|
|
| |
|
| |
abrt and libreport: two privilege escalation flaws
| Package(s): | abrt and libreport |
CVE #(s): | CVE-2012-5659
CVE-2012-5660
|
| Created: | February 1, 2013 |
Updated: | February 10, 2013 |
| Description: |
From the Red Hat advisory:
It was found that the
/usr/libexec/abrt-action-install-debuginfo-to-abrt-cache tool did not
sufficiently sanitize its environment variables. This could lead to Python
modules being loaded and run from non-standard directories (such as /tmp/).
A local attacker could use this flaw to escalate their privileges to that
of the abrt user. (CVE-2012-5659)
A race condition was found in the way ABRT handled the directories used to
store information about crashes. A local attacker with the privileges of
the abrt user could use this flaw to perform a symbolic link attack,
possibly allowing them to escalate their privileges to root.
(CVE-2012-5660) |
| Alerts: |
|
( Log in to post comments)
|
|
|