CVE-2021-32555

HIGH

Canonical Ubuntu Linux - Symlink Following

Title source: rule
STIX 2.1

Description

It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the xorg-hwe-18.04 package apport hooks, it could expose private data to other local users.

Scores

CVSS v3 7.3
EPSS 0.0006
EPSS Percentile 17.0%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L

Details

CWE
CWE-61 CWE-59
Status published
Products (5)
canonical/ubuntu_linux 18.04
canonical/ubuntu_linux 20.04
canonical/ubuntu_linux 20.10
canonical/ubuntu_linux 21.04
canonical/ubuntu_linux 21.10
Published Jun 12, 2021
Tracked Since Feb 18, 2026