An issue was discovered in provd before version 0.1.5 with a setuid binary, which allows a local attacker to escalate their privilege.
The product allows user input to control or influence paths or file names that are used in filesystem operations.
Link | Tags |
---|---|
https://github.com/canonical/ubuntu-desktop-provision/commit/8d9086de0f82894ff27a9e429ff4f45231020092 | patch |
https://bugs.launchpad.net/ubuntu/+source/provd/+bug/2071574 | issue tracking exploit |
https://www.cve.org/CVERecord?id=CVE-2024-6714 | issue tracking third party advisory |