Canonical

Apport

16 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.02%
  • Published 30.05.2025 17:37:01
  • Last modified 22.08.2025 19:36:15

Race condition in Canonical apport up to and including 2.32.0 allows a local attacker to leak sensitive information via PID-reuse by leveraging namespaces. When handling a crash, the function `_check_global_pid_and_forward`, which detects if the ...

Exploit
  • EPSS 0.05%
  • Published 31.01.2025 02:15:28
  • Last modified 26.08.2025 17:49:17

gdbus setgid privilege escalation

  • EPSS 0.17%
  • Published 31.01.2025 01:15:08
  • Last modified 26.08.2025 17:49:27

Users can consume unlimited disk space in /var/crash

  • EPSS 0.04%
  • Published 03.06.2024 19:15:09
  • Last modified 22.08.2025 15:48:00

Apport can be tricked into connecting to arbitrary sockets as the root user

  • EPSS 2.34%
  • Published 03.06.2024 19:15:08
  • Last modified 26.08.2025 17:21:04

There is a race condition in the 'replaced executable' detection that, with the correct local configuration, allow an attacker to execute arbitrary code as root.

  • EPSS 4.08%
  • Published 13.04.2023 23:15:07
  • Last modified 21.11.2024 07:38:55

A privilege escalation attack was found in apport-cli 2.26.0 and earlier which is similar to CVE-2023-26604. If a system is specially configured to allow unprivileged users to run sudo apport-cli, less is configured as the pager, and the terminal siz...

Exploit
  • EPSS 0.05%
  • Published 01.10.2021 03:15:07
  • Last modified 21.11.2024 06:22:12

An information disclosure via path traversal was discovered in apport/hookutils.py function read_file(). This issue affects: apport 2.14.1 versions prior to 2.14.1-0ubuntu3.29+esm8; 2.20.1 versions prior to 2.20.1-0ubuntu2.30+esm2; 2.20.9 versions pr...

Exploit
  • EPSS 0.07%
  • Published 01.10.2021 03:15:06
  • Last modified 21.11.2024 06:22:12

Function check_attachment_for_errors() in file data/general-hooks/ubuntu.py could be tricked into exposing private data via a constructed crash file. This issue affects: apport 2.14.1 versions prior to 2.14.1-0ubuntu3.29+esm8; 2.20.1 versions prior t...

  • EPSS 0.09%
  • Published 12.06.2021 04:15:12
  • Last modified 21.11.2024 06:07:15

It was discovered that the get_modified_conffiles() function in backends/packaging-apt-dpkg.py allowed injecting modified package names in a manner that would confuse the dpkg(1) call.

Exploit
  • EPSS 0.06%
  • Published 12.06.2021 04:15:12
  • Last modified 21.11.2024 06:07:15

It was discovered that the process_report() function in data/whoopsie-upload-all allowed arbitrary file writes via symlinks.