First published: Mon Oct 06 2014(Updated: )
It was reported that sddm has several issues leading to local privilege escalation: [1] The xauth cookie handling code calls xauth binary via popen() as root, which in turn dumps and creates files as root in users ~. [2] After xauth has done its job, sddm chowns() the ~/.Xauthority file to user. This is a race and a local root exploit. [3] The .xsession-errors file is created in ~ but as root. This allows to destroy arbitrary system files. Upstream patch is at [4]. [1] <a href="https://bugzilla.suse.com/show_bug.cgi?id=897788#c7">https://bugzilla.suse.com/show_bug.cgi?id=897788#c7</a> [2] <a href="https://bugzilla.suse.com/show_bug.cgi?id=897788#c8">https://bugzilla.suse.com/show_bug.cgi?id=897788#c8</a> [3] <a href="https://bugzilla.suse.com/show_bug.cgi?id=897788#c9">https://bugzilla.suse.com/show_bug.cgi?id=897788#c9</a> [4] <a href="https://github.com/sddm/sddm/pull/280">https://github.com/sddm/sddm/pull/280</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sddm Project Sddm | <0.10.0 | |
Fedoraproject Fedora | =20 | |
Fedoraproject Fedora | =21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.