Total vulnerabilities in the database
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-14 package apport hooks, it could expose private data to other local users.
Software | From | Fixed in |
---|---|---|
canonical / ubuntu_linux | 18.04 | 18.04.x |
canonical / ubuntu_linux | 20.04 | 20.04.x |
canonical / ubuntu_linux | 20.10 | 20.10.x |
canonical / ubuntu_linux | 21.10 | 21.10.x |
canonical / ubuntu_linux | 21.04 | 21.04.x |