Low: abrt, libreport, btparser, and python-meh security and bug fix update

Related Vulnerabilities: CVE-2011-4088   CVE-2012-1106   CVE-2011-4088   CVE-2012-1106  

Synopsis

Low: abrt, libreport, btparser, and python-meh security and bug fix update

Type/Severity

Security Advisory: Low

Topic

Updated abrt, libreport, btparser, and python-meh packages that fix two
security issues and several bugs are now available for Red Hat Enterprise
Linux 6.

The Red Hat Security Response Team has rated this update as having low
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Description

ABRT (Automatic Bug Reporting Tool) is a tool to help users to detect
defects in applications and to create a bug report with all the information
needed by a maintainer to fix it. It uses a plug-in system to extend its
functionality. libreport provides an API for reporting different problems
in applications to different bug targets, such as Bugzilla, FTP, and Trac.

The btparser utility is a backtrace parser and analyzer library, which
works with backtraces produced by the GNU Project Debugger. It can parse a
text file with a backtrace to a tree of C structures, allowing to analyze
the threads and frames of the backtrace and process them.

The python-meh package provides a python library for handling exceptions.

If the C handler plug-in in ABRT was enabled (the abrt-addon-ccpp package
installed and the abrt-ccpp service running), and the sysctl
fs.suid_dumpable option was set to "2" (it is "0" by default), core dumps
of set user ID (setuid) programs were created with insecure group ID
permissions. This could allow local, unprivileged users to obtain sensitive
information from the core dump files of setuid processes they would
otherwise not be able to access. (CVE-2012-1106)

ABRT did not allow users to easily search the collected crash information
for sensitive data prior to submitting it. This could lead to users
unintentionally exposing sensitive information via the submitted crash
reports. This update adds functionality to search across all the collected
data. Note that this fix does not apply to the default configuration, where
reports are sent to Red Hat Customer Support. It only takes effect for
users sending information to Red Hat Bugzilla. (CVE-2011-4088)

Red Hat would like to thank Jan Iven for reporting CVE-2011-4088.

These updated packages include numerous bug fixes. Space precludes
documenting all of these changes in this advisory. Users are directed to
the Red Hat Enterprise Linux 6.3 Technical Notes for information on the
most significant of these changes.

All users of abrt, libreport, btparser, and python-meh are advised to
upgrade to these updated packages, which correct these issues.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 6 x86_64
  • Red Hat Enterprise Linux Server 6 i386
  • Red Hat Enterprise Linux Workstation 6 x86_64
  • Red Hat Enterprise Linux Workstation 6 i386
  • Red Hat Enterprise Linux Desktop 6 x86_64
  • Red Hat Enterprise Linux Desktop 6 i386
  • Red Hat Enterprise Linux for IBM z Systems 6 s390x
  • Red Hat Enterprise Linux for Power, big endian 6 ppc64
  • Red Hat Enterprise Linux for Scientific Computing 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 i386

Fixes

  • BZ - 625485 - XML report generated by report lib from within Anaconda is not valid XML
  • BZ - 727494 - [RFE] warn if user wants to re-report the same problem
  • BZ - 745976 - "Report problem with ABRT" creates incomplete reports
  • BZ - 746727 - /tmp/anaconda-tb-* is not handled properly
  • BZ - 747594 - Can't proceed from "Select reporter" window when item is deselected
  • BZ - 747624 - abrt-cli man page is missing
  • BZ - 749100 - abrt-dump-oops contains non-translatable strings
  • BZ - 749854 - CVE-2011-4088 abrt: may leak some personal information to bugzilla with some certain applications
  • BZ - 751068 - abrt-cli shouldn't require abrt-addon-python
  • BZ - 758366 - Typo in /etc/libreport/events.d/python_event.conf
  • BZ - 759375 - ABRT rebase
  • BZ - 759377 - libreport rebase
  • BZ - 768377 - btparser rebase
  • BZ - 770357 - default config file for mailx is missing
  • BZ - 773242 - Moved copy
  • BZ - 785163 - CVE-2012-1106 abrt: Setuid process core dump archived with unsafe GID permissions
  • BZ - 796176 - Run all unit tests in build process
  • BZ - 796216 - Double free in abrt-action-analyze-oops.c
  • BZ - 799027 - ABRT-INSTALL-CCPPH(1) man page is misleading
  • BZ - 803618 - ABRT mailx plugin on by default causes crashes being always labelled as reported
  • BZ - 811147 - Report correct crash_function in the crash sumary
  • BZ - 823411 - Searching for duplicate anaconda bugs while reporting exception against partner-bugzilla during install fails

CVEs

References