-----BEGIN PGP SIGNED MESSAGE-----

===========================================================================
              AUSCERT External Security Bulletin Redistribution
                             
                       ESB-1999.082 -- RHSA-1999:014-01
             New dev, rxvt, screen packages for Red Hat Linux 6.0
                                22 June 1999

===========================================================================

Red Hat Software, Inc. has released the following advisory concerning a
vulnerability in dev, rxvt, and screen packages shipped with Red Hat Linux
6.0.

- --------------------------BEGIN INCLUDED TEXT--------------------

- ---------------------------------------------------------------------
		   Red Hat, Inc. Security Advisory

Synopsis:		New dev, rxvt, screen packages for Red Hat Linux 6.0
Advisory ID:		RHSA-1999:014-01
Issue date:		1999-06-15
Keywords:		dev rxvt screen pts devpts tty
- ---------------------------------------------------------------------

1. Topic:

New dev, rxvt, and screen packages are available that fix a
security issue with the packages that originally shipped with
Red Hat Linux 6.0. Please read the 'Solution' section for
special action needed to complete this upgrade.

2. Bug IDs fixed:

2611 3025 3326

3. Relevant releases/architectures:

Red Hat Linux 6.0, all architectures

4. Obsoleted by:

5. Conflicts with:

6. RPMs required:

Intel: ftp://updates.redhat.com/6.0/i386/

dev-2.7.7-2.i386.rpm
rxvt-2.6.0-2.i386.rpm
screen-3.7.6-9.i386.rpm

Alpha: ftp://updates.redhat.com/6.0/alpha/

dev-2.7.7-2.alpha.rpm
rxvt-2.6.0-2.alpha.rpm
screen-3.7.6-9.alpha.rpm

Sparc: ftp://updates.redhat.com/6.0/sparc/

dev-2.7.7-2.sparc.rpm
rxvt-2.6.0-2.sparc.rpm
screen-3.7.6-9.sparc.rpm

7. Problem description:

The /dev/pts filesystem was mounted with options 'mode=0622'
in Red Hat Linux 6.0, instead of the correct 'gid=5,mode=0620'.
This could lead to users being able to write to affected ttys.

Additionally, once this was corrected, screen and rxvt would
still chmod the tty devices to potentially insecure modes.

8. Solution:

Upgrade to the latest errata releases of dev, screen and
rxvt for Red Hat Linux 6.0 on your particular platform.
While the post-install script for the dev package will add the
correct permissions for the /dev/pts file system in the
/etc/fstab file, you will have to manually unmount and
remount the /dev/pts file system with the following commands,
once the correct permissions have been set in the /etc/fstab file:

umount /dev/pts
mount /dev/pts

If you get the error message "umount: /dev/pts: device is busy"
when trying to unmount the filesystem, you will have to close
all connections using the filesystem, such as screen, xterm
(and other such X terminal programs), and some remote
connections.

9. Verification:

MD5 sum                           Package Name
- --------------------------------------------------------------------------
34c8c9f6ae3bcb74e63fd67bb785b560  dev-2.7.7-2.i386.rpm
3f0ad6893bdbde6dc9c1a357e555a13b  rxvt-2.6.0-2.i386.rpm
fc48d9c63ebe02b0fa1741f468f4ccea  screen-3.7.6-9.i386.rpm

06777bc610b46490de200cd066c5687b  dev-2.7.7-2.alpha.rpm
67bc34923cd2b2a4504fcb14ed735bf8  rxvt-2.6.0-2.alpha.rpm
f3c2f2c5867d3bca4a5751fcc8652105  screen-3.7.6-9.alpha.rpm

e43914909f7151ef525a6f4b9b1ad461  dev-2.7.7-2.sparc.rpm
fe677d3c7d188e204162d4694739639b  rxvt-2.6.0-2.sparc.rpm
8e793294d01c9a8f7ded1c563cb0ab92  screen-3.7.6-9.sparc.rpm

b25e4de59a00270bb6acd85c8dc901ad  dev-2.7.7-2.src.rpm
eed32f9b8d67c58d62989758beb7320d  rxvt-2.6.0-2.src.rpm
f6b51e57e68c9f1e32dd58ef45c76797  screen-3.7.6-9.src.rpm

These packages are also PGP signed by Red Hat Inc. for security.  Our
key is available at:

http://www.redhat.com/corp/contact.html

10. References:

- --------------------------END INCLUDED TEXT--------------------

This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content.  The decision to use any or all of this information is
the responsibility of each user or organisation, and should be done so in
accordance with site policies and procedures.

NOTE: This is only the original release of the security bulletin.  It will
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the original authors to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

	http://www.auscert.org.au/Information/advisories.html

If you believe that your system has been compromised, contact AusCERT or
your representative in FIRST (Forum of Incident Response and Security
Teams).

Internet Email: auscert@auscert.org.au
Facsimile:	(07) 3365 7031
Telephone:	(07) 3365 4417 (International: +61 7 3365 4417)
		AusCERT personnel answer during Queensland business hours
		which are GMT+10:00 (AEST).
		On call after hours for emergencies.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key

iQCVAwUBN3jZZih9+71yA2DNAQENLwP+KO0T3Gttc5Vr6yjcyrFQ4OLOfZdjLSUA
TrFQqqZ//wfo1CNWHzISifBS1BLwzdXkSjfO5eJx1WwYzlxW+faZQ/m4bJoCBOAx
Ub5KCAaqy3Tq13iiOjuJh/gQBwq6+0pcUcVEIc8+7SOZAMqHx0X6BGEG2OzLx3G7
GyG/1vFqSU4=
=1bdk
-----END PGP SIGNATURE-----