CVE-2019-11485
- EPSS 0.09%
- Veröffentlicht 08.02.2020 05:15:13
- Zuletzt bearbeitet 21.11.2024 04:21:10
Sander Bos discovered Apport's lock file was in a world-writable directory which allowed all users to prevent crash handling.
CVE-2019-11483
- EPSS 0.11%
- Veröffentlicht 08.02.2020 05:15:13
- Zuletzt bearbeitet 21.11.2024 04:21:10
Sander Bos discovered Apport mishandled crash dumps originating from containers. This could be used by a local attacker to generate a crash report for a privileged process that is readable by an unprivileged user.
CVE-2019-11481
- EPSS 0.18%
- Veröffentlicht 08.02.2020 05:15:12
- Zuletzt bearbeitet 21.11.2024 04:21:10
Kevin Backhouse discovered that apport would read a user-supplied configuration file with elevated privileges. By replacing the file with a symbolic link, a user could get apport to read any file on the system as root, with unknown consequences.
- EPSS 0.03%
- Veröffentlicht 29.08.2019 15:15:11
- Zuletzt bearbeitet 21.11.2024 04:47:58
Apport before versions 2.14.1-0ubuntu3.29+esm1, 2.20.1-0ubuntu2.19, 2.20.9-0ubuntu7.7, 2.20.10-0ubuntu27.1, 2.20.11-0ubuntu5 contained a TOCTTOU vulnerability when reading the users ~/.apport-ignore.xml file, which allows a local attacker to replace ...
CVE-2018-6552
- EPSS 0.03%
- Veröffentlicht 31.05.2018 22:29:00
- Zuletzt bearbeitet 21.11.2024 04:10:53
Apport does not properly handle crashes originating from a PID namespace allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion, possibly gain root privileges, or e...
CVE-2017-14180
- EPSS 0.05%
- Veröffentlicht 02.02.2018 14:29:00
- Zuletzt bearbeitet 21.11.2024 03:12:18
Apport 2.13 through 2.20.7 does not properly handle crashes originating from a PID namespace allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion or possibly gain...
CVE-2017-14179
- EPSS 0.03%
- Veröffentlicht 02.02.2018 14:29:00
- Zuletzt bearbeitet 21.11.2024 03:12:18
Apport before 2.13 does not properly handle crashes originating from a PID namespace allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion, possibly gain root priv...
CVE-2017-14177
- EPSS 0.05%
- Veröffentlicht 02.02.2018 14:29:00
- Zuletzt bearbeitet 21.11.2024 03:12:18
Apport through 2.20.7 does not properly handle core dumps from setuid binaries allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion or possibly gain root privileg...
CVE-2017-10708
- EPSS 0.78%
- Veröffentlicht 18.07.2017 20:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
An issue was discovered in Apport through 2.20.x. In apport/report.py, Apport sets the ExecutablePath field and it then uses the path to run package specific hooks without protecting against path traversal. This allows remote attackers to execute arb...
CVE-2016-9951
- EPSS 9.96%
- Veröffentlicht 17.12.2016 03:59:00
- Zuletzt bearbeitet 12.04.2025 10:46:40
An issue was discovered in Apport before 2.20.4. A malicious Apport crash file can contain a restart command in `RespawnCommand` or `ProcCmdline` fields. This command will be executed if a user clicks the Relaunch button on the Apport prompt from the...