Apport Project Apport vulnerabilities
17 known vulnerabilities affecting apport_project/apport.
Total CVEs
17
CISA KEV
0
Public exploits
5
Exploited in wild
0
Severity breakdown
HIGH12MEDIUM5
Vulnerabilities
Page 1 of 1
CVE-2022-28657HIGHCVSS 7.8fixed in 2.21.02024-06-04
CVE-2022-28657 [HIGH] CWE-400 CVE-2022-28657: Apport does not disable python crash handler before entering chroot
Apport does not disable python crash handler before entering chroot
nvd
CVE-2022-28655HIGHCVSS 7.1fixed in 2.21.02024-06-04
CVE-2022-28655 [HIGH] CWE-770 CVE-2022-28655: is_closing_session() allows users to create arbitrary tcp dbus connections
is_closing_session() allows users to create arbitrary tcp dbus connections
nvd
CVE-2022-28656MEDIUMCVSS 5.5fixed in 2.21.02024-06-04
CVE-2022-28656 [MEDIUM] CWE-770 CVE-2022-28656: is_closing_session() allows users to consume RAM in the Apport process
is_closing_session() allows users to consume RAM in the Apport process
nvd
CVE-2022-28652MEDIUMCVSS 5.5fixed in 2.21.02024-06-04
CVE-2022-28652 [MEDIUM] CWE-776 CVE-2022-28652: ~/.config/apport/settings parsing is vulnerable to "billion laughs" attack
~/.config/apport/settings parsing is vulnerable to "billion laughs" attack
nvd
CVE-2022-28654MEDIUMCVSS 5.5fixed in 2.21.02024-06-04
CVE-2022-28654 [MEDIUM] CWE-770 CVE-2022-28654: is_closing_session() allows users to fill up apport.log
is_closing_session() allows users to fill up apport.log
nvd
CVE-2022-28658MEDIUMCVSS 5.5fixed in 2.21.02024-06-04
CVE-2022-28658 [MEDIUM] CVE-2022-28658: Apport argument parsing mishandles filename splitting on older kernels resulting in argument spoofin
Apport argument parsing mishandles filename splitting on older kernels resulting in argument spoofing
nvd
CVE-2019-7307HIGHCVSS 7.0v2.14.1v2.20.1+2 more2019-08-29
CVE-2019-7307 [HIGH] CWE-367 CVE-2019-7307: Apport before versions 2.14.1-0ubuntu3.29+esm1, 2.20.1-0ubuntu2.19, 2.20.9-0ubuntu7.7, 2.20.10-0ubun
Apport before versions 2.14.1-0ubuntu3.29+esm1, 2.20.1-0ubuntu2.19, 2.20.9-0ubuntu7.7, 2.20.10-0ubuntu27.1, 2.20.11-0ubuntu5 contained a TOCTTOU vulnerability when reading the users ~/.apport-ignore.xml file, which allows a local attacker to replace this file with a symlink to any other file on the system and so cause Apport to include the contents of t
nvd
CVE-2018-6552HIGHCVSS 7.8v2.14.1v2.20.9+2 more2018-05-31
CVE-2018-6552 [HIGH] CVE-2018-6552: Apport does not properly handle crashes originating from a PID namespace allowing local users to cre
Apport does not properly handle crashes originating from a PID namespace allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion, possibly gain root privileges, or escape from containers. The is_same_ns() function returns True when /proc// does not exist in order to indicate th
nvd
CVE-2017-14180HIGHCVSS 7.8≥ 2.13, ≤ 2.20.72018-02-02
CVE-2017-14180 [HIGH] CVE-2017-14180: Apport 2.13 through 2.20.7 does not properly handle crashes originating from a PID namespace allowin
Apport 2.13 through 2.20.7 does not properly handle crashes originating from a PID namespace allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion or possibly gain root privileges, a different vulnerability than CVE-2017-14179.
nvd
CVE-2017-14177HIGHCVSS 7.8≤ 2.20.72018-02-02
CVE-2017-14177 [HIGH] CVE-2017-14177: Apport through 2.20.7 does not properly handle core dumps from setuid binaries allowing local users
Apport through 2.20.7 does not properly handle core dumps from setuid binaries allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion or possibly gain root privileges. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1324.
nvd
CVE-2017-14179HIGHCVSS 7.8fixed in 2.132018-02-02
CVE-2017-14179 [HIGH] CWE-400 CVE-2017-14179: Apport before 2.13 does not properly handle crashes originating from a PID namespace allowing local
Apport before 2.13 does not properly handle crashes originating from a PID namespace allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion, possibly gain root privileges, or escape from containers.
nvd
CVE-2017-10708HIGHCVSS 7.8≤ 2.20.62017-07-18
CVE-2017-10708 [HIGH] CWE-22 CVE-2017-10708: An issue was discovered in Apport through 2.20.x. In apport/report.py, Apport sets the ExecutablePat
An issue was discovered in Apport through 2.20.x. In apport/report.py, Apport sets the ExecutablePath field and it then uses the path to run package specific hooks without protecting against path traversal. This allows remote attackers to execute arbitrary code via a crafted .crash file.
nvd
CVE-2016-9949HIGHCVSS 7.8PoC≤ 2.20.32016-12-17
CVE-2016-9949 [HIGH] CWE-94 CVE-2016-9949: An issue was discovered in Apport before 2.20.4. In apport/ui.py, Apport reads the CrashDB field and
An issue was discovered in Apport before 2.20.4. In apport/ui.py, Apport reads the CrashDB field and it then evaluates the field as Python code if it begins with a "{". This allows remote attackers to execute arbitrary Python code.
nvd
CVE-2016-9950HIGHCVSS 7.8PoC≤ 2.20.32016-12-17
CVE-2016-9950 [HIGH] CWE-22 CVE-2016-9950: An issue was discovered in Apport before 2.20.4. There is a path traversal issue in the Apport crash
An issue was discovered in Apport before 2.20.4. There is a path traversal issue in the Apport crash file "Package" and "SourcePackage" fields. These fields are used to build a path to the package specific hook files in the /usr/share/apport/package-hooks/ directory. An attacker can exploit this path traversal to execute arbitrary Python files from the l
nvd
CVE-2016-9951MEDIUMCVSS 6.5PoC≤ 2.20.32016-12-17
CVE-2016-9951 [MEDIUM] CWE-284 CVE-2016-9951: An issue was discovered in Apport before 2.20.4. A malicious Apport crash file can contain a restart
An issue was discovered in Apport before 2.20.4. A malicious Apport crash file can contain a restart command in `RespawnCommand` or `ProcCmdline` fields. This command will be executed if a user clicks the Relaunch button on the Apport prompt from the malicious crash file. The fix is to only show the Relaunch button on Apport crash files generated by l
nvd
CVE-2015-1338HIGHCVSS 7.2PoC≤ 2.18.12015-10-01
CVE-2015-1338 [HIGH] CWE-59 CVE-2015-1338: kernel_crashdump in Apport before 2.19 allows local users to cause a denial of service (disk consump
kernel_crashdump in Apport before 2.19 allows local users to cause a denial of service (disk consumption) or possibly gain privileges via a (1) symlink or (2) hard link attack on /var/crash/vmcore.log.
nvd
CVE-2015-1318HIGHCVSS 7.2PoCv2.13v2.13.1+16 more2015-04-17
CVE-2015-1318 [HIGH] CWE-264 CVE-2015-1318: The crash reporting feature in Apport 2.13 through 2.17.x before 2.17.1 allows local users to gain p
The crash reporting feature in Apport 2.13 through 2.17.x before 2.17.1 allows local users to gain privileges via a crafted usr/share/apport/apport file in a namespace (container).
nvd