Apport Project

Apport

24 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.09%
  • Published 08.02.2020 05:15:13
  • Last modified 21.11.2024 04:21:10

Sander Bos discovered Apport's lock file was in a world-writable directory which allowed all users to prevent crash handling.

  • EPSS 0.11%
  • Published 08.02.2020 05:15:13
  • Last modified 21.11.2024 04:21:10

Sander Bos discovered Apport mishandled crash dumps originating from containers. This could be used by a local attacker to generate a crash report for a privileged process that is readable by an unprivileged user.

  • EPSS 0.18%
  • Published 08.02.2020 05:15:12
  • Last modified 21.11.2024 04:21:10

Kevin Backhouse discovered that apport would read a user-supplied configuration file with elevated privileges. By replacing the file with a symbolic link, a user could get apport to read any file on the system as root, with unknown consequences.

Exploit
  • EPSS 0.03%
  • Published 29.08.2019 15:15:11
  • Last modified 21.11.2024 04:47:58

Apport before versions 2.14.1-0ubuntu3.29+esm1, 2.20.1-0ubuntu2.19, 2.20.9-0ubuntu7.7, 2.20.10-0ubuntu27.1, 2.20.11-0ubuntu5 contained a TOCTTOU vulnerability when reading the users ~/.apport-ignore.xml file, which allows a local attacker to replace ...

  • EPSS 0.03%
  • Published 31.05.2018 22:29:00
  • Last modified 21.11.2024 04:10:53

Apport does not properly handle crashes originating from a PID namespace allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion, possibly gain root privileges, or e...

  • EPSS 0.05%
  • Published 02.02.2018 14:29:00
  • Last modified 21.11.2024 03:12:18

Apport 2.13 through 2.20.7 does not properly handle crashes originating from a PID namespace allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion or possibly gain...

  • EPSS 0.03%
  • Published 02.02.2018 14:29:00
  • Last modified 21.11.2024 03:12:18

Apport before 2.13 does not properly handle crashes originating from a PID namespace allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion, possibly gain root priv...

  • EPSS 0.05%
  • Published 02.02.2018 14:29:00
  • Last modified 21.11.2024 03:12:18

Apport through 2.20.7 does not properly handle core dumps from setuid binaries allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion or possibly gain root privileg...

  • EPSS 0.78%
  • Published 18.07.2017 20:29:00
  • Last modified 20.04.2025 01:37:25

An issue was discovered in Apport through 2.20.x. In apport/report.py, Apport sets the ExecutablePath field and it then uses the path to run package specific hooks without protecting against path traversal. This allows remote attackers to execute arb...

Exploit
  • EPSS 9.96%
  • Published 17.12.2016 03:59:00
  • Last modified 12.04.2025 10:46:40

An issue was discovered in Apport before 2.20.4. A malicious Apport crash file can contain a restart command in `RespawnCommand` or `ProcCmdline` fields. This command will be executed if a user clicks the Relaunch button on the Apport prompt from the...