Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20130905215450.GL5194@redhat.com>
Date: Thu, 5 Sep 2013 15:54:50 -0600
From: Vincent Danen <vdanen@...hat.com>
To: oss-security@...ts.openwall.com
Subject: GDM TOCTTOU race condition on /tmp/.X11-unix (CVE-2013-4169)

As per the distros@ list recommendations, I'm writing to alert of a
problem with older versions of GDM.  As per our bugzilla [1]:

Vladz reported that GDM versions < 2.21.1 were vulnerable to a TOCTTOU
(time of check to time of use) flaw in the way that GDM checked for the
existence of, and created if missing, the /tmp/.X11-unix/ special
directory.  A local attacker could use this flaw to overwrite arbitrary
file contents via symbolic link attacks or to manipulate the contents of
arbitrary files, including those files owned by the root user that would
normally be inaccessible.  This is because GDM will chown /tmp/.X11-unix
to the user and group root, but also changes the permissions to 1777.

Newer versions of GDM no longer create the /tmp/.X11-unix/ directory and
are thus not vulnerable to this flaw.

This issue was assigned CVE-2013-4169.  We fixed the problem by having
rc.sysinit pre-create /tmp/.X11-unix at boot, like it does for
/tmp/.ICE-unix (and removing the offending code from GDM).


[1] https://bugzilla.redhat.com/show_bug.cgi?id=988498

-- 
Vincent Danen / Red Hat Security Response Team 

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.