It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-17 package apport hooks, it could expose private data to other local users.
2021-06-12T04:15:12.157
2024-11-21T06:07:15.390
Modified
CVSSv3.1: 7.3 (HIGH)
AV:L/AC:L/Au:N/C:P/I:N/A:N
3.9
2.9
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Operating System | canonical | ubuntu_linux | 18.04 | Yes |
| Operating System | canonical | ubuntu_linux | 20.04 | Yes |
| Operating System | canonical | ubuntu_linux | 20.10 | Yes |
| Operating System | canonical | ubuntu_linux | 21.04 | Yes |
| Operating System | canonical | ubuntu_linux | 21.10 | Yes |
| Application | oracle | openjdk | 17 | Yes |