CVE-2019-7307
Publication date 9 July 2019
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
Apport before versions 2.14.1-0ubuntu3.29+esm1, 2.20.1-0ubuntu2.19, 2.20.9-0ubuntu7.7, 2.20.10-0ubuntu27.1, 2.20.11-0ubuntu5 contained a TOCTTOU vulnerability when reading the users ~/.apport-ignore.xml file, which allows a local attacker to replace this file with a symlink to any other file on the system and so cause Apport to include the contents of this other file in the resulting crash report. The crash report could then be read by that user either by causing it to be uploaded and reported to Launchpad, or by leveraging some other vulnerability to read the resulting crash report, and so allow the user to read arbitrary files on the system.
Status
Package | Ubuntu Release | Status |
---|---|---|
apport | ||
18.04 LTS bionic |
Fixed 2.20.9-0ubuntu7.7
|
|
16.04 LTS xenial |
Fixed 2.20.1-0ubuntu2.19
|
|
14.04 LTS trusty |
Fixed 2.14.1-0ubuntu3.29+esm1
|
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu ProSeverity score breakdown
Parameter | Value |
---|---|
Base score | 7.0 · High |
Attack vector | Local |
Attack complexity | High |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-4051-1
- Apport vulnerability
- 9 July 2019
- USN-4051-2
- Apport vulnerability
- 9 July 2019