CVE-2023-5536
Publication date 11 December 2023
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
A feature in LXD (LP#1829071), affects the default configuration of Ubuntu Server which allows privileged users in the lxd group to escalate their privilege to root without requiring a sudo password.
Mitigation
Remove users from lxd group and configure multi-user LXD mode. https://discourse.myasnchisdf.eu.org/t/easy-multi-user-lxd-setup/26215/4
Status
Package | Ubuntu Release | Status |
---|---|---|
cloud-init | ||
22.04 LTS jammy | Ignored mitigation must be performed manually | |
20.04 LTS focal | Ignored mitigation must be performed manually | |
18.04 LTS bionic | Ignored mitigation must be performed manually | |
16.04 LTS xenial | Ignored mitigation must be performed manually | |
14.04 LTS trusty | Ignored end of standard support | |
subiquity | ||
22.04 LTS jammy | Ignored mitigation must be performed manually | |
20.04 LTS focal | Ignored mitigation must be performed manually | |
18.04 LTS bionic | Ignored mitigation must be performed manually | |
16.04 LTS xenial | Ignored end of standard support | |
14.04 LTS trusty | Ignored end of standard support |
Notes
eslerm
Ubuntu Server installed with subiquity before 23.04 is affected Ubuntu Server installed with cloud-init before 24.04 is affected Ubuntu Desktop is not affected
eslerm
a LXD feature became a vulnerability in Ubuntu Server when it was enabled as a default cloud-init and subiquity are used for tracking, these packages merely implemented Server defaults removing this LXD feature with a security patch would break existing workflows
eslerm
Mitigation must be performed manually.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.0 · Medium |
Attack vector | Local |
Attack complexity | High |
Privileges required | High |
User interaction | Required |
Scope | Changed |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N |