Apport 2.12.5 and earlier uses weak permissions for core dump files created by setuid binaries, which allows local users to obtain sensitive information by reading the file.
References
Link | Resource |
---|---|
http://www.ubuntu.com/usn/USN-2007-1 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2013-10-25 23:55
Updated : 2013-10-28 13:49
NVD link : CVE-2013-1067
Mitre link : CVE-2013-1067
CVE.ORG link : CVE-2013-1067
JSON object : View
Products Affected
canonical
- ubuntu_linux
CWE
CWE-264
Permissions, Privileges, and Access Controls