apport read_file() function could follow maliciously constructed symbolic links
CVE-2021-32551
7.3HIGH
Summary
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-15 package apport hooks, it could expose private data to other local users.
Affected Version(s)
apport 2.20.1 < 2.20.1-0ubuntu2.30+esm1
apport 2.20.9 < 2.20.9-0ubuntu7.24
apport 2.20.11-0ubuntu27 < 2.20.11-0ubuntu27.18
References
CVSS V3.1
Score:
7.3
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
Credit
[email protected] (@fktio)