Gentoo alert glibc-20020713 (glibc)
From: | Seemant Kulleen <seemant@gentoo.org> | |
To: | gentoo-announce@gentoo.org, lwn@lwn.net, gentoo-user@gentoo.org, gentoo-dev@gentoo.org, gentoo-desktop@gentoo.org, gentoo-newbies@gentoo.org, gentoo-security@gentoo.org, gentoo-sparc@gentoo.org, gentoo-user@gentoo.org, gentoo-user-es@gentoo.org, gentooppc-dev@gentoo.org, gentooppc-user@gentoo.org | |
Subject: | GLSA: glibc | |
Date: | Sat, 13 Jul 2002 14:45:55 -0700 |
- ----------------------------------------------------------------------- GLSA: GENTOO LINUX SECURITY ANNOUNCEMENT - ----------------------------------------------------------------------- PACKAGE : glibc SUMMARY : buffer overflow vulnerability in glibc DATE : Sat Jul 13 21:36:11 UTC 2002 - ----------------------------------------------------------------------- OVERVIEW The DNS resolver code in glibc may allow a remote attacker to send malicious dns responses to execute arbitrary code or cause a denial of service attack on affected systems. DETAIL Any code run by the attacker would run with the same privileges as the process which calls the resolver library. Additionally, the attacker may cause one of the services on the victim machine to make DNS requests to a server under the attacker's control and execute more arbitrary code. http://www.cert.org/advisories/CA-2002-19.html http://bugs.gentoo.org/show_bug.cgi?id=4923 SOLUTION It is recommended that all Gentoo Linux users update their systems as follows. emerge --clean rsync emerge glibc emerge clean - ------------------------------------------------------------------------ MichaelThompson@tx.slr.com azarah@gentoo.org seemant@gentoo.org drobbins@gentoo.org - ------------------------------------------------------------------------