First published: Wed Apr 15 2015(Updated: )
Automatic Bug Reporting Tool (ABRT) allows local users to read, change the ownership of, or have other unspecified impact on arbitrary files via a symlink attack on (1) /var/tmp/abrt/*/maps, (2) /tmp/jvm-*/hs_error.log, (3) /proc/*/exe, (4) /etc/os-release in a chroot, or (5) an unspecified root directory related to librpm.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Automatic Bug Reporting Tool | ||
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.1 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.1 | |
Red Hat Enterprise Linux Workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3315 is classified as a moderate severity vulnerability.
To mitigate CVE-2015-3315, update the Automatic Bug Reporting Tool to the latest version that includes the security patch.
CVE-2015-3315 affects local users on systems running vulnerable versions of Red Hat Automatic Bug Reporting Tool.
The risks associated with CVE-2015-3315 include unauthorized access to sensitive files and potential manipulation of important system data.
No, CVE-2015-3315 specifically affects certain older versions of Red Hat, such as the Automatic Bug Reporting Tool.