Fedora 13 : udev-153-5.fc13 (2010-17912)

Medium Nessus Plugin ID 50972


The remote Fedora host is missing a security update.


It was discovered that /dev/systty device file created by dracut-generated initramfs scripts used an insecure file permissions.
This could possibly allow local user to snoop on other user's terminal.

Updated dracut no longer creates this file as device file, rather creates it a symbolic link to tty0 device file. However, for this change to take effect, user needs to re-generate initramfs (any initramfs for all kernels that are going to be booted in the future) using updated dracut version and reboot the system.

On Fedora 13, dracut update addressing this flaw was previously released as bug fix update. This update only provides updated udev packages that replace systty device file with a symlink on udev package upgrade and each udev start. This provides a work-around fix for users that fail to regenerate their initramfs and reboot as described above.

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.


Update the affected udev package.

See Also



Plugin Details

Severity: Medium

ID: 50972

File Name: fedora_2010-17912.nasl

Version: $Revision: 1.10 $

Type: local

Agent: unix

Published: 2010/12/03

Modified: 2016/05/11

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 4

Temporal Score: 3.5

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:N/A:N

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:fedoraproject:fedora:udev, cpe:/o:fedoraproject:fedora:13

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2010/11/19

Reference Information

CVE: CVE-2010-4176

BID: 45046

OSVDB: 69466

FEDORA: 2010-17912