Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 17 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:canonical:apport:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Thu, 11 Dec 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Canonical
Canonical apport Canonical ubuntu |
|
| Vendors & Products |
Canonical
Canonical apport Canonical ubuntu |
Wed, 10 Dec 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 10 Dec 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | It was discovered that process_crash() in data/apport in Canonical's Apport crash reporting tool may create crash files with incorrect group ownership, possibly exposing crash information beyond expected or intended groups. | |
| Title | Ubuntu Apport Insecure File Permissions Vulnerability | |
| Weaknesses | CWE-708 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2025-12-10T18:45:08.960Z
Reserved: 2025-06-02T12:03:56.269Z
Link: CVE-2025-5467
Updated: 2025-12-10T18:45:05.126Z
Status : Analyzed
Published: 2025-12-10T18:16:19.070
Modified: 2025-12-17T17:12:03.400
Link: CVE-2025-5467
No data.
OpenCVE Enrichment
Updated: 2025-12-11T15:17:45Z