Executive Summary
Summary | |
---|---|
Title | abrt, libreport, btparser, and python-meh security and bug fix update |
Informations | |||
---|---|---|---|
Name | RHSA-2012:0841 | First vendor Publication | 2012-06-20 |
Vendor | RedHat | Last vendor Modification | 2012-06-20 |
Severity (Vendor) | Low | Revision | 04 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:M/Au:N/C:P/I:N/A:N) | |||
---|---|---|---|
Cvss Base Score | 1.9 | Attack Range | Local |
Cvss Impact Score | 2.9 | Attack Complexity | Medium |
Cvss Expoit Score | 3.4 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: Updated abrt, libreport, btparser, and python-meh packages that fix two security issues and several bugs are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having low security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: ABRT (Automatic Bug Reporting Tool) is a tool to help users to detect defects in applications and to create a bug report with all the information needed by a maintainer to fix it. It uses a plug-in system to extend its functionality. libreport provides an API for reporting different problems in applications to different bug targets, such as Bugzilla, FTP, and Trac. The btparser utility is a backtrace parser and analyzer library, which works with backtraces produced by the GNU Project Debugger. It can parse a text file with a backtrace to a tree of C structures, allowing to analyze the threads and frames of the backtrace and process them. The python-meh package provides a python library for handling exceptions. If the C handler plug-in in ABRT was enabled (the abrt-addon-ccpp package installed and the abrt-ccpp service running), and the sysctl fs.suid_dumpable option was set to "2" (it is "0" by default), core dumps of set user ID (setuid) programs were created with insecure group ID permissions. This could allow local, unprivileged users to obtain sensitive information from the core dump files of setuid processes they would otherwise not be able to access. (CVE-2012-1106) ABRT did not allow users to easily search the collected crash information for sensitive data prior to submitting it. This could lead to users unintentionally exposing sensitive information via the submitted crash reports. This update adds functionality to search across all the collected data. Note that this fix does not apply to the default configuration, where reports are sent to Red Hat Customer Support. It only takes effect for users sending information to Red Hat Bugzilla. (CVE-2011-4088) Red Hat would like to thank Jan Iven for reporting CVE-2011-4088. These updated packages include numerous bug fixes. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Enterprise Linux 6.3 Technical Notes for information on the most significant of these changes. All users of abrt, libreport, btparser, and python-meh are advised to upgrade to these updated packages, which correct these issues. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 5. Bugs fixed (http://bugzilla.redhat.com/): 625485 - XML report generated by report lib from within Anaconda is not valid XML 727494 - [RFE] warn if user wants to re-report the same problem 745976 - "Report problem with ABRT" creates incomplete reports 746727 - /tmp/anaconda-tb-* is not handled properly 747594 - Can't proceed from "Select reporter" window when item is deselected 747624 - abrt-cli man page is missing 749100 - abrt-dump-oops contains non-translatable strings 749854 - CVE-2011-4088 abrt: may leak some personal information to bugzilla with some certain applications 751068 - abrt-cli shouldn't require abrt-addon-python 758366 - Typo in /etc/libreport/events.d/python_event.conf 759375 - ABRT rebase 759377 - libreport rebase 768377 - btparser rebase 770357 - default config file for mailx is missing 773242 - Moved copy 785163 - CVE-2012-1106 abrt: Setuid process core dump archived with unsafe GID permissions 796176 - Run all unit tests in build process 796216 - Double free in abrt-action-analyze-oops.c 799027 - ABRT-INSTALL-CCPPH(1) man page is misleading 803618 - ABRT mailx plugin on by default causes crashes being always labelled as reported 811147 - Report correct crash_function in the crash sumary 823411 - Searching for duplicate anaconda bugs while reporting exception against partner-bugzilla during install fails |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2012-0841.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-264 | Permissions, Privileges, and Access Controls |
OVAL Definitions
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2012-07-30 | Name : CentOS Update for abrt CESA-2012:0841 centos6 File : nvt/gb_CESA-2012_0841_abrt_centos6.nasl |
2012-06-22 | Name : RedHat Update for abrt, libreport, btparser, and python-meh RHSA-2012:0841-04 File : nvt/gb_RHSA-2012_0841-04_abrt_libreport_btparser_and_python-meh.nasl |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2012-0841.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20120620_abrt__libreport__btparser__and_python_meh_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2012-07-11 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2012-0841.nasl - Type : ACT_GATHER_INFO |
2012-06-20 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2012-0841.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:56:03 |
|