A new gdm vulnerability update is available for Ubuntu Linux. Here the announcement:
Ubuntu Security Notice USN-278-1 May 03, 2006
gdm vulnerabilitiy
CVE-2006-1057
===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 5.04 (Hoary Hedgehog)
Ubuntu 5.10 (Breezy Badger)
The following packages are affected:
gdm
The problem can be corrected by upgrading the affected package to
version 2.6.0.7-0ubuntu7.1 (for Ubuntu 5.04) or 2.8.0.5-0ubuntu1.1
(for Ubuntu 5.10). In general, a standard system upgrade is
sufficient to effect the necessary changes.
Details follow:
Marcus Meissner discovered a race condition in gdm's handling of the
~/.ICEauthority file permissions. A local attacker could exploit this
to become the owner of an arbitrary file in the system. When getting
control over automatically executed scripts (like cron jobs), the
attacker could eventually leverage this flaw to execute arbitrary
commands with root privileges.
Updated packages for Ubuntu 5.04:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.6.0.7-0ubuntu7.1.diff.gz
Size/MD5: 68630 07276634f63f6cf6e3d3946661cf2939
http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.6.0.7-0ubuntu7.1.dsc
Size/MD5: 787 6e666f8da0735aee929c25a9818dd53a
http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.6.0.7.orig.tar.gz
Size/MD5: 5594495 50254890d9fbbec6b2d3455d4343f6e0
amd64 architecture (Athlon64, Opteron, EM64T Xeon)
http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.6.0.7-0ubuntu7.1_amd64.deb
Size/MD5: 1382686 716ba56c1177162685a7198b46a28667
i386 architecture (x86 compatible Intel/AMD)
http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.6.0.7-0ubuntu7.1_i386.deb
Size/MD5: 1343230 9bb1a76e6d0a8658f49ce787f6a66606
powerpc architecture (Apple Macintosh G3/G4/G5)
http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.6.0.7-0ubuntu7.1_powerpc.deb
Size/MD5: 1379750 bcaec993d57ce53221c920245495d3b8
Updated packages for Ubuntu 5.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.8.0.5-0ubuntu1.1.diff.gz
Size/MD5: 65777 3181d42210c694ab595840f1359d5735
http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.8.0.5-0ubuntu1.1.dsc
Size/MD5: 820 0165df3317618487e8d39e60b5174c83
http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.8.0.5.orig.tar.gz
Size/MD5: 4226618 349b76492113ab814f2732d4ce3a49c2
amd64 architecture (Athlon64, Opteron, EM64T Xeon)
http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.8.0.5-0ubuntu1.1_amd64.deb
Size/MD5: 1618080 7aa6c967d046d2876e577975e5c6759f
i386 architecture (x86 compatible Intel/AMD)
http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.8.0.5-0ubuntu1.1_i386.deb
Size/MD5: 1559770 3dc875b89062d5572b2b2e84a8354434
powerpc architecture (Apple Macintosh G3/G4/G5)
http://security.ubuntu.com/ubuntu/pool/main/g/gdm/gdm_2.8.0.5-0ubuntu1.1_powerpc.deb
Size/MD5: 1571404 1ca7c072d5460d694af449719f2abc57
--2/5bycvrmDh4d1IB
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)
iD8DBQFEWNvsDecnbV4Fd/IRAt27AJ4mIxapqK6ZOoVS5wnC3RcxpzBTCgCfbNYM
KH4MzKnT4/LrmJLbkYWUB90=
=32f3
-----END PGP SIGNATURE-----