Home page logo
/

oss-sec logo oss-sec mailing list archives

CVE-2012-1106 assignment notification -- abrt: Setuid process core dump archived with unsafe GID permissions
From: Stefan Cornelius <scorneli () redhat com>
Date: Mon, 05 Mar 2012 18:08:46 +0100

Hi,

A sensitive information disclosure flaw was found in the way abrt, the
automatic bug detection and reporting tool, performed archiving of certain core
dump files. When the abrt C handler plug-in and core dumps for setuid and
setgid processes were enabled (via fs.suid_dumpable=2), an unprivileged local
user could use this flaw to obtain access to core dump files of setuid
processes, which terminated with crash and were run by the same unprivileged
user, leading to disclosure of sensitive information due to weak GID
permissions, those core dump files were created with.

We have assigned CVE-2012-1106 to this issue.

Upstream patch:
https://fedorahosted.org/abrt/changeset/23d6997d7886abe118c28254f7f73f0b19b2d4e0

Red Hat bug:
https://bugzilla.redhat.com/show_bug.cgi?id=785163

Thanks and kind regards,

-- 
Stefan Cornelius / Red Hat Security Response Team


  By Date           By Thread  

Current thread:
  • CVE-2012-1106 assignment notification -- abrt: Setuid process core dump archived with unsafe GID permissions Stefan Cornelius (Mar 05)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]