Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-32549
HistoryMay 25, 2021 - 12:00 a.m.

CVE-2021-32549

2021-05-2500:00:00
ubuntu.com
ubuntu.com
12
cve-2021-32549
openjdk-13
symbolic links
fifos
local users
apport hooks
data exposure
ubuntu
launchpad
bug

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

CVSS3

7.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L

EPSS

0

Percentile

5.1%

It was discovered that read_file() in apport/hookutils.py would follow
symbolic links or open FIFOs. When this function is used by the openjdk-13
package apport hooks, it could expose private data to other local users.

Bugs

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchapport< 2.20.9-0ubuntu7.24UNKNOWN
ubuntu20.04noarchapport< 2.20.11-0ubuntu27.18UNKNOWN
ubuntu20.10noarchapport< 2.20.11-0ubuntu50.7UNKNOWN
ubuntu21.04noarchapport< 2.20.11-0ubuntu65.1UNKNOWN
ubuntu21.10noarchapport< 2.20.11-0ubuntu67UNKNOWN
ubuntu22.04noarchapport< 2.20.11-0ubuntu67UNKNOWN
ubuntu14.04noarchapport< 2.14.1-0ubuntu3.29+esm7UNKNOWN
ubuntu16.04noarchapport< 2.20.1-0ubuntu2.30+esm1UNKNOWN

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

CVSS3

7.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L

EPSS

0

Percentile

5.1%