Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2021-32548

Опубликовано: 12 июн. 2021
Источник: nvd
CVSS3: 7.3
CVSS3: 5.5
CVSS2: 2.1
EPSS Низкий

Описание

It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-8 package apport hooks, it could expose private data to other local users.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:21.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:*

EPSS

Процентиль: 19%
0.00061
Низкий

7.3 High

CVSS3

5.5 Medium

CVSS3

2.1 Low

CVSS2

Дефекты

CWE-59
CWE-59

Связанные уязвимости

CVSS3: 7.3
ubuntu
больше 4 лет назад

It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-8 package apport hooks, it could expose private data to other local users.

github
больше 3 лет назад

It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-8 package apport hooks, it could expose private data to other local users.

EPSS

Процентиль: 19%
0.00061
Низкий

7.3 High

CVSS3

5.5 Medium

CVSS3

2.1 Low

CVSS2

Дефекты

CWE-59
CWE-59