CVE-2021-32549

7.3 HIGH

📋 TL;DR

This vulnerability in Apport's read_file() function allows local attackers to read arbitrary files by exploiting symbolic links or FIFOs. It affects Ubuntu systems with openjdk-13 package apport hooks installed, potentially exposing sensitive data to other local users.

💻 Affected Systems

Products:
  • apport
  • openjdk-13
Versions: Apport versions before 2.20.11-0ubuntu27.20
Operating Systems: Ubuntu Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires openjdk-13 package with apport hooks enabled. Other Ubuntu packages using the vulnerable read_file() function may also be affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation leading to complete system compromise through exposure of sensitive files like /etc/shadow, SSH keys, or configuration files with credentials.

🟠

Likely Case

Unauthorized local users reading sensitive application data, configuration files, or temporary files containing user information.

🟢

If Mitigated

Limited impact with proper file permissions and isolation between user accounts, preventing cross-user data exposure.

🌐 Internet-Facing: LOW - This is a local-only vulnerability requiring local user access to the system.
🏢 Internal Only: MEDIUM - Internal users with local access could exploit this to read sensitive data from other users or system files.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local user access and ability to create symbolic links or FIFOs in specific directories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: apport 2.20.11-0ubuntu27.20 and later

Vendor Advisory: https://ubuntu.com/security/CVE-2021-32549

Restart Required: No

Instructions:

1. Update apport package: sudo apt update && sudo apt install apport
2. Update openjdk-13 package: sudo apt install openjdk-13-jre
3. Verify updates with: apt list --installed | grep -E 'apport|openjdk-13'

🔧 Temporary Workarounds

Disable apport hooks for openjdk-13

linux

Remove or disable the vulnerable apport hooks for openjdk-13 package

sudo rm /usr/share/apport/package-hooks/source_openjdk-13.py
sudo systemctl disable apport.service

Restrict symbolic link creation

linux

Implement filesystem policies to restrict symbolic link creation in sensitive directories

sudo chmod 1777 /tmp
sudo find /var/crash -type l -delete

🧯 If You Can't Patch

  • Implement strict file permissions and user isolation to limit cross-user file access
  • Monitor for suspicious symbolic link creation in /var/crash and other apport-related directories

🔍 How to Verify

Check if Vulnerable:

Check apport version: dpkg -l apport | grep ^ii

Check Version:

dpkg -l apport

Verify Fix Applied:

Verify apport version is 2.20.11-0ubuntu27.20 or higher: dpkg -l apport

📡 Detection & Monitoring

Log Indicators:

  • Unusual apport crash report activity
  • Multiple symbolic link creations in /var/crash

Network Indicators:

  • None - local-only vulnerability

SIEM Query:

process.name="apport" AND file.path="/var/crash/*" AND file.symlink=true

🔗 References

📤 Share & Export