Gentoo Logo

KDM: Symlink vulnerability

Content:

1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200606-23 / kdebase, KDM
Release Date June 22, 2006
Latest Revision June 24, 2006: 02
Impact normal
Exploitable local
Package Vulnerable versions Unaffected versions Architecture(s)
kde-base/kdebase < 3.5.2-r2 >= 3.5.2-r2, revision >= 3.4.3-r2 All supported architectures
kde-base/kdm < 3.5.2-r1 >= 3.5.2-r1, revision >= 3.4.3-r2 All supported architectures

Related bugreports: #136201

Synopsis

KDM is vulnerable to a symlink vulnerability that can lead to disclosure of information.

2.  Impact Information

Background

KDE is a feature-rich graphical desktop environment for Linux and Unix-like Operating Systems. KDM is the KDE Display Manager and is part of the kdebase package.

Description

Ludwig Nussel discovered that KDM could be tricked into allowing users to read files that would otherwise not be readable.

Impact

A local attacker could exploit this issue to obtain potentially sensitive information that is usually not accessable to the local user such as shadow files or other user's files. The default Gentoo user running KDM is root and, as a result, the local attacker can read any file.

3.  Resolution Information

Workaround

There is no known workaround at this time.

Resolution

All kdebase users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose kde-base/kdebase

All KDE split ebuild users should upgrade to the latest KDM version:

Code Listing 3.2: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose kde-base/kdm

4.  References



Print

Page updated June 22, 2006

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2014 Gentoo Foundation, Inc. Questions, Comments? Contact us.