*** This bug is a security vulnerability *** You have been subscribed to a public security bug by Jamie Strandboge (jdstrand):
a buffer overflow has been reported in the interactive port for gmetad (TCP/8652) which could result in code executed remotely or at least a DoS by crashing the gmetad daemon with a segfault and as can be seen in : http://bugzilla.ganglia.info/cgi-bin/bugzilla/show_bug.cgi?id=223 more information about this problem has been reported in : http://www.securityfocus.com/bid/33299 http://secunia.com/advisories/33506 a CVE was already requested by the Red Hat security team as shown by : http://www.openwall.com/lists/oss-security/2009/01/15/3 ** Affects: ganglia-monitor-core (Ubuntu) Importance: Undecided Status: New ** Affects: ganglia-monitor-core (Debian) Importance: Unknown Status: Unknown ** Affects: ganglia (Fedora) Importance: Unknown Status: Unknown ** Affects: ganglia (Gentoo Linux) Importance: Unknown Status: Confirmed -- gmetad: stack based buffer overflow in interactive port https://bugs.launchpad.net/bugs/319111 You received this bug notification because you are a member of Ubuntu Bugs, which is a direct subscriber. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs