CVE-2019-11481
08.02.2020, 05:15
Kevin Backhouse discovered that apport would read a user-supplied configuration file with elevated privileges. By replacing the file with a symbolic link, a user could get apport to read any file on the system as root, with unknown consequences.
Vendor | Product | Version |
---|---|---|
canonical | ubuntu_linux | 14.04 |
canonical | ubuntu_linux | 16.04 |
canonical | ubuntu_linux | 18.04 |
canonical | ubuntu_linux | 19.04 |
canonical | ubuntu_linux | 19.10 |
apport_project | apport | - |
𝑥
= Vulnerable software versions

Ubuntu Releases
References