CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

Search Vulnerabilities

 Software

Searching vulnerabilities affecting “canonical”

120 vulnerabilities found for “canonical”

Page 1 of 6

CVE-2025-5467
LOW3.3

It was discovered that process_crash() in data/apport in Canonical's Apport crash reporting tool may create crash files with incorrect group ownership, possibly exposing crash information beyond expected or intended groups.

canonical / apport+5
Local
Published Dec 10, 2025
Page 1 of 6
CVE-2025-5054
MEDIUM4.7

Race condition in Canonical apport up to and including 2.32.0 allows a local attacker to leak sensitive information via PID-reuse by leveraging namespaces. When handling a crash, the function `_check_global_pid_and_forward`, which detects if the crashing process resided in a container, was being called before `consistency_checks`, which attempts to detect if the crashing process had been replaced. Because of this, if a process crashed and was quickly replaced with a containerized one, apport could be made to forward the core dump to the container, potentially leaking sensitive information. `consistency_checks` is now being called before `_check_global_pid_and_forward`. Additionally, given that the PID-reuse race condition cannot be reliably detected from userspace alone, crashes are only forwarded to containers if the kernel provided a pidfd, or if the crashing process was unprivileged (i.e., if dump mode == 1).

canonical / apport+7
Local
Published May 30, 2025
CVE-2022-28653
HIGH7.5

Users can consume unlimited disk space in /var/crash

canonical / apport
Network
Published Jan 31, 2025
CVE-2020-11936
LOW3.1

gdbus setgid privilege escalation

canonical / apport+97
Network
Published Jan 31, 2025
CVE-2024-8287
HIGH7.5

Anbox Management Service, in versions 1.17.0 through 1.23.0, does not validate the TLS certificate provided to it by the Anbox Stream Agent. An attacker must be able to machine-in-the-middle the Anbox Stream Agent from within an internal network before they can attempt to take advantage of this.

canonical / anbox_cloud
Adjacent
Published Sep 18, 2024
CVE-2024-6714
HIGH8.8

An issue was discovered in provd before version 0.1.5 with a setuid binary, which allows a local attacker to escalate their privilege.

canonical / ubuntu_desktop_provision
Local
Published Jul 23, 2024
CVE-2021-3899
HIGH7.8

There is a race condition in the 'replaced executable' detection that, with the correct local configuration, allow an attacker to execute arbitrary code as root.

canonical / apport+4
Local
Published Jun 3, 2024
CVE-2022-1242
HIGH7.8

Apport can be tricked into connecting to arbitrary sockets as the root user

canonical / apport+4
Local
Published Jun 3, 2024
CVE-2023-1326
HIGH7.7

A privilege escalation attack was found in apport-cli 2.26.0 and earlier which is similar to CVE-2023-26604. If a system is specially configured to allow unprivileged users to run sudo apport-cli, less is configured as the pager, and the terminal size can be set: a local attacker can escalate privilege. It is extremely unlikely that a system administrator would configure sudo to allow unprivileged users to perform this class of exploit.

canonical / apport+4
Local
Published Apr 13, 2023
CVE-2021-3709
MEDIUM6.5

Function check_attachment_for_errors() in file data/general-hooks/ubuntu.py could be tricked into exposing private data via a constructed crash file. This issue affects: apport 2.14.1 versions prior to 2.14.1-0ubuntu3.29+esm8; 2.20.1 versions prior to 2.20.1-0ubuntu2.30+esm2; 2.20.9 versions prior to 2.20.9-0ubuntu7.26; 2.20.11 versions prior to 2.20.11-0ubuntu27.20; 2.20.11 versions prior to 2.20.11-0ubuntu65.3;

canonical / apport+169
Local
Published Oct 1, 2021
CVE-2021-3710
MEDIUM6.5

An information disclosure via path traversal was discovered in apport/hookutils.py function read_file(). This issue affects: apport 2.14.1 versions prior to 2.14.1-0ubuntu3.29+esm8; 2.20.1 versions prior to 2.20.1-0ubuntu2.30+esm2; 2.20.9 versions prior to 2.20.9-0ubuntu7.26; 2.20.11 versions prior to 2.20.11-0ubuntu27.20; 2.20.11 versions prior to 2.20.11-0ubuntu65.3;

canonical / apport+169
Local
Published Oct 1, 2021
CVE-2021-32557
MEDIUM5.2

It was discovered that the process_report() function in data/whoopsie-upload-all allowed arbitrary file writes via symlinks.

canonical / apport+5
Local
Published Jun 12, 2021
CVE-2021-32556
LOW3.8

It was discovered that the get_modified_conffiles() function in backends/packaging-apt-dpkg.py allowed injecting modified package names in a manner that would confuse the dpkg(1) call.

canonical / apport+5
Local
Published Jun 12, 2021
CVE-2021-25682
HIGH8.8

It was discovered that the get_pid_info() function in data/apport did not properly parse the /proc/pid/status file from the kernel.

canonical / apport+3
Local
Published Jun 11, 2021
CVE-2021-25684
HIGH8.8

It was discovered that apport in data/apport did not properly open a report file to prevent hanging reads on a FIFO.

canonical / apport+3
Local
Published Jun 11, 2021
CVE-2021-25683
HIGH8.8

It was discovered that the get_starttime() function in data/apport did not properly parse the /proc/pid/stat file from the kernel.

canonical / apport+3
Local
Published Jun 11, 2021
CVE-2013-1053
MEDIUM5.5

In crypt.c of remote-login-service, the cryptographic algorithm used to cache usernames and passwords is insecure. An attacker could use this vulnerability to recover usernames and passwords from the file. This issue affects version 1.0.0-0ubuntu3 and prior versions.

canonical / remote-login-service
Local
Published Jan 13, 2021
CVE-2020-15701
MEDIUM5.5

An unhandled exception in check_ignored() in apport/report.py can be exploited by a local attacker to cause a denial of service. If the mtime attribute is a string value in apport-ignore.xml, it will trigger an unhandled exception, resulting in a crash. Fixed in 2.20.1-0ubuntu2.24, 2.20.9-0ubuntu7.16, 2.20.11-0ubuntu27.6.

canonical / apport+103
Local
Published Aug 6, 2020
CVE-2020-15702
HIGH7.0

TOCTOU Race Condition vulnerability in apport allows a local attacker to escalate privileges and execute arbitrary code. An attacker may exit the crashed process and exploit PID recycling to spawn a root process with the same PID as the crashed process, which can then be used to escalate privileges. Fixed in 2.20.1-0ubuntu2.24, 2.20.9 versions prior to 2.20.9-0ubuntu7.16 and 2.20.11 versions prior to 2.20.11-0ubuntu27.6. Was ZDI-CAN-11234.

canonical / apport+100
Local
Published Aug 6, 2020
CVE-2015-1341
HIGH7.4

Any Python module in sys.path can be imported if the command line of the process triggering the coredump is Python and the first argument is -m in Apport before 2.19.2 function _python_module_path.

canonical / ubuntu_linux+4
Physical
Published Apr 22, 2019