Home / mailingsPDF  

[gentoo-announce] ERRATA: [ GLSA 200709-07 ] Eggdrop: Buffer overflow

Posted on 08 January 2008
Gentoo-announce

--nextPart4073195.KyciXJDQln
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline

=2D - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory [ERRATA UPDATE] =A0 =A0 =A0 =A0GLSA 200709-0=7:02
=2D - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
=A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0= =A0 =A0 =A0 http://security.gentoo.org/
=2D - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

=A0 Severity: Normal
=A0 =A0 =A0Title: Eggdrop: Buffer overflow
=A0 =A0 =A0 Date: September 15, 2007
=A0 =A0Updated: September 26, 2007
=A0 =A0 =A0 Bugs: #179354
=A0 =A0 =A0 =A0 ID: 200709-07:02

=2D - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Errata
======
The unaffected ebuild, as reported in the original version of this
Security Advisory, did not properly address all vulnerabilities.
All Eggdrop users should upgrade to net-irc/eggdrop-1.6.18-r3.


The corrected sections appear below.

Affected packages
=================
=A0 =A0 -------------------------------------------------------------------
=A0 =A0 =A0Package =A0 =A0 =A0 =A0 =A0/ =A0 Vulnerable =A0 / =A0 =A0 =A0 ==A0 =A0 =A0 =A0 =A0 =A0 =A0Unaffected
=A0 =A0 -------------------------------------------------------------------
=A0 1 =A0net-irc/eggdrop =A0 =A0 =A0< 1.6.18-r3 =A0 =A0 =A0 =A0 =A0 =A0 =A0= =A0 =A0 =A0 >= 1.6.18-r3

Resolution
==========
All Eggdrop users should upgrade to the latest version:

=A0 =A0 # emerge --sync
=A0 =A0 # emerge --ask --oneshot --verbose ">=net-irc/eggdrop-1.6.18-r3"

Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

=A0 http://security.gentoo.org/glsa/glsa-200709-07.xml

Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
=======
Copyright 2008 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5 =09

--nextPart4073195.KyciXJDQln
Content-Type: application/pgp-signature; name=signature.asc
Content-Description: This is a digitally signed message part.

 

TOP