Show filters
37 Total Results
Displaying 31-37 of 37
Sort by:
Attacker Value
Unknown
CVE-2021-32555
Disclosure Date: May 25, 2021 (last updated November 28, 2024)
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the xorg-hwe-18.04 package apport hooks, it could expose private data to other local users.
0
Attacker Value
Unknown
CVE-2021-32552
Disclosure Date: May 25, 2021 (last updated November 28, 2024)
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-16 package apport hooks, it could expose private data to other local users.
0
Attacker Value
Unknown
CVE-2021-32554
Disclosure Date: May 25, 2021 (last updated November 28, 2024)
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the xorg package apport hooks, it could expose private data to other local users.
0
Attacker Value
Unknown
CVE-2021-32547
Disclosure Date: May 25, 2021 (last updated November 28, 2024)
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-lts package apport hooks, it could expose private data to other local users.
0
Attacker Value
Unknown
CVE-2021-32551
Disclosure Date: May 25, 2021 (last updated November 28, 2024)
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-15 package apport hooks, it could expose private data to other local users.
0
Attacker Value
Unknown
CVE-2021-32553
Disclosure Date: May 25, 2021 (last updated November 28, 2024)
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-17 package apport hooks, it could expose private data to other local users.
0
Attacker Value
Unknown
CVE-2021-32549
Disclosure Date: May 25, 2021 (last updated November 28, 2024)
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-13 package apport hooks, it could expose private data to other local users.
0