CVE-2022-28658
- EPSS 0.04%
- Published 04.06.2024 22:15:10
- Last modified 21.11.2024 06:57:40
Apport argument parsing mishandles filename splitting on older kernels resulting in argument spoofing
CVE-2022-28657
- EPSS 0.04%
- Published 04.06.2024 22:15:10
- Last modified 21.11.2024 06:57:40
Apport does not disable python crash handler before entering chroot
CVE-2022-28656
- EPSS 0.04%
- Published 04.06.2024 22:15:10
- Last modified 19.03.2025 18:15:17
is_closing_session() allows users to consume RAM in the Apport process
CVE-2022-28655
- EPSS 0.04%
- Published 04.06.2024 22:15:09
- Last modified 21.11.2024 06:57:39
is_closing_session() allows users to create arbitrary tcp dbus connections
CVE-2022-28654
- EPSS 0.04%
- Published 04.06.2024 22:15:09
- Last modified 21.11.2024 06:57:39
is_closing_session() allows users to fill up apport.log
CVE-2022-28652
- EPSS 0.04%
- Published 04.06.2024 22:15:09
- Last modified 13.03.2025 19:15:38
~/.config/apport/settings parsing is vulnerable to "billion laughs" attack
CVE-2019-15790
- EPSS 0.07%
- Published 28.04.2020 00:15:12
- Last modified 21.11.2024 04:29:28
Apport reads and writes information on a crashed process to /proc/pid with elevated privileges. Apport then determines which user the crashed process belongs to by reading /proc/pid through get_pid_info() in data/apport. An unprivileged user could ex...
CVE-2020-8833
- EPSS 0.03%
- Published 22.04.2020 22:15:12
- Last modified 21.11.2024 05:39:31
Time-of-check Time-of-use Race Condition vulnerability on crash report ownership change in Apport allows for a possible privilege escalation opportunity. If fs.protected_symlinks is disabled, this can be exploited between the os.open and os.chown cal...
CVE-2020-8831
- EPSS 0.12%
- Published 22.04.2020 22:15:12
- Last modified 21.11.2024 05:39:31
Apport creates a world writable lock file with root ownership in the world writable /var/lock/apport directory. If the apport/ directory does not exist (this is not uncommon as /var/lock is a tmpfs), it will create the directory, otherwise it will si...
CVE-2019-11482
- EPSS 0.09%
- Published 08.02.2020 05:15:13
- Last modified 21.11.2024 04:21:10
Sander Bos discovered a time of check to time of use (TOCTTOU) vulnerability in apport that allowed a user to cause core files to be written in arbitrary directories.