Date: Wed, 5 Apr 2000 21:58:55 +0200 (MEST) 
From: Marc Heuse marc@suse.de 
Subject: [suse-security-announce] SuSE Security Announcement - gpm 


--------------------------------------------------------------------------------
SuSE Security Announcement 
Package: gpm < 1.18.1 
Date: Wed, 5 Apr 2000 19:46:46 GMT 

Affected SuSE versions: all 
Vulnerability Type: execute commands with privilege 
SuSE default package: yes 
Other affected systems: all linux systems using gpm 


--------------------------------------------------------------------------------
A security hole was discovered in the package mentioned above. Please update as soon as possible or disable the service if you are using this software on your SuSE Linux installation(s). 
Other Linux distributions or operating systems might be affected as well, please contact your vendor for information about this issue. 

Please note that we provide this information on an "as-is" basis only. There is no warranty whatsoever and no liability for any direct, indirect or incidental damage arising from this information or the installation of the update package. 



--------------------------------------------------------------------------------

1. Problem Description 

gpm is a cut and paste utility and mouse server for virtual consoles. The gpm-root command, which is part of the gpm package, allows local users to define menus and commands to be executed on mouse events. When a command is executed via gpm, the group id 0 priviliged is not dropped. 

2. Impact 

Local users may gain access to group id 0 and hence may modify files owned and writable by the gid 0. 

3. Solution 

Update the package from our FTP server. 


--------------------------------------------------------------------------------
Please verify these md5 checksums of the updates before installing: (For SuSE 6.0, please use the 6.1 updates) 
d71e12148aa501395bdf2a1192fa93de /6.1/ap1/gpm-1.18.1-44.alpha.rpm 
1c20f45f754f9391c2b6c5b449f5ce42 /6.3/ap1/gpm-1.18.1-44.alpha.rpm 
814b6fd854780f205de12889589ce8a2  
c492bd85ec34d8e177d0e22b67b1c5bc  
a13f34f522acf560f7a4e5754ca0d85b  
ec64fd1187373f48c02922eb71ae2f7a  
0564749dce51690719a3eb1be8514f03  
8feb9a4a65af7e966f3fef4588b8bc5b  
8a273a5c227ef077ae6ac34dc8284afb  


--------------------------------------------------------------------------------
You can find updates on our ftp-Server: 
 for Intel processors 
 for Alpha processors 

or try the following web pages for a list of mirrors: 
http://www.suse.de/ftp.html 
 

Our webpage for patches: 
http://www.suse.de/patches/index.html 

Our webpage for security announcements: 
http://www.suse.de/security 

If you want to report vulnerabilities, please contact security@suse.de

SuSE gpm < 1.18.1 Advisory

April 5, 2000
Local users may gain access to group id 0 and hence may modify files owned and writable by the gid 0.

Summary

Date: Wed, 5 Apr 2000 21:58:55 +0200 (MEST) 
From: Marc Heuse marc@suse.de 
Subject: [suse-security-announce] SuSE Security Announcement - gpm 


--------------------------------------------------------------------------------
SuSE Security Announcement 
Package: gpm < 1.18.1 
Date: Wed, 5 Apr 2000 19:46:46 GMT 

Affected SuSE versions: all 
Vulnerability Type: execute commands with privilege 
SuSE default package: yes 
Other affected systems: all linux systems using gpm 


--------------------------------------------------------------------------------
A security hole was discovered in the package mentioned above. Please update as soon as possible or disable the service if you are using this software on your SuSE Linux installation(s). 
Other Linux distributions or operating systems might be affected as well, please contact your vendor for information about this issue. 

Please note that we provide this information on an "as-is" basis only. There is no warranty whatsoever and no liability for any direct, indirect or incidental damage arising from this information or the installation of the update package. 



--------------------------------------------------------------------------------

1. Problem Description 

gpm is a cut and paste utility and mouse server for virtual consoles. The gpm-root command, which is part of the gpm package, allows local users to define menus and commands to be executed on mouse events. When a command is executed via gpm, the group id 0 priviliged is not dropped. 

2. Impact 

Local users may gain access to group id 0 and hence may modify files owned and writable by the gid 0. 

3. Solution 

Update the package from our FTP server. 


--------------------------------------------------------------------------------
Please verify these md5 checksums of the updates before installing: (For SuSE 6.0, please use the 6.1 updates) 
d71e12148aa501395bdf2a1192fa93de /6.1/ap1/gpm-1.18.1-44.alpha.rpm 
1c20f45f754f9391c2b6c5b449f5ce42 /6.3/ap1/gpm-1.18.1-44.alpha.rpm 
814b6fd854780f205de12889589ce8a2  
c492bd85ec34d8e177d0e22b67b1c5bc  
a13f34f522acf560f7a4e5754ca0d85b  
ec64fd1187373f48c02922eb71ae2f7a  
0564749dce51690719a3eb1be8514f03  
8feb9a4a65af7e966f3fef4588b8bc5b  
8a273a5c227ef077ae6ac34dc8284afb  


--------------------------------------------------------------------------------
You can find updates on our ftp-Server: 
 for Intel processors 
 for Alpha processors 

or try the following web pages for a list of mirrors: 
http://www.suse.de/ftp.html 
 

Our webpage for patches: 
http://www.suse.de/patches/index.html 

Our webpage for security announcements: 
http://www.suse.de/security 

If you want to report vulnerabilities, please contact security@suse.de

References

Severity

Related News