Описание
Apport 2.13 through 2.20.7 does not properly handle crashes originating from a PID namespace allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion or possibly gain root privileges, a different vulnerability than CVE-2017-14179.
Apport 2.13 through 2.20.7 does not properly handle crashes originating from a PID namespace allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion or possibly gain root privileges, a different vulnerability than CVE-2017-14179.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2017-14180
- https://bazaar.launchpad.net/~apport-hackers/apport/trunk/revision/3171
- https://launchpad.net/bugs/1726372
- https://people.canonical.com/~ubuntu-security/cve/?cve=CVE-2017-14180
- https://usn.ubuntu.com/usn/usn-3480-1
- http://seclists.org/fulldisclosure/2025/Jun/9
Связанные уязвимости
Apport 2.13 through 2.20.7 does not properly handle crashes originating from a PID namespace allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion or possibly gain root privileges, a different vulnerability than CVE-2017-14179.
Apport 2.13 through 2.20.7 does not properly handle crashes originating from a PID namespace allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion or possibly gain root privileges, a different vulnerability than CVE-2017-14179.
Уязвимость программного обеспечения формирования и отправки отчетов об ошибках Apport операционной системы Ubuntu, позволяющая нарушителю вызвать отказ в обслуживании или получить привилегии root