kernel_crashdump in Apport before 2.19 allows local users to cause a denial of service (disk consumption) or possibly gain privileges via a (1) symlink or (2) hard link attack on /var/crash/vmcore.log.
{
"binaries": [
{
"binary_version": "2.14.1-0ubuntu3.15",
"binary_name": "apport"
},
{
"binary_version": "2.14.1-0ubuntu3.15",
"binary_name": "apport-gtk"
},
{
"binary_version": "2.14.1-0ubuntu3.15",
"binary_name": "apport-kde"
},
{
"binary_version": "2.14.1-0ubuntu3.15",
"binary_name": "apport-noui"
},
{
"binary_version": "2.14.1-0ubuntu3.15",
"binary_name": "apport-retrace"
},
{
"binary_version": "2.14.1-0ubuntu3.15",
"binary_name": "apport-valgrind"
},
{
"binary_version": "2.14.1-0ubuntu3.15",
"binary_name": "dh-apport"
},
{
"binary_version": "2.14.1-0ubuntu3.15",
"binary_name": "python-apport"
},
{
"binary_version": "2.14.1-0ubuntu3.15",
"binary_name": "python-problem-report"
},
{
"binary_version": "2.14.1-0ubuntu3.15",
"binary_name": "python3-apport"
},
{
"binary_version": "2.14.1-0ubuntu3.15",
"binary_name": "python3-problem-report"
}
],
"availability": "No subscription required"
}