Description
kernel_crashdump in Apport before 2.19 allows local users to cause a denial of service (disk consumption) or possibly gain privileges via a (1) symlink or (2) hard link attack on /var/crash/vmcore.log.
Exploits (1)
References (7)
Core 7
Core References
Vendor Advisory vendor-advisory
x_refsource_ubuntu
http://www.ubuntu.com/usn/USN-2744-1
Patch x_refsource_confirm
https://launchpad.net/apport/trunk/2.19
Exploit exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/38353/
Exploit x_refsource_misc
http://www.halfdog.net/Security/2015/ApportKernelCrashdumpFileAccessVulnerabilities/
Mailing List mailing-list
x_refsource_fulldisc
http://seclists.org/fulldisclosure/2015/Sep/101
Exploit x_refsource_misc
http://packetstormsecurity.com/files/133723/Ubuntu-Apport-kernel_crashdump-Symlink.html
Issue Tracking x_refsource_confirm
https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1492570
Scores
EPSS
0.0038
EPSS Percentile
59.4%
Details
CWE
CWE-59
Status
published
Products (4)
apport_project/apport
< 2.18.1
canonical/ubuntu_linux
12.04
canonical/ubuntu_linux
14.04
canonical/ubuntu_linux
15.04
Published
Oct 01, 2015
Tracked Since
Feb 18, 2026