First published: Tue Sep 14 2021(Updated: )
Maik Münch and Stephen Röttger discovered that Apport incorrectly handled certain information gathering operations. A local attacker could use this issue to gain read access to arbitrary files, possibly containing sensitive information.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/python3-apport | <2.20.11-0ubuntu65.3 | 2.20.11-0ubuntu65.3 |
Ubuntu Ubuntu | =21.04 | |
All of | ||
ubuntu/apport | <2.20.11-0ubuntu65.3 | 2.20.11-0ubuntu65.3 |
Ubuntu Ubuntu | =21.04 | |
All of | ||
ubuntu/python3-apport | <2.20.11-0ubuntu27.20 | 2.20.11-0ubuntu27.20 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/apport | <2.20.11-0ubuntu27.20 | 2.20.11-0ubuntu27.20 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/python-apport | <2.20.9-0ubuntu7.26 | 2.20.9-0ubuntu7.26 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/python3-apport | <2.20.9-0ubuntu7.26 | 2.20.9-0ubuntu7.26 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/apport | <2.20.9-0ubuntu7.26 | 2.20.9-0ubuntu7.26 |
Ubuntu Ubuntu | =18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this advisory is USN-5077-1.
The software affected by this vulnerability is Apport.
The remedy for this vulnerability is to update to version 2.20.11-0ubuntu65.3 for python3-apport and apport packages for Ubuntu 21.04.
A local attacker can exploit this vulnerability by using certain information gathering operations to gain read access to arbitrary files, possibly containing sensitive information.
You can find more information about this vulnerability at the following references: [CVE-2021-3710](https://ubuntu.com/security/CVE-2021-3710), [CVE-2021-3709](https://ubuntu.com/security/CVE-2021-3709), [USN-5077-2](https://ubuntu.com/security/notices/USN-5077-2)