It was discovered that Canonical's Pebble service manager read-file API and the associated pebble pull command, before v1.10.2, allowed unprivileged local users to read files with root-equivalent permissions when Pebble was running as root. Fixes are also available as backports to v1.1.1, v1.4.2, and v1.7.4.
References
| Link | Resource |
|---|---|
| https://github.com/canonical/pebble/security/advisories/GHSA-4685-2x5r-65pj | Patch Vendor Advisory |
| https://www.cve.org/CVERecord?id=CVE-2024-3250 | Third Party Advisory |
| https://github.com/canonical/pebble/security/advisories/GHSA-4685-2x5r-65pj | Patch Vendor Advisory |
| https://www.cve.org/CVERecord?id=CVE-2024-3250 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-04-04 15:15
Updated : 2025-08-26 17:17
NVD link : CVE-2024-3250
Mitre link : CVE-2024-3250
CVE.ORG link : CVE-2024-3250
JSON object : View
Products Affected
canonical
- pebble
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource
