It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-17 package apport hooks, it could expose private data to other local users.
References
| Link | Resource |
|---|---|
| https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904 | Issue Tracking Vendor Advisory |
| https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904 | Issue Tracking Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 06:07
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904 - Issue Tracking, Vendor Advisory | |
| CVSS |
v2 : v3 : |
v2 : 2.1
v3 : 7.3 |
16 Jun 2021, 13:08
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:20.10:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:21.04:*:*:*:lts:*:*:* cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:* cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* cpe:2.3:a:oracle:openjdk:17:*:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : 2.1
v3 : 5.5 |
| CWE | CWE-59 | |
| References | (MISC) https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904 - Issue Tracking, Vendor Advisory |
12 Jun 2021, 04:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2021-06-12 04:15
Updated : 2024-11-21 06:07
NVD link : CVE-2021-32553
Mitre link : CVE-2021-32553
CVE.ORG link : CVE-2021-32553
JSON object : View
Products Affected
canonical
- ubuntu_linux
oracle
- openjdk
