Show filters
41 Total Results
Displaying 1-10 of 41
Sort by:
Attacker Value
Unknown

CVE-2020-11936

Disclosure Date: January 31, 2025 (last updated January 31, 2025)
gdbus setgid privilege escalation
0
Attacker Value
Unknown

CVE-2022-28653

Disclosure Date: January 31, 2025 (last updated January 31, 2025)
Users can consume unlimited disk space in /var/crash
0
Attacker Value
Unknown

CVE-2022-28658

Disclosure Date: June 04, 2024 (last updated June 12, 2024)
Apport argument parsing mishandles filename splitting on older kernels resulting in argument spoofing
Attacker Value
Unknown

CVE-2022-28657

Disclosure Date: June 04, 2024 (last updated June 12, 2024)
Apport does not disable python crash handler before entering chroot
Attacker Value
Unknown

CVE-2022-28656

Disclosure Date: June 04, 2024 (last updated June 12, 2024)
is_closing_session() allows users to consume RAM in the Apport process
Attacker Value
Unknown

CVE-2022-28655

Disclosure Date: June 04, 2024 (last updated June 12, 2024)
is_closing_session() allows users to create arbitrary tcp dbus connections
Attacker Value
Unknown

CVE-2022-28654

Disclosure Date: June 04, 2024 (last updated June 12, 2024)
is_closing_session() allows users to fill up apport.log
Attacker Value
Unknown

CVE-2022-28652

Disclosure Date: June 04, 2024 (last updated June 12, 2024)
~/.config/apport/settings parsing is vulnerable to "billion laughs" attack
Attacker Value
Unknown

CVE-2022-1242

Disclosure Date: June 03, 2024 (last updated June 04, 2024)
Apport can be tricked into connecting to arbitrary sockets as the root user
0
Attacker Value
Unknown

CVE-2021-3899

Disclosure Date: June 03, 2024 (last updated June 04, 2024)
There is a race condition in the 'replaced executable' detection that, with the correct local configuration, allow an attacker to execute arbitrary code as root.
0