apport read_file() function could follow maliciously constructed symbolic links
CVE-2021-32548
7.3HIGH
What is CVE-2021-32548?
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-8 package apport hooks, it could expose private data to other local users.
Affected Version(s)
apport 2.20.1 < 2.20.1-0ubuntu2.30+esm1
apport 2.20.9 < 2.20.9-0ubuntu7.24
apport 2.20.11-0ubuntu27 < 2.20.11-0ubuntu27.18
