Linux Security
    Linux Security
    Linux Security

    Debian: 'gpm' local root vulnerability

    Posted By
    Among other problems, the gpm-root program contains a format stringvulnerability, which allows an attacker to gain root privileges.
    Debian Security Advisory DSA-095-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.                    Robert van der Meulen
    December 27, 2001
    Package        : gpm
    Problem type   : local root vulnerability
    Debian-specific: no
    The package 'gpm' contains the 'gpm-root' program, which can be used to
    create mouse-activated menus on the console.
    Among other problems, the gpm-root program contains a format string
    vulnerability, which allows an attacker to gain root privileges.
    This has been fixed in version 1.17.8-18.1, and we recommend that you upgrade
    your 1.17.8-18 package immediately.
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    Debian GNU/Linux 2.2 alias potato
      Potato was released for alpha, arm, i386, m68k, powerpc and sparc.
      Source archives:
          MD5 checksum: 8c48aa1656391d3755c289a87db13bf0
          MD5 checksum: bafbe8ffe73d3b5783e9841f1894af77
          MD5 checksum: 9d50c299bf925996546efaf32de1db7b
      Alpha architecture:
          MD5 checksum: 0e50705cadfd58777d02fa6806c10bdf
          MD5 checksum: cbeeeac3795318255126814d71b7b945
          MD5 checksum: f5dd9e395259b037d20e013e112a55e8
      ARM architecture:
          MD5 checksum: 6b41896ddfed4a119d17e5d8e8391384
          MD5 checksum: f02444fc5a9a6a7c7da0e1cb19df24a6
          MD5 checksum: 0ae3eb96377394d65e0e8031d0019147
      Intel IA-32 architecture:
          MD5 checksum: 18c837abec8360db146681d2a713177a
          MD5 checksum: f60aa2b9720ee597f18fa3fa86a8af6e
          MD5 checksum: 815a1e90fe36e603f0803f92b6898f19
          MD5 checksum: 514a1baee569e548349f7c4dc2941f3d
          MD5 checksum: 52014c36f8155a0c89e9ade02d91cdbe
      Motorola 680x0 architecture:
          MD5 checksum: ce61772d26c799bce33d729ed7fc67b7
          MD5 checksum: 923894ee7bdc1a8e648881eaf5f372da
          MD5 checksum: 019de1ecb144e3d10b5978ea640a24c4
          MD5 checksum: 88d75f4b1f85e6aee903f886b311e127
          MD5 checksum: 1ea940b2e3c5d7fade43d75ed3253569
      PowerPC architecture:
          MD5 checksum: aa2415e6f489af235e173d6d5a69b05f
          MD5 checksum: cd823ce39eb4125ed4a8dd0c17362107
          MD5 checksum: 0188cb6c4ffd82a146812e53c1387918
      Sun Sparc architecture:
          MD5 checksum: b703c2e30b52446508f18951551839a3
          MD5 checksum: b8a75b6ab45f649b9e458cf778545a9e
          MD5 checksum: fa4ae1bda04f3b13622d6e6bc9ffcb35
      These packages will be moved into the stable distribution on its next
    For not yet released architectures please refer to the appropriate
    directory$arch/ .
    apt-get: deb stable/updates main
    dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.


    LinuxSecurity Poll

    Which aspect of server security are you most interested in learning more about?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"131","title":"Preventing information leakage","votes":"3","type":"x","order":"1","pct":100,"resources":[]},{"id":"132","title":"Firewall considerations","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"133","title":"Permissions ","votes":"0","type":"x","order":"3","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.