First published: Mon Aug 15 2011(Updated: )
opencryptoki, when compiled with -DSPINXPL (as it is in Red Hat Enterprise Linux and Fedora), creates certain dot files in the /tmp directory, such as .pkapi_xpk and .pkcs11spinloc. These are not temporary files and are rather used for locking purposes. They are created in a way that allows symlink attacks. As files are opened RDWR, and not written to, they don't seem to allow file corruption as typical symlink attacks do. It is still possible to create new files at arbitrary locations (e.g. /etc/nologin) or make arbitrary file world writable (e.g. /etc/shadow) with the privileges of the user running pkcsslotd or an application using opencrpytoki library. Attacker does not need to be a member of the pkcs11 group, though symlinks would usually need to be created before the first use of the opencryptoki on the system.
Affected Software | Affected Version | How to fix |
---|---|---|
Opencryptoki | ||
Opencryptoki |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-730636 is classified as moderate due to the potential for file-related vulnerabilities in opencryptoki.
To fix REDHAT-BUG-730636, ensure that opencryptoki is updated to the latest version where this issue is addressed.
REDHAT-BUG-730636 affects Red Hat Enterprise Linux and Fedora systems running opencryptoki compiled with -DSPINXPL.
REDHAT-BUG-730636 creates locking dot files like .pkapi_xpk and .pkcs11spinloc in the /tmp directory.
Yes, the creation of these dot files in /tmp can pose a security risk, particularly if exploited through symlink attacks.