lightdm before 1.0.9 does not properly close file descriptors before opening a child process, which allows local users to write to the lightdm log or have other unspecified impact.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://bugs.launchpad.net/ubuntu/+source/lightdm/+bug/927060 | exploit |
http://lists.opensuse.org/opensuse-updates/2012-03/msg00019.html | vendor advisory |
https://bugzilla.novell.com/show_bug.cgi?id=745339 | exploit |
http://seclists.org/oss-sec/2012/q1/566 | mailing list exploit |
http://seclists.org/oss-sec/2012/q1/557 | mailing list exploit |