apport read_file() function could follow maliciously constructed symbolic links
CVE-2021-32554 
7.3HIGH
What is CVE-2021-32554?
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the xorg package apport hooks, it could expose private data to other local users.
Affected Version(s)
apport 2.20.1 < 2.20.1-0ubuntu2.30+esm1
apport 2.20.9 < 2.20.9-0ubuntu7.24
apport 2.20.11-0ubuntu27 < 2.20.11-0ubuntu27.18
References
CVSS V3.1
Score:
7.3
Severity:
HIGH
Confidentiality:
High
Integrity:
 None
Availability:
 High
Attack Vector:
Local
Attack Complexity:
 Low
Privileges Required:
 Low
User Interaction:
 None
Scope:
 Changed
Timeline
- Vulnerability published 
- Vulnerability Reserved 
Credit
[email protected] (@fktio)
