- - ---------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200303-29
- - ---------------------------------------------------------------------

          PACKAGE : dietlibc
          SUMMARY : integer overflow
             DATE : 2003-03-31 12:35 UTC
          EXPLOIT : remote
VERSIONS AFFECTED : <0.22-r1 : fixed version>=0.22-r1
              CVE : CAN-2003-0028

- - ---------------------------------------------------------------------

- From advisory:

"The xdrmem_getbytes() function in the XDR library provided by
Sun Microsystems contains an integer overflow. Depending on the
location and use of the vulnerable xdrmem_getbytes() routine, various
conditions may be presented that can permit an attacker to remotely
exploit a service using this vulnerable routine."

Read the full advisory at: 
Privileged Access Management, Cyber Security, and… | BeyondTrust

SOLUTION

It is recommended that all Gentoo Linux users who are running
dev-libs/dietlibc upgrade to dietlibc-0.22-r1 as follows:

emerge sync
emerge dietlibc
emerge clean

- - ---------------------------------------------------------------------
aliz@gentoo.org - GnuPG key is available at   
- - ---------------------------------------------------------------------

0.22-r1

Gentoo: xdrmem_getbytes buffer overflow vulnerability

The xdrmem_getbytes() function in the XDR library provided by Sun Microsystems contains an integer overflow.

Summary


- - ---------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200303-29
- - ---------------------------------------------------------------------

- - ---------------------------------------------------------------------
- From advisory:
"The xdrmem_getbytes() function in the XDR library provided by Sun Microsystems contains an integer overflow. Depending on the location and use of the vulnerable xdrmem_getbytes() routine, various conditions may be presented that can permit an attacker to remotely exploit a service using this vulnerable routine."
Read the full advisory at: Privileged Access Management, Cyber Security, and… | BeyondTrust
SOLUTION
It is recommended that all Gentoo Linux users who are running dev-libs/dietlibc upgrade to dietlibc-0.22-r1 as follows:
emerge sync emerge dietlibc emerge clean
- - --------------------------------------------------------------------- aliz@gentoo.org - GnuPG key is available at - - ---------------------------------------------------------------------
0.22-r1

Resolution

References

Availability

Concerns

Severity
PACKAGE : dietlibc
SUMMARY : integer overflow
DATE : 2003-03-31 12:35 UTC
EXPLOIT : remote
VERSIONS AFFECTED : <0.22-r1 : fixed version>=0.22-r1
CVE : CAN-2003-0028

Synopsis

Background

Affected Packages

Impact

Workaround

Related News