ubuntu-image 1.0 before 2017-07-07, when invoked as non-root, creates files in the resulting image with the uid of the invoking user. When the resulting image is booted, a local attacker with the same uid as the image creator has unintended access to cloud-init and snapd directories.
References
Link | Resource |
---|---|
https://forum.snapcraft.io/t/ownership-bug-in-ubuntu-image/1285 | Third Party Advisory |
Configurations
Information
Published : 2017-07-11 10:29
Updated : 2019-10-02 17:03
NVD link : CVE-2017-10600
Mitre link : CVE-2017-10600
JSON object : View
CWE
CWE-384
Session Fixation
Products Affected
canonical
- ubuntu-image