CVE-2015-8768
Publication date 13 February 2017
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
click/install.py in click does not require files in package filesystem tarballs to start with ./ (dot slash), which allows remote attackers to install an alternate security policy and gain privileges via a crafted package, as demonstrated by the test.mmrow app for Ubuntu phone.
Status
Package | Ubuntu Release | Status |
---|---|---|
click | ||
14.04 LTS trusty |
Fixed 0.4.21.1ubuntu0.2
|
|
Notes
jdstrand
app can ship a crafted .click directory that can be used to trick click into installing unintended security policy snappy not affected per me and mvo patch from cjwatson, but not committed to bzr yet updates also needed for vivid stable-phone-overlay and wily stable-phone-overlay.
Patch details
Package | Patch details |
---|---|
click |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 · Critical |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-2771-1
- Click vulnerability
- 15 October 2015