Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-6556 (GCVE-0-2018-6556)
Vulnerability from cvelistv5 – Published: 2018-08-10 15:00 – Updated: 2024-09-17 03:38
VLAI?
EPSS
Title
The lxc-user-nic component of LXC allows unprivileged users to open arbitrary files
Summary
lxc-user-nic when asked to delete a network interface will unconditionally open a user provided path. This code path may be used by an unprivileged user to check for the existence of a path which they wouldn't otherwise be able to reach. It may also be used to trigger side effects by causing a (read-only) open of special kernel files (ptmx, proc, sys). Affected releases are LXC: 2.0 versions above and including 2.0.9; 3.0 versions above and including 3.0.0, prior to 3.0.2.
Severity ?
No CVSS data available.
CWE
- Incorrect access control
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
Impacted products
Date Public ?
2018-08-06 00:00
Credits
Matthias Gerstner from SUSE
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T06:10:10.096Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "USN-3730-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/usn/usn-3730-1"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1783591"
},
{
"name": "GLSA-201808-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/201808-02"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.suse.com/show_bug.cgi?id=988348"
},
{
"name": "openSUSE-SU-2019:1227",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00074.html"
},
{
"name": "openSUSE-SU-2019:1230",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00076.html"
},
{
"name": "openSUSE-SU-2019:1275",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00091.html"
},
{
"name": "openSUSE-SU-2019:1481",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00073.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "LXC",
"vendor": "n/a",
"versions": [
{
"lessThan": "2.0*",
"status": "affected",
"version": "2.0.9",
"versionType": "custom"
},
{
"changes": [
{
"at": "3.0.2",
"status": "unaffected"
}
],
"lessThan": "3.0*",
"status": "affected",
"version": "3.0.0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Matthias Gerstner from SUSE"
}
],
"datePublic": "2018-08-06T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "lxc-user-nic when asked to delete a network interface will unconditionally open a user provided path. This code path may be used by an unprivileged user to check for the existence of a path which they wouldn\u0027t otherwise be able to reach. It may also be used to trigger side effects by causing a (read-only) open of special kernel files (ptmx, proc, sys). Affected releases are LXC: 2.0 versions above and including 2.0.9; 3.0 versions above and including 3.0.0, prior to 3.0.2."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Incorrect access control",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-05-31T20:06:03.000Z",
"orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
"shortName": "canonical"
},
"references": [
{
"name": "USN-3730-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/usn/usn-3730-1"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1783591"
},
{
"name": "GLSA-201808-02",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/201808-02"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.suse.com/show_bug.cgi?id=988348"
},
{
"name": "openSUSE-SU-2019:1227",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00074.html"
},
{
"name": "openSUSE-SU-2019:1230",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00076.html"
},
{
"name": "openSUSE-SU-2019:1275",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00091.html"
},
{
"name": "openSUSE-SU-2019:1481",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00073.html"
}
],
"source": {
"advisory": "USN-3730-1",
"defect": [
"1783591"
],
"discovery": "EXTERNAL"
},
"title": "The lxc-user-nic component of LXC allows unprivileged users to open arbitrary files",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@ubuntu.com",
"DATE_PUBLIC": "2018-08-06T16:00:00.000Z",
"ID": "CVE-2018-6556",
"STATE": "PUBLIC",
"TITLE": "The lxc-user-nic component of LXC allows unprivileged users to open arbitrary files"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "LXC",
"version": {
"version_data": [
{
"affected": "\u003e=",
"version_affected": "\u003e=",
"version_name": "2.0",
"version_value": "2.0.9"
},
{
"affected": "\u003e=",
"version_affected": "\u003e=",
"version_name": "3.0",
"version_value": "3.0.0"
},
{
"affected": "\u003c",
"version_affected": "\u003c",
"version_name": "3.0",
"version_value": "3.0.2"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Matthias Gerstner from SUSE"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "lxc-user-nic when asked to delete a network interface will unconditionally open a user provided path. This code path may be used by an unprivileged user to check for the existence of a path which they wouldn\u0027t otherwise be able to reach. It may also be used to trigger side effects by causing a (read-only) open of special kernel files (ptmx, proc, sys). Affected releases are LXC: 2.0 versions above and including 2.0.9; 3.0 versions above and including 3.0.0, prior to 3.0.2."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Incorrect access control"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "USN-3730-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/usn/usn-3730-1"
},
{
"name": "https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1783591",
"refsource": "CONFIRM",
"url": "https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1783591"
},
{
"name": "GLSA-201808-02",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201808-02"
},
{
"name": "https://bugzilla.suse.com/show_bug.cgi?id=988348",
"refsource": "CONFIRM",
"url": "https://bugzilla.suse.com/show_bug.cgi?id=988348"
},
{
"name": "openSUSE-SU-2019:1227",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00074.html"
},
{
"name": "openSUSE-SU-2019:1230",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00076.html"
},
{
"name": "openSUSE-SU-2019:1275",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00091.html"
},
{
"name": "openSUSE-SU-2019:1481",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00073.html"
}
]
},
"source": {
"advisory": "USN-3730-1",
"defect": [
"1783591"
],
"discovery": "EXTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
"assignerShortName": "canonical",
"cveId": "CVE-2018-6556",
"datePublished": "2018-08-10T15:00:00.000Z",
"dateReserved": "2018-02-02T00:00:00.000Z",
"dateUpdated": "2024-09-17T03:38:26.856Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2018-6556\",\"sourceIdentifier\":\"security@ubuntu.com\",\"published\":\"2018-08-10T15:29:01.297\",\"lastModified\":\"2024-11-21T04:10:53.970\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"lxc-user-nic when asked to delete a network interface will unconditionally open a user provided path. This code path may be used by an unprivileged user to check for the existence of a path which they wouldn\u0027t otherwise be able to reach. It may also be used to trigger side effects by causing a (read-only) open of special kernel files (ptmx, proc, sys). Affected releases are LXC: 2.0 versions above and including 2.0.9; 3.0 versions above and including 3.0.0, prior to 3.0.2.\"},{\"lang\":\"es\",\"value\":\"Cuando se solicita a lxc-user-nic que elimine una interfaz de red, abrir\u00e1 de forma incondicional una ruta proporcionada por el usuario. Esta ruta de c\u00f3digo podr\u00eda ser empleada por un usuario sin privilegios para comprobar la existencia de una ruta que no hubiese podido alcanzar de otra forma. Tambi\u00e9n podr\u00eda emplearse para desencadenar efectos secundarios provocando la apertura (solo lectura) de archivos especiales del kernel (ptmx, proc, sys). Los productos afectados son LXC: desde la versi\u00f3n 2.0 hasta despu\u00e9s de la la 2.0.9 (incluida) y desde la versi\u00f3n 3.0 hasta despu\u00e9s de la 3.0.0, anterior a la 3.0.2.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":3.3,\"baseSeverity\":\"LOW\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":2.1,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-417\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxcontainers:lxc:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.0.0\",\"versionEndIncluding\":\"2.0.9\",\"matchCriteriaId\":\"6930BFF7-B9DE-4C00-9417-01142E02D009\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxcontainers:lxc:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.0.0\",\"versionEndExcluding\":\"3.0.2\",\"matchCriteriaId\":\"5618B173-83E7-4BFC-8AE8-22D6CDA7EB3A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:suse:caas_platform:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44BF9D66-26B1-4BEA-BFA1-9115D06F0C06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:suse:caas_platform:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85D9542F-8D5A-430B-9804-B8170E067CCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:suse:openstack_cloud:6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53945BEC-81F5-44F8-8035-7A4E5E2DA5B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:ltss:*:*:*\",\"matchCriteriaId\":\"657C3582-75D1-4724-921C-FD4325D6D1D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp4:*:*:*:*:*:*\",\"matchCriteriaId\":\"41E76620-EC14-4D2B-828F-53F26DEA5DDC\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1E78106-58E6-4D59-990F-75DA575BFAD9\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00074.html\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00076.html\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00091.html\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00073.html\",\"source\":\"security@ubuntu.com\"},{\"url\":\"https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1783591\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.suse.com/show_bug.cgi?id=988348\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://security.gentoo.org/glsa/201808-02\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/usn/usn-3730-1\",\"source\":\"security@ubuntu.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00074.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00076.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00091.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00073.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1783591\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.suse.com/show_bug.cgi?id=988348\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://security.gentoo.org/glsa/201808-02\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/usn/usn-3730-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
FKIE_CVE-2018-6556
Vulnerability from fkie_nvd - Published: 2018-08-10 15:29 - Updated: 2024-11-21 04:10
Severity ?
Summary
lxc-user-nic when asked to delete a network interface will unconditionally open a user provided path. This code path may be used by an unprivileged user to check for the existence of a path which they wouldn't otherwise be able to reach. It may also be used to trigger side effects by causing a (read-only) open of special kernel files (ptmx, proc, sys). Affected releases are LXC: 2.0 versions above and including 2.0.9; 3.0 versions above and including 3.0.0, prior to 3.0.2.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| canonical | ubuntu_linux | 18.04 | |
| linuxcontainers | lxc | * | |
| linuxcontainers | lxc | * | |
| suse | caas_platform | 1.0 | |
| suse | caas_platform | 2.0 | |
| suse | openstack_cloud | 6 | |
| suse | suse_linux_enterprise_server | 11 | |
| suse | suse_linux_enterprise_server | 11 | |
| opensuse | leap | 15.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:linuxcontainers:lxc:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6930BFF7-B9DE-4C00-9417-01142E02D009",
"versionEndIncluding": "2.0.9",
"versionStartIncluding": "2.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:linuxcontainers:lxc:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5618B173-83E7-4BFC-8AE8-22D6CDA7EB3A",
"versionEndExcluding": "3.0.2",
"versionStartIncluding": "3.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:suse:caas_platform:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "44BF9D66-26B1-4BEA-BFA1-9115D06F0C06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:suse:caas_platform:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "85D9542F-8D5A-430B-9804-B8170E067CCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:suse:openstack_cloud:6:*:*:*:*:*:*:*",
"matchCriteriaId": "53945BEC-81F5-44F8-8035-7A4E5E2DA5B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:ltss:*:*:*",
"matchCriteriaId": "657C3582-75D1-4724-921C-FD4325D6D1D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp4:*:*:*:*:*:*",
"matchCriteriaId": "41E76620-EC14-4D2B-828F-53F26DEA5DDC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "lxc-user-nic when asked to delete a network interface will unconditionally open a user provided path. This code path may be used by an unprivileged user to check for the existence of a path which they wouldn\u0027t otherwise be able to reach. It may also be used to trigger side effects by causing a (read-only) open of special kernel files (ptmx, proc, sys). Affected releases are LXC: 2.0 versions above and including 2.0.9; 3.0 versions above and including 3.0.0, prior to 3.0.2."
},
{
"lang": "es",
"value": "Cuando se solicita a lxc-user-nic que elimine una interfaz de red, abrir\u00e1 de forma incondicional una ruta proporcionada por el usuario. Esta ruta de c\u00f3digo podr\u00eda ser empleada por un usuario sin privilegios para comprobar la existencia de una ruta que no hubiese podido alcanzar de otra forma. Tambi\u00e9n podr\u00eda emplearse para desencadenar efectos secundarios provocando la apertura (solo lectura) de archivos especiales del kernel (ptmx, proc, sys). Los productos afectados son LXC: desde la versi\u00f3n 2.0 hasta despu\u00e9s de la la 2.0.9 (incluida) y desde la versi\u00f3n 3.0 hasta despu\u00e9s de la 3.0.0, anterior a la 3.0.2."
}
],
"id": "CVE-2018-6556",
"lastModified": "2024-11-21T04:10:53.970",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-08-10T15:29:01.297",
"references": [
{
"source": "security@ubuntu.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00074.html"
},
{
"source": "security@ubuntu.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00076.html"
},
{
"source": "security@ubuntu.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00091.html"
},
{
"source": "security@ubuntu.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00073.html"
},
{
"source": "security@ubuntu.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1783591"
},
{
"source": "security@ubuntu.com",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://bugzilla.suse.com/show_bug.cgi?id=988348"
},
{
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201808-02"
},
{
"source": "security@ubuntu.com",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/usn/usn-3730-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00074.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00076.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00091.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00073.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1783591"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://bugzilla.suse.com/show_bug.cgi?id=988348"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201808-02"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/usn/usn-3730-1"
}
],
"sourceIdentifier": "security@ubuntu.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-417"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
BDU:2020-01714
Vulnerability from fstec - Published: 10.08.2018
VLAI Severity ?
Title
Уязвимость системы виртуализации LXC, связанная с ошибкой предоставления пользователю доступа, при запросе удаления сетевого интерфейса, позволяющая нарушителю получить доступ к конфиденциальным данным
Description
Уязвимость системы виртуализации LXC связана с ошибкой предоставления пользователю доступа, при запросе удаления сетевого интерфейса. Эксплуатация уязвимость позволяет нарушителю получить доступ к конфиденциальным данным
Severity ?
Vendor
Сообщество свободного программного обеспечения, Novell Inc., Canonical Ltd., ООО «РусБИТех-Астра», АО «Концерн ВНИИНС»
Software Name
Debian GNU/Linux, OpenSUSE Leap, Ubuntu, Astra Linux Special Edition (запись в едином реестре российских программ №369), LXC, ОС ОН «Стрелец» (запись в едином реестре российских программ №6177)
Software Version
9 (Debian GNU/Linux), 42.3 (OpenSUSE Leap), 18.04 LTS (Ubuntu), 1.6 «Смоленск» (Astra Linux Special Edition), 15.0 (OpenSUSE Leap), 8 (Debian GNU/Linux), до 2.0.9 включительно (LXC), до 3.0.2 включительно (LXC), до 16.01.2023 (ОС ОН «Стрелец»)
Possible Mitigations
Использование рекомендаций:
Для LXC:
Обновление программного обеспечения до 1:3.1.0+really3.0.4-2 или более поздней версии
Для Debian:
https://security-tracker.debian.org/tracker/CVE-2018-6556
Для Astra Linux:
Обновление программного обеспечения (пакета lxc) до 1:3.1.0+really3.0.4-2 или более поздней версии
Для программных продуктов Novell Inc.:
https://www.suse.com/security/cve/CVE-2018-6556/
Для Ubuntu:
https://usn.ubuntu.com/3730-1/
Для ОС ОН «Стрелец»:
Обновление программного обеспечения lxc до версии 1:3.1.0+really3.0.3-8strelets0
Reference
https://www.suse.com/security/cve/CVE-2018-6556/
https://usn.ubuntu.com/3730-1/
https://nvd.nist.gov/vuln/detail/CVE-2018-6556
https://security-tracker.debian.org/tracker/CVE-2018-6556
https://wiki.astralinux.ru/astra-linux-se16-bulletin-20200327SE16
https://strelets.net/patchi-i-obnovleniya-bezopasnosti#16012023
CWE
CWE-417
{
"CVSS 2.0": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS 3.0": "AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, Novell Inc., Canonical Ltd., \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, \u0410\u041e \u00ab\u041a\u043e\u043d\u0446\u0435\u0440\u043d \u0412\u041d\u0418\u0418\u041d\u0421\u00bb",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "9 (Debian GNU/Linux), 42.3 (OpenSUSE Leap), 18.04 LTS (Ubuntu), 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (Astra Linux Special Edition), 15.0 (OpenSUSE Leap), 8 (Debian GNU/Linux), \u0434\u043e 2.0.9 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (LXC), \u0434\u043e 3.0.2 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (LXC), \u0434\u043e 16.01.2023 (\u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f LXC:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0434\u043e 1:3.1.0+really3.0.4-2 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0435\u0439 \u0432\u0435\u0440\u0441\u0438\u0438\n\n\u0414\u043b\u044f Debian:\nhttps://security-tracker.debian.org/tracker/CVE-2018-6556\n\n\u0414\u043b\u044f Astra Linux:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f (\u043f\u0430\u043a\u0435\u0442\u0430 lxc) \u0434\u043e 1:3.1.0+really3.0.4-2 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0435\u0439 \u0432\u0435\u0440\u0441\u0438\u0438\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Novell Inc.:\nhttps://www.suse.com/security/cve/CVE-2018-6556/\n\n\u0414\u043b\u044f Ubuntu:\nhttps://usn.ubuntu.com/3730-1/\n\n\u0414\u043b\u044f \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f lxc \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 1:3.1.0+really3.0.3-8strelets0",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "10.08.2018",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "21.11.2023",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "23.04.2020",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2020-01714",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2018-6556",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Debian GNU/Linux, OpenSUSE Leap, Ubuntu, Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), LXC, \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21166177)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 9 , Novell Inc. OpenSUSE Leap 42.3 , Canonical Ltd. Ubuntu 18.04 LTS , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Novell Inc. OpenSUSE Leap 15.0 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 8 , \u0410\u041e \u00ab\u041a\u043e\u043d\u0446\u0435\u0440\u043d \u0412\u041d\u0418\u0418\u041d\u0421\u00bb \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb \u0434\u043e 16.01.2023 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21166177)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 LXC, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043e\u0448\u0438\u0431\u043a\u043e\u0439 \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044e \u0434\u043e\u0441\u0442\u0443\u043f\u0430, \u043f\u0440\u0438 \u0437\u0430\u043f\u0440\u043e\u0441\u0435 \u0443\u0434\u0430\u043b\u0435\u043d\u0438\u044f \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0430, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c \u0434\u0430\u043d\u043d\u044b\u043c",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041e\u0448\u0438\u0431\u043a\u0438, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0435 \u0441 \u043a\u0430\u043d\u0430\u043b\u0430\u043c\u0438 \u0438 \u043f\u0443\u0442\u044f\u043c\u0438 (CWE-417)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 LXC \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043e\u0448\u0438\u0431\u043a\u043e\u0439 \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044e \u0434\u043e\u0441\u0442\u0443\u043f\u0430, \u043f\u0440\u0438 \u0437\u0430\u043f\u0440\u043e\u0441\u0435 \u0443\u0434\u0430\u043b\u0435\u043d\u0438\u044f \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0430. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c \u0434\u0430\u043d\u043d\u044b\u043c",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0410\u043d\u0430\u043b\u0438\u0437 \u0446\u0435\u043b\u0435\u0432\u043e\u0433\u043e \u043e\u0431\u044a\u0435\u043a\u0442\u0430",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://www.suse.com/security/cve/CVE-2018-6556/\nhttps://usn.ubuntu.com/3730-1/\nhttps://nvd.nist.gov/vuln/detail/CVE-2018-6556\nhttps://security-tracker.debian.org/tracker/CVE-2018-6556\nhttps://wiki.astralinux.ru/astra-linux-se16-bulletin-20200327SE16\nhttps://strelets.net/patchi-i-obnovleniya-bezopasnosti#16012023",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-417",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041d\u0438\u0437\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 2,1)\n\u041d\u0438\u0437\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 3,3)"
}
OPENSUSE-SU-2019:1230-1
Vulnerability from csaf_opensuse - Published: 2019-04-18 08:19 - Updated: 2019-04-18 08:19Summary
Security update for lxc
Severity
Moderate
Notes
Title of the patch: Security update for lxc
Description of the patch: This update for lxc fixes the following issues:
The following security vulnerability was fixed:
- CVE-2018-6556: Fixed an information leak and possible open() side effects
to regular users via lxc-user-nic (boo#988348)
This update was imported from the openSUSE:Leap:15.0:Update update project.
Patchnames: openSUSE-2019-1230
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
5.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for lxc",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for lxc fixes the following issues:\n\nThe following security vulnerability was fixed:\n\n- CVE-2018-6556: Fixed an information leak and possible open() side effects\n to regular users via lxc-user-nic (boo#988348)\n\nThis update was imported from the openSUSE:Leap:15.0:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2019-1230",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_1230-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2019:1230-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YSTSXJMKRPX7DLJOHKBF3X7FO724JMME/#YSTSXJMKRPX7DLJOHKBF3X7FO724JMME"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2019:1230-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YSTSXJMKRPX7DLJOHKBF3X7FO724JMME/#YSTSXJMKRPX7DLJOHKBF3X7FO724JMME"
},
{
"category": "self",
"summary": "SUSE Bug 988348",
"url": "https://bugzilla.suse.com/988348"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-6556 page",
"url": "https://www.suse.com/security/cve/CVE-2018-6556/"
}
],
"title": "Security update for lxc",
"tracking": {
"current_release_date": "2019-04-18T08:19:11Z",
"generator": {
"date": "2019-04-18T08:19:11Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2019:1230-1",
"initial_release_date": "2019-04-18T08:19:11Z",
"revision_history": [
{
"date": "2019-04-18T08:19:11Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "liblxc-devel-2.0.9-bp150.5.6.1.aarch64",
"product": {
"name": "liblxc-devel-2.0.9-bp150.5.6.1.aarch64",
"product_id": "liblxc-devel-2.0.9-bp150.5.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "liblxc1-2.0.9-bp150.5.6.1.aarch64",
"product": {
"name": "liblxc1-2.0.9-bp150.5.6.1.aarch64",
"product_id": "liblxc1-2.0.9-bp150.5.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "lxc-2.0.9-bp150.5.6.1.aarch64",
"product": {
"name": "lxc-2.0.9-bp150.5.6.1.aarch64",
"product_id": "lxc-2.0.9-bp150.5.6.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "liblxc-devel-2.0.9-bp150.5.6.1.ppc64le",
"product": {
"name": "liblxc-devel-2.0.9-bp150.5.6.1.ppc64le",
"product_id": "liblxc-devel-2.0.9-bp150.5.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "liblxc1-2.0.9-bp150.5.6.1.ppc64le",
"product": {
"name": "liblxc1-2.0.9-bp150.5.6.1.ppc64le",
"product_id": "liblxc1-2.0.9-bp150.5.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "lxc-2.0.9-bp150.5.6.1.ppc64le",
"product": {
"name": "lxc-2.0.9-bp150.5.6.1.ppc64le",
"product_id": "lxc-2.0.9-bp150.5.6.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "liblxc-devel-2.0.9-bp150.5.6.1.s390x",
"product": {
"name": "liblxc-devel-2.0.9-bp150.5.6.1.s390x",
"product_id": "liblxc-devel-2.0.9-bp150.5.6.1.s390x"
}
},
{
"category": "product_version",
"name": "liblxc1-2.0.9-bp150.5.6.1.s390x",
"product": {
"name": "liblxc1-2.0.9-bp150.5.6.1.s390x",
"product_id": "liblxc1-2.0.9-bp150.5.6.1.s390x"
}
},
{
"category": "product_version",
"name": "lxc-2.0.9-bp150.5.6.1.s390x",
"product": {
"name": "lxc-2.0.9-bp150.5.6.1.s390x",
"product_id": "lxc-2.0.9-bp150.5.6.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "liblxc-devel-2.0.9-bp150.5.6.1.x86_64",
"product": {
"name": "liblxc-devel-2.0.9-bp150.5.6.1.x86_64",
"product_id": "liblxc-devel-2.0.9-bp150.5.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "liblxc1-2.0.9-bp150.5.6.1.x86_64",
"product": {
"name": "liblxc1-2.0.9-bp150.5.6.1.x86_64",
"product_id": "liblxc1-2.0.9-bp150.5.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "lxc-2.0.9-bp150.5.6.1.x86_64",
"product": {
"name": "lxc-2.0.9-bp150.5.6.1.x86_64",
"product_id": "lxc-2.0.9-bp150.5.6.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Package Hub 15",
"product": {
"name": "SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "liblxc-devel-2.0.9-bp150.5.6.1.aarch64 as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:liblxc-devel-2.0.9-bp150.5.6.1.aarch64"
},
"product_reference": "liblxc-devel-2.0.9-bp150.5.6.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "liblxc-devel-2.0.9-bp150.5.6.1.ppc64le as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:liblxc-devel-2.0.9-bp150.5.6.1.ppc64le"
},
"product_reference": "liblxc-devel-2.0.9-bp150.5.6.1.ppc64le",
"relates_to_product_reference": "SUSE Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "liblxc-devel-2.0.9-bp150.5.6.1.s390x as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:liblxc-devel-2.0.9-bp150.5.6.1.s390x"
},
"product_reference": "liblxc-devel-2.0.9-bp150.5.6.1.s390x",
"relates_to_product_reference": "SUSE Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "liblxc-devel-2.0.9-bp150.5.6.1.x86_64 as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:liblxc-devel-2.0.9-bp150.5.6.1.x86_64"
},
"product_reference": "liblxc-devel-2.0.9-bp150.5.6.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "liblxc1-2.0.9-bp150.5.6.1.aarch64 as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:liblxc1-2.0.9-bp150.5.6.1.aarch64"
},
"product_reference": "liblxc1-2.0.9-bp150.5.6.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "liblxc1-2.0.9-bp150.5.6.1.ppc64le as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:liblxc1-2.0.9-bp150.5.6.1.ppc64le"
},
"product_reference": "liblxc1-2.0.9-bp150.5.6.1.ppc64le",
"relates_to_product_reference": "SUSE Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "liblxc1-2.0.9-bp150.5.6.1.s390x as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:liblxc1-2.0.9-bp150.5.6.1.s390x"
},
"product_reference": "liblxc1-2.0.9-bp150.5.6.1.s390x",
"relates_to_product_reference": "SUSE Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "liblxc1-2.0.9-bp150.5.6.1.x86_64 as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:liblxc1-2.0.9-bp150.5.6.1.x86_64"
},
"product_reference": "liblxc1-2.0.9-bp150.5.6.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lxc-2.0.9-bp150.5.6.1.aarch64 as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:lxc-2.0.9-bp150.5.6.1.aarch64"
},
"product_reference": "lxc-2.0.9-bp150.5.6.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lxc-2.0.9-bp150.5.6.1.ppc64le as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:lxc-2.0.9-bp150.5.6.1.ppc64le"
},
"product_reference": "lxc-2.0.9-bp150.5.6.1.ppc64le",
"relates_to_product_reference": "SUSE Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lxc-2.0.9-bp150.5.6.1.s390x as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:lxc-2.0.9-bp150.5.6.1.s390x"
},
"product_reference": "lxc-2.0.9-bp150.5.6.1.s390x",
"relates_to_product_reference": "SUSE Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lxc-2.0.9-bp150.5.6.1.x86_64 as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:lxc-2.0.9-bp150.5.6.1.x86_64"
},
"product_reference": "lxc-2.0.9-bp150.5.6.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-6556",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-6556"
}
],
"notes": [
{
"category": "general",
"text": "lxc-user-nic when asked to delete a network interface will unconditionally open a user provided path. This code path may be used by an unprivileged user to check for the existence of a path which they wouldn\u0027t otherwise be able to reach. It may also be used to trigger side effects by causing a (read-only) open of special kernel files (ptmx, proc, sys). Affected releases are LXC: 2.0 versions above and including 2.0.9; 3.0 versions above and including 3.0.0, prior to 3.0.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15:liblxc-devel-2.0.9-bp150.5.6.1.aarch64",
"SUSE Package Hub 15:liblxc-devel-2.0.9-bp150.5.6.1.ppc64le",
"SUSE Package Hub 15:liblxc-devel-2.0.9-bp150.5.6.1.s390x",
"SUSE Package Hub 15:liblxc-devel-2.0.9-bp150.5.6.1.x86_64",
"SUSE Package Hub 15:liblxc1-2.0.9-bp150.5.6.1.aarch64",
"SUSE Package Hub 15:liblxc1-2.0.9-bp150.5.6.1.ppc64le",
"SUSE Package Hub 15:liblxc1-2.0.9-bp150.5.6.1.s390x",
"SUSE Package Hub 15:liblxc1-2.0.9-bp150.5.6.1.x86_64",
"SUSE Package Hub 15:lxc-2.0.9-bp150.5.6.1.aarch64",
"SUSE Package Hub 15:lxc-2.0.9-bp150.5.6.1.ppc64le",
"SUSE Package Hub 15:lxc-2.0.9-bp150.5.6.1.s390x",
"SUSE Package Hub 15:lxc-2.0.9-bp150.5.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-6556",
"url": "https://www.suse.com/security/cve/CVE-2018-6556"
},
{
"category": "external",
"summary": "SUSE Bug 1122185 for CVE-2018-6556",
"url": "https://bugzilla.suse.com/1122185"
},
{
"category": "external",
"summary": "SUSE Bug 1206779 for CVE-2018-6556",
"url": "https://bugzilla.suse.com/1206779"
},
{
"category": "external",
"summary": "SUSE Bug 988348 for CVE-2018-6556",
"url": "https://bugzilla.suse.com/988348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15:liblxc-devel-2.0.9-bp150.5.6.1.aarch64",
"SUSE Package Hub 15:liblxc-devel-2.0.9-bp150.5.6.1.ppc64le",
"SUSE Package Hub 15:liblxc-devel-2.0.9-bp150.5.6.1.s390x",
"SUSE Package Hub 15:liblxc-devel-2.0.9-bp150.5.6.1.x86_64",
"SUSE Package Hub 15:liblxc1-2.0.9-bp150.5.6.1.aarch64",
"SUSE Package Hub 15:liblxc1-2.0.9-bp150.5.6.1.ppc64le",
"SUSE Package Hub 15:liblxc1-2.0.9-bp150.5.6.1.s390x",
"SUSE Package Hub 15:liblxc1-2.0.9-bp150.5.6.1.x86_64",
"SUSE Package Hub 15:lxc-2.0.9-bp150.5.6.1.aarch64",
"SUSE Package Hub 15:lxc-2.0.9-bp150.5.6.1.ppc64le",
"SUSE Package Hub 15:lxc-2.0.9-bp150.5.6.1.s390x",
"SUSE Package Hub 15:lxc-2.0.9-bp150.5.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Package Hub 15:liblxc-devel-2.0.9-bp150.5.6.1.aarch64",
"SUSE Package Hub 15:liblxc-devel-2.0.9-bp150.5.6.1.ppc64le",
"SUSE Package Hub 15:liblxc-devel-2.0.9-bp150.5.6.1.s390x",
"SUSE Package Hub 15:liblxc-devel-2.0.9-bp150.5.6.1.x86_64",
"SUSE Package Hub 15:liblxc1-2.0.9-bp150.5.6.1.aarch64",
"SUSE Package Hub 15:liblxc1-2.0.9-bp150.5.6.1.ppc64le",
"SUSE Package Hub 15:liblxc1-2.0.9-bp150.5.6.1.s390x",
"SUSE Package Hub 15:liblxc1-2.0.9-bp150.5.6.1.x86_64",
"SUSE Package Hub 15:lxc-2.0.9-bp150.5.6.1.aarch64",
"SUSE Package Hub 15:lxc-2.0.9-bp150.5.6.1.ppc64le",
"SUSE Package Hub 15:lxc-2.0.9-bp150.5.6.1.s390x",
"SUSE Package Hub 15:lxc-2.0.9-bp150.5.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-04-18T08:19:11Z",
"details": "moderate"
}
],
"title": "CVE-2018-6556"
}
]
}
OPENSUSE-SU-2019:1227-1
Vulnerability from csaf_opensuse - Published: 2019-04-17 14:27 - Updated: 2019-04-17 14:27Summary
Security update for lxc, lxcfs
Severity
Important
Notes
Title of the patch: Security update for lxc, lxcfs
Description of the patch: This update for lxc, lxcfs to version 3.1.0 fixes the following issues:
Security issues fixed:
- CVE-2019-5736: Fixed a container breakout vulnerability (boo#1122185).
- CVE-2018-6556: Enable setuid bit on lxc-user-nic (boo#988348).
Non-security issues fixed:
- Update to LXC 3.1.0. The changelog is far too long to include here, please
look at https://linuxcontainers.org/. (boo#1131762)
Patchnames: openSUSE-2019-1227
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
5.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for lxc, lxcfs",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for lxc, lxcfs to version 3.1.0 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-5736: Fixed a container breakout vulnerability (boo#1122185).\n- CVE-2018-6556: Enable setuid bit on lxc-user-nic (boo#988348).\n\nNon-security issues fixed:\n\n- Update to LXC 3.1.0. The changelog is far too long to include here, please\n look at https://linuxcontainers.org/. (boo#1131762)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2019-1227",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_1227-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2019:1227-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P7UGXMWDCAJUCRFVZRWEYVPQASYUPVO4/#P7UGXMWDCAJUCRFVZRWEYVPQASYUPVO4"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2019:1227-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P7UGXMWDCAJUCRFVZRWEYVPQASYUPVO4/#P7UGXMWDCAJUCRFVZRWEYVPQASYUPVO4"
},
{
"category": "self",
"summary": "SUSE Bug 1122185",
"url": "https://bugzilla.suse.com/1122185"
},
{
"category": "self",
"summary": "SUSE Bug 1131762",
"url": "https://bugzilla.suse.com/1131762"
},
{
"category": "self",
"summary": "SUSE Bug 988348",
"url": "https://bugzilla.suse.com/988348"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-6556 page",
"url": "https://www.suse.com/security/cve/CVE-2018-6556/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5736 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5736/"
}
],
"title": "Security update for lxc, lxcfs",
"tracking": {
"current_release_date": "2019-04-17T14:27:35Z",
"generator": {
"date": "2019-04-17T14:27:35Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2019:1227-1",
"initial_release_date": "2019-04-17T14:27:35Z",
"revision_history": [
{
"date": "2019-04-17T14:27:35Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "liblxc-devel-3.1.0-bp150.5.3.1.aarch64",
"product": {
"name": "liblxc-devel-3.1.0-bp150.5.3.1.aarch64",
"product_id": "liblxc-devel-3.1.0-bp150.5.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "liblxc1-3.1.0-bp150.5.3.1.aarch64",
"product": {
"name": "liblxc1-3.1.0-bp150.5.3.1.aarch64",
"product_id": "liblxc1-3.1.0-bp150.5.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "lxc-3.1.0-bp150.5.3.1.aarch64",
"product": {
"name": "lxc-3.1.0-bp150.5.3.1.aarch64",
"product_id": "lxc-3.1.0-bp150.5.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "lxcfs-3.0.3-bp150.3.3.1.aarch64",
"product": {
"name": "lxcfs-3.0.3-bp150.3.3.1.aarch64",
"product_id": "lxcfs-3.0.3-bp150.3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "pam_cgfs-3.1.0-bp150.5.3.1.aarch64",
"product": {
"name": "pam_cgfs-3.1.0-bp150.5.3.1.aarch64",
"product_id": "pam_cgfs-3.1.0-bp150.5.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "lxc-bash-completion-3.1.0-bp150.5.3.1.noarch",
"product": {
"name": "lxc-bash-completion-3.1.0-bp150.5.3.1.noarch",
"product_id": "lxc-bash-completion-3.1.0-bp150.5.3.1.noarch"
}
},
{
"category": "product_version",
"name": "lxcfs-hooks-lxc-3.0.3-bp150.3.3.1.noarch",
"product": {
"name": "lxcfs-hooks-lxc-3.0.3-bp150.3.3.1.noarch",
"product_id": "lxcfs-hooks-lxc-3.0.3-bp150.3.3.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "liblxc-devel-3.1.0-bp150.5.3.1.ppc64le",
"product": {
"name": "liblxc-devel-3.1.0-bp150.5.3.1.ppc64le",
"product_id": "liblxc-devel-3.1.0-bp150.5.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "liblxc1-3.1.0-bp150.5.3.1.ppc64le",
"product": {
"name": "liblxc1-3.1.0-bp150.5.3.1.ppc64le",
"product_id": "liblxc1-3.1.0-bp150.5.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "lxc-3.1.0-bp150.5.3.1.ppc64le",
"product": {
"name": "lxc-3.1.0-bp150.5.3.1.ppc64le",
"product_id": "lxc-3.1.0-bp150.5.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "lxcfs-3.0.3-bp150.3.3.1.ppc64le",
"product": {
"name": "lxcfs-3.0.3-bp150.3.3.1.ppc64le",
"product_id": "lxcfs-3.0.3-bp150.3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "pam_cgfs-3.1.0-bp150.5.3.1.ppc64le",
"product": {
"name": "pam_cgfs-3.1.0-bp150.5.3.1.ppc64le",
"product_id": "pam_cgfs-3.1.0-bp150.5.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "liblxc-devel-3.1.0-bp150.5.3.1.s390x",
"product": {
"name": "liblxc-devel-3.1.0-bp150.5.3.1.s390x",
"product_id": "liblxc-devel-3.1.0-bp150.5.3.1.s390x"
}
},
{
"category": "product_version",
"name": "liblxc1-3.1.0-bp150.5.3.1.s390x",
"product": {
"name": "liblxc1-3.1.0-bp150.5.3.1.s390x",
"product_id": "liblxc1-3.1.0-bp150.5.3.1.s390x"
}
},
{
"category": "product_version",
"name": "lxc-3.1.0-bp150.5.3.1.s390x",
"product": {
"name": "lxc-3.1.0-bp150.5.3.1.s390x",
"product_id": "lxc-3.1.0-bp150.5.3.1.s390x"
}
},
{
"category": "product_version",
"name": "lxcfs-3.0.3-bp150.3.3.1.s390x",
"product": {
"name": "lxcfs-3.0.3-bp150.3.3.1.s390x",
"product_id": "lxcfs-3.0.3-bp150.3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "pam_cgfs-3.1.0-bp150.5.3.1.s390x",
"product": {
"name": "pam_cgfs-3.1.0-bp150.5.3.1.s390x",
"product_id": "pam_cgfs-3.1.0-bp150.5.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "liblxc-devel-3.1.0-bp150.5.3.1.x86_64",
"product": {
"name": "liblxc-devel-3.1.0-bp150.5.3.1.x86_64",
"product_id": "liblxc-devel-3.1.0-bp150.5.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "liblxc1-3.1.0-bp150.5.3.1.x86_64",
"product": {
"name": "liblxc1-3.1.0-bp150.5.3.1.x86_64",
"product_id": "liblxc1-3.1.0-bp150.5.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "lxc-3.1.0-bp150.5.3.1.x86_64",
"product": {
"name": "lxc-3.1.0-bp150.5.3.1.x86_64",
"product_id": "lxc-3.1.0-bp150.5.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "lxcfs-3.0.3-bp150.3.3.1.x86_64",
"product": {
"name": "lxcfs-3.0.3-bp150.3.3.1.x86_64",
"product_id": "lxcfs-3.0.3-bp150.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "pam_cgfs-3.1.0-bp150.5.3.1.x86_64",
"product": {
"name": "pam_cgfs-3.1.0-bp150.5.3.1.x86_64",
"product_id": "pam_cgfs-3.1.0-bp150.5.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Package Hub 15",
"product": {
"name": "SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "liblxc-devel-3.1.0-bp150.5.3.1.aarch64 as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:liblxc-devel-3.1.0-bp150.5.3.1.aarch64"
},
"product_reference": "liblxc-devel-3.1.0-bp150.5.3.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "liblxc-devel-3.1.0-bp150.5.3.1.ppc64le as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:liblxc-devel-3.1.0-bp150.5.3.1.ppc64le"
},
"product_reference": "liblxc-devel-3.1.0-bp150.5.3.1.ppc64le",
"relates_to_product_reference": "SUSE Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "liblxc-devel-3.1.0-bp150.5.3.1.s390x as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:liblxc-devel-3.1.0-bp150.5.3.1.s390x"
},
"product_reference": "liblxc-devel-3.1.0-bp150.5.3.1.s390x",
"relates_to_product_reference": "SUSE Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "liblxc-devel-3.1.0-bp150.5.3.1.x86_64 as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:liblxc-devel-3.1.0-bp150.5.3.1.x86_64"
},
"product_reference": "liblxc-devel-3.1.0-bp150.5.3.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "liblxc1-3.1.0-bp150.5.3.1.aarch64 as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:liblxc1-3.1.0-bp150.5.3.1.aarch64"
},
"product_reference": "liblxc1-3.1.0-bp150.5.3.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "liblxc1-3.1.0-bp150.5.3.1.ppc64le as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:liblxc1-3.1.0-bp150.5.3.1.ppc64le"
},
"product_reference": "liblxc1-3.1.0-bp150.5.3.1.ppc64le",
"relates_to_product_reference": "SUSE Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "liblxc1-3.1.0-bp150.5.3.1.s390x as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:liblxc1-3.1.0-bp150.5.3.1.s390x"
},
"product_reference": "liblxc1-3.1.0-bp150.5.3.1.s390x",
"relates_to_product_reference": "SUSE Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "liblxc1-3.1.0-bp150.5.3.1.x86_64 as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:liblxc1-3.1.0-bp150.5.3.1.x86_64"
},
"product_reference": "liblxc1-3.1.0-bp150.5.3.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lxc-3.1.0-bp150.5.3.1.aarch64 as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:lxc-3.1.0-bp150.5.3.1.aarch64"
},
"product_reference": "lxc-3.1.0-bp150.5.3.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lxc-3.1.0-bp150.5.3.1.ppc64le as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:lxc-3.1.0-bp150.5.3.1.ppc64le"
},
"product_reference": "lxc-3.1.0-bp150.5.3.1.ppc64le",
"relates_to_product_reference": "SUSE Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lxc-3.1.0-bp150.5.3.1.s390x as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:lxc-3.1.0-bp150.5.3.1.s390x"
},
"product_reference": "lxc-3.1.0-bp150.5.3.1.s390x",
"relates_to_product_reference": "SUSE Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lxc-3.1.0-bp150.5.3.1.x86_64 as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:lxc-3.1.0-bp150.5.3.1.x86_64"
},
"product_reference": "lxc-3.1.0-bp150.5.3.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lxc-bash-completion-3.1.0-bp150.5.3.1.noarch as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:lxc-bash-completion-3.1.0-bp150.5.3.1.noarch"
},
"product_reference": "lxc-bash-completion-3.1.0-bp150.5.3.1.noarch",
"relates_to_product_reference": "SUSE Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lxcfs-3.0.3-bp150.3.3.1.aarch64 as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:lxcfs-3.0.3-bp150.3.3.1.aarch64"
},
"product_reference": "lxcfs-3.0.3-bp150.3.3.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lxcfs-3.0.3-bp150.3.3.1.ppc64le as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:lxcfs-3.0.3-bp150.3.3.1.ppc64le"
},
"product_reference": "lxcfs-3.0.3-bp150.3.3.1.ppc64le",
"relates_to_product_reference": "SUSE Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lxcfs-3.0.3-bp150.3.3.1.s390x as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:lxcfs-3.0.3-bp150.3.3.1.s390x"
},
"product_reference": "lxcfs-3.0.3-bp150.3.3.1.s390x",
"relates_to_product_reference": "SUSE Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lxcfs-3.0.3-bp150.3.3.1.x86_64 as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:lxcfs-3.0.3-bp150.3.3.1.x86_64"
},
"product_reference": "lxcfs-3.0.3-bp150.3.3.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lxcfs-hooks-lxc-3.0.3-bp150.3.3.1.noarch as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:lxcfs-hooks-lxc-3.0.3-bp150.3.3.1.noarch"
},
"product_reference": "lxcfs-hooks-lxc-3.0.3-bp150.3.3.1.noarch",
"relates_to_product_reference": "SUSE Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_cgfs-3.1.0-bp150.5.3.1.aarch64 as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:pam_cgfs-3.1.0-bp150.5.3.1.aarch64"
},
"product_reference": "pam_cgfs-3.1.0-bp150.5.3.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_cgfs-3.1.0-bp150.5.3.1.ppc64le as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:pam_cgfs-3.1.0-bp150.5.3.1.ppc64le"
},
"product_reference": "pam_cgfs-3.1.0-bp150.5.3.1.ppc64le",
"relates_to_product_reference": "SUSE Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_cgfs-3.1.0-bp150.5.3.1.s390x as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:pam_cgfs-3.1.0-bp150.5.3.1.s390x"
},
"product_reference": "pam_cgfs-3.1.0-bp150.5.3.1.s390x",
"relates_to_product_reference": "SUSE Package Hub 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_cgfs-3.1.0-bp150.5.3.1.x86_64 as component of SUSE Package Hub 15",
"product_id": "SUSE Package Hub 15:pam_cgfs-3.1.0-bp150.5.3.1.x86_64"
},
"product_reference": "pam_cgfs-3.1.0-bp150.5.3.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-6556",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-6556"
}
],
"notes": [
{
"category": "general",
"text": "lxc-user-nic when asked to delete a network interface will unconditionally open a user provided path. This code path may be used by an unprivileged user to check for the existence of a path which they wouldn\u0027t otherwise be able to reach. It may also be used to trigger side effects by causing a (read-only) open of special kernel files (ptmx, proc, sys). Affected releases are LXC: 2.0 versions above and including 2.0.9; 3.0 versions above and including 3.0.0, prior to 3.0.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15:liblxc-devel-3.1.0-bp150.5.3.1.aarch64",
"SUSE Package Hub 15:liblxc-devel-3.1.0-bp150.5.3.1.ppc64le",
"SUSE Package Hub 15:liblxc-devel-3.1.0-bp150.5.3.1.s390x",
"SUSE Package Hub 15:liblxc-devel-3.1.0-bp150.5.3.1.x86_64",
"SUSE Package Hub 15:liblxc1-3.1.0-bp150.5.3.1.aarch64",
"SUSE Package Hub 15:liblxc1-3.1.0-bp150.5.3.1.ppc64le",
"SUSE Package Hub 15:liblxc1-3.1.0-bp150.5.3.1.s390x",
"SUSE Package Hub 15:liblxc1-3.1.0-bp150.5.3.1.x86_64",
"SUSE Package Hub 15:lxc-3.1.0-bp150.5.3.1.aarch64",
"SUSE Package Hub 15:lxc-3.1.0-bp150.5.3.1.ppc64le",
"SUSE Package Hub 15:lxc-3.1.0-bp150.5.3.1.s390x",
"SUSE Package Hub 15:lxc-3.1.0-bp150.5.3.1.x86_64",
"SUSE Package Hub 15:lxc-bash-completion-3.1.0-bp150.5.3.1.noarch",
"SUSE Package Hub 15:lxcfs-3.0.3-bp150.3.3.1.aarch64",
"SUSE Package Hub 15:lxcfs-3.0.3-bp150.3.3.1.ppc64le",
"SUSE Package Hub 15:lxcfs-3.0.3-bp150.3.3.1.s390x",
"SUSE Package Hub 15:lxcfs-3.0.3-bp150.3.3.1.x86_64",
"SUSE Package Hub 15:lxcfs-hooks-lxc-3.0.3-bp150.3.3.1.noarch",
"SUSE Package Hub 15:pam_cgfs-3.1.0-bp150.5.3.1.aarch64",
"SUSE Package Hub 15:pam_cgfs-3.1.0-bp150.5.3.1.ppc64le",
"SUSE Package Hub 15:pam_cgfs-3.1.0-bp150.5.3.1.s390x",
"SUSE Package Hub 15:pam_cgfs-3.1.0-bp150.5.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-6556",
"url": "https://www.suse.com/security/cve/CVE-2018-6556"
},
{
"category": "external",
"summary": "SUSE Bug 1122185 for CVE-2018-6556",
"url": "https://bugzilla.suse.com/1122185"
},
{
"category": "external",
"summary": "SUSE Bug 1206779 for CVE-2018-6556",
"url": "https://bugzilla.suse.com/1206779"
},
{
"category": "external",
"summary": "SUSE Bug 988348 for CVE-2018-6556",
"url": "https://bugzilla.suse.com/988348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15:liblxc-devel-3.1.0-bp150.5.3.1.aarch64",
"SUSE Package Hub 15:liblxc-devel-3.1.0-bp150.5.3.1.ppc64le",
"SUSE Package Hub 15:liblxc-devel-3.1.0-bp150.5.3.1.s390x",
"SUSE Package Hub 15:liblxc-devel-3.1.0-bp150.5.3.1.x86_64",
"SUSE Package Hub 15:liblxc1-3.1.0-bp150.5.3.1.aarch64",
"SUSE Package Hub 15:liblxc1-3.1.0-bp150.5.3.1.ppc64le",
"SUSE Package Hub 15:liblxc1-3.1.0-bp150.5.3.1.s390x",
"SUSE Package Hub 15:liblxc1-3.1.0-bp150.5.3.1.x86_64",
"SUSE Package Hub 15:lxc-3.1.0-bp150.5.3.1.aarch64",
"SUSE Package Hub 15:lxc-3.1.0-bp150.5.3.1.ppc64le",
"SUSE Package Hub 15:lxc-3.1.0-bp150.5.3.1.s390x",
"SUSE Package Hub 15:lxc-3.1.0-bp150.5.3.1.x86_64",
"SUSE Package Hub 15:lxc-bash-completion-3.1.0-bp150.5.3.1.noarch",
"SUSE Package Hub 15:lxcfs-3.0.3-bp150.3.3.1.aarch64",
"SUSE Package Hub 15:lxcfs-3.0.3-bp150.3.3.1.ppc64le",
"SUSE Package Hub 15:lxcfs-3.0.3-bp150.3.3.1.s390x",
"SUSE Package Hub 15:lxcfs-3.0.3-bp150.3.3.1.x86_64",
"SUSE Package Hub 15:lxcfs-hooks-lxc-3.0.3-bp150.3.3.1.noarch",
"SUSE Package Hub 15:pam_cgfs-3.1.0-bp150.5.3.1.aarch64",
"SUSE Package Hub 15:pam_cgfs-3.1.0-bp150.5.3.1.ppc64le",
"SUSE Package Hub 15:pam_cgfs-3.1.0-bp150.5.3.1.s390x",
"SUSE Package Hub 15:pam_cgfs-3.1.0-bp150.5.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Package Hub 15:liblxc-devel-3.1.0-bp150.5.3.1.aarch64",
"SUSE Package Hub 15:liblxc-devel-3.1.0-bp150.5.3.1.ppc64le",
"SUSE Package Hub 15:liblxc-devel-3.1.0-bp150.5.3.1.s390x",
"SUSE Package Hub 15:liblxc-devel-3.1.0-bp150.5.3.1.x86_64",
"SUSE Package Hub 15:liblxc1-3.1.0-bp150.5.3.1.aarch64",
"SUSE Package Hub 15:liblxc1-3.1.0-bp150.5.3.1.ppc64le",
"SUSE Package Hub 15:liblxc1-3.1.0-bp150.5.3.1.s390x",
"SUSE Package Hub 15:liblxc1-3.1.0-bp150.5.3.1.x86_64",
"SUSE Package Hub 15:lxc-3.1.0-bp150.5.3.1.aarch64",
"SUSE Package Hub 15:lxc-3.1.0-bp150.5.3.1.ppc64le",
"SUSE Package Hub 15:lxc-3.1.0-bp150.5.3.1.s390x",
"SUSE Package Hub 15:lxc-3.1.0-bp150.5.3.1.x86_64",
"SUSE Package Hub 15:lxc-bash-completion-3.1.0-bp150.5.3.1.noarch",
"SUSE Package Hub 15:lxcfs-3.0.3-bp150.3.3.1.aarch64",
"SUSE Package Hub 15:lxcfs-3.0.3-bp150.3.3.1.ppc64le",
"SUSE Package Hub 15:lxcfs-3.0.3-bp150.3.3.1.s390x",
"SUSE Package Hub 15:lxcfs-3.0.3-bp150.3.3.1.x86_64",
"SUSE Package Hub 15:lxcfs-hooks-lxc-3.0.3-bp150.3.3.1.noarch",
"SUSE Package Hub 15:pam_cgfs-3.1.0-bp150.5.3.1.aarch64",
"SUSE Package Hub 15:pam_cgfs-3.1.0-bp150.5.3.1.ppc64le",
"SUSE Package Hub 15:pam_cgfs-3.1.0-bp150.5.3.1.s390x",
"SUSE Package Hub 15:pam_cgfs-3.1.0-bp150.5.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-04-17T14:27:35Z",
"details": "moderate"
}
],
"title": "CVE-2018-6556"
},
{
"cve": "CVE-2019-5736",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5736"
}
],
"notes": [
{
"category": "general",
"text": "runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15:liblxc-devel-3.1.0-bp150.5.3.1.aarch64",
"SUSE Package Hub 15:liblxc-devel-3.1.0-bp150.5.3.1.ppc64le",
"SUSE Package Hub 15:liblxc-devel-3.1.0-bp150.5.3.1.s390x",
"SUSE Package Hub 15:liblxc-devel-3.1.0-bp150.5.3.1.x86_64",
"SUSE Package Hub 15:liblxc1-3.1.0-bp150.5.3.1.aarch64",
"SUSE Package Hub 15:liblxc1-3.1.0-bp150.5.3.1.ppc64le",
"SUSE Package Hub 15:liblxc1-3.1.0-bp150.5.3.1.s390x",
"SUSE Package Hub 15:liblxc1-3.1.0-bp150.5.3.1.x86_64",
"SUSE Package Hub 15:lxc-3.1.0-bp150.5.3.1.aarch64",
"SUSE Package Hub 15:lxc-3.1.0-bp150.5.3.1.ppc64le",
"SUSE Package Hub 15:lxc-3.1.0-bp150.5.3.1.s390x",
"SUSE Package Hub 15:lxc-3.1.0-bp150.5.3.1.x86_64",
"SUSE Package Hub 15:lxc-bash-completion-3.1.0-bp150.5.3.1.noarch",
"SUSE Package Hub 15:lxcfs-3.0.3-bp150.3.3.1.aarch64",
"SUSE Package Hub 15:lxcfs-3.0.3-bp150.3.3.1.ppc64le",
"SUSE Package Hub 15:lxcfs-3.0.3-bp150.3.3.1.s390x",
"SUSE Package Hub 15:lxcfs-3.0.3-bp150.3.3.1.x86_64",
"SUSE Package Hub 15:lxcfs-hooks-lxc-3.0.3-bp150.3.3.1.noarch",
"SUSE Package Hub 15:pam_cgfs-3.1.0-bp150.5.3.1.aarch64",
"SUSE Package Hub 15:pam_cgfs-3.1.0-bp150.5.3.1.ppc64le",
"SUSE Package Hub 15:pam_cgfs-3.1.0-bp150.5.3.1.s390x",
"SUSE Package Hub 15:pam_cgfs-3.1.0-bp150.5.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5736",
"url": "https://www.suse.com/security/cve/CVE-2019-5736"
},
{
"category": "external",
"summary": "SUSE Bug 1121967 for CVE-2019-5736",
"url": "https://bugzilla.suse.com/1121967"
},
{
"category": "external",
"summary": "SUSE Bug 1122185 for CVE-2019-5736",
"url": "https://bugzilla.suse.com/1122185"
},
{
"category": "external",
"summary": "SUSE Bug 1173421 for CVE-2019-5736",
"url": "https://bugzilla.suse.com/1173421"
},
{
"category": "external",
"summary": "SUSE Bug 1218894 for CVE-2019-5736",
"url": "https://bugzilla.suse.com/1218894"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15:liblxc-devel-3.1.0-bp150.5.3.1.aarch64",
"SUSE Package Hub 15:liblxc-devel-3.1.0-bp150.5.3.1.ppc64le",
"SUSE Package Hub 15:liblxc-devel-3.1.0-bp150.5.3.1.s390x",
"SUSE Package Hub 15:liblxc-devel-3.1.0-bp150.5.3.1.x86_64",
"SUSE Package Hub 15:liblxc1-3.1.0-bp150.5.3.1.aarch64",
"SUSE Package Hub 15:liblxc1-3.1.0-bp150.5.3.1.ppc64le",
"SUSE Package Hub 15:liblxc1-3.1.0-bp150.5.3.1.s390x",
"SUSE Package Hub 15:liblxc1-3.1.0-bp150.5.3.1.x86_64",
"SUSE Package Hub 15:lxc-3.1.0-bp150.5.3.1.aarch64",
"SUSE Package Hub 15:lxc-3.1.0-bp150.5.3.1.ppc64le",
"SUSE Package Hub 15:lxc-3.1.0-bp150.5.3.1.s390x",
"SUSE Package Hub 15:lxc-3.1.0-bp150.5.3.1.x86_64",
"SUSE Package Hub 15:lxc-bash-completion-3.1.0-bp150.5.3.1.noarch",
"SUSE Package Hub 15:lxcfs-3.0.3-bp150.3.3.1.aarch64",
"SUSE Package Hub 15:lxcfs-3.0.3-bp150.3.3.1.ppc64le",
"SUSE Package Hub 15:lxcfs-3.0.3-bp150.3.3.1.s390x",
"SUSE Package Hub 15:lxcfs-3.0.3-bp150.3.3.1.x86_64",
"SUSE Package Hub 15:lxcfs-hooks-lxc-3.0.3-bp150.3.3.1.noarch",
"SUSE Package Hub 15:pam_cgfs-3.1.0-bp150.5.3.1.aarch64",
"SUSE Package Hub 15:pam_cgfs-3.1.0-bp150.5.3.1.ppc64le",
"SUSE Package Hub 15:pam_cgfs-3.1.0-bp150.5.3.1.s390x",
"SUSE Package Hub 15:pam_cgfs-3.1.0-bp150.5.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Package Hub 15:liblxc-devel-3.1.0-bp150.5.3.1.aarch64",
"SUSE Package Hub 15:liblxc-devel-3.1.0-bp150.5.3.1.ppc64le",
"SUSE Package Hub 15:liblxc-devel-3.1.0-bp150.5.3.1.s390x",
"SUSE Package Hub 15:liblxc-devel-3.1.0-bp150.5.3.1.x86_64",
"SUSE Package Hub 15:liblxc1-3.1.0-bp150.5.3.1.aarch64",
"SUSE Package Hub 15:liblxc1-3.1.0-bp150.5.3.1.ppc64le",
"SUSE Package Hub 15:liblxc1-3.1.0-bp150.5.3.1.s390x",
"SUSE Package Hub 15:liblxc1-3.1.0-bp150.5.3.1.x86_64",
"SUSE Package Hub 15:lxc-3.1.0-bp150.5.3.1.aarch64",
"SUSE Package Hub 15:lxc-3.1.0-bp150.5.3.1.ppc64le",
"SUSE Package Hub 15:lxc-3.1.0-bp150.5.3.1.s390x",
"SUSE Package Hub 15:lxc-3.1.0-bp150.5.3.1.x86_64",
"SUSE Package Hub 15:lxc-bash-completion-3.1.0-bp150.5.3.1.noarch",
"SUSE Package Hub 15:lxcfs-3.0.3-bp150.3.3.1.aarch64",
"SUSE Package Hub 15:lxcfs-3.0.3-bp150.3.3.1.ppc64le",
"SUSE Package Hub 15:lxcfs-3.0.3-bp150.3.3.1.s390x",
"SUSE Package Hub 15:lxcfs-3.0.3-bp150.3.3.1.x86_64",
"SUSE Package Hub 15:lxcfs-hooks-lxc-3.0.3-bp150.3.3.1.noarch",
"SUSE Package Hub 15:pam_cgfs-3.1.0-bp150.5.3.1.aarch64",
"SUSE Package Hub 15:pam_cgfs-3.1.0-bp150.5.3.1.ppc64le",
"SUSE Package Hub 15:pam_cgfs-3.1.0-bp150.5.3.1.s390x",
"SUSE Package Hub 15:pam_cgfs-3.1.0-bp150.5.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-04-17T14:27:35Z",
"details": "moderate"
}
],
"title": "CVE-2019-5736"
}
]
}
OPENSUSE-SU-2019:1275-1
Vulnerability from csaf_opensuse - Published: 2019-04-25 13:56 - Updated: 2019-04-25 13:56Summary
Security update for lxc, lxcfs
Severity
Important
Notes
Title of the patch: Security update for lxc, lxcfs
Description of the patch: This update for lxc, lxcfs to version 3.1.0 fixes the following issues:
Security issues fixed:
- CVE-2019-5736: Fixed a container breakout vulnerability (boo#1122185).
