what you don't know can hurt you

Mandriva Linux Security Advisory 2013-230

Mandriva Linux Security Advisory 2013-230
Posted Sep 11, 2013
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2013-230 - GNOME Display Manager before 2.21.1 allows local users to change permissions of arbitrary directories via a symlink attack on /tmp/.X11-unix/. The updated packages have been patched to correct this issue.

tags | advisory, arbitrary, local
systems | linux, unix, mandriva
advisories | CVE-2013-4169
MD5 | 7920864e7af77b0e151ed7ab772db90b

Mandriva Linux Security Advisory 2013-230

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2013:230
http://www.mandriva.com/en/support/security/
_______________________________________________________________________

Package : gdm
Date : September 11, 2013
Affected: Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

A vulnerability has been discovered and corrected in gdm:

GNOME Display Manager (gdm) before 2.21.1 allows local users to
change permissions of arbitrary directories via a symlink attack on
/tmp/.X11-unix/ (CVE-2013-4169).

The updated packages have been patched to correct this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4169
rhn.redhat.com/errata/RHSA-2013-1213.html
_______________________________________________________________________

Updated Packages:

Mandriva Enterprise Server 5:
c9c0e22c4dbf7734df019ec39e494acb mes5/i586/debugmode-8.81-10.8mdvmes5.2.i586.rpm
61af3c6bf858f4b2aad9bfc9f67c2f69 mes5/i586/gdm-2.20.11-0.2mdvmes5.2.i586.rpm
5ab82b08cef49c41ebc045196875b4a6 mes5/i586/gdm-Xnest-2.20.11-0.2mdvmes5.2.i586.rpm
61ab1d9c46c4dbdc968775a5d825cbf1 mes5/i586/initscripts-8.81-10.8mdvmes5.2.i586.rpm
8e097ab7ff0c6320770b86fb8cba73a4 mes5/SRPMS/gdm-2.20.11-0.2mdvmes5.2.src.rpm
3ab56a25b076a224c01a72e12652cc01 mes5/SRPMS/initscripts-8.81-10.8mdvmes5.2.src.rpm

Mandriva Enterprise Server 5/X86_64:
09773125c4a75eb46d191f23bdede06e mes5/x86_64/debugmode-8.81-10.8mdvmes5.2.x86_64.rpm
f34f8b5caf1aabcfd636929be8546fd0 mes5/x86_64/gdm-2.20.11-0.2mdvmes5.2.x86_64.rpm
5b0ac4e9219acb4432102bd52aab2cc1 mes5/x86_64/gdm-Xnest-2.20.11-0.2mdvmes5.2.x86_64.rpm
be5edadaada0e51a3f28eb40e9c54356 mes5/x86_64/initscripts-8.81-10.8mdvmes5.2.x86_64.rpm
8e097ab7ff0c6320770b86fb8cba73a4 mes5/SRPMS/gdm-2.20.11-0.2mdvmes5.2.src.rpm
3ab56a25b076a224c01a72e12652cc01 mes5/SRPMS/initscripts-8.81-10.8mdvmes5.2.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/en/support/security/advisories/

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFSMFczmqjQ0CJFipgRArCAAKCqw0oRwRMD/IVV5U5zDFmrcLKO4wCdGPs3
qweAcNHAuPAv8JmsXSFRSKc=
=tMr1
-----END PGP SIGNATURE-----

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

February 2015

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    2 Files
  • 2
    Feb 2nd
    17 Files
  • 3
    Feb 3rd
    15 Files
  • 4
    Feb 4th
    16 Files
  • 5
    Feb 5th
    14 Files
  • 6
    Feb 6th
    4 Files
  • 7
    Feb 7th
    0 Files
  • 8
    Feb 8th
    0 Files
  • 9
    Feb 9th
    0 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    0 Files
  • 13
    Feb 13th
    0 Files
  • 14
    Feb 14th
    0 Files
  • 15
    Feb 15th
    0 Files
  • 16
    Feb 16th
    0 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    0 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2015 Packet Storm. All rights reserved.

close