Kevin Backhouse discovered that apport would read a user-supplied configuration file with elevated privileges. By replacing the file with a symbolic link, a user could get apport to read any file on the system as root, with unknown consequences.
References
Link | Resource |
---|---|
https://usn.ubuntu.com/usn/usn-4171-1 | Third Party Advisory |
https://usn.ubuntu.com/usn/usn-4171-2 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2020-02-07 21:15
Updated : 2020-02-12 13:21
NVD link : CVE-2019-11481
Mitre link : CVE-2019-11481
JSON object : View
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')
Products Affected
canonical
- ubuntu_linux
apport_project
- apport