First published: Mon Aug 15 2011(Updated: )
opencryptoki, when compiled with -DSPINXPL (as it is in Red Hat Enterprise Linux and Fedora), creates certain dot files in the /tmp directory, such as .pkapi_xpk and .pkcs11spinloc. These are not temporary files and are rather used for locking purposes. They are created in a way that allows symlink attacks. As files are opened RDWR, and not written to, they don't seem to allow file corruption as typical symlink attacks do. It is still possible to create new files at arbitrary locations (e.g. /etc/nologin) or make arbitrary file world writable (e.g. /etc/shadow) with the privileges of the user running pkcsslotd or an application using opencrpytoki library. Attacker does not need to be a member of the pkcs11 group, though symlinks would usually need to be created before the first use of the opencryptoki on the system.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Opencryptoki Project Opencryptoki | <=2.4 | |
Opencryptoki Project Opencryptoki | =2.2.3 | |
Opencryptoki Project Opencryptoki | =2.2.4 | |
Opencryptoki Project Opencryptoki | =2.2.4.1 | |
Opencryptoki Project Opencryptoki | =2.2.5 | |
Opencryptoki Project Opencryptoki | =2.2.6 | |
Opencryptoki Project Opencryptoki | =2.2.7 | |
Opencryptoki Project Opencryptoki | =2.2.8 | |
Opencryptoki Project Opencryptoki | =2.3.0 | |
Opencryptoki Project Opencryptoki | =2.3.1 | |
Opencryptoki Project Opencryptoki | =2.3.2 | |
Opencryptoki Project Opencryptoki | =2.3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.