Show filters
4,186 Total Results
Displaying 131-140 of 4,186
Sort by:
Attacker Value
Unknown

CVE-2021-32555

Disclosure Date: May 25, 2021 (last updated February 22, 2025)
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the xorg-hwe-18.04 package apport hooks, it could expose private data to other local users.
Attacker Value
Unknown

CVE-2021-32552

Disclosure Date: May 25, 2021 (last updated February 22, 2025)
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-16 package apport hooks, it could expose private data to other local users.
Attacker Value
Unknown

CVE-2021-32554

Disclosure Date: May 25, 2021 (last updated February 22, 2025)
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the xorg package apport hooks, it could expose private data to other local users.
Attacker Value
Unknown

CVE-2021-32547

Disclosure Date: May 25, 2021 (last updated February 22, 2025)
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-lts package apport hooks, it could expose private data to other local users.
Attacker Value
Unknown

CVE-2021-32551

Disclosure Date: May 25, 2021 (last updated February 22, 2025)
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-15 package apport hooks, it could expose private data to other local users.
Attacker Value
Unknown

CVE-2021-32553

Disclosure Date: May 25, 2021 (last updated February 22, 2025)
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-17 package apport hooks, it could expose private data to other local users.
Attacker Value
Unknown

CVE-2021-32549

Disclosure Date: May 25, 2021 (last updated February 22, 2025)
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-13 package apport hooks, it could expose private data to other local users.
Attacker Value
Unknown

CVE-2020-15078

Disclosure Date: April 26, 2021 (last updated February 22, 2025)
OpenVPN 2.5.1 and earlier versions allows a remote attackers to bypass authentication and access control channel data on servers configured with deferred authentication, which can be used to potentially trigger further information leaks.
Attacker Value
Unknown

CVE-2021-3492

Disclosure Date: April 15, 2021 (last updated February 22, 2025)
Shiftfs, an out-of-tree stacking file system included in Ubuntu Linux kernels, did not properly handle faults occurring during copy_from_user() correctly. These could lead to either a double-free situation or memory not being freed at all. An attacker could use this to cause a denial of service (kernel memory exhaustion) or gain privileges via executing arbitrary code. AKA ZDI-CAN-13562.
Attacker Value
Unknown

CVE-2021-3444

Disclosure Date: March 23, 2021 (last updated February 22, 2025)
The bpf verifier in the Linux kernel did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution. This issue was addressed in the upstream kernel in commit 9b00f1b78809 ("bpf: Fix truncation handling for mod32 dst reg wrt zero") and in Linux stable kernels 5.11.2, 5.10.19, and 5.4.101.