Show filters
41 Total Results
Displaying 31-40 of 41
Sort by:
Attacker Value
Unknown

Apport treats the container PID as the global PID when /proc/<global_pid>/ is …

Disclosure Date: May 31, 2018 (last updated November 26, 2024)
Apport does not properly handle crashes originating from a PID namespace allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion, possibly gain root privileges, or escape from containers. The is_same_ns() function returns True when /proc/<global pid>/ does not exist in order to indicate that the crash should be handled in the global namespace rather than inside of a container. However, the portion of the data/apport code that decides whether or not to forward a crash to a container does not always replace sys.argv[1] with the value stored in the host_pid variable when /proc/<global pid>/ does not exist which results in the container pid being used in the global namespace. This flaw affects versions 2.20.8-0ubuntu4 through 2.20.9-0ubuntu7, 2.20.7-0ubuntu3.7, 2.20.7-0ubuntu3.8, 2.20.1-0ubuntu2.15 through 2.20.1-0ubuntu2.17, and 2.14.1-0ubuntu3.28.
0
Attacker Value
Unknown

CVE-2017-14177

Disclosure Date: November 15, 2017 (last updated November 26, 2024)
Apport through 2.20.7 does not properly handle core dumps from setuid binaries allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion or possibly gain root privileges. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1324.
0
Attacker Value
Unknown

CVE-2017-14180

Disclosure Date: November 15, 2017 (last updated November 26, 2024)
Apport 2.13 through 2.20.7 does not properly handle crashes originating from a PID namespace allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion or possibly gain root privileges, a different vulnerability than CVE-2017-14179.
0
Attacker Value
Unknown

CVE-2017-14179

Disclosure Date: November 15, 2017 (last updated November 26, 2024)
Apport before 2.13 does not properly handle crashes originating from a PID namespace allowing local users to create certain files as root which an attacker could leverage to perform a denial of service via resource exhaustion, possibly gain root privileges, or escape from containers.
0
Attacker Value
Unknown

CVE-2017-10708

Disclosure Date: July 18, 2017 (last updated November 26, 2024)
An issue was discovered in Apport through 2.20.x. In apport/report.py, Apport sets the ExecutablePath field and it then uses the path to run package specific hooks without protecting against path traversal. This allows remote attackers to execute arbitrary code via a crafted .crash file.
0
Attacker Value
Unknown

CVE-2016-9951

Disclosure Date: December 17, 2016 (last updated November 25, 2024)
An issue was discovered in Apport before 2.20.4. A malicious Apport crash file can contain a restart command in `RespawnCommand` or `ProcCmdline` fields. This command will be executed if a user clicks the Relaunch button on the Apport prompt from the malicious crash file. The fix is to only show the Relaunch button on Apport crash files generated by local systems. The Relaunch button will be hidden when crash files are opened directly in Apport-GTK.
0
Attacker Value
Unknown

CVE-2016-9950

Disclosure Date: December 17, 2016 (last updated November 25, 2024)
An issue was discovered in Apport before 2.20.4. There is a path traversal issue in the Apport crash file "Package" and "SourcePackage" fields. These fields are used to build a path to the package specific hook files in the /usr/share/apport/package-hooks/ directory. An attacker can exploit this path traversal to execute arbitrary Python files from the local system.
0
Attacker Value
Unknown

CVE-2016-9949

Disclosure Date: December 17, 2016 (last updated November 25, 2024)
An issue was discovered in Apport before 2.20.4. In apport/ui.py, Apport reads the CrashDB field and it then evaluates the field as Python code if it begins with a "{". This allows remote attackers to execute arbitrary Python code.
0
Attacker Value
Unknown

CVE-2015-1338

Disclosure Date: October 01, 2015 (last updated October 05, 2023)
kernel_crashdump in Apport before 2.19 allows local users to cause a denial of service (disk consumption) or possibly gain privileges via a (1) symlink or (2) hard link attack on /var/crash/vmcore.log.
0
Attacker Value
Unknown

CVE-2015-1318

Disclosure Date: April 17, 2015 (last updated October 05, 2023)
The crash reporting feature in Apport 2.13 through 2.17.x before 2.17.1 allows local users to gain privileges via a crafted usr/share/apport/apport file in a namespace (container).
0