Bug 745755 (CVE-2011-4028) - CVE-2011-4028 xorg-x11-server: File existence disclosure vulnerability
Summary: CVE-2011-4028 xorg-x11-server: File existence disclosure vulnerability
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2011-4028
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 768993 799349 807122
Blocks: 742493 745043 784298
TreeView+ depends on / blocked
 
Reported: 2011-10-13 10:09 UTC by Jan Lieskovsky
Modified: 2021-02-24 14:29 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2012-06-20 10:22:49 UTC


Attachments (Terms of Use)
Proposed X.Org X11 server upstream patch (966 bytes, patch)
2011-10-18 10:55 UTC, Jan Lieskovsky
no flags Details | Diff


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2012:0303 0 normal SHIPPED_LIVE Low: xorg-x11-server security and bug fix update 2012-02-21 07:24:37 UTC
Red Hat Product Errata RHSA-2012:0939 0 normal SHIPPED_LIVE Low: xorg-x11-server security and bug fix update 2012-06-19 19:28:31 UTC

Description Jan Lieskovsky 2011-10-13 10:09:20 UTC
A file existence disclosure flaw was found in the way X.Org X11 X server performed management of temporary lock files. A local, unprivileged user could use this flaw to confirm (non) existence of a file system object (file, directory or fifo), which shouldn't be accessible for them, via symbolic link attacks, with link name being the expected name of the X.Org X11 X server temporary lock file.

Note:
For the exploit to succeed the local attacker needs to be able to run the X.Org X11 X server.

Comment 1 Jan Lieskovsky 2011-10-13 10:12:01 UTC
Acknowledgements:

Red Hat would like to thank researcher with a nickname vladz for reporting this issue.

Comment 5 Jan Lieskovsky 2011-10-18 10:55:10 UTC
Created attachment 528780 [details]
Proposed X.Org X11 server upstream patch

Comment 6 Vincent Danen 2011-10-18 16:42:24 UTC
This issue is now public.  The following commit corrects the problem upstream:

http://cgit.freedesktop.org/xorg/xserver/commit/?id=6ba44b91e37622ef8c146d8f2ac92d708a18ed34


External References:

http://lists.freedesktop.org/archives/xorg-announce/2011-October/001744.html

Comment 7 Vincent Danen 2011-10-18 16:45:24 UTC
Statement:

(none)

Comment 10 errata-xmlrpc 2012-02-21 03:12:34 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2012:0303 https://rhn.redhat.com/errata/RHSA-2012-0303.html

Comment 12 Jan Lieskovsky 2012-03-02 14:49:37 UTC
This issue affects the current version (xorg-x11-server-Xorg-1.10.4-1.fc15.*) of the xorg-x11-server package, as shipped with Fedora release of 15. Please schedule an update.

--

This issue does NOT affect the current version (xorg-x11-server-Xorg-1.11.4-1.fc16) of the xorg-x11-server package, as shipped with Fedora release of 16. The deficiency in this version is corrected already.

Comment 13 Jan Lieskovsky 2012-03-02 15:07:33 UTC
Created xorg-x11-server tracking bugs for this issue

Affects: fedora-15 [bug 799349]

Comment 15 errata-xmlrpc 2012-06-20 07:27:24 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2012:0939 https://rhn.redhat.com/errata/RHSA-2012-0939.html


Note You need to log in before you can comment on or make changes to this bug.