The C handler plug-in in Automatic Bug Reporting Tool (ABRT), possibly 2.0.8 and earlier, does not properly set the group (GID) permissions on core dump files for setuid programs when the sysctl fs.suid_dumpable option is set to 2, which allows local users to obtain sensitive information.
References
Configurations
History
21 Nov 2024, 01:36
Type | Values Removed | Values Added |
---|---|---|
References | () http://rhn.redhat.com/errata/RHSA-2012-0841.html - | |
References | () http://www.securityfocus.com/bid/54121 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/76524 - | |
References | () https://fedorahosted.org/abrt/changeset/23d6997d7886abe118c28254f7f73f0b19b2d4e0 - Exploit, Patch |
Information
Published : 2012-07-03 16:40
Updated : 2024-11-21 01:36
NVD link : CVE-2012-1106
Mitre link : CVE-2012-1106
CVE.ORG link : CVE-2012-1106
JSON object : View
Products Affected
redhat
- automatic_bug_reporting_tool
CWE
CWE-264
Permissions, Privileges, and Access Controls