Kevin Backhouse discovered that apport would read a user-supplied configuration file with elevated privileges. By replacing the file with a symbolic link, a user could get apport to read any file on the system as root, with unknown consequences.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-3154 | Kevin Backhouse discovered that apport would read a user-supplied configuration file with elevated privileges. By replacing the file with a symbolic link, a user could get apport to read any file on the system as root, with unknown consequences. |
Ubuntu USN |
USN-4171-1 | Apport vulnerabilities |
Ubuntu USN |
USN-4171-2 | Apport vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2024-09-16T23:25:27.956Z
Reserved: 2019-04-23T00:00:00
Link: CVE-2019-11481
No data.
Status : Modified
Published: 2020-02-08T05:15:12.527
Modified: 2024-11-21T04:21:10.220
Link: CVE-2019-11481
No data.
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN