CVE-2018-6556
LowVulnerability Description
lxc-user-nic when asked to delete a network interface will unconditionally open a user provided path. This code path may be used by an unprivileged user to check for the existence of a path which they wouldn't otherwise be able to reach. It may also be used to trigger side effects by causing a (read-only) open of special kernel files (ptmx, proc, sys). Affected releases are LXC: 2.0 versions above and including 2.0.9; 3.0 versions above and including 3.0.0, prior to 3.0.2.
Known Affected Software
18 configuration(s) from 4 vendor(s)
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*
cpe:2.3:a:linuxcontainers:lxc:2.0.9:*:*:*:*:*:*:*
cpe:2.3:a:linuxcontainers:lxc:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:linuxcontainers:lxc:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:linuxcontainers:lxc:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:linuxcontainers:lxc:2.0.6:*:*:*:*:*:*:*
cpe:2.3:a:linuxcontainers:lxc:2.0.7:*:*:*:*:*:*:*
cpe:2.3:a:linuxcontainers:lxc:2.0.8:*:*:*:*:*:*:*
cpe:2.3:a:linuxcontainers:lxc:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:linuxcontainers:lxc:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:linuxcontainers:lxc:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:linuxcontainers:lxc:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:linuxcontainers:lxc:2.0.0:-:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
cpe:2.3:a:suse:caas_platform:1.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:-:*:*
cpe:2.3:a:suse:caas_platform:2.0:*:*:*:*:*:*:*
cpe:2.3:a:suse:openstack_cloud:6:*:*:*:*:*:*:*
CVE-2022-47952
CVE-2022-47952
References & Resources
-
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00074.htmlsecurity@ubuntu.com Mailing List Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00076.htmlsecurity@ubuntu.com Mailing List Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00091.htmlsecurity@ubuntu.com Mailing List Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00073.htmlsecurity@ubuntu.com
-
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1783591security@ubuntu.com Issue Tracking Third Party Advisory
-
https://bugzilla.suse.com/show_bug.cgi?id=988348security@ubuntu.com Issue Tracking Patch
-
https://security.gentoo.org/glsa/201808-02security@ubuntu.com Third Party Advisory
-
https://usn.ubuntu.com/usn/usn-3730-1security@ubuntu.com Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00074.htmlaf854a3a-2127-422b-91ae-364da2661108 Mailing List Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00076.htmlaf854a3a-2127-422b-91ae-364da2661108 Mailing List Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00091.htmlaf854a3a-2127-422b-91ae-364da2661108 Mailing List Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00073.htmlaf854a3a-2127-422b-91ae-364da2661108
-
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1783591af854a3a-2127-422b-91ae-364da2661108 Issue Tracking Third Party Advisory
-
https://bugzilla.suse.com/show_bug.cgi?id=988348af854a3a-2127-422b-91ae-364da2661108 Issue Tracking Patch
-
https://security.gentoo.org/glsa/201808-02af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://usn.ubuntu.com/usn/usn-3730-1af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
Severity Details
Key Information
- Published Date
- August 10, 2018
