daemon/abrt-handle-upload.in in Automatic Bug Reporting Tool (ABRT), when moving problem reports from /var/spool/abrt-upload, allows local users to write to arbitrary files or possibly have other unspecified impact via a symlink attack on (1) /var/spool/abrt or (2) /var/tmp/abrt.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1212953 | Issue Tracking Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2015-1083.html | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2015/04/17/5 | Mailing List Third Party Advisory |
https://github.com/abrt/abrt/pull/955 | Third Party Advisory |
https://github.com/abrt/abrt/commit/3746b7627218438ae7d781fc8b18a221454e9091 | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2020-01-14 10:15
Updated : 2023-02-12 15:15
NVD link : CVE-2015-3147
Mitre link : CVE-2015-3147
JSON object : View
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')
Products Affected
redhat
- enterprise_linux_desktop
- enterprise_linux_server_aus
- enterprise_linux_workstation
- automatic_bug_reporting_tool
- enterprise_linux_server_tus
- enterprise_linux_server_eus
- enterprise_linux_server