Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:29896
HistoryOct 03, 2013 - 12:00 a.m.

[ MDVSA-2013:230 ] gdm

2013-10-0300:00:00
vulners.com
13

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Mandriva Linux Security Advisory MDVSA-2013:230
http://www.mandriva.com/en/support/security/


Package : gdm
Date : September 11, 2013
Affected: Enterprise Server 5.0


Problem Description:

A vulnerability has been discovered and corrected in gdm:

GNOME Display Manager (gdm) before 2.21.1 allows local users to
change permissions of arbitrary directories via a symlink attack on
/tmp/.X11-unix/ (CVE-2013-4169).

The updated packages have been patched to correct this issue.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4169
rhn.redhat.com/errata/RHSA-2013-1213.html


Updated Packages:

Mandriva Enterprise Server 5:
c9c0e22c4dbf7734df019ec39e494acb mes5/i586/debugmode-8.81-10.8mdvmes5.2.i586.rpm
61af3c6bf858f4b2aad9bfc9f67c2f69 mes5/i586/gdm-2.20.11-0.2mdvmes5.2.i586.rpm
5ab82b08cef49c41ebc045196875b4a6 mes5/i586/gdm-Xnest-2.20.11-0.2mdvmes5.2.i586.rpm
61ab1d9c46c4dbdc968775a5d825cbf1 mes5/i586/initscripts-8.81-10.8mdvmes5.2.i586.rpm
8e097ab7ff0c6320770b86fb8cba73a4 mes5/SRPMS/gdm-2.20.11-0.2mdvmes5.2.src.rpm
3ab56a25b076a224c01a72e12652cc01 mes5/SRPMS/initscripts-8.81-10.8mdvmes5.2.src.rpm

Mandriva Enterprise Server 5/X86_64:
09773125c4a75eb46d191f23bdede06e mes5/x86_64/debugmode-8.81-10.8mdvmes5.2.x86_64.rpm
f34f8b5caf1aabcfd636929be8546fd0 mes5/x86_64/gdm-2.20.11-0.2mdvmes5.2.x86_64.rpm
5b0ac4e9219acb4432102bd52aab2cc1 mes5/x86_64/gdm-Xnest-2.20.11-0.2mdvmes5.2.x86_64.rpm
be5edadaada0e51a3f28eb40e9c54356 mes5/x86_64/initscripts-8.81-10.8mdvmes5.2.x86_64.rpm
8e097ab7ff0c6320770b86fb8cba73a4 mes5/SRPMS/gdm-2.20.11-0.2mdvmes5.2.src.rpm
3ab56a25b076a224c01a72e12652cc01 mes5/SRPMS/initscripts-8.81-10.8mdvmes5.2.src.rpm


To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/en/support/security/advisories/

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com


Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFSMFczmqjQ0CJFipgRArCAAKCqw0oRwRMD/IVV5U5zDFmrcLKO4wCdGPs3
qweAcNHAuPAv8JmsXSFRSKc=
=tMr1
-----END PGP SIGNATURE-----