CVE-2017-10600
Publication date 11 July 2017
Last updated 25 August 2025
Ubuntu priority
Cvss 3 Severity Score
Description
ubuntu-image 1.0 before 2017-07-07, when invoked as non-root, creates files in the resulting image with the uid of the invoking user. When the resulting image is booted, a local attacker with the same uid as the image creator has unintended access to cloud-init and snapd directories.
From the Ubuntu Security Team
ubuntu-image 1.0 when invoked as non-root on systems with e2fsprogs >= 1.43 creates file permissions in the resulting image with the UID of the invoking user. When the resulting image is booted, a local attacker with the same UID as the image creator can alter installed snap packages and signatures to downgrade or potentially replace snap packages.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| ubuntu-image | ||
| 16.04 LTS xenial | Ignored | |
| 14.04 LTS trusty | Not in release |
Notes
jdstrand
this issue only affects Ubuntu Core and not snapd on Ubuntu classic while snapd is not affected, an updated snapd will attempt to correct permissions on refresh. Because this only affects Ubuntu Core, that update will happen via the snap store and not included as a separate security update for the Ubuntu archive. Ubuntu 16.04 LTS has e2fsprogs 1.42.13
Patch details
| Package | Patch details |
|---|---|
| ubuntu-image |
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Local |
| Attack complexity | Low |
| Privileges required | None |
| User interaction | None |
| Scope | Unchanged |
| Confidentiality | Low |
| Integrity impact | Low |
| Availability impact | Low |
| Vector | CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L |