Advisory: Gentoo Essential and Critical Security Patch Updates

Find the information you need for your favorite open source distribution .

Gentoo: GLSA-200312-07: lftp

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Two buffer overflow problems have been found in lftp, a multithreaded command-line based FTP client. A specially created directory on a web server could be used to execute arbitrary code on the connecting machine. The user's machine has to connect to a malicious web server using HTTP or [More...]

Gentoo: GLSA-200312-02: kernel

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Lack of proper bounds checking exists in the do_brk() kernel function in Linux kernels prior to 2.4.23. This bug can be used to give a userland program or malicious service access to the full kernel address space and gain root privileges. This issue is known to be exploitable. [More...]

Gentoo: Rsync heap overflow vulnerability

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Rsync version 2.5.6 contains a vulnerability that can be used to runarbitrary code. The Gentoo infrastructure team has some reasonably goodforensic evidence that this exploit may have been used in combination withthe Linux kernel brk vulnerability (see GLSA 200312-02) to exploit arsync.gentoo.org rotation server (see GLSA-200312-01.)

Gentoo: Glibc buffer overrun vulnerability

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A bug in the getgrouplist function can cause a buffer overflow if the size ofthe group list is too small to hold all the user's groups. This overflow cancause segmentation faults in user applications. This vulnerability existsonly when an administrator has placed a user in a number of groups largerthan that expected by an application.