First published: Tue Jul 11 2017(Updated: )
ubuntu-image 1.0 before 2017-07-07, when invoked as non-root, creates files in the resulting image with the uid of the invoking user. When the resulting image is booted, a local attacker with the same uid as the image creator has unintended access to cloud-init and snapd directories.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu | =1.0-2017-07-06 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-10600 is classified with moderate severity due to potential privilege escalation risks.
To fix CVE-2017-10600, upgrade to ubuntu-image version 1.0-2017-07-07 or later.
CVE-2017-10600 enables local privilege escalation attacks for users with the same UID as the creator of the image.
CVE-2017-10600 affects ubuntu-image versions prior to 1.0-2017-07-07.
A local attacker can access cloud-init and snapd directories due to the vulnerabilities in CVE-2017-10600.