CVE-2021-32556

Severity
3.3LOW
EPSS
0.1%
top 74.03%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 12
Latest updateMay 24

Description

It was discovered that the get_modified_conffiles() function in backends/packaging-apt-dpkg.py allowed injecting modified package names in a manner that would confuse the dpkg(1) call.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:NExploitability: 2.0 | Impact: 1.4

Affected Packages3 packages

CVEListV5canonical/apport2.20.12.20.1-0ubuntu2.30+esm1+5
NVDcanonical/apport2.14.1-0ubuntu32.14.1-0ubuntu3.29\+esm7+5
Ubuntuapport< 2.20.9-0ubuntu7.24+3

🔴Vulnerability Details

3
GHSA
GHSA-6hq6-w9x9-j77g: It was discovered that the get_modified_conffiles() function in backends/packaging-apt-dpkg2022-05-24
CVEList
apport get_modified_conffiles() function command injection2021-06-12
OSV
CVE-2021-32556: It was discovered that the get_modified_conffiles() function in backends/packaging-apt-dpkg2021-05-25

📋Vendor Advisories

2
Ubuntu
Apport vulnerabilities2021-05-25
Ubuntu
Apport vulnerabilities2021-05-25
CVE-2021-32556 (LOW CVSS 3.3) | It was discovered that the get_modi | cvebase.io