Skip to navigation

Security Advisory Low: gdm security and bug fix update

Advisory: RHSA-2007:0286-4
Type: Security Advisory
Severity: Low
Issued on: 2007-05-01
Last updated on: 2007-05-01
Affected Products: Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux WS (v. 4)
CVEs (cve.mitre.org): CVE-2006-1057

Details

An updated gdm package that fixes a security issue and a bug is now available.

This update has been rated as having low security impact by the Red Hat
Security Response Team.

Gdm (the GNOME Display Manager) is a highly configurable reimplementation
of xdm, the X Display Manager. Gdm allows you to log into your system with
the X Window System running and supports running several different X
sessions on your local machine at the same time.

Marcus Meissner discovered a race condition issue in the way Gdm modifies
the permissions on the .ICEauthority file. A local attacker could exploit
this flaw to gain privileges. Due to the nature of the flaw, however, a
successful exploitation was unlikely. (CVE-2006-1057)

This erratum also includes a bug fix to correct the pam configuration for
the audit system.

All users of gdm should upgrade to this updated package, which contains
backported patches to resolve these issues.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

Updated packages

Red Hat Desktop (v. 4)

IA-32:
gdm-2.6.0.5-7.rhel4.15.i386.rpm
File outdated by:  RHSA-2010:0657
    MD5: 298d605e4ba10fb68a49aba0699d84a7
 
x86_64:
gdm-2.6.0.5-7.rhel4.15.x86_64.rpm
File outdated by:  RHSA-2010:0657
    MD5: 56b3f1b0741daa26cca66326086765b3
 
Red Hat Enterprise Linux AS (v. 4)

IA-32:
gdm-2.6.0.5-7.rhel4.15.i386.rpm
File outdated by:  RHSA-2010:0657
    MD5: 298d605e4ba10fb68a49aba0699d84a7
 
IA-64:
gdm-2.6.0.5-7.rhel4.15.ia64.rpm
File outdated by:  RHSA-2010:0657
    MD5: 5bc9d3a15228d06ce0e2e746672af19a
 
PPC:
gdm-2.6.0.5-7.rhel4.15.ppc.rpm
File outdated by:  RHSA-2010:0657
    MD5: 118eba1dd505514b44ee2864d6ef53b2
 
s390:
gdm-2.6.0.5-7.rhel4.15.s390.rpm
File outdated by:  RHSA-2010:0657
    MD5: 1bbe16709e32eaf9a5cdadb4aa3cd0df
 
s390x:
gdm-2.6.0.5-7.rhel4.15.s390x.rpm
File outdated by:  RHSA-2010:0657
    MD5: 7707a11959a00214932cf41e6c31e1d9
 
x86_64:
gdm-2.6.0.5-7.rhel4.15.x86_64.rpm
File outdated by:  RHSA-2010:0657
    MD5: 56b3f1b0741daa26cca66326086765b3
 
Red Hat Enterprise Linux ES (v. 4)

IA-32:
gdm-2.6.0.5-7.rhel4.15.i386.rpm
File outdated by:  RHSA-2010:0657
    MD5: 298d605e4ba10fb68a49aba0699d84a7
 
IA-64:
gdm-2.6.0.5-7.rhel4.15.ia64.rpm
File outdated by:  RHSA-2010:0657
    MD5: 5bc9d3a15228d06ce0e2e746672af19a
 
x86_64:
gdm-2.6.0.5-7.rhel4.15.x86_64.rpm
File outdated by:  RHSA-2010:0657
    MD5: 56b3f1b0741daa26cca66326086765b3
 
Red Hat Enterprise Linux WS (v. 4)

IA-32:
gdm-2.6.0.5-7.rhel4.15.i386.rpm
File outdated by:  RHSA-2010:0657
    MD5: 298d605e4ba10fb68a49aba0699d84a7
 
IA-64:
gdm-2.6.0.5-7.rhel4.15.ia64.rpm
File outdated by:  RHSA-2010:0657
    MD5: 5bc9d3a15228d06ce0e2e746672af19a
 
x86_64:
gdm-2.6.0.5-7.rhel4.15.x86_64.rpm
File outdated by:  RHSA-2010:0657
    MD5: 56b3f1b0741daa26cca66326086765b3
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

159338 - gdm update for new audit system
188302 - CVE-2006-1057 GDM file permissions race condition


References


Keywords

.Xauthority, condition, race


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/