CVE-2021-32556

It was discovered that the get_modified_conffiles() function in backends/packaging-apt-dpkg.py allowed injecting modified package names in a manner that would confuse the dpkg(1) call.
OS Command Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
3.8 LOW
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
canonicalCNA
3.8 LOW
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 33%
VendorProductVersion
canonicalapport
2.14.1-0ubuntu3 ≤
𝑥
< 2.14.1-0ubuntu3.29\+esm7
canonicalapport
2.20.1 ≤
𝑥
< 2.20.1-0ubuntu2.30\+esm1
canonicalapport
2.20.9 ≤
𝑥
< 2.20.9-0ubuntu7.24
canonicalapport
2.20.11-0ubuntu27 ≤
𝑥
< 2.20.11-0ubuntu27.18
canonicalapport
2.20.11-0ubuntu50 ≤
𝑥
< 2.20.11-0ubuntu50.7
canonicalapport
2.20.11-0ubuntu65 ≤
𝑥
< 2.20.11-0ubuntu65.1
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
apport
jammy
Fixed 2.20.11-0ubuntu67
released
impish
Fixed 2.20.11-0ubuntu67
released
hirsute
Fixed 2.20.11-0ubuntu65.1
released
groovy
Fixed 2.20.11-0ubuntu50.7
released
focal
Fixed 2.20.11-0ubuntu27.18
released
bionic
Fixed 2.20.9-0ubuntu7.24
released
xenial
Fixed 2.20.1-0ubuntu2.30+esm1
released
trusty
Fixed 2.14.1-0ubuntu3.29+esm7
released