Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-11933

Опубликовано: 29 июл. 2020
Источник: ubuntu
Приоритет: medium
CVSS2: 4.6
CVSS3: 7.3

Описание

cloud-init as managed by snapd on Ubuntu Core 16 and Ubuntu Core 18 devices was run without restrictions on every boot, which a physical attacker could exploit by crafting cloud-init user-data/meta-data via external media to perform arbitrary changes on the device to bypass intended security mechanisms such as full disk encryption. This issue did not affect traditional Ubuntu systems. Fixed in snapd version 2.45.2, revision 8539 and core version 2.45.2, revision 9659.

РелизСтатусПримечание
snap

released

2.45.2, revisions 9659+
upstream

not-affected

Показывать по

РелизСтатусПримечание
snap

not-affected

code-not-present
upstream

not-affected

Показывать по

РелизСтатусПримечание
snap

not-affected

code-not-present
upstream

not-affected

Показывать по

РелизСтатусПримечание
bionic

not-affected

devel

not-affected

eoan

not-affected

esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

esm-infra/focal

not-affected

esm-infra/xenial

not-affected

focal

not-affected

precise/esm

DNE

snap

released

2.45.2, revisions 8539+

Показывать по

4.6 Medium

CVSS2

7.3 High

CVSS3

Связанные уязвимости

CVSS3: 7.3
nvd
больше 5 лет назад

cloud-init as managed by snapd on Ubuntu Core 16 and Ubuntu Core 18 devices was run without restrictions on every boot, which a physical attacker could exploit by crafting cloud-init user-data/meta-data via external media to perform arbitrary changes on the device to bypass intended security mechanisms such as full disk encryption. This issue did not affect traditional Ubuntu systems. Fixed in snapd version 2.45.2, revision 8539 and core version 2.45.2, revision 9659.

github
больше 3 лет назад

cloud-init as managed by snapd on Ubuntu Core 16 and Ubuntu Core 18 devices was run without restrictions on every boot, which a physical attacker could exploit by crafting cloud-init user-data/meta-data via external media to perform arbitrary changes on the device to bypass intended security mechanisms such as full disk encryption. This issue did not affect traditional Ubuntu systems. Fixed in snapd version 2.45.2, revision 8539 and core version 2.45.2, revision 9659.

4.6 Medium

CVSS2

7.3 High

CVSS3