[ advisories | exploits | discussions | news | conventions | security tools | texts & papers ]
 main menu
- feedback
- advertising
- privacy
- FightAIDS
- newsletter
- news
 
 discussions
- read forum
- new topic
- search
 

 meetings
- meetings list
- recent additions
- add your info
 
 top 100 sites
- visit top sites
- sign up now
- members
 
 webmasters

- add your url
- add domain
- search box
- link to us

 
 projects
- our projects
- free email
 
 m4d network
- security software
- secureroot
- m4d.com
Home : Advisories : Updated usermode packages available

Title: Updated usermode packages available
Released by: Red Hat
Date: 9th October 2000
Printable version: Click here
---------------------------------------------------------------------

                   Red Hat, Inc. Security Advisory



Synopsis:          Updated usermode packages available

Advisory ID:       RHSA-2000:075-05

Issue date:        2000-10-05

Updated on:        2000-10-09

Product:           Red Hat Linux

Keywords:          usermode format-string

Cross references:  N/A

---------------------------------------------------------------------



1. Topic:



Updated usermode packages are now available for Red Hat Linux 6.x and 7.



2. Relevant releases/architectures:



Red Hat Linux 6.0 - i386, alpha, sparc

Red Hat Linux 6.1 - i386, alpha, sparc

Red Hat Linux 6.2 - i386, alpha, sparc

Red Hat Linux 6.2EE - i386, alpha, sparc

Red Hat Linux 7.0 - i386

Red Hat Linux 7.0J - i386



3. Problem description:



The usermode package contains a binary (/usr/bin/userhelper), which is used

to control access to programs which are to be executed as root.  Because

programs invoked by userhelper are not actually running setuid-root,

security measures built into recent versions of glibc are not active.



If one of these programs supports internationalized text messages, a

malicious user can use the LANG or LC_ALL environment variables (which are

inherited by userhelper and, in turn, any programs it runs) to create a

format-string exploit in these programs.



4. Solution:



For each RPM for your particular architecture, run:



rpm -Fvh [filename]



where filename is the name of the RPM.



5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):



18046 - Another security hole in usermode/glibc





6. RPMs required:



Red Hat Linux 6.0 and 6.1:



alpha:

http://updates.redhat.com/6.2/alpha/usermode-1.36-2.6.x.alpha.rpm

http://updates.redhat.com/6.2/alpha/SysVinit-2.78-5.alpha.rpm



sparc:

http://updates.redhat.com/6.2/sparc/usermode-1.36-2.6.x.sparc.rpm

http://updates.redhat.com/6.2/sparc/SysVinit-2.78-5.sparc.rpm



i386:

http://updates.redhat.com/6.2/i386/usermode-1.36-2.6.x.i386.rpm

http://updates.redhat.com/6.2/i386/SysVinit-2.78-5.i386.rpm



sources:

http://updates.redhat.com/6.2/SRPMS/usermode-1.36-2.6.x.src.rpm

http://updates.redhat.com/6.2/SRPMS/SysVinit-2.78-5.src.rpm



Red Hat Linux 6.2:



alpha:

http://updates.redhat.com/6.2/alpha/usermode-1.36-2.6.x.alpha.rpm



sparc:

http://updates.redhat.com/6.2/sparc/usermode-1.36-2.6.x.sparc.rpm



i386:

http://updates.redhat.com/6.2/i386/usermode-1.36-2.6.x.i386.rpm



sources:

http://updates.redhat.com/6.2/SRPMS/usermode-1.36-2.6.x.src.rpm



Red Hat Linux 7.0:



i386:

http://updates.redhat.com/7.0/i386/usermode-1.36-3.i386.rpm



sources:

http://updates.redhat.com/7.0/SRPMS/usermode-1.36-3.src.rpm



7. Verification:



MD5 sum                           Package Name

--------------------------------------------------------------------------

3310677ae7403c683e7947cd86b19344  6.2/SRPMS/SysVinit-2.78-5.src.rpm

c96aaae0df6782bb09bd65fb1d6dc69b  6.2/SRPMS/usermode-1.36-2.6.x.src.rpm

546bf7949c5be73b9f28b1819bfbd7c6  6.2/alpha/SysVinit-2.78-5.alpha.rpm

afb4ad3a5715c0df6596a19db4d2b3c8  6.2/alpha/usermode-1.36-2.6.x.alpha.rpm

ca5b97a1abb47b64d71ef69ab96fcb8a  6.2/i386/SysVinit-2.78-5.i386.rpm

c2bac5d41ee077d2db48ed9462802ff0  6.2/i386/usermode-1.36-2.6.x.i386.rpm

4dfeacb8db12af4b2666f2792e1027c1  6.2/sparc/SysVinit-2.78-5.sparc.rpm

8567bb088fb7cab3e298d0df24f8c626  6.2/sparc/usermode-1.36-2.6.x.sparc.rpm

5ac6cca0a146d917e0ec3f6f1e046fa8  7.0/SRPMS/usermode-1.36-3.src.rpm

5d40e125fa0a31f05b8dac9321a1fa88  7.0/i386/usermode-1.36-3.i386.rpm



These packages are GPG signed by Red Hat, Inc. for security.  Our key

is available at:

    http://www.redhat.com/corp/contact.html



You can verify each package with the following command:

    rpm --checksig  



If you only wish to verify that each package has not been corrupted or

tampered with, examine only the md5sum with the following command:

    rpm --checksig --nogpg 



8. References:



N/A





Copyright(c) 2000 Red Hat, Inc.








(C) 1999-2000 All rights reserved.