2.1
CVSSv2

CVE-2019-11485

Published: 08/02/2020 Updated: 01/01/2022
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 3.3 | Impact Score: 1.4 | Exploitability Score: 1.8
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Kevin Backhouse discovered Apport would read its user-controlled settings file as the root user. This could be used by a local malicious user to possibly crash Apport or have other unspecified consequences. (CVE-2019-11481)

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apport project apport -

canonical ubuntu linux 14.04

canonical ubuntu linux 16.04

canonical ubuntu linux 18.04

canonical ubuntu linux 19.04

canonical ubuntu linux 19.10

Vendor Advisories

USN-4171-1 introduced a regression in Apport ...
Several security issues were fixed in Apport ...
Several security issues were fixed in Apport ...
USN-4171-1 introduced a regression in Apport ...
USN-4171-2 introduced a regression in Apport ...