Skip to navigation

Security Advisory Important: gdm security update

Advisory: RHSA-2013:1213-1
Type: Security Advisory
Severity: Important
Issued on: 2013-09-05
Last updated on: 2013-09-05
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux EUS (v. 5.9.z server)
Red Hat Enterprise Linux Long Life (v. 5.9 server)
CVEs (cve.mitre.org): CVE-2013-4169

Details

Updated gdm and initscripts packages that fix one security issue are now
available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.

The GNOME Display Manager (GDM) provides the graphical login screen, shown
shortly after boot up, log out, and when user-switching.

A race condition was found in the way GDM handled the X server sockets
directory located in the system temporary directory. An unprivileged user
could use this flaw to perform a symbolic link attack, giving them write
access to any file, allowing them to escalate their privileges to root.
(CVE-2013-4169)

Note that this erratum includes an updated initscripts package. To fix
CVE-2013-4169, the vulnerable code was removed from GDM and the initscripts
package was modified to create the affected directory safely during the
system boot process. Therefore, this update will appear on all systems,
however systems without GDM installed are not affected by this flaw.

Red Hat would like to thank the researcher with the nickname vladz for
reporting this issue.

All users should upgrade to these updated packages, which correct this
issue. The system must be rebooted for this update to take effect.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
gdm-2.16.0-59.el5_9.1.src.rpm     MD5: e568975b6b58fa8949d6d6e2a4353b9e
SHA-256: 16214cf0d38114ac6b918af6c35a11a1cfbf84b6b2a91ed95dad76bbcc2af410
initscripts-8.45.42-2.el5_9.1.src.rpm
File outdated by:  RHBA-2013:1300
    MD5: 9d2bca4f968ead6681a8b4dc83479254
SHA-256: 26d39d594144fcc53ae2236e9f31d0d0863c0758e43bbd68864c7ccce193e5df
 
IA-32:
gdm-2.16.0-59.el5_9.1.i386.rpm     MD5: 685a46201d5d5a7d66bd1052ddb8244e
SHA-256: 243e1888c72671f9b029ff6d69c6d6ed5e27429101591e42717eb8ca26cfd52b
gdm-debuginfo-2.16.0-59.el5_9.1.i386.rpm     MD5: 5df12e15b7c86c80acf61214b6f205ca
SHA-256: 5dc8fd6215c90619fb01dd4be35a768cbd72252ef14da68746aafd4a69cc9ae6
gdm-docs-2.16.0-59.el5_9.1.i386.rpm     MD5: e300b70b1125ce3b2360bfb4d3cc0719
SHA-256: 0de4eaa27cef3c4d11bbecfc45bcd3b5075d0c3bc2933fc3fa7a6a579f6f5e18
initscripts-8.45.42-2.el5_9.1.i386.rpm
File outdated by:  RHBA-2013:1300
    MD5: 97d705ffc98e6693c6382b5465973a51
SHA-256: fc73a5dd32ec70141af47d888a5832821f116e07774bd0c57e91fbe184a031b9
initscripts-debuginfo-8.45.42-2.el5_9.1.i386.rpm
File outdated by:  RHBA-2013:1300
    MD5: 48de97ae38d8775ef067c88a9e06a776
SHA-256: 852eb7977b1bcb06d6091bcb739ffbeb43b4cac149da7ae0276c557dcb2f7f44
 
IA-64:
gdm-2.16.0-59.el5_9.1.ia64.rpm     MD5: f184d79870cce20b44c58ca83e6c0b0f
SHA-256: ee93d353564f0c46ce82ce3175d88fb7f870b0ba14645816d8f41d7646cd7d05
gdm-debuginfo-2.16.0-59.el5_9.1.ia64.rpm     MD5: 03c839075baaa1860ccd16494d6a59cd
SHA-256: 24271c092c8fced8a64820caeeead8fa44fb79cf3c8c56259006741678c0ae77
gdm-docs-2.16.0-59.el5_9.1.ia64.rpm     MD5: d6e74c7a57efd8d1762c159342a82ab6
SHA-256: 4450e25fb5eeaeccdb3072c54d2ad5f64a86f4a181531f5c5b7d3a1e7827a579
initscripts-8.45.42-2.el5_9.1.ia64.rpm
File outdated by:  RHBA-2013:1300
    MD5: dc6fb2088eb8b04a84b2eff055a5d5f3
SHA-256: 253a115b8f9cb3e18614f1bbbfa08a462f571f5f9e9157a242bb3c6413397dfc
initscripts-debuginfo-8.45.42-2.el5_9.1.ia64.rpm
File outdated by:  RHBA-2013:1300
    MD5: ac17b619f7f6e84d50563e6e7459260a
SHA-256: 955c65b4a44d8d595b42bb142ba0af04632ab76a42dd5a2aba303eb055b77638
 
