Vulnerability CVE-2021-32553


Published: 2021-06-12

Description:
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-17 package apport hooks, it could expose private data to other local users.

Type:

CWE-59

(Improper Link Resolution Before File Access ('Link Following'))

CVSS2 => (AV:L/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
2.1/10
2.9/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Oracle -> Openjdk 
Canonical -> Ubuntu linux 

 References:
https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904

Copyright 2024, cxsecurity.com

 

Back to Top