Lucene search

K
Apport ProjectApport

7 matches found

CVE
CVE
added 2020/02/08 5:15 a.m.198 views

CVE-2019-11485

Sander Bos discovered Apport's lock file was in a world-writable directory which allowed all users to prevent crash handling.

3.3CVSS5.2AI score0.00103EPSS
CVE
CVE
added 2020/02/08 5:15 a.m.191 views

CVE-2019-11483

Sander Bos discovered Apport mishandled crash dumps originating from containers. This could be used by a local attacker to generate a crash report for a privileged process that is readable by an unprivileged user.

7CVSS4.9AI score0.00119EPSS
CVE
CVE
added 2020/02/08 5:15 a.m.186 views

CVE-2019-11481

Kevin Backhouse discovered that apport would read a user-supplied configuration file with elevated privileges. By replacing the file with a symbolic link, a user could get apport to read any file on the system as root, with unknown consequences.

7.8CVSS5.5AI score0.00195EPSS
CVE
CVE
added 2020/02/08 5:15 a.m.184 views

CVE-2019-11482

Sander Bos discovered a time of check to time of use (TOCTTOU) vulnerability in apport that allowed a user to cause core files to be written in arbitrary directories.

4.7CVSS5.5AI score0.00097EPSS
CVE
CVE
added 2020/04/28 12:15 a.m.125 views

CVE-2019-15790

Apport reads and writes information on a crashed process to /proc/pid with elevated privileges. Apport then determines which user the crashed process belongs to by reading /proc/pid through get_pid_info() in data/apport. An unprivileged user could exploit this to read information about a privileged...

3.3CVSS5.3AI score0.00074EPSS
CVE
CVE
added 2020/04/22 10:15 p.m.100 views

CVE-2020-8831

Apport creates a world writable lock file with root ownership in the world writable /var/lock/apport directory. If the apport/ directory does not exist (this is not uncommon as /var/lock is a tmpfs), it will create the directory, otherwise it will simply continue execution using the existing direct...

6.5CVSS5.8AI score0.00103EPSS
CVE
CVE
added 2020/04/22 10:15 p.m.83 views

CVE-2020-8833

Time-of-check Time-of-use Race Condition vulnerability on crash report ownership change in Apport allows for a possible privilege escalation opportunity. If fs.protected_symlinks is disabled, this can be exploited between the os.open and os.chown calls when the Apport cron script clears out crash f...

5.6CVSS5.2AI score0.00042EPSS