Apport Project Apport 2.20.1

CPE Details

Apport Project Apport 2.20.1
2.20.1
2019-06-05
12h36 +00:00
2019-06-05
12h36 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:apport_project:apport:2.20.1:*:*:*:*:*:*:*

Informations

Vendor

apport_project

Product

apport

Version

2.20.1

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2022-28658 2024-06-04 22h03 +00:00 Apport argument parsing mishandles filename splitting on older kernels resulting in argument spoofing
5.5
Moyen
CVE-2022-28657 2024-06-04 22h02 +00:00 Apport does not disable python crash handler before entering chroot
7.8
Haute
CVE-2022-28656 2024-06-04 21h58 +00:00 is_closing_session() allows users to consume RAM in the Apport process
5.5
Moyen
CVE-2022-28655 2024-06-04 21h56 +00:00 is_closing_session() allows users to create arbitrary tcp dbus connections
7.1
Haute
CVE-2022-28654 2024-06-04 21h54 +00:00 is_closing_session() allows users to fill up apport.log
5.5
Moyen
CVE-2022-28652 2024-06-04 21h38 +00:00 ~/.config/apport/settings parsing is vulnerable to "billion laughs" attack
5.5
Moyen
CVE-2019-7307 2019-08-29 14h40 +00:00 Apport before versions 2.14.1-0ubuntu3.29+esm1, 2.20.1-0ubuntu2.19, 2.20.9-0ubuntu7.7, 2.20.10-0ubuntu27.1, 2.20.11-0ubuntu5 contained a TOCTTOU vulnerability when reading the users ~/.apport-ignore.xml file, which allows a local attacker to replace this file with a symlink to any other file on the system and so cause Apport to include the contents of this other file in the resulting crash report. The crash report could then be read by that user either by causing it to be uploaded and reported to Launchpad, or by leveraging some other vulnerability to read the resulting crash report, and so allow the user to read arbitrary files on the system.
7
Haute
CVE-2018-6552 2018-05-31 22h00 +00:00 Apport does not properly handle crashes originating from a PID namespace allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion, possibly gain root privileges, or escape from containers. The is_same_ns() function returns True when /proc// does not exist in order to indicate that the crash should be handled in the global namespace rather than inside of a container. However, the portion of the data/apport code that decides whether or not to forward a crash to a container does not always replace sys.argv[1] with the value stored in the host_pid variable when /proc// does not exist which results in the container pid being used in the global namespace. This flaw affects versions 2.20.8-0ubuntu4 through 2.20.9-0ubuntu7, 2.20.7-0ubuntu3.7, 2.20.7-0ubuntu3.8, 2.20.1-0ubuntu2.15 through 2.20.1-0ubuntu2.17, and 2.14.1-0ubuntu3.28.
7.8
Haute
CVE-2017-14177 2018-02-02 14h00 +00:00 Apport through 2.20.7 does not properly handle core dumps from setuid binaries allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion or possibly gain root privileges. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1324.
7.8
Haute
CVE-2017-14180 2018-02-02 14h00 +00:00 Apport 2.13 through 2.20.7 does not properly handle crashes originating from a PID namespace allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion or possibly gain root privileges, a different vulnerability than CVE-2017-14179.
7.8
Haute
CVE-2017-10708 2017-07-18 18h00 +00:00 An issue was discovered in Apport through 2.20.x. In apport/report.py, Apport sets the ExecutablePath field and it then uses the path to run package specific hooks without protecting against path traversal. This allows remote attackers to execute arbitrary code via a crafted .crash file.
7.8
Haute
CVE-2016-9949 2016-12-17 02h34 +00:00 An issue was discovered in Apport before 2.20.4. In apport/ui.py, Apport reads the CrashDB field and it then evaluates the field as Python code if it begins with a "{". This allows remote attackers to execute arbitrary Python code.
7.8
Haute
CVE-2016-9950 2016-12-17 02h34 +00:00 An issue was discovered in Apport before 2.20.4. There is a path traversal issue in the Apport crash file "Package" and "SourcePackage" fields. These fields are used to build a path to the package specific hook files in the /usr/share/apport/package-hooks/ directory. An attacker can exploit this path traversal to execute arbitrary Python files from the local system.
7.8
Haute
CVE-2016-9951 2016-12-17 02h34 +00:00 An issue was discovered in Apport before 2.20.4. A malicious Apport crash file can contain a restart command in `RespawnCommand` or `ProcCmdline` fields. This command will be executed if a user clicks the Relaunch button on the Apport prompt from the malicious crash file. The fix is to only show the Relaunch button on Apport crash files generated by local systems. The Relaunch button will be hidden when crash files are opened directly in Apport-GTK.
6.5
Moyen