apport read_file() function could follow maliciously constructed symbolic links
CVE-2021-32554

7.3HIGH

Key Information:

Vendor
Canonical
Status
Vendor
CVE Published:
12 June 2021

Summary

It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the xorg package apport hooks, it could expose private data to other local users.

Affected Version(s)

apport 2.20.1 < 2.20.1-0ubuntu2.30+esm1

apport 2.20.9 < 2.20.9-0ubuntu7.24

apport 2.20.11-0ubuntu27 < 2.20.11-0ubuntu27.18

References

CVSS V3.1

Score:
7.3
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

.