Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2018-6556


lxc-user-nic when asked to delete a network interface will unconditionally open a user provided path. This code path may be used by an unprivileged user to check for the existence of a path which they wouldn't otherwise be able to reach. It may also be used to trigger side effects by causing a (read-only) open of special kernel files (ptmx, proc, sys). Affected releases are LXC: 2.0 versions above and including 2.0.9; 3.0 versions above and including 3.0.0, prior to 3.0.2.


Published

2018-08-10T15:29:01.297

Last Modified

2024-11-21T04:10:53.970

Status

Modified

Source

[email protected]

Severity

CVSSv3.0: 3.3 (LOW)

CVSSv2 Vector

AV:L/AC:L/Au:N/C:P/I:N/A:N

  • Access Vector: LOCAL
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

3.9

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-417

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System canonical ubuntu_linux 18.04 Yes
Application linuxcontainers lxc ≤ 2.0.9 Yes
Application linuxcontainers lxc < 3.0.2 Yes
Application suse caas_platform 1.0 Yes
Application suse caas_platform 2.0 Yes
Application suse openstack_cloud 6 Yes
Operating System suse suse_linux_enterprise_server 11 Yes
Operating System suse suse_linux_enterprise_server 11 Yes
Operating System opensuse leap 15.0 Yes

References