Severity
5.5MEDIUM
EPSS
0.1%
top 78.31%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 1
Latest updateMay 24

Description

Function check_attachment_for_errors() in file data/general-hooks/ubuntu.py could be tricked into exposing private data via a constructed crash file. This issue affects: apport 2.14.1 versions prior to 2.14.1-0ubuntu3.29+esm8; 2.20.1 versions prior to 2.20.1-0ubuntu2.30+esm2; 2.20.9 versions prior to 2.20.9-0ubuntu7.26; 2.20.11 versions prior to 2.20.11-0ubuntu27.20; 2.20.11 versions prior to 2.20.11-0ubuntu65.3;

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:NExploitability: 2.0 | Impact: 4.0

Affected Packages3 packages

CVEListV5canonical/apport2.14.12.14.1-0ubuntu3.29+esm8+3
Ubuntuapport< 2.20.9-0ubuntu7.26+3
NVDcanonical/apport170 versions+169

🔴Vulnerability Details

3
GHSA
GHSA-hq94-g33h-jj2x: Function check_attachment_for_errors() in file data/general-hooks/ubuntu2022-05-24
CVEList
Apport file permission bypass through emacs byte compilation errors2021-10-01
OSV
CVE-2021-3709: Function check_attachment_for_errors() in file data/general-hooks/ubuntu2021-09-14

📋Vendor Advisories

2
Ubuntu
Apport vulnerabilities2021-09-14
Ubuntu
Apport vulnerabilities2021-09-14
CVE-2021-3709 (MEDIUM CVSS 5.5) | Function check_attachment_for_error | cvebase.io