RedHat 6.x: imwheel buffer overflow
Summary
Summary
A vulnerability exists in the imwheel package where local users can executearbitrary commands as root.
Solution
For each RPM for your particular architecture, run:
rpm -Fvh [filename]
where filename is the name of the RPM.
5. Bug IDs fixed ( for more info):
N/A
6. Obsoleted by:
N/A
7. Conflicts with:
N/A
8. RPMs required:
Red Hat Powertools 6.1:
intel:
alpha:
sparc:
sources:
Red Hat Powertools 6.2:
intel:
alpha:
sparc:
sources:
9. Verification:
MD5 sum Package Name
fa97ae01087560b01ef0c08266e097b5 6.1/sparc/imwheel-0.9.8-1.sparc.rpm
921c50608059cd74840d070e5f538202 6.1/SRPMS/imwheel-0.9.8-1.src.rpm
0350d5be826d54f80948f4a4e9de6101 6.1/i386/imwheel-0.9.8-1.i386.rpm
f1cc900d060fec5546a229f0a7a4d48d 6.1/alpha/imwheel-0.9.8-1.alpha.rpm
fa97ae01087560b01ef0c08266e097b5 6.2/sparc/imwheel-0.9.8-1.sparc.rpm
0350d5be826d54f80948f4a4e9de6101 6.2/i386/imwheel-0.9.8-1.i386.rpm
f1cc900d060fec5546a229f0a7a4d48d 6.2/alpha/imwheel-0.9.8-1.alpha.rpm
921c50608059cd74840d070e5f538202 6.2/SRPMS/imwheel-0.9.8-1.src.rpm
These packages are GPG signed by Red Hat, Inc. for security. Our key
is available at:
You can verify each package with the following command:
rpm --checksig
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
rpm --checksig --nogpg
References
`
Package List
Topic
Topic
A buffer overflow exists in imwheel
Relevant Releases Architectures
Red Hat Powertools 6.1 - i386 alpha sparc
Red Hat Powertools 6.2 - i386 alpha sparc
Bugs Fixed