User: Password:
|
|
Subscribe / Log in / New account

Ubuntu alert USN-278-1 (gdm)

From:  Martin Pitt <martin.pitt@canonical.com>
To:  ubuntu-security-announce@lists.ubuntu.com
Subject:  [USN-278-1] gdm vulnerability
Date:  Wed, 3 May 2006 18:35:56 +0200
Cc:  full-disclosure@lists.grok.org.uk, bugtraq@securityfocus.com

=========================================================== Ubuntu Security Notice USN-278-1 May 03, 2006 gdm vulnerabilitiy CVE-2006-1057 =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 5.04 (Hoary Hedgehog) Ubuntu 5.10 (Breezy Badger) The following packages are affected: gdm The problem can be corrected by upgrading the affected package to version 2.6.0.7-0ubuntu7.1 (for Ubuntu 5.04) or 2.8.0.5-0ubuntu1.1 (for Ubuntu 5.10). In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Marcus Meissner discovered a race condition in gdm's handling of the ~/.ICEauthority file permissions. A local attacker could exploit this to become the owner of an arbitrary file in the system. When getting control over automatically executed scripts (like cron jobs), the attacker could eventually leverage this flaw to execute arbitrary commands with root privileges. Updated packages for Ubuntu 5.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.6... Size/MD5: 68630 07276634f63f6cf6e3d3946661cf2939 http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.6... Size/MD5: 787 6e666f8da0735aee929c25a9818dd53a http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.6... Size/MD5: 5594495 50254890d9fbbec6b2d3455d4343f6e0 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.6... Size/MD5: 1382686 716ba56c1177162685a7198b46a28667 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.6... Size/MD5: 1343230 9bb1a76e6d0a8658f49ce787f6a66606 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.6... Size/MD5: 1379750 bcaec993d57ce53221c920245495d3b8 Updated packages for Ubuntu 5.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.8... Size/MD5: 65777 3181d42210c694ab595840f1359d5735 http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.8... Size/MD5: 820 0165df3317618487e8d39e60b5174c83 http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.8... Size/MD5: 4226618 349b76492113ab814f2732d4ce3a49c2 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.8... Size/MD5: 1618080 7aa6c967d046d2876e577975e5c6759f i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.8... Size/MD5: 1559770 3dc875b89062d5572b2b2e84a8354434 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.8... Size/MD5: 1571404 1ca7c072d5460d694af449719f2abc57 -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-security...


(Log in to post comments)


Copyright © 2018, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds