Your submission was sent successfully! Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

Search CVE reports


Toggle filters

1 – 6 of 6 results


CVE-2011-2777

Medium priority

Some fixes available 4 of 5

samples/powerbtn/powerbtn.sh in acpid (aka acpid2) 2.0.16 and earlier uses the pidof program incorrectly, which allows local users to gain privileges by running a program with the name kded4 and a...

1 affected packages

acpid

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
acpid
Show less packages

CVE-2011-4578

Medium priority

Some fixes available 4 of 5

event.c in acpid (aka acpid2) before 2.0.11 does not have an appropriate umask setting during execution of event-handler scripts, which might allow local users to (1) perform write operations within directories created by...

1 affected packages

acpid

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
acpid
Show less packages

CVE-2011-1159

Medium priority

Some fixes available 3 of 4

acpid.c in acpid before 2.0.9 does not properly handle a situation in which a process has connected to acpid.socket but is not reading any data, which allows local users to cause a denial of service (daemon hang) via a...

1 affected packages

acpid

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
acpid
Show less packages

CVE-2009-4235

Medium priority
Not affected

acpid 1.0.4 sets an unrestrictive umask, which might allow local users to leverage weak permissions on /var/log/acpid, and obtain sensitive information by reading this file or cause a denial of service by overwriting this file, a...

1 affected packages

acpid

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
acpid
Show less packages

CVE-2009-4033

Medium priority
Ignored

A certain Red Hat patch for acpid 1.0.4 effectively triggers a call to the open function with insufficient arguments, which might allow local users to leverage weak permissions on /var/log/acpid, and obtain sensitive information...

1 affected packages

acpid

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
acpid
Show less packages

CVE-2009-0798

Low priority

Some fixes available 4 of 5

ACPI Event Daemon (acpid) before 1.0.10 allows remote attackers to cause a denial of service (CPU consumption and connectivity loss) by opening a large number of UNIX sockets without closing them, which triggers an infinite loop.

1 affected packages

acpid

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
acpid
Show less packages