Skip to navigation

Security Advisory Updated usermode packages available

Advisory: RHSA-2000:075-08
Type: Security Advisory
Severity: N/A
Issued on: 2000-12-01
Last updated on: 2000-12-01
Affected Products: Red Hat Linux 6.2
Red Hat Linux 7.0
CVEs (cve.mitre.org): CVE-2000-1207

Details

Updated usermode packages are now available for Red Hat Linux 6.x and 7.



2000-11-27: Added packages for Red Hat Linux 7 for Alpha

The usermode package contains a binary (/usr/bin/userhelper), which is used to control access to programs which are to be executed as root. Because programs invoked by userhelper are not actually running setuid-root, security measures built into recent versions of glibc are not active.

If one of these programs supports internationalized text messages, a
malicious user can use the LANG or LC_ALL environment variables (which are inherited by userhelper and, in turn, any programs it runs) to
create a format-string exploit in these programs.

These updated packages also fix a problem due to an incorrect path
specification in the /usr/bin/shutdown wrapper script and close a potential security vulnerability in the userhelper binary.


Solution

For each RPM for your particular architecture, run:



rpm -Fvh [filename]



where filename is the name of the RPM.

Updated packages

Red Hat Linux 6.2

SRPMS:
ftp://updates.redhat.com/rhn/repository/NULL/SysVinit/2.78-5/SRPMS/SysVinit-2.78-5.src.rpm
Missing file
    MD5: 3310677ae7403c683e7947cd86b19344
ftp://updates.redhat.com/rhn/repository/NULL/usermode/1.37-1.6/SRPMS/usermode-1.37-1.6.src.rpm
Missing file
    MD5: e299c4b17b7eafdf66acf1fb21491d9b
 
Alpha:
ftp://updates.redhat.com/rhn/repository/NULL/SysVinit/2.78-5/alpha/SysVinit-2.78-5.alpha.rpm
Missing file
    MD5: 546bf7949c5be73b9f28b1819bfbd7c6
ftp://updates.redhat.com/rhn/repository/NULL/usermode/1.37-1.6/alpha/usermode-1.37-1.6.alpha.rpm
Missing file
    MD5: 978af994a09fcbc4bf1cb2fa2723bfe7
 
IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/SysVinit/2.78-5/i386/SysVinit-2.78-5.i386.rpm
Missing file
    MD5: ca5b97a1abb47b64d71ef69ab96fcb8a
ftp://updates.redhat.com/rhn/repository/NULL/usermode/1.37-1.6/i386/usermode-1.37-1.6.i386.rpm
Missing file
    MD5: e8fe2db6f95348a93a373673b1c87443
 
Sparc:
ftp://updates.redhat.com/rhn/repository/NULL/SysVinit/2.78-5/sparc/SysVinit-2.78-5.sparc.rpm
Missing file
    MD5: 4dfeacb8db12af4b2666f2792e1027c1
ftp://updates.redhat.com/rhn/repository/NULL/usermode/1.37-1.6/sparc/usermode-1.37-1.6.sparc.rpm
Missing file
    MD5: ba94a59a3a8195346735f202f28af3f8
 
Red Hat Linux 7.0

SRPMS:
ftp://updates.redhat.com/rhn/repository/NULL/usermode/1.37-2/SRPMS/usermode-1.37-2.src.rpm
Missing file
    MD5: ede9b759a01552a261c67ebf0238794a
 
Alpha:
ftp://updates.redhat.com/rhn/repository/NULL/usermode/1.37-2/alpha/usermode-1.37-2.alpha.rpm
Missing file
    MD5: 6cd3999fa6015fcf301b502d4a416373
 
IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/usermode/1.37-2/i386/usermode-1.37-2.i386.rpm
Missing file
    MD5: c32888b6f362b04f8a3805d4465c042a
 

Bugs fixed (see bugzilla for more information)

20027 - /usr/sbin/userhelper dies in segmentation fault


References


Keywords

format-string


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/