Vulnerabilities > Canonical > Apport
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-10-01 | CVE-2021-3709 | Path Traversal vulnerability in Canonical Apport Function check_attachment_for_errors() in file data/general-hooks/ubuntu.py could be tricked into exposing private data via a constructed crash file. | 5.5 |
2021-10-01 | CVE-2021-3710 | Path Traversal vulnerability in Canonical Apport An information disclosure via path traversal was discovered in apport/hookutils.py function read_file(). | 4.7 |
2021-06-12 | CVE-2021-32556 | OS Command Injection vulnerability in Canonical Apport It was discovered that the get_modified_conffiles() function in backends/packaging-apt-dpkg.py allowed injecting modified package names in a manner that would confuse the dpkg(1) call. | 2.1 |
2021-06-12 | CVE-2021-32557 | Link Following vulnerability in Canonical Apport It was discovered that the process_report() function in data/whoopsie-upload-all allowed arbitrary file writes via symlinks. | 3.6 |
2021-06-11 | CVE-2021-25682 | Injection vulnerability in Canonical Apport It was discovered that the get_pid_info() function in data/apport did not properly parse the /proc/pid/status file from the kernel. | 7.2 |
2021-06-11 | CVE-2021-25683 | Improper Input Validation vulnerability in Canonical Apport It was discovered that the get_starttime() function in data/apport did not properly parse the /proc/pid/stat file from the kernel. | 7.2 |
2021-06-11 | CVE-2021-25684 | Improper Input Validation vulnerability in Canonical Apport It was discovered that apport in data/apport did not properly open a report file to prevent hanging reads on a FIFO. | 4.6 |
2020-08-06 | CVE-2020-15702 | Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Canonical Apport TOCTOU Race Condition vulnerability in apport allows a local attacker to escalate privileges and execute arbitrary code. | 7.0 |
2020-08-06 | CVE-2020-15701 | Improper Handling of Exceptional Conditions vulnerability in Canonical Apport An unhandled exception in check_ignored() in apport/report.py can be exploited by a local attacker to cause a denial of service. | 5.5 |
2019-04-22 | CVE-2015-1341 | Permissions, Privileges, and Access Controls vulnerability in Canonical Apport and Ubuntu Linux Any Python module in sys.path can be imported if the command line of the process triggering the coredump is Python and the first argument is -m in Apport before 2.19.2 function _python_module_path. | 7.2 |