Gentoo Logo

KDM: Symlink vulnerability


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200606-23 / kdebase, KDM
Release Date June 22, 2006
Latest Revision June 24, 2006: 02
Impact normal
Exploitable local
Package Vulnerable versions Unaffected versions Architecture(s)
kde-base/kdebase < 3.5.2-r2 >= 3.5.2-r2, revision >= 3.4.3-r2 All supported architectures
kde-base/kdm < 3.5.2-r1 >= 3.5.2-r1, revision >= 3.4.3-r2 All supported architectures

Related bugreports: #136201


KDM is vulnerable to a symlink vulnerability that can lead to disclosure of information.

2.  Impact Information


KDE is a feature-rich graphical desktop environment for Linux and Unix-like Operating Systems. KDM is the KDE Display Manager and is part of the kdebase package.


Ludwig Nussel discovered that KDM could be tricked into allowing users to read files that would otherwise not be readable.


A local attacker could exploit this issue to obtain potentially sensitive information that is usually not accessable to the local user such as shadow files or other user's files. The default Gentoo user running KDM is root and, as a result, the local attacker can read any file.

3.  Resolution Information


There is no known workaround at this time.


All kdebase users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose kde-base/kdebase

All KDE split ebuild users should upgrade to the latest KDM version:

Code Listing 3.2: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose kde-base/kdm

4.  References


Page updated June 22, 2006

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.