CVE-2017-10600

Publication date 11 July 2017

Last updated 25 August 2025


Ubuntu priority

Cvss 3 Severity Score

5.9 · Medium

Score breakdown

Description

ubuntu-image 1.0 before 2017-07-07, when invoked as non-root, creates files in the resulting image with the uid of the invoking user. When the resulting image is booted, a local attacker with the same uid as the image creator has unintended access to cloud-init and snapd directories.

From the Ubuntu Security Team

ubuntu-image 1.0 when invoked as non-root on systems with e2fsprogs >= 1.43 creates file permissions in the resulting image with the UID of the invoking user. When the resulting image is booted, a local attacker with the same UID as the image creator can alter installed snap packages and signatures to downgrade or potentially replace snap packages.

Read the notes from the security team

Status

Package Ubuntu Release Status
ubuntu-image 17.04 zesty
Fixed 1.0+17.04ubuntu1.1
16.10 yakkety
Fixed 1.0+16.10ubuntu1.1
16.04 LTS xenial Ignored
14.04 LTS trusty Not in release

Notes


jdstrand

this issue only affects Ubuntu Core and not snapd on Ubuntu classic while snapd is not affected, an updated snapd will attempt to correct permissions on refresh. Because this only affects Ubuntu Core, that update will happen via the snap store and not included as a separate security update for the Ubuntu archive. Ubuntu 16.04 LTS has e2fsprogs 1.42.13

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
ubuntu-image

Severity score breakdown

Parameter Value
Base score 5.9 · Medium
Attack vector Local
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality Low
Integrity impact Low
Availability impact Low
Vector CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L