« List of all CVEs

CVE-2021-32553

apport read_file() function could follow maliciously constructed symbolic links

Published: 6/12/2021 Last updated: 9/16/2024 Reserved: 5/10/2021

It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-17 package apport hooks, it could expose private data to other local users.

CNA assigner: canonical (cc1ad9ee-3454-478d-9317-d3e869d708bc) Requested by: n/a

Metrics

Version Score Severity Vector String
3.1 7.3 High CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L

Opam packages affected (1)

conf-openjdk

Products affected (1)

Product Vendor Version
apport Canonical < 10.0.17763.4645

References (2)

Credits (1)