Show filters
4,242 Total Results
Displaying 191-200 of 4,242
Sort by:
Attacker Value
Unknown
CVE-2021-3626
Disclosure Date: July 01, 2021 (last updated February 23, 2025)
The Windows version of Multipass before 1.7.0 allowed any local process to connect to the localhost TCP control socket to perform mounts from the operating system to a guest, allowing for privilege escalation.
0
Attacker Value
Unknown
CVE-2021-3489
Disclosure Date: June 04, 2021 (last updated February 22, 2025)
The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than the ringbuf size, allowing an attacker to perform out-of-bounds writes within the kernel and therefore, arbitrary code execution. This issue was fixed via commit 4b81ccebaeee ("bpf, ringbuf: Deny reserve of buffers larger than ringbuf") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced via 457f44363a88 ("bpf: Implement BPF ring buffer and verifier support for it") (v5.8-rc1).
0
Attacker Value
Unknown
CVE-2021-3491
Disclosure Date: June 04, 2021 (last updated February 22, 2025)
The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/<PID>/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b ("io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c ("io_uring: add IORING_OP_PROVIDE_BUFFERS") (v5.7-rc1).
0
Attacker Value
Unknown
CVE-2021-32550
Disclosure Date: May 25, 2021 (last updated February 22, 2025)
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-14 package apport hooks, it could expose private data to other local users.
0
Attacker Value
Unknown
CVE-2021-32557
Disclosure Date: May 25, 2021 (last updated February 22, 2025)
It was discovered that the process_report() function in data/whoopsie-upload-all allowed arbitrary file writes via symlinks.
0
Attacker Value
Unknown
CVE-2021-32548
Disclosure Date: May 25, 2021 (last updated February 22, 2025)
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-8 package apport hooks, it could expose private data to other local users.
0
Attacker Value
Unknown
CVE-2021-32555
Disclosure Date: May 25, 2021 (last updated February 22, 2025)
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the xorg-hwe-18.04 package apport hooks, it could expose private data to other local users.
0
Attacker Value
Unknown
CVE-2021-32552
Disclosure Date: May 25, 2021 (last updated February 22, 2025)
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-16 package apport hooks, it could expose private data to other local users.
0
Attacker Value
Unknown
CVE-2021-32554
Disclosure Date: May 25, 2021 (last updated February 22, 2025)
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the xorg package apport hooks, it could expose private data to other local users.
0
Attacker Value
Unknown
CVE-2021-32556
Disclosure Date: May 25, 2021 (last updated February 22, 2025)
It was discovered that the get_modified_conffiles() function in backends/packaging-apt-dpkg.py allowed injecting modified package names in a manner that would confuse the dpkg(1) call.
0