|
|
Subscribe / Log in / New account

Gentoo alert 200212-5 (exim)

From:  Daniel Ahlberg <aliz@gentoo.org>
To:  bugtraq@securityfocus.com
Subject:  GLSA: exim
Date:  Mon, 16 Dec 2002 17:33:19 +0100

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - -------------------------------------------------------------------- GENTOO LINUX SECURITY ANNOUNCEMENT 200212-5 - - -------------------------------------------------------------------- PACKAGE : exim SUMMARY : local root vulnerability DATE    : 2002-12-16 16:12 UTC EXPLOIT : local - - -------------------------------------------------------------------- - From advisory: "This is a format string bug in daemon.c, line 976: sprintf(CS buff, CS pid_file_path, ""); /* Backward compatibility */ pid_file_path can be changed on the command line. This line is in the function daemon_go(), which only gets executed when the user is an exim-admin-user." Read the full advisory at http://marc.theaimsgroup.com/?l=bugtraq&m=103903403527788&w=2 SOLUTION It is recommended that all Gentoo Linux users who are running net-mail/exim-4.05 and earlier update their systems as follows: emerge rsync emerge exim emerge clean - - -------------------------------------------------------------------- aliz@gentoo.org - GnuPG key is available at www.gentoo.org/~aliz raker@gentoo.org - - -------------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iD8DBQE9/gBNfT7nyhUpoZMRAq43AKCfp65F8XNHS5Td8CE1qQiNqvrT9QCeJUTB 6MYY1rust/c7RtKpA78PAv4= =IZpj -----END PGP SIGNATURE-----


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds