Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apport vulnerabilities and exploits
(subscribe to this query)
3.6
CVSSv2
CVE-2021-32557
It exists that the process_report() function in data/whoopsie-upload-all allowed arbitrary file writes via symlinks.
Canonical Apport
2.1
CVSSv2
CVE-2021-32549
It exists that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-13 package apport hooks, it could expose private data to other local users.
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 20.10
Canonical Ubuntu Linux 21.04
Canonical Ubuntu Linux 21.10
7.2
CVSSv2
CVE-2021-25683
It exists that the get_starttime() function in data/apport did not properly parse the /proc/pid/stat file from the kernel.
Canonical Apport
7.2
CVSSv2
CVE-2021-25682
It exists that the get_pid_info() function in data/apport did not properly parse the /proc/pid/status file from the kernel.
Canonical Apport
4.6
CVSSv2
CVE-2021-25684
It exists that apport in data/apport did not properly open a report file to prevent hanging reads on a FIFO.
Canonical Apport
4.4
CVSSv2
CVE-2020-15702
TOCTOU Race Condition vulnerability in apport allows a local malicious user to escalate privileges and execute arbitrary code. An attacker may exit the crashed process and exploit PID recycling to spawn a root process with the same PID as the crashed process, which can then be us...
Canonical Apport 2.20.11-0ubuntu8
Canonical Apport 2.20.11-0ubuntu9
Canonical Apport 2.20.11-0ubuntu10
Canonical Apport 2.20.11-0ubuntu11
Canonical Apport 2.20.11-0ubuntu12
Canonical Apport 2.20.11-0ubuntu13
Canonical Apport 2.20.11-0ubuntu14
Canonical Apport 2.20.11-0ubuntu15
Canonical Apport 2.20.11-0ubuntu16
Canonical Apport 2.20.11-0ubuntu17
Canonical Apport 2.20.11-0ubuntu18
Canonical Apport 2.20.11-0ubuntu19
Canonical Apport 2.20.11-0ubuntu20
Canonical Apport 2.20.11-0ubuntu21
Canonical Apport 2.20.11-0ubuntu22
Canonical Apport 2.20.11-0ubuntu23
Canonical Apport 2.20.11-0ubuntu24
Canonical Apport 2.20.11-0ubuntu25
Canonical Apport 2.20.11-0ubuntu26
Canonical Apport 2.20.11-0ubuntu27
Canonical Apport 2.20.11-0ubuntu27.2
Canonical Apport 2.20.11-0ubuntu27.3
2.1
CVSSv2
CVE-2020-15701
An unhandled exception in check_ignored() in apport/report.py can be exploited by a local malicious user to cause a denial of service. If the mtime attribute is a string value in apport-ignore.xml, it will trigger an unhandled exception, resulting in a crash. Fixed in 2.20.1-0ubu...
Canonical Apport 2.20.11-0ubuntu8
Canonical Apport 2.20.11-0ubuntu9
Canonical Apport 2.20.11-0ubuntu10
Canonical Apport 2.20.11-0ubuntu11
Canonical Apport 2.20.11-0ubuntu12
Canonical Apport 2.20.11-0ubuntu13
Canonical Apport 2.20.11-0ubuntu14
Canonical Apport 2.20.11-0ubuntu15
Canonical Apport 2.20.11-0ubuntu16
Canonical Apport 2.20.11-0ubuntu17
Canonical Apport 2.20.11-0ubuntu18
Canonical Apport 2.20.11-0ubuntu19
Canonical Apport 2.20.11-0ubuntu20
Canonical Apport 2.20.11-0ubuntu21
Canonical Apport 2.20.11-0ubuntu22
Canonical Apport 2.20.11-0ubuntu23
Canonical Apport 2.20.11-0ubuntu24
Canonical Apport 2.20.11-0ubuntu25
Canonical Apport 2.20.11-0ubuntu26
Canonical Apport 2.20.11-0ubuntu27
Canonical Apport 2.20.11-0ubuntu27.2
Canonical Apport 2.20.11-0ubuntu27.3
2.1
CVSSv2
CVE-2019-15790
Apport reads and writes information on a crashed process to /proc/pid with elevated privileges. Apport then determines which user the crashed process belongs to by reading /proc/pid through get_pid_info() in data/apport. An unprivileged user could exploit this to read information...
Apport Project Apport -
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 19.10
2.1
CVSSv2
CVE-2020-8831
Apport creates a world writable lock file with root ownership in the world writable /var/lock/apport directory. If the apport/ directory does not exist (this is not uncommon as /var/lock is a tmpfs), it will create the directory, otherwise it will simply continue execution using ...
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 19.10
Canonical Ubuntu Linux 16.04
Apport Project Apport -
1.9
CVSSv2
CVE-2020-8833
Time-of-check Time-of-use Race Condition vulnerability on crash report ownership change in Apport allows for a possible privilege escalation opportunity. If fs.protected_symlinks is disabled, this can be exploited between the os.open and os.chown calls when the Apport cron script...
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 19.10
Canonical Ubuntu Linux 16.04
Apport Project Apport -
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48654
CVE-2024-2757
authentication bypass
CVE-2024-3194
CVE-2024-33640
CVE-2024-21111
dos
insecure direct object reference
CVE-2024-21345
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »