Critical severity9.8NVD Advisory· Published Feb 13, 2017· Updated May 13, 2026
CVE-2015-8768
CVE-2015-8768
Description
click/install.py in click does not require files in package filesystem tarballs to start with ./ (dot slash), which allows remote attackers to install an alternate security policy and gain privileges via a crafted package, as demonstrated by the test.mmrow app for Ubuntu phone.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- www.openwall.com/lists/oss-security/2016/01/12/8nvdMailing ListPatchThird Party Advisory
- bugs.launchpad.net/ubuntu/+source/click/+bug/1506467nvdIssue TrackingPatchThird Party Advisory
- code.launchpad.net/~cjwatson/click/audit-missing-dot-slash/+merge/274554nvdIssue TrackingPatchThird Party Advisory
- ubuntu.com/usn/usn-2771-1nvdThird Party Advisory
- www.securityfocus.com/bid/96386nvdThird Party AdvisoryVDB Entry
- bazaar.launchpad.net/~click-hackers/click/devel/revision/587nvd
- insights.ubuntu.com/2015/10/15/update-on-ubuntu-phone-security-issue/nvd
- plus.google.com/+SzymonWaliczek/posts/3jbG2uiAniFnvd
News mentions
0No linked articles in our index yet.