A vulnerability has been discovered in GNOME Display Manager, which can be exploited by malicious, local users to cause a DoS (Denial of Service). The vulnerability is caused due to the GDM daemon improperly handling NULL values returned by the "g_strsplit" function. This can be exploited to crash the GNOME Display Manager by sending specially crafted requests to the local GDM socket. The vulnerability is confirmed in version 2.16.0-10-fc6 on Fedora 6 and also reported in versions prior to 2.14.13, 2.16.7, 2.18.4 and 2.19.5. Solution: Update to version 2.14.13, 2.16.7, or 2.18.4.
setting status and cc'ing. gnome, please advise and bump as necessary.
2.16, 2.18 and 2.19 bumped. I think the procedure is to fasttrack stabilisation of 2.16.7. 2.18 is going stable soon, I'll add a comment on the relevant bug number to inform arches. This is also why 2.14 is not taken care of. leio informed me 2.14 should be out of the tree by the end of the week (correct me if I'm wrong).
Thanks for the info Gilles. arches, please test and mark stable gnome-base/gdm-2.16.7. target keywords are: "alpha amd64 arm hppa ia64 mips ppc ppc64 sh sparc x86 ~x86-fbsd
Is this stabilisation needed? Gnome team requested stabilisation of 2.18.4 in bug 185823.
(In reply to comment #4) > Is this stabilisation needed? Gnome team requested stabilisation of 2.18.4 in > bug 185823. We would appreciate a non-vulnerable 2.16 version as well, so that we can clean up all the vulnerable versions. That's because we, the Gnome team, keep two versions of Gnome release cycle around in stable, hence 2.16 isn't going away before 2.20 is going stable.
(In reply to comment #5) > (In reply to comment #4) > > Is this stabilisation needed? Gnome team requested stabilisation of 2.18.4 in > > bug 185823. > We would appreciate a non-vulnerable 2.16 version as well, so that we can clean > up all the vulnerable versions. That's because we, the Gnome team, keep two > versions of Gnome release cycle around in stable, hence 2.16 isn't going away > before 2.20 is going stable. As you wish...x86 stable
sparc stable.
ppc64 stable
ppc stable
alpha/ia64 stable
amd64 stable
Stable for HPPA.
GLSA 200709-11, thanks everybody