click/install.py in click does not require files in package filesystem tarballs to start with ./ (dot slash), which allows remote attackers to install an alternate security policy and gain privileges via a crafted package, as demonstrated by the test.mmrow app for Ubuntu phone.
References
Link | Resource |
---|---|
http://bazaar.launchpad.net/~click-hackers/click/devel/revision/587 | |
http://ubuntu.com/usn/usn-2771-1 | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/01/12/8 | Mailing List Patch Third Party Advisory |
http://www.securityfocus.com/bid/96386 | Third Party Advisory VDB Entry |
https://bugs.launchpad.net/ubuntu/+source/click/+bug/1506467 | Issue Tracking Patch Third Party Advisory |
https://code.launchpad.net/~cjwatson/click/audit-missing-dot-slash/+merge/274554 | Issue Tracking Patch Third Party Advisory |
https://insights.ubuntu.com/2015/10/15/update-on-ubuntu-phone-security-issue/ | |
https://plus.google.com/+SzymonWaliczek/posts/3jbG2uiAniF |
Configurations
History
No history.
Information
Published : 2017-02-13 18:59
Updated : 2017-10-03 01:29
NVD link : CVE-2015-8768
Mitre link : CVE-2015-8768
CVE.ORG link : CVE-2015-8768
JSON object : View
Products Affected
click_project
- click
canonical
- ubuntu_linux
CWE
CWE-264
Permissions, Privileges, and Access Controls