- CVE-2018-6556: Enable setuid bit on lxc-user-nic (boo#988348).
Non-security issues fixed:
- Update to LXC 3.1.0. The changelog is far too long to include here, please
look at https://linuxcontainers.org/. (boo#1131762)
Patchnames: openSUSE-2019-1275
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
5.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for lxc, lxcfs",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for lxc, lxcfs to version 3.1.0 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-5736: Fixed a container breakout vulnerability (boo#1122185).\n- CVE-2018-6556: Enable setuid bit on lxc-user-nic (boo#988348).\n\nNon-security issues fixed:\n\n- Update to LXC 3.1.0. The changelog is far too long to include here, please\n look at https://linuxcontainers.org/. (boo#1131762)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2019-1275",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_1275-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2019:1275-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BJSZ5D42JWJHGJ7ILFBWQ7TUHJTZDYJB/#BJSZ5D42JWJHGJ7ILFBWQ7TUHJTZDYJB"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2019:1275-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BJSZ5D42JWJHGJ7ILFBWQ7TUHJTZDYJB/#BJSZ5D42JWJHGJ7ILFBWQ7TUHJTZDYJB"
},
{
"category": "self",
"summary": "SUSE Bug 1122185",
"url": "https://bugzilla.suse.com/1122185"
},
{
"category": "self",
"summary": "SUSE Bug 1131762",
"url": "https://bugzilla.suse.com/1131762"
},
{
"category": "self",
"summary": "SUSE Bug 988348",
"url": "https://bugzilla.suse.com/988348"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-6556 page",
"url": "https://www.suse.com/security/cve/CVE-2018-6556/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5736 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5736/"
}
],
"title": "Security update for lxc, lxcfs",
"tracking": {
"current_release_date": "2019-04-25T13:56:14Z",
"generator": {
"date": "2019-04-25T13:56:14Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2019:1275-1",
"initial_release_date": "2019-04-25T13:56:14Z",
"revision_history": [
{
"date": "2019-04-25T13:56:14Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "lxc-bash-completion-3.1.0-lp150.2.10.1.noarch",
"product": {
"name": "lxc-bash-completion-3.1.0-lp150.2.10.1.noarch",
"product_id": "lxc-bash-completion-3.1.0-lp150.2.10.1.noarch"
}
},
{
"category": "product_version",
"name": "lxcfs-hooks-lxc-3.0.3-lp150.2.3.1.noarch",
"product": {
"name": "lxcfs-hooks-lxc-3.0.3-lp150.2.3.1.noarch",
"product_id": "lxcfs-hooks-lxc-3.0.3-lp150.2.3.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "liblxc-devel-3.1.0-lp150.2.10.1.x86_64",
"product": {
"name": "liblxc-devel-3.1.0-lp150.2.10.1.x86_64",
"product_id": "liblxc-devel-3.1.0-lp150.2.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "liblxc1-3.1.0-lp150.2.10.1.x86_64",
"product": {
"name": "liblxc1-3.1.0-lp150.2.10.1.x86_64",
"product_id": "liblxc1-3.1.0-lp150.2.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "lxc-3.1.0-lp150.2.10.1.x86_64",
"product": {
"name": "lxc-3.1.0-lp150.2.10.1.x86_64",
"product_id": "lxc-3.1.0-lp150.2.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "lxcfs-3.0.3-lp150.2.3.1.x86_64",
"product": {
"name": "lxcfs-3.0.3-lp150.2.3.1.x86_64",
"product_id": "lxcfs-3.0.3-lp150.2.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "pam_cgfs-3.1.0-lp150.2.10.1.x86_64",
"product": {
"name": "pam_cgfs-3.1.0-lp150.2.10.1.x86_64",
"product_id": "pam_cgfs-3.1.0-lp150.2.10.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.0",
"product": {
"name": "openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "liblxc-devel-3.1.0-lp150.2.10.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:liblxc-devel-3.1.0-lp150.2.10.1.x86_64"
},
"product_reference": "liblxc-devel-3.1.0-lp150.2.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "liblxc1-3.1.0-lp150.2.10.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:liblxc1-3.1.0-lp150.2.10.1.x86_64"
},
"product_reference": "liblxc1-3.1.0-lp150.2.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lxc-3.1.0-lp150.2.10.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:lxc-3.1.0-lp150.2.10.1.x86_64"
},
"product_reference": "lxc-3.1.0-lp150.2.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lxc-bash-completion-3.1.0-lp150.2.10.1.noarch as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:lxc-bash-completion-3.1.0-lp150.2.10.1.noarch"
},
"product_reference": "lxc-bash-completion-3.1.0-lp150.2.10.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lxcfs-3.0.3-lp150.2.3.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:lxcfs-3.0.3-lp150.2.3.1.x86_64"
},
"product_reference": "lxcfs-3.0.3-lp150.2.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lxcfs-hooks-lxc-3.0.3-lp150.2.3.1.noarch as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:lxcfs-hooks-lxc-3.0.3-lp150.2.3.1.noarch"
},
"product_reference": "lxcfs-hooks-lxc-3.0.3-lp150.2.3.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_cgfs-3.1.0-lp150.2.10.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:pam_cgfs-3.1.0-lp150.2.10.1.x86_64"
},
"product_reference": "pam_cgfs-3.1.0-lp150.2.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-6556",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-6556"
}
],
"notes": [
{
"category": "general",
"text": "lxc-user-nic when asked to delete a network interface will unconditionally open a user provided path. This code path may be used by an unprivileged user to check for the existence of a path which they wouldn\u0027t otherwise be able to reach. It may also be used to trigger side effects by causing a (read-only) open of special kernel files (ptmx, proc, sys). Affected releases are LXC: 2.0 versions above and including 2.0.9; 3.0 versions above and including 3.0.0, prior to 3.0.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:liblxc-devel-3.1.0-lp150.2.10.1.x86_64",
"openSUSE Leap 15.0:liblxc1-3.1.0-lp150.2.10.1.x86_64",
"openSUSE Leap 15.0:lxc-3.1.0-lp150.2.10.1.x86_64",
"openSUSE Leap 15.0:lxc-bash-completion-3.1.0-lp150.2.10.1.noarch",
"openSUSE Leap 15.0:lxcfs-3.0.3-lp150.2.3.1.x86_64",
"openSUSE Leap 15.0:lxcfs-hooks-lxc-3.0.3-lp150.2.3.1.noarch",
"openSUSE Leap 15.0:pam_cgfs-3.1.0-lp150.2.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-6556",
"url": "https://www.suse.com/security/cve/CVE-2018-6556"
},
{
"category": "external",
"summary": "SUSE Bug 1122185 for CVE-2018-6556",
"url": "https://bugzilla.suse.com/1122185"
},
{
"category": "external",
"summary": "SUSE Bug 1206779 for CVE-2018-6556",
"url": "https://bugzilla.suse.com/1206779"
},
{
"category": "external",
"summary": "SUSE Bug 988348 for CVE-2018-6556",
"url": "https://bugzilla.suse.com/988348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:liblxc-devel-3.1.0-lp150.2.10.1.x86_64",
"openSUSE Leap 15.0:liblxc1-3.1.0-lp150.2.10.1.x86_64",
"openSUSE Leap 15.0:lxc-3.1.0-lp150.2.10.1.x86_64",
"openSUSE Leap 15.0:lxc-bash-completion-3.1.0-lp150.2.10.1.noarch",
"openSUSE Leap 15.0:lxcfs-3.0.3-lp150.2.3.1.x86_64",
"openSUSE Leap 15.0:lxcfs-hooks-lxc-3.0.3-lp150.2.3.1.noarch",
"openSUSE Leap 15.0:pam_cgfs-3.1.0-lp150.2.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:liblxc-devel-3.1.0-lp150.2.10.1.x86_64",
"openSUSE Leap 15.0:liblxc1-3.1.0-lp150.2.10.1.x86_64",
"openSUSE Leap 15.0:lxc-3.1.0-lp150.2.10.1.x86_64",
"openSUSE Leap 15.0:lxc-bash-completion-3.1.0-lp150.2.10.1.noarch",
"openSUSE Leap 15.0:lxcfs-3.0.3-lp150.2.3.1.x86_64",
"openSUSE Leap 15.0:lxcfs-hooks-lxc-3.0.3-lp150.2.3.1.noarch",
"openSUSE Leap 15.0:pam_cgfs-3.1.0-lp150.2.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-04-25T13:56:14Z",
"details": "moderate"
}
],
"title": "CVE-2018-6556"
},
{
"cve": "CVE-2019-5736",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5736"
}
],
"notes": [
{
"category": "general",
"text": "runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:liblxc-devel-3.1.0-lp150.2.10.1.x86_64",
"openSUSE Leap 15.0:liblxc1-3.1.0-lp150.2.10.1.x86_64",
"openSUSE Leap 15.0:lxc-3.1.0-lp150.2.10.1.x86_64",
"openSUSE Leap 15.0:lxc-bash-completion-3.1.0-lp150.2.10.1.noarch",
"openSUSE Leap 15.0:lxcfs-3.0.3-lp150.2.3.1.x86_64",
"openSUSE Leap 15.0:lxcfs-hooks-lxc-3.0.3-lp150.2.3.1.noarch",
"openSUSE Leap 15.0:pam_cgfs-3.1.0-lp150.2.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5736",
"url": "https://www.suse.com/security/cve/CVE-2019-5736"
},
{
"category": "external",
"summary": "SUSE Bug 1121967 for CVE-2019-5736",
"url": "https://bugzilla.suse.com/1121967"
},
{
"category": "external",
"summary": "SUSE Bug 1122185 for CVE-2019-5736",
"url": "https://bugzilla.suse.com/1122185"
},
{
"category": "external",
"summary": "SUSE Bug 1173421 for CVE-2019-5736",
"url": "https://bugzilla.suse.com/1173421"
},
{
"category": "external",
"summary": "SUSE Bug 1218894 for CVE-2019-5736",
"url": "https://bugzilla.suse.com/1218894"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:liblxc-devel-3.1.0-lp150.2.10.1.x86_64",
"openSUSE Leap 15.0:liblxc1-3.1.0-lp150.2.10.1.x86_64",
"openSUSE Leap 15.0:lxc-3.1.0-lp150.2.10.1.x86_64",
"openSUSE Leap 15.0:lxc-bash-completion-3.1.0-lp150.2.10.1.noarch",
"openSUSE Leap 15.0:lxcfs-3.0.3-lp150.2.3.1.x86_64",
"openSUSE Leap 15.0:lxcfs-hooks-lxc-3.0.3-lp150.2.3.1.noarch",
"openSUSE Leap 15.0:pam_cgfs-3.1.0-lp150.2.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:liblxc-devel-3.1.0-lp150.2.10.1.x86_64",
"openSUSE Leap 15.0:liblxc1-3.1.0-lp150.2.10.1.x86_64",
"openSUSE Leap 15.0:lxc-3.1.0-lp150.2.10.1.x86_64",
"openSUSE Leap 15.0:lxc-bash-completion-3.1.0-lp150.2.10.1.noarch",
"openSUSE Leap 15.0:lxcfs-3.0.3-lp150.2.3.1.x86_64",
"openSUSE Leap 15.0:lxcfs-hooks-lxc-3.0.3-lp150.2.3.1.noarch",
"openSUSE Leap 15.0:pam_cgfs-3.1.0-lp150.2.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-04-25T13:56:14Z",
"details": "moderate"
}
],
"title": "CVE-2019-5736"
}
]
}
OPENSUSE-SU-2024:11030-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Summary
liblxc-devel-4.0.9-1.1 on GA media
Severity
Moderate
Notes
Title of the patch: liblxc-devel-4.0.9-1.1 on GA media
Description of the patch: These are all security issues fixed in the liblxc-devel-4.0.9-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2024-11030
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "liblxc-devel-4.0.9-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the liblxc-devel-4.0.9-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11030",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11030-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5985 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5985/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-6556 page",
"url": "https://www.suse.com/security/cve/CVE-2018-6556/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5736 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5736/"
}
],
"title": "liblxc-devel-4.0.9-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11030-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "liblxc-devel-4.0.9-1.1.aarch64",
"product": {
"name": "liblxc-devel-4.0.9-1.1.aarch64",
"product_id": "liblxc-devel-4.0.9-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "liblxc1-4.0.9-1.1.aarch64",
"product": {
"name": "liblxc1-4.0.9-1.1.aarch64",
"product_id": "liblxc1-4.0.9-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "lxc-4.0.9-1.1.aarch64",
"product": {
"name": "lxc-4.0.9-1.1.aarch64",
"product_id": "lxc-4.0.9-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "lxc-bash-completion-4.0.9-1.1.aarch64",
"product": {
"name": "lxc-bash-completion-4.0.9-1.1.aarch64",
"product_id": "lxc-bash-completion-4.0.9-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "pam_cgfs-4.0.9-1.1.aarch64",
"product": {
"name": "pam_cgfs-4.0.9-1.1.aarch64",
"product_id": "pam_cgfs-4.0.9-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "liblxc-devel-4.0.9-1.1.ppc64le",
"product": {
"name": "liblxc-devel-4.0.9-1.1.ppc64le",
"product_id": "liblxc-devel-4.0.9-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "liblxc1-4.0.9-1.1.ppc64le",
"product": {
"name": "liblxc1-4.0.9-1.1.ppc64le",
"product_id": "liblxc1-4.0.9-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "lxc-4.0.9-1.1.ppc64le",
"product": {
"name": "lxc-4.0.9-1.1.ppc64le",
"product_id": "lxc-4.0.9-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "lxc-bash-completion-4.0.9-1.1.ppc64le",
"product": {
"name": "lxc-bash-completion-4.0.9-1.1.ppc64le",
"product_id": "lxc-bash-completion-4.0.9-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "pam_cgfs-4.0.9-1.1.ppc64le",
"product": {
"name": "pam_cgfs-4.0.9-1.1.ppc64le",
"product_id": "pam_cgfs-4.0.9-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "liblxc-devel-4.0.9-1.1.s390x",
"product": {
"name": "liblxc-devel-4.0.9-1.1.s390x",
"product_id": "liblxc-devel-4.0.9-1.1.s390x"
}
},
{
"category": "product_version",
"name": "liblxc1-4.0.9-1.1.s390x",
"product": {
"name": "liblxc1-4.0.9-1.1.s390x",
"product_id": "liblxc1-4.0.9-1.1.s390x"
}
},
{
"category": "product_version",
"name": "lxc-4.0.9-1.1.s390x",
"product": {
"name": "lxc-4.0.9-1.1.s390x",
"product_id": "lxc-4.0.9-1.1.s390x"
}
},
{
"category": "product_version",
"name": "lxc-bash-completion-4.0.9-1.1.s390x",
"product": {
"name": "lxc-bash-completion-4.0.9-1.1.s390x",
"product_id": "lxc-bash-completion-4.0.9-1.1.s390x"
}
},
{
"category": "product_version",
"name": "pam_cgfs-4.0.9-1.1.s390x",
"product": {
"name": "pam_cgfs-4.0.9-1.1.s390x",
"product_id": "pam_cgfs-4.0.9-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "liblxc-devel-4.0.9-1.1.x86_64",
"product": {
"name": "liblxc-devel-4.0.9-1.1.x86_64",
