Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!

TUCoPS :: Linux :: Debian :: dsa-375.htm

node - buffer overflow, format string

Debian Security Advisory

DSA-375-1 node -- buffer overflow, format string

Date Reported:
29 Aug 2003
Affected Packages:
Security database references:
In Mitre's CVE dictionary: CAN-2003-0707, CAN-2003-0708.
More information:

Morgan alias SM6TKY discovered and fixed several security related problems in LinuxNode, an Amateur Packet Radio Node program. The buffer overflow he discovered can be used to gain unauthorised root access and can be remotely triggered.

For the stable distribution (woody) this problem has been fixed in version 0.3.0a-2woody1.

For the unstable distribution (sid) this problem has been fixed in version 0.3.2-1.

We recommend that you upgrade your node packages immediately.

Fixed in:

Debian GNU/Linux 3.0 (woody)

Intel IA-32:
Intel IA-64:
Motorola 680x0:
Big endian MIPS:
Little endian MIPS:
IBM S/390:
Sun Sparc:

MD5 checksums of the listed files are available in the original advisory.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2015 AOH