LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: October 31st, 2014
Linux Security Week: October 27th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Ubuntu: 1099-1: GDM vulnerability Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Ubuntu Sebastian Krahmer discovered that GDM (GNOME Display Manager) did notproperly drop privileges when handling the cache directories usedto store users' dmrc and face icon files. This could allow a localattacker to change the ownership of arbitrary files, thereby gainingroot privileges. [More...]
===========================================================
Ubuntu Security Notice USN-1099-1            March 30, 2011
gdm vulnerability
CVE-2011-0727
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 9.10
Ubuntu 10.04 LTS
Ubuntu 10.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 9.10:
  gdm                             2.28.1-0ubuntu2.3

Ubuntu 10.04 LTS:
  gdm                             2.30.2.is.2.30.0-0ubuntu5.1

Ubuntu 10.10:
  gdm                             2.30.5-0ubuntu4.1

After a standard system update you need to log out all desktop sessions
and restart GDM to make all the necessary changes.

Details follow:

Sebastian Krahmer discovered that GDM (GNOME Display Manager) did not
properly drop privileges when handling the cache directories used
to store users' dmrc and face icon files. This could allow a local
attacker to change the ownership of arbitrary files, thereby gaining
root privileges.


Updated packages for Ubuntu 9.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.28.1-0ubuntu2.3.diff.gz
      Size/MD5:   769588 17bc09f417591f1913940d47cec9cc35
    http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.28.1-0ubuntu2.3.dsc
      Size/MD5:     2168 09c46d7f6f577daa95f47643025ea67c
    http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.28.1.orig.tar.gz
      Size/MD5:  3661916 b8f101394aa73e4505bad4ed4f0a695c

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.28.1-0ubuntu2.3_amd64.deb
      Size/MD5:   731002 0e00de9426edb0a1dd9cd74d86251548

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.28.1-0ubuntu2.3_i386.deb
      Size/MD5:   672338 2e903d2e97356a7a7138f1da9c37c27a

  armel architecture (ARM Architecture):

    http://ports.ubuntu.com/pool/main/g/gdm/gdm_2.28.1-0ubuntu2.3_armel.deb
      Size/MD5:   662246 d6a5a00bc8e37ab1e8ab6faaec9efb42

  lpia architecture (Low Power Intel Architecture):

    http://ports.ubuntu.com/pool/main/g/gdm/gdm_2.28.1-0ubuntu2.3_lpia.deb
      Size/MD5:   669764 79d09e696d5ff527e86a263944cdf7db

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://ports.ubuntu.com/pool/main/g/gdm/gdm_2.28.1-0ubuntu2.3_powerpc.deb
      Size/MD5:   697456 eff967e0f0206a299f68e93b76f48d13

  sparc architecture (Sun SPARC/UltraSPARC):

    http://ports.ubuntu.com/pool/main/g/gdm/gdm_2.28.1-0ubuntu2.3_sparc.deb
      Size/MD5:   681890 23eec0f66ceb24635f86e3e4f3d06ade

Updated packages for Ubuntu 10.04 LTS:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.30.2.is.2.30.0-0ubuntu5.1.diff.gz
      Size/MD5:   795064 e314a75da58ead79bd79cac83730c057
    http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.30.2.is.2.30.0-0ubuntu5.1.dsc
      Size/MD5:     2223 ea497892c7cc53f86ea3769c78e75962
    http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.30.2.is.2.30.0.orig.tar.gz
      Size/MD5:  3725698 583f6e50936f085be268e8543905fb74

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.30.2.is.2.30.0-0ubuntu5.1_amd64.deb
      Size/MD5:   798524 1e7b5dee40db568fcafa7d5f8c085c65

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.30.2.is.2.30.0-0ubuntu5.1_i386.deb
      Size/MD5:   734446 1de50ebe2d1a869a3cc2a4ffb7136de9

  armel architecture (ARM Architecture):

    http://ports.ubuntu.com/pool/main/g/gdm/gdm_2.30.2.is.2.30.0-0ubuntu5.1_armel.deb
      Size/MD5:   725942 f443a1c4098e116c293ebd9bc153f661

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://ports.ubuntu.com/pool/main/g/gdm/gdm_2.30.2.is.2.30.0-0ubuntu5.1_powerpc.deb
      Size/MD5:   760048 30592a26d7d20bc8b70d24543baf6182

  sparc architecture (Sun SPARC/UltraSPARC):

    http://ports.ubuntu.com/pool/main/g/gdm/gdm_2.30.2.is.2.30.0-0ubuntu5.1_sparc.deb
      Size/MD5:   753996 be562ec975b051a5e6909b394fc5cbc7

Updated packages for Ubuntu 10.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.30.5-0ubuntu4.1.debian.tar.gz
      Size/MD5:   112891 a3aee3567a60f658b826668807c4dc6e
    http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.30.5-0ubuntu4.1.dsc
      Size/MD5:     2187 07a449c1f9b1b1b393b92608f019cfd8
    http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.30.5.orig.tar.gz
      Size/MD5:  3784180 9d200a16d6bbab0ac41b93b9dbe6d508

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.30.5-0ubuntu4.1_amd64.deb
      Size/MD5:   808788 c88e512ff6c1d9b0afe2553bca3aaa0c

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.30.5-0ubuntu4.1_i386.deb
      Size/MD5:   741206 578f4738cc323ba2d636ad13ce9d328a

  armel architecture (ARM Architecture):

    http://ports.ubuntu.com/pool/main/g/gdm/gdm_2.30.5-0ubuntu4.1_armel.deb
      Size/MD5:   741478 b5b04d07aaa136f2412f38d4e71e2d81

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://ports.ubuntu.com/pool/main/g/gdm/gdm_2.30.5-0ubuntu4.1_powerpc.deb
      Size/MD5:   768424 e7227f70358590f88e12e801e10b85cb



 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Pirate Bay founder guilty in historic hacker case
Parallels CTO: Linux container security is not the problem
Advisory says to assume all Drupal 7 websites are compromised
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.