Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2023-5536

Published: 11 December 2023

A feature in LXD (LP#1829071), affects the default configuration of Ubuntu Server which allows privileged users in the lxd group to escalate their privilege to root without requiring a sudo password.

Notes

AuthorNote
eslerm
Ubuntu Server installed with subiquity before 23.04 is affected
Ubuntu Server installed with cloud-init before 24.04 is affected
Ubuntu Desktop is not affected
eslerm
a LXD feature became a vulnerability in Ubuntu Server when it was enabled as a default cloud-init and subiquity are used for tracking, these packages merely implemented Server defaults removing this LXD feature with a security patch would break existing workflows
eslerm
Mitigation must be performed manually.

Mitigation

Remove users from lxd group and configure multi-user LXD mode.
https://discourse.ubuntu.com/t/easy-multi-user-lxd-setup/26215/4

Priority

Medium

Cvss 3 Severity Score

5.0

Score breakdown

Status

Package Release Status
cloud-init
Launchpad, Ubuntu, Debian
bionic Ignored
(mitigation must be performed manually)
focal Ignored
(mitigation must be performed manually)
jammy Ignored
(mitigation must be performed manually)
lunar Ignored
(end of life, was ignored [mitigation must be performed manually])
mantic Ignored
(mitigation must be performed manually)
trusty Ignored
(end of standard support)
upstream Not vulnerable
(cloud-init 24.04+ not affected)
xenial Ignored
(mitigation must be performed manually)
subiquity
Launchpad, Ubuntu, Debian
bionic Ignored
(mitigation must be performed manually)
focal Ignored
(mitigation must be performed manually)
jammy Ignored
(mitigation must be performed manually)
lunar Does not exist

mantic Does not exist

trusty Ignored
(end of standard support)
upstream Not vulnerable
(subiquity 23.04+ not affected)
xenial Ignored
(end of standard support)

Severity score breakdown

Parameter Value
Base score 5.0
Attack vector Local
Attack complexity High
Privileges required High
User interaction Required
Scope Changed
Confidentiality High
Integrity impact None
Availability impact None
Vector CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N