Show filters
37 Total Results
Displaying 31-37 of 37
Sort by:
Attacker Value
Unknown

CVE-2021-32555

Disclosure Date: May 25, 2021 (last updated November 28, 2024)
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the xorg-hwe-18.04 package apport hooks, it could expose private data to other local users.
Attacker Value
Unknown

CVE-2021-32552

Disclosure Date: May 25, 2021 (last updated November 28, 2024)
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-16 package apport hooks, it could expose private data to other local users.
Attacker Value
Unknown

CVE-2021-32554

Disclosure Date: May 25, 2021 (last updated November 28, 2024)
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the xorg package apport hooks, it could expose private data to other local users.
Attacker Value
Unknown

CVE-2021-32547

Disclosure Date: May 25, 2021 (last updated November 28, 2024)
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-lts package apport hooks, it could expose private data to other local users.
Attacker Value
Unknown

CVE-2021-32551

Disclosure Date: May 25, 2021 (last updated November 28, 2024)
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-15 package apport hooks, it could expose private data to other local users.
Attacker Value
Unknown

CVE-2021-32553

Disclosure Date: May 25, 2021 (last updated November 28, 2024)
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-17 package apport hooks, it could expose private data to other local users.
Attacker Value
Unknown

CVE-2021-32549

Disclosure Date: May 25, 2021 (last updated November 28, 2024)
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-13 package apport hooks, it could expose private data to other local users.