First published: Thu Oct 01 2015(Updated: )
kernel_crashdump in Apport before 2.19 allows local users to cause a denial of service (disk consumption) or possibly gain privileges via a (1) symlink or (2) hard link attack on /var/crash/vmcore.log.
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Python 3 Apport | <=2.18.1 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1338 is considered to have a medium severity due to its potential for denial of service and privilege escalation.
To fix CVE-2015-1338, update Apport to version 2.19 or later, or apply relevant patches provided by your Linux distribution.
CVE-2015-1338 affects Apport versions before 2.19 on Ubuntu Linux versions 12.04, 14.04, and 15.04.
CVE-2015-1338 allows local users to conduct symlink and hard link attacks leading to denial of service or possible privilege escalation.
CVE-2015-1338 is a local vulnerability that requires local access to exploit.