Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-32556

Опубликовано: 12 июн. 2021
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 2.1
CVSS3: 3.8

Описание

It was discovered that the get_modified_conffiles() function in backends/packaging-apt-dpkg.py allowed injecting modified package names in a manner that would confuse the dpkg(1) call.

РелизСтатусПримечание
bionic

released

2.20.9-0ubuntu7.24
devel

released

2.20.11-0ubuntu67
esm-infra-legacy/trusty

released

2.14.1-0ubuntu3.29+esm7
esm-infra/bionic

released

2.20.9-0ubuntu7.24
esm-infra/focal

released

2.20.11-0ubuntu27.18
esm-infra/xenial

released

2.20.1-0ubuntu2.30+esm1
focal

released

2.20.11-0ubuntu27.18
groovy

released

2.20.11-0ubuntu50.7
hirsute

released

2.20.11-0ubuntu65.1
impish

released

2.20.11-0ubuntu67

Показывать по

EPSS

Процентиль: 26%
0.00093
Низкий

2.1 Low

CVSS2

3.8 Low

CVSS3

Связанные уязвимости

CVSS3: 3.8
nvd
больше 4 лет назад

It was discovered that the get_modified_conffiles() function in backends/packaging-apt-dpkg.py allowed injecting modified package names in a manner that would confuse the dpkg(1) call.

github
больше 3 лет назад

It was discovered that the get_modified_conffiles() function in backends/packaging-apt-dpkg.py allowed injecting modified package names in a manner that would confuse the dpkg(1) call.

EPSS

Процентиль: 26%
0.00093
Низкий

2.1 Low

CVSS2

3.8 Low

CVSS3

Уязвимость CVE-2021-32556