[arch-security] [ASA-201705-17] lxc: insufficient validation

Christian Rebischke Chris.Rebischke at archlinux.org
Sat May 13 18:22:18 UTC 2017


Arch Linux Security Advisory ASA-201705-17
==========================================

Severity: Low
Date    : 2017-05-13
CVE-ID  : CVE-2017-5985
Package : lxc
Type    : insufficient validation
Remote  : No
Link    : https://security.archlinux.org/AVG-204

Summary
=======

The package lxc before version 1:2.0.8-1 is vulnerable to insufficient
validation.

Resolution
==========

Upgrade to 1:2.0.8-1.

# pacman -Syu "lxc>=1:2.0.8-1"

The problem has been fixed upstream in version 2.0.8.

Workaround
==========

None.

Description
===========

This security issue was reported by Jann Horn and has to do with a lack
of netns ownership check in lxc-user-nic, which would allow any user
with a lxc-usernet allocation to create network interfaces on the host
including choosing the name of that network interface. The created
interface wouldn't be UP so is unlikely to be automatically brought up
or get an address, but this issue could be used to squat the name of a
real system network interface before it appears.

Impact
======

A local attacker is able to spoof a new network interface.

References
==========

https://lists.linuxcontainers.org/pipermail/lxc-users/2017-March/012925.html
https://security.archlinux.org/CVE-2017-5985
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20170513/4042458e/attachment.asc>


More information about the arch-security mailing list