CVE ID | Published | Description | Score | Severity |
---|---|---|---|---|
22h03 +00:00 |
Apport argument parsing mishandles filename splitting on older kernels resulting in argument spoofing | 5.5 |
Medium |
|
22h02 +00:00 |
Apport does not disable python crash handler before entering chroot | 7.8 |
High |
|
21h58 +00:00 |
is_closing_session() allows users to consume RAM in the Apport process | 5.5 |
Medium |
|
21h56 +00:00 |
is_closing_session() allows users to create arbitrary tcp dbus connections | 7.1 |
High |
|
21h54 +00:00 |
is_closing_session() allows users to fill up apport.log | 5.5 |
Medium |
|
21h38 +00:00 |
~/.config/apport/settings parsing is vulnerable to "billion laughs" attack | 5.5 |
Medium |
|
22h00 +00:00 |
Apport does not properly handle crashes originating from a PID namespace allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion, possibly gain root privileges, or escape from containers. The is_same_ns() function returns True when /proc/ |
7.8 |
High |
|
14h00 +00:00 |
Apport through 2.20.7 does not properly handle core dumps from setuid binaries allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion or possibly gain root privileges. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1324. | 7.8 |
High |
|
14h00 +00:00 |
Apport 2.13 through 2.20.7 does not properly handle crashes originating from a PID namespace allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion or possibly gain root privileges, a different vulnerability than CVE-2017-14179. | 7.8 |
High |