First published: Tue Jul 09 2019(Updated: )
Kevin Backhouse discovered a race-condition when reading the user's local Apport configuration. This could be used by a local attacker to cause Apport to include arbitrary files in a resulting crash report.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/python-apport | <2.20.10-0ubuntu27.1 | 2.20.10-0ubuntu27.1 |
Ubuntu OpenSSH Client | =19.04 | |
All of | ||
ubuntu/python3-apport | <2.20.10-0ubuntu27.1 | 2.20.10-0ubuntu27.1 |
Ubuntu OpenSSH Client | =19.04 | |
All of | ||
ubuntu/python-apport | <2.20.10-0ubuntu13.4 | 2.20.10-0ubuntu13.4 |
Ubuntu OpenSSH Client | =18.10 | |
All of | ||
ubuntu/python3-apport | <2.20.10-0ubuntu13.4 | 2.20.10-0ubuntu13.4 |
Ubuntu OpenSSH Client | =18.10 | |
All of | ||
ubuntu/python-apport | <2.20.9-0ubuntu7.7 | 2.20.9-0ubuntu7.7 |
Ubuntu OpenSSH Client | =18.04 | |
All of | ||
ubuntu/python3-apport | <2.20.9-0ubuntu7.7 | 2.20.9-0ubuntu7.7 |
Ubuntu OpenSSH Client | =18.04 | |
All of | ||
ubuntu/python-apport | <2.20.1-0ubuntu2.19 | 2.20.1-0ubuntu2.19 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/python3-apport | <2.20.1-0ubuntu2.19 | 2.20.1-0ubuntu2.19 |
Ubuntu OpenSSH Client | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-4051-1 is considered to be moderate due to potential risks related to local privilege escalation.
To fix USN-4051-1, you should upgrade to the latest version of the affected packages, such as python-apport or python3-apport.
The vulnerability USN-4051-1 was discovered by Kevin Backhouse.
Ubuntu versions 16.04, 18.04, 18.10, and 19.04 are affected by USN-4051-1.
No, USN-4051-1 cannot be exploited remotely as it requires local access to the system.