It was discovered that Canonical's Pebble service manager read-file API and the associated pebble pull command, before v1.10.2, allowed unprivileged local users to read files with root-equivalent permissions when Pebble was running as root. Fixes are also available as backports to v1.1.1, v1.4.2, and v1.7.4.
References
| Link | Resource |
|---|---|
| https://github.com/canonical/pebble/security/advisories/GHSA-4685-2x5r-65pj | Patch Vendor Advisory |
| https://www.cve.org/CVERecord?id=CVE-2024-3250 | Third Party Advisory |
| https://github.com/canonical/pebble/security/advisories/GHSA-4685-2x5r-65pj | Patch Vendor Advisory |
| https://www.cve.org/CVERecord?id=CVE-2024-3250 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
26 Aug 2025, 17:17
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:canonical:pebble:*:*:*:*:*:go:*:* | |
| References | () https://github.com/canonical/pebble/security/advisories/GHSA-4685-2x5r-65pj - Patch, Vendor Advisory | |
| References | () https://www.cve.org/CVERecord?id=CVE-2024-3250 - Third Party Advisory | |
| First Time |
Canonical
Canonical pebble |
Information
Published : 2024-04-04 15:15
Updated : 2025-08-26 17:17
NVD link : CVE-2024-3250
Mitre link : CVE-2024-3250
CVE.ORG link : CVE-2024-3250
JSON object : View
Products Affected
canonical
- pebble
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource
