On desktop, Ubuntu UI Toolkits StateSaver would serialise data on tmp/ files which an attacker could use to expose potentially sensitive data. StateSaver would also open files without the O_EXCL flag. An attacker could exploit this to launch a symlink attack, though this is partially mitigated by symlink and hardlink restrictions in Ubuntu. Fixed in 1.1.1188+14.10.20140813.4-0ubuntu1.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Ubuntu-ui-toolkit | Canonical | * | 1.1.1188+14.10.20140813.4-0ubuntu1 (excluding) |
Ubuntu-ui-toolkit | Ubuntu | trusty | * |
Ubuntu-ui-toolkit | Ubuntu | utopic | * |
Ubuntu-ui-toolkit | Ubuntu | vivid | * |
Ubuntu-ui-toolkit | Ubuntu | vivid/stable-phone-overlay | * |
Ubuntu-ui-toolkit | Ubuntu | wily | * |
Ubuntu-ui-toolkit | Ubuntu | xenial | * |
Ubuntu-ui-toolkit | Ubuntu | yakkety | * |
Ubuntu-ui-toolkit | Ubuntu | zesty | * |