First published: Fri Jun 11 2021(Updated: )
It was discovered that the get_pid_info() function in data/apport did not properly parse the /proc/pid/status file from the kernel.
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Canonical Apport | >=2.20.1-0ubuntu1<2.20.1-0ubuntu2.30 | |
Canonical Apport | >=2.20.9-0ubuntu1<2.20.9-0ubuntu7.23 | |
Canonical Apport | >=2.20.11-0ubuntu27<2.20.11-0ubuntu27.16 | |
Canonical Apport | >=2.20.11-0ubuntu50<2.20.11-0ubuntu50.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-25682 is a vulnerability that allows attackers to obtain sensitive information from the /proc/pid/status file in the kernel.
CVE-2021-25682 affects Canonical Apport versions 2.20.1-0ubuntu2.30 and earlier, 2.20.9-0ubuntu7.23 and earlier, 2.20.11-0ubuntu27.16 and earlier, and 2.20.11-0ubuntu50.5 and earlier.
CVE-2021-25682 has a severity score of 7.8 (High).
To fix CVE-2021-25682, it is recommended to update to the latest version of Canonical Apport.
You can find more information about CVE-2021-25682 at the following reference: https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1912326