{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"low"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2019-15790","title":"Title"},{"category":"description","text":"Apport reads and writes information on a crashed process to /proc/pid with elevated privileges. Apport then determines which user the crashed process belongs to by reading /proc/pid through get_pid_info() in data/apport. An unprivileged user could exploit this to read information about a privileged running process by exploiting PID recycling. This information could then be used to obtain ASLR offsets for a process with an existing memory corruption vulnerability. The initial fix introduced regressions in the Python Apport library due to a missing argument in Report.add_proc_environ in apport/report.py. It also caused an autopkgtest failure when reading /proc/pid and with Python 2 compatibility by reading /proc maps. The initial and subsequent regression fixes are in 2.20.11-0ubuntu16, 2.20.11-0ubuntu8.6, 2.20.9-0ubuntu7.12, 2.20.1-0ubuntu2.22 and 2.14.1-0ubuntu3.29+esm3.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2019-15790","url":"https://www.suse.com/security/cve/CVE-2019-15790"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1155482 for CVE-2019-15790","url":"https://bugzilla.suse.com/1155482"}],"title":"SUSE CVE CVE-2019-15790","tracking":{"current_release_date":"2025-11-05T07:39:54Z","generator":{"date":"2023-02-15T04:08:29Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2019-15790","initial_release_date":"2023-02-15T04:08:29Z","revision_history":[{"date":"2023-02-15T04:08:29Z","number":"2","summary":"Current version"},{"date":"2025-01-01T06:18:04Z","number":"3","summary":"Current version"},{"date":"2025-02-15T06:57:06Z","number":"4","summary":"Current version"},{"date":"2025-02-17T07:21:54Z","number":"5","summary":"Current version"},{"date":"2025-03-15T10:34:15Z","number":"6","summary":"Current version"},{"date":"2025-04-25T06:04:11Z","number":"7","summary":"Current version"},{"date":"2025-10-07T09:25:44Z","number":"8","summary":"Current version"},{"date":"2025-11-05T07:39:54Z","number":"9","summary":"Current version"}],"status":"interim","version":"9"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"SUSE Linux Enterprise Server 11 SP1-TERADATA","product":{"name":"SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA","product_identification_helper":{"cpe":"cpe:/o:suse:sles:11:sp1:teradata"}}},{"category":"product_name","name":"SUSE Linux Enterprise Server 11 SP3-TERADATA","product":{"name":"SUSE Linux Enterprise Server 11 SP3-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP3-TERADATA","product_identification_helper":{"cpe":"cpe:/o:suse:sles:11:sp3:teradata"}}},{"category":"product_name","name":"SUSE Linux Enterprise Server 11 SP4 LTSS","product":{"name":"SUSE Linux Enterprise Server 11 SP4 LTSS","product_id":"SUSE Linux Enterprise Server 11 SP4 LTSS","product_identification_helper":{"cpe":"cpe:/o:suse:suse_sles_ltss:11:sp4"}}},{"category":"product_version","name":"apport-0.114-12.8.11.1","product":{"name":"apport-0.114-12.8.11.1","product_id":"apport-0.114-12.8.11.1","product_identification_helper":{"cpe":"cpe:2.3:a:apport_project:apport:0.114:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/apport@0.114-12.8.11.1?upstream=apport-0.114-12.8.11.1.src.rpm"}}},{"category":"product_version","name":"apport-crashdb-sle","product":{"name":"apport-crashdb-sle","product_id":"apport-crashdb-sle","product_identification_helper":{"purl":"pkg:rpm/suse/apport-crashdb-sle@?upstream=ERROR_UNKNOWN.src.rpm"}}},{"category":"product_version","name":"apport-crashdb-sle-0.114-0.8.11.1","product":{"name":"apport-crashdb-sle-0.114-0.8.11.1","product_id":"apport-crashdb-sle-0.114-0.8.11.1","product_identification_helper":{"purl":"pkg:rpm/suse/apport-crashdb-sle@0.114-0.8.11.1?upstream=ERROR_UNKNOWN-0.114-0.8.11.1.src.rpm"}}},{"category":"product_version","name":"apport-gtk-0.114-12.8.11.1","product":{"name":"apport-gtk-0.114-12.8.11.1","product_id":"apport-gtk-0.114-12.8.11.1","product_identification_helper":{"cpe":"cpe:2.3:a:apport_project:apport:0.114:*:*:*:*:*:*:*","purl":"pkg:rpm/suse/apport-gtk@0.114-12.8.11.1?upstream=apport-0.114-12.8.11.1.src.rpm"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"apport-0.114-12.8.11.1 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:apport-0.114-12.8.11.1"},"product_reference":"apport-0.114-12.8.11.1","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"apport-crashdb-sle-0.114-0.8.11.1 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:apport-crashdb-sle-0.114-0.8.11.1"},"product_reference":"apport-crashdb-sle-0.114-0.8.11.1","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"apport-gtk-0.114-12.8.11.1 