[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1VJlk1-00059p-96@titan.mandriva.com>
Date: Wed, 11 Sep 2013 16:50:00 +0200
From: security@...driva.com
To: full-disclosure@...ts.grok.org.uk
Subject: [ MDVSA-2013:230 ] gdm
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2013:230
http://www.mandriva.com/en/support/security/
_______________________________________________________________________
Package : gdm
Date : September 11, 2013
Affected: Enterprise Server 5.0
_______________________________________________________________________
Problem Description:
A vulnerability has been discovered and corrected in gdm:
GNOME Display Manager (gdm) before 2.21.1 allows local users to
change permissions of arbitrary directories via a symlink attack on
/tmp/.X11-unix/ (CVE-2013-4169).
The updated packages have been patched to correct this issue.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4169
rhn.redhat.com/errata/RHSA-2013-1213.html
_______________________________________________________________________
Updated Packages:
Mandriva Enterprise Server 5:
c9c0e22c4dbf7734df019ec39e494acb mes5/i586/debugmode-8.81-10.8mdvmes5.2.i586.rpm
61af3c6bf858f4b2aad9bfc9f67c2f69 mes5/i586/gdm-2.20.11-0.2mdvmes5.2.i586.rpm
5ab82b08cef49c41ebc045196875b4a6 mes5/i586/gdm-Xnest-2.20.11-0.2mdvmes5.2.i586.rpm
61ab1d9c46c4dbdc968775a5d825cbf1 mes5/i586/initscripts-8.81-10.8mdvmes5.2.i586.rpm
8e097ab7ff0c6320770b86fb8cba73a4 mes5/SRPMS/gdm-2.20.11-0.2mdvmes5.2.src.rpm
3ab56a25b076a224c01a72e12652cc01 mes5/SRPMS/initscripts-8.81-10.8mdvmes5.2.src.rpm
Mandriva Enterprise Server 5/X86_64:
09773125c4a75eb46d191f23bdede06e mes5/x86_64/debugmode-8.81-10.8mdvmes5.2.x86_64.rpm
f34f8b5caf1aabcfd636929be8546fd0 mes5/x86_64/gdm-2.20.11-0.2mdvmes5.2.x86_64.rpm
5b0ac4e9219acb4432102bd52aab2cc1 mes5/x86_64/gdm-Xnest-2.20.11-0.2mdvmes5.2.x86_64.rpm
be5edadaada0e51a3f28eb40e9c54356 mes5/x86_64/initscripts-8.81-10.8mdvmes5.2.x86_64.rpm
8e097ab7ff0c6320770b86fb8cba73a4 mes5/SRPMS/gdm-2.20.11-0.2mdvmes5.2.src.rpm
3ab56a25b076a224c01a72e12652cc01 mes5/SRPMS/initscripts-8.81-10.8mdvmes5.2.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/support/security/advisories/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iD8DBQFSMFczmqjQ0CJFipgRArCAAKCqw0oRwRMD/IVV5U5zDFmrcLKO4wCdGPs3
qweAcNHAuPAv8JmsXSFRSKc=
=tMr1
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists