|Category:||Red Hat Local Security Checks|
|Title:||RedHat Update for abrt, libreport, btparser, and python-meh RHSA-2012:0841-04|
|Summary:||The remote host is missing an update for the 'abrt, libreport, btparser, and python-meh'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'abrt, libreport, btparser, and python-meh'
package(s) announced via the referenced advisory.
ABRT (Automatic Bug Reporting Tool) is a tool to help users to detect
defects in applications and to create a bug report with all the information
needed by a maintainer to fix it. It uses a plug-in system to extend its
functionality. libreport provides an API for reporting different problems
in applications to different bug targets, such as Bugzilla, FTP, and Trac.
The btparser utility is a backtrace parser and analyzer library, which
works with backtraces produced by the GNU Project Debugger. It can parse a
text file with a backtrace to a tree of C structures, allowing to analyze
the threads and frames of the backtrace and process them.
The python-meh package provides a python library for handling exceptions.
If the C handler plug-in in ABRT was enabled (the abrt-addon-ccpp package
installed and the abrt-ccpp service running), and the sysctl
fs.suid_dumpable option was set to '2' (it is '0' by default), core dumps
of set user ID (setuid) programs were created with insecure group ID
permissions. This could allow local, unprivileged users to obtain sensitive
information from the core dump files of setuid processes they would
otherwise not be able to access. (CVE-2012-1106)
ABRT did not allow users to easily search the collected crash information
for sensitive data prior to submitting it. This could lead to users
unintentionally exposing sensitive information via the submitted crash
reports. This update adds functionality to search across all the collected
data. Note that this fix does not apply to the default configuration, where
reports are sent to Red Hat Customer Support. It only takes effect for
users sending information to Red Hat Bugzilla. (CVE-2011-4088)
Red Hat would like to thank Jan Iven for reporting CVE-2011-4088.
These updated packages include numerous bug fixes. Space precludes
documenting all of these changes in this advisory. Users are directed to
the Red Hat Enterprise Linux 6.3 Technical Notes for information on the
most significant of these changes.
All users of abrt, libreport, btparser, and python-meh are advised to
upgrade to these updated packages, which correct these issues.
abrt, libreport, btparser, and python-meh on Red Hat Enterprise Linux Desktop (v. 6),
Red Hat Enterprise Linux Server (v. 6),
Red Hat Enterprise Linux Workstation (v. 6)
Please Install the Updated Packages.
Common Vulnerability Exposure (CVE) ID: CVE-2011-4088|
Common Vulnerability Exposure (CVE) ID: CVE-2012-1106
BugTraq ID: 54121
RedHat Security Advisories: RHSA-2012:0841
XForce ISS Database: abrt-info-disc(76524)
|Copyright||Copyright (C) 2012 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.