CVE-2023-5536
Publication date 11 December 2023
Last updated 26 August 2025
Ubuntu priority
Cvss 3 Severity Score
Description
A feature in LXD (LP#1829071), affects the default configuration of Ubuntu Server which allows privileged users in the lxd group to escalate their privilege to root without requiring a sudo password.
Mitigation
Remove users from lxd group and configure multi-user LXD mode. https://discourse.ubuntu.com/t/easy-multi-user-lxd-setup/26215/4
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| cloud-init | ||
| 22.04 LTS jammy | Ignored mitigation must be performed manually | |
| 20.04 LTS focal | Ignored mitigation must be performed manually | |
| 18.04 LTS bionic | Ignored mitigation must be performed manually | |
| 16.04 LTS xenial | Ignored mitigation must be performed manually | |
| 14.04 LTS trusty | Ignored end of standard support | |
| subiquity | ||
| 22.04 LTS jammy | Ignored mitigation must be performed manually | |
| 20.04 LTS focal | Ignored mitigation must be performed manually | |
| 18.04 LTS bionic | Ignored mitigation must be performed manually | |
| 16.04 LTS xenial | Ignored end of standard support | |
| 14.04 LTS trusty | Ignored end of standard support |
Notes
eslerm
Ubuntu Server installed with subiquity before 23.04 is affected Ubuntu Server installed with cloud-init before 24.04 is affected Ubuntu Desktop is not affected
eslerm
a LXD feature became a vulnerability in Ubuntu Server when it was enabled as a default cloud-init and subiquity are used for tracking, these packages merely implemented Server defaults removing this LXD feature with a security patch would break existing workflows
eslerm
Mitigation must be performed manually.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Local |
| Attack complexity | High |
| Privileges required | High |
| User interaction | Required |
| Scope | Changed |
| Confidentiality | High |
| Integrity impact | None |
| Availability impact | None |
| Vector | CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N |