First published: Fri Apr 17 2015(Updated: )
The crash reporting feature in Apport 2.13 through 2.17.x before 2.17.1 allows local users to gain privileges via a crafted usr/share/apport/apport file in a namespace (container).
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Python 3 Apport | =2.13 | |
Python 3 Apport | =2.13.1 | |
Python 3 Apport | =2.13.2 | |
Python 3 Apport | =2.13.3 | |
Python 3 Apport | =2.14 | |
Python 3 Apport | =2.14.1 | |
Python 3 Apport | =2.14.2 | |
Python 3 Apport | =2.14.3 | |
Python 3 Apport | =2.14.4 | |
Python 3 Apport | =2.14.5 | |
Python 3 Apport | =2.14.6 | |
Python 3 Apport | =2.14.7 | |
Python 3 Apport | =2.15 | |
Python 3 Apport | =2.15.1 | |
Python 3 Apport | =2.16 | |
Python 3 Apport | =2.16.1 | |
Python 3 Apport | =2.16.2 | |
Python 3 Apport | =2.17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1318 has a medium severity rating due to its potential for privilege escalation.
To fix CVE-2015-1318, upgrade Apport to version 2.17.1 or later.
Local users running Apport version 2.13 through 2.17.0 are affected by CVE-2015-1318.
CVE-2015-1318 impacts Apport versions 2.13 to 2.17.0.
CVE-2015-1318 is a local privilege escalation vulnerability.