CVE-2021-32553
Published Jun 12, 2021
Last updated 3 years ago
Overview
- Description
- It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-17 package apport hooks, it could expose private data to other local users.
- Source
- security@ubuntu.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 5.5
- Impact score
- 3.6
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 2.1
- Impact score
- 2.9
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:P/I:N/A:N
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "vulnerable": true, "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "vulnerable": true, "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "338B3AAC-C147-4A31-95E7-6E8A6FB4B3FC" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:21.04:*:*:*:lts:*:*:*", "vulnerable": true, "matchCriteriaId": "D5F0EBD8-0681-4AE6-90E5-78F8AAB39123" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AAE4D2D0-CEEB-416F-8BC5-A7987DF56190" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:openjdk:17:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D0A929D-6054-4EFB-8BAD-58826D22D34B" } ], "operator": "OR" } ] } ]