Apport before 2.13 does not properly handle crashes originating from a PID namespace allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion, possibly gain root privileges, or escape from containers.
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "2.14.1-0ubuntu3.25",
"binary_name": "apport"
},
{
"binary_version": "2.14.1-0ubuntu3.25",
"binary_name": "apport-gtk"
},
{
"binary_version": "2.14.1-0ubuntu3.25",
"binary_name": "apport-kde"
},
{
"binary_version": "2.14.1-0ubuntu3.25",
"binary_name": "apport-noui"
},
{
"binary_version": "2.14.1-0ubuntu3.25",
"binary_name": "apport-retrace"
},
{
"binary_version": "2.14.1-0ubuntu3.25",
"binary_name": "apport-valgrind"
},
{
"binary_version": "2.14.1-0ubuntu3.25",
"binary_name": "dh-apport"
},
{
"binary_version": "2.14.1-0ubuntu3.25",
"binary_name": "python-apport"
},
{
"binary_version": "2.14.1-0ubuntu3.25",
"binary_name": "python-problem-report"
},
{
"binary_version": "2.14.1-0ubuntu3.25",
"binary_name": "python3-apport"
},
{
"binary_version": "2.14.1-0ubuntu3.25",
"binary_name": "python3-problem-report"
}
]
}