Scientific Linux Security Update : abrt and libreport on SL7.x x86_64

Medium Nessus Plugin ID 87580


The remote Scientific Linux host is missing one or more security updates.


It was found that the ABRT debug information installer (abrt-action- install-debuginfo-to-abrt-cache) did not use temporary directories in a secure way. A local attacker could use the flaw to create symbolic links and files at arbitrary locations as the abrt user.

It was discovered that the kernel-invoked coredump processor provided by ABRT did not handle symbolic links correctly when writing core dumps of ABRT programs to the ABRT dump directory (/var/spool/abrt). A local attacker with write access to an ABRT problem directory could use this flaw to escalate their privileges. (CVE-2015-5287)

It was found that ABRT may have exposed unintended information to Red Hat Bugzilla during crash reporting. A bug in the libreport library caused changes made by a user in files included in a crash report to be discarded. As a result, Red Hat Bugzilla attachments may contain data that was not intended to be made public, including host names, IP addresses, or command line options. (CVE-2015-5302)

This flaw did not affect default installations of ABRT on Scientific Linux as they do not post data to Red Hat Bugzilla. This feature can however be enabled, potentially impacting modified ABRT instances.
With this update Scientific Linux will no longer publish the rhel-autoreport tools.


Update the affected packages.

See Also

Plugin Details

Severity: Medium

ID: 87580

File Name: sl_20151123_abrt_and_libreport_on_SL7_x.nasl

Version: $Revision: 2.2 $

Type: local

Agent: unix

Published: 2015/12/22

Modified: 2015/12/29

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 6.9

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2015/11/23

Exploitable With

Core Impact

Reference Information

CVE: CVE-2015-5273, CVE-2015-5287, CVE-2015-5302