Lucene search

K

9 matches found

CVE
CVE
added 2024/06/03 7:15 p.m.7127 views

CVE-2022-1242

Apport can be tricked into connecting to arbitrary sockets as the root user

7.8CVSS6.7AI score0.00041EPSS
CVE
CVE
added 2024/06/03 7:15 p.m.1868 views

CVE-2021-3899

There is a race condition in the 'replaced executable' detection that, with the correct local configuration, allow an attacker to execute arbitrary code as root.

7.8CVSS7.2AI score0.02997EPSS
CVE
CVE
added 2024/06/04 10:15 p.m.195 views

CVE-2022-28652

~/.config/apport/settings parsing is vulnerable to "billion laughs" attack

5.5CVSS6.6AI score0.00043EPSS
CVE
CVE
added 2024/06/21 8:15 p.m.102 views

CVE-2020-27352

When generating the systemd service units for the docker snap (and other similar snaps), snapd does not specify Delegate=yes - as a result systemd will move processes from the containers created and managed by these snaps into the cgroup of the main daemon within the snap itself when reloading syst...

9.3CVSS9.2AI score0.00112EPSS
CVE
CVE
added 2024/06/04 10:15 p.m.68 views

CVE-2022-28658

Apport argument parsing mishandles filename splitting on older kernels resulting in argument spoofing

5.5CVSS6.6AI score0.00041EPSS
CVE
CVE
added 2024/06/04 10:15 p.m.56 views

CVE-2022-28655

is_closing_session() allows users to create arbitrary tcp dbus connections

7.1CVSS6.6AI score0.00039EPSS
CVE
CVE
added 2024/06/04 10:15 p.m.46 views

CVE-2022-28656

is_closing_session() allows users to consume RAM in the Apport process

5.5CVSS6.5AI score0.00038EPSS
CVE
CVE
added 2024/06/04 10:15 p.m.46 views

CVE-2022-28657

Apport does not disable python crash handler before entering chroot

7.8CVSS6.6AI score0.0004EPSS
CVE
CVE
added 2024/06/04 10:15 p.m.40 views

CVE-2022-28654

is_closing_session() allows users to fill up apport.log

5.5CVSS6.5AI score0.00039EPSS