|Category:||Red Hat Local Security Checks|
|Title:||RedHat Update for abrt and libreport RHSA-2013:0215-01|
|Summary:||The remote host is missing an update for the 'abrt and libreport'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'abrt and libreport'
package(s) announced via the referenced advisory.
ABRT (Automatic Bug Reporting Tool) is a tool to help users to detect
defects in applications and to create a bug report with all the information
needed by a maintainer to fix it. It uses a plug-in system to extend its
functionality. libreport provides an API for reporting different problems
in applications to different bug targets, such as Bugzilla, FTP, and Trac.
It was found that the
/usr/libexec/abrt-action-install-debuginfo-to-abrt-cache tool did not
sufficiently sanitize its environment variables. This could lead to Python
modules being loaded and run from non-standard directories (such as /tmp/).
A local attacker could use this flaw to escalate their privileges to that
of the abrt user. (CVE-2012-5659)
A race condition was found in the way ABRT handled the directories used to
store information about crashes. A local attacker with the privileges of
the abrt user could use this flaw to perform a symbolic link attack,
possibly allowing them to escalate their privileges to root.
Red Hat would like to thank Martin Carpenter of Citco for reporting the
CVE-2012-5660 issue. CVE-2012-5659 was discovered by Miloslav Trma of Red
All users of abrt and libreport are advised to upgrade to these updated
packages, which correct these issues.
abrt and libreport on Red Hat Enterprise Linux Desktop (v. 6),
Red Hat Enterprise Linux Server (v. 6),
Red Hat Enterprise Linux Workstation (v. 6)
Please Install the Updated Packages.
Common Vulnerability Exposure (CVE) ID: CVE-2012-5659|
RedHat Security Advisories: RHSA-2013:0215
Common Vulnerability Exposure (CVE) ID: CVE-2012-5660
|Copyright||Copyright (c) 2013 Greenbone Networks GmbH|
|This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.