Gentoo Linux Security Advisory GLSA 200903-22 - A buffer-overflow in Ganglia's gmetad might lead to the execution of arbitrary code. Spike Spiegel reported a stack-based buffer overflow in the process_path() function when processing overly long pathnames in gmetad/server.c. Versions less than 3.1.1-r2 are affected.
d82d1afc3792aca891062de3ccb6945580ab8592dfba3ffe27583f6250d12fbb
Debian Security Advisory 1710-1 - Spike Spiegel discovered a stack-based buffer overflow in gmetad, the meta-daemon for the ganglia cluster monitoring toolkit, which could be triggered via a request with long path names and might enable arbitrary code execution.
f1f2caa5aae07c04edc2d02f275cb87b62f382d9f2515e95ab3d41149b706cc8