Upstream information
CVE-2015-1870 at MITRE
Description
The event scripts in Automatic Bug Reporting Tool (ABRT) uses world-readable permission on a copy of sosreport file in problem directories, which allows local users to obtain sensitive information from /var/log/messages via unspecified vectors.
SUSE information
Overall state of this security issue: Does not affect SUSE products
This issue is currently rated as having important severity.
CVSS v2 Scores
| National Vulnerability Database |
Base Score | 2.1 |
Vector | AV:L/AC:L/Au:N/C:P/I:N/A:N |
Access Vector | Local |
Access Complexity | Low |
Authentication | None |
Confidentiality Impact | Partial |
Integrity Impact | None |
Availability Impact | None |
CVSS v3 Scores
| National Vulnerability Database |
Base Score | 5.5 |
Vector | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
Attack Vector | Local |
Attack Complexity | Low |
Privileges Required | Low |
User Interaction | None |
Scope | Unchanged |
Confidentiality Impact | High |
Integrity Impact | None |
Availability Impact | None |
CVSSv3 Version | 3 |
No SUSE Bugzilla entries cross referenced.
No SUSE Security Announcements cross referenced.
List of released packages
Product(s) | Fixed package version(s) | References |
SUSE Liberty Linux 7 | abrt >= 2.1.11-22.el7_1
abrt-addon-ccpp >= 2.1.11-22.el7_1
abrt-addon-kerneloops >= 2.1.11-22.el7_1
abrt-addon-pstoreoops >= 2.1.11-22.el7_1
abrt-addon-python >= 2.1.11-22.el7_1
abrt-addon-upload-watch >= 2.1.11-22.el7_1
abrt-addon-vmcore >= 2.1.11-22.el7_1
abrt-addon-xorg >= 2.1.11-22.el7_1
abrt-cli >= 2.1.11-22.el7_1
abrt-console-notification >= 2.1.11-22.el7_1
abrt-dbus >= 2.1.11-22.el7_1
abrt-desktop >= 2.1.11-22.el7_1
abrt-devel >= 2.1.11-22.el7_1
abrt-gui >= 2.1.11-22.el7_1
abrt-gui-devel >= 2.1.11-22.el7_1
abrt-gui-libs >= 2.1.11-22.el7_1
abrt-libs >= 2.1.11-22.el7_1
abrt-python >= 2.1.11-22.el7_1
abrt-python-doc >= 2.1.11-22.el7_1
abrt-retrace-client >= 2.1.11-22.el7_1
abrt-tui >= 2.1.11-22.el7_1
libreport >= 2.1.11-23.el7_1
libreport-anaconda >= 2.1.11-23.el7_1
libreport-cli >= 2.1.11-23.el7_1
libreport-compat >= 2.1.11-23.el7_1
libreport-devel >= 2.1.11-23.el7_1
libreport-filesystem >= 2.1.11-23.el7_1
libreport-gtk >= 2.1.11-23.el7_1
libreport-gtk-devel >= 2.1.11-23.el7_1
libreport-newt >= 2.1.11-23.el7_1
libreport-plugin-bugzilla >= 2.1.11-23.el7_1
libreport-plugin-kerneloops >= 2.1.11-23.el7_1
libreport-plugin-logger >= 2.1.11-23.el7_1
libreport-plugin-mailx >= 2.1.11-23.el7_1
libreport-plugin-reportuploader >= 2.1.11-23.el7_1
libreport-plugin-ureport >= 2.1.11-23.el7_1
libreport-python >= 2.1.11-23.el7_1
libreport-web >= 2.1.11-23.el7_1
libreport-web-devel >= 2.1.11-23.el7_1
| Patchnames: RHSA-2015:1083 |
SUSE Timeline for this CVE
CVE page created: Fri Apr 17 17:41:41 2015
CVE page last modified: Mon Oct 30 17:16:56 2023