First published: Fri Apr 17 2015(Updated: )
It was discovered that the kernel-invoked coredump processor provided by abrt writes core dumps to files owned by other system users. This could result in information disclosure if an application crashes while its current directory is a directory writable to other users (such as /tmp). Acknowledgement: This issue was discovered by Florian Weimer of Red Hat Product Security.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Automatic Bug Reporting Tool | <=2.1.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3142 is rated as having a moderate severity level due to potential information disclosure risks.
To fix CVE-2015-3142, update the Red Hat Automatic Bug Reporting Tool to version 2.1.11 or later.
CVE-2015-3142 affects versions of the Red Hat Automatic Bug Reporting Tool prior to 2.1.11.
CVE-2015-3142 is an information disclosure vulnerability arising from improper handling of core dump files.
Yes, CVE-2015-3142 can potentially allow unauthorized users to access sensitive data from core dumps.