kernel_crashdump in Apport before 2.19 allows local users to cause a denial of service (disk consumption) or possibly gain privileges via a (1) symlink or (2) hard link attack on /var/crash/vmcore.log.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Apport | Apport_project | * | 2.18.1 (including) |
Apport | Ubuntu | devel | * |
Apport | Ubuntu | precise | * |
Apport | Ubuntu | trusty | * |
Apport | Ubuntu | vivid | * |
Apport | Ubuntu | vivid/stable-phone-overlay | * |
Apport | Ubuntu | wily | * |
Apport | Ubuntu | xenial | * |
Apport | Ubuntu | yakkety | * |
Apport | Ubuntu | zesty | * |