blob: ab654ffa2e86bfe3806eeaca80d46e76c6d43d99 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="201006-14">
<title>Newt: User-assisted execution of arbitrary code</title>
A heap-based buffer overflow in the Newt library might allow remote,
user-assisted attackers to execute arbitrary code.
<product type="ebuild">newt</product>
<announced>June 02, 2010</announced>
<revised>June 02, 2010: 01</revised>
<package name="dev-libs/newt" auto="yes" arch="*">
<unaffected range="ge">0.52.10-r1</unaffected>
<vulnerable range="lt">0.52.10-r1</vulnerable>
Newt is a library for displaying text mode user interfaces.
Miroslav Lichvar reported that Newt is prone to a heap-based buffer
overflow in textbox.c.
<impact type="normal">
A remote attacker could entice a user to enter a specially crafted
string into a text dialog box rendered by Newt, possibly resulting in
the remote execution of arbitrary code with the privileges of the user
running the application, or a Denial of Service condition.
There is no known workaround at this time.
All Newt users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/newt-0.52.10-r1&quot;</code>
NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since October 26, 2009. It is likely that your system is
already no longer affected by this issue.
<uri link="">CVE-2009-2905</uri>
<metadata tag="requester" timestamp="Fri, 06 Nov 2009 09:28:48 +0000">
<metadata tag="submitter" timestamp="Mon, 31 May 2010 05:47:34 +0000">
<metadata tag="bugReady" timestamp="Mon, 31 May 2010 05:47:41 +0000">