First published: Fri Jun 11 2021(Updated: )
It was discovered that the get_starttime() function in data/apport did not properly parse the /proc/pid/stat file from the kernel.
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Canonical Apport | >=2.20.1-0ubuntu1<2.20.1-0ubuntu2.30 | |
Canonical Apport | >=2.20.9-0ubuntu1<2.20.9-0ubuntu7.23 | |
Canonical Apport | >=2.20.11-0ubuntu27<2.20.11-0ubuntu27.16 | |
Canonical Apport | >=2.20.11-0ubuntu50<2.20.11-0ubuntu50.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-25683 is a vulnerability that affects the get_starttime() function in data/apport, which does not properly parse the /proc/pid/stat file from the kernel.
The Canonical Apport software versions 2.20.1-0ubuntu1 to 2.20.1-0ubuntu2.30, 2.20.9-0ubuntu1 to 2.20.9-0ubuntu7.23, 2.20.11-0ubuntu27 to 2.20.11-0ubuntu27.16, and 2.20.11-0ubuntu50 to 2.20.11-0ubuntu50.5 are affected by CVE-2021-25683.
CVE-2021-25683 has a severity rating of 7.8 (High).
To fix the CVE-2021-25683 vulnerability, update the Canonical Apport software to versions higher than the affected ones.
You can find more information about CVE-2021-25683 at the following link: [https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1912326](https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1912326)