"product_id": "liblxc-devel-4.0.9-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "liblxc1-4.0.9-1.1.x86_64",
"product": {
"name": "liblxc1-4.0.9-1.1.x86_64",
"product_id": "liblxc1-4.0.9-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "lxc-4.0.9-1.1.x86_64",
"product": {
"name": "lxc-4.0.9-1.1.x86_64",
"product_id": "lxc-4.0.9-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "lxc-bash-completion-4.0.9-1.1.x86_64",
"product": {
"name": "lxc-bash-completion-4.0.9-1.1.x86_64",
"product_id": "lxc-bash-completion-4.0.9-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "pam_cgfs-4.0.9-1.1.x86_64",
"product": {
"name": "pam_cgfs-4.0.9-1.1.x86_64",
"product_id": "pam_cgfs-4.0.9-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "liblxc-devel-4.0.9-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:liblxc-devel-4.0.9-1.1.aarch64"
},
"product_reference": "liblxc-devel-4.0.9-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "liblxc-devel-4.0.9-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:liblxc-devel-4.0.9-1.1.ppc64le"
},
"product_reference": "liblxc-devel-4.0.9-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "liblxc-devel-4.0.9-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:liblxc-devel-4.0.9-1.1.s390x"
},
"product_reference": "liblxc-devel-4.0.9-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "liblxc-devel-4.0.9-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:liblxc-devel-4.0.9-1.1.x86_64"
},
"product_reference": "liblxc-devel-4.0.9-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "liblxc1-4.0.9-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:liblxc1-4.0.9-1.1.aarch64"
},
"product_reference": "liblxc1-4.0.9-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "liblxc1-4.0.9-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:liblxc1-4.0.9-1.1.ppc64le"
},
"product_reference": "liblxc1-4.0.9-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "liblxc1-4.0.9-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:liblxc1-4.0.9-1.1.s390x"
},
"product_reference": "liblxc1-4.0.9-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "liblxc1-4.0.9-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:liblxc1-4.0.9-1.1.x86_64"
},
"product_reference": "liblxc1-4.0.9-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lxc-4.0.9-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lxc-4.0.9-1.1.aarch64"
},
"product_reference": "lxc-4.0.9-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lxc-4.0.9-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lxc-4.0.9-1.1.ppc64le"
},
"product_reference": "lxc-4.0.9-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lxc-4.0.9-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lxc-4.0.9-1.1.s390x"
},
"product_reference": "lxc-4.0.9-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lxc-4.0.9-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lxc-4.0.9-1.1.x86_64"
},
"product_reference": "lxc-4.0.9-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lxc-bash-completion-4.0.9-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lxc-bash-completion-4.0.9-1.1.aarch64"
},
"product_reference": "lxc-bash-completion-4.0.9-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lxc-bash-completion-4.0.9-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lxc-bash-completion-4.0.9-1.1.ppc64le"
},
"product_reference": "lxc-bash-completion-4.0.9-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lxc-bash-completion-4.0.9-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lxc-bash-completion-4.0.9-1.1.s390x"
},
"product_reference": "lxc-bash-completion-4.0.9-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lxc-bash-completion-4.0.9-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lxc-bash-completion-4.0.9-1.1.x86_64"
},
"product_reference": "lxc-bash-completion-4.0.9-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_cgfs-4.0.9-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pam_cgfs-4.0.9-1.1.aarch64"
},
"product_reference": "pam_cgfs-4.0.9-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_cgfs-4.0.9-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pam_cgfs-4.0.9-1.1.ppc64le"
},
"product_reference": "pam_cgfs-4.0.9-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_cgfs-4.0.9-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pam_cgfs-4.0.9-1.1.s390x"
},
"product_reference": "pam_cgfs-4.0.9-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pam_cgfs-4.0.9-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:pam_cgfs-4.0.9-1.1.x86_64"
},
"product_reference": "pam_cgfs-4.0.9-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5985",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5985"
}
],
"notes": [
{
"category": "general",
"text": "lxc-user-nic in Linux Containers (LXC) allows local users with a lxc-usernet allocation to create network interfaces on the host and choose the name of those interfaces by leveraging lack of netns ownership check.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:liblxc-devel-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:liblxc-devel-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:liblxc-devel-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:liblxc-devel-4.0.9-1.1.x86_64",
"openSUSE Tumbleweed:liblxc1-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:liblxc1-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:liblxc1-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:liblxc1-4.0.9-1.1.x86_64",
"openSUSE Tumbleweed:lxc-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:lxc-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:lxc-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:lxc-4.0.9-1.1.x86_64",
"openSUSE Tumbleweed:lxc-bash-completion-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:lxc-bash-completion-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:lxc-bash-completion-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:lxc-bash-completion-4.0.9-1.1.x86_64",
"openSUSE Tumbleweed:pam_cgfs-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:pam_cgfs-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:pam_cgfs-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:pam_cgfs-4.0.9-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5985",
"url": "https://www.suse.com/security/cve/CVE-2017-5985"
},
{
"category": "external",
"summary": "SUSE Bug 1028264 for CVE-2017-5985",
"url": "https://bugzilla.suse.com/1028264"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:liblxc-devel-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:liblxc-devel-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:liblxc-devel-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:liblxc-devel-4.0.9-1.1.x86_64",
"openSUSE Tumbleweed:liblxc1-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:liblxc1-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:liblxc1-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:liblxc1-4.0.9-1.1.x86_64",
"openSUSE Tumbleweed:lxc-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:lxc-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:lxc-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:lxc-4.0.9-1.1.x86_64",
"openSUSE Tumbleweed:lxc-bash-completion-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:lxc-bash-completion-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:lxc-bash-completion-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:lxc-bash-completion-4.0.9-1.1.x86_64",
"openSUSE Tumbleweed:pam_cgfs-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:pam_cgfs-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:pam_cgfs-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:pam_cgfs-4.0.9-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:liblxc-devel-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:liblxc-devel-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:liblxc-devel-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:liblxc-devel-4.0.9-1.1.x86_64",
"openSUSE Tumbleweed:liblxc1-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:liblxc1-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:liblxc1-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:liblxc1-4.0.9-1.1.x86_64",
"openSUSE Tumbleweed:lxc-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:lxc-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:lxc-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:lxc-4.0.9-1.1.x86_64",
"openSUSE Tumbleweed:lxc-bash-completion-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:lxc-bash-completion-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:lxc-bash-completion-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:lxc-bash-completion-4.0.9-1.1.x86_64",
"openSUSE Tumbleweed:pam_cgfs-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:pam_cgfs-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:pam_cgfs-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:pam_cgfs-4.0.9-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-5985"
},
{
"cve": "CVE-2018-6556",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-6556"
}
],
"notes": [
{
"category": "general",
"text": "lxc-user-nic when asked to delete a network interface will unconditionally open a user provided path. This code path may be used by an unprivileged user to check for the existence of a path which they wouldn\u0027t otherwise be able to reach. It may also be used to trigger side effects by causing a (read-only) open of special kernel files (ptmx, proc, sys). Affected releases are LXC: 2.0 versions above and including 2.0.9; 3.0 versions above and including 3.0.0, prior to 3.0.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:liblxc-devel-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:liblxc-devel-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:liblxc-devel-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:liblxc-devel-4.0.9-1.1.x86_64",
"openSUSE Tumbleweed:liblxc1-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:liblxc1-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:liblxc1-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:liblxc1-4.0.9-1.1.x86_64",
"openSUSE Tumbleweed:lxc-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:lxc-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:lxc-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:lxc-4.0.9-1.1.x86_64",
"openSUSE Tumbleweed:lxc-bash-completion-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:lxc-bash-completion-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:lxc-bash-completion-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:lxc-bash-completion-4.0.9-1.1.x86_64",
"openSUSE Tumbleweed:pam_cgfs-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:pam_cgfs-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:pam_cgfs-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:pam_cgfs-4.0.9-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-6556",
"url": "https://www.suse.com/security/cve/CVE-2018-6556"
},
{
"category": "external",
"summary": "SUSE Bug 1122185 for CVE-2018-6556",
"url": "https://bugzilla.suse.com/1122185"
},
{
"category": "external",
"summary": "SUSE Bug 1206779 for CVE-2018-6556",
"url": "https://bugzilla.suse.com/1206779"
},
{
"category": "external",
"summary": "SUSE Bug 988348 for CVE-2018-6556",
"url": "https://bugzilla.suse.com/988348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:liblxc-devel-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:liblxc-devel-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:liblxc-devel-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:liblxc-devel-4.0.9-1.1.x86_64",
"openSUSE Tumbleweed:liblxc1-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:liblxc1-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:liblxc1-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:liblxc1-4.0.9-1.1.x86_64",
"openSUSE Tumbleweed:lxc-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:lxc-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:lxc-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:lxc-4.0.9-1.1.x86_64",
"openSUSE Tumbleweed:lxc-bash-completion-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:lxc-bash-completion-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:lxc-bash-completion-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:lxc-bash-completion-4.0.9-1.1.x86_64",
"openSUSE Tumbleweed:pam_cgfs-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:pam_cgfs-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:pam_cgfs-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:pam_cgfs-4.0.9-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:liblxc-devel-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:liblxc-devel-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:liblxc-devel-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:liblxc-devel-4.0.9-1.1.x86_64",
"openSUSE Tumbleweed:liblxc1-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:liblxc1-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:liblxc1-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:liblxc1-4.0.9-1.1.x86_64",
"openSUSE Tumbleweed:lxc-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:lxc-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:lxc-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:lxc-4.0.9-1.1.x86_64",
"openSUSE Tumbleweed:lxc-bash-completion-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:lxc-bash-completion-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:lxc-bash-completion-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:lxc-bash-completion-4.0.9-1.1.x86_64",
