First published: Tue Jun 04 2024(Updated: )
is_closing_session() allows users to create arbitrary tcp dbus connections
Credit: security@ubuntu.com security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Python 3 Apport | <2.21.0 | |
Ubuntu | =18.04 | |
Ubuntu | =20.04 | |
Ubuntu | =21.10 | |
Ubuntu | =22.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-28655 is classified as a medium severity vulnerability due to its potential for exploitation in a local environment.
To fix CVE-2022-28655, update Apport to version 2.21.0 or later on affected Ubuntu systems.
CVE-2022-28655 affects Apport versions prior to 2.21.0 on Ubuntu 18.04, 20.04, 21.10, and 22.04.
The impact of CVE-2022-28655 allows unauthorized users to create arbitrary TCP D-Bus connections, posing a risk to system integrity.
As of now, there have been no confirmed reports of active exploitation of CVE-2022-28655.