as component of SUSE Linux Enterprise Server 11 SP1-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP1-TERADATA:apport-gtk-0.114-12.8.11.1"},"product_reference":"apport-gtk-0.114-12.8.11.1","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP1-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"apport-0.114-12.8.11.1 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP3-TERADATA:apport-0.114-12.8.11.1"},"product_reference":"apport-0.114-12.8.11.1","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP3-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"apport-crashdb-sle-0.114-0.8.11.1 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP3-TERADATA:apport-crashdb-sle-0.114-0.8.11.1"},"product_reference":"apport-crashdb-sle-0.114-0.8.11.1","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP3-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"apport-gtk-0.114-12.8.11.1 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA","product_id":"SUSE Linux Enterprise Server 11 SP3-TERADATA:apport-gtk-0.114-12.8.11.1"},"product_reference":"apport-gtk-0.114-12.8.11.1","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP3-TERADATA"},{"category":"default_component_of","full_product_name":{"name":"apport-crashdb-sle as component of SUSE Linux Enterprise Server 11 SP4 LTSS","product_id":"SUSE Linux Enterprise Server 11 SP4 LTSS:apport-crashdb-sle"},"product_reference":"apport-crashdb-sle","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP4 LTSS"}]},"vulnerabilities":[{"cve":"CVE-2019-15790","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2019-15790"}],"notes":[{"category":"general","text":"Apport reads and writes information on a crashed process to /proc/pid with elevated privileges. Apport then determines which user the crashed process belongs to by reading /proc/pid through get_pid_info() in data/apport. An unprivileged user could exploit this to read information about a privileged running process by exploiting PID recycling. This information could then be used to obtain ASLR offsets for a process with an existing memory corruption vulnerability. The initial fix introduced regressions in the Python Apport library due to a missing argument in Report.add_proc_environ in apport/report.py. It also caused an autopkgtest failure when reading /proc/pid and with Python 2 compatibility by reading /proc maps. The initial and subsequent regression fixes are in 2.20.11-0ubuntu16, 2.20.11-0ubuntu8.6, 2.20.9-0ubuntu7.12, 2.20.1-0ubuntu2.22 and 2.14.1-0ubuntu3.29+esm3.","title":"CVE description"}],"product_status":{"known_affected":["SUSE Linux Enterprise Server 11 SP4 LTSS:apport-crashdb-sle"],"recommended":["SUSE Linux Enterprise Server 11 SP1-TERADATA:apport-0.114-12.8.11.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:apport-crashdb-sle-0.114-0.8.11.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:apport-gtk-0.114-12.8.11.1","SUSE Linux Enterprise Server 11 SP3-TERADATA:apport-0.114-12.8.11.1","SUSE Linux Enterprise Server 11 SP3-TERADATA:apport-crashdb-sle-0.114-0.8.11.1","SUSE Linux Enterprise Server 11 SP3-TERADATA:apport-gtk-0.114-12.8.11.1"]},"references":[{"category":"external","summary":"CVE-2019-15790","url":"https://www.suse.com/security/cve/CVE-2019-15790"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1155482 for CVE-2019-15790","url":"https://bugzilla.suse.com/1155482"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 11 SP1-TERADATA:apport-0.114-12.8.11.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:apport-crashdb-sle-0.114-0.8.11.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:apport-gtk-0.114-12.8.11.1","SUSE Linux Enterprise Server 11 SP3-TERADATA:apport-0.114-12.8.11.1","SUSE Linux Enterprise Server 11 SP3-TERADATA:apport-crashdb-sle-0.114-0.8.11.1","SUSE Linux Enterprise Server 11 SP3-TERADATA:apport-gtk-0.114-12.8.11.1"]}],"scores":[{"cvss_v3":{"baseScore":3.3,"baseSeverity":"LOW","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","version":"3.0"},"products":["SUSE Linux Enterprise Server 11 SP1-TERADATA:apport-0.114-12.8.11.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:apport-crashdb-sle-0.114-0.8.11.1","SUSE Linux Enterprise Server 11 SP1-TERADATA:apport-gtk-0.114-12.8.11.1","SUSE Linux Enterprise Server 11 SP3-TERADATA:apport-0.114-12.8.11.1","SUSE Linux Enterprise Server 11 SP3-TERADATA:apport-crashdb-sle-0.114-0.8.11.1","SUSE Linux Enterprise Server 11 SP3-TERADATA:apport-gtk-0.114-12.8.11.1"]}],"threats":[{"category":"impact","date":"2019-10-30T16:28:22Z","details":"low"}],"title":"CVE-2019-15790"}]}