4652322 2000-01-08  04:53  /157 rader/ Postmaster
Mottagare: Red Hat Announce (import) <1216>
Ärende: [RHSA-2000:001-03] New version of usermode, pam
------------------------------------------------------------
MBOX-Line: From redhat-announce-list-request@redhat.com  Fri Jan  7 22:33:13 2000
Resent-Date: 8 Jan 2000 01:42:53 -0000
Resent-Cc: recipient list not shown: ;
MBOX-Line: From redhat-watch-list-request@redhat.com  Fri Jan  7 20:42:46 2000
Message-Id: <200001072155.QAA15226@tristan.devel.redhat.com>
To: redhat-watch-list@redhat.com
Cc: redhat-security@redhat.com
From: "Michael K. Johnson" <johnsonm@redhat.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Date: Fri, 07 Jan 2000 16:55:44 -0500
Sender: johnsonm@redhat.com
Resent-Message-ID: <"bshEI1.0.6U3.MOfTu"@lists.redhat.com>
Resent-From: redhat-watch-list@redhat.com
Reply-To: redhat-watch-list@redhat.com
X-Mailing-List: <redhat-watch-list@redhat.com> archive/latest/38
X-Loop: redhat-watch-list@redhat.com
X-URL: http://www.redhat.com
X-Loop: redhat-announce-list@redhat.com
Precedence: list
Resent-Sender: redhat-announce-list-request@redhat.com
X-URL: http://www.redhat.com

---------------------------------------------------------------------
		   Red Hat, Inc. Security Advisory

Synopsis:		New version of usermode fixes security bug
Advisory ID:		RHSA-2000:001-03
Issue date:		2000-01-04
Updated on:		2000-01-07
Keywords:		root userhelper pam
Cross references:	
---------------------------------------------------------------------

1. Topic:

A security bug has been discovered and fixed in the userhelper
program.

2000-01-07: usermode-1.17 introduced a bug that caused a segmentation
            fault in userhelper in some configurations, fixed in
	    usermode-1.18.

2000-01-04: SysVinit package added for Red Hat Linux 6.0 to fix
            a dependency problem.

2. Relevant releases/architectures:

Red Hat Linux 6.0 and 6.1, all architectures.

3. Problem description:

A security bug was found in userhelper; the bug can be exploited to
provide local users with root access.

The bug has been fixed in userhelper-1.18, and pam-0.68-10 has been
modified to help prevent similar attacks on other software in the
future.

2000-01-04: Red Hat Linux 6.0 users will need to upgrade to
            SysVinit-2.77-2 to fix a minor dependency issue.

4. Solution:

For each RPM for your particular architecture, run:
    rpm -Uvh <filename>
where filename is the name of the RPM.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla/ for more info):

6. Obsoleted by:

7. Conflicts with:

8. RPMs required:

Red Hat Linux 6.1:

Intel:
  ftp://updates.redhat.com/6.1/i386/pam-0.68-10.i386.rpm
  ftp://updates.redhat.com/6.1/i386/usermode-1.18-1.i386.rpm

Alpha:
  ftp://updates.redhat.com/6.1/alpha/pam-0.68-10.alpha.rpm
  ftp://updates.redhat.com/6.1/alpha/usermode-1.18-1.alpha.rpm

Sparc:
  ftp://updates.redhat.com/6.1/sparc/pam-0.68-10.sparc.rpm
  ftp://updates.redhat.com/6.1/sparc/usermode-1.18-1.sparc.rpm

Source packages:
  ftp://updates.redhat.com/6.1/SRPMS/pam-0.68-10.src.rpm
  ftp://updates.redhat.com/6.1/SRPMS/usermode-1.18-1.src.rpm


Red Hat Linux 6.0:

Intel:
  ftp://updates.redhat.com/6.1/i386/pam-0.68-10.i386.rpm
  ftp://updates.redhat.com/6.1/i386/usermode-1.18-1.i386.rpm
  ftp://updates.redhat.com/6.0/i386/SysVinit-2.77-2.i386.rpm

Alpha:
  ftp://updates.redhat.com/6.1/alpha/pam-0.68-10.alpha.rpm
  ftp://updates.redhat.com/6.1/alpha/usermode-1.18-1.alpha.rpm
  ftp://updates.redhat.com/6.0/alpha/SysVinit-2.77-2.alpha.rpm

Sparc:
  ftp://updates.redhat.com/6.1/sparc/pam-0.68-10.sparc.rpm
  ftp://updates.redhat.com/6.1/sparc/usermode-1.18-1.sparc.rpm
  ftp://updates.redhat.com/6.0/sparc/SysVinit-2.77-2.sparc.rpm

Source packages:
  ftp://updates.redhat.com/6.1/SRPMS/pam-0.68-10.src.rpm
  ftp://updates.redhat.com/6.1/SRPMS/usermode-1.18-1.src.rpm
  ftp://updates.redhat.com/6.0/SRPMS/SysVinit-2.77-2.src.rpm


9. Verification:

MD5 sum                           Package Name 
-------------------------------------------------------------------------- 
bffd4388103fa99265e267eab7ae18c8  i386/pam-0.68-10.i386.rpm
93d5f7c1316d8b926d3a47d87b28b881  i386/usermode-1.18-1.i386.rpm
f6d639bcbbcb5155364a9cb521f61463  i386/SysVinit-2.77-2.i386.rpm
fed2c2ad4f95829e14727a9dfceaca07  alpha/pam-0.68-10.alpha.rpm
1a79bb403ad6d9de6bd205a901a7daee  alpha/usermode-1.18-1.alpha.rpm
e411972f5430e3182dd0da946641f37d  alpha/SysVinit-2.77-2.alpha.rpm
350662253d09b17d0aca4e9c7a511675  sparc/pam-0.68-10.sparc.rpm
068a2d4e465e6c4a33dd1dbdd1a4fa02  sparc/usermode-1.18-1.sparc.rpm
91747cdbe9d7f66d608a1f35177ff200  sparc/SysVinit-2.77-2.sparc.rpm
f9ad800f56b7bb05ce595bad824a990d  SRPMS/pam-0.68-10.src.rpm
dfeca4a416f2d9417dcf739599f580fa  SRPMS/usermode-1.18-1.src.rpm
c40b184c60f212f3fdd484eeb2de6f71  SRPMS/SysVinit-2.77-2.src.rpm

 
These packages are GPG signed by Red Hat, Inc. for security.  Our key
is available at:
    http://www.redhat.com/corp/contact.html
 
You can verify each package with the following command:
    rpm --checksig  <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    rpm --checksig --nogpg <filename>

10. References:

Thanks to dildog@l0pht.com for finding this bug.


-- 
         To unsubscribe: mail redhat-watch-list-request@redhat.com with 
                       "unsubscribe" as the Subject.

--  To unsubscribe: mail -s unsubscribe
redhat-announce-list-request@redhat.com < /dev/null
(4652322) ------------------------------------------(Ombruten)