Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2024.6894.1
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-6894-1)
Summary:The remote host is missing an update for the 'apport' package(s) announced via the USN-6894-1 advisory.
Description:Summary:
The remote host is missing an update for the 'apport' package(s) announced via the USN-6894-1 advisory.

Vulnerability Insight:
Muqing Liu and neoni discovered that Apport incorrectly handled detecting
if an executable was replaced after a crash. A local attacker could
possibly use this issue to execute arbitrary code as the root user.
(CVE-2021-3899)

Gerrit Venema discovered that Apport incorrectly handled connections to
Apport sockets inside containers. A local attacker could possibly use this
issue to connect to arbitrary sockets as the root user. (CVE-2022-1242)

Gerrit Venema discovered that Apport incorrectly handled user settings
files. A local attacker could possibly use this issue to cause Apport to
consume resources, leading to a denial of service. (CVE-2022-28652)

Gerrit Venema discovered that Apport did not limit the amount of logging
from D-Bus connections. A local attacker could possibly use this issue to
fill up the Apport log file, leading to a denial of service.
(CVE-2022-28654)

Gerrit Venema discovered that Apport did not filter D-Bus connection
strings. A local attacker could possibly use this issue to cause Apport to
make arbitrary network connections. (CVE-2022-28655)

Gerrit Venema discovered that Apport did not limit the amount of memory
being consumed during D-Bus connections. A local attacker could possibly
use this issue to cause Apport to consume memory, leading to a denial of
service. (CVE-2022-28656)

Gerrit Venema discovered that Apport did not disable the python crash
handler before chrooting into a container. A local attacker could possibly
use this issue to execute arbitrary code. (CVE-2022-28657)

Gerrit Venema discovered that Apport incorrectly handled filename argument
whitespace. A local attacker could possibly use this issue to spoof
arguments to the Apport daemon. (CVE-2022-28658)

Affected Software/OS:
'apport' package(s) on Ubuntu 16.04.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:L/AC:L/Au:S/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2021-3899
https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1948376
https://ubuntu.com/security/notices/USN-5427-1
https://www.cve.org/CVERecord?id=CVE-2021-3899
Common Vulnerability Exposure (CVE) ID: CVE-2022-1242
https://www.cve.org/CVERecord?id=CVE-2022-1242
Common Vulnerability Exposure (CVE) ID: CVE-2022-28652
https://www.cve.org/CVERecord?id=CVE-2022-28652
Common Vulnerability Exposure (CVE) ID: CVE-2022-28654
https://www.cve.org/CVERecord?id=CVE-2022-28654
Common Vulnerability Exposure (CVE) ID: CVE-2022-28655
https://www.cve.org/CVERecord?id=CVE-2022-28655
Common Vulnerability Exposure (CVE) ID: CVE-2022-28656
https://www.cve.org/CVERecord?id=CVE-2022-28656
Common Vulnerability Exposure (CVE) ID: CVE-2022-28657
https://www.cve.org/CVERecord?id=CVE-2022-28657
Common Vulnerability Exposure (CVE) ID: CVE-2022-28658
https://www.cve.org/CVERecord?id=CVE-2022-28658
CopyrightCopyright (C) 2024 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.