CVE-2015-1341

Any Python module in sys.path can be imported if the command line of the process triggering the coredump is Python and the first argument is -m in Apport before 2.19.2 function _python_module_path.
References
Link Resource
https://launchpad.net/apport/trunk/2.19.2 Third Party Advisory
https://usn.ubuntu.com/2782-1/ Third Party Advisory
https://launchpad.net/apport/trunk/2.19.2 Third Party Advisory
https://usn.ubuntu.com/2782-1/ Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:canonical:apport:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:25

Type Values Removed Values Added
CVSS v2 : 7.2
v3 : 7.8
v2 : 7.2
v3 : 7.4
References () https://launchpad.net/apport/trunk/2.19.2 - Third Party Advisory () https://launchpad.net/apport/trunk/2.19.2 - Third Party Advisory
References () https://usn.ubuntu.com/2782-1/ - Third Party Advisory () https://usn.ubuntu.com/2782-1/ - Third Party Advisory

Information

Published : 2019-04-22 16:29

Updated : 2024-11-21 02:25


NVD link : CVE-2015-1341

Mitre link : CVE-2015-1341

CVE.ORG link : CVE-2015-1341


JSON object : View

Products Affected

canonical

  • ubuntu_linux
  • apport
CWE
CWE-264

Permissions, Privileges, and Access Controls