ubuntu-image 1.0 before 2017-07-07, when invoked as non-root, creates files in the resulting image with the uid of the invoking user. When the resulting image is booted, a local attacker with the same uid as the image creator has unintended access to cloud-init and snapd directories.
References
Link | Resource |
---|---|
https://forum.snapcraft.io/t/ownership-bug-in-ubuntu-image/1285 | Third Party Advisory |
https://forum.snapcraft.io/t/ownership-bug-in-ubuntu-image/1285 | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:06
Type | Values Removed | Values Added |
---|---|---|
References | () https://forum.snapcraft.io/t/ownership-bug-in-ubuntu-image/1285 - Third Party Advisory |
Information
Published : 2017-07-11 17:29
Updated : 2024-11-21 03:06
NVD link : CVE-2017-10600
Mitre link : CVE-2017-10600
CVE.ORG link : CVE-2017-10600
JSON object : View
Products Affected
canonical
- ubuntu-image
CWE
CWE-384
Session Fixation