Apport 2.12.5 and earlier uses weak permissions for core dump files created by setuid binaries, which allows local users to obtain sensitive information by reading the file.
References
Link | Resource |
---|---|
http://www.ubuntu.com/usn/USN-2007-1 | Vendor Advisory |
http://www.ubuntu.com/usn/USN-2007-1 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:48
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.ubuntu.com/usn/USN-2007-1 - Vendor Advisory |
Information
Published : 2013-10-25 23:55
Updated : 2024-11-21 01:48
NVD link : CVE-2013-1067
Mitre link : CVE-2013-1067
CVE.ORG link : CVE-2013-1067
JSON object : View
Products Affected
canonical
- ubuntu_linux
CWE
CWE-264
Permissions, Privileges, and Access Controls