The crash reporting feature in Abrt allows local users to gain privileges by leveraging an execve by root after a chroot into a user-specified directory in a namedspaced environment.
References
Link | Resource |
---|---|
https://www.exploit-db.com/exploits/36747/ | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/36746/ | Exploit Third Party Advisory VDB Entry |
https://github.com/abrt/abrt/pull/810 | Issue Tracking Patch Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1211223 | Issue Tracking Third Party Advisory |
http://www.securityfocus.com/bid/74263 | Third Party Advisory VDB Entry |
http://www.openwall.com/lists/oss-security/2015/04/14/4 | Mailing List |
http://seclists.org/fulldisclosure/2015/Apr/34 | Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/131429/Abrt-Apport-Race-Condition-Symlink.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/131423/Linux-Apport-Abrt-Local-Root-Exploit.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/131422/Fedora-abrt-Race-Condition.html | Exploit Third Party Advisory VDB Entry |
Configurations
Information
Published : 2018-02-09 14:29
Updated : 2018-03-08 08:03
NVD link : CVE-2015-1862
Mitre link : CVE-2015-1862
JSON object : View
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Products Affected
abrt_project
- abrt