apport read_file() function could follow maliciously constructed symbolic links
CVE-2021-32554
7.3HIGH
Summary
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the xorg package apport hooks, it could expose private data to other local users.
Affected Version(s)
apport 2.20.1 < 2.20.1-0ubuntu2.30+esm1
apport 2.20.9 < 2.20.9-0ubuntu7.24
apport 2.20.11-0ubuntu27 < 2.20.11-0ubuntu27.18
References
CVSS V3.1
Score:
7.3
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
Credit
[email protected] (@fktio)