Filtered by vendor Apport Project Subscriptions
Total 24 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2017-14180 2 Apport Project, Canonical 2 Apport, Ubuntu Linux 2024-11-21 N/A
Apport 2.13 through 2.20.7 does not properly handle crashes originating from a PID namespace allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion or possibly gain root privileges, a different vulnerability than CVE-2017-14179.
CVE-2017-14179 2 Apport Project, Canonical 2 Apport, Ubuntu Linux 2024-11-21 N/A
Apport before 2.13 does not properly handle crashes originating from a PID namespace allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion, possibly gain root privileges, or escape from containers.
CVE-2017-14177 2 Apport Project, Canonical 2 Apport, Ubuntu Linux 2024-11-21 N/A
Apport through 2.20.7 does not properly handle core dumps from setuid binaries allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion or possibly gain root privileges. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1324.
CVE-2017-10708 1 Apport Project 1 Apport 2024-11-21 N/A
An issue was discovered in Apport through 2.20.x. In apport/report.py, Apport sets the ExecutablePath field and it then uses the path to run package specific hooks without protecting against path traversal. This allows remote attackers to execute arbitrary code via a crafted .crash file.