{"id":"USN-2744-1","summary":"apport vulnerability","details":"Halfdog discovered that Apport incorrectly handled kernel crash dump files.\nA local attacker could use this issue to cause a denial of service, or\npossibly elevate privileges. The default symlink protections for affected\nreleases should reduce the vulnerability to a denial of service.\n","modified":"2026-02-10T04:40:55Z","published":"2015-09-24T11:58:18Z","related":["UBUNTU-CVE-2015-1338"],"upstream":["CVE-2015-1338","UBUNTU-CVE-2015-1338"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2744-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-1338"}],"affected":[{"package":{"name":"apport","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/apport@2.14.1-0ubuntu3.15?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.14.1-0ubuntu3.15"}]}],"versions":["2.12.5-0ubuntu2","2.12.6-0ubuntu1","2.12.7-0ubuntu1","2.12.7-0ubuntu2","2.12.7-0ubuntu3","2.12.7-0ubuntu6","2.13.1-0ubuntu1","2.13.1-0ubuntu2","2.13.2-0ubuntu2","2.13.2-0ubuntu3","2.13.2-0ubuntu4","2.13.2-0ubuntu5","2.13.3-0ubuntu1","2.14-0ubuntu1","2.14.1-0ubuntu1","2.14.1-0ubuntu2","2.14.1-0ubuntu3","2.14.1-0ubuntu3.1","2.14.1-0ubuntu3.2","2.14.1-0ubuntu3.3","2.14.1-0ubuntu3.4","2.14.1-0ubuntu3.5","2.14.1-0ubuntu3.6","2.14.1-0ubuntu3.7","2.14.1-0ubuntu3.8","2.14.1-0ubuntu3.9","2.14.1-0ubuntu3.10","2.14.1-0ubuntu3.11","2.14.1-0ubuntu3.12","2.14.1-0ubuntu3.13"],"ecosystem_specific":{"binaries":[{"binary_name":"apport","binary_version":"2.14.1-0ubuntu3.15"},{"binary_name":"apport-gtk","binary_version":"2.14.1-0ubuntu3.15"},{"binary_name":"apport-kde","binary_version":"2.14.1-0ubuntu3.15"},{"binary_name":"apport-noui","binary_version":"2.14.1-0ubuntu3.15"},{"binary_name":"apport-retrace","binary_version":"2.14.1-0ubuntu3.15"},{"binary_name":"apport-valgrind","binary_version":"2.14.1-0ubuntu3.15"},{"binary_name":"dh-apport","binary_version":"2.14.1-0ubuntu3.15"},{"binary_name":"python-apport","binary_version":"2.14.1-0ubuntu3.15"},{"binary_name":"python-problem-report","binary_version":"2.14.1-0ubuntu3.15"},{"binary_name":"python3-apport","binary_version":"2.14.1-0ubuntu3.15"},{"binary_name":"python3-problem-report","binary_version":"2.14.1-0ubuntu3.15"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:14.04:LTS","cves":[{"severity":[{"type":"Ubuntu","score":"medium"}],"id":"CVE-2015-1338"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2744-1.json"}}],"schema_version":"1.7.3"}