ABRT Daemon Vulnerability

HIGH (8.8) No Patch (10 days)

Threat Intelligence

⚠️ CRITICAL GAP - Exploits exist but no detection available
EPSS Score: 0.02% chance of exploitation (percentile: 5%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: GitHub PoC

How we test →

What is it?

The ABRT daemon is a process used to monitor and manage system crashes on Linux systems. It's designed to automatically restart processes that fail to start or crash. However, due to a flaw in its handling of user-supplied mount information, an attacker can craft a payload that injects shell metacharacters, allowing them to execute arbitrary commands with elevated privileges.

Am I affected?

You're affected if you use A flaw was found. Affected versions: 12 If you don't recognise this software, you're probably not affected.

Affected Products

Red Hat / ABRT

How to fix

Upgrade to ABRT 2.1.22 or later.
- For immediate mitigation, run sudo sed -i 's/12//g' /etc/abrt/abrt.conf to remove the hardcoded length of user-supplied mount information.
- Contact Red Hat directly for a patched version.