Hi Felix - thanks for the report! I don't immediately see how an attacker could have control of what Apport uses for ExecutablePath in the crash file. Is there more to your attack than hand crafting a .crash file and running apport-gtk on it or am I missing something here?
Hi Felix - thanks for the report! I don't immediately see how an attacker could have control of what Apport uses for ExecutablePath in the crash file. Is there more to your attack than hand crafting a .crash file and running apport-gtk on it or am I missing something here?
Subscribing bdmurray for Ubuntu apport expertise.