PPC:
gdm-2.16.0-59.el5_9.1.ppc.rpm     MD5: 883c37d067d7c2a7ad41d949a928dffa
SHA-256: 5a38ef8141f6d7d7c957b2e187030423a6b41fef36b44087791396aa8f642b08
gdm-debuginfo-2.16.0-59.el5_9.1.ppc.rpm     MD5: 20f8f2f33aef96c3fe196a5c0aa1df4d
SHA-256: eda6588b04e4f7bb4792a759307eae11862e3ba31c1d33d1c25a39146406a552
gdm-docs-2.16.0-59.el5_9.1.ppc.rpm     MD5: c0e948494c1870a09301aae7db96e663
SHA-256: e88213a23296ad82bc5647c9a625ed17ca3f57929552d66976b5d8fd23700a1b
initscripts-8.45.42-2.el5_9.1.ppc.rpm
File outdated by:  RHBA-2013:1300
    MD5: 18d51f9135edba5a1096c71e47b61320
SHA-256: d4c7c1c2786f25fce18b062daefc7e52d608f2b5f497620d272b56fbacf0afdd
initscripts-debuginfo-8.45.42-2.el5_9.1.ppc.rpm
File outdated by:  RHBA-2013:1300
    MD5: 5cd691271a412965039f3efdfb0d27ef
SHA-256: f43d43fcf939f3ab5c1dbeb402b846b4326c7f92ccb9277deafbebae95fea771
 
s390x:
gdm-2.16.0-59.el5_9.1.s390x.rpm     MD5: 1320ba3b0ecb31e173cbd19fc00a8d77
SHA-256: 689447856c50b1d78b0da4e1404d30531e87fc46dd97bc4a8b7279290d69c82f
gdm-debuginfo-2.16.0-59.el5_9.1.s390x.rpm     MD5: 1aed7c11683ec563fe7fc04d7d5133f8
SHA-256: 1493d3dfa2094e656c2f345bde2eec9ccb01370b0f2f9901bd6c83d4e4322515
gdm-docs-2.16.0-59.el5_9.1.s390x.rpm     MD5: 6f88041bee47d98dc641075bf0830d78
SHA-256: 003708842f13fd3437ad76a6acfb66741cfcf7737120e7290b9b0ee94059eb99
initscripts-8.45.42-2.el5_9.1.s390x.rpm
File outdated by:  RHBA-2013:1300
    MD5: 40700cfc48d807013021b58d94c4d228
SHA-256: 5377ae312640625cc35bc2bda9ae34e06954b2bc9aa327e55bbc4728a2970cf2
initscripts-debuginfo-8.45.42-2.el5_9.1.s390x.rpm
File outdated by:  RHBA-2013:1300
    MD5: e575442a09e48e869ebe787b1eb9ee82
SHA-256: 476520fb55400893b277f7182cae3b13b48be501a1229783017fe6d9587c547e
 
