Description
daemon/abrt-handle-upload.in in Automatic Bug Reporting Tool (ABRT), when moving problem reports from /var/spool/abrt-upload, allows local users to write to arbitrary files or possibly have other unspecified impact via a symlink attack on (1) /var/spool/abrt or (2) /var/tmp/abrt.
References (5)
Core 5
Core References
Mailing List, Third Party Advisory x_refsource_misc
http://www.openwall.com/lists/oss-security/2015/04/17/5
Issue Tracking, Third Party Advisory x_refsource_misc
https://bugzilla.redhat.com/show_bug.cgi?id=1212953
Third Party Advisory x_refsource_misc
https://github.com/abrt/abrt/pull/955
Third Party Advisory x_refsource_misc
http://rhn.redhat.com/errata/RHSA-2015-1083.html
Patch, Third Party Advisory x_refsource_confirm
https://github.com/abrt/abrt/commit/3746b7627218438ae7d781fc8b18a221454e9091
Scores
CVSS v3
6.5
EPSS
0.0051
EPSS Percentile
66.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Details
CWE
CWE-59
Status
published
Products (18)
redhat/automatic_bug_reporting_tool
redhat/enterprise_linux_desktop
7.0
redhat/enterprise_linux_server
7.0
redhat/enterprise_linux_server_aus
7.3
redhat/enterprise_linux_server_aus
7.4
redhat/enterprise_linux_server_aus
7.6
redhat/enterprise_linux_server_aus
7.7
redhat/enterprise_linux_server_eus
7.1
redhat/enterprise_linux_server_eus
7.2
redhat/enterprise_linux_server_eus
7.3
... and 8 more
Published
Jan 14, 2020
Tracked Since
Feb 18, 2026