First published: Tue May 25 2021(Updated: )
It was discovered that the get_modified_conffiles() function in backends/packaging-apt-dpkg.py allowed injecting modified package names in a manner that would confuse the dpkg(1) call.
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Canonical Apport | >=2.14.1-0ubuntu3<2.14.1-0ubuntu3.29\+esm7 | |
Canonical Apport | >=2.20.1<2.20.1-0ubuntu2.30\+esm1 | |
Canonical Apport | >=2.20.9<2.20.9-0ubuntu7.24 | |
Canonical Apport | >=2.20.11-0ubuntu27<2.20.11-0ubuntu27.18 | |
Canonical Apport | >=2.20.11-0ubuntu50<2.20.11-0ubuntu50.7 | |
Canonical Apport | >=2.20.11-0ubuntu65<2.20.11-0ubuntu65.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-32556.
The severity of CVE-2021-32556 is low.
The Canonical Apport software with versions between 2.14.1-0ubuntu3 and 2.14.1-0ubuntu3.29+esm7, 2.20.1-0ubuntu2 and 2.20.1-0ubuntu2.30+esm1, 2.20.9 and 2.20.9-0ubuntu7.24, 2.20.11-0ubuntu27 and 2.20.11-0ubuntu27.18, 2.20.11-0ubuntu50 and 2.20.11-0ubuntu50.7, and 2.20.11-0ubuntu65 and 2.20.11-0ubuntu65.1 are affected.
CVE-2021-32556 can be exploited by injecting modified package names in a manner that would confuse the dpkg(1) call.
Yes, you can find more information about CVE-2021-32556 at the following link: https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904