x86_64:
gdm-2.16.0-59.el5_9.1.x86_64.rpm     MD5: f6c7f60949af559f54708366615ca5e4
SHA-256: c492595ec3013b762ae842e5bdfac13b6e680c1e20aedc2f6ca8dcd430ca653b
gdm-debuginfo-2.16.0-59.el5_9.1.x86_64.rpm     MD5: 957cb20f79b9ddc651aded3467b2e3af
SHA-256: c281eb274a6b797d0890658596033db9019f06586ef27a4ab5a2b7cdad3eb134
gdm-docs-2.16.0-59.el5_9.1.x86_64.rpm     MD5: 001efb191af959b61c6f99c1708fdaf6
SHA-256: 9ca907616b840fe9d5e60e63aa247247563ff6059d28a7c6f423404b69d815b9
initscripts-8.45.42-2.el5_9.1.x86_64.rpm
File outdated by:  RHBA-2013:1300
    MD5: a07cb68a5ee92d43432c6eb3a6f579ea
SHA-256: dd78156e95b2bb48ffb23af13847bc7a3a69599ff54154d354a1268c890b7f6e
initscripts-debuginfo-8.45.42-2.el5_9.1.x86_64.rpm
File outdated by:  RHBA-2013:1300
    MD5: 4c8b61ed839f838b796b42468f1c5d59
SHA-256: 5c6df362675e783895633a67b1bbb9dff92341638f39e800bb7b23dfb6729def
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
gdm-2.16.0-59.el5_9.1.src.rpm     MD5: e568975b6b58fa8949d6d6e2a4353b9e
SHA-256: 16214cf0d38114ac6b918af6c35a11a1cfbf84b6b2a91ed95dad76bbcc2af410
initscripts-8.45.42-2.el5_9.1.src.rpm
File outdated by:  RHBA-2013:1300
    MD5: 9d2bca4f968ead6681a8b4dc83479254
SHA-256: 26d39d594144fcc53ae2236e9f31d0d0863c0758e43bbd68864c7ccce193e5df
 
IA-32:
gdm-2.16.0-59.el5_9.1.i386.rpm     MD5: 685a46201d5d5a7d66bd1052ddb8244e
SHA-256: 243e1888c72671f9b029ff6d69c6d6ed5e27429101591e42717eb8ca26cfd52b
gdm-debuginfo-2.16.0-59.el5_9.1.i386.rpm     MD5: 5df12e15b7c86c80acf61214b6f205ca
SHA-256: 5dc8fd6215c90619fb01dd4be35a768cbd72252ef14da68746aafd4a69cc9ae6
gdm-docs-2.16.0-59.el5_9.1.i386.rpm     MD5: e300b70b1125ce3b2360bfb4d3cc0719
SHA-256: 0de4eaa27cef3c4d11bbecfc45bcd3b5075d0c3bc2933fc3fa7a6a579f6f5e18
initscripts-8.45.42-2.el5_9.1.i386.rpm
File outdated by:  RHBA-2013:1300
    MD5: 97d705ffc98e6693c6382b5465973a51
SHA-256: fc73a5dd32ec70141af47d888a5832821f116e07774bd0c57e91fbe184a031b9
initscripts-debuginfo-8.45.42-2.el5_9.1.i386.rpm
File outdated by:  RHBA-2013:1300
    MD5: 48de97ae38d8775ef067c88a9e06a776
SHA-256: 852eb7977b1bcb06d6091bcb739ffbeb43b4cac149da7ae0276c557dcb2f7f44
 
x86_64:
gdm-2.16.0-59.el5_9.1.x86_64.rpm     MD5: f6c7f60949af559f54708366615ca5e4
SHA-256: c492595ec3013b762ae842e5bdfac13b6e680c1e20aedc2f6ca8dcd430ca653b
gdm-debuginfo-2.16.0-59.el5_9.1.x86_64.rpm     MD5: 957cb20f79b9ddc651aded3467b2e3af
SHA-256: c281eb274a6b797d0890658596033db9019f06586ef27a4ab5a2b7cdad3eb134
gdm-docs-2.16.0-59.el5_9.1.x86_64.rpm     MD5: 001efb191af959b61c6f99c1708fdaf6
SHA-256: 9ca907616b840fe9d5e60e63aa247247563ff6059d28a7c6f423404b69d815b9
initscripts-8.45.42-2.el5_9.1.x86_64.rpm
File outdated by:  RHBA-2013:1300
    MD5: a07cb68a5ee92d43432c6eb3a6f579ea
SHA-256: dd78156e95b2bb48ffb23af13847bc7a3a69599ff54154d354a1268c890b7f6e
initscripts-debuginfo-8.45.42-2.el5_9.1.x86_64.rpm
File outdated by:  RHBA-2013:1300
    MD5: 4c8b61ed839f838b796b42468f1c5d59
SHA-256: 5c6df362675e783895633a67b1bbb9dff92341638f39e800bb7b23dfb6729def
 
