Halfdog discovered that Apport incorrectly handled kernel crash dump files. A local attacker could use this issue to cause a denial of service, or possibly elevate privileges. The default symlink protections for affected releases should reduce the vulnerability to a denial of service.
{
"binaries": [
{
"binary_version": "2.14.1-0ubuntu3.15",
"binary_name": "apport"
},
{
"binary_version": "2.14.1-0ubuntu3.15",
"binary_name": "apport-gtk"
},
{
"binary_version": "2.14.1-0ubuntu3.15",
"binary_name": "apport-kde"
},
{
"binary_version": "2.14.1-0ubuntu3.15",
"binary_name": "apport-noui"
},
{
"binary_version": "2.14.1-0ubuntu3.15",
"binary_name": "apport-retrace"
},
{
"binary_version": "2.14.1-0ubuntu3.15",
"binary_name": "apport-valgrind"
},
{
"binary_version": "2.14.1-0ubuntu3.15",
"binary_name": "dh-apport"
},
{
"binary_version": "2.14.1-0ubuntu3.15",
"binary_name": "python-apport"
},
{
"binary_version": "2.14.1-0ubuntu3.15",
"binary_name": "python-problem-report"
},
{
"binary_version": "2.14.1-0ubuntu3.15",
"binary_name": "python3-apport"
},
{
"binary_version": "2.14.1-0ubuntu3.15",
"binary_name": "python3-problem-report"
}
],
"availability": "No subscription required"
}