It was discovered that the uupdate tool incorrectly handled symlinks. If a user or automated system were tricked into processing specially crafted files, a remote attacker could possibly replace arbitrary files, leading to a privilege escalation.
{ "binaries": [ { "binary_name": "devscripts", "binary_version": "2.14.1ubuntu0.1" } ], "availability": "No subscription required" }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2649-1.json"
{ "cves": [ { "id": "CVE-2014-1833", "severity": [ { "score": "medium", "type": "Ubuntu" } ] } ], "ecosystem": "Ubuntu:14.04:LTS" }