Apport 2.12.5 and earlier uses weak permissions for core dump files created by setuid binaries, which allows local users to obtain sensitive information by reading the file.
References
Link | Resource |
---|---|
http://www.ubuntu.com/usn/USN-2007-1 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2013-10-25 16:55
Updated : 2013-10-28 06:49
NVD link : CVE-2013-1067
Mitre link : CVE-2013-1067
JSON object : View
CWE
CWE-264
Permissions, Privileges, and Access Controls
Products Affected
canonical
- ubuntu_linux