CVE-2021-32548

It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-8 package apport hooks, it could expose private data to other local users.
Link Following
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.3 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L
canonicalCNA
7.3 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 14%
VendorProductVersion
canonicalubuntu_linux
18.04
canonicalubuntu_linux
20.04
canonicalubuntu_linux
20.10
canonicalubuntu_linux
21.04
canonicalubuntu_linux
21.10
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
apport
jammy
Fixed 2.20.11-0ubuntu67
released
impish
Fixed 2.20.11-0ubuntu67
released
hirsute
Fixed 2.20.11-0ubuntu65.1
released
groovy
Fixed 2.20.11-0ubuntu50.7
released
focal
Fixed 2.20.11-0ubuntu27.18
released
bionic
Fixed 2.20.9-0ubuntu7.24
released
xenial
Fixed 2.20.1-0ubuntu2.30+esm1
released
trusty
Fixed 2.14.1-0ubuntu3.29+esm7
released