Show filters
4,242 Total Results
Displaying 81-90 of 4,242
Sort by:
Attacker Value
Unknown

CVE-2022-28658

Disclosure Date: June 04, 2024 (last updated June 12, 2024)
Apport argument parsing mishandles filename splitting on older kernels resulting in argument spoofing
Attacker Value
Unknown

CVE-2022-28657

Disclosure Date: June 04, 2024 (last updated June 12, 2024)
Apport does not disable python crash handler before entering chroot
Attacker Value
Unknown

CVE-2022-28656

Disclosure Date: June 04, 2024 (last updated June 12, 2024)
is_closing_session() allows users to consume RAM in the Apport process
Attacker Value
Unknown

CVE-2022-28655

Disclosure Date: June 04, 2024 (last updated June 12, 2024)
is_closing_session() allows users to create arbitrary tcp dbus connections
Attacker Value
Unknown

CVE-2022-28654

Disclosure Date: June 04, 2024 (last updated June 12, 2024)
is_closing_session() allows users to fill up apport.log
Attacker Value
Unknown

CVE-2022-28652

Disclosure Date: June 04, 2024 (last updated June 12, 2024)
~/.config/apport/settings parsing is vulnerable to "billion laughs" attack
Attacker Value
Unknown

CVE-2022-1242

Disclosure Date: June 03, 2024 (last updated June 04, 2024)
Apport can be tricked into connecting to arbitrary sockets as the root user
0
Attacker Value
Unknown

CVE-2022-0555

Disclosure Date: June 03, 2024 (last updated June 04, 2024)
Subiquity Shows Guided Storage Passphrase in Plaintext with Read-all Permissions
0
Attacker Value
Unknown

CVE-2021-3899

Disclosure Date: June 03, 2024 (last updated June 04, 2024)
There is a race condition in the 'replaced executable' detection that, with the correct local configuration, allow an attacker to execute arbitrary code as root.
0
Attacker Value
Unknown

CVE-2024-5138

Disclosure Date: May 31, 2024 (last updated June 01, 2024)
The snapctl component within snapd allows a confined snap to interact with the snapd daemon to take certain privileged actions on behalf of the snap. It was found that snapctl did not properly parse command-line arguments, allowing an unprivileged user to trigger an authorised action on behalf of the snap that would normally require administrator privileges to perform. This could possibly allow an unprivileged user to perform a denial of service or similar.
0