Your submission was sent successfully! Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

Search CVE reports


Toggle filters

1 – 10 of 46 results

Status is adjusted based on your filters.


CVE-2022-28658

Medium priority
Fixed

Apport argument parsing mishandles filename splitting on older kernels resulting in argument spoofing

1 affected packages

apport

Package 16.04 LTS
apport Fixed
Show less packages

CVE-2022-28657

Medium priority
Fixed

Apport does not disable python crash handler before entering chroot

1 affected packages

apport

Package 16.04 LTS
apport Fixed
Show less packages

CVE-2022-28656

Low priority
Fixed

is_closing_session() allows users to consume RAM in the Apport process

1 affected packages

apport

Package 16.04 LTS
apport Fixed
Show less packages

CVE-2022-28655

Medium priority
Fixed

is_closing_session() allows users to create arbitrary tcp dbus connections

1 affected packages

apport

Package 16.04 LTS
apport Fixed
Show less packages

CVE-2022-28654

Medium priority
Fixed

is_closing_session() allows users to fill up apport.log

1 affected packages

apport

Package 16.04 LTS
apport Fixed
Show less packages

CVE-2022-28652

Medium priority
Fixed

~/.config/apport/settings parsing is vulnerable to "billion laughs" attack

1 affected packages

apport

Package 16.04 LTS
apport Fixed
Show less packages

CVE-2022-1242

Medium priority
Fixed

Apport can be tricked into connecting to arbitrary sockets as the root user

1 affected packages

apport

Package 16.04 LTS
apport Fixed
Show less packages

CVE-2021-3899

Medium priority
Fixed

There is a race condition in the 'replaced executable' detection that, with the correct local configuration, allow an attacker to execute arbitrary code as root.

1 affected packages

apport

Package 16.04 LTS
apport Fixed
Show less packages

CVE-2021-3710

Medium priority
Fixed

An information disclosure via path traversal was discovered in apport/hookutils.py function read_file(). This issue affects: apport 2.14.1 versions prior to 2.14.1-0ubuntu3.29+esm8; 2.20.1 versions prior...

1 affected packages

apport

Package 16.04 LTS
apport Fixed
Show less packages

CVE-2021-3709

Medium priority
Fixed

Function check_attachment_for_errors() in file data/general-hooks/ubuntu.py could be tricked into exposing private data via a constructed crash file. This issue affects: apport 2.14.1 versions prior to 2.14.1-0ubuntu3.29+esm8;...

1 affected packages

apport

Package 16.04 LTS
apport Fixed
Show less packages