Date: Wed, 12 Apr 2000 11:17:32 -0400 (EDT)
From: Cristian Gafton gafton@redhat.com
To: redhat-watch-list@redhat.com
Subject: [SECURITY] RHSA-2000:009-02.text: New gpm packages
available
Red Hat, Inc. Security Advisory
Synopsis: gpm
Advisory ID: RHSA-2000:009-02
Issue date: 2000-04-07
Updated on: 2000-04-10
Product: Red Hat Linux
Keywords: gpm gpm-root gid 0 priviledge
Cross references: N/A
1. Topic:
gpm-root (part of the gpm packge) fails to drop gid 0
priviledges when executing user commands.
2. Relevant releases/architectures:
Red Hat Linux 4.2 – alpha i386 sparc
Red Hat Linux 5.2 – i386 alpha sparc
Red Hat Linux 6.0 – alpha i386 sparc
Red Hat Linux 6.1 – i386 alpha sparc
Red Hat Linux 6.2 – alpha i386 sparc
3. Problem description:
gpm is a cut and paste utility and mouse server for virtual
consoles. As part of this package, the gpm-root program allows
people to define menus and actions for display when clicking on the
background of current tty.
The current gpm-root program fails to correctly give up the
group id 0 membership for user defined menus. If you are running
gpm-root on your system then you are at risk.
4. Solution:
For each RPM for your particular architecture, run:
rpm -Fvh [filename]
where filename is the name of the RPM.
5. Bug IDs fixed
http://bugzilla.redhat.com/bugzilla
for more info):
10340 – Exploit in gpm-root.
10644 – gpm security problem in gpm-root
6. Obsoleted by:
N/A
7. Conflicts with:
N/A
8. RPMs required:
Red Hat Linux 4.2:
alpha:
ftp://updates.redhat.com/4.2/alpha/gpm-1.19.1-0.4.2.alpha.rpm
intel:
ftp://updates.redhat.com/4.2/i386/gpm-1.19.1-0.4.2.i386.rpm
sparc:
ftp://updates.redhat.com/4.2/sparc/gpm-1.19.1-0.4.2.sparc.rpm
sources:
ftp://updates.redhat.com/4.2/SRPMS/gpm-1.19.1-0.4.2.src.rpm
Red Hat Linux 5.2:
intel:
ftp://updates.redhat.com/5.2/i386/gpm-1.19.1-0.5.2.i386.rpm
alpha:
ftp://updates.redhat.com/5.2/alpha/gpm-1.19.1-0.5.2.alpha.rpm
sparc:
ftp://updates.redhat.com/5.2/sparc/gpm-1.19.1-0.5.2.sparc.rpm
sources:
ftp://updates.redhat.com/5.2/SRPMS/gpm-1.19.1-0.5.2.src.rpm
Red Hat Linux 6.0, 6.1, 6.2:
alpha:
ftp://updates.redhat.com/6.2/alpha/gpm-1.19.1-1.alpha.rpm
intel:
ftp://updates.redhat.com/6.2/i386/gpm-1.19.1-1.i386.rpm
sparc:
ftp://updates.redhat.com/6.2/sparc/gpm-1.19.1-1.sparc.rpm
sources:
ftp://updates.redhat.com/6.2/SRPMS/gpm-1.19.1-1.src.rpm
9. Verification:
MD5 sum Package Name
b8278a5d0a867a2fd8e6ac4a927627cb 4.2/alpha/gpm-1.19.1-0.4.2.alpha.rpm c5075756a0f74c36a94c78ccda496412 4.2/sparc/gpm-1.19.1-0.4.2.sparc.rpm b3d87c92880a9bf80d0fd3ff944e907b 4.2/SRPMS/gpm-1.19.1-0.4.2.src.rpm 7112c804fd008e137f8d6551460c10d7 4.2/i386/gpm-1.19.1-0.4.2.i386.rpm 79ebec95b2d6e48f60d4e34cfdee6f93 5.2/i386/gpm-1.19.1-0.5.2.i386.rpm c4cdced5149e773733458c234ede2ac7 5.2/SRPMS/gpm-1.19.1-0.5.2.src.rpm 330e555a09e7b5c85187d348dbf453e6 5.2/alpha/gpm-1.19.1-0.5.2.alpha.rpm 5ceda554f2549c100a88d6370e45e2f6 5.2/sparc/gpm-1.19.1-0.5.2.sparc.rpm 867c4316ec0645fd8e51b674646ef44d 6.2/alpha/gpm-1.19.1-1.alpha.rpm fbeb89d319776e7eb3af1db15679e93f 6.2/sparc/gpm-1.19.1-1.sparc.rpm 86a800ce94206877edc4f6e88272deee 6.2/i386/gpm-1.19.1-1.i386.rpm 8dedce47f4e6aa7bbfb36d9630561cd4 6.2/SRPMS/gpm-1.19.1-1.src.rpm
These packages are GPG signed by Red Hat, Inc. for security. Our
key is available at:
http://www.redhat.com/corp/contact.html
You can verify each package with the following command:
rpm –checksig
If you only wish to verify that each package has not been
corrupted or tampered with, examine only the md5sum with the
following command:
rpm –checksig –nogpg
10. References:
Thanks also go to Egmont Koblinger and the members of the
Bugtraq list.