Search CVE reports
1 – 10 of 23 results
CVE-2023-1326
Medium priorityA privilege escalation attack was found in apport-cli 2.26.0 and earlier which is similar to CVE-2023-26604. If a system is specially configured to allow unprivileged users to run sudo apport-cli, less is configured as the pager,...
1 affected packages
apport
Package | 22.04 LTS |
---|---|
apport | Fixed |
CVE-2022-28658
Medium priorityApport argument parsing mishandles filename splitting on older kernels resulting in argument spoofing
1 affected packages
apport
Package | 22.04 LTS |
---|---|
apport | Fixed |
CVE-2022-28657
Medium priorityApport does not disable python crash handler before entering chroot
1 affected packages
apport
Package | 22.04 LTS |
---|---|
apport | Fixed |
CVE-2022-28656
Low priorityis_closing_session() allows users to consume RAM in the Apport process
1 affected packages
apport
Package | 22.04 LTS |
---|---|
apport | Fixed |
CVE-2022-28655
Medium priorityis_closing_session() allows users to create arbitrary tcp dbus connections
1 affected packages
apport
Package | 22.04 LTS |
---|---|
apport | Fixed |
CVE-2022-28654
Medium priorityis_closing_session() allows users to fill up apport.log
1 affected packages
apport
Package | 22.04 LTS |
---|---|
apport | Fixed |
CVE-2022-28653
Low priorityUsers can consume unlimited disk space in /var/crash
1 affected packages
apport
Package | 22.04 LTS |
---|---|
apport | Ignored |
CVE-2022-28652
Medium priority~/.config/apport/settings parsing is vulnerable to "billion laughs" attack
1 affected packages
apport
Package | 22.04 LTS |
---|---|
apport | Fixed |
CVE-2022-1242
Medium priorityApport can be tricked into connecting to arbitrary sockets as the root user
1 affected packages
apport
Package | 22.04 LTS |
---|---|
apport | Fixed |
CVE-2021-3899
Medium priorityThere is a race condition in the 'replaced executable' detection that, with the correct local configuration, allow an attacker to execute arbitrary code as root.
1 affected packages
apport
Package | 22.04 LTS |
---|---|
apport | Fixed |