CVE-2018-6556

NameCVE-2018-6556
Descriptionlxc-user-nic when asked to delete a network interface will unconditionally open a user provided path. This code path may be used by an unprivileged user to check for the existence of a path which they wouldn't otherwise be able to reach. It may also be used to trigger side effects by causing a (read-only) open of special kernel files (ptmx, proc, sys). Affected releases are LXC: 2.0 versions above and including 2.0.9; 3.0 versions above and including 3.0.0, prior to 3.0.2.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitylow (attack range: local)
Debian Bugs905586

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
lxc (PTS)jessie1:1.0.6-6+deb8u6fixed
jessie (security)1:1.0.6-6+deb8u2fixed
stretch1:2.0.7-2+deb9u2fixed
buster, sid1:3.1.0+really3.0.3-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
lxcsource(unstable)1:2.0.9-6.1low905586
lxcsourcejessie(not affected)
lxcsourcestretch(not affected)

Notes

[stretch] - lxc <not-affected> (Vulnerable code introduced later)
[jessie] - lxc <not-affected> (Vulnerable code introduced later)
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/1783591
Prerequisite: https://github.com/lxc/lxc/commit/f96f5f3c1341e73ee51c8b49bef4ba571c562d8c
Fixed by: https://github.com/lxc/lxc/commit/5eb45428b312e978fb9e294dde16efb14dd9fa4d

Search for package or bug name: Reporting problems