Search Results (37 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2022-28653 1 Canonical 1 Apport 2025-08-26 7.5 High
Users can consume unlimited disk space in /var/crash
CVE-2020-11936 1 Canonical 1 Apport 2025-08-26 3.1 Low
gdbus setgid privilege escalation
CVE-2021-3899 1 Canonical 2 Apport, Ubuntu Linux 2025-08-26 7.8 High
There is a race condition in the 'replaced executable' detection that, with the correct local configuration, allow an attacker to execute arbitrary code as root.
CVE-2025-5054 1 Canonical 2 Apport, Ubuntu Linux 2025-08-22 4.7 Medium
Race condition in Canonical apport up to and including 2.32.0 allows a local attacker to leak sensitive information via PID-reuse by leveraging namespaces. When handling a crash, the function `_check_global_pid_and_forward`, which detects if the crashing process resided in a container, was being called before `consistency_checks`, which attempts to detect if the crashing process had been replaced. Because of this, if a process crashed and was quickly replaced with a containerized one, apport could be made to forward the core dump to the container, potentially leaking sensitive information. `consistency_checks` is now being called before `_check_global_pid_and_forward`. Additionally, given that the PID-reuse race condition cannot be reliably detected from userspace alone, crashes are only forwarded to containers if the kernel provided a pidfd, or if the crashing process was unprivileged (i.e., if dump mode == 1).
CVE-2022-1242 1 Canonical 2 Apport, Ubuntu Linux 2025-08-22 7.8 High
Apport can be tricked into connecting to arbitrary sockets as the root user
CVE-2016-9949 2 Apport Project, Canonical 2 Apport, Ubuntu Linux 2025-04-12 N/A
An issue was discovered in Apport before 2.20.4. In apport/ui.py, Apport reads the CrashDB field and it then evaluates the field as Python code if it begins with a "{". This allows remote attackers to execute arbitrary Python code.
CVE-2015-1338 2 Apport Project, Canonical 2 Apport, Ubuntu Linux 2025-04-12 N/A
kernel_crashdump in Apport before 2.19 allows local users to cause a denial of service (disk consumption) or possibly gain privileges via a (1) symlink or (2) hard link attack on /var/crash/vmcore.log.
CVE-2016-9950 2 Apport Project, Canonical 2 Apport, Ubuntu Linux 2025-04-12 N/A
An issue was discovered in Apport before 2.20.4. There is a path traversal issue in the Apport crash file "Package" and "SourcePackage" fields. These fields are used to build a path to the package specific hook files in the /usr/share/apport/package-hooks/ directory. An attacker can exploit this path traversal to execute arbitrary Python files from the local system.
CVE-2022-28656 2 Apport Project, Canonical 2 Apport, Ubuntu Linux 2025-03-19 5.5 Medium
is_closing_session() allows users to consume RAM in the Apport process
CVE-2022-28652 2 Apport Project, Canonical 2 Apport, Ubuntu Linux 2025-03-13 5.5 Medium
~/.config/apport/settings parsing is vulnerable to "billion laughs" attack
CVE-2023-1326 1 Canonical 2 Apport, Ubuntu Linux 2025-02-07 7.7 High
A privilege escalation attack was found in apport-cli 2.26.0 and earlier which is similar to CVE-2023-26604. If a system is specially configured to allow unprivileged users to run sudo apport-cli, less is configured as the pager, and the terminal size can be set: a local attacker can escalate privilege. It is extremely unlikely that a system administrator would configure sudo to allow unprivileged users to perform this class of exploit.
CVE-2022-28658 2 Apport Project, Canonical 2 Apport, Ubuntu Linux 2024-11-21 5.5 Medium
Apport argument parsing mishandles filename splitting on older kernels resulting in argument spoofing
CVE-2022-28657 2 Apport Project, Canonical 2 Apport, Ubuntu Linux 2024-11-21 7.8 High
Apport does not disable python crash handler before entering chroot
CVE-2022-28655 2 Apport Project, Canonical 2 Apport, Ubuntu Linux 2024-11-21 7.1 High
is_closing_session() allows users to create arbitrary tcp dbus connections
CVE-2022-28654 2 Apport Project, Canonical 2 Apport, Ubuntu Linux 2024-11-21 5.5 Medium
is_closing_session() allows users to fill up apport.log
CVE-2021-3710 1 Canonical 2 Apport, Ubuntu Linux 2024-11-21 6.5 Medium
An information disclosure via path traversal was discovered in apport/hookutils.py function read_file(). This issue affects: apport 2.14.1 versions prior to 2.14.1-0ubuntu3.29+esm8; 2.20.1 versions prior to 2.20.1-0ubuntu2.30+esm2; 2.20.9 versions prior to 2.20.9-0ubuntu7.26; 2.20.11 versions prior to 2.20.11-0ubuntu27.20; 2.20.11 versions prior to 2.20.11-0ubuntu65.3;
CVE-2021-3709 1 Canonical 2 Apport, Ubuntu Linux 2024-11-21 6.5 Medium
Function check_attachment_for_errors() in file data/general-hooks/ubuntu.py could be tricked into exposing private data via a constructed crash file. This issue affects: apport 2.14.1 versions prior to 2.14.1-0ubuntu3.29+esm8; 2.20.1 versions prior to 2.20.1-0ubuntu2.30+esm2; 2.20.9 versions prior to 2.20.9-0ubuntu7.26; 2.20.11 versions prior to 2.20.11-0ubuntu27.20; 2.20.11 versions prior to 2.20.11-0ubuntu65.3;
CVE-2021-32557 1 Canonical 1 Apport 2024-11-21 5.2 Medium
It was discovered that the process_report() function in data/whoopsie-upload-all allowed arbitrary file writes via symlinks.
CVE-2021-32556 1 Canonical 1 Apport 2024-11-21 3.8 Low
It was discovered that the get_modified_conffiles() function in backends/packaging-apt-dpkg.py allowed injecting modified package names in a manner that would confuse the dpkg(1) call.
CVE-2021-25684 1 Canonical 1 Apport 2024-11-21 8.8 High
It was discovered that apport in data/apport did not properly open a report file to prevent hanging reads on a FIFO.