Date: Wed, 5 Apr 2000 21:58:55 +0200 (MEST) 
From: Marc Heuse [email protected] 
Subject: [suse-security-announce] SuSE Security Announcement - gpm 

SuSE Security Announcement 
Package: gpm < 1.18.1 
Date: Wed, 5 Apr 2000 19:46:46 GMT 

Affected SuSE versions: all 
Vulnerability Type: execute commands with privilege 
SuSE default package: yes 
Other affected systems: all linux systems using gpm 

A security hole was discovered in the package mentioned above. Please update as soon as possible or disable the service if you are using this software on your SuSE Linux installation(s). 
Other Linux distributions or operating systems might be affected as well, please contact your vendor for information about this issue. 

Please note that we provide this information on an "as-is" basis only. There is no warranty whatsoever and no liability for any direct, indirect or incidental damage arising from this information or the installation of the update package. 


1. Problem Description 

gpm is a cut and paste utility and mouse server for virtual consoles. The gpm-root command, which is part of the gpm package, allows local users to define menus and commands to be executed on mouse events. When a command is executed via gpm, the group id 0 priviliged is not dropped. 

2. Impact 

Local users may gain access to group id 0 and hence may modify files owned and writable by the gid 0. 

3. Solution 

Update the package from our FTP server. 

Please verify these md5 checksums of the updates before installing: (For SuSE 6.0, please use the 6.1 updates) 

You can find updates on our ftp-Server: for Intel processors for Alpha processors 

or try the following web pages for a list of mirrors: 

Our webpage for patches: 

Our webpage for security announcements: 

If you want to report vulnerabilities, please contact [email protected]