Gentoo: man Format string vulnerability
Posted by LinuxSecurity.com Team   
Gentoo man v1.5l, and below, contain a format string vulnerability.the vulnerability occurs when man uses an optional catalog file, suppliedby the NLSPATH/LANG environmental variables.

- - ---------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200306-06
- - ---------------------------------------------------------------------

          PACKAGE : man
          SUMMARY : format string exploit
             DATE : 2003-06-14 16:40 UTC
          EXPLOIT : local
VERSIONS AFFECTED : =man-1.5l-r5
              CVE :

- - ---------------------------------------------------------------------

from advisory:
"man v1.5l, and below, contain a format string vulnerability.
the vulnerability occurs when man uses an optional catalog file, supplied
by the NLSPATH/LANG environmental variables."

Read the full advisory at 
http://marc.theaimsgroup.com/?l=bugtraq&m=105474717920585&w=2

SOLUTION

It is recommended that all Gentoo Linux users who are running
sys-apps/man upgrade to man-1.5l-r5 as follows

emerge sync
emerge man
emerge clean

- - ---------------------------------------------------------------------
aliz@gentoo.org - GnuPG key is available at  http://cvs.gentoo.org/~aliz
- - ---------------------------------------------------------------------