Show filters
4,186 Total Results
Displaying 61-70 of 4,186
Sort by:
Attacker Value
Unknown

CVE-2022-28658

Disclosure Date: June 04, 2024 (last updated June 12, 2024)
Apport argument parsing mishandles filename splitting on older kernels resulting in argument spoofing
Attacker Value
Unknown

CVE-2022-28657

Disclosure Date: June 04, 2024 (last updated June 12, 2024)
Apport does not disable python crash handler before entering chroot
Attacker Value
Unknown

CVE-2022-28656

Disclosure Date: June 04, 2024 (last updated June 12, 2024)
is_closing_session() allows users to consume RAM in the Apport process
Attacker Value
Unknown

CVE-2022-28655

Disclosure Date: June 04, 2024 (last updated June 12, 2024)
is_closing_session() allows users to create arbitrary tcp dbus connections
Attacker Value
Unknown

CVE-2022-28654

Disclosure Date: June 04, 2024 (last updated June 12, 2024)
is_closing_session() allows users to fill up apport.log
Attacker Value
Unknown

CVE-2022-28652

Disclosure Date: June 04, 2024 (last updated June 12, 2024)
~/.config/apport/settings parsing is vulnerable to "billion laughs" attack
Attacker Value
Unknown

CVE-2023-48733

Disclosure Date: February 14, 2024 (last updated February 15, 2024)
An insecure default to allow UEFI Shell in EDK2 was left enabled in Ubuntu's EDK2. This allows an OS-resident attacker to bypass Secure Boot.
0
Attacker Value
Unknown

CVE-2022-4964

Disclosure Date: January 24, 2024 (last updated January 31, 2024)
Ubuntu's pipewire-pulse in snap grants microphone access even when the snap interface for audio-record is not set.
Attacker Value
Unknown

CVE-2023-1032

Disclosure Date: January 08, 2024 (last updated January 12, 2024)
The Linux kernel io_uring IORING_OP_SOCKET operation contained a double free in function __sys_socket_file() in file net/socket.c. This issue was introduced in da214a475f8bd1d3e9e7a19ddfeb4d1617551bab and fixed in 649c15c7691e9b13cbe9bf6c65c365350e056067.
Attacker Value
Unknown

CVE-2021-3600

Disclosure Date: January 08, 2024 (last updated August 23, 2024)
It was discovered that the eBPF implementation in the Linux kernel did not properly track bounds information for 32 bit registers when performing div and mod operations. A local attacker could use this to possibly execute arbitrary code.