Untriaged
Permalink
CVE-2022-1242
7.8 HIGH
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
Apport can be tricked into connecting to arbitrary sockets as …
Apport can be tricked into connecting to arbitrary sockets as the root user
References
-
https://ubuntu.com/security/notices/USN-5427-1 vendor-advisory
-
https://www.cve.org/CVERecord?id=CVE-2022-1242 issue-tracking
-
-
-
https://ubuntu.com/security/notices/USN-5427-1 vendor-advisory
-
https://www.cve.org/CVERecord?id=CVE-2022-1242 issue-tracking
-
https://ubuntu.com/security/notices/USN-5427-1 vendor-advisory
-
https://www.cve.org/CVERecord?id=CVE-2022-1242 issue-tracking
-
-
-
https://ubuntu.com/security/notices/USN-5427-1 vendor-advisory
-
https://www.cve.org/CVERecord?id=CVE-2022-1242 issue-tracking
-
-
Affected products
apport
- <2.21.0
Matching in nixpkgs
pkgs.haskellPackages.apportionment
Round a set of numbers while maintaining its sum
Package maintainers
-
@thielema Henning Thielemann <nix@henning-thielemann.de>