"[A] carefully crafted format string passed to sprintf can cause a
buffer overflow. This buffer overflow can then be used by an attacker to
execute code on the machine."

A patch is available.

More information:
<http://www.perlfoundation.org/news/2005/sprintf_patch_released.html>

Regards,
Tim
-- 
http://linuxfromscratch.org/mailman/listinfo/lfs-security
FAQ: http://www.linuxfromscratch.org/faq/
Unsubscribe: See the above information page

Reply via email to