Red Hat Enterprise Linux EUS (v. 5.9.z server)

SRPMS:
gdm-2.16.0-59.el5_9.1.src.rpm     MD5: e568975b6b58fa8949d6d6e2a4353b9e
SHA-256: 16214cf0d38114ac6b918af6c35a11a1cfbf84b6b2a91ed95dad76bbcc2af410
initscripts-8.45.42-2.el5_9.1.src.rpm
File outdated by:  RHBA-2013:1300
    MD5: 9d2bca4f968ead6681a8b4dc83479254
SHA-256: 26d39d594144fcc53ae2236e9f31d0d0863c0758e43bbd68864c7ccce193e5df
 
IA-32:
gdm-2.16.0-59.el5_9.1.i386.rpm     MD5: 685a46201d5d5a7d66bd1052ddb8244e
SHA-256: 243e1888c72671f9b029ff6d69c6d6ed5e27429101591e42717eb8ca26cfd52b
gdm-debuginfo-2.16.0-59.el5_9.1.i386.rpm     MD5: 5df12e15b7c86c80acf61214b6f205ca
SHA-256: 5dc8fd6215c90619fb01dd4be35a768cbd72252ef14da68746aafd4a69cc9ae6
gdm-docs-2.16.0-59.el5_9.1.i386.rpm     MD5: e300b70b1125ce3b2360bfb4d3cc0719
SHA-256: 0de4eaa27cef3c4d11bbecfc45bcd3b5075d0c3bc2933fc3fa7a6a579f6f5e18
initscripts-8.45.42-2.el5_9.1.i386.rpm     MD5: 97d705ffc98e6693c6382b5465973a51
SHA-256: fc73a5dd32ec70141af47d888a5832821f116e07774bd0c57e91fbe184a031b9
initscripts-debuginfo-8.45.42-2.el5_9.1.i386.rpm     MD5: 48de97ae38d8775ef067c88a9e06a776
SHA-256: 852eb7977b1bcb06d6091bcb739ffbeb43b4cac149da7ae0276c557dcb2f7f44
 
IA-64:
gdm-2.16.0-59.el5_9.1.ia64.rpm     MD5: f184d79870cce20b44c58ca83e6c0b0f
SHA-256: ee93d353564f0c46ce82ce3175d88fb7f870b0ba14645816d8f41d7646cd7d05
gdm-debuginfo-2.16.0-59.el5_9.1.ia64.rpm     MD5: 03c839075baaa1860ccd16494d6a59cd
SHA-256: 24271c092c8fced8a64820caeeead8fa44fb79cf3c8c56259006741678c0ae77
gdm-docs-2.16.0-59.el5_9.1.ia64.rpm     MD5: d6e74c7a57efd8d1762c159342a82ab6
SHA-256: 4450e25fb5eeaeccdb3072c54d2ad5f64a86f4a181531f5c5b7d3a1e7827a579
initscripts-8.45.42-2.el5_9.1.ia64.rpm     MD5: dc6fb2088eb8b04a84b2eff055a5d5f3
SHA-256: 253a115b8f9cb3e18614f1bbbfa08a462f571f5f9e9157a242bb3c6413397dfc
initscripts-debuginfo-8.45.42-2.el5_9.1.ia64.rpm     MD5: ac17b619f7f6e84d50563e6e7459260a
SHA-256: 955c65b4a44d8d595b42bb142ba0af04632ab76a42dd5a2aba303eb055b77638
 
