First published: Tue Jul 11 2017(Updated: )
ubuntu-image 1.0 before 2017-07-07, when invoked as non-root, creates files in the resulting image with the uid of the invoking user. When the resulting image is booted, a local attacker with the same uid as the image creator has unintended access to cloud-init and snapd directories.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Canonical Ubuntu-image | =1.0-2017-07-06 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.