It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-16 package apport hooks, it could expose private data to other local users.
References
Link | Resource |
---|---|
https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904 | Issue Tracking Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2021-06-12 04:15
Updated : 2021-06-15 15:28
NVD link : CVE-2021-32552
Mitre link : CVE-2021-32552
CVE.ORG link : CVE-2021-32552
JSON object : View
Products Affected
canonical
- ubuntu_linux