The kernel-invoked coredump processor in Automatic Bug Reporting Tool (ABRT) does not properly check the ownership of files before writing core dumps to them, which allows local users to obtain sensitive information by leveraging write permissions to the working directory of a crashed application.
References
Link | Resource |
---|---|
http://rhn.redhat.com/errata/RHSA-2015-1083.html | Vendor Advisory |
http://rhn.redhat.com/errata/RHSA-2015-1210.html | |
http://www.openwall.com/lists/oss-security/2015/04/17/5 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/75116 | Third Party Advisory VDB Entry |
https://bugzilla.redhat.com/show_bug.cgi?id=1212818 | Issue Tracking Vendor Advisory |
Configurations
History
13 Feb 2023, 00:47
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | The kernel-invoked coredump processor in Automatic Bug Reporting Tool (ABRT) does not properly check the ownership of files before writing core dumps to them, which allows local users to obtain sensitive information by leveraging write permissions to the working directory of a crashed application. |
02 Feb 2023, 20:20
Type | Values Removed | Values Added |
---|---|---|
Summary | It was discovered that the kernel-invoked coredump processor provided by ABRT wrote core dumps to files owned by other system users. This could result in information disclosure if an application crashed while its current directory was a directory writable to by other users (such as /tmp). | |
References |
|
Information
Published : 2017-06-26 15:29
Updated : 2023-12-10 12:15
NVD link : CVE-2015-3142
Mitre link : CVE-2015-3142
CVE.ORG link : CVE-2015-3142
JSON object : View
Products Affected
redhat
- automatic_bug_reporting_tool
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor