Search CVE reports


Toggle filters

21 – 30 of 53 results


CVE-2021-32550

Medium priority
Fixed

It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-14 package apport hooks, it could expose private data to other local users.

1 affected package

apport

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
apport Fixed Fixed Fixed
Show less packages

CVE-2021-32549

Medium priority
Fixed

It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-13 package apport hooks, it could expose private data to other local users.

1 affected package

apport

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
apport Fixed Fixed Fixed
Show less packages

CVE-2021-32548

Medium priority
Fixed

It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-8 package apport hooks, it could expose private data to other local users.

1 affected package

apport

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
apport Fixed Fixed Fixed
Show less packages

CVE-2021-32547

Medium priority
Fixed

It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-lts package apport hooks, it could expose private data to other local users.

1 affected package

apport

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
apport Fixed Fixed Fixed
Show less packages

CVE-2021-25684

Medium priority
Fixed

It was discovered that apport in data/apport did not properly open a report file to prevent hanging reads on a FIFO.

1 affected package

apport

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
apport Fixed Fixed
Show less packages

CVE-2021-25683

Medium priority
Fixed

It was discovered that the get_starttime() function in data/apport did not properly parse the /proc/pid/stat file from the kernel.

1 affected package

apport

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
apport Fixed Fixed
Show less packages

CVE-2021-25682

Medium priority
Fixed

It was discovered that the get_pid_info() function in data/apport did not properly parse the /proc/pid/status file from the kernel.

1 affected package

apport

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
apport Fixed Fixed
Show less packages

CVE-2020-8833

Medium priority
Fixed

Time-of-check Time-of-use Race Condition vulnerability on crash report ownership change in Apport allows for a possible privilege escalation opportunity. If fs.protected_symlinks is disabled, this can be exploited between the...

1 affected package

apport

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
apport Fixed Fixed
Show less packages

CVE-2020-8831

High priority
Fixed

Apport creates a world writable lock file with root ownership in the world writable /var/lock/apport directory. If the apport/ directory does not exist (this is not uncommon as /var/lock is a tmpfs), it will create the directory,...

1 affected package

apport

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
apport Fixed Fixed
Show less packages

CVE-2020-15702

Medium priority

Some fixes available 4 of 5

TOCTOU Race Condition vulnerability in apport allows a local attacker to escalate privileges and execute arbitrary code. An attacker may exit the crashed process and exploit PID recycling to spawn a root process with the same PID...

1 affected package

apport

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
apport Fixed Fixed
Show less packages