Search CVE reports


Toggle filters

11 – 20 of 52 results


CVE-2021-3710

Medium priority
Fixed

An information disclosure via path traversal was discovered in apport/hookutils.py function read_file(). This issue affects: apport 2.14.1 versions prior to 2.14.1-0ubuntu3.29+esm8; 2.20.1 versions prior...

1 affected package

apport

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
apport Fixed Fixed Fixed Fixed
Show less packages

CVE-2021-3709

Medium priority
Fixed

Function check_attachment_for_errors() in file data/general-hooks/ubuntu.py could be tricked into exposing private data via a constructed crash file. This issue affects: apport 2.14.1 versions prior to 2.14.1-0ubuntu3.29+esm8;...

1 affected package

apport

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
apport Fixed Fixed Fixed Fixed
Show less packages

CVE-2021-32557

Medium priority
Fixed

It was discovered that the process_report() function in data/whoopsie-upload-all allowed arbitrary file writes via symlinks.

1 affected package

apport

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
apport Fixed Fixed Fixed Fixed
Show less packages

CVE-2021-32556

Medium priority
Fixed

It was discovered that the get_modified_conffiles() function in backends/packaging-apt-dpkg.py allowed injecting modified package names in a manner that would confuse the dpkg(1) call.

1 affected package

apport

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
apport Fixed Fixed Fixed Fixed
Show less packages

CVE-2021-32555

Medium priority
Fixed

It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the xorg-hwe-18.04 package apport hooks, it could expose private data to other local users.

1 affected package

apport

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
apport Fixed Fixed Fixed Fixed
Show less packages

CVE-2021-32554

Medium priority
Fixed

It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the xorg package apport hooks, it could expose private data to other local users.

1 affected package

apport

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
apport Fixed Fixed Fixed Fixed
Show less packages

CVE-2021-32553

Medium priority
Fixed

It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-17 package apport hooks, it could expose private data to other local users.

1 affected package

apport

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
apport Fixed Fixed Fixed Fixed
Show less packages

CVE-2021-32552

Medium priority
Fixed

It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-16 package apport hooks, it could expose private data to other local users.

1 affected package

apport

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
apport Fixed Fixed Fixed Fixed
Show less packages

CVE-2021-32551

Medium priority
Fixed

It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-15 package apport hooks, it could expose private data to other local users.

1 affected package

apport

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
apport Fixed Fixed Fixed Fixed
Show less packages

CVE-2021-32550

Medium priority
Fixed

It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-14 package apport hooks, it could expose private data to other local users.

1 affected package

apport

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
apport Fixed Fixed Fixed Fixed
Show less packages