Skip to navigation

Security Advisory Low: gdm security and bug fix update

Advisory: RHSA-2010:0657-1
Type: Security Advisory
Severity: Low
Issued on: 2010-08-26
Last updated on: 2010-08-26
Affected Products: Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux AS (v. 4.8.z)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux ES (v. 4.8.z)
Red Hat Enterprise Linux WS (v. 4)
CVEs (cve.mitre.org): CVE-2007-5079

Details

An updated gdm package that fixes one security issue and one bug is now
available for Red Hat Enterprise Linux 4.

The Red Hat Security Response Team has rated this update as having low
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

The GNOME Display Manager (GDM) is a configurable re-implementation of XDM,
the X Display Manager. GDM allows you to log in to your system with the X
Window System running, and supports running several different X sessions on
your local machine at the same time.

A flaw was found in the way the gdm package was built. The gdm package was
missing TCP wrappers support on 64-bit platforms, which could result in an
administrator believing they had access restrictions enabled when they did
not. (CVE-2007-5079)

This update also fixes the following bug:

* sometimes the system would hang instead of properly shutting down when
a user chose "Shut down" from the login screen. (BZ#625818)

All users should upgrade to this updated package, which contains backported
patches to correct these issues. GDM must be restarted for this update to
take effect. Rebooting achieves this, but changing the runlevel from 5 to 3
and back to 5 also restarts GDM.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

Red Hat Desktop (v. 4)

SRPMS:
gdm-2.6.0.5-7.rhel4.19.el4_8.2.src.rpm     MD5: 42c422c0f7d80cc9172319e353f82cf7
SHA-256: 7a6780cd64ae12a1ff910a68e7272013854be436f216a8ef31596d6f06f20ae1
 
IA-32:
gdm-2.6.0.5-7.rhel4.19.el4_8.2.i386.rpm     MD5: 1d22cbfaae93f361dc256242c45ff6b2
SHA-256: bf016569faed60cf0d70aeb65e705d7a60084f6ac986300632f3543595a22d9d
 
x86_64:
gdm-2.6.0.5-7.rhel4.19.el4_8.2.x86_64.rpm     MD5: 16d278d870dc1bfd6b3fc3ee80394d99
SHA-256: 2258efeb6f260b8ba530143137079810acb9e3d57485781931c8b3b8e25b5206
 
Red Hat Enterprise Linux AS (v. 4)

SRPMS:
gdm-2.6.0.5-7.rhel4.19.el4_8.2.src.rpm     MD5: 42c422c0f7d80cc9172319e353f82cf7
SHA-256: 7a6780cd64ae12a1ff910a68e7272013854be436f216a8ef31596d6f06f20ae1
 
IA-32:
gdm-2.6.0.5-7.rhel4.19.el4_8.2.i386.rpm     MD5: 1d22cbfaae93f361dc256242c45ff6b2
SHA-256: bf016569faed60cf0d70aeb65e705d7a60084f6ac986300632f3543595a22d9d
 
IA-64:
gdm-2.6.0.5-7.rhel4.19.el4_8.2.ia64.rpm     MD5: 1fa3e61e5d1c01a5a5b69ebc7ec177df
SHA-256: d8b7a4d7fdd689281ab960f2c4a7f4001698667e34d385f23645735a81d701af
 
PPC:
gdm-2.6.0.5-7.rhel4.19.el4_8.2.ppc.rpm     MD5: 91ccc20cf7a214f74e103fd33bb5c56e
SHA-256: d0bceec76627bd64236b100494e91ee1de13d3b02ca5883d3c7ede1d35baf75a
 
s390:
gdm-2.6.0.5-7.rhel4.19.el4_8.2.s390.rpm     MD5: 4aabad7824f64cbd54de584efc5caa6f
SHA-256: ebc48fe3962ce832a00538960ad46f8e7de8f571c6e2b4f3d5a98421796d4ea4
 
s390x:
gdm-2.6.0.5-7.rhel4.19.el4_8.2.s390x.rpm     MD5: 74b596c454662e6c575d845691b871aa
SHA-256: cc3f674fc8c9b867577c797a26f503b99d59c53d8c611214b2e6793385ec85e5
 
x86_64:
gdm-2.6.0.5-7.rhel4.19.el4_8.2.x86_64.rpm     MD5: 16d278d870dc1bfd6b3fc3ee80394d99
SHA-256: 2258efeb6f260b8ba530143137079810acb9e3d57485781931c8b3b8e25b5206
 
Red Hat Enterprise Linux AS (v. 4.8.z)

SRPMS:
gdm-2.6.0.5-7.rhel4.19.el4_8.2.src.rpm     MD5: 42c422c0f7d80cc9172319e353f82cf7
SHA-256: 7a6780cd64ae12a1ff910a68e7272013854be436f216a8ef31596d6f06f20ae1
 
IA-32:
gdm-2.6.0.5-7.rhel4.19.el4_8.2.i386.rpm     MD5: 1d22cbfaae93f361dc256242c45ff6b2
SHA-256: bf016569faed60cf0d70aeb65e705d7a60084f6ac986300632f3543595a22d9d
 
IA-64:
gdm-2.6.0.5-7.rhel4.19.el4_8.2.ia64.rpm     MD5: 1fa3e61e5d1c01a5a5b69ebc7ec177df
SHA-256: d8b7a4d7fdd689281ab960f2c4a7f4001698667e34d385f23645735a81d701af
 
