Описание
kernel_crashdump in Apport before 2.19 allows local users to cause a denial of service (disk consumption) or possibly gain privileges via a (1) symlink or (2) hard link attack on /var/crash/vmcore.log.
kernel_crashdump in Apport before 2.19 allows local users to cause a denial of service (disk consumption) or possibly gain privileges via a (1) symlink or (2) hard link attack on /var/crash/vmcore.log.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2015-1338
- https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1492570
- https://launchpad.net/apport/trunk/2.19
- https://www.exploit-db.com/exploits/38353
- http://packetstormsecurity.com/files/133723/Ubuntu-Apport-kernel_crashdump-Symlink.html
- http://seclists.org/fulldisclosure/2015/Sep/101
- http://www.halfdog.net/Security/2015/ApportKernelCrashdumpFileAccessVulnerabilities
- http://www.ubuntu.com/usn/USN-2744-1
Связанные уязвимости
kernel_crashdump in Apport before 2.19 allows local users to cause a denial of service (disk consumption) or possibly gain privileges via a (1) symlink or (2) hard link attack on /var/crash/vmcore.log.
kernel_crashdump in Apport before 2.19 allows local users to cause a denial of service (disk consumption) or possibly gain privileges via a (1) symlink or (2) hard link attack on /var/crash/vmcore.log.