[Whitebox-announce] [WBSA-2004:035-01] Updated mc packages resolve buffer overflow vulnerability

John Morris jmorris@beau.org
Thu, 12 Feb 2004 18:01:07 -0600 (CST)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ----------------------------------------------------------------------
                   Security Advisory

Synopsis:          Updated mc packages resolve buffer overflow vulnerability
Advisory ID:       WBSA-2004:035-01
Issue date:        2004-01-19
Updated on:        2004-02-12
Product:           White Box Enterprise Linux 3.0 (i386)
Keywords:          mc buffer overflow vfs
Cross references:  
Obsoletes:         
CVE Names:         CAN-2003-1023
- ----------------------------------------------------------------------

Updated mc packages that resolve a buffer overflow vulnerability are now
available.

More information is available in Red Hat, Inc's original advisory 
available on their site at:

http://www.redhat.com/archives/enterprise-watch-list/2004-February/msg00001.html

To install this new package on your White Box Enterprise Linux system
use the Up2Date Network or Yum.

Note: Be sure to change the default Up2Date or Yum server from the
initial location to prevent undue load to the whiteboxlinux.org
server, which doesn't have a lot of outbound bandwidth.  The config
files already have entries for mirror sites commented out.

Up2Date's configuration file is at /etc/sysconfig/rhn/sources

Yum's configuration is in /etc/yum.conf


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)
Comment: Made with pgp4pine 1.76

iD8DBQFALBPEqME6bvnsqA8RAsGwAKDDFloVoJVxHto3Qxfu9sdaOyxOXQCdE6I/
MTmJSejG4PUkY6Hrp8fPCck=
=yyCq
-----END PGP SIGNATURE-----