Bug 9899
Summary: | Linux dump buffer overflow | ||
---|---|---|---|
Product: | [Retired] Red Hat Linux | Reporter: | smedina |
Component: | dump | Assignee: | Nalin Dahyabhai <nalin> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | 6.0 | CC: | mattdm, spop |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2000-11-01 15:02:54 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
smedina
2000-03-01 19:12:37 UTC
As the official dump maintainer, I confirm that all versions of dump prior and including 0.4b14 has the problem you described (although no known exploits have been reported). This was fixed in 0.4b15, released today, available from dump home page (http://dump.sourceforge.net). I am sure that the people at RedHat will package and ship this latest version in the upcoming RedHat 6.2. Stelian. This is also a problem in RH 6.1, 6.2beta, and Rawhide. I hope to see an update from RH soon! Fixed in dump-0.4b19-5. |