lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060503163556.GD5671@piware.de>
Date: Wed May  3 17:36:02 2006
From: martin.pitt at canonical.com (Martin Pitt)
Subject: [USN-278-1] gdm vulnerability

===========================================================
Ubuntu Security Notice USN-278-1	       May 03, 2006
gdm vulnerabilitiy
CVE-2006-1057
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 5.04 (Hoary Hedgehog)
Ubuntu 5.10 (Breezy Badger)

The following packages are affected:

gdm

The problem can be corrected by upgrading the affected package to
version 2.6.0.7-0ubuntu7.1 (for Ubuntu 5.04) or 2.8.0.5-0ubuntu1.1
(for Ubuntu 5.10).  In general, a standard system upgrade is
sufficient to effect the necessary changes.

Details follow:

Marcus Meissner discovered a race condition in gdm's handling of the
~/.ICEauthority file permissions. A local attacker could exploit this
to become the owner of an arbitrary file in the system. When getting
control over automatically executed scripts (like cron jobs), the
attacker could eventually leverage this flaw to execute arbitrary
commands with root privileges.


Updated packages for Ubuntu 5.04:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.6.0.7-0ubuntu7.1.diff.gz
      Size/MD5:    68630 07276634f63f6cf6e3d3946661cf2939
    http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.6.0.7-0ubuntu7.1.dsc
      Size/MD5:      787 6e666f8da0735aee929c25a9818dd53a
    http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.6.0.7.orig.tar.gz
      Size/MD5:  5594495 50254890d9fbbec6b2d3455d4343f6e0

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.6.0.7-0ubuntu7.1_amd64.deb
      Size/MD5:  1382686 716ba56c1177162685a7198b46a28667

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.6.0.7-0ubuntu7.1_i386.deb
      Size/MD5:  1343230 9bb1a76e6d0a8658f49ce787f6a66606

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.6.0.7-0ubuntu7.1_powerpc.deb
      Size/MD5:  1379750 bcaec993d57ce53221c920245495d3b8

Updated packages for Ubuntu 5.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.8.0.5-0ubuntu1.1.diff.gz
      Size/MD5:    65777 3181d42210c694ab595840f1359d5735
    http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.8.0.5-0ubuntu1.1.dsc
      Size/MD5:      820 0165df3317618487e8d39e60b5174c83
    http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.8.0.5.orig.tar.gz
      Size/MD5:  4226618 349b76492113ab814f2732d4ce3a49c2

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.8.0.5-0ubuntu1.1_amd64.deb
      Size/MD5:  1618080 7aa6c967d046d2876e577975e5c6759f

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.8.0.5-0ubuntu1.1_i386.deb
      Size/MD5:  1559770 3dc875b89062d5572b2b2e84a8354434

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.8.0.5-0ubuntu1.1_powerpc.deb
      Size/MD5:  1571404 1ca7c072d5460d694af449719f2abc57
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 191 bytes
Desc: Digital signature
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060503/a7d70a70/attachment.bin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