Vulnerabilities > Canonical > Apport > High

DATE CVE VULNERABILITY TITLE RISK
2023-04-13 CVE-2023-1326 Improper Privilege Management vulnerability in Canonical Apport
A privilege escalation attack was found in apport-cli 2.26.0 and earlier which is similar to CVE-2023-26604.
local
low complexity
canonical CWE-269
7.8
2021-06-12 CVE-2021-32557 Link Following vulnerability in Canonical Apport
It was discovered that the process_report() function in data/whoopsie-upload-all allowed arbitrary file writes via symlinks.
local
low complexity
canonical CWE-59
7.1
2021-06-11 CVE-2021-25682 Injection vulnerability in Canonical Apport
It was discovered that the get_pid_info() function in data/apport did not properly parse the /proc/pid/status file from the kernel.
local
low complexity
canonical CWE-74
7.8
2021-06-11 CVE-2021-25683 Improper Input Validation vulnerability in Canonical Apport
It was discovered that the get_starttime() function in data/apport did not properly parse the /proc/pid/stat file from the kernel.
local
low complexity
canonical CWE-20
7.8
2021-06-11 CVE-2021-25684 Improper Input Validation vulnerability in Canonical Apport
It was discovered that apport in data/apport did not properly open a report file to prevent hanging reads on a FIFO.
local
low complexity
canonical CWE-20
7.8
2020-08-06 CVE-2020-15702 Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Canonical Apport
TOCTOU Race Condition vulnerability in apport allows a local attacker to escalate privileges and execute arbitrary code.
local
high complexity
canonical CWE-367
7.0
2019-04-22 CVE-2015-1341 Permissions, Privileges, and Access Controls vulnerability in Canonical Apport and Ubuntu Linux
Any Python module in sys.path can be imported if the command line of the process triggering the coredump is Python and the first argument is -m in Apport before 2.19.2 function _python_module_path.
local
low complexity
canonical CWE-264
7.8