First published: Mon Apr 22 2019(Updated: )
Any Python module in sys.path can be imported if the command line of the process triggering the coredump is Python and the first argument is -m in Apport before 2.19.2 function _python_module_path.
Credit: security@ubuntu.com security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =15.04 | |
Canonical Ubuntu Linux | =15.10 | |
Canonical Apport | <2.19.2 | |
ubuntu/apport | <2.0.1-0ubuntu17.13 | 2.0.1-0ubuntu17.13 |
ubuntu/apport | <2.14.1-0ubuntu3.18 | 2.14.1-0ubuntu3.18 |
ubuntu/apport | <2.17.2-0ubuntu1.7 | 2.17.2-0ubuntu1.7 |
ubuntu/apport | <2.19.1-0ubuntu4 | 2.19.1-0ubuntu4 |
ubuntu/apport | <2.19.2-0ubuntu1 | 2.19.2-0ubuntu1 |
ubuntu/apport | <2.19.2-0ubuntu1 | 2.19.2-0ubuntu1 |
ubuntu/apport | <2.19.2-0ubuntu1 | 2.19.2-0ubuntu1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1341 is a vulnerability that allows any Python module in sys.path to be imported if the command line of the process triggering the coredump is Python and the first argument is -m in Apport before 2.19.2 function _python_module_path.
CVE-2015-1341 has a severity rating of 7.8 (high).
CVE-2015-1341 affects Canonical Ubuntu Linux 12.04 LTS, 14.04 LTS, 15.04, and 15.10, as well as Canonical Apport up to version 2.19.2.
To fix CVE-2015-1341, update to Apport version 2.19.2 or later.
You can find more information about CVE-2015-1341 at the following references: [Link 1](https://launchpad.net/apport/trunk/2.19.2), [Link 2](https://usn.ubuntu.com/2782-1/).