CVE-2021-32547

HIGH

Canonical Ubuntu Linux - Symlink Following

Title source: rule
STIX 2.1

Description

It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-lts package apport hooks, it could expose private data to other local users.

Scores

CVSS v3 7.3
EPSS 0.0006
EPSS Percentile 18.8%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L

Details

CWE
CWE-61 CWE-59
Status published
Products (5)
canonical/ubuntu_linux 18.04
canonical/ubuntu_linux 20.04
canonical/ubuntu_linux 20.10
canonical/ubuntu_linux 21.04
canonical/ubuntu_linux 21.10
Published Jun 12, 2021
Tracked Since Feb 18, 2026