canonical Apport Vulnerabilities
Canonical Apport vulnerabilities.
Vulnerability Published:
- ποΈ Published - - Anytime 
Sort By:
- ποΈ Published Date - - Descending 
- Race Condition Vulnerability in Canonical Apport Affects Sensitive Information LeakageCVE-2025-5054CanonicalApportπ₯ππΎπ°4.7MEDIUM
- Privilege Escalation Vulnerability in gdbus by UbuntuCVE-2020-11936Canonical Ltd.Apport3.1LOW
- Disk Space Consumption Vulnerability in System Crash Logs by Vendor ACVE-2022-28653Canonical Ltd.Apport7.5HIGH
- Apport Settings Vulnerable to 'Billion Laughs' AttackCVE-2022-28652Canonical Ltd.Apport5.5MEDIUM
- Log Overflow Vulnerability in Ubuntu's Apport Logging SystemCVE-2022-28654Canonical Ltd.Apport5.5MEDIUM
- Arbitrary TCP DBus Connections Possible with is_closing_session()CVE-2022-28655Canonical Ltd.Apport7.1HIGH
- Apport's is_closing_session() Function Allows RAM Consumption in Apport ProcessCVE-2022-28656Canonical Ltd.Apport5.5MEDIUM
- Apport Disables Python Crash Handler Before Entering ChrootCVE-2022-28657Canonical Ltd.Apport7.8HIGH
- Argument Spoofing Vulnerability in Apport's Filename SplittingCVE-2022-28658Canonical Ltd.Apport5.5MEDIUM
- Apport Vulnerability Allows Arbitrary Socket Connections as RootCVE-2022-1242Canonical Ltd.Apport7.8HIGH
- Race Condition in Replaced Executable Detection Allows Arbitrary Code Execution as RootCVE-2021-3899Canonical Ltd.Apport
- local privilege escalation in apport-cliCVE-2023-1326Canonical Ltd.ApportπΎπ‘7.7HIGH
- Apport file permission bypass through emacs byte compilation errorsCVE-2021-3709CanonicalApport6.5MEDIUM
- Apport info disclosure via path traversal bug in read_fileCVE-2021-3710CanonicalApport6.5MEDIUM
- apport read_file() function could follow maliciously constructed symbolic linksCVE-2021-32547CanonicalApport7.3HIGH
- apport read_file() function could follow maliciously constructed symbolic linksCVE-2021-32548CanonicalApport7.3HIGH
- apport read_file() function could follow maliciously constructed symbolic linksCVE-2021-32549CanonicalApport7.3HIGH
- apport read_file() function could follow maliciously constructed symbolic linksCVE-2021-32550CanonicalApport7.3HIGH
- apport read_file() function could follow maliciously constructed symbolic linksCVE-2021-32551CanonicalApport7.3HIGH
- apport read_file() function could follow maliciously constructed symbolic linksCVE-2021-32552CanonicalApport7.3HIGH
- apport read_file() function could follow maliciously constructed symbolic linksCVE-2021-32553CanonicalApport7.3HIGH
- apport read_file() function could follow maliciously constructed symbolic linksCVE-2021-32554CanonicalApport7.3HIGH
- apport read_file() function could follow maliciously constructed symbolic linksCVE-2021-32555CanonicalApport7.3HIGH
- apport get_modified_conffiles() function command injectionCVE-2021-32556CanonicalApport3.8LOW
- apport process_report() arbitrary file writeCVE-2021-32557CanonicalApport5.2MEDIUM
