apport read_file() function could follow maliciously constructed symbolic links
CVE-2021-32547

7.3HIGH

Key Information:

Vendor
Canonical
Status
Vendor
CVE Published:
12 June 2021

Summary

It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-lts package apport hooks, it could expose private data to other local users.

Affected Version(s)

apport 2.20.1 < 2.20.1-0ubuntu2.30+esm1

apport 2.20.9 < 2.20.9-0ubuntu7.24

apport 2.20.11-0ubuntu27 < 2.20.11-0ubuntu27.18

References

CVSS V3.1

Score:
7.3
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

.