Debian Security Advisory
DSA-1217-1 linux-ftpd -- programming error
- Date Reported:
- 20 Nov 2006
- Affected Packages:
- linux-ftpd
- Vulnerable:
- Yes
- Security database references:
- In the Debian bugtracking system: Bug 384454.
In Mitre's CVE dictionary: CVE-2006-5778. - More information:
-
Paul Szabo discovered that the netkit ftp server switches the user id too late, which may lead to the bypass of access restrictions when running on NFS. This update also adds return value checks to setuid() calls, which may fail in some PAM configurations.
For the stable distribution (sarge) this problem has been fixed in version 0.17-20sarge2.
For the upcoming stable distribution (etch) this problem has been fixed in version 0.17-22.
For the unstable distribution (sid) this problem has been fixed in version 0.17-22.
We recommend that you upgrade your ftpd package.
- Fixed in:
-
Debian GNU/Linux 3.1 (sarge)
- Source:
- http://security.debian.org/pool/updates/main/l/linux-ftpd/linux-ftpd_0.17-20sarge2.dsc
- http://security.debian.org/pool/updates/main/l/linux-ftpd/linux-ftpd_0.17-20sarge2.diff.gz
- http://security.debian.org/pool/updates/main/l/linux-ftpd/linux-ftpd_0.17.orig.tar.gz
- http://security.debian.org/pool/updates/main/l/linux-ftpd/linux-ftpd_0.17-20sarge2.diff.gz
- Alpha:
- http://security.debian.org/pool/updates/main/l/linux-ftpd/ftpd_0.17-20sarge2_alpha.deb
- AMD64:
- http://security.debian.org/pool/updates/main/l/linux-ftpd/ftpd_0.17-20sarge2_amd64.deb
- ARM:
- http://security.debian.org/pool/updates/main/l/linux-ftpd/ftpd_0.17-20sarge2_arm.deb
- HPPA:
- http://security.debian.org/pool/updates/main/l/linux-ftpd/ftpd_0.17-20sarge2_hppa.deb
- Intel IA-32:
- http://security.debian.org/pool/updates/main/l/linux-ftpd/ftpd_0.17-20sarge2_i386.deb
- Intel IA-64:
- http://security.debian.org/pool/updates/main/l/linux-ftpd/ftpd_0.17-20sarge2_ia64.deb
- Motorola 680x0:
- http://security.debian.org/pool/updates/main/l/linux-ftpd/ftpd_0.17-20sarge2_m68k.deb
- Big endian MIPS:
- http://security.debian.org/pool/updates/main/l/linux-ftpd/ftpd_0.17-20sarge2_mips.deb
- Little endian MIPS:
- http://security.debian.org/pool/updates/main/l/linux-ftpd/ftpd_0.17-20sarge2_mipsel.deb
- PowerPC:
- http://security.debian.org/pool/updates/main/l/linux-ftpd/ftpd_0.17-20sarge2_powerpc.deb
- IBM S/390:
- http://security.debian.org/pool/updates/main/l/linux-ftpd/ftpd_0.17-20sarge2_s390.deb
- Sun Sparc:
- http://security.debian.org/pool/updates/main/l/linux-ftpd/ftpd_0.17-20sarge2_sparc.deb
MD5 checksums of the listed files are available in the original advisory.