First published: Tue May 19 2020(Updated: )
cloud-init as managed by snapd on Ubuntu Core 16 and Ubuntu Core 18 devices was run without restrictions on every boot, which a physical attacker could exploit by crafting cloud-init user-data/meta-data via external media to perform arbitrary changes on the device to bypass intended security mechanisms such as full disk encryption. This issue did not affect traditional Ubuntu systems. Fixed in snapd version 2.45.2, revision 8539 and core version 2.45.2, revision 9659.
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Canonical snapd | <2.45.2 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.10 | |
Canonical Ubuntu Linux | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-11933 is a vulnerability in cloud-init as managed by snapd on Ubuntu Core 16 and Ubuntu Core 18 devices.
The severity of CVE-2020-11933 is high with a severity value of 6.8.
The software affected by CVE-2020-11933 includes Canonical snapd, Canonical Ubuntu Linux 16.04, Canonical Ubuntu Linux 18.04, Canonical Ubuntu Linux 19.10, and Canonical Ubuntu Linux 20.04.
A physical attacker can exploit CVE-2020-11933 by crafting cloud-init user-data/meta-data via external media to perform arbitrary changes on the device to bypass intended security mechanisms.
You can find more information about CVE-2020-11933 at the following references: [Link 1](https://launchpad.net/bugs/1879530), [Link 2](https://ubuntu.com/USN-4424-1).