Lucene search

K
mageiaGentoo FoundationMGASA-2014-0504
HistoryDec 03, 2014 - 10:27 p.m.

Updated sddm packages fix security vulnerabilities

2014-12-0322:27:32
Gentoo Foundation
advisories.mageia.org
5

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

5.1%

Sddm may in some cases allow unauthenticated logins as the sddm user (CVE-2014-7271). Sddm is vulnerable to a race condition in XAUTHORITY file generation (CVE-2014-7272). Sddm has been updated to version 0.10.0, fixing these issues and several other bugs, and adding new functionality. libxcb packages have been updated to work with sddm.

OSVersionArchitecturePackageVersionFilename
Mageia4noarchsddm< 0.10.0-1sddm-0.10.0-1.mga4
Mageia4noarchlibxcb< 1.9.1-2.1libxcb-1.9.1-2.1.mga4

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

5.1%