---

Conectiva Linux Advisories: kernel, lftp


CONECTIVA LINUX SECURITY ANNOUNCEMENT


PACKAGE : kernel
SUMMARY : Fix for two vulnerabilities
DATE : 2004-01-05 13:46:00
ID : CLA-2004:799
RELEVANT RELEASES : 8, 9

DESCRIPTION
The Linux kernel is responsible for handling the basic functions of
the GNU/Linux operating system.

This announcement fixes two local vulnerabilities in the kernel
package:

  1. mremap() local vulnerability (CAN-2003-0985[2]) Paul Starzetz
    <ihaquer@isec.pl> from
    iSEC Security Research reported[1] another vulnerability in the
    Linux memory management code which can be used by local attackers
    to obtain root privileges or cause a denial of service condition
    (DoS).
  2. Information leak in RTC code (CAN-2003-0984[3]) Russell King
    <rmk@arm.linux.org.uk> reported
    that real time clock (RTC) routines in Linux kernel 2.4.23 and
    earlier do not properly initialize their structures, which could
    leak kernel data to user space.

SOLUTION
It is recommended that all Conectiva Linux users upgrade the kernel
package.

IMPORTANT: exercise caution and preparation when upgrading the
kernel, since it will require a reboot after the new packages are
installed. In particular, Conectiva Linux 9 will most likely
require an initrd file (which is automatically created in the /boot
directory after the new packages are installed). Generic kernel
update instructions can be obtained in the manuals and in our faq
page[4].

REFERENCES
1.http://isec.pl/vulnerabilities/isec-0013-mremap.txt

2.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0985

3.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0984

4.http://www.conectiva.com.br/suporte/pr/sistema.kernel.atualizar.html

UPDATED PACKAGES

ftp://atualizacoes.conectiva.com.br/8/SRPMS/kernel-2.4.19-1U80_20cl.src.rpm


ftp://atualizacoes.conectiva.com.br/8/RPMS/devfsd-2.4.19-1U80_20cl.i386.rpm


ftp://atualizacoes.conectiva.com.br/8/RPMS/kernel-2.4.19-1U80_20cl.i386.rpm


ftp://atualizacoes.conectiva.com.br/8/RPMS/kernel-2.4.19-1U80_20cl.i586.rpm


ftp://atualizacoes.conectiva.com.br/8/RPMS/kernel-2.4.19-1U80_20cl.i686.rpm


ftp://atualizacoes.conectiva.com.br/8/RPMS/kernel-BOOT-2.4.19-1U80_20cl.i386.rpm


ftp://atualizacoes.conectiva.com.br/8/RPMS/kernel-doc-2.4.19-1U80_20cl.i386.rpm


ftp://atualizacoes.conectiva.com.br/8/RPMS/kernel-enterprise-2.4.19-1U80_20cl.i686.rpm


ftp://atualizacoes.conectiva.com.br/8/RPMS/kernel-headers-2.4.19-1U80_20cl.i386.rpm


ftp://atualizacoes.conectiva.com.br/8/RPMS/kernel-rbc-2.4.19-1U80_20cl.i386.rpm


ftp://atualizacoes.conectiva.com.br/8/RPMS/kernel-smp-2.4.19-1U80_20cl.i386.rpm


ftp://atualizacoes.conectiva.com.br/8/RPMS/kernel-smp-2.4.19-1U80_20cl.i586.rpm


ftp://atualizacoes.conectiva.com.br/8/RPMS/kernel-smp-2.4.19-1U80_20cl.i686.rpm


ftp://atualizacoes.conectiva.com.br/8/RPMS/kernel-source-2.4.19-1U80_20cl.i386.rpm


ftp://atualizacoes.conectiva.com.br/9/SRPMS/kernel24-2.4.21-31301U90_13cl.src.rpm


ftp://atualizacoes.conectiva.com.br/9/RPMS/devfsd-2.4.21-31301U90_13cl.i386.rpm


ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-2.4.21-31301U90_13cl.athlon.rpm


ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-2.4.21-31301U90_13cl.i386.rpm


ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-2.4.21-31301U90_13cl.i586.rpm


ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-2.4.21-31301U90_13cl.i686.rpm


ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-2.4.21-31301U90_13cl.pentium4.rpm


ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-BOOT-2.4.21-31301U90_13cl.i386.rpm


ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-doc-2.4.21-31301U90_13cl.i386.rpm


ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-enterprise-2.4.21-31301U90_13cl.athlon.rpm


ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-enterprise-2.4.21-31301U90_13cl.i686.rpm


ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-enterprise-2.4.21-31301U90_13cl.pentium4.rpm


ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-rbc-2.4.21-31301U90_13cl.i386.rpm


ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-headers-2.4.21-31301U90_13cl.i386.rpm


ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-smp-2.4.21-31301U90_13cl.athlon.rpm


ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-smp-2.4.21-31301U90_13cl.i386.rpm


ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-smp-2.4.21-31301U90_13cl.i586.rpm


ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-smp-2.4.21-31301U90_13cl.i686.rpm


ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-smp-2.4.21-31301U90_13cl.pentium4.rpm


ftp://atualizacoes.conectiva.com.br/9/RPMS/kernel24-source-2.4.21-31301U90_13cl.i386.rpm

ADDITIONAL INSTRUCTIONS
The apt tool can be used to perform RPM packages upgrades:

  • run: apt-get update
  • after that, execute: apt-get upgrade

Detailed instructions reagarding the use of apt and upgrade
examples can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en


All packages are signed with Conectiva’s GPG key. The key and
instructions on how to import it can be found at
http://distro.conectiva.com.br/seguranca/chave/?idioma=en
Instructions on how to check the signatures of the RPM packages can
be found at http://distro.conectiva.com.br/seguranca/politica/?idioma=en


All our advisories and generic update instructions can be viewed at
http://distro.conectiva.com.br/atualizacoes/?idioma=en


Copyright (c) 2003 Conectiva Inc.
http://www.conectiva.com


CONECTIVA LINUX SECURITY ANNOUNCEMENT


PACKAGE : lftp
SUMMARY : Buffer overflow vulnerability
DATE : 2004-01-06 09:46:00
ID : CLA-2004:800
RELEVANT RELEASES : 8, 9

DESCRIPTION
lftp[1] is a command-line file transfer program which supports many
protocols.

Ulf Härnhammar reported[2] two buffer overflow
vulnerabilities[3] in the lftp program. An attacker could prepare a
directory on a server which, if accessed with a vulnerable lftp
with the “ls” or “rels” command, could cause arbitrary code to be
executed on the client.

SOLUTION
It is recommended that all lftp users upgrade their packages.

REFERENCES

  1. http://lftp.yar.ru/

  2. http://marc.theaimsgroup.com/?l=bugtraq&m=107152267121513&w=2
  3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0963

UPDATED PACKAGES

ftp://atualizacoes.conectiva.com.br/8/SRPMS/lftp-2.6.9-1U80_2cl.src.rpm


ftp://atualizacoes.conectiva.com.br/8/RPMS/lftp-2.6.9-1U80_2cl.i386.rpm


ftp://atualizacoes.conectiva.com.br/9/SRPMS/lftp-2.6.9-23261U90_2cl.src.rpm


ftp://atualizacoes.conectiva.com.br/9/RPMS/lftp-2.6.9-23261U90_2cl.i386.rpm

ADDITIONAL INSTRUCTIONS
The apt tool can be used to perform RPM packages upgrades:

  • run: apt-get update
  • after that, execute: apt-get upgrade

Detailed instructions reagarding the use of apt and upgrade
examples can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en


All packages are signed with Conectiva’s GPG key. The key and
instructions on how to import it can be found at
http://distro.conectiva.com.br/seguranca/chave/?idioma=en
Instructions on how to check the signatures of the RPM packages can
be found at http://distro.conectiva.com.br/seguranca/politica/?idioma=en


All our advisories and generic update instructions can be viewed at
http://distro.conectiva.com.br/atualizacoes/?idioma=en


Copyright (c) 2003 Conectiva Inc.
http://www.conectiva.com

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis