The crash reporting feature in Abrt allows local users to gain privileges by leveraging an execve by root after a chroot into a user-specified directory in a namedspaced environment.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1211223 | issue tracking third party advisory |
http://www.openwall.com/lists/oss-security/2015/04/14/4 | mailing list |
http://packetstormsecurity.com/files/131422/Fedora-abrt-Race-Condition.html | exploit vdb entry third party advisory |
https://www.exploit-db.com/exploits/36746/ | exploit vdb entry third party advisory |
http://packetstormsecurity.com/files/131429/Abrt-Apport-Race-Condition-Symlink.html | exploit vdb entry third party advisory |
http://www.securityfocus.com/bid/74263 | vdb entry third party advisory |
https://www.exploit-db.com/exploits/36747/ | exploit vdb entry third party advisory |
https://github.com/abrt/abrt/pull/810 | issue tracking third party advisory patch |
http://packetstormsecurity.com/files/131423/Linux-Apport-Abrt-Local-Root-Exploit.html | exploit vdb entry third party advisory |
http://seclists.org/fulldisclosure/2015/Apr/34 | third party advisory mailing list |