Show filters
4,242 Total Results
Displaying 191-200 of 4,242
Sort by:
Attacker Value
Unknown

CVE-2021-3626

Disclosure Date: July 01, 2021 (last updated February 23, 2025)
The Windows version of Multipass before 1.7.0 allowed any local process to connect to the localhost TCP control socket to perform mounts from the operating system to a guest, allowing for privilege escalation.
Attacker Value
Unknown

CVE-2021-3489

Disclosure Date: June 04, 2021 (last updated February 22, 2025)
The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than the ringbuf size, allowing an attacker to perform out-of-bounds writes within the kernel and therefore, arbitrary code execution. This issue was fixed via commit 4b81ccebaeee ("bpf, ringbuf: Deny reserve of buffers larger than ringbuf") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced via 457f44363a88 ("bpf: Implement BPF ring buffer and verifier support for it") (v5.8-rc1).
Attacker Value
Unknown

CVE-2021-3491

Disclosure Date: June 04, 2021 (last updated February 22, 2025)
The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/<PID>/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b ("io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c ("io_uring: add IORING_OP_PROVIDE_BUFFERS") (v5.7-rc1).
Attacker Value
Unknown

CVE-2021-32550

Disclosure Date: May 25, 2021 (last updated February 22, 2025)
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-14 package apport hooks, it could expose private data to other local users.
Attacker Value
Unknown

CVE-2021-32557

Disclosure Date: May 25, 2021 (last updated February 22, 2025)
It was discovered that the process_report() function in data/whoopsie-upload-all allowed arbitrary file writes via symlinks.
Attacker Value
Unknown

CVE-2021-32548

Disclosure Date: May 25, 2021 (last updated February 22, 2025)
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-8 package apport hooks, it could expose private data to other local users.
Attacker Value
Unknown

CVE-2021-32555

Disclosure Date: May 25, 2021 (last updated February 22, 2025)
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the xorg-hwe-18.04 package apport hooks, it could expose private data to other local users.
Attacker Value
Unknown

CVE-2021-32552

Disclosure Date: May 25, 2021 (last updated February 22, 2025)
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-16 package apport hooks, it could expose private data to other local users.
Attacker Value
Unknown

CVE-2021-32554

Disclosure Date: May 25, 2021 (last updated February 22, 2025)
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the xorg package apport hooks, it could expose private data to other local users.
Attacker Value
Unknown

CVE-2021-32556

Disclosure Date: May 25, 2021 (last updated February 22, 2025)
It was discovered that the get_modified_conffiles() function in backends/packaging-apt-dpkg.py allowed injecting modified package names in a manner that would confuse the dpkg(1) call.