Your submission was sent successfully! Close

CVE-2021-32553

Published: 25 May 2021

It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-17 package apport hooks, it could expose private data to other local users.

Priority

Medium

CVSS 3 base score: 5.5

Status

Package Release Status
apport
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 21.10 (Impish Indri)
Released (2.20.11-0ubuntu67)
Ubuntu 21.04 (Hirsute Hippo)
Released (2.20.11-0ubuntu65.1)
Ubuntu 20.04 LTS (Focal Fossa)
Released (2.20.11-0ubuntu27.18)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (2.20.9-0ubuntu7.24)
Ubuntu 16.04 ESM (Xenial Xerus)
Released (2.20.1-0ubuntu2.30+esm1)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (2.14.1-0ubuntu3.29+esm7)