UBUNTU-CVE-2017-14178

Source
https://ubuntu.com/security/CVE-2017-14178
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-14178.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2017-14178
Upstream
Published
2018-02-02T14:29:00Z
Modified
2025-09-08T16:44:26Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
  • Ubuntu - low
Summary
[none]
Details

In snapd 2.27 through 2.29.2 the 'snap logs' command could be made to call journalctl without match arguments and therefore allow unprivileged, unauthenticated users to bypass systemd-journald's access restrictions.

References

Affected packages

Ubuntu:14.04:LTS / snapd

Package

Name
snapd
Purl
pkg:deb/ubuntu/snapd@2.29.4.2~14.04?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.29.4.2~14.04

Affected versions

2.*
2.21~14.04.2
2.22.2~14.04
2.22.3~14.04
2.22.6~14.04
2.23.1~14.04
2.24.1~14.04
2.25~14.04
2.26.10~14.04
2.27.5~14.04
2.28.5~14.04

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.29.4.2~14.04",
            "binary_name": "golang-github-snapcore-snapd-dev"
        },
        {
            "binary_version": "2.29.4.2~14.04",
            "binary_name": "golang-github-ubuntu-core-snappy-dev"
        },
        {
            "binary_version": "2.29.4.2~14.04",
            "binary_name": "snap-confine"
        },
        {
            "binary_version": "2.29.4.2~14.04",
            "binary_name": "snapd"
        },
        {
            "binary_version": "2.29.4.2~14.04",
            "binary_name": "snapd-xdg-open"
        },
        {
            "binary_version": "2.29.4.2~14.04",
            "binary_name": "ubuntu-core-launcher"
        },
        {
            "binary_version": "2.29.4.2~14.04",
            "binary_name": "ubuntu-core-snapd-units"
        },
        {
            "binary_version": "2.29.4.2~14.04",
            "binary_name": "ubuntu-snappy"
        },
        {
            "binary_version": "2.29.4.2~14.04",
            "binary_name": "ubuntu-snappy-cli"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-14178.json"

Ubuntu:16.04:LTS / snapd

Package

Name
snapd
Purl
pkg:deb/ubuntu/snapd@2.29.4.2?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.29.4.2

Affected versions

1.*
1.9
1.9.1.1
1.9.2
2.*
2.0
2.0.1
2.0.2
2.0.3
2.0.5
2.0.8
2.0.9
2.0.10
2.11+0.16.04
2.12+0.16.04
2.13
2.14.2~16.04
2.15.2ubuntu1
2.16ubuntu3
2.17.1ubuntu1
2.20.1ubuntu1
2.21
2.22.2
2.22.3
2.22.6
2.23.1
2.24.1
2.25
2.26.10
2.27.5
2.28.5

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.29.4.2",
            "binary_name": "golang-github-snapcore-snapd-dev"
        },
        {
            "binary_version": "2.29.4.2",
            "binary_name": "golang-github-ubuntu-core-snappy-dev"
        },
        {
            "binary_version": "2.29.4.2",
            "binary_name": "snap-confine"
        },
        {
            "binary_version": "2.29.4.2",
            "binary_name": "snapd"
        },
        {
            "binary_version": "2.29.4.2",
            "binary_name": "snapd-xdg-open"
        },
        {
            "binary_version": "2.29.4.2",
            "binary_name": "ubuntu-core-launcher"
        },
        {
            "binary_version": "2.29.4.2",
            "binary_name": "ubuntu-core-snapd-units"
        },
        {
            "binary_version": "2.29.4.2",
            "binary_name": "ubuntu-snappy"
        },
        {
            "binary_version": "2.29.4.2",
            "binary_name": "ubuntu-snappy-cli"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-14178.json"