Known Vulnerabilities for Apport by Canonical
Listed below are 10 of the newest known vulnerabilities associated with "Apport" by "Canonical".
These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.
Data on known vulnerable versions is also displayed based on information from known CPEs
Known Vulnerabilities
| CVE | Shortened Description | Severity | Publish Date | Last Modified |
|---|---|---|---|---|
| CVE-2023-1326 json | A privilege escalation attack was found in apport-cli 2.26.0 and earlier which is similar to CVE-2023-26604. If a system is s... | 7.8 - HIGH | 2023-04-13 | 2023-04-19 |
| CVE-2021-32557 json | It was discovered that the process_report() function in data/whoopsie-upload-all allowed arbitrary file writes via symlinks. | 7.1 - HIGH | 2021-06-12 | 2021-06-23 |
| CVE-2021-32556 json | It was discovered that the get_modified_conffiles() function in backends/packaging-apt-dpkg.py allowed injecting modified pac... | 3.3 - LOW | 2021-06-12 | 2021-06-23 |
| CVE-2021-25684 json | It was discovered that apport in data/apport did not properly open a report file to prevent hanging reads on a FIFO. | 7.8 - HIGH | 2021-06-11 | 2021-06-22 |
| CVE-2021-25683 json | It was discovered that the get_starttime() function in data/apport did not properly parse the /proc/pid/stat file from the ke... | 7.8 - HIGH | 2021-06-11 | 2021-06-22 |
| CVE-2021-25682 json | It was discovered that the get_pid_info() function in data/apport did not properly parse the /proc/pid/status file from the k... | 7.8 - HIGH | 2021-06-11 | 2022-08-01 |
| CVE-2021-3710 json | An information disclosure via path traversal was discovered in apport/hookutils.py function read_file(). This issue affects: ... | 5.5 - MEDIUM | 2021-10-01 | 2021-10-08 |
| CVE-2021-3709 json | Function check_attachment_for_errors() in file data/general-hooks/ubuntu.py could be tricked into exposing private data via a... | 5.5 - MEDIUM | 2021-10-01 | 2022-10-27 |
| CVE-2020-15702 json | TOCTOU Race Condition vulnerability in apport allows a local attacker to escalate privileges and execute arbitrary code. An a... | 7 - HIGH | 2020-08-06 | 2023-01-27 |
| CVE-2020-15701 json | An unhandled exception in check_ignored() in apport/report.py can be exploited by a local attacker to cause a denial of servi... | 5.5 - MEDIUM | 2020-08-06 | 2023-01-24 |
Known Affected Configurations (CPE V2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Canonical | Apport | 2.20.9-0ubuntu7.9 | |||
| Application | Canonical | Apport | 2.20.9-0ubuntu7.8 | |||
| Application | Canonical | Apport | 2.20.9-0ubuntu7.7 | |||
| Application | Canonical | Apport | 2.20.9-0ubuntu7.6 | |||
| Application | Canonical | Apport | 2.20.9-0ubuntu7.5 | |||
| Application | Canonical | Apport | 2.20.9-0ubuntu7.4 | |||
| Application | Canonical | Apport | 2.20.9-0ubuntu7.3 | |||
| Application | Canonical | Apport | 2.20.9-0ubuntu7.23 | |||
| Application | Canonical | Apport | 2.20.9-0ubuntu7.21 | |||
| Application | Canonical | Apport | 2.20.9-0ubuntu7.20 | |||
| Application | Canonical | Apport | 2.20.9-0ubuntu7.2 | |||
| Application | Canonical | Apport | 2.20.9-0ubuntu7.19 | |||
| Application | Canonical | Apport | 2.20.9-0ubuntu7.18 | |||
| Application | Canonical | Apport | 2.20.9-0ubuntu7.17 | |||
| Application | Canonical | Apport | 2.20.9-0ubuntu7.16 | |||
| Application | Canonical | Apport | 2.20.9-0ubuntu7.15 | |||
| Application | Canonical | Apport | 2.20.9-0ubuntu7.14 | |||
| Application | Canonical | Apport | 2.20.9-0ubuntu7.13 | |||
| Application | Canonical | Apport | 2.20.9-0ubuntu7.12 | |||
| Application | Canonical | Apport | 2.20.9-0ubuntu7.11 |