CVE Vulnerabilities

CVE-2021-3709

Insertion of Sensitive Information into Externally-Accessible File or Directory

Published: Oct 01, 2021 | Modified: Nov 21, 2024
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
2.1 LOW
AV:L/AC:L/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

Function check_attachment_for_errors() in file data/general-hooks/ubuntu.py could be tricked into exposing private data via a constructed crash file. This issue affects: apport 2.14.1 versions prior to 2.14.1-0ubuntu3.29+esm8; 2.20.1 versions prior to 2.20.1-0ubuntu2.30+esm2; 2.20.9 versions prior to 2.20.9-0ubuntu7.26; 2.20.11 versions prior to 2.20.11-0ubuntu27.20; 2.20.11 versions prior to 2.20.11-0ubuntu65.3;

Weakness

The product places sensitive information into files or directories that are accessible to actors who are allowed to have access to the files, but not to the sensitive information.

Affected Software

Name Vendor Start Version End Version
Apport Canonical 2.14.1-0ubuntu1 (including) 2.14.1-0ubuntu1 (including)
Apport Canonical 2.14.1-0ubuntu2 (including) 2.14.1-0ubuntu2 (including)
Apport Canonical 2.14.1-0ubuntu3 (including) 2.14.1-0ubuntu3 (including)
Apport Canonical 2.14.1-0ubuntu3.1 (including) 2.14.1-0ubuntu3.1 (including)
Apport Canonical 2.14.1-0ubuntu3.2 (including) 2.14.1-0ubuntu3.2 (including)
Apport Canonical 2.14.1-0ubuntu3.3 (including) 2.14.1-0ubuntu3.3 (including)
Apport Canonical 2.14.1-0ubuntu3.4 (including) 2.14.1-0ubuntu3.4 (including)
Apport Canonical 2.14.1-0ubuntu3.5 (including) 2.14.1-0ubuntu3.5 (including)
Apport Canonical 2.14.1-0ubuntu3.6 (including) 2.14.1-0ubuntu3.6 (including)
Apport Canonical 2.14.1-0ubuntu3.7 (including) 2.14.1-0ubuntu3.7 (including)
Apport Canonical 2.14.1-0ubuntu3.8 (including) 2.14.1-0ubuntu3.8 (including)
Apport Canonical 2.14.1-0ubuntu3.9 (including) 2.14.1-0ubuntu3.9 (including)
Apport Canonical 2.14.1-0ubuntu3.10 (including) 2.14.1-0ubuntu3.10 (including)
Apport Canonical 2.14.1-0ubuntu3.11 (including) 2.14.1-0ubuntu3.11 (including)
Apport Canonical 2.14.1-0ubuntu3.12 (including) 2.14.1-0ubuntu3.12 (including)
Apport Canonical 2.14.1-0ubuntu3.13 (including) 2.14.1-0ubuntu3.13 (including)
Apport Canonical 2.14.1-0ubuntu3.14 (including) 2.14.1-0ubuntu3.14 (including)
Apport Canonical 2.14.1-0ubuntu3.15 (including) 2.14.1-0ubuntu3.15 (including)
Apport Canonical 2.14.1-0ubuntu3.16 (including) 2.14.1-0ubuntu3.16 (including)
Apport Canonical 2.14.1-0ubuntu3.17 (including) 2.14.1-0ubuntu3.17 (including)
Apport Canonical 2.14.1-0ubuntu3.18 (including) 2.14.1-0ubuntu3.18 (including)
Apport Canonical 2.14.1-0ubuntu3.19 (including) 2.14.1-0ubuntu3.19 (including)
Apport Canonical 2.14.1-0ubuntu3.20 (including) 2.14.1-0ubuntu3.20 (including)
Apport Canonical 2.14.1-0ubuntu3.21 (including) 2.14.1-0ubuntu3.21 (including)
Apport Canonical 2.14.1-0ubuntu3.23 (including) 2.14.1-0ubuntu3.23 (including)
Apport Canonical 2.14.1-0ubuntu3.24 (including) 2.14.1-0ubuntu3.24 (including)
Apport Canonical 2.14.1-0ubuntu3.25 (including) 2.14.1-0ubuntu3.25 (including)
Apport Canonical 2.14.1-0ubuntu3.27 (including) 2.14.1-0ubuntu3.27 (including)
Apport Canonical 2.14.1-0ubuntu3.28 (including) 2.14.1-0ubuntu3.28 (including)
Apport Canonical 2.14.1-0ubuntu3.29 (including) 2.14.1-0ubuntu3.29 (including)
Apport Canonical 2.14.1-0ubuntu3.29+esm7 (including) 2.14.1-0ubuntu3.29+esm7 (including)
Apport Ubuntu bionic *
Apport Ubuntu devel *
Apport Ubuntu esm-infra/xenial *
Apport Ubuntu focal *
Apport Ubuntu hirsute *
Apport Ubuntu impish *
Apport Ubuntu jammy *
Apport Ubuntu trusty *
Apport Ubuntu trusty/esm *
Apport Ubuntu xenial *

Potential Mitigations

References