Show filters
41 Total Results
Displaying 1-10 of 41
Sort by:
Attacker Value
Unknown
CVE-2020-11936
Disclosure Date: January 31, 2025 (last updated January 31, 2025)
gdbus setgid privilege escalation
0
Attacker Value
Unknown
CVE-2022-28653
Disclosure Date: January 31, 2025 (last updated January 31, 2025)
Users can consume unlimited disk space in /var/crash
0
Attacker Value
Unknown
CVE-2022-28658
Disclosure Date: June 04, 2024 (last updated June 12, 2024)
Apport argument parsing mishandles filename splitting on older kernels resulting in argument spoofing
0
Attacker Value
Unknown
CVE-2022-28657
Disclosure Date: June 04, 2024 (last updated June 12, 2024)
Apport does not disable python crash handler before entering chroot
0
Attacker Value
Unknown
CVE-2022-28656
Disclosure Date: June 04, 2024 (last updated June 12, 2024)
is_closing_session() allows users to consume RAM in the Apport process
0
Attacker Value
Unknown
CVE-2022-28655
Disclosure Date: June 04, 2024 (last updated June 12, 2024)
is_closing_session() allows users to create arbitrary tcp dbus connections
0
Attacker Value
Unknown
CVE-2022-28654
Disclosure Date: June 04, 2024 (last updated June 12, 2024)
is_closing_session() allows users to fill up apport.log
0
Attacker Value
Unknown
CVE-2022-28652
Disclosure Date: June 04, 2024 (last updated June 12, 2024)
~/.config/apport/settings parsing is vulnerable to "billion laughs" attack
0
Attacker Value
Unknown
CVE-2022-1242
Disclosure Date: June 03, 2024 (last updated June 04, 2024)
Apport can be tricked into connecting to arbitrary sockets as the root user
0
Attacker Value
Unknown
CVE-2021-3899
Disclosure Date: June 03, 2024 (last updated June 04, 2024)
There is a race condition in the 'replaced executable' detection that, with the correct local configuration, allow an attacker to execute arbitrary code as root.
0