Описание
Kevin Backhouse discovered that apport would read a user-supplied configuration file with elevated privileges. By replacing the file with a symbolic link, a user could get apport to read any file on the system as root, with unknown consequences.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 2.20.9-0ubuntu7.8 |
| devel | released | 2.20.11-0ubuntu10 |
| disco | released | 2.20.10-0ubuntu27.2 |
| eoan | released | 2.20.11-0ubuntu8.1 |
| esm-infra-legacy/trusty | released | 2.14.1-0ubuntu3.29+esm2 |
| esm-infra/bionic | released | 2.20.9-0ubuntu7.8 |
| esm-infra/xenial | released | 2.20.1-0ubuntu2.20 |
| precise/esm | DNE | |
| trusty | ignored | end of standard support |
| trusty/esm | released | 2.14.1-0ubuntu3.29+esm2 |
Показывать по
EPSS
6.1 Medium
CVSS2
3.8 Low
CVSS3
Связанные уязвимости
Kevin Backhouse discovered that apport would read a user-supplied configuration file with elevated privileges. By replacing the file with a symbolic link, a user could get apport to read any file on the system as root, with unknown consequences.
Kevin Backhouse discovered that apport would read a user-supplied configuration file with elevated privileges. By replacing the file with a symbolic link, a user could get apport to read any file on the system as root, with unknown consequences.
Уязвимость службы регистрации ошибок apport операционной системы Ubuntu, позволяющая нарушителю выполнить произвольный код
EPSS
6.1 Medium
CVSS2
3.8 Low
CVSS3