Login
Newsletter
Werbung

Sicherheit: Überschreiben von Dateien in Gnome Display Manager
Aktuelle Meldungen Distributionen
Name: Überschreiben von Dateien in Gnome Display Manager
ID: MDVSA-2013:230
Distribution: Mandriva
Plattformen: Mandriva Enterprise Server 5.0
Datum: Mi, 11. September 2013, 22:54
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4169
Applikationen: Gnome Display Manager

Originalnachricht

This is a multi-part message in MIME format...

------------=_1378911261-3002-41

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2013:230
http://www.mandriva.com/en/support/security/
_______________________________________________________________________

Package : gdm
Date : September 11, 2013
Affected: Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

A vulnerability has been discovered and corrected in gdm:

GNOME Display Manager (gdm) before 2.21.1 allows local users to
change permissions of arbitrary directories via a symlink attack on
/tmp/.X11-unix/ (CVE-2013-4169).

The updated packages have been patched to correct this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4169
rhn.redhat.com/errata/RHSA-2013-1213.html
_______________________________________________________________________

Updated Packages:

Mandriva Enterprise Server 5:
c9c0e22c4dbf7734df019ec39e494acb
mes5/i586/debugmode-8.81-10.8mdvmes5.2.i586.rpm
61af3c6bf858f4b2aad9bfc9f67c2f69 mes5/i586/gdm-2.20.11-0.2mdvmes5.2.i586.rpm
5ab82b08cef49c41ebc045196875b4a6
mes5/i586/gdm-Xnest-2.20.11-0.2mdvmes5.2.i586.rpm
61ab1d9c46c4dbdc968775a5d825cbf1
mes5/i586/initscripts-8.81-10.8mdvmes5.2.i586.rpm
8e097ab7ff0c6320770b86fb8cba73a4 mes5/SRPMS/gdm-2.20.11-0.2mdvmes5.2.src.rpm
3ab56a25b076a224c01a72e12652cc01
mes5/SRPMS/initscripts-8.81-10.8mdvmes5.2.src.rpm

Mandriva Enterprise Server 5/X86_64:
09773125c4a75eb46d191f23bdede06e
mes5/x86_64/debugmode-8.81-10.8mdvmes5.2.x86_64.rpm
f34f8b5caf1aabcfd636929be8546fd0
mes5/x86_64/gdm-2.20.11-0.2mdvmes5.2.x86_64.rpm
5b0ac4e9219acb4432102bd52aab2cc1
mes5/x86_64/gdm-Xnest-2.20.11-0.2mdvmes5.2.x86_64.rpm
be5edadaada0e51a3f28eb40e9c54356
mes5/x86_64/initscripts-8.81-10.8mdvmes5.2.x86_64.rpm
8e097ab7ff0c6320770b86fb8cba73a4 mes5/SRPMS/gdm-2.20.11-0.2mdvmes5.2.src.rpm
3ab56a25b076a224c01a72e12652cc01
mes5/SRPMS/initscripts-8.81-10.8mdvmes5.2.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/en/support/security/advisories/

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFSMFczmqjQ0CJFipgRArCAAKCqw0oRwRMD/IVV5U5zDFmrcLKO4wCdGPs3
qweAcNHAuPAv8JmsXSFRSKc=
=tMr1
-----END PGP SIGNATURE-----


------------=_1378911261-3002-41
Content-Type: text/plain; charset="UTF-8";
name="message-footer.txt"
Content-Disposition: inline; filename="message-footer.txt"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://store.mandriva.com
_______________________________________________________


------------=_1378911261-3002-41--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung