mintinstall (aka Software Manager) 7.9.9 for Linux Mint allows code execution if a REVIEWS_CACHE file is controlled by an attacker, because an unpickle occurs. This is resolved in 8.0.0 and backports.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Link | Tags |
---|---|
https://github.com/Andhrimnirr/Mintinstall-object-injection | third party advisory exploit |
https://github.com/linuxmint/mintinstall/blob/master/debian/changelog | third party advisory release notes |
http://packetstormsecurity.com/files/154722/mintinstall-7.9.9-Code-Execution.html | exploit vdb entry third party advisory |
https://forums.linuxmint.com/viewtopic.php?f=143&t=302960 | exploit vendor advisory |