Kevin Backhouse discovered that apport would read a user-supplied configuration file with elevated privileges. By replacing the file with a symbolic link, a user could get apport to read any file on the system as root, with unknown consequences.
https://usn.ubuntu.com/usn/usn-4171-2
https://usn.ubuntu.com/usn/usn-4171-1
http://packetstormsecurity.com/files/172858/Ubuntu-Apport-Whoopsie-DoS-Integer-Overflow.html
Source: Mitre, NVD
Published: 2020-02-08
Updated: 2023-06-12
Base Score: 6.1
Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:P/A:P
Severity: Medium
Base Score: 7.8
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Severity: High
EPSS: 0.00087