CVE-2019-15790Execution with Unnecessary Privileges in Apport

Severity
3.3LOWNVD
CNA2.8
EPSS
0.0%
top 85.05%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 28
Latest updateMay 24

Description

Apport reads and writes information on a crashed process to /proc/pid with elevated privileges. Apport then determines which user the crashed process belongs to by reading /proc/pid through get_pid_info() in data/apport. An unprivileged user could exploit this to read information about a privileged running process by exploiting PID recycling. This information could then be used to obtain ASLR offsets for a process with an existing memory corruption vulnerability. The initial fix introduced regre

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:NExploitability: 1.8 | Impact: 1.4

Affected Packages2 packages

CVEListV5canonical/apport2.14.12.14.1-0ubuntu3.29+esm3+3
Ubuntuapport_project/apport< 2.20.1-0ubuntu2.20+2

Also affects: Ubuntu Linux 14.04, 16.04, 18.04, 19.04, 19.10

Patches

🔴Vulnerability Details

3
GHSA
GHSA-mv59-w8cf-g9q7: Apport reads and writes information on a crashed process to /proc/pid with elevated privileges2022-05-24
CVEList
Apport reads PID files with elevated privileges2020-04-27
OSV
CVE-2019-15790: Apport reads and writes information on a crashed process to /proc/pid with elevated privileges2019-10-29

📋Vendor Advisories

2
Ubuntu
Apport vulnerabilities2019-11-04
Ubuntu
Apport vulnerabilities2019-10-30
CVE-2019-15790 — Execution with Unnecessary Privileges | cvebase