6.1
CVSSv2

CVE-2019-11481

Published: 08/02/2020 Updated: 12/06/2023
CVSS v2 Base Score: 6.1 | Impact Score: 8.5 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 543
Vector: AV:L/AC:L/Au:N/C:C/I:P/A:P

Vulnerability Summary

Kevin Backhouse discovered Apport would read its user-controlled settings file as the root user. This could be used by a local malicious user to possibly crash Apport or have other unspecified consequences. (CVE-2019-11481)

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

canonical ubuntu linux 16.04

canonical ubuntu linux 18.04

canonical ubuntu linux 19.04

canonical ubuntu linux 14.04

canonical ubuntu linux 19.10

apport project apport -

Vendor Advisories

USN-4171-1 introduced a regression in Apport ...
Several security issues were fixed in Apport ...
Several security issues were fixed in Apport ...
USN-4171-1 introduced a regression in Apport ...
USN-4171-2 introduced a regression in Apport ...