Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2021-32552

Published: 25 May 2021

It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-16 package apport hooks, it could expose private data to other local users.

Priority

Medium

CVSS 3 base score: 5.5

Status

Package Release Status
apport
Launchpad, Ubuntu, Debian
bionic
Released (2.20.9-0ubuntu7.24)
focal
Released (2.20.11-0ubuntu27.18)
groovy
Released (2.20.11-0ubuntu50.7)
hirsute
Released (2.20.11-0ubuntu65.1)
impish
Released (2.20.11-0ubuntu67)
jammy
Released (2.20.11-0ubuntu67)
precise Does not exist

trusty
Released (2.14.1-0ubuntu3.29+esm7)
upstream Needs triage

xenial
Released (2.20.1-0ubuntu2.30+esm1)