SuSE gpm < 1.18.1 Advisory
Summary
Date: Wed, 5 Apr 2000 21:58:55 +0200 (MEST)
From: Marc Heuse marc@suse.de
Subject: [suse-security-announce] SuSE Security Announcement - gpm
--------------------------------------------------------------------------------
SuSE Security Announcement
Package: gpm < 1.18.1
Date: Wed, 5 Apr 2000 19:46:46 GMT
Affected SuSE versions: all
Vulnerability Type: execute commands with privilege
SuSE default package: yes
Other affected systems: all linux systems using gpm
--------------------------------------------------------------------------------
A security hole was discovered in the package mentioned above. Please update as soon as possible or disable the service if you are using this software on your SuSE Linux installation(s).
Other Linux distributions or operating systems might be affected as well, please contact your vendor for information about this issue.
Please note that we provide this information on an "as-is" basis only. There is no warranty whatsoever and no liability for any direct, indirect or incidental damage arising from this information or the installation of the update package.
--------------------------------------------------------------------------------
1. Problem Description
gpm is a cut and paste utility and mouse server for virtual consoles. The gpm-root command, which is part of the gpm package, allows local users to define menus and commands to be executed on mouse events. When a command is executed via gpm, the group id 0 priviliged is not dropped.
2. Impact
Local users may gain access to group id 0 and hence may modify files owned and writable by the gid 0.
3. Solution
Update the package from our FTP server.
--------------------------------------------------------------------------------
Please verify these md5 checksums of the updates before installing: (For SuSE 6.0, please use the 6.1 updates)
d71e12148aa501395bdf2a1192fa93de /6.1/ap1/gpm-1.18.1-44.alpha.rpm
1c20f45f754f9391c2b6c5b449f5ce42 /6.3/ap1/gpm-1.18.1-44.alpha.rpm
814b6fd854780f205de12889589ce8a2
c492bd85ec34d8e177d0e22b67b1c5bc
a13f34f522acf560f7a4e5754ca0d85b
ec64fd1187373f48c02922eb71ae2f7a
0564749dce51690719a3eb1be8514f03
8feb9a4a65af7e966f3fef4588b8bc5b
8a273a5c227ef077ae6ac34dc8284afb
--------------------------------------------------------------------------------
You can find updates on our ftp-Server:
for Intel processors
for Alpha processors
or try the following web pages for a list of mirrors:
http://www.suse.de/ftp.html
Our webpage for patches:
http://www.suse.de/patches/index.html
Our webpage for security announcements:
http://www.suse.de/security
If you want to report vulnerabilities, please contact security@suse.de
References