CVE-2021-25683

Severity
7.8HIGH
EPSS
0.0%
top 85.39%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 11
Latest updateMay 24

Description

It was discovered that the get_starttime() function in data/apport did not properly parse the /proc/pid/stat file from the kernel.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:HExploitability: 2.0 | Impact: 6.0

Affected Packages3 packages

CVEListV5canonical/apport2.20.12.20.1-0ubuntu2.30+3
NVDcanonical/apport2.20.1-0ubuntu12.20.1-0ubuntu2.30+3
Ubuntuapport< 2.20.1-0ubuntu2.30+3

🔴Vulnerability Details

5
GHSA
GHSA-v5cq-cqrx-4rpr: It was discovered that the get_starttime() function in data/apport did not properly parse the /proc/pid/stat file from the kernel2022-05-24
CVEList
apport improperly parses /proc/pid/stat2021-06-11
OSV
apport vulnerabilities2021-02-03
OSV
apport vulnerabilities2021-02-02
OSV
CVE-2021-25683: It was discovered that the get_starttime() function in data/apport did not properly parse the /proc/pid/stat file from the kernel2021-02-02

📋Vendor Advisories

2
Ubuntu
Apport vulnerabilities2021-02-03
Ubuntu
Apport vulnerabilities2021-02-02