First published: Tue May 25 2021(Updated: )
It was discovered that the process_report() function in data/whoopsie-upload-all allowed arbitrary file writes via symlinks.
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Canonical Apport | >=2.14.1-0ubuntu3<2.14.1-0ubuntu3.29\+esm7 | |
Canonical Apport | >=2.20.1<2.20.1-0ubuntu2.30\+esm1 | |
Canonical Apport | >=2.20.9<2.20.9-0ubuntu7.24 | |
Canonical Apport | >=2.20.11-0ubuntu27<2.20.11-0ubuntu27.18 | |
Canonical Apport | >=2.20.11-0ubuntu50<2.20.11-0ubuntu50.7 | |
Canonical Apport | >=2.20.11-0ubuntu65<2.20.11-0ubuntu65.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-32557 is a vulnerability in Canonical Apport that allows arbitrary file writes via symlinks.
CVE-2021-32557 has a severity of 7.1 (high).
CVE-2021-32557 affects Canonical Apport versions between 2.14.1-0ubuntu3 and 2.14.1-0ubuntu3.29+esm7, 2.20.1-0ubuntu2 and 2.20.1-0ubuntu2.30+esm1, 2.20.9 and 2.20.9-0ubuntu7.24, 2.20.11-0ubuntu27 and 2.20.11-0ubuntu27.18, 2.20.11-0ubuntu50 and 2.20.11-0ubuntu50.7, and 2.20.11-0ubuntu65 and 2.20.11-0ubuntu65.1.
The process_report() function in data/whoopsie-upload-all allows attackers to perform arbitrary file writes by creating specially crafted symlinks.
Yes, updating Canonical Apport to versions after the mentioned vulnerable versions will fix CVE-2021-32557.