click/install.py in click does not require files in package filesystem tarballs to start with ./ (dot slash), which allows remote attackers to install an alternate security policy and gain privileges via a crafted package, as demonstrated by the test.mmrow app for Ubuntu phone.
References
Link | Resource |
---|---|
http://bazaar.launchpad.net/~click-hackers/click/devel/revision/587 | |
http://ubuntu.com/usn/usn-2771-1 | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/01/12/8 | Mailing List Patch Third Party Advisory |
http://www.securityfocus.com/bid/96386 | Third Party Advisory VDB Entry |
https://bugs.launchpad.net/ubuntu/+source/click/+bug/1506467 | Issue Tracking Patch Third Party Advisory |
https://code.launchpad.net/~cjwatson/click/audit-missing-dot-slash/+merge/274554 | Issue Tracking Patch Third Party Advisory |
https://insights.ubuntu.com/2015/10/15/update-on-ubuntu-phone-security-issue/ | |
https://plus.google.com/+SzymonWaliczek/posts/3jbG2uiAniF |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2017-02-13T18:00:00
Updated: 2017-10-02T17:57:01
Reserved: 2016-01-12T00:00:00
Link: CVE-2015-8768
JSON object: View
NVD Information
Status : Modified
Published: 2017-02-13T18:59:00.267
Modified: 2017-10-03T01:29:00.937
Link: CVE-2015-8768
JSON object: View
Redhat Information
No data.
CWE