First published: Mon Apr 22 2019(Updated: )
UDM provides support for running commands after a download is completed, this is currently made use of for click package installation. This functionality was not restricted to unconfined applications. Before UDM version 1.2+16.04.20160408-0ubuntu1 any confined application could make use of the UDM C++ API to run arbitrary commands in an unconfined environment as the phablet user.
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Canonical Ubuntu Download Manager |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1579 has a medium severity rating due to its potential exploitation by confined applications.
To fix CVE-2016-1579, update to UDM version 1.2+16.04.20160408-0ubuntu1 or later.
CVE-2016-1579 affects confined applications that use the Ubuntu Download Manager.
CVE-2016-1579 exploits the ability to run commands after completing a download in the Ubuntu Download Manager.
Yes, CVE-2016-1579 is related to the installation of click packages through the Ubuntu Download Manager.