"openSUSE Tumbleweed:pam_cgfs-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:pam_cgfs-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:pam_cgfs-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:pam_cgfs-4.0.9-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-6556"
},
{
"cve": "CVE-2019-5736",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5736"
}
],
"notes": [
{
"category": "general",
"text": "runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:liblxc-devel-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:liblxc-devel-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:liblxc-devel-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:liblxc-devel-4.0.9-1.1.x86_64",
"openSUSE Tumbleweed:liblxc1-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:liblxc1-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:liblxc1-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:liblxc1-4.0.9-1.1.x86_64",
"openSUSE Tumbleweed:lxc-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:lxc-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:lxc-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:lxc-4.0.9-1.1.x86_64",
"openSUSE Tumbleweed:lxc-bash-completion-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:lxc-bash-completion-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:lxc-bash-completion-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:lxc-bash-completion-4.0.9-1.1.x86_64",
"openSUSE Tumbleweed:pam_cgfs-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:pam_cgfs-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:pam_cgfs-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:pam_cgfs-4.0.9-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5736",
"url": "https://www.suse.com/security/cve/CVE-2019-5736"
},
{
"category": "external",
"summary": "SUSE Bug 1121967 for CVE-2019-5736",
"url": "https://bugzilla.suse.com/1121967"
},
{
"category": "external",
"summary": "SUSE Bug 1122185 for CVE-2019-5736",
"url": "https://bugzilla.suse.com/1122185"
},
{
"category": "external",
"summary": "SUSE Bug 1173421 for CVE-2019-5736",
"url": "https://bugzilla.suse.com/1173421"
},
{
"category": "external",
"summary": "SUSE Bug 1218894 for CVE-2019-5736",
"url": "https://bugzilla.suse.com/1218894"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:liblxc-devel-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:liblxc-devel-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:liblxc-devel-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:liblxc-devel-4.0.9-1.1.x86_64",
"openSUSE Tumbleweed:liblxc1-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:liblxc1-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:liblxc1-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:liblxc1-4.0.9-1.1.x86_64",
"openSUSE Tumbleweed:lxc-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:lxc-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:lxc-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:lxc-4.0.9-1.1.x86_64",
"openSUSE Tumbleweed:lxc-bash-completion-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:lxc-bash-completion-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:lxc-bash-completion-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:lxc-bash-completion-4.0.9-1.1.x86_64",
"openSUSE Tumbleweed:pam_cgfs-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:pam_cgfs-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:pam_cgfs-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:pam_cgfs-4.0.9-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:liblxc-devel-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:liblxc-devel-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:liblxc-devel-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:liblxc-devel-4.0.9-1.1.x86_64",
"openSUSE Tumbleweed:liblxc1-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:liblxc1-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:liblxc1-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:liblxc1-4.0.9-1.1.x86_64",
"openSUSE Tumbleweed:lxc-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:lxc-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:lxc-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:lxc-4.0.9-1.1.x86_64",
"openSUSE Tumbleweed:lxc-bash-completion-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:lxc-bash-completion-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:lxc-bash-completion-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:lxc-bash-completion-4.0.9-1.1.x86_64",
"openSUSE Tumbleweed:pam_cgfs-4.0.9-1.1.aarch64",
"openSUSE Tumbleweed:pam_cgfs-4.0.9-1.1.ppc64le",
"openSUSE Tumbleweed:pam_cgfs-4.0.9-1.1.s390x",
"openSUSE Tumbleweed:pam_cgfs-4.0.9-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-5736"
}
]
}
GHSA-XG68-6JXG-5W7P
Vulnerability from github – Published: 2022-05-14 00:59 – Updated: 2022-05-14 00:59
VLAI?
Details
lxc-user-nic when asked to delete a network interface will unconditionally open a user provided path. This code path may be used by an unprivileged user to check for the existence of a path which they wouldn't otherwise be able to reach. It may also be used to trigger side effects by causing a (read-only) open of special kernel files (ptmx, proc, sys). Affected releases are LXC: 2.0 versions above and including 2.0.9; 3.0 versions above and including 3.0.0, prior to 3.0.2.
Severity ?
{
"affected": [],
"aliases": [
"CVE-2018-6556"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2018-08-10T15:29:00Z",
"severity": "LOW"
},
"details": "lxc-user-nic when asked to delete a network interface will unconditionally open a user provided path. This code path may be used by an unprivileged user to check for the existence of a path which they wouldn\u0027t otherwise be able to reach. It may also be used to trigger side effects by causing a (read-only) open of special kernel files (ptmx, proc, sys). Affected releases are LXC: 2.0 versions above and including 2.0.9; 3.0 versions above and including 3.0.0, prior to 3.0.2.",
"id": "GHSA-xg68-6jxg-5w7p",
"modified": "2022-05-14T00:59:46Z",
"published": "2022-05-14T00:59:46Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-6556"
},
{
"type": "WEB",
"url": "https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1783591"
},
{
"type": "WEB",
"url": "https://bugzilla.suse.com/show_bug.cgi?id=988348"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/201808-02"
},
{
"type": "WEB",
"url": "https://usn.ubuntu.com/usn/usn-3730-1"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00074.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00076.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00091.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00073.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"type": "CVSS_V3"
}
]
}
GSD-2018-6556
Vulnerability from gsd - Updated: 2023-12-13 01:22Details
lxc-user-nic when asked to delete a network interface will unconditionally open a user provided path. This code path may be used by an unprivileged user to check for the existence of a path which they wouldn't otherwise be able to reach. It may also be used to trigger side effects by causing a (read-only) open of special kernel files (ptmx, proc, sys). Affected releases are LXC: 2.0 versions above and including 2.0.9; 3.0 versions above and including 3.0.0, prior to 3.0.2.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2018-6556",
"description": "lxc-user-nic when asked to delete a network interface will unconditionally open a user provided path. This code path may be used by an unprivileged user to check for the existence of a path which they wouldn\u0027t otherwise be able to reach. It may also be used to trigger side effects by causing a (read-only) open of special kernel files (ptmx, proc, sys). Affected releases are LXC: 2.0 versions above and including 2.0.9; 3.0 versions above and including 3.0.0, prior to 3.0.2.",
"id": "GSD-2018-6556",
"references": [
"https://www.suse.com/security/cve/CVE-2018-6556.html",
"https://ubuntu.com/security/CVE-2018-6556",
"https://security.archlinux.org/CVE-2018-6556"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2018-6556"
],
"details": "lxc-user-nic when asked to delete a network interface will unconditionally open a user provided path. This code path may be used by an unprivileged user to check for the existence of a path which they wouldn\u0027t otherwise be able to reach. It may also be used to trigger side effects by causing a (read-only) open of special kernel files (ptmx, proc, sys). Affected releases are LXC: 2.0 versions above and including 2.0.9; 3.0 versions above and including 3.0.0, prior to 3.0.2.",
"id": "GSD-2018-6556",
"modified": "2023-12-13T01:22:35.787394Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@ubuntu.com",
"DATE_PUBLIC": "2018-08-06T16:00:00.000Z",
"ID": "CVE-2018-6556",
"STATE": "PUBLIC",
"TITLE": "The lxc-user-nic component of LXC allows unprivileged users to open arbitrary files"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "LXC",
"version": {
"version_data": [
{
"affected": "\u003e=",
"version_name": "2.0",
"version_value": "2.0.9"
},
{
"affected": "\u003e=",
"version_name": "3.0",
"version_value": "3.0.0"
},
{
"affected": "\u003c",
"version_name": "3.0",
"version_value": "3.0.2"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Matthias Gerstner from SUSE"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "lxc-user-nic when asked to delete a network interface will unconditionally open a user provided path. This code path may be used by an unprivileged user to check for the existence of a path which they wouldn\u0027t otherwise be able to reach. It may also be used to trigger side effects by causing a (read-only) open of special kernel files (ptmx, proc, sys). Affected releases are LXC: 2.0 versions above and including 2.0.9; 3.0 versions above and including 3.0.0, prior to 3.0.2."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Incorrect access control"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "USN-3730-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/usn/usn-3730-1"
},
{
"name": "https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1783591",
"refsource": "CONFIRM",
"url": "https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1783591"
},
{
"name": "GLSA-201808-02",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201808-02"
},
{
"name": "https://bugzilla.suse.com/show_bug.cgi?id=988348",
"refsource": "CONFIRM",
"url": "https://bugzilla.suse.com/show_bug.cgi?id=988348"
},
{
"name": "openSUSE-SU-2019:1227",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00074.html"
},
{
"name": "openSUSE-SU-2019:1230",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00076.html"
},
{
"name": "openSUSE-SU-2019:1275",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00091.html"
},
{
"name": "openSUSE-SU-2019:1481",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00073.html"
}
]
},
"source": {
"advisory": "USN-3730-1",
"defect": [
"1783591"
],
"discovery": "EXTERNAL"
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:linuxcontainers:lxc:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.0.2",
"versionStartIncluding": "3.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:linuxcontainers:lxc:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.0.9",
"versionStartIncluding": "2.0.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:ltss:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:suse:caas_platform:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:suse:openstack_cloud:6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:suse:caas_platform:1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security@ubuntu.com",
"ID": "CVE-2018-6556"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "lxc-user-nic when asked to delete a network interface will unconditionally open a user provided path. This code path may be used by an unprivileged user to check for the existence of a path which they wouldn\u0027t otherwise be able to reach. It may also be used to trigger side effects by causing a (read-only) open of special kernel files (ptmx, proc, sys). Affected releases are LXC: 2.0 versions above and including 2.0.9; 3.0 versions above and including 3.0.0, prior to 3.0.2."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-417"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "USN-3730-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/usn/usn-3730-1"
},
{
"name": "https://bugzilla.suse.com/show_bug.cgi?id=988348",
"refsource": "CONFIRM",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://bugzilla.suse.com/show_bug.cgi?id=988348"
},
{
"name": "https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1783591",
"refsource": "CONFIRM",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1783591"
},
{
"name": "GLSA-201808-02",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201808-02"
},
{
"name": "openSUSE-SU-2019:1227",
"refsource": "SUSE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00074.html"
},
{
"name": "openSUSE-SU-2019:1230",
"refsource": "SUSE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00076.html"
},
{
"name": "openSUSE-SU-2019:1275",
"refsource": "SUSE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00091.html"
},
{
"name": "openSUSE-SU-2019:1481",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00073.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
},
"lastModifiedDate": "2019-05-31T21:29Z",
"publishedDate": "2018-08-10T15:29Z"
}
}
}
Loading…
Show additional events:
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…