* [gentoo-announce] GLSA: mpg123 (200309-17)
@ 2003-09-30 14:32 99% Daniel Ahlberg
0 siblings, 0 replies; 1+ results
From: Daniel Ahlberg @ 2003-09-30 14:32 UTC (permalink / raw
To: gentoo-announce, bugtraq, full-disclosure
[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #1: Type: text/plain, Size: 1353 bytes --]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- - - ---------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200309-17
- - - ---------------------------------------------------------------------
PACKAGE : mpg123
SUMMARY : buffer overflow
DATE : 2003-09-30 14:32 UTC
EXPLOIT : remote
GENTOO BUG # : 26787
CVE : CAN-2003-0577
- - - ---------------------------------------------------------------------
DESCRIPTION
mpg123 contains a heap based buffer overflow that would allow an remote
attacker to execute arbitrary code on the victims machine.
SOLUTION
it is recommended that all Gentoo Linux users who are running
media-sound/mpg123 upgrade to a fixed version.
make sure that the version to be installed is either one of
0.59r-r3 (stable) or 0.59s-r1 (masked).
emerge sync
emerge mpg123 -p
emerge mpg123
emerge clean
- - - ---------------------------------------------------------------------
aliz@gentoo.org - GnuPG key is available at http://dev.gentoo.org/~aliz
- - - ---------------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.3 (GNU/Linux)
iD8DBQE/eZPkfT7nyhUpoZMRAnwiAJ9PLTpDpa6cMaJekjdbX+b/QhqB0QCfTxhJ
aC2esvhlnUN1qSR9dPqjKv4=
=ggBo
-----END PGP SIGNATURE-----
^ permalink raw reply [relevance 99%]
Results 1-1 of 1 | reverse | options above
-- pct% links below jump to the message on this page, permalinks otherwise --
2003-09-30 14:32 99% [gentoo-announce] GLSA: mpg123 (200309-17) Daniel Ahlberg
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox