Halfdog discovered that Apport incorrectly handled kernel crash dump files.
A local attacker could use this issue to cause a denial of service, or
possibly elevate privileges. The default symlink protections for affected
releases should reduce the vulnerability to a denial of service.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 15.04 | noarch | apport | < 2.17.2-0ubuntu1.5 | UNKNOWN |
Ubuntu | 15.04 | noarch | apport-gtk | < 2.17.2-0ubuntu1.5 | UNKNOWN |
Ubuntu | 15.04 | noarch | apport-kde | < 2.17.2-0ubuntu1.5 | UNKNOWN |
Ubuntu | 15.04 | noarch | apport-noui | < 2.17.2-0ubuntu1.5 | UNKNOWN |
Ubuntu | 15.04 | noarch | apport-retrace | < 2.17.2-0ubuntu1.5 | UNKNOWN |
Ubuntu | 15.04 | noarch | apport-valgrind | < 2.17.2-0ubuntu1.5 | UNKNOWN |
Ubuntu | 15.04 | noarch | dh-apport | < 2.17.2-0ubuntu1.5 | UNKNOWN |
Ubuntu | 15.04 | noarch | python-apport | < 2.17.2-0ubuntu1.5 | UNKNOWN |
Ubuntu | 15.04 | noarch | python-problem-report | < 2.17.2-0ubuntu1.5 | UNKNOWN |
Ubuntu | 15.04 | noarch | python3-apport | < 2.17.2-0ubuntu1.5 | UNKNOWN |