{"id":"CVE-2021-32555","details":"It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the xorg-hwe-18.04 package apport hooks, it could expose private data to other local users.","modified":"2026-03-14T10:58:26.540927Z","published":"2021-06-12T04:15:12.310Z","references":[{"type":"REPORT","url":"https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"20.04"}]},{"events":[{"introduced":"0"},{"last_affected":"20.10"}]},{"events":[{"introduced":"0"},{"last_affected":"21.04"}]},{"events":[{"introduced":"0"},{"last_affected":"21.10"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-32555.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}]}