9 matches found
CVE-2022-1242
Apport can be tricked into connecting to arbitrary sockets as the root user
CVE-2021-3899
There is a race condition in the 'replaced executable' detection that, with the correct local configuration, allow an attacker to execute arbitrary code as root.
CVE-2022-28652
~/.config/apport/settings parsing is vulnerable to "billion laughs" attack
CVE-2020-27352
When generating the systemd service units for the docker snap (and other similar snaps), snapd does not specify Delegate=yes - as a result systemd will move processes from the containers created and managed by these snaps into the cgroup of the main daemon within the snap itself when reloading syst...
CVE-2022-28658
Apport argument parsing mishandles filename splitting on older kernels resulting in argument spoofing
CVE-2022-28655
is_closing_session() allows users to create arbitrary tcp dbus connections
CVE-2022-28656
is_closing_session() allows users to consume RAM in the Apport process
CVE-2022-28657
Apport does not disable python crash handler before entering chroot
CVE-2022-28654
is_closing_session() allows users to fill up apport.log