daemon/abrt-handle-upload.in in Automatic Bug Reporting Tool (ABRT), when moving problem reports from /var/spool/abrt-upload, allows local users to write to arbitrary files or possibly have other unspecified impact via a symlink attack on (1) /var/spool/abrt or (2) /var/tmp/abrt.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2015/04/17/5 | third party advisory mailing list |
https://bugzilla.redhat.com/show_bug.cgi?id=1212953 | issue tracking third party advisory |
https://github.com/abrt/abrt/pull/955 | third party advisory |
http://rhn.redhat.com/errata/RHSA-2015-1083.html | third party advisory |
https://github.com/abrt/abrt/commit/3746b7627218438ae7d781fc8b18a221454e9091 | third party advisory patch |