LWN.net Logo

Mageia alert MGASA-2013-0047 (abrt)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2013-0047: abrt-2.0.7-3.2.mga2, libreport-2.0.8-5.1.mga2 (2/core)
Date:  Sat, 9 Feb 2013 14:12:18 +0100
Message-ID:  <20130209131218.GA5131@valstar.mageia.org>
Archive-link:  Article, Thread

MGASA-2013-0047 Date: February 9th, 2013 Affected releases: 2 Media: Core Description: Updated abrt and libreport packages fix security vulnerabilities: It was found that the /usr/libexec/abrt-action-install-debuginfo-to-abrt-cache tool did not sufficiently sanitize its environment variables. This could lead to Python modules being loaded and run from non-standard directories (such as /tmp/). A local attacker could use this flaw to escalate their privileges to that of the abrt user (CVE-2012-5659). A race condition was found in the way ABRT handled the directories used to store information about crashes. A local attacker with the privileges of the abrt user could use this flaw to perform a symbolic link attack, possibly allowing them to escalate their privileges to root (CVE-2012-5660). Updated Packages: i586: abrt-2.0.7-3.2.mga2.i586.rpm abrt-addon-ccpp-2.0.7-3.2.mga2.i586.rpm abrt-addon-kerneloops-2.0.7-3.2.mga2.i586.rpm abrt-addon-python-2.0.7-3.2.mga2.i586.rpm abrt-addon-vmcore-2.0.7-3.2.mga2.i586.rpm abrt-cli-2.0.7-3.2.mga2.i586.rpm abrt-desktop-2.0.7-3.2.mga2.i586.rpm abrt-gui-2.0.7-3.2.mga2.i586.rpm libabrt0-2.0.7-3.2.mga2.i586.rpm libabrt-devel-2.0.7-3.2.mga2.i586.rpm abrt-debug-2.0.7-3.2.mga2.i586.rpm libreport0-2.0.8-5.1.mga2.i586.rpm libreport-2.0.8-5.1.mga2.i586.rpm libreport-abrt_dbus0-2.0.8-5.1.mga2.i586.rpm libreport-abrt_web0-2.0.8-5.1.mga2.i586.rpm libreport-cli-2.0.8-5.1.mga2.i586.rpm libreport-compat-2.0.8-5.1.mga2.i586.rpm libreport-devel-2.0.8-5.1.mga2.i586.rpm libreport-filesystem-2.0.8-5.1.mga2.i586.rpm libreport-gtk0-2.0.8-5.1.mga2.i586.rpm libreport-gtk-2.0.8-5.1.mga2.i586.rpm libreport-gtk-devel-2.0.8-5.1.mga2.i586.rpm libreport-newt-2.0.8-5.1.mga2.i586.rpm libreport-plugin-bodhi-2.0.8-5.1.mga2.i586.rpm libreport-plugin-bugzilla-2.0.8-5.1.mga2.i586.rpm libreport-plugin-kerneloops-2.0.8-5.1.mga2.i586.rpm libreport-plugin-logger-2.0.8-5.1.mga2.i586.rpm libreport-plugin-mailx-2.0.8-5.1.mga2.i586.rpm libreport-plugin-reportuploader-2.0.8-5.1.mga2.i586.rpm libreport-python-2.0.8-5.1.mga2.i586.rpm libreport-debug-2.0.8-5.1.mga2.i586.rpm x86_64: abrt-2.0.7-3.2.mga2.x86_64.rpm abrt-addon-ccpp-2.0.7-3.2.mga2.x86_64.rpm abrt-addon-kerneloops-2.0.7-3.2.mga2.x86_64.rpm abrt-addon-python-2.0.7-3.2.mga2.x86_64.rpm abrt-addon-vmcore-2.0.7-3.2.mga2.x86_64.rpm abrt-cli-2.0.7-3.2.mga2.x86_64.rpm abrt-desktop-2.0.7-3.2.mga2.x86_64.rpm abrt-gui-2.0.7-3.2.mga2.x86_64.rpm lib64abrt0-2.0.7-3.2.mga2.x86_64.rpm lib64abrt-devel-2.0.7-3.2.mga2.x86_64.rpm abrt-debug-2.0.7-3.2.mga2.x86_64.rpm lib64report0-2.0.8-5.1.mga2.x86_64.rpm lib64report-abrt_dbus0-2.0.8-5.1.mga2.x86_64.rpm lib64report-abrt_web0-2.0.8-5.1.mga2.x86_64.rpm lib64report-devel-2.0.8-5.1.mga2.x86_64.rpm lib64report-gtk0-2.0.8-5.1.mga2.x86_64.rpm lib64report-gtk-devel-2.0.8-5.1.mga2.x86_64.rpm libreport-2.0.8-5.1.mga2.x86_64.rpm libreport-cli-2.0.8-5.1.mga2.x86_64.rpm libreport-compat-2.0.8-5.1.mga2.x86_64.rpm libreport-filesystem-2.0.8-5.1.mga2.x86_64.rpm libreport-gtk-2.0.8-5.1.mga2.x86_64.rpm libreport-newt-2.0.8-5.1.mga2.x86_64.rpm libreport-plugin-bodhi-2.0.8-5.1.mga2.x86_64.rpm libreport-plugin-bugzilla-2.0.8-5.1.mga2.x86_64.rpm libreport-plugin-kerneloops-2.0.8-5.1.mga2.x86_64.rpm libreport-plugin-logger-2.0.8-5.1.mga2.x86_64.rpm libreport-plugin-mailx-2.0.8-5.1.mga2.x86_64.rpm libreport-plugin-reportuploader-2.0.8-5.1.mga2.x86_64.rpm libreport-python-2.0.8-5.1.mga2.x86_64.rpm libreport-debug-2.0.8-5.1.mga2.x86_64.rpm SRPMS: abrt-2.0.7-3.2.mga2.src.rpm libreport-2.0.8-5.1.mga2.src.rpm References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5659 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5660 https://rhn.redhat.com/errata/RHSA-2013-0215.html https://bugs.mageia.org/show_bug.cgi?id=8937 https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-...


(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds