Search CVE reports
11 – 20 of 52 results
CVE-2021-3710
Medium priorityAn information disclosure via path traversal was discovered in apport/hookutils.py function read_file(). This issue affects: apport 2.14.1 versions prior to 2.14.1-0ubuntu3.29+esm8; 2.20.1 versions prior...
1 affected packages
apport
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
apport | — | Fixed | Fixed | Fixed | Fixed |
CVE-2021-3709
Medium priorityFunction check_attachment_for_errors() in file data/general-hooks/ubuntu.py could be tricked into exposing private data via a constructed crash file. This issue affects: apport 2.14.1 versions prior to 2.14.1-0ubuntu3.29+esm8;...
1 affected packages
apport
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
apport | — | Fixed | Fixed | Fixed | Fixed |
CVE-2021-32557
Medium priorityIt was discovered that the process_report() function in data/whoopsie-upload-all allowed arbitrary file writes via symlinks.
1 affected packages
apport
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
apport | — | Fixed | Fixed | Fixed | Fixed |
CVE-2021-32556
Medium priorityIt was discovered that the get_modified_conffiles() function in backends/packaging-apt-dpkg.py allowed injecting modified package names in a manner that would confuse the dpkg(1) call.
1 affected packages
apport
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
apport | — | Fixed | Fixed | Fixed | Fixed |
CVE-2021-32555
Medium priorityIt was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the xorg-hwe-18.04 package apport hooks, it could expose private data to other local users.
1 affected packages
apport
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
apport | — | Fixed | Fixed | Fixed | Fixed |
CVE-2021-32554
Medium priorityIt was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the xorg package apport hooks, it could expose private data to other local users.
1 affected packages
apport
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
apport | — | Fixed | Fixed | Fixed | Fixed |
CVE-2021-32553
Medium priorityIt was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-17 package apport hooks, it could expose private data to other local users.
1 affected packages
apport
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
apport | — | Fixed | Fixed | Fixed | Fixed |
CVE-2021-32552
Medium priorityIt was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-16 package apport hooks, it could expose private data to other local users.
1 affected packages
apport
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
apport | — | Fixed | Fixed | Fixed | Fixed |
CVE-2021-32551
Medium priorityIt was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-15 package apport hooks, it could expose private data to other local users.
1 affected packages
apport
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
apport | — | Fixed | Fixed | Fixed | Fixed |
CVE-2021-32550
Medium priorityIt was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-14 package apport hooks, it could expose private data to other local users.
1 affected packages
apport
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
apport | — | Fixed | Fixed | Fixed | Fixed |