Mailinglist Archive: opensuse-security (409 mails)

< Previous Next >
Re: [suse-security] Q: RPC-Bufferoverflow
  • From: Roman Drahtmueller <draht@xxxxxxx>
  • Date: Mon, 12 Aug 2002 11:51:37 +0200 (MEST)
  • Message-id: <Pine.LNX.4.44.0208121150540.9498-100000@xxxxxxxxxxxx>
>
> Hello,
>
> according to
> http://cert.uni-stuttgart.de/archive/bugtraq/2002/07/msg00430.html there is a
> buffer-overflow in every RPC-Implementation derived from the original
> SUN-RPC-Code.
> As I didn't see any discussion or announcement on suse-security oder
> suse-security-announce I just wanted to ask whether a system using NFS (and
> therefor the RPC-Portmapper) as an Installation medium is affected by this
> vulnerability? System is SuSE 8.0, Kernel is a vanilla 2.4.18.

Our update packages are building right now, will be available on the ftp
server later today (hopefully) or early tomorrow morning. Announcement
following, too.


Thanks,
Roman.
--
- -
| Roman Drahtmüller <draht@xxxxxxx> // "You don't need eyes to see, |
SuSE Linux AG - Security Phone: // you need vision!"
| Nürnberg, Germany +49-911-740530 // Maxi Jazz, Faithless |
- -


< Previous Next >
References