Guillem Jover discovered that APT incorrectly created a temporary file when handling the changelog command. A local attacker could use this issue to overwrite arbitrary files. In the default installation of Ubuntu, this should be prevented by the kernel link restrictions.
{
"binaries": [
{
"binary_version": "1.0.1ubuntu2.5",
"binary_name": "apt"
},
{
"binary_version": "1.0.1ubuntu2.5",
"binary_name": "apt-transport-https"
},
{
"binary_version": "1.0.1ubuntu2.5",
"binary_name": "apt-utils"
},
{
"binary_version": "1.0.1ubuntu2.5",
"binary_name": "libapt-inst1.5"
},
{
"binary_version": "1.0.1ubuntu2.5",
"binary_name": "libapt-pkg-dev"
},
{
"binary_version": "1.0.1ubuntu2.5",
"binary_name": "libapt-pkg4.12"
}
],
"availability": "No subscription required"
}