Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2017-10600

Published: 11 July 2017

ubuntu-image 1.0 before 2017-07-07, when invoked as non-root, creates files in the resulting image with the uid of the invoking user. When the resulting image is booted, a local attacker with the same uid as the image creator has unintended access to cloud-init and snapd directories.

From the Ubuntu Security Team

ubuntu-image 1.0 when invoked as non-root on systems with e2fsprogs >= 1.43 creates file permissions in the resulting image with the UID of the invoking user. When the resulting image is booted, a local attacker with the same UID as the image creator can alter installed snap packages and signatures to downgrade or potentially replace snap packages.

Notes

AuthorNote
jdstrand
this issue only affects Ubuntu Core and not snapd on Ubuntu classic
while snapd is not affected, an updated snapd will attempt to
correct permissions on refresh. Because this only affects Ubuntu Core, that
update will happen via the snap store and not included as a separate security
update for the Ubuntu archive.
Ubuntu 16.04 LTS has e2fsprogs 1.42.13

Priority

High

Cvss 3 Severity Score

5.9

Score breakdown

Status

Package Release Status
ubuntu-image
Launchpad, Ubuntu, Debian
trusty Does not exist

upstream
Released (1.1)
xenial Ignored

yakkety
Released (1.0+16.10ubuntu1.1)
zesty
Released (1.0+17.04ubuntu1.1)
Patches:
upstream: https://github.com/CanonicalLtd/ubuntu-image/pull/135

Severity score breakdown

Parameter Value
Base score 5.9
Attack vector Local
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality Low
Integrity impact Low
Availability impact Low
Vector CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L