Description
Kevin Backhouse discovered that apport would read a user-supplied configuration file with elevated privileges. By replacing the file with a symbolic link, a user could get apport to read any file on the system as root, with unknown consequences.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-3154 | Kevin Backhouse discovered that apport would read a user-supplied configuration file with elevated privileges. By replacing the file with a symbolic link, a user could get apport to read any file on the system as root, with unknown consequences. |
Ubuntu USN |
USN-4171-1 | Apport vulnerabilities |
Ubuntu USN |
USN-4171-2 | Apport vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2024-09-16T23:25:27.956Z
Reserved: 2019-04-23T00:00:00.000Z
Link: CVE-2019-11481
No data.
Status : Modified
Published: 2020-02-08T05:15:12.527
Modified: 2024-11-21T04:21:10.220
Link: CVE-2019-11481
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN