First published: Mon Oct 12 2015(Updated: )
A bug was found in libreport which causes that user's changes made to reported data are thrown away. Only the changes to the first file in the list are saved and the rest is discarded. It means that Bugzilla attachments can contain data that user wanted to remove. The affected files are: - backtrace - cmdline (/proc/[pid]/cmdline) - environ (/proc/[pid]/environ) - open_fds (/proc/[pid]/{fd,fdinfo}) - maps (/proc/[pid]/maps) - smaps (/proc/[pid]/smaps) - hostname - remote ("1" if the problem directory was uploaded from another host) - ks.cfg (Anaconda's ks.cfg file) - anaconda-tb The bug has been introduced with libreport-2.0.7 which was released in Fedora 16.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Libreport-gtk | =2.0.8 | |
Red Hat Libreport-gtk | =2.0.9 | |
Red Hat Libreport-gtk | =2.0.10 | |
Red Hat Libreport-gtk | =2.0.14 | |
Red Hat Libreport-gtk | =2.0.16 | |
Red Hat Libreport-gtk | =2.0.19 | |
Red Hat Libreport-gtk | =2.0.20 | |
Red Hat Libreport-gtk | =2.1.0 | |
Red Hat Libreport-gtk | =2.1.1 | |
Red Hat Libreport-gtk | =2.1.2 | |
Red Hat Libreport-gtk | =2.1.3 | |
Red Hat Libreport-gtk | =2.1.4 | |
Red Hat Libreport-gtk | =2.1.5 | |
Red Hat Libreport-gtk | =2.1.6 | |
Red Hat Libreport-gtk | =2.1.7 | |
Red Hat Libreport-gtk | =2.1.8 | |
Red Hat Libreport-gtk | =2.1.9 | |
Red Hat Libreport-gtk | =2.1.10 | |
Red Hat Libreport-gtk | =2.1.11 | |
Red Hat Libreport-gtk | =2.2.2 | |
Red Hat Libreport-gtk | =2.2.3 | |
Red Hat Libreport-gtk | =2.3.0 | |
Red Hat Libreport-gtk | =2.5.1 | |
Red Hat Libreport-gtk | =2.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5302 is classified as a moderate severity vulnerability due to the potential for data loss.
To fix CVE-2015-5302, you should upgrade to libreport version 2.6.2 or later.
CVE-2015-5302 affects multiple versions of Red Hat's libreport, specifically versions from 2.0.8 up to 2.5.1.
Not addressing CVE-2015-5302 may lead to unintentional data exposure in Bugzilla attachments, as user modifications can be discarded.
CVE-2015-5302 is not considered critical, but organizations should still prioritize applying the fix to avoid data integrity issues.