It was discovered that the uupdate tool incorrectly handled symlinks. If a user or automated system were tricked into processing specially crafted files, a remote attacker could possibly replace arbitrary files, leading to a privilege escalation.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "2.14.1ubuntu0.1", "binary_name": "devscripts" } ] }
{ "ecosystem": "Ubuntu:14.04:LTS", "cves": [ { "severity": [ { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2014-1833" } ] }