3.3
CVSSv3

CVE-2019-15790

Published: 28/04/2020 Updated: 12/06/2023
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 3.3 | Impact Score: 1.4 | Exploitability Score: 1.8
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Kevin Backhouse discovered Apport would read its user-controlled settings file as the root user. This could be used by a local malicious user to possibly crash Apport or have other unspecified consequences. (CVE-2019-11481)

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apport project apport -

canonical ubuntu linux 16.04

canonical ubuntu linux 18.04

canonical ubuntu linux 19.04

canonical ubuntu linux 14.04

canonical ubuntu linux 19.10

Vendor Advisories

USN-4171-1 introduced a regression in Apport ...
Several security issues were fixed in Apport ...
Several security issues were fixed in Apport ...
USN-4171-1 introduced a regression in Apport ...
USN-4171-2 introduced a regression in Apport ...