From 4f2d7949f03e1c198bc888f2d05f421d35c57e21 Mon Sep 17 00:00:00 2001 From: V3n3RiX Date: Mon, 9 Oct 2017 18:53:29 +0100 Subject: reinit the tree, so we can have metadata --- metadata/glsa/glsa-200608-27.xml | 73 ++++++++++++++++++++++++++++++++++++++++ 1 file changed, 73 insertions(+) create mode 100644 metadata/glsa/glsa-200608-27.xml (limited to 'metadata/glsa/glsa-200608-27.xml') diff --git a/metadata/glsa/glsa-200608-27.xml b/metadata/glsa/glsa-200608-27.xml new file mode 100644 index 000000000000..aef71728418c --- /dev/null +++ b/metadata/glsa/glsa-200608-27.xml @@ -0,0 +1,73 @@ + + + + Motor: Execution of arbitrary code + + Motor uses a vulnerable ktools library, which could lead to the execution + of arbitrary code. + + motor + 2006-08-29 + 2006-08-29: 01 + 135020 + remote + + + 3.3.0-r1 + 3.4.0-r1 + 3.4.0-r1 + + + +

+ Motor is a text mode based programming environment for Linux, with a + syntax highlighting feature, project manager, makefile generator, gcc + and gdb front-end, and CVS integration. +

+
+ +

+ In November 2005, Zone-H Research reported a boundary error in the + ktools library in the VGETSTRING() macro of kkstrtext.h, which may + cause a buffer overflow via an overly long input string. +

+
+ +

+ A remote attacker could entice a user to use a malicious file or input, + which could lead to the crash of Motor and possibly the execution of + arbitrary code. +

+
+ +

+ There is no known workaround at this time. +

+
+ +

+ All Motor 3.3.x users should upgrade to the latest version: +

+ + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-util/motor-3.3.0-r1" +

+ All motor 3.4.x users should upgrade to the latest version: +

+ + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-util/motor-3.4.0-r1" +
+ + CVE-2005-3863 + + + jaervosz + + + falco + + + falco + +
-- cgit v1.2.3