Race Condition Affecting apport package, versions <2.14.1-0ubuntu3.11


Severity

Recommended
0.0
high
0
10

Based on Ubuntu security rating.

Threat Intelligence

Exploit Maturity
Mature
EPSS
0.05% (19th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Race Condition vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UBUNTU1404-APPORT-369316
  • published25 Aug 2017
  • disclosed25 Aug 2017

Introduced: 25 Aug 2017

CVE-2015-1325  (opens in a new tab)
CWE-362  (opens in a new tab)

How to fix?

Upgrade Ubuntu:14.04 apport to version 2.14.1-0ubuntu3.11 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream apport package and not the apport package as distributed by Ubuntu. See How to fix? for Ubuntu:14.04 relevant fixed versions and status.

Race condition in Apport before 2.17.2-0ubuntu1.1 as packaged in Ubuntu 15.04, before 2.14.70ubuntu8.5 as packaged in Ubuntu 14.10, before 2.14.1-0ubuntu3.11 as packaged in Ubuntu 14.04 LTS, and before 2.0.1-0ubuntu17.9 as packaged in Ubuntu 12.04 LTS allow local users to write to arbitrary files and gain root privileges.