Improper Input Validation Affecting github.com/canonical/lxd package, versions <5.21.0


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Input Validation vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-GITHUBCOMCANONICALLXD-6100987
  • published6 Dec 2023
  • disclosed5 Dec 2023
  • creditPaul Ouellette

Introduced: 5 Dec 2023

CVE NOT AVAILABLE CWE-20  (opens in a new tab)

How to fix?

Upgrade github.com/canonical/lxd to version 5.21.0 or higher.

Overview

github.com/canonical/lxd is an a modern, secure and powerful system container and virtual machine manager.

Affected versions of this package are vulnerable to Improper Input Validation. An attacker can gain root access on the system by creating a disk device with shift=true and creating a setuid root executable when restricted access to a project is configured with restricted=true but without setting restricted.devices.disk.paths. This allows the shift property to be used unrestrictedly.

CVSS Scores

version 3.1