Apport file permission bypass through emacs byte compilation errors
CVE-2021-3709
6.5MEDIUM
Summary
Function check_attachment_for_errors() in file data/general-hooks/ubuntu.py could be tricked into exposing private data via a constructed crash file. This issue affects: apport 2.14.1 versions prior to 2.14.1-0ubuntu3.29+esm8; 2.20.1 versions prior to 2.20.1-0ubuntu2.30+esm2; 2.20.9 versions prior to 2.20.9-0ubuntu7.26; 2.20.11 versions prior to 2.20.11-0ubuntu27.20; 2.20.11 versions prior to 2.20.11-0ubuntu65.3;
Affected Version(s)
apport 2.14.1 < 2.14.1-0ubuntu3.29+esm8
apport 2.20.1 < 2.20.1-0ubuntu2.30+esm2
apport 2.20.9 < 2.20.9-0ubuntu7.26
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Maik MĂĽnch ([email protected])(@fktio)