Описание
Apport through 2.20.7 does not properly handle core dumps from setuid binaries allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion or possibly gain root privileges. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1324.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | released | 2.20.7-0ubuntu3.4 |
| devel | released | 2.20.8-0ubuntu1 |
| esm-infra-legacy/trusty | released | 2.14.1-0ubuntu3.27 |
| esm-infra/xenial | released | 2.20.1-0ubuntu2.12 |
| precise/esm | DNE | |
| trusty | released | 2.14.1-0ubuntu3.27 |
| trusty/esm | released | 2.14.1-0ubuntu3.27 |
| upstream | released | 2.20.8 |
| xenial | released | 2.20.1-0ubuntu2.12 |
| zesty | released | 2.20.4-0ubuntu4.7 |
Показывать по
7.2 High
CVSS2
7.8 High
CVSS3
Связанные уязвимости
Apport through 2.20.7 does not properly handle core dumps from setuid binaries allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion or possibly gain root privileges. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1324.
Apport through 2.20.7 does not properly handle core dumps from setuid binaries allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion or possibly gain root privileges. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1324.
Уязвимость программного обеспечения формирования и отправки отчетов об ошибках Apport операционной системы Ubuntu, позволяющая нарушителю вызвать отказ в обслуживании или получить привилегии root
7.2 High
CVSS2
7.8 High
CVSS3