Guillem Jover discovered that APT incorrectly created a temporary file when
handling the changelog command. A local attacker could use this issue to
overwrite arbitrary files. In the default installation of Ubuntu, this
should be prevented by the kernel link restrictions.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 14.04 | noarch | apt | < 1.0.1ubuntu2.5 | UNKNOWN |
Ubuntu | 14.04 | noarch | apt-transport-https | < 1.0.1ubuntu2.5 | UNKNOWN |
Ubuntu | 14.04 | noarch | apt-utils | < 1.0.1ubuntu2.5 | UNKNOWN |
Ubuntu | 14.04 | noarch | libapt-inst1.5 | < 1.0.1ubuntu2.5 | UNKNOWN |
Ubuntu | 14.04 | noarch | libapt-pkg-dev | < 1.0.1ubuntu2.5 | UNKNOWN |
Ubuntu | 14.04 | noarch | libapt-pkg4.12 | < 1.0.1ubuntu2.5 | UNKNOWN |
Ubuntu | 12.04 | noarch | apt | < 0.8.16~exp12ubuntu10.21 | UNKNOWN |
Ubuntu | 12.04 | noarch | apt-transport-https | < 0.8.16~exp12ubuntu10.21 | UNKNOWN |
Ubuntu | 12.04 | noarch | apt-utils | < 0.8.16~exp12ubuntu10.21 | UNKNOWN |
Ubuntu | 12.04 | noarch | libapt-inst1.4 | < 0.8.16~exp12ubuntu10.21 | UNKNOWN |