|
Message-ID: <20130905215450.GL5194@redhat.com> Date: Thu, 5 Sep 2013 15:54:50 -0600 From: Vincent Danen <vdanen@...hat.com> To: oss-security@...ts.openwall.com Subject: GDM TOCTTOU race condition on /tmp/.X11-unix (CVE-2013-4169) As per the distros@ list recommendations, I'm writing to alert of a problem with older versions of GDM. As per our bugzilla [1]: Vladz reported that GDM versions < 2.21.1 were vulnerable to a TOCTTOU (time of check to time of use) flaw in the way that GDM checked for the existence of, and created if missing, the /tmp/.X11-unix/ special directory. A local attacker could use this flaw to overwrite arbitrary file contents via symbolic link attacks or to manipulate the contents of arbitrary files, including those files owned by the root user that would normally be inaccessible. This is because GDM will chown /tmp/.X11-unix to the user and group root, but also changes the permissions to 1777. Newer versions of GDM no longer create the /tmp/.X11-unix/ directory and are thus not vulnerable to this flaw. This issue was assigned CVE-2013-4169. We fixed the problem by having rc.sysinit pre-create /tmp/.X11-unix at boot, like it does for /tmp/.ICE-unix (and removing the offending code from GDM). [1] https://bugzilla.redhat.com/show_bug.cgi?id=988498 -- Vincent Danen / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.