PPC:
gdm-2.6.0.5-7.rhel4.19.el4_8.2.ppc.rpm     MD5: 91ccc20cf7a214f74e103fd33bb5c56e
SHA-256: d0bceec76627bd64236b100494e91ee1de13d3b02ca5883d3c7ede1d35baf75a
 
s390:
gdm-2.6.0.5-7.rhel4.19.el4_8.2.s390.rpm     MD5: 4aabad7824f64cbd54de584efc5caa6f
SHA-256: ebc48fe3962ce832a00538960ad46f8e7de8f571c6e2b4f3d5a98421796d4ea4
 
s390x:
gdm-2.6.0.5-7.rhel4.19.el4_8.2.s390x.rpm     MD5: 74b596c454662e6c575d845691b871aa
SHA-256: cc3f674fc8c9b867577c797a26f503b99d59c53d8c611214b2e6793385ec85e5
 
x86_64:
gdm-2.6.0.5-7.rhel4.19.el4_8.2.x86_64.rpm     MD5: 16d278d870dc1bfd6b3fc3ee80394d99
SHA-256: 2258efeb6f260b8ba530143137079810acb9e3d57485781931c8b3b8e25b5206
 
Red Hat Enterprise Linux ES (v. 4)

SRPMS:
gdm-2.6.0.5-7.rhel4.19.el4_8.2.src.rpm     MD5: 42c422c0f7d80cc9172319e353f82cf7
SHA-256: 7a6780cd64ae12a1ff910a68e7272013854be436f216a8ef31596d6f06f20ae1
 
IA-32:
gdm-2.6.0.5-7.rhel4.19.el4_8.2.i386.rpm     MD5: 1d22cbfaae93f361dc256242c45ff6b2
SHA-256: bf016569faed60cf0d70aeb65e705d7a60084f6ac986300632f3543595a22d9d
 
IA-64:
gdm-2.6.0.5-7.rhel4.19.el4_8.2.ia64.rpm     MD5: 1fa3e61e5d1c01a5a5b69ebc7ec177df
SHA-256: d8b7a4d7fdd689281ab960f2c4a7f4001698667e34d385f23645735a81d701af
 
x86_64:
gdm-2.6.0.5-7.rhel4.19.el4_8.2.x86_64.rpm     MD5: 16d278d870dc1bfd6b3fc3ee80394d99
SHA-256: 2258efeb6f260b8ba530143137079810acb9e3d57485781931c8b3b8e25b5206
 
Red Hat Enterprise Linux ES (v. 4.8.z)

SRPMS:
gdm-2.6.0.5-7.rhel4.19.el4_8.2.src.rpm     MD5: 42c422c0f7d80cc9172319e353f82cf7
SHA-256: 7a6780cd64ae12a1ff910a68e7272013854be436f216a8ef31596d6f06f20ae1
 
IA-32:
gdm-2.6.0.5-7.rhel4.19.el4_8.2.i386.rpm     MD5: 1d22cbfaae93f361dc256242c45ff6b2
SHA-256: bf016569faed60cf0d70aeb65e705d7a60084f6ac986300632f3543595a22d9d
 
IA-64:
gdm-2.6.0.5-7.rhel4.19.el4_8.2.ia64.rpm     MD5: 1fa3e61e5d1c01a5a5b69ebc7ec177df
SHA-256: d8b7a4d7fdd689281ab960f2c4a7f4001698667e34d385f23645735a81d701af
 
x86_64:
gdm-2.6.0.5-7.rhel4.19.el4_8.2.x86_64.rpm     MD5: 16d278d870dc1bfd6b3fc3ee80394d99
SHA-256: 2258efeb6f260b8ba530143137079810acb9e3d57485781931c8b3b8e25b5206
 
Red Hat Enterprise Linux WS (v. 4)

SRPMS:
gdm-2.6.0.5-7.rhel4.19.el4_8.2.src.rpm     MD5: 42c422c0f7d80cc9172319e353f82cf7
SHA-256: 7a6780cd64ae12a1ff910a68e7272013854be436f216a8ef31596d6f06f20ae1
 
IA-32:
gdm-2.6.0.5-7.rhel4.19.el4_8.2.i386.rpm     MD5: 1d22cbfaae93f361dc256242c45ff6b2
SHA-256: bf016569faed60cf0d70aeb65e705d7a60084f6ac986300632f3543595a22d9d
 
IA-64:
gdm-2.6.0.5-7.rhel4.19.el4_8.2.ia64.rpm     MD5: 1fa3e61e5d1c01a5a5b69ebc7ec177df
SHA-256: d8b7a4d7fdd689281ab960f2c4a7f4001698667e34d385f23645735a81d701af
 
x86_64:
gdm-2.6.0.5-7.rhel4.19.el4_8.2.x86_64.rpm     MD5: 16d278d870dc1bfd6b3fc3ee80394d99
SHA-256: 2258efeb6f260b8ba530143137079810acb9e3d57485781931c8b3b8e25b5206
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

181302 - CVE-2007-5079 gdm with xdmcp ignoring tcp_wrappers on x86_64
625818 - gdm/ cannot shutdown system


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/