PPC:
gdm-2.16.0-59.el5_9.1.ppc.rpm     MD5: 883c37d067d7c2a7ad41d949a928dffa
SHA-256: 5a38ef8141f6d7d7c957b2e187030423a6b41fef36b44087791396aa8f642b08
gdm-debuginfo-2.16.0-59.el5_9.1.ppc.rpm     MD5: 20f8f2f33aef96c3fe196a5c0aa1df4d
SHA-256: eda6588b04e4f7bb4792a759307eae11862e3ba31c1d33d1c25a39146406a552
gdm-docs-2.16.0-59.el5_9.1.ppc.rpm     MD5: c0e948494c1870a09301aae7db96e663
SHA-256: e88213a23296ad82bc5647c9a625ed17ca3f57929552d66976b5d8fd23700a1b
initscripts-8.45.42-2.el5_9.1.ppc.rpm     MD5: 18d51f9135edba5a1096c71e47b61320
SHA-256: d4c7c1c2786f25fce18b062daefc7e52d608f2b5f497620d272b56fbacf0afdd
initscripts-debuginfo-8.45.42-2.el5_9.1.ppc.rpm     MD5: 5cd691271a412965039f3efdfb0d27ef
SHA-256: f43d43fcf939f3ab5c1dbeb402b846b4326c7f92ccb9277deafbebae95fea771
 
s390x:
gdm-2.16.0-59.el5_9.1.s390x.rpm     MD5: 1320ba3b0ecb31e173cbd19fc00a8d77
SHA-256: 689447856c50b1d78b0da4e1404d30531e87fc46dd97bc4a8b7279290d69c82f
gdm-debuginfo-2.16.0-59.el5_9.1.s390x.rpm     MD5: 1aed7c11683ec563fe7fc04d7d5133f8
SHA-256: 1493d3dfa2094e656c2f345bde2eec9ccb01370b0f2f9901bd6c83d4e4322515
gdm-docs-2.16.0-59.el5_9.1.s390x.rpm     MD5: 6f88041bee47d98dc641075bf0830d78
SHA-256: 003708842f13fd3437ad76a6acfb66741cfcf7737120e7290b9b0ee94059eb99
initscripts-8.45.42-2.el5_9.1.s390x.rpm     MD5: 40700cfc48d807013021b58d94c4d228
SHA-256: 5377ae312640625cc35bc2bda9ae34e06954b2bc9aa327e55bbc4728a2970cf2
initscripts-debuginfo-8.45.42-2.el5_9.1.s390x.rpm     MD5: e575442a09e48e869ebe787b1eb9ee82
SHA-256: 476520fb55400893b277f7182cae3b13b48be501a1229783017fe6d9587c547e
 
x86_64:
gdm-2.16.0-59.el5_9.1.x86_64.rpm     MD5: f6c7f60949af559f54708366615ca5e4
SHA-256: c492595ec3013b762ae842e5bdfac13b6e680c1e20aedc2f6ca8dcd430ca653b
gdm-debuginfo-2.16.0-59.el5_9.1.x86_64.rpm     MD5: 957cb20f79b9ddc651aded3467b2e3af
SHA-256: c281eb274a6b797d0890658596033db9019f06586ef27a4ab5a2b7cdad3eb134
gdm-docs-2.16.0-59.el5_9.1.x86_64.rpm     MD5: 001efb191af959b61c6f99c1708fdaf6
SHA-256: 9ca907616b840fe9d5e60e63aa247247563ff6059d28a7c6f423404b69d815b9
initscripts-8.45.42-2.el5_9.1.x86_64.rpm     MD5: a07cb68a5ee92d43432c6eb3a6f579ea
SHA-256: dd78156e95b2bb48ffb23af13847bc7a3a69599ff54154d354a1268c890b7f6e
initscripts-debuginfo-8.45.42-2.el5_9.1.x86_64.rpm     MD5: 4c8b61ed839f838b796b42468f1c5d59
SHA-256: 5c6df362675e783895633a67b1bbb9dff92341638f39e800bb7b23dfb6729def
 
Red Hat Enterprise Linux Long Life (v. 5.9 server)

SRPMS:
gdm-2.16.0-59.el5_9.1.src.rpm     MD5: e568975b6b58fa8949d6d6e2a4353b9e
SHA-256: 16214cf0d38114ac6b918af6c35a11a1cfbf84b6b2a91ed95dad76bbcc2af410
initscripts-8.45.42-2.el5_9.1.src.rpm
File outdated by:  RHBA-2013:1300
    MD5: 9d2bca4f968ead6681a8b4dc83479254
SHA-256: 26d39d594144fcc53ae2236e9f31d0d0863c0758e43bbd68864c7ccce193e5df
 
IA-32:
gdm-2.16.0-59.el5_9.1.i386.rpm     MD5: 685a46201d5d5a7d66bd1052ddb8244e
SHA-256: 243e1888c72671f9b029ff6d69c6d6ed5e27429101591e42717eb8ca26cfd52b
gdm-debuginfo-2.16.0-59.el5_9.1.i386.rpm     MD5: 5df12e15b7c86c80acf61214b6f205ca
SHA-256: 5dc8fd6215c90619fb01dd4be35a768cbd72252ef14da68746aafd4a69cc9ae6
gdm-docs-2.16.0-59.el5_9.1.i386.rpm     MD5: e300b70b1125ce3b2360bfb4d3cc0719
SHA-256: 0de4eaa27cef3c4d11bbecfc45bcd3b5075d0c3bc2933fc3fa7a6a579f6f5e18
initscripts-8.45.42-2.el5_9.1.i386.rpm     MD5: 97d705ffc98e6693c6382b5465973a51
SHA-256: fc73a5dd32ec70141af47d888a5832821f116e07774bd0c57e91fbe184a031b9
initscripts-debuginfo-8.45.42-2.el5_9.1.i386.rpm     MD5: 48de97ae38d8775ef067c88a9e06a776
SHA-256: 852eb7977b1bcb06d6091bcb739ffbeb43b4cac149da7ae0276c557dcb2f7f44
 
IA-64:
gdm-2.16.0-59.el5_9.1.ia64.rpm     MD5: f184d79870cce20b44c58ca83e6c0b0f
SHA-256: ee93d353564f0c46ce82ce3175d88fb7f870b0ba14645816d8f41d7646cd7d05
gdm-debuginfo-2.16.0-59.el5_9.1.ia64.rpm     MD5: 03c839075baaa1860ccd16494d6a59cd
SHA-256: 24271c092c8fced8a64820caeeead8fa44fb79cf3c8c56259006741678c0ae77
gdm-docs-2.16.0-59.el5_9.1.ia64.rpm     MD5: d6e74c7a57efd8d1762c159342a82ab6
SHA-256: 4450e25fb5eeaeccdb3072c54d2ad5f64a86f4a181531f5c5b7d3a1e7827a579
initscripts-8.45.42-2.el5_9.1.ia64.rpm     MD5: dc6fb2088eb8b04a84b2eff055a5d5f3
SHA-256: 253a115b8f9cb3e18614f1bbbfa08a462f571f5f9e9157a242bb3c6413397dfc
initscripts-debuginfo-8.45.42-2.el5_9.1.ia64.rpm     MD5: ac17b619f7f6e84d50563e6e7459260a
SHA-256: 955c65b4a44d8d595b42bb142ba0af04632ab76a42dd5a2aba303eb055b77638
 
x86_64:
gdm-2.16.0-59.el5_9.1.x86_64.rpm     MD5: f6c7f60949af559f54708366615ca5e4
SHA-256: c492595ec3013b762ae842e5bdfac13b6e680c1e20aedc2f6ca8dcd430ca653b
gdm-debuginfo-2.16.0-59.el5_9.1.x86_64.rpm     MD5: 957cb20f79b9ddc651aded3467b2e3af
SHA-256: c281eb274a6b797d0890658596033db9019f06586ef27a4ab5a2b7cdad3eb134
gdm-docs-2.16.0-59.el5_9.1.x86_64.rpm     MD5: 001efb191af959b61c6f99c1708fdaf6
SHA-256: 9ca907616b840fe9d5e60e63aa247247563ff6059d28a7c6f423404b69d815b9
initscripts-8.45.42-2.el5_9.1.x86_64.rpm     MD5: a07cb68a5ee92d43432c6eb3a6f579ea
SHA-256: dd78156e95b2bb48ffb23af13847bc7a3a69599ff54154d354a1268c890b7f6e
initscripts-debuginfo-8.45.42-2.el5_9.1.x86_64.rpm     MD5: 4c8b61ed839f838b796b42468f1c5d59
SHA-256: 5c6df362675e783895633a67b1bbb9dff92341638f39e800bb7b23dfb6729def
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

988498 - CVE-2013-4169 gdm: TOCTTOU race condition on /tmp/.X11-unix


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/