apport get_modified_conffiles() function command injection
CVE-2021-32556

3.8LOW

Key Information:

Vendor
Canonical
Status
Vendor
CVE Published:
12 June 2021

Summary

It was discovered that the get_modified_conffiles() function in backends/packaging-apt-dpkg.py allowed injecting modified package names in a manner that would confuse the dpkg(1) call.

Affected Version(s)

apport 2.20.1 < 2.20.1-0ubuntu2.30+esm1

apport 2.20.9 < 2.20.9-0ubuntu7.24

apport 2.20.11-0ubuntu27 < 2.20.11-0ubuntu27.18

References

CVSS V3.1

Score:
3.8
Severity:
LOW
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

.