CVE-2021-32551
12.06.2021, 04:15
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-15 package apport hooks, it could expose private data to other local users.
Vendor | Product | Version |
---|---|---|
canonical | ubuntu_linux | 18.04 |
canonical | ubuntu_linux | 20.04 |
canonical | ubuntu_linux | 20.10 |
canonical | ubuntu_linux | 21.04 |
canonical | ubuntu_linux | 21.10 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Ubuntu Product | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
apport |
|