Auto-merge PR#4428

Auto-merge PR#4428
This commit is contained in:
CVE Team 2020-07-29 12:25:31 -04:00 committed by GitHub
commit 4b12ff02f9
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 223 additions and 16 deletions

View File

@ -1,18 +1,122 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"AKA": "",
"ASSIGNER": "security@ubuntu.com",
"DATE_PUBLIC": "2020-05-19T16:34:00.000Z",
"ID": "CVE-2020-11933",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC",
"TITLE": "local snapd exploit through cloud-init"
},
"description": {
"description_data": [
"affects": {
"vendor": {
"vendor_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"product": {
"product_data": [
{
"product_name": "snapd",
"version": {
"version_data": [
{
"platform": "",
"version_affected": "<",
"version_name": "2.45.2",
"version_value": "2.45.2, revision 8539"
}
]
}
},
{
"product_name": "core",
"version": {
"version_data": [
{
"platform": "",
"version_affected": "<",
"version_name": "2.45.2",
"version_value": "2.45.2, revision 9659"
}
]
}
}
]
},
"vendor_name": "Canonical"
}
]
}
},
"configuration": [],
"credit": [
{
"lang": "eng",
"value": "Ian Johnson"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "cloud-init as managed by snapd on Ubuntu Core 16 and Ubuntu Core 18 devices was run without restrictions on every boot, which a physical attacker could exploit by crafting cloud-init user-data/meta-data via external media to perform arbitrary changes on the device to bypass intended security mechanisms such as full disk encryption. This issue did not affect traditional Ubuntu systems. Fixed in snapd version 2.45.2, revision 8539 and core version 2.45.2, revision 9659."
}
]
},
"exploit": [],
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "NONE",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-264 Permissions, Privileges, and Access Controls"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://launchpad.net/bugs/1879530",
"refsource": "CONFIRM",
"url": "https://launchpad.net/bugs/1879530"
},
{
"name": "https://ubuntu.com/USN-4424-1",
"refsource": "CONFIRM",
"url": "https://ubuntu.com/USN-4424-1"
}
]
},
"solution": [],
"source": {
"advisory": "https://ubuntu.com/USN-4424-1",
"defect": [
"https://launchpad.net/bugs/1879530"
],
"discovery": "INTERNAL"
},
"work_around": []
}

View File

@ -1,18 +1,121 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"AKA": "",
"ASSIGNER": "security@ubuntu.com",
"DATE_PUBLIC": "2020-05-22T05:55:00.000Z",
"ID": "CVE-2020-11934",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC",
"TITLE": "Sandbox escape vulnerability via snapctl user-open (xdg-open)"
},
"description": {
"description_data": [
"affects": {
"vendor": {
"vendor_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"product": {
"product_data": [
{
"product_name": "snapd",
"version": {
"version_data": [
{
"platform": "",
"version_affected": "<",
"version_name": "2.45.1",
"version_value": "2.45.1ubuntu0.2"
},
{
"platform": "",
"version_affected": "<",
"version_name": "2.45.1",
"version_value": "2.45.1+18.04.2"
},
{
"platform": "",
"version_affected": "<",
"version_name": "2.45.1",
"version_value": "2.45.1+20.04.2"
}
]
}
}
]
},
"vendor_name": "Canonical"
}
]
}
},
"configuration": [],
"credit": [
{
"lang": "eng",
"value": "James Henstridge"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "It was discovered that snapctl user-open allowed altering the $XDG_DATA_DIRS environment variable when calling the system xdg-open. OpenURL() in usersession/userd/launcher.go would alter $XDG_DATA_DIRS to append a path to a directory controlled by the calling snap. A malicious snap could exploit this to bypass intended access restrictions to control how the host system xdg-open script opens the URL and, for example, execute a script shipped with the snap without confinement. This issue did not affect Ubuntu Core systems. Fixed in snapd versions 2.45.1ubuntu0.2, 2.45.1+18.04.2 and 2.45.1+20.04.2."
}
]
},
"exploit": [],
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Sandbox escape vulnerability"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://launchpad.net/bugs/1880085",
"refsource": "CONFIRM",
"url": "https://launchpad.net/bugs/1880085"
},
{
"name": "https://ubuntu.com/USN-4424-1",
"refsource": "CONFIRM",
"url": "https://ubuntu.com/USN-4424-1"
}
]
},
"solution": [],
"source": {
"advisory": "https://ubuntu.com/USN-4424-1",
"defect": [
"https://launchpad.net/bugs/1880085"
],
"discovery": "INTERNAL"
},
"work_around": []
}