Description
Any Python module in sys.path can be imported if the command line of the process triggering the coredump is Python and the first argument is -m in Apport before 2.19.2 function _python_module_path.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2015-1480 | Any Python module in sys.path can be imported if the command line of the process triggering the coredump is Python and the first argument is -m in Apport before 2.19.2 function _python_module_path. |
Ubuntu USN |
USN-2782-1 | Apport vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2024-09-16T23:45:46.716Z
Reserved: 2015-01-22T00:00:00.000Z
Link: CVE-2015-1341
No data.
Status : Modified
Published: 2019-04-22T16:29:00.960
Modified: 2024-11-21T02:25:12.513
Link: CVE-2015-1341
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN