Apport 2.12.5 and earlier uses weak permissions for core dump files created by setuid binaries, which allows local users to obtain sensitive information by reading the file.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.ubuntu.com/usn/USN-2007-1 | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    No history.
Information
                Published : 2013-10-25 23:55
Updated : 2013-10-28 13:49
NVD link : CVE-2013-1067
Mitre link : CVE-2013-1067
CVE.ORG link : CVE-2013-1067
JSON object : View
Products Affected
                canonical
- ubuntu_linux
CWE
                
                    
                        
                        CWE-264
                        
            Permissions, Privileges, and Access Controls
