Your submission was sent successfully! Close

CVE-2017-8900

Published: 11 May 2017

LightDM through 1.22.0, when systemd is used in Ubuntu 16.10 and 17.x, allows physically proximate attackers to bypass intended AppArmor restrictions and visit the home directories of arbitrary users by establishing a guest session.

Priority

Medium

CVSS 3 base score: 4.6

Status

Package Release Status
lightdm
Launchpad, Ubuntu, Debian
precise Does not exist

trusty Does not exist
(trusty was not-affected)
upstream Needs triage

xenial Not vulnerable

yakkety
Released (1.19.5-0ubuntu1.2)
zesty
Released (1.22.0-0ubuntu2.1)

Notes

AuthorNote
tyhicks
This issue was introduced when the user session handling moved from
upstart to systemd in Ubuntu 16.10.

References