Mailing List ArchiveSupport open source code!
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]Re: tlug: libc5 buffer overruns
- To: tlug@example.com
- Subject: Re: tlug: libc5 buffer overruns
- From: Jonathan Byrne - 3Web <jq@example.com>
- Date: Sat, 14 Nov 1998 11:11:18 +0900 (JST)
- Content-Type: TEXT/PLAIN; charset=US-ASCII
- In-Reply-To: <Pine.LNX.3.96LJ1.1b7.981114104123.13535w-100000@example.com>
- Reply-To: tlug@example.com
- Sender: owner-tlug@example.com
On Red Hat's site it doesn't say what the exploit is exactly. Just says buffer overruns. Finding out where would take some more digging. It does say that it affects Sparc and Intel, so Alpha is apparently safe. While there, I also found this one about svgalib, from Nov. 6. It affects RH 5.1 and 5.2: (06-Nov-1998) Security Fix: svgalib has been found to leak file descriptors to /dev/mem. Red Hat would like to thank the users of the BUGTRAQ security list for identifying the problem and Kevin Vajk for providing a fix. Users of Red Hat Linux are recommended to upgrade to the new packages available under the updates directory on our ftp site: To upgrade this package use the rpm command: rpm -Uvh svgalib-1.3.0-1 Jonathan ---------------------------------------------------------------- Next Nomikai: 20 November, 19:30 Tengu TokyoEkiMae 03-3275-3691 Next Technical Meeting: 12 December, 12:30 HSBC Securities Office ---------------------------------------------------------------- more info: http://tlug.linux.or.jp Sponsors: PHT, HSBC Securities
- References:
- Re: tlug: libc5 buffer overruns
- From: Scott Stone <sstone@example.com>
Home | Main Index | Thread Index
- Prev by Date: Re: tlug: libc5 buffer overruns
- Next by Date: Re: tlug: apache 1.3.3
- Prev by thread: Re: tlug: libc5 buffer overruns
- Next by thread: tlug: Relocating LILO
- Index(es):
Home Page Mailing List Linux and Japan TLUG Members Links