Lucene search

K
centosCentOS ProjectCESA-2015:2504
HistoryDec 02, 2015 - 1:52 p.m.

libreport security update

2015-12-0213:52:30
CentOS Project
lists.centos.org
47

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.006 Low

EPSS

Percentile

78.4%

CentOS Errata and Security Advisory CESA-2015:2504

libreport provides an API for reporting different problems in applications
to different bug targets, such as Bugzilla, FTP, and Trac. ABRT (Automatic
Bug Reporting Tool) uses libreport.

It was found that ABRT may have exposed unintended information to Red Hat
Bugzilla during crash reporting. A bug in the libreport library caused
changes made by a user in files included in a crash report to be discarded.
As a result, Red Hat Bugzilla attachments may contain data that was not
intended to be made public, including host names, IP addresses, or command
line options. (CVE-2015-5302)

This flaw did not affect default installations of ABRT on Red Hat
Enterprise Linux as they do not post data to Red Hat Bugzilla. This feature
can however be enabled, potentially impacting modified ABRT instances.

As a precaution, Red Hat has identified bugs filed by such non-default Red
Hat Enterprise Linux users of ABRT and marked them private.

This issue was discovered by Bastien Nocera of Red Hat.

All users of libreport are advised to upgrade to these updated packages,
which corrects this issue.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2015-December/083675.html

Affected packages:
libreport
libreport-cli
libreport-compat
libreport-devel
libreport-filesystem
libreport-gtk
libreport-gtk-devel
libreport-newt
libreport-plugin-bugzilla
libreport-plugin-kerneloops
libreport-plugin-logger
libreport-plugin-mailx
libreport-plugin-reportuploader
libreport-plugin-rhtsupport
libreport-plugin-ureport
libreport-python

Upstream details at:
https://access.redhat.com/errata/RHSA-2015:2504

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.006 Low

EPSS

Percentile

78.4%