The C handler plug-in in Automatic Bug Reporting Tool (ABRT), possibly 2.0.8 and earlier, does not properly set the group (GID) permissions on core dump files for setuid programs when the sysctl fs.suid_dumpable option is set to 2, which allows local users to obtain sensitive information.
                
            References
                    Configurations
                    History
                    21 Nov 2024, 01:36
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://rhn.redhat.com/errata/RHSA-2012-0841.html - | |
| References | () http://www.securityfocus.com/bid/54121 - | |
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/76524 - | |
| References | () https://fedorahosted.org/abrt/changeset/23d6997d7886abe118c28254f7f73f0b19b2d4e0 - Exploit, Patch | 
Information
                Published : 2012-07-03 16:40
Updated : 2025-04-11 00:51
NVD link : CVE-2012-1106
Mitre link : CVE-2012-1106
CVE.ORG link : CVE-2012-1106
JSON object : View
Products Affected
                redhat
- automatic_bug_reporting_tool
CWE
                
                    
                        
                        CWE-264
                        
            Permissions, Privileges, and Access Controls
