CVE-2025-5054
- EPSS 0.02%
- Published 30.05.2025 17:37:01
- Last modified 22.08.2025 19:36:15
Race condition in Canonical apport up to and including 2.32.0 allows a local attacker to leak sensitive information via PID-reuse by leveraging namespaces. When handling a crash, the function `_check_global_pid_and_forward`, which detects if the ...
CVE-2020-11936
- EPSS 0.05%
- Published 31.01.2025 02:15:28
- Last modified 26.08.2025 17:49:17
gdbus setgid privilege escalation
CVE-2022-28653
- EPSS 0.17%
- Published 31.01.2025 01:15:08
- Last modified 26.08.2025 17:49:27
Users can consume unlimited disk space in /var/crash
CVE-2022-1242
- EPSS 0.04%
- Published 03.06.2024 19:15:09
- Last modified 22.08.2025 15:48:00
Apport can be tricked into connecting to arbitrary sockets as the root user
CVE-2021-3899
- EPSS 2.34%
- Published 03.06.2024 19:15:08
- Last modified 26.08.2025 17:21:04
There is a race condition in the 'replaced executable' detection that, with the correct local configuration, allow an attacker to execute arbitrary code as root.
CVE-2023-1326
- EPSS 4.08%
- Published 13.04.2023 23:15:07
- Last modified 21.11.2024 07:38:55
A privilege escalation attack was found in apport-cli 2.26.0 and earlier which is similar to CVE-2023-26604. If a system is specially configured to allow unprivileged users to run sudo apport-cli, less is configured as the pager, and the terminal siz...
CVE-2021-3710
- EPSS 0.05%
- Published 01.10.2021 03:15:07
- Last modified 21.11.2024 06:22:12
An information disclosure via path traversal was discovered in apport/hookutils.py function read_file(). This issue affects: apport 2.14.1 versions prior to 2.14.1-0ubuntu3.29+esm8; 2.20.1 versions prior to 2.20.1-0ubuntu2.30+esm2; 2.20.9 versions pr...
CVE-2021-3709
- EPSS 0.07%
- Published 01.10.2021 03:15:06
- Last modified 21.11.2024 06:22:12
Function check_attachment_for_errors() in file data/general-hooks/ubuntu.py could be tricked into exposing private data via a constructed crash file. This issue affects: apport 2.14.1 versions prior to 2.14.1-0ubuntu3.29+esm8; 2.20.1 versions prior t...
CVE-2021-32556
- EPSS 0.09%
- Published 12.06.2021 04:15:12
- Last modified 21.11.2024 06:07:15
It was discovered that the get_modified_conffiles() function in backends/packaging-apt-dpkg.py allowed injecting modified package names in a manner that would confuse the dpkg(1) call.
CVE-2021-32557
- EPSS 0.06%
- Published 12.06.2021 04:15:12
- Last modified 21.11.2024 06:07:15
It was discovered that the process_report() function in data/whoopsie-upload-all allowed arbitrary file writes via symlinks.