An issue was discovered in Apport before 2.20.4. In apport/ui.py, Apport reads the CrashDB field and it then evaluates the field as Python code if it begins with a "{". This allows remote attackers to execute arbitrary Python code.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-9949.json"
[ { "events": [ { "introduced": "0" }, { "last_affected": "2.20.3" } ] }, { "events": [ { "introduced": "0" }, { "last_affected": "12.10" } ] } ]