USN-2771-1: Click vulnerability
15 October 2015
Click could be made to allow malicious apps unintended access to the system.
- click - Click package manager
It was discovered that click did not properly perform input sanitization
during click package installation. If a user were tricked into installing a
crafted click package, a remote attacker could exploit this to escalate
privileges by tricking click into installing lenient security policy for
the installed application.
The problem can be corrected by updating your system to the following package versions:
In general, a standard system update will make all the necessary changes. A
corresponding update will be provided to Ubuntu Phone users soon.
For more information, please see: