Summary: | net-im/linpopup: remotely exploitable buffer overflow (just in 1.2.0?) | ||||||||
---|---|---|---|---|---|---|---|---|---|
Product: | Gentoo Security | Reporter: | Sascha Silbe <sascha-gentoo-bugzilla> | ||||||
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> | ||||||
Status: | RESOLVED FIXED | ||||||||
Severity: | normal | ||||||||
Priority: | High | ||||||||
Version: | unspecified | ||||||||
Hardware: | All | ||||||||
OS: | All | ||||||||
Whiteboard: | B2 [glsa] koon | ||||||||
Package list: | Runtime testing required: | --- | |||||||
Attachments: |
|
Description
Sascha Silbe
2004-12-16 16:20:59 UTC
Created attachment 46179 [details]
File 3.msg from advisory
mholzer since you have been dealing with the ebuild, can you verify/advise? Also 1.2.0 should maybe be considered for removal from the tree. ___ http://securitytracker.com/alerts/2004/Dec/1012542.html ====================================================== Candidate: CAN-2004-1282 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1282 Reference: MISC:http://tigger.uic.edu/~jlongs2/holes/linpopup.txt Buffer overflow in the strexpand function in string.c for LinPopUp 1.2.0 allows remote attackers to execute arbitrary code via a crafted message that is not properly handled during a Reply operation. ====================================================== Created attachment 47207 [details, diff] string.c.diff Patch from http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=287044 This applies cleanly to our stable (2.0.2) version and probably others. No metadata. mholzer/vapier : could you please apply patch (probably to all versions) and bump ? i dont know why you thought i could help, i'm not in the ChangeLog :P ... i'm not your security lacky you know ! version bumped to 2.0.4 and removed the older ebuilds ... x86 was the only one to have a stable version, amd64/ppc were added with 2.0.3, but as unstable new 2.0.4 is marked x86 stable and amd64/ppc unstable Thx vapier, you just signed yourself over to Security:P vapier: 2.0.4 still needs patch applied. Could you please bump to -r1 ? (I really should take time to read that quiz) added 2.0.4-r1 to cvs with patch Thx, really ready now. Draft submitted, security please review GLSA 200501-01 |