Executive Summary

Summary
Title abrt, libreport, btparser, and python-meh security and bug fix update
Informations
Name RHSA-2012:0841 First vendor Publication 2012-06-20
Vendor RedHat Last vendor Modification 2012-06-20
Severity (Vendor) Low Revision 04

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:M/Au:N/C:P/I:N/A:N)
Cvss Base Score 1.9 Attack Range Local
Cvss Impact Score 2.9 Attack Complexity Medium
Cvss Expoit Score 3.4 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Problem Description:

Updated abrt, libreport, btparser, and python-meh packages that fix two security issues and several bugs are now available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having low security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Desktop (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64

3. Description:

ABRT (Automatic Bug Reporting Tool) is a tool to help users to detect defects in applications and to create a bug report with all the information needed by a maintainer to fix it. It uses a plug-in system to extend its functionality. libreport provides an API for reporting different problems in applications to different bug targets, such as Bugzilla, FTP, and Trac.

The btparser utility is a backtrace parser and analyzer library, which works with backtraces produced by the GNU Project Debugger. It can parse a text file with a backtrace to a tree of C structures, allowing to analyze the threads and frames of the backtrace and process them.

The python-meh package provides a python library for handling exceptions.

If the C handler plug-in in ABRT was enabled (the abrt-addon-ccpp package installed and the abrt-ccpp service running), and the sysctl fs.suid_dumpable option was set to "2" (it is "0" by default), core dumps of set user ID (setuid) programs were created with insecure group ID permissions. This could allow local, unprivileged users to obtain sensitive information from the core dump files of setuid processes they would otherwise not be able to access. (CVE-2012-1106)

ABRT did not allow users to easily search the collected crash information for sensitive data prior to submitting it. This could lead to users unintentionally exposing sensitive information via the submitted crash reports. This update adds functionality to search across all the collected data. Note that this fix does not apply to the default configuration, where reports are sent to Red Hat Customer Support. It only takes effect for users sending information to Red Hat Bugzilla. (CVE-2011-4088)

Red Hat would like to thank Jan Iven for reporting CVE-2011-4088.

These updated packages include numerous bug fixes. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Enterprise Linux 6.3 Technical Notes for information on the most significant of these changes.

All users of abrt, libreport, btparser, and python-meh are advised to upgrade to these updated packages, which correct these issues.

4. Solution:

Before applying this update, make sure all previously-released errata relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258

5. Bugs fixed (http://bugzilla.redhat.com/):

625485 - XML report generated by report lib from within Anaconda is not valid XML 727494 - [RFE] warn if user wants to re-report the same problem 745976 - "Report problem with ABRT" creates incomplete reports 746727 - /tmp/anaconda-tb-* is not handled properly 747594 - Can't proceed from "Select reporter" window when item is deselected 747624 - abrt-cli man page is missing 749100 - abrt-dump-oops contains non-translatable strings 749854 - CVE-2011-4088 abrt: may leak some personal information to bugzilla with some certain applications 751068 - abrt-cli shouldn't require abrt-addon-python 758366 - Typo in /etc/libreport/events.d/python_event.conf 759375 - ABRT rebase 759377 - libreport rebase 768377 - btparser rebase 770357 - default config file for mailx is missing 773242 - Moved copy 785163 - CVE-2012-1106 abrt: Setuid process core dump archived with unsafe GID permissions 796176 - Run all unit tests in build process 796216 - Double free in abrt-action-analyze-oops.c 799027 - ABRT-INSTALL-CCPPH(1) man page is misleading 803618 - ABRT mailx plugin on by default causes crashes being always labelled as reported 811147 - Report correct crash_function in the crash sumary 823411 - Searching for duplicate anaconda bugs while reporting exception against partner-bugzilla during install fails

Original Source

Url : https://rhn.redhat.com/errata/RHSA-2012-0841.html

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-264 Permissions, Privileges, and Access Controls

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:21344
 
Oval ID: oval:org.mitre.oval:def:21344
Title: RHSA-2012:0841: abrt, libreport, btparser, and python-meh security and bug fix update (Low)
Description: The C handler plug-in in Automatic Bug Reporting Tool (ABRT), possibly 2.0.8 and earlier, does not properly set the group (GID) permissions on core dump files for setuid programs when the sysctl fs.suid_dumpable option is set to 2, which allows local users to obtain sensitive information.
Family: unix Class: patch
Reference(s): RHSA-2012:0841-04
CESA-2012:0841
CVE-2011-4088
CVE-2012-1106
Version: 29
Platform(s): Red Hat Enterprise Linux 6
CentOS Linux 6
Product(s): abrt
btparser
libreport
python-meh
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23932
 
Oval ID: oval:org.mitre.oval:def:23932
Title: ELSA-2012:0841: abrt, libreport, btparser, and python-meh security and bug fix update (Low)
Description: The C handler plug-in in Automatic Bug Reporting Tool (ABRT), possibly 2.0.8 and earlier, does not properly set the group (GID) permissions on core dump files for setuid programs when the sysctl fs.suid_dumpable option is set to 2, which allows local users to obtain sensitive information.
Family: unix Class: patch
Reference(s): ELSA-2012:0841-04
CVE-2011-4088
CVE-2012-1106
Version: 13
Platform(s): Oracle Linux 6
Product(s): abrt
btparser
libreport
python-meh
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:27500
 
Oval ID: oval:org.mitre.oval:def:27500
Title: DEPRECATED: ELSA-2012-0841 -- abrt, libreport, btparser, and python-meh security and bug fix update (low)
Description: libreport [2.0.9-5.0.1.el6] - Add oracle-enterprise.patch - Remove libreport-plugin-rhtsupport pkg [2.0.9-5] - rebuild due to rpmdiff - Resolves: #823411 [2.0.9-4] - fixed compatibility with bugzilla 4.2 - Resolves: #823411 [2.0.9-3] - added notify-only option to mailx rhbz#803618 - Resolves: #803618 [2.0.9-2] - minor fix in debuginfo downloader - updated translations - Related: #759377 [2.0.9-1] - new upstream release - fixed typos in man - fixed handling of anaconda-tb file - generate valid xml file - Resolves: #759377, #758366, #746727
Family: unix Class: patch
Reference(s): ELSA-2012-0841
CVE-2011-4088
CVE-2012-1106
Version: 4
Platform(s): Oracle Linux 6
Product(s): abrt
btparser
libreport
python-meh
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 12

OpenVAS Exploits

Date Description
2012-07-30 Name : CentOS Update for abrt CESA-2012:0841 centos6
File : nvt/gb_CESA-2012_0841_abrt_centos6.nasl
2012-06-22 Name : RedHat Update for abrt, libreport, btparser, and python-meh RHSA-2012:0841-04
File : nvt/gb_RHSA-2012_0841-04_abrt_libreport_btparser_and_python-meh.nasl

Nessus® Vulnerability Scanner

Date Description
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2012-0841.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20120620_abrt__libreport__btparser__and_python_meh_on_SL6_x.nasl - Type : ACT_GATHER_INFO
2012-07-11 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2012-0841.nasl - Type : ACT_GATHER_INFO
2012-06-20 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2012-0841.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:56:03
  • Multiple Updates