ID CVE-2018-6556
Summary lxc-user-nic when asked to delete a network interface will unconditionally open a user provided path. This code path may be used by an unprivileged user to check for the existence of a path which they wouldn't otherwise be able to reach. It may also be used to trigger side effects by causing a (read-only) open of special kernel files (ptmx, proc, sys). Affected releases are LXC: 2.0 versions above and including 2.0.9; 3.0 versions above and including 3.0.0, prior to 3.0.2.
References
Vulnerable Configurations
  • cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
  • cpe:2.3:a:linuxcontainers:lxc:2.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:linuxcontainers:lxc:2.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:linuxcontainers:lxc:2.0.0:-:*:*:*:*:*:*
    cpe:2.3:a:linuxcontainers:lxc:2.0.0:-:*:*:*:*:*:*
  • cpe:2.3:a:linuxcontainers:lxc:2.0.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:linuxcontainers:lxc:2.0.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:linuxcontainers:lxc:2.0.0:rc10:*:*:*:*:*:*
    cpe:2.3:a:linuxcontainers:lxc:2.0.0:rc10:*:*:*:*:*:*
  • cpe:2.3:a:linuxcontainers:lxc:2.0.0:rc11:*:*:*:*:*:*
    cpe:2.3:a:linuxcontainers:lxc:2.0.0:rc11:*:*:*:*:*:*
  • cpe:2.3:a:linuxcontainers:lxc:2.0.0:rc12:*:*:*:*:*:*
    cpe:2.3:a:linuxcontainers:lxc:2.0.0:rc12:*:*:*:*:*:*
  • cpe:2.3:a:linuxcontainers:lxc:2.0.0:rc13:*:*:*:*:*:*
    cpe:2.3:a:linuxcontainers:lxc:2.0.0:rc13:*:*:*:*:*:*
  • cpe:2.3:a:linuxcontainers:lxc:2.0.0:rc14:*:*:*:*:*:*
    cpe:2.3:a:linuxcontainers:lxc:2.0.0:rc14:*:*:*:*:*:*
  • cpe:2.3:a:linuxcontainers:lxc:2.0.0:rc15:*:*:*:*:*:*
    cpe:2.3:a:linuxcontainers:lxc:2.0.0:rc15:*:*:*:*:*:*
  • cpe:2.3:a:linuxcontainers:lxc:2.0.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:linuxcontainers:lxc:2.0.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:linuxcontainers:lxc:2.0.0:rc3:*:*:*:*:*:*
    cpe:2.3:a:linuxcontainers:lxc:2.0.0:rc3:*:*:*:*:*:*
  • cpe:2.3:a:linuxcontainers:lxc:2.0.0:rc4:*:*:*:*:*:*
    cpe:2.3:a:linuxcontainers:lxc:2.0.0:rc4:*:*:*:*:*:*
  • cpe:2.3:a:linuxcontainers:lxc:2.0.0:rc5:*:*:*:*:*:*
    cpe:2.3:a:linuxcontainers:lxc:2.0.0:rc5:*:*:*:*:*:*
  • cpe:2.3:a:linuxcontainers:lxc:2.0.0:rc6:*:*:*:*:*:*
    cpe:2.3:a:linuxcontainers:lxc:2.0.0:rc6:*:*:*:*:*:*
  • cpe:2.3:a:linuxcontainers:lxc:2.0.0:rc7:*:*:*:*:*:*
    cpe:2.3:a:linuxcontainers:lxc:2.0.0:rc7:*:*:*:*:*:*
  • cpe:2.3:a:linuxcontainers:lxc:2.0.0:rc8:*:*:*:*:*:*
    cpe:2.3:a:linuxcontainers:lxc:2.0.0:rc8:*:*:*:*:*:*
  • cpe:2.3:a:linuxcontainers:lxc:2.0.0:rc9:*:*:*:*:*:*
    cpe:2.3:a:linuxcontainers:lxc:2.0.0:rc9:*:*:*:*:*:*
  • cpe:2.3:a:linuxcontainers:lxc:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:linuxcontainers:lxc:2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:linuxcontainers:lxc:2.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:linuxcontainers:lxc:2.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:linuxcontainers:lxc:2.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:linuxcontainers:lxc:2.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:linuxcontainers:lxc:2.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:linuxcontainers:lxc:2.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:linuxcontainers:lxc:2.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:linuxcontainers:lxc:2.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:linuxcontainers:lxc:2.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:linuxcontainers:lxc:2.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:linuxcontainers:lxc:2.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:linuxcontainers:lxc:2.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:linuxcontainers:lxc:2.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:linuxcontainers:lxc:2.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:linuxcontainers:lxc:2.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:linuxcontainers:lxc:2.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:linuxcontainers:lxc:3.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:linuxcontainers:lxc:3.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:linuxcontainers:lxc:3.0.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:linuxcontainers:lxc:3.0.0:beta1:*:*:*:*:*:*
  • cpe:2.3:a:linuxcontainers:lxc:3.0.0:beta2:*:*:*:*:*:*
    cpe:2.3:a:linuxcontainers:lxc:3.0.0:beta2:*:*:*:*:*:*
  • cpe:2.3:a:linuxcontainers:lxc:3.0.0:beta3:*:*:*:*:*:*
    cpe:2.3:a:linuxcontainers:lxc:3.0.0:beta3:*:*:*:*:*:*
  • cpe:2.3:a:linuxcontainers:lxc:3.0.0:beta4:*:*:*:*:*:*
    cpe:2.3:a:linuxcontainers:lxc:3.0.0:beta4:*:*:*:*:*:*
  • cpe:2.3:a:linuxcontainers:lxc:3.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:linuxcontainers:lxc:3.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:suse:caas_platform:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:suse:caas_platform:1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:suse:caas_platform:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:suse:caas_platform:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:suse:openstack_cloud:6:*:*:*:*:*:*:*
    cpe:2.3:a:suse:openstack_cloud:6:*:*:*:*:*:*:*
  • cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:ltss:*:*:*
    cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:ltss:*:*:*
  • cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp4:*:*:*:*:*:*
    cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp4:*:*:*:*:*:*
  • cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
    cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
CVSS
Base: 2.1 (as of 31-05-2019 - 21:29)
Impact:
Exploitability:
CWE CWE-417
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:L/AC:L/Au:N/C:P/I:N/A:N
refmap via4
confirm
gentoo GLSA-201808-02
suse
  • openSUSE-SU-2019:1227
  • openSUSE-SU-2019:1230
  • openSUSE-SU-2019:1275
  • openSUSE-SU-2019:1481
ubuntu USN-3730-1
Last major update 31-05-2019 - 21:29
Published 10-08-2018 - 15:29
Last modified 31-05-2019 - 21:29
Back to Top