Your submission was sent successfully! Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

Search CVE reports


Toggle filters

11 – 20 of 52 results


CVE-2021-3710

Medium priority
Fixed

An information disclosure via path traversal was discovered in apport/hookutils.py function read_file(). This issue affects: apport 2.14.1 versions prior to 2.14.1-0ubuntu3.29+esm8; 2.20.1 versions prior...

1 affected packages

apport

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
apport Fixed Fixed Fixed Fixed
Show less packages

CVE-2021-3709

Medium priority
Fixed

Function check_attachment_for_errors() in file data/general-hooks/ubuntu.py could be tricked into exposing private data via a constructed crash file. This issue affects: apport 2.14.1 versions prior to 2.14.1-0ubuntu3.29+esm8;...

1 affected packages

apport

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
apport Fixed Fixed Fixed Fixed
Show less packages

CVE-2021-32557

Medium priority
Fixed

It was discovered that the process_report() function in data/whoopsie-upload-all allowed arbitrary file writes via symlinks.

1 affected packages

apport

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
apport Fixed Fixed Fixed Fixed
Show less packages

CVE-2021-32556

Medium priority
Fixed

It was discovered that the get_modified_conffiles() function in backends/packaging-apt-dpkg.py allowed injecting modified package names in a manner that would confuse the dpkg(1) call.

1 affected packages

apport

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
apport Fixed Fixed Fixed Fixed
Show less packages

CVE-2021-32555

Medium priority
Fixed

It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the xorg-hwe-18.04 package apport hooks, it could expose private data to other local users.

1 affected packages

apport

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
apport Fixed Fixed Fixed Fixed
Show less packages

CVE-2021-32554

Medium priority
Fixed

It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the xorg package apport hooks, it could expose private data to other local users.

1 affected packages

apport

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
apport Fixed Fixed Fixed Fixed
Show less packages

CVE-2021-32553

Medium priority
Fixed

It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-17 package apport hooks, it could expose private data to other local users.

1 affected packages

apport

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
apport Fixed Fixed Fixed Fixed
Show less packages

CVE-2021-32552

Medium priority
Fixed

It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-16 package apport hooks, it could expose private data to other local users.

1 affected packages

apport

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
apport Fixed Fixed Fixed Fixed
Show less packages

CVE-2021-32551

Medium priority
Fixed

It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-15 package apport hooks, it could expose private data to other local users.

1 affected packages

apport

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
apport Fixed Fixed Fixed Fixed
Show less packages

CVE-2021-32550

Medium priority
Fixed

It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-14 package apport hooks, it could expose private data to other local users.

1 affected packages

apport

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
apport Fixed Fixed Fixed Fixed
Show less packages