It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-17 package apport hooks, it could expose private data to other local users.
References
Link | Resource |
---|---|
https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904 | Issue Tracking Vendor Advisory |
https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904 | Issue Tracking Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 06:07
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 2.1
v3 : 7.3 |
References | () https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904 - Issue Tracking, Vendor Advisory |
Information
Published : 2021-06-12 04:15
Updated : 2024-11-21 06:07
NVD link : CVE-2021-32553
Mitre link : CVE-2021-32553
CVE.ORG link : CVE-2021-32553
JSON object : View
Products Affected
canonical
- ubuntu_linux
oracle
- openjdk