canonical Apport Vulnerabilities
Canonical Apport vulnerabilities.
Vulnerability Published:
ποΈ Published
- Anytime
Sort By:
ποΈ Published Date
- Descending
Privilege Escalation Vulnerability in gdbus by Ubuntu
CVE-2020-11936Canonical Ltd.Apport3.1LOWDisk Space Consumption Vulnerability in System Crash Logs by Vendor A
CVE-2022-28653Canonical Ltd.Apport7.5HIGHLog Overflow Vulnerability in Ubuntu's Apport Logging System
CVE-2022-28654Canonical Ltd.Apport5.5MEDIUMApport's is_closing_session() Function Allows RAM Consumption in Apport Process
CVE-2022-28656Canonical Ltd.Apport5.5MEDIUMArbitrary TCP DBus Connections Possible with is_closing_session()
CVE-2022-28655Canonical Ltd.Apport7.1HIGHArgument Spoofing Vulnerability in Apport's Filename Splitting
CVE-2022-28658Canonical Ltd.Apport5.5MEDIUMApport Settings Vulnerable to 'Billion Laughs' Attack
CVE-2022-28652Canonical Ltd.Apport5.5MEDIUMApport Disables Python Crash Handler Before Entering Chroot
CVE-2022-28657Canonical Ltd.Apport7.8HIGHApport Vulnerability Allows Arbitrary Socket Connections as Root
CVE-2022-1242Canonical Ltd.Apport7.8HIGHRace Condition in Replaced Executable Detection Allows Arbitrary Code Execution as Root
CVE-2021-3899Canonical Ltd.Apportlocal privilege escalation in apport-cli
CVE-2023-1326Canonical Ltd.ApportπΎπ‘7.7HIGHApport info disclosure via path traversal bug in read_file
CVE-2021-3710CanonicalApport6.5MEDIUMApport file permission bypass through emacs byte compilation errors
CVE-2021-3709CanonicalApport6.5MEDIUMapport get_modified_conffiles() function command injection
CVE-2021-32556CanonicalApport3.8LOWapport read_file() function could follow maliciously constructed symbolic links
CVE-2021-32547CanonicalApport7.3HIGHapport read_file() function could follow maliciously constructed symbolic links
CVE-2021-32548CanonicalApport7.3HIGHapport read_file() function could follow maliciously constructed symbolic links
CVE-2021-32549CanonicalApport7.3HIGHapport read_file() function could follow maliciously constructed symbolic links
CVE-2021-32551CanonicalApport7.3HIGHapport read_file() function could follow maliciously constructed symbolic links
CVE-2021-32552CanonicalApport7.3HIGHapport read_file() function could follow maliciously constructed symbolic links
CVE-2021-32554CanonicalApport7.3HIGHapport read_file() function could follow maliciously constructed symbolic links
CVE-2021-32555CanonicalApport7.3HIGHapport process_report() arbitrary file write
CVE-2021-32557CanonicalApport5.2MEDIUMapport read_file() function could follow maliciously constructed symbolic links
CVE-2021-32550CanonicalApport7.3HIGHapport read_file() function could follow maliciously constructed symbolic links
CVE-2021-32553CanonicalApport7.3HIGHapport improperly parses /proc/pid/status
CVE-2021-25682CanonicalApport8.8HIGH