Your submission was sent successfully! Close

CVE-2019-11481

Published: 27 August 2019

Kevin Backhouse discovered that apport would read a user-supplied configuration file with elevated privileges. By replacing the file with a symbolic link, a user could get apport to read any file on the system as root, with unknown consequences.

Priority

Low

CVSS 3 base score: 7.8

Status

Package Release Status
apport
Launchpad, Ubuntu, Debian
bionic
Released (2.20.9-0ubuntu7.8)
disco
Released (2.20.10-0ubuntu27.2)
eoan
Released (2.20.11-0ubuntu8.1)
precise Does not exist

trusty
Released (2.14.1-0ubuntu3.29+esm2)
upstream Needs triage

xenial
Released (2.20.1-0ubuntu2.20)