Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-65pc-76pq-pvf5: Duplicate Advisory: Pebble service manager's file pull API allows access by any user

Duplicate Advisory

This advisory has been withdrawn because it is a duplicate of GHSA-4685-2x5r-65pj. This link is maintained to preserve external references.

Original Description

It was discovered that Pebble’s read-file API and the associated pebble pull command, before v1.10.2, allowed unprivileged local users to read files with root-equivalent permissions when Pebble was running as root. Fixes are also available as backports to v1.1.1, v1.4.2, and v1.7.4.

ghsa
#vulnerability#git

Skip to content

    • Actions

      Automate any workflow

    • Packages

      Host and manage packages

    • Security

      Find and fix vulnerabilities

    • Codespaces

      Instant dev environments

    • Copilot

      Write better code with AI

    • Code review

      Manage code changes

    • Issues

      Plan and track work

    • Discussions

      Collaborate outside of code

    • GitHub Sponsors

      Fund open source developers

*   The ReadME Project
    
    GitHub community articles
  • Pricing

Provide feedback

Saved searches****Use saved searches to filter your results more quickly

Sign up

  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. GHSA-65pc-76pq-pvf5

Duplicate Advisory: Pebble service manager’s file pull API allows access by any user

Moderate severity GitHub Reviewed Published Apr 4, 2024 to the GitHub Advisory Database • Updated Apr 5, 2024

Withdrawn This advisory was withdrawn on Apr 5, 2024

Package

gomod github.com/canonical/pebble (Go)

Affected versions

< 1.1.1

Description

Published by the National Vulnerability Database

Apr 4, 2024

Published to the GitHub Advisory Database

Apr 4, 2024

ghsa: Latest News

GHSA-gmx7-gr5q-85w5: magic-crypt uses insecure cryptographic algorithms