June 11th, 2003 http://www.debian.org/security/faq -------------------------------------------------------------------------- Package : gnocatan Vulnerability : buffer overflows, denial of service Problem-Type : remote Bas Wijnen discovered that the gnocatan server is vulnerable to several buffer overflows which could be exploited to execute arbitrary code on the server system
Here you go. See the attachments. I hope to address the stability issues some other time.
Created attachment 13574 [details] gnocatan-0.7.1-r3.ebuild
Created attachment 13575 [details, diff] gnocatan-wijnen-patch.diff
ill add this patch tomorrow
glsa sent