[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247621

 
 

909

 
 

194512

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

RHSA-2013:0215-01 -- Redhat abrt and libreport

ID: oval:org.secpod.oval:def:500960Date: (C)2013-02-06   (M)2023-07-28
Class: PATCHFamily: unix




ABRT is a tool to help users to detect defects in applications and to create a bug report with all the information needed by a maintainer to fix it. It uses a plug-in system to extend its functionality. libreport provides an API for reporting different problems in applications to different bug targets, such as Bugzilla, FTP, and Trac. It was found that the /usr/libexec/abrt-action-install-debuginfo-to-abrt-cache tool did not sufficiently sanitize its environment variables. This could lead to Python modules being loaded and run from non-standard directories . A local attacker could use this flaw to escalate their privileges to that of the abrt user. A race condition was found in the way ABRT handled the directories used to store information about crashes. A local attacker with the privileges of the abrt user could use this flaw to perform a symbolic link attack, possibly allowing them to escalate their privileges to root. Red Hat would like to thank Martin Carpenter of Citco for reporting the CVE-2012-5660 issue. CVE-2012-5659 was discovered by Miloslav Trma of Red Hat. All users of abrt and libreport are advised to upgrade to these updated packages, which correct these issues.

Platform:
Red Hat Enterprise Linux 6
Product:
abrt
libreport
Reference:
RHSA-2013:0215-01
CVE-2012-5659
CVE-2012-5660
CVE    2
CVE-2012-5659
CVE-2012-5660
CPE    15
cpe:/a:redhat:automatic_bug_reporting_tool:2.0.6
cpe:/a:redhat:automatic_bug_reporting_tool:2.0.7
cpe:/a:redhat:automatic_bug_reporting_tool:2.0.8
cpe:/a:redhat:automatic_bug_reporting_tool:2.0.9
...

© SecPod Technologies