Apport project Apport 2.16.2

CPE Details

Apport project Apport 2.16.2
2.16.2
2015-04-20
13h57 +00:00
2015-04-22
12h33 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:apport_project:apport:2.16.2:*:*:*:*:*:*:*

Informations

Vendor

apport_project

Product

apport

Version

2.16.2

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2022-28658 2024-06-04
22h03 +00:00
Apport argument parsing mishandles filename splitting on older kernels resulting in argument spoofing
5.5
Medium
CVE-2022-28657 2024-06-04
22h02 +00:00
Apport does not disable python crash handler before entering chroot
7.8
High
CVE-2022-28656 2024-06-04
21h58 +00:00
is_closing_session() allows users to consume RAM in the Apport process
5.5
Medium
CVE-2022-28655 2024-06-04
21h56 +00:00
is_closing_session() allows users to create arbitrary tcp dbus connections
7.1
High
CVE-2022-28654 2024-06-04
21h54 +00:00
is_closing_session() allows users to fill up apport.log
5.5
Medium
CVE-2022-28652 2024-06-04
21h38 +00:00
~/.config/apport/settings parsing is vulnerable to "billion laughs" attack
5.5
Medium
CVE-2017-14177 2018-02-02
14h00 +00:00
Apport through 2.20.7 does not properly handle core dumps from setuid binaries allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion or possibly gain root privileges. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1324.
7.8
High
CVE-2017-14180 2018-02-02
14h00 +00:00
Apport 2.13 through 2.20.7 does not properly handle crashes originating from a PID namespace allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion or possibly gain root privileges, a different vulnerability than CVE-2017-14179.
7.8
High
CVE-2017-10708 2017-07-18
18h00 +00:00
An issue was discovered in Apport through 2.20.x. In apport/report.py, Apport sets the ExecutablePath field and it then uses the path to run package specific hooks without protecting against path traversal. This allows remote attackers to execute arbitrary code via a crafted .crash file.
7.8
High
CVE-2016-9949 2016-12-17
02h34 +00:00
An issue was discovered in Apport before 2.20.4. In apport/ui.py, Apport reads the CrashDB field and it then evaluates the field as Python code if it begins with a "{". This allows remote attackers to execute arbitrary Python code.
7.8
High
CVE-2016-9950 2016-12-17
02h34 +00:00
An issue was discovered in Apport before 2.20.4. There is a path traversal issue in the Apport crash file "Package" and "SourcePackage" fields. These fields are used to build a path to the package specific hook files in the /usr/share/apport/package-hooks/ directory. An attacker can exploit this path traversal to execute arbitrary Python files from the local system.
7.8
High
CVE-2016-9951 2016-12-17
02h34 +00:00
An issue was discovered in Apport before 2.20.4. A malicious Apport crash file can contain a restart command in `RespawnCommand` or `ProcCmdline` fields. This command will be executed if a user clicks the Relaunch button on the Apport prompt from the malicious crash file. The fix is to only show the Relaunch button on Apport crash files generated by local systems. The Relaunch button will be hidden when crash files are opened directly in Apport-GTK.
6.5
Medium
CVE-2015-1338 2015-10-01
18h00 +00:00
kernel_crashdump in Apport before 2.19 allows local users to cause a denial of service (disk consumption) or possibly gain privileges via a (1) symlink or (2) hard link attack on /var/crash/vmcore.log.
7.2
CVE-2015-1318 2015-04-17
15h00 +00:00
The crash reporting feature in Apport 2.13 through 2.17.x before 2.17.1 allows local users to gain privileges via a crafted usr/share/apport/apport file in a namespace (container).
7.2