Linux Today: Linux News On Internet Time.
Search Linux Today
Linux News Sections:  Developer -  High Performance -  Infrastructure -  IT Management -  Security -  Storage -
Linux Today Navigation
LT Home
Contribute
Contribute
Link to Us
Linux Jobs


Top White Papers

More on LinuxToday


Gentoo Linux Advisories: xfree, zope

Oct 24, 2002, 18:59 (0 Talkback[s])

- - --------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200210-006
- - --------------------------------------------------------------------

PACKAGE : xfree
SUMMARY : Shared memory may be compromised by local XFree86 users
DATE    : 2002-10-24 10:00 UTC
EXPLOIT : local

- - --------------------------------------------------------------------

Roberto Zunino discovered a vulnerability in the MIT-SHM extension of
XFree86 prior to versions 4.2.1. The vulnerability allows a local
user who can run XFree86 to gain read/write access to any shared
memory segment in the system. Although the use of shared memory
segments to store trusted data is not a common practice, by
exploiting this vulnerability the attacker potentially can get and/or
change sensitive information.

SOLUTION

It is recommended that all Gentoo Linux users who are running
x11-base/xfree-4.2.0-r12 and earlier update their systems
as follows:

emerge rsync
emerge xfree
emerge clean

- - --------------------------------------------------------------------
aliz@gentoo.org - GnuPG key is available at www.gentoo.org/~aliz
- - --------------------------------------------------------------------

- - --------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200210-007
- - --------------------------------------------------------------------

PACKAGE : zope
SUMMARY : Incorrect handling of XML-RPC requests
DATE    : 2002-10-24 15:10 UTC
EXPLOIT : remote

- - --------------------------------------------------------------------

Zope (www.zope.org) will reveal the complete physical location where the 
server and its components are installed if it receives "incorrect" XML-RPC 
requests. 
In some cases it will reveal also information about the serves in the 
protected LAN (10.x.x.x for example) on which current server is relaying. 

More information is available at
http://collector.zope.org/Zope/359

SOLUTION

It is recommended that all Gentoo Linux users who are running
net-www/zope-2.5.1 and earlier update their systems
as follows:

emerge rsync
emerge zope
emerge clean

- - --------------------------------------------------------------------
aliz@gentoo.org - GnuPG key is available at www.gentoo.org/~aliz
- - --------------------------------------------------------------------