CVE-2021-25682

Severity
7.8HIGH
EPSS
0.1%
top 70.09%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 11
Latest updateMay 24

Description

It was discovered that the get_pid_info() function in data/apport did not properly parse the /proc/pid/status file from the kernel.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:HExploitability: 2.0 | Impact: 6.0

Affected Packages3 packages

CVEListV5canonical/apport2.20.12.20.1-0ubuntu2.30+3
NVDcanonical/apport2.20.1-0ubuntu12.20.1-0ubuntu2.30+3
Ubuntuapport< 2.20.1-0ubuntu2.30+3

🔴Vulnerability Details

5
GHSA
GHSA-7398-g2qh-pr9p: It was discovered that the get_pid_info() function in data/apport did not properly parse the /proc/pid/status file from the kernel2022-05-24
CVEList
apport improperly parses /proc/pid/status2021-06-11
OSV
apport vulnerabilities2021-02-03
OSV
CVE-2021-25682: It was discovered that the get_pid_info() function in data/apport did not properly parse the /proc/pid/status file from the kernel2021-02-02
OSV
apport vulnerabilities2021-02-02

📋Vendor Advisories

2
Ubuntu
Apport vulnerabilities2021-02-03
Ubuntu
Apport vulnerabilities2021-02-02
CVE-2021-25682 (HIGH CVSS 7.8) | It was discovered that the get_pid_